Date
July 9, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.356985] ================================================================== [ 19.357041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.357102] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.357358] [ 19.357539] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.357719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.357856] Hardware name: linux,dummy-virt (DT) [ 19.358021] Call trace: [ 19.358046] show_stack+0x20/0x38 (C) [ 19.358101] dump_stack_lvl+0x8c/0xd0 [ 19.358160] print_report+0x118/0x608 [ 19.358207] kasan_report+0xdc/0x128 [ 19.358256] kasan_check_range+0x100/0x1a8 [ 19.358305] __kasan_check_write+0x20/0x30 [ 19.358350] kasan_atomics_helper+0xff0/0x4858 [ 19.358407] kasan_atomics+0x198/0x2e0 [ 19.358623] kunit_try_run_case+0x170/0x3f0 [ 19.358862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.359125] kthread+0x328/0x630 [ 19.359168] ret_from_fork+0x10/0x20 [ 19.359218] [ 19.359239] Allocated by task 265: [ 19.359268] kasan_save_stack+0x3c/0x68 [ 19.359311] kasan_save_track+0x20/0x40 [ 19.359349] kasan_save_alloc_info+0x40/0x58 [ 19.359391] __kasan_kmalloc+0xd4/0xd8 [ 19.359430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.360271] kasan_atomics+0xb8/0x2e0 [ 19.360454] kunit_try_run_case+0x170/0x3f0 [ 19.360643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.360693] kthread+0x328/0x630 [ 19.360729] ret_from_fork+0x10/0x20 [ 19.360768] [ 19.360792] The buggy address belongs to the object at fff00000c7692100 [ 19.360792] which belongs to the cache kmalloc-64 of size 64 [ 19.360951] The buggy address is located 0 bytes to the right of [ 19.360951] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.361162] [ 19.361201] The buggy address belongs to the physical page: [ 19.361235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.361383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.361437] page_type: f5(slab) [ 19.361475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.361549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.361592] page dumped because: kasan: bad access detected [ 19.361840] [ 19.361910] Memory state around the buggy address: [ 19.362026] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.362071] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.362126] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.362164] ^ [ 19.362199] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.362241] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.362282] ================================================================== [ 19.426491] ================================================================== [ 19.426554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.427027] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.427181] [ 19.427218] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.427301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.427328] Hardware name: linux,dummy-virt (DT) [ 19.427361] Call trace: [ 19.427386] show_stack+0x20/0x38 (C) [ 19.427440] dump_stack_lvl+0x8c/0xd0 [ 19.427492] print_report+0x118/0x608 [ 19.427540] kasan_report+0xdc/0x128 [ 19.427588] kasan_check_range+0x100/0x1a8 [ 19.427636] __kasan_check_write+0x20/0x30 [ 19.427691] kasan_atomics_helper+0x12d8/0x4858 [ 19.427740] kasan_atomics+0x198/0x2e0 [ 19.427787] kunit_try_run_case+0x170/0x3f0 [ 19.427835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.427889] kthread+0x328/0x630 [ 19.427931] ret_from_fork+0x10/0x20 [ 19.427979] [ 19.427999] Allocated by task 265: [ 19.428029] kasan_save_stack+0x3c/0x68 [ 19.428071] kasan_save_track+0x20/0x40 [ 19.428110] kasan_save_alloc_info+0x40/0x58 [ 19.428185] __kasan_kmalloc+0xd4/0xd8 [ 19.428395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.428508] kasan_atomics+0xb8/0x2e0 [ 19.428546] kunit_try_run_case+0x170/0x3f0 [ 19.428588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.428632] kthread+0x328/0x630 [ 19.428667] ret_from_fork+0x10/0x20 [ 19.428720] [ 19.428742] The buggy address belongs to the object at fff00000c7692100 [ 19.428742] which belongs to the cache kmalloc-64 of size 64 [ 19.428809] The buggy address is located 0 bytes to the right of [ 19.428809] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.428892] [ 19.428916] The buggy address belongs to the physical page: [ 19.428966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.429028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.429077] page_type: f5(slab) [ 19.429128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.429183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.429235] page dumped because: kasan: bad access detected [ 19.429277] [ 19.429314] Memory state around the buggy address: [ 19.429348] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.429402] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.429455] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.429497] ^ [ 19.429536] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.429593] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.429633] ================================================================== [ 19.452390] ================================================================== [ 19.452464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.452513] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.452564] [ 19.452594] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.452675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.452704] Hardware name: linux,dummy-virt (DT) [ 19.452737] Call trace: [ 19.452793] show_stack+0x20/0x38 (C) [ 19.452849] dump_stack_lvl+0x8c/0xd0 [ 19.452924] print_report+0x118/0x608 [ 19.453000] kasan_report+0xdc/0x128 [ 19.453085] kasan_check_range+0x100/0x1a8 [ 19.453149] __kasan_check_write+0x20/0x30 [ 19.453195] kasan_atomics_helper+0x14e4/0x4858 [ 19.453250] kasan_atomics+0x198/0x2e0 [ 19.453408] kunit_try_run_case+0x170/0x3f0 [ 19.453461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.453521] kthread+0x328/0x630 [ 19.453565] ret_from_fork+0x10/0x20 [ 19.453630] [ 19.453669] Allocated by task 265: [ 19.453700] kasan_save_stack+0x3c/0x68 [ 19.453757] kasan_save_track+0x20/0x40 [ 19.453804] kasan_save_alloc_info+0x40/0x58 [ 19.453845] __kasan_kmalloc+0xd4/0xd8 [ 19.453959] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.454036] kasan_atomics+0xb8/0x2e0 [ 19.454151] kunit_try_run_case+0x170/0x3f0 [ 19.454191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.454245] kthread+0x328/0x630 [ 19.454280] ret_from_fork+0x10/0x20 [ 19.454319] [ 19.454341] The buggy address belongs to the object at fff00000c7692100 [ 19.454341] which belongs to the cache kmalloc-64 of size 64 [ 19.454401] The buggy address is located 0 bytes to the right of [ 19.454401] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.454472] [ 19.454494] The buggy address belongs to the physical page: [ 19.454527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.454589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.454660] page_type: f5(slab) [ 19.454701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.454753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.454796] page dumped because: kasan: bad access detected [ 19.454829] [ 19.454858] Memory state around the buggy address: [ 19.454892] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.454939] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.454992] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.455033] ^ [ 19.455067] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.455110] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.455157] ================================================================== [ 19.504959] ================================================================== [ 19.505229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.505285] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.505336] [ 19.505372] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.505455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.505484] Hardware name: linux,dummy-virt (DT) [ 19.506874] Call trace: [ 19.507385] show_stack+0x20/0x38 (C) [ 19.507656] dump_stack_lvl+0x8c/0xd0 [ 19.508148] print_report+0x118/0x608 [ 19.508427] kasan_report+0xdc/0x128 [ 19.508551] __asan_report_load8_noabort+0x20/0x30 [ 19.508611] kasan_atomics_helper+0x3e20/0x4858 [ 19.509469] kasan_atomics+0x198/0x2e0 [ 19.509536] kunit_try_run_case+0x170/0x3f0 [ 19.510577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.510741] kthread+0x328/0x630 [ 19.511454] ret_from_fork+0x10/0x20 [ 19.512007] [ 19.512159] Allocated by task 265: [ 19.512293] kasan_save_stack+0x3c/0x68 [ 19.512798] kasan_save_track+0x20/0x40 [ 19.513048] kasan_save_alloc_info+0x40/0x58 [ 19.513537] __kasan_kmalloc+0xd4/0xd8 [ 19.514003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.514317] kasan_atomics+0xb8/0x2e0 [ 19.514615] kunit_try_run_case+0x170/0x3f0 [ 19.514672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.514716] kthread+0x328/0x630 [ 19.514751] ret_from_fork+0x10/0x20 [ 19.514790] [ 19.515718] The buggy address belongs to the object at fff00000c7692100 [ 19.515718] which belongs to the cache kmalloc-64 of size 64 [ 19.516320] The buggy address is located 0 bytes to the right of [ 19.516320] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.516389] [ 19.517039] The buggy address belongs to the physical page: [ 19.517844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.517931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.517985] page_type: f5(slab) [ 19.518029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.518081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.518635] page dumped because: kasan: bad access detected [ 19.518828] [ 19.518849] Memory state around the buggy address: [ 19.518885] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.518932] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.519041] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.519218] ^ [ 19.519254] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.519343] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.519477] ================================================================== [ 19.308667] ================================================================== [ 19.308722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.308772] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.308823] [ 19.308856] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.308940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.308967] Hardware name: linux,dummy-virt (DT) [ 19.309000] Call trace: [ 19.309561] show_stack+0x20/0x38 (C) [ 19.309720] dump_stack_lvl+0x8c/0xd0 [ 19.309832] print_report+0x118/0x608 [ 19.309881] kasan_report+0xdc/0x128 [ 19.309927] kasan_check_range+0x100/0x1a8 [ 19.309976] __kasan_check_read+0x20/0x30 [ 19.310021] kasan_atomics_helper+0xdd4/0x4858 [ 19.310078] kasan_atomics+0x198/0x2e0 [ 19.310163] kunit_try_run_case+0x170/0x3f0 [ 19.310218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.310878] kthread+0x328/0x630 [ 19.311062] ret_from_fork+0x10/0x20 [ 19.311125] [ 19.311187] Allocated by task 265: [ 19.311220] kasan_save_stack+0x3c/0x68 [ 19.311264] kasan_save_track+0x20/0x40 [ 19.311304] kasan_save_alloc_info+0x40/0x58 [ 19.311354] __kasan_kmalloc+0xd4/0xd8 [ 19.311394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.311435] kasan_atomics+0xb8/0x2e0 [ 19.311479] kunit_try_run_case+0x170/0x3f0 [ 19.311602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.311649] kthread+0x328/0x630 [ 19.311741] ret_from_fork+0x10/0x20 [ 19.311778] [ 19.311799] The buggy address belongs to the object at fff00000c7692100 [ 19.311799] which belongs to the cache kmalloc-64 of size 64 [ 19.311861] The buggy address is located 0 bytes to the right of [ 19.311861] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.312613] [ 19.312640] The buggy address belongs to the physical page: [ 19.312684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.312803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.312853] page_type: f5(slab) [ 19.312893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.313065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.313181] page dumped because: kasan: bad access detected [ 19.313277] [ 19.313327] Memory state around the buggy address: [ 19.313405] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.313548] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.313643] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.313685] ^ [ 19.313782] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.313968] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.314061] ================================================================== [ 19.436516] ================================================================== [ 19.436561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.436607] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.436659] [ 19.436690] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.436770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.436800] Hardware name: linux,dummy-virt (DT) [ 19.436834] Call trace: [ 19.436856] show_stack+0x20/0x38 (C) [ 19.436906] dump_stack_lvl+0x8c/0xd0 [ 19.436953] print_report+0x118/0x608 [ 19.437001] kasan_report+0xdc/0x128 [ 19.437047] __asan_report_load8_noabort+0x20/0x30 [ 19.437100] kasan_atomics_helper+0x3f04/0x4858 [ 19.437167] kasan_atomics+0x198/0x2e0 [ 19.437215] kunit_try_run_case+0x170/0x3f0 [ 19.437264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.437319] kthread+0x328/0x630 [ 19.437361] ret_from_fork+0x10/0x20 [ 19.437410] [ 19.437430] Allocated by task 265: [ 19.437459] kasan_save_stack+0x3c/0x68 [ 19.437501] kasan_save_track+0x20/0x40 [ 19.437543] kasan_save_alloc_info+0x40/0x58 [ 19.437585] __kasan_kmalloc+0xd4/0xd8 [ 19.437623] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.437664] kasan_atomics+0xb8/0x2e0 [ 19.437700] kunit_try_run_case+0x170/0x3f0 [ 19.437741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.437784] kthread+0x328/0x630 [ 19.437819] ret_from_fork+0x10/0x20 [ 19.437855] [ 19.437876] The buggy address belongs to the object at fff00000c7692100 [ 19.437876] which belongs to the cache kmalloc-64 of size 64 [ 19.437935] The buggy address is located 0 bytes to the right of [ 19.437935] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.438001] [ 19.438023] The buggy address belongs to the physical page: [ 19.438054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.438107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.439858] page_type: f5(slab) [ 19.439901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.439955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.439998] page dumped because: kasan: bad access detected [ 19.440031] [ 19.440052] Memory state around the buggy address: [ 19.440085] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.440141] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.440186] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.440229] ^ [ 19.440265] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.440308] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.440348] ================================================================== [ 19.470012] ================================================================== [ 19.470109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.470544] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.470605] [ 19.470642] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.470831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.470918] Hardware name: linux,dummy-virt (DT) [ 19.471019] Call trace: [ 19.471068] show_stack+0x20/0x38 (C) [ 19.471134] dump_stack_lvl+0x8c/0xd0 [ 19.471239] print_report+0x118/0x608 [ 19.471319] kasan_report+0xdc/0x128 [ 19.471394] kasan_check_range+0x100/0x1a8 [ 19.471492] __kasan_check_write+0x20/0x30 [ 19.471558] kasan_atomics_helper+0x1644/0x4858 [ 19.471691] kasan_atomics+0x198/0x2e0 [ 19.471766] kunit_try_run_case+0x170/0x3f0 [ 19.471816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.471869] kthread+0x328/0x630 [ 19.471961] ret_from_fork+0x10/0x20 [ 19.472221] [ 19.472295] Allocated by task 265: [ 19.472370] kasan_save_stack+0x3c/0x68 [ 19.472467] kasan_save_track+0x20/0x40 [ 19.472528] kasan_save_alloc_info+0x40/0x58 [ 19.472880] __kasan_kmalloc+0xd4/0xd8 [ 19.473026] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.473198] kasan_atomics+0xb8/0x2e0 [ 19.473400] kunit_try_run_case+0x170/0x3f0 [ 19.473530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.473624] kthread+0x328/0x630 [ 19.473660] ret_from_fork+0x10/0x20 [ 19.473882] [ 19.474034] The buggy address belongs to the object at fff00000c7692100 [ 19.474034] which belongs to the cache kmalloc-64 of size 64 [ 19.474278] The buggy address is located 0 bytes to the right of [ 19.474278] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.474540] [ 19.474615] The buggy address belongs to the physical page: [ 19.474732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.474823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.474874] page_type: f5(slab) [ 19.475122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.475386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.475573] page dumped because: kasan: bad access detected [ 19.475812] [ 19.475911] Memory state around the buggy address: [ 19.475947] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.476253] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.476439] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.476781] ^ [ 19.476942] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.477018] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.477057] ================================================================== [ 19.321414] ================================================================== [ 19.321504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.321561] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.321611] [ 19.321643] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.321943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.322073] Hardware name: linux,dummy-virt (DT) [ 19.322437] Call trace: [ 19.322609] show_stack+0x20/0x38 (C) [ 19.322676] dump_stack_lvl+0x8c/0xd0 [ 19.322853] print_report+0x118/0x608 [ 19.322908] kasan_report+0xdc/0x128 [ 19.322960] kasan_check_range+0x100/0x1a8 [ 19.323218] __kasan_check_write+0x20/0x30 [ 19.323292] kasan_atomics_helper+0xe44/0x4858 [ 19.323342] kasan_atomics+0x198/0x2e0 [ 19.323387] kunit_try_run_case+0x170/0x3f0 [ 19.323436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.323495] kthread+0x328/0x630 [ 19.323714] ret_from_fork+0x10/0x20 [ 19.323765] [ 19.323785] Allocated by task 265: [ 19.323816] kasan_save_stack+0x3c/0x68 [ 19.323859] kasan_save_track+0x20/0x40 [ 19.323899] kasan_save_alloc_info+0x40/0x58 [ 19.323942] __kasan_kmalloc+0xd4/0xd8 [ 19.324228] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.324762] kasan_atomics+0xb8/0x2e0 [ 19.324811] kunit_try_run_case+0x170/0x3f0 [ 19.324974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.325020] kthread+0x328/0x630 [ 19.325074] ret_from_fork+0x10/0x20 [ 19.325884] [ 19.325921] The buggy address belongs to the object at fff00000c7692100 [ 19.325921] which belongs to the cache kmalloc-64 of size 64 [ 19.326203] The buggy address is located 0 bytes to the right of [ 19.326203] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.326456] [ 19.326642] The buggy address belongs to the physical page: [ 19.326779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.326935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.326985] page_type: f5(slab) [ 19.327025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.327110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.327407] page dumped because: kasan: bad access detected [ 19.327698] [ 19.327763] Memory state around the buggy address: [ 19.327971] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.328048] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.328097] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.328241] ^ [ 19.328314] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.328416] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.328457] ================================================================== [ 19.344160] ================================================================== [ 19.344245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.344588] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.344641] [ 19.344672] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.344755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.344810] Hardware name: linux,dummy-virt (DT) [ 19.344843] Call trace: [ 19.344866] show_stack+0x20/0x38 (C) [ 19.345384] dump_stack_lvl+0x8c/0xd0 [ 19.345440] print_report+0x118/0x608 [ 19.345555] kasan_report+0xdc/0x128 [ 19.345670] kasan_check_range+0x100/0x1a8 [ 19.345811] __kasan_check_write+0x20/0x30 [ 19.345857] kasan_atomics_helper+0xf20/0x4858 [ 19.345927] kasan_atomics+0x198/0x2e0 [ 19.346122] kunit_try_run_case+0x170/0x3f0 [ 19.346173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.346227] kthread+0x328/0x630 [ 19.346269] ret_from_fork+0x10/0x20 [ 19.346485] [ 19.346509] Allocated by task 265: [ 19.346541] kasan_save_stack+0x3c/0x68 [ 19.346874] kasan_save_track+0x20/0x40 [ 19.346915] kasan_save_alloc_info+0x40/0x58 [ 19.346956] __kasan_kmalloc+0xd4/0xd8 [ 19.346995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.347037] kasan_atomics+0xb8/0x2e0 [ 19.347075] kunit_try_run_case+0x170/0x3f0 [ 19.347449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.347499] kthread+0x328/0x630 [ 19.347533] ret_from_fork+0x10/0x20 [ 19.347753] [ 19.347785] The buggy address belongs to the object at fff00000c7692100 [ 19.347785] which belongs to the cache kmalloc-64 of size 64 [ 19.347989] The buggy address is located 0 bytes to the right of [ 19.347989] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.348059] [ 19.348080] The buggy address belongs to the physical page: [ 19.348241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.348298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.348349] page_type: f5(slab) [ 19.348389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.348510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.348553] page dumped because: kasan: bad access detected [ 19.348685] [ 19.348739] Memory state around the buggy address: [ 19.348779] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.348860] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.348902] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.348942] ^ [ 19.348975] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.349250] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.349294] ================================================================== [ 19.521724] ================================================================== [ 19.521909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.521960] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.522058] [ 19.522094] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.522376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.522404] Hardware name: linux,dummy-virt (DT) [ 19.522438] Call trace: [ 19.522462] show_stack+0x20/0x38 (C) [ 19.522511] dump_stack_lvl+0x8c/0xd0 [ 19.522562] print_report+0x118/0x608 [ 19.522610] kasan_report+0xdc/0x128 [ 19.522665] kasan_check_range+0x100/0x1a8 [ 19.522906] __kasan_check_write+0x20/0x30 [ 19.523128] kasan_atomics_helper+0x17ec/0x4858 [ 19.523182] kasan_atomics+0x198/0x2e0 [ 19.523574] kunit_try_run_case+0x170/0x3f0 [ 19.524048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.524274] kthread+0x328/0x630 [ 19.524410] ret_from_fork+0x10/0x20 [ 19.524536] [ 19.524610] Allocated by task 265: [ 19.524710] kasan_save_stack+0x3c/0x68 [ 19.524755] kasan_save_track+0x20/0x40 [ 19.524830] kasan_save_alloc_info+0x40/0x58 [ 19.524874] __kasan_kmalloc+0xd4/0xd8 [ 19.524915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.525174] kasan_atomics+0xb8/0x2e0 [ 19.525279] kunit_try_run_case+0x170/0x3f0 [ 19.525320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525374] kthread+0x328/0x630 [ 19.525411] ret_from_fork+0x10/0x20 [ 19.525695] [ 19.525801] The buggy address belongs to the object at fff00000c7692100 [ 19.525801] which belongs to the cache kmalloc-64 of size 64 [ 19.526031] The buggy address is located 0 bytes to the right of [ 19.526031] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.526126] [ 19.526151] The buggy address belongs to the physical page: [ 19.526183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.526237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.526290] page_type: f5(slab) [ 19.526591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.526650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.526878] page dumped because: kasan: bad access detected [ 19.527080] [ 19.527106] Memory state around the buggy address: [ 19.527382] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.527504] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.527550] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.527593] ^ [ 19.527629] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.527675] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.528083] ================================================================== [ 19.387936] ================================================================== [ 19.388564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.388623] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.388674] [ 19.388760] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.389903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.390055] Hardware name: linux,dummy-virt (DT) [ 19.390141] Call trace: [ 19.390167] show_stack+0x20/0x38 (C) [ 19.390221] dump_stack_lvl+0x8c/0xd0 [ 19.390272] print_report+0x118/0x608 [ 19.390322] kasan_report+0xdc/0x128 [ 19.390684] kasan_check_range+0x100/0x1a8 [ 19.390903] __kasan_check_write+0x20/0x30 [ 19.390954] kasan_atomics_helper+0x1128/0x4858 [ 19.391166] kasan_atomics+0x198/0x2e0 [ 19.391540] kunit_try_run_case+0x170/0x3f0 [ 19.391684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.391807] kthread+0x328/0x630 [ 19.391960] ret_from_fork+0x10/0x20 [ 19.392012] [ 19.392032] Allocated by task 265: [ 19.392073] kasan_save_stack+0x3c/0x68 [ 19.392301] kasan_save_track+0x20/0x40 [ 19.392553] kasan_save_alloc_info+0x40/0x58 [ 19.392606] __kasan_kmalloc+0xd4/0xd8 [ 19.392644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.392825] kasan_atomics+0xb8/0x2e0 [ 19.392864] kunit_try_run_case+0x170/0x3f0 [ 19.393148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393197] kthread+0x328/0x630 [ 19.393231] ret_from_fork+0x10/0x20 [ 19.393354] [ 19.393463] The buggy address belongs to the object at fff00000c7692100 [ 19.393463] which belongs to the cache kmalloc-64 of size 64 [ 19.393644] The buggy address is located 0 bytes to the right of [ 19.393644] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.393903] [ 19.394134] The buggy address belongs to the physical page: [ 19.394259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.394317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.394378] page_type: f5(slab) [ 19.394419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.394473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.394849] page dumped because: kasan: bad access detected [ 19.394891] [ 19.394911] Memory state around the buggy address: [ 19.395061] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.395418] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.395510] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.395968] ^ [ 19.396021] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.396257] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.396298] ================================================================== [ 19.314872] ================================================================== [ 19.314933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.315193] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.315295] [ 19.315390] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.315734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.315762] Hardware name: linux,dummy-virt (DT) [ 19.315795] Call trace: [ 19.315818] show_stack+0x20/0x38 (C) [ 19.315870] dump_stack_lvl+0x8c/0xd0 [ 19.316147] print_report+0x118/0x608 [ 19.316329] kasan_report+0xdc/0x128 [ 19.316383] __asan_report_load8_noabort+0x20/0x30 [ 19.316437] kasan_atomics_helper+0x3f58/0x4858 [ 19.316486] kasan_atomics+0x198/0x2e0 [ 19.316534] kunit_try_run_case+0x170/0x3f0 [ 19.316582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.316638] kthread+0x328/0x630 [ 19.317197] ret_from_fork+0x10/0x20 [ 19.317364] [ 19.317548] Allocated by task 265: [ 19.317616] kasan_save_stack+0x3c/0x68 [ 19.317734] kasan_save_track+0x20/0x40 [ 19.317814] kasan_save_alloc_info+0x40/0x58 [ 19.317856] __kasan_kmalloc+0xd4/0xd8 [ 19.317952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.318064] kasan_atomics+0xb8/0x2e0 [ 19.318169] kunit_try_run_case+0x170/0x3f0 [ 19.318210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.318255] kthread+0x328/0x630 [ 19.318297] ret_from_fork+0x10/0x20 [ 19.318333] [ 19.318405] The buggy address belongs to the object at fff00000c7692100 [ 19.318405] which belongs to the cache kmalloc-64 of size 64 [ 19.318465] The buggy address is located 0 bytes to the right of [ 19.318465] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.318581] [ 19.318659] The buggy address belongs to the physical page: [ 19.318709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.318835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.318899] page_type: f5(slab) [ 19.318982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.319128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.319172] page dumped because: kasan: bad access detected [ 19.319203] [ 19.319223] Memory state around the buggy address: [ 19.319256] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.319299] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.319344] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.319383] ^ [ 19.319615] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.320043] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.320090] ================================================================== [ 19.455263] ================================================================== [ 19.455303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.455722] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.455785] [ 19.455890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.456004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.456168] Hardware name: linux,dummy-virt (DT) [ 19.456209] Call trace: [ 19.456233] show_stack+0x20/0x38 (C) [ 19.456286] dump_stack_lvl+0x8c/0xd0 [ 19.456333] print_report+0x118/0x608 [ 19.456382] kasan_report+0xdc/0x128 [ 19.456491] kasan_check_range+0x100/0x1a8 [ 19.456590] __kasan_check_write+0x20/0x30 [ 19.456675] kasan_atomics_helper+0x154c/0x4858 [ 19.456766] kasan_atomics+0x198/0x2e0 [ 19.456904] kunit_try_run_case+0x170/0x3f0 [ 19.456989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.457246] kthread+0x328/0x630 [ 19.457365] ret_from_fork+0x10/0x20 [ 19.457556] [ 19.457666] Allocated by task 265: [ 19.457758] kasan_save_stack+0x3c/0x68 [ 19.457876] kasan_save_track+0x20/0x40 [ 19.457950] kasan_save_alloc_info+0x40/0x58 [ 19.458046] __kasan_kmalloc+0xd4/0xd8 [ 19.458086] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.458137] kasan_atomics+0xb8/0x2e0 [ 19.458197] kunit_try_run_case+0x170/0x3f0 [ 19.458235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.458300] kthread+0x328/0x630 [ 19.458335] ret_from_fork+0x10/0x20 [ 19.458373] [ 19.458395] The buggy address belongs to the object at fff00000c7692100 [ 19.458395] which belongs to the cache kmalloc-64 of size 64 [ 19.458540] The buggy address is located 0 bytes to the right of [ 19.458540] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.458685] [ 19.458859] The buggy address belongs to the physical page: [ 19.458894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.458946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.459044] page_type: f5(slab) [ 19.459171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.459293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.459404] page dumped because: kasan: bad access detected [ 19.459474] [ 19.459580] Memory state around the buggy address: [ 19.459614] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.459666] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.459825] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.459871] ^ [ 19.459905] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459974] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.460079] ================================================================== [ 19.440883] ================================================================== [ 19.440934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.440986] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.441036] [ 19.441068] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.441192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.441221] Hardware name: linux,dummy-virt (DT) [ 19.441254] Call trace: [ 19.441280] show_stack+0x20/0x38 (C) [ 19.441331] dump_stack_lvl+0x8c/0xd0 [ 19.441381] print_report+0x118/0x608 [ 19.441427] kasan_report+0xdc/0x128 [ 19.441475] kasan_check_range+0x100/0x1a8 [ 19.441798] __kasan_check_write+0x20/0x30 [ 19.441892] kasan_atomics_helper+0x1414/0x4858 [ 19.441951] kasan_atomics+0x198/0x2e0 [ 19.442003] kunit_try_run_case+0x170/0x3f0 [ 19.442052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.442124] kthread+0x328/0x630 [ 19.442169] ret_from_fork+0x10/0x20 [ 19.442226] [ 19.442256] Allocated by task 265: [ 19.442294] kasan_save_stack+0x3c/0x68 [ 19.442347] kasan_save_track+0x20/0x40 [ 19.442417] kasan_save_alloc_info+0x40/0x58 [ 19.442467] __kasan_kmalloc+0xd4/0xd8 [ 19.442505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.442546] kasan_atomics+0xb8/0x2e0 [ 19.442584] kunit_try_run_case+0x170/0x3f0 [ 19.442625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.442675] kthread+0x328/0x630 [ 19.442841] ret_from_fork+0x10/0x20 [ 19.442906] [ 19.442928] The buggy address belongs to the object at fff00000c7692100 [ 19.442928] which belongs to the cache kmalloc-64 of size 64 [ 19.443137] The buggy address is located 0 bytes to the right of [ 19.443137] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.443202] [ 19.443223] The buggy address belongs to the physical page: [ 19.443257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.443311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.443359] page_type: f5(slab) [ 19.443398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.443450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.443493] page dumped because: kasan: bad access detected [ 19.443526] [ 19.443547] Memory state around the buggy address: [ 19.443580] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.443948] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444018] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.444060] ^ [ 19.444306] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444742] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444895] ================================================================== [ 19.300072] ================================================================== [ 19.300294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.300496] Read of size 4 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.300743] [ 19.300826] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.300988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.301035] Hardware name: linux,dummy-virt (DT) [ 19.301081] Call trace: [ 19.301105] show_stack+0x20/0x38 (C) [ 19.301172] dump_stack_lvl+0x8c/0xd0 [ 19.301538] print_report+0x118/0x608 [ 19.301845] kasan_report+0xdc/0x128 [ 19.301906] __asan_report_load4_noabort+0x20/0x30 [ 19.301961] kasan_atomics_helper+0x3e04/0x4858 [ 19.302010] kasan_atomics+0x198/0x2e0 [ 19.302059] kunit_try_run_case+0x170/0x3f0 [ 19.302106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.302182] kthread+0x328/0x630 [ 19.302228] ret_from_fork+0x10/0x20 [ 19.302540] [ 19.302891] Allocated by task 265: [ 19.302932] kasan_save_stack+0x3c/0x68 [ 19.303246] kasan_save_track+0x20/0x40 [ 19.303352] kasan_save_alloc_info+0x40/0x58 [ 19.303395] __kasan_kmalloc+0xd4/0xd8 [ 19.303434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.303476] kasan_atomics+0xb8/0x2e0 [ 19.303514] kunit_try_run_case+0x170/0x3f0 [ 19.303553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.303599] kthread+0x328/0x630 [ 19.303641] ret_from_fork+0x10/0x20 [ 19.303735] [ 19.303756] The buggy address belongs to the object at fff00000c7692100 [ 19.303756] which belongs to the cache kmalloc-64 of size 64 [ 19.303819] The buggy address is located 0 bytes to the right of [ 19.303819] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.303886] [ 19.303908] The buggy address belongs to the physical page: [ 19.303940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.303996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.304046] page_type: f5(slab) [ 19.304225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.304600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.304645] page dumped because: kasan: bad access detected [ 19.304679] [ 19.304984] Memory state around the buggy address: [ 19.305267] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305394] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305812] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.306058] ^ [ 19.306173] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.306240] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.306281] ================================================================== [ 19.460671] ================================================================== [ 19.460781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.460897] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.460969] [ 19.461006] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.461087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.461128] Hardware name: linux,dummy-virt (DT) [ 19.461161] Call trace: [ 19.461184] show_stack+0x20/0x38 (C) [ 19.461234] dump_stack_lvl+0x8c/0xd0 [ 19.461414] print_report+0x118/0x608 [ 19.461467] kasan_report+0xdc/0x128 [ 19.461519] kasan_check_range+0x100/0x1a8 [ 19.461596] __kasan_check_write+0x20/0x30 [ 19.461760] kasan_atomics_helper+0x15b4/0x4858 [ 19.461819] kasan_atomics+0x198/0x2e0 [ 19.461918] kunit_try_run_case+0x170/0x3f0 [ 19.462049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.462106] kthread+0x328/0x630 [ 19.462173] ret_from_fork+0x10/0x20 [ 19.462289] [ 19.462361] Allocated by task 265: [ 19.462398] kasan_save_stack+0x3c/0x68 [ 19.462466] kasan_save_track+0x20/0x40 [ 19.462507] kasan_save_alloc_info+0x40/0x58 [ 19.462589] __kasan_kmalloc+0xd4/0xd8 [ 19.462635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.462702] kasan_atomics+0xb8/0x2e0 [ 19.462768] kunit_try_run_case+0x170/0x3f0 [ 19.462825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.462871] kthread+0x328/0x630 [ 19.462905] ret_from_fork+0x10/0x20 [ 19.462971] [ 19.463000] The buggy address belongs to the object at fff00000c7692100 [ 19.463000] which belongs to the cache kmalloc-64 of size 64 [ 19.463061] The buggy address is located 0 bytes to the right of [ 19.463061] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.463135] [ 19.463156] The buggy address belongs to the physical page: [ 19.463313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.463369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.463417] page_type: f5(slab) [ 19.463458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.463512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.463586] page dumped because: kasan: bad access detected [ 19.463620] [ 19.463788] Memory state around the buggy address: [ 19.464197] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464291] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464337] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.464387] ^ [ 19.464430] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.464474] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.464512] ================================================================== [ 19.292993] ================================================================== [ 19.293238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.293372] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.293426] [ 19.293458] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.293558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.293588] Hardware name: linux,dummy-virt (DT) [ 19.293619] Call trace: [ 19.293644] show_stack+0x20/0x38 (C) [ 19.293694] dump_stack_lvl+0x8c/0xd0 [ 19.293752] print_report+0x118/0x608 [ 19.293799] kasan_report+0xdc/0x128 [ 19.293847] kasan_check_range+0x100/0x1a8 [ 19.293910] __kasan_check_write+0x20/0x30 [ 19.293959] kasan_atomics_helper+0xd3c/0x4858 [ 19.294007] kasan_atomics+0x198/0x2e0 [ 19.294071] kunit_try_run_case+0x170/0x3f0 [ 19.294131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.294373] kthread+0x328/0x630 [ 19.294871] ret_from_fork+0x10/0x20 [ 19.294938] [ 19.295002] Allocated by task 265: [ 19.295053] kasan_save_stack+0x3c/0x68 [ 19.295227] kasan_save_track+0x20/0x40 [ 19.295275] kasan_save_alloc_info+0x40/0x58 [ 19.295464] __kasan_kmalloc+0xd4/0xd8 [ 19.295504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.295552] kasan_atomics+0xb8/0x2e0 [ 19.295589] kunit_try_run_case+0x170/0x3f0 [ 19.295629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.295713] kthread+0x328/0x630 [ 19.295751] ret_from_fork+0x10/0x20 [ 19.295790] [ 19.295813] The buggy address belongs to the object at fff00000c7692100 [ 19.295813] which belongs to the cache kmalloc-64 of size 64 [ 19.295874] The buggy address is located 0 bytes to the right of [ 19.295874] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.296069] [ 19.296208] The buggy address belongs to the physical page: [ 19.296553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.296611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.296662] page_type: f5(slab) [ 19.296702] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.296752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.297084] page dumped because: kasan: bad access detected [ 19.297150] [ 19.297172] Memory state around the buggy address: [ 19.297207] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.297584] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.297697] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.297765] ^ [ 19.297802] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.298135] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.298209] ================================================================== [ 19.329382] ================================================================== [ 19.329435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.329738] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.330124] [ 19.330174] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.330285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.330565] Hardware name: linux,dummy-virt (DT) [ 19.330599] Call trace: [ 19.330625] show_stack+0x20/0x38 (C) [ 19.330677] dump_stack_lvl+0x8c/0xd0 [ 19.330737] print_report+0x118/0x608 [ 19.330895] kasan_report+0xdc/0x128 [ 19.330976] __asan_report_store8_noabort+0x20/0x30 [ 19.331026] kasan_atomics_helper+0x3e5c/0x4858 [ 19.331077] kasan_atomics+0x198/0x2e0 [ 19.331135] kunit_try_run_case+0x170/0x3f0 [ 19.331183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.331288] kthread+0x328/0x630 [ 19.331805] ret_from_fork+0x10/0x20 [ 19.332247] [ 19.332282] Allocated by task 265: [ 19.332314] kasan_save_stack+0x3c/0x68 [ 19.332358] kasan_save_track+0x20/0x40 [ 19.332399] kasan_save_alloc_info+0x40/0x58 [ 19.332440] __kasan_kmalloc+0xd4/0xd8 [ 19.332479] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.332771] kasan_atomics+0xb8/0x2e0 [ 19.332816] kunit_try_run_case+0x170/0x3f0 [ 19.332857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.332903] kthread+0x328/0x630 [ 19.332948] ret_from_fork+0x10/0x20 [ 19.332986] [ 19.333297] The buggy address belongs to the object at fff00000c7692100 [ 19.333297] which belongs to the cache kmalloc-64 of size 64 [ 19.333391] The buggy address is located 0 bytes to the right of [ 19.333391] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.333469] [ 19.333492] The buggy address belongs to the physical page: [ 19.333537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.333590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.333662] page_type: f5(slab) [ 19.333771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.333921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.333965] page dumped because: kasan: bad access detected [ 19.334000] [ 19.334019] Memory state around the buggy address: [ 19.334101] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.334755] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.334809] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.334852] ^ [ 19.334886] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.334931] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.335449] ================================================================== [ 19.336161] ================================================================== [ 19.336213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.336261] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.336313] [ 19.336345] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.336453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.336482] Hardware name: linux,dummy-virt (DT) [ 19.336514] Call trace: [ 19.336537] show_stack+0x20/0x38 (C) [ 19.336586] dump_stack_lvl+0x8c/0xd0 [ 19.336634] print_report+0x118/0x608 [ 19.336981] kasan_report+0xdc/0x128 [ 19.337458] kasan_check_range+0x100/0x1a8 [ 19.337790] __kasan_check_write+0x20/0x30 [ 19.337892] kasan_atomics_helper+0xeb8/0x4858 [ 19.338009] kasan_atomics+0x198/0x2e0 [ 19.338063] kunit_try_run_case+0x170/0x3f0 [ 19.338287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.338353] kthread+0x328/0x630 [ 19.338516] ret_from_fork+0x10/0x20 [ 19.338565] [ 19.338591] Allocated by task 265: [ 19.338670] kasan_save_stack+0x3c/0x68 [ 19.338750] kasan_save_track+0x20/0x40 [ 19.338898] kasan_save_alloc_info+0x40/0x58 [ 19.338945] __kasan_kmalloc+0xd4/0xd8 [ 19.339061] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.339413] kasan_atomics+0xb8/0x2e0 [ 19.339498] kunit_try_run_case+0x170/0x3f0 [ 19.339567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.339786] kthread+0x328/0x630 [ 19.339843] ret_from_fork+0x10/0x20 [ 19.339883] [ 19.340281] The buggy address belongs to the object at fff00000c7692100 [ 19.340281] which belongs to the cache kmalloc-64 of size 64 [ 19.340378] The buggy address is located 0 bytes to the right of [ 19.340378] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.340446] [ 19.340467] The buggy address belongs to the physical page: [ 19.340500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.340720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.340774] page_type: f5(slab) [ 19.340986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.341340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.341578] page dumped because: kasan: bad access detected [ 19.341652] [ 19.341674] Memory state around the buggy address: [ 19.341709] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.341753] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.341813] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.341851] ^ [ 19.342088] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.342238] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.342492] ================================================================== [ 19.477526] ================================================================== [ 19.477575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.477624] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.477675] [ 19.477709] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.477790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.477817] Hardware name: linux,dummy-virt (DT) [ 19.477851] Call trace: [ 19.477875] show_stack+0x20/0x38 (C) [ 19.477926] dump_stack_lvl+0x8c/0xd0 [ 19.477977] print_report+0x118/0x608 [ 19.478027] kasan_report+0xdc/0x128 [ 19.478075] __asan_report_load8_noabort+0x20/0x30 [ 19.478142] kasan_atomics_helper+0x3df4/0x4858 [ 19.478193] kasan_atomics+0x198/0x2e0 [ 19.478238] kunit_try_run_case+0x170/0x3f0 [ 19.478287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.478341] kthread+0x328/0x630 [ 19.478386] ret_from_fork+0x10/0x20 [ 19.478528] [ 19.478554] Allocated by task 265: [ 19.478622] kasan_save_stack+0x3c/0x68 [ 19.478666] kasan_save_track+0x20/0x40 [ 19.478967] kasan_save_alloc_info+0x40/0x58 [ 19.479092] __kasan_kmalloc+0xd4/0xd8 [ 19.479158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.479226] kasan_atomics+0xb8/0x2e0 [ 19.479306] kunit_try_run_case+0x170/0x3f0 [ 19.479398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.479451] kthread+0x328/0x630 [ 19.479508] ret_from_fork+0x10/0x20 [ 19.479548] [ 19.479570] The buggy address belongs to the object at fff00000c7692100 [ 19.479570] which belongs to the cache kmalloc-64 of size 64 [ 19.479635] The buggy address is located 0 bytes to the right of [ 19.479635] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.479715] [ 19.479739] The buggy address belongs to the physical page: [ 19.479771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.479947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.480041] page_type: f5(slab) [ 19.480142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.480260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.480577] page dumped because: kasan: bad access detected [ 19.480705] [ 19.480782] Memory state around the buggy address: [ 19.480817] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.480863] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.481082] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.481243] ^ [ 19.481388] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.481444] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.481493] ================================================================== [ 19.445269] ================================================================== [ 19.445320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.445595] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.445714] [ 19.445749] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.445830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.445859] Hardware name: linux,dummy-virt (DT) [ 19.446039] Call trace: [ 19.446071] show_stack+0x20/0x38 (C) [ 19.446173] dump_stack_lvl+0x8c/0xd0 [ 19.446341] print_report+0x118/0x608 [ 19.446447] kasan_report+0xdc/0x128 [ 19.446494] kasan_check_range+0x100/0x1a8 [ 19.446620] __kasan_check_write+0x20/0x30 [ 19.446763] kasan_atomics_helper+0x147c/0x4858 [ 19.446867] kasan_atomics+0x198/0x2e0 [ 19.446972] kunit_try_run_case+0x170/0x3f0 [ 19.447021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.447075] kthread+0x328/0x630 [ 19.447179] ret_from_fork+0x10/0x20 [ 19.447228] [ 19.447248] Allocated by task 265: [ 19.447279] kasan_save_stack+0x3c/0x68 [ 19.447320] kasan_save_track+0x20/0x40 [ 19.447697] kasan_save_alloc_info+0x40/0x58 [ 19.448391] __kasan_kmalloc+0xd4/0xd8 [ 19.448643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.448873] kasan_atomics+0xb8/0x2e0 [ 19.448967] kunit_try_run_case+0x170/0x3f0 [ 19.449594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449780] kthread+0x328/0x630 [ 19.449823] ret_from_fork+0x10/0x20 [ 19.449862] [ 19.449895] The buggy address belongs to the object at fff00000c7692100 [ 19.449895] which belongs to the cache kmalloc-64 of size 64 [ 19.449960] The buggy address is located 0 bytes to the right of [ 19.449960] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.450108] [ 19.450140] The buggy address belongs to the physical page: [ 19.450371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.450455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.450506] page_type: f5(slab) [ 19.450549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.450601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.450666] page dumped because: kasan: bad access detected [ 19.450781] [ 19.451000] Memory state around the buggy address: [ 19.451148] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451223] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451268] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.451309] ^ [ 19.451342] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.451404] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.451442] ================================================================== [ 19.350433] ================================================================== [ 19.350692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.350742] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.350792] [ 19.350823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.350907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.350934] Hardware name: linux,dummy-virt (DT) [ 19.350968] Call trace: [ 19.351030] show_stack+0x20/0x38 (C) [ 19.351085] dump_stack_lvl+0x8c/0xd0 [ 19.351638] print_report+0x118/0x608 [ 19.351784] kasan_report+0xdc/0x128 [ 19.351831] kasan_check_range+0x100/0x1a8 [ 19.351891] __kasan_check_write+0x20/0x30 [ 19.351939] kasan_atomics_helper+0xf88/0x4858 [ 19.351987] kasan_atomics+0x198/0x2e0 [ 19.352034] kunit_try_run_case+0x170/0x3f0 [ 19.352082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.352454] kthread+0x328/0x630 [ 19.352694] ret_from_fork+0x10/0x20 [ 19.352764] [ 19.352830] Allocated by task 265: [ 19.352894] kasan_save_stack+0x3c/0x68 [ 19.352939] kasan_save_track+0x20/0x40 [ 19.352987] kasan_save_alloc_info+0x40/0x58 [ 19.353234] __kasan_kmalloc+0xd4/0xd8 [ 19.353307] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.353348] kasan_atomics+0xb8/0x2e0 [ 19.353387] kunit_try_run_case+0x170/0x3f0 [ 19.353427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.353473] kthread+0x328/0x630 [ 19.353526] ret_from_fork+0x10/0x20 [ 19.353566] [ 19.353587] The buggy address belongs to the object at fff00000c7692100 [ 19.353587] which belongs to the cache kmalloc-64 of size 64 [ 19.354139] The buggy address is located 0 bytes to the right of [ 19.354139] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.354360] [ 19.354446] The buggy address belongs to the physical page: [ 19.354490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.354596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.354795] page_type: f5(slab) [ 19.354840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.354930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.355003] page dumped because: kasan: bad access detected [ 19.355109] [ 19.355400] Memory state around the buggy address: [ 19.355605] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.355862] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.355911] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.355951] ^ [ 19.355985] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.356030] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.356071] ================================================================== [ 19.362694] ================================================================== [ 19.362744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.362800] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.363032] [ 19.366623] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.366990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.367061] Hardware name: linux,dummy-virt (DT) [ 19.367096] Call trace: [ 19.367136] show_stack+0x20/0x38 (C) [ 19.367191] dump_stack_lvl+0x8c/0xd0 [ 19.367242] print_report+0x118/0x608 [ 19.367291] kasan_report+0xdc/0x128 [ 19.370075] kasan_check_range+0x100/0x1a8 [ 19.371695] __kasan_check_write+0x20/0x30 [ 19.371752] kasan_atomics_helper+0x1058/0x4858 [ 19.371804] kasan_atomics+0x198/0x2e0 [ 19.371852] kunit_try_run_case+0x170/0x3f0 [ 19.371900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.371954] kthread+0x328/0x630 [ 19.371997] ret_from_fork+0x10/0x20 [ 19.372102] [ 19.372139] Allocated by task 265: [ 19.372172] kasan_save_stack+0x3c/0x68 [ 19.372216] kasan_save_track+0x20/0x40 [ 19.372255] kasan_save_alloc_info+0x40/0x58 [ 19.372298] __kasan_kmalloc+0xd4/0xd8 [ 19.372335] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.372378] kasan_atomics+0xb8/0x2e0 [ 19.372415] kunit_try_run_case+0x170/0x3f0 [ 19.372453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.372501] kthread+0x328/0x630 [ 19.372536] ret_from_fork+0x10/0x20 [ 19.372576] [ 19.372597] The buggy address belongs to the object at fff00000c7692100 [ 19.372597] which belongs to the cache kmalloc-64 of size 64 [ 19.372657] The buggy address is located 0 bytes to the right of [ 19.372657] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.372722] [ 19.372745] The buggy address belongs to the physical page: [ 19.372778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.372831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.372881] page_type: f5(slab) [ 19.372924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.372976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.373019] page dumped because: kasan: bad access detected [ 19.373053] [ 19.373075] Memory state around the buggy address: [ 19.373110] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.374211] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.374260] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.374301] ^ [ 19.374336] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.374380] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.374421] ================================================================== [ 19.285600] ================================================================== [ 19.285707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.285891] Read of size 4 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.286008] [ 19.286091] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.286235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.286364] Hardware name: linux,dummy-virt (DT) [ 19.286450] Call trace: [ 19.286713] show_stack+0x20/0x38 (C) [ 19.286936] dump_stack_lvl+0x8c/0xd0 [ 19.287055] print_report+0x118/0x608 [ 19.287123] kasan_report+0xdc/0x128 [ 19.287178] __asan_report_load4_noabort+0x20/0x30 [ 19.287233] kasan_atomics_helper+0x3dd8/0x4858 [ 19.287282] kasan_atomics+0x198/0x2e0 [ 19.287328] kunit_try_run_case+0x170/0x3f0 [ 19.287388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.287444] kthread+0x328/0x630 [ 19.287490] ret_from_fork+0x10/0x20 [ 19.287563] [ 19.287593] Allocated by task 265: [ 19.287625] kasan_save_stack+0x3c/0x68 [ 19.287676] kasan_save_track+0x20/0x40 [ 19.287739] kasan_save_alloc_info+0x40/0x58 [ 19.287782] __kasan_kmalloc+0xd4/0xd8 [ 19.287819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.287860] kasan_atomics+0xb8/0x2e0 [ 19.288052] kunit_try_run_case+0x170/0x3f0 [ 19.288101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.288158] kthread+0x328/0x630 [ 19.288196] ret_from_fork+0x10/0x20 [ 19.288236] [ 19.288257] The buggy address belongs to the object at fff00000c7692100 [ 19.288257] which belongs to the cache kmalloc-64 of size 64 [ 19.288496] The buggy address is located 0 bytes to the right of [ 19.288496] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.288646] [ 19.288724] The buggy address belongs to the physical page: [ 19.288820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.289146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.289345] page_type: f5(slab) [ 19.289547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.289886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.289977] page dumped because: kasan: bad access detected [ 19.290324] [ 19.290378] Memory state around the buggy address: [ 19.290414] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.290497] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.290670] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.290848] ^ [ 19.290942] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.291124] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.291268] ================================================================== [ 19.410955] ================================================================== [ 19.411012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.411062] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.411127] [ 19.411166] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.411251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.411279] Hardware name: linux,dummy-virt (DT) [ 19.411312] Call trace: [ 19.411338] show_stack+0x20/0x38 (C) [ 19.411389] dump_stack_lvl+0x8c/0xd0 [ 19.411439] print_report+0x118/0x608 [ 19.411486] kasan_report+0xdc/0x128 [ 19.411533] kasan_check_range+0x100/0x1a8 [ 19.412718] __kasan_check_write+0x20/0x30 [ 19.412966] kasan_atomics_helper+0x11f8/0x4858 [ 19.413021] kasan_atomics+0x198/0x2e0 [ 19.413076] kunit_try_run_case+0x170/0x3f0 [ 19.413484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413977] kthread+0x328/0x630 [ 19.414032] ret_from_fork+0x10/0x20 [ 19.414396] [ 19.414423] Allocated by task 265: [ 19.414457] kasan_save_stack+0x3c/0x68 [ 19.414862] kasan_save_track+0x20/0x40 [ 19.415129] kasan_save_alloc_info+0x40/0x58 [ 19.415510] __kasan_kmalloc+0xd4/0xd8 [ 19.415595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.415639] kasan_atomics+0xb8/0x2e0 [ 19.416171] kunit_try_run_case+0x170/0x3f0 [ 19.416227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.416442] kthread+0x328/0x630 [ 19.416489] ret_from_fork+0x10/0x20 [ 19.416527] [ 19.416551] The buggy address belongs to the object at fff00000c7692100 [ 19.416551] which belongs to the cache kmalloc-64 of size 64 [ 19.417078] The buggy address is located 0 bytes to the right of [ 19.417078] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.417369] [ 19.417829] The buggy address belongs to the physical page: [ 19.417875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.418525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.418594] page_type: f5(slab) [ 19.418638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.418692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.419558] page dumped because: kasan: bad access detected [ 19.419694] [ 19.419903] Memory state around the buggy address: [ 19.419958] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420149] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420201] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.420514] ^ [ 19.420733] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420784] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420895] ================================================================== [ 19.465107] ================================================================== [ 19.465171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.465543] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.465601] [ 19.465639] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.465793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.465898] Hardware name: linux,dummy-virt (DT) [ 19.465949] Call trace: [ 19.465990] show_stack+0x20/0x38 (C) [ 19.466042] dump_stack_lvl+0x8c/0xd0 [ 19.466155] print_report+0x118/0x608 [ 19.466261] kasan_report+0xdc/0x128 [ 19.466310] __asan_report_load8_noabort+0x20/0x30 [ 19.466381] kasan_atomics_helper+0x3db0/0x4858 [ 19.466464] kasan_atomics+0x198/0x2e0 [ 19.466513] kunit_try_run_case+0x170/0x3f0 [ 19.466562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.466617] kthread+0x328/0x630 [ 19.466887] ret_from_fork+0x10/0x20 [ 19.467064] [ 19.467087] Allocated by task 265: [ 19.467151] kasan_save_stack+0x3c/0x68 [ 19.467212] kasan_save_track+0x20/0x40 [ 19.467261] kasan_save_alloc_info+0x40/0x58 [ 19.467572] __kasan_kmalloc+0xd4/0xd8 [ 19.467697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.467804] kasan_atomics+0xb8/0x2e0 [ 19.468014] kunit_try_run_case+0x170/0x3f0 [ 19.468134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.468178] kthread+0x328/0x630 [ 19.468238] ret_from_fork+0x10/0x20 [ 19.468276] [ 19.468299] The buggy address belongs to the object at fff00000c7692100 [ 19.468299] which belongs to the cache kmalloc-64 of size 64 [ 19.468731] The buggy address is located 0 bytes to the right of [ 19.468731] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.468948] [ 19.468984] The buggy address belongs to the physical page: [ 19.469034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.469101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.469166] page_type: f5(slab) [ 19.469215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.469279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.469342] page dumped because: kasan: bad access detected [ 19.469382] [ 19.469413] Memory state around the buggy address: [ 19.469456] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.469518] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.469563] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.469605] ^ [ 19.469641] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.469683] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.469739] ================================================================== [ 19.223062] ================================================================== [ 19.223179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.223234] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.223286] [ 19.223328] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.223415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.223444] Hardware name: linux,dummy-virt (DT) [ 19.223515] Call trace: [ 19.223684] show_stack+0x20/0x38 (C) [ 19.223737] dump_stack_lvl+0x8c/0xd0 [ 19.223989] print_report+0x118/0x608 [ 19.224106] kasan_report+0xdc/0x128 [ 19.224237] kasan_check_range+0x100/0x1a8 [ 19.224287] __kasan_check_write+0x20/0x30 [ 19.224355] kasan_atomics_helper+0x99c/0x4858 [ 19.224406] kasan_atomics+0x198/0x2e0 [ 19.224653] kunit_try_run_case+0x170/0x3f0 [ 19.224831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.225085] kthread+0x328/0x630 [ 19.225215] ret_from_fork+0x10/0x20 [ 19.225293] [ 19.225314] Allocated by task 265: [ 19.225568] kasan_save_stack+0x3c/0x68 [ 19.225665] kasan_save_track+0x20/0x40 [ 19.225787] kasan_save_alloc_info+0x40/0x58 [ 19.225921] __kasan_kmalloc+0xd4/0xd8 [ 19.225974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.226014] kasan_atomics+0xb8/0x2e0 [ 19.226058] kunit_try_run_case+0x170/0x3f0 [ 19.226097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.226166] kthread+0x328/0x630 [ 19.226201] ret_from_fork+0x10/0x20 [ 19.226238] [ 19.226270] The buggy address belongs to the object at fff00000c7692100 [ 19.226270] which belongs to the cache kmalloc-64 of size 64 [ 19.226335] The buggy address is located 0 bytes to the right of [ 19.226335] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.226417] [ 19.226448] The buggy address belongs to the physical page: [ 19.226643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.226786] [ 19.226947] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.227420] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.228785] __kasan_check_write+0x20/0x30 [ 19.230021] [ 19.230110] Allocated by task 265: [ 19.230172] kasan_save_stack+0x3c/0x68 [ 19.230462] kasan_save_track+0x20/0x40 [ 19.230614] kasan_save_alloc_info+0x40/0x58 [ 19.230735] __kasan_kmalloc+0xd4/0xd8 [ 19.230916] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.230979] kasan_atomics+0xb8/0x2e0 [ 19.231019] kunit_try_run_case+0x170/0x3f0 [ 19.231309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.231408] kthread+0x328/0x630 [ 19.231576] ret_from_fork+0x10/0x20 [ 19.231695] [ 19.231716] The buggy address belongs to the object at fff00000c7692100 [ 19.231716] which belongs to the cache kmalloc-64 of size 64 [ 19.231953] The buggy address is located 0 bytes to the right of [ 19.231953] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.232269] [ 19.232326] The buggy address belongs to the physical page: [ 19.232472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.232546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.232595] page_type: f5(slab) [ 19.232657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.232925] page dumped because: kasan: bad access detected [ 19.234871] ================================================================== [ 19.377836] ================================================================== [ 19.377945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.378000] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.378049] [ 19.378088] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.378343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.378765] Hardware name: linux,dummy-virt (DT) [ 19.378799] Call trace: [ 19.379262] show_stack+0x20/0x38 (C) [ 19.379431] dump_stack_lvl+0x8c/0xd0 [ 19.379485] print_report+0x118/0x608 [ 19.379532] kasan_report+0xdc/0x128 [ 19.379778] kasan_check_range+0x100/0x1a8 [ 19.379858] __kasan_check_write+0x20/0x30 [ 19.379929] kasan_atomics_helper+0x10c0/0x4858 [ 19.379980] kasan_atomics+0x198/0x2e0 [ 19.380412] kunit_try_run_case+0x170/0x3f0 [ 19.380835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.380962] kthread+0x328/0x630 [ 19.381005] ret_from_fork+0x10/0x20 [ 19.381057] [ 19.381688] Allocated by task 265: [ 19.381801] kasan_save_stack+0x3c/0x68 [ 19.382147] kasan_save_track+0x20/0x40 [ 19.382196] kasan_save_alloc_info+0x40/0x58 [ 19.382240] __kasan_kmalloc+0xd4/0xd8 [ 19.382278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.382328] kasan_atomics+0xb8/0x2e0 [ 19.382815] kunit_try_run_case+0x170/0x3f0 [ 19.382974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.383428] kthread+0x328/0x630 [ 19.383498] ret_from_fork+0x10/0x20 [ 19.383810] [ 19.383837] The buggy address belongs to the object at fff00000c7692100 [ 19.383837] which belongs to the cache kmalloc-64 of size 64 [ 19.383941] The buggy address is located 0 bytes to the right of [ 19.383941] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.384028] [ 19.384413] The buggy address belongs to the physical page: [ 19.384453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.384509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.384561] page_type: f5(slab) [ 19.384605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.384986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.385050] page dumped because: kasan: bad access detected [ 19.385188] [ 19.385281] Memory state around the buggy address: [ 19.385473] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.385542] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.385657] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.385698] ^ [ 19.386080] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.386183] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.386228] ================================================================== [ 19.208811] ================================================================== [ 19.208855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.209028] Read of size 4 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.209220] [ 19.209255] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.209405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.209454] Hardware name: linux,dummy-virt (DT) [ 19.209488] Call trace: [ 19.209556] show_stack+0x20/0x38 (C) [ 19.209653] dump_stack_lvl+0x8c/0xd0 [ 19.209740] print_report+0x118/0x608 [ 19.209791] kasan_report+0xdc/0x128 [ 19.209906] __asan_report_load4_noabort+0x20/0x30 [ 19.209989] kasan_atomics_helper+0x42d8/0x4858 [ 19.210039] kasan_atomics+0x198/0x2e0 [ 19.210092] kunit_try_run_case+0x170/0x3f0 [ 19.210433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.210551] kthread+0x328/0x630 [ 19.210677] ret_from_fork+0x10/0x20 [ 19.210755] [ 19.210802] Allocated by task 265: [ 19.210835] kasan_save_stack+0x3c/0x68 [ 19.210879] kasan_save_track+0x20/0x40 [ 19.210971] kasan_save_alloc_info+0x40/0x58 [ 19.211065] __kasan_kmalloc+0xd4/0xd8 [ 19.211107] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.211218] kasan_atomics+0xb8/0x2e0 [ 19.211260] kunit_try_run_case+0x170/0x3f0 [ 19.211306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.211380] kthread+0x328/0x630 [ 19.211700] ret_from_fork+0x10/0x20 [ 19.211861] [ 19.212203] The buggy address is located 0 bytes to the right of [ 19.212203] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.212660] page_type: f5(slab) [ 19.214331] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.216052] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.216889] dump_stack_lvl+0x8c/0xd0 [ 19.216939] print_report+0x118/0x608 [ 19.217179] kasan_report+0xdc/0x128 [ 19.217284] kasan_check_range+0x100/0x1a8 [ 19.217334] __kasan_check_write+0x20/0x30 [ 19.217603] kasan_atomics_helper+0x934/0x4858 [ 19.217745] kasan_atomics+0x198/0x2e0 [ 19.217887] kunit_try_run_case+0x170/0x3f0 [ 19.218085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.218264] kthread+0x328/0x630 [ 19.218394] ret_from_fork+0x10/0x20 [ 19.218690] [ 19.218785] Allocated by task 265: [ 19.218821] kasan_save_stack+0x3c/0x68 [ 19.219138] kasan_save_track+0x20/0x40 [ 19.219274] kasan_save_alloc_info+0x40/0x58 [ 19.219421] __kasan_kmalloc+0xd4/0xd8 [ 19.219554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.219617] kasan_atomics+0xb8/0x2e0 [ 19.219695] kunit_try_run_case+0x170/0x3f0 [ 19.220078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.220192] kthread+0x328/0x630 [ 19.220351] ret_from_fork+0x10/0x20 [ 19.220410] [ 19.220432] The buggy address belongs to the object at fff00000c7692100 [ 19.220432] which belongs to the cache kmalloc-64 of size 64 [ 19.220525] The buggy address is located 0 bytes to the right of [ 19.220525] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.220805] [ 19.220883] The buggy address belongs to the physical page: [ 19.221012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.221086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.221360] page_type: f5(slab) [ 19.221461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.221633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.221789] page dumped because: kasan: bad access detected [ 19.221842] [ 19.221863] Memory state around the buggy address: [ 19.221929] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.221976] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.222021] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.222062] ^ [ 19.222099] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.222165] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.222205] ================================================================== [ 19.422671] ================================================================== [ 19.422727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.422777] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.422828] [ 19.422865] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.423761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.423971] Hardware name: linux,dummy-virt (DT) [ 19.424007] Call trace: [ 19.424034] show_stack+0x20/0x38 (C) [ 19.424089] dump_stack_lvl+0x8c/0xd0 [ 19.424156] print_report+0x118/0x608 [ 19.424203] kasan_report+0xdc/0x128 [ 19.424251] kasan_check_range+0x100/0x1a8 [ 19.424299] __kasan_check_write+0x20/0x30 [ 19.424346] kasan_atomics_helper+0x126c/0x4858 [ 19.424394] kasan_atomics+0x198/0x2e0 [ 19.424441] kunit_try_run_case+0x170/0x3f0 [ 19.424490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.424544] kthread+0x328/0x630 [ 19.424586] ret_from_fork+0x10/0x20 [ 19.424635] [ 19.424656] Allocated by task 265: [ 19.424685] kasan_save_stack+0x3c/0x68 [ 19.424729] kasan_save_track+0x20/0x40 [ 19.424767] kasan_save_alloc_info+0x40/0x58 [ 19.424809] __kasan_kmalloc+0xd4/0xd8 [ 19.424847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.424889] kasan_atomics+0xb8/0x2e0 [ 19.424926] kunit_try_run_case+0x170/0x3f0 [ 19.424966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.425010] kthread+0x328/0x630 [ 19.425045] ret_from_fork+0x10/0x20 [ 19.425082] [ 19.425104] The buggy address belongs to the object at fff00000c7692100 [ 19.425104] which belongs to the cache kmalloc-64 of size 64 [ 19.425172] The buggy address is located 0 bytes to the right of [ 19.425172] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.425238] [ 19.425261] The buggy address belongs to the physical page: [ 19.425293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.425347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.425395] page_type: f5(slab) [ 19.425434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.425487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.425534] page dumped because: kasan: bad access detected [ 19.425567] [ 19.425588] Memory state around the buggy address: [ 19.425622] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.425667] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.425711] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.425752] ^ [ 19.425787] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.425830] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.425869] ================================================================== [ 19.397135] ================================================================== [ 19.397190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.397239] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.399049] [ 19.399104] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.400071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.400190] Hardware name: linux,dummy-virt (DT) [ 19.400255] Call trace: [ 19.400281] show_stack+0x20/0x38 (C) [ 19.400701] dump_stack_lvl+0x8c/0xd0 [ 19.400800] print_report+0x118/0x608 [ 19.401039] kasan_report+0xdc/0x128 [ 19.401089] kasan_check_range+0x100/0x1a8 [ 19.401565] __kasan_check_write+0x20/0x30 [ 19.401690] kasan_atomics_helper+0x1190/0x4858 [ 19.402016] kasan_atomics+0x198/0x2e0 [ 19.402067] kunit_try_run_case+0x170/0x3f0 [ 19.402129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402185] kthread+0x328/0x630 [ 19.402982] ret_from_fork+0x10/0x20 [ 19.403187] [ 19.403593] Allocated by task 265: [ 19.403663] kasan_save_stack+0x3c/0x68 [ 19.403893] kasan_save_track+0x20/0x40 [ 19.403946] kasan_save_alloc_info+0x40/0x58 [ 19.403988] __kasan_kmalloc+0xd4/0xd8 [ 19.404036] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.404078] kasan_atomics+0xb8/0x2e0 [ 19.404125] kunit_try_run_case+0x170/0x3f0 [ 19.404767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.404828] kthread+0x328/0x630 [ 19.405080] ret_from_fork+0x10/0x20 [ 19.405494] [ 19.405529] The buggy address belongs to the object at fff00000c7692100 [ 19.405529] which belongs to the cache kmalloc-64 of size 64 [ 19.405942] The buggy address is located 0 bytes to the right of [ 19.405942] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.406241] [ 19.406562] The buggy address belongs to the physical page: [ 19.406666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.406737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.406789] page_type: f5(slab) [ 19.406829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.407675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.407738] page dumped because: kasan: bad access detected [ 19.407806] [ 19.407827] Memory state around the buggy address: [ 19.408041] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.408176] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.408239] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.408282] ^ [ 19.408409] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408596] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408862] ================================================================== [ 19.430129] ================================================================== [ 19.430184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.430833] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.430896] [ 19.430930] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.431013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.431040] Hardware name: linux,dummy-virt (DT) [ 19.431072] Call trace: [ 19.431097] show_stack+0x20/0x38 (C) [ 19.431160] dump_stack_lvl+0x8c/0xd0 [ 19.431209] print_report+0x118/0x608 [ 19.431256] kasan_report+0xdc/0x128 [ 19.431481] kasan_check_range+0x100/0x1a8 [ 19.431556] __kasan_check_write+0x20/0x30 [ 19.431621] kasan_atomics_helper+0x1384/0x4858 [ 19.431815] kasan_atomics+0x198/0x2e0 [ 19.432003] kunit_try_run_case+0x170/0x3f0 [ 19.432179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.432419] kthread+0x328/0x630 [ 19.432506] ret_from_fork+0x10/0x20 [ 19.432649] [ 19.432681] Allocated by task 265: [ 19.432750] kasan_save_stack+0x3c/0x68 [ 19.432814] kasan_save_track+0x20/0x40 [ 19.432853] kasan_save_alloc_info+0x40/0x58 [ 19.433068] __kasan_kmalloc+0xd4/0xd8 [ 19.433109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.433166] kasan_atomics+0xb8/0x2e0 [ 19.433203] kunit_try_run_case+0x170/0x3f0 [ 19.433469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.433561] kthread+0x328/0x630 [ 19.433617] ret_from_fork+0x10/0x20 [ 19.433655] [ 19.433756] The buggy address belongs to the object at fff00000c7692100 [ 19.433756] which belongs to the cache kmalloc-64 of size 64 [ 19.433853] The buggy address is located 0 bytes to the right of [ 19.433853] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.433918] [ 19.433940] The buggy address belongs to the physical page: [ 19.434050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.434110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.434171] page_type: f5(slab) [ 19.434512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.435961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.436005] page dumped because: kasan: bad access detected [ 19.436039] [ 19.436061] Memory state around the buggy address: [ 19.436096] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.436153] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.436199] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.436239] ^ [ 19.436273] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.436317] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.436355] ================================================================== [ 19.481900] ================================================================== [ 19.481970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.482036] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.482335] [ 19.482394] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.482480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.482588] Hardware name: linux,dummy-virt (DT) [ 19.482623] Call trace: [ 19.482739] show_stack+0x20/0x38 (C) [ 19.482825] dump_stack_lvl+0x8c/0xd0 [ 19.482876] print_report+0x118/0x608 [ 19.482934] kasan_report+0xdc/0x128 [ 19.482981] kasan_check_range+0x100/0x1a8 [ 19.483031] __kasan_check_write+0x20/0x30 [ 19.483076] kasan_atomics_helper+0x16d0/0x4858 [ 19.483135] kasan_atomics+0x198/0x2e0 [ 19.483181] kunit_try_run_case+0x170/0x3f0 [ 19.483231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.483402] kthread+0x328/0x630 [ 19.483479] ret_from_fork+0x10/0x20 [ 19.483589] [ 19.483656] Allocated by task 265: [ 19.483733] kasan_save_stack+0x3c/0x68 [ 19.483777] kasan_save_track+0x20/0x40 [ 19.483818] kasan_save_alloc_info+0x40/0x58 [ 19.484089] __kasan_kmalloc+0xd4/0xd8 [ 19.484295] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.484469] kasan_atomics+0xb8/0x2e0 [ 19.484611] kunit_try_run_case+0x170/0x3f0 [ 19.484704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.484803] kthread+0x328/0x630 [ 19.484856] ret_from_fork+0x10/0x20 [ 19.484895] [ 19.484916] The buggy address belongs to the object at fff00000c7692100 [ 19.484916] which belongs to the cache kmalloc-64 of size 64 [ 19.484978] The buggy address is located 0 bytes to the right of [ 19.484978] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.485377] [ 19.485559] The buggy address belongs to the physical page: [ 19.485729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.486215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.486278] page_type: f5(slab) [ 19.486319] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.486706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.486757] page dumped because: kasan: bad access detected [ 19.486792] [ 19.486818] Memory state around the buggy address: [ 19.486862] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.486923] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.486968] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.487010] ^ [ 19.487046] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.487098] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.487147] ================================================================== [ 19.487936] ================================================================== [ 19.487989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.488426] Read of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.488509] [ 19.488580] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.488866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.488975] Hardware name: linux,dummy-virt (DT) [ 19.489068] Call trace: [ 19.489156] show_stack+0x20/0x38 (C) [ 19.489262] dump_stack_lvl+0x8c/0xd0 [ 19.489315] print_report+0x118/0x608 [ 19.489371] kasan_report+0xdc/0x128 [ 19.489445] __asan_report_load8_noabort+0x20/0x30 [ 19.489564] kasan_atomics_helper+0x3e10/0x4858 [ 19.489615] kasan_atomics+0x198/0x2e0 [ 19.489687] kunit_try_run_case+0x170/0x3f0 [ 19.489738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490173] kthread+0x328/0x630 [ 19.490248] ret_from_fork+0x10/0x20 [ 19.490405] [ 19.490451] Allocated by task 265: [ 19.490667] kasan_save_stack+0x3c/0x68 [ 19.490722] kasan_save_track+0x20/0x40 [ 19.490809] kasan_save_alloc_info+0x40/0x58 [ 19.490853] __kasan_kmalloc+0xd4/0xd8 [ 19.490964] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.491007] kasan_atomics+0xb8/0x2e0 [ 19.491044] kunit_try_run_case+0x170/0x3f0 [ 19.491090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.491204] kthread+0x328/0x630 [ 19.491239] ret_from_fork+0x10/0x20 [ 19.491276] [ 19.491332] The buggy address belongs to the object at fff00000c7692100 [ 19.491332] which belongs to the cache kmalloc-64 of size 64 [ 19.491395] The buggy address is located 0 bytes to the right of [ 19.491395] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.491738] [ 19.491811] The buggy address belongs to the physical page: [ 19.491854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.491945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.492273] page_type: f5(slab) [ 19.492368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.492432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.492477] page dumped because: kasan: bad access detected [ 19.492511] [ 19.492530] Memory state around the buggy address: [ 19.492563] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.492609] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.492654] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.492694] ^ [ 19.492730] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.492776] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.492815] ================================================================== [ 19.199531] ================================================================== [ 19.199940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 19.200015] Write of size 4 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.200068] [ 19.200102] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.200203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.200232] Hardware name: linux,dummy-virt (DT) [ 19.200265] Call trace: [ 19.200291] show_stack+0x20/0x38 (C) [ 19.200572] dump_stack_lvl+0x8c/0xd0 [ 19.200784] print_report+0x118/0x608 [ 19.200846] kasan_report+0xdc/0x128 [ 19.200971] kasan_check_range+0x100/0x1a8 [ 19.201091] __kasan_check_write+0x20/0x30 [ 19.201173] kasan_atomics_helper+0x7cc/0x4858 [ 19.201263] kasan_atomics+0x198/0x2e0 [ 19.201408] kunit_try_run_case+0x170/0x3f0 [ 19.201458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.201752] kthread+0x328/0x630 [ 19.201817] ret_from_fork+0x10/0x20 [ 19.201867] [ 19.201889] Allocated by task 265: [ 19.202288] kasan_save_alloc_info+0x40/0x58 [ 19.202988] [ 19.203011] The buggy address belongs to the physical page: [ 19.203204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.203422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.204068] Memory state around the buggy address: [ 19.204226] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.205309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 19.206184] kunit_try_run_case+0x170/0x3f0 [ 19.206497] kasan_save_track+0x20/0x40 [ 19.207004] [ 19.207027] The buggy address belongs to the physical page: [ 19.207058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.207405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.207458] page_type: f5(slab) [ 19.207497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.207578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.207781] page dumped because: kasan: bad access detected [ 19.207818] [ 19.207838] Memory state around the buggy address: [ 19.207872] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.207917] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.208084] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.208352] ^ [ 19.208388] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.208456] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.208608] ================================================================== [ 19.494072] ================================================================== [ 19.494361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.494424] Write of size 8 at addr fff00000c7692130 by task kunit_try_catch/265 [ 19.494475] [ 19.494507] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.494591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.494621] Hardware name: linux,dummy-virt (DT) [ 19.494652] Call trace: [ 19.494690] show_stack+0x20/0x38 (C) [ 19.494741] dump_stack_lvl+0x8c/0xd0 [ 19.494790] print_report+0x118/0x608 [ 19.494838] kasan_report+0xdc/0x128 [ 19.494885] kasan_check_range+0x100/0x1a8 [ 19.494934] __kasan_check_write+0x20/0x30 [ 19.494987] kasan_atomics_helper+0x175c/0x4858 [ 19.495148] kasan_atomics+0x198/0x2e0 [ 19.495196] kunit_try_run_case+0x170/0x3f0 [ 19.495824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.496276] kthread+0x328/0x630 [ 19.496335] ret_from_fork+0x10/0x20 [ 19.496387] [ 19.496407] Allocated by task 265: [ 19.496438] kasan_save_stack+0x3c/0x68 [ 19.496483] kasan_save_track+0x20/0x40 [ 19.496522] kasan_save_alloc_info+0x40/0x58 [ 19.496564] __kasan_kmalloc+0xd4/0xd8 [ 19.496601] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.496643] kasan_atomics+0xb8/0x2e0 [ 19.496680] kunit_try_run_case+0x170/0x3f0 [ 19.496722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.496770] kthread+0x328/0x630 [ 19.496804] ret_from_fork+0x10/0x20 [ 19.496841] [ 19.496876] The buggy address belongs to the object at fff00000c7692100 [ 19.496876] which belongs to the cache kmalloc-64 of size 64 [ 19.496937] The buggy address is located 0 bytes to the right of [ 19.496937] allocated 48-byte region [fff00000c7692100, fff00000c7692130) [ 19.497720] [ 19.497746] The buggy address belongs to the physical page: [ 19.497789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107692 [ 19.498313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.498756] page_type: f5(slab) [ 19.498812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.498865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.499379] page dumped because: kasan: bad access detected [ 19.499472] [ 19.499492] Memory state around the buggy address: [ 19.499562] fff00000c7692000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499609] fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499706] >fff00000c7692100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.500068] ^ [ 19.500111] fff00000c7692180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.500900] fff00000c7692200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.500995] ==================================================================
[ 15.340379] ================================================================== [ 15.340778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.341220] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.341487] [ 15.341653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.341696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.341720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.341740] Call Trace: [ 15.341755] <TASK> [ 15.341771] dump_stack_lvl+0x73/0xb0 [ 15.341800] print_report+0xd1/0x650 [ 15.341857] ? __virt_addr_valid+0x1db/0x2d0 [ 15.341881] ? kasan_atomics_helper+0x992/0x5450 [ 15.341904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.341939] ? kasan_atomics_helper+0x992/0x5450 [ 15.341962] kasan_report+0x141/0x180 [ 15.341985] ? kasan_atomics_helper+0x992/0x5450 [ 15.342012] kasan_check_range+0x10c/0x1c0 [ 15.342037] __kasan_check_write+0x18/0x20 [ 15.342058] kasan_atomics_helper+0x992/0x5450 [ 15.342082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.342171] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.342198] ? kasan_atomics+0x152/0x310 [ 15.342261] kasan_atomics+0x1dc/0x310 [ 15.342308] ? __pfx_kasan_atomics+0x10/0x10 [ 15.342332] ? trace_hardirqs_on+0x37/0xe0 [ 15.342356] ? __pfx_read_tsc+0x10/0x10 [ 15.342377] ? ktime_get_ts64+0x86/0x230 [ 15.342402] kunit_try_run_case+0x1a5/0x480 [ 15.342427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342454] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.342481] ? __kthread_parkme+0x82/0x180 [ 15.342503] ? preempt_count_sub+0x50/0x80 [ 15.342528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.342580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.342607] kthread+0x337/0x6f0 [ 15.342627] ? trace_preempt_on+0x20/0xc0 [ 15.342651] ? __pfx_kthread+0x10/0x10 [ 15.342673] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.342695] ? calculate_sigpending+0x7b/0xa0 [ 15.342730] ? __pfx_kthread+0x10/0x10 [ 15.342752] ret_from_fork+0x116/0x1d0 [ 15.342772] ? __pfx_kthread+0x10/0x10 [ 15.342794] ret_from_fork_asm+0x1a/0x30 [ 15.342827] </TASK> [ 15.342837] [ 15.351639] Allocated by task 282: [ 15.351826] kasan_save_stack+0x45/0x70 [ 15.352032] kasan_save_track+0x18/0x40 [ 15.352218] kasan_save_alloc_info+0x3b/0x50 [ 15.352591] __kasan_kmalloc+0xb7/0xc0 [ 15.352741] __kmalloc_cache_noprof+0x189/0x420 [ 15.352990] kasan_atomics+0x95/0x310 [ 15.353424] kunit_try_run_case+0x1a5/0x480 [ 15.353587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.353800] kthread+0x337/0x6f0 [ 15.354010] ret_from_fork+0x116/0x1d0 [ 15.354385] ret_from_fork_asm+0x1a/0x30 [ 15.354649] [ 15.354757] The buggy address belongs to the object at ffff8881038e3c00 [ 15.354757] which belongs to the cache kmalloc-64 of size 64 [ 15.355394] The buggy address is located 0 bytes to the right of [ 15.355394] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.355886] [ 15.355986] The buggy address belongs to the physical page: [ 15.356465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.356743] flags: 0x200000000000000(node=0|zone=2) [ 15.357029] page_type: f5(slab) [ 15.357198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.357648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.357978] page dumped because: kasan: bad access detected [ 15.358286] [ 15.358385] Memory state around the buggy address: [ 15.358657] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358985] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359328] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.359793] ^ [ 15.360000] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360376] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360649] ================================================================== [ 15.629640] ================================================================== [ 15.630312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.631102] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.631654] [ 15.632048] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.632097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.632110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.632132] Call Trace: [ 15.632150] <TASK> [ 15.632168] dump_stack_lvl+0x73/0xb0 [ 15.632200] print_report+0xd1/0x650 [ 15.632223] ? __virt_addr_valid+0x1db/0x2d0 [ 15.632248] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.632272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.632296] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.632325] kasan_report+0x141/0x180 [ 15.632347] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.632375] __asan_report_load4_noabort+0x18/0x20 [ 15.632401] kasan_atomics_helper+0x4a36/0x5450 [ 15.632425] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.632449] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.632476] ? kasan_atomics+0x152/0x310 [ 15.632504] kasan_atomics+0x1dc/0x310 [ 15.632527] ? __pfx_kasan_atomics+0x10/0x10 [ 15.632551] ? trace_hardirqs_on+0x37/0xe0 [ 15.632576] ? __pfx_read_tsc+0x10/0x10 [ 15.632598] ? ktime_get_ts64+0x86/0x230 [ 15.632624] kunit_try_run_case+0x1a5/0x480 [ 15.632650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.632676] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.632717] ? __kthread_parkme+0x82/0x180 [ 15.632748] ? preempt_count_sub+0x50/0x80 [ 15.632774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.632824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.632851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.632878] kthread+0x337/0x6f0 [ 15.632898] ? trace_preempt_on+0x20/0xc0 [ 15.632921] ? __pfx_kthread+0x10/0x10 [ 15.632943] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.632965] ? calculate_sigpending+0x7b/0xa0 [ 15.632990] ? __pfx_kthread+0x10/0x10 [ 15.633013] ret_from_fork+0x116/0x1d0 [ 15.633040] ? __pfx_kthread+0x10/0x10 [ 15.633073] ret_from_fork_asm+0x1a/0x30 [ 15.633106] </TASK> [ 15.633117] [ 15.647101] Allocated by task 282: [ 15.647379] kasan_save_stack+0x45/0x70 [ 15.647772] kasan_save_track+0x18/0x40 [ 15.648071] kasan_save_alloc_info+0x3b/0x50 [ 15.648293] __kasan_kmalloc+0xb7/0xc0 [ 15.648479] __kmalloc_cache_noprof+0x189/0x420 [ 15.648637] kasan_atomics+0x95/0x310 [ 15.648783] kunit_try_run_case+0x1a5/0x480 [ 15.648931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.649126] kthread+0x337/0x6f0 [ 15.649248] ret_from_fork+0x116/0x1d0 [ 15.649390] ret_from_fork_asm+0x1a/0x30 [ 15.649584] [ 15.649687] The buggy address belongs to the object at ffff8881038e3c00 [ 15.649687] which belongs to the cache kmalloc-64 of size 64 [ 15.650804] The buggy address is located 0 bytes to the right of [ 15.650804] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.651401] [ 15.651476] The buggy address belongs to the physical page: [ 15.651650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.652212] flags: 0x200000000000000(node=0|zone=2) [ 15.652714] page_type: f5(slab) [ 15.653074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.654020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.654796] page dumped because: kasan: bad access detected [ 15.655345] [ 15.655504] Memory state around the buggy address: [ 15.656024] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.656734] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.657182] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.657399] ^ [ 15.657553] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.657790] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.658134] ================================================================== [ 15.600110] ================================================================== [ 15.600639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.601042] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.601670] [ 15.601783] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.601828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.601840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.601868] Call Trace: [ 15.601884] <TASK> [ 15.601899] dump_stack_lvl+0x73/0xb0 [ 15.601928] print_report+0xd1/0x650 [ 15.601951] ? __virt_addr_valid+0x1db/0x2d0 [ 15.601975] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.601997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.602022] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.602073] kasan_report+0x141/0x180 [ 15.602106] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.602133] kasan_check_range+0x10c/0x1c0 [ 15.602158] __kasan_check_write+0x18/0x20 [ 15.602179] kasan_atomics_helper+0xfa9/0x5450 [ 15.602213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.602238] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.602264] ? kasan_atomics+0x152/0x310 [ 15.602292] kasan_atomics+0x1dc/0x310 [ 15.602315] ? __pfx_kasan_atomics+0x10/0x10 [ 15.602339] ? trace_hardirqs_on+0x37/0xe0 [ 15.602364] ? __pfx_read_tsc+0x10/0x10 [ 15.602385] ? ktime_get_ts64+0x86/0x230 [ 15.602410] kunit_try_run_case+0x1a5/0x480 [ 15.602435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.602461] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.602488] ? __kthread_parkme+0x82/0x180 [ 15.602509] ? preempt_count_sub+0x50/0x80 [ 15.602533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.602559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.602585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.602611] kthread+0x337/0x6f0 [ 15.602632] ? trace_preempt_on+0x20/0xc0 [ 15.602655] ? __pfx_kthread+0x10/0x10 [ 15.602677] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.602699] ? calculate_sigpending+0x7b/0xa0 [ 15.602735] ? __pfx_kthread+0x10/0x10 [ 15.602758] ret_from_fork+0x116/0x1d0 [ 15.602778] ? __pfx_kthread+0x10/0x10 [ 15.602800] ret_from_fork_asm+0x1a/0x30 [ 15.602832] </TASK> [ 15.602843] [ 15.615477] Allocated by task 282: [ 15.615811] kasan_save_stack+0x45/0x70 [ 15.616185] kasan_save_track+0x18/0x40 [ 15.616691] kasan_save_alloc_info+0x3b/0x50 [ 15.616933] __kasan_kmalloc+0xb7/0xc0 [ 15.617200] __kmalloc_cache_noprof+0x189/0x420 [ 15.617635] kasan_atomics+0x95/0x310 [ 15.617991] kunit_try_run_case+0x1a5/0x480 [ 15.618354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.618542] kthread+0x337/0x6f0 [ 15.618665] ret_from_fork+0x116/0x1d0 [ 15.618815] ret_from_fork_asm+0x1a/0x30 [ 15.618958] [ 15.619088] The buggy address belongs to the object at ffff8881038e3c00 [ 15.619088] which belongs to the cache kmalloc-64 of size 64 [ 15.620287] The buggy address is located 0 bytes to the right of [ 15.620287] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.621461] [ 15.621693] The buggy address belongs to the physical page: [ 15.622267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.623173] flags: 0x200000000000000(node=0|zone=2) [ 15.623606] page_type: f5(slab) [ 15.623921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.624529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.624963] page dumped because: kasan: bad access detected [ 15.625468] [ 15.625640] Memory state around the buggy address: [ 15.626201] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.626503] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.626735] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.626948] ^ [ 15.627437] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.628113] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.628789] ================================================================== [ 15.795105] ================================================================== [ 15.795757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.796169] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.796557] [ 15.796674] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.796726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.796739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.796760] Call Trace: [ 15.796774] <TASK> [ 15.796790] dump_stack_lvl+0x73/0xb0 [ 15.796821] print_report+0xd1/0x650 [ 15.796843] ? __virt_addr_valid+0x1db/0x2d0 [ 15.796866] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.796889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.796913] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.796936] kasan_report+0x141/0x180 [ 15.796958] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.796988] kasan_check_range+0x10c/0x1c0 [ 15.797015] __kasan_check_write+0x18/0x20 [ 15.797035] kasan_atomics_helper+0x12e6/0x5450 [ 15.797282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.797307] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.797334] ? kasan_atomics+0x152/0x310 [ 15.797361] kasan_atomics+0x1dc/0x310 [ 15.797385] ? __pfx_kasan_atomics+0x10/0x10 [ 15.797408] ? trace_hardirqs_on+0x37/0xe0 [ 15.797433] ? __pfx_read_tsc+0x10/0x10 [ 15.797454] ? ktime_get_ts64+0x86/0x230 [ 15.797479] kunit_try_run_case+0x1a5/0x480 [ 15.797504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.797530] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.797557] ? __kthread_parkme+0x82/0x180 [ 15.797579] ? preempt_count_sub+0x50/0x80 [ 15.797605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.797631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.797657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.797684] kthread+0x337/0x6f0 [ 15.797715] ? trace_preempt_on+0x20/0xc0 [ 15.797739] ? __pfx_kthread+0x10/0x10 [ 15.797760] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.797783] ? calculate_sigpending+0x7b/0xa0 [ 15.797808] ? __pfx_kthread+0x10/0x10 [ 15.797831] ret_from_fork+0x116/0x1d0 [ 15.797850] ? __pfx_kthread+0x10/0x10 [ 15.797872] ret_from_fork_asm+0x1a/0x30 [ 15.797904] </TASK> [ 15.797915] [ 15.808426] Allocated by task 282: [ 15.808592] kasan_save_stack+0x45/0x70 [ 15.808933] kasan_save_track+0x18/0x40 [ 15.809257] kasan_save_alloc_info+0x3b/0x50 [ 15.809557] __kasan_kmalloc+0xb7/0xc0 [ 15.809845] __kmalloc_cache_noprof+0x189/0x420 [ 15.810193] kasan_atomics+0x95/0x310 [ 15.810391] kunit_try_run_case+0x1a5/0x480 [ 15.810590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.810849] kthread+0x337/0x6f0 [ 15.811011] ret_from_fork+0x116/0x1d0 [ 15.811447] ret_from_fork_asm+0x1a/0x30 [ 15.811769] [ 15.811864] The buggy address belongs to the object at ffff8881038e3c00 [ 15.811864] which belongs to the cache kmalloc-64 of size 64 [ 15.812664] The buggy address is located 0 bytes to the right of [ 15.812664] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.813344] [ 15.813465] The buggy address belongs to the physical page: [ 15.813857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.814300] flags: 0x200000000000000(node=0|zone=2) [ 15.814589] page_type: f5(slab) [ 15.814781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.815289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.815627] page dumped because: kasan: bad access detected [ 15.815883] [ 15.815971] Memory state around the buggy address: [ 15.816421] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.816824] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.817293] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.817715] ^ [ 15.818032] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.818472] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.818794] ================================================================== [ 15.181162] ================================================================== [ 15.181401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.181636] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.181972] [ 15.182061] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.182105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.182118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.182140] Call Trace: [ 15.182155] <TASK> [ 15.182170] dump_stack_lvl+0x73/0xb0 [ 15.182199] print_report+0xd1/0x650 [ 15.182221] ? __virt_addr_valid+0x1db/0x2d0 [ 15.182243] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.182265] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.182288] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.182309] kasan_report+0x141/0x180 [ 15.182331] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.182357] __asan_report_store4_noabort+0x1b/0x30 [ 15.182383] kasan_atomics_helper+0x4b3a/0x5450 [ 15.182407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.182429] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.182455] ? kasan_atomics+0x152/0x310 [ 15.182482] kasan_atomics+0x1dc/0x310 [ 15.183054] ? __pfx_kasan_atomics+0x10/0x10 [ 15.183095] ? trace_hardirqs_on+0x37/0xe0 [ 15.183121] ? __pfx_read_tsc+0x10/0x10 [ 15.183145] ? ktime_get_ts64+0x86/0x230 [ 15.183169] kunit_try_run_case+0x1a5/0x480 [ 15.183195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183220] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.183247] ? __kthread_parkme+0x82/0x180 [ 15.183269] ? preempt_count_sub+0x50/0x80 [ 15.183294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.183347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.183743] kthread+0x337/0x6f0 [ 15.183763] ? trace_preempt_on+0x20/0xc0 [ 15.183799] ? __pfx_kthread+0x10/0x10 [ 15.183821] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.183844] ? calculate_sigpending+0x7b/0xa0 [ 15.183871] ? __pfx_kthread+0x10/0x10 [ 15.183903] ret_from_fork+0x116/0x1d0 [ 15.183924] ? __pfx_kthread+0x10/0x10 [ 15.183947] ret_from_fork_asm+0x1a/0x30 [ 15.183991] </TASK> [ 15.184002] [ 15.194917] Allocated by task 282: [ 15.195363] kasan_save_stack+0x45/0x70 [ 15.195777] kasan_save_track+0x18/0x40 [ 15.195953] kasan_save_alloc_info+0x3b/0x50 [ 15.196532] __kasan_kmalloc+0xb7/0xc0 [ 15.196741] __kmalloc_cache_noprof+0x189/0x420 [ 15.196929] kasan_atomics+0x95/0x310 [ 15.197290] kunit_try_run_case+0x1a5/0x480 [ 15.197464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.197732] kthread+0x337/0x6f0 [ 15.197873] ret_from_fork+0x116/0x1d0 [ 15.198136] ret_from_fork_asm+0x1a/0x30 [ 15.198295] [ 15.198369] The buggy address belongs to the object at ffff8881038e3c00 [ 15.198369] which belongs to the cache kmalloc-64 of size 64 [ 15.198894] The buggy address is located 0 bytes to the right of [ 15.198894] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.199516] [ 15.199637] The buggy address belongs to the physical page: [ 15.199890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.200170] flags: 0x200000000000000(node=0|zone=2) [ 15.200336] page_type: f5(slab) [ 15.200505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.200867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.201174] page dumped because: kasan: bad access detected [ 15.201622] [ 15.201747] Memory state around the buggy address: [ 15.201971] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.202290] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.202598] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.202932] ^ [ 15.203087] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.203487] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.203757] ================================================================== [ 15.658565] ================================================================== [ 15.658905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.659426] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.659685] [ 15.659812] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.659857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.659870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.659891] Call Trace: [ 15.659906] <TASK> [ 15.659923] dump_stack_lvl+0x73/0xb0 [ 15.659952] print_report+0xd1/0x650 [ 15.659974] ? __virt_addr_valid+0x1db/0x2d0 [ 15.659998] ? kasan_atomics_helper+0x1079/0x5450 [ 15.660020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.660055] ? kasan_atomics_helper+0x1079/0x5450 [ 15.660079] kasan_report+0x141/0x180 [ 15.660111] ? kasan_atomics_helper+0x1079/0x5450 [ 15.660139] kasan_check_range+0x10c/0x1c0 [ 15.660163] __kasan_check_write+0x18/0x20 [ 15.660184] kasan_atomics_helper+0x1079/0x5450 [ 15.660208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.660232] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.660257] ? kasan_atomics+0x152/0x310 [ 15.660285] kasan_atomics+0x1dc/0x310 [ 15.660309] ? __pfx_kasan_atomics+0x10/0x10 [ 15.660336] ? trace_hardirqs_on+0x37/0xe0 [ 15.660362] ? __pfx_read_tsc+0x10/0x10 [ 15.660384] ? ktime_get_ts64+0x86/0x230 [ 15.660410] kunit_try_run_case+0x1a5/0x480 [ 15.660436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.660462] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.660489] ? __kthread_parkme+0x82/0x180 [ 15.660510] ? preempt_count_sub+0x50/0x80 [ 15.660543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.660569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.660604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.660630] kthread+0x337/0x6f0 [ 15.660650] ? trace_preempt_on+0x20/0xc0 [ 15.660673] ? __pfx_kthread+0x10/0x10 [ 15.660695] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.660729] ? calculate_sigpending+0x7b/0xa0 [ 15.660755] ? __pfx_kthread+0x10/0x10 [ 15.660778] ret_from_fork+0x116/0x1d0 [ 15.660797] ? __pfx_kthread+0x10/0x10 [ 15.660818] ret_from_fork_asm+0x1a/0x30 [ 15.660852] </TASK> [ 15.660863] [ 15.669113] Allocated by task 282: [ 15.669244] kasan_save_stack+0x45/0x70 [ 15.669390] kasan_save_track+0x18/0x40 [ 15.669594] kasan_save_alloc_info+0x3b/0x50 [ 15.669820] __kasan_kmalloc+0xb7/0xc0 [ 15.670020] __kmalloc_cache_noprof+0x189/0x420 [ 15.670242] kasan_atomics+0x95/0x310 [ 15.670442] kunit_try_run_case+0x1a5/0x480 [ 15.670687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.670987] kthread+0x337/0x6f0 [ 15.671295] ret_from_fork+0x116/0x1d0 [ 15.671442] ret_from_fork_asm+0x1a/0x30 [ 15.671681] [ 15.671762] The buggy address belongs to the object at ffff8881038e3c00 [ 15.671762] which belongs to the cache kmalloc-64 of size 64 [ 15.672113] The buggy address is located 0 bytes to the right of [ 15.672113] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.672857] [ 15.673057] The buggy address belongs to the physical page: [ 15.673380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.673740] flags: 0x200000000000000(node=0|zone=2) [ 15.673902] page_type: f5(slab) [ 15.674023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.674251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.674472] page dumped because: kasan: bad access detected [ 15.674719] [ 15.674854] Memory state around the buggy address: [ 15.675316] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.675643] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.675905] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.676373] ^ [ 15.676614] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.676917] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.677360] ================================================================== [ 14.990700] ================================================================== [ 14.991636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.992163] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 14.992751] [ 14.992866] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.992912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.992924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.992945] Call Trace: [ 14.992958] <TASK> [ 14.992974] dump_stack_lvl+0x73/0xb0 [ 14.993005] print_report+0xd1/0x650 [ 14.993186] ? __virt_addr_valid+0x1db/0x2d0 [ 14.993214] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.993237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.993260] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.993282] kasan_report+0x141/0x180 [ 14.993305] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.993331] __asan_report_load4_noabort+0x18/0x20 [ 14.993357] kasan_atomics_helper+0x4bbc/0x5450 [ 14.993379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.993402] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.993428] ? kasan_atomics+0x152/0x310 [ 14.993455] kasan_atomics+0x1dc/0x310 [ 14.993478] ? __pfx_kasan_atomics+0x10/0x10 [ 14.993501] ? trace_hardirqs_on+0x37/0xe0 [ 14.993526] ? __pfx_read_tsc+0x10/0x10 [ 14.993547] ? ktime_get_ts64+0x86/0x230 [ 14.993571] kunit_try_run_case+0x1a5/0x480 [ 14.993595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993621] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.993647] ? __kthread_parkme+0x82/0x180 [ 14.993668] ? preempt_count_sub+0x50/0x80 [ 14.993691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.993756] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.993782] kthread+0x337/0x6f0 [ 14.993801] ? trace_preempt_on+0x20/0xc0 [ 14.993824] ? __pfx_kthread+0x10/0x10 [ 14.993844] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.993866] ? calculate_sigpending+0x7b/0xa0 [ 14.993890] ? __pfx_kthread+0x10/0x10 [ 14.993913] ret_from_fork+0x116/0x1d0 [ 14.993932] ? __pfx_kthread+0x10/0x10 [ 14.993953] ret_from_fork_asm+0x1a/0x30 [ 14.993985] </TASK> [ 14.993995] [ 15.006206] Allocated by task 282: [ 15.006367] kasan_save_stack+0x45/0x70 [ 15.006567] kasan_save_track+0x18/0x40 [ 15.006960] kasan_save_alloc_info+0x3b/0x50 [ 15.007212] __kasan_kmalloc+0xb7/0xc0 [ 15.007571] __kmalloc_cache_noprof+0x189/0x420 [ 15.007899] kasan_atomics+0x95/0x310 [ 15.008353] kunit_try_run_case+0x1a5/0x480 [ 15.008540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.008932] kthread+0x337/0x6f0 [ 15.009285] ret_from_fork+0x116/0x1d0 [ 15.009553] ret_from_fork_asm+0x1a/0x30 [ 15.009777] [ 15.009870] The buggy address belongs to the object at ffff8881038e3c00 [ 15.009870] which belongs to the cache kmalloc-64 of size 64 [ 15.010776] The buggy address is located 0 bytes to the right of [ 15.010776] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.011587] [ 15.011695] The buggy address belongs to the physical page: [ 15.012184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.012668] flags: 0x200000000000000(node=0|zone=2) [ 15.012986] page_type: f5(slab) [ 15.013437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.013802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.014423] page dumped because: kasan: bad access detected [ 15.014675] [ 15.014783] Memory state around the buggy address: [ 15.015030] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.015427] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.015747] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.016437] ^ [ 15.016666] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017159] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017527] ================================================================== [ 15.819831] ================================================================== [ 15.820181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.820627] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.821162] [ 15.821289] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.821333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.821429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.821450] Call Trace: [ 15.821466] <TASK> [ 15.821480] dump_stack_lvl+0x73/0xb0 [ 15.821512] print_report+0xd1/0x650 [ 15.821535] ? __virt_addr_valid+0x1db/0x2d0 [ 15.821558] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.821581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.821605] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.821628] kasan_report+0x141/0x180 [ 15.821650] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.821678] __asan_report_load4_noabort+0x18/0x20 [ 15.821716] kasan_atomics_helper+0x49ce/0x5450 [ 15.821740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.821764] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.821790] ? kasan_atomics+0x152/0x310 [ 15.821817] kasan_atomics+0x1dc/0x310 [ 15.821841] ? __pfx_kasan_atomics+0x10/0x10 [ 15.821864] ? trace_hardirqs_on+0x37/0xe0 [ 15.821889] ? __pfx_read_tsc+0x10/0x10 [ 15.821911] ? ktime_get_ts64+0x86/0x230 [ 15.821936] kunit_try_run_case+0x1a5/0x480 [ 15.821960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.821986] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.822013] ? __kthread_parkme+0x82/0x180 [ 15.822033] ? preempt_count_sub+0x50/0x80 [ 15.822071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.822097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.822148] kthread+0x337/0x6f0 [ 15.822170] ? trace_preempt_on+0x20/0xc0 [ 15.822192] ? __pfx_kthread+0x10/0x10 [ 15.822214] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.822237] ? calculate_sigpending+0x7b/0xa0 [ 15.822262] ? __pfx_kthread+0x10/0x10 [ 15.822284] ret_from_fork+0x116/0x1d0 [ 15.822303] ? __pfx_kthread+0x10/0x10 [ 15.822325] ret_from_fork_asm+0x1a/0x30 [ 15.822359] </TASK> [ 15.822371] [ 15.832287] Allocated by task 282: [ 15.832451] kasan_save_stack+0x45/0x70 [ 15.832644] kasan_save_track+0x18/0x40 [ 15.832823] kasan_save_alloc_info+0x3b/0x50 [ 15.833343] __kasan_kmalloc+0xb7/0xc0 [ 15.833533] __kmalloc_cache_noprof+0x189/0x420 [ 15.833724] kasan_atomics+0x95/0x310 [ 15.834060] kunit_try_run_case+0x1a5/0x480 [ 15.834378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.834731] kthread+0x337/0x6f0 [ 15.834862] ret_from_fork+0x116/0x1d0 [ 15.835322] ret_from_fork_asm+0x1a/0x30 [ 15.835667] [ 15.835767] The buggy address belongs to the object at ffff8881038e3c00 [ 15.835767] which belongs to the cache kmalloc-64 of size 64 [ 15.836486] The buggy address is located 0 bytes to the right of [ 15.836486] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.837008] [ 15.837187] The buggy address belongs to the physical page: [ 15.837566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.837933] flags: 0x200000000000000(node=0|zone=2) [ 15.838310] page_type: f5(slab) [ 15.838584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.838928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.839479] page dumped because: kasan: bad access detected [ 15.839816] [ 15.839917] Memory state around the buggy address: [ 15.840296] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840640] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840949] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.841461] ^ [ 15.841783] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842219] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842616] ================================================================== [ 15.921044] ================================================================== [ 15.921358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.921675] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.921989] [ 15.922100] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.922141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.922154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.922174] Call Trace: [ 15.922189] <TASK> [ 15.922204] dump_stack_lvl+0x73/0xb0 [ 15.922233] print_report+0xd1/0x650 [ 15.922255] ? __virt_addr_valid+0x1db/0x2d0 [ 15.922279] ? kasan_atomics_helper+0x151d/0x5450 [ 15.922301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.922326] ? kasan_atomics_helper+0x151d/0x5450 [ 15.922350] kasan_report+0x141/0x180 [ 15.922372] ? kasan_atomics_helper+0x151d/0x5450 [ 15.922400] kasan_check_range+0x10c/0x1c0 [ 15.922425] __kasan_check_write+0x18/0x20 [ 15.922445] kasan_atomics_helper+0x151d/0x5450 [ 15.922470] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.922494] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.922520] ? kasan_atomics+0x152/0x310 [ 15.922547] kasan_atomics+0x1dc/0x310 [ 15.922571] ? __pfx_kasan_atomics+0x10/0x10 [ 15.922594] ? trace_hardirqs_on+0x37/0xe0 [ 15.922619] ? __pfx_read_tsc+0x10/0x10 [ 15.922641] ? ktime_get_ts64+0x86/0x230 [ 15.922667] kunit_try_run_case+0x1a5/0x480 [ 15.922692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.922729] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.922756] ? __kthread_parkme+0x82/0x180 [ 15.922778] ? preempt_count_sub+0x50/0x80 [ 15.922803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.922829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.922856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.922883] kthread+0x337/0x6f0 [ 15.922902] ? trace_preempt_on+0x20/0xc0 [ 15.922926] ? __pfx_kthread+0x10/0x10 [ 15.922948] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.922971] ? calculate_sigpending+0x7b/0xa0 [ 15.922996] ? __pfx_kthread+0x10/0x10 [ 15.923019] ret_from_fork+0x116/0x1d0 [ 15.923057] ? __pfx_kthread+0x10/0x10 [ 15.923078] ret_from_fork_asm+0x1a/0x30 [ 15.923110] </TASK> [ 15.923121] [ 15.930243] Allocated by task 282: [ 15.930366] kasan_save_stack+0x45/0x70 [ 15.930506] kasan_save_track+0x18/0x40 [ 15.930637] kasan_save_alloc_info+0x3b/0x50 [ 15.932153] __kasan_kmalloc+0xb7/0xc0 [ 15.932813] __kmalloc_cache_noprof+0x189/0x420 [ 15.933618] kasan_atomics+0x95/0x310 [ 15.934275] kunit_try_run_case+0x1a5/0x480 [ 15.935083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.935751] kthread+0x337/0x6f0 [ 15.936399] ret_from_fork+0x116/0x1d0 [ 15.936923] ret_from_fork_asm+0x1a/0x30 [ 15.937567] [ 15.938008] The buggy address belongs to the object at ffff8881038e3c00 [ 15.938008] which belongs to the cache kmalloc-64 of size 64 [ 15.939285] The buggy address is located 0 bytes to the right of [ 15.939285] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.940545] [ 15.940631] The buggy address belongs to the physical page: [ 15.940818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.941324] flags: 0x200000000000000(node=0|zone=2) [ 15.942019] page_type: f5(slab) [ 15.942490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.943391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.944283] page dumped because: kasan: bad access detected [ 15.944474] [ 15.944546] Memory state around the buggy address: [ 15.944713] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.944931] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.945788] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.946618] ^ [ 15.947301] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.948148] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.948976] ================================================================== [ 16.056826] ================================================================== [ 16.057176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.057476] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.057805] [ 16.057889] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.057950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.057962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.057983] Call Trace: [ 16.057996] <TASK> [ 16.058010] dump_stack_lvl+0x73/0xb0 [ 16.058037] print_report+0xd1/0x650 [ 16.058062] ? __virt_addr_valid+0x1db/0x2d0 [ 16.058084] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.058108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.058132] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.058155] kasan_report+0x141/0x180 [ 16.058178] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.058205] kasan_check_range+0x10c/0x1c0 [ 16.058230] __kasan_check_write+0x18/0x20 [ 16.058251] kasan_atomics_helper+0x18b1/0x5450 [ 16.058274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.058298] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.058324] ? kasan_atomics+0x152/0x310 [ 16.058352] kasan_atomics+0x1dc/0x310 [ 16.058375] ? __pfx_kasan_atomics+0x10/0x10 [ 16.058398] ? trace_hardirqs_on+0x37/0xe0 [ 16.058422] ? __pfx_read_tsc+0x10/0x10 [ 16.058444] ? ktime_get_ts64+0x86/0x230 [ 16.058468] kunit_try_run_case+0x1a5/0x480 [ 16.058493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.058537] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.058563] ? __kthread_parkme+0x82/0x180 [ 16.058585] ? preempt_count_sub+0x50/0x80 [ 16.058609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.058635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.058661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.058688] kthread+0x337/0x6f0 [ 16.058717] ? trace_preempt_on+0x20/0xc0 [ 16.058740] ? __pfx_kthread+0x10/0x10 [ 16.058762] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.058785] ? calculate_sigpending+0x7b/0xa0 [ 16.058809] ? __pfx_kthread+0x10/0x10 [ 16.058832] ret_from_fork+0x116/0x1d0 [ 16.058852] ? __pfx_kthread+0x10/0x10 [ 16.058873] ret_from_fork_asm+0x1a/0x30 [ 16.058906] </TASK> [ 16.058917] [ 16.066478] Allocated by task 282: [ 16.066674] kasan_save_stack+0x45/0x70 [ 16.066879] kasan_save_track+0x18/0x40 [ 16.067088] kasan_save_alloc_info+0x3b/0x50 [ 16.067280] __kasan_kmalloc+0xb7/0xc0 [ 16.067466] __kmalloc_cache_noprof+0x189/0x420 [ 16.067622] kasan_atomics+0x95/0x310 [ 16.067810] kunit_try_run_case+0x1a5/0x480 [ 16.068015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.068265] kthread+0x337/0x6f0 [ 16.068429] ret_from_fork+0x116/0x1d0 [ 16.068579] ret_from_fork_asm+0x1a/0x30 [ 16.068786] [ 16.068876] The buggy address belongs to the object at ffff8881038e3c00 [ 16.068876] which belongs to the cache kmalloc-64 of size 64 [ 16.069225] The buggy address is located 0 bytes to the right of [ 16.069225] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.069906] [ 16.070026] The buggy address belongs to the physical page: [ 16.070314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.070680] flags: 0x200000000000000(node=0|zone=2) [ 16.070934] page_type: f5(slab) [ 16.071128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.071355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.071574] page dumped because: kasan: bad access detected [ 16.071768] [ 16.071861] Memory state around the buggy address: [ 16.072085] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.072411] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.072743] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.073150] ^ [ 16.073300] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.073629] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.073893] ================================================================== [ 16.293667] ================================================================== [ 16.293978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.294566] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.294905] [ 16.295097] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.295137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.295149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.295170] Call Trace: [ 16.295185] <TASK> [ 16.295201] dump_stack_lvl+0x73/0xb0 [ 16.295230] print_report+0xd1/0x650 [ 16.295253] ? __virt_addr_valid+0x1db/0x2d0 [ 16.295276] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.295299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.295324] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.295347] kasan_report+0x141/0x180 [ 16.295370] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.295398] __asan_report_load8_noabort+0x18/0x20 [ 16.295424] kasan_atomics_helper+0x4f71/0x5450 [ 16.295470] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.295495] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.295521] ? kasan_atomics+0x152/0x310 [ 16.295549] kasan_atomics+0x1dc/0x310 [ 16.295573] ? __pfx_kasan_atomics+0x10/0x10 [ 16.295596] ? trace_hardirqs_on+0x37/0xe0 [ 16.295621] ? __pfx_read_tsc+0x10/0x10 [ 16.295642] ? ktime_get_ts64+0x86/0x230 [ 16.295667] kunit_try_run_case+0x1a5/0x480 [ 16.295693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.295730] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.295757] ? __kthread_parkme+0x82/0x180 [ 16.295779] ? preempt_count_sub+0x50/0x80 [ 16.295804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.295830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.295856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.295883] kthread+0x337/0x6f0 [ 16.295903] ? trace_preempt_on+0x20/0xc0 [ 16.295926] ? __pfx_kthread+0x10/0x10 [ 16.295948] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.295971] ? calculate_sigpending+0x7b/0xa0 [ 16.295996] ? __pfx_kthread+0x10/0x10 [ 16.296018] ret_from_fork+0x116/0x1d0 [ 16.296038] ? __pfx_kthread+0x10/0x10 [ 16.296069] ret_from_fork_asm+0x1a/0x30 [ 16.296101] </TASK> [ 16.296112] [ 16.303388] Allocated by task 282: [ 16.303602] kasan_save_stack+0x45/0x70 [ 16.303812] kasan_save_track+0x18/0x40 [ 16.303951] kasan_save_alloc_info+0x3b/0x50 [ 16.304642] __kasan_kmalloc+0xb7/0xc0 [ 16.305348] __kmalloc_cache_noprof+0x189/0x420 [ 16.305621] kasan_atomics+0x95/0x310 [ 16.305771] kunit_try_run_case+0x1a5/0x480 [ 16.305920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.306558] kthread+0x337/0x6f0 [ 16.306816] ret_from_fork+0x116/0x1d0 [ 16.307142] ret_from_fork_asm+0x1a/0x30 [ 16.307510] [ 16.307606] The buggy address belongs to the object at ffff8881038e3c00 [ 16.307606] which belongs to the cache kmalloc-64 of size 64 [ 16.308346] The buggy address is located 0 bytes to the right of [ 16.308346] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.308866] [ 16.308959] The buggy address belongs to the physical page: [ 16.309491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.310138] flags: 0x200000000000000(node=0|zone=2) [ 16.310583] page_type: f5(slab) [ 16.310836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.311523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.311872] page dumped because: kasan: bad access detected [ 16.312284] [ 16.312374] Memory state around the buggy address: [ 16.312820] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.313342] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.313635] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.313941] ^ [ 16.314367] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314864] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.315494] ================================================================== [ 16.468839] ================================================================== [ 16.469114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.469504] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.469849] [ 16.469954] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.469994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.470006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.470027] Call Trace: [ 16.470041] <TASK> [ 16.470057] dump_stack_lvl+0x73/0xb0 [ 16.470086] print_report+0xd1/0x650 [ 16.470108] ? __virt_addr_valid+0x1db/0x2d0 [ 16.470131] ? kasan_atomics_helper+0x5115/0x5450 [ 16.470154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.470179] ? kasan_atomics_helper+0x5115/0x5450 [ 16.470211] kasan_report+0x141/0x180 [ 16.470235] ? kasan_atomics_helper+0x5115/0x5450 [ 16.470263] __asan_report_load8_noabort+0x18/0x20 [ 16.470289] kasan_atomics_helper+0x5115/0x5450 [ 16.470313] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.470337] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.470364] ? kasan_atomics+0x152/0x310 [ 16.470391] kasan_atomics+0x1dc/0x310 [ 16.470415] ? __pfx_kasan_atomics+0x10/0x10 [ 16.470438] ? trace_hardirqs_on+0x37/0xe0 [ 16.470462] ? __pfx_read_tsc+0x10/0x10 [ 16.470484] ? ktime_get_ts64+0x86/0x230 [ 16.470510] kunit_try_run_case+0x1a5/0x480 [ 16.470535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.470561] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.470587] ? __kthread_parkme+0x82/0x180 [ 16.470609] ? preempt_count_sub+0x50/0x80 [ 16.470634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.470660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.470686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.470723] kthread+0x337/0x6f0 [ 16.470743] ? trace_preempt_on+0x20/0xc0 [ 16.470768] ? __pfx_kthread+0x10/0x10 [ 16.470790] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.470813] ? calculate_sigpending+0x7b/0xa0 [ 16.470838] ? __pfx_kthread+0x10/0x10 [ 16.470860] ret_from_fork+0x116/0x1d0 [ 16.470879] ? __pfx_kthread+0x10/0x10 [ 16.470900] ret_from_fork_asm+0x1a/0x30 [ 16.470933] </TASK> [ 16.470944] [ 16.478240] Allocated by task 282: [ 16.478412] kasan_save_stack+0x45/0x70 [ 16.478587] kasan_save_track+0x18/0x40 [ 16.478785] kasan_save_alloc_info+0x3b/0x50 [ 16.478972] __kasan_kmalloc+0xb7/0xc0 [ 16.479207] __kmalloc_cache_noprof+0x189/0x420 [ 16.479405] kasan_atomics+0x95/0x310 [ 16.479595] kunit_try_run_case+0x1a5/0x480 [ 16.479770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.480006] kthread+0x337/0x6f0 [ 16.480247] ret_from_fork+0x116/0x1d0 [ 16.480437] ret_from_fork_asm+0x1a/0x30 [ 16.480599] [ 16.480693] The buggy address belongs to the object at ffff8881038e3c00 [ 16.480693] which belongs to the cache kmalloc-64 of size 64 [ 16.481201] The buggy address is located 0 bytes to the right of [ 16.481201] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.481672] [ 16.481775] The buggy address belongs to the physical page: [ 16.482007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.482289] flags: 0x200000000000000(node=0|zone=2) [ 16.482520] page_type: f5(slab) [ 16.482640] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.482986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.483359] page dumped because: kasan: bad access detected [ 16.483584] [ 16.483676] Memory state around the buggy address: [ 16.483844] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.484202] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.484498] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.484723] ^ [ 16.484879] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.485094] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.485307] ================================================================== [ 15.746308] ================================================================== [ 15.746549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.746831] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.748138] [ 15.748249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.748460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.748476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.748498] Call Trace: [ 15.748513] <TASK> [ 15.748529] dump_stack_lvl+0x73/0xb0 [ 15.748560] print_report+0xd1/0x650 [ 15.748582] ? __virt_addr_valid+0x1db/0x2d0 [ 15.748606] ? kasan_atomics_helper+0x1217/0x5450 [ 15.748628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.748654] ? kasan_atomics_helper+0x1217/0x5450 [ 15.748677] kasan_report+0x141/0x180 [ 15.748700] ? kasan_atomics_helper+0x1217/0x5450 [ 15.748742] kasan_check_range+0x10c/0x1c0 [ 15.748767] __kasan_check_write+0x18/0x20 [ 15.748787] kasan_atomics_helper+0x1217/0x5450 [ 15.748811] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.748835] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.748861] ? kasan_atomics+0x152/0x310 [ 15.748890] kasan_atomics+0x1dc/0x310 [ 15.748914] ? __pfx_kasan_atomics+0x10/0x10 [ 15.748939] ? trace_hardirqs_on+0x37/0xe0 [ 15.748964] ? __pfx_read_tsc+0x10/0x10 [ 15.748986] ? ktime_get_ts64+0x86/0x230 [ 15.749010] kunit_try_run_case+0x1a5/0x480 [ 15.749035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749070] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.749097] ? __kthread_parkme+0x82/0x180 [ 15.749118] ? preempt_count_sub+0x50/0x80 [ 15.749144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.749223] kthread+0x337/0x6f0 [ 15.749242] ? trace_preempt_on+0x20/0xc0 [ 15.749265] ? __pfx_kthread+0x10/0x10 [ 15.749288] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.749310] ? calculate_sigpending+0x7b/0xa0 [ 15.749335] ? __pfx_kthread+0x10/0x10 [ 15.749358] ret_from_fork+0x116/0x1d0 [ 15.749378] ? __pfx_kthread+0x10/0x10 [ 15.749399] ret_from_fork_asm+0x1a/0x30 [ 15.749430] </TASK> [ 15.749443] [ 15.759440] Allocated by task 282: [ 15.759610] kasan_save_stack+0x45/0x70 [ 15.760346] kasan_save_track+0x18/0x40 [ 15.760513] kasan_save_alloc_info+0x3b/0x50 [ 15.760872] __kasan_kmalloc+0xb7/0xc0 [ 15.761238] __kmalloc_cache_noprof+0x189/0x420 [ 15.761582] kasan_atomics+0x95/0x310 [ 15.761748] kunit_try_run_case+0x1a5/0x480 [ 15.762135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.762459] kthread+0x337/0x6f0 [ 15.762734] ret_from_fork+0x116/0x1d0 [ 15.763066] ret_from_fork_asm+0x1a/0x30 [ 15.763260] [ 15.763356] The buggy address belongs to the object at ffff8881038e3c00 [ 15.763356] which belongs to the cache kmalloc-64 of size 64 [ 15.764176] The buggy address is located 0 bytes to the right of [ 15.764176] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.764909] [ 15.765012] The buggy address belongs to the physical page: [ 15.765472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.765826] flags: 0x200000000000000(node=0|zone=2) [ 15.766152] page_type: f5(slab) [ 15.766325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.766821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.767290] page dumped because: kasan: bad access detected [ 15.767490] [ 15.767731] Memory state around the buggy address: [ 15.768012] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.768460] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.768829] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.769238] ^ [ 15.769475] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.769793] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.770088] ================================================================== [ 16.257385] ================================================================== [ 16.257883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.258293] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.258581] [ 16.258712] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.258753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.258766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.258788] Call Trace: [ 16.258803] <TASK> [ 16.258817] dump_stack_lvl+0x73/0xb0 [ 16.258846] print_report+0xd1/0x650 [ 16.258869] ? __virt_addr_valid+0x1db/0x2d0 [ 16.258892] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.258914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.258939] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.258962] kasan_report+0x141/0x180 [ 16.258985] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.259013] kasan_check_range+0x10c/0x1c0 [ 16.259037] __kasan_check_write+0x18/0x20 [ 16.259058] kasan_atomics_helper+0x1eaa/0x5450 [ 16.259082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.259106] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.259132] ? kasan_atomics+0x152/0x310 [ 16.259160] kasan_atomics+0x1dc/0x310 [ 16.259184] ? __pfx_kasan_atomics+0x10/0x10 [ 16.259208] ? trace_hardirqs_on+0x37/0xe0 [ 16.259233] ? __pfx_read_tsc+0x10/0x10 [ 16.259255] ? ktime_get_ts64+0x86/0x230 [ 16.259279] kunit_try_run_case+0x1a5/0x480 [ 16.259304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.259330] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.259356] ? __kthread_parkme+0x82/0x180 [ 16.259378] ? preempt_count_sub+0x50/0x80 [ 16.259403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.259443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.259492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.259519] kthread+0x337/0x6f0 [ 16.259539] ? trace_preempt_on+0x20/0xc0 [ 16.259562] ? __pfx_kthread+0x10/0x10 [ 16.259584] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.259606] ? calculate_sigpending+0x7b/0xa0 [ 16.259631] ? __pfx_kthread+0x10/0x10 [ 16.259653] ret_from_fork+0x116/0x1d0 [ 16.259673] ? __pfx_kthread+0x10/0x10 [ 16.259694] ret_from_fork_asm+0x1a/0x30 [ 16.259735] </TASK> [ 16.259746] [ 16.267423] Allocated by task 282: [ 16.267617] kasan_save_stack+0x45/0x70 [ 16.267837] kasan_save_track+0x18/0x40 [ 16.267974] kasan_save_alloc_info+0x3b/0x50 [ 16.268123] __kasan_kmalloc+0xb7/0xc0 [ 16.268256] __kmalloc_cache_noprof+0x189/0x420 [ 16.268525] kasan_atomics+0x95/0x310 [ 16.268747] kunit_try_run_case+0x1a5/0x480 [ 16.268960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.269272] kthread+0x337/0x6f0 [ 16.269441] ret_from_fork+0x116/0x1d0 [ 16.269592] ret_from_fork_asm+0x1a/0x30 [ 16.269741] [ 16.269812] The buggy address belongs to the object at ffff8881038e3c00 [ 16.269812] which belongs to the cache kmalloc-64 of size 64 [ 16.270506] The buggy address is located 0 bytes to the right of [ 16.270506] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.271057] [ 16.271183] The buggy address belongs to the physical page: [ 16.271356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.271593] flags: 0x200000000000000(node=0|zone=2) [ 16.271766] page_type: f5(slab) [ 16.271887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.272455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.272830] page dumped because: kasan: bad access detected [ 16.273100] [ 16.273195] Memory state around the buggy address: [ 16.273602] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.273881] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.274311] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.274562] ^ [ 16.274729] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.274993] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275338] ================================================================== [ 15.382732] ================================================================== [ 15.383126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.383363] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.383731] [ 15.383844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.383885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.383898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.383918] Call Trace: [ 15.383932] <TASK> [ 15.383947] dump_stack_lvl+0x73/0xb0 [ 15.383975] print_report+0xd1/0x650 [ 15.383998] ? __virt_addr_valid+0x1db/0x2d0 [ 15.384022] ? kasan_atomics_helper+0xac7/0x5450 [ 15.384064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.384089] ? kasan_atomics_helper+0xac7/0x5450 [ 15.384112] kasan_report+0x141/0x180 [ 15.384135] ? kasan_atomics_helper+0xac7/0x5450 [ 15.384162] kasan_check_range+0x10c/0x1c0 [ 15.384186] __kasan_check_write+0x18/0x20 [ 15.384207] kasan_atomics_helper+0xac7/0x5450 [ 15.384299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.384350] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.384376] ? kasan_atomics+0x152/0x310 [ 15.384404] kasan_atomics+0x1dc/0x310 [ 15.384428] ? __pfx_kasan_atomics+0x10/0x10 [ 15.384453] ? trace_hardirqs_on+0x37/0xe0 [ 15.384477] ? __pfx_read_tsc+0x10/0x10 [ 15.384501] ? ktime_get_ts64+0x86/0x230 [ 15.384526] kunit_try_run_case+0x1a5/0x480 [ 15.384561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.384586] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.384624] ? __kthread_parkme+0x82/0x180 [ 15.384646] ? preempt_count_sub+0x50/0x80 [ 15.384670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.384711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.384738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.384764] kthread+0x337/0x6f0 [ 15.384794] ? trace_preempt_on+0x20/0xc0 [ 15.384818] ? __pfx_kthread+0x10/0x10 [ 15.384840] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.384862] ? calculate_sigpending+0x7b/0xa0 [ 15.384888] ? __pfx_kthread+0x10/0x10 [ 15.384911] ret_from_fork+0x116/0x1d0 [ 15.384930] ? __pfx_kthread+0x10/0x10 [ 15.384951] ret_from_fork_asm+0x1a/0x30 [ 15.384983] </TASK> [ 15.384994] [ 15.393797] Allocated by task 282: [ 15.393986] kasan_save_stack+0x45/0x70 [ 15.394354] kasan_save_track+0x18/0x40 [ 15.394568] kasan_save_alloc_info+0x3b/0x50 [ 15.394764] __kasan_kmalloc+0xb7/0xc0 [ 15.394973] __kmalloc_cache_noprof+0x189/0x420 [ 15.395251] kasan_atomics+0x95/0x310 [ 15.395436] kunit_try_run_case+0x1a5/0x480 [ 15.395590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.395784] kthread+0x337/0x6f0 [ 15.395906] ret_from_fork+0x116/0x1d0 [ 15.396137] ret_from_fork_asm+0x1a/0x30 [ 15.396417] [ 15.396520] The buggy address belongs to the object at ffff8881038e3c00 [ 15.396520] which belongs to the cache kmalloc-64 of size 64 [ 15.397142] The buggy address is located 0 bytes to the right of [ 15.397142] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.397566] [ 15.397640] The buggy address belongs to the physical page: [ 15.397904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.398412] flags: 0x200000000000000(node=0|zone=2) [ 15.398760] page_type: f5(slab) [ 15.398890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.399446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.399836] page dumped because: kasan: bad access detected [ 15.400009] [ 15.400078] Memory state around the buggy address: [ 15.400348] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.401026] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.401361] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.401636] ^ [ 15.401885] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402466] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402782] ================================================================== [ 16.421734] ================================================================== [ 16.422120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.422435] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.422903] [ 16.423019] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.423092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.423104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.423124] Call Trace: [ 16.423139] <TASK> [ 16.423154] dump_stack_lvl+0x73/0xb0 [ 16.423204] print_report+0xd1/0x650 [ 16.423228] ? __virt_addr_valid+0x1db/0x2d0 [ 16.423250] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.423272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.423297] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.423319] kasan_report+0x141/0x180 [ 16.423365] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.423394] __asan_report_load8_noabort+0x18/0x20 [ 16.423437] kasan_atomics_helper+0x4fa5/0x5450 [ 16.423461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.423485] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.423512] ? kasan_atomics+0x152/0x310 [ 16.423541] kasan_atomics+0x1dc/0x310 [ 16.423581] ? __pfx_kasan_atomics+0x10/0x10 [ 16.423604] ? trace_hardirqs_on+0x37/0xe0 [ 16.423629] ? __pfx_read_tsc+0x10/0x10 [ 16.423650] ? ktime_get_ts64+0x86/0x230 [ 16.423693] kunit_try_run_case+0x1a5/0x480 [ 16.423729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.423755] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.423782] ? __kthread_parkme+0x82/0x180 [ 16.423804] ? preempt_count_sub+0x50/0x80 [ 16.423846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.423886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.423925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.423965] kthread+0x337/0x6f0 [ 16.423998] ? trace_preempt_on+0x20/0xc0 [ 16.424066] ? __pfx_kthread+0x10/0x10 [ 16.424088] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.424111] ? calculate_sigpending+0x7b/0xa0 [ 16.424135] ? __pfx_kthread+0x10/0x10 [ 16.424158] ret_from_fork+0x116/0x1d0 [ 16.424177] ? __pfx_kthread+0x10/0x10 [ 16.424198] ret_from_fork_asm+0x1a/0x30 [ 16.424230] </TASK> [ 16.424242] [ 16.433836] Allocated by task 282: [ 16.434009] kasan_save_stack+0x45/0x70 [ 16.434512] kasan_save_track+0x18/0x40 [ 16.434816] kasan_save_alloc_info+0x3b/0x50 [ 16.435286] __kasan_kmalloc+0xb7/0xc0 [ 16.435481] __kmalloc_cache_noprof+0x189/0x420 [ 16.435687] kasan_atomics+0x95/0x310 [ 16.436139] kunit_try_run_case+0x1a5/0x480 [ 16.436417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.436668] kthread+0x337/0x6f0 [ 16.436838] ret_from_fork+0x116/0x1d0 [ 16.437016] ret_from_fork_asm+0x1a/0x30 [ 16.437389] [ 16.437592] The buggy address belongs to the object at ffff8881038e3c00 [ 16.437592] which belongs to the cache kmalloc-64 of size 64 [ 16.438374] The buggy address is located 0 bytes to the right of [ 16.438374] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.438886] [ 16.438980] The buggy address belongs to the physical page: [ 16.439732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.440219] flags: 0x200000000000000(node=0|zone=2) [ 16.440558] page_type: f5(slab) [ 16.440937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.441458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.442087] page dumped because: kasan: bad access detected [ 16.442399] [ 16.442503] Memory state around the buggy address: [ 16.442722] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.443015] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.443600] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.444193] ^ [ 16.444546] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.444864] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.445471] ================================================================== [ 15.978476] ================================================================== [ 15.978840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.979667] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.980389] [ 15.980590] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.980635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.980648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.980669] Call Trace: [ 15.980686] <TASK> [ 15.980716] dump_stack_lvl+0x73/0xb0 [ 15.980748] print_report+0xd1/0x650 [ 15.980793] ? __virt_addr_valid+0x1db/0x2d0 [ 15.980818] ? kasan_atomics_helper+0x164f/0x5450 [ 15.980840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.980866] ? kasan_atomics_helper+0x164f/0x5450 [ 15.980889] kasan_report+0x141/0x180 [ 15.980912] ? kasan_atomics_helper+0x164f/0x5450 [ 15.980940] kasan_check_range+0x10c/0x1c0 [ 15.980966] __kasan_check_write+0x18/0x20 [ 15.980986] kasan_atomics_helper+0x164f/0x5450 [ 15.981011] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.981035] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.981071] ? kasan_atomics+0x152/0x310 [ 15.981099] kasan_atomics+0x1dc/0x310 [ 15.981122] ? __pfx_kasan_atomics+0x10/0x10 [ 15.981146] ? trace_hardirqs_on+0x37/0xe0 [ 15.981170] ? __pfx_read_tsc+0x10/0x10 [ 15.981192] ? ktime_get_ts64+0x86/0x230 [ 15.981218] kunit_try_run_case+0x1a5/0x480 [ 15.981244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.981270] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.981298] ? __kthread_parkme+0x82/0x180 [ 15.981320] ? preempt_count_sub+0x50/0x80 [ 15.981346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.981372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.981398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.981425] kthread+0x337/0x6f0 [ 15.981445] ? trace_preempt_on+0x20/0xc0 [ 15.981469] ? __pfx_kthread+0x10/0x10 [ 15.981490] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.981513] ? calculate_sigpending+0x7b/0xa0 [ 15.981538] ? __pfx_kthread+0x10/0x10 [ 15.981561] ret_from_fork+0x116/0x1d0 [ 15.981580] ? __pfx_kthread+0x10/0x10 [ 15.981601] ret_from_fork_asm+0x1a/0x30 [ 15.981634] </TASK> [ 15.981646] [ 15.993594] Allocated by task 282: [ 15.993797] kasan_save_stack+0x45/0x70 [ 15.993996] kasan_save_track+0x18/0x40 [ 15.994460] kasan_save_alloc_info+0x3b/0x50 [ 15.994645] __kasan_kmalloc+0xb7/0xc0 [ 15.995000] __kmalloc_cache_noprof+0x189/0x420 [ 15.995430] kasan_atomics+0x95/0x310 [ 15.995627] kunit_try_run_case+0x1a5/0x480 [ 15.995848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.996374] kthread+0x337/0x6f0 [ 15.996540] ret_from_fork+0x116/0x1d0 [ 15.996721] ret_from_fork_asm+0x1a/0x30 [ 15.996911] [ 15.997035] The buggy address belongs to the object at ffff8881038e3c00 [ 15.997035] which belongs to the cache kmalloc-64 of size 64 [ 15.997550] The buggy address is located 0 bytes to the right of [ 15.997550] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.998022] [ 15.998114] The buggy address belongs to the physical page: [ 15.998362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.998664] flags: 0x200000000000000(node=0|zone=2) [ 15.998931] page_type: f5(slab) [ 15.999150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.999474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.999795] page dumped because: kasan: bad access detected [ 15.999987] [ 16.000075] Memory state around the buggy address: [ 16.000292] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.000845] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.001159] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.001481] ^ [ 16.001727] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.002048] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.002296] ================================================================== [ 16.021204] ================================================================== [ 16.021549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.021926] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.022573] [ 16.022684] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.022739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.022751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.022772] Call Trace: [ 16.022785] <TASK> [ 16.022800] dump_stack_lvl+0x73/0xb0 [ 16.022829] print_report+0xd1/0x650 [ 16.022853] ? __virt_addr_valid+0x1db/0x2d0 [ 16.022876] ? kasan_atomics_helper+0x177f/0x5450 [ 16.022899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.022924] ? kasan_atomics_helper+0x177f/0x5450 [ 16.022948] kasan_report+0x141/0x180 [ 16.022970] ? kasan_atomics_helper+0x177f/0x5450 [ 16.022999] kasan_check_range+0x10c/0x1c0 [ 16.023023] __kasan_check_write+0x18/0x20 [ 16.023077] kasan_atomics_helper+0x177f/0x5450 [ 16.023102] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.023126] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.023151] ? kasan_atomics+0x152/0x310 [ 16.023179] kasan_atomics+0x1dc/0x310 [ 16.023202] ? __pfx_kasan_atomics+0x10/0x10 [ 16.023225] ? trace_hardirqs_on+0x37/0xe0 [ 16.023250] ? __pfx_read_tsc+0x10/0x10 [ 16.023307] ? ktime_get_ts64+0x86/0x230 [ 16.023332] kunit_try_run_case+0x1a5/0x480 [ 16.023356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.023383] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.023431] ? __kthread_parkme+0x82/0x180 [ 16.023453] ? preempt_count_sub+0x50/0x80 [ 16.023478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.023504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.023530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.023557] kthread+0x337/0x6f0 [ 16.023596] ? trace_preempt_on+0x20/0xc0 [ 16.023620] ? __pfx_kthread+0x10/0x10 [ 16.023642] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.023665] ? calculate_sigpending+0x7b/0xa0 [ 16.023691] ? __pfx_kthread+0x10/0x10 [ 16.023721] ret_from_fork+0x116/0x1d0 [ 16.023741] ? __pfx_kthread+0x10/0x10 [ 16.023783] ret_from_fork_asm+0x1a/0x30 [ 16.023815] </TASK> [ 16.023826] [ 16.031596] Allocated by task 282: [ 16.031734] kasan_save_stack+0x45/0x70 [ 16.032057] kasan_save_track+0x18/0x40 [ 16.032276] kasan_save_alloc_info+0x3b/0x50 [ 16.032495] __kasan_kmalloc+0xb7/0xc0 [ 16.032684] __kmalloc_cache_noprof+0x189/0x420 [ 16.032926] kasan_atomics+0x95/0x310 [ 16.033129] kunit_try_run_case+0x1a5/0x480 [ 16.033336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.033577] kthread+0x337/0x6f0 [ 16.033756] ret_from_fork+0x116/0x1d0 [ 16.033931] ret_from_fork_asm+0x1a/0x30 [ 16.034131] [ 16.034201] The buggy address belongs to the object at ffff8881038e3c00 [ 16.034201] which belongs to the cache kmalloc-64 of size 64 [ 16.034542] The buggy address is located 0 bytes to the right of [ 16.034542] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.035032] [ 16.035128] The buggy address belongs to the physical page: [ 16.035372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.035709] flags: 0x200000000000000(node=0|zone=2) [ 16.035866] page_type: f5(slab) [ 16.035984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.036206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.036578] page dumped because: kasan: bad access detected [ 16.036861] [ 16.036976] Memory state around the buggy address: [ 16.037390] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.037734] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.038028] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.038247] ^ [ 16.038464] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.038795] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.039089] ================================================================== [ 15.721551] ================================================================== [ 15.722100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.722377] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.722740] [ 15.722848] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.722911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.722924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.722945] Call Trace: [ 15.722960] <TASK> [ 15.722975] dump_stack_lvl+0x73/0xb0 [ 15.723005] print_report+0xd1/0x650 [ 15.723027] ? __virt_addr_valid+0x1db/0x2d0 [ 15.723062] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.723107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.723132] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.723155] kasan_report+0x141/0x180 [ 15.723178] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.723207] __asan_report_load4_noabort+0x18/0x20 [ 15.723232] kasan_atomics_helper+0x4a02/0x5450 [ 15.723256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.723297] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.723324] ? kasan_atomics+0x152/0x310 [ 15.723351] kasan_atomics+0x1dc/0x310 [ 15.723375] ? __pfx_kasan_atomics+0x10/0x10 [ 15.723399] ? trace_hardirqs_on+0x37/0xe0 [ 15.723422] ? __pfx_read_tsc+0x10/0x10 [ 15.723444] ? ktime_get_ts64+0x86/0x230 [ 15.723470] kunit_try_run_case+0x1a5/0x480 [ 15.723495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723521] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.723549] ? __kthread_parkme+0x82/0x180 [ 15.723570] ? preempt_count_sub+0x50/0x80 [ 15.723594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.723646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.723673] kthread+0x337/0x6f0 [ 15.723693] ? trace_preempt_on+0x20/0xc0 [ 15.723727] ? __pfx_kthread+0x10/0x10 [ 15.723748] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.723788] ? calculate_sigpending+0x7b/0xa0 [ 15.723813] ? __pfx_kthread+0x10/0x10 [ 15.723836] ret_from_fork+0x116/0x1d0 [ 15.723856] ? __pfx_kthread+0x10/0x10 [ 15.723877] ret_from_fork_asm+0x1a/0x30 [ 15.723909] </TASK> [ 15.723920] [ 15.734162] Allocated by task 282: [ 15.734486] kasan_save_stack+0x45/0x70 [ 15.734654] kasan_save_track+0x18/0x40 [ 15.735014] kasan_save_alloc_info+0x3b/0x50 [ 15.735324] __kasan_kmalloc+0xb7/0xc0 [ 15.735491] __kmalloc_cache_noprof+0x189/0x420 [ 15.735728] kasan_atomics+0x95/0x310 [ 15.735900] kunit_try_run_case+0x1a5/0x480 [ 15.736372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.736618] kthread+0x337/0x6f0 [ 15.736925] ret_from_fork+0x116/0x1d0 [ 15.737122] ret_from_fork_asm+0x1a/0x30 [ 15.737443] [ 15.737544] The buggy address belongs to the object at ffff8881038e3c00 [ 15.737544] which belongs to the cache kmalloc-64 of size 64 [ 15.738304] The buggy address is located 0 bytes to the right of [ 15.738304] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.738943] [ 15.739027] The buggy address belongs to the physical page: [ 15.739519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.739951] flags: 0x200000000000000(node=0|zone=2) [ 15.740275] page_type: f5(slab) [ 15.740412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.740870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.741388] page dumped because: kasan: bad access detected [ 15.741966] [ 15.742236] Memory state around the buggy address: [ 15.742639] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.742876] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.743335] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.744027] ^ [ 15.744539] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.745279] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.745767] ================================================================== [ 16.238975] ================================================================== [ 16.239726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.240226] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.240766] [ 16.240887] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.240932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.240946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.240968] Call Trace: [ 16.240984] <TASK> [ 16.241001] dump_stack_lvl+0x73/0xb0 [ 16.241033] print_report+0xd1/0x650 [ 16.241082] ? __virt_addr_valid+0x1db/0x2d0 [ 16.241106] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.241129] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.241154] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.241178] kasan_report+0x141/0x180 [ 16.241201] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.241228] kasan_check_range+0x10c/0x1c0 [ 16.241254] __kasan_check_write+0x18/0x20 [ 16.241275] kasan_atomics_helper+0x1e12/0x5450 [ 16.241299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.241323] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.241349] ? kasan_atomics+0x152/0x310 [ 16.241395] kasan_atomics+0x1dc/0x310 [ 16.241419] ? __pfx_kasan_atomics+0x10/0x10 [ 16.241443] ? trace_hardirqs_on+0x37/0xe0 [ 16.241468] ? __pfx_read_tsc+0x10/0x10 [ 16.241491] ? ktime_get_ts64+0x86/0x230 [ 16.241516] kunit_try_run_case+0x1a5/0x480 [ 16.241542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.241569] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.241595] ? __kthread_parkme+0x82/0x180 [ 16.241617] ? preempt_count_sub+0x50/0x80 [ 16.241642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.241667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.241693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.241732] kthread+0x337/0x6f0 [ 16.241752] ? trace_preempt_on+0x20/0xc0 [ 16.241777] ? __pfx_kthread+0x10/0x10 [ 16.241798] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.241821] ? calculate_sigpending+0x7b/0xa0 [ 16.241846] ? __pfx_kthread+0x10/0x10 [ 16.241869] ret_from_fork+0x116/0x1d0 [ 16.241888] ? __pfx_kthread+0x10/0x10 [ 16.241909] ret_from_fork_asm+0x1a/0x30 [ 16.241941] </TASK> [ 16.241952] [ 16.248952] Allocated by task 282: [ 16.249228] kasan_save_stack+0x45/0x70 [ 16.249453] kasan_save_track+0x18/0x40 [ 16.249648] kasan_save_alloc_info+0x3b/0x50 [ 16.249893] __kasan_kmalloc+0xb7/0xc0 [ 16.250082] __kmalloc_cache_noprof+0x189/0x420 [ 16.250293] kasan_atomics+0x95/0x310 [ 16.250480] kunit_try_run_case+0x1a5/0x480 [ 16.250694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.250945] kthread+0x337/0x6f0 [ 16.251127] ret_from_fork+0x116/0x1d0 [ 16.251298] ret_from_fork_asm+0x1a/0x30 [ 16.251436] [ 16.251507] The buggy address belongs to the object at ffff8881038e3c00 [ 16.251507] which belongs to the cache kmalloc-64 of size 64 [ 16.251865] The buggy address is located 0 bytes to the right of [ 16.251865] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.252496] [ 16.252689] The buggy address belongs to the physical page: [ 16.252953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.253430] flags: 0x200000000000000(node=0|zone=2) [ 16.253654] page_type: f5(slab) [ 16.253837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.254200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.254428] page dumped because: kasan: bad access detected [ 16.254601] [ 16.254670] Memory state around the buggy address: [ 16.254856] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.255332] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.255672] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.256019] ^ [ 16.256276] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256510] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256824] ================================================================== [ 15.261809] ================================================================== [ 15.262223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.262563] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.262901] [ 15.263015] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.263058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.263071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.263094] Call Trace: [ 15.263109] <TASK> [ 15.263125] dump_stack_lvl+0x73/0xb0 [ 15.263154] print_report+0xd1/0x650 [ 15.263177] ? __virt_addr_valid+0x1db/0x2d0 [ 15.263201] ? kasan_atomics_helper+0x72f/0x5450 [ 15.263223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.263248] ? kasan_atomics_helper+0x72f/0x5450 [ 15.263271] kasan_report+0x141/0x180 [ 15.263294] ? kasan_atomics_helper+0x72f/0x5450 [ 15.263323] kasan_check_range+0x10c/0x1c0 [ 15.263347] __kasan_check_write+0x18/0x20 [ 15.263367] kasan_atomics_helper+0x72f/0x5450 [ 15.263391] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.263415] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.263442] ? kasan_atomics+0x152/0x310 [ 15.263470] kasan_atomics+0x1dc/0x310 [ 15.263494] ? __pfx_kasan_atomics+0x10/0x10 [ 15.263517] ? trace_hardirqs_on+0x37/0xe0 [ 15.263541] ? __pfx_read_tsc+0x10/0x10 [ 15.263562] ? ktime_get_ts64+0x86/0x230 [ 15.263587] kunit_try_run_case+0x1a5/0x480 [ 15.263612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.263638] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.263664] ? __kthread_parkme+0x82/0x180 [ 15.263686] ? preempt_count_sub+0x50/0x80 [ 15.263722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.263748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.263773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.263799] kthread+0x337/0x6f0 [ 15.263820] ? trace_preempt_on+0x20/0xc0 [ 15.263843] ? __pfx_kthread+0x10/0x10 [ 15.263866] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.263888] ? calculate_sigpending+0x7b/0xa0 [ 15.263915] ? __pfx_kthread+0x10/0x10 [ 15.263937] ret_from_fork+0x116/0x1d0 [ 15.263957] ? __pfx_kthread+0x10/0x10 [ 15.263978] ret_from_fork_asm+0x1a/0x30 [ 15.264011] </TASK> [ 15.264021] [ 15.271828] Allocated by task 282: [ 15.272010] kasan_save_stack+0x45/0x70 [ 15.272306] kasan_save_track+0x18/0x40 [ 15.272474] kasan_save_alloc_info+0x3b/0x50 [ 15.272625] __kasan_kmalloc+0xb7/0xc0 [ 15.272770] __kmalloc_cache_noprof+0x189/0x420 [ 15.272927] kasan_atomics+0x95/0x310 [ 15.273085] kunit_try_run_case+0x1a5/0x480 [ 15.273292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.273541] kthread+0x337/0x6f0 [ 15.273777] ret_from_fork+0x116/0x1d0 [ 15.274154] ret_from_fork_asm+0x1a/0x30 [ 15.274298] [ 15.274370] The buggy address belongs to the object at ffff8881038e3c00 [ 15.274370] which belongs to the cache kmalloc-64 of size 64 [ 15.275346] The buggy address is located 0 bytes to the right of [ 15.275346] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.275909] [ 15.276007] The buggy address belongs to the physical page: [ 15.276297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.276620] flags: 0x200000000000000(node=0|zone=2) [ 15.276835] page_type: f5(slab) [ 15.276958] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.277470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.277862] page dumped because: kasan: bad access detected [ 15.278038] [ 15.278108] Memory state around the buggy address: [ 15.278471] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.278817] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.279082] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.279408] ^ [ 15.279572] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.279796] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.280010] ================================================================== [ 15.484430] ================================================================== [ 15.484770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.485224] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.485650] [ 15.485786] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.485831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.485938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.485961] Call Trace: [ 15.485977] <TASK> [ 15.485993] dump_stack_lvl+0x73/0xb0 [ 15.486025] print_report+0xd1/0x650 [ 15.486049] ? __virt_addr_valid+0x1db/0x2d0 [ 15.486272] ? kasan_atomics_helper+0xd47/0x5450 [ 15.486314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.486341] ? kasan_atomics_helper+0xd47/0x5450 [ 15.486365] kasan_report+0x141/0x180 [ 15.486388] ? kasan_atomics_helper+0xd47/0x5450 [ 15.486416] kasan_check_range+0x10c/0x1c0 [ 15.486440] __kasan_check_write+0x18/0x20 [ 15.486461] kasan_atomics_helper+0xd47/0x5450 [ 15.486485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.486509] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.486535] ? kasan_atomics+0x152/0x310 [ 15.486564] kasan_atomics+0x1dc/0x310 [ 15.486587] ? __pfx_kasan_atomics+0x10/0x10 [ 15.486611] ? trace_hardirqs_on+0x37/0xe0 [ 15.486636] ? __pfx_read_tsc+0x10/0x10 [ 15.486658] ? ktime_get_ts64+0x86/0x230 [ 15.486683] kunit_try_run_case+0x1a5/0x480 [ 15.486722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.486748] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.486777] ? __kthread_parkme+0x82/0x180 [ 15.486801] ? preempt_count_sub+0x50/0x80 [ 15.486825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.486851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.486877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.486902] kthread+0x337/0x6f0 [ 15.486922] ? trace_preempt_on+0x20/0xc0 [ 15.486946] ? __pfx_kthread+0x10/0x10 [ 15.486968] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.486990] ? calculate_sigpending+0x7b/0xa0 [ 15.487016] ? __pfx_kthread+0x10/0x10 [ 15.487048] ret_from_fork+0x116/0x1d0 [ 15.487068] ? __pfx_kthread+0x10/0x10 [ 15.487091] ret_from_fork_asm+0x1a/0x30 [ 15.487124] </TASK> [ 15.487135] [ 15.498090] Allocated by task 282: [ 15.498286] kasan_save_stack+0x45/0x70 [ 15.498802] kasan_save_track+0x18/0x40 [ 15.499268] kasan_save_alloc_info+0x3b/0x50 [ 15.499626] __kasan_kmalloc+0xb7/0xc0 [ 15.499787] __kmalloc_cache_noprof+0x189/0x420 [ 15.500013] kasan_atomics+0x95/0x310 [ 15.500434] kunit_try_run_case+0x1a5/0x480 [ 15.500604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.501222] kthread+0x337/0x6f0 [ 15.501419] ret_from_fork+0x116/0x1d0 [ 15.501606] ret_from_fork_asm+0x1a/0x30 [ 15.501819] [ 15.501905] The buggy address belongs to the object at ffff8881038e3c00 [ 15.501905] which belongs to the cache kmalloc-64 of size 64 [ 15.502962] The buggy address is located 0 bytes to the right of [ 15.502962] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.503878] [ 15.503990] The buggy address belongs to the physical page: [ 15.504526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.504933] flags: 0x200000000000000(node=0|zone=2) [ 15.505332] page_type: f5(slab) [ 15.505624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.505985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.506614] page dumped because: kasan: bad access detected [ 15.506993] [ 15.507291] Memory state around the buggy address: [ 15.507510] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.507842] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.508451] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.508818] ^ [ 15.509290] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.509605] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.509920] ================================================================== [ 15.533812] ================================================================== [ 15.534851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.535402] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.536265] [ 15.536568] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.536614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.536628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.536650] Call Trace: [ 15.536766] <TASK> [ 15.536788] dump_stack_lvl+0x73/0xb0 [ 15.536821] print_report+0xd1/0x650 [ 15.536843] ? __virt_addr_valid+0x1db/0x2d0 [ 15.536867] ? kasan_atomics_helper+0xe78/0x5450 [ 15.536889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.536914] ? kasan_atomics_helper+0xe78/0x5450 [ 15.536938] kasan_report+0x141/0x180 [ 15.536960] ? kasan_atomics_helper+0xe78/0x5450 [ 15.536987] kasan_check_range+0x10c/0x1c0 [ 15.537043] __kasan_check_write+0x18/0x20 [ 15.537064] kasan_atomics_helper+0xe78/0x5450 [ 15.537099] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.537123] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.537150] ? kasan_atomics+0x152/0x310 [ 15.537178] kasan_atomics+0x1dc/0x310 [ 15.537201] ? __pfx_kasan_atomics+0x10/0x10 [ 15.537225] ? trace_hardirqs_on+0x37/0xe0 [ 15.537250] ? __pfx_read_tsc+0x10/0x10 [ 15.537272] ? ktime_get_ts64+0x86/0x230 [ 15.537297] kunit_try_run_case+0x1a5/0x480 [ 15.537322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.537348] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.537374] ? __kthread_parkme+0x82/0x180 [ 15.537395] ? preempt_count_sub+0x50/0x80 [ 15.537419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.537446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.537472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.537499] kthread+0x337/0x6f0 [ 15.537519] ? trace_preempt_on+0x20/0xc0 [ 15.537543] ? __pfx_kthread+0x10/0x10 [ 15.537565] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.537588] ? calculate_sigpending+0x7b/0xa0 [ 15.537614] ? __pfx_kthread+0x10/0x10 [ 15.537636] ret_from_fork+0x116/0x1d0 [ 15.537656] ? __pfx_kthread+0x10/0x10 [ 15.537680] ret_from_fork_asm+0x1a/0x30 [ 15.537725] </TASK> [ 15.537745] [ 15.553778] Allocated by task 282: [ 15.554374] kasan_save_stack+0x45/0x70 [ 15.554810] kasan_save_track+0x18/0x40 [ 15.555328] kasan_save_alloc_info+0x3b/0x50 [ 15.555659] __kasan_kmalloc+0xb7/0xc0 [ 15.556126] __kmalloc_cache_noprof+0x189/0x420 [ 15.556298] kasan_atomics+0x95/0x310 [ 15.556811] kunit_try_run_case+0x1a5/0x480 [ 15.557357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.557763] kthread+0x337/0x6f0 [ 15.557894] ret_from_fork+0x116/0x1d0 [ 15.558037] ret_from_fork_asm+0x1a/0x30 [ 15.558732] [ 15.558908] The buggy address belongs to the object at ffff8881038e3c00 [ 15.558908] which belongs to the cache kmalloc-64 of size 64 [ 15.560281] The buggy address is located 0 bytes to the right of [ 15.560281] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.561273] [ 15.561366] The buggy address belongs to the physical page: [ 15.561930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.562567] flags: 0x200000000000000(node=0|zone=2) [ 15.563116] page_type: f5(slab) [ 15.563260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.563965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.564579] page dumped because: kasan: bad access detected [ 15.565047] [ 15.565257] Memory state around the buggy address: [ 15.565863] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.566399] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.566812] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.567585] ^ [ 15.567993] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.568697] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569191] ================================================================== [ 16.092478] ================================================================== [ 16.092983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.093357] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.093725] [ 16.093838] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.093879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.093892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.093913] Call Trace: [ 16.093926] <TASK> [ 16.093940] dump_stack_lvl+0x73/0xb0 [ 16.093969] print_report+0xd1/0x650 [ 16.093992] ? __virt_addr_valid+0x1db/0x2d0 [ 16.094015] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.094037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.094072] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.094097] kasan_report+0x141/0x180 [ 16.094120] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.094147] kasan_check_range+0x10c/0x1c0 [ 16.094172] __kasan_check_write+0x18/0x20 [ 16.094193] kasan_atomics_helper+0x19e3/0x5450 [ 16.094217] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.094241] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.094267] ? kasan_atomics+0x152/0x310 [ 16.094294] kasan_atomics+0x1dc/0x310 [ 16.094318] ? __pfx_kasan_atomics+0x10/0x10 [ 16.094342] ? trace_hardirqs_on+0x37/0xe0 [ 16.094366] ? __pfx_read_tsc+0x10/0x10 [ 16.094387] ? ktime_get_ts64+0x86/0x230 [ 16.094411] kunit_try_run_case+0x1a5/0x480 [ 16.094436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.094463] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.094489] ? __kthread_parkme+0x82/0x180 [ 16.094511] ? preempt_count_sub+0x50/0x80 [ 16.094536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.094586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094612] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.094638] kthread+0x337/0x6f0 [ 16.094658] ? trace_preempt_on+0x20/0xc0 [ 16.094681] ? __pfx_kthread+0x10/0x10 [ 16.094712] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.094736] ? calculate_sigpending+0x7b/0xa0 [ 16.094761] ? __pfx_kthread+0x10/0x10 [ 16.094783] ret_from_fork+0x116/0x1d0 [ 16.094802] ? __pfx_kthread+0x10/0x10 [ 16.094823] ret_from_fork_asm+0x1a/0x30 [ 16.094856] </TASK> [ 16.094868] [ 16.102397] Allocated by task 282: [ 16.102518] kasan_save_stack+0x45/0x70 [ 16.102692] kasan_save_track+0x18/0x40 [ 16.102899] kasan_save_alloc_info+0x3b/0x50 [ 16.103133] __kasan_kmalloc+0xb7/0xc0 [ 16.103515] __kmalloc_cache_noprof+0x189/0x420 [ 16.103725] kasan_atomics+0x95/0x310 [ 16.103857] kunit_try_run_case+0x1a5/0x480 [ 16.103999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.104219] kthread+0x337/0x6f0 [ 16.104397] ret_from_fork+0x116/0x1d0 [ 16.104584] ret_from_fork_asm+0x1a/0x30 [ 16.104812] [ 16.104908] The buggy address belongs to the object at ffff8881038e3c00 [ 16.104908] which belongs to the cache kmalloc-64 of size 64 [ 16.105558] The buggy address is located 0 bytes to the right of [ 16.105558] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.105921] [ 16.105991] The buggy address belongs to the physical page: [ 16.106219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.106589] flags: 0x200000000000000(node=0|zone=2) [ 16.106849] page_type: f5(slab) [ 16.107122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.107342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.107779] page dumped because: kasan: bad access detected [ 16.108027] [ 16.108125] Memory state around the buggy address: [ 16.108313] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.108529] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.108754] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.109084] ^ [ 16.109330] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.109658] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.109996] ================================================================== [ 16.367863] ================================================================== [ 16.368255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.368567] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.368877] [ 16.368964] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.369006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.369019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.369039] Call Trace: [ 16.369054] <TASK> [ 16.369071] dump_stack_lvl+0x73/0xb0 [ 16.369099] print_report+0xd1/0x650 [ 16.369123] ? __virt_addr_valid+0x1db/0x2d0 [ 16.369147] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.369170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.369203] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.369226] kasan_report+0x141/0x180 [ 16.369249] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.369277] kasan_check_range+0x10c/0x1c0 [ 16.369302] __kasan_check_write+0x18/0x20 [ 16.369323] kasan_atomics_helper+0x20c8/0x5450 [ 16.369347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.369370] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.369396] ? kasan_atomics+0x152/0x310 [ 16.369424] kasan_atomics+0x1dc/0x310 [ 16.369447] ? __pfx_kasan_atomics+0x10/0x10 [ 16.369471] ? trace_hardirqs_on+0x37/0xe0 [ 16.369495] ? __pfx_read_tsc+0x10/0x10 [ 16.369517] ? ktime_get_ts64+0x86/0x230 [ 16.369542] kunit_try_run_case+0x1a5/0x480 [ 16.369567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.369593] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.369619] ? __kthread_parkme+0x82/0x180 [ 16.369641] ? preempt_count_sub+0x50/0x80 [ 16.369666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.369693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.369731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.369757] kthread+0x337/0x6f0 [ 16.369777] ? trace_preempt_on+0x20/0xc0 [ 16.369801] ? __pfx_kthread+0x10/0x10 [ 16.369824] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.369848] ? calculate_sigpending+0x7b/0xa0 [ 16.369874] ? __pfx_kthread+0x10/0x10 [ 16.369896] ret_from_fork+0x116/0x1d0 [ 16.369916] ? __pfx_kthread+0x10/0x10 [ 16.369937] ret_from_fork_asm+0x1a/0x30 [ 16.369970] </TASK> [ 16.369981] [ 16.377461] Allocated by task 282: [ 16.377589] kasan_save_stack+0x45/0x70 [ 16.377743] kasan_save_track+0x18/0x40 [ 16.377935] kasan_save_alloc_info+0x3b/0x50 [ 16.378147] __kasan_kmalloc+0xb7/0xc0 [ 16.378377] __kmalloc_cache_noprof+0x189/0x420 [ 16.378613] kasan_atomics+0x95/0x310 [ 16.378816] kunit_try_run_case+0x1a5/0x480 [ 16.378992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.379277] kthread+0x337/0x6f0 [ 16.379402] ret_from_fork+0x116/0x1d0 [ 16.379593] ret_from_fork_asm+0x1a/0x30 [ 16.379802] [ 16.379894] The buggy address belongs to the object at ffff8881038e3c00 [ 16.379894] which belongs to the cache kmalloc-64 of size 64 [ 16.380245] The buggy address is located 0 bytes to the right of [ 16.380245] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.380723] [ 16.380820] The buggy address belongs to the physical page: [ 16.381083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.381326] flags: 0x200000000000000(node=0|zone=2) [ 16.381805] page_type: f5(slab) [ 16.381949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.382235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.382461] page dumped because: kasan: bad access detected [ 16.382630] [ 16.382721] Memory state around the buggy address: [ 16.382947] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.383460] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.383792] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.384215] ^ [ 16.384444] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.384728] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.385009] ================================================================== [ 15.361175] ================================================================== [ 15.361448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.361788] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.362335] [ 15.362476] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.362521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.362535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.362556] Call Trace: [ 15.362572] <TASK> [ 15.362589] dump_stack_lvl+0x73/0xb0 [ 15.362620] print_report+0xd1/0x650 [ 15.362643] ? __virt_addr_valid+0x1db/0x2d0 [ 15.362666] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.362688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.362724] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.362748] kasan_report+0x141/0x180 [ 15.362770] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.362798] kasan_check_range+0x10c/0x1c0 [ 15.362823] __kasan_check_write+0x18/0x20 [ 15.362844] kasan_atomics_helper+0xa2b/0x5450 [ 15.362893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.362918] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.362944] ? kasan_atomics+0x152/0x310 [ 15.362983] kasan_atomics+0x1dc/0x310 [ 15.363007] ? __pfx_kasan_atomics+0x10/0x10 [ 15.363030] ? trace_hardirqs_on+0x37/0xe0 [ 15.363492] ? __pfx_read_tsc+0x10/0x10 [ 15.363530] ? ktime_get_ts64+0x86/0x230 [ 15.363556] kunit_try_run_case+0x1a5/0x480 [ 15.363582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363610] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.363636] ? __kthread_parkme+0x82/0x180 [ 15.363658] ? preempt_count_sub+0x50/0x80 [ 15.363684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.363744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.363771] kthread+0x337/0x6f0 [ 15.363791] ? trace_preempt_on+0x20/0xc0 [ 15.363814] ? __pfx_kthread+0x10/0x10 [ 15.363836] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.363858] ? calculate_sigpending+0x7b/0xa0 [ 15.363883] ? __pfx_kthread+0x10/0x10 [ 15.363906] ret_from_fork+0x116/0x1d0 [ 15.363925] ? __pfx_kthread+0x10/0x10 [ 15.363947] ret_from_fork_asm+0x1a/0x30 [ 15.363980] </TASK> [ 15.363991] [ 15.373296] Allocated by task 282: [ 15.373430] kasan_save_stack+0x45/0x70 [ 15.373632] kasan_save_track+0x18/0x40 [ 15.373818] kasan_save_alloc_info+0x3b/0x50 [ 15.374007] __kasan_kmalloc+0xb7/0xc0 [ 15.374374] __kmalloc_cache_noprof+0x189/0x420 [ 15.374676] kasan_atomics+0x95/0x310 [ 15.374872] kunit_try_run_case+0x1a5/0x480 [ 15.375217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.375471] kthread+0x337/0x6f0 [ 15.375699] ret_from_fork+0x116/0x1d0 [ 15.375893] ret_from_fork_asm+0x1a/0x30 [ 15.376157] [ 15.376297] The buggy address belongs to the object at ffff8881038e3c00 [ 15.376297] which belongs to the cache kmalloc-64 of size 64 [ 15.376740] The buggy address is located 0 bytes to the right of [ 15.376740] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.377295] [ 15.377394] The buggy address belongs to the physical page: [ 15.377650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.378194] flags: 0x200000000000000(node=0|zone=2) [ 15.378464] page_type: f5(slab) [ 15.378626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.379011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.379324] page dumped because: kasan: bad access detected [ 15.379512] [ 15.379584] Memory state around the buggy address: [ 15.379804] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.380327] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.380695] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.380963] ^ [ 15.381446] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381842] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.382146] ================================================================== [ 15.843296] ================================================================== [ 15.843558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.843928] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.844678] [ 15.844932] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.844979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.844992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.845012] Call Trace: [ 15.845028] <TASK> [ 15.845055] dump_stack_lvl+0x73/0xb0 [ 15.845086] print_report+0xd1/0x650 [ 15.845108] ? __virt_addr_valid+0x1db/0x2d0 [ 15.845132] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.845155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.845180] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.845203] kasan_report+0x141/0x180 [ 15.845226] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.845254] kasan_check_range+0x10c/0x1c0 [ 15.845279] __kasan_check_read+0x15/0x20 [ 15.845298] kasan_atomics_helper+0x13b5/0x5450 [ 15.845322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.845346] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.845371] ? kasan_atomics+0x152/0x310 [ 15.845399] kasan_atomics+0x1dc/0x310 [ 15.845423] ? __pfx_kasan_atomics+0x10/0x10 [ 15.845446] ? trace_hardirqs_on+0x37/0xe0 [ 15.845470] ? __pfx_read_tsc+0x10/0x10 [ 15.845491] ? ktime_get_ts64+0x86/0x230 [ 15.845516] kunit_try_run_case+0x1a5/0x480 [ 15.845541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.845567] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.845593] ? __kthread_parkme+0x82/0x180 [ 15.845614] ? preempt_count_sub+0x50/0x80 [ 15.845639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.845664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.845690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.845728] kthread+0x337/0x6f0 [ 15.845747] ? trace_preempt_on+0x20/0xc0 [ 15.845770] ? __pfx_kthread+0x10/0x10 [ 15.845792] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.845814] ? calculate_sigpending+0x7b/0xa0 [ 15.845840] ? __pfx_kthread+0x10/0x10 [ 15.845862] ret_from_fork+0x116/0x1d0 [ 15.845883] ? __pfx_kthread+0x10/0x10 [ 15.845905] ret_from_fork_asm+0x1a/0x30 [ 15.845937] </TASK> [ 15.845947] [ 15.856139] Allocated by task 282: [ 15.856310] kasan_save_stack+0x45/0x70 [ 15.856586] kasan_save_track+0x18/0x40 [ 15.856802] kasan_save_alloc_info+0x3b/0x50 [ 15.857003] __kasan_kmalloc+0xb7/0xc0 [ 15.857419] __kmalloc_cache_noprof+0x189/0x420 [ 15.857725] kasan_atomics+0x95/0x310 [ 15.858064] kunit_try_run_case+0x1a5/0x480 [ 15.858272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.858592] kthread+0x337/0x6f0 [ 15.858857] ret_from_fork+0x116/0x1d0 [ 15.859005] ret_from_fork_asm+0x1a/0x30 [ 15.859416] [ 15.859655] The buggy address belongs to the object at ffff8881038e3c00 [ 15.859655] which belongs to the cache kmalloc-64 of size 64 [ 15.860326] The buggy address is located 0 bytes to the right of [ 15.860326] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.860909] [ 15.861006] The buggy address belongs to the physical page: [ 15.861259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.861602] flags: 0x200000000000000(node=0|zone=2) [ 15.861842] page_type: f5(slab) [ 15.862005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.862662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.863078] page dumped because: kasan: bad access detected [ 15.863405] [ 15.863505] Memory state around the buggy address: [ 15.863862] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.864338] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.864743] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.865176] ^ [ 15.865528] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.865848] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.866325] ================================================================== [ 15.299342] ================================================================== [ 15.299628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.299869] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.300369] [ 15.300483] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.300524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.300536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.300557] Call Trace: [ 15.300570] <TASK> [ 15.300584] dump_stack_lvl+0x73/0xb0 [ 15.300614] print_report+0xd1/0x650 [ 15.300636] ? __virt_addr_valid+0x1db/0x2d0 [ 15.300660] ? kasan_atomics_helper+0x860/0x5450 [ 15.300682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.300718] ? kasan_atomics_helper+0x860/0x5450 [ 15.300741] kasan_report+0x141/0x180 [ 15.300765] ? kasan_atomics_helper+0x860/0x5450 [ 15.300793] kasan_check_range+0x10c/0x1c0 [ 15.300818] __kasan_check_write+0x18/0x20 [ 15.300838] kasan_atomics_helper+0x860/0x5450 [ 15.300863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.300887] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.300913] ? kasan_atomics+0x152/0x310 [ 15.300941] kasan_atomics+0x1dc/0x310 [ 15.300964] ? __pfx_kasan_atomics+0x10/0x10 [ 15.300989] ? trace_hardirqs_on+0x37/0xe0 [ 15.301013] ? __pfx_read_tsc+0x10/0x10 [ 15.301034] ? ktime_get_ts64+0x86/0x230 [ 15.301059] kunit_try_run_case+0x1a5/0x480 [ 15.301083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.301166] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.301195] ? __kthread_parkme+0x82/0x180 [ 15.301217] ? preempt_count_sub+0x50/0x80 [ 15.301242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.301268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.301294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.301322] kthread+0x337/0x6f0 [ 15.301342] ? trace_preempt_on+0x20/0xc0 [ 15.301366] ? __pfx_kthread+0x10/0x10 [ 15.301387] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.301410] ? calculate_sigpending+0x7b/0xa0 [ 15.301435] ? __pfx_kthread+0x10/0x10 [ 15.301458] ret_from_fork+0x116/0x1d0 [ 15.301478] ? __pfx_kthread+0x10/0x10 [ 15.301499] ret_from_fork_asm+0x1a/0x30 [ 15.301531] </TASK> [ 15.301542] [ 15.309587] Allocated by task 282: [ 15.309732] kasan_save_stack+0x45/0x70 [ 15.309878] kasan_save_track+0x18/0x40 [ 15.310015] kasan_save_alloc_info+0x3b/0x50 [ 15.310175] __kasan_kmalloc+0xb7/0xc0 [ 15.310363] __kmalloc_cache_noprof+0x189/0x420 [ 15.310587] kasan_atomics+0x95/0x310 [ 15.310786] kunit_try_run_case+0x1a5/0x480 [ 15.311053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.311321] kthread+0x337/0x6f0 [ 15.311491] ret_from_fork+0x116/0x1d0 [ 15.311684] ret_from_fork_asm+0x1a/0x30 [ 15.311901] [ 15.311996] The buggy address belongs to the object at ffff8881038e3c00 [ 15.311996] which belongs to the cache kmalloc-64 of size 64 [ 15.312533] The buggy address is located 0 bytes to the right of [ 15.312533] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.312956] [ 15.313066] The buggy address belongs to the physical page: [ 15.313325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.313642] flags: 0x200000000000000(node=0|zone=2) [ 15.313855] page_type: f5(slab) [ 15.313998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.314439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.314666] page dumped because: kasan: bad access detected [ 15.314849] [ 15.314920] Memory state around the buggy address: [ 15.315075] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.315347] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.315754] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.316070] ^ [ 15.316289] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316924] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.317973] ================================================================== [ 15.157744] ================================================================== [ 15.158123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.158425] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.158671] [ 15.158788] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.158829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.158853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.158873] Call Trace: [ 15.158887] <TASK> [ 15.158901] dump_stack_lvl+0x73/0xb0 [ 15.158941] print_report+0xd1/0x650 [ 15.158964] ? __virt_addr_valid+0x1db/0x2d0 [ 15.158987] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.159009] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.159040] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.159079] kasan_report+0x141/0x180 [ 15.159101] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.159129] kasan_check_range+0x10c/0x1c0 [ 15.159154] __kasan_check_write+0x18/0x20 [ 15.159175] kasan_atomics_helper+0x4a0/0x5450 [ 15.159210] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.159235] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.159262] ? kasan_atomics+0x152/0x310 [ 15.159289] kasan_atomics+0x1dc/0x310 [ 15.159313] ? __pfx_kasan_atomics+0x10/0x10 [ 15.159337] ? trace_hardirqs_on+0x37/0xe0 [ 15.159361] ? __pfx_read_tsc+0x10/0x10 [ 15.159392] ? ktime_get_ts64+0x86/0x230 [ 15.159416] kunit_try_run_case+0x1a5/0x480 [ 15.159441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159478] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.159504] ? __kthread_parkme+0x82/0x180 [ 15.159526] ? preempt_count_sub+0x50/0x80 [ 15.159550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.159601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.159627] kthread+0x337/0x6f0 [ 15.159647] ? trace_preempt_on+0x20/0xc0 [ 15.159671] ? __pfx_kthread+0x10/0x10 [ 15.159693] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.159724] ? calculate_sigpending+0x7b/0xa0 [ 15.159758] ? __pfx_kthread+0x10/0x10 [ 15.159781] ret_from_fork+0x116/0x1d0 [ 15.159800] ? __pfx_kthread+0x10/0x10 [ 15.159832] ret_from_fork_asm+0x1a/0x30 [ 15.159864] </TASK> [ 15.159875] [ 15.169012] Allocated by task 282: [ 15.169272] kasan_save_stack+0x45/0x70 [ 15.169484] kasan_save_track+0x18/0x40 [ 15.169687] kasan_save_alloc_info+0x3b/0x50 [ 15.169885] __kasan_kmalloc+0xb7/0xc0 [ 15.170052] __kmalloc_cache_noprof+0x189/0x420 [ 15.170310] kasan_atomics+0x95/0x310 [ 15.170500] kunit_try_run_case+0x1a5/0x480 [ 15.170699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.170942] kthread+0x337/0x6f0 [ 15.171115] ret_from_fork+0x116/0x1d0 [ 15.171459] ret_from_fork_asm+0x1a/0x30 [ 15.171617] [ 15.171688] The buggy address belongs to the object at ffff8881038e3c00 [ 15.171688] which belongs to the cache kmalloc-64 of size 64 [ 15.172796] The buggy address is located 0 bytes to the right of [ 15.172796] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.173827] [ 15.174073] The buggy address belongs to the physical page: [ 15.174542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.174887] flags: 0x200000000000000(node=0|zone=2) [ 15.175339] page_type: f5(slab) [ 15.175686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.176391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.176718] page dumped because: kasan: bad access detected [ 15.176952] [ 15.177296] Memory state around the buggy address: [ 15.177596] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.177912] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.178495] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.178952] ^ [ 15.179361] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179661] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179966] ================================================================== [ 16.039733] ================================================================== [ 16.040085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.040396] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.040659] [ 16.040779] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.040819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.040832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.040851] Call Trace: [ 16.040866] <TASK> [ 16.040904] dump_stack_lvl+0x73/0xb0 [ 16.040933] print_report+0xd1/0x650 [ 16.040957] ? __virt_addr_valid+0x1db/0x2d0 [ 16.040979] ? kasan_atomics_helper+0x1818/0x5450 [ 16.041002] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.041027] ? kasan_atomics_helper+0x1818/0x5450 [ 16.041063] kasan_report+0x141/0x180 [ 16.041085] ? kasan_atomics_helper+0x1818/0x5450 [ 16.041113] kasan_check_range+0x10c/0x1c0 [ 16.041139] __kasan_check_write+0x18/0x20 [ 16.041160] kasan_atomics_helper+0x1818/0x5450 [ 16.041185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.041208] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.041234] ? kasan_atomics+0x152/0x310 [ 16.041261] kasan_atomics+0x1dc/0x310 [ 16.041285] ? __pfx_kasan_atomics+0x10/0x10 [ 16.041308] ? trace_hardirqs_on+0x37/0xe0 [ 16.041332] ? __pfx_read_tsc+0x10/0x10 [ 16.041353] ? ktime_get_ts64+0x86/0x230 [ 16.041379] kunit_try_run_case+0x1a5/0x480 [ 16.041404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.041430] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.041456] ? __kthread_parkme+0x82/0x180 [ 16.041477] ? preempt_count_sub+0x50/0x80 [ 16.041502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.041527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.041553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.041579] kthread+0x337/0x6f0 [ 16.041599] ? trace_preempt_on+0x20/0xc0 [ 16.041643] ? __pfx_kthread+0x10/0x10 [ 16.041666] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.041689] ? calculate_sigpending+0x7b/0xa0 [ 16.041724] ? __pfx_kthread+0x10/0x10 [ 16.041747] ret_from_fork+0x116/0x1d0 [ 16.041766] ? __pfx_kthread+0x10/0x10 [ 16.041787] ret_from_fork_asm+0x1a/0x30 [ 16.041820] </TASK> [ 16.041831] [ 16.049120] Allocated by task 282: [ 16.049307] kasan_save_stack+0x45/0x70 [ 16.049526] kasan_save_track+0x18/0x40 [ 16.049723] kasan_save_alloc_info+0x3b/0x50 [ 16.049890] __kasan_kmalloc+0xb7/0xc0 [ 16.050022] __kmalloc_cache_noprof+0x189/0x420 [ 16.050257] kasan_atomics+0x95/0x310 [ 16.050446] kunit_try_run_case+0x1a5/0x480 [ 16.050622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.050804] kthread+0x337/0x6f0 [ 16.050923] ret_from_fork+0x116/0x1d0 [ 16.051083] ret_from_fork_asm+0x1a/0x30 [ 16.051283] [ 16.051378] The buggy address belongs to the object at ffff8881038e3c00 [ 16.051378] which belongs to the cache kmalloc-64 of size 64 [ 16.051954] The buggy address is located 0 bytes to the right of [ 16.051954] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.052564] [ 16.052661] The buggy address belongs to the physical page: [ 16.052861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.053095] flags: 0x200000000000000(node=0|zone=2) [ 16.053308] page_type: f5(slab) [ 16.053478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.053854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.054195] page dumped because: kasan: bad access detected [ 16.054448] [ 16.054519] Memory state around the buggy address: [ 16.054673] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.054924] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.055240] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.055592] ^ [ 16.055801] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.056018] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.056347] ================================================================== [ 15.423585] ================================================================== [ 15.423916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.424360] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.424716] [ 15.424821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.424876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.424889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.424910] Call Trace: [ 15.424925] <TASK> [ 15.424951] dump_stack_lvl+0x73/0xb0 [ 15.424982] print_report+0xd1/0x650 [ 15.425004] ? __virt_addr_valid+0x1db/0x2d0 [ 15.425027] ? kasan_atomics_helper+0xc70/0x5450 [ 15.425059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.425083] ? kasan_atomics_helper+0xc70/0x5450 [ 15.425106] kasan_report+0x141/0x180 [ 15.425290] ? kasan_atomics_helper+0xc70/0x5450 [ 15.425323] kasan_check_range+0x10c/0x1c0 [ 15.425349] __kasan_check_write+0x18/0x20 [ 15.425370] kasan_atomics_helper+0xc70/0x5450 [ 15.425395] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.425420] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.425446] ? kasan_atomics+0x152/0x310 [ 15.425488] kasan_atomics+0x1dc/0x310 [ 15.425512] ? __pfx_kasan_atomics+0x10/0x10 [ 15.425535] ? trace_hardirqs_on+0x37/0xe0 [ 15.425573] ? __pfx_read_tsc+0x10/0x10 [ 15.425595] ? ktime_get_ts64+0x86/0x230 [ 15.425620] kunit_try_run_case+0x1a5/0x480 [ 15.425645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.425672] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.425699] ? __kthread_parkme+0x82/0x180 [ 15.425730] ? preempt_count_sub+0x50/0x80 [ 15.425755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.425780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.425807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.425833] kthread+0x337/0x6f0 [ 15.425852] ? trace_preempt_on+0x20/0xc0 [ 15.425876] ? __pfx_kthread+0x10/0x10 [ 15.425897] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.425921] ? calculate_sigpending+0x7b/0xa0 [ 15.425945] ? __pfx_kthread+0x10/0x10 [ 15.425967] ret_from_fork+0x116/0x1d0 [ 15.425996] ? __pfx_kthread+0x10/0x10 [ 15.426018] ret_from_fork_asm+0x1a/0x30 [ 15.426049] </TASK> [ 15.426072] [ 15.439449] Allocated by task 282: [ 15.439638] kasan_save_stack+0x45/0x70 [ 15.439847] kasan_save_track+0x18/0x40 [ 15.440002] kasan_save_alloc_info+0x3b/0x50 [ 15.440504] __kasan_kmalloc+0xb7/0xc0 [ 15.440679] __kmalloc_cache_noprof+0x189/0x420 [ 15.440870] kasan_atomics+0x95/0x310 [ 15.441370] kunit_try_run_case+0x1a5/0x480 [ 15.441578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.441797] kthread+0x337/0x6f0 [ 15.441941] ret_from_fork+0x116/0x1d0 [ 15.442362] ret_from_fork_asm+0x1a/0x30 [ 15.442537] [ 15.442617] The buggy address belongs to the object at ffff8881038e3c00 [ 15.442617] which belongs to the cache kmalloc-64 of size 64 [ 15.443018] The buggy address is located 0 bytes to the right of [ 15.443018] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.443368] [ 15.443441] The buggy address belongs to the physical page: [ 15.443607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.443850] flags: 0x200000000000000(node=0|zone=2) [ 15.444010] page_type: f5(slab) [ 15.444130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.444798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.445038] page dumped because: kasan: bad access detected [ 15.445244] [ 15.445360] Memory state around the buggy address: [ 15.446519] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.446844] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.447665] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.448477] ^ [ 15.448642] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449202] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449533] ================================================================== [ 16.128202] ================================================================== [ 16.128542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.128914] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.129216] [ 16.129299] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.129340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.129352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.129373] Call Trace: [ 16.129389] <TASK> [ 16.129405] dump_stack_lvl+0x73/0xb0 [ 16.129433] print_report+0xd1/0x650 [ 16.129456] ? __virt_addr_valid+0x1db/0x2d0 [ 16.129479] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.129502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.129527] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.129550] kasan_report+0x141/0x180 [ 16.129572] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.129600] kasan_check_range+0x10c/0x1c0 [ 16.129624] __kasan_check_write+0x18/0x20 [ 16.129645] kasan_atomics_helper+0x1b22/0x5450 [ 16.129669] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.129693] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.129756] ? kasan_atomics+0x152/0x310 [ 16.129783] kasan_atomics+0x1dc/0x310 [ 16.129808] ? __pfx_kasan_atomics+0x10/0x10 [ 16.129832] ? trace_hardirqs_on+0x37/0xe0 [ 16.129856] ? __pfx_read_tsc+0x10/0x10 [ 16.129877] ? ktime_get_ts64+0x86/0x230 [ 16.129902] kunit_try_run_case+0x1a5/0x480 [ 16.129927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.129954] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.129981] ? __kthread_parkme+0x82/0x180 [ 16.130002] ? preempt_count_sub+0x50/0x80 [ 16.130027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.130062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.130087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.130114] kthread+0x337/0x6f0 [ 16.130134] ? trace_preempt_on+0x20/0xc0 [ 16.130157] ? __pfx_kthread+0x10/0x10 [ 16.130179] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.130202] ? calculate_sigpending+0x7b/0xa0 [ 16.130227] ? __pfx_kthread+0x10/0x10 [ 16.130249] ret_from_fork+0x116/0x1d0 [ 16.130268] ? __pfx_kthread+0x10/0x10 [ 16.130290] ret_from_fork_asm+0x1a/0x30 [ 16.130354] </TASK> [ 16.130365] [ 16.137796] Allocated by task 282: [ 16.137977] kasan_save_stack+0x45/0x70 [ 16.138270] kasan_save_track+0x18/0x40 [ 16.138410] kasan_save_alloc_info+0x3b/0x50 [ 16.138555] __kasan_kmalloc+0xb7/0xc0 [ 16.138755] __kmalloc_cache_noprof+0x189/0x420 [ 16.138973] kasan_atomics+0x95/0x310 [ 16.139156] kunit_try_run_case+0x1a5/0x480 [ 16.139469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.139641] kthread+0x337/0x6f0 [ 16.139780] ret_from_fork+0x116/0x1d0 [ 16.139967] ret_from_fork_asm+0x1a/0x30 [ 16.140275] [ 16.140376] The buggy address belongs to the object at ffff8881038e3c00 [ 16.140376] which belongs to the cache kmalloc-64 of size 64 [ 16.140783] The buggy address is located 0 bytes to the right of [ 16.140783] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.141223] [ 16.141318] The buggy address belongs to the physical page: [ 16.141563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.141915] flags: 0x200000000000000(node=0|zone=2) [ 16.142172] page_type: f5(slab) [ 16.142329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.142647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.142876] page dumped because: kasan: bad access detected [ 16.143044] [ 16.143137] Memory state around the buggy address: [ 16.143501] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.144466] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.144691] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.144909] ^ [ 16.145057] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.145566] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.145897] ================================================================== [ 16.403309] ================================================================== [ 16.403660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.404060] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.404377] [ 16.404489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.404530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.404542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.404583] Call Trace: [ 16.404595] <TASK> [ 16.404610] dump_stack_lvl+0x73/0xb0 [ 16.404638] print_report+0xd1/0x650 [ 16.404661] ? __virt_addr_valid+0x1db/0x2d0 [ 16.404685] ? kasan_atomics_helper+0x218a/0x5450 [ 16.404716] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.404740] ? kasan_atomics_helper+0x218a/0x5450 [ 16.404782] kasan_report+0x141/0x180 [ 16.404805] ? kasan_atomics_helper+0x218a/0x5450 [ 16.404833] kasan_check_range+0x10c/0x1c0 [ 16.404858] __kasan_check_write+0x18/0x20 [ 16.404879] kasan_atomics_helper+0x218a/0x5450 [ 16.404903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.404927] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.404971] ? kasan_atomics+0x152/0x310 [ 16.404999] kasan_atomics+0x1dc/0x310 [ 16.405022] ? __pfx_kasan_atomics+0x10/0x10 [ 16.405066] ? trace_hardirqs_on+0x37/0xe0 [ 16.405091] ? __pfx_read_tsc+0x10/0x10 [ 16.405130] ? ktime_get_ts64+0x86/0x230 [ 16.405155] kunit_try_run_case+0x1a5/0x480 [ 16.405180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.405206] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.405232] ? __kthread_parkme+0x82/0x180 [ 16.405253] ? preempt_count_sub+0x50/0x80 [ 16.405278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.405304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.405330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.405356] kthread+0x337/0x6f0 [ 16.405376] ? trace_preempt_on+0x20/0xc0 [ 16.405416] ? __pfx_kthread+0x10/0x10 [ 16.405439] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.405462] ? calculate_sigpending+0x7b/0xa0 [ 16.405488] ? __pfx_kthread+0x10/0x10 [ 16.405510] ret_from_fork+0x116/0x1d0 [ 16.405529] ? __pfx_kthread+0x10/0x10 [ 16.405551] ret_from_fork_asm+0x1a/0x30 [ 16.405598] </TASK> [ 16.405609] [ 16.413384] Allocated by task 282: [ 16.413603] kasan_save_stack+0x45/0x70 [ 16.413855] kasan_save_track+0x18/0x40 [ 16.414094] kasan_save_alloc_info+0x3b/0x50 [ 16.414265] __kasan_kmalloc+0xb7/0xc0 [ 16.414398] __kmalloc_cache_noprof+0x189/0x420 [ 16.414599] kasan_atomics+0x95/0x310 [ 16.414798] kunit_try_run_case+0x1a5/0x480 [ 16.415045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.415335] kthread+0x337/0x6f0 [ 16.415508] ret_from_fork+0x116/0x1d0 [ 16.415661] ret_from_fork_asm+0x1a/0x30 [ 16.415811] [ 16.415884] The buggy address belongs to the object at ffff8881038e3c00 [ 16.415884] which belongs to the cache kmalloc-64 of size 64 [ 16.416390] The buggy address is located 0 bytes to the right of [ 16.416390] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.416946] [ 16.417057] The buggy address belongs to the physical page: [ 16.417271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.417508] flags: 0x200000000000000(node=0|zone=2) [ 16.417691] page_type: f5(slab) [ 16.417867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.418255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.418609] page dumped because: kasan: bad access detected [ 16.418872] [ 16.418985] Memory state around the buggy address: [ 16.419203] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.419518] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.419835] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.420169] ^ [ 16.420400] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.420695] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.421013] ================================================================== [ 16.446458] ================================================================== [ 16.446800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.447361] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.447843] [ 16.448086] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.448134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.448148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.448168] Call Trace: [ 16.448182] <TASK> [ 16.448197] dump_stack_lvl+0x73/0xb0 [ 16.448263] print_report+0xd1/0x650 [ 16.448288] ? __virt_addr_valid+0x1db/0x2d0 [ 16.448311] ? kasan_atomics_helper+0x224c/0x5450 [ 16.448338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.448363] ? kasan_atomics_helper+0x224c/0x5450 [ 16.448385] kasan_report+0x141/0x180 [ 16.448409] ? kasan_atomics_helper+0x224c/0x5450 [ 16.448437] kasan_check_range+0x10c/0x1c0 [ 16.448462] __kasan_check_write+0x18/0x20 [ 16.448483] kasan_atomics_helper+0x224c/0x5450 [ 16.448507] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.448531] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.448558] ? kasan_atomics+0x152/0x310 [ 16.448586] kasan_atomics+0x1dc/0x310 [ 16.448609] ? __pfx_kasan_atomics+0x10/0x10 [ 16.448633] ? trace_hardirqs_on+0x37/0xe0 [ 16.448657] ? __pfx_read_tsc+0x10/0x10 [ 16.448678] ? ktime_get_ts64+0x86/0x230 [ 16.448714] kunit_try_run_case+0x1a5/0x480 [ 16.448739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.448765] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.448792] ? __kthread_parkme+0x82/0x180 [ 16.448814] ? preempt_count_sub+0x50/0x80 [ 16.448839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.448865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.448891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.448919] kthread+0x337/0x6f0 [ 16.448943] ? trace_preempt_on+0x20/0xc0 [ 16.448967] ? __pfx_kthread+0x10/0x10 [ 16.448989] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.449011] ? calculate_sigpending+0x7b/0xa0 [ 16.449036] ? __pfx_kthread+0x10/0x10 [ 16.449068] ret_from_fork+0x116/0x1d0 [ 16.449088] ? __pfx_kthread+0x10/0x10 [ 16.449109] ret_from_fork_asm+0x1a/0x30 [ 16.449141] </TASK> [ 16.449154] [ 16.460844] Allocated by task 282: [ 16.461030] kasan_save_stack+0x45/0x70 [ 16.461374] kasan_save_track+0x18/0x40 [ 16.461551] kasan_save_alloc_info+0x3b/0x50 [ 16.461747] __kasan_kmalloc+0xb7/0xc0 [ 16.461889] __kmalloc_cache_noprof+0x189/0x420 [ 16.462125] kasan_atomics+0x95/0x310 [ 16.462292] kunit_try_run_case+0x1a5/0x480 [ 16.462436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.462684] kthread+0x337/0x6f0 [ 16.462854] ret_from_fork+0x116/0x1d0 [ 16.463015] ret_from_fork_asm+0x1a/0x30 [ 16.463198] [ 16.463295] The buggy address belongs to the object at ffff8881038e3c00 [ 16.463295] which belongs to the cache kmalloc-64 of size 64 [ 16.463812] The buggy address is located 0 bytes to the right of [ 16.463812] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.464323] [ 16.464410] The buggy address belongs to the physical page: [ 16.464576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.465012] flags: 0x200000000000000(node=0|zone=2) [ 16.465286] page_type: f5(slab) [ 16.465425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.465651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.465984] page dumped because: kasan: bad access detected [ 16.466483] [ 16.466575] Memory state around the buggy address: [ 16.466761] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.466970] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.467273] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.467625] ^ [ 16.467785] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.468051] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.468370] ================================================================== [ 15.696133] ================================================================== [ 15.696410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.696641] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.696878] [ 15.696962] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.697003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.697015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.697035] Call Trace: [ 15.697049] <TASK> [ 15.697064] dump_stack_lvl+0x73/0xb0 [ 15.697091] print_report+0xd1/0x650 [ 15.697113] ? __virt_addr_valid+0x1db/0x2d0 [ 15.697135] ? kasan_atomics_helper+0x1148/0x5450 [ 15.697156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.697180] ? kasan_atomics_helper+0x1148/0x5450 [ 15.697201] kasan_report+0x141/0x180 [ 15.697223] ? kasan_atomics_helper+0x1148/0x5450 [ 15.697250] kasan_check_range+0x10c/0x1c0 [ 15.697274] __kasan_check_write+0x18/0x20 [ 15.697293] kasan_atomics_helper+0x1148/0x5450 [ 15.697753] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.697786] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.697821] ? kasan_atomics+0x152/0x310 [ 15.697849] kasan_atomics+0x1dc/0x310 [ 15.697873] ? __pfx_kasan_atomics+0x10/0x10 [ 15.697897] ? trace_hardirqs_on+0x37/0xe0 [ 15.697921] ? __pfx_read_tsc+0x10/0x10 [ 15.697943] ? ktime_get_ts64+0x86/0x230 [ 15.697968] kunit_try_run_case+0x1a5/0x480 [ 15.697993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.698019] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.698057] ? __kthread_parkme+0x82/0x180 [ 15.698080] ? preempt_count_sub+0x50/0x80 [ 15.698105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.698130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.698157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.698182] kthread+0x337/0x6f0 [ 15.698203] ? trace_preempt_on+0x20/0xc0 [ 15.698226] ? __pfx_kthread+0x10/0x10 [ 15.698248] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.698271] ? calculate_sigpending+0x7b/0xa0 [ 15.698296] ? __pfx_kthread+0x10/0x10 [ 15.698319] ret_from_fork+0x116/0x1d0 [ 15.698338] ? __pfx_kthread+0x10/0x10 [ 15.698359] ret_from_fork_asm+0x1a/0x30 [ 15.698391] </TASK> [ 15.698402] [ 15.712686] Allocated by task 282: [ 15.712864] kasan_save_stack+0x45/0x70 [ 15.713364] kasan_save_track+0x18/0x40 [ 15.713577] kasan_save_alloc_info+0x3b/0x50 [ 15.713745] __kasan_kmalloc+0xb7/0xc0 [ 15.714061] __kmalloc_cache_noprof+0x189/0x420 [ 15.714286] kasan_atomics+0x95/0x310 [ 15.714512] kunit_try_run_case+0x1a5/0x480 [ 15.714678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.714968] kthread+0x337/0x6f0 [ 15.715109] ret_from_fork+0x116/0x1d0 [ 15.715285] ret_from_fork_asm+0x1a/0x30 [ 15.715495] [ 15.715593] The buggy address belongs to the object at ffff8881038e3c00 [ 15.715593] which belongs to the cache kmalloc-64 of size 64 [ 15.716118] The buggy address is located 0 bytes to the right of [ 15.716118] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.716572] [ 15.716669] The buggy address belongs to the physical page: [ 15.716957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.717290] flags: 0x200000000000000(node=0|zone=2) [ 15.717766] page_type: f5(slab) [ 15.717942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.718371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.718659] page dumped because: kasan: bad access detected [ 15.718916] [ 15.719013] Memory state around the buggy address: [ 15.719192] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.719547] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.719978] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.720276] ^ [ 15.720499] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720740] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720963] ================================================================== [ 15.677794] ================================================================== [ 15.678209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.678473] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.678694] [ 15.678818] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.678860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.678872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.678893] Call Trace: [ 15.678907] <TASK> [ 15.678922] dump_stack_lvl+0x73/0xb0 [ 15.678950] print_report+0xd1/0x650 [ 15.678974] ? __virt_addr_valid+0x1db/0x2d0 [ 15.678996] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.679019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.679044] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.679091] kasan_report+0x141/0x180 [ 15.679123] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.679151] __asan_report_load4_noabort+0x18/0x20 [ 15.679177] kasan_atomics_helper+0x4a1c/0x5450 [ 15.679202] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.679225] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.679252] ? kasan_atomics+0x152/0x310 [ 15.679281] kasan_atomics+0x1dc/0x310 [ 15.679304] ? __pfx_kasan_atomics+0x10/0x10 [ 15.679328] ? trace_hardirqs_on+0x37/0xe0 [ 15.679353] ? __pfx_read_tsc+0x10/0x10 [ 15.679375] ? ktime_get_ts64+0x86/0x230 [ 15.679399] kunit_try_run_case+0x1a5/0x480 [ 15.679425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.679451] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.679478] ? __kthread_parkme+0x82/0x180 [ 15.679499] ? preempt_count_sub+0x50/0x80 [ 15.679524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.679550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.679582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.679608] kthread+0x337/0x6f0 [ 15.679629] ? trace_preempt_on+0x20/0xc0 [ 15.679651] ? __pfx_kthread+0x10/0x10 [ 15.679674] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.679696] ? calculate_sigpending+0x7b/0xa0 [ 15.679732] ? __pfx_kthread+0x10/0x10 [ 15.679755] ret_from_fork+0x116/0x1d0 [ 15.679775] ? __pfx_kthread+0x10/0x10 [ 15.679796] ret_from_fork_asm+0x1a/0x30 [ 15.679828] </TASK> [ 15.679839] [ 15.687676] Allocated by task 282: [ 15.687813] kasan_save_stack+0x45/0x70 [ 15.687958] kasan_save_track+0x18/0x40 [ 15.688094] kasan_save_alloc_info+0x3b/0x50 [ 15.688244] __kasan_kmalloc+0xb7/0xc0 [ 15.688431] __kmalloc_cache_noprof+0x189/0x420 [ 15.688755] kasan_atomics+0x95/0x310 [ 15.688945] kunit_try_run_case+0x1a5/0x480 [ 15.689382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.689646] kthread+0x337/0x6f0 [ 15.689824] ret_from_fork+0x116/0x1d0 [ 15.690002] ret_from_fork_asm+0x1a/0x30 [ 15.690211] [ 15.690282] The buggy address belongs to the object at ffff8881038e3c00 [ 15.690282] which belongs to the cache kmalloc-64 of size 64 [ 15.690631] The buggy address is located 0 bytes to the right of [ 15.690631] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.691007] [ 15.691080] The buggy address belongs to the physical page: [ 15.691331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.691694] flags: 0x200000000000000(node=0|zone=2) [ 15.691942] page_type: f5(slab) [ 15.692111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.692466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.692818] page dumped because: kasan: bad access detected [ 15.693076] [ 15.693171] Memory state around the buggy address: [ 15.693401] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.693772] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.694149] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.694460] ^ [ 15.694712] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694928] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.695419] ================================================================== [ 15.223733] ================================================================== [ 15.224036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.224886] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.225238] [ 15.225360] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.225403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.225416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.225437] Call Trace: [ 15.225451] <TASK> [ 15.225465] dump_stack_lvl+0x73/0xb0 [ 15.225494] print_report+0xd1/0x650 [ 15.225517] ? __virt_addr_valid+0x1db/0x2d0 [ 15.225540] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.225562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.225587] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.225610] kasan_report+0x141/0x180 [ 15.225633] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.225662] kasan_check_range+0x10c/0x1c0 [ 15.225687] __kasan_check_write+0x18/0x20 [ 15.225719] kasan_atomics_helper+0x5fe/0x5450 [ 15.225742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.225766] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.225792] ? kasan_atomics+0x152/0x310 [ 15.225819] kasan_atomics+0x1dc/0x310 [ 15.225843] ? __pfx_kasan_atomics+0x10/0x10 [ 15.225866] ? trace_hardirqs_on+0x37/0xe0 [ 15.225891] ? __pfx_read_tsc+0x10/0x10 [ 15.225912] ? ktime_get_ts64+0x86/0x230 [ 15.225936] kunit_try_run_case+0x1a5/0x480 [ 15.225962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.225988] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.226014] ? __kthread_parkme+0x82/0x180 [ 15.226099] ? preempt_count_sub+0x50/0x80 [ 15.226125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.226151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.226177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.226204] kthread+0x337/0x6f0 [ 15.226223] ? trace_preempt_on+0x20/0xc0 [ 15.226247] ? __pfx_kthread+0x10/0x10 [ 15.226268] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.226291] ? calculate_sigpending+0x7b/0xa0 [ 15.226315] ? __pfx_kthread+0x10/0x10 [ 15.226339] ret_from_fork+0x116/0x1d0 [ 15.226358] ? __pfx_kthread+0x10/0x10 [ 15.226381] ret_from_fork_asm+0x1a/0x30 [ 15.226414] </TASK> [ 15.226426] [ 15.234287] Allocated by task 282: [ 15.234468] kasan_save_stack+0x45/0x70 [ 15.234666] kasan_save_track+0x18/0x40 [ 15.234845] kasan_save_alloc_info+0x3b/0x50 [ 15.234995] __kasan_kmalloc+0xb7/0xc0 [ 15.235450] __kmalloc_cache_noprof+0x189/0x420 [ 15.235695] kasan_atomics+0x95/0x310 [ 15.235842] kunit_try_run_case+0x1a5/0x480 [ 15.235990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.236243] kthread+0x337/0x6f0 [ 15.236419] ret_from_fork+0x116/0x1d0 [ 15.236763] ret_from_fork_asm+0x1a/0x30 [ 15.237315] [ 15.237404] The buggy address belongs to the object at ffff8881038e3c00 [ 15.237404] which belongs to the cache kmalloc-64 of size 64 [ 15.237799] The buggy address is located 0 bytes to the right of [ 15.237799] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.238346] [ 15.238493] The buggy address belongs to the physical page: [ 15.238753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.239142] flags: 0x200000000000000(node=0|zone=2) [ 15.239345] page_type: f5(slab) [ 15.239466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.239721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.240055] page dumped because: kasan: bad access detected [ 15.240328] [ 15.240416] Memory state around the buggy address: [ 15.240598] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.240890] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.241217] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.241558] ^ [ 15.241761] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241977] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.242567] ================================================================== [ 15.570071] ================================================================== [ 15.570580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.570866] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.571694] [ 15.571878] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.571921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.571934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.571957] Call Trace: [ 15.571971] <TASK> [ 15.571986] dump_stack_lvl+0x73/0xb0 [ 15.572016] print_report+0xd1/0x650 [ 15.572052] ? __virt_addr_valid+0x1db/0x2d0 [ 15.572076] ? kasan_atomics_helper+0xf10/0x5450 [ 15.572110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.572146] ? kasan_atomics_helper+0xf10/0x5450 [ 15.572169] kasan_report+0x141/0x180 [ 15.572192] ? kasan_atomics_helper+0xf10/0x5450 [ 15.572219] kasan_check_range+0x10c/0x1c0 [ 15.572244] __kasan_check_write+0x18/0x20 [ 15.572265] kasan_atomics_helper+0xf10/0x5450 [ 15.572288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.572312] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.572345] ? kasan_atomics+0x152/0x310 [ 15.572373] kasan_atomics+0x1dc/0x310 [ 15.572396] ? __pfx_kasan_atomics+0x10/0x10 [ 15.572420] ? trace_hardirqs_on+0x37/0xe0 [ 15.572445] ? __pfx_read_tsc+0x10/0x10 [ 15.572468] ? ktime_get_ts64+0x86/0x230 [ 15.572493] kunit_try_run_case+0x1a5/0x480 [ 15.572518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572544] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.572571] ? __kthread_parkme+0x82/0x180 [ 15.572592] ? preempt_count_sub+0x50/0x80 [ 15.572617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.572668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.572694] kthread+0x337/0x6f0 [ 15.572725] ? trace_preempt_on+0x20/0xc0 [ 15.572748] ? __pfx_kthread+0x10/0x10 [ 15.572771] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.572794] ? calculate_sigpending+0x7b/0xa0 [ 15.572821] ? __pfx_kthread+0x10/0x10 [ 15.572845] ret_from_fork+0x116/0x1d0 [ 15.572865] ? __pfx_kthread+0x10/0x10 [ 15.572887] ret_from_fork_asm+0x1a/0x30 [ 15.572920] </TASK> [ 15.572932] [ 15.585685] Allocated by task 282: [ 15.585961] kasan_save_stack+0x45/0x70 [ 15.586338] kasan_save_track+0x18/0x40 [ 15.586757] kasan_save_alloc_info+0x3b/0x50 [ 15.586918] __kasan_kmalloc+0xb7/0xc0 [ 15.587092] __kmalloc_cache_noprof+0x189/0x420 [ 15.587516] kasan_atomics+0x95/0x310 [ 15.587884] kunit_try_run_case+0x1a5/0x480 [ 15.588369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.588919] kthread+0x337/0x6f0 [ 15.589251] ret_from_fork+0x116/0x1d0 [ 15.589606] ret_from_fork_asm+0x1a/0x30 [ 15.589832] [ 15.589923] The buggy address belongs to the object at ffff8881038e3c00 [ 15.589923] which belongs to the cache kmalloc-64 of size 64 [ 15.591020] The buggy address is located 0 bytes to the right of [ 15.591020] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.591905] [ 15.592065] The buggy address belongs to the physical page: [ 15.592681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.593279] flags: 0x200000000000000(node=0|zone=2) [ 15.593595] page_type: f5(slab) [ 15.593887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.594137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.594976] page dumped because: kasan: bad access detected [ 15.595172] [ 15.595349] Memory state around the buggy address: [ 15.595846] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.596739] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.597211] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.597807] ^ [ 15.598291] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.598876] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.599350] ================================================================== [ 16.074492] ================================================================== [ 16.074751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.075092] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.075653] [ 16.075848] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.075889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.075901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.075921] Call Trace: [ 16.075934] <TASK> [ 16.075948] dump_stack_lvl+0x73/0xb0 [ 16.075976] print_report+0xd1/0x650 [ 16.076000] ? __virt_addr_valid+0x1db/0x2d0 [ 16.076023] ? kasan_atomics_helper+0x194a/0x5450 [ 16.076045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.076090] ? kasan_atomics_helper+0x194a/0x5450 [ 16.076114] kasan_report+0x141/0x180 [ 16.076137] ? kasan_atomics_helper+0x194a/0x5450 [ 16.076166] kasan_check_range+0x10c/0x1c0 [ 16.076191] __kasan_check_write+0x18/0x20 [ 16.076212] kasan_atomics_helper+0x194a/0x5450 [ 16.076235] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.076260] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.076286] ? kasan_atomics+0x152/0x310 [ 16.076330] kasan_atomics+0x1dc/0x310 [ 16.076355] ? __pfx_kasan_atomics+0x10/0x10 [ 16.076379] ? trace_hardirqs_on+0x37/0xe0 [ 16.076403] ? __pfx_read_tsc+0x10/0x10 [ 16.076426] ? ktime_get_ts64+0x86/0x230 [ 16.076449] kunit_try_run_case+0x1a5/0x480 [ 16.076475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.076501] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.076526] ? __kthread_parkme+0x82/0x180 [ 16.076548] ? preempt_count_sub+0x50/0x80 [ 16.076574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.076600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.076626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.076653] kthread+0x337/0x6f0 [ 16.076672] ? trace_preempt_on+0x20/0xc0 [ 16.076695] ? __pfx_kthread+0x10/0x10 [ 16.076728] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.076750] ? calculate_sigpending+0x7b/0xa0 [ 16.076775] ? __pfx_kthread+0x10/0x10 [ 16.076798] ret_from_fork+0x116/0x1d0 [ 16.076817] ? __pfx_kthread+0x10/0x10 [ 16.076839] ret_from_fork_asm+0x1a/0x30 [ 16.076871] </TASK> [ 16.076882] [ 16.084198] Allocated by task 282: [ 16.084402] kasan_save_stack+0x45/0x70 [ 16.084621] kasan_save_track+0x18/0x40 [ 16.084829] kasan_save_alloc_info+0x3b/0x50 [ 16.085037] __kasan_kmalloc+0xb7/0xc0 [ 16.085267] __kmalloc_cache_noprof+0x189/0x420 [ 16.085454] kasan_atomics+0x95/0x310 [ 16.085664] kunit_try_run_case+0x1a5/0x480 [ 16.085890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.086163] kthread+0x337/0x6f0 [ 16.086339] ret_from_fork+0x116/0x1d0 [ 16.086514] ret_from_fork_asm+0x1a/0x30 [ 16.086720] [ 16.086811] The buggy address belongs to the object at ffff8881038e3c00 [ 16.086811] which belongs to the cache kmalloc-64 of size 64 [ 16.087282] The buggy address is located 0 bytes to the right of [ 16.087282] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.087795] [ 16.087895] The buggy address belongs to the physical page: [ 16.088160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.088398] flags: 0x200000000000000(node=0|zone=2) [ 16.088555] page_type: f5(slab) [ 16.088672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.088938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.089286] page dumped because: kasan: bad access detected [ 16.089747] [ 16.089840] Memory state around the buggy address: [ 16.090061] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.090374] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.090650] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.090867] ^ [ 16.091017] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.091224] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.091472] ================================================================== [ 16.213396] ================================================================== [ 16.214094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.214951] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.215423] [ 16.215647] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.215815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.215834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.215856] Call Trace: [ 16.215873] <TASK> [ 16.215902] dump_stack_lvl+0x73/0xb0 [ 16.215936] print_report+0xd1/0x650 [ 16.215996] ? __virt_addr_valid+0x1db/0x2d0 [ 16.216021] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.216055] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.216080] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.216104] kasan_report+0x141/0x180 [ 16.216127] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.216155] kasan_check_range+0x10c/0x1c0 [ 16.216180] __kasan_check_write+0x18/0x20 [ 16.216201] kasan_atomics_helper+0x1d7a/0x5450 [ 16.216225] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.216249] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.216276] ? kasan_atomics+0x152/0x310 [ 16.216303] kasan_atomics+0x1dc/0x310 [ 16.216331] ? __pfx_kasan_atomics+0x10/0x10 [ 16.216355] ? trace_hardirqs_on+0x37/0xe0 [ 16.216380] ? __pfx_read_tsc+0x10/0x10 [ 16.216402] ? ktime_get_ts64+0x86/0x230 [ 16.216427] kunit_try_run_case+0x1a5/0x480 [ 16.216453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216478] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.216506] ? __kthread_parkme+0x82/0x180 [ 16.216527] ? preempt_count_sub+0x50/0x80 [ 16.216553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.216605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.216631] kthread+0x337/0x6f0 [ 16.216651] ? trace_preempt_on+0x20/0xc0 [ 16.216675] ? __pfx_kthread+0x10/0x10 [ 16.216696] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.216730] ? calculate_sigpending+0x7b/0xa0 [ 16.216754] ? __pfx_kthread+0x10/0x10 [ 16.216777] ret_from_fork+0x116/0x1d0 [ 16.216796] ? __pfx_kthread+0x10/0x10 [ 16.216818] ret_from_fork_asm+0x1a/0x30 [ 16.216850] </TASK> [ 16.216862] [ 16.226504] Allocated by task 282: [ 16.226634] kasan_save_stack+0x45/0x70 [ 16.226789] kasan_save_track+0x18/0x40 [ 16.226923] kasan_save_alloc_info+0x3b/0x50 [ 16.227125] __kasan_kmalloc+0xb7/0xc0 [ 16.227845] __kmalloc_cache_noprof+0x189/0x420 [ 16.228298] kasan_atomics+0x95/0x310 [ 16.228688] kunit_try_run_case+0x1a5/0x480 [ 16.229181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.229688] kthread+0x337/0x6f0 [ 16.230157] ret_from_fork+0x116/0x1d0 [ 16.230408] ret_from_fork_asm+0x1a/0x30 [ 16.230580] [ 16.230669] The buggy address belongs to the object at ffff8881038e3c00 [ 16.230669] which belongs to the cache kmalloc-64 of size 64 [ 16.231315] The buggy address is located 0 bytes to the right of [ 16.231315] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.231766] [ 16.231856] The buggy address belongs to the physical page: [ 16.232175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.233097] flags: 0x200000000000000(node=0|zone=2) [ 16.233401] page_type: f5(slab) [ 16.233531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.233774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.234015] page dumped because: kasan: bad access detected [ 16.234187] [ 16.234256] Memory state around the buggy address: [ 16.234408] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.234621] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.235571] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.236466] ^ [ 16.236843] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.237525] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.237978] ================================================================== [ 15.129278] ================================================================== [ 15.129647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.130521] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.131117] [ 15.131324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.131367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.131402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.131424] Call Trace: [ 15.131441] <TASK> [ 15.131456] dump_stack_lvl+0x73/0xb0 [ 15.131499] print_report+0xd1/0x650 [ 15.131523] ? __virt_addr_valid+0x1db/0x2d0 [ 15.131546] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.131569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.131594] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.131617] kasan_report+0x141/0x180 [ 15.131669] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.131697] __asan_report_load4_noabort+0x18/0x20 [ 15.131739] kasan_atomics_helper+0x4b54/0x5450 [ 15.131763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.131787] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.131813] ? kasan_atomics+0x152/0x310 [ 15.131841] kasan_atomics+0x1dc/0x310 [ 15.131864] ? __pfx_kasan_atomics+0x10/0x10 [ 15.131887] ? trace_hardirqs_on+0x37/0xe0 [ 15.131912] ? __pfx_read_tsc+0x10/0x10 [ 15.131934] ? ktime_get_ts64+0x86/0x230 [ 15.131959] kunit_try_run_case+0x1a5/0x480 [ 15.131985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.132017] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.132045] ? __kthread_parkme+0x82/0x180 [ 15.132066] ? preempt_count_sub+0x50/0x80 [ 15.132090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.132116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.132142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.132169] kthread+0x337/0x6f0 [ 15.132189] ? trace_preempt_on+0x20/0xc0 [ 15.132212] ? __pfx_kthread+0x10/0x10 [ 15.132234] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.132257] ? calculate_sigpending+0x7b/0xa0 [ 15.132283] ? __pfx_kthread+0x10/0x10 [ 15.132305] ret_from_fork+0x116/0x1d0 [ 15.132331] ? __pfx_kthread+0x10/0x10 [ 15.132352] ret_from_fork_asm+0x1a/0x30 [ 15.132384] </TASK> [ 15.132395] [ 15.147084] Allocated by task 282: [ 15.147450] kasan_save_stack+0x45/0x70 [ 15.147841] kasan_save_track+0x18/0x40 [ 15.148261] kasan_save_alloc_info+0x3b/0x50 [ 15.148719] __kasan_kmalloc+0xb7/0xc0 [ 15.148889] __kmalloc_cache_noprof+0x189/0x420 [ 15.149069] kasan_atomics+0x95/0x310 [ 15.149485] kunit_try_run_case+0x1a5/0x480 [ 15.149897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.150558] kthread+0x337/0x6f0 [ 15.150923] ret_from_fork+0x116/0x1d0 [ 15.151261] ret_from_fork_asm+0x1a/0x30 [ 15.151405] [ 15.151477] The buggy address belongs to the object at ffff8881038e3c00 [ 15.151477] which belongs to the cache kmalloc-64 of size 64 [ 15.151848] The buggy address is located 0 bytes to the right of [ 15.151848] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.152476] [ 15.152549] The buggy address belongs to the physical page: [ 15.152785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.153181] flags: 0x200000000000000(node=0|zone=2) [ 15.153438] page_type: f5(slab) [ 15.153679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.153939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.154557] page dumped because: kasan: bad access detected [ 15.154821] [ 15.154959] Memory state around the buggy address: [ 15.155186] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.155559] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.155829] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.156153] ^ [ 15.156409] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.156772] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.157051] ================================================================== [ 15.018967] ================================================================== [ 15.019428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.019904] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.020582] [ 15.020714] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.020761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.020797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.020882] Call Trace: [ 15.020896] <TASK> [ 15.020913] dump_stack_lvl+0x73/0xb0 [ 15.020946] print_report+0xd1/0x650 [ 15.020968] ? __virt_addr_valid+0x1db/0x2d0 [ 15.020993] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.021014] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.021037] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.021227] kasan_report+0x141/0x180 [ 15.021251] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.021279] __asan_report_store4_noabort+0x1b/0x30 [ 15.021305] kasan_atomics_helper+0x4ba2/0x5450 [ 15.021328] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.021351] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.021377] ? kasan_atomics+0x152/0x310 [ 15.021404] kasan_atomics+0x1dc/0x310 [ 15.021426] ? __pfx_kasan_atomics+0x10/0x10 [ 15.021448] ? trace_hardirqs_on+0x37/0xe0 [ 15.021473] ? __pfx_read_tsc+0x10/0x10 [ 15.021496] ? ktime_get_ts64+0x86/0x230 [ 15.021521] kunit_try_run_case+0x1a5/0x480 [ 15.021546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.021571] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.021598] ? __kthread_parkme+0x82/0x180 [ 15.021619] ? preempt_count_sub+0x50/0x80 [ 15.021644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.021668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.021694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.021733] kthread+0x337/0x6f0 [ 15.021752] ? trace_preempt_on+0x20/0xc0 [ 15.021775] ? __pfx_kthread+0x10/0x10 [ 15.021795] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.021817] ? calculate_sigpending+0x7b/0xa0 [ 15.021841] ? __pfx_kthread+0x10/0x10 [ 15.021863] ret_from_fork+0x116/0x1d0 [ 15.021881] ? __pfx_kthread+0x10/0x10 [ 15.021902] ret_from_fork_asm+0x1a/0x30 [ 15.021933] </TASK> [ 15.021944] [ 15.033868] Allocated by task 282: [ 15.034414] kasan_save_stack+0x45/0x70 [ 15.034630] kasan_save_track+0x18/0x40 [ 15.034825] kasan_save_alloc_info+0x3b/0x50 [ 15.035169] __kasan_kmalloc+0xb7/0xc0 [ 15.035516] __kmalloc_cache_noprof+0x189/0x420 [ 15.035764] kasan_atomics+0x95/0x310 [ 15.036145] kunit_try_run_case+0x1a5/0x480 [ 15.036326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.036742] kthread+0x337/0x6f0 [ 15.036929] ret_from_fork+0x116/0x1d0 [ 15.037391] ret_from_fork_asm+0x1a/0x30 [ 15.037589] [ 15.037669] The buggy address belongs to the object at ffff8881038e3c00 [ 15.037669] which belongs to the cache kmalloc-64 of size 64 [ 15.038312] The buggy address is located 0 bytes to the right of [ 15.038312] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.039364] [ 15.039712] The buggy address belongs to the physical page: [ 15.039961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.040483] flags: 0x200000000000000(node=0|zone=2) [ 15.040742] page_type: f5(slab) [ 15.040916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.041552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.041910] page dumped because: kasan: bad access detected [ 15.042616] [ 15.042730] Memory state around the buggy address: [ 15.042926] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.043503] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.044004] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.044366] ^ [ 15.044597] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.044909] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.045498] ================================================================== [ 15.280456] ================================================================== [ 15.281080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.281424] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.281761] [ 15.281869] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.281910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.281923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.281944] Call Trace: [ 15.281958] <TASK> [ 15.281974] dump_stack_lvl+0x73/0xb0 [ 15.282003] print_report+0xd1/0x650 [ 15.282086] ? __virt_addr_valid+0x1db/0x2d0 [ 15.282115] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.282137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.282162] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.282186] kasan_report+0x141/0x180 [ 15.282209] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.282236] kasan_check_range+0x10c/0x1c0 [ 15.282262] __kasan_check_write+0x18/0x20 [ 15.282283] kasan_atomics_helper+0x7c7/0x5450 [ 15.282306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.282331] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.282358] ? kasan_atomics+0x152/0x310 [ 15.282386] kasan_atomics+0x1dc/0x310 [ 15.282409] ? __pfx_kasan_atomics+0x10/0x10 [ 15.282433] ? trace_hardirqs_on+0x37/0xe0 [ 15.282457] ? __pfx_read_tsc+0x10/0x10 [ 15.282478] ? ktime_get_ts64+0x86/0x230 [ 15.282502] kunit_try_run_case+0x1a5/0x480 [ 15.282527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.282553] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.282580] ? __kthread_parkme+0x82/0x180 [ 15.282601] ? preempt_count_sub+0x50/0x80 [ 15.282625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.282652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.282677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.282714] kthread+0x337/0x6f0 [ 15.282735] ? trace_preempt_on+0x20/0xc0 [ 15.282757] ? __pfx_kthread+0x10/0x10 [ 15.282780] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.282802] ? calculate_sigpending+0x7b/0xa0 [ 15.282827] ? __pfx_kthread+0x10/0x10 [ 15.282850] ret_from_fork+0x116/0x1d0 [ 15.282869] ? __pfx_kthread+0x10/0x10 [ 15.282891] ret_from_fork_asm+0x1a/0x30 [ 15.282922] </TASK> [ 15.282934] [ 15.290594] Allocated by task 282: [ 15.290782] kasan_save_stack+0x45/0x70 [ 15.290961] kasan_save_track+0x18/0x40 [ 15.291201] kasan_save_alloc_info+0x3b/0x50 [ 15.291387] __kasan_kmalloc+0xb7/0xc0 [ 15.291521] __kmalloc_cache_noprof+0x189/0x420 [ 15.291678] kasan_atomics+0x95/0x310 [ 15.291858] kunit_try_run_case+0x1a5/0x480 [ 15.292065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.292455] kthread+0x337/0x6f0 [ 15.292779] ret_from_fork+0x116/0x1d0 [ 15.292948] ret_from_fork_asm+0x1a/0x30 [ 15.293191] [ 15.293282] The buggy address belongs to the object at ffff8881038e3c00 [ 15.293282] which belongs to the cache kmalloc-64 of size 64 [ 15.293698] The buggy address is located 0 bytes to the right of [ 15.293698] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.294070] [ 15.294164] The buggy address belongs to the physical page: [ 15.294422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.295001] flags: 0x200000000000000(node=0|zone=2) [ 15.295391] page_type: f5(slab) [ 15.295513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.295757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.295983] page dumped because: kasan: bad access detected [ 15.296153] [ 15.296352] Memory state around the buggy address: [ 15.296584] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.296915] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.297234] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.297712] ^ [ 15.298012] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.298569] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.298881] ================================================================== [ 15.318652] ================================================================== [ 15.318999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.319446] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.319807] [ 15.319920] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.319962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.319975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.320006] Call Trace: [ 15.320020] <TASK> [ 15.320034] dump_stack_lvl+0x73/0xb0 [ 15.320075] print_report+0xd1/0x650 [ 15.320245] ? __virt_addr_valid+0x1db/0x2d0 [ 15.320270] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.320292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.320323] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.320346] kasan_report+0x141/0x180 [ 15.320369] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.320409] kasan_check_range+0x10c/0x1c0 [ 15.320434] __kasan_check_write+0x18/0x20 [ 15.320455] kasan_atomics_helper+0x8f9/0x5450 [ 15.320491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.320515] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.320541] ? kasan_atomics+0x152/0x310 [ 15.320569] kasan_atomics+0x1dc/0x310 [ 15.320593] ? __pfx_kasan_atomics+0x10/0x10 [ 15.320616] ? trace_hardirqs_on+0x37/0xe0 [ 15.320641] ? __pfx_read_tsc+0x10/0x10 [ 15.320663] ? ktime_get_ts64+0x86/0x230 [ 15.320688] kunit_try_run_case+0x1a5/0x480 [ 15.320740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.320767] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.320793] ? __kthread_parkme+0x82/0x180 [ 15.320816] ? preempt_count_sub+0x50/0x80 [ 15.320840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.320865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.320901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.320927] kthread+0x337/0x6f0 [ 15.320958] ? trace_preempt_on+0x20/0xc0 [ 15.320981] ? __pfx_kthread+0x10/0x10 [ 15.321003] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.321025] ? calculate_sigpending+0x7b/0xa0 [ 15.321097] ? __pfx_kthread+0x10/0x10 [ 15.321119] ret_from_fork+0x116/0x1d0 [ 15.321139] ? __pfx_kthread+0x10/0x10 [ 15.321204] ret_from_fork_asm+0x1a/0x30 [ 15.321237] </TASK> [ 15.321248] [ 15.329809] Allocated by task 282: [ 15.329942] kasan_save_stack+0x45/0x70 [ 15.330089] kasan_save_track+0x18/0x40 [ 15.330512] kasan_save_alloc_info+0x3b/0x50 [ 15.330970] __kasan_kmalloc+0xb7/0xc0 [ 15.331314] __kmalloc_cache_noprof+0x189/0x420 [ 15.331779] kasan_atomics+0x95/0x310 [ 15.332068] kunit_try_run_case+0x1a5/0x480 [ 15.332575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.332775] kthread+0x337/0x6f0 [ 15.332901] ret_from_fork+0x116/0x1d0 [ 15.333253] ret_from_fork_asm+0x1a/0x30 [ 15.333629] [ 15.333783] The buggy address belongs to the object at ffff8881038e3c00 [ 15.333783] which belongs to the cache kmalloc-64 of size 64 [ 15.334551] The buggy address is located 0 bytes to the right of [ 15.334551] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.335173] [ 15.335289] The buggy address belongs to the physical page: [ 15.335507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.335758] flags: 0x200000000000000(node=0|zone=2) [ 15.335993] page_type: f5(slab) [ 15.336476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.336838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.337071] page dumped because: kasan: bad access detected [ 15.337307] [ 15.337509] Memory state around the buggy address: [ 15.337810] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.338138] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.338541] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.338888] ^ [ 15.339174] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.339405] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.339741] ================================================================== [ 15.073116] ================================================================== [ 15.073763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.074475] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.074847] [ 15.075226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.075271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.075283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.075304] Call Trace: [ 15.075317] <TASK> [ 15.075480] dump_stack_lvl+0x73/0xb0 [ 15.075516] print_report+0xd1/0x650 [ 15.075652] ? __virt_addr_valid+0x1db/0x2d0 [ 15.075677] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.075732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.075758] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.075782] kasan_report+0x141/0x180 [ 15.075805] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.075834] __asan_report_store4_noabort+0x1b/0x30 [ 15.075860] kasan_atomics_helper+0x4b6e/0x5450 [ 15.075885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.075909] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.075935] ? kasan_atomics+0x152/0x310 [ 15.075962] kasan_atomics+0x1dc/0x310 [ 15.075986] ? __pfx_kasan_atomics+0x10/0x10 [ 15.076010] ? trace_hardirqs_on+0x37/0xe0 [ 15.076099] ? __pfx_read_tsc+0x10/0x10 [ 15.076124] ? ktime_get_ts64+0x86/0x230 [ 15.076150] kunit_try_run_case+0x1a5/0x480 [ 15.076176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.076202] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.076230] ? __kthread_parkme+0x82/0x180 [ 15.076251] ? preempt_count_sub+0x50/0x80 [ 15.076277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.076302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.076336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.076363] kthread+0x337/0x6f0 [ 15.076383] ? trace_preempt_on+0x20/0xc0 [ 15.076407] ? __pfx_kthread+0x10/0x10 [ 15.076428] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.076451] ? calculate_sigpending+0x7b/0xa0 [ 15.076476] ? __pfx_kthread+0x10/0x10 [ 15.076499] ret_from_fork+0x116/0x1d0 [ 15.076519] ? __pfx_kthread+0x10/0x10 [ 15.076540] ret_from_fork_asm+0x1a/0x30 [ 15.076573] </TASK> [ 15.076584] [ 15.088259] Allocated by task 282: [ 15.088633] kasan_save_stack+0x45/0x70 [ 15.088859] kasan_save_track+0x18/0x40 [ 15.089188] kasan_save_alloc_info+0x3b/0x50 [ 15.089428] __kasan_kmalloc+0xb7/0xc0 [ 15.089771] __kmalloc_cache_noprof+0x189/0x420 [ 15.090083] kasan_atomics+0x95/0x310 [ 15.090439] kunit_try_run_case+0x1a5/0x480 [ 15.090626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090868] kthread+0x337/0x6f0 [ 15.091407] ret_from_fork+0x116/0x1d0 [ 15.091613] ret_from_fork_asm+0x1a/0x30 [ 15.091880] [ 15.091988] The buggy address belongs to the object at ffff8881038e3c00 [ 15.091988] which belongs to the cache kmalloc-64 of size 64 [ 15.092948] The buggy address is located 0 bytes to the right of [ 15.092948] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.093748] [ 15.094055] The buggy address belongs to the physical page: [ 15.094422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.095013] flags: 0x200000000000000(node=0|zone=2) [ 15.095431] page_type: f5(slab) [ 15.095600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.096024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.096386] page dumped because: kasan: bad access detected [ 15.096633] [ 15.096735] Memory state around the buggy address: [ 15.096955] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.097662] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.097975] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.098796] ^ [ 15.099017] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.099559] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.099990] ================================================================== [ 15.510827] ================================================================== [ 15.511521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.511987] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.512669] [ 15.513024] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.513153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.513167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.513189] Call Trace: [ 15.513208] <TASK> [ 15.513225] dump_stack_lvl+0x73/0xb0 [ 15.513258] print_report+0xd1/0x650 [ 15.513281] ? __virt_addr_valid+0x1db/0x2d0 [ 15.513305] ? kasan_atomics_helper+0xde0/0x5450 [ 15.513329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.513354] ? kasan_atomics_helper+0xde0/0x5450 [ 15.513378] kasan_report+0x141/0x180 [ 15.513401] ? kasan_atomics_helper+0xde0/0x5450 [ 15.513429] kasan_check_range+0x10c/0x1c0 [ 15.513455] __kasan_check_write+0x18/0x20 [ 15.513475] kasan_atomics_helper+0xde0/0x5450 [ 15.513499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.513523] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.513550] ? kasan_atomics+0x152/0x310 [ 15.513578] kasan_atomics+0x1dc/0x310 [ 15.513602] ? __pfx_kasan_atomics+0x10/0x10 [ 15.513626] ? trace_hardirqs_on+0x37/0xe0 [ 15.513652] ? __pfx_read_tsc+0x10/0x10 [ 15.513674] ? ktime_get_ts64+0x86/0x230 [ 15.513699] kunit_try_run_case+0x1a5/0x480 [ 15.513742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.513769] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.513797] ? __kthread_parkme+0x82/0x180 [ 15.513819] ? preempt_count_sub+0x50/0x80 [ 15.513844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.513871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.513896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.513923] kthread+0x337/0x6f0 [ 15.513943] ? trace_preempt_on+0x20/0xc0 [ 15.513967] ? __pfx_kthread+0x10/0x10 [ 15.513989] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.514012] ? calculate_sigpending+0x7b/0xa0 [ 15.514177] ? __pfx_kthread+0x10/0x10 [ 15.514202] ret_from_fork+0x116/0x1d0 [ 15.514224] ? __pfx_kthread+0x10/0x10 [ 15.514246] ret_from_fork_asm+0x1a/0x30 [ 15.514278] </TASK> [ 15.514291] [ 15.523530] Allocated by task 282: [ 15.523658] kasan_save_stack+0x45/0x70 [ 15.523813] kasan_save_track+0x18/0x40 [ 15.524019] kasan_save_alloc_info+0x3b/0x50 [ 15.524330] __kasan_kmalloc+0xb7/0xc0 [ 15.524521] __kmalloc_cache_noprof+0x189/0x420 [ 15.524791] kasan_atomics+0x95/0x310 [ 15.525074] kunit_try_run_case+0x1a5/0x480 [ 15.525307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.525540] kthread+0x337/0x6f0 [ 15.525725] ret_from_fork+0x116/0x1d0 [ 15.525932] ret_from_fork_asm+0x1a/0x30 [ 15.526266] [ 15.526376] The buggy address belongs to the object at ffff8881038e3c00 [ 15.526376] which belongs to the cache kmalloc-64 of size 64 [ 15.526777] The buggy address is located 0 bytes to the right of [ 15.526777] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.527620] [ 15.527884] The buggy address belongs to the physical page: [ 15.528202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.528588] flags: 0x200000000000000(node=0|zone=2) [ 15.528853] page_type: f5(slab) [ 15.529023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.529373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.529684] page dumped because: kasan: bad access detected [ 15.529984] [ 15.530328] Memory state around the buggy address: [ 15.530523] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.530759] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.531089] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.531615] ^ [ 15.531887] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532254] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532609] ================================================================== [ 16.002834] ================================================================== [ 16.003476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.003730] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.004055] [ 16.004190] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.004233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.004246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.004266] Call Trace: [ 16.004281] <TASK> [ 16.004296] dump_stack_lvl+0x73/0xb0 [ 16.004330] print_report+0xd1/0x650 [ 16.004353] ? __virt_addr_valid+0x1db/0x2d0 [ 16.004388] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.004436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.004461] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.004518] kasan_report+0x141/0x180 [ 16.004541] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.004568] kasan_check_range+0x10c/0x1c0 [ 16.004605] __kasan_check_write+0x18/0x20 [ 16.004626] kasan_atomics_helper+0x16e7/0x5450 [ 16.004650] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.004685] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.004811] ? kasan_atomics+0x152/0x310 [ 16.004840] kasan_atomics+0x1dc/0x310 [ 16.004864] ? __pfx_kasan_atomics+0x10/0x10 [ 16.004889] ? trace_hardirqs_on+0x37/0xe0 [ 16.004914] ? __pfx_read_tsc+0x10/0x10 [ 16.004936] ? ktime_get_ts64+0x86/0x230 [ 16.004961] kunit_try_run_case+0x1a5/0x480 [ 16.004987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.005106] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.005135] ? __kthread_parkme+0x82/0x180 [ 16.005157] ? preempt_count_sub+0x50/0x80 [ 16.005182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.005208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.005235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.005262] kthread+0x337/0x6f0 [ 16.005282] ? trace_preempt_on+0x20/0xc0 [ 16.005305] ? __pfx_kthread+0x10/0x10 [ 16.005327] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.005349] ? calculate_sigpending+0x7b/0xa0 [ 16.005375] ? __pfx_kthread+0x10/0x10 [ 16.005398] ret_from_fork+0x116/0x1d0 [ 16.005417] ? __pfx_kthread+0x10/0x10 [ 16.005439] ret_from_fork_asm+0x1a/0x30 [ 16.005472] </TASK> [ 16.005483] [ 16.013087] Allocated by task 282: [ 16.013253] kasan_save_stack+0x45/0x70 [ 16.013433] kasan_save_track+0x18/0x40 [ 16.013570] kasan_save_alloc_info+0x3b/0x50 [ 16.013773] __kasan_kmalloc+0xb7/0xc0 [ 16.013963] __kmalloc_cache_noprof+0x189/0x420 [ 16.014183] kasan_atomics+0x95/0x310 [ 16.014356] kunit_try_run_case+0x1a5/0x480 [ 16.014504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.014959] kthread+0x337/0x6f0 [ 16.015246] ret_from_fork+0x116/0x1d0 [ 16.015387] ret_from_fork_asm+0x1a/0x30 [ 16.015528] [ 16.015600] The buggy address belongs to the object at ffff8881038e3c00 [ 16.015600] which belongs to the cache kmalloc-64 of size 64 [ 16.016028] The buggy address is located 0 bytes to the right of [ 16.016028] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.016801] [ 16.016885] The buggy address belongs to the physical page: [ 16.017107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.017347] flags: 0x200000000000000(node=0|zone=2) [ 16.017510] page_type: f5(slab) [ 16.017632] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.017909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.018252] page dumped because: kasan: bad access detected [ 16.018508] [ 16.018622] Memory state around the buggy address: [ 16.019031] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.019364] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.019646] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.019994] ^ [ 16.020247] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.020472] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.020685] ================================================================== [ 16.275741] ================================================================== [ 16.276327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.276616] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.276850] [ 16.276934] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.276976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.276989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.277009] Call Trace: [ 16.277023] <TASK> [ 16.277038] dump_stack_lvl+0x73/0xb0 [ 16.277066] print_report+0xd1/0x650 [ 16.277089] ? __virt_addr_valid+0x1db/0x2d0 [ 16.277112] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.277134] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.277158] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.277181] kasan_report+0x141/0x180 [ 16.277204] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.277232] kasan_check_range+0x10c/0x1c0 [ 16.277256] __kasan_check_write+0x18/0x20 [ 16.277277] kasan_atomics_helper+0x1f43/0x5450 [ 16.277300] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.277324] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.277350] ? kasan_atomics+0x152/0x310 [ 16.277378] kasan_atomics+0x1dc/0x310 [ 16.277428] ? __pfx_kasan_atomics+0x10/0x10 [ 16.277452] ? trace_hardirqs_on+0x37/0xe0 [ 16.277476] ? __pfx_read_tsc+0x10/0x10 [ 16.277498] ? ktime_get_ts64+0x86/0x230 [ 16.277523] kunit_try_run_case+0x1a5/0x480 [ 16.277548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.277575] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.277601] ? __kthread_parkme+0x82/0x180 [ 16.277623] ? preempt_count_sub+0x50/0x80 [ 16.277647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.277673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.277699] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.277735] kthread+0x337/0x6f0 [ 16.277755] ? trace_preempt_on+0x20/0xc0 [ 16.277778] ? __pfx_kthread+0x10/0x10 [ 16.277799] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.277823] ? calculate_sigpending+0x7b/0xa0 [ 16.277848] ? __pfx_kthread+0x10/0x10 [ 16.277870] ret_from_fork+0x116/0x1d0 [ 16.277890] ? __pfx_kthread+0x10/0x10 [ 16.277929] ret_from_fork_asm+0x1a/0x30 [ 16.277960] </TASK> [ 16.277971] [ 16.285684] Allocated by task 282: [ 16.285824] kasan_save_stack+0x45/0x70 [ 16.285972] kasan_save_track+0x18/0x40 [ 16.286357] kasan_save_alloc_info+0x3b/0x50 [ 16.286571] __kasan_kmalloc+0xb7/0xc0 [ 16.286771] __kmalloc_cache_noprof+0x189/0x420 [ 16.286994] kasan_atomics+0x95/0x310 [ 16.287214] kunit_try_run_case+0x1a5/0x480 [ 16.287362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.287577] kthread+0x337/0x6f0 [ 16.287756] ret_from_fork+0x116/0x1d0 [ 16.287958] ret_from_fork_asm+0x1a/0x30 [ 16.288283] [ 16.288372] The buggy address belongs to the object at ffff8881038e3c00 [ 16.288372] which belongs to the cache kmalloc-64 of size 64 [ 16.288735] The buggy address is located 0 bytes to the right of [ 16.288735] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.289136] [ 16.289232] The buggy address belongs to the physical page: [ 16.289486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.289854] flags: 0x200000000000000(node=0|zone=2) [ 16.290018] page_type: f5(slab) [ 16.290137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.290756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.291074] page dumped because: kasan: bad access detected [ 16.291323] [ 16.291410] Memory state around the buggy address: [ 16.291567] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.291859] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.292151] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.292475] ^ [ 16.292728] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.293022] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.293284] ================================================================== [ 15.403444] ================================================================== [ 15.403685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.404031] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.404291] [ 15.404484] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.404530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.404543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.404563] Call Trace: [ 15.404577] <TASK> [ 15.404592] dump_stack_lvl+0x73/0xb0 [ 15.404622] print_report+0xd1/0x650 [ 15.404645] ? __virt_addr_valid+0x1db/0x2d0 [ 15.404668] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.404691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.404725] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.404748] kasan_report+0x141/0x180 [ 15.404770] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.404798] kasan_check_range+0x10c/0x1c0 [ 15.404822] __kasan_check_write+0x18/0x20 [ 15.404842] kasan_atomics_helper+0xb6a/0x5450 [ 15.404866] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.404890] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.404917] ? kasan_atomics+0x152/0x310 [ 15.404944] kasan_atomics+0x1dc/0x310 [ 15.404968] ? __pfx_kasan_atomics+0x10/0x10 [ 15.404992] ? trace_hardirqs_on+0x37/0xe0 [ 15.405017] ? __pfx_read_tsc+0x10/0x10 [ 15.405100] ? ktime_get_ts64+0x86/0x230 [ 15.405133] kunit_try_run_case+0x1a5/0x480 [ 15.405158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.405184] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.405212] ? __kthread_parkme+0x82/0x180 [ 15.405234] ? preempt_count_sub+0x50/0x80 [ 15.405260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.405287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.405314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.405341] kthread+0x337/0x6f0 [ 15.405361] ? trace_preempt_on+0x20/0xc0 [ 15.405385] ? __pfx_kthread+0x10/0x10 [ 15.405407] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.405430] ? calculate_sigpending+0x7b/0xa0 [ 15.405455] ? __pfx_kthread+0x10/0x10 [ 15.405478] ret_from_fork+0x116/0x1d0 [ 15.405497] ? __pfx_kthread+0x10/0x10 [ 15.405519] ret_from_fork_asm+0x1a/0x30 [ 15.405552] </TASK> [ 15.405563] [ 15.413885] Allocated by task 282: [ 15.414063] kasan_save_stack+0x45/0x70 [ 15.414267] kasan_save_track+0x18/0x40 [ 15.414623] kasan_save_alloc_info+0x3b/0x50 [ 15.414804] __kasan_kmalloc+0xb7/0xc0 [ 15.415241] __kmalloc_cache_noprof+0x189/0x420 [ 15.415604] kasan_atomics+0x95/0x310 [ 15.415771] kunit_try_run_case+0x1a5/0x480 [ 15.416013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.416259] kthread+0x337/0x6f0 [ 15.416583] ret_from_fork+0x116/0x1d0 [ 15.416761] ret_from_fork_asm+0x1a/0x30 [ 15.416978] [ 15.417162] The buggy address belongs to the object at ffff8881038e3c00 [ 15.417162] which belongs to the cache kmalloc-64 of size 64 [ 15.417644] The buggy address is located 0 bytes to the right of [ 15.417644] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.418070] [ 15.418142] The buggy address belongs to the physical page: [ 15.418314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.418612] flags: 0x200000000000000(node=0|zone=2) [ 15.418948] page_type: f5(slab) [ 15.419119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.419466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.419690] page dumped because: kasan: bad access detected [ 15.419870] [ 15.419940] Memory state around the buggy address: [ 15.420505] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.420863] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.421402] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.422020] ^ [ 15.422270] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422488] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422863] ================================================================== [ 15.887330] ================================================================== [ 15.887643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.887960] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.888269] [ 15.888364] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.888403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.888416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.888436] Call Trace: [ 15.888449] <TASK> [ 15.888463] dump_stack_lvl+0x73/0xb0 [ 15.888492] print_report+0xd1/0x650 [ 15.888515] ? __virt_addr_valid+0x1db/0x2d0 [ 15.888538] ? kasan_atomics_helper+0x1467/0x5450 [ 15.888561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.888586] ? kasan_atomics_helper+0x1467/0x5450 [ 15.888609] kasan_report+0x141/0x180 [ 15.888632] ? kasan_atomics_helper+0x1467/0x5450 [ 15.888660] kasan_check_range+0x10c/0x1c0 [ 15.888685] __kasan_check_write+0x18/0x20 [ 15.888716] kasan_atomics_helper+0x1467/0x5450 [ 15.888741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.888765] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.888792] ? kasan_atomics+0x152/0x310 [ 15.888819] kasan_atomics+0x1dc/0x310 [ 15.888843] ? __pfx_kasan_atomics+0x10/0x10 [ 15.888869] ? trace_hardirqs_on+0x37/0xe0 [ 15.888893] ? __pfx_read_tsc+0x10/0x10 [ 15.888915] ? ktime_get_ts64+0x86/0x230 [ 15.888940] kunit_try_run_case+0x1a5/0x480 [ 15.888965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.888992] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.889019] ? __kthread_parkme+0x82/0x180 [ 15.889062] ? preempt_count_sub+0x50/0x80 [ 15.889087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.889113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.889139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.889166] kthread+0x337/0x6f0 [ 15.889185] ? trace_preempt_on+0x20/0xc0 [ 15.889209] ? __pfx_kthread+0x10/0x10 [ 15.889230] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.889253] ? calculate_sigpending+0x7b/0xa0 [ 15.889278] ? __pfx_kthread+0x10/0x10 [ 15.889301] ret_from_fork+0x116/0x1d0 [ 15.889320] ? __pfx_kthread+0x10/0x10 [ 15.889342] ret_from_fork_asm+0x1a/0x30 [ 15.889374] </TASK> [ 15.889384] [ 15.896440] Allocated by task 282: [ 15.896621] kasan_save_stack+0x45/0x70 [ 15.896831] kasan_save_track+0x18/0x40 [ 15.897015] kasan_save_alloc_info+0x3b/0x50 [ 15.897224] __kasan_kmalloc+0xb7/0xc0 [ 15.897413] __kmalloc_cache_noprof+0x189/0x420 [ 15.897622] kasan_atomics+0x95/0x310 [ 15.897818] kunit_try_run_case+0x1a5/0x480 [ 15.898007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.898249] kthread+0x337/0x6f0 [ 15.898394] ret_from_fork+0x116/0x1d0 [ 15.898551] ret_from_fork_asm+0x1a/0x30 [ 15.898751] [ 15.898825] The buggy address belongs to the object at ffff8881038e3c00 [ 15.898825] which belongs to the cache kmalloc-64 of size 64 [ 15.899211] The buggy address is located 0 bytes to the right of [ 15.899211] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.899773] [ 15.899869] The buggy address belongs to the physical page: [ 15.900129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.900483] flags: 0x200000000000000(node=0|zone=2) [ 15.900675] page_type: f5(slab) [ 15.900863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.901192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.901465] page dumped because: kasan: bad access detected [ 15.901636] [ 15.901737] Memory state around the buggy address: [ 15.901967] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.902324] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.902648] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.902883] ^ [ 15.903139] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.903435] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.903727] ================================================================== [ 16.110493] ================================================================== [ 16.110887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.111275] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.111552] [ 16.111638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.111679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.111692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.111723] Call Trace: [ 16.111737] <TASK> [ 16.111752] dump_stack_lvl+0x73/0xb0 [ 16.111781] print_report+0xd1/0x650 [ 16.111804] ? __virt_addr_valid+0x1db/0x2d0 [ 16.111828] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.111850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.111874] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.111897] kasan_report+0x141/0x180 [ 16.111920] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.111947] kasan_check_range+0x10c/0x1c0 [ 16.111972] __kasan_check_write+0x18/0x20 [ 16.111992] kasan_atomics_helper+0x1a7f/0x5450 [ 16.112016] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.112041] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.112067] ? kasan_atomics+0x152/0x310 [ 16.112095] kasan_atomics+0x1dc/0x310 [ 16.112118] ? __pfx_kasan_atomics+0x10/0x10 [ 16.112165] ? trace_hardirqs_on+0x37/0xe0 [ 16.112189] ? __pfx_read_tsc+0x10/0x10 [ 16.112213] ? ktime_get_ts64+0x86/0x230 [ 16.112238] kunit_try_run_case+0x1a5/0x480 [ 16.112285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.112312] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.112342] ? __kthread_parkme+0x82/0x180 [ 16.112363] ? preempt_count_sub+0x50/0x80 [ 16.112388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.112414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.112439] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.112466] kthread+0x337/0x6f0 [ 16.112486] ? trace_preempt_on+0x20/0xc0 [ 16.112509] ? __pfx_kthread+0x10/0x10 [ 16.112531] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.112553] ? calculate_sigpending+0x7b/0xa0 [ 16.112578] ? __pfx_kthread+0x10/0x10 [ 16.112600] ret_from_fork+0x116/0x1d0 [ 16.112620] ? __pfx_kthread+0x10/0x10 [ 16.112641] ret_from_fork_asm+0x1a/0x30 [ 16.112673] </TASK> [ 16.112684] [ 16.120401] Allocated by task 282: [ 16.120562] kasan_save_stack+0x45/0x70 [ 16.120754] kasan_save_track+0x18/0x40 [ 16.120943] kasan_save_alloc_info+0x3b/0x50 [ 16.121179] __kasan_kmalloc+0xb7/0xc0 [ 16.121314] __kmalloc_cache_noprof+0x189/0x420 [ 16.121727] kasan_atomics+0x95/0x310 [ 16.121928] kunit_try_run_case+0x1a5/0x480 [ 16.122152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.122362] kthread+0x337/0x6f0 [ 16.122534] ret_from_fork+0x116/0x1d0 [ 16.122731] ret_from_fork_asm+0x1a/0x30 [ 16.122872] [ 16.122943] The buggy address belongs to the object at ffff8881038e3c00 [ 16.122943] which belongs to the cache kmalloc-64 of size 64 [ 16.123293] The buggy address is located 0 bytes to the right of [ 16.123293] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.123820] [ 16.123942] The buggy address belongs to the physical page: [ 16.124232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.124544] flags: 0x200000000000000(node=0|zone=2) [ 16.124717] page_type: f5(slab) [ 16.124839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.125119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.125455] page dumped because: kasan: bad access detected [ 16.125722] [ 16.125818] Memory state around the buggy address: [ 16.125999] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.126459] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.126778] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.127003] ^ [ 16.127177] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.127509] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.127810] ================================================================== [ 16.147396] ================================================================== [ 16.147742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.148176] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.148746] [ 16.148957] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.149005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.149019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.149050] Call Trace: [ 16.149064] <TASK> [ 16.149079] dump_stack_lvl+0x73/0xb0 [ 16.149111] print_report+0xd1/0x650 [ 16.149134] ? __virt_addr_valid+0x1db/0x2d0 [ 16.149158] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.149181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.149206] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.149230] kasan_report+0x141/0x180 [ 16.149252] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.149281] kasan_check_range+0x10c/0x1c0 [ 16.149305] __kasan_check_write+0x18/0x20 [ 16.149325] kasan_atomics_helper+0x1c18/0x5450 [ 16.149349] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.149373] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.149400] ? kasan_atomics+0x152/0x310 [ 16.149427] kasan_atomics+0x1dc/0x310 [ 16.149450] ? __pfx_kasan_atomics+0x10/0x10 [ 16.149473] ? trace_hardirqs_on+0x37/0xe0 [ 16.149497] ? __pfx_read_tsc+0x10/0x10 [ 16.149519] ? ktime_get_ts64+0x86/0x230 [ 16.149544] kunit_try_run_case+0x1a5/0x480 [ 16.149569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.149594] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.149621] ? __kthread_parkme+0x82/0x180 [ 16.149642] ? preempt_count_sub+0x50/0x80 [ 16.149667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.149692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.149728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.149754] kthread+0x337/0x6f0 [ 16.149775] ? trace_preempt_on+0x20/0xc0 [ 16.149798] ? __pfx_kthread+0x10/0x10 [ 16.149819] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.149842] ? calculate_sigpending+0x7b/0xa0 [ 16.149866] ? __pfx_kthread+0x10/0x10 [ 16.149889] ret_from_fork+0x116/0x1d0 [ 16.149908] ? __pfx_kthread+0x10/0x10 [ 16.149929] ret_from_fork_asm+0x1a/0x30 [ 16.149961] </TASK> [ 16.149972] [ 16.157438] Allocated by task 282: [ 16.157568] kasan_save_stack+0x45/0x70 [ 16.157723] kasan_save_track+0x18/0x40 [ 16.157916] kasan_save_alloc_info+0x3b/0x50 [ 16.158124] __kasan_kmalloc+0xb7/0xc0 [ 16.158311] __kmalloc_cache_noprof+0x189/0x420 [ 16.158519] kasan_atomics+0x95/0x310 [ 16.158653] kunit_try_run_case+0x1a5/0x480 [ 16.158862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.159194] kthread+0x337/0x6f0 [ 16.159369] ret_from_fork+0x116/0x1d0 [ 16.159520] ret_from_fork_asm+0x1a/0x30 [ 16.159710] [ 16.159810] The buggy address belongs to the object at ffff8881038e3c00 [ 16.159810] which belongs to the cache kmalloc-64 of size 64 [ 16.160260] The buggy address is located 0 bytes to the right of [ 16.160260] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.160764] [ 16.160861] The buggy address belongs to the physical page: [ 16.161139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.161378] flags: 0x200000000000000(node=0|zone=2) [ 16.161541] page_type: f5(slab) [ 16.161662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.162002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.162332] page dumped because: kasan: bad access detected [ 16.162624] [ 16.162783] Memory state around the buggy address: [ 16.162974] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.163190] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.163514] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.163843] ^ [ 16.164075] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.164406] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.164711] ================================================================== [ 15.451099] ================================================================== [ 15.451336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.451573] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.451819] [ 15.451990] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.452035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.452048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.452069] Call Trace: [ 15.452086] <TASK> [ 15.452104] dump_stack_lvl+0x73/0xb0 [ 15.452133] print_report+0xd1/0x650 [ 15.452155] ? __virt_addr_valid+0x1db/0x2d0 [ 15.452177] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.452198] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.452221] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.452244] kasan_report+0x141/0x180 [ 15.452266] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.452293] __asan_report_load4_noabort+0x18/0x20 [ 15.452322] kasan_atomics_helper+0x4a84/0x5450 [ 15.452346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.452368] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.452393] ? kasan_atomics+0x152/0x310 [ 15.452419] kasan_atomics+0x1dc/0x310 [ 15.452442] ? __pfx_kasan_atomics+0x10/0x10 [ 15.452816] ? trace_hardirqs_on+0x37/0xe0 [ 15.452844] ? __pfx_read_tsc+0x10/0x10 [ 15.452867] ? ktime_get_ts64+0x86/0x230 [ 15.452892] kunit_try_run_case+0x1a5/0x480 [ 15.452918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.452945] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.452971] ? __kthread_parkme+0x82/0x180 [ 15.452993] ? preempt_count_sub+0x50/0x80 [ 15.453017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.453437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.453463] kthread+0x337/0x6f0 [ 15.453582] ? trace_preempt_on+0x20/0xc0 [ 15.453609] ? __pfx_kthread+0x10/0x10 [ 15.453630] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.453654] ? calculate_sigpending+0x7b/0xa0 [ 15.453679] ? __pfx_kthread+0x10/0x10 [ 15.453724] ret_from_fork+0x116/0x1d0 [ 15.453746] ? __pfx_kthread+0x10/0x10 [ 15.453768] ret_from_fork_asm+0x1a/0x30 [ 15.453800] </TASK> [ 15.453811] [ 15.468093] Allocated by task 282: [ 15.468532] kasan_save_stack+0x45/0x70 [ 15.468997] kasan_save_track+0x18/0x40 [ 15.469658] kasan_save_alloc_info+0x3b/0x50 [ 15.470235] __kasan_kmalloc+0xb7/0xc0 [ 15.470574] __kmalloc_cache_noprof+0x189/0x420 [ 15.470975] kasan_atomics+0x95/0x310 [ 15.471323] kunit_try_run_case+0x1a5/0x480 [ 15.471960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.472638] kthread+0x337/0x6f0 [ 15.473234] ret_from_fork+0x116/0x1d0 [ 15.473697] ret_from_fork_asm+0x1a/0x30 [ 15.474176] [ 15.474284] The buggy address belongs to the object at ffff8881038e3c00 [ 15.474284] which belongs to the cache kmalloc-64 of size 64 [ 15.475405] The buggy address is located 0 bytes to the right of [ 15.475405] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.475793] [ 15.475870] The buggy address belongs to the physical page: [ 15.476098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.477137] flags: 0x200000000000000(node=0|zone=2) [ 15.477695] page_type: f5(slab) [ 15.478050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.478931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.479804] page dumped because: kasan: bad access detected [ 15.480405] [ 15.480678] Memory state around the buggy address: [ 15.481069] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.481792] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.482287] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.482516] ^ [ 15.482673] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.482966] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.483237] ================================================================== [ 15.100843] ================================================================== [ 15.101589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.101934] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.102343] [ 15.102867] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.102916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.102931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.102952] Call Trace: [ 15.102971] <TASK> [ 15.102988] dump_stack_lvl+0x73/0xb0 [ 15.103020] print_report+0xd1/0x650 [ 15.103042] ? __virt_addr_valid+0x1db/0x2d0 [ 15.103274] ? kasan_atomics_helper+0x3df/0x5450 [ 15.103300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.103326] ? kasan_atomics_helper+0x3df/0x5450 [ 15.103348] kasan_report+0x141/0x180 [ 15.103371] ? kasan_atomics_helper+0x3df/0x5450 [ 15.103399] kasan_check_range+0x10c/0x1c0 [ 15.103424] __kasan_check_read+0x15/0x20 [ 15.103444] kasan_atomics_helper+0x3df/0x5450 [ 15.103469] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.103493] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.103520] ? kasan_atomics+0x152/0x310 [ 15.103548] kasan_atomics+0x1dc/0x310 [ 15.103571] ? __pfx_kasan_atomics+0x10/0x10 [ 15.103595] ? trace_hardirqs_on+0x37/0xe0 [ 15.103620] ? __pfx_read_tsc+0x10/0x10 [ 15.103642] ? ktime_get_ts64+0x86/0x230 [ 15.103667] kunit_try_run_case+0x1a5/0x480 [ 15.103693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.103734] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.103762] ? __kthread_parkme+0x82/0x180 [ 15.103784] ? preempt_count_sub+0x50/0x80 [ 15.103809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.103836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.103861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.103888] kthread+0x337/0x6f0 [ 15.103908] ? trace_preempt_on+0x20/0xc0 [ 15.103931] ? __pfx_kthread+0x10/0x10 [ 15.103953] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.103975] ? calculate_sigpending+0x7b/0xa0 [ 15.104001] ? __pfx_kthread+0x10/0x10 [ 15.104046] ret_from_fork+0x116/0x1d0 [ 15.104128] ? __pfx_kthread+0x10/0x10 [ 15.104151] ret_from_fork_asm+0x1a/0x30 [ 15.104184] </TASK> [ 15.104196] [ 15.116895] Allocated by task 282: [ 15.117151] kasan_save_stack+0x45/0x70 [ 15.117362] kasan_save_track+0x18/0x40 [ 15.117557] kasan_save_alloc_info+0x3b/0x50 [ 15.117782] __kasan_kmalloc+0xb7/0xc0 [ 15.117968] __kmalloc_cache_noprof+0x189/0x420 [ 15.118487] kasan_atomics+0x95/0x310 [ 15.119001] kunit_try_run_case+0x1a5/0x480 [ 15.119168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.119350] kthread+0x337/0x6f0 [ 15.119477] ret_from_fork+0x116/0x1d0 [ 15.119614] ret_from_fork_asm+0x1a/0x30 [ 15.119888] [ 15.119965] The buggy address belongs to the object at ffff8881038e3c00 [ 15.119965] which belongs to the cache kmalloc-64 of size 64 [ 15.121176] The buggy address is located 0 bytes to the right of [ 15.121176] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.122199] [ 15.122278] The buggy address belongs to the physical page: [ 15.122452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.123354] flags: 0x200000000000000(node=0|zone=2) [ 15.123894] page_type: f5(slab) [ 15.124262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.124854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.125668] page dumped because: kasan: bad access detected [ 15.125894] [ 15.125966] Memory state around the buggy address: [ 15.126507] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.127280] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.127801] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.128026] ^ [ 15.128181] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128403] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128617] ================================================================== [ 16.185901] ================================================================== [ 16.186612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.186947] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.187665] [ 16.188026] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.188080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.188115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.188137] Call Trace: [ 16.188152] <TASK> [ 16.188202] dump_stack_lvl+0x73/0xb0 [ 16.188234] print_report+0xd1/0x650 [ 16.188257] ? __virt_addr_valid+0x1db/0x2d0 [ 16.188281] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.188305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.188336] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.188360] kasan_report+0x141/0x180 [ 16.188384] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.188413] kasan_check_range+0x10c/0x1c0 [ 16.188438] __kasan_check_write+0x18/0x20 [ 16.188459] kasan_atomics_helper+0x1ce1/0x5450 [ 16.188484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.188508] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.188535] ? kasan_atomics+0x152/0x310 [ 16.188562] kasan_atomics+0x1dc/0x310 [ 16.188586] ? __pfx_kasan_atomics+0x10/0x10 [ 16.188609] ? trace_hardirqs_on+0x37/0xe0 [ 16.188633] ? __pfx_read_tsc+0x10/0x10 [ 16.188655] ? ktime_get_ts64+0x86/0x230 [ 16.188679] kunit_try_run_case+0x1a5/0x480 [ 16.188716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.188743] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.188769] ? __kthread_parkme+0x82/0x180 [ 16.188790] ? preempt_count_sub+0x50/0x80 [ 16.188815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.188841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.188866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.188893] kthread+0x337/0x6f0 [ 16.188913] ? trace_preempt_on+0x20/0xc0 [ 16.188936] ? __pfx_kthread+0x10/0x10 [ 16.188958] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.188981] ? calculate_sigpending+0x7b/0xa0 [ 16.189005] ? __pfx_kthread+0x10/0x10 [ 16.189028] ret_from_fork+0x116/0x1d0 [ 16.189056] ? __pfx_kthread+0x10/0x10 [ 16.189078] ret_from_fork_asm+0x1a/0x30 [ 16.189110] </TASK> [ 16.189120] [ 16.199956] Allocated by task 282: [ 16.200573] kasan_save_stack+0x45/0x70 [ 16.200875] kasan_save_track+0x18/0x40 [ 16.201285] kasan_save_alloc_info+0x3b/0x50 [ 16.201621] __kasan_kmalloc+0xb7/0xc0 [ 16.201813] __kmalloc_cache_noprof+0x189/0x420 [ 16.202021] kasan_atomics+0x95/0x310 [ 16.202455] kunit_try_run_case+0x1a5/0x480 [ 16.202789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.203413] kthread+0x337/0x6f0 [ 16.203652] ret_from_fork+0x116/0x1d0 [ 16.203950] ret_from_fork_asm+0x1a/0x30 [ 16.204465] [ 16.204584] The buggy address belongs to the object at ffff8881038e3c00 [ 16.204584] which belongs to the cache kmalloc-64 of size 64 [ 16.205558] The buggy address is located 0 bytes to the right of [ 16.205558] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.206206] [ 16.206301] The buggy address belongs to the physical page: [ 16.206513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.206838] flags: 0x200000000000000(node=0|zone=2) [ 16.207345] page_type: f5(slab) [ 16.207610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.208333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.208674] page dumped because: kasan: bad access detected [ 16.208922] [ 16.209013] Memory state around the buggy address: [ 16.209647] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.210150] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.210582] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.210877] ^ [ 16.211335] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.211644] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.211948] ================================================================== [ 16.342769] ================================================================== [ 16.343584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.343918] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.344578] [ 16.344679] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.344937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.344954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.344976] Call Trace: [ 16.344992] <TASK> [ 16.345008] dump_stack_lvl+0x73/0xb0 [ 16.345090] print_report+0xd1/0x650 [ 16.345116] ? __virt_addr_valid+0x1db/0x2d0 [ 16.345140] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.345163] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.345188] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.345212] kasan_report+0x141/0x180 [ 16.345234] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.345262] __asan_report_load8_noabort+0x18/0x20 [ 16.345288] kasan_atomics_helper+0x4f98/0x5450 [ 16.345312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.345336] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.345362] ? kasan_atomics+0x152/0x310 [ 16.345390] kasan_atomics+0x1dc/0x310 [ 16.345414] ? __pfx_kasan_atomics+0x10/0x10 [ 16.345438] ? trace_hardirqs_on+0x37/0xe0 [ 16.345463] ? __pfx_read_tsc+0x10/0x10 [ 16.345485] ? ktime_get_ts64+0x86/0x230 [ 16.345509] kunit_try_run_case+0x1a5/0x480 [ 16.345534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345560] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.345587] ? __kthread_parkme+0x82/0x180 [ 16.345608] ? preempt_count_sub+0x50/0x80 [ 16.345633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.345684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.345723] kthread+0x337/0x6f0 [ 16.345744] ? trace_preempt_on+0x20/0xc0 [ 16.345769] ? __pfx_kthread+0x10/0x10 [ 16.345791] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.345814] ? calculate_sigpending+0x7b/0xa0 [ 16.345839] ? __pfx_kthread+0x10/0x10 [ 16.345862] ret_from_fork+0x116/0x1d0 [ 16.345882] ? __pfx_kthread+0x10/0x10 [ 16.345904] ret_from_fork_asm+0x1a/0x30 [ 16.345937] </TASK> [ 16.345947] [ 16.356916] Allocated by task 282: [ 16.357231] kasan_save_stack+0x45/0x70 [ 16.357602] kasan_save_track+0x18/0x40 [ 16.357803] kasan_save_alloc_info+0x3b/0x50 [ 16.358002] __kasan_kmalloc+0xb7/0xc0 [ 16.358531] __kmalloc_cache_noprof+0x189/0x420 [ 16.358790] kasan_atomics+0x95/0x310 [ 16.359104] kunit_try_run_case+0x1a5/0x480 [ 16.359479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.359901] kthread+0x337/0x6f0 [ 16.360261] ret_from_fork+0x116/0x1d0 [ 16.360443] ret_from_fork_asm+0x1a/0x30 [ 16.360627] [ 16.360726] The buggy address belongs to the object at ffff8881038e3c00 [ 16.360726] which belongs to the cache kmalloc-64 of size 64 [ 16.361727] The buggy address is located 0 bytes to the right of [ 16.361727] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.362529] [ 16.362763] The buggy address belongs to the physical page: [ 16.363378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.363846] flags: 0x200000000000000(node=0|zone=2) [ 16.364217] page_type: f5(slab) [ 16.364392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.364717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.364949] page dumped because: kasan: bad access detected [ 16.365226] [ 16.365326] Memory state around the buggy address: [ 16.365522] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.365826] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.366152] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.366381] ^ [ 16.366606] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.366859] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.367302] ================================================================== [ 15.771069] ================================================================== [ 15.771556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.771995] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.772398] [ 15.772694] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.772753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.772766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.772873] Call Trace: [ 15.772894] <TASK> [ 15.772910] dump_stack_lvl+0x73/0xb0 [ 15.772942] print_report+0xd1/0x650 [ 15.772965] ? __virt_addr_valid+0x1db/0x2d0 [ 15.772989] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.773013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.773047] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.773071] kasan_report+0x141/0x180 [ 15.773094] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.773121] __asan_report_load4_noabort+0x18/0x20 [ 15.773147] kasan_atomics_helper+0x49e8/0x5450 [ 15.773173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.773197] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.773223] ? kasan_atomics+0x152/0x310 [ 15.773251] kasan_atomics+0x1dc/0x310 [ 15.773274] ? __pfx_kasan_atomics+0x10/0x10 [ 15.773298] ? trace_hardirqs_on+0x37/0xe0 [ 15.773322] ? __pfx_read_tsc+0x10/0x10 [ 15.773344] ? ktime_get_ts64+0x86/0x230 [ 15.773368] kunit_try_run_case+0x1a5/0x480 [ 15.773393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.773420] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.773446] ? __kthread_parkme+0x82/0x180 [ 15.773468] ? preempt_count_sub+0x50/0x80 [ 15.773493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.773518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.773543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.773570] kthread+0x337/0x6f0 [ 15.773591] ? trace_preempt_on+0x20/0xc0 [ 15.773614] ? __pfx_kthread+0x10/0x10 [ 15.773636] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.773659] ? calculate_sigpending+0x7b/0xa0 [ 15.773685] ? __pfx_kthread+0x10/0x10 [ 15.773720] ret_from_fork+0x116/0x1d0 [ 15.773739] ? __pfx_kthread+0x10/0x10 [ 15.773761] ret_from_fork_asm+0x1a/0x30 [ 15.773795] </TASK> [ 15.773805] [ 15.783897] Allocated by task 282: [ 15.784214] kasan_save_stack+0x45/0x70 [ 15.784425] kasan_save_track+0x18/0x40 [ 15.784695] kasan_save_alloc_info+0x3b/0x50 [ 15.785060] __kasan_kmalloc+0xb7/0xc0 [ 15.785246] __kmalloc_cache_noprof+0x189/0x420 [ 15.785550] kasan_atomics+0x95/0x310 [ 15.785832] kunit_try_run_case+0x1a5/0x480 [ 15.786007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.786553] kthread+0x337/0x6f0 [ 15.786733] ret_from_fork+0x116/0x1d0 [ 15.787010] ret_from_fork_asm+0x1a/0x30 [ 15.787249] [ 15.787504] The buggy address belongs to the object at ffff8881038e3c00 [ 15.787504] which belongs to the cache kmalloc-64 of size 64 [ 15.788093] The buggy address is located 0 bytes to the right of [ 15.788093] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.788823] [ 15.788907] The buggy address belongs to the physical page: [ 15.789239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.789582] flags: 0x200000000000000(node=0|zone=2) [ 15.789814] page_type: f5(slab) [ 15.789974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.790726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.791150] page dumped because: kasan: bad access detected [ 15.791413] [ 15.791604] Memory state around the buggy address: [ 15.791961] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.792423] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.792793] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.793246] ^ [ 15.793474] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.793965] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.794379] ================================================================== [ 16.316118] ================================================================== [ 16.316945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.317405] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.317717] [ 16.317825] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.317869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.317882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.317904] Call Trace: [ 16.317919] <TASK> [ 16.317934] dump_stack_lvl+0x73/0xb0 [ 16.317965] print_report+0xd1/0x650 [ 16.317989] ? __virt_addr_valid+0x1db/0x2d0 [ 16.318014] ? kasan_atomics_helper+0x2006/0x5450 [ 16.318318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.318358] ? kasan_atomics_helper+0x2006/0x5450 [ 16.318383] kasan_report+0x141/0x180 [ 16.318408] ? kasan_atomics_helper+0x2006/0x5450 [ 16.318436] kasan_check_range+0x10c/0x1c0 [ 16.318501] __kasan_check_write+0x18/0x20 [ 16.318525] kasan_atomics_helper+0x2006/0x5450 [ 16.318549] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.318573] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.318600] ? kasan_atomics+0x152/0x310 [ 16.318628] kasan_atomics+0x1dc/0x310 [ 16.318652] ? __pfx_kasan_atomics+0x10/0x10 [ 16.318676] ? trace_hardirqs_on+0x37/0xe0 [ 16.318711] ? __pfx_read_tsc+0x10/0x10 [ 16.318734] ? ktime_get_ts64+0x86/0x230 [ 16.318758] kunit_try_run_case+0x1a5/0x480 [ 16.318784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.318810] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.318837] ? __kthread_parkme+0x82/0x180 [ 16.318859] ? preempt_count_sub+0x50/0x80 [ 16.318883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.318909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.318935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.318962] kthread+0x337/0x6f0 [ 16.318982] ? trace_preempt_on+0x20/0xc0 [ 16.319005] ? __pfx_kthread+0x10/0x10 [ 16.319027] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.319064] ? calculate_sigpending+0x7b/0xa0 [ 16.319089] ? __pfx_kthread+0x10/0x10 [ 16.319112] ret_from_fork+0x116/0x1d0 [ 16.319132] ? __pfx_kthread+0x10/0x10 [ 16.319153] ret_from_fork_asm+0x1a/0x30 [ 16.319187] </TASK> [ 16.319198] [ 16.330621] Allocated by task 282: [ 16.330808] kasan_save_stack+0x45/0x70 [ 16.331001] kasan_save_track+0x18/0x40 [ 16.331354] kasan_save_alloc_info+0x3b/0x50 [ 16.331682] __kasan_kmalloc+0xb7/0xc0 [ 16.331856] __kmalloc_cache_noprof+0x189/0x420 [ 16.332275] kasan_atomics+0x95/0x310 [ 16.332513] kunit_try_run_case+0x1a5/0x480 [ 16.332833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.333260] kthread+0x337/0x6f0 [ 16.333438] ret_from_fork+0x116/0x1d0 [ 16.333619] ret_from_fork_asm+0x1a/0x30 [ 16.333813] [ 16.333904] The buggy address belongs to the object at ffff8881038e3c00 [ 16.333904] which belongs to the cache kmalloc-64 of size 64 [ 16.334889] The buggy address is located 0 bytes to the right of [ 16.334889] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.335743] [ 16.335969] The buggy address belongs to the physical page: [ 16.336438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.336902] flags: 0x200000000000000(node=0|zone=2) [ 16.337367] page_type: f5(slab) [ 16.337595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.338160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.338492] page dumped because: kasan: bad access detected [ 16.338735] [ 16.338824] Memory state around the buggy address: [ 16.339030] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.339744] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.340244] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.340742] ^ [ 16.340969] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341537] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.342160] ================================================================== [ 15.242948] ================================================================== [ 15.243621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.243959] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.244343] [ 15.244453] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.244494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.244507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.244527] Call Trace: [ 15.244540] <TASK> [ 15.244554] dump_stack_lvl+0x73/0xb0 [ 15.244584] print_report+0xd1/0x650 [ 15.244607] ? __virt_addr_valid+0x1db/0x2d0 [ 15.244630] ? kasan_atomics_helper+0x697/0x5450 [ 15.244653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.244677] ? kasan_atomics_helper+0x697/0x5450 [ 15.244700] kasan_report+0x141/0x180 [ 15.244736] ? kasan_atomics_helper+0x697/0x5450 [ 15.244764] kasan_check_range+0x10c/0x1c0 [ 15.244790] __kasan_check_write+0x18/0x20 [ 15.244811] kasan_atomics_helper+0x697/0x5450 [ 15.244834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.244859] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.244885] ? kasan_atomics+0x152/0x310 [ 15.244913] kasan_atomics+0x1dc/0x310 [ 15.244936] ? __pfx_kasan_atomics+0x10/0x10 [ 15.244960] ? trace_hardirqs_on+0x37/0xe0 [ 15.244984] ? __pfx_read_tsc+0x10/0x10 [ 15.245006] ? ktime_get_ts64+0x86/0x230 [ 15.245083] kunit_try_run_case+0x1a5/0x480 [ 15.245111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.245136] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.245163] ? __kthread_parkme+0x82/0x180 [ 15.245184] ? preempt_count_sub+0x50/0x80 [ 15.245209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.245235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.245260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.245287] kthread+0x337/0x6f0 [ 15.245306] ? trace_preempt_on+0x20/0xc0 [ 15.245330] ? __pfx_kthread+0x10/0x10 [ 15.245351] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.245375] ? calculate_sigpending+0x7b/0xa0 [ 15.245400] ? __pfx_kthread+0x10/0x10 [ 15.245424] ret_from_fork+0x116/0x1d0 [ 15.245443] ? __pfx_kthread+0x10/0x10 [ 15.245464] ret_from_fork_asm+0x1a/0x30 [ 15.245496] </TASK> [ 15.245507] [ 15.253628] Allocated by task 282: [ 15.253847] kasan_save_stack+0x45/0x70 [ 15.254095] kasan_save_track+0x18/0x40 [ 15.254294] kasan_save_alloc_info+0x3b/0x50 [ 15.254503] __kasan_kmalloc+0xb7/0xc0 [ 15.254638] __kmalloc_cache_noprof+0x189/0x420 [ 15.254807] kasan_atomics+0x95/0x310 [ 15.254984] kunit_try_run_case+0x1a5/0x480 [ 15.255221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.255454] kthread+0x337/0x6f0 [ 15.255612] ret_from_fork+0x116/0x1d0 [ 15.255781] ret_from_fork_asm+0x1a/0x30 [ 15.255968] [ 15.256072] The buggy address belongs to the object at ffff8881038e3c00 [ 15.256072] which belongs to the cache kmalloc-64 of size 64 [ 15.256540] The buggy address is located 0 bytes to the right of [ 15.256540] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.257018] [ 15.257333] The buggy address belongs to the physical page: [ 15.257556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.257889] flags: 0x200000000000000(node=0|zone=2) [ 15.258202] page_type: f5(slab) [ 15.258346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.258657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.258953] page dumped because: kasan: bad access detected [ 15.259181] [ 15.259334] Memory state around the buggy address: [ 15.259564] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.259793] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.260011] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.260328] ^ [ 15.260553] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260946] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.261384] ================================================================== [ 15.204269] ================================================================== [ 15.204622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.204932] Write of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.205268] [ 15.205382] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.205424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.205437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.205459] Call Trace: [ 15.205475] <TASK> [ 15.205489] dump_stack_lvl+0x73/0xb0 [ 15.205519] print_report+0xd1/0x650 [ 15.205543] ? __virt_addr_valid+0x1db/0x2d0 [ 15.205567] ? kasan_atomics_helper+0x565/0x5450 [ 15.205591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.205615] ? kasan_atomics_helper+0x565/0x5450 [ 15.205638] kasan_report+0x141/0x180 [ 15.205661] ? kasan_atomics_helper+0x565/0x5450 [ 15.205689] kasan_check_range+0x10c/0x1c0 [ 15.205725] __kasan_check_write+0x18/0x20 [ 15.205747] kasan_atomics_helper+0x565/0x5450 [ 15.205770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.205794] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.205820] ? kasan_atomics+0x152/0x310 [ 15.205847] kasan_atomics+0x1dc/0x310 [ 15.205871] ? __pfx_kasan_atomics+0x10/0x10 [ 15.205894] ? trace_hardirqs_on+0x37/0xe0 [ 15.205919] ? __pfx_read_tsc+0x10/0x10 [ 15.205941] ? ktime_get_ts64+0x86/0x230 [ 15.205967] kunit_try_run_case+0x1a5/0x480 [ 15.205992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.206018] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.206190] ? __kthread_parkme+0x82/0x180 [ 15.206220] ? preempt_count_sub+0x50/0x80 [ 15.206248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.206274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.206301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.206327] kthread+0x337/0x6f0 [ 15.206347] ? trace_preempt_on+0x20/0xc0 [ 15.206370] ? __pfx_kthread+0x10/0x10 [ 15.206392] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.206415] ? calculate_sigpending+0x7b/0xa0 [ 15.206440] ? __pfx_kthread+0x10/0x10 [ 15.206463] ret_from_fork+0x116/0x1d0 [ 15.206482] ? __pfx_kthread+0x10/0x10 [ 15.206504] ret_from_fork_asm+0x1a/0x30 [ 15.206536] </TASK> [ 15.206548] [ 15.214866] Allocated by task 282: [ 15.215173] kasan_save_stack+0x45/0x70 [ 15.215403] kasan_save_track+0x18/0x40 [ 15.215576] kasan_save_alloc_info+0x3b/0x50 [ 15.215776] __kasan_kmalloc+0xb7/0xc0 [ 15.215913] __kmalloc_cache_noprof+0x189/0x420 [ 15.216173] kasan_atomics+0x95/0x310 [ 15.216396] kunit_try_run_case+0x1a5/0x480 [ 15.216583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.216770] kthread+0x337/0x6f0 [ 15.216940] ret_from_fork+0x116/0x1d0 [ 15.217254] ret_from_fork_asm+0x1a/0x30 [ 15.217456] [ 15.217555] The buggy address belongs to the object at ffff8881038e3c00 [ 15.217555] which belongs to the cache kmalloc-64 of size 64 [ 15.218082] The buggy address is located 0 bytes to the right of [ 15.218082] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.218587] [ 15.218668] The buggy address belongs to the physical page: [ 15.218883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.219261] flags: 0x200000000000000(node=0|zone=2) [ 15.219423] page_type: f5(slab) [ 15.219544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.220086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.220435] page dumped because: kasan: bad access detected [ 15.220685] [ 15.220775] Memory state around the buggy address: [ 15.220934] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.221416] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.221757] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.221997] ^ [ 15.222312] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.222638] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.222954] ================================================================== [ 15.046381] ================================================================== [ 15.046932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.047425] Read of size 4 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.047866] [ 15.048282] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.048336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.048349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.048370] Call Trace: [ 15.048386] <TASK> [ 15.048402] dump_stack_lvl+0x73/0xb0 [ 15.048431] print_report+0xd1/0x650 [ 15.048454] ? __virt_addr_valid+0x1db/0x2d0 [ 15.048476] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.048497] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.048522] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.048545] kasan_report+0x141/0x180 [ 15.048567] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.048594] __asan_report_load4_noabort+0x18/0x20 [ 15.048620] kasan_atomics_helper+0x4b88/0x5450 [ 15.048643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.048666] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.048692] ? kasan_atomics+0x152/0x310 [ 15.048730] kasan_atomics+0x1dc/0x310 [ 15.048752] ? __pfx_kasan_atomics+0x10/0x10 [ 15.048776] ? trace_hardirqs_on+0x37/0xe0 [ 15.048799] ? __pfx_read_tsc+0x10/0x10 [ 15.048821] ? ktime_get_ts64+0x86/0x230 [ 15.048845] kunit_try_run_case+0x1a5/0x480 [ 15.048870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.048895] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.048923] ? __kthread_parkme+0x82/0x180 [ 15.048945] ? preempt_count_sub+0x50/0x80 [ 15.048969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.048994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.049122] kthread+0x337/0x6f0 [ 15.049142] ? trace_preempt_on+0x20/0xc0 [ 15.049165] ? __pfx_kthread+0x10/0x10 [ 15.049185] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.049207] ? calculate_sigpending+0x7b/0xa0 [ 15.049232] ? __pfx_kthread+0x10/0x10 [ 15.049253] ret_from_fork+0x116/0x1d0 [ 15.049272] ? __pfx_kthread+0x10/0x10 [ 15.049293] ret_from_fork_asm+0x1a/0x30 [ 15.049324] </TASK> [ 15.049333] [ 15.060909] Allocated by task 282: [ 15.061475] kasan_save_stack+0x45/0x70 [ 15.061679] kasan_save_track+0x18/0x40 [ 15.061950] kasan_save_alloc_info+0x3b/0x50 [ 15.062349] __kasan_kmalloc+0xb7/0xc0 [ 15.062529] __kmalloc_cache_noprof+0x189/0x420 [ 15.062936] kasan_atomics+0x95/0x310 [ 15.063179] kunit_try_run_case+0x1a5/0x480 [ 15.063566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.063856] kthread+0x337/0x6f0 [ 15.064192] ret_from_fork+0x116/0x1d0 [ 15.064504] ret_from_fork_asm+0x1a/0x30 [ 15.064806] [ 15.064932] The buggy address belongs to the object at ffff8881038e3c00 [ 15.064932] which belongs to the cache kmalloc-64 of size 64 [ 15.065552] The buggy address is located 0 bytes to the right of [ 15.065552] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.066066] [ 15.066361] The buggy address belongs to the physical page: [ 15.066877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.067376] flags: 0x200000000000000(node=0|zone=2) [ 15.067604] page_type: f5(slab) [ 15.067984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.068390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.068882] page dumped because: kasan: bad access detected [ 15.069207] [ 15.069326] Memory state around the buggy address: [ 15.069692] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.070040] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.070745] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.071171] ^ [ 15.071379] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.071880] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.072442] ================================================================== [ 16.165228] ================================================================== [ 16.165547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.166263] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.166575] [ 16.166681] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.166734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.166747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.166767] Call Trace: [ 16.166781] <TASK> [ 16.166797] dump_stack_lvl+0x73/0xb0 [ 16.166827] print_report+0xd1/0x650 [ 16.166851] ? __virt_addr_valid+0x1db/0x2d0 [ 16.166874] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.166896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.166921] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.166944] kasan_report+0x141/0x180 [ 16.166967] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.166994] __asan_report_load8_noabort+0x18/0x20 [ 16.167022] kasan_atomics_helper+0x4f30/0x5450 [ 16.167045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.167082] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.167109] ? kasan_atomics+0x152/0x310 [ 16.167137] kasan_atomics+0x1dc/0x310 [ 16.167160] ? __pfx_kasan_atomics+0x10/0x10 [ 16.167183] ? trace_hardirqs_on+0x37/0xe0 [ 16.167208] ? __pfx_read_tsc+0x10/0x10 [ 16.167229] ? ktime_get_ts64+0x86/0x230 [ 16.167254] kunit_try_run_case+0x1a5/0x480 [ 16.167278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.167304] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.167331] ? __kthread_parkme+0x82/0x180 [ 16.167352] ? preempt_count_sub+0x50/0x80 [ 16.167377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.167402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.167428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.167455] kthread+0x337/0x6f0 [ 16.167475] ? trace_preempt_on+0x20/0xc0 [ 16.167497] ? __pfx_kthread+0x10/0x10 [ 16.167519] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.167542] ? calculate_sigpending+0x7b/0xa0 [ 16.167567] ? __pfx_kthread+0x10/0x10 [ 16.167590] ret_from_fork+0x116/0x1d0 [ 16.167609] ? __pfx_kthread+0x10/0x10 [ 16.167631] ret_from_fork_asm+0x1a/0x30 [ 16.167662] </TASK> [ 16.167673] [ 16.175043] Allocated by task 282: [ 16.175213] kasan_save_stack+0x45/0x70 [ 16.175393] kasan_save_track+0x18/0x40 [ 16.175559] kasan_save_alloc_info+0x3b/0x50 [ 16.175772] __kasan_kmalloc+0xb7/0xc0 [ 16.175949] __kmalloc_cache_noprof+0x189/0x420 [ 16.176165] kasan_atomics+0x95/0x310 [ 16.176300] kunit_try_run_case+0x1a5/0x480 [ 16.176453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.176627] kthread+0x337/0x6f0 [ 16.176759] ret_from_fork+0x116/0x1d0 [ 16.176891] ret_from_fork_asm+0x1a/0x30 [ 16.177080] [ 16.177173] The buggy address belongs to the object at ffff8881038e3c00 [ 16.177173] which belongs to the cache kmalloc-64 of size 64 [ 16.177693] The buggy address is located 0 bytes to the right of [ 16.177693] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.178501] [ 16.178581] The buggy address belongs to the physical page: [ 16.178780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.179030] flags: 0x200000000000000(node=0|zone=2) [ 16.179193] page_type: f5(slab) [ 16.179313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.180351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.180813] page dumped because: kasan: bad access detected [ 16.181465] [ 16.181574] Memory state around the buggy address: [ 16.182154] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.182608] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.183136] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.183436] ^ [ 16.183650] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.184473] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.184941] ================================================================== [ 16.385421] ================================================================== [ 16.385731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.386073] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 16.386358] [ 16.386442] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.386482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.386495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.386516] Call Trace: [ 16.386529] <TASK> [ 16.386544] dump_stack_lvl+0x73/0xb0 [ 16.386571] print_report+0xd1/0x650 [ 16.386594] ? __virt_addr_valid+0x1db/0x2d0 [ 16.386618] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.386640] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.386665] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.386688] kasan_report+0x141/0x180 [ 16.386722] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.386750] __asan_report_load8_noabort+0x18/0x20 [ 16.386783] kasan_atomics_helper+0x4fb2/0x5450 [ 16.386808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.386831] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.386858] ? kasan_atomics+0x152/0x310 [ 16.386887] kasan_atomics+0x1dc/0x310 [ 16.386910] ? __pfx_kasan_atomics+0x10/0x10 [ 16.386933] ? trace_hardirqs_on+0x37/0xe0 [ 16.386958] ? __pfx_read_tsc+0x10/0x10 [ 16.386980] ? ktime_get_ts64+0x86/0x230 [ 16.387005] kunit_try_run_case+0x1a5/0x480 [ 16.387030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.387056] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.387092] ? __kthread_parkme+0x82/0x180 [ 16.387114] ? preempt_count_sub+0x50/0x80 [ 16.387139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.387164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.387190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.387217] kthread+0x337/0x6f0 [ 16.387237] ? trace_preempt_on+0x20/0xc0 [ 16.387260] ? __pfx_kthread+0x10/0x10 [ 16.387281] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.387304] ? calculate_sigpending+0x7b/0xa0 [ 16.387329] ? __pfx_kthread+0x10/0x10 [ 16.387351] ret_from_fork+0x116/0x1d0 [ 16.387371] ? __pfx_kthread+0x10/0x10 [ 16.387392] ret_from_fork_asm+0x1a/0x30 [ 16.387425] </TASK> [ 16.387437] [ 16.394816] Allocated by task 282: [ 16.394992] kasan_save_stack+0x45/0x70 [ 16.395252] kasan_save_track+0x18/0x40 [ 16.395398] kasan_save_alloc_info+0x3b/0x50 [ 16.395548] __kasan_kmalloc+0xb7/0xc0 [ 16.395680] __kmalloc_cache_noprof+0x189/0x420 [ 16.395844] kasan_atomics+0x95/0x310 [ 16.395977] kunit_try_run_case+0x1a5/0x480 [ 16.396122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.396296] kthread+0x337/0x6f0 [ 16.396467] ret_from_fork+0x116/0x1d0 [ 16.396654] ret_from_fork_asm+0x1a/0x30 [ 16.396868] [ 16.396961] The buggy address belongs to the object at ffff8881038e3c00 [ 16.396961] which belongs to the cache kmalloc-64 of size 64 [ 16.397479] The buggy address is located 0 bytes to the right of [ 16.397479] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 16.398385] [ 16.398495] The buggy address belongs to the physical page: [ 16.398672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 16.398930] flags: 0x200000000000000(node=0|zone=2) [ 16.399676] page_type: f5(slab) [ 16.399829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.400089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.400340] page dumped because: kasan: bad access detected [ 16.400583] [ 16.400677] Memory state around the buggy address: [ 16.400915] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.401288] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.401586] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.401913] ^ [ 16.402169] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.402405] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.402758] ================================================================== [ 15.904265] ================================================================== [ 15.904583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.904914] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.905229] [ 15.905317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.905359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.905372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.905393] Call Trace: [ 15.905409] <TASK> [ 15.905424] dump_stack_lvl+0x73/0xb0 [ 15.905453] print_report+0xd1/0x650 [ 15.905475] ? __virt_addr_valid+0x1db/0x2d0 [ 15.905498] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.905522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.905546] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.905569] kasan_report+0x141/0x180 [ 15.905592] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.905620] __asan_report_store8_noabort+0x1b/0x30 [ 15.905646] kasan_atomics_helper+0x50d4/0x5450 [ 15.905670] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.905694] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.905732] ? kasan_atomics+0x152/0x310 [ 15.905759] kasan_atomics+0x1dc/0x310 [ 15.905783] ? __pfx_kasan_atomics+0x10/0x10 [ 15.905807] ? trace_hardirqs_on+0x37/0xe0 [ 15.905833] ? __pfx_read_tsc+0x10/0x10 [ 15.905855] ? ktime_get_ts64+0x86/0x230 [ 15.905880] kunit_try_run_case+0x1a5/0x480 [ 15.905906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.905932] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.905958] ? __kthread_parkme+0x82/0x180 [ 15.905979] ? preempt_count_sub+0x50/0x80 [ 15.906004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.906050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.906077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.906104] kthread+0x337/0x6f0 [ 15.906124] ? trace_preempt_on+0x20/0xc0 [ 15.906148] ? __pfx_kthread+0x10/0x10 [ 15.906169] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.906192] ? calculate_sigpending+0x7b/0xa0 [ 15.906217] ? __pfx_kthread+0x10/0x10 [ 15.906241] ret_from_fork+0x116/0x1d0 [ 15.906261] ? __pfx_kthread+0x10/0x10 [ 15.906282] ret_from_fork_asm+0x1a/0x30 [ 15.906316] </TASK> [ 15.906327] [ 15.913459] Allocated by task 282: [ 15.913587] kasan_save_stack+0x45/0x70 [ 15.913745] kasan_save_track+0x18/0x40 [ 15.913939] kasan_save_alloc_info+0x3b/0x50 [ 15.914173] __kasan_kmalloc+0xb7/0xc0 [ 15.914359] __kmalloc_cache_noprof+0x189/0x420 [ 15.914580] kasan_atomics+0x95/0x310 [ 15.914727] kunit_try_run_case+0x1a5/0x480 [ 15.914874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.915157] kthread+0x337/0x6f0 [ 15.915336] ret_from_fork+0x116/0x1d0 [ 15.915522] ret_from_fork_asm+0x1a/0x30 [ 15.915689] [ 15.915772] The buggy address belongs to the object at ffff8881038e3c00 [ 15.915772] which belongs to the cache kmalloc-64 of size 64 [ 15.916268] The buggy address is located 0 bytes to the right of [ 15.916268] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.916763] [ 15.916847] The buggy address belongs to the physical page: [ 15.917085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.917386] flags: 0x200000000000000(node=0|zone=2) [ 15.917623] page_type: f5(slab) [ 15.917766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.918002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.918245] page dumped because: kasan: bad access detected [ 15.918418] [ 15.918488] Memory state around the buggy address: [ 15.918642] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.918957] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.919298] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.919615] ^ [ 15.919847] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920188] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920520] ================================================================== [ 15.866918] ================================================================== [ 15.868078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.868733] Read of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.869321] [ 15.869427] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.869471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.869484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.869505] Call Trace: [ 15.869519] <TASK> [ 15.869536] dump_stack_lvl+0x73/0xb0 [ 15.869566] print_report+0xd1/0x650 [ 15.869590] ? __virt_addr_valid+0x1db/0x2d0 [ 15.869613] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.869636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.869661] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.869683] kasan_report+0x141/0x180 [ 15.869720] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.869750] __asan_report_load8_noabort+0x18/0x20 [ 15.869777] kasan_atomics_helper+0x4eae/0x5450 [ 15.869801] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.869826] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.869851] ? kasan_atomics+0x152/0x310 [ 15.869880] kasan_atomics+0x1dc/0x310 [ 15.869903] ? __pfx_kasan_atomics+0x10/0x10 [ 15.869926] ? trace_hardirqs_on+0x37/0xe0 [ 15.869950] ? __pfx_read_tsc+0x10/0x10 [ 15.869973] ? ktime_get_ts64+0x86/0x230 [ 15.869998] kunit_try_run_case+0x1a5/0x480 [ 15.870023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.870055] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.870082] ? __kthread_parkme+0x82/0x180 [ 15.870103] ? preempt_count_sub+0x50/0x80 [ 15.870128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.870154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.870179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.870239] kthread+0x337/0x6f0 [ 15.870259] ? trace_preempt_on+0x20/0xc0 [ 15.870283] ? __pfx_kthread+0x10/0x10 [ 15.870305] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.870327] ? calculate_sigpending+0x7b/0xa0 [ 15.870353] ? __pfx_kthread+0x10/0x10 [ 15.870376] ret_from_fork+0x116/0x1d0 [ 15.870395] ? __pfx_kthread+0x10/0x10 [ 15.870416] ret_from_fork_asm+0x1a/0x30 [ 15.870449] </TASK> [ 15.870461] [ 15.879646] Allocated by task 282: [ 15.879793] kasan_save_stack+0x45/0x70 [ 15.879941] kasan_save_track+0x18/0x40 [ 15.880102] kasan_save_alloc_info+0x3b/0x50 [ 15.880320] __kasan_kmalloc+0xb7/0xc0 [ 15.880506] __kmalloc_cache_noprof+0x189/0x420 [ 15.880734] kasan_atomics+0x95/0x310 [ 15.880917] kunit_try_run_case+0x1a5/0x480 [ 15.881147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.881357] kthread+0x337/0x6f0 [ 15.881524] ret_from_fork+0x116/0x1d0 [ 15.881674] ret_from_fork_asm+0x1a/0x30 [ 15.881866] [ 15.881937] The buggy address belongs to the object at ffff8881038e3c00 [ 15.881937] which belongs to the cache kmalloc-64 of size 64 [ 15.882473] The buggy address is located 0 bytes to the right of [ 15.882473] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.882959] [ 15.883072] The buggy address belongs to the physical page: [ 15.883286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.883608] flags: 0x200000000000000(node=0|zone=2) [ 15.883779] page_type: f5(slab) [ 15.883901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.884264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.884600] page dumped because: kasan: bad access detected [ 15.884837] [ 15.884907] Memory state around the buggy address: [ 15.885101] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.885423] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.885753] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.886046] ^ [ 15.886231] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.886523] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.886802] ================================================================== [ 15.950006] ================================================================== [ 15.950253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.950493] Write of size 8 at addr ffff8881038e3c30 by task kunit_try_catch/282 [ 15.950733] [ 15.950821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.950864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.950878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.950899] Call Trace: [ 15.950915] <TASK> [ 15.950933] dump_stack_lvl+0x73/0xb0 [ 15.950963] print_report+0xd1/0x650 [ 15.950986] ? __virt_addr_valid+0x1db/0x2d0 [ 15.951010] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.951033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.951402] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.951428] kasan_report+0x141/0x180 [ 15.951475] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.951915] kasan_check_range+0x10c/0x1c0 [ 15.951956] __kasan_check_write+0x18/0x20 [ 15.951993] kasan_atomics_helper+0x15b6/0x5450 [ 15.952018] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.952043] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.952081] ? kasan_atomics+0x152/0x310 [ 15.952110] kasan_atomics+0x1dc/0x310 [ 15.952134] ? __pfx_kasan_atomics+0x10/0x10 [ 15.952158] ? trace_hardirqs_on+0x37/0xe0 [ 15.952182] ? __pfx_read_tsc+0x10/0x10 [ 15.952205] ? ktime_get_ts64+0x86/0x230 [ 15.952229] kunit_try_run_case+0x1a5/0x480 [ 15.952254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.952280] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.952308] ? __kthread_parkme+0x82/0x180 [ 15.952333] ? preempt_count_sub+0x50/0x80 [ 15.952358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.952385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.952410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.952437] kthread+0x337/0x6f0 [ 15.952456] ? trace_preempt_on+0x20/0xc0 [ 15.952480] ? __pfx_kthread+0x10/0x10 [ 15.952502] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.952525] ? calculate_sigpending+0x7b/0xa0 [ 15.952550] ? __pfx_kthread+0x10/0x10 [ 15.952572] ret_from_fork+0x116/0x1d0 [ 15.952591] ? __pfx_kthread+0x10/0x10 [ 15.952613] ret_from_fork_asm+0x1a/0x30 [ 15.952646] </TASK> [ 15.952657] [ 15.965438] Allocated by task 282: [ 15.965800] kasan_save_stack+0x45/0x70 [ 15.966147] kasan_save_track+0x18/0x40 [ 15.966522] kasan_save_alloc_info+0x3b/0x50 [ 15.966940] __kasan_kmalloc+0xb7/0xc0 [ 15.967340] __kmalloc_cache_noprof+0x189/0x420 [ 15.967741] kasan_atomics+0x95/0x310 [ 15.968063] kunit_try_run_case+0x1a5/0x480 [ 15.969420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.970524] kthread+0x337/0x6f0 [ 15.970828] ret_from_fork+0x116/0x1d0 [ 15.971338] ret_from_fork_asm+0x1a/0x30 [ 15.971503] [ 15.971580] The buggy address belongs to the object at ffff8881038e3c00 [ 15.971580] which belongs to the cache kmalloc-64 of size 64 [ 15.972245] The buggy address is located 0 bytes to the right of [ 15.972245] allocated 48-byte region [ffff8881038e3c00, ffff8881038e3c30) [ 15.972629] [ 15.973107] The buggy address belongs to the physical page: [ 15.973378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3 [ 15.973747] flags: 0x200000000000000(node=0|zone=2) [ 15.973948] page_type: f5(slab) [ 15.974189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.974536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.974880] page dumped because: kasan: bad access detected [ 15.975209] [ 15.975310] Memory state around the buggy address: [ 15.975531] ffff8881038e3b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.975813] ffff8881038e3b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.976096] >ffff8881038e3c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.976417] ^ [ 15.976667] ffff8881038e3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.976952] ffff8881038e3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.977198] ==================================================================