Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.541865] ================================================================== [ 18.541919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.541970] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.542296] [ 18.542368] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.542467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.542535] Hardware name: linux,dummy-virt (DT) [ 18.542570] Call trace: [ 18.542612] show_stack+0x20/0x38 (C) [ 18.542664] dump_stack_lvl+0x8c/0xd0 [ 18.542715] print_report+0x118/0x5d0 [ 18.542762] kasan_report+0xdc/0x128 [ 18.542826] kasan_check_range+0x100/0x1a8 [ 18.542881] __kasan_check_write+0x20/0x30 [ 18.542935] kasan_atomics_helper+0xf20/0x4858 [ 18.542983] kasan_atomics+0x198/0x2e0 [ 18.543030] kunit_try_run_case+0x170/0x3f0 [ 18.543117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.543172] kthread+0x328/0x630 [ 18.543224] ret_from_fork+0x10/0x20 [ 18.543273] [ 18.543293] Allocated by task 266: [ 18.543336] kasan_save_stack+0x3c/0x68 [ 18.543378] kasan_save_track+0x20/0x40 [ 18.543422] kasan_save_alloc_info+0x40/0x58 [ 18.543475] __kasan_kmalloc+0xd4/0xd8 [ 18.543513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.543555] kasan_atomics+0xb8/0x2e0 [ 18.543592] kunit_try_run_case+0x170/0x3f0 [ 18.543632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.543684] kthread+0x328/0x630 [ 18.543726] ret_from_fork+0x10/0x20 [ 18.543771] [ 18.543791] The buggy address belongs to the object at fff00000c58cd100 [ 18.543791] which belongs to the cache kmalloc-64 of size 64 [ 18.543853] The buggy address is located 0 bytes to the right of [ 18.543853] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.543928] [ 18.543965] The buggy address belongs to the physical page: [ 18.543998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.544060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.544110] page_type: f5(slab) [ 18.544149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.544212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.544257] page dumped because: kasan: bad access detected [ 18.544291] [ 18.544310] Memory state around the buggy address: [ 18.544343] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.544388] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.544809] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.544877] ^ [ 18.544921] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.544966] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.545007] ================================================================== [ 18.477978] ================================================================== [ 18.478030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 18.478088] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.478140] [ 18.478180] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.478283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.478320] Hardware name: linux,dummy-virt (DT) [ 18.478358] Call trace: [ 18.478382] show_stack+0x20/0x38 (C) [ 18.478651] dump_stack_lvl+0x8c/0xd0 [ 18.478764] print_report+0x118/0x5d0 [ 18.478816] kasan_report+0xdc/0x128 [ 18.478865] __asan_report_load4_noabort+0x20/0x30 [ 18.478937] kasan_atomics_helper+0x3dbc/0x4858 [ 18.478988] kasan_atomics+0x198/0x2e0 [ 18.479155] kunit_try_run_case+0x170/0x3f0 [ 18.479228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.479293] kthread+0x328/0x630 [ 18.479346] ret_from_fork+0x10/0x20 [ 18.479403] [ 18.479430] Allocated by task 266: [ 18.479477] kasan_save_stack+0x3c/0x68 [ 18.480868] The buggy address is located 0 bytes to the right of [ 18.480868] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.485664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.486799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.487365] __kasan_kmalloc+0xd4/0xd8 [ 18.487424] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.487467] kasan_atomics+0xb8/0x2e0 [ 18.487506] kunit_try_run_case+0x170/0x3f0 [ 18.487771] The buggy address is located 0 bytes to the right of [ 18.487771] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.489174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.492588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.493309] [ 18.493699] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.493795] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.493849] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.493917] ^ [ 18.493952] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.493998] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.494312] ================================================================== [ 18.675295] ================================================================== [ 18.675352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.675403] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.675455] [ 18.675488] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.675570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.675599] Hardware name: linux,dummy-virt (DT) [ 18.675629] Call trace: [ 18.675655] show_stack+0x20/0x38 (C) [ 18.675701] dump_stack_lvl+0x8c/0xd0 [ 18.675750] print_report+0x118/0x5d0 [ 18.675797] kasan_report+0xdc/0x128 [ 18.675856] kasan_check_range+0x100/0x1a8 [ 18.675905] __kasan_check_write+0x20/0x30 [ 18.675951] kasan_atomics_helper+0x14e4/0x4858 [ 18.676002] kasan_atomics+0x198/0x2e0 [ 18.676046] kunit_try_run_case+0x170/0x3f0 [ 18.676094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.676148] kthread+0x328/0x630 [ 18.676899] ret_from_fork+0x10/0x20 [ 18.677000] [ 18.677044] Allocated by task 266: [ 18.677100] kasan_save_stack+0x3c/0x68 [ 18.677478] kasan_save_track+0x20/0x40 [ 18.677920] kasan_save_alloc_info+0x40/0x58 [ 18.678004] __kasan_kmalloc+0xd4/0xd8 [ 18.678248] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.678471] kasan_atomics+0xb8/0x2e0 [ 18.678541] kunit_try_run_case+0x170/0x3f0 [ 18.678613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.678659] kthread+0x328/0x630 [ 18.679321] ret_from_fork+0x10/0x20 [ 18.679386] [ 18.679718] The buggy address belongs to the object at fff00000c58cd100 [ 18.679718] which belongs to the cache kmalloc-64 of size 64 [ 18.679845] The buggy address is located 0 bytes to the right of [ 18.679845] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.680371] [ 18.680661] The buggy address belongs to the physical page: [ 18.680907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.681518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.682148] page_type: f5(slab) [ 18.682226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.682524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.683113] page dumped because: kasan: bad access detected [ 18.683425] [ 18.683473] Memory state around the buggy address: [ 18.683641] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.683910] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.684133] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.684189] ^ [ 18.684242] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.684289] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.684720] ================================================================== [ 18.535550] ================================================================== [ 18.535712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.535772] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.535839] [ 18.535933] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.536024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.536071] Hardware name: linux,dummy-virt (DT) [ 18.536135] Call trace: [ 18.536193] show_stack+0x20/0x38 (C) [ 18.536291] dump_stack_lvl+0x8c/0xd0 [ 18.536347] print_report+0x118/0x5d0 [ 18.536422] kasan_report+0xdc/0x128 [ 18.536504] kasan_check_range+0x100/0x1a8 [ 18.536627] __kasan_check_write+0x20/0x30 [ 18.536676] kasan_atomics_helper+0xeb8/0x4858 [ 18.536725] kasan_atomics+0x198/0x2e0 [ 18.536772] kunit_try_run_case+0x170/0x3f0 [ 18.536820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.537159] kthread+0x328/0x630 [ 18.537256] ret_from_fork+0x10/0x20 [ 18.537364] [ 18.537422] Allocated by task 266: [ 18.537485] kasan_save_stack+0x3c/0x68 [ 18.537779] kasan_save_track+0x20/0x40 [ 18.537926] kasan_save_alloc_info+0x40/0x58 [ 18.538092] __kasan_kmalloc+0xd4/0xd8 [ 18.538176] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.538338] kasan_atomics+0xb8/0x2e0 [ 18.538408] kunit_try_run_case+0x170/0x3f0 [ 18.538502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.538548] kthread+0x328/0x630 [ 18.538583] ret_from_fork+0x10/0x20 [ 18.538908] [ 18.539027] The buggy address belongs to the object at fff00000c58cd100 [ 18.539027] which belongs to the cache kmalloc-64 of size 64 [ 18.539119] The buggy address is located 0 bytes to the right of [ 18.539119] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.539331] [ 18.539470] The buggy address belongs to the physical page: [ 18.539525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.539582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.539980] page_type: f5(slab) [ 18.540090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.540160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.540225] page dumped because: kasan: bad access detected [ 18.540261] [ 18.540281] Memory state around the buggy address: [ 18.540325] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.540371] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.540417] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.540458] ^ [ 18.540739] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.540990] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.541077] ================================================================== [ 18.552870] ================================================================== [ 18.552938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.552999] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.553052] [ 18.553084] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.553167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.553216] Hardware name: linux,dummy-virt (DT) [ 18.553250] Call trace: [ 18.553273] show_stack+0x20/0x38 (C) [ 18.553331] dump_stack_lvl+0x8c/0xd0 [ 18.553379] print_report+0x118/0x5d0 [ 18.553427] kasan_report+0xdc/0x128 [ 18.553473] kasan_check_range+0x100/0x1a8 [ 18.553532] __kasan_check_write+0x20/0x30 [ 18.553579] kasan_atomics_helper+0xff0/0x4858 [ 18.553628] kasan_atomics+0x198/0x2e0 [ 18.553674] kunit_try_run_case+0x170/0x3f0 [ 18.553722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.553777] kthread+0x328/0x630 [ 18.553818] ret_from_fork+0x10/0x20 [ 18.553866] [ 18.553888] Allocated by task 266: [ 18.553916] kasan_save_stack+0x3c/0x68 [ 18.553958] kasan_save_track+0x20/0x40 [ 18.553996] kasan_save_alloc_info+0x40/0x58 [ 18.554037] __kasan_kmalloc+0xd4/0xd8 [ 18.554075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.554116] kasan_atomics+0xb8/0x2e0 [ 18.554154] kunit_try_run_case+0x170/0x3f0 [ 18.555381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.555488] kthread+0x328/0x630 [ 18.555824] ret_from_fork+0x10/0x20 [ 18.555886] [ 18.555911] The buggy address belongs to the object at fff00000c58cd100 [ 18.555911] which belongs to the cache kmalloc-64 of size 64 [ 18.556262] The buggy address is located 0 bytes to the right of [ 18.556262] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.556630] [ 18.556928] The buggy address belongs to the physical page: [ 18.557004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.557142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.557600] page_type: f5(slab) [ 18.557673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.557780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.557827] page dumped because: kasan: bad access detected [ 18.557885] [ 18.558151] Memory state around the buggy address: [ 18.558342] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.558522] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.558692] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.558742] ^ [ 18.559140] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.559531] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.559671] ================================================================== [ 18.602083] ================================================================== [ 18.602144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.602391] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.602494] [ 18.602529] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.602765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.602813] Hardware name: linux,dummy-virt (DT) [ 18.602848] Call trace: [ 18.602877] show_stack+0x20/0x38 (C) [ 18.603036] dump_stack_lvl+0x8c/0xd0 [ 18.603088] print_report+0x118/0x5d0 [ 18.603154] kasan_report+0xdc/0x128 [ 18.603215] kasan_check_range+0x100/0x1a8 [ 18.603474] __kasan_check_write+0x20/0x30 [ 18.603590] kasan_atomics_helper+0x11f8/0x4858 [ 18.603815] kasan_atomics+0x198/0x2e0 [ 18.603876] kunit_try_run_case+0x170/0x3f0 [ 18.603928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.604153] kthread+0x328/0x630 [ 18.604254] ret_from_fork+0x10/0x20 [ 18.604731] [ 18.604800] Allocated by task 266: [ 18.605332] kasan_save_stack+0x3c/0x68 [ 18.605403] kasan_save_track+0x20/0x40 [ 18.605483] kasan_save_alloc_info+0x40/0x58 [ 18.605731] __kasan_kmalloc+0xd4/0xd8 [ 18.606186] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.606394] kasan_atomics+0xb8/0x2e0 [ 18.606597] kunit_try_run_case+0x170/0x3f0 [ 18.606662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.606730] kthread+0x328/0x630 [ 18.606854] ret_from_fork+0x10/0x20 [ 18.606898] [ 18.606920] The buggy address belongs to the object at fff00000c58cd100 [ 18.606920] which belongs to the cache kmalloc-64 of size 64 [ 18.607007] The buggy address is located 0 bytes to the right of [ 18.607007] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.607323] [ 18.607512] The buggy address belongs to the physical page: [ 18.607734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.607814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.607865] page_type: f5(slab) [ 18.608146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.608250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.608405] page dumped because: kasan: bad access detected [ 18.608618] [ 18.608642] Memory state around the buggy address: [ 18.608751] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.609218] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.609321] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.609569] ^ [ 18.609724] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.610325] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.610653] ================================================================== [ 18.738733] ================================================================== [ 18.738828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.738889] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.738943] [ 18.739276] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.739380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.739595] Hardware name: linux,dummy-virt (DT) [ 18.739840] Call trace: [ 18.739929] show_stack+0x20/0x38 (C) [ 18.740184] dump_stack_lvl+0x8c/0xd0 [ 18.740498] print_report+0x118/0x5d0 [ 18.740590] kasan_report+0xdc/0x128 [ 18.740742] kasan_check_range+0x100/0x1a8 [ 18.740821] __kasan_check_write+0x20/0x30 [ 18.740881] kasan_atomics_helper+0x16d0/0x4858 [ 18.740940] kasan_atomics+0x198/0x2e0 [ 18.741177] kunit_try_run_case+0x170/0x3f0 [ 18.741815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.741897] kthread+0x328/0x630 [ 18.742081] ret_from_fork+0x10/0x20 [ 18.742711] [ 18.742751] Allocated by task 266: [ 18.742899] kasan_save_stack+0x3c/0x68 [ 18.742985] kasan_save_track+0x20/0x40 [ 18.743075] kasan_save_alloc_info+0x40/0x58 [ 18.743438] __kasan_kmalloc+0xd4/0xd8 [ 18.743606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.743853] kasan_atomics+0xb8/0x2e0 [ 18.744124] kunit_try_run_case+0x170/0x3f0 [ 18.744212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.744667] kthread+0x328/0x630 [ 18.744912] ret_from_fork+0x10/0x20 [ 18.744990] [ 18.745059] The buggy address belongs to the object at fff00000c58cd100 [ 18.745059] which belongs to the cache kmalloc-64 of size 64 [ 18.745274] The buggy address is located 0 bytes to the right of [ 18.745274] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.745618] [ 18.745800] The buggy address belongs to the physical page: [ 18.745868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.746302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.746370] page_type: f5(slab) [ 18.746949] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.747011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.747074] page dumped because: kasan: bad access detected [ 18.747148] [ 18.747169] Memory state around the buggy address: [ 18.747217] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.747274] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.747320] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.747373] ^ [ 18.747415] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.747466] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.747532] ================================================================== [ 18.652340] ================================================================== [ 18.652402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.654463] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.654555] [ 18.654609] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.654789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.654819] Hardware name: linux,dummy-virt (DT) [ 18.654897] Call trace: [ 18.655429] show_stack+0x20/0x38 (C) [ 18.655525] dump_stack_lvl+0x8c/0xd0 [ 18.655788] print_report+0x118/0x5d0 [ 18.655846] kasan_report+0xdc/0x128 [ 18.656354] kasan_check_range+0x100/0x1a8 [ 18.656760] __kasan_check_write+0x20/0x30 [ 18.656921] kasan_atomics_helper+0x1414/0x4858 [ 18.657035] kasan_atomics+0x198/0x2e0 [ 18.657121] kunit_try_run_case+0x170/0x3f0 [ 18.657561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.657882] kthread+0x328/0x630 [ 18.658108] ret_from_fork+0x10/0x20 [ 18.658301] [ 18.658427] Allocated by task 266: [ 18.658475] kasan_save_stack+0x3c/0x68 [ 18.658942] kasan_save_track+0x20/0x40 [ 18.659030] kasan_save_alloc_info+0x40/0x58 [ 18.659311] __kasan_kmalloc+0xd4/0xd8 [ 18.659491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.659642] kasan_atomics+0xb8/0x2e0 [ 18.659693] kunit_try_run_case+0x170/0x3f0 [ 18.659917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.660082] kthread+0x328/0x630 [ 18.660217] ret_from_fork+0x10/0x20 [ 18.660263] [ 18.660286] The buggy address belongs to the object at fff00000c58cd100 [ 18.660286] which belongs to the cache kmalloc-64 of size 64 [ 18.660350] The buggy address is located 0 bytes to the right of [ 18.660350] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.661010] [ 18.661093] The buggy address belongs to the physical page: [ 18.661305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.661740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.661931] page_type: f5(slab) [ 18.662008] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.662244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.662767] page dumped because: kasan: bad access detected [ 18.662814] [ 18.662835] Memory state around the buggy address: [ 18.662896] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.663146] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.663312] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.663368] ^ [ 18.663404] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.663450] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.663817] ================================================================== [ 18.760791] ================================================================== [ 18.761135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.761414] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.761482] [ 18.761518] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.761609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.761636] Hardware name: linux,dummy-virt (DT) [ 18.761669] Call trace: [ 18.761992] show_stack+0x20/0x38 (C) [ 18.762064] dump_stack_lvl+0x8c/0xd0 [ 18.762420] print_report+0x118/0x5d0 [ 18.762577] kasan_report+0xdc/0x128 [ 18.762651] kasan_check_range+0x100/0x1a8 [ 18.762703] __kasan_check_write+0x20/0x30 [ 18.763047] kasan_atomics_helper+0x175c/0x4858 [ 18.763115] kasan_atomics+0x198/0x2e0 [ 18.763333] kunit_try_run_case+0x170/0x3f0 [ 18.763522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.763593] kthread+0x328/0x630 [ 18.763637] ret_from_fork+0x10/0x20 [ 18.763691] [ 18.763813] Allocated by task 266: [ 18.763852] kasan_save_stack+0x3c/0x68 [ 18.763896] kasan_save_track+0x20/0x40 [ 18.763953] kasan_save_alloc_info+0x40/0x58 [ 18.764307] __kasan_kmalloc+0xd4/0xd8 [ 18.764584] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.764804] kasan_atomics+0xb8/0x2e0 [ 18.764894] kunit_try_run_case+0x170/0x3f0 [ 18.765010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.765072] kthread+0x328/0x630 [ 18.765110] ret_from_fork+0x10/0x20 [ 18.765330] [ 18.765407] The buggy address belongs to the object at fff00000c58cd100 [ 18.765407] which belongs to the cache kmalloc-64 of size 64 [ 18.765742] The buggy address is located 0 bytes to the right of [ 18.765742] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.766058] [ 18.766084] The buggy address belongs to the physical page: [ 18.766145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.766357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.766591] page_type: f5(slab) [ 18.766655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.766863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.767110] page dumped because: kasan: bad access detected [ 18.767521] [ 18.767872] Memory state around the buggy address: [ 18.768017] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.768070] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.768452] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.768630] ^ [ 18.768674] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.768798] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.768999] ================================================================== [ 18.451230] ================================================================== [ 18.451312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.451389] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.451443] [ 18.451474] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.451658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.451690] Hardware name: linux,dummy-virt (DT) [ 18.451723] Call trace: [ 18.451746] show_stack+0x20/0x38 (C) [ 18.451837] dump_stack_lvl+0x8c/0xd0 [ 18.451915] print_report+0x118/0x5d0 [ 18.451990] kasan_report+0xdc/0x128 [ 18.452055] kasan_check_range+0x100/0x1a8 [ 18.452122] __kasan_check_write+0x20/0x30 [ 18.452225] kasan_atomics_helper+0x99c/0x4858 [ 18.452316] kasan_atomics+0x198/0x2e0 [ 18.452393] kunit_try_run_case+0x170/0x3f0 [ 18.452450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.452505] kthread+0x328/0x630 [ 18.452546] ret_from_fork+0x10/0x20 [ 18.452595] [ 18.452624] Allocated by task 266: [ 18.452652] kasan_save_stack+0x3c/0x68 [ 18.452832] kasan_save_track+0x20/0x40 [ 18.452874] kasan_save_alloc_info+0x40/0x58 [ 18.452917] __kasan_kmalloc+0xd4/0xd8 [ 18.452956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.452996] kasan_atomics+0xb8/0x2e0 [ 18.453034] kunit_try_run_case+0x170/0x3f0 [ 18.453074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.453168] kthread+0x328/0x630 [ 18.453236] ret_from_fork+0x10/0x20 [ 18.453351] [ 18.453390] The buggy address belongs to the object at fff00000c58cd100 [ 18.453390] which belongs to the cache kmalloc-64 of size 64 [ 18.453494] The buggy address is located 0 bytes to the right of [ 18.453494] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.453645] [ 18.453669] The buggy address belongs to the physical page: [ 18.453700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.453784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.453971] page_type: f5(slab) [ 18.454012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.454071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.454159] page dumped because: kasan: bad access detected [ 18.454230] [ 18.454338] Memory state around the buggy address: [ 18.454384] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.454438] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.454525] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.454642] ^ [ 18.454686] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.454732] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.454782] ================================================================== [ 18.623538] ================================================================== [ 18.623624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.623676] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.624177] [ 18.624260] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.624468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.624497] Hardware name: linux,dummy-virt (DT) [ 18.624987] Call trace: [ 18.625237] show_stack+0x20/0x38 (C) [ 18.625633] dump_stack_lvl+0x8c/0xd0 [ 18.625763] print_report+0x118/0x5d0 [ 18.625877] kasan_report+0xdc/0x128 [ 18.626187] kasan_check_range+0x100/0x1a8 [ 18.626410] __kasan_check_write+0x20/0x30 [ 18.626575] kasan_atomics_helper+0x12d8/0x4858 [ 18.626644] kasan_atomics+0x198/0x2e0 [ 18.626694] kunit_try_run_case+0x170/0x3f0 [ 18.627017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.627563] kthread+0x328/0x630 [ 18.627650] ret_from_fork+0x10/0x20 [ 18.627826] [ 18.627873] Allocated by task 266: [ 18.627905] kasan_save_stack+0x3c/0x68 [ 18.627979] kasan_save_track+0x20/0x40 [ 18.628226] kasan_save_alloc_info+0x40/0x58 [ 18.628438] __kasan_kmalloc+0xd4/0xd8 [ 18.628749] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.629076] kasan_atomics+0xb8/0x2e0 [ 18.629259] kunit_try_run_case+0x170/0x3f0 [ 18.629511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.629779] kthread+0x328/0x630 [ 18.629823] ret_from_fork+0x10/0x20 [ 18.629980] [ 18.630183] The buggy address belongs to the object at fff00000c58cd100 [ 18.630183] which belongs to the cache kmalloc-64 of size 64 [ 18.630443] The buggy address is located 0 bytes to the right of [ 18.630443] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.630515] [ 18.630641] The buggy address belongs to the physical page: [ 18.630688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.630774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.630841] page_type: f5(slab) [ 18.630888] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.630943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.630996] page dumped because: kasan: bad access detected [ 18.631049] [ 18.631076] Memory state around the buggy address: [ 18.631110] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.631164] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.631248] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.631620] ^ [ 18.631774] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.631999] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.632492] ================================================================== [ 18.440771] ================================================================== [ 18.440824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 18.440887] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.440985] [ 18.441076] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.441236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.441284] Hardware name: linux,dummy-virt (DT) [ 18.441318] Call trace: [ 18.441359] show_stack+0x20/0x38 (C) [ 18.441420] dump_stack_lvl+0x8c/0xd0 [ 18.441504] print_report+0x118/0x5d0 [ 18.441559] kasan_report+0xdc/0x128 [ 18.441615] __asan_report_load4_noabort+0x20/0x30 [ 18.441670] kasan_atomics_helper+0x42d8/0x4858 [ 18.441720] kasan_atomics+0x198/0x2e0 [ 18.441939] kunit_try_run_case+0x170/0x3f0 [ 18.441992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.442126] kthread+0x328/0x630 [ 18.442211] ret_from_fork+0x10/0x20 [ 18.442314] [ 18.442351] Allocated by task 266: [ 18.442407] kasan_save_stack+0x3c/0x68 [ 18.442452] kasan_save_track+0x20/0x40 [ 18.442636] kasan_save_alloc_info+0x40/0x58 [ 18.442686] __kasan_kmalloc+0xd4/0xd8 [ 18.442735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.442784] kasan_atomics+0xb8/0x2e0 [ 18.442830] kunit_try_run_case+0x170/0x3f0 [ 18.442875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.442931] kthread+0x328/0x630 [ 18.442967] ret_from_fork+0x10/0x20 [ 18.443003] [ 18.443165] The buggy address belongs to the object at fff00000c58cd100 [ 18.443165] which belongs to the cache kmalloc-64 of size 64 [ 18.443318] The buggy address is located 0 bytes to the right of [ 18.443318] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.443647] page_type: f5(slab) [ 18.443703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.444042] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.444996] [ 18.445027] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.445131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.445456] Hardware name: linux,dummy-virt (DT) [ 18.445500] Call trace: [ 18.446013] show_stack+0x20/0x38 (C) [ 18.446295] dump_stack_lvl+0x8c/0xd0 [ 18.447334] print_report+0x118/0x5d0 [ 18.447393] kasan_report+0xdc/0x128 [ 18.447623] kasan_check_range+0x100/0x1a8 [ 18.447821] __kasan_check_write+0x20/0x30 [ 18.447881] kasan_atomics_helper+0x934/0x4858 [ 18.447960] kasan_atomics+0x198/0x2e0 [ 18.448059] kunit_try_run_case+0x170/0x3f0 [ 18.448126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.448226] kthread+0x328/0x630 [ 18.448315] ret_from_fork+0x10/0x20 [ 18.448431] [ 18.448465] Allocated by task 266: [ 18.448494] kasan_save_stack+0x3c/0x68 [ 18.448548] kasan_save_track+0x20/0x40 [ 18.448587] kasan_save_alloc_info+0x40/0x58 [ 18.448630] __kasan_kmalloc+0xd4/0xd8 [ 18.448668] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.448753] kasan_atomics+0xb8/0x2e0 [ 18.448789] kunit_try_run_case+0x170/0x3f0 [ 18.448829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.448876] kthread+0x328/0x630 [ 18.448909] ret_from_fork+0x10/0x20 [ 18.448984] [ 18.449033] The buggy address belongs to the object at fff00000c58cd100 [ 18.449033] which belongs to the cache kmalloc-64 of size 64 [ 18.449172] The buggy address is located 0 bytes to the right of [ 18.449172] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.449290] [ 18.449338] The buggy address belongs to the physical page: [ 18.449371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.449447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.449521] page_type: f5(slab) [ 18.449559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.449632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.449709] page dumped because: kasan: bad access detected [ 18.449840] [ 18.449900] Memory state around the buggy address: [ 18.449967] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.450027] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.450072] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.450247] ^ [ 18.450285] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.450342] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.450436] ================================================================== [ 18.531007] ================================================================== [ 18.531076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.531126] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.531183] [ 18.531356] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.531561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.531595] Hardware name: linux,dummy-virt (DT) [ 18.531634] Call trace: [ 18.531668] show_stack+0x20/0x38 (C) [ 18.531721] dump_stack_lvl+0x8c/0xd0 [ 18.531777] print_report+0x118/0x5d0 [ 18.531833] kasan_report+0xdc/0x128 [ 18.531889] __asan_report_store8_noabort+0x20/0x30 [ 18.531951] kasan_atomics_helper+0x3e5c/0x4858 [ 18.532030] kasan_atomics+0x198/0x2e0 [ 18.532086] kunit_try_run_case+0x170/0x3f0 [ 18.532136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.532213] kthread+0x328/0x630 [ 18.532256] ret_from_fork+0x10/0x20 [ 18.532304] [ 18.532325] Allocated by task 266: [ 18.532353] kasan_save_stack+0x3c/0x68 [ 18.532594] kasan_save_track+0x20/0x40 [ 18.532661] kasan_save_alloc_info+0x40/0x58 [ 18.532733] __kasan_kmalloc+0xd4/0xd8 [ 18.532788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.533127] kasan_atomics+0xb8/0x2e0 [ 18.533185] kunit_try_run_case+0x170/0x3f0 [ 18.533335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.533418] kthread+0x328/0x630 [ 18.533476] ret_from_fork+0x10/0x20 [ 18.533602] [ 18.533653] The buggy address belongs to the object at fff00000c58cd100 [ 18.533653] which belongs to the cache kmalloc-64 of size 64 [ 18.533792] The buggy address is located 0 bytes to the right of [ 18.533792] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.533892] [ 18.533924] The buggy address belongs to the physical page: [ 18.533958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.534014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.534064] page_type: f5(slab) [ 18.534104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.534192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.534250] page dumped because: kasan: bad access detected [ 18.534442] [ 18.534490] Memory state around the buggy address: [ 18.534528] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.534586] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.534633] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.534674] ^ [ 18.534717] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.534760] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.534805] ================================================================== [ 18.776984] ================================================================== [ 18.777257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.777328] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.777381] [ 18.777595] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.777693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.777750] Hardware name: linux,dummy-virt (DT) [ 18.777863] Call trace: [ 18.777918] show_stack+0x20/0x38 (C) [ 18.777969] dump_stack_lvl+0x8c/0xd0 [ 18.778192] print_report+0x118/0x5d0 [ 18.778276] kasan_report+0xdc/0x128 [ 18.778326] kasan_check_range+0x100/0x1a8 [ 18.778817] __kasan_check_write+0x20/0x30 [ 18.778940] kasan_atomics_helper+0x17ec/0x4858 [ 18.778997] kasan_atomics+0x198/0x2e0 [ 18.779044] kunit_try_run_case+0x170/0x3f0 [ 18.779264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.779470] kthread+0x328/0x630 [ 18.779778] ret_from_fork+0x10/0x20 [ 18.779850] [ 18.779976] Allocated by task 266: [ 18.780023] kasan_save_stack+0x3c/0x68 [ 18.780078] kasan_save_track+0x20/0x40 [ 18.780126] kasan_save_alloc_info+0x40/0x58 [ 18.780519] __kasan_kmalloc+0xd4/0xd8 [ 18.780810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.781015] kasan_atomics+0xb8/0x2e0 [ 18.781159] kunit_try_run_case+0x170/0x3f0 [ 18.781313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.781393] kthread+0x328/0x630 [ 18.781427] ret_from_fork+0x10/0x20 [ 18.781493] [ 18.781515] The buggy address belongs to the object at fff00000c58cd100 [ 18.781515] which belongs to the cache kmalloc-64 of size 64 [ 18.781591] The buggy address is located 0 bytes to the right of [ 18.781591] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.781844] [ 18.781901] The buggy address belongs to the physical page: [ 18.782077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.782603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.782910] page_type: f5(slab) [ 18.783046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.783270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.783329] page dumped because: kasan: bad access detected [ 18.783522] [ 18.783619] Memory state around the buggy address: [ 18.783802] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.784295] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.784731] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.784810] ^ [ 18.784872] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.784919] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.784962] ================================================================== [ 18.560188] ================================================================== [ 18.560515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.560729] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.560957] [ 18.561017] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.561382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.561491] Hardware name: linux,dummy-virt (DT) [ 18.561525] Call trace: [ 18.561868] show_stack+0x20/0x38 (C) [ 18.562372] dump_stack_lvl+0x8c/0xd0 [ 18.562880] print_report+0x118/0x5d0 [ 18.563002] kasan_report+0xdc/0x128 [ 18.563090] kasan_check_range+0x100/0x1a8 [ 18.563256] __kasan_check_write+0x20/0x30 [ 18.563308] kasan_atomics_helper+0x1058/0x4858 [ 18.563688] kasan_atomics+0x198/0x2e0 [ 18.563784] kunit_try_run_case+0x170/0x3f0 [ 18.563979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.564394] kthread+0x328/0x630 [ 18.564932] ret_from_fork+0x10/0x20 [ 18.565091] [ 18.565135] Allocated by task 266: [ 18.565217] kasan_save_stack+0x3c/0x68 [ 18.565271] kasan_save_track+0x20/0x40 [ 18.565316] kasan_save_alloc_info+0x40/0x58 [ 18.565358] __kasan_kmalloc+0xd4/0xd8 [ 18.565396] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.565438] kasan_atomics+0xb8/0x2e0 [ 18.565476] kunit_try_run_case+0x170/0x3f0 [ 18.565559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.565605] kthread+0x328/0x630 [ 18.565656] ret_from_fork+0x10/0x20 [ 18.565696] [ 18.565717] The buggy address belongs to the object at fff00000c58cd100 [ 18.565717] which belongs to the cache kmalloc-64 of size 64 [ 18.565780] The buggy address is located 0 bytes to the right of [ 18.565780] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.565849] [ 18.565889] The buggy address belongs to the physical page: [ 18.565922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.565987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.566036] page_type: f5(slab) [ 18.566085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.566140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.566184] page dumped because: kasan: bad access detected [ 18.566232] [ 18.566266] Memory state around the buggy address: [ 18.566300] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.566345] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.566397] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.566439] ^ [ 18.566474] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.566528] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.566592] ================================================================== [ 18.567953] ================================================================== [ 18.568473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.568561] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.568615] [ 18.568648] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.568731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.568761] Hardware name: linux,dummy-virt (DT) [ 18.569550] Call trace: [ 18.569752] show_stack+0x20/0x38 (C) [ 18.570014] dump_stack_lvl+0x8c/0xd0 [ 18.570551] print_report+0x118/0x5d0 [ 18.570702] kasan_report+0xdc/0x128 [ 18.570791] kasan_check_range+0x100/0x1a8 [ 18.570957] __kasan_check_write+0x20/0x30 [ 18.571019] kasan_atomics_helper+0x10c0/0x4858 [ 18.571362] kasan_atomics+0x198/0x2e0 [ 18.571664] kunit_try_run_case+0x170/0x3f0 [ 18.571842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.572272] kthread+0x328/0x630 [ 18.572691] ret_from_fork+0x10/0x20 [ 18.572829] [ 18.572867] Allocated by task 266: [ 18.572915] kasan_save_stack+0x3c/0x68 [ 18.573060] kasan_save_track+0x20/0x40 [ 18.573101] kasan_save_alloc_info+0x40/0x58 [ 18.573142] __kasan_kmalloc+0xd4/0xd8 [ 18.573186] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.573238] kasan_atomics+0xb8/0x2e0 [ 18.573277] kunit_try_run_case+0x170/0x3f0 [ 18.573319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.573800] kthread+0x328/0x630 [ 18.574025] ret_from_fork+0x10/0x20 [ 18.574119] [ 18.574455] The buggy address belongs to the object at fff00000c58cd100 [ 18.574455] which belongs to the cache kmalloc-64 of size 64 [ 18.574874] The buggy address is located 0 bytes to the right of [ 18.574874] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.575283] [ 18.575336] The buggy address belongs to the physical page: [ 18.575525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.575887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.576320] page_type: f5(slab) [ 18.576585] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.576687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.576740] page dumped because: kasan: bad access detected [ 18.576776] [ 18.577123] Memory state around the buggy address: [ 18.577379] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.577552] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.577690] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.577755] ^ [ 18.578147] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.578387] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.578569] ================================================================== [ 18.749210] ================================================================== [ 18.749265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.749317] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.749747] [ 18.749799] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.749931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.749980] Hardware name: linux,dummy-virt (DT) [ 18.750014] Call trace: [ 18.750237] show_stack+0x20/0x38 (C) [ 18.750426] dump_stack_lvl+0x8c/0xd0 [ 18.750520] print_report+0x118/0x5d0 [ 18.750609] kasan_report+0xdc/0x128 [ 18.750820] __asan_report_load8_noabort+0x20/0x30 [ 18.751029] kasan_atomics_helper+0x3e10/0x4858 [ 18.751082] kasan_atomics+0x198/0x2e0 [ 18.751131] kunit_try_run_case+0x170/0x3f0 [ 18.751688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.751882] kthread+0x328/0x630 [ 18.751980] ret_from_fork+0x10/0x20 [ 18.752032] [ 18.752052] Allocated by task 266: [ 18.752083] kasan_save_stack+0x3c/0x68 [ 18.752125] kasan_save_track+0x20/0x40 [ 18.752471] kasan_save_alloc_info+0x40/0x58 [ 18.752805] __kasan_kmalloc+0xd4/0xd8 [ 18.753053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.753131] kasan_atomics+0xb8/0x2e0 [ 18.753269] kunit_try_run_case+0x170/0x3f0 [ 18.753339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.753384] kthread+0x328/0x630 [ 18.753550] ret_from_fork+0x10/0x20 [ 18.753692] [ 18.753828] The buggy address belongs to the object at fff00000c58cd100 [ 18.753828] which belongs to the cache kmalloc-64 of size 64 [ 18.754313] The buggy address is located 0 bytes to the right of [ 18.754313] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.754700] [ 18.754761] The buggy address belongs to the physical page: [ 18.754831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.754924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.755712] page_type: f5(slab) [ 18.756221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.756534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.756801] page dumped because: kasan: bad access detected [ 18.756965] [ 18.756989] Memory state around the buggy address: [ 18.757510] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.757728] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.757781] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.757823] ^ [ 18.758006] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.758668] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.758738] ================================================================== [ 18.474565] ================================================================== [ 18.474706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 18.474759] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.474820] [ 18.474852] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.475056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.475095] Hardware name: linux,dummy-virt (DT) [ 18.475126] Call trace: [ 18.475149] show_stack+0x20/0x38 (C) [ 18.475221] dump_stack_lvl+0x8c/0xd0 [ 18.475270] print_report+0x118/0x5d0 [ 18.475324] kasan_report+0xdc/0x128 [ 18.475371] kasan_check_range+0x100/0x1a8 [ 18.475422] __kasan_check_write+0x20/0x30 [ 18.475473] kasan_atomics_helper+0xb70/0x4858 [ 18.475534] kasan_atomics+0x198/0x2e0 [ 18.475582] kunit_try_run_case+0x170/0x3f0 [ 18.475628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.475683] kthread+0x328/0x630 [ 18.475725] ret_from_fork+0x10/0x20 [ 18.475772] [ 18.475791] Allocated by task 266: [ 18.475821] kasan_save_stack+0x3c/0x68 [ 18.475865] kasan_save_track+0x20/0x40 [ 18.475910] kasan_save_alloc_info+0x40/0x58 [ 18.475963] __kasan_kmalloc+0xd4/0xd8 [ 18.476008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.476050] kasan_atomics+0xb8/0x2e0 [ 18.476088] kunit_try_run_case+0x170/0x3f0 [ 18.476128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.476173] kthread+0x328/0x630 [ 18.476216] ret_from_fork+0x10/0x20 [ 18.476254] [ 18.476274] The buggy address belongs to the object at fff00000c58cd100 [ 18.476274] which belongs to the cache kmalloc-64 of size 64 [ 18.476335] The buggy address is located 0 bytes to the right of [ 18.476335] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.476704] [ 18.476756] The buggy address belongs to the physical page: [ 18.476801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.476877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.476996] page_type: f5(slab) [ 18.477060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.477138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.477223] page dumped because: kasan: bad access detected [ 18.477270] [ 18.477309] Memory state around the buggy address: [ 18.477342] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.477409] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.477453] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.477494] ^ [ 18.477529] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.477574] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.477738] ================================================================== [ 18.715263] ================================================================== [ 18.715314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.715360] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.715846] [ 18.716091] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.716920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.716974] Hardware name: linux,dummy-virt (DT) [ 18.717026] Call trace: [ 18.717072] show_stack+0x20/0x38 (C) [ 18.717378] dump_stack_lvl+0x8c/0xd0 [ 18.717802] print_report+0x118/0x5d0 [ 18.718228] kasan_report+0xdc/0x128 [ 18.718348] kasan_check_range+0x100/0x1a8 [ 18.718530] __kasan_check_write+0x20/0x30 [ 18.718634] kasan_atomics_helper+0x1644/0x4858 [ 18.718684] kasan_atomics+0x198/0x2e0 [ 18.718904] kunit_try_run_case+0x170/0x3f0 [ 18.719154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.719585] kthread+0x328/0x630 [ 18.719927] ret_from_fork+0x10/0x20 [ 18.720298] [ 18.720565] Allocated by task 266: [ 18.720621] kasan_save_stack+0x3c/0x68 [ 18.720792] kasan_save_track+0x20/0x40 [ 18.720839] kasan_save_alloc_info+0x40/0x58 [ 18.720917] __kasan_kmalloc+0xd4/0xd8 [ 18.720969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.721982] kasan_atomics+0xb8/0x2e0 [ 18.722306] kunit_try_run_case+0x170/0x3f0 [ 18.722385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.723142] kthread+0x328/0x630 [ 18.723512] ret_from_fork+0x10/0x20 [ 18.723829] [ 18.723867] The buggy address belongs to the object at fff00000c58cd100 [ 18.723867] which belongs to the cache kmalloc-64 of size 64 [ 18.723973] The buggy address is located 0 bytes to the right of [ 18.723973] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.724224] [ 18.724285] The buggy address belongs to the physical page: [ 18.724321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.724945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.725123] page_type: f5(slab) [ 18.725218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.725797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.725977] page dumped because: kasan: bad access detected [ 18.726019] [ 18.726065] Memory state around the buggy address: [ 18.726297] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.726562] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.726628] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.726875] ^ [ 18.727204] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.727283] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.727920] ================================================================== [ 18.644930] ================================================================== [ 18.644985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.645036] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.645089] [ 18.645120] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.645219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.645858] Hardware name: linux,dummy-virt (DT) [ 18.646011] Call trace: [ 18.646039] show_stack+0x20/0x38 (C) [ 18.646221] dump_stack_lvl+0x8c/0xd0 [ 18.646282] print_report+0x118/0x5d0 [ 18.646518] kasan_report+0xdc/0x128 [ 18.646689] __asan_report_load8_noabort+0x20/0x30 [ 18.647018] kasan_atomics_helper+0x3f04/0x4858 [ 18.647158] kasan_atomics+0x198/0x2e0 [ 18.647242] kunit_try_run_case+0x170/0x3f0 [ 18.647384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.647458] kthread+0x328/0x630 [ 18.647521] ret_from_fork+0x10/0x20 [ 18.647570] [ 18.647591] Allocated by task 266: [ 18.647622] kasan_save_stack+0x3c/0x68 [ 18.647931] kasan_save_track+0x20/0x40 [ 18.647997] kasan_save_alloc_info+0x40/0x58 [ 18.648042] __kasan_kmalloc+0xd4/0xd8 [ 18.648080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.648485] kasan_atomics+0xb8/0x2e0 [ 18.648565] kunit_try_run_case+0x170/0x3f0 [ 18.648703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.648753] kthread+0x328/0x630 [ 18.648787] ret_from_fork+0x10/0x20 [ 18.648826] [ 18.648848] The buggy address belongs to the object at fff00000c58cd100 [ 18.648848] which belongs to the cache kmalloc-64 of size 64 [ 18.649261] The buggy address is located 0 bytes to the right of [ 18.649261] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.649580] [ 18.649849] The buggy address belongs to the physical page: [ 18.650055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.650130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.650193] page_type: f5(slab) [ 18.650251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.650374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.650430] page dumped because: kasan: bad access detected [ 18.650479] [ 18.650512] Memory state around the buggy address: [ 18.650567] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.650625] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.650673] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.650716] ^ [ 18.650752] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.650805] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.650846] ================================================================== [ 18.665020] ================================================================== [ 18.665078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.665382] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.665460] [ 18.665594] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.665683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.665984] Hardware name: linux,dummy-virt (DT) [ 18.666128] Call trace: [ 18.666187] show_stack+0x20/0x38 (C) [ 18.666386] dump_stack_lvl+0x8c/0xd0 [ 18.666642] print_report+0x118/0x5d0 [ 18.666703] kasan_report+0xdc/0x128 [ 18.667118] kasan_check_range+0x100/0x1a8 [ 18.667191] __kasan_check_write+0x20/0x30 [ 18.667276] kasan_atomics_helper+0x147c/0x4858 [ 18.667328] kasan_atomics+0x198/0x2e0 [ 18.667374] kunit_try_run_case+0x170/0x3f0 [ 18.667626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.667698] kthread+0x328/0x630 [ 18.667938] ret_from_fork+0x10/0x20 [ 18.668379] [ 18.668431] Allocated by task 266: [ 18.668564] kasan_save_stack+0x3c/0x68 [ 18.668641] kasan_save_track+0x20/0x40 [ 18.668878] kasan_save_alloc_info+0x40/0x58 [ 18.668943] __kasan_kmalloc+0xd4/0xd8 [ 18.669308] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.669375] kasan_atomics+0xb8/0x2e0 [ 18.669724] kunit_try_run_case+0x170/0x3f0 [ 18.669799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.669997] kthread+0x328/0x630 [ 18.670074] ret_from_fork+0x10/0x20 [ 18.670167] [ 18.670190] The buggy address belongs to the object at fff00000c58cd100 [ 18.670190] which belongs to the cache kmalloc-64 of size 64 [ 18.670486] The buggy address is located 0 bytes to the right of [ 18.670486] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.670878] [ 18.671098] The buggy address belongs to the physical page: [ 18.671240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.671605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.671854] page_type: f5(slab) [ 18.671935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.672189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.672368] page dumped because: kasan: bad access detected [ 18.672604] [ 18.672660] Memory state around the buggy address: [ 18.672964] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.673294] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.673374] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.673717] ^ [ 18.673772] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674219] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674286] ================================================================== [ 18.514496] ================================================================== [ 18.515332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.515457] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.515550] [ 18.516141] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.516287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.516335] Hardware name: linux,dummy-virt (DT) [ 18.516377] Call trace: [ 18.516422] show_stack+0x20/0x38 (C) [ 18.516499] dump_stack_lvl+0x8c/0xd0 [ 18.516560] print_report+0x118/0x5d0 [ 18.516608] kasan_report+0xdc/0x128 [ 18.516656] kasan_check_range+0x100/0x1a8 [ 18.516705] __kasan_check_read+0x20/0x30 [ 18.516750] kasan_atomics_helper+0xdd4/0x4858 [ 18.516799] kasan_atomics+0x198/0x2e0 [ 18.517013] kunit_try_run_case+0x170/0x3f0 [ 18.517142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.517248] kthread+0x328/0x630 [ 18.517516] ret_from_fork+0x10/0x20 [ 18.517622] [ 18.517673] Allocated by task 266: [ 18.517791] kasan_save_stack+0x3c/0x68 [ 18.517859] kasan_save_track+0x20/0x40 [ 18.517967] kasan_save_alloc_info+0x40/0x58 [ 18.518032] __kasan_kmalloc+0xd4/0xd8 [ 18.518094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.518137] kasan_atomics+0xb8/0x2e0 [ 18.518175] kunit_try_run_case+0x170/0x3f0 [ 18.518232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.518278] kthread+0x328/0x630 [ 18.518322] ret_from_fork+0x10/0x20 [ 18.518362] [ 18.518384] The buggy address belongs to the object at fff00000c58cd100 [ 18.518384] which belongs to the cache kmalloc-64 of size 64 [ 18.518444] The buggy address is located 0 bytes to the right of [ 18.518444] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.518511] [ 18.518543] The buggy address belongs to the physical page: [ 18.518585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.518641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.518690] page_type: f5(slab) [ 18.518729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.518783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.518825] page dumped because: kasan: bad access detected [ 18.518860] [ 18.518889] Memory state around the buggy address: [ 18.518932] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.518978] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.519032] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.519071] ^ [ 18.519107] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.519160] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.519210] ================================================================== [ 18.525341] ================================================================== [ 18.525514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.525590] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.525643] [ 18.525895] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.526047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.526115] Hardware name: linux,dummy-virt (DT) [ 18.526148] Call trace: [ 18.526188] show_stack+0x20/0x38 (C) [ 18.526469] dump_stack_lvl+0x8c/0xd0 [ 18.526585] print_report+0x118/0x5d0 [ 18.526696] kasan_report+0xdc/0x128 [ 18.526751] kasan_check_range+0x100/0x1a8 [ 18.526802] __kasan_check_write+0x20/0x30 [ 18.526857] kasan_atomics_helper+0xe44/0x4858 [ 18.526945] kasan_atomics+0x198/0x2e0 [ 18.526992] kunit_try_run_case+0x170/0x3f0 [ 18.527039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.527105] kthread+0x328/0x630 [ 18.527297] ret_from_fork+0x10/0x20 [ 18.527352] [ 18.527486] Allocated by task 266: [ 18.527575] kasan_save_stack+0x3c/0x68 [ 18.527774] kasan_save_track+0x20/0x40 [ 18.527940] kasan_save_alloc_info+0x40/0x58 [ 18.528039] __kasan_kmalloc+0xd4/0xd8 [ 18.528086] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.528145] kasan_atomics+0xb8/0x2e0 [ 18.528187] kunit_try_run_case+0x170/0x3f0 [ 18.528247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.528335] kthread+0x328/0x630 [ 18.528452] ret_from_fork+0x10/0x20 [ 18.528518] [ 18.528557] The buggy address belongs to the object at fff00000c58cd100 [ 18.528557] which belongs to the cache kmalloc-64 of size 64 [ 18.528667] The buggy address is located 0 bytes to the right of [ 18.528667] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.528744] [ 18.528765] The buggy address belongs to the physical page: [ 18.528826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.528881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.529265] page_type: f5(slab) [ 18.529313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.529390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.529485] page dumped because: kasan: bad access detected [ 18.529754] [ 18.529863] Memory state around the buggy address: [ 18.529901] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.529948] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.529996] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.530065] ^ [ 18.530106] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.530175] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.530230] ================================================================== [ 18.634392] ================================================================== [ 18.634809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.634880] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.634934] [ 18.634968] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.635134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.635173] Hardware name: linux,dummy-virt (DT) [ 18.635219] Call trace: [ 18.635243] show_stack+0x20/0x38 (C) [ 18.635709] dump_stack_lvl+0x8c/0xd0 [ 18.635769] print_report+0x118/0x5d0 [ 18.636156] kasan_report+0xdc/0x128 [ 18.636509] kasan_check_range+0x100/0x1a8 [ 18.636645] __kasan_check_write+0x20/0x30 [ 18.636805] kasan_atomics_helper+0x1384/0x4858 [ 18.637017] kasan_atomics+0x198/0x2e0 [ 18.637228] kunit_try_run_case+0x170/0x3f0 [ 18.637434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.637518] kthread+0x328/0x630 [ 18.637590] ret_from_fork+0x10/0x20 [ 18.637950] [ 18.638001] Allocated by task 266: [ 18.638351] kasan_save_stack+0x3c/0x68 [ 18.638418] kasan_save_track+0x20/0x40 [ 18.638760] kasan_save_alloc_info+0x40/0x58 [ 18.638950] __kasan_kmalloc+0xd4/0xd8 [ 18.639016] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.639167] kasan_atomics+0xb8/0x2e0 [ 18.639228] kunit_try_run_case+0x170/0x3f0 [ 18.639296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.639576] kthread+0x328/0x630 [ 18.639890] ret_from_fork+0x10/0x20 [ 18.640484] [ 18.640538] The buggy address belongs to the object at fff00000c58cd100 [ 18.640538] which belongs to the cache kmalloc-64 of size 64 [ 18.640663] The buggy address is located 0 bytes to the right of [ 18.640663] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.640734] [ 18.641024] The buggy address belongs to the physical page: [ 18.641094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.641530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.641730] page_type: f5(slab) [ 18.641774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.642138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.642543] page dumped because: kasan: bad access detected [ 18.642587] [ 18.642758] Memory state around the buggy address: [ 18.642927] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.643140] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.643192] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.643304] ^ [ 18.643343] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.643486] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.643563] ================================================================== [ 18.709511] ================================================================== [ 18.709566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.709619] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.709674] [ 18.709903] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.710096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.710128] Hardware name: linux,dummy-virt (DT) [ 18.710457] Call trace: [ 18.710544] show_stack+0x20/0x38 (C) [ 18.710809] dump_stack_lvl+0x8c/0xd0 [ 18.710883] print_report+0x118/0x5d0 [ 18.711130] kasan_report+0xdc/0x128 [ 18.711567] __asan_report_load8_noabort+0x20/0x30 [ 18.711861] kasan_atomics_helper+0x3db0/0x4858 [ 18.712061] kasan_atomics+0x198/0x2e0 [ 18.712479] kunit_try_run_case+0x170/0x3f0 [ 18.712630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.712708] kthread+0x328/0x630 [ 18.712753] ret_from_fork+0x10/0x20 [ 18.712809] [ 18.712829] Allocated by task 266: [ 18.713072] kasan_save_stack+0x3c/0x68 [ 18.713214] kasan_save_track+0x20/0x40 [ 18.713384] kasan_save_alloc_info+0x40/0x58 [ 18.713598] __kasan_kmalloc+0xd4/0xd8 [ 18.713644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.713686] kasan_atomics+0xb8/0x2e0 [ 18.713723] kunit_try_run_case+0x170/0x3f0 [ 18.713765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.713931] kthread+0x328/0x630 [ 18.714002] ret_from_fork+0x10/0x20 [ 18.714065] [ 18.714095] The buggy address belongs to the object at fff00000c58cd100 [ 18.714095] which belongs to the cache kmalloc-64 of size 64 [ 18.714159] The buggy address is located 0 bytes to the right of [ 18.714159] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.714246] [ 18.714268] The buggy address belongs to the physical page: [ 18.714318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.714384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.714435] page_type: f5(slab) [ 18.714479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.714548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.714601] page dumped because: kasan: bad access detected [ 18.714651] [ 18.714670] Memory state around the buggy address: [ 18.714713] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.714759] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.714806] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.714856] ^ [ 18.714900] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.714958] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.715008] ================================================================== [ 18.612979] ================================================================== [ 18.613408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.613470] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.613524] [ 18.613558] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.613963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.614009] Hardware name: linux,dummy-virt (DT) [ 18.614043] Call trace: [ 18.614075] show_stack+0x20/0x38 (C) [ 18.614129] dump_stack_lvl+0x8c/0xd0 [ 18.614178] print_report+0x118/0x5d0 [ 18.614244] kasan_report+0xdc/0x128 [ 18.614289] kasan_check_range+0x100/0x1a8 [ 18.614353] __kasan_check_write+0x20/0x30 [ 18.614400] kasan_atomics_helper+0x126c/0x4858 [ 18.614458] kasan_atomics+0x198/0x2e0 [ 18.614505] kunit_try_run_case+0x170/0x3f0 [ 18.614558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.614611] kthread+0x328/0x630 [ 18.614654] ret_from_fork+0x10/0x20 [ 18.614700] [ 18.614720] Allocated by task 266: [ 18.614750] kasan_save_stack+0x3c/0x68 [ 18.614791] kasan_save_track+0x20/0x40 [ 18.614831] kasan_save_alloc_info+0x40/0x58 [ 18.614873] __kasan_kmalloc+0xd4/0xd8 [ 18.614911] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.614952] kasan_atomics+0xb8/0x2e0 [ 18.614988] kunit_try_run_case+0x170/0x3f0 [ 18.615028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.615081] kthread+0x328/0x630 [ 18.615115] ret_from_fork+0x10/0x20 [ 18.615152] [ 18.615173] The buggy address belongs to the object at fff00000c58cd100 [ 18.615173] which belongs to the cache kmalloc-64 of size 64 [ 18.615766] The buggy address is located 0 bytes to the right of [ 18.615766] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.615854] [ 18.616120] The buggy address belongs to the physical page: [ 18.616303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.616371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.616423] page_type: f5(slab) [ 18.616614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.617232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.617285] page dumped because: kasan: bad access detected [ 18.617658] [ 18.619149] Memory state around the buggy address: [ 18.619916] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.620344] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.620773] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.620971] ^ [ 18.621225] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.621322] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.621765] ================================================================== [ 18.495354] ================================================================== [ 18.495515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 18.495576] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.495628] [ 18.495753] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.496082] dump_stack_lvl+0x8c/0xd0 [ 18.496787] kasan_atomics+0x198/0x2e0 [ 18.497499] [ 18.497571] Allocated by task 266: [ 18.497629] kasan_save_stack+0x3c/0x68 [ 18.497812] kasan_save_alloc_info+0x40/0x58 [ 18.498012] kunit_try_run_case+0x170/0x3f0 [ 18.498052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.498286] kthread+0x328/0x630 [ 18.498875] ret_from_fork+0x10/0x20 [ 18.498975] [ 18.499015] The buggy address belongs to the object at fff00000c58cd100 [ 18.499015] which belongs to the cache kmalloc-64 of size 64 [ 18.499121] The buggy address is located 0 bytes to the right of [ 18.499121] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.499191] [ 18.499225] The buggy address belongs to the physical page: [ 18.499258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.499330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.499402] page_type: f5(slab) [ 18.499457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.499511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.499565] page dumped because: kasan: bad access detected [ 18.499608] [ 18.499628] Memory state around the buggy address: [ 18.499660] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.499706] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.499750] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.499792] ^ [ 18.499843] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.499898] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.499940] ================================================================== [ 18.509512] ================================================================== [ 18.509698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.509845] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.509995] [ 18.510033] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.510143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.510173] Hardware name: linux,dummy-virt (DT) [ 18.510222] Call trace: [ 18.510245] show_stack+0x20/0x38 (C) [ 18.510297] dump_stack_lvl+0x8c/0xd0 [ 18.510454] print_report+0x118/0x5d0 [ 18.510605] kasan_report+0xdc/0x128 [ 18.510699] __asan_report_load4_noabort+0x20/0x30 [ 18.510768] kasan_atomics_helper+0x3e04/0x4858 [ 18.511020] kasan_atomics+0x198/0x2e0 [ 18.511213] kunit_try_run_case+0x170/0x3f0 [ 18.511277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.511349] kthread+0x328/0x630 [ 18.511393] ret_from_fork+0x10/0x20 [ 18.511451] [ 18.511479] Allocated by task 266: [ 18.511515] kasan_save_stack+0x3c/0x68 [ 18.511568] kasan_save_track+0x20/0x40 [ 18.511610] kasan_save_alloc_info+0x40/0x58 [ 18.511658] __kasan_kmalloc+0xd4/0xd8 [ 18.511703] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.511751] kasan_atomics+0xb8/0x2e0 [ 18.511790] kunit_try_run_case+0x170/0x3f0 [ 18.511830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.512116] kthread+0x328/0x630 [ 18.512234] ret_from_fork+0x10/0x20 [ 18.512302] [ 18.512351] The buggy address belongs to the object at fff00000c58cd100 [ 18.512351] which belongs to the cache kmalloc-64 of size 64 [ 18.512693] The buggy address is located 0 bytes to the right of [ 18.512693] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.512827] [ 18.512900] The buggy address belongs to the physical page: [ 18.512971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.513029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.513211] page_type: f5(slab) [ 18.513254] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.513409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.513482] page dumped because: kasan: bad access detected [ 18.513527] [ 18.513546] Memory state around the buggy address: [ 18.513590] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.513639] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.513685] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.513734] ^ [ 18.513778] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.513824] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.513865] ================================================================== [ 18.594160] ================================================================== [ 18.594335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.594422] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.594566] [ 18.594635] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.594723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.594752] Hardware name: linux,dummy-virt (DT) [ 18.594851] Call trace: [ 18.594879] show_stack+0x20/0x38 (C) [ 18.594929] dump_stack_lvl+0x8c/0xd0 [ 18.595004] print_report+0x118/0x5d0 [ 18.595237] kasan_report+0xdc/0x128 [ 18.595421] kasan_check_range+0x100/0x1a8 [ 18.595618] __kasan_check_write+0x20/0x30 [ 18.595961] kasan_atomics_helper+0x1190/0x4858 [ 18.596056] kasan_atomics+0x198/0x2e0 [ 18.596269] kunit_try_run_case+0x170/0x3f0 [ 18.596431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.596620] kthread+0x328/0x630 [ 18.596668] ret_from_fork+0x10/0x20 [ 18.596736] [ 18.596757] Allocated by task 266: [ 18.597085] kasan_save_stack+0x3c/0x68 [ 18.597157] kasan_save_track+0x20/0x40 [ 18.597454] kasan_save_alloc_info+0x40/0x58 [ 18.597663] __kasan_kmalloc+0xd4/0xd8 [ 18.597775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.597936] kasan_atomics+0xb8/0x2e0 [ 18.598020] kunit_try_run_case+0x170/0x3f0 [ 18.598178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.598686] kthread+0x328/0x630 [ 18.598908] ret_from_fork+0x10/0x20 [ 18.599042] [ 18.599076] The buggy address belongs to the object at fff00000c58cd100 [ 18.599076] which belongs to the cache kmalloc-64 of size 64 [ 18.599152] The buggy address is located 0 bytes to the right of [ 18.599152] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.599235] [ 18.599267] The buggy address belongs to the physical page: [ 18.599310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.599391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.599444] page_type: f5(slab) [ 18.599482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.599542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.599597] page dumped because: kasan: bad access detected [ 18.599664] [ 18.599684] Memory state around the buggy address: [ 18.599719] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.599764] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.599809] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.599851] ^ [ 18.599912] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.599955] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.600005] ================================================================== [ 18.699028] ================================================================== [ 18.699365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.699483] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.699543] [ 18.699575] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.699836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.699928] Hardware name: linux,dummy-virt (DT) [ 18.699964] Call trace: [ 18.700261] show_stack+0x20/0x38 (C) [ 18.700505] dump_stack_lvl+0x8c/0xd0 [ 18.700667] print_report+0x118/0x5d0 [ 18.700920] kasan_report+0xdc/0x128 [ 18.701222] kasan_check_range+0x100/0x1a8 [ 18.701303] __kasan_check_write+0x20/0x30 [ 18.701634] kasan_atomics_helper+0x15b4/0x4858 [ 18.701804] kasan_atomics+0x198/0x2e0 [ 18.701965] kunit_try_run_case+0x170/0x3f0 [ 18.702041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.702330] kthread+0x328/0x630 [ 18.702515] ret_from_fork+0x10/0x20 [ 18.702617] [ 18.702800] Allocated by task 266: [ 18.702937] kasan_save_stack+0x3c/0x68 [ 18.703103] kasan_save_track+0x20/0x40 [ 18.703253] kasan_save_alloc_info+0x40/0x58 [ 18.703340] __kasan_kmalloc+0xd4/0xd8 [ 18.703416] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.703680] kasan_atomics+0xb8/0x2e0 [ 18.704156] kunit_try_run_case+0x170/0x3f0 [ 18.704363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.704589] kthread+0x328/0x630 [ 18.704647] ret_from_fork+0x10/0x20 [ 18.704791] [ 18.704856] The buggy address belongs to the object at fff00000c58cd100 [ 18.704856] which belongs to the cache kmalloc-64 of size 64 [ 18.705056] The buggy address is located 0 bytes to the right of [ 18.705056] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.705160] [ 18.705236] The buggy address belongs to the physical page: [ 18.705270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.705327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.705378] page_type: f5(slab) [ 18.705860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.706117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.706224] page dumped because: kasan: bad access detected [ 18.706425] [ 18.706575] Memory state around the buggy address: [ 18.706818] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.706981] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.707359] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.707610] ^ [ 18.707843] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.707939] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.707990] ================================================================== [ 18.545438] ================================================================== [ 18.545511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.545562] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.545623] [ 18.545660] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.545750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.545779] Hardware name: linux,dummy-virt (DT) [ 18.545812] Call trace: [ 18.545842] show_stack+0x20/0x38 (C) [ 18.545896] dump_stack_lvl+0x8c/0xd0 [ 18.545951] print_report+0x118/0x5d0 [ 18.546025] kasan_report+0xdc/0x128 [ 18.546366] kasan_check_range+0x100/0x1a8 [ 18.546458] __kasan_check_write+0x20/0x30 [ 18.546558] kasan_atomics_helper+0xf88/0x4858 [ 18.546624] kasan_atomics+0x198/0x2e0 [ 18.546680] kunit_try_run_case+0x170/0x3f0 [ 18.546729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.546783] kthread+0x328/0x630 [ 18.546927] ret_from_fork+0x10/0x20 [ 18.546977] [ 18.546999] Allocated by task 266: [ 18.547133] kasan_save_stack+0x3c/0x68 [ 18.547187] kasan_save_track+0x20/0x40 [ 18.547341] kasan_save_alloc_info+0x40/0x58 [ 18.547385] __kasan_kmalloc+0xd4/0xd8 [ 18.547431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.547473] kasan_atomics+0xb8/0x2e0 [ 18.547520] kunit_try_run_case+0x170/0x3f0 [ 18.547717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.548140] kthread+0x328/0x630 [ 18.548573] ret_from_fork+0x10/0x20 [ 18.549953] [ 18.549985] The buggy address belongs to the object at fff00000c58cd100 [ 18.549985] which belongs to the cache kmalloc-64 of size 64 [ 18.550273] The buggy address is located 0 bytes to the right of [ 18.550273] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.550389] [ 18.550436] The buggy address belongs to the physical page: [ 18.550492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.550565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.550634] page_type: f5(slab) [ 18.550672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.550939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.551035] page dumped because: kasan: bad access detected [ 18.551095] [ 18.551164] Memory state around the buggy address: [ 18.551310] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.551469] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.551708] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.551757] ^ [ 18.551898] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.551988] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.552056] ================================================================== [ 18.770415] ================================================================== [ 18.770590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.770646] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.770697] [ 18.770730] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.770812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.770840] Hardware name: linux,dummy-virt (DT) [ 18.770873] Call trace: [ 18.770896] show_stack+0x20/0x38 (C) [ 18.770947] dump_stack_lvl+0x8c/0xd0 [ 18.770993] print_report+0x118/0x5d0 [ 18.771043] kasan_report+0xdc/0x128 [ 18.771091] __asan_report_load8_noabort+0x20/0x30 [ 18.771163] kasan_atomics_helper+0x3e20/0x4858 [ 18.771227] kasan_atomics+0x198/0x2e0 [ 18.771283] kunit_try_run_case+0x170/0x3f0 [ 18.771333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.771395] kthread+0x328/0x630 [ 18.771447] ret_from_fork+0x10/0x20 [ 18.771499] [ 18.771518] Allocated by task 266: [ 18.771546] kasan_save_stack+0x3c/0x68 [ 18.771589] kasan_save_track+0x20/0x40 [ 18.771636] kasan_save_alloc_info+0x40/0x58 [ 18.771689] __kasan_kmalloc+0xd4/0xd8 [ 18.771735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.771781] kasan_atomics+0xb8/0x2e0 [ 18.771821] kunit_try_run_case+0x170/0x3f0 [ 18.771859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.771905] kthread+0x328/0x630 [ 18.771938] ret_from_fork+0x10/0x20 [ 18.771977] [ 18.772003] The buggy address belongs to the object at fff00000c58cd100 [ 18.772003] which belongs to the cache kmalloc-64 of size 64 [ 18.772063] The buggy address is located 0 bytes to the right of [ 18.772063] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.772138] [ 18.772159] The buggy address belongs to the physical page: [ 18.772193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.772918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.772990] page_type: f5(slab) [ 18.773032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.773404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.773637] page dumped because: kasan: bad access detected [ 18.773929] [ 18.773955] Memory state around the buggy address: [ 18.773993] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.774379] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.774745] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.774810] ^ [ 18.774848] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.775116] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.775306] ================================================================== [ 18.519449] ================================================================== [ 18.519496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.519878] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.519946] [ 18.519995] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.520133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.520180] Hardware name: linux,dummy-virt (DT) [ 18.520316] Call trace: [ 18.520375] show_stack+0x20/0x38 (C) [ 18.520439] dump_stack_lvl+0x8c/0xd0 [ 18.520517] print_report+0x118/0x5d0 [ 18.520636] kasan_report+0xdc/0x128 [ 18.520712] __asan_report_load8_noabort+0x20/0x30 [ 18.520788] kasan_atomics_helper+0x3f58/0x4858 [ 18.520871] kasan_atomics+0x198/0x2e0 [ 18.520945] kunit_try_run_case+0x170/0x3f0 [ 18.521005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.521072] kthread+0x328/0x630 [ 18.521138] ret_from_fork+0x10/0x20 [ 18.521241] [ 18.521261] Allocated by task 266: [ 18.521292] kasan_save_stack+0x3c/0x68 [ 18.521343] kasan_save_track+0x20/0x40 [ 18.521384] kasan_save_alloc_info+0x40/0x58 [ 18.521425] __kasan_kmalloc+0xd4/0xd8 [ 18.521511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.521555] kasan_atomics+0xb8/0x2e0 [ 18.521696] kunit_try_run_case+0x170/0x3f0 [ 18.521767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.521842] kthread+0x328/0x630 [ 18.521937] ret_from_fork+0x10/0x20 [ 18.522006] [ 18.522119] The buggy address belongs to the object at fff00000c58cd100 [ 18.522119] which belongs to the cache kmalloc-64 of size 64 [ 18.522223] The buggy address is located 0 bytes to the right of [ 18.522223] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.522598] [ 18.522670] The buggy address belongs to the physical page: [ 18.522779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.522856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.522939] page_type: f5(slab) [ 18.522979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.523032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.523380] page dumped because: kasan: bad access detected [ 18.523437] [ 18.523508] Memory state around the buggy address: [ 18.523815] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.523916] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.524028] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.524118] ^ [ 18.524187] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.524298] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.524347] ================================================================== [ 18.455016] ================================================================== [ 18.455065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 18.455335] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.455408] [ 18.455441] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.455523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.455568] Hardware name: linux,dummy-virt (DT) [ 18.455616] Call trace: [ 18.455645] show_stack+0x20/0x38 (C) [ 18.455696] dump_stack_lvl+0x8c/0xd0 [ 18.455800] print_report+0x118/0x5d0 [ 18.455884] kasan_report+0xdc/0x128 [ 18.455940] kasan_check_range+0x100/0x1a8 [ 18.455989] __kasan_check_write+0x20/0x30 [ 18.456075] kasan_atomics_helper+0xa04/0x4858 [ 18.456123] kasan_atomics+0x198/0x2e0 [ 18.456182] kunit_try_run_case+0x170/0x3f0 [ 18.456437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.456665] kthread+0x328/0x630 [ 18.456731] ret_from_fork+0x10/0x20 [ 18.456860] [ 18.456912] Allocated by task 266: [ 18.456961] kasan_save_stack+0x3c/0x68 [ 18.457015] kasan_save_track+0x20/0x40 [ 18.457144] kasan_save_alloc_info+0x40/0x58 [ 18.457211] __kasan_kmalloc+0xd4/0xd8 [ 18.457329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.457378] kasan_atomics+0xb8/0x2e0 [ 18.457415] kunit_try_run_case+0x170/0x3f0 [ 18.457455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.457502] kthread+0x328/0x630 [ 18.457545] ret_from_fork+0x10/0x20 [ 18.457582] [ 18.457604] The buggy address belongs to the object at fff00000c58cd100 [ 18.457604] which belongs to the cache kmalloc-64 of size 64 [ 18.457667] The buggy address is located 0 bytes to the right of [ 18.457667] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.458075] [ 18.458113] The buggy address belongs to the physical page: [ 18.458230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.458355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.458430] page_type: f5(slab) [ 18.458503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.458626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.458703] page dumped because: kasan: bad access detected [ 18.458769] [ 18.458867] Memory state around the buggy address: [ 18.458916] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.458962] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.459008] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.459048] ^ [ 18.459092] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.459138] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.459186] ================================================================== [ 18.505620] ================================================================== [ 18.505865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.505974] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.506038] [ 18.506086] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.506171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.506226] Hardware name: linux,dummy-virt (DT) [ 18.506260] Call trace: [ 18.506290] show_stack+0x20/0x38 (C) [ 18.506341] dump_stack_lvl+0x8c/0xd0 [ 18.506409] print_report+0x118/0x5d0 [ 18.506456] kasan_report+0xdc/0x128 [ 18.506504] kasan_check_range+0x100/0x1a8 [ 18.506566] __kasan_check_write+0x20/0x30 [ 18.506613] kasan_atomics_helper+0xd3c/0x4858 [ 18.506783] kasan_atomics+0x198/0x2e0 [ 18.506830] kunit_try_run_case+0x170/0x3f0 [ 18.506878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.507076] kthread+0x328/0x630 [ 18.507152] ret_from_fork+0x10/0x20 [ 18.507220] [ 18.507272] Allocated by task 266: [ 18.507310] kasan_save_stack+0x3c/0x68 [ 18.507365] kasan_save_track+0x20/0x40 [ 18.507405] kasan_save_alloc_info+0x40/0x58 [ 18.507455] __kasan_kmalloc+0xd4/0xd8 [ 18.507557] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.507703] kasan_atomics+0xb8/0x2e0 [ 18.507789] kunit_try_run_case+0x170/0x3f0 [ 18.507854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.507909] kthread+0x328/0x630 [ 18.507964] ret_from_fork+0x10/0x20 [ 18.508004] [ 18.508036] The buggy address belongs to the object at fff00000c58cd100 [ 18.508036] which belongs to the cache kmalloc-64 of size 64 [ 18.508115] The buggy address is located 0 bytes to the right of [ 18.508115] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.508208] [ 18.508231] The buggy address belongs to the physical page: [ 18.508265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.508409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.508460] page_type: f5(slab) [ 18.508498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.508704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.508768] page dumped because: kasan: bad access detected [ 18.508821] [ 18.508861] Memory state around the buggy address: [ 18.508905] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.508958] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.509004] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.509054] ^ [ 18.509098] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.509145] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.509186] ================================================================== [ 18.686769] ================================================================== [ 18.686831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.687032] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.687094] [ 18.687275] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.687373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.688358] Hardware name: linux,dummy-virt (DT) [ 18.688416] Call trace: [ 18.689338] show_stack+0x20/0x38 (C) [ 18.689671] dump_stack_lvl+0x8c/0xd0 [ 18.689863] print_report+0x118/0x5d0 [ 18.690095] kasan_report+0xdc/0x128 [ 18.690154] kasan_check_range+0x100/0x1a8 [ 18.690386] __kasan_check_write+0x20/0x30 [ 18.690624] kasan_atomics_helper+0x154c/0x4858 [ 18.690717] kasan_atomics+0x198/0x2e0 [ 18.690793] kunit_try_run_case+0x170/0x3f0 [ 18.691157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.691342] kthread+0x328/0x630 [ 18.691410] ret_from_fork+0x10/0x20 [ 18.691723] [ 18.691809] Allocated by task 266: [ 18.692158] kasan_save_stack+0x3c/0x68 [ 18.692419] kasan_save_track+0x20/0x40 [ 18.692539] kasan_save_alloc_info+0x40/0x58 [ 18.692593] __kasan_kmalloc+0xd4/0xd8 [ 18.692796] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.692844] kasan_atomics+0xb8/0x2e0 [ 18.693037] kunit_try_run_case+0x170/0x3f0 [ 18.693398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.693490] kthread+0x328/0x630 [ 18.693659] ret_from_fork+0x10/0x20 [ 18.694014] [ 18.694108] The buggy address belongs to the object at fff00000c58cd100 [ 18.694108] which belongs to the cache kmalloc-64 of size 64 [ 18.694526] The buggy address is located 0 bytes to the right of [ 18.694526] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.694860] [ 18.695097] The buggy address belongs to the physical page: [ 18.695162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.695383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.695566] page_type: f5(slab) [ 18.695622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.695779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.695836] page dumped because: kasan: bad access detected [ 18.695880] [ 18.695909] Memory state around the buggy address: [ 18.695957] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.696015] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.696061] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.696112] ^ [ 18.696146] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.696250] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.696886] ================================================================== [ 18.729323] ================================================================== [ 18.729390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.729672] Read of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.729746] [ 18.729780] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.729873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.729901] Hardware name: linux,dummy-virt (DT) [ 18.730257] Call trace: [ 18.730298] show_stack+0x20/0x38 (C) [ 18.730608] dump_stack_lvl+0x8c/0xd0 [ 18.730680] print_report+0x118/0x5d0 [ 18.730881] kasan_report+0xdc/0x128 [ 18.731148] __asan_report_load8_noabort+0x20/0x30 [ 18.731236] kasan_atomics_helper+0x3df4/0x4858 [ 18.731289] kasan_atomics+0x198/0x2e0 [ 18.731335] kunit_try_run_case+0x170/0x3f0 [ 18.731694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.731960] kthread+0x328/0x630 [ 18.732029] ret_from_fork+0x10/0x20 [ 18.732083] [ 18.732110] Allocated by task 266: [ 18.732315] kasan_save_stack+0x3c/0x68 [ 18.732564] kasan_save_track+0x20/0x40 [ 18.732865] kasan_save_alloc_info+0x40/0x58 [ 18.733047] __kasan_kmalloc+0xd4/0xd8 [ 18.733138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.733320] kasan_atomics+0xb8/0x2e0 [ 18.733382] kunit_try_run_case+0x170/0x3f0 [ 18.733430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.733484] kthread+0x328/0x630 [ 18.734330] ret_from_fork+0x10/0x20 [ 18.734409] [ 18.734434] The buggy address belongs to the object at fff00000c58cd100 [ 18.734434] which belongs to the cache kmalloc-64 of size 64 [ 18.734689] The buggy address is located 0 bytes to the right of [ 18.734689] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.734977] [ 18.735022] The buggy address belongs to the physical page: [ 18.735282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.735492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.735752] page_type: f5(slab) [ 18.735800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.736001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.736061] page dumped because: kasan: bad access detected [ 18.736097] [ 18.736117] Memory state around the buggy address: [ 18.736181] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.736245] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.736306] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.736356] ^ [ 18.736410] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.736457] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.736507] ================================================================== [ 18.579976] ================================================================== [ 18.580402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.580485] Write of size 8 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.580638] [ 18.580691] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.580850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.580951] Hardware name: linux,dummy-virt (DT) [ 18.580984] Call trace: [ 18.581021] show_stack+0x20/0x38 (C) [ 18.581420] dump_stack_lvl+0x8c/0xd0 [ 18.581768] print_report+0x118/0x5d0 [ 18.581909] kasan_report+0xdc/0x128 [ 18.582005] kasan_check_range+0x100/0x1a8 [ 18.582142] __kasan_check_write+0x20/0x30 [ 18.582275] kasan_atomics_helper+0x1128/0x4858 [ 18.582402] kasan_atomics+0x198/0x2e0 [ 18.582462] kunit_try_run_case+0x170/0x3f0 [ 18.582685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.583538] kthread+0x328/0x630 [ 18.583752] ret_from_fork+0x10/0x20 [ 18.584314] [ 18.584610] Allocated by task 266: [ 18.584671] kasan_save_stack+0x3c/0x68 [ 18.584833] kasan_save_track+0x20/0x40 [ 18.584876] kasan_save_alloc_info+0x40/0x58 [ 18.584939] __kasan_kmalloc+0xd4/0xd8 [ 18.585337] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.585813] kasan_atomics+0xb8/0x2e0 [ 18.585897] kunit_try_run_case+0x170/0x3f0 [ 18.585979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.586090] kthread+0x328/0x630 [ 18.586128] ret_from_fork+0x10/0x20 [ 18.586353] [ 18.586608] The buggy address belongs to the object at fff00000c58cd100 [ 18.586608] which belongs to the cache kmalloc-64 of size 64 [ 18.586727] The buggy address is located 0 bytes to the right of [ 18.586727] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.586929] [ 18.586993] The buggy address belongs to the physical page: [ 18.587263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.587575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.587928] page_type: f5(slab) [ 18.588389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.588801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.588897] page dumped because: kasan: bad access detected [ 18.589111] [ 18.589342] Memory state around the buggy address: [ 18.589599] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.589739] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.589948] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.590011] ^ [ 18.590081] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.590355] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.590523] ================================================================== [ 18.500165] ================================================================== [ 18.500229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.500553] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.500613] [ 18.500845] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.500966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.501298] Hardware name: linux,dummy-virt (DT) [ 18.501362] Call trace: [ 18.501401] show_stack+0x20/0x38 (C) [ 18.501500] dump_stack_lvl+0x8c/0xd0 [ 18.501564] print_report+0x118/0x5d0 [ 18.501656] kasan_report+0xdc/0x128 [ 18.501756] __asan_report_load4_noabort+0x20/0x30 [ 18.501849] kasan_atomics_helper+0x3dd8/0x4858 [ 18.501923] kasan_atomics+0x198/0x2e0 [ 18.501970] kunit_try_run_case+0x170/0x3f0 [ 18.502033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.502102] kthread+0x328/0x630 [ 18.502144] ret_from_fork+0x10/0x20 [ 18.502194] [ 18.502232] Allocated by task 266: [ 18.502263] kasan_save_stack+0x3c/0x68 [ 18.502434] kasan_save_track+0x20/0x40 [ 18.502598] kasan_save_alloc_info+0x40/0x58 [ 18.502678] __kasan_kmalloc+0xd4/0xd8 [ 18.502733] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.503055] kasan_atomics+0xb8/0x2e0 [ 18.503112] kunit_try_run_case+0x170/0x3f0 [ 18.503228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.503336] kthread+0x328/0x630 [ 18.503390] ret_from_fork+0x10/0x20 [ 18.503459] [ 18.503522] The buggy address belongs to the object at fff00000c58cd100 [ 18.503522] which belongs to the cache kmalloc-64 of size 64 [ 18.503654] The buggy address is located 0 bytes to the right of [ 18.503654] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.503738] [ 18.503794] The buggy address belongs to the physical page: [ 18.503851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.503931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.504022] page_type: f5(slab) [ 18.504098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.504152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.504194] page dumped because: kasan: bad access detected [ 18.504238] [ 18.504257] Memory state around the buggy address: [ 18.504291] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.504335] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.504542] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.504608] ^ [ 18.504677] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.504742] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.504838] ================================================================== [ 18.460160] ================================================================== [ 18.460482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.460598] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.460661] [ 18.460733] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.460838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.460920] Hardware name: linux,dummy-virt (DT) [ 18.460992] Call trace: [ 18.461061] show_stack+0x20/0x38 (C) [ 18.461130] dump_stack_lvl+0x8c/0xd0 [ 18.461216] print_report+0x118/0x5d0 [ 18.461263] kasan_report+0xdc/0x128 [ 18.461423] kasan_check_range+0x100/0x1a8 [ 18.461474] __kasan_check_write+0x20/0x30 [ 18.461527] kasan_atomics_helper+0xa6c/0x4858 [ 18.461705] kasan_atomics+0x198/0x2e0 [ 18.461801] kunit_try_run_case+0x170/0x3f0 [ 18.461851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.461939] kthread+0x328/0x630 [ 18.462160] ret_from_fork+0x10/0x20 [ 18.462300] [ 18.462370] Allocated by task 266: [ 18.462450] kasan_save_stack+0x3c/0x68 [ 18.462516] kasan_save_track+0x20/0x40 [ 18.462571] kasan_save_alloc_info+0x40/0x58 [ 18.462638] __kasan_kmalloc+0xd4/0xd8 [ 18.462704] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.462804] kasan_atomics+0xb8/0x2e0 [ 18.462845] kunit_try_run_case+0x170/0x3f0 [ 18.462901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.462947] kthread+0x328/0x630 [ 18.462992] ret_from_fork+0x10/0x20 [ 18.463031] [ 18.463051] The buggy address belongs to the object at fff00000c58cd100 [ 18.463051] which belongs to the cache kmalloc-64 of size 64 [ 18.463113] The buggy address is located 0 bytes to the right of [ 18.463113] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.463182] [ 18.463214] The buggy address belongs to the physical page: [ 18.463248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.463314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.463362] page_type: f5(slab) [ 18.463431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.463493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.463538] page dumped because: kasan: bad access detected [ 18.463570] [ 18.463589] Memory state around the buggy address: [ 18.463622] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.463666] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.463723] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.463779] ^ [ 18.463823] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.463869] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.463925] ================================================================== [ 18.465371] ================================================================== [ 18.465427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 18.465613] Write of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.465791] [ 18.465848] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.465950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.465986] Hardware name: linux,dummy-virt (DT) [ 18.466018] Call trace: [ 18.466043] show_stack+0x20/0x38 (C) [ 18.466092] dump_stack_lvl+0x8c/0xd0 [ 18.466140] print_report+0x118/0x5d0 [ 18.466356] kasan_report+0xdc/0x128 [ 18.466433] kasan_check_range+0x100/0x1a8 [ 18.466492] __kasan_check_write+0x20/0x30 [ 18.466539] kasan_atomics_helper+0xad4/0x4858 [ 18.466596] kasan_atomics+0x198/0x2e0 [ 18.466642] kunit_try_run_case+0x170/0x3f0 [ 18.466688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.466742] kthread+0x328/0x630 [ 18.466783] ret_from_fork+0x10/0x20 [ 18.466952] [ 18.467012] Allocated by task 266: [ 18.467046] kasan_save_stack+0x3c/0x68 [ 18.467091] kasan_save_track+0x20/0x40 [ 18.467138] kasan_save_alloc_info+0x40/0x58 [ 18.467180] __kasan_kmalloc+0xd4/0xd8 [ 18.467234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.467280] kasan_atomics+0xb8/0x2e0 [ 18.467327] kunit_try_run_case+0x170/0x3f0 [ 18.467370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.467425] kthread+0x328/0x630 [ 18.467462] ret_from_fork+0x10/0x20 [ 18.467498] [ 18.467528] The buggy address belongs to the object at fff00000c58cd100 [ 18.467528] which belongs to the cache kmalloc-64 of size 64 [ 18.467862] The buggy address is located 0 bytes to the right of [ 18.467862] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.467979] [ 18.468003] The buggy address belongs to the physical page: [ 18.468042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.468105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.468195] page_type: f5(slab) [ 18.468281] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.468335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.468378] page dumped because: kasan: bad access detected [ 18.468521] [ 18.468541] Memory state around the buggy address: [ 18.468576] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.468793] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.468847] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.468934] ^ [ 18.469016] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.469084] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.469192] ================================================================== [ 18.469753] ================================================================== [ 18.469805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 18.469872] Read of size 4 at addr fff00000c58cd130 by task kunit_try_catch/266 [ 18.469924] [ 18.469954] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.470179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.470236] Hardware name: linux,dummy-virt (DT) [ 18.470299] Call trace: [ 18.470350] show_stack+0x20/0x38 (C) [ 18.470404] dump_stack_lvl+0x8c/0xd0 [ 18.470489] print_report+0x118/0x5d0 [ 18.470544] kasan_report+0xdc/0x128 [ 18.470599] __asan_report_load4_noabort+0x20/0x30 [ 18.470680] kasan_atomics_helper+0x3dcc/0x4858 [ 18.470735] kasan_atomics+0x198/0x2e0 [ 18.470783] kunit_try_run_case+0x170/0x3f0 [ 18.470832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.470968] kthread+0x328/0x630 [ 18.471013] ret_from_fork+0x10/0x20 [ 18.471156] [ 18.471293] Allocated by task 266: [ 18.471330] kasan_save_stack+0x3c/0x68 [ 18.471374] kasan_save_track+0x20/0x40 [ 18.471623] kasan_save_alloc_info+0x40/0x58 [ 18.471730] __kasan_kmalloc+0xd4/0xd8 [ 18.471774] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.471831] kasan_atomics+0xb8/0x2e0 [ 18.471877] kunit_try_run_case+0x170/0x3f0 [ 18.471924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.471969] kthread+0x328/0x630 [ 18.472008] ret_from_fork+0x10/0x20 [ 18.472108] [ 18.472145] The buggy address belongs to the object at fff00000c58cd100 [ 18.472145] which belongs to the cache kmalloc-64 of size 64 [ 18.472374] The buggy address is located 0 bytes to the right of [ 18.472374] allocated 48-byte region [fff00000c58cd100, fff00000c58cd130) [ 18.472471] [ 18.472494] The buggy address belongs to the physical page: [ 18.472526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cd [ 18.472582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.472710] page_type: f5(slab) [ 18.472840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.472966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.473040] page dumped because: kasan: bad access detected [ 18.473140] [ 18.473159] Memory state around the buggy address: [ 18.473412] fff00000c58cd000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.473585] fff00000c58cd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.473645] >fff00000c58cd100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.473712] ^ [ 18.473749] fff00000c58cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.473795] fff00000c58cd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.473836] ==================================================================
[ 19.418197] ================================================================== [ 19.418251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.418390] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.418449] [ 19.418481] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.418720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.418878] Hardware name: linux,dummy-virt (DT) [ 19.418915] Call trace: [ 19.418941] show_stack+0x20/0x38 (C) [ 19.419080] dump_stack_lvl+0x8c/0xd0 [ 19.419141] print_report+0x118/0x5d0 [ 19.419266] kasan_report+0xdc/0x128 [ 19.419318] kasan_check_range+0x100/0x1a8 [ 19.419447] __kasan_check_write+0x20/0x30 [ 19.419537] kasan_atomics_helper+0xff0/0x4858 [ 19.419680] kasan_atomics+0x198/0x2e0 [ 19.419778] kunit_try_run_case+0x170/0x3f0 [ 19.419852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.419907] kthread+0x328/0x630 [ 19.419948] ret_from_fork+0x10/0x20 [ 19.420199] [ 19.420226] Allocated by task 266: [ 19.420308] kasan_save_stack+0x3c/0x68 [ 19.420387] kasan_save_track+0x20/0x40 [ 19.420452] kasan_save_alloc_info+0x40/0x58 [ 19.420686] __kasan_kmalloc+0xd4/0xd8 [ 19.420897] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.421012] kasan_atomics+0xb8/0x2e0 [ 19.421127] kunit_try_run_case+0x170/0x3f0 [ 19.421193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.421260] kthread+0x328/0x630 [ 19.421296] ret_from_fork+0x10/0x20 [ 19.421334] [ 19.421356] The buggy address belongs to the object at fff00000c5aee400 [ 19.421356] which belongs to the cache kmalloc-64 of size 64 [ 19.421471] The buggy address is located 0 bytes to the right of [ 19.421471] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.421541] [ 19.421572] The buggy address belongs to the physical page: [ 19.421615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.421684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.421750] page_type: f5(slab) [ 19.421790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.421845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.421889] page dumped because: kasan: bad access detected [ 19.421933] [ 19.421954] Memory state around the buggy address: [ 19.422017] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.422064] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.422119] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.422160] ^ [ 19.422489] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.422803] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.422941] ================================================================== [ 19.460526] ================================================================== [ 19.460578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.460626] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.460679] [ 19.460709] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.460791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.460820] Hardware name: linux,dummy-virt (DT) [ 19.460853] Call trace: [ 19.460876] show_stack+0x20/0x38 (C) [ 19.460924] dump_stack_lvl+0x8c/0xd0 [ 19.460969] print_report+0x118/0x5d0 [ 19.461017] kasan_report+0xdc/0x128 [ 19.461062] kasan_check_range+0x100/0x1a8 [ 19.461111] __kasan_check_write+0x20/0x30 [ 19.461156] kasan_atomics_helper+0x1384/0x4858 [ 19.461489] kasan_atomics+0x198/0x2e0 [ 19.461589] kunit_try_run_case+0x170/0x3f0 [ 19.461655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.461710] kthread+0x328/0x630 [ 19.461754] ret_from_fork+0x10/0x20 [ 19.461838] [ 19.461923] Allocated by task 266: [ 19.461972] kasan_save_stack+0x3c/0x68 [ 19.462089] kasan_save_track+0x20/0x40 [ 19.462155] kasan_save_alloc_info+0x40/0x58 [ 19.462242] __kasan_kmalloc+0xd4/0xd8 [ 19.462342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.462428] kasan_atomics+0xb8/0x2e0 [ 19.462485] kunit_try_run_case+0x170/0x3f0 [ 19.462524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.462570] kthread+0x328/0x630 [ 19.462663] ret_from_fork+0x10/0x20 [ 19.462717] [ 19.462740] The buggy address belongs to the object at fff00000c5aee400 [ 19.462740] which belongs to the cache kmalloc-64 of size 64 [ 19.462801] The buggy address is located 0 bytes to the right of [ 19.462801] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.463015] [ 19.463037] The buggy address belongs to the physical page: [ 19.463212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.463286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.463341] page_type: f5(slab) [ 19.463487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.463587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.463710] page dumped because: kasan: bad access detected [ 19.464037] [ 19.464113] Memory state around the buggy address: [ 19.464289] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464428] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464477] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.464518] ^ [ 19.465221] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.465388] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.465477] ================================================================== [ 19.518457] ================================================================== [ 19.518517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.518821] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.519025] [ 19.519075] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.519207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.519285] Hardware name: linux,dummy-virt (DT) [ 19.519321] Call trace: [ 19.519347] show_stack+0x20/0x38 (C) [ 19.519417] dump_stack_lvl+0x8c/0xd0 [ 19.519562] print_report+0x118/0x5d0 [ 19.519639] kasan_report+0xdc/0x128 [ 19.519775] kasan_check_range+0x100/0x1a8 [ 19.519839] __kasan_check_write+0x20/0x30 [ 19.519951] kasan_atomics_helper+0x16d0/0x4858 [ 19.520009] kasan_atomics+0x198/0x2e0 [ 19.520158] kunit_try_run_case+0x170/0x3f0 [ 19.520230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.520355] kthread+0x328/0x630 [ 19.520435] ret_from_fork+0x10/0x20 [ 19.520568] [ 19.520619] Allocated by task 266: [ 19.520863] kasan_save_stack+0x3c/0x68 [ 19.520954] kasan_save_track+0x20/0x40 [ 19.521020] kasan_save_alloc_info+0x40/0x58 [ 19.521131] __kasan_kmalloc+0xd4/0xd8 [ 19.521219] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.521320] kasan_atomics+0xb8/0x2e0 [ 19.521390] kunit_try_run_case+0x170/0x3f0 [ 19.521488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.521561] kthread+0x328/0x630 [ 19.521609] ret_from_fork+0x10/0x20 [ 19.521776] [ 19.521800] The buggy address belongs to the object at fff00000c5aee400 [ 19.521800] which belongs to the cache kmalloc-64 of size 64 [ 19.521907] The buggy address is located 0 bytes to the right of [ 19.521907] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.522050] [ 19.522089] The buggy address belongs to the physical page: [ 19.522165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.522266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.522317] page_type: f5(slab) [ 19.522358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.522415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.522458] page dumped because: kasan: bad access detected [ 19.522493] [ 19.522514] Memory state around the buggy address: [ 19.522550] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.522618] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.522675] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.522733] ^ [ 19.522778] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.522836] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.522898] ================================================================== [ 19.412015] ================================================================== [ 19.412114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.412166] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.412233] [ 19.412265] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.412360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.412388] Hardware name: linux,dummy-virt (DT) [ 19.412534] Call trace: [ 19.412571] show_stack+0x20/0x38 (C) [ 19.412640] dump_stack_lvl+0x8c/0xd0 [ 19.412738] print_report+0x118/0x5d0 [ 19.412808] kasan_report+0xdc/0x128 [ 19.412862] kasan_check_range+0x100/0x1a8 [ 19.412961] __kasan_check_write+0x20/0x30 [ 19.413026] kasan_atomics_helper+0xf88/0x4858 [ 19.413092] kasan_atomics+0x198/0x2e0 [ 19.413303] kunit_try_run_case+0x170/0x3f0 [ 19.413835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413899] kthread+0x328/0x630 [ 19.413950] ret_from_fork+0x10/0x20 [ 19.414005] [ 19.414033] Allocated by task 266: [ 19.414062] kasan_save_stack+0x3c/0x68 [ 19.414106] kasan_save_track+0x20/0x40 [ 19.414145] kasan_save_alloc_info+0x40/0x58 [ 19.414196] __kasan_kmalloc+0xd4/0xd8 [ 19.414236] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.414277] kasan_atomics+0xb8/0x2e0 [ 19.414315] kunit_try_run_case+0x170/0x3f0 [ 19.414556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.414799] kthread+0x328/0x630 [ 19.414843] ret_from_fork+0x10/0x20 [ 19.414890] [ 19.415023] The buggy address belongs to the object at fff00000c5aee400 [ 19.415023] which belongs to the cache kmalloc-64 of size 64 [ 19.415105] The buggy address is located 0 bytes to the right of [ 19.415105] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.415294] [ 19.415423] The buggy address belongs to the physical page: [ 19.415507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.415655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.415733] page_type: f5(slab) [ 19.415994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.416081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.416195] page dumped because: kasan: bad access detected [ 19.416250] [ 19.416302] Memory state around the buggy address: [ 19.416463] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.416583] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.416725] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.416871] ^ [ 19.416968] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.417020] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.417105] ================================================================== [ 19.389624] ================================================================== [ 19.389706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.389773] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.389856] [ 19.389905] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.390014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.390053] Hardware name: linux,dummy-virt (DT) [ 19.390091] Call trace: [ 19.390220] show_stack+0x20/0x38 (C) [ 19.390284] dump_stack_lvl+0x8c/0xd0 [ 19.390340] print_report+0x118/0x5d0 [ 19.390473] kasan_report+0xdc/0x128 [ 19.390520] kasan_check_range+0x100/0x1a8 [ 19.390576] __kasan_check_write+0x20/0x30 [ 19.390631] kasan_atomics_helper+0xe44/0x4858 [ 19.390681] kasan_atomics+0x198/0x2e0 [ 19.390755] kunit_try_run_case+0x170/0x3f0 [ 19.390822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.390885] kthread+0x328/0x630 [ 19.390938] ret_from_fork+0x10/0x20 [ 19.390991] [ 19.391019] Allocated by task 266: [ 19.391067] kasan_save_stack+0x3c/0x68 [ 19.391110] kasan_save_track+0x20/0x40 [ 19.391150] kasan_save_alloc_info+0x40/0x58 [ 19.391216] __kasan_kmalloc+0xd4/0xd8 [ 19.391256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.391298] kasan_atomics+0xb8/0x2e0 [ 19.391336] kunit_try_run_case+0x170/0x3f0 [ 19.391500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.391622] kthread+0x328/0x630 [ 19.391695] ret_from_fork+0x10/0x20 [ 19.391744] [ 19.391779] The buggy address belongs to the object at fff00000c5aee400 [ 19.391779] which belongs to the cache kmalloc-64 of size 64 [ 19.391841] The buggy address is located 0 bytes to the right of [ 19.391841] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.391919] [ 19.391949] The buggy address belongs to the physical page: [ 19.392001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.392055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.392105] page_type: f5(slab) [ 19.392382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.392456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.392652] page dumped because: kasan: bad access detected [ 19.392706] [ 19.392824] Memory state around the buggy address: [ 19.392879] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.392951] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.393196] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.393310] ^ [ 19.393377] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.393522] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.393621] ================================================================== [ 19.482784] ================================================================== [ 19.482954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.483008] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.483061] [ 19.483136] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.483244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.483483] Hardware name: linux,dummy-virt (DT) [ 19.483539] Call trace: [ 19.483604] show_stack+0x20/0x38 (C) [ 19.483673] dump_stack_lvl+0x8c/0xd0 [ 19.483906] print_report+0x118/0x5d0 [ 19.484047] kasan_report+0xdc/0x128 [ 19.484123] kasan_check_range+0x100/0x1a8 [ 19.484210] __kasan_check_write+0x20/0x30 [ 19.484258] kasan_atomics_helper+0x14e4/0x4858 [ 19.484618] kasan_atomics+0x198/0x2e0 [ 19.484775] kunit_try_run_case+0x170/0x3f0 [ 19.484862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.485201] kthread+0x328/0x630 [ 19.485287] ret_from_fork+0x10/0x20 [ 19.485442] [ 19.485526] Allocated by task 266: [ 19.485588] kasan_save_stack+0x3c/0x68 [ 19.485742] kasan_save_track+0x20/0x40 [ 19.485824] kasan_save_alloc_info+0x40/0x58 [ 19.485892] __kasan_kmalloc+0xd4/0xd8 [ 19.485930] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.486221] kasan_atomics+0xb8/0x2e0 [ 19.486329] kunit_try_run_case+0x170/0x3f0 [ 19.486407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.486631] kthread+0x328/0x630 [ 19.486931] ret_from_fork+0x10/0x20 [ 19.487165] [ 19.487224] The buggy address belongs to the object at fff00000c5aee400 [ 19.487224] which belongs to the cache kmalloc-64 of size 64 [ 19.487488] The buggy address is located 0 bytes to the right of [ 19.487488] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.487758] [ 19.487800] The buggy address belongs to the physical page: [ 19.487834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.487890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.488117] page_type: f5(slab) [ 19.488335] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.488409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.488654] page dumped because: kasan: bad access detected [ 19.488849] [ 19.488934] Memory state around the buggy address: [ 19.488994] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.489041] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.489333] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.489440] ^ [ 19.489504] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.489714] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.489787] ================================================================== [ 19.506883] ================================================================== [ 19.506948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.506997] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.507051] [ 19.507081] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.507163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.507204] Hardware name: linux,dummy-virt (DT) [ 19.507238] Call trace: [ 19.507262] show_stack+0x20/0x38 (C) [ 19.507310] dump_stack_lvl+0x8c/0xd0 [ 19.507357] print_report+0x118/0x5d0 [ 19.507676] kasan_report+0xdc/0x128 [ 19.507883] kasan_check_range+0x100/0x1a8 [ 19.507940] __kasan_check_write+0x20/0x30 [ 19.507986] kasan_atomics_helper+0x1644/0x4858 [ 19.508349] kasan_atomics+0x198/0x2e0 [ 19.508433] kunit_try_run_case+0x170/0x3f0 [ 19.508725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.508814] kthread+0x328/0x630 [ 19.508989] ret_from_fork+0x10/0x20 [ 19.509074] [ 19.509124] Allocated by task 266: [ 19.509155] kasan_save_stack+0x3c/0x68 [ 19.509473] kasan_save_track+0x20/0x40 [ 19.509567] kasan_save_alloc_info+0x40/0x58 [ 19.509838] __kasan_kmalloc+0xd4/0xd8 [ 19.509915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.510061] kasan_atomics+0xb8/0x2e0 [ 19.510138] kunit_try_run_case+0x170/0x3f0 [ 19.510219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.510634] kthread+0x328/0x630 [ 19.510713] ret_from_fork+0x10/0x20 [ 19.510780] [ 19.510867] The buggy address belongs to the object at fff00000c5aee400 [ 19.510867] which belongs to the cache kmalloc-64 of size 64 [ 19.510932] The buggy address is located 0 bytes to the right of [ 19.510932] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.511034] [ 19.511264] The buggy address belongs to the physical page: [ 19.511935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.512033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.512214] page_type: f5(slab) [ 19.512384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.512456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.512504] page dumped because: kasan: bad access detected [ 19.512546] [ 19.512568] Memory state around the buggy address: [ 19.512603] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.512650] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.512785] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.512854] ^ [ 19.512985] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.513069] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.513353] ================================================================== [ 19.513783] ================================================================== [ 19.513836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.513885] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.513963] [ 19.514008] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.514237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.514284] Hardware name: linux,dummy-virt (DT) [ 19.514384] Call trace: [ 19.514410] show_stack+0x20/0x38 (C) [ 19.514463] dump_stack_lvl+0x8c/0xd0 [ 19.514517] print_report+0x118/0x5d0 [ 19.514596] kasan_report+0xdc/0x128 [ 19.514646] __asan_report_load8_noabort+0x20/0x30 [ 19.514709] kasan_atomics_helper+0x3df4/0x4858 [ 19.514779] kasan_atomics+0x198/0x2e0 [ 19.514827] kunit_try_run_case+0x170/0x3f0 [ 19.514876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.514931] kthread+0x328/0x630 [ 19.514972] ret_from_fork+0x10/0x20 [ 19.515031] [ 19.515059] Allocated by task 266: [ 19.515096] kasan_save_stack+0x3c/0x68 [ 19.515139] kasan_save_track+0x20/0x40 [ 19.515208] kasan_save_alloc_info+0x40/0x58 [ 19.515251] __kasan_kmalloc+0xd4/0xd8 [ 19.515289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.515330] kasan_atomics+0xb8/0x2e0 [ 19.515366] kunit_try_run_case+0x170/0x3f0 [ 19.515706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.515944] kthread+0x328/0x630 [ 19.516036] ret_from_fork+0x10/0x20 [ 19.516074] [ 19.516104] The buggy address belongs to the object at fff00000c5aee400 [ 19.516104] which belongs to the cache kmalloc-64 of size 64 [ 19.516167] The buggy address is located 0 bytes to the right of [ 19.516167] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.516323] [ 19.516394] The buggy address belongs to the physical page: [ 19.516526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.516601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.516667] page_type: f5(slab) [ 19.516885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.517027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.517124] page dumped because: kasan: bad access detected [ 19.517240] [ 19.517261] Memory state around the buggy address: [ 19.517296] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.517379] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.517447] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.517613] ^ [ 19.517775] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517831] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517899] ================================================================== [ 19.473402] ================================================================== [ 19.473481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.473537] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.473591] [ 19.473629] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.473713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.473875] Hardware name: linux,dummy-virt (DT) [ 19.473917] Call trace: [ 19.473944] show_stack+0x20/0x38 (C) [ 19.474106] dump_stack_lvl+0x8c/0xd0 [ 19.474153] print_report+0x118/0x5d0 [ 19.474332] kasan_report+0xdc/0x128 [ 19.474387] kasan_check_range+0x100/0x1a8 [ 19.474438] __kasan_check_write+0x20/0x30 [ 19.474492] kasan_atomics_helper+0x1414/0x4858 [ 19.474542] kasan_atomics+0x198/0x2e0 [ 19.474655] kunit_try_run_case+0x170/0x3f0 [ 19.474713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.474768] kthread+0x328/0x630 [ 19.474811] ret_from_fork+0x10/0x20 [ 19.474857] [ 19.474877] Allocated by task 266: [ 19.474907] kasan_save_stack+0x3c/0x68 [ 19.474948] kasan_save_track+0x20/0x40 [ 19.474993] kasan_save_alloc_info+0x40/0x58 [ 19.475034] __kasan_kmalloc+0xd4/0xd8 [ 19.475073] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.475118] kasan_atomics+0xb8/0x2e0 [ 19.475158] kunit_try_run_case+0x170/0x3f0 [ 19.475215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.475262] kthread+0x328/0x630 [ 19.475304] ret_from_fork+0x10/0x20 [ 19.475342] [ 19.475364] The buggy address belongs to the object at fff00000c5aee400 [ 19.475364] which belongs to the cache kmalloc-64 of size 64 [ 19.475425] The buggy address is located 0 bytes to the right of [ 19.475425] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.475493] [ 19.475514] The buggy address belongs to the physical page: [ 19.475548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.475608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.475658] page_type: f5(slab) [ 19.475698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.475752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.475821] page dumped because: kasan: bad access detected [ 19.475965] [ 19.475987] Memory state around the buggy address: [ 19.476020] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.476120] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.476262] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.476324] ^ [ 19.476358] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.476413] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.476455] ================================================================== [ 19.383554] ================================================================== [ 19.383833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.383896] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.383979] [ 19.384050] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.384162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.384228] Hardware name: linux,dummy-virt (DT) [ 19.384312] Call trace: [ 19.384343] show_stack+0x20/0x38 (C) [ 19.384392] dump_stack_lvl+0x8c/0xd0 [ 19.384442] print_report+0x118/0x5d0 [ 19.384490] kasan_report+0xdc/0x128 [ 19.384536] __asan_report_load8_noabort+0x20/0x30 [ 19.384932] kasan_atomics_helper+0x3f58/0x4858 [ 19.385043] kasan_atomics+0x198/0x2e0 [ 19.385140] kunit_try_run_case+0x170/0x3f0 [ 19.385337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.385470] kthread+0x328/0x630 [ 19.385588] ret_from_fork+0x10/0x20 [ 19.385712] [ 19.385748] Allocated by task 266: [ 19.385834] kasan_save_stack+0x3c/0x68 [ 19.385910] kasan_save_track+0x20/0x40 [ 19.385971] kasan_save_alloc_info+0x40/0x58 [ 19.386049] __kasan_kmalloc+0xd4/0xd8 [ 19.386116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.386188] kasan_atomics+0xb8/0x2e0 [ 19.386252] kunit_try_run_case+0x170/0x3f0 [ 19.386328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.386432] kthread+0x328/0x630 [ 19.386478] ret_from_fork+0x10/0x20 [ 19.386514] [ 19.387104] The buggy address belongs to the object at fff00000c5aee400 [ 19.387104] which belongs to the cache kmalloc-64 of size 64 [ 19.387220] The buggy address is located 0 bytes to the right of [ 19.387220] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.387422] [ 19.387648] The buggy address belongs to the physical page: [ 19.387785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.387887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.387969] page_type: f5(slab) [ 19.388010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.388064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.388107] page dumped because: kasan: bad access detected [ 19.388139] [ 19.388158] Memory state around the buggy address: [ 19.388203] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.388398] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.388476] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.388611] ^ [ 19.388648] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.388708] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.388798] ================================================================== [ 19.496407] ================================================================== [ 19.496459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.496699] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.496779] [ 19.496829] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.496916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.496945] Hardware name: linux,dummy-virt (DT) [ 19.497067] Call trace: [ 19.497103] show_stack+0x20/0x38 (C) [ 19.497154] dump_stack_lvl+0x8c/0xd0 [ 19.497406] print_report+0x118/0x5d0 [ 19.497474] kasan_report+0xdc/0x128 [ 19.497607] kasan_check_range+0x100/0x1a8 [ 19.497661] __kasan_check_write+0x20/0x30 [ 19.497726] kasan_atomics_helper+0x15b4/0x4858 [ 19.497785] kasan_atomics+0x198/0x2e0 [ 19.497830] kunit_try_run_case+0x170/0x3f0 [ 19.498046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.498138] kthread+0x328/0x630 [ 19.498245] ret_from_fork+0x10/0x20 [ 19.498385] [ 19.498424] Allocated by task 266: [ 19.498461] kasan_save_stack+0x3c/0x68 [ 19.498505] kasan_save_track+0x20/0x40 [ 19.498551] kasan_save_alloc_info+0x40/0x58 [ 19.498659] __kasan_kmalloc+0xd4/0xd8 [ 19.498714] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.498758] kasan_atomics+0xb8/0x2e0 [ 19.498794] kunit_try_run_case+0x170/0x3f0 [ 19.498833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.498880] kthread+0x328/0x630 [ 19.498913] ret_from_fork+0x10/0x20 [ 19.498951] [ 19.498972] The buggy address belongs to the object at fff00000c5aee400 [ 19.498972] which belongs to the cache kmalloc-64 of size 64 [ 19.499033] The buggy address is located 0 bytes to the right of [ 19.499033] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.499105] [ 19.499127] The buggy address belongs to the physical page: [ 19.499161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.499225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.499275] page_type: f5(slab) [ 19.499315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.499368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.499412] page dumped because: kasan: bad access detected [ 19.499446] [ 19.499467] Memory state around the buggy address: [ 19.499515] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499561] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499607] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.499648] ^ [ 19.499681] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499725] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499767] ================================================================== [ 19.400776] ================================================================== [ 19.400859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.400921] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.400973] [ 19.401083] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.401403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.401477] Hardware name: linux,dummy-virt (DT) [ 19.401512] Call trace: [ 19.401537] show_stack+0x20/0x38 (C) [ 19.401641] dump_stack_lvl+0x8c/0xd0 [ 19.401693] print_report+0x118/0x5d0 [ 19.401759] kasan_report+0xdc/0x128 [ 19.401863] kasan_check_range+0x100/0x1a8 [ 19.401917] __kasan_check_write+0x20/0x30 [ 19.401964] kasan_atomics_helper+0xeb8/0x4858 [ 19.402024] kasan_atomics+0x198/0x2e0 [ 19.402231] kunit_try_run_case+0x170/0x3f0 [ 19.402310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402373] kthread+0x328/0x630 [ 19.402552] ret_from_fork+0x10/0x20 [ 19.402627] [ 19.402656] Allocated by task 266: [ 19.402693] kasan_save_stack+0x3c/0x68 [ 19.402782] kasan_save_track+0x20/0x40 [ 19.402826] kasan_save_alloc_info+0x40/0x58 [ 19.402869] __kasan_kmalloc+0xd4/0xd8 [ 19.402922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.402971] kasan_atomics+0xb8/0x2e0 [ 19.403010] kunit_try_run_case+0x170/0x3f0 [ 19.403050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.403096] kthread+0x328/0x630 [ 19.403131] ret_from_fork+0x10/0x20 [ 19.403167] [ 19.403197] The buggy address belongs to the object at fff00000c5aee400 [ 19.403197] which belongs to the cache kmalloc-64 of size 64 [ 19.403260] The buggy address is located 0 bytes to the right of [ 19.403260] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.403338] [ 19.403360] The buggy address belongs to the physical page: [ 19.403729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.403810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.403953] page_type: f5(slab) [ 19.404021] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.404156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.404214] page dumped because: kasan: bad access detected [ 19.404250] [ 19.404293] Memory state around the buggy address: [ 19.404333] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.404380] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.404426] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.404468] ^ [ 19.404701] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404778] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404910] ================================================================== [ 19.536631] ================================================================== [ 19.536691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.536740] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.536793] [ 19.537024] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.537209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.537245] Hardware name: linux,dummy-virt (DT) [ 19.537279] Call trace: [ 19.537315] show_stack+0x20/0x38 (C) [ 19.537376] dump_stack_lvl+0x8c/0xd0 [ 19.537592] print_report+0x118/0x5d0 [ 19.537691] kasan_report+0xdc/0x128 [ 19.537814] __asan_report_load8_noabort+0x20/0x30 [ 19.537872] kasan_atomics_helper+0x3e20/0x4858 [ 19.538065] kasan_atomics+0x198/0x2e0 [ 19.538230] kunit_try_run_case+0x170/0x3f0 [ 19.538325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.538398] kthread+0x328/0x630 [ 19.538604] ret_from_fork+0x10/0x20 [ 19.538696] [ 19.538785] Allocated by task 266: [ 19.538824] kasan_save_stack+0x3c/0x68 [ 19.538878] kasan_save_track+0x20/0x40 [ 19.538923] kasan_save_alloc_info+0x40/0x58 [ 19.538974] __kasan_kmalloc+0xd4/0xd8 [ 19.539011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.539104] kasan_atomics+0xb8/0x2e0 [ 19.539150] kunit_try_run_case+0x170/0x3f0 [ 19.539202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.539424] kthread+0x328/0x630 [ 19.539620] ret_from_fork+0x10/0x20 [ 19.539700] [ 19.539803] The buggy address belongs to the object at fff00000c5aee400 [ 19.539803] which belongs to the cache kmalloc-64 of size 64 [ 19.539885] The buggy address is located 0 bytes to the right of [ 19.539885] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.540197] [ 19.540321] The buggy address belongs to the physical page: [ 19.540380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.540457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.540516] page_type: f5(slab) [ 19.540735] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.540908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.541004] page dumped because: kasan: bad access detected [ 19.541138] [ 19.541199] Memory state around the buggy address: [ 19.541282] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.541484] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.541620] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.541697] ^ [ 19.541859] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.541911] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.541952] ================================================================== [ 19.444884] ================================================================== [ 19.444937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.444986] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.445038] [ 19.445070] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.445153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.445194] Hardware name: linux,dummy-virt (DT) [ 19.445227] Call trace: [ 19.445252] show_stack+0x20/0x38 (C) [ 19.445301] dump_stack_lvl+0x8c/0xd0 [ 19.445349] print_report+0x118/0x5d0 [ 19.445395] kasan_report+0xdc/0x128 [ 19.445442] kasan_check_range+0x100/0x1a8 [ 19.445491] __kasan_check_write+0x20/0x30 [ 19.445537] kasan_atomics_helper+0x1190/0x4858 [ 19.445585] kasan_atomics+0x198/0x2e0 [ 19.445631] kunit_try_run_case+0x170/0x3f0 [ 19.445680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.445734] kthread+0x328/0x630 [ 19.445775] ret_from_fork+0x10/0x20 [ 19.445823] [ 19.445843] Allocated by task 266: [ 19.445871] kasan_save_stack+0x3c/0x68 [ 19.445913] kasan_save_track+0x20/0x40 [ 19.445951] kasan_save_alloc_info+0x40/0x58 [ 19.446004] __kasan_kmalloc+0xd4/0xd8 [ 19.446041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.446424] kasan_atomics+0xb8/0x2e0 [ 19.446464] kunit_try_run_case+0x170/0x3f0 [ 19.446505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.446550] kthread+0x328/0x630 [ 19.446584] ret_from_fork+0x10/0x20 [ 19.446621] [ 19.446645] The buggy address belongs to the object at fff00000c5aee400 [ 19.446645] which belongs to the cache kmalloc-64 of size 64 [ 19.446707] The buggy address is located 0 bytes to the right of [ 19.446707] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.446855] [ 19.446895] The buggy address belongs to the physical page: [ 19.446929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.446983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.447033] page_type: f5(slab) [ 19.447072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.447127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.447171] page dumped because: kasan: bad access detected [ 19.447216] [ 19.447237] Memory state around the buggy address: [ 19.447270] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.447317] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.447363] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.447476] ^ [ 19.447553] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.447739] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.447838] ================================================================== [ 19.430321] ================================================================== [ 19.430395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.430451] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.430659] [ 19.430819] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.430927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.430964] Hardware name: linux,dummy-virt (DT) [ 19.431013] Call trace: [ 19.431160] show_stack+0x20/0x38 (C) [ 19.431255] dump_stack_lvl+0x8c/0xd0 [ 19.431390] print_report+0x118/0x5d0 [ 19.431448] kasan_report+0xdc/0x128 [ 19.431503] kasan_check_range+0x100/0x1a8 [ 19.431630] __kasan_check_write+0x20/0x30 [ 19.431705] kasan_atomics_helper+0x10c0/0x4858 [ 19.431770] kasan_atomics+0x198/0x2e0 [ 19.431825] kunit_try_run_case+0x170/0x3f0 [ 19.432051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.432242] kthread+0x328/0x630 [ 19.432321] ret_from_fork+0x10/0x20 [ 19.432464] [ 19.432487] Allocated by task 266: [ 19.432518] kasan_save_stack+0x3c/0x68 [ 19.432561] kasan_save_track+0x20/0x40 [ 19.432602] kasan_save_alloc_info+0x40/0x58 [ 19.432933] __kasan_kmalloc+0xd4/0xd8 [ 19.433000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.433076] kasan_atomics+0xb8/0x2e0 [ 19.433334] kunit_try_run_case+0x170/0x3f0 [ 19.433385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.433518] kthread+0x328/0x630 [ 19.433580] ret_from_fork+0x10/0x20 [ 19.433796] [ 19.433837] The buggy address belongs to the object at fff00000c5aee400 [ 19.433837] which belongs to the cache kmalloc-64 of size 64 [ 19.433903] The buggy address is located 0 bytes to the right of [ 19.433903] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.434028] [ 19.434076] The buggy address belongs to the physical page: [ 19.434773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.434840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.434893] page_type: f5(slab) [ 19.434941] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.434997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.435050] page dumped because: kasan: bad access detected [ 19.435093] [ 19.435122] Memory state around the buggy address: [ 19.435157] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.435783] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.435993] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.436078] ^ [ 19.436123] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.436168] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.436219] ================================================================== [ 19.394125] ================================================================== [ 19.394272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.394325] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.394378] [ 19.394451] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.394551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.394588] Hardware name: linux,dummy-virt (DT) [ 19.394676] Call trace: [ 19.394700] show_stack+0x20/0x38 (C) [ 19.394757] dump_stack_lvl+0x8c/0xd0 [ 19.394812] print_report+0x118/0x5d0 [ 19.395027] kasan_report+0xdc/0x128 [ 19.395165] __asan_report_store8_noabort+0x20/0x30 [ 19.395235] kasan_atomics_helper+0x3e5c/0x4858 [ 19.395290] kasan_atomics+0x198/0x2e0 [ 19.395343] kunit_try_run_case+0x170/0x3f0 [ 19.395574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.395770] kthread+0x328/0x630 [ 19.395838] ret_from_fork+0x10/0x20 [ 19.395893] [ 19.395951] Allocated by task 266: [ 19.395993] kasan_save_stack+0x3c/0x68 [ 19.396039] kasan_save_track+0x20/0x40 [ 19.396175] kasan_save_alloc_info+0x40/0x58 [ 19.396239] __kasan_kmalloc+0xd4/0xd8 [ 19.396287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.396337] kasan_atomics+0xb8/0x2e0 [ 19.396877] kunit_try_run_case+0x170/0x3f0 [ 19.397094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.397239] kthread+0x328/0x630 [ 19.397325] ret_from_fork+0x10/0x20 [ 19.397528] [ 19.397568] The buggy address belongs to the object at fff00000c5aee400 [ 19.397568] which belongs to the cache kmalloc-64 of size 64 [ 19.397631] The buggy address is located 0 bytes to the right of [ 19.397631] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.397933] [ 19.398029] The buggy address belongs to the physical page: [ 19.398086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.398191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.398462] page_type: f5(slab) [ 19.398536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.398616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.398664] page dumped because: kasan: bad access detected [ 19.398698] [ 19.398901] Memory state around the buggy address: [ 19.398992] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.399058] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.399104] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.399167] ^ [ 19.399216] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.399279] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.399321] ================================================================== [ 19.280283] ================================================================== [ 19.281867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.281940] Read of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.282218] [ 19.282472] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.282568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.282937] Hardware name: linux,dummy-virt (DT) [ 19.283203] Call trace: [ 19.283237] show_stack+0x20/0x38 (C) [ 19.283291] dump_stack_lvl+0x8c/0xd0 [ 19.283555] print_report+0x118/0x5d0 [ 19.283660] kasan_report+0xdc/0x128 [ 19.284136] __asan_report_load4_noabort+0x20/0x30 [ 19.284231] kasan_atomics_helper+0x42d8/0x4858 [ 19.284282] kasan_atomics+0x198/0x2e0 [ 19.285076] __kasan_kmalloc+0xd4/0xd8 [ 19.285115] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.285157] kasan_atomics+0xb8/0x2e0 [ 19.285493] The buggy address is located 0 bytes to the right of [ 19.285493] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.285641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.285766] page_type: f5(slab) [ 19.285812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.285868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.286092] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.286187] ^ [ 19.286859] ================================================================== [ 19.453789] ================================================================== [ 19.453841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.453891] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.453967] [ 19.454003] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.454086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.454115] Hardware name: linux,dummy-virt (DT) [ 19.454149] Call trace: [ 19.454172] show_stack+0x20/0x38 (C) [ 19.454240] dump_stack_lvl+0x8c/0xd0 [ 19.454286] print_report+0x118/0x5d0 [ 19.454345] kasan_report+0xdc/0x128 [ 19.454391] kasan_check_range+0x100/0x1a8 [ 19.454440] __kasan_check_write+0x20/0x30 [ 19.454486] kasan_atomics_helper+0x126c/0x4858 [ 19.454535] kasan_atomics+0x198/0x2e0 [ 19.454582] kunit_try_run_case+0x170/0x3f0 [ 19.454628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.454691] kthread+0x328/0x630 [ 19.454743] ret_from_fork+0x10/0x20 [ 19.454791] [ 19.454820] Allocated by task 266: [ 19.454858] kasan_save_stack+0x3c/0x68 [ 19.454900] kasan_save_track+0x20/0x40 [ 19.454940] kasan_save_alloc_info+0x40/0x58 [ 19.454981] __kasan_kmalloc+0xd4/0xd8 [ 19.455020] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.455059] kasan_atomics+0xb8/0x2e0 [ 19.455098] kunit_try_run_case+0x170/0x3f0 [ 19.455136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.455191] kthread+0x328/0x630 [ 19.455225] ret_from_fork+0x10/0x20 [ 19.455263] [ 19.455285] The buggy address belongs to the object at fff00000c5aee400 [ 19.455285] which belongs to the cache kmalloc-64 of size 64 [ 19.455345] The buggy address is located 0 bytes to the right of [ 19.455345] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.455414] [ 19.455436] The buggy address belongs to the physical page: [ 19.455472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.455527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.455588] page_type: f5(slab) [ 19.455627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.455681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.455725] page dumped because: kasan: bad access detected [ 19.455759] [ 19.455780] Memory state around the buggy address: [ 19.455813] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.455859] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.455905] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.455947] ^ [ 19.455979] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.456069] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.456145] ================================================================== [ 19.476747] ================================================================== [ 19.476921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.477585] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.477646] [ 19.477772] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.478147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.478228] Hardware name: linux,dummy-virt (DT) [ 19.478264] Call trace: [ 19.478289] show_stack+0x20/0x38 (C) [ 19.478348] dump_stack_lvl+0x8c/0xd0 [ 19.478464] print_report+0x118/0x5d0 [ 19.478530] kasan_report+0xdc/0x128 [ 19.478602] kasan_check_range+0x100/0x1a8 [ 19.478658] __kasan_check_write+0x20/0x30 [ 19.478959] kasan_atomics_helper+0x147c/0x4858 [ 19.479032] kasan_atomics+0x198/0x2e0 [ 19.479077] kunit_try_run_case+0x170/0x3f0 [ 19.479366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.479459] kthread+0x328/0x630 [ 19.479532] ret_from_fork+0x10/0x20 [ 19.479680] [ 19.479714] Allocated by task 266: [ 19.479743] kasan_save_stack+0x3c/0x68 [ 19.479787] kasan_save_track+0x20/0x40 [ 19.479826] kasan_save_alloc_info+0x40/0x58 [ 19.479972] __kasan_kmalloc+0xd4/0xd8 [ 19.480067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.480218] kasan_atomics+0xb8/0x2e0 [ 19.480277] kunit_try_run_case+0x170/0x3f0 [ 19.480359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.480614] kthread+0x328/0x630 [ 19.480896] ret_from_fork+0x10/0x20 [ 19.481106] [ 19.481140] The buggy address belongs to the object at fff00000c5aee400 [ 19.481140] which belongs to the cache kmalloc-64 of size 64 [ 19.481231] The buggy address is located 0 bytes to the right of [ 19.481231] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.481318] [ 19.481340] The buggy address belongs to the physical page: [ 19.481374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.481437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.481496] page_type: f5(slab) [ 19.481537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.481591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.481636] page dumped because: kasan: bad access detected [ 19.481679] [ 19.481708] Memory state around the buggy address: [ 19.481747] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.481803] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.481858] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.481898] ^ [ 19.481940] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.482005] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.482076] ================================================================== [ 19.499852] ================================================================== [ 19.499894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.499939] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.499990] [ 19.500020] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.500102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.500139] Hardware name: linux,dummy-virt (DT) [ 19.500173] Call trace: [ 19.500815] show_stack+0x20/0x38 (C) [ 19.500874] dump_stack_lvl+0x8c/0xd0 [ 19.501023] print_report+0x118/0x5d0 [ 19.501459] kasan_report+0xdc/0x128 [ 19.501536] __asan_report_load8_noabort+0x20/0x30 [ 19.501784] kasan_atomics_helper+0x3db0/0x4858 [ 19.501978] kasan_atomics+0x198/0x2e0 [ 19.502068] kunit_try_run_case+0x170/0x3f0 [ 19.502148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.502319] kthread+0x328/0x630 [ 19.502395] ret_from_fork+0x10/0x20 [ 19.502651] [ 19.502680] Allocated by task 266: [ 19.502713] kasan_save_stack+0x3c/0x68 [ 19.502756] kasan_save_track+0x20/0x40 [ 19.502837] kasan_save_alloc_info+0x40/0x58 [ 19.502967] __kasan_kmalloc+0xd4/0xd8 [ 19.503059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.503133] kasan_atomics+0xb8/0x2e0 [ 19.503352] kunit_try_run_case+0x170/0x3f0 [ 19.503594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.503731] kthread+0x328/0x630 [ 19.503799] ret_from_fork+0x10/0x20 [ 19.503943] [ 19.504004] The buggy address belongs to the object at fff00000c5aee400 [ 19.504004] which belongs to the cache kmalloc-64 of size 64 [ 19.504084] The buggy address is located 0 bytes to the right of [ 19.504084] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.504325] [ 19.504390] The buggy address belongs to the physical page: [ 19.504482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.504603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.504677] page_type: f5(slab) [ 19.504753] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.505060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.505161] page dumped because: kasan: bad access detected [ 19.505234] [ 19.505334] Memory state around the buggy address: [ 19.505411] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.505485] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.505532] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.505841] ^ [ 19.506037] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506118] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506389] ================================================================== [ 19.523081] ================================================================== [ 19.523137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.523475] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.523790] [ 19.523919] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.524019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.524193] Hardware name: linux,dummy-virt (DT) [ 19.524260] Call trace: [ 19.524354] show_stack+0x20/0x38 (C) [ 19.524437] dump_stack_lvl+0x8c/0xd0 [ 19.524494] print_report+0x118/0x5d0 [ 19.524542] kasan_report+0xdc/0x128 [ 19.524590] __asan_report_load8_noabort+0x20/0x30 [ 19.524641] kasan_atomics_helper+0x3e10/0x4858 [ 19.524692] kasan_atomics+0x198/0x2e0 [ 19.524738] kunit_try_run_case+0x170/0x3f0 [ 19.524956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525081] kthread+0x328/0x630 [ 19.525405] ret_from_fork+0x10/0x20 [ 19.525511] [ 19.525632] Allocated by task 266: [ 19.525712] kasan_save_stack+0x3c/0x68 [ 19.525818] kasan_save_track+0x20/0x40 [ 19.525888] kasan_save_alloc_info+0x40/0x58 [ 19.525940] __kasan_kmalloc+0xd4/0xd8 [ 19.525986] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.526299] kasan_atomics+0xb8/0x2e0 [ 19.526398] kunit_try_run_case+0x170/0x3f0 [ 19.526484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.526558] kthread+0x328/0x630 [ 19.526767] ret_from_fork+0x10/0x20 [ 19.526895] [ 19.526935] The buggy address belongs to the object at fff00000c5aee400 [ 19.526935] which belongs to the cache kmalloc-64 of size 64 [ 19.527018] The buggy address is located 0 bytes to the right of [ 19.527018] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.527158] [ 19.527214] The buggy address belongs to the physical page: [ 19.527310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.527422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.527478] page_type: f5(slab) [ 19.527516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.527882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.528044] page dumped because: kasan: bad access detected [ 19.528102] [ 19.528189] Memory state around the buggy address: [ 19.528389] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.528559] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.528653] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.528703] ^ [ 19.528740] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.528946] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.529116] ================================================================== [ 19.448639] ================================================================== [ 19.448724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.448773] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.448825] [ 19.448854] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.449121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.449163] Hardware name: linux,dummy-virt (DT) [ 19.449351] Call trace: [ 19.449395] show_stack+0x20/0x38 (C) [ 19.449445] dump_stack_lvl+0x8c/0xd0 [ 19.449490] print_report+0x118/0x5d0 [ 19.449538] kasan_report+0xdc/0x128 [ 19.449584] kasan_check_range+0x100/0x1a8 [ 19.449634] __kasan_check_write+0x20/0x30 [ 19.449688] kasan_atomics_helper+0x11f8/0x4858 [ 19.449741] kasan_atomics+0x198/0x2e0 [ 19.449795] kunit_try_run_case+0x170/0x3f0 [ 19.449843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449897] kthread+0x328/0x630 [ 19.449949] ret_from_fork+0x10/0x20 [ 19.450010] [ 19.450030] Allocated by task 266: [ 19.450060] kasan_save_stack+0x3c/0x68 [ 19.450101] kasan_save_track+0x20/0x40 [ 19.450153] kasan_save_alloc_info+0x40/0x58 [ 19.450595] __kasan_kmalloc+0xd4/0xd8 [ 19.450726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.450774] kasan_atomics+0xb8/0x2e0 [ 19.450814] kunit_try_run_case+0x170/0x3f0 [ 19.450862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.450947] kthread+0x328/0x630 [ 19.450982] ret_from_fork+0x10/0x20 [ 19.451352] [ 19.452066] The buggy address belongs to the object at fff00000c5aee400 [ 19.452066] which belongs to the cache kmalloc-64 of size 64 [ 19.452140] The buggy address is located 0 bytes to the right of [ 19.452140] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.452220] [ 19.452242] The buggy address belongs to the physical page: [ 19.452276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.452331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.452380] page_type: f5(slab) [ 19.452420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.452474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.452518] page dumped because: kasan: bad access detected [ 19.452552] [ 19.452573] Memory state around the buggy address: [ 19.452608] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.452654] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.452701] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.452742] ^ [ 19.452775] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452821] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452860] ================================================================== [ 19.456560] ================================================================== [ 19.456615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.456712] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.456795] [ 19.456842] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.456929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.456986] Hardware name: linux,dummy-virt (DT) [ 19.457020] Call trace: [ 19.457135] show_stack+0x20/0x38 (C) [ 19.457199] dump_stack_lvl+0x8c/0xd0 [ 19.457245] print_report+0x118/0x5d0 [ 19.457293] kasan_report+0xdc/0x128 [ 19.457339] kasan_check_range+0x100/0x1a8 [ 19.457388] __kasan_check_write+0x20/0x30 [ 19.457433] kasan_atomics_helper+0x12d8/0x4858 [ 19.457483] kasan_atomics+0x198/0x2e0 [ 19.457529] kunit_try_run_case+0x170/0x3f0 [ 19.457576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.457631] kthread+0x328/0x630 [ 19.457674] ret_from_fork+0x10/0x20 [ 19.457720] [ 19.457740] Allocated by task 266: [ 19.457769] kasan_save_stack+0x3c/0x68 [ 19.457810] kasan_save_track+0x20/0x40 [ 19.457849] kasan_save_alloc_info+0x40/0x58 [ 19.457890] __kasan_kmalloc+0xd4/0xd8 [ 19.457944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.457992] kasan_atomics+0xb8/0x2e0 [ 19.458046] kunit_try_run_case+0x170/0x3f0 [ 19.458086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.458133] kthread+0x328/0x630 [ 19.458206] ret_from_fork+0x10/0x20 [ 19.458263] [ 19.458292] The buggy address belongs to the object at fff00000c5aee400 [ 19.458292] which belongs to the cache kmalloc-64 of size 64 [ 19.458444] The buggy address is located 0 bytes to the right of [ 19.458444] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.458513] [ 19.458578] The buggy address belongs to the physical page: [ 19.458614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.458841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.458922] page_type: f5(slab) [ 19.458980] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.459034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.459078] page dumped because: kasan: bad access detected [ 19.459112] [ 19.459148] Memory state around the buggy address: [ 19.459227] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.459292] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.459414] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.459541] ^ [ 19.459632] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459773] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459813] ================================================================== [ 19.306828] ================================================================== [ 19.306947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.307022] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.307085] [ 19.307124] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.307373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.307540] Hardware name: linux,dummy-virt (DT) [ 19.307644] Call trace: [ 19.307671] show_stack+0x20/0x38 (C) [ 19.307722] dump_stack_lvl+0x8c/0xd0 [ 19.308040] print_report+0x118/0x5d0 [ 19.308217] kasan_report+0xdc/0x128 [ 19.308294] kasan_check_range+0x100/0x1a8 [ 19.308427] __kasan_check_write+0x20/0x30 [ 19.308503] kasan_atomics_helper+0xa6c/0x4858 [ 19.308635] kasan_atomics+0x198/0x2e0 [ 19.308720] kunit_try_run_case+0x170/0x3f0 [ 19.308776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.309011] kthread+0x328/0x630 [ 19.309075] ret_from_fork+0x10/0x20 [ 19.309341] [ 19.309410] Allocated by task 266: [ 19.309467] kasan_save_stack+0x3c/0x68 [ 19.309615] kasan_save_track+0x20/0x40 [ 19.309673] kasan_save_alloc_info+0x40/0x58 [ 19.309750] __kasan_kmalloc+0xd4/0xd8 [ 19.310028] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.310214] kasan_atomics+0xb8/0x2e0 [ 19.310280] kunit_try_run_case+0x170/0x3f0 [ 19.310357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.310478] kthread+0x328/0x630 [ 19.310526] ret_from_fork+0x10/0x20 [ 19.310570] [ 19.310713] The buggy address belongs to the object at fff00000c5aee400 [ 19.310713] which belongs to the cache kmalloc-64 of size 64 [ 19.310798] The buggy address is located 0 bytes to the right of [ 19.310798] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.310882] [ 19.310905] The buggy address belongs to the physical page: [ 19.310944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.311009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.311058] page_type: f5(slab) [ 19.311114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.311257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.311639] page dumped because: kasan: bad access detected [ 19.311775] [ 19.311895] Memory state around the buggy address: [ 19.311961] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.312010] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.312069] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.312369] ^ [ 19.312436] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.312563] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.312640] ================================================================== [ 19.423450] ================================================================== [ 19.423503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.423554] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.423839] [ 19.423904] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.424075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.424143] Hardware name: linux,dummy-virt (DT) [ 19.424523] Call trace: [ 19.424571] show_stack+0x20/0x38 (C) [ 19.424662] dump_stack_lvl+0x8c/0xd0 [ 19.424868] print_report+0x118/0x5d0 [ 19.424919] kasan_report+0xdc/0x128 [ 19.424967] kasan_check_range+0x100/0x1a8 [ 19.425148] __kasan_check_write+0x20/0x30 [ 19.425219] kasan_atomics_helper+0x1058/0x4858 [ 19.425281] kasan_atomics+0x198/0x2e0 [ 19.425353] kunit_try_run_case+0x170/0x3f0 [ 19.425493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.425608] kthread+0x328/0x630 [ 19.425880] ret_from_fork+0x10/0x20 [ 19.425969] [ 19.426017] Allocated by task 266: [ 19.426140] kasan_save_stack+0x3c/0x68 [ 19.426226] kasan_save_track+0x20/0x40 [ 19.426367] kasan_save_alloc_info+0x40/0x58 [ 19.426492] __kasan_kmalloc+0xd4/0xd8 [ 19.426560] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.426768] kasan_atomics+0xb8/0x2e0 [ 19.426873] kunit_try_run_case+0x170/0x3f0 [ 19.427006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.427271] kthread+0x328/0x630 [ 19.427350] ret_from_fork+0x10/0x20 [ 19.427493] [ 19.427534] The buggy address belongs to the object at fff00000c5aee400 [ 19.427534] which belongs to the cache kmalloc-64 of size 64 [ 19.427681] The buggy address is located 0 bytes to the right of [ 19.427681] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.427771] [ 19.427795] The buggy address belongs to the physical page: [ 19.427833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.427888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.427940] page_type: f5(slab) [ 19.428196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.428338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.428412] page dumped because: kasan: bad access detected [ 19.428486] [ 19.428673] Memory state around the buggy address: [ 19.428858] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.428911] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.429111] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.429195] ^ [ 19.429235] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.429306] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.429436] ================================================================== [ 19.529610] ================================================================== [ 19.529663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.529805] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.531527] [ 19.531706] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.532128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.532228] Hardware name: linux,dummy-virt (DT) [ 19.532291] Call trace: [ 19.532330] show_stack+0x20/0x38 (C) [ 19.532495] dump_stack_lvl+0x8c/0xd0 [ 19.532590] print_report+0x118/0x5d0 [ 19.532872] kasan_report+0xdc/0x128 [ 19.532997] kasan_check_range+0x100/0x1a8 [ 19.533125] __kasan_check_write+0x20/0x30 [ 19.533216] kasan_atomics_helper+0x175c/0x4858 [ 19.533377] kasan_atomics+0x198/0x2e0 [ 19.533432] kunit_try_run_case+0x170/0x3f0 [ 19.533488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.533720] kthread+0x328/0x630 [ 19.533786] ret_from_fork+0x10/0x20 [ 19.533859] [ 19.533928] Allocated by task 266: [ 19.533976] kasan_save_stack+0x3c/0x68 [ 19.534052] kasan_save_track+0x20/0x40 [ 19.534093] kasan_save_alloc_info+0x40/0x58 [ 19.534135] __kasan_kmalloc+0xd4/0xd8 [ 19.534195] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.534236] kasan_atomics+0xb8/0x2e0 [ 19.534280] kunit_try_run_case+0x170/0x3f0 [ 19.534321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.534367] kthread+0x328/0x630 [ 19.534400] ret_from_fork+0x10/0x20 [ 19.534437] [ 19.534467] The buggy address belongs to the object at fff00000c5aee400 [ 19.534467] which belongs to the cache kmalloc-64 of size 64 [ 19.534530] The buggy address is located 0 bytes to the right of [ 19.534530] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.534600] [ 19.534661] The buggy address belongs to the physical page: [ 19.534702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.534758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.534808] page_type: f5(slab) [ 19.534856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.534918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.534964] page dumped because: kasan: bad access detected [ 19.535008] [ 19.535037] Memory state around the buggy address: [ 19.535081] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535127] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535266] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.535702] ^ [ 19.535884] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.535968] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536040] ================================================================== [ 19.294010] ================================================================== [ 19.294064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.294115] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.294169] [ 19.294453] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.294604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.294652] Hardware name: linux,dummy-virt (DT) [ 19.294871] Call trace: [ 19.294904] show_stack+0x20/0x38 (C) [ 19.294966] dump_stack_lvl+0x8c/0xd0 [ 19.295013] print_report+0x118/0x5d0 [ 19.295059] kasan_report+0xdc/0x128 [ 19.295374] kasan_check_range+0x100/0x1a8 [ 19.295593] __kasan_check_write+0x20/0x30 [ 19.295796] kasan_atomics_helper+0x99c/0x4858 [ 19.295909] kasan_atomics+0x198/0x2e0 [ 19.295986] kunit_try_run_case+0x170/0x3f0 [ 19.296133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.296220] kthread+0x328/0x630 [ 19.296563] ret_from_fork+0x10/0x20 [ 19.296752] [ 19.296777] Allocated by task 266: [ 19.297038] kasan_save_stack+0x3c/0x68 [ 19.297273] kasan_save_track+0x20/0x40 [ 19.297557] kasan_save_alloc_info+0x40/0x58 [ 19.297671] __kasan_kmalloc+0xd4/0xd8 [ 19.297732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.297862] kasan_atomics+0xb8/0x2e0 [ 19.297919] kunit_try_run_case+0x170/0x3f0 [ 19.297960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298056] kthread+0x328/0x630 [ 19.298093] ret_from_fork+0x10/0x20 [ 19.298141] [ 19.298211] The buggy address belongs to the object at fff00000c5aee400 [ 19.298211] which belongs to the cache kmalloc-64 of size 64 [ 19.298296] The buggy address is located 0 bytes to the right of [ 19.298296] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.298370] [ 19.298401] The buggy address belongs to the physical page: [ 19.298442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.298505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.298555] page_type: f5(slab) [ 19.298603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.298662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.298713] page dumped because: kasan: bad access detected [ 19.298757] [ 19.298779] Memory state around the buggy address: [ 19.298812] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.298858] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.298914] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.298956] ^ [ 19.299011] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.299080] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.299122] ================================================================== [ 19.466935] ================================================================== [ 19.466994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.467074] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.467133] [ 19.467209] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.467301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.467391] Hardware name: linux,dummy-virt (DT) [ 19.467509] Call trace: [ 19.467593] show_stack+0x20/0x38 (C) [ 19.467771] dump_stack_lvl+0x8c/0xd0 [ 19.467868] print_report+0x118/0x5d0 [ 19.467982] kasan_report+0xdc/0x128 [ 19.468132] __asan_report_load8_noabort+0x20/0x30 [ 19.468224] kasan_atomics_helper+0x3f04/0x4858 [ 19.468276] kasan_atomics+0x198/0x2e0 [ 19.468513] kunit_try_run_case+0x170/0x3f0 [ 19.468563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.468619] kthread+0x328/0x630 [ 19.468871] ret_from_fork+0x10/0x20 [ 19.469029] [ 19.469159] Allocated by task 266: [ 19.469253] kasan_save_stack+0x3c/0x68 [ 19.469317] kasan_save_track+0x20/0x40 [ 19.469531] kasan_save_alloc_info+0x40/0x58 [ 19.469738] __kasan_kmalloc+0xd4/0xd8 [ 19.469925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.469997] kasan_atomics+0xb8/0x2e0 [ 19.470091] kunit_try_run_case+0x170/0x3f0 [ 19.471705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.471767] kthread+0x328/0x630 [ 19.471828] ret_from_fork+0x10/0x20 [ 19.471866] [ 19.471897] The buggy address belongs to the object at fff00000c5aee400 [ 19.471897] which belongs to the cache kmalloc-64 of size 64 [ 19.471960] The buggy address is located 0 bytes to the right of [ 19.471960] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.472226] [ 19.472248] The buggy address belongs to the physical page: [ 19.472283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.472339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.472390] page_type: f5(slab) [ 19.472431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.472487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.472532] page dumped because: kasan: bad access detected [ 19.472566] [ 19.472586] Memory state around the buggy address: [ 19.472621] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.472667] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.472714] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.472756] ^ [ 19.472789] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.472834] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.472873] ================================================================== [ 19.313596] ================================================================== [ 19.313651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.313703] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.313757] [ 19.313846] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.313963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.314262] Hardware name: linux,dummy-virt (DT) [ 19.314440] Call trace: [ 19.314481] show_stack+0x20/0x38 (C) [ 19.314543] dump_stack_lvl+0x8c/0xd0 [ 19.314655] print_report+0x118/0x5d0 [ 19.314708] kasan_report+0xdc/0x128 [ 19.314771] kasan_check_range+0x100/0x1a8 [ 19.315545] kthread+0x328/0x630 [ 19.315777] kasan_save_stack+0x3c/0x68 [ 19.315828] kasan_save_track+0x20/0x40 [ 19.316282] kasan_save_alloc_info+0x40/0x58 [ 19.316386] __kasan_kmalloc+0xd4/0xd8 [ 19.316462] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.316591] kasan_atomics+0xb8/0x2e0 [ 19.316670] kunit_try_run_case+0x170/0x3f0 [ 19.316745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.316793] kthread+0x328/0x630 [ 19.317082] ret_from_fork+0x10/0x20 [ 19.317293] The buggy address is located 0 bytes to the right of [ 19.317293] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.317947] ^ [ 19.320251] Hardware name: linux,dummy-virt (DT) [ 19.321885] kasan_save_alloc_info+0x40/0x58 [ 19.323138] [ 19.323480] page_type: f5(slab) [ 19.324106] page dumped because: kasan: bad access detected [ 19.325307] ================================================================== [ 19.300530] ================================================================== [ 19.300590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 19.300961] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.301068] [ 19.301104] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.301201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.301324] Hardware name: linux,dummy-virt (DT) [ 19.301369] Call trace: [ 19.301393] show_stack+0x20/0x38 (C) [ 19.301514] dump_stack_lvl+0x8c/0xd0 [ 19.301566] print_report+0x118/0x5d0 [ 19.301630] kasan_report+0xdc/0x128 [ 19.301911] kasan_check_range+0x100/0x1a8 [ 19.301990] __kasan_check_write+0x20/0x30 [ 19.302046] kasan_atomics_helper+0xa04/0x4858 [ 19.302191] kasan_atomics+0x198/0x2e0 [ 19.302257] kunit_try_run_case+0x170/0x3f0 [ 19.302307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.302487] kthread+0x328/0x630 [ 19.302552] ret_from_fork+0x10/0x20 [ 19.302760] [ 19.302794] Allocated by task 266: [ 19.302856] kasan_save_stack+0x3c/0x68 [ 19.302921] kasan_save_track+0x20/0x40 [ 19.302964] kasan_save_alloc_info+0x40/0x58 [ 19.303155] __kasan_kmalloc+0xd4/0xd8 [ 19.303220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.303343] kasan_atomics+0xb8/0x2e0 [ 19.303392] kunit_try_run_case+0x170/0x3f0 [ 19.303446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.303557] kthread+0x328/0x630 [ 19.303625] ret_from_fork+0x10/0x20 [ 19.303745] [ 19.303835] The buggy address belongs to the object at fff00000c5aee400 [ 19.303835] which belongs to the cache kmalloc-64 of size 64 [ 19.304044] The buggy address is located 0 bytes to the right of [ 19.304044] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.304258] [ 19.304315] The buggy address belongs to the physical page: [ 19.304426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.304533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.304890] page_type: f5(slab) [ 19.304962] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.305118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.305454] page dumped because: kasan: bad access detected [ 19.305526] [ 19.305624] Memory state around the buggy address: [ 19.305715] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305790] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305908] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.305975] ^ [ 19.306045] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.306138] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.306219] ================================================================== [ 19.405687] ================================================================== [ 19.405751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.405803] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.405855] [ 19.405887] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.406228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.406395] Hardware name: linux,dummy-virt (DT) [ 19.406441] Call trace: [ 19.406465] show_stack+0x20/0x38 (C) [ 19.406692] dump_stack_lvl+0x8c/0xd0 [ 19.406756] print_report+0x118/0x5d0 [ 19.406915] kasan_report+0xdc/0x128 [ 19.406993] kasan_check_range+0x100/0x1a8 [ 19.407097] __kasan_check_write+0x20/0x30 [ 19.407162] kasan_atomics_helper+0xf20/0x4858 [ 19.407265] kasan_atomics+0x198/0x2e0 [ 19.407329] kunit_try_run_case+0x170/0x3f0 [ 19.407379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.407580] kthread+0x328/0x630 [ 19.407709] ret_from_fork+0x10/0x20 [ 19.407808] [ 19.408030] Allocated by task 266: [ 19.408273] kasan_save_stack+0x3c/0x68 [ 19.408410] kasan_save_track+0x20/0x40 [ 19.408464] kasan_save_alloc_info+0x40/0x58 [ 19.408524] __kasan_kmalloc+0xd4/0xd8 [ 19.408621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.408668] kasan_atomics+0xb8/0x2e0 [ 19.408708] kunit_try_run_case+0x170/0x3f0 [ 19.408749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.408896] kthread+0x328/0x630 [ 19.408938] ret_from_fork+0x10/0x20 [ 19.409111] [ 19.409159] The buggy address belongs to the object at fff00000c5aee400 [ 19.409159] which belongs to the cache kmalloc-64 of size 64 [ 19.409295] The buggy address is located 0 bytes to the right of [ 19.409295] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.409547] [ 19.409617] The buggy address belongs to the physical page: [ 19.409740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.409884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.409958] page_type: f5(slab) [ 19.410022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.410078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.410372] page dumped because: kasan: bad access detected [ 19.410514] [ 19.410598] Memory state around the buggy address: [ 19.410793] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.410952] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.411019] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.411114] ^ [ 19.411190] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.411243] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.411459] ================================================================== [ 19.359890] ================================================================== [ 19.359941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.359991] Read of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.360044] [ 19.360075] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.360158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.360202] Hardware name: linux,dummy-virt (DT) [ 19.360235] Call trace: [ 19.360258] show_stack+0x20/0x38 (C) [ 19.360305] dump_stack_lvl+0x8c/0xd0 [ 19.360355] print_report+0x118/0x5d0 [ 19.360402] kasan_report+0xdc/0x128 [ 19.360448] __asan_report_load4_noabort+0x20/0x30 [ 19.360501] kasan_atomics_helper+0x3dd8/0x4858 [ 19.360559] kasan_atomics+0x198/0x2e0 [ 19.360607] kunit_try_run_case+0x170/0x3f0 [ 19.360656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.360710] kthread+0x328/0x630 [ 19.360755] ret_from_fork+0x10/0x20 [ 19.360804] [ 19.360824] Allocated by task 266: [ 19.360854] kasan_save_stack+0x3c/0x68 [ 19.360896] kasan_save_track+0x20/0x40 [ 19.360935] kasan_save_alloc_info+0x40/0x58 [ 19.360977] __kasan_kmalloc+0xd4/0xd8 [ 19.361014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.361055] kasan_atomics+0xb8/0x2e0 [ 19.361093] kunit_try_run_case+0x170/0x3f0 [ 19.361133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.362283] kthread+0x328/0x630 [ 19.362338] ret_from_fork+0x10/0x20 [ 19.362379] [ 19.362402] The buggy address belongs to the object at fff00000c5aee400 [ 19.362402] which belongs to the cache kmalloc-64 of size 64 [ 19.362485] The buggy address is located 0 bytes to the right of [ 19.362485] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.362556] [ 19.362578] The buggy address belongs to the physical page: [ 19.365587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.365671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.365724] page_type: f5(slab) [ 19.365764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.365820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.365864] page dumped because: kasan: bad access detected [ 19.365899] [ 19.365919] Memory state around the buggy address: [ 19.365954] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.366010] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.366057] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.366098] ^ [ 19.366316] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.366404] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.367911] ================================================================== [ 19.490370] ================================================================== [ 19.490449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.490516] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.490570] [ 19.490784] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.490989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.491055] Hardware name: linux,dummy-virt (DT) [ 19.491090] Call trace: [ 19.491115] show_stack+0x20/0x38 (C) [ 19.491268] dump_stack_lvl+0x8c/0xd0 [ 19.491332] print_report+0x118/0x5d0 [ 19.491390] kasan_report+0xdc/0x128 [ 19.491477] kasan_check_range+0x100/0x1a8 [ 19.491535] __kasan_check_write+0x20/0x30 [ 19.491644] kasan_atomics_helper+0x154c/0x4858 [ 19.491722] kasan_atomics+0x198/0x2e0 [ 19.491782] kunit_try_run_case+0x170/0x3f0 [ 19.491848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.491904] kthread+0x328/0x630 [ 19.491946] ret_from_fork+0x10/0x20 [ 19.491995] [ 19.492032] Allocated by task 266: [ 19.492077] kasan_save_stack+0x3c/0x68 [ 19.492126] kasan_save_track+0x20/0x40 [ 19.492356] kasan_save_alloc_info+0x40/0x58 [ 19.492474] __kasan_kmalloc+0xd4/0xd8 [ 19.492523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.492698] kasan_atomics+0xb8/0x2e0 [ 19.492865] kunit_try_run_case+0x170/0x3f0 [ 19.493020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.493096] kthread+0x328/0x630 [ 19.493326] ret_from_fork+0x10/0x20 [ 19.493379] [ 19.493401] The buggy address belongs to the object at fff00000c5aee400 [ 19.493401] which belongs to the cache kmalloc-64 of size 64 [ 19.493555] The buggy address is located 0 bytes to the right of [ 19.493555] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.493664] [ 19.493828] The buggy address belongs to the physical page: [ 19.493997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.494228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.494336] page_type: f5(slab) [ 19.494483] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.494561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.494606] page dumped because: kasan: bad access detected [ 19.494641] [ 19.494669] Memory state around the buggy address: [ 19.495056] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.495128] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.495200] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.495460] ^ [ 19.495529] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.495699] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.495742] ================================================================== [ 19.369888] ================================================================== [ 19.369942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.370000] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.370055] [ 19.370089] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.370174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.373251] Hardware name: linux,dummy-virt (DT) [ 19.373286] Call trace: [ 19.373310] show_stack+0x20/0x38 (C) [ 19.373367] dump_stack_lvl+0x8c/0xd0 [ 19.373414] print_report+0x118/0x5d0 [ 19.373463] kasan_report+0xdc/0x128 [ 19.373509] kasan_check_range+0x100/0x1a8 [ 19.373558] __kasan_check_write+0x20/0x30 [ 19.373605] kasan_atomics_helper+0xd3c/0x4858 [ 19.373654] kasan_atomics+0x198/0x2e0 [ 19.373702] kunit_try_run_case+0x170/0x3f0 [ 19.373752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.373808] kthread+0x328/0x630 [ 19.373936] ret_from_fork+0x10/0x20 [ 19.374011] [ 19.374042] Allocated by task 266: [ 19.374097] kasan_save_stack+0x3c/0x68 [ 19.374142] kasan_save_track+0x20/0x40 [ 19.374195] kasan_save_alloc_info+0x40/0x58 [ 19.374241] __kasan_kmalloc+0xd4/0xd8 [ 19.374279] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.374321] kasan_atomics+0xb8/0x2e0 [ 19.374360] kunit_try_run_case+0x170/0x3f0 [ 19.374400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.374710] kthread+0x328/0x630 [ 19.374767] ret_from_fork+0x10/0x20 [ 19.374878] [ 19.374927] The buggy address belongs to the object at fff00000c5aee400 [ 19.374927] which belongs to the cache kmalloc-64 of size 64 [ 19.375009] The buggy address is located 0 bytes to the right of [ 19.375009] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.375078] [ 19.375100] The buggy address belongs to the physical page: [ 19.375135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.375279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.375384] page_type: f5(slab) [ 19.375425] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.375532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.375589] page dumped because: kasan: bad access detected [ 19.375654] [ 19.375714] Memory state around the buggy address: [ 19.375794] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.375841] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.375887] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.375937] ^ [ 19.375972] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.376018] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.376060] ================================================================== [ 19.379599] ================================================================== [ 19.379648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.379695] Read of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.379746] [ 19.379776] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.379858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.379887] Hardware name: linux,dummy-virt (DT) [ 19.379918] Call trace: [ 19.379942] show_stack+0x20/0x38 (C) [ 19.379989] dump_stack_lvl+0x8c/0xd0 [ 19.380037] print_report+0x118/0x5d0 [ 19.380084] kasan_report+0xdc/0x128 [ 19.380131] kasan_check_range+0x100/0x1a8 [ 19.380235] __kasan_check_read+0x20/0x30 [ 19.380290] kasan_atomics_helper+0xdd4/0x4858 [ 19.380345] kasan_atomics+0x198/0x2e0 [ 19.380397] kunit_try_run_case+0x170/0x3f0 [ 19.380452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.380524] kthread+0x328/0x630 [ 19.380584] ret_from_fork+0x10/0x20 [ 19.380715] [ 19.380736] Allocated by task 266: [ 19.380861] kasan_save_stack+0x3c/0x68 [ 19.380920] kasan_save_track+0x20/0x40 [ 19.380974] kasan_save_alloc_info+0x40/0x58 [ 19.381017] __kasan_kmalloc+0xd4/0xd8 [ 19.381055] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.381111] kasan_atomics+0xb8/0x2e0 [ 19.381200] kunit_try_run_case+0x170/0x3f0 [ 19.381247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.381300] kthread+0x328/0x630 [ 19.381345] ret_from_fork+0x10/0x20 [ 19.381385] [ 19.381418] The buggy address belongs to the object at fff00000c5aee400 [ 19.381418] which belongs to the cache kmalloc-64 of size 64 [ 19.381480] The buggy address is located 0 bytes to the right of [ 19.381480] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.381553] [ 19.381574] The buggy address belongs to the physical page: [ 19.381608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.381662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.381711] page_type: f5(slab) [ 19.381961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.382099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.382142] page dumped because: kasan: bad access detected [ 19.382215] [ 19.382249] Memory state around the buggy address: [ 19.382283] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.382328] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.382382] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.382423] ^ [ 19.383379] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.383430] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.383472] ================================================================== [ 19.376600] ================================================================== [ 19.376652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.376708] Read of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.376879] [ 19.376921] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.377029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.377060] Hardware name: linux,dummy-virt (DT) [ 19.377093] Call trace: [ 19.377116] show_stack+0x20/0x38 (C) [ 19.377171] dump_stack_lvl+0x8c/0xd0 [ 19.377236] print_report+0x118/0x5d0 [ 19.377284] kasan_report+0xdc/0x128 [ 19.377333] __asan_report_load4_noabort+0x20/0x30 [ 19.377402] kasan_atomics_helper+0x3e04/0x4858 [ 19.377458] kasan_atomics+0x198/0x2e0 [ 19.377506] kunit_try_run_case+0x170/0x3f0 [ 19.377555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.377610] kthread+0x328/0x630 [ 19.377654] ret_from_fork+0x10/0x20 [ 19.377703] [ 19.377722] Allocated by task 266: [ 19.377767] kasan_save_stack+0x3c/0x68 [ 19.377810] kasan_save_track+0x20/0x40 [ 19.377850] kasan_save_alloc_info+0x40/0x58 [ 19.377892] __kasan_kmalloc+0xd4/0xd8 [ 19.377930] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.377971] kasan_atomics+0xb8/0x2e0 [ 19.378015] kunit_try_run_case+0x170/0x3f0 [ 19.378055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.378101] kthread+0x328/0x630 [ 19.378134] ret_from_fork+0x10/0x20 [ 19.378173] [ 19.378203] The buggy address belongs to the object at fff00000c5aee400 [ 19.378203] which belongs to the cache kmalloc-64 of size 64 [ 19.378264] The buggy address is located 0 bytes to the right of [ 19.378264] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.378333] [ 19.378354] The buggy address belongs to the physical page: [ 19.378388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.378449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.378499] page_type: f5(slab) [ 19.378537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.378590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.378632] page dumped because: kasan: bad access detected [ 19.378684] [ 19.378704] Memory state around the buggy address: [ 19.378742] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.378795] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.379097] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.379157] ^ [ 19.379227] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379273] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379317] ================================================================== [ 19.438038] ================================================================== [ 19.438199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.438258] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.438318] [ 19.438566] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.438907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.438958] Hardware name: linux,dummy-virt (DT) [ 19.439001] Call trace: [ 19.439026] show_stack+0x20/0x38 (C) [ 19.439078] dump_stack_lvl+0x8c/0xd0 [ 19.439124] print_report+0x118/0x5d0 [ 19.439279] kasan_report+0xdc/0x128 [ 19.439331] kasan_check_range+0x100/0x1a8 [ 19.439409] __kasan_check_write+0x20/0x30 [ 19.439573] kasan_atomics_helper+0x1128/0x4858 [ 19.439717] kasan_atomics+0x198/0x2e0 [ 19.439768] kunit_try_run_case+0x170/0x3f0 [ 19.439817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.439872] kthread+0x328/0x630 [ 19.439914] ret_from_fork+0x10/0x20 [ 19.440299] [ 19.440343] Allocated by task 266: [ 19.440423] kasan_save_stack+0x3c/0x68 [ 19.440744] kasan_save_track+0x20/0x40 [ 19.440836] kasan_save_alloc_info+0x40/0x58 [ 19.440993] __kasan_kmalloc+0xd4/0xd8 [ 19.441061] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.441103] kasan_atomics+0xb8/0x2e0 [ 19.441148] kunit_try_run_case+0x170/0x3f0 [ 19.441490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.441650] kthread+0x328/0x630 [ 19.441874] ret_from_fork+0x10/0x20 [ 19.441950] [ 19.441972] The buggy address belongs to the object at fff00000c5aee400 [ 19.441972] which belongs to the cache kmalloc-64 of size 64 [ 19.442195] The buggy address is located 0 bytes to the right of [ 19.442195] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.442309] [ 19.442566] The buggy address belongs to the physical page: [ 19.442635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.442720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.443200] page_type: f5(slab) [ 19.443252] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.443315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.443360] page dumped because: kasan: bad access detected [ 19.444027] [ 19.444062] Memory state around the buggy address: [ 19.444098] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444146] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444203] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.444246] ^ [ 19.444282] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444325] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444366] ================================================================== [ 19.543221] ================================================================== [ 19.543295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.543661] Write of size 8 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.543820] [ 19.543889] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.544059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.544173] Hardware name: linux,dummy-virt (DT) [ 19.544217] Call trace: [ 19.544241] show_stack+0x20/0x38 (C) [ 19.544293] dump_stack_lvl+0x8c/0xd0 [ 19.544678] print_report+0x118/0x5d0 [ 19.544764] kasan_report+0xdc/0x128 [ 19.544976] kasan_check_range+0x100/0x1a8 [ 19.545172] __kasan_check_write+0x20/0x30 [ 19.545556] kasan_atomics_helper+0x17ec/0x4858 [ 19.545879] kasan_atomics+0x198/0x2e0 [ 19.545969] kunit_try_run_case+0x170/0x3f0 [ 19.546140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.546328] kthread+0x328/0x630 [ 19.546378] ret_from_fork+0x10/0x20 [ 19.546458] [ 19.546504] Allocated by task 266: [ 19.546807] kasan_save_stack+0x3c/0x68 [ 19.546879] kasan_save_track+0x20/0x40 [ 19.547082] kasan_save_alloc_info+0x40/0x58 [ 19.547216] __kasan_kmalloc+0xd4/0xd8 [ 19.547386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.547493] kasan_atomics+0xb8/0x2e0 [ 19.547571] kunit_try_run_case+0x170/0x3f0 [ 19.547630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.547963] kthread+0x328/0x630 [ 19.548048] ret_from_fork+0x10/0x20 [ 19.548253] [ 19.548279] The buggy address belongs to the object at fff00000c5aee400 [ 19.548279] which belongs to the cache kmalloc-64 of size 64 [ 19.548353] The buggy address is located 0 bytes to the right of [ 19.548353] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.548422] [ 19.548445] The buggy address belongs to the physical page: [ 19.548488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.548544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.548608] page_type: f5(slab) [ 19.548654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.548709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.548754] page dumped because: kasan: bad access detected [ 19.548799] [ 19.548839] Memory state around the buggy address: [ 19.548873] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.548933] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.548995] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.549036] ^ [ 19.549071] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549117] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549156] ================================================================== [ 19.352353] ================================================================== [ 19.352427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.352490] Write of size 4 at addr fff00000c5aee430 by task kunit_try_catch/266 [ 19.352617] [ 19.352650] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.352741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.352770] Hardware name: linux,dummy-virt (DT) [ 19.352803] Call trace: [ 19.352992] show_stack+0x20/0x38 (C) [ 19.353057] dump_stack_lvl+0x8c/0xd0 [ 19.353104] print_report+0x118/0x5d0 [ 19.353159] kasan_report+0xdc/0x128 [ 19.353218] kasan_check_range+0x100/0x1a8 [ 19.353269] __kasan_check_write+0x20/0x30 [ 19.353763] kasan_atomics_helper+0xca0/0x4858 [ 19.353839] kasan_atomics+0x198/0x2e0 [ 19.354152] kunit_try_run_case+0x170/0x3f0 [ 19.354498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.355334] kasan_save_stack+0x3c/0x68 [ 19.355411] kasan_save_track+0x20/0x40 [ 19.355563] kasan_save_alloc_info+0x40/0x58 [ 19.355638] __kasan_kmalloc+0xd4/0xd8 [ 19.356171] kunit_try_run_case+0x170/0x3f0 [ 19.356247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.356302] kthread+0x328/0x630 [ 19.356336] ret_from_fork+0x10/0x20 [ 19.356517] [ 19.356545] The buggy address belongs to the object at fff00000c5aee400 [ 19.356545] which belongs to the cache kmalloc-64 of size 64 [ 19.356610] The buggy address is located 0 bytes to the right of [ 19.356610] allocated 48-byte region [fff00000c5aee400, fff00000c5aee430) [ 19.356856] [ 19.356903] The buggy address belongs to the physical page: [ 19.357030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aee [ 19.357115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.357445] page_type: f5(slab) [ 19.357537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.357679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.357757] page dumped because: kasan: bad access detected [ 19.357808] [ 19.357829] Memory state around the buggy address: [ 19.357864] fff00000c5aee300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.359267] fff00000c5aee380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.359335] >fff00000c5aee400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.359379] ^ [ 19.359425] fff00000c5aee480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.359471] fff00000c5aee500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.359513] ==================================================================
[ 16.178229] ================================================================== [ 16.179150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.180163] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.181037] [ 16.181384] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.181604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.181624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.181650] Call Trace: [ 16.181714] <TASK> [ 16.181735] dump_stack_lvl+0x73/0xb0 [ 16.181770] print_report+0xd1/0x610 [ 16.181796] ? __virt_addr_valid+0x1db/0x2d0 [ 16.181823] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.181847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.181872] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.181896] kasan_report+0x141/0x180 [ 16.181919] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.181947] kasan_check_range+0x10c/0x1c0 [ 16.181971] __kasan_check_write+0x18/0x20 [ 16.181993] kasan_atomics_helper+0x1ce1/0x5450 [ 16.182017] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.182041] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.182074] kasan_atomics+0x1dc/0x310 [ 16.182098] ? __pfx_kasan_atomics+0x10/0x10 [ 16.182124] ? __pfx_read_tsc+0x10/0x10 [ 16.182147] ? ktime_get_ts64+0x86/0x230 [ 16.182173] kunit_try_run_case+0x1a5/0x480 [ 16.182200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.182225] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.182253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.182279] ? __kthread_parkme+0x82/0x180 [ 16.182301] ? preempt_count_sub+0x50/0x80 [ 16.182328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.182355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.182381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.182432] kthread+0x337/0x6f0 [ 16.182462] ? trace_preempt_on+0x20/0xc0 [ 16.182487] ? __pfx_kthread+0x10/0x10 [ 16.182509] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.182533] ? calculate_sigpending+0x7b/0xa0 [ 16.182559] ? __pfx_kthread+0x10/0x10 [ 16.182582] ret_from_fork+0x116/0x1d0 [ 16.182602] ? __pfx_kthread+0x10/0x10 [ 16.182625] ret_from_fork_asm+0x1a/0x30 [ 16.182658] </TASK> [ 16.182669] [ 16.197745] Allocated by task 283: [ 16.198196] kasan_save_stack+0x45/0x70 [ 16.198813] kasan_save_track+0x18/0x40 [ 16.199323] kasan_save_alloc_info+0x3b/0x50 [ 16.199938] __kasan_kmalloc+0xb7/0xc0 [ 16.200509] __kmalloc_cache_noprof+0x189/0x420 [ 16.201069] kasan_atomics+0x95/0x310 [ 16.201559] kunit_try_run_case+0x1a5/0x480 [ 16.201717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.201891] kthread+0x337/0x6f0 [ 16.202011] ret_from_fork+0x116/0x1d0 [ 16.202142] ret_from_fork_asm+0x1a/0x30 [ 16.202280] [ 16.202355] The buggy address belongs to the object at ffff8881026d6200 [ 16.202355] which belongs to the cache kmalloc-64 of size 64 [ 16.204004] The buggy address is located 0 bytes to the right of [ 16.204004] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.204867] [ 16.205191] The buggy address belongs to the physical page: [ 16.205948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.206204] flags: 0x200000000000000(node=0|zone=2) [ 16.206373] page_type: f5(slab) [ 16.206935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.207789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.208483] page dumped because: kasan: bad access detected [ 16.208900] [ 16.208974] Memory state around the buggy address: [ 16.209133] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.209350] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.209930] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.210628] ^ [ 16.211151] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.211817] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.212444] ================================================================== [ 16.428508] ================================================================== [ 16.429020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.429582] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.429921] [ 16.430036] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.430084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.430097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.430120] Call Trace: [ 16.430139] <TASK> [ 16.430157] dump_stack_lvl+0x73/0xb0 [ 16.430189] print_report+0xd1/0x610 [ 16.430214] ? __virt_addr_valid+0x1db/0x2d0 [ 16.430432] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.430471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.430497] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.430522] kasan_report+0x141/0x180 [ 16.430546] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.430575] __asan_report_load8_noabort+0x18/0x20 [ 16.430603] kasan_atomics_helper+0x4fa5/0x5450 [ 16.430628] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.430653] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.430686] kasan_atomics+0x1dc/0x310 [ 16.430711] ? __pfx_kasan_atomics+0x10/0x10 [ 16.430738] ? __pfx_read_tsc+0x10/0x10 [ 16.430761] ? ktime_get_ts64+0x86/0x230 [ 16.430787] kunit_try_run_case+0x1a5/0x480 [ 16.430815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.430840] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.430867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.430892] ? __kthread_parkme+0x82/0x180 [ 16.430914] ? preempt_count_sub+0x50/0x80 [ 16.430940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.430965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.430992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.431020] kthread+0x337/0x6f0 [ 16.431042] ? trace_preempt_on+0x20/0xc0 [ 16.431067] ? __pfx_kthread+0x10/0x10 [ 16.431089] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.431112] ? calculate_sigpending+0x7b/0xa0 [ 16.431138] ? __pfx_kthread+0x10/0x10 [ 16.431161] ret_from_fork+0x116/0x1d0 [ 16.431181] ? __pfx_kthread+0x10/0x10 [ 16.431203] ret_from_fork_asm+0x1a/0x30 [ 16.431236] </TASK> [ 16.431248] [ 16.440273] Allocated by task 283: [ 16.440446] kasan_save_stack+0x45/0x70 [ 16.441014] kasan_save_track+0x18/0x40 [ 16.441198] kasan_save_alloc_info+0x3b/0x50 [ 16.441487] __kasan_kmalloc+0xb7/0xc0 [ 16.441663] __kmalloc_cache_noprof+0x189/0x420 [ 16.441962] kasan_atomics+0x95/0x310 [ 16.442213] kunit_try_run_case+0x1a5/0x480 [ 16.442403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.442782] kthread+0x337/0x6f0 [ 16.442922] ret_from_fork+0x116/0x1d0 [ 16.443175] ret_from_fork_asm+0x1a/0x30 [ 16.443336] [ 16.443549] The buggy address belongs to the object at ffff8881026d6200 [ 16.443549] which belongs to the cache kmalloc-64 of size 64 [ 16.444139] The buggy address is located 0 bytes to the right of [ 16.444139] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.444890] [ 16.444987] The buggy address belongs to the physical page: [ 16.445199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.445752] flags: 0x200000000000000(node=0|zone=2) [ 16.445974] page_type: f5(slab) [ 16.446098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.446597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.447034] page dumped because: kasan: bad access detected [ 16.447260] [ 16.447350] Memory state around the buggy address: [ 16.447779] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.448107] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.448517] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.448786] ^ [ 16.449107] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.449500] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.449848] ================================================================== [ 15.234848] ================================================================== [ 15.235142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.235371] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.236046] [ 15.236145] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.236194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.236207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.236230] Call Trace: [ 15.236573] <TASK> [ 15.236597] dump_stack_lvl+0x73/0xb0 [ 15.236629] print_report+0xd1/0x610 [ 15.236654] ? __virt_addr_valid+0x1db/0x2d0 [ 15.236678] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.236717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.236742] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.236766] kasan_report+0x141/0x180 [ 15.236789] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.236818] __asan_report_store4_noabort+0x1b/0x30 [ 15.236845] kasan_atomics_helper+0x4b3a/0x5450 [ 15.236871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.236896] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.236930] kasan_atomics+0x1dc/0x310 [ 15.236954] ? __pfx_kasan_atomics+0x10/0x10 [ 15.236981] ? __pfx_read_tsc+0x10/0x10 [ 15.237003] ? ktime_get_ts64+0x86/0x230 [ 15.237029] kunit_try_run_case+0x1a5/0x480 [ 15.237056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.237082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.237109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.237135] ? __kthread_parkme+0x82/0x180 [ 15.237160] ? preempt_count_sub+0x50/0x80 [ 15.237186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.237213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.237240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.237267] kthread+0x337/0x6f0 [ 15.237288] ? trace_preempt_on+0x20/0xc0 [ 15.237313] ? __pfx_kthread+0x10/0x10 [ 15.237335] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.237358] ? calculate_sigpending+0x7b/0xa0 [ 15.237385] ? __pfx_kthread+0x10/0x10 [ 15.237408] ret_from_fork+0x116/0x1d0 [ 15.237460] ? __pfx_kthread+0x10/0x10 [ 15.237483] ret_from_fork_asm+0x1a/0x30 [ 15.237515] </TASK> [ 15.237526] [ 15.245576] Allocated by task 283: [ 15.245912] kasan_save_stack+0x45/0x70 [ 15.246199] kasan_save_track+0x18/0x40 [ 15.246394] kasan_save_alloc_info+0x3b/0x50 [ 15.246712] __kasan_kmalloc+0xb7/0xc0 [ 15.247136] __kmalloc_cache_noprof+0x189/0x420 [ 15.247572] kasan_atomics+0x95/0x310 [ 15.247759] kunit_try_run_case+0x1a5/0x480 [ 15.247964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.248211] kthread+0x337/0x6f0 [ 15.248380] ret_from_fork+0x116/0x1d0 [ 15.248572] ret_from_fork_asm+0x1a/0x30 [ 15.248763] [ 15.248854] The buggy address belongs to the object at ffff8881026d6200 [ 15.248854] which belongs to the cache kmalloc-64 of size 64 [ 15.249193] The buggy address is located 0 bytes to the right of [ 15.249193] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.249555] [ 15.249627] The buggy address belongs to the physical page: [ 15.249959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.250403] flags: 0x200000000000000(node=0|zone=2) [ 15.250655] page_type: f5(slab) [ 15.250829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.251218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.251741] page dumped because: kasan: bad access detected [ 15.252194] [ 15.252295] Memory state around the buggy address: [ 15.252649] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.253010] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.253230] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.253503] ^ [ 15.253956] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254364] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.255072] ================================================================== [ 15.937481] ================================================================== [ 15.938410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.939073] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.939362] [ 15.939566] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.939619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.939633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.939864] Call Trace: [ 15.939887] <TASK> [ 15.939909] dump_stack_lvl+0x73/0xb0 [ 15.939943] print_report+0xd1/0x610 [ 15.939968] ? __virt_addr_valid+0x1db/0x2d0 [ 15.939996] ? kasan_atomics_helper+0x164f/0x5450 [ 15.940020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.940046] ? kasan_atomics_helper+0x164f/0x5450 [ 15.940071] kasan_report+0x141/0x180 [ 15.940096] ? kasan_atomics_helper+0x164f/0x5450 [ 15.940125] kasan_check_range+0x10c/0x1c0 [ 15.940151] __kasan_check_write+0x18/0x20 [ 15.940173] kasan_atomics_helper+0x164f/0x5450 [ 15.940198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.940224] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.940257] kasan_atomics+0x1dc/0x310 [ 15.940360] ? __pfx_kasan_atomics+0x10/0x10 [ 15.940389] ? __pfx_read_tsc+0x10/0x10 [ 15.940424] ? ktime_get_ts64+0x86/0x230 [ 15.940464] kunit_try_run_case+0x1a5/0x480 [ 15.940493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.940519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.940546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.940572] ? __kthread_parkme+0x82/0x180 [ 15.940597] ? preempt_count_sub+0x50/0x80 [ 15.940624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.940651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.940678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.940706] kthread+0x337/0x6f0 [ 15.940727] ? trace_preempt_on+0x20/0xc0 [ 15.940753] ? __pfx_kthread+0x10/0x10 [ 15.940776] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.940800] ? calculate_sigpending+0x7b/0xa0 [ 15.940827] ? __pfx_kthread+0x10/0x10 [ 15.940852] ret_from_fork+0x116/0x1d0 [ 15.940873] ? __pfx_kthread+0x10/0x10 [ 15.940896] ret_from_fork_asm+0x1a/0x30 [ 15.940930] </TASK> [ 15.940941] [ 15.950525] Allocated by task 283: [ 15.950819] kasan_save_stack+0x45/0x70 [ 15.951079] kasan_save_track+0x18/0x40 [ 15.951245] kasan_save_alloc_info+0x3b/0x50 [ 15.951562] __kasan_kmalloc+0xb7/0xc0 [ 15.951803] __kmalloc_cache_noprof+0x189/0x420 [ 15.952121] kasan_atomics+0x95/0x310 [ 15.952425] kunit_try_run_case+0x1a5/0x480 [ 15.952620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.952987] kthread+0x337/0x6f0 [ 15.953122] ret_from_fork+0x116/0x1d0 [ 15.953313] ret_from_fork_asm+0x1a/0x30 [ 15.953509] [ 15.953797] The buggy address belongs to the object at ffff8881026d6200 [ 15.953797] which belongs to the cache kmalloc-64 of size 64 [ 15.954305] The buggy address is located 0 bytes to the right of [ 15.954305] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.955062] [ 15.955165] The buggy address belongs to the physical page: [ 15.955360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.955931] flags: 0x200000000000000(node=0|zone=2) [ 15.956217] page_type: f5(slab) [ 15.956372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.956856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.957244] page dumped because: kasan: bad access detected [ 15.957589] [ 15.957686] Memory state around the buggy address: [ 15.957880] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.958326] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.959192] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.959520] ^ [ 15.959753] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960047] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960349] ================================================================== [ 16.233973] ================================================================== [ 16.234306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.234636] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.234971] [ 16.235103] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.235188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.235201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.235224] Call Trace: [ 16.235255] <TASK> [ 16.235275] dump_stack_lvl+0x73/0xb0 [ 16.235305] print_report+0xd1/0x610 [ 16.235330] ? __virt_addr_valid+0x1db/0x2d0 [ 16.235355] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.235378] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.235404] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.235427] kasan_report+0x141/0x180 [ 16.235462] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.235491] kasan_check_range+0x10c/0x1c0 [ 16.235517] __kasan_check_write+0x18/0x20 [ 16.235537] kasan_atomics_helper+0x1e12/0x5450 [ 16.235562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.235587] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.235619] kasan_atomics+0x1dc/0x310 [ 16.235644] ? __pfx_kasan_atomics+0x10/0x10 [ 16.235670] ? __pfx_read_tsc+0x10/0x10 [ 16.235692] ? ktime_get_ts64+0x86/0x230 [ 16.235719] kunit_try_run_case+0x1a5/0x480 [ 16.235747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.235772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.235799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.235825] ? __kthread_parkme+0x82/0x180 [ 16.235847] ? preempt_count_sub+0x50/0x80 [ 16.235873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.235909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.235936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.235963] kthread+0x337/0x6f0 [ 16.235984] ? trace_preempt_on+0x20/0xc0 [ 16.236010] ? __pfx_kthread+0x10/0x10 [ 16.236032] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.236077] ? calculate_sigpending+0x7b/0xa0 [ 16.236103] ? __pfx_kthread+0x10/0x10 [ 16.236140] ret_from_fork+0x116/0x1d0 [ 16.236161] ? __pfx_kthread+0x10/0x10 [ 16.236182] ret_from_fork_asm+0x1a/0x30 [ 16.236216] </TASK> [ 16.236227] [ 16.244310] Allocated by task 283: [ 16.244538] kasan_save_stack+0x45/0x70 [ 16.244786] kasan_save_track+0x18/0x40 [ 16.244978] kasan_save_alloc_info+0x3b/0x50 [ 16.245196] __kasan_kmalloc+0xb7/0xc0 [ 16.245393] __kmalloc_cache_noprof+0x189/0x420 [ 16.245758] kasan_atomics+0x95/0x310 [ 16.245894] kunit_try_run_case+0x1a5/0x480 [ 16.246041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.246217] kthread+0x337/0x6f0 [ 16.246563] ret_from_fork+0x116/0x1d0 [ 16.246752] ret_from_fork_asm+0x1a/0x30 [ 16.246972] [ 16.247093] The buggy address belongs to the object at ffff8881026d6200 [ 16.247093] which belongs to the cache kmalloc-64 of size 64 [ 16.247791] The buggy address is located 0 bytes to the right of [ 16.247791] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.248264] [ 16.248347] The buggy address belongs to the physical page: [ 16.248683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.249046] flags: 0x200000000000000(node=0|zone=2) [ 16.249283] page_type: f5(slab) [ 16.249445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.249797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.250151] page dumped because: kasan: bad access detected [ 16.250405] [ 16.250562] Memory state around the buggy address: [ 16.250789] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.251024] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.251241] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.251599] ^ [ 16.251825] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.252143] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.252596] ================================================================== [ 16.325162] ================================================================== [ 16.325849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.326188] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.326442] [ 16.326570] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.326627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.326640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.326674] Call Trace: [ 16.326692] <TASK> [ 16.326710] dump_stack_lvl+0x73/0xb0 [ 16.326740] print_report+0xd1/0x610 [ 16.326765] ? __virt_addr_valid+0x1db/0x2d0 [ 16.326790] ? kasan_atomics_helper+0x2006/0x5450 [ 16.326822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.326847] ? kasan_atomics_helper+0x2006/0x5450 [ 16.326881] kasan_report+0x141/0x180 [ 16.326904] ? kasan_atomics_helper+0x2006/0x5450 [ 16.326933] kasan_check_range+0x10c/0x1c0 [ 16.326958] __kasan_check_write+0x18/0x20 [ 16.326979] kasan_atomics_helper+0x2006/0x5450 [ 16.327004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.327029] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.327061] kasan_atomics+0x1dc/0x310 [ 16.327085] ? __pfx_kasan_atomics+0x10/0x10 [ 16.327111] ? __pfx_read_tsc+0x10/0x10 [ 16.327134] ? ktime_get_ts64+0x86/0x230 [ 16.327159] kunit_try_run_case+0x1a5/0x480 [ 16.327187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.327220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.327246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.327272] ? __kthread_parkme+0x82/0x180 [ 16.327305] ? preempt_count_sub+0x50/0x80 [ 16.327330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.327356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.327389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.327417] kthread+0x337/0x6f0 [ 16.327437] ? trace_preempt_on+0x20/0xc0 [ 16.327476] ? __pfx_kthread+0x10/0x10 [ 16.327508] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.327532] ? calculate_sigpending+0x7b/0xa0 [ 16.327558] ? __pfx_kthread+0x10/0x10 [ 16.327580] ret_from_fork+0x116/0x1d0 [ 16.327610] ? __pfx_kthread+0x10/0x10 [ 16.327634] ret_from_fork_asm+0x1a/0x30 [ 16.327667] </TASK> [ 16.327692] [ 16.335134] Allocated by task 283: [ 16.335318] kasan_save_stack+0x45/0x70 [ 16.335671] kasan_save_track+0x18/0x40 [ 16.335864] kasan_save_alloc_info+0x3b/0x50 [ 16.336075] __kasan_kmalloc+0xb7/0xc0 [ 16.336257] __kmalloc_cache_noprof+0x189/0x420 [ 16.336430] kasan_atomics+0x95/0x310 [ 16.336646] kunit_try_run_case+0x1a5/0x480 [ 16.336843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.337079] kthread+0x337/0x6f0 [ 16.337230] ret_from_fork+0x116/0x1d0 [ 16.337462] ret_from_fork_asm+0x1a/0x30 [ 16.337623] [ 16.337741] The buggy address belongs to the object at ffff8881026d6200 [ 16.337741] which belongs to the cache kmalloc-64 of size 64 [ 16.338110] The buggy address is located 0 bytes to the right of [ 16.338110] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.338795] [ 16.338870] The buggy address belongs to the physical page: [ 16.339124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.339483] flags: 0x200000000000000(node=0|zone=2) [ 16.339713] page_type: f5(slab) [ 16.339904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.340230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.340588] page dumped because: kasan: bad access detected [ 16.340811] [ 16.340925] Memory state around the buggy address: [ 16.341093] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.341308] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.341531] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.341767] ^ [ 16.342020] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.342334] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.342968] ================================================================== [ 15.179673] ================================================================== [ 15.179976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.180278] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.180630] [ 15.180749] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.180796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.180809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.180832] Call Trace: [ 15.180845] <TASK> [ 15.180862] dump_stack_lvl+0x73/0xb0 [ 15.180908] print_report+0xd1/0x610 [ 15.180933] ? __virt_addr_valid+0x1db/0x2d0 [ 15.180970] ? kasan_atomics_helper+0x3df/0x5450 [ 15.180993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.181017] ? kasan_atomics_helper+0x3df/0x5450 [ 15.181051] kasan_report+0x141/0x180 [ 15.181074] ? kasan_atomics_helper+0x3df/0x5450 [ 15.181111] kasan_check_range+0x10c/0x1c0 [ 15.181136] __kasan_check_read+0x15/0x20 [ 15.181157] kasan_atomics_helper+0x3df/0x5450 [ 15.181191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.181216] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.181249] kasan_atomics+0x1dc/0x310 [ 15.181273] ? __pfx_kasan_atomics+0x10/0x10 [ 15.181301] ? __pfx_read_tsc+0x10/0x10 [ 15.181323] ? ktime_get_ts64+0x86/0x230 [ 15.181348] kunit_try_run_case+0x1a5/0x480 [ 15.181375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.181437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.181480] ? __kthread_parkme+0x82/0x180 [ 15.181503] ? preempt_count_sub+0x50/0x80 [ 15.181530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.181592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.181619] kthread+0x337/0x6f0 [ 15.181641] ? trace_preempt_on+0x20/0xc0 [ 15.181665] ? __pfx_kthread+0x10/0x10 [ 15.181687] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.181710] ? calculate_sigpending+0x7b/0xa0 [ 15.181737] ? __pfx_kthread+0x10/0x10 [ 15.181759] ret_from_fork+0x116/0x1d0 [ 15.181780] ? __pfx_kthread+0x10/0x10 [ 15.181801] ret_from_fork_asm+0x1a/0x30 [ 15.181834] </TASK> [ 15.181844] [ 15.189123] Allocated by task 283: [ 15.189309] kasan_save_stack+0x45/0x70 [ 15.189543] kasan_save_track+0x18/0x40 [ 15.189742] kasan_save_alloc_info+0x3b/0x50 [ 15.190187] __kasan_kmalloc+0xb7/0xc0 [ 15.190396] __kmalloc_cache_noprof+0x189/0x420 [ 15.190677] kasan_atomics+0x95/0x310 [ 15.190857] kunit_try_run_case+0x1a5/0x480 [ 15.191005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.191197] kthread+0x337/0x6f0 [ 15.191367] ret_from_fork+0x116/0x1d0 [ 15.191615] ret_from_fork_asm+0x1a/0x30 [ 15.191811] [ 15.191908] The buggy address belongs to the object at ffff8881026d6200 [ 15.191908] which belongs to the cache kmalloc-64 of size 64 [ 15.192405] The buggy address is located 0 bytes to the right of [ 15.192405] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.192937] [ 15.193036] The buggy address belongs to the physical page: [ 15.193270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.193705] flags: 0x200000000000000(node=0|zone=2) [ 15.193888] page_type: f5(slab) [ 15.194011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.194245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.194589] page dumped because: kasan: bad access detected [ 15.194839] [ 15.194931] Memory state around the buggy address: [ 15.195151] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.195490] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.195706] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.195919] ^ [ 15.196107] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.196462] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.196804] ================================================================== [ 15.731711] ================================================================== [ 15.732064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.732416] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.732776] [ 15.732899] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.732946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.732959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.732993] Call Trace: [ 15.733012] <TASK> [ 15.733031] dump_stack_lvl+0x73/0xb0 [ 15.733072] print_report+0xd1/0x610 [ 15.733098] ? __virt_addr_valid+0x1db/0x2d0 [ 15.733124] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.733157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.733183] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.733208] kasan_report+0x141/0x180 [ 15.733231] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.733260] kasan_check_range+0x10c/0x1c0 [ 15.733286] __kasan_check_write+0x18/0x20 [ 15.733308] kasan_atomics_helper+0x12e6/0x5450 [ 15.733333] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.733358] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.733411] kasan_atomics+0x1dc/0x310 [ 15.733443] ? __pfx_kasan_atomics+0x10/0x10 [ 15.733484] ? __pfx_read_tsc+0x10/0x10 [ 15.733507] ? ktime_get_ts64+0x86/0x230 [ 15.733534] kunit_try_run_case+0x1a5/0x480 [ 15.733562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.733588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.733615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.733641] ? __kthread_parkme+0x82/0x180 [ 15.733664] ? preempt_count_sub+0x50/0x80 [ 15.733690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.733717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.733743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.733771] kthread+0x337/0x6f0 [ 15.733792] ? trace_preempt_on+0x20/0xc0 [ 15.733818] ? __pfx_kthread+0x10/0x10 [ 15.733840] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.733864] ? calculate_sigpending+0x7b/0xa0 [ 15.733891] ? __pfx_kthread+0x10/0x10 [ 15.733914] ret_from_fork+0x116/0x1d0 [ 15.733935] ? __pfx_kthread+0x10/0x10 [ 15.733958] ret_from_fork_asm+0x1a/0x30 [ 15.733990] </TASK> [ 15.734002] [ 15.741216] Allocated by task 283: [ 15.741420] kasan_save_stack+0x45/0x70 [ 15.741632] kasan_save_track+0x18/0x40 [ 15.741826] kasan_save_alloc_info+0x3b/0x50 [ 15.741977] __kasan_kmalloc+0xb7/0xc0 [ 15.742112] __kmalloc_cache_noprof+0x189/0x420 [ 15.742336] kasan_atomics+0x95/0x310 [ 15.742578] kunit_try_run_case+0x1a5/0x480 [ 15.742811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743065] kthread+0x337/0x6f0 [ 15.743224] ret_from_fork+0x116/0x1d0 [ 15.743432] ret_from_fork_asm+0x1a/0x30 [ 15.743644] [ 15.743733] The buggy address belongs to the object at ffff8881026d6200 [ 15.743733] which belongs to the cache kmalloc-64 of size 64 [ 15.744211] The buggy address is located 0 bytes to the right of [ 15.744211] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.744622] [ 15.744700] The buggy address belongs to the physical page: [ 15.744958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.745309] flags: 0x200000000000000(node=0|zone=2) [ 15.745572] page_type: f5(slab) [ 15.745741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.746079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.746417] page dumped because: kasan: bad access detected [ 15.746631] [ 15.746702] Memory state around the buggy address: [ 15.746859] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.747146] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.747527] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.748268] ^ [ 15.750134] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.751974] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.753018] ================================================================== [ 16.343688] ================================================================== [ 16.344051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.344398] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.344796] [ 16.344890] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.344939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.344952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.344975] Call Trace: [ 16.344994] <TASK> [ 16.345013] dump_stack_lvl+0x73/0xb0 [ 16.345044] print_report+0xd1/0x610 [ 16.345068] ? __virt_addr_valid+0x1db/0x2d0 [ 16.345092] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.345116] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.345142] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.345165] kasan_report+0x141/0x180 [ 16.345188] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.345216] __asan_report_load8_noabort+0x18/0x20 [ 16.345242] kasan_atomics_helper+0x4f98/0x5450 [ 16.345266] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.345291] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.345323] kasan_atomics+0x1dc/0x310 [ 16.345347] ? __pfx_kasan_atomics+0x10/0x10 [ 16.345373] ? __pfx_read_tsc+0x10/0x10 [ 16.345396] ? ktime_get_ts64+0x86/0x230 [ 16.345431] kunit_try_run_case+0x1a5/0x480 [ 16.345478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.345541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.345567] ? __kthread_parkme+0x82/0x180 [ 16.345599] ? preempt_count_sub+0x50/0x80 [ 16.345624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.345686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.345713] kthread+0x337/0x6f0 [ 16.345734] ? trace_preempt_on+0x20/0xc0 [ 16.345759] ? __pfx_kthread+0x10/0x10 [ 16.345781] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.345804] ? calculate_sigpending+0x7b/0xa0 [ 16.345830] ? __pfx_kthread+0x10/0x10 [ 16.345852] ret_from_fork+0x116/0x1d0 [ 16.345873] ? __pfx_kthread+0x10/0x10 [ 16.345894] ret_from_fork_asm+0x1a/0x30 [ 16.345927] </TASK> [ 16.345938] [ 16.353229] Allocated by task 283: [ 16.353420] kasan_save_stack+0x45/0x70 [ 16.353858] kasan_save_track+0x18/0x40 [ 16.354066] kasan_save_alloc_info+0x3b/0x50 [ 16.354281] __kasan_kmalloc+0xb7/0xc0 [ 16.354496] __kmalloc_cache_noprof+0x189/0x420 [ 16.354822] kasan_atomics+0x95/0x310 [ 16.355021] kunit_try_run_case+0x1a5/0x480 [ 16.355174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.355352] kthread+0x337/0x6f0 [ 16.355521] ret_from_fork+0x116/0x1d0 [ 16.355712] ret_from_fork_asm+0x1a/0x30 [ 16.355949] [ 16.356079] The buggy address belongs to the object at ffff8881026d6200 [ 16.356079] which belongs to the cache kmalloc-64 of size 64 [ 16.356940] The buggy address is located 0 bytes to the right of [ 16.356940] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.357426] [ 16.357514] The buggy address belongs to the physical page: [ 16.357689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.358056] flags: 0x200000000000000(node=0|zone=2) [ 16.358352] page_type: f5(slab) [ 16.358530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.358877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.359222] page dumped because: kasan: bad access detected [ 16.359445] [ 16.359584] Memory state around the buggy address: [ 16.359800] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.360112] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.360366] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.360905] ^ [ 16.361114] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.361332] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.361638] ================================================================== [ 16.304546] ================================================================== [ 16.305336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.306119] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.306569] [ 16.306770] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.306821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.306844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.306868] Call Trace: [ 16.306889] <TASK> [ 16.306921] dump_stack_lvl+0x73/0xb0 [ 16.306952] print_report+0xd1/0x610 [ 16.306977] ? __virt_addr_valid+0x1db/0x2d0 [ 16.307002] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.307025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.307051] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.307075] kasan_report+0x141/0x180 [ 16.307097] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.307126] __asan_report_load8_noabort+0x18/0x20 [ 16.307152] kasan_atomics_helper+0x4f71/0x5450 [ 16.307177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.307201] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.307233] kasan_atomics+0x1dc/0x310 [ 16.307259] ? __pfx_kasan_atomics+0x10/0x10 [ 16.307285] ? __pfx_read_tsc+0x10/0x10 [ 16.307308] ? ktime_get_ts64+0x86/0x230 [ 16.307334] kunit_try_run_case+0x1a5/0x480 [ 16.307361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.307386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.307422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.307448] ? __kthread_parkme+0x82/0x180 [ 16.307480] ? preempt_count_sub+0x50/0x80 [ 16.307506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.307532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.307558] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.307585] kthread+0x337/0x6f0 [ 16.307605] ? trace_preempt_on+0x20/0xc0 [ 16.307631] ? __pfx_kthread+0x10/0x10 [ 16.307653] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.307676] ? calculate_sigpending+0x7b/0xa0 [ 16.307702] ? __pfx_kthread+0x10/0x10 [ 16.307725] ret_from_fork+0x116/0x1d0 [ 16.307745] ? __pfx_kthread+0x10/0x10 [ 16.307767] ret_from_fork_asm+0x1a/0x30 [ 16.307800] </TASK> [ 16.307811] [ 16.316868] Allocated by task 283: [ 16.317016] kasan_save_stack+0x45/0x70 [ 16.317224] kasan_save_track+0x18/0x40 [ 16.317375] kasan_save_alloc_info+0x3b/0x50 [ 16.317693] __kasan_kmalloc+0xb7/0xc0 [ 16.317853] __kmalloc_cache_noprof+0x189/0x420 [ 16.318012] kasan_atomics+0x95/0x310 [ 16.318147] kunit_try_run_case+0x1a5/0x480 [ 16.318382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.318646] kthread+0x337/0x6f0 [ 16.318814] ret_from_fork+0x116/0x1d0 [ 16.318946] ret_from_fork_asm+0x1a/0x30 [ 16.319100] [ 16.319198] The buggy address belongs to the object at ffff8881026d6200 [ 16.319198] which belongs to the cache kmalloc-64 of size 64 [ 16.319932] The buggy address is located 0 bytes to the right of [ 16.319932] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.320433] [ 16.320541] The buggy address belongs to the physical page: [ 16.320786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.321130] flags: 0x200000000000000(node=0|zone=2) [ 16.321364] page_type: f5(slab) [ 16.321581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.321908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.322220] page dumped because: kasan: bad access detected [ 16.322448] [ 16.322528] Memory state around the buggy address: [ 16.322748] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.323084] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.323349] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.323814] ^ [ 16.324015] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.324230] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.324526] ================================================================== [ 16.272015] ================================================================== [ 16.272290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.272671] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.273166] [ 16.273290] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.273337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.273350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.273372] Call Trace: [ 16.273392] <TASK> [ 16.273412] dump_stack_lvl+0x73/0xb0 [ 16.273440] print_report+0xd1/0x610 [ 16.273481] ? __virt_addr_valid+0x1db/0x2d0 [ 16.273506] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.273529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.273556] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.273579] kasan_report+0x141/0x180 [ 16.273603] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.273631] kasan_check_range+0x10c/0x1c0 [ 16.273656] __kasan_check_write+0x18/0x20 [ 16.273678] kasan_atomics_helper+0x1f43/0x5450 [ 16.273703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.273727] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.273760] kasan_atomics+0x1dc/0x310 [ 16.273784] ? __pfx_kasan_atomics+0x10/0x10 [ 16.273810] ? __pfx_read_tsc+0x10/0x10 [ 16.273833] ? ktime_get_ts64+0x86/0x230 [ 16.273858] kunit_try_run_case+0x1a5/0x480 [ 16.273885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.273910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.273936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.273961] ? __kthread_parkme+0x82/0x180 [ 16.273984] ? preempt_count_sub+0x50/0x80 [ 16.274009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.274883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.274918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.274946] kthread+0x337/0x6f0 [ 16.275017] ? trace_preempt_on+0x20/0xc0 [ 16.275069] ? __pfx_kthread+0x10/0x10 [ 16.275119] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.275143] ? calculate_sigpending+0x7b/0xa0 [ 16.275195] ? __pfx_kthread+0x10/0x10 [ 16.275218] ret_from_fork+0x116/0x1d0 [ 16.275238] ? __pfx_kthread+0x10/0x10 [ 16.275261] ret_from_fork_asm+0x1a/0x30 [ 16.275295] </TASK> [ 16.275308] [ 16.290239] Allocated by task 283: [ 16.290755] kasan_save_stack+0x45/0x70 [ 16.291302] kasan_save_track+0x18/0x40 [ 16.291852] kasan_save_alloc_info+0x3b/0x50 [ 16.292519] __kasan_kmalloc+0xb7/0xc0 [ 16.292906] __kmalloc_cache_noprof+0x189/0x420 [ 16.293075] kasan_atomics+0x95/0x310 [ 16.293215] kunit_try_run_case+0x1a5/0x480 [ 16.293365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.293561] kthread+0x337/0x6f0 [ 16.293685] ret_from_fork+0x116/0x1d0 [ 16.293822] ret_from_fork_asm+0x1a/0x30 [ 16.293964] [ 16.294040] The buggy address belongs to the object at ffff8881026d6200 [ 16.294040] which belongs to the cache kmalloc-64 of size 64 [ 16.294400] The buggy address is located 0 bytes to the right of [ 16.294400] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.295507] [ 16.295668] The buggy address belongs to the physical page: [ 16.296209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.297046] flags: 0x200000000000000(node=0|zone=2) [ 16.297534] page_type: f5(slab) [ 16.297847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.298548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.299195] page dumped because: kasan: bad access detected [ 16.299718] [ 16.299877] Memory state around the buggy address: [ 16.300328] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.300978] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.301694] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.302203] ^ [ 16.302360] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.302728] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.303365] ================================================================== [ 15.695254] ================================================================== [ 15.696015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.696459] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.696755] [ 15.696850] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.696897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.696910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.696934] Call Trace: [ 15.696954] <TASK> [ 15.696972] dump_stack_lvl+0x73/0xb0 [ 15.697004] print_report+0xd1/0x610 [ 15.697041] ? __virt_addr_valid+0x1db/0x2d0 [ 15.697067] ? kasan_atomics_helper+0x1217/0x5450 [ 15.697092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.697131] ? kasan_atomics_helper+0x1217/0x5450 [ 15.697156] kasan_report+0x141/0x180 [ 15.697180] ? kasan_atomics_helper+0x1217/0x5450 [ 15.697220] kasan_check_range+0x10c/0x1c0 [ 15.697245] __kasan_check_write+0x18/0x20 [ 15.697278] kasan_atomics_helper+0x1217/0x5450 [ 15.697304] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.697329] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.697373] kasan_atomics+0x1dc/0x310 [ 15.697421] ? __pfx_kasan_atomics+0x10/0x10 [ 15.697463] ? __pfx_read_tsc+0x10/0x10 [ 15.697487] ? ktime_get_ts64+0x86/0x230 [ 15.697515] kunit_try_run_case+0x1a5/0x480 [ 15.697542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.697576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.697602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.697629] ? __kthread_parkme+0x82/0x180 [ 15.697663] ? preempt_count_sub+0x50/0x80 [ 15.697690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.697717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.697744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.697772] kthread+0x337/0x6f0 [ 15.697793] ? trace_preempt_on+0x20/0xc0 [ 15.697819] ? __pfx_kthread+0x10/0x10 [ 15.697841] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.697865] ? calculate_sigpending+0x7b/0xa0 [ 15.697892] ? __pfx_kthread+0x10/0x10 [ 15.697916] ret_from_fork+0x116/0x1d0 [ 15.697936] ? __pfx_kthread+0x10/0x10 [ 15.697959] ret_from_fork_asm+0x1a/0x30 [ 15.697993] </TASK> [ 15.698005] [ 15.705291] Allocated by task 283: [ 15.705526] kasan_save_stack+0x45/0x70 [ 15.705757] kasan_save_track+0x18/0x40 [ 15.705949] kasan_save_alloc_info+0x3b/0x50 [ 15.706190] __kasan_kmalloc+0xb7/0xc0 [ 15.706347] __kmalloc_cache_noprof+0x189/0x420 [ 15.706609] kasan_atomics+0x95/0x310 [ 15.706814] kunit_try_run_case+0x1a5/0x480 [ 15.707025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.707275] kthread+0x337/0x6f0 [ 15.707480] ret_from_fork+0x116/0x1d0 [ 15.707657] ret_from_fork_asm+0x1a/0x30 [ 15.707854] [ 15.707947] The buggy address belongs to the object at ffff8881026d6200 [ 15.707947] which belongs to the cache kmalloc-64 of size 64 [ 15.708315] The buggy address is located 0 bytes to the right of [ 15.708315] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.708717] [ 15.708836] The buggy address belongs to the physical page: [ 15.709088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.709480] flags: 0x200000000000000(node=0|zone=2) [ 15.709718] page_type: f5(slab) [ 15.709886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.710228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.710562] page dumped because: kasan: bad access detected [ 15.710735] [ 15.710805] Memory state around the buggy address: [ 15.710989] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.711335] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.711712] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.712027] ^ [ 15.712243] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.712589] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.712895] ================================================================== [ 15.640483] ================================================================== [ 15.640859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.641200] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.641556] [ 15.641698] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.641747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.641760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.641784] Call Trace: [ 15.641804] <TASK> [ 15.641824] dump_stack_lvl+0x73/0xb0 [ 15.641853] print_report+0xd1/0x610 [ 15.641889] ? __virt_addr_valid+0x1db/0x2d0 [ 15.641915] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.641938] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.641975] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.641999] kasan_report+0x141/0x180 [ 15.642023] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.642061] __asan_report_load4_noabort+0x18/0x20 [ 15.642088] kasan_atomics_helper+0x4a1c/0x5450 [ 15.642113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.642148] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.642181] kasan_atomics+0x1dc/0x310 [ 15.642215] ? __pfx_kasan_atomics+0x10/0x10 [ 15.642241] ? __pfx_read_tsc+0x10/0x10 [ 15.642264] ? ktime_get_ts64+0x86/0x230 [ 15.642300] kunit_try_run_case+0x1a5/0x480 [ 15.642327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.642352] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.642379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.642430] ? __kthread_parkme+0x82/0x180 [ 15.642468] ? preempt_count_sub+0x50/0x80 [ 15.642495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.642523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.642549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.642586] kthread+0x337/0x6f0 [ 15.642608] ? trace_preempt_on+0x20/0xc0 [ 15.642632] ? __pfx_kthread+0x10/0x10 [ 15.642665] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.642688] ? calculate_sigpending+0x7b/0xa0 [ 15.642715] ? __pfx_kthread+0x10/0x10 [ 15.642738] ret_from_fork+0x116/0x1d0 [ 15.642767] ? __pfx_kthread+0x10/0x10 [ 15.642789] ret_from_fork_asm+0x1a/0x30 [ 15.642823] </TASK> [ 15.642844] [ 15.650372] Allocated by task 283: [ 15.650537] kasan_save_stack+0x45/0x70 [ 15.650685] kasan_save_track+0x18/0x40 [ 15.650823] kasan_save_alloc_info+0x3b/0x50 [ 15.650998] __kasan_kmalloc+0xb7/0xc0 [ 15.651186] __kmalloc_cache_noprof+0x189/0x420 [ 15.651463] kasan_atomics+0x95/0x310 [ 15.651656] kunit_try_run_case+0x1a5/0x480 [ 15.651863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.652118] kthread+0x337/0x6f0 [ 15.652289] ret_from_fork+0x116/0x1d0 [ 15.652471] ret_from_fork_asm+0x1a/0x30 [ 15.652617] [ 15.652689] The buggy address belongs to the object at ffff8881026d6200 [ 15.652689] which belongs to the cache kmalloc-64 of size 64 [ 15.653188] The buggy address is located 0 bytes to the right of [ 15.653188] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.653785] [ 15.653887] The buggy address belongs to the physical page: [ 15.654113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.654486] flags: 0x200000000000000(node=0|zone=2) [ 15.654708] page_type: f5(slab) [ 15.654895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.655211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.655571] page dumped because: kasan: bad access detected [ 15.655809] [ 15.655903] Memory state around the buggy address: [ 15.656121] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.656410] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.656638] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.656999] ^ [ 15.657272] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.657640] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.657927] ================================================================== [ 15.838097] ================================================================== [ 15.838954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.839647] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.839910] [ 15.840029] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.840091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.840105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.840129] Call Trace: [ 15.840149] <TASK> [ 15.840168] dump_stack_lvl+0x73/0xb0 [ 15.840200] print_report+0xd1/0x610 [ 15.840226] ? __virt_addr_valid+0x1db/0x2d0 [ 15.840252] ? kasan_atomics_helper+0x1467/0x5450 [ 15.840276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.840308] ? kasan_atomics_helper+0x1467/0x5450 [ 15.840332] kasan_report+0x141/0x180 [ 15.840378] ? kasan_atomics_helper+0x1467/0x5450 [ 15.840428] kasan_check_range+0x10c/0x1c0 [ 15.840463] __kasan_check_write+0x18/0x20 [ 15.840485] kasan_atomics_helper+0x1467/0x5450 [ 15.840510] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.840535] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.840568] kasan_atomics+0x1dc/0x310 [ 15.840594] ? __pfx_kasan_atomics+0x10/0x10 [ 15.840620] ? __pfx_read_tsc+0x10/0x10 [ 15.840644] ? ktime_get_ts64+0x86/0x230 [ 15.840670] kunit_try_run_case+0x1a5/0x480 [ 15.840698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.840751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.840777] ? __kthread_parkme+0x82/0x180 [ 15.840801] ? preempt_count_sub+0x50/0x80 [ 15.840827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.840881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.840909] kthread+0x337/0x6f0 [ 15.840930] ? trace_preempt_on+0x20/0xc0 [ 15.840956] ? __pfx_kthread+0x10/0x10 [ 15.840979] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.841003] ? calculate_sigpending+0x7b/0xa0 [ 15.841029] ? __pfx_kthread+0x10/0x10 [ 15.841053] ret_from_fork+0x116/0x1d0 [ 15.841074] ? __pfx_kthread+0x10/0x10 [ 15.841097] ret_from_fork_asm+0x1a/0x30 [ 15.841129] </TASK> [ 15.841141] [ 15.852848] Allocated by task 283: [ 15.853208] kasan_save_stack+0x45/0x70 [ 15.853615] kasan_save_track+0x18/0x40 [ 15.853997] kasan_save_alloc_info+0x3b/0x50 [ 15.854414] __kasan_kmalloc+0xb7/0xc0 [ 15.854783] __kmalloc_cache_noprof+0x189/0x420 [ 15.855208] kasan_atomics+0x95/0x310 [ 15.855550] kunit_try_run_case+0x1a5/0x480 [ 15.855703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.855882] kthread+0x337/0x6f0 [ 15.856005] ret_from_fork+0x116/0x1d0 [ 15.856140] ret_from_fork_asm+0x1a/0x30 [ 15.856285] [ 15.856360] The buggy address belongs to the object at ffff8881026d6200 [ 15.856360] which belongs to the cache kmalloc-64 of size 64 [ 15.857467] The buggy address is located 0 bytes to the right of [ 15.857467] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.858563] [ 15.858725] The buggy address belongs to the physical page: [ 15.859217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.859927] flags: 0x200000000000000(node=0|zone=2) [ 15.860390] page_type: f5(slab) [ 15.860735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.861108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.861338] page dumped because: kasan: bad access detected [ 15.861800] [ 15.861976] Memory state around the buggy address: [ 15.862440] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.863071] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.863674] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.863892] ^ [ 15.864048] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864264] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864699] ================================================================== [ 15.362789] ================================================================== [ 15.363270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.363630] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.364061] [ 15.364155] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.364202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.364215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.364239] Call Trace: [ 15.364252] <TASK> [ 15.364270] dump_stack_lvl+0x73/0xb0 [ 15.364310] print_report+0xd1/0x610 [ 15.364335] ? __virt_addr_valid+0x1db/0x2d0 [ 15.364360] ? kasan_atomics_helper+0x860/0x5450 [ 15.364383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.364432] ? kasan_atomics_helper+0x860/0x5450 [ 15.364464] kasan_report+0x141/0x180 [ 15.364488] ? kasan_atomics_helper+0x860/0x5450 [ 15.364518] kasan_check_range+0x10c/0x1c0 [ 15.364545] __kasan_check_write+0x18/0x20 [ 15.364567] kasan_atomics_helper+0x860/0x5450 [ 15.364591] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.364650] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.364683] kasan_atomics+0x1dc/0x310 [ 15.364708] ? __pfx_kasan_atomics+0x10/0x10 [ 15.364744] ? __pfx_read_tsc+0x10/0x10 [ 15.364768] ? ktime_get_ts64+0x86/0x230 [ 15.364794] kunit_try_run_case+0x1a5/0x480 [ 15.364832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.364858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.364885] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.364911] ? __kthread_parkme+0x82/0x180 [ 15.364934] ? preempt_count_sub+0x50/0x80 [ 15.364960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.364987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.365013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.365040] kthread+0x337/0x6f0 [ 15.365062] ? trace_preempt_on+0x20/0xc0 [ 15.365088] ? __pfx_kthread+0x10/0x10 [ 15.365109] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.365134] ? calculate_sigpending+0x7b/0xa0 [ 15.365161] ? __pfx_kthread+0x10/0x10 [ 15.365184] ret_from_fork+0x116/0x1d0 [ 15.365205] ? __pfx_kthread+0x10/0x10 [ 15.365236] ret_from_fork_asm+0x1a/0x30 [ 15.365268] </TASK> [ 15.365280] [ 15.373218] Allocated by task 283: [ 15.373359] kasan_save_stack+0x45/0x70 [ 15.373603] kasan_save_track+0x18/0x40 [ 15.373799] kasan_save_alloc_info+0x3b/0x50 [ 15.374011] __kasan_kmalloc+0xb7/0xc0 [ 15.374201] __kmalloc_cache_noprof+0x189/0x420 [ 15.374433] kasan_atomics+0x95/0x310 [ 15.374627] kunit_try_run_case+0x1a5/0x480 [ 15.374839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.375037] kthread+0x337/0x6f0 [ 15.375159] ret_from_fork+0x116/0x1d0 [ 15.375293] ret_from_fork_asm+0x1a/0x30 [ 15.375436] [ 15.375533] The buggy address belongs to the object at ffff8881026d6200 [ 15.375533] which belongs to the cache kmalloc-64 of size 64 [ 15.376063] The buggy address is located 0 bytes to the right of [ 15.376063] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.376706] [ 15.376826] The buggy address belongs to the physical page: [ 15.377093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.377373] flags: 0x200000000000000(node=0|zone=2) [ 15.377572] page_type: f5(slab) [ 15.377740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.378112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.378511] page dumped because: kasan: bad access detected [ 15.378705] [ 15.378776] Memory state around the buggy address: [ 15.378931] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.379146] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.379438] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.379759] ^ [ 15.379999] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.380315] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.380663] ================================================================== [ 15.496231] ================================================================== [ 15.497648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.498227] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.498831] [ 15.499197] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.499252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.499266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.499290] Call Trace: [ 15.499312] <TASK> [ 15.499332] dump_stack_lvl+0x73/0xb0 [ 15.499505] print_report+0xd1/0x610 [ 15.499532] ? __virt_addr_valid+0x1db/0x2d0 [ 15.499559] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.499583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.499608] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.499632] kasan_report+0x141/0x180 [ 15.499656] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.499685] __asan_report_load4_noabort+0x18/0x20 [ 15.499712] kasan_atomics_helper+0x4a84/0x5450 [ 15.499737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.499761] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.499794] kasan_atomics+0x1dc/0x310 [ 15.499819] ? __pfx_kasan_atomics+0x10/0x10 [ 15.499846] ? __pfx_read_tsc+0x10/0x10 [ 15.499868] ? ktime_get_ts64+0x86/0x230 [ 15.499895] kunit_try_run_case+0x1a5/0x480 [ 15.499923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.499947] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.499974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.500001] ? __kthread_parkme+0x82/0x180 [ 15.500025] ? preempt_count_sub+0x50/0x80 [ 15.500052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.500078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.500104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.500132] kthread+0x337/0x6f0 [ 15.500154] ? trace_preempt_on+0x20/0xc0 [ 15.500180] ? __pfx_kthread+0x10/0x10 [ 15.500202] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.500225] ? calculate_sigpending+0x7b/0xa0 [ 15.500251] ? __pfx_kthread+0x10/0x10 [ 15.500274] ret_from_fork+0x116/0x1d0 [ 15.500301] ? __pfx_kthread+0x10/0x10 [ 15.500323] ret_from_fork_asm+0x1a/0x30 [ 15.500356] </TASK> [ 15.500367] [ 15.507561] Allocated by task 283: [ 15.507704] kasan_save_stack+0x45/0x70 [ 15.507860] kasan_save_track+0x18/0x40 [ 15.508056] kasan_save_alloc_info+0x3b/0x50 [ 15.508297] __kasan_kmalloc+0xb7/0xc0 [ 15.508538] __kmalloc_cache_noprof+0x189/0x420 [ 15.508768] kasan_atomics+0x95/0x310 [ 15.508962] kunit_try_run_case+0x1a5/0x480 [ 15.509161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.509438] kthread+0x337/0x6f0 [ 15.509619] ret_from_fork+0x116/0x1d0 [ 15.509792] ret_from_fork_asm+0x1a/0x30 [ 15.509996] [ 15.510092] The buggy address belongs to the object at ffff8881026d6200 [ 15.510092] which belongs to the cache kmalloc-64 of size 64 [ 15.510614] The buggy address is located 0 bytes to the right of [ 15.510614] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.511004] [ 15.511078] The buggy address belongs to the physical page: [ 15.511253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.511662] flags: 0x200000000000000(node=0|zone=2) [ 15.511895] page_type: f5(slab) [ 15.512066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.512440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.512721] page dumped because: kasan: bad access detected [ 15.512899] [ 15.512972] Memory state around the buggy address: [ 15.513164] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.513553] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.513884] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.514232] ^ [ 15.514484] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.514723] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.515055] ================================================================== [ 15.088403] ================================================================== [ 15.088793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.089105] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.089432] [ 15.089709] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.089761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.089773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.089794] Call Trace: [ 15.089809] <TASK> [ 15.089822] dump_stack_lvl+0x73/0xb0 [ 15.089852] print_report+0xd1/0x610 [ 15.089874] ? __virt_addr_valid+0x1db/0x2d0 [ 15.089897] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.089919] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.089943] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.089966] kasan_report+0x141/0x180 [ 15.089988] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.090015] __asan_report_store4_noabort+0x1b/0x30 [ 15.090041] kasan_atomics_helper+0x4ba2/0x5450 [ 15.090065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.090088] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.090119] kasan_atomics+0x1dc/0x310 [ 15.090143] ? __pfx_kasan_atomics+0x10/0x10 [ 15.090168] ? __pfx_read_tsc+0x10/0x10 [ 15.090189] ? ktime_get_ts64+0x86/0x230 [ 15.090213] kunit_try_run_case+0x1a5/0x480 [ 15.090238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090262] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.090287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.090311] ? __kthread_parkme+0x82/0x180 [ 15.090332] ? preempt_count_sub+0x50/0x80 [ 15.090356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.090432] kthread+0x337/0x6f0 [ 15.090465] ? trace_preempt_on+0x20/0xc0 [ 15.090489] ? __pfx_kthread+0x10/0x10 [ 15.090510] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.090642] ? calculate_sigpending+0x7b/0xa0 [ 15.090669] ? __pfx_kthread+0x10/0x10 [ 15.090692] ret_from_fork+0x116/0x1d0 [ 15.090712] ? __pfx_kthread+0x10/0x10 [ 15.090734] ret_from_fork_asm+0x1a/0x30 [ 15.090764] </TASK> [ 15.090774] [ 15.098470] Allocated by task 283: [ 15.098735] kasan_save_stack+0x45/0x70 [ 15.098933] kasan_save_track+0x18/0x40 [ 15.099097] kasan_save_alloc_info+0x3b/0x50 [ 15.099310] __kasan_kmalloc+0xb7/0xc0 [ 15.099511] __kmalloc_cache_noprof+0x189/0x420 [ 15.099754] kasan_atomics+0x95/0x310 [ 15.099894] kunit_try_run_case+0x1a5/0x480 [ 15.100042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.100298] kthread+0x337/0x6f0 [ 15.100501] ret_from_fork+0x116/0x1d0 [ 15.100760] ret_from_fork_asm+0x1a/0x30 [ 15.100919] [ 15.100991] The buggy address belongs to the object at ffff8881026d6200 [ 15.100991] which belongs to the cache kmalloc-64 of size 64 [ 15.101344] The buggy address is located 0 bytes to the right of [ 15.101344] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.102059] [ 15.102161] The buggy address belongs to the physical page: [ 15.102410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.102871] flags: 0x200000000000000(node=0|zone=2) [ 15.103040] page_type: f5(slab) [ 15.103159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.103416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.103853] page dumped because: kasan: bad access detected [ 15.104116] [ 15.104214] Memory state around the buggy address: [ 15.104480] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.106137] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.106537] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.108221] ^ [ 15.108395] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.109642] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.110497] ================================================================== [ 15.215431] ================================================================== [ 15.215900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.216254] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.216639] [ 15.216759] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.216803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.216816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.216849] Call Trace: [ 15.216864] <TASK> [ 15.216880] dump_stack_lvl+0x73/0xb0 [ 15.216919] print_report+0xd1/0x610 [ 15.216942] ? __virt_addr_valid+0x1db/0x2d0 [ 15.216966] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.216989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.217014] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.217038] kasan_report+0x141/0x180 [ 15.217061] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.217089] kasan_check_range+0x10c/0x1c0 [ 15.217116] __kasan_check_write+0x18/0x20 [ 15.217137] kasan_atomics_helper+0x4a0/0x5450 [ 15.217162] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.217188] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.217221] kasan_atomics+0x1dc/0x310 [ 15.217245] ? __pfx_kasan_atomics+0x10/0x10 [ 15.217272] ? __pfx_read_tsc+0x10/0x10 [ 15.217295] ? ktime_get_ts64+0x86/0x230 [ 15.217321] kunit_try_run_case+0x1a5/0x480 [ 15.217346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217372] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.217398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.217443] ? __kthread_parkme+0x82/0x180 [ 15.217473] ? preempt_count_sub+0x50/0x80 [ 15.217498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.217561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.217589] kthread+0x337/0x6f0 [ 15.217610] ? trace_preempt_on+0x20/0xc0 [ 15.217643] ? __pfx_kthread+0x10/0x10 [ 15.217666] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.217689] ? calculate_sigpending+0x7b/0xa0 [ 15.217726] ? __pfx_kthread+0x10/0x10 [ 15.217749] ret_from_fork+0x116/0x1d0 [ 15.217769] ? __pfx_kthread+0x10/0x10 [ 15.217799] ret_from_fork_asm+0x1a/0x30 [ 15.217832] </TASK> [ 15.217843] [ 15.227494] Allocated by task 283: [ 15.227646] kasan_save_stack+0x45/0x70 [ 15.227802] kasan_save_track+0x18/0x40 [ 15.227940] kasan_save_alloc_info+0x3b/0x50 [ 15.228091] __kasan_kmalloc+0xb7/0xc0 [ 15.228226] __kmalloc_cache_noprof+0x189/0x420 [ 15.228391] kasan_atomics+0x95/0x310 [ 15.228547] kunit_try_run_case+0x1a5/0x480 [ 15.228759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.228971] kthread+0x337/0x6f0 [ 15.229093] ret_from_fork+0x116/0x1d0 [ 15.229226] ret_from_fork_asm+0x1a/0x30 [ 15.229366] [ 15.229439] The buggy address belongs to the object at ffff8881026d6200 [ 15.229439] which belongs to the cache kmalloc-64 of size 64 [ 15.229984] The buggy address is located 0 bytes to the right of [ 15.229984] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.230531] [ 15.230630] The buggy address belongs to the physical page: [ 15.230804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.231043] flags: 0x200000000000000(node=0|zone=2) [ 15.231210] page_type: f5(slab) [ 15.231333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.231634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.231975] page dumped because: kasan: bad access detected [ 15.232180] [ 15.232250] Memory state around the buggy address: [ 15.232408] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.232632] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.232874] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.233266] ^ [ 15.233561] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233876] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.234182] ================================================================== [ 15.197417] ================================================================== [ 15.197780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.198015] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.198510] [ 15.198618] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.198662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.198675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.198698] Call Trace: [ 15.198712] <TASK> [ 15.198727] dump_stack_lvl+0x73/0xb0 [ 15.198757] print_report+0xd1/0x610 [ 15.198795] ? __virt_addr_valid+0x1db/0x2d0 [ 15.198820] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.198843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.198881] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.198905] kasan_report+0x141/0x180 [ 15.198928] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.198957] __asan_report_load4_noabort+0x18/0x20 [ 15.198984] kasan_atomics_helper+0x4b54/0x5450 [ 15.199009] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.199034] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.199067] kasan_atomics+0x1dc/0x310 [ 15.199092] ? __pfx_kasan_atomics+0x10/0x10 [ 15.199118] ? __pfx_read_tsc+0x10/0x10 [ 15.199141] ? ktime_get_ts64+0x86/0x230 [ 15.199177] kunit_try_run_case+0x1a5/0x480 [ 15.199205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.199242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.199269] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.199295] ? __kthread_parkme+0x82/0x180 [ 15.199318] ? preempt_count_sub+0x50/0x80 [ 15.199345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.199371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.199398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.199435] kthread+0x337/0x6f0 [ 15.199466] ? trace_preempt_on+0x20/0xc0 [ 15.199490] ? __pfx_kthread+0x10/0x10 [ 15.199513] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.199545] ? calculate_sigpending+0x7b/0xa0 [ 15.199571] ? __pfx_kthread+0x10/0x10 [ 15.199604] ret_from_fork+0x116/0x1d0 [ 15.199625] ? __pfx_kthread+0x10/0x10 [ 15.199648] ret_from_fork_asm+0x1a/0x30 [ 15.199681] </TASK> [ 15.199693] [ 15.207292] Allocated by task 283: [ 15.207526] kasan_save_stack+0x45/0x70 [ 15.207839] kasan_save_track+0x18/0x40 [ 15.208066] kasan_save_alloc_info+0x3b/0x50 [ 15.208263] __kasan_kmalloc+0xb7/0xc0 [ 15.208456] __kmalloc_cache_noprof+0x189/0x420 [ 15.208695] kasan_atomics+0x95/0x310 [ 15.208911] kunit_try_run_case+0x1a5/0x480 [ 15.209071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.209255] kthread+0x337/0x6f0 [ 15.209382] ret_from_fork+0x116/0x1d0 [ 15.209532] ret_from_fork_asm+0x1a/0x30 [ 15.209674] [ 15.209749] The buggy address belongs to the object at ffff8881026d6200 [ 15.209749] which belongs to the cache kmalloc-64 of size 64 [ 15.210265] The buggy address is located 0 bytes to the right of [ 15.210265] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.210811] [ 15.210908] The buggy address belongs to the physical page: [ 15.211139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.211379] flags: 0x200000000000000(node=0|zone=2) [ 15.211551] page_type: f5(slab) [ 15.211670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.212095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.212475] page dumped because: kasan: bad access detected [ 15.212758] [ 15.212854] Memory state around the buggy address: [ 15.213081] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.213422] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.213768] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.214063] ^ [ 15.214219] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214485] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214819] ================================================================== [ 15.677158] ================================================================== [ 15.677511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.677839] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.678191] [ 15.678299] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.678346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.678358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.678381] Call Trace: [ 15.678419] <TASK> [ 15.678438] dump_stack_lvl+0x73/0xb0 [ 15.678478] print_report+0xd1/0x610 [ 15.678503] ? __virt_addr_valid+0x1db/0x2d0 [ 15.678528] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.678561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.678587] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.678611] kasan_report+0x141/0x180 [ 15.678645] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.678674] __asan_report_load4_noabort+0x18/0x20 [ 15.678701] kasan_atomics_helper+0x4a02/0x5450 [ 15.678734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.678759] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.678792] kasan_atomics+0x1dc/0x310 [ 15.678827] ? __pfx_kasan_atomics+0x10/0x10 [ 15.678853] ? __pfx_read_tsc+0x10/0x10 [ 15.678876] ? ktime_get_ts64+0x86/0x230 [ 15.678911] kunit_try_run_case+0x1a5/0x480 [ 15.678938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.678973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.679002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.679029] ? __kthread_parkme+0x82/0x180 [ 15.679060] ? preempt_count_sub+0x50/0x80 [ 15.679087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.679114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.679151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.679178] kthread+0x337/0x6f0 [ 15.679208] ? trace_preempt_on+0x20/0xc0 [ 15.679234] ? __pfx_kthread+0x10/0x10 [ 15.679256] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.679290] ? calculate_sigpending+0x7b/0xa0 [ 15.679317] ? __pfx_kthread+0x10/0x10 [ 15.679340] ret_from_fork+0x116/0x1d0 [ 15.679368] ? __pfx_kthread+0x10/0x10 [ 15.679390] ret_from_fork_asm+0x1a/0x30 [ 15.679445] </TASK> [ 15.679464] [ 15.686692] Allocated by task 283: [ 15.686876] kasan_save_stack+0x45/0x70 [ 15.687080] kasan_save_track+0x18/0x40 [ 15.687285] kasan_save_alloc_info+0x3b/0x50 [ 15.687531] __kasan_kmalloc+0xb7/0xc0 [ 15.687703] __kmalloc_cache_noprof+0x189/0x420 [ 15.687936] kasan_atomics+0x95/0x310 [ 15.688102] kunit_try_run_case+0x1a5/0x480 [ 15.688324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.688607] kthread+0x337/0x6f0 [ 15.688788] ret_from_fork+0x116/0x1d0 [ 15.688979] ret_from_fork_asm+0x1a/0x30 [ 15.689166] [ 15.689279] The buggy address belongs to the object at ffff8881026d6200 [ 15.689279] which belongs to the cache kmalloc-64 of size 64 [ 15.689780] The buggy address is located 0 bytes to the right of [ 15.689780] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.690148] [ 15.690221] The buggy address belongs to the physical page: [ 15.690414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.690808] flags: 0x200000000000000(node=0|zone=2) [ 15.691047] page_type: f5(slab) [ 15.691223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.691626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.691899] page dumped because: kasan: bad access detected [ 15.692072] [ 15.692143] Memory state around the buggy address: [ 15.692303] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.692559] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.692882] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.693228] ^ [ 15.693500] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.693862] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694188] ================================================================== [ 15.713900] ================================================================== [ 15.714262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.714677] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.714983] [ 15.715124] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.715190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.715203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.715237] Call Trace: [ 15.715258] <TASK> [ 15.715277] dump_stack_lvl+0x73/0xb0 [ 15.715308] print_report+0xd1/0x610 [ 15.715332] ? __virt_addr_valid+0x1db/0x2d0 [ 15.715358] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.715382] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.715426] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.715460] kasan_report+0x141/0x180 [ 15.715484] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.715512] __asan_report_load4_noabort+0x18/0x20 [ 15.715540] kasan_atomics_helper+0x49e8/0x5450 [ 15.715566] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.715591] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.715624] kasan_atomics+0x1dc/0x310 [ 15.715649] ? __pfx_kasan_atomics+0x10/0x10 [ 15.715676] ? __pfx_read_tsc+0x10/0x10 [ 15.715699] ? ktime_get_ts64+0x86/0x230 [ 15.715725] kunit_try_run_case+0x1a5/0x480 [ 15.715762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.715788] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.715825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.715852] ? __kthread_parkme+0x82/0x180 [ 15.715876] ? preempt_count_sub+0x50/0x80 [ 15.715902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.715930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.715957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.715984] kthread+0x337/0x6f0 [ 15.716006] ? trace_preempt_on+0x20/0xc0 [ 15.716031] ? __pfx_kthread+0x10/0x10 [ 15.716054] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.716078] ? calculate_sigpending+0x7b/0xa0 [ 15.716104] ? __pfx_kthread+0x10/0x10 [ 15.716127] ret_from_fork+0x116/0x1d0 [ 15.716148] ? __pfx_kthread+0x10/0x10 [ 15.716170] ret_from_fork_asm+0x1a/0x30 [ 15.716204] </TASK> [ 15.716215] [ 15.723307] Allocated by task 283: [ 15.723533] kasan_save_stack+0x45/0x70 [ 15.723771] kasan_save_track+0x18/0x40 [ 15.723965] kasan_save_alloc_info+0x3b/0x50 [ 15.724190] __kasan_kmalloc+0xb7/0xc0 [ 15.724355] __kmalloc_cache_noprof+0x189/0x420 [ 15.724625] kasan_atomics+0x95/0x310 [ 15.724822] kunit_try_run_case+0x1a5/0x480 [ 15.725028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.725271] kthread+0x337/0x6f0 [ 15.725469] ret_from_fork+0x116/0x1d0 [ 15.725676] ret_from_fork_asm+0x1a/0x30 [ 15.725866] [ 15.725967] The buggy address belongs to the object at ffff8881026d6200 [ 15.725967] which belongs to the cache kmalloc-64 of size 64 [ 15.726512] The buggy address is located 0 bytes to the right of [ 15.726512] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.726977] [ 15.727052] The buggy address belongs to the physical page: [ 15.727232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.727509] flags: 0x200000000000000(node=0|zone=2) [ 15.727761] page_type: f5(slab) [ 15.727930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.728266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.728643] page dumped because: kasan: bad access detected [ 15.728844] [ 15.728914] Memory state around the buggy address: [ 15.729069] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.729285] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.729581] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.729923] ^ [ 15.730169] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.730568] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.730927] ================================================================== [ 16.140889] ================================================================== [ 16.141403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.141879] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.142234] [ 16.142326] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.142373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.142387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.142420] Call Trace: [ 16.142439] <TASK> [ 16.142475] dump_stack_lvl+0x73/0xb0 [ 16.142508] print_report+0xd1/0x610 [ 16.142532] ? __virt_addr_valid+0x1db/0x2d0 [ 16.142558] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.142581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.142606] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.142630] kasan_report+0x141/0x180 [ 16.142653] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.142681] kasan_check_range+0x10c/0x1c0 [ 16.142706] __kasan_check_write+0x18/0x20 [ 16.142728] kasan_atomics_helper+0x1c18/0x5450 [ 16.142752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.142777] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.142810] kasan_atomics+0x1dc/0x310 [ 16.142833] ? __pfx_kasan_atomics+0x10/0x10 [ 16.142860] ? __pfx_read_tsc+0x10/0x10 [ 16.142884] ? ktime_get_ts64+0x86/0x230 [ 16.142911] kunit_try_run_case+0x1a5/0x480 [ 16.142938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.142963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.142990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.143016] ? __kthread_parkme+0x82/0x180 [ 16.143039] ? preempt_count_sub+0x50/0x80 [ 16.143065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.143092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.143118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.143146] kthread+0x337/0x6f0 [ 16.143166] ? trace_preempt_on+0x20/0xc0 [ 16.143192] ? __pfx_kthread+0x10/0x10 [ 16.143214] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.143238] ? calculate_sigpending+0x7b/0xa0 [ 16.143264] ? __pfx_kthread+0x10/0x10 [ 16.143288] ret_from_fork+0x116/0x1d0 [ 16.143308] ? __pfx_kthread+0x10/0x10 [ 16.143330] ret_from_fork_asm+0x1a/0x30 [ 16.143363] </TASK> [ 16.143375] [ 16.150703] Allocated by task 283: [ 16.150887] kasan_save_stack+0x45/0x70 [ 16.151089] kasan_save_track+0x18/0x40 [ 16.151281] kasan_save_alloc_info+0x3b/0x50 [ 16.151522] __kasan_kmalloc+0xb7/0xc0 [ 16.151725] __kmalloc_cache_noprof+0x189/0x420 [ 16.151913] kasan_atomics+0x95/0x310 [ 16.152050] kunit_try_run_case+0x1a5/0x480 [ 16.152200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.152388] kthread+0x337/0x6f0 [ 16.152520] ret_from_fork+0x116/0x1d0 [ 16.152655] ret_from_fork_asm+0x1a/0x30 [ 16.152850] [ 16.152956] The buggy address belongs to the object at ffff8881026d6200 [ 16.152956] which belongs to the cache kmalloc-64 of size 64 [ 16.153477] The buggy address is located 0 bytes to the right of [ 16.153477] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.154019] [ 16.154096] The buggy address belongs to the physical page: [ 16.154271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.154796] flags: 0x200000000000000(node=0|zone=2) [ 16.155031] page_type: f5(slab) [ 16.155204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.155721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.156006] page dumped because: kasan: bad access detected [ 16.156228] [ 16.156323] Memory state around the buggy address: [ 16.156544] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.156759] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.156972] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.157294] ^ [ 16.157577] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.157896] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.158194] ================================================================== [ 15.983934] ================================================================== [ 15.984255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.984931] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.985301] [ 15.985419] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.985613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.985629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.985653] Call Trace: [ 15.985672] <TASK> [ 15.985692] dump_stack_lvl+0x73/0xb0 [ 15.985723] print_report+0xd1/0x610 [ 15.985749] ? __virt_addr_valid+0x1db/0x2d0 [ 15.985773] ? kasan_atomics_helper+0x177f/0x5450 [ 15.985796] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.985823] ? kasan_atomics_helper+0x177f/0x5450 [ 15.985846] kasan_report+0x141/0x180 [ 15.985869] ? kasan_atomics_helper+0x177f/0x5450 [ 15.985898] kasan_check_range+0x10c/0x1c0 [ 15.985923] __kasan_check_write+0x18/0x20 [ 15.985944] kasan_atomics_helper+0x177f/0x5450 [ 15.985968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.985994] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.986026] kasan_atomics+0x1dc/0x310 [ 15.986051] ? __pfx_kasan_atomics+0x10/0x10 [ 15.986077] ? __pfx_read_tsc+0x10/0x10 [ 15.986101] ? ktime_get_ts64+0x86/0x230 [ 15.986127] kunit_try_run_case+0x1a5/0x480 [ 15.986154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.986179] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.986207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.986234] ? __kthread_parkme+0x82/0x180 [ 15.986256] ? preempt_count_sub+0x50/0x80 [ 15.986283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.986310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.986337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.986365] kthread+0x337/0x6f0 [ 15.986386] ? trace_preempt_on+0x20/0xc0 [ 15.986426] ? __pfx_kthread+0x10/0x10 [ 15.986459] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.986483] ? calculate_sigpending+0x7b/0xa0 [ 15.986510] ? __pfx_kthread+0x10/0x10 [ 15.986534] ret_from_fork+0x116/0x1d0 [ 15.986555] ? __pfx_kthread+0x10/0x10 [ 15.986577] ret_from_fork_asm+0x1a/0x30 [ 15.986610] </TASK> [ 15.986622] [ 15.995942] Allocated by task 283: [ 15.996342] kasan_save_stack+0x45/0x70 [ 15.996575] kasan_save_track+0x18/0x40 [ 15.996756] kasan_save_alloc_info+0x3b/0x50 [ 15.996952] __kasan_kmalloc+0xb7/0xc0 [ 15.997129] __kmalloc_cache_noprof+0x189/0x420 [ 15.997328] kasan_atomics+0x95/0x310 [ 15.997834] kunit_try_run_case+0x1a5/0x480 [ 15.998018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.998365] kthread+0x337/0x6f0 [ 15.998617] ret_from_fork+0x116/0x1d0 [ 15.998870] ret_from_fork_asm+0x1a/0x30 [ 15.999133] [ 15.999235] The buggy address belongs to the object at ffff8881026d6200 [ 15.999235] which belongs to the cache kmalloc-64 of size 64 [ 15.999873] The buggy address is located 0 bytes to the right of [ 15.999873] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.000385] [ 16.000711] The buggy address belongs to the physical page: [ 16.000925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.001380] flags: 0x200000000000000(node=0|zone=2) [ 16.001714] page_type: f5(slab) [ 16.001955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.002318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.002817] page dumped because: kasan: bad access detected [ 16.003121] [ 16.003218] Memory state around the buggy address: [ 16.003588] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.003982] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.004343] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.004759] ^ [ 16.005026] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.005336] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.005783] ================================================================== [ 15.755219] ================================================================== [ 15.755954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.757196] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.758114] [ 15.758241] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.758295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.758309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.758334] Call Trace: [ 15.758355] <TASK> [ 15.758377] dump_stack_lvl+0x73/0xb0 [ 15.758603] print_report+0xd1/0x610 [ 15.758643] ? __virt_addr_valid+0x1db/0x2d0 [ 15.758669] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.758694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.758726] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.758750] kasan_report+0x141/0x180 [ 15.758773] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.758801] __asan_report_load4_noabort+0x18/0x20 [ 15.758828] kasan_atomics_helper+0x49ce/0x5450 [ 15.758853] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.758878] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.758911] kasan_atomics+0x1dc/0x310 [ 15.758937] ? __pfx_kasan_atomics+0x10/0x10 [ 15.758963] ? __pfx_read_tsc+0x10/0x10 [ 15.758986] ? ktime_get_ts64+0x86/0x230 [ 15.759013] kunit_try_run_case+0x1a5/0x480 [ 15.759040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.759065] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.759093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.759119] ? __kthread_parkme+0x82/0x180 [ 15.759142] ? preempt_count_sub+0x50/0x80 [ 15.759168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.759194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.759222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.759249] kthread+0x337/0x6f0 [ 15.759270] ? trace_preempt_on+0x20/0xc0 [ 15.759295] ? __pfx_kthread+0x10/0x10 [ 15.759317] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.759340] ? calculate_sigpending+0x7b/0xa0 [ 15.759366] ? __pfx_kthread+0x10/0x10 [ 15.759389] ret_from_fork+0x116/0x1d0 [ 15.759422] ? __pfx_kthread+0x10/0x10 [ 15.759445] ret_from_fork_asm+0x1a/0x30 [ 15.759488] </TASK> [ 15.759501] [ 15.771874] Allocated by task 283: [ 15.772026] kasan_save_stack+0x45/0x70 [ 15.772185] kasan_save_track+0x18/0x40 [ 15.772326] kasan_save_alloc_info+0x3b/0x50 [ 15.772506] __kasan_kmalloc+0xb7/0xc0 [ 15.772641] __kmalloc_cache_noprof+0x189/0x420 [ 15.772923] kasan_atomics+0x95/0x310 [ 15.773115] kunit_try_run_case+0x1a5/0x480 [ 15.773326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.773559] kthread+0x337/0x6f0 [ 15.773684] ret_from_fork+0x116/0x1d0 [ 15.773872] ret_from_fork_asm+0x1a/0x30 [ 15.774094] [ 15.774189] The buggy address belongs to the object at ffff8881026d6200 [ 15.774189] which belongs to the cache kmalloc-64 of size 64 [ 15.774890] The buggy address is located 0 bytes to the right of [ 15.774890] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.775379] [ 15.775530] The buggy address belongs to the physical page: [ 15.775771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.776040] flags: 0x200000000000000(node=0|zone=2) [ 15.776266] page_type: f5(slab) [ 15.776473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.776852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.777212] page dumped because: kasan: bad access detected [ 15.777465] [ 15.777553] Memory state around the buggy address: [ 15.777743] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.777959] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.778296] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.778691] ^ [ 15.778859] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.779117] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.779621] ================================================================== [ 15.471814] ================================================================== [ 15.472253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.472685] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.473003] [ 15.473126] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.473171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.473193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.473216] Call Trace: [ 15.473234] <TASK> [ 15.473262] dump_stack_lvl+0x73/0xb0 [ 15.473292] print_report+0xd1/0x610 [ 15.473316] ? __virt_addr_valid+0x1db/0x2d0 [ 15.473349] ? kasan_atomics_helper+0xc70/0x5450 [ 15.473371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.473420] ? kasan_atomics_helper+0xc70/0x5450 [ 15.473445] kasan_report+0x141/0x180 [ 15.473477] ? kasan_atomics_helper+0xc70/0x5450 [ 15.473505] kasan_check_range+0x10c/0x1c0 [ 15.473540] __kasan_check_write+0x18/0x20 [ 15.473561] kasan_atomics_helper+0xc70/0x5450 [ 15.473596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.473621] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.473654] kasan_atomics+0x1dc/0x310 [ 15.473678] ? __pfx_kasan_atomics+0x10/0x10 [ 15.473705] ? __pfx_read_tsc+0x10/0x10 [ 15.473736] ? ktime_get_ts64+0x86/0x230 [ 15.473763] kunit_try_run_case+0x1a5/0x480 [ 15.473800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473825] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.473852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.473885] ? __kthread_parkme+0x82/0x180 [ 15.473908] ? preempt_count_sub+0x50/0x80 [ 15.473935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.473998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.474027] kthread+0x337/0x6f0 [ 15.474047] ? trace_preempt_on+0x20/0xc0 [ 15.474072] ? __pfx_kthread+0x10/0x10 [ 15.474095] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.474118] ? calculate_sigpending+0x7b/0xa0 [ 15.474144] ? __pfx_kthread+0x10/0x10 [ 15.474167] ret_from_fork+0x116/0x1d0 [ 15.474188] ? __pfx_kthread+0x10/0x10 [ 15.474210] ret_from_fork_asm+0x1a/0x30 [ 15.474243] </TASK> [ 15.474254] [ 15.481631] Allocated by task 283: [ 15.481818] kasan_save_stack+0x45/0x70 [ 15.482049] kasan_save_track+0x18/0x40 [ 15.482247] kasan_save_alloc_info+0x3b/0x50 [ 15.482498] __kasan_kmalloc+0xb7/0xc0 [ 15.482673] __kmalloc_cache_noprof+0x189/0x420 [ 15.482892] kasan_atomics+0x95/0x310 [ 15.483088] kunit_try_run_case+0x1a5/0x480 [ 15.483290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.484567] kthread+0x337/0x6f0 [ 15.485637] ret_from_fork+0x116/0x1d0 [ 15.485811] ret_from_fork_asm+0x1a/0x30 [ 15.486849] [ 15.486937] The buggy address belongs to the object at ffff8881026d6200 [ 15.486937] which belongs to the cache kmalloc-64 of size 64 [ 15.487286] The buggy address is located 0 bytes to the right of [ 15.487286] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.487685] [ 15.487787] The buggy address belongs to the physical page: [ 15.487998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.488235] flags: 0x200000000000000(node=0|zone=2) [ 15.488447] page_type: f5(slab) [ 15.488659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.488996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.490208] page dumped because: kasan: bad access detected [ 15.490420] [ 15.490509] Memory state around the buggy address: [ 15.490700] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.491041] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.491360] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.491687] ^ [ 15.493508] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.494641] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.494929] ================================================================== [ 15.533983] ================================================================== [ 15.534382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.534780] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.535138] [ 15.535248] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.535294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.535306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.535328] Call Trace: [ 15.535348] <TASK> [ 15.535366] dump_stack_lvl+0x73/0xb0 [ 15.535417] print_report+0xd1/0x610 [ 15.535441] ? __virt_addr_valid+0x1db/0x2d0 [ 15.535474] ? kasan_atomics_helper+0xde0/0x5450 [ 15.535496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.535521] ? kasan_atomics_helper+0xde0/0x5450 [ 15.535545] kasan_report+0x141/0x180 [ 15.535568] ? kasan_atomics_helper+0xde0/0x5450 [ 15.535596] kasan_check_range+0x10c/0x1c0 [ 15.535621] __kasan_check_write+0x18/0x20 [ 15.535651] kasan_atomics_helper+0xde0/0x5450 [ 15.535675] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.535700] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.535744] kasan_atomics+0x1dc/0x310 [ 15.535768] ? __pfx_kasan_atomics+0x10/0x10 [ 15.535794] ? __pfx_read_tsc+0x10/0x10 [ 15.535817] ? ktime_get_ts64+0x86/0x230 [ 15.535843] kunit_try_run_case+0x1a5/0x480 [ 15.535870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.535895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.535922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.535947] ? __kthread_parkme+0x82/0x180 [ 15.535970] ? preempt_count_sub+0x50/0x80 [ 15.535996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.536022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.536049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.536078] kthread+0x337/0x6f0 [ 15.536102] ? trace_preempt_on+0x20/0xc0 [ 15.536127] ? __pfx_kthread+0x10/0x10 [ 15.536149] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.536172] ? calculate_sigpending+0x7b/0xa0 [ 15.536199] ? __pfx_kthread+0x10/0x10 [ 15.536222] ret_from_fork+0x116/0x1d0 [ 15.536242] ? __pfx_kthread+0x10/0x10 [ 15.536263] ret_from_fork_asm+0x1a/0x30 [ 15.536307] </TASK> [ 15.536320] [ 15.543377] Allocated by task 283: [ 15.543538] kasan_save_stack+0x45/0x70 [ 15.543685] kasan_save_track+0x18/0x40 [ 15.543891] kasan_save_alloc_info+0x3b/0x50 [ 15.544099] __kasan_kmalloc+0xb7/0xc0 [ 15.544286] __kmalloc_cache_noprof+0x189/0x420 [ 15.544538] kasan_atomics+0x95/0x310 [ 15.544729] kunit_try_run_case+0x1a5/0x480 [ 15.544937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.545137] kthread+0x337/0x6f0 [ 15.545257] ret_from_fork+0x116/0x1d0 [ 15.545480] ret_from_fork_asm+0x1a/0x30 [ 15.545693] [ 15.545814] The buggy address belongs to the object at ffff8881026d6200 [ 15.545814] which belongs to the cache kmalloc-64 of size 64 [ 15.546214] The buggy address is located 0 bytes to the right of [ 15.546214] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.546592] [ 15.546692] The buggy address belongs to the physical page: [ 15.546961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.547304] flags: 0x200000000000000(node=0|zone=2) [ 15.547568] page_type: f5(slab) [ 15.547733] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.548064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.548310] page dumped because: kasan: bad access detected [ 15.548536] [ 15.548630] Memory state around the buggy address: [ 15.548866] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.549219] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.549587] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.549885] ^ [ 15.550038] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.550349] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.550670] ================================================================== [ 15.658908] ================================================================== [ 15.659273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.659919] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.660274] [ 15.660437] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.660503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.660526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.660550] Call Trace: [ 15.660572] <TASK> [ 15.660603] dump_stack_lvl+0x73/0xb0 [ 15.660635] print_report+0xd1/0x610 [ 15.660663] ? __virt_addr_valid+0x1db/0x2d0 [ 15.660690] ? kasan_atomics_helper+0x1148/0x5450 [ 15.660714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.660741] ? kasan_atomics_helper+0x1148/0x5450 [ 15.660765] kasan_report+0x141/0x180 [ 15.660789] ? kasan_atomics_helper+0x1148/0x5450 [ 15.660818] kasan_check_range+0x10c/0x1c0 [ 15.660844] __kasan_check_write+0x18/0x20 [ 15.660875] kasan_atomics_helper+0x1148/0x5450 [ 15.660899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.660924] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.660968] kasan_atomics+0x1dc/0x310 [ 15.660993] ? __pfx_kasan_atomics+0x10/0x10 [ 15.661019] ? __pfx_read_tsc+0x10/0x10 [ 15.661043] ? ktime_get_ts64+0x86/0x230 [ 15.661070] kunit_try_run_case+0x1a5/0x480 [ 15.661097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.661122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.661149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.661176] ? __kthread_parkme+0x82/0x180 [ 15.661199] ? preempt_count_sub+0x50/0x80 [ 15.661235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.661261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.661326] kthread+0x337/0x6f0 [ 15.661347] ? trace_preempt_on+0x20/0xc0 [ 15.661373] ? __pfx_kthread+0x10/0x10 [ 15.661421] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.661445] ? calculate_sigpending+0x7b/0xa0 [ 15.661486] ? __pfx_kthread+0x10/0x10 [ 15.661510] ret_from_fork+0x116/0x1d0 [ 15.661531] ? __pfx_kthread+0x10/0x10 [ 15.661554] ret_from_fork_asm+0x1a/0x30 [ 15.661595] </TASK> [ 15.661608] [ 15.668972] Allocated by task 283: [ 15.669152] kasan_save_stack+0x45/0x70 [ 15.669365] kasan_save_track+0x18/0x40 [ 15.669579] kasan_save_alloc_info+0x3b/0x50 [ 15.669791] __kasan_kmalloc+0xb7/0xc0 [ 15.669927] __kmalloc_cache_noprof+0x189/0x420 [ 15.670085] kasan_atomics+0x95/0x310 [ 15.670300] kunit_try_run_case+0x1a5/0x480 [ 15.670546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.670798] kthread+0x337/0x6f0 [ 15.670921] ret_from_fork+0x116/0x1d0 [ 15.671058] ret_from_fork_asm+0x1a/0x30 [ 15.671255] [ 15.671352] The buggy address belongs to the object at ffff8881026d6200 [ 15.671352] which belongs to the cache kmalloc-64 of size 64 [ 15.671936] The buggy address is located 0 bytes to the right of [ 15.671936] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.672343] [ 15.672442] The buggy address belongs to the physical page: [ 15.672628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.672983] flags: 0x200000000000000(node=0|zone=2) [ 15.673233] page_type: f5(slab) [ 15.673438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.673790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.674123] page dumped because: kasan: bad access detected [ 15.674315] [ 15.674385] Memory state around the buggy address: [ 15.674628] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.674986] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.675331] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.675589] ^ [ 15.675769] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.676117] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.676471] ================================================================== [ 15.551335] ================================================================== [ 15.551817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.552156] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.552479] [ 15.552611] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.552669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.552683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.552705] Call Trace: [ 15.552723] <TASK> [ 15.552741] dump_stack_lvl+0x73/0xb0 [ 15.552771] print_report+0xd1/0x610 [ 15.552795] ? __virt_addr_valid+0x1db/0x2d0 [ 15.552821] ? kasan_atomics_helper+0xe78/0x5450 [ 15.552843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.552868] ? kasan_atomics_helper+0xe78/0x5450 [ 15.552891] kasan_report+0x141/0x180 [ 15.552924] ? kasan_atomics_helper+0xe78/0x5450 [ 15.552953] kasan_check_range+0x10c/0x1c0 [ 15.552979] __kasan_check_write+0x18/0x20 [ 15.553012] kasan_atomics_helper+0xe78/0x5450 [ 15.553037] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.553061] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.553094] kasan_atomics+0x1dc/0x310 [ 15.553119] ? __pfx_kasan_atomics+0x10/0x10 [ 15.553145] ? __pfx_read_tsc+0x10/0x10 [ 15.553168] ? ktime_get_ts64+0x86/0x230 [ 15.553193] kunit_try_run_case+0x1a5/0x480 [ 15.553220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.553245] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.553272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.553297] ? __kthread_parkme+0x82/0x180 [ 15.553320] ? preempt_count_sub+0x50/0x80 [ 15.553346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.553371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.553424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.553468] kthread+0x337/0x6f0 [ 15.553490] ? trace_preempt_on+0x20/0xc0 [ 15.553515] ? __pfx_kthread+0x10/0x10 [ 15.553537] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.553560] ? calculate_sigpending+0x7b/0xa0 [ 15.553586] ? __pfx_kthread+0x10/0x10 [ 15.553610] ret_from_fork+0x116/0x1d0 [ 15.553630] ? __pfx_kthread+0x10/0x10 [ 15.553653] ret_from_fork_asm+0x1a/0x30 [ 15.553685] </TASK> [ 15.553697] [ 15.560940] Allocated by task 283: [ 15.561075] kasan_save_stack+0x45/0x70 [ 15.561222] kasan_save_track+0x18/0x40 [ 15.561358] kasan_save_alloc_info+0x3b/0x50 [ 15.561618] __kasan_kmalloc+0xb7/0xc0 [ 15.561836] __kmalloc_cache_noprof+0x189/0x420 [ 15.562080] kasan_atomics+0x95/0x310 [ 15.562284] kunit_try_run_case+0x1a5/0x480 [ 15.562538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.562810] kthread+0x337/0x6f0 [ 15.562994] ret_from_fork+0x116/0x1d0 [ 15.563166] ret_from_fork_asm+0x1a/0x30 [ 15.563348] [ 15.563465] The buggy address belongs to the object at ffff8881026d6200 [ 15.563465] which belongs to the cache kmalloc-64 of size 64 [ 15.563910] The buggy address is located 0 bytes to the right of [ 15.563910] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.564273] [ 15.564349] The buggy address belongs to the physical page: [ 15.564623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.564981] flags: 0x200000000000000(node=0|zone=2) [ 15.565213] page_type: f5(slab) [ 15.565380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.565749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.566080] page dumped because: kasan: bad access detected [ 15.566250] [ 15.566319] Memory state around the buggy address: [ 15.566522] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.566874] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.567222] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.567607] ^ [ 15.567856] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.568085] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.568461] ================================================================== [ 15.865719] ================================================================== [ 15.866597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.867262] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.867926] [ 15.868127] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.868177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.868190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.868214] Call Trace: [ 15.868234] <TASK> [ 15.868252] dump_stack_lvl+0x73/0xb0 [ 15.868312] print_report+0xd1/0x610 [ 15.868339] ? __virt_addr_valid+0x1db/0x2d0 [ 15.868365] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.868389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.868435] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.868467] kasan_report+0x141/0x180 [ 15.868491] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.868520] __asan_report_store8_noabort+0x1b/0x30 [ 15.868548] kasan_atomics_helper+0x50d4/0x5450 [ 15.868573] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.868598] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.868631] kasan_atomics+0x1dc/0x310 [ 15.868656] ? __pfx_kasan_atomics+0x10/0x10 [ 15.868684] ? __pfx_read_tsc+0x10/0x10 [ 15.868709] ? ktime_get_ts64+0x86/0x230 [ 15.868735] kunit_try_run_case+0x1a5/0x480 [ 15.868763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.868788] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.868815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.868841] ? __kthread_parkme+0x82/0x180 [ 15.868865] ? preempt_count_sub+0x50/0x80 [ 15.868890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.868917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.868943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.868971] kthread+0x337/0x6f0 [ 15.868992] ? trace_preempt_on+0x20/0xc0 [ 15.869017] ? __pfx_kthread+0x10/0x10 [ 15.869039] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.869062] ? calculate_sigpending+0x7b/0xa0 [ 15.869088] ? __pfx_kthread+0x10/0x10 [ 15.869112] ret_from_fork+0x116/0x1d0 [ 15.869132] ? __pfx_kthread+0x10/0x10 [ 15.869154] ret_from_fork_asm+0x1a/0x30 [ 15.869188] </TASK> [ 15.869198] [ 15.879114] Allocated by task 283: [ 15.879512] kasan_save_stack+0x45/0x70 [ 15.879716] kasan_save_track+0x18/0x40 [ 15.879895] kasan_save_alloc_info+0x3b/0x50 [ 15.880093] __kasan_kmalloc+0xb7/0xc0 [ 15.880274] __kmalloc_cache_noprof+0x189/0x420 [ 15.880797] kasan_atomics+0x95/0x310 [ 15.880966] kunit_try_run_case+0x1a5/0x480 [ 15.881358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.881758] kthread+0x337/0x6f0 [ 15.881934] ret_from_fork+0x116/0x1d0 [ 15.882239] ret_from_fork_asm+0x1a/0x30 [ 15.882622] [ 15.882731] The buggy address belongs to the object at ffff8881026d6200 [ 15.882731] which belongs to the cache kmalloc-64 of size 64 [ 15.883479] The buggy address is located 0 bytes to the right of [ 15.883479] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.884153] [ 15.884250] The buggy address belongs to the physical page: [ 15.884659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.885051] flags: 0x200000000000000(node=0|zone=2) [ 15.885289] page_type: f5(slab) [ 15.885630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.885952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.886342] page dumped because: kasan: bad access detected [ 15.886703] [ 15.886806] Memory state around the buggy address: [ 15.887182] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.887671] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.888047] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.888433] ^ [ 15.888695] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.888999] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.889298] ================================================================== [ 15.344666] ================================================================== [ 15.345041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.345419] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.345766] [ 15.345862] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.345909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.345921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.345945] Call Trace: [ 15.345965] <TASK> [ 15.345983] dump_stack_lvl+0x73/0xb0 [ 15.346013] print_report+0xd1/0x610 [ 15.346038] ? __virt_addr_valid+0x1db/0x2d0 [ 15.346064] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.346088] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.346114] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.346150] kasan_report+0x141/0x180 [ 15.346179] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.346207] kasan_check_range+0x10c/0x1c0 [ 15.346244] __kasan_check_write+0x18/0x20 [ 15.346265] kasan_atomics_helper+0x7c7/0x5450 [ 15.346289] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.346315] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.346347] kasan_atomics+0x1dc/0x310 [ 15.346372] ? __pfx_kasan_atomics+0x10/0x10 [ 15.346419] ? __pfx_read_tsc+0x10/0x10 [ 15.346458] ? ktime_get_ts64+0x86/0x230 [ 15.346484] kunit_try_run_case+0x1a5/0x480 [ 15.346521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.346574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.346600] ? __kthread_parkme+0x82/0x180 [ 15.346633] ? preempt_count_sub+0x50/0x80 [ 15.346659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.346722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.346750] kthread+0x337/0x6f0 [ 15.346770] ? trace_preempt_on+0x20/0xc0 [ 15.346796] ? __pfx_kthread+0x10/0x10 [ 15.346818] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.346842] ? calculate_sigpending+0x7b/0xa0 [ 15.346869] ? __pfx_kthread+0x10/0x10 [ 15.346892] ret_from_fork+0x116/0x1d0 [ 15.346912] ? __pfx_kthread+0x10/0x10 [ 15.346934] ret_from_fork_asm+0x1a/0x30 [ 15.346968] </TASK> [ 15.346979] [ 15.354129] Allocated by task 283: [ 15.354330] kasan_save_stack+0x45/0x70 [ 15.354575] kasan_save_track+0x18/0x40 [ 15.354768] kasan_save_alloc_info+0x3b/0x50 [ 15.354978] __kasan_kmalloc+0xb7/0xc0 [ 15.355164] __kmalloc_cache_noprof+0x189/0x420 [ 15.355385] kasan_atomics+0x95/0x310 [ 15.355602] kunit_try_run_case+0x1a5/0x480 [ 15.355815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.356066] kthread+0x337/0x6f0 [ 15.356234] ret_from_fork+0x116/0x1d0 [ 15.356423] ret_from_fork_asm+0x1a/0x30 [ 15.356649] [ 15.356750] The buggy address belongs to the object at ffff8881026d6200 [ 15.356750] which belongs to the cache kmalloc-64 of size 64 [ 15.357161] The buggy address is located 0 bytes to the right of [ 15.357161] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.357634] [ 15.357746] The buggy address belongs to the physical page: [ 15.358012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.358387] flags: 0x200000000000000(node=0|zone=2) [ 15.358626] page_type: f5(slab) [ 15.358798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.359130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.359494] page dumped because: kasan: bad access detected [ 15.359745] [ 15.359847] Memory state around the buggy address: [ 15.360055] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.360362] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.360724] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.361027] ^ [ 15.361239] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361523] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361887] ================================================================== [ 15.780310] ================================================================== [ 15.781142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.781592] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.781819] [ 15.781912] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.781962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.781975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.781999] Call Trace: [ 15.782020] <TASK> [ 15.782039] dump_stack_lvl+0x73/0xb0 [ 15.782071] print_report+0xd1/0x610 [ 15.782097] ? __virt_addr_valid+0x1db/0x2d0 [ 15.782122] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.782145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.782171] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.782196] kasan_report+0x141/0x180 [ 15.782219] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.782249] kasan_check_range+0x10c/0x1c0 [ 15.782275] __kasan_check_read+0x15/0x20 [ 15.782297] kasan_atomics_helper+0x13b5/0x5450 [ 15.782322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.782347] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.782379] kasan_atomics+0x1dc/0x310 [ 15.782433] ? __pfx_kasan_atomics+0x10/0x10 [ 15.782468] ? __pfx_read_tsc+0x10/0x10 [ 15.782491] ? ktime_get_ts64+0x86/0x230 [ 15.782541] kunit_try_run_case+0x1a5/0x480 [ 15.782570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.782595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.782622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.782648] ? __kthread_parkme+0x82/0x180 [ 15.782671] ? preempt_count_sub+0x50/0x80 [ 15.782698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.782743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.782770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.782797] kthread+0x337/0x6f0 [ 15.782818] ? trace_preempt_on+0x20/0xc0 [ 15.782844] ? __pfx_kthread+0x10/0x10 [ 15.782867] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.782891] ? calculate_sigpending+0x7b/0xa0 [ 15.782918] ? __pfx_kthread+0x10/0x10 [ 15.782960] ret_from_fork+0x116/0x1d0 [ 15.782981] ? __pfx_kthread+0x10/0x10 [ 15.783003] ret_from_fork_asm+0x1a/0x30 [ 15.783036] </TASK> [ 15.783048] [ 15.796180] Allocated by task 283: [ 15.796332] kasan_save_stack+0x45/0x70 [ 15.796741] kasan_save_track+0x18/0x40 [ 15.797112] kasan_save_alloc_info+0x3b/0x50 [ 15.797542] __kasan_kmalloc+0xb7/0xc0 [ 15.797897] __kmalloc_cache_noprof+0x189/0x420 [ 15.798310] kasan_atomics+0x95/0x310 [ 15.798698] kunit_try_run_case+0x1a5/0x480 [ 15.798946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.799121] kthread+0x337/0x6f0 [ 15.799239] ret_from_fork+0x116/0x1d0 [ 15.799370] ret_from_fork_asm+0x1a/0x30 [ 15.799789] [ 15.799962] The buggy address belongs to the object at ffff8881026d6200 [ 15.799962] which belongs to the cache kmalloc-64 of size 64 [ 15.801092] The buggy address is located 0 bytes to the right of [ 15.801092] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.802194] [ 15.802306] The buggy address belongs to the physical page: [ 15.802691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.803222] flags: 0x200000000000000(node=0|zone=2) [ 15.803385] page_type: f5(slab) [ 15.803729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.804418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.804945] page dumped because: kasan: bad access detected [ 15.805113] [ 15.805181] Memory state around the buggy address: [ 15.805333] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.805907] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.806547] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.807156] ^ [ 15.807618] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.808265] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.808748] ================================================================== [ 15.961216] ================================================================== [ 15.961904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.962234] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.962648] [ 15.962758] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.962808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.962822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.962846] Call Trace: [ 15.962866] <TASK> [ 15.962886] dump_stack_lvl+0x73/0xb0 [ 15.962918] print_report+0xd1/0x610 [ 15.962944] ? __virt_addr_valid+0x1db/0x2d0 [ 15.962970] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.962995] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.963021] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.963046] kasan_report+0x141/0x180 [ 15.963070] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.963099] kasan_check_range+0x10c/0x1c0 [ 15.963125] __kasan_check_write+0x18/0x20 [ 15.963147] kasan_atomics_helper+0x16e7/0x5450 [ 15.963173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.963199] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.963232] kasan_atomics+0x1dc/0x310 [ 15.963257] ? __pfx_kasan_atomics+0x10/0x10 [ 15.963284] ? __pfx_read_tsc+0x10/0x10 [ 15.963308] ? ktime_get_ts64+0x86/0x230 [ 15.963335] kunit_try_run_case+0x1a5/0x480 [ 15.963362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963388] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.963630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.963662] ? __kthread_parkme+0x82/0x180 [ 15.963687] ? preempt_count_sub+0x50/0x80 [ 15.963714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.963797] kthread+0x337/0x6f0 [ 15.963819] ? trace_preempt_on+0x20/0xc0 [ 15.963846] ? __pfx_kthread+0x10/0x10 [ 15.963869] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.963893] ? calculate_sigpending+0x7b/0xa0 [ 15.963920] ? __pfx_kthread+0x10/0x10 [ 15.963944] ret_from_fork+0x116/0x1d0 [ 15.963965] ? __pfx_kthread+0x10/0x10 [ 15.963989] ret_from_fork_asm+0x1a/0x30 [ 15.964022] </TASK> [ 15.964035] [ 15.973398] Allocated by task 283: [ 15.973809] kasan_save_stack+0x45/0x70 [ 15.974123] kasan_save_track+0x18/0x40 [ 15.974352] kasan_save_alloc_info+0x3b/0x50 [ 15.974739] __kasan_kmalloc+0xb7/0xc0 [ 15.974998] __kmalloc_cache_noprof+0x189/0x420 [ 15.975174] kasan_atomics+0x95/0x310 [ 15.975536] kunit_try_run_case+0x1a5/0x480 [ 15.975699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.975984] kthread+0x337/0x6f0 [ 15.976143] ret_from_fork+0x116/0x1d0 [ 15.976319] ret_from_fork_asm+0x1a/0x30 [ 15.976713] [ 15.976800] The buggy address belongs to the object at ffff8881026d6200 [ 15.976800] which belongs to the cache kmalloc-64 of size 64 [ 15.977407] The buggy address is located 0 bytes to the right of [ 15.977407] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.978035] [ 15.978239] The buggy address belongs to the physical page: [ 15.978427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.978847] flags: 0x200000000000000(node=0|zone=2) [ 15.979074] page_type: f5(slab) [ 15.979229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.979784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.980142] page dumped because: kasan: bad access detected [ 15.980394] [ 15.980625] Memory state around the buggy address: [ 15.980808] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.981210] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.981607] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.981963] ^ [ 15.982255] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.982666] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.983026] ================================================================== [ 15.453853] ================================================================== [ 15.454228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.454654] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.454967] [ 15.455082] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.455128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.455141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.455164] Call Trace: [ 15.455182] <TASK> [ 15.455199] dump_stack_lvl+0x73/0xb0 [ 15.455229] print_report+0xd1/0x610 [ 15.455253] ? __virt_addr_valid+0x1db/0x2d0 [ 15.455279] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.455302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.455328] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.455352] kasan_report+0x141/0x180 [ 15.455378] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.455429] kasan_check_range+0x10c/0x1c0 [ 15.455463] __kasan_check_write+0x18/0x20 [ 15.455484] kasan_atomics_helper+0xb6a/0x5450 [ 15.455509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.455533] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.455566] kasan_atomics+0x1dc/0x310 [ 15.455601] ? __pfx_kasan_atomics+0x10/0x10 [ 15.455628] ? __pfx_read_tsc+0x10/0x10 [ 15.455662] ? ktime_get_ts64+0x86/0x230 [ 15.455688] kunit_try_run_case+0x1a5/0x480 [ 15.455715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.455740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.455767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.455794] ? __kthread_parkme+0x82/0x180 [ 15.455816] ? preempt_count_sub+0x50/0x80 [ 15.455843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.455870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.455896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.455924] kthread+0x337/0x6f0 [ 15.455944] ? trace_preempt_on+0x20/0xc0 [ 15.455969] ? __pfx_kthread+0x10/0x10 [ 15.456000] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.456024] ? calculate_sigpending+0x7b/0xa0 [ 15.456050] ? __pfx_kthread+0x10/0x10 [ 15.456084] ret_from_fork+0x116/0x1d0 [ 15.456104] ? __pfx_kthread+0x10/0x10 [ 15.456127] ret_from_fork_asm+0x1a/0x30 [ 15.456160] </TASK> [ 15.456171] [ 15.463512] Allocated by task 283: [ 15.463699] kasan_save_stack+0x45/0x70 [ 15.463891] kasan_save_track+0x18/0x40 [ 15.464085] kasan_save_alloc_info+0x3b/0x50 [ 15.464301] __kasan_kmalloc+0xb7/0xc0 [ 15.464514] __kmalloc_cache_noprof+0x189/0x420 [ 15.464735] kasan_atomics+0x95/0x310 [ 15.464929] kunit_try_run_case+0x1a5/0x480 [ 15.465135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.465387] kthread+0x337/0x6f0 [ 15.465579] ret_from_fork+0x116/0x1d0 [ 15.465779] ret_from_fork_asm+0x1a/0x30 [ 15.465971] [ 15.466065] The buggy address belongs to the object at ffff8881026d6200 [ 15.466065] which belongs to the cache kmalloc-64 of size 64 [ 15.466591] The buggy address is located 0 bytes to the right of [ 15.466591] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.467115] [ 15.467226] The buggy address belongs to the physical page: [ 15.467442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.467693] flags: 0x200000000000000(node=0|zone=2) [ 15.467858] page_type: f5(slab) [ 15.467990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.468329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.468713] page dumped because: kasan: bad access detected [ 15.468963] [ 15.469053] Memory state around the buggy address: [ 15.469276] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.469598] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.469903] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.470117] ^ [ 15.470270] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.470554] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.470894] ================================================================== [ 16.213219] ================================================================== [ 16.213516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.214257] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.215004] [ 16.215200] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.215249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.215285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.215308] Call Trace: [ 16.215329] <TASK> [ 16.215349] dump_stack_lvl+0x73/0xb0 [ 16.215382] print_report+0xd1/0x610 [ 16.215406] ? __virt_addr_valid+0x1db/0x2d0 [ 16.215441] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.215476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.215501] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.215525] kasan_report+0x141/0x180 [ 16.215549] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.215576] kasan_check_range+0x10c/0x1c0 [ 16.215601] __kasan_check_write+0x18/0x20 [ 16.215623] kasan_atomics_helper+0x1d7a/0x5450 [ 16.215647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.215672] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.215705] kasan_atomics+0x1dc/0x310 [ 16.215729] ? __pfx_kasan_atomics+0x10/0x10 [ 16.215755] ? __pfx_read_tsc+0x10/0x10 [ 16.215778] ? ktime_get_ts64+0x86/0x230 [ 16.215806] kunit_try_run_case+0x1a5/0x480 [ 16.215836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.215862] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.215889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.215914] ? __kthread_parkme+0x82/0x180 [ 16.215937] ? preempt_count_sub+0x50/0x80 [ 16.215963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.215989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.216016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.216044] kthread+0x337/0x6f0 [ 16.216064] ? trace_preempt_on+0x20/0xc0 [ 16.216089] ? __pfx_kthread+0x10/0x10 [ 16.216111] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.216134] ? calculate_sigpending+0x7b/0xa0 [ 16.216161] ? __pfx_kthread+0x10/0x10 [ 16.216184] ret_from_fork+0x116/0x1d0 [ 16.216203] ? __pfx_kthread+0x10/0x10 [ 16.216225] ret_from_fork_asm+0x1a/0x30 [ 16.216258] </TASK> [ 16.216269] [ 16.225337] Allocated by task 283: [ 16.225594] kasan_save_stack+0x45/0x70 [ 16.225802] kasan_save_track+0x18/0x40 [ 16.225940] kasan_save_alloc_info+0x3b/0x50 [ 16.226092] __kasan_kmalloc+0xb7/0xc0 [ 16.226248] __kmalloc_cache_noprof+0x189/0x420 [ 16.226561] kasan_atomics+0x95/0x310 [ 16.226774] kunit_try_run_case+0x1a5/0x480 [ 16.227024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.227303] kthread+0x337/0x6f0 [ 16.227481] ret_from_fork+0x116/0x1d0 [ 16.227695] ret_from_fork_asm+0x1a/0x30 [ 16.227897] [ 16.228000] The buggy address belongs to the object at ffff8881026d6200 [ 16.228000] which belongs to the cache kmalloc-64 of size 64 [ 16.228509] The buggy address is located 0 bytes to the right of [ 16.228509] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.229006] [ 16.229105] The buggy address belongs to the physical page: [ 16.229379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.229775] flags: 0x200000000000000(node=0|zone=2) [ 16.230033] page_type: f5(slab) [ 16.230211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.230599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.230884] page dumped because: kasan: bad access detected [ 16.231049] [ 16.231162] Memory state around the buggy address: [ 16.231385] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.231867] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.232189] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.232404] ^ [ 16.232666] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.233004] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.233294] ================================================================== [ 15.809390] ================================================================== [ 15.810779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.811599] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.812226] [ 15.812433] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.812494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.812507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.812531] Call Trace: [ 15.812552] <TASK> [ 15.812573] dump_stack_lvl+0x73/0xb0 [ 15.812606] print_report+0xd1/0x610 [ 15.812631] ? __virt_addr_valid+0x1db/0x2d0 [ 15.812658] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.812682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.812707] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.812732] kasan_report+0x141/0x180 [ 15.812755] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.812784] __asan_report_load8_noabort+0x18/0x20 [ 15.812811] kasan_atomics_helper+0x4eae/0x5450 [ 15.812836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.812861] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.812894] kasan_atomics+0x1dc/0x310 [ 15.812919] ? __pfx_kasan_atomics+0x10/0x10 [ 15.812945] ? __pfx_read_tsc+0x10/0x10 [ 15.812969] ? ktime_get_ts64+0x86/0x230 [ 15.812996] kunit_try_run_case+0x1a5/0x480 [ 15.813023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.813075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.813101] ? __kthread_parkme+0x82/0x180 [ 15.813125] ? preempt_count_sub+0x50/0x80 [ 15.813151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.813205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.813232] kthread+0x337/0x6f0 [ 15.813254] ? trace_preempt_on+0x20/0xc0 [ 15.813279] ? __pfx_kthread+0x10/0x10 [ 15.813301] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.813325] ? calculate_sigpending+0x7b/0xa0 [ 15.813352] ? __pfx_kthread+0x10/0x10 [ 15.813375] ret_from_fork+0x116/0x1d0 [ 15.813435] ? __pfx_kthread+0x10/0x10 [ 15.813468] ret_from_fork_asm+0x1a/0x30 [ 15.813502] </TASK> [ 15.813515] [ 15.825557] Allocated by task 283: [ 15.825889] kasan_save_stack+0x45/0x70 [ 15.826116] kasan_save_track+0x18/0x40 [ 15.826254] kasan_save_alloc_info+0x3b/0x50 [ 15.826427] __kasan_kmalloc+0xb7/0xc0 [ 15.826811] __kmalloc_cache_noprof+0x189/0x420 [ 15.827255] kasan_atomics+0x95/0x310 [ 15.827648] kunit_try_run_case+0x1a5/0x480 [ 15.828038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.828375] kthread+0x337/0x6f0 [ 15.828740] ret_from_fork+0x116/0x1d0 [ 15.829001] ret_from_fork_asm+0x1a/0x30 [ 15.829324] [ 15.829422] The buggy address belongs to the object at ffff8881026d6200 [ 15.829422] which belongs to the cache kmalloc-64 of size 64 [ 15.830215] The buggy address is located 0 bytes to the right of [ 15.830215] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.830936] [ 15.831011] The buggy address belongs to the physical page: [ 15.831179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.831460] flags: 0x200000000000000(node=0|zone=2) [ 15.831892] page_type: f5(slab) [ 15.832204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.832905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.833599] page dumped because: kasan: bad access detected [ 15.834120] [ 15.834296] Memory state around the buggy address: [ 15.834764] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.835159] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.835368] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.836037] ^ [ 15.836501] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837097] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837303] ================================================================== [ 16.406367] ================================================================== [ 16.406630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.407513] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.407935] [ 16.408112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.408215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.408229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.408254] Call Trace: [ 16.408273] <TASK> [ 16.408297] dump_stack_lvl+0x73/0xb0 [ 16.408329] print_report+0xd1/0x610 [ 16.408355] ? __virt_addr_valid+0x1db/0x2d0 [ 16.408380] ? kasan_atomics_helper+0x218a/0x5450 [ 16.408403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.408441] ? kasan_atomics_helper+0x218a/0x5450 [ 16.408478] kasan_report+0x141/0x180 [ 16.408502] ? kasan_atomics_helper+0x218a/0x5450 [ 16.408530] kasan_check_range+0x10c/0x1c0 [ 16.408556] __kasan_check_write+0x18/0x20 [ 16.408578] kasan_atomics_helper+0x218a/0x5450 [ 16.408603] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.408628] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.408660] kasan_atomics+0x1dc/0x310 [ 16.408685] ? __pfx_kasan_atomics+0x10/0x10 [ 16.408711] ? __pfx_read_tsc+0x10/0x10 [ 16.408734] ? ktime_get_ts64+0x86/0x230 [ 16.408761] kunit_try_run_case+0x1a5/0x480 [ 16.408787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.408812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.408839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.408864] ? __kthread_parkme+0x82/0x180 [ 16.408887] ? preempt_count_sub+0x50/0x80 [ 16.408912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.408938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.408965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.408993] kthread+0x337/0x6f0 [ 16.409013] ? trace_preempt_on+0x20/0xc0 [ 16.409038] ? __pfx_kthread+0x10/0x10 [ 16.409059] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.409083] ? calculate_sigpending+0x7b/0xa0 [ 16.409109] ? __pfx_kthread+0x10/0x10 [ 16.409132] ret_from_fork+0x116/0x1d0 [ 16.409152] ? __pfx_kthread+0x10/0x10 [ 16.409174] ret_from_fork_asm+0x1a/0x30 [ 16.409206] </TASK> [ 16.409217] [ 16.418818] Allocated by task 283: [ 16.418996] kasan_save_stack+0x45/0x70 [ 16.419262] kasan_save_track+0x18/0x40 [ 16.419459] kasan_save_alloc_info+0x3b/0x50 [ 16.419792] __kasan_kmalloc+0xb7/0xc0 [ 16.419976] __kmalloc_cache_noprof+0x189/0x420 [ 16.420178] kasan_atomics+0x95/0x310 [ 16.420347] kunit_try_run_case+0x1a5/0x480 [ 16.420751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.421081] kthread+0x337/0x6f0 [ 16.421213] ret_from_fork+0x116/0x1d0 [ 16.421552] ret_from_fork_asm+0x1a/0x30 [ 16.421759] [ 16.421975] The buggy address belongs to the object at ffff8881026d6200 [ 16.421975] which belongs to the cache kmalloc-64 of size 64 [ 16.422616] The buggy address is located 0 bytes to the right of [ 16.422616] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.423112] [ 16.423203] The buggy address belongs to the physical page: [ 16.423649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.423962] flags: 0x200000000000000(node=0|zone=2) [ 16.424258] page_type: f5(slab) [ 16.424389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.424870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.425222] page dumped because: kasan: bad access detected [ 16.425409] [ 16.425533] Memory state around the buggy address: [ 16.425872] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.426163] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.426440] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.426929] ^ [ 16.427195] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.427491] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.427884] ================================================================== [ 16.032842] ================================================================== [ 16.033117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.033409] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.034251] [ 16.034371] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.034432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.034446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.034481] Call Trace: [ 16.034502] <TASK> [ 16.034522] dump_stack_lvl+0x73/0xb0 [ 16.034554] print_report+0xd1/0x610 [ 16.034579] ? __virt_addr_valid+0x1db/0x2d0 [ 16.034695] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.034720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.034746] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.034770] kasan_report+0x141/0x180 [ 16.034794] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.034822] kasan_check_range+0x10c/0x1c0 [ 16.034848] __kasan_check_write+0x18/0x20 [ 16.034869] kasan_atomics_helper+0x18b1/0x5450 [ 16.034893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.034919] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.034952] kasan_atomics+0x1dc/0x310 [ 16.034976] ? __pfx_kasan_atomics+0x10/0x10 [ 16.035003] ? __pfx_read_tsc+0x10/0x10 [ 16.035026] ? ktime_get_ts64+0x86/0x230 [ 16.035052] kunit_try_run_case+0x1a5/0x480 [ 16.035080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.035105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.035132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.035158] ? __kthread_parkme+0x82/0x180 [ 16.035181] ? preempt_count_sub+0x50/0x80 [ 16.035207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.035233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.035260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.035287] kthread+0x337/0x6f0 [ 16.035308] ? trace_preempt_on+0x20/0xc0 [ 16.035333] ? __pfx_kthread+0x10/0x10 [ 16.035355] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.035378] ? calculate_sigpending+0x7b/0xa0 [ 16.035405] ? __pfx_kthread+0x10/0x10 [ 16.035436] ret_from_fork+0x116/0x1d0 [ 16.035469] ? __pfx_kthread+0x10/0x10 [ 16.035491] ret_from_fork_asm+0x1a/0x30 [ 16.035524] </TASK> [ 16.035536] [ 16.044928] Allocated by task 283: [ 16.045202] kasan_save_stack+0x45/0x70 [ 16.045484] kasan_save_track+0x18/0x40 [ 16.045656] kasan_save_alloc_info+0x3b/0x50 [ 16.045967] __kasan_kmalloc+0xb7/0xc0 [ 16.046156] __kmalloc_cache_noprof+0x189/0x420 [ 16.046480] kasan_atomics+0x95/0x310 [ 16.046744] kunit_try_run_case+0x1a5/0x480 [ 16.046912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.047160] kthread+0x337/0x6f0 [ 16.047323] ret_from_fork+0x116/0x1d0 [ 16.047733] ret_from_fork_asm+0x1a/0x30 [ 16.047987] [ 16.048081] The buggy address belongs to the object at ffff8881026d6200 [ 16.048081] which belongs to the cache kmalloc-64 of size 64 [ 16.048699] The buggy address is located 0 bytes to the right of [ 16.048699] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.049264] [ 16.049359] The buggy address belongs to the physical page: [ 16.049796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.050189] flags: 0x200000000000000(node=0|zone=2) [ 16.050420] page_type: f5(slab) [ 16.050763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.051142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.051532] page dumped because: kasan: bad access detected [ 16.051819] [ 16.051918] Memory state around the buggy address: [ 16.052191] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.052493] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.052925] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.053282] ^ [ 16.053517] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.053912] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.054279] ================================================================== [ 15.436060] ================================================================== [ 15.436412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.436791] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.437025] [ 15.437114] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.437160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.437183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.437206] Call Trace: [ 15.437224] <TASK> [ 15.437254] dump_stack_lvl+0x73/0xb0 [ 15.437285] print_report+0xd1/0x610 [ 15.437309] ? __virt_addr_valid+0x1db/0x2d0 [ 15.437334] ? kasan_atomics_helper+0xac7/0x5450 [ 15.437357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.437383] ? kasan_atomics_helper+0xac7/0x5450 [ 15.437427] kasan_report+0x141/0x180 [ 15.437459] ? kasan_atomics_helper+0xac7/0x5450 [ 15.437487] kasan_check_range+0x10c/0x1c0 [ 15.437514] __kasan_check_write+0x18/0x20 [ 15.437536] kasan_atomics_helper+0xac7/0x5450 [ 15.437563] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.437588] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.437621] kasan_atomics+0x1dc/0x310 [ 15.437645] ? __pfx_kasan_atomics+0x10/0x10 [ 15.437672] ? __pfx_read_tsc+0x10/0x10 [ 15.437704] ? ktime_get_ts64+0x86/0x230 [ 15.437730] kunit_try_run_case+0x1a5/0x480 [ 15.437757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.437794] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.437821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.437846] ? __kthread_parkme+0x82/0x180 [ 15.437880] ? preempt_count_sub+0x50/0x80 [ 15.437905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.437931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.437958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.437986] kthread+0x337/0x6f0 [ 15.438006] ? trace_preempt_on+0x20/0xc0 [ 15.438032] ? __pfx_kthread+0x10/0x10 [ 15.438054] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.438077] ? calculate_sigpending+0x7b/0xa0 [ 15.438104] ? __pfx_kthread+0x10/0x10 [ 15.438127] ret_from_fork+0x116/0x1d0 [ 15.438147] ? __pfx_kthread+0x10/0x10 [ 15.438169] ret_from_fork_asm+0x1a/0x30 [ 15.438201] </TASK> [ 15.438212] [ 15.445692] Allocated by task 283: [ 15.445912] kasan_save_stack+0x45/0x70 [ 15.446140] kasan_save_track+0x18/0x40 [ 15.446346] kasan_save_alloc_info+0x3b/0x50 [ 15.446543] __kasan_kmalloc+0xb7/0xc0 [ 15.446758] __kmalloc_cache_noprof+0x189/0x420 [ 15.447007] kasan_atomics+0x95/0x310 [ 15.447170] kunit_try_run_case+0x1a5/0x480 [ 15.447415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.447672] kthread+0x337/0x6f0 [ 15.447846] ret_from_fork+0x116/0x1d0 [ 15.447983] ret_from_fork_asm+0x1a/0x30 [ 15.448197] [ 15.448297] The buggy address belongs to the object at ffff8881026d6200 [ 15.448297] which belongs to the cache kmalloc-64 of size 64 [ 15.448819] The buggy address is located 0 bytes to the right of [ 15.448819] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.449307] [ 15.449381] The buggy address belongs to the physical page: [ 15.449582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.449826] flags: 0x200000000000000(node=0|zone=2) [ 15.450082] page_type: f5(slab) [ 15.450251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.450627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.450956] page dumped because: kasan: bad access detected [ 15.451185] [ 15.451256] Memory state around the buggy address: [ 15.451436] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.451661] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.451924] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.452269] ^ [ 15.452540] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.452897] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.453230] ================================================================== [ 16.123900] ================================================================== [ 16.124250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.124657] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.124944] [ 16.125059] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.125105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.125119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.125141] Call Trace: [ 16.125160] <TASK> [ 16.125178] dump_stack_lvl+0x73/0xb0 [ 16.125209] print_report+0xd1/0x610 [ 16.125234] ? __virt_addr_valid+0x1db/0x2d0 [ 16.125259] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.125283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.125307] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.125331] kasan_report+0x141/0x180 [ 16.125354] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.125382] kasan_check_range+0x10c/0x1c0 [ 16.125407] __kasan_check_write+0x18/0x20 [ 16.125429] kasan_atomics_helper+0x1b22/0x5450 [ 16.125479] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.125503] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.125536] kasan_atomics+0x1dc/0x310 [ 16.125561] ? __pfx_kasan_atomics+0x10/0x10 [ 16.125588] ? __pfx_read_tsc+0x10/0x10 [ 16.125624] ? ktime_get_ts64+0x86/0x230 [ 16.125650] kunit_try_run_case+0x1a5/0x480 [ 16.125678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.125703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.125730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.125757] ? __kthread_parkme+0x82/0x180 [ 16.125779] ? preempt_count_sub+0x50/0x80 [ 16.125806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.125832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.125859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.125887] kthread+0x337/0x6f0 [ 16.125907] ? trace_preempt_on+0x20/0xc0 [ 16.125934] ? __pfx_kthread+0x10/0x10 [ 16.125956] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.125980] ? calculate_sigpending+0x7b/0xa0 [ 16.126007] ? __pfx_kthread+0x10/0x10 [ 16.126030] ret_from_fork+0x116/0x1d0 [ 16.126051] ? __pfx_kthread+0x10/0x10 [ 16.126074] ret_from_fork_asm+0x1a/0x30 [ 16.126107] </TASK> [ 16.126118] [ 16.133114] Allocated by task 283: [ 16.133300] kasan_save_stack+0x45/0x70 [ 16.133552] kasan_save_track+0x18/0x40 [ 16.133750] kasan_save_alloc_info+0x3b/0x50 [ 16.133969] __kasan_kmalloc+0xb7/0xc0 [ 16.134163] __kmalloc_cache_noprof+0x189/0x420 [ 16.134386] kasan_atomics+0x95/0x310 [ 16.134574] kunit_try_run_case+0x1a5/0x480 [ 16.134722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.134962] kthread+0x337/0x6f0 [ 16.135132] ret_from_fork+0x116/0x1d0 [ 16.135327] ret_from_fork_asm+0x1a/0x30 [ 16.135523] [ 16.135626] The buggy address belongs to the object at ffff8881026d6200 [ 16.135626] which belongs to the cache kmalloc-64 of size 64 [ 16.136050] The buggy address is located 0 bytes to the right of [ 16.136050] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.136592] [ 16.136684] The buggy address belongs to the physical page: [ 16.136922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.137236] flags: 0x200000000000000(node=0|zone=2) [ 16.137465] page_type: f5(slab) [ 16.137599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.137835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.138061] page dumped because: kasan: bad access detected [ 16.138232] [ 16.138325] Memory state around the buggy address: [ 16.138555] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.138868] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.139177] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.139496] ^ [ 16.139715] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.140065] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.140280] ================================================================== [ 16.383724] ================================================================== [ 16.384301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.384871] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.385305] [ 16.385521] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.385576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.385590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.385614] Call Trace: [ 16.385634] <TASK> [ 16.385655] dump_stack_lvl+0x73/0xb0 [ 16.385687] print_report+0xd1/0x610 [ 16.385712] ? __virt_addr_valid+0x1db/0x2d0 [ 16.385738] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.385762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.385787] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.385811] kasan_report+0x141/0x180 [ 16.385834] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.385862] __asan_report_load8_noabort+0x18/0x20 [ 16.385889] kasan_atomics_helper+0x4fb2/0x5450 [ 16.385913] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.385938] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.385971] kasan_atomics+0x1dc/0x310 [ 16.385996] ? __pfx_kasan_atomics+0x10/0x10 [ 16.386021] ? __pfx_read_tsc+0x10/0x10 [ 16.386044] ? ktime_get_ts64+0x86/0x230 [ 16.386071] kunit_try_run_case+0x1a5/0x480 [ 16.386097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.386122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.386149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.386174] ? __kthread_parkme+0x82/0x180 [ 16.386197] ? preempt_count_sub+0x50/0x80 [ 16.386223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.386250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.386275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.386303] kthread+0x337/0x6f0 [ 16.386323] ? trace_preempt_on+0x20/0xc0 [ 16.386348] ? __pfx_kthread+0x10/0x10 [ 16.386371] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.386394] ? calculate_sigpending+0x7b/0xa0 [ 16.386581] ? __pfx_kthread+0x10/0x10 [ 16.386605] ret_from_fork+0x116/0x1d0 [ 16.386626] ? __pfx_kthread+0x10/0x10 [ 16.386649] ret_from_fork_asm+0x1a/0x30 [ 16.386681] </TASK> [ 16.386692] [ 16.395968] Allocated by task 283: [ 16.396152] kasan_save_stack+0x45/0x70 [ 16.396352] kasan_save_track+0x18/0x40 [ 16.396899] kasan_save_alloc_info+0x3b/0x50 [ 16.397100] __kasan_kmalloc+0xb7/0xc0 [ 16.397249] __kmalloc_cache_noprof+0x189/0x420 [ 16.397609] kasan_atomics+0x95/0x310 [ 16.397783] kunit_try_run_case+0x1a5/0x480 [ 16.398112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.398460] kthread+0x337/0x6f0 [ 16.398601] ret_from_fork+0x116/0x1d0 [ 16.398798] ret_from_fork_asm+0x1a/0x30 [ 16.399117] [ 16.399317] The buggy address belongs to the object at ffff8881026d6200 [ 16.399317] which belongs to the cache kmalloc-64 of size 64 [ 16.399960] The buggy address is located 0 bytes to the right of [ 16.399960] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.400442] [ 16.400794] The buggy address belongs to the physical page: [ 16.401050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.401468] flags: 0x200000000000000(node=0|zone=2) [ 16.401771] page_type: f5(slab) [ 16.401983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.402379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.402886] page dumped because: kasan: bad access detected [ 16.403182] [ 16.403269] Memory state around the buggy address: [ 16.403498] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.403938] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.404306] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.404694] ^ [ 16.405033] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.405354] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.405796] ================================================================== [ 15.069418] ================================================================== [ 15.070264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.070710] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.070998] [ 15.071109] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.071155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.071166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.071188] Call Trace: [ 15.071201] <TASK> [ 15.071215] dump_stack_lvl+0x73/0xb0 [ 15.071245] print_report+0xd1/0x610 [ 15.071269] ? __virt_addr_valid+0x1db/0x2d0 [ 15.071294] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.071317] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.071341] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.071363] kasan_report+0x141/0x180 [ 15.071385] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.071412] __asan_report_load4_noabort+0x18/0x20 [ 15.071438] kasan_atomics_helper+0x4bbc/0x5450 [ 15.071493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.071517] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.071554] kasan_atomics+0x1dc/0x310 [ 15.071578] ? __pfx_kasan_atomics+0x10/0x10 [ 15.071603] ? __pfx_read_tsc+0x10/0x10 [ 15.071625] ? ktime_get_ts64+0x86/0x230 [ 15.071650] kunit_try_run_case+0x1a5/0x480 [ 15.071675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071699] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.071723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.071748] ? __kthread_parkme+0x82/0x180 [ 15.071771] ? preempt_count_sub+0x50/0x80 [ 15.071796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.071845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.071872] kthread+0x337/0x6f0 [ 15.071891] ? trace_preempt_on+0x20/0xc0 [ 15.071916] ? __pfx_kthread+0x10/0x10 [ 15.071936] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.071957] ? calculate_sigpending+0x7b/0xa0 [ 15.071983] ? __pfx_kthread+0x10/0x10 [ 15.072005] ret_from_fork+0x116/0x1d0 [ 15.072023] ? __pfx_kthread+0x10/0x10 [ 15.072045] ret_from_fork_asm+0x1a/0x30 [ 15.072077] </TASK> [ 15.072087] [ 15.079872] Allocated by task 283: [ 15.080053] kasan_save_stack+0x45/0x70 [ 15.080228] kasan_save_track+0x18/0x40 [ 15.080370] kasan_save_alloc_info+0x3b/0x50 [ 15.080668] __kasan_kmalloc+0xb7/0xc0 [ 15.080861] __kmalloc_cache_noprof+0x189/0x420 [ 15.081079] kasan_atomics+0x95/0x310 [ 15.081265] kunit_try_run_case+0x1a5/0x480 [ 15.081412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.081849] kthread+0x337/0x6f0 [ 15.082035] ret_from_fork+0x116/0x1d0 [ 15.082199] ret_from_fork_asm+0x1a/0x30 [ 15.082374] [ 15.082484] The buggy address belongs to the object at ffff8881026d6200 [ 15.082484] which belongs to the cache kmalloc-64 of size 64 [ 15.082988] The buggy address is located 0 bytes to the right of [ 15.082988] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.083397] [ 15.083533] The buggy address belongs to the physical page: [ 15.083861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.084213] flags: 0x200000000000000(node=0|zone=2) [ 15.084398] page_type: f5(slab) [ 15.084623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.084941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.085281] page dumped because: kasan: bad access detected [ 15.085742] [ 15.085846] Memory state around the buggy address: [ 15.086074] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.086342] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.086792] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.087077] ^ [ 15.087287] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087665] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087957] ================================================================== [ 15.256004] ================================================================== [ 15.256264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.256626] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.257015] [ 15.257127] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.257199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.257212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.257235] Call Trace: [ 15.257253] <TASK> [ 15.257270] dump_stack_lvl+0x73/0xb0 [ 15.257300] print_report+0xd1/0x610 [ 15.257326] ? __virt_addr_valid+0x1db/0x2d0 [ 15.257353] ? kasan_atomics_helper+0x565/0x5450 [ 15.257377] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.257402] ? kasan_atomics_helper+0x565/0x5450 [ 15.257494] kasan_report+0x141/0x180 [ 15.257518] ? kasan_atomics_helper+0x565/0x5450 [ 15.257557] kasan_check_range+0x10c/0x1c0 [ 15.257585] __kasan_check_write+0x18/0x20 [ 15.257606] kasan_atomics_helper+0x565/0x5450 [ 15.257631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.257656] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.257690] kasan_atomics+0x1dc/0x310 [ 15.257714] ? __pfx_kasan_atomics+0x10/0x10 [ 15.257740] ? __pfx_read_tsc+0x10/0x10 [ 15.257764] ? ktime_get_ts64+0x86/0x230 [ 15.257790] kunit_try_run_case+0x1a5/0x480 [ 15.257816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.257867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.257894] ? __kthread_parkme+0x82/0x180 [ 15.257917] ? preempt_count_sub+0x50/0x80 [ 15.257943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.258023] kthread+0x337/0x6f0 [ 15.258043] ? trace_preempt_on+0x20/0xc0 [ 15.258068] ? __pfx_kthread+0x10/0x10 [ 15.258090] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.258114] ? calculate_sigpending+0x7b/0xa0 [ 15.258140] ? __pfx_kthread+0x10/0x10 [ 15.258163] ret_from_fork+0x116/0x1d0 [ 15.258184] ? __pfx_kthread+0x10/0x10 [ 15.258206] ret_from_fork_asm+0x1a/0x30 [ 15.258239] </TASK> [ 15.258250] [ 15.266787] Allocated by task 283: [ 15.267037] kasan_save_stack+0x45/0x70 [ 15.267183] kasan_save_track+0x18/0x40 [ 15.267316] kasan_save_alloc_info+0x3b/0x50 [ 15.267674] __kasan_kmalloc+0xb7/0xc0 [ 15.267956] __kmalloc_cache_noprof+0x189/0x420 [ 15.268184] kasan_atomics+0x95/0x310 [ 15.268563] kunit_try_run_case+0x1a5/0x480 [ 15.268773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.269027] kthread+0x337/0x6f0 [ 15.269195] ret_from_fork+0x116/0x1d0 [ 15.269551] ret_from_fork_asm+0x1a/0x30 [ 15.269755] [ 15.269856] The buggy address belongs to the object at ffff8881026d6200 [ 15.269856] which belongs to the cache kmalloc-64 of size 64 [ 15.270313] The buggy address is located 0 bytes to the right of [ 15.270313] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.270973] [ 15.271137] The buggy address belongs to the physical page: [ 15.271766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.272345] flags: 0x200000000000000(node=0|zone=2) [ 15.272848] page_type: f5(slab) [ 15.273194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.273608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.273836] page dumped because: kasan: bad access detected [ 15.274005] [ 15.274074] Memory state around the buggy address: [ 15.274227] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.274620] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.275279] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.275950] ^ [ 15.276426] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.277065] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.277705] ================================================================== [ 15.307473] ================================================================== [ 15.308213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.309052] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.309861] [ 15.310093] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.310139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.310152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.310175] Call Trace: [ 15.310193] <TASK> [ 15.310211] dump_stack_lvl+0x73/0xb0 [ 15.310253] print_report+0xd1/0x610 [ 15.310278] ? __virt_addr_valid+0x1db/0x2d0 [ 15.310303] ? kasan_atomics_helper+0x697/0x5450 [ 15.310337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.310362] ? kasan_atomics_helper+0x697/0x5450 [ 15.310386] kasan_report+0x141/0x180 [ 15.310416] ? kasan_atomics_helper+0x697/0x5450 [ 15.310474] kasan_check_range+0x10c/0x1c0 [ 15.310500] __kasan_check_write+0x18/0x20 [ 15.310532] kasan_atomics_helper+0x697/0x5450 [ 15.310556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.310581] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.310614] kasan_atomics+0x1dc/0x310 [ 15.310638] ? __pfx_kasan_atomics+0x10/0x10 [ 15.310664] ? __pfx_read_tsc+0x10/0x10 [ 15.310687] ? ktime_get_ts64+0x86/0x230 [ 15.310713] kunit_try_run_case+0x1a5/0x480 [ 15.310740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.310765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.310792] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.310818] ? __kthread_parkme+0x82/0x180 [ 15.310841] ? preempt_count_sub+0x50/0x80 [ 15.310867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.310897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.310924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.310953] kthread+0x337/0x6f0 [ 15.310974] ? trace_preempt_on+0x20/0xc0 [ 15.311000] ? __pfx_kthread+0x10/0x10 [ 15.311023] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.311046] ? calculate_sigpending+0x7b/0xa0 [ 15.311073] ? __pfx_kthread+0x10/0x10 [ 15.311097] ret_from_fork+0x116/0x1d0 [ 15.311118] ? __pfx_kthread+0x10/0x10 [ 15.311140] ret_from_fork_asm+0x1a/0x30 [ 15.311174] </TASK> [ 15.311186] [ 15.318783] Allocated by task 283: [ 15.318911] kasan_save_stack+0x45/0x70 [ 15.319052] kasan_save_track+0x18/0x40 [ 15.319226] kasan_save_alloc_info+0x3b/0x50 [ 15.319478] __kasan_kmalloc+0xb7/0xc0 [ 15.319691] __kmalloc_cache_noprof+0x189/0x420 [ 15.319950] kasan_atomics+0x95/0x310 [ 15.320142] kunit_try_run_case+0x1a5/0x480 [ 15.320382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.320639] kthread+0x337/0x6f0 [ 15.320771] ret_from_fork+0x116/0x1d0 [ 15.320962] ret_from_fork_asm+0x1a/0x30 [ 15.321162] [ 15.321262] The buggy address belongs to the object at ffff8881026d6200 [ 15.321262] which belongs to the cache kmalloc-64 of size 64 [ 15.321789] The buggy address is located 0 bytes to the right of [ 15.321789] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.322297] [ 15.322371] The buggy address belongs to the physical page: [ 15.322566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.322800] flags: 0x200000000000000(node=0|zone=2) [ 15.322978] page_type: f5(slab) [ 15.323164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.323525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.323851] page dumped because: kasan: bad access detected [ 15.324055] [ 15.324168] Memory state around the buggy address: [ 15.324340] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.324586] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.324794] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.325117] ^ [ 15.325375] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.325758] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.326086] ================================================================== [ 15.914618] ================================================================== [ 15.915369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.915722] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.916106] [ 15.916232] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.916286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.916299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.916323] Call Trace: [ 15.916341] <TASK> [ 15.916360] dump_stack_lvl+0x73/0xb0 [ 15.916391] print_report+0xd1/0x610 [ 15.916417] ? __virt_addr_valid+0x1db/0x2d0 [ 15.916443] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.916477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.916696] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.916723] kasan_report+0x141/0x180 [ 15.916747] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.916776] kasan_check_range+0x10c/0x1c0 [ 15.916801] __kasan_check_write+0x18/0x20 [ 15.916822] kasan_atomics_helper+0x15b6/0x5450 [ 15.916847] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.916872] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.916904] kasan_atomics+0x1dc/0x310 [ 15.916929] ? __pfx_kasan_atomics+0x10/0x10 [ 15.916956] ? __pfx_read_tsc+0x10/0x10 [ 15.916978] ? ktime_get_ts64+0x86/0x230 [ 15.917005] kunit_try_run_case+0x1a5/0x480 [ 15.917032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.917057] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.917084] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.917109] ? __kthread_parkme+0x82/0x180 [ 15.917132] ? preempt_count_sub+0x50/0x80 [ 15.917158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.917184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.917210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.917237] kthread+0x337/0x6f0 [ 15.917258] ? trace_preempt_on+0x20/0xc0 [ 15.917283] ? __pfx_kthread+0x10/0x10 [ 15.917305] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.917329] ? calculate_sigpending+0x7b/0xa0 [ 15.917356] ? __pfx_kthread+0x10/0x10 [ 15.917378] ret_from_fork+0x116/0x1d0 [ 15.917398] ? __pfx_kthread+0x10/0x10 [ 15.917434] ret_from_fork_asm+0x1a/0x30 [ 15.917477] </TASK> [ 15.917488] [ 15.926840] Allocated by task 283: [ 15.927169] kasan_save_stack+0x45/0x70 [ 15.927352] kasan_save_track+0x18/0x40 [ 15.927763] kasan_save_alloc_info+0x3b/0x50 [ 15.927953] __kasan_kmalloc+0xb7/0xc0 [ 15.928250] __kmalloc_cache_noprof+0x189/0x420 [ 15.928541] kasan_atomics+0x95/0x310 [ 15.928789] kunit_try_run_case+0x1a5/0x480 [ 15.929060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.929286] kthread+0x337/0x6f0 [ 15.929443] ret_from_fork+0x116/0x1d0 [ 15.929814] ret_from_fork_asm+0x1a/0x30 [ 15.930014] [ 15.930104] The buggy address belongs to the object at ffff8881026d6200 [ 15.930104] which belongs to the cache kmalloc-64 of size 64 [ 15.930820] The buggy address is located 0 bytes to the right of [ 15.930820] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.931439] [ 15.931657] The buggy address belongs to the physical page: [ 15.931956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.932267] flags: 0x200000000000000(node=0|zone=2) [ 15.932538] page_type: f5(slab) [ 15.932854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.933246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.933591] page dumped because: kasan: bad access detected [ 15.933936] [ 15.934037] Memory state around the buggy address: [ 15.934238] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.934754] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.935057] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.935446] ^ [ 15.935663] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936073] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936437] ================================================================== [ 16.158828] ================================================================== [ 16.159164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.159399] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.159714] [ 16.159828] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.159879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.159894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.159917] Call Trace: [ 16.159936] <TASK> [ 16.159956] dump_stack_lvl+0x73/0xb0 [ 16.159985] print_report+0xd1/0x610 [ 16.160009] ? __virt_addr_valid+0x1db/0x2d0 [ 16.160032] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.160054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.160077] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.160099] kasan_report+0x141/0x180 [ 16.160121] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.160147] __asan_report_load8_noabort+0x18/0x20 [ 16.160172] kasan_atomics_helper+0x4f30/0x5450 [ 16.160195] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.160217] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.160250] kasan_atomics+0x1dc/0x310 [ 16.160273] ? __pfx_kasan_atomics+0x10/0x10 [ 16.160302] ? __pfx_read_tsc+0x10/0x10 [ 16.160323] ? ktime_get_ts64+0x86/0x230 [ 16.160348] kunit_try_run_case+0x1a5/0x480 [ 16.160373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.160423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.160447] ? __kthread_parkme+0x82/0x180 [ 16.160499] ? preempt_count_sub+0x50/0x80 [ 16.160525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.160593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.160621] kthread+0x337/0x6f0 [ 16.160642] ? trace_preempt_on+0x20/0xc0 [ 16.160668] ? __pfx_kthread+0x10/0x10 [ 16.160690] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.160714] ? calculate_sigpending+0x7b/0xa0 [ 16.160740] ? __pfx_kthread+0x10/0x10 [ 16.160763] ret_from_fork+0x116/0x1d0 [ 16.160784] ? __pfx_kthread+0x10/0x10 [ 16.160808] ret_from_fork_asm+0x1a/0x30 [ 16.160843] </TASK> [ 16.160856] [ 16.168238] Allocated by task 283: [ 16.168432] kasan_save_stack+0x45/0x70 [ 16.168645] kasan_save_track+0x18/0x40 [ 16.168838] kasan_save_alloc_info+0x3b/0x50 [ 16.169045] __kasan_kmalloc+0xb7/0xc0 [ 16.169179] __kmalloc_cache_noprof+0x189/0x420 [ 16.169338] kasan_atomics+0x95/0x310 [ 16.169621] kunit_try_run_case+0x1a5/0x480 [ 16.169832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.170088] kthread+0x337/0x6f0 [ 16.170263] ret_from_fork+0x116/0x1d0 [ 16.170437] ret_from_fork_asm+0x1a/0x30 [ 16.170616] [ 16.170714] The buggy address belongs to the object at ffff8881026d6200 [ 16.170714] which belongs to the cache kmalloc-64 of size 64 [ 16.171136] The buggy address is located 0 bytes to the right of [ 16.171136] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.171693] [ 16.171784] The buggy address belongs to the physical page: [ 16.171963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.172204] flags: 0x200000000000000(node=0|zone=2) [ 16.172374] page_type: f5(slab) [ 16.172703] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.173053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.173411] page dumped because: kasan: bad access detected [ 16.173657] [ 16.173750] Memory state around the buggy address: [ 16.173958] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.174184] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.174399] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.174729] ^ [ 16.174957] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.175284] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.176840] ================================================================== [ 16.253210] ================================================================== [ 16.253714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.254230] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.254539] [ 16.254732] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.254780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.254793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.254816] Call Trace: [ 16.254836] <TASK> [ 16.254855] dump_stack_lvl+0x73/0xb0 [ 16.254886] print_report+0xd1/0x610 [ 16.254911] ? __virt_addr_valid+0x1db/0x2d0 [ 16.254936] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.254959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.254985] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.255010] kasan_report+0x141/0x180 [ 16.255035] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.255063] kasan_check_range+0x10c/0x1c0 [ 16.255088] __kasan_check_write+0x18/0x20 [ 16.255109] kasan_atomics_helper+0x1eaa/0x5450 [ 16.255134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.255158] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.255191] kasan_atomics+0x1dc/0x310 [ 16.255215] ? __pfx_kasan_atomics+0x10/0x10 [ 16.255241] ? __pfx_read_tsc+0x10/0x10 [ 16.255263] ? ktime_get_ts64+0x86/0x230 [ 16.255289] kunit_try_run_case+0x1a5/0x480 [ 16.255316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.255341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.255367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.255393] ? __kthread_parkme+0x82/0x180 [ 16.255425] ? preempt_count_sub+0x50/0x80 [ 16.255462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.255489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.255515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.255542] kthread+0x337/0x6f0 [ 16.255563] ? trace_preempt_on+0x20/0xc0 [ 16.255626] ? __pfx_kthread+0x10/0x10 [ 16.255673] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.255721] ? calculate_sigpending+0x7b/0xa0 [ 16.255815] ? __pfx_kthread+0x10/0x10 [ 16.255862] ret_from_fork+0x116/0x1d0 [ 16.255884] ? __pfx_kthread+0x10/0x10 [ 16.255906] ret_from_fork_asm+0x1a/0x30 [ 16.255940] </TASK> [ 16.255952] [ 16.263633] Allocated by task 283: [ 16.263884] kasan_save_stack+0x45/0x70 [ 16.264109] kasan_save_track+0x18/0x40 [ 16.264248] kasan_save_alloc_info+0x3b/0x50 [ 16.264399] __kasan_kmalloc+0xb7/0xc0 [ 16.264646] __kmalloc_cache_noprof+0x189/0x420 [ 16.264898] kasan_atomics+0x95/0x310 [ 16.265118] kunit_try_run_case+0x1a5/0x480 [ 16.265331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.265587] kthread+0x337/0x6f0 [ 16.265790] ret_from_fork+0x116/0x1d0 [ 16.265987] ret_from_fork_asm+0x1a/0x30 [ 16.266166] [ 16.266296] The buggy address belongs to the object at ffff8881026d6200 [ 16.266296] which belongs to the cache kmalloc-64 of size 64 [ 16.266772] The buggy address is located 0 bytes to the right of [ 16.266772] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.267332] [ 16.267473] The buggy address belongs to the physical page: [ 16.267692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.267928] flags: 0x200000000000000(node=0|zone=2) [ 16.268092] page_type: f5(slab) [ 16.268211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.268520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.268742] page dumped because: kasan: bad access detected [ 16.269149] [ 16.269303] Memory state around the buggy address: [ 16.269586] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.270045] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.270386] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.270618] ^ [ 16.270777] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.270993] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.271209] ================================================================== [ 15.622876] ================================================================== [ 15.623232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.623619] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.623948] [ 15.624067] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.624112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.624135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.624158] Call Trace: [ 15.624177] <TASK> [ 15.624206] dump_stack_lvl+0x73/0xb0 [ 15.624236] print_report+0xd1/0x610 [ 15.624259] ? __virt_addr_valid+0x1db/0x2d0 [ 15.624297] ? kasan_atomics_helper+0x1079/0x5450 [ 15.624321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.624347] ? kasan_atomics_helper+0x1079/0x5450 [ 15.624381] kasan_report+0x141/0x180 [ 15.624430] ? kasan_atomics_helper+0x1079/0x5450 [ 15.624472] kasan_check_range+0x10c/0x1c0 [ 15.624498] __kasan_check_write+0x18/0x20 [ 15.624519] kasan_atomics_helper+0x1079/0x5450 [ 15.624545] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.624570] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.624604] kasan_atomics+0x1dc/0x310 [ 15.624629] ? __pfx_kasan_atomics+0x10/0x10 [ 15.624655] ? __pfx_read_tsc+0x10/0x10 [ 15.624678] ? ktime_get_ts64+0x86/0x230 [ 15.624704] kunit_try_run_case+0x1a5/0x480 [ 15.624731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.624757] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.624783] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.624809] ? __kthread_parkme+0x82/0x180 [ 15.624833] ? preempt_count_sub+0x50/0x80 [ 15.624859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.624886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.624914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.624942] kthread+0x337/0x6f0 [ 15.624971] ? trace_preempt_on+0x20/0xc0 [ 15.624997] ? __pfx_kthread+0x10/0x10 [ 15.625019] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.625054] ? calculate_sigpending+0x7b/0xa0 [ 15.625090] ? __pfx_kthread+0x10/0x10 [ 15.625113] ret_from_fork+0x116/0x1d0 [ 15.625134] ? __pfx_kthread+0x10/0x10 [ 15.625167] ret_from_fork_asm+0x1a/0x30 [ 15.625200] </TASK> [ 15.625211] [ 15.632295] Allocated by task 283: [ 15.632536] kasan_save_stack+0x45/0x70 [ 15.632763] kasan_save_track+0x18/0x40 [ 15.632958] kasan_save_alloc_info+0x3b/0x50 [ 15.633194] __kasan_kmalloc+0xb7/0xc0 [ 15.633384] __kmalloc_cache_noprof+0x189/0x420 [ 15.633651] kasan_atomics+0x95/0x310 [ 15.633843] kunit_try_run_case+0x1a5/0x480 [ 15.634035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.634299] kthread+0x337/0x6f0 [ 15.634503] ret_from_fork+0x116/0x1d0 [ 15.634693] ret_from_fork_asm+0x1a/0x30 [ 15.634896] [ 15.635008] The buggy address belongs to the object at ffff8881026d6200 [ 15.635008] which belongs to the cache kmalloc-64 of size 64 [ 15.635524] The buggy address is located 0 bytes to the right of [ 15.635524] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.636022] [ 15.636118] The buggy address belongs to the physical page: [ 15.636359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.636727] flags: 0x200000000000000(node=0|zone=2) [ 15.636968] page_type: f5(slab) [ 15.637092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.637325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.637588] page dumped because: kasan: bad access detected [ 15.637802] [ 15.637907] Memory state around the buggy address: [ 15.638130] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.638480] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.638797] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.639076] ^ [ 15.639232] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.639479] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.639694] ================================================================== [ 15.416898] ================================================================== [ 15.417242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.417744] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.418036] [ 15.418150] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.418199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.418212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.418236] Call Trace: [ 15.418253] <TASK> [ 15.418271] dump_stack_lvl+0x73/0xb0 [ 15.418301] print_report+0xd1/0x610 [ 15.418325] ? __virt_addr_valid+0x1db/0x2d0 [ 15.418349] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.418373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.418419] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.418444] kasan_report+0x141/0x180 [ 15.418477] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.418505] kasan_check_range+0x10c/0x1c0 [ 15.418531] __kasan_check_write+0x18/0x20 [ 15.418553] kasan_atomics_helper+0xa2b/0x5450 [ 15.418577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.418603] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.418635] kasan_atomics+0x1dc/0x310 [ 15.418660] ? __pfx_kasan_atomics+0x10/0x10 [ 15.418686] ? __pfx_read_tsc+0x10/0x10 [ 15.418710] ? ktime_get_ts64+0x86/0x230 [ 15.418735] kunit_try_run_case+0x1a5/0x480 [ 15.418761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.418796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.418822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.418859] ? __kthread_parkme+0x82/0x180 [ 15.418885] ? preempt_count_sub+0x50/0x80 [ 15.418911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.418937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.418973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.419000] kthread+0x337/0x6f0 [ 15.419031] ? trace_preempt_on+0x20/0xc0 [ 15.419057] ? __pfx_kthread+0x10/0x10 [ 15.419079] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.419103] ? calculate_sigpending+0x7b/0xa0 [ 15.419138] ? __pfx_kthread+0x10/0x10 [ 15.419162] ret_from_fork+0x116/0x1d0 [ 15.419182] ? __pfx_kthread+0x10/0x10 [ 15.419214] ret_from_fork_asm+0x1a/0x30 [ 15.419247] </TASK> [ 15.419258] [ 15.427905] Allocated by task 283: [ 15.428090] kasan_save_stack+0x45/0x70 [ 15.428242] kasan_save_track+0x18/0x40 [ 15.428481] kasan_save_alloc_info+0x3b/0x50 [ 15.428729] __kasan_kmalloc+0xb7/0xc0 [ 15.428946] __kmalloc_cache_noprof+0x189/0x420 [ 15.429163] kasan_atomics+0x95/0x310 [ 15.429315] kunit_try_run_case+0x1a5/0x480 [ 15.429573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.429799] kthread+0x337/0x6f0 [ 15.429975] ret_from_fork+0x116/0x1d0 [ 15.430180] ret_from_fork_asm+0x1a/0x30 [ 15.430325] [ 15.430417] The buggy address belongs to the object at ffff8881026d6200 [ 15.430417] which belongs to the cache kmalloc-64 of size 64 [ 15.430946] The buggy address is located 0 bytes to the right of [ 15.430946] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.431332] [ 15.431467] The buggy address belongs to the physical page: [ 15.431752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.432107] flags: 0x200000000000000(node=0|zone=2) [ 15.432373] page_type: f5(slab) [ 15.432570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.432882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.433199] page dumped because: kasan: bad access detected [ 15.433465] [ 15.433561] Memory state around the buggy address: [ 15.433765] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.434051] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.434350] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.434639] ^ [ 15.434887] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.435132] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.435474] ================================================================== [ 16.362404] ================================================================== [ 16.363021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.363316] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.363855] [ 16.363953] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.364035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.364060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.364096] Call Trace: [ 16.364117] <TASK> [ 16.364136] dump_stack_lvl+0x73/0xb0 [ 16.364167] print_report+0xd1/0x610 [ 16.364192] ? __virt_addr_valid+0x1db/0x2d0 [ 16.364218] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.364241] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.364267] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.364295] kasan_report+0x141/0x180 [ 16.364319] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.364348] kasan_check_range+0x10c/0x1c0 [ 16.364403] __kasan_check_write+0x18/0x20 [ 16.364436] kasan_atomics_helper+0x20c8/0x5450 [ 16.364480] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.364505] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.364537] kasan_atomics+0x1dc/0x310 [ 16.364562] ? __pfx_kasan_atomics+0x10/0x10 [ 16.364589] ? __pfx_read_tsc+0x10/0x10 [ 16.364611] ? ktime_get_ts64+0x86/0x230 [ 16.364638] kunit_try_run_case+0x1a5/0x480 [ 16.364665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.364690] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.364717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.364742] ? __kthread_parkme+0x82/0x180 [ 16.364764] ? preempt_count_sub+0x50/0x80 [ 16.364790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.364816] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.364843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.364871] kthread+0x337/0x6f0 [ 16.364891] ? trace_preempt_on+0x20/0xc0 [ 16.364916] ? __pfx_kthread+0x10/0x10 [ 16.364938] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.364961] ? calculate_sigpending+0x7b/0xa0 [ 16.364988] ? __pfx_kthread+0x10/0x10 [ 16.365010] ret_from_fork+0x116/0x1d0 [ 16.365061] ? __pfx_kthread+0x10/0x10 [ 16.365083] ret_from_fork_asm+0x1a/0x30 [ 16.365116] </TASK> [ 16.365137] [ 16.372983] Allocated by task 283: [ 16.373144] kasan_save_stack+0x45/0x70 [ 16.373387] kasan_save_track+0x18/0x40 [ 16.373599] kasan_save_alloc_info+0x3b/0x50 [ 16.373754] __kasan_kmalloc+0xb7/0xc0 [ 16.373890] __kmalloc_cache_noprof+0x189/0x420 [ 16.374069] kasan_atomics+0x95/0x310 [ 16.374291] kunit_try_run_case+0x1a5/0x480 [ 16.374520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.374782] kthread+0x337/0x6f0 [ 16.375085] ret_from_fork+0x116/0x1d0 [ 16.375306] ret_from_fork_asm+0x1a/0x30 [ 16.375808] [ 16.375949] The buggy address belongs to the object at ffff8881026d6200 [ 16.375949] which belongs to the cache kmalloc-64 of size 64 [ 16.377231] The buggy address is located 0 bytes to the right of [ 16.377231] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.377823] [ 16.377926] The buggy address belongs to the physical page: [ 16.378148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.378731] flags: 0x200000000000000(node=0|zone=2) [ 16.378933] page_type: f5(slab) [ 16.379111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.379639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.379928] page dumped because: kasan: bad access detected [ 16.380172] [ 16.380249] Memory state around the buggy address: [ 16.380701] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.381050] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.381303] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.381798] ^ [ 16.382103] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.382353] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.382845] ================================================================== [ 15.111688] ================================================================== [ 15.112816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.113090] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.113317] [ 15.113403] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.113735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.113952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.113979] Call Trace: [ 15.113993] <TASK> [ 15.114022] dump_stack_lvl+0x73/0xb0 [ 15.114054] print_report+0xd1/0x610 [ 15.114078] ? __virt_addr_valid+0x1db/0x2d0 [ 15.114101] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.114123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.114147] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.114170] kasan_report+0x141/0x180 [ 15.114192] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.114218] __asan_report_load4_noabort+0x18/0x20 [ 15.114244] kasan_atomics_helper+0x4b88/0x5450 [ 15.114267] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.114290] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.114322] kasan_atomics+0x1dc/0x310 [ 15.114345] ? __pfx_kasan_atomics+0x10/0x10 [ 15.114369] ? __pfx_read_tsc+0x10/0x10 [ 15.114391] ? ktime_get_ts64+0x86/0x230 [ 15.114431] kunit_try_run_case+0x1a5/0x480 [ 15.114469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.114518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.114542] ? __kthread_parkme+0x82/0x180 [ 15.114593] ? preempt_count_sub+0x50/0x80 [ 15.114618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.114669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.114695] kthread+0x337/0x6f0 [ 15.114715] ? trace_preempt_on+0x20/0xc0 [ 15.114738] ? __pfx_kthread+0x10/0x10 [ 15.114760] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.114782] ? calculate_sigpending+0x7b/0xa0 [ 15.114806] ? __pfx_kthread+0x10/0x10 [ 15.114828] ret_from_fork+0x116/0x1d0 [ 15.114848] ? __pfx_kthread+0x10/0x10 [ 15.114869] ret_from_fork_asm+0x1a/0x30 [ 15.114900] </TASK> [ 15.114910] [ 15.132707] Allocated by task 283: [ 15.133077] kasan_save_stack+0x45/0x70 [ 15.133702] kasan_save_track+0x18/0x40 [ 15.134103] kasan_save_alloc_info+0x3b/0x50 [ 15.134305] __kasan_kmalloc+0xb7/0xc0 [ 15.134462] __kmalloc_cache_noprof+0x189/0x420 [ 15.134928] kasan_atomics+0x95/0x310 [ 15.135397] kunit_try_run_case+0x1a5/0x480 [ 15.135826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.136320] kthread+0x337/0x6f0 [ 15.136716] ret_from_fork+0x116/0x1d0 [ 15.137082] ret_from_fork_asm+0x1a/0x30 [ 15.137465] [ 15.137667] The buggy address belongs to the object at ffff8881026d6200 [ 15.137667] which belongs to the cache kmalloc-64 of size 64 [ 15.138583] The buggy address is located 0 bytes to the right of [ 15.138583] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.139165] [ 15.139242] The buggy address belongs to the physical page: [ 15.139431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.140277] flags: 0x200000000000000(node=0|zone=2) [ 15.140809] page_type: f5(slab) [ 15.141165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.141974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.142741] page dumped because: kasan: bad access detected [ 15.143156] [ 15.143234] Memory state around the buggy address: [ 15.143701] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.144394] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.144981] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.145514] ^ [ 15.145720] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.146388] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147149] ================================================================== [ 15.569056] ================================================================== [ 15.569305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.569883] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.570264] [ 15.570380] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.570446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.570468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.570492] Call Trace: [ 15.570511] <TASK> [ 15.570529] dump_stack_lvl+0x73/0xb0 [ 15.570561] print_report+0xd1/0x610 [ 15.570585] ? __virt_addr_valid+0x1db/0x2d0 [ 15.570611] ? kasan_atomics_helper+0xf10/0x5450 [ 15.570634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.570659] ? kasan_atomics_helper+0xf10/0x5450 [ 15.570683] kasan_report+0x141/0x180 [ 15.570716] ? kasan_atomics_helper+0xf10/0x5450 [ 15.570745] kasan_check_range+0x10c/0x1c0 [ 15.570770] __kasan_check_write+0x18/0x20 [ 15.570802] kasan_atomics_helper+0xf10/0x5450 [ 15.570827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.570852] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.570894] kasan_atomics+0x1dc/0x310 [ 15.570918] ? __pfx_kasan_atomics+0x10/0x10 [ 15.570955] ? __pfx_read_tsc+0x10/0x10 [ 15.570978] ? ktime_get_ts64+0x86/0x230 [ 15.571003] kunit_try_run_case+0x1a5/0x480 [ 15.571030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.571064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.571091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.571127] ? __kthread_parkme+0x82/0x180 [ 15.571150] ? preempt_count_sub+0x50/0x80 [ 15.571177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.571203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.571230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.571257] kthread+0x337/0x6f0 [ 15.571278] ? trace_preempt_on+0x20/0xc0 [ 15.571304] ? __pfx_kthread+0x10/0x10 [ 15.571326] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.571349] ? calculate_sigpending+0x7b/0xa0 [ 15.571375] ? __pfx_kthread+0x10/0x10 [ 15.571416] ret_from_fork+0x116/0x1d0 [ 15.571437] ? __pfx_kthread+0x10/0x10 [ 15.571467] ret_from_fork_asm+0x1a/0x30 [ 15.571509] </TASK> [ 15.571520] [ 15.578997] Allocated by task 283: [ 15.579178] kasan_save_stack+0x45/0x70 [ 15.579324] kasan_save_track+0x18/0x40 [ 15.579490] kasan_save_alloc_info+0x3b/0x50 [ 15.579663] __kasan_kmalloc+0xb7/0xc0 [ 15.579875] __kmalloc_cache_noprof+0x189/0x420 [ 15.580099] kasan_atomics+0x95/0x310 [ 15.580291] kunit_try_run_case+0x1a5/0x480 [ 15.580533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.580726] kthread+0x337/0x6f0 [ 15.580915] ret_from_fork+0x116/0x1d0 [ 15.581089] ret_from_fork_asm+0x1a/0x30 [ 15.581230] [ 15.581302] The buggy address belongs to the object at ffff8881026d6200 [ 15.581302] which belongs to the cache kmalloc-64 of size 64 [ 15.581885] The buggy address is located 0 bytes to the right of [ 15.581885] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.582419] [ 15.582534] The buggy address belongs to the physical page: [ 15.582764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.583108] flags: 0x200000000000000(node=0|zone=2) [ 15.583336] page_type: f5(slab) [ 15.583514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.583846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.584169] page dumped because: kasan: bad access detected [ 15.584422] [ 15.584544] Memory state around the buggy address: [ 15.584734] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.584950] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.585166] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.585421] ^ [ 15.585667] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.585979] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.586293] ================================================================== [ 15.587561] ================================================================== [ 15.587917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.588224] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.588521] [ 15.588636] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.588682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.588695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.588718] Call Trace: [ 15.588736] <TASK> [ 15.588755] dump_stack_lvl+0x73/0xb0 [ 15.588784] print_report+0xd1/0x610 [ 15.588807] ? __virt_addr_valid+0x1db/0x2d0 [ 15.588830] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.588852] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.588876] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.588898] kasan_report+0x141/0x180 [ 15.588921] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.588947] kasan_check_range+0x10c/0x1c0 [ 15.588972] __kasan_check_write+0x18/0x20 [ 15.588991] kasan_atomics_helper+0xfa9/0x5450 [ 15.589015] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.589037] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.589068] kasan_atomics+0x1dc/0x310 [ 15.589092] ? __pfx_kasan_atomics+0x10/0x10 [ 15.589116] ? __pfx_read_tsc+0x10/0x10 [ 15.589138] ? ktime_get_ts64+0x86/0x230 [ 15.589162] kunit_try_run_case+0x1a5/0x480 [ 15.589187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.589210] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.589234] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.589258] ? __kthread_parkme+0x82/0x180 [ 15.589279] ? preempt_count_sub+0x50/0x80 [ 15.589303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.589328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.589352] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.589378] kthread+0x337/0x6f0 [ 15.589397] ? trace_preempt_on+0x20/0xc0 [ 15.589422] ? __pfx_kthread+0x10/0x10 [ 15.589443] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.589573] ? calculate_sigpending+0x7b/0xa0 [ 15.589601] ? __pfx_kthread+0x10/0x10 [ 15.589625] ret_from_fork+0x116/0x1d0 [ 15.589646] ? __pfx_kthread+0x10/0x10 [ 15.589669] ret_from_fork_asm+0x1a/0x30 [ 15.589701] </TASK> [ 15.589712] [ 15.597148] Allocated by task 283: [ 15.597331] kasan_save_stack+0x45/0x70 [ 15.597556] kasan_save_track+0x18/0x40 [ 15.597695] kasan_save_alloc_info+0x3b/0x50 [ 15.597848] __kasan_kmalloc+0xb7/0xc0 [ 15.598039] __kmalloc_cache_noprof+0x189/0x420 [ 15.598284] kasan_atomics+0x95/0x310 [ 15.598509] kunit_try_run_case+0x1a5/0x480 [ 15.598719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.598935] kthread+0x337/0x6f0 [ 15.599058] ret_from_fork+0x116/0x1d0 [ 15.599247] ret_from_fork_asm+0x1a/0x30 [ 15.599482] [ 15.599599] The buggy address belongs to the object at ffff8881026d6200 [ 15.599599] which belongs to the cache kmalloc-64 of size 64 [ 15.600092] The buggy address is located 0 bytes to the right of [ 15.600092] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.600643] [ 15.600741] The buggy address belongs to the physical page: [ 15.600983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.601320] flags: 0x200000000000000(node=0|zone=2) [ 15.601586] page_type: f5(slab) [ 15.601715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.601949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.602182] page dumped because: kasan: bad access detected [ 15.602440] [ 15.602543] Memory state around the buggy address: [ 15.602764] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.603079] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.603422] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.603743] ^ [ 15.603959] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.604233] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.604543] ================================================================== [ 15.278721] ================================================================== [ 15.279472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.280158] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.280717] [ 15.280895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.280958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.280971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.280995] Call Trace: [ 15.281015] <TASK> [ 15.281044] dump_stack_lvl+0x73/0xb0 [ 15.281076] print_report+0xd1/0x610 [ 15.281101] ? __virt_addr_valid+0x1db/0x2d0 [ 15.281138] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.281161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.281186] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.281210] kasan_report+0x141/0x180 [ 15.281234] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.281262] kasan_check_range+0x10c/0x1c0 [ 15.281288] __kasan_check_write+0x18/0x20 [ 15.281308] kasan_atomics_helper+0x5fe/0x5450 [ 15.281334] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.281359] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.281410] kasan_atomics+0x1dc/0x310 [ 15.281435] ? __pfx_kasan_atomics+0x10/0x10 [ 15.281470] ? __pfx_read_tsc+0x10/0x10 [ 15.281494] ? ktime_get_ts64+0x86/0x230 [ 15.281521] kunit_try_run_case+0x1a5/0x480 [ 15.281548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.281573] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.281600] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.281626] ? __kthread_parkme+0x82/0x180 [ 15.281649] ? preempt_count_sub+0x50/0x80 [ 15.281675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.281701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.281728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.281755] kthread+0x337/0x6f0 [ 15.281776] ? trace_preempt_on+0x20/0xc0 [ 15.281802] ? __pfx_kthread+0x10/0x10 [ 15.281824] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.281847] ? calculate_sigpending+0x7b/0xa0 [ 15.281873] ? __pfx_kthread+0x10/0x10 [ 15.281896] ret_from_fork+0x116/0x1d0 [ 15.281916] ? __pfx_kthread+0x10/0x10 [ 15.281939] ret_from_fork_asm+0x1a/0x30 [ 15.281971] </TASK> [ 15.281983] [ 15.294503] Allocated by task 283: [ 15.294869] kasan_save_stack+0x45/0x70 [ 15.295043] kasan_save_track+0x18/0x40 [ 15.295327] kasan_save_alloc_info+0x3b/0x50 [ 15.295764] __kasan_kmalloc+0xb7/0xc0 [ 15.296115] __kmalloc_cache_noprof+0x189/0x420 [ 15.296336] kasan_atomics+0x95/0x310 [ 15.296747] kunit_try_run_case+0x1a5/0x480 [ 15.297148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.297440] kthread+0x337/0x6f0 [ 15.297769] ret_from_fork+0x116/0x1d0 [ 15.298002] ret_from_fork_asm+0x1a/0x30 [ 15.298326] [ 15.298420] The buggy address belongs to the object at ffff8881026d6200 [ 15.298420] which belongs to the cache kmalloc-64 of size 64 [ 15.299187] The buggy address is located 0 bytes to the right of [ 15.299187] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.300187] [ 15.300368] The buggy address belongs to the physical page: [ 15.300816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.301050] flags: 0x200000000000000(node=0|zone=2) [ 15.301209] page_type: f5(slab) [ 15.301328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.301958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.302636] page dumped because: kasan: bad access detected [ 15.303127] [ 15.303283] Memory state around the buggy address: [ 15.303731] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.304345] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.304970] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.305354] ^ [ 15.305776] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.306346] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.306898] ================================================================== [ 16.055129] ================================================================== [ 16.055525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.055852] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.056136] [ 16.056256] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.056309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.056323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.056346] Call Trace: [ 16.056364] <TASK> [ 16.056384] dump_stack_lvl+0x73/0xb0 [ 16.056870] print_report+0xd1/0x610 [ 16.056907] ? __virt_addr_valid+0x1db/0x2d0 [ 16.056933] ? kasan_atomics_helper+0x194a/0x5450 [ 16.056958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.056984] ? kasan_atomics_helper+0x194a/0x5450 [ 16.057008] kasan_report+0x141/0x180 [ 16.057032] ? kasan_atomics_helper+0x194a/0x5450 [ 16.057060] kasan_check_range+0x10c/0x1c0 [ 16.057085] __kasan_check_write+0x18/0x20 [ 16.057107] kasan_atomics_helper+0x194a/0x5450 [ 16.057131] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.057156] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.057189] kasan_atomics+0x1dc/0x310 [ 16.057214] ? __pfx_kasan_atomics+0x10/0x10 [ 16.057240] ? __pfx_read_tsc+0x10/0x10 [ 16.057263] ? ktime_get_ts64+0x86/0x230 [ 16.057290] kunit_try_run_case+0x1a5/0x480 [ 16.057317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.057342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.057368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.057394] ? __kthread_parkme+0x82/0x180 [ 16.057428] ? preempt_count_sub+0x50/0x80 [ 16.057466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.057492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.057519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.057547] kthread+0x337/0x6f0 [ 16.057567] ? trace_preempt_on+0x20/0xc0 [ 16.057593] ? __pfx_kthread+0x10/0x10 [ 16.057615] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.057639] ? calculate_sigpending+0x7b/0xa0 [ 16.057665] ? __pfx_kthread+0x10/0x10 [ 16.057688] ret_from_fork+0x116/0x1d0 [ 16.057708] ? __pfx_kthread+0x10/0x10 [ 16.057730] ret_from_fork_asm+0x1a/0x30 [ 16.057763] </TASK> [ 16.057775] [ 16.066998] Allocated by task 283: [ 16.067178] kasan_save_stack+0x45/0x70 [ 16.067569] kasan_save_track+0x18/0x40 [ 16.067762] kasan_save_alloc_info+0x3b/0x50 [ 16.068075] __kasan_kmalloc+0xb7/0xc0 [ 16.068261] __kmalloc_cache_noprof+0x189/0x420 [ 16.068600] kasan_atomics+0x95/0x310 [ 16.068749] kunit_try_run_case+0x1a5/0x480 [ 16.068957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.069188] kthread+0x337/0x6f0 [ 16.069348] ret_from_fork+0x116/0x1d0 [ 16.069783] ret_from_fork_asm+0x1a/0x30 [ 16.069980] [ 16.070190] The buggy address belongs to the object at ffff8881026d6200 [ 16.070190] which belongs to the cache kmalloc-64 of size 64 [ 16.070865] The buggy address is located 0 bytes to the right of [ 16.070865] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.071432] [ 16.071607] The buggy address belongs to the physical page: [ 16.071834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.072279] flags: 0x200000000000000(node=0|zone=2) [ 16.072530] page_type: f5(slab) [ 16.072679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.073004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.073311] page dumped because: kasan: bad access detected [ 16.073843] [ 16.073942] Memory state around the buggy address: [ 16.074135] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.074433] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.074896] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.075244] ^ [ 16.075475] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.075902] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.076261] ================================================================== [ 16.099235] ================================================================== [ 16.099597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.099984] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.100779] [ 16.100912] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.100960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.100974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.100996] Call Trace: [ 16.101016] <TASK> [ 16.101035] dump_stack_lvl+0x73/0xb0 [ 16.101066] print_report+0xd1/0x610 [ 16.101094] ? __virt_addr_valid+0x1db/0x2d0 [ 16.101119] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.101143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.101171] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.101194] kasan_report+0x141/0x180 [ 16.101217] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.101245] kasan_check_range+0x10c/0x1c0 [ 16.101271] __kasan_check_write+0x18/0x20 [ 16.101292] kasan_atomics_helper+0x1a7f/0x5450 [ 16.101318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.101343] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.101377] kasan_atomics+0x1dc/0x310 [ 16.101402] ? __pfx_kasan_atomics+0x10/0x10 [ 16.101607] ? __pfx_read_tsc+0x10/0x10 [ 16.101631] ? ktime_get_ts64+0x86/0x230 [ 16.101658] kunit_try_run_case+0x1a5/0x480 [ 16.101686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.101712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.101739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.101766] ? __kthread_parkme+0x82/0x180 [ 16.101789] ? preempt_count_sub+0x50/0x80 [ 16.101815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.101842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.101869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.101897] kthread+0x337/0x6f0 [ 16.101918] ? trace_preempt_on+0x20/0xc0 [ 16.101943] ? __pfx_kthread+0x10/0x10 [ 16.101966] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.101989] ? calculate_sigpending+0x7b/0xa0 [ 16.102016] ? __pfx_kthread+0x10/0x10 [ 16.102039] ret_from_fork+0x116/0x1d0 [ 16.102059] ? __pfx_kthread+0x10/0x10 [ 16.102082] ret_from_fork_asm+0x1a/0x30 [ 16.102116] </TASK> [ 16.102127] [ 16.111498] Allocated by task 283: [ 16.111645] kasan_save_stack+0x45/0x70 [ 16.111800] kasan_save_track+0x18/0x40 [ 16.112125] kasan_save_alloc_info+0x3b/0x50 [ 16.112526] __kasan_kmalloc+0xb7/0xc0 [ 16.112861] __kmalloc_cache_noprof+0x189/0x420 [ 16.113271] kasan_atomics+0x95/0x310 [ 16.113658] kunit_try_run_case+0x1a5/0x480 [ 16.114046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.114254] kthread+0x337/0x6f0 [ 16.114377] ret_from_fork+0x116/0x1d0 [ 16.114543] ret_from_fork_asm+0x1a/0x30 [ 16.114691] [ 16.114768] The buggy address belongs to the object at ffff8881026d6200 [ 16.114768] which belongs to the cache kmalloc-64 of size 64 [ 16.115127] The buggy address is located 0 bytes to the right of [ 16.115127] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.115672] [ 16.115832] The buggy address belongs to the physical page: [ 16.116301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.116992] flags: 0x200000000000000(node=0|zone=2) [ 16.117436] page_type: f5(slab) [ 16.117734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.118366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.119215] page dumped because: kasan: bad access detected [ 16.119797] [ 16.119954] Memory state around the buggy address: [ 16.120386] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.121205] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.121897] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.122561] ^ [ 16.122899] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.123115] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.123331] ================================================================== [ 15.515712] ================================================================== [ 15.516194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.516617] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.516866] [ 15.517003] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.517050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.517063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.517087] Call Trace: [ 15.517105] <TASK> [ 15.517134] dump_stack_lvl+0x73/0xb0 [ 15.517164] print_report+0xd1/0x610 [ 15.517200] ? __virt_addr_valid+0x1db/0x2d0 [ 15.517225] ? kasan_atomics_helper+0xd47/0x5450 [ 15.517248] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.517274] ? kasan_atomics_helper+0xd47/0x5450 [ 15.517307] kasan_report+0x141/0x180 [ 15.517330] ? kasan_atomics_helper+0xd47/0x5450 [ 15.517368] kasan_check_range+0x10c/0x1c0 [ 15.517413] __kasan_check_write+0x18/0x20 [ 15.517435] kasan_atomics_helper+0xd47/0x5450 [ 15.517474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.517499] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.517542] kasan_atomics+0x1dc/0x310 [ 15.517568] ? __pfx_kasan_atomics+0x10/0x10 [ 15.517594] ? __pfx_read_tsc+0x10/0x10 [ 15.517617] ? ktime_get_ts64+0x86/0x230 [ 15.517653] kunit_try_run_case+0x1a5/0x480 [ 15.517680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.517715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.517742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.517769] ? __kthread_parkme+0x82/0x180 [ 15.517800] ? preempt_count_sub+0x50/0x80 [ 15.517826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.517853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.517889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.517917] kthread+0x337/0x6f0 [ 15.517937] ? trace_preempt_on+0x20/0xc0 [ 15.517971] ? __pfx_kthread+0x10/0x10 [ 15.517993] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.518017] ? calculate_sigpending+0x7b/0xa0 [ 15.518054] ? __pfx_kthread+0x10/0x10 [ 15.518077] ret_from_fork+0x116/0x1d0 [ 15.518098] ? __pfx_kthread+0x10/0x10 [ 15.518120] ret_from_fork_asm+0x1a/0x30 [ 15.518153] </TASK> [ 15.518174] [ 15.525505] Allocated by task 283: [ 15.525693] kasan_save_stack+0x45/0x70 [ 15.525908] kasan_save_track+0x18/0x40 [ 15.526116] kasan_save_alloc_info+0x3b/0x50 [ 15.526377] __kasan_kmalloc+0xb7/0xc0 [ 15.526615] __kmalloc_cache_noprof+0x189/0x420 [ 15.526854] kasan_atomics+0x95/0x310 [ 15.527057] kunit_try_run_case+0x1a5/0x480 [ 15.527282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.527530] kthread+0x337/0x6f0 [ 15.527702] ret_from_fork+0x116/0x1d0 [ 15.527872] ret_from_fork_asm+0x1a/0x30 [ 15.528059] [ 15.528157] The buggy address belongs to the object at ffff8881026d6200 [ 15.528157] which belongs to the cache kmalloc-64 of size 64 [ 15.528679] The buggy address is located 0 bytes to the right of [ 15.528679] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.529198] [ 15.529318] The buggy address belongs to the physical page: [ 15.529604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.529941] flags: 0x200000000000000(node=0|zone=2) [ 15.530170] page_type: f5(slab) [ 15.530347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.530703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.531048] page dumped because: kasan: bad access detected [ 15.531272] [ 15.531341] Memory state around the buggy address: [ 15.531523] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.531733] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.531989] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.532333] ^ [ 15.532628] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532972] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.533281] ================================================================== [ 16.450759] ================================================================== [ 16.451136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.451854] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.452342] [ 16.452515] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.452564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.452577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.452600] Call Trace: [ 16.452620] <TASK> [ 16.452640] dump_stack_lvl+0x73/0xb0 [ 16.452671] print_report+0xd1/0x610 [ 16.452697] ? __virt_addr_valid+0x1db/0x2d0 [ 16.452722] ? kasan_atomics_helper+0x224c/0x5450 [ 16.452746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.452771] ? kasan_atomics_helper+0x224c/0x5450 [ 16.452796] kasan_report+0x141/0x180 [ 16.452819] ? kasan_atomics_helper+0x224c/0x5450 [ 16.452848] kasan_check_range+0x10c/0x1c0 [ 16.452873] __kasan_check_write+0x18/0x20 [ 16.452895] kasan_atomics_helper+0x224c/0x5450 [ 16.452920] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.452944] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.452977] kasan_atomics+0x1dc/0x310 [ 16.453002] ? __pfx_kasan_atomics+0x10/0x10 [ 16.453028] ? __pfx_read_tsc+0x10/0x10 [ 16.453051] ? ktime_get_ts64+0x86/0x230 [ 16.453078] kunit_try_run_case+0x1a5/0x480 [ 16.453104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.453130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.453156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.453181] ? __kthread_parkme+0x82/0x180 [ 16.453204] ? preempt_count_sub+0x50/0x80 [ 16.453229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.453256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.453282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.453309] kthread+0x337/0x6f0 [ 16.453330] ? trace_preempt_on+0x20/0xc0 [ 16.453355] ? __pfx_kthread+0x10/0x10 [ 16.453378] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.453400] ? calculate_sigpending+0x7b/0xa0 [ 16.453570] ? __pfx_kthread+0x10/0x10 [ 16.453595] ret_from_fork+0x116/0x1d0 [ 16.453617] ? __pfx_kthread+0x10/0x10 [ 16.453639] ret_from_fork_asm+0x1a/0x30 [ 16.453672] </TASK> [ 16.453683] [ 16.462930] Allocated by task 283: [ 16.463104] kasan_save_stack+0x45/0x70 [ 16.463299] kasan_save_track+0x18/0x40 [ 16.463871] kasan_save_alloc_info+0x3b/0x50 [ 16.464309] __kasan_kmalloc+0xb7/0xc0 [ 16.464752] __kmalloc_cache_noprof+0x189/0x420 [ 16.465086] kasan_atomics+0x95/0x310 [ 16.465512] kunit_try_run_case+0x1a5/0x480 [ 16.465716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.465949] kthread+0x337/0x6f0 [ 16.466107] ret_from_fork+0x116/0x1d0 [ 16.466286] ret_from_fork_asm+0x1a/0x30 [ 16.466750] [ 16.466983] The buggy address belongs to the object at ffff8881026d6200 [ 16.466983] which belongs to the cache kmalloc-64 of size 64 [ 16.467754] The buggy address is located 0 bytes to the right of [ 16.467754] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.468688] [ 16.468796] The buggy address belongs to the physical page: [ 16.469040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.469360] flags: 0x200000000000000(node=0|zone=2) [ 16.469851] page_type: f5(slab) [ 16.470123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.470717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.471203] page dumped because: kasan: bad access detected [ 16.471694] [ 16.471798] Memory state around the buggy address: [ 16.472009] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.472305] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.472911] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.473540] ^ [ 16.473823] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.474299] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.474736] ================================================================== [ 16.077067] ================================================================== [ 16.077680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.078006] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.078312] [ 16.078417] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.078636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.078650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.078674] Call Trace: [ 16.078693] <TASK> [ 16.078711] dump_stack_lvl+0x73/0xb0 [ 16.078743] print_report+0xd1/0x610 [ 16.078767] ? __virt_addr_valid+0x1db/0x2d0 [ 16.078793] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.078876] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.078901] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.078978] kasan_report+0x141/0x180 [ 16.079002] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.079030] kasan_check_range+0x10c/0x1c0 [ 16.079056] __kasan_check_write+0x18/0x20 [ 16.079079] kasan_atomics_helper+0x19e3/0x5450 [ 16.079103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.079128] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.079161] kasan_atomics+0x1dc/0x310 [ 16.079186] ? __pfx_kasan_atomics+0x10/0x10 [ 16.079212] ? __pfx_read_tsc+0x10/0x10 [ 16.079235] ? ktime_get_ts64+0x86/0x230 [ 16.079262] kunit_try_run_case+0x1a5/0x480 [ 16.079288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.079313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.079340] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.079366] ? __kthread_parkme+0x82/0x180 [ 16.079389] ? preempt_count_sub+0x50/0x80 [ 16.079427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.079467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.079494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.079521] kthread+0x337/0x6f0 [ 16.079543] ? trace_preempt_on+0x20/0xc0 [ 16.079569] ? __pfx_kthread+0x10/0x10 [ 16.079591] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.079615] ? calculate_sigpending+0x7b/0xa0 [ 16.079641] ? __pfx_kthread+0x10/0x10 [ 16.079665] ret_from_fork+0x116/0x1d0 [ 16.079685] ? __pfx_kthread+0x10/0x10 [ 16.079707] ret_from_fork_asm+0x1a/0x30 [ 16.079740] </TASK> [ 16.079751] [ 16.089154] Allocated by task 283: [ 16.089487] kasan_save_stack+0x45/0x70 [ 16.089680] kasan_save_track+0x18/0x40 [ 16.089851] kasan_save_alloc_info+0x3b/0x50 [ 16.090058] __kasan_kmalloc+0xb7/0xc0 [ 16.090235] __kmalloc_cache_noprof+0x189/0x420 [ 16.090745] kasan_atomics+0x95/0x310 [ 16.090941] kunit_try_run_case+0x1a5/0x480 [ 16.091110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.091480] kthread+0x337/0x6f0 [ 16.091650] ret_from_fork+0x116/0x1d0 [ 16.091944] ret_from_fork_asm+0x1a/0x30 [ 16.092184] [ 16.092351] The buggy address belongs to the object at ffff8881026d6200 [ 16.092351] which belongs to the cache kmalloc-64 of size 64 [ 16.092894] The buggy address is located 0 bytes to the right of [ 16.092894] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.093640] [ 16.093744] The buggy address belongs to the physical page: [ 16.093941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.094297] flags: 0x200000000000000(node=0|zone=2) [ 16.094755] page_type: f5(slab) [ 16.094913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.095206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.095669] page dumped because: kasan: bad access detected [ 16.095973] [ 16.096050] Memory state around the buggy address: [ 16.096354] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.096692] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.097143] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.097536] ^ [ 16.097830] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.098118] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.098532] ================================================================== [ 16.475292] ================================================================== [ 16.475611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.475963] Read of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.476243] [ 16.476342] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.476391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.476404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.476440] Call Trace: [ 16.476472] <TASK> [ 16.476493] dump_stack_lvl+0x73/0xb0 [ 16.476525] print_report+0xd1/0x610 [ 16.476550] ? __virt_addr_valid+0x1db/0x2d0 [ 16.476575] ? kasan_atomics_helper+0x5115/0x5450 [ 16.476599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.476624] ? kasan_atomics_helper+0x5115/0x5450 [ 16.476649] kasan_report+0x141/0x180 [ 16.476672] ? kasan_atomics_helper+0x5115/0x5450 [ 16.476701] __asan_report_load8_noabort+0x18/0x20 [ 16.476729] kasan_atomics_helper+0x5115/0x5450 [ 16.476754] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.476778] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.476811] kasan_atomics+0x1dc/0x310 [ 16.476836] ? __pfx_kasan_atomics+0x10/0x10 [ 16.476862] ? __pfx_read_tsc+0x10/0x10 [ 16.476886] ? ktime_get_ts64+0x86/0x230 [ 16.476912] kunit_try_run_case+0x1a5/0x480 [ 16.476939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.476964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.476989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.477015] ? __kthread_parkme+0x82/0x180 [ 16.477037] ? preempt_count_sub+0x50/0x80 [ 16.477063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.477090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.477116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.477143] kthread+0x337/0x6f0 [ 16.477164] ? trace_preempt_on+0x20/0xc0 [ 16.477189] ? __pfx_kthread+0x10/0x10 [ 16.477211] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.477234] ? calculate_sigpending+0x7b/0xa0 [ 16.477260] ? __pfx_kthread+0x10/0x10 [ 16.477283] ret_from_fork+0x116/0x1d0 [ 16.477303] ? __pfx_kthread+0x10/0x10 [ 16.477325] ret_from_fork_asm+0x1a/0x30 [ 16.477358] </TASK> [ 16.477369] [ 16.484643] Allocated by task 283: [ 16.484802] kasan_save_stack+0x45/0x70 [ 16.484948] kasan_save_track+0x18/0x40 [ 16.485121] kasan_save_alloc_info+0x3b/0x50 [ 16.485336] __kasan_kmalloc+0xb7/0xc0 [ 16.485540] __kmalloc_cache_noprof+0x189/0x420 [ 16.485749] kasan_atomics+0x95/0x310 [ 16.485885] kunit_try_run_case+0x1a5/0x480 [ 16.486032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.486300] kthread+0x337/0x6f0 [ 16.486546] ret_from_fork+0x116/0x1d0 [ 16.486734] ret_from_fork_asm+0x1a/0x30 [ 16.486907] [ 16.486981] The buggy address belongs to the object at ffff8881026d6200 [ 16.486981] which belongs to the cache kmalloc-64 of size 64 [ 16.487338] The buggy address is located 0 bytes to the right of [ 16.487338] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.487894] [ 16.487989] The buggy address belongs to the physical page: [ 16.488344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.488624] flags: 0x200000000000000(node=0|zone=2) [ 16.488790] page_type: f5(slab) [ 16.488910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.489250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.489823] page dumped because: kasan: bad access detected [ 16.490066] [ 16.490149] Memory state around the buggy address: [ 16.490347] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.490597] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.490927] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.491221] ^ [ 16.491413] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.491695] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.492121] ================================================================== [ 15.605226] ================================================================== [ 15.605608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.605937] Read of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.606160] [ 15.606250] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.606296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.606309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.606332] Call Trace: [ 15.606358] <TASK> [ 15.606376] dump_stack_lvl+0x73/0xb0 [ 15.606430] print_report+0xd1/0x610 [ 15.606463] ? __virt_addr_valid+0x1db/0x2d0 [ 15.606488] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.606512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.606538] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.606563] kasan_report+0x141/0x180 [ 15.606587] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.606615] __asan_report_load4_noabort+0x18/0x20 [ 15.606651] kasan_atomics_helper+0x4a36/0x5450 [ 15.606676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.606701] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.606745] kasan_atomics+0x1dc/0x310 [ 15.606771] ? __pfx_kasan_atomics+0x10/0x10 [ 15.606797] ? __pfx_read_tsc+0x10/0x10 [ 15.606820] ? ktime_get_ts64+0x86/0x230 [ 15.606847] kunit_try_run_case+0x1a5/0x480 [ 15.606874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.606899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.606924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.606951] ? __kthread_parkme+0x82/0x180 [ 15.606973] ? preempt_count_sub+0x50/0x80 [ 15.606998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.607025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.607051] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.607079] kthread+0x337/0x6f0 [ 15.607101] ? trace_preempt_on+0x20/0xc0 [ 15.607126] ? __pfx_kthread+0x10/0x10 [ 15.607148] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.607181] ? calculate_sigpending+0x7b/0xa0 [ 15.607208] ? __pfx_kthread+0x10/0x10 [ 15.607233] ret_from_fork+0x116/0x1d0 [ 15.607266] ? __pfx_kthread+0x10/0x10 [ 15.607288] ret_from_fork_asm+0x1a/0x30 [ 15.607320] </TASK> [ 15.607331] [ 15.614787] Allocated by task 283: [ 15.614956] kasan_save_stack+0x45/0x70 [ 15.615161] kasan_save_track+0x18/0x40 [ 15.615361] kasan_save_alloc_info+0x3b/0x50 [ 15.615595] __kasan_kmalloc+0xb7/0xc0 [ 15.615781] __kmalloc_cache_noprof+0x189/0x420 [ 15.615993] kasan_atomics+0x95/0x310 [ 15.616188] kunit_try_run_case+0x1a5/0x480 [ 15.616365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.616571] kthread+0x337/0x6f0 [ 15.616762] ret_from_fork+0x116/0x1d0 [ 15.616949] ret_from_fork_asm+0x1a/0x30 [ 15.617146] [ 15.617233] The buggy address belongs to the object at ffff8881026d6200 [ 15.617233] which belongs to the cache kmalloc-64 of size 64 [ 15.617720] The buggy address is located 0 bytes to the right of [ 15.617720] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.618235] [ 15.618335] The buggy address belongs to the physical page: [ 15.618612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.618856] flags: 0x200000000000000(node=0|zone=2) [ 15.619021] page_type: f5(slab) [ 15.619142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.619484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.619842] page dumped because: kasan: bad access detected [ 15.620091] [ 15.620184] Memory state around the buggy address: [ 15.620440] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.620697] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.620914] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.621148] ^ [ 15.621371] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.621733] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.622072] ================================================================== [ 15.326704] ================================================================== [ 15.327101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.327517] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.327871] [ 15.327961] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.328004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.328016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.328038] Call Trace: [ 15.328054] <TASK> [ 15.328070] dump_stack_lvl+0x73/0xb0 [ 15.328110] print_report+0xd1/0x610 [ 15.328135] ? __virt_addr_valid+0x1db/0x2d0 [ 15.328159] ? kasan_atomics_helper+0x72f/0x5450 [ 15.328188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.328213] ? kasan_atomics_helper+0x72f/0x5450 [ 15.328237] kasan_report+0x141/0x180 [ 15.328260] ? kasan_atomics_helper+0x72f/0x5450 [ 15.328292] kasan_check_range+0x10c/0x1c0 [ 15.328317] __kasan_check_write+0x18/0x20 [ 15.328339] kasan_atomics_helper+0x72f/0x5450 [ 15.328363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.328388] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.328427] kasan_atomics+0x1dc/0x310 [ 15.328480] ? __pfx_kasan_atomics+0x10/0x10 [ 15.328507] ? __pfx_read_tsc+0x10/0x10 [ 15.328530] ? ktime_get_ts64+0x86/0x230 [ 15.328556] kunit_try_run_case+0x1a5/0x480 [ 15.328582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.328607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.328634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.328660] ? __kthread_parkme+0x82/0x180 [ 15.328682] ? preempt_count_sub+0x50/0x80 [ 15.328708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.328735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.328761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.328788] kthread+0x337/0x6f0 [ 15.328809] ? trace_preempt_on+0x20/0xc0 [ 15.328843] ? __pfx_kthread+0x10/0x10 [ 15.328865] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.328889] ? calculate_sigpending+0x7b/0xa0 [ 15.328926] ? __pfx_kthread+0x10/0x10 [ 15.328949] ret_from_fork+0x116/0x1d0 [ 15.328969] ? __pfx_kthread+0x10/0x10 [ 15.328991] ret_from_fork_asm+0x1a/0x30 [ 15.329033] </TASK> [ 15.329044] [ 15.336412] Allocated by task 283: [ 15.336557] kasan_save_stack+0x45/0x70 [ 15.336765] kasan_save_track+0x18/0x40 [ 15.336961] kasan_save_alloc_info+0x3b/0x50 [ 15.337198] __kasan_kmalloc+0xb7/0xc0 [ 15.337389] __kmalloc_cache_noprof+0x189/0x420 [ 15.337619] kasan_atomics+0x95/0x310 [ 15.337755] kunit_try_run_case+0x1a5/0x480 [ 15.337903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338081] kthread+0x337/0x6f0 [ 15.338204] ret_from_fork+0x116/0x1d0 [ 15.338339] ret_from_fork_asm+0x1a/0x30 [ 15.338549] [ 15.338647] The buggy address belongs to the object at ffff8881026d6200 [ 15.338647] which belongs to the cache kmalloc-64 of size 64 [ 15.339194] The buggy address is located 0 bytes to the right of [ 15.339194] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.339765] [ 15.339863] The buggy address belongs to the physical page: [ 15.340078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.340323] flags: 0x200000000000000(node=0|zone=2) [ 15.340520] page_type: f5(slab) [ 15.340650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.340996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.341396] page dumped because: kasan: bad access detected [ 15.341658] [ 15.341751] Memory state around the buggy address: [ 15.341984] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342303] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342651] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.342921] ^ [ 15.343124] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.343489] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.343784] ================================================================== [ 16.007097] ================================================================== [ 16.007735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.008023] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 16.008249] [ 16.008350] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.008409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.008423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.008446] Call Trace: [ 16.008476] <TASK> [ 16.008497] dump_stack_lvl+0x73/0xb0 [ 16.008529] print_report+0xd1/0x610 [ 16.008554] ? __virt_addr_valid+0x1db/0x2d0 [ 16.008579] ? kasan_atomics_helper+0x1818/0x5450 [ 16.008603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.008628] ? kasan_atomics_helper+0x1818/0x5450 [ 16.008652] kasan_report+0x141/0x180 [ 16.008676] ? kasan_atomics_helper+0x1818/0x5450 [ 16.008704] kasan_check_range+0x10c/0x1c0 [ 16.008730] __kasan_check_write+0x18/0x20 [ 16.008752] kasan_atomics_helper+0x1818/0x5450 [ 16.008776] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.008801] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.008834] kasan_atomics+0x1dc/0x310 [ 16.008858] ? __pfx_kasan_atomics+0x10/0x10 [ 16.008884] ? __pfx_read_tsc+0x10/0x10 [ 16.008907] ? ktime_get_ts64+0x86/0x230 [ 16.008934] kunit_try_run_case+0x1a5/0x480 [ 16.008961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.008986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.009012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.009038] ? __kthread_parkme+0x82/0x180 [ 16.009063] ? preempt_count_sub+0x50/0x80 [ 16.009089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.009115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.009142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.009170] kthread+0x337/0x6f0 [ 16.009190] ? trace_preempt_on+0x20/0xc0 [ 16.009217] ? __pfx_kthread+0x10/0x10 [ 16.009240] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.009264] ? calculate_sigpending+0x7b/0xa0 [ 16.009290] ? __pfx_kthread+0x10/0x10 [ 16.009313] ret_from_fork+0x116/0x1d0 [ 16.009334] ? __pfx_kthread+0x10/0x10 [ 16.009356] ret_from_fork_asm+0x1a/0x30 [ 16.009388] </TASK> [ 16.009400] [ 16.021575] Allocated by task 283: [ 16.021861] kasan_save_stack+0x45/0x70 [ 16.022070] kasan_save_track+0x18/0x40 [ 16.022241] kasan_save_alloc_info+0x3b/0x50 [ 16.022498] __kasan_kmalloc+0xb7/0xc0 [ 16.022937] __kmalloc_cache_noprof+0x189/0x420 [ 16.023156] kasan_atomics+0x95/0x310 [ 16.023376] kunit_try_run_case+0x1a5/0x480 [ 16.023812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.024140] kthread+0x337/0x6f0 [ 16.024304] ret_from_fork+0x116/0x1d0 [ 16.024711] ret_from_fork_asm+0x1a/0x30 [ 16.024974] [ 16.025056] The buggy address belongs to the object at ffff8881026d6200 [ 16.025056] which belongs to the cache kmalloc-64 of size 64 [ 16.025940] The buggy address is located 0 bytes to the right of [ 16.025940] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 16.026601] [ 16.026805] The buggy address belongs to the physical page: [ 16.027077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 16.027596] flags: 0x200000000000000(node=0|zone=2) [ 16.027831] page_type: f5(slab) [ 16.028146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.028485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.028945] page dumped because: kasan: bad access detected [ 16.029269] [ 16.029373] Memory state around the buggy address: [ 16.029773] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.030058] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.030565] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.030975] ^ [ 16.031283] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031773] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.032080] ================================================================== [ 15.399371] ================================================================== [ 15.399773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.400117] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.400441] [ 15.400580] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.400640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.400654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.400677] Call Trace: [ 15.400696] <TASK> [ 15.400715] dump_stack_lvl+0x73/0xb0 [ 15.400745] print_report+0xd1/0x610 [ 15.400780] ? __virt_addr_valid+0x1db/0x2d0 [ 15.400805] ? kasan_atomics_helper+0x992/0x5450 [ 15.400828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.400865] ? kasan_atomics_helper+0x992/0x5450 [ 15.400888] kasan_report+0x141/0x180 [ 15.400912] ? kasan_atomics_helper+0x992/0x5450 [ 15.400940] kasan_check_range+0x10c/0x1c0 [ 15.400967] __kasan_check_write+0x18/0x20 [ 15.400991] kasan_atomics_helper+0x992/0x5450 [ 15.401016] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.401040] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.401082] kasan_atomics+0x1dc/0x310 [ 15.401108] ? __pfx_kasan_atomics+0x10/0x10 [ 15.401144] ? __pfx_read_tsc+0x10/0x10 [ 15.401167] ? ktime_get_ts64+0x86/0x230 [ 15.401194] kunit_try_run_case+0x1a5/0x480 [ 15.401221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.401282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.401309] ? __kthread_parkme+0x82/0x180 [ 15.401341] ? preempt_count_sub+0x50/0x80 [ 15.401368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.401463] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.401492] kthread+0x337/0x6f0 [ 15.401513] ? trace_preempt_on+0x20/0xc0 [ 15.401539] ? __pfx_kthread+0x10/0x10 [ 15.401561] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.401585] ? calculate_sigpending+0x7b/0xa0 [ 15.401621] ? __pfx_kthread+0x10/0x10 [ 15.401645] ret_from_fork+0x116/0x1d0 [ 15.401675] ? __pfx_kthread+0x10/0x10 [ 15.401698] ret_from_fork_asm+0x1a/0x30 [ 15.401732] </TASK> [ 15.401744] [ 15.409131] Allocated by task 283: [ 15.409278] kasan_save_stack+0x45/0x70 [ 15.409458] kasan_save_track+0x18/0x40 [ 15.409598] kasan_save_alloc_info+0x3b/0x50 [ 15.409748] __kasan_kmalloc+0xb7/0xc0 [ 15.409882] __kmalloc_cache_noprof+0x189/0x420 [ 15.410042] kasan_atomics+0x95/0x310 [ 15.410196] kunit_try_run_case+0x1a5/0x480 [ 15.410462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.410716] kthread+0x337/0x6f0 [ 15.410883] ret_from_fork+0x116/0x1d0 [ 15.411068] ret_from_fork_asm+0x1a/0x30 [ 15.411263] [ 15.411358] The buggy address belongs to the object at ffff8881026d6200 [ 15.411358] which belongs to the cache kmalloc-64 of size 64 [ 15.411869] The buggy address is located 0 bytes to the right of [ 15.411869] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.412295] [ 15.412370] The buggy address belongs to the physical page: [ 15.412576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.412824] flags: 0x200000000000000(node=0|zone=2) [ 15.413031] page_type: f5(slab) [ 15.413201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.413612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.413994] page dumped because: kasan: bad access detected [ 15.414301] [ 15.414413] Memory state around the buggy address: [ 15.414646] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.414964] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.415309] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.415656] ^ [ 15.415845] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.416061] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.416277] ================================================================== [ 15.890240] ================================================================== [ 15.890872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.891465] Write of size 8 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.892021] [ 15.892141] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.892190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.892203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.892227] Call Trace: [ 15.892379] <TASK> [ 15.892403] dump_stack_lvl+0x73/0xb0 [ 15.892449] print_report+0xd1/0x610 [ 15.892486] ? __virt_addr_valid+0x1db/0x2d0 [ 15.892513] ? kasan_atomics_helper+0x151d/0x5450 [ 15.892536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.892562] ? kasan_atomics_helper+0x151d/0x5450 [ 15.892586] kasan_report+0x141/0x180 [ 15.892608] ? kasan_atomics_helper+0x151d/0x5450 [ 15.892637] kasan_check_range+0x10c/0x1c0 [ 15.892662] __kasan_check_write+0x18/0x20 [ 15.892683] kasan_atomics_helper+0x151d/0x5450 [ 15.892708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.892732] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.892765] kasan_atomics+0x1dc/0x310 [ 15.892790] ? __pfx_kasan_atomics+0x10/0x10 [ 15.892816] ? __pfx_read_tsc+0x10/0x10 [ 15.892840] ? ktime_get_ts64+0x86/0x230 [ 15.892866] kunit_try_run_case+0x1a5/0x480 [ 15.892892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.892917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.892943] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.892969] ? __kthread_parkme+0x82/0x180 [ 15.892992] ? preempt_count_sub+0x50/0x80 [ 15.893018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.893044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.893071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.893098] kthread+0x337/0x6f0 [ 15.893119] ? trace_preempt_on+0x20/0xc0 [ 15.893144] ? __pfx_kthread+0x10/0x10 [ 15.893166] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.893189] ? calculate_sigpending+0x7b/0xa0 [ 15.893216] ? __pfx_kthread+0x10/0x10 [ 15.893239] ret_from_fork+0x116/0x1d0 [ 15.893259] ? __pfx_kthread+0x10/0x10 [ 15.893282] ret_from_fork_asm+0x1a/0x30 [ 15.893314] </TASK> [ 15.893325] [ 15.903396] Allocated by task 283: [ 15.903922] kasan_save_stack+0x45/0x70 [ 15.904222] kasan_save_track+0x18/0x40 [ 15.904519] kasan_save_alloc_info+0x3b/0x50 [ 15.904829] __kasan_kmalloc+0xb7/0xc0 [ 15.905101] __kmalloc_cache_noprof+0x189/0x420 [ 15.905386] kasan_atomics+0x95/0x310 [ 15.905708] kunit_try_run_case+0x1a5/0x480 [ 15.905913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.906182] kthread+0x337/0x6f0 [ 15.906327] ret_from_fork+0x116/0x1d0 [ 15.906704] ret_from_fork_asm+0x1a/0x30 [ 15.906984] [ 15.907068] The buggy address belongs to the object at ffff8881026d6200 [ 15.907068] which belongs to the cache kmalloc-64 of size 64 [ 15.907884] The buggy address is located 0 bytes to the right of [ 15.907884] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.908420] [ 15.908755] The buggy address belongs to the physical page: [ 15.909156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.909548] flags: 0x200000000000000(node=0|zone=2) [ 15.909864] page_type: f5(slab) [ 15.910041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.910525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.910961] page dumped because: kasan: bad access detected [ 15.911212] [ 15.911305] Memory state around the buggy address: [ 15.911718] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.912097] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.912545] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.912978] ^ [ 15.913167] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.913657] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.914024] ================================================================== [ 15.381172] ================================================================== [ 15.381432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.382001] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.382547] [ 15.382672] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.382729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.382743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.382779] Call Trace: [ 15.382797] <TASK> [ 15.382814] dump_stack_lvl+0x73/0xb0 [ 15.382845] print_report+0xd1/0x610 [ 15.382868] ? __virt_addr_valid+0x1db/0x2d0 [ 15.382894] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.382917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.382942] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.382966] kasan_report+0x141/0x180 [ 15.382989] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.383017] kasan_check_range+0x10c/0x1c0 [ 15.383042] __kasan_check_write+0x18/0x20 [ 15.383074] kasan_atomics_helper+0x8f9/0x5450 [ 15.383099] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.383123] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.383165] kasan_atomics+0x1dc/0x310 [ 15.383191] ? __pfx_kasan_atomics+0x10/0x10 [ 15.383217] ? __pfx_read_tsc+0x10/0x10 [ 15.383249] ? ktime_get_ts64+0x86/0x230 [ 15.383276] kunit_try_run_case+0x1a5/0x480 [ 15.383313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.383338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.383365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.383410] ? __kthread_parkme+0x82/0x180 [ 15.383433] ? preempt_count_sub+0x50/0x80 [ 15.383467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.383494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.383521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.383549] kthread+0x337/0x6f0 [ 15.383570] ? trace_preempt_on+0x20/0xc0 [ 15.383596] ? __pfx_kthread+0x10/0x10 [ 15.383626] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.383650] ? calculate_sigpending+0x7b/0xa0 [ 15.383677] ? __pfx_kthread+0x10/0x10 [ 15.383711] ret_from_fork+0x116/0x1d0 [ 15.383731] ? __pfx_kthread+0x10/0x10 [ 15.383754] ret_from_fork_asm+0x1a/0x30 [ 15.383787] </TASK> [ 15.383806] [ 15.391307] Allocated by task 283: [ 15.391518] kasan_save_stack+0x45/0x70 [ 15.391744] kasan_save_track+0x18/0x40 [ 15.391937] kasan_save_alloc_info+0x3b/0x50 [ 15.392146] __kasan_kmalloc+0xb7/0xc0 [ 15.392321] __kmalloc_cache_noprof+0x189/0x420 [ 15.392518] kasan_atomics+0x95/0x310 [ 15.392656] kunit_try_run_case+0x1a5/0x480 [ 15.392806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.392984] kthread+0x337/0x6f0 [ 15.393107] ret_from_fork+0x116/0x1d0 [ 15.393242] ret_from_fork_asm+0x1a/0x30 [ 15.393384] [ 15.393516] The buggy address belongs to the object at ffff8881026d6200 [ 15.393516] which belongs to the cache kmalloc-64 of size 64 [ 15.394050] The buggy address is located 0 bytes to the right of [ 15.394050] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.394631] [ 15.394730] The buggy address belongs to the physical page: [ 15.395018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.395415] flags: 0x200000000000000(node=0|zone=2) [ 15.395664] page_type: f5(slab) [ 15.395798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.396031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.396260] page dumped because: kasan: bad access detected [ 15.396471] [ 15.396546] Memory state around the buggy address: [ 15.396708] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.397056] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.397460] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.397827] ^ [ 15.398075] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.398413] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.398769] ================================================================== [ 15.148343] ================================================================== [ 15.148962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.149418] Write of size 4 at addr ffff8881026d6230 by task kunit_try_catch/283 [ 15.149874] [ 15.150039] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.150088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.150100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.150123] Call Trace: [ 15.150137] <TASK> [ 15.150155] dump_stack_lvl+0x73/0xb0 [ 15.150186] print_report+0xd1/0x610 [ 15.150212] ? __virt_addr_valid+0x1db/0x2d0 [ 15.150237] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.150260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.150285] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.150309] kasan_report+0x141/0x180 [ 15.150332] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.150360] __asan_report_store4_noabort+0x1b/0x30 [ 15.150396] kasan_atomics_helper+0x4b6e/0x5450 [ 15.150429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.150470] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.150512] kasan_atomics+0x1dc/0x310 [ 15.150537] ? __pfx_kasan_atomics+0x10/0x10 [ 15.150562] ? __pfx_read_tsc+0x10/0x10 [ 15.150606] ? ktime_get_ts64+0x86/0x230 [ 15.150634] kunit_try_run_case+0x1a5/0x480 [ 15.150660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.150685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.150711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.150737] ? __kthread_parkme+0x82/0x180 [ 15.150760] ? preempt_count_sub+0x50/0x80 [ 15.150785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.150811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.150837] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.150864] kthread+0x337/0x6f0 [ 15.150886] ? trace_preempt_on+0x20/0xc0 [ 15.150910] ? __pfx_kthread+0x10/0x10 [ 15.150933] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.150966] ? calculate_sigpending+0x7b/0xa0 [ 15.150992] ? __pfx_kthread+0x10/0x10 [ 15.151016] ret_from_fork+0x116/0x1d0 [ 15.151047] ? __pfx_kthread+0x10/0x10 [ 15.151069] ret_from_fork_asm+0x1a/0x30 [ 15.151101] </TASK> [ 15.151112] [ 15.164665] Allocated by task 283: [ 15.165011] kasan_save_stack+0x45/0x70 [ 15.165508] kasan_save_track+0x18/0x40 [ 15.165871] kasan_save_alloc_info+0x3b/0x50 [ 15.166286] __kasan_kmalloc+0xb7/0xc0 [ 15.166540] __kmalloc_cache_noprof+0x189/0x420 [ 15.167033] kasan_atomics+0x95/0x310 [ 15.167170] kunit_try_run_case+0x1a5/0x480 [ 15.167320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.167544] kthread+0x337/0x6f0 [ 15.167874] ret_from_fork+0x116/0x1d0 [ 15.168266] ret_from_fork_asm+0x1a/0x30 [ 15.168813] [ 15.168974] The buggy address belongs to the object at ffff8881026d6200 [ 15.168974] which belongs to the cache kmalloc-64 of size 64 [ 15.170234] The buggy address is located 0 bytes to the right of [ 15.170234] allocated 48-byte region [ffff8881026d6200, ffff8881026d6230) [ 15.171524] [ 15.171751] The buggy address belongs to the physical page: [ 15.172179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d6 [ 15.172745] flags: 0x200000000000000(node=0|zone=2) [ 15.172927] page_type: f5(slab) [ 15.173065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.173828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.174284] page dumped because: kasan: bad access detected [ 15.174488] [ 15.174560] Memory state around the buggy address: [ 15.175115] ffff8881026d6100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.175664] ffff8881026d6180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.176416] >ffff8881026d6200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.176965] ^ [ 15.177413] ffff8881026d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.177891] ffff8881026d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.178633] ==================================================================
[ 15.707439] ================================================================== [ 15.707805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.708095] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.708633] [ 15.708812] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.708860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.708874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.708897] Call Trace: [ 15.708916] <TASK> [ 15.708934] dump_stack_lvl+0x73/0xb0 [ 15.708965] print_report+0xd1/0x610 [ 15.708989] ? __virt_addr_valid+0x1db/0x2d0 [ 15.709013] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.709037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.709078] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.709102] kasan_report+0x141/0x180 [ 15.709149] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.709179] kasan_check_range+0x10c/0x1c0 [ 15.709204] __kasan_check_write+0x18/0x20 [ 15.709225] kasan_atomics_helper+0x8f9/0x5450 [ 15.709250] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.709274] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.709302] ? kasan_atomics+0x152/0x310 [ 15.709352] kasan_atomics+0x1dc/0x310 [ 15.709376] ? __pfx_kasan_atomics+0x10/0x10 [ 15.709402] ? __pfx_read_tsc+0x10/0x10 [ 15.709426] ? ktime_get_ts64+0x86/0x230 [ 15.709452] kunit_try_run_case+0x1a5/0x480 [ 15.709479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.709549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.709576] ? __kthread_parkme+0x82/0x180 [ 15.709597] ? preempt_count_sub+0x50/0x80 [ 15.709623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.709716] kthread+0x337/0x6f0 [ 15.709736] ? trace_preempt_on+0x20/0xc0 [ 15.709761] ? __pfx_kthread+0x10/0x10 [ 15.709784] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.709808] ? calculate_sigpending+0x7b/0xa0 [ 15.709834] ? __pfx_kthread+0x10/0x10 [ 15.709857] ret_from_fork+0x116/0x1d0 [ 15.709878] ? __pfx_kthread+0x10/0x10 [ 15.709900] ret_from_fork_asm+0x1a/0x30 [ 15.709934] </TASK> [ 15.709946] [ 15.724500] Allocated by task 284: [ 15.724952] kasan_save_stack+0x45/0x70 [ 15.725345] kasan_save_track+0x18/0x40 [ 15.725555] kasan_save_alloc_info+0x3b/0x50 [ 15.725987] __kasan_kmalloc+0xb7/0xc0 [ 15.726409] __kmalloc_cache_noprof+0x189/0x420 [ 15.726937] kasan_atomics+0x95/0x310 [ 15.727287] kunit_try_run_case+0x1a5/0x480 [ 15.727452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.727628] kthread+0x337/0x6f0 [ 15.728210] ret_from_fork+0x116/0x1d0 [ 15.728582] ret_from_fork_asm+0x1a/0x30 [ 15.729091] [ 15.729291] The buggy address belongs to the object at ffff8881025adf00 [ 15.729291] which belongs to the cache kmalloc-64 of size 64 [ 15.730163] The buggy address is located 0 bytes to the right of [ 15.730163] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.731462] [ 15.731581] The buggy address belongs to the physical page: [ 15.732045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.733109] flags: 0x200000000000000(node=0|zone=2) [ 15.733351] page_type: f5(slab) [ 15.733478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.733775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.734502] page dumped because: kasan: bad access detected [ 15.735150] [ 15.735340] Memory state around the buggy address: [ 15.735866] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.736720] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.737425] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.737710] ^ [ 15.738165] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.738929] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.739622] ================================================================== [ 15.534212] ================================================================== [ 15.534559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.534913] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.535821] [ 15.536048] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.536128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.536144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.536165] Call Trace: [ 15.536179] <TASK> [ 15.536194] dump_stack_lvl+0x73/0xb0 [ 15.536224] print_report+0xd1/0x610 [ 15.536249] ? __virt_addr_valid+0x1db/0x2d0 [ 15.536274] ? kasan_atomics_helper+0x565/0x5450 [ 15.536335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.536362] ? kasan_atomics_helper+0x565/0x5450 [ 15.536386] kasan_report+0x141/0x180 [ 15.536410] ? kasan_atomics_helper+0x565/0x5450 [ 15.536438] kasan_check_range+0x10c/0x1c0 [ 15.536463] __kasan_check_write+0x18/0x20 [ 15.536484] kasan_atomics_helper+0x565/0x5450 [ 15.536508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.536533] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.536561] ? kasan_atomics+0x152/0x310 [ 15.536590] kasan_atomics+0x1dc/0x310 [ 15.536614] ? __pfx_kasan_atomics+0x10/0x10 [ 15.536711] ? __pfx_read_tsc+0x10/0x10 [ 15.536735] ? ktime_get_ts64+0x86/0x230 [ 15.536762] kunit_try_run_case+0x1a5/0x480 [ 15.536788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.536813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.536839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.536865] ? __kthread_parkme+0x82/0x180 [ 15.536887] ? preempt_count_sub+0x50/0x80 [ 15.536913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.536938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.536965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.536992] kthread+0x337/0x6f0 [ 15.537012] ? trace_preempt_on+0x20/0xc0 [ 15.537037] ? __pfx_kthread+0x10/0x10 [ 15.537070] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.537094] ? calculate_sigpending+0x7b/0xa0 [ 15.537140] ? __pfx_kthread+0x10/0x10 [ 15.537162] ret_from_fork+0x116/0x1d0 [ 15.537182] ? __pfx_kthread+0x10/0x10 [ 15.537205] ret_from_fork_asm+0x1a/0x30 [ 15.537237] </TASK> [ 15.537249] [ 15.553149] Allocated by task 284: [ 15.553555] kasan_save_stack+0x45/0x70 [ 15.553961] kasan_save_track+0x18/0x40 [ 15.554349] kasan_save_alloc_info+0x3b/0x50 [ 15.554668] __kasan_kmalloc+0xb7/0xc0 [ 15.555087] __kmalloc_cache_noprof+0x189/0x420 [ 15.555469] kasan_atomics+0x95/0x310 [ 15.555825] kunit_try_run_case+0x1a5/0x480 [ 15.555978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.556344] kthread+0x337/0x6f0 [ 15.556730] ret_from_fork+0x116/0x1d0 [ 15.557145] ret_from_fork_asm+0x1a/0x30 [ 15.557557] [ 15.557767] The buggy address belongs to the object at ffff8881025adf00 [ 15.557767] which belongs to the cache kmalloc-64 of size 64 [ 15.558846] The buggy address is located 0 bytes to the right of [ 15.558846] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.559285] [ 15.559457] The buggy address belongs to the physical page: [ 15.559984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.560993] flags: 0x200000000000000(node=0|zone=2) [ 15.561626] page_type: f5(slab) [ 15.561997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.562687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.563276] page dumped because: kasan: bad access detected [ 15.563827] [ 15.564066] Memory state around the buggy address: [ 15.564308] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.564533] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.565225] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.565951] ^ [ 15.566435] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.566954] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.567427] ================================================================== [ 16.155119] ================================================================== [ 16.155417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 16.155762] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.156075] [ 16.156163] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.156207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.156221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.156243] Call Trace: [ 16.156258] <TASK> [ 16.156273] dump_stack_lvl+0x73/0xb0 [ 16.156302] print_report+0xd1/0x610 [ 16.156326] ? __virt_addr_valid+0x1db/0x2d0 [ 16.156350] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.156373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.156432] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.156457] kasan_report+0x141/0x180 [ 16.156480] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.156508] __asan_report_load4_noabort+0x18/0x20 [ 16.156536] kasan_atomics_helper+0x49ce/0x5450 [ 16.156561] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.156586] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.156613] ? kasan_atomics+0x152/0x310 [ 16.156641] kasan_atomics+0x1dc/0x310 [ 16.156665] ? __pfx_kasan_atomics+0x10/0x10 [ 16.156691] ? __pfx_read_tsc+0x10/0x10 [ 16.156714] ? ktime_get_ts64+0x86/0x230 [ 16.156739] kunit_try_run_case+0x1a5/0x480 [ 16.156765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.156790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.156816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.156842] ? __kthread_parkme+0x82/0x180 [ 16.156864] ? preempt_count_sub+0x50/0x80 [ 16.156889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.156935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.156961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.156990] kthread+0x337/0x6f0 [ 16.157010] ? trace_preempt_on+0x20/0xc0 [ 16.157035] ? __pfx_kthread+0x10/0x10 [ 16.157067] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.157109] ? calculate_sigpending+0x7b/0xa0 [ 16.157144] ? __pfx_kthread+0x10/0x10 [ 16.157167] ret_from_fork+0x116/0x1d0 [ 16.157189] ? __pfx_kthread+0x10/0x10 [ 16.157211] ret_from_fork_asm+0x1a/0x30 [ 16.157243] </TASK> [ 16.157254] [ 16.164942] Allocated by task 284: [ 16.165086] kasan_save_stack+0x45/0x70 [ 16.165232] kasan_save_track+0x18/0x40 [ 16.165448] kasan_save_alloc_info+0x3b/0x50 [ 16.165661] __kasan_kmalloc+0xb7/0xc0 [ 16.165849] __kmalloc_cache_noprof+0x189/0x420 [ 16.166268] kasan_atomics+0x95/0x310 [ 16.166404] kunit_try_run_case+0x1a5/0x480 [ 16.166553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.166734] kthread+0x337/0x6f0 [ 16.166927] ret_from_fork+0x116/0x1d0 [ 16.167134] ret_from_fork_asm+0x1a/0x30 [ 16.167360] [ 16.167458] The buggy address belongs to the object at ffff8881025adf00 [ 16.167458] which belongs to the cache kmalloc-64 of size 64 [ 16.168011] The buggy address is located 0 bytes to the right of [ 16.168011] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.168467] [ 16.168542] The buggy address belongs to the physical page: [ 16.168742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.169152] flags: 0x200000000000000(node=0|zone=2) [ 16.169390] page_type: f5(slab) [ 16.169559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.170094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.170424] page dumped because: kasan: bad access detected [ 16.170698] [ 16.170777] Memory state around the buggy address: [ 16.170936] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.171173] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.171479] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.171859] ^ [ 16.172187] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.172567] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.172865] ================================================================== [ 16.496118] ================================================================== [ 16.496752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.497132] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.497502] [ 16.497743] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.497795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.497809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.497833] Call Trace: [ 16.497851] <TASK> [ 16.497869] dump_stack_lvl+0x73/0xb0 [ 16.497901] print_report+0xd1/0x610 [ 16.497925] ? __virt_addr_valid+0x1db/0x2d0 [ 16.497950] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.497973] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.497999] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.498023] kasan_report+0x141/0x180 [ 16.498046] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.498087] kasan_check_range+0x10c/0x1c0 [ 16.498113] __kasan_check_write+0x18/0x20 [ 16.498209] kasan_atomics_helper+0x1b22/0x5450 [ 16.498234] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.498260] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.498289] ? kasan_atomics+0x152/0x310 [ 16.498316] kasan_atomics+0x1dc/0x310 [ 16.498340] ? __pfx_kasan_atomics+0x10/0x10 [ 16.498366] ? __pfx_read_tsc+0x10/0x10 [ 16.498388] ? ktime_get_ts64+0x86/0x230 [ 16.498413] kunit_try_run_case+0x1a5/0x480 [ 16.498440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.498465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.498492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.498518] ? __kthread_parkme+0x82/0x180 [ 16.498539] ? preempt_count_sub+0x50/0x80 [ 16.498565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.498591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.498617] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.498645] kthread+0x337/0x6f0 [ 16.498665] ? trace_preempt_on+0x20/0xc0 [ 16.498691] ? __pfx_kthread+0x10/0x10 [ 16.498718] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.498742] ? calculate_sigpending+0x7b/0xa0 [ 16.498767] ? __pfx_kthread+0x10/0x10 [ 16.498790] ret_from_fork+0x116/0x1d0 [ 16.498811] ? __pfx_kthread+0x10/0x10 [ 16.498833] ret_from_fork_asm+0x1a/0x30 [ 16.498866] </TASK> [ 16.498877] [ 16.508809] Allocated by task 284: [ 16.509193] kasan_save_stack+0x45/0x70 [ 16.509386] kasan_save_track+0x18/0x40 [ 16.509586] kasan_save_alloc_info+0x3b/0x50 [ 16.509947] __kasan_kmalloc+0xb7/0xc0 [ 16.510169] __kmalloc_cache_noprof+0x189/0x420 [ 16.510515] kasan_atomics+0x95/0x310 [ 16.510673] kunit_try_run_case+0x1a5/0x480 [ 16.510888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.511340] kthread+0x337/0x6f0 [ 16.511501] ret_from_fork+0x116/0x1d0 [ 16.511752] ret_from_fork_asm+0x1a/0x30 [ 16.512000] [ 16.512118] The buggy address belongs to the object at ffff8881025adf00 [ 16.512118] which belongs to the cache kmalloc-64 of size 64 [ 16.512623] The buggy address is located 0 bytes to the right of [ 16.512623] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.513122] [ 16.513228] The buggy address belongs to the physical page: [ 16.513858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.514313] flags: 0x200000000000000(node=0|zone=2) [ 16.514611] page_type: f5(slab) [ 16.514835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.515251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.515653] page dumped because: kasan: bad access detected [ 16.515872] [ 16.516082] Memory state around the buggy address: [ 16.516263] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.516675] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.517030] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.517429] ^ [ 16.517603] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.518009] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.518426] ================================================================== [ 16.775607] ================================================================== [ 16.776334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.776998] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.777406] [ 16.777563] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.777827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.777844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.777867] Call Trace: [ 16.777884] <TASK> [ 16.777901] dump_stack_lvl+0x73/0xb0 [ 16.777934] print_report+0xd1/0x610 [ 16.777957] ? __virt_addr_valid+0x1db/0x2d0 [ 16.777982] ? kasan_atomics_helper+0x218a/0x5450 [ 16.778005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.778030] ? kasan_atomics_helper+0x218a/0x5450 [ 16.778066] kasan_report+0x141/0x180 [ 16.778090] ? kasan_atomics_helper+0x218a/0x5450 [ 16.778118] kasan_check_range+0x10c/0x1c0 [ 16.778144] __kasan_check_write+0x18/0x20 [ 16.778165] kasan_atomics_helper+0x218a/0x5450 [ 16.778190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.778214] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.778242] ? kasan_atomics+0x152/0x310 [ 16.778270] kasan_atomics+0x1dc/0x310 [ 16.778294] ? __pfx_kasan_atomics+0x10/0x10 [ 16.778321] ? __pfx_read_tsc+0x10/0x10 [ 16.778343] ? ktime_get_ts64+0x86/0x230 [ 16.778370] kunit_try_run_case+0x1a5/0x480 [ 16.778396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.778421] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.778447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.778473] ? __kthread_parkme+0x82/0x180 [ 16.778495] ? preempt_count_sub+0x50/0x80 [ 16.778521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.778547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.778574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.778601] kthread+0x337/0x6f0 [ 16.778621] ? trace_preempt_on+0x20/0xc0 [ 16.778647] ? __pfx_kthread+0x10/0x10 [ 16.778669] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.778692] ? calculate_sigpending+0x7b/0xa0 [ 16.778724] ? __pfx_kthread+0x10/0x10 [ 16.778750] ret_from_fork+0x116/0x1d0 [ 16.778770] ? __pfx_kthread+0x10/0x10 [ 16.778792] ret_from_fork_asm+0x1a/0x30 [ 16.778824] </TASK> [ 16.778836] [ 16.789341] Allocated by task 284: [ 16.789539] kasan_save_stack+0x45/0x70 [ 16.789907] kasan_save_track+0x18/0x40 [ 16.790192] kasan_save_alloc_info+0x3b/0x50 [ 16.790490] __kasan_kmalloc+0xb7/0xc0 [ 16.790680] __kmalloc_cache_noprof+0x189/0x420 [ 16.791009] kasan_atomics+0x95/0x310 [ 16.791363] kunit_try_run_case+0x1a5/0x480 [ 16.791652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.791902] kthread+0x337/0x6f0 [ 16.792087] ret_from_fork+0x116/0x1d0 [ 16.792477] ret_from_fork_asm+0x1a/0x30 [ 16.792741] [ 16.792924] The buggy address belongs to the object at ffff8881025adf00 [ 16.792924] which belongs to the cache kmalloc-64 of size 64 [ 16.793622] The buggy address is located 0 bytes to the right of [ 16.793622] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.794455] [ 16.794559] The buggy address belongs to the physical page: [ 16.794777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.795105] flags: 0x200000000000000(node=0|zone=2) [ 16.795585] page_type: f5(slab) [ 16.795806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.796268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.796654] page dumped because: kasan: bad access detected [ 16.797006] [ 16.797202] Memory state around the buggy address: [ 16.797769] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.798641] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.798923] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.799279] ^ [ 16.799827] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.800584] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.801289] ================================================================== [ 16.421856] ================================================================== [ 16.422557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.423354] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.424093] [ 16.424259] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.424307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.424322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.424344] Call Trace: [ 16.424360] <TASK> [ 16.424377] dump_stack_lvl+0x73/0xb0 [ 16.424408] print_report+0xd1/0x610 [ 16.424432] ? __virt_addr_valid+0x1db/0x2d0 [ 16.424456] ? kasan_atomics_helper+0x194a/0x5450 [ 16.424480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.424506] ? kasan_atomics_helper+0x194a/0x5450 [ 16.424530] kasan_report+0x141/0x180 [ 16.424553] ? kasan_atomics_helper+0x194a/0x5450 [ 16.424581] kasan_check_range+0x10c/0x1c0 [ 16.424607] __kasan_check_write+0x18/0x20 [ 16.424627] kasan_atomics_helper+0x194a/0x5450 [ 16.424651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.424677] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.424704] ? kasan_atomics+0x152/0x310 [ 16.424732] kasan_atomics+0x1dc/0x310 [ 16.424756] ? __pfx_kasan_atomics+0x10/0x10 [ 16.424781] ? __pfx_read_tsc+0x10/0x10 [ 16.424805] ? ktime_get_ts64+0x86/0x230 [ 16.424830] kunit_try_run_case+0x1a5/0x480 [ 16.424857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.424881] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.424907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.424933] ? __kthread_parkme+0x82/0x180 [ 16.424954] ? preempt_count_sub+0x50/0x80 [ 16.424980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.425008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.425035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.425182] kthread+0x337/0x6f0 [ 16.425219] ? trace_preempt_on+0x20/0xc0 [ 16.425248] ? __pfx_kthread+0x10/0x10 [ 16.425271] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.425305] ? calculate_sigpending+0x7b/0xa0 [ 16.425332] ? __pfx_kthread+0x10/0x10 [ 16.425354] ret_from_fork+0x116/0x1d0 [ 16.425376] ? __pfx_kthread+0x10/0x10 [ 16.425397] ret_from_fork_asm+0x1a/0x30 [ 16.425430] </TASK> [ 16.425442] [ 16.438076] Allocated by task 284: [ 16.438453] kasan_save_stack+0x45/0x70 [ 16.438837] kasan_save_track+0x18/0x40 [ 16.439273] kasan_save_alloc_info+0x3b/0x50 [ 16.439680] __kasan_kmalloc+0xb7/0xc0 [ 16.440045] __kmalloc_cache_noprof+0x189/0x420 [ 16.440285] kasan_atomics+0x95/0x310 [ 16.440680] kunit_try_run_case+0x1a5/0x480 [ 16.440985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.441319] kthread+0x337/0x6f0 [ 16.441652] ret_from_fork+0x116/0x1d0 [ 16.442001] ret_from_fork_asm+0x1a/0x30 [ 16.442392] [ 16.442469] The buggy address belongs to the object at ffff8881025adf00 [ 16.442469] which belongs to the cache kmalloc-64 of size 64 [ 16.442831] The buggy address is located 0 bytes to the right of [ 16.442831] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.443348] [ 16.443516] The buggy address belongs to the physical page: [ 16.444012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.444790] flags: 0x200000000000000(node=0|zone=2) [ 16.445262] page_type: f5(slab) [ 16.445655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.446440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.447111] page dumped because: kasan: bad access detected [ 16.447609] [ 16.447785] Memory state around the buggy address: [ 16.448269] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.448490] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.448709] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.448925] ^ [ 16.449097] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.449413] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.449716] ================================================================== [ 15.600431] ================================================================== [ 15.601134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.601717] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.602044] [ 15.602231] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.602285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.602298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.602319] Call Trace: [ 15.602336] <TASK> [ 15.602357] dump_stack_lvl+0x73/0xb0 [ 15.602388] print_report+0xd1/0x610 [ 15.602413] ? __virt_addr_valid+0x1db/0x2d0 [ 15.602437] ? kasan_atomics_helper+0x697/0x5450 [ 15.602460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.602487] ? kasan_atomics_helper+0x697/0x5450 [ 15.602511] kasan_report+0x141/0x180 [ 15.602536] ? kasan_atomics_helper+0x697/0x5450 [ 15.602564] kasan_check_range+0x10c/0x1c0 [ 15.602590] __kasan_check_write+0x18/0x20 [ 15.602611] kasan_atomics_helper+0x697/0x5450 [ 15.602636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.602683] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.602715] ? kasan_atomics+0x152/0x310 [ 15.602744] kasan_atomics+0x1dc/0x310 [ 15.602768] ? __pfx_kasan_atomics+0x10/0x10 [ 15.602794] ? __pfx_read_tsc+0x10/0x10 [ 15.602817] ? ktime_get_ts64+0x86/0x230 [ 15.602843] kunit_try_run_case+0x1a5/0x480 [ 15.602869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.602894] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.602919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.602944] ? __kthread_parkme+0x82/0x180 [ 15.602966] ? preempt_count_sub+0x50/0x80 [ 15.602992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.603018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.603044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.603080] kthread+0x337/0x6f0 [ 15.603100] ? trace_preempt_on+0x20/0xc0 [ 15.603133] ? __pfx_kthread+0x10/0x10 [ 15.603155] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.603179] ? calculate_sigpending+0x7b/0xa0 [ 15.603204] ? __pfx_kthread+0x10/0x10 [ 15.603227] ret_from_fork+0x116/0x1d0 [ 15.603248] ? __pfx_kthread+0x10/0x10 [ 15.603270] ret_from_fork_asm+0x1a/0x30 [ 15.603302] </TASK> [ 15.603313] [ 15.618565] Allocated by task 284: [ 15.618699] kasan_save_stack+0x45/0x70 [ 15.619159] kasan_save_track+0x18/0x40 [ 15.619530] kasan_save_alloc_info+0x3b/0x50 [ 15.620040] __kasan_kmalloc+0xb7/0xc0 [ 15.620478] __kmalloc_cache_noprof+0x189/0x420 [ 15.620766] kasan_atomics+0x95/0x310 [ 15.620950] kunit_try_run_case+0x1a5/0x480 [ 15.621361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.621905] kthread+0x337/0x6f0 [ 15.622346] ret_from_fork+0x116/0x1d0 [ 15.622542] ret_from_fork_asm+0x1a/0x30 [ 15.623023] [ 15.623199] The buggy address belongs to the object at ffff8881025adf00 [ 15.623199] which belongs to the cache kmalloc-64 of size 64 [ 15.624299] The buggy address is located 0 bytes to the right of [ 15.624299] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.625357] [ 15.625574] The buggy address belongs to the physical page: [ 15.626158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.626473] flags: 0x200000000000000(node=0|zone=2) [ 15.626925] page_type: f5(slab) [ 15.627143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.627780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.628063] page dumped because: kasan: bad access detected [ 15.628535] [ 15.628713] Memory state around the buggy address: [ 15.629225] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.629981] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.630365] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.630987] ^ [ 15.631398] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.631619] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.632539] ================================================================== [ 16.554679] ================================================================== [ 16.554988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.555476] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.555776] [ 16.555867] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.555910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.555923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.555945] Call Trace: [ 16.555960] <TASK> [ 16.555974] dump_stack_lvl+0x73/0xb0 [ 16.556004] print_report+0xd1/0x610 [ 16.556028] ? __virt_addr_valid+0x1db/0x2d0 [ 16.556064] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.556087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.556113] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.556136] kasan_report+0x141/0x180 [ 16.556160] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.556188] kasan_check_range+0x10c/0x1c0 [ 16.556213] __kasan_check_write+0x18/0x20 [ 16.556236] kasan_atomics_helper+0x1ce1/0x5450 [ 16.556260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.556285] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.556311] ? kasan_atomics+0x152/0x310 [ 16.556340] kasan_atomics+0x1dc/0x310 [ 16.556364] ? __pfx_kasan_atomics+0x10/0x10 [ 16.556390] ? __pfx_read_tsc+0x10/0x10 [ 16.556413] ? ktime_get_ts64+0x86/0x230 [ 16.556439] kunit_try_run_case+0x1a5/0x480 [ 16.556466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.556491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.556518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.556544] ? __kthread_parkme+0x82/0x180 [ 16.556566] ? preempt_count_sub+0x50/0x80 [ 16.556593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.556620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.556647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.556674] kthread+0x337/0x6f0 [ 16.556695] ? trace_preempt_on+0x20/0xc0 [ 16.556720] ? __pfx_kthread+0x10/0x10 [ 16.556742] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.556766] ? calculate_sigpending+0x7b/0xa0 [ 16.556792] ? __pfx_kthread+0x10/0x10 [ 16.556815] ret_from_fork+0x116/0x1d0 [ 16.556837] ? __pfx_kthread+0x10/0x10 [ 16.556858] ret_from_fork_asm+0x1a/0x30 [ 16.556891] </TASK> [ 16.556902] [ 16.564519] Allocated by task 284: [ 16.564699] kasan_save_stack+0x45/0x70 [ 16.564899] kasan_save_track+0x18/0x40 [ 16.565101] kasan_save_alloc_info+0x3b/0x50 [ 16.565313] __kasan_kmalloc+0xb7/0xc0 [ 16.565654] __kmalloc_cache_noprof+0x189/0x420 [ 16.565880] kasan_atomics+0x95/0x310 [ 16.566077] kunit_try_run_case+0x1a5/0x480 [ 16.566530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.566745] kthread+0x337/0x6f0 [ 16.566870] ret_from_fork+0x116/0x1d0 [ 16.567005] ret_from_fork_asm+0x1a/0x30 [ 16.567262] [ 16.567361] The buggy address belongs to the object at ffff8881025adf00 [ 16.567361] which belongs to the cache kmalloc-64 of size 64 [ 16.567897] The buggy address is located 0 bytes to the right of [ 16.567897] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.568502] [ 16.568588] The buggy address belongs to the physical page: [ 16.568811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.569159] flags: 0x200000000000000(node=0|zone=2) [ 16.569349] page_type: f5(slab) [ 16.569507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.569739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.569967] page dumped because: kasan: bad access detected [ 16.571407] [ 16.571581] Memory state around the buggy address: [ 16.571987] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.572928] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.573825] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.574551] ^ [ 16.574725] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.574946] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.575229] ================================================================== [ 15.362412] ================================================================== [ 15.363137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.363576] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.363890] [ 15.364039] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.364331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.364345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.364437] Call Trace: [ 15.364451] <TASK> [ 15.364536] dump_stack_lvl+0x73/0xb0 [ 15.364569] print_report+0xd1/0x610 [ 15.364594] ? __virt_addr_valid+0x1db/0x2d0 [ 15.364617] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.364652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.364678] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.364701] kasan_report+0x141/0x180 [ 15.364723] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.364750] __asan_report_store4_noabort+0x1b/0x30 [ 15.364777] kasan_atomics_helper+0x4ba2/0x5450 [ 15.364801] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.364823] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.364882] ? kasan_atomics+0x152/0x310 [ 15.364908] kasan_atomics+0x1dc/0x310 [ 15.364932] ? __pfx_kasan_atomics+0x10/0x10 [ 15.364957] ? __pfx_read_tsc+0x10/0x10 [ 15.364978] ? ktime_get_ts64+0x86/0x230 [ 15.365003] kunit_try_run_case+0x1a5/0x480 [ 15.365029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.365063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.365088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.365113] ? __kthread_parkme+0x82/0x180 [ 15.365145] ? preempt_count_sub+0x50/0x80 [ 15.365169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.365194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.365220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.365246] kthread+0x337/0x6f0 [ 15.365266] ? trace_preempt_on+0x20/0xc0 [ 15.365290] ? __pfx_kthread+0x10/0x10 [ 15.365311] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.365333] ? calculate_sigpending+0x7b/0xa0 [ 15.365359] ? __pfx_kthread+0x10/0x10 [ 15.365381] ret_from_fork+0x116/0x1d0 [ 15.365400] ? __pfx_kthread+0x10/0x10 [ 15.365421] ret_from_fork_asm+0x1a/0x30 [ 15.365453] </TASK> [ 15.365462] [ 15.376805] Allocated by task 284: [ 15.377266] kasan_save_stack+0x45/0x70 [ 15.377606] kasan_save_track+0x18/0x40 [ 15.377820] kasan_save_alloc_info+0x3b/0x50 [ 15.378011] __kasan_kmalloc+0xb7/0xc0 [ 15.378335] __kmalloc_cache_noprof+0x189/0x420 [ 15.378637] kasan_atomics+0x95/0x310 [ 15.379083] kunit_try_run_case+0x1a5/0x480 [ 15.379392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.379742] kthread+0x337/0x6f0 [ 15.380014] ret_from_fork+0x116/0x1d0 [ 15.380387] ret_from_fork_asm+0x1a/0x30 [ 15.380561] [ 15.380667] The buggy address belongs to the object at ffff8881025adf00 [ 15.380667] which belongs to the cache kmalloc-64 of size 64 [ 15.381453] The buggy address is located 0 bytes to the right of [ 15.381453] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.382245] [ 15.382362] The buggy address belongs to the physical page: [ 15.382573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.383347] flags: 0x200000000000000(node=0|zone=2) [ 15.383565] page_type: f5(slab) [ 15.384018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.384539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.385018] page dumped because: kasan: bad access detected [ 15.385339] [ 15.385439] Memory state around the buggy address: [ 15.385633] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.386171] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.386520] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.386930] ^ [ 15.387262] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.387674] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.387999] ================================================================== [ 16.843634] ================================================================== [ 16.843945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.844355] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.844690] [ 16.844824] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.844869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.844881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.844903] Call Trace: [ 16.844917] <TASK> [ 16.844932] dump_stack_lvl+0x73/0xb0 [ 16.844962] print_report+0xd1/0x610 [ 16.844985] ? __virt_addr_valid+0x1db/0x2d0 [ 16.845009] ? kasan_atomics_helper+0x5115/0x5450 [ 16.845032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.845069] ? kasan_atomics_helper+0x5115/0x5450 [ 16.845094] kasan_report+0x141/0x180 [ 16.845117] ? kasan_atomics_helper+0x5115/0x5450 [ 16.845160] __asan_report_load8_noabort+0x18/0x20 [ 16.845187] kasan_atomics_helper+0x5115/0x5450 [ 16.845212] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.845256] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.845297] ? kasan_atomics+0x152/0x310 [ 16.845326] kasan_atomics+0x1dc/0x310 [ 16.845350] ? __pfx_kasan_atomics+0x10/0x10 [ 16.845376] ? __pfx_read_tsc+0x10/0x10 [ 16.845400] ? ktime_get_ts64+0x86/0x230 [ 16.845427] kunit_try_run_case+0x1a5/0x480 [ 16.845453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.845478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.845504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.845530] ? __kthread_parkme+0x82/0x180 [ 16.845552] ? preempt_count_sub+0x50/0x80 [ 16.845578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.845605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.845631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.845658] kthread+0x337/0x6f0 [ 16.845679] ? trace_preempt_on+0x20/0xc0 [ 16.845705] ? __pfx_kthread+0x10/0x10 [ 16.845728] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.845751] ? calculate_sigpending+0x7b/0xa0 [ 16.845777] ? __pfx_kthread+0x10/0x10 [ 16.845800] ret_from_fork+0x116/0x1d0 [ 16.845821] ? __pfx_kthread+0x10/0x10 [ 16.845842] ret_from_fork_asm+0x1a/0x30 [ 16.845875] </TASK> [ 16.845886] [ 16.854138] Allocated by task 284: [ 16.854352] kasan_save_stack+0x45/0x70 [ 16.854562] kasan_save_track+0x18/0x40 [ 16.854747] kasan_save_alloc_info+0x3b/0x50 [ 16.854981] __kasan_kmalloc+0xb7/0xc0 [ 16.855199] __kmalloc_cache_noprof+0x189/0x420 [ 16.855413] kasan_atomics+0x95/0x310 [ 16.855590] kunit_try_run_case+0x1a5/0x480 [ 16.855821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.856070] kthread+0x337/0x6f0 [ 16.856230] ret_from_fork+0x116/0x1d0 [ 16.856441] ret_from_fork_asm+0x1a/0x30 [ 16.856640] [ 16.856736] The buggy address belongs to the object at ffff8881025adf00 [ 16.856736] which belongs to the cache kmalloc-64 of size 64 [ 16.857214] The buggy address is located 0 bytes to the right of [ 16.857214] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.857812] [ 16.857920] The buggy address belongs to the physical page: [ 16.858109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.858492] flags: 0x200000000000000(node=0|zone=2) [ 16.858709] page_type: f5(slab) [ 16.858878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.859318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.859626] page dumped because: kasan: bad access detected [ 16.859873] [ 16.859960] Memory state around the buggy address: [ 16.860159] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.860504] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.860816] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.861082] ^ [ 16.861416] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.861720] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.861938] ================================================================== [ 16.037345] ================================================================== [ 16.037579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 16.038753] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.039086] [ 16.039365] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.039414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.039428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.039451] Call Trace: [ 16.039466] <TASK> [ 16.039481] dump_stack_lvl+0x73/0xb0 [ 16.039512] print_report+0xd1/0x610 [ 16.039537] ? __virt_addr_valid+0x1db/0x2d0 [ 16.039561] ? kasan_atomics_helper+0x1148/0x5450 [ 16.039585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.039611] ? kasan_atomics_helper+0x1148/0x5450 [ 16.039635] kasan_report+0x141/0x180 [ 16.039659] ? kasan_atomics_helper+0x1148/0x5450 [ 16.039688] kasan_check_range+0x10c/0x1c0 [ 16.039714] __kasan_check_write+0x18/0x20 [ 16.039735] kasan_atomics_helper+0x1148/0x5450 [ 16.039759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.039784] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.039811] ? kasan_atomics+0x152/0x310 [ 16.039838] kasan_atomics+0x1dc/0x310 [ 16.039863] ? __pfx_kasan_atomics+0x10/0x10 [ 16.039888] ? __pfx_read_tsc+0x10/0x10 [ 16.039911] ? ktime_get_ts64+0x86/0x230 [ 16.039937] kunit_try_run_case+0x1a5/0x480 [ 16.039963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.039989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.040015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.040041] ? __kthread_parkme+0x82/0x180 [ 16.040076] ? preempt_count_sub+0x50/0x80 [ 16.040102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.040141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.040168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.040195] kthread+0x337/0x6f0 [ 16.040216] ? trace_preempt_on+0x20/0xc0 [ 16.040241] ? __pfx_kthread+0x10/0x10 [ 16.040262] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.040286] ? calculate_sigpending+0x7b/0xa0 [ 16.040313] ? __pfx_kthread+0x10/0x10 [ 16.040335] ret_from_fork+0x116/0x1d0 [ 16.040356] ? __pfx_kthread+0x10/0x10 [ 16.040377] ret_from_fork_asm+0x1a/0x30 [ 16.040410] </TASK> [ 16.040421] [ 16.051865] Allocated by task 284: [ 16.052256] kasan_save_stack+0x45/0x70 [ 16.052547] kasan_save_track+0x18/0x40 [ 16.052737] kasan_save_alloc_info+0x3b/0x50 [ 16.052939] __kasan_kmalloc+0xb7/0xc0 [ 16.053137] __kmalloc_cache_noprof+0x189/0x420 [ 16.053668] kasan_atomics+0x95/0x310 [ 16.053949] kunit_try_run_case+0x1a5/0x480 [ 16.054347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.054711] kthread+0x337/0x6f0 [ 16.054965] ret_from_fork+0x116/0x1d0 [ 16.055284] ret_from_fork_asm+0x1a/0x30 [ 16.055570] [ 16.055772] The buggy address belongs to the object at ffff8881025adf00 [ 16.055772] which belongs to the cache kmalloc-64 of size 64 [ 16.056552] The buggy address is located 0 bytes to the right of [ 16.056552] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.057271] [ 16.057378] The buggy address belongs to the physical page: [ 16.057793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.058282] flags: 0x200000000000000(node=0|zone=2) [ 16.058613] page_type: f5(slab) [ 16.058888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.059403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.059713] page dumped because: kasan: bad access detected [ 16.059968] [ 16.060073] Memory state around the buggy address: [ 16.060526] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.060889] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.061327] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.061736] ^ [ 16.062026] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.062460] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.062878] ================================================================== [ 16.642934] ================================================================== [ 16.643352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.643783] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.644078] [ 16.644212] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.644255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.644268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.644323] Call Trace: [ 16.644339] <TASK> [ 16.644378] dump_stack_lvl+0x73/0xb0 [ 16.644410] print_report+0xd1/0x610 [ 16.644434] ? __virt_addr_valid+0x1db/0x2d0 [ 16.644458] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.644480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.644505] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.644530] kasan_report+0x141/0x180 [ 16.644552] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.644581] kasan_check_range+0x10c/0x1c0 [ 16.644636] __kasan_check_write+0x18/0x20 [ 16.644669] kasan_atomics_helper+0x1f43/0x5450 [ 16.644705] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.644729] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.644757] ? kasan_atomics+0x152/0x310 [ 16.644786] kasan_atomics+0x1dc/0x310 [ 16.644809] ? __pfx_kasan_atomics+0x10/0x10 [ 16.644836] ? __pfx_read_tsc+0x10/0x10 [ 16.644858] ? ktime_get_ts64+0x86/0x230 [ 16.644884] kunit_try_run_case+0x1a5/0x480 [ 16.644910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.644935] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.644961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.644987] ? __kthread_parkme+0x82/0x180 [ 16.645009] ? preempt_count_sub+0x50/0x80 [ 16.645036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.645072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.645099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.645145] kthread+0x337/0x6f0 [ 16.645166] ? trace_preempt_on+0x20/0xc0 [ 16.645191] ? __pfx_kthread+0x10/0x10 [ 16.645213] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.645236] ? calculate_sigpending+0x7b/0xa0 [ 16.645262] ? __pfx_kthread+0x10/0x10 [ 16.645285] ret_from_fork+0x116/0x1d0 [ 16.645306] ? __pfx_kthread+0x10/0x10 [ 16.645328] ret_from_fork_asm+0x1a/0x30 [ 16.645360] </TASK> [ 16.645370] [ 16.653441] Allocated by task 284: [ 16.653703] kasan_save_stack+0x45/0x70 [ 16.653898] kasan_save_track+0x18/0x40 [ 16.654109] kasan_save_alloc_info+0x3b/0x50 [ 16.654263] __kasan_kmalloc+0xb7/0xc0 [ 16.654460] __kmalloc_cache_noprof+0x189/0x420 [ 16.654694] kasan_atomics+0x95/0x310 [ 16.654878] kunit_try_run_case+0x1a5/0x480 [ 16.655075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.655314] kthread+0x337/0x6f0 [ 16.655483] ret_from_fork+0x116/0x1d0 [ 16.655649] ret_from_fork_asm+0x1a/0x30 [ 16.655832] [ 16.655925] The buggy address belongs to the object at ffff8881025adf00 [ 16.655925] which belongs to the cache kmalloc-64 of size 64 [ 16.656475] The buggy address is located 0 bytes to the right of [ 16.656475] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.656967] [ 16.657042] The buggy address belongs to the physical page: [ 16.657247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.657491] flags: 0x200000000000000(node=0|zone=2) [ 16.657728] page_type: f5(slab) [ 16.657948] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.658335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.658682] page dumped because: kasan: bad access detected [ 16.658974] [ 16.659048] Memory state around the buggy address: [ 16.659310] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.659629] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.659925] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.660299] ^ [ 16.660508] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.660727] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.661039] ================================================================== [ 15.973378] ================================================================== [ 15.974013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.974764] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.975138] [ 15.975229] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.975274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.975287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.975310] Call Trace: [ 15.975325] <TASK> [ 15.975341] dump_stack_lvl+0x73/0xb0 [ 15.975371] print_report+0xd1/0x610 [ 15.975395] ? __virt_addr_valid+0x1db/0x2d0 [ 15.975420] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.975443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.975468] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.975492] kasan_report+0x141/0x180 [ 15.975515] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.975543] __asan_report_load4_noabort+0x18/0x20 [ 15.975569] kasan_atomics_helper+0x4a36/0x5450 [ 15.975594] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.975620] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.975647] ? kasan_atomics+0x152/0x310 [ 15.975675] kasan_atomics+0x1dc/0x310 [ 15.975699] ? __pfx_kasan_atomics+0x10/0x10 [ 15.975724] ? __pfx_read_tsc+0x10/0x10 [ 15.975749] ? ktime_get_ts64+0x86/0x230 [ 15.975775] kunit_try_run_case+0x1a5/0x480 [ 15.975801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.975826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.975852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.975878] ? __kthread_parkme+0x82/0x180 [ 15.975901] ? preempt_count_sub+0x50/0x80 [ 15.975927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.975953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.975979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.976006] kthread+0x337/0x6f0 [ 15.976027] ? trace_preempt_on+0x20/0xc0 [ 15.976066] ? __pfx_kthread+0x10/0x10 [ 15.976089] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.976112] ? calculate_sigpending+0x7b/0xa0 [ 15.976147] ? __pfx_kthread+0x10/0x10 [ 15.976170] ret_from_fork+0x116/0x1d0 [ 15.976190] ? __pfx_kthread+0x10/0x10 [ 15.976213] ret_from_fork_asm+0x1a/0x30 [ 15.976246] </TASK> [ 15.976257] [ 15.983584] Allocated by task 284: [ 15.983742] kasan_save_stack+0x45/0x70 [ 15.983889] kasan_save_track+0x18/0x40 [ 15.984092] kasan_save_alloc_info+0x3b/0x50 [ 15.984322] __kasan_kmalloc+0xb7/0xc0 [ 15.984496] __kmalloc_cache_noprof+0x189/0x420 [ 15.984710] kasan_atomics+0x95/0x310 [ 15.984880] kunit_try_run_case+0x1a5/0x480 [ 15.985087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.985330] kthread+0x337/0x6f0 [ 15.985453] ret_from_fork+0x116/0x1d0 [ 15.985589] ret_from_fork_asm+0x1a/0x30 [ 15.985731] [ 15.985804] The buggy address belongs to the object at ffff8881025adf00 [ 15.985804] which belongs to the cache kmalloc-64 of size 64 [ 15.986326] The buggy address is located 0 bytes to the right of [ 15.986326] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.987120] [ 15.987205] The buggy address belongs to the physical page: [ 15.987381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.987623] flags: 0x200000000000000(node=0|zone=2) [ 15.987787] page_type: f5(slab) [ 15.987927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.988486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.988830] page dumped because: kasan: bad access detected [ 15.989105] [ 15.989188] Memory state around the buggy address: [ 15.989346] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.989565] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.990069] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.990385] ^ [ 15.990609] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990870] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.991111] ================================================================== [ 15.415096] ================================================================== [ 15.415793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.416222] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.416823] [ 15.416939] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.416986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.417000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.417131] Call Trace: [ 15.417147] <TASK> [ 15.417164] dump_stack_lvl+0x73/0xb0 [ 15.417195] print_report+0xd1/0x610 [ 15.417219] ? __virt_addr_valid+0x1db/0x2d0 [ 15.417243] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.417267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.417292] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.417316] kasan_report+0x141/0x180 [ 15.417339] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.417367] __asan_report_store4_noabort+0x1b/0x30 [ 15.417395] kasan_atomics_helper+0x4b6e/0x5450 [ 15.417419] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.417444] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.417471] ? kasan_atomics+0x152/0x310 [ 15.417499] kasan_atomics+0x1dc/0x310 [ 15.417524] ? __pfx_kasan_atomics+0x10/0x10 [ 15.417550] ? __pfx_read_tsc+0x10/0x10 [ 15.417572] ? ktime_get_ts64+0x86/0x230 [ 15.417599] kunit_try_run_case+0x1a5/0x480 [ 15.417626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.417692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.417718] ? __kthread_parkme+0x82/0x180 [ 15.417741] ? preempt_count_sub+0x50/0x80 [ 15.417767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.417820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.417848] kthread+0x337/0x6f0 [ 15.417869] ? trace_preempt_on+0x20/0xc0 [ 15.417893] ? __pfx_kthread+0x10/0x10 [ 15.417916] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.417939] ? calculate_sigpending+0x7b/0xa0 [ 15.417967] ? __pfx_kthread+0x10/0x10 [ 15.417990] ret_from_fork+0x116/0x1d0 [ 15.418011] ? __pfx_kthread+0x10/0x10 [ 15.418033] ret_from_fork_asm+0x1a/0x30 [ 15.418077] </TASK> [ 15.418089] [ 15.428153] Allocated by task 284: [ 15.428297] kasan_save_stack+0x45/0x70 [ 15.428447] kasan_save_track+0x18/0x40 [ 15.428587] kasan_save_alloc_info+0x3b/0x50 [ 15.428740] __kasan_kmalloc+0xb7/0xc0 [ 15.428875] __kmalloc_cache_noprof+0x189/0x420 [ 15.429033] kasan_atomics+0x95/0x310 [ 15.430288] kunit_try_run_case+0x1a5/0x480 [ 15.431226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.432101] kthread+0x337/0x6f0 [ 15.432790] ret_from_fork+0x116/0x1d0 [ 15.433430] ret_from_fork_asm+0x1a/0x30 [ 15.434271] [ 15.434478] The buggy address belongs to the object at ffff8881025adf00 [ 15.434478] which belongs to the cache kmalloc-64 of size 64 [ 15.436288] The buggy address is located 0 bytes to the right of [ 15.436288] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.437537] [ 15.437654] The buggy address belongs to the physical page: [ 15.438201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.438558] flags: 0x200000000000000(node=0|zone=2) [ 15.438971] page_type: f5(slab) [ 15.439254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.439597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.439924] page dumped because: kasan: bad access detected [ 15.440495] [ 15.440601] Memory state around the buggy address: [ 15.441048] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.441440] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.441878] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.442365] ^ [ 15.442583] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.443070] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.443335] ================================================================== [ 16.283638] ================================================================== [ 16.284155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.284615] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.284917] [ 16.285025] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.285082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.285095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.285116] Call Trace: [ 16.285131] <TASK> [ 16.285147] dump_stack_lvl+0x73/0xb0 [ 16.285176] print_report+0xd1/0x610 [ 16.285436] ? __virt_addr_valid+0x1db/0x2d0 [ 16.285462] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.285485] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.285511] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.285535] kasan_report+0x141/0x180 [ 16.285559] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.285587] kasan_check_range+0x10c/0x1c0 [ 16.285613] __kasan_check_write+0x18/0x20 [ 16.285634] kasan_atomics_helper+0x15b6/0x5450 [ 16.285660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.285684] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.285711] ? kasan_atomics+0x152/0x310 [ 16.285739] kasan_atomics+0x1dc/0x310 [ 16.285763] ? __pfx_kasan_atomics+0x10/0x10 [ 16.285789] ? __pfx_read_tsc+0x10/0x10 [ 16.285812] ? ktime_get_ts64+0x86/0x230 [ 16.285838] kunit_try_run_case+0x1a5/0x480 [ 16.285864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.285889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.285915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.285942] ? __kthread_parkme+0x82/0x180 [ 16.285964] ? preempt_count_sub+0x50/0x80 [ 16.285989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.286042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.286082] kthread+0x337/0x6f0 [ 16.286103] ? trace_preempt_on+0x20/0xc0 [ 16.286139] ? __pfx_kthread+0x10/0x10 [ 16.286162] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.286185] ? calculate_sigpending+0x7b/0xa0 [ 16.286211] ? __pfx_kthread+0x10/0x10 [ 16.286234] ret_from_fork+0x116/0x1d0 [ 16.286255] ? __pfx_kthread+0x10/0x10 [ 16.286278] ret_from_fork_asm+0x1a/0x30 [ 16.286310] </TASK> [ 16.286320] [ 16.295953] Allocated by task 284: [ 16.296312] kasan_save_stack+0x45/0x70 [ 16.296580] kasan_save_track+0x18/0x40 [ 16.296835] kasan_save_alloc_info+0x3b/0x50 [ 16.297130] __kasan_kmalloc+0xb7/0xc0 [ 16.297285] __kmalloc_cache_noprof+0x189/0x420 [ 16.297637] kasan_atomics+0x95/0x310 [ 16.297794] kunit_try_run_case+0x1a5/0x480 [ 16.297996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.298467] kthread+0x337/0x6f0 [ 16.298625] ret_from_fork+0x116/0x1d0 [ 16.298905] ret_from_fork_asm+0x1a/0x30 [ 16.299077] [ 16.299189] The buggy address belongs to the object at ffff8881025adf00 [ 16.299189] which belongs to the cache kmalloc-64 of size 64 [ 16.299857] The buggy address is located 0 bytes to the right of [ 16.299857] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.300617] [ 16.300704] The buggy address belongs to the physical page: [ 16.301021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.301426] flags: 0x200000000000000(node=0|zone=2) [ 16.301754] page_type: f5(slab) [ 16.301924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.302426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.302756] page dumped because: kasan: bad access detected [ 16.302991] [ 16.303097] Memory state around the buggy address: [ 16.303501] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.303856] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.304261] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.304519] ^ [ 16.304841] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.305242] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.305533] ================================================================== [ 16.704391] ================================================================== [ 16.704729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.705188] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.705521] [ 16.705609] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.705655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.705668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.705722] Call Trace: [ 16.705736] <TASK> [ 16.705750] dump_stack_lvl+0x73/0xb0 [ 16.705820] print_report+0xd1/0x610 [ 16.705843] ? __virt_addr_valid+0x1db/0x2d0 [ 16.705867] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.705902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.705929] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.705953] kasan_report+0x141/0x180 [ 16.705976] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.706004] __asan_report_load8_noabort+0x18/0x20 [ 16.706031] kasan_atomics_helper+0x4f98/0x5450 [ 16.706065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.706090] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.706154] ? kasan_atomics+0x152/0x310 [ 16.706184] kasan_atomics+0x1dc/0x310 [ 16.706222] ? __pfx_kasan_atomics+0x10/0x10 [ 16.706248] ? __pfx_read_tsc+0x10/0x10 [ 16.706272] ? ktime_get_ts64+0x86/0x230 [ 16.706298] kunit_try_run_case+0x1a5/0x480 [ 16.706325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.706350] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.706376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.706402] ? __kthread_parkme+0x82/0x180 [ 16.706425] ? preempt_count_sub+0x50/0x80 [ 16.706450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.706476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.706502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.706529] kthread+0x337/0x6f0 [ 16.706550] ? trace_preempt_on+0x20/0xc0 [ 16.706575] ? __pfx_kthread+0x10/0x10 [ 16.706598] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.706621] ? calculate_sigpending+0x7b/0xa0 [ 16.706647] ? __pfx_kthread+0x10/0x10 [ 16.706670] ret_from_fork+0x116/0x1d0 [ 16.706690] ? __pfx_kthread+0x10/0x10 [ 16.706721] ret_from_fork_asm+0x1a/0x30 [ 16.706754] </TASK> [ 16.706765] [ 16.714590] Allocated by task 284: [ 16.714736] kasan_save_stack+0x45/0x70 [ 16.714939] kasan_save_track+0x18/0x40 [ 16.715148] kasan_save_alloc_info+0x3b/0x50 [ 16.715304] __kasan_kmalloc+0xb7/0xc0 [ 16.715521] __kmalloc_cache_noprof+0x189/0x420 [ 16.715839] kasan_atomics+0x95/0x310 [ 16.716062] kunit_try_run_case+0x1a5/0x480 [ 16.716273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.716534] kthread+0x337/0x6f0 [ 16.716723] ret_from_fork+0x116/0x1d0 [ 16.716899] ret_from_fork_asm+0x1a/0x30 [ 16.717097] [ 16.717201] The buggy address belongs to the object at ffff8881025adf00 [ 16.717201] which belongs to the cache kmalloc-64 of size 64 [ 16.717676] The buggy address is located 0 bytes to the right of [ 16.717676] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.718254] [ 16.718353] The buggy address belongs to the physical page: [ 16.718595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.718844] flags: 0x200000000000000(node=0|zone=2) [ 16.719009] page_type: f5(slab) [ 16.719169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.719556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.719901] page dumped because: kasan: bad access detected [ 16.720189] [ 16.720278] Memory state around the buggy address: [ 16.720569] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.720835] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.721189] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.721405] ^ [ 16.721590] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.721963] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.722397] ================================================================== [ 16.801706] ================================================================== [ 16.802797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.803682] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.804384] [ 16.804482] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.804529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.804543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.804566] Call Trace: [ 16.804582] <TASK> [ 16.804598] dump_stack_lvl+0x73/0xb0 [ 16.804629] print_report+0xd1/0x610 [ 16.804655] ? __virt_addr_valid+0x1db/0x2d0 [ 16.804678] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.804701] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.804727] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.804750] kasan_report+0x141/0x180 [ 16.804774] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.804804] __asan_report_load8_noabort+0x18/0x20 [ 16.804830] kasan_atomics_helper+0x4fa5/0x5450 [ 16.804855] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.804880] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.804907] ? kasan_atomics+0x152/0x310 [ 16.804935] kasan_atomics+0x1dc/0x310 [ 16.804959] ? __pfx_kasan_atomics+0x10/0x10 [ 16.804985] ? __pfx_read_tsc+0x10/0x10 [ 16.805008] ? ktime_get_ts64+0x86/0x230 [ 16.805034] kunit_try_run_case+0x1a5/0x480 [ 16.805072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.805097] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.805135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.805161] ? __kthread_parkme+0x82/0x180 [ 16.805183] ? preempt_count_sub+0x50/0x80 [ 16.805246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.805273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.805299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.805327] kthread+0x337/0x6f0 [ 16.805347] ? trace_preempt_on+0x20/0xc0 [ 16.805373] ? __pfx_kthread+0x10/0x10 [ 16.805395] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.805419] ? calculate_sigpending+0x7b/0xa0 [ 16.805446] ? __pfx_kthread+0x10/0x10 [ 16.805469] ret_from_fork+0x116/0x1d0 [ 16.805490] ? __pfx_kthread+0x10/0x10 [ 16.805512] ret_from_fork_asm+0x1a/0x30 [ 16.805544] </TASK> [ 16.805555] [ 16.814947] Allocated by task 284: [ 16.815140] kasan_save_stack+0x45/0x70 [ 16.815366] kasan_save_track+0x18/0x40 [ 16.815561] kasan_save_alloc_info+0x3b/0x50 [ 16.815775] __kasan_kmalloc+0xb7/0xc0 [ 16.815949] __kmalloc_cache_noprof+0x189/0x420 [ 16.816120] kasan_atomics+0x95/0x310 [ 16.816329] kunit_try_run_case+0x1a5/0x480 [ 16.816578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.816841] kthread+0x337/0x6f0 [ 16.816989] ret_from_fork+0x116/0x1d0 [ 16.817164] ret_from_fork_asm+0x1a/0x30 [ 16.817382] [ 16.817496] The buggy address belongs to the object at ffff8881025adf00 [ 16.817496] which belongs to the cache kmalloc-64 of size 64 [ 16.817964] The buggy address is located 0 bytes to the right of [ 16.817964] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.818630] [ 16.818832] The buggy address belongs to the physical page: [ 16.819083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.819484] flags: 0x200000000000000(node=0|zone=2) [ 16.819737] page_type: f5(slab) [ 16.819904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.820402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.820635] page dumped because: kasan: bad access detected [ 16.820810] [ 16.820881] Memory state around the buggy address: [ 16.821114] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.821474] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.821812] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.822150] ^ [ 16.822403] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.822714] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.823020] ================================================================== [ 15.493077] ================================================================== [ 15.493680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.493974] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.494367] [ 15.494482] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.494527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.494540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.494562] Call Trace: [ 15.494577] <TASK> [ 15.494592] dump_stack_lvl+0x73/0xb0 [ 15.494621] print_report+0xd1/0x610 [ 15.494656] ? __virt_addr_valid+0x1db/0x2d0 [ 15.494680] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.494709] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.494734] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.494758] kasan_report+0x141/0x180 [ 15.494781] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.494808] kasan_check_range+0x10c/0x1c0 [ 15.494835] __kasan_check_write+0x18/0x20 [ 15.494855] kasan_atomics_helper+0x4a0/0x5450 [ 15.494881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.494916] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.494943] ? kasan_atomics+0x152/0x310 [ 15.494971] kasan_atomics+0x1dc/0x310 [ 15.494995] ? __pfx_kasan_atomics+0x10/0x10 [ 15.495021] ? __pfx_read_tsc+0x10/0x10 [ 15.495044] ? ktime_get_ts64+0x86/0x230 [ 15.495081] kunit_try_run_case+0x1a5/0x480 [ 15.495106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.495132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.495157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.495182] ? __kthread_parkme+0x82/0x180 [ 15.495214] ? preempt_count_sub+0x50/0x80 [ 15.495240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.495266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.495293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.495319] kthread+0x337/0x6f0 [ 15.495340] ? trace_preempt_on+0x20/0xc0 [ 15.495364] ? __pfx_kthread+0x10/0x10 [ 15.495387] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.495411] ? calculate_sigpending+0x7b/0xa0 [ 15.495436] ? __pfx_kthread+0x10/0x10 [ 15.495459] ret_from_fork+0x116/0x1d0 [ 15.495480] ? __pfx_kthread+0x10/0x10 [ 15.495502] ret_from_fork_asm+0x1a/0x30 [ 15.495534] </TASK> [ 15.495545] [ 15.503391] Allocated by task 284: [ 15.503584] kasan_save_stack+0x45/0x70 [ 15.503954] kasan_save_track+0x18/0x40 [ 15.504188] kasan_save_alloc_info+0x3b/0x50 [ 15.504353] __kasan_kmalloc+0xb7/0xc0 [ 15.504489] __kmalloc_cache_noprof+0x189/0x420 [ 15.504660] kasan_atomics+0x95/0x310 [ 15.504991] kunit_try_run_case+0x1a5/0x480 [ 15.505324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.505583] kthread+0x337/0x6f0 [ 15.505772] ret_from_fork+0x116/0x1d0 [ 15.506003] ret_from_fork_asm+0x1a/0x30 [ 15.506218] [ 15.506302] The buggy address belongs to the object at ffff8881025adf00 [ 15.506302] which belongs to the cache kmalloc-64 of size 64 [ 15.506896] The buggy address is located 0 bytes to the right of [ 15.506896] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.507410] [ 15.507483] The buggy address belongs to the physical page: [ 15.507660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.507903] flags: 0x200000000000000(node=0|zone=2) [ 15.508079] page_type: f5(slab) [ 15.508248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.508587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.509131] page dumped because: kasan: bad access detected [ 15.509676] [ 15.509771] Memory state around the buggy address: [ 15.510142] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.510479] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.510765] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.511143] ^ [ 15.511395] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.511812] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.512110] ================================================================== [ 16.192980] ================================================================== [ 16.193610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 16.193978] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.194342] [ 16.194451] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.194495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.194539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.194559] Call Trace: [ 16.194575] <TASK> [ 16.194590] dump_stack_lvl+0x73/0xb0 [ 16.194620] print_report+0xd1/0x610 [ 16.194674] ? __virt_addr_valid+0x1db/0x2d0 [ 16.194700] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.194727] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.194752] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.194776] kasan_report+0x141/0x180 [ 16.194830] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.194859] __asan_report_load8_noabort+0x18/0x20 [ 16.194886] kasan_atomics_helper+0x4eae/0x5450 [ 16.194910] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.194964] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.194991] ? kasan_atomics+0x152/0x310 [ 16.195020] kasan_atomics+0x1dc/0x310 [ 16.195044] ? __pfx_kasan_atomics+0x10/0x10 [ 16.195112] ? __pfx_read_tsc+0x10/0x10 [ 16.195136] ? ktime_get_ts64+0x86/0x230 [ 16.195161] kunit_try_run_case+0x1a5/0x480 [ 16.195197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.195222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.195248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.195305] ? __kthread_parkme+0x82/0x180 [ 16.195327] ? preempt_count_sub+0x50/0x80 [ 16.195352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.195378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.195404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.195432] kthread+0x337/0x6f0 [ 16.195483] ? trace_preempt_on+0x20/0xc0 [ 16.195508] ? __pfx_kthread+0x10/0x10 [ 16.195530] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.195553] ? calculate_sigpending+0x7b/0xa0 [ 16.195610] ? __pfx_kthread+0x10/0x10 [ 16.195634] ret_from_fork+0x116/0x1d0 [ 16.195655] ? __pfx_kthread+0x10/0x10 [ 16.195678] ret_from_fork_asm+0x1a/0x30 [ 16.195710] </TASK> [ 16.195751] [ 16.204831] Allocated by task 284: [ 16.205015] kasan_save_stack+0x45/0x70 [ 16.205419] kasan_save_track+0x18/0x40 [ 16.206070] kasan_save_alloc_info+0x3b/0x50 [ 16.206286] __kasan_kmalloc+0xb7/0xc0 [ 16.206792] __kmalloc_cache_noprof+0x189/0x420 [ 16.206959] kasan_atomics+0x95/0x310 [ 16.207111] kunit_try_run_case+0x1a5/0x480 [ 16.207258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.207431] kthread+0x337/0x6f0 [ 16.207549] ret_from_fork+0x116/0x1d0 [ 16.207679] ret_from_fork_asm+0x1a/0x30 [ 16.207816] [ 16.207890] The buggy address belongs to the object at ffff8881025adf00 [ 16.207890] which belongs to the cache kmalloc-64 of size 64 [ 16.208267] The buggy address is located 0 bytes to the right of [ 16.208267] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.208638] [ 16.208711] The buggy address belongs to the physical page: [ 16.208887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.209137] flags: 0x200000000000000(node=0|zone=2) [ 16.209302] page_type: f5(slab) [ 16.209420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.209873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.210331] page dumped because: kasan: bad access detected [ 16.210579] [ 16.210652] Memory state around the buggy address: [ 16.210871] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.211184] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.211766] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.212099] ^ [ 16.212360] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.212688] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.213039] ================================================================== [ 16.823722] ================================================================== [ 16.824026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.824471] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.824789] [ 16.824920] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.825005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.825022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.825064] Call Trace: [ 16.825080] <TASK> [ 16.825095] dump_stack_lvl+0x73/0xb0 [ 16.825142] print_report+0xd1/0x610 [ 16.825169] ? __virt_addr_valid+0x1db/0x2d0 [ 16.825196] ? kasan_atomics_helper+0x224c/0x5450 [ 16.825222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.825252] ? kasan_atomics_helper+0x224c/0x5450 [ 16.825279] kasan_report+0x141/0x180 [ 16.825304] ? kasan_atomics_helper+0x224c/0x5450 [ 16.825336] kasan_check_range+0x10c/0x1c0 [ 16.825363] __kasan_check_write+0x18/0x20 [ 16.825387] kasan_atomics_helper+0x224c/0x5450 [ 16.825415] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.825443] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.825474] ? kasan_atomics+0x152/0x310 [ 16.825505] kasan_atomics+0x1dc/0x310 [ 16.825530] ? __pfx_kasan_atomics+0x10/0x10 [ 16.825558] ? __pfx_read_tsc+0x10/0x10 [ 16.825583] ? ktime_get_ts64+0x86/0x230 [ 16.825611] kunit_try_run_case+0x1a5/0x480 [ 16.825640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.825687] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.825718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.825747] ? __kthread_parkme+0x82/0x180 [ 16.825790] ? preempt_count_sub+0x50/0x80 [ 16.825818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.825848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.825879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.825912] kthread+0x337/0x6f0 [ 16.825933] ? trace_preempt_on+0x20/0xc0 [ 16.825977] ? __pfx_kthread+0x10/0x10 [ 16.826001] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.826027] ? calculate_sigpending+0x7b/0xa0 [ 16.826082] ? __pfx_kthread+0x10/0x10 [ 16.826107] ret_from_fork+0x116/0x1d0 [ 16.826140] ? __pfx_kthread+0x10/0x10 [ 16.826164] ret_from_fork_asm+0x1a/0x30 [ 16.826198] </TASK> [ 16.826210] [ 16.834351] Allocated by task 284: [ 16.834564] kasan_save_stack+0x45/0x70 [ 16.834766] kasan_save_track+0x18/0x40 [ 16.834967] kasan_save_alloc_info+0x3b/0x50 [ 16.835246] __kasan_kmalloc+0xb7/0xc0 [ 16.835467] __kmalloc_cache_noprof+0x189/0x420 [ 16.835706] kasan_atomics+0x95/0x310 [ 16.835910] kunit_try_run_case+0x1a5/0x480 [ 16.836127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.836597] kthread+0x337/0x6f0 [ 16.836767] ret_from_fork+0x116/0x1d0 [ 16.836950] ret_from_fork_asm+0x1a/0x30 [ 16.837221] [ 16.837305] The buggy address belongs to the object at ffff8881025adf00 [ 16.837305] which belongs to the cache kmalloc-64 of size 64 [ 16.837676] The buggy address is located 0 bytes to the right of [ 16.837676] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.838389] [ 16.838511] The buggy address belongs to the physical page: [ 16.838793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.839233] flags: 0x200000000000000(node=0|zone=2) [ 16.839473] page_type: f5(slab) [ 16.839604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.839885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.840559] page dumped because: kasan: bad access detected [ 16.840743] [ 16.840815] Memory state around the buggy address: [ 16.840993] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.841326] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.841741] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.842061] ^ [ 16.842353] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.842690] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.843136] ================================================================== [ 15.470184] ================================================================== [ 15.470482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.471351] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.471941] [ 15.472045] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.472103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.472116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.472138] Call Trace: [ 15.472153] <TASK> [ 15.472169] dump_stack_lvl+0x73/0xb0 [ 15.472202] print_report+0xd1/0x610 [ 15.472227] ? __virt_addr_valid+0x1db/0x2d0 [ 15.472333] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.472357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.472382] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.472407] kasan_report+0x141/0x180 [ 15.472430] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.472458] __asan_report_load4_noabort+0x18/0x20 [ 15.472485] kasan_atomics_helper+0x4b54/0x5450 [ 15.472510] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.472535] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.472562] ? kasan_atomics+0x152/0x310 [ 15.472590] kasan_atomics+0x1dc/0x310 [ 15.472614] ? __pfx_kasan_atomics+0x10/0x10 [ 15.472702] ? __pfx_read_tsc+0x10/0x10 [ 15.472728] ? ktime_get_ts64+0x86/0x230 [ 15.472755] kunit_try_run_case+0x1a5/0x480 [ 15.472781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.472806] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.472832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.472858] ? __kthread_parkme+0x82/0x180 [ 15.472880] ? preempt_count_sub+0x50/0x80 [ 15.472906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.472932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.472959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.472986] kthread+0x337/0x6f0 [ 15.473006] ? trace_preempt_on+0x20/0xc0 [ 15.473032] ? __pfx_kthread+0x10/0x10 [ 15.473065] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.473088] ? calculate_sigpending+0x7b/0xa0 [ 15.473115] ? __pfx_kthread+0x10/0x10 [ 15.473148] ret_from_fork+0x116/0x1d0 [ 15.473168] ? __pfx_kthread+0x10/0x10 [ 15.473190] ret_from_fork_asm+0x1a/0x30 [ 15.473223] </TASK> [ 15.473234] [ 15.483982] Allocated by task 284: [ 15.484263] kasan_save_stack+0x45/0x70 [ 15.484459] kasan_save_track+0x18/0x40 [ 15.484862] kasan_save_alloc_info+0x3b/0x50 [ 15.485035] __kasan_kmalloc+0xb7/0xc0 [ 15.485383] __kmalloc_cache_noprof+0x189/0x420 [ 15.485596] kasan_atomics+0x95/0x310 [ 15.485891] kunit_try_run_case+0x1a5/0x480 [ 15.486234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.486482] kthread+0x337/0x6f0 [ 15.486734] ret_from_fork+0x116/0x1d0 [ 15.486993] ret_from_fork_asm+0x1a/0x30 [ 15.487235] [ 15.487311] The buggy address belongs to the object at ffff8881025adf00 [ 15.487311] which belongs to the cache kmalloc-64 of size 64 [ 15.487768] The buggy address is located 0 bytes to the right of [ 15.487768] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.488349] [ 15.488459] The buggy address belongs to the physical page: [ 15.488679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.488989] flags: 0x200000000000000(node=0|zone=2) [ 15.489215] page_type: f5(slab) [ 15.489388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.489701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.489962] page dumped because: kasan: bad access detected [ 15.490489] [ 15.490698] Memory state around the buggy address: [ 15.490941] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.491278] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.491560] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.491813] ^ [ 15.491993] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.492372] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.492675] ================================================================== [ 15.944025] ================================================================== [ 15.944520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.944832] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.945622] [ 15.945733] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.945779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.945792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.945813] Call Trace: [ 15.945828] <TASK> [ 15.945842] dump_stack_lvl+0x73/0xb0 [ 15.947581] print_report+0xd1/0x610 [ 15.947645] ? __virt_addr_valid+0x1db/0x2d0 [ 15.947673] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.947697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.947722] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.947746] kasan_report+0x141/0x180 [ 15.947770] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.947798] kasan_check_range+0x10c/0x1c0 [ 15.947824] __kasan_check_write+0x18/0x20 [ 15.947845] kasan_atomics_helper+0xfa9/0x5450 [ 15.947870] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.947894] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.947922] ? kasan_atomics+0x152/0x310 [ 15.947952] kasan_atomics+0x1dc/0x310 [ 15.947976] ? __pfx_kasan_atomics+0x10/0x10 [ 15.948003] ? __pfx_read_tsc+0x10/0x10 [ 15.948025] ? ktime_get_ts64+0x86/0x230 [ 15.948066] kunit_try_run_case+0x1a5/0x480 [ 15.948094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.948142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.948168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.948194] ? __kthread_parkme+0x82/0x180 [ 15.948216] ? preempt_count_sub+0x50/0x80 [ 15.948241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.948267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.948294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.948322] kthread+0x337/0x6f0 [ 15.948342] ? trace_preempt_on+0x20/0xc0 [ 15.948368] ? __pfx_kthread+0x10/0x10 [ 15.948390] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.948413] ? calculate_sigpending+0x7b/0xa0 [ 15.948439] ? __pfx_kthread+0x10/0x10 [ 15.948462] ret_from_fork+0x116/0x1d0 [ 15.948482] ? __pfx_kthread+0x10/0x10 [ 15.948505] ret_from_fork_asm+0x1a/0x30 [ 15.948537] </TASK> [ 15.948549] [ 15.960985] Allocated by task 284: [ 15.961339] kasan_save_stack+0x45/0x70 [ 15.961702] kasan_save_track+0x18/0x40 [ 15.962087] kasan_save_alloc_info+0x3b/0x50 [ 15.962490] __kasan_kmalloc+0xb7/0xc0 [ 15.962685] __kmalloc_cache_noprof+0x189/0x420 [ 15.962851] kasan_atomics+0x95/0x310 [ 15.962989] kunit_try_run_case+0x1a5/0x480 [ 15.963165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963448] kthread+0x337/0x6f0 [ 15.963742] ret_from_fork+0x116/0x1d0 [ 15.964096] ret_from_fork_asm+0x1a/0x30 [ 15.964432] [ 15.964510] The buggy address belongs to the object at ffff8881025adf00 [ 15.964510] which belongs to the cache kmalloc-64 of size 64 [ 15.964872] The buggy address is located 0 bytes to the right of [ 15.964872] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.965669] [ 15.965832] The buggy address belongs to the physical page: [ 15.966338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.966731] flags: 0x200000000000000(node=0|zone=2) [ 15.966899] page_type: f5(slab) [ 15.967022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.967593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.968302] page dumped because: kasan: bad access detected [ 15.968795] [ 15.968952] Memory state around the buggy address: [ 15.969431] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.970072] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.970788] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.971149] ^ [ 15.971575] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.972090] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.972412] ================================================================== [ 15.659138] ================================================================== [ 15.659464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.659871] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.660184] [ 15.660298] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.660351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.660364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.660386] Call Trace: [ 15.660401] <TASK> [ 15.660426] dump_stack_lvl+0x73/0xb0 [ 15.660455] print_report+0xd1/0x610 [ 15.660478] ? __virt_addr_valid+0x1db/0x2d0 [ 15.660511] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.660534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.660559] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.660593] kasan_report+0x141/0x180 [ 15.660616] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.660645] kasan_check_range+0x10c/0x1c0 [ 15.660679] __kasan_check_write+0x18/0x20 [ 15.660701] kasan_atomics_helper+0x7c7/0x5450 [ 15.660726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.660760] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.660787] ? kasan_atomics+0x152/0x310 [ 15.660825] kasan_atomics+0x1dc/0x310 [ 15.660850] ? __pfx_kasan_atomics+0x10/0x10 [ 15.660876] ? __pfx_read_tsc+0x10/0x10 [ 15.660899] ? ktime_get_ts64+0x86/0x230 [ 15.660934] kunit_try_run_case+0x1a5/0x480 [ 15.660960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.660985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.661020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.661048] ? __kthread_parkme+0x82/0x180 [ 15.661079] ? preempt_count_sub+0x50/0x80 [ 15.661104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.661138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.661202] kthread+0x337/0x6f0 [ 15.661232] ? trace_preempt_on+0x20/0xc0 [ 15.661258] ? __pfx_kthread+0x10/0x10 [ 15.661289] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.661312] ? calculate_sigpending+0x7b/0xa0 [ 15.661348] ? __pfx_kthread+0x10/0x10 [ 15.661370] ret_from_fork+0x116/0x1d0 [ 15.661390] ? __pfx_kthread+0x10/0x10 [ 15.661421] ret_from_fork_asm+0x1a/0x30 [ 15.661453] </TASK> [ 15.661464] [ 15.669899] Allocated by task 284: [ 15.670257] kasan_save_stack+0x45/0x70 [ 15.670469] kasan_save_track+0x18/0x40 [ 15.670686] kasan_save_alloc_info+0x3b/0x50 [ 15.670900] __kasan_kmalloc+0xb7/0xc0 [ 15.671098] __kmalloc_cache_noprof+0x189/0x420 [ 15.671331] kasan_atomics+0x95/0x310 [ 15.671481] kunit_try_run_case+0x1a5/0x480 [ 15.671654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.671936] kthread+0x337/0x6f0 [ 15.672135] ret_from_fork+0x116/0x1d0 [ 15.672335] ret_from_fork_asm+0x1a/0x30 [ 15.672520] [ 15.672595] The buggy address belongs to the object at ffff8881025adf00 [ 15.672595] which belongs to the cache kmalloc-64 of size 64 [ 15.673399] The buggy address is located 0 bytes to the right of [ 15.673399] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.674023] [ 15.674137] The buggy address belongs to the physical page: [ 15.674406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.674651] flags: 0x200000000000000(node=0|zone=2) [ 15.674820] page_type: f5(slab) [ 15.674980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.675361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.675810] page dumped because: kasan: bad access detected [ 15.676140] [ 15.676236] Memory state around the buggy address: [ 15.676537] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.676824] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.677173] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.677909] ^ [ 15.678139] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.678408] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.678726] ================================================================== [ 16.519141] ================================================================== [ 16.519417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.519998] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.520401] [ 16.520505] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.520549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.520563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.520584] Call Trace: [ 16.520600] <TASK> [ 16.520617] dump_stack_lvl+0x73/0xb0 [ 16.520648] print_report+0xd1/0x610 [ 16.520672] ? __virt_addr_valid+0x1db/0x2d0 [ 16.520696] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.520719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.520745] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.520769] kasan_report+0x141/0x180 [ 16.520794] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.520823] kasan_check_range+0x10c/0x1c0 [ 16.520848] __kasan_check_write+0x18/0x20 [ 16.520869] kasan_atomics_helper+0x1c18/0x5450 [ 16.520894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.520919] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.520946] ? kasan_atomics+0x152/0x310 [ 16.520974] kasan_atomics+0x1dc/0x310 [ 16.520998] ? __pfx_kasan_atomics+0x10/0x10 [ 16.521025] ? __pfx_read_tsc+0x10/0x10 [ 16.521047] ? ktime_get_ts64+0x86/0x230 [ 16.521083] kunit_try_run_case+0x1a5/0x480 [ 16.521110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.521134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.521159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.521185] ? __kthread_parkme+0x82/0x180 [ 16.521207] ? preempt_count_sub+0x50/0x80 [ 16.521232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.521258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.521285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.521312] kthread+0x337/0x6f0 [ 16.521333] ? trace_preempt_on+0x20/0xc0 [ 16.521357] ? __pfx_kthread+0x10/0x10 [ 16.521391] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.521414] ? calculate_sigpending+0x7b/0xa0 [ 16.521440] ? __pfx_kthread+0x10/0x10 [ 16.521464] ret_from_fork+0x116/0x1d0 [ 16.521484] ? __pfx_kthread+0x10/0x10 [ 16.521506] ret_from_fork_asm+0x1a/0x30 [ 16.521538] </TASK> [ 16.521550] [ 16.529044] Allocated by task 284: [ 16.529268] kasan_save_stack+0x45/0x70 [ 16.529414] kasan_save_track+0x18/0x40 [ 16.529553] kasan_save_alloc_info+0x3b/0x50 [ 16.529769] __kasan_kmalloc+0xb7/0xc0 [ 16.529960] __kmalloc_cache_noprof+0x189/0x420 [ 16.530261] kasan_atomics+0x95/0x310 [ 16.530420] kunit_try_run_case+0x1a5/0x480 [ 16.530609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.530812] kthread+0x337/0x6f0 [ 16.530987] ret_from_fork+0x116/0x1d0 [ 16.531211] ret_from_fork_asm+0x1a/0x30 [ 16.531389] [ 16.531491] The buggy address belongs to the object at ffff8881025adf00 [ 16.531491] which belongs to the cache kmalloc-64 of size 64 [ 16.531965] The buggy address is located 0 bytes to the right of [ 16.531965] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.532470] [ 16.532571] The buggy address belongs to the physical page: [ 16.532784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.533072] flags: 0x200000000000000(node=0|zone=2) [ 16.533305] page_type: f5(slab) [ 16.533471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.533782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.534049] page dumped because: kasan: bad access detected [ 16.534469] [ 16.534565] Memory state around the buggy address: [ 16.534806] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.535066] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.535479] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.535737] ^ [ 16.535938] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.536280] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.536540] ================================================================== [ 16.012291] ================================================================== [ 16.012774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 16.013546] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.014003] [ 16.014118] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.014395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.014412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.014433] Call Trace: [ 16.014450] <TASK> [ 16.014466] dump_stack_lvl+0x73/0xb0 [ 16.014499] print_report+0xd1/0x610 [ 16.014522] ? __virt_addr_valid+0x1db/0x2d0 [ 16.014546] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.014569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.014594] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.014619] kasan_report+0x141/0x180 [ 16.014642] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.014671] __asan_report_load4_noabort+0x18/0x20 [ 16.014698] kasan_atomics_helper+0x4a1c/0x5450 [ 16.014732] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.014756] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.014783] ? kasan_atomics+0x152/0x310 [ 16.014810] kasan_atomics+0x1dc/0x310 [ 16.014834] ? __pfx_kasan_atomics+0x10/0x10 [ 16.014860] ? __pfx_read_tsc+0x10/0x10 [ 16.014883] ? ktime_get_ts64+0x86/0x230 [ 16.014909] kunit_try_run_case+0x1a5/0x480 [ 16.014935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.014985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.015011] ? __kthread_parkme+0x82/0x180 [ 16.015032] ? preempt_count_sub+0x50/0x80 [ 16.015069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.015096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.015131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.015159] kthread+0x337/0x6f0 [ 16.015179] ? trace_preempt_on+0x20/0xc0 [ 16.015204] ? __pfx_kthread+0x10/0x10 [ 16.015226] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.015250] ? calculate_sigpending+0x7b/0xa0 [ 16.015275] ? __pfx_kthread+0x10/0x10 [ 16.015297] ret_from_fork+0x116/0x1d0 [ 16.015319] ? __pfx_kthread+0x10/0x10 [ 16.015341] ret_from_fork_asm+0x1a/0x30 [ 16.015373] </TASK> [ 16.015384] [ 16.025940] Allocated by task 284: [ 16.026488] kasan_save_stack+0x45/0x70 [ 16.026684] kasan_save_track+0x18/0x40 [ 16.026953] kasan_save_alloc_info+0x3b/0x50 [ 16.027343] __kasan_kmalloc+0xb7/0xc0 [ 16.027662] __kmalloc_cache_noprof+0x189/0x420 [ 16.027975] kasan_atomics+0x95/0x310 [ 16.028319] kunit_try_run_case+0x1a5/0x480 [ 16.028644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.028995] kthread+0x337/0x6f0 [ 16.029211] ret_from_fork+0x116/0x1d0 [ 16.029581] ret_from_fork_asm+0x1a/0x30 [ 16.029861] [ 16.030072] The buggy address belongs to the object at ffff8881025adf00 [ 16.030072] which belongs to the cache kmalloc-64 of size 64 [ 16.030738] The buggy address is located 0 bytes to the right of [ 16.030738] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.031403] [ 16.031496] The buggy address belongs to the physical page: [ 16.031735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.032095] flags: 0x200000000000000(node=0|zone=2) [ 16.032625] page_type: f5(slab) [ 16.032775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.033344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.033786] page dumped because: kasan: bad access detected [ 16.034149] [ 16.034273] Memory state around the buggy address: [ 16.034652] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.035084] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.035509] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.035908] ^ [ 16.036245] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.036520] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.036792] ================================================================== [ 16.213791] ================================================================== [ 16.214225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 16.214815] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.215261] [ 16.215398] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.215441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.215454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.215478] Call Trace: [ 16.215492] <TASK> [ 16.215517] dump_stack_lvl+0x73/0xb0 [ 16.215548] print_report+0xd1/0x610 [ 16.215572] ? __virt_addr_valid+0x1db/0x2d0 [ 16.215595] ? kasan_atomics_helper+0x1467/0x5450 [ 16.215618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.215643] ? kasan_atomics_helper+0x1467/0x5450 [ 16.215667] kasan_report+0x141/0x180 [ 16.215690] ? kasan_atomics_helper+0x1467/0x5450 [ 16.215748] kasan_check_range+0x10c/0x1c0 [ 16.215775] __kasan_check_write+0x18/0x20 [ 16.215797] kasan_atomics_helper+0x1467/0x5450 [ 16.215821] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.215846] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.215873] ? kasan_atomics+0x152/0x310 [ 16.216372] kasan_atomics+0x1dc/0x310 [ 16.216401] ? __pfx_kasan_atomics+0x10/0x10 [ 16.216430] ? __pfx_read_tsc+0x10/0x10 [ 16.216454] ? ktime_get_ts64+0x86/0x230 [ 16.216482] kunit_try_run_case+0x1a5/0x480 [ 16.216508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.216561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.216742] ? __kthread_parkme+0x82/0x180 [ 16.216767] ? preempt_count_sub+0x50/0x80 [ 16.216793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.216847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.216875] kthread+0x337/0x6f0 [ 16.216896] ? trace_preempt_on+0x20/0xc0 [ 16.216922] ? __pfx_kthread+0x10/0x10 [ 16.216945] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.216968] ? calculate_sigpending+0x7b/0xa0 [ 16.216994] ? __pfx_kthread+0x10/0x10 [ 16.217017] ret_from_fork+0x116/0x1d0 [ 16.217038] ? __pfx_kthread+0x10/0x10 [ 16.217073] ret_from_fork_asm+0x1a/0x30 [ 16.217105] </TASK> [ 16.217116] [ 16.224103] Allocated by task 284: [ 16.224333] kasan_save_stack+0x45/0x70 [ 16.224538] kasan_save_track+0x18/0x40 [ 16.224736] kasan_save_alloc_info+0x3b/0x50 [ 16.224995] __kasan_kmalloc+0xb7/0xc0 [ 16.225171] __kmalloc_cache_noprof+0x189/0x420 [ 16.225362] kasan_atomics+0x95/0x310 [ 16.225524] kunit_try_run_case+0x1a5/0x480 [ 16.225763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.226033] kthread+0x337/0x6f0 [ 16.226263] ret_from_fork+0x116/0x1d0 [ 16.226448] ret_from_fork_asm+0x1a/0x30 [ 16.226646] [ 16.226756] The buggy address belongs to the object at ffff8881025adf00 [ 16.226756] which belongs to the cache kmalloc-64 of size 64 [ 16.227366] The buggy address is located 0 bytes to the right of [ 16.227366] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.227814] [ 16.227887] The buggy address belongs to the physical page: [ 16.228106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.228477] flags: 0x200000000000000(node=0|zone=2) [ 16.228750] page_type: f5(slab) [ 16.228921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.229405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.229761] page dumped because: kasan: bad access detected [ 16.229970] [ 16.230041] Memory state around the buggy address: [ 16.230210] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.230421] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.230825] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.231398] ^ [ 16.231633] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.233161] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.234503] ================================================================== [ 15.740920] ================================================================== [ 15.742099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.742458] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.742690] [ 15.742788] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.742836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.742850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.742872] Call Trace: [ 15.742886] <TASK> [ 15.742903] dump_stack_lvl+0x73/0xb0 [ 15.742934] print_report+0xd1/0x610 [ 15.742958] ? __virt_addr_valid+0x1db/0x2d0 [ 15.742982] ? kasan_atomics_helper+0x992/0x5450 [ 15.743006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.743032] ? kasan_atomics_helper+0x992/0x5450 [ 15.743066] kasan_report+0x141/0x180 [ 15.743090] ? kasan_atomics_helper+0x992/0x5450 [ 15.743144] kasan_check_range+0x10c/0x1c0 [ 15.743170] __kasan_check_write+0x18/0x20 [ 15.743191] kasan_atomics_helper+0x992/0x5450 [ 15.743250] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.743275] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.743303] ? kasan_atomics+0x152/0x310 [ 15.743343] kasan_atomics+0x1dc/0x310 [ 15.743367] ? __pfx_kasan_atomics+0x10/0x10 [ 15.743394] ? __pfx_read_tsc+0x10/0x10 [ 15.743418] ? ktime_get_ts64+0x86/0x230 [ 15.743444] kunit_try_run_case+0x1a5/0x480 [ 15.743470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.743494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.743520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.743546] ? __kthread_parkme+0x82/0x180 [ 15.743567] ? preempt_count_sub+0x50/0x80 [ 15.743593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.743618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.743672] kthread+0x337/0x6f0 [ 15.743693] ? trace_preempt_on+0x20/0xc0 [ 15.743717] ? __pfx_kthread+0x10/0x10 [ 15.743739] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.743763] ? calculate_sigpending+0x7b/0xa0 [ 15.743789] ? __pfx_kthread+0x10/0x10 [ 15.743812] ret_from_fork+0x116/0x1d0 [ 15.743833] ? __pfx_kthread+0x10/0x10 [ 15.743855] ret_from_fork_asm+0x1a/0x30 [ 15.743888] </TASK> [ 15.743898] [ 15.756663] Allocated by task 284: [ 15.756930] kasan_save_stack+0x45/0x70 [ 15.757187] kasan_save_track+0x18/0x40 [ 15.757426] kasan_save_alloc_info+0x3b/0x50 [ 15.757660] __kasan_kmalloc+0xb7/0xc0 [ 15.757799] __kmalloc_cache_noprof+0x189/0x420 [ 15.758022] kasan_atomics+0x95/0x310 [ 15.758230] kunit_try_run_case+0x1a5/0x480 [ 15.758422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.758675] kthread+0x337/0x6f0 [ 15.758850] ret_from_fork+0x116/0x1d0 [ 15.759039] ret_from_fork_asm+0x1a/0x30 [ 15.759429] [ 15.759504] The buggy address belongs to the object at ffff8881025adf00 [ 15.759504] which belongs to the cache kmalloc-64 of size 64 [ 15.760210] The buggy address is located 0 bytes to the right of [ 15.760210] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.761339] [ 15.761537] The buggy address belongs to the physical page: [ 15.762063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.762589] flags: 0x200000000000000(node=0|zone=2) [ 15.762764] page_type: f5(slab) [ 15.762886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.763179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.763939] page dumped because: kasan: bad access detected [ 15.764459] [ 15.764617] Memory state around the buggy address: [ 15.765088] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.765751] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.766130] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.766787] ^ [ 15.767183] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.767408] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.767623] ================================================================== [ 16.397125] ================================================================== [ 16.397619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.398191] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.398875] [ 16.399085] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.399136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.399150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.399172] Call Trace: [ 16.399189] <TASK> [ 16.399292] dump_stack_lvl+0x73/0xb0 [ 16.399330] print_report+0xd1/0x610 [ 16.399354] ? __virt_addr_valid+0x1db/0x2d0 [ 16.399379] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.399402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.399428] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.399451] kasan_report+0x141/0x180 [ 16.399475] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.399503] kasan_check_range+0x10c/0x1c0 [ 16.399527] __kasan_check_write+0x18/0x20 [ 16.399549] kasan_atomics_helper+0x18b1/0x5450 [ 16.399574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.399599] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.399626] ? kasan_atomics+0x152/0x310 [ 16.399654] kasan_atomics+0x1dc/0x310 [ 16.399678] ? __pfx_kasan_atomics+0x10/0x10 [ 16.399704] ? __pfx_read_tsc+0x10/0x10 [ 16.399727] ? ktime_get_ts64+0x86/0x230 [ 16.399752] kunit_try_run_case+0x1a5/0x480 [ 16.399779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.399804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.399830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.399855] ? __kthread_parkme+0x82/0x180 [ 16.399878] ? preempt_count_sub+0x50/0x80 [ 16.399903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.399929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.399955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.399983] kthread+0x337/0x6f0 [ 16.400004] ? trace_preempt_on+0x20/0xc0 [ 16.400028] ? __pfx_kthread+0x10/0x10 [ 16.400064] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.400087] ? calculate_sigpending+0x7b/0xa0 [ 16.400113] ? __pfx_kthread+0x10/0x10 [ 16.400148] ret_from_fork+0x116/0x1d0 [ 16.400169] ? __pfx_kthread+0x10/0x10 [ 16.400191] ret_from_fork_asm+0x1a/0x30 [ 16.400223] </TASK> [ 16.400234] [ 16.410840] Allocated by task 284: [ 16.411007] kasan_save_stack+0x45/0x70 [ 16.411480] kasan_save_track+0x18/0x40 [ 16.411681] kasan_save_alloc_info+0x3b/0x50 [ 16.411997] __kasan_kmalloc+0xb7/0xc0 [ 16.412228] __kmalloc_cache_noprof+0x189/0x420 [ 16.412524] kasan_atomics+0x95/0x310 [ 16.412810] kunit_try_run_case+0x1a5/0x480 [ 16.413007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.413480] kthread+0x337/0x6f0 [ 16.413662] ret_from_fork+0x116/0x1d0 [ 16.413932] ret_from_fork_asm+0x1a/0x30 [ 16.414251] [ 16.414334] The buggy address belongs to the object at ffff8881025adf00 [ 16.414334] which belongs to the cache kmalloc-64 of size 64 [ 16.415046] The buggy address is located 0 bytes to the right of [ 16.415046] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.415738] [ 16.415835] The buggy address belongs to the physical page: [ 16.416244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.416583] flags: 0x200000000000000(node=0|zone=2) [ 16.416814] page_type: f5(slab) [ 16.416975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.417559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.417965] page dumped because: kasan: bad access detected [ 16.418326] [ 16.418432] Memory state around the buggy address: [ 16.418780] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.419230] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.419552] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.419854] ^ [ 16.420085] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.420645] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.421006] ================================================================== [ 15.844174] ================================================================== [ 15.844509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.844919] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.845208] [ 15.845295] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.845337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.845350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.845370] Call Trace: [ 15.845385] <TASK> [ 15.845401] dump_stack_lvl+0x73/0xb0 [ 15.845428] print_report+0xd1/0x610 [ 15.845452] ? __virt_addr_valid+0x1db/0x2d0 [ 15.845477] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.845500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.845525] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.845549] kasan_report+0x141/0x180 [ 15.845572] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.845601] __asan_report_load4_noabort+0x18/0x20 [ 15.845628] kasan_atomics_helper+0x4a84/0x5450 [ 15.845665] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.845690] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.845718] ? kasan_atomics+0x152/0x310 [ 15.845759] kasan_atomics+0x1dc/0x310 [ 15.845783] ? __pfx_kasan_atomics+0x10/0x10 [ 15.845810] ? __pfx_read_tsc+0x10/0x10 [ 15.845832] ? ktime_get_ts64+0x86/0x230 [ 15.845858] kunit_try_run_case+0x1a5/0x480 [ 15.845884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.845909] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.845935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.845961] ? __kthread_parkme+0x82/0x180 [ 15.845983] ? preempt_count_sub+0x50/0x80 [ 15.846008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.846041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.846083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.846129] kthread+0x337/0x6f0 [ 15.846150] ? trace_preempt_on+0x20/0xc0 [ 15.846176] ? __pfx_kthread+0x10/0x10 [ 15.846197] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.846221] ? calculate_sigpending+0x7b/0xa0 [ 15.846247] ? __pfx_kthread+0x10/0x10 [ 15.846270] ret_from_fork+0x116/0x1d0 [ 15.846290] ? __pfx_kthread+0x10/0x10 [ 15.846312] ret_from_fork_asm+0x1a/0x30 [ 15.846344] </TASK> [ 15.846354] [ 15.853887] Allocated by task 284: [ 15.854098] kasan_save_stack+0x45/0x70 [ 15.854342] kasan_save_track+0x18/0x40 [ 15.854522] kasan_save_alloc_info+0x3b/0x50 [ 15.854675] __kasan_kmalloc+0xb7/0xc0 [ 15.854870] __kmalloc_cache_noprof+0x189/0x420 [ 15.855136] kasan_atomics+0x95/0x310 [ 15.855319] kunit_try_run_case+0x1a5/0x480 [ 15.855509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.855749] kthread+0x337/0x6f0 [ 15.855901] ret_from_fork+0x116/0x1d0 [ 15.856132] ret_from_fork_asm+0x1a/0x30 [ 15.856353] [ 15.856456] The buggy address belongs to the object at ffff8881025adf00 [ 15.856456] which belongs to the cache kmalloc-64 of size 64 [ 15.856942] The buggy address is located 0 bytes to the right of [ 15.856942] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.857392] [ 15.857466] The buggy address belongs to the physical page: [ 15.857642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.857882] flags: 0x200000000000000(node=0|zone=2) [ 15.858173] page_type: f5(slab) [ 15.858342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.858680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.859015] page dumped because: kasan: bad access detected [ 15.859298] [ 15.859395] Memory state around the buggy address: [ 15.859618] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.859907] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.860199] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.860552] ^ [ 15.860815] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861125] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.861341] ================================================================== [ 15.789568] ================================================================== [ 15.789976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.790408] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.790790] [ 15.790917] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.790973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.790987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.791009] Call Trace: [ 15.791023] <TASK> [ 15.791064] dump_stack_lvl+0x73/0xb0 [ 15.791095] print_report+0xd1/0x610 [ 15.791126] ? __virt_addr_valid+0x1db/0x2d0 [ 15.791149] ? kasan_atomics_helper+0xac7/0x5450 [ 15.791172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.791198] ? kasan_atomics_helper+0xac7/0x5450 [ 15.791222] kasan_report+0x141/0x180 [ 15.791245] ? kasan_atomics_helper+0xac7/0x5450 [ 15.791273] kasan_check_range+0x10c/0x1c0 [ 15.791297] __kasan_check_write+0x18/0x20 [ 15.791319] kasan_atomics_helper+0xac7/0x5450 [ 15.791343] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.791368] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.791395] ? kasan_atomics+0x152/0x310 [ 15.791423] kasan_atomics+0x1dc/0x310 [ 15.791447] ? __pfx_kasan_atomics+0x10/0x10 [ 15.791473] ? __pfx_read_tsc+0x10/0x10 [ 15.791495] ? ktime_get_ts64+0x86/0x230 [ 15.791545] kunit_try_run_case+0x1a5/0x480 [ 15.791571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.791607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.791634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.791660] ? __kthread_parkme+0x82/0x180 [ 15.791682] ? preempt_count_sub+0x50/0x80 [ 15.791707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.791733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.791758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.791795] kthread+0x337/0x6f0 [ 15.791817] ? trace_preempt_on+0x20/0xc0 [ 15.791842] ? __pfx_kthread+0x10/0x10 [ 15.791863] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.791886] ? calculate_sigpending+0x7b/0xa0 [ 15.791912] ? __pfx_kthread+0x10/0x10 [ 15.791935] ret_from_fork+0x116/0x1d0 [ 15.791957] ? __pfx_kthread+0x10/0x10 [ 15.791979] ret_from_fork_asm+0x1a/0x30 [ 15.792019] </TASK> [ 15.792030] [ 15.799784] Allocated by task 284: [ 15.799966] kasan_save_stack+0x45/0x70 [ 15.800138] kasan_save_track+0x18/0x40 [ 15.800276] kasan_save_alloc_info+0x3b/0x50 [ 15.800475] __kasan_kmalloc+0xb7/0xc0 [ 15.800675] __kmalloc_cache_noprof+0x189/0x420 [ 15.800898] kasan_atomics+0x95/0x310 [ 15.801100] kunit_try_run_case+0x1a5/0x480 [ 15.801328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.801543] kthread+0x337/0x6f0 [ 15.801700] ret_from_fork+0x116/0x1d0 [ 15.801893] ret_from_fork_asm+0x1a/0x30 [ 15.802125] [ 15.802202] The buggy address belongs to the object at ffff8881025adf00 [ 15.802202] which belongs to the cache kmalloc-64 of size 64 [ 15.802558] The buggy address is located 0 bytes to the right of [ 15.802558] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.803158] [ 15.803256] The buggy address belongs to the physical page: [ 15.803509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.803867] flags: 0x200000000000000(node=0|zone=2) [ 15.804036] page_type: f5(slab) [ 15.804191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.804466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.804842] page dumped because: kasan: bad access detected [ 15.805158] [ 15.805255] Memory state around the buggy address: [ 15.805497] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.805768] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.806095] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.806427] ^ [ 15.806640] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.806864] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.807159] ================================================================== [ 15.512599] ================================================================== [ 15.512997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.513298] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.513528] [ 15.513611] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.513653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.513666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.513688] Call Trace: [ 15.513702] <TASK> [ 15.513718] dump_stack_lvl+0x73/0xb0 [ 15.513745] print_report+0xd1/0x610 [ 15.513770] ? __virt_addr_valid+0x1db/0x2d0 [ 15.513795] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.513819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.513844] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.513869] kasan_report+0x141/0x180 [ 15.513892] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.513921] __asan_report_store4_noabort+0x1b/0x30 [ 15.513949] kasan_atomics_helper+0x4b3a/0x5450 [ 15.513974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.513999] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.514026] ? kasan_atomics+0x152/0x310 [ 15.514065] kasan_atomics+0x1dc/0x310 [ 15.514091] ? __pfx_kasan_atomics+0x10/0x10 [ 15.514118] ? __pfx_read_tsc+0x10/0x10 [ 15.514140] ? ktime_get_ts64+0x86/0x230 [ 15.514165] kunit_try_run_case+0x1a5/0x480 [ 15.514191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514216] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.514241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.514268] ? __kthread_parkme+0x82/0x180 [ 15.514290] ? preempt_count_sub+0x50/0x80 [ 15.514315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.514369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.514396] kthread+0x337/0x6f0 [ 15.514417] ? trace_preempt_on+0x20/0xc0 [ 15.514456] ? __pfx_kthread+0x10/0x10 [ 15.514479] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.514511] ? calculate_sigpending+0x7b/0xa0 [ 15.514538] ? __pfx_kthread+0x10/0x10 [ 15.514561] ret_from_fork+0x116/0x1d0 [ 15.514582] ? __pfx_kthread+0x10/0x10 [ 15.514604] ret_from_fork_asm+0x1a/0x30 [ 15.514636] </TASK> [ 15.514648] [ 15.523354] Allocated by task 284: [ 15.523570] kasan_save_stack+0x45/0x70 [ 15.523717] kasan_save_track+0x18/0x40 [ 15.523857] kasan_save_alloc_info+0x3b/0x50 [ 15.524008] __kasan_kmalloc+0xb7/0xc0 [ 15.524153] __kmalloc_cache_noprof+0x189/0x420 [ 15.524313] kasan_atomics+0x95/0x310 [ 15.524558] kunit_try_run_case+0x1a5/0x480 [ 15.525013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.525303] kthread+0x337/0x6f0 [ 15.525597] ret_from_fork+0x116/0x1d0 [ 15.525862] ret_from_fork_asm+0x1a/0x30 [ 15.526074] [ 15.526173] The buggy address belongs to the object at ffff8881025adf00 [ 15.526173] which belongs to the cache kmalloc-64 of size 64 [ 15.526561] The buggy address is located 0 bytes to the right of [ 15.526561] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.526936] [ 15.527007] The buggy address belongs to the physical page: [ 15.527193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.527434] flags: 0x200000000000000(node=0|zone=2) [ 15.527955] page_type: f5(slab) [ 15.528315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.528664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.529324] page dumped because: kasan: bad access detected [ 15.529565] [ 15.530253] Memory state around the buggy address: [ 15.530485] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.531422] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.532236] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.532533] ^ [ 15.533373] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.533609] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.533836] ================================================================== [ 16.536980] ================================================================== [ 16.537313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.537626] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.537925] [ 16.538122] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.538168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.538180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.538201] Call Trace: [ 16.538215] <TASK> [ 16.538230] dump_stack_lvl+0x73/0xb0 [ 16.538259] print_report+0xd1/0x610 [ 16.538283] ? __virt_addr_valid+0x1db/0x2d0 [ 16.538307] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.538331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.538356] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.538380] kasan_report+0x141/0x180 [ 16.538404] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.538433] __asan_report_load8_noabort+0x18/0x20 [ 16.538459] kasan_atomics_helper+0x4f30/0x5450 [ 16.538484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.538509] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.538537] ? kasan_atomics+0x152/0x310 [ 16.538565] kasan_atomics+0x1dc/0x310 [ 16.538590] ? __pfx_kasan_atomics+0x10/0x10 [ 16.538615] ? __pfx_read_tsc+0x10/0x10 [ 16.538639] ? ktime_get_ts64+0x86/0x230 [ 16.538665] kunit_try_run_case+0x1a5/0x480 [ 16.538692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.538725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.538750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.538776] ? __kthread_parkme+0x82/0x180 [ 16.538798] ? preempt_count_sub+0x50/0x80 [ 16.538823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.538849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.538875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.538903] kthread+0x337/0x6f0 [ 16.538924] ? trace_preempt_on+0x20/0xc0 [ 16.538950] ? __pfx_kthread+0x10/0x10 [ 16.538972] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.538995] ? calculate_sigpending+0x7b/0xa0 [ 16.539020] ? __pfx_kthread+0x10/0x10 [ 16.539043] ret_from_fork+0x116/0x1d0 [ 16.539076] ? __pfx_kthread+0x10/0x10 [ 16.539099] ret_from_fork_asm+0x1a/0x30 [ 16.539131] </TASK> [ 16.539142] [ 16.546477] Allocated by task 284: [ 16.546660] kasan_save_stack+0x45/0x70 [ 16.546846] kasan_save_track+0x18/0x40 [ 16.547045] kasan_save_alloc_info+0x3b/0x50 [ 16.547268] __kasan_kmalloc+0xb7/0xc0 [ 16.547405] __kmalloc_cache_noprof+0x189/0x420 [ 16.547564] kasan_atomics+0x95/0x310 [ 16.547700] kunit_try_run_case+0x1a5/0x480 [ 16.547849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.548028] kthread+0x337/0x6f0 [ 16.548206] ret_from_fork+0x116/0x1d0 [ 16.548395] ret_from_fork_asm+0x1a/0x30 [ 16.548594] [ 16.548690] The buggy address belongs to the object at ffff8881025adf00 [ 16.548690] which belongs to the cache kmalloc-64 of size 64 [ 16.549236] The buggy address is located 0 bytes to the right of [ 16.549236] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.550011] [ 16.550106] The buggy address belongs to the physical page: [ 16.550281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.550521] flags: 0x200000000000000(node=0|zone=2) [ 16.550685] page_type: f5(slab) [ 16.550812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.551533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.551870] page dumped because: kasan: bad access detected [ 16.552129] [ 16.552230] Memory state around the buggy address: [ 16.552451] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.552735] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.552996] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.553297] ^ [ 16.553522] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.553829] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.554085] ================================================================== [ 15.444181] ================================================================== [ 15.444431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.444811] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.445667] [ 15.445940] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.446075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.446092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.446115] Call Trace: [ 15.446139] <TASK> [ 15.446155] dump_stack_lvl+0x73/0xb0 [ 15.446188] print_report+0xd1/0x610 [ 15.446212] ? __virt_addr_valid+0x1db/0x2d0 [ 15.446237] ? kasan_atomics_helper+0x3df/0x5450 [ 15.446260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.446285] ? kasan_atomics_helper+0x3df/0x5450 [ 15.446309] kasan_report+0x141/0x180 [ 15.446332] ? kasan_atomics_helper+0x3df/0x5450 [ 15.446360] kasan_check_range+0x10c/0x1c0 [ 15.446385] __kasan_check_read+0x15/0x20 [ 15.446405] kasan_atomics_helper+0x3df/0x5450 [ 15.446430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.446454] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.446480] ? kasan_atomics+0x152/0x310 [ 15.446508] kasan_atomics+0x1dc/0x310 [ 15.446532] ? __pfx_kasan_atomics+0x10/0x10 [ 15.446559] ? __pfx_read_tsc+0x10/0x10 [ 15.446581] ? ktime_get_ts64+0x86/0x230 [ 15.446608] kunit_try_run_case+0x1a5/0x480 [ 15.446633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.446678] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.446707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.446733] ? __kthread_parkme+0x82/0x180 [ 15.446754] ? preempt_count_sub+0x50/0x80 [ 15.446779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.446805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.446831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.446859] kthread+0x337/0x6f0 [ 15.446879] ? trace_preempt_on+0x20/0xc0 [ 15.446905] ? __pfx_kthread+0x10/0x10 [ 15.446927] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.446950] ? calculate_sigpending+0x7b/0xa0 [ 15.446976] ? __pfx_kthread+0x10/0x10 [ 15.446999] ret_from_fork+0x116/0x1d0 [ 15.447019] ? __pfx_kthread+0x10/0x10 [ 15.447041] ret_from_fork_asm+0x1a/0x30 [ 15.447084] </TASK> [ 15.447096] [ 15.458871] Allocated by task 284: [ 15.459061] kasan_save_stack+0x45/0x70 [ 15.459359] kasan_save_track+0x18/0x40 [ 15.459784] kasan_save_alloc_info+0x3b/0x50 [ 15.460255] __kasan_kmalloc+0xb7/0xc0 [ 15.460416] __kmalloc_cache_noprof+0x189/0x420 [ 15.460785] kasan_atomics+0x95/0x310 [ 15.461071] kunit_try_run_case+0x1a5/0x480 [ 15.461244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.461585] kthread+0x337/0x6f0 [ 15.461840] ret_from_fork+0x116/0x1d0 [ 15.462201] ret_from_fork_asm+0x1a/0x30 [ 15.462412] [ 15.462662] The buggy address belongs to the object at ffff8881025adf00 [ 15.462662] which belongs to the cache kmalloc-64 of size 64 [ 15.463324] The buggy address is located 0 bytes to the right of [ 15.463324] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.464047] [ 15.464405] The buggy address belongs to the physical page: [ 15.464656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.465070] flags: 0x200000000000000(node=0|zone=2) [ 15.465325] page_type: f5(slab) [ 15.465635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.466073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.466555] page dumped because: kasan: bad access detected [ 15.466892] [ 15.466995] Memory state around the buggy address: [ 15.467381] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.467738] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.467967] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.468399] ^ [ 15.468826] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.469093] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.469578] ================================================================== [ 15.567837] ================================================================== [ 15.568572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.569323] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.570018] [ 15.570257] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.570302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.570316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.570339] Call Trace: [ 15.570354] <TASK> [ 15.570370] dump_stack_lvl+0x73/0xb0 [ 15.570400] print_report+0xd1/0x610 [ 15.570423] ? __virt_addr_valid+0x1db/0x2d0 [ 15.570447] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.570481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.570506] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.570530] kasan_report+0x141/0x180 [ 15.570565] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.570594] kasan_check_range+0x10c/0x1c0 [ 15.570620] __kasan_check_write+0x18/0x20 [ 15.570658] kasan_atomics_helper+0x5fe/0x5450 [ 15.570701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.570731] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.570759] ? kasan_atomics+0x152/0x310 [ 15.570787] kasan_atomics+0x1dc/0x310 [ 15.570812] ? __pfx_kasan_atomics+0x10/0x10 [ 15.570838] ? __pfx_read_tsc+0x10/0x10 [ 15.570861] ? ktime_get_ts64+0x86/0x230 [ 15.570886] kunit_try_run_case+0x1a5/0x480 [ 15.570913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.570938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.570963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.570989] ? __kthread_parkme+0x82/0x180 [ 15.571011] ? preempt_count_sub+0x50/0x80 [ 15.571036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.571072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.571098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.571134] kthread+0x337/0x6f0 [ 15.571154] ? trace_preempt_on+0x20/0xc0 [ 15.571178] ? __pfx_kthread+0x10/0x10 [ 15.571202] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.571225] ? calculate_sigpending+0x7b/0xa0 [ 15.571251] ? __pfx_kthread+0x10/0x10 [ 15.571273] ret_from_fork+0x116/0x1d0 [ 15.571293] ? __pfx_kthread+0x10/0x10 [ 15.571316] ret_from_fork_asm+0x1a/0x30 [ 15.571348] </TASK> [ 15.571359] [ 15.586205] Allocated by task 284: [ 15.586605] kasan_save_stack+0x45/0x70 [ 15.586940] kasan_save_track+0x18/0x40 [ 15.587341] kasan_save_alloc_info+0x3b/0x50 [ 15.587512] __kasan_kmalloc+0xb7/0xc0 [ 15.587826] __kmalloc_cache_noprof+0x189/0x420 [ 15.588265] kasan_atomics+0x95/0x310 [ 15.588732] kunit_try_run_case+0x1a5/0x480 [ 15.589096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.589545] kthread+0x337/0x6f0 [ 15.589687] ret_from_fork+0x116/0x1d0 [ 15.589864] ret_from_fork_asm+0x1a/0x30 [ 15.590300] [ 15.590487] The buggy address belongs to the object at ffff8881025adf00 [ 15.590487] which belongs to the cache kmalloc-64 of size 64 [ 15.591875] The buggy address is located 0 bytes to the right of [ 15.591875] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.592455] [ 15.592568] The buggy address belongs to the physical page: [ 15.592970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.593687] flags: 0x200000000000000(node=0|zone=2) [ 15.594233] page_type: f5(slab) [ 15.594423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.595090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.595888] page dumped because: kasan: bad access detected [ 15.596101] [ 15.596285] Memory state around the buggy address: [ 15.596811] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.597516] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.598154] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.598597] ^ [ 15.599065] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.599481] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.599719] ================================================================== [ 15.991742] ================================================================== [ 15.992097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.992402] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.992648] [ 15.992869] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.992915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.992928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.992951] Call Trace: [ 15.992966] <TASK> [ 15.992982] dump_stack_lvl+0x73/0xb0 [ 15.993012] print_report+0xd1/0x610 [ 15.993035] ? __virt_addr_valid+0x1db/0x2d0 [ 15.993071] ? kasan_atomics_helper+0x1079/0x5450 [ 15.993094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.993120] ? kasan_atomics_helper+0x1079/0x5450 [ 15.993152] kasan_report+0x141/0x180 [ 15.993175] ? kasan_atomics_helper+0x1079/0x5450 [ 15.993204] kasan_check_range+0x10c/0x1c0 [ 15.993230] __kasan_check_write+0x18/0x20 [ 15.993252] kasan_atomics_helper+0x1079/0x5450 [ 15.993276] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.993301] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.993328] ? kasan_atomics+0x152/0x310 [ 15.993356] kasan_atomics+0x1dc/0x310 [ 15.993380] ? __pfx_kasan_atomics+0x10/0x10 [ 15.993406] ? __pfx_read_tsc+0x10/0x10 [ 15.993429] ? ktime_get_ts64+0x86/0x230 [ 15.993454] kunit_try_run_case+0x1a5/0x480 [ 15.993481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.993534] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.993562] ? __kthread_parkme+0x82/0x180 [ 15.993584] ? preempt_count_sub+0x50/0x80 [ 15.993609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.993661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.993689] kthread+0x337/0x6f0 [ 15.993709] ? trace_preempt_on+0x20/0xc0 [ 15.993734] ? __pfx_kthread+0x10/0x10 [ 15.993756] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.993780] ? calculate_sigpending+0x7b/0xa0 [ 15.993807] ? __pfx_kthread+0x10/0x10 [ 15.993830] ret_from_fork+0x116/0x1d0 [ 15.993851] ? __pfx_kthread+0x10/0x10 [ 15.993872] ret_from_fork_asm+0x1a/0x30 [ 15.993905] </TASK> [ 15.993916] [ 16.001499] Allocated by task 284: [ 16.001682] kasan_save_stack+0x45/0x70 [ 16.001889] kasan_save_track+0x18/0x40 [ 16.002094] kasan_save_alloc_info+0x3b/0x50 [ 16.002257] __kasan_kmalloc+0xb7/0xc0 [ 16.002427] __kmalloc_cache_noprof+0x189/0x420 [ 16.002652] kasan_atomics+0x95/0x310 [ 16.002844] kunit_try_run_case+0x1a5/0x480 [ 16.003036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.003290] kthread+0x337/0x6f0 [ 16.003448] ret_from_fork+0x116/0x1d0 [ 16.003643] ret_from_fork_asm+0x1a/0x30 [ 16.003830] [ 16.003903] The buggy address belongs to the object at ffff8881025adf00 [ 16.003903] which belongs to the cache kmalloc-64 of size 64 [ 16.004271] The buggy address is located 0 bytes to the right of [ 16.004271] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.004899] [ 16.004996] The buggy address belongs to the physical page: [ 16.005260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.005743] flags: 0x200000000000000(node=0|zone=2) [ 16.005978] page_type: f5(slab) [ 16.006115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.006430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.006692] page dumped because: kasan: bad access detected [ 16.006869] [ 16.006940] Memory state around the buggy address: [ 16.007156] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.007484] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.007806] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.008139] ^ [ 16.008337] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.008627] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.008922] ================================================================== [ 16.136434] ================================================================== [ 16.137143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 16.137540] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.137852] [ 16.137956] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.138001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.138014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.138036] Call Trace: [ 16.138062] <TASK> [ 16.138079] dump_stack_lvl+0x73/0xb0 [ 16.138109] print_report+0xd1/0x610 [ 16.138157] ? __virt_addr_valid+0x1db/0x2d0 [ 16.138181] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.138204] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.138230] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.138255] kasan_report+0x141/0x180 [ 16.138278] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.138306] kasan_check_range+0x10c/0x1c0 [ 16.138343] __kasan_check_write+0x18/0x20 [ 16.138365] kasan_atomics_helper+0x12e6/0x5450 [ 16.138390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.138414] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.138441] ? kasan_atomics+0x152/0x310 [ 16.138468] kasan_atomics+0x1dc/0x310 [ 16.138492] ? __pfx_kasan_atomics+0x10/0x10 [ 16.138519] ? __pfx_read_tsc+0x10/0x10 [ 16.138542] ? ktime_get_ts64+0x86/0x230 [ 16.138568] kunit_try_run_case+0x1a5/0x480 [ 16.138594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.138619] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.138645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.138671] ? __kthread_parkme+0x82/0x180 [ 16.138693] ? preempt_count_sub+0x50/0x80 [ 16.138723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.138750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.138776] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.138804] kthread+0x337/0x6f0 [ 16.138824] ? trace_preempt_on+0x20/0xc0 [ 16.138849] ? __pfx_kthread+0x10/0x10 [ 16.138870] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.138894] ? calculate_sigpending+0x7b/0xa0 [ 16.138920] ? __pfx_kthread+0x10/0x10 [ 16.138943] ret_from_fork+0x116/0x1d0 [ 16.138963] ? __pfx_kthread+0x10/0x10 [ 16.138986] ret_from_fork_asm+0x1a/0x30 [ 16.139017] </TASK> [ 16.139028] [ 16.146782] Allocated by task 284: [ 16.146986] kasan_save_stack+0x45/0x70 [ 16.147199] kasan_save_track+0x18/0x40 [ 16.147369] kasan_save_alloc_info+0x3b/0x50 [ 16.147630] __kasan_kmalloc+0xb7/0xc0 [ 16.147781] __kmalloc_cache_noprof+0x189/0x420 [ 16.148088] kasan_atomics+0x95/0x310 [ 16.148294] kunit_try_run_case+0x1a5/0x480 [ 16.148491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.148714] kthread+0x337/0x6f0 [ 16.148838] ret_from_fork+0x116/0x1d0 [ 16.148978] ret_from_fork_asm+0x1a/0x30 [ 16.149185] [ 16.149285] The buggy address belongs to the object at ffff8881025adf00 [ 16.149285] which belongs to the cache kmalloc-64 of size 64 [ 16.149807] The buggy address is located 0 bytes to the right of [ 16.149807] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.150364] [ 16.150465] The buggy address belongs to the physical page: [ 16.150742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.151111] flags: 0x200000000000000(node=0|zone=2) [ 16.151356] page_type: f5(slab) [ 16.151483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.151854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.152095] page dumped because: kasan: bad access detected [ 16.152292] [ 16.152389] Memory state around the buggy address: [ 16.152616] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.153072] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.153404] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.153620] ^ [ 16.153848] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.154290] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.154595] ================================================================== [ 16.329026] ================================================================== [ 16.329289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.330035] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.330487] [ 16.330610] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.330656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.330669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.330690] Call Trace: [ 16.330711] <TASK> [ 16.330727] dump_stack_lvl+0x73/0xb0 [ 16.330758] print_report+0xd1/0x610 [ 16.330782] ? __virt_addr_valid+0x1db/0x2d0 [ 16.330807] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.330830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.330855] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.330879] kasan_report+0x141/0x180 [ 16.330902] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.330930] kasan_check_range+0x10c/0x1c0 [ 16.330956] __kasan_check_write+0x18/0x20 [ 16.330977] kasan_atomics_helper+0x16e7/0x5450 [ 16.331002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.331025] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.331065] ? kasan_atomics+0x152/0x310 [ 16.331093] kasan_atomics+0x1dc/0x310 [ 16.331117] ? __pfx_kasan_atomics+0x10/0x10 [ 16.331159] ? __pfx_read_tsc+0x10/0x10 [ 16.331182] ? ktime_get_ts64+0x86/0x230 [ 16.331208] kunit_try_run_case+0x1a5/0x480 [ 16.331235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.331260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.331286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.331311] ? __kthread_parkme+0x82/0x180 [ 16.331333] ? preempt_count_sub+0x50/0x80 [ 16.331359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.331385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.331412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.331439] kthread+0x337/0x6f0 [ 16.331460] ? trace_preempt_on+0x20/0xc0 [ 16.331485] ? __pfx_kthread+0x10/0x10 [ 16.331508] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.331531] ? calculate_sigpending+0x7b/0xa0 [ 16.331557] ? __pfx_kthread+0x10/0x10 [ 16.331580] ret_from_fork+0x116/0x1d0 [ 16.331601] ? __pfx_kthread+0x10/0x10 [ 16.331624] ret_from_fork_asm+0x1a/0x30 [ 16.331656] </TASK> [ 16.331667] [ 16.339015] Allocated by task 284: [ 16.339159] kasan_save_stack+0x45/0x70 [ 16.339338] kasan_save_track+0x18/0x40 [ 16.339536] kasan_save_alloc_info+0x3b/0x50 [ 16.339746] __kasan_kmalloc+0xb7/0xc0 [ 16.339916] __kmalloc_cache_noprof+0x189/0x420 [ 16.340083] kasan_atomics+0x95/0x310 [ 16.340216] kunit_try_run_case+0x1a5/0x480 [ 16.340622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.340878] kthread+0x337/0x6f0 [ 16.341049] ret_from_fork+0x116/0x1d0 [ 16.341246] ret_from_fork_asm+0x1a/0x30 [ 16.341420] [ 16.341493] The buggy address belongs to the object at ffff8881025adf00 [ 16.341493] which belongs to the cache kmalloc-64 of size 64 [ 16.341985] The buggy address is located 0 bytes to the right of [ 16.341985] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.342513] [ 16.342612] The buggy address belongs to the physical page: [ 16.342834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.343194] flags: 0x200000000000000(node=0|zone=2) [ 16.343393] page_type: f5(slab) [ 16.343540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.343766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.343988] page dumped because: kasan: bad access detected [ 16.344228] [ 16.344326] Memory state around the buggy address: [ 16.344555] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.344867] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.345270] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.345542] ^ [ 16.345696] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.345910] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.346388] ================================================================== [ 15.826061] ================================================================== [ 15.826411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.826767] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.827097] [ 15.827230] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.827285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.827298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.827321] Call Trace: [ 15.827348] <TASK> [ 15.827363] dump_stack_lvl+0x73/0xb0 [ 15.827392] print_report+0xd1/0x610 [ 15.827425] ? __virt_addr_valid+0x1db/0x2d0 [ 15.827449] ? kasan_atomics_helper+0xc70/0x5450 [ 15.827472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.827507] ? kasan_atomics_helper+0xc70/0x5450 [ 15.827531] kasan_report+0x141/0x180 [ 15.827555] ? kasan_atomics_helper+0xc70/0x5450 [ 15.827592] kasan_check_range+0x10c/0x1c0 [ 15.827618] __kasan_check_write+0x18/0x20 [ 15.827651] kasan_atomics_helper+0xc70/0x5450 [ 15.827676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.827701] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.827728] ? kasan_atomics+0x152/0x310 [ 15.827756] kasan_atomics+0x1dc/0x310 [ 15.827780] ? __pfx_kasan_atomics+0x10/0x10 [ 15.827807] ? __pfx_read_tsc+0x10/0x10 [ 15.827829] ? ktime_get_ts64+0x86/0x230 [ 15.827856] kunit_try_run_case+0x1a5/0x480 [ 15.827883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.827908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.827934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.827959] ? __kthread_parkme+0x82/0x180 [ 15.827980] ? preempt_count_sub+0x50/0x80 [ 15.828005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.828031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.828067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.828095] kthread+0x337/0x6f0 [ 15.828135] ? trace_preempt_on+0x20/0xc0 [ 15.828159] ? __pfx_kthread+0x10/0x10 [ 15.828182] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.828205] ? calculate_sigpending+0x7b/0xa0 [ 15.828232] ? __pfx_kthread+0x10/0x10 [ 15.828263] ret_from_fork+0x116/0x1d0 [ 15.828284] ? __pfx_kthread+0x10/0x10 [ 15.828306] ret_from_fork_asm+0x1a/0x30 [ 15.828350] </TASK> [ 15.828361] [ 15.835985] Allocated by task 284: [ 15.836149] kasan_save_stack+0x45/0x70 [ 15.836297] kasan_save_track+0x18/0x40 [ 15.836437] kasan_save_alloc_info+0x3b/0x50 [ 15.836588] __kasan_kmalloc+0xb7/0xc0 [ 15.836774] __kmalloc_cache_noprof+0x189/0x420 [ 15.837029] kasan_atomics+0x95/0x310 [ 15.837275] kunit_try_run_case+0x1a5/0x480 [ 15.837524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.837792] kthread+0x337/0x6f0 [ 15.837961] ret_from_fork+0x116/0x1d0 [ 15.838194] ret_from_fork_asm+0x1a/0x30 [ 15.838424] [ 15.838521] The buggy address belongs to the object at ffff8881025adf00 [ 15.838521] which belongs to the cache kmalloc-64 of size 64 [ 15.839027] The buggy address is located 0 bytes to the right of [ 15.839027] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.839601] [ 15.839702] The buggy address belongs to the physical page: [ 15.839942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.840322] flags: 0x200000000000000(node=0|zone=2) [ 15.840577] page_type: f5(slab) [ 15.840748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.841092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.841446] page dumped because: kasan: bad access detected [ 15.841695] [ 15.841791] Memory state around the buggy address: [ 15.842009] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.842377] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.842691] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.842910] ^ [ 15.843074] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.843317] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.843661] ================================================================== [ 16.469162] ================================================================== [ 16.469603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.469955] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.470307] [ 16.470395] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.470437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.470450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.470472] Call Trace: [ 16.470486] <TASK> [ 16.470501] dump_stack_lvl+0x73/0xb0 [ 16.470531] print_report+0xd1/0x610 [ 16.470555] ? __virt_addr_valid+0x1db/0x2d0 [ 16.470591] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.470615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.470640] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.470675] kasan_report+0x141/0x180 [ 16.470699] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.470731] kasan_check_range+0x10c/0x1c0 [ 16.470757] __kasan_check_write+0x18/0x20 [ 16.470779] kasan_atomics_helper+0x1a7f/0x5450 [ 16.470804] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.470828] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.470854] ? kasan_atomics+0x152/0x310 [ 16.470882] kasan_atomics+0x1dc/0x310 [ 16.470906] ? __pfx_kasan_atomics+0x10/0x10 [ 16.470932] ? __pfx_read_tsc+0x10/0x10 [ 16.470955] ? ktime_get_ts64+0x86/0x230 [ 16.470981] kunit_try_run_case+0x1a5/0x480 [ 16.471007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.471032] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.471076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.471102] ? __kthread_parkme+0x82/0x180 [ 16.471145] ? preempt_count_sub+0x50/0x80 [ 16.471170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.471197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.471224] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.471261] kthread+0x337/0x6f0 [ 16.471281] ? trace_preempt_on+0x20/0xc0 [ 16.471306] ? __pfx_kthread+0x10/0x10 [ 16.471338] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.471362] ? calculate_sigpending+0x7b/0xa0 [ 16.471387] ? __pfx_kthread+0x10/0x10 [ 16.471419] ret_from_fork+0x116/0x1d0 [ 16.471440] ? __pfx_kthread+0x10/0x10 [ 16.471461] ret_from_fork_asm+0x1a/0x30 [ 16.471504] </TASK> [ 16.471515] [ 16.485384] Allocated by task 284: [ 16.485590] kasan_save_stack+0x45/0x70 [ 16.485778] kasan_save_track+0x18/0x40 [ 16.485977] kasan_save_alloc_info+0x3b/0x50 [ 16.486501] __kasan_kmalloc+0xb7/0xc0 [ 16.486699] __kmalloc_cache_noprof+0x189/0x420 [ 16.487026] kasan_atomics+0x95/0x310 [ 16.487249] kunit_try_run_case+0x1a5/0x480 [ 16.487618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.487954] kthread+0x337/0x6f0 [ 16.488116] ret_from_fork+0x116/0x1d0 [ 16.488461] ret_from_fork_asm+0x1a/0x30 [ 16.488667] [ 16.488749] The buggy address belongs to the object at ffff8881025adf00 [ 16.488749] which belongs to the cache kmalloc-64 of size 64 [ 16.489258] The buggy address is located 0 bytes to the right of [ 16.489258] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.490136] [ 16.490309] The buggy address belongs to the physical page: [ 16.490678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.491001] flags: 0x200000000000000(node=0|zone=2) [ 16.491443] page_type: f5(slab) [ 16.491618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.492038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.492399] page dumped because: kasan: bad access detected [ 16.492639] [ 16.492718] Memory state around the buggy address: [ 16.492936] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.493529] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.493902] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.494301] ^ [ 16.494518] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.494953] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.495384] ================================================================== [ 16.112584] ================================================================== [ 16.112976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 16.113254] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.114062] [ 16.114181] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.114227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.114240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.114261] Call Trace: [ 16.114276] <TASK> [ 16.114293] dump_stack_lvl+0x73/0xb0 [ 16.114324] print_report+0xd1/0x610 [ 16.114348] ? __virt_addr_valid+0x1db/0x2d0 [ 16.114372] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.114395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.114422] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.114446] kasan_report+0x141/0x180 [ 16.114483] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.114512] __asan_report_load4_noabort+0x18/0x20 [ 16.114539] kasan_atomics_helper+0x49e8/0x5450 [ 16.114564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.114589] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.114615] ? kasan_atomics+0x152/0x310 [ 16.114644] kasan_atomics+0x1dc/0x310 [ 16.114668] ? __pfx_kasan_atomics+0x10/0x10 [ 16.114694] ? __pfx_read_tsc+0x10/0x10 [ 16.114946] ? ktime_get_ts64+0x86/0x230 [ 16.114975] kunit_try_run_case+0x1a5/0x480 [ 16.115002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.115027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.115066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.115092] ? __kthread_parkme+0x82/0x180 [ 16.115113] ? preempt_count_sub+0x50/0x80 [ 16.115153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.115179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.115205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.115233] kthread+0x337/0x6f0 [ 16.115254] ? trace_preempt_on+0x20/0xc0 [ 16.115279] ? __pfx_kthread+0x10/0x10 [ 16.115302] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.115326] ? calculate_sigpending+0x7b/0xa0 [ 16.115351] ? __pfx_kthread+0x10/0x10 [ 16.115374] ret_from_fork+0x116/0x1d0 [ 16.115394] ? __pfx_kthread+0x10/0x10 [ 16.115417] ret_from_fork_asm+0x1a/0x30 [ 16.115449] </TASK> [ 16.115459] [ 16.125592] Allocated by task 284: [ 16.125771] kasan_save_stack+0x45/0x70 [ 16.126102] kasan_save_track+0x18/0x40 [ 16.126467] kasan_save_alloc_info+0x3b/0x50 [ 16.126677] __kasan_kmalloc+0xb7/0xc0 [ 16.126946] __kmalloc_cache_noprof+0x189/0x420 [ 16.127354] kasan_atomics+0x95/0x310 [ 16.127544] kunit_try_run_case+0x1a5/0x480 [ 16.127769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.127975] kthread+0x337/0x6f0 [ 16.128332] ret_from_fork+0x116/0x1d0 [ 16.128631] ret_from_fork_asm+0x1a/0x30 [ 16.128857] [ 16.128945] The buggy address belongs to the object at ffff8881025adf00 [ 16.128945] which belongs to the cache kmalloc-64 of size 64 [ 16.129674] The buggy address is located 0 bytes to the right of [ 16.129674] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.130386] [ 16.130479] The buggy address belongs to the physical page: [ 16.130854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.131303] flags: 0x200000000000000(node=0|zone=2) [ 16.131611] page_type: f5(slab) [ 16.131862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.132308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.132698] page dumped because: kasan: bad access detected [ 16.132996] [ 16.133089] Memory state around the buggy address: [ 16.133413] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.133834] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.134251] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.134653] ^ [ 16.134939] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.135223] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.135707] ================================================================== [ 16.684887] ================================================================== [ 16.685457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.685849] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.686273] [ 16.686379] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.686423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.686436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.686457] Call Trace: [ 16.686472] <TASK> [ 16.686488] dump_stack_lvl+0x73/0xb0 [ 16.686517] print_report+0xd1/0x610 [ 16.686540] ? __virt_addr_valid+0x1db/0x2d0 [ 16.686564] ? kasan_atomics_helper+0x2006/0x5450 [ 16.686587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.686612] ? kasan_atomics_helper+0x2006/0x5450 [ 16.686635] kasan_report+0x141/0x180 [ 16.686658] ? kasan_atomics_helper+0x2006/0x5450 [ 16.686687] kasan_check_range+0x10c/0x1c0 [ 16.686719] __kasan_check_write+0x18/0x20 [ 16.686741] kasan_atomics_helper+0x2006/0x5450 [ 16.686765] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.686791] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.686817] ? kasan_atomics+0x152/0x310 [ 16.686846] kasan_atomics+0x1dc/0x310 [ 16.686870] ? __pfx_kasan_atomics+0x10/0x10 [ 16.686896] ? __pfx_read_tsc+0x10/0x10 [ 16.686918] ? ktime_get_ts64+0x86/0x230 [ 16.686944] kunit_try_run_case+0x1a5/0x480 [ 16.686970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.686994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.687020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.687045] ? __kthread_parkme+0x82/0x180 [ 16.687130] ? preempt_count_sub+0x50/0x80 [ 16.687158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.687184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.687211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.687238] kthread+0x337/0x6f0 [ 16.687260] ? trace_preempt_on+0x20/0xc0 [ 16.687285] ? __pfx_kthread+0x10/0x10 [ 16.687308] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.687331] ? calculate_sigpending+0x7b/0xa0 [ 16.687357] ? __pfx_kthread+0x10/0x10 [ 16.687380] ret_from_fork+0x116/0x1d0 [ 16.687401] ? __pfx_kthread+0x10/0x10 [ 16.687423] ret_from_fork_asm+0x1a/0x30 [ 16.687455] </TASK> [ 16.687466] [ 16.695490] Allocated by task 284: [ 16.695715] kasan_save_stack+0x45/0x70 [ 16.696001] kasan_save_track+0x18/0x40 [ 16.696225] kasan_save_alloc_info+0x3b/0x50 [ 16.696442] __kasan_kmalloc+0xb7/0xc0 [ 16.696613] __kmalloc_cache_noprof+0x189/0x420 [ 16.696775] kasan_atomics+0x95/0x310 [ 16.697015] kunit_try_run_case+0x1a5/0x480 [ 16.697336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.697587] kthread+0x337/0x6f0 [ 16.697712] ret_from_fork+0x116/0x1d0 [ 16.697905] ret_from_fork_asm+0x1a/0x30 [ 16.698182] [ 16.698285] The buggy address belongs to the object at ffff8881025adf00 [ 16.698285] which belongs to the cache kmalloc-64 of size 64 [ 16.698769] The buggy address is located 0 bytes to the right of [ 16.698769] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.699307] [ 16.699385] The buggy address belongs to the physical page: [ 16.699629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.700007] flags: 0x200000000000000(node=0|zone=2) [ 16.700332] page_type: f5(slab) [ 16.700583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.700927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.701192] page dumped because: kasan: bad access detected [ 16.701452] [ 16.701594] Memory state around the buggy address: [ 16.701825] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.702208] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.702484] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.702860] ^ [ 16.703128] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.703373] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.703738] ================================================================== [ 15.335232] ================================================================== [ 15.336044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.336554] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.336867] [ 15.336980] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.337027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.337039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.337226] Call Trace: [ 15.337239] <TASK> [ 15.337268] dump_stack_lvl+0x73/0xb0 [ 15.337302] print_report+0xd1/0x610 [ 15.337325] ? __virt_addr_valid+0x1db/0x2d0 [ 15.337350] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.337373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.337396] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.337419] kasan_report+0x141/0x180 [ 15.337442] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.337468] __asan_report_load4_noabort+0x18/0x20 [ 15.337494] kasan_atomics_helper+0x4bbc/0x5450 [ 15.337519] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.337544] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.337571] ? kasan_atomics+0x152/0x310 [ 15.337599] kasan_atomics+0x1dc/0x310 [ 15.337621] ? __pfx_kasan_atomics+0x10/0x10 [ 15.337798] ? __pfx_read_tsc+0x10/0x10 [ 15.337822] ? ktime_get_ts64+0x86/0x230 [ 15.337847] kunit_try_run_case+0x1a5/0x480 [ 15.337874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.337898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.337922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.337948] ? __kthread_parkme+0x82/0x180 [ 15.337969] ? preempt_count_sub+0x50/0x80 [ 15.337995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.338020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.338085] kthread+0x337/0x6f0 [ 15.338105] ? trace_preempt_on+0x20/0xc0 [ 15.338131] ? __pfx_kthread+0x10/0x10 [ 15.338153] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.338175] ? calculate_sigpending+0x7b/0xa0 [ 15.338201] ? __pfx_kthread+0x10/0x10 [ 15.338223] ret_from_fork+0x116/0x1d0 [ 15.338242] ? __pfx_kthread+0x10/0x10 [ 15.338264] ret_from_fork_asm+0x1a/0x30 [ 15.338297] </TASK> [ 15.338307] [ 15.349963] Allocated by task 284: [ 15.350386] kasan_save_stack+0x45/0x70 [ 15.350706] kasan_save_track+0x18/0x40 [ 15.351039] kasan_save_alloc_info+0x3b/0x50 [ 15.351344] __kasan_kmalloc+0xb7/0xc0 [ 15.351537] __kmalloc_cache_noprof+0x189/0x420 [ 15.351907] kasan_atomics+0x95/0x310 [ 15.352253] kunit_try_run_case+0x1a5/0x480 [ 15.352540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352931] kthread+0x337/0x6f0 [ 15.353211] ret_from_fork+0x116/0x1d0 [ 15.353363] ret_from_fork_asm+0x1a/0x30 [ 15.353728] [ 15.353940] The buggy address belongs to the object at ffff8881025adf00 [ 15.353940] which belongs to the cache kmalloc-64 of size 64 [ 15.354591] The buggy address is located 0 bytes to the right of [ 15.354591] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.355459] [ 15.355566] The buggy address belongs to the physical page: [ 15.356145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.356565] flags: 0x200000000000000(node=0|zone=2) [ 15.356844] page_type: f5(slab) [ 15.357003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.357554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.358048] page dumped because: kasan: bad access detected [ 15.358311] [ 15.358578] Memory state around the buggy address: [ 15.358865] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359351] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359742] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.360245] ^ [ 15.360625] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361049] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.361555] ================================================================== [ 15.768151] ================================================================== [ 15.768875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.769652] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.770379] [ 15.770590] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.770635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.770649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.770670] Call Trace: [ 15.770687] <TASK> [ 15.770706] dump_stack_lvl+0x73/0xb0 [ 15.770737] print_report+0xd1/0x610 [ 15.770760] ? __virt_addr_valid+0x1db/0x2d0 [ 15.770784] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.770807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.770831] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.770854] kasan_report+0x141/0x180 [ 15.770878] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.770906] kasan_check_range+0x10c/0x1c0 [ 15.770931] __kasan_check_write+0x18/0x20 [ 15.770952] kasan_atomics_helper+0xa2b/0x5450 [ 15.770976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.771001] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.771027] ? kasan_atomics+0x152/0x310 [ 15.771071] kasan_atomics+0x1dc/0x310 [ 15.771123] ? __pfx_kasan_atomics+0x10/0x10 [ 15.771150] ? __pfx_read_tsc+0x10/0x10 [ 15.771186] ? ktime_get_ts64+0x86/0x230 [ 15.771212] kunit_try_run_case+0x1a5/0x480 [ 15.771239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.771263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.771289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.771314] ? __kthread_parkme+0x82/0x180 [ 15.771336] ? preempt_count_sub+0x50/0x80 [ 15.771361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.771388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.771413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.771441] kthread+0x337/0x6f0 [ 15.771461] ? trace_preempt_on+0x20/0xc0 [ 15.771486] ? __pfx_kthread+0x10/0x10 [ 15.771508] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.771532] ? calculate_sigpending+0x7b/0xa0 [ 15.771559] ? __pfx_kthread+0x10/0x10 [ 15.771582] ret_from_fork+0x116/0x1d0 [ 15.771603] ? __pfx_kthread+0x10/0x10 [ 15.771625] ret_from_fork_asm+0x1a/0x30 [ 15.771657] </TASK> [ 15.771669] [ 15.781392] Allocated by task 284: [ 15.781583] kasan_save_stack+0x45/0x70 [ 15.781769] kasan_save_track+0x18/0x40 [ 15.781981] kasan_save_alloc_info+0x3b/0x50 [ 15.782228] __kasan_kmalloc+0xb7/0xc0 [ 15.782431] __kmalloc_cache_noprof+0x189/0x420 [ 15.782644] kasan_atomics+0x95/0x310 [ 15.782787] kunit_try_run_case+0x1a5/0x480 [ 15.782937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.783171] kthread+0x337/0x6f0 [ 15.783353] ret_from_fork+0x116/0x1d0 [ 15.783560] ret_from_fork_asm+0x1a/0x30 [ 15.783763] [ 15.783858] The buggy address belongs to the object at ffff8881025adf00 [ 15.783858] which belongs to the cache kmalloc-64 of size 64 [ 15.784416] The buggy address is located 0 bytes to the right of [ 15.784416] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.784886] [ 15.784960] The buggy address belongs to the physical page: [ 15.785203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.785583] flags: 0x200000000000000(node=0|zone=2) [ 15.785842] page_type: f5(slab) [ 15.785995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.786362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.786708] page dumped because: kasan: bad access detected [ 15.786914] [ 15.787015] Memory state around the buggy address: [ 15.787281] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.787602] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.787831] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.788047] ^ [ 15.788281] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.788611] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.788928] ================================================================== [ 15.861863] ================================================================== [ 15.862305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.862672] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.862965] [ 15.863066] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.863128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.863142] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.863162] Call Trace: [ 15.863176] <TASK> [ 15.863192] dump_stack_lvl+0x73/0xb0 [ 15.863231] print_report+0xd1/0x610 [ 15.863255] ? __virt_addr_valid+0x1db/0x2d0 [ 15.863279] ? kasan_atomics_helper+0xd47/0x5450 [ 15.863313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.863339] ? kasan_atomics_helper+0xd47/0x5450 [ 15.863362] kasan_report+0x141/0x180 [ 15.863386] ? kasan_atomics_helper+0xd47/0x5450 [ 15.863414] kasan_check_range+0x10c/0x1c0 [ 15.863440] __kasan_check_write+0x18/0x20 [ 15.863461] kasan_atomics_helper+0xd47/0x5450 [ 15.863487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.863512] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.863538] ? kasan_atomics+0x152/0x310 [ 15.863575] kasan_atomics+0x1dc/0x310 [ 15.863599] ? __pfx_kasan_atomics+0x10/0x10 [ 15.863636] ? __pfx_read_tsc+0x10/0x10 [ 15.863660] ? ktime_get_ts64+0x86/0x230 [ 15.863685] kunit_try_run_case+0x1a5/0x480 [ 15.863712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.863746] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.863773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.863810] ? __kthread_parkme+0x82/0x180 [ 15.863832] ? preempt_count_sub+0x50/0x80 [ 15.863859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.863885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.863921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.863950] kthread+0x337/0x6f0 [ 15.863982] ? trace_preempt_on+0x20/0xc0 [ 15.864007] ? __pfx_kthread+0x10/0x10 [ 15.864029] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.864067] ? calculate_sigpending+0x7b/0xa0 [ 15.864093] ? __pfx_kthread+0x10/0x10 [ 15.864139] ret_from_fork+0x116/0x1d0 [ 15.864160] ? __pfx_kthread+0x10/0x10 [ 15.864182] ret_from_fork_asm+0x1a/0x30 [ 15.864215] </TASK> [ 15.864234] [ 15.871926] Allocated by task 284: [ 15.872149] kasan_save_stack+0x45/0x70 [ 15.872383] kasan_save_track+0x18/0x40 [ 15.872554] kasan_save_alloc_info+0x3b/0x50 [ 15.872843] __kasan_kmalloc+0xb7/0xc0 [ 15.872982] __kmalloc_cache_noprof+0x189/0x420 [ 15.873176] kasan_atomics+0x95/0x310 [ 15.873312] kunit_try_run_case+0x1a5/0x480 [ 15.873460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.873638] kthread+0x337/0x6f0 [ 15.873809] ret_from_fork+0x116/0x1d0 [ 15.873997] ret_from_fork_asm+0x1a/0x30 [ 15.874278] [ 15.874377] The buggy address belongs to the object at ffff8881025adf00 [ 15.874377] which belongs to the cache kmalloc-64 of size 64 [ 15.874916] The buggy address is located 0 bytes to the right of [ 15.874916] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.875358] [ 15.875433] The buggy address belongs to the physical page: [ 15.875608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.875939] flags: 0x200000000000000(node=0|zone=2) [ 15.876319] page_type: f5(slab) [ 15.876547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.876913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.877277] page dumped because: kasan: bad access detected [ 15.877533] [ 15.877628] Memory state around the buggy address: [ 15.877806] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.878129] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.878480] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.878822] ^ [ 15.879013] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.879266] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.879527] ================================================================== [ 16.235830] ================================================================== [ 16.236124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 16.236979] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.237418] [ 16.237622] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.237670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.237684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.237706] Call Trace: [ 16.237721] <TASK> [ 16.237737] dump_stack_lvl+0x73/0xb0 [ 16.237868] print_report+0xd1/0x610 [ 16.237894] ? __virt_addr_valid+0x1db/0x2d0 [ 16.237918] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.237941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.237967] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.237991] kasan_report+0x141/0x180 [ 16.238014] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.238044] __asan_report_store8_noabort+0x1b/0x30 [ 16.238097] kasan_atomics_helper+0x50d4/0x5450 [ 16.238135] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.238160] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.238188] ? kasan_atomics+0x152/0x310 [ 16.238216] kasan_atomics+0x1dc/0x310 [ 16.238240] ? __pfx_kasan_atomics+0x10/0x10 [ 16.238266] ? __pfx_read_tsc+0x10/0x10 [ 16.238289] ? ktime_get_ts64+0x86/0x230 [ 16.238314] kunit_try_run_case+0x1a5/0x480 [ 16.238341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.238366] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.238392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.238418] ? __kthread_parkme+0x82/0x180 [ 16.238440] ? preempt_count_sub+0x50/0x80 [ 16.238466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.238493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.238519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.238547] kthread+0x337/0x6f0 [ 16.238567] ? trace_preempt_on+0x20/0xc0 [ 16.238592] ? __pfx_kthread+0x10/0x10 [ 16.238614] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.238638] ? calculate_sigpending+0x7b/0xa0 [ 16.238664] ? __pfx_kthread+0x10/0x10 [ 16.238687] ret_from_fork+0x116/0x1d0 [ 16.238711] ? __pfx_kthread+0x10/0x10 [ 16.238734] ret_from_fork_asm+0x1a/0x30 [ 16.238765] </TASK> [ 16.238777] [ 16.249624] Allocated by task 284: [ 16.249775] kasan_save_stack+0x45/0x70 [ 16.249990] kasan_save_track+0x18/0x40 [ 16.250408] kasan_save_alloc_info+0x3b/0x50 [ 16.250591] __kasan_kmalloc+0xb7/0xc0 [ 16.250904] __kmalloc_cache_noprof+0x189/0x420 [ 16.251238] kasan_atomics+0x95/0x310 [ 16.251517] kunit_try_run_case+0x1a5/0x480 [ 16.251867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.252133] kthread+0x337/0x6f0 [ 16.252433] ret_from_fork+0x116/0x1d0 [ 16.252621] ret_from_fork_asm+0x1a/0x30 [ 16.252828] [ 16.252914] The buggy address belongs to the object at ffff8881025adf00 [ 16.252914] which belongs to the cache kmalloc-64 of size 64 [ 16.253635] The buggy address is located 0 bytes to the right of [ 16.253635] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.254463] [ 16.254579] The buggy address belongs to the physical page: [ 16.254945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.255397] flags: 0x200000000000000(node=0|zone=2) [ 16.255723] page_type: f5(slab) [ 16.255855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.256412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.256827] page dumped because: kasan: bad access detected [ 16.257138] [ 16.257244] Memory state around the buggy address: [ 16.257444] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.257772] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.258359] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.258748] ^ [ 16.259065] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.259543] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.259892] ================================================================== [ 15.807751] ================================================================== [ 15.808411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.808760] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.809075] [ 15.809215] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.809269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.809281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.809313] Call Trace: [ 15.809329] <TASK> [ 15.809343] dump_stack_lvl+0x73/0xb0 [ 15.809373] print_report+0xd1/0x610 [ 15.809407] ? __virt_addr_valid+0x1db/0x2d0 [ 15.809431] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.809454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.809491] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.809515] kasan_report+0x141/0x180 [ 15.809538] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.809574] kasan_check_range+0x10c/0x1c0 [ 15.809600] __kasan_check_write+0x18/0x20 [ 15.809620] kasan_atomics_helper+0xb6a/0x5450 [ 15.809655] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.809680] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.809707] ? kasan_atomics+0x152/0x310 [ 15.809744] kasan_atomics+0x1dc/0x310 [ 15.809768] ? __pfx_kasan_atomics+0x10/0x10 [ 15.809804] ? __pfx_read_tsc+0x10/0x10 [ 15.809828] ? ktime_get_ts64+0x86/0x230 [ 15.809853] kunit_try_run_case+0x1a5/0x480 [ 15.809888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.809912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.809937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.809974] ? __kthread_parkme+0x82/0x180 [ 15.809996] ? preempt_count_sub+0x50/0x80 [ 15.810021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.810070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.810095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.810141] kthread+0x337/0x6f0 [ 15.810162] ? trace_preempt_on+0x20/0xc0 [ 15.810187] ? __pfx_kthread+0x10/0x10 [ 15.810209] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.810233] ? calculate_sigpending+0x7b/0xa0 [ 15.810258] ? __pfx_kthread+0x10/0x10 [ 15.810282] ret_from_fork+0x116/0x1d0 [ 15.810302] ? __pfx_kthread+0x10/0x10 [ 15.810324] ret_from_fork_asm+0x1a/0x30 [ 15.810366] </TASK> [ 15.810376] [ 15.817962] Allocated by task 284: [ 15.818129] kasan_save_stack+0x45/0x70 [ 15.818332] kasan_save_track+0x18/0x40 [ 15.818493] kasan_save_alloc_info+0x3b/0x50 [ 15.818691] __kasan_kmalloc+0xb7/0xc0 [ 15.818883] __kmalloc_cache_noprof+0x189/0x420 [ 15.819141] kasan_atomics+0x95/0x310 [ 15.819349] kunit_try_run_case+0x1a5/0x480 [ 15.819556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.819801] kthread+0x337/0x6f0 [ 15.819962] ret_from_fork+0x116/0x1d0 [ 15.820189] ret_from_fork_asm+0x1a/0x30 [ 15.820375] [ 15.820487] The buggy address belongs to the object at ffff8881025adf00 [ 15.820487] which belongs to the cache kmalloc-64 of size 64 [ 15.820952] The buggy address is located 0 bytes to the right of [ 15.820952] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.821411] [ 15.821485] The buggy address belongs to the physical page: [ 15.821664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.821966] flags: 0x200000000000000(node=0|zone=2) [ 15.822245] page_type: f5(slab) [ 15.822417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.822762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.823151] page dumped because: kasan: bad access detected [ 15.823443] [ 15.823538] Memory state around the buggy address: [ 15.823699] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.823916] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.824169] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.824408] ^ [ 15.824663] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.825011] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.825380] ================================================================== [ 16.575789] ================================================================== [ 16.576146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.576466] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.576769] [ 16.576886] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.576931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.576943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.576966] Call Trace: [ 16.576982] <TASK> [ 16.576997] dump_stack_lvl+0x73/0xb0 [ 16.577027] print_report+0xd1/0x610 [ 16.577062] ? __virt_addr_valid+0x1db/0x2d0 [ 16.577087] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.577110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.577145] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.577169] kasan_report+0x141/0x180 [ 16.577192] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.577222] kasan_check_range+0x10c/0x1c0 [ 16.577248] __kasan_check_write+0x18/0x20 [ 16.577269] kasan_atomics_helper+0x1d7a/0x5450 [ 16.577294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.577319] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.577347] ? kasan_atomics+0x152/0x310 [ 16.577376] kasan_atomics+0x1dc/0x310 [ 16.577400] ? __pfx_kasan_atomics+0x10/0x10 [ 16.577427] ? __pfx_read_tsc+0x10/0x10 [ 16.577449] ? ktime_get_ts64+0x86/0x230 [ 16.577475] kunit_try_run_case+0x1a5/0x480 [ 16.577502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.577528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.577554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.577581] ? __kthread_parkme+0x82/0x180 [ 16.577603] ? preempt_count_sub+0x50/0x80 [ 16.577628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.577654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.577680] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.577708] kthread+0x337/0x6f0 [ 16.577728] ? trace_preempt_on+0x20/0xc0 [ 16.577752] ? __pfx_kthread+0x10/0x10 [ 16.577775] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.577799] ? calculate_sigpending+0x7b/0xa0 [ 16.577824] ? __pfx_kthread+0x10/0x10 [ 16.577847] ret_from_fork+0x116/0x1d0 [ 16.577867] ? __pfx_kthread+0x10/0x10 [ 16.577889] ret_from_fork_asm+0x1a/0x30 [ 16.577921] </TASK> [ 16.577932] [ 16.585482] Allocated by task 284: [ 16.585685] kasan_save_stack+0x45/0x70 [ 16.585856] kasan_save_track+0x18/0x40 [ 16.585995] kasan_save_alloc_info+0x3b/0x50 [ 16.586160] __kasan_kmalloc+0xb7/0xc0 [ 16.586296] __kmalloc_cache_noprof+0x189/0x420 [ 16.586506] kasan_atomics+0x95/0x310 [ 16.586698] kunit_try_run_case+0x1a5/0x480 [ 16.586916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.587187] kthread+0x337/0x6f0 [ 16.587386] ret_from_fork+0x116/0x1d0 [ 16.587784] ret_from_fork_asm+0x1a/0x30 [ 16.587934] [ 16.588007] The buggy address belongs to the object at ffff8881025adf00 [ 16.588007] which belongs to the cache kmalloc-64 of size 64 [ 16.588713] The buggy address is located 0 bytes to the right of [ 16.588713] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.589290] [ 16.589387] The buggy address belongs to the physical page: [ 16.589586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.589875] flags: 0x200000000000000(node=0|zone=2) [ 16.590107] page_type: f5(slab) [ 16.590343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.590656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.590958] page dumped because: kasan: bad access detected [ 16.591238] [ 16.591312] Memory state around the buggy address: [ 16.591471] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.591688] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.591917] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.592240] ^ [ 16.592466] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.592793] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.593077] ================================================================== [ 16.593704] ================================================================== [ 16.594157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.594463] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.594756] [ 16.594888] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.594931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.594944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.594965] Call Trace: [ 16.594979] <TASK> [ 16.594994] dump_stack_lvl+0x73/0xb0 [ 16.595022] print_report+0xd1/0x610 [ 16.595046] ? __virt_addr_valid+0x1db/0x2d0 [ 16.595081] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.595104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.595129] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.595153] kasan_report+0x141/0x180 [ 16.595177] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.595205] kasan_check_range+0x10c/0x1c0 [ 16.595231] __kasan_check_write+0x18/0x20 [ 16.595254] kasan_atomics_helper+0x1e12/0x5450 [ 16.595279] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.595304] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.595331] ? kasan_atomics+0x152/0x310 [ 16.595360] kasan_atomics+0x1dc/0x310 [ 16.595384] ? __pfx_kasan_atomics+0x10/0x10 [ 16.595410] ? __pfx_read_tsc+0x10/0x10 [ 16.595434] ? ktime_get_ts64+0x86/0x230 [ 16.595461] kunit_try_run_case+0x1a5/0x480 [ 16.595499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.595525] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.595553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.595580] ? __kthread_parkme+0x82/0x180 [ 16.595602] ? preempt_count_sub+0x50/0x80 [ 16.595628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.595654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.595681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.595708] kthread+0x337/0x6f0 [ 16.595729] ? trace_preempt_on+0x20/0xc0 [ 16.595754] ? __pfx_kthread+0x10/0x10 [ 16.595776] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.595800] ? calculate_sigpending+0x7b/0xa0 [ 16.595827] ? __pfx_kthread+0x10/0x10 [ 16.595852] ret_from_fork+0x116/0x1d0 [ 16.595874] ? __pfx_kthread+0x10/0x10 [ 16.595896] ret_from_fork_asm+0x1a/0x30 [ 16.595928] </TASK> [ 16.595939] [ 16.605827] Allocated by task 284: [ 16.606297] kasan_save_stack+0x45/0x70 [ 16.606779] kasan_save_track+0x18/0x40 [ 16.606932] kasan_save_alloc_info+0x3b/0x50 [ 16.607101] __kasan_kmalloc+0xb7/0xc0 [ 16.607561] __kmalloc_cache_noprof+0x189/0x420 [ 16.608017] kasan_atomics+0x95/0x310 [ 16.608454] kunit_try_run_case+0x1a5/0x480 [ 16.608876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.609069] kthread+0x337/0x6f0 [ 16.609449] ret_from_fork+0x116/0x1d0 [ 16.609846] ret_from_fork_asm+0x1a/0x30 [ 16.610279] [ 16.610499] The buggy address belongs to the object at ffff8881025adf00 [ 16.610499] which belongs to the cache kmalloc-64 of size 64 [ 16.610885] The buggy address is located 0 bytes to the right of [ 16.610885] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.611691] [ 16.611895] The buggy address belongs to the physical page: [ 16.612432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.613172] flags: 0x200000000000000(node=0|zone=2) [ 16.613636] page_type: f5(slab) [ 16.613963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.614476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.614957] page dumped because: kasan: bad access detected [ 16.615252] [ 16.615453] Memory state around the buggy address: [ 16.615916] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.616494] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.616721] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.616936] ^ [ 16.617171] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.617807] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.618188] ================================================================== [ 16.750918] ================================================================== [ 16.751367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.752003] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.752732] [ 16.752934] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.753079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.753096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.753118] Call Trace: [ 16.753147] <TASK> [ 16.753165] dump_stack_lvl+0x73/0xb0 [ 16.753197] print_report+0xd1/0x610 [ 16.753220] ? __virt_addr_valid+0x1db/0x2d0 [ 16.753246] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.753269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.753295] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.753319] kasan_report+0x141/0x180 [ 16.753342] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.753370] __asan_report_load8_noabort+0x18/0x20 [ 16.753397] kasan_atomics_helper+0x4fb2/0x5450 [ 16.753422] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.753447] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.753474] ? kasan_atomics+0x152/0x310 [ 16.753503] kasan_atomics+0x1dc/0x310 [ 16.753527] ? __pfx_kasan_atomics+0x10/0x10 [ 16.753553] ? __pfx_read_tsc+0x10/0x10 [ 16.753575] ? ktime_get_ts64+0x86/0x230 [ 16.753602] kunit_try_run_case+0x1a5/0x480 [ 16.753629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.753654] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.753680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.753706] ? __kthread_parkme+0x82/0x180 [ 16.753729] ? preempt_count_sub+0x50/0x80 [ 16.753755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.753782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.753808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.753836] kthread+0x337/0x6f0 [ 16.753857] ? trace_preempt_on+0x20/0xc0 [ 16.753883] ? __pfx_kthread+0x10/0x10 [ 16.753905] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.753928] ? calculate_sigpending+0x7b/0xa0 [ 16.753955] ? __pfx_kthread+0x10/0x10 [ 16.753978] ret_from_fork+0x116/0x1d0 [ 16.753998] ? __pfx_kthread+0x10/0x10 [ 16.754020] ret_from_fork_asm+0x1a/0x30 [ 16.754063] </TASK> [ 16.754075] [ 16.764372] Allocated by task 284: [ 16.764590] kasan_save_stack+0x45/0x70 [ 16.764795] kasan_save_track+0x18/0x40 [ 16.764972] kasan_save_alloc_info+0x3b/0x50 [ 16.765416] __kasan_kmalloc+0xb7/0xc0 [ 16.765680] __kmalloc_cache_noprof+0x189/0x420 [ 16.765958] kasan_atomics+0x95/0x310 [ 16.766165] kunit_try_run_case+0x1a5/0x480 [ 16.766513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.766842] kthread+0x337/0x6f0 [ 16.767026] ret_from_fork+0x116/0x1d0 [ 16.767338] ret_from_fork_asm+0x1a/0x30 [ 16.767619] [ 16.767704] The buggy address belongs to the object at ffff8881025adf00 [ 16.767704] which belongs to the cache kmalloc-64 of size 64 [ 16.768453] The buggy address is located 0 bytes to the right of [ 16.768453] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.769215] [ 16.769323] The buggy address belongs to the physical page: [ 16.769645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.770063] flags: 0x200000000000000(node=0|zone=2) [ 16.770461] page_type: f5(slab) [ 16.770648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.770962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.771516] page dumped because: kasan: bad access detected [ 16.771863] [ 16.771941] Memory state around the buggy address: [ 16.772400] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.772795] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.773222] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.773523] ^ [ 16.773883] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.774362] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.774749] ================================================================== [ 16.372318] ================================================================== [ 16.373024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.373691] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.374376] [ 16.374620] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.374668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.374681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.374708] Call Trace: [ 16.374726] <TASK> [ 16.374743] dump_stack_lvl+0x73/0xb0 [ 16.374775] print_report+0xd1/0x610 [ 16.374799] ? __virt_addr_valid+0x1db/0x2d0 [ 16.374822] ? kasan_atomics_helper+0x1818/0x5450 [ 16.374869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.374895] ? kasan_atomics_helper+0x1818/0x5450 [ 16.374919] kasan_report+0x141/0x180 [ 16.374943] ? kasan_atomics_helper+0x1818/0x5450 [ 16.374971] kasan_check_range+0x10c/0x1c0 [ 16.374996] __kasan_check_write+0x18/0x20 [ 16.375017] kasan_atomics_helper+0x1818/0x5450 [ 16.375043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.375078] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.375106] ? kasan_atomics+0x152/0x310 [ 16.375144] kasan_atomics+0x1dc/0x310 [ 16.375168] ? __pfx_kasan_atomics+0x10/0x10 [ 16.375195] ? __pfx_read_tsc+0x10/0x10 [ 16.375219] ? ktime_get_ts64+0x86/0x230 [ 16.375245] kunit_try_run_case+0x1a5/0x480 [ 16.375271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375296] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.375323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.375349] ? __kthread_parkme+0x82/0x180 [ 16.375371] ? preempt_count_sub+0x50/0x80 [ 16.375397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.375449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.375477] kthread+0x337/0x6f0 [ 16.375498] ? trace_preempt_on+0x20/0xc0 [ 16.375523] ? __pfx_kthread+0x10/0x10 [ 16.375545] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.375569] ? calculate_sigpending+0x7b/0xa0 [ 16.375595] ? __pfx_kthread+0x10/0x10 [ 16.375618] ret_from_fork+0x116/0x1d0 [ 16.375638] ? __pfx_kthread+0x10/0x10 [ 16.375660] ret_from_fork_asm+0x1a/0x30 [ 16.375693] </TASK> [ 16.375704] [ 16.386121] Allocated by task 284: [ 16.386412] kasan_save_stack+0x45/0x70 [ 16.386699] kasan_save_track+0x18/0x40 [ 16.386888] kasan_save_alloc_info+0x3b/0x50 [ 16.387194] __kasan_kmalloc+0xb7/0xc0 [ 16.387477] __kmalloc_cache_noprof+0x189/0x420 [ 16.387659] kasan_atomics+0x95/0x310 [ 16.387852] kunit_try_run_case+0x1a5/0x480 [ 16.388072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.388590] kthread+0x337/0x6f0 [ 16.388828] ret_from_fork+0x116/0x1d0 [ 16.389108] ret_from_fork_asm+0x1a/0x30 [ 16.389425] [ 16.389506] The buggy address belongs to the object at ffff8881025adf00 [ 16.389506] which belongs to the cache kmalloc-64 of size 64 [ 16.390293] The buggy address is located 0 bytes to the right of [ 16.390293] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.390962] [ 16.391064] The buggy address belongs to the physical page: [ 16.391503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.391870] flags: 0x200000000000000(node=0|zone=2) [ 16.392061] page_type: f5(slab) [ 16.392540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.392841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.393288] page dumped because: kasan: bad access detected [ 16.393635] [ 16.393740] Memory state around the buggy address: [ 16.394093] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.394593] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.395014] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.395459] ^ [ 16.395753] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.396132] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.396507] ================================================================== [ 16.306200] ================================================================== [ 16.306472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.307174] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.307496] [ 16.307605] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.307648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.307661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.307682] Call Trace: [ 16.307697] <TASK> [ 16.307712] dump_stack_lvl+0x73/0xb0 [ 16.307742] print_report+0xd1/0x610 [ 16.307767] ? __virt_addr_valid+0x1db/0x2d0 [ 16.307790] ? kasan_atomics_helper+0x164f/0x5450 [ 16.307813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.307839] ? kasan_atomics_helper+0x164f/0x5450 [ 16.307864] kasan_report+0x141/0x180 [ 16.307887] ? kasan_atomics_helper+0x164f/0x5450 [ 16.307917] kasan_check_range+0x10c/0x1c0 [ 16.307943] __kasan_check_write+0x18/0x20 [ 16.307965] kasan_atomics_helper+0x164f/0x5450 [ 16.307989] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.308013] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.308042] ? kasan_atomics+0x152/0x310 [ 16.308084] kasan_atomics+0x1dc/0x310 [ 16.308108] ? __pfx_kasan_atomics+0x10/0x10 [ 16.308332] ? __pfx_read_tsc+0x10/0x10 [ 16.308356] ? ktime_get_ts64+0x86/0x230 [ 16.308383] kunit_try_run_case+0x1a5/0x480 [ 16.308409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.308435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.308462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.308488] ? __kthread_parkme+0x82/0x180 [ 16.308510] ? preempt_count_sub+0x50/0x80 [ 16.308536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.308562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.308589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.308617] kthread+0x337/0x6f0 [ 16.308638] ? trace_preempt_on+0x20/0xc0 [ 16.308663] ? __pfx_kthread+0x10/0x10 [ 16.308685] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.308709] ? calculate_sigpending+0x7b/0xa0 [ 16.308735] ? __pfx_kthread+0x10/0x10 [ 16.308758] ret_from_fork+0x116/0x1d0 [ 16.308779] ? __pfx_kthread+0x10/0x10 [ 16.308801] ret_from_fork_asm+0x1a/0x30 [ 16.308833] </TASK> [ 16.308844] [ 16.318736] Allocated by task 284: [ 16.319042] kasan_save_stack+0x45/0x70 [ 16.319332] kasan_save_track+0x18/0x40 [ 16.319604] kasan_save_alloc_info+0x3b/0x50 [ 16.319881] __kasan_kmalloc+0xb7/0xc0 [ 16.320141] __kmalloc_cache_noprof+0x189/0x420 [ 16.320357] kasan_atomics+0x95/0x310 [ 16.320652] kunit_try_run_case+0x1a5/0x480 [ 16.320906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.321231] kthread+0x337/0x6f0 [ 16.321464] ret_from_fork+0x116/0x1d0 [ 16.321639] ret_from_fork_asm+0x1a/0x30 [ 16.321829] [ 16.321914] The buggy address belongs to the object at ffff8881025adf00 [ 16.321914] which belongs to the cache kmalloc-64 of size 64 [ 16.322669] The buggy address is located 0 bytes to the right of [ 16.322669] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.323281] [ 16.323541] The buggy address belongs to the physical page: [ 16.323781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.324183] flags: 0x200000000000000(node=0|zone=2) [ 16.324496] page_type: f5(slab) [ 16.324629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.325072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.325463] page dumped because: kasan: bad access detected [ 16.325654] [ 16.325875] Memory state around the buggy address: [ 16.326049] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.326566] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.326954] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.327377] ^ [ 16.327607] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.327913] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.328420] ================================================================== [ 15.880092] ================================================================== [ 15.880729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.881181] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.881472] [ 15.881562] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.881605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.881618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.881640] Call Trace: [ 15.881654] <TASK> [ 15.881668] dump_stack_lvl+0x73/0xb0 [ 15.881698] print_report+0xd1/0x610 [ 15.881722] ? __virt_addr_valid+0x1db/0x2d0 [ 15.881745] ? kasan_atomics_helper+0xde0/0x5450 [ 15.881768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.881793] ? kasan_atomics_helper+0xde0/0x5450 [ 15.881817] kasan_report+0x141/0x180 [ 15.881840] ? kasan_atomics_helper+0xde0/0x5450 [ 15.881868] kasan_check_range+0x10c/0x1c0 [ 15.881893] __kasan_check_write+0x18/0x20 [ 15.881915] kasan_atomics_helper+0xde0/0x5450 [ 15.881940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.882001] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.882028] ? kasan_atomics+0x152/0x310 [ 15.882077] kasan_atomics+0x1dc/0x310 [ 15.882148] ? __pfx_kasan_atomics+0x10/0x10 [ 15.882177] ? __pfx_read_tsc+0x10/0x10 [ 15.882200] ? ktime_get_ts64+0x86/0x230 [ 15.882238] kunit_try_run_case+0x1a5/0x480 [ 15.882265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882290] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.882316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.882342] ? __kthread_parkme+0x82/0x180 [ 15.882365] ? preempt_count_sub+0x50/0x80 [ 15.882418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.882495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.882522] kthread+0x337/0x6f0 [ 15.882545] ? trace_preempt_on+0x20/0xc0 [ 15.882569] ? __pfx_kthread+0x10/0x10 [ 15.882591] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.882615] ? calculate_sigpending+0x7b/0xa0 [ 15.882642] ? __pfx_kthread+0x10/0x10 [ 15.882665] ret_from_fork+0x116/0x1d0 [ 15.882685] ? __pfx_kthread+0x10/0x10 [ 15.882712] ret_from_fork_asm+0x1a/0x30 [ 15.882774] </TASK> [ 15.882785] [ 15.891277] Allocated by task 284: [ 15.891449] kasan_save_stack+0x45/0x70 [ 15.891653] kasan_save_track+0x18/0x40 [ 15.891897] kasan_save_alloc_info+0x3b/0x50 [ 15.892195] __kasan_kmalloc+0xb7/0xc0 [ 15.892379] __kmalloc_cache_noprof+0x189/0x420 [ 15.892539] kasan_atomics+0x95/0x310 [ 15.892730] kunit_try_run_case+0x1a5/0x480 [ 15.892941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.893245] kthread+0x337/0x6f0 [ 15.893403] ret_from_fork+0x116/0x1d0 [ 15.893613] ret_from_fork_asm+0x1a/0x30 [ 15.893801] [ 15.893875] The buggy address belongs to the object at ffff8881025adf00 [ 15.893875] which belongs to the cache kmalloc-64 of size 64 [ 15.894308] The buggy address is located 0 bytes to the right of [ 15.894308] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.894917] [ 15.895015] The buggy address belongs to the physical page: [ 15.895255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.895612] flags: 0x200000000000000(node=0|zone=2) [ 15.895805] page_type: f5(slab) [ 15.895969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.896341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.896573] page dumped because: kasan: bad access detected [ 15.896747] [ 15.896818] Memory state around the buggy address: [ 15.896975] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.897620] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.898297] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.898934] ^ [ 15.899418] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.900072] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.900725] ================================================================== [ 15.679114] ================================================================== [ 15.679429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.679760] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.680100] [ 15.680197] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.680239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.680251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.680272] Call Trace: [ 15.680287] <TASK> [ 15.680313] dump_stack_lvl+0x73/0xb0 [ 15.680342] print_report+0xd1/0x610 [ 15.680377] ? __virt_addr_valid+0x1db/0x2d0 [ 15.680401] ? kasan_atomics_helper+0x860/0x5450 [ 15.680424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.680449] ? kasan_atomics_helper+0x860/0x5450 [ 15.680472] kasan_report+0x141/0x180 [ 15.680496] ? kasan_atomics_helper+0x860/0x5450 [ 15.680525] kasan_check_range+0x10c/0x1c0 [ 15.680561] __kasan_check_write+0x18/0x20 [ 15.680582] kasan_atomics_helper+0x860/0x5450 [ 15.680607] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.680644] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.680677] ? kasan_atomics+0x152/0x310 [ 15.680716] kasan_atomics+0x1dc/0x310 [ 15.680741] ? __pfx_kasan_atomics+0x10/0x10 [ 15.680767] ? __pfx_read_tsc+0x10/0x10 [ 15.680790] ? ktime_get_ts64+0x86/0x230 [ 15.680816] kunit_try_run_case+0x1a5/0x480 [ 15.680842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.680867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.680892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.680928] ? __kthread_parkme+0x82/0x180 [ 15.680949] ? preempt_count_sub+0x50/0x80 [ 15.680975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.681011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.681039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.681076] kthread+0x337/0x6f0 [ 15.681097] ? trace_preempt_on+0x20/0xc0 [ 15.681122] ? __pfx_kthread+0x10/0x10 [ 15.681144] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.681178] ? calculate_sigpending+0x7b/0xa0 [ 15.681204] ? __pfx_kthread+0x10/0x10 [ 15.681227] ret_from_fork+0x116/0x1d0 [ 15.681248] ? __pfx_kthread+0x10/0x10 [ 15.681280] ret_from_fork_asm+0x1a/0x30 [ 15.681313] </TASK> [ 15.681325] [ 15.697449] Allocated by task 284: [ 15.697662] kasan_save_stack+0x45/0x70 [ 15.697909] kasan_save_track+0x18/0x40 [ 15.698116] kasan_save_alloc_info+0x3b/0x50 [ 15.698393] __kasan_kmalloc+0xb7/0xc0 [ 15.698538] __kmalloc_cache_noprof+0x189/0x420 [ 15.698909] kasan_atomics+0x95/0x310 [ 15.699133] kunit_try_run_case+0x1a5/0x480 [ 15.699395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.699631] kthread+0x337/0x6f0 [ 15.699966] ret_from_fork+0x116/0x1d0 [ 15.700215] ret_from_fork_asm+0x1a/0x30 [ 15.700365] [ 15.700439] The buggy address belongs to the object at ffff8881025adf00 [ 15.700439] which belongs to the cache kmalloc-64 of size 64 [ 15.701219] The buggy address is located 0 bytes to the right of [ 15.701219] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.701853] [ 15.701930] The buggy address belongs to the physical page: [ 15.702346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.702743] flags: 0x200000000000000(node=0|zone=2) [ 15.702999] page_type: f5(slab) [ 15.703216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.703546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.704066] page dumped because: kasan: bad access detected [ 15.704251] [ 15.704345] Memory state around the buggy address: [ 15.704615] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705092] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705586] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.705944] ^ [ 15.706230] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.706500] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.706975] ================================================================== [ 16.260653] ================================================================== [ 16.261292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 16.261728] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.262294] [ 16.262407] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.262453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.262465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.262488] Call Trace: [ 16.262505] <TASK> [ 16.262522] dump_stack_lvl+0x73/0xb0 [ 16.262552] print_report+0xd1/0x610 [ 16.262576] ? __virt_addr_valid+0x1db/0x2d0 [ 16.262599] ? kasan_atomics_helper+0x151d/0x5450 [ 16.262623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.262648] ? kasan_atomics_helper+0x151d/0x5450 [ 16.262672] kasan_report+0x141/0x180 [ 16.262695] ? kasan_atomics_helper+0x151d/0x5450 [ 16.262728] kasan_check_range+0x10c/0x1c0 [ 16.262754] __kasan_check_write+0x18/0x20 [ 16.262775] kasan_atomics_helper+0x151d/0x5450 [ 16.262800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.262825] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.262851] ? kasan_atomics+0x152/0x310 [ 16.262880] kasan_atomics+0x1dc/0x310 [ 16.262904] ? __pfx_kasan_atomics+0x10/0x10 [ 16.262930] ? __pfx_read_tsc+0x10/0x10 [ 16.262953] ? ktime_get_ts64+0x86/0x230 [ 16.262978] kunit_try_run_case+0x1a5/0x480 [ 16.263004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.263030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.263066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.263213] ? __kthread_parkme+0x82/0x180 [ 16.263237] ? preempt_count_sub+0x50/0x80 [ 16.263263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.263289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.263317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.263344] kthread+0x337/0x6f0 [ 16.263365] ? trace_preempt_on+0x20/0xc0 [ 16.263390] ? __pfx_kthread+0x10/0x10 [ 16.263413] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.263437] ? calculate_sigpending+0x7b/0xa0 [ 16.263464] ? __pfx_kthread+0x10/0x10 [ 16.263487] ret_from_fork+0x116/0x1d0 [ 16.263508] ? __pfx_kthread+0x10/0x10 [ 16.263530] ret_from_fork_asm+0x1a/0x30 [ 16.263562] </TASK> [ 16.263574] [ 16.273305] Allocated by task 284: [ 16.273638] kasan_save_stack+0x45/0x70 [ 16.273909] kasan_save_track+0x18/0x40 [ 16.274181] kasan_save_alloc_info+0x3b/0x50 [ 16.274462] __kasan_kmalloc+0xb7/0xc0 [ 16.274618] __kmalloc_cache_noprof+0x189/0x420 [ 16.274956] kasan_atomics+0x95/0x310 [ 16.275122] kunit_try_run_case+0x1a5/0x480 [ 16.275348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.275590] kthread+0x337/0x6f0 [ 16.275753] ret_from_fork+0x116/0x1d0 [ 16.275921] ret_from_fork_asm+0x1a/0x30 [ 16.276116] [ 16.276526] The buggy address belongs to the object at ffff8881025adf00 [ 16.276526] which belongs to the cache kmalloc-64 of size 64 [ 16.277143] The buggy address is located 0 bytes to the right of [ 16.277143] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.277688] [ 16.277941] The buggy address belongs to the physical page: [ 16.278302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.278691] flags: 0x200000000000000(node=0|zone=2) [ 16.278986] page_type: f5(slab) [ 16.279128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.279633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.280066] page dumped because: kasan: bad access detected [ 16.280450] [ 16.280529] Memory state around the buggy address: [ 16.280761] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.281069] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.281584] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.281933] ^ [ 16.282236] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282623] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.282932] ================================================================== [ 16.088390] ================================================================== [ 16.088940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 16.089508] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.090004] [ 16.090139] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.090185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.090336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.090360] Call Trace: [ 16.090376] <TASK> [ 16.090392] dump_stack_lvl+0x73/0xb0 [ 16.090424] print_report+0xd1/0x610 [ 16.090448] ? __virt_addr_valid+0x1db/0x2d0 [ 16.090472] ? kasan_atomics_helper+0x1217/0x5450 [ 16.090496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.090522] ? kasan_atomics_helper+0x1217/0x5450 [ 16.090546] kasan_report+0x141/0x180 [ 16.090570] ? kasan_atomics_helper+0x1217/0x5450 [ 16.090598] kasan_check_range+0x10c/0x1c0 [ 16.090624] __kasan_check_write+0x18/0x20 [ 16.090646] kasan_atomics_helper+0x1217/0x5450 [ 16.090671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.090695] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.090728] ? kasan_atomics+0x152/0x310 [ 16.090757] kasan_atomics+0x1dc/0x310 [ 16.090782] ? __pfx_kasan_atomics+0x10/0x10 [ 16.090809] ? __pfx_read_tsc+0x10/0x10 [ 16.090832] ? ktime_get_ts64+0x86/0x230 [ 16.090859] kunit_try_run_case+0x1a5/0x480 [ 16.090884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.090909] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.090934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.090960] ? __kthread_parkme+0x82/0x180 [ 16.090983] ? preempt_count_sub+0x50/0x80 [ 16.091008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.091034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.091073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.091101] kthread+0x337/0x6f0 [ 16.091130] ? trace_preempt_on+0x20/0xc0 [ 16.091156] ? __pfx_kthread+0x10/0x10 [ 16.091178] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.091201] ? calculate_sigpending+0x7b/0xa0 [ 16.091227] ? __pfx_kthread+0x10/0x10 [ 16.091250] ret_from_fork+0x116/0x1d0 [ 16.091271] ? __pfx_kthread+0x10/0x10 [ 16.091293] ret_from_fork_asm+0x1a/0x30 [ 16.091325] </TASK> [ 16.091337] [ 16.101643] Allocated by task 284: [ 16.101814] kasan_save_stack+0x45/0x70 [ 16.102085] kasan_save_track+0x18/0x40 [ 16.102399] kasan_save_alloc_info+0x3b/0x50 [ 16.102726] __kasan_kmalloc+0xb7/0xc0 [ 16.102905] __kmalloc_cache_noprof+0x189/0x420 [ 16.103279] kasan_atomics+0x95/0x310 [ 16.103558] kunit_try_run_case+0x1a5/0x480 [ 16.103725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.104072] kthread+0x337/0x6f0 [ 16.104403] ret_from_fork+0x116/0x1d0 [ 16.104644] ret_from_fork_asm+0x1a/0x30 [ 16.104824] [ 16.104924] The buggy address belongs to the object at ffff8881025adf00 [ 16.104924] which belongs to the cache kmalloc-64 of size 64 [ 16.105696] The buggy address is located 0 bytes to the right of [ 16.105696] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.106423] [ 16.106504] The buggy address belongs to the physical page: [ 16.106879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.107356] flags: 0x200000000000000(node=0|zone=2) [ 16.107733] page_type: f5(slab) [ 16.107879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.108321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.108734] page dumped because: kasan: bad access detected [ 16.109031] [ 16.109142] Memory state around the buggy address: [ 16.109368] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.109685] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.109979] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.110665] ^ [ 16.110995] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.111523] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.111909] ================================================================== [ 16.618850] ================================================================== [ 16.619587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.620335] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.620990] [ 16.621239] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.621286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.621299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.621320] Call Trace: [ 16.621336] <TASK> [ 16.621352] dump_stack_lvl+0x73/0xb0 [ 16.621382] print_report+0xd1/0x610 [ 16.621440] ? __virt_addr_valid+0x1db/0x2d0 [ 16.621464] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.621499] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.621525] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.621548] kasan_report+0x141/0x180 [ 16.621572] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.621600] kasan_check_range+0x10c/0x1c0 [ 16.621626] __kasan_check_write+0x18/0x20 [ 16.621646] kasan_atomics_helper+0x1eaa/0x5450 [ 16.621671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.621696] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.621723] ? kasan_atomics+0x152/0x310 [ 16.621751] kasan_atomics+0x1dc/0x310 [ 16.621776] ? __pfx_kasan_atomics+0x10/0x10 [ 16.621803] ? __pfx_read_tsc+0x10/0x10 [ 16.621826] ? ktime_get_ts64+0x86/0x230 [ 16.621852] kunit_try_run_case+0x1a5/0x480 [ 16.621878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.621903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.621930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.621956] ? __kthread_parkme+0x82/0x180 [ 16.621978] ? preempt_count_sub+0x50/0x80 [ 16.622003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.622031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.622067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.622095] kthread+0x337/0x6f0 [ 16.622135] ? trace_preempt_on+0x20/0xc0 [ 16.622162] ? __pfx_kthread+0x10/0x10 [ 16.622184] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.622207] ? calculate_sigpending+0x7b/0xa0 [ 16.622233] ? __pfx_kthread+0x10/0x10 [ 16.622256] ret_from_fork+0x116/0x1d0 [ 16.622276] ? __pfx_kthread+0x10/0x10 [ 16.622298] ret_from_fork_asm+0x1a/0x30 [ 16.622330] </TASK> [ 16.622341] [ 16.633806] Allocated by task 284: [ 16.633973] kasan_save_stack+0x45/0x70 [ 16.634247] kasan_save_track+0x18/0x40 [ 16.634447] kasan_save_alloc_info+0x3b/0x50 [ 16.634614] __kasan_kmalloc+0xb7/0xc0 [ 16.634757] __kmalloc_cache_noprof+0x189/0x420 [ 16.634917] kasan_atomics+0x95/0x310 [ 16.635096] kunit_try_run_case+0x1a5/0x480 [ 16.635432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.635694] kthread+0x337/0x6f0 [ 16.635868] ret_from_fork+0x116/0x1d0 [ 16.636145] ret_from_fork_asm+0x1a/0x30 [ 16.636410] [ 16.636510] The buggy address belongs to the object at ffff8881025adf00 [ 16.636510] which belongs to the cache kmalloc-64 of size 64 [ 16.637082] The buggy address is located 0 bytes to the right of [ 16.637082] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.637526] [ 16.637625] The buggy address belongs to the physical page: [ 16.637955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.638368] flags: 0x200000000000000(node=0|zone=2) [ 16.638694] page_type: f5(slab) [ 16.638871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.639287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.639579] page dumped because: kasan: bad access detected [ 16.639815] [ 16.639949] Memory state around the buggy address: [ 16.640316] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.640571] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.640905] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.641337] ^ [ 16.641540] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.641853] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.642200] ================================================================== [ 16.663092] ================================================================== [ 16.663409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.663942] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.664698] [ 16.664934] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.664980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.664993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.665015] Call Trace: [ 16.665067] <TASK> [ 16.665082] dump_stack_lvl+0x73/0xb0 [ 16.665138] print_report+0xd1/0x610 [ 16.665162] ? __virt_addr_valid+0x1db/0x2d0 [ 16.665186] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.665209] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.665235] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.665258] kasan_report+0x141/0x180 [ 16.665282] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.665310] __asan_report_load8_noabort+0x18/0x20 [ 16.665336] kasan_atomics_helper+0x4f71/0x5450 [ 16.665363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.665387] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.665415] ? kasan_atomics+0x152/0x310 [ 16.665443] kasan_atomics+0x1dc/0x310 [ 16.665467] ? __pfx_kasan_atomics+0x10/0x10 [ 16.665494] ? __pfx_read_tsc+0x10/0x10 [ 16.665516] ? ktime_get_ts64+0x86/0x230 [ 16.665541] kunit_try_run_case+0x1a5/0x480 [ 16.665568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.665593] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.665619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.665645] ? __kthread_parkme+0x82/0x180 [ 16.665667] ? preempt_count_sub+0x50/0x80 [ 16.665693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.665720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.665746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.665774] kthread+0x337/0x6f0 [ 16.665795] ? trace_preempt_on+0x20/0xc0 [ 16.665820] ? __pfx_kthread+0x10/0x10 [ 16.665842] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.665865] ? calculate_sigpending+0x7b/0xa0 [ 16.665891] ? __pfx_kthread+0x10/0x10 [ 16.665914] ret_from_fork+0x116/0x1d0 [ 16.665935] ? __pfx_kthread+0x10/0x10 [ 16.665957] ret_from_fork_asm+0x1a/0x30 [ 16.665990] </TASK> [ 16.666000] [ 16.676159] Allocated by task 284: [ 16.676296] kasan_save_stack+0x45/0x70 [ 16.676465] kasan_save_track+0x18/0x40 [ 16.676712] kasan_save_alloc_info+0x3b/0x50 [ 16.676935] __kasan_kmalloc+0xb7/0xc0 [ 16.677222] __kmalloc_cache_noprof+0x189/0x420 [ 16.677527] kasan_atomics+0x95/0x310 [ 16.677721] kunit_try_run_case+0x1a5/0x480 [ 16.677953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.678170] kthread+0x337/0x6f0 [ 16.678323] ret_from_fork+0x116/0x1d0 [ 16.678553] ret_from_fork_asm+0x1a/0x30 [ 16.678777] [ 16.678876] The buggy address belongs to the object at ffff8881025adf00 [ 16.678876] which belongs to the cache kmalloc-64 of size 64 [ 16.679447] The buggy address is located 0 bytes to the right of [ 16.679447] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.679950] [ 16.680030] The buggy address belongs to the physical page: [ 16.680315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.680674] flags: 0x200000000000000(node=0|zone=2) [ 16.681018] page_type: f5(slab) [ 16.681170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.681547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.681907] page dumped because: kasan: bad access detected [ 16.682201] [ 16.682276] Memory state around the buggy address: [ 16.682502] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.682771] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.683151] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.683500] ^ [ 16.683703] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.684010] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.684373] ================================================================== [ 16.450344] ================================================================== [ 16.451138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.451487] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.451803] [ 16.451930] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.451994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.452008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.452030] Call Trace: [ 16.452047] <TASK> [ 16.452078] dump_stack_lvl+0x73/0xb0 [ 16.452108] print_report+0xd1/0x610 [ 16.452142] ? __virt_addr_valid+0x1db/0x2d0 [ 16.452166] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.452189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.452215] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.452248] kasan_report+0x141/0x180 [ 16.452272] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.452300] kasan_check_range+0x10c/0x1c0 [ 16.452338] __kasan_check_write+0x18/0x20 [ 16.452358] kasan_atomics_helper+0x19e3/0x5450 [ 16.452383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.452418] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.452444] ? kasan_atomics+0x152/0x310 [ 16.452473] kasan_atomics+0x1dc/0x310 [ 16.452497] ? __pfx_kasan_atomics+0x10/0x10 [ 16.452523] ? __pfx_read_tsc+0x10/0x10 [ 16.452546] ? ktime_get_ts64+0x86/0x230 [ 16.452572] kunit_try_run_case+0x1a5/0x480 [ 16.452607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.452632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.452670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.452695] ? __kthread_parkme+0x82/0x180 [ 16.452717] ? preempt_count_sub+0x50/0x80 [ 16.452753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.452780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.452807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.452834] kthread+0x337/0x6f0 [ 16.452855] ? trace_preempt_on+0x20/0xc0 [ 16.452880] ? __pfx_kthread+0x10/0x10 [ 16.452902] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.452926] ? calculate_sigpending+0x7b/0xa0 [ 16.452951] ? __pfx_kthread+0x10/0x10 [ 16.452974] ret_from_fork+0x116/0x1d0 [ 16.452994] ? __pfx_kthread+0x10/0x10 [ 16.453017] ret_from_fork_asm+0x1a/0x30 [ 16.453048] </TASK> [ 16.453069] [ 16.460707] Allocated by task 284: [ 16.460884] kasan_save_stack+0x45/0x70 [ 16.461096] kasan_save_track+0x18/0x40 [ 16.461459] kasan_save_alloc_info+0x3b/0x50 [ 16.461666] __kasan_kmalloc+0xb7/0xc0 [ 16.461802] __kmalloc_cache_noprof+0x189/0x420 [ 16.461967] kasan_atomics+0x95/0x310 [ 16.462231] kunit_try_run_case+0x1a5/0x480 [ 16.462462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.462725] kthread+0x337/0x6f0 [ 16.462889] ret_from_fork+0x116/0x1d0 [ 16.463129] ret_from_fork_asm+0x1a/0x30 [ 16.463304] [ 16.463413] The buggy address belongs to the object at ffff8881025adf00 [ 16.463413] which belongs to the cache kmalloc-64 of size 64 [ 16.463929] The buggy address is located 0 bytes to the right of [ 16.463929] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.464498] [ 16.464593] The buggy address belongs to the physical page: [ 16.464796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.465043] flags: 0x200000000000000(node=0|zone=2) [ 16.465348] page_type: f5(slab) [ 16.465516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.465888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.466267] page dumped because: kasan: bad access detected [ 16.466457] [ 16.466528] Memory state around the buggy address: [ 16.466716] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.467076] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.467463] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.467765] ^ [ 16.467973] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.468348] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.468662] ================================================================== [ 16.063908] ================================================================== [ 16.064459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 16.064934] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.065428] [ 16.065543] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.065590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.065603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.065626] Call Trace: [ 16.065642] <TASK> [ 16.065660] dump_stack_lvl+0x73/0xb0 [ 16.065692] print_report+0xd1/0x610 [ 16.065717] ? __virt_addr_valid+0x1db/0x2d0 [ 16.065742] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.065765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.065790] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.065814] kasan_report+0x141/0x180 [ 16.065838] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.065867] __asan_report_load4_noabort+0x18/0x20 [ 16.065895] kasan_atomics_helper+0x4a02/0x5450 [ 16.065919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.065945] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.065972] ? kasan_atomics+0x152/0x310 [ 16.066000] kasan_atomics+0x1dc/0x310 [ 16.066025] ? __pfx_kasan_atomics+0x10/0x10 [ 16.066063] ? __pfx_read_tsc+0x10/0x10 [ 16.066263] ? ktime_get_ts64+0x86/0x230 [ 16.066297] kunit_try_run_case+0x1a5/0x480 [ 16.066324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.066349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.066376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.066403] ? __kthread_parkme+0x82/0x180 [ 16.066425] ? preempt_count_sub+0x50/0x80 [ 16.066451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.066477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.066504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.066532] kthread+0x337/0x6f0 [ 16.066553] ? trace_preempt_on+0x20/0xc0 [ 16.066578] ? __pfx_kthread+0x10/0x10 [ 16.066600] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.066623] ? calculate_sigpending+0x7b/0xa0 [ 16.066649] ? __pfx_kthread+0x10/0x10 [ 16.066672] ret_from_fork+0x116/0x1d0 [ 16.066693] ? __pfx_kthread+0x10/0x10 [ 16.066721] ret_from_fork_asm+0x1a/0x30 [ 16.066754] </TASK> [ 16.066766] [ 16.076932] Allocated by task 284: [ 16.077107] kasan_save_stack+0x45/0x70 [ 16.077565] kasan_save_track+0x18/0x40 [ 16.077853] kasan_save_alloc_info+0x3b/0x50 [ 16.078045] __kasan_kmalloc+0xb7/0xc0 [ 16.078447] __kmalloc_cache_noprof+0x189/0x420 [ 16.078693] kasan_atomics+0x95/0x310 [ 16.078883] kunit_try_run_case+0x1a5/0x480 [ 16.079100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.079594] kthread+0x337/0x6f0 [ 16.079837] ret_from_fork+0x116/0x1d0 [ 16.080028] ret_from_fork_asm+0x1a/0x30 [ 16.080415] [ 16.080530] The buggy address belongs to the object at ffff8881025adf00 [ 16.080530] which belongs to the cache kmalloc-64 of size 64 [ 16.081319] The buggy address is located 0 bytes to the right of [ 16.081319] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.081903] [ 16.082009] The buggy address belongs to the physical page: [ 16.082522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.082944] flags: 0x200000000000000(node=0|zone=2) [ 16.083339] page_type: f5(slab) [ 16.083591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.083966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.084480] page dumped because: kasan: bad access detected [ 16.084800] [ 16.084878] Memory state around the buggy address: [ 16.085363] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.085677] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.086000] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.086487] ^ [ 16.086803] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.087183] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.087606] ================================================================== [ 15.633519] ================================================================== [ 15.634197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.634900] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.635357] [ 15.635603] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.635648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.635661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.635683] Call Trace: [ 15.635699] <TASK> [ 15.635716] dump_stack_lvl+0x73/0xb0 [ 15.635746] print_report+0xd1/0x610 [ 15.635770] ? __virt_addr_valid+0x1db/0x2d0 [ 15.635795] ? kasan_atomics_helper+0x72f/0x5450 [ 15.635818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.635851] ? kasan_atomics_helper+0x72f/0x5450 [ 15.635876] kasan_report+0x141/0x180 [ 15.635899] ? kasan_atomics_helper+0x72f/0x5450 [ 15.635938] kasan_check_range+0x10c/0x1c0 [ 15.635964] __kasan_check_write+0x18/0x20 [ 15.635997] kasan_atomics_helper+0x72f/0x5450 [ 15.636022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.636047] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.636082] ? kasan_atomics+0x152/0x310 [ 15.636111] kasan_atomics+0x1dc/0x310 [ 15.636145] ? __pfx_kasan_atomics+0x10/0x10 [ 15.636171] ? __pfx_read_tsc+0x10/0x10 [ 15.636194] ? ktime_get_ts64+0x86/0x230 [ 15.636220] kunit_try_run_case+0x1a5/0x480 [ 15.636246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.636270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.636297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.636323] ? __kthread_parkme+0x82/0x180 [ 15.636344] ? preempt_count_sub+0x50/0x80 [ 15.636370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.636395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.636422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.636448] kthread+0x337/0x6f0 [ 15.636468] ? trace_preempt_on+0x20/0xc0 [ 15.636493] ? __pfx_kthread+0x10/0x10 [ 15.636515] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.636538] ? calculate_sigpending+0x7b/0xa0 [ 15.636565] ? __pfx_kthread+0x10/0x10 [ 15.636587] ret_from_fork+0x116/0x1d0 [ 15.636607] ? __pfx_kthread+0x10/0x10 [ 15.636630] ret_from_fork_asm+0x1a/0x30 [ 15.636679] </TASK> [ 15.636690] [ 15.650013] Allocated by task 284: [ 15.650358] kasan_save_stack+0x45/0x70 [ 15.650572] kasan_save_track+0x18/0x40 [ 15.650742] kasan_save_alloc_info+0x3b/0x50 [ 15.650951] __kasan_kmalloc+0xb7/0xc0 [ 15.651100] __kmalloc_cache_noprof+0x189/0x420 [ 15.651259] kasan_atomics+0x95/0x310 [ 15.651426] kunit_try_run_case+0x1a5/0x480 [ 15.651657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.651952] kthread+0x337/0x6f0 [ 15.652179] ret_from_fork+0x116/0x1d0 [ 15.652325] ret_from_fork_asm+0x1a/0x30 [ 15.652467] [ 15.652541] The buggy address belongs to the object at ffff8881025adf00 [ 15.652541] which belongs to the cache kmalloc-64 of size 64 [ 15.653375] The buggy address is located 0 bytes to the right of [ 15.653375] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.653982] [ 15.654078] The buggy address belongs to the physical page: [ 15.654326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.654797] flags: 0x200000000000000(node=0|zone=2) [ 15.655041] page_type: f5(slab) [ 15.655172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.655405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.655815] page dumped because: kasan: bad access detected [ 15.656073] [ 15.656166] Memory state around the buggy address: [ 15.656435] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.656652] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.657289] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.657669] ^ [ 15.657862] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.658220] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.658490] ================================================================== [ 15.925043] ================================================================== [ 15.925366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.925780] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.926159] [ 15.926320] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.926367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.926380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.926400] Call Trace: [ 15.926417] <TASK> [ 15.926432] dump_stack_lvl+0x73/0xb0 [ 15.926462] print_report+0xd1/0x610 [ 15.926519] ? __virt_addr_valid+0x1db/0x2d0 [ 15.926543] ? kasan_atomics_helper+0xf10/0x5450 [ 15.926566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.926603] ? kasan_atomics_helper+0xf10/0x5450 [ 15.926655] kasan_report+0x141/0x180 [ 15.926679] ? kasan_atomics_helper+0xf10/0x5450 [ 15.926723] kasan_check_range+0x10c/0x1c0 [ 15.926749] __kasan_check_write+0x18/0x20 [ 15.926769] kasan_atomics_helper+0xf10/0x5450 [ 15.926794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.926819] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.926846] ? kasan_atomics+0x152/0x310 [ 15.926875] kasan_atomics+0x1dc/0x310 [ 15.926899] ? __pfx_kasan_atomics+0x10/0x10 [ 15.926955] ? __pfx_read_tsc+0x10/0x10 [ 15.926978] ? ktime_get_ts64+0x86/0x230 [ 15.927004] kunit_try_run_case+0x1a5/0x480 [ 15.927042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.927079] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.927157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.927186] ? __kthread_parkme+0x82/0x180 [ 15.927219] ? preempt_count_sub+0x50/0x80 [ 15.927245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.927271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.927298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.927325] kthread+0x337/0x6f0 [ 15.927346] ? trace_preempt_on+0x20/0xc0 [ 15.927371] ? __pfx_kthread+0x10/0x10 [ 15.927393] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.927417] ? calculate_sigpending+0x7b/0xa0 [ 15.927443] ? __pfx_kthread+0x10/0x10 [ 15.927466] ret_from_fork+0x116/0x1d0 [ 15.927486] ? __pfx_kthread+0x10/0x10 [ 15.927509] ret_from_fork_asm+0x1a/0x30 [ 15.927540] </TASK> [ 15.927552] [ 15.935458] Allocated by task 284: [ 15.935624] kasan_save_stack+0x45/0x70 [ 15.935807] kasan_save_track+0x18/0x40 [ 15.935990] kasan_save_alloc_info+0x3b/0x50 [ 15.936228] __kasan_kmalloc+0xb7/0xc0 [ 15.936369] __kmalloc_cache_noprof+0x189/0x420 [ 15.936576] kasan_atomics+0x95/0x310 [ 15.936769] kunit_try_run_case+0x1a5/0x480 [ 15.937019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.937316] kthread+0x337/0x6f0 [ 15.937535] ret_from_fork+0x116/0x1d0 [ 15.937738] ret_from_fork_asm+0x1a/0x30 [ 15.937936] [ 15.938011] The buggy address belongs to the object at ffff8881025adf00 [ 15.938011] which belongs to the cache kmalloc-64 of size 64 [ 15.938503] The buggy address is located 0 bytes to the right of [ 15.938503] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.939136] [ 15.939211] The buggy address belongs to the physical page: [ 15.939552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.939930] flags: 0x200000000000000(node=0|zone=2) [ 15.940124] page_type: f5(slab) [ 15.940247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.940575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.940965] page dumped because: kasan: bad access detected [ 15.941252] [ 15.941348] Memory state around the buggy address: [ 15.941628] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.941849] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.942187] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.942556] ^ [ 15.942846] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.943175] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.943459] ================================================================== [ 15.901749] ================================================================== [ 15.902511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.903378] Write of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.904199] [ 15.904405] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.904462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.904476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.904498] Call Trace: [ 15.904513] <TASK> [ 15.904528] dump_stack_lvl+0x73/0xb0 [ 15.904589] print_report+0xd1/0x610 [ 15.904612] ? __virt_addr_valid+0x1db/0x2d0 [ 15.904656] ? kasan_atomics_helper+0xe78/0x5450 [ 15.904679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.904704] ? kasan_atomics_helper+0xe78/0x5450 [ 15.904727] kasan_report+0x141/0x180 [ 15.904751] ? kasan_atomics_helper+0xe78/0x5450 [ 15.904778] kasan_check_range+0x10c/0x1c0 [ 15.904803] __kasan_check_write+0x18/0x20 [ 15.904824] kasan_atomics_helper+0xe78/0x5450 [ 15.904849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.904873] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.904901] ? kasan_atomics+0x152/0x310 [ 15.904929] kasan_atomics+0x1dc/0x310 [ 15.904953] ? __pfx_kasan_atomics+0x10/0x10 [ 15.904979] ? __pfx_read_tsc+0x10/0x10 [ 15.905002] ? ktime_get_ts64+0x86/0x230 [ 15.905028] kunit_try_run_case+0x1a5/0x480 [ 15.905065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.905090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.905134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.905160] ? __kthread_parkme+0x82/0x180 [ 15.905181] ? preempt_count_sub+0x50/0x80 [ 15.905207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.905233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.905260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.905288] kthread+0x337/0x6f0 [ 15.905308] ? trace_preempt_on+0x20/0xc0 [ 15.905333] ? __pfx_kthread+0x10/0x10 [ 15.905355] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.905378] ? calculate_sigpending+0x7b/0xa0 [ 15.905404] ? __pfx_kthread+0x10/0x10 [ 15.905427] ret_from_fork+0x116/0x1d0 [ 15.905448] ? __pfx_kthread+0x10/0x10 [ 15.905470] ret_from_fork_asm+0x1a/0x30 [ 15.905503] </TASK> [ 15.905513] [ 15.916217] Allocated by task 284: [ 15.916406] kasan_save_stack+0x45/0x70 [ 15.916618] kasan_save_track+0x18/0x40 [ 15.916869] kasan_save_alloc_info+0x3b/0x50 [ 15.917134] __kasan_kmalloc+0xb7/0xc0 [ 15.917273] __kmalloc_cache_noprof+0x189/0x420 [ 15.917433] kasan_atomics+0x95/0x310 [ 15.917612] kunit_try_run_case+0x1a5/0x480 [ 15.917872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.918171] kthread+0x337/0x6f0 [ 15.918346] ret_from_fork+0x116/0x1d0 [ 15.918571] ret_from_fork_asm+0x1a/0x30 [ 15.918818] [ 15.918920] The buggy address belongs to the object at ffff8881025adf00 [ 15.918920] which belongs to the cache kmalloc-64 of size 64 [ 15.919462] The buggy address is located 0 bytes to the right of [ 15.919462] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.919936] [ 15.920061] The buggy address belongs to the physical page: [ 15.920364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.920772] flags: 0x200000000000000(node=0|zone=2) [ 15.920993] page_type: f5(slab) [ 15.921195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.921551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.921830] page dumped because: kasan: bad access detected [ 15.922098] [ 15.922256] Memory state around the buggy address: [ 15.922556] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.922858] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.923192] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.923560] ^ [ 15.923729] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.924043] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.924440] ================================================================== [ 16.173481] ================================================================== [ 16.173907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 16.174154] Read of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.174643] [ 16.174890] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.174936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.174949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.174969] Call Trace: [ 16.174984] <TASK> [ 16.174998] dump_stack_lvl+0x73/0xb0 [ 16.175027] print_report+0xd1/0x610 [ 16.175063] ? __virt_addr_valid+0x1db/0x2d0 [ 16.175088] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.175111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.175137] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.175162] kasan_report+0x141/0x180 [ 16.175185] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.175249] kasan_check_range+0x10c/0x1c0 [ 16.175275] __kasan_check_read+0x15/0x20 [ 16.175296] kasan_atomics_helper+0x13b5/0x5450 [ 16.175322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.175358] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.175384] ? kasan_atomics+0x152/0x310 [ 16.175444] kasan_atomics+0x1dc/0x310 [ 16.175469] ? __pfx_kasan_atomics+0x10/0x10 [ 16.175494] ? __pfx_read_tsc+0x10/0x10 [ 16.175518] ? ktime_get_ts64+0x86/0x230 [ 16.175543] kunit_try_run_case+0x1a5/0x480 [ 16.175599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.175649] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.175674] ? __kthread_parkme+0x82/0x180 [ 16.175726] ? preempt_count_sub+0x50/0x80 [ 16.175752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.175804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.175863] kthread+0x337/0x6f0 [ 16.175885] ? trace_preempt_on+0x20/0xc0 [ 16.175910] ? __pfx_kthread+0x10/0x10 [ 16.175932] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.175983] ? calculate_sigpending+0x7b/0xa0 [ 16.176010] ? __pfx_kthread+0x10/0x10 [ 16.176033] ret_from_fork+0x116/0x1d0 [ 16.176064] ? __pfx_kthread+0x10/0x10 [ 16.176086] ret_from_fork_asm+0x1a/0x30 [ 16.176118] </TASK> [ 16.176161] [ 16.184365] Allocated by task 284: [ 16.184563] kasan_save_stack+0x45/0x70 [ 16.184732] kasan_save_track+0x18/0x40 [ 16.184959] kasan_save_alloc_info+0x3b/0x50 [ 16.185202] __kasan_kmalloc+0xb7/0xc0 [ 16.185390] __kmalloc_cache_noprof+0x189/0x420 [ 16.185646] kasan_atomics+0x95/0x310 [ 16.185842] kunit_try_run_case+0x1a5/0x480 [ 16.186038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.186368] kthread+0x337/0x6f0 [ 16.186557] ret_from_fork+0x116/0x1d0 [ 16.186759] ret_from_fork_asm+0x1a/0x30 [ 16.186986] [ 16.187179] The buggy address belongs to the object at ffff8881025adf00 [ 16.187179] which belongs to the cache kmalloc-64 of size 64 [ 16.187526] The buggy address is located 0 bytes to the right of [ 16.187526] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.187977] [ 16.188109] The buggy address belongs to the physical page: [ 16.188359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.188705] flags: 0x200000000000000(node=0|zone=2) [ 16.188906] page_type: f5(slab) [ 16.189023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.189258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.189478] page dumped because: kasan: bad access detected [ 16.189784] [ 16.189881] Memory state around the buggy address: [ 16.190187] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.190625] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.191008] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.191633] ^ [ 16.191891] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.192298] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.192513] ================================================================== [ 16.723750] ================================================================== [ 16.724080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.724444] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.724835] [ 16.724976] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.725140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.725157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.725179] Call Trace: [ 16.725195] <TASK> [ 16.725211] dump_stack_lvl+0x73/0xb0 [ 16.725291] print_report+0xd1/0x610 [ 16.725326] ? __virt_addr_valid+0x1db/0x2d0 [ 16.725350] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.725373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.725399] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.725422] kasan_report+0x141/0x180 [ 16.725445] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.725473] kasan_check_range+0x10c/0x1c0 [ 16.725499] __kasan_check_write+0x18/0x20 [ 16.725520] kasan_atomics_helper+0x20c8/0x5450 [ 16.725545] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.725570] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.725596] ? kasan_atomics+0x152/0x310 [ 16.725624] kasan_atomics+0x1dc/0x310 [ 16.725649] ? __pfx_kasan_atomics+0x10/0x10 [ 16.725675] ? __pfx_read_tsc+0x10/0x10 [ 16.725697] ? ktime_get_ts64+0x86/0x230 [ 16.725723] kunit_try_run_case+0x1a5/0x480 [ 16.725748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.725774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.725800] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.725826] ? __kthread_parkme+0x82/0x180 [ 16.725848] ? preempt_count_sub+0x50/0x80 [ 16.725873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.725899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.725925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.725953] kthread+0x337/0x6f0 [ 16.725973] ? trace_preempt_on+0x20/0xc0 [ 16.725998] ? __pfx_kthread+0x10/0x10 [ 16.726019] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.726043] ? calculate_sigpending+0x7b/0xa0 [ 16.726077] ? __pfx_kthread+0x10/0x10 [ 16.726100] ret_from_fork+0x116/0x1d0 [ 16.726140] ? __pfx_kthread+0x10/0x10 [ 16.726162] ret_from_fork_asm+0x1a/0x30 [ 16.726194] </TASK> [ 16.726205] [ 16.736758] Allocated by task 284: [ 16.736906] kasan_save_stack+0x45/0x70 [ 16.737072] kasan_save_track+0x18/0x40 [ 16.737658] kasan_save_alloc_info+0x3b/0x50 [ 16.738553] __kasan_kmalloc+0xb7/0xc0 [ 16.739120] __kmalloc_cache_noprof+0x189/0x420 [ 16.739929] kasan_atomics+0x95/0x310 [ 16.740438] kunit_try_run_case+0x1a5/0x480 [ 16.741281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.741901] kthread+0x337/0x6f0 [ 16.742039] ret_from_fork+0x116/0x1d0 [ 16.742211] ret_from_fork_asm+0x1a/0x30 [ 16.742356] [ 16.742431] The buggy address belongs to the object at ffff8881025adf00 [ 16.742431] which belongs to the cache kmalloc-64 of size 64 [ 16.743616] The buggy address is located 0 bytes to the right of [ 16.743616] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.744556] [ 16.744668] The buggy address belongs to the physical page: [ 16.744948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.745556] flags: 0x200000000000000(node=0|zone=2) [ 16.745788] page_type: f5(slab) [ 16.746115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.746557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.746892] page dumped because: kasan: bad access detected [ 16.747400] [ 16.747593] Memory state around the buggy address: [ 16.747788] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.748205] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.748767] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.749082] ^ [ 16.749370] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.749772] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.750077] ================================================================== [ 16.347019] ================================================================== [ 16.347393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.347749] Write of size 8 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 16.348060] [ 16.348194] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.348237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.348250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.348272] Call Trace: [ 16.348288] <TASK> [ 16.348303] dump_stack_lvl+0x73/0xb0 [ 16.348332] print_report+0xd1/0x610 [ 16.348356] ? __virt_addr_valid+0x1db/0x2d0 [ 16.348380] ? kasan_atomics_helper+0x177f/0x5450 [ 16.348403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.348428] ? kasan_atomics_helper+0x177f/0x5450 [ 16.348451] kasan_report+0x141/0x180 [ 16.348475] ? kasan_atomics_helper+0x177f/0x5450 [ 16.348504] kasan_check_range+0x10c/0x1c0 [ 16.348528] __kasan_check_write+0x18/0x20 [ 16.348562] kasan_atomics_helper+0x177f/0x5450 [ 16.348587] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.348611] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.348639] ? kasan_atomics+0x152/0x310 [ 16.348677] kasan_atomics+0x1dc/0x310 [ 16.348701] ? __pfx_kasan_atomics+0x10/0x10 [ 16.348727] ? __pfx_read_tsc+0x10/0x10 [ 16.348749] ? ktime_get_ts64+0x86/0x230 [ 16.348775] kunit_try_run_case+0x1a5/0x480 [ 16.348801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.348826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.348852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.348877] ? __kthread_parkme+0x82/0x180 [ 16.348898] ? preempt_count_sub+0x50/0x80 [ 16.348924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.348950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.348977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.349004] kthread+0x337/0x6f0 [ 16.349024] ? trace_preempt_on+0x20/0xc0 [ 16.349049] ? __pfx_kthread+0x10/0x10 [ 16.349083] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.349107] ? calculate_sigpending+0x7b/0xa0 [ 16.349145] ? __pfx_kthread+0x10/0x10 [ 16.349168] ret_from_fork+0x116/0x1d0 [ 16.349189] ? __pfx_kthread+0x10/0x10 [ 16.349212] ret_from_fork_asm+0x1a/0x30 [ 16.349245] </TASK> [ 16.349256] [ 16.358682] Allocated by task 284: [ 16.358825] kasan_save_stack+0x45/0x70 [ 16.358975] kasan_save_track+0x18/0x40 [ 16.359242] kasan_save_alloc_info+0x3b/0x50 [ 16.359622] __kasan_kmalloc+0xb7/0xc0 [ 16.360082] __kmalloc_cache_noprof+0x189/0x420 [ 16.360486] kasan_atomics+0x95/0x310 [ 16.360812] kunit_try_run_case+0x1a5/0x480 [ 16.361293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.361754] kthread+0x337/0x6f0 [ 16.362045] ret_from_fork+0x116/0x1d0 [ 16.362425] ret_from_fork_asm+0x1a/0x30 [ 16.362781] [ 16.362943] The buggy address belongs to the object at ffff8881025adf00 [ 16.362943] which belongs to the cache kmalloc-64 of size 64 [ 16.364011] The buggy address is located 0 bytes to the right of [ 16.364011] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 16.364889] [ 16.364965] The buggy address belongs to the physical page: [ 16.365172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 16.365899] flags: 0x200000000000000(node=0|zone=2) [ 16.366400] page_type: f5(slab) [ 16.366689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.367397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.368059] page dumped because: kasan: bad access detected [ 16.368432] [ 16.368505] Memory state around the buggy address: [ 16.368666] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.368886] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.369129] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.369740] ^ [ 16.370255] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.370850] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.371518] ================================================================== [ 15.388967] ================================================================== [ 15.389416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.390034] Read of size 4 at addr ffff8881025adf30 by task kunit_try_catch/284 [ 15.390342] [ 15.390454] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.390510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.390997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.391032] Call Trace: [ 15.391083] <TASK> [ 15.391098] dump_stack_lvl+0x73/0xb0 [ 15.391149] print_report+0xd1/0x610 [ 15.391174] ? __virt_addr_valid+0x1db/0x2d0 [ 15.391202] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.391228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.391258] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.391285] kasan_report+0x141/0x180 [ 15.391310] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.391342] __asan_report_load4_noabort+0x18/0x20 [ 15.391373] kasan_atomics_helper+0x4b88/0x5450 [ 15.391400] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.391428] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.391459] ? kasan_atomics+0x152/0x310 [ 15.391489] kasan_atomics+0x1dc/0x310 [ 15.391515] ? __pfx_kasan_atomics+0x10/0x10 [ 15.391544] ? __pfx_read_tsc+0x10/0x10 [ 15.391568] ? ktime_get_ts64+0x86/0x230 [ 15.391597] kunit_try_run_case+0x1a5/0x480 [ 15.391625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.391661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.391692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.391723] ? __kthread_parkme+0x82/0x180 [ 15.391747] ? preempt_count_sub+0x50/0x80 [ 15.391775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.391805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.391837] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.391869] kthread+0x337/0x6f0 [ 15.391891] ? trace_preempt_on+0x20/0xc0 [ 15.391918] ? __pfx_kthread+0x10/0x10 [ 15.391942] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.391969] ? calculate_sigpending+0x7b/0xa0 [ 15.391998] ? __pfx_kthread+0x10/0x10 [ 15.392023] ret_from_fork+0x116/0x1d0 [ 15.392046] ? __pfx_kthread+0x10/0x10 [ 15.392081] ret_from_fork_asm+0x1a/0x30 [ 15.392116] </TASK> [ 15.392127] [ 15.402974] Allocated by task 284: [ 15.403384] kasan_save_stack+0x45/0x70 [ 15.403673] kasan_save_track+0x18/0x40 [ 15.403955] kasan_save_alloc_info+0x3b/0x50 [ 15.404256] __kasan_kmalloc+0xb7/0xc0 [ 15.404524] __kmalloc_cache_noprof+0x189/0x420 [ 15.404740] kasan_atomics+0x95/0x310 [ 15.405151] kunit_try_run_case+0x1a5/0x480 [ 15.405384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.405719] kthread+0x337/0x6f0 [ 15.406194] ret_from_fork+0x116/0x1d0 [ 15.406534] ret_from_fork_asm+0x1a/0x30 [ 15.406755] [ 15.406861] The buggy address belongs to the object at ffff8881025adf00 [ 15.406861] which belongs to the cache kmalloc-64 of size 64 [ 15.407554] The buggy address is located 0 bytes to the right of [ 15.407554] allocated 48-byte region [ffff8881025adf00, ffff8881025adf30) [ 15.408310] [ 15.408562] The buggy address belongs to the physical page: [ 15.408874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ad [ 15.409409] flags: 0x200000000000000(node=0|zone=2) [ 15.409684] page_type: f5(slab) [ 15.409948] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.410414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.410894] page dumped because: kasan: bad access detected [ 15.411136] [ 15.411239] Memory state around the buggy address: [ 15.411451] ffff8881025ade00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.412008] ffff8881025ade80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.412466] >ffff8881025adf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.412922] ^ [ 15.413147] ffff8881025adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.413559] ffff8881025ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.414021] ==================================================================