Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.401574] ================================================================== [ 19.401621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.401960] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.402047] [ 19.402213] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.402307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.402466] Hardware name: linux,dummy-virt (DT) [ 19.402604] Call trace: [ 19.402718] show_stack+0x20/0x38 (C) [ 19.402772] dump_stack_lvl+0x8c/0xd0 [ 19.402890] print_report+0x118/0x5d0 [ 19.402957] kasan_report+0xdc/0x128 [ 19.403012] kasan_check_range+0x100/0x1a8 [ 19.403062] __kasan_check_write+0x20/0x30 [ 19.403107] kasan_atomics_helper+0x17ec/0x4858 [ 19.403206] kasan_atomics+0x198/0x2e0 [ 19.403265] kunit_try_run_case+0x170/0x3f0 [ 19.403333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.403395] kthread+0x328/0x630 [ 19.403502] ret_from_fork+0x10/0x20 [ 19.403549] [ 19.403570] Allocated by task 265: [ 19.403600] kasan_save_stack+0x3c/0x68 [ 19.403641] kasan_save_track+0x20/0x40 [ 19.403696] kasan_save_alloc_info+0x40/0x58 [ 19.403897] __kasan_kmalloc+0xd4/0xd8 [ 19.404212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.404297] kasan_atomics+0xb8/0x2e0 [ 19.404365] kunit_try_run_case+0x170/0x3f0 [ 19.404420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.404480] kthread+0x328/0x630 [ 19.404517] ret_from_fork+0x10/0x20 [ 19.404555] [ 19.404585] The buggy address belongs to the object at fff00000c79fb480 [ 19.404585] which belongs to the cache kmalloc-64 of size 64 [ 19.404652] The buggy address is located 0 bytes to the right of [ 19.404652] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.404717] [ 19.404741] The buggy address belongs to the physical page: [ 19.404803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.404858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.404917] page_type: f5(slab) [ 19.405006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.405295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.405369] page dumped because: kasan: bad access detected [ 19.405484] [ 19.405532] Memory state around the buggy address: [ 19.405589] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406086] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406148] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.406216] ^ [ 19.406252] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.406297] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.406589] ================================================================== [ 19.292989] ================================================================== [ 19.293045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.293098] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.293149] [ 19.293185] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.293268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.293295] Hardware name: linux,dummy-virt (DT) [ 19.293329] Call trace: [ 19.293352] show_stack+0x20/0x38 (C) [ 19.293401] dump_stack_lvl+0x8c/0xd0 [ 19.293447] print_report+0x118/0x5d0 [ 19.293494] kasan_report+0xdc/0x128 [ 19.293539] kasan_check_range+0x100/0x1a8 [ 19.293588] __kasan_check_write+0x20/0x30 [ 19.293633] kasan_atomics_helper+0xf88/0x4858 [ 19.293680] kasan_atomics+0x198/0x2e0 [ 19.293726] kunit_try_run_case+0x170/0x3f0 [ 19.293772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.293825] kthread+0x328/0x630 [ 19.293899] ret_from_fork+0x10/0x20 [ 19.293951] [ 19.293971] Allocated by task 265: [ 19.294000] kasan_save_stack+0x3c/0x68 [ 19.294042] kasan_save_track+0x20/0x40 [ 19.294080] kasan_save_alloc_info+0x40/0x58 [ 19.294122] __kasan_kmalloc+0xd4/0xd8 [ 19.294160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.294200] kasan_atomics+0xb8/0x2e0 [ 19.294237] kunit_try_run_case+0x170/0x3f0 [ 19.294276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.294325] kthread+0x328/0x630 [ 19.294359] ret_from_fork+0x10/0x20 [ 19.294396] [ 19.294417] The buggy address belongs to the object at fff00000c79fb480 [ 19.294417] which belongs to the cache kmalloc-64 of size 64 [ 19.294475] The buggy address is located 0 bytes to the right of [ 19.294475] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.294538] [ 19.294559] The buggy address belongs to the physical page: [ 19.294592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.294645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.294695] page_type: f5(slab) [ 19.294734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.294785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.294827] page dumped because: kasan: bad access detected [ 19.294860] [ 19.294892] Memory state around the buggy address: [ 19.294924] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.294968] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.295012] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.295051] ^ [ 19.295083] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.295126] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.295166] ================================================================== [ 19.305688] ================================================================== [ 19.305793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.305878] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.305974] [ 19.306044] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.306140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.306436] Hardware name: linux,dummy-virt (DT) [ 19.306519] Call trace: [ 19.306546] show_stack+0x20/0x38 (C) [ 19.306634] dump_stack_lvl+0x8c/0xd0 [ 19.306722] print_report+0x118/0x5d0 [ 19.306778] kasan_report+0xdc/0x128 [ 19.306826] kasan_check_range+0x100/0x1a8 [ 19.306905] __kasan_check_write+0x20/0x30 [ 19.306981] kasan_atomics_helper+0x10c0/0x4858 [ 19.307062] kasan_atomics+0x198/0x2e0 [ 19.307147] kunit_try_run_case+0x170/0x3f0 [ 19.307195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.307254] kthread+0x328/0x630 [ 19.307324] ret_from_fork+0x10/0x20 [ 19.307587] [ 19.307621] Allocated by task 265: [ 19.307679] kasan_save_stack+0x3c/0x68 [ 19.308003] kasan_save_track+0x20/0x40 [ 19.308665] kasan_save_alloc_info+0x40/0x58 [ 19.308904] __kasan_kmalloc+0xd4/0xd8 [ 19.309282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.309525] kasan_atomics+0xb8/0x2e0 [ 19.309579] kunit_try_run_case+0x170/0x3f0 [ 19.309619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.309665] kthread+0x328/0x630 [ 19.309700] ret_from_fork+0x10/0x20 [ 19.309739] [ 19.309761] The buggy address belongs to the object at fff00000c79fb480 [ 19.309761] which belongs to the cache kmalloc-64 of size 64 [ 19.309822] The buggy address is located 0 bytes to the right of [ 19.309822] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.309898] [ 19.309920] The buggy address belongs to the physical page: [ 19.309952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.310006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.310055] page_type: f5(slab) [ 19.310094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.310146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.310189] page dumped because: kasan: bad access detected [ 19.310226] [ 19.310248] Memory state around the buggy address: [ 19.310281] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.310325] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.310370] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.310411] ^ [ 19.310443] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.310487] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.310527] ================================================================== [ 19.364009] ================================================================== [ 19.364072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.364123] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.364265] [ 19.364402] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.364517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.364546] Hardware name: linux,dummy-virt (DT) [ 19.364603] Call trace: [ 19.364628] show_stack+0x20/0x38 (C) [ 19.364792] dump_stack_lvl+0x8c/0xd0 [ 19.364878] print_report+0x118/0x5d0 [ 19.364929] kasan_report+0xdc/0x128 [ 19.364983] kasan_check_range+0x100/0x1a8 [ 19.365043] __kasan_check_write+0x20/0x30 [ 19.365096] kasan_atomics_helper+0x15b4/0x4858 [ 19.365161] kasan_atomics+0x198/0x2e0 [ 19.365216] kunit_try_run_case+0x170/0x3f0 [ 19.365341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.365493] kthread+0x328/0x630 [ 19.365546] ret_from_fork+0x10/0x20 [ 19.365594] [ 19.365631] Allocated by task 265: [ 19.365711] kasan_save_stack+0x3c/0x68 [ 19.365780] kasan_save_track+0x20/0x40 [ 19.365827] kasan_save_alloc_info+0x40/0x58 [ 19.365927] __kasan_kmalloc+0xd4/0xd8 [ 19.365974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.366021] kasan_atomics+0xb8/0x2e0 [ 19.366069] kunit_try_run_case+0x170/0x3f0 [ 19.366152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.366198] kthread+0x328/0x630 [ 19.366231] ret_from_fork+0x10/0x20 [ 19.366287] [ 19.366309] The buggy address belongs to the object at fff00000c79fb480 [ 19.366309] which belongs to the cache kmalloc-64 of size 64 [ 19.366464] The buggy address is located 0 bytes to the right of [ 19.366464] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.366635] [ 19.366662] The buggy address belongs to the physical page: [ 19.366695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.366760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.366934] page_type: f5(slab) [ 19.366977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.367030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.367163] page dumped because: kasan: bad access detected [ 19.367211] [ 19.367251] Memory state around the buggy address: [ 19.367304] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.367350] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.367395] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.367458] ^ [ 19.367493] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.367536] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.367574] ================================================================== [ 19.247140] ================================================================== [ 19.247183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.247242] Write of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.247293] [ 19.247321] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.247401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.247430] Hardware name: linux,dummy-virt (DT) [ 19.247460] Call trace: [ 19.247493] show_stack+0x20/0x38 (C) [ 19.247540] dump_stack_lvl+0x8c/0xd0 [ 19.247588] print_report+0x118/0x5d0 [ 19.247633] kasan_report+0xdc/0x128 [ 19.247680] kasan_check_range+0x100/0x1a8 [ 19.247727] __kasan_check_write+0x20/0x30 [ 19.247774] kasan_atomics_helper+0xd3c/0x4858 [ 19.247834] kasan_atomics+0x198/0x2e0 [ 19.248454] kunit_try_run_case+0x170/0x3f0 [ 19.248727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.248789] kthread+0x328/0x630 [ 19.248853] ret_from_fork+0x10/0x20 [ 19.248918] [ 19.248939] Allocated by task 265: [ 19.248970] kasan_save_stack+0x3c/0x68 [ 19.249013] kasan_save_track+0x20/0x40 [ 19.249428] kasan_save_alloc_info+0x40/0x58 [ 19.249568] __kasan_kmalloc+0xd4/0xd8 [ 19.249818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.250058] kasan_atomics+0xb8/0x2e0 [ 19.250212] kunit_try_run_case+0x170/0x3f0 [ 19.250274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.250355] kthread+0x328/0x630 [ 19.250489] ret_from_fork+0x10/0x20 [ 19.250528] [ 19.250552] The buggy address belongs to the object at fff00000c79fb480 [ 19.250552] which belongs to the cache kmalloc-64 of size 64 [ 19.250625] The buggy address is located 0 bytes to the right of [ 19.250625] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.250690] [ 19.250846] The buggy address belongs to the physical page: [ 19.250964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.251064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.251467] page_type: f5(slab) [ 19.251560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.251661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.251704] page dumped because: kasan: bad access detected [ 19.251763] [ 19.251785] Memory state around the buggy address: [ 19.251820] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.252040] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.252170] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.252266] ^ [ 19.252330] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.252375] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.252597] ================================================================== [ 19.276966] ================================================================== [ 19.277048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.277111] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.277164] [ 19.277199] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.277279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.277333] Hardware name: linux,dummy-virt (DT) [ 19.277365] Call trace: [ 19.277390] show_stack+0x20/0x38 (C) [ 19.277439] dump_stack_lvl+0x8c/0xd0 [ 19.277489] print_report+0x118/0x5d0 [ 19.277535] kasan_report+0xdc/0x128 [ 19.277717] __asan_report_store8_noabort+0x20/0x30 [ 19.277795] kasan_atomics_helper+0x3e5c/0x4858 [ 19.277958] kasan_atomics+0x198/0x2e0 [ 19.278050] kunit_try_run_case+0x170/0x3f0 [ 19.278102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.278156] kthread+0x328/0x630 [ 19.278204] ret_from_fork+0x10/0x20 [ 19.278255] [ 19.278469] Allocated by task 265: [ 19.278618] kasan_save_stack+0x3c/0x68 [ 19.278671] kasan_save_track+0x20/0x40 [ 19.278783] kasan_save_alloc_info+0x40/0x58 [ 19.278826] __kasan_kmalloc+0xd4/0xd8 [ 19.278907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.278950] kasan_atomics+0xb8/0x2e0 [ 19.278988] kunit_try_run_case+0x170/0x3f0 [ 19.279034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.279111] kthread+0x328/0x630 [ 19.279145] ret_from_fork+0x10/0x20 [ 19.279183] [ 19.279205] The buggy address belongs to the object at fff00000c79fb480 [ 19.279205] which belongs to the cache kmalloc-64 of size 64 [ 19.279269] The buggy address is located 0 bytes to the right of [ 19.279269] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.279345] [ 19.279369] The buggy address belongs to the physical page: [ 19.279410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.279479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.279530] page_type: f5(slab) [ 19.279570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.279630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.279678] page dumped because: kasan: bad access detected [ 19.279714] [ 19.279733] Memory state around the buggy address: [ 19.279798] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.279842] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.279896] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.279936] ^ [ 19.279969] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.280052] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.280092] ================================================================== [ 19.253605] ================================================================== [ 19.253713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.253788] Read of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.253899] [ 19.253966] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.254087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.254134] Hardware name: linux,dummy-virt (DT) [ 19.254345] Call trace: [ 19.254451] show_stack+0x20/0x38 (C) [ 19.254513] dump_stack_lvl+0x8c/0xd0 [ 19.254626] print_report+0x118/0x5d0 [ 19.254692] kasan_report+0xdc/0x128 [ 19.254757] __asan_report_load4_noabort+0x20/0x30 [ 19.254839] kasan_atomics_helper+0x3e04/0x4858 [ 19.254921] kasan_atomics+0x198/0x2e0 [ 19.254972] kunit_try_run_case+0x170/0x3f0 [ 19.255038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.255236] kthread+0x328/0x630 [ 19.255286] ret_from_fork+0x10/0x20 [ 19.255337] [ 19.255360] Allocated by task 265: [ 19.255392] kasan_save_stack+0x3c/0x68 [ 19.255522] kasan_save_track+0x20/0x40 [ 19.255590] kasan_save_alloc_info+0x40/0x58 [ 19.255634] __kasan_kmalloc+0xd4/0xd8 [ 19.255711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.256050] kasan_atomics+0xb8/0x2e0 [ 19.256185] kunit_try_run_case+0x170/0x3f0 [ 19.256269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.256347] kthread+0x328/0x630 [ 19.256382] ret_from_fork+0x10/0x20 [ 19.256419] [ 19.256449] The buggy address belongs to the object at fff00000c79fb480 [ 19.256449] which belongs to the cache kmalloc-64 of size 64 [ 19.256510] The buggy address is located 0 bytes to the right of [ 19.256510] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.256576] [ 19.256599] The buggy address belongs to the physical page: [ 19.256682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.256741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.256793] page_type: f5(slab) [ 19.256833] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.256899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.256940] page dumped because: kasan: bad access detected [ 19.257124] [ 19.257229] Memory state around the buggy address: [ 19.257306] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.257386] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.257475] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.257810] ^ [ 19.257896] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.257953] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.258041] ================================================================== [ 19.082907] ================================================================== [ 19.082985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 19.085069] [ 19.085235] page_type: f5(slab) [ 19.085276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.085328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.085380] page dumped because: kasan: bad access detected [ 19.088743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.088789] kthread+0x328/0x630 [ 19.088874] ret_from_fork+0x10/0x20 [ 19.090103] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.090747] [ 19.091669] __kasan_check_read+0x20/0x30 [ 19.092618] kthread+0x328/0x630 [ 19.092921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.094643] Write of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.097039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.099537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 19.100756] kasan_save_stack+0x3c/0x68 [ 19.101742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.101793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.101841] page_type: f5(slab) [ 19.101903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.102038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.102230] page dumped because: kasan: bad access detected [ 19.102290] [ 19.102362] Memory state around the buggy address: [ 19.102396] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.102480] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.102856] ================================================================== [ 19.342635] ================================================================== [ 19.342764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.342828] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.342913] [ 19.342956] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.343039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.343067] Hardware name: linux,dummy-virt (DT) [ 19.343102] Call trace: [ 19.343128] show_stack+0x20/0x38 (C) [ 19.343179] dump_stack_lvl+0x8c/0xd0 [ 19.343233] print_report+0x118/0x5d0 [ 19.343293] kasan_report+0xdc/0x128 [ 19.343341] kasan_check_range+0x100/0x1a8 [ 19.343389] __kasan_check_write+0x20/0x30 [ 19.343435] kasan_atomics_helper+0x1384/0x4858 [ 19.343488] kasan_atomics+0x198/0x2e0 [ 19.343534] kunit_try_run_case+0x170/0x3f0 [ 19.343592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.343654] kthread+0x328/0x630 [ 19.343695] ret_from_fork+0x10/0x20 [ 19.343750] [ 19.343778] Allocated by task 265: [ 19.343808] kasan_save_stack+0x3c/0x68 [ 19.343877] kasan_save_track+0x20/0x40 [ 19.343918] kasan_save_alloc_info+0x40/0x58 [ 19.343966] __kasan_kmalloc+0xd4/0xd8 [ 19.344013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.344056] kasan_atomics+0xb8/0x2e0 [ 19.344092] kunit_try_run_case+0x170/0x3f0 [ 19.344138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.344189] kthread+0x328/0x630 [ 19.344224] ret_from_fork+0x10/0x20 [ 19.344261] [ 19.344284] The buggy address belongs to the object at fff00000c79fb480 [ 19.344284] which belongs to the cache kmalloc-64 of size 64 [ 19.344344] The buggy address is located 0 bytes to the right of [ 19.344344] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.344409] [ 19.344433] The buggy address belongs to the physical page: [ 19.344490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.344547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.344597] page_type: f5(slab) [ 19.344638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.344691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.344733] page dumped because: kasan: bad access detected [ 19.344766] [ 19.344787] Memory state around the buggy address: [ 19.344821] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.344876] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.344920] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.344961] ^ [ 19.344993] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.345036] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.345074] ================================================================== [ 19.359282] ================================================================== [ 19.359338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.359385] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.359436] [ 19.359466] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.359546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.359574] Hardware name: linux,dummy-virt (DT) [ 19.359607] Call trace: [ 19.359660] show_stack+0x20/0x38 (C) [ 19.359714] dump_stack_lvl+0x8c/0xd0 [ 19.359770] print_report+0x118/0x5d0 [ 19.359834] kasan_report+0xdc/0x128 [ 19.359931] kasan_check_range+0x100/0x1a8 [ 19.360009] __kasan_check_write+0x20/0x30 [ 19.360086] kasan_atomics_helper+0x154c/0x4858 [ 19.360146] kasan_atomics+0x198/0x2e0 [ 19.360192] kunit_try_run_case+0x170/0x3f0 [ 19.360239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.360292] kthread+0x328/0x630 [ 19.360334] ret_from_fork+0x10/0x20 [ 19.360394] [ 19.360446] Allocated by task 265: [ 19.360508] kasan_save_stack+0x3c/0x68 [ 19.360595] kasan_save_track+0x20/0x40 [ 19.360634] kasan_save_alloc_info+0x40/0x58 [ 19.360694] __kasan_kmalloc+0xd4/0xd8 [ 19.360734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.360774] kasan_atomics+0xb8/0x2e0 [ 19.361161] kunit_try_run_case+0x170/0x3f0 [ 19.361242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.361324] kthread+0x328/0x630 [ 19.361397] ret_from_fork+0x10/0x20 [ 19.361486] [ 19.361543] The buggy address belongs to the object at fff00000c79fb480 [ 19.361543] which belongs to the cache kmalloc-64 of size 64 [ 19.361825] The buggy address is located 0 bytes to the right of [ 19.361825] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.361953] [ 19.361975] The buggy address belongs to the physical page: [ 19.362009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.362110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.362451] page_type: f5(slab) [ 19.362529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.362600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.362811] page dumped because: kasan: bad access detected [ 19.362909] [ 19.362958] Memory state around the buggy address: [ 19.363028] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.363115] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.363183] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.363250] ^ [ 19.363307] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.363351] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.363390] ================================================================== [ 19.310971] ================================================================== [ 19.311027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.311077] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.311127] [ 19.311158] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.311247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.311276] Hardware name: linux,dummy-virt (DT) [ 19.311309] Call trace: [ 19.311333] show_stack+0x20/0x38 (C) [ 19.311382] dump_stack_lvl+0x8c/0xd0 [ 19.311431] print_report+0x118/0x5d0 [ 19.311479] kasan_report+0xdc/0x128 [ 19.311524] kasan_check_range+0x100/0x1a8 [ 19.311573] __kasan_check_write+0x20/0x30 [ 19.311618] kasan_atomics_helper+0x1128/0x4858 [ 19.311666] kasan_atomics+0x198/0x2e0 [ 19.311711] kunit_try_run_case+0x170/0x3f0 [ 19.315405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.315475] kthread+0x328/0x630 [ 19.315521] ret_from_fork+0x10/0x20 [ 19.315570] [ 19.315591] Allocated by task 265: [ 19.315622] kasan_save_stack+0x3c/0x68 [ 19.315665] kasan_save_track+0x20/0x40 [ 19.315703] kasan_save_alloc_info+0x40/0x58 [ 19.315745] __kasan_kmalloc+0xd4/0xd8 [ 19.315783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.315824] kasan_atomics+0xb8/0x2e0 [ 19.315874] kunit_try_run_case+0x170/0x3f0 [ 19.315914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.315960] kthread+0x328/0x630 [ 19.315993] ret_from_fork+0x10/0x20 [ 19.316029] [ 19.316050] The buggy address belongs to the object at fff00000c79fb480 [ 19.316050] which belongs to the cache kmalloc-64 of size 64 [ 19.316109] The buggy address is located 0 bytes to the right of [ 19.316109] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.316174] [ 19.316197] The buggy address belongs to the physical page: [ 19.316230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.316286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.316338] page_type: f5(slab) [ 19.316376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.316428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.316471] page dumped because: kasan: bad access detected [ 19.316506] [ 19.316526] Memory state around the buggy address: [ 19.316559] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.316604] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.316648] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.316706] ^ [ 19.316768] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.316820] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.316873] ================================================================== [ 19.392285] ================================================================== [ 19.392334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.392382] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.392617] [ 19.392662] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.392747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.392776] Hardware name: linux,dummy-virt (DT) [ 19.392807] Call trace: [ 19.392830] show_stack+0x20/0x38 (C) [ 19.392894] dump_stack_lvl+0x8c/0xd0 [ 19.392942] print_report+0x118/0x5d0 [ 19.392989] kasan_report+0xdc/0x128 [ 19.393217] kasan_check_range+0x100/0x1a8 [ 19.393397] __kasan_check_write+0x20/0x30 [ 19.393457] kasan_atomics_helper+0x175c/0x4858 [ 19.393551] kasan_atomics+0x198/0x2e0 [ 19.393615] kunit_try_run_case+0x170/0x3f0 [ 19.393670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393733] kthread+0x328/0x630 [ 19.393780] ret_from_fork+0x10/0x20 [ 19.393829] [ 19.393849] Allocated by task 265: [ 19.393900] kasan_save_stack+0x3c/0x68 [ 19.393952] kasan_save_track+0x20/0x40 [ 19.393999] kasan_save_alloc_info+0x40/0x58 [ 19.394041] __kasan_kmalloc+0xd4/0xd8 [ 19.394079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.394121] kasan_atomics+0xb8/0x2e0 [ 19.394159] kunit_try_run_case+0x170/0x3f0 [ 19.394208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.394254] kthread+0x328/0x630 [ 19.394288] ret_from_fork+0x10/0x20 [ 19.394324] [ 19.394344] The buggy address belongs to the object at fff00000c79fb480 [ 19.394344] which belongs to the cache kmalloc-64 of size 64 [ 19.394411] The buggy address is located 0 bytes to the right of [ 19.394411] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.394477] [ 19.394500] The buggy address belongs to the physical page: [ 19.394532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.394591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.394639] page_type: f5(slab) [ 19.394687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.394740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.394790] page dumped because: kasan: bad access detected [ 19.394825] [ 19.394845] Memory state around the buggy address: [ 19.395314] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.395370] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.395426] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.395750] ^ [ 19.396122] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.396377] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.396605] ================================================================== [ 19.382226] ================================================================== [ 19.382370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.382429] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.382497] [ 19.382543] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.382632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.382663] Hardware name: linux,dummy-virt (DT) [ 19.382702] Call trace: [ 19.382755] show_stack+0x20/0x38 (C) [ 19.382810] dump_stack_lvl+0x8c/0xd0 [ 19.382895] print_report+0x118/0x5d0 [ 19.383057] kasan_report+0xdc/0x128 [ 19.383104] kasan_check_range+0x100/0x1a8 [ 19.383158] __kasan_check_write+0x20/0x30 [ 19.383204] kasan_atomics_helper+0x16d0/0x4858 [ 19.383429] kasan_atomics+0x198/0x2e0 [ 19.383545] kunit_try_run_case+0x170/0x3f0 [ 19.383616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.383689] kthread+0x328/0x630 [ 19.383734] ret_from_fork+0x10/0x20 [ 19.383789] [ 19.383831] Allocated by task 265: [ 19.383949] kasan_save_stack+0x3c/0x68 [ 19.384004] kasan_save_track+0x20/0x40 [ 19.384044] kasan_save_alloc_info+0x40/0x58 [ 19.384110] __kasan_kmalloc+0xd4/0xd8 [ 19.384150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.384191] kasan_atomics+0xb8/0x2e0 [ 19.384550] kunit_try_run_case+0x170/0x3f0 [ 19.384715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.384780] kthread+0x328/0x630 [ 19.384844] ret_from_fork+0x10/0x20 [ 19.385277] [ 19.385518] The buggy address belongs to the object at fff00000c79fb480 [ 19.385518] which belongs to the cache kmalloc-64 of size 64 [ 19.385660] The buggy address is located 0 bytes to the right of [ 19.385660] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.385745] [ 19.385770] The buggy address belongs to the physical page: [ 19.385825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.385893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.385992] page_type: f5(slab) [ 19.386051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.386103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.386146] page dumped because: kasan: bad access detected [ 19.386181] [ 19.386201] Memory state around the buggy address: [ 19.386234] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.386279] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.386494] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.386594] ^ [ 19.386667] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.386748] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.387080] ================================================================== [ 19.354243] ================================================================== [ 19.354296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.354344] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.354395] [ 19.354427] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.354507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.354536] Hardware name: linux,dummy-virt (DT) [ 19.354570] Call trace: [ 19.354596] show_stack+0x20/0x38 (C) [ 19.354644] dump_stack_lvl+0x8c/0xd0 [ 19.354691] print_report+0x118/0x5d0 [ 19.354739] kasan_report+0xdc/0x128 [ 19.354785] kasan_check_range+0x100/0x1a8 [ 19.354835] __kasan_check_write+0x20/0x30 [ 19.354895] kasan_atomics_helper+0x147c/0x4858 [ 19.354944] kasan_atomics+0x198/0x2e0 [ 19.354990] kunit_try_run_case+0x170/0x3f0 [ 19.355036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.355089] kthread+0x328/0x630 [ 19.355133] ret_from_fork+0x10/0x20 [ 19.355180] [ 19.355201] Allocated by task 265: [ 19.355237] kasan_save_stack+0x3c/0x68 [ 19.355278] kasan_save_track+0x20/0x40 [ 19.355318] kasan_save_alloc_info+0x40/0x58 [ 19.355358] __kasan_kmalloc+0xd4/0xd8 [ 19.355397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.355437] kasan_atomics+0xb8/0x2e0 [ 19.355475] kunit_try_run_case+0x170/0x3f0 [ 19.355513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.355559] kthread+0x328/0x630 [ 19.355592] ret_from_fork+0x10/0x20 [ 19.355630] [ 19.355651] The buggy address belongs to the object at fff00000c79fb480 [ 19.355651] which belongs to the cache kmalloc-64 of size 64 [ 19.355710] The buggy address is located 0 bytes to the right of [ 19.355710] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.355776] [ 19.355797] The buggy address belongs to the physical page: [ 19.355830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.355892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.355939] page_type: f5(slab) [ 19.355978] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.356041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.356085] page dumped because: kasan: bad access detected [ 19.356126] [ 19.356156] Memory state around the buggy address: [ 19.356188] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.356233] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.356277] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.356317] ^ [ 19.356349] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.356392] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.356430] ================================================================== [ 19.329373] ================================================================== [ 19.329428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.329521] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.329589] [ 19.329624] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.329720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.329757] Hardware name: linux,dummy-virt (DT) [ 19.329790] Call trace: [ 19.329831] show_stack+0x20/0x38 (C) [ 19.330105] dump_stack_lvl+0x8c/0xd0 [ 19.330180] print_report+0x118/0x5d0 [ 19.330234] kasan_report+0xdc/0x128 [ 19.330291] kasan_check_range+0x100/0x1a8 [ 19.330357] __kasan_check_write+0x20/0x30 [ 19.330413] kasan_atomics_helper+0x126c/0x4858 [ 19.330468] kasan_atomics+0x198/0x2e0 [ 19.330534] kunit_try_run_case+0x170/0x3f0 [ 19.330590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.330643] kthread+0x328/0x630 [ 19.330710] ret_from_fork+0x10/0x20 [ 19.330777] [ 19.330805] Allocated by task 265: [ 19.330843] kasan_save_stack+0x3c/0x68 [ 19.330908] kasan_save_track+0x20/0x40 [ 19.330947] kasan_save_alloc_info+0x40/0x58 [ 19.330989] __kasan_kmalloc+0xd4/0xd8 [ 19.331026] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.331068] kasan_atomics+0xb8/0x2e0 [ 19.331104] kunit_try_run_case+0x170/0x3f0 [ 19.331144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.331187] kthread+0x328/0x630 [ 19.331331] ret_from_fork+0x10/0x20 [ 19.331403] [ 19.331429] The buggy address belongs to the object at fff00000c79fb480 [ 19.331429] which belongs to the cache kmalloc-64 of size 64 [ 19.331496] The buggy address is located 0 bytes to the right of [ 19.331496] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.331571] [ 19.331595] The buggy address belongs to the physical page: [ 19.331633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.331687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.331737] page_type: f5(slab) [ 19.331776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.331846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.331912] page dumped because: kasan: bad access detected [ 19.332065] [ 19.332105] Memory state around the buggy address: [ 19.332191] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.332246] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.332292] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.332334] ^ [ 19.332370] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.332412] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.332452] ================================================================== [ 19.387431] ================================================================== [ 19.387480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.387531] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.387686] [ 19.387763] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.388106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.388161] Hardware name: linux,dummy-virt (DT) [ 19.388202] Call trace: [ 19.388246] show_stack+0x20/0x38 (C) [ 19.388300] dump_stack_lvl+0x8c/0xd0 [ 19.388362] print_report+0x118/0x5d0 [ 19.388420] kasan_report+0xdc/0x128 [ 19.388467] __asan_report_load8_noabort+0x20/0x30 [ 19.388519] kasan_atomics_helper+0x3e10/0x4858 [ 19.388596] kasan_atomics+0x198/0x2e0 [ 19.388646] kunit_try_run_case+0x170/0x3f0 [ 19.388694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388748] kthread+0x328/0x630 [ 19.388817] ret_from_fork+0x10/0x20 [ 19.389074] [ 19.389114] Allocated by task 265: [ 19.389175] kasan_save_stack+0x3c/0x68 [ 19.389303] kasan_save_track+0x20/0x40 [ 19.389377] kasan_save_alloc_info+0x40/0x58 [ 19.389430] __kasan_kmalloc+0xd4/0xd8 [ 19.389486] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.389810] kasan_atomics+0xb8/0x2e0 [ 19.389890] kunit_try_run_case+0x170/0x3f0 [ 19.390006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.390097] kthread+0x328/0x630 [ 19.390160] ret_from_fork+0x10/0x20 [ 19.390278] [ 19.390321] The buggy address belongs to the object at fff00000c79fb480 [ 19.390321] which belongs to the cache kmalloc-64 of size 64 [ 19.390399] The buggy address is located 0 bytes to the right of [ 19.390399] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.390485] [ 19.390509] The buggy address belongs to the physical page: [ 19.390541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.390839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.391025] page_type: f5(slab) [ 19.391110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.391307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.391480] page dumped because: kasan: bad access detected [ 19.391544] [ 19.391593] Memory state around the buggy address: [ 19.391722] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.391815] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.391870] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.391910] ^ [ 19.391973] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.392019] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.392058] ================================================================== [ 19.396800] ================================================================== [ 19.396893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.396945] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.397210] [ 19.397287] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.397433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.397468] Hardware name: linux,dummy-virt (DT) [ 19.397526] Call trace: [ 19.397551] show_stack+0x20/0x38 (C) [ 19.397604] dump_stack_lvl+0x8c/0xd0 [ 19.397918] print_report+0x118/0x5d0 [ 19.397995] kasan_report+0xdc/0x128 [ 19.398051] __asan_report_load8_noabort+0x20/0x30 [ 19.398103] kasan_atomics_helper+0x3e20/0x4858 [ 19.398226] kasan_atomics+0x198/0x2e0 [ 19.398311] kunit_try_run_case+0x170/0x3f0 [ 19.398367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.398439] kthread+0x328/0x630 [ 19.398524] ret_from_fork+0x10/0x20 [ 19.398579] [ 19.398608] Allocated by task 265: [ 19.398647] kasan_save_stack+0x3c/0x68 [ 19.398689] kasan_save_track+0x20/0x40 [ 19.398728] kasan_save_alloc_info+0x40/0x58 [ 19.398928] __kasan_kmalloc+0xd4/0xd8 [ 19.398972] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.399099] kasan_atomics+0xb8/0x2e0 [ 19.399158] kunit_try_run_case+0x170/0x3f0 [ 19.399227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.399381] kthread+0x328/0x630 [ 19.399418] ret_from_fork+0x10/0x20 [ 19.399456] [ 19.399584] The buggy address belongs to the object at fff00000c79fb480 [ 19.399584] which belongs to the cache kmalloc-64 of size 64 [ 19.399679] The buggy address is located 0 bytes to the right of [ 19.399679] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.399890] [ 19.399935] The buggy address belongs to the physical page: [ 19.400002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.400143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.400232] page_type: f5(slab) [ 19.400306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.400444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.400488] page dumped because: kasan: bad access detected [ 19.400523] [ 19.400542] Memory state around the buggy address: [ 19.400576] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.400623] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.400668] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.401039] ^ [ 19.401175] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.401250] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.401293] ================================================================== [ 19.244803] ================================================================== [ 19.244856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.244926] Read of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.244977] [ 19.245009] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.245091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.245118] Hardware name: linux,dummy-virt (DT) [ 19.245151] Call trace: [ 19.245174] show_stack+0x20/0x38 (C) [ 19.245223] dump_stack_lvl+0x8c/0xd0 [ 19.245271] print_report+0x118/0x5d0 [ 19.245318] kasan_report+0xdc/0x128 [ 19.245364] __asan_report_load4_noabort+0x20/0x30 [ 19.245417] kasan_atomics_helper+0x3dd8/0x4858 [ 19.245465] kasan_atomics+0x198/0x2e0 [ 19.245510] kunit_try_run_case+0x170/0x3f0 [ 19.245558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.245612] kthread+0x328/0x630 [ 19.245656] ret_from_fork+0x10/0x20 [ 19.245705] [ 19.245725] Allocated by task 265: [ 19.245755] kasan_save_stack+0x3c/0x68 [ 19.245796] kasan_save_track+0x20/0x40 [ 19.245837] kasan_save_alloc_info+0x40/0x58 [ 19.245892] __kasan_kmalloc+0xd4/0xd8 [ 19.245932] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.245973] kasan_atomics+0xb8/0x2e0 [ 19.246022] kunit_try_run_case+0x170/0x3f0 [ 19.246062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.246113] kthread+0x328/0x630 [ 19.246148] ret_from_fork+0x10/0x20 [ 19.246187] [ 19.246207] The buggy address belongs to the object at fff00000c79fb480 [ 19.246207] which belongs to the cache kmalloc-64 of size 64 [ 19.246265] The buggy address is located 0 bytes to the right of [ 19.246265] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.246330] [ 19.246351] The buggy address belongs to the physical page: [ 19.246395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.246456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.246506] page_type: f5(slab) [ 19.246543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.246594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.246644] page dumped because: kasan: bad access detected [ 19.246678] [ 19.246697] Memory state around the buggy address: [ 19.246729] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.246779] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.246825] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.246880] ^ [ 19.246913] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.246956] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.246997] ================================================================== [ 19.285654] ================================================================== [ 19.285731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.285784] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.285911] [ 19.285946] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.286110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.286140] Hardware name: linux,dummy-virt (DT) [ 19.286269] Call trace: [ 19.286324] show_stack+0x20/0x38 (C) [ 19.286422] dump_stack_lvl+0x8c/0xd0 [ 19.286499] print_report+0x118/0x5d0 [ 19.286571] kasan_report+0xdc/0x128 [ 19.286650] kasan_check_range+0x100/0x1a8 [ 19.286726] __kasan_check_write+0x20/0x30 [ 19.286771] kasan_atomics_helper+0xf20/0x4858 [ 19.286832] kasan_atomics+0x198/0x2e0 [ 19.286927] kunit_try_run_case+0x170/0x3f0 [ 19.286977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.287029] kthread+0x328/0x630 [ 19.287164] ret_from_fork+0x10/0x20 [ 19.287211] [ 19.287374] Allocated by task 265: [ 19.287443] kasan_save_stack+0x3c/0x68 [ 19.287506] kasan_save_track+0x20/0x40 [ 19.287547] kasan_save_alloc_info+0x40/0x58 [ 19.287588] __kasan_kmalloc+0xd4/0xd8 [ 19.287627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.287669] kasan_atomics+0xb8/0x2e0 [ 19.287716] kunit_try_run_case+0x170/0x3f0 [ 19.287792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.287838] kthread+0x328/0x630 [ 19.288024] ret_from_fork+0x10/0x20 [ 19.288123] [ 19.288158] The buggy address belongs to the object at fff00000c79fb480 [ 19.288158] which belongs to the cache kmalloc-64 of size 64 [ 19.288282] The buggy address is located 0 bytes to the right of [ 19.288282] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.288399] [ 19.288421] The buggy address belongs to the physical page: [ 19.288455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.288653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.288705] page_type: f5(slab) [ 19.288745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.289022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.289149] page dumped because: kasan: bad access detected [ 19.289266] [ 19.289336] Memory state around the buggy address: [ 19.292180] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.292252] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.292296] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.292336] ^ [ 19.292371] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.292415] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.292455] ================================================================== [ 19.258822] ================================================================== [ 19.258942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.258996] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.259079] [ 19.259114] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.259196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.259254] Hardware name: linux,dummy-virt (DT) [ 19.259289] Call trace: [ 19.259341] show_stack+0x20/0x38 (C) [ 19.259392] dump_stack_lvl+0x8c/0xd0 [ 19.259439] print_report+0x118/0x5d0 [ 19.259486] kasan_report+0xdc/0x128 [ 19.259531] kasan_check_range+0x100/0x1a8 [ 19.259700] __kasan_check_read+0x20/0x30 [ 19.259830] kasan_atomics_helper+0xdd4/0x4858 [ 19.259960] kasan_atomics+0x198/0x2e0 [ 19.260040] kunit_try_run_case+0x170/0x3f0 [ 19.260225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.260337] kthread+0x328/0x630 [ 19.260405] ret_from_fork+0x10/0x20 [ 19.260588] [ 19.260648] Allocated by task 265: [ 19.261034] kasan_save_stack+0x3c/0x68 [ 19.261136] kasan_save_track+0x20/0x40 [ 19.261225] kasan_save_alloc_info+0x40/0x58 [ 19.261311] __kasan_kmalloc+0xd4/0xd8 [ 19.261402] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.261475] kasan_atomics+0xb8/0x2e0 [ 19.261513] kunit_try_run_case+0x170/0x3f0 [ 19.261577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.261625] kthread+0x328/0x630 [ 19.261694] ret_from_fork+0x10/0x20 [ 19.261733] [ 19.261755] The buggy address belongs to the object at fff00000c79fb480 [ 19.261755] which belongs to the cache kmalloc-64 of size 64 [ 19.261816] The buggy address is located 0 bytes to the right of [ 19.261816] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.261894] [ 19.261918] The buggy address belongs to the physical page: [ 19.262074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.262210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.262325] page_type: f5(slab) [ 19.262575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.262700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.262821] page dumped because: kasan: bad access detected [ 19.262914] [ 19.263036] Memory state around the buggy address: [ 19.263072] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.263117] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.266228] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.266280] ^ [ 19.266318] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.266362] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.266402] ================================================================== [ 19.266901] ================================================================== [ 19.266956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.267009] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.267059] [ 19.267092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.267174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.267201] Hardware name: linux,dummy-virt (DT) [ 19.267243] Call trace: [ 19.267266] show_stack+0x20/0x38 (C) [ 19.267316] dump_stack_lvl+0x8c/0xd0 [ 19.267364] print_report+0x118/0x5d0 [ 19.267412] kasan_report+0xdc/0x128 [ 19.267457] __asan_report_load8_noabort+0x20/0x30 [ 19.267537] kasan_atomics_helper+0x3f58/0x4858 [ 19.267588] kasan_atomics+0x198/0x2e0 [ 19.267949] kunit_try_run_case+0x170/0x3f0 [ 19.268053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.268199] kthread+0x328/0x630 [ 19.268253] ret_from_fork+0x10/0x20 [ 19.268312] [ 19.268334] Allocated by task 265: [ 19.268365] kasan_save_stack+0x3c/0x68 [ 19.268407] kasan_save_track+0x20/0x40 [ 19.268585] kasan_save_alloc_info+0x40/0x58 [ 19.268637] __kasan_kmalloc+0xd4/0xd8 [ 19.268676] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.268800] kasan_atomics+0xb8/0x2e0 [ 19.268882] kunit_try_run_case+0x170/0x3f0 [ 19.268976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.269170] kthread+0x328/0x630 [ 19.269464] ret_from_fork+0x10/0x20 [ 19.269562] [ 19.269612] The buggy address belongs to the object at fff00000c79fb480 [ 19.269612] which belongs to the cache kmalloc-64 of size 64 [ 19.269712] The buggy address is located 0 bytes to the right of [ 19.269712] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.269791] [ 19.269815] The buggy address belongs to the physical page: [ 19.269848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.270183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.270393] page_type: f5(slab) [ 19.270435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.270488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.270745] page dumped because: kasan: bad access detected [ 19.270823] [ 19.270991] Memory state around the buggy address: [ 19.271057] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.271101] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.271147] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.271786] ^ [ 19.271832] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271892] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271933] ================================================================== [ 19.272543] ================================================================== [ 19.272599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.272651] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.272701] [ 19.272735] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.272815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.272844] Hardware name: linux,dummy-virt (DT) [ 19.272894] Call trace: [ 19.272918] show_stack+0x20/0x38 (C) [ 19.272966] dump_stack_lvl+0x8c/0xd0 [ 19.273014] print_report+0x118/0x5d0 [ 19.273061] kasan_report+0xdc/0x128 [ 19.273106] kasan_check_range+0x100/0x1a8 [ 19.273155] __kasan_check_write+0x20/0x30 [ 19.273203] kasan_atomics_helper+0xe44/0x4858 [ 19.273254] kasan_atomics+0x198/0x2e0 [ 19.273298] kunit_try_run_case+0x170/0x3f0 [ 19.273346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.273397] kthread+0x328/0x630 [ 19.273441] ret_from_fork+0x10/0x20 [ 19.273488] [ 19.273508] Allocated by task 265: [ 19.273537] kasan_save_stack+0x3c/0x68 [ 19.273579] kasan_save_track+0x20/0x40 [ 19.273618] kasan_save_alloc_info+0x40/0x58 [ 19.273661] __kasan_kmalloc+0xd4/0xd8 [ 19.273699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.273741] kasan_atomics+0xb8/0x2e0 [ 19.273778] kunit_try_run_case+0x170/0x3f0 [ 19.273817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.275767] kthread+0x328/0x630 [ 19.275819] ret_from_fork+0x10/0x20 [ 19.275870] [ 19.275893] The buggy address belongs to the object at fff00000c79fb480 [ 19.275893] which belongs to the cache kmalloc-64 of size 64 [ 19.275954] The buggy address is located 0 bytes to the right of [ 19.275954] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.276020] [ 19.276042] The buggy address belongs to the physical page: [ 19.276078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.276135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.276186] page_type: f5(slab) [ 19.276227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.276278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.276321] page dumped because: kasan: bad access detected [ 19.276355] [ 19.276375] Memory state around the buggy address: [ 19.276408] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.276451] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.276496] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.276536] ^ [ 19.276570] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.276612] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.276652] ================================================================== [ 19.301325] ================================================================== [ 19.301402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.301455] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.301548] [ 19.301611] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.301732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.301763] Hardware name: linux,dummy-virt (DT) [ 19.301845] Call trace: [ 19.301902] show_stack+0x20/0x38 (C) [ 19.301953] dump_stack_lvl+0x8c/0xd0 [ 19.302002] print_report+0x118/0x5d0 [ 19.302242] kasan_report+0xdc/0x128 [ 19.302302] kasan_check_range+0x100/0x1a8 [ 19.302408] __kasan_check_write+0x20/0x30 [ 19.302484] kasan_atomics_helper+0x1058/0x4858 [ 19.302536] kasan_atomics+0x198/0x2e0 [ 19.302611] kunit_try_run_case+0x170/0x3f0 [ 19.302660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.302880] kthread+0x328/0x630 [ 19.302959] ret_from_fork+0x10/0x20 [ 19.303038] [ 19.303096] Allocated by task 265: [ 19.303154] kasan_save_stack+0x3c/0x68 [ 19.303227] kasan_save_track+0x20/0x40 [ 19.303292] kasan_save_alloc_info+0x40/0x58 [ 19.303335] __kasan_kmalloc+0xd4/0xd8 [ 19.303372] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.303460] kasan_atomics+0xb8/0x2e0 [ 19.303568] kunit_try_run_case+0x170/0x3f0 [ 19.303608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.303655] kthread+0x328/0x630 [ 19.303689] ret_from_fork+0x10/0x20 [ 19.304221] [ 19.304736] The buggy address belongs to the object at fff00000c79fb480 [ 19.304736] which belongs to the cache kmalloc-64 of size 64 [ 19.304800] The buggy address is located 0 bytes to the right of [ 19.304800] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.304878] [ 19.304902] The buggy address belongs to the physical page: [ 19.304934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.304990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.305040] page_type: f5(slab) [ 19.305080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.305132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.305174] page dumped because: kasan: bad access detected [ 19.305207] [ 19.305229] Memory state around the buggy address: [ 19.305262] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305305] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305350] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.305389] ^ [ 19.305422] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.305466] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.305506] ================================================================== [ 19.349471] ================================================================== [ 19.349751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.349844] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.349906] [ 19.349965] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.350046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.350079] Hardware name: linux,dummy-virt (DT) [ 19.350125] Call trace: [ 19.350151] show_stack+0x20/0x38 (C) [ 19.350212] dump_stack_lvl+0x8c/0xd0 [ 19.350338] print_report+0x118/0x5d0 [ 19.350515] kasan_report+0xdc/0x128 [ 19.350592] kasan_check_range+0x100/0x1a8 [ 19.350646] __kasan_check_write+0x20/0x30 [ 19.350693] kasan_atomics_helper+0x1414/0x4858 [ 19.350740] kasan_atomics+0x198/0x2e0 [ 19.350826] kunit_try_run_case+0x170/0x3f0 [ 19.350884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.350937] kthread+0x328/0x630 [ 19.350985] ret_from_fork+0x10/0x20 [ 19.351050] [ 19.351078] Allocated by task 265: [ 19.351115] kasan_save_stack+0x3c/0x68 [ 19.351158] kasan_save_track+0x20/0x40 [ 19.351216] kasan_save_alloc_info+0x40/0x58 [ 19.351259] __kasan_kmalloc+0xd4/0xd8 [ 19.351297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.351354] kasan_atomics+0xb8/0x2e0 [ 19.351399] kunit_try_run_case+0x170/0x3f0 [ 19.351455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.351499] kthread+0x328/0x630 [ 19.351534] ret_from_fork+0x10/0x20 [ 19.351570] [ 19.351592] The buggy address belongs to the object at fff00000c79fb480 [ 19.351592] which belongs to the cache kmalloc-64 of size 64 [ 19.351649] The buggy address is located 0 bytes to the right of [ 19.351649] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.351912] [ 19.351950] The buggy address belongs to the physical page: [ 19.352194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.352941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.353020] page_type: f5(slab) [ 19.353087] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.353422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.353468] page dumped because: kasan: bad access detected [ 19.353501] [ 19.353536] Memory state around the buggy address: [ 19.353573] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.353618] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.353694] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.353777] ^ [ 19.353836] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.353888] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.353948] ================================================================== [ 19.280894] ================================================================== [ 19.280948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.280998] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.281049] [ 19.281081] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.281162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.281189] Hardware name: linux,dummy-virt (DT) [ 19.281222] Call trace: [ 19.281245] show_stack+0x20/0x38 (C) [ 19.281292] dump_stack_lvl+0x8c/0xd0 [ 19.281339] print_report+0x118/0x5d0 [ 19.281455] kasan_report+0xdc/0x128 [ 19.281566] kasan_check_range+0x100/0x1a8 [ 19.281623] __kasan_check_write+0x20/0x30 [ 19.281724] kasan_atomics_helper+0xeb8/0x4858 [ 19.281778] kasan_atomics+0x198/0x2e0 [ 19.281914] kunit_try_run_case+0x170/0x3f0 [ 19.282019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.282106] kthread+0x328/0x630 [ 19.282154] ret_from_fork+0x10/0x20 [ 19.282265] [ 19.282397] Allocated by task 265: [ 19.282426] kasan_save_stack+0x3c/0x68 [ 19.282469] kasan_save_track+0x20/0x40 [ 19.282625] kasan_save_alloc_info+0x40/0x58 [ 19.282680] __kasan_kmalloc+0xd4/0xd8 [ 19.282776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.282819] kasan_atomics+0xb8/0x2e0 [ 19.282888] kunit_try_run_case+0x170/0x3f0 [ 19.282929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.282974] kthread+0x328/0x630 [ 19.283009] ret_from_fork+0x10/0x20 [ 19.283083] [ 19.283209] The buggy address belongs to the object at fff00000c79fb480 [ 19.283209] which belongs to the cache kmalloc-64 of size 64 [ 19.283273] The buggy address is located 0 bytes to the right of [ 19.283273] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.283338] [ 19.283487] The buggy address belongs to the physical page: [ 19.283547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.283603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.283651] page_type: f5(slab) [ 19.283691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.283947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.284083] page dumped because: kasan: bad access detected [ 19.284173] [ 19.284297] Memory state around the buggy address: [ 19.284383] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.284476] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.284599] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.284820] ^ [ 19.284958] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.285061] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.285112] ================================================================== [ 19.356536] ================================================================== [ 19.356587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.356632] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.356684] [ 19.356712] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.356790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.356839] Hardware name: linux,dummy-virt (DT) [ 19.356883] Call trace: [ 19.356906] show_stack+0x20/0x38 (C) [ 19.356954] dump_stack_lvl+0x8c/0xd0 [ 19.357009] print_report+0x118/0x5d0 [ 19.357056] kasan_report+0xdc/0x128 [ 19.357106] kasan_check_range+0x100/0x1a8 [ 19.357155] __kasan_check_write+0x20/0x30 [ 19.357199] kasan_atomics_helper+0x14e4/0x4858 [ 19.357250] kasan_atomics+0x198/0x2e0 [ 19.357296] kunit_try_run_case+0x170/0x3f0 [ 19.357342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.357394] kthread+0x328/0x630 [ 19.357437] ret_from_fork+0x10/0x20 [ 19.357482] [ 19.357526] Allocated by task 265: [ 19.357565] kasan_save_stack+0x3c/0x68 [ 19.357606] kasan_save_track+0x20/0x40 [ 19.357653] kasan_save_alloc_info+0x40/0x58 [ 19.357694] __kasan_kmalloc+0xd4/0xd8 [ 19.357733] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.357774] kasan_atomics+0xb8/0x2e0 [ 19.357813] kunit_try_run_case+0x170/0x3f0 [ 19.357851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.357915] kthread+0x328/0x630 [ 19.357949] ret_from_fork+0x10/0x20 [ 19.357987] [ 19.358009] The buggy address belongs to the object at fff00000c79fb480 [ 19.358009] which belongs to the cache kmalloc-64 of size 64 [ 19.358068] The buggy address is located 0 bytes to the right of [ 19.358068] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.358132] [ 19.358153] The buggy address belongs to the physical page: [ 19.358186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.358237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.358284] page_type: f5(slab) [ 19.358322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.358375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.358417] page dumped because: kasan: bad access detected [ 19.358450] [ 19.358472] Memory state around the buggy address: [ 19.358504] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.358549] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.358593] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.358634] ^ [ 19.358666] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.358710] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.358748] ================================================================== [ 19.375919] ================================================================== [ 19.376054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.376140] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.376267] [ 19.377247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.377434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.377467] Hardware name: linux,dummy-virt (DT) [ 19.377619] Call trace: [ 19.377648] show_stack+0x20/0x38 (C) [ 19.377701] dump_stack_lvl+0x8c/0xd0 [ 19.377776] print_report+0x118/0x5d0 [ 19.377823] kasan_report+0xdc/0x128 [ 19.377882] __asan_report_load8_noabort+0x20/0x30 [ 19.377933] kasan_atomics_helper+0x3df4/0x4858 [ 19.377983] kasan_atomics+0x198/0x2e0 [ 19.378054] kunit_try_run_case+0x170/0x3f0 [ 19.378123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.378177] kthread+0x328/0x630 [ 19.378222] ret_from_fork+0x10/0x20 [ 19.378364] [ 19.378422] Allocated by task 265: [ 19.378502] kasan_save_stack+0x3c/0x68 [ 19.378743] kasan_save_track+0x20/0x40 [ 19.378848] kasan_save_alloc_info+0x40/0x58 [ 19.378997] __kasan_kmalloc+0xd4/0xd8 [ 19.379064] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.379127] kasan_atomics+0xb8/0x2e0 [ 19.379245] kunit_try_run_case+0x170/0x3f0 [ 19.379334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.379398] kthread+0x328/0x630 [ 19.379490] ret_from_fork+0x10/0x20 [ 19.379556] [ 19.379634] The buggy address belongs to the object at fff00000c79fb480 [ 19.379634] which belongs to the cache kmalloc-64 of size 64 [ 19.379793] The buggy address is located 0 bytes to the right of [ 19.379793] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.379871] [ 19.379986] The buggy address belongs to the physical page: [ 19.380061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.380186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.380274] page_type: f5(slab) [ 19.380383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.380459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.380553] page dumped because: kasan: bad access detected [ 19.380886] [ 19.380938] Memory state around the buggy address: [ 19.381015] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.381087] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.381132] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.381191] ^ [ 19.381227] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.381573] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.381629] ================================================================== [ 19.186538] ================================================================== [ 19.186657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.186711] Write of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.186762] [ 19.186795] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.186951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.186983] Hardware name: linux,dummy-virt (DT) [ 19.187015] Call trace: [ 19.187405] show_stack+0x20/0x38 (C) [ 19.187458] dump_stack_lvl+0x8c/0xd0 [ 19.187525] print_report+0x118/0x5d0 [ 19.187580] kasan_report+0xdc/0x128 [ 19.187638] kasan_check_range+0x100/0x1a8 [ 19.187705] __kasan_check_write+0x20/0x30 [ 19.187761] kasan_atomics_helper+0xa6c/0x4858 [ 19.187812] kasan_atomics+0x198/0x2e0 [ 19.187859] kunit_try_run_case+0x170/0x3f0 [ 19.187917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.187971] kthread+0x328/0x630 [ 19.188015] ret_from_fork+0x10/0x20 [ 19.188063] [ 19.188083] Allocated by task 265: [ 19.188113] kasan_save_stack+0x3c/0x68 [ 19.188155] kasan_save_track+0x20/0x40 [ 19.188194] kasan_save_alloc_info+0x40/0x58 [ 19.188250] __kasan_kmalloc+0xd4/0xd8 [ 19.188289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.188332] kasan_atomics+0xb8/0x2e0 [ 19.188368] kunit_try_run_case+0x170/0x3f0 [ 19.188447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.188541] kthread+0x328/0x630 [ 19.188760] ret_from_fork+0x10/0x20 [ 19.188798] [ 19.188939] The buggy address belongs to the object at fff00000c79fb480 [ 19.188939] which belongs to the cache kmalloc-64 of size 64 [ 19.189393] The buggy address is located 0 bytes to the right of [ 19.189393] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.189518] [ 19.189669] The buggy address belongs to the physical page: [ 19.189702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.189921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.190034] page_type: f5(slab) [ 19.190593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.191460] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.194810] Allocated by task 265: [ 19.194840] kasan_save_stack+0x3c/0x68 [ 19.194895] kasan_save_track+0x20/0x40 [ 19.195195] kasan_save_alloc_info+0x40/0x58 [ 19.195355] __kasan_kmalloc+0xd4/0xd8 [ 19.196689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.196749] kasan_atomics+0xb8/0x2e0 [ 19.196789] kunit_try_run_case+0x170/0x3f0 [ 19.196830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.198011] The buggy address is located 0 bytes to the right of [ 19.198011] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.202325] Call trace: [ 19.204898] kasan_save_track+0x20/0x40 [ 19.206773] [ 19.207934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.210122] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.213076] kasan_save_track+0x20/0x40 [ 19.213116] kasan_save_alloc_info+0x40/0x58 [ 19.213358] __kasan_kmalloc+0xd4/0xd8 [ 19.213407] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.213458] kasan_atomics+0xb8/0x2e0 [ 19.219499] kthread+0x328/0x630 [ 19.219720] kasan_save_alloc_info+0x40/0x58 [ 19.219770] __kasan_kmalloc+0xd4/0xd8 [ 19.219807] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.219979] kthread+0x328/0x630 [ 19.220194] [ 19.220437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.222034] kasan_check_range+0x100/0x1a8 [ 19.222718] __kasan_kmalloc+0xd4/0xd8 [ 19.223501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.225013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.228971] kasan_atomics+0xb8/0x2e0 [ 19.232622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.236993] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.237275] ================================================================== [ 19.372571] ================================================================== [ 19.372750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.372814] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.372881] [ 19.373139] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.373242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.373314] Hardware name: linux,dummy-virt (DT) [ 19.373382] Call trace: [ 19.373409] show_stack+0x20/0x38 (C) [ 19.373471] dump_stack_lvl+0x8c/0xd0 [ 19.373563] print_report+0x118/0x5d0 [ 19.373611] kasan_report+0xdc/0x128 [ 19.373658] kasan_check_range+0x100/0x1a8 [ 19.373725] __kasan_check_write+0x20/0x30 [ 19.373772] kasan_atomics_helper+0x1644/0x4858 [ 19.373820] kasan_atomics+0x198/0x2e0 [ 19.373878] kunit_try_run_case+0x170/0x3f0 [ 19.373926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.373978] kthread+0x328/0x630 [ 19.374020] ret_from_fork+0x10/0x20 [ 19.374084] [ 19.374113] Allocated by task 265: [ 19.374143] kasan_save_stack+0x3c/0x68 [ 19.374188] kasan_save_track+0x20/0x40 [ 19.374226] kasan_save_alloc_info+0x40/0x58 [ 19.374283] __kasan_kmalloc+0xd4/0xd8 [ 19.374323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.374363] kasan_atomics+0xb8/0x2e0 [ 19.374414] kunit_try_run_case+0x170/0x3f0 [ 19.374456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.374499] kthread+0x328/0x630 [ 19.374534] ret_from_fork+0x10/0x20 [ 19.374579] [ 19.374601] The buggy address belongs to the object at fff00000c79fb480 [ 19.374601] which belongs to the cache kmalloc-64 of size 64 [ 19.374659] The buggy address is located 0 bytes to the right of [ 19.374659] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.374724] [ 19.374747] The buggy address belongs to the physical page: [ 19.374779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.374832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.374890] page_type: f5(slab) [ 19.374930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.374982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.375024] page dumped because: kasan: bad access detected [ 19.375057] [ 19.375078] Memory state around the buggy address: [ 19.375111] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.375419] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.375479] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.375522] ^ [ 19.375558] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.375626] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.375666] ================================================================== [ 19.324563] ================================================================== [ 19.324613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.324663] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.324713] [ 19.324748] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.324829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.324856] Hardware name: linux,dummy-virt (DT) [ 19.324904] Call trace: [ 19.324929] show_stack+0x20/0x38 (C) [ 19.324978] dump_stack_lvl+0x8c/0xd0 [ 19.325027] print_report+0x118/0x5d0 [ 19.325123] kasan_report+0xdc/0x128 [ 19.325170] kasan_check_range+0x100/0x1a8 [ 19.325229] __kasan_check_write+0x20/0x30 [ 19.325275] kasan_atomics_helper+0x11f8/0x4858 [ 19.325358] kasan_atomics+0x198/0x2e0 [ 19.325423] kunit_try_run_case+0x170/0x3f0 [ 19.325542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.325724] kthread+0x328/0x630 [ 19.325823] ret_from_fork+0x10/0x20 [ 19.325891] [ 19.325941] Allocated by task 265: [ 19.325988] kasan_save_stack+0x3c/0x68 [ 19.326043] kasan_save_track+0x20/0x40 [ 19.326090] kasan_save_alloc_info+0x40/0x58 [ 19.326133] __kasan_kmalloc+0xd4/0xd8 [ 19.326171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.326213] kasan_atomics+0xb8/0x2e0 [ 19.326249] kunit_try_run_case+0x170/0x3f0 [ 19.326290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.326333] kthread+0x328/0x630 [ 19.326383] ret_from_fork+0x10/0x20 [ 19.326420] [ 19.326442] The buggy address belongs to the object at fff00000c79fb480 [ 19.326442] which belongs to the cache kmalloc-64 of size 64 [ 19.326500] The buggy address is located 0 bytes to the right of [ 19.326500] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.326565] [ 19.326588] The buggy address belongs to the physical page: [ 19.326620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.326674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.326722] page_type: f5(slab) [ 19.326762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.326826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.327336] page dumped because: kasan: bad access detected [ 19.327380] [ 19.327402] Memory state around the buggy address: [ 19.327436] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.327482] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.327526] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.327742] ^ [ 19.327852] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.328093] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.328753] ================================================================== [ 19.317416] ================================================================== [ 19.317472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.317778] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.317831] [ 19.318186] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.320162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.320192] Hardware name: linux,dummy-virt (DT) [ 19.320225] Call trace: [ 19.320249] show_stack+0x20/0x38 (C) [ 19.320303] dump_stack_lvl+0x8c/0xd0 [ 19.320354] print_report+0x118/0x5d0 [ 19.320402] kasan_report+0xdc/0x128 [ 19.320448] kasan_check_range+0x100/0x1a8 [ 19.320497] __kasan_check_write+0x20/0x30 [ 19.320542] kasan_atomics_helper+0x1190/0x4858 [ 19.320591] kasan_atomics+0x198/0x2e0 [ 19.320637] kunit_try_run_case+0x170/0x3f0 [ 19.320686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.320739] kthread+0x328/0x630 [ 19.320783] ret_from_fork+0x10/0x20 [ 19.320830] [ 19.320850] Allocated by task 265: [ 19.320893] kasan_save_stack+0x3c/0x68 [ 19.320935] kasan_save_track+0x20/0x40 [ 19.320974] kasan_save_alloc_info+0x40/0x58 [ 19.321014] __kasan_kmalloc+0xd4/0xd8 [ 19.321053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.321092] kasan_atomics+0xb8/0x2e0 [ 19.321131] kunit_try_run_case+0x170/0x3f0 [ 19.321170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.321215] kthread+0x328/0x630 [ 19.321248] ret_from_fork+0x10/0x20 [ 19.321286] [ 19.321307] The buggy address belongs to the object at fff00000c79fb480 [ 19.321307] which belongs to the cache kmalloc-64 of size 64 [ 19.321365] The buggy address is located 0 bytes to the right of [ 19.321365] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.321429] [ 19.321454] The buggy address belongs to the physical page: [ 19.321487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.321540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.321589] page_type: f5(slab) [ 19.321629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.321681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.321723] page dumped because: kasan: bad access detected [ 19.321756] [ 19.321777] Memory state around the buggy address: [ 19.321810] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.321857] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.324171] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.324215] ^ [ 19.324253] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324296] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324335] ================================================================== [ 19.367921] ================================================================== [ 19.368061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.368175] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.368461] [ 19.368542] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.368625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.368655] Hardware name: linux,dummy-virt (DT) [ 19.368689] Call trace: [ 19.368712] show_stack+0x20/0x38 (C) [ 19.368997] dump_stack_lvl+0x8c/0xd0 [ 19.369081] print_report+0x118/0x5d0 [ 19.369131] kasan_report+0xdc/0x128 [ 19.369177] __asan_report_load8_noabort+0x20/0x30 [ 19.369230] kasan_atomics_helper+0x3db0/0x4858 [ 19.369278] kasan_atomics+0x198/0x2e0 [ 19.369392] kunit_try_run_case+0x170/0x3f0 [ 19.369460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.369553] kthread+0x328/0x630 [ 19.369801] ret_from_fork+0x10/0x20 [ 19.369902] [ 19.369951] Allocated by task 265: [ 19.370053] kasan_save_stack+0x3c/0x68 [ 19.370119] kasan_save_track+0x20/0x40 [ 19.370178] kasan_save_alloc_info+0x40/0x58 [ 19.370285] __kasan_kmalloc+0xd4/0xd8 [ 19.370352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.370409] kasan_atomics+0xb8/0x2e0 [ 19.370515] kunit_try_run_case+0x170/0x3f0 [ 19.370585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.370638] kthread+0x328/0x630 [ 19.370686] ret_from_fork+0x10/0x20 [ 19.370753] [ 19.370775] The buggy address belongs to the object at fff00000c79fb480 [ 19.370775] which belongs to the cache kmalloc-64 of size 64 [ 19.370841] The buggy address is located 0 bytes to the right of [ 19.370841] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.370916] [ 19.370939] The buggy address belongs to the physical page: [ 19.370972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.371264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.371333] page_type: f5(slab) [ 19.371390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.371462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.371761] page dumped because: kasan: bad access detected [ 19.371853] [ 19.371903] Memory state around the buggy address: [ 19.372025] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.372103] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.372154] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.372197] ^ [ 19.372258] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.372301] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.372341] ================================================================== [ 19.295273] ================================================================== [ 19.295315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.295359] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.295406] [ 19.295435] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.295515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.295543] Hardware name: linux,dummy-virt (DT) [ 19.295575] Call trace: [ 19.295597] show_stack+0x20/0x38 (C) [ 19.295644] dump_stack_lvl+0x8c/0xd0 [ 19.295691] print_report+0x118/0x5d0 [ 19.298125] kasan_report+0xdc/0x128 [ 19.298190] kasan_check_range+0x100/0x1a8 [ 19.298241] __kasan_check_write+0x20/0x30 [ 19.298286] kasan_atomics_helper+0xff0/0x4858 [ 19.298335] kasan_atomics+0x198/0x2e0 [ 19.298380] kunit_try_run_case+0x170/0x3f0 [ 19.298428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298481] kthread+0x328/0x630 [ 19.298522] ret_from_fork+0x10/0x20 [ 19.298570] [ 19.298593] Allocated by task 265: [ 19.298623] kasan_save_stack+0x3c/0x68 [ 19.298666] kasan_save_track+0x20/0x40 [ 19.298705] kasan_save_alloc_info+0x40/0x58 [ 19.298747] __kasan_kmalloc+0xd4/0xd8 [ 19.298786] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.298825] kasan_atomics+0xb8/0x2e0 [ 19.298876] kunit_try_run_case+0x170/0x3f0 [ 19.298937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298984] kthread+0x328/0x630 [ 19.299030] ret_from_fork+0x10/0x20 [ 19.299070] [ 19.299092] The buggy address belongs to the object at fff00000c79fb480 [ 19.299092] which belongs to the cache kmalloc-64 of size 64 [ 19.299152] The buggy address is located 0 bytes to the right of [ 19.299152] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.299223] [ 19.299283] The buggy address belongs to the physical page: [ 19.299323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.299377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.299427] page_type: f5(slab) [ 19.299473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.299538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.299586] page dumped because: kasan: bad access detected [ 19.299626] [ 19.299645] Memory state around the buggy address: [ 19.299678] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.299724] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.300073] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.300118] ^ [ 19.300154] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.300220] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.300263] ================================================================== [ 19.345149] ================================================================== [ 19.345190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.345249] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.345299] [ 19.345329] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.345407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.345436] Hardware name: linux,dummy-virt (DT) [ 19.345470] Call trace: [ 19.345492] show_stack+0x20/0x38 (C) [ 19.345541] dump_stack_lvl+0x8c/0xd0 [ 19.345588] print_report+0x118/0x5d0 [ 19.345637] kasan_report+0xdc/0x128 [ 19.345683] __asan_report_load8_noabort+0x20/0x30 [ 19.345735] kasan_atomics_helper+0x3f04/0x4858 [ 19.345784] kasan_atomics+0x198/0x2e0 [ 19.345830] kunit_try_run_case+0x170/0x3f0 [ 19.345891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.345945] kthread+0x328/0x630 [ 19.345987] ret_from_fork+0x10/0x20 [ 19.346035] [ 19.346055] Allocated by task 265: [ 19.346083] kasan_save_stack+0x3c/0x68 [ 19.346124] kasan_save_track+0x20/0x40 [ 19.346162] kasan_save_alloc_info+0x40/0x58 [ 19.346204] __kasan_kmalloc+0xd4/0xd8 [ 19.346241] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.346306] kasan_atomics+0xb8/0x2e0 [ 19.346356] kunit_try_run_case+0x170/0x3f0 [ 19.346433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.346501] kthread+0x328/0x630 [ 19.346569] ret_from_fork+0x10/0x20 [ 19.346642] [ 19.346701] The buggy address belongs to the object at fff00000c79fb480 [ 19.346701] which belongs to the cache kmalloc-64 of size 64 [ 19.347209] The buggy address is located 0 bytes to the right of [ 19.347209] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.347315] [ 19.347388] The buggy address belongs to the physical page: [ 19.347475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.347562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.347641] page_type: f5(slab) [ 19.347686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.347765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.347855] page dumped because: kasan: bad access detected [ 19.347922] [ 19.347960] Memory state around the buggy address: [ 19.347999] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.348044] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.348383] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.348425] ^ [ 19.348459] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.348502] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.348542] ================================================================== [ 19.332907] ================================================================== [ 19.332962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.333012] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265 [ 19.333063] [ 19.333095] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.333249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.333358] Hardware name: linux,dummy-virt (DT) [ 19.333416] Call trace: [ 19.333470] show_stack+0x20/0x38 (C) [ 19.333593] dump_stack_lvl+0x8c/0xd0 [ 19.333680] print_report+0x118/0x5d0 [ 19.333999] kasan_report+0xdc/0x128 [ 19.334076] kasan_check_range+0x100/0x1a8 [ 19.334185] __kasan_check_write+0x20/0x30 [ 19.334272] kasan_atomics_helper+0x12d8/0x4858 [ 19.334345] kasan_atomics+0x198/0x2e0 [ 19.334423] kunit_try_run_case+0x170/0x3f0 [ 19.334513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.334612] kthread+0x328/0x630 [ 19.334704] ret_from_fork+0x10/0x20 [ 19.334822] [ 19.334850] Allocated by task 265: [ 19.334890] kasan_save_stack+0x3c/0x68 [ 19.334934] kasan_save_track+0x20/0x40 [ 19.335271] kasan_save_alloc_info+0x40/0x58 [ 19.335353] __kasan_kmalloc+0xd4/0xd8 [ 19.335417] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.335503] kasan_atomics+0xb8/0x2e0 [ 19.335582] kunit_try_run_case+0x170/0x3f0 [ 19.335635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.335914] kthread+0x328/0x630 [ 19.336003] ret_from_fork+0x10/0x20 [ 19.336061] [ 19.336085] The buggy address belongs to the object at fff00000c79fb480 [ 19.336085] which belongs to the cache kmalloc-64 of size 64 [ 19.336145] The buggy address is located 0 bytes to the right of [ 19.336145] allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0) [ 19.336210] [ 19.336252] The buggy address belongs to the physical page: [ 19.336293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb [ 19.336349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.336621] page_type: f5(slab) [ 19.336674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.336728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.336814] page dumped because: kasan: bad access detected [ 19.336920] [ 19.336981] Memory state around the buggy address: [ 19.337027] fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.337132] fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.337207] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.337249] ^ [ 19.337283] fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.337325] fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.337500] ==================================================================
[ 14.987564] ================================================================== [ 14.987979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.988336] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.988626] [ 14.988776] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.988872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.988885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.988920] Call Trace: [ 14.988940] <TASK> [ 14.988961] dump_stack_lvl+0x73/0xb0 [ 14.988992] print_report+0xd1/0x610 [ 14.989016] ? __virt_addr_valid+0x1db/0x2d0 [ 14.989041] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.989074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.989098] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.989121] kasan_report+0x141/0x180 [ 14.989173] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.989201] kasan_check_range+0x10c/0x1c0 [ 14.989255] __kasan_check_write+0x18/0x20 [ 14.989275] kasan_atomics_helper+0x7c7/0x5450 [ 14.989299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.989322] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.989349] ? kasan_atomics+0x152/0x310 [ 14.989378] kasan_atomics+0x1dc/0x310 [ 14.989401] ? __pfx_kasan_atomics+0x10/0x10 [ 14.989426] ? __pfx_read_tsc+0x10/0x10 [ 14.989448] ? ktime_get_ts64+0x86/0x230 [ 14.989502] kunit_try_run_case+0x1a5/0x480 [ 14.989545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.989595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.989622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.989647] ? __kthread_parkme+0x82/0x180 [ 14.989668] ? preempt_count_sub+0x50/0x80 [ 14.989695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.989719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.989744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.989816] kthread+0x337/0x6f0 [ 14.989862] ? trace_preempt_on+0x20/0xc0 [ 14.989888] ? __pfx_kthread+0x10/0x10 [ 14.989910] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.989944] ? calculate_sigpending+0x7b/0xa0 [ 14.989969] ? __pfx_kthread+0x10/0x10 [ 14.989991] ret_from_fork+0x116/0x1d0 [ 14.990010] ? __pfx_kthread+0x10/0x10 [ 14.990031] ret_from_fork_asm+0x1a/0x30 [ 14.990073] </TASK> [ 14.990084] [ 15.002328] Allocated by task 282: [ 15.002670] kasan_save_stack+0x45/0x70 [ 15.003122] kasan_save_track+0x18/0x40 [ 15.003618] kasan_save_alloc_info+0x3b/0x50 [ 15.003892] __kasan_kmalloc+0xb7/0xc0 [ 15.004195] __kmalloc_cache_noprof+0x189/0x420 [ 15.004384] kasan_atomics+0x95/0x310 [ 15.004698] kunit_try_run_case+0x1a5/0x480 [ 15.005086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.005424] kthread+0x337/0x6f0 [ 15.005768] ret_from_fork+0x116/0x1d0 [ 15.006038] ret_from_fork_asm+0x1a/0x30 [ 15.006243] [ 15.006370] The buggy address belongs to the object at ffff8881026ce080 [ 15.006370] which belongs to the cache kmalloc-64 of size 64 [ 15.007278] The buggy address is located 0 bytes to the right of [ 15.007278] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.008134] [ 15.008242] The buggy address belongs to the physical page: [ 15.008478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.009127] flags: 0x200000000000000(node=0|zone=2) [ 15.009434] page_type: f5(slab) [ 15.009581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.010228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.010567] page dumped because: kasan: bad access detected [ 15.010956] [ 15.011086] Memory state around the buggy address: [ 15.011363] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.011937] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.012255] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.012790] ^ [ 15.013098] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.013513] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.014008] ================================================================== [ 15.529235] ================================================================== [ 15.529560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.529914] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.530463] [ 15.530586] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.530632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.530646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.530671] Call Trace: [ 15.530689] <TASK> [ 15.530706] dump_stack_lvl+0x73/0xb0 [ 15.530736] print_report+0xd1/0x610 [ 15.530759] ? __virt_addr_valid+0x1db/0x2d0 [ 15.530782] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.530805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.530829] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.530852] kasan_report+0x141/0x180 [ 15.530875] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.530927] kasan_check_range+0x10c/0x1c0 [ 15.530953] __kasan_check_write+0x18/0x20 [ 15.530972] kasan_atomics_helper+0x12e6/0x5450 [ 15.530997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.531019] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.531046] ? kasan_atomics+0x152/0x310 [ 15.531087] kasan_atomics+0x1dc/0x310 [ 15.531110] ? __pfx_kasan_atomics+0x10/0x10 [ 15.531135] ? __pfx_read_tsc+0x10/0x10 [ 15.531156] ? ktime_get_ts64+0x86/0x230 [ 15.531181] kunit_try_run_case+0x1a5/0x480 [ 15.531206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.531230] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.531256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.531280] ? __kthread_parkme+0x82/0x180 [ 15.531301] ? preempt_count_sub+0x50/0x80 [ 15.531326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.531351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.531375] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.531420] kthread+0x337/0x6f0 [ 15.531440] ? trace_preempt_on+0x20/0xc0 [ 15.531464] ? __pfx_kthread+0x10/0x10 [ 15.531485] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.531508] ? calculate_sigpending+0x7b/0xa0 [ 15.531533] ? __pfx_kthread+0x10/0x10 [ 15.531556] ret_from_fork+0x116/0x1d0 [ 15.531575] ? __pfx_kthread+0x10/0x10 [ 15.531596] ret_from_fork_asm+0x1a/0x30 [ 15.531630] </TASK> [ 15.531641] [ 15.542637] Allocated by task 282: [ 15.543220] kasan_save_stack+0x45/0x70 [ 15.543518] kasan_save_track+0x18/0x40 [ 15.543814] kasan_save_alloc_info+0x3b/0x50 [ 15.544223] __kasan_kmalloc+0xb7/0xc0 [ 15.544495] __kmalloc_cache_noprof+0x189/0x420 [ 15.544834] kasan_atomics+0x95/0x310 [ 15.545162] kunit_try_run_case+0x1a5/0x480 [ 15.545369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.545604] kthread+0x337/0x6f0 [ 15.546214] ret_from_fork+0x116/0x1d0 [ 15.546383] ret_from_fork_asm+0x1a/0x30 [ 15.546959] [ 15.547230] The buggy address belongs to the object at ffff8881026ce080 [ 15.547230] which belongs to the cache kmalloc-64 of size 64 [ 15.547922] The buggy address is located 0 bytes to the right of [ 15.547922] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.548617] [ 15.548711] The buggy address belongs to the physical page: [ 15.549232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.549617] flags: 0x200000000000000(node=0|zone=2) [ 15.549846] page_type: f5(slab) [ 15.550119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.550423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.551028] page dumped because: kasan: bad access detected [ 15.551331] [ 15.551419] Memory state around the buggy address: [ 15.551719] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.552242] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.552671] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.553118] ^ [ 15.553390] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553934] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.554269] ================================================================== [ 14.783599] ================================================================== [ 14.784265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.784627] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.784979] [ 14.785092] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.785135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.785146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.785167] Call Trace: [ 14.785182] <TASK> [ 14.785198] dump_stack_lvl+0x73/0xb0 [ 14.785337] print_report+0xd1/0x610 [ 14.785360] ? __virt_addr_valid+0x1db/0x2d0 [ 14.785402] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.785424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.785446] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.785469] kasan_report+0x141/0x180 [ 14.785492] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.785519] __asan_report_store4_noabort+0x1b/0x30 [ 14.785545] kasan_atomics_helper+0x4b6e/0x5450 [ 14.785569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.785609] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.785635] ? kasan_atomics+0x152/0x310 [ 14.785663] kasan_atomics+0x1dc/0x310 [ 14.785687] ? __pfx_kasan_atomics+0x10/0x10 [ 14.785712] ? __pfx_read_tsc+0x10/0x10 [ 14.785733] ? ktime_get_ts64+0x86/0x230 [ 14.785761] kunit_try_run_case+0x1a5/0x480 [ 14.785787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.785810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.785836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.785861] ? __kthread_parkme+0x82/0x180 [ 14.785882] ? preempt_count_sub+0x50/0x80 [ 14.785907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.785932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.785957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.785983] kthread+0x337/0x6f0 [ 14.786002] ? trace_preempt_on+0x20/0xc0 [ 14.786026] ? __pfx_kthread+0x10/0x10 [ 14.786047] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.786081] ? calculate_sigpending+0x7b/0xa0 [ 14.786106] ? __pfx_kthread+0x10/0x10 [ 14.786128] ret_from_fork+0x116/0x1d0 [ 14.786148] ? __pfx_kthread+0x10/0x10 [ 14.786169] ret_from_fork_asm+0x1a/0x30 [ 14.786206] </TASK> [ 14.786217] [ 14.799506] Allocated by task 282: [ 14.799713] kasan_save_stack+0x45/0x70 [ 14.800200] kasan_save_track+0x18/0x40 [ 14.800399] kasan_save_alloc_info+0x3b/0x50 [ 14.800788] __kasan_kmalloc+0xb7/0xc0 [ 14.801343] __kmalloc_cache_noprof+0x189/0x420 [ 14.801656] kasan_atomics+0x95/0x310 [ 14.802095] kunit_try_run_case+0x1a5/0x480 [ 14.802322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.802556] kthread+0x337/0x6f0 [ 14.803106] ret_from_fork+0x116/0x1d0 [ 14.803512] ret_from_fork_asm+0x1a/0x30 [ 14.804084] [ 14.804192] The buggy address belongs to the object at ffff8881026ce080 [ 14.804192] which belongs to the cache kmalloc-64 of size 64 [ 14.804987] The buggy address is located 0 bytes to the right of [ 14.804987] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.805937] [ 14.806179] The buggy address belongs to the physical page: [ 14.806434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.807285] flags: 0x200000000000000(node=0|zone=2) [ 14.807604] page_type: f5(slab) [ 14.807776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.808457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.809350] page dumped because: kasan: bad access detected [ 14.809780] [ 14.810089] Memory state around the buggy address: [ 14.810444] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.811169] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.811614] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.812106] ^ [ 14.812488] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.813088] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.813544] ================================================================== [ 15.390003] ================================================================== [ 15.390352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.391100] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.391382] [ 15.391495] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.391540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.391552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.391576] Call Trace: [ 15.391594] <TASK> [ 15.391612] dump_stack_lvl+0x73/0xb0 [ 15.391641] print_report+0xd1/0x610 [ 15.391664] ? __virt_addr_valid+0x1db/0x2d0 [ 15.391687] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.391710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.391732] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.391756] kasan_report+0x141/0x180 [ 15.391778] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.391806] __asan_report_load4_noabort+0x18/0x20 [ 15.391883] kasan_atomics_helper+0x4a1c/0x5450 [ 15.391908] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.391943] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.391969] ? kasan_atomics+0x152/0x310 [ 15.391998] kasan_atomics+0x1dc/0x310 [ 15.392094] ? __pfx_kasan_atomics+0x10/0x10 [ 15.392183] ? __pfx_read_tsc+0x10/0x10 [ 15.392206] ? ktime_get_ts64+0x86/0x230 [ 15.392304] kunit_try_run_case+0x1a5/0x480 [ 15.392343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.392366] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.392392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.392417] ? __kthread_parkme+0x82/0x180 [ 15.392438] ? preempt_count_sub+0x50/0x80 [ 15.392464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.392489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.392514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.392538] kthread+0x337/0x6f0 [ 15.392558] ? trace_preempt_on+0x20/0xc0 [ 15.392582] ? __pfx_kthread+0x10/0x10 [ 15.392612] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.392635] ? calculate_sigpending+0x7b/0xa0 [ 15.392660] ? __pfx_kthread+0x10/0x10 [ 15.392681] ret_from_fork+0x116/0x1d0 [ 15.392701] ? __pfx_kthread+0x10/0x10 [ 15.392722] ret_from_fork_asm+0x1a/0x30 [ 15.392755] </TASK> [ 15.392765] [ 15.401089] Allocated by task 282: [ 15.401223] kasan_save_stack+0x45/0x70 [ 15.401361] kasan_save_track+0x18/0x40 [ 15.401738] kasan_save_alloc_info+0x3b/0x50 [ 15.402013] __kasan_kmalloc+0xb7/0xc0 [ 15.402258] __kmalloc_cache_noprof+0x189/0x420 [ 15.402483] kasan_atomics+0x95/0x310 [ 15.402695] kunit_try_run_case+0x1a5/0x480 [ 15.402934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.403209] kthread+0x337/0x6f0 [ 15.403333] ret_from_fork+0x116/0x1d0 [ 15.403463] ret_from_fork_asm+0x1a/0x30 [ 15.403600] [ 15.403670] The buggy address belongs to the object at ffff8881026ce080 [ 15.403670] which belongs to the cache kmalloc-64 of size 64 [ 15.404059] The buggy address is located 0 bytes to the right of [ 15.404059] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.404662] [ 15.404763] The buggy address belongs to the physical page: [ 15.405022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.405518] flags: 0x200000000000000(node=0|zone=2) [ 15.405784] page_type: f5(slab) [ 15.405936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.406438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.406893] page dumped because: kasan: bad access detected [ 15.407133] [ 15.407285] Memory state around the buggy address: [ 15.407510] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.407855] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.408285] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.408551] ^ [ 15.408706] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.408922] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.409270] ================================================================== [ 14.834977] ================================================================== [ 14.835539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.836007] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.836293] [ 14.836386] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.836430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.836442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.836466] Call Trace: [ 14.836484] <TASK> [ 14.836503] dump_stack_lvl+0x73/0xb0 [ 14.836533] print_report+0xd1/0x610 [ 14.836557] ? __virt_addr_valid+0x1db/0x2d0 [ 14.836580] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.836603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.836627] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.836649] kasan_report+0x141/0x180 [ 14.836671] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.836699] __asan_report_load4_noabort+0x18/0x20 [ 14.836724] kasan_atomics_helper+0x4b54/0x5450 [ 14.836747] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.836770] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.836796] ? kasan_atomics+0x152/0x310 [ 14.836882] kasan_atomics+0x1dc/0x310 [ 14.836905] ? __pfx_kasan_atomics+0x10/0x10 [ 14.836930] ? __pfx_read_tsc+0x10/0x10 [ 14.836952] ? ktime_get_ts64+0x86/0x230 [ 14.836978] kunit_try_run_case+0x1a5/0x480 [ 14.837004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.837027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.837066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.837091] ? __kthread_parkme+0x82/0x180 [ 14.837112] ? preempt_count_sub+0x50/0x80 [ 14.837138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.837162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.837187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.837211] kthread+0x337/0x6f0 [ 14.837231] ? trace_preempt_on+0x20/0xc0 [ 14.837256] ? __pfx_kthread+0x10/0x10 [ 14.837277] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.837299] ? calculate_sigpending+0x7b/0xa0 [ 14.837325] ? __pfx_kthread+0x10/0x10 [ 14.837347] ret_from_fork+0x116/0x1d0 [ 14.837366] ? __pfx_kthread+0x10/0x10 [ 14.837387] ret_from_fork_asm+0x1a/0x30 [ 14.837421] </TASK> [ 14.837432] [ 14.846011] Allocated by task 282: [ 14.846236] kasan_save_stack+0x45/0x70 [ 14.846451] kasan_save_track+0x18/0x40 [ 14.846799] kasan_save_alloc_info+0x3b/0x50 [ 14.847023] __kasan_kmalloc+0xb7/0xc0 [ 14.847173] __kmalloc_cache_noprof+0x189/0x420 [ 14.847335] kasan_atomics+0x95/0x310 [ 14.847523] kunit_try_run_case+0x1a5/0x480 [ 14.848073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.848353] kthread+0x337/0x6f0 [ 14.848532] ret_from_fork+0x116/0x1d0 [ 14.848910] ret_from_fork_asm+0x1a/0x30 [ 14.849121] [ 14.849221] The buggy address belongs to the object at ffff8881026ce080 [ 14.849221] which belongs to the cache kmalloc-64 of size 64 [ 14.849733] The buggy address is located 0 bytes to the right of [ 14.849733] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.850348] [ 14.850456] The buggy address belongs to the physical page: [ 14.850736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.851097] flags: 0x200000000000000(node=0|zone=2) [ 14.851348] page_type: f5(slab) [ 14.851476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.851714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.852003] page dumped because: kasan: bad access detected [ 14.852264] [ 14.852360] Memory state around the buggy address: [ 14.852586] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.853248] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.853550] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.854015] ^ [ 14.854210] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.854433] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.854866] ================================================================== [ 14.878143] ================================================================== [ 14.878456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.878778] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.879149] [ 14.879247] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.879296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.879309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.879333] Call Trace: [ 14.879435] <TASK> [ 14.879458] dump_stack_lvl+0x73/0xb0 [ 14.879491] print_report+0xd1/0x610 [ 14.879516] ? __virt_addr_valid+0x1db/0x2d0 [ 14.879541] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.879564] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.879588] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.879611] kasan_report+0x141/0x180 [ 14.879636] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.879664] __asan_report_store4_noabort+0x1b/0x30 [ 14.879690] kasan_atomics_helper+0x4b3a/0x5450 [ 14.879713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.879735] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.879762] ? kasan_atomics+0x152/0x310 [ 14.879790] kasan_atomics+0x1dc/0x310 [ 14.879825] ? __pfx_kasan_atomics+0x10/0x10 [ 14.879851] ? __pfx_read_tsc+0x10/0x10 [ 14.879872] ? ktime_get_ts64+0x86/0x230 [ 14.879899] kunit_try_run_case+0x1a5/0x480 [ 14.879925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.879948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.879974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.879998] ? __kthread_parkme+0x82/0x180 [ 14.880020] ? preempt_count_sub+0x50/0x80 [ 14.880046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.880083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.880107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.880132] kthread+0x337/0x6f0 [ 14.880152] ? trace_preempt_on+0x20/0xc0 [ 14.880176] ? __pfx_kthread+0x10/0x10 [ 14.880197] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.880219] ? calculate_sigpending+0x7b/0xa0 [ 14.880245] ? __pfx_kthread+0x10/0x10 [ 14.880267] ret_from_fork+0x116/0x1d0 [ 14.880287] ? __pfx_kthread+0x10/0x10 [ 14.880307] ret_from_fork_asm+0x1a/0x30 [ 14.880342] </TASK> [ 14.880352] [ 14.888460] Allocated by task 282: [ 14.888675] kasan_save_stack+0x45/0x70 [ 14.889011] kasan_save_track+0x18/0x40 [ 14.889214] kasan_save_alloc_info+0x3b/0x50 [ 14.889371] __kasan_kmalloc+0xb7/0xc0 [ 14.889507] __kmalloc_cache_noprof+0x189/0x420 [ 14.889971] kasan_atomics+0x95/0x310 [ 14.890184] kunit_try_run_case+0x1a5/0x480 [ 14.890400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.890616] kthread+0x337/0x6f0 [ 14.890740] ret_from_fork+0x116/0x1d0 [ 14.890877] ret_from_fork_asm+0x1a/0x30 [ 14.891334] [ 14.891439] The buggy address belongs to the object at ffff8881026ce080 [ 14.891439] which belongs to the cache kmalloc-64 of size 64 [ 14.892120] The buggy address is located 0 bytes to the right of [ 14.892120] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.892635] [ 14.892737] The buggy address belongs to the physical page: [ 14.893209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.893526] flags: 0x200000000000000(node=0|zone=2) [ 14.893747] page_type: f5(slab) [ 14.893872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.894143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.894490] page dumped because: kasan: bad access detected [ 14.894978] [ 14.895093] Memory state around the buggy address: [ 14.895297] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.895568] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.895796] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.896136] ^ [ 14.896370] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.896694] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.897194] ================================================================== [ 14.937494] ================================================================== [ 14.938217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.938567] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.938926] [ 14.939098] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.939171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.939196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.939234] Call Trace: [ 14.939253] <TASK> [ 14.939286] dump_stack_lvl+0x73/0xb0 [ 14.939317] print_report+0xd1/0x610 [ 14.939341] ? __virt_addr_valid+0x1db/0x2d0 [ 14.939364] ? kasan_atomics_helper+0x697/0x5450 [ 14.939405] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.939430] ? kasan_atomics_helper+0x697/0x5450 [ 14.939452] kasan_report+0x141/0x180 [ 14.939475] ? kasan_atomics_helper+0x697/0x5450 [ 14.939503] kasan_check_range+0x10c/0x1c0 [ 14.939528] __kasan_check_write+0x18/0x20 [ 14.939548] kasan_atomics_helper+0x697/0x5450 [ 14.939572] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.939649] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.939677] ? kasan_atomics+0x152/0x310 [ 14.939706] kasan_atomics+0x1dc/0x310 [ 14.939730] ? __pfx_kasan_atomics+0x10/0x10 [ 14.939756] ? __pfx_read_tsc+0x10/0x10 [ 14.939777] ? ktime_get_ts64+0x86/0x230 [ 14.939973] kunit_try_run_case+0x1a5/0x480 [ 14.940003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.940066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.940091] ? __kthread_parkme+0x82/0x180 [ 14.940112] ? preempt_count_sub+0x50/0x80 [ 14.940138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.940188] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.940212] kthread+0x337/0x6f0 [ 14.940232] ? trace_preempt_on+0x20/0xc0 [ 14.940256] ? __pfx_kthread+0x10/0x10 [ 14.940277] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.940299] ? calculate_sigpending+0x7b/0xa0 [ 14.940325] ? __pfx_kthread+0x10/0x10 [ 14.940348] ret_from_fork+0x116/0x1d0 [ 14.940367] ? __pfx_kthread+0x10/0x10 [ 14.940387] ret_from_fork_asm+0x1a/0x30 [ 14.940421] </TASK> [ 14.940431] [ 14.949832] Allocated by task 282: [ 14.950100] kasan_save_stack+0x45/0x70 [ 14.950331] kasan_save_track+0x18/0x40 [ 14.950506] kasan_save_alloc_info+0x3b/0x50 [ 14.950657] __kasan_kmalloc+0xb7/0xc0 [ 14.950918] __kmalloc_cache_noprof+0x189/0x420 [ 14.951180] kasan_atomics+0x95/0x310 [ 14.951489] kunit_try_run_case+0x1a5/0x480 [ 14.951714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.952327] kthread+0x337/0x6f0 [ 14.952776] ret_from_fork+0x116/0x1d0 [ 14.953152] ret_from_fork_asm+0x1a/0x30 [ 14.953389] [ 14.953474] The buggy address belongs to the object at ffff8881026ce080 [ 14.953474] which belongs to the cache kmalloc-64 of size 64 [ 14.953953] The buggy address is located 0 bytes to the right of [ 14.953953] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.954701] [ 14.954802] The buggy address belongs to the physical page: [ 14.955350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.955800] flags: 0x200000000000000(node=0|zone=2) [ 14.956585] page_type: f5(slab) [ 14.956797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.957346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.958016] page dumped because: kasan: bad access detected [ 14.958264] [ 14.958352] Memory state around the buggy address: [ 14.958787] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.959188] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.959678] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.960318] ^ [ 14.960664] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.961065] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.961638] ================================================================== [ 15.500160] ================================================================== [ 15.500813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.501512] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.502367] [ 15.502469] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.502514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.502526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.502551] Call Trace: [ 15.502569] <TASK> [ 15.502588] dump_stack_lvl+0x73/0xb0 [ 15.502618] print_report+0xd1/0x610 [ 15.502642] ? __virt_addr_valid+0x1db/0x2d0 [ 15.502665] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.502687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.502710] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.502733] kasan_report+0x141/0x180 [ 15.502756] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.502799] __asan_report_load4_noabort+0x18/0x20 [ 15.502825] kasan_atomics_helper+0x49e8/0x5450 [ 15.502848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.502871] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.502897] ? kasan_atomics+0x152/0x310 [ 15.502924] kasan_atomics+0x1dc/0x310 [ 15.502948] ? __pfx_kasan_atomics+0x10/0x10 [ 15.502972] ? __pfx_read_tsc+0x10/0x10 [ 15.502993] ? ktime_get_ts64+0x86/0x230 [ 15.503020] kunit_try_run_case+0x1a5/0x480 [ 15.503048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.503081] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.503106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.503131] ? __kthread_parkme+0x82/0x180 [ 15.503153] ? preempt_count_sub+0x50/0x80 [ 15.503178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.503202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.503227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.503336] kthread+0x337/0x6f0 [ 15.503360] ? trace_preempt_on+0x20/0xc0 [ 15.503385] ? __pfx_kthread+0x10/0x10 [ 15.503406] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.503429] ? calculate_sigpending+0x7b/0xa0 [ 15.503454] ? __pfx_kthread+0x10/0x10 [ 15.503476] ret_from_fork+0x116/0x1d0 [ 15.503495] ? __pfx_kthread+0x10/0x10 [ 15.503515] ret_from_fork_asm+0x1a/0x30 [ 15.503550] </TASK> [ 15.503561] [ 15.516587] Allocated by task 282: [ 15.516738] kasan_save_stack+0x45/0x70 [ 15.517133] kasan_save_track+0x18/0x40 [ 15.517844] kasan_save_alloc_info+0x3b/0x50 [ 15.518444] __kasan_kmalloc+0xb7/0xc0 [ 15.518866] __kmalloc_cache_noprof+0x189/0x420 [ 15.519309] kasan_atomics+0x95/0x310 [ 15.519674] kunit_try_run_case+0x1a5/0x480 [ 15.520150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.520387] kthread+0x337/0x6f0 [ 15.520512] ret_from_fork+0x116/0x1d0 [ 15.520648] ret_from_fork_asm+0x1a/0x30 [ 15.520937] [ 15.521161] The buggy address belongs to the object at ffff8881026ce080 [ 15.521161] which belongs to the cache kmalloc-64 of size 64 [ 15.522468] The buggy address is located 0 bytes to the right of [ 15.522468] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.523625] [ 15.523705] The buggy address belongs to the physical page: [ 15.524102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.524879] flags: 0x200000000000000(node=0|zone=2) [ 15.525149] page_type: f5(slab) [ 15.525277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.525511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.525761] page dumped because: kasan: bad access detected [ 15.526349] [ 15.526452] Memory state around the buggy address: [ 15.526625] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.527005] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.527283] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.527580] ^ [ 15.527851] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528270] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528602] ================================================================== [ 15.555020] ================================================================== [ 15.555406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.556267] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.556534] [ 15.556662] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.556708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.556720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.556744] Call Trace: [ 15.556756] <TASK> [ 15.556773] dump_stack_lvl+0x73/0xb0 [ 15.557028] print_report+0xd1/0x610 [ 15.557092] ? __virt_addr_valid+0x1db/0x2d0 [ 15.557116] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.557139] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.557163] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.557185] kasan_report+0x141/0x180 [ 15.557209] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.557237] __asan_report_load4_noabort+0x18/0x20 [ 15.557262] kasan_atomics_helper+0x49ce/0x5450 [ 15.557286] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.557309] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.557335] ? kasan_atomics+0x152/0x310 [ 15.557364] kasan_atomics+0x1dc/0x310 [ 15.557388] ? __pfx_kasan_atomics+0x10/0x10 [ 15.557412] ? __pfx_read_tsc+0x10/0x10 [ 15.557434] ? ktime_get_ts64+0x86/0x230 [ 15.557460] kunit_try_run_case+0x1a5/0x480 [ 15.557485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.557508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.557535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.557559] ? __kthread_parkme+0x82/0x180 [ 15.557580] ? preempt_count_sub+0x50/0x80 [ 15.557707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.557732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.557757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.557782] kthread+0x337/0x6f0 [ 15.557802] ? trace_preempt_on+0x20/0xc0 [ 15.557827] ? __pfx_kthread+0x10/0x10 [ 15.557848] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.557871] ? calculate_sigpending+0x7b/0xa0 [ 15.557896] ? __pfx_kthread+0x10/0x10 [ 15.557918] ret_from_fork+0x116/0x1d0 [ 15.557937] ? __pfx_kthread+0x10/0x10 [ 15.557958] ret_from_fork_asm+0x1a/0x30 [ 15.557992] </TASK> [ 15.558003] [ 15.568075] Allocated by task 282: [ 15.568264] kasan_save_stack+0x45/0x70 [ 15.568455] kasan_save_track+0x18/0x40 [ 15.568913] kasan_save_alloc_info+0x3b/0x50 [ 15.569101] __kasan_kmalloc+0xb7/0xc0 [ 15.569429] __kmalloc_cache_noprof+0x189/0x420 [ 15.569672] kasan_atomics+0x95/0x310 [ 15.569965] kunit_try_run_case+0x1a5/0x480 [ 15.570264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.570623] kthread+0x337/0x6f0 [ 15.570883] ret_from_fork+0x116/0x1d0 [ 15.571034] ret_from_fork_asm+0x1a/0x30 [ 15.571383] [ 15.571565] The buggy address belongs to the object at ffff8881026ce080 [ 15.571565] which belongs to the cache kmalloc-64 of size 64 [ 15.572087] The buggy address is located 0 bytes to the right of [ 15.572087] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.572868] [ 15.572969] The buggy address belongs to the physical page: [ 15.573182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.573695] flags: 0x200000000000000(node=0|zone=2) [ 15.574008] page_type: f5(slab) [ 15.574201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.574703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.575136] page dumped because: kasan: bad access detected [ 15.575460] [ 15.575563] Memory state around the buggy address: [ 15.575878] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.576185] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.576501] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.577018] ^ [ 15.577204] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.577674] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.578066] ================================================================== [ 15.578938] ================================================================== [ 15.579231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.580011] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.580278] [ 15.580398] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.580443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.580456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.580478] Call Trace: [ 15.580496] <TASK> [ 15.580514] dump_stack_lvl+0x73/0xb0 [ 15.580544] print_report+0xd1/0x610 [ 15.580567] ? __virt_addr_valid+0x1db/0x2d0 [ 15.580605] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.580626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.580650] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.580673] kasan_report+0x141/0x180 [ 15.580695] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.580723] kasan_check_range+0x10c/0x1c0 [ 15.580747] __kasan_check_read+0x15/0x20 [ 15.580767] kasan_atomics_helper+0x13b5/0x5450 [ 15.580790] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.580813] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.580839] ? kasan_atomics+0x152/0x310 [ 15.580867] kasan_atomics+0x1dc/0x310 [ 15.580891] ? __pfx_kasan_atomics+0x10/0x10 [ 15.580916] ? __pfx_read_tsc+0x10/0x10 [ 15.580937] ? ktime_get_ts64+0x86/0x230 [ 15.580963] kunit_try_run_case+0x1a5/0x480 [ 15.580988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.581011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.581036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.581072] ? __kthread_parkme+0x82/0x180 [ 15.581093] ? preempt_count_sub+0x50/0x80 [ 15.581118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.581143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.581167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.581192] kthread+0x337/0x6f0 [ 15.581212] ? trace_preempt_on+0x20/0xc0 [ 15.581236] ? __pfx_kthread+0x10/0x10 [ 15.581256] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.581279] ? calculate_sigpending+0x7b/0xa0 [ 15.581304] ? __pfx_kthread+0x10/0x10 [ 15.581326] ret_from_fork+0x116/0x1d0 [ 15.581345] ? __pfx_kthread+0x10/0x10 [ 15.581365] ret_from_fork_asm+0x1a/0x30 [ 15.581400] </TASK> [ 15.581411] [ 15.589153] Allocated by task 282: [ 15.589300] kasan_save_stack+0x45/0x70 [ 15.589505] kasan_save_track+0x18/0x40 [ 15.589812] kasan_save_alloc_info+0x3b/0x50 [ 15.589967] __kasan_kmalloc+0xb7/0xc0 [ 15.590112] __kmalloc_cache_noprof+0x189/0x420 [ 15.590322] kasan_atomics+0x95/0x310 [ 15.590510] kunit_try_run_case+0x1a5/0x480 [ 15.590739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.591168] kthread+0x337/0x6f0 [ 15.591292] ret_from_fork+0x116/0x1d0 [ 15.591425] ret_from_fork_asm+0x1a/0x30 [ 15.591565] [ 15.591637] The buggy address belongs to the object at ffff8881026ce080 [ 15.591637] which belongs to the cache kmalloc-64 of size 64 [ 15.592527] The buggy address is located 0 bytes to the right of [ 15.592527] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.593169] [ 15.593242] The buggy address belongs to the physical page: [ 15.593414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.593957] flags: 0x200000000000000(node=0|zone=2) [ 15.594144] page_type: f5(slab) [ 15.594276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.594513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.595228] page dumped because: kasan: bad access detected [ 15.595492] [ 15.595620] Memory state around the buggy address: [ 15.595849] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.596163] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.596473] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.596844] ^ [ 15.597085] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.597362] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.598316] ================================================================== [ 15.739232] ================================================================== [ 15.739633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.739970] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.740334] [ 15.740461] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.740508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.740520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.740545] Call Trace: [ 15.740565] <TASK> [ 15.740585] dump_stack_lvl+0x73/0xb0 [ 15.740617] print_report+0xd1/0x610 [ 15.740641] ? __virt_addr_valid+0x1db/0x2d0 [ 15.740665] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.740687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.740710] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.740733] kasan_report+0x141/0x180 [ 15.740756] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.740784] kasan_check_range+0x10c/0x1c0 [ 15.740808] __kasan_check_write+0x18/0x20 [ 15.740828] kasan_atomics_helper+0x16e7/0x5450 [ 15.740852] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.740874] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.740901] ? kasan_atomics+0x152/0x310 [ 15.740929] kasan_atomics+0x1dc/0x310 [ 15.740953] ? __pfx_kasan_atomics+0x10/0x10 [ 15.740978] ? __pfx_read_tsc+0x10/0x10 [ 15.741000] ? ktime_get_ts64+0x86/0x230 [ 15.741026] kunit_try_run_case+0x1a5/0x480 [ 15.741065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.741089] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.741117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.741142] ? __kthread_parkme+0x82/0x180 [ 15.741165] ? preempt_count_sub+0x50/0x80 [ 15.741191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.741216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.741252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.741277] kthread+0x337/0x6f0 [ 15.741303] ? trace_preempt_on+0x20/0xc0 [ 15.741329] ? __pfx_kthread+0x10/0x10 [ 15.741350] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.741372] ? calculate_sigpending+0x7b/0xa0 [ 15.741398] ? __pfx_kthread+0x10/0x10 [ 15.741420] ret_from_fork+0x116/0x1d0 [ 15.741439] ? __pfx_kthread+0x10/0x10 [ 15.741461] ret_from_fork_asm+0x1a/0x30 [ 15.741495] </TASK> [ 15.741507] [ 15.750847] Allocated by task 282: [ 15.751429] kasan_save_stack+0x45/0x70 [ 15.752350] kasan_save_track+0x18/0x40 [ 15.752543] kasan_save_alloc_info+0x3b/0x50 [ 15.752906] __kasan_kmalloc+0xb7/0xc0 [ 15.753108] __kmalloc_cache_noprof+0x189/0x420 [ 15.753330] kasan_atomics+0x95/0x310 [ 15.753469] kunit_try_run_case+0x1a5/0x480 [ 15.753618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.753796] kthread+0x337/0x6f0 [ 15.753921] ret_from_fork+0x116/0x1d0 [ 15.754329] ret_from_fork_asm+0x1a/0x30 [ 15.754535] [ 15.756127] The buggy address belongs to the object at ffff8881026ce080 [ 15.756127] which belongs to the cache kmalloc-64 of size 64 [ 15.756904] The buggy address is located 0 bytes to the right of [ 15.756904] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.757387] [ 15.757468] The buggy address belongs to the physical page: [ 15.757659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.758033] flags: 0x200000000000000(node=0|zone=2) [ 15.758264] page_type: f5(slab) [ 15.758388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.758647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.758996] page dumped because: kasan: bad access detected [ 15.759311] [ 15.759385] Memory state around the buggy address: [ 15.759540] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.759952] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.761190] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.761533] ^ [ 15.761743] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.762139] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.762368] ================================================================== [ 15.254469] ================================================================== [ 15.255329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.255661] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.256136] [ 15.256485] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.256634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.256649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.256674] Call Trace: [ 15.256694] <TASK> [ 15.256716] dump_stack_lvl+0x73/0xb0 [ 15.256757] print_report+0xd1/0x610 [ 15.256783] ? __virt_addr_valid+0x1db/0x2d0 [ 15.256807] ? kasan_atomics_helper+0xde0/0x5450 [ 15.256864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.256889] ? kasan_atomics_helper+0xde0/0x5450 [ 15.256912] kasan_report+0x141/0x180 [ 15.256935] ? kasan_atomics_helper+0xde0/0x5450 [ 15.256963] kasan_check_range+0x10c/0x1c0 [ 15.256988] __kasan_check_write+0x18/0x20 [ 15.257007] kasan_atomics_helper+0xde0/0x5450 [ 15.257031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.257064] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.257090] ? kasan_atomics+0x152/0x310 [ 15.257119] kasan_atomics+0x1dc/0x310 [ 15.257143] ? __pfx_kasan_atomics+0x10/0x10 [ 15.257169] ? __pfx_read_tsc+0x10/0x10 [ 15.257191] ? ktime_get_ts64+0x86/0x230 [ 15.257217] kunit_try_run_case+0x1a5/0x480 [ 15.257245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257268] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.257295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.257320] ? __kthread_parkme+0x82/0x180 [ 15.257342] ? preempt_count_sub+0x50/0x80 [ 15.257368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.257443] kthread+0x337/0x6f0 [ 15.257463] ? trace_preempt_on+0x20/0xc0 [ 15.257487] ? __pfx_kthread+0x10/0x10 [ 15.257508] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.257532] ? calculate_sigpending+0x7b/0xa0 [ 15.257558] ? __pfx_kthread+0x10/0x10 [ 15.257580] ret_from_fork+0x116/0x1d0 [ 15.257599] ? __pfx_kthread+0x10/0x10 [ 15.257620] ret_from_fork_asm+0x1a/0x30 [ 15.257654] </TASK> [ 15.257666] [ 15.266140] Allocated by task 282: [ 15.266296] kasan_save_stack+0x45/0x70 [ 15.266447] kasan_save_track+0x18/0x40 [ 15.266586] kasan_save_alloc_info+0x3b/0x50 [ 15.266801] __kasan_kmalloc+0xb7/0xc0 [ 15.266995] __kmalloc_cache_noprof+0x189/0x420 [ 15.267231] kasan_atomics+0x95/0x310 [ 15.267437] kunit_try_run_case+0x1a5/0x480 [ 15.267720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.268029] kthread+0x337/0x6f0 [ 15.268165] ret_from_fork+0x116/0x1d0 [ 15.268303] ret_from_fork_asm+0x1a/0x30 [ 15.268528] [ 15.268663] The buggy address belongs to the object at ffff8881026ce080 [ 15.268663] which belongs to the cache kmalloc-64 of size 64 [ 15.269145] The buggy address is located 0 bytes to the right of [ 15.269145] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.269703] [ 15.269822] The buggy address belongs to the physical page: [ 15.270012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.270272] flags: 0x200000000000000(node=0|zone=2) [ 15.270441] page_type: f5(slab) [ 15.270564] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.270866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.271220] page dumped because: kasan: bad access detected [ 15.271472] [ 15.271565] Memory state around the buggy address: [ 15.271939] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.272262] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.272576] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.272797] ^ [ 15.273004] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273334] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273648] ================================================================== [ 15.959728] ================================================================== [ 15.960142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.960477] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.960823] [ 15.960948] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.961005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.961018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.961041] Call Trace: [ 15.961065] <TASK> [ 15.961082] dump_stack_lvl+0x73/0xb0 [ 15.961112] print_report+0xd1/0x610 [ 15.961145] ? __virt_addr_valid+0x1db/0x2d0 [ 15.961169] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.961202] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.961226] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.961249] kasan_report+0x141/0x180 [ 15.961272] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.961301] kasan_check_range+0x10c/0x1c0 [ 15.961326] __kasan_check_write+0x18/0x20 [ 15.961346] kasan_atomics_helper+0x1d7a/0x5450 [ 15.961379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.961402] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.961438] ? kasan_atomics+0x152/0x310 [ 15.961466] kasan_atomics+0x1dc/0x310 [ 15.961490] ? __pfx_kasan_atomics+0x10/0x10 [ 15.961515] ? __pfx_read_tsc+0x10/0x10 [ 15.961536] ? ktime_get_ts64+0x86/0x230 [ 15.961561] kunit_try_run_case+0x1a5/0x480 [ 15.961597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.961622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.961647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.961681] ? __kthread_parkme+0x82/0x180 [ 15.961701] ? preempt_count_sub+0x50/0x80 [ 15.961726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.961761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.961786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.961811] kthread+0x337/0x6f0 [ 15.961831] ? trace_preempt_on+0x20/0xc0 [ 15.961863] ? __pfx_kthread+0x10/0x10 [ 15.961884] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.961906] ? calculate_sigpending+0x7b/0xa0 [ 15.961941] ? __pfx_kthread+0x10/0x10 [ 15.961963] ret_from_fork+0x116/0x1d0 [ 15.961982] ? __pfx_kthread+0x10/0x10 [ 15.962003] ret_from_fork_asm+0x1a/0x30 [ 15.962037] </TASK> [ 15.962047] [ 15.969886] Allocated by task 282: [ 15.970091] kasan_save_stack+0x45/0x70 [ 15.970306] kasan_save_track+0x18/0x40 [ 15.970488] kasan_save_alloc_info+0x3b/0x50 [ 15.970711] __kasan_kmalloc+0xb7/0xc0 [ 15.970887] __kmalloc_cache_noprof+0x189/0x420 [ 15.971105] kasan_atomics+0x95/0x310 [ 15.971295] kunit_try_run_case+0x1a5/0x480 [ 15.971471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.971715] kthread+0x337/0x6f0 [ 15.971890] ret_from_fork+0x116/0x1d0 [ 15.972030] ret_from_fork_asm+0x1a/0x30 [ 15.972234] [ 15.972328] The buggy address belongs to the object at ffff8881026ce080 [ 15.972328] which belongs to the cache kmalloc-64 of size 64 [ 15.972871] The buggy address is located 0 bytes to the right of [ 15.972871] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.973536] [ 15.973658] The buggy address belongs to the physical page: [ 15.973928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.974301] flags: 0x200000000000000(node=0|zone=2) [ 15.974542] page_type: f5(slab) [ 15.974766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.975163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.975503] page dumped because: kasan: bad access detected [ 15.975752] [ 15.975858] Memory state around the buggy address: [ 15.976087] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.976311] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.976533] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.976752] ^ [ 15.976959] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.977348] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.977677] ================================================================== [ 16.042066] ================================================================== [ 16.042315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.042548] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.042770] [ 16.042876] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.042919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.042930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.043432] Call Trace: [ 16.043450] <TASK> [ 16.043467] dump_stack_lvl+0x73/0xb0 [ 16.043498] print_report+0xd1/0x610 [ 16.043522] ? __virt_addr_valid+0x1db/0x2d0 [ 16.043546] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.043569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.043593] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.043617] kasan_report+0x141/0x180 [ 16.043640] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.043669] __asan_report_load8_noabort+0x18/0x20 [ 16.043694] kasan_atomics_helper+0x4f71/0x5450 [ 16.043718] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.043742] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.043769] ? kasan_atomics+0x152/0x310 [ 16.043797] kasan_atomics+0x1dc/0x310 [ 16.043821] ? __pfx_kasan_atomics+0x10/0x10 [ 16.043845] ? __pfx_read_tsc+0x10/0x10 [ 16.043867] ? ktime_get_ts64+0x86/0x230 [ 16.043892] kunit_try_run_case+0x1a5/0x480 [ 16.043917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.043941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.043966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.043990] ? __kthread_parkme+0x82/0x180 [ 16.044011] ? preempt_count_sub+0x50/0x80 [ 16.044037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.044076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.044126] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.044151] kthread+0x337/0x6f0 [ 16.044171] ? trace_preempt_on+0x20/0xc0 [ 16.044213] ? __pfx_kthread+0x10/0x10 [ 16.044234] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.044268] ? calculate_sigpending+0x7b/0xa0 [ 16.044293] ? __pfx_kthread+0x10/0x10 [ 16.044315] ret_from_fork+0x116/0x1d0 [ 16.044335] ? __pfx_kthread+0x10/0x10 [ 16.044356] ret_from_fork_asm+0x1a/0x30 [ 16.044389] </TASK> [ 16.044401] [ 16.051969] Allocated by task 282: [ 16.052109] kasan_save_stack+0x45/0x70 [ 16.052254] kasan_save_track+0x18/0x40 [ 16.052439] kasan_save_alloc_info+0x3b/0x50 [ 16.052739] __kasan_kmalloc+0xb7/0xc0 [ 16.052929] __kmalloc_cache_noprof+0x189/0x420 [ 16.053194] kasan_atomics+0x95/0x310 [ 16.053355] kunit_try_run_case+0x1a5/0x480 [ 16.053547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.053802] kthread+0x337/0x6f0 [ 16.053967] ret_from_fork+0x116/0x1d0 [ 16.054113] ret_from_fork_asm+0x1a/0x30 [ 16.054304] [ 16.054405] The buggy address belongs to the object at ffff8881026ce080 [ 16.054405] which belongs to the cache kmalloc-64 of size 64 [ 16.054918] The buggy address is located 0 bytes to the right of [ 16.054918] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.055538] [ 16.055652] The buggy address belongs to the physical page: [ 16.055930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.056261] flags: 0x200000000000000(node=0|zone=2) [ 16.056428] page_type: f5(slab) [ 16.056553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.056915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.057310] page dumped because: kasan: bad access detected [ 16.057535] [ 16.057654] Memory state around the buggy address: [ 16.057885] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.058162] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.058489] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.058799] ^ [ 16.059012] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.059242] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.059460] ================================================================== [ 16.189365] ================================================================== [ 16.189717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.190037] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.190284] [ 16.190374] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.190416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.190428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.190451] Call Trace: [ 16.190470] <TASK> [ 16.190487] dump_stack_lvl+0x73/0xb0 [ 16.190516] print_report+0xd1/0x610 [ 16.190538] ? __virt_addr_valid+0x1db/0x2d0 [ 16.190562] ? kasan_atomics_helper+0x5115/0x5450 [ 16.190606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.190630] ? kasan_atomics_helper+0x5115/0x5450 [ 16.190653] kasan_report+0x141/0x180 [ 16.190676] ? kasan_atomics_helper+0x5115/0x5450 [ 16.190705] __asan_report_load8_noabort+0x18/0x20 [ 16.190731] kasan_atomics_helper+0x5115/0x5450 [ 16.190755] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.190779] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.190805] ? kasan_atomics+0x152/0x310 [ 16.190834] kasan_atomics+0x1dc/0x310 [ 16.190858] ? __pfx_kasan_atomics+0x10/0x10 [ 16.190883] ? __pfx_read_tsc+0x10/0x10 [ 16.190904] ? ktime_get_ts64+0x86/0x230 [ 16.190930] kunit_try_run_case+0x1a5/0x480 [ 16.190956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.190980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.191007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.191033] ? __kthread_parkme+0x82/0x180 [ 16.191062] ? preempt_count_sub+0x50/0x80 [ 16.191088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.191114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.191139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.191165] kthread+0x337/0x6f0 [ 16.191185] ? trace_preempt_on+0x20/0xc0 [ 16.191210] ? __pfx_kthread+0x10/0x10 [ 16.191231] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.191254] ? calculate_sigpending+0x7b/0xa0 [ 16.191279] ? __pfx_kthread+0x10/0x10 [ 16.191301] ret_from_fork+0x116/0x1d0 [ 16.191321] ? __pfx_kthread+0x10/0x10 [ 16.191342] ret_from_fork_asm+0x1a/0x30 [ 16.191375] </TASK> [ 16.191386] [ 16.198552] Allocated by task 282: [ 16.198701] kasan_save_stack+0x45/0x70 [ 16.198847] kasan_save_track+0x18/0x40 [ 16.199029] kasan_save_alloc_info+0x3b/0x50 [ 16.199251] __kasan_kmalloc+0xb7/0xc0 [ 16.199438] __kmalloc_cache_noprof+0x189/0x420 [ 16.199690] kasan_atomics+0x95/0x310 [ 16.199886] kunit_try_run_case+0x1a5/0x480 [ 16.200080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.200317] kthread+0x337/0x6f0 [ 16.200479] ret_from_fork+0x116/0x1d0 [ 16.200684] ret_from_fork_asm+0x1a/0x30 [ 16.200873] [ 16.200962] The buggy address belongs to the object at ffff8881026ce080 [ 16.200962] which belongs to the cache kmalloc-64 of size 64 [ 16.201458] The buggy address is located 0 bytes to the right of [ 16.201458] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.201907] [ 16.201983] The buggy address belongs to the physical page: [ 16.202224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.202598] flags: 0x200000000000000(node=0|zone=2) [ 16.202843] page_type: f5(slab) [ 16.202989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.203253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.203496] page dumped because: kasan: bad access detected [ 16.203778] [ 16.203876] Memory state around the buggy address: [ 16.204113] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.204445] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.204790] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.205018] ^ [ 16.205255] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205536] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205776] ================================================================== [ 14.962151] ================================================================== [ 14.962480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.963009] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.963739] [ 14.963841] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.964775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.964820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.964847] Call Trace: [ 14.964870] <TASK> [ 14.964892] dump_stack_lvl+0x73/0xb0 [ 14.964927] print_report+0xd1/0x610 [ 14.964952] ? __virt_addr_valid+0x1db/0x2d0 [ 14.964978] ? kasan_atomics_helper+0x72f/0x5450 [ 14.965000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.965024] ? kasan_atomics_helper+0x72f/0x5450 [ 14.965048] kasan_report+0x141/0x180 [ 14.965180] ? kasan_atomics_helper+0x72f/0x5450 [ 14.965209] kasan_check_range+0x10c/0x1c0 [ 14.965234] __kasan_check_write+0x18/0x20 [ 14.965253] kasan_atomics_helper+0x72f/0x5450 [ 14.965277] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.965300] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.965326] ? kasan_atomics+0x152/0x310 [ 14.965355] kasan_atomics+0x1dc/0x310 [ 14.965378] ? __pfx_kasan_atomics+0x10/0x10 [ 14.965404] ? __pfx_read_tsc+0x10/0x10 [ 14.965425] ? ktime_get_ts64+0x86/0x230 [ 14.965450] kunit_try_run_case+0x1a5/0x480 [ 14.965476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.965499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.965524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.965549] ? __kthread_parkme+0x82/0x180 [ 14.965594] ? preempt_count_sub+0x50/0x80 [ 14.965620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.965645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.965670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.965694] kthread+0x337/0x6f0 [ 14.965714] ? trace_preempt_on+0x20/0xc0 [ 14.965739] ? __pfx_kthread+0x10/0x10 [ 14.965760] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.965782] ? calculate_sigpending+0x7b/0xa0 [ 14.965864] ? __pfx_kthread+0x10/0x10 [ 14.965886] ret_from_fork+0x116/0x1d0 [ 14.965906] ? __pfx_kthread+0x10/0x10 [ 14.965927] ret_from_fork_asm+0x1a/0x30 [ 14.965960] </TASK> [ 14.965972] [ 14.977222] Allocated by task 282: [ 14.977376] kasan_save_stack+0x45/0x70 [ 14.977718] kasan_save_track+0x18/0x40 [ 14.977929] kasan_save_alloc_info+0x3b/0x50 [ 14.978345] __kasan_kmalloc+0xb7/0xc0 [ 14.978638] __kmalloc_cache_noprof+0x189/0x420 [ 14.978952] kasan_atomics+0x95/0x310 [ 14.979167] kunit_try_run_case+0x1a5/0x480 [ 14.979438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.979940] kthread+0x337/0x6f0 [ 14.980155] ret_from_fork+0x116/0x1d0 [ 14.980347] ret_from_fork_asm+0x1a/0x30 [ 14.980545] [ 14.980672] The buggy address belongs to the object at ffff8881026ce080 [ 14.980672] which belongs to the cache kmalloc-64 of size 64 [ 14.981476] The buggy address is located 0 bytes to the right of [ 14.981476] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.982115] [ 14.982226] The buggy address belongs to the physical page: [ 14.982477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.982824] flags: 0x200000000000000(node=0|zone=2) [ 14.983148] page_type: f5(slab) [ 14.983471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.984127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.984621] page dumped because: kasan: bad access detected [ 14.984868] [ 14.984963] Memory state around the buggy address: [ 14.985196] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.985495] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.985818] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.986221] ^ [ 14.986378] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.986720] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987019] ================================================================== [ 15.410682] ================================================================== [ 15.411180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.411750] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.412612] [ 15.412704] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.413103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.413117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.413140] Call Trace: [ 15.413157] <TASK> [ 15.413174] dump_stack_lvl+0x73/0xb0 [ 15.413204] print_report+0xd1/0x610 [ 15.413226] ? __virt_addr_valid+0x1db/0x2d0 [ 15.413251] ? kasan_atomics_helper+0x1148/0x5450 [ 15.413274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.413298] ? kasan_atomics_helper+0x1148/0x5450 [ 15.413320] kasan_report+0x141/0x180 [ 15.413344] ? kasan_atomics_helper+0x1148/0x5450 [ 15.413372] kasan_check_range+0x10c/0x1c0 [ 15.413395] __kasan_check_write+0x18/0x20 [ 15.413416] kasan_atomics_helper+0x1148/0x5450 [ 15.413439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.413462] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.413488] ? kasan_atomics+0x152/0x310 [ 15.413517] kasan_atomics+0x1dc/0x310 [ 15.413539] ? __pfx_kasan_atomics+0x10/0x10 [ 15.413565] ? __pfx_read_tsc+0x10/0x10 [ 15.413600] ? ktime_get_ts64+0x86/0x230 [ 15.413626] kunit_try_run_case+0x1a5/0x480 [ 15.413651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.413674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.413700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.413724] ? __kthread_parkme+0x82/0x180 [ 15.413745] ? preempt_count_sub+0x50/0x80 [ 15.413770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.413795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.413821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.413845] kthread+0x337/0x6f0 [ 15.413865] ? trace_preempt_on+0x20/0xc0 [ 15.413889] ? __pfx_kthread+0x10/0x10 [ 15.413909] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.413933] ? calculate_sigpending+0x7b/0xa0 [ 15.413957] ? __pfx_kthread+0x10/0x10 [ 15.413979] ret_from_fork+0x116/0x1d0 [ 15.413998] ? __pfx_kthread+0x10/0x10 [ 15.414019] ret_from_fork_asm+0x1a/0x30 [ 15.414062] </TASK> [ 15.414072] [ 15.425923] Allocated by task 282: [ 15.426370] kasan_save_stack+0x45/0x70 [ 15.426581] kasan_save_track+0x18/0x40 [ 15.426765] kasan_save_alloc_info+0x3b/0x50 [ 15.427093] __kasan_kmalloc+0xb7/0xc0 [ 15.427641] __kmalloc_cache_noprof+0x189/0x420 [ 15.428121] kasan_atomics+0x95/0x310 [ 15.428299] kunit_try_run_case+0x1a5/0x480 [ 15.428867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.429317] kthread+0x337/0x6f0 [ 15.429524] ret_from_fork+0x116/0x1d0 [ 15.429980] ret_from_fork_asm+0x1a/0x30 [ 15.430208] [ 15.430313] The buggy address belongs to the object at ffff8881026ce080 [ 15.430313] which belongs to the cache kmalloc-64 of size 64 [ 15.431213] The buggy address is located 0 bytes to the right of [ 15.431213] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.432220] [ 15.432305] The buggy address belongs to the physical page: [ 15.432769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.433160] flags: 0x200000000000000(node=0|zone=2) [ 15.433545] page_type: f5(slab) [ 15.433767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.434491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.434928] page dumped because: kasan: bad access detected [ 15.435216] [ 15.435305] Memory state around the buggy address: [ 15.435519] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.436444] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.437004] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.437441] ^ [ 15.437846] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.438371] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.438873] ================================================================== [ 15.221087] ================================================================== [ 15.221743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.222454] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.222722] [ 15.222822] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.222870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.222884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.222910] Call Trace: [ 15.222931] <TASK> [ 15.222952] dump_stack_lvl+0x73/0xb0 [ 15.223680] print_report+0xd1/0x610 [ 15.223708] ? __virt_addr_valid+0x1db/0x2d0 [ 15.223735] ? kasan_atomics_helper+0xd47/0x5450 [ 15.223758] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.223783] ? kasan_atomics_helper+0xd47/0x5450 [ 15.223806] kasan_report+0x141/0x180 [ 15.223829] ? kasan_atomics_helper+0xd47/0x5450 [ 15.223861] kasan_check_range+0x10c/0x1c0 [ 15.223888] __kasan_check_write+0x18/0x20 [ 15.223908] kasan_atomics_helper+0xd47/0x5450 [ 15.223932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.223956] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.223982] ? kasan_atomics+0x152/0x310 [ 15.224012] kasan_atomics+0x1dc/0x310 [ 15.224035] ? __pfx_kasan_atomics+0x10/0x10 [ 15.224180] ? __pfx_read_tsc+0x10/0x10 [ 15.224206] ? ktime_get_ts64+0x86/0x230 [ 15.224232] kunit_try_run_case+0x1a5/0x480 [ 15.224261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.224284] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.224311] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.224336] ? __kthread_parkme+0x82/0x180 [ 15.224359] ? preempt_count_sub+0x50/0x80 [ 15.224385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.224409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.224459] kthread+0x337/0x6f0 [ 15.224479] ? trace_preempt_on+0x20/0xc0 [ 15.224505] ? __pfx_kthread+0x10/0x10 [ 15.224525] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.224547] ? calculate_sigpending+0x7b/0xa0 [ 15.224596] ? __pfx_kthread+0x10/0x10 [ 15.224619] ret_from_fork+0x116/0x1d0 [ 15.224637] ? __pfx_kthread+0x10/0x10 [ 15.224659] ret_from_fork_asm+0x1a/0x30 [ 15.224693] </TASK> [ 15.224705] [ 15.240042] Allocated by task 282: [ 15.240505] kasan_save_stack+0x45/0x70 [ 15.240980] kasan_save_track+0x18/0x40 [ 15.241186] kasan_save_alloc_info+0x3b/0x50 [ 15.241392] __kasan_kmalloc+0xb7/0xc0 [ 15.241569] __kmalloc_cache_noprof+0x189/0x420 [ 15.241777] kasan_atomics+0x95/0x310 [ 15.242213] kunit_try_run_case+0x1a5/0x480 [ 15.242642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.243133] kthread+0x337/0x6f0 [ 15.243502] ret_from_fork+0x116/0x1d0 [ 15.243840] ret_from_fork_asm+0x1a/0x30 [ 15.244201] [ 15.244300] The buggy address belongs to the object at ffff8881026ce080 [ 15.244300] which belongs to the cache kmalloc-64 of size 64 [ 15.245376] The buggy address is located 0 bytes to the right of [ 15.245376] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.246152] [ 15.246262] The buggy address belongs to the physical page: [ 15.246505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.247564] flags: 0x200000000000000(node=0|zone=2) [ 15.248025] page_type: f5(slab) [ 15.248455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.249139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.249678] page dumped because: kasan: bad access detected [ 15.250103] [ 15.250205] Memory state around the buggy address: [ 15.250418] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.251110] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.251653] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.252176] ^ [ 15.252395] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.252944] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.253461] ================================================================== [ 15.470457] ================================================================== [ 15.470714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.471260] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.472328] [ 15.472475] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.472523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.472535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.472558] Call Trace: [ 15.472574] <TASK> [ 15.472591] dump_stack_lvl+0x73/0xb0 [ 15.472622] print_report+0xd1/0x610 [ 15.472744] ? __virt_addr_valid+0x1db/0x2d0 [ 15.472801] ? kasan_atomics_helper+0x1217/0x5450 [ 15.472836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.472975] ? kasan_atomics_helper+0x1217/0x5450 [ 15.472998] kasan_report+0x141/0x180 [ 15.473021] ? kasan_atomics_helper+0x1217/0x5450 [ 15.473061] kasan_check_range+0x10c/0x1c0 [ 15.473085] __kasan_check_write+0x18/0x20 [ 15.473106] kasan_atomics_helper+0x1217/0x5450 [ 15.473130] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.473153] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.473180] ? kasan_atomics+0x152/0x310 [ 15.473208] kasan_atomics+0x1dc/0x310 [ 15.473232] ? __pfx_kasan_atomics+0x10/0x10 [ 15.473256] ? __pfx_read_tsc+0x10/0x10 [ 15.473278] ? ktime_get_ts64+0x86/0x230 [ 15.473303] kunit_try_run_case+0x1a5/0x480 [ 15.473329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.473378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.473402] ? __kthread_parkme+0x82/0x180 [ 15.473423] ? preempt_count_sub+0x50/0x80 [ 15.473448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.473497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.473522] kthread+0x337/0x6f0 [ 15.473542] ? trace_preempt_on+0x20/0xc0 [ 15.473566] ? __pfx_kthread+0x10/0x10 [ 15.473588] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.473609] ? calculate_sigpending+0x7b/0xa0 [ 15.473634] ? __pfx_kthread+0x10/0x10 [ 15.473657] ret_from_fork+0x116/0x1d0 [ 15.473675] ? __pfx_kthread+0x10/0x10 [ 15.473696] ret_from_fork_asm+0x1a/0x30 [ 15.473729] </TASK> [ 15.473739] [ 15.486036] Allocated by task 282: [ 15.486193] kasan_save_stack+0x45/0x70 [ 15.486355] kasan_save_track+0x18/0x40 [ 15.487007] kasan_save_alloc_info+0x3b/0x50 [ 15.487209] __kasan_kmalloc+0xb7/0xc0 [ 15.487352] __kmalloc_cache_noprof+0x189/0x420 [ 15.487513] kasan_atomics+0x95/0x310 [ 15.487651] kunit_try_run_case+0x1a5/0x480 [ 15.487800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.487979] kthread+0x337/0x6f0 [ 15.488114] ret_from_fork+0x116/0x1d0 [ 15.488251] ret_from_fork_asm+0x1a/0x30 [ 15.488472] [ 15.488570] The buggy address belongs to the object at ffff8881026ce080 [ 15.488570] which belongs to the cache kmalloc-64 of size 64 [ 15.490506] The buggy address is located 0 bytes to the right of [ 15.490506] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.490895] [ 15.490972] The buggy address belongs to the physical page: [ 15.491519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.492329] flags: 0x200000000000000(node=0|zone=2) [ 15.492518] page_type: f5(slab) [ 15.492647] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.492877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.494314] page dumped because: kasan: bad access detected [ 15.495361] [ 15.495446] Memory state around the buggy address: [ 15.495619] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.495839] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.496612] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.497304] ^ [ 15.497778] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.498620] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.499300] ================================================================== [ 15.094987] ================================================================== [ 15.095384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.095739] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.096058] [ 15.096158] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.096232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.096247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.096271] Call Trace: [ 15.096292] <TASK> [ 15.096314] dump_stack_lvl+0x73/0xb0 [ 15.096364] print_report+0xd1/0x610 [ 15.096388] ? __virt_addr_valid+0x1db/0x2d0 [ 15.096412] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.096456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.096480] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.096503] kasan_report+0x141/0x180 [ 15.096545] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.096606] kasan_check_range+0x10c/0x1c0 [ 15.096632] __kasan_check_write+0x18/0x20 [ 15.096651] kasan_atomics_helper+0xa2b/0x5450 [ 15.096675] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.096699] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.096724] ? kasan_atomics+0x152/0x310 [ 15.096754] kasan_atomics+0x1dc/0x310 [ 15.096777] ? __pfx_kasan_atomics+0x10/0x10 [ 15.096820] ? __pfx_read_tsc+0x10/0x10 [ 15.096844] ? ktime_get_ts64+0x86/0x230 [ 15.096870] kunit_try_run_case+0x1a5/0x480 [ 15.096897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.096921] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.096948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.096973] ? __kthread_parkme+0x82/0x180 [ 15.096995] ? preempt_count_sub+0x50/0x80 [ 15.097022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.097046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.097081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.097106] kthread+0x337/0x6f0 [ 15.097126] ? trace_preempt_on+0x20/0xc0 [ 15.097150] ? __pfx_kthread+0x10/0x10 [ 15.097172] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.097195] ? calculate_sigpending+0x7b/0xa0 [ 15.097221] ? __pfx_kthread+0x10/0x10 [ 15.097283] ret_from_fork+0x116/0x1d0 [ 15.097304] ? __pfx_kthread+0x10/0x10 [ 15.097325] ret_from_fork_asm+0x1a/0x30 [ 15.097360] </TASK> [ 15.097370] [ 15.110249] Allocated by task 282: [ 15.110439] kasan_save_stack+0x45/0x70 [ 15.111078] kasan_save_track+0x18/0x40 [ 15.111451] kasan_save_alloc_info+0x3b/0x50 [ 15.111697] __kasan_kmalloc+0xb7/0xc0 [ 15.112031] __kmalloc_cache_noprof+0x189/0x420 [ 15.112435] kasan_atomics+0x95/0x310 [ 15.112783] kunit_try_run_case+0x1a5/0x480 [ 15.113215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.113665] kthread+0x337/0x6f0 [ 15.114102] ret_from_fork+0x116/0x1d0 [ 15.114299] ret_from_fork_asm+0x1a/0x30 [ 15.114489] [ 15.114883] The buggy address belongs to the object at ffff8881026ce080 [ 15.114883] which belongs to the cache kmalloc-64 of size 64 [ 15.116156] The buggy address is located 0 bytes to the right of [ 15.116156] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.116544] [ 15.116963] The buggy address belongs to the physical page: [ 15.117738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.118629] flags: 0x200000000000000(node=0|zone=2) [ 15.119299] page_type: f5(slab) [ 15.119614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.120037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.120284] page dumped because: kasan: bad access detected [ 15.120457] [ 15.120528] Memory state around the buggy address: [ 15.120767] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.121335] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.121830] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.122464] ^ [ 15.122697] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.123628] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.124151] ================================================================== [ 15.996967] ================================================================== [ 15.997560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.997974] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.998230] [ 15.998323] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.998366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.998379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.998403] Call Trace: [ 15.998420] <TASK> [ 15.998437] dump_stack_lvl+0x73/0xb0 [ 15.998468] print_report+0xd1/0x610 [ 15.998491] ? __virt_addr_valid+0x1db/0x2d0 [ 15.998515] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.998537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.998561] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.998584] kasan_report+0x141/0x180 [ 15.998618] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.998647] kasan_check_range+0x10c/0x1c0 [ 15.998672] __kasan_check_write+0x18/0x20 [ 15.998692] kasan_atomics_helper+0x1eaa/0x5450 [ 15.998717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.998740] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.998767] ? kasan_atomics+0x152/0x310 [ 15.998796] kasan_atomics+0x1dc/0x310 [ 15.998820] ? __pfx_kasan_atomics+0x10/0x10 [ 15.998846] ? __pfx_read_tsc+0x10/0x10 [ 15.998868] ? ktime_get_ts64+0x86/0x230 [ 15.998906] kunit_try_run_case+0x1a5/0x480 [ 15.998932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.998976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.999003] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.999028] ? __kthread_parkme+0x82/0x180 [ 15.999079] ? preempt_count_sub+0x50/0x80 [ 15.999105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.999130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.999155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.999181] kthread+0x337/0x6f0 [ 15.999200] ? trace_preempt_on+0x20/0xc0 [ 15.999225] ? __pfx_kthread+0x10/0x10 [ 15.999246] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.999268] ? calculate_sigpending+0x7b/0xa0 [ 15.999294] ? __pfx_kthread+0x10/0x10 [ 15.999316] ret_from_fork+0x116/0x1d0 [ 15.999335] ? __pfx_kthread+0x10/0x10 [ 15.999356] ret_from_fork_asm+0x1a/0x30 [ 15.999389] </TASK> [ 15.999399] [ 16.010449] Allocated by task 282: [ 16.011030] kasan_save_stack+0x45/0x70 [ 16.011242] kasan_save_track+0x18/0x40 [ 16.011808] kasan_save_alloc_info+0x3b/0x50 [ 16.012009] __kasan_kmalloc+0xb7/0xc0 [ 16.012157] __kmalloc_cache_noprof+0x189/0x420 [ 16.012689] kasan_atomics+0x95/0x310 [ 16.012831] kunit_try_run_case+0x1a5/0x480 [ 16.012976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.013267] kthread+0x337/0x6f0 [ 16.013395] ret_from_fork+0x116/0x1d0 [ 16.013531] ret_from_fork_asm+0x1a/0x30 [ 16.013674] [ 16.013747] The buggy address belongs to the object at ffff8881026ce080 [ 16.013747] which belongs to the cache kmalloc-64 of size 64 [ 16.014115] The buggy address is located 0 bytes to the right of [ 16.014115] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.014498] [ 16.014598] The buggy address belongs to the physical page: [ 16.014858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.015233] flags: 0x200000000000000(node=0|zone=2) [ 16.015474] page_type: f5(slab) [ 16.015596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.015831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.017092] page dumped because: kasan: bad access detected [ 16.017364] [ 16.017461] Memory state around the buggy address: [ 16.017724] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.017992] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.018263] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.018975] ^ [ 16.019238] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.019568] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.019880] ================================================================== [ 16.117138] ================================================================== [ 16.117643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.117993] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.118333] [ 16.118443] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.118485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.118496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.118518] Call Trace: [ 16.118532] <TASK> [ 16.118546] dump_stack_lvl+0x73/0xb0 [ 16.118573] print_report+0xd1/0x610 [ 16.118595] ? __virt_addr_valid+0x1db/0x2d0 [ 16.118648] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.118671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.118695] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.118717] kasan_report+0x141/0x180 [ 16.118740] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.118768] __asan_report_load8_noabort+0x18/0x20 [ 16.118793] kasan_atomics_helper+0x4fb2/0x5450 [ 16.118817] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.118840] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.118865] ? kasan_atomics+0x152/0x310 [ 16.118894] kasan_atomics+0x1dc/0x310 [ 16.118918] ? __pfx_kasan_atomics+0x10/0x10 [ 16.118943] ? __pfx_read_tsc+0x10/0x10 [ 16.118964] ? ktime_get_ts64+0x86/0x230 [ 16.118988] kunit_try_run_case+0x1a5/0x480 [ 16.119013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.119036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.119073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.119098] ? __kthread_parkme+0x82/0x180 [ 16.119118] ? preempt_count_sub+0x50/0x80 [ 16.119143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.119168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.119208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.119233] kthread+0x337/0x6f0 [ 16.119253] ? trace_preempt_on+0x20/0xc0 [ 16.119277] ? __pfx_kthread+0x10/0x10 [ 16.119299] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.119322] ? calculate_sigpending+0x7b/0xa0 [ 16.119346] ? __pfx_kthread+0x10/0x10 [ 16.119368] ret_from_fork+0x116/0x1d0 [ 16.119387] ? __pfx_kthread+0x10/0x10 [ 16.119409] ret_from_fork_asm+0x1a/0x30 [ 16.119442] </TASK> [ 16.119452] [ 16.126876] Allocated by task 282: [ 16.127022] kasan_save_stack+0x45/0x70 [ 16.127184] kasan_save_track+0x18/0x40 [ 16.127396] kasan_save_alloc_info+0x3b/0x50 [ 16.127605] __kasan_kmalloc+0xb7/0xc0 [ 16.127815] __kmalloc_cache_noprof+0x189/0x420 [ 16.128077] kasan_atomics+0x95/0x310 [ 16.128235] kunit_try_run_case+0x1a5/0x480 [ 16.128445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.128742] kthread+0x337/0x6f0 [ 16.128873] ret_from_fork+0x116/0x1d0 [ 16.129011] ret_from_fork_asm+0x1a/0x30 [ 16.129165] [ 16.129278] The buggy address belongs to the object at ffff8881026ce080 [ 16.129278] which belongs to the cache kmalloc-64 of size 64 [ 16.129809] The buggy address is located 0 bytes to the right of [ 16.129809] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.130341] [ 16.130416] The buggy address belongs to the physical page: [ 16.130593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.130962] flags: 0x200000000000000(node=0|zone=2) [ 16.131241] page_type: f5(slab) [ 16.131440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.131927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.132253] page dumped because: kasan: bad access detected [ 16.132476] [ 16.132549] Memory state around the buggy address: [ 16.132706] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.133027] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.133347] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.133573] ^ [ 16.133819] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.134103] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.134354] ================================================================== [ 14.764507] ================================================================== [ 14.764910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.765352] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.765659] [ 14.765781] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.765868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.765880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.765903] Call Trace: [ 14.765920] <TASK> [ 14.765939] dump_stack_lvl+0x73/0xb0 [ 14.765970] print_report+0xd1/0x610 [ 14.765992] ? __virt_addr_valid+0x1db/0x2d0 [ 14.766015] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.766035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.766070] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.766092] kasan_report+0x141/0x180 [ 14.766113] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.766140] __asan_report_load4_noabort+0x18/0x20 [ 14.766164] kasan_atomics_helper+0x4b88/0x5450 [ 14.766186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.766212] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.766237] ? kasan_atomics+0x152/0x310 [ 14.766263] kasan_atomics+0x1dc/0x310 [ 14.766286] ? __pfx_kasan_atomics+0x10/0x10 [ 14.766310] ? __pfx_read_tsc+0x10/0x10 [ 14.766330] ? ktime_get_ts64+0x86/0x230 [ 14.766355] kunit_try_run_case+0x1a5/0x480 [ 14.766380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.766402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.766427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.766450] ? __kthread_parkme+0x82/0x180 [ 14.766470] ? preempt_count_sub+0x50/0x80 [ 14.766495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.766518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.766542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.766566] kthread+0x337/0x6f0 [ 14.766584] ? trace_preempt_on+0x20/0xc0 [ 14.766607] ? __pfx_kthread+0x10/0x10 [ 14.766627] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.766648] ? calculate_sigpending+0x7b/0xa0 [ 14.766672] ? __pfx_kthread+0x10/0x10 [ 14.766693] ret_from_fork+0x116/0x1d0 [ 14.766711] ? __pfx_kthread+0x10/0x10 [ 14.766731] ret_from_fork_asm+0x1a/0x30 [ 14.766764] </TASK> [ 14.766774] [ 14.775194] Allocated by task 282: [ 14.775383] kasan_save_stack+0x45/0x70 [ 14.775586] kasan_save_track+0x18/0x40 [ 14.775763] kasan_save_alloc_info+0x3b/0x50 [ 14.776013] __kasan_kmalloc+0xb7/0xc0 [ 14.776197] __kmalloc_cache_noprof+0x189/0x420 [ 14.776414] kasan_atomics+0x95/0x310 [ 14.776606] kunit_try_run_case+0x1a5/0x480 [ 14.776792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.777016] kthread+0x337/0x6f0 [ 14.777281] ret_from_fork+0x116/0x1d0 [ 14.777465] ret_from_fork_asm+0x1a/0x30 [ 14.777745] [ 14.777907] The buggy address belongs to the object at ffff8881026ce080 [ 14.777907] which belongs to the cache kmalloc-64 of size 64 [ 14.778295] The buggy address is located 0 bytes to the right of [ 14.778295] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.778830] [ 14.778927] The buggy address belongs to the physical page: [ 14.779187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.779511] flags: 0x200000000000000(node=0|zone=2) [ 14.779678] page_type: f5(slab) [ 14.779800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.780035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.780579] page dumped because: kasan: bad access detected [ 14.780912] [ 14.781010] Memory state around the buggy address: [ 14.781250] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.781468] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.782086] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.782355] ^ [ 14.782577] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.782943] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.783217] ================================================================== [ 16.079232] ================================================================== [ 16.079571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.079909] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.080249] [ 16.080350] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.080390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.080402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.080423] Call Trace: [ 16.080439] <TASK> [ 16.080454] dump_stack_lvl+0x73/0xb0 [ 16.080482] print_report+0xd1/0x610 [ 16.080504] ? __virt_addr_valid+0x1db/0x2d0 [ 16.080528] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.080549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.080573] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.080621] kasan_report+0x141/0x180 [ 16.080644] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.080673] __asan_report_load8_noabort+0x18/0x20 [ 16.080698] kasan_atomics_helper+0x4f98/0x5450 [ 16.080722] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.080745] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.080770] ? kasan_atomics+0x152/0x310 [ 16.080798] kasan_atomics+0x1dc/0x310 [ 16.080821] ? __pfx_kasan_atomics+0x10/0x10 [ 16.080846] ? __pfx_read_tsc+0x10/0x10 [ 16.080888] ? ktime_get_ts64+0x86/0x230 [ 16.080914] kunit_try_run_case+0x1a5/0x480 [ 16.080938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.080961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.080987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.081011] ? __kthread_parkme+0x82/0x180 [ 16.081047] ? preempt_count_sub+0x50/0x80 [ 16.081081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.081130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.081156] kthread+0x337/0x6f0 [ 16.081175] ? trace_preempt_on+0x20/0xc0 [ 16.081199] ? __pfx_kthread+0x10/0x10 [ 16.081238] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.081261] ? calculate_sigpending+0x7b/0xa0 [ 16.081286] ? __pfx_kthread+0x10/0x10 [ 16.081309] ret_from_fork+0x116/0x1d0 [ 16.081328] ? __pfx_kthread+0x10/0x10 [ 16.081349] ret_from_fork_asm+0x1a/0x30 [ 16.081382] </TASK> [ 16.081392] [ 16.088908] Allocated by task 282: [ 16.089036] kasan_save_stack+0x45/0x70 [ 16.089192] kasan_save_track+0x18/0x40 [ 16.089375] kasan_save_alloc_info+0x3b/0x50 [ 16.089587] __kasan_kmalloc+0xb7/0xc0 [ 16.089801] __kmalloc_cache_noprof+0x189/0x420 [ 16.090024] kasan_atomics+0x95/0x310 [ 16.090249] kunit_try_run_case+0x1a5/0x480 [ 16.090464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.090735] kthread+0x337/0x6f0 [ 16.090878] ret_from_fork+0x116/0x1d0 [ 16.091014] ret_from_fork_asm+0x1a/0x30 [ 16.091165] [ 16.091237] The buggy address belongs to the object at ffff8881026ce080 [ 16.091237] which belongs to the cache kmalloc-64 of size 64 [ 16.091722] The buggy address is located 0 bytes to the right of [ 16.091722] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.092771] [ 16.092873] The buggy address belongs to the physical page: [ 16.093148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.093491] flags: 0x200000000000000(node=0|zone=2) [ 16.093714] page_type: f5(slab) [ 16.093836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.094109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.094473] page dumped because: kasan: bad access detected [ 16.094800] [ 16.094871] Memory state around the buggy address: [ 16.095083] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.095424] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.095686] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.096149] ^ [ 16.096316] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.096536] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.097206] ================================================================== [ 15.190998] ================================================================== [ 15.191695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.193498] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.195137] [ 15.195268] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.195317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.195330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.195355] Call Trace: [ 15.195375] <TASK> [ 15.195394] dump_stack_lvl+0x73/0xb0 [ 15.195427] print_report+0xd1/0x610 [ 15.195450] ? __virt_addr_valid+0x1db/0x2d0 [ 15.195475] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.195498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.195521] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.195544] kasan_report+0x141/0x180 [ 15.195568] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.196042] __asan_report_load4_noabort+0x18/0x20 [ 15.196090] kasan_atomics_helper+0x4a84/0x5450 [ 15.196115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.196139] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.196165] ? kasan_atomics+0x152/0x310 [ 15.196195] kasan_atomics+0x1dc/0x310 [ 15.196217] ? __pfx_kasan_atomics+0x10/0x10 [ 15.196243] ? __pfx_read_tsc+0x10/0x10 [ 15.196265] ? ktime_get_ts64+0x86/0x230 [ 15.196292] kunit_try_run_case+0x1a5/0x480 [ 15.196318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.196342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.196368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.196392] ? __kthread_parkme+0x82/0x180 [ 15.196414] ? preempt_count_sub+0x50/0x80 [ 15.196439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.196464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.196490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.196515] kthread+0x337/0x6f0 [ 15.196535] ? trace_preempt_on+0x20/0xc0 [ 15.196559] ? __pfx_kthread+0x10/0x10 [ 15.196580] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.196602] ? calculate_sigpending+0x7b/0xa0 [ 15.196628] ? __pfx_kthread+0x10/0x10 [ 15.196651] ret_from_fork+0x116/0x1d0 [ 15.196669] ? __pfx_kthread+0x10/0x10 [ 15.196691] ret_from_fork_asm+0x1a/0x30 [ 15.196724] </TASK> [ 15.196736] [ 15.210547] Allocated by task 282: [ 15.210902] kasan_save_stack+0x45/0x70 [ 15.211405] kasan_save_track+0x18/0x40 [ 15.211576] kasan_save_alloc_info+0x3b/0x50 [ 15.211998] __kasan_kmalloc+0xb7/0xc0 [ 15.212374] __kmalloc_cache_noprof+0x189/0x420 [ 15.212877] kasan_atomics+0x95/0x310 [ 15.213016] kunit_try_run_case+0x1a5/0x480 [ 15.213175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.213353] kthread+0x337/0x6f0 [ 15.213475] ret_from_fork+0x116/0x1d0 [ 15.213633] ret_from_fork_asm+0x1a/0x30 [ 15.213776] [ 15.213854] The buggy address belongs to the object at ffff8881026ce080 [ 15.213854] which belongs to the cache kmalloc-64 of size 64 [ 15.214273] The buggy address is located 0 bytes to the right of [ 15.214273] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.214885] [ 15.214985] The buggy address belongs to the physical page: [ 15.215256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.215570] flags: 0x200000000000000(node=0|zone=2) [ 15.215840] page_type: f5(slab) [ 15.215966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.216975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.217284] page dumped because: kasan: bad access detected [ 15.217530] [ 15.217604] Memory state around the buggy address: [ 15.217982] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.218282] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.218743] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.219335] ^ [ 15.219548] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220039] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220374] ================================================================== [ 16.021753] ================================================================== [ 16.022839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.023144] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.023423] [ 16.023524] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.023570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.023583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.023606] Call Trace: [ 16.023625] <TASK> [ 16.023646] dump_stack_lvl+0x73/0xb0 [ 16.023677] print_report+0xd1/0x610 [ 16.023700] ? __virt_addr_valid+0x1db/0x2d0 [ 16.023723] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.023745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.023769] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.023792] kasan_report+0x141/0x180 [ 16.023816] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.023862] kasan_check_range+0x10c/0x1c0 [ 16.023887] __kasan_check_write+0x18/0x20 [ 16.023907] kasan_atomics_helper+0x1f43/0x5450 [ 16.023931] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.023954] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.023981] ? kasan_atomics+0x152/0x310 [ 16.024009] kasan_atomics+0x1dc/0x310 [ 16.024032] ? __pfx_kasan_atomics+0x10/0x10 [ 16.024828] ? __pfx_read_tsc+0x10/0x10 [ 16.024860] ? ktime_get_ts64+0x86/0x230 [ 16.024887] kunit_try_run_case+0x1a5/0x480 [ 16.024915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.024938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.024965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.024989] ? __kthread_parkme+0x82/0x180 [ 16.025011] ? preempt_count_sub+0x50/0x80 [ 16.025037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.025229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.025258] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.025283] kthread+0x337/0x6f0 [ 16.025306] ? trace_preempt_on+0x20/0xc0 [ 16.025330] ? __pfx_kthread+0x10/0x10 [ 16.025351] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.025374] ? calculate_sigpending+0x7b/0xa0 [ 16.025398] ? __pfx_kthread+0x10/0x10 [ 16.025420] ret_from_fork+0x116/0x1d0 [ 16.025439] ? __pfx_kthread+0x10/0x10 [ 16.025460] ret_from_fork_asm+0x1a/0x30 [ 16.025493] </TASK> [ 16.025505] [ 16.033872] Allocated by task 282: [ 16.034067] kasan_save_stack+0x45/0x70 [ 16.034279] kasan_save_track+0x18/0x40 [ 16.034419] kasan_save_alloc_info+0x3b/0x50 [ 16.034622] __kasan_kmalloc+0xb7/0xc0 [ 16.034909] __kmalloc_cache_noprof+0x189/0x420 [ 16.035090] kasan_atomics+0x95/0x310 [ 16.035227] kunit_try_run_case+0x1a5/0x480 [ 16.035440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.035894] kthread+0x337/0x6f0 [ 16.036081] ret_from_fork+0x116/0x1d0 [ 16.036289] ret_from_fork_asm+0x1a/0x30 [ 16.036451] [ 16.036550] The buggy address belongs to the object at ffff8881026ce080 [ 16.036550] which belongs to the cache kmalloc-64 of size 64 [ 16.037081] The buggy address is located 0 bytes to the right of [ 16.037081] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.037515] [ 16.037609] The buggy address belongs to the physical page: [ 16.037907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.038213] flags: 0x200000000000000(node=0|zone=2) [ 16.038652] page_type: f5(slab) [ 16.038825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.039168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.039459] page dumped because: kasan: bad access detected [ 16.039717] [ 16.039900] Memory state around the buggy address: [ 16.040068] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.040349] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.040763] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.040991] ^ [ 16.041157] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.041376] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.041589] ================================================================== [ 14.917383] ================================================================== [ 14.917745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.918178] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.918615] [ 14.918734] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.918780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.918791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.918816] Call Trace: [ 14.918835] <TASK> [ 14.918852] dump_stack_lvl+0x73/0xb0 [ 14.918883] print_report+0xd1/0x610 [ 14.918906] ? __virt_addr_valid+0x1db/0x2d0 [ 14.918930] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.918952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.918976] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.918999] kasan_report+0x141/0x180 [ 14.919021] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.919111] kasan_check_range+0x10c/0x1c0 [ 14.919139] __kasan_check_write+0x18/0x20 [ 14.919159] kasan_atomics_helper+0x5fe/0x5450 [ 14.919182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.919206] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.919232] ? kasan_atomics+0x152/0x310 [ 14.919261] kasan_atomics+0x1dc/0x310 [ 14.919284] ? __pfx_kasan_atomics+0x10/0x10 [ 14.919310] ? __pfx_read_tsc+0x10/0x10 [ 14.919331] ? ktime_get_ts64+0x86/0x230 [ 14.919357] kunit_try_run_case+0x1a5/0x480 [ 14.919383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.919406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.919431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.919456] ? __kthread_parkme+0x82/0x180 [ 14.919478] ? preempt_count_sub+0x50/0x80 [ 14.919504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.919528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.919553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.919578] kthread+0x337/0x6f0 [ 14.919597] ? trace_preempt_on+0x20/0xc0 [ 14.919622] ? __pfx_kthread+0x10/0x10 [ 14.919642] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.919665] ? calculate_sigpending+0x7b/0xa0 [ 14.919690] ? __pfx_kthread+0x10/0x10 [ 14.919712] ret_from_fork+0x116/0x1d0 [ 14.919731] ? __pfx_kthread+0x10/0x10 [ 14.919752] ret_from_fork_asm+0x1a/0x30 [ 14.919786] </TASK> [ 14.919796] [ 14.928216] Allocated by task 282: [ 14.928422] kasan_save_stack+0x45/0x70 [ 14.928647] kasan_save_track+0x18/0x40 [ 14.928788] kasan_save_alloc_info+0x3b/0x50 [ 14.929001] __kasan_kmalloc+0xb7/0xc0 [ 14.929199] __kmalloc_cache_noprof+0x189/0x420 [ 14.929413] kasan_atomics+0x95/0x310 [ 14.929574] kunit_try_run_case+0x1a5/0x480 [ 14.929958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.930204] kthread+0x337/0x6f0 [ 14.930332] ret_from_fork+0x116/0x1d0 [ 14.930482] ret_from_fork_asm+0x1a/0x30 [ 14.930790] [ 14.930904] The buggy address belongs to the object at ffff8881026ce080 [ 14.930904] which belongs to the cache kmalloc-64 of size 64 [ 14.931418] The buggy address is located 0 bytes to the right of [ 14.931418] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.932303] [ 14.932403] The buggy address belongs to the physical page: [ 14.932671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.933078] flags: 0x200000000000000(node=0|zone=2) [ 14.933291] page_type: f5(slab) [ 14.933443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.933680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.933910] page dumped because: kasan: bad access detected [ 14.934136] [ 14.934335] Memory state around the buggy address: [ 14.934564] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.934882] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.935497] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.936024] ^ [ 14.936330] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.936716] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937130] ================================================================== [ 15.292574] ================================================================== [ 15.293099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.293397] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.293768] [ 15.293980] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.294026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.294039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.294075] Call Trace: [ 15.294091] <TASK> [ 15.294108] dump_stack_lvl+0x73/0xb0 [ 15.294138] print_report+0xd1/0x610 [ 15.294160] ? __virt_addr_valid+0x1db/0x2d0 [ 15.294184] ? kasan_atomics_helper+0xf10/0x5450 [ 15.294209] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.294232] ? kasan_atomics_helper+0xf10/0x5450 [ 15.294255] kasan_report+0x141/0x180 [ 15.294277] ? kasan_atomics_helper+0xf10/0x5450 [ 15.294305] kasan_check_range+0x10c/0x1c0 [ 15.294330] __kasan_check_write+0x18/0x20 [ 15.294350] kasan_atomics_helper+0xf10/0x5450 [ 15.294373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.294396] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.294422] ? kasan_atomics+0x152/0x310 [ 15.294451] kasan_atomics+0x1dc/0x310 [ 15.294474] ? __pfx_kasan_atomics+0x10/0x10 [ 15.294499] ? __pfx_read_tsc+0x10/0x10 [ 15.294520] ? ktime_get_ts64+0x86/0x230 [ 15.294546] kunit_try_run_case+0x1a5/0x480 [ 15.294572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.294595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.294620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.294645] ? __kthread_parkme+0x82/0x180 [ 15.294666] ? preempt_count_sub+0x50/0x80 [ 15.294691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.294716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.294740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.294765] kthread+0x337/0x6f0 [ 15.294785] ? trace_preempt_on+0x20/0xc0 [ 15.294809] ? __pfx_kthread+0x10/0x10 [ 15.294830] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.294853] ? calculate_sigpending+0x7b/0xa0 [ 15.294877] ? __pfx_kthread+0x10/0x10 [ 15.294900] ret_from_fork+0x116/0x1d0 [ 15.294919] ? __pfx_kthread+0x10/0x10 [ 15.294939] ret_from_fork_asm+0x1a/0x30 [ 15.294973] </TASK> [ 15.294984] [ 15.303466] Allocated by task 282: [ 15.303632] kasan_save_stack+0x45/0x70 [ 15.303918] kasan_save_track+0x18/0x40 [ 15.304144] kasan_save_alloc_info+0x3b/0x50 [ 15.304364] __kasan_kmalloc+0xb7/0xc0 [ 15.304556] __kmalloc_cache_noprof+0x189/0x420 [ 15.304765] kasan_atomics+0x95/0x310 [ 15.305145] kunit_try_run_case+0x1a5/0x480 [ 15.305342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.305575] kthread+0x337/0x6f0 [ 15.305730] ret_from_fork+0x116/0x1d0 [ 15.306082] ret_from_fork_asm+0x1a/0x30 [ 15.306268] [ 15.306366] The buggy address belongs to the object at ffff8881026ce080 [ 15.306366] which belongs to the cache kmalloc-64 of size 64 [ 15.307019] The buggy address is located 0 bytes to the right of [ 15.307019] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.307396] [ 15.307469] The buggy address belongs to the physical page: [ 15.307644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.308395] flags: 0x200000000000000(node=0|zone=2) [ 15.308643] page_type: f5(slab) [ 15.308814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.309215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.309911] page dumped because: kasan: bad access detected [ 15.310113] [ 15.310186] Memory state around the buggy address: [ 15.310352] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.310674] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.311257] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.311582] ^ [ 15.311792] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.312072] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.312288] ================================================================== [ 14.814542] ================================================================== [ 14.815292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.815772] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.816358] [ 14.816479] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.816529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.816541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.816564] Call Trace: [ 14.816584] <TASK> [ 14.816604] dump_stack_lvl+0x73/0xb0 [ 14.816634] print_report+0xd1/0x610 [ 14.816658] ? __virt_addr_valid+0x1db/0x2d0 [ 14.816683] ? kasan_atomics_helper+0x3df/0x5450 [ 14.816705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.816729] ? kasan_atomics_helper+0x3df/0x5450 [ 14.816751] kasan_report+0x141/0x180 [ 14.816774] ? kasan_atomics_helper+0x3df/0x5450 [ 14.816802] kasan_check_range+0x10c/0x1c0 [ 14.816826] __kasan_check_read+0x15/0x20 [ 14.816845] kasan_atomics_helper+0x3df/0x5450 [ 14.816869] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.816892] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.816917] ? kasan_atomics+0x152/0x310 [ 14.816945] kasan_atomics+0x1dc/0x310 [ 14.816968] ? __pfx_kasan_atomics+0x10/0x10 [ 14.816993] ? __pfx_read_tsc+0x10/0x10 [ 14.817014] ? ktime_get_ts64+0x86/0x230 [ 14.817040] kunit_try_run_case+0x1a5/0x480 [ 14.817269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.817294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.817321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.817346] ? __kthread_parkme+0x82/0x180 [ 14.817367] ? preempt_count_sub+0x50/0x80 [ 14.817393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.817418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.817442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.817467] kthread+0x337/0x6f0 [ 14.817487] ? trace_preempt_on+0x20/0xc0 [ 14.817511] ? __pfx_kthread+0x10/0x10 [ 14.817532] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.817554] ? calculate_sigpending+0x7b/0xa0 [ 14.817579] ? __pfx_kthread+0x10/0x10 [ 14.817616] ret_from_fork+0x116/0x1d0 [ 14.817636] ? __pfx_kthread+0x10/0x10 [ 14.817657] ret_from_fork_asm+0x1a/0x30 [ 14.817691] </TASK> [ 14.817701] [ 14.826436] Allocated by task 282: [ 14.826631] kasan_save_stack+0x45/0x70 [ 14.826894] kasan_save_track+0x18/0x40 [ 14.827100] kasan_save_alloc_info+0x3b/0x50 [ 14.827315] __kasan_kmalloc+0xb7/0xc0 [ 14.827485] __kmalloc_cache_noprof+0x189/0x420 [ 14.827741] kasan_atomics+0x95/0x310 [ 14.827880] kunit_try_run_case+0x1a5/0x480 [ 14.828101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.828362] kthread+0x337/0x6f0 [ 14.828527] ret_from_fork+0x116/0x1d0 [ 14.828724] ret_from_fork_asm+0x1a/0x30 [ 14.828902] [ 14.828978] The buggy address belongs to the object at ffff8881026ce080 [ 14.828978] which belongs to the cache kmalloc-64 of size 64 [ 14.829499] The buggy address is located 0 bytes to the right of [ 14.829499] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.830009] [ 14.830124] The buggy address belongs to the physical page: [ 14.830350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.830598] flags: 0x200000000000000(node=0|zone=2) [ 14.830767] page_type: f5(slab) [ 14.830898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.831253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.831587] page dumped because: kasan: bad access detected [ 14.831780] [ 14.831850] Memory state around the buggy address: [ 14.832008] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.832623] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.833233] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.833507] ^ [ 14.833740] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.834077] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.834298] ================================================================== [ 15.312649] ================================================================== [ 15.312880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.313323] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.313771] [ 15.313963] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.314006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.314018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.314041] Call Trace: [ 15.314070] <TASK> [ 15.314086] dump_stack_lvl+0x73/0xb0 [ 15.314116] print_report+0xd1/0x610 [ 15.314138] ? __virt_addr_valid+0x1db/0x2d0 [ 15.314161] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.314182] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.314208] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.314231] kasan_report+0x141/0x180 [ 15.314253] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.314279] kasan_check_range+0x10c/0x1c0 [ 15.314303] __kasan_check_write+0x18/0x20 [ 15.314322] kasan_atomics_helper+0xfa9/0x5450 [ 15.314345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.314367] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.314392] ? kasan_atomics+0x152/0x310 [ 15.314419] kasan_atomics+0x1dc/0x310 [ 15.314442] ? __pfx_kasan_atomics+0x10/0x10 [ 15.314466] ? __pfx_read_tsc+0x10/0x10 [ 15.314487] ? ktime_get_ts64+0x86/0x230 [ 15.314513] kunit_try_run_case+0x1a5/0x480 [ 15.314540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.314590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.314614] ? __kthread_parkme+0x82/0x180 [ 15.314704] ? preempt_count_sub+0x50/0x80 [ 15.314732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.314786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.314851] kthread+0x337/0x6f0 [ 15.314873] ? trace_preempt_on+0x20/0xc0 [ 15.314897] ? __pfx_kthread+0x10/0x10 [ 15.314918] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.314942] ? calculate_sigpending+0x7b/0xa0 [ 15.314968] ? __pfx_kthread+0x10/0x10 [ 15.314991] ret_from_fork+0x116/0x1d0 [ 15.315010] ? __pfx_kthread+0x10/0x10 [ 15.315032] ret_from_fork_asm+0x1a/0x30 [ 15.315077] </TASK> [ 15.315089] [ 15.325528] Allocated by task 282: [ 15.325676] kasan_save_stack+0x45/0x70 [ 15.325828] kasan_save_track+0x18/0x40 [ 15.325962] kasan_save_alloc_info+0x3b/0x50 [ 15.326144] __kasan_kmalloc+0xb7/0xc0 [ 15.326339] __kmalloc_cache_noprof+0x189/0x420 [ 15.327091] kasan_atomics+0x95/0x310 [ 15.327498] kunit_try_run_case+0x1a5/0x480 [ 15.328009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.328535] kthread+0x337/0x6f0 [ 15.328960] ret_from_fork+0x116/0x1d0 [ 15.329323] ret_from_fork_asm+0x1a/0x30 [ 15.329748] [ 15.329833] The buggy address belongs to the object at ffff8881026ce080 [ 15.329833] which belongs to the cache kmalloc-64 of size 64 [ 15.330192] The buggy address is located 0 bytes to the right of [ 15.330192] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.330555] [ 15.330628] The buggy address belongs to the physical page: [ 15.330800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.331036] flags: 0x200000000000000(node=0|zone=2) [ 15.331775] page_type: f5(slab) [ 15.332190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.332981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.333802] page dumped because: kasan: bad access detected [ 15.334377] [ 15.334613] Memory state around the buggy address: [ 15.335153] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335850] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.336516] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.337266] ^ [ 15.337757] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.338479] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.339248] ================================================================== [ 15.822172] ================================================================== [ 15.822499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.822918] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.823247] [ 15.823368] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.823414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.823427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.823450] Call Trace: [ 15.823471] <TASK> [ 15.823491] dump_stack_lvl+0x73/0xb0 [ 15.823520] print_report+0xd1/0x610 [ 15.823544] ? __virt_addr_valid+0x1db/0x2d0 [ 15.823576] ? kasan_atomics_helper+0x194a/0x5450 [ 15.823598] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.823622] ? kasan_atomics_helper+0x194a/0x5450 [ 15.823645] kasan_report+0x141/0x180 [ 15.823668] ? kasan_atomics_helper+0x194a/0x5450 [ 15.823719] kasan_check_range+0x10c/0x1c0 [ 15.823745] __kasan_check_write+0x18/0x20 [ 15.823764] kasan_atomics_helper+0x194a/0x5450 [ 15.823800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.823824] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.823850] ? kasan_atomics+0x152/0x310 [ 15.823878] kasan_atomics+0x1dc/0x310 [ 15.823902] ? __pfx_kasan_atomics+0x10/0x10 [ 15.823927] ? __pfx_read_tsc+0x10/0x10 [ 15.823948] ? ktime_get_ts64+0x86/0x230 [ 15.823975] kunit_try_run_case+0x1a5/0x480 [ 15.824001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.824024] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.824058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.824082] ? __kthread_parkme+0x82/0x180 [ 15.824106] ? preempt_count_sub+0x50/0x80 [ 15.824131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.824156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.824190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.824215] kthread+0x337/0x6f0 [ 15.824235] ? trace_preempt_on+0x20/0xc0 [ 15.824271] ? __pfx_kthread+0x10/0x10 [ 15.824293] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.824315] ? calculate_sigpending+0x7b/0xa0 [ 15.824351] ? __pfx_kthread+0x10/0x10 [ 15.824375] ret_from_fork+0x116/0x1d0 [ 15.824394] ? __pfx_kthread+0x10/0x10 [ 15.824414] ret_from_fork_asm+0x1a/0x30 [ 15.824448] </TASK> [ 15.824460] [ 15.832003] Allocated by task 282: [ 15.832146] kasan_save_stack+0x45/0x70 [ 15.832356] kasan_save_track+0x18/0x40 [ 15.832549] kasan_save_alloc_info+0x3b/0x50 [ 15.832832] __kasan_kmalloc+0xb7/0xc0 [ 15.833024] __kmalloc_cache_noprof+0x189/0x420 [ 15.833257] kasan_atomics+0x95/0x310 [ 15.833440] kunit_try_run_case+0x1a5/0x480 [ 15.833675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.833929] kthread+0x337/0x6f0 [ 15.834118] ret_from_fork+0x116/0x1d0 [ 15.834307] ret_from_fork_asm+0x1a/0x30 [ 15.834506] [ 15.834630] The buggy address belongs to the object at ffff8881026ce080 [ 15.834630] which belongs to the cache kmalloc-64 of size 64 [ 15.835099] The buggy address is located 0 bytes to the right of [ 15.835099] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.835480] [ 15.835594] The buggy address belongs to the physical page: [ 15.835869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.836238] flags: 0x200000000000000(node=0|zone=2) [ 15.836483] page_type: f5(slab) [ 15.836702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.837068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.837305] page dumped because: kasan: bad access detected [ 15.837483] [ 15.837555] Memory state around the buggy address: [ 15.837804] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838165] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.838514] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.838878] ^ [ 15.839077] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.839430] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.839765] ================================================================== [ 15.339969] ================================================================== [ 15.340760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.341294] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.341525] [ 15.341719] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.341815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.341828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.341851] Call Trace: [ 15.341892] <TASK> [ 15.341911] dump_stack_lvl+0x73/0xb0 [ 15.341943] print_report+0xd1/0x610 [ 15.341966] ? __virt_addr_valid+0x1db/0x2d0 [ 15.341990] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.342012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.342036] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.342069] kasan_report+0x141/0x180 [ 15.342091] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.342120] __asan_report_load4_noabort+0x18/0x20 [ 15.342144] kasan_atomics_helper+0x4a36/0x5450 [ 15.342213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.342238] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.342313] ? kasan_atomics+0x152/0x310 [ 15.342345] kasan_atomics+0x1dc/0x310 [ 15.342383] ? __pfx_kasan_atomics+0x10/0x10 [ 15.342410] ? __pfx_read_tsc+0x10/0x10 [ 15.342432] ? ktime_get_ts64+0x86/0x230 [ 15.342458] kunit_try_run_case+0x1a5/0x480 [ 15.342485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.342534] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.342559] ? __kthread_parkme+0x82/0x180 [ 15.342598] ? preempt_count_sub+0x50/0x80 [ 15.342626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.342676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.342701] kthread+0x337/0x6f0 [ 15.342721] ? trace_preempt_on+0x20/0xc0 [ 15.342745] ? __pfx_kthread+0x10/0x10 [ 15.342767] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.342804] ? calculate_sigpending+0x7b/0xa0 [ 15.342831] ? __pfx_kthread+0x10/0x10 [ 15.342853] ret_from_fork+0x116/0x1d0 [ 15.342873] ? __pfx_kthread+0x10/0x10 [ 15.342893] ret_from_fork_asm+0x1a/0x30 [ 15.342927] </TASK> [ 15.342940] [ 15.357822] Allocated by task 282: [ 15.358295] kasan_save_stack+0x45/0x70 [ 15.358785] kasan_save_track+0x18/0x40 [ 15.359149] kasan_save_alloc_info+0x3b/0x50 [ 15.359310] __kasan_kmalloc+0xb7/0xc0 [ 15.359443] __kmalloc_cache_noprof+0x189/0x420 [ 15.359595] kasan_atomics+0x95/0x310 [ 15.359728] kunit_try_run_case+0x1a5/0x480 [ 15.359873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.360046] kthread+0x337/0x6f0 [ 15.360175] ret_from_fork+0x116/0x1d0 [ 15.360307] ret_from_fork_asm+0x1a/0x30 [ 15.360494] [ 15.360593] The buggy address belongs to the object at ffff8881026ce080 [ 15.360593] which belongs to the cache kmalloc-64 of size 64 [ 15.361317] The buggy address is located 0 bytes to the right of [ 15.361317] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.361919] [ 15.362007] The buggy address belongs to the physical page: [ 15.362357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.362638] flags: 0x200000000000000(node=0|zone=2) [ 15.362829] page_type: f5(slab) [ 15.362969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.363416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.363899] page dumped because: kasan: bad access detected [ 15.364354] [ 15.364636] Memory state around the buggy address: [ 15.364868] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.365161] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.365454] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.365671] ^ [ 15.365835] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.366160] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.366486] ================================================================== [ 14.897617] ================================================================== [ 14.897964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.898655] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.899069] [ 14.899199] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.899248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.899261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.899284] Call Trace: [ 14.899302] <TASK> [ 14.899321] dump_stack_lvl+0x73/0xb0 [ 14.899352] print_report+0xd1/0x610 [ 14.899377] ? __virt_addr_valid+0x1db/0x2d0 [ 14.899403] ? kasan_atomics_helper+0x565/0x5450 [ 14.899425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.899449] ? kasan_atomics_helper+0x565/0x5450 [ 14.899473] kasan_report+0x141/0x180 [ 14.899497] ? kasan_atomics_helper+0x565/0x5450 [ 14.899526] kasan_check_range+0x10c/0x1c0 [ 14.899551] __kasan_check_write+0x18/0x20 [ 14.899571] kasan_atomics_helper+0x565/0x5450 [ 14.899596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.899619] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.899646] ? kasan_atomics+0x152/0x310 [ 14.899675] kasan_atomics+0x1dc/0x310 [ 14.899699] ? __pfx_kasan_atomics+0x10/0x10 [ 14.899725] ? __pfx_read_tsc+0x10/0x10 [ 14.899746] ? ktime_get_ts64+0x86/0x230 [ 14.899773] kunit_try_run_case+0x1a5/0x480 [ 14.899799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.899822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.899852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.899877] ? __kthread_parkme+0x82/0x180 [ 14.899900] ? preempt_count_sub+0x50/0x80 [ 14.899925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.899950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.899976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.900080] kthread+0x337/0x6f0 [ 14.900104] ? trace_preempt_on+0x20/0xc0 [ 14.900129] ? __pfx_kthread+0x10/0x10 [ 14.900150] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.900173] ? calculate_sigpending+0x7b/0xa0 [ 14.900198] ? __pfx_kthread+0x10/0x10 [ 14.900221] ret_from_fork+0x116/0x1d0 [ 14.900240] ? __pfx_kthread+0x10/0x10 [ 14.900261] ret_from_fork_asm+0x1a/0x30 [ 14.900298] </TASK> [ 14.900310] [ 14.908498] Allocated by task 282: [ 14.908699] kasan_save_stack+0x45/0x70 [ 14.908853] kasan_save_track+0x18/0x40 [ 14.909161] kasan_save_alloc_info+0x3b/0x50 [ 14.909378] __kasan_kmalloc+0xb7/0xc0 [ 14.909543] __kmalloc_cache_noprof+0x189/0x420 [ 14.910019] kasan_atomics+0x95/0x310 [ 14.910250] kunit_try_run_case+0x1a5/0x480 [ 14.910451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.910706] kthread+0x337/0x6f0 [ 14.911006] ret_from_fork+0x116/0x1d0 [ 14.911163] ret_from_fork_asm+0x1a/0x30 [ 14.911307] [ 14.911381] The buggy address belongs to the object at ffff8881026ce080 [ 14.911381] which belongs to the cache kmalloc-64 of size 64 [ 14.911829] The buggy address is located 0 bytes to the right of [ 14.911829] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.912519] [ 14.912608] The buggy address belongs to the physical page: [ 14.912947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.913211] flags: 0x200000000000000(node=0|zone=2) [ 14.913398] page_type: f5(slab) [ 14.913571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.914079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.914427] page dumped because: kasan: bad access detected [ 14.914697] [ 14.914778] Memory state around the buggy address: [ 14.914983] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.915283] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.915577] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.915843] ^ [ 14.916062] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.916365] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.916934] ================================================================== [ 15.918162] ================================================================== [ 15.918552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.918958] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.919423] [ 15.919515] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.919560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.919572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.919595] Call Trace: [ 15.919613] <TASK> [ 15.919631] dump_stack_lvl+0x73/0xb0 [ 15.919660] print_report+0xd1/0x610 [ 15.919684] ? __virt_addr_valid+0x1db/0x2d0 [ 15.919708] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.919730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.919767] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.919790] kasan_report+0x141/0x180 [ 15.919821] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.919862] __asan_report_load8_noabort+0x18/0x20 [ 15.919888] kasan_atomics_helper+0x4f30/0x5450 [ 15.919914] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.919937] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.919963] ? kasan_atomics+0x152/0x310 [ 15.919991] kasan_atomics+0x1dc/0x310 [ 15.920014] ? __pfx_kasan_atomics+0x10/0x10 [ 15.920039] ? __pfx_read_tsc+0x10/0x10 [ 15.920070] ? ktime_get_ts64+0x86/0x230 [ 15.920097] kunit_try_run_case+0x1a5/0x480 [ 15.920132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.920155] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.920192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.920231] ? __kthread_parkme+0x82/0x180 [ 15.920252] ? preempt_count_sub+0x50/0x80 [ 15.920279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.920304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.920329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.920354] kthread+0x337/0x6f0 [ 15.920375] ? trace_preempt_on+0x20/0xc0 [ 15.920399] ? __pfx_kthread+0x10/0x10 [ 15.920421] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.920443] ? calculate_sigpending+0x7b/0xa0 [ 15.920468] ? __pfx_kthread+0x10/0x10 [ 15.920490] ret_from_fork+0x116/0x1d0 [ 15.920509] ? __pfx_kthread+0x10/0x10 [ 15.920531] ret_from_fork_asm+0x1a/0x30 [ 15.920564] </TASK> [ 15.920575] [ 15.928398] Allocated by task 282: [ 15.928576] kasan_save_stack+0x45/0x70 [ 15.928791] kasan_save_track+0x18/0x40 [ 15.928962] kasan_save_alloc_info+0x3b/0x50 [ 15.929170] __kasan_kmalloc+0xb7/0xc0 [ 15.929375] __kmalloc_cache_noprof+0x189/0x420 [ 15.929577] kasan_atomics+0x95/0x310 [ 15.929766] kunit_try_run_case+0x1a5/0x480 [ 15.929985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.930234] kthread+0x337/0x6f0 [ 15.930408] ret_from_fork+0x116/0x1d0 [ 15.930626] ret_from_fork_asm+0x1a/0x30 [ 15.930796] [ 15.930904] The buggy address belongs to the object at ffff8881026ce080 [ 15.930904] which belongs to the cache kmalloc-64 of size 64 [ 15.931407] The buggy address is located 0 bytes to the right of [ 15.931407] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.931970] [ 15.932079] The buggy address belongs to the physical page: [ 15.932285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.932588] flags: 0x200000000000000(node=0|zone=2) [ 15.932840] page_type: f5(slab) [ 15.933014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.933361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.933701] page dumped because: kasan: bad access detected [ 15.933952] [ 15.934023] Memory state around the buggy address: [ 15.934260] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.934538] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.934983] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.935324] ^ [ 15.935485] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936005] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936268] ================================================================== [ 15.899298] ================================================================== [ 15.899720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.900264] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.900534] [ 15.900698] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.900746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.900771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.900795] Call Trace: [ 15.900816] <TASK> [ 15.900846] dump_stack_lvl+0x73/0xb0 [ 15.900877] print_report+0xd1/0x610 [ 15.900900] ? __virt_addr_valid+0x1db/0x2d0 [ 15.900924] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.900946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.900970] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.900994] kasan_report+0x141/0x180 [ 15.901017] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.901045] kasan_check_range+0x10c/0x1c0 [ 15.901080] __kasan_check_write+0x18/0x20 [ 15.901099] kasan_atomics_helper+0x1c18/0x5450 [ 15.901124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.901147] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.901173] ? kasan_atomics+0x152/0x310 [ 15.901202] kasan_atomics+0x1dc/0x310 [ 15.901236] ? __pfx_kasan_atomics+0x10/0x10 [ 15.901261] ? __pfx_read_tsc+0x10/0x10 [ 15.901294] ? ktime_get_ts64+0x86/0x230 [ 15.901321] kunit_try_run_case+0x1a5/0x480 [ 15.901348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.901371] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.901397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.901422] ? __kthread_parkme+0x82/0x180 [ 15.901443] ? preempt_count_sub+0x50/0x80 [ 15.901469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.901494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.901519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.901544] kthread+0x337/0x6f0 [ 15.901564] ? trace_preempt_on+0x20/0xc0 [ 15.901589] ? __pfx_kthread+0x10/0x10 [ 15.901610] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.901642] ? calculate_sigpending+0x7b/0xa0 [ 15.901667] ? __pfx_kthread+0x10/0x10 [ 15.901701] ret_from_fork+0x116/0x1d0 [ 15.901720] ? __pfx_kthread+0x10/0x10 [ 15.901744] ret_from_fork_asm+0x1a/0x30 [ 15.901781] </TASK> [ 15.901792] [ 15.909753] Allocated by task 282: [ 15.909931] kasan_save_stack+0x45/0x70 [ 15.910097] kasan_save_track+0x18/0x40 [ 15.910316] kasan_save_alloc_info+0x3b/0x50 [ 15.910531] __kasan_kmalloc+0xb7/0xc0 [ 15.910734] __kmalloc_cache_noprof+0x189/0x420 [ 15.910916] kasan_atomics+0x95/0x310 [ 15.911115] kunit_try_run_case+0x1a5/0x480 [ 15.911333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.911515] kthread+0x337/0x6f0 [ 15.911640] ret_from_fork+0x116/0x1d0 [ 15.911775] ret_from_fork_asm+0x1a/0x30 [ 15.911918] [ 15.911992] The buggy address belongs to the object at ffff8881026ce080 [ 15.911992] which belongs to the cache kmalloc-64 of size 64 [ 15.912364] The buggy address is located 0 bytes to the right of [ 15.912364] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.912987] [ 15.913110] The buggy address belongs to the physical page: [ 15.913367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.913909] flags: 0x200000000000000(node=0|zone=2) [ 15.914113] page_type: f5(slab) [ 15.914243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.914479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.915041] page dumped because: kasan: bad access detected [ 15.915309] [ 15.915405] Memory state around the buggy address: [ 15.915713] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915977] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.916208] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.916427] ^ [ 15.916677] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.917025] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.917373] ================================================================== [ 15.170916] ================================================================== [ 15.171627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.172015] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.172254] [ 15.172344] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.172389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.172401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.172425] Call Trace: [ 15.172444] <TASK> [ 15.172463] dump_stack_lvl+0x73/0xb0 [ 15.172492] print_report+0xd1/0x610 [ 15.172515] ? __virt_addr_valid+0x1db/0x2d0 [ 15.172539] ? kasan_atomics_helper+0xc70/0x5450 [ 15.172560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.172585] ? kasan_atomics_helper+0xc70/0x5450 [ 15.172619] kasan_report+0x141/0x180 [ 15.172653] ? kasan_atomics_helper+0xc70/0x5450 [ 15.172682] kasan_check_range+0x10c/0x1c0 [ 15.172706] __kasan_check_write+0x18/0x20 [ 15.172725] kasan_atomics_helper+0xc70/0x5450 [ 15.172749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.172771] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.172798] ? kasan_atomics+0x152/0x310 [ 15.172827] kasan_atomics+0x1dc/0x310 [ 15.172862] ? __pfx_kasan_atomics+0x10/0x10 [ 15.172887] ? __pfx_read_tsc+0x10/0x10 [ 15.172908] ? ktime_get_ts64+0x86/0x230 [ 15.172934] kunit_try_run_case+0x1a5/0x480 [ 15.172962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.172985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.173010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.173035] ? __kthread_parkme+0x82/0x180 [ 15.173068] ? preempt_count_sub+0x50/0x80 [ 15.173094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.173119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.173144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.173169] kthread+0x337/0x6f0 [ 15.173188] ? trace_preempt_on+0x20/0xc0 [ 15.173213] ? __pfx_kthread+0x10/0x10 [ 15.173234] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.173256] ? calculate_sigpending+0x7b/0xa0 [ 15.173282] ? __pfx_kthread+0x10/0x10 [ 15.173304] ret_from_fork+0x116/0x1d0 [ 15.173322] ? __pfx_kthread+0x10/0x10 [ 15.173343] ret_from_fork_asm+0x1a/0x30 [ 15.173376] </TASK> [ 15.173388] [ 15.181874] Allocated by task 282: [ 15.182021] kasan_save_stack+0x45/0x70 [ 15.182240] kasan_save_track+0x18/0x40 [ 15.182435] kasan_save_alloc_info+0x3b/0x50 [ 15.182646] __kasan_kmalloc+0xb7/0xc0 [ 15.182799] __kmalloc_cache_noprof+0x189/0x420 [ 15.183071] kasan_atomics+0x95/0x310 [ 15.183209] kunit_try_run_case+0x1a5/0x480 [ 15.183358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.183538] kthread+0x337/0x6f0 [ 15.183699] ret_from_fork+0x116/0x1d0 [ 15.183885] ret_from_fork_asm+0x1a/0x30 [ 15.184299] [ 15.184415] The buggy address belongs to the object at ffff8881026ce080 [ 15.184415] which belongs to the cache kmalloc-64 of size 64 [ 15.185101] The buggy address is located 0 bytes to the right of [ 15.185101] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.185477] [ 15.185628] The buggy address belongs to the physical page: [ 15.186193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.186477] flags: 0x200000000000000(node=0|zone=2) [ 15.186888] page_type: f5(slab) [ 15.187092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.187389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.187710] page dumped because: kasan: bad access detected [ 15.188064] [ 15.188160] Memory state around the buggy address: [ 15.188357] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.188678] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.188899] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.189555] ^ [ 15.190032] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.190379] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.190601] ================================================================== [ 15.367017] ================================================================== [ 15.367379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.367718] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.368216] [ 15.368334] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.368383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.368395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.368419] Call Trace: [ 15.368439] <TASK> [ 15.368458] dump_stack_lvl+0x73/0xb0 [ 15.368488] print_report+0xd1/0x610 [ 15.368510] ? __virt_addr_valid+0x1db/0x2d0 [ 15.368534] ? kasan_atomics_helper+0x1079/0x5450 [ 15.368555] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.368579] ? kasan_atomics_helper+0x1079/0x5450 [ 15.368602] kasan_report+0x141/0x180 [ 15.368625] ? kasan_atomics_helper+0x1079/0x5450 [ 15.368652] kasan_check_range+0x10c/0x1c0 [ 15.368676] __kasan_check_write+0x18/0x20 [ 15.368738] kasan_atomics_helper+0x1079/0x5450 [ 15.368765] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.368851] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.368878] ? kasan_atomics+0x152/0x310 [ 15.368907] kasan_atomics+0x1dc/0x310 [ 15.369015] ? __pfx_kasan_atomics+0x10/0x10 [ 15.369090] ? __pfx_read_tsc+0x10/0x10 [ 15.369113] ? ktime_get_ts64+0x86/0x230 [ 15.369151] kunit_try_run_case+0x1a5/0x480 [ 15.369178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.369202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.369227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.369253] ? __kthread_parkme+0x82/0x180 [ 15.369274] ? preempt_count_sub+0x50/0x80 [ 15.369299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.369324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.369348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.369373] kthread+0x337/0x6f0 [ 15.369393] ? trace_preempt_on+0x20/0xc0 [ 15.369418] ? __pfx_kthread+0x10/0x10 [ 15.369439] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.369461] ? calculate_sigpending+0x7b/0xa0 [ 15.369487] ? __pfx_kthread+0x10/0x10 [ 15.369509] ret_from_fork+0x116/0x1d0 [ 15.369528] ? __pfx_kthread+0x10/0x10 [ 15.369549] ret_from_fork_asm+0x1a/0x30 [ 15.369628] </TASK> [ 15.369639] [ 15.379560] Allocated by task 282: [ 15.379862] kasan_save_stack+0x45/0x70 [ 15.380165] kasan_save_track+0x18/0x40 [ 15.380458] kasan_save_alloc_info+0x3b/0x50 [ 15.380705] __kasan_kmalloc+0xb7/0xc0 [ 15.380836] __kmalloc_cache_noprof+0x189/0x420 [ 15.381108] kasan_atomics+0x95/0x310 [ 15.381348] kunit_try_run_case+0x1a5/0x480 [ 15.381559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.381905] kthread+0x337/0x6f0 [ 15.382173] ret_from_fork+0x116/0x1d0 [ 15.382368] ret_from_fork_asm+0x1a/0x30 [ 15.382726] [ 15.382820] The buggy address belongs to the object at ffff8881026ce080 [ 15.382820] which belongs to the cache kmalloc-64 of size 64 [ 15.383324] The buggy address is located 0 bytes to the right of [ 15.383324] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.383952] [ 15.384105] The buggy address belongs to the physical page: [ 15.384365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.384989] flags: 0x200000000000000(node=0|zone=2) [ 15.385461] page_type: f5(slab) [ 15.385637] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.385956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.386532] page dumped because: kasan: bad access detected [ 15.386801] [ 15.386919] Memory state around the buggy address: [ 15.387185] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.387399] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.387669] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.388236] ^ [ 15.388771] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389247] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389660] ================================================================== [ 15.680214] ================================================================== [ 15.680537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.680857] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.681183] [ 15.681310] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.681366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.681378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.681402] Call Trace: [ 15.681419] <TASK> [ 15.681436] dump_stack_lvl+0x73/0xb0 [ 15.681465] print_report+0xd1/0x610 [ 15.681487] ? __virt_addr_valid+0x1db/0x2d0 [ 15.681520] ? kasan_atomics_helper+0x151d/0x5450 [ 15.681542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.681567] ? kasan_atomics_helper+0x151d/0x5450 [ 15.681609] kasan_report+0x141/0x180 [ 15.681632] ? kasan_atomics_helper+0x151d/0x5450 [ 15.681660] kasan_check_range+0x10c/0x1c0 [ 15.681684] __kasan_check_write+0x18/0x20 [ 15.681713] kasan_atomics_helper+0x151d/0x5450 [ 15.681737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.681760] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.681797] ? kasan_atomics+0x152/0x310 [ 15.681825] kasan_atomics+0x1dc/0x310 [ 15.681848] ? __pfx_kasan_atomics+0x10/0x10 [ 15.681873] ? __pfx_read_tsc+0x10/0x10 [ 15.681894] ? ktime_get_ts64+0x86/0x230 [ 15.681920] kunit_try_run_case+0x1a5/0x480 [ 15.681946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.681969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.681996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.682021] ? __kthread_parkme+0x82/0x180 [ 15.682058] ? preempt_count_sub+0x50/0x80 [ 15.682085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.682120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.682145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.682171] kthread+0x337/0x6f0 [ 15.682191] ? trace_preempt_on+0x20/0xc0 [ 15.682220] ? __pfx_kthread+0x10/0x10 [ 15.682241] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.682272] ? calculate_sigpending+0x7b/0xa0 [ 15.682297] ? __pfx_kthread+0x10/0x10 [ 15.682319] ret_from_fork+0x116/0x1d0 [ 15.682348] ? __pfx_kthread+0x10/0x10 [ 15.682369] ret_from_fork_asm+0x1a/0x30 [ 15.682402] </TASK> [ 15.682412] [ 15.690135] Allocated by task 282: [ 15.690312] kasan_save_stack+0x45/0x70 [ 15.690488] kasan_save_track+0x18/0x40 [ 15.690853] kasan_save_alloc_info+0x3b/0x50 [ 15.691025] __kasan_kmalloc+0xb7/0xc0 [ 15.691182] __kmalloc_cache_noprof+0x189/0x420 [ 15.691406] kasan_atomics+0x95/0x310 [ 15.691647] kunit_try_run_case+0x1a5/0x480 [ 15.691826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.692104] kthread+0x337/0x6f0 [ 15.692277] ret_from_fork+0x116/0x1d0 [ 15.692466] ret_from_fork_asm+0x1a/0x30 [ 15.692702] [ 15.692793] The buggy address belongs to the object at ffff8881026ce080 [ 15.692793] which belongs to the cache kmalloc-64 of size 64 [ 15.693303] The buggy address is located 0 bytes to the right of [ 15.693303] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.693846] [ 15.693922] The buggy address belongs to the physical page: [ 15.694110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.694358] flags: 0x200000000000000(node=0|zone=2) [ 15.694610] page_type: f5(slab) [ 15.694829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.695494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.695860] page dumped because: kasan: bad access detected [ 15.696114] [ 15.696187] Memory state around the buggy address: [ 15.696344] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.696562] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.696861] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.697208] ^ [ 15.697449] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.697834] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698222] ================================================================== [ 15.064072] ================================================================== [ 15.064796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.065590] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.066495] [ 15.066738] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.066787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.066800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.066824] Call Trace: [ 15.066845] <TASK> [ 15.066865] dump_stack_lvl+0x73/0xb0 [ 15.066896] print_report+0xd1/0x610 [ 15.066930] ? __virt_addr_valid+0x1db/0x2d0 [ 15.066956] ? kasan_atomics_helper+0x992/0x5450 [ 15.066979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.067006] ? kasan_atomics_helper+0x992/0x5450 [ 15.067032] kasan_report+0x141/0x180 [ 15.067067] ? kasan_atomics_helper+0x992/0x5450 [ 15.067095] kasan_check_range+0x10c/0x1c0 [ 15.067120] __kasan_check_write+0x18/0x20 [ 15.067140] kasan_atomics_helper+0x992/0x5450 [ 15.067163] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.067185] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.067212] ? kasan_atomics+0x152/0x310 [ 15.067241] kasan_atomics+0x1dc/0x310 [ 15.067265] ? __pfx_kasan_atomics+0x10/0x10 [ 15.067290] ? __pfx_read_tsc+0x10/0x10 [ 15.067312] ? ktime_get_ts64+0x86/0x230 [ 15.067339] kunit_try_run_case+0x1a5/0x480 [ 15.067364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.067389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.067415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.067440] ? __kthread_parkme+0x82/0x180 [ 15.067462] ? preempt_count_sub+0x50/0x80 [ 15.067488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.067513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.067539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.067564] kthread+0x337/0x6f0 [ 15.067585] ? trace_preempt_on+0x20/0xc0 [ 15.067622] ? __pfx_kthread+0x10/0x10 [ 15.067645] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.067668] ? calculate_sigpending+0x7b/0xa0 [ 15.067705] ? __pfx_kthread+0x10/0x10 [ 15.067727] ret_from_fork+0x116/0x1d0 [ 15.067747] ? __pfx_kthread+0x10/0x10 [ 15.067768] ret_from_fork_asm+0x1a/0x30 [ 15.067803] </TASK> [ 15.067813] [ 15.081522] Allocated by task 282: [ 15.082030] kasan_save_stack+0x45/0x70 [ 15.082373] kasan_save_track+0x18/0x40 [ 15.082596] kasan_save_alloc_info+0x3b/0x50 [ 15.082813] __kasan_kmalloc+0xb7/0xc0 [ 15.083004] __kmalloc_cache_noprof+0x189/0x420 [ 15.084227] kasan_atomics+0x95/0x310 [ 15.085070] kunit_try_run_case+0x1a5/0x480 [ 15.085691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.086010] kthread+0x337/0x6f0 [ 15.086406] ret_from_fork+0x116/0x1d0 [ 15.086782] ret_from_fork_asm+0x1a/0x30 [ 15.087283] [ 15.087364] The buggy address belongs to the object at ffff8881026ce080 [ 15.087364] which belongs to the cache kmalloc-64 of size 64 [ 15.087731] The buggy address is located 0 bytes to the right of [ 15.087731] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.089081] [ 15.089292] The buggy address belongs to the physical page: [ 15.089930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.090675] flags: 0x200000000000000(node=0|zone=2) [ 15.091200] page_type: f5(slab) [ 15.091375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.091620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.091851] page dumped because: kasan: bad access detected [ 15.092026] [ 15.092122] Memory state around the buggy address: [ 15.092361] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.092699] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.093042] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.093436] ^ [ 15.093686] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093913] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.094273] ================================================================== [ 15.880629] ================================================================== [ 15.881151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.881507] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.881943] [ 15.882088] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.882134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.882147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.882171] Call Trace: [ 15.882192] <TASK> [ 15.882216] dump_stack_lvl+0x73/0xb0 [ 15.882246] print_report+0xd1/0x610 [ 15.882269] ? __virt_addr_valid+0x1db/0x2d0 [ 15.882293] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.882316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.882340] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.882362] kasan_report+0x141/0x180 [ 15.882385] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.882414] kasan_check_range+0x10c/0x1c0 [ 15.882438] __kasan_check_write+0x18/0x20 [ 15.882457] kasan_atomics_helper+0x1b22/0x5450 [ 15.882481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.882504] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.882531] ? kasan_atomics+0x152/0x310 [ 15.882559] kasan_atomics+0x1dc/0x310 [ 15.882582] ? __pfx_kasan_atomics+0x10/0x10 [ 15.882618] ? __pfx_read_tsc+0x10/0x10 [ 15.882639] ? ktime_get_ts64+0x86/0x230 [ 15.882677] kunit_try_run_case+0x1a5/0x480 [ 15.882703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.882754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.882779] ? __kthread_parkme+0x82/0x180 [ 15.882800] ? preempt_count_sub+0x50/0x80 [ 15.882826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.882875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.882900] kthread+0x337/0x6f0 [ 15.882921] ? trace_preempt_on+0x20/0xc0 [ 15.882945] ? __pfx_kthread+0x10/0x10 [ 15.882967] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.882990] ? calculate_sigpending+0x7b/0xa0 [ 15.883015] ? __pfx_kthread+0x10/0x10 [ 15.883040] ret_from_fork+0x116/0x1d0 [ 15.883070] ? __pfx_kthread+0x10/0x10 [ 15.883091] ret_from_fork_asm+0x1a/0x30 [ 15.883126] </TASK> [ 15.883137] [ 15.890836] Allocated by task 282: [ 15.890988] kasan_save_stack+0x45/0x70 [ 15.891157] kasan_save_track+0x18/0x40 [ 15.891301] kasan_save_alloc_info+0x3b/0x50 [ 15.891453] __kasan_kmalloc+0xb7/0xc0 [ 15.891657] __kmalloc_cache_noprof+0x189/0x420 [ 15.891885] kasan_atomics+0x95/0x310 [ 15.892112] kunit_try_run_case+0x1a5/0x480 [ 15.892329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.892587] kthread+0x337/0x6f0 [ 15.892829] ret_from_fork+0x116/0x1d0 [ 15.893048] ret_from_fork_asm+0x1a/0x30 [ 15.893283] [ 15.893383] The buggy address belongs to the object at ffff8881026ce080 [ 15.893383] which belongs to the cache kmalloc-64 of size 64 [ 15.893945] The buggy address is located 0 bytes to the right of [ 15.893945] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.894413] [ 15.894492] The buggy address belongs to the physical page: [ 15.894715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.895113] flags: 0x200000000000000(node=0|zone=2) [ 15.895378] page_type: f5(slab) [ 15.895554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.895950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.896301] page dumped because: kasan: bad access detected [ 15.896554] [ 15.896655] Memory state around the buggy address: [ 15.896908] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.897229] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.897546] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.897880] ^ [ 15.898120] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.898435] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.898687] ================================================================== [ 14.731085] ================================================================== [ 14.732485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.733230] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.733938] [ 14.734047] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.734108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.734120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.734143] Call Trace: [ 14.734156] <TASK> [ 14.734174] dump_stack_lvl+0x73/0xb0 [ 14.734208] print_report+0xd1/0x610 [ 14.734230] ? __virt_addr_valid+0x1db/0x2d0 [ 14.734253] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.734274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.734296] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.734317] kasan_report+0x141/0x180 [ 14.734338] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.734365] __asan_report_store4_noabort+0x1b/0x30 [ 14.734389] kasan_atomics_helper+0x4ba2/0x5450 [ 14.734411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.734433] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.734458] ? kasan_atomics+0x152/0x310 [ 14.734485] kasan_atomics+0x1dc/0x310 [ 14.734507] ? __pfx_kasan_atomics+0x10/0x10 [ 14.734531] ? __pfx_read_tsc+0x10/0x10 [ 14.734552] ? ktime_get_ts64+0x86/0x230 [ 14.734576] kunit_try_run_case+0x1a5/0x480 [ 14.734612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.734634] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.734658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.734682] ? __kthread_parkme+0x82/0x180 [ 14.734702] ? preempt_count_sub+0x50/0x80 [ 14.734727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.734750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.734774] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.734797] kthread+0x337/0x6f0 [ 14.735014] ? trace_preempt_on+0x20/0xc0 [ 14.735040] ? __pfx_kthread+0x10/0x10 [ 14.735076] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.735098] ? calculate_sigpending+0x7b/0xa0 [ 14.735122] ? __pfx_kthread+0x10/0x10 [ 14.735143] ret_from_fork+0x116/0x1d0 [ 14.735161] ? __pfx_kthread+0x10/0x10 [ 14.735181] ret_from_fork_asm+0x1a/0x30 [ 14.735213] </TASK> [ 14.735224] [ 14.749685] Allocated by task 282: [ 14.750116] kasan_save_stack+0x45/0x70 [ 14.750504] kasan_save_track+0x18/0x40 [ 14.750902] kasan_save_alloc_info+0x3b/0x50 [ 14.751459] __kasan_kmalloc+0xb7/0xc0 [ 14.751927] __kmalloc_cache_noprof+0x189/0x420 [ 14.752224] kasan_atomics+0x95/0x310 [ 14.752364] kunit_try_run_case+0x1a5/0x480 [ 14.752513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.752897] kthread+0x337/0x6f0 [ 14.753264] ret_from_fork+0x116/0x1d0 [ 14.753621] ret_from_fork_asm+0x1a/0x30 [ 14.754031] [ 14.754235] The buggy address belongs to the object at ffff8881026ce080 [ 14.754235] which belongs to the cache kmalloc-64 of size 64 [ 14.755649] The buggy address is located 0 bytes to the right of [ 14.755649] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.756588] [ 14.756760] The buggy address belongs to the physical page: [ 14.757276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.757539] flags: 0x200000000000000(node=0|zone=2) [ 14.758117] page_type: f5(slab) [ 14.758423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.759329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.760116] page dumped because: kasan: bad access detected [ 14.760450] [ 14.760522] Memory state around the buggy address: [ 14.760774] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.761509] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.762365] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.763100] ^ [ 14.763267] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.763488] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.763729] ================================================================== [ 14.696675] ================================================================== [ 14.698441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.699547] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.700224] [ 14.700331] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.700383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.700394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.700418] Call Trace: [ 14.700431] <TASK> [ 14.700450] dump_stack_lvl+0x73/0xb0 [ 14.700486] print_report+0xd1/0x610 [ 14.700510] ? __virt_addr_valid+0x1db/0x2d0 [ 14.700536] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.700557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.700580] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.700601] kasan_report+0x141/0x180 [ 14.700622] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.700649] __asan_report_load4_noabort+0x18/0x20 [ 14.700673] kasan_atomics_helper+0x4bbc/0x5450 [ 14.700695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.700717] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.700744] ? kasan_atomics+0x152/0x310 [ 14.700771] kasan_atomics+0x1dc/0x310 [ 14.700793] ? __pfx_kasan_atomics+0x10/0x10 [ 14.700873] ? __pfx_read_tsc+0x10/0x10 [ 14.700896] ? ktime_get_ts64+0x86/0x230 [ 14.700923] kunit_try_run_case+0x1a5/0x480 [ 14.700950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.700991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.701017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.701040] ? __kthread_parkme+0x82/0x180 [ 14.701073] ? preempt_count_sub+0x50/0x80 [ 14.701099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.701147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.701170] kthread+0x337/0x6f0 [ 14.701189] ? trace_preempt_on+0x20/0xc0 [ 14.701213] ? __pfx_kthread+0x10/0x10 [ 14.701234] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.701255] ? calculate_sigpending+0x7b/0xa0 [ 14.701280] ? __pfx_kthread+0x10/0x10 [ 14.701301] ret_from_fork+0x116/0x1d0 [ 14.701319] ? __pfx_kthread+0x10/0x10 [ 14.701339] ret_from_fork_asm+0x1a/0x30 [ 14.701374] </TASK> [ 14.701385] [ 14.716582] Allocated by task 282: [ 14.716975] kasan_save_stack+0x45/0x70 [ 14.717249] kasan_save_track+0x18/0x40 [ 14.717398] kasan_save_alloc_info+0x3b/0x50 [ 14.717548] __kasan_kmalloc+0xb7/0xc0 [ 14.717851] __kmalloc_cache_noprof+0x189/0x420 [ 14.718321] kasan_atomics+0x95/0x310 [ 14.718678] kunit_try_run_case+0x1a5/0x480 [ 14.719168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.719652] kthread+0x337/0x6f0 [ 14.719952] ret_from_fork+0x116/0x1d0 [ 14.720385] ret_from_fork_asm+0x1a/0x30 [ 14.720765] [ 14.720937] The buggy address belongs to the object at ffff8881026ce080 [ 14.720937] which belongs to the cache kmalloc-64 of size 64 [ 14.721727] The buggy address is located 0 bytes to the right of [ 14.721727] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.722991] [ 14.723180] The buggy address belongs to the physical page: [ 14.723362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.723628] flags: 0x200000000000000(node=0|zone=2) [ 14.724161] page_type: f5(slab) [ 14.724458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.725320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.726113] page dumped because: kasan: bad access detected [ 14.726581] [ 14.726769] Memory state around the buggy address: [ 14.727280] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.727665] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.728464] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.728968] ^ [ 14.729303] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729524] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730031] ================================================================== [ 15.598814] ================================================================== [ 15.599204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.599713] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.599986] [ 15.600111] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.600155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.600167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.600189] Call Trace: [ 15.600206] <TASK> [ 15.600224] dump_stack_lvl+0x73/0xb0 [ 15.600251] print_report+0xd1/0x610 [ 15.600275] ? __virt_addr_valid+0x1db/0x2d0 [ 15.600297] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.600320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.600343] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.600366] kasan_report+0x141/0x180 [ 15.600389] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.600417] __asan_report_load8_noabort+0x18/0x20 [ 15.600442] kasan_atomics_helper+0x4eae/0x5450 [ 15.600466] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.600489] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.600515] ? kasan_atomics+0x152/0x310 [ 15.600543] kasan_atomics+0x1dc/0x310 [ 15.600566] ? __pfx_kasan_atomics+0x10/0x10 [ 15.600591] ? __pfx_read_tsc+0x10/0x10 [ 15.600611] ? ktime_get_ts64+0x86/0x230 [ 15.600637] kunit_try_run_case+0x1a5/0x480 [ 15.600662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.600685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.600710] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.600734] ? __kthread_parkme+0x82/0x180 [ 15.600755] ? preempt_count_sub+0x50/0x80 [ 15.600782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.600806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.600831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.600856] kthread+0x337/0x6f0 [ 15.600876] ? trace_preempt_on+0x20/0xc0 [ 15.600901] ? __pfx_kthread+0x10/0x10 [ 15.600922] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.600945] ? calculate_sigpending+0x7b/0xa0 [ 15.600969] ? __pfx_kthread+0x10/0x10 [ 15.600992] ret_from_fork+0x116/0x1d0 [ 15.601024] ? __pfx_kthread+0x10/0x10 [ 15.601045] ret_from_fork_asm+0x1a/0x30 [ 15.601089] </TASK> [ 15.601099] [ 15.610936] Allocated by task 282: [ 15.611120] kasan_save_stack+0x45/0x70 [ 15.611309] kasan_save_track+0x18/0x40 [ 15.611486] kasan_save_alloc_info+0x3b/0x50 [ 15.612014] __kasan_kmalloc+0xb7/0xc0 [ 15.612349] __kmalloc_cache_noprof+0x189/0x420 [ 15.612779] kasan_atomics+0x95/0x310 [ 15.613107] kunit_try_run_case+0x1a5/0x480 [ 15.613319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.613561] kthread+0x337/0x6f0 [ 15.613721] ret_from_fork+0x116/0x1d0 [ 15.613895] ret_from_fork_asm+0x1a/0x30 [ 15.614086] [ 15.614178] The buggy address belongs to the object at ffff8881026ce080 [ 15.614178] which belongs to the cache kmalloc-64 of size 64 [ 15.615042] The buggy address is located 0 bytes to the right of [ 15.615042] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.615953] [ 15.616222] The buggy address belongs to the physical page: [ 15.616539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.617020] flags: 0x200000000000000(node=0|zone=2) [ 15.617263] page_type: f5(slab) [ 15.617425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.618139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.618589] page dumped because: kasan: bad access detected [ 15.618973] [ 15.619079] Memory state around the buggy address: [ 15.619287] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.619852] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.620353] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.620859] ^ [ 15.621217] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.621519] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.622293] ================================================================== [ 15.782571] ================================================================== [ 15.782975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.783488] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.784004] [ 15.784204] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.784278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.784318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.784342] Call Trace: [ 15.784362] <TASK> [ 15.784394] dump_stack_lvl+0x73/0xb0 [ 15.784427] print_report+0xd1/0x610 [ 15.784450] ? __virt_addr_valid+0x1db/0x2d0 [ 15.784475] ? kasan_atomics_helper+0x1818/0x5450 [ 15.784497] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.784522] ? kasan_atomics_helper+0x1818/0x5450 [ 15.784545] kasan_report+0x141/0x180 [ 15.784569] ? kasan_atomics_helper+0x1818/0x5450 [ 15.784596] kasan_check_range+0x10c/0x1c0 [ 15.784621] __kasan_check_write+0x18/0x20 [ 15.784641] kasan_atomics_helper+0x1818/0x5450 [ 15.784664] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.784687] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.784714] ? kasan_atomics+0x152/0x310 [ 15.784744] kasan_atomics+0x1dc/0x310 [ 15.784767] ? __pfx_kasan_atomics+0x10/0x10 [ 15.784792] ? __pfx_read_tsc+0x10/0x10 [ 15.784823] ? ktime_get_ts64+0x86/0x230 [ 15.784849] kunit_try_run_case+0x1a5/0x480 [ 15.784876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.784899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.784925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.784949] ? __kthread_parkme+0x82/0x180 [ 15.784970] ? preempt_count_sub+0x50/0x80 [ 15.784996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.785021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.785046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.785082] kthread+0x337/0x6f0 [ 15.785102] ? trace_preempt_on+0x20/0xc0 [ 15.785127] ? __pfx_kthread+0x10/0x10 [ 15.785181] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.785203] ? calculate_sigpending+0x7b/0xa0 [ 15.785240] ? __pfx_kthread+0x10/0x10 [ 15.785263] ret_from_fork+0x116/0x1d0 [ 15.785281] ? __pfx_kthread+0x10/0x10 [ 15.785302] ret_from_fork_asm+0x1a/0x30 [ 15.785337] </TASK> [ 15.785348] [ 15.793324] Allocated by task 282: [ 15.793490] kasan_save_stack+0x45/0x70 [ 15.793717] kasan_save_track+0x18/0x40 [ 15.793920] kasan_save_alloc_info+0x3b/0x50 [ 15.794212] __kasan_kmalloc+0xb7/0xc0 [ 15.794439] __kmalloc_cache_noprof+0x189/0x420 [ 15.794798] kasan_atomics+0x95/0x310 [ 15.795086] kunit_try_run_case+0x1a5/0x480 [ 15.795239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.795417] kthread+0x337/0x6f0 [ 15.795540] ret_from_fork+0x116/0x1d0 [ 15.795708] ret_from_fork_asm+0x1a/0x30 [ 15.795912] [ 15.796012] The buggy address belongs to the object at ffff8881026ce080 [ 15.796012] which belongs to the cache kmalloc-64 of size 64 [ 15.796638] The buggy address is located 0 bytes to the right of [ 15.796638] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.797362] [ 15.797451] The buggy address belongs to the physical page: [ 15.797723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.798140] flags: 0x200000000000000(node=0|zone=2) [ 15.798320] page_type: f5(slab) [ 15.798447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.798808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.799209] page dumped because: kasan: bad access detected [ 15.799520] [ 15.799667] Memory state around the buggy address: [ 15.799876] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.800178] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.800419] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.800821] ^ [ 15.801036] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.801292] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.801684] ================================================================== [ 16.154105] ================================================================== [ 16.154937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.155313] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.155669] [ 16.155788] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.155833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.155846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.155870] Call Trace: [ 16.155890] <TASK> [ 16.155909] dump_stack_lvl+0x73/0xb0 [ 16.155938] print_report+0xd1/0x610 [ 16.155962] ? __virt_addr_valid+0x1db/0x2d0 [ 16.155987] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.156008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.156033] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.156065] kasan_report+0x141/0x180 [ 16.156088] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.156118] __asan_report_load8_noabort+0x18/0x20 [ 16.156144] kasan_atomics_helper+0x4fa5/0x5450 [ 16.156168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.156192] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.156218] ? kasan_atomics+0x152/0x310 [ 16.156247] kasan_atomics+0x1dc/0x310 [ 16.156271] ? __pfx_kasan_atomics+0x10/0x10 [ 16.156297] ? __pfx_read_tsc+0x10/0x10 [ 16.156318] ? ktime_get_ts64+0x86/0x230 [ 16.156345] kunit_try_run_case+0x1a5/0x480 [ 16.156372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.156395] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.156422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.156447] ? __kthread_parkme+0x82/0x180 [ 16.156469] ? preempt_count_sub+0x50/0x80 [ 16.156496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.156521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.156547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.156573] kthread+0x337/0x6f0 [ 16.156593] ? trace_preempt_on+0x20/0xc0 [ 16.156618] ? __pfx_kthread+0x10/0x10 [ 16.156640] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.156663] ? calculate_sigpending+0x7b/0xa0 [ 16.156688] ? __pfx_kthread+0x10/0x10 [ 16.156711] ret_from_fork+0x116/0x1d0 [ 16.156730] ? __pfx_kthread+0x10/0x10 [ 16.156752] ret_from_fork_asm+0x1a/0x30 [ 16.156786] </TASK> [ 16.156797] [ 16.164156] Allocated by task 282: [ 16.164297] kasan_save_stack+0x45/0x70 [ 16.164448] kasan_save_track+0x18/0x40 [ 16.164678] kasan_save_alloc_info+0x3b/0x50 [ 16.164893] __kasan_kmalloc+0xb7/0xc0 [ 16.165091] __kmalloc_cache_noprof+0x189/0x420 [ 16.165319] kasan_atomics+0x95/0x310 [ 16.165509] kunit_try_run_case+0x1a5/0x480 [ 16.165730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.165913] kthread+0x337/0x6f0 [ 16.166038] ret_from_fork+0x116/0x1d0 [ 16.166184] ret_from_fork_asm+0x1a/0x30 [ 16.166389] [ 16.166486] The buggy address belongs to the object at ffff8881026ce080 [ 16.166486] which belongs to the cache kmalloc-64 of size 64 [ 16.167041] The buggy address is located 0 bytes to the right of [ 16.167041] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.167520] [ 16.167617] The buggy address belongs to the physical page: [ 16.167797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.168057] flags: 0x200000000000000(node=0|zone=2) [ 16.168300] page_type: f5(slab) [ 16.168474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.168847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.169212] page dumped because: kasan: bad access detected [ 16.169473] [ 16.169587] Memory state around the buggy address: [ 16.169816] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.170079] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.170358] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.170710] ^ [ 16.170922] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.171201] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.171440] ================================================================== [ 14.855379] ================================================================== [ 14.855883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.856223] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 14.856515] [ 14.856801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.856900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.856912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.856935] Call Trace: [ 14.856955] <TASK> [ 14.856974] dump_stack_lvl+0x73/0xb0 [ 14.857006] print_report+0xd1/0x610 [ 14.857029] ? __virt_addr_valid+0x1db/0x2d0 [ 14.857065] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.857087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.857111] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.857133] kasan_report+0x141/0x180 [ 14.857157] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.857185] kasan_check_range+0x10c/0x1c0 [ 14.857209] __kasan_check_write+0x18/0x20 [ 14.857229] kasan_atomics_helper+0x4a0/0x5450 [ 14.857253] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.857276] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.857302] ? kasan_atomics+0x152/0x310 [ 14.857331] kasan_atomics+0x1dc/0x310 [ 14.857354] ? __pfx_kasan_atomics+0x10/0x10 [ 14.857379] ? __pfx_read_tsc+0x10/0x10 [ 14.857400] ? ktime_get_ts64+0x86/0x230 [ 14.857426] kunit_try_run_case+0x1a5/0x480 [ 14.857453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.857476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.857502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.857526] ? __kthread_parkme+0x82/0x180 [ 14.857547] ? preempt_count_sub+0x50/0x80 [ 14.857573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.857610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.857635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.857660] kthread+0x337/0x6f0 [ 14.857679] ? trace_preempt_on+0x20/0xc0 [ 14.857704] ? __pfx_kthread+0x10/0x10 [ 14.857725] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.857747] ? calculate_sigpending+0x7b/0xa0 [ 14.857773] ? __pfx_kthread+0x10/0x10 [ 14.857794] ret_from_fork+0x116/0x1d0 [ 14.857814] ? __pfx_kthread+0x10/0x10 [ 14.857900] ret_from_fork_asm+0x1a/0x30 [ 14.857935] </TASK> [ 14.857946] [ 14.866940] Allocated by task 282: [ 14.867141] kasan_save_stack+0x45/0x70 [ 14.867292] kasan_save_track+0x18/0x40 [ 14.867430] kasan_save_alloc_info+0x3b/0x50 [ 14.867582] __kasan_kmalloc+0xb7/0xc0 [ 14.867865] __kmalloc_cache_noprof+0x189/0x420 [ 14.868114] kasan_atomics+0x95/0x310 [ 14.868308] kunit_try_run_case+0x1a5/0x480 [ 14.868526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.869043] kthread+0x337/0x6f0 [ 14.869253] ret_from_fork+0x116/0x1d0 [ 14.869424] ret_from_fork_asm+0x1a/0x30 [ 14.869569] [ 14.869643] The buggy address belongs to the object at ffff8881026ce080 [ 14.869643] which belongs to the cache kmalloc-64 of size 64 [ 14.870133] The buggy address is located 0 bytes to the right of [ 14.870133] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 14.870745] [ 14.870826] The buggy address belongs to the physical page: [ 14.871006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.871574] flags: 0x200000000000000(node=0|zone=2) [ 14.871820] page_type: f5(slab) [ 14.871951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.872201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.872703] page dumped because: kasan: bad access detected [ 14.873095] [ 14.873515] Memory state around the buggy address: [ 14.874623] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.875170] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.875498] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.876093] ^ [ 14.876279] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877043] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877389] ================================================================== [ 15.152219] ================================================================== [ 15.152487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.152795] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.153164] [ 15.153331] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.153377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.153391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.153415] Call Trace: [ 15.153434] <TASK> [ 15.153452] dump_stack_lvl+0x73/0xb0 [ 15.153482] print_report+0xd1/0x610 [ 15.153505] ? __virt_addr_valid+0x1db/0x2d0 [ 15.153531] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.153553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.153576] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.153611] kasan_report+0x141/0x180 [ 15.153633] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.153661] kasan_check_range+0x10c/0x1c0 [ 15.153685] __kasan_check_write+0x18/0x20 [ 15.153705] kasan_atomics_helper+0xb6a/0x5450 [ 15.153729] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.153753] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.153779] ? kasan_atomics+0x152/0x310 [ 15.153807] kasan_atomics+0x1dc/0x310 [ 15.153841] ? __pfx_kasan_atomics+0x10/0x10 [ 15.153866] ? __pfx_read_tsc+0x10/0x10 [ 15.153888] ? ktime_get_ts64+0x86/0x230 [ 15.153914] kunit_try_run_case+0x1a5/0x480 [ 15.153941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.153963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.153989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.154014] ? __kthread_parkme+0x82/0x180 [ 15.154036] ? preempt_count_sub+0x50/0x80 [ 15.154071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.154096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.154121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.154146] kthread+0x337/0x6f0 [ 15.154165] ? trace_preempt_on+0x20/0xc0 [ 15.154190] ? __pfx_kthread+0x10/0x10 [ 15.154215] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.154238] ? calculate_sigpending+0x7b/0xa0 [ 15.154262] ? __pfx_kthread+0x10/0x10 [ 15.154284] ret_from_fork+0x116/0x1d0 [ 15.154304] ? __pfx_kthread+0x10/0x10 [ 15.154325] ret_from_fork_asm+0x1a/0x30 [ 15.154359] </TASK> [ 15.154370] [ 15.161995] Allocated by task 282: [ 15.162296] kasan_save_stack+0x45/0x70 [ 15.162503] kasan_save_track+0x18/0x40 [ 15.162841] kasan_save_alloc_info+0x3b/0x50 [ 15.163062] __kasan_kmalloc+0xb7/0xc0 [ 15.163250] __kmalloc_cache_noprof+0x189/0x420 [ 15.163504] kasan_atomics+0x95/0x310 [ 15.163772] kunit_try_run_case+0x1a5/0x480 [ 15.163922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.164418] kthread+0x337/0x6f0 [ 15.164648] ret_from_fork+0x116/0x1d0 [ 15.164803] ret_from_fork_asm+0x1a/0x30 [ 15.165088] [ 15.165173] The buggy address belongs to the object at ffff8881026ce080 [ 15.165173] which belongs to the cache kmalloc-64 of size 64 [ 15.165676] The buggy address is located 0 bytes to the right of [ 15.165676] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.166047] [ 15.166134] The buggy address belongs to the physical page: [ 15.166480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.167061] flags: 0x200000000000000(node=0|zone=2) [ 15.167377] page_type: f5(slab) [ 15.167549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.167935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.168224] page dumped because: kasan: bad access detected [ 15.168517] [ 15.168588] Memory state around the buggy address: [ 15.168809] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.169120] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.169339] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.169557] ^ [ 15.169715] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.169935] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.170252] ================================================================== [ 16.097798] ================================================================== [ 16.098203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.098582] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.099128] [ 16.099250] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.099293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.099305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.099329] Call Trace: [ 16.099343] <TASK> [ 16.099359] dump_stack_lvl+0x73/0xb0 [ 16.099388] print_report+0xd1/0x610 [ 16.099411] ? __virt_addr_valid+0x1db/0x2d0 [ 16.099434] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.099456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.099479] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.099502] kasan_report+0x141/0x180 [ 16.099524] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.099553] kasan_check_range+0x10c/0x1c0 [ 16.099577] __kasan_check_write+0x18/0x20 [ 16.099598] kasan_atomics_helper+0x20c8/0x5450 [ 16.099649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.099676] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.099717] ? kasan_atomics+0x152/0x310 [ 16.099746] kasan_atomics+0x1dc/0x310 [ 16.099787] ? __pfx_kasan_atomics+0x10/0x10 [ 16.099812] ? __pfx_read_tsc+0x10/0x10 [ 16.099834] ? ktime_get_ts64+0x86/0x230 [ 16.099860] kunit_try_run_case+0x1a5/0x480 [ 16.099887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.099910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.099950] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.099975] ? __kthread_parkme+0x82/0x180 [ 16.099995] ? preempt_count_sub+0x50/0x80 [ 16.100021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.100045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.100080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.100105] kthread+0x337/0x6f0 [ 16.100126] ? trace_preempt_on+0x20/0xc0 [ 16.100150] ? __pfx_kthread+0x10/0x10 [ 16.100172] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.100197] ? calculate_sigpending+0x7b/0xa0 [ 16.100239] ? __pfx_kthread+0x10/0x10 [ 16.100262] ret_from_fork+0x116/0x1d0 [ 16.100282] ? __pfx_kthread+0x10/0x10 [ 16.100303] ret_from_fork_asm+0x1a/0x30 [ 16.100337] </TASK> [ 16.100347] [ 16.107863] Allocated by task 282: [ 16.107991] kasan_save_stack+0x45/0x70 [ 16.108149] kasan_save_track+0x18/0x40 [ 16.108530] kasan_save_alloc_info+0x3b/0x50 [ 16.108774] __kasan_kmalloc+0xb7/0xc0 [ 16.108962] __kmalloc_cache_noprof+0x189/0x420 [ 16.109157] kasan_atomics+0x95/0x310 [ 16.109292] kunit_try_run_case+0x1a5/0x480 [ 16.109439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.109616] kthread+0x337/0x6f0 [ 16.109823] ret_from_fork+0x116/0x1d0 [ 16.110138] ret_from_fork_asm+0x1a/0x30 [ 16.110360] [ 16.110459] The buggy address belongs to the object at ffff8881026ce080 [ 16.110459] which belongs to the cache kmalloc-64 of size 64 [ 16.111296] The buggy address is located 0 bytes to the right of [ 16.111296] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.111898] [ 16.111975] The buggy address belongs to the physical page: [ 16.112163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.112524] flags: 0x200000000000000(node=0|zone=2) [ 16.112868] page_type: f5(slab) [ 16.113061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.113348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.113710] page dumped because: kasan: bad access detected [ 16.113952] [ 16.114047] Memory state around the buggy address: [ 16.114265] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.114539] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.114760] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.115714] ^ [ 16.115960] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.116308] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.116581] ================================================================== [ 15.802378] ================================================================== [ 15.802761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.803123] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.803519] [ 15.803696] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.803767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.803778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.803803] Call Trace: [ 15.803823] <TASK> [ 15.803846] dump_stack_lvl+0x73/0xb0 [ 15.803878] print_report+0xd1/0x610 [ 15.803903] ? __virt_addr_valid+0x1db/0x2d0 [ 15.803927] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.803950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.803972] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.803995] kasan_report+0x141/0x180 [ 15.804018] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.804045] kasan_check_range+0x10c/0x1c0 [ 15.804108] __kasan_check_write+0x18/0x20 [ 15.804128] kasan_atomics_helper+0x18b1/0x5450 [ 15.804151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.804175] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.804201] ? kasan_atomics+0x152/0x310 [ 15.804229] kasan_atomics+0x1dc/0x310 [ 15.804252] ? __pfx_kasan_atomics+0x10/0x10 [ 15.804276] ? __pfx_read_tsc+0x10/0x10 [ 15.804298] ? ktime_get_ts64+0x86/0x230 [ 15.804324] kunit_try_run_case+0x1a5/0x480 [ 15.804352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.804375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.804401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.804425] ? __kthread_parkme+0x82/0x180 [ 15.804447] ? preempt_count_sub+0x50/0x80 [ 15.804472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.804497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.804547] kthread+0x337/0x6f0 [ 15.804566] ? trace_preempt_on+0x20/0xc0 [ 15.804640] ? __pfx_kthread+0x10/0x10 [ 15.804661] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.804706] ? calculate_sigpending+0x7b/0xa0 [ 15.804732] ? __pfx_kthread+0x10/0x10 [ 15.804754] ret_from_fork+0x116/0x1d0 [ 15.804774] ? __pfx_kthread+0x10/0x10 [ 15.804808] ret_from_fork_asm+0x1a/0x30 [ 15.804845] </TASK> [ 15.804857] [ 15.813168] Allocated by task 282: [ 15.813404] kasan_save_stack+0x45/0x70 [ 15.813677] kasan_save_track+0x18/0x40 [ 15.813861] kasan_save_alloc_info+0x3b/0x50 [ 15.814068] __kasan_kmalloc+0xb7/0xc0 [ 15.814272] __kmalloc_cache_noprof+0x189/0x420 [ 15.814492] kasan_atomics+0x95/0x310 [ 15.814723] kunit_try_run_case+0x1a5/0x480 [ 15.814877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.815182] kthread+0x337/0x6f0 [ 15.815357] ret_from_fork+0x116/0x1d0 [ 15.815546] ret_from_fork_asm+0x1a/0x30 [ 15.815821] [ 15.815929] The buggy address belongs to the object at ffff8881026ce080 [ 15.815929] which belongs to the cache kmalloc-64 of size 64 [ 15.816367] The buggy address is located 0 bytes to the right of [ 15.816367] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.816867] [ 15.817015] The buggy address belongs to the physical page: [ 15.817284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.817642] flags: 0x200000000000000(node=0|zone=2) [ 15.817979] page_type: f5(slab) [ 15.818153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.818528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.818789] page dumped because: kasan: bad access detected [ 15.818983] [ 15.819087] Memory state around the buggy address: [ 15.819361] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819712] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.820136] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.820487] ^ [ 15.820707] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820929] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.821302] ================================================================== [ 15.439645] ================================================================== [ 15.440399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.440762] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.441579] [ 15.441776] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.441836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.441930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.441956] Call Trace: [ 15.441973] <TASK> [ 15.441992] dump_stack_lvl+0x73/0xb0 [ 15.442023] print_report+0xd1/0x610 [ 15.442047] ? __virt_addr_valid+0x1db/0x2d0 [ 15.442082] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.442105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.442128] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.442151] kasan_report+0x141/0x180 [ 15.442174] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.442207] __asan_report_load4_noabort+0x18/0x20 [ 15.442232] kasan_atomics_helper+0x4a02/0x5450 [ 15.442256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.442279] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.442305] ? kasan_atomics+0x152/0x310 [ 15.442333] kasan_atomics+0x1dc/0x310 [ 15.442356] ? __pfx_kasan_atomics+0x10/0x10 [ 15.442381] ? __pfx_read_tsc+0x10/0x10 [ 15.442402] ? ktime_get_ts64+0x86/0x230 [ 15.442428] kunit_try_run_case+0x1a5/0x480 [ 15.442452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442475] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.442500] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.442525] ? __kthread_parkme+0x82/0x180 [ 15.442545] ? preempt_count_sub+0x50/0x80 [ 15.442571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.442630] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.442655] kthread+0x337/0x6f0 [ 15.442674] ? trace_preempt_on+0x20/0xc0 [ 15.442699] ? __pfx_kthread+0x10/0x10 [ 15.442720] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.442742] ? calculate_sigpending+0x7b/0xa0 [ 15.442767] ? __pfx_kthread+0x10/0x10 [ 15.442789] ret_from_fork+0x116/0x1d0 [ 15.442808] ? __pfx_kthread+0x10/0x10 [ 15.442828] ret_from_fork_asm+0x1a/0x30 [ 15.442863] </TASK> [ 15.442873] [ 15.456378] Allocated by task 282: [ 15.456588] kasan_save_stack+0x45/0x70 [ 15.456731] kasan_save_track+0x18/0x40 [ 15.457180] kasan_save_alloc_info+0x3b/0x50 [ 15.457595] __kasan_kmalloc+0xb7/0xc0 [ 15.458117] __kmalloc_cache_noprof+0x189/0x420 [ 15.458596] kasan_atomics+0x95/0x310 [ 15.458959] kunit_try_run_case+0x1a5/0x480 [ 15.459144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.459659] kthread+0x337/0x6f0 [ 15.460062] ret_from_fork+0x116/0x1d0 [ 15.460231] ret_from_fork_asm+0x1a/0x30 [ 15.460600] [ 15.460835] The buggy address belongs to the object at ffff8881026ce080 [ 15.460835] which belongs to the cache kmalloc-64 of size 64 [ 15.461817] The buggy address is located 0 bytes to the right of [ 15.461817] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.462352] [ 15.462428] The buggy address belongs to the physical page: [ 15.462613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.463456] flags: 0x200000000000000(node=0|zone=2) [ 15.463964] page_type: f5(slab) [ 15.464338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.465126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.465794] page dumped because: kasan: bad access detected [ 15.466372] [ 15.466550] Memory state around the buggy address: [ 15.466951] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.467327] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.467878] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.468114] ^ [ 15.468643] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.469062] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.469803] ================================================================== [ 16.060103] ================================================================== [ 16.060811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.061200] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.061505] [ 16.061594] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.061636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.061648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.061670] Call Trace: [ 16.061685] <TASK> [ 16.061700] dump_stack_lvl+0x73/0xb0 [ 16.061728] print_report+0xd1/0x610 [ 16.061750] ? __virt_addr_valid+0x1db/0x2d0 [ 16.061773] ? kasan_atomics_helper+0x2006/0x5450 [ 16.061795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.061833] ? kasan_atomics_helper+0x2006/0x5450 [ 16.061856] kasan_report+0x141/0x180 [ 16.061905] ? kasan_atomics_helper+0x2006/0x5450 [ 16.061934] kasan_check_range+0x10c/0x1c0 [ 16.061970] __kasan_check_write+0x18/0x20 [ 16.061990] kasan_atomics_helper+0x2006/0x5450 [ 16.062014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.062037] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.062075] ? kasan_atomics+0x152/0x310 [ 16.062102] kasan_atomics+0x1dc/0x310 [ 16.062126] ? __pfx_kasan_atomics+0x10/0x10 [ 16.062150] ? __pfx_read_tsc+0x10/0x10 [ 16.062172] ? ktime_get_ts64+0x86/0x230 [ 16.062202] kunit_try_run_case+0x1a5/0x480 [ 16.062228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.062270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.062296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.062320] ? __kthread_parkme+0x82/0x180 [ 16.062341] ? preempt_count_sub+0x50/0x80 [ 16.062366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.062391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.062415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.062440] kthread+0x337/0x6f0 [ 16.062460] ? trace_preempt_on+0x20/0xc0 [ 16.062484] ? __pfx_kthread+0x10/0x10 [ 16.062505] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.062527] ? calculate_sigpending+0x7b/0xa0 [ 16.062552] ? __pfx_kthread+0x10/0x10 [ 16.062574] ret_from_fork+0x116/0x1d0 [ 16.062593] ? __pfx_kthread+0x10/0x10 [ 16.062614] ret_from_fork_asm+0x1a/0x30 [ 16.062646] </TASK> [ 16.062656] [ 16.070635] Allocated by task 282: [ 16.070821] kasan_save_stack+0x45/0x70 [ 16.071041] kasan_save_track+0x18/0x40 [ 16.071239] kasan_save_alloc_info+0x3b/0x50 [ 16.071423] __kasan_kmalloc+0xb7/0xc0 [ 16.071557] __kmalloc_cache_noprof+0x189/0x420 [ 16.071733] kasan_atomics+0x95/0x310 [ 16.071921] kunit_try_run_case+0x1a5/0x480 [ 16.072192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.072389] kthread+0x337/0x6f0 [ 16.072514] ret_from_fork+0x116/0x1d0 [ 16.072649] ret_from_fork_asm+0x1a/0x30 [ 16.072848] [ 16.072947] The buggy address belongs to the object at ffff8881026ce080 [ 16.072947] which belongs to the cache kmalloc-64 of size 64 [ 16.073497] The buggy address is located 0 bytes to the right of [ 16.073497] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.074040] [ 16.074126] The buggy address belongs to the physical page: [ 16.074381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.074987] flags: 0x200000000000000(node=0|zone=2) [ 16.075225] page_type: f5(slab) [ 16.075373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.075748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.076013] page dumped because: kasan: bad access detected [ 16.076198] [ 16.076268] Memory state around the buggy address: [ 16.076490] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.077094] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077390] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.077641] ^ [ 16.077864] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.078188] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.078425] ================================================================== [ 16.135404] ================================================================== [ 16.136206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.136780] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.137120] [ 16.137261] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.137309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.137320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.137362] Call Trace: [ 16.137382] <TASK> [ 16.137401] dump_stack_lvl+0x73/0xb0 [ 16.137431] print_report+0xd1/0x610 [ 16.137454] ? __virt_addr_valid+0x1db/0x2d0 [ 16.137478] ? kasan_atomics_helper+0x218a/0x5450 [ 16.137500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.137524] ? kasan_atomics_helper+0x218a/0x5450 [ 16.137546] kasan_report+0x141/0x180 [ 16.137569] ? kasan_atomics_helper+0x218a/0x5450 [ 16.137597] kasan_check_range+0x10c/0x1c0 [ 16.137622] __kasan_check_write+0x18/0x20 [ 16.137642] kasan_atomics_helper+0x218a/0x5450 [ 16.137666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.137689] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.137715] ? kasan_atomics+0x152/0x310 [ 16.137743] kasan_atomics+0x1dc/0x310 [ 16.137766] ? __pfx_kasan_atomics+0x10/0x10 [ 16.137791] ? __pfx_read_tsc+0x10/0x10 [ 16.137812] ? ktime_get_ts64+0x86/0x230 [ 16.137838] kunit_try_run_case+0x1a5/0x480 [ 16.137864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.137887] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.137914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.137938] ? __kthread_parkme+0x82/0x180 [ 16.137959] ? preempt_count_sub+0x50/0x80 [ 16.137986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.138032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.138066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.138091] kthread+0x337/0x6f0 [ 16.138111] ? trace_preempt_on+0x20/0xc0 [ 16.138135] ? __pfx_kthread+0x10/0x10 [ 16.138157] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.138179] ? calculate_sigpending+0x7b/0xa0 [ 16.138209] ? __pfx_kthread+0x10/0x10 [ 16.138232] ret_from_fork+0x116/0x1d0 [ 16.138251] ? __pfx_kthread+0x10/0x10 [ 16.138272] ret_from_fork_asm+0x1a/0x30 [ 16.138304] </TASK> [ 16.138315] [ 16.145917] Allocated by task 282: [ 16.146128] kasan_save_stack+0x45/0x70 [ 16.146313] kasan_save_track+0x18/0x40 [ 16.146453] kasan_save_alloc_info+0x3b/0x50 [ 16.146637] __kasan_kmalloc+0xb7/0xc0 [ 16.146815] __kmalloc_cache_noprof+0x189/0x420 [ 16.147025] kasan_atomics+0x95/0x310 [ 16.147233] kunit_try_run_case+0x1a5/0x480 [ 16.147435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.147704] kthread+0x337/0x6f0 [ 16.147867] ret_from_fork+0x116/0x1d0 [ 16.148067] ret_from_fork_asm+0x1a/0x30 [ 16.148265] [ 16.148339] The buggy address belongs to the object at ffff8881026ce080 [ 16.148339] which belongs to the cache kmalloc-64 of size 64 [ 16.148822] The buggy address is located 0 bytes to the right of [ 16.148822] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.149252] [ 16.149358] The buggy address belongs to the physical page: [ 16.149663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.150057] flags: 0x200000000000000(node=0|zone=2) [ 16.150305] page_type: f5(slab) [ 16.150480] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.150774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.151010] page dumped because: kasan: bad access detected [ 16.151198] [ 16.151269] Memory state around the buggy address: [ 16.151528] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.151889] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.152234] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.152615] ^ [ 16.152876] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.153209] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.153512] ================================================================== [ 15.652730] ================================================================== [ 15.653155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.653471] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.654193] [ 15.654558] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.654610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.654634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.654658] Call Trace: [ 15.654675] <TASK> [ 15.654723] dump_stack_lvl+0x73/0xb0 [ 15.654757] print_report+0xd1/0x610 [ 15.654780] ? __virt_addr_valid+0x1db/0x2d0 [ 15.654805] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.654831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.654858] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.654882] kasan_report+0x141/0x180 [ 15.654905] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.654933] __asan_report_store8_noabort+0x1b/0x30 [ 15.654959] kasan_atomics_helper+0x50d4/0x5450 [ 15.654982] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.655005] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.655031] ? kasan_atomics+0x152/0x310 [ 15.655069] kasan_atomics+0x1dc/0x310 [ 15.655093] ? __pfx_kasan_atomics+0x10/0x10 [ 15.655118] ? __pfx_read_tsc+0x10/0x10 [ 15.655139] ? ktime_get_ts64+0x86/0x230 [ 15.655165] kunit_try_run_case+0x1a5/0x480 [ 15.655190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.655213] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.655239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.655264] ? __kthread_parkme+0x82/0x180 [ 15.655286] ? preempt_count_sub+0x50/0x80 [ 15.655311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.655336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.655360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.655386] kthread+0x337/0x6f0 [ 15.655407] ? trace_preempt_on+0x20/0xc0 [ 15.655431] ? __pfx_kthread+0x10/0x10 [ 15.655452] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.655475] ? calculate_sigpending+0x7b/0xa0 [ 15.655500] ? __pfx_kthread+0x10/0x10 [ 15.655522] ret_from_fork+0x116/0x1d0 [ 15.655541] ? __pfx_kthread+0x10/0x10 [ 15.655563] ret_from_fork_asm+0x1a/0x30 [ 15.655609] </TASK> [ 15.655619] [ 15.667239] Allocated by task 282: [ 15.667413] kasan_save_stack+0x45/0x70 [ 15.667816] kasan_save_track+0x18/0x40 [ 15.668083] kasan_save_alloc_info+0x3b/0x50 [ 15.668429] __kasan_kmalloc+0xb7/0xc0 [ 15.668746] __kmalloc_cache_noprof+0x189/0x420 [ 15.669113] kasan_atomics+0x95/0x310 [ 15.669303] kunit_try_run_case+0x1a5/0x480 [ 15.669498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.670209] kthread+0x337/0x6f0 [ 15.670486] ret_from_fork+0x116/0x1d0 [ 15.670925] ret_from_fork_asm+0x1a/0x30 [ 15.671157] [ 15.671254] The buggy address belongs to the object at ffff8881026ce080 [ 15.671254] which belongs to the cache kmalloc-64 of size 64 [ 15.672075] The buggy address is located 0 bytes to the right of [ 15.672075] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.673026] [ 15.673142] The buggy address belongs to the physical page: [ 15.673607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.674174] flags: 0x200000000000000(node=0|zone=2) [ 15.674609] page_type: f5(slab) [ 15.674864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.675343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.675907] page dumped because: kasan: bad access detected [ 15.676245] [ 15.676488] Memory state around the buggy address: [ 15.676865] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.677178] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.677473] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.678221] ^ [ 15.678512] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.679177] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.679647] ================================================================== [ 15.936949] ================================================================== [ 15.937291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.937529] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.938217] [ 15.938317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.938374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.938387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.938410] Call Trace: [ 15.938440] <TASK> [ 15.938458] dump_stack_lvl+0x73/0xb0 [ 15.938490] print_report+0xd1/0x610 [ 15.938512] ? __virt_addr_valid+0x1db/0x2d0 [ 15.938535] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.938558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.938581] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.938616] kasan_report+0x141/0x180 [ 15.938639] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.938667] kasan_check_range+0x10c/0x1c0 [ 15.938691] __kasan_check_write+0x18/0x20 [ 15.938711] kasan_atomics_helper+0x1ce1/0x5450 [ 15.938735] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.938758] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.938784] ? kasan_atomics+0x152/0x310 [ 15.938813] kasan_atomics+0x1dc/0x310 [ 15.938837] ? __pfx_kasan_atomics+0x10/0x10 [ 15.938861] ? __pfx_read_tsc+0x10/0x10 [ 15.938882] ? ktime_get_ts64+0x86/0x230 [ 15.938908] kunit_try_run_case+0x1a5/0x480 [ 15.938933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.938956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.938982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.939007] ? __kthread_parkme+0x82/0x180 [ 15.939028] ? preempt_count_sub+0x50/0x80 [ 15.939064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.939090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.939139] kthread+0x337/0x6f0 [ 15.939159] ? trace_preempt_on+0x20/0xc0 [ 15.939182] ? __pfx_kthread+0x10/0x10 [ 15.939204] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.939226] ? calculate_sigpending+0x7b/0xa0 [ 15.939251] ? __pfx_kthread+0x10/0x10 [ 15.939273] ret_from_fork+0x116/0x1d0 [ 15.939292] ? __pfx_kthread+0x10/0x10 [ 15.939314] ret_from_fork_asm+0x1a/0x30 [ 15.939347] </TASK> [ 15.939358] [ 15.950165] Allocated by task 282: [ 15.950543] kasan_save_stack+0x45/0x70 [ 15.950773] kasan_save_track+0x18/0x40 [ 15.951075] kasan_save_alloc_info+0x3b/0x50 [ 15.951244] __kasan_kmalloc+0xb7/0xc0 [ 15.951554] __kmalloc_cache_noprof+0x189/0x420 [ 15.951934] kasan_atomics+0x95/0x310 [ 15.952215] kunit_try_run_case+0x1a5/0x480 [ 15.952505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.952876] kthread+0x337/0x6f0 [ 15.953114] ret_from_fork+0x116/0x1d0 [ 15.953392] ret_from_fork_asm+0x1a/0x30 [ 15.953552] [ 15.953664] The buggy address belongs to the object at ffff8881026ce080 [ 15.953664] which belongs to the cache kmalloc-64 of size 64 [ 15.954448] The buggy address is located 0 bytes to the right of [ 15.954448] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.955064] [ 15.955140] The buggy address belongs to the physical page: [ 15.955420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.955846] flags: 0x200000000000000(node=0|zone=2) [ 15.956025] page_type: f5(slab) [ 15.956205] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.956507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.956897] page dumped because: kasan: bad access detected [ 15.957152] [ 15.957249] Memory state around the buggy address: [ 15.957466] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.957773] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.958068] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.958382] ^ [ 15.958650] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.958888] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.959209] ================================================================== [ 15.717763] ================================================================== [ 15.718261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.718606] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.718862] [ 15.718955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.719001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.719013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.719036] Call Trace: [ 15.719066] <TASK> [ 15.719085] dump_stack_lvl+0x73/0xb0 [ 15.719126] print_report+0xd1/0x610 [ 15.719149] ? __virt_addr_valid+0x1db/0x2d0 [ 15.719184] ? kasan_atomics_helper+0x164f/0x5450 [ 15.719206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.719229] ? kasan_atomics_helper+0x164f/0x5450 [ 15.719253] kasan_report+0x141/0x180 [ 15.719275] ? kasan_atomics_helper+0x164f/0x5450 [ 15.719304] kasan_check_range+0x10c/0x1c0 [ 15.719329] __kasan_check_write+0x18/0x20 [ 15.719349] kasan_atomics_helper+0x164f/0x5450 [ 15.719373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.719396] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.719422] ? kasan_atomics+0x152/0x310 [ 15.719451] kasan_atomics+0x1dc/0x310 [ 15.719474] ? __pfx_kasan_atomics+0x10/0x10 [ 15.719499] ? __pfx_read_tsc+0x10/0x10 [ 15.719521] ? ktime_get_ts64+0x86/0x230 [ 15.719547] kunit_try_run_case+0x1a5/0x480 [ 15.719573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.719596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.719623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.719657] ? __kthread_parkme+0x82/0x180 [ 15.719679] ? preempt_count_sub+0x50/0x80 [ 15.719715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.719749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.719775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.719801] kthread+0x337/0x6f0 [ 15.719831] ? trace_preempt_on+0x20/0xc0 [ 15.719856] ? __pfx_kthread+0x10/0x10 [ 15.719888] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.719920] ? calculate_sigpending+0x7b/0xa0 [ 15.719945] ? __pfx_kthread+0x10/0x10 [ 15.719978] ret_from_fork+0x116/0x1d0 [ 15.719998] ? __pfx_kthread+0x10/0x10 [ 15.720019] ret_from_fork_asm+0x1a/0x30 [ 15.720062] </TASK> [ 15.720073] [ 15.730493] Allocated by task 282: [ 15.730673] kasan_save_stack+0x45/0x70 [ 15.730837] kasan_save_track+0x18/0x40 [ 15.731132] kasan_save_alloc_info+0x3b/0x50 [ 15.731348] __kasan_kmalloc+0xb7/0xc0 [ 15.731484] __kmalloc_cache_noprof+0x189/0x420 [ 15.731869] kasan_atomics+0x95/0x310 [ 15.732069] kunit_try_run_case+0x1a5/0x480 [ 15.732220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.732471] kthread+0x337/0x6f0 [ 15.732722] ret_from_fork+0x116/0x1d0 [ 15.732886] ret_from_fork_asm+0x1a/0x30 [ 15.733033] [ 15.733141] The buggy address belongs to the object at ffff8881026ce080 [ 15.733141] which belongs to the cache kmalloc-64 of size 64 [ 15.733733] The buggy address is located 0 bytes to the right of [ 15.733733] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.734276] [ 15.734390] The buggy address belongs to the physical page: [ 15.734672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.735026] flags: 0x200000000000000(node=0|zone=2) [ 15.735270] page_type: f5(slab) [ 15.735438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.735783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.736110] page dumped because: kasan: bad access detected [ 15.736334] [ 15.736405] Memory state around the buggy address: [ 15.736561] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.736878] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.737227] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.737472] ^ [ 15.737680] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.738079] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.738436] ================================================================== [ 15.623004] ================================================================== [ 15.623344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.623736] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.624585] [ 15.625244] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.625311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.625325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.625349] Call Trace: [ 15.625363] <TASK> [ 15.625413] dump_stack_lvl+0x73/0xb0 [ 15.625446] print_report+0xd1/0x610 [ 15.625468] ? __virt_addr_valid+0x1db/0x2d0 [ 15.625490] ? kasan_atomics_helper+0x1467/0x5450 [ 15.625514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.625540] ? kasan_atomics_helper+0x1467/0x5450 [ 15.625565] kasan_report+0x141/0x180 [ 15.625588] ? kasan_atomics_helper+0x1467/0x5450 [ 15.625616] kasan_check_range+0x10c/0x1c0 [ 15.625641] __kasan_check_write+0x18/0x20 [ 15.625661] kasan_atomics_helper+0x1467/0x5450 [ 15.625684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.625708] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.625734] ? kasan_atomics+0x152/0x310 [ 15.625762] kasan_atomics+0x1dc/0x310 [ 15.625784] ? __pfx_kasan_atomics+0x10/0x10 [ 15.625810] ? __pfx_read_tsc+0x10/0x10 [ 15.625830] ? ktime_get_ts64+0x86/0x230 [ 15.625856] kunit_try_run_case+0x1a5/0x480 [ 15.625881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.625904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.625929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.625954] ? __kthread_parkme+0x82/0x180 [ 15.625974] ? preempt_count_sub+0x50/0x80 [ 15.625999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.626024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.626059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.626085] kthread+0x337/0x6f0 [ 15.626105] ? trace_preempt_on+0x20/0xc0 [ 15.626129] ? __pfx_kthread+0x10/0x10 [ 15.626151] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.626173] ? calculate_sigpending+0x7b/0xa0 [ 15.626201] ? __pfx_kthread+0x10/0x10 [ 15.626224] ret_from_fork+0x116/0x1d0 [ 15.626243] ? __pfx_kthread+0x10/0x10 [ 15.626264] ret_from_fork_asm+0x1a/0x30 [ 15.626296] </TASK> [ 15.626308] [ 15.638962] Allocated by task 282: [ 15.639151] kasan_save_stack+0x45/0x70 [ 15.639343] kasan_save_track+0x18/0x40 [ 15.639526] kasan_save_alloc_info+0x3b/0x50 [ 15.640235] __kasan_kmalloc+0xb7/0xc0 [ 15.640506] __kmalloc_cache_noprof+0x189/0x420 [ 15.640919] kasan_atomics+0x95/0x310 [ 15.641252] kunit_try_run_case+0x1a5/0x480 [ 15.641716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.642133] kthread+0x337/0x6f0 [ 15.642300] ret_from_fork+0x116/0x1d0 [ 15.642480] ret_from_fork_asm+0x1a/0x30 [ 15.642876] [ 15.643125] The buggy address belongs to the object at ffff8881026ce080 [ 15.643125] which belongs to the cache kmalloc-64 of size 64 [ 15.643842] The buggy address is located 0 bytes to the right of [ 15.643842] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.644388] [ 15.644482] The buggy address belongs to the physical page: [ 15.645162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.645827] flags: 0x200000000000000(node=0|zone=2) [ 15.646149] page_type: f5(slab) [ 15.646471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.647183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.647705] page dumped because: kasan: bad access detected [ 15.648167] [ 15.648401] Memory state around the buggy address: [ 15.648784] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.649187] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.649484] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.650285] ^ [ 15.650604] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.651151] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.651447] ================================================================== [ 15.978320] ================================================================== [ 15.978769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.979093] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.979447] [ 15.979545] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.979592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.979604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.979629] Call Trace: [ 15.979649] <TASK> [ 15.979671] dump_stack_lvl+0x73/0xb0 [ 15.979715] print_report+0xd1/0x610 [ 15.979739] ? __virt_addr_valid+0x1db/0x2d0 [ 15.979764] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.979798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.979822] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.979845] kasan_report+0x141/0x180 [ 15.979869] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.979898] kasan_check_range+0x10c/0x1c0 [ 15.979923] __kasan_check_write+0x18/0x20 [ 15.979943] kasan_atomics_helper+0x1e12/0x5450 [ 15.979968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.979992] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.980019] ? kasan_atomics+0x152/0x310 [ 15.980048] kasan_atomics+0x1dc/0x310 [ 15.980079] ? __pfx_kasan_atomics+0x10/0x10 [ 15.980105] ? __pfx_read_tsc+0x10/0x10 [ 15.980127] ? ktime_get_ts64+0x86/0x230 [ 15.980154] kunit_try_run_case+0x1a5/0x480 [ 15.980180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.980204] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.980232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.980256] ? __kthread_parkme+0x82/0x180 [ 15.980279] ? preempt_count_sub+0x50/0x80 [ 15.980305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.980339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.980365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.980390] kthread+0x337/0x6f0 [ 15.980421] ? trace_preempt_on+0x20/0xc0 [ 15.980447] ? __pfx_kthread+0x10/0x10 [ 15.980468] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.980490] ? calculate_sigpending+0x7b/0xa0 [ 15.980526] ? __pfx_kthread+0x10/0x10 [ 15.980549] ret_from_fork+0x116/0x1d0 [ 15.980568] ? __pfx_kthread+0x10/0x10 [ 15.980599] ret_from_fork_asm+0x1a/0x30 [ 15.980634] </TASK> [ 15.980644] [ 15.988678] Allocated by task 282: [ 15.988865] kasan_save_stack+0x45/0x70 [ 15.989075] kasan_save_track+0x18/0x40 [ 15.989274] kasan_save_alloc_info+0x3b/0x50 [ 15.989466] __kasan_kmalloc+0xb7/0xc0 [ 15.989625] __kmalloc_cache_noprof+0x189/0x420 [ 15.989882] kasan_atomics+0x95/0x310 [ 15.990065] kunit_try_run_case+0x1a5/0x480 [ 15.990279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.990563] kthread+0x337/0x6f0 [ 15.990731] ret_from_fork+0x116/0x1d0 [ 15.990871] ret_from_fork_asm+0x1a/0x30 [ 15.991015] [ 15.991098] The buggy address belongs to the object at ffff8881026ce080 [ 15.991098] which belongs to the cache kmalloc-64 of size 64 [ 15.991462] The buggy address is located 0 bytes to the right of [ 15.991462] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.992192] [ 15.992421] The buggy address belongs to the physical page: [ 15.992771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.993215] flags: 0x200000000000000(node=0|zone=2) [ 15.993495] page_type: f5(slab) [ 15.993649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.993936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.994225] page dumped because: kasan: bad access detected [ 15.994429] [ 15.994513] Memory state around the buggy address: [ 15.994708] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.994967] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.995240] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.995764] ^ [ 15.995981] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.996215] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.996436] ================================================================== [ 15.014684] ================================================================== [ 15.015259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.015762] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.016192] [ 15.016493] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.016541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.016574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.016599] Call Trace: [ 15.016619] <TASK> [ 15.016639] dump_stack_lvl+0x73/0xb0 [ 15.016671] print_report+0xd1/0x610 [ 15.016693] ? __virt_addr_valid+0x1db/0x2d0 [ 15.016718] ? kasan_atomics_helper+0x860/0x5450 [ 15.016740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.016764] ? kasan_atomics_helper+0x860/0x5450 [ 15.016786] kasan_report+0x141/0x180 [ 15.016810] ? kasan_atomics_helper+0x860/0x5450 [ 15.016838] kasan_check_range+0x10c/0x1c0 [ 15.016862] __kasan_check_write+0x18/0x20 [ 15.016882] kasan_atomics_helper+0x860/0x5450 [ 15.016906] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.016929] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.016956] ? kasan_atomics+0x152/0x310 [ 15.016984] kasan_atomics+0x1dc/0x310 [ 15.017007] ? __pfx_kasan_atomics+0x10/0x10 [ 15.017032] ? __pfx_read_tsc+0x10/0x10 [ 15.017066] ? ktime_get_ts64+0x86/0x230 [ 15.017092] kunit_try_run_case+0x1a5/0x480 [ 15.017119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.017142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.017168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.017192] ? __kthread_parkme+0x82/0x180 [ 15.017214] ? preempt_count_sub+0x50/0x80 [ 15.017240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.017266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.017292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.017317] kthread+0x337/0x6f0 [ 15.017337] ? trace_preempt_on+0x20/0xc0 [ 15.017361] ? __pfx_kthread+0x10/0x10 [ 15.017382] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.017404] ? calculate_sigpending+0x7b/0xa0 [ 15.017429] ? __pfx_kthread+0x10/0x10 [ 15.017451] ret_from_fork+0x116/0x1d0 [ 15.017471] ? __pfx_kthread+0x10/0x10 [ 15.017492] ret_from_fork_asm+0x1a/0x30 [ 15.017525] </TASK> [ 15.017536] [ 15.025933] Allocated by task 282: [ 15.026169] kasan_save_stack+0x45/0x70 [ 15.026369] kasan_save_track+0x18/0x40 [ 15.026521] kasan_save_alloc_info+0x3b/0x50 [ 15.026897] __kasan_kmalloc+0xb7/0xc0 [ 15.027077] __kmalloc_cache_noprof+0x189/0x420 [ 15.027236] kasan_atomics+0x95/0x310 [ 15.027371] kunit_try_run_case+0x1a5/0x480 [ 15.027553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.027784] kthread+0x337/0x6f0 [ 15.027972] ret_from_fork+0x116/0x1d0 [ 15.028207] ret_from_fork_asm+0x1a/0x30 [ 15.028368] [ 15.028461] The buggy address belongs to the object at ffff8881026ce080 [ 15.028461] which belongs to the cache kmalloc-64 of size 64 [ 15.029014] The buggy address is located 0 bytes to the right of [ 15.029014] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.029622] [ 15.029721] The buggy address belongs to the physical page: [ 15.029975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.030412] flags: 0x200000000000000(node=0|zone=2) [ 15.030764] page_type: f5(slab) [ 15.030888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.031132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.031363] page dumped because: kasan: bad access detected [ 15.031537] [ 15.031607] Memory state around the buggy address: [ 15.031821] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032492] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.033120] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.033471] ^ [ 15.033876] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034225] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034521] ================================================================== [ 15.698908] ================================================================== [ 15.699465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.699883] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.700224] [ 15.700321] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.700369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.700381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.700405] Call Trace: [ 15.700425] <TASK> [ 15.700443] dump_stack_lvl+0x73/0xb0 [ 15.700474] print_report+0xd1/0x610 [ 15.700497] ? __virt_addr_valid+0x1db/0x2d0 [ 15.700521] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.700544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.700578] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.700601] kasan_report+0x141/0x180 [ 15.700624] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.700654] kasan_check_range+0x10c/0x1c0 [ 15.700679] __kasan_check_write+0x18/0x20 [ 15.700699] kasan_atomics_helper+0x15b6/0x5450 [ 15.700723] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.700747] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.700773] ? kasan_atomics+0x152/0x310 [ 15.700802] kasan_atomics+0x1dc/0x310 [ 15.700826] ? __pfx_kasan_atomics+0x10/0x10 [ 15.700852] ? __pfx_read_tsc+0x10/0x10 [ 15.700874] ? ktime_get_ts64+0x86/0x230 [ 15.700900] kunit_try_run_case+0x1a5/0x480 [ 15.700926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.700949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.700976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.701000] ? __kthread_parkme+0x82/0x180 [ 15.701021] ? preempt_count_sub+0x50/0x80 [ 15.701046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.701108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.701132] kthread+0x337/0x6f0 [ 15.701156] ? trace_preempt_on+0x20/0xc0 [ 15.701181] ? __pfx_kthread+0x10/0x10 [ 15.701220] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.701252] ? calculate_sigpending+0x7b/0xa0 [ 15.701278] ? __pfx_kthread+0x10/0x10 [ 15.701301] ret_from_fork+0x116/0x1d0 [ 15.701331] ? __pfx_kthread+0x10/0x10 [ 15.701354] ret_from_fork_asm+0x1a/0x30 [ 15.701387] </TASK> [ 15.701397] [ 15.709229] Allocated by task 282: [ 15.709416] kasan_save_stack+0x45/0x70 [ 15.709615] kasan_save_track+0x18/0x40 [ 15.709861] kasan_save_alloc_info+0x3b/0x50 [ 15.710048] __kasan_kmalloc+0xb7/0xc0 [ 15.710193] __kmalloc_cache_noprof+0x189/0x420 [ 15.710355] kasan_atomics+0x95/0x310 [ 15.710489] kunit_try_run_case+0x1a5/0x480 [ 15.710765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.711029] kthread+0x337/0x6f0 [ 15.711222] ret_from_fork+0x116/0x1d0 [ 15.711451] ret_from_fork_asm+0x1a/0x30 [ 15.711742] [ 15.711841] The buggy address belongs to the object at ffff8881026ce080 [ 15.711841] which belongs to the cache kmalloc-64 of size 64 [ 15.712471] The buggy address is located 0 bytes to the right of [ 15.712471] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.713022] [ 15.713107] The buggy address belongs to the physical page: [ 15.713287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.713570] flags: 0x200000000000000(node=0|zone=2) [ 15.713823] page_type: f5(slab) [ 15.714021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.714403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.714748] page dumped because: kasan: bad access detected [ 15.714960] [ 15.715078] Memory state around the buggy address: [ 15.715315] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.715622] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.715927] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.716246] ^ [ 15.716447] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.716823] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.717114] ================================================================== [ 15.274213] ================================================================== [ 15.274510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.274899] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.275143] [ 15.275233] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.275278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.275289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.275313] Call Trace: [ 15.275332] <TASK> [ 15.275349] dump_stack_lvl+0x73/0xb0 [ 15.275379] print_report+0xd1/0x610 [ 15.275402] ? __virt_addr_valid+0x1db/0x2d0 [ 15.275426] ? kasan_atomics_helper+0xe78/0x5450 [ 15.275448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.275472] ? kasan_atomics_helper+0xe78/0x5450 [ 15.275495] kasan_report+0x141/0x180 [ 15.275518] ? kasan_atomics_helper+0xe78/0x5450 [ 15.275545] kasan_check_range+0x10c/0x1c0 [ 15.275570] __kasan_check_write+0x18/0x20 [ 15.275590] kasan_atomics_helper+0xe78/0x5450 [ 15.275614] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.275637] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.275663] ? kasan_atomics+0x152/0x310 [ 15.275691] kasan_atomics+0x1dc/0x310 [ 15.275714] ? __pfx_kasan_atomics+0x10/0x10 [ 15.275739] ? __pfx_read_tsc+0x10/0x10 [ 15.275761] ? ktime_get_ts64+0x86/0x230 [ 15.275787] kunit_try_run_case+0x1a5/0x480 [ 15.275833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.275857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.275883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.275907] ? __kthread_parkme+0x82/0x180 [ 15.275929] ? preempt_count_sub+0x50/0x80 [ 15.275954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.275979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.276004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.276029] kthread+0x337/0x6f0 [ 15.276060] ? trace_preempt_on+0x20/0xc0 [ 15.276085] ? __pfx_kthread+0x10/0x10 [ 15.276106] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.276129] ? calculate_sigpending+0x7b/0xa0 [ 15.276154] ? __pfx_kthread+0x10/0x10 [ 15.276177] ret_from_fork+0x116/0x1d0 [ 15.276196] ? __pfx_kthread+0x10/0x10 [ 15.276217] ret_from_fork_asm+0x1a/0x30 [ 15.276251] </TASK> [ 15.276262] [ 15.283786] Allocated by task 282: [ 15.283920] kasan_save_stack+0x45/0x70 [ 15.284103] kasan_save_track+0x18/0x40 [ 15.284396] kasan_save_alloc_info+0x3b/0x50 [ 15.284615] __kasan_kmalloc+0xb7/0xc0 [ 15.284806] __kmalloc_cache_noprof+0x189/0x420 [ 15.285031] kasan_atomics+0x95/0x310 [ 15.285306] kunit_try_run_case+0x1a5/0x480 [ 15.285738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286003] kthread+0x337/0x6f0 [ 15.286262] ret_from_fork+0x116/0x1d0 [ 15.286456] ret_from_fork_asm+0x1a/0x30 [ 15.286748] [ 15.286824] The buggy address belongs to the object at ffff8881026ce080 [ 15.286824] which belongs to the cache kmalloc-64 of size 64 [ 15.287266] The buggy address is located 0 bytes to the right of [ 15.287266] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.287914] [ 15.288010] The buggy address belongs to the physical page: [ 15.288274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.288616] flags: 0x200000000000000(node=0|zone=2) [ 15.288861] page_type: f5(slab) [ 15.289079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.289400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.289724] page dumped because: kasan: bad access detected [ 15.289898] [ 15.290008] Memory state around the buggy address: [ 15.290255] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.290498] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.291010] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.291329] ^ [ 15.291555] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.291849] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.292120] ================================================================== [ 16.172166] ================================================================== [ 16.172482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.172852] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 16.173157] [ 16.173271] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.173315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.173328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.173351] Call Trace: [ 16.173369] <TASK> [ 16.173387] dump_stack_lvl+0x73/0xb0 [ 16.173417] print_report+0xd1/0x610 [ 16.173441] ? __virt_addr_valid+0x1db/0x2d0 [ 16.173464] ? kasan_atomics_helper+0x224c/0x5450 [ 16.173486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.173511] ? kasan_atomics_helper+0x224c/0x5450 [ 16.173533] kasan_report+0x141/0x180 [ 16.173556] ? kasan_atomics_helper+0x224c/0x5450 [ 16.173607] kasan_check_range+0x10c/0x1c0 [ 16.173632] __kasan_check_write+0x18/0x20 [ 16.173653] kasan_atomics_helper+0x224c/0x5450 [ 16.173677] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.173701] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.173727] ? kasan_atomics+0x152/0x310 [ 16.173755] kasan_atomics+0x1dc/0x310 [ 16.173779] ? __pfx_kasan_atomics+0x10/0x10 [ 16.173804] ? __pfx_read_tsc+0x10/0x10 [ 16.173826] ? ktime_get_ts64+0x86/0x230 [ 16.173852] kunit_try_run_case+0x1a5/0x480 [ 16.173878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.173902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.173928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.173954] ? __kthread_parkme+0x82/0x180 [ 16.173975] ? preempt_count_sub+0x50/0x80 [ 16.174001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.174027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.174061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.174086] kthread+0x337/0x6f0 [ 16.174107] ? trace_preempt_on+0x20/0xc0 [ 16.174133] ? __pfx_kthread+0x10/0x10 [ 16.174154] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.174177] ? calculate_sigpending+0x7b/0xa0 [ 16.174208] ? __pfx_kthread+0x10/0x10 [ 16.174230] ret_from_fork+0x116/0x1d0 [ 16.174249] ? __pfx_kthread+0x10/0x10 [ 16.174270] ret_from_fork_asm+0x1a/0x30 [ 16.174305] </TASK> [ 16.174317] [ 16.181522] Allocated by task 282: [ 16.181685] kasan_save_stack+0x45/0x70 [ 16.181836] kasan_save_track+0x18/0x40 [ 16.182029] kasan_save_alloc_info+0x3b/0x50 [ 16.182257] __kasan_kmalloc+0xb7/0xc0 [ 16.182446] __kmalloc_cache_noprof+0x189/0x420 [ 16.182704] kasan_atomics+0x95/0x310 [ 16.182899] kunit_try_run_case+0x1a5/0x480 [ 16.183117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.183373] kthread+0x337/0x6f0 [ 16.183549] ret_from_fork+0x116/0x1d0 [ 16.183753] ret_from_fork_asm+0x1a/0x30 [ 16.183898] [ 16.183975] The buggy address belongs to the object at ffff8881026ce080 [ 16.183975] which belongs to the cache kmalloc-64 of size 64 [ 16.184540] The buggy address is located 0 bytes to the right of [ 16.184540] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 16.185068] [ 16.185160] The buggy address belongs to the physical page: [ 16.185357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 16.185630] flags: 0x200000000000000(node=0|zone=2) [ 16.185801] page_type: f5(slab) [ 16.185947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.186306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.186670] page dumped because: kasan: bad access detected [ 16.186928] [ 16.187009] Memory state around the buggy address: [ 16.187177] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.187399] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.187666] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.187920] ^ [ 16.188122] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.188422] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.188687] ================================================================== [ 15.763078] ================================================================== [ 15.763398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.763792] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.764084] [ 15.764236] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.764287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.764300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.764325] Call Trace: [ 15.764346] <TASK> [ 15.764369] dump_stack_lvl+0x73/0xb0 [ 15.764400] print_report+0xd1/0x610 [ 15.764424] ? __virt_addr_valid+0x1db/0x2d0 [ 15.764449] ? kasan_atomics_helper+0x177f/0x5450 [ 15.764470] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.764494] ? kasan_atomics_helper+0x177f/0x5450 [ 15.764517] kasan_report+0x141/0x180 [ 15.764556] ? kasan_atomics_helper+0x177f/0x5450 [ 15.764585] kasan_check_range+0x10c/0x1c0 [ 15.764620] __kasan_check_write+0x18/0x20 [ 15.764644] kasan_atomics_helper+0x177f/0x5450 [ 15.764670] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.764694] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.764732] ? kasan_atomics+0x152/0x310 [ 15.764760] kasan_atomics+0x1dc/0x310 [ 15.764797] ? __pfx_kasan_atomics+0x10/0x10 [ 15.764822] ? __pfx_read_tsc+0x10/0x10 [ 15.764843] ? ktime_get_ts64+0x86/0x230 [ 15.764871] kunit_try_run_case+0x1a5/0x480 [ 15.764898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.764931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.764959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.764984] ? __kthread_parkme+0x82/0x180 [ 15.765006] ? preempt_count_sub+0x50/0x80 [ 15.765033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.765072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.765107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.765133] kthread+0x337/0x6f0 [ 15.765164] ? trace_preempt_on+0x20/0xc0 [ 15.765190] ? __pfx_kthread+0x10/0x10 [ 15.765212] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.765236] ? calculate_sigpending+0x7b/0xa0 [ 15.765262] ? __pfx_kthread+0x10/0x10 [ 15.765284] ret_from_fork+0x116/0x1d0 [ 15.765304] ? __pfx_kthread+0x10/0x10 [ 15.765326] ret_from_fork_asm+0x1a/0x30 [ 15.765360] </TASK> [ 15.765372] [ 15.773424] Allocated by task 282: [ 15.773684] kasan_save_stack+0x45/0x70 [ 15.773856] kasan_save_track+0x18/0x40 [ 15.774046] kasan_save_alloc_info+0x3b/0x50 [ 15.774211] __kasan_kmalloc+0xb7/0xc0 [ 15.774348] __kmalloc_cache_noprof+0x189/0x420 [ 15.774585] kasan_atomics+0x95/0x310 [ 15.774820] kunit_try_run_case+0x1a5/0x480 [ 15.775104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.775363] kthread+0x337/0x6f0 [ 15.775509] ret_from_fork+0x116/0x1d0 [ 15.775783] ret_from_fork_asm+0x1a/0x30 [ 15.776073] [ 15.776151] The buggy address belongs to the object at ffff8881026ce080 [ 15.776151] which belongs to the cache kmalloc-64 of size 64 [ 15.776705] The buggy address is located 0 bytes to the right of [ 15.776705] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.777082] [ 15.777158] The buggy address belongs to the physical page: [ 15.777727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.778080] flags: 0x200000000000000(node=0|zone=2) [ 15.778257] page_type: f5(slab) [ 15.778383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.778674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.779066] page dumped because: kasan: bad access detected [ 15.779399] [ 15.779523] Memory state around the buggy address: [ 15.779967] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.780313] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.780577] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.780958] ^ [ 15.781209] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781471] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781867] ================================================================== [ 15.124993] ================================================================== [ 15.125524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.125953] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.126585] [ 15.126769] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.126995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.127011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.127036] Call Trace: [ 15.127069] <TASK> [ 15.127090] dump_stack_lvl+0x73/0xb0 [ 15.127124] print_report+0xd1/0x610 [ 15.127148] ? __virt_addr_valid+0x1db/0x2d0 [ 15.127173] ? kasan_atomics_helper+0xac7/0x5450 [ 15.127194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.127218] ? kasan_atomics_helper+0xac7/0x5450 [ 15.127241] kasan_report+0x141/0x180 [ 15.127264] ? kasan_atomics_helper+0xac7/0x5450 [ 15.127291] kasan_check_range+0x10c/0x1c0 [ 15.127316] __kasan_check_write+0x18/0x20 [ 15.127336] kasan_atomics_helper+0xac7/0x5450 [ 15.127359] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.127383] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.127409] ? kasan_atomics+0x152/0x310 [ 15.127437] kasan_atomics+0x1dc/0x310 [ 15.127461] ? __pfx_kasan_atomics+0x10/0x10 [ 15.127486] ? __pfx_read_tsc+0x10/0x10 [ 15.127508] ? ktime_get_ts64+0x86/0x230 [ 15.127534] kunit_try_run_case+0x1a5/0x480 [ 15.127561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.127584] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.127610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.127634] ? __kthread_parkme+0x82/0x180 [ 15.127656] ? preempt_count_sub+0x50/0x80 [ 15.127682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.127707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.127732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.127756] kthread+0x337/0x6f0 [ 15.127776] ? trace_preempt_on+0x20/0xc0 [ 15.127800] ? __pfx_kthread+0x10/0x10 [ 15.127837] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.127859] ? calculate_sigpending+0x7b/0xa0 [ 15.127884] ? __pfx_kthread+0x10/0x10 [ 15.127906] ret_from_fork+0x116/0x1d0 [ 15.127925] ? __pfx_kthread+0x10/0x10 [ 15.127946] ret_from_fork_asm+0x1a/0x30 [ 15.127980] </TASK> [ 15.127991] [ 15.140254] Allocated by task 282: [ 15.140619] kasan_save_stack+0x45/0x70 [ 15.140835] kasan_save_track+0x18/0x40 [ 15.140988] kasan_save_alloc_info+0x3b/0x50 [ 15.141150] __kasan_kmalloc+0xb7/0xc0 [ 15.141286] __kmalloc_cache_noprof+0x189/0x420 [ 15.141445] kasan_atomics+0x95/0x310 [ 15.141581] kunit_try_run_case+0x1a5/0x480 [ 15.141963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.142519] kthread+0x337/0x6f0 [ 15.142893] ret_from_fork+0x116/0x1d0 [ 15.143347] ret_from_fork_asm+0x1a/0x30 [ 15.143757] [ 15.143916] The buggy address belongs to the object at ffff8881026ce080 [ 15.143916] which belongs to the cache kmalloc-64 of size 64 [ 15.145093] The buggy address is located 0 bytes to the right of [ 15.145093] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.146481] [ 15.146650] The buggy address belongs to the physical page: [ 15.147285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.147922] flags: 0x200000000000000(node=0|zone=2) [ 15.148103] page_type: f5(slab) [ 15.148230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.148465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.148992] page dumped because: kasan: bad access detected [ 15.149292] [ 15.149379] Memory state around the buggy address: [ 15.149538] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.150009] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.150477] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.150792] ^ [ 15.151106] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151446] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151681] ================================================================== [ 15.862136] ================================================================== [ 15.862469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.862828] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.863282] [ 15.863405] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.863463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.863476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.863512] Call Trace: [ 15.863532] <TASK> [ 15.863554] dump_stack_lvl+0x73/0xb0 [ 15.863585] print_report+0xd1/0x610 [ 15.863622] ? __virt_addr_valid+0x1db/0x2d0 [ 15.863655] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.863677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.863701] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.863743] kasan_report+0x141/0x180 [ 15.863766] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.863795] kasan_check_range+0x10c/0x1c0 [ 15.863830] __kasan_check_write+0x18/0x20 [ 15.863850] kasan_atomics_helper+0x1a7f/0x5450 [ 15.863874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.863897] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.863924] ? kasan_atomics+0x152/0x310 [ 15.863952] kasan_atomics+0x1dc/0x310 [ 15.863976] ? __pfx_kasan_atomics+0x10/0x10 [ 15.864002] ? __pfx_read_tsc+0x10/0x10 [ 15.864025] ? ktime_get_ts64+0x86/0x230 [ 15.864070] kunit_try_run_case+0x1a5/0x480 [ 15.864097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.864120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.864158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.864182] ? __kthread_parkme+0x82/0x180 [ 15.864204] ? preempt_count_sub+0x50/0x80 [ 15.864230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.864255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.864279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.864304] kthread+0x337/0x6f0 [ 15.864324] ? trace_preempt_on+0x20/0xc0 [ 15.864348] ? __pfx_kthread+0x10/0x10 [ 15.864369] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.864391] ? calculate_sigpending+0x7b/0xa0 [ 15.864417] ? __pfx_kthread+0x10/0x10 [ 15.864439] ret_from_fork+0x116/0x1d0 [ 15.864459] ? __pfx_kthread+0x10/0x10 [ 15.864479] ret_from_fork_asm+0x1a/0x30 [ 15.864524] </TASK> [ 15.864534] [ 15.872417] Allocated by task 282: [ 15.872608] kasan_save_stack+0x45/0x70 [ 15.872819] kasan_save_track+0x18/0x40 [ 15.873016] kasan_save_alloc_info+0x3b/0x50 [ 15.873234] __kasan_kmalloc+0xb7/0xc0 [ 15.873426] __kmalloc_cache_noprof+0x189/0x420 [ 15.873655] kasan_atomics+0x95/0x310 [ 15.873841] kunit_try_run_case+0x1a5/0x480 [ 15.874061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.874314] kthread+0x337/0x6f0 [ 15.874493] ret_from_fork+0x116/0x1d0 [ 15.874741] ret_from_fork_asm+0x1a/0x30 [ 15.874932] [ 15.875032] The buggy address belongs to the object at ffff8881026ce080 [ 15.875032] which belongs to the cache kmalloc-64 of size 64 [ 15.875547] The buggy address is located 0 bytes to the right of [ 15.875547] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.876079] [ 15.876183] The buggy address belongs to the physical page: [ 15.876434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.876808] flags: 0x200000000000000(node=0|zone=2) [ 15.877068] page_type: f5(slab) [ 15.877204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.877445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.877678] page dumped because: kasan: bad access detected [ 15.877919] [ 15.878014] Memory state around the buggy address: [ 15.878275] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.878601] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.878828] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.879046] ^ [ 15.879296] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.879647] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.879994] ================================================================== [ 15.840395] ================================================================== [ 15.840764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.841109] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.841454] [ 15.841610] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.841656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.841681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.841706] Call Trace: [ 15.841724] <TASK> [ 15.841753] dump_stack_lvl+0x73/0xb0 [ 15.841783] print_report+0xd1/0x610 [ 15.841806] ? __virt_addr_valid+0x1db/0x2d0 [ 15.841830] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.841851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.841885] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.841909] kasan_report+0x141/0x180 [ 15.841931] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.841971] kasan_check_range+0x10c/0x1c0 [ 15.841996] __kasan_check_write+0x18/0x20 [ 15.842016] kasan_atomics_helper+0x19e3/0x5450 [ 15.842040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.842071] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.842107] ? kasan_atomics+0x152/0x310 [ 15.842136] kasan_atomics+0x1dc/0x310 [ 15.842170] ? __pfx_kasan_atomics+0x10/0x10 [ 15.842196] ? __pfx_read_tsc+0x10/0x10 [ 15.842222] ? ktime_get_ts64+0x86/0x230 [ 15.842248] kunit_try_run_case+0x1a5/0x480 [ 15.842283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.842308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.842335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.842370] ? __kthread_parkme+0x82/0x180 [ 15.842392] ? preempt_count_sub+0x50/0x80 [ 15.842419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.842452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.842477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.842512] kthread+0x337/0x6f0 [ 15.842532] ? trace_preempt_on+0x20/0xc0 [ 15.842558] ? __pfx_kthread+0x10/0x10 [ 15.842598] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.842621] ? calculate_sigpending+0x7b/0xa0 [ 15.842647] ? __pfx_kthread+0x10/0x10 [ 15.842670] ret_from_fork+0x116/0x1d0 [ 15.842689] ? __pfx_kthread+0x10/0x10 [ 15.842709] ret_from_fork_asm+0x1a/0x30 [ 15.842744] </TASK> [ 15.842764] [ 15.851798] Allocated by task 282: [ 15.852031] kasan_save_stack+0x45/0x70 [ 15.852242] kasan_save_track+0x18/0x40 [ 15.852431] kasan_save_alloc_info+0x3b/0x50 [ 15.852870] __kasan_kmalloc+0xb7/0xc0 [ 15.853294] __kmalloc_cache_noprof+0x189/0x420 [ 15.853707] kasan_atomics+0x95/0x310 [ 15.853896] kunit_try_run_case+0x1a5/0x480 [ 15.854110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.854354] kthread+0x337/0x6f0 [ 15.854513] ret_from_fork+0x116/0x1d0 [ 15.855103] ret_from_fork_asm+0x1a/0x30 [ 15.855360] [ 15.855597] The buggy address belongs to the object at ffff8881026ce080 [ 15.855597] which belongs to the cache kmalloc-64 of size 64 [ 15.856533] The buggy address is located 0 bytes to the right of [ 15.856533] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.857094] [ 15.857176] The buggy address belongs to the physical page: [ 15.857460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.857822] flags: 0x200000000000000(node=0|zone=2) [ 15.858130] page_type: f5(slab) [ 15.858302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.858641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.858927] page dumped because: kasan: bad access detected [ 15.859212] [ 15.859312] Memory state around the buggy address: [ 15.859481] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.859874] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.860212] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.860467] ^ [ 15.860727] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861042] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861369] ================================================================== [ 15.035145] ================================================================== [ 15.035499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.035895] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282 [ 15.036306] [ 15.036449] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.036494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.036507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.036532] Call Trace: [ 15.036549] <TASK> [ 15.036567] dump_stack_lvl+0x73/0xb0 [ 15.036598] print_report+0xd1/0x610 [ 15.036622] ? __virt_addr_valid+0x1db/0x2d0 [ 15.036645] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.036667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.036691] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.036713] kasan_report+0x141/0x180 [ 15.036736] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.036764] kasan_check_range+0x10c/0x1c0 [ 15.036789] __kasan_check_write+0x18/0x20 [ 15.036810] kasan_atomics_helper+0x8f9/0x5450 [ 15.036833] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.036857] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.036884] ? kasan_atomics+0x152/0x310 [ 15.036912] kasan_atomics+0x1dc/0x310 [ 15.036935] ? __pfx_kasan_atomics+0x10/0x10 [ 15.036961] ? __pfx_read_tsc+0x10/0x10 [ 15.036982] ? ktime_get_ts64+0x86/0x230 [ 15.037009] kunit_try_run_case+0x1a5/0x480 [ 15.037034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.037095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.037120] ? __kthread_parkme+0x82/0x180 [ 15.037142] ? preempt_count_sub+0x50/0x80 [ 15.037168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.037218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.037244] kthread+0x337/0x6f0 [ 15.037264] ? trace_preempt_on+0x20/0xc0 [ 15.037288] ? __pfx_kthread+0x10/0x10 [ 15.037310] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.037332] ? calculate_sigpending+0x7b/0xa0 [ 15.037358] ? __pfx_kthread+0x10/0x10 [ 15.037380] ret_from_fork+0x116/0x1d0 [ 15.037399] ? __pfx_kthread+0x10/0x10 [ 15.037422] ret_from_fork_asm+0x1a/0x30 [ 15.037457] </TASK> [ 15.037468] [ 15.046794] Allocated by task 282: [ 15.046935] kasan_save_stack+0x45/0x70 [ 15.047102] kasan_save_track+0x18/0x40 [ 15.047619] kasan_save_alloc_info+0x3b/0x50 [ 15.048856] __kasan_kmalloc+0xb7/0xc0 [ 15.049356] __kmalloc_cache_noprof+0x189/0x420 [ 15.050074] kasan_atomics+0x95/0x310 [ 15.050238] kunit_try_run_case+0x1a5/0x480 [ 15.050385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.050557] kthread+0x337/0x6f0 [ 15.051614] ret_from_fork+0x116/0x1d0 [ 15.052479] ret_from_fork_asm+0x1a/0x30 [ 15.053065] [ 15.053400] The buggy address belongs to the object at ffff8881026ce080 [ 15.053400] which belongs to the cache kmalloc-64 of size 64 [ 15.054439] The buggy address is located 0 bytes to the right of [ 15.054439] allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0) [ 15.055882] [ 15.056077] The buggy address belongs to the physical page: [ 15.056827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 15.057145] flags: 0x200000000000000(node=0|zone=2) [ 15.057319] page_type: f5(slab) [ 15.057447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.057841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.058648] page dumped because: kasan: bad access detected [ 15.059300] [ 15.059498] Memory state around the buggy address: [ 15.059994] ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060801] ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.061630] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.062064] ^ [ 15.062258] ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.062479] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.063000] ==================================================================