Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.284887] ================================================================== [ 18.285000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.285055] Write of size 4 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.285110] [ 18.285142] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.285241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.285270] Hardware name: linux,dummy-virt (DT) [ 18.285302] Call trace: [ 18.285326] show_stack+0x20/0x38 (C) [ 18.285376] dump_stack_lvl+0x8c/0xd0 [ 18.285423] print_report+0x118/0x5d0 [ 18.285470] kasan_report+0xdc/0x128 [ 18.285518] kasan_check_range+0x100/0x1a8 [ 18.285900] __kasan_check_write+0x20/0x30 [ 18.286121] kasan_atomics_helper+0xa6c/0x4858 [ 18.286344] kasan_atomics+0x198/0x2e0 [ 18.286408] kunit_try_run_case+0x170/0x3f0 [ 18.286456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.286523] kthread+0x328/0x630 [ 18.286603] ret_from_fork+0x10/0x20 [ 18.286919] [ 18.287054] Allocated by task 266: [ 18.287411] kasan_save_stack+0x3c/0x68 [ 18.287649] kasan_save_track+0x20/0x40 [ 18.287733] kasan_save_alloc_info+0x40/0x58 [ 18.288367] __kasan_kmalloc+0xd4/0xd8 [ 18.289134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.289355] kasan_atomics+0xb8/0x2e0 [ 18.289419] kunit_try_run_case+0x170/0x3f0 [ 18.289460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.289506] kthread+0x328/0x630 [ 18.290249] ret_from_fork+0x10/0x20 [ 18.290308] [ 18.290574] The buggy address belongs to the object at fff00000c653a200 [ 18.290574] which belongs to the cache kmalloc-64 of size 64 [ 18.290921] The buggy address is located 0 bytes to the right of [ 18.290921] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.291660] [ 18.292045] The buggy address belongs to the physical page: [ 18.292080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.292615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.292689] page_type: f5(slab) [ 18.292731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.292784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.292828] page dumped because: kasan: bad access detected [ 18.293330] [ 18.293381] Memory state around the buggy address: [ 18.293509] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293559] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293605] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.294132] ^ [ 18.294201] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.294427] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.294490] ================================================================== [ 18.474391] ================================================================== [ 18.474458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.474512] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.474950] [ 18.474987] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.475073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.475102] Hardware name: linux,dummy-virt (DT) [ 18.475136] Call trace: [ 18.475160] show_stack+0x20/0x38 (C) [ 18.475223] dump_stack_lvl+0x8c/0xd0 [ 18.475269] print_report+0x118/0x5d0 [ 18.476229] kasan_report+0xdc/0x128 [ 18.476310] kasan_check_range+0x100/0x1a8 [ 18.476409] __kasan_check_write+0x20/0x30 [ 18.476491] kasan_atomics_helper+0xf88/0x4858 [ 18.476540] kasan_atomics+0x198/0x2e0 [ 18.476586] kunit_try_run_case+0x170/0x3f0 [ 18.476632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.476687] kthread+0x328/0x630 [ 18.476731] ret_from_fork+0x10/0x20 [ 18.476778] [ 18.476799] Allocated by task 266: [ 18.476832] kasan_save_stack+0x3c/0x68 [ 18.476875] kasan_save_track+0x20/0x40 [ 18.477480] kasan_save_alloc_info+0x40/0x58 [ 18.477543] __kasan_kmalloc+0xd4/0xd8 [ 18.478137] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.478205] kasan_atomics+0xb8/0x2e0 [ 18.478244] kunit_try_run_case+0x170/0x3f0 [ 18.478285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.478482] kthread+0x328/0x630 [ 18.478604] ret_from_fork+0x10/0x20 [ 18.478905] [ 18.478934] The buggy address belongs to the object at fff00000c653a200 [ 18.478934] which belongs to the cache kmalloc-64 of size 64 [ 18.479126] The buggy address is located 0 bytes to the right of [ 18.479126] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.479794] [ 18.479818] The buggy address belongs to the physical page: [ 18.479866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.480084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.480338] page_type: f5(slab) [ 18.480384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.481096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.481394] page dumped because: kasan: bad access detected [ 18.481444] [ 18.481465] Memory state around the buggy address: [ 18.481502] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.481549] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.482135] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.482190] ^ [ 18.482235] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.482279] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.482322] ================================================================== [ 18.621464] ================================================================== [ 18.621662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.621722] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.621775] [ 18.621815] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.621899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.621928] Hardware name: linux,dummy-virt (DT) [ 18.621960] Call trace: [ 18.621983] show_stack+0x20/0x38 (C) [ 18.622100] dump_stack_lvl+0x8c/0xd0 [ 18.622152] print_report+0x118/0x5d0 [ 18.622220] kasan_report+0xdc/0x128 [ 18.622267] kasan_check_range+0x100/0x1a8 [ 18.622316] __kasan_check_write+0x20/0x30 [ 18.622360] kasan_atomics_helper+0x16d0/0x4858 [ 18.622410] kasan_atomics+0x198/0x2e0 [ 18.622464] kunit_try_run_case+0x170/0x3f0 [ 18.622512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.622565] kthread+0x328/0x630 [ 18.622608] ret_from_fork+0x10/0x20 [ 18.622655] [ 18.622685] Allocated by task 266: [ 18.622716] kasan_save_stack+0x3c/0x68 [ 18.622757] kasan_save_track+0x20/0x40 [ 18.622805] kasan_save_alloc_info+0x40/0x58 [ 18.622846] __kasan_kmalloc+0xd4/0xd8 [ 18.622885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.622929] kasan_atomics+0xb8/0x2e0 [ 18.622976] kunit_try_run_case+0x170/0x3f0 [ 18.623024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.623071] kthread+0x328/0x630 [ 18.623104] ret_from_fork+0x10/0x20 [ 18.623142] [ 18.623162] The buggy address belongs to the object at fff00000c653a200 [ 18.623162] which belongs to the cache kmalloc-64 of size 64 [ 18.623574] The buggy address is located 0 bytes to the right of [ 18.623574] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.623938] [ 18.623975] The buggy address belongs to the physical page: [ 18.624116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.624188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.624283] page_type: f5(slab) [ 18.624352] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.624426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.624639] page dumped because: kasan: bad access detected [ 18.624676] [ 18.624756] Memory state around the buggy address: [ 18.624834] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.624884] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.624929] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.624970] ^ [ 18.625006] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.625049] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.625089] ================================================================== [ 18.518838] ================================================================== [ 18.518890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.518939] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.518991] [ 18.519022] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.519610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.519730] Hardware name: linux,dummy-virt (DT) [ 18.519873] Call trace: [ 18.519899] show_stack+0x20/0x38 (C) [ 18.519964] dump_stack_lvl+0x8c/0xd0 [ 18.520050] print_report+0x118/0x5d0 [ 18.520098] kasan_report+0xdc/0x128 [ 18.520143] kasan_check_range+0x100/0x1a8 [ 18.520203] __kasan_check_write+0x20/0x30 [ 18.520387] kasan_atomics_helper+0x1190/0x4858 [ 18.520671] kasan_atomics+0x198/0x2e0 [ 18.520922] kunit_try_run_case+0x170/0x3f0 [ 18.521050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.521165] kthread+0x328/0x630 [ 18.521230] ret_from_fork+0x10/0x20 [ 18.521291] [ 18.521378] Allocated by task 266: [ 18.521412] kasan_save_stack+0x3c/0x68 [ 18.521454] kasan_save_track+0x20/0x40 [ 18.521494] kasan_save_alloc_info+0x40/0x58 [ 18.521563] __kasan_kmalloc+0xd4/0xd8 [ 18.521603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.521686] kasan_atomics+0xb8/0x2e0 [ 18.521738] kunit_try_run_case+0x170/0x3f0 [ 18.521779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.521825] kthread+0x328/0x630 [ 18.521859] ret_from_fork+0x10/0x20 [ 18.521959] [ 18.522053] The buggy address belongs to the object at fff00000c653a200 [ 18.522053] which belongs to the cache kmalloc-64 of size 64 [ 18.522222] The buggy address is located 0 bytes to the right of [ 18.522222] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.522291] [ 18.522313] The buggy address belongs to the physical page: [ 18.522348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.522403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.522516] page_type: f5(slab) [ 18.522558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.522655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.522773] page dumped because: kasan: bad access detected [ 18.522807] [ 18.522828] Memory state around the buggy address: [ 18.522861] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.522942] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.522989] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.523150] ^ [ 18.523223] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.523266] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.523307] ================================================================== [ 18.590291] ================================================================== [ 18.590355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.590596] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.590807] [ 18.590850] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.590983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.591020] Hardware name: linux,dummy-virt (DT) [ 18.591055] Call trace: [ 18.591084] show_stack+0x20/0x38 (C) [ 18.591287] dump_stack_lvl+0x8c/0xd0 [ 18.591338] print_report+0x118/0x5d0 [ 18.591557] kasan_report+0xdc/0x128 [ 18.591676] kasan_check_range+0x100/0x1a8 [ 18.591736] __kasan_check_write+0x20/0x30 [ 18.591782] kasan_atomics_helper+0x15b4/0x4858 [ 18.592097] kasan_atomics+0x198/0x2e0 [ 18.592307] kunit_try_run_case+0x170/0x3f0 [ 18.592413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.592802] kthread+0x328/0x630 [ 18.592976] ret_from_fork+0x10/0x20 [ 18.593098] [ 18.593467] Allocated by task 266: [ 18.593543] kasan_save_stack+0x3c/0x68 [ 18.593689] kasan_save_track+0x20/0x40 [ 18.593855] kasan_save_alloc_info+0x40/0x58 [ 18.593900] __kasan_kmalloc+0xd4/0xd8 [ 18.593939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.594001] kasan_atomics+0xb8/0x2e0 [ 18.594042] kunit_try_run_case+0x170/0x3f0 [ 18.594350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.594533] kthread+0x328/0x630 [ 18.594773] ret_from_fork+0x10/0x20 [ 18.594939] [ 18.594966] The buggy address belongs to the object at fff00000c653a200 [ 18.594966] which belongs to the cache kmalloc-64 of size 64 [ 18.595460] The buggy address is located 0 bytes to the right of [ 18.595460] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.595843] [ 18.595986] The buggy address belongs to the physical page: [ 18.596250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.596484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.596730] page_type: f5(slab) [ 18.596779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.597231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.597305] page dumped because: kasan: bad access detected [ 18.597356] [ 18.597915] Memory state around the buggy address: [ 18.597975] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.598025] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.598072] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.598114] ^ [ 18.598149] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.598206] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.598279] ================================================================== [ 18.604933] ================================================================== [ 18.605031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.605279] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.605625] [ 18.605680] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.606250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.606324] Hardware name: linux,dummy-virt (DT) [ 18.606707] Call trace: [ 18.606777] show_stack+0x20/0x38 (C) [ 18.606959] dump_stack_lvl+0x8c/0xd0 [ 18.607025] print_report+0x118/0x5d0 [ 18.607090] kasan_report+0xdc/0x128 [ 18.607345] kasan_check_range+0x100/0x1a8 [ 18.607641] __kasan_check_write+0x20/0x30 [ 18.607883] kasan_atomics_helper+0x1644/0x4858 [ 18.608013] kasan_atomics+0x198/0x2e0 [ 18.608214] kunit_try_run_case+0x170/0x3f0 [ 18.608303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.608521] kthread+0x328/0x630 [ 18.608765] ret_from_fork+0x10/0x20 [ 18.608861] [ 18.609044] Allocated by task 266: [ 18.609277] kasan_save_stack+0x3c/0x68 [ 18.609333] kasan_save_track+0x20/0x40 [ 18.609372] kasan_save_alloc_info+0x40/0x58 [ 18.609415] __kasan_kmalloc+0xd4/0xd8 [ 18.609452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.609493] kasan_atomics+0xb8/0x2e0 [ 18.609530] kunit_try_run_case+0x170/0x3f0 [ 18.609571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.609615] kthread+0x328/0x630 [ 18.609650] ret_from_fork+0x10/0x20 [ 18.609687] [ 18.609710] The buggy address belongs to the object at fff00000c653a200 [ 18.609710] which belongs to the cache kmalloc-64 of size 64 [ 18.609772] The buggy address is located 0 bytes to the right of [ 18.609772] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.609840] [ 18.609863] The buggy address belongs to the physical page: [ 18.609934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.610170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.610242] page_type: f5(slab) [ 18.610653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.610757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.610828] page dumped because: kasan: bad access detected [ 18.611035] [ 18.611062] Memory state around the buggy address: [ 18.611139] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.611520] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.611774] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.611912] ^ [ 18.611953] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.612044] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.612298] ================================================================== [ 18.484716] ================================================================== [ 18.484780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.484841] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.484893] [ 18.484925] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.485014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.485044] Hardware name: linux,dummy-virt (DT) [ 18.485077] Call trace: [ 18.485100] show_stack+0x20/0x38 (C) [ 18.485149] dump_stack_lvl+0x8c/0xd0 [ 18.485208] print_report+0x118/0x5d0 [ 18.486226] kasan_report+0xdc/0x128 [ 18.486299] kasan_check_range+0x100/0x1a8 [ 18.486360] __kasan_check_write+0x20/0x30 [ 18.486408] kasan_atomics_helper+0xff0/0x4858 [ 18.486456] kasan_atomics+0x198/0x2e0 [ 18.486503] kunit_try_run_case+0x170/0x3f0 [ 18.486552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.487369] kthread+0x328/0x630 [ 18.487496] ret_from_fork+0x10/0x20 [ 18.487967] [ 18.488002] Allocated by task 266: [ 18.488145] kasan_save_stack+0x3c/0x68 [ 18.488202] kasan_save_track+0x20/0x40 [ 18.488241] kasan_save_alloc_info+0x40/0x58 [ 18.488284] __kasan_kmalloc+0xd4/0xd8 [ 18.488325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.488368] kasan_atomics+0xb8/0x2e0 [ 18.488631] kunit_try_run_case+0x170/0x3f0 [ 18.489435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.489587] kthread+0x328/0x630 [ 18.489693] ret_from_fork+0x10/0x20 [ 18.489943] [ 18.489965] The buggy address belongs to the object at fff00000c653a200 [ 18.489965] which belongs to the cache kmalloc-64 of size 64 [ 18.490038] The buggy address is located 0 bytes to the right of [ 18.490038] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.490106] [ 18.490915] The buggy address belongs to the physical page: [ 18.490961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.491450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.491577] page_type: f5(slab) [ 18.491650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.491704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.491748] page dumped because: kasan: bad access detected [ 18.491784] [ 18.491804] Memory state around the buggy address: [ 18.493222] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.493279] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.493732] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.493779] ^ [ 18.493814] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.494054] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.494100] ================================================================== [ 18.511714] ================================================================== [ 18.511766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.512785] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.512884] [ 18.513021] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.513135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.513262] Hardware name: linux,dummy-virt (DT) [ 18.513311] Call trace: [ 18.513334] show_stack+0x20/0x38 (C) [ 18.513450] dump_stack_lvl+0x8c/0xd0 [ 18.513498] print_report+0x118/0x5d0 [ 18.513546] kasan_report+0xdc/0x128 [ 18.513593] kasan_check_range+0x100/0x1a8 [ 18.513642] __kasan_check_write+0x20/0x30 [ 18.513686] kasan_atomics_helper+0x1128/0x4858 [ 18.513736] kasan_atomics+0x198/0x2e0 [ 18.513781] kunit_try_run_case+0x170/0x3f0 [ 18.513829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.513881] kthread+0x328/0x630 [ 18.513931] ret_from_fork+0x10/0x20 [ 18.513978] [ 18.513998] Allocated by task 266: [ 18.514028] kasan_save_stack+0x3c/0x68 [ 18.514072] kasan_save_track+0x20/0x40 [ 18.514110] kasan_save_alloc_info+0x40/0x58 [ 18.514151] __kasan_kmalloc+0xd4/0xd8 [ 18.514199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.514240] kasan_atomics+0xb8/0x2e0 [ 18.514591] kunit_try_run_case+0x170/0x3f0 [ 18.514638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.517010] kthread+0x328/0x630 [ 18.517058] ret_from_fork+0x10/0x20 [ 18.517110] [ 18.517132] The buggy address belongs to the object at fff00000c653a200 [ 18.517132] which belongs to the cache kmalloc-64 of size 64 [ 18.517652] The buggy address is located 0 bytes to the right of [ 18.517652] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.517828] [ 18.517852] The buggy address belongs to the physical page: [ 18.517886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.517947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.517997] page_type: f5(slab) [ 18.518036] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.518089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.518135] page dumped because: kasan: bad access detected [ 18.518230] [ 18.518250] Memory state around the buggy address: [ 18.518284] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.518372] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.518421] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.518464] ^ [ 18.518501] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.518544] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.518585] ================================================================== [ 18.527962] ================================================================== [ 18.528771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.528832] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.528893] [ 18.528925] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.529118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.529287] Hardware name: linux,dummy-virt (DT) [ 18.529467] Call trace: [ 18.529532] show_stack+0x20/0x38 (C) [ 18.529582] dump_stack_lvl+0x8c/0xd0 [ 18.529648] print_report+0x118/0x5d0 [ 18.529790] kasan_report+0xdc/0x128 [ 18.530633] kasan_check_range+0x100/0x1a8 [ 18.531286] __kasan_check_write+0x20/0x30 [ 18.532008] kasan_atomics_helper+0x126c/0x4858 [ 18.532461] kasan_atomics+0x198/0x2e0 [ 18.532560] kunit_try_run_case+0x170/0x3f0 [ 18.533820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.533878] kthread+0x328/0x630 [ 18.533920] ret_from_fork+0x10/0x20 [ 18.534070] [ 18.534122] Allocated by task 266: [ 18.534199] kasan_save_stack+0x3c/0x68 [ 18.534245] kasan_save_track+0x20/0x40 [ 18.534283] kasan_save_alloc_info+0x40/0x58 [ 18.534326] __kasan_kmalloc+0xd4/0xd8 [ 18.534406] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.534449] kasan_atomics+0xb8/0x2e0 [ 18.534485] kunit_try_run_case+0x170/0x3f0 [ 18.534526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.534570] kthread+0x328/0x630 [ 18.534605] ret_from_fork+0x10/0x20 [ 18.534641] [ 18.534663] The buggy address belongs to the object at fff00000c653a200 [ 18.534663] which belongs to the cache kmalloc-64 of size 64 [ 18.534724] The buggy address is located 0 bytes to the right of [ 18.534724] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.534793] [ 18.535457] The buggy address belongs to the physical page: [ 18.535632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.535748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.535934] page_type: f5(slab) [ 18.535975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.536082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.536161] page dumped because: kasan: bad access detected [ 18.536264] [ 18.536622] Memory state around the buggy address: [ 18.536896] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.537096] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.537143] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.537386] ^ [ 18.537430] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.537475] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.537691] ================================================================== [ 18.388513] ================================================================== [ 18.388776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.389337] Write of size 4 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.389587] [ 18.389847] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.389991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.390022] Hardware name: linux,dummy-virt (DT) [ 18.390156] Call trace: [ 18.390385] show_stack+0x20/0x38 (C) [ 18.390624] dump_stack_lvl+0x8c/0xd0 [ 18.390949] print_report+0x118/0x5d0 [ 18.391339] kasan_report+0xdc/0x128 [ 18.391395] kasan_check_range+0x100/0x1a8 [ 18.391447] __kasan_check_write+0x20/0x30 [ 18.391494] kasan_atomics_helper+0xd3c/0x4858 [ 18.391837] kasan_atomics+0x198/0x2e0 [ 18.391907] kunit_try_run_case+0x170/0x3f0 [ 18.392382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.392493] kthread+0x328/0x630 [ 18.392858] ret_from_fork+0x10/0x20 [ 18.392955] [ 18.392983] Allocated by task 266: [ 18.393393] kasan_save_stack+0x3c/0x68 [ 18.393448] kasan_save_track+0x20/0x40 [ 18.393534] kasan_save_alloc_info+0x40/0x58 [ 18.393579] __kasan_kmalloc+0xd4/0xd8 [ 18.393618] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.393662] kasan_atomics+0xb8/0x2e0 [ 18.393700] kunit_try_run_case+0x170/0x3f0 [ 18.393740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.394304] kthread+0x328/0x630 [ 18.394549] ret_from_fork+0x10/0x20 [ 18.395245] [ 18.395412] The buggy address belongs to the object at fff00000c653a200 [ 18.395412] which belongs to the cache kmalloc-64 of size 64 [ 18.395596] The buggy address is located 0 bytes to the right of [ 18.395596] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.395707] [ 18.395728] The buggy address belongs to the physical page: [ 18.396173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.396337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.396390] page_type: f5(slab) [ 18.396432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.396491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.396536] page dumped because: kasan: bad access detected [ 18.396569] [ 18.397821] Memory state around the buggy address: [ 18.397868] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.398034] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.398147] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.398201] ^ [ 18.398245] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.398321] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.398364] ================================================================== [ 18.376916] ================================================================== [ 18.376987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.377515] Read of size 4 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.377616] [ 18.378002] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.378248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.378283] Hardware name: linux,dummy-virt (DT) [ 18.378514] Call trace: [ 18.378685] show_stack+0x20/0x38 (C) [ 18.378756] dump_stack_lvl+0x8c/0xd0 [ 18.379033] print_report+0x118/0x5d0 [ 18.379082] kasan_report+0xdc/0x128 [ 18.379131] __asan_report_load4_noabort+0x20/0x30 [ 18.379195] kasan_atomics_helper+0x3dd8/0x4858 [ 18.379638] kasan_atomics+0x198/0x2e0 [ 18.379708] kunit_try_run_case+0x170/0x3f0 [ 18.379968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.380473] kthread+0x328/0x630 [ 18.380535] ret_from_fork+0x10/0x20 [ 18.380763] [ 18.381014] Allocated by task 266: [ 18.381056] kasan_save_stack+0x3c/0x68 [ 18.381327] kasan_save_track+0x20/0x40 [ 18.381647] kasan_save_alloc_info+0x40/0x58 [ 18.381856] __kasan_kmalloc+0xd4/0xd8 [ 18.381898] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.381966] kasan_atomics+0xb8/0x2e0 [ 18.382201] kunit_try_run_case+0x170/0x3f0 [ 18.382644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.382873] kthread+0x328/0x630 [ 18.382910] ret_from_fork+0x10/0x20 [ 18.382949] [ 18.382970] The buggy address belongs to the object at fff00000c653a200 [ 18.382970] which belongs to the cache kmalloc-64 of size 64 [ 18.383033] The buggy address is located 0 bytes to the right of [ 18.383033] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.383102] [ 18.383125] The buggy address belongs to the physical page: [ 18.383537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.384117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.384353] page_type: f5(slab) [ 18.384396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.385017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.385079] page dumped because: kasan: bad access detected [ 18.385504] [ 18.385528] Memory state around the buggy address: [ 18.385565] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.385802] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.385854] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.386126] ^ [ 18.386405] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.386645] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.386731] ================================================================== [ 18.495121] ================================================================== [ 18.495291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.495345] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.495947] [ 18.496251] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.496397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.496497] Hardware name: linux,dummy-virt (DT) [ 18.496533] Call trace: [ 18.496556] show_stack+0x20/0x38 (C) [ 18.496608] dump_stack_lvl+0x8c/0xd0 [ 18.496656] print_report+0x118/0x5d0 [ 18.496704] kasan_report+0xdc/0x128 [ 18.496751] kasan_check_range+0x100/0x1a8 [ 18.497824] __kasan_check_write+0x20/0x30 [ 18.498199] kasan_atomics_helper+0x1058/0x4858 [ 18.498418] kasan_atomics+0x198/0x2e0 [ 18.498489] kunit_try_run_case+0x170/0x3f0 [ 18.498783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.499227] kthread+0x328/0x630 [ 18.499301] ret_from_fork+0x10/0x20 [ 18.499906] [ 18.500092] Allocated by task 266: [ 18.500449] kasan_save_stack+0x3c/0x68 [ 18.500604] kasan_save_track+0x20/0x40 [ 18.500844] kasan_save_alloc_info+0x40/0x58 [ 18.500888] __kasan_kmalloc+0xd4/0xd8 [ 18.500929] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.501021] kasan_atomics+0xb8/0x2e0 [ 18.501075] kunit_try_run_case+0x170/0x3f0 [ 18.501150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.501314] kthread+0x328/0x630 [ 18.501467] ret_from_fork+0x10/0x20 [ 18.501513] [ 18.501898] The buggy address belongs to the object at fff00000c653a200 [ 18.501898] which belongs to the cache kmalloc-64 of size 64 [ 18.502788] The buggy address is located 0 bytes to the right of [ 18.502788] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.503040] [ 18.503122] The buggy address belongs to the physical page: [ 18.503254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.504016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.504243] page_type: f5(slab) [ 18.504286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.504341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.504385] page dumped because: kasan: bad access detected [ 18.505398] [ 18.505521] Memory state around the buggy address: [ 18.505819] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.506078] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.506195] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.506239] ^ [ 18.506274] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.507171] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.507574] ================================================================== [ 18.448571] ================================================================== [ 18.448707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.448940] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.449336] [ 18.449380] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.450102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.450145] Hardware name: linux,dummy-virt (DT) [ 18.450406] Call trace: [ 18.450467] show_stack+0x20/0x38 (C) [ 18.450520] dump_stack_lvl+0x8c/0xd0 [ 18.450998] print_report+0x118/0x5d0 [ 18.451057] kasan_report+0xdc/0x128 [ 18.451105] kasan_check_range+0x100/0x1a8 [ 18.451509] __kasan_check_write+0x20/0x30 [ 18.451564] kasan_atomics_helper+0xeb8/0x4858 [ 18.452267] kasan_atomics+0x198/0x2e0 [ 18.452329] kunit_try_run_case+0x170/0x3f0 [ 18.452509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.452869] kthread+0x328/0x630 [ 18.453272] ret_from_fork+0x10/0x20 [ 18.453334] [ 18.453354] Allocated by task 266: [ 18.453386] kasan_save_stack+0x3c/0x68 [ 18.453430] kasan_save_track+0x20/0x40 [ 18.453468] kasan_save_alloc_info+0x40/0x58 [ 18.453838] __kasan_kmalloc+0xd4/0xd8 [ 18.454664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.455177] kasan_atomics+0xb8/0x2e0 [ 18.455474] kunit_try_run_case+0x170/0x3f0 [ 18.455820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.455887] kthread+0x328/0x630 [ 18.456041] ret_from_fork+0x10/0x20 [ 18.456519] [ 18.456547] The buggy address belongs to the object at fff00000c653a200 [ 18.456547] which belongs to the cache kmalloc-64 of size 64 [ 18.456988] The buggy address is located 0 bytes to the right of [ 18.456988] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.457209] [ 18.457409] The buggy address belongs to the physical page: [ 18.457451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.457719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.457826] page_type: f5(slab) [ 18.458109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.458177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.458622] page dumped because: kasan: bad access detected [ 18.458796] [ 18.458963] Memory state around the buggy address: [ 18.459006] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.459089] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.459149] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.459597] ^ [ 18.459736] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.459786] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.460271] ================================================================== [ 18.550601] ================================================================== [ 18.550799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.550876] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.550930] [ 18.550972] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.551340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.551382] Hardware name: linux,dummy-virt (DT) [ 18.551431] Call trace: [ 18.551457] show_stack+0x20/0x38 (C) [ 18.551517] dump_stack_lvl+0x8c/0xd0 [ 18.551569] print_report+0x118/0x5d0 [ 18.551615] kasan_report+0xdc/0x128 [ 18.551830] kasan_check_range+0x100/0x1a8 [ 18.553197] __kasan_check_write+0x20/0x30 [ 18.553259] kasan_atomics_helper+0x1384/0x4858 [ 18.553752] kasan_atomics+0x198/0x2e0 [ 18.553809] kunit_try_run_case+0x170/0x3f0 [ 18.553989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.554044] kthread+0x328/0x630 [ 18.554085] ret_from_fork+0x10/0x20 [ 18.554134] [ 18.554155] Allocated by task 266: [ 18.554199] kasan_save_stack+0x3c/0x68 [ 18.554243] kasan_save_track+0x20/0x40 [ 18.554281] kasan_save_alloc_info+0x40/0x58 [ 18.554323] __kasan_kmalloc+0xd4/0xd8 [ 18.554360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.554401] kasan_atomics+0xb8/0x2e0 [ 18.554438] kunit_try_run_case+0x170/0x3f0 [ 18.554480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.554524] kthread+0x328/0x630 [ 18.554559] ret_from_fork+0x10/0x20 [ 18.554596] [ 18.554618] The buggy address belongs to the object at fff00000c653a200 [ 18.554618] which belongs to the cache kmalloc-64 of size 64 [ 18.554679] The buggy address is located 0 bytes to the right of [ 18.554679] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.554747] [ 18.554768] The buggy address belongs to the physical page: [ 18.554802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.554856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.554906] page_type: f5(slab) [ 18.554945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.554999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.555042] page dumped because: kasan: bad access detected [ 18.555076] [ 18.555097] Memory state around the buggy address: [ 18.555131] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.555176] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.555328] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.555455] ^ [ 18.555555] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.555655] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.555758] ================================================================== [ 18.612816] ================================================================== [ 18.612960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.613063] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.613307] [ 18.613362] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.613651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.613840] Hardware name: linux,dummy-virt (DT) [ 18.613918] Call trace: [ 18.614028] show_stack+0x20/0x38 (C) [ 18.614142] dump_stack_lvl+0x8c/0xd0 [ 18.614213] print_report+0x118/0x5d0 [ 18.614261] kasan_report+0xdc/0x128 [ 18.614309] __asan_report_load8_noabort+0x20/0x30 [ 18.614520] kasan_atomics_helper+0x3df4/0x4858 [ 18.614820] kasan_atomics+0x198/0x2e0 [ 18.614997] kunit_try_run_case+0x170/0x3f0 [ 18.615117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.615254] kthread+0x328/0x630 [ 18.615363] ret_from_fork+0x10/0x20 [ 18.615580] [ 18.615657] Allocated by task 266: [ 18.615699] kasan_save_stack+0x3c/0x68 [ 18.615898] kasan_save_track+0x20/0x40 [ 18.616048] kasan_save_alloc_info+0x40/0x58 [ 18.616357] __kasan_kmalloc+0xd4/0xd8 [ 18.616537] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.616725] kasan_atomics+0xb8/0x2e0 [ 18.616895] kunit_try_run_case+0x170/0x3f0 [ 18.616995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.617075] kthread+0x328/0x630 [ 18.617111] ret_from_fork+0x10/0x20 [ 18.617322] [ 18.617387] The buggy address belongs to the object at fff00000c653a200 [ 18.617387] which belongs to the cache kmalloc-64 of size 64 [ 18.617671] The buggy address is located 0 bytes to the right of [ 18.617671] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.617938] [ 18.618022] The buggy address belongs to the physical page: [ 18.618145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.618321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.618376] page_type: f5(slab) [ 18.618531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.618624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.618784] page dumped because: kasan: bad access detected [ 18.618854] [ 18.618943] Memory state around the buggy address: [ 18.619211] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.619436] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.619659] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.619891] ^ [ 18.620010] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.620110] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.620299] ================================================================== [ 18.556222] ================================================================== [ 18.556274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.556322] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.556374] [ 18.556404] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.556574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.556606] Hardware name: linux,dummy-virt (DT) [ 18.556640] Call trace: [ 18.556663] show_stack+0x20/0x38 (C) [ 18.556722] dump_stack_lvl+0x8c/0xd0 [ 18.556807] print_report+0x118/0x5d0 [ 18.556862] kasan_report+0xdc/0x128 [ 18.556936] __asan_report_load8_noabort+0x20/0x30 [ 18.557016] kasan_atomics_helper+0x3f04/0x4858 [ 18.557137] kasan_atomics+0x198/0x2e0 [ 18.557241] kunit_try_run_case+0x170/0x3f0 [ 18.557625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.557747] kthread+0x328/0x630 [ 18.557826] ret_from_fork+0x10/0x20 [ 18.557996] [ 18.558075] Allocated by task 266: [ 18.558236] kasan_save_stack+0x3c/0x68 [ 18.558324] kasan_save_track+0x20/0x40 [ 18.558417] kasan_save_alloc_info+0x40/0x58 [ 18.558479] __kasan_kmalloc+0xd4/0xd8 [ 18.558517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.558558] kasan_atomics+0xb8/0x2e0 [ 18.558594] kunit_try_run_case+0x170/0x3f0 [ 18.558942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.559038] kthread+0x328/0x630 [ 18.559221] ret_from_fork+0x10/0x20 [ 18.559306] [ 18.559329] The buggy address belongs to the object at fff00000c653a200 [ 18.559329] which belongs to the cache kmalloc-64 of size 64 [ 18.559392] The buggy address is located 0 bytes to the right of [ 18.559392] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.559461] [ 18.559491] The buggy address belongs to the physical page: [ 18.559524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.559589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.559644] page_type: f5(slab) [ 18.559693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.559749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.559800] page dumped because: kasan: bad access detected [ 18.559839] [ 18.559860] Memory state around the buggy address: [ 18.559893] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.559938] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.559983] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.560030] ^ [ 18.560070] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.560114] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.560170] ================================================================== [ 18.437238] ================================================================== [ 18.437720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.437809] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.437864] [ 18.437896] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.438747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.438802] Hardware name: linux,dummy-virt (DT) [ 18.438838] Call trace: [ 18.438868] show_stack+0x20/0x38 (C) [ 18.439148] dump_stack_lvl+0x8c/0xd0 [ 18.439213] print_report+0x118/0x5d0 [ 18.439262] kasan_report+0xdc/0x128 [ 18.439308] __asan_report_store8_noabort+0x20/0x30 [ 18.439363] kasan_atomics_helper+0x3e5c/0x4858 [ 18.439414] kasan_atomics+0x198/0x2e0 [ 18.439462] kunit_try_run_case+0x170/0x3f0 [ 18.439510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.439565] kthread+0x328/0x630 [ 18.439606] ret_from_fork+0x10/0x20 [ 18.439654] [ 18.439673] Allocated by task 266: [ 18.439703] kasan_save_stack+0x3c/0x68 [ 18.439745] kasan_save_track+0x20/0x40 [ 18.441337] kasan_save_alloc_info+0x40/0x58 [ 18.441401] __kasan_kmalloc+0xd4/0xd8 [ 18.441509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.441553] kasan_atomics+0xb8/0x2e0 [ 18.441640] kunit_try_run_case+0x170/0x3f0 [ 18.441786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.442054] kthread+0x328/0x630 [ 18.442122] ret_from_fork+0x10/0x20 [ 18.442323] [ 18.442615] The buggy address belongs to the object at fff00000c653a200 [ 18.442615] which belongs to the cache kmalloc-64 of size 64 [ 18.442805] The buggy address is located 0 bytes to the right of [ 18.442805] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.443130] [ 18.443528] The buggy address belongs to the physical page: [ 18.443648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.444131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.444324] page_type: f5(slab) [ 18.444371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.444716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.445444] page dumped because: kasan: bad access detected [ 18.445500] [ 18.445521] Memory state around the buggy address: [ 18.445754] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.445978] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.446307] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.446659] ^ [ 18.446862] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.447337] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.447412] ================================================================== [ 18.508241] ================================================================== [ 18.508546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.508603] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.508655] [ 18.509425] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.509546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.509574] Hardware name: linux,dummy-virt (DT) [ 18.509608] Call trace: [ 18.509632] show_stack+0x20/0x38 (C) [ 18.509686] dump_stack_lvl+0x8c/0xd0 [ 18.509738] print_report+0x118/0x5d0 [ 18.509786] kasan_report+0xdc/0x128 [ 18.509831] kasan_check_range+0x100/0x1a8 [ 18.509881] __kasan_check_write+0x20/0x30 [ 18.509926] kasan_atomics_helper+0x10c0/0x4858 [ 18.509982] kasan_atomics+0x198/0x2e0 [ 18.510026] kunit_try_run_case+0x170/0x3f0 [ 18.510075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.510128] kthread+0x328/0x630 [ 18.510171] ret_from_fork+0x10/0x20 [ 18.510233] [ 18.510255] Allocated by task 266: [ 18.510284] kasan_save_stack+0x3c/0x68 [ 18.510326] kasan_save_track+0x20/0x40 [ 18.510364] kasan_save_alloc_info+0x40/0x58 [ 18.510404] __kasan_kmalloc+0xd4/0xd8 [ 18.510442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.510482] kasan_atomics+0xb8/0x2e0 [ 18.510520] kunit_try_run_case+0x170/0x3f0 [ 18.510558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.510603] kthread+0x328/0x630 [ 18.510635] ret_from_fork+0x10/0x20 [ 18.510673] [ 18.510695] The buggy address belongs to the object at fff00000c653a200 [ 18.510695] which belongs to the cache kmalloc-64 of size 64 [ 18.510755] The buggy address is located 0 bytes to the right of [ 18.510755] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.510823] [ 18.510843] The buggy address belongs to the physical page: [ 18.510876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.510931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.510979] page_type: f5(slab) [ 18.511018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.511072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.511116] page dumped because: kasan: bad access detected [ 18.511150] [ 18.511169] Memory state around the buggy address: [ 18.511244] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.511291] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.511336] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.511378] ^ [ 18.511411] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.511456] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.511495] ================================================================== [ 18.411234] ================================================================== [ 18.411702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.411821] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.411875] [ 18.411907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.411993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.412023] Hardware name: linux,dummy-virt (DT) [ 18.412263] Call trace: [ 18.412298] show_stack+0x20/0x38 (C) [ 18.412380] dump_stack_lvl+0x8c/0xd0 [ 18.412942] print_report+0x118/0x5d0 [ 18.413296] kasan_report+0xdc/0x128 [ 18.413479] kasan_check_range+0x100/0x1a8 [ 18.413622] __kasan_check_read+0x20/0x30 [ 18.413688] kasan_atomics_helper+0xdd4/0x4858 [ 18.413779] kasan_atomics+0x198/0x2e0 [ 18.414139] kunit_try_run_case+0x170/0x3f0 [ 18.414202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.414597] kthread+0x328/0x630 [ 18.414790] ret_from_fork+0x10/0x20 [ 18.415067] [ 18.415096] Allocated by task 266: [ 18.415128] kasan_save_stack+0x3c/0x68 [ 18.415172] kasan_save_track+0x20/0x40 [ 18.415225] kasan_save_alloc_info+0x40/0x58 [ 18.415267] __kasan_kmalloc+0xd4/0xd8 [ 18.415692] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.415808] kasan_atomics+0xb8/0x2e0 [ 18.416145] kunit_try_run_case+0x170/0x3f0 [ 18.416634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.417028] kthread+0x328/0x630 [ 18.417131] ret_from_fork+0x10/0x20 [ 18.417370] [ 18.417401] The buggy address belongs to the object at fff00000c653a200 [ 18.417401] which belongs to the cache kmalloc-64 of size 64 [ 18.417465] The buggy address is located 0 bytes to the right of [ 18.417465] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.417535] [ 18.417555] The buggy address belongs to the physical page: [ 18.417754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.417848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.418410] page_type: f5(slab) [ 18.418486] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.418680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.418891] page dumped because: kasan: bad access detected [ 18.419065] [ 18.419086] Memory state around the buggy address: [ 18.419306] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.419578] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.419843] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.420335] ^ [ 18.420460] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.420673] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.420947] ================================================================== [ 18.430477] ================================================================== [ 18.430532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.430719] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.430783] [ 18.430837] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.431062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.431152] Hardware name: linux,dummy-virt (DT) [ 18.431194] Call trace: [ 18.431467] show_stack+0x20/0x38 (C) [ 18.431750] dump_stack_lvl+0x8c/0xd0 [ 18.431944] print_report+0x118/0x5d0 [ 18.433277] kasan_report+0xdc/0x128 [ 18.433327] kasan_check_range+0x100/0x1a8 [ 18.433377] __kasan_check_write+0x20/0x30 [ 18.433423] kasan_atomics_helper+0xe44/0x4858 [ 18.433471] kasan_atomics+0x198/0x2e0 [ 18.433518] kunit_try_run_case+0x170/0x3f0 [ 18.433565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.433631] kthread+0x328/0x630 [ 18.433675] ret_from_fork+0x10/0x20 [ 18.433724] [ 18.433745] Allocated by task 266: [ 18.433777] kasan_save_stack+0x3c/0x68 [ 18.434220] kasan_save_track+0x20/0x40 [ 18.434277] kasan_save_alloc_info+0x40/0x58 [ 18.434420] __kasan_kmalloc+0xd4/0xd8 [ 18.434470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.434512] kasan_atomics+0xb8/0x2e0 [ 18.434550] kunit_try_run_case+0x170/0x3f0 [ 18.434591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.434636] kthread+0x328/0x630 [ 18.434671] ret_from_fork+0x10/0x20 [ 18.434709] [ 18.434731] The buggy address belongs to the object at fff00000c653a200 [ 18.434731] which belongs to the cache kmalloc-64 of size 64 [ 18.434792] The buggy address is located 0 bytes to the right of [ 18.434792] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.434861] [ 18.434881] The buggy address belongs to the physical page: [ 18.434916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.434972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.435021] page_type: f5(slab) [ 18.435060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.435114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.435157] page dumped because: kasan: bad access detected [ 18.435203] [ 18.435224] Memory state around the buggy address: [ 18.435259] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.435303] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.435348] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.435386] ^ [ 18.435422] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.435466] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.435507] ================================================================== [ 18.538581] ================================================================== [ 18.538919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.539096] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.539150] [ 18.539195] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.539279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.539307] Hardware name: linux,dummy-virt (DT) [ 18.539341] Call trace: [ 18.539367] show_stack+0x20/0x38 (C) [ 18.539990] dump_stack_lvl+0x8c/0xd0 [ 18.540648] print_report+0x118/0x5d0 [ 18.541082] kasan_report+0xdc/0x128 [ 18.541140] kasan_check_range+0x100/0x1a8 [ 18.541200] __kasan_check_write+0x20/0x30 [ 18.541950] kasan_atomics_helper+0x12d8/0x4858 [ 18.542263] kasan_atomics+0x198/0x2e0 [ 18.542320] kunit_try_run_case+0x170/0x3f0 [ 18.542721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.542782] kthread+0x328/0x630 [ 18.543142] ret_from_fork+0x10/0x20 [ 18.543255] [ 18.543282] Allocated by task 266: [ 18.543315] kasan_save_stack+0x3c/0x68 [ 18.543640] kasan_save_track+0x20/0x40 [ 18.544079] kasan_save_alloc_info+0x40/0x58 [ 18.544174] __kasan_kmalloc+0xd4/0xd8 [ 18.544401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.544447] kasan_atomics+0xb8/0x2e0 [ 18.544908] kunit_try_run_case+0x170/0x3f0 [ 18.545189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.545240] kthread+0x328/0x630 [ 18.545276] ret_from_fork+0x10/0x20 [ 18.545313] [ 18.545553] The buggy address belongs to the object at fff00000c653a200 [ 18.545553] which belongs to the cache kmalloc-64 of size 64 [ 18.546113] The buggy address is located 0 bytes to the right of [ 18.546113] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.546201] [ 18.546225] The buggy address belongs to the physical page: [ 18.546797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.546942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.546998] page_type: f5(slab) [ 18.547372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.547593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.547645] page dumped because: kasan: bad access detected [ 18.547904] [ 18.548299] Memory state around the buggy address: [ 18.548507] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.548623] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.548755] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.549342] ^ [ 18.549744] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.549836] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.549941] ================================================================== [ 18.461019] ================================================================== [ 18.461075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.461124] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.461176] [ 18.462208] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.462326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.462411] Hardware name: linux,dummy-virt (DT) [ 18.462486] Call trace: [ 18.462513] show_stack+0x20/0x38 (C) [ 18.462565] dump_stack_lvl+0x8c/0xd0 [ 18.462710] print_report+0x118/0x5d0 [ 18.462774] kasan_report+0xdc/0x128 [ 18.462822] kasan_check_range+0x100/0x1a8 [ 18.462878] __kasan_check_write+0x20/0x30 [ 18.463426] kasan_atomics_helper+0xf20/0x4858 [ 18.463491] kasan_atomics+0x198/0x2e0 [ 18.463954] kunit_try_run_case+0x170/0x3f0 [ 18.464348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.464420] kthread+0x328/0x630 [ 18.464466] ret_from_fork+0x10/0x20 [ 18.464515] [ 18.464535] Allocated by task 266: [ 18.464566] kasan_save_stack+0x3c/0x68 [ 18.465422] kasan_save_track+0x20/0x40 [ 18.465484] kasan_save_alloc_info+0x40/0x58 [ 18.465530] __kasan_kmalloc+0xd4/0xd8 [ 18.465606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.465695] kasan_atomics+0xb8/0x2e0 [ 18.465968] kunit_try_run_case+0x170/0x3f0 [ 18.466241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.466538] kthread+0x328/0x630 [ 18.466580] ret_from_fork+0x10/0x20 [ 18.467031] [ 18.467060] The buggy address belongs to the object at fff00000c653a200 [ 18.467060] which belongs to the cache kmalloc-64 of size 64 [ 18.467426] The buggy address is located 0 bytes to the right of [ 18.467426] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.467834] [ 18.467862] The buggy address belongs to the physical page: [ 18.467897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.468520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.468938] page_type: f5(slab) [ 18.469316] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.469535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.469591] page dumped because: kasan: bad access detected [ 18.469627] [ 18.470034] Memory state around the buggy address: [ 18.471299] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.471763] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.472032] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.472134] ^ [ 18.472172] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.472642] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.473116] ================================================================== [ 18.295918] ================================================================== [ 18.296367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 18.296584] Write of size 4 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.299708] Allocated by task 266: [ 18.299740] kasan_save_stack+0x3c/0x68 [ 18.299783] kasan_save_track+0x20/0x40 [ 18.299822] kasan_save_alloc_info+0x40/0x58 [ 18.299864] __kasan_kmalloc+0xd4/0xd8 [ 18.299903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.299945] kasan_atomics+0xb8/0x2e0 [ 18.299983] kunit_try_run_case+0x170/0x3f0 [ 18.300022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.300068] kthread+0x328/0x630 [ 18.300102] ret_from_fork+0x10/0x20 [ 18.300139] [ 18.300161] The buggy address belongs to the object at fff00000c653a200 [ 18.300161] which belongs to the cache kmalloc-64 of size 64 [ 18.300312] [ 18.300370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.302744] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.305849] [ 18.307012] __asan_report_load4_noabort+0x20/0x30 [ 18.309237] kasan_save_track+0x20/0x40 [ 18.309953] kasan_save_alloc_info+0x40/0x58 [ 18.310289] __kasan_kmalloc+0xd4/0xd8 [ 18.310620] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.310881] kasan_atomics+0xb8/0x2e0 [ 18.311159] kunit_try_run_case+0x170/0x3f0 [ 18.311476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.311665] kthread+0x328/0x630 [ 18.312004] ret_from_fork+0x10/0x20 [ 18.312047] [ 18.312705] The buggy address belongs to the object at fff00000c653a200 [ 18.312705] which belongs to the cache kmalloc-64 of size 64 [ 18.312796] The buggy address is located 0 bytes to the right of [ 18.312796] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.313266] [ 18.313293] The buggy address belongs to the physical page: [ 18.313331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.313393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.313448] page_type: f5(slab) [ 18.313492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.313943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.314013] page dumped because: kasan: bad access detected [ 18.314348] [ 18.314372] Memory state around the buggy address: [ 18.314615] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.314678] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.314984] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.315114] ^ [ 18.315214] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.315260] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.315601] ================================================================== [ 18.638809] ================================================================== [ 18.638871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.639149] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.639302] [ 18.639611] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.639800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.639834] Hardware name: linux,dummy-virt (DT) [ 18.639912] Call trace: [ 18.640047] show_stack+0x20/0x38 (C) [ 18.640154] dump_stack_lvl+0x8c/0xd0 [ 18.640239] print_report+0x118/0x5d0 [ 18.640524] kasan_report+0xdc/0x128 [ 18.640603] __asan_report_load8_noabort+0x20/0x30 [ 18.640656] kasan_atomics_helper+0x3e20/0x4858 [ 18.640832] kasan_atomics+0x198/0x2e0 [ 18.641077] kunit_try_run_case+0x170/0x3f0 [ 18.641256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.641471] kthread+0x328/0x630 [ 18.641593] ret_from_fork+0x10/0x20 [ 18.641759] [ 18.641782] Allocated by task 266: [ 18.641816] kasan_save_stack+0x3c/0x68 [ 18.641859] kasan_save_track+0x20/0x40 [ 18.641899] kasan_save_alloc_info+0x40/0x58 [ 18.642231] __kasan_kmalloc+0xd4/0xd8 [ 18.642336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.642658] kasan_atomics+0xb8/0x2e0 [ 18.642837] kunit_try_run_case+0x170/0x3f0 [ 18.642894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.643116] kthread+0x328/0x630 [ 18.643561] ret_from_fork+0x10/0x20 [ 18.643679] [ 18.644013] The buggy address belongs to the object at fff00000c653a200 [ 18.644013] which belongs to the cache kmalloc-64 of size 64 [ 18.644111] The buggy address is located 0 bytes to the right of [ 18.644111] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.644304] [ 18.644396] The buggy address belongs to the physical page: [ 18.644468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.644653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.644736] page_type: f5(slab) [ 18.644810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.644959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.645006] page dumped because: kasan: bad access detected [ 18.645041] [ 18.645235] Memory state around the buggy address: [ 18.645454] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.645551] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.645615] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.645803] ^ [ 18.645889] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.646101] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.646165] ================================================================== [ 18.421430] ================================================================== [ 18.421482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.421534] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.421587] [ 18.422118] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.422385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.422551] Hardware name: linux,dummy-virt (DT) [ 18.422596] Call trace: [ 18.422619] show_stack+0x20/0x38 (C) [ 18.422843] dump_stack_lvl+0x8c/0xd0 [ 18.422895] print_report+0x118/0x5d0 [ 18.422943] kasan_report+0xdc/0x128 [ 18.422989] __asan_report_load8_noabort+0x20/0x30 [ 18.423043] kasan_atomics_helper+0x3f58/0x4858 [ 18.423094] kasan_atomics+0x198/0x2e0 [ 18.423140] kunit_try_run_case+0x170/0x3f0 [ 18.423199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.423749] kthread+0x328/0x630 [ 18.423812] ret_from_fork+0x10/0x20 [ 18.423876] [ 18.424547] Allocated by task 266: [ 18.424589] kasan_save_stack+0x3c/0x68 [ 18.424697] kasan_save_track+0x20/0x40 [ 18.425134] kasan_save_alloc_info+0x40/0x58 [ 18.425334] __kasan_kmalloc+0xd4/0xd8 [ 18.425625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.425671] kasan_atomics+0xb8/0x2e0 [ 18.425810] kunit_try_run_case+0x170/0x3f0 [ 18.425871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.426128] kthread+0x328/0x630 [ 18.426396] ret_from_fork+0x10/0x20 [ 18.426765] [ 18.426789] The buggy address belongs to the object at fff00000c653a200 [ 18.426789] which belongs to the cache kmalloc-64 of size 64 [ 18.426851] The buggy address is located 0 bytes to the right of [ 18.426851] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.426919] [ 18.426940] The buggy address belongs to the physical page: [ 18.427726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.428111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.428168] page_type: f5(slab) [ 18.428220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.428274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.428325] page dumped because: kasan: bad access detected [ 18.428359] [ 18.428380] Memory state around the buggy address: [ 18.428414] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.428462] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.428870] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.428931] ^ [ 18.429148] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.429391] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.429470] ================================================================== [ 18.567668] ================================================================== [ 18.567862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.568000] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.568074] [ 18.568147] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.568262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.568307] Hardware name: linux,dummy-virt (DT) [ 18.568341] Call trace: [ 18.568365] show_stack+0x20/0x38 (C) [ 18.568415] dump_stack_lvl+0x8c/0xd0 [ 18.568466] print_report+0x118/0x5d0 [ 18.568689] kasan_report+0xdc/0x128 [ 18.568774] kasan_check_range+0x100/0x1a8 [ 18.568826] __kasan_check_write+0x20/0x30 [ 18.568892] kasan_atomics_helper+0x147c/0x4858 [ 18.568981] kasan_atomics+0x198/0x2e0 [ 18.569223] kunit_try_run_case+0x170/0x3f0 [ 18.569293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.569386] kthread+0x328/0x630 [ 18.569442] ret_from_fork+0x10/0x20 [ 18.569489] [ 18.569542] Allocated by task 266: [ 18.569626] kasan_save_stack+0x3c/0x68 [ 18.569697] kasan_save_track+0x20/0x40 [ 18.569737] kasan_save_alloc_info+0x40/0x58 [ 18.570018] __kasan_kmalloc+0xd4/0xd8 [ 18.570083] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.570125] kasan_atomics+0xb8/0x2e0 [ 18.570197] kunit_try_run_case+0x170/0x3f0 [ 18.570238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.570284] kthread+0x328/0x630 [ 18.570317] ret_from_fork+0x10/0x20 [ 18.570365] [ 18.570396] The buggy address belongs to the object at fff00000c653a200 [ 18.570396] which belongs to the cache kmalloc-64 of size 64 [ 18.570652] The buggy address is located 0 bytes to the right of [ 18.570652] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.570730] [ 18.570752] The buggy address belongs to the physical page: [ 18.570918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.571130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.571282] page_type: f5(slab) [ 18.571325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.571379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.571727] page dumped because: kasan: bad access detected [ 18.571815] [ 18.572193] Memory state around the buggy address: [ 18.572570] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.572794] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.573041] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.573191] ^ [ 18.573230] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.573303] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.573342] ================================================================== [ 18.317536] ================================================================== [ 18.317597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 18.317702] [ 18.319596] Allocated by task 266: [ 18.320813] kasan_atomics+0xb8/0x2e0 [ 18.321928] [ 18.323133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.326208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 18.329599] dump_stack_lvl+0x8c/0xd0 [ 18.332499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.333947] __kasan_kmalloc+0xd4/0xd8 [ 18.333989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.334168] kthread+0x328/0x630 [ 18.335396] The buggy address is located 0 bytes to the right of [ 18.335396] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.337908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.339505] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.343238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.345393] kasan_atomics_helper+0xc08/0x4858 [ 18.347336] __kasan_kmalloc+0xd4/0xd8 [ 18.347376] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.347418] kasan_atomics+0xb8/0x2e0 [ 18.348427] The buggy address is located 0 bytes to the right of [ 18.348427] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.349681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.350809] page dumped because: kasan: bad access detected [ 18.350947] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.351157] ================================================================== [ 18.268923] ================================================================== [ 18.269032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.270461] __kasan_check_write+0x20/0x30 [ 18.270615] kunit_try_run_case+0x170/0x3f0 [ 18.270689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.272954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.277493] ================================================================== [ 18.634729] ================================================================== [ 18.634876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.634932] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.634994] [ 18.635026] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.635110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.635145] Hardware name: linux,dummy-virt (DT) [ 18.635190] Call trace: [ 18.635214] show_stack+0x20/0x38 (C) [ 18.635274] dump_stack_lvl+0x8c/0xd0 [ 18.635323] print_report+0x118/0x5d0 [ 18.635371] kasan_report+0xdc/0x128 [ 18.635418] kasan_check_range+0x100/0x1a8 [ 18.635466] __kasan_check_write+0x20/0x30 [ 18.635511] kasan_atomics_helper+0x175c/0x4858 [ 18.635569] kasan_atomics+0x198/0x2e0 [ 18.635615] kunit_try_run_case+0x170/0x3f0 [ 18.635663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.635716] kthread+0x328/0x630 [ 18.635767] ret_from_fork+0x10/0x20 [ 18.635816] [ 18.635836] Allocated by task 266: [ 18.635865] kasan_save_stack+0x3c/0x68 [ 18.635907] kasan_save_track+0x20/0x40 [ 18.635954] kasan_save_alloc_info+0x40/0x58 [ 18.635997] __kasan_kmalloc+0xd4/0xd8 [ 18.636034] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.636081] kasan_atomics+0xb8/0x2e0 [ 18.636123] kunit_try_run_case+0x170/0x3f0 [ 18.636164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.636220] kthread+0x328/0x630 [ 18.636252] ret_from_fork+0x10/0x20 [ 18.636289] [ 18.636309] The buggy address belongs to the object at fff00000c653a200 [ 18.636309] which belongs to the cache kmalloc-64 of size 64 [ 18.636375] The buggy address is located 0 bytes to the right of [ 18.636375] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.636443] [ 18.636470] The buggy address belongs to the physical page: [ 18.636502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.636556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.636606] page_type: f5(slab) [ 18.636642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.636696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.636740] page dumped because: kasan: bad access detected [ 18.636775] [ 18.636794] Memory state around the buggy address: [ 18.636827] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.636872] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.636918] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.636959] ^ [ 18.637732] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.637848] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.638289] ================================================================== [ 18.561006] ================================================================== [ 18.561136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.561263] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.561316] [ 18.561361] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.561446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.561473] Hardware name: linux,dummy-virt (DT) [ 18.561506] Call trace: [ 18.561570] show_stack+0x20/0x38 (C) [ 18.561620] dump_stack_lvl+0x8c/0xd0 [ 18.561804] print_report+0x118/0x5d0 [ 18.561937] kasan_report+0xdc/0x128 [ 18.562026] kasan_check_range+0x100/0x1a8 [ 18.562253] __kasan_check_write+0x20/0x30 [ 18.562462] kasan_atomics_helper+0x1414/0x4858 [ 18.562614] kasan_atomics+0x198/0x2e0 [ 18.562777] kunit_try_run_case+0x170/0x3f0 [ 18.562919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.562976] kthread+0x328/0x630 [ 18.563057] ret_from_fork+0x10/0x20 [ 18.563458] [ 18.563524] Allocated by task 266: [ 18.563706] kasan_save_stack+0x3c/0x68 [ 18.563879] kasan_save_track+0x20/0x40 [ 18.563989] kasan_save_alloc_info+0x40/0x58 [ 18.564033] __kasan_kmalloc+0xd4/0xd8 [ 18.564132] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.564197] kasan_atomics+0xb8/0x2e0 [ 18.564233] kunit_try_run_case+0x170/0x3f0 [ 18.564342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.564514] kthread+0x328/0x630 [ 18.564598] ret_from_fork+0x10/0x20 [ 18.564712] [ 18.564789] The buggy address belongs to the object at fff00000c653a200 [ 18.564789] which belongs to the cache kmalloc-64 of size 64 [ 18.564853] The buggy address is located 0 bytes to the right of [ 18.564853] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.565023] [ 18.565156] The buggy address belongs to the physical page: [ 18.565325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.565520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.565614] page_type: f5(slab) [ 18.565985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.566097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.566142] page dumped because: kasan: bad access detected [ 18.566176] [ 18.566365] Memory state around the buggy address: [ 18.566400] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.566447] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.566631] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.566755] ^ [ 18.566913] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.566976] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.567038] ================================================================== [ 18.523672] ================================================================== [ 18.523806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.523863] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.523914] [ 18.523946] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.524036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.524171] Hardware name: linux,dummy-virt (DT) [ 18.524313] Call trace: [ 18.524438] show_stack+0x20/0x38 (C) [ 18.524659] dump_stack_lvl+0x8c/0xd0 [ 18.524759] print_report+0x118/0x5d0 [ 18.524811] kasan_report+0xdc/0x128 [ 18.524858] kasan_check_range+0x100/0x1a8 [ 18.524911] __kasan_check_write+0x20/0x30 [ 18.525041] kasan_atomics_helper+0x11f8/0x4858 [ 18.525089] kasan_atomics+0x198/0x2e0 [ 18.525240] kunit_try_run_case+0x170/0x3f0 [ 18.525314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.525369] kthread+0x328/0x630 [ 18.525410] ret_from_fork+0x10/0x20 [ 18.525459] [ 18.525479] Allocated by task 266: [ 18.525534] kasan_save_stack+0x3c/0x68 [ 18.525578] kasan_save_track+0x20/0x40 [ 18.525725] kasan_save_alloc_info+0x40/0x58 [ 18.525769] __kasan_kmalloc+0xd4/0xd8 [ 18.525807] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.525849] kasan_atomics+0xb8/0x2e0 [ 18.525891] kunit_try_run_case+0x170/0x3f0 [ 18.525931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.525985] kthread+0x328/0x630 [ 18.526137] ret_from_fork+0x10/0x20 [ 18.526212] [ 18.526235] The buggy address belongs to the object at fff00000c653a200 [ 18.526235] which belongs to the cache kmalloc-64 of size 64 [ 18.526296] The buggy address is located 0 bytes to the right of [ 18.526296] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.526386] [ 18.526408] The buggy address belongs to the physical page: [ 18.526477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.526532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.526601] page_type: f5(slab) [ 18.526640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.526694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.526783] page dumped because: kasan: bad access detected [ 18.526906] [ 18.526927] Memory state around the buggy address: [ 18.527083] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.527130] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.527174] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.527355] ^ [ 18.527393] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.527460] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.527548] ================================================================== [ 18.399941] ================================================================== [ 18.399996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.400051] Read of size 4 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.400102] [ 18.400134] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.400706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.401053] Hardware name: linux,dummy-virt (DT) [ 18.401535] Call trace: [ 18.401561] show_stack+0x20/0x38 (C) [ 18.401626] dump_stack_lvl+0x8c/0xd0 [ 18.401683] print_report+0x118/0x5d0 [ 18.402177] kasan_report+0xdc/0x128 [ 18.402421] __asan_report_load4_noabort+0x20/0x30 [ 18.402595] kasan_atomics_helper+0x3e04/0x4858 [ 18.402804] kasan_atomics+0x198/0x2e0 [ 18.403110] kunit_try_run_case+0x170/0x3f0 [ 18.403253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.403311] kthread+0x328/0x630 [ 18.404411] ret_from_fork+0x10/0x20 [ 18.404491] [ 18.404512] Allocated by task 266: [ 18.404925] kasan_save_stack+0x3c/0x68 [ 18.405020] kasan_save_track+0x20/0x40 [ 18.405190] kasan_save_alloc_info+0x40/0x58 [ 18.405235] __kasan_kmalloc+0xd4/0xd8 [ 18.405698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.405767] kasan_atomics+0xb8/0x2e0 [ 18.405833] kunit_try_run_case+0x170/0x3f0 [ 18.406214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.406331] kthread+0x328/0x630 [ 18.406602] ret_from_fork+0x10/0x20 [ 18.406645] [ 18.406997] The buggy address belongs to the object at fff00000c653a200 [ 18.406997] which belongs to the cache kmalloc-64 of size 64 [ 18.407072] The buggy address is located 0 bytes to the right of [ 18.407072] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.407141] [ 18.407506] The buggy address belongs to the physical page: [ 18.407545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.407926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.408161] page_type: f5(slab) [ 18.408443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.408509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.409006] page dumped because: kasan: bad access detected [ 18.409050] [ 18.409070] Memory state around the buggy address: [ 18.409103] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.409150] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.409206] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.409612] ^ [ 18.409669] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.409784] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.409906] ================================================================== [ 18.625450] ================================================================== [ 18.625718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.625815] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.626157] [ 18.626230] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.626506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.626735] Hardware name: linux,dummy-virt (DT) [ 18.626828] Call trace: [ 18.626942] show_stack+0x20/0x38 (C) [ 18.627154] dump_stack_lvl+0x8c/0xd0 [ 18.627277] print_report+0x118/0x5d0 [ 18.627562] kasan_report+0xdc/0x128 [ 18.627682] __asan_report_load8_noabort+0x20/0x30 [ 18.627850] kasan_atomics_helper+0x3e10/0x4858 [ 18.628139] kasan_atomics+0x198/0x2e0 [ 18.628372] kunit_try_run_case+0x170/0x3f0 [ 18.628540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.628682] kthread+0x328/0x630 [ 18.628944] ret_from_fork+0x10/0x20 [ 18.629146] [ 18.629289] Allocated by task 266: [ 18.629423] kasan_save_stack+0x3c/0x68 [ 18.629610] kasan_save_track+0x20/0x40 [ 18.629693] kasan_save_alloc_info+0x40/0x58 [ 18.629901] __kasan_kmalloc+0xd4/0xd8 [ 18.629994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.630131] kasan_atomics+0xb8/0x2e0 [ 18.630242] kunit_try_run_case+0x170/0x3f0 [ 18.630293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.630550] kthread+0x328/0x630 [ 18.630651] ret_from_fork+0x10/0x20 [ 18.630832] [ 18.631110] The buggy address belongs to the object at fff00000c653a200 [ 18.631110] which belongs to the cache kmalloc-64 of size 64 [ 18.631279] The buggy address is located 0 bytes to the right of [ 18.631279] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.631574] [ 18.631699] The buggy address belongs to the physical page: [ 18.631776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.631998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.632239] page_type: f5(slab) [ 18.632306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.632386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.632431] page dumped because: kasan: bad access detected [ 18.632471] [ 18.632710] Memory state around the buggy address: [ 18.632877] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.633203] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.633352] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.633581] ^ [ 18.633626] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.633674] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.633714] ================================================================== [ 18.582790] ================================================================== [ 18.582850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.582903] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.582955] [ 18.582998] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.583092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.583122] Hardware name: linux,dummy-virt (DT) [ 18.583155] Call trace: [ 18.583189] show_stack+0x20/0x38 (C) [ 18.583247] dump_stack_lvl+0x8c/0xd0 [ 18.583295] print_report+0x118/0x5d0 [ 18.583343] kasan_report+0xdc/0x128 [ 18.583388] kasan_check_range+0x100/0x1a8 [ 18.583446] __kasan_check_write+0x20/0x30 [ 18.583491] kasan_atomics_helper+0x154c/0x4858 [ 18.583541] kasan_atomics+0x198/0x2e0 [ 18.583587] kunit_try_run_case+0x170/0x3f0 [ 18.583633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.583689] kthread+0x328/0x630 [ 18.583742] ret_from_fork+0x10/0x20 [ 18.583790] [ 18.583810] Allocated by task 266: [ 18.583849] kasan_save_stack+0x3c/0x68 [ 18.583891] kasan_save_track+0x20/0x40 [ 18.583940] kasan_save_alloc_info+0x40/0x58 [ 18.583981] __kasan_kmalloc+0xd4/0xd8 [ 18.584019] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.584064] kasan_atomics+0xb8/0x2e0 [ 18.584109] kunit_try_run_case+0x170/0x3f0 [ 18.584155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.584210] kthread+0x328/0x630 [ 18.584254] ret_from_fork+0x10/0x20 [ 18.584293] [ 18.584315] The buggy address belongs to the object at fff00000c653a200 [ 18.584315] which belongs to the cache kmalloc-64 of size 64 [ 18.584376] The buggy address is located 0 bytes to the right of [ 18.584376] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.585091] [ 18.585130] The buggy address belongs to the physical page: [ 18.585166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.585251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.585466] page_type: f5(slab) [ 18.585901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.586077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.586162] page dumped because: kasan: bad access detected [ 18.586769] [ 18.586971] Memory state around the buggy address: [ 18.587012] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.587464] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.587563] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.587907] ^ [ 18.587968] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.588323] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.588386] ================================================================== [ 18.599254] ================================================================== [ 18.599310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.599516] Read of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.599579] [ 18.599797] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.599895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.600161] Hardware name: linux,dummy-virt (DT) [ 18.600229] Call trace: [ 18.600489] show_stack+0x20/0x38 (C) [ 18.600562] dump_stack_lvl+0x8c/0xd0 [ 18.600613] print_report+0x118/0x5d0 [ 18.600811] kasan_report+0xdc/0x128 [ 18.600884] __asan_report_load8_noabort+0x20/0x30 [ 18.600941] kasan_atomics_helper+0x3db0/0x4858 [ 18.601324] kasan_atomics+0x198/0x2e0 [ 18.601587] kunit_try_run_case+0x170/0x3f0 [ 18.601935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.602122] kthread+0x328/0x630 [ 18.602391] ret_from_fork+0x10/0x20 [ 18.602451] [ 18.602483] Allocated by task 266: [ 18.602515] kasan_save_stack+0x3c/0x68 [ 18.602567] kasan_save_track+0x20/0x40 [ 18.602605] kasan_save_alloc_info+0x40/0x58 [ 18.602647] __kasan_kmalloc+0xd4/0xd8 [ 18.602684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.602735] kasan_atomics+0xb8/0x2e0 [ 18.602772] kunit_try_run_case+0x170/0x3f0 [ 18.602828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.602879] kthread+0x328/0x630 [ 18.602929] ret_from_fork+0x10/0x20 [ 18.602977] [ 18.603000] The buggy address belongs to the object at fff00000c653a200 [ 18.603000] which belongs to the cache kmalloc-64 of size 64 [ 18.603062] The buggy address is located 0 bytes to the right of [ 18.603062] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.603130] [ 18.603162] The buggy address belongs to the physical page: [ 18.603211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.603268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.603317] page_type: f5(slab) [ 18.603357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.603421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.603474] page dumped because: kasan: bad access detected [ 18.603518] [ 18.603556] Memory state around the buggy address: [ 18.603590] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.603636] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.603682] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.603724] ^ [ 18.603758] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.603801] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.603841] ================================================================== [ 18.574455] ================================================================== [ 18.574556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.574639] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.574694] [ 18.574874] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.574970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.575001] Hardware name: linux,dummy-virt (DT) [ 18.575035] Call trace: [ 18.575059] show_stack+0x20/0x38 (C) [ 18.575109] dump_stack_lvl+0x8c/0xd0 [ 18.575157] print_report+0x118/0x5d0 [ 18.575220] kasan_report+0xdc/0x128 [ 18.575265] kasan_check_range+0x100/0x1a8 [ 18.575315] __kasan_check_write+0x20/0x30 [ 18.575360] kasan_atomics_helper+0x14e4/0x4858 [ 18.575410] kasan_atomics+0x198/0x2e0 [ 18.575457] kunit_try_run_case+0x170/0x3f0 [ 18.575503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.575557] kthread+0x328/0x630 [ 18.575599] ret_from_fork+0x10/0x20 [ 18.575646] [ 18.576339] Allocated by task 266: [ 18.576393] kasan_save_stack+0x3c/0x68 [ 18.576757] kasan_save_track+0x20/0x40 [ 18.576821] kasan_save_alloc_info+0x40/0x58 [ 18.576937] __kasan_kmalloc+0xd4/0xd8 [ 18.577025] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.577256] kasan_atomics+0xb8/0x2e0 [ 18.577322] kunit_try_run_case+0x170/0x3f0 [ 18.577368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.577415] kthread+0x328/0x630 [ 18.577448] ret_from_fork+0x10/0x20 [ 18.578037] [ 18.578078] The buggy address belongs to the object at fff00000c653a200 [ 18.578078] which belongs to the cache kmalloc-64 of size 64 [ 18.578237] The buggy address is located 0 bytes to the right of [ 18.578237] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.578597] [ 18.578664] The buggy address belongs to the physical page: [ 18.578767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.578849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.579253] page_type: f5(slab) [ 18.579393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.579471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.579850] page dumped because: kasan: bad access detected [ 18.579941] [ 18.579964] Memory state around the buggy address: [ 18.580001] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.580406] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.580616] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.580856] ^ [ 18.580894] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.581298] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.581438] ================================================================== [ 18.646994] ================================================================== [ 18.647242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.647405] Write of size 8 at addr fff00000c653a230 by task kunit_try_catch/266 [ 18.647494] [ 18.647531] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.647618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.647653] Hardware name: linux,dummy-virt (DT) [ 18.647687] Call trace: [ 18.647710] show_stack+0x20/0x38 (C) [ 18.647950] dump_stack_lvl+0x8c/0xd0 [ 18.648067] print_report+0x118/0x5d0 [ 18.648121] kasan_report+0xdc/0x128 [ 18.648344] kasan_check_range+0x100/0x1a8 [ 18.648414] __kasan_check_write+0x20/0x30 [ 18.648520] kasan_atomics_helper+0x17ec/0x4858 [ 18.648667] kasan_atomics+0x198/0x2e0 [ 18.648720] kunit_try_run_case+0x170/0x3f0 [ 18.648955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.649155] kthread+0x328/0x630 [ 18.649368] ret_from_fork+0x10/0x20 [ 18.649473] [ 18.649752] Allocated by task 266: [ 18.649874] kasan_save_stack+0x3c/0x68 [ 18.650118] kasan_save_track+0x20/0x40 [ 18.650277] kasan_save_alloc_info+0x40/0x58 [ 18.650425] __kasan_kmalloc+0xd4/0xd8 [ 18.650528] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.650790] kasan_atomics+0xb8/0x2e0 [ 18.650960] kunit_try_run_case+0x170/0x3f0 [ 18.651159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.651282] kthread+0x328/0x630 [ 18.651406] ret_from_fork+0x10/0x20 [ 18.651496] [ 18.651519] The buggy address belongs to the object at fff00000c653a200 [ 18.651519] which belongs to the cache kmalloc-64 of size 64 [ 18.651824] The buggy address is located 0 bytes to the right of [ 18.651824] allocated 48-byte region [fff00000c653a200, fff00000c653a230) [ 18.651958] [ 18.652082] The buggy address belongs to the physical page: [ 18.652276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 18.652578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.652758] page_type: f5(slab) [ 18.652854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.653132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.653242] page dumped because: kasan: bad access detected [ 18.653386] [ 18.653590] Memory state around the buggy address: [ 18.653820] fff00000c653a100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.653907] fff00000c653a180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.654168] >fff00000c653a200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.654323] ^ [ 18.654570] fff00000c653a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.654621] fff00000c653a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.654679] ==================================================================
[ 14.999195] ================================================================== [ 14.999530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.999893] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.000199] [ 15.000311] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.000354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.000366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.000389] Call Trace: [ 15.000403] <TASK> [ 15.000419] dump_stack_lvl+0x73/0xb0 [ 15.000495] print_report+0xd1/0x610 [ 15.000520] ? __virt_addr_valid+0x1db/0x2d0 [ 15.000544] ? kasan_atomics_helper+0x3df/0x5450 [ 15.000567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.000592] ? kasan_atomics_helper+0x3df/0x5450 [ 15.000615] kasan_report+0x141/0x180 [ 15.000639] ? kasan_atomics_helper+0x3df/0x5450 [ 15.000666] kasan_check_range+0x10c/0x1c0 [ 15.000691] __kasan_check_read+0x15/0x20 [ 15.000712] kasan_atomics_helper+0x3df/0x5450 [ 15.000736] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.000773] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.000811] ? kasan_atomics+0x152/0x310 [ 15.000840] kasan_atomics+0x1dc/0x310 [ 15.000864] ? __pfx_kasan_atomics+0x10/0x10 [ 15.000890] ? __pfx_read_tsc+0x10/0x10 [ 15.000912] ? ktime_get_ts64+0x86/0x230 [ 15.000938] kunit_try_run_case+0x1a5/0x480 [ 15.000965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.000989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.001015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.001042] ? __kthread_parkme+0x82/0x180 [ 15.001064] ? preempt_count_sub+0x50/0x80 [ 15.001090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.001116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.001144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.001171] kthread+0x337/0x6f0 [ 15.001192] ? trace_preempt_on+0x20/0xc0 [ 15.001217] ? __pfx_kthread+0x10/0x10 [ 15.001240] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.001263] ? calculate_sigpending+0x7b/0xa0 [ 15.001289] ? __pfx_kthread+0x10/0x10 [ 15.001312] ret_from_fork+0x116/0x1d0 [ 15.001368] ? __pfx_kthread+0x10/0x10 [ 15.001391] ret_from_fork_asm+0x1a/0x30 [ 15.001424] </TASK> [ 15.001436] [ 15.009591] Allocated by task 282: [ 15.009728] kasan_save_stack+0x45/0x70 [ 15.009892] kasan_save_track+0x18/0x40 [ 15.010030] kasan_save_alloc_info+0x3b/0x50 [ 15.010247] __kasan_kmalloc+0xb7/0xc0 [ 15.010444] __kmalloc_cache_noprof+0x189/0x420 [ 15.010670] kasan_atomics+0x95/0x310 [ 15.010872] kunit_try_run_case+0x1a5/0x480 [ 15.011021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.011257] kthread+0x337/0x6f0 [ 15.011605] ret_from_fork+0x116/0x1d0 [ 15.011817] ret_from_fork_asm+0x1a/0x30 [ 15.012022] [ 15.012123] The buggy address belongs to the object at ffff8881038e7800 [ 15.012123] which belongs to the cache kmalloc-64 of size 64 [ 15.012673] The buggy address is located 0 bytes to the right of [ 15.012673] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.013090] [ 15.013187] The buggy address belongs to the physical page: [ 15.013484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.013983] flags: 0x200000000000000(node=0|zone=2) [ 15.014226] page_type: f5(slab) [ 15.014526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.014898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.015199] page dumped because: kasan: bad access detected [ 15.015513] [ 15.015597] Memory state around the buggy address: [ 15.015826] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.016119] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.016982] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.017207] ^ [ 15.017432] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.018492] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.018810] ================================================================== [ 16.341968] ================================================================== [ 16.342519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.342969] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.343274] [ 16.343376] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.343418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.343430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.343452] Call Trace: [ 16.343466] <TASK> [ 16.343480] dump_stack_lvl+0x73/0xb0 [ 16.343510] print_report+0xd1/0x610 [ 16.343534] ? __virt_addr_valid+0x1db/0x2d0 [ 16.343557] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.343580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.343617] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.343640] kasan_report+0x141/0x180 [ 16.343675] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.343709] __asan_report_load8_noabort+0x18/0x20 [ 16.343736] kasan_atomics_helper+0x4fa5/0x5450 [ 16.343770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.343795] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.343822] ? kasan_atomics+0x152/0x310 [ 16.343849] kasan_atomics+0x1dc/0x310 [ 16.343873] ? __pfx_kasan_atomics+0x10/0x10 [ 16.343899] ? __pfx_read_tsc+0x10/0x10 [ 16.343922] ? ktime_get_ts64+0x86/0x230 [ 16.343949] kunit_try_run_case+0x1a5/0x480 [ 16.343976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.344000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.344026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.344052] ? __kthread_parkme+0x82/0x180 [ 16.344074] ? preempt_count_sub+0x50/0x80 [ 16.344099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.344124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.344151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.344178] kthread+0x337/0x6f0 [ 16.344198] ? trace_preempt_on+0x20/0xc0 [ 16.344222] ? __pfx_kthread+0x10/0x10 [ 16.344244] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.344267] ? calculate_sigpending+0x7b/0xa0 [ 16.344292] ? __pfx_kthread+0x10/0x10 [ 16.344315] ret_from_fork+0x116/0x1d0 [ 16.344335] ? __pfx_kthread+0x10/0x10 [ 16.344356] ret_from_fork_asm+0x1a/0x30 [ 16.344388] </TASK> [ 16.344399] [ 16.352056] Allocated by task 282: [ 16.352253] kasan_save_stack+0x45/0x70 [ 16.352430] kasan_save_track+0x18/0x40 [ 16.352650] kasan_save_alloc_info+0x3b/0x50 [ 16.352861] __kasan_kmalloc+0xb7/0xc0 [ 16.353002] __kmalloc_cache_noprof+0x189/0x420 [ 16.353162] kasan_atomics+0x95/0x310 [ 16.353297] kunit_try_run_case+0x1a5/0x480 [ 16.353444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.353706] kthread+0x337/0x6f0 [ 16.354007] ret_from_fork+0x116/0x1d0 [ 16.354203] ret_from_fork_asm+0x1a/0x30 [ 16.354414] [ 16.354524] The buggy address belongs to the object at ffff8881038e7800 [ 16.354524] which belongs to the cache kmalloc-64 of size 64 [ 16.355084] The buggy address is located 0 bytes to the right of [ 16.355084] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.355610] [ 16.355684] The buggy address belongs to the physical page: [ 16.355917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.356235] flags: 0x200000000000000(node=0|zone=2) [ 16.356396] page_type: f5(slab) [ 16.356710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.357101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.357427] page dumped because: kasan: bad access detected [ 16.357682] [ 16.357795] Memory state around the buggy address: [ 16.357951] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.358169] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.358506] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.358840] ^ [ 16.359060] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.359276] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.359615] ================================================================== [ 15.523987] ================================================================== [ 15.524304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.525135] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.525644] [ 15.525730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.525816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.525829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.525861] Call Trace: [ 15.525877] <TASK> [ 15.525894] dump_stack_lvl+0x73/0xb0 [ 15.525953] print_report+0xd1/0x610 [ 15.525976] ? __virt_addr_valid+0x1db/0x2d0 [ 15.525999] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.526033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.526058] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.526108] kasan_report+0x141/0x180 [ 15.526131] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.526170] __asan_report_load4_noabort+0x18/0x20 [ 15.526197] kasan_atomics_helper+0x4a36/0x5450 [ 15.526248] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.526272] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.526309] ? kasan_atomics+0x152/0x310 [ 15.526355] kasan_atomics+0x1dc/0x310 [ 15.526395] ? __pfx_kasan_atomics+0x10/0x10 [ 15.526420] ? __pfx_read_tsc+0x10/0x10 [ 15.526454] ? ktime_get_ts64+0x86/0x230 [ 15.526480] kunit_try_run_case+0x1a5/0x480 [ 15.526506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.526583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.526609] ? __kthread_parkme+0x82/0x180 [ 15.526641] ? preempt_count_sub+0x50/0x80 [ 15.526667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.526745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.526787] kthread+0x337/0x6f0 [ 15.526808] ? trace_preempt_on+0x20/0xc0 [ 15.526833] ? __pfx_kthread+0x10/0x10 [ 15.526882] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.526906] ? calculate_sigpending+0x7b/0xa0 [ 15.526932] ? __pfx_kthread+0x10/0x10 [ 15.526967] ret_from_fork+0x116/0x1d0 [ 15.526987] ? __pfx_kthread+0x10/0x10 [ 15.527009] ret_from_fork_asm+0x1a/0x30 [ 15.527041] </TASK> [ 15.527052] [ 15.535306] Allocated by task 282: [ 15.535563] kasan_save_stack+0x45/0x70 [ 15.535778] kasan_save_track+0x18/0x40 [ 15.535970] kasan_save_alloc_info+0x3b/0x50 [ 15.536178] __kasan_kmalloc+0xb7/0xc0 [ 15.536320] __kmalloc_cache_noprof+0x189/0x420 [ 15.536503] kasan_atomics+0x95/0x310 [ 15.536636] kunit_try_run_case+0x1a5/0x480 [ 15.536789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.537047] kthread+0x337/0x6f0 [ 15.537251] ret_from_fork+0x116/0x1d0 [ 15.537575] ret_from_fork_asm+0x1a/0x30 [ 15.537876] [ 15.538014] The buggy address belongs to the object at ffff8881038e7800 [ 15.538014] which belongs to the cache kmalloc-64 of size 64 [ 15.538600] The buggy address is located 0 bytes to the right of [ 15.538600] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.539087] [ 15.539160] The buggy address belongs to the physical page: [ 15.539392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.539891] flags: 0x200000000000000(node=0|zone=2) [ 15.540185] page_type: f5(slab) [ 15.540355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.540779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.541017] page dumped because: kasan: bad access detected [ 15.541315] [ 15.541413] Memory state around the buggy address: [ 15.541642] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.541942] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542155] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.542362] ^ [ 15.542589] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.542967] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.543286] ================================================================== [ 15.153612] ================================================================== [ 15.154215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.154715] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.155284] [ 15.155560] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.155608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.155622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.155745] Call Trace: [ 15.155792] <TASK> [ 15.155809] dump_stack_lvl+0x73/0xb0 [ 15.155842] print_report+0xd1/0x610 [ 15.155866] ? __virt_addr_valid+0x1db/0x2d0 [ 15.155890] ? kasan_atomics_helper+0x72f/0x5450 [ 15.155914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.155939] ? kasan_atomics_helper+0x72f/0x5450 [ 15.155962] kasan_report+0x141/0x180 [ 15.155986] ? kasan_atomics_helper+0x72f/0x5450 [ 15.156015] kasan_check_range+0x10c/0x1c0 [ 15.156040] __kasan_check_write+0x18/0x20 [ 15.156062] kasan_atomics_helper+0x72f/0x5450 [ 15.156086] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.156111] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.156138] ? kasan_atomics+0x152/0x310 [ 15.156165] kasan_atomics+0x1dc/0x310 [ 15.156189] ? __pfx_kasan_atomics+0x10/0x10 [ 15.156215] ? __pfx_read_tsc+0x10/0x10 [ 15.156238] ? ktime_get_ts64+0x86/0x230 [ 15.156263] kunit_try_run_case+0x1a5/0x480 [ 15.156289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.156314] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.156401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.156428] ? __kthread_parkme+0x82/0x180 [ 15.156461] ? preempt_count_sub+0x50/0x80 [ 15.156485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.156513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.156539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.156566] kthread+0x337/0x6f0 [ 15.156587] ? trace_preempt_on+0x20/0xc0 [ 15.156612] ? __pfx_kthread+0x10/0x10 [ 15.156634] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.156657] ? calculate_sigpending+0x7b/0xa0 [ 15.156682] ? __pfx_kthread+0x10/0x10 [ 15.156705] ret_from_fork+0x116/0x1d0 [ 15.156725] ? __pfx_kthread+0x10/0x10 [ 15.156747] ret_from_fork_asm+0x1a/0x30 [ 15.156791] </TASK> [ 15.156801] [ 15.171038] Allocated by task 282: [ 15.171174] kasan_save_stack+0x45/0x70 [ 15.171469] kasan_save_track+0x18/0x40 [ 15.171939] kasan_save_alloc_info+0x3b/0x50 [ 15.172443] __kasan_kmalloc+0xb7/0xc0 [ 15.172815] __kmalloc_cache_noprof+0x189/0x420 [ 15.173236] kasan_atomics+0x95/0x310 [ 15.173665] kunit_try_run_case+0x1a5/0x480 [ 15.174072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.174612] kthread+0x337/0x6f0 [ 15.174951] ret_from_fork+0x116/0x1d0 [ 15.175305] ret_from_fork_asm+0x1a/0x30 [ 15.175779] [ 15.175858] The buggy address belongs to the object at ffff8881038e7800 [ 15.175858] which belongs to the cache kmalloc-64 of size 64 [ 15.176215] The buggy address is located 0 bytes to the right of [ 15.176215] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.177550] [ 15.177721] The buggy address belongs to the physical page: [ 15.178235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.179060] flags: 0x200000000000000(node=0|zone=2) [ 15.179630] page_type: f5(slab) [ 15.180057] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.180740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.180990] page dumped because: kasan: bad access detected [ 15.181163] [ 15.181236] Memory state around the buggy address: [ 15.181565] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.182272] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.183070] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.183806] ^ [ 15.184239] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.185003] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.185795] ================================================================== [ 15.316193] ================================================================== [ 15.316434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.317708] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.318043] [ 15.318390] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.318441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.318455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.318477] Call Trace: [ 15.318493] <TASK> [ 15.318507] dump_stack_lvl+0x73/0xb0 [ 15.318539] print_report+0xd1/0x610 [ 15.318562] ? __virt_addr_valid+0x1db/0x2d0 [ 15.318586] ? kasan_atomics_helper+0xac7/0x5450 [ 15.318609] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.318634] ? kasan_atomics_helper+0xac7/0x5450 [ 15.318658] kasan_report+0x141/0x180 [ 15.318681] ? kasan_atomics_helper+0xac7/0x5450 [ 15.318709] kasan_check_range+0x10c/0x1c0 [ 15.318734] __kasan_check_write+0x18/0x20 [ 15.318768] kasan_atomics_helper+0xac7/0x5450 [ 15.318793] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.318817] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.318844] ? kasan_atomics+0x152/0x310 [ 15.318871] kasan_atomics+0x1dc/0x310 [ 15.318895] ? __pfx_kasan_atomics+0x10/0x10 [ 15.318921] ? __pfx_read_tsc+0x10/0x10 [ 15.318943] ? ktime_get_ts64+0x86/0x230 [ 15.318968] kunit_try_run_case+0x1a5/0x480 [ 15.318993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.319018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.319043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.319068] ? __kthread_parkme+0x82/0x180 [ 15.319090] ? preempt_count_sub+0x50/0x80 [ 15.319115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.319141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.319167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.319194] kthread+0x337/0x6f0 [ 15.319214] ? trace_preempt_on+0x20/0xc0 [ 15.319239] ? __pfx_kthread+0x10/0x10 [ 15.319261] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.319285] ? calculate_sigpending+0x7b/0xa0 [ 15.319311] ? __pfx_kthread+0x10/0x10 [ 15.319335] ret_from_fork+0x116/0x1d0 [ 15.319370] ? __pfx_kthread+0x10/0x10 [ 15.319392] ret_from_fork_asm+0x1a/0x30 [ 15.319425] </TASK> [ 15.319445] [ 15.334037] Allocated by task 282: [ 15.334174] kasan_save_stack+0x45/0x70 [ 15.334322] kasan_save_track+0x18/0x40 [ 15.334543] kasan_save_alloc_info+0x3b/0x50 [ 15.335577] __kasan_kmalloc+0xb7/0xc0 [ 15.336031] __kmalloc_cache_noprof+0x189/0x420 [ 15.336616] kasan_atomics+0x95/0x310 [ 15.337270] kunit_try_run_case+0x1a5/0x480 [ 15.337927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338769] kthread+0x337/0x6f0 [ 15.339096] ret_from_fork+0x116/0x1d0 [ 15.339429] ret_from_fork_asm+0x1a/0x30 [ 15.339728] [ 15.339820] The buggy address belongs to the object at ffff8881038e7800 [ 15.339820] which belongs to the cache kmalloc-64 of size 64 [ 15.340189] The buggy address is located 0 bytes to the right of [ 15.340189] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.340649] [ 15.340766] The buggy address belongs to the physical page: [ 15.341060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.341517] flags: 0x200000000000000(node=0|zone=2) [ 15.341827] page_type: f5(slab) [ 15.341987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.342610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.342924] page dumped because: kasan: bad access detected [ 15.343212] [ 15.343291] Memory state around the buggy address: [ 15.343585] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.344169] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.344633] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.344998] ^ [ 15.345218] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.345642] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.345976] ================================================================== [ 15.346508] ================================================================== [ 15.347291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.347612] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.347932] [ 15.348049] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.348093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.348106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.348128] Call Trace: [ 15.348144] <TASK> [ 15.348163] dump_stack_lvl+0x73/0xb0 [ 15.348192] print_report+0xd1/0x610 [ 15.348239] ? __virt_addr_valid+0x1db/0x2d0 [ 15.348264] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.348286] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.348311] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.348394] kasan_report+0x141/0x180 [ 15.348420] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.348449] kasan_check_range+0x10c/0x1c0 [ 15.348475] __kasan_check_write+0x18/0x20 [ 15.348497] kasan_atomics_helper+0xb6a/0x5450 [ 15.348523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.348547] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.348573] ? kasan_atomics+0x152/0x310 [ 15.348601] kasan_atomics+0x1dc/0x310 [ 15.348625] ? __pfx_kasan_atomics+0x10/0x10 [ 15.348651] ? __pfx_read_tsc+0x10/0x10 [ 15.348674] ? ktime_get_ts64+0x86/0x230 [ 15.348700] kunit_try_run_case+0x1a5/0x480 [ 15.348725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.348750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.348791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.348816] ? __kthread_parkme+0x82/0x180 [ 15.348876] ? preempt_count_sub+0x50/0x80 [ 15.348901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.348934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.348960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.348987] kthread+0x337/0x6f0 [ 15.349009] ? trace_preempt_on+0x20/0xc0 [ 15.349033] ? __pfx_kthread+0x10/0x10 [ 15.349055] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.349078] ? calculate_sigpending+0x7b/0xa0 [ 15.349104] ? __pfx_kthread+0x10/0x10 [ 15.349127] ret_from_fork+0x116/0x1d0 [ 15.349146] ? __pfx_kthread+0x10/0x10 [ 15.349169] ret_from_fork_asm+0x1a/0x30 [ 15.349200] </TASK> [ 15.349211] [ 15.359826] Allocated by task 282: [ 15.360276] kasan_save_stack+0x45/0x70 [ 15.360687] kasan_save_track+0x18/0x40 [ 15.360885] kasan_save_alloc_info+0x3b/0x50 [ 15.361077] __kasan_kmalloc+0xb7/0xc0 [ 15.361251] __kmalloc_cache_noprof+0x189/0x420 [ 15.361969] kasan_atomics+0x95/0x310 [ 15.362319] kunit_try_run_case+0x1a5/0x480 [ 15.362939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.363214] kthread+0x337/0x6f0 [ 15.363431] ret_from_fork+0x116/0x1d0 [ 15.363617] ret_from_fork_asm+0x1a/0x30 [ 15.363808] [ 15.363899] The buggy address belongs to the object at ffff8881038e7800 [ 15.363899] which belongs to the cache kmalloc-64 of size 64 [ 15.364826] The buggy address is located 0 bytes to the right of [ 15.364826] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.365806] [ 15.366059] The buggy address belongs to the physical page: [ 15.366513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.366869] flags: 0x200000000000000(node=0|zone=2) [ 15.367090] page_type: f5(slab) [ 15.367250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.368465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.368884] page dumped because: kasan: bad access detected [ 15.369542] [ 15.369786] Memory state around the buggy address: [ 15.370158] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.370864] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.371305] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.371937] ^ [ 15.372155] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.372936] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.373640] ================================================================== [ 15.971909] ================================================================== [ 15.972608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.973033] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.973393] [ 15.973571] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.973617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.973630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.973652] Call Trace: [ 15.973666] <TASK> [ 15.973680] dump_stack_lvl+0x73/0xb0 [ 15.973908] print_report+0xd1/0x610 [ 15.973934] ? __virt_addr_valid+0x1db/0x2d0 [ 15.973958] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.973981] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.974006] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.974030] kasan_report+0x141/0x180 [ 15.974055] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.974084] kasan_check_range+0x10c/0x1c0 [ 15.974110] __kasan_check_write+0x18/0x20 [ 15.974130] kasan_atomics_helper+0x19e3/0x5450 [ 15.974155] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.974179] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.974206] ? kasan_atomics+0x152/0x310 [ 15.974234] kasan_atomics+0x1dc/0x310 [ 15.974258] ? __pfx_kasan_atomics+0x10/0x10 [ 15.974283] ? __pfx_read_tsc+0x10/0x10 [ 15.974305] ? ktime_get_ts64+0x86/0x230 [ 15.974330] kunit_try_run_case+0x1a5/0x480 [ 15.974357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.974386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.974412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.974451] ? __kthread_parkme+0x82/0x180 [ 15.974473] ? preempt_count_sub+0x50/0x80 [ 15.974499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.974526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.974551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.974578] kthread+0x337/0x6f0 [ 15.974599] ? trace_preempt_on+0x20/0xc0 [ 15.974622] ? __pfx_kthread+0x10/0x10 [ 15.974645] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.974668] ? calculate_sigpending+0x7b/0xa0 [ 15.974692] ? __pfx_kthread+0x10/0x10 [ 15.974715] ret_from_fork+0x116/0x1d0 [ 15.974734] ? __pfx_kthread+0x10/0x10 [ 15.974767] ret_from_fork_asm+0x1a/0x30 [ 15.974799] </TASK> [ 15.974810] [ 15.984311] Allocated by task 282: [ 15.984474] kasan_save_stack+0x45/0x70 [ 15.985081] kasan_save_track+0x18/0x40 [ 15.985244] kasan_save_alloc_info+0x3b/0x50 [ 15.985606] __kasan_kmalloc+0xb7/0xc0 [ 15.985921] __kmalloc_cache_noprof+0x189/0x420 [ 15.986232] kasan_atomics+0x95/0x310 [ 15.986443] kunit_try_run_case+0x1a5/0x480 [ 15.986794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.987114] kthread+0x337/0x6f0 [ 15.987289] ret_from_fork+0x116/0x1d0 [ 15.987522] ret_from_fork_asm+0x1a/0x30 [ 15.987695] [ 15.987803] The buggy address belongs to the object at ffff8881038e7800 [ 15.987803] which belongs to the cache kmalloc-64 of size 64 [ 15.988289] The buggy address is located 0 bytes to the right of [ 15.988289] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.989142] [ 15.989239] The buggy address belongs to the physical page: [ 15.989723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.990168] flags: 0x200000000000000(node=0|zone=2) [ 15.990520] page_type: f5(slab) [ 15.990848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.991210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.991678] page dumped because: kasan: bad access detected [ 15.992031] [ 15.992134] Memory state around the buggy address: [ 15.992432] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.993005] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.993367] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.993862] ^ [ 15.994152] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.994417] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.994903] ================================================================== [ 15.484232] ================================================================== [ 15.484645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.484967] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.485319] [ 15.485427] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.485472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.485503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.485525] Call Trace: [ 15.485551] <TASK> [ 15.485565] dump_stack_lvl+0x73/0xb0 [ 15.485596] print_report+0xd1/0x610 [ 15.485634] ? __virt_addr_valid+0x1db/0x2d0 [ 15.485695] ? kasan_atomics_helper+0xf10/0x5450 [ 15.485718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.485743] ? kasan_atomics_helper+0xf10/0x5450 [ 15.485784] kasan_report+0x141/0x180 [ 15.485807] ? kasan_atomics_helper+0xf10/0x5450 [ 15.485834] kasan_check_range+0x10c/0x1c0 [ 15.485860] __kasan_check_write+0x18/0x20 [ 15.485880] kasan_atomics_helper+0xf10/0x5450 [ 15.485904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.485929] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.485956] ? kasan_atomics+0x152/0x310 [ 15.485984] kasan_atomics+0x1dc/0x310 [ 15.486008] ? __pfx_kasan_atomics+0x10/0x10 [ 15.486034] ? __pfx_read_tsc+0x10/0x10 [ 15.486057] ? ktime_get_ts64+0x86/0x230 [ 15.486082] kunit_try_run_case+0x1a5/0x480 [ 15.486109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.486134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.486159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.486186] ? __kthread_parkme+0x82/0x180 [ 15.486208] ? preempt_count_sub+0x50/0x80 [ 15.486233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.486260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.486286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.486314] kthread+0x337/0x6f0 [ 15.486334] ? trace_preempt_on+0x20/0xc0 [ 15.486358] ? __pfx_kthread+0x10/0x10 [ 15.486387] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.486410] ? calculate_sigpending+0x7b/0xa0 [ 15.486436] ? __pfx_kthread+0x10/0x10 [ 15.486469] ret_from_fork+0x116/0x1d0 [ 15.486489] ? __pfx_kthread+0x10/0x10 [ 15.486511] ret_from_fork_asm+0x1a/0x30 [ 15.486543] </TASK> [ 15.486554] [ 15.494920] Allocated by task 282: [ 15.495146] kasan_save_stack+0x45/0x70 [ 15.495347] kasan_save_track+0x18/0x40 [ 15.495537] kasan_save_alloc_info+0x3b/0x50 [ 15.495746] __kasan_kmalloc+0xb7/0xc0 [ 15.495941] __kmalloc_cache_noprof+0x189/0x420 [ 15.496117] kasan_atomics+0x95/0x310 [ 15.496306] kunit_try_run_case+0x1a5/0x480 [ 15.496520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.496842] kthread+0x337/0x6f0 [ 15.497081] ret_from_fork+0x116/0x1d0 [ 15.497269] ret_from_fork_asm+0x1a/0x30 [ 15.497477] [ 15.497573] The buggy address belongs to the object at ffff8881038e7800 [ 15.497573] which belongs to the cache kmalloc-64 of size 64 [ 15.498093] The buggy address is located 0 bytes to the right of [ 15.498093] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.498458] [ 15.498557] The buggy address belongs to the physical page: [ 15.498911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.499398] flags: 0x200000000000000(node=0|zone=2) [ 15.499684] page_type: f5(slab) [ 15.499868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.500112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.500375] page dumped because: kasan: bad access detected [ 15.500882] [ 15.501009] Memory state around the buggy address: [ 15.501254] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.501614] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.501959] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.502174] ^ [ 15.502434] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.502857] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.503202] ================================================================== [ 15.069157] ================================================================== [ 15.069503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.070333] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.070649] [ 15.070773] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.070817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.070829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.070851] Call Trace: [ 15.070868] <TASK> [ 15.070883] dump_stack_lvl+0x73/0xb0 [ 15.070914] print_report+0xd1/0x610 [ 15.070937] ? __virt_addr_valid+0x1db/0x2d0 [ 15.070961] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.070984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.071009] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.071033] kasan_report+0x141/0x180 [ 15.071056] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.071084] __asan_report_store4_noabort+0x1b/0x30 [ 15.071112] kasan_atomics_helper+0x4b3a/0x5450 [ 15.071136] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.071161] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.071188] ? kasan_atomics+0x152/0x310 [ 15.071215] kasan_atomics+0x1dc/0x310 [ 15.071240] ? __pfx_kasan_atomics+0x10/0x10 [ 15.071266] ? __pfx_read_tsc+0x10/0x10 [ 15.071288] ? ktime_get_ts64+0x86/0x230 [ 15.071379] kunit_try_run_case+0x1a5/0x480 [ 15.071409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.071459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.071485] ? __kthread_parkme+0x82/0x180 [ 15.071507] ? preempt_count_sub+0x50/0x80 [ 15.071533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.071585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.071612] kthread+0x337/0x6f0 [ 15.071633] ? trace_preempt_on+0x20/0xc0 [ 15.071657] ? __pfx_kthread+0x10/0x10 [ 15.071680] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.071702] ? calculate_sigpending+0x7b/0xa0 [ 15.071728] ? __pfx_kthread+0x10/0x10 [ 15.071751] ret_from_fork+0x116/0x1d0 [ 15.071783] ? __pfx_kthread+0x10/0x10 [ 15.071805] ret_from_fork_asm+0x1a/0x30 [ 15.071837] </TASK> [ 15.071848] [ 15.079544] Allocated by task 282: [ 15.079679] kasan_save_stack+0x45/0x70 [ 15.080054] kasan_save_track+0x18/0x40 [ 15.080252] kasan_save_alloc_info+0x3b/0x50 [ 15.080464] __kasan_kmalloc+0xb7/0xc0 [ 15.080795] __kmalloc_cache_noprof+0x189/0x420 [ 15.080970] kasan_atomics+0x95/0x310 [ 15.081164] kunit_try_run_case+0x1a5/0x480 [ 15.081413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.081602] kthread+0x337/0x6f0 [ 15.081724] ret_from_fork+0x116/0x1d0 [ 15.081928] ret_from_fork_asm+0x1a/0x30 [ 15.082126] [ 15.082222] The buggy address belongs to the object at ffff8881038e7800 [ 15.082222] which belongs to the cache kmalloc-64 of size 64 [ 15.082857] The buggy address is located 0 bytes to the right of [ 15.082857] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.083619] [ 15.083727] The buggy address belongs to the physical page: [ 15.083942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.084299] flags: 0x200000000000000(node=0|zone=2) [ 15.084593] page_type: f5(slab) [ 15.084775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.085101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.085453] page dumped because: kasan: bad access detected [ 15.085737] [ 15.085835] Memory state around the buggy address: [ 15.086016] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.086376] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.086711] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.086953] ^ [ 15.087110] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087326] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087640] ================================================================== [ 15.921132] ================================================================== [ 15.921830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.922266] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.922555] [ 15.922645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.922690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.922703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.922725] Call Trace: [ 15.922741] <TASK> [ 15.922767] dump_stack_lvl+0x73/0xb0 [ 15.922798] print_report+0xd1/0x610 [ 15.922821] ? __virt_addr_valid+0x1db/0x2d0 [ 15.922912] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.922939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.922964] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.922987] kasan_report+0x141/0x180 [ 15.923011] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.923039] kasan_check_range+0x10c/0x1c0 [ 15.923064] __kasan_check_write+0x18/0x20 [ 15.923085] kasan_atomics_helper+0x18b1/0x5450 [ 15.923110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.923483] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.923516] ? kasan_atomics+0x152/0x310 [ 15.923545] kasan_atomics+0x1dc/0x310 [ 15.923570] ? __pfx_kasan_atomics+0x10/0x10 [ 15.923598] ? __pfx_read_tsc+0x10/0x10 [ 15.923621] ? ktime_get_ts64+0x86/0x230 [ 15.923647] kunit_try_run_case+0x1a5/0x480 [ 15.923673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.923699] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.923726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.923751] ? __kthread_parkme+0x82/0x180 [ 15.923794] ? preempt_count_sub+0x50/0x80 [ 15.923819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.923845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.923872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.923899] kthread+0x337/0x6f0 [ 15.923920] ? trace_preempt_on+0x20/0xc0 [ 15.923945] ? __pfx_kthread+0x10/0x10 [ 15.923966] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.923990] ? calculate_sigpending+0x7b/0xa0 [ 15.924015] ? __pfx_kthread+0x10/0x10 [ 15.924038] ret_from_fork+0x116/0x1d0 [ 15.924058] ? __pfx_kthread+0x10/0x10 [ 15.924080] ret_from_fork_asm+0x1a/0x30 [ 15.924111] </TASK> [ 15.924122] [ 15.934803] Allocated by task 282: [ 15.935006] kasan_save_stack+0x45/0x70 [ 15.935227] kasan_save_track+0x18/0x40 [ 15.936856] kasan_save_alloc_info+0x3b/0x50 [ 15.937078] __kasan_kmalloc+0xb7/0xc0 [ 15.937244] __kmalloc_cache_noprof+0x189/0x420 [ 15.937500] kasan_atomics+0x95/0x310 [ 15.937908] kunit_try_run_case+0x1a5/0x480 [ 15.938101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.938603] kthread+0x337/0x6f0 [ 15.938868] ret_from_fork+0x116/0x1d0 [ 15.939095] ret_from_fork_asm+0x1a/0x30 [ 15.939269] [ 15.939577] The buggy address belongs to the object at ffff8881038e7800 [ 15.939577] which belongs to the cache kmalloc-64 of size 64 [ 15.940115] The buggy address is located 0 bytes to the right of [ 15.940115] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.940923] [ 15.941029] The buggy address belongs to the physical page: [ 15.941337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.941898] flags: 0x200000000000000(node=0|zone=2) [ 15.942237] page_type: f5(slab) [ 15.942553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.942972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.943302] page dumped because: kasan: bad access detected [ 15.943744] [ 15.943967] Memory state around the buggy address: [ 15.944270] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.944688] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.945104] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.945520] ^ [ 15.945719] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.946057] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.946636] ================================================================== [ 15.439943] ================================================================== [ 15.440688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.441075] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.441490] [ 15.441583] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.441639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.441653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.441674] Call Trace: [ 15.441702] <TASK> [ 15.441720] dump_stack_lvl+0x73/0xb0 [ 15.441749] print_report+0xd1/0x610 [ 15.441781] ? __virt_addr_valid+0x1db/0x2d0 [ 15.441806] ? kasan_atomics_helper+0xde0/0x5450 [ 15.441828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.441854] ? kasan_atomics_helper+0xde0/0x5450 [ 15.441877] kasan_report+0x141/0x180 [ 15.441900] ? kasan_atomics_helper+0xde0/0x5450 [ 15.441928] kasan_check_range+0x10c/0x1c0 [ 15.441953] __kasan_check_write+0x18/0x20 [ 15.441974] kasan_atomics_helper+0xde0/0x5450 [ 15.441999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.442023] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.442050] ? kasan_atomics+0x152/0x310 [ 15.442078] kasan_atomics+0x1dc/0x310 [ 15.442102] ? __pfx_kasan_atomics+0x10/0x10 [ 15.442128] ? __pfx_read_tsc+0x10/0x10 [ 15.442150] ? ktime_get_ts64+0x86/0x230 [ 15.442177] kunit_try_run_case+0x1a5/0x480 [ 15.442203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442227] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.442254] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.442280] ? __kthread_parkme+0x82/0x180 [ 15.442302] ? preempt_count_sub+0x50/0x80 [ 15.442327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.442462] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.442490] kthread+0x337/0x6f0 [ 15.442521] ? trace_preempt_on+0x20/0xc0 [ 15.442546] ? __pfx_kthread+0x10/0x10 [ 15.442569] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.442603] ? calculate_sigpending+0x7b/0xa0 [ 15.442629] ? __pfx_kthread+0x10/0x10 [ 15.442651] ret_from_fork+0x116/0x1d0 [ 15.442680] ? __pfx_kthread+0x10/0x10 [ 15.442702] ret_from_fork_asm+0x1a/0x30 [ 15.442734] </TASK> [ 15.442763] [ 15.451145] Allocated by task 282: [ 15.451280] kasan_save_stack+0x45/0x70 [ 15.451481] kasan_save_track+0x18/0x40 [ 15.451791] kasan_save_alloc_info+0x3b/0x50 [ 15.452077] __kasan_kmalloc+0xb7/0xc0 [ 15.452226] __kmalloc_cache_noprof+0x189/0x420 [ 15.452600] kasan_atomics+0x95/0x310 [ 15.452775] kunit_try_run_case+0x1a5/0x480 [ 15.453042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.453244] kthread+0x337/0x6f0 [ 15.453529] ret_from_fork+0x116/0x1d0 [ 15.453768] ret_from_fork_asm+0x1a/0x30 [ 15.453912] [ 15.453985] The buggy address belongs to the object at ffff8881038e7800 [ 15.453985] which belongs to the cache kmalloc-64 of size 64 [ 15.454338] The buggy address is located 0 bytes to the right of [ 15.454338] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.454898] [ 15.455032] The buggy address belongs to the physical page: [ 15.455429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.455821] flags: 0x200000000000000(node=0|zone=2) [ 15.455982] page_type: f5(slab) [ 15.456104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.456826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.457384] page dumped because: kasan: bad access detected [ 15.457678] [ 15.457794] Memory state around the buggy address: [ 15.457955] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.458295] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.458746] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.459071] ^ [ 15.459294] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.459681] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.460004] ================================================================== [ 15.685308] ================================================================== [ 15.685699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.686058] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.686416] [ 15.686523] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.686589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.686603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.686625] Call Trace: [ 15.686642] <TASK> [ 15.686659] dump_stack_lvl+0x73/0xb0 [ 15.686689] print_report+0xd1/0x610 [ 15.686712] ? __virt_addr_valid+0x1db/0x2d0 [ 15.686765] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.686787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.686812] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.686836] kasan_report+0x141/0x180 [ 15.686859] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.686886] kasan_check_range+0x10c/0x1c0 [ 15.686929] __kasan_check_write+0x18/0x20 [ 15.686950] kasan_atomics_helper+0x12e6/0x5450 [ 15.686975] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.687000] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.687026] ? kasan_atomics+0x152/0x310 [ 15.687054] kasan_atomics+0x1dc/0x310 [ 15.687078] ? __pfx_kasan_atomics+0x10/0x10 [ 15.687103] ? __pfx_read_tsc+0x10/0x10 [ 15.687125] ? ktime_get_ts64+0x86/0x230 [ 15.687167] kunit_try_run_case+0x1a5/0x480 [ 15.687207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.687245] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.687284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.687309] ? __kthread_parkme+0x82/0x180 [ 15.687332] ? preempt_count_sub+0x50/0x80 [ 15.687357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.687383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.687408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.687461] kthread+0x337/0x6f0 [ 15.687483] ? trace_preempt_on+0x20/0xc0 [ 15.687506] ? __pfx_kthread+0x10/0x10 [ 15.687529] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.687551] ? calculate_sigpending+0x7b/0xa0 [ 15.687576] ? __pfx_kthread+0x10/0x10 [ 15.687618] ret_from_fork+0x116/0x1d0 [ 15.687652] ? __pfx_kthread+0x10/0x10 [ 15.687674] ret_from_fork_asm+0x1a/0x30 [ 15.687705] </TASK> [ 15.687716] [ 15.696278] Allocated by task 282: [ 15.696512] kasan_save_stack+0x45/0x70 [ 15.696745] kasan_save_track+0x18/0x40 [ 15.696953] kasan_save_alloc_info+0x3b/0x50 [ 15.697128] __kasan_kmalloc+0xb7/0xc0 [ 15.697294] __kmalloc_cache_noprof+0x189/0x420 [ 15.697566] kasan_atomics+0x95/0x310 [ 15.697816] kunit_try_run_case+0x1a5/0x480 [ 15.698011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.698275] kthread+0x337/0x6f0 [ 15.698502] ret_from_fork+0x116/0x1d0 [ 15.698740] ret_from_fork_asm+0x1a/0x30 [ 15.698948] [ 15.699045] The buggy address belongs to the object at ffff8881038e7800 [ 15.699045] which belongs to the cache kmalloc-64 of size 64 [ 15.699560] The buggy address is located 0 bytes to the right of [ 15.699560] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.700033] [ 15.700154] The buggy address belongs to the physical page: [ 15.700410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.700816] flags: 0x200000000000000(node=0|zone=2) [ 15.701051] page_type: f5(slab) [ 15.701236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.701581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.701932] page dumped because: kasan: bad access detected [ 15.702191] [ 15.702286] Memory state around the buggy address: [ 15.702495] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.702715] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.703063] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.703460] ^ [ 15.703701] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.704000] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.704218] ================================================================== [ 15.543858] ================================================================== [ 15.544248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.544661] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.544935] [ 15.545021] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.545064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.545076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.545098] Call Trace: [ 15.545111] <TASK> [ 15.545124] dump_stack_lvl+0x73/0xb0 [ 15.545152] print_report+0xd1/0x610 [ 15.545175] ? __virt_addr_valid+0x1db/0x2d0 [ 15.545199] ? kasan_atomics_helper+0x1079/0x5450 [ 15.545221] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.545246] ? kasan_atomics_helper+0x1079/0x5450 [ 15.545271] kasan_report+0x141/0x180 [ 15.545294] ? kasan_atomics_helper+0x1079/0x5450 [ 15.545323] kasan_check_range+0x10c/0x1c0 [ 15.545348] __kasan_check_write+0x18/0x20 [ 15.545369] kasan_atomics_helper+0x1079/0x5450 [ 15.545393] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.545418] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.545498] ? kasan_atomics+0x152/0x310 [ 15.545528] kasan_atomics+0x1dc/0x310 [ 15.545578] ? __pfx_kasan_atomics+0x10/0x10 [ 15.545628] ? __pfx_read_tsc+0x10/0x10 [ 15.545650] ? ktime_get_ts64+0x86/0x230 [ 15.545676] kunit_try_run_case+0x1a5/0x480 [ 15.545712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.545736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.545770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.545796] ? __kthread_parkme+0x82/0x180 [ 15.545817] ? preempt_count_sub+0x50/0x80 [ 15.545842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.545869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.545921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.545949] kthread+0x337/0x6f0 [ 15.545970] ? trace_preempt_on+0x20/0xc0 [ 15.546004] ? __pfx_kthread+0x10/0x10 [ 15.546026] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.546051] ? calculate_sigpending+0x7b/0xa0 [ 15.546077] ? __pfx_kthread+0x10/0x10 [ 15.546127] ret_from_fork+0x116/0x1d0 [ 15.546147] ? __pfx_kthread+0x10/0x10 [ 15.546169] ret_from_fork_asm+0x1a/0x30 [ 15.546212] </TASK> [ 15.546223] [ 15.554671] Allocated by task 282: [ 15.554860] kasan_save_stack+0x45/0x70 [ 15.555058] kasan_save_track+0x18/0x40 [ 15.555219] kasan_save_alloc_info+0x3b/0x50 [ 15.555366] __kasan_kmalloc+0xb7/0xc0 [ 15.555584] __kmalloc_cache_noprof+0x189/0x420 [ 15.555857] kasan_atomics+0x95/0x310 [ 15.556049] kunit_try_run_case+0x1a5/0x480 [ 15.556291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.556606] kthread+0x337/0x6f0 [ 15.556805] ret_from_fork+0x116/0x1d0 [ 15.556995] ret_from_fork_asm+0x1a/0x30 [ 15.557219] [ 15.557317] The buggy address belongs to the object at ffff8881038e7800 [ 15.557317] which belongs to the cache kmalloc-64 of size 64 [ 15.557794] The buggy address is located 0 bytes to the right of [ 15.557794] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.558221] [ 15.558357] The buggy address belongs to the physical page: [ 15.558630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.558984] flags: 0x200000000000000(node=0|zone=2) [ 15.559145] page_type: f5(slab) [ 15.559263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.559571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.559956] page dumped because: kasan: bad access detected [ 15.560241] [ 15.560350] Memory state around the buggy address: [ 15.560621] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.560982] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.561297] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.561686] ^ [ 15.562626] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.563192] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.563576] ================================================================== [ 15.395307] ================================================================== [ 15.395903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.396247] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.396606] [ 15.396695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.396738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.396751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.396783] Call Trace: [ 15.396797] <TASK> [ 15.396812] dump_stack_lvl+0x73/0xb0 [ 15.396852] print_report+0xd1/0x610 [ 15.396875] ? __virt_addr_valid+0x1db/0x2d0 [ 15.396911] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.396934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.396960] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.396995] kasan_report+0x141/0x180 [ 15.397018] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.397046] __asan_report_load4_noabort+0x18/0x20 [ 15.397074] kasan_atomics_helper+0x4a84/0x5450 [ 15.397098] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.397122] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.397149] ? kasan_atomics+0x152/0x310 [ 15.397177] kasan_atomics+0x1dc/0x310 [ 15.397201] ? __pfx_kasan_atomics+0x10/0x10 [ 15.397227] ? __pfx_read_tsc+0x10/0x10 [ 15.397250] ? ktime_get_ts64+0x86/0x230 [ 15.397275] kunit_try_run_case+0x1a5/0x480 [ 15.397300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.397395] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.397436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.397462] ? __kthread_parkme+0x82/0x180 [ 15.397483] ? preempt_count_sub+0x50/0x80 [ 15.397509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.397535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.397562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.397589] kthread+0x337/0x6f0 [ 15.397609] ? trace_preempt_on+0x20/0xc0 [ 15.397633] ? __pfx_kthread+0x10/0x10 [ 15.397654] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.397677] ? calculate_sigpending+0x7b/0xa0 [ 15.397703] ? __pfx_kthread+0x10/0x10 [ 15.397726] ret_from_fork+0x116/0x1d0 [ 15.397746] ? __pfx_kthread+0x10/0x10 [ 15.397777] ret_from_fork_asm+0x1a/0x30 [ 15.397809] </TASK> [ 15.397819] [ 15.409797] Allocated by task 282: [ 15.409935] kasan_save_stack+0x45/0x70 [ 15.410081] kasan_save_track+0x18/0x40 [ 15.410219] kasan_save_alloc_info+0x3b/0x50 [ 15.410491] __kasan_kmalloc+0xb7/0xc0 [ 15.410635] __kmalloc_cache_noprof+0x189/0x420 [ 15.410894] kasan_atomics+0x95/0x310 [ 15.411108] kunit_try_run_case+0x1a5/0x480 [ 15.411307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.411479] kthread+0x337/0x6f0 [ 15.411595] ret_from_fork+0x116/0x1d0 [ 15.412559] ret_from_fork_asm+0x1a/0x30 [ 15.412710] [ 15.412805] The buggy address belongs to the object at ffff8881038e7800 [ 15.412805] which belongs to the cache kmalloc-64 of size 64 [ 15.413155] The buggy address is located 0 bytes to the right of [ 15.413155] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.414046] [ 15.414147] The buggy address belongs to the physical page: [ 15.414581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.414970] flags: 0x200000000000000(node=0|zone=2) [ 15.415185] page_type: f5(slab) [ 15.415413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.415752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.416107] page dumped because: kasan: bad access detected [ 15.416462] [ 15.416543] Memory state around the buggy address: [ 15.416699] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.417116] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.417648] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.417948] ^ [ 15.418105] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.418553] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.418920] ================================================================== [ 15.207700] ================================================================== [ 15.208101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.208365] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.208944] [ 15.209061] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.209106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.209119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.209162] Call Trace: [ 15.209177] <TASK> [ 15.209190] dump_stack_lvl+0x73/0xb0 [ 15.209220] print_report+0xd1/0x610 [ 15.209242] ? __virt_addr_valid+0x1db/0x2d0 [ 15.209267] ? kasan_atomics_helper+0x860/0x5450 [ 15.209290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.209315] ? kasan_atomics_helper+0x860/0x5450 [ 15.209339] kasan_report+0x141/0x180 [ 15.209363] ? kasan_atomics_helper+0x860/0x5450 [ 15.209391] kasan_check_range+0x10c/0x1c0 [ 15.209417] __kasan_check_write+0x18/0x20 [ 15.209439] kasan_atomics_helper+0x860/0x5450 [ 15.209464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.209488] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.209516] ? kasan_atomics+0x152/0x310 [ 15.209544] kasan_atomics+0x1dc/0x310 [ 15.209568] ? __pfx_kasan_atomics+0x10/0x10 [ 15.209595] ? __pfx_read_tsc+0x10/0x10 [ 15.209617] ? ktime_get_ts64+0x86/0x230 [ 15.209642] kunit_try_run_case+0x1a5/0x480 [ 15.209668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.209845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.209890] ? __kthread_parkme+0x82/0x180 [ 15.209914] ? preempt_count_sub+0x50/0x80 [ 15.209939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.209993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.210021] kthread+0x337/0x6f0 [ 15.210041] ? trace_preempt_on+0x20/0xc0 [ 15.210066] ? __pfx_kthread+0x10/0x10 [ 15.210089] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.210113] ? calculate_sigpending+0x7b/0xa0 [ 15.210140] ? __pfx_kthread+0x10/0x10 [ 15.210162] ret_from_fork+0x116/0x1d0 [ 15.210182] ? __pfx_kthread+0x10/0x10 [ 15.210204] ret_from_fork_asm+0x1a/0x30 [ 15.210236] </TASK> [ 15.210246] [ 15.220103] Allocated by task 282: [ 15.220571] kasan_save_stack+0x45/0x70 [ 15.221036] kasan_save_track+0x18/0x40 [ 15.221392] kasan_save_alloc_info+0x3b/0x50 [ 15.221644] __kasan_kmalloc+0xb7/0xc0 [ 15.221855] __kmalloc_cache_noprof+0x189/0x420 [ 15.222127] kasan_atomics+0x95/0x310 [ 15.222386] kunit_try_run_case+0x1a5/0x480 [ 15.222724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.223047] kthread+0x337/0x6f0 [ 15.223182] ret_from_fork+0x116/0x1d0 [ 15.223466] ret_from_fork_asm+0x1a/0x30 [ 15.223736] [ 15.223850] The buggy address belongs to the object at ffff8881038e7800 [ 15.223850] which belongs to the cache kmalloc-64 of size 64 [ 15.224290] The buggy address is located 0 bytes to the right of [ 15.224290] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.225030] [ 15.225115] The buggy address belongs to the physical page: [ 15.225668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.226126] flags: 0x200000000000000(node=0|zone=2) [ 15.226466] page_type: f5(slab) [ 15.226698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.227075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.227550] page dumped because: kasan: bad access detected [ 15.227889] [ 15.228088] Memory state around the buggy address: [ 15.228303] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.228775] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.229070] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.229552] ^ [ 15.229840] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.230146] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.230641] ================================================================== [ 15.374293] ================================================================== [ 15.375129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.375653] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.376191] [ 15.376489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.376544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.376558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.376580] Call Trace: [ 15.376597] <TASK> [ 15.376612] dump_stack_lvl+0x73/0xb0 [ 15.376643] print_report+0xd1/0x610 [ 15.376666] ? __virt_addr_valid+0x1db/0x2d0 [ 15.376692] ? kasan_atomics_helper+0xc70/0x5450 [ 15.376716] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.376741] ? kasan_atomics_helper+0xc70/0x5450 [ 15.376774] kasan_report+0x141/0x180 [ 15.376798] ? kasan_atomics_helper+0xc70/0x5450 [ 15.376826] kasan_check_range+0x10c/0x1c0 [ 15.376851] __kasan_check_write+0x18/0x20 [ 15.376872] kasan_atomics_helper+0xc70/0x5450 [ 15.376897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.376933] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.376960] ? kasan_atomics+0x152/0x310 [ 15.377000] kasan_atomics+0x1dc/0x310 [ 15.377024] ? __pfx_kasan_atomics+0x10/0x10 [ 15.377049] ? __pfx_read_tsc+0x10/0x10 [ 15.377071] ? ktime_get_ts64+0x86/0x230 [ 15.377097] kunit_try_run_case+0x1a5/0x480 [ 15.377123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.377148] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.377174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.377199] ? __kthread_parkme+0x82/0x180 [ 15.377222] ? preempt_count_sub+0x50/0x80 [ 15.377248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.377275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.377303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.377379] kthread+0x337/0x6f0 [ 15.377402] ? trace_preempt_on+0x20/0xc0 [ 15.377428] ? __pfx_kthread+0x10/0x10 [ 15.377457] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.377481] ? calculate_sigpending+0x7b/0xa0 [ 15.377506] ? __pfx_kthread+0x10/0x10 [ 15.377529] ret_from_fork+0x116/0x1d0 [ 15.377548] ? __pfx_kthread+0x10/0x10 [ 15.377570] ret_from_fork_asm+0x1a/0x30 [ 15.377602] </TASK> [ 15.377613] [ 15.386150] Allocated by task 282: [ 15.386489] kasan_save_stack+0x45/0x70 [ 15.386673] kasan_save_track+0x18/0x40 [ 15.386824] kasan_save_alloc_info+0x3b/0x50 [ 15.387039] __kasan_kmalloc+0xb7/0xc0 [ 15.387226] __kmalloc_cache_noprof+0x189/0x420 [ 15.387449] kasan_atomics+0x95/0x310 [ 15.387583] kunit_try_run_case+0x1a5/0x480 [ 15.387945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.388233] kthread+0x337/0x6f0 [ 15.388492] ret_from_fork+0x116/0x1d0 [ 15.388648] ret_from_fork_asm+0x1a/0x30 [ 15.388815] [ 15.388921] The buggy address belongs to the object at ffff8881038e7800 [ 15.388921] which belongs to the cache kmalloc-64 of size 64 [ 15.389460] The buggy address is located 0 bytes to the right of [ 15.389460] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.390197] [ 15.390319] The buggy address belongs to the physical page: [ 15.390666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.390938] flags: 0x200000000000000(node=0|zone=2) [ 15.391174] page_type: f5(slab) [ 15.391381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.391915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.392251] page dumped because: kasan: bad access detected [ 15.392574] [ 15.392675] Memory state around the buggy address: [ 15.392905] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.393222] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.393667] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.393963] ^ [ 15.394121] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.394402] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.394965] ================================================================== [ 16.042249] ================================================================== [ 16.042569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.043649] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.043969] [ 16.044207] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.044254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.044267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.044289] Call Trace: [ 16.044305] <TASK> [ 16.044321] dump_stack_lvl+0x73/0xb0 [ 16.044352] print_report+0xd1/0x610 [ 16.044455] ? __virt_addr_valid+0x1db/0x2d0 [ 16.044488] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.044512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.044539] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.044563] kasan_report+0x141/0x180 [ 16.044587] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.044615] kasan_check_range+0x10c/0x1c0 [ 16.044640] __kasan_check_write+0x18/0x20 [ 16.044662] kasan_atomics_helper+0x1c18/0x5450 [ 16.044686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.044711] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.044738] ? kasan_atomics+0x152/0x310 [ 16.044779] kasan_atomics+0x1dc/0x310 [ 16.044803] ? __pfx_kasan_atomics+0x10/0x10 [ 16.044829] ? __pfx_read_tsc+0x10/0x10 [ 16.044851] ? ktime_get_ts64+0x86/0x230 [ 16.044876] kunit_try_run_case+0x1a5/0x480 [ 16.044902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.044926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.044953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.044979] ? __kthread_parkme+0x82/0x180 [ 16.045001] ? preempt_count_sub+0x50/0x80 [ 16.045027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.045053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.045080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.045107] kthread+0x337/0x6f0 [ 16.045127] ? trace_preempt_on+0x20/0xc0 [ 16.045152] ? __pfx_kthread+0x10/0x10 [ 16.045174] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.045198] ? calculate_sigpending+0x7b/0xa0 [ 16.045224] ? __pfx_kthread+0x10/0x10 [ 16.045246] ret_from_fork+0x116/0x1d0 [ 16.045266] ? __pfx_kthread+0x10/0x10 [ 16.045288] ret_from_fork_asm+0x1a/0x30 [ 16.045320] </TASK> [ 16.045331] [ 16.055206] Allocated by task 282: [ 16.055376] kasan_save_stack+0x45/0x70 [ 16.055777] kasan_save_track+0x18/0x40 [ 16.055965] kasan_save_alloc_info+0x3b/0x50 [ 16.056246] __kasan_kmalloc+0xb7/0xc0 [ 16.056395] __kmalloc_cache_noprof+0x189/0x420 [ 16.056821] kasan_atomics+0x95/0x310 [ 16.056976] kunit_try_run_case+0x1a5/0x480 [ 16.057193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.057430] kthread+0x337/0x6f0 [ 16.057810] ret_from_fork+0x116/0x1d0 [ 16.058001] ret_from_fork_asm+0x1a/0x30 [ 16.058303] [ 16.058410] The buggy address belongs to the object at ffff8881038e7800 [ 16.058410] which belongs to the cache kmalloc-64 of size 64 [ 16.059036] The buggy address is located 0 bytes to the right of [ 16.059036] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.059731] [ 16.059821] The buggy address belongs to the physical page: [ 16.060206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.060670] flags: 0x200000000000000(node=0|zone=2) [ 16.060896] page_type: f5(slab) [ 16.061173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.061623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.061961] page dumped because: kasan: bad access detected [ 16.062198] [ 16.062278] Memory state around the buggy address: [ 16.062705] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.063021] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.063374] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.063860] ^ [ 16.064032] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.064452] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.064901] ================================================================== [ 15.659792] ================================================================== [ 15.660139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.660545] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.660909] [ 15.661018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.661061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.661074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.661095] Call Trace: [ 15.661109] <TASK> [ 15.661124] dump_stack_lvl+0x73/0xb0 [ 15.661153] print_report+0xd1/0x610 [ 15.661177] ? __virt_addr_valid+0x1db/0x2d0 [ 15.661210] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.661234] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.661259] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.661283] kasan_report+0x141/0x180 [ 15.661306] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.661334] __asan_report_load4_noabort+0x18/0x20 [ 15.661361] kasan_atomics_helper+0x49e8/0x5450 [ 15.661385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.661409] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.661458] ? kasan_atomics+0x152/0x310 [ 15.661487] kasan_atomics+0x1dc/0x310 [ 15.661511] ? __pfx_kasan_atomics+0x10/0x10 [ 15.661537] ? __pfx_read_tsc+0x10/0x10 [ 15.661559] ? ktime_get_ts64+0x86/0x230 [ 15.661584] kunit_try_run_case+0x1a5/0x480 [ 15.661609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.661634] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.661659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.661685] ? __kthread_parkme+0x82/0x180 [ 15.661707] ? preempt_count_sub+0x50/0x80 [ 15.661732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.661768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.661829] kthread+0x337/0x6f0 [ 15.661849] ? trace_preempt_on+0x20/0xc0 [ 15.661874] ? __pfx_kthread+0x10/0x10 [ 15.661895] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.661919] ? calculate_sigpending+0x7b/0xa0 [ 15.661944] ? __pfx_kthread+0x10/0x10 [ 15.661967] ret_from_fork+0x116/0x1d0 [ 15.661986] ? __pfx_kthread+0x10/0x10 [ 15.662024] ret_from_fork_asm+0x1a/0x30 [ 15.662058] </TASK> [ 15.662069] [ 15.677075] Allocated by task 282: [ 15.677258] kasan_save_stack+0x45/0x70 [ 15.677495] kasan_save_track+0x18/0x40 [ 15.677683] kasan_save_alloc_info+0x3b/0x50 [ 15.677919] __kasan_kmalloc+0xb7/0xc0 [ 15.678094] __kmalloc_cache_noprof+0x189/0x420 [ 15.678321] kasan_atomics+0x95/0x310 [ 15.678574] kunit_try_run_case+0x1a5/0x480 [ 15.678787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.679079] kthread+0x337/0x6f0 [ 15.679248] ret_from_fork+0x116/0x1d0 [ 15.679461] ret_from_fork_asm+0x1a/0x30 [ 15.679624] [ 15.679704] The buggy address belongs to the object at ffff8881038e7800 [ 15.679704] which belongs to the cache kmalloc-64 of size 64 [ 15.680272] The buggy address is located 0 bytes to the right of [ 15.680272] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.680810] [ 15.680929] The buggy address belongs to the physical page: [ 15.681163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.681530] flags: 0x200000000000000(node=0|zone=2) [ 15.681776] page_type: f5(slab) [ 15.681937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.682248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.682508] page dumped because: kasan: bad access detected [ 15.682763] [ 15.682860] Memory state around the buggy address: [ 15.683091] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.683368] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.683706] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.684032] ^ [ 15.684192] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.684409] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.684642] ================================================================== [ 15.419498] ================================================================== [ 15.420018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.420350] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.420611] [ 15.420884] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.420931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.420944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.420965] Call Trace: [ 15.420977] <TASK> [ 15.420992] dump_stack_lvl+0x73/0xb0 [ 15.421024] print_report+0xd1/0x610 [ 15.421047] ? __virt_addr_valid+0x1db/0x2d0 [ 15.421071] ? kasan_atomics_helper+0xd47/0x5450 [ 15.421095] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.421120] ? kasan_atomics_helper+0xd47/0x5450 [ 15.421144] kasan_report+0x141/0x180 [ 15.421167] ? kasan_atomics_helper+0xd47/0x5450 [ 15.421196] kasan_check_range+0x10c/0x1c0 [ 15.421222] __kasan_check_write+0x18/0x20 [ 15.421243] kasan_atomics_helper+0xd47/0x5450 [ 15.421267] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.421291] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.421319] ? kasan_atomics+0x152/0x310 [ 15.421348] kasan_atomics+0x1dc/0x310 [ 15.421372] ? __pfx_kasan_atomics+0x10/0x10 [ 15.421398] ? __pfx_read_tsc+0x10/0x10 [ 15.421421] ? ktime_get_ts64+0x86/0x230 [ 15.421507] kunit_try_run_case+0x1a5/0x480 [ 15.421564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.421616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.421642] ? __kthread_parkme+0x82/0x180 [ 15.421663] ? preempt_count_sub+0x50/0x80 [ 15.421688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.421742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.421779] kthread+0x337/0x6f0 [ 15.421799] ? trace_preempt_on+0x20/0xc0 [ 15.421823] ? __pfx_kthread+0x10/0x10 [ 15.421846] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.421869] ? calculate_sigpending+0x7b/0xa0 [ 15.421904] ? __pfx_kthread+0x10/0x10 [ 15.421927] ret_from_fork+0x116/0x1d0 [ 15.421946] ? __pfx_kthread+0x10/0x10 [ 15.421979] ret_from_fork_asm+0x1a/0x30 [ 15.422012] </TASK> [ 15.422023] [ 15.431071] Allocated by task 282: [ 15.431216] kasan_save_stack+0x45/0x70 [ 15.431546] kasan_save_track+0x18/0x40 [ 15.431740] kasan_save_alloc_info+0x3b/0x50 [ 15.431977] __kasan_kmalloc+0xb7/0xc0 [ 15.432178] __kmalloc_cache_noprof+0x189/0x420 [ 15.432481] kasan_atomics+0x95/0x310 [ 15.432691] kunit_try_run_case+0x1a5/0x480 [ 15.432960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.433204] kthread+0x337/0x6f0 [ 15.433450] ret_from_fork+0x116/0x1d0 [ 15.433635] ret_from_fork_asm+0x1a/0x30 [ 15.433862] [ 15.433957] The buggy address belongs to the object at ffff8881038e7800 [ 15.433957] which belongs to the cache kmalloc-64 of size 64 [ 15.434360] The buggy address is located 0 bytes to the right of [ 15.434360] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.434771] [ 15.434885] The buggy address belongs to the physical page: [ 15.435208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.435786] flags: 0x200000000000000(node=0|zone=2) [ 15.435986] page_type: f5(slab) [ 15.436180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.436628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.436973] page dumped because: kasan: bad access detected [ 15.437146] [ 15.437217] Memory state around the buggy address: [ 15.437551] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.437929] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.438277] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.438671] ^ [ 15.438912] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.439193] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.439409] ================================================================== [ 14.942185] ================================================================== [ 14.942497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.942814] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 14.943110] [ 14.943220] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.943263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.943274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.943296] Call Trace: [ 14.943306] <TASK> [ 14.943321] dump_stack_lvl+0x73/0xb0 [ 14.943349] print_report+0xd1/0x610 [ 14.943371] ? __virt_addr_valid+0x1db/0x2d0 [ 14.943394] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.943416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.943440] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.943463] kasan_report+0x141/0x180 [ 14.943484] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.943511] __asan_report_store4_noabort+0x1b/0x30 [ 14.943536] kasan_atomics_helper+0x4ba2/0x5450 [ 14.943560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.943582] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.943664] ? kasan_atomics+0x152/0x310 [ 14.943694] kasan_atomics+0x1dc/0x310 [ 14.943716] ? __pfx_kasan_atomics+0x10/0x10 [ 14.943742] ? __pfx_read_tsc+0x10/0x10 [ 14.943774] ? ktime_get_ts64+0x86/0x230 [ 14.943797] kunit_try_run_case+0x1a5/0x480 [ 14.943822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.943847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.943871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.943896] ? __kthread_parkme+0x82/0x180 [ 14.943917] ? preempt_count_sub+0x50/0x80 [ 14.943941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.943966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.943991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.944017] kthread+0x337/0x6f0 [ 14.944036] ? trace_preempt_on+0x20/0xc0 [ 14.944060] ? __pfx_kthread+0x10/0x10 [ 14.944080] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.944103] ? calculate_sigpending+0x7b/0xa0 [ 14.944128] ? __pfx_kthread+0x10/0x10 [ 14.944149] ret_from_fork+0x116/0x1d0 [ 14.944168] ? __pfx_kthread+0x10/0x10 [ 14.944189] ret_from_fork_asm+0x1a/0x30 [ 14.944220] </TASK> [ 14.944229] [ 14.952536] Allocated by task 282: [ 14.952701] kasan_save_stack+0x45/0x70 [ 14.952905] kasan_save_track+0x18/0x40 [ 14.953103] kasan_save_alloc_info+0x3b/0x50 [ 14.953291] __kasan_kmalloc+0xb7/0xc0 [ 14.953500] __kmalloc_cache_noprof+0x189/0x420 [ 14.953678] kasan_atomics+0x95/0x310 [ 14.953872] kunit_try_run_case+0x1a5/0x480 [ 14.954083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.954293] kthread+0x337/0x6f0 [ 14.954475] ret_from_fork+0x116/0x1d0 [ 14.954854] ret_from_fork_asm+0x1a/0x30 [ 14.955046] [ 14.955130] The buggy address belongs to the object at ffff8881038e7800 [ 14.955130] which belongs to the cache kmalloc-64 of size 64 [ 14.955740] The buggy address is located 0 bytes to the right of [ 14.955740] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 14.956232] [ 14.956317] The buggy address belongs to the physical page: [ 14.956569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 14.956929] flags: 0x200000000000000(node=0|zone=2) [ 14.957128] page_type: f5(slab) [ 14.957283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.957679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.957938] page dumped because: kasan: bad access detected [ 14.958111] [ 14.958179] Memory state around the buggy address: [ 14.958334] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.958700] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.959034] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.959437] ^ [ 14.959591] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.959814] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.960514] ================================================================== [ 15.723291] ================================================================== [ 15.723684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.724022] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.724330] [ 15.724454] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.724500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.724514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.724536] Call Trace: [ 15.724568] <TASK> [ 15.724583] dump_stack_lvl+0x73/0xb0 [ 15.724628] print_report+0xd1/0x610 [ 15.724665] ? __virt_addr_valid+0x1db/0x2d0 [ 15.724703] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.724753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.724787] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.724824] kasan_report+0x141/0x180 [ 15.724861] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.724888] kasan_check_range+0x10c/0x1c0 [ 15.724913] __kasan_check_read+0x15/0x20 [ 15.724934] kasan_atomics_helper+0x13b5/0x5450 [ 15.724958] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.724982] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.725008] ? kasan_atomics+0x152/0x310 [ 15.725036] kasan_atomics+0x1dc/0x310 [ 15.725060] ? __pfx_kasan_atomics+0x10/0x10 [ 15.725085] ? __pfx_read_tsc+0x10/0x10 [ 15.725107] ? ktime_get_ts64+0x86/0x230 [ 15.725131] kunit_try_run_case+0x1a5/0x480 [ 15.725157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.725181] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.725206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.725232] ? __kthread_parkme+0x82/0x180 [ 15.725254] ? preempt_count_sub+0x50/0x80 [ 15.725278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.725304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.725331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.725359] kthread+0x337/0x6f0 [ 15.725379] ? trace_preempt_on+0x20/0xc0 [ 15.725403] ? __pfx_kthread+0x10/0x10 [ 15.725463] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.725487] ? calculate_sigpending+0x7b/0xa0 [ 15.725512] ? __pfx_kthread+0x10/0x10 [ 15.725551] ret_from_fork+0x116/0x1d0 [ 15.725570] ? __pfx_kthread+0x10/0x10 [ 15.725606] ret_from_fork_asm+0x1a/0x30 [ 15.725651] </TASK> [ 15.725662] [ 15.733494] Allocated by task 282: [ 15.733625] kasan_save_stack+0x45/0x70 [ 15.733834] kasan_save_track+0x18/0x40 [ 15.734047] kasan_save_alloc_info+0x3b/0x50 [ 15.734277] __kasan_kmalloc+0xb7/0xc0 [ 15.734537] __kmalloc_cache_noprof+0x189/0x420 [ 15.734775] kasan_atomics+0x95/0x310 [ 15.734971] kunit_try_run_case+0x1a5/0x480 [ 15.735214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.735547] kthread+0x337/0x6f0 [ 15.735722] ret_from_fork+0x116/0x1d0 [ 15.735915] ret_from_fork_asm+0x1a/0x30 [ 15.736111] [ 15.736207] The buggy address belongs to the object at ffff8881038e7800 [ 15.736207] which belongs to the cache kmalloc-64 of size 64 [ 15.736658] The buggy address is located 0 bytes to the right of [ 15.736658] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.737113] [ 15.737234] The buggy address belongs to the physical page: [ 15.737540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.737961] flags: 0x200000000000000(node=0|zone=2) [ 15.738214] page_type: f5(slab) [ 15.738374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.738647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.739012] page dumped because: kasan: bad access detected [ 15.739312] [ 15.739406] Memory state around the buggy address: [ 15.739642] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.739895] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.740234] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.740547] ^ [ 15.740795] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.741089] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.741420] ================================================================== [ 16.133808] ================================================================== [ 16.134142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.134745] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.135250] [ 16.135359] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.135404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.135417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.135439] Call Trace: [ 16.135452] <TASK> [ 16.135466] dump_stack_lvl+0x73/0xb0 [ 16.135509] print_report+0xd1/0x610 [ 16.135533] ? __virt_addr_valid+0x1db/0x2d0 [ 16.135557] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.135580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.135605] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.135629] kasan_report+0x141/0x180 [ 16.135653] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.135681] kasan_check_range+0x10c/0x1c0 [ 16.135706] __kasan_check_write+0x18/0x20 [ 16.135727] kasan_atomics_helper+0x1e12/0x5450 [ 16.135752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.135787] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.135814] ? kasan_atomics+0x152/0x310 [ 16.135842] kasan_atomics+0x1dc/0x310 [ 16.135867] ? __pfx_kasan_atomics+0x10/0x10 [ 16.135893] ? __pfx_read_tsc+0x10/0x10 [ 16.135916] ? ktime_get_ts64+0x86/0x230 [ 16.135941] kunit_try_run_case+0x1a5/0x480 [ 16.135967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.135991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.136018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.136043] ? __kthread_parkme+0x82/0x180 [ 16.136065] ? preempt_count_sub+0x50/0x80 [ 16.136091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.136117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.136144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.136171] kthread+0x337/0x6f0 [ 16.136191] ? trace_preempt_on+0x20/0xc0 [ 16.136215] ? __pfx_kthread+0x10/0x10 [ 16.136238] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.136260] ? calculate_sigpending+0x7b/0xa0 [ 16.136285] ? __pfx_kthread+0x10/0x10 [ 16.136309] ret_from_fork+0x116/0x1d0 [ 16.136328] ? __pfx_kthread+0x10/0x10 [ 16.136350] ret_from_fork_asm+0x1a/0x30 [ 16.136382] </TASK> [ 16.136393] [ 16.146523] Allocated by task 282: [ 16.146704] kasan_save_stack+0x45/0x70 [ 16.146895] kasan_save_track+0x18/0x40 [ 16.147088] kasan_save_alloc_info+0x3b/0x50 [ 16.147282] __kasan_kmalloc+0xb7/0xc0 [ 16.147444] __kmalloc_cache_noprof+0x189/0x420 [ 16.148040] kasan_atomics+0x95/0x310 [ 16.148208] kunit_try_run_case+0x1a5/0x480 [ 16.148412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.148845] kthread+0x337/0x6f0 [ 16.149024] ret_from_fork+0x116/0x1d0 [ 16.149312] ret_from_fork_asm+0x1a/0x30 [ 16.149571] [ 16.149778] The buggy address belongs to the object at ffff8881038e7800 [ 16.149778] which belongs to the cache kmalloc-64 of size 64 [ 16.150316] The buggy address is located 0 bytes to the right of [ 16.150316] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.151046] [ 16.151264] The buggy address belongs to the physical page: [ 16.151469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.151955] flags: 0x200000000000000(node=0|zone=2) [ 16.152187] page_type: f5(slab) [ 16.152334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.152830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.153228] page dumped because: kasan: bad access detected [ 16.153496] [ 16.153573] Memory state around the buggy address: [ 16.153789] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.154084] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.154401] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.154988] ^ [ 16.155182] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.155685] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156041] ================================================================== [ 15.947617] ================================================================== [ 15.947946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.948596] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.949039] [ 15.949321] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.949453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.949470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.949492] Call Trace: [ 15.949509] <TASK> [ 15.949528] dump_stack_lvl+0x73/0xb0 [ 15.949559] print_report+0xd1/0x610 [ 15.949583] ? __virt_addr_valid+0x1db/0x2d0 [ 15.949607] ? kasan_atomics_helper+0x194a/0x5450 [ 15.949630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.949656] ? kasan_atomics_helper+0x194a/0x5450 [ 15.949680] kasan_report+0x141/0x180 [ 15.949703] ? kasan_atomics_helper+0x194a/0x5450 [ 15.949732] kasan_check_range+0x10c/0x1c0 [ 15.949771] __kasan_check_write+0x18/0x20 [ 15.949793] kasan_atomics_helper+0x194a/0x5450 [ 15.949817] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.949842] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.949871] ? kasan_atomics+0x152/0x310 [ 15.949898] kasan_atomics+0x1dc/0x310 [ 15.949923] ? __pfx_kasan_atomics+0x10/0x10 [ 15.949949] ? __pfx_read_tsc+0x10/0x10 [ 15.949971] ? ktime_get_ts64+0x86/0x230 [ 15.949997] kunit_try_run_case+0x1a5/0x480 [ 15.950024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.950048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.950073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.950099] ? __kthread_parkme+0x82/0x180 [ 15.950121] ? preempt_count_sub+0x50/0x80 [ 15.950145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.950172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.950198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.950225] kthread+0x337/0x6f0 [ 15.950246] ? trace_preempt_on+0x20/0xc0 [ 15.950269] ? __pfx_kthread+0x10/0x10 [ 15.950291] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.950314] ? calculate_sigpending+0x7b/0xa0 [ 15.950340] ? __pfx_kthread+0x10/0x10 [ 15.950362] ret_from_fork+0x116/0x1d0 [ 15.950388] ? __pfx_kthread+0x10/0x10 [ 15.950409] ret_from_fork_asm+0x1a/0x30 [ 15.950448] </TASK> [ 15.950459] [ 15.961040] Allocated by task 282: [ 15.961303] kasan_save_stack+0x45/0x70 [ 15.961612] kasan_save_track+0x18/0x40 [ 15.961854] kasan_save_alloc_info+0x3b/0x50 [ 15.962033] __kasan_kmalloc+0xb7/0xc0 [ 15.962447] __kmalloc_cache_noprof+0x189/0x420 [ 15.962784] kasan_atomics+0x95/0x310 [ 15.962985] kunit_try_run_case+0x1a5/0x480 [ 15.963309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963684] kthread+0x337/0x6f0 [ 15.963882] ret_from_fork+0x116/0x1d0 [ 15.964198] ret_from_fork_asm+0x1a/0x30 [ 15.964503] [ 15.964602] The buggy address belongs to the object at ffff8881038e7800 [ 15.964602] which belongs to the cache kmalloc-64 of size 64 [ 15.965255] The buggy address is located 0 bytes to the right of [ 15.965255] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.965955] [ 15.966250] The buggy address belongs to the physical page: [ 15.966522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.966853] flags: 0x200000000000000(node=0|zone=2) [ 15.967177] page_type: f5(slab) [ 15.967468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.967822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.968119] page dumped because: kasan: bad access detected [ 15.968374] [ 15.968468] Memory state around the buggy address: [ 15.968693] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.969305] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.969782] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.970164] ^ [ 15.970478] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.970836] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.971202] ================================================================== [ 15.782632] ================================================================== [ 15.783054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.783462] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.783831] [ 15.783943] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.783986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.783998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.784037] Call Trace: [ 15.784053] <TASK> [ 15.784069] dump_stack_lvl+0x73/0xb0 [ 15.784098] print_report+0xd1/0x610 [ 15.784121] ? __virt_addr_valid+0x1db/0x2d0 [ 15.784146] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.784169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.784194] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.784218] kasan_report+0x141/0x180 [ 15.784242] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.784269] __asan_report_store8_noabort+0x1b/0x30 [ 15.784297] kasan_atomics_helper+0x50d4/0x5450 [ 15.784321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.784346] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.784373] ? kasan_atomics+0x152/0x310 [ 15.784401] kasan_atomics+0x1dc/0x310 [ 15.784458] ? __pfx_kasan_atomics+0x10/0x10 [ 15.784486] ? __pfx_read_tsc+0x10/0x10 [ 15.784508] ? ktime_get_ts64+0x86/0x230 [ 15.784534] kunit_try_run_case+0x1a5/0x480 [ 15.784560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.784585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.784611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.784636] ? __kthread_parkme+0x82/0x180 [ 15.784658] ? preempt_count_sub+0x50/0x80 [ 15.784684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.784710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.784737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.784773] kthread+0x337/0x6f0 [ 15.784794] ? trace_preempt_on+0x20/0xc0 [ 15.784838] ? __pfx_kthread+0x10/0x10 [ 15.784861] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.784884] ? calculate_sigpending+0x7b/0xa0 [ 15.784927] ? __pfx_kthread+0x10/0x10 [ 15.784950] ret_from_fork+0x116/0x1d0 [ 15.784971] ? __pfx_kthread+0x10/0x10 [ 15.784992] ret_from_fork_asm+0x1a/0x30 [ 15.785024] </TASK> [ 15.785035] [ 15.792724] Allocated by task 282: [ 15.792897] kasan_save_stack+0x45/0x70 [ 15.793078] kasan_save_track+0x18/0x40 [ 15.793261] kasan_save_alloc_info+0x3b/0x50 [ 15.793516] __kasan_kmalloc+0xb7/0xc0 [ 15.793715] __kmalloc_cache_noprof+0x189/0x420 [ 15.793933] kasan_atomics+0x95/0x310 [ 15.794106] kunit_try_run_case+0x1a5/0x480 [ 15.794338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.794620] kthread+0x337/0x6f0 [ 15.794790] ret_from_fork+0x116/0x1d0 [ 15.794951] ret_from_fork_asm+0x1a/0x30 [ 15.795165] [ 15.795287] The buggy address belongs to the object at ffff8881038e7800 [ 15.795287] which belongs to the cache kmalloc-64 of size 64 [ 15.795777] The buggy address is located 0 bytes to the right of [ 15.795777] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.796307] [ 15.796413] The buggy address belongs to the physical page: [ 15.796657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.797039] flags: 0x200000000000000(node=0|zone=2) [ 15.797269] page_type: f5(slab) [ 15.797542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.797833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.798177] page dumped because: kasan: bad access detected [ 15.798446] [ 15.798541] Memory state around the buggy address: [ 15.798801] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.799129] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.799415] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.799646] ^ [ 15.799839] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.800173] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.800538] ================================================================== [ 16.088156] ================================================================== [ 16.088752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.089153] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.089602] [ 16.089780] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.089827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.089840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.089962] Call Trace: [ 16.089980] <TASK> [ 16.089996] dump_stack_lvl+0x73/0xb0 [ 16.090027] print_report+0xd1/0x610 [ 16.090050] ? __virt_addr_valid+0x1db/0x2d0 [ 16.090074] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.090098] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.090123] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.090148] kasan_report+0x141/0x180 [ 16.090172] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.090200] kasan_check_range+0x10c/0x1c0 [ 16.090226] __kasan_check_write+0x18/0x20 [ 16.090247] kasan_atomics_helper+0x1ce1/0x5450 [ 16.090272] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.090297] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.090324] ? kasan_atomics+0x152/0x310 [ 16.090352] kasan_atomics+0x1dc/0x310 [ 16.090377] ? __pfx_kasan_atomics+0x10/0x10 [ 16.090410] ? __pfx_read_tsc+0x10/0x10 [ 16.090433] ? ktime_get_ts64+0x86/0x230 [ 16.090466] kunit_try_run_case+0x1a5/0x480 [ 16.090493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.090518] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.090544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.090570] ? __kthread_parkme+0x82/0x180 [ 16.090591] ? preempt_count_sub+0x50/0x80 [ 16.090616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.090642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.090669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.090696] kthread+0x337/0x6f0 [ 16.090716] ? trace_preempt_on+0x20/0xc0 [ 16.090741] ? __pfx_kthread+0x10/0x10 [ 16.090773] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.090797] ? calculate_sigpending+0x7b/0xa0 [ 16.090822] ? __pfx_kthread+0x10/0x10 [ 16.090845] ret_from_fork+0x116/0x1d0 [ 16.090865] ? __pfx_kthread+0x10/0x10 [ 16.090887] ret_from_fork_asm+0x1a/0x30 [ 16.090918] </TASK> [ 16.090929] [ 16.100496] Allocated by task 282: [ 16.100750] kasan_save_stack+0x45/0x70 [ 16.101033] kasan_save_track+0x18/0x40 [ 16.101282] kasan_save_alloc_info+0x3b/0x50 [ 16.101569] __kasan_kmalloc+0xb7/0xc0 [ 16.101743] __kmalloc_cache_noprof+0x189/0x420 [ 16.102073] kasan_atomics+0x95/0x310 [ 16.102265] kunit_try_run_case+0x1a5/0x480 [ 16.102565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.102876] kthread+0x337/0x6f0 [ 16.103048] ret_from_fork+0x116/0x1d0 [ 16.103218] ret_from_fork_asm+0x1a/0x30 [ 16.103398] [ 16.103746] The buggy address belongs to the object at ffff8881038e7800 [ 16.103746] which belongs to the cache kmalloc-64 of size 64 [ 16.104213] The buggy address is located 0 bytes to the right of [ 16.104213] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.104942] [ 16.105036] The buggy address belongs to the physical page: [ 16.105265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.105765] flags: 0x200000000000000(node=0|zone=2) [ 16.105992] page_type: f5(slab) [ 16.106230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.106628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.107070] page dumped because: kasan: bad access detected [ 16.107364] [ 16.107441] Memory state around the buggy address: [ 16.107696] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.108169] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.108549] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.108812] ^ [ 16.109120] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.109427] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.109926] ================================================================== [ 16.256969] ================================================================== [ 16.257364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.257774] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.258115] [ 16.258212] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.258286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.258299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.258331] Call Trace: [ 16.258346] <TASK> [ 16.258361] dump_stack_lvl+0x73/0xb0 [ 16.258398] print_report+0xd1/0x610 [ 16.258465] ? __virt_addr_valid+0x1db/0x2d0 [ 16.258491] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.258513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.258549] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.258573] kasan_report+0x141/0x180 [ 16.258623] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.258651] __asan_report_load8_noabort+0x18/0x20 [ 16.258678] kasan_atomics_helper+0x4f98/0x5450 [ 16.258713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.258737] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.258772] ? kasan_atomics+0x152/0x310 [ 16.258800] kasan_atomics+0x1dc/0x310 [ 16.258824] ? __pfx_kasan_atomics+0x10/0x10 [ 16.258850] ? __pfx_read_tsc+0x10/0x10 [ 16.258872] ? ktime_get_ts64+0x86/0x230 [ 16.258925] kunit_try_run_case+0x1a5/0x480 [ 16.258952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.259003] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.259043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.259083] ? __kthread_parkme+0x82/0x180 [ 16.259105] ? preempt_count_sub+0x50/0x80 [ 16.259143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.259183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.259210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.259238] kthread+0x337/0x6f0 [ 16.259258] ? trace_preempt_on+0x20/0xc0 [ 16.259283] ? __pfx_kthread+0x10/0x10 [ 16.259314] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.259338] ? calculate_sigpending+0x7b/0xa0 [ 16.259374] ? __pfx_kthread+0x10/0x10 [ 16.259397] ret_from_fork+0x116/0x1d0 [ 16.259416] ? __pfx_kthread+0x10/0x10 [ 16.259456] ret_from_fork_asm+0x1a/0x30 [ 16.259489] </TASK> [ 16.259500] [ 16.271628] Allocated by task 282: [ 16.271990] kasan_save_stack+0x45/0x70 [ 16.272380] kasan_save_track+0x18/0x40 [ 16.272783] kasan_save_alloc_info+0x3b/0x50 [ 16.273174] __kasan_kmalloc+0xb7/0xc0 [ 16.273310] __kmalloc_cache_noprof+0x189/0x420 [ 16.273573] kasan_atomics+0x95/0x310 [ 16.273957] kunit_try_run_case+0x1a5/0x480 [ 16.274363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.274878] kthread+0x337/0x6f0 [ 16.275119] ret_from_fork+0x116/0x1d0 [ 16.275353] ret_from_fork_asm+0x1a/0x30 [ 16.275747] [ 16.275830] The buggy address belongs to the object at ffff8881038e7800 [ 16.275830] which belongs to the cache kmalloc-64 of size 64 [ 16.276185] The buggy address is located 0 bytes to the right of [ 16.276185] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.276876] [ 16.277037] The buggy address belongs to the physical page: [ 16.277542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.278224] flags: 0x200000000000000(node=0|zone=2) [ 16.278695] page_type: f5(slab) [ 16.279016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.279727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.280345] page dumped because: kasan: bad access detected [ 16.280529] [ 16.280600] Memory state around the buggy address: [ 16.280766] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.281238] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.281618] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.281842] ^ [ 16.281994] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282205] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282418] ================================================================== [ 15.859189] ================================================================== [ 15.859623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.859952] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.860285] [ 15.860403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.860468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.860481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.860502] Call Trace: [ 15.860519] <TASK> [ 15.860558] dump_stack_lvl+0x73/0xb0 [ 15.860590] print_report+0xd1/0x610 [ 15.860612] ? __virt_addr_valid+0x1db/0x2d0 [ 15.860637] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.860659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.860684] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.860724] kasan_report+0x141/0x180 [ 15.860748] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.860801] kasan_check_range+0x10c/0x1c0 [ 15.860827] __kasan_check_write+0x18/0x20 [ 15.860848] kasan_atomics_helper+0x16e7/0x5450 [ 15.860874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.860898] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.860924] ? kasan_atomics+0x152/0x310 [ 15.860953] kasan_atomics+0x1dc/0x310 [ 15.860977] ? __pfx_kasan_atomics+0x10/0x10 [ 15.861003] ? __pfx_read_tsc+0x10/0x10 [ 15.861025] ? ktime_get_ts64+0x86/0x230 [ 15.861050] kunit_try_run_case+0x1a5/0x480 [ 15.861075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.861118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.861145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.861183] ? __kthread_parkme+0x82/0x180 [ 15.861219] ? preempt_count_sub+0x50/0x80 [ 15.861258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.861286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.861326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.861367] kthread+0x337/0x6f0 [ 15.861388] ? trace_preempt_on+0x20/0xc0 [ 15.861413] ? __pfx_kthread+0x10/0x10 [ 15.861455] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.861479] ? calculate_sigpending+0x7b/0xa0 [ 15.861505] ? __pfx_kthread+0x10/0x10 [ 15.861528] ret_from_fork+0x116/0x1d0 [ 15.861548] ? __pfx_kthread+0x10/0x10 [ 15.861570] ret_from_fork_asm+0x1a/0x30 [ 15.861602] </TASK> [ 15.861613] [ 15.869270] Allocated by task 282: [ 15.869479] kasan_save_stack+0x45/0x70 [ 15.869679] kasan_save_track+0x18/0x40 [ 15.869904] kasan_save_alloc_info+0x3b/0x50 [ 15.870096] __kasan_kmalloc+0xb7/0xc0 [ 15.870275] __kmalloc_cache_noprof+0x189/0x420 [ 15.870540] kasan_atomics+0x95/0x310 [ 15.870742] kunit_try_run_case+0x1a5/0x480 [ 15.870961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.871239] kthread+0x337/0x6f0 [ 15.871399] ret_from_fork+0x116/0x1d0 [ 15.871604] ret_from_fork_asm+0x1a/0x30 [ 15.871787] [ 15.871886] The buggy address belongs to the object at ffff8881038e7800 [ 15.871886] which belongs to the cache kmalloc-64 of size 64 [ 15.872369] The buggy address is located 0 bytes to the right of [ 15.872369] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.872983] [ 15.873113] The buggy address belongs to the physical page: [ 15.873396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.873794] flags: 0x200000000000000(node=0|zone=2) [ 15.874030] page_type: f5(slab) [ 15.874199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.874533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.874770] page dumped because: kasan: bad access detected [ 15.874942] [ 15.875017] Memory state around the buggy address: [ 15.875241] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.875627] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.875995] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.876317] ^ [ 15.877194] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.877598] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.878244] ================================================================== [ 15.898596] ================================================================== [ 15.898956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.899358] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.899719] [ 15.899860] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.899905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.899918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.899941] Call Trace: [ 15.899955] <TASK> [ 15.899970] dump_stack_lvl+0x73/0xb0 [ 15.899999] print_report+0xd1/0x610 [ 15.900022] ? __virt_addr_valid+0x1db/0x2d0 [ 15.900045] ? kasan_atomics_helper+0x1818/0x5450 [ 15.900068] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.900092] ? kasan_atomics_helper+0x1818/0x5450 [ 15.900116] kasan_report+0x141/0x180 [ 15.900140] ? kasan_atomics_helper+0x1818/0x5450 [ 15.900168] kasan_check_range+0x10c/0x1c0 [ 15.900193] __kasan_check_write+0x18/0x20 [ 15.900236] kasan_atomics_helper+0x1818/0x5450 [ 15.900261] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.900286] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.900313] ? kasan_atomics+0x152/0x310 [ 15.900357] kasan_atomics+0x1dc/0x310 [ 15.900381] ? __pfx_kasan_atomics+0x10/0x10 [ 15.900444] ? __pfx_read_tsc+0x10/0x10 [ 15.900468] ? ktime_get_ts64+0x86/0x230 [ 15.900493] kunit_try_run_case+0x1a5/0x480 [ 15.900519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.900543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.900569] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.900595] ? __kthread_parkme+0x82/0x180 [ 15.900616] ? preempt_count_sub+0x50/0x80 [ 15.900641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.900667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.900693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.900720] kthread+0x337/0x6f0 [ 15.900768] ? trace_preempt_on+0x20/0xc0 [ 15.900793] ? __pfx_kthread+0x10/0x10 [ 15.900815] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.900838] ? calculate_sigpending+0x7b/0xa0 [ 15.900863] ? __pfx_kthread+0x10/0x10 [ 15.900887] ret_from_fork+0x116/0x1d0 [ 15.900923] ? __pfx_kthread+0x10/0x10 [ 15.900947] ret_from_fork_asm+0x1a/0x30 [ 15.900978] </TASK> [ 15.900989] [ 15.908586] Allocated by task 282: [ 15.910033] kasan_save_stack+0x45/0x70 [ 15.910237] kasan_save_track+0x18/0x40 [ 15.910407] kasan_save_alloc_info+0x3b/0x50 [ 15.910777] __kasan_kmalloc+0xb7/0xc0 [ 15.911060] __kmalloc_cache_noprof+0x189/0x420 [ 15.911374] kasan_atomics+0x95/0x310 [ 15.911667] kunit_try_run_case+0x1a5/0x480 [ 15.911955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.912287] kthread+0x337/0x6f0 [ 15.912586] ret_from_fork+0x116/0x1d0 [ 15.912914] ret_from_fork_asm+0x1a/0x30 [ 15.913188] [ 15.913373] The buggy address belongs to the object at ffff8881038e7800 [ 15.913373] which belongs to the cache kmalloc-64 of size 64 [ 15.914007] The buggy address is located 0 bytes to the right of [ 15.914007] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.914823] [ 15.914944] The buggy address belongs to the physical page: [ 15.915300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.915771] flags: 0x200000000000000(node=0|zone=2) [ 15.916088] page_type: f5(slab) [ 15.916319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.916793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.917220] page dumped because: kasan: bad access detected [ 15.917569] [ 15.917651] Memory state around the buggy address: [ 15.918036] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.918413] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.918831] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.919120] ^ [ 15.919506] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.919907] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920288] ================================================================== [ 15.819951] ================================================================== [ 15.820788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.821093] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.821497] [ 15.821627] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.821683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.821695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.821731] Call Trace: [ 15.821768] <TASK> [ 15.821782] dump_stack_lvl+0x73/0xb0 [ 15.821842] print_report+0xd1/0x610 [ 15.821865] ? __virt_addr_valid+0x1db/0x2d0 [ 15.821902] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.821939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.821978] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.822002] kasan_report+0x141/0x180 [ 15.822026] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.822055] kasan_check_range+0x10c/0x1c0 [ 15.822080] __kasan_check_write+0x18/0x20 [ 15.822102] kasan_atomics_helper+0x15b6/0x5450 [ 15.822126] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.822151] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.822178] ? kasan_atomics+0x152/0x310 [ 15.822206] kasan_atomics+0x1dc/0x310 [ 15.822229] ? __pfx_kasan_atomics+0x10/0x10 [ 15.822256] ? __pfx_read_tsc+0x10/0x10 [ 15.822278] ? ktime_get_ts64+0x86/0x230 [ 15.822303] kunit_try_run_case+0x1a5/0x480 [ 15.822329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.822353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.822379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.822412] ? __kthread_parkme+0x82/0x180 [ 15.822453] ? preempt_count_sub+0x50/0x80 [ 15.822479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.822505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.822558] kthread+0x337/0x6f0 [ 15.822579] ? trace_preempt_on+0x20/0xc0 [ 15.822623] ? __pfx_kthread+0x10/0x10 [ 15.822645] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.822669] ? calculate_sigpending+0x7b/0xa0 [ 15.822711] ? __pfx_kthread+0x10/0x10 [ 15.822733] ret_from_fork+0x116/0x1d0 [ 15.822833] ? __pfx_kthread+0x10/0x10 [ 15.822856] ret_from_fork_asm+0x1a/0x30 [ 15.822910] </TASK> [ 15.822923] [ 15.830727] Allocated by task 282: [ 15.830925] kasan_save_stack+0x45/0x70 [ 15.831149] kasan_save_track+0x18/0x40 [ 15.831355] kasan_save_alloc_info+0x3b/0x50 [ 15.831558] __kasan_kmalloc+0xb7/0xc0 [ 15.831775] __kmalloc_cache_noprof+0x189/0x420 [ 15.832055] kasan_atomics+0x95/0x310 [ 15.832248] kunit_try_run_case+0x1a5/0x480 [ 15.832485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.832740] kthread+0x337/0x6f0 [ 15.832917] ret_from_fork+0x116/0x1d0 [ 15.833108] ret_from_fork_asm+0x1a/0x30 [ 15.833307] [ 15.833403] The buggy address belongs to the object at ffff8881038e7800 [ 15.833403] which belongs to the cache kmalloc-64 of size 64 [ 15.833928] The buggy address is located 0 bytes to the right of [ 15.833928] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.834300] [ 15.834407] The buggy address belongs to the physical page: [ 15.834700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.835115] flags: 0x200000000000000(node=0|zone=2) [ 15.835365] page_type: f5(slab) [ 15.835602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.835881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.836112] page dumped because: kasan: bad access detected [ 15.836368] [ 15.836473] Memory state around the buggy address: [ 15.836702] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.837033] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.837308] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.837550] ^ [ 15.837808] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838123] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838484] ================================================================== [ 15.742111] ================================================================== [ 15.742661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.743007] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.743332] [ 15.743417] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.743459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.743471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.743493] Call Trace: [ 15.743507] <TASK> [ 15.743522] dump_stack_lvl+0x73/0xb0 [ 15.743552] print_report+0xd1/0x610 [ 15.743575] ? __virt_addr_valid+0x1db/0x2d0 [ 15.743599] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.743622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.743647] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.743670] kasan_report+0x141/0x180 [ 15.743693] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.743721] __asan_report_load8_noabort+0x18/0x20 [ 15.743747] kasan_atomics_helper+0x4eae/0x5450 [ 15.743781] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.743805] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.743831] ? kasan_atomics+0x152/0x310 [ 15.743859] kasan_atomics+0x1dc/0x310 [ 15.743883] ? __pfx_kasan_atomics+0x10/0x10 [ 15.743908] ? __pfx_read_tsc+0x10/0x10 [ 15.743931] ? ktime_get_ts64+0x86/0x230 [ 15.743956] kunit_try_run_case+0x1a5/0x480 [ 15.743982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.744006] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.744032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.744057] ? __kthread_parkme+0x82/0x180 [ 15.744079] ? preempt_count_sub+0x50/0x80 [ 15.744103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.744129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.744156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.744183] kthread+0x337/0x6f0 [ 15.744204] ? trace_preempt_on+0x20/0xc0 [ 15.744229] ? __pfx_kthread+0x10/0x10 [ 15.744251] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.744273] ? calculate_sigpending+0x7b/0xa0 [ 15.744299] ? __pfx_kthread+0x10/0x10 [ 15.744322] ret_from_fork+0x116/0x1d0 [ 15.744342] ? __pfx_kthread+0x10/0x10 [ 15.744365] ret_from_fork_asm+0x1a/0x30 [ 15.744396] </TASK> [ 15.744407] [ 15.753615] Allocated by task 282: [ 15.753791] kasan_save_stack+0x45/0x70 [ 15.754157] kasan_save_track+0x18/0x40 [ 15.754384] kasan_save_alloc_info+0x3b/0x50 [ 15.754767] __kasan_kmalloc+0xb7/0xc0 [ 15.754963] __kmalloc_cache_noprof+0x189/0x420 [ 15.755311] kasan_atomics+0x95/0x310 [ 15.755621] kunit_try_run_case+0x1a5/0x480 [ 15.755917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.756170] kthread+0x337/0x6f0 [ 15.756475] ret_from_fork+0x116/0x1d0 [ 15.756770] ret_from_fork_asm+0x1a/0x30 [ 15.757057] [ 15.757181] The buggy address belongs to the object at ffff8881038e7800 [ 15.757181] which belongs to the cache kmalloc-64 of size 64 [ 15.757829] The buggy address is located 0 bytes to the right of [ 15.757829] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.758337] [ 15.758491] The buggy address belongs to the physical page: [ 15.758708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.759074] flags: 0x200000000000000(node=0|zone=2) [ 15.759304] page_type: f5(slab) [ 15.759495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.759846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.760170] page dumped because: kasan: bad access detected [ 15.760411] [ 15.760535] Memory state around the buggy address: [ 15.760770] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.761074] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.761376] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.761687] ^ [ 15.761932] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.762251] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.762571] ================================================================== [ 16.019326] ================================================================== [ 16.019938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.020279] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.020961] [ 16.021177] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.021225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.021238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.021261] Call Trace: [ 16.021277] <TASK> [ 16.021294] dump_stack_lvl+0x73/0xb0 [ 16.021396] print_report+0xd1/0x610 [ 16.021423] ? __virt_addr_valid+0x1db/0x2d0 [ 16.021458] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.021481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.021507] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.021531] kasan_report+0x141/0x180 [ 16.021554] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.021582] kasan_check_range+0x10c/0x1c0 [ 16.021607] __kasan_check_write+0x18/0x20 [ 16.021628] kasan_atomics_helper+0x1b22/0x5450 [ 16.021653] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.021678] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.021705] ? kasan_atomics+0x152/0x310 [ 16.021733] kasan_atomics+0x1dc/0x310 [ 16.021770] ? __pfx_kasan_atomics+0x10/0x10 [ 16.021796] ? __pfx_read_tsc+0x10/0x10 [ 16.021817] ? ktime_get_ts64+0x86/0x230 [ 16.021843] kunit_try_run_case+0x1a5/0x480 [ 16.021869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.021894] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.021919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.021945] ? __kthread_parkme+0x82/0x180 [ 16.021967] ? preempt_count_sub+0x50/0x80 [ 16.021992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.022018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.022043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.022070] kthread+0x337/0x6f0 [ 16.022092] ? trace_preempt_on+0x20/0xc0 [ 16.022117] ? __pfx_kthread+0x10/0x10 [ 16.022142] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.022167] ? calculate_sigpending+0x7b/0xa0 [ 16.022192] ? __pfx_kthread+0x10/0x10 [ 16.022216] ret_from_fork+0x116/0x1d0 [ 16.022235] ? __pfx_kthread+0x10/0x10 [ 16.022257] ret_from_fork_asm+0x1a/0x30 [ 16.022290] </TASK> [ 16.022301] [ 16.031958] Allocated by task 282: [ 16.032158] kasan_save_stack+0x45/0x70 [ 16.032355] kasan_save_track+0x18/0x40 [ 16.032873] kasan_save_alloc_info+0x3b/0x50 [ 16.033060] __kasan_kmalloc+0xb7/0xc0 [ 16.033251] __kmalloc_cache_noprof+0x189/0x420 [ 16.033663] kasan_atomics+0x95/0x310 [ 16.033840] kunit_try_run_case+0x1a5/0x480 [ 16.034054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.034293] kthread+0x337/0x6f0 [ 16.034462] ret_from_fork+0x116/0x1d0 [ 16.034917] ret_from_fork_asm+0x1a/0x30 [ 16.035068] [ 16.035292] The buggy address belongs to the object at ffff8881038e7800 [ 16.035292] which belongs to the cache kmalloc-64 of size 64 [ 16.035974] The buggy address is located 0 bytes to the right of [ 16.035974] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.036656] [ 16.036737] The buggy address belongs to the physical page: [ 16.037017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.037340] flags: 0x200000000000000(node=0|zone=2) [ 16.037787] page_type: f5(slab) [ 16.037965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.038395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.038851] page dumped because: kasan: bad access detected [ 16.039192] [ 16.039291] Memory state around the buggy address: [ 16.039455] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.039952] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.040341] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.040692] ^ [ 16.041033] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.041416] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.041695] ================================================================== [ 16.111150] ================================================================== [ 16.111752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.112090] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.112614] [ 16.112724] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.112781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.112795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.112816] Call Trace: [ 16.112833] <TASK> [ 16.112852] dump_stack_lvl+0x73/0xb0 [ 16.113056] print_report+0xd1/0x610 [ 16.113080] ? __virt_addr_valid+0x1db/0x2d0 [ 16.113105] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.113128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.113153] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.113177] kasan_report+0x141/0x180 [ 16.113200] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.113228] kasan_check_range+0x10c/0x1c0 [ 16.113254] __kasan_check_write+0x18/0x20 [ 16.113275] kasan_atomics_helper+0x1d7a/0x5450 [ 16.113299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.113325] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.113353] ? kasan_atomics+0x152/0x310 [ 16.113381] kasan_atomics+0x1dc/0x310 [ 16.113405] ? __pfx_kasan_atomics+0x10/0x10 [ 16.113431] ? __pfx_read_tsc+0x10/0x10 [ 16.113517] ? ktime_get_ts64+0x86/0x230 [ 16.113544] kunit_try_run_case+0x1a5/0x480 [ 16.113572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.113597] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.113623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.113649] ? __kthread_parkme+0x82/0x180 [ 16.113671] ? preempt_count_sub+0x50/0x80 [ 16.113696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.113722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.113748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.113787] kthread+0x337/0x6f0 [ 16.113807] ? trace_preempt_on+0x20/0xc0 [ 16.113832] ? __pfx_kthread+0x10/0x10 [ 16.113853] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.113877] ? calculate_sigpending+0x7b/0xa0 [ 16.113902] ? __pfx_kthread+0x10/0x10 [ 16.113925] ret_from_fork+0x116/0x1d0 [ 16.113945] ? __pfx_kthread+0x10/0x10 [ 16.113967] ret_from_fork_asm+0x1a/0x30 [ 16.113998] </TASK> [ 16.114009] [ 16.123705] Allocated by task 282: [ 16.124005] kasan_save_stack+0x45/0x70 [ 16.124188] kasan_save_track+0x18/0x40 [ 16.124429] kasan_save_alloc_info+0x3b/0x50 [ 16.124771] __kasan_kmalloc+0xb7/0xc0 [ 16.124946] __kmalloc_cache_noprof+0x189/0x420 [ 16.125269] kasan_atomics+0x95/0x310 [ 16.125456] kunit_try_run_case+0x1a5/0x480 [ 16.125661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.125914] kthread+0x337/0x6f0 [ 16.126059] ret_from_fork+0x116/0x1d0 [ 16.126242] ret_from_fork_asm+0x1a/0x30 [ 16.126436] [ 16.126854] The buggy address belongs to the object at ffff8881038e7800 [ 16.126854] which belongs to the cache kmalloc-64 of size 64 [ 16.127312] The buggy address is located 0 bytes to the right of [ 16.127312] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.128028] [ 16.128227] The buggy address belongs to the physical page: [ 16.128427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.129029] flags: 0x200000000000000(node=0|zone=2) [ 16.129322] page_type: f5(slab) [ 16.129466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.129907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.130283] page dumped because: kasan: bad access detected [ 16.130607] [ 16.130689] Memory state around the buggy address: [ 16.130910] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.131206] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.131730] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.132022] ^ [ 16.132243] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.132714] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.133094] ================================================================== [ 16.234391] ================================================================== [ 16.234721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.235054] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.235907] [ 16.236253] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.236305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.236319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.236340] Call Trace: [ 16.236355] <TASK> [ 16.236370] dump_stack_lvl+0x73/0xb0 [ 16.236451] print_report+0xd1/0x610 [ 16.236476] ? __virt_addr_valid+0x1db/0x2d0 [ 16.236500] ? kasan_atomics_helper+0x2006/0x5450 [ 16.236523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.236549] ? kasan_atomics_helper+0x2006/0x5450 [ 16.236574] kasan_report+0x141/0x180 [ 16.236597] ? kasan_atomics_helper+0x2006/0x5450 [ 16.236626] kasan_check_range+0x10c/0x1c0 [ 16.236652] __kasan_check_write+0x18/0x20 [ 16.236673] kasan_atomics_helper+0x2006/0x5450 [ 16.236697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.236724] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.236767] ? kasan_atomics+0x152/0x310 [ 16.236795] kasan_atomics+0x1dc/0x310 [ 16.236819] ? __pfx_kasan_atomics+0x10/0x10 [ 16.236845] ? __pfx_read_tsc+0x10/0x10 [ 16.236867] ? ktime_get_ts64+0x86/0x230 [ 16.236893] kunit_try_run_case+0x1a5/0x480 [ 16.236919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.236944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.236970] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.236996] ? __kthread_parkme+0x82/0x180 [ 16.237018] ? preempt_count_sub+0x50/0x80 [ 16.237043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.237070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.237097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.237124] kthread+0x337/0x6f0 [ 16.237144] ? trace_preempt_on+0x20/0xc0 [ 16.237169] ? __pfx_kthread+0x10/0x10 [ 16.237191] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.237215] ? calculate_sigpending+0x7b/0xa0 [ 16.237240] ? __pfx_kthread+0x10/0x10 [ 16.237263] ret_from_fork+0x116/0x1d0 [ 16.237283] ? __pfx_kthread+0x10/0x10 [ 16.237305] ret_from_fork_asm+0x1a/0x30 [ 16.237337] </TASK> [ 16.237348] [ 16.248100] Allocated by task 282: [ 16.248241] kasan_save_stack+0x45/0x70 [ 16.248393] kasan_save_track+0x18/0x40 [ 16.248540] kasan_save_alloc_info+0x3b/0x50 [ 16.248692] __kasan_kmalloc+0xb7/0xc0 [ 16.249263] __kmalloc_cache_noprof+0x189/0x420 [ 16.249608] kasan_atomics+0x95/0x310 [ 16.249750] kunit_try_run_case+0x1a5/0x480 [ 16.249909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.250086] kthread+0x337/0x6f0 [ 16.250217] ret_from_fork+0x116/0x1d0 [ 16.250489] ret_from_fork_asm+0x1a/0x30 [ 16.250695] [ 16.250802] The buggy address belongs to the object at ffff8881038e7800 [ 16.250802] which belongs to the cache kmalloc-64 of size 64 [ 16.251372] The buggy address is located 0 bytes to the right of [ 16.251372] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.251961] [ 16.252036] The buggy address belongs to the physical page: [ 16.252284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.252764] flags: 0x200000000000000(node=0|zone=2) [ 16.252959] page_type: f5(slab) [ 16.253171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.253566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.253932] page dumped because: kasan: bad access detected [ 16.254118] [ 16.254215] Memory state around the buggy address: [ 16.254500] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.254749] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.255041] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.255380] ^ [ 16.255687] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.255998] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256299] ================================================================== [ 15.287099] ================================================================== [ 15.287340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.288484] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.289284] [ 15.289444] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.289726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.289744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.289778] Call Trace: [ 15.289796] <TASK> [ 15.289812] dump_stack_lvl+0x73/0xb0 [ 15.289845] print_report+0xd1/0x610 [ 15.289867] ? __virt_addr_valid+0x1db/0x2d0 [ 15.289892] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.289915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.289939] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.289963] kasan_report+0x141/0x180 [ 15.289988] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.290017] kasan_check_range+0x10c/0x1c0 [ 15.290042] __kasan_check_write+0x18/0x20 [ 15.290063] kasan_atomics_helper+0xa2b/0x5450 [ 15.290088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.290112] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.290140] ? kasan_atomics+0x152/0x310 [ 15.290167] kasan_atomics+0x1dc/0x310 [ 15.290191] ? __pfx_kasan_atomics+0x10/0x10 [ 15.290217] ? __pfx_read_tsc+0x10/0x10 [ 15.290239] ? ktime_get_ts64+0x86/0x230 [ 15.290264] kunit_try_run_case+0x1a5/0x480 [ 15.290291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.290315] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.290390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.290417] ? __kthread_parkme+0x82/0x180 [ 15.290449] ? preempt_count_sub+0x50/0x80 [ 15.290474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.290502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.290529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.290556] kthread+0x337/0x6f0 [ 15.290578] ? trace_preempt_on+0x20/0xc0 [ 15.290602] ? __pfx_kthread+0x10/0x10 [ 15.290625] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.290648] ? calculate_sigpending+0x7b/0xa0 [ 15.290674] ? __pfx_kthread+0x10/0x10 [ 15.290697] ret_from_fork+0x116/0x1d0 [ 15.290717] ? __pfx_kthread+0x10/0x10 [ 15.290740] ret_from_fork_asm+0x1a/0x30 [ 15.290782] </TASK> [ 15.290794] [ 15.303061] Allocated by task 282: [ 15.303238] kasan_save_stack+0x45/0x70 [ 15.303644] kasan_save_track+0x18/0x40 [ 15.304009] kasan_save_alloc_info+0x3b/0x50 [ 15.304374] __kasan_kmalloc+0xb7/0xc0 [ 15.304739] __kmalloc_cache_noprof+0x189/0x420 [ 15.305101] kasan_atomics+0x95/0x310 [ 15.305614] kunit_try_run_case+0x1a5/0x480 [ 15.305858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.306110] kthread+0x337/0x6f0 [ 15.306276] ret_from_fork+0x116/0x1d0 [ 15.306898] ret_from_fork_asm+0x1a/0x30 [ 15.307080] [ 15.307349] The buggy address belongs to the object at ffff8881038e7800 [ 15.307349] which belongs to the cache kmalloc-64 of size 64 [ 15.308050] The buggy address is located 0 bytes to the right of [ 15.308050] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.308971] [ 15.309071] The buggy address belongs to the physical page: [ 15.309292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.309887] flags: 0x200000000000000(node=0|zone=2) [ 15.310127] page_type: f5(slab) [ 15.310641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.311151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.311709] page dumped because: kasan: bad access detected [ 15.312072] [ 15.312176] Memory state around the buggy address: [ 15.312678] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.312989] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.313428] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.313913] ^ [ 15.314240] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.314878] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.315293] ================================================================== [ 16.305071] ================================================================== [ 16.305724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.306153] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.306392] [ 16.306525] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.306568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.306581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.306601] Call Trace: [ 16.306615] <TASK> [ 16.306628] dump_stack_lvl+0x73/0xb0 [ 16.306669] print_report+0xd1/0x610 [ 16.306691] ? __virt_addr_valid+0x1db/0x2d0 [ 16.306728] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.306750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.306785] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.306818] kasan_report+0x141/0x180 [ 16.306841] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.306879] __asan_report_load8_noabort+0x18/0x20 [ 16.306905] kasan_atomics_helper+0x4fb2/0x5450 [ 16.306930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.306954] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.306981] ? kasan_atomics+0x152/0x310 [ 16.307008] kasan_atomics+0x1dc/0x310 [ 16.307032] ? __pfx_kasan_atomics+0x10/0x10 [ 16.307057] ? __pfx_read_tsc+0x10/0x10 [ 16.307079] ? ktime_get_ts64+0x86/0x230 [ 16.307104] kunit_try_run_case+0x1a5/0x480 [ 16.307129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.307155] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.307180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.307215] ? __kthread_parkme+0x82/0x180 [ 16.307237] ? preempt_count_sub+0x50/0x80 [ 16.307272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.307299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.307325] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.307352] kthread+0x337/0x6f0 [ 16.307372] ? trace_preempt_on+0x20/0xc0 [ 16.307397] ? __pfx_kthread+0x10/0x10 [ 16.307419] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.307451] ? calculate_sigpending+0x7b/0xa0 [ 16.307476] ? __pfx_kthread+0x10/0x10 [ 16.307508] ret_from_fork+0x116/0x1d0 [ 16.307527] ? __pfx_kthread+0x10/0x10 [ 16.307549] ret_from_fork_asm+0x1a/0x30 [ 16.307591] </TASK> [ 16.307602] [ 16.315358] Allocated by task 282: [ 16.315584] kasan_save_stack+0x45/0x70 [ 16.315779] kasan_save_track+0x18/0x40 [ 16.315975] kasan_save_alloc_info+0x3b/0x50 [ 16.316198] __kasan_kmalloc+0xb7/0xc0 [ 16.316366] __kmalloc_cache_noprof+0x189/0x420 [ 16.316625] kasan_atomics+0x95/0x310 [ 16.316824] kunit_try_run_case+0x1a5/0x480 [ 16.317008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.317260] kthread+0x337/0x6f0 [ 16.317452] ret_from_fork+0x116/0x1d0 [ 16.317624] ret_from_fork_asm+0x1a/0x30 [ 16.317838] [ 16.317911] The buggy address belongs to the object at ffff8881038e7800 [ 16.317911] which belongs to the cache kmalloc-64 of size 64 [ 16.318424] The buggy address is located 0 bytes to the right of [ 16.318424] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.318952] [ 16.319025] The buggy address belongs to the physical page: [ 16.319200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.319571] flags: 0x200000000000000(node=0|zone=2) [ 16.319837] page_type: f5(slab) [ 16.319994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.320239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.320770] page dumped because: kasan: bad access detected [ 16.321046] [ 16.321152] Memory state around the buggy address: [ 16.321338] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.321677] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.321991] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.322300] ^ [ 16.322558] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322803] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.323019] ================================================================== [ 15.642843] ================================================================== [ 15.643192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.643481] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.643779] [ 15.643905] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.643950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.643963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.643985] Call Trace: [ 15.644001] <TASK> [ 15.644031] dump_stack_lvl+0x73/0xb0 [ 15.644078] print_report+0xd1/0x610 [ 15.644102] ? __virt_addr_valid+0x1db/0x2d0 [ 15.644126] ? kasan_atomics_helper+0x1217/0x5450 [ 15.644150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.644175] ? kasan_atomics_helper+0x1217/0x5450 [ 15.644199] kasan_report+0x141/0x180 [ 15.644222] ? kasan_atomics_helper+0x1217/0x5450 [ 15.644250] kasan_check_range+0x10c/0x1c0 [ 15.644275] __kasan_check_write+0x18/0x20 [ 15.644296] kasan_atomics_helper+0x1217/0x5450 [ 15.644338] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.644363] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.644390] ? kasan_atomics+0x152/0x310 [ 15.644418] kasan_atomics+0x1dc/0x310 [ 15.644459] ? __pfx_kasan_atomics+0x10/0x10 [ 15.644484] ? __pfx_read_tsc+0x10/0x10 [ 15.644507] ? ktime_get_ts64+0x86/0x230 [ 15.644532] kunit_try_run_case+0x1a5/0x480 [ 15.644558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.644608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.644633] ? __kthread_parkme+0x82/0x180 [ 15.644654] ? preempt_count_sub+0x50/0x80 [ 15.644680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.644732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.644767] kthread+0x337/0x6f0 [ 15.644788] ? trace_preempt_on+0x20/0xc0 [ 15.644813] ? __pfx_kthread+0x10/0x10 [ 15.644835] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.644858] ? calculate_sigpending+0x7b/0xa0 [ 15.644883] ? __pfx_kthread+0x10/0x10 [ 15.644906] ret_from_fork+0x116/0x1d0 [ 15.644926] ? __pfx_kthread+0x10/0x10 [ 15.644947] ret_from_fork_asm+0x1a/0x30 [ 15.644979] </TASK> [ 15.644990] [ 15.652369] Allocated by task 282: [ 15.652553] kasan_save_stack+0x45/0x70 [ 15.652734] kasan_save_track+0x18/0x40 [ 15.652916] kasan_save_alloc_info+0x3b/0x50 [ 15.653118] __kasan_kmalloc+0xb7/0xc0 [ 15.653276] __kmalloc_cache_noprof+0x189/0x420 [ 15.653520] kasan_atomics+0x95/0x310 [ 15.653667] kunit_try_run_case+0x1a5/0x480 [ 15.653894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.654123] kthread+0x337/0x6f0 [ 15.654285] ret_from_fork+0x116/0x1d0 [ 15.654498] ret_from_fork_asm+0x1a/0x30 [ 15.654660] [ 15.654767] The buggy address belongs to the object at ffff8881038e7800 [ 15.654767] which belongs to the cache kmalloc-64 of size 64 [ 15.655221] The buggy address is located 0 bytes to the right of [ 15.655221] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.655736] [ 15.655818] The buggy address belongs to the physical page: [ 15.655991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.656232] flags: 0x200000000000000(node=0|zone=2) [ 15.656396] page_type: f5(slab) [ 15.656543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.656786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.657122] page dumped because: kasan: bad access detected [ 15.657373] [ 15.657495] Memory state around the buggy address: [ 15.657719] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.658054] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.658373] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.658726] ^ [ 15.658940] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659159] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659375] ================================================================== [ 15.044140] ================================================================== [ 15.044481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.045377] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.045813] [ 15.045922] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.045968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.045980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.046002] Call Trace: [ 15.046171] <TASK> [ 15.046187] dump_stack_lvl+0x73/0xb0 [ 15.046219] print_report+0xd1/0x610 [ 15.046242] ? __virt_addr_valid+0x1db/0x2d0 [ 15.046267] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.046289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.046314] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.046404] kasan_report+0x141/0x180 [ 15.046429] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.046463] kasan_check_range+0x10c/0x1c0 [ 15.046488] __kasan_check_write+0x18/0x20 [ 15.046509] kasan_atomics_helper+0x4a0/0x5450 [ 15.046534] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.046558] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.046585] ? kasan_atomics+0x152/0x310 [ 15.046614] kasan_atomics+0x1dc/0x310 [ 15.046637] ? __pfx_kasan_atomics+0x10/0x10 [ 15.046664] ? __pfx_read_tsc+0x10/0x10 [ 15.046686] ? ktime_get_ts64+0x86/0x230 [ 15.046711] kunit_try_run_case+0x1a5/0x480 [ 15.046737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.046774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.046801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.046827] ? __kthread_parkme+0x82/0x180 [ 15.046852] ? preempt_count_sub+0x50/0x80 [ 15.046876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.046904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.046930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.046957] kthread+0x337/0x6f0 [ 15.046978] ? trace_preempt_on+0x20/0xc0 [ 15.047003] ? __pfx_kthread+0x10/0x10 [ 15.047026] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.047050] ? calculate_sigpending+0x7b/0xa0 [ 15.047075] ? __pfx_kthread+0x10/0x10 [ 15.047099] ret_from_fork+0x116/0x1d0 [ 15.047121] ? __pfx_kthread+0x10/0x10 [ 15.047145] ret_from_fork_asm+0x1a/0x30 [ 15.047177] </TASK> [ 15.047188] [ 15.057997] Allocated by task 282: [ 15.058172] kasan_save_stack+0x45/0x70 [ 15.058713] kasan_save_track+0x18/0x40 [ 15.058924] kasan_save_alloc_info+0x3b/0x50 [ 15.059127] __kasan_kmalloc+0xb7/0xc0 [ 15.059600] __kmalloc_cache_noprof+0x189/0x420 [ 15.059798] kasan_atomics+0x95/0x310 [ 15.059995] kunit_try_run_case+0x1a5/0x480 [ 15.060180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.060443] kthread+0x337/0x6f0 [ 15.060928] ret_from_fork+0x116/0x1d0 [ 15.061197] ret_from_fork_asm+0x1a/0x30 [ 15.061352] [ 15.061691] The buggy address belongs to the object at ffff8881038e7800 [ 15.061691] which belongs to the cache kmalloc-64 of size 64 [ 15.062219] The buggy address is located 0 bytes to the right of [ 15.062219] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.062918] [ 15.063101] The buggy address belongs to the physical page: [ 15.063508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.063866] flags: 0x200000000000000(node=0|zone=2) [ 15.064082] page_type: f5(slab) [ 15.064243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.064878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.065186] page dumped because: kasan: bad access detected [ 15.065718] [ 15.065929] Memory state around the buggy address: [ 15.066222] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.066691] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.067086] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.067491] ^ [ 15.067878] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.068193] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.068610] ================================================================== [ 16.207219] ================================================================== [ 16.207792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.208219] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.208805] [ 16.209130] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.209185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.209199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.209221] Call Trace: [ 16.209238] <TASK> [ 16.209256] dump_stack_lvl+0x73/0xb0 [ 16.209322] print_report+0xd1/0x610 [ 16.209346] ? __virt_addr_valid+0x1db/0x2d0 [ 16.209371] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.209394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.209420] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.209457] kasan_report+0x141/0x180 [ 16.209481] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.209510] __asan_report_load8_noabort+0x18/0x20 [ 16.209536] kasan_atomics_helper+0x4f71/0x5450 [ 16.209562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.209586] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.209613] ? kasan_atomics+0x152/0x310 [ 16.209641] kasan_atomics+0x1dc/0x310 [ 16.209665] ? __pfx_kasan_atomics+0x10/0x10 [ 16.209691] ? __pfx_read_tsc+0x10/0x10 [ 16.209713] ? ktime_get_ts64+0x86/0x230 [ 16.209738] kunit_try_run_case+0x1a5/0x480 [ 16.209775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.209800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.209826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.209851] ? __kthread_parkme+0x82/0x180 [ 16.209874] ? preempt_count_sub+0x50/0x80 [ 16.209899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.209925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.209951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.209979] kthread+0x337/0x6f0 [ 16.209999] ? trace_preempt_on+0x20/0xc0 [ 16.210024] ? __pfx_kthread+0x10/0x10 [ 16.210046] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.210069] ? calculate_sigpending+0x7b/0xa0 [ 16.210094] ? __pfx_kthread+0x10/0x10 [ 16.210117] ret_from_fork+0x116/0x1d0 [ 16.210137] ? __pfx_kthread+0x10/0x10 [ 16.210158] ret_from_fork_asm+0x1a/0x30 [ 16.210190] </TASK> [ 16.210202] [ 16.221336] Allocated by task 282: [ 16.221712] kasan_save_stack+0x45/0x70 [ 16.222047] kasan_save_track+0x18/0x40 [ 16.222430] kasan_save_alloc_info+0x3b/0x50 [ 16.222874] __kasan_kmalloc+0xb7/0xc0 [ 16.223088] __kmalloc_cache_noprof+0x189/0x420 [ 16.223295] kasan_atomics+0x95/0x310 [ 16.223682] kunit_try_run_case+0x1a5/0x480 [ 16.223948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.224347] kthread+0x337/0x6f0 [ 16.224647] ret_from_fork+0x116/0x1d0 [ 16.224852] ret_from_fork_asm+0x1a/0x30 [ 16.225038] [ 16.225130] The buggy address belongs to the object at ffff8881038e7800 [ 16.225130] which belongs to the cache kmalloc-64 of size 64 [ 16.225946] The buggy address is located 0 bytes to the right of [ 16.225946] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.226828] [ 16.227057] The buggy address belongs to the physical page: [ 16.227398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.227892] flags: 0x200000000000000(node=0|zone=2) [ 16.228115] page_type: f5(slab) [ 16.228276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.228880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.229487] page dumped because: kasan: bad access detected [ 16.229791] [ 16.230012] Memory state around the buggy address: [ 16.230339] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.230792] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.231084] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.231369] ^ [ 16.231947] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.232460] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.232952] ================================================================== [ 15.763896] ================================================================== [ 15.764219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.764599] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.764950] [ 15.765057] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.765100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.765114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.765134] Call Trace: [ 15.765148] <TASK> [ 15.765163] dump_stack_lvl+0x73/0xb0 [ 15.765192] print_report+0xd1/0x610 [ 15.765236] ? __virt_addr_valid+0x1db/0x2d0 [ 15.765260] ? kasan_atomics_helper+0x1467/0x5450 [ 15.765283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.765309] ? kasan_atomics_helper+0x1467/0x5450 [ 15.765333] kasan_report+0x141/0x180 [ 15.765356] ? kasan_atomics_helper+0x1467/0x5450 [ 15.765384] kasan_check_range+0x10c/0x1c0 [ 15.765409] __kasan_check_write+0x18/0x20 [ 15.765458] kasan_atomics_helper+0x1467/0x5450 [ 15.765483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.765507] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.765534] ? kasan_atomics+0x152/0x310 [ 15.765561] kasan_atomics+0x1dc/0x310 [ 15.765586] ? __pfx_kasan_atomics+0x10/0x10 [ 15.765634] ? __pfx_read_tsc+0x10/0x10 [ 15.765657] ? ktime_get_ts64+0x86/0x230 [ 15.765699] kunit_try_run_case+0x1a5/0x480 [ 15.765726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.765750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.765786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.765812] ? __kthread_parkme+0x82/0x180 [ 15.765834] ? preempt_count_sub+0x50/0x80 [ 15.765860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.765886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.765913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.765940] kthread+0x337/0x6f0 [ 15.765961] ? trace_preempt_on+0x20/0xc0 [ 15.765986] ? __pfx_kthread+0x10/0x10 [ 15.766009] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.766033] ? calculate_sigpending+0x7b/0xa0 [ 15.766058] ? __pfx_kthread+0x10/0x10 [ 15.766081] ret_from_fork+0x116/0x1d0 [ 15.766102] ? __pfx_kthread+0x10/0x10 [ 15.766123] ret_from_fork_asm+0x1a/0x30 [ 15.766155] </TASK> [ 15.766167] [ 15.774012] Allocated by task 282: [ 15.774209] kasan_save_stack+0x45/0x70 [ 15.774505] kasan_save_track+0x18/0x40 [ 15.774710] kasan_save_alloc_info+0x3b/0x50 [ 15.774936] __kasan_kmalloc+0xb7/0xc0 [ 15.775125] __kmalloc_cache_noprof+0x189/0x420 [ 15.775349] kasan_atomics+0x95/0x310 [ 15.775625] kunit_try_run_case+0x1a5/0x480 [ 15.775881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.776153] kthread+0x337/0x6f0 [ 15.776336] ret_from_fork+0x116/0x1d0 [ 15.776542] ret_from_fork_asm+0x1a/0x30 [ 15.776740] [ 15.776849] The buggy address belongs to the object at ffff8881038e7800 [ 15.776849] which belongs to the cache kmalloc-64 of size 64 [ 15.777301] The buggy address is located 0 bytes to the right of [ 15.777301] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.777742] [ 15.777874] The buggy address belongs to the physical page: [ 15.778138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.778583] flags: 0x200000000000000(node=0|zone=2) [ 15.778857] page_type: f5(slab) [ 15.779049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.779288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.779638] page dumped because: kasan: bad access detected [ 15.779921] [ 15.780016] Memory state around the buggy address: [ 15.780234] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.780585] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.780920] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.781167] ^ [ 15.781383] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781740] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.782032] ================================================================== [ 15.704908] ================================================================== [ 15.705252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.705647] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.706005] [ 15.706117] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.706161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.706173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.706195] Call Trace: [ 15.706210] <TASK> [ 15.706226] dump_stack_lvl+0x73/0xb0 [ 15.706254] print_report+0xd1/0x610 [ 15.706277] ? __virt_addr_valid+0x1db/0x2d0 [ 15.706302] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.706325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.706350] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.706374] kasan_report+0x141/0x180 [ 15.706403] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.706475] __asan_report_load4_noabort+0x18/0x20 [ 15.706503] kasan_atomics_helper+0x49ce/0x5450 [ 15.706527] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.706569] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.706596] ? kasan_atomics+0x152/0x310 [ 15.706641] kasan_atomics+0x1dc/0x310 [ 15.706666] ? __pfx_kasan_atomics+0x10/0x10 [ 15.706691] ? __pfx_read_tsc+0x10/0x10 [ 15.706713] ? ktime_get_ts64+0x86/0x230 [ 15.706738] kunit_try_run_case+0x1a5/0x480 [ 15.706773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.706797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.706823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.706849] ? __kthread_parkme+0x82/0x180 [ 15.706870] ? preempt_count_sub+0x50/0x80 [ 15.706896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.706922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.706948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.706975] kthread+0x337/0x6f0 [ 15.706995] ? trace_preempt_on+0x20/0xc0 [ 15.707038] ? __pfx_kthread+0x10/0x10 [ 15.707060] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.707083] ? calculate_sigpending+0x7b/0xa0 [ 15.707109] ? __pfx_kthread+0x10/0x10 [ 15.707131] ret_from_fork+0x116/0x1d0 [ 15.707151] ? __pfx_kthread+0x10/0x10 [ 15.707172] ret_from_fork_asm+0x1a/0x30 [ 15.707204] </TASK> [ 15.707215] [ 15.714748] Allocated by task 282: [ 15.714935] kasan_save_stack+0x45/0x70 [ 15.715156] kasan_save_track+0x18/0x40 [ 15.715351] kasan_save_alloc_info+0x3b/0x50 [ 15.715595] __kasan_kmalloc+0xb7/0xc0 [ 15.715787] __kmalloc_cache_noprof+0x189/0x420 [ 15.716000] kasan_atomics+0x95/0x310 [ 15.716208] kunit_try_run_case+0x1a5/0x480 [ 15.716415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.716705] kthread+0x337/0x6f0 [ 15.716876] ret_from_fork+0x116/0x1d0 [ 15.717095] ret_from_fork_asm+0x1a/0x30 [ 15.717328] [ 15.717467] The buggy address belongs to the object at ffff8881038e7800 [ 15.717467] which belongs to the cache kmalloc-64 of size 64 [ 15.718017] The buggy address is located 0 bytes to the right of [ 15.718017] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.718484] [ 15.718559] The buggy address belongs to the physical page: [ 15.718734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.719098] flags: 0x200000000000000(node=0|zone=2) [ 15.719355] page_type: f5(slab) [ 15.719585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.719990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.720361] page dumped because: kasan: bad access detected [ 15.720592] [ 15.720663] Memory state around the buggy address: [ 15.720831] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.721175] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.721536] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.721904] ^ [ 15.722065] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.722366] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.722735] ================================================================== [ 15.019254] ================================================================== [ 15.019665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.020056] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.020622] [ 15.020728] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.020786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.020801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.020824] Call Trace: [ 15.020840] <TASK> [ 15.020857] dump_stack_lvl+0x73/0xb0 [ 15.020888] print_report+0xd1/0x610 [ 15.020913] ? __virt_addr_valid+0x1db/0x2d0 [ 15.020939] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.020966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.020991] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.021015] kasan_report+0x141/0x180 [ 15.021040] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.021069] __asan_report_load4_noabort+0x18/0x20 [ 15.021096] kasan_atomics_helper+0x4b54/0x5450 [ 15.021121] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.021145] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.021172] ? kasan_atomics+0x152/0x310 [ 15.021202] kasan_atomics+0x1dc/0x310 [ 15.021227] ? __pfx_kasan_atomics+0x10/0x10 [ 15.021252] ? __pfx_read_tsc+0x10/0x10 [ 15.021274] ? ktime_get_ts64+0x86/0x230 [ 15.021299] kunit_try_run_case+0x1a5/0x480 [ 15.021325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.021837] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.021867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.021892] ? __kthread_parkme+0x82/0x180 [ 15.021914] ? preempt_count_sub+0x50/0x80 [ 15.021940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.021965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.021993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.022019] kthread+0x337/0x6f0 [ 15.022040] ? trace_preempt_on+0x20/0xc0 [ 15.022065] ? __pfx_kthread+0x10/0x10 [ 15.022086] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.022110] ? calculate_sigpending+0x7b/0xa0 [ 15.022136] ? __pfx_kthread+0x10/0x10 [ 15.022159] ret_from_fork+0x116/0x1d0 [ 15.022179] ? __pfx_kthread+0x10/0x10 [ 15.022201] ret_from_fork_asm+0x1a/0x30 [ 15.022233] </TASK> [ 15.022243] [ 15.032496] Allocated by task 282: [ 15.033108] kasan_save_stack+0x45/0x70 [ 15.033318] kasan_save_track+0x18/0x40 [ 15.033555] kasan_save_alloc_info+0x3b/0x50 [ 15.033909] __kasan_kmalloc+0xb7/0xc0 [ 15.034178] __kmalloc_cache_noprof+0x189/0x420 [ 15.034670] kasan_atomics+0x95/0x310 [ 15.034884] kunit_try_run_case+0x1a5/0x480 [ 15.035066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.035535] kthread+0x337/0x6f0 [ 15.035806] ret_from_fork+0x116/0x1d0 [ 15.036076] ret_from_fork_asm+0x1a/0x30 [ 15.036378] [ 15.036485] The buggy address belongs to the object at ffff8881038e7800 [ 15.036485] which belongs to the cache kmalloc-64 of size 64 [ 15.037111] The buggy address is located 0 bytes to the right of [ 15.037111] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.037834] [ 15.037935] The buggy address belongs to the physical page: [ 15.038167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.038771] flags: 0x200000000000000(node=0|zone=2) [ 15.039072] page_type: f5(slab) [ 15.039204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.039988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.040308] page dumped because: kasan: bad access detected [ 15.040634] [ 15.040737] Memory state around the buggy address: [ 15.040959] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.041264] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.041929] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.042190] ^ [ 15.042643] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.043080] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.043575] ================================================================== [ 15.127022] ================================================================== [ 15.127347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.127672] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.127912] [ 15.127996] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.128039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.128051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.128072] Call Trace: [ 15.128085] <TASK> [ 15.128098] dump_stack_lvl+0x73/0xb0 [ 15.128127] print_report+0xd1/0x610 [ 15.128150] ? __virt_addr_valid+0x1db/0x2d0 [ 15.128174] ? kasan_atomics_helper+0x697/0x5450 [ 15.128197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.128222] ? kasan_atomics_helper+0x697/0x5450 [ 15.128246] kasan_report+0x141/0x180 [ 15.128270] ? kasan_atomics_helper+0x697/0x5450 [ 15.128297] kasan_check_range+0x10c/0x1c0 [ 15.128323] __kasan_check_write+0x18/0x20 [ 15.128390] kasan_atomics_helper+0x697/0x5450 [ 15.128415] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.128440] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.128467] ? kasan_atomics+0x152/0x310 [ 15.128495] kasan_atomics+0x1dc/0x310 [ 15.128520] ? __pfx_kasan_atomics+0x10/0x10 [ 15.128546] ? __pfx_read_tsc+0x10/0x10 [ 15.128567] ? ktime_get_ts64+0x86/0x230 [ 15.128593] kunit_try_run_case+0x1a5/0x480 [ 15.128619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.128645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.128670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.128695] ? __kthread_parkme+0x82/0x180 [ 15.128717] ? preempt_count_sub+0x50/0x80 [ 15.128741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.128781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.128807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.128835] kthread+0x337/0x6f0 [ 15.128856] ? trace_preempt_on+0x20/0xc0 [ 15.128879] ? __pfx_kthread+0x10/0x10 [ 15.128902] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.128925] ? calculate_sigpending+0x7b/0xa0 [ 15.128951] ? __pfx_kthread+0x10/0x10 [ 15.128973] ret_from_fork+0x116/0x1d0 [ 15.128993] ? __pfx_kthread+0x10/0x10 [ 15.129014] ret_from_fork_asm+0x1a/0x30 [ 15.129046] </TASK> [ 15.129057] [ 15.137584] Allocated by task 282: [ 15.137722] kasan_save_stack+0x45/0x70 [ 15.138043] kasan_save_track+0x18/0x40 [ 15.138246] kasan_save_alloc_info+0x3b/0x50 [ 15.138767] __kasan_kmalloc+0xb7/0xc0 [ 15.138915] __kmalloc_cache_noprof+0x189/0x420 [ 15.139074] kasan_atomics+0x95/0x310 [ 15.139208] kunit_try_run_case+0x1a5/0x480 [ 15.139356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.139533] kthread+0x337/0x6f0 [ 15.139654] ret_from_fork+0x116/0x1d0 [ 15.139889] ret_from_fork_asm+0x1a/0x30 [ 15.140234] [ 15.140368] The buggy address belongs to the object at ffff8881038e7800 [ 15.140368] which belongs to the cache kmalloc-64 of size 64 [ 15.140915] The buggy address is located 0 bytes to the right of [ 15.140915] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.144647] [ 15.145255] The buggy address belongs to the physical page: [ 15.146083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.146985] flags: 0x200000000000000(node=0|zone=2) [ 15.147460] page_type: f5(slab) [ 15.147869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.148105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.148335] page dumped because: kasan: bad access detected [ 15.148688] [ 15.149660] Memory state around the buggy address: [ 15.149874] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.150096] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.150314] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.151652] ^ [ 15.151894] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.152360] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.153009] ================================================================== [ 15.801175] ================================================================== [ 15.801597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.801924] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.802232] [ 15.802354] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.802405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.802417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.802477] Call Trace: [ 15.802491] <TASK> [ 15.802505] dump_stack_lvl+0x73/0xb0 [ 15.802534] print_report+0xd1/0x610 [ 15.802576] ? __virt_addr_valid+0x1db/0x2d0 [ 15.802600] ? kasan_atomics_helper+0x151d/0x5450 [ 15.802623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.802648] ? kasan_atomics_helper+0x151d/0x5450 [ 15.802672] kasan_report+0x141/0x180 [ 15.802696] ? kasan_atomics_helper+0x151d/0x5450 [ 15.802741] kasan_check_range+0x10c/0x1c0 [ 15.802776] __kasan_check_write+0x18/0x20 [ 15.802798] kasan_atomics_helper+0x151d/0x5450 [ 15.802822] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.802848] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.802892] ? kasan_atomics+0x152/0x310 [ 15.802921] kasan_atomics+0x1dc/0x310 [ 15.802945] ? __pfx_kasan_atomics+0x10/0x10 [ 15.802971] ? __pfx_read_tsc+0x10/0x10 [ 15.802993] ? ktime_get_ts64+0x86/0x230 [ 15.803019] kunit_try_run_case+0x1a5/0x480 [ 15.803045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.803069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.803095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.803121] ? __kthread_parkme+0x82/0x180 [ 15.803142] ? preempt_count_sub+0x50/0x80 [ 15.803168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.803210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.803237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.803291] kthread+0x337/0x6f0 [ 15.803326] ? trace_preempt_on+0x20/0xc0 [ 15.803365] ? __pfx_kthread+0x10/0x10 [ 15.803401] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.803470] ? calculate_sigpending+0x7b/0xa0 [ 15.803510] ? __pfx_kthread+0x10/0x10 [ 15.803533] ret_from_fork+0x116/0x1d0 [ 15.803554] ? __pfx_kthread+0x10/0x10 [ 15.803576] ret_from_fork_asm+0x1a/0x30 [ 15.803608] </TASK> [ 15.803619] [ 15.811498] Allocated by task 282: [ 15.811703] kasan_save_stack+0x45/0x70 [ 15.811935] kasan_save_track+0x18/0x40 [ 15.812092] kasan_save_alloc_info+0x3b/0x50 [ 15.812242] __kasan_kmalloc+0xb7/0xc0 [ 15.812398] __kmalloc_cache_noprof+0x189/0x420 [ 15.812656] kasan_atomics+0x95/0x310 [ 15.812897] kunit_try_run_case+0x1a5/0x480 [ 15.813096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.813347] kthread+0x337/0x6f0 [ 15.813512] ret_from_fork+0x116/0x1d0 [ 15.813688] ret_from_fork_asm+0x1a/0x30 [ 15.813922] [ 15.814035] The buggy address belongs to the object at ffff8881038e7800 [ 15.814035] which belongs to the cache kmalloc-64 of size 64 [ 15.814557] The buggy address is located 0 bytes to the right of [ 15.814557] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.815080] [ 15.815174] The buggy address belongs to the physical page: [ 15.815436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.815836] flags: 0x200000000000000(node=0|zone=2) [ 15.816071] page_type: f5(slab) [ 15.816239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.816525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.816762] page dumped because: kasan: bad access detected [ 15.817002] [ 15.817097] Memory state around the buggy address: [ 15.817344] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.817721] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.818048] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.818388] ^ [ 15.818650] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.818965] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819237] ================================================================== [ 15.839017] ================================================================== [ 15.839255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.839678] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.840068] [ 15.840197] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.840254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.840267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.840288] Call Trace: [ 15.840302] <TASK> [ 15.840316] dump_stack_lvl+0x73/0xb0 [ 15.840345] print_report+0xd1/0x610 [ 15.840368] ? __virt_addr_valid+0x1db/0x2d0 [ 15.840392] ? kasan_atomics_helper+0x164f/0x5450 [ 15.840414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.840461] ? kasan_atomics_helper+0x164f/0x5450 [ 15.840485] kasan_report+0x141/0x180 [ 15.840508] ? kasan_atomics_helper+0x164f/0x5450 [ 15.840555] kasan_check_range+0x10c/0x1c0 [ 15.840582] __kasan_check_write+0x18/0x20 [ 15.840602] kasan_atomics_helper+0x164f/0x5450 [ 15.840626] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.840652] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.840679] ? kasan_atomics+0x152/0x310 [ 15.840707] kasan_atomics+0x1dc/0x310 [ 15.840731] ? __pfx_kasan_atomics+0x10/0x10 [ 15.840767] ? __pfx_read_tsc+0x10/0x10 [ 15.840791] ? ktime_get_ts64+0x86/0x230 [ 15.840817] kunit_try_run_case+0x1a5/0x480 [ 15.840843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840868] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.840912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.840939] ? __kthread_parkme+0x82/0x180 [ 15.840961] ? preempt_count_sub+0x50/0x80 [ 15.841003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.841029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.841056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.841100] kthread+0x337/0x6f0 [ 15.841121] ? trace_preempt_on+0x20/0xc0 [ 15.841146] ? __pfx_kthread+0x10/0x10 [ 15.841168] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.841192] ? calculate_sigpending+0x7b/0xa0 [ 15.841217] ? __pfx_kthread+0x10/0x10 [ 15.841240] ret_from_fork+0x116/0x1d0 [ 15.841260] ? __pfx_kthread+0x10/0x10 [ 15.841299] ret_from_fork_asm+0x1a/0x30 [ 15.841331] </TASK> [ 15.841342] [ 15.850492] Allocated by task 282: [ 15.850666] kasan_save_stack+0x45/0x70 [ 15.850911] kasan_save_track+0x18/0x40 [ 15.851109] kasan_save_alloc_info+0x3b/0x50 [ 15.851301] __kasan_kmalloc+0xb7/0xc0 [ 15.851529] __kmalloc_cache_noprof+0x189/0x420 [ 15.851769] kasan_atomics+0x95/0x310 [ 15.851974] kunit_try_run_case+0x1a5/0x480 [ 15.852178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.852504] kthread+0x337/0x6f0 [ 15.852681] ret_from_fork+0x116/0x1d0 [ 15.852885] ret_from_fork_asm+0x1a/0x30 [ 15.853084] [ 15.853179] The buggy address belongs to the object at ffff8881038e7800 [ 15.853179] which belongs to the cache kmalloc-64 of size 64 [ 15.853621] The buggy address is located 0 bytes to the right of [ 15.853621] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.854203] [ 15.854301] The buggy address belongs to the physical page: [ 15.854572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.854916] flags: 0x200000000000000(node=0|zone=2) [ 15.855133] page_type: f5(slab) [ 15.855325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.855681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.856015] page dumped because: kasan: bad access detected [ 15.856262] [ 15.856361] Memory state around the buggy address: [ 15.856619] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.856950] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.857273] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.857649] ^ [ 15.857889] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.858183] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.858400] ================================================================== [ 14.918777] ================================================================== [ 14.919587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.919932] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 14.920227] [ 14.920317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.920362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.920373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.920394] Call Trace: [ 14.920406] <TASK> [ 14.920422] dump_stack_lvl+0x73/0xb0 [ 14.920521] print_report+0xd1/0x610 [ 14.920545] ? __virt_addr_valid+0x1db/0x2d0 [ 14.920569] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.920591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.920616] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.920639] kasan_report+0x141/0x180 [ 14.920661] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.920688] __asan_report_load4_noabort+0x18/0x20 [ 14.920714] kasan_atomics_helper+0x4bbc/0x5450 [ 14.920736] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.920770] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.920798] ? kasan_atomics+0x152/0x310 [ 14.920824] kasan_atomics+0x1dc/0x310 [ 14.920847] ? __pfx_kasan_atomics+0x10/0x10 [ 14.920872] ? __pfx_read_tsc+0x10/0x10 [ 14.920894] ? ktime_get_ts64+0x86/0x230 [ 14.920920] kunit_try_run_case+0x1a5/0x480 [ 14.920945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.920996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.921021] ? __kthread_parkme+0x82/0x180 [ 14.921042] ? preempt_count_sub+0x50/0x80 [ 14.921067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.921092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.921118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.921144] kthread+0x337/0x6f0 [ 14.921163] ? trace_preempt_on+0x20/0xc0 [ 14.921188] ? __pfx_kthread+0x10/0x10 [ 14.921209] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.921231] ? calculate_sigpending+0x7b/0xa0 [ 14.921257] ? __pfx_kthread+0x10/0x10 [ 14.921279] ret_from_fork+0x116/0x1d0 [ 14.921298] ? __pfx_kthread+0x10/0x10 [ 14.921319] ret_from_fork_asm+0x1a/0x30 [ 14.921399] </TASK> [ 14.921410] [ 14.931543] Allocated by task 282: [ 14.931884] kasan_save_stack+0x45/0x70 [ 14.932068] kasan_save_track+0x18/0x40 [ 14.932257] kasan_save_alloc_info+0x3b/0x50 [ 14.932809] __kasan_kmalloc+0xb7/0xc0 [ 14.933003] __kmalloc_cache_noprof+0x189/0x420 [ 14.933181] kasan_atomics+0x95/0x310 [ 14.933374] kunit_try_run_case+0x1a5/0x480 [ 14.933801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.934067] kthread+0x337/0x6f0 [ 14.934230] ret_from_fork+0x116/0x1d0 [ 14.934698] ret_from_fork_asm+0x1a/0x30 [ 14.934922] [ 14.935002] The buggy address belongs to the object at ffff8881038e7800 [ 14.935002] which belongs to the cache kmalloc-64 of size 64 [ 14.935690] The buggy address is located 0 bytes to the right of [ 14.935690] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 14.936196] [ 14.936300] The buggy address belongs to the physical page: [ 14.936921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 14.937293] flags: 0x200000000000000(node=0|zone=2) [ 14.937644] page_type: f5(slab) [ 14.937795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.938126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.938467] page dumped because: kasan: bad access detected [ 14.939096] [ 14.939175] Memory state around the buggy address: [ 14.939502] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.939859] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.940154] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.940432] ^ [ 14.940741] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.941079] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.941383] ================================================================== [ 14.980095] ================================================================== [ 14.980692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.980951] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 14.981279] [ 14.981382] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.981423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.981434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.981454] Call Trace: [ 14.981468] <TASK> [ 14.981481] dump_stack_lvl+0x73/0xb0 [ 14.981510] print_report+0xd1/0x610 [ 14.981531] ? __virt_addr_valid+0x1db/0x2d0 [ 14.981553] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.981575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.981598] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.981621] kasan_report+0x141/0x180 [ 14.981716] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.981864] __asan_report_store4_noabort+0x1b/0x30 [ 14.981893] kasan_atomics_helper+0x4b6e/0x5450 [ 14.981935] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.981959] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.981985] ? kasan_atomics+0x152/0x310 [ 14.982014] kasan_atomics+0x1dc/0x310 [ 14.982039] ? __pfx_kasan_atomics+0x10/0x10 [ 14.982064] ? __pfx_read_tsc+0x10/0x10 [ 14.982087] ? ktime_get_ts64+0x86/0x230 [ 14.982112] kunit_try_run_case+0x1a5/0x480 [ 14.982138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.982163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.982189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.982215] ? __kthread_parkme+0x82/0x180 [ 14.982237] ? preempt_count_sub+0x50/0x80 [ 14.982263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.982290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.982317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.982359] kthread+0x337/0x6f0 [ 14.982380] ? trace_preempt_on+0x20/0xc0 [ 14.982412] ? __pfx_kthread+0x10/0x10 [ 14.982434] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.982504] ? calculate_sigpending+0x7b/0xa0 [ 14.982529] ? __pfx_kthread+0x10/0x10 [ 14.982552] ret_from_fork+0x116/0x1d0 [ 14.982572] ? __pfx_kthread+0x10/0x10 [ 14.982595] ret_from_fork_asm+0x1a/0x30 [ 14.982627] </TASK> [ 14.982638] [ 14.990377] Allocated by task 282: [ 14.990562] kasan_save_stack+0x45/0x70 [ 14.990790] kasan_save_track+0x18/0x40 [ 14.990997] kasan_save_alloc_info+0x3b/0x50 [ 14.991213] __kasan_kmalloc+0xb7/0xc0 [ 14.991405] __kmalloc_cache_noprof+0x189/0x420 [ 14.991614] kasan_atomics+0x95/0x310 [ 14.991851] kunit_try_run_case+0x1a5/0x480 [ 14.992026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992284] kthread+0x337/0x6f0 [ 14.992518] ret_from_fork+0x116/0x1d0 [ 14.992657] ret_from_fork_asm+0x1a/0x30 [ 14.992810] [ 14.992882] The buggy address belongs to the object at ffff8881038e7800 [ 14.992882] which belongs to the cache kmalloc-64 of size 64 [ 14.993684] The buggy address is located 0 bytes to the right of [ 14.993684] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 14.994086] [ 14.994160] The buggy address belongs to the physical page: [ 14.994363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 14.994803] flags: 0x200000000000000(node=0|zone=2) [ 14.995061] page_type: f5(slab) [ 14.995234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.995773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.996005] page dumped because: kasan: bad access detected [ 14.996179] [ 14.996249] Memory state around the buggy address: [ 14.996691] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.997039] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.997363] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.997880] ^ [ 14.998102] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998410] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998805] ================================================================== [ 15.259947] ================================================================== [ 15.260280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.260813] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.261564] [ 15.261891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.261940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.261954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.261975] Call Trace: [ 15.261991] <TASK> [ 15.262008] dump_stack_lvl+0x73/0xb0 [ 15.262040] print_report+0xd1/0x610 [ 15.262064] ? __virt_addr_valid+0x1db/0x2d0 [ 15.262088] ? kasan_atomics_helper+0x992/0x5450 [ 15.262111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.262136] ? kasan_atomics_helper+0x992/0x5450 [ 15.262159] kasan_report+0x141/0x180 [ 15.262183] ? kasan_atomics_helper+0x992/0x5450 [ 15.262211] kasan_check_range+0x10c/0x1c0 [ 15.262236] __kasan_check_write+0x18/0x20 [ 15.262258] kasan_atomics_helper+0x992/0x5450 [ 15.262283] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.262311] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.262605] ? kasan_atomics+0x152/0x310 [ 15.262638] kasan_atomics+0x1dc/0x310 [ 15.262665] ? __pfx_kasan_atomics+0x10/0x10 [ 15.262691] ? __pfx_read_tsc+0x10/0x10 [ 15.262714] ? ktime_get_ts64+0x86/0x230 [ 15.262741] kunit_try_run_case+0x1a5/0x480 [ 15.262778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.262829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.262855] ? __kthread_parkme+0x82/0x180 [ 15.262876] ? preempt_count_sub+0x50/0x80 [ 15.262901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.262953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.262980] kthread+0x337/0x6f0 [ 15.263001] ? trace_preempt_on+0x20/0xc0 [ 15.263025] ? __pfx_kthread+0x10/0x10 [ 15.263048] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.263071] ? calculate_sigpending+0x7b/0xa0 [ 15.263096] ? __pfx_kthread+0x10/0x10 [ 15.263119] ret_from_fork+0x116/0x1d0 [ 15.263139] ? __pfx_kthread+0x10/0x10 [ 15.263162] ret_from_fork_asm+0x1a/0x30 [ 15.263197] </TASK> [ 15.263209] [ 15.276034] Allocated by task 282: [ 15.276221] kasan_save_stack+0x45/0x70 [ 15.276454] kasan_save_track+0x18/0x40 [ 15.277104] kasan_save_alloc_info+0x3b/0x50 [ 15.277458] __kasan_kmalloc+0xb7/0xc0 [ 15.277855] __kmalloc_cache_noprof+0x189/0x420 [ 15.278206] kasan_atomics+0x95/0x310 [ 15.278621] kunit_try_run_case+0x1a5/0x480 [ 15.279009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.279448] kthread+0x337/0x6f0 [ 15.279640] ret_from_fork+0x116/0x1d0 [ 15.279847] ret_from_fork_asm+0x1a/0x30 [ 15.280039] [ 15.280129] The buggy address belongs to the object at ffff8881038e7800 [ 15.280129] which belongs to the cache kmalloc-64 of size 64 [ 15.281168] The buggy address is located 0 bytes to the right of [ 15.281168] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.282164] [ 15.282511] The buggy address belongs to the physical page: [ 15.282773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.283237] flags: 0x200000000000000(node=0|zone=2) [ 15.283623] page_type: f5(slab) [ 15.283767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.283998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.284220] page dumped because: kasan: bad access detected [ 15.284388] [ 15.284457] Memory state around the buggy address: [ 15.284609] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.285366] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.285749] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.285995] ^ [ 15.286153] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.286367] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.286586] ================================================================== [ 15.564857] ================================================================== [ 15.565173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.565791] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.566127] [ 15.566226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.566270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.566283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.566303] Call Trace: [ 15.566319] <TASK> [ 15.566335] dump_stack_lvl+0x73/0xb0 [ 15.566365] print_report+0xd1/0x610 [ 15.566394] ? __virt_addr_valid+0x1db/0x2d0 [ 15.566419] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.566776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.566804] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.566828] kasan_report+0x141/0x180 [ 15.566852] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.566881] __asan_report_load4_noabort+0x18/0x20 [ 15.566908] kasan_atomics_helper+0x4a1c/0x5450 [ 15.566933] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.566957] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.566984] ? kasan_atomics+0x152/0x310 [ 15.567014] kasan_atomics+0x1dc/0x310 [ 15.567038] ? __pfx_kasan_atomics+0x10/0x10 [ 15.567064] ? __pfx_read_tsc+0x10/0x10 [ 15.567086] ? ktime_get_ts64+0x86/0x230 [ 15.567112] kunit_try_run_case+0x1a5/0x480 [ 15.567137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.567162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.567187] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.567214] ? __kthread_parkme+0x82/0x180 [ 15.567235] ? preempt_count_sub+0x50/0x80 [ 15.567260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.567286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.567313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.567340] kthread+0x337/0x6f0 [ 15.567361] ? trace_preempt_on+0x20/0xc0 [ 15.567386] ? __pfx_kthread+0x10/0x10 [ 15.567408] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.567454] ? calculate_sigpending+0x7b/0xa0 [ 15.567480] ? __pfx_kthread+0x10/0x10 [ 15.567503] ret_from_fork+0x116/0x1d0 [ 15.567523] ? __pfx_kthread+0x10/0x10 [ 15.567546] ret_from_fork_asm+0x1a/0x30 [ 15.567578] </TASK> [ 15.567589] [ 15.579062] Allocated by task 282: [ 15.579227] kasan_save_stack+0x45/0x70 [ 15.579709] kasan_save_track+0x18/0x40 [ 15.579922] kasan_save_alloc_info+0x3b/0x50 [ 15.580234] __kasan_kmalloc+0xb7/0xc0 [ 15.580582] __kmalloc_cache_noprof+0x189/0x420 [ 15.580974] kasan_atomics+0x95/0x310 [ 15.581282] kunit_try_run_case+0x1a5/0x480 [ 15.581636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.582046] kthread+0x337/0x6f0 [ 15.582353] ret_from_fork+0x116/0x1d0 [ 15.582710] ret_from_fork_asm+0x1a/0x30 [ 15.582911] [ 15.583010] The buggy address belongs to the object at ffff8881038e7800 [ 15.583010] which belongs to the cache kmalloc-64 of size 64 [ 15.583844] The buggy address is located 0 bytes to the right of [ 15.583844] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.584530] [ 15.584771] The buggy address belongs to the physical page: [ 15.585168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.585627] flags: 0x200000000000000(node=0|zone=2) [ 15.585998] page_type: f5(slab) [ 15.586282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.586777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.587070] page dumped because: kasan: bad access detected [ 15.587332] [ 15.587691] Memory state around the buggy address: [ 15.587932] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.588338] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.588821] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.589263] ^ [ 15.589646] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.590102] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.590564] ================================================================== [ 15.186898] ================================================================== [ 15.187201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.187816] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.188556] [ 15.188794] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.188845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.188857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.188880] Call Trace: [ 15.188898] <TASK> [ 15.188916] dump_stack_lvl+0x73/0xb0 [ 15.188949] print_report+0xd1/0x610 [ 15.188996] ? __virt_addr_valid+0x1db/0x2d0 [ 15.189022] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.189046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.189071] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.189095] kasan_report+0x141/0x180 [ 15.189119] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.189147] kasan_check_range+0x10c/0x1c0 [ 15.189172] __kasan_check_write+0x18/0x20 [ 15.189193] kasan_atomics_helper+0x7c7/0x5450 [ 15.189218] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.189242] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.189269] ? kasan_atomics+0x152/0x310 [ 15.189297] kasan_atomics+0x1dc/0x310 [ 15.189321] ? __pfx_kasan_atomics+0x10/0x10 [ 15.189358] ? __pfx_read_tsc+0x10/0x10 [ 15.189381] ? ktime_get_ts64+0x86/0x230 [ 15.189408] kunit_try_run_case+0x1a5/0x480 [ 15.189434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.189509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.189536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.189563] ? __kthread_parkme+0x82/0x180 [ 15.189584] ? preempt_count_sub+0x50/0x80 [ 15.189609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.189635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.189662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.189690] kthread+0x337/0x6f0 [ 15.189710] ? trace_preempt_on+0x20/0xc0 [ 15.189734] ? __pfx_kthread+0x10/0x10 [ 15.189767] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.189790] ? calculate_sigpending+0x7b/0xa0 [ 15.189815] ? __pfx_kthread+0x10/0x10 [ 15.189838] ret_from_fork+0x116/0x1d0 [ 15.189859] ? __pfx_kthread+0x10/0x10 [ 15.189880] ret_from_fork_asm+0x1a/0x30 [ 15.189911] </TASK> [ 15.189922] [ 15.198671] Allocated by task 282: [ 15.198819] kasan_save_stack+0x45/0x70 [ 15.198969] kasan_save_track+0x18/0x40 [ 15.199105] kasan_save_alloc_info+0x3b/0x50 [ 15.199368] __kasan_kmalloc+0xb7/0xc0 [ 15.199660] __kmalloc_cache_noprof+0x189/0x420 [ 15.199906] kasan_atomics+0x95/0x310 [ 15.200113] kunit_try_run_case+0x1a5/0x480 [ 15.200540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.200787] kthread+0x337/0x6f0 [ 15.200959] ret_from_fork+0x116/0x1d0 [ 15.201149] ret_from_fork_asm+0x1a/0x30 [ 15.201348] [ 15.201432] The buggy address belongs to the object at ffff8881038e7800 [ 15.201432] which belongs to the cache kmalloc-64 of size 64 [ 15.201785] The buggy address is located 0 bytes to the right of [ 15.201785] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.202730] [ 15.202809] The buggy address belongs to the physical page: [ 15.202974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.203204] flags: 0x200000000000000(node=0|zone=2) [ 15.203709] page_type: f5(slab) [ 15.203898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.204270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.204646] page dumped because: kasan: bad access detected [ 15.204823] [ 15.205064] Memory state around the buggy address: [ 15.205292] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.205793] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.206137] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.206349] ^ [ 15.206580] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.206943] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.207278] ================================================================== [ 15.231136] ================================================================== [ 15.231416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.232246] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.232636] [ 15.232871] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.232918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.232931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.232953] Call Trace: [ 15.232969] <TASK> [ 15.232983] dump_stack_lvl+0x73/0xb0 [ 15.233015] print_report+0xd1/0x610 [ 15.233038] ? __virt_addr_valid+0x1db/0x2d0 [ 15.233062] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.233085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.233110] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.233133] kasan_report+0x141/0x180 [ 15.233157] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.233184] kasan_check_range+0x10c/0x1c0 [ 15.233210] __kasan_check_write+0x18/0x20 [ 15.233231] kasan_atomics_helper+0x8f9/0x5450 [ 15.233256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.233280] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.233422] ? kasan_atomics+0x152/0x310 [ 15.233466] kasan_atomics+0x1dc/0x310 [ 15.233491] ? __pfx_kasan_atomics+0x10/0x10 [ 15.233517] ? __pfx_read_tsc+0x10/0x10 [ 15.233540] ? ktime_get_ts64+0x86/0x230 [ 15.233565] kunit_try_run_case+0x1a5/0x480 [ 15.233591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.233616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.233641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.233666] ? __kthread_parkme+0x82/0x180 [ 15.233688] ? preempt_count_sub+0x50/0x80 [ 15.233714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.233740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.233777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.233805] kthread+0x337/0x6f0 [ 15.233826] ? trace_preempt_on+0x20/0xc0 [ 15.233851] ? __pfx_kthread+0x10/0x10 [ 15.233873] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.233897] ? calculate_sigpending+0x7b/0xa0 [ 15.233923] ? __pfx_kthread+0x10/0x10 [ 15.233945] ret_from_fork+0x116/0x1d0 [ 15.233966] ? __pfx_kthread+0x10/0x10 [ 15.233988] ret_from_fork_asm+0x1a/0x30 [ 15.234020] </TASK> [ 15.234032] [ 15.245870] Allocated by task 282: [ 15.246067] kasan_save_stack+0x45/0x70 [ 15.246258] kasan_save_track+0x18/0x40 [ 15.247007] kasan_save_alloc_info+0x3b/0x50 [ 15.247227] __kasan_kmalloc+0xb7/0xc0 [ 15.247560] __kmalloc_cache_noprof+0x189/0x420 [ 15.248204] kasan_atomics+0x95/0x310 [ 15.248477] kunit_try_run_case+0x1a5/0x480 [ 15.248810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.249241] kthread+0x337/0x6f0 [ 15.249582] ret_from_fork+0x116/0x1d0 [ 15.249793] ret_from_fork_asm+0x1a/0x30 [ 15.249990] [ 15.250080] The buggy address belongs to the object at ffff8881038e7800 [ 15.250080] which belongs to the cache kmalloc-64 of size 64 [ 15.251003] The buggy address is located 0 bytes to the right of [ 15.251003] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.251864] [ 15.251978] The buggy address belongs to the physical page: [ 15.252530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.253035] flags: 0x200000000000000(node=0|zone=2) [ 15.253445] page_type: f5(slab) [ 15.253806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.254279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.254821] page dumped because: kasan: bad access detected [ 15.255215] [ 15.255479] Memory state around the buggy address: [ 15.255924] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.256714] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.257035] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.257584] ^ [ 15.257893] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.258224] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.258845] ================================================================== [ 16.283332] ================================================================== [ 16.284032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.284820] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.285469] [ 16.285673] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.285717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.285730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.285752] Call Trace: [ 16.285780] <TASK> [ 16.285799] dump_stack_lvl+0x73/0xb0 [ 16.285828] print_report+0xd1/0x610 [ 16.285850] ? __virt_addr_valid+0x1db/0x2d0 [ 16.285885] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.285908] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.285933] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.285968] kasan_report+0x141/0x180 [ 16.285992] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.286019] kasan_check_range+0x10c/0x1c0 [ 16.286044] __kasan_check_write+0x18/0x20 [ 16.286065] kasan_atomics_helper+0x20c8/0x5450 [ 16.286090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.286114] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.286141] ? kasan_atomics+0x152/0x310 [ 16.286168] kasan_atomics+0x1dc/0x310 [ 16.286192] ? __pfx_kasan_atomics+0x10/0x10 [ 16.286218] ? __pfx_read_tsc+0x10/0x10 [ 16.286240] ? ktime_get_ts64+0x86/0x230 [ 16.286266] kunit_try_run_case+0x1a5/0x480 [ 16.286291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.286341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.286367] ? __kthread_parkme+0x82/0x180 [ 16.286402] ? preempt_count_sub+0x50/0x80 [ 16.286426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.286489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.286517] kthread+0x337/0x6f0 [ 16.286537] ? trace_preempt_on+0x20/0xc0 [ 16.286561] ? __pfx_kthread+0x10/0x10 [ 16.286583] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.286606] ? calculate_sigpending+0x7b/0xa0 [ 16.286632] ? __pfx_kthread+0x10/0x10 [ 16.286655] ret_from_fork+0x116/0x1d0 [ 16.286675] ? __pfx_kthread+0x10/0x10 [ 16.286697] ret_from_fork_asm+0x1a/0x30 [ 16.286728] </TASK> [ 16.286739] [ 16.296819] Allocated by task 282: [ 16.297002] kasan_save_stack+0x45/0x70 [ 16.297198] kasan_save_track+0x18/0x40 [ 16.297394] kasan_save_alloc_info+0x3b/0x50 [ 16.297660] __kasan_kmalloc+0xb7/0xc0 [ 16.297868] __kmalloc_cache_noprof+0x189/0x420 [ 16.298033] kasan_atomics+0x95/0x310 [ 16.298169] kunit_try_run_case+0x1a5/0x480 [ 16.298317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.298688] kthread+0x337/0x6f0 [ 16.298878] ret_from_fork+0x116/0x1d0 [ 16.299069] ret_from_fork_asm+0x1a/0x30 [ 16.299268] [ 16.299365] The buggy address belongs to the object at ffff8881038e7800 [ 16.299365] which belongs to the cache kmalloc-64 of size 64 [ 16.299830] The buggy address is located 0 bytes to the right of [ 16.299830] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.300293] [ 16.300393] The buggy address belongs to the physical page: [ 16.300932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.301298] flags: 0x200000000000000(node=0|zone=2) [ 16.301574] page_type: f5(slab) [ 16.301749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.302094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.302410] page dumped because: kasan: bad access detected [ 16.302707] [ 16.302813] Memory state around the buggy address: [ 16.303035] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.303301] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.303621] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.303929] ^ [ 16.304153] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.304370] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.304584] ================================================================== [ 16.156836] ================================================================== [ 16.157427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.157832] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.158205] [ 16.158294] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.158339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.158352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.158373] Call Trace: [ 16.158395] <TASK> [ 16.158410] dump_stack_lvl+0x73/0xb0 [ 16.158636] print_report+0xd1/0x610 [ 16.158670] ? __virt_addr_valid+0x1db/0x2d0 [ 16.158694] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.158718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.158743] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.158781] kasan_report+0x141/0x180 [ 16.158805] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.158833] kasan_check_range+0x10c/0x1c0 [ 16.158858] __kasan_check_write+0x18/0x20 [ 16.158879] kasan_atomics_helper+0x1eaa/0x5450 [ 16.158904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.158929] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.158956] ? kasan_atomics+0x152/0x310 [ 16.158985] kasan_atomics+0x1dc/0x310 [ 16.159009] ? __pfx_kasan_atomics+0x10/0x10 [ 16.159035] ? __pfx_read_tsc+0x10/0x10 [ 16.159057] ? ktime_get_ts64+0x86/0x230 [ 16.159082] kunit_try_run_case+0x1a5/0x480 [ 16.159108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.159133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.159159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.159186] ? __kthread_parkme+0x82/0x180 [ 16.159208] ? preempt_count_sub+0x50/0x80 [ 16.159234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.159260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.159287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.159314] kthread+0x337/0x6f0 [ 16.159335] ? trace_preempt_on+0x20/0xc0 [ 16.159360] ? __pfx_kthread+0x10/0x10 [ 16.159382] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.159406] ? calculate_sigpending+0x7b/0xa0 [ 16.159431] ? __pfx_kthread+0x10/0x10 [ 16.159462] ret_from_fork+0x116/0x1d0 [ 16.159482] ? __pfx_kthread+0x10/0x10 [ 16.159504] ret_from_fork_asm+0x1a/0x30 [ 16.159535] </TASK> [ 16.159547] [ 16.168997] Allocated by task 282: [ 16.169132] kasan_save_stack+0x45/0x70 [ 16.169343] kasan_save_track+0x18/0x40 [ 16.169975] kasan_save_alloc_info+0x3b/0x50 [ 16.170194] __kasan_kmalloc+0xb7/0xc0 [ 16.170347] __kmalloc_cache_noprof+0x189/0x420 [ 16.170703] kasan_atomics+0x95/0x310 [ 16.170903] kunit_try_run_case+0x1a5/0x480 [ 16.171226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.171527] kthread+0x337/0x6f0 [ 16.171764] ret_from_fork+0x116/0x1d0 [ 16.171953] ret_from_fork_asm+0x1a/0x30 [ 16.172293] [ 16.172374] The buggy address belongs to the object at ffff8881038e7800 [ 16.172374] which belongs to the cache kmalloc-64 of size 64 [ 16.172968] The buggy address is located 0 bytes to the right of [ 16.172968] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.173491] [ 16.173836] The buggy address belongs to the physical page: [ 16.174079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.174548] flags: 0x200000000000000(node=0|zone=2) [ 16.174856] page_type: f5(slab) [ 16.174993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.175477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.175800] page dumped because: kasan: bad access detected [ 16.176151] [ 16.176242] Memory state around the buggy address: [ 16.176592] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.176985] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.177299] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.177721] ^ [ 16.177930] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.178334] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.178752] ================================================================== [ 15.460540] ================================================================== [ 15.460901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.461294] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.461803] [ 15.461955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.462000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.462013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.462034] Call Trace: [ 15.462055] <TASK> [ 15.462069] dump_stack_lvl+0x73/0xb0 [ 15.462099] print_report+0xd1/0x610 [ 15.462134] ? __virt_addr_valid+0x1db/0x2d0 [ 15.462158] ? kasan_atomics_helper+0xe78/0x5450 [ 15.462181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.462206] ? kasan_atomics_helper+0xe78/0x5450 [ 15.462229] kasan_report+0x141/0x180 [ 15.462252] ? kasan_atomics_helper+0xe78/0x5450 [ 15.462279] kasan_check_range+0x10c/0x1c0 [ 15.462305] __kasan_check_write+0x18/0x20 [ 15.462336] kasan_atomics_helper+0xe78/0x5450 [ 15.462361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.462390] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.462427] ? kasan_atomics+0x152/0x310 [ 15.462463] kasan_atomics+0x1dc/0x310 [ 15.462497] ? __pfx_kasan_atomics+0x10/0x10 [ 15.462525] ? __pfx_read_tsc+0x10/0x10 [ 15.462546] ? ktime_get_ts64+0x86/0x230 [ 15.462571] kunit_try_run_case+0x1a5/0x480 [ 15.462597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.462621] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.462647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.462672] ? __kthread_parkme+0x82/0x180 [ 15.462694] ? preempt_count_sub+0x50/0x80 [ 15.462720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.462746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.462782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.462809] kthread+0x337/0x6f0 [ 15.462829] ? trace_preempt_on+0x20/0xc0 [ 15.462854] ? __pfx_kthread+0x10/0x10 [ 15.462877] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.462909] ? calculate_sigpending+0x7b/0xa0 [ 15.462935] ? __pfx_kthread+0x10/0x10 [ 15.462958] ret_from_fork+0x116/0x1d0 [ 15.462988] ? __pfx_kthread+0x10/0x10 [ 15.463010] ret_from_fork_asm+0x1a/0x30 [ 15.463042] </TASK> [ 15.463053] [ 15.470807] Allocated by task 282: [ 15.471034] kasan_save_stack+0x45/0x70 [ 15.471240] kasan_save_track+0x18/0x40 [ 15.471459] kasan_save_alloc_info+0x3b/0x50 [ 15.471896] __kasan_kmalloc+0xb7/0xc0 [ 15.472884] __kmalloc_cache_noprof+0x189/0x420 [ 15.473091] kasan_atomics+0x95/0x310 [ 15.473272] kunit_try_run_case+0x1a5/0x480 [ 15.474178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.474425] kthread+0x337/0x6f0 [ 15.474776] ret_from_fork+0x116/0x1d0 [ 15.474961] ret_from_fork_asm+0x1a/0x30 [ 15.475140] [ 15.475317] The buggy address belongs to the object at ffff8881038e7800 [ 15.475317] which belongs to the cache kmalloc-64 of size 64 [ 15.476347] The buggy address is located 0 bytes to the right of [ 15.476347] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.476993] [ 15.477248] The buggy address belongs to the physical page: [ 15.477635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.478056] flags: 0x200000000000000(node=0|zone=2) [ 15.478392] page_type: f5(slab) [ 15.478768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.479224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.479750] page dumped because: kasan: bad access detected [ 15.480102] [ 15.480315] Memory state around the buggy address: [ 15.480589] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.480980] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.481405] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.481832] ^ [ 15.482141] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.482424] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.482897] ================================================================== [ 15.996382] ================================================================== [ 15.996773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.997212] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.997602] [ 15.997728] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.997785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.997798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.997820] Call Trace: [ 15.997837] <TASK> [ 15.997852] dump_stack_lvl+0x73/0xb0 [ 15.997882] print_report+0xd1/0x610 [ 15.997906] ? __virt_addr_valid+0x1db/0x2d0 [ 15.997930] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.997954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.997979] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.998003] kasan_report+0x141/0x180 [ 15.998027] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.998055] kasan_check_range+0x10c/0x1c0 [ 15.998081] __kasan_check_write+0x18/0x20 [ 15.998102] kasan_atomics_helper+0x1a7f/0x5450 [ 15.998127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.998151] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.998178] ? kasan_atomics+0x152/0x310 [ 15.998205] kasan_atomics+0x1dc/0x310 [ 15.998229] ? __pfx_kasan_atomics+0x10/0x10 [ 15.998255] ? __pfx_read_tsc+0x10/0x10 [ 15.998278] ? ktime_get_ts64+0x86/0x230 [ 15.998303] kunit_try_run_case+0x1a5/0x480 [ 15.998329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.998353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.998379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.998411] ? __kthread_parkme+0x82/0x180 [ 15.998433] ? preempt_count_sub+0x50/0x80 [ 15.998697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.998725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.998752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.998792] kthread+0x337/0x6f0 [ 15.998813] ? trace_preempt_on+0x20/0xc0 [ 15.998838] ? __pfx_kthread+0x10/0x10 [ 15.998860] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.998883] ? calculate_sigpending+0x7b/0xa0 [ 15.998910] ? __pfx_kthread+0x10/0x10 [ 15.998934] ret_from_fork+0x116/0x1d0 [ 15.998953] ? __pfx_kthread+0x10/0x10 [ 15.998976] ret_from_fork_asm+0x1a/0x30 [ 15.999007] </TASK> [ 15.999018] [ 16.009068] Allocated by task 282: [ 16.009331] kasan_save_stack+0x45/0x70 [ 16.009556] kasan_save_track+0x18/0x40 [ 16.009770] kasan_save_alloc_info+0x3b/0x50 [ 16.009967] __kasan_kmalloc+0xb7/0xc0 [ 16.010160] __kmalloc_cache_noprof+0x189/0x420 [ 16.010355] kasan_atomics+0x95/0x310 [ 16.010536] kunit_try_run_case+0x1a5/0x480 [ 16.011067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.011293] kthread+0x337/0x6f0 [ 16.011629] ret_from_fork+0x116/0x1d0 [ 16.011842] ret_from_fork_asm+0x1a/0x30 [ 16.012157] [ 16.012261] The buggy address belongs to the object at ffff8881038e7800 [ 16.012261] which belongs to the cache kmalloc-64 of size 64 [ 16.012888] The buggy address is located 0 bytes to the right of [ 16.012888] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.013517] [ 16.013614] The buggy address belongs to the physical page: [ 16.013870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.014195] flags: 0x200000000000000(node=0|zone=2) [ 16.014412] page_type: f5(slab) [ 16.014904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.015196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.015740] page dumped because: kasan: bad access detected [ 16.016064] [ 16.016159] Memory state around the buggy address: [ 16.016369] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.016835] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.017214] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.017593] ^ [ 16.017903] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.018278] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.018667] ================================================================== [ 15.088109] ================================================================== [ 15.088745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.089074] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.089496] [ 15.089601] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.089644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.089656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.089679] Call Trace: [ 15.089693] <TASK> [ 15.089708] dump_stack_lvl+0x73/0xb0 [ 15.089739] print_report+0xd1/0x610 [ 15.089775] ? __virt_addr_valid+0x1db/0x2d0 [ 15.089799] ? kasan_atomics_helper+0x565/0x5450 [ 15.089822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.089848] ? kasan_atomics_helper+0x565/0x5450 [ 15.089871] kasan_report+0x141/0x180 [ 15.089894] ? kasan_atomics_helper+0x565/0x5450 [ 15.089924] kasan_check_range+0x10c/0x1c0 [ 15.089950] __kasan_check_write+0x18/0x20 [ 15.089972] kasan_atomics_helper+0x565/0x5450 [ 15.089997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.090022] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.090050] ? kasan_atomics+0x152/0x310 [ 15.090078] kasan_atomics+0x1dc/0x310 [ 15.090103] ? __pfx_kasan_atomics+0x10/0x10 [ 15.090129] ? __pfx_read_tsc+0x10/0x10 [ 15.090152] ? ktime_get_ts64+0x86/0x230 [ 15.090178] kunit_try_run_case+0x1a5/0x480 [ 15.090203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090230] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.090257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.090284] ? __kthread_parkme+0x82/0x180 [ 15.090306] ? preempt_count_sub+0x50/0x80 [ 15.090330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.090419] kthread+0x337/0x6f0 [ 15.090441] ? trace_preempt_on+0x20/0xc0 [ 15.090465] ? __pfx_kthread+0x10/0x10 [ 15.090487] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.090511] ? calculate_sigpending+0x7b/0xa0 [ 15.090537] ? __pfx_kthread+0x10/0x10 [ 15.090559] ret_from_fork+0x116/0x1d0 [ 15.090579] ? __pfx_kthread+0x10/0x10 [ 15.090601] ret_from_fork_asm+0x1a/0x30 [ 15.090633] </TASK> [ 15.090644] [ 15.099031] Allocated by task 282: [ 15.099227] kasan_save_stack+0x45/0x70 [ 15.099525] kasan_save_track+0x18/0x40 [ 15.099817] kasan_save_alloc_info+0x3b/0x50 [ 15.100110] __kasan_kmalloc+0xb7/0xc0 [ 15.100271] __kmalloc_cache_noprof+0x189/0x420 [ 15.100642] kasan_atomics+0x95/0x310 [ 15.100865] kunit_try_run_case+0x1a5/0x480 [ 15.101056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.101260] kthread+0x337/0x6f0 [ 15.101413] ret_from_fork+0x116/0x1d0 [ 15.101674] ret_from_fork_asm+0x1a/0x30 [ 15.101965] [ 15.102051] The buggy address belongs to the object at ffff8881038e7800 [ 15.102051] which belongs to the cache kmalloc-64 of size 64 [ 15.102484] The buggy address is located 0 bytes to the right of [ 15.102484] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.103002] [ 15.103079] The buggy address belongs to the physical page: [ 15.103251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.103585] flags: 0x200000000000000(node=0|zone=2) [ 15.103973] page_type: f5(slab) [ 15.104251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.104574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.104824] page dumped because: kasan: bad access detected [ 15.105009] [ 15.105083] Memory state around the buggy address: [ 15.105426] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.105784] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.106115] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.106620] ^ [ 15.106871] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.107155] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.107743] ================================================================== [ 16.179444] ================================================================== [ 16.180026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.180503] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.180791] [ 16.181058] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.181106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.181119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.181140] Call Trace: [ 16.181155] <TASK> [ 16.181237] dump_stack_lvl+0x73/0xb0 [ 16.181272] print_report+0xd1/0x610 [ 16.181296] ? __virt_addr_valid+0x1db/0x2d0 [ 16.181319] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.181342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.181368] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.181392] kasan_report+0x141/0x180 [ 16.181415] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.181456] kasan_check_range+0x10c/0x1c0 [ 16.181482] __kasan_check_write+0x18/0x20 [ 16.181503] kasan_atomics_helper+0x1f43/0x5450 [ 16.181528] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.181552] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.181579] ? kasan_atomics+0x152/0x310 [ 16.181607] kasan_atomics+0x1dc/0x310 [ 16.181631] ? __pfx_kasan_atomics+0x10/0x10 [ 16.181657] ? __pfx_read_tsc+0x10/0x10 [ 16.181680] ? ktime_get_ts64+0x86/0x230 [ 16.181707] kunit_try_run_case+0x1a5/0x480 [ 16.181733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.181780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.181808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.181834] ? __kthread_parkme+0x82/0x180 [ 16.181856] ? preempt_count_sub+0x50/0x80 [ 16.181881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.181908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.181934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.181962] kthread+0x337/0x6f0 [ 16.181982] ? trace_preempt_on+0x20/0xc0 [ 16.182006] ? __pfx_kthread+0x10/0x10 [ 16.182028] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.182052] ? calculate_sigpending+0x7b/0xa0 [ 16.182077] ? __pfx_kthread+0x10/0x10 [ 16.182100] ret_from_fork+0x116/0x1d0 [ 16.182120] ? __pfx_kthread+0x10/0x10 [ 16.182143] ret_from_fork_asm+0x1a/0x30 [ 16.182174] </TASK> [ 16.182185] [ 16.194247] Allocated by task 282: [ 16.194399] kasan_save_stack+0x45/0x70 [ 16.194554] kasan_save_track+0x18/0x40 [ 16.195181] kasan_save_alloc_info+0x3b/0x50 [ 16.195358] __kasan_kmalloc+0xb7/0xc0 [ 16.196027] __kmalloc_cache_noprof+0x189/0x420 [ 16.196197] kasan_atomics+0x95/0x310 [ 16.196340] kunit_try_run_case+0x1a5/0x480 [ 16.197030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.197308] kthread+0x337/0x6f0 [ 16.198345] ret_from_fork+0x116/0x1d0 [ 16.198551] ret_from_fork_asm+0x1a/0x30 [ 16.198710] [ 16.198827] The buggy address belongs to the object at ffff8881038e7800 [ 16.198827] which belongs to the cache kmalloc-64 of size 64 [ 16.199254] The buggy address is located 0 bytes to the right of [ 16.199254] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.199783] [ 16.199883] The buggy address belongs to the physical page: [ 16.200068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.200391] flags: 0x200000000000000(node=0|zone=2) [ 16.200874] page_type: f5(slab) [ 16.201037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.201357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.202294] page dumped because: kasan: bad access detected [ 16.202726] [ 16.203016] Memory state around the buggy address: [ 16.203310] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.203778] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.204081] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.204377] ^ [ 16.205035] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205566] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.206064] ================================================================== [ 16.323439] ================================================================== [ 16.323820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.324225] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.324875] [ 16.324960] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.325002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.325014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.325035] Call Trace: [ 16.325050] <TASK> [ 16.325064] dump_stack_lvl+0x73/0xb0 [ 16.325092] print_report+0xd1/0x610 [ 16.325113] ? __virt_addr_valid+0x1db/0x2d0 [ 16.325136] ? kasan_atomics_helper+0x218a/0x5450 [ 16.325157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.325179] ? kasan_atomics_helper+0x218a/0x5450 [ 16.325201] kasan_report+0x141/0x180 [ 16.325223] ? kasan_atomics_helper+0x218a/0x5450 [ 16.325250] kasan_check_range+0x10c/0x1c0 [ 16.325274] __kasan_check_write+0x18/0x20 [ 16.325293] kasan_atomics_helper+0x218a/0x5450 [ 16.325316] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.325339] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.325364] ? kasan_atomics+0x152/0x310 [ 16.325390] kasan_atomics+0x1dc/0x310 [ 16.325412] ? __pfx_kasan_atomics+0x10/0x10 [ 16.325437] ? __pfx_read_tsc+0x10/0x10 [ 16.325458] ? ktime_get_ts64+0x86/0x230 [ 16.325482] kunit_try_run_case+0x1a5/0x480 [ 16.325506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.325528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.325552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.325594] ? __kthread_parkme+0x82/0x180 [ 16.325616] ? preempt_count_sub+0x50/0x80 [ 16.325641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.325667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.325703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.325730] kthread+0x337/0x6f0 [ 16.325750] ? trace_preempt_on+0x20/0xc0 [ 16.325793] ? __pfx_kthread+0x10/0x10 [ 16.325815] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.325838] ? calculate_sigpending+0x7b/0xa0 [ 16.325863] ? __pfx_kthread+0x10/0x10 [ 16.325886] ret_from_fork+0x116/0x1d0 [ 16.325906] ? __pfx_kthread+0x10/0x10 [ 16.325927] ret_from_fork_asm+0x1a/0x30 [ 16.325968] </TASK> [ 16.325980] [ 16.333838] Allocated by task 282: [ 16.333995] kasan_save_stack+0x45/0x70 [ 16.334225] kasan_save_track+0x18/0x40 [ 16.334412] kasan_save_alloc_info+0x3b/0x50 [ 16.334618] __kasan_kmalloc+0xb7/0xc0 [ 16.334801] __kmalloc_cache_noprof+0x189/0x420 [ 16.335028] kasan_atomics+0x95/0x310 [ 16.335219] kunit_try_run_case+0x1a5/0x480 [ 16.335416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.335684] kthread+0x337/0x6f0 [ 16.335871] ret_from_fork+0x116/0x1d0 [ 16.336065] ret_from_fork_asm+0x1a/0x30 [ 16.336255] [ 16.336367] The buggy address belongs to the object at ffff8881038e7800 [ 16.336367] which belongs to the cache kmalloc-64 of size 64 [ 16.336934] The buggy address is located 0 bytes to the right of [ 16.336934] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.337451] [ 16.337550] The buggy address belongs to the physical page: [ 16.337769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.338008] flags: 0x200000000000000(node=0|zone=2) [ 16.338170] page_type: f5(slab) [ 16.338291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.338527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.338764] page dumped because: kasan: bad access detected [ 16.338935] [ 16.339004] Memory state around the buggy address: [ 16.339388] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.339730] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.340053] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.340368] ^ [ 16.340804] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341127] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341421] ================================================================== [ 15.624799] ================================================================== [ 15.625625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.626062] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.626295] [ 15.626391] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.626439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.626638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.626663] Call Trace: [ 15.626681] <TASK> [ 15.626699] dump_stack_lvl+0x73/0xb0 [ 15.626733] print_report+0xd1/0x610 [ 15.626918] ? __virt_addr_valid+0x1db/0x2d0 [ 15.626953] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.626977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.627002] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.627026] kasan_report+0x141/0x180 [ 15.627049] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.627078] __asan_report_load4_noabort+0x18/0x20 [ 15.627104] kasan_atomics_helper+0x4a02/0x5450 [ 15.627128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.627153] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.627180] ? kasan_atomics+0x152/0x310 [ 15.627209] kasan_atomics+0x1dc/0x310 [ 15.627232] ? __pfx_kasan_atomics+0x10/0x10 [ 15.627258] ? __pfx_read_tsc+0x10/0x10 [ 15.627281] ? ktime_get_ts64+0x86/0x230 [ 15.627306] kunit_try_run_case+0x1a5/0x480 [ 15.627332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.627357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.627382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.627408] ? __kthread_parkme+0x82/0x180 [ 15.627430] ? preempt_count_sub+0x50/0x80 [ 15.627469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.627496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.627522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.627549] kthread+0x337/0x6f0 [ 15.627570] ? trace_preempt_on+0x20/0xc0 [ 15.627594] ? __pfx_kthread+0x10/0x10 [ 15.627617] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.627641] ? calculate_sigpending+0x7b/0xa0 [ 15.627666] ? __pfx_kthread+0x10/0x10 [ 15.627689] ret_from_fork+0x116/0x1d0 [ 15.627709] ? __pfx_kthread+0x10/0x10 [ 15.627731] ret_from_fork_asm+0x1a/0x30 [ 15.627777] </TASK> [ 15.627788] [ 15.634747] Allocated by task 282: [ 15.635077] kasan_save_stack+0x45/0x70 [ 15.635229] kasan_save_track+0x18/0x40 [ 15.635367] kasan_save_alloc_info+0x3b/0x50 [ 15.635521] __kasan_kmalloc+0xb7/0xc0 [ 15.635656] __kmalloc_cache_noprof+0x189/0x420 [ 15.635896] kasan_atomics+0x95/0x310 [ 15.636087] kunit_try_run_case+0x1a5/0x480 [ 15.636307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.636568] kthread+0x337/0x6f0 [ 15.636736] ret_from_fork+0x116/0x1d0 [ 15.636953] ret_from_fork_asm+0x1a/0x30 [ 15.637153] [ 15.637250] The buggy address belongs to the object at ffff8881038e7800 [ 15.637250] which belongs to the cache kmalloc-64 of size 64 [ 15.637765] The buggy address is located 0 bytes to the right of [ 15.637765] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.638263] [ 15.638339] The buggy address belongs to the physical page: [ 15.638607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.638920] flags: 0x200000000000000(node=0|zone=2) [ 15.639127] page_type: f5(slab) [ 15.639290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.639590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.639862] page dumped because: kasan: bad access detected [ 15.640118] [ 15.640215] Memory state around the buggy address: [ 15.640458] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.640771] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.641043] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.641278] ^ [ 15.641532] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.641851] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.642100] ================================================================== [ 14.961082] ================================================================== [ 14.961563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.961845] Read of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 14.962069] [ 14.962149] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.962190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.962201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.962220] Call Trace: [ 14.962232] <TASK> [ 14.962244] dump_stack_lvl+0x73/0xb0 [ 14.962270] print_report+0xd1/0x610 [ 14.962293] ? __virt_addr_valid+0x1db/0x2d0 [ 14.962314] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.962396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.962421] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.962455] kasan_report+0x141/0x180 [ 14.962478] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.962505] __asan_report_load4_noabort+0x18/0x20 [ 14.962531] kasan_atomics_helper+0x4b88/0x5450 [ 14.962554] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.962578] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.962603] ? kasan_atomics+0x152/0x310 [ 14.962630] kasan_atomics+0x1dc/0x310 [ 14.962652] ? __pfx_kasan_atomics+0x10/0x10 [ 14.962677] ? __pfx_read_tsc+0x10/0x10 [ 14.962697] ? ktime_get_ts64+0x86/0x230 [ 14.962722] kunit_try_run_case+0x1a5/0x480 [ 14.962747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.962782] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.962806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.962831] ? __kthread_parkme+0x82/0x180 [ 14.962852] ? preempt_count_sub+0x50/0x80 [ 14.962876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.962901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.962927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.962954] kthread+0x337/0x6f0 [ 14.962975] ? trace_preempt_on+0x20/0xc0 [ 14.962998] ? __pfx_kthread+0x10/0x10 [ 14.963019] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.963041] ? calculate_sigpending+0x7b/0xa0 [ 14.963066] ? __pfx_kthread+0x10/0x10 [ 14.963088] ret_from_fork+0x116/0x1d0 [ 14.963107] ? __pfx_kthread+0x10/0x10 [ 14.963130] ret_from_fork_asm+0x1a/0x30 [ 14.963161] </TASK> [ 14.963171] [ 14.971577] Allocated by task 282: [ 14.971744] kasan_save_stack+0x45/0x70 [ 14.971901] kasan_save_track+0x18/0x40 [ 14.972037] kasan_save_alloc_info+0x3b/0x50 [ 14.972191] __kasan_kmalloc+0xb7/0xc0 [ 14.972381] __kmalloc_cache_noprof+0x189/0x420 [ 14.972784] kasan_atomics+0x95/0x310 [ 14.972962] kunit_try_run_case+0x1a5/0x480 [ 14.973173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.973395] kthread+0x337/0x6f0 [ 14.973622] ret_from_fork+0x116/0x1d0 [ 14.973799] ret_from_fork_asm+0x1a/0x30 [ 14.973958] [ 14.974031] The buggy address belongs to the object at ffff8881038e7800 [ 14.974031] which belongs to the cache kmalloc-64 of size 64 [ 14.974589] The buggy address is located 0 bytes to the right of [ 14.974589] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 14.974991] [ 14.975062] The buggy address belongs to the physical page: [ 14.975238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 14.975559] flags: 0x200000000000000(node=0|zone=2) [ 14.975798] page_type: f5(slab) [ 14.975970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.976339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.976676] page dumped because: kasan: bad access detected [ 14.976872] [ 14.976941] Memory state around the buggy address: [ 14.977094] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.977311] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.977904] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.978229] ^ [ 14.978499] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.979150] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.979371] ================================================================== [ 16.065544] ================================================================== [ 16.065941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.066265] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.066977] [ 16.067219] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.067265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.067279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.067300] Call Trace: [ 16.067315] <TASK> [ 16.067330] dump_stack_lvl+0x73/0xb0 [ 16.067361] print_report+0xd1/0x610 [ 16.067384] ? __virt_addr_valid+0x1db/0x2d0 [ 16.067483] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.067509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.067535] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.067559] kasan_report+0x141/0x180 [ 16.067583] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.067611] __asan_report_load8_noabort+0x18/0x20 [ 16.067638] kasan_atomics_helper+0x4f30/0x5450 [ 16.067663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.067688] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.067716] ? kasan_atomics+0x152/0x310 [ 16.067744] kasan_atomics+0x1dc/0x310 [ 16.067780] ? __pfx_kasan_atomics+0x10/0x10 [ 16.067806] ? __pfx_read_tsc+0x10/0x10 [ 16.067829] ? ktime_get_ts64+0x86/0x230 [ 16.067855] kunit_try_run_case+0x1a5/0x480 [ 16.067882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.067906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.067931] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.067957] ? __kthread_parkme+0x82/0x180 [ 16.067978] ? preempt_count_sub+0x50/0x80 [ 16.068003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.068055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.068083] kthread+0x337/0x6f0 [ 16.068104] ? trace_preempt_on+0x20/0xc0 [ 16.068128] ? __pfx_kthread+0x10/0x10 [ 16.068150] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.068173] ? calculate_sigpending+0x7b/0xa0 [ 16.068199] ? __pfx_kthread+0x10/0x10 [ 16.068222] ret_from_fork+0x116/0x1d0 [ 16.068242] ? __pfx_kthread+0x10/0x10 [ 16.068264] ret_from_fork_asm+0x1a/0x30 [ 16.068296] </TASK> [ 16.068307] [ 16.077745] Allocated by task 282: [ 16.078106] kasan_save_stack+0x45/0x70 [ 16.078276] kasan_save_track+0x18/0x40 [ 16.078619] kasan_save_alloc_info+0x3b/0x50 [ 16.078845] __kasan_kmalloc+0xb7/0xc0 [ 16.079023] __kmalloc_cache_noprof+0x189/0x420 [ 16.079229] kasan_atomics+0x95/0x310 [ 16.079403] kunit_try_run_case+0x1a5/0x480 [ 16.079857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.080195] kthread+0x337/0x6f0 [ 16.080434] ret_from_fork+0x116/0x1d0 [ 16.080672] ret_from_fork_asm+0x1a/0x30 [ 16.080963] [ 16.081057] The buggy address belongs to the object at ffff8881038e7800 [ 16.081057] which belongs to the cache kmalloc-64 of size 64 [ 16.081678] The buggy address is located 0 bytes to the right of [ 16.081678] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.082222] [ 16.082305] The buggy address belongs to the physical page: [ 16.082840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.083146] flags: 0x200000000000000(node=0|zone=2) [ 16.083474] page_type: f5(slab) [ 16.083661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.084141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.084549] page dumped because: kasan: bad access detected [ 16.084810] [ 16.085021] Memory state around the buggy address: [ 16.085190] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.085605] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.086021] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.086315] ^ [ 16.086640] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.087033] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.087332] ================================================================== [ 15.503745] ================================================================== [ 15.504072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.504448] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.504785] [ 15.504868] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.504940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.504953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.504991] Call Trace: [ 15.505016] <TASK> [ 15.505030] dump_stack_lvl+0x73/0xb0 [ 15.505060] print_report+0xd1/0x610 [ 15.505087] ? __virt_addr_valid+0x1db/0x2d0 [ 15.505111] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.505133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.505159] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.505211] kasan_report+0x141/0x180 [ 15.505235] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.505307] kasan_check_range+0x10c/0x1c0 [ 15.505342] __kasan_check_write+0x18/0x20 [ 15.505362] kasan_atomics_helper+0xfa9/0x5450 [ 15.505399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.505424] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.505462] ? kasan_atomics+0x152/0x310 [ 15.505490] kasan_atomics+0x1dc/0x310 [ 15.505531] ? __pfx_kasan_atomics+0x10/0x10 [ 15.505570] ? __pfx_read_tsc+0x10/0x10 [ 15.505608] ? ktime_get_ts64+0x86/0x230 [ 15.505634] kunit_try_run_case+0x1a5/0x480 [ 15.505687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.505720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.505747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.505789] ? __kthread_parkme+0x82/0x180 [ 15.505811] ? preempt_count_sub+0x50/0x80 [ 15.505836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.505862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.505889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.505916] kthread+0x337/0x6f0 [ 15.505937] ? trace_preempt_on+0x20/0xc0 [ 15.505961] ? __pfx_kthread+0x10/0x10 [ 15.505984] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.506007] ? calculate_sigpending+0x7b/0xa0 [ 15.506033] ? __pfx_kthread+0x10/0x10 [ 15.506056] ret_from_fork+0x116/0x1d0 [ 15.506076] ? __pfx_kthread+0x10/0x10 [ 15.506098] ret_from_fork_asm+0x1a/0x30 [ 15.506130] </TASK> [ 15.506141] [ 15.514403] Allocated by task 282: [ 15.514538] kasan_save_stack+0x45/0x70 [ 15.514678] kasan_save_track+0x18/0x40 [ 15.514822] kasan_save_alloc_info+0x3b/0x50 [ 15.515107] __kasan_kmalloc+0xb7/0xc0 [ 15.515347] __kmalloc_cache_noprof+0x189/0x420 [ 15.515660] kasan_atomics+0x95/0x310 [ 15.515864] kunit_try_run_case+0x1a5/0x480 [ 15.516131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.516411] kthread+0x337/0x6f0 [ 15.516622] ret_from_fork+0x116/0x1d0 [ 15.516834] ret_from_fork_asm+0x1a/0x30 [ 15.517075] [ 15.517166] The buggy address belongs to the object at ffff8881038e7800 [ 15.517166] which belongs to the cache kmalloc-64 of size 64 [ 15.517724] The buggy address is located 0 bytes to the right of [ 15.517724] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.518279] [ 15.518390] The buggy address belongs to the physical page: [ 15.518733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.519084] flags: 0x200000000000000(node=0|zone=2) [ 15.519337] page_type: f5(slab) [ 15.519514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.519883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.520280] page dumped because: kasan: bad access detected [ 15.520652] [ 15.520781] Memory state around the buggy address: [ 15.521035] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.521390] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.522065] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.522352] ^ [ 15.522685] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.523037] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.523333] ================================================================== [ 16.360201] ================================================================== [ 16.360714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.360991] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.361221] [ 16.361305] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.361347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.361359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.361380] Call Trace: [ 16.361395] <TASK> [ 16.361411] dump_stack_lvl+0x73/0xb0 [ 16.361439] print_report+0xd1/0x610 [ 16.361474] ? __virt_addr_valid+0x1db/0x2d0 [ 16.361508] ? kasan_atomics_helper+0x224c/0x5450 [ 16.361532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.361557] ? kasan_atomics_helper+0x224c/0x5450 [ 16.361592] kasan_report+0x141/0x180 [ 16.361615] ? kasan_atomics_helper+0x224c/0x5450 [ 16.361643] kasan_check_range+0x10c/0x1c0 [ 16.361669] __kasan_check_write+0x18/0x20 [ 16.361690] kasan_atomics_helper+0x224c/0x5450 [ 16.361713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.361738] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.361776] ? kasan_atomics+0x152/0x310 [ 16.361804] kasan_atomics+0x1dc/0x310 [ 16.361828] ? __pfx_kasan_atomics+0x10/0x10 [ 16.361854] ? __pfx_read_tsc+0x10/0x10 [ 16.361876] ? ktime_get_ts64+0x86/0x230 [ 16.361901] kunit_try_run_case+0x1a5/0x480 [ 16.361927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.361952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.361978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.362004] ? __kthread_parkme+0x82/0x180 [ 16.362025] ? preempt_count_sub+0x50/0x80 [ 16.362050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.362076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.362102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.362130] kthread+0x337/0x6f0 [ 16.362150] ? trace_preempt_on+0x20/0xc0 [ 16.362174] ? __pfx_kthread+0x10/0x10 [ 16.362196] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.362219] ? calculate_sigpending+0x7b/0xa0 [ 16.362245] ? __pfx_kthread+0x10/0x10 [ 16.362267] ret_from_fork+0x116/0x1d0 [ 16.362286] ? __pfx_kthread+0x10/0x10 [ 16.362308] ret_from_fork_asm+0x1a/0x30 [ 16.362361] </TASK> [ 16.362371] [ 16.370300] Allocated by task 282: [ 16.370441] kasan_save_stack+0x45/0x70 [ 16.370648] kasan_save_track+0x18/0x40 [ 16.370856] kasan_save_alloc_info+0x3b/0x50 [ 16.371077] __kasan_kmalloc+0xb7/0xc0 [ 16.371463] __kmalloc_cache_noprof+0x189/0x420 [ 16.371693] kasan_atomics+0x95/0x310 [ 16.371924] kunit_try_run_case+0x1a5/0x480 [ 16.372103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.372371] kthread+0x337/0x6f0 [ 16.372613] ret_from_fork+0x116/0x1d0 [ 16.372749] ret_from_fork_asm+0x1a/0x30 [ 16.373185] [ 16.373285] The buggy address belongs to the object at ffff8881038e7800 [ 16.373285] which belongs to the cache kmalloc-64 of size 64 [ 16.374834] The buggy address is located 0 bytes to the right of [ 16.374834] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.375219] [ 16.375316] The buggy address belongs to the physical page: [ 16.375925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.376532] flags: 0x200000000000000(node=0|zone=2) [ 16.376776] page_type: f5(slab) [ 16.376936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.377261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.377997] page dumped because: kasan: bad access detected [ 16.378309] [ 16.378555] Memory state around the buggy address: [ 16.378995] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.379604] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.380132] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.380951] ^ [ 16.381378] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.382099] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.382619] ================================================================== [ 16.383255] ================================================================== [ 16.383962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.384588] Read of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 16.385212] [ 16.385325] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.385371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.385384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.385406] Call Trace: [ 16.385420] <TASK> [ 16.385436] dump_stack_lvl+0x73/0xb0 [ 16.385468] print_report+0xd1/0x610 [ 16.385490] ? __virt_addr_valid+0x1db/0x2d0 [ 16.385515] ? kasan_atomics_helper+0x5115/0x5450 [ 16.385538] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.385563] ? kasan_atomics_helper+0x5115/0x5450 [ 16.385587] kasan_report+0x141/0x180 [ 16.385610] ? kasan_atomics_helper+0x5115/0x5450 [ 16.385638] __asan_report_load8_noabort+0x18/0x20 [ 16.385666] kasan_atomics_helper+0x5115/0x5450 [ 16.385689] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.385714] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.385741] ? kasan_atomics+0x152/0x310 [ 16.385781] kasan_atomics+0x1dc/0x310 [ 16.385805] ? __pfx_kasan_atomics+0x10/0x10 [ 16.385831] ? __pfx_read_tsc+0x10/0x10 [ 16.385853] ? ktime_get_ts64+0x86/0x230 [ 16.385878] kunit_try_run_case+0x1a5/0x480 [ 16.385915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.385940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.385977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.386003] ? __kthread_parkme+0x82/0x180 [ 16.386026] ? preempt_count_sub+0x50/0x80 [ 16.386051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.386086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.386112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.386140] kthread+0x337/0x6f0 [ 16.386171] ? trace_preempt_on+0x20/0xc0 [ 16.386196] ? __pfx_kthread+0x10/0x10 [ 16.386218] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.386241] ? calculate_sigpending+0x7b/0xa0 [ 16.386267] ? __pfx_kthread+0x10/0x10 [ 16.386290] ret_from_fork+0x116/0x1d0 [ 16.386311] ? __pfx_kthread+0x10/0x10 [ 16.386334] ret_from_fork_asm+0x1a/0x30 [ 16.386366] </TASK> [ 16.386376] [ 16.393858] Allocated by task 282: [ 16.394024] kasan_save_stack+0x45/0x70 [ 16.394237] kasan_save_track+0x18/0x40 [ 16.394432] kasan_save_alloc_info+0x3b/0x50 [ 16.394645] __kasan_kmalloc+0xb7/0xc0 [ 16.394861] __kmalloc_cache_noprof+0x189/0x420 [ 16.395073] kasan_atomics+0x95/0x310 [ 16.395260] kunit_try_run_case+0x1a5/0x480 [ 16.395410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.395708] kthread+0x337/0x6f0 [ 16.395892] ret_from_fork+0x116/0x1d0 [ 16.396042] ret_from_fork_asm+0x1a/0x30 [ 16.396183] [ 16.396256] The buggy address belongs to the object at ffff8881038e7800 [ 16.396256] which belongs to the cache kmalloc-64 of size 64 [ 16.396629] The buggy address is located 0 bytes to the right of [ 16.396629] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 16.397471] [ 16.397544] The buggy address belongs to the physical page: [ 16.397718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 16.397965] flags: 0x200000000000000(node=0|zone=2) [ 16.398165] page_type: f5(slab) [ 16.398336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.398971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.399350] page dumped because: kasan: bad access detected [ 16.399630] [ 16.399750] Memory state around the buggy address: [ 16.399986] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.400234] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.400656] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.400980] ^ [ 16.401180] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.401495] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.401813] ================================================================== [ 15.108217] ================================================================== [ 15.108785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.109104] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.109354] [ 15.109535] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.109579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.109591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.109614] Call Trace: [ 15.109630] <TASK> [ 15.109648] dump_stack_lvl+0x73/0xb0 [ 15.109676] print_report+0xd1/0x610 [ 15.109699] ? __virt_addr_valid+0x1db/0x2d0 [ 15.109723] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.109746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.109782] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.109806] kasan_report+0x141/0x180 [ 15.109829] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.109857] kasan_check_range+0x10c/0x1c0 [ 15.109883] __kasan_check_write+0x18/0x20 [ 15.109904] kasan_atomics_helper+0x5fe/0x5450 [ 15.109929] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.109954] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.109981] ? kasan_atomics+0x152/0x310 [ 15.110010] kasan_atomics+0x1dc/0x310 [ 15.110034] ? __pfx_kasan_atomics+0x10/0x10 [ 15.110061] ? __pfx_read_tsc+0x10/0x10 [ 15.110083] ? ktime_get_ts64+0x86/0x230 [ 15.110108] kunit_try_run_case+0x1a5/0x480 [ 15.110134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.110159] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.110185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.110211] ? __kthread_parkme+0x82/0x180 [ 15.110232] ? preempt_count_sub+0x50/0x80 [ 15.110258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.110283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.110396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.110424] kthread+0x337/0x6f0 [ 15.110456] ? trace_preempt_on+0x20/0xc0 [ 15.110481] ? __pfx_kthread+0x10/0x10 [ 15.110504] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.110527] ? calculate_sigpending+0x7b/0xa0 [ 15.110552] ? __pfx_kthread+0x10/0x10 [ 15.110575] ret_from_fork+0x116/0x1d0 [ 15.110595] ? __pfx_kthread+0x10/0x10 [ 15.110617] ret_from_fork_asm+0x1a/0x30 [ 15.110649] </TASK> [ 15.110660] [ 15.118263] Allocated by task 282: [ 15.118420] kasan_save_stack+0x45/0x70 [ 15.118693] kasan_save_track+0x18/0x40 [ 15.118887] kasan_save_alloc_info+0x3b/0x50 [ 15.119097] __kasan_kmalloc+0xb7/0xc0 [ 15.119264] __kmalloc_cache_noprof+0x189/0x420 [ 15.119477] kasan_atomics+0x95/0x310 [ 15.119829] kunit_try_run_case+0x1a5/0x480 [ 15.120016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.120195] kthread+0x337/0x6f0 [ 15.120316] ret_from_fork+0x116/0x1d0 [ 15.120504] ret_from_fork_asm+0x1a/0x30 [ 15.120705] [ 15.120813] The buggy address belongs to the object at ffff8881038e7800 [ 15.120813] which belongs to the cache kmalloc-64 of size 64 [ 15.121579] The buggy address is located 0 bytes to the right of [ 15.121579] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.122065] [ 15.122167] The buggy address belongs to the physical page: [ 15.122506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.122861] flags: 0x200000000000000(node=0|zone=2) [ 15.123078] page_type: f5(slab) [ 15.123221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.123589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.123926] page dumped because: kasan: bad access detected [ 15.124149] [ 15.124246] Memory state around the buggy address: [ 15.124616] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.124882] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.125102] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.125317] ^ [ 15.125769] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.126093] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.126564] ================================================================== [ 15.591829] ================================================================== [ 15.592153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.592684] Write of size 4 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.593362] [ 15.593654] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.593703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.593717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.593739] Call Trace: [ 15.593766] <TASK> [ 15.593783] dump_stack_lvl+0x73/0xb0 [ 15.593934] print_report+0xd1/0x610 [ 15.593970] ? __virt_addr_valid+0x1db/0x2d0 [ 15.593995] ? kasan_atomics_helper+0x1148/0x5450 [ 15.594019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.594045] ? kasan_atomics_helper+0x1148/0x5450 [ 15.594068] kasan_report+0x141/0x180 [ 15.594091] ? kasan_atomics_helper+0x1148/0x5450 [ 15.594120] kasan_check_range+0x10c/0x1c0 [ 15.594144] __kasan_check_write+0x18/0x20 [ 15.594166] kasan_atomics_helper+0x1148/0x5450 [ 15.594190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.594215] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.594242] ? kasan_atomics+0x152/0x310 [ 15.594270] kasan_atomics+0x1dc/0x310 [ 15.594295] ? __pfx_kasan_atomics+0x10/0x10 [ 15.594320] ? __pfx_read_tsc+0x10/0x10 [ 15.594343] ? ktime_get_ts64+0x86/0x230 [ 15.594370] kunit_try_run_case+0x1a5/0x480 [ 15.594402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.594513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.594539] ? __kthread_parkme+0x82/0x180 [ 15.594561] ? preempt_count_sub+0x50/0x80 [ 15.594586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.594639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.594666] kthread+0x337/0x6f0 [ 15.594688] ? trace_preempt_on+0x20/0xc0 [ 15.594713] ? __pfx_kthread+0x10/0x10 [ 15.594734] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.594768] ? calculate_sigpending+0x7b/0xa0 [ 15.594793] ? __pfx_kthread+0x10/0x10 [ 15.594816] ret_from_fork+0x116/0x1d0 [ 15.594836] ? __pfx_kthread+0x10/0x10 [ 15.594858] ret_from_fork_asm+0x1a/0x30 [ 15.594890] </TASK> [ 15.594901] [ 15.607829] Allocated by task 282: [ 15.608295] kasan_save_stack+0x45/0x70 [ 15.608676] kasan_save_track+0x18/0x40 [ 15.608848] kasan_save_alloc_info+0x3b/0x50 [ 15.609001] __kasan_kmalloc+0xb7/0xc0 [ 15.609137] __kmalloc_cache_noprof+0x189/0x420 [ 15.609296] kasan_atomics+0x95/0x310 [ 15.609432] kunit_try_run_case+0x1a5/0x480 [ 15.610230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.611038] kthread+0x337/0x6f0 [ 15.611498] ret_from_fork+0x116/0x1d0 [ 15.612014] ret_from_fork_asm+0x1a/0x30 [ 15.612531] [ 15.612824] The buggy address belongs to the object at ffff8881038e7800 [ 15.612824] which belongs to the cache kmalloc-64 of size 64 [ 15.614181] The buggy address is located 0 bytes to the right of [ 15.614181] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.614886] [ 15.614970] The buggy address belongs to the physical page: [ 15.615148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.615390] flags: 0x200000000000000(node=0|zone=2) [ 15.616175] page_type: f5(slab) [ 15.616698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.617805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.618585] page dumped because: kasan: bad access detected [ 15.619208] [ 15.619527] Memory state around the buggy address: [ 15.620084] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.620643] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.621364] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.621953] ^ [ 15.622118] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.622774] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.623726] ================================================================== [ 15.879809] ================================================================== [ 15.880128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.880620] Write of size 8 at addr ffff8881038e7830 by task kunit_try_catch/282 [ 15.880991] [ 15.881106] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.881150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.881163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.881185] Call Trace: [ 15.881199] <TASK> [ 15.881213] dump_stack_lvl+0x73/0xb0 [ 15.881243] print_report+0xd1/0x610 [ 15.881266] ? __virt_addr_valid+0x1db/0x2d0 [ 15.881290] ? kasan_atomics_helper+0x177f/0x5450 [ 15.881312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.881338] ? kasan_atomics_helper+0x177f/0x5450 [ 15.881361] kasan_report+0x141/0x180 [ 15.881384] ? kasan_atomics_helper+0x177f/0x5450 [ 15.881412] kasan_check_range+0x10c/0x1c0 [ 15.881640] __kasan_check_write+0x18/0x20 [ 15.881663] kasan_atomics_helper+0x177f/0x5450 [ 15.881688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.881713] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.881739] ? kasan_atomics+0x152/0x310 [ 15.881781] kasan_atomics+0x1dc/0x310 [ 15.881805] ? __pfx_kasan_atomics+0x10/0x10 [ 15.881831] ? __pfx_read_tsc+0x10/0x10 [ 15.881853] ? ktime_get_ts64+0x86/0x230 [ 15.881878] kunit_try_run_case+0x1a5/0x480 [ 15.881904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.881928] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.881954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.881980] ? __kthread_parkme+0x82/0x180 [ 15.882002] ? preempt_count_sub+0x50/0x80 [ 15.882027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.882079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.882106] kthread+0x337/0x6f0 [ 15.882127] ? trace_preempt_on+0x20/0xc0 [ 15.882152] ? __pfx_kthread+0x10/0x10 [ 15.882173] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.882197] ? calculate_sigpending+0x7b/0xa0 [ 15.882223] ? __pfx_kthread+0x10/0x10 [ 15.882246] ret_from_fork+0x116/0x1d0 [ 15.882265] ? __pfx_kthread+0x10/0x10 [ 15.882288] ret_from_fork_asm+0x1a/0x30 [ 15.882320] </TASK> [ 15.882331] [ 15.889842] Allocated by task 282: [ 15.890047] kasan_save_stack+0x45/0x70 [ 15.890268] kasan_save_track+0x18/0x40 [ 15.890484] kasan_save_alloc_info+0x3b/0x50 [ 15.890638] __kasan_kmalloc+0xb7/0xc0 [ 15.890837] __kmalloc_cache_noprof+0x189/0x420 [ 15.891103] kasan_atomics+0x95/0x310 [ 15.891306] kunit_try_run_case+0x1a5/0x480 [ 15.891538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.891789] kthread+0x337/0x6f0 [ 15.892005] ret_from_fork+0x116/0x1d0 [ 15.892261] ret_from_fork_asm+0x1a/0x30 [ 15.892529] [ 15.892631] The buggy address belongs to the object at ffff8881038e7800 [ 15.892631] which belongs to the cache kmalloc-64 of size 64 [ 15.893167] The buggy address is located 0 bytes to the right of [ 15.893167] allocated 48-byte region [ffff8881038e7800, ffff8881038e7830) [ 15.893745] [ 15.893841] The buggy address belongs to the physical page: [ 15.894015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7 [ 15.894280] flags: 0x200000000000000(node=0|zone=2) [ 15.894551] page_type: f5(slab) [ 15.894743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.895102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.895467] page dumped because: kasan: bad access detected [ 15.895762] [ 15.895876] Memory state around the buggy address: [ 15.896101] ffff8881038e7700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.896420] ffff8881038e7780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.896766] >ffff8881038e7800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.897069] ^ [ 15.897226] ffff8881038e7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.897583] ffff8881038e7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.897911] ==================================================================