Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.370504] ================================================================== [ 19.370557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.370609] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.370668] [ 19.370700] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.371151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.371637] Hardware name: linux,dummy-virt (DT) [ 19.371703] Call trace: [ 19.371729] show_stack+0x20/0x38 (C) [ 19.371784] dump_stack_lvl+0x8c/0xd0 [ 19.372132] print_report+0x118/0x5d0 [ 19.372473] kasan_report+0xdc/0x128 [ 19.372707] kasan_check_range+0x100/0x1a8 [ 19.372777] __kasan_check_read+0x20/0x30 [ 19.373092] kasan_atomics_helper+0xdd4/0x4858 [ 19.373189] kasan_atomics+0x198/0x2e0 [ 19.373307] kunit_try_run_case+0x170/0x3f0 [ 19.373361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.373414] kthread+0x328/0x630 [ 19.373458] ret_from_fork+0x10/0x20 [ 19.373507] [ 19.373765] Allocated by task 265: [ 19.374108] kasan_save_stack+0x3c/0x68 [ 19.374163] kasan_save_track+0x20/0x40 [ 19.374421] kasan_save_alloc_info+0x40/0x58 [ 19.374695] __kasan_kmalloc+0xd4/0xd8 [ 19.374875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.375085] kasan_atomics+0xb8/0x2e0 [ 19.375226] kunit_try_run_case+0x170/0x3f0 [ 19.375272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.375347] kthread+0x328/0x630 [ 19.375398] ret_from_fork+0x10/0x20 [ 19.375451] [ 19.375475] The buggy address belongs to the object at fff00000c5b24500 [ 19.375475] which belongs to the cache kmalloc-64 of size 64 [ 19.375542] The buggy address is located 0 bytes to the right of [ 19.375542] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.375638] [ 19.375660] The buggy address belongs to the physical page: [ 19.375694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.375759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.375808] page_type: f5(slab) [ 19.375850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.375916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.375959] page dumped because: kasan: bad access detected [ 19.375999] [ 19.376030] Memory state around the buggy address: [ 19.376088] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.376134] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.376181] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.376224] ^ [ 19.376271] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.376317] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.376358] ================================================================== [ 19.475013] ================================================================== [ 19.475267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.475348] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.475411] [ 19.475562] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.475660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.475690] Hardware name: linux,dummy-virt (DT) [ 19.475730] Call trace: [ 19.475757] show_stack+0x20/0x38 (C) [ 19.475808] dump_stack_lvl+0x8c/0xd0 [ 19.475858] print_report+0x118/0x5d0 [ 19.475917] kasan_report+0xdc/0x128 [ 19.475963] kasan_check_range+0x100/0x1a8 [ 19.476013] __kasan_check_write+0x20/0x30 [ 19.476059] kasan_atomics_helper+0x11f8/0x4858 [ 19.476109] kasan_atomics+0x198/0x2e0 [ 19.476155] kunit_try_run_case+0x170/0x3f0 [ 19.476204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.476574] kthread+0x328/0x630 [ 19.476887] ret_from_fork+0x10/0x20 [ 19.476973] [ 19.477020] Allocated by task 265: [ 19.477089] kasan_save_stack+0x3c/0x68 [ 19.477135] kasan_save_track+0x20/0x40 [ 19.477216] kasan_save_alloc_info+0x40/0x58 [ 19.477259] __kasan_kmalloc+0xd4/0xd8 [ 19.477326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.477678] kasan_atomics+0xb8/0x2e0 [ 19.477730] kunit_try_run_case+0x170/0x3f0 [ 19.478043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.478126] kthread+0x328/0x630 [ 19.478163] ret_from_fork+0x10/0x20 [ 19.478201] [ 19.478235] The buggy address belongs to the object at fff00000c5b24500 [ 19.478235] which belongs to the cache kmalloc-64 of size 64 [ 19.478323] The buggy address is located 0 bytes to the right of [ 19.478323] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.478392] [ 19.478416] The buggy address belongs to the physical page: [ 19.478449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.478505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.478556] page_type: f5(slab) [ 19.478596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.478656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.478701] page dumped because: kasan: bad access detected [ 19.478735] [ 19.478757] Memory state around the buggy address: [ 19.478790] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.478836] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.478881] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.478935] ^ [ 19.478971] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.479017] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.479059] ================================================================== [ 19.530220] ================================================================== [ 19.530299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.531048] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.531427] [ 19.531463] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.531549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.531577] Hardware name: linux,dummy-virt (DT) [ 19.531610] Call trace: [ 19.531633] show_stack+0x20/0x38 (C) [ 19.531687] dump_stack_lvl+0x8c/0xd0 [ 19.532786] print_report+0x118/0x5d0 [ 19.532853] kasan_report+0xdc/0x128 [ 19.532914] kasan_check_range+0x100/0x1a8 [ 19.532964] __kasan_check_write+0x20/0x30 [ 19.534368] kasan_atomics_helper+0x14e4/0x4858 [ 19.534446] kasan_atomics+0x198/0x2e0 [ 19.534496] kunit_try_run_case+0x170/0x3f0 [ 19.534546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.535708] kthread+0x328/0x630 [ 19.536282] ret_from_fork+0x10/0x20 [ 19.536652] [ 19.536681] Allocated by task 265: [ 19.536713] kasan_save_stack+0x3c/0x68 [ 19.536761] kasan_save_track+0x20/0x40 [ 19.536800] kasan_save_alloc_info+0x40/0x58 [ 19.536843] __kasan_kmalloc+0xd4/0xd8 [ 19.538333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.538439] kasan_atomics+0xb8/0x2e0 [ 19.538478] kunit_try_run_case+0x170/0x3f0 [ 19.538522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.538568] kthread+0x328/0x630 [ 19.538604] ret_from_fork+0x10/0x20 [ 19.538648] [ 19.540315] The buggy address belongs to the object at fff00000c5b24500 [ 19.540315] which belongs to the cache kmalloc-64 of size 64 [ 19.540725] The buggy address is located 0 bytes to the right of [ 19.540725] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.540802] [ 19.540826] The buggy address belongs to the physical page: [ 19.541884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.542010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.542062] page_type: f5(slab) [ 19.542104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.543662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.543942] page dumped because: kasan: bad access detected [ 19.544441] [ 19.544518] Memory state around the buggy address: [ 19.544634] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544684] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544730] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.544773] ^ [ 19.546166] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.547141] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.547418] ================================================================== [ 19.596684] ================================================================== [ 19.597172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.597468] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.597887] [ 19.597958] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.598047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.598274] Hardware name: linux,dummy-virt (DT) [ 19.598367] Call trace: [ 19.598397] show_stack+0x20/0x38 (C) [ 19.598637] dump_stack_lvl+0x8c/0xd0 [ 19.599165] print_report+0x118/0x5d0 [ 19.599330] kasan_report+0xdc/0x128 [ 19.599758] kasan_check_range+0x100/0x1a8 [ 19.599824] __kasan_check_write+0x20/0x30 [ 19.600552] kasan_atomics_helper+0x1644/0x4858 [ 19.600666] kasan_atomics+0x198/0x2e0 [ 19.601310] kunit_try_run_case+0x170/0x3f0 [ 19.601589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.601833] kthread+0x328/0x630 [ 19.601983] ret_from_fork+0x10/0x20 [ 19.602161] [ 19.602546] Allocated by task 265: [ 19.602586] kasan_save_stack+0x3c/0x68 [ 19.602809] kasan_save_track+0x20/0x40 [ 19.602931] kasan_save_alloc_info+0x40/0x58 [ 19.603074] __kasan_kmalloc+0xd4/0xd8 [ 19.603114] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.603156] kasan_atomics+0xb8/0x2e0 [ 19.603800] kunit_try_run_case+0x170/0x3f0 [ 19.603858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.604045] kthread+0x328/0x630 [ 19.604427] ret_from_fork+0x10/0x20 [ 19.604630] [ 19.605004] The buggy address belongs to the object at fff00000c5b24500 [ 19.605004] which belongs to the cache kmalloc-64 of size 64 [ 19.605243] The buggy address is located 0 bytes to the right of [ 19.605243] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.605481] [ 19.605771] The buggy address belongs to the physical page: [ 19.606025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.606090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.606142] page_type: f5(slab) [ 19.606185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.606239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.606284] page dumped because: kasan: bad access detected [ 19.606318] [ 19.606340] Memory state around the buggy address: [ 19.606374] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.606420] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.606467] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.606910] ^ [ 19.607147] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.607197] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.607237] ================================================================== [ 19.566977] ================================================================== [ 19.567033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.567086] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.567137] [ 19.567172] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.567258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.567286] Hardware name: linux,dummy-virt (DT) [ 19.567320] Call trace: [ 19.568774] show_stack+0x20/0x38 (C) [ 19.569014] dump_stack_lvl+0x8c/0xd0 [ 19.569912] print_report+0x118/0x5d0 [ 19.570637] kasan_report+0xdc/0x128 [ 19.571131] kasan_check_range+0x100/0x1a8 [ 19.571704] __kasan_check_write+0x20/0x30 [ 19.571849] kasan_atomics_helper+0x15b4/0x4858 [ 19.572009] kasan_atomics+0x198/0x2e0 [ 19.572079] kunit_try_run_case+0x170/0x3f0 [ 19.572131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.572380] kthread+0x328/0x630 [ 19.573423] ret_from_fork+0x10/0x20 [ 19.574154] [ 19.574183] Allocated by task 265: [ 19.574216] kasan_save_stack+0x3c/0x68 [ 19.574266] kasan_save_track+0x20/0x40 [ 19.574561] kasan_save_alloc_info+0x40/0x58 [ 19.575006] __kasan_kmalloc+0xd4/0xd8 [ 19.575673] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.575785] kasan_atomics+0xb8/0x2e0 [ 19.575826] kunit_try_run_case+0x170/0x3f0 [ 19.576585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.576990] kthread+0x328/0x630 [ 19.577687] ret_from_fork+0x10/0x20 [ 19.577980] [ 19.578057] The buggy address belongs to the object at fff00000c5b24500 [ 19.578057] which belongs to the cache kmalloc-64 of size 64 [ 19.578308] The buggy address is located 0 bytes to the right of [ 19.578308] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.578637] [ 19.578660] The buggy address belongs to the physical page: [ 19.578936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.579747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.580789] page_type: f5(slab) [ 19.581111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.581713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.581800] page dumped because: kasan: bad access detected [ 19.582006] [ 19.582679] Memory state around the buggy address: [ 19.582747] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.582796] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.583072] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.583119] ^ [ 19.583204] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.583428] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.583743] ================================================================== [ 19.667687] ================================================================== [ 19.667819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.667935] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.668543] [ 19.668579] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.669878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.669974] Hardware name: linux,dummy-virt (DT) [ 19.670006] Call trace: [ 19.670834] show_stack+0x20/0x38 (C) [ 19.671240] dump_stack_lvl+0x8c/0xd0 [ 19.671854] print_report+0x118/0x5d0 [ 19.671942] kasan_report+0xdc/0x128 [ 19.672012] kasan_check_range+0x100/0x1a8 [ 19.672114] __kasan_check_write+0x20/0x30 [ 19.672414] kasan_atomics_helper+0x17ec/0x4858 [ 19.673082] kasan_atomics+0x198/0x2e0 [ 19.673498] kunit_try_run_case+0x170/0x3f0 [ 19.673837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.673934] kthread+0x328/0x630 [ 19.674350] ret_from_fork+0x10/0x20 [ 19.675344] [ 19.675459] Allocated by task 265: [ 19.675608] kasan_save_stack+0x3c/0x68 [ 19.675972] kasan_save_track+0x20/0x40 [ 19.676544] kasan_save_alloc_info+0x40/0x58 [ 19.676723] __kasan_kmalloc+0xd4/0xd8 [ 19.677209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.677737] kasan_atomics+0xb8/0x2e0 [ 19.679161] kunit_try_run_case+0x170/0x3f0 [ 19.679488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.679546] kthread+0x328/0x630 [ 19.679580] ret_from_fork+0x10/0x20 [ 19.679620] [ 19.679645] The buggy address belongs to the object at fff00000c5b24500 [ 19.679645] which belongs to the cache kmalloc-64 of size 64 [ 19.679706] The buggy address is located 0 bytes to the right of [ 19.679706] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.680115] [ 19.680357] The buggy address belongs to the physical page: [ 19.680421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.680640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.680749] page_type: f5(slab) [ 19.680791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.680846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.680890] page dumped because: kasan: bad access detected [ 19.680936] [ 19.680979] Memory state around the buggy address: [ 19.681156] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.681395] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.681523] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.681604] ^ [ 19.681752] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.681840] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.681883] ================================================================== [ 19.584511] ================================================================== [ 19.584566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.584616] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.584669] [ 19.584701] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.584784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.584813] Hardware name: linux,dummy-virt (DT) [ 19.584846] Call trace: [ 19.584869] show_stack+0x20/0x38 (C) [ 19.586558] dump_stack_lvl+0x8c/0xd0 [ 19.586652] print_report+0x118/0x5d0 [ 19.586708] kasan_report+0xdc/0x128 [ 19.586758] __asan_report_load8_noabort+0x20/0x30 [ 19.586812] kasan_atomics_helper+0x3db0/0x4858 [ 19.586864] kasan_atomics+0x198/0x2e0 [ 19.586920] kunit_try_run_case+0x170/0x3f0 [ 19.586971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.587028] kthread+0x328/0x630 [ 19.587795] ret_from_fork+0x10/0x20 [ 19.587874] [ 19.587894] Allocated by task 265: [ 19.588128] kasan_save_stack+0x3c/0x68 [ 19.588173] kasan_save_track+0x20/0x40 [ 19.588324] kasan_save_alloc_info+0x40/0x58 [ 19.588730] __kasan_kmalloc+0xd4/0xd8 [ 19.589041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.589287] kasan_atomics+0xb8/0x2e0 [ 19.589331] kunit_try_run_case+0x170/0x3f0 [ 19.589756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.590020] kthread+0x328/0x630 [ 19.590739] ret_from_fork+0x10/0x20 [ 19.590810] [ 19.590834] The buggy address belongs to the object at fff00000c5b24500 [ 19.590834] which belongs to the cache kmalloc-64 of size 64 [ 19.590905] The buggy address is located 0 bytes to the right of [ 19.590905] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.591589] [ 19.592225] The buggy address belongs to the physical page: [ 19.592557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.592620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.592986] page_type: f5(slab) [ 19.593360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.593701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.593754] page dumped because: kasan: bad access detected [ 19.594056] [ 19.594148] Memory state around the buggy address: [ 19.594451] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.594538] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.594829] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.595225] ^ [ 19.595275] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.595708] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.596157] ================================================================== [ 19.243298] ================================================================== [ 19.243352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 19.243550] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.243612] [ 19.243676] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.243824] Hardware name: linux,dummy-virt (DT) [ 19.244124] print_report+0x118/0x5d0 [ 19.245341] Allocated by task 265: [ 19.245782] kasan_atomics+0xb8/0x2e0 [ 19.246562] The buggy address is located 0 bytes to the right of [ 19.246562] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.246627] [ 19.247051] The buggy address belongs to the physical page: [ 19.247184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.247270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.247406] page_type: f5(slab) [ 19.247464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.247527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.248238] page dumped because: kasan: bad access detected [ 19.248280] [ 19.248302] Memory state around the buggy address: [ 19.248337] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.248390] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.248436] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.248478] ^ [ 19.248513] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.248559] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.248600] ================================================================== [ 19.170265] ================================================================== [ 19.170364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 19.170546] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.170598] [ 19.170633] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.171309] Hardware name: linux,dummy-virt (DT) [ 19.171425] Call trace: [ 19.171451] show_stack+0x20/0x38 (C) [ 19.171502] dump_stack_lvl+0x8c/0xd0 [ 19.171552] print_report+0x118/0x5d0 [ 19.171599] kasan_report+0xdc/0x128 [ 19.171697] __kasan_check_write+0x20/0x30 [ 19.171792] kasan_atomics+0x198/0x2e0 [ 19.173694] kasan_save_stack+0x3c/0x68 [ 19.174059] kasan_save_track+0x20/0x40 [ 19.174103] kasan_save_alloc_info+0x40/0x58 [ 19.174147] __kasan_kmalloc+0xd4/0xd8 [ 19.174250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.174563] kasan_atomics+0xb8/0x2e0 [ 19.174785] kthread+0x328/0x630 [ 19.175341] The buggy address is located 0 bytes to the right of [ 19.175341] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.175651] [ 19.175697] The buggy address belongs to the physical page: [ 19.175842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.177953] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.177998] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.178039] ^ [ 19.178073] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.178245] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.178516] ================================================================== [ 19.650735] ================================================================== [ 19.650978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.651075] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.651130] [ 19.651162] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.651275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.651386] Hardware name: linux,dummy-virt (DT) [ 19.651424] Call trace: [ 19.651449] show_stack+0x20/0x38 (C) [ 19.651499] dump_stack_lvl+0x8c/0xd0 [ 19.651549] print_report+0x118/0x5d0 [ 19.651617] kasan_report+0xdc/0x128 [ 19.651705] kasan_check_range+0x100/0x1a8 [ 19.651920] __kasan_check_write+0x20/0x30 [ 19.652145] kasan_atomics_helper+0x175c/0x4858 [ 19.652196] kasan_atomics+0x198/0x2e0 [ 19.652242] kunit_try_run_case+0x170/0x3f0 [ 19.652293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.652349] kthread+0x328/0x630 [ 19.652391] ret_from_fork+0x10/0x20 [ 19.652442] [ 19.652463] Allocated by task 265: [ 19.652493] kasan_save_stack+0x3c/0x68 [ 19.652563] kasan_save_track+0x20/0x40 [ 19.652605] kasan_save_alloc_info+0x40/0x58 [ 19.652647] __kasan_kmalloc+0xd4/0xd8 [ 19.652687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.652734] kasan_atomics+0xb8/0x2e0 [ 19.653098] kunit_try_run_case+0x170/0x3f0 [ 19.653860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.653963] kthread+0x328/0x630 [ 19.654000] ret_from_fork+0x10/0x20 [ 19.654187] [ 19.654333] The buggy address belongs to the object at fff00000c5b24500 [ 19.654333] which belongs to the cache kmalloc-64 of size 64 [ 19.655113] The buggy address is located 0 bytes to the right of [ 19.655113] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.655765] [ 19.655907] The buggy address belongs to the physical page: [ 19.656264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.656331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.657116] page_type: f5(slab) [ 19.657444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.658102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.658187] page dumped because: kasan: bad access detected [ 19.658325] [ 19.658347] Memory state around the buggy address: [ 19.660402] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660609] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660853] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.662652] ^ [ 19.662705] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.662754] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.662797] ================================================================== [ 19.479246] ================================================================== [ 19.479999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.480068] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.480120] [ 19.480152] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.480236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.480265] Hardware name: linux,dummy-virt (DT) [ 19.480296] Call trace: [ 19.480321] show_stack+0x20/0x38 (C) [ 19.480387] dump_stack_lvl+0x8c/0xd0 [ 19.480438] print_report+0x118/0x5d0 [ 19.480487] kasan_report+0xdc/0x128 [ 19.480533] kasan_check_range+0x100/0x1a8 [ 19.480584] __kasan_check_write+0x20/0x30 [ 19.480630] kasan_atomics_helper+0x126c/0x4858 [ 19.480680] kasan_atomics+0x198/0x2e0 [ 19.480725] kunit_try_run_case+0x170/0x3f0 [ 19.480790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.480845] kthread+0x328/0x630 [ 19.480887] ret_from_fork+0x10/0x20 [ 19.481934] [ 19.481985] Allocated by task 265: [ 19.482167] kasan_save_stack+0x3c/0x68 [ 19.482292] kasan_save_track+0x20/0x40 [ 19.482335] kasan_save_alloc_info+0x40/0x58 [ 19.482377] __kasan_kmalloc+0xd4/0xd8 [ 19.482417] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.482837] kasan_atomics+0xb8/0x2e0 [ 19.483356] kunit_try_run_case+0x170/0x3f0 [ 19.483499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.483645] kthread+0x328/0x630 [ 19.483688] ret_from_fork+0x10/0x20 [ 19.483853] [ 19.484097] The buggy address belongs to the object at fff00000c5b24500 [ 19.484097] which belongs to the cache kmalloc-64 of size 64 [ 19.484522] The buggy address is located 0 bytes to the right of [ 19.484522] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.485116] [ 19.485360] The buggy address belongs to the physical page: [ 19.485498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.485622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.485923] page_type: f5(slab) [ 19.486174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.486247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.486449] page dumped because: kasan: bad access detected [ 19.486493] [ 19.486516] Memory state around the buggy address: [ 19.486923] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.487382] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.487438] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.487480] ^ [ 19.487518] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.487564] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.487930] ================================================================== [ 19.289336] ================================================================== [ 19.289872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.290117] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.290290] [ 19.290822] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.290976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.291029] Hardware name: linux,dummy-virt (DT) [ 19.291180] Call trace: [ 19.291327] show_stack+0x20/0x38 (C) [ 19.291579] dump_stack_lvl+0x8c/0xd0 [ 19.291788] print_report+0x118/0x5d0 [ 19.292067] kasan_report+0xdc/0x128 [ 19.292556] kasan_check_range+0x100/0x1a8 [ 19.293954] ret_from_fork+0x10/0x20 [ 19.294011] [ 19.294032] Allocated by task 265: [ 19.294334] kasan_save_stack+0x3c/0x68 [ 19.294697] kasan_save_track+0x20/0x40 [ 19.294965] kasan_save_alloc_info+0x40/0x58 [ 19.295061] __kasan_kmalloc+0xd4/0xd8 [ 19.295215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.295396] kasan_atomics+0xb8/0x2e0 [ 19.296465] kunit_try_run_case+0x170/0x3f0 [ 19.296643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.296742] kthread+0x328/0x630 [ 19.296787] ret_from_fork+0x10/0x20 [ 19.296966] [ 19.297115] The buggy address belongs to the object at fff00000c5b24500 [ 19.297115] which belongs to the cache kmalloc-64 of size 64 [ 19.297282] The buggy address is located 0 bytes to the right of [ 19.297282] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.297357] [ 19.297401] The buggy address belongs to the physical page: [ 19.297671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.298004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.298081] page_type: f5(slab) [ 19.298129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.298184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.298408] page dumped because: kasan: bad access detected [ 19.298659] [ 19.298684] Memory state around the buggy address: [ 19.298737] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.299195] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.301455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.304044] ret_from_fork+0x10/0x20 [ 19.305982] kunit_try_run_case+0x170/0x3f0 [ 19.306443] The buggy address belongs to the physical page: [ 19.306963] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.307809] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.311112] kasan_save_stack+0x3c/0x68 [ 19.311273] kasan_save_track+0x20/0x40 [ 19.312323] ret_from_fork+0x10/0x20 [ 19.312925] [ 19.313742] page_type: f5(slab) [ 19.314596] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.316394] Read of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.318933] kasan_save_alloc_info+0x40/0x58 [ 19.321220] [ 19.321916] The buggy address is located 0 bytes to the right of [ 19.321916] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.323569] [ 19.324540] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.329186] [ 19.329645] kasan_save_alloc_info+0x40/0x58 [ 19.329951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.331218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.331614] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.332798] kasan_atomics+0x198/0x2e0 [ 19.335065] kasan_atomics+0xb8/0x2e0 [ 19.335193] kunit_try_run_case+0x170/0x3f0 [ 19.335239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.335645] kthread+0x328/0x630 [ 19.335764] ret_from_fork+0x10/0x20 [ 19.335807] [ 19.335846] The buggy address belongs to the object at fff00000c5b24500 [ 19.335846] which belongs to the cache kmalloc-64 of size 64 [ 19.336217] The buggy address is located 0 bytes to the right of [ 19.336217] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.336330] [ 19.336356] The buggy address belongs to the physical page: [ 19.336396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.336472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.336787] page_type: f5(slab) [ 19.336914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.337194] page dumped because: kasan: bad access detected [ 19.337883] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.338473] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.339598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.340071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.340850] dump_stack_lvl+0x8c/0xd0 [ 19.341053] print_report+0x118/0x5d0 [ 19.341154] kasan_report+0xdc/0x128 [ 19.341260] kasan_check_range+0x100/0x1a8 [ 19.341314] __kasan_check_write+0x20/0x30 [ 19.341380] kasan_atomics_helper+0xca0/0x4858 [ 19.341716] ret_from_fork+0x10/0x20 [ 19.342960] kasan_atomics+0xb8/0x2e0 [ 19.343102] kunit_try_run_case+0x170/0x3f0 [ 19.343182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.343294] kthread+0x328/0x630 [ 19.343359] ret_from_fork+0x10/0x20 [ 19.343483] [ 19.343522] The buggy address belongs to the object at fff00000c5b24500 [ 19.343522] which belongs to the cache kmalloc-64 of size 64 [ 19.343615] The buggy address is located 0 bytes to the right of [ 19.343615] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.343824] [ 19.344098] The buggy address belongs to the physical page: [ 19.344223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.344347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.344402] page_type: f5(slab) [ 19.344444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.344874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.345277] page dumped because: kasan: bad access detected [ 19.345368] [ 19.345418] Memory state around the buggy address: [ 19.345484] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.345674] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.345751] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.345855] ^ [ 19.345893] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.345974] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.346157] ================================================================== [ 19.418537] ================================================================== [ 19.418590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.418983] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.419311] [ 19.419391] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.419535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.419584] Hardware name: linux,dummy-virt (DT) [ 19.419618] Call trace: [ 19.419644] show_stack+0x20/0x38 (C) [ 19.419703] dump_stack_lvl+0x8c/0xd0 [ 19.419751] print_report+0x118/0x5d0 [ 19.419798] kasan_report+0xdc/0x128 [ 19.420128] kasan_check_range+0x100/0x1a8 [ 19.420345] __kasan_check_write+0x20/0x30 [ 19.420450] kasan_atomics_helper+0xf88/0x4858 [ 19.420509] kasan_atomics+0x198/0x2e0 [ 19.420690] kunit_try_run_case+0x170/0x3f0 [ 19.420773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.420871] kthread+0x328/0x630 [ 19.420930] ret_from_fork+0x10/0x20 [ 19.420980] [ 19.421001] Allocated by task 265: [ 19.421188] kasan_save_stack+0x3c/0x68 [ 19.421252] kasan_save_track+0x20/0x40 [ 19.421521] kasan_save_alloc_info+0x40/0x58 [ 19.421591] __kasan_kmalloc+0xd4/0xd8 [ 19.421737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.421821] kasan_atomics+0xb8/0x2e0 [ 19.421890] kunit_try_run_case+0x170/0x3f0 [ 19.422173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.422588] kthread+0x328/0x630 [ 19.422650] ret_from_fork+0x10/0x20 [ 19.422994] [ 19.423042] The buggy address belongs to the object at fff00000c5b24500 [ 19.423042] which belongs to the cache kmalloc-64 of size 64 [ 19.423133] The buggy address is located 0 bytes to the right of [ 19.423133] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.423568] [ 19.423612] The buggy address belongs to the physical page: [ 19.423692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.423756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.423823] page_type: f5(slab) [ 19.423865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.424465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.424526] page dumped because: kasan: bad access detected [ 19.424570] [ 19.424591] Memory state around the buggy address: [ 19.424626] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.424673] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.424719] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.424761] ^ [ 19.424795] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.424839] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.424880] ================================================================== [ 19.354576] ================================================================== [ 19.354642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.354986] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.355122] [ 19.355156] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.355241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.355321] Hardware name: linux,dummy-virt (DT) [ 19.355356] Call trace: [ 19.355382] show_stack+0x20/0x38 (C) [ 19.355433] dump_stack_lvl+0x8c/0xd0 [ 19.355481] print_report+0x118/0x5d0 [ 19.355567] kasan_report+0xdc/0x128 [ 19.355615] kasan_check_range+0x100/0x1a8 [ 19.355665] __kasan_check_write+0x20/0x30 [ 19.355712] kasan_atomics_helper+0xd3c/0x4858 [ 19.355763] kasan_atomics+0x198/0x2e0 [ 19.355809] kunit_try_run_case+0x170/0x3f0 [ 19.355857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.355936] kthread+0x328/0x630 [ 19.355990] ret_from_fork+0x10/0x20 [ 19.356048] [ 19.356069] Allocated by task 265: [ 19.356097] kasan_save_stack+0x3c/0x68 [ 19.356142] kasan_save_track+0x20/0x40 [ 19.356192] kasan_save_alloc_info+0x40/0x58 [ 19.356236] __kasan_kmalloc+0xd4/0xd8 [ 19.356276] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.356319] kasan_atomics+0xb8/0x2e0 [ 19.356357] kunit_try_run_case+0x170/0x3f0 [ 19.356399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.356445] kthread+0x328/0x630 [ 19.356479] ret_from_fork+0x10/0x20 [ 19.356517] [ 19.356546] The buggy address belongs to the object at fff00000c5b24500 [ 19.356546] which belongs to the cache kmalloc-64 of size 64 [ 19.356607] The buggy address is located 0 bytes to the right of [ 19.356607] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.356682] [ 19.356712] The buggy address belongs to the physical page: [ 19.356746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.356808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.356858] page_type: f5(slab) [ 19.356905] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.357399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.357474] page dumped because: kasan: bad access detected [ 19.357523] [ 19.357553] Memory state around the buggy address: [ 19.357588] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.357646] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.359465] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.359562] ^ [ 19.359719] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.359911] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.359975] ================================================================== [ 19.547847] ================================================================== [ 19.547913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.547965] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.548017] [ 19.548049] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.548133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.548161] Hardware name: linux,dummy-virt (DT) [ 19.548194] Call trace: [ 19.548217] show_stack+0x20/0x38 (C) [ 19.548269] dump_stack_lvl+0x8c/0xd0 [ 19.548318] print_report+0x118/0x5d0 [ 19.549781] kasan_report+0xdc/0x128 [ 19.551453] kasan_check_range+0x100/0x1a8 [ 19.552128] __kasan_check_write+0x20/0x30 [ 19.552747] kasan_atomics_helper+0x154c/0x4858 [ 19.553109] kasan_atomics+0x198/0x2e0 [ 19.553868] kunit_try_run_case+0x170/0x3f0 [ 19.553956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.554011] kthread+0x328/0x630 [ 19.554055] ret_from_fork+0x10/0x20 [ 19.555089] [ 19.555195] Allocated by task 265: [ 19.555229] kasan_save_stack+0x3c/0x68 [ 19.555371] kasan_save_track+0x20/0x40 [ 19.555411] kasan_save_alloc_info+0x40/0x58 [ 19.555456] __kasan_kmalloc+0xd4/0xd8 [ 19.555494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.556648] kasan_atomics+0xb8/0x2e0 [ 19.556816] kunit_try_run_case+0x170/0x3f0 [ 19.557635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.558290] kthread+0x328/0x630 [ 19.558526] ret_from_fork+0x10/0x20 [ 19.559017] [ 19.559588] The buggy address belongs to the object at fff00000c5b24500 [ 19.559588] which belongs to the cache kmalloc-64 of size 64 [ 19.559761] The buggy address is located 0 bytes to the right of [ 19.559761] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.560402] [ 19.560493] The buggy address belongs to the physical page: [ 19.560536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.561276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.562270] page_type: f5(slab) [ 19.562522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.562708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.562968] page dumped because: kasan: bad access detected [ 19.563082] [ 19.563104] Memory state around the buggy address: [ 19.563815] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.564086] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.564183] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.564409] ^ [ 19.564477] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.564997] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.565155] ================================================================== [ 19.181637] ================================================================== [ 19.181699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 19.182114] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.182245] [ 19.182545] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.182707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.182843] Hardware name: linux,dummy-virt (DT) [ 19.182885] Call trace: [ 19.183006] show_stack+0x20/0x38 (C) [ 19.183061] dump_stack_lvl+0x8c/0xd0 [ 19.183128] print_report+0x118/0x5d0 [ 19.183403] kasan_report+0xdc/0x128 [ 19.183504] kasan_check_range+0x100/0x1a8 [ 19.183585] __kasan_check_write+0x20/0x30 [ 19.183657] kasan_atomics_helper+0x47c/0x4858 [ 19.183806] kasan_atomics+0x198/0x2e0 [ 19.183855] kunit_try_run_case+0x170/0x3f0 [ 19.185593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.185738] kthread+0x328/0x630 [ 19.186307] ret_from_fork+0x10/0x20 [ 19.186372] [ 19.186395] Allocated by task 265: [ 19.186598] kasan_save_stack+0x3c/0x68 [ 19.186656] kasan_save_track+0x20/0x40 [ 19.186770] kasan_save_alloc_info+0x40/0x58 [ 19.186842] __kasan_kmalloc+0xd4/0xd8 [ 19.186882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.186933] kasan_atomics+0xb8/0x2e0 [ 19.186971] kunit_try_run_case+0x170/0x3f0 [ 19.187012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.187059] kthread+0x328/0x630 [ 19.187096] ret_from_fork+0x10/0x20 [ 19.187220] The buggy address is located 0 bytes to the right of [ 19.187220] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.189196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.189621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.190325] page dumped because: kasan: bad access detected [ 19.190360] [ 19.190382] Memory state around the buggy address: [ 19.190417] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.192669] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.193218] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.193283] ^ [ 19.193325] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.193456] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.193502] ================================================================== [ 19.425765] ================================================================== [ 19.425832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.425887] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.425952] [ 19.425984] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.426068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.426095] Hardware name: linux,dummy-virt (DT) [ 19.426130] Call trace: [ 19.426154] show_stack+0x20/0x38 (C) [ 19.426205] dump_stack_lvl+0x8c/0xd0 [ 19.426253] print_report+0x118/0x5d0 [ 19.426302] kasan_report+0xdc/0x128 [ 19.426348] kasan_check_range+0x100/0x1a8 [ 19.426399] __kasan_check_write+0x20/0x30 [ 19.426445] kasan_atomics_helper+0xff0/0x4858 [ 19.426497] kasan_atomics+0x198/0x2e0 [ 19.426543] kunit_try_run_case+0x170/0x3f0 [ 19.426593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.426652] kthread+0x328/0x630 [ 19.426694] ret_from_fork+0x10/0x20 [ 19.426742] [ 19.426763] Allocated by task 265: [ 19.426791] kasan_save_stack+0x3c/0x68 [ 19.426834] kasan_save_track+0x20/0x40 [ 19.426873] kasan_save_alloc_info+0x40/0x58 [ 19.426925] __kasan_kmalloc+0xd4/0xd8 [ 19.426964] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.427006] kasan_atomics+0xb8/0x2e0 [ 19.427045] kunit_try_run_case+0x170/0x3f0 [ 19.427084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.427130] kthread+0x328/0x630 [ 19.427166] ret_from_fork+0x10/0x20 [ 19.427204] [ 19.427226] The buggy address belongs to the object at fff00000c5b24500 [ 19.427226] which belongs to the cache kmalloc-64 of size 64 [ 19.428178] The buggy address is located 0 bytes to the right of [ 19.428178] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.428360] [ 19.428406] The buggy address belongs to the physical page: [ 19.428787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.428863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.428925] page_type: f5(slab) [ 19.429399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.429681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.429753] page dumped because: kasan: bad access detected [ 19.429857] [ 19.429916] Memory state around the buggy address: [ 19.430178] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.430232] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.430279] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.430870] ^ [ 19.430985] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.431130] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.431172] ================================================================== [ 19.506639] ================================================================== [ 19.506691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.506743] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.506796] [ 19.506829] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.507450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.507832] Hardware name: linux,dummy-virt (DT) [ 19.507961] Call trace: [ 19.508008] show_stack+0x20/0x38 (C) [ 19.508075] dump_stack_lvl+0x8c/0xd0 [ 19.508343] print_report+0x118/0x5d0 [ 19.508439] kasan_report+0xdc/0x128 [ 19.508625] __asan_report_load8_noabort+0x20/0x30 [ 19.508996] kasan_atomics_helper+0x3f04/0x4858 [ 19.509115] kasan_atomics+0x198/0x2e0 [ 19.509240] kunit_try_run_case+0x170/0x3f0 [ 19.509297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.509582] kthread+0x328/0x630 [ 19.509649] ret_from_fork+0x10/0x20 [ 19.510178] [ 19.510329] Allocated by task 265: [ 19.510404] kasan_save_stack+0x3c/0x68 [ 19.510519] kasan_save_track+0x20/0x40 [ 19.510638] kasan_save_alloc_info+0x40/0x58 [ 19.510894] __kasan_kmalloc+0xd4/0xd8 [ 19.511450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.512047] kasan_atomics+0xb8/0x2e0 [ 19.512319] kunit_try_run_case+0x170/0x3f0 [ 19.512724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.512989] kthread+0x328/0x630 [ 19.513282] ret_from_fork+0x10/0x20 [ 19.513757] [ 19.513829] The buggy address belongs to the object at fff00000c5b24500 [ 19.513829] which belongs to the cache kmalloc-64 of size 64 [ 19.514099] The buggy address is located 0 bytes to the right of [ 19.514099] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.514708] [ 19.514746] The buggy address belongs to the physical page: [ 19.514781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.514870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.515109] page_type: f5(slab) [ 19.515446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.515667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.515724] page dumped because: kasan: bad access detected [ 19.515760] [ 19.516104] Memory state around the buggy address: [ 19.516204] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.516408] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.516805] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.517004] ^ [ 19.517129] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517400] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517565] ================================================================== [ 19.346772] ================================================================== [ 19.346824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.347063] Read of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.347131] [ 19.347163] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.347280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.347324] Hardware name: linux,dummy-virt (DT) [ 19.347358] Call trace: [ 19.347565] show_stack+0x20/0x38 (C) [ 19.347971] dump_stack_lvl+0x8c/0xd0 [ 19.348063] print_report+0x118/0x5d0 [ 19.348125] kasan_report+0xdc/0x128 [ 19.348216] __asan_report_load4_noabort+0x20/0x30 [ 19.348291] kasan_atomics_helper+0x3dd8/0x4858 [ 19.348343] kasan_atomics+0x198/0x2e0 [ 19.348654] kunit_try_run_case+0x170/0x3f0 [ 19.348716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.348772] kthread+0x328/0x630 [ 19.349107] ret_from_fork+0x10/0x20 [ 19.349210] [ 19.349249] Allocated by task 265: [ 19.349351] kasan_save_stack+0x3c/0x68 [ 19.349415] kasan_save_track+0x20/0x40 [ 19.349472] kasan_save_alloc_info+0x40/0x58 [ 19.349516] __kasan_kmalloc+0xd4/0xd8 [ 19.349622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.349689] kasan_atomics+0xb8/0x2e0 [ 19.349734] kunit_try_run_case+0x170/0x3f0 [ 19.349781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.349839] kthread+0x328/0x630 [ 19.350177] ret_from_fork+0x10/0x20 [ 19.350400] [ 19.350674] The buggy address belongs to the object at fff00000c5b24500 [ 19.350674] which belongs to the cache kmalloc-64 of size 64 [ 19.350778] The buggy address is located 0 bytes to the right of [ 19.350778] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.350861] [ 19.350885] The buggy address belongs to the physical page: [ 19.351274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.351355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.351428] page_type: f5(slab) [ 19.351590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.351658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.351704] page dumped because: kasan: bad access detected [ 19.351826] [ 19.352275] Memory state around the buggy address: [ 19.352454] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.352845] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.353194] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.353309] ^ [ 19.353357] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.353666] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.353808] ================================================================== [ 19.393721] ================================================================== [ 19.393821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.393929] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.394149] [ 19.394400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.394664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.394766] Hardware name: linux,dummy-virt (DT) [ 19.394811] Call trace: [ 19.395428] show_stack+0x20/0x38 (C) [ 19.395506] dump_stack_lvl+0x8c/0xd0 [ 19.395603] print_report+0x118/0x5d0 [ 19.395680] kasan_report+0xdc/0x128 [ 19.395820] __asan_report_store8_noabort+0x20/0x30 [ 19.395908] kasan_atomics_helper+0x3e5c/0x4858 [ 19.396004] kasan_atomics+0x198/0x2e0 [ 19.396065] kunit_try_run_case+0x170/0x3f0 [ 19.396114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.396464] kthread+0x328/0x630 [ 19.396549] ret_from_fork+0x10/0x20 [ 19.396915] [ 19.396973] Allocated by task 265: [ 19.397111] kasan_save_stack+0x3c/0x68 [ 19.397201] kasan_save_track+0x20/0x40 [ 19.397330] kasan_save_alloc_info+0x40/0x58 [ 19.397403] __kasan_kmalloc+0xd4/0xd8 [ 19.397575] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.397823] kasan_atomics+0xb8/0x2e0 [ 19.397891] kunit_try_run_case+0x170/0x3f0 [ 19.398342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.398747] kthread+0x328/0x630 [ 19.398828] ret_from_fork+0x10/0x20 [ 19.398923] [ 19.398984] The buggy address belongs to the object at fff00000c5b24500 [ 19.398984] which belongs to the cache kmalloc-64 of size 64 [ 19.399065] The buggy address is located 0 bytes to the right of [ 19.399065] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.399452] [ 19.399489] The buggy address belongs to the physical page: [ 19.400230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.400404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.400473] page_type: f5(slab) [ 19.400868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.400979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.401207] page dumped because: kasan: bad access detected [ 19.401813] [ 19.401859] Memory state around the buggy address: [ 19.402344] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.402407] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.402582] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.402626] ^ [ 19.402878] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.403024] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.403091] ================================================================== [ 19.608002] ================================================================== [ 19.608413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.608671] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.608920] [ 19.608981] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.609066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.609543] Hardware name: linux,dummy-virt (DT) [ 19.609738] Call trace: [ 19.609871] show_stack+0x20/0x38 (C) [ 19.609950] dump_stack_lvl+0x8c/0xd0 [ 19.610002] print_report+0x118/0x5d0 [ 19.610153] kasan_report+0xdc/0x128 [ 19.610203] __asan_report_load8_noabort+0x20/0x30 [ 19.610287] kasan_atomics_helper+0x3df4/0x4858 [ 19.610618] kasan_atomics+0x198/0x2e0 [ 19.611087] kunit_try_run_case+0x170/0x3f0 [ 19.611270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.611683] kthread+0x328/0x630 [ 19.611732] ret_from_fork+0x10/0x20 [ 19.612500] [ 19.612531] Allocated by task 265: [ 19.612708] kasan_save_stack+0x3c/0x68 [ 19.612769] kasan_save_track+0x20/0x40 [ 19.612809] kasan_save_alloc_info+0x40/0x58 [ 19.613382] __kasan_kmalloc+0xd4/0xd8 [ 19.613438] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.613599] kasan_atomics+0xb8/0x2e0 [ 19.613689] kunit_try_run_case+0x170/0x3f0 [ 19.614562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.614658] kthread+0x328/0x630 [ 19.614698] ret_from_fork+0x10/0x20 [ 19.614736] [ 19.614757] The buggy address belongs to the object at fff00000c5b24500 [ 19.614757] which belongs to the cache kmalloc-64 of size 64 [ 19.615405] The buggy address is located 0 bytes to the right of [ 19.615405] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.615488] [ 19.615512] The buggy address belongs to the physical page: [ 19.615545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.615603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.616028] page_type: f5(slab) [ 19.616570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.617134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.617205] page dumped because: kasan: bad access detected [ 19.617240] [ 19.617261] Memory state around the buggy address: [ 19.617297] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.617345] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.617392] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.617433] ^ [ 19.617470] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.617517] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.617557] ================================================================== [ 19.404224] ================================================================== [ 19.404285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.404338] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.404459] [ 19.404493] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.404579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.404876] Hardware name: linux,dummy-virt (DT) [ 19.405110] Call trace: [ 19.405295] show_stack+0x20/0x38 (C) [ 19.405384] dump_stack_lvl+0x8c/0xd0 [ 19.405483] print_report+0x118/0x5d0 [ 19.405558] kasan_report+0xdc/0x128 [ 19.405623] kasan_check_range+0x100/0x1a8 [ 19.405714] __kasan_check_write+0x20/0x30 [ 19.405793] kasan_atomics_helper+0xeb8/0x4858 [ 19.406003] kasan_atomics+0x198/0x2e0 [ 19.406087] kunit_try_run_case+0x170/0x3f0 [ 19.406267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.406353] kthread+0x328/0x630 [ 19.406447] ret_from_fork+0x10/0x20 [ 19.406532] [ 19.406947] Allocated by task 265: [ 19.407137] kasan_save_stack+0x3c/0x68 [ 19.407245] kasan_save_track+0x20/0x40 [ 19.407655] kasan_save_alloc_info+0x40/0x58 [ 19.407842] __kasan_kmalloc+0xd4/0xd8 [ 19.408035] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.408115] kasan_atomics+0xb8/0x2e0 [ 19.408181] kunit_try_run_case+0x170/0x3f0 [ 19.408232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.408280] kthread+0x328/0x630 [ 19.408316] ret_from_fork+0x10/0x20 [ 19.408355] [ 19.408379] The buggy address belongs to the object at fff00000c5b24500 [ 19.408379] which belongs to the cache kmalloc-64 of size 64 [ 19.408450] The buggy address is located 0 bytes to the right of [ 19.408450] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.408517] [ 19.408540] The buggy address belongs to the physical page: [ 19.408574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.408636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.408688] page_type: f5(slab) [ 19.408730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.408795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.408848] page dumped because: kasan: bad access detected [ 19.408892] [ 19.408933] Memory state around the buggy address: [ 19.408968] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.409013] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.409070] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.409112] ^ [ 19.409165] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.409210] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.409253] ================================================================== [ 19.223084] ================================================================== [ 19.223657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 19.223796] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.224160] kasan_report+0xdc/0x128 [ 19.224372] kasan_atomics+0x198/0x2e0 [ 19.224692] kasan_save_stack+0x3c/0x68 [ 19.224775] kasan_save_alloc_info+0x40/0x58 [ 19.227328] kthread+0x328/0x630 [ 19.228440] [ 19.228504] The buggy address belongs to the physical page: [ 19.228539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.229802] [ 19.229865] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.230190] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.230261] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.230303] ^ [ 19.230339] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.230384] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.230426] ================================================================== [ 19.499748] ================================================================== [ 19.499973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.500050] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.500194] [ 19.500232] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.500318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.500347] Hardware name: linux,dummy-virt (DT) [ 19.500400] Call trace: [ 19.500431] show_stack+0x20/0x38 (C) [ 19.500482] dump_stack_lvl+0x8c/0xd0 [ 19.500532] print_report+0x118/0x5d0 [ 19.500581] kasan_report+0xdc/0x128 [ 19.500635] kasan_check_range+0x100/0x1a8 [ 19.500686] __kasan_check_write+0x20/0x30 [ 19.500731] kasan_atomics_helper+0x1384/0x4858 [ 19.500791] kasan_atomics+0x198/0x2e0 [ 19.500837] kunit_try_run_case+0x170/0x3f0 [ 19.500886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.500951] kthread+0x328/0x630 [ 19.500994] ret_from_fork+0x10/0x20 [ 19.501044] [ 19.501065] Allocated by task 265: [ 19.501103] kasan_save_stack+0x3c/0x68 [ 19.501145] kasan_save_track+0x20/0x40 [ 19.501186] kasan_save_alloc_info+0x40/0x58 [ 19.501227] __kasan_kmalloc+0xd4/0xd8 [ 19.501266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.501307] kasan_atomics+0xb8/0x2e0 [ 19.501346] kunit_try_run_case+0x170/0x3f0 [ 19.501387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.501435] kthread+0x328/0x630 [ 19.501479] ret_from_fork+0x10/0x20 [ 19.501521] [ 19.501545] The buggy address belongs to the object at fff00000c5b24500 [ 19.501545] which belongs to the cache kmalloc-64 of size 64 [ 19.501606] The buggy address is located 0 bytes to the right of [ 19.501606] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.501674] [ 19.501696] The buggy address belongs to the physical page: [ 19.501729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.503068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.503159] page_type: f5(slab) [ 19.503233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.503311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.503373] page dumped because: kasan: bad access detected [ 19.503438] [ 19.503498] Memory state around the buggy address: [ 19.503547] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.503923] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.504147] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.504354] ^ [ 19.504893] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505484] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505553] ================================================================== [ 19.526564] ================================================================== [ 19.526611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.526668] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.526719] [ 19.526749] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.526832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.526860] Hardware name: linux,dummy-virt (DT) [ 19.526893] Call trace: [ 19.526933] show_stack+0x20/0x38 (C) [ 19.526985] dump_stack_lvl+0x8c/0xd0 [ 19.527033] print_report+0x118/0x5d0 [ 19.527079] kasan_report+0xdc/0x128 [ 19.527127] kasan_check_range+0x100/0x1a8 [ 19.527175] __kasan_check_write+0x20/0x30 [ 19.527223] kasan_atomics_helper+0x147c/0x4858 [ 19.527313] kasan_atomics+0x198/0x2e0 [ 19.527698] kunit_try_run_case+0x170/0x3f0 [ 19.527783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.527861] kthread+0x328/0x630 [ 19.527916] ret_from_fork+0x10/0x20 [ 19.527983] [ 19.528006] Allocated by task 265: [ 19.528072] kasan_save_stack+0x3c/0x68 [ 19.528117] kasan_save_track+0x20/0x40 [ 19.528174] kasan_save_alloc_info+0x40/0x58 [ 19.528576] __kasan_kmalloc+0xd4/0xd8 [ 19.528637] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.528719] kasan_atomics+0xb8/0x2e0 [ 19.528761] kunit_try_run_case+0x170/0x3f0 [ 19.528830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.528907] kthread+0x328/0x630 [ 19.528942] ret_from_fork+0x10/0x20 [ 19.529029] [ 19.529054] The buggy address belongs to the object at fff00000c5b24500 [ 19.529054] which belongs to the cache kmalloc-64 of size 64 [ 19.529114] The buggy address is located 0 bytes to the right of [ 19.529114] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.529183] [ 19.529204] The buggy address belongs to the physical page: [ 19.529238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.529292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.529462] page_type: f5(slab) [ 19.529504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.529559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.529741] page dumped because: kasan: bad access detected [ 19.529790] [ 19.529812] Memory state around the buggy address: [ 19.529847] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.529893] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.529948] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.529990] ^ [ 19.530025] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.530068] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.530109] ================================================================== [ 19.519475] ================================================================== [ 19.519533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.519603] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.520006] [ 19.520056] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.520143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.520327] Hardware name: linux,dummy-virt (DT) [ 19.520373] Call trace: [ 19.520401] show_stack+0x20/0x38 (C) [ 19.520454] dump_stack_lvl+0x8c/0xd0 [ 19.520503] print_report+0x118/0x5d0 [ 19.520885] kasan_report+0xdc/0x128 [ 19.520968] kasan_check_range+0x100/0x1a8 [ 19.521586] __kasan_check_write+0x20/0x30 [ 19.521801] kasan_atomics_helper+0x1414/0x4858 [ 19.521884] kasan_atomics+0x198/0x2e0 [ 19.522094] kunit_try_run_case+0x170/0x3f0 [ 19.522150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.522222] kthread+0x328/0x630 [ 19.522275] ret_from_fork+0x10/0x20 [ 19.522325] [ 19.522346] Allocated by task 265: [ 19.522386] kasan_save_stack+0x3c/0x68 [ 19.522429] kasan_save_track+0x20/0x40 [ 19.522470] kasan_save_alloc_info+0x40/0x58 [ 19.522511] __kasan_kmalloc+0xd4/0xd8 [ 19.522551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.522591] kasan_atomics+0xb8/0x2e0 [ 19.522636] kunit_try_run_case+0x170/0x3f0 [ 19.522675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.522722] kthread+0x328/0x630 [ 19.522756] ret_from_fork+0x10/0x20 [ 19.522793] [ 19.522815] The buggy address belongs to the object at fff00000c5b24500 [ 19.522815] which belongs to the cache kmalloc-64 of size 64 [ 19.522875] The buggy address is located 0 bytes to the right of [ 19.522875] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.523161] [ 19.523218] The buggy address belongs to the physical page: [ 19.523330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.523555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.523611] page_type: f5(slab) [ 19.523653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.524021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.524236] page dumped because: kasan: bad access detected [ 19.524524] [ 19.524664] Memory state around the buggy address: [ 19.524754] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.524993] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525267] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.525320] ^ [ 19.525628] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526307] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526366] ================================================================== [ 19.388348] ================================================================== [ 19.388500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.388574] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.388627] [ 19.388938] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.389214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.389248] Hardware name: linux,dummy-virt (DT) [ 19.389280] Call trace: [ 19.389304] show_stack+0x20/0x38 (C) [ 19.389369] dump_stack_lvl+0x8c/0xd0 [ 19.389426] print_report+0x118/0x5d0 [ 19.389490] kasan_report+0xdc/0x128 [ 19.389540] kasan_check_range+0x100/0x1a8 [ 19.389590] __kasan_check_write+0x20/0x30 [ 19.389647] kasan_atomics_helper+0xe44/0x4858 [ 19.389698] kasan_atomics+0x198/0x2e0 [ 19.389744] kunit_try_run_case+0x170/0x3f0 [ 19.389793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.389848] kthread+0x328/0x630 [ 19.389912] ret_from_fork+0x10/0x20 [ 19.389962] [ 19.389983] Allocated by task 265: [ 19.390013] kasan_save_stack+0x3c/0x68 [ 19.390055] kasan_save_track+0x20/0x40 [ 19.390097] kasan_save_alloc_info+0x40/0x58 [ 19.390139] __kasan_kmalloc+0xd4/0xd8 [ 19.390177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.390218] kasan_atomics+0xb8/0x2e0 [ 19.390257] kunit_try_run_case+0x170/0x3f0 [ 19.390298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.390344] kthread+0x328/0x630 [ 19.390380] ret_from_fork+0x10/0x20 [ 19.390419] [ 19.390450] The buggy address belongs to the object at fff00000c5b24500 [ 19.390450] which belongs to the cache kmalloc-64 of size 64 [ 19.390511] The buggy address is located 0 bytes to the right of [ 19.390511] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.390577] [ 19.390599] The buggy address belongs to the physical page: [ 19.390637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.390699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.390750] page_type: f5(slab) [ 19.390790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.390853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.390907] page dumped because: kasan: bad access detected [ 19.390952] [ 19.390990] Memory state around the buggy address: [ 19.391050] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.391096] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.391140] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.391180] ^ [ 19.392130] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.392220] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.392282] ================================================================== [ 19.197034] ================================================================== [ 19.197318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 19.197437] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.197682] [ 19.197833] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.199663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.199702] Hardware name: linux,dummy-virt (DT) [ 19.199756] Call trace: [ 19.199784] show_stack+0x20/0x38 (C) [ 19.199843] dump_stack_lvl+0x8c/0xd0 [ 19.199892] print_report+0x118/0x5d0 [ 19.200608] kasan_report+0xdc/0x128 [ 19.200822] kasan_check_range+0x100/0x1a8 [ 19.200874] __kasan_check_write+0x20/0x30 [ 19.201920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.202013] kthread+0x328/0x630 [ 19.202136] ret_from_fork+0x10/0x20 [ 19.202348] [ 19.202373] Allocated by task 265: [ 19.202455] kasan_save_stack+0x3c/0x68 [ 19.202537] kasan_save_track+0x20/0x40 [ 19.202612] kasan_save_alloc_info+0x40/0x58 [ 19.202687] __kasan_kmalloc+0xd4/0xd8 [ 19.203631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.203690] kasan_atomics+0xb8/0x2e0 [ 19.203954] [ 19.204103] [ 19.204226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.207961] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.208011] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.208179] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209993] ================================================================== [ 19.283057] ================================================================== [ 19.283118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.283194] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.283353] [ 19.283392] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.283569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.283618] Hardware name: linux,dummy-virt (DT) [ 19.283652] Call trace: [ 19.284006] show_stack+0x20/0x38 (C) [ 19.284213] dump_stack_lvl+0x8c/0xd0 [ 19.284274] print_report+0x118/0x5d0 [ 19.284419] kasan_report+0xdc/0x128 [ 19.284473] kasan_check_range+0x100/0x1a8 [ 19.284534] __kasan_check_write+0x20/0x30 [ 19.284609] kasan_atomics_helper+0xa6c/0x4858 [ 19.284676] kasan_atomics+0x198/0x2e0 [ 19.285009] kunit_try_run_case+0x170/0x3f0 [ 19.285196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.285321] kthread+0x328/0x630 [ 19.285545] ret_from_fork+0x10/0x20 [ 19.285786] [ 19.285993] Allocated by task 265: [ 19.286073] kasan_save_stack+0x3c/0x68 [ 19.286240] kasan_save_track+0x20/0x40 [ 19.286310] kasan_save_alloc_info+0x40/0x58 [ 19.286353] __kasan_kmalloc+0xd4/0xd8 [ 19.286393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.286434] kasan_atomics+0xb8/0x2e0 [ 19.286840] kunit_try_run_case+0x170/0x3f0 [ 19.287271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.287331] kthread+0x328/0x630 [ 19.287400] ret_from_fork+0x10/0x20 [ 19.287460] [ 19.287494] The buggy address belongs to the object at fff00000c5b24500 [ 19.287494] which belongs to the cache kmalloc-64 of size 64 [ 19.287571] The buggy address is located 0 bytes to the right of [ 19.287571] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.287642] [ 19.287673] The buggy address belongs to the physical page: [ 19.287708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.287762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.287812] page_type: f5(slab) [ 19.287862] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.287938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.287990] page dumped because: kasan: bad access detected [ 19.288034] [ 19.288064] Memory state around the buggy address: [ 19.288109] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.288154] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.288199] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.288248] ^ [ 19.288291] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.288336] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.288386] ================================================================== [ 19.411292] ================================================================== [ 19.411375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.411686] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.411757] [ 19.411830] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.411957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.412146] Hardware name: linux,dummy-virt (DT) [ 19.412211] Call trace: [ 19.412255] show_stack+0x20/0x38 (C) [ 19.412319] dump_stack_lvl+0x8c/0xd0 [ 19.412507] print_report+0x118/0x5d0 [ 19.412590] kasan_report+0xdc/0x128 [ 19.412663] kasan_check_range+0x100/0x1a8 [ 19.412715] __kasan_check_write+0x20/0x30 [ 19.412762] kasan_atomics_helper+0xf20/0x4858 [ 19.412810] kasan_atomics+0x198/0x2e0 [ 19.413143] kunit_try_run_case+0x170/0x3f0 [ 19.413420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413487] kthread+0x328/0x630 [ 19.413533] ret_from_fork+0x10/0x20 [ 19.413689] [ 19.413727] Allocated by task 265: [ 19.413826] kasan_save_stack+0x3c/0x68 [ 19.413882] kasan_save_track+0x20/0x40 [ 19.413984] kasan_save_alloc_info+0x40/0x58 [ 19.414026] __kasan_kmalloc+0xd4/0xd8 [ 19.414066] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.414108] kasan_atomics+0xb8/0x2e0 [ 19.414145] kunit_try_run_case+0x170/0x3f0 [ 19.414186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.414232] kthread+0x328/0x630 [ 19.414515] ret_from_fork+0x10/0x20 [ 19.414763] [ 19.414934] The buggy address belongs to the object at fff00000c5b24500 [ 19.414934] which belongs to the cache kmalloc-64 of size 64 [ 19.415070] The buggy address is located 0 bytes to the right of [ 19.415070] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.415150] [ 19.415172] The buggy address belongs to the physical page: [ 19.415374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.415614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.415694] page_type: f5(slab) [ 19.415750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.416130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.416489] page dumped because: kasan: bad access detected [ 19.416556] [ 19.416952] Memory state around the buggy address: [ 19.417015] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.417099] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.417148] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.417358] ^ [ 19.417565] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.417636] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.418122] ================================================================== [ 19.361061] ================================================================== [ 19.361125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.361242] Read of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.361294] [ 19.361606] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.361991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.362106] Hardware name: linux,dummy-virt (DT) [ 19.362174] Call trace: [ 19.362212] show_stack+0x20/0x38 (C) [ 19.362364] dump_stack_lvl+0x8c/0xd0 [ 19.362461] print_report+0x118/0x5d0 [ 19.362612] kasan_report+0xdc/0x128 [ 19.362667] __asan_report_load4_noabort+0x20/0x30 [ 19.362758] kasan_atomics_helper+0x3e04/0x4858 [ 19.362811] kasan_atomics+0x198/0x2e0 [ 19.363154] kunit_try_run_case+0x170/0x3f0 [ 19.363402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.363620] kthread+0x328/0x630 [ 19.363705] ret_from_fork+0x10/0x20 [ 19.363855] [ 19.363895] Allocated by task 265: [ 19.364025] kasan_save_stack+0x3c/0x68 [ 19.364101] kasan_save_track+0x20/0x40 [ 19.364161] kasan_save_alloc_info+0x40/0x58 [ 19.364211] __kasan_kmalloc+0xd4/0xd8 [ 19.364436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.364646] kasan_atomics+0xb8/0x2e0 [ 19.364875] kunit_try_run_case+0x170/0x3f0 [ 19.365102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.365412] kthread+0x328/0x630 [ 19.365507] ret_from_fork+0x10/0x20 [ 19.365807] [ 19.365924] The buggy address belongs to the object at fff00000c5b24500 [ 19.365924] which belongs to the cache kmalloc-64 of size 64 [ 19.366019] The buggy address is located 0 bytes to the right of [ 19.366019] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.366096] [ 19.366505] The buggy address belongs to the physical page: [ 19.366850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.366946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.367420] page_type: f5(slab) [ 19.367486] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.367636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.367692] page dumped because: kasan: bad access detected [ 19.367948] [ 19.368087] Memory state around the buggy address: [ 19.368493] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.368867] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.369376] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.369494] ^ [ 19.369561] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.369632] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.369860] ================================================================== [ 19.443545] ================================================================== [ 19.443608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.443771] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.443951] [ 19.443987] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.444200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.444277] Hardware name: linux,dummy-virt (DT) [ 19.444311] Call trace: [ 19.444338] show_stack+0x20/0x38 (C) [ 19.444391] dump_stack_lvl+0x8c/0xd0 [ 19.444724] print_report+0x118/0x5d0 [ 19.444940] kasan_report+0xdc/0x128 [ 19.445009] kasan_check_range+0x100/0x1a8 [ 19.445223] __kasan_check_write+0x20/0x30 [ 19.445676] kasan_atomics_helper+0x10c0/0x4858 [ 19.445795] kasan_atomics+0x198/0x2e0 [ 19.446076] kunit_try_run_case+0x170/0x3f0 [ 19.446243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.446305] kthread+0x328/0x630 [ 19.446371] ret_from_fork+0x10/0x20 [ 19.446680] [ 19.446967] Allocated by task 265: [ 19.447317] kasan_save_stack+0x3c/0x68 [ 19.447431] kasan_save_track+0x20/0x40 [ 19.447538] kasan_save_alloc_info+0x40/0x58 [ 19.447637] __kasan_kmalloc+0xd4/0xd8 [ 19.447927] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.447981] kasan_atomics+0xb8/0x2e0 [ 19.448019] kunit_try_run_case+0x170/0x3f0 [ 19.448461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.448844] kthread+0x328/0x630 [ 19.449476] ret_from_fork+0x10/0x20 [ 19.449536] [ 19.449561] The buggy address belongs to the object at fff00000c5b24500 [ 19.449561] which belongs to the cache kmalloc-64 of size 64 [ 19.450000] The buggy address is located 0 bytes to the right of [ 19.450000] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.450231] [ 19.450258] The buggy address belongs to the physical page: [ 19.450471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.450874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.451256] page_type: f5(slab) [ 19.451308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.451670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.451750] page dumped because: kasan: bad access detected [ 19.451785] [ 19.451808] Memory state around the buggy address: [ 19.451844] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451892] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451946] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.452035] ^ [ 19.452082] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452130] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452172] ================================================================== [ 19.663522] ================================================================== [ 19.663573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.663627] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.663680] [ 19.663711] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.663794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.663825] Hardware name: linux,dummy-virt (DT) [ 19.663859] Call trace: [ 19.663882] show_stack+0x20/0x38 (C) [ 19.663945] dump_stack_lvl+0x8c/0xd0 [ 19.663994] print_report+0x118/0x5d0 [ 19.664042] kasan_report+0xdc/0x128 [ 19.664091] __asan_report_load8_noabort+0x20/0x30 [ 19.664145] kasan_atomics_helper+0x3e20/0x4858 [ 19.664194] kasan_atomics+0x198/0x2e0 [ 19.664393] kunit_try_run_case+0x170/0x3f0 [ 19.664820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.665568] kthread+0x328/0x630 [ 19.665840] ret_from_fork+0x10/0x20 [ 19.665915] [ 19.665938] Allocated by task 265: [ 19.665967] kasan_save_stack+0x3c/0x68 [ 19.666018] kasan_save_track+0x20/0x40 [ 19.666057] kasan_save_alloc_info+0x40/0x58 [ 19.666100] __kasan_kmalloc+0xd4/0xd8 [ 19.666145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.666202] kasan_atomics+0xb8/0x2e0 [ 19.666239] kunit_try_run_case+0x170/0x3f0 [ 19.666279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.666325] kthread+0x328/0x630 [ 19.666358] ret_from_fork+0x10/0x20 [ 19.666396] [ 19.666418] The buggy address belongs to the object at fff00000c5b24500 [ 19.666418] which belongs to the cache kmalloc-64 of size 64 [ 19.666478] The buggy address is located 0 bytes to the right of [ 19.666478] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.666546] [ 19.666568] The buggy address belongs to the physical page: [ 19.666601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.666663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.666715] page_type: f5(slab) [ 19.666755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.666808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.666852] page dumped because: kasan: bad access detected [ 19.666886] [ 19.666917] Memory state around the buggy address: [ 19.666950] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.666998] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.667044] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.667087] ^ [ 19.667122] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.667168] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.667210] ================================================================== [ 19.617789] ================================================================== [ 19.617841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.617890] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.617952] [ 19.618039] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.618128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.618156] Hardware name: linux,dummy-virt (DT) [ 19.618372] Call trace: [ 19.618495] show_stack+0x20/0x38 (C) [ 19.618776] dump_stack_lvl+0x8c/0xd0 [ 19.618839] print_report+0x118/0x5d0 [ 19.618890] kasan_report+0xdc/0x128 [ 19.619458] kasan_check_range+0x100/0x1a8 [ 19.619787] __kasan_check_write+0x20/0x30 [ 19.620054] kasan_atomics_helper+0x16d0/0x4858 [ 19.620322] kasan_atomics+0x198/0x2e0 [ 19.620771] kunit_try_run_case+0x170/0x3f0 [ 19.621005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.621282] kthread+0x328/0x630 [ 19.621503] ret_from_fork+0x10/0x20 [ 19.622104] [ 19.622138] Allocated by task 265: [ 19.622454] kasan_save_stack+0x3c/0x68 [ 19.622695] kasan_save_track+0x20/0x40 [ 19.622737] kasan_save_alloc_info+0x40/0x58 [ 19.622780] __kasan_kmalloc+0xd4/0xd8 [ 19.623321] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.623416] kasan_atomics+0xb8/0x2e0 [ 19.623455] kunit_try_run_case+0x170/0x3f0 [ 19.623497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.624141] kthread+0x328/0x630 [ 19.624535] ret_from_fork+0x10/0x20 [ 19.624795] [ 19.624819] The buggy address belongs to the object at fff00000c5b24500 [ 19.624819] which belongs to the cache kmalloc-64 of size 64 [ 19.625119] The buggy address is located 0 bytes to the right of [ 19.625119] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.625191] [ 19.625573] The buggy address belongs to the physical page: [ 19.625621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.625882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.626538] page_type: f5(slab) [ 19.626597] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.626656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.627060] page dumped because: kasan: bad access detected [ 19.627467] [ 19.627495] Memory state around the buggy address: [ 19.627755] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.628214] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.628282] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.628326] ^ [ 19.628364] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.628935] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.628981] ================================================================== [ 19.631500] ================================================================== [ 19.631554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.631615] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.631668] [ 19.631699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.631784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.631812] Hardware name: linux,dummy-virt (DT) [ 19.631848] Call trace: [ 19.631872] show_stack+0x20/0x38 (C) [ 19.631934] dump_stack_lvl+0x8c/0xd0 [ 19.631983] print_report+0x118/0x5d0 [ 19.634076] kasan_report+0xdc/0x128 [ 19.634467] __asan_report_load8_noabort+0x20/0x30 [ 19.634523] kasan_atomics_helper+0x3e10/0x4858 [ 19.635686] kasan_atomics+0x198/0x2e0 [ 19.635929] kunit_try_run_case+0x170/0x3f0 [ 19.636448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.636910] kthread+0x328/0x630 [ 19.637062] ret_from_fork+0x10/0x20 [ 19.637669] [ 19.637707] Allocated by task 265: [ 19.638339] kasan_save_stack+0x3c/0x68 [ 19.638400] kasan_save_track+0x20/0x40 [ 19.638443] kasan_save_alloc_info+0x40/0x58 [ 19.638485] __kasan_kmalloc+0xd4/0xd8 [ 19.638525] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.639398] kasan_atomics+0xb8/0x2e0 [ 19.639478] kunit_try_run_case+0x170/0x3f0 [ 19.639927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.640023] kthread+0x328/0x630 [ 19.640061] ret_from_fork+0x10/0x20 [ 19.640847] [ 19.640876] The buggy address belongs to the object at fff00000c5b24500 [ 19.640876] which belongs to the cache kmalloc-64 of size 64 [ 19.640952] The buggy address is located 0 bytes to the right of [ 19.640952] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.642047] [ 19.642081] The buggy address belongs to the physical page: [ 19.642127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.643087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.643417] page_type: f5(slab) [ 19.643743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.644054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.644605] page dumped because: kasan: bad access detected [ 19.644926] [ 19.644957] Memory state around the buggy address: [ 19.645370] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645471] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.646196] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.646247] ^ [ 19.646447] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.646730] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.647356] ================================================================== [ 19.461841] ================================================================== [ 19.462109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.462274] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.462494] [ 19.462605] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.463144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.463328] Hardware name: linux,dummy-virt (DT) [ 19.463491] Call trace: [ 19.463585] show_stack+0x20/0x38 (C) [ 19.463641] dump_stack_lvl+0x8c/0xd0 [ 19.463690] print_report+0x118/0x5d0 [ 19.463740] kasan_report+0xdc/0x128 [ 19.464201] kasan_check_range+0x100/0x1a8 [ 19.464363] __kasan_check_write+0x20/0x30 [ 19.464507] kasan_atomics_helper+0x1190/0x4858 [ 19.464557] kasan_atomics+0x198/0x2e0 [ 19.464612] kunit_try_run_case+0x170/0x3f0 [ 19.464969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.465368] kthread+0x328/0x630 [ 19.465495] ret_from_fork+0x10/0x20 [ 19.465587] [ 19.465996] Allocated by task 265: [ 19.466258] kasan_save_stack+0x3c/0x68 [ 19.466331] kasan_save_track+0x20/0x40 [ 19.466464] kasan_save_alloc_info+0x40/0x58 [ 19.466553] __kasan_kmalloc+0xd4/0xd8 [ 19.466859] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.466989] kasan_atomics+0xb8/0x2e0 [ 19.467376] kunit_try_run_case+0x170/0x3f0 [ 19.467785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.467864] kthread+0x328/0x630 [ 19.468216] ret_from_fork+0x10/0x20 [ 19.468381] [ 19.468609] The buggy address belongs to the object at fff00000c5b24500 [ 19.468609] which belongs to the cache kmalloc-64 of size 64 [ 19.469224] The buggy address is located 0 bytes to the right of [ 19.469224] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.469614] [ 19.469666] The buggy address belongs to the physical page: [ 19.469730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.469843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.470167] page_type: f5(slab) [ 19.470248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.470768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.470846] page dumped because: kasan: bad access detected [ 19.471062] [ 19.471129] Memory state around the buggy address: [ 19.471371] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.471584] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.472042] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.472173] ^ [ 19.472644] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.472854] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.473042] ================================================================== [ 19.230835] ================================================================== [ 19.230886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 19.230953] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.231004] [ 19.231035] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.231118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.231158] Hardware name: linux,dummy-virt (DT) [ 19.231210] Call trace: [ 19.231237] show_stack+0x20/0x38 (C) [ 19.231300] dump_stack_lvl+0x8c/0xd0 [ 19.231350] print_report+0x118/0x5d0 [ 19.231524] kasan_report+0xdc/0x128 [ 19.231724] kasan_check_range+0x100/0x1a8 [ 19.231812] __kasan_check_write+0x20/0x30 [ 19.231926] kasan_atomics_helper+0x6ec/0x4858 [ 19.231977] kasan_atomics+0x198/0x2e0 [ 19.232023] kunit_try_run_case+0x170/0x3f0 [ 19.232591] kthread+0x328/0x630 [ 19.232703] [ 19.232723] Allocated by task 265: [ 19.232798] kasan_save_track+0x20/0x40 [ 19.232937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.233103] kthread+0x328/0x630 [ 19.233197] The buggy address belongs to the object at fff00000c5b24500 [ 19.233197] which belongs to the cache kmalloc-64 of size 64 [ 19.233324] [ 19.233346] The buggy address belongs to the physical page: [ 19.233379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.233433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.233481] page_type: f5(slab) [ 19.233535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.233588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.233643] page dumped because: kasan: bad access detected [ 19.233748] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.234041] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.234705] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.234944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.235245] Call trace: [ 19.235383] print_report+0x118/0x5d0 [ 19.235432] kasan_report+0xdc/0x128 [ 19.235480] kasan_check_range+0x100/0x1a8 [ 19.235826] kunit_try_run_case+0x170/0x3f0 [ 19.235877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.235943] kthread+0x328/0x630 [ 19.236002] ret_from_fork+0x10/0x20 [ 19.236067] [ 19.236424] kasan_save_track+0x20/0x40 [ 19.236466] kasan_save_alloc_info+0x40/0x58 [ 19.236510] __kasan_kmalloc+0xd4/0xd8 [ 19.236550] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.236592] kasan_atomics+0xb8/0x2e0 [ 19.236631] kunit_try_run_case+0x170/0x3f0 [ 19.236671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.237064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.237723] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.237765] ^ [ 19.237827] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.241484] page_type: f5(slab) [ 19.241529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.241581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.241634] page dumped because: kasan: bad access detected [ 19.241668] [ 19.241688] Memory state around the buggy address: [ 19.241721] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.241771] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.242030] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.242376] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.242493] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.242563] ================================================================== [ 19.377316] ================================================================== [ 19.377369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.377429] Read of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.377494] [ 19.377533] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.377837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.378107] Hardware name: linux,dummy-virt (DT) [ 19.378168] Call trace: [ 19.378217] show_stack+0x20/0x38 (C) [ 19.378637] dump_stack_lvl+0x8c/0xd0 [ 19.378731] print_report+0x118/0x5d0 [ 19.380317] kasan_report+0xdc/0x128 [ 19.380382] __asan_report_load8_noabort+0x20/0x30 [ 19.380692] kasan_atomics_helper+0x3f58/0x4858 [ 19.380929] kasan_atomics+0x198/0x2e0 [ 19.381014] kunit_try_run_case+0x170/0x3f0 [ 19.381171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.381275] kthread+0x328/0x630 [ 19.381323] ret_from_fork+0x10/0x20 [ 19.381784] [ 19.382608] Allocated by task 265: [ 19.382687] kasan_save_stack+0x3c/0x68 [ 19.382739] kasan_save_track+0x20/0x40 [ 19.382796] kasan_save_alloc_info+0x40/0x58 [ 19.382858] __kasan_kmalloc+0xd4/0xd8 [ 19.382941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.383192] kasan_atomics+0xb8/0x2e0 [ 19.383528] kunit_try_run_case+0x170/0x3f0 [ 19.383882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.384220] kthread+0x328/0x630 [ 19.384353] ret_from_fork+0x10/0x20 [ 19.384502] [ 19.384779] The buggy address belongs to the object at fff00000c5b24500 [ 19.384779] which belongs to the cache kmalloc-64 of size 64 [ 19.384866] The buggy address is located 0 bytes to the right of [ 19.384866] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.385254] [ 19.385337] The buggy address belongs to the physical page: [ 19.385392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.385467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.385725] page_type: f5(slab) [ 19.385923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.386031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.386236] page dumped because: kasan: bad access detected [ 19.386434] [ 19.386473] Memory state around the buggy address: [ 19.386521] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.386570] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.386614] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.387002] ^ [ 19.387461] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.387563] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.387655] ================================================================== [ 19.212729] ================================================================== [ 19.213014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 19.213392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.213460] Hardware name: linux,dummy-virt (DT) [ 19.213496] Call trace: [ 19.213697] dump_stack_lvl+0x8c/0xd0 [ 19.214189] __kasan_check_write+0x20/0x30 [ 19.216164] [ 19.216252] The buggy address belongs to the physical page: [ 19.216287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.216818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.217551] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.217624] ^ [ 19.217721] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.218945] ================================================================== [ 19.267404] ================================================================== [ 19.267581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.267793] Write of size 4 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.268008] [ 19.268122] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.269272] kasan_atomics+0x198/0x2e0 [ 19.269709] kasan_save_alloc_info+0x40/0x58 [ 19.271615] The buggy address belongs to the object at fff00000c5b24500 [ 19.271615] which belongs to the cache kmalloc-64 of size 64 [ 19.272154] page dumped because: kasan: bad access detected [ 19.273188] ================================================================== [ 19.488579] ================================================================== [ 19.488632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.488962] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.489344] [ 19.489384] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.489474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.489981] Hardware name: linux,dummy-virt (DT) [ 19.490250] Call trace: [ 19.490668] show_stack+0x20/0x38 (C) [ 19.490765] dump_stack_lvl+0x8c/0xd0 [ 19.490825] print_report+0x118/0x5d0 [ 19.491196] kasan_report+0xdc/0x128 [ 19.491623] kasan_check_range+0x100/0x1a8 [ 19.491720] __kasan_check_write+0x20/0x30 [ 19.491961] kasan_atomics_helper+0x12d8/0x4858 [ 19.492088] kasan_atomics+0x198/0x2e0 [ 19.492141] kunit_try_run_case+0x170/0x3f0 [ 19.492383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.492634] kthread+0x328/0x630 [ 19.493059] ret_from_fork+0x10/0x20 [ 19.493292] [ 19.493682] Allocated by task 265: [ 19.493738] kasan_save_stack+0x3c/0x68 [ 19.494040] kasan_save_track+0x20/0x40 [ 19.494131] kasan_save_alloc_info+0x40/0x58 [ 19.494266] __kasan_kmalloc+0xd4/0xd8 [ 19.494352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.494396] kasan_atomics+0xb8/0x2e0 [ 19.494435] kunit_try_run_case+0x170/0x3f0 [ 19.494680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.494869] kthread+0x328/0x630 [ 19.495195] ret_from_fork+0x10/0x20 [ 19.495410] [ 19.495455] The buggy address belongs to the object at fff00000c5b24500 [ 19.495455] which belongs to the cache kmalloc-64 of size 64 [ 19.495692] The buggy address is located 0 bytes to the right of [ 19.495692] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.495885] [ 19.495984] The buggy address belongs to the physical page: [ 19.496297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.496726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.497174] page_type: f5(slab) [ 19.497242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.497477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.497614] page dumped because: kasan: bad access detected [ 19.497927] [ 19.498226] Memory state around the buggy address: [ 19.498434] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.498496] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.498785] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.499262] ^ [ 19.499342] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499435] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499477] ================================================================== [ 19.432777] ================================================================== [ 19.432910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.433053] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.433115] [ 19.433145] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.433391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.433434] Hardware name: linux,dummy-virt (DT) [ 19.433933] Call trace: [ 19.433979] show_stack+0x20/0x38 (C) [ 19.434034] dump_stack_lvl+0x8c/0xd0 [ 19.434216] print_report+0x118/0x5d0 [ 19.434384] kasan_report+0xdc/0x128 [ 19.434436] kasan_check_range+0x100/0x1a8 [ 19.434502] __kasan_check_write+0x20/0x30 [ 19.434753] kasan_atomics_helper+0x1058/0x4858 [ 19.434862] kasan_atomics+0x198/0x2e0 [ 19.435161] kunit_try_run_case+0x170/0x3f0 [ 19.435231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.435417] kthread+0x328/0x630 [ 19.435472] ret_from_fork+0x10/0x20 [ 19.435573] [ 19.435606] Allocated by task 265: [ 19.435639] kasan_save_stack+0x3c/0x68 [ 19.435701] kasan_save_track+0x20/0x40 [ 19.435759] kasan_save_alloc_info+0x40/0x58 [ 19.435800] __kasan_kmalloc+0xd4/0xd8 [ 19.435842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.436135] kasan_atomics+0xb8/0x2e0 [ 19.436239] kunit_try_run_case+0x170/0x3f0 [ 19.436702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.436911] kthread+0x328/0x630 [ 19.437243] ret_from_fork+0x10/0x20 [ 19.437526] [ 19.437556] The buggy address belongs to the object at fff00000c5b24500 [ 19.437556] which belongs to the cache kmalloc-64 of size 64 [ 19.438052] The buggy address is located 0 bytes to the right of [ 19.438052] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.438415] [ 19.438922] The buggy address belongs to the physical page: [ 19.440336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.440462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.440654] page_type: f5(slab) [ 19.440720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.440778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.441178] page dumped because: kasan: bad access detected [ 19.441478] [ 19.441544] Memory state around the buggy address: [ 19.441644] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.441711] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.442079] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.442450] ^ [ 19.442652] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.442703] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.442745] ================================================================== [ 19.452495] ================================================================== [ 19.452546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.452597] Write of size 8 at addr fff00000c5b24530 by task kunit_try_catch/265 [ 19.452649] [ 19.452681] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.452766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.452793] Hardware name: linux,dummy-virt (DT) [ 19.452826] Call trace: [ 19.452852] show_stack+0x20/0x38 (C) [ 19.452917] dump_stack_lvl+0x8c/0xd0 [ 19.452965] print_report+0x118/0x5d0 [ 19.453837] kasan_report+0xdc/0x128 [ 19.453985] kasan_check_range+0x100/0x1a8 [ 19.454115] __kasan_check_write+0x20/0x30 [ 19.454176] kasan_atomics_helper+0x1128/0x4858 [ 19.454507] kasan_atomics+0x198/0x2e0 [ 19.454990] kunit_try_run_case+0x170/0x3f0 [ 19.455142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.455402] kthread+0x328/0x630 [ 19.455519] ret_from_fork+0x10/0x20 [ 19.455932] [ 19.456145] Allocated by task 265: [ 19.456275] kasan_save_stack+0x3c/0x68 [ 19.456383] kasan_save_track+0x20/0x40 [ 19.456426] kasan_save_alloc_info+0x40/0x58 [ 19.456522] __kasan_kmalloc+0xd4/0xd8 [ 19.456711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.456987] kasan_atomics+0xb8/0x2e0 [ 19.457219] kunit_try_run_case+0x170/0x3f0 [ 19.457384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.457607] kthread+0x328/0x630 [ 19.457650] ret_from_fork+0x10/0x20 [ 19.457824] [ 19.457867] The buggy address belongs to the object at fff00000c5b24500 [ 19.457867] which belongs to the cache kmalloc-64 of size 64 [ 19.458399] The buggy address is located 0 bytes to the right of [ 19.458399] allocated 48-byte region [fff00000c5b24500, fff00000c5b24530) [ 19.458606] [ 19.458701] The buggy address belongs to the physical page: [ 19.458749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b24 [ 19.458949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.459029] page_type: f5(slab) [ 19.459162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.459220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.459291] page dumped because: kasan: bad access detected [ 19.459327] [ 19.459348] Memory state around the buggy address: [ 19.459383] fff00000c5b24400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.459941] fff00000c5b24480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.460174] >fff00000c5b24500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.460227] ^ [ 19.460306] fff00000c5b24580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.460590] fff00000c5b24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.460744] ==================================================================
[ 19.878836] ================================================================== [ 19.878891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.878944] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.879200] [ 19.879244] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.879485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.879518] Hardware name: linux,dummy-virt (DT) [ 19.879552] Call trace: [ 19.879577] show_stack+0x20/0x38 (C) [ 19.879650] dump_stack_lvl+0x8c/0xd0 [ 19.880017] print_report+0x118/0x5d0 [ 19.880093] kasan_report+0xdc/0x128 [ 19.880392] __asan_report_load8_noabort+0x20/0x30 [ 19.881497] kasan_atomics_helper+0x3df4/0x4858 [ 19.881611] kasan_atomics+0x198/0x2e0 [ 19.881871] kunit_try_run_case+0x170/0x3f0 [ 19.882026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.882165] kthread+0x328/0x630 [ 19.882423] ret_from_fork+0x10/0x20 [ 19.882695] [ 19.882752] Allocated by task 265: [ 19.883140] kasan_save_stack+0x3c/0x68 [ 19.883228] kasan_save_track+0x20/0x40 [ 19.883415] kasan_save_alloc_info+0x40/0x58 [ 19.883491] __kasan_kmalloc+0xd4/0xd8 [ 19.883768] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.883982] kasan_atomics+0xb8/0x2e0 [ 19.884232] kunit_try_run_case+0x170/0x3f0 [ 19.884491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.884669] kthread+0x328/0x630 [ 19.884987] ret_from_fork+0x10/0x20 [ 19.885305] [ 19.885334] The buggy address belongs to the object at fff00000c5b40680 [ 19.885334] which belongs to the cache kmalloc-64 of size 64 [ 19.885494] The buggy address is located 0 bytes to the right of [ 19.885494] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.885579] [ 19.885600] The buggy address belongs to the physical page: [ 19.885645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.885703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.885754] page_type: f5(slab) [ 19.885795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.886017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.886067] page dumped because: kasan: bad access detected [ 19.886110] [ 19.886132] Memory state around the buggy address: [ 19.886167] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.886216] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.886262] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.886304] ^ [ 19.886350] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.886395] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.886445] ================================================================== [ 19.887014] ================================================================== [ 19.887079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.887133] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.887191] [ 19.887230] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.887315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.887354] Hardware name: linux,dummy-virt (DT) [ 19.887386] Call trace: [ 19.887412] show_stack+0x20/0x38 (C) [ 19.887460] dump_stack_lvl+0x8c/0xd0 [ 19.887518] print_report+0x118/0x5d0 [ 19.887571] kasan_report+0xdc/0x128 [ 19.888590] kasan_check_range+0x100/0x1a8 [ 19.888711] __kasan_check_write+0x20/0x30 [ 19.888764] kasan_atomics_helper+0x16d0/0x4858 [ 19.889063] kasan_atomics+0x198/0x2e0 [ 19.889450] kunit_try_run_case+0x170/0x3f0 [ 19.889522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.889578] kthread+0x328/0x630 [ 19.889631] ret_from_fork+0x10/0x20 [ 19.890138] [ 19.890182] Allocated by task 265: [ 19.890675] kasan_save_stack+0x3c/0x68 [ 19.890780] kasan_save_track+0x20/0x40 [ 19.891227] kasan_save_alloc_info+0x40/0x58 [ 19.891305] __kasan_kmalloc+0xd4/0xd8 [ 19.891703] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.891929] kasan_atomics+0xb8/0x2e0 [ 19.892029] kunit_try_run_case+0x170/0x3f0 [ 19.892119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.892682] kthread+0x328/0x630 [ 19.892789] ret_from_fork+0x10/0x20 [ 19.893184] [ 19.893232] The buggy address belongs to the object at fff00000c5b40680 [ 19.893232] which belongs to the cache kmalloc-64 of size 64 [ 19.893600] The buggy address is located 0 bytes to the right of [ 19.893600] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.893689] [ 19.893714] The buggy address belongs to the physical page: [ 19.894173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.894526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.894714] page_type: f5(slab) [ 19.895016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.895336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.895605] page dumped because: kasan: bad access detected [ 19.896047] [ 19.896112] Memory state around the buggy address: [ 19.896490] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.896939] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.897030] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.897276] ^ [ 19.897402] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.897717] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.897972] ================================================================== [ 19.921128] ================================================================== [ 19.921254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.921506] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.921580] [ 19.921630] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.921715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.922375] Hardware name: linux,dummy-virt (DT) [ 19.922546] Call trace: [ 19.922597] show_stack+0x20/0x38 (C) [ 19.922796] dump_stack_lvl+0x8c/0xd0 [ 19.923212] print_report+0x118/0x5d0 [ 19.923317] kasan_report+0xdc/0x128 [ 19.923477] __asan_report_load8_noabort+0x20/0x30 [ 19.923548] kasan_atomics_helper+0x3e20/0x4858 [ 19.923829] kasan_atomics+0x198/0x2e0 [ 19.924172] kunit_try_run_case+0x170/0x3f0 [ 19.924348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.924415] kthread+0x328/0x630 [ 19.924461] ret_from_fork+0x10/0x20 [ 19.924533] [ 19.924579] Allocated by task 265: [ 19.924639] kasan_save_stack+0x3c/0x68 [ 19.924685] kasan_save_track+0x20/0x40 [ 19.924727] kasan_save_alloc_info+0x40/0x58 [ 19.924769] __kasan_kmalloc+0xd4/0xd8 [ 19.924811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.924852] kasan_atomics+0xb8/0x2e0 [ 19.924903] kunit_try_run_case+0x170/0x3f0 [ 19.924957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.925004] kthread+0x328/0x630 [ 19.925043] ret_from_fork+0x10/0x20 [ 19.925083] [ 19.925105] The buggy address belongs to the object at fff00000c5b40680 [ 19.925105] which belongs to the cache kmalloc-64 of size 64 [ 19.925167] The buggy address is located 0 bytes to the right of [ 19.925167] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.925236] [ 19.925259] The buggy address belongs to the physical page: [ 19.925292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.925349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.925399] page_type: f5(slab) [ 19.925441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.925512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.925557] page dumped because: kasan: bad access detected [ 19.925592] [ 19.925614] Memory state around the buggy address: [ 19.926083] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.926151] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.926198] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.926569] ^ [ 19.926654] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.926718] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.927015] ================================================================== [ 19.825868] ================================================================== [ 19.825931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.825985] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.826192] [ 19.826269] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.826736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.826823] Hardware name: linux,dummy-virt (DT) [ 19.826859] Call trace: [ 19.827207] show_stack+0x20/0x38 (C) [ 19.827369] dump_stack_lvl+0x8c/0xd0 [ 19.827432] print_report+0x118/0x5d0 [ 19.827482] kasan_report+0xdc/0x128 [ 19.827706] kasan_check_range+0x100/0x1a8 [ 19.827778] __kasan_check_write+0x20/0x30 [ 19.828111] kasan_atomics_helper+0x147c/0x4858 [ 19.828222] kasan_atomics+0x198/0x2e0 [ 19.828404] kunit_try_run_case+0x170/0x3f0 [ 19.828517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.828578] kthread+0x328/0x630 [ 19.828633] ret_from_fork+0x10/0x20 [ 19.828966] [ 19.829005] Allocated by task 265: [ 19.829397] kasan_save_stack+0x3c/0x68 [ 19.829656] kasan_save_track+0x20/0x40 [ 19.829783] kasan_save_alloc_info+0x40/0x58 [ 19.829901] __kasan_kmalloc+0xd4/0xd8 [ 19.829943] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.829985] kasan_atomics+0xb8/0x2e0 [ 19.830026] kunit_try_run_case+0x170/0x3f0 [ 19.830066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.830111] kthread+0x328/0x630 [ 19.830459] ret_from_fork+0x10/0x20 [ 19.830938] [ 19.830974] The buggy address belongs to the object at fff00000c5b40680 [ 19.830974] which belongs to the cache kmalloc-64 of size 64 [ 19.831307] The buggy address is located 0 bytes to the right of [ 19.831307] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.831581] [ 19.831637] The buggy address belongs to the physical page: [ 19.831673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.832159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.832546] page_type: f5(slab) [ 19.832798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.833049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.833233] page dumped because: kasan: bad access detected [ 19.833273] [ 19.833293] Memory state around the buggy address: [ 19.833331] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.833377] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.833607] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.834065] ^ [ 19.834253] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.834336] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.834424] ================================================================== [ 19.680546] ================================================================== [ 19.680783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.680889] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.681094] [ 19.681216] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.681308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.681351] Hardware name: linux,dummy-virt (DT) [ 19.681533] Call trace: [ 19.681645] show_stack+0x20/0x38 (C) [ 19.681960] dump_stack_lvl+0x8c/0xd0 [ 19.682140] print_report+0x118/0x5d0 [ 19.682392] kasan_report+0xdc/0x128 [ 19.682748] __asan_report_store8_noabort+0x20/0x30 [ 19.682979] kasan_atomics_helper+0x3e5c/0x4858 [ 19.683361] kasan_atomics+0x198/0x2e0 [ 19.683470] kunit_try_run_case+0x170/0x3f0 [ 19.683927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.683996] kthread+0x328/0x630 [ 19.684215] ret_from_fork+0x10/0x20 [ 19.684474] [ 19.684515] Allocated by task 265: [ 19.684687] kasan_save_stack+0x3c/0x68 [ 19.684960] kasan_save_track+0x20/0x40 [ 19.685132] kasan_save_alloc_info+0x40/0x58 [ 19.685392] __kasan_kmalloc+0xd4/0xd8 [ 19.685463] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.685583] kasan_atomics+0xb8/0x2e0 [ 19.685648] kunit_try_run_case+0x170/0x3f0 [ 19.685689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.685788] kthread+0x328/0x630 [ 19.685841] ret_from_fork+0x10/0x20 [ 19.685890] [ 19.685931] The buggy address belongs to the object at fff00000c5b40680 [ 19.685931] which belongs to the cache kmalloc-64 of size 64 [ 19.686009] The buggy address is located 0 bytes to the right of [ 19.686009] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.686084] [ 19.686120] The buggy address belongs to the physical page: [ 19.686169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.686246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.686305] page_type: f5(slab) [ 19.686363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.686427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.686472] page dumped because: kasan: bad access detected [ 19.686506] [ 19.686529] Memory state around the buggy address: [ 19.686582] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.686637] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.686692] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.686734] ^ [ 19.686769] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686827] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686869] ================================================================== [ 19.510278] ================================================================== [ 19.510332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.510391] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.510446] [ 19.512294] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.512459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.512491] Hardware name: linux,dummy-virt (DT) [ 19.512531] Call trace: [ 19.513424] show_stack+0x20/0x38 (C) [ 19.513500] dump_stack_lvl+0x8c/0xd0 [ 19.513555] print_report+0x118/0x5d0 [ 19.514600] kasan_report+0xdc/0x128 [ 19.515287] __asan_report_load4_noabort+0x20/0x30 [ 19.515370] kasan_atomics_helper+0x42d8/0x4858 [ 19.516024] kasan_atomics+0x198/0x2e0 [ 19.516546] kunit_try_run_case+0x170/0x3f0 [ 19.516914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.517298] kthread+0x328/0x630 [ 19.517349] ret_from_fork+0x10/0x20 [ 19.518785] [ 19.518913] Allocated by task 265: [ 19.518953] kasan_save_stack+0x3c/0x68 [ 19.519002] kasan_save_track+0x20/0x40 [ 19.519083] kasan_save_alloc_info+0x40/0x58 [ 19.519157] __kasan_kmalloc+0xd4/0xd8 [ 19.519371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.519413] kasan_atomics+0xb8/0x2e0 [ 19.519782] kunit_try_run_case+0x170/0x3f0 [ 19.519942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.520405] kthread+0x328/0x630 [ 19.520533] ret_from_fork+0x10/0x20 [ 19.520573] [ 19.520595] The buggy address belongs to the object at fff00000c5b40680 [ 19.520595] which belongs to the cache kmalloc-64 of size 64 [ 19.521573] The buggy address is located 0 bytes to the right of [ 19.521573] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.521996] [ 19.522025] The buggy address belongs to the physical page: [ 19.522666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.523876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.530143] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.530344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.530374] Hardware name: linux,dummy-virt (DT) [ 19.530408] Call trace: [ 19.530435] show_stack+0x20/0x38 (C) [ 19.530486] dump_stack_lvl+0x8c/0xd0 [ 19.530538] print_report+0x118/0x5d0 [ 19.530587] kasan_report+0xdc/0x128 [ 19.530648] kasan_check_range+0x100/0x1a8 [ 19.530698] __kasan_check_write+0x20/0x30 [ 19.530747] kasan_atomics_helper+0x934/0x4858 [ 19.530797] kasan_atomics+0x198/0x2e0 [ 19.530843] kunit_try_run_case+0x170/0x3f0 [ 19.530894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530948] kthread+0x328/0x630 [ 19.530991] ret_from_fork+0x10/0x20 [ 19.531040] [ 19.531063] Allocated by task 265: [ 19.531095] kasan_save_stack+0x3c/0x68 [ 19.531138] kasan_save_track+0x20/0x40 [ 19.531178] kasan_save_alloc_info+0x40/0x58 [ 19.531219] __kasan_kmalloc+0xd4/0xd8 [ 19.531258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.531300] kasan_atomics+0xb8/0x2e0 [ 19.531338] kunit_try_run_case+0x170/0x3f0 [ 19.531377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.531423] kthread+0x328/0x630 [ 19.531457] ret_from_fork+0x10/0x20 [ 19.531494] [ 19.531515] The buggy address belongs to the object at fff00000c5b40680 [ 19.531515] which belongs to the cache kmalloc-64 of size 64 [ 19.531575] The buggy address is located 0 bytes to the right of [ 19.531575] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.536356] [ 19.537165] The buggy address belongs to the physical page: [ 19.537279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.539322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.539655] page_type: f5(slab) [ 19.539938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.540220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.540295] page dumped because: kasan: bad access detected [ 19.540330] [ 19.540353] Memory state around the buggy address: [ 19.541684] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.542093] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.542587] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.543014] ^ [ 19.543448] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.543501] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544066] ================================================================== [ 19.766166] ================================================================== [ 19.766295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.766510] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.766640] [ 19.766676] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.766765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.766840] Hardware name: linux,dummy-virt (DT) [ 19.766876] Call trace: [ 19.766973] show_stack+0x20/0x38 (C) [ 19.767035] dump_stack_lvl+0x8c/0xd0 [ 19.767084] print_report+0x118/0x5d0 [ 19.767407] kasan_report+0xdc/0x128 [ 19.767705] kasan_check_range+0x100/0x1a8 [ 19.767960] __kasan_check_write+0x20/0x30 [ 19.768043] kasan_atomics_helper+0x11f8/0x4858 [ 19.768096] kasan_atomics+0x198/0x2e0 [ 19.768222] kunit_try_run_case+0x170/0x3f0 [ 19.768275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.768330] kthread+0x328/0x630 [ 19.768375] ret_from_fork+0x10/0x20 [ 19.769002] [ 19.769056] Allocated by task 265: [ 19.769189] kasan_save_stack+0x3c/0x68 [ 19.769296] kasan_save_track+0x20/0x40 [ 19.769439] kasan_save_alloc_info+0x40/0x58 [ 19.769508] __kasan_kmalloc+0xd4/0xd8 [ 19.769567] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.769627] kasan_atomics+0xb8/0x2e0 [ 19.769935] kunit_try_run_case+0x170/0x3f0 [ 19.770221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.770400] kthread+0x328/0x630 [ 19.770875] ret_from_fork+0x10/0x20 [ 19.770960] [ 19.771346] The buggy address belongs to the object at fff00000c5b40680 [ 19.771346] which belongs to the cache kmalloc-64 of size 64 [ 19.771554] The buggy address is located 0 bytes to the right of [ 19.771554] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.771795] [ 19.771903] The buggy address belongs to the physical page: [ 19.772390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.772784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.773191] page_type: f5(slab) [ 19.773418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.773536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.773610] page dumped because: kasan: bad access detected [ 19.773657] [ 19.773678] Memory state around the buggy address: [ 19.773714] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.774378] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.774516] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.774784] ^ [ 19.775008] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.775089] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.775586] ================================================================== [ 19.547175] ================================================================== [ 19.550559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.550962] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.551306] [ 19.551548] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.552116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.552180] Hardware name: linux,dummy-virt (DT) [ 19.553022] Call trace: [ 19.553071] show_stack+0x20/0x38 (C) [ 19.553528] dump_stack_lvl+0x8c/0xd0 [ 19.553643] print_report+0x118/0x5d0 [ 19.554211] kasan_report+0xdc/0x128 [ 19.554357] kasan_check_range+0x100/0x1a8 [ 19.554798] __kasan_check_write+0x20/0x30 [ 19.554971] kasan_atomics_helper+0x99c/0x4858 [ 19.555762] kasan_atomics+0x198/0x2e0 [ 19.555822] kunit_try_run_case+0x170/0x3f0 [ 19.555874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.555930] kthread+0x328/0x630 [ 19.555975] ret_from_fork+0x10/0x20 [ 19.556689] [ 19.556716] Allocated by task 265: [ 19.556754] kasan_save_stack+0x3c/0x68 [ 19.556805] kasan_save_track+0x20/0x40 [ 19.556846] kasan_save_alloc_info+0x40/0x58 [ 19.557047] __kasan_kmalloc+0xd4/0xd8 [ 19.557224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.557524] kasan_atomics+0xb8/0x2e0 [ 19.557570] kunit_try_run_case+0x170/0x3f0 [ 19.557656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.557704] kthread+0x328/0x630 [ 19.557740] ret_from_fork+0x10/0x20 [ 19.557778] [ 19.557801] The buggy address belongs to the object at fff00000c5b40680 [ 19.557801] which belongs to the cache kmalloc-64 of size 64 [ 19.557862] The buggy address is located 0 bytes to the right of [ 19.557862] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.557933] [ 19.557957] The buggy address belongs to the physical page: [ 19.557991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.558045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.558095] page_type: f5(slab) [ 19.558135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.558191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.558235] page dumped because: kasan: bad access detected [ 19.558267] [ 19.558287] Memory state around the buggy address: [ 19.558324] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.558371] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.558417] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.558459] ^ [ 19.558494] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.558540] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.558581] ================================================================== [ 19.898756] ================================================================== [ 19.898810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.898864] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.898918] [ 19.899297] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.899400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.899431] Hardware name: linux,dummy-virt (DT) [ 19.899709] Call trace: [ 19.899754] show_stack+0x20/0x38 (C) [ 19.899997] dump_stack_lvl+0x8c/0xd0 [ 19.900071] print_report+0x118/0x5d0 [ 19.900377] kasan_report+0xdc/0x128 [ 19.900448] __asan_report_load8_noabort+0x20/0x30 [ 19.900711] kasan_atomics_helper+0x3e10/0x4858 [ 19.900789] kasan_atomics+0x198/0x2e0 [ 19.900841] kunit_try_run_case+0x170/0x3f0 [ 19.901279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.901410] kthread+0x328/0x630 [ 19.901523] ret_from_fork+0x10/0x20 [ 19.901652] [ 19.901675] Allocated by task 265: [ 19.901734] kasan_save_stack+0x3c/0x68 [ 19.901788] kasan_save_track+0x20/0x40 [ 19.902098] kasan_save_alloc_info+0x40/0x58 [ 19.902570] __kasan_kmalloc+0xd4/0xd8 [ 19.902641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.902804] kasan_atomics+0xb8/0x2e0 [ 19.903112] kunit_try_run_case+0x170/0x3f0 [ 19.903270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.903348] kthread+0x328/0x630 [ 19.903497] ret_from_fork+0x10/0x20 [ 19.903881] [ 19.904011] The buggy address belongs to the object at fff00000c5b40680 [ 19.904011] which belongs to the cache kmalloc-64 of size 64 [ 19.904230] The buggy address is located 0 bytes to the right of [ 19.904230] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.904366] [ 19.904420] The buggy address belongs to the physical page: [ 19.904678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.904879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.904938] page_type: f5(slab) [ 19.905202] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.905477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.905558] page dumped because: kasan: bad access detected [ 19.905651] [ 19.905878] Memory state around the buggy address: [ 19.905993] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.906425] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.906679] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.906755] ^ [ 19.907266] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.907489] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.907883] ================================================================== [ 19.927905] ================================================================== [ 19.927967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.928021] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.928074] [ 19.928497] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.928601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.928993] Hardware name: linux,dummy-virt (DT) [ 19.929061] Call trace: [ 19.929214] show_stack+0x20/0x38 (C) [ 19.929363] dump_stack_lvl+0x8c/0xd0 [ 19.929428] print_report+0x118/0x5d0 [ 19.929480] kasan_report+0xdc/0x128 [ 19.929557] kasan_check_range+0x100/0x1a8 [ 19.929975] __kasan_check_write+0x20/0x30 [ 19.930032] kasan_atomics_helper+0x17ec/0x4858 [ 19.930453] kasan_atomics+0x198/0x2e0 [ 19.930566] kunit_try_run_case+0x170/0x3f0 [ 19.930912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.931136] kthread+0x328/0x630 [ 19.931420] ret_from_fork+0x10/0x20 [ 19.931613] [ 19.931677] Allocated by task 265: [ 19.931936] kasan_save_stack+0x3c/0x68 [ 19.932118] kasan_save_track+0x20/0x40 [ 19.932252] kasan_save_alloc_info+0x40/0x58 [ 19.932406] __kasan_kmalloc+0xd4/0xd8 [ 19.932450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.932742] kasan_atomics+0xb8/0x2e0 [ 19.933191] kunit_try_run_case+0x170/0x3f0 [ 19.933265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.933438] kthread+0x328/0x630 [ 19.933532] ret_from_fork+0x10/0x20 [ 19.934208] [ 19.934273] The buggy address belongs to the object at fff00000c5b40680 [ 19.934273] which belongs to the cache kmalloc-64 of size 64 [ 19.934374] The buggy address is located 0 bytes to the right of [ 19.934374] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.934649] [ 19.934700] The buggy address belongs to the physical page: [ 19.934746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.935097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.935519] page_type: f5(slab) [ 19.935780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.936188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.936438] page dumped because: kasan: bad access detected [ 19.936509] [ 19.936677] Memory state around the buggy address: [ 19.936918] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.936983] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.937236] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.937499] ^ [ 19.937758] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.937834] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.938074] ================================================================== [ 19.670422] ================================================================== [ 19.670485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.670865] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.671053] [ 19.671139] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.671236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.671600] Hardware name: linux,dummy-virt (DT) [ 19.671717] Call trace: [ 19.671784] show_stack+0x20/0x38 (C) [ 19.671843] dump_stack_lvl+0x8c/0xd0 [ 19.671895] print_report+0x118/0x5d0 [ 19.671942] kasan_report+0xdc/0x128 [ 19.672214] kasan_check_range+0x100/0x1a8 [ 19.672274] __kasan_check_write+0x20/0x30 [ 19.672331] kasan_atomics_helper+0xe44/0x4858 [ 19.672383] kasan_atomics+0x198/0x2e0 [ 19.672429] kunit_try_run_case+0x170/0x3f0 [ 19.672485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.672542] kthread+0x328/0x630 [ 19.672587] ret_from_fork+0x10/0x20 [ 19.672650] [ 19.672670] Allocated by task 265: [ 19.672725] kasan_save_stack+0x3c/0x68 [ 19.672783] kasan_save_track+0x20/0x40 [ 19.672825] kasan_save_alloc_info+0x40/0x58 [ 19.672876] __kasan_kmalloc+0xd4/0xd8 [ 19.672924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.673536] kasan_atomics+0xb8/0x2e0 [ 19.673721] kunit_try_run_case+0x170/0x3f0 [ 19.673949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.674330] kthread+0x328/0x630 [ 19.674612] ret_from_fork+0x10/0x20 [ 19.674704] [ 19.674872] The buggy address belongs to the object at fff00000c5b40680 [ 19.674872] which belongs to the cache kmalloc-64 of size 64 [ 19.675591] The buggy address is located 0 bytes to the right of [ 19.675591] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.675826] [ 19.675890] The buggy address belongs to the physical page: [ 19.675939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.676409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.676518] page_type: f5(slab) [ 19.676587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.676932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.677158] page dumped because: kasan: bad access detected [ 19.677236] [ 19.677390] Memory state around the buggy address: [ 19.677439] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.677488] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.677941] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.678020] ^ [ 19.678069] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678581] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678644] ================================================================== [ 19.758702] ================================================================== [ 19.758973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.759053] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.759107] [ 19.759321] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.759676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.759722] Hardware name: linux,dummy-virt (DT) [ 19.759880] Call trace: [ 19.760096] show_stack+0x20/0x38 (C) [ 19.760294] dump_stack_lvl+0x8c/0xd0 [ 19.760380] print_report+0x118/0x5d0 [ 19.760471] kasan_report+0xdc/0x128 [ 19.760524] kasan_check_range+0x100/0x1a8 [ 19.760612] __kasan_check_write+0x20/0x30 [ 19.760712] kasan_atomics_helper+0x1190/0x4858 [ 19.760764] kasan_atomics+0x198/0x2e0 [ 19.761283] kunit_try_run_case+0x170/0x3f0 [ 19.761520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.761702] kthread+0x328/0x630 [ 19.761921] ret_from_fork+0x10/0x20 [ 19.762039] [ 19.762337] Allocated by task 265: [ 19.762692] kasan_save_stack+0x3c/0x68 [ 19.762777] kasan_save_track+0x20/0x40 [ 19.762834] kasan_save_alloc_info+0x40/0x58 [ 19.762969] __kasan_kmalloc+0xd4/0xd8 [ 19.763073] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.763115] kasan_atomics+0xb8/0x2e0 [ 19.763302] kunit_try_run_case+0x170/0x3f0 [ 19.763566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.763669] kthread+0x328/0x630 [ 19.763706] ret_from_fork+0x10/0x20 [ 19.763753] [ 19.763788] The buggy address belongs to the object at fff00000c5b40680 [ 19.763788] which belongs to the cache kmalloc-64 of size 64 [ 19.763850] The buggy address is located 0 bytes to the right of [ 19.763850] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.763919] [ 19.763956] The buggy address belongs to the physical page: [ 19.764014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.764074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.764124] page_type: f5(slab) [ 19.764172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.764229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.764274] page dumped because: kasan: bad access detected [ 19.764308] [ 19.764329] Memory state around the buggy address: [ 19.764373] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.764430] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.764493] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.764546] ^ [ 19.764582] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.764657] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.764737] ================================================================== [ 19.730095] ================================================================== [ 19.730185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.730242] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.730295] [ 19.730326] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.730411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.730452] Hardware name: linux,dummy-virt (DT) [ 19.730487] Call trace: [ 19.730512] show_stack+0x20/0x38 (C) [ 19.730565] dump_stack_lvl+0x8c/0xd0 [ 19.730615] print_report+0x118/0x5d0 [ 19.730677] kasan_report+0xdc/0x128 [ 19.730729] kasan_check_range+0x100/0x1a8 [ 19.730779] __kasan_check_write+0x20/0x30 [ 19.730828] kasan_atomics_helper+0x1058/0x4858 [ 19.730878] kasan_atomics+0x198/0x2e0 [ 19.730931] kunit_try_run_case+0x170/0x3f0 [ 19.730982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.731036] kthread+0x328/0x630 [ 19.731079] ret_from_fork+0x10/0x20 [ 19.731129] [ 19.731161] Allocated by task 265: [ 19.731192] kasan_save_stack+0x3c/0x68 [ 19.731244] kasan_save_track+0x20/0x40 [ 19.731292] kasan_save_alloc_info+0x40/0x58 [ 19.731345] __kasan_kmalloc+0xd4/0xd8 [ 19.731392] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.731450] kasan_atomics+0xb8/0x2e0 [ 19.731489] kunit_try_run_case+0x170/0x3f0 [ 19.731536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.731583] kthread+0x328/0x630 [ 19.732081] ret_from_fork+0x10/0x20 [ 19.732508] [ 19.732543] The buggy address belongs to the object at fff00000c5b40680 [ 19.732543] which belongs to the cache kmalloc-64 of size 64 [ 19.732640] The buggy address is located 0 bytes to the right of [ 19.732640] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.732710] [ 19.732742] The buggy address belongs to the physical page: [ 19.732777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.733080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.733210] page_type: f5(slab) [ 19.733319] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.733875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.734079] page dumped because: kasan: bad access detected [ 19.734639] [ 19.734809] Memory state around the buggy address: [ 19.734961] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.735139] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.735524] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.735842] ^ [ 19.736176] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.736397] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.736466] ================================================================== [ 19.688981] ================================================================== [ 19.689043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.689340] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.689695] [ 19.689799] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.690186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.690291] Hardware name: linux,dummy-virt (DT) [ 19.690432] Call trace: [ 19.690552] show_stack+0x20/0x38 (C) [ 19.690808] dump_stack_lvl+0x8c/0xd0 [ 19.691242] print_report+0x118/0x5d0 [ 19.691543] kasan_report+0xdc/0x128 [ 19.691824] kasan_check_range+0x100/0x1a8 [ 19.692090] __kasan_check_write+0x20/0x30 [ 19.692226] kasan_atomics_helper+0xeb8/0x4858 [ 19.692358] kasan_atomics+0x198/0x2e0 [ 19.692452] kunit_try_run_case+0x170/0x3f0 [ 19.692711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.692944] kthread+0x328/0x630 [ 19.693090] ret_from_fork+0x10/0x20 [ 19.693292] [ 19.693365] Allocated by task 265: [ 19.693410] kasan_save_stack+0x3c/0x68 [ 19.693470] kasan_save_track+0x20/0x40 [ 19.693740] kasan_save_alloc_info+0x40/0x58 [ 19.694075] __kasan_kmalloc+0xd4/0xd8 [ 19.694190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.694431] kasan_atomics+0xb8/0x2e0 [ 19.694548] kunit_try_run_case+0x170/0x3f0 [ 19.694722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.694827] kthread+0x328/0x630 [ 19.694872] ret_from_fork+0x10/0x20 [ 19.695336] [ 19.695446] The buggy address belongs to the object at fff00000c5b40680 [ 19.695446] which belongs to the cache kmalloc-64 of size 64 [ 19.695678] The buggy address is located 0 bytes to the right of [ 19.695678] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.695761] [ 19.695932] The buggy address belongs to the physical page: [ 19.696185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.696376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.696644] page_type: f5(slab) [ 19.696744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.697093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.697278] page dumped because: kasan: bad access detected [ 19.697364] [ 19.697388] Memory state around the buggy address: [ 19.697425] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.697613] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.697890] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.698036] ^ [ 19.698100] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.698164] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.698337] ================================================================== [ 19.708211] ================================================================== [ 19.708749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.708842] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.709258] [ 19.709357] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.709444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.709474] Hardware name: linux,dummy-virt (DT) [ 19.709510] Call trace: [ 19.709746] show_stack+0x20/0x38 (C) [ 19.709997] dump_stack_lvl+0x8c/0xd0 [ 19.710458] print_report+0x118/0x5d0 [ 19.710784] kasan_report+0xdc/0x128 [ 19.710920] kasan_check_range+0x100/0x1a8 [ 19.711423] __kasan_check_write+0x20/0x30 [ 19.711571] kasan_atomics_helper+0xf88/0x4858 [ 19.711676] kasan_atomics+0x198/0x2e0 [ 19.711782] kunit_try_run_case+0x170/0x3f0 [ 19.712284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.712385] kthread+0x328/0x630 [ 19.712605] ret_from_fork+0x10/0x20 [ 19.712909] [ 19.712958] Allocated by task 265: [ 19.712994] kasan_save_stack+0x3c/0x68 [ 19.713215] kasan_save_track+0x20/0x40 [ 19.713437] kasan_save_alloc_info+0x40/0x58 [ 19.713560] __kasan_kmalloc+0xd4/0xd8 [ 19.713731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.713775] kasan_atomics+0xb8/0x2e0 [ 19.713993] kunit_try_run_case+0x170/0x3f0 [ 19.714104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714167] kthread+0x328/0x630 [ 19.714318] ret_from_fork+0x10/0x20 [ 19.714606] [ 19.714651] The buggy address belongs to the object at fff00000c5b40680 [ 19.714651] which belongs to the cache kmalloc-64 of size 64 [ 19.715083] The buggy address is located 0 bytes to the right of [ 19.715083] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.715586] [ 19.715647] The buggy address belongs to the physical page: [ 19.715795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.716008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.716077] page_type: f5(slab) [ 19.716244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.716347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.716396] page dumped because: kasan: bad access detected [ 19.716433] [ 19.716453] Memory state around the buggy address: [ 19.716487] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.716535] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.716582] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.716643] ^ [ 19.716680] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.716727] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.716768] ================================================================== [ 19.787796] ================================================================== [ 19.788177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.788358] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.788422] [ 19.788610] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.788723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.788751] Hardware name: linux,dummy-virt (DT) [ 19.788785] Call trace: [ 19.788810] show_stack+0x20/0x38 (C) [ 19.788866] dump_stack_lvl+0x8c/0xd0 [ 19.789449] print_report+0x118/0x5d0 [ 19.789742] kasan_report+0xdc/0x128 [ 19.790021] kasan_check_range+0x100/0x1a8 [ 19.790241] __kasan_check_write+0x20/0x30 [ 19.790369] kasan_atomics_helper+0x12d8/0x4858 [ 19.790556] kasan_atomics+0x198/0x2e0 [ 19.790608] kunit_try_run_case+0x170/0x3f0 [ 19.791262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.791578] kthread+0x328/0x630 [ 19.791795] ret_from_fork+0x10/0x20 [ 19.791862] [ 19.791924] Allocated by task 265: [ 19.792321] kasan_save_stack+0x3c/0x68 [ 19.792560] kasan_save_track+0x20/0x40 [ 19.792734] kasan_save_alloc_info+0x40/0x58 [ 19.792983] __kasan_kmalloc+0xd4/0xd8 [ 19.793078] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.793332] kasan_atomics+0xb8/0x2e0 [ 19.793456] kunit_try_run_case+0x170/0x3f0 [ 19.793695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.794742] kthread+0x328/0x630 [ 19.794814] ret_from_fork+0x10/0x20 [ 19.794876] [ 19.794899] The buggy address belongs to the object at fff00000c5b40680 [ 19.794899] which belongs to the cache kmalloc-64 of size 64 [ 19.794979] The buggy address is located 0 bytes to the right of [ 19.794979] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.795080] [ 19.795133] The buggy address belongs to the physical page: [ 19.795200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.795271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.795565] page_type: f5(slab) [ 19.795659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.796200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.796256] page dumped because: kasan: bad access detected [ 19.796292] [ 19.796312] Memory state around the buggy address: [ 19.796631] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.797069] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.797261] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.797581] ^ [ 19.797945] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.798186] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.798748] ================================================================== [ 19.559207] ================================================================== [ 19.559262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 19.559315] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.559368] [ 19.559400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.559484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.559513] Hardware name: linux,dummy-virt (DT) [ 19.559547] Call trace: [ 19.559573] show_stack+0x20/0x38 (C) [ 19.560166] dump_stack_lvl+0x8c/0xd0 [ 19.560281] print_report+0x118/0x5d0 [ 19.560391] kasan_report+0xdc/0x128 [ 19.560447] kasan_check_range+0x100/0x1a8 [ 19.560500] __kasan_check_write+0x20/0x30 [ 19.560814] kasan_atomics_helper+0xa04/0x4858 [ 19.560889] kasan_atomics+0x198/0x2e0 [ 19.560944] kunit_try_run_case+0x170/0x3f0 [ 19.560994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.561049] kthread+0x328/0x630 [ 19.561094] ret_from_fork+0x10/0x20 [ 19.561143] [ 19.561164] Allocated by task 265: [ 19.561197] kasan_save_stack+0x3c/0x68 [ 19.561511] kasan_save_track+0x20/0x40 [ 19.561823] kasan_save_alloc_info+0x40/0x58 [ 19.562080] __kasan_kmalloc+0xd4/0xd8 [ 19.562721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.562806] kasan_atomics+0xb8/0x2e0 [ 19.562849] kunit_try_run_case+0x170/0x3f0 [ 19.562925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.562993] kthread+0x328/0x630 [ 19.563395] ret_from_fork+0x10/0x20 [ 19.563467] [ 19.563692] The buggy address belongs to the object at fff00000c5b40680 [ 19.563692] which belongs to the cache kmalloc-64 of size 64 [ 19.563903] The buggy address is located 0 bytes to the right of [ 19.563903] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.564197] [ 19.564341] The buggy address belongs to the physical page: [ 19.564389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.564470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.564714] page_type: f5(slab) [ 19.564861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.564943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.565008] page dumped because: kasan: bad access detected [ 19.565043] [ 19.565601] Memory state around the buggy address: [ 19.565677] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.565850] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.566029] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.566119] ^ [ 19.566259] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.566335] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.566438] ================================================================== [ 19.818308] ================================================================== [ 19.818376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.818431] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.818483] [ 19.818572] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.818676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.819061] Hardware name: linux,dummy-virt (DT) [ 19.819104] Call trace: [ 19.819132] show_stack+0x20/0x38 (C) [ 19.819307] dump_stack_lvl+0x8c/0xd0 [ 19.819365] print_report+0x118/0x5d0 [ 19.819415] kasan_report+0xdc/0x128 [ 19.819464] kasan_check_range+0x100/0x1a8 [ 19.819515] __kasan_check_write+0x20/0x30 [ 19.819564] kasan_atomics_helper+0x1414/0x4858 [ 19.819613] kasan_atomics+0x198/0x2e0 [ 19.819675] kunit_try_run_case+0x170/0x3f0 [ 19.819848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.819942] kthread+0x328/0x630 [ 19.820020] ret_from_fork+0x10/0x20 [ 19.820072] [ 19.820094] Allocated by task 265: [ 19.820124] kasan_save_stack+0x3c/0x68 [ 19.820177] kasan_save_track+0x20/0x40 [ 19.820224] kasan_save_alloc_info+0x40/0x58 [ 19.820276] __kasan_kmalloc+0xd4/0xd8 [ 19.820315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.820357] kasan_atomics+0xb8/0x2e0 [ 19.820394] kunit_try_run_case+0x170/0x3f0 [ 19.820441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.820486] kthread+0x328/0x630 [ 19.820522] ret_from_fork+0x10/0x20 [ 19.820562] [ 19.820583] The buggy address belongs to the object at fff00000c5b40680 [ 19.820583] which belongs to the cache kmalloc-64 of size 64 [ 19.820657] The buggy address is located 0 bytes to the right of [ 19.820657] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.820972] [ 19.821047] The buggy address belongs to the physical page: [ 19.821314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.821609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.822377] page_type: f5(slab) [ 19.822468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.822988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.823417] page dumped because: kasan: bad access detected [ 19.823461] [ 19.823502] Memory state around the buggy address: [ 19.823574] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.823659] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.823729] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.823985] ^ [ 19.824226] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.824573] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.824654] ================================================================== [ 19.567401] ================================================================== [ 19.567479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.567536] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.567606] [ 19.567651] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.567748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.567778] Hardware name: linux,dummy-virt (DT) [ 19.567818] Call trace: [ 19.567843] show_stack+0x20/0x38 (C) [ 19.567894] dump_stack_lvl+0x8c/0xd0 [ 19.567943] print_report+0x118/0x5d0 [ 19.567992] kasan_report+0xdc/0x128 [ 19.568046] kasan_check_range+0x100/0x1a8 [ 19.568106] __kasan_check_write+0x20/0x30 [ 19.568154] kasan_atomics_helper+0xa6c/0x4858 [ 19.568204] kasan_atomics+0x198/0x2e0 [ 19.568252] kunit_try_run_case+0x170/0x3f0 [ 19.568303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.568359] kthread+0x328/0x630 [ 19.568403] ret_from_fork+0x10/0x20 [ 19.568452] [ 19.568475] Allocated by task 265: [ 19.568507] kasan_save_stack+0x3c/0x68 [ 19.568552] kasan_save_track+0x20/0x40 [ 19.568593] kasan_save_alloc_info+0x40/0x58 [ 19.569767] __kasan_kmalloc+0xd4/0xd8 [ 19.569840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.569943] kasan_atomics+0xb8/0x2e0 [ 19.569984] kunit_try_run_case+0x170/0x3f0 [ 19.570421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.570563] kthread+0x328/0x630 [ 19.570649] ret_from_fork+0x10/0x20 [ 19.570694] [ 19.571182] The buggy address belongs to the object at fff00000c5b40680 [ 19.571182] which belongs to the cache kmalloc-64 of size 64 [ 19.571282] The buggy address is located 0 bytes to the right of [ 19.571282] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.571706] [ 19.571756] The buggy address belongs to the physical page: [ 19.571860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.571965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.572034] page_type: f5(slab) [ 19.572365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.572739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.572802] page dumped because: kasan: bad access detected [ 19.572911] [ 19.573023] Memory state around the buggy address: [ 19.573061] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.573109] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.573441] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.573915] ^ [ 19.573966] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.575903] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.575982] ================================================================== [ 19.863115] ================================================================== [ 19.863186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.863242] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.863295] [ 19.863574] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.864036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.864087] Hardware name: linux,dummy-virt (DT) [ 19.864123] Call trace: [ 19.864329] show_stack+0x20/0x38 (C) [ 19.864535] dump_stack_lvl+0x8c/0xd0 [ 19.864820] print_report+0x118/0x5d0 [ 19.865130] kasan_report+0xdc/0x128 [ 19.865376] __asan_report_load8_noabort+0x20/0x30 [ 19.865751] kasan_atomics_helper+0x3db0/0x4858 [ 19.865851] kasan_atomics+0x198/0x2e0 [ 19.865995] kunit_try_run_case+0x170/0x3f0 [ 19.866203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.866336] kthread+0x328/0x630 [ 19.866385] ret_from_fork+0x10/0x20 [ 19.866666] [ 19.866878] Allocated by task 265: [ 19.866951] kasan_save_stack+0x3c/0x68 [ 19.867356] kasan_save_track+0x20/0x40 [ 19.867428] kasan_save_alloc_info+0x40/0x58 [ 19.867609] __kasan_kmalloc+0xd4/0xd8 [ 19.867680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.867963] kasan_atomics+0xb8/0x2e0 [ 19.868165] kunit_try_run_case+0x170/0x3f0 [ 19.868465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.868793] kthread+0x328/0x630 [ 19.868861] ret_from_fork+0x10/0x20 [ 19.868903] [ 19.868932] The buggy address belongs to the object at fff00000c5b40680 [ 19.868932] which belongs to the cache kmalloc-64 of size 64 [ 19.869208] The buggy address is located 0 bytes to the right of [ 19.869208] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.869608] [ 19.869800] The buggy address belongs to the physical page: [ 19.869853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.869923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.869977] page_type: f5(slab) [ 19.870224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.870458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.870511] page dumped because: kasan: bad access detected [ 19.870546] [ 19.870568] Memory state around the buggy address: [ 19.870603] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.870664] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.870711] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.870753] ^ [ 19.870789] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.870833] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.870874] ================================================================== [ 19.585838] ================================================================== [ 19.585911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.586248] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.586311] [ 19.586364] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.586639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.586684] Hardware name: linux,dummy-virt (DT) [ 19.586907] Call trace: [ 19.586947] show_stack+0x20/0x38 (C) [ 19.587001] dump_stack_lvl+0x8c/0xd0 [ 19.587372] print_report+0x118/0x5d0 [ 19.587469] kasan_report+0xdc/0x128 [ 19.587521] __asan_report_load4_noabort+0x20/0x30 [ 19.587668] kasan_atomics_helper+0x3dcc/0x4858 [ 19.587763] kasan_atomics+0x198/0x2e0 [ 19.587889] kunit_try_run_case+0x170/0x3f0 [ 19.587953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.588018] kthread+0x328/0x630 [ 19.588082] ret_from_fork+0x10/0x20 [ 19.588278] [ 19.588421] Allocated by task 265: [ 19.588527] kasan_save_stack+0x3c/0x68 [ 19.588644] kasan_save_track+0x20/0x40 [ 19.588691] kasan_save_alloc_info+0x40/0x58 [ 19.588766] __kasan_kmalloc+0xd4/0xd8 [ 19.588815] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.588859] kasan_atomics+0xb8/0x2e0 [ 19.589151] kunit_try_run_case+0x170/0x3f0 [ 19.589258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.589570] kthread+0x328/0x630 [ 19.589652] ret_from_fork+0x10/0x20 [ 19.589768] [ 19.589866] The buggy address belongs to the object at fff00000c5b40680 [ 19.589866] which belongs to the cache kmalloc-64 of size 64 [ 19.589969] The buggy address is located 0 bytes to the right of [ 19.589969] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.590164] [ 19.590335] The buggy address belongs to the physical page: [ 19.590373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.590649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.590962] page_type: f5(slab) [ 19.591069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.591134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.591178] page dumped because: kasan: bad access detected [ 19.591221] [ 19.591247] Memory state around the buggy address: [ 19.591300] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591356] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591403] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.591454] ^ [ 19.593049] [ 19.594395] print_report+0x118/0x5d0 [ 19.594738] kasan_check_range+0x100/0x1a8 [ 19.595511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.596491] kasan_save_track+0x20/0x40 [ 19.596859] __kasan_kmalloc+0xd4/0xd8 [ 19.597398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.598435] [ 19.598507] The buggy address belongs to the physical page: [ 19.598858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.599784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.600310] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.603193] [ 19.603669] __asan_report_load4_noabort+0x20/0x30 [ 19.603937] kthread+0x328/0x630 [ 19.604223] __kasan_kmalloc+0xd4/0xd8 [ 19.604266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.604311] kasan_atomics+0xb8/0x2e0 [ 19.604454] kthread+0x328/0x630 [ 19.604696] [ 19.605738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.606172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.606661] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.607154] ^ [ 19.608467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 19.609147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.609964] print_report+0x118/0x5d0 [ 19.610887] kasan_atomics+0x198/0x2e0 [ 19.612978] __kasan_kmalloc+0xd4/0xd8 [ 19.613321] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.613410] kasan_atomics+0xb8/0x2e0 [ 19.613475] kunit_try_run_case+0x170/0x3f0 [ 19.613543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.614560] The buggy address is located 0 bytes to the right of [ 19.614560] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.615306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.617028] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.619161] [ 19.619276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.619815] kunit_try_run_case+0x170/0x3f0 [ 19.620026] [ 19.620245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.620324] kunit_try_run_case+0x170/0x3f0 [ 19.620376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.620424] kthread+0x328/0x630 [ 19.620466] ret_from_fork+0x10/0x20 [ 19.620596] The buggy address is located 0 bytes to the right of [ 19.620596] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.622678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.622926] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.623585] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.624529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.625449] Call trace: [ 19.626524] kasan_check_range+0x100/0x1a8 [ 19.627467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.628986] __kasan_kmalloc+0xd4/0xd8 [ 19.629346] kunit_try_run_case+0x170/0x3f0 [ 19.629451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.629501] kthread+0x328/0x630 [ 19.629537] ret_from_fork+0x10/0x20 [ 19.629577] [ 19.629602] The buggy address belongs to the object at fff00000c5b40680 [ 19.629602] which belongs to the cache kmalloc-64 of size 64 [ 19.630009] The buggy address is located 0 bytes to the right of [ 19.630009] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.630192] [ 19.630241] The buggy address belongs to the physical page: [ 19.630643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.630796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.630896] page_type: f5(slab) [ 19.631032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.631128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.631219] page dumped because: kasan: bad access detected [ 19.631316] [ 19.631338] Memory state around the buggy address: [ 19.631683] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.631855] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.632034] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.632152] ^ [ 19.632597] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.632764] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.632850] ================================================================== [ 19.634584] ================================================================== [ 19.634667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.635009] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.635082] [ 19.635436] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.635553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.635595] Hardware name: linux,dummy-virt (DT) [ 19.635929] Call trace: [ 19.636032] show_stack+0x20/0x38 (C) [ 19.636138] dump_stack_lvl+0x8c/0xd0 [ 19.636260] print_report+0x118/0x5d0 [ 19.636312] kasan_report+0xdc/0x128 [ 19.636369] __asan_report_load4_noabort+0x20/0x30 [ 19.636423] kasan_atomics_helper+0x3dd8/0x4858 [ 19.636668] kasan_atomics+0x198/0x2e0 [ 19.636946] kunit_try_run_case+0x170/0x3f0 [ 19.637192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637300] kthread+0x328/0x630 [ 19.637426] ret_from_fork+0x10/0x20 [ 19.637486] [ 19.637509] Allocated by task 265: [ 19.637596] kasan_save_stack+0x3c/0x68 [ 19.637655] kasan_save_track+0x20/0x40 [ 19.637697] kasan_save_alloc_info+0x40/0x58 [ 19.638022] __kasan_kmalloc+0xd4/0xd8 [ 19.638092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.638180] kasan_atomics+0xb8/0x2e0 [ 19.638248] kunit_try_run_case+0x170/0x3f0 [ 19.638592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.638773] kthread+0x328/0x630 [ 19.638882] ret_from_fork+0x10/0x20 [ 19.638995] [ 19.639019] The buggy address belongs to the object at fff00000c5b40680 [ 19.639019] which belongs to the cache kmalloc-64 of size 64 [ 19.639114] The buggy address is located 0 bytes to the right of [ 19.639114] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.639852] [ 19.640281] The buggy address belongs to the physical page: [ 19.640341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.640683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.640845] page_type: f5(slab) [ 19.640920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.641001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.641044] page dumped because: kasan: bad access detected [ 19.641080] [ 19.641101] Memory state around the buggy address: [ 19.641136] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.641482] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.641536] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.641880] ^ [ 19.641966] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.642095] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.642191] ================================================================== [ 19.656181] ================================================================== [ 19.656232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.656281] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.656333] [ 19.656376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.656481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.656509] Hardware name: linux,dummy-virt (DT) [ 19.656543] Call trace: [ 19.656575] show_stack+0x20/0x38 (C) [ 19.657075] dump_stack_lvl+0x8c/0xd0 [ 19.657308] print_report+0x118/0x5d0 [ 19.657416] kasan_report+0xdc/0x128 [ 19.657493] kasan_check_range+0x100/0x1a8 [ 19.657592] __kasan_check_read+0x20/0x30 [ 19.657683] kasan_atomics_helper+0xdd4/0x4858 [ 19.657747] kasan_atomics+0x198/0x2e0 [ 19.657794] kunit_try_run_case+0x170/0x3f0 [ 19.657846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.657905] kthread+0x328/0x630 [ 19.657996] ret_from_fork+0x10/0x20 [ 19.658196] [ 19.658276] Allocated by task 265: [ 19.658364] kasan_save_stack+0x3c/0x68 [ 19.658460] kasan_save_track+0x20/0x40 [ 19.658587] kasan_save_alloc_info+0x40/0x58 [ 19.658695] __kasan_kmalloc+0xd4/0xd8 [ 19.658760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.658825] kasan_atomics+0xb8/0x2e0 [ 19.658897] kunit_try_run_case+0x170/0x3f0 [ 19.658985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.659061] kthread+0x328/0x630 [ 19.659095] ret_from_fork+0x10/0x20 [ 19.659145] [ 19.659534] The buggy address belongs to the object at fff00000c5b40680 [ 19.659534] which belongs to the cache kmalloc-64 of size 64 [ 19.659636] The buggy address is located 0 bytes to the right of [ 19.659636] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.659713] [ 19.659735] The buggy address belongs to the physical page: [ 19.659770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.660087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.660242] page_type: f5(slab) [ 19.660297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.660387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.660535] page dumped because: kasan: bad access detected [ 19.660603] [ 19.660735] Memory state around the buggy address: [ 19.660850] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660925] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660997] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.661074] ^ [ 19.661112] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.661164] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.661208] ================================================================== [ 19.577575] ================================================================== [ 19.577645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.577701] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.577755] [ 19.577789] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.578142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.578542] Hardware name: linux,dummy-virt (DT) [ 19.578597] Call trace: [ 19.578649] show_stack+0x20/0x38 (C) [ 19.578708] dump_stack_lvl+0x8c/0xd0 [ 19.578759] print_report+0x118/0x5d0 [ 19.579064] kasan_report+0xdc/0x128 [ 19.579177] kasan_check_range+0x100/0x1a8 [ 19.579230] __kasan_check_write+0x20/0x30 [ 19.579285] kasan_atomics_helper+0xad4/0x4858 [ 19.579339] kasan_atomics+0x198/0x2e0 [ 19.579649] kunit_try_run_case+0x170/0x3f0 [ 19.579800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.579861] kthread+0x328/0x630 [ 19.579934] ret_from_fork+0x10/0x20 [ 19.580133] [ 19.580319] Allocated by task 265: [ 19.580374] kasan_save_stack+0x3c/0x68 [ 19.580528] kasan_save_track+0x20/0x40 [ 19.580576] kasan_save_alloc_info+0x40/0x58 [ 19.580903] __kasan_kmalloc+0xd4/0xd8 [ 19.581028] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.581179] kasan_atomics+0xb8/0x2e0 [ 19.581391] kunit_try_run_case+0x170/0x3f0 [ 19.581472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.581646] kthread+0x328/0x630 [ 19.581704] ret_from_fork+0x10/0x20 [ 19.581911] [ 19.581942] The buggy address belongs to the object at fff00000c5b40680 [ 19.581942] which belongs to the cache kmalloc-64 of size 64 [ 19.582006] The buggy address is located 0 bytes to the right of [ 19.582006] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.582072] [ 19.582101] The buggy address belongs to the physical page: [ 19.582135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.582190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.582242] page_type: f5(slab) [ 19.582282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.582336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.582514] page dumped because: kasan: bad access detected [ 19.582907] [ 19.582989] Memory state around the buggy address: [ 19.583158] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.583252] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.583387] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.583472] ^ [ 19.583791] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.583867] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.584035] ================================================================== [ 19.650897] ================================================================== [ 19.651191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.651285] Read of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.651357] [ 19.651413] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.651512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.651542] Hardware name: linux,dummy-virt (DT) [ 19.651576] Call trace: [ 19.651712] show_stack+0x20/0x38 (C) [ 19.652056] dump_stack_lvl+0x8c/0xd0 [ 19.652143] print_report+0x118/0x5d0 [ 19.652195] kasan_report+0xdc/0x128 [ 19.652531] __asan_report_load4_noabort+0x20/0x30 [ 19.652674] kasan_atomics_helper+0x3e04/0x4858 [ 19.652728] kasan_atomics+0x198/0x2e0 [ 19.652791] kunit_try_run_case+0x170/0x3f0 [ 19.652842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.652946] kthread+0x328/0x630 [ 19.653227] ret_from_fork+0x10/0x20 [ 19.653293] [ 19.653536] Allocated by task 265: [ 19.653585] kasan_save_stack+0x3c/0x68 [ 19.653685] kasan_save_track+0x20/0x40 [ 19.653839] kasan_save_alloc_info+0x40/0x58 [ 19.653961] __kasan_kmalloc+0xd4/0xd8 [ 19.654039] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.654179] kasan_atomics+0xb8/0x2e0 [ 19.654261] kunit_try_run_case+0x170/0x3f0 [ 19.654311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.654643] kthread+0x328/0x630 [ 19.654797] ret_from_fork+0x10/0x20 [ 19.654896] [ 19.655021] The buggy address belongs to the object at fff00000c5b40680 [ 19.655021] which belongs to the cache kmalloc-64 of size 64 [ 19.655109] The buggy address is located 0 bytes to the right of [ 19.655109] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.655184] [ 19.655223] The buggy address belongs to the physical page: [ 19.655276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.655333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.655393] page_type: f5(slab) [ 19.655435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.655491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.655543] page dumped because: kasan: bad access detected [ 19.655589] [ 19.655627] Memory state around the buggy address: [ 19.655659] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.655706] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.655751] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.655801] ^ [ 19.655837] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.655890] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.655930] ================================================================== [ 19.799425] ================================================================== [ 19.799529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.799585] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.799780] [ 19.799812] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.799897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.799936] Hardware name: linux,dummy-virt (DT) [ 19.799991] Call trace: [ 19.800017] show_stack+0x20/0x38 (C) [ 19.800070] dump_stack_lvl+0x8c/0xd0 [ 19.800126] print_report+0x118/0x5d0 [ 19.800186] kasan_report+0xdc/0x128 [ 19.800234] kasan_check_range+0x100/0x1a8 [ 19.800288] __kasan_check_write+0x20/0x30 [ 19.800339] kasan_atomics_helper+0x1384/0x4858 [ 19.800399] kasan_atomics+0x198/0x2e0 [ 19.800447] kunit_try_run_case+0x170/0x3f0 [ 19.800497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.800558] kthread+0x328/0x630 [ 19.800603] ret_from_fork+0x10/0x20 [ 19.800663] [ 19.800686] Allocated by task 265: [ 19.800716] kasan_save_stack+0x3c/0x68 [ 19.800759] kasan_save_track+0x20/0x40 [ 19.800799] kasan_save_alloc_info+0x40/0x58 [ 19.800841] __kasan_kmalloc+0xd4/0xd8 [ 19.800891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.800968] kasan_atomics+0xb8/0x2e0 [ 19.801027] kunit_try_run_case+0x170/0x3f0 [ 19.801811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.801912] kthread+0x328/0x630 [ 19.801974] ret_from_fork+0x10/0x20 [ 19.802053] [ 19.802302] The buggy address belongs to the object at fff00000c5b40680 [ 19.802302] which belongs to the cache kmalloc-64 of size 64 [ 19.802492] The buggy address is located 0 bytes to the right of [ 19.802492] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.802854] [ 19.802982] The buggy address belongs to the physical page: [ 19.803534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.803604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.804139] page_type: f5(slab) [ 19.804384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.804486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.804559] page dumped because: kasan: bad access detected [ 19.804595] [ 19.804927] Memory state around the buggy address: [ 19.805220] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.805414] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.805875] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.806007] ^ [ 19.806096] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806295] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806504] ================================================================== [ 19.853961] ================================================================== [ 19.854226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.854531] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.854604] [ 19.854875] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.854983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.855108] Hardware name: linux,dummy-virt (DT) [ 19.855146] Call trace: [ 19.855174] show_stack+0x20/0x38 (C) [ 19.855227] dump_stack_lvl+0x8c/0xd0 [ 19.855524] print_report+0x118/0x5d0 [ 19.855815] kasan_report+0xdc/0x128 [ 19.855870] kasan_check_range+0x100/0x1a8 [ 19.855923] __kasan_check_write+0x20/0x30 [ 19.855970] kasan_atomics_helper+0x15b4/0x4858 [ 19.856023] kasan_atomics+0x198/0x2e0 [ 19.856240] kunit_try_run_case+0x170/0x3f0 [ 19.856928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.857168] kthread+0x328/0x630 [ 19.857317] ret_from_fork+0x10/0x20 [ 19.857428] [ 19.857573] Allocated by task 265: [ 19.857610] kasan_save_stack+0x3c/0x68 [ 19.857665] kasan_save_track+0x20/0x40 [ 19.857724] kasan_save_alloc_info+0x40/0x58 [ 19.857766] __kasan_kmalloc+0xd4/0xd8 [ 19.857973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.858208] kasan_atomics+0xb8/0x2e0 [ 19.858435] kunit_try_run_case+0x170/0x3f0 [ 19.858718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.858804] kthread+0x328/0x630 [ 19.858978] ret_from_fork+0x10/0x20 [ 19.859023] [ 19.859077] The buggy address belongs to the object at fff00000c5b40680 [ 19.859077] which belongs to the cache kmalloc-64 of size 64 [ 19.859374] The buggy address is located 0 bytes to the right of [ 19.859374] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.860043] [ 19.860102] The buggy address belongs to the physical page: [ 19.860156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.861005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.861087] page_type: f5(slab) [ 19.861570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.861650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.861729] page dumped because: kasan: bad access detected [ 19.861766] [ 19.861798] Memory state around the buggy address: [ 19.861837] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.862209] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.862273] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.862388] ^ [ 19.862430] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.862477] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.862528] ================================================================== [ 19.909836] ================================================================== [ 19.909901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.910180] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.910683] [ 19.910729] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.910843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.910874] Hardware name: linux,dummy-virt (DT) [ 19.910908] Call trace: [ 19.911125] show_stack+0x20/0x38 (C) [ 19.911412] dump_stack_lvl+0x8c/0xd0 [ 19.911635] print_report+0x118/0x5d0 [ 19.911876] kasan_report+0xdc/0x128 [ 19.911937] kasan_check_range+0x100/0x1a8 [ 19.911990] __kasan_check_write+0x20/0x30 [ 19.912628] kasan_atomics_helper+0x175c/0x4858 [ 19.912703] kasan_atomics+0x198/0x2e0 [ 19.912754] kunit_try_run_case+0x170/0x3f0 [ 19.912802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.912859] kthread+0x328/0x630 [ 19.912905] ret_from_fork+0x10/0x20 [ 19.913454] [ 19.913518] Allocated by task 265: [ 19.913742] kasan_save_stack+0x3c/0x68 [ 19.913961] kasan_save_track+0x20/0x40 [ 19.914055] kasan_save_alloc_info+0x40/0x58 [ 19.914410] __kasan_kmalloc+0xd4/0xd8 [ 19.914504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.914705] kasan_atomics+0xb8/0x2e0 [ 19.914878] kunit_try_run_case+0x170/0x3f0 [ 19.914981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.915068] kthread+0x328/0x630 [ 19.915269] ret_from_fork+0x10/0x20 [ 19.915879] [ 19.915928] The buggy address belongs to the object at fff00000c5b40680 [ 19.915928] which belongs to the cache kmalloc-64 of size 64 [ 19.916194] The buggy address is located 0 bytes to the right of [ 19.916194] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.916382] [ 19.916407] The buggy address belongs to the physical page: [ 19.916938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.917298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.917361] page_type: f5(slab) [ 19.917683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.918025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.918472] page dumped because: kasan: bad access detected [ 19.918907] [ 19.919196] Memory state around the buggy address: [ 19.919278] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.919536] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.919710] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.919757] ^ [ 19.919796] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.919842] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.919883] ================================================================== [ 19.871087] ================================================================== [ 19.871135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.871185] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.871236] [ 19.871265] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.871348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.871376] Hardware name: linux,dummy-virt (DT) [ 19.871409] Call trace: [ 19.871432] show_stack+0x20/0x38 (C) [ 19.871482] dump_stack_lvl+0x8c/0xd0 [ 19.871529] print_report+0x118/0x5d0 [ 19.871577] kasan_report+0xdc/0x128 [ 19.871657] kasan_check_range+0x100/0x1a8 [ 19.871708] __kasan_check_write+0x20/0x30 [ 19.871755] kasan_atomics_helper+0x1644/0x4858 [ 19.871929] kasan_atomics+0x198/0x2e0 [ 19.872041] kunit_try_run_case+0x170/0x3f0 [ 19.872097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.872267] kthread+0x328/0x630 [ 19.872313] ret_from_fork+0x10/0x20 [ 19.872361] [ 19.872383] Allocated by task 265: [ 19.872414] kasan_save_stack+0x3c/0x68 [ 19.872459] kasan_save_track+0x20/0x40 [ 19.872541] kasan_save_alloc_info+0x40/0x58 [ 19.872586] __kasan_kmalloc+0xd4/0xd8 [ 19.872637] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.872679] kasan_atomics+0xb8/0x2e0 [ 19.872727] kunit_try_run_case+0x170/0x3f0 [ 19.872769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.872814] kthread+0x328/0x630 [ 19.872857] ret_from_fork+0x10/0x20 [ 19.872898] [ 19.872928] The buggy address belongs to the object at fff00000c5b40680 [ 19.872928] which belongs to the cache kmalloc-64 of size 64 [ 19.873339] The buggy address is located 0 bytes to the right of [ 19.873339] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.873672] [ 19.873705] The buggy address belongs to the physical page: [ 19.873771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.874016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.874468] page_type: f5(slab) [ 19.874914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.875258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.875388] page dumped because: kasan: bad access detected [ 19.875740] [ 19.876014] Memory state around the buggy address: [ 19.876222] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.876294] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.876565] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.876909] ^ [ 19.877206] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.877301] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.877352] ================================================================== [ 19.749949] ================================================================== [ 19.750359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.750573] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.750671] [ 19.750819] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.750915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.751060] Hardware name: linux,dummy-virt (DT) [ 19.751103] Call trace: [ 19.751129] show_stack+0x20/0x38 (C) [ 19.751190] dump_stack_lvl+0x8c/0xd0 [ 19.751447] print_report+0x118/0x5d0 [ 19.751531] kasan_report+0xdc/0x128 [ 19.752036] kasan_check_range+0x100/0x1a8 [ 19.752203] __kasan_check_write+0x20/0x30 [ 19.752255] kasan_atomics_helper+0x1128/0x4858 [ 19.752307] kasan_atomics+0x198/0x2e0 [ 19.752538] kunit_try_run_case+0x170/0x3f0 [ 19.752700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.752945] kthread+0x328/0x630 [ 19.753205] ret_from_fork+0x10/0x20 [ 19.753366] [ 19.753515] Allocated by task 265: [ 19.753555] kasan_save_stack+0x3c/0x68 [ 19.753602] kasan_save_track+0x20/0x40 [ 19.753654] kasan_save_alloc_info+0x40/0x58 [ 19.753698] __kasan_kmalloc+0xd4/0xd8 [ 19.753738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.753780] kasan_atomics+0xb8/0x2e0 [ 19.754066] kunit_try_run_case+0x170/0x3f0 [ 19.754166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.754218] kthread+0x328/0x630 [ 19.754254] ret_from_fork+0x10/0x20 [ 19.754302] [ 19.754325] The buggy address belongs to the object at fff00000c5b40680 [ 19.754325] which belongs to the cache kmalloc-64 of size 64 [ 19.754387] The buggy address is located 0 bytes to the right of [ 19.754387] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.754455] [ 19.754477] The buggy address belongs to the physical page: [ 19.754521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.754577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.755122] page_type: f5(slab) [ 19.755214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.755447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.755758] page dumped because: kasan: bad access detected [ 19.756070] [ 19.756119] Memory state around the buggy address: [ 19.756163] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.756890] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.757019] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.757113] ^ [ 19.757154] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.757208] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.757250] ================================================================== [ 19.807156] ================================================================== [ 19.807217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.807270] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.807324] [ 19.807729] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.807833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.807924] Hardware name: linux,dummy-virt (DT) [ 19.807991] Call trace: [ 19.808019] show_stack+0x20/0x38 (C) [ 19.808440] dump_stack_lvl+0x8c/0xd0 [ 19.808707] print_report+0x118/0x5d0 [ 19.808776] kasan_report+0xdc/0x128 [ 19.808907] __asan_report_load8_noabort+0x20/0x30 [ 19.809060] kasan_atomics_helper+0x3f04/0x4858 [ 19.809135] kasan_atomics+0x198/0x2e0 [ 19.809191] kunit_try_run_case+0x170/0x3f0 [ 19.809270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.809327] kthread+0x328/0x630 [ 19.809732] ret_from_fork+0x10/0x20 [ 19.810207] [ 19.810252] Allocated by task 265: [ 19.810374] kasan_save_stack+0x3c/0x68 [ 19.810480] kasan_save_track+0x20/0x40 [ 19.810547] kasan_save_alloc_info+0x40/0x58 [ 19.810793] __kasan_kmalloc+0xd4/0xd8 [ 19.811009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.811482] kasan_atomics+0xb8/0x2e0 [ 19.811586] kunit_try_run_case+0x170/0x3f0 [ 19.812070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.812324] kthread+0x328/0x630 [ 19.812490] ret_from_fork+0x10/0x20 [ 19.812798] [ 19.812948] The buggy address belongs to the object at fff00000c5b40680 [ 19.812948] which belongs to the cache kmalloc-64 of size 64 [ 19.813209] The buggy address is located 0 bytes to the right of [ 19.813209] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.813311] [ 19.813339] The buggy address belongs to the physical page: [ 19.813741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.814163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.814231] page_type: f5(slab) [ 19.814604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.814862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.815052] page dumped because: kasan: bad access detected [ 19.815391] [ 19.815588] Memory state around the buggy address: [ 19.815715] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.815912] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.815990] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.816340] ^ [ 19.816602] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.816970] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817113] ================================================================== [ 19.718236] ================================================================== [ 19.718291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.718344] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.718397] [ 19.718911] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.719069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.719104] Hardware name: linux,dummy-virt (DT) [ 19.719138] Call trace: [ 19.719164] show_stack+0x20/0x38 (C) [ 19.719424] dump_stack_lvl+0x8c/0xd0 [ 19.719767] print_report+0x118/0x5d0 [ 19.719982] kasan_report+0xdc/0x128 [ 19.720138] kasan_check_range+0x100/0x1a8 [ 19.720198] __kasan_check_write+0x20/0x30 [ 19.720553] kasan_atomics_helper+0xff0/0x4858 [ 19.720693] kasan_atomics+0x198/0x2e0 [ 19.720854] kunit_try_run_case+0x170/0x3f0 [ 19.721026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.721187] kthread+0x328/0x630 [ 19.721319] ret_from_fork+0x10/0x20 [ 19.721542] [ 19.721567] Allocated by task 265: [ 19.721764] kasan_save_stack+0x3c/0x68 [ 19.721885] kasan_save_track+0x20/0x40 [ 19.722058] kasan_save_alloc_info+0x40/0x58 [ 19.722449] __kasan_kmalloc+0xd4/0xd8 [ 19.722611] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.722847] kasan_atomics+0xb8/0x2e0 [ 19.722917] kunit_try_run_case+0x170/0x3f0 [ 19.723107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.723276] kthread+0x328/0x630 [ 19.723592] ret_from_fork+0x10/0x20 [ 19.723824] [ 19.724204] The buggy address belongs to the object at fff00000c5b40680 [ 19.724204] which belongs to the cache kmalloc-64 of size 64 [ 19.724567] The buggy address is located 0 bytes to the right of [ 19.724567] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.724908] [ 19.725049] The buggy address belongs to the physical page: [ 19.725259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.725380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.725442] page_type: f5(slab) [ 19.725485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.726008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.726297] page dumped because: kasan: bad access detected [ 19.726374] [ 19.726395] Memory state around the buggy address: [ 19.726744] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.726956] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727406] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.727573] ^ [ 19.727631] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.728150] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.728245] ================================================================== [ 19.699929] ================================================================== [ 19.700100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.700159] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.700213] [ 19.700481] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.700682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.700738] Hardware name: linux,dummy-virt (DT) [ 19.700773] Call trace: [ 19.700818] show_stack+0x20/0x38 (C) [ 19.701033] dump_stack_lvl+0x8c/0xd0 [ 19.701280] print_report+0x118/0x5d0 [ 19.701391] kasan_report+0xdc/0x128 [ 19.701454] kasan_check_range+0x100/0x1a8 [ 19.701528] __kasan_check_write+0x20/0x30 [ 19.701654] kasan_atomics_helper+0xf20/0x4858 [ 19.702043] kasan_atomics+0x198/0x2e0 [ 19.702144] kunit_try_run_case+0x170/0x3f0 [ 19.702266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.702383] kthread+0x328/0x630 [ 19.702518] ret_from_fork+0x10/0x20 [ 19.702571] [ 19.702592] Allocated by task 265: [ 19.702826] kasan_save_stack+0x3c/0x68 [ 19.703074] kasan_save_track+0x20/0x40 [ 19.703153] kasan_save_alloc_info+0x40/0x58 [ 19.703285] __kasan_kmalloc+0xd4/0xd8 [ 19.703361] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.703443] kasan_atomics+0xb8/0x2e0 [ 19.703645] kunit_try_run_case+0x170/0x3f0 [ 19.703859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.704255] kthread+0x328/0x630 [ 19.704646] ret_from_fork+0x10/0x20 [ 19.704707] [ 19.704731] The buggy address belongs to the object at fff00000c5b40680 [ 19.704731] which belongs to the cache kmalloc-64 of size 64 [ 19.704796] The buggy address is located 0 bytes to the right of [ 19.704796] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.704863] [ 19.704887] The buggy address belongs to the physical page: [ 19.704922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.705025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.705099] page_type: f5(slab) [ 19.705165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.705237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.705299] page dumped because: kasan: bad access detected [ 19.705362] [ 19.705691] Memory state around the buggy address: [ 19.705940] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.706008] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.706229] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.706505] ^ [ 19.706775] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.706848] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.706905] ================================================================== [ 19.737843] ================================================================== [ 19.738416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.738665] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.738729] [ 19.738914] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.739103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.739585] Hardware name: linux,dummy-virt (DT) [ 19.739653] Call trace: [ 19.739816] show_stack+0x20/0x38 (C) [ 19.739901] dump_stack_lvl+0x8c/0xd0 [ 19.739961] print_report+0x118/0x5d0 [ 19.740009] kasan_report+0xdc/0x128 [ 19.740561] kasan_check_range+0x100/0x1a8 [ 19.740781] __kasan_check_write+0x20/0x30 [ 19.740871] kasan_atomics_helper+0x10c0/0x4858 [ 19.740955] kasan_atomics+0x198/0x2e0 [ 19.741106] kunit_try_run_case+0x170/0x3f0 [ 19.741454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.741644] kthread+0x328/0x630 [ 19.741868] ret_from_fork+0x10/0x20 [ 19.742221] [ 19.742419] Allocated by task 265: [ 19.742508] kasan_save_stack+0x3c/0x68 [ 19.742799] kasan_save_track+0x20/0x40 [ 19.742967] kasan_save_alloc_info+0x40/0x58 [ 19.743037] __kasan_kmalloc+0xd4/0xd8 [ 19.743521] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.743639] kasan_atomics+0xb8/0x2e0 [ 19.743914] kunit_try_run_case+0x170/0x3f0 [ 19.744004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.744093] kthread+0x328/0x630 [ 19.744428] ret_from_fork+0x10/0x20 [ 19.744543] [ 19.744797] The buggy address belongs to the object at fff00000c5b40680 [ 19.744797] which belongs to the cache kmalloc-64 of size 64 [ 19.745058] The buggy address is located 0 bytes to the right of [ 19.745058] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.745671] [ 19.745711] The buggy address belongs to the physical page: [ 19.745762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.746005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.746185] page_type: f5(slab) [ 19.746279] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.746566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.746635] page dumped because: kasan: bad access detected [ 19.746843] [ 19.746971] Memory state around the buggy address: [ 19.747074] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.747387] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.747447] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.747960] ^ [ 19.748065] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.748446] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.748672] ================================================================== [ 19.835415] ================================================================== [ 19.835499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.835639] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.835725] [ 19.835764] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.836013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.836080] Hardware name: linux,dummy-virt (DT) [ 19.836564] Call trace: [ 19.836609] show_stack+0x20/0x38 (C) [ 19.836679] dump_stack_lvl+0x8c/0xd0 [ 19.836732] print_report+0x118/0x5d0 [ 19.837063] kasan_report+0xdc/0x128 [ 19.837470] kasan_check_range+0x100/0x1a8 [ 19.837581] __kasan_check_write+0x20/0x30 [ 19.837649] kasan_atomics_helper+0x14e4/0x4858 [ 19.837707] kasan_atomics+0x198/0x2e0 [ 19.837767] kunit_try_run_case+0x170/0x3f0 [ 19.837816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.838167] kthread+0x328/0x630 [ 19.838237] ret_from_fork+0x10/0x20 [ 19.838472] [ 19.838650] Allocated by task 265: [ 19.838764] kasan_save_stack+0x3c/0x68 [ 19.838860] kasan_save_track+0x20/0x40 [ 19.838929] kasan_save_alloc_info+0x40/0x58 [ 19.839077] __kasan_kmalloc+0xd4/0xd8 [ 19.839141] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.839182] kasan_atomics+0xb8/0x2e0 [ 19.839578] kunit_try_run_case+0x170/0x3f0 [ 19.839853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.840114] kthread+0x328/0x630 [ 19.840197] ret_from_fork+0x10/0x20 [ 19.840273] [ 19.840468] The buggy address belongs to the object at fff00000c5b40680 [ 19.840468] which belongs to the cache kmalloc-64 of size 64 [ 19.840610] The buggy address is located 0 bytes to the right of [ 19.840610] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.840996] [ 19.841148] The buggy address belongs to the physical page: [ 19.841315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.841386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.841439] page_type: f5(slab) [ 19.841696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.841803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.842071] page dumped because: kasan: bad access detected [ 19.842529] [ 19.842575] Memory state around the buggy address: [ 19.842671] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.842931] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.843212] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.843590] ^ [ 19.843669] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843797] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843882] ================================================================== [ 19.661819] ================================================================== [ 19.661942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.662017] Read of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.662070] [ 19.662101] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.662202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.662259] Hardware name: linux,dummy-virt (DT) [ 19.662315] Call trace: [ 19.662359] show_stack+0x20/0x38 (C) [ 19.662431] dump_stack_lvl+0x8c/0xd0 [ 19.662482] print_report+0x118/0x5d0 [ 19.662557] kasan_report+0xdc/0x128 [ 19.662847] __asan_report_load8_noabort+0x20/0x30 [ 19.663083] kasan_atomics_helper+0x3f58/0x4858 [ 19.663169] kasan_atomics+0x198/0x2e0 [ 19.663248] kunit_try_run_case+0x170/0x3f0 [ 19.663300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.663357] kthread+0x328/0x630 [ 19.663813] ret_from_fork+0x10/0x20 [ 19.664002] [ 19.664075] Allocated by task 265: [ 19.664257] kasan_save_stack+0x3c/0x68 [ 19.664318] kasan_save_track+0x20/0x40 [ 19.664786] kasan_save_alloc_info+0x40/0x58 [ 19.664859] __kasan_kmalloc+0xd4/0xd8 [ 19.664901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.665100] kasan_atomics+0xb8/0x2e0 [ 19.665147] kunit_try_run_case+0x170/0x3f0 [ 19.665213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.665533] kthread+0x328/0x630 [ 19.665787] ret_from_fork+0x10/0x20 [ 19.665885] [ 19.665952] The buggy address belongs to the object at fff00000c5b40680 [ 19.665952] which belongs to the cache kmalloc-64 of size 64 [ 19.666111] The buggy address is located 0 bytes to the right of [ 19.666111] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.666495] [ 19.666682] The buggy address belongs to the physical page: [ 19.666771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.666922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.667028] page_type: f5(slab) [ 19.667085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.667503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.667579] page dumped because: kasan: bad access detected [ 19.667755] [ 19.667823] Memory state around the buggy address: [ 19.667862] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.668270] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.668337] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.668479] ^ [ 19.668536] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.668602] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.668900] ================================================================== [ 19.844930] ================================================================== [ 19.845077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.845261] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.845338] [ 19.845371] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.845861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.846092] Hardware name: linux,dummy-virt (DT) [ 19.846181] Call trace: [ 19.846366] show_stack+0x20/0x38 (C) [ 19.846554] dump_stack_lvl+0x8c/0xd0 [ 19.846813] print_report+0x118/0x5d0 [ 19.846896] kasan_report+0xdc/0x128 [ 19.847232] kasan_check_range+0x100/0x1a8 [ 19.847413] __kasan_check_write+0x20/0x30 [ 19.847489] kasan_atomics_helper+0x154c/0x4858 [ 19.847568] kasan_atomics+0x198/0x2e0 [ 19.847628] kunit_try_run_case+0x170/0x3f0 [ 19.847678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.847734] kthread+0x328/0x630 [ 19.847785] ret_from_fork+0x10/0x20 [ 19.847844] [ 19.847876] Allocated by task 265: [ 19.847917] kasan_save_stack+0x3c/0x68 [ 19.847970] kasan_save_track+0x20/0x40 [ 19.848012] kasan_save_alloc_info+0x40/0x58 [ 19.848056] __kasan_kmalloc+0xd4/0xd8 [ 19.848097] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.848146] kasan_atomics+0xb8/0x2e0 [ 19.848186] kunit_try_run_case+0x170/0x3f0 [ 19.848225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.848270] kthread+0x328/0x630 [ 19.848305] ret_from_fork+0x10/0x20 [ 19.848344] [ 19.848375] The buggy address belongs to the object at fff00000c5b40680 [ 19.848375] which belongs to the cache kmalloc-64 of size 64 [ 19.848447] The buggy address is located 0 bytes to the right of [ 19.848447] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.848515] [ 19.848551] The buggy address belongs to the physical page: [ 19.848584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.849343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.849425] page_type: f5(slab) [ 19.849533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.849671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.849818] page dumped because: kasan: bad access detected [ 19.850405] [ 19.850687] Memory state around the buggy address: [ 19.851054] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.851479] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.851698] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.851799] ^ [ 19.851838] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.852093] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.852256] ================================================================== [ 19.778642] ================================================================== [ 19.778712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.778849] Write of size 8 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.778925] [ 19.778959] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.779144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.779176] Hardware name: linux,dummy-virt (DT) [ 19.779240] Call trace: [ 19.779266] show_stack+0x20/0x38 (C) [ 19.779511] dump_stack_lvl+0x8c/0xd0 [ 19.779708] print_report+0x118/0x5d0 [ 19.779949] kasan_report+0xdc/0x128 [ 19.780015] kasan_check_range+0x100/0x1a8 [ 19.780075] __kasan_check_write+0x20/0x30 [ 19.780126] kasan_atomics_helper+0x126c/0x4858 [ 19.780181] kasan_atomics+0x198/0x2e0 [ 19.780231] kunit_try_run_case+0x170/0x3f0 [ 19.780280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.780333] kthread+0x328/0x630 [ 19.780378] ret_from_fork+0x10/0x20 [ 19.780426] [ 19.780449] Allocated by task 265: [ 19.780482] kasan_save_stack+0x3c/0x68 [ 19.780526] kasan_save_track+0x20/0x40 [ 19.781423] kasan_save_alloc_info+0x40/0x58 [ 19.781565] __kasan_kmalloc+0xd4/0xd8 [ 19.781779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.781883] kasan_atomics+0xb8/0x2e0 [ 19.781935] kunit_try_run_case+0x170/0x3f0 [ 19.782314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.782629] kthread+0x328/0x630 [ 19.782816] ret_from_fork+0x10/0x20 [ 19.782877] [ 19.782900] The buggy address belongs to the object at fff00000c5b40680 [ 19.782900] which belongs to the cache kmalloc-64 of size 64 [ 19.782990] The buggy address is located 0 bytes to the right of [ 19.782990] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.783442] [ 19.784152] The buggy address belongs to the physical page: [ 19.784468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.784822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.785032] page_type: f5(slab) [ 19.785089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.785339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.785431] page dumped because: kasan: bad access detected [ 19.785519] [ 19.785542] Memory state around the buggy address: [ 19.785855] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.786151] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.786386] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.786435] ^ [ 19.786644] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786873] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786944] ================================================================== [ 19.644189] ================================================================== [ 19.644251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.644449] Write of size 4 at addr fff00000c5b406b0 by task kunit_try_catch/265 [ 19.644516] [ 19.644550] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.644644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.644674] Hardware name: linux,dummy-virt (DT) [ 19.644708] Call trace: [ 19.644734] show_stack+0x20/0x38 (C) [ 19.644784] dump_stack_lvl+0x8c/0xd0 [ 19.644862] print_report+0x118/0x5d0 [ 19.644962] kasan_report+0xdc/0x128 [ 19.645019] kasan_check_range+0x100/0x1a8 [ 19.645069] __kasan_check_write+0x20/0x30 [ 19.645117] kasan_atomics_helper+0xd3c/0x4858 [ 19.645737] kasan_atomics+0x198/0x2e0 [ 19.645821] kunit_try_run_case+0x170/0x3f0 [ 19.645875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.646314] kthread+0x328/0x630 [ 19.646389] ret_from_fork+0x10/0x20 [ 19.646604] [ 19.646715] Allocated by task 265: [ 19.646789] kasan_save_stack+0x3c/0x68 [ 19.647102] kasan_save_track+0x20/0x40 [ 19.647350] kasan_save_alloc_info+0x40/0x58 [ 19.647440] __kasan_kmalloc+0xd4/0xd8 [ 19.647540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.647806] kasan_atomics+0xb8/0x2e0 [ 19.648002] kunit_try_run_case+0x170/0x3f0 [ 19.648348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.648630] kthread+0x328/0x630 [ 19.649108] ret_from_fork+0x10/0x20 [ 19.649174] [ 19.649198] The buggy address belongs to the object at fff00000c5b40680 [ 19.649198] which belongs to the cache kmalloc-64 of size 64 [ 19.649261] The buggy address is located 0 bytes to the right of [ 19.649261] allocated 48-byte region [fff00000c5b40680, fff00000c5b406b0) [ 19.649333] [ 19.649355] The buggy address belongs to the physical page: [ 19.649391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b40 [ 19.649446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.649498] page_type: f5(slab) [ 19.649541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.649592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.649652] page dumped because: kasan: bad access detected [ 19.649684] [ 19.649709] Memory state around the buggy address: [ 19.649770] fff00000c5b40580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.649830] fff00000c5b40600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.649876] >fff00000c5b40680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.649923] ^ [ 19.649959] fff00000c5b40700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650013] fff00000c5b40780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650061] ==================================================================
[ 16.448141] ================================================================== [ 16.448495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.448846] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.449132] [ 16.449240] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.449282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.449309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.449334] Call Trace: [ 16.449350] <TASK> [ 16.449367] dump_stack_lvl+0x73/0xb0 [ 16.449408] print_report+0xd1/0x610 [ 16.449432] ? __virt_addr_valid+0x1db/0x2d0 [ 16.449456] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.449478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.449502] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.449526] kasan_report+0x141/0x180 [ 16.449550] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.449578] kasan_check_range+0x10c/0x1c0 [ 16.449604] __kasan_check_write+0x18/0x20 [ 16.449636] kasan_atomics_helper+0x20c8/0x5450 [ 16.449660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.449683] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.449710] ? kasan_atomics+0x152/0x310 [ 16.449738] kasan_atomics+0x1dc/0x310 [ 16.449762] ? __pfx_kasan_atomics+0x10/0x10 [ 16.449787] ? __pfx_read_tsc+0x10/0x10 [ 16.449809] ? ktime_get_ts64+0x86/0x230 [ 16.449836] kunit_try_run_case+0x1a5/0x480 [ 16.449862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.449886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.449912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.449938] ? __kthread_parkme+0x82/0x180 [ 16.449960] ? preempt_count_sub+0x50/0x80 [ 16.449985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.450011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.450037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.450062] kthread+0x337/0x6f0 [ 16.450083] ? trace_preempt_on+0x20/0xc0 [ 16.450107] ? __pfx_kthread+0x10/0x10 [ 16.450130] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.450153] ? calculate_sigpending+0x7b/0xa0 [ 16.450178] ? __pfx_kthread+0x10/0x10 [ 16.450202] ret_from_fork+0x116/0x1d0 [ 16.450222] ? __pfx_kthread+0x10/0x10 [ 16.450244] ret_from_fork_asm+0x1a/0x30 [ 16.450278] </TASK> [ 16.450288] [ 16.457478] Allocated by task 283: [ 16.457642] kasan_save_stack+0x45/0x70 [ 16.457843] kasan_save_track+0x18/0x40 [ 16.458038] kasan_save_alloc_info+0x3b/0x50 [ 16.458247] __kasan_kmalloc+0xb7/0xc0 [ 16.458448] __kmalloc_cache_noprof+0x189/0x420 [ 16.458761] kasan_atomics+0x95/0x310 [ 16.458911] kunit_try_run_case+0x1a5/0x480 [ 16.459122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.459346] kthread+0x337/0x6f0 [ 16.459516] ret_from_fork+0x116/0x1d0 [ 16.459681] ret_from_fork_asm+0x1a/0x30 [ 16.459867] [ 16.459966] The buggy address belongs to the object at ffff88810394df80 [ 16.459966] which belongs to the cache kmalloc-64 of size 64 [ 16.460448] The buggy address is located 0 bytes to the right of [ 16.460448] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.460971] [ 16.461060] The buggy address belongs to the physical page: [ 16.461292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.461550] flags: 0x200000000000000(node=0|zone=2) [ 16.461936] page_type: f5(slab) [ 16.462144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.462437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.462729] page dumped because: kasan: bad access detected [ 16.462942] [ 16.463036] Memory state around the buggy address: [ 16.463238] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.463532] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.463966] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.464184] ^ [ 16.464342] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.464682] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464996] ================================================================== [ 15.884768] ================================================================== [ 15.885241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.885585] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.885890] [ 15.885998] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.886044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.886058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.886082] Call Trace: [ 15.886098] <TASK> [ 15.886116] dump_stack_lvl+0x73/0xb0 [ 15.886145] print_report+0xd1/0x610 [ 15.886169] ? __virt_addr_valid+0x1db/0x2d0 [ 15.886194] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.886217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.886240] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.886264] kasan_report+0x141/0x180 [ 15.886287] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.886316] kasan_check_range+0x10c/0x1c0 [ 15.886340] __kasan_check_write+0x18/0x20 [ 15.886361] kasan_atomics_helper+0x12e6/0x5450 [ 15.886385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.886419] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.886445] ? kasan_atomics+0x152/0x310 [ 15.886474] kasan_atomics+0x1dc/0x310 [ 15.886498] ? __pfx_kasan_atomics+0x10/0x10 [ 15.886524] ? __pfx_read_tsc+0x10/0x10 [ 15.886546] ? ktime_get_ts64+0x86/0x230 [ 15.886572] kunit_try_run_case+0x1a5/0x480 [ 15.886599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.886648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.886673] ? __kthread_parkme+0x82/0x180 [ 15.886696] ? preempt_count_sub+0x50/0x80 [ 15.886721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.886773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.886808] kthread+0x337/0x6f0 [ 15.886830] ? trace_preempt_on+0x20/0xc0 [ 15.886854] ? __pfx_kthread+0x10/0x10 [ 15.886877] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.886899] ? calculate_sigpending+0x7b/0xa0 [ 15.886925] ? __pfx_kthread+0x10/0x10 [ 15.886947] ret_from_fork+0x116/0x1d0 [ 15.886968] ? __pfx_kthread+0x10/0x10 [ 15.886989] ret_from_fork_asm+0x1a/0x30 [ 15.887023] </TASK> [ 15.887034] [ 15.894821] Allocated by task 283: [ 15.894992] kasan_save_stack+0x45/0x70 [ 15.895137] kasan_save_track+0x18/0x40 [ 15.895271] kasan_save_alloc_info+0x3b/0x50 [ 15.895439] __kasan_kmalloc+0xb7/0xc0 [ 15.895622] __kmalloc_cache_noprof+0x189/0x420 [ 15.895865] kasan_atomics+0x95/0x310 [ 15.896052] kunit_try_run_case+0x1a5/0x480 [ 15.896260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.896442] kthread+0x337/0x6f0 [ 15.896562] ret_from_fork+0x116/0x1d0 [ 15.896754] ret_from_fork_asm+0x1a/0x30 [ 15.896953] [ 15.897074] The buggy address belongs to the object at ffff88810394df80 [ 15.897074] which belongs to the cache kmalloc-64 of size 64 [ 15.897613] The buggy address is located 0 bytes to the right of [ 15.897613] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.898083] [ 15.898160] The buggy address belongs to the physical page: [ 15.898427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.898869] flags: 0x200000000000000(node=0|zone=2) [ 15.899071] page_type: f5(slab) [ 15.899245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.899571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.899887] page dumped because: kasan: bad access detected [ 15.900102] [ 15.900198] Memory state around the buggy address: [ 15.900436] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.900806] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.901085] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.901414] ^ [ 15.901646] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.901969] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.902280] ================================================================== [ 15.744355] ================================================================== [ 15.744888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.745312] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.745832] [ 15.745934] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.745980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.745994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.746125] Call Trace: [ 15.746145] <TASK> [ 15.746163] dump_stack_lvl+0x73/0xb0 [ 15.746195] print_report+0xd1/0x610 [ 15.746219] ? __virt_addr_valid+0x1db/0x2d0 [ 15.746244] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.746267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.746291] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.746314] kasan_report+0x141/0x180 [ 15.746338] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.746367] __asan_report_load4_noabort+0x18/0x20 [ 15.746405] kasan_atomics_helper+0x4a36/0x5450 [ 15.746430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.746454] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.746481] ? kasan_atomics+0x152/0x310 [ 15.746510] kasan_atomics+0x1dc/0x310 [ 15.746535] ? __pfx_kasan_atomics+0x10/0x10 [ 15.746561] ? __pfx_read_tsc+0x10/0x10 [ 15.746583] ? ktime_get_ts64+0x86/0x230 [ 15.746610] kunit_try_run_case+0x1a5/0x480 [ 15.746638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.746663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.746688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.746714] ? __kthread_parkme+0x82/0x180 [ 15.746737] ? preempt_count_sub+0x50/0x80 [ 15.746762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.746789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.746814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.746840] kthread+0x337/0x6f0 [ 15.746861] ? trace_preempt_on+0x20/0xc0 [ 15.746886] ? __pfx_kthread+0x10/0x10 [ 15.746909] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.746933] ? calculate_sigpending+0x7b/0xa0 [ 15.746959] ? __pfx_kthread+0x10/0x10 [ 15.746983] ret_from_fork+0x116/0x1d0 [ 15.747003] ? __pfx_kthread+0x10/0x10 [ 15.747025] ret_from_fork_asm+0x1a/0x30 [ 15.747059] </TASK> [ 15.747071] [ 15.756513] Allocated by task 283: [ 15.756815] kasan_save_stack+0x45/0x70 [ 15.757192] kasan_save_track+0x18/0x40 [ 15.757347] kasan_save_alloc_info+0x3b/0x50 [ 15.757747] __kasan_kmalloc+0xb7/0xc0 [ 15.757943] __kmalloc_cache_noprof+0x189/0x420 [ 15.758162] kasan_atomics+0x95/0x310 [ 15.758339] kunit_try_run_case+0x1a5/0x480 [ 15.758554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.759005] kthread+0x337/0x6f0 [ 15.759161] ret_from_fork+0x116/0x1d0 [ 15.759478] ret_from_fork_asm+0x1a/0x30 [ 15.759771] [ 15.759867] The buggy address belongs to the object at ffff88810394df80 [ 15.759867] which belongs to the cache kmalloc-64 of size 64 [ 15.760512] The buggy address is located 0 bytes to the right of [ 15.760512] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.761239] [ 15.761342] The buggy address belongs to the physical page: [ 15.761541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.762120] flags: 0x200000000000000(node=0|zone=2) [ 15.762460] page_type: f5(slab) [ 15.762592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.763040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.763391] page dumped because: kasan: bad access detected [ 15.763596] [ 15.763769] Memory state around the buggy address: [ 15.764121] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.764413] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.764859] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.765226] ^ [ 15.765439] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.765896] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.766261] ================================================================== [ 16.482823] ================================================================== [ 16.483169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.483620] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.483951] [ 16.484080] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.484123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.484137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.484158] Call Trace: [ 16.484175] <TASK> [ 16.484193] dump_stack_lvl+0x73/0xb0 [ 16.484221] print_report+0xd1/0x610 [ 16.484244] ? __virt_addr_valid+0x1db/0x2d0 [ 16.484268] ? kasan_atomics_helper+0x218a/0x5450 [ 16.484290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.484314] ? kasan_atomics_helper+0x218a/0x5450 [ 16.484336] kasan_report+0x141/0x180 [ 16.484359] ? kasan_atomics_helper+0x218a/0x5450 [ 16.484389] kasan_check_range+0x10c/0x1c0 [ 16.484426] __kasan_check_write+0x18/0x20 [ 16.484447] kasan_atomics_helper+0x218a/0x5450 [ 16.484471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.484495] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.484521] ? kasan_atomics+0x152/0x310 [ 16.484549] kasan_atomics+0x1dc/0x310 [ 16.484573] ? __pfx_kasan_atomics+0x10/0x10 [ 16.484600] ? __pfx_read_tsc+0x10/0x10 [ 16.484623] ? ktime_get_ts64+0x86/0x230 [ 16.484649] kunit_try_run_case+0x1a5/0x480 [ 16.484680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.484704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.484730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.484755] ? __kthread_parkme+0x82/0x180 [ 16.484777] ? preempt_count_sub+0x50/0x80 [ 16.484802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.484829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.484855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.484880] kthread+0x337/0x6f0 [ 16.484901] ? trace_preempt_on+0x20/0xc0 [ 16.484925] ? __pfx_kthread+0x10/0x10 [ 16.484948] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.484971] ? calculate_sigpending+0x7b/0xa0 [ 16.484996] ? __pfx_kthread+0x10/0x10 [ 16.485019] ret_from_fork+0x116/0x1d0 [ 16.485039] ? __pfx_kthread+0x10/0x10 [ 16.485061] ret_from_fork_asm+0x1a/0x30 [ 16.485095] </TASK> [ 16.485106] [ 16.492488] Allocated by task 283: [ 16.492760] kasan_save_stack+0x45/0x70 [ 16.492961] kasan_save_track+0x18/0x40 [ 16.493151] kasan_save_alloc_info+0x3b/0x50 [ 16.493361] __kasan_kmalloc+0xb7/0xc0 [ 16.493558] __kmalloc_cache_noprof+0x189/0x420 [ 16.493782] kasan_atomics+0x95/0x310 [ 16.493970] kunit_try_run_case+0x1a5/0x480 [ 16.494152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.494331] kthread+0x337/0x6f0 [ 16.494465] ret_from_fork+0x116/0x1d0 [ 16.494625] ret_from_fork_asm+0x1a/0x30 [ 16.494831] [ 16.494931] The buggy address belongs to the object at ffff88810394df80 [ 16.494931] which belongs to the cache kmalloc-64 of size 64 [ 16.495477] The buggy address is located 0 bytes to the right of [ 16.495477] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.496100] [ 16.496180] The buggy address belongs to the physical page: [ 16.496421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.496776] flags: 0x200000000000000(node=0|zone=2) [ 16.496992] page_type: f5(slab) [ 16.497116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.497351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.497831] page dumped because: kasan: bad access detected [ 16.498096] [ 16.498193] Memory state around the buggy address: [ 16.498424] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.498763] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.499043] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.499335] ^ [ 16.499536] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.499925] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.500146] ================================================================== [ 15.921289] ================================================================== [ 15.922454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.923091] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.923422] [ 15.923536] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.923582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.923594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.923619] Call Trace: [ 15.923634] <TASK> [ 15.923651] dump_stack_lvl+0x73/0xb0 [ 15.923684] print_report+0xd1/0x610 [ 15.923729] ? __virt_addr_valid+0x1db/0x2d0 [ 15.923754] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.923790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.923828] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.923852] kasan_report+0x141/0x180 [ 15.923877] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.923905] kasan_check_range+0x10c/0x1c0 [ 15.923931] __kasan_check_read+0x15/0x20 [ 15.923951] kasan_atomics_helper+0x13b5/0x5450 [ 15.923975] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.923999] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.924026] ? kasan_atomics+0x152/0x310 [ 15.924055] kasan_atomics+0x1dc/0x310 [ 15.924078] ? __pfx_kasan_atomics+0x10/0x10 [ 15.924104] ? __pfx_read_tsc+0x10/0x10 [ 15.924127] ? ktime_get_ts64+0x86/0x230 [ 15.924153] kunit_try_run_case+0x1a5/0x480 [ 15.924196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.924221] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.924260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.924299] ? __kthread_parkme+0x82/0x180 [ 15.924334] ? preempt_count_sub+0x50/0x80 [ 15.924373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.924409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.924448] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.924488] kthread+0x337/0x6f0 [ 15.924522] ? trace_preempt_on+0x20/0xc0 [ 15.924559] ? __pfx_kthread+0x10/0x10 [ 15.924595] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.924618] ? calculate_sigpending+0x7b/0xa0 [ 15.924657] ? __pfx_kthread+0x10/0x10 [ 15.924698] ret_from_fork+0x116/0x1d0 [ 15.924732] ? __pfx_kthread+0x10/0x10 [ 15.924767] ret_from_fork_asm+0x1a/0x30 [ 15.924802] </TASK> [ 15.924813] [ 15.932809] Allocated by task 283: [ 15.933010] kasan_save_stack+0x45/0x70 [ 15.933181] kasan_save_track+0x18/0x40 [ 15.933374] kasan_save_alloc_info+0x3b/0x50 [ 15.933612] __kasan_kmalloc+0xb7/0xc0 [ 15.933788] __kmalloc_cache_noprof+0x189/0x420 [ 15.934018] kasan_atomics+0x95/0x310 [ 15.934198] kunit_try_run_case+0x1a5/0x480 [ 15.934440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.934699] kthread+0x337/0x6f0 [ 15.934886] ret_from_fork+0x116/0x1d0 [ 15.935039] ret_from_fork_asm+0x1a/0x30 [ 15.935259] [ 15.935338] The buggy address belongs to the object at ffff88810394df80 [ 15.935338] which belongs to the cache kmalloc-64 of size 64 [ 15.935848] The buggy address is located 0 bytes to the right of [ 15.935848] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.936364] [ 15.936476] The buggy address belongs to the physical page: [ 15.936781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.937086] flags: 0x200000000000000(node=0|zone=2) [ 15.937338] page_type: f5(slab) [ 15.937536] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.937947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.938238] page dumped because: kasan: bad access detected [ 15.938520] [ 15.938634] Memory state around the buggy address: [ 15.938851] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.939214] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.939553] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.939808] ^ [ 15.940031] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.940361] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.940710] ================================================================== [ 16.150486] ================================================================== [ 16.151232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.151989] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.152634] [ 16.152812] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.152855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.152868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.152890] Call Trace: [ 16.152908] <TASK> [ 16.152924] dump_stack_lvl+0x73/0xb0 [ 16.152953] print_report+0xd1/0x610 [ 16.152976] ? __virt_addr_valid+0x1db/0x2d0 [ 16.153001] ? kasan_atomics_helper+0x194a/0x5450 [ 16.153025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.153049] ? kasan_atomics_helper+0x194a/0x5450 [ 16.153074] kasan_report+0x141/0x180 [ 16.153097] ? kasan_atomics_helper+0x194a/0x5450 [ 16.153125] kasan_check_range+0x10c/0x1c0 [ 16.153151] __kasan_check_write+0x18/0x20 [ 16.153171] kasan_atomics_helper+0x194a/0x5450 [ 16.153195] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.153219] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.153247] ? kasan_atomics+0x152/0x310 [ 16.153275] kasan_atomics+0x1dc/0x310 [ 16.153300] ? __pfx_kasan_atomics+0x10/0x10 [ 16.153326] ? __pfx_read_tsc+0x10/0x10 [ 16.153348] ? ktime_get_ts64+0x86/0x230 [ 16.153373] kunit_try_run_case+0x1a5/0x480 [ 16.153411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.153436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.153460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.153486] ? __kthread_parkme+0x82/0x180 [ 16.153507] ? preempt_count_sub+0x50/0x80 [ 16.153532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.153558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.153583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.153619] kthread+0x337/0x6f0 [ 16.153641] ? trace_preempt_on+0x20/0xc0 [ 16.153665] ? __pfx_kthread+0x10/0x10 [ 16.153687] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.153710] ? calculate_sigpending+0x7b/0xa0 [ 16.153735] ? __pfx_kthread+0x10/0x10 [ 16.153758] ret_from_fork+0x116/0x1d0 [ 16.153778] ? __pfx_kthread+0x10/0x10 [ 16.153799] ret_from_fork_asm+0x1a/0x30 [ 16.153834] </TASK> [ 16.153844] [ 16.164967] Allocated by task 283: [ 16.165144] kasan_save_stack+0x45/0x70 [ 16.165312] kasan_save_track+0x18/0x40 [ 16.165463] kasan_save_alloc_info+0x3b/0x50 [ 16.165616] __kasan_kmalloc+0xb7/0xc0 [ 16.165887] __kmalloc_cache_noprof+0x189/0x420 [ 16.166119] kasan_atomics+0x95/0x310 [ 16.166316] kunit_try_run_case+0x1a5/0x480 [ 16.166541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.166775] kthread+0x337/0x6f0 [ 16.166935] ret_from_fork+0x116/0x1d0 [ 16.167088] ret_from_fork_asm+0x1a/0x30 [ 16.167293] [ 16.167389] The buggy address belongs to the object at ffff88810394df80 [ 16.167389] which belongs to the cache kmalloc-64 of size 64 [ 16.167901] The buggy address is located 0 bytes to the right of [ 16.167901] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.168381] [ 16.168467] The buggy address belongs to the physical page: [ 16.168676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.169042] flags: 0x200000000000000(node=0|zone=2) [ 16.169280] page_type: f5(slab) [ 16.169451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.169767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.170094] page dumped because: kasan: bad access detected [ 16.170309] [ 16.170382] Memory state around the buggy address: [ 16.170551] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.170771] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.171126] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.171447] ^ [ 16.171667] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.171958] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.172261] ================================================================== [ 15.960560] ================================================================== [ 15.960899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.961437] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.961847] [ 15.961959] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.962003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.962017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.962040] Call Trace: [ 15.962054] <TASK> [ 15.962071] dump_stack_lvl+0x73/0xb0 [ 15.962100] print_report+0xd1/0x610 [ 15.962123] ? __virt_addr_valid+0x1db/0x2d0 [ 15.962150] ? kasan_atomics_helper+0x1467/0x5450 [ 15.962174] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.962198] ? kasan_atomics_helper+0x1467/0x5450 [ 15.962222] kasan_report+0x141/0x180 [ 15.962246] ? kasan_atomics_helper+0x1467/0x5450 [ 15.962297] kasan_check_range+0x10c/0x1c0 [ 15.962323] __kasan_check_write+0x18/0x20 [ 15.962345] kasan_atomics_helper+0x1467/0x5450 [ 15.962386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.962421] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.962447] ? kasan_atomics+0x152/0x310 [ 15.962492] kasan_atomics+0x1dc/0x310 [ 15.962516] ? __pfx_kasan_atomics+0x10/0x10 [ 15.962557] ? __pfx_read_tsc+0x10/0x10 [ 15.962603] ? ktime_get_ts64+0x86/0x230 [ 15.962629] kunit_try_run_case+0x1a5/0x480 [ 15.962656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.962682] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.962707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.962733] ? __kthread_parkme+0x82/0x180 [ 15.962756] ? preempt_count_sub+0x50/0x80 [ 15.962782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.962809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.962835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.962861] kthread+0x337/0x6f0 [ 15.962882] ? trace_preempt_on+0x20/0xc0 [ 15.962908] ? __pfx_kthread+0x10/0x10 [ 15.962931] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.962971] ? calculate_sigpending+0x7b/0xa0 [ 15.962997] ? __pfx_kthread+0x10/0x10 [ 15.963021] ret_from_fork+0x116/0x1d0 [ 15.963041] ? __pfx_kthread+0x10/0x10 [ 15.963079] ret_from_fork_asm+0x1a/0x30 [ 15.963127] </TASK> [ 15.963139] [ 15.971085] Allocated by task 283: [ 15.971224] kasan_save_stack+0x45/0x70 [ 15.971431] kasan_save_track+0x18/0x40 [ 15.971621] kasan_save_alloc_info+0x3b/0x50 [ 15.971837] __kasan_kmalloc+0xb7/0xc0 [ 15.972039] __kmalloc_cache_noprof+0x189/0x420 [ 15.972265] kasan_atomics+0x95/0x310 [ 15.972472] kunit_try_run_case+0x1a5/0x480 [ 15.972698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972992] kthread+0x337/0x6f0 [ 15.973187] ret_from_fork+0x116/0x1d0 [ 15.973417] ret_from_fork_asm+0x1a/0x30 [ 15.973617] [ 15.973717] The buggy address belongs to the object at ffff88810394df80 [ 15.973717] which belongs to the cache kmalloc-64 of size 64 [ 15.974242] The buggy address is located 0 bytes to the right of [ 15.974242] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.974917] [ 15.974993] The buggy address belongs to the physical page: [ 15.975168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.975423] flags: 0x200000000000000(node=0|zone=2) [ 15.975597] page_type: f5(slab) [ 15.975771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.976122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.976474] page dumped because: kasan: bad access detected [ 15.976925] [ 15.977049] Memory state around the buggy address: [ 15.977275] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.977561] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.977877] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.978099] ^ [ 15.978257] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.978490] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.978719] ================================================================== [ 15.941264] ================================================================== [ 15.941747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.941987] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.942462] [ 15.942674] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.942719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.942733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.942755] Call Trace: [ 15.942773] <TASK> [ 15.942790] dump_stack_lvl+0x73/0xb0 [ 15.942820] print_report+0xd1/0x610 [ 15.942842] ? __virt_addr_valid+0x1db/0x2d0 [ 15.942866] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.942889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.942931] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.942955] kasan_report+0x141/0x180 [ 15.942979] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.943008] __asan_report_load8_noabort+0x18/0x20 [ 15.943303] kasan_atomics_helper+0x4eae/0x5450 [ 15.943327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.943351] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.943377] ? kasan_atomics+0x152/0x310 [ 15.943416] kasan_atomics+0x1dc/0x310 [ 15.943441] ? __pfx_kasan_atomics+0x10/0x10 [ 15.943467] ? __pfx_read_tsc+0x10/0x10 [ 15.943489] ? ktime_get_ts64+0x86/0x230 [ 15.943515] kunit_try_run_case+0x1a5/0x480 [ 15.943542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.943566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.943614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.943640] ? __kthread_parkme+0x82/0x180 [ 15.943662] ? preempt_count_sub+0x50/0x80 [ 15.943687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.943714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.943739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.943765] kthread+0x337/0x6f0 [ 15.943785] ? trace_preempt_on+0x20/0xc0 [ 15.943810] ? __pfx_kthread+0x10/0x10 [ 15.943832] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.943856] ? calculate_sigpending+0x7b/0xa0 [ 15.943881] ? __pfx_kthread+0x10/0x10 [ 15.943904] ret_from_fork+0x116/0x1d0 [ 15.943925] ? __pfx_kthread+0x10/0x10 [ 15.943947] ret_from_fork_asm+0x1a/0x30 [ 15.944000] </TASK> [ 15.944012] [ 15.951936] Allocated by task 283: [ 15.952103] kasan_save_stack+0x45/0x70 [ 15.952295] kasan_save_track+0x18/0x40 [ 15.952494] kasan_save_alloc_info+0x3b/0x50 [ 15.952722] __kasan_kmalloc+0xb7/0xc0 [ 15.952893] __kmalloc_cache_noprof+0x189/0x420 [ 15.953108] kasan_atomics+0x95/0x310 [ 15.953273] kunit_try_run_case+0x1a5/0x480 [ 15.953432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.953606] kthread+0x337/0x6f0 [ 15.953726] ret_from_fork+0x116/0x1d0 [ 15.953858] ret_from_fork_asm+0x1a/0x30 [ 15.953997] [ 15.954070] The buggy address belongs to the object at ffff88810394df80 [ 15.954070] which belongs to the cache kmalloc-64 of size 64 [ 15.954479] The buggy address is located 0 bytes to the right of [ 15.954479] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.955143] [ 15.955240] The buggy address belongs to the physical page: [ 15.955505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.955856] flags: 0x200000000000000(node=0|zone=2) [ 15.956085] page_type: f5(slab) [ 15.956251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.956939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.957267] page dumped because: kasan: bad access detected [ 15.957451] [ 15.957523] Memory state around the buggy address: [ 15.957922] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.958239] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.958495] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.959025] ^ [ 15.959255] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.959533] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960021] ================================================================== [ 16.302148] ================================================================== [ 16.302730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.303058] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.303348] [ 16.303465] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.303511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.303525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.303548] Call Trace: [ 16.303565] <TASK> [ 16.303602] dump_stack_lvl+0x73/0xb0 [ 16.303632] print_report+0xd1/0x610 [ 16.303656] ? __virt_addr_valid+0x1db/0x2d0 [ 16.303680] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.303702] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.303726] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.303749] kasan_report+0x141/0x180 [ 16.303773] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.303801] kasan_check_range+0x10c/0x1c0 [ 16.303826] __kasan_check_write+0x18/0x20 [ 16.303847] kasan_atomics_helper+0x1d7a/0x5450 [ 16.303871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.303895] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.303922] ? kasan_atomics+0x152/0x310 [ 16.303951] kasan_atomics+0x1dc/0x310 [ 16.303976] ? __pfx_kasan_atomics+0x10/0x10 [ 16.304002] ? __pfx_read_tsc+0x10/0x10 [ 16.304024] ? ktime_get_ts64+0x86/0x230 [ 16.304051] kunit_try_run_case+0x1a5/0x480 [ 16.304077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.304101] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.304127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.304153] ? __kthread_parkme+0x82/0x180 [ 16.304174] ? preempt_count_sub+0x50/0x80 [ 16.304200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.304225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.304250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.304275] kthread+0x337/0x6f0 [ 16.304295] ? trace_preempt_on+0x20/0xc0 [ 16.304321] ? __pfx_kthread+0x10/0x10 [ 16.304343] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.304366] ? calculate_sigpending+0x7b/0xa0 [ 16.304391] ? __pfx_kthread+0x10/0x10 [ 16.304424] ret_from_fork+0x116/0x1d0 [ 16.304444] ? __pfx_kthread+0x10/0x10 [ 16.304466] ret_from_fork_asm+0x1a/0x30 [ 16.304499] </TASK> [ 16.304511] [ 16.311733] Allocated by task 283: [ 16.311921] kasan_save_stack+0x45/0x70 [ 16.312124] kasan_save_track+0x18/0x40 [ 16.312295] kasan_save_alloc_info+0x3b/0x50 [ 16.312509] __kasan_kmalloc+0xb7/0xc0 [ 16.312704] __kmalloc_cache_noprof+0x189/0x420 [ 16.312926] kasan_atomics+0x95/0x310 [ 16.313114] kunit_try_run_case+0x1a5/0x480 [ 16.313293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.313543] kthread+0x337/0x6f0 [ 16.313699] ret_from_fork+0x116/0x1d0 [ 16.313838] ret_from_fork_asm+0x1a/0x30 [ 16.313985] [ 16.314061] The buggy address belongs to the object at ffff88810394df80 [ 16.314061] which belongs to the cache kmalloc-64 of size 64 [ 16.315188] The buggy address is located 0 bytes to the right of [ 16.315188] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.316756] [ 16.316866] The buggy address belongs to the physical page: [ 16.317136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.317458] flags: 0x200000000000000(node=0|zone=2) [ 16.317990] page_type: f5(slab) [ 16.318148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.318470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.319002] page dumped because: kasan: bad access detected [ 16.319341] [ 16.319455] Memory state around the buggy address: [ 16.319829] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.320147] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.320609] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.321022] ^ [ 16.321339] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.321780] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322103] ================================================================== [ 15.242847] ================================================================== [ 15.243277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.243682] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.244145] [ 15.244338] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.244414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.244429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.244453] Call Trace: [ 15.244469] <TASK> [ 15.244484] dump_stack_lvl+0x73/0xb0 [ 15.244514] print_report+0xd1/0x610 [ 15.244536] ? __virt_addr_valid+0x1db/0x2d0 [ 15.244560] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.244582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.244615] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.244638] kasan_report+0x141/0x180 [ 15.244678] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.244707] __asan_report_load4_noabort+0x18/0x20 [ 15.244744] kasan_atomics_helper+0x4b54/0x5450 [ 15.244768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.244791] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.244817] ? kasan_atomics+0x152/0x310 [ 15.244855] kasan_atomics+0x1dc/0x310 [ 15.244879] ? __pfx_kasan_atomics+0x10/0x10 [ 15.244906] ? __pfx_read_tsc+0x10/0x10 [ 15.244937] ? ktime_get_ts64+0x86/0x230 [ 15.244963] kunit_try_run_case+0x1a5/0x480 [ 15.244990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.245013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.245048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.245073] ? __kthread_parkme+0x82/0x180 [ 15.245095] ? preempt_count_sub+0x50/0x80 [ 15.245145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.245171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.245196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.245221] kthread+0x337/0x6f0 [ 15.245242] ? trace_preempt_on+0x20/0xc0 [ 15.245266] ? __pfx_kthread+0x10/0x10 [ 15.245288] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.245313] ? calculate_sigpending+0x7b/0xa0 [ 15.245338] ? __pfx_kthread+0x10/0x10 [ 15.245362] ret_from_fork+0x116/0x1d0 [ 15.245381] ? __pfx_kthread+0x10/0x10 [ 15.245413] ret_from_fork_asm+0x1a/0x30 [ 15.245446] </TASK> [ 15.245458] [ 15.254507] Allocated by task 283: [ 15.254711] kasan_save_stack+0x45/0x70 [ 15.254887] kasan_save_track+0x18/0x40 [ 15.255129] kasan_save_alloc_info+0x3b/0x50 [ 15.255377] __kasan_kmalloc+0xb7/0xc0 [ 15.255579] __kmalloc_cache_noprof+0x189/0x420 [ 15.255817] kasan_atomics+0x95/0x310 [ 15.256012] kunit_try_run_case+0x1a5/0x480 [ 15.256275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.256484] kthread+0x337/0x6f0 [ 15.256718] ret_from_fork+0x116/0x1d0 [ 15.256919] ret_from_fork_asm+0x1a/0x30 [ 15.257193] [ 15.257301] The buggy address belongs to the object at ffff88810394df80 [ 15.257301] which belongs to the cache kmalloc-64 of size 64 [ 15.257676] The buggy address is located 0 bytes to the right of [ 15.257676] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.258048] [ 15.258124] The buggy address belongs to the physical page: [ 15.258302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.258646] flags: 0x200000000000000(node=0|zone=2) [ 15.259119] page_type: f5(slab) [ 15.259502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.259853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.260190] page dumped because: kasan: bad access detected [ 15.260512] [ 15.260589] Memory state around the buggy address: [ 15.260823] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.261207] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.261553] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.261846] ^ [ 15.262093] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.262431] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.262820] ================================================================== [ 16.131214] ================================================================== [ 16.131571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.131939] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.132406] [ 16.132523] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.132568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.132583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.132606] Call Trace: [ 16.132621] <TASK> [ 16.132637] dump_stack_lvl+0x73/0xb0 [ 16.132672] print_report+0xd1/0x610 [ 16.132696] ? __virt_addr_valid+0x1db/0x2d0 [ 16.132721] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.132744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.132767] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.132791] kasan_report+0x141/0x180 [ 16.132814] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.132842] kasan_check_range+0x10c/0x1c0 [ 16.132867] __kasan_check_write+0x18/0x20 [ 16.132888] kasan_atomics_helper+0x18b1/0x5450 [ 16.132912] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.132936] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.132962] ? kasan_atomics+0x152/0x310 [ 16.132991] kasan_atomics+0x1dc/0x310 [ 16.133014] ? __pfx_kasan_atomics+0x10/0x10 [ 16.133040] ? __pfx_read_tsc+0x10/0x10 [ 16.133061] ? ktime_get_ts64+0x86/0x230 [ 16.133088] kunit_try_run_case+0x1a5/0x480 [ 16.133114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.133138] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.133164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.133189] ? __kthread_parkme+0x82/0x180 [ 16.133210] ? preempt_count_sub+0x50/0x80 [ 16.133236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.133261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.133286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.133311] kthread+0x337/0x6f0 [ 16.133332] ? trace_preempt_on+0x20/0xc0 [ 16.133357] ? __pfx_kthread+0x10/0x10 [ 16.133378] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.133412] ? calculate_sigpending+0x7b/0xa0 [ 16.133436] ? __pfx_kthread+0x10/0x10 [ 16.133460] ret_from_fork+0x116/0x1d0 [ 16.133480] ? __pfx_kthread+0x10/0x10 [ 16.133502] ret_from_fork_asm+0x1a/0x30 [ 16.133536] </TASK> [ 16.133547] [ 16.140953] Allocated by task 283: [ 16.141084] kasan_save_stack+0x45/0x70 [ 16.141227] kasan_save_track+0x18/0x40 [ 16.141365] kasan_save_alloc_info+0x3b/0x50 [ 16.141550] __kasan_kmalloc+0xb7/0xc0 [ 16.141757] __kmalloc_cache_noprof+0x189/0x420 [ 16.141984] kasan_atomics+0x95/0x310 [ 16.142174] kunit_try_run_case+0x1a5/0x480 [ 16.142385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.142673] kthread+0x337/0x6f0 [ 16.142799] ret_from_fork+0x116/0x1d0 [ 16.142935] ret_from_fork_asm+0x1a/0x30 [ 16.143078] [ 16.143153] The buggy address belongs to the object at ffff88810394df80 [ 16.143153] which belongs to the cache kmalloc-64 of size 64 [ 16.143574] The buggy address is located 0 bytes to the right of [ 16.143574] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.144564] [ 16.144746] The buggy address belongs to the physical page: [ 16.145210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.145877] flags: 0x200000000000000(node=0|zone=2) [ 16.146295] page_type: f5(slab) [ 16.146618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.147246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.147971] page dumped because: kasan: bad access detected [ 16.148340] [ 16.148421] Memory state around the buggy address: [ 16.148582] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.148806] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.149026] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.149242] ^ [ 16.149443] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.149664] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.149883] ================================================================== [ 15.555231] ================================================================== [ 15.555664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.555977] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.556589] [ 15.556732] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.556778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.556878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.556951] Call Trace: [ 15.556967] <TASK> [ 15.557019] dump_stack_lvl+0x73/0xb0 [ 15.557052] print_report+0xd1/0x610 [ 15.557122] ? __virt_addr_valid+0x1db/0x2d0 [ 15.557147] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.557170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.557205] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.557229] kasan_report+0x141/0x180 [ 15.557252] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.557280] kasan_check_range+0x10c/0x1c0 [ 15.557305] __kasan_check_write+0x18/0x20 [ 15.557325] kasan_atomics_helper+0xb6a/0x5450 [ 15.557349] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.557373] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.557408] ? kasan_atomics+0x152/0x310 [ 15.557436] kasan_atomics+0x1dc/0x310 [ 15.557508] ? __pfx_kasan_atomics+0x10/0x10 [ 15.557536] ? __pfx_read_tsc+0x10/0x10 [ 15.557569] ? ktime_get_ts64+0x86/0x230 [ 15.557610] kunit_try_run_case+0x1a5/0x480 [ 15.557671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.557695] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.557740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.557766] ? __kthread_parkme+0x82/0x180 [ 15.557788] ? preempt_count_sub+0x50/0x80 [ 15.557824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.557851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.557876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.557901] kthread+0x337/0x6f0 [ 15.557922] ? trace_preempt_on+0x20/0xc0 [ 15.557947] ? __pfx_kthread+0x10/0x10 [ 15.557968] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.557991] ? calculate_sigpending+0x7b/0xa0 [ 15.558016] ? __pfx_kthread+0x10/0x10 [ 15.558039] ret_from_fork+0x116/0x1d0 [ 15.558059] ? __pfx_kthread+0x10/0x10 [ 15.558082] ret_from_fork_asm+0x1a/0x30 [ 15.558114] </TASK> [ 15.558125] [ 15.566958] Allocated by task 283: [ 15.567099] kasan_save_stack+0x45/0x70 [ 15.567349] kasan_save_track+0x18/0x40 [ 15.567560] kasan_save_alloc_info+0x3b/0x50 [ 15.568165] __kasan_kmalloc+0xb7/0xc0 [ 15.568418] __kmalloc_cache_noprof+0x189/0x420 [ 15.568584] kasan_atomics+0x95/0x310 [ 15.568769] kunit_try_run_case+0x1a5/0x480 [ 15.569136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.569517] kthread+0x337/0x6f0 [ 15.569794] ret_from_fork+0x116/0x1d0 [ 15.569942] ret_from_fork_asm+0x1a/0x30 [ 15.570104] [ 15.570206] The buggy address belongs to the object at ffff88810394df80 [ 15.570206] which belongs to the cache kmalloc-64 of size 64 [ 15.571158] The buggy address is located 0 bytes to the right of [ 15.571158] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.571767] [ 15.571892] The buggy address belongs to the physical page: [ 15.572101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.572483] flags: 0x200000000000000(node=0|zone=2) [ 15.572880] page_type: f5(slab) [ 15.573009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.573365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.573843] page dumped because: kasan: bad access detected [ 15.574085] [ 15.574178] Memory state around the buggy address: [ 15.574501] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.574875] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.575242] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.575604] ^ [ 15.575827] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.576128] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.576464] ================================================================== [ 16.048060] ================================================================== [ 16.048459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.049026] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.049351] [ 16.049450] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.049495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.049508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.049531] Call Trace: [ 16.049569] <TASK> [ 16.049586] dump_stack_lvl+0x73/0xb0 [ 16.049618] print_report+0xd1/0x610 [ 16.049641] ? __virt_addr_valid+0x1db/0x2d0 [ 16.049666] ? kasan_atomics_helper+0x164f/0x5450 [ 16.049689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.049713] ? kasan_atomics_helper+0x164f/0x5450 [ 16.049736] kasan_report+0x141/0x180 [ 16.049760] ? kasan_atomics_helper+0x164f/0x5450 [ 16.049788] kasan_check_range+0x10c/0x1c0 [ 16.049814] __kasan_check_write+0x18/0x20 [ 16.049835] kasan_atomics_helper+0x164f/0x5450 [ 16.049859] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.049883] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.049909] ? kasan_atomics+0x152/0x310 [ 16.049956] kasan_atomics+0x1dc/0x310 [ 16.049982] ? __pfx_kasan_atomics+0x10/0x10 [ 16.050008] ? __pfx_read_tsc+0x10/0x10 [ 16.050031] ? ktime_get_ts64+0x86/0x230 [ 16.050058] kunit_try_run_case+0x1a5/0x480 [ 16.050086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.050129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.050169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.050196] ? __kthread_parkme+0x82/0x180 [ 16.050231] ? preempt_count_sub+0x50/0x80 [ 16.050271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.050311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.050350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.050376] kthread+0x337/0x6f0 [ 16.050406] ? trace_preempt_on+0x20/0xc0 [ 16.050433] ? __pfx_kthread+0x10/0x10 [ 16.050456] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.050480] ? calculate_sigpending+0x7b/0xa0 [ 16.050506] ? __pfx_kthread+0x10/0x10 [ 16.050530] ret_from_fork+0x116/0x1d0 [ 16.050550] ? __pfx_kthread+0x10/0x10 [ 16.050572] ret_from_fork_asm+0x1a/0x30 [ 16.050607] </TASK> [ 16.050619] [ 16.058715] Allocated by task 283: [ 16.058916] kasan_save_stack+0x45/0x70 [ 16.059137] kasan_save_track+0x18/0x40 [ 16.059295] kasan_save_alloc_info+0x3b/0x50 [ 16.059459] __kasan_kmalloc+0xb7/0xc0 [ 16.059617] __kmalloc_cache_noprof+0x189/0x420 [ 16.059851] kasan_atomics+0x95/0x310 [ 16.060044] kunit_try_run_case+0x1a5/0x480 [ 16.060252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.060515] kthread+0x337/0x6f0 [ 16.060684] ret_from_fork+0x116/0x1d0 [ 16.060895] ret_from_fork_asm+0x1a/0x30 [ 16.061092] [ 16.061183] The buggy address belongs to the object at ffff88810394df80 [ 16.061183] which belongs to the cache kmalloc-64 of size 64 [ 16.061659] The buggy address is located 0 bytes to the right of [ 16.061659] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.062259] [ 16.062361] The buggy address belongs to the physical page: [ 16.062634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.063011] flags: 0x200000000000000(node=0|zone=2) [ 16.063261] page_type: f5(slab) [ 16.063434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.064019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.064306] page dumped because: kasan: bad access detected [ 16.064492] [ 16.064565] Memory state around the buggy address: [ 16.064801] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.065124] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.065438] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.065840] ^ [ 16.066077] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.066364] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.066686] ================================================================== [ 16.262820] ================================================================== [ 16.263165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.263781] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.264209] [ 16.264339] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.264386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.264411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.264434] Call Trace: [ 16.264451] <TASK> [ 16.264469] dump_stack_lvl+0x73/0xb0 [ 16.264500] print_report+0xd1/0x610 [ 16.264524] ? __virt_addr_valid+0x1db/0x2d0 [ 16.264548] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.264593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.264618] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.264642] kasan_report+0x141/0x180 [ 16.264670] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.264701] __asan_report_load8_noabort+0x18/0x20 [ 16.264727] kasan_atomics_helper+0x4f30/0x5450 [ 16.264751] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.264775] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.264802] ? kasan_atomics+0x152/0x310 [ 16.264830] kasan_atomics+0x1dc/0x310 [ 16.264854] ? __pfx_kasan_atomics+0x10/0x10 [ 16.264880] ? __pfx_read_tsc+0x10/0x10 [ 16.264902] ? ktime_get_ts64+0x86/0x230 [ 16.264930] kunit_try_run_case+0x1a5/0x480 [ 16.264957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.264981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.265007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.265031] ? __kthread_parkme+0x82/0x180 [ 16.265053] ? preempt_count_sub+0x50/0x80 [ 16.265078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.265104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.265128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.265154] kthread+0x337/0x6f0 [ 16.265175] ? trace_preempt_on+0x20/0xc0 [ 16.265199] ? __pfx_kthread+0x10/0x10 [ 16.265221] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.265243] ? calculate_sigpending+0x7b/0xa0 [ 16.265268] ? __pfx_kthread+0x10/0x10 [ 16.265291] ret_from_fork+0x116/0x1d0 [ 16.265311] ? __pfx_kthread+0x10/0x10 [ 16.265333] ret_from_fork_asm+0x1a/0x30 [ 16.265366] </TASK> [ 16.265377] [ 16.272515] Allocated by task 283: [ 16.272715] kasan_save_stack+0x45/0x70 [ 16.272863] kasan_save_track+0x18/0x40 [ 16.273060] kasan_save_alloc_info+0x3b/0x50 [ 16.273279] __kasan_kmalloc+0xb7/0xc0 [ 16.273473] __kmalloc_cache_noprof+0x189/0x420 [ 16.273709] kasan_atomics+0x95/0x310 [ 16.273880] kunit_try_run_case+0x1a5/0x480 [ 16.274065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.274292] kthread+0x337/0x6f0 [ 16.274479] ret_from_fork+0x116/0x1d0 [ 16.274663] ret_from_fork_asm+0x1a/0x30 [ 16.274849] [ 16.274948] The buggy address belongs to the object at ffff88810394df80 [ 16.274948] which belongs to the cache kmalloc-64 of size 64 [ 16.275421] The buggy address is located 0 bytes to the right of [ 16.275421] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.275952] [ 16.276052] The buggy address belongs to the physical page: [ 16.276272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.276622] flags: 0x200000000000000(node=0|zone=2) [ 16.276835] page_type: f5(slab) [ 16.276981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.277283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.277522] page dumped because: kasan: bad access detected [ 16.277723] [ 16.277798] Memory state around the buggy address: [ 16.277955] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278174] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278500] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.278839] ^ [ 16.279065] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.279378] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.279724] ================================================================== [ 16.371259] ================================================================== [ 16.371801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.372177] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.372706] [ 16.372802] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.372952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.373023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.373047] Call Trace: [ 16.373120] <TASK> [ 16.373140] dump_stack_lvl+0x73/0xb0 [ 16.373171] print_report+0xd1/0x610 [ 16.373194] ? __virt_addr_valid+0x1db/0x2d0 [ 16.373219] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.373242] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.373265] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.373288] kasan_report+0x141/0x180 [ 16.373311] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.373340] kasan_check_range+0x10c/0x1c0 [ 16.373365] __kasan_check_write+0x18/0x20 [ 16.373385] kasan_atomics_helper+0x1f43/0x5450 [ 16.373423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.373447] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.373473] ? kasan_atomics+0x152/0x310 [ 16.373502] kasan_atomics+0x1dc/0x310 [ 16.373526] ? __pfx_kasan_atomics+0x10/0x10 [ 16.373552] ? __pfx_read_tsc+0x10/0x10 [ 16.373574] ? ktime_get_ts64+0x86/0x230 [ 16.373612] kunit_try_run_case+0x1a5/0x480 [ 16.373639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.373664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.373691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.373716] ? __kthread_parkme+0x82/0x180 [ 16.373739] ? preempt_count_sub+0x50/0x80 [ 16.373764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.373790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.373815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.373841] kthread+0x337/0x6f0 [ 16.373863] ? trace_preempt_on+0x20/0xc0 [ 16.373887] ? __pfx_kthread+0x10/0x10 [ 16.373909] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.373932] ? calculate_sigpending+0x7b/0xa0 [ 16.373960] ? __pfx_kthread+0x10/0x10 [ 16.373984] ret_from_fork+0x116/0x1d0 [ 16.374004] ? __pfx_kthread+0x10/0x10 [ 16.374026] ret_from_fork_asm+0x1a/0x30 [ 16.374059] </TASK> [ 16.374070] [ 16.383688] Allocated by task 283: [ 16.383989] kasan_save_stack+0x45/0x70 [ 16.384258] kasan_save_track+0x18/0x40 [ 16.384554] kasan_save_alloc_info+0x3b/0x50 [ 16.384826] __kasan_kmalloc+0xb7/0xc0 [ 16.385142] __kmalloc_cache_noprof+0x189/0x420 [ 16.385429] kasan_atomics+0x95/0x310 [ 16.385641] kunit_try_run_case+0x1a5/0x480 [ 16.385834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.386069] kthread+0x337/0x6f0 [ 16.386229] ret_from_fork+0x116/0x1d0 [ 16.386409] ret_from_fork_asm+0x1a/0x30 [ 16.386595] [ 16.387067] The buggy address belongs to the object at ffff88810394df80 [ 16.387067] which belongs to the cache kmalloc-64 of size 64 [ 16.387546] The buggy address is located 0 bytes to the right of [ 16.387546] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.388213] [ 16.388314] The buggy address belongs to the physical page: [ 16.388629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.389118] flags: 0x200000000000000(node=0|zone=2) [ 16.389432] page_type: f5(slab) [ 16.389568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.389997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.390375] page dumped because: kasan: bad access detected [ 16.390736] [ 16.390817] Memory state around the buggy address: [ 16.391041] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.391334] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.391880] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.392190] ^ [ 16.392425] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.392879] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.393238] ================================================================== [ 15.784924] ================================================================== [ 15.785482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.785859] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.786149] [ 15.786249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.786294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.786307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.786330] Call Trace: [ 15.786345] <TASK> [ 15.786361] dump_stack_lvl+0x73/0xb0 [ 15.786390] print_report+0xd1/0x610 [ 15.786425] ? __virt_addr_valid+0x1db/0x2d0 [ 15.786450] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.786471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.786495] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.786519] kasan_report+0x141/0x180 [ 15.786542] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.786572] __asan_report_load4_noabort+0x18/0x20 [ 15.786608] kasan_atomics_helper+0x4a1c/0x5450 [ 15.786633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.786656] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.786683] ? kasan_atomics+0x152/0x310 [ 15.786712] kasan_atomics+0x1dc/0x310 [ 15.786737] ? __pfx_kasan_atomics+0x10/0x10 [ 15.786762] ? __pfx_read_tsc+0x10/0x10 [ 15.786784] ? ktime_get_ts64+0x86/0x230 [ 15.786812] kunit_try_run_case+0x1a5/0x480 [ 15.786840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.786863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.786889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.786914] ? __kthread_parkme+0x82/0x180 [ 15.786936] ? preempt_count_sub+0x50/0x80 [ 15.786961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.786987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.787013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.787038] kthread+0x337/0x6f0 [ 15.787059] ? trace_preempt_on+0x20/0xc0 [ 15.787084] ? __pfx_kthread+0x10/0x10 [ 15.787106] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.787128] ? calculate_sigpending+0x7b/0xa0 [ 15.787154] ? __pfx_kthread+0x10/0x10 [ 15.787178] ret_from_fork+0x116/0x1d0 [ 15.787198] ? __pfx_kthread+0x10/0x10 [ 15.787220] ret_from_fork_asm+0x1a/0x30 [ 15.787254] </TASK> [ 15.787266] [ 15.794439] Allocated by task 283: [ 15.794622] kasan_save_stack+0x45/0x70 [ 15.794823] kasan_save_track+0x18/0x40 [ 15.795017] kasan_save_alloc_info+0x3b/0x50 [ 15.795211] __kasan_kmalloc+0xb7/0xc0 [ 15.795346] __kmalloc_cache_noprof+0x189/0x420 [ 15.795514] kasan_atomics+0x95/0x310 [ 15.795893] kunit_try_run_case+0x1a5/0x480 [ 15.796111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796364] kthread+0x337/0x6f0 [ 15.796516] ret_from_fork+0x116/0x1d0 [ 15.796712] ret_from_fork_asm+0x1a/0x30 [ 15.796913] [ 15.796992] The buggy address belongs to the object at ffff88810394df80 [ 15.796992] which belongs to the cache kmalloc-64 of size 64 [ 15.797468] The buggy address is located 0 bytes to the right of [ 15.797468] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.797988] [ 15.798070] The buggy address belongs to the physical page: [ 15.798306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.798673] flags: 0x200000000000000(node=0|zone=2) [ 15.798878] page_type: f5(slab) [ 15.799027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.799296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.799548] page dumped because: kasan: bad access detected [ 15.799732] [ 15.799805] Memory state around the buggy address: [ 15.799963] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.800183] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.800411] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.800754] ^ [ 15.800979] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.801293] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.801650] ================================================================== [ 15.577357] ================================================================== [ 15.578184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.578956] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.579666] [ 15.579931] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.579978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.579992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.580017] Call Trace: [ 15.580033] <TASK> [ 15.580051] dump_stack_lvl+0x73/0xb0 [ 15.580081] print_report+0xd1/0x610 [ 15.580105] ? __virt_addr_valid+0x1db/0x2d0 [ 15.580129] ? kasan_atomics_helper+0xc70/0x5450 [ 15.580151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.580175] ? kasan_atomics_helper+0xc70/0x5450 [ 15.580198] kasan_report+0x141/0x180 [ 15.580222] ? kasan_atomics_helper+0xc70/0x5450 [ 15.580251] kasan_check_range+0x10c/0x1c0 [ 15.580277] __kasan_check_write+0x18/0x20 [ 15.580297] kasan_atomics_helper+0xc70/0x5450 [ 15.580322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.580346] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.580372] ? kasan_atomics+0x152/0x310 [ 15.580412] kasan_atomics+0x1dc/0x310 [ 15.580453] ? __pfx_kasan_atomics+0x10/0x10 [ 15.580479] ? __pfx_read_tsc+0x10/0x10 [ 15.580501] ? ktime_get_ts64+0x86/0x230 [ 15.580528] kunit_try_run_case+0x1a5/0x480 [ 15.580555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.580579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.580631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.580655] ? __kthread_parkme+0x82/0x180 [ 15.580692] ? preempt_count_sub+0x50/0x80 [ 15.580717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.580746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.580773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.580798] kthread+0x337/0x6f0 [ 15.580820] ? trace_preempt_on+0x20/0xc0 [ 15.580846] ? __pfx_kthread+0x10/0x10 [ 15.580868] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.580891] ? calculate_sigpending+0x7b/0xa0 [ 15.580917] ? __pfx_kthread+0x10/0x10 [ 15.580940] ret_from_fork+0x116/0x1d0 [ 15.580960] ? __pfx_kthread+0x10/0x10 [ 15.580983] ret_from_fork_asm+0x1a/0x30 [ 15.581016] </TASK> [ 15.581027] [ 15.592605] Allocated by task 283: [ 15.592825] kasan_save_stack+0x45/0x70 [ 15.593013] kasan_save_track+0x18/0x40 [ 15.593153] kasan_save_alloc_info+0x3b/0x50 [ 15.593368] __kasan_kmalloc+0xb7/0xc0 [ 15.593604] __kmalloc_cache_noprof+0x189/0x420 [ 15.593854] kasan_atomics+0x95/0x310 [ 15.594020] kunit_try_run_case+0x1a5/0x480 [ 15.594256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.594479] kthread+0x337/0x6f0 [ 15.594732] ret_from_fork+0x116/0x1d0 [ 15.594893] ret_from_fork_asm+0x1a/0x30 [ 15.595100] [ 15.595196] The buggy address belongs to the object at ffff88810394df80 [ 15.595196] which belongs to the cache kmalloc-64 of size 64 [ 15.595594] The buggy address is located 0 bytes to the right of [ 15.595594] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.596041] [ 15.596253] The buggy address belongs to the physical page: [ 15.596530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.596807] flags: 0x200000000000000(node=0|zone=2) [ 15.596981] page_type: f5(slab) [ 15.597209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.597574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.597951] page dumped because: kasan: bad access detected [ 15.598231] [ 15.598321] Memory state around the buggy address: [ 15.598533] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.598888] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.599113] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.599415] ^ [ 15.599696] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.600016] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.600267] ================================================================== [ 16.214330] ================================================================== [ 16.214777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.215498] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.216175] [ 16.216357] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.216415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.216429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.216452] Call Trace: [ 16.216468] <TASK> [ 16.216485] dump_stack_lvl+0x73/0xb0 [ 16.216515] print_report+0xd1/0x610 [ 16.216539] ? __virt_addr_valid+0x1db/0x2d0 [ 16.216565] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.216594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.216617] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.216641] kasan_report+0x141/0x180 [ 16.216670] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.216698] kasan_check_range+0x10c/0x1c0 [ 16.216723] __kasan_check_write+0x18/0x20 [ 16.216744] kasan_atomics_helper+0x1b22/0x5450 [ 16.216768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.216792] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.216818] ? kasan_atomics+0x152/0x310 [ 16.216847] kasan_atomics+0x1dc/0x310 [ 16.216870] ? __pfx_kasan_atomics+0x10/0x10 [ 16.216895] ? __pfx_read_tsc+0x10/0x10 [ 16.216917] ? ktime_get_ts64+0x86/0x230 [ 16.216945] kunit_try_run_case+0x1a5/0x480 [ 16.216973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.217022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.217048] ? __kthread_parkme+0x82/0x180 [ 16.217069] ? preempt_count_sub+0x50/0x80 [ 16.217096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.217122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.217146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.217172] kthread+0x337/0x6f0 [ 16.217194] ? trace_preempt_on+0x20/0xc0 [ 16.217219] ? __pfx_kthread+0x10/0x10 [ 16.217241] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.217264] ? calculate_sigpending+0x7b/0xa0 [ 16.217289] ? __pfx_kthread+0x10/0x10 [ 16.217312] ret_from_fork+0x116/0x1d0 [ 16.217331] ? __pfx_kthread+0x10/0x10 [ 16.217354] ret_from_fork_asm+0x1a/0x30 [ 16.217388] </TASK> [ 16.217450] [ 16.227238] Allocated by task 283: [ 16.227438] kasan_save_stack+0x45/0x70 [ 16.227656] kasan_save_track+0x18/0x40 [ 16.227901] kasan_save_alloc_info+0x3b/0x50 [ 16.228061] __kasan_kmalloc+0xb7/0xc0 [ 16.228258] __kmalloc_cache_noprof+0x189/0x420 [ 16.228540] kasan_atomics+0x95/0x310 [ 16.228744] kunit_try_run_case+0x1a5/0x480 [ 16.229266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.229552] kthread+0x337/0x6f0 [ 16.230181] ret_from_fork+0x116/0x1d0 [ 16.230372] ret_from_fork_asm+0x1a/0x30 [ 16.230624] [ 16.230821] The buggy address belongs to the object at ffff88810394df80 [ 16.230821] which belongs to the cache kmalloc-64 of size 64 [ 16.231320] The buggy address is located 0 bytes to the right of [ 16.231320] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.231972] [ 16.232054] The buggy address belongs to the physical page: [ 16.232314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.232694] flags: 0x200000000000000(node=0|zone=2) [ 16.232988] page_type: f5(slab) [ 16.233183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.233545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.233965] page dumped because: kasan: bad access detected [ 16.234167] [ 16.234278] Memory state around the buggy address: [ 16.234509] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.234891] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.235135] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.235493] ^ [ 16.235671] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.236130] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.236784] ================================================================== [ 15.638159] ================================================================== [ 15.638416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.638972] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.639516] [ 15.639644] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.639690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.639702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.639837] Call Trace: [ 15.639855] <TASK> [ 15.639869] dump_stack_lvl+0x73/0xb0 [ 15.639993] print_report+0xd1/0x610 [ 15.640019] ? __virt_addr_valid+0x1db/0x2d0 [ 15.640043] ? kasan_atomics_helper+0xde0/0x5450 [ 15.640065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.640091] ? kasan_atomics_helper+0xde0/0x5450 [ 15.640114] kasan_report+0x141/0x180 [ 15.640138] ? kasan_atomics_helper+0xde0/0x5450 [ 15.640167] kasan_check_range+0x10c/0x1c0 [ 15.640192] __kasan_check_write+0x18/0x20 [ 15.640213] kasan_atomics_helper+0xde0/0x5450 [ 15.640240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.640614] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.640658] ? kasan_atomics+0x152/0x310 [ 15.640794] kasan_atomics+0x1dc/0x310 [ 15.640910] ? __pfx_kasan_atomics+0x10/0x10 [ 15.640941] ? __pfx_read_tsc+0x10/0x10 [ 15.640965] ? ktime_get_ts64+0x86/0x230 [ 15.640992] kunit_try_run_case+0x1a5/0x480 [ 15.641019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.641043] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.641068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.641094] ? __kthread_parkme+0x82/0x180 [ 15.641116] ? preempt_count_sub+0x50/0x80 [ 15.641143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.641169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.641195] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.641220] kthread+0x337/0x6f0 [ 15.641241] ? trace_preempt_on+0x20/0xc0 [ 15.641266] ? __pfx_kthread+0x10/0x10 [ 15.641289] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.641312] ? calculate_sigpending+0x7b/0xa0 [ 15.641337] ? __pfx_kthread+0x10/0x10 [ 15.641361] ret_from_fork+0x116/0x1d0 [ 15.641381] ? __pfx_kthread+0x10/0x10 [ 15.641411] ret_from_fork_asm+0x1a/0x30 [ 15.641445] </TASK> [ 15.641457] [ 15.658254] Allocated by task 283: [ 15.658900] kasan_save_stack+0x45/0x70 [ 15.659367] kasan_save_track+0x18/0x40 [ 15.659933] kasan_save_alloc_info+0x3b/0x50 [ 15.660385] __kasan_kmalloc+0xb7/0xc0 [ 15.660550] __kmalloc_cache_noprof+0x189/0x420 [ 15.661229] kasan_atomics+0x95/0x310 [ 15.661783] kunit_try_run_case+0x1a5/0x480 [ 15.662204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.662419] kthread+0x337/0x6f0 [ 15.662550] ret_from_fork+0x116/0x1d0 [ 15.663207] ret_from_fork_asm+0x1a/0x30 [ 15.663780] [ 15.664090] The buggy address belongs to the object at ffff88810394df80 [ 15.664090] which belongs to the cache kmalloc-64 of size 64 [ 15.665281] The buggy address is located 0 bytes to the right of [ 15.665281] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.666105] [ 15.666479] The buggy address belongs to the physical page: [ 15.667280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.668012] flags: 0x200000000000000(node=0|zone=2) [ 15.668199] page_type: f5(slab) [ 15.668327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.668577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.668813] page dumped because: kasan: bad access detected [ 15.668990] [ 15.669064] Memory state around the buggy address: [ 15.669223] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.670113] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.670755] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.671106] ^ [ 15.671347] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.671692] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.672026] ================================================================== [ 16.237300] ================================================================== [ 16.237625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.237971] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.238536] [ 16.238631] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.238675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.238688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.238710] Call Trace: [ 16.238727] <TASK> [ 16.238745] dump_stack_lvl+0x73/0xb0 [ 16.238775] print_report+0xd1/0x610 [ 16.238798] ? __virt_addr_valid+0x1db/0x2d0 [ 16.238822] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.238845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.238869] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.238892] kasan_report+0x141/0x180 [ 16.238945] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.238974] kasan_check_range+0x10c/0x1c0 [ 16.239011] __kasan_check_write+0x18/0x20 [ 16.239033] kasan_atomics_helper+0x1c18/0x5450 [ 16.239057] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.239111] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.239138] ? kasan_atomics+0x152/0x310 [ 16.239178] kasan_atomics+0x1dc/0x310 [ 16.239203] ? __pfx_kasan_atomics+0x10/0x10 [ 16.239228] ? __pfx_read_tsc+0x10/0x10 [ 16.239249] ? ktime_get_ts64+0x86/0x230 [ 16.239275] kunit_try_run_case+0x1a5/0x480 [ 16.239302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.239325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.239351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.239376] ? __kthread_parkme+0x82/0x180 [ 16.239406] ? preempt_count_sub+0x50/0x80 [ 16.239431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.239457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.239483] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.239509] kthread+0x337/0x6f0 [ 16.239529] ? trace_preempt_on+0x20/0xc0 [ 16.239554] ? __pfx_kthread+0x10/0x10 [ 16.239576] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.239614] ? calculate_sigpending+0x7b/0xa0 [ 16.239639] ? __pfx_kthread+0x10/0x10 [ 16.239662] ret_from_fork+0x116/0x1d0 [ 16.239683] ? __pfx_kthread+0x10/0x10 [ 16.239704] ret_from_fork_asm+0x1a/0x30 [ 16.239738] </TASK> [ 16.239749] [ 16.252596] Allocated by task 283: [ 16.252744] kasan_save_stack+0x45/0x70 [ 16.252899] kasan_save_track+0x18/0x40 [ 16.253039] kasan_save_alloc_info+0x3b/0x50 [ 16.253193] __kasan_kmalloc+0xb7/0xc0 [ 16.253329] __kmalloc_cache_noprof+0x189/0x420 [ 16.253533] kasan_atomics+0x95/0x310 [ 16.254324] kunit_try_run_case+0x1a5/0x480 [ 16.254719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.254911] kthread+0x337/0x6f0 [ 16.255038] ret_from_fork+0x116/0x1d0 [ 16.255176] ret_from_fork_asm+0x1a/0x30 [ 16.255317] [ 16.255403] The buggy address belongs to the object at ffff88810394df80 [ 16.255403] which belongs to the cache kmalloc-64 of size 64 [ 16.255946] The buggy address is located 0 bytes to the right of [ 16.255946] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.256511] [ 16.257044] The buggy address belongs to the physical page: [ 16.257262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.257814] flags: 0x200000000000000(node=0|zone=2) [ 16.258133] page_type: f5(slab) [ 16.258271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.258769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.259182] page dumped because: kasan: bad access detected [ 16.259417] [ 16.259610] Memory state around the buggy address: [ 16.259946] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.260253] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.260763] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.261071] ^ [ 16.261298] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.261759] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.262152] ================================================================== [ 15.362119] ================================================================== [ 15.362982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.363504] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.363993] [ 15.364186] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.364390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.364469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.364494] Call Trace: [ 15.364512] <TASK> [ 15.364531] dump_stack_lvl+0x73/0xb0 [ 15.364565] print_report+0xd1/0x610 [ 15.364591] ? __virt_addr_valid+0x1db/0x2d0 [ 15.364615] ? kasan_atomics_helper+0x697/0x5450 [ 15.364637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.364662] ? kasan_atomics_helper+0x697/0x5450 [ 15.364691] kasan_report+0x141/0x180 [ 15.364714] ? kasan_atomics_helper+0x697/0x5450 [ 15.364742] kasan_check_range+0x10c/0x1c0 [ 15.364767] __kasan_check_write+0x18/0x20 [ 15.364788] kasan_atomics_helper+0x697/0x5450 [ 15.364812] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.364836] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.364862] ? kasan_atomics+0x152/0x310 [ 15.364891] kasan_atomics+0x1dc/0x310 [ 15.364915] ? __pfx_kasan_atomics+0x10/0x10 [ 15.364941] ? __pfx_read_tsc+0x10/0x10 [ 15.364964] ? ktime_get_ts64+0x86/0x230 [ 15.364993] kunit_try_run_case+0x1a5/0x480 [ 15.365021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.365045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.365082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.365109] ? __kthread_parkme+0x82/0x180 [ 15.365130] ? preempt_count_sub+0x50/0x80 [ 15.365156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.365183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.365208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.365234] kthread+0x337/0x6f0 [ 15.365256] ? trace_preempt_on+0x20/0xc0 [ 15.365281] ? __pfx_kthread+0x10/0x10 [ 15.365303] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.365326] ? calculate_sigpending+0x7b/0xa0 [ 15.365351] ? __pfx_kthread+0x10/0x10 [ 15.365374] ret_from_fork+0x116/0x1d0 [ 15.365404] ? __pfx_kthread+0x10/0x10 [ 15.365427] ret_from_fork_asm+0x1a/0x30 [ 15.365461] </TASK> [ 15.365472] [ 15.377603] Allocated by task 283: [ 15.378118] kasan_save_stack+0x45/0x70 [ 15.378390] kasan_save_track+0x18/0x40 [ 15.378602] kasan_save_alloc_info+0x3b/0x50 [ 15.378981] __kasan_kmalloc+0xb7/0xc0 [ 15.379377] __kmalloc_cache_noprof+0x189/0x420 [ 15.379639] kasan_atomics+0x95/0x310 [ 15.379921] kunit_try_run_case+0x1a5/0x480 [ 15.380096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.380600] kthread+0x337/0x6f0 [ 15.380777] ret_from_fork+0x116/0x1d0 [ 15.381136] ret_from_fork_asm+0x1a/0x30 [ 15.381438] [ 15.381550] The buggy address belongs to the object at ffff88810394df80 [ 15.381550] which belongs to the cache kmalloc-64 of size 64 [ 15.382420] The buggy address is located 0 bytes to the right of [ 15.382420] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.383235] [ 15.383445] The buggy address belongs to the physical page: [ 15.383813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.384287] flags: 0x200000000000000(node=0|zone=2) [ 15.384674] page_type: f5(slab) [ 15.384817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.385469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.385834] page dumped because: kasan: bad access detected [ 15.386317] [ 15.386427] Memory state around the buggy address: [ 15.386781] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.387100] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.387760] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.388222] ^ [ 15.388597] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.388937] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389456] ================================================================== [ 15.390297] ================================================================== [ 15.390868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.391383] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.391972] [ 15.392221] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.392271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.392285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.392309] Call Trace: [ 15.392327] <TASK> [ 15.392482] dump_stack_lvl+0x73/0xb0 [ 15.392517] print_report+0xd1/0x610 [ 15.392541] ? __virt_addr_valid+0x1db/0x2d0 [ 15.392566] ? kasan_atomics_helper+0x72f/0x5450 [ 15.392589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.392612] ? kasan_atomics_helper+0x72f/0x5450 [ 15.392635] kasan_report+0x141/0x180 [ 15.392660] ? kasan_atomics_helper+0x72f/0x5450 [ 15.392697] kasan_check_range+0x10c/0x1c0 [ 15.392723] __kasan_check_write+0x18/0x20 [ 15.392743] kasan_atomics_helper+0x72f/0x5450 [ 15.392767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.392791] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.392817] ? kasan_atomics+0x152/0x310 [ 15.392846] kasan_atomics+0x1dc/0x310 [ 15.392870] ? __pfx_kasan_atomics+0x10/0x10 [ 15.392895] ? __pfx_read_tsc+0x10/0x10 [ 15.392918] ? ktime_get_ts64+0x86/0x230 [ 15.392947] kunit_try_run_case+0x1a5/0x480 [ 15.392975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.392999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.393072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.393100] ? __kthread_parkme+0x82/0x180 [ 15.393123] ? preempt_count_sub+0x50/0x80 [ 15.393149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.393176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.393202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.393227] kthread+0x337/0x6f0 [ 15.393248] ? trace_preempt_on+0x20/0xc0 [ 15.393273] ? __pfx_kthread+0x10/0x10 [ 15.393362] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.393385] ? calculate_sigpending+0x7b/0xa0 [ 15.393419] ? __pfx_kthread+0x10/0x10 [ 15.393442] ret_from_fork+0x116/0x1d0 [ 15.393463] ? __pfx_kthread+0x10/0x10 [ 15.393484] ret_from_fork_asm+0x1a/0x30 [ 15.393518] </TASK> [ 15.393529] [ 15.406059] Allocated by task 283: [ 15.406350] kasan_save_stack+0x45/0x70 [ 15.406830] kasan_save_track+0x18/0x40 [ 15.407014] kasan_save_alloc_info+0x3b/0x50 [ 15.407318] __kasan_kmalloc+0xb7/0xc0 [ 15.407721] __kmalloc_cache_noprof+0x189/0x420 [ 15.408091] kasan_atomics+0x95/0x310 [ 15.408368] kunit_try_run_case+0x1a5/0x480 [ 15.408754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.409000] kthread+0x337/0x6f0 [ 15.409306] ret_from_fork+0x116/0x1d0 [ 15.409517] ret_from_fork_asm+0x1a/0x30 [ 15.409887] [ 15.409995] The buggy address belongs to the object at ffff88810394df80 [ 15.409995] which belongs to the cache kmalloc-64 of size 64 [ 15.410861] The buggy address is located 0 bytes to the right of [ 15.410861] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.411747] [ 15.411865] The buggy address belongs to the physical page: [ 15.412138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.412685] flags: 0x200000000000000(node=0|zone=2) [ 15.412915] page_type: f5(slab) [ 15.413076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.413416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.414008] page dumped because: kasan: bad access detected [ 15.414207] [ 15.414521] Memory state around the buggy address: [ 15.414787] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.415320] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.415813] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.416291] ^ [ 15.416632] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.416951] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.417583] ================================================================== [ 16.067210] ================================================================== [ 16.067552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.067871] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.068263] [ 16.068355] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.068411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.068425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.068446] Call Trace: [ 16.068464] <TASK> [ 16.068481] dump_stack_lvl+0x73/0xb0 [ 16.068510] print_report+0xd1/0x610 [ 16.068554] ? __virt_addr_valid+0x1db/0x2d0 [ 16.068579] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.068611] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.068635] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.068659] kasan_report+0x141/0x180 [ 16.068693] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.068721] kasan_check_range+0x10c/0x1c0 [ 16.068765] __kasan_check_write+0x18/0x20 [ 16.068787] kasan_atomics_helper+0x16e7/0x5450 [ 16.068811] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.068836] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.068879] ? kasan_atomics+0x152/0x310 [ 16.068908] kasan_atomics+0x1dc/0x310 [ 16.068933] ? __pfx_kasan_atomics+0x10/0x10 [ 16.068958] ? __pfx_read_tsc+0x10/0x10 [ 16.068981] ? ktime_get_ts64+0x86/0x230 [ 16.069007] kunit_try_run_case+0x1a5/0x480 [ 16.069050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.069088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.069116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.069143] ? __kthread_parkme+0x82/0x180 [ 16.069166] ? preempt_count_sub+0x50/0x80 [ 16.069225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.069255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.069281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.069308] kthread+0x337/0x6f0 [ 16.069329] ? trace_preempt_on+0x20/0xc0 [ 16.069356] ? __pfx_kthread+0x10/0x10 [ 16.069380] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.069414] ? calculate_sigpending+0x7b/0xa0 [ 16.069558] ? __pfx_kthread+0x10/0x10 [ 16.069592] ret_from_fork+0x116/0x1d0 [ 16.069615] ? __pfx_kthread+0x10/0x10 [ 16.069639] ret_from_fork_asm+0x1a/0x30 [ 16.069673] </TASK> [ 16.069685] [ 16.080763] Allocated by task 283: [ 16.081040] kasan_save_stack+0x45/0x70 [ 16.081206] kasan_save_track+0x18/0x40 [ 16.081418] kasan_save_alloc_info+0x3b/0x50 [ 16.081598] __kasan_kmalloc+0xb7/0xc0 [ 16.082076] __kmalloc_cache_noprof+0x189/0x420 [ 16.082250] kasan_atomics+0x95/0x310 [ 16.082582] kunit_try_run_case+0x1a5/0x480 [ 16.082913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.083221] kthread+0x337/0x6f0 [ 16.083359] ret_from_fork+0x116/0x1d0 [ 16.083709] ret_from_fork_asm+0x1a/0x30 [ 16.084007] [ 16.084089] The buggy address belongs to the object at ffff88810394df80 [ 16.084089] which belongs to the cache kmalloc-64 of size 64 [ 16.084762] The buggy address is located 0 bytes to the right of [ 16.084762] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.085275] [ 16.085366] The buggy address belongs to the physical page: [ 16.085993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.086318] flags: 0x200000000000000(node=0|zone=2) [ 16.086671] page_type: f5(slab) [ 16.086967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.087304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.087775] page dumped because: kasan: bad access detected [ 16.088098] [ 16.088206] Memory state around the buggy address: [ 16.088623] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.088933] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.089315] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.089720] ^ [ 16.090036] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.090419] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.090819] ================================================================== [ 16.280286] ================================================================== [ 16.280851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.281176] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.281419] [ 16.281532] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.281595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.281609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.281631] Call Trace: [ 16.281649] <TASK> [ 16.281665] dump_stack_lvl+0x73/0xb0 [ 16.281695] print_report+0xd1/0x610 [ 16.281720] ? __virt_addr_valid+0x1db/0x2d0 [ 16.281744] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.281766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.281790] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.281814] kasan_report+0x141/0x180 [ 16.281838] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.281866] kasan_check_range+0x10c/0x1c0 [ 16.281892] __kasan_check_write+0x18/0x20 [ 16.281912] kasan_atomics_helper+0x1ce1/0x5450 [ 16.281937] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.281960] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.281986] ? kasan_atomics+0x152/0x310 [ 16.282014] kasan_atomics+0x1dc/0x310 [ 16.282038] ? __pfx_kasan_atomics+0x10/0x10 [ 16.282064] ? __pfx_read_tsc+0x10/0x10 [ 16.282086] ? ktime_get_ts64+0x86/0x230 [ 16.282113] kunit_try_run_case+0x1a5/0x480 [ 16.282141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.282165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.282190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.282215] ? __kthread_parkme+0x82/0x180 [ 16.282236] ? preempt_count_sub+0x50/0x80 [ 16.282261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.282286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.282311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.282336] kthread+0x337/0x6f0 [ 16.282357] ? trace_preempt_on+0x20/0xc0 [ 16.282381] ? __pfx_kthread+0x10/0x10 [ 16.282413] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.282436] ? calculate_sigpending+0x7b/0xa0 [ 16.282461] ? __pfx_kthread+0x10/0x10 [ 16.282484] ret_from_fork+0x116/0x1d0 [ 16.282504] ? __pfx_kthread+0x10/0x10 [ 16.282526] ret_from_fork_asm+0x1a/0x30 [ 16.282560] </TASK> [ 16.282589] [ 16.293966] Allocated by task 283: [ 16.294273] kasan_save_stack+0x45/0x70 [ 16.294695] kasan_save_track+0x18/0x40 [ 16.294896] kasan_save_alloc_info+0x3b/0x50 [ 16.295096] __kasan_kmalloc+0xb7/0xc0 [ 16.295268] __kmalloc_cache_noprof+0x189/0x420 [ 16.295472] kasan_atomics+0x95/0x310 [ 16.295639] kunit_try_run_case+0x1a5/0x480 [ 16.295849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.296111] kthread+0x337/0x6f0 [ 16.296252] ret_from_fork+0x116/0x1d0 [ 16.296416] ret_from_fork_asm+0x1a/0x30 [ 16.296640] [ 16.296747] The buggy address belongs to the object at ffff88810394df80 [ 16.296747] which belongs to the cache kmalloc-64 of size 64 [ 16.297220] The buggy address is located 0 bytes to the right of [ 16.297220] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.297676] [ 16.297759] The buggy address belongs to the physical page: [ 16.298021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.298373] flags: 0x200000000000000(node=0|zone=2) [ 16.298626] page_type: f5(slab) [ 16.298763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.299113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.299404] page dumped because: kasan: bad access detected [ 16.299650] [ 16.299748] Memory state around the buggy address: [ 16.299972] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.300254] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.300544] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.300853] ^ [ 16.301040] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.301261] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.301552] ================================================================== [ 16.393890] ================================================================== [ 16.394970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.395458] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.395762] [ 16.395867] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.395914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.395928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.395951] Call Trace: [ 16.395967] <TASK> [ 16.395985] dump_stack_lvl+0x73/0xb0 [ 16.396016] print_report+0xd1/0x610 [ 16.396040] ? __virt_addr_valid+0x1db/0x2d0 [ 16.396065] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.396087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.396111] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.396134] kasan_report+0x141/0x180 [ 16.396158] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.396187] __asan_report_load8_noabort+0x18/0x20 [ 16.396213] kasan_atomics_helper+0x4f71/0x5450 [ 16.396237] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.396261] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.396287] ? kasan_atomics+0x152/0x310 [ 16.396316] kasan_atomics+0x1dc/0x310 [ 16.396340] ? __pfx_kasan_atomics+0x10/0x10 [ 16.396365] ? __pfx_read_tsc+0x10/0x10 [ 16.396387] ? ktime_get_ts64+0x86/0x230 [ 16.396426] kunit_try_run_case+0x1a5/0x480 [ 16.396453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.396477] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.396503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.396528] ? __kthread_parkme+0x82/0x180 [ 16.396550] ? preempt_count_sub+0x50/0x80 [ 16.396575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.396613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.396639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.396669] kthread+0x337/0x6f0 [ 16.396691] ? trace_preempt_on+0x20/0xc0 [ 16.396716] ? __pfx_kthread+0x10/0x10 [ 16.396739] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.396762] ? calculate_sigpending+0x7b/0xa0 [ 16.396787] ? __pfx_kthread+0x10/0x10 [ 16.396810] ret_from_fork+0x116/0x1d0 [ 16.396830] ? __pfx_kthread+0x10/0x10 [ 16.396852] ret_from_fork_asm+0x1a/0x30 [ 16.396886] </TASK> [ 16.396898] [ 16.404273] Allocated by task 283: [ 16.404442] kasan_save_stack+0x45/0x70 [ 16.404589] kasan_save_track+0x18/0x40 [ 16.404741] kasan_save_alloc_info+0x3b/0x50 [ 16.404942] __kasan_kmalloc+0xb7/0xc0 [ 16.405141] __kmalloc_cache_noprof+0x189/0x420 [ 16.405363] kasan_atomics+0x95/0x310 [ 16.405557] kunit_try_run_case+0x1a5/0x480 [ 16.405766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.405970] kthread+0x337/0x6f0 [ 16.406110] ret_from_fork+0x116/0x1d0 [ 16.406300] ret_from_fork_asm+0x1a/0x30 [ 16.406507] [ 16.406618] The buggy address belongs to the object at ffff88810394df80 [ 16.406618] which belongs to the cache kmalloc-64 of size 64 [ 16.407080] The buggy address is located 0 bytes to the right of [ 16.407080] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.407490] [ 16.407566] The buggy address belongs to the physical page: [ 16.407742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.408002] flags: 0x200000000000000(node=0|zone=2) [ 16.408411] page_type: f5(slab) [ 16.408577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.409117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.409456] page dumped because: kasan: bad access detected [ 16.409738] [ 16.409811] Memory state around the buggy address: [ 16.409966] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.410185] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.410839] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.411166] ^ [ 16.411407] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.411711] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.411928] ================================================================== [ 15.720933] ================================================================== [ 15.721499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.722043] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.722751] [ 15.722857] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.722977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.722994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.723017] Call Trace: [ 15.723033] <TASK> [ 15.723109] dump_stack_lvl+0x73/0xb0 [ 15.723145] print_report+0xd1/0x610 [ 15.723168] ? __virt_addr_valid+0x1db/0x2d0 [ 15.723193] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.723270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.723296] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.723320] kasan_report+0x141/0x180 [ 15.723406] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.723437] kasan_check_range+0x10c/0x1c0 [ 15.723463] __kasan_check_write+0x18/0x20 [ 15.723484] kasan_atomics_helper+0xfa9/0x5450 [ 15.723508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.723532] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.723560] ? kasan_atomics+0x152/0x310 [ 15.723588] kasan_atomics+0x1dc/0x310 [ 15.723612] ? __pfx_kasan_atomics+0x10/0x10 [ 15.723639] ? __pfx_read_tsc+0x10/0x10 [ 15.723661] ? ktime_get_ts64+0x86/0x230 [ 15.723690] kunit_try_run_case+0x1a5/0x480 [ 15.723717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723742] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.723767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.723793] ? __kthread_parkme+0x82/0x180 [ 15.723815] ? preempt_count_sub+0x50/0x80 [ 15.723841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.723893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.723918] kthread+0x337/0x6f0 [ 15.723940] ? trace_preempt_on+0x20/0xc0 [ 15.723964] ? __pfx_kthread+0x10/0x10 [ 15.723987] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.724010] ? calculate_sigpending+0x7b/0xa0 [ 15.724036] ? __pfx_kthread+0x10/0x10 [ 15.724061] ret_from_fork+0x116/0x1d0 [ 15.724081] ? __pfx_kthread+0x10/0x10 [ 15.724104] ret_from_fork_asm+0x1a/0x30 [ 15.724142] </TASK> [ 15.724155] [ 15.733798] Allocated by task 283: [ 15.734216] kasan_save_stack+0x45/0x70 [ 15.734414] kasan_save_track+0x18/0x40 [ 15.734778] kasan_save_alloc_info+0x3b/0x50 [ 15.734990] __kasan_kmalloc+0xb7/0xc0 [ 15.735168] __kmalloc_cache_noprof+0x189/0x420 [ 15.735378] kasan_atomics+0x95/0x310 [ 15.735565] kunit_try_run_case+0x1a5/0x480 [ 15.736017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.736315] kthread+0x337/0x6f0 [ 15.736540] ret_from_fork+0x116/0x1d0 [ 15.736770] ret_from_fork_asm+0x1a/0x30 [ 15.737067] [ 15.737153] The buggy address belongs to the object at ffff88810394df80 [ 15.737153] which belongs to the cache kmalloc-64 of size 64 [ 15.737854] The buggy address is located 0 bytes to the right of [ 15.737854] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.738364] [ 15.738474] The buggy address belongs to the physical page: [ 15.738703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.739282] flags: 0x200000000000000(node=0|zone=2) [ 15.739599] page_type: f5(slab) [ 15.739743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.740169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.740576] page dumped because: kasan: bad access detected [ 15.740927] [ 15.741013] Memory state around the buggy address: [ 15.741311] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.741813] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.742178] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.742556] ^ [ 15.742796] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.743099] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.743410] ================================================================== [ 16.192231] ================================================================== [ 16.192524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.192931] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.193226] [ 16.193342] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.193386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.193410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.193434] Call Trace: [ 16.193452] <TASK> [ 16.193469] dump_stack_lvl+0x73/0xb0 [ 16.193498] print_report+0xd1/0x610 [ 16.193523] ? __virt_addr_valid+0x1db/0x2d0 [ 16.193546] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.193569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.193604] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.193627] kasan_report+0x141/0x180 [ 16.193651] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.193679] kasan_check_range+0x10c/0x1c0 [ 16.193705] __kasan_check_write+0x18/0x20 [ 16.193726] kasan_atomics_helper+0x1a7f/0x5450 [ 16.193750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.193773] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.193799] ? kasan_atomics+0x152/0x310 [ 16.193827] kasan_atomics+0x1dc/0x310 [ 16.193851] ? __pfx_kasan_atomics+0x10/0x10 [ 16.193877] ? __pfx_read_tsc+0x10/0x10 [ 16.193899] ? ktime_get_ts64+0x86/0x230 [ 16.193925] kunit_try_run_case+0x1a5/0x480 [ 16.193951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.193975] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.194001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.194025] ? __kthread_parkme+0x82/0x180 [ 16.194047] ? preempt_count_sub+0x50/0x80 [ 16.194071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.194098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.194123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.194148] kthread+0x337/0x6f0 [ 16.194168] ? trace_preempt_on+0x20/0xc0 [ 16.194193] ? __pfx_kthread+0x10/0x10 [ 16.194215] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.194238] ? calculate_sigpending+0x7b/0xa0 [ 16.194263] ? __pfx_kthread+0x10/0x10 [ 16.194286] ret_from_fork+0x116/0x1d0 [ 16.194305] ? __pfx_kthread+0x10/0x10 [ 16.194327] ret_from_fork_asm+0x1a/0x30 [ 16.194360] </TASK> [ 16.194371] [ 16.201986] Allocated by task 283: [ 16.202146] kasan_save_stack+0x45/0x70 [ 16.202324] kasan_save_track+0x18/0x40 [ 16.202472] kasan_save_alloc_info+0x3b/0x50 [ 16.202813] __kasan_kmalloc+0xb7/0xc0 [ 16.202978] __kmalloc_cache_noprof+0x189/0x420 [ 16.203193] kasan_atomics+0x95/0x310 [ 16.203366] kunit_try_run_case+0x1a5/0x480 [ 16.203576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.203810] kthread+0x337/0x6f0 [ 16.203946] ret_from_fork+0x116/0x1d0 [ 16.204082] ret_from_fork_asm+0x1a/0x30 [ 16.204236] [ 16.204335] The buggy address belongs to the object at ffff88810394df80 [ 16.204335] which belongs to the cache kmalloc-64 of size 64 [ 16.204779] The buggy address is located 0 bytes to the right of [ 16.204779] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.205583] [ 16.205658] The buggy address belongs to the physical page: [ 16.205914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.206211] flags: 0x200000000000000(node=0|zone=2) [ 16.206375] page_type: f5(slab) [ 16.207147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.207534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.208766] page dumped because: kasan: bad access detected [ 16.209446] [ 16.209556] Memory state around the buggy address: [ 16.210528] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.211158] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.211405] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.211758] ^ [ 16.212223] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.212897] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.213543] ================================================================== [ 15.836924] ================================================================== [ 15.837682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.838025] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.838262] [ 15.838354] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.838408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.838421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.838446] Call Trace: [ 15.838462] <TASK> [ 15.838481] dump_stack_lvl+0x73/0xb0 [ 15.838512] print_report+0xd1/0x610 [ 15.838535] ? __virt_addr_valid+0x1db/0x2d0 [ 15.838559] ? kasan_atomics_helper+0x1217/0x5450 [ 15.838582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.838607] ? kasan_atomics_helper+0x1217/0x5450 [ 15.838632] kasan_report+0x141/0x180 [ 15.838656] ? kasan_atomics_helper+0x1217/0x5450 [ 15.838685] kasan_check_range+0x10c/0x1c0 [ 15.838711] __kasan_check_write+0x18/0x20 [ 15.838732] kasan_atomics_helper+0x1217/0x5450 [ 15.838757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.838782] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.838808] ? kasan_atomics+0x152/0x310 [ 15.838837] kasan_atomics+0x1dc/0x310 [ 15.838861] ? __pfx_kasan_atomics+0x10/0x10 [ 15.838887] ? __pfx_read_tsc+0x10/0x10 [ 15.838910] ? ktime_get_ts64+0x86/0x230 [ 15.838939] kunit_try_run_case+0x1a5/0x480 [ 15.838966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.839001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.839027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.839052] ? __kthread_parkme+0x82/0x180 [ 15.839073] ? preempt_count_sub+0x50/0x80 [ 15.839099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.839125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.839150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.839175] kthread+0x337/0x6f0 [ 15.839197] ? trace_preempt_on+0x20/0xc0 [ 15.839222] ? __pfx_kthread+0x10/0x10 [ 15.839245] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.839268] ? calculate_sigpending+0x7b/0xa0 [ 15.839293] ? __pfx_kthread+0x10/0x10 [ 15.839317] ret_from_fork+0x116/0x1d0 [ 15.839336] ? __pfx_kthread+0x10/0x10 [ 15.839358] ret_from_fork_asm+0x1a/0x30 [ 15.839401] </TASK> [ 15.839414] [ 15.847388] Allocated by task 283: [ 15.847530] kasan_save_stack+0x45/0x70 [ 15.847741] kasan_save_track+0x18/0x40 [ 15.847939] kasan_save_alloc_info+0x3b/0x50 [ 15.848162] __kasan_kmalloc+0xb7/0xc0 [ 15.848360] __kmalloc_cache_noprof+0x189/0x420 [ 15.848581] kasan_atomics+0x95/0x310 [ 15.848783] kunit_try_run_case+0x1a5/0x480 [ 15.848964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.849212] kthread+0x337/0x6f0 [ 15.849341] ret_from_fork+0x116/0x1d0 [ 15.849539] ret_from_fork_asm+0x1a/0x30 [ 15.849737] [ 15.849838] The buggy address belongs to the object at ffff88810394df80 [ 15.849838] which belongs to the cache kmalloc-64 of size 64 [ 15.850230] The buggy address is located 0 bytes to the right of [ 15.850230] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.850715] [ 15.850812] The buggy address belongs to the physical page: [ 15.851068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.851405] flags: 0x200000000000000(node=0|zone=2) [ 15.851572] page_type: f5(slab) [ 15.851709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.852056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.852413] page dumped because: kasan: bad access detected [ 15.852689] [ 15.852778] Memory state around the buggy address: [ 15.852969] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.853259] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.853560] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.853838] ^ [ 15.854053] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.854321] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.854564] ================================================================== [ 15.263385] ================================================================== [ 15.263720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.263998] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.264466] [ 15.264589] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.264635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.264649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.264676] Call Trace: [ 15.264692] <TASK> [ 15.264709] dump_stack_lvl+0x73/0xb0 [ 15.264738] print_report+0xd1/0x610 [ 15.264762] ? __virt_addr_valid+0x1db/0x2d0 [ 15.264786] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.264808] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.264832] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.264855] kasan_report+0x141/0x180 [ 15.264879] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.264907] kasan_check_range+0x10c/0x1c0 [ 15.264932] __kasan_check_write+0x18/0x20 [ 15.264952] kasan_atomics_helper+0x4a0/0x5450 [ 15.264976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.264999] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.265026] ? kasan_atomics+0x152/0x310 [ 15.265251] kasan_atomics+0x1dc/0x310 [ 15.265277] ? __pfx_kasan_atomics+0x10/0x10 [ 15.265327] ? __pfx_read_tsc+0x10/0x10 [ 15.265351] ? ktime_get_ts64+0x86/0x230 [ 15.265391] kunit_try_run_case+0x1a5/0x480 [ 15.265427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.265451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.265477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.265502] ? __kthread_parkme+0x82/0x180 [ 15.265523] ? preempt_count_sub+0x50/0x80 [ 15.265549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.265576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.265611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.265636] kthread+0x337/0x6f0 [ 15.265657] ? trace_preempt_on+0x20/0xc0 [ 15.265681] ? __pfx_kthread+0x10/0x10 [ 15.265704] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.265727] ? calculate_sigpending+0x7b/0xa0 [ 15.265753] ? __pfx_kthread+0x10/0x10 [ 15.265776] ret_from_fork+0x116/0x1d0 [ 15.265795] ? __pfx_kthread+0x10/0x10 [ 15.265817] ret_from_fork_asm+0x1a/0x30 [ 15.265851] </TASK> [ 15.265863] [ 15.274617] Allocated by task 283: [ 15.274757] kasan_save_stack+0x45/0x70 [ 15.274908] kasan_save_track+0x18/0x40 [ 15.275047] kasan_save_alloc_info+0x3b/0x50 [ 15.275199] __kasan_kmalloc+0xb7/0xc0 [ 15.275335] __kmalloc_cache_noprof+0x189/0x420 [ 15.275592] kasan_atomics+0x95/0x310 [ 15.275883] kunit_try_run_case+0x1a5/0x480 [ 15.276197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.276464] kthread+0x337/0x6f0 [ 15.276633] ret_from_fork+0x116/0x1d0 [ 15.276825] ret_from_fork_asm+0x1a/0x30 [ 15.277024] [ 15.277122] The buggy address belongs to the object at ffff88810394df80 [ 15.277122] which belongs to the cache kmalloc-64 of size 64 [ 15.277810] The buggy address is located 0 bytes to the right of [ 15.277810] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.278867] [ 15.278959] The buggy address belongs to the physical page: [ 15.279319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.279763] flags: 0x200000000000000(node=0|zone=2) [ 15.279951] page_type: f5(slab) [ 15.280309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.280783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.281026] page dumped because: kasan: bad access detected [ 15.281336] [ 15.281467] Memory state around the buggy address: [ 15.281713] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.281976] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.282373] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.282741] ^ [ 15.282968] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.283321] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283577] ================================================================== [ 15.855104] ================================================================== [ 15.855416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.855808] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.856124] [ 15.856235] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.856280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.856293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.856314] Call Trace: [ 15.856333] <TASK> [ 15.856349] dump_stack_lvl+0x73/0xb0 [ 15.856378] print_report+0xd1/0x610 [ 15.856412] ? __virt_addr_valid+0x1db/0x2d0 [ 15.856437] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.856459] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.856483] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.856507] kasan_report+0x141/0x180 [ 15.856531] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.856560] __asan_report_load4_noabort+0x18/0x20 [ 15.856586] kasan_atomics_helper+0x49e8/0x5450 [ 15.856610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.856633] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.856660] ? kasan_atomics+0x152/0x310 [ 15.856691] kasan_atomics+0x1dc/0x310 [ 15.856716] ? __pfx_kasan_atomics+0x10/0x10 [ 15.856742] ? __pfx_read_tsc+0x10/0x10 [ 15.856763] ? ktime_get_ts64+0x86/0x230 [ 15.856789] kunit_try_run_case+0x1a5/0x480 [ 15.856815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.856839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.856865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.856889] ? __kthread_parkme+0x82/0x180 [ 15.856911] ? preempt_count_sub+0x50/0x80 [ 15.856935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.856961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.856986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.857012] kthread+0x337/0x6f0 [ 15.857032] ? trace_preempt_on+0x20/0xc0 [ 15.857056] ? __pfx_kthread+0x10/0x10 [ 15.857078] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.857101] ? calculate_sigpending+0x7b/0xa0 [ 15.857126] ? __pfx_kthread+0x10/0x10 [ 15.857149] ret_from_fork+0x116/0x1d0 [ 15.857169] ? __pfx_kthread+0x10/0x10 [ 15.857191] ret_from_fork_asm+0x1a/0x30 [ 15.857224] </TASK> [ 15.857235] [ 15.871325] Allocated by task 283: [ 15.871709] kasan_save_stack+0x45/0x70 [ 15.871927] kasan_save_track+0x18/0x40 [ 15.872112] kasan_save_alloc_info+0x3b/0x50 [ 15.872314] __kasan_kmalloc+0xb7/0xc0 [ 15.872502] __kmalloc_cache_noprof+0x189/0x420 [ 15.873051] kasan_atomics+0x95/0x310 [ 15.873380] kunit_try_run_case+0x1a5/0x480 [ 15.873942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.874309] kthread+0x337/0x6f0 [ 15.874691] ret_from_fork+0x116/0x1d0 [ 15.875009] ret_from_fork_asm+0x1a/0x30 [ 15.875348] [ 15.875462] The buggy address belongs to the object at ffff88810394df80 [ 15.875462] which belongs to the cache kmalloc-64 of size 64 [ 15.876513] The buggy address is located 0 bytes to the right of [ 15.876513] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.877348] [ 15.877589] The buggy address belongs to the physical page: [ 15.877994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.878335] flags: 0x200000000000000(node=0|zone=2) [ 15.878569] page_type: f5(slab) [ 15.878734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.879048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.879345] page dumped because: kasan: bad access detected [ 15.880049] [ 15.880290] Memory state around the buggy address: [ 15.880815] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.881248] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.881780] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.882275] ^ [ 15.882714] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.883033] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.883334] ================================================================== [ 16.348173] ================================================================== [ 16.348476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.348950] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.349764] [ 16.349868] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.349986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.350002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.350079] Call Trace: [ 16.350097] <TASK> [ 16.350116] dump_stack_lvl+0x73/0xb0 [ 16.350149] print_report+0xd1/0x610 [ 16.350173] ? __virt_addr_valid+0x1db/0x2d0 [ 16.350197] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.350219] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.350243] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.350266] kasan_report+0x141/0x180 [ 16.350289] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.350319] kasan_check_range+0x10c/0x1c0 [ 16.350344] __kasan_check_write+0x18/0x20 [ 16.350365] kasan_atomics_helper+0x1eaa/0x5450 [ 16.350388] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.350425] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.350452] ? kasan_atomics+0x152/0x310 [ 16.350481] kasan_atomics+0x1dc/0x310 [ 16.350505] ? __pfx_kasan_atomics+0x10/0x10 [ 16.350532] ? __pfx_read_tsc+0x10/0x10 [ 16.350554] ? ktime_get_ts64+0x86/0x230 [ 16.350581] kunit_try_run_case+0x1a5/0x480 [ 16.350607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.350633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.350659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.350684] ? __kthread_parkme+0x82/0x180 [ 16.350705] ? preempt_count_sub+0x50/0x80 [ 16.350731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.350757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.350782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.350808] kthread+0x337/0x6f0 [ 16.350830] ? trace_preempt_on+0x20/0xc0 [ 16.350855] ? __pfx_kthread+0x10/0x10 [ 16.350878] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.350901] ? calculate_sigpending+0x7b/0xa0 [ 16.350926] ? __pfx_kthread+0x10/0x10 [ 16.350949] ret_from_fork+0x116/0x1d0 [ 16.350969] ? __pfx_kthread+0x10/0x10 [ 16.350991] ret_from_fork_asm+0x1a/0x30 [ 16.351024] </TASK> [ 16.351036] [ 16.360956] Allocated by task 283: [ 16.361236] kasan_save_stack+0x45/0x70 [ 16.361530] kasan_save_track+0x18/0x40 [ 16.361719] kasan_save_alloc_info+0x3b/0x50 [ 16.362022] __kasan_kmalloc+0xb7/0xc0 [ 16.362188] __kmalloc_cache_noprof+0x189/0x420 [ 16.362426] kasan_atomics+0x95/0x310 [ 16.362775] kunit_try_run_case+0x1a5/0x480 [ 16.363031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.363332] kthread+0x337/0x6f0 [ 16.363477] ret_from_fork+0x116/0x1d0 [ 16.363757] ret_from_fork_asm+0x1a/0x30 [ 16.364116] [ 16.364222] The buggy address belongs to the object at ffff88810394df80 [ 16.364222] which belongs to the cache kmalloc-64 of size 64 [ 16.364911] The buggy address is located 0 bytes to the right of [ 16.364911] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.365542] [ 16.365763] The buggy address belongs to the physical page: [ 16.366082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.366410] flags: 0x200000000000000(node=0|zone=2) [ 16.366760] page_type: f5(slab) [ 16.366900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.367250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.367568] page dumped because: kasan: bad access detected [ 16.368093] [ 16.368191] Memory state around the buggy address: [ 16.368461] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.368854] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.369235] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.369541] ^ [ 16.369889] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.370264] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.370596] ================================================================== [ 16.430541] ================================================================== [ 16.431129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.431533] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.431771] [ 16.431923] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.431971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.431985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.432009] Call Trace: [ 16.432023] <TASK> [ 16.432040] dump_stack_lvl+0x73/0xb0 [ 16.432069] print_report+0xd1/0x610 [ 16.432093] ? __virt_addr_valid+0x1db/0x2d0 [ 16.432117] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.432138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.432163] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.432186] kasan_report+0x141/0x180 [ 16.432209] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.432238] __asan_report_load8_noabort+0x18/0x20 [ 16.432263] kasan_atomics_helper+0x4f98/0x5450 [ 16.432287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.432311] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.432337] ? kasan_atomics+0x152/0x310 [ 16.432365] kasan_atomics+0x1dc/0x310 [ 16.432390] ? __pfx_kasan_atomics+0x10/0x10 [ 16.432427] ? __pfx_read_tsc+0x10/0x10 [ 16.432450] ? ktime_get_ts64+0x86/0x230 [ 16.432475] kunit_try_run_case+0x1a5/0x480 [ 16.432502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.432526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.432552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.432578] ? __kthread_parkme+0x82/0x180 [ 16.432609] ? preempt_count_sub+0x50/0x80 [ 16.432635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.432662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.432693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.432718] kthread+0x337/0x6f0 [ 16.432739] ? trace_preempt_on+0x20/0xc0 [ 16.432764] ? __pfx_kthread+0x10/0x10 [ 16.432786] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.432810] ? calculate_sigpending+0x7b/0xa0 [ 16.432835] ? __pfx_kthread+0x10/0x10 [ 16.432858] ret_from_fork+0x116/0x1d0 [ 16.432878] ? __pfx_kthread+0x10/0x10 [ 16.432900] ret_from_fork_asm+0x1a/0x30 [ 16.432933] </TASK> [ 16.432945] [ 16.440164] Allocated by task 283: [ 16.440343] kasan_save_stack+0x45/0x70 [ 16.440518] kasan_save_track+0x18/0x40 [ 16.440803] kasan_save_alloc_info+0x3b/0x50 [ 16.440971] __kasan_kmalloc+0xb7/0xc0 [ 16.441110] __kmalloc_cache_noprof+0x189/0x420 [ 16.441269] kasan_atomics+0x95/0x310 [ 16.441416] kunit_try_run_case+0x1a5/0x480 [ 16.441582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.441845] kthread+0x337/0x6f0 [ 16.442019] ret_from_fork+0x116/0x1d0 [ 16.442212] ret_from_fork_asm+0x1a/0x30 [ 16.442420] [ 16.442517] The buggy address belongs to the object at ffff88810394df80 [ 16.442517] which belongs to the cache kmalloc-64 of size 64 [ 16.443161] The buggy address is located 0 bytes to the right of [ 16.443161] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.443649] [ 16.443749] The buggy address belongs to the physical page: [ 16.444003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.444296] flags: 0x200000000000000(node=0|zone=2) [ 16.444515] page_type: f5(slab) [ 16.444792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.445102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.445384] page dumped because: kasan: bad access detected [ 16.445654] [ 16.445737] Memory state around the buggy address: [ 16.445947] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.446235] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.446541] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.446820] ^ [ 16.447021] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.447325] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.447613] ================================================================== [ 15.221552] ================================================================== [ 15.221961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.222499] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.222910] [ 15.223002] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.223046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.223060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.223083] Call Trace: [ 15.223099] <TASK> [ 15.223117] dump_stack_lvl+0x73/0xb0 [ 15.223147] print_report+0xd1/0x610 [ 15.223171] ? __virt_addr_valid+0x1db/0x2d0 [ 15.223195] ? kasan_atomics_helper+0x3df/0x5450 [ 15.223217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.223240] ? kasan_atomics_helper+0x3df/0x5450 [ 15.223264] kasan_report+0x141/0x180 [ 15.223288] ? kasan_atomics_helper+0x3df/0x5450 [ 15.223329] kasan_check_range+0x10c/0x1c0 [ 15.223354] __kasan_check_read+0x15/0x20 [ 15.223375] kasan_atomics_helper+0x3df/0x5450 [ 15.223407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.223431] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.223458] ? kasan_atomics+0x152/0x310 [ 15.223486] kasan_atomics+0x1dc/0x310 [ 15.223511] ? __pfx_kasan_atomics+0x10/0x10 [ 15.223536] ? __pfx_read_tsc+0x10/0x10 [ 15.223558] ? ktime_get_ts64+0x86/0x230 [ 15.223584] kunit_try_run_case+0x1a5/0x480 [ 15.223693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.223721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.223759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.223786] ? __kthread_parkme+0x82/0x180 [ 15.223808] ? preempt_count_sub+0x50/0x80 [ 15.223856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.223882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.223919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.223946] kthread+0x337/0x6f0 [ 15.223968] ? trace_preempt_on+0x20/0xc0 [ 15.223993] ? __pfx_kthread+0x10/0x10 [ 15.224015] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.224038] ? calculate_sigpending+0x7b/0xa0 [ 15.224064] ? __pfx_kthread+0x10/0x10 [ 15.224128] ret_from_fork+0x116/0x1d0 [ 15.224151] ? __pfx_kthread+0x10/0x10 [ 15.224173] ret_from_fork_asm+0x1a/0x30 [ 15.224206] </TASK> [ 15.224218] [ 15.233180] Allocated by task 283: [ 15.233374] kasan_save_stack+0x45/0x70 [ 15.233589] kasan_save_track+0x18/0x40 [ 15.233781] kasan_save_alloc_info+0x3b/0x50 [ 15.233962] __kasan_kmalloc+0xb7/0xc0 [ 15.234219] __kmalloc_cache_noprof+0x189/0x420 [ 15.234385] kasan_atomics+0x95/0x310 [ 15.234534] kunit_try_run_case+0x1a5/0x480 [ 15.234720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.235143] kthread+0x337/0x6f0 [ 15.235313] ret_from_fork+0x116/0x1d0 [ 15.235556] ret_from_fork_asm+0x1a/0x30 [ 15.235698] [ 15.235772] The buggy address belongs to the object at ffff88810394df80 [ 15.235772] which belongs to the cache kmalloc-64 of size 64 [ 15.236605] The buggy address is located 0 bytes to the right of [ 15.236605] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.237173] [ 15.237277] The buggy address belongs to the physical page: [ 15.237760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.238260] flags: 0x200000000000000(node=0|zone=2) [ 15.238519] page_type: f5(slab) [ 15.238701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.239038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.239517] page dumped because: kasan: bad access detected [ 15.239815] [ 15.239891] Memory state around the buggy address: [ 15.240053] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.240276] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.240661] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.241101] ^ [ 15.241409] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.241868] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.242240] ================================================================== [ 15.485056] ================================================================== [ 15.485355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.485643] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.485975] [ 15.486083] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.486159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.486172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.486195] Call Trace: [ 15.486211] <TASK> [ 15.486227] dump_stack_lvl+0x73/0xb0 [ 15.486257] print_report+0xd1/0x610 [ 15.486312] ? __virt_addr_valid+0x1db/0x2d0 [ 15.486338] ? kasan_atomics_helper+0x992/0x5450 [ 15.486361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.486385] ? kasan_atomics_helper+0x992/0x5450 [ 15.486421] kasan_report+0x141/0x180 [ 15.486445] ? kasan_atomics_helper+0x992/0x5450 [ 15.486473] kasan_check_range+0x10c/0x1c0 [ 15.486498] __kasan_check_write+0x18/0x20 [ 15.486519] kasan_atomics_helper+0x992/0x5450 [ 15.486572] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.486620] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.486693] ? kasan_atomics+0x152/0x310 [ 15.486745] kasan_atomics+0x1dc/0x310 [ 15.486814] ? __pfx_kasan_atomics+0x10/0x10 [ 15.486885] ? __pfx_read_tsc+0x10/0x10 [ 15.486952] ? ktime_get_ts64+0x86/0x230 [ 15.487026] kunit_try_run_case+0x1a5/0x480 [ 15.487099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.487169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.487217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.487261] ? __kthread_parkme+0x82/0x180 [ 15.487283] ? preempt_count_sub+0x50/0x80 [ 15.487308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.487333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.487357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.487382] kthread+0x337/0x6f0 [ 15.487412] ? trace_preempt_on+0x20/0xc0 [ 15.487436] ? __pfx_kthread+0x10/0x10 [ 15.487458] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.487481] ? calculate_sigpending+0x7b/0xa0 [ 15.487506] ? __pfx_kthread+0x10/0x10 [ 15.487530] ret_from_fork+0x116/0x1d0 [ 15.487549] ? __pfx_kthread+0x10/0x10 [ 15.487571] ret_from_fork_asm+0x1a/0x30 [ 15.487604] </TASK> [ 15.487617] [ 15.496384] Allocated by task 283: [ 15.496575] kasan_save_stack+0x45/0x70 [ 15.496775] kasan_save_track+0x18/0x40 [ 15.496919] kasan_save_alloc_info+0x3b/0x50 [ 15.497730] __kasan_kmalloc+0xb7/0xc0 [ 15.498164] __kmalloc_cache_noprof+0x189/0x420 [ 15.498599] kasan_atomics+0x95/0x310 [ 15.498779] kunit_try_run_case+0x1a5/0x480 [ 15.498935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.500963] kthread+0x337/0x6f0 [ 15.501252] ret_from_fork+0x116/0x1d0 [ 15.501867] ret_from_fork_asm+0x1a/0x30 [ 15.502651] [ 15.502921] The buggy address belongs to the object at ffff88810394df80 [ 15.502921] which belongs to the cache kmalloc-64 of size 64 [ 15.504341] The buggy address is located 0 bytes to the right of [ 15.504341] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.505465] [ 15.505760] The buggy address belongs to the physical page: [ 15.506456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.507133] flags: 0x200000000000000(node=0|zone=2) [ 15.507471] page_type: f5(slab) [ 15.507664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.507975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.508911] page dumped because: kasan: bad access detected [ 15.509578] [ 15.509755] Memory state around the buggy address: [ 15.510159] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.510851] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.511524] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.511946] ^ [ 15.512427] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.513069] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.513573] ================================================================== [ 15.902763] ================================================================== [ 15.903167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.903512] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.903893] [ 15.903986] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.904049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.904063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.904086] Call Trace: [ 15.904101] <TASK> [ 15.904119] dump_stack_lvl+0x73/0xb0 [ 15.904148] print_report+0xd1/0x610 [ 15.904171] ? __virt_addr_valid+0x1db/0x2d0 [ 15.904194] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.904217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.904258] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.904282] kasan_report+0x141/0x180 [ 15.904305] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.904334] __asan_report_load4_noabort+0x18/0x20 [ 15.904359] kasan_atomics_helper+0x49ce/0x5450 [ 15.904385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.904419] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.904464] ? kasan_atomics+0x152/0x310 [ 15.904492] kasan_atomics+0x1dc/0x310 [ 15.904516] ? __pfx_kasan_atomics+0x10/0x10 [ 15.904543] ? __pfx_read_tsc+0x10/0x10 [ 15.904564] ? ktime_get_ts64+0x86/0x230 [ 15.904591] kunit_try_run_case+0x1a5/0x480 [ 15.904616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.904656] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.904685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.904710] ? __kthread_parkme+0x82/0x180 [ 15.904732] ? preempt_count_sub+0x50/0x80 [ 15.904756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.904783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.904808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.904851] kthread+0x337/0x6f0 [ 15.904871] ? trace_preempt_on+0x20/0xc0 [ 15.904896] ? __pfx_kthread+0x10/0x10 [ 15.904919] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.904943] ? calculate_sigpending+0x7b/0xa0 [ 15.904968] ? __pfx_kthread+0x10/0x10 [ 15.904992] ret_from_fork+0x116/0x1d0 [ 15.905027] ? __pfx_kthread+0x10/0x10 [ 15.905050] ret_from_fork_asm+0x1a/0x30 [ 15.905097] </TASK> [ 15.905120] [ 15.912675] Allocated by task 283: [ 15.912873] kasan_save_stack+0x45/0x70 [ 15.913048] kasan_save_track+0x18/0x40 [ 15.913242] kasan_save_alloc_info+0x3b/0x50 [ 15.913477] __kasan_kmalloc+0xb7/0xc0 [ 15.913662] __kmalloc_cache_noprof+0x189/0x420 [ 15.913899] kasan_atomics+0x95/0x310 [ 15.914084] kunit_try_run_case+0x1a5/0x480 [ 15.914253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.914497] kthread+0x337/0x6f0 [ 15.914758] ret_from_fork+0x116/0x1d0 [ 15.914936] ret_from_fork_asm+0x1a/0x30 [ 15.915078] [ 15.915193] The buggy address belongs to the object at ffff88810394df80 [ 15.915193] which belongs to the cache kmalloc-64 of size 64 [ 15.915761] The buggy address is located 0 bytes to the right of [ 15.915761] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.916279] [ 15.916369] The buggy address belongs to the physical page: [ 15.916614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.916973] flags: 0x200000000000000(node=0|zone=2) [ 15.917200] page_type: f5(slab) [ 15.917364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.917767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.918060] page dumped because: kasan: bad access detected [ 15.918318] [ 15.918409] Memory state around the buggy address: [ 15.918598] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.918922] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.919239] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.919571] ^ [ 15.919794] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.920104] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920437] ================================================================== [ 16.547638] ================================================================== [ 16.547975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.548449] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.548885] [ 16.549001] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.549058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.549072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.549095] Call Trace: [ 16.549110] <TASK> [ 16.549126] dump_stack_lvl+0x73/0xb0 [ 16.549156] print_report+0xd1/0x610 [ 16.549179] ? __virt_addr_valid+0x1db/0x2d0 [ 16.549205] ? kasan_atomics_helper+0x5115/0x5450 [ 16.549228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.549251] ? kasan_atomics_helper+0x5115/0x5450 [ 16.549274] kasan_report+0x141/0x180 [ 16.549298] ? kasan_atomics_helper+0x5115/0x5450 [ 16.549327] __asan_report_load8_noabort+0x18/0x20 [ 16.549352] kasan_atomics_helper+0x5115/0x5450 [ 16.549377] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.549412] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.549438] ? kasan_atomics+0x152/0x310 [ 16.549489] kasan_atomics+0x1dc/0x310 [ 16.549516] ? __pfx_kasan_atomics+0x10/0x10 [ 16.549542] ? __pfx_read_tsc+0x10/0x10 [ 16.549565] ? ktime_get_ts64+0x86/0x230 [ 16.549600] kunit_try_run_case+0x1a5/0x480 [ 16.549626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.549650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.549694] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.549719] ? __kthread_parkme+0x82/0x180 [ 16.549741] ? preempt_count_sub+0x50/0x80 [ 16.549767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.549793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.549818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.549843] kthread+0x337/0x6f0 [ 16.549864] ? trace_preempt_on+0x20/0xc0 [ 16.549907] ? __pfx_kthread+0x10/0x10 [ 16.549929] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.549952] ? calculate_sigpending+0x7b/0xa0 [ 16.549977] ? __pfx_kthread+0x10/0x10 [ 16.550000] ret_from_fork+0x116/0x1d0 [ 16.550020] ? __pfx_kthread+0x10/0x10 [ 16.550059] ret_from_fork_asm+0x1a/0x30 [ 16.550095] </TASK> [ 16.550108] [ 16.557730] Allocated by task 283: [ 16.557933] kasan_save_stack+0x45/0x70 [ 16.558116] kasan_save_track+0x18/0x40 [ 16.558250] kasan_save_alloc_info+0x3b/0x50 [ 16.558408] __kasan_kmalloc+0xb7/0xc0 [ 16.558591] __kmalloc_cache_noprof+0x189/0x420 [ 16.558814] kasan_atomics+0x95/0x310 [ 16.559002] kunit_try_run_case+0x1a5/0x480 [ 16.559210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.559489] kthread+0x337/0x6f0 [ 16.559654] ret_from_fork+0x116/0x1d0 [ 16.559850] ret_from_fork_asm+0x1a/0x30 [ 16.560044] [ 16.560116] The buggy address belongs to the object at ffff88810394df80 [ 16.560116] which belongs to the cache kmalloc-64 of size 64 [ 16.560482] The buggy address is located 0 bytes to the right of [ 16.560482] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.561488] [ 16.561584] The buggy address belongs to the physical page: [ 16.561830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.562157] flags: 0x200000000000000(node=0|zone=2) [ 16.562365] page_type: f5(slab) [ 16.562502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.562876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.563208] page dumped because: kasan: bad access detected [ 16.563472] [ 16.563572] Memory state around the buggy address: [ 16.563800] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.564062] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.564385] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.564755] ^ [ 16.564933] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.565270] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.565605] ================================================================== [ 15.191211] ================================================================== [ 15.191995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.192625] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.192999] [ 15.193254] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.193304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.193318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.193341] Call Trace: [ 15.193356] <TASK> [ 15.193373] dump_stack_lvl+0x73/0xb0 [ 15.193415] print_report+0xd1/0x610 [ 15.193439] ? __virt_addr_valid+0x1db/0x2d0 [ 15.193464] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.193486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.193509] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.193533] kasan_report+0x141/0x180 [ 15.193556] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.193584] __asan_report_store4_noabort+0x1b/0x30 [ 15.193610] kasan_atomics_helper+0x4b6e/0x5450 [ 15.193634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.193657] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.193684] ? kasan_atomics+0x152/0x310 [ 15.193713] kasan_atomics+0x1dc/0x310 [ 15.193738] ? __pfx_kasan_atomics+0x10/0x10 [ 15.193765] ? __pfx_read_tsc+0x10/0x10 [ 15.193798] ? ktime_get_ts64+0x86/0x230 [ 15.193826] kunit_try_run_case+0x1a5/0x480 [ 15.193865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.193889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.193914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.193940] ? __kthread_parkme+0x82/0x180 [ 15.193962] ? preempt_count_sub+0x50/0x80 [ 15.193986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.194012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.194037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.194063] kthread+0x337/0x6f0 [ 15.194084] ? trace_preempt_on+0x20/0xc0 [ 15.194108] ? __pfx_kthread+0x10/0x10 [ 15.194131] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.194153] ? calculate_sigpending+0x7b/0xa0 [ 15.194179] ? __pfx_kthread+0x10/0x10 [ 15.194203] ret_from_fork+0x116/0x1d0 [ 15.194223] ? __pfx_kthread+0x10/0x10 [ 15.194245] ret_from_fork_asm+0x1a/0x30 [ 15.194278] </TASK> [ 15.194290] [ 15.208860] Allocated by task 283: [ 15.209292] kasan_save_stack+0x45/0x70 [ 15.209658] kasan_save_track+0x18/0x40 [ 15.209806] kasan_save_alloc_info+0x3b/0x50 [ 15.209960] __kasan_kmalloc+0xb7/0xc0 [ 15.210264] __kmalloc_cache_noprof+0x189/0x420 [ 15.210702] kasan_atomics+0x95/0x310 [ 15.211060] kunit_try_run_case+0x1a5/0x480 [ 15.211702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.212253] kthread+0x337/0x6f0 [ 15.212676] ret_from_fork+0x116/0x1d0 [ 15.213163] ret_from_fork_asm+0x1a/0x30 [ 15.213313] [ 15.213389] The buggy address belongs to the object at ffff88810394df80 [ 15.213389] which belongs to the cache kmalloc-64 of size 64 [ 15.214123] The buggy address is located 0 bytes to the right of [ 15.214123] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.215347] [ 15.215525] The buggy address belongs to the physical page: [ 15.216107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.216707] flags: 0x200000000000000(node=0|zone=2) [ 15.217390] page_type: f5(slab) [ 15.217556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.218240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.218497] page dumped because: kasan: bad access detected [ 15.218732] [ 15.218857] Memory state around the buggy address: [ 15.219063] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.219449] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.219797] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.220174] ^ [ 15.220392] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.220753] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221039] ================================================================== [ 15.158541] ================================================================== [ 15.159174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.159521] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.159745] [ 15.159831] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.159874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.159885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.159907] Call Trace: [ 15.159920] <TASK> [ 15.159934] dump_stack_lvl+0x73/0xb0 [ 15.159962] print_report+0xd1/0x610 [ 15.159983] ? __virt_addr_valid+0x1db/0x2d0 [ 15.160005] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.160026] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.160049] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.160070] kasan_report+0x141/0x180 [ 15.160093] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.160120] __asan_report_load4_noabort+0x18/0x20 [ 15.160144] kasan_atomics_helper+0x4b88/0x5450 [ 15.160166] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.160188] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.160213] ? kasan_atomics+0x152/0x310 [ 15.160240] kasan_atomics+0x1dc/0x310 [ 15.160262] ? __pfx_kasan_atomics+0x10/0x10 [ 15.160287] ? __pfx_read_tsc+0x10/0x10 [ 15.160307] ? ktime_get_ts64+0x86/0x230 [ 15.160332] kunit_try_run_case+0x1a5/0x480 [ 15.160357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.160405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.160429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.160453] ? __kthread_parkme+0x82/0x180 [ 15.160474] ? preempt_count_sub+0x50/0x80 [ 15.160499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.160627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.160654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.160734] kthread+0x337/0x6f0 [ 15.160757] ? trace_preempt_on+0x20/0xc0 [ 15.160782] ? __pfx_kthread+0x10/0x10 [ 15.160822] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.160846] ? calculate_sigpending+0x7b/0xa0 [ 15.160871] ? __pfx_kthread+0x10/0x10 [ 15.160909] ret_from_fork+0x116/0x1d0 [ 15.160942] ? __pfx_kthread+0x10/0x10 [ 15.160977] ret_from_fork_asm+0x1a/0x30 [ 15.161024] </TASK> [ 15.161036] [ 15.175182] Allocated by task 283: [ 15.175327] kasan_save_stack+0x45/0x70 [ 15.175492] kasan_save_track+0x18/0x40 [ 15.175635] kasan_save_alloc_info+0x3b/0x50 [ 15.175788] __kasan_kmalloc+0xb7/0xc0 [ 15.175923] __kmalloc_cache_noprof+0x189/0x420 [ 15.176081] kasan_atomics+0x95/0x310 [ 15.176219] kunit_try_run_case+0x1a5/0x480 [ 15.176368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.176845] kthread+0x337/0x6f0 [ 15.177146] ret_from_fork+0x116/0x1d0 [ 15.177563] ret_from_fork_asm+0x1a/0x30 [ 15.177935] [ 15.178096] The buggy address belongs to the object at ffff88810394df80 [ 15.178096] which belongs to the cache kmalloc-64 of size 64 [ 15.179429] The buggy address is located 0 bytes to the right of [ 15.179429] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.180942] [ 15.181221] The buggy address belongs to the physical page: [ 15.181767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.182530] flags: 0x200000000000000(node=0|zone=2) [ 15.183043] page_type: f5(slab) [ 15.183457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.184368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.185265] page dumped because: kasan: bad access detected [ 15.185809] [ 15.185988] Memory state around the buggy address: [ 15.186647] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.187485] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.187927] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.188421] ^ [ 15.188892] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.189686] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.190370] ================================================================== [ 15.138691] ================================================================== [ 15.139256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.139519] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.139999] [ 15.140142] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.140186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.140197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.140219] Call Trace: [ 15.140233] <TASK> [ 15.140249] dump_stack_lvl+0x73/0xb0 [ 15.140277] print_report+0xd1/0x610 [ 15.140322] ? __virt_addr_valid+0x1db/0x2d0 [ 15.140345] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.140366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.140388] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.140441] kasan_report+0x141/0x180 [ 15.140464] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.140491] __asan_report_store4_noabort+0x1b/0x30 [ 15.140515] kasan_atomics_helper+0x4ba2/0x5450 [ 15.140538] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.140560] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.140585] ? kasan_atomics+0x152/0x310 [ 15.140613] kasan_atomics+0x1dc/0x310 [ 15.140635] ? __pfx_kasan_atomics+0x10/0x10 [ 15.140659] ? __pfx_read_tsc+0x10/0x10 [ 15.140683] ? ktime_get_ts64+0x86/0x230 [ 15.140708] kunit_try_run_case+0x1a5/0x480 [ 15.140732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.140773] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.140797] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.140821] ? __kthread_parkme+0x82/0x180 [ 15.140842] ? preempt_count_sub+0x50/0x80 [ 15.140865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.140890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.140915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.140956] kthread+0x337/0x6f0 [ 15.140975] ? trace_preempt_on+0x20/0xc0 [ 15.141000] ? __pfx_kthread+0x10/0x10 [ 15.141021] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.141061] ? calculate_sigpending+0x7b/0xa0 [ 15.141085] ? __pfx_kthread+0x10/0x10 [ 15.141107] ret_from_fork+0x116/0x1d0 [ 15.141125] ? __pfx_kthread+0x10/0x10 [ 15.141146] ret_from_fork_asm+0x1a/0x30 [ 15.141196] </TASK> [ 15.141206] [ 15.149648] Allocated by task 283: [ 15.149848] kasan_save_stack+0x45/0x70 [ 15.150070] kasan_save_track+0x18/0x40 [ 15.150293] kasan_save_alloc_info+0x3b/0x50 [ 15.150535] __kasan_kmalloc+0xb7/0xc0 [ 15.150690] __kmalloc_cache_noprof+0x189/0x420 [ 15.150943] kasan_atomics+0x95/0x310 [ 15.151163] kunit_try_run_case+0x1a5/0x480 [ 15.151426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.151681] kthread+0x337/0x6f0 [ 15.151807] ret_from_fork+0x116/0x1d0 [ 15.151941] ret_from_fork_asm+0x1a/0x30 [ 15.152083] [ 15.152155] The buggy address belongs to the object at ffff88810394df80 [ 15.152155] which belongs to the cache kmalloc-64 of size 64 [ 15.153003] The buggy address is located 0 bytes to the right of [ 15.153003] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.153491] [ 15.153585] The buggy address belongs to the physical page: [ 15.153787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.154031] flags: 0x200000000000000(node=0|zone=2) [ 15.154195] page_type: f5(slab) [ 15.154317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.154845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.155878] page dumped because: kasan: bad access detected [ 15.156269] [ 15.156339] Memory state around the buggy address: [ 15.156501] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.156717] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.156926] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.157131] ^ [ 15.157282] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.157751] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.158059] ================================================================== [ 15.999139] ================================================================== [ 15.999502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.999870] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.000180] [ 16.000270] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.000312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.000325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.000348] Call Trace: [ 16.000363] <TASK> [ 16.000380] dump_stack_lvl+0x73/0xb0 [ 16.000420] print_report+0xd1/0x610 [ 16.000444] ? __virt_addr_valid+0x1db/0x2d0 [ 16.000468] ? kasan_atomics_helper+0x151d/0x5450 [ 16.000490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.000515] ? kasan_atomics_helper+0x151d/0x5450 [ 16.000538] kasan_report+0x141/0x180 [ 16.000562] ? kasan_atomics_helper+0x151d/0x5450 [ 16.000591] kasan_check_range+0x10c/0x1c0 [ 16.000615] __kasan_check_write+0x18/0x20 [ 16.000637] kasan_atomics_helper+0x151d/0x5450 [ 16.000661] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.000707] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.000734] ? kasan_atomics+0x152/0x310 [ 16.000784] kasan_atomics+0x1dc/0x310 [ 16.000809] ? __pfx_kasan_atomics+0x10/0x10 [ 16.000835] ? __pfx_read_tsc+0x10/0x10 [ 16.000860] ? ktime_get_ts64+0x86/0x230 [ 16.000903] kunit_try_run_case+0x1a5/0x480 [ 16.000931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.000970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.000997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.001037] ? __kthread_parkme+0x82/0x180 [ 16.001072] ? preempt_count_sub+0x50/0x80 [ 16.001112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.001152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.001190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.001230] kthread+0x337/0x6f0 [ 16.001264] ? trace_preempt_on+0x20/0xc0 [ 16.001302] ? __pfx_kthread+0x10/0x10 [ 16.001338] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.001376] ? calculate_sigpending+0x7b/0xa0 [ 16.001425] ? __pfx_kthread+0x10/0x10 [ 16.001463] ret_from_fork+0x116/0x1d0 [ 16.001497] ? __pfx_kthread+0x10/0x10 [ 16.001532] ret_from_fork_asm+0x1a/0x30 [ 16.001580] </TASK> [ 16.001605] [ 16.009803] Allocated by task 283: [ 16.009981] kasan_save_stack+0x45/0x70 [ 16.010180] kasan_save_track+0x18/0x40 [ 16.010344] kasan_save_alloc_info+0x3b/0x50 [ 16.010502] __kasan_kmalloc+0xb7/0xc0 [ 16.010636] __kmalloc_cache_noprof+0x189/0x420 [ 16.010789] kasan_atomics+0x95/0x310 [ 16.010924] kunit_try_run_case+0x1a5/0x480 [ 16.011068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.011514] kthread+0x337/0x6f0 [ 16.011799] ret_from_fork+0x116/0x1d0 [ 16.011989] ret_from_fork_asm+0x1a/0x30 [ 16.012215] [ 16.012345] The buggy address belongs to the object at ffff88810394df80 [ 16.012345] which belongs to the cache kmalloc-64 of size 64 [ 16.013327] The buggy address is located 0 bytes to the right of [ 16.013327] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.013984] [ 16.014059] The buggy address belongs to the physical page: [ 16.014319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.014879] flags: 0x200000000000000(node=0|zone=2) [ 16.015300] page_type: f5(slab) [ 16.015675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.016329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.016578] page dumped because: kasan: bad access detected [ 16.016755] [ 16.016827] Memory state around the buggy address: [ 16.016977] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.017189] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.017412] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.018141] ^ [ 16.018696] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.019590] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.020450] ================================================================== [ 15.766927] ================================================================== [ 15.767293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.767820] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.768288] [ 15.768480] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.768530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.768544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.768568] Call Trace: [ 15.768584] <TASK> [ 15.768601] dump_stack_lvl+0x73/0xb0 [ 15.768632] print_report+0xd1/0x610 [ 15.768655] ? __virt_addr_valid+0x1db/0x2d0 [ 15.768696] ? kasan_atomics_helper+0x1079/0x5450 [ 15.768719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.768743] ? kasan_atomics_helper+0x1079/0x5450 [ 15.768765] kasan_report+0x141/0x180 [ 15.768789] ? kasan_atomics_helper+0x1079/0x5450 [ 15.768818] kasan_check_range+0x10c/0x1c0 [ 15.768843] __kasan_check_write+0x18/0x20 [ 15.768863] kasan_atomics_helper+0x1079/0x5450 [ 15.768887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.768911] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.768936] ? kasan_atomics+0x152/0x310 [ 15.768966] kasan_atomics+0x1dc/0x310 [ 15.768990] ? __pfx_kasan_atomics+0x10/0x10 [ 15.769015] ? __pfx_read_tsc+0x10/0x10 [ 15.769038] ? ktime_get_ts64+0x86/0x230 [ 15.769064] kunit_try_run_case+0x1a5/0x480 [ 15.769090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.769113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.769140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.769165] ? __kthread_parkme+0x82/0x180 [ 15.769187] ? preempt_count_sub+0x50/0x80 [ 15.769213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.769239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.769264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.769290] kthread+0x337/0x6f0 [ 15.769311] ? trace_preempt_on+0x20/0xc0 [ 15.769335] ? __pfx_kthread+0x10/0x10 [ 15.769357] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.769380] ? calculate_sigpending+0x7b/0xa0 [ 15.769418] ? __pfx_kthread+0x10/0x10 [ 15.769441] ret_from_fork+0x116/0x1d0 [ 15.769461] ? __pfx_kthread+0x10/0x10 [ 15.769483] ret_from_fork_asm+0x1a/0x30 [ 15.769517] </TASK> [ 15.769529] [ 15.776602] Allocated by task 283: [ 15.776803] kasan_save_stack+0x45/0x70 [ 15.777007] kasan_save_track+0x18/0x40 [ 15.777203] kasan_save_alloc_info+0x3b/0x50 [ 15.777441] __kasan_kmalloc+0xb7/0xc0 [ 15.777688] __kmalloc_cache_noprof+0x189/0x420 [ 15.777890] kasan_atomics+0x95/0x310 [ 15.778077] kunit_try_run_case+0x1a5/0x480 [ 15.778228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.778494] kthread+0x337/0x6f0 [ 15.778734] ret_from_fork+0x116/0x1d0 [ 15.778890] ret_from_fork_asm+0x1a/0x30 [ 15.779092] [ 15.779169] The buggy address belongs to the object at ffff88810394df80 [ 15.779169] which belongs to the cache kmalloc-64 of size 64 [ 15.779654] The buggy address is located 0 bytes to the right of [ 15.779654] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.780131] [ 15.780230] The buggy address belongs to the physical page: [ 15.780463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.780711] flags: 0x200000000000000(node=0|zone=2) [ 15.780879] page_type: f5(slab) [ 15.781006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.781242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.781579] page dumped because: kasan: bad access detected [ 15.782139] [ 15.782234] Memory state around the buggy address: [ 15.782469] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.782785] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.783099] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.783362] ^ [ 15.783531] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.784197] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.784489] ================================================================== [ 15.979152] ================================================================== [ 15.979670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.980019] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.980379] [ 15.980499] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.980542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.980555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.980576] Call Trace: [ 15.980594] <TASK> [ 15.980612] dump_stack_lvl+0x73/0xb0 [ 15.980642] print_report+0xd1/0x610 [ 15.980669] ? __virt_addr_valid+0x1db/0x2d0 [ 15.980694] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.980731] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.980757] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.980783] kasan_report+0x141/0x180 [ 15.980807] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.980836] __asan_report_store8_noabort+0x1b/0x30 [ 15.980862] kasan_atomics_helper+0x50d4/0x5450 [ 15.980887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.980911] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.980938] ? kasan_atomics+0x152/0x310 [ 15.980967] kasan_atomics+0x1dc/0x310 [ 15.980992] ? __pfx_kasan_atomics+0x10/0x10 [ 15.981018] ? __pfx_read_tsc+0x10/0x10 [ 15.981039] ? ktime_get_ts64+0x86/0x230 [ 15.981066] kunit_try_run_case+0x1a5/0x480 [ 15.981093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.981118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.981143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.981169] ? __kthread_parkme+0x82/0x180 [ 15.981191] ? preempt_count_sub+0x50/0x80 [ 15.981217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.981244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.981269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.981294] kthread+0x337/0x6f0 [ 15.981316] ? trace_preempt_on+0x20/0xc0 [ 15.981340] ? __pfx_kthread+0x10/0x10 [ 15.981363] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.981387] ? calculate_sigpending+0x7b/0xa0 [ 15.981423] ? __pfx_kthread+0x10/0x10 [ 15.981447] ret_from_fork+0x116/0x1d0 [ 15.981467] ? __pfx_kthread+0x10/0x10 [ 15.981489] ret_from_fork_asm+0x1a/0x30 [ 15.981523] </TASK> [ 15.981534] [ 15.989982] Allocated by task 283: [ 15.990198] kasan_save_stack+0x45/0x70 [ 15.990424] kasan_save_track+0x18/0x40 [ 15.990621] kasan_save_alloc_info+0x3b/0x50 [ 15.990833] __kasan_kmalloc+0xb7/0xc0 [ 15.991125] __kmalloc_cache_noprof+0x189/0x420 [ 15.991353] kasan_atomics+0x95/0x310 [ 15.991552] kunit_try_run_case+0x1a5/0x480 [ 15.991719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.991898] kthread+0x337/0x6f0 [ 15.992021] ret_from_fork+0x116/0x1d0 [ 15.992156] ret_from_fork_asm+0x1a/0x30 [ 15.992297] [ 15.992371] The buggy address belongs to the object at ffff88810394df80 [ 15.992371] which belongs to the cache kmalloc-64 of size 64 [ 15.993435] The buggy address is located 0 bytes to the right of [ 15.993435] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.994497] [ 15.994604] The buggy address belongs to the physical page: [ 15.994847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.995185] flags: 0x200000000000000(node=0|zone=2) [ 15.995382] page_type: f5(slab) [ 15.995556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.995930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.996272] page dumped because: kasan: bad access detected [ 15.996530] [ 15.996624] Memory state around the buggy address: [ 15.996876] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.997163] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.997415] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.997626] ^ [ 15.997869] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.998207] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.998536] ================================================================== [ 15.698210] ================================================================== [ 15.698512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.699128] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.699662] [ 15.699784] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.699831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.699844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.699978] Call Trace: [ 15.699997] <TASK> [ 15.700014] dump_stack_lvl+0x73/0xb0 [ 15.700047] print_report+0xd1/0x610 [ 15.700070] ? __virt_addr_valid+0x1db/0x2d0 [ 15.700094] ? kasan_atomics_helper+0xf10/0x5450 [ 15.700116] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.700140] ? kasan_atomics_helper+0xf10/0x5450 [ 15.700163] kasan_report+0x141/0x180 [ 15.700187] ? kasan_atomics_helper+0xf10/0x5450 [ 15.700214] kasan_check_range+0x10c/0x1c0 [ 15.700239] __kasan_check_write+0x18/0x20 [ 15.700260] kasan_atomics_helper+0xf10/0x5450 [ 15.700284] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.700308] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.700334] ? kasan_atomics+0x152/0x310 [ 15.700362] kasan_atomics+0x1dc/0x310 [ 15.700387] ? __pfx_kasan_atomics+0x10/0x10 [ 15.700424] ? __pfx_read_tsc+0x10/0x10 [ 15.700446] ? ktime_get_ts64+0x86/0x230 [ 15.700474] kunit_try_run_case+0x1a5/0x480 [ 15.700502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.700527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.700553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.700601] ? __kthread_parkme+0x82/0x180 [ 15.700623] ? preempt_count_sub+0x50/0x80 [ 15.700649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.700681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.700707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.700732] kthread+0x337/0x6f0 [ 15.700754] ? trace_preempt_on+0x20/0xc0 [ 15.700779] ? __pfx_kthread+0x10/0x10 [ 15.700801] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.700825] ? calculate_sigpending+0x7b/0xa0 [ 15.700850] ? __pfx_kthread+0x10/0x10 [ 15.700874] ret_from_fork+0x116/0x1d0 [ 15.700894] ? __pfx_kthread+0x10/0x10 [ 15.700919] ret_from_fork_asm+0x1a/0x30 [ 15.700956] </TASK> [ 15.700969] [ 15.710820] Allocated by task 283: [ 15.710995] kasan_save_stack+0x45/0x70 [ 15.711188] kasan_save_track+0x18/0x40 [ 15.711360] kasan_save_alloc_info+0x3b/0x50 [ 15.711806] __kasan_kmalloc+0xb7/0xc0 [ 15.711997] __kmalloc_cache_noprof+0x189/0x420 [ 15.712323] kasan_atomics+0x95/0x310 [ 15.712528] kunit_try_run_case+0x1a5/0x480 [ 15.712913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.713220] kthread+0x337/0x6f0 [ 15.713387] ret_from_fork+0x116/0x1d0 [ 15.713665] ret_from_fork_asm+0x1a/0x30 [ 15.713841] [ 15.713944] The buggy address belongs to the object at ffff88810394df80 [ 15.713944] which belongs to the cache kmalloc-64 of size 64 [ 15.714432] The buggy address is located 0 bytes to the right of [ 15.714432] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.715214] [ 15.715388] The buggy address belongs to the physical page: [ 15.715821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.716227] flags: 0x200000000000000(node=0|zone=2) [ 15.716541] page_type: f5(slab) [ 15.716817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.717203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.717541] page dumped because: kasan: bad access detected [ 15.717928] [ 15.718033] Memory state around the buggy address: [ 15.718338] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.718677] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.718975] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.719282] ^ [ 15.719507] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.720008] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720402] ================================================================== [ 16.091515] ================================================================== [ 16.091781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.092697] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.093150] [ 16.093269] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.093385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.093410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.093434] Call Trace: [ 16.093450] <TASK> [ 16.093467] dump_stack_lvl+0x73/0xb0 [ 16.093500] print_report+0xd1/0x610 [ 16.093524] ? __virt_addr_valid+0x1db/0x2d0 [ 16.093549] ? kasan_atomics_helper+0x177f/0x5450 [ 16.093572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.093596] ? kasan_atomics_helper+0x177f/0x5450 [ 16.093620] kasan_report+0x141/0x180 [ 16.093643] ? kasan_atomics_helper+0x177f/0x5450 [ 16.093673] kasan_check_range+0x10c/0x1c0 [ 16.093698] __kasan_check_write+0x18/0x20 [ 16.093719] kasan_atomics_helper+0x177f/0x5450 [ 16.093744] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.093768] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.093794] ? kasan_atomics+0x152/0x310 [ 16.093824] kasan_atomics+0x1dc/0x310 [ 16.093848] ? __pfx_kasan_atomics+0x10/0x10 [ 16.093874] ? __pfx_read_tsc+0x10/0x10 [ 16.093898] ? ktime_get_ts64+0x86/0x230 [ 16.093925] kunit_try_run_case+0x1a5/0x480 [ 16.093953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.093977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.094004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.094030] ? __kthread_parkme+0x82/0x180 [ 16.094052] ? preempt_count_sub+0x50/0x80 [ 16.094077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.094105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.094156] kthread+0x337/0x6f0 [ 16.094177] ? trace_preempt_on+0x20/0xc0 [ 16.094202] ? __pfx_kthread+0x10/0x10 [ 16.094226] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.094251] ? calculate_sigpending+0x7b/0xa0 [ 16.094277] ? __pfx_kthread+0x10/0x10 [ 16.094301] ret_from_fork+0x116/0x1d0 [ 16.094322] ? __pfx_kthread+0x10/0x10 [ 16.094344] ret_from_fork_asm+0x1a/0x30 [ 16.094379] </TASK> [ 16.094391] [ 16.104420] Allocated by task 283: [ 16.104810] kasan_save_stack+0x45/0x70 [ 16.104982] kasan_save_track+0x18/0x40 [ 16.105289] kasan_save_alloc_info+0x3b/0x50 [ 16.105501] __kasan_kmalloc+0xb7/0xc0 [ 16.105759] __kmalloc_cache_noprof+0x189/0x420 [ 16.106086] kasan_atomics+0x95/0x310 [ 16.106333] kunit_try_run_case+0x1a5/0x480 [ 16.106542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.106914] kthread+0x337/0x6f0 [ 16.107049] ret_from_fork+0x116/0x1d0 [ 16.107313] ret_from_fork_asm+0x1a/0x30 [ 16.107565] [ 16.107650] The buggy address belongs to the object at ffff88810394df80 [ 16.107650] which belongs to the cache kmalloc-64 of size 64 [ 16.108009] The buggy address is located 0 bytes to the right of [ 16.108009] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.108384] [ 16.108476] The buggy address belongs to the physical page: [ 16.108656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.109159] flags: 0x200000000000000(node=0|zone=2) [ 16.109411] page_type: f5(slab) [ 16.109550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.109822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.110318] page dumped because: kasan: bad access detected [ 16.110650] [ 16.110725] Memory state around the buggy address: [ 16.110886] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.111173] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.111503] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.111802] ^ [ 16.112009] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.112293] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.112547] ================================================================== [ 15.533268] ================================================================== [ 15.533714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.534295] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.534676] [ 15.534789] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.534836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.534849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.534871] Call Trace: [ 15.534888] <TASK> [ 15.534904] dump_stack_lvl+0x73/0xb0 [ 15.534934] print_report+0xd1/0x610 [ 15.534957] ? __virt_addr_valid+0x1db/0x2d0 [ 15.534981] ? kasan_atomics_helper+0xac7/0x5450 [ 15.535003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.535028] ? kasan_atomics_helper+0xac7/0x5450 [ 15.535051] kasan_report+0x141/0x180 [ 15.535074] ? kasan_atomics_helper+0xac7/0x5450 [ 15.535101] kasan_check_range+0x10c/0x1c0 [ 15.535127] __kasan_check_write+0x18/0x20 [ 15.535202] kasan_atomics_helper+0xac7/0x5450 [ 15.535265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.535306] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.535333] ? kasan_atomics+0x152/0x310 [ 15.535361] kasan_atomics+0x1dc/0x310 [ 15.535385] ? __pfx_kasan_atomics+0x10/0x10 [ 15.535421] ? __pfx_read_tsc+0x10/0x10 [ 15.535444] ? ktime_get_ts64+0x86/0x230 [ 15.535471] kunit_try_run_case+0x1a5/0x480 [ 15.535498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.535521] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.535546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.535572] ? __kthread_parkme+0x82/0x180 [ 15.535645] ? preempt_count_sub+0x50/0x80 [ 15.535671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.535709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.535734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.535800] kthread+0x337/0x6f0 [ 15.535842] ? trace_preempt_on+0x20/0xc0 [ 15.535886] ? __pfx_kthread+0x10/0x10 [ 15.535908] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.535933] ? calculate_sigpending+0x7b/0xa0 [ 15.535960] ? __pfx_kthread+0x10/0x10 [ 15.535985] ret_from_fork+0x116/0x1d0 [ 15.536006] ? __pfx_kthread+0x10/0x10 [ 15.536028] ret_from_fork_asm+0x1a/0x30 [ 15.536063] </TASK> [ 15.536074] [ 15.545048] Allocated by task 283: [ 15.545198] kasan_save_stack+0x45/0x70 [ 15.545391] kasan_save_track+0x18/0x40 [ 15.545601] kasan_save_alloc_info+0x3b/0x50 [ 15.546023] __kasan_kmalloc+0xb7/0xc0 [ 15.546276] __kmalloc_cache_noprof+0x189/0x420 [ 15.546513] kasan_atomics+0x95/0x310 [ 15.546734] kunit_try_run_case+0x1a5/0x480 [ 15.546926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.547111] kthread+0x337/0x6f0 [ 15.547357] ret_from_fork+0x116/0x1d0 [ 15.547569] ret_from_fork_asm+0x1a/0x30 [ 15.547785] [ 15.548005] The buggy address belongs to the object at ffff88810394df80 [ 15.548005] which belongs to the cache kmalloc-64 of size 64 [ 15.548554] The buggy address is located 0 bytes to the right of [ 15.548554] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.549212] [ 15.549313] The buggy address belongs to the physical page: [ 15.549533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.550079] flags: 0x200000000000000(node=0|zone=2) [ 15.550506] page_type: f5(slab) [ 15.550797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.551045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.551493] page dumped because: kasan: bad access detected [ 15.551978] [ 15.552068] Memory state around the buggy address: [ 15.552338] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.552603] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.552984] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.553495] ^ [ 15.553783] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.554057] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.554527] ================================================================== [ 15.326925] ================================================================== [ 15.328320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.328805] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.329683] [ 15.329786] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.329834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.329848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.329871] Call Trace: [ 15.329885] <TASK> [ 15.329902] dump_stack_lvl+0x73/0xb0 [ 15.329934] print_report+0xd1/0x610 [ 15.329958] ? __virt_addr_valid+0x1db/0x2d0 [ 15.329982] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.330005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.330103] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.330127] kasan_report+0x141/0x180 [ 15.330152] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.330333] kasan_check_range+0x10c/0x1c0 [ 15.330368] __kasan_check_write+0x18/0x20 [ 15.330390] kasan_atomics_helper+0x5fe/0x5450 [ 15.330427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.330452] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.330479] ? kasan_atomics+0x152/0x310 [ 15.330508] kasan_atomics+0x1dc/0x310 [ 15.330532] ? __pfx_kasan_atomics+0x10/0x10 [ 15.330558] ? __pfx_read_tsc+0x10/0x10 [ 15.330603] ? ktime_get_ts64+0x86/0x230 [ 15.330632] kunit_try_run_case+0x1a5/0x480 [ 15.330660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.330685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.330712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.330738] ? __kthread_parkme+0x82/0x180 [ 15.330760] ? preempt_count_sub+0x50/0x80 [ 15.330786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.330813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.330839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.330864] kthread+0x337/0x6f0 [ 15.330885] ? trace_preempt_on+0x20/0xc0 [ 15.330911] ? __pfx_kthread+0x10/0x10 [ 15.330933] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.330956] ? calculate_sigpending+0x7b/0xa0 [ 15.330981] ? __pfx_kthread+0x10/0x10 [ 15.331004] ret_from_fork+0x116/0x1d0 [ 15.331084] ? __pfx_kthread+0x10/0x10 [ 15.331107] ret_from_fork_asm+0x1a/0x30 [ 15.331141] </TASK> [ 15.331153] [ 15.348052] Allocated by task 283: [ 15.348656] kasan_save_stack+0x45/0x70 [ 15.348826] kasan_save_track+0x18/0x40 [ 15.348968] kasan_save_alloc_info+0x3b/0x50 [ 15.349163] __kasan_kmalloc+0xb7/0xc0 [ 15.349581] __kmalloc_cache_noprof+0x189/0x420 [ 15.350385] kasan_atomics+0x95/0x310 [ 15.350794] kunit_try_run_case+0x1a5/0x480 [ 15.351406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352165] kthread+0x337/0x6f0 [ 15.352614] ret_from_fork+0x116/0x1d0 [ 15.352951] ret_from_fork_asm+0x1a/0x30 [ 15.353656] [ 15.353905] The buggy address belongs to the object at ffff88810394df80 [ 15.353905] which belongs to the cache kmalloc-64 of size 64 [ 15.354508] The buggy address is located 0 bytes to the right of [ 15.354508] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.355889] [ 15.355977] The buggy address belongs to the physical page: [ 15.356157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.356419] flags: 0x200000000000000(node=0|zone=2) [ 15.356594] page_type: f5(slab) [ 15.357015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.357351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.357956] page dumped because: kasan: bad access detected [ 15.358157] [ 15.358258] Memory state around the buggy address: [ 15.358677] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359243] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359549] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.359930] ^ [ 15.360322] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.360858] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361354] ================================================================== [ 16.323028] ================================================================== [ 16.323384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.323962] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.324720] [ 16.324833] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.324903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.324985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.325009] Call Trace: [ 16.325027] <TASK> [ 16.325045] dump_stack_lvl+0x73/0xb0 [ 16.325078] print_report+0xd1/0x610 [ 16.325101] ? __virt_addr_valid+0x1db/0x2d0 [ 16.325125] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.325148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.325173] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.325195] kasan_report+0x141/0x180 [ 16.325219] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.325248] kasan_check_range+0x10c/0x1c0 [ 16.325273] __kasan_check_write+0x18/0x20 [ 16.325293] kasan_atomics_helper+0x1e12/0x5450 [ 16.325318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.325342] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.325369] ? kasan_atomics+0x152/0x310 [ 16.325410] kasan_atomics+0x1dc/0x310 [ 16.325435] ? __pfx_kasan_atomics+0x10/0x10 [ 16.325462] ? __pfx_read_tsc+0x10/0x10 [ 16.325484] ? ktime_get_ts64+0x86/0x230 [ 16.325512] kunit_try_run_case+0x1a5/0x480 [ 16.325540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.325565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.325615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.325640] ? __kthread_parkme+0x82/0x180 [ 16.325661] ? preempt_count_sub+0x50/0x80 [ 16.325686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.325713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.325740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.325766] kthread+0x337/0x6f0 [ 16.325787] ? trace_preempt_on+0x20/0xc0 [ 16.325812] ? __pfx_kthread+0x10/0x10 [ 16.325834] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.325857] ? calculate_sigpending+0x7b/0xa0 [ 16.325883] ? __pfx_kthread+0x10/0x10 [ 16.325907] ret_from_fork+0x116/0x1d0 [ 16.325927] ? __pfx_kthread+0x10/0x10 [ 16.325949] ret_from_fork_asm+0x1a/0x30 [ 16.325983] </TASK> [ 16.325994] [ 16.336443] Allocated by task 283: [ 16.336919] kasan_save_stack+0x45/0x70 [ 16.337185] kasan_save_track+0x18/0x40 [ 16.337544] kasan_save_alloc_info+0x3b/0x50 [ 16.337780] __kasan_kmalloc+0xb7/0xc0 [ 16.337967] __kmalloc_cache_noprof+0x189/0x420 [ 16.338194] kasan_atomics+0x95/0x310 [ 16.338388] kunit_try_run_case+0x1a5/0x480 [ 16.338972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.339222] kthread+0x337/0x6f0 [ 16.339499] ret_from_fork+0x116/0x1d0 [ 16.339710] ret_from_fork_asm+0x1a/0x30 [ 16.340075] [ 16.340185] The buggy address belongs to the object at ffff88810394df80 [ 16.340185] which belongs to the cache kmalloc-64 of size 64 [ 16.341023] The buggy address is located 0 bytes to the right of [ 16.341023] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.341564] [ 16.341894] The buggy address belongs to the physical page: [ 16.342233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.342689] flags: 0x200000000000000(node=0|zone=2) [ 16.342940] page_type: f5(slab) [ 16.343301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.343677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.344084] page dumped because: kasan: bad access detected [ 16.344425] [ 16.344553] Memory state around the buggy address: [ 16.345018] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.345355] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.345884] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.346312] ^ [ 16.346630] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.347058] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.347414] ================================================================== [ 15.820087] ================================================================== [ 15.820415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.820777] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.821040] [ 15.821150] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.821192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.821205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.821227] Call Trace: [ 15.821243] <TASK> [ 15.821260] dump_stack_lvl+0x73/0xb0 [ 15.821288] print_report+0xd1/0x610 [ 15.821311] ? __virt_addr_valid+0x1db/0x2d0 [ 15.821335] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.821357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.821381] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.821416] kasan_report+0x141/0x180 [ 15.821439] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.821468] __asan_report_load4_noabort+0x18/0x20 [ 15.821493] kasan_atomics_helper+0x4a02/0x5450 [ 15.821517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.821542] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.821568] ? kasan_atomics+0x152/0x310 [ 15.821596] kasan_atomics+0x1dc/0x310 [ 15.821621] ? __pfx_kasan_atomics+0x10/0x10 [ 15.821647] ? __pfx_read_tsc+0x10/0x10 [ 15.821669] ? ktime_get_ts64+0x86/0x230 [ 15.821695] kunit_try_run_case+0x1a5/0x480 [ 15.821721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.821745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.821771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.821797] ? __kthread_parkme+0x82/0x180 [ 15.821819] ? preempt_count_sub+0x50/0x80 [ 15.821843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.821869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.821894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.821919] kthread+0x337/0x6f0 [ 15.821941] ? trace_preempt_on+0x20/0xc0 [ 15.821965] ? __pfx_kthread+0x10/0x10 [ 15.821987] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.822010] ? calculate_sigpending+0x7b/0xa0 [ 15.822035] ? __pfx_kthread+0x10/0x10 [ 15.822058] ret_from_fork+0x116/0x1d0 [ 15.822078] ? __pfx_kthread+0x10/0x10 [ 15.822101] ret_from_fork_asm+0x1a/0x30 [ 15.822136] </TASK> [ 15.822146] [ 15.829305] Allocated by task 283: [ 15.829496] kasan_save_stack+0x45/0x70 [ 15.829692] kasan_save_track+0x18/0x40 [ 15.830015] kasan_save_alloc_info+0x3b/0x50 [ 15.830228] __kasan_kmalloc+0xb7/0xc0 [ 15.830432] __kmalloc_cache_noprof+0x189/0x420 [ 15.830626] kasan_atomics+0x95/0x310 [ 15.830814] kunit_try_run_case+0x1a5/0x480 [ 15.830966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.831182] kthread+0x337/0x6f0 [ 15.831358] ret_from_fork+0x116/0x1d0 [ 15.831551] ret_from_fork_asm+0x1a/0x30 [ 15.831763] [ 15.831861] The buggy address belongs to the object at ffff88810394df80 [ 15.831861] which belongs to the cache kmalloc-64 of size 64 [ 15.832313] The buggy address is located 0 bytes to the right of [ 15.832313] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.832834] [ 15.832935] The buggy address belongs to the physical page: [ 15.833160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.833469] flags: 0x200000000000000(node=0|zone=2) [ 15.833736] page_type: f5(slab) [ 15.833875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.834182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.834494] page dumped because: kasan: bad access detected [ 15.834752] [ 15.834829] Memory state around the buggy address: [ 15.835054] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.835300] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.835532] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.835751] ^ [ 15.835909] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.836129] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.836347] ================================================================== [ 15.304336] ================================================================== [ 15.304869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.305521] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.305870] [ 15.306012] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.306060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.306073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.306096] Call Trace: [ 15.306110] <TASK> [ 15.306126] dump_stack_lvl+0x73/0xb0 [ 15.306204] print_report+0xd1/0x610 [ 15.306245] ? __virt_addr_valid+0x1db/0x2d0 [ 15.306270] ? kasan_atomics_helper+0x565/0x5450 [ 15.306292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.306317] ? kasan_atomics_helper+0x565/0x5450 [ 15.306340] kasan_report+0x141/0x180 [ 15.306364] ? kasan_atomics_helper+0x565/0x5450 [ 15.306392] kasan_check_range+0x10c/0x1c0 [ 15.306430] __kasan_check_write+0x18/0x20 [ 15.306450] kasan_atomics_helper+0x565/0x5450 [ 15.306474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.306498] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.306524] ? kasan_atomics+0x152/0x310 [ 15.306554] kasan_atomics+0x1dc/0x310 [ 15.306578] ? __pfx_kasan_atomics+0x10/0x10 [ 15.306613] ? __pfx_read_tsc+0x10/0x10 [ 15.306636] ? ktime_get_ts64+0x86/0x230 [ 15.306664] kunit_try_run_case+0x1a5/0x480 [ 15.306702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.306727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.306753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.306778] ? __kthread_parkme+0x82/0x180 [ 15.306800] ? preempt_count_sub+0x50/0x80 [ 15.306826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.306852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.306877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.306903] kthread+0x337/0x6f0 [ 15.306923] ? trace_preempt_on+0x20/0xc0 [ 15.306948] ? __pfx_kthread+0x10/0x10 [ 15.306982] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.307005] ? calculate_sigpending+0x7b/0xa0 [ 15.307067] ? __pfx_kthread+0x10/0x10 [ 15.307103] ret_from_fork+0x116/0x1d0 [ 15.307124] ? __pfx_kthread+0x10/0x10 [ 15.307146] ret_from_fork_asm+0x1a/0x30 [ 15.307191] </TASK> [ 15.307204] [ 15.315933] Allocated by task 283: [ 15.316145] kasan_save_stack+0x45/0x70 [ 15.316460] kasan_save_track+0x18/0x40 [ 15.316737] kasan_save_alloc_info+0x3b/0x50 [ 15.316961] __kasan_kmalloc+0xb7/0xc0 [ 15.317201] __kmalloc_cache_noprof+0x189/0x420 [ 15.317456] kasan_atomics+0x95/0x310 [ 15.317607] kunit_try_run_case+0x1a5/0x480 [ 15.317819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.318127] kthread+0x337/0x6f0 [ 15.318278] ret_from_fork+0x116/0x1d0 [ 15.318425] ret_from_fork_asm+0x1a/0x30 [ 15.318568] [ 15.318809] The buggy address belongs to the object at ffff88810394df80 [ 15.318809] which belongs to the cache kmalloc-64 of size 64 [ 15.319447] The buggy address is located 0 bytes to the right of [ 15.319447] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.320248] [ 15.320332] The buggy address belongs to the physical page: [ 15.320525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.320780] flags: 0x200000000000000(node=0|zone=2) [ 15.320946] page_type: f5(slab) [ 15.321070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.321384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.321988] page dumped because: kasan: bad access detected [ 15.322622] [ 15.322725] Memory state around the buggy address: [ 15.322953] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.323259] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.323496] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.323885] ^ [ 15.324133] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.324516] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.325345] ================================================================== [ 16.412414] ================================================================== [ 16.412977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.413318] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.413572] [ 16.413684] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.413728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.413743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.413766] Call Trace: [ 16.413782] <TASK> [ 16.413798] dump_stack_lvl+0x73/0xb0 [ 16.413829] print_report+0xd1/0x610 [ 16.413852] ? __virt_addr_valid+0x1db/0x2d0 [ 16.413875] ? kasan_atomics_helper+0x2006/0x5450 [ 16.413897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.413921] ? kasan_atomics_helper+0x2006/0x5450 [ 16.413944] kasan_report+0x141/0x180 [ 16.413968] ? kasan_atomics_helper+0x2006/0x5450 [ 16.413996] kasan_check_range+0x10c/0x1c0 [ 16.414022] __kasan_check_write+0x18/0x20 [ 16.414042] kasan_atomics_helper+0x2006/0x5450 [ 16.414067] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.414091] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.414128] ? kasan_atomics+0x152/0x310 [ 16.414156] kasan_atomics+0x1dc/0x310 [ 16.414181] ? __pfx_kasan_atomics+0x10/0x10 [ 16.414207] ? __pfx_read_tsc+0x10/0x10 [ 16.414229] ? ktime_get_ts64+0x86/0x230 [ 16.414255] kunit_try_run_case+0x1a5/0x480 [ 16.414281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.414305] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.414331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.414356] ? __kthread_parkme+0x82/0x180 [ 16.414378] ? preempt_count_sub+0x50/0x80 [ 16.414414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.414440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.414465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.414492] kthread+0x337/0x6f0 [ 16.414513] ? trace_preempt_on+0x20/0xc0 [ 16.414538] ? __pfx_kthread+0x10/0x10 [ 16.414561] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.414585] ? calculate_sigpending+0x7b/0xa0 [ 16.414610] ? __pfx_kthread+0x10/0x10 [ 16.414634] ret_from_fork+0x116/0x1d0 [ 16.414654] ? __pfx_kthread+0x10/0x10 [ 16.414676] ret_from_fork_asm+0x1a/0x30 [ 16.414710] </TASK> [ 16.414721] [ 16.422494] Allocated by task 283: [ 16.422729] kasan_save_stack+0x45/0x70 [ 16.422904] kasan_save_track+0x18/0x40 [ 16.423044] kasan_save_alloc_info+0x3b/0x50 [ 16.423197] __kasan_kmalloc+0xb7/0xc0 [ 16.423337] __kmalloc_cache_noprof+0x189/0x420 [ 16.423568] kasan_atomics+0x95/0x310 [ 16.423758] kunit_try_run_case+0x1a5/0x480 [ 16.423964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.424143] kthread+0x337/0x6f0 [ 16.424267] ret_from_fork+0x116/0x1d0 [ 16.424412] ret_from_fork_asm+0x1a/0x30 [ 16.424661] [ 16.424763] The buggy address belongs to the object at ffff88810394df80 [ 16.424763] which belongs to the cache kmalloc-64 of size 64 [ 16.425292] The buggy address is located 0 bytes to the right of [ 16.425292] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.425788] [ 16.425866] The buggy address belongs to the physical page: [ 16.426046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.426292] flags: 0x200000000000000(node=0|zone=2) [ 16.426471] page_type: f5(slab) [ 16.426622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.426962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.427293] page dumped because: kasan: bad access detected [ 16.427556] [ 16.427654] Memory state around the buggy address: [ 16.428094] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.428317] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.428546] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.428767] ^ [ 16.428924] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.429462] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.430042] ================================================================== [ 15.283996] ================================================================== [ 15.284342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.284787] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.285179] [ 15.285315] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.285363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.285377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.285410] Call Trace: [ 15.285426] <TASK> [ 15.285443] dump_stack_lvl+0x73/0xb0 [ 15.285483] print_report+0xd1/0x610 [ 15.285507] ? __virt_addr_valid+0x1db/0x2d0 [ 15.285543] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.285565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.285590] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.285613] kasan_report+0x141/0x180 [ 15.285637] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.285666] __asan_report_store4_noabort+0x1b/0x30 [ 15.285701] kasan_atomics_helper+0x4b3a/0x5450 [ 15.285725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.285749] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.285788] ? kasan_atomics+0x152/0x310 [ 15.285817] kasan_atomics+0x1dc/0x310 [ 15.285842] ? __pfx_kasan_atomics+0x10/0x10 [ 15.285868] ? __pfx_read_tsc+0x10/0x10 [ 15.285889] ? ktime_get_ts64+0x86/0x230 [ 15.285916] kunit_try_run_case+0x1a5/0x480 [ 15.285944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.285968] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.285993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.286017] ? __kthread_parkme+0x82/0x180 [ 15.286089] ? preempt_count_sub+0x50/0x80 [ 15.286115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.286160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.286212] kthread+0x337/0x6f0 [ 15.286233] ? trace_preempt_on+0x20/0xc0 [ 15.286258] ? __pfx_kthread+0x10/0x10 [ 15.286281] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.286304] ? calculate_sigpending+0x7b/0xa0 [ 15.286330] ? __pfx_kthread+0x10/0x10 [ 15.286353] ret_from_fork+0x116/0x1d0 [ 15.286373] ? __pfx_kthread+0x10/0x10 [ 15.286405] ret_from_fork_asm+0x1a/0x30 [ 15.286439] </TASK> [ 15.286450] [ 15.294577] Allocated by task 283: [ 15.294715] kasan_save_stack+0x45/0x70 [ 15.294860] kasan_save_track+0x18/0x40 [ 15.294998] kasan_save_alloc_info+0x3b/0x50 [ 15.295181] __kasan_kmalloc+0xb7/0xc0 [ 15.295370] __kmalloc_cache_noprof+0x189/0x420 [ 15.295892] kasan_atomics+0x95/0x310 [ 15.296096] kunit_try_run_case+0x1a5/0x480 [ 15.296316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.296584] kthread+0x337/0x6f0 [ 15.296760] ret_from_fork+0x116/0x1d0 [ 15.296949] ret_from_fork_asm+0x1a/0x30 [ 15.297438] [ 15.297549] The buggy address belongs to the object at ffff88810394df80 [ 15.297549] which belongs to the cache kmalloc-64 of size 64 [ 15.298172] The buggy address is located 0 bytes to the right of [ 15.298172] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.298749] [ 15.298828] The buggy address belongs to the physical page: [ 15.299005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.299421] flags: 0x200000000000000(node=0|zone=2) [ 15.299817] page_type: f5(slab) [ 15.299977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.300332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.300788] page dumped because: kasan: bad access detected [ 15.301177] [ 15.301306] Memory state around the buggy address: [ 15.301521] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.302003] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.302305] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.302758] ^ [ 15.302941] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.303368] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.303709] ================================================================== [ 15.464361] ================================================================== [ 15.464752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.465150] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.465516] [ 15.465608] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.465654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.465668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.465692] Call Trace: [ 15.465707] <TASK> [ 15.465723] dump_stack_lvl+0x73/0xb0 [ 15.465752] print_report+0xd1/0x610 [ 15.465775] ? __virt_addr_valid+0x1db/0x2d0 [ 15.465799] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.465822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.465846] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.465869] kasan_report+0x141/0x180 [ 15.465892] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.465920] kasan_check_range+0x10c/0x1c0 [ 15.465944] __kasan_check_write+0x18/0x20 [ 15.465965] kasan_atomics_helper+0x8f9/0x5450 [ 15.466086] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.466135] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.466208] ? kasan_atomics+0x152/0x310 [ 15.466283] kasan_atomics+0x1dc/0x310 [ 15.466351] ? __pfx_kasan_atomics+0x10/0x10 [ 15.466435] ? __pfx_read_tsc+0x10/0x10 [ 15.466482] ? ktime_get_ts64+0x86/0x230 [ 15.466511] kunit_try_run_case+0x1a5/0x480 [ 15.466539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.466564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.466590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.466615] ? __kthread_parkme+0x82/0x180 [ 15.466637] ? preempt_count_sub+0x50/0x80 [ 15.466664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.466691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.466716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.466741] kthread+0x337/0x6f0 [ 15.466763] ? trace_preempt_on+0x20/0xc0 [ 15.466788] ? __pfx_kthread+0x10/0x10 [ 15.466810] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.466833] ? calculate_sigpending+0x7b/0xa0 [ 15.466858] ? __pfx_kthread+0x10/0x10 [ 15.466882] ret_from_fork+0x116/0x1d0 [ 15.466902] ? __pfx_kthread+0x10/0x10 [ 15.466924] ret_from_fork_asm+0x1a/0x30 [ 15.466958] </TASK> [ 15.466970] [ 15.475671] Allocated by task 283: [ 15.475899] kasan_save_stack+0x45/0x70 [ 15.476140] kasan_save_track+0x18/0x40 [ 15.476372] kasan_save_alloc_info+0x3b/0x50 [ 15.476650] __kasan_kmalloc+0xb7/0xc0 [ 15.476886] __kmalloc_cache_noprof+0x189/0x420 [ 15.477078] kasan_atomics+0x95/0x310 [ 15.477304] kunit_try_run_case+0x1a5/0x480 [ 15.477549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.477771] kthread+0x337/0x6f0 [ 15.477934] ret_from_fork+0x116/0x1d0 [ 15.478165] ret_from_fork_asm+0x1a/0x30 [ 15.478420] [ 15.478495] The buggy address belongs to the object at ffff88810394df80 [ 15.478495] which belongs to the cache kmalloc-64 of size 64 [ 15.479119] The buggy address is located 0 bytes to the right of [ 15.479119] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.479712] [ 15.479825] The buggy address belongs to the physical page: [ 15.480064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.480496] flags: 0x200000000000000(node=0|zone=2) [ 15.480786] page_type: f5(slab) [ 15.480945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.481364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.481735] page dumped because: kasan: bad access detected [ 15.481988] [ 15.482089] Memory state around the buggy address: [ 15.482360] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.482632] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.483110] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.483424] ^ [ 15.483663] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.484003] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.484417] ================================================================== [ 15.619511] ================================================================== [ 15.619856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.620360] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.620774] [ 15.620864] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.620907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.620920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.620942] Call Trace: [ 15.620957] <TASK> [ 15.620974] dump_stack_lvl+0x73/0xb0 [ 15.621002] print_report+0xd1/0x610 [ 15.621026] ? __virt_addr_valid+0x1db/0x2d0 [ 15.621052] ? kasan_atomics_helper+0xd47/0x5450 [ 15.621074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.621098] ? kasan_atomics_helper+0xd47/0x5450 [ 15.621121] kasan_report+0x141/0x180 [ 15.621158] ? kasan_atomics_helper+0xd47/0x5450 [ 15.621187] kasan_check_range+0x10c/0x1c0 [ 15.621213] __kasan_check_write+0x18/0x20 [ 15.621245] kasan_atomics_helper+0xd47/0x5450 [ 15.621269] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.621293] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.621328] ? kasan_atomics+0x152/0x310 [ 15.621357] kasan_atomics+0x1dc/0x310 [ 15.621381] ? __pfx_kasan_atomics+0x10/0x10 [ 15.621422] ? __pfx_read_tsc+0x10/0x10 [ 15.621445] ? ktime_get_ts64+0x86/0x230 [ 15.621471] kunit_try_run_case+0x1a5/0x480 [ 15.621498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.621532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.621558] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.621583] ? __kthread_parkme+0x82/0x180 [ 15.621615] ? preempt_count_sub+0x50/0x80 [ 15.621642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.621669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.621694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.621728] kthread+0x337/0x6f0 [ 15.621750] ? trace_preempt_on+0x20/0xc0 [ 15.621774] ? __pfx_kthread+0x10/0x10 [ 15.621807] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.621832] ? calculate_sigpending+0x7b/0xa0 [ 15.621857] ? __pfx_kthread+0x10/0x10 [ 15.621881] ret_from_fork+0x116/0x1d0 [ 15.621910] ? __pfx_kthread+0x10/0x10 [ 15.621932] ret_from_fork_asm+0x1a/0x30 [ 15.621977] </TASK> [ 15.621988] [ 15.629593] Allocated by task 283: [ 15.629796] kasan_save_stack+0x45/0x70 [ 15.630025] kasan_save_track+0x18/0x40 [ 15.630423] kasan_save_alloc_info+0x3b/0x50 [ 15.630696] __kasan_kmalloc+0xb7/0xc0 [ 15.630909] __kmalloc_cache_noprof+0x189/0x420 [ 15.631082] kasan_atomics+0x95/0x310 [ 15.631219] kunit_try_run_case+0x1a5/0x480 [ 15.631440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.631847] kthread+0x337/0x6f0 [ 15.632039] ret_from_fork+0x116/0x1d0 [ 15.632220] ret_from_fork_asm+0x1a/0x30 [ 15.632429] [ 15.632519] The buggy address belongs to the object at ffff88810394df80 [ 15.632519] which belongs to the cache kmalloc-64 of size 64 [ 15.632897] The buggy address is located 0 bytes to the right of [ 15.632897] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.633266] [ 15.633339] The buggy address belongs to the physical page: [ 15.633524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.633767] flags: 0x200000000000000(node=0|zone=2) [ 15.633930] page_type: f5(slab) [ 15.634052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.634374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.634981] page dumped because: kasan: bad access detected [ 15.635237] [ 15.635332] Memory state around the buggy address: [ 15.635564] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.636128] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.636450] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.636765] ^ [ 15.637018] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.637336] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.637736] ================================================================== [ 15.802184] ================================================================== [ 15.802617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.802953] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.803223] [ 15.803313] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.803357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.803371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.803404] Call Trace: [ 15.803420] <TASK> [ 15.803436] dump_stack_lvl+0x73/0xb0 [ 15.803465] print_report+0xd1/0x610 [ 15.803488] ? __virt_addr_valid+0x1db/0x2d0 [ 15.803512] ? kasan_atomics_helper+0x1148/0x5450 [ 15.803535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.803558] ? kasan_atomics_helper+0x1148/0x5450 [ 15.803583] kasan_report+0x141/0x180 [ 15.803617] ? kasan_atomics_helper+0x1148/0x5450 [ 15.803646] kasan_check_range+0x10c/0x1c0 [ 15.803671] __kasan_check_write+0x18/0x20 [ 15.803691] kasan_atomics_helper+0x1148/0x5450 [ 15.803715] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.803738] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.803765] ? kasan_atomics+0x152/0x310 [ 15.803794] kasan_atomics+0x1dc/0x310 [ 15.803818] ? __pfx_kasan_atomics+0x10/0x10 [ 15.803844] ? __pfx_read_tsc+0x10/0x10 [ 15.803866] ? ktime_get_ts64+0x86/0x230 [ 15.803892] kunit_try_run_case+0x1a5/0x480 [ 15.803920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.803943] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.803969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.803994] ? __kthread_parkme+0x82/0x180 [ 15.804017] ? preempt_count_sub+0x50/0x80 [ 15.804043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.804069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.804119] kthread+0x337/0x6f0 [ 15.804140] ? trace_preempt_on+0x20/0xc0 [ 15.804164] ? __pfx_kthread+0x10/0x10 [ 15.804187] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.804210] ? calculate_sigpending+0x7b/0xa0 [ 15.804235] ? __pfx_kthread+0x10/0x10 [ 15.804258] ret_from_fork+0x116/0x1d0 [ 15.804278] ? __pfx_kthread+0x10/0x10 [ 15.804300] ret_from_fork_asm+0x1a/0x30 [ 15.804333] </TASK> [ 15.804345] [ 15.812124] Allocated by task 283: [ 15.812295] kasan_save_stack+0x45/0x70 [ 15.812503] kasan_save_track+0x18/0x40 [ 15.812697] kasan_save_alloc_info+0x3b/0x50 [ 15.812850] __kasan_kmalloc+0xb7/0xc0 [ 15.812987] __kmalloc_cache_noprof+0x189/0x420 [ 15.813146] kasan_atomics+0x95/0x310 [ 15.813282] kunit_try_run_case+0x1a5/0x480 [ 15.813500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.813958] kthread+0x337/0x6f0 [ 15.814133] ret_from_fork+0x116/0x1d0 [ 15.814322] ret_from_fork_asm+0x1a/0x30 [ 15.814544] [ 15.814708] The buggy address belongs to the object at ffff88810394df80 [ 15.814708] which belongs to the cache kmalloc-64 of size 64 [ 15.815188] The buggy address is located 0 bytes to the right of [ 15.815188] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.815569] [ 15.815683] The buggy address belongs to the physical page: [ 15.815934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.816284] flags: 0x200000000000000(node=0|zone=2) [ 15.816525] page_type: f5(slab) [ 15.816725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.816964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.817310] page dumped because: kasan: bad access detected [ 15.817579] [ 15.817675] Memory state around the buggy address: [ 15.817884] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.818176] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.818474] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.818775] ^ [ 15.818991] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.819251] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819535] ================================================================== [ 16.172869] ================================================================== [ 16.173225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.173479] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.173709] [ 16.173797] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.173841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.173855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.173879] Call Trace: [ 16.173893] <TASK> [ 16.173910] dump_stack_lvl+0x73/0xb0 [ 16.173941] print_report+0xd1/0x610 [ 16.173967] ? __virt_addr_valid+0x1db/0x2d0 [ 16.173993] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.174018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.174042] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.174066] kasan_report+0x141/0x180 [ 16.174089] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.174133] kasan_check_range+0x10c/0x1c0 [ 16.174157] __kasan_check_write+0x18/0x20 [ 16.174178] kasan_atomics_helper+0x19e3/0x5450 [ 16.174203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.174226] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.174253] ? kasan_atomics+0x152/0x310 [ 16.174282] kasan_atomics+0x1dc/0x310 [ 16.174307] ? __pfx_kasan_atomics+0x10/0x10 [ 16.174332] ? __pfx_read_tsc+0x10/0x10 [ 16.174355] ? ktime_get_ts64+0x86/0x230 [ 16.174381] kunit_try_run_case+0x1a5/0x480 [ 16.174419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.174442] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.174468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.174493] ? __kthread_parkme+0x82/0x180 [ 16.174514] ? preempt_count_sub+0x50/0x80 [ 16.174541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.174566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.174590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.174616] kthread+0x337/0x6f0 [ 16.174637] ? trace_preempt_on+0x20/0xc0 [ 16.174661] ? __pfx_kthread+0x10/0x10 [ 16.174683] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.174706] ? calculate_sigpending+0x7b/0xa0 [ 16.174732] ? __pfx_kthread+0x10/0x10 [ 16.174754] ret_from_fork+0x116/0x1d0 [ 16.174775] ? __pfx_kthread+0x10/0x10 [ 16.174796] ret_from_fork_asm+0x1a/0x30 [ 16.174830] </TASK> [ 16.174841] [ 16.184066] Allocated by task 283: [ 16.184229] kasan_save_stack+0x45/0x70 [ 16.184379] kasan_save_track+0x18/0x40 [ 16.184531] kasan_save_alloc_info+0x3b/0x50 [ 16.184687] __kasan_kmalloc+0xb7/0xc0 [ 16.184822] __kmalloc_cache_noprof+0x189/0x420 [ 16.185013] kasan_atomics+0x95/0x310 [ 16.185207] kunit_try_run_case+0x1a5/0x480 [ 16.185438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.185844] kthread+0x337/0x6f0 [ 16.186013] ret_from_fork+0x116/0x1d0 [ 16.186199] ret_from_fork_asm+0x1a/0x30 [ 16.186403] [ 16.186505] The buggy address belongs to the object at ffff88810394df80 [ 16.186505] which belongs to the cache kmalloc-64 of size 64 [ 16.186949] The buggy address is located 0 bytes to the right of [ 16.186949] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.187440] [ 16.187540] The buggy address belongs to the physical page: [ 16.187859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.188155] flags: 0x200000000000000(node=0|zone=2) [ 16.188404] page_type: f5(slab) [ 16.188566] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.188869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.189155] page dumped because: kasan: bad access detected [ 16.189330] [ 16.189412] Memory state around the buggy address: [ 16.189571] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.189791] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.190336] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.190757] ^ [ 16.190985] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.191308] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.191668] ================================================================== [ 16.500741] ================================================================== [ 16.501299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.502863] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.503104] [ 16.503223] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.503269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.503282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.503305] Call Trace: [ 16.503319] <TASK> [ 16.503335] dump_stack_lvl+0x73/0xb0 [ 16.503368] print_report+0xd1/0x610 [ 16.503403] ? __virt_addr_valid+0x1db/0x2d0 [ 16.503427] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.503450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.503474] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.503497] kasan_report+0x141/0x180 [ 16.503522] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.503551] __asan_report_load8_noabort+0x18/0x20 [ 16.503577] kasan_atomics_helper+0x4fa5/0x5450 [ 16.503602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.503627] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.503654] ? kasan_atomics+0x152/0x310 [ 16.503683] kasan_atomics+0x1dc/0x310 [ 16.503707] ? __pfx_kasan_atomics+0x10/0x10 [ 16.503734] ? __pfx_read_tsc+0x10/0x10 [ 16.503757] ? ktime_get_ts64+0x86/0x230 [ 16.503783] kunit_try_run_case+0x1a5/0x480 [ 16.503809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.503833] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.503859] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.503885] ? __kthread_parkme+0x82/0x180 [ 16.503907] ? preempt_count_sub+0x50/0x80 [ 16.503933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.503960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.503985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.504010] kthread+0x337/0x6f0 [ 16.504031] ? trace_preempt_on+0x20/0xc0 [ 16.504056] ? __pfx_kthread+0x10/0x10 [ 16.504079] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.504103] ? calculate_sigpending+0x7b/0xa0 [ 16.504128] ? __pfx_kthread+0x10/0x10 [ 16.504151] ret_from_fork+0x116/0x1d0 [ 16.504171] ? __pfx_kthread+0x10/0x10 [ 16.504193] ret_from_fork_asm+0x1a/0x30 [ 16.504228] </TASK> [ 16.504240] [ 16.517076] Allocated by task 283: [ 16.517402] kasan_save_stack+0x45/0x70 [ 16.517781] kasan_save_track+0x18/0x40 [ 16.518006] kasan_save_alloc_info+0x3b/0x50 [ 16.518159] __kasan_kmalloc+0xb7/0xc0 [ 16.518295] __kmalloc_cache_noprof+0x189/0x420 [ 16.518465] kasan_atomics+0x95/0x310 [ 16.518638] kunit_try_run_case+0x1a5/0x480 [ 16.519017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.519605] kthread+0x337/0x6f0 [ 16.519909] ret_from_fork+0x116/0x1d0 [ 16.520258] ret_from_fork_asm+0x1a/0x30 [ 16.520634] [ 16.520800] The buggy address belongs to the object at ffff88810394df80 [ 16.520800] which belongs to the cache kmalloc-64 of size 64 [ 16.521835] The buggy address is located 0 bytes to the right of [ 16.521835] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.522973] [ 16.523135] The buggy address belongs to the physical page: [ 16.523629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.524505] flags: 0x200000000000000(node=0|zone=2) [ 16.524755] page_type: f5(slab) [ 16.525047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.525528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.526061] page dumped because: kasan: bad access detected [ 16.526322] [ 16.526431] Memory state around the buggy address: [ 16.526667] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.526902] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.527387] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.527674] ^ [ 16.527874] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.528129] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.528458] ================================================================== [ 16.528951] ================================================================== [ 16.529475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.529899] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.530281] [ 16.530415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.530460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.530473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.530496] Call Trace: [ 16.530513] <TASK> [ 16.530531] dump_stack_lvl+0x73/0xb0 [ 16.530562] print_report+0xd1/0x610 [ 16.530585] ? __virt_addr_valid+0x1db/0x2d0 [ 16.530608] ? kasan_atomics_helper+0x224c/0x5450 [ 16.530641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.530666] ? kasan_atomics_helper+0x224c/0x5450 [ 16.530690] kasan_report+0x141/0x180 [ 16.530714] ? kasan_atomics_helper+0x224c/0x5450 [ 16.530744] kasan_check_range+0x10c/0x1c0 [ 16.530769] __kasan_check_write+0x18/0x20 [ 16.530790] kasan_atomics_helper+0x224c/0x5450 [ 16.530815] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.530838] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.530864] ? kasan_atomics+0x152/0x310 [ 16.530893] kasan_atomics+0x1dc/0x310 [ 16.530917] ? __pfx_kasan_atomics+0x10/0x10 [ 16.530943] ? __pfx_read_tsc+0x10/0x10 [ 16.530966] ? ktime_get_ts64+0x86/0x230 [ 16.530992] kunit_try_run_case+0x1a5/0x480 [ 16.531017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.531041] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.531068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.531093] ? __kthread_parkme+0x82/0x180 [ 16.531115] ? preempt_count_sub+0x50/0x80 [ 16.531140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.531166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.531192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.531217] kthread+0x337/0x6f0 [ 16.531239] ? trace_preempt_on+0x20/0xc0 [ 16.531263] ? __pfx_kthread+0x10/0x10 [ 16.531285] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.531309] ? calculate_sigpending+0x7b/0xa0 [ 16.531335] ? __pfx_kthread+0x10/0x10 [ 16.531359] ret_from_fork+0x116/0x1d0 [ 16.531378] ? __pfx_kthread+0x10/0x10 [ 16.531410] ret_from_fork_asm+0x1a/0x30 [ 16.531444] </TASK> [ 16.531456] [ 16.539185] Allocated by task 283: [ 16.539372] kasan_save_stack+0x45/0x70 [ 16.539565] kasan_save_track+0x18/0x40 [ 16.539775] kasan_save_alloc_info+0x3b/0x50 [ 16.539964] __kasan_kmalloc+0xb7/0xc0 [ 16.540179] __kmalloc_cache_noprof+0x189/0x420 [ 16.540377] kasan_atomics+0x95/0x310 [ 16.540599] kunit_try_run_case+0x1a5/0x480 [ 16.540781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.541055] kthread+0x337/0x6f0 [ 16.541240] ret_from_fork+0x116/0x1d0 [ 16.541439] ret_from_fork_asm+0x1a/0x30 [ 16.541686] [ 16.541785] The buggy address belongs to the object at ffff88810394df80 [ 16.541785] which belongs to the cache kmalloc-64 of size 64 [ 16.542300] The buggy address is located 0 bytes to the right of [ 16.542300] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.542979] [ 16.543088] The buggy address belongs to the physical page: [ 16.543338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.543715] flags: 0x200000000000000(node=0|zone=2) [ 16.543926] page_type: f5(slab) [ 16.544098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.544421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.544784] page dumped because: kasan: bad access detected [ 16.545050] [ 16.545142] Memory state around the buggy address: [ 16.545376] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.545684] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.545954] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.546245] ^ [ 16.546481] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.546794] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.547097] ================================================================== [ 15.418389] ================================================================== [ 15.418783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.419607] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.419997] [ 15.420441] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.420500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.420522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.420547] Call Trace: [ 15.420564] <TASK> [ 15.420630] dump_stack_lvl+0x73/0xb0 [ 15.420672] print_report+0xd1/0x610 [ 15.420696] ? __virt_addr_valid+0x1db/0x2d0 [ 15.420722] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.420745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.420769] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.420791] kasan_report+0x141/0x180 [ 15.420815] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.420844] kasan_check_range+0x10c/0x1c0 [ 15.420869] __kasan_check_write+0x18/0x20 [ 15.420890] kasan_atomics_helper+0x7c7/0x5450 [ 15.420914] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.420938] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.420964] ? kasan_atomics+0x152/0x310 [ 15.420993] kasan_atomics+0x1dc/0x310 [ 15.421024] ? __pfx_kasan_atomics+0x10/0x10 [ 15.421051] ? __pfx_read_tsc+0x10/0x10 [ 15.421074] ? ktime_get_ts64+0x86/0x230 [ 15.421103] kunit_try_run_case+0x1a5/0x480 [ 15.421130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421155] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.421181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.421206] ? __kthread_parkme+0x82/0x180 [ 15.421228] ? preempt_count_sub+0x50/0x80 [ 15.421254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.421306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.421331] kthread+0x337/0x6f0 [ 15.421352] ? trace_preempt_on+0x20/0xc0 [ 15.421377] ? __pfx_kthread+0x10/0x10 [ 15.421408] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.421445] ? calculate_sigpending+0x7b/0xa0 [ 15.421471] ? __pfx_kthread+0x10/0x10 [ 15.421494] ret_from_fork+0x116/0x1d0 [ 15.421514] ? __pfx_kthread+0x10/0x10 [ 15.421536] ret_from_fork_asm+0x1a/0x30 [ 15.421570] </TASK> [ 15.421583] [ 15.433789] Allocated by task 283: [ 15.434102] kasan_save_stack+0x45/0x70 [ 15.434307] kasan_save_track+0x18/0x40 [ 15.434512] kasan_save_alloc_info+0x3b/0x50 [ 15.434840] __kasan_kmalloc+0xb7/0xc0 [ 15.435123] __kmalloc_cache_noprof+0x189/0x420 [ 15.435302] kasan_atomics+0x95/0x310 [ 15.435517] kunit_try_run_case+0x1a5/0x480 [ 15.435678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.435994] kthread+0x337/0x6f0 [ 15.436222] ret_from_fork+0x116/0x1d0 [ 15.436509] ret_from_fork_asm+0x1a/0x30 [ 15.436739] [ 15.436841] The buggy address belongs to the object at ffff88810394df80 [ 15.436841] which belongs to the cache kmalloc-64 of size 64 [ 15.437496] The buggy address is located 0 bytes to the right of [ 15.437496] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.438332] [ 15.438431] The buggy address belongs to the physical page: [ 15.438745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.439099] flags: 0x200000000000000(node=0|zone=2) [ 15.439345] page_type: f5(slab) [ 15.439542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.439896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.440278] page dumped because: kasan: bad access detected [ 15.440527] [ 15.440650] Memory state around the buggy address: [ 15.440895] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.441238] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.441554] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.441942] ^ [ 15.442240] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.442656] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.442976] ================================================================== [ 15.673354] ================================================================== [ 15.673831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.674473] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.674928] [ 15.675228] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.675280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.675294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.675318] Call Trace: [ 15.675337] <TASK> [ 15.675355] dump_stack_lvl+0x73/0xb0 [ 15.675387] print_report+0xd1/0x610 [ 15.675420] ? __virt_addr_valid+0x1db/0x2d0 [ 15.675444] ? kasan_atomics_helper+0xe78/0x5450 [ 15.675467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.675490] ? kasan_atomics_helper+0xe78/0x5450 [ 15.675514] kasan_report+0x141/0x180 [ 15.675536] ? kasan_atomics_helper+0xe78/0x5450 [ 15.675564] kasan_check_range+0x10c/0x1c0 [ 15.675613] __kasan_check_write+0x18/0x20 [ 15.675634] kasan_atomics_helper+0xe78/0x5450 [ 15.675657] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.675681] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.675708] ? kasan_atomics+0x152/0x310 [ 15.675737] kasan_atomics+0x1dc/0x310 [ 15.675761] ? __pfx_kasan_atomics+0x10/0x10 [ 15.675786] ? __pfx_read_tsc+0x10/0x10 [ 15.675809] ? ktime_get_ts64+0x86/0x230 [ 15.675838] kunit_try_run_case+0x1a5/0x480 [ 15.675865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.675890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.675917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.675944] ? __kthread_parkme+0x82/0x180 [ 15.675966] ? preempt_count_sub+0x50/0x80 [ 15.675992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.676018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.676044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.676069] kthread+0x337/0x6f0 [ 15.676090] ? trace_preempt_on+0x20/0xc0 [ 15.676117] ? __pfx_kthread+0x10/0x10 [ 15.676140] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.676163] ? calculate_sigpending+0x7b/0xa0 [ 15.676190] ? __pfx_kthread+0x10/0x10 [ 15.676213] ret_from_fork+0x116/0x1d0 [ 15.676233] ? __pfx_kthread+0x10/0x10 [ 15.676256] ret_from_fork_asm+0x1a/0x30 [ 15.676290] </TASK> [ 15.676302] [ 15.687485] Allocated by task 283: [ 15.687848] kasan_save_stack+0x45/0x70 [ 15.688031] kasan_save_track+0x18/0x40 [ 15.688232] kasan_save_alloc_info+0x3b/0x50 [ 15.688457] __kasan_kmalloc+0xb7/0xc0 [ 15.688919] __kmalloc_cache_noprof+0x189/0x420 [ 15.689115] kasan_atomics+0x95/0x310 [ 15.689540] kunit_try_run_case+0x1a5/0x480 [ 15.689775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.690185] kthread+0x337/0x6f0 [ 15.690449] ret_from_fork+0x116/0x1d0 [ 15.690757] ret_from_fork_asm+0x1a/0x30 [ 15.690936] [ 15.691215] The buggy address belongs to the object at ffff88810394df80 [ 15.691215] which belongs to the cache kmalloc-64 of size 64 [ 15.691844] The buggy address is located 0 bytes to the right of [ 15.691844] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.692477] [ 15.692616] The buggy address belongs to the physical page: [ 15.692862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.693212] flags: 0x200000000000000(node=0|zone=2) [ 15.693655] page_type: f5(slab) [ 15.693837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.694246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.694681] page dumped because: kasan: bad access detected [ 15.694996] [ 15.695075] Memory state around the buggy address: [ 15.695297] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.695777] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.696081] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.696378] ^ [ 15.696780] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.697156] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.697426] ================================================================== [ 16.021470] ================================================================== [ 16.022347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.023295] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.024110] [ 16.024290] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.024338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.024351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.024374] Call Trace: [ 16.024404] <TASK> [ 16.024423] dump_stack_lvl+0x73/0xb0 [ 16.024455] print_report+0xd1/0x610 [ 16.024478] ? __virt_addr_valid+0x1db/0x2d0 [ 16.024502] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.024525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.024549] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.024573] kasan_report+0x141/0x180 [ 16.024605] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.024635] kasan_check_range+0x10c/0x1c0 [ 16.024660] __kasan_check_write+0x18/0x20 [ 16.024684] kasan_atomics_helper+0x15b6/0x5450 [ 16.024730] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.024755] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.024796] ? kasan_atomics+0x152/0x310 [ 16.024840] kasan_atomics+0x1dc/0x310 [ 16.024877] ? __pfx_kasan_atomics+0x10/0x10 [ 16.024904] ? __pfx_read_tsc+0x10/0x10 [ 16.024927] ? ktime_get_ts64+0x86/0x230 [ 16.024968] kunit_try_run_case+0x1a5/0x480 [ 16.025008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.025033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.025073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.025113] ? __kthread_parkme+0x82/0x180 [ 16.025136] ? preempt_count_sub+0x50/0x80 [ 16.025162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.025189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.025214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.025240] kthread+0x337/0x6f0 [ 16.025261] ? trace_preempt_on+0x20/0xc0 [ 16.025286] ? __pfx_kthread+0x10/0x10 [ 16.025309] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.025332] ? calculate_sigpending+0x7b/0xa0 [ 16.025358] ? __pfx_kthread+0x10/0x10 [ 16.025382] ret_from_fork+0x116/0x1d0 [ 16.025413] ? __pfx_kthread+0x10/0x10 [ 16.025436] ret_from_fork_asm+0x1a/0x30 [ 16.025470] </TASK> [ 16.025481] [ 16.040016] Allocated by task 283: [ 16.040152] kasan_save_stack+0x45/0x70 [ 16.040300] kasan_save_track+0x18/0x40 [ 16.040446] kasan_save_alloc_info+0x3b/0x50 [ 16.040597] __kasan_kmalloc+0xb7/0xc0 [ 16.040814] __kmalloc_cache_noprof+0x189/0x420 [ 16.040972] kasan_atomics+0x95/0x310 [ 16.041165] kunit_try_run_case+0x1a5/0x480 [ 16.041381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.041623] kthread+0x337/0x6f0 [ 16.041842] ret_from_fork+0x116/0x1d0 [ 16.042011] ret_from_fork_asm+0x1a/0x30 [ 16.042213] [ 16.042309] The buggy address belongs to the object at ffff88810394df80 [ 16.042309] which belongs to the cache kmalloc-64 of size 64 [ 16.042794] The buggy address is located 0 bytes to the right of [ 16.042794] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.043193] [ 16.043289] The buggy address belongs to the physical page: [ 16.043576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.043944] flags: 0x200000000000000(node=0|zone=2) [ 16.044185] page_type: f5(slab) [ 16.044358] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.044752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.044978] page dumped because: kasan: bad access detected [ 16.045234] [ 16.045332] Memory state around the buggy address: [ 16.045606] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.045943] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.046207] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.046537] ^ [ 16.046805] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.047122] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.047362] ================================================================== [ 16.465413] ================================================================== [ 16.465797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.466146] Read of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.466372] [ 16.466471] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.466516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.466529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.466551] Call Trace: [ 16.466566] <TASK> [ 16.466581] dump_stack_lvl+0x73/0xb0 [ 16.466610] print_report+0xd1/0x610 [ 16.466634] ? __virt_addr_valid+0x1db/0x2d0 [ 16.466659] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.466682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.466707] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.466731] kasan_report+0x141/0x180 [ 16.466755] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.466784] __asan_report_load8_noabort+0x18/0x20 [ 16.466810] kasan_atomics_helper+0x4fb2/0x5450 [ 16.466834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.466858] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.466884] ? kasan_atomics+0x152/0x310 [ 16.466913] kasan_atomics+0x1dc/0x310 [ 16.466937] ? __pfx_kasan_atomics+0x10/0x10 [ 16.466962] ? __pfx_read_tsc+0x10/0x10 [ 16.466985] ? ktime_get_ts64+0x86/0x230 [ 16.467011] kunit_try_run_case+0x1a5/0x480 [ 16.467039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.467064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.467089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.467114] ? __kthread_parkme+0x82/0x180 [ 16.467137] ? preempt_count_sub+0x50/0x80 [ 16.467163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.467189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.467214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.467241] kthread+0x337/0x6f0 [ 16.467261] ? trace_preempt_on+0x20/0xc0 [ 16.467286] ? __pfx_kthread+0x10/0x10 [ 16.467308] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.467332] ? calculate_sigpending+0x7b/0xa0 [ 16.467357] ? __pfx_kthread+0x10/0x10 [ 16.467380] ret_from_fork+0x116/0x1d0 [ 16.467410] ? __pfx_kthread+0x10/0x10 [ 16.467433] ret_from_fork_asm+0x1a/0x30 [ 16.467468] </TASK> [ 16.467480] [ 16.474953] Allocated by task 283: [ 16.475131] kasan_save_stack+0x45/0x70 [ 16.475330] kasan_save_track+0x18/0x40 [ 16.475534] kasan_save_alloc_info+0x3b/0x50 [ 16.475957] __kasan_kmalloc+0xb7/0xc0 [ 16.476146] __kmalloc_cache_noprof+0x189/0x420 [ 16.476311] kasan_atomics+0x95/0x310 [ 16.476483] kunit_try_run_case+0x1a5/0x480 [ 16.476816] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.477049] kthread+0x337/0x6f0 [ 16.477174] ret_from_fork+0x116/0x1d0 [ 16.477312] ret_from_fork_asm+0x1a/0x30 [ 16.477466] [ 16.477540] The buggy address belongs to the object at ffff88810394df80 [ 16.477540] which belongs to the cache kmalloc-64 of size 64 [ 16.478150] The buggy address is located 0 bytes to the right of [ 16.478150] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.478711] [ 16.478811] The buggy address belongs to the physical page: [ 16.479070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.479486] flags: 0x200000000000000(node=0|zone=2) [ 16.479655] page_type: f5(slab) [ 16.479776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.480011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.480238] page dumped because: kasan: bad access detected [ 16.480422] [ 16.480495] Memory state around the buggy address: [ 16.480650] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.480878] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.481095] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.481375] ^ [ 16.481620] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.481937] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.482263] ================================================================== [ 16.113168] ================================================================== [ 16.113712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.113962] Write of size 8 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 16.114316] [ 16.114446] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.114490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.114504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.114527] Call Trace: [ 16.114546] <TASK> [ 16.114565] dump_stack_lvl+0x73/0xb0 [ 16.114595] print_report+0xd1/0x610 [ 16.114618] ? __virt_addr_valid+0x1db/0x2d0 [ 16.114643] ? kasan_atomics_helper+0x1818/0x5450 [ 16.114665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.114689] ? kasan_atomics_helper+0x1818/0x5450 [ 16.114713] kasan_report+0x141/0x180 [ 16.114736] ? kasan_atomics_helper+0x1818/0x5450 [ 16.114764] kasan_check_range+0x10c/0x1c0 [ 16.114790] __kasan_check_write+0x18/0x20 [ 16.114811] kasan_atomics_helper+0x1818/0x5450 [ 16.114836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.114860] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.114886] ? kasan_atomics+0x152/0x310 [ 16.114915] kasan_atomics+0x1dc/0x310 [ 16.114939] ? __pfx_kasan_atomics+0x10/0x10 [ 16.114965] ? __pfx_read_tsc+0x10/0x10 [ 16.114988] ? ktime_get_ts64+0x86/0x230 [ 16.115014] kunit_try_run_case+0x1a5/0x480 [ 16.115041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.115065] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.115091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.115116] ? __kthread_parkme+0x82/0x180 [ 16.115139] ? preempt_count_sub+0x50/0x80 [ 16.115164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.115191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.115216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.115242] kthread+0x337/0x6f0 [ 16.115262] ? trace_preempt_on+0x20/0xc0 [ 16.115287] ? __pfx_kthread+0x10/0x10 [ 16.115310] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.115332] ? calculate_sigpending+0x7b/0xa0 [ 16.115358] ? __pfx_kthread+0x10/0x10 [ 16.115381] ret_from_fork+0x116/0x1d0 [ 16.115413] ? __pfx_kthread+0x10/0x10 [ 16.115435] ret_from_fork_asm+0x1a/0x30 [ 16.115469] </TASK> [ 16.115481] [ 16.122937] Allocated by task 283: [ 16.123069] kasan_save_stack+0x45/0x70 [ 16.123222] kasan_save_track+0x18/0x40 [ 16.123449] kasan_save_alloc_info+0x3b/0x50 [ 16.123662] __kasan_kmalloc+0xb7/0xc0 [ 16.123986] __kmalloc_cache_noprof+0x189/0x420 [ 16.124208] kasan_atomics+0x95/0x310 [ 16.124405] kunit_try_run_case+0x1a5/0x480 [ 16.124612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.124866] kthread+0x337/0x6f0 [ 16.124991] ret_from_fork+0x116/0x1d0 [ 16.125126] ret_from_fork_asm+0x1a/0x30 [ 16.125269] [ 16.125374] The buggy address belongs to the object at ffff88810394df80 [ 16.125374] which belongs to the cache kmalloc-64 of size 64 [ 16.126353] The buggy address is located 0 bytes to the right of [ 16.126353] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 16.126866] [ 16.126972] The buggy address belongs to the physical page: [ 16.127200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 16.127474] flags: 0x200000000000000(node=0|zone=2) [ 16.127642] page_type: f5(slab) [ 16.127764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.127999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.128261] page dumped because: kasan: bad access detected [ 16.128522] [ 16.128618] Memory state around the buggy address: [ 16.128853] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.129169] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.129494] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.130017] ^ [ 16.130177] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.130406] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.130732] ================================================================== [ 15.600899] ================================================================== [ 15.601789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.602064] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.602410] [ 15.602522] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.602566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.602579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.602602] Call Trace: [ 15.602619] <TASK> [ 15.602635] dump_stack_lvl+0x73/0xb0 [ 15.602665] print_report+0xd1/0x610 [ 15.602688] ? __virt_addr_valid+0x1db/0x2d0 [ 15.602712] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.602736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.602759] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.602782] kasan_report+0x141/0x180 [ 15.602806] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.602835] __asan_report_load4_noabort+0x18/0x20 [ 15.602860] kasan_atomics_helper+0x4a84/0x5450 [ 15.602885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.602909] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.602935] ? kasan_atomics+0x152/0x310 [ 15.602964] kasan_atomics+0x1dc/0x310 [ 15.602988] ? __pfx_kasan_atomics+0x10/0x10 [ 15.603013] ? __pfx_read_tsc+0x10/0x10 [ 15.603036] ? ktime_get_ts64+0x86/0x230 [ 15.603063] kunit_try_run_case+0x1a5/0x480 [ 15.603089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.603116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.603141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.603168] ? __kthread_parkme+0x82/0x180 [ 15.603190] ? preempt_count_sub+0x50/0x80 [ 15.603215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.603242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.603279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.603305] kthread+0x337/0x6f0 [ 15.603326] ? trace_preempt_on+0x20/0xc0 [ 15.603363] ? __pfx_kthread+0x10/0x10 [ 15.603385] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.603417] ? calculate_sigpending+0x7b/0xa0 [ 15.603442] ? __pfx_kthread+0x10/0x10 [ 15.603466] ret_from_fork+0x116/0x1d0 [ 15.603486] ? __pfx_kthread+0x10/0x10 [ 15.603508] ret_from_fork_asm+0x1a/0x30 [ 15.603541] </TASK> [ 15.603553] [ 15.611132] Allocated by task 283: [ 15.611313] kasan_save_stack+0x45/0x70 [ 15.611525] kasan_save_track+0x18/0x40 [ 15.611740] kasan_save_alloc_info+0x3b/0x50 [ 15.611945] __kasan_kmalloc+0xb7/0xc0 [ 15.612154] __kmalloc_cache_noprof+0x189/0x420 [ 15.612313] kasan_atomics+0x95/0x310 [ 15.612459] kunit_try_run_case+0x1a5/0x480 [ 15.612609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.612843] kthread+0x337/0x6f0 [ 15.613017] ret_from_fork+0x116/0x1d0 [ 15.613234] ret_from_fork_asm+0x1a/0x30 [ 15.613468] [ 15.613583] The buggy address belongs to the object at ffff88810394df80 [ 15.613583] which belongs to the cache kmalloc-64 of size 64 [ 15.614254] The buggy address is located 0 bytes to the right of [ 15.614254] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.614873] [ 15.614996] The buggy address belongs to the physical page: [ 15.615195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.615522] flags: 0x200000000000000(node=0|zone=2) [ 15.615929] page_type: f5(slab) [ 15.616094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.616433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.616783] page dumped because: kasan: bad access detected [ 15.617026] [ 15.617120] Memory state around the buggy address: [ 15.617341] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.617714] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.618006] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.618291] ^ [ 15.618539] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.618839] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.619055] ================================================================== [ 15.514188] ================================================================== [ 15.514567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.514917] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.515328] [ 15.515466] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.515526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.515540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.515563] Call Trace: [ 15.515577] <TASK> [ 15.515595] dump_stack_lvl+0x73/0xb0 [ 15.515625] print_report+0xd1/0x610 [ 15.515662] ? __virt_addr_valid+0x1db/0x2d0 [ 15.515686] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.515708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.515731] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.515755] kasan_report+0x141/0x180 [ 15.515778] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.515806] kasan_check_range+0x10c/0x1c0 [ 15.515830] __kasan_check_write+0x18/0x20 [ 15.515850] kasan_atomics_helper+0xa2b/0x5450 [ 15.515874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.515898] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.515925] ? kasan_atomics+0x152/0x310 [ 15.515985] kasan_atomics+0x1dc/0x310 [ 15.516010] ? __pfx_kasan_atomics+0x10/0x10 [ 15.516061] ? __pfx_read_tsc+0x10/0x10 [ 15.516085] ? ktime_get_ts64+0x86/0x230 [ 15.516113] kunit_try_run_case+0x1a5/0x480 [ 15.516151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.516176] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.516201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.516226] ? __kthread_parkme+0x82/0x180 [ 15.516248] ? preempt_count_sub+0x50/0x80 [ 15.516275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.516300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.516325] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.516378] kthread+0x337/0x6f0 [ 15.516415] ? trace_preempt_on+0x20/0xc0 [ 15.516467] ? __pfx_kthread+0x10/0x10 [ 15.516490] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.516514] ? calculate_sigpending+0x7b/0xa0 [ 15.516550] ? __pfx_kthread+0x10/0x10 [ 15.516573] ret_from_fork+0x116/0x1d0 [ 15.516603] ? __pfx_kthread+0x10/0x10 [ 15.516625] ret_from_fork_asm+0x1a/0x30 [ 15.516659] </TASK> [ 15.516675] [ 15.524843] Allocated by task 283: [ 15.525056] kasan_save_stack+0x45/0x70 [ 15.525240] kasan_save_track+0x18/0x40 [ 15.525380] kasan_save_alloc_info+0x3b/0x50 [ 15.525628] __kasan_kmalloc+0xb7/0xc0 [ 15.525847] __kmalloc_cache_noprof+0x189/0x420 [ 15.526036] kasan_atomics+0x95/0x310 [ 15.526175] kunit_try_run_case+0x1a5/0x480 [ 15.526431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.526718] kthread+0x337/0x6f0 [ 15.526872] ret_from_fork+0x116/0x1d0 [ 15.527057] ret_from_fork_asm+0x1a/0x30 [ 15.527240] [ 15.527330] The buggy address belongs to the object at ffff88810394df80 [ 15.527330] which belongs to the cache kmalloc-64 of size 64 [ 15.527863] The buggy address is located 0 bytes to the right of [ 15.527863] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.528413] [ 15.528528] The buggy address belongs to the physical page: [ 15.528813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.529151] flags: 0x200000000000000(node=0|zone=2) [ 15.529442] page_type: f5(slab) [ 15.529727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.529991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.530315] page dumped because: kasan: bad access detected [ 15.530550] [ 15.530715] Memory state around the buggy address: [ 15.530946] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.531171] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.531489] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.531819] ^ [ 15.532045] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.532283] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532510] ================================================================== [ 15.117011] ================================================================== [ 15.117981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.118529] Read of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.119129] [ 15.119410] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.119463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.119477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.119498] Call Trace: [ 15.119512] <TASK> [ 15.119530] dump_stack_lvl+0x73/0xb0 [ 15.119562] print_report+0xd1/0x610 [ 15.119586] ? __virt_addr_valid+0x1db/0x2d0 [ 15.119610] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.119632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.119654] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.119676] kasan_report+0x141/0x180 [ 15.119698] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.119726] __asan_report_load4_noabort+0x18/0x20 [ 15.119749] kasan_atomics_helper+0x4bbc/0x5450 [ 15.119772] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.119795] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.119820] ? kasan_atomics+0x152/0x310 [ 15.119847] kasan_atomics+0x1dc/0x310 [ 15.119871] ? __pfx_kasan_atomics+0x10/0x10 [ 15.119894] ? __pfx_read_tsc+0x10/0x10 [ 15.119915] ? ktime_get_ts64+0x86/0x230 [ 15.119941] kunit_try_run_case+0x1a5/0x480 [ 15.119968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.119992] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.120016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.120040] ? __kthread_parkme+0x82/0x180 [ 15.120061] ? preempt_count_sub+0x50/0x80 [ 15.120086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.120111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.120137] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.120162] kthread+0x337/0x6f0 [ 15.120206] ? trace_preempt_on+0x20/0xc0 [ 15.120230] ? __pfx_kthread+0x10/0x10 [ 15.120252] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.120273] ? calculate_sigpending+0x7b/0xa0 [ 15.120298] ? __pfx_kthread+0x10/0x10 [ 15.120320] ret_from_fork+0x116/0x1d0 [ 15.120339] ? __pfx_kthread+0x10/0x10 [ 15.120360] ret_from_fork_asm+0x1a/0x30 [ 15.120403] </TASK> [ 15.120415] [ 15.129205] Allocated by task 283: [ 15.129340] kasan_save_stack+0x45/0x70 [ 15.129496] kasan_save_track+0x18/0x40 [ 15.129749] kasan_save_alloc_info+0x3b/0x50 [ 15.129960] __kasan_kmalloc+0xb7/0xc0 [ 15.130284] __kmalloc_cache_noprof+0x189/0x420 [ 15.130526] kasan_atomics+0x95/0x310 [ 15.130673] kunit_try_run_case+0x1a5/0x480 [ 15.130823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.131154] kthread+0x337/0x6f0 [ 15.131325] ret_from_fork+0x116/0x1d0 [ 15.131524] ret_from_fork_asm+0x1a/0x30 [ 15.131803] [ 15.131915] The buggy address belongs to the object at ffff88810394df80 [ 15.131915] which belongs to the cache kmalloc-64 of size 64 [ 15.132600] The buggy address is located 0 bytes to the right of [ 15.132600] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.133139] [ 15.133243] The buggy address belongs to the physical page: [ 15.133722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.134003] flags: 0x200000000000000(node=0|zone=2) [ 15.134251] page_type: f5(slab) [ 15.134415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.134657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.135085] page dumped because: kasan: bad access detected [ 15.135355] [ 15.135475] Memory state around the buggy address: [ 15.135830] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.136060] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.136572] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.136876] ^ [ 15.137137] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.137519] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.137839] ================================================================== [ 15.443569] ================================================================== [ 15.443905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.444339] Write of size 4 at addr ffff88810394dfb0 by task kunit_try_catch/283 [ 15.444750] [ 15.444906] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.444951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.444964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.444987] Call Trace: [ 15.445004] <TASK> [ 15.445022] dump_stack_lvl+0x73/0xb0 [ 15.445088] print_report+0xd1/0x610 [ 15.445113] ? __virt_addr_valid+0x1db/0x2d0 [ 15.445137] ? kasan_atomics_helper+0x860/0x5450 [ 15.445159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.445183] ? kasan_atomics_helper+0x860/0x5450 [ 15.445234] kasan_report+0x141/0x180 [ 15.445259] ? kasan_atomics_helper+0x860/0x5450 [ 15.445287] kasan_check_range+0x10c/0x1c0 [ 15.445312] __kasan_check_write+0x18/0x20 [ 15.445333] kasan_atomics_helper+0x860/0x5450 [ 15.445357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.445380] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.445421] ? kasan_atomics+0x152/0x310 [ 15.445481] kasan_atomics+0x1dc/0x310 [ 15.445507] ? __pfx_kasan_atomics+0x10/0x10 [ 15.445532] ? __pfx_read_tsc+0x10/0x10 [ 15.445555] ? ktime_get_ts64+0x86/0x230 [ 15.445582] kunit_try_run_case+0x1a5/0x480 [ 15.445610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.445676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.445702] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.445727] ? __kthread_parkme+0x82/0x180 [ 15.445749] ? preempt_count_sub+0x50/0x80 [ 15.445805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.445832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.445883] kthread+0x337/0x6f0 [ 15.445904] ? trace_preempt_on+0x20/0xc0 [ 15.445956] ? __pfx_kthread+0x10/0x10 [ 15.445980] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.446003] ? calculate_sigpending+0x7b/0xa0 [ 15.446029] ? __pfx_kthread+0x10/0x10 [ 15.446052] ret_from_fork+0x116/0x1d0 [ 15.446072] ? __pfx_kthread+0x10/0x10 [ 15.446094] ret_from_fork_asm+0x1a/0x30 [ 15.446176] </TASK> [ 15.446188] [ 15.454872] Allocated by task 283: [ 15.455002] kasan_save_stack+0x45/0x70 [ 15.455146] kasan_save_track+0x18/0x40 [ 15.455543] kasan_save_alloc_info+0x3b/0x50 [ 15.455760] __kasan_kmalloc+0xb7/0xc0 [ 15.456004] __kmalloc_cache_noprof+0x189/0x420 [ 15.456232] kasan_atomics+0x95/0x310 [ 15.456377] kunit_try_run_case+0x1a5/0x480 [ 15.456598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.456868] kthread+0x337/0x6f0 [ 15.456991] ret_from_fork+0x116/0x1d0 [ 15.457123] ret_from_fork_asm+0x1a/0x30 [ 15.457421] [ 15.457576] The buggy address belongs to the object at ffff88810394df80 [ 15.457576] which belongs to the cache kmalloc-64 of size 64 [ 15.458224] The buggy address is located 0 bytes to the right of [ 15.458224] allocated 48-byte region [ffff88810394df80, ffff88810394dfb0) [ 15.458878] [ 15.458980] The buggy address belongs to the physical page: [ 15.459286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10394d [ 15.459674] flags: 0x200000000000000(node=0|zone=2) [ 15.459840] page_type: f5(slab) [ 15.460014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.460508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.460904] page dumped because: kasan: bad access detected [ 15.461157] [ 15.461282] Memory state around the buggy address: [ 15.461464] ffff88810394de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.461813] ffff88810394df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.462190] >ffff88810394df80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.462689] ^ [ 15.462947] ffff88810394e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.463388] ffff88810394e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463734] ==================================================================
[ 16.016244] ================================================================== [ 16.016994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 16.017343] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.017670] [ 16.017779] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.017823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.017837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.017860] Call Trace: [ 16.017876] <TASK> [ 16.017891] dump_stack_lvl+0x73/0xb0 [ 16.017918] print_report+0xd1/0x610 [ 16.017941] ? __virt_addr_valid+0x1db/0x2d0 [ 16.017964] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.017987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.018010] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.018033] kasan_report+0x141/0x180 [ 16.018056] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.018083] kasan_check_range+0x10c/0x1c0 [ 16.018108] __kasan_check_read+0x15/0x20 [ 16.018128] kasan_atomics_helper+0x13b5/0x5450 [ 16.018162] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.018185] ? kasan_save_alloc_info+0x3b/0x50 [ 16.018209] ? kasan_save_stack+0x45/0x70 [ 16.018233] kasan_atomics+0x1dc/0x310 [ 16.018257] ? __pfx_kasan_atomics+0x10/0x10 [ 16.018281] ? __pfx_read_tsc+0x10/0x10 [ 16.018303] ? ktime_get_ts64+0x86/0x230 [ 16.018327] kunit_try_run_case+0x1a5/0x480 [ 16.018352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.018375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.018400] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.018424] ? __kthread_parkme+0x82/0x180 [ 16.018445] ? preempt_count_sub+0x50/0x80 [ 16.018469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.018494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.018518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.018543] kthread+0x337/0x6f0 [ 16.018572] ? trace_preempt_on+0x20/0xc0 [ 16.018595] ? __pfx_kthread+0x10/0x10 [ 16.018617] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.018639] ? calculate_sigpending+0x7b/0xa0 [ 16.018664] ? __pfx_kthread+0x10/0x10 [ 16.018686] ret_from_fork+0x116/0x1d0 [ 16.018705] ? __pfx_kthread+0x10/0x10 [ 16.018726] ret_from_fork_asm+0x1a/0x30 [ 16.018758] </TASK> [ 16.018769] [ 16.025978] Allocated by task 283: [ 16.026137] kasan_save_stack+0x45/0x70 [ 16.026389] kasan_save_track+0x18/0x40 [ 16.026587] kasan_save_alloc_info+0x3b/0x50 [ 16.026805] __kasan_kmalloc+0xb7/0xc0 [ 16.026996] __kmalloc_cache_noprof+0x189/0x420 [ 16.027235] kasan_atomics+0x95/0x310 [ 16.027561] kunit_try_run_case+0x1a5/0x480 [ 16.027774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.028002] kthread+0x337/0x6f0 [ 16.028161] ret_from_fork+0x116/0x1d0 [ 16.028375] ret_from_fork_asm+0x1a/0x30 [ 16.028560] [ 16.028649] The buggy address belongs to the object at ffff8881027c5180 [ 16.028649] which belongs to the cache kmalloc-64 of size 64 [ 16.029100] The buggy address is located 0 bytes to the right of [ 16.029100] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.029657] [ 16.029750] The buggy address belongs to the physical page: [ 16.029983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.030307] flags: 0x200000000000000(node=0|zone=2) [ 16.030524] page_type: f5(slab) [ 16.030694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.030978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.031301] page dumped because: kasan: bad access detected [ 16.031523] [ 16.031620] Memory state around the buggy address: [ 16.031816] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.032099] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.032470] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.032761] ^ [ 16.032969] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.033243] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.033613] ================================================================== [ 15.435336] ================================================================== [ 15.435810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.436450] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.436842] [ 15.437057] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.437105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.437121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.437156] Call Trace: [ 15.437173] <TASK> [ 15.437189] dump_stack_lvl+0x73/0xb0 [ 15.437218] print_report+0xd1/0x610 [ 15.437360] ? __virt_addr_valid+0x1db/0x2d0 [ 15.437392] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.437414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.437437] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.437459] kasan_report+0x141/0x180 [ 15.437482] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.437509] kasan_check_range+0x10c/0x1c0 [ 15.437533] __kasan_check_write+0x18/0x20 [ 15.437564] kasan_atomics_helper+0x5fe/0x5450 [ 15.437587] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.437706] ? kasan_save_alloc_info+0x3b/0x50 [ 15.437731] ? kasan_save_stack+0x45/0x70 [ 15.437755] kasan_atomics+0x1dc/0x310 [ 15.437779] ? __pfx_kasan_atomics+0x10/0x10 [ 15.437803] ? __pfx_read_tsc+0x10/0x10 [ 15.437824] ? ktime_get_ts64+0x86/0x230 [ 15.437849] kunit_try_run_case+0x1a5/0x480 [ 15.437877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.437901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.437925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.437949] ? __kthread_parkme+0x82/0x180 [ 15.437970] ? preempt_count_sub+0x50/0x80 [ 15.437994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.438019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.438043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.438068] kthread+0x337/0x6f0 [ 15.438087] ? trace_preempt_on+0x20/0xc0 [ 15.438111] ? __pfx_kthread+0x10/0x10 [ 15.438133] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.438166] ? calculate_sigpending+0x7b/0xa0 [ 15.438191] ? __pfx_kthread+0x10/0x10 [ 15.438213] ret_from_fork+0x116/0x1d0 [ 15.438233] ? __pfx_kthread+0x10/0x10 [ 15.438254] ret_from_fork_asm+0x1a/0x30 [ 15.438285] </TASK> [ 15.438296] [ 15.448482] Allocated by task 283: [ 15.448773] kasan_save_stack+0x45/0x70 [ 15.449088] kasan_save_track+0x18/0x40 [ 15.449272] kasan_save_alloc_info+0x3b/0x50 [ 15.449726] __kasan_kmalloc+0xb7/0xc0 [ 15.449994] __kmalloc_cache_noprof+0x189/0x420 [ 15.450172] kasan_atomics+0x95/0x310 [ 15.450373] kunit_try_run_case+0x1a5/0x480 [ 15.450663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.450862] kthread+0x337/0x6f0 [ 15.451282] ret_from_fork+0x116/0x1d0 [ 15.451538] ret_from_fork_asm+0x1a/0x30 [ 15.451775] [ 15.451911] The buggy address belongs to the object at ffff8881027c5180 [ 15.451911] which belongs to the cache kmalloc-64 of size 64 [ 15.452578] The buggy address is located 0 bytes to the right of [ 15.452578] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.453209] [ 15.453315] The buggy address belongs to the physical page: [ 15.453547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.454004] flags: 0x200000000000000(node=0|zone=2) [ 15.454364] page_type: f5(slab) [ 15.454510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.454979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.455438] page dumped because: kasan: bad access detected [ 15.455760] [ 15.455832] Memory state around the buggy address: [ 15.456227] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.456778] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.457205] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.457510] ^ [ 15.457857] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.458231] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.458696] ================================================================== [ 15.550763] ================================================================== [ 15.551454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.552138] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.552504] [ 15.552618] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.552663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.552677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.552700] Call Trace: [ 15.552720] <TASK> [ 15.552756] dump_stack_lvl+0x73/0xb0 [ 15.552787] print_report+0xd1/0x610 [ 15.552825] ? __virt_addr_valid+0x1db/0x2d0 [ 15.552849] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.552871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.552895] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.552917] kasan_report+0x141/0x180 [ 15.552940] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.552967] kasan_check_range+0x10c/0x1c0 [ 15.552992] __kasan_check_write+0x18/0x20 [ 15.553012] kasan_atomics_helper+0x8f9/0x5450 [ 15.553035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.553120] ? kasan_save_alloc_info+0x3b/0x50 [ 15.553178] ? kasan_save_stack+0x45/0x70 [ 15.553204] kasan_atomics+0x1dc/0x310 [ 15.553227] ? __pfx_kasan_atomics+0x10/0x10 [ 15.553252] ? __pfx_read_tsc+0x10/0x10 [ 15.553276] ? ktime_get_ts64+0x86/0x230 [ 15.553301] kunit_try_run_case+0x1a5/0x480 [ 15.553326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.553350] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.553376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.553399] ? __kthread_parkme+0x82/0x180 [ 15.553421] ? preempt_count_sub+0x50/0x80 [ 15.553464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.553489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.553513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.553538] kthread+0x337/0x6f0 [ 15.553558] ? trace_preempt_on+0x20/0xc0 [ 15.553583] ? __pfx_kthread+0x10/0x10 [ 15.553604] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.553626] ? calculate_sigpending+0x7b/0xa0 [ 15.553668] ? __pfx_kthread+0x10/0x10 [ 15.553690] ret_from_fork+0x116/0x1d0 [ 15.553710] ? __pfx_kthread+0x10/0x10 [ 15.553731] ret_from_fork_asm+0x1a/0x30 [ 15.553780] </TASK> [ 15.553791] [ 15.562705] Allocated by task 283: [ 15.562895] kasan_save_stack+0x45/0x70 [ 15.563098] kasan_save_track+0x18/0x40 [ 15.563343] kasan_save_alloc_info+0x3b/0x50 [ 15.563619] __kasan_kmalloc+0xb7/0xc0 [ 15.563834] __kmalloc_cache_noprof+0x189/0x420 [ 15.564347] kasan_atomics+0x95/0x310 [ 15.564710] kunit_try_run_case+0x1a5/0x480 [ 15.564922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.565440] kthread+0x337/0x6f0 [ 15.565618] ret_from_fork+0x116/0x1d0 [ 15.565808] ret_from_fork_asm+0x1a/0x30 [ 15.566242] [ 15.566366] The buggy address belongs to the object at ffff8881027c5180 [ 15.566366] which belongs to the cache kmalloc-64 of size 64 [ 15.566752] The buggy address is located 0 bytes to the right of [ 15.566752] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.567606] [ 15.567714] The buggy address belongs to the physical page: [ 15.568032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.568417] flags: 0x200000000000000(node=0|zone=2) [ 15.568665] page_type: f5(slab) [ 15.568838] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.569366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.569697] page dumped because: kasan: bad access detected [ 15.570029] [ 15.570107] Memory state around the buggy address: [ 15.570347] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.570645] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.570946] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.571342] ^ [ 15.571638] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.572006] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.572232] ================================================================== [ 15.530767] ================================================================== [ 15.531018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.531706] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.532016] [ 15.532279] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.532331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.532346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.532370] Call Trace: [ 15.532388] <TASK> [ 15.532404] dump_stack_lvl+0x73/0xb0 [ 15.532436] print_report+0xd1/0x610 [ 15.532459] ? __virt_addr_valid+0x1db/0x2d0 [ 15.532483] ? kasan_atomics_helper+0x860/0x5450 [ 15.532506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.532530] ? kasan_atomics_helper+0x860/0x5450 [ 15.532552] kasan_report+0x141/0x180 [ 15.532575] ? kasan_atomics_helper+0x860/0x5450 [ 15.532602] kasan_check_range+0x10c/0x1c0 [ 15.532627] __kasan_check_write+0x18/0x20 [ 15.532647] kasan_atomics_helper+0x860/0x5450 [ 15.532669] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.532693] ? kasan_save_alloc_info+0x3b/0x50 [ 15.532717] ? kasan_save_stack+0x45/0x70 [ 15.532741] kasan_atomics+0x1dc/0x310 [ 15.532766] ? __pfx_kasan_atomics+0x10/0x10 [ 15.532790] ? __pfx_read_tsc+0x10/0x10 [ 15.532813] ? ktime_get_ts64+0x86/0x230 [ 15.532838] kunit_try_run_case+0x1a5/0x480 [ 15.532915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.532940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.532965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.532989] ? __kthread_parkme+0x82/0x180 [ 15.533010] ? preempt_count_sub+0x50/0x80 [ 15.533035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.533061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.533085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.533110] kthread+0x337/0x6f0 [ 15.533129] ? trace_preempt_on+0x20/0xc0 [ 15.533165] ? __pfx_kthread+0x10/0x10 [ 15.533186] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.533209] ? calculate_sigpending+0x7b/0xa0 [ 15.533234] ? __pfx_kthread+0x10/0x10 [ 15.533255] ret_from_fork+0x116/0x1d0 [ 15.533275] ? __pfx_kthread+0x10/0x10 [ 15.533296] ret_from_fork_asm+0x1a/0x30 [ 15.533329] </TASK> [ 15.533341] [ 15.541456] Allocated by task 283: [ 15.541600] kasan_save_stack+0x45/0x70 [ 15.541752] kasan_save_track+0x18/0x40 [ 15.542092] kasan_save_alloc_info+0x3b/0x50 [ 15.542318] __kasan_kmalloc+0xb7/0xc0 [ 15.542600] __kmalloc_cache_noprof+0x189/0x420 [ 15.542836] kasan_atomics+0x95/0x310 [ 15.543079] kunit_try_run_case+0x1a5/0x480 [ 15.543309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.543601] kthread+0x337/0x6f0 [ 15.543746] ret_from_fork+0x116/0x1d0 [ 15.543931] ret_from_fork_asm+0x1a/0x30 [ 15.544126] [ 15.544293] The buggy address belongs to the object at ffff8881027c5180 [ 15.544293] which belongs to the cache kmalloc-64 of size 64 [ 15.544822] The buggy address is located 0 bytes to the right of [ 15.544822] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.545252] [ 15.545342] The buggy address belongs to the physical page: [ 15.545600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.546151] flags: 0x200000000000000(node=0|zone=2) [ 15.546598] page_type: f5(slab) [ 15.546744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.547312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.547613] page dumped because: kasan: bad access detected [ 15.547805] [ 15.547989] Memory state around the buggy address: [ 15.548234] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.548607] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.548932] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.549302] ^ [ 15.549540] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.549852] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.550376] ================================================================== [ 15.573285] ================================================================== [ 15.573602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.573829] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.574194] [ 15.574309] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.574425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.574439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.574463] Call Trace: [ 15.574482] <TASK> [ 15.574500] dump_stack_lvl+0x73/0xb0 [ 15.574530] print_report+0xd1/0x610 [ 15.574573] ? __virt_addr_valid+0x1db/0x2d0 [ 15.574611] ? kasan_atomics_helper+0x992/0x5450 [ 15.574633] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.574670] ? kasan_atomics_helper+0x992/0x5450 [ 15.574706] kasan_report+0x141/0x180 [ 15.574742] ? kasan_atomics_helper+0x992/0x5450 [ 15.574785] kasan_check_range+0x10c/0x1c0 [ 15.574810] __kasan_check_write+0x18/0x20 [ 15.574844] kasan_atomics_helper+0x992/0x5450 [ 15.574909] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.574933] ? kasan_save_alloc_info+0x3b/0x50 [ 15.574958] ? kasan_save_stack+0x45/0x70 [ 15.574982] kasan_atomics+0x1dc/0x310 [ 15.575006] ? __pfx_kasan_atomics+0x10/0x10 [ 15.575031] ? __pfx_read_tsc+0x10/0x10 [ 15.575053] ? ktime_get_ts64+0x86/0x230 [ 15.575079] kunit_try_run_case+0x1a5/0x480 [ 15.575105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.575128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.575163] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.575187] ? __kthread_parkme+0x82/0x180 [ 15.575208] ? preempt_count_sub+0x50/0x80 [ 15.575233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.575258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.575282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.575306] kthread+0x337/0x6f0 [ 15.575327] ? trace_preempt_on+0x20/0xc0 [ 15.575350] ? __pfx_kthread+0x10/0x10 [ 15.575371] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.575416] ? calculate_sigpending+0x7b/0xa0 [ 15.575441] ? __pfx_kthread+0x10/0x10 [ 15.575463] ret_from_fork+0x116/0x1d0 [ 15.575499] ? __pfx_kthread+0x10/0x10 [ 15.575521] ret_from_fork_asm+0x1a/0x30 [ 15.575552] </TASK> [ 15.575578] [ 15.584132] Allocated by task 283: [ 15.584356] kasan_save_stack+0x45/0x70 [ 15.584570] kasan_save_track+0x18/0x40 [ 15.584763] kasan_save_alloc_info+0x3b/0x50 [ 15.584980] __kasan_kmalloc+0xb7/0xc0 [ 15.585175] __kmalloc_cache_noprof+0x189/0x420 [ 15.585502] kasan_atomics+0x95/0x310 [ 15.585693] kunit_try_run_case+0x1a5/0x480 [ 15.585961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.586184] kthread+0x337/0x6f0 [ 15.586306] ret_from_fork+0x116/0x1d0 [ 15.586438] ret_from_fork_asm+0x1a/0x30 [ 15.586576] [ 15.586650] The buggy address belongs to the object at ffff8881027c5180 [ 15.586650] which belongs to the cache kmalloc-64 of size 64 [ 15.587121] The buggy address is located 0 bytes to the right of [ 15.587121] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.587674] [ 15.587907] The buggy address belongs to the physical page: [ 15.588094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.588629] flags: 0x200000000000000(node=0|zone=2) [ 15.588799] page_type: f5(slab) [ 15.589123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.589509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.589785] page dumped because: kasan: bad access detected [ 15.590331] [ 15.590537] Memory state around the buggy address: [ 15.590747] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.591308] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.591547] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.591763] ^ [ 15.592141] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.592614] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.593052] ================================================================== [ 15.817769] ================================================================== [ 15.818383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.818750] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.819062] [ 15.819164] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.819209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.819224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.819247] Call Trace: [ 15.819264] <TASK> [ 15.819280] dump_stack_lvl+0x73/0xb0 [ 15.819309] print_report+0xd1/0x610 [ 15.819332] ? __virt_addr_valid+0x1db/0x2d0 [ 15.819355] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.819703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.819739] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.819763] kasan_report+0x141/0x180 [ 15.819786] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.819812] __asan_report_load4_noabort+0x18/0x20 [ 15.819837] kasan_atomics_helper+0x4a36/0x5450 [ 15.819861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.819885] ? kasan_save_alloc_info+0x3b/0x50 [ 15.819909] ? kasan_save_stack+0x45/0x70 [ 15.819933] kasan_atomics+0x1dc/0x310 [ 15.819956] ? __pfx_kasan_atomics+0x10/0x10 [ 15.819993] ? __pfx_read_tsc+0x10/0x10 [ 15.820014] ? ktime_get_ts64+0x86/0x230 [ 15.820038] kunit_try_run_case+0x1a5/0x480 [ 15.820063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.820226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.820251] ? __kthread_parkme+0x82/0x180 [ 15.820273] ? preempt_count_sub+0x50/0x80 [ 15.820297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.820352] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.820376] kthread+0x337/0x6f0 [ 15.820409] ? trace_preempt_on+0x20/0xc0 [ 15.820434] ? __pfx_kthread+0x10/0x10 [ 15.820456] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.820479] ? calculate_sigpending+0x7b/0xa0 [ 15.820503] ? __pfx_kthread+0x10/0x10 [ 15.820526] ret_from_fork+0x116/0x1d0 [ 15.820545] ? __pfx_kthread+0x10/0x10 [ 15.820566] ret_from_fork_asm+0x1a/0x30 [ 15.820598] </TASK> [ 15.820609] [ 15.831330] Allocated by task 283: [ 15.831805] kasan_save_stack+0x45/0x70 [ 15.832063] kasan_save_track+0x18/0x40 [ 15.832384] kasan_save_alloc_info+0x3b/0x50 [ 15.832825] __kasan_kmalloc+0xb7/0xc0 [ 15.833011] __kmalloc_cache_noprof+0x189/0x420 [ 15.833358] kasan_atomics+0x95/0x310 [ 15.833507] kunit_try_run_case+0x1a5/0x480 [ 15.833729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.833949] kthread+0x337/0x6f0 [ 15.834419] ret_from_fork+0x116/0x1d0 [ 15.834692] ret_from_fork_asm+0x1a/0x30 [ 15.834845] [ 15.834966] The buggy address belongs to the object at ffff8881027c5180 [ 15.834966] which belongs to the cache kmalloc-64 of size 64 [ 15.835674] The buggy address is located 0 bytes to the right of [ 15.835674] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.836581] [ 15.836852] The buggy address belongs to the physical page: [ 15.837172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.837727] flags: 0x200000000000000(node=0|zone=2) [ 15.838105] page_type: f5(slab) [ 15.838298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.838578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.838920] page dumped because: kasan: bad access detected [ 15.839194] [ 15.839272] Memory state around the buggy address: [ 15.839954] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840447] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840820] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.841338] ^ [ 15.841641] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842017] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842466] ================================================================== [ 16.300872] ================================================================== [ 16.301166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.301808] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.302192] [ 16.302327] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.302376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.302390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.302414] Call Trace: [ 16.302434] <TASK> [ 16.302452] dump_stack_lvl+0x73/0xb0 [ 16.302484] print_report+0xd1/0x610 [ 16.302507] ? __virt_addr_valid+0x1db/0x2d0 [ 16.302530] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.302553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.302577] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.302599] kasan_report+0x141/0x180 [ 16.302622] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.302649] kasan_check_range+0x10c/0x1c0 [ 16.302673] __kasan_check_write+0x18/0x20 [ 16.302694] kasan_atomics_helper+0x1b22/0x5450 [ 16.302718] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.302742] ? kasan_save_alloc_info+0x3b/0x50 [ 16.302766] ? kasan_save_stack+0x45/0x70 [ 16.302791] kasan_atomics+0x1dc/0x310 [ 16.302814] ? __pfx_kasan_atomics+0x10/0x10 [ 16.302838] ? __pfx_read_tsc+0x10/0x10 [ 16.302861] ? ktime_get_ts64+0x86/0x230 [ 16.302897] kunit_try_run_case+0x1a5/0x480 [ 16.302922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.302946] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.302990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.303014] ? __kthread_parkme+0x82/0x180 [ 16.303035] ? preempt_count_sub+0x50/0x80 [ 16.303070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.303095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.303119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.303151] kthread+0x337/0x6f0 [ 16.303172] ? trace_preempt_on+0x20/0xc0 [ 16.303196] ? __pfx_kthread+0x10/0x10 [ 16.303218] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.303240] ? calculate_sigpending+0x7b/0xa0 [ 16.303264] ? __pfx_kthread+0x10/0x10 [ 16.303286] ret_from_fork+0x116/0x1d0 [ 16.303324] ? __pfx_kthread+0x10/0x10 [ 16.303346] ret_from_fork_asm+0x1a/0x30 [ 16.303377] </TASK> [ 16.303388] [ 16.311196] Allocated by task 283: [ 16.311412] kasan_save_stack+0x45/0x70 [ 16.311588] kasan_save_track+0x18/0x40 [ 16.311728] kasan_save_alloc_info+0x3b/0x50 [ 16.311880] __kasan_kmalloc+0xb7/0xc0 [ 16.312024] __kmalloc_cache_noprof+0x189/0x420 [ 16.312288] kasan_atomics+0x95/0x310 [ 16.312505] kunit_try_run_case+0x1a5/0x480 [ 16.312740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.312998] kthread+0x337/0x6f0 [ 16.313196] ret_from_fork+0x116/0x1d0 [ 16.313397] ret_from_fork_asm+0x1a/0x30 [ 16.313600] [ 16.313700] The buggy address belongs to the object at ffff8881027c5180 [ 16.313700] which belongs to the cache kmalloc-64 of size 64 [ 16.314196] The buggy address is located 0 bytes to the right of [ 16.314196] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.314762] [ 16.314863] The buggy address belongs to the physical page: [ 16.315106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.315495] flags: 0x200000000000000(node=0|zone=2) [ 16.315675] page_type: f5(slab) [ 16.315802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.316038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.316281] page dumped because: kasan: bad access detected [ 16.316481] [ 16.316554] Memory state around the buggy address: [ 16.316746] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.317082] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.317443] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.317766] ^ [ 16.317997] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.318372] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.318699] ================================================================== [ 16.524292] ================================================================== [ 16.524600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.524953] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.525664] [ 16.525964] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.526016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.526030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.526218] Call Trace: [ 16.526240] <TASK> [ 16.526257] dump_stack_lvl+0x73/0xb0 [ 16.526287] print_report+0xd1/0x610 [ 16.526310] ? __virt_addr_valid+0x1db/0x2d0 [ 16.526334] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.526355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.526378] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.526401] kasan_report+0x141/0x180 [ 16.526424] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.526451] __asan_report_load8_noabort+0x18/0x20 [ 16.526476] kasan_atomics_helper+0x4f98/0x5450 [ 16.526510] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.526535] ? kasan_save_alloc_info+0x3b/0x50 [ 16.526558] ? kasan_save_stack+0x45/0x70 [ 16.526596] kasan_atomics+0x1dc/0x310 [ 16.526620] ? __pfx_kasan_atomics+0x10/0x10 [ 16.526645] ? __pfx_read_tsc+0x10/0x10 [ 16.526666] ? ktime_get_ts64+0x86/0x230 [ 16.526692] kunit_try_run_case+0x1a5/0x480 [ 16.526717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.526742] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.526766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.526790] ? __kthread_parkme+0x82/0x180 [ 16.526810] ? preempt_count_sub+0x50/0x80 [ 16.526835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.526859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.526883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.526907] kthread+0x337/0x6f0 [ 16.526927] ? trace_preempt_on+0x20/0xc0 [ 16.526952] ? __pfx_kthread+0x10/0x10 [ 16.526974] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.526996] ? calculate_sigpending+0x7b/0xa0 [ 16.527020] ? __pfx_kthread+0x10/0x10 [ 16.527042] ret_from_fork+0x116/0x1d0 [ 16.527061] ? __pfx_kthread+0x10/0x10 [ 16.527083] ret_from_fork_asm+0x1a/0x30 [ 16.527115] </TASK> [ 16.527126] [ 16.534828] Allocated by task 283: [ 16.534993] kasan_save_stack+0x45/0x70 [ 16.535200] kasan_save_track+0x18/0x40 [ 16.535429] kasan_save_alloc_info+0x3b/0x50 [ 16.535629] __kasan_kmalloc+0xb7/0xc0 [ 16.535823] __kmalloc_cache_noprof+0x189/0x420 [ 16.536031] kasan_atomics+0x95/0x310 [ 16.536243] kunit_try_run_case+0x1a5/0x480 [ 16.536481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.536775] kthread+0x337/0x6f0 [ 16.536958] ret_from_fork+0x116/0x1d0 [ 16.537150] ret_from_fork_asm+0x1a/0x30 [ 16.537348] [ 16.537448] The buggy address belongs to the object at ffff8881027c5180 [ 16.537448] which belongs to the cache kmalloc-64 of size 64 [ 16.537944] The buggy address is located 0 bytes to the right of [ 16.537944] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.538450] [ 16.538549] The buggy address belongs to the physical page: [ 16.538801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.539138] flags: 0x200000000000000(node=0|zone=2) [ 16.539378] page_type: f5(slab) [ 16.539599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.539836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.540067] page dumped because: kasan: bad access detected [ 16.540256] [ 16.540334] Memory state around the buggy address: [ 16.540538] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.541092] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.541431] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.541755] ^ [ 16.541998] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.542329] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.542624] ================================================================== [ 15.411349] ================================================================== [ 15.411641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.412332] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.412638] [ 15.412920] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.412967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.412980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.413004] Call Trace: [ 15.413022] <TASK> [ 15.413039] dump_stack_lvl+0x73/0xb0 [ 15.413067] print_report+0xd1/0x610 [ 15.413090] ? __virt_addr_valid+0x1db/0x2d0 [ 15.413114] ? kasan_atomics_helper+0x565/0x5450 [ 15.413136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.413172] ? kasan_atomics_helper+0x565/0x5450 [ 15.413194] kasan_report+0x141/0x180 [ 15.413217] ? kasan_atomics_helper+0x565/0x5450 [ 15.413243] kasan_check_range+0x10c/0x1c0 [ 15.413267] __kasan_check_write+0x18/0x20 [ 15.413287] kasan_atomics_helper+0x565/0x5450 [ 15.413310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.413335] ? kasan_save_alloc_info+0x3b/0x50 [ 15.413360] ? kasan_save_stack+0x45/0x70 [ 15.413383] kasan_atomics+0x1dc/0x310 [ 15.413407] ? __pfx_kasan_atomics+0x10/0x10 [ 15.413431] ? __pfx_read_tsc+0x10/0x10 [ 15.413453] ? ktime_get_ts64+0x86/0x230 [ 15.413478] kunit_try_run_case+0x1a5/0x480 [ 15.413503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.413527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.413553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.413576] ? __kthread_parkme+0x82/0x180 [ 15.413598] ? preempt_count_sub+0x50/0x80 [ 15.413622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.413647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.413671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.413695] kthread+0x337/0x6f0 [ 15.413715] ? trace_preempt_on+0x20/0xc0 [ 15.413742] ? __pfx_kthread+0x10/0x10 [ 15.413763] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.413785] ? calculate_sigpending+0x7b/0xa0 [ 15.413810] ? __pfx_kthread+0x10/0x10 [ 15.413833] ret_from_fork+0x116/0x1d0 [ 15.413965] ? __pfx_kthread+0x10/0x10 [ 15.413990] ret_from_fork_asm+0x1a/0x30 [ 15.414021] </TASK> [ 15.414033] [ 15.424067] Allocated by task 283: [ 15.424269] kasan_save_stack+0x45/0x70 [ 15.424881] kasan_save_track+0x18/0x40 [ 15.425106] kasan_save_alloc_info+0x3b/0x50 [ 15.425419] __kasan_kmalloc+0xb7/0xc0 [ 15.425732] __kmalloc_cache_noprof+0x189/0x420 [ 15.426120] kasan_atomics+0x95/0x310 [ 15.426283] kunit_try_run_case+0x1a5/0x480 [ 15.426600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.426959] kthread+0x337/0x6f0 [ 15.427112] ret_from_fork+0x116/0x1d0 [ 15.427307] ret_from_fork_asm+0x1a/0x30 [ 15.427623] [ 15.427704] The buggy address belongs to the object at ffff8881027c5180 [ 15.427704] which belongs to the cache kmalloc-64 of size 64 [ 15.428472] The buggy address is located 0 bytes to the right of [ 15.428472] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.429052] [ 15.429234] The buggy address belongs to the physical page: [ 15.429481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.430192] flags: 0x200000000000000(node=0|zone=2) [ 15.430452] page_type: f5(slab) [ 15.430705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.431231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.431705] page dumped because: kasan: bad access detected [ 15.431997] [ 15.432271] Memory state around the buggy address: [ 15.432505] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.432794] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.433321] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.433745] ^ [ 15.434003] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.434523] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.434819] ================================================================== [ 16.635714] ================================================================== [ 16.636091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.636412] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.636787] [ 16.636914] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.636958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.636970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.636993] Call Trace: [ 16.637011] <TASK> [ 16.637027] dump_stack_lvl+0x73/0xb0 [ 16.637055] print_report+0xd1/0x610 [ 16.637077] ? __virt_addr_valid+0x1db/0x2d0 [ 16.637100] ? kasan_atomics_helper+0x5115/0x5450 [ 16.637122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.637156] ? kasan_atomics_helper+0x5115/0x5450 [ 16.637179] kasan_report+0x141/0x180 [ 16.637202] ? kasan_atomics_helper+0x5115/0x5450 [ 16.637231] __asan_report_load8_noabort+0x18/0x20 [ 16.637266] kasan_atomics_helper+0x5115/0x5450 [ 16.637290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.637325] ? kasan_save_alloc_info+0x3b/0x50 [ 16.637350] ? kasan_save_stack+0x45/0x70 [ 16.637375] kasan_atomics+0x1dc/0x310 [ 16.637399] ? __pfx_kasan_atomics+0x10/0x10 [ 16.637424] ? __pfx_read_tsc+0x10/0x10 [ 16.637445] ? ktime_get_ts64+0x86/0x230 [ 16.637470] kunit_try_run_case+0x1a5/0x480 [ 16.637496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.637519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.637544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.637569] ? __kthread_parkme+0x82/0x180 [ 16.637590] ? preempt_count_sub+0x50/0x80 [ 16.637614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.637639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.637663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.637697] kthread+0x337/0x6f0 [ 16.637717] ? trace_preempt_on+0x20/0xc0 [ 16.637740] ? __pfx_kthread+0x10/0x10 [ 16.637780] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.637803] ? calculate_sigpending+0x7b/0xa0 [ 16.637827] ? __pfx_kthread+0x10/0x10 [ 16.637859] ret_from_fork+0x116/0x1d0 [ 16.637878] ? __pfx_kthread+0x10/0x10 [ 16.637900] ret_from_fork_asm+0x1a/0x30 [ 16.637931] </TASK> [ 16.637943] [ 16.645636] Allocated by task 283: [ 16.645777] kasan_save_stack+0x45/0x70 [ 16.645924] kasan_save_track+0x18/0x40 [ 16.646065] kasan_save_alloc_info+0x3b/0x50 [ 16.646229] __kasan_kmalloc+0xb7/0xc0 [ 16.646458] __kmalloc_cache_noprof+0x189/0x420 [ 16.646696] kasan_atomics+0x95/0x310 [ 16.646886] kunit_try_run_case+0x1a5/0x480 [ 16.647098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.647513] kthread+0x337/0x6f0 [ 16.647845] ret_from_fork+0x116/0x1d0 [ 16.647983] ret_from_fork_asm+0x1a/0x30 [ 16.648128] [ 16.648211] The buggy address belongs to the object at ffff8881027c5180 [ 16.648211] which belongs to the cache kmalloc-64 of size 64 [ 16.649178] The buggy address is located 0 bytes to the right of [ 16.649178] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.649722] [ 16.649822] The buggy address belongs to the physical page: [ 16.650003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.650345] flags: 0x200000000000000(node=0|zone=2) [ 16.650601] page_type: f5(slab) [ 16.650782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.651105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.651490] page dumped because: kasan: bad access detected [ 16.651731] [ 16.651832] Memory state around the buggy address: [ 16.652074] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.652424] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.652731] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.653036] ^ [ 16.653279] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653595] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653908] ================================================================== [ 15.843008] ================================================================== [ 15.843366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.843674] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.843894] [ 15.844464] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.844534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.844550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.844575] Call Trace: [ 15.844595] <TASK> [ 15.844613] dump_stack_lvl+0x73/0xb0 [ 15.844776] print_report+0xd1/0x610 [ 15.844819] ? __virt_addr_valid+0x1db/0x2d0 [ 15.844843] ? kasan_atomics_helper+0x1079/0x5450 [ 15.844878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.844902] ? kasan_atomics_helper+0x1079/0x5450 [ 15.844924] kasan_report+0x141/0x180 [ 15.844947] ? kasan_atomics_helper+0x1079/0x5450 [ 15.844974] kasan_check_range+0x10c/0x1c0 [ 15.844998] __kasan_check_write+0x18/0x20 [ 15.845018] kasan_atomics_helper+0x1079/0x5450 [ 15.845042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.845065] ? kasan_save_alloc_info+0x3b/0x50 [ 15.845090] ? kasan_save_stack+0x45/0x70 [ 15.845115] kasan_atomics+0x1dc/0x310 [ 15.845137] ? __pfx_kasan_atomics+0x10/0x10 [ 15.845172] ? __pfx_read_tsc+0x10/0x10 [ 15.845193] ? ktime_get_ts64+0x86/0x230 [ 15.845219] kunit_try_run_case+0x1a5/0x480 [ 15.845245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.845269] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.845295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.845319] ? __kthread_parkme+0x82/0x180 [ 15.845342] ? preempt_count_sub+0x50/0x80 [ 15.845366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.845391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.845415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.845440] kthread+0x337/0x6f0 [ 15.845460] ? trace_preempt_on+0x20/0xc0 [ 15.845484] ? __pfx_kthread+0x10/0x10 [ 15.845506] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.845527] ? calculate_sigpending+0x7b/0xa0 [ 15.845553] ? __pfx_kthread+0x10/0x10 [ 15.845575] ret_from_fork+0x116/0x1d0 [ 15.845594] ? __pfx_kthread+0x10/0x10 [ 15.845615] ret_from_fork_asm+0x1a/0x30 [ 15.845647] </TASK> [ 15.845659] [ 15.856939] Allocated by task 283: [ 15.857107] kasan_save_stack+0x45/0x70 [ 15.857481] kasan_save_track+0x18/0x40 [ 15.857764] kasan_save_alloc_info+0x3b/0x50 [ 15.857927] __kasan_kmalloc+0xb7/0xc0 [ 15.858251] __kmalloc_cache_noprof+0x189/0x420 [ 15.858637] kasan_atomics+0x95/0x310 [ 15.858786] kunit_try_run_case+0x1a5/0x480 [ 15.859154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.859429] kthread+0x337/0x6f0 [ 15.859837] ret_from_fork+0x116/0x1d0 [ 15.860092] ret_from_fork_asm+0x1a/0x30 [ 15.860296] [ 15.860419] The buggy address belongs to the object at ffff8881027c5180 [ 15.860419] which belongs to the cache kmalloc-64 of size 64 [ 15.860989] The buggy address is located 0 bytes to the right of [ 15.860989] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.861845] [ 15.861969] The buggy address belongs to the physical page: [ 15.862475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.862928] flags: 0x200000000000000(node=0|zone=2) [ 15.863219] page_type: f5(slab) [ 15.863560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.864024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.864363] page dumped because: kasan: bad access detected [ 15.864725] [ 15.864821] Memory state around the buggy address: [ 15.865345] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.865862] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.866172] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.866569] ^ [ 15.867011] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.867568] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.867975] ================================================================== [ 16.580743] ================================================================== [ 16.581085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.581388] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.581619] [ 16.581706] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.581751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.581764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.581788] Call Trace: [ 16.581806] <TASK> [ 16.581821] dump_stack_lvl+0x73/0xb0 [ 16.581848] print_report+0xd1/0x610 [ 16.581871] ? __virt_addr_valid+0x1db/0x2d0 [ 16.581894] ? kasan_atomics_helper+0x218a/0x5450 [ 16.581916] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.581938] ? kasan_atomics_helper+0x218a/0x5450 [ 16.581960] kasan_report+0x141/0x180 [ 16.581983] ? kasan_atomics_helper+0x218a/0x5450 [ 16.582019] kasan_check_range+0x10c/0x1c0 [ 16.582044] __kasan_check_write+0x18/0x20 [ 16.582075] kasan_atomics_helper+0x218a/0x5450 [ 16.582101] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.582125] ? kasan_save_alloc_info+0x3b/0x50 [ 16.582171] ? kasan_save_stack+0x45/0x70 [ 16.582195] kasan_atomics+0x1dc/0x310 [ 16.582219] ? __pfx_kasan_atomics+0x10/0x10 [ 16.582244] ? __pfx_read_tsc+0x10/0x10 [ 16.582265] ? ktime_get_ts64+0x86/0x230 [ 16.582290] kunit_try_run_case+0x1a5/0x480 [ 16.582315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.582338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.582363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.582388] ? __kthread_parkme+0x82/0x180 [ 16.582409] ? preempt_count_sub+0x50/0x80 [ 16.582434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.582458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.582482] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.582507] kthread+0x337/0x6f0 [ 16.582527] ? trace_preempt_on+0x20/0xc0 [ 16.582551] ? __pfx_kthread+0x10/0x10 [ 16.582573] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.582595] ? calculate_sigpending+0x7b/0xa0 [ 16.582619] ? __pfx_kthread+0x10/0x10 [ 16.582642] ret_from_fork+0x116/0x1d0 [ 16.582660] ? __pfx_kthread+0x10/0x10 [ 16.582682] ret_from_fork_asm+0x1a/0x30 [ 16.582713] </TASK> [ 16.582724] [ 16.590910] Allocated by task 283: [ 16.591118] kasan_save_stack+0x45/0x70 [ 16.591341] kasan_save_track+0x18/0x40 [ 16.591535] kasan_save_alloc_info+0x3b/0x50 [ 16.591758] __kasan_kmalloc+0xb7/0xc0 [ 16.591932] __kmalloc_cache_noprof+0x189/0x420 [ 16.592172] kasan_atomics+0x95/0x310 [ 16.592346] kunit_try_run_case+0x1a5/0x480 [ 16.592496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.592675] kthread+0x337/0x6f0 [ 16.592798] ret_from_fork+0x116/0x1d0 [ 16.592934] ret_from_fork_asm+0x1a/0x30 [ 16.593075] [ 16.593157] The buggy address belongs to the object at ffff8881027c5180 [ 16.593157] which belongs to the cache kmalloc-64 of size 64 [ 16.593514] The buggy address is located 0 bytes to the right of [ 16.593514] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.593884] [ 16.593971] The buggy address belongs to the physical page: [ 16.594262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.594628] flags: 0x200000000000000(node=0|zone=2) [ 16.594867] page_type: f5(slab) [ 16.595037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.595386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.595725] page dumped because: kasan: bad access detected [ 16.595977] [ 16.596076] Memory state around the buggy address: [ 16.596287] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.596512] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.596733] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.596951] ^ [ 16.597110] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.597747] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.598065] ================================================================== [ 15.360600] ================================================================== [ 15.361062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.361682] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.362273] [ 15.362405] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.362453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.362467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.362580] Call Trace: [ 15.362675] <TASK> [ 15.362695] dump_stack_lvl+0x73/0xb0 [ 15.362727] print_report+0xd1/0x610 [ 15.362750] ? __virt_addr_valid+0x1db/0x2d0 [ 15.362774] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.362796] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.362820] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.362843] kasan_report+0x141/0x180 [ 15.362881] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.362908] kasan_check_range+0x10c/0x1c0 [ 15.362933] __kasan_check_write+0x18/0x20 [ 15.362953] kasan_atomics_helper+0x4a0/0x5450 [ 15.362976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.363001] ? kasan_save_alloc_info+0x3b/0x50 [ 15.363026] ? kasan_save_stack+0x45/0x70 [ 15.363051] kasan_atomics+0x1dc/0x310 [ 15.363075] ? __pfx_kasan_atomics+0x10/0x10 [ 15.363100] ? __pfx_read_tsc+0x10/0x10 [ 15.363122] ? ktime_get_ts64+0x86/0x230 [ 15.363160] kunit_try_run_case+0x1a5/0x480 [ 15.363185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363209] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.363234] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.363259] ? __kthread_parkme+0x82/0x180 [ 15.363280] ? preempt_count_sub+0x50/0x80 [ 15.363304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.363354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.363379] kthread+0x337/0x6f0 [ 15.363400] ? trace_preempt_on+0x20/0xc0 [ 15.363425] ? __pfx_kthread+0x10/0x10 [ 15.363446] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.363469] ? calculate_sigpending+0x7b/0xa0 [ 15.363494] ? __pfx_kthread+0x10/0x10 [ 15.363517] ret_from_fork+0x116/0x1d0 [ 15.363536] ? __pfx_kthread+0x10/0x10 [ 15.363562] ret_from_fork_asm+0x1a/0x30 [ 15.363593] </TASK> [ 15.363605] [ 15.375383] Allocated by task 283: [ 15.375806] kasan_save_stack+0x45/0x70 [ 15.376127] kasan_save_track+0x18/0x40 [ 15.376323] kasan_save_alloc_info+0x3b/0x50 [ 15.376624] __kasan_kmalloc+0xb7/0xc0 [ 15.376801] __kmalloc_cache_noprof+0x189/0x420 [ 15.377209] kasan_atomics+0x95/0x310 [ 15.377451] kunit_try_run_case+0x1a5/0x480 [ 15.378003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.378345] kthread+0x337/0x6f0 [ 15.378614] ret_from_fork+0x116/0x1d0 [ 15.378885] ret_from_fork_asm+0x1a/0x30 [ 15.379077] [ 15.379180] The buggy address belongs to the object at ffff8881027c5180 [ 15.379180] which belongs to the cache kmalloc-64 of size 64 [ 15.379825] The buggy address is located 0 bytes to the right of [ 15.379825] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.380675] [ 15.380769] The buggy address belongs to the physical page: [ 15.381188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.381773] flags: 0x200000000000000(node=0|zone=2) [ 15.382102] page_type: f5(slab) [ 15.382421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.382738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.383289] page dumped because: kasan: bad access detected [ 15.383645] [ 15.383839] Memory state around the buggy address: [ 15.384219] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.384699] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.385121] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.385612] ^ [ 15.385834] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.386332] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.386730] ================================================================== [ 16.429348] ================================================================== [ 16.429771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.430058] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.430301] [ 16.430390] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.430434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.430448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.430472] Call Trace: [ 16.430488] <TASK> [ 16.430505] dump_stack_lvl+0x73/0xb0 [ 16.430534] print_report+0xd1/0x610 [ 16.430557] ? __virt_addr_valid+0x1db/0x2d0 [ 16.430582] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.430603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.430626] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.430648] kasan_report+0x141/0x180 [ 16.430671] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.430697] kasan_check_range+0x10c/0x1c0 [ 16.430721] __kasan_check_write+0x18/0x20 [ 16.430741] kasan_atomics_helper+0x1eaa/0x5450 [ 16.430764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.430788] ? kasan_save_alloc_info+0x3b/0x50 [ 16.430812] ? kasan_save_stack+0x45/0x70 [ 16.430836] kasan_atomics+0x1dc/0x310 [ 16.430859] ? __pfx_kasan_atomics+0x10/0x10 [ 16.430883] ? __pfx_read_tsc+0x10/0x10 [ 16.430905] ? ktime_get_ts64+0x86/0x230 [ 16.430930] kunit_try_run_case+0x1a5/0x480 [ 16.430955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.430978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.431003] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.431027] ? __kthread_parkme+0x82/0x180 [ 16.431048] ? preempt_count_sub+0x50/0x80 [ 16.431073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.431097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.431121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.431159] kthread+0x337/0x6f0 [ 16.431179] ? trace_preempt_on+0x20/0xc0 [ 16.431203] ? __pfx_kthread+0x10/0x10 [ 16.431225] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.431249] ? calculate_sigpending+0x7b/0xa0 [ 16.431273] ? __pfx_kthread+0x10/0x10 [ 16.431295] ret_from_fork+0x116/0x1d0 [ 16.431314] ? __pfx_kthread+0x10/0x10 [ 16.431335] ret_from_fork_asm+0x1a/0x30 [ 16.431365] </TASK> [ 16.431376] [ 16.439267] Allocated by task 283: [ 16.439619] kasan_save_stack+0x45/0x70 [ 16.439879] kasan_save_track+0x18/0x40 [ 16.440056] kasan_save_alloc_info+0x3b/0x50 [ 16.440254] __kasan_kmalloc+0xb7/0xc0 [ 16.440549] __kmalloc_cache_noprof+0x189/0x420 [ 16.440713] kasan_atomics+0x95/0x310 [ 16.440849] kunit_try_run_case+0x1a5/0x480 [ 16.441015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.441278] kthread+0x337/0x6f0 [ 16.441457] ret_from_fork+0x116/0x1d0 [ 16.441648] ret_from_fork_asm+0x1a/0x30 [ 16.441838] [ 16.441911] The buggy address belongs to the object at ffff8881027c5180 [ 16.441911] which belongs to the cache kmalloc-64 of size 64 [ 16.442281] The buggy address is located 0 bytes to the right of [ 16.442281] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.442836] [ 16.442938] The buggy address belongs to the physical page: [ 16.443202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.443615] flags: 0x200000000000000(node=0|zone=2) [ 16.443786] page_type: f5(slab) [ 16.443910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.444860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.445768] page dumped because: kasan: bad access detected [ 16.446614] [ 16.446968] Memory state around the buggy address: [ 16.447587] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.448603] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.448860] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.449081] ^ [ 16.449256] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.449891] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.450544] ================================================================== [ 16.617268] ================================================================== [ 16.617888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.618230] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.618595] [ 16.618692] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.618733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.618747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.618778] Call Trace: [ 16.618793] <TASK> [ 16.618807] dump_stack_lvl+0x73/0xb0 [ 16.618834] print_report+0xd1/0x610 [ 16.618868] ? __virt_addr_valid+0x1db/0x2d0 [ 16.618891] ? kasan_atomics_helper+0x224c/0x5450 [ 16.618913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.618936] ? kasan_atomics_helper+0x224c/0x5450 [ 16.618967] kasan_report+0x141/0x180 [ 16.618991] ? kasan_atomics_helper+0x224c/0x5450 [ 16.619028] kasan_check_range+0x10c/0x1c0 [ 16.619052] __kasan_check_write+0x18/0x20 [ 16.619072] kasan_atomics_helper+0x224c/0x5450 [ 16.619096] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.619126] ? kasan_save_alloc_info+0x3b/0x50 [ 16.619165] ? kasan_save_stack+0x45/0x70 [ 16.619190] kasan_atomics+0x1dc/0x310 [ 16.619213] ? __pfx_kasan_atomics+0x10/0x10 [ 16.619237] ? __pfx_read_tsc+0x10/0x10 [ 16.619258] ? ktime_get_ts64+0x86/0x230 [ 16.619283] kunit_try_run_case+0x1a5/0x480 [ 16.619307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.619339] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.619363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.619398] ? __kthread_parkme+0x82/0x180 [ 16.619431] ? preempt_count_sub+0x50/0x80 [ 16.619455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.619480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.619504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.619537] kthread+0x337/0x6f0 [ 16.619557] ? trace_preempt_on+0x20/0xc0 [ 16.619590] ? __pfx_kthread+0x10/0x10 [ 16.619612] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.619634] ? calculate_sigpending+0x7b/0xa0 [ 16.619659] ? __pfx_kthread+0x10/0x10 [ 16.619689] ret_from_fork+0x116/0x1d0 [ 16.619708] ? __pfx_kthread+0x10/0x10 [ 16.619730] ret_from_fork_asm+0x1a/0x30 [ 16.619771] </TASK> [ 16.619781] [ 16.627284] Allocated by task 283: [ 16.627498] kasan_save_stack+0x45/0x70 [ 16.627703] kasan_save_track+0x18/0x40 [ 16.627895] kasan_save_alloc_info+0x3b/0x50 [ 16.628114] __kasan_kmalloc+0xb7/0xc0 [ 16.628315] __kmalloc_cache_noprof+0x189/0x420 [ 16.628543] kasan_atomics+0x95/0x310 [ 16.628732] kunit_try_run_case+0x1a5/0x480 [ 16.628941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.629348] kthread+0x337/0x6f0 [ 16.629520] ret_from_fork+0x116/0x1d0 [ 16.629707] ret_from_fork_asm+0x1a/0x30 [ 16.629877] [ 16.629950] The buggy address belongs to the object at ffff8881027c5180 [ 16.629950] which belongs to the cache kmalloc-64 of size 64 [ 16.630454] The buggy address is located 0 bytes to the right of [ 16.630454] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.631000] [ 16.631095] The buggy address belongs to the physical page: [ 16.631282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.631680] flags: 0x200000000000000(node=0|zone=2) [ 16.631910] page_type: f5(slab) [ 16.632085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.632491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.632768] page dumped because: kasan: bad access detected [ 16.633038] [ 16.633116] Memory state around the buggy address: [ 16.633341] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.633647] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.633928] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.634222] ^ [ 16.634500] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.634792] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.635097] ================================================================== [ 15.938829] ================================================================== [ 15.939278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.939859] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.940231] [ 15.940506] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.940557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.940571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.940595] Call Trace: [ 15.940613] <TASK> [ 15.940630] dump_stack_lvl+0x73/0xb0 [ 15.940660] print_report+0xd1/0x610 [ 15.940683] ? __virt_addr_valid+0x1db/0x2d0 [ 15.940707] ? kasan_atomics_helper+0x1217/0x5450 [ 15.940729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.940753] ? kasan_atomics_helper+0x1217/0x5450 [ 15.940776] kasan_report+0x141/0x180 [ 15.940799] ? kasan_atomics_helper+0x1217/0x5450 [ 15.940826] kasan_check_range+0x10c/0x1c0 [ 15.940850] __kasan_check_write+0x18/0x20 [ 15.940870] kasan_atomics_helper+0x1217/0x5450 [ 15.940894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.940917] ? kasan_save_alloc_info+0x3b/0x50 [ 15.940944] ? kasan_save_stack+0x45/0x70 [ 15.940969] kasan_atomics+0x1dc/0x310 [ 15.940992] ? __pfx_kasan_atomics+0x10/0x10 [ 15.941017] ? __pfx_read_tsc+0x10/0x10 [ 15.941039] ? ktime_get_ts64+0x86/0x230 [ 15.941065] kunit_try_run_case+0x1a5/0x480 [ 15.941089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.941112] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.941137] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.941172] ? __kthread_parkme+0x82/0x180 [ 15.941195] ? preempt_count_sub+0x50/0x80 [ 15.941219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.941243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.941268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.941293] kthread+0x337/0x6f0 [ 15.941466] ? trace_preempt_on+0x20/0xc0 [ 15.941492] ? __pfx_kthread+0x10/0x10 [ 15.941513] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.941536] ? calculate_sigpending+0x7b/0xa0 [ 15.941561] ? __pfx_kthread+0x10/0x10 [ 15.941584] ret_from_fork+0x116/0x1d0 [ 15.941603] ? __pfx_kthread+0x10/0x10 [ 15.941624] ret_from_fork_asm+0x1a/0x30 [ 15.941655] </TASK> [ 15.941667] [ 15.951721] Allocated by task 283: [ 15.951915] kasan_save_stack+0x45/0x70 [ 15.952101] kasan_save_track+0x18/0x40 [ 15.952292] kasan_save_alloc_info+0x3b/0x50 [ 15.952768] __kasan_kmalloc+0xb7/0xc0 [ 15.953016] __kmalloc_cache_noprof+0x189/0x420 [ 15.953208] kasan_atomics+0x95/0x310 [ 15.953553] kunit_try_run_case+0x1a5/0x480 [ 15.953751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.954108] kthread+0x337/0x6f0 [ 15.954405] ret_from_fork+0x116/0x1d0 [ 15.954567] ret_from_fork_asm+0x1a/0x30 [ 15.954836] [ 15.954922] The buggy address belongs to the object at ffff8881027c5180 [ 15.954922] which belongs to the cache kmalloc-64 of size 64 [ 15.955417] The buggy address is located 0 bytes to the right of [ 15.955417] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.956134] [ 15.956333] The buggy address belongs to the physical page: [ 15.956628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.957031] flags: 0x200000000000000(node=0|zone=2) [ 15.957358] page_type: f5(slab) [ 15.957492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.957907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.958295] page dumped because: kasan: bad access detected [ 15.958668] [ 15.958760] Memory state around the buggy address: [ 15.958960] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.959279] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.959774] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.960182] ^ [ 15.960405] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960711] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960999] ================================================================== [ 15.312078] ================================================================== [ 15.312639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.313082] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.313351] [ 15.313468] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.313517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.313530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.313554] Call Trace: [ 15.313575] <TASK> [ 15.313614] dump_stack_lvl+0x73/0xb0 [ 15.313644] print_report+0xd1/0x610 [ 15.313667] ? __virt_addr_valid+0x1db/0x2d0 [ 15.313692] ? kasan_atomics_helper+0x3df/0x5450 [ 15.313713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.313737] ? kasan_atomics_helper+0x3df/0x5450 [ 15.313759] kasan_report+0x141/0x180 [ 15.313782] ? kasan_atomics_helper+0x3df/0x5450 [ 15.313809] kasan_check_range+0x10c/0x1c0 [ 15.313833] __kasan_check_read+0x15/0x20 [ 15.313885] kasan_atomics_helper+0x3df/0x5450 [ 15.313909] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.313933] ? kasan_save_alloc_info+0x3b/0x50 [ 15.313957] ? kasan_save_stack+0x45/0x70 [ 15.313982] kasan_atomics+0x1dc/0x310 [ 15.314005] ? __pfx_kasan_atomics+0x10/0x10 [ 15.314030] ? __pfx_read_tsc+0x10/0x10 [ 15.314052] ? ktime_get_ts64+0x86/0x230 [ 15.314080] kunit_try_run_case+0x1a5/0x480 [ 15.314105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.314165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.314189] ? __kthread_parkme+0x82/0x180 [ 15.314211] ? preempt_count_sub+0x50/0x80 [ 15.314236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.314286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.314311] kthread+0x337/0x6f0 [ 15.314402] ? trace_preempt_on+0x20/0xc0 [ 15.314427] ? __pfx_kthread+0x10/0x10 [ 15.314450] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.314472] ? calculate_sigpending+0x7b/0xa0 [ 15.314498] ? __pfx_kthread+0x10/0x10 [ 15.314520] ret_from_fork+0x116/0x1d0 [ 15.314540] ? __pfx_kthread+0x10/0x10 [ 15.314562] ret_from_fork_asm+0x1a/0x30 [ 15.314593] </TASK> [ 15.314605] [ 15.323391] Allocated by task 283: [ 15.323581] kasan_save_stack+0x45/0x70 [ 15.323925] kasan_save_track+0x18/0x40 [ 15.324076] kasan_save_alloc_info+0x3b/0x50 [ 15.324243] __kasan_kmalloc+0xb7/0xc0 [ 15.324386] __kmalloc_cache_noprof+0x189/0x420 [ 15.324592] kasan_atomics+0x95/0x310 [ 15.324785] kunit_try_run_case+0x1a5/0x480 [ 15.324994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.325292] kthread+0x337/0x6f0 [ 15.325512] ret_from_fork+0x116/0x1d0 [ 15.325705] ret_from_fork_asm+0x1a/0x30 [ 15.325959] [ 15.326050] The buggy address belongs to the object at ffff8881027c5180 [ 15.326050] which belongs to the cache kmalloc-64 of size 64 [ 15.326664] The buggy address is located 0 bytes to the right of [ 15.326664] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.327637] [ 15.327749] The buggy address belongs to the physical page: [ 15.328323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.328855] flags: 0x200000000000000(node=0|zone=2) [ 15.329226] page_type: f5(slab) [ 15.329958] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.330221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.330900] page dumped because: kasan: bad access detected [ 15.331637] [ 15.331925] Memory state around the buggy address: [ 15.332607] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.333546] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.333773] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.334581] ^ [ 15.335166] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336069] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336597] ================================================================== [ 16.051701] ================================================================== [ 16.052163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 16.052646] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.053007] [ 16.053167] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.053211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.053223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.053248] Call Trace: [ 16.053266] <TASK> [ 16.053283] dump_stack_lvl+0x73/0xb0 [ 16.054073] print_report+0xd1/0x610 [ 16.054096] ? __virt_addr_valid+0x1db/0x2d0 [ 16.054119] ? kasan_atomics_helper+0x1467/0x5450 [ 16.054141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.054172] ? kasan_atomics_helper+0x1467/0x5450 [ 16.054195] kasan_report+0x141/0x180 [ 16.054217] ? kasan_atomics_helper+0x1467/0x5450 [ 16.054244] kasan_check_range+0x10c/0x1c0 [ 16.054268] __kasan_check_write+0x18/0x20 [ 16.054288] kasan_atomics_helper+0x1467/0x5450 [ 16.054312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.054335] ? kasan_save_alloc_info+0x3b/0x50 [ 16.054359] ? kasan_save_stack+0x45/0x70 [ 16.054384] kasan_atomics+0x1dc/0x310 [ 16.054407] ? __pfx_kasan_atomics+0x10/0x10 [ 16.054432] ? __pfx_read_tsc+0x10/0x10 [ 16.054453] ? ktime_get_ts64+0x86/0x230 [ 16.054478] kunit_try_run_case+0x1a5/0x480 [ 16.054504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.054528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.054552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.054577] ? __kthread_parkme+0x82/0x180 [ 16.054598] ? preempt_count_sub+0x50/0x80 [ 16.054623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.054649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.054675] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.054699] kthread+0x337/0x6f0 [ 16.054720] ? trace_preempt_on+0x20/0xc0 [ 16.054744] ? __pfx_kthread+0x10/0x10 [ 16.054766] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.054788] ? calculate_sigpending+0x7b/0xa0 [ 16.054812] ? __pfx_kthread+0x10/0x10 [ 16.054835] ret_from_fork+0x116/0x1d0 [ 16.054854] ? __pfx_kthread+0x10/0x10 [ 16.054876] ret_from_fork_asm+0x1a/0x30 [ 16.054907] </TASK> [ 16.054918] [ 16.068962] Allocated by task 283: [ 16.069118] kasan_save_stack+0x45/0x70 [ 16.069617] kasan_save_track+0x18/0x40 [ 16.070067] kasan_save_alloc_info+0x3b/0x50 [ 16.070676] __kasan_kmalloc+0xb7/0xc0 [ 16.071368] __kmalloc_cache_noprof+0x189/0x420 [ 16.072028] kasan_atomics+0x95/0x310 [ 16.072482] kunit_try_run_case+0x1a5/0x480 [ 16.072971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.073680] kthread+0x337/0x6f0 [ 16.074125] ret_from_fork+0x116/0x1d0 [ 16.074693] ret_from_fork_asm+0x1a/0x30 [ 16.075245] [ 16.075713] The buggy address belongs to the object at ffff8881027c5180 [ 16.075713] which belongs to the cache kmalloc-64 of size 64 [ 16.076558] The buggy address is located 0 bytes to the right of [ 16.076558] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.076944] [ 16.077025] The buggy address belongs to the physical page: [ 16.077345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.078034] flags: 0x200000000000000(node=0|zone=2) [ 16.078511] page_type: f5(slab) [ 16.078828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.079498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.080150] page dumped because: kasan: bad access detected [ 16.080458] [ 16.080534] Memory state around the buggy address: [ 16.080695] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.080918] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.081139] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.081393] ^ [ 16.081819] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082475] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.083082] ================================================================== [ 16.319484] ================================================================== [ 16.319850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.320114] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.320452] [ 16.320540] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.320585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.320599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.320622] Call Trace: [ 16.320640] <TASK> [ 16.320656] dump_stack_lvl+0x73/0xb0 [ 16.320684] print_report+0xd1/0x610 [ 16.320706] ? __virt_addr_valid+0x1db/0x2d0 [ 16.320730] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.320752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.320776] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.320798] kasan_report+0x141/0x180 [ 16.320821] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.320847] kasan_check_range+0x10c/0x1c0 [ 16.320872] __kasan_check_write+0x18/0x20 [ 16.320892] kasan_atomics_helper+0x1c18/0x5450 [ 16.320915] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.320938] ? kasan_save_alloc_info+0x3b/0x50 [ 16.320962] ? kasan_save_stack+0x45/0x70 [ 16.320987] kasan_atomics+0x1dc/0x310 [ 16.321010] ? __pfx_kasan_atomics+0x10/0x10 [ 16.321035] ? __pfx_read_tsc+0x10/0x10 [ 16.321056] ? ktime_get_ts64+0x86/0x230 [ 16.321081] kunit_try_run_case+0x1a5/0x480 [ 16.321105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.321129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.321221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.321247] ? __kthread_parkme+0x82/0x180 [ 16.321281] ? preempt_count_sub+0x50/0x80 [ 16.321324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.321349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.321373] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.321398] kthread+0x337/0x6f0 [ 16.321429] ? trace_preempt_on+0x20/0xc0 [ 16.321453] ? __pfx_kthread+0x10/0x10 [ 16.321475] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.321508] ? calculate_sigpending+0x7b/0xa0 [ 16.321536] ? __pfx_kthread+0x10/0x10 [ 16.321560] ret_from_fork+0x116/0x1d0 [ 16.321579] ? __pfx_kthread+0x10/0x10 [ 16.321610] ret_from_fork_asm+0x1a/0x30 [ 16.321641] </TASK> [ 16.321653] [ 16.329650] Allocated by task 283: [ 16.329809] kasan_save_stack+0x45/0x70 [ 16.329988] kasan_save_track+0x18/0x40 [ 16.330194] kasan_save_alloc_info+0x3b/0x50 [ 16.330423] __kasan_kmalloc+0xb7/0xc0 [ 16.330640] __kmalloc_cache_noprof+0x189/0x420 [ 16.330845] kasan_atomics+0x95/0x310 [ 16.331046] kunit_try_run_case+0x1a5/0x480 [ 16.331258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.331498] kthread+0x337/0x6f0 [ 16.331694] ret_from_fork+0x116/0x1d0 [ 16.331855] ret_from_fork_asm+0x1a/0x30 [ 16.332062] [ 16.332138] The buggy address belongs to the object at ffff8881027c5180 [ 16.332138] which belongs to the cache kmalloc-64 of size 64 [ 16.332531] The buggy address is located 0 bytes to the right of [ 16.332531] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.332906] [ 16.332981] The buggy address belongs to the physical page: [ 16.333166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.333564] flags: 0x200000000000000(node=0|zone=2) [ 16.333800] page_type: f5(slab) [ 16.333969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.334358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.334701] page dumped because: kasan: bad access detected [ 16.334953] [ 16.335048] Memory state around the buggy address: [ 16.335285] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.335621] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.335906] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.336193] ^ [ 16.336384] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.336614] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.336946] ================================================================== [ 15.336973] ================================================================== [ 15.337250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.337739] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.338293] [ 15.338459] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.338506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.338519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.338543] Call Trace: [ 15.338562] <TASK> [ 15.338579] dump_stack_lvl+0x73/0xb0 [ 15.338609] print_report+0xd1/0x610 [ 15.338632] ? __virt_addr_valid+0x1db/0x2d0 [ 15.338655] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.338677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.338700] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.338723] kasan_report+0x141/0x180 [ 15.338746] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.338774] __asan_report_load4_noabort+0x18/0x20 [ 15.338799] kasan_atomics_helper+0x4b54/0x5450 [ 15.338823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.338847] ? kasan_save_alloc_info+0x3b/0x50 [ 15.338872] ? kasan_save_stack+0x45/0x70 [ 15.338896] kasan_atomics+0x1dc/0x310 [ 15.338920] ? __pfx_kasan_atomics+0x10/0x10 [ 15.338945] ? __pfx_read_tsc+0x10/0x10 [ 15.338966] ? ktime_get_ts64+0x86/0x230 [ 15.339365] kunit_try_run_case+0x1a5/0x480 [ 15.339394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.339443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.339467] ? __kthread_parkme+0x82/0x180 [ 15.339488] ? preempt_count_sub+0x50/0x80 [ 15.339513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.339563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.339587] kthread+0x337/0x6f0 [ 15.339608] ? trace_preempt_on+0x20/0xc0 [ 15.339631] ? __pfx_kthread+0x10/0x10 [ 15.339654] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.339676] ? calculate_sigpending+0x7b/0xa0 [ 15.339701] ? __pfx_kthread+0x10/0x10 [ 15.339724] ret_from_fork+0x116/0x1d0 [ 15.339743] ? __pfx_kthread+0x10/0x10 [ 15.339765] ret_from_fork_asm+0x1a/0x30 [ 15.339796] </TASK> [ 15.339808] [ 15.349836] Allocated by task 283: [ 15.350141] kasan_save_stack+0x45/0x70 [ 15.350455] kasan_save_track+0x18/0x40 [ 15.350633] kasan_save_alloc_info+0x3b/0x50 [ 15.350821] __kasan_kmalloc+0xb7/0xc0 [ 15.350999] __kmalloc_cache_noprof+0x189/0x420 [ 15.351459] kasan_atomics+0x95/0x310 [ 15.351764] kunit_try_run_case+0x1a5/0x480 [ 15.352078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352572] kthread+0x337/0x6f0 [ 15.352749] ret_from_fork+0x116/0x1d0 [ 15.352920] ret_from_fork_asm+0x1a/0x30 [ 15.353249] [ 15.353447] The buggy address belongs to the object at ffff8881027c5180 [ 15.353447] which belongs to the cache kmalloc-64 of size 64 [ 15.353913] The buggy address is located 0 bytes to the right of [ 15.353913] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.354725] [ 15.354809] The buggy address belongs to the physical page: [ 15.355189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.355488] flags: 0x200000000000000(node=0|zone=2) [ 15.355917] page_type: f5(slab) [ 15.356158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.356563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.356987] page dumped because: kasan: bad access detected [ 15.357212] [ 15.357309] Memory state around the buggy address: [ 15.357587] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.357952] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358522] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.358799] ^ [ 15.359111] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359591] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359841] ================================================================== [ 16.280463] ================================================================== [ 16.280807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.281184] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.281457] [ 16.283222] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.283280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.283319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.283344] Call Trace: [ 16.283362] <TASK> [ 16.283379] dump_stack_lvl+0x73/0xb0 [ 16.283411] print_report+0xd1/0x610 [ 16.283434] ? __virt_addr_valid+0x1db/0x2d0 [ 16.283458] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.283480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.283503] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.283526] kasan_report+0x141/0x180 [ 16.283548] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.283575] kasan_check_range+0x10c/0x1c0 [ 16.283599] __kasan_check_write+0x18/0x20 [ 16.283619] kasan_atomics_helper+0x1a7f/0x5450 [ 16.283642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.283666] ? kasan_save_alloc_info+0x3b/0x50 [ 16.283689] ? kasan_save_stack+0x45/0x70 [ 16.283713] kasan_atomics+0x1dc/0x310 [ 16.283736] ? __pfx_kasan_atomics+0x10/0x10 [ 16.283759] ? __pfx_read_tsc+0x10/0x10 [ 16.283781] ? ktime_get_ts64+0x86/0x230 [ 16.283806] kunit_try_run_case+0x1a5/0x480 [ 16.283832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.283854] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.283878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.283902] ? __kthread_parkme+0x82/0x180 [ 16.283923] ? preempt_count_sub+0x50/0x80 [ 16.283947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.283972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.283995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.284020] kthread+0x337/0x6f0 [ 16.284040] ? trace_preempt_on+0x20/0xc0 [ 16.284064] ? __pfx_kthread+0x10/0x10 [ 16.284085] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.284106] ? calculate_sigpending+0x7b/0xa0 [ 16.284133] ? __pfx_kthread+0x10/0x10 [ 16.284167] ret_from_fork+0x116/0x1d0 [ 16.284186] ? __pfx_kthread+0x10/0x10 [ 16.284219] ret_from_fork_asm+0x1a/0x30 [ 16.284249] </TASK> [ 16.284261] [ 16.291821] Allocated by task 283: [ 16.291958] kasan_save_stack+0x45/0x70 [ 16.292110] kasan_save_track+0x18/0x40 [ 16.292257] kasan_save_alloc_info+0x3b/0x50 [ 16.292481] __kasan_kmalloc+0xb7/0xc0 [ 16.292684] __kmalloc_cache_noprof+0x189/0x420 [ 16.292945] kasan_atomics+0x95/0x310 [ 16.293157] kunit_try_run_case+0x1a5/0x480 [ 16.293409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.293668] kthread+0x337/0x6f0 [ 16.293841] ret_from_fork+0x116/0x1d0 [ 16.294055] ret_from_fork_asm+0x1a/0x30 [ 16.294267] [ 16.294405] The buggy address belongs to the object at ffff8881027c5180 [ 16.294405] which belongs to the cache kmalloc-64 of size 64 [ 16.294814] The buggy address is located 0 bytes to the right of [ 16.294814] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.295197] [ 16.295272] The buggy address belongs to the physical page: [ 16.295467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.295714] flags: 0x200000000000000(node=0|zone=2) [ 16.295884] page_type: f5(slab) [ 16.296008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.296411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.296750] page dumped because: kasan: bad access detected [ 16.297003] [ 16.297098] Memory state around the buggy address: [ 16.297897] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.298257] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.298607] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.298922] ^ [ 16.299158] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.299505] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.299823] ================================================================== [ 15.998920] ================================================================== [ 15.999322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.999716] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.000185] [ 16.000279] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.000329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.000343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.000367] Call Trace: [ 16.000384] <TASK> [ 16.000400] dump_stack_lvl+0x73/0xb0 [ 16.000428] print_report+0xd1/0x610 [ 16.000452] ? __virt_addr_valid+0x1db/0x2d0 [ 16.000475] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.000497] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.000522] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.000547] kasan_report+0x141/0x180 [ 16.000570] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.000597] __asan_report_load4_noabort+0x18/0x20 [ 16.000623] kasan_atomics_helper+0x49ce/0x5450 [ 16.000646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.000670] ? kasan_save_alloc_info+0x3b/0x50 [ 16.000695] ? kasan_save_stack+0x45/0x70 [ 16.000720] kasan_atomics+0x1dc/0x310 [ 16.000743] ? __pfx_kasan_atomics+0x10/0x10 [ 16.000767] ? __pfx_read_tsc+0x10/0x10 [ 16.000789] ? ktime_get_ts64+0x86/0x230 [ 16.000813] kunit_try_run_case+0x1a5/0x480 [ 16.000839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.000884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.000909] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.000933] ? __kthread_parkme+0x82/0x180 [ 16.000955] ? preempt_count_sub+0x50/0x80 [ 16.000980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.001004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.001029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.001053] kthread+0x337/0x6f0 [ 16.001073] ? trace_preempt_on+0x20/0xc0 [ 16.001099] ? __pfx_kthread+0x10/0x10 [ 16.001121] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.001152] ? calculate_sigpending+0x7b/0xa0 [ 16.001177] ? __pfx_kthread+0x10/0x10 [ 16.001200] ret_from_fork+0x116/0x1d0 [ 16.001219] ? __pfx_kthread+0x10/0x10 [ 16.001241] ret_from_fork_asm+0x1a/0x30 [ 16.001272] </TASK> [ 16.001284] [ 16.008553] Allocated by task 283: [ 16.008686] kasan_save_stack+0x45/0x70 [ 16.008882] kasan_save_track+0x18/0x40 [ 16.009075] kasan_save_alloc_info+0x3b/0x50 [ 16.009297] __kasan_kmalloc+0xb7/0xc0 [ 16.009524] __kmalloc_cache_noprof+0x189/0x420 [ 16.009749] kasan_atomics+0x95/0x310 [ 16.009936] kunit_try_run_case+0x1a5/0x480 [ 16.010134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.010410] kthread+0x337/0x6f0 [ 16.010591] ret_from_fork+0x116/0x1d0 [ 16.010736] ret_from_fork_asm+0x1a/0x30 [ 16.010893] [ 16.010992] The buggy address belongs to the object at ffff8881027c5180 [ 16.010992] which belongs to the cache kmalloc-64 of size 64 [ 16.011535] The buggy address is located 0 bytes to the right of [ 16.011535] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.012035] [ 16.012134] The buggy address belongs to the physical page: [ 16.012420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.012725] flags: 0x200000000000000(node=0|zone=2) [ 16.012921] page_type: f5(slab) [ 16.013093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.013402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.013713] page dumped because: kasan: bad access detected [ 16.013946] [ 16.014033] Memory state around the buggy address: [ 16.014230] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.014556] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.014848] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.015118] ^ [ 16.015308] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.015529] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.015748] ================================================================== [ 15.768832] ================================================================== [ 15.769568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.770219] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.770656] [ 15.770756] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.770864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.770879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.770903] Call Trace: [ 15.770921] <TASK> [ 15.770939] dump_stack_lvl+0x73/0xb0 [ 15.770968] print_report+0xd1/0x610 [ 15.770991] ? __virt_addr_valid+0x1db/0x2d0 [ 15.771014] ? kasan_atomics_helper+0xf10/0x5450 [ 15.771036] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.771058] ? kasan_atomics_helper+0xf10/0x5450 [ 15.771081] kasan_report+0x141/0x180 [ 15.771259] ? kasan_atomics_helper+0xf10/0x5450 [ 15.771288] kasan_check_range+0x10c/0x1c0 [ 15.771312] __kasan_check_write+0x18/0x20 [ 15.771332] kasan_atomics_helper+0xf10/0x5450 [ 15.771355] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.771379] ? kasan_save_alloc_info+0x3b/0x50 [ 15.771403] ? kasan_save_stack+0x45/0x70 [ 15.771428] kasan_atomics+0x1dc/0x310 [ 15.771450] ? __pfx_kasan_atomics+0x10/0x10 [ 15.771475] ? __pfx_read_tsc+0x10/0x10 [ 15.771496] ? ktime_get_ts64+0x86/0x230 [ 15.771521] kunit_try_run_case+0x1a5/0x480 [ 15.771546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.771570] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.771595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.771621] ? __kthread_parkme+0x82/0x180 [ 15.771645] ? preempt_count_sub+0x50/0x80 [ 15.771669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.771695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.771719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.771743] kthread+0x337/0x6f0 [ 15.771763] ? trace_preempt_on+0x20/0xc0 [ 15.771787] ? __pfx_kthread+0x10/0x10 [ 15.771809] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.771831] ? calculate_sigpending+0x7b/0xa0 [ 15.771857] ? __pfx_kthread+0x10/0x10 [ 15.771879] ret_from_fork+0x116/0x1d0 [ 15.771899] ? __pfx_kthread+0x10/0x10 [ 15.771920] ret_from_fork_asm+0x1a/0x30 [ 15.771951] </TASK> [ 15.771963] [ 15.781965] Allocated by task 283: [ 15.782265] kasan_save_stack+0x45/0x70 [ 15.782640] kasan_save_track+0x18/0x40 [ 15.782966] kasan_save_alloc_info+0x3b/0x50 [ 15.783182] __kasan_kmalloc+0xb7/0xc0 [ 15.783554] __kmalloc_cache_noprof+0x189/0x420 [ 15.783754] kasan_atomics+0x95/0x310 [ 15.784051] kunit_try_run_case+0x1a5/0x480 [ 15.784226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.784561] kthread+0x337/0x6f0 [ 15.784785] ret_from_fork+0x116/0x1d0 [ 15.785132] ret_from_fork_asm+0x1a/0x30 [ 15.785300] [ 15.785404] The buggy address belongs to the object at ffff8881027c5180 [ 15.785404] which belongs to the cache kmalloc-64 of size 64 [ 15.786138] The buggy address is located 0 bytes to the right of [ 15.786138] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.786844] [ 15.786958] The buggy address belongs to the physical page: [ 15.787311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.787814] flags: 0x200000000000000(node=0|zone=2) [ 15.788071] page_type: f5(slab) [ 15.788361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.788695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.789197] page dumped because: kasan: bad access detected [ 15.789428] [ 15.789599] Memory state around the buggy address: [ 15.789787] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.790471] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.790898] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.791325] ^ [ 15.791504] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.791981] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.792355] ================================================================== [ 16.543092] ================================================================== [ 16.543602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.543983] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.544371] [ 16.544489] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.544535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.544547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.544572] Call Trace: [ 16.544600] <TASK> [ 16.544616] dump_stack_lvl+0x73/0xb0 [ 16.544644] print_report+0xd1/0x610 [ 16.544687] ? __virt_addr_valid+0x1db/0x2d0 [ 16.544709] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.544731] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.544765] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.544787] kasan_report+0x141/0x180 [ 16.544810] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.544837] kasan_check_range+0x10c/0x1c0 [ 16.544861] __kasan_check_write+0x18/0x20 [ 16.544881] kasan_atomics_helper+0x20c8/0x5450 [ 16.544903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.544927] ? kasan_save_alloc_info+0x3b/0x50 [ 16.544951] ? kasan_save_stack+0x45/0x70 [ 16.544975] kasan_atomics+0x1dc/0x310 [ 16.544999] ? __pfx_kasan_atomics+0x10/0x10 [ 16.545023] ? __pfx_read_tsc+0x10/0x10 [ 16.545055] ? ktime_get_ts64+0x86/0x230 [ 16.545080] kunit_try_run_case+0x1a5/0x480 [ 16.545105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.545139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.545174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.545198] ? __kthread_parkme+0x82/0x180 [ 16.545219] ? preempt_count_sub+0x50/0x80 [ 16.545252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.545276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.545301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.545335] kthread+0x337/0x6f0 [ 16.545357] ? trace_preempt_on+0x20/0xc0 [ 16.545381] ? __pfx_kthread+0x10/0x10 [ 16.545404] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.545427] ? calculate_sigpending+0x7b/0xa0 [ 16.545460] ? __pfx_kthread+0x10/0x10 [ 16.545482] ret_from_fork+0x116/0x1d0 [ 16.545501] ? __pfx_kthread+0x10/0x10 [ 16.545533] ret_from_fork_asm+0x1a/0x30 [ 16.545564] </TASK> [ 16.545576] [ 16.553964] Allocated by task 283: [ 16.554159] kasan_save_stack+0x45/0x70 [ 16.554421] kasan_save_track+0x18/0x40 [ 16.554563] kasan_save_alloc_info+0x3b/0x50 [ 16.554800] __kasan_kmalloc+0xb7/0xc0 [ 16.554947] __kmalloc_cache_noprof+0x189/0x420 [ 16.555107] kasan_atomics+0x95/0x310 [ 16.555305] kunit_try_run_case+0x1a5/0x480 [ 16.555527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.555805] kthread+0x337/0x6f0 [ 16.555974] ret_from_fork+0x116/0x1d0 [ 16.556138] ret_from_fork_asm+0x1a/0x30 [ 16.556368] [ 16.556562] The buggy address belongs to the object at ffff8881027c5180 [ 16.556562] which belongs to the cache kmalloc-64 of size 64 [ 16.557033] The buggy address is located 0 bytes to the right of [ 16.557033] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.557541] [ 16.557659] The buggy address belongs to the physical page: [ 16.557909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.558234] flags: 0x200000000000000(node=0|zone=2) [ 16.558453] page_type: f5(slab) [ 16.558624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.558923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.559169] page dumped because: kasan: bad access detected [ 16.559374] [ 16.559485] Memory state around the buggy address: [ 16.559711] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.560031] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.560410] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.560660] ^ [ 16.560889] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.561224] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.561637] ================================================================== [ 15.893981] ================================================================== [ 15.894253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.894599] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.895349] [ 15.895473] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.895589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.895657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.895682] Call Trace: [ 15.895698] <TASK> [ 15.895766] dump_stack_lvl+0x73/0xb0 [ 15.895799] print_report+0xd1/0x610 [ 15.895823] ? __virt_addr_valid+0x1db/0x2d0 [ 15.895848] ? kasan_atomics_helper+0x1148/0x5450 [ 15.895870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.895894] ? kasan_atomics_helper+0x1148/0x5450 [ 15.895916] kasan_report+0x141/0x180 [ 15.895939] ? kasan_atomics_helper+0x1148/0x5450 [ 15.896019] kasan_check_range+0x10c/0x1c0 [ 15.896048] __kasan_check_write+0x18/0x20 [ 15.896069] kasan_atomics_helper+0x1148/0x5450 [ 15.896092] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.896177] ? kasan_save_alloc_info+0x3b/0x50 [ 15.896203] ? kasan_save_stack+0x45/0x70 [ 15.896227] kasan_atomics+0x1dc/0x310 [ 15.896252] ? __pfx_kasan_atomics+0x10/0x10 [ 15.896276] ? __pfx_read_tsc+0x10/0x10 [ 15.896298] ? ktime_get_ts64+0x86/0x230 [ 15.896339] kunit_try_run_case+0x1a5/0x480 [ 15.896366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.896390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.896415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.896439] ? __kthread_parkme+0x82/0x180 [ 15.896460] ? preempt_count_sub+0x50/0x80 [ 15.896485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.896510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.896535] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.896559] kthread+0x337/0x6f0 [ 15.896579] ? trace_preempt_on+0x20/0xc0 [ 15.896603] ? __pfx_kthread+0x10/0x10 [ 15.896625] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.896647] ? calculate_sigpending+0x7b/0xa0 [ 15.896672] ? __pfx_kthread+0x10/0x10 [ 15.896694] ret_from_fork+0x116/0x1d0 [ 15.896713] ? __pfx_kthread+0x10/0x10 [ 15.896734] ret_from_fork_asm+0x1a/0x30 [ 15.896766] </TASK> [ 15.896778] [ 15.906451] Allocated by task 283: [ 15.906801] kasan_save_stack+0x45/0x70 [ 15.906994] kasan_save_track+0x18/0x40 [ 15.907177] kasan_save_alloc_info+0x3b/0x50 [ 15.907381] __kasan_kmalloc+0xb7/0xc0 [ 15.907737] __kmalloc_cache_noprof+0x189/0x420 [ 15.908023] kasan_atomics+0x95/0x310 [ 15.908191] kunit_try_run_case+0x1a5/0x480 [ 15.908523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.908836] kthread+0x337/0x6f0 [ 15.908985] ret_from_fork+0x116/0x1d0 [ 15.909170] ret_from_fork_asm+0x1a/0x30 [ 15.909360] [ 15.909485] The buggy address belongs to the object at ffff8881027c5180 [ 15.909485] which belongs to the cache kmalloc-64 of size 64 [ 15.910275] The buggy address is located 0 bytes to the right of [ 15.910275] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.910864] [ 15.911071] The buggy address belongs to the physical page: [ 15.911457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.911864] flags: 0x200000000000000(node=0|zone=2) [ 15.912078] page_type: f5(slab) [ 15.912367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.912673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.912970] page dumped because: kasan: bad access detected [ 15.913214] [ 15.913287] Memory state around the buggy address: [ 15.913730] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.914105] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.914398] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.914800] ^ [ 15.915092] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915366] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915772] ================================================================== [ 15.289797] ================================================================== [ 15.290229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.290818] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.291284] [ 15.291424] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.291472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.291484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.291509] Call Trace: [ 15.291527] <TASK> [ 15.291545] dump_stack_lvl+0x73/0xb0 [ 15.291573] print_report+0xd1/0x610 [ 15.291595] ? __virt_addr_valid+0x1db/0x2d0 [ 15.291617] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.291638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.291660] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.291682] kasan_report+0x141/0x180 [ 15.291703] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.291730] __asan_report_store4_noabort+0x1b/0x30 [ 15.291754] kasan_atomics_helper+0x4b6e/0x5450 [ 15.291777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.291800] ? kasan_save_alloc_info+0x3b/0x50 [ 15.291823] ? kasan_save_stack+0x45/0x70 [ 15.291846] kasan_atomics+0x1dc/0x310 [ 15.291952] ? __pfx_kasan_atomics+0x10/0x10 [ 15.291977] ? __pfx_read_tsc+0x10/0x10 [ 15.291998] ? ktime_get_ts64+0x86/0x230 [ 15.292022] kunit_try_run_case+0x1a5/0x480 [ 15.292046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.292093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.292116] ? __kthread_parkme+0x82/0x180 [ 15.292137] ? preempt_count_sub+0x50/0x80 [ 15.292172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.292219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.292243] kthread+0x337/0x6f0 [ 15.292263] ? trace_preempt_on+0x20/0xc0 [ 15.292287] ? __pfx_kthread+0x10/0x10 [ 15.292471] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.292496] ? calculate_sigpending+0x7b/0xa0 [ 15.292577] ? __pfx_kthread+0x10/0x10 [ 15.292602] ret_from_fork+0x116/0x1d0 [ 15.292623] ? __pfx_kthread+0x10/0x10 [ 15.292645] ret_from_fork_asm+0x1a/0x30 [ 15.292701] </TASK> [ 15.292713] [ 15.301995] Allocated by task 283: [ 15.302237] kasan_save_stack+0x45/0x70 [ 15.302413] kasan_save_track+0x18/0x40 [ 15.302651] kasan_save_alloc_info+0x3b/0x50 [ 15.302945] __kasan_kmalloc+0xb7/0xc0 [ 15.303169] __kmalloc_cache_noprof+0x189/0x420 [ 15.303490] kasan_atomics+0x95/0x310 [ 15.303707] kunit_try_run_case+0x1a5/0x480 [ 15.303997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.304309] kthread+0x337/0x6f0 [ 15.304492] ret_from_fork+0x116/0x1d0 [ 15.304794] ret_from_fork_asm+0x1a/0x30 [ 15.305026] [ 15.305388] The buggy address belongs to the object at ffff8881027c5180 [ 15.305388] which belongs to the cache kmalloc-64 of size 64 [ 15.305780] The buggy address is located 0 bytes to the right of [ 15.305780] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.306778] [ 15.306892] The buggy address belongs to the physical page: [ 15.307071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.307322] flags: 0x200000000000000(node=0|zone=2) [ 15.307629] page_type: f5(slab) [ 15.307834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.308433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.308903] page dumped because: kasan: bad access detected [ 15.309222] [ 15.309331] Memory state around the buggy address: [ 15.309512] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.309737] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.310314] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.310644] ^ [ 15.310849] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.311110] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.311626] ================================================================== [ 15.478863] ================================================================== [ 15.479105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.480779] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.481581] [ 15.481682] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.481731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.481745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.481769] Call Trace: [ 15.481788] <TASK> [ 15.481806] dump_stack_lvl+0x73/0xb0 [ 15.481847] print_report+0xd1/0x610 [ 15.481871] ? __virt_addr_valid+0x1db/0x2d0 [ 15.481895] ? kasan_atomics_helper+0x72f/0x5450 [ 15.481916] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.481939] ? kasan_atomics_helper+0x72f/0x5450 [ 15.481961] kasan_report+0x141/0x180 [ 15.481983] ? kasan_atomics_helper+0x72f/0x5450 [ 15.482010] kasan_check_range+0x10c/0x1c0 [ 15.482034] __kasan_check_write+0x18/0x20 [ 15.482054] kasan_atomics_helper+0x72f/0x5450 [ 15.482077] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.482101] ? kasan_save_alloc_info+0x3b/0x50 [ 15.482125] ? kasan_save_stack+0x45/0x70 [ 15.482157] kasan_atomics+0x1dc/0x310 [ 15.482181] ? __pfx_kasan_atomics+0x10/0x10 [ 15.482205] ? __pfx_read_tsc+0x10/0x10 [ 15.482226] ? ktime_get_ts64+0x86/0x230 [ 15.482252] kunit_try_run_case+0x1a5/0x480 [ 15.482278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.482302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.482326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.482350] ? __kthread_parkme+0x82/0x180 [ 15.482372] ? preempt_count_sub+0x50/0x80 [ 15.482396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.482422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.482446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.482471] kthread+0x337/0x6f0 [ 15.482491] ? trace_preempt_on+0x20/0xc0 [ 15.482515] ? __pfx_kthread+0x10/0x10 [ 15.482537] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.482560] ? calculate_sigpending+0x7b/0xa0 [ 15.482585] ? __pfx_kthread+0x10/0x10 [ 15.482607] ret_from_fork+0x116/0x1d0 [ 15.482627] ? __pfx_kthread+0x10/0x10 [ 15.482649] ret_from_fork_asm+0x1a/0x30 [ 15.482683] </TASK> [ 15.482695] [ 15.493802] Allocated by task 283: [ 15.494229] kasan_save_stack+0x45/0x70 [ 15.494527] kasan_save_track+0x18/0x40 [ 15.494707] kasan_save_alloc_info+0x3b/0x50 [ 15.494910] __kasan_kmalloc+0xb7/0xc0 [ 15.495088] __kmalloc_cache_noprof+0x189/0x420 [ 15.495306] kasan_atomics+0x95/0x310 [ 15.495480] kunit_try_run_case+0x1a5/0x480 [ 15.495675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.495915] kthread+0x337/0x6f0 [ 15.496070] ret_from_fork+0x116/0x1d0 [ 15.496811] ret_from_fork_asm+0x1a/0x30 [ 15.496979] [ 15.497080] The buggy address belongs to the object at ffff8881027c5180 [ 15.497080] which belongs to the cache kmalloc-64 of size 64 [ 15.497795] The buggy address is located 0 bytes to the right of [ 15.497795] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.498688] [ 15.498806] The buggy address belongs to the physical page: [ 15.499306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.499819] flags: 0x200000000000000(node=0|zone=2) [ 15.500197] page_type: f5(slab) [ 15.500372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.500841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.501337] page dumped because: kasan: bad access detected [ 15.501572] [ 15.501673] Memory state around the buggy address: [ 15.501976] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.502293] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.502808] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.503254] ^ [ 15.503432] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.503893] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504369] ================================================================== [ 16.187534] ================================================================== [ 16.187986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.188424] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.188776] [ 16.188880] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.188927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.188940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.188962] Call Trace: [ 16.188980] <TASK> [ 16.188997] dump_stack_lvl+0x73/0xb0 [ 16.189027] print_report+0xd1/0x610 [ 16.189059] ? __virt_addr_valid+0x1db/0x2d0 [ 16.189083] ? kasan_atomics_helper+0x177f/0x5450 [ 16.189105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.189139] ? kasan_atomics_helper+0x177f/0x5450 [ 16.189190] kasan_report+0x141/0x180 [ 16.189213] ? kasan_atomics_helper+0x177f/0x5450 [ 16.189240] kasan_check_range+0x10c/0x1c0 [ 16.189264] __kasan_check_write+0x18/0x20 [ 16.189284] kasan_atomics_helper+0x177f/0x5450 [ 16.189782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.189806] ? kasan_save_alloc_info+0x3b/0x50 [ 16.189829] ? kasan_save_stack+0x45/0x70 [ 16.189854] kasan_atomics+0x1dc/0x310 [ 16.189877] ? __pfx_kasan_atomics+0x10/0x10 [ 16.189901] ? __pfx_read_tsc+0x10/0x10 [ 16.189923] ? ktime_get_ts64+0x86/0x230 [ 16.189948] kunit_try_run_case+0x1a5/0x480 [ 16.189974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.189997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.190022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.190045] ? __kthread_parkme+0x82/0x180 [ 16.190066] ? preempt_count_sub+0x50/0x80 [ 16.190090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.190115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.190139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.190172] kthread+0x337/0x6f0 [ 16.190192] ? trace_preempt_on+0x20/0xc0 [ 16.190216] ? __pfx_kthread+0x10/0x10 [ 16.190237] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.190260] ? calculate_sigpending+0x7b/0xa0 [ 16.190284] ? __pfx_kthread+0x10/0x10 [ 16.190307] ret_from_fork+0x116/0x1d0 [ 16.190336] ? __pfx_kthread+0x10/0x10 [ 16.190358] ret_from_fork_asm+0x1a/0x30 [ 16.190390] </TASK> [ 16.190412] [ 16.198006] Allocated by task 283: [ 16.198137] kasan_save_stack+0x45/0x70 [ 16.198286] kasan_save_track+0x18/0x40 [ 16.198421] kasan_save_alloc_info+0x3b/0x50 [ 16.198771] __kasan_kmalloc+0xb7/0xc0 [ 16.198989] __kmalloc_cache_noprof+0x189/0x420 [ 16.199246] kasan_atomics+0x95/0x310 [ 16.199485] kunit_try_run_case+0x1a5/0x480 [ 16.199718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.199947] kthread+0x337/0x6f0 [ 16.200093] ret_from_fork+0x116/0x1d0 [ 16.200291] ret_from_fork_asm+0x1a/0x30 [ 16.200531] [ 16.200630] The buggy address belongs to the object at ffff8881027c5180 [ 16.200630] which belongs to the cache kmalloc-64 of size 64 [ 16.201161] The buggy address is located 0 bytes to the right of [ 16.201161] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.201737] [ 16.201832] The buggy address belongs to the physical page: [ 16.202084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.202425] flags: 0x200000000000000(node=0|zone=2) [ 16.202677] page_type: f5(slab) [ 16.202837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.203179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.203517] page dumped because: kasan: bad access detected [ 16.203771] [ 16.203871] Memory state around the buggy address: [ 16.204049] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.204284] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.204512] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.204732] ^ [ 16.204897] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205371] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205703] ================================================================== [ 16.480098] ================================================================== [ 16.480763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.481561] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.482197] [ 16.482383] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.482439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.482452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.482475] Call Trace: [ 16.482505] <TASK> [ 16.482524] dump_stack_lvl+0x73/0xb0 [ 16.482554] print_report+0xd1/0x610 [ 16.482577] ? __virt_addr_valid+0x1db/0x2d0 [ 16.482600] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.482631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.482654] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.482676] kasan_report+0x141/0x180 [ 16.482710] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.482736] __asan_report_load8_noabort+0x18/0x20 [ 16.482761] kasan_atomics_helper+0x4f71/0x5450 [ 16.482784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.482808] ? kasan_save_alloc_info+0x3b/0x50 [ 16.482832] ? kasan_save_stack+0x45/0x70 [ 16.482856] kasan_atomics+0x1dc/0x310 [ 16.482879] ? __pfx_kasan_atomics+0x10/0x10 [ 16.482903] ? __pfx_read_tsc+0x10/0x10 [ 16.482925] ? ktime_get_ts64+0x86/0x230 [ 16.482950] kunit_try_run_case+0x1a5/0x480 [ 16.482975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.482999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.483024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.483048] ? __kthread_parkme+0x82/0x180 [ 16.483070] ? preempt_count_sub+0x50/0x80 [ 16.483094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.483119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.483154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.483180] kthread+0x337/0x6f0 [ 16.483200] ? trace_preempt_on+0x20/0xc0 [ 16.483224] ? __pfx_kthread+0x10/0x10 [ 16.483245] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.483267] ? calculate_sigpending+0x7b/0xa0 [ 16.483294] ? __pfx_kthread+0x10/0x10 [ 16.483325] ret_from_fork+0x116/0x1d0 [ 16.483345] ? __pfx_kthread+0x10/0x10 [ 16.483366] ret_from_fork_asm+0x1a/0x30 [ 16.483397] </TASK> [ 16.483409] [ 16.494459] Allocated by task 283: [ 16.494672] kasan_save_stack+0x45/0x70 [ 16.494866] kasan_save_track+0x18/0x40 [ 16.495035] kasan_save_alloc_info+0x3b/0x50 [ 16.495259] __kasan_kmalloc+0xb7/0xc0 [ 16.495498] __kmalloc_cache_noprof+0x189/0x420 [ 16.495733] kasan_atomics+0x95/0x310 [ 16.495920] kunit_try_run_case+0x1a5/0x480 [ 16.496112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.496382] kthread+0x337/0x6f0 [ 16.496509] ret_from_fork+0x116/0x1d0 [ 16.496644] ret_from_fork_asm+0x1a/0x30 [ 16.496784] [ 16.496882] The buggy address belongs to the object at ffff8881027c5180 [ 16.496882] which belongs to the cache kmalloc-64 of size 64 [ 16.497420] The buggy address is located 0 bytes to the right of [ 16.497420] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.497832] [ 16.497953] The buggy address belongs to the physical page: [ 16.498224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.498789] flags: 0x200000000000000(node=0|zone=2) [ 16.498978] page_type: f5(slab) [ 16.499183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.499534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.499854] page dumped because: kasan: bad access detected [ 16.500076] [ 16.500197] Memory state around the buggy address: [ 16.500431] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.500761] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.500993] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.501259] ^ [ 16.501493] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.501770] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.502258] ================================================================== [ 15.720850] ================================================================== [ 15.721238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.721871] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.722158] [ 15.722280] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.722328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.722342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.722367] Call Trace: [ 15.722385] <TASK> [ 15.722403] dump_stack_lvl+0x73/0xb0 [ 15.722433] print_report+0xd1/0x610 [ 15.722456] ? __virt_addr_valid+0x1db/0x2d0 [ 15.722481] ? kasan_atomics_helper+0xde0/0x5450 [ 15.722503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.722526] ? kasan_atomics_helper+0xde0/0x5450 [ 15.722548] kasan_report+0x141/0x180 [ 15.722571] ? kasan_atomics_helper+0xde0/0x5450 [ 15.722598] kasan_check_range+0x10c/0x1c0 [ 15.722623] __kasan_check_write+0x18/0x20 [ 15.722643] kasan_atomics_helper+0xde0/0x5450 [ 15.722666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.722690] ? kasan_save_alloc_info+0x3b/0x50 [ 15.722714] ? kasan_save_stack+0x45/0x70 [ 15.722738] kasan_atomics+0x1dc/0x310 [ 15.722761] ? __pfx_kasan_atomics+0x10/0x10 [ 15.722786] ? __pfx_read_tsc+0x10/0x10 [ 15.722808] ? ktime_get_ts64+0x86/0x230 [ 15.722833] kunit_try_run_case+0x1a5/0x480 [ 15.722859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.722883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.722910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.722937] ? __kthread_parkme+0x82/0x180 [ 15.722959] ? preempt_count_sub+0x50/0x80 [ 15.722985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.723035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.723061] kthread+0x337/0x6f0 [ 15.723082] ? trace_preempt_on+0x20/0xc0 [ 15.723106] ? __pfx_kthread+0x10/0x10 [ 15.723128] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.723160] ? calculate_sigpending+0x7b/0xa0 [ 15.723187] ? __pfx_kthread+0x10/0x10 [ 15.723210] ret_from_fork+0x116/0x1d0 [ 15.723230] ? __pfx_kthread+0x10/0x10 [ 15.723311] ret_from_fork_asm+0x1a/0x30 [ 15.723348] </TASK> [ 15.723361] [ 15.733430] Allocated by task 283: [ 15.733593] kasan_save_stack+0x45/0x70 [ 15.733931] kasan_save_track+0x18/0x40 [ 15.734253] kasan_save_alloc_info+0x3b/0x50 [ 15.734542] __kasan_kmalloc+0xb7/0xc0 [ 15.734747] __kmalloc_cache_noprof+0x189/0x420 [ 15.734944] kasan_atomics+0x95/0x310 [ 15.735233] kunit_try_run_case+0x1a5/0x480 [ 15.735738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.736100] kthread+0x337/0x6f0 [ 15.736289] ret_from_fork+0x116/0x1d0 [ 15.736614] ret_from_fork_asm+0x1a/0x30 [ 15.736810] [ 15.737022] The buggy address belongs to the object at ffff8881027c5180 [ 15.737022] which belongs to the cache kmalloc-64 of size 64 [ 15.737621] The buggy address is located 0 bytes to the right of [ 15.737621] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.738437] [ 15.738521] The buggy address belongs to the physical page: [ 15.738772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.739136] flags: 0x200000000000000(node=0|zone=2) [ 15.739719] page_type: f5(slab) [ 15.739968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.740434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.740751] page dumped because: kasan: bad access detected [ 15.740979] [ 15.741236] Memory state around the buggy address: [ 15.741551] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.742013] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.742449] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.742735] ^ [ 15.743092] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.743469] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.743726] ================================================================== [ 16.140086] ================================================================== [ 16.140484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.140830] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.141168] [ 16.141271] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.141316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.141329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.141351] Call Trace: [ 16.141367] <TASK> [ 16.141383] dump_stack_lvl+0x73/0xb0 [ 16.141409] print_report+0xd1/0x610 [ 16.141442] ? __virt_addr_valid+0x1db/0x2d0 [ 16.141465] ? kasan_atomics_helper+0x164f/0x5450 [ 16.141487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.141521] ? kasan_atomics_helper+0x164f/0x5450 [ 16.141543] kasan_report+0x141/0x180 [ 16.141567] ? kasan_atomics_helper+0x164f/0x5450 [ 16.141595] kasan_check_range+0x10c/0x1c0 [ 16.141620] __kasan_check_write+0x18/0x20 [ 16.141651] kasan_atomics_helper+0x164f/0x5450 [ 16.141676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.141700] ? kasan_save_alloc_info+0x3b/0x50 [ 16.141744] ? kasan_save_stack+0x45/0x70 [ 16.141768] kasan_atomics+0x1dc/0x310 [ 16.141792] ? __pfx_kasan_atomics+0x10/0x10 [ 16.141826] ? __pfx_read_tsc+0x10/0x10 [ 16.141848] ? ktime_get_ts64+0x86/0x230 [ 16.141873] kunit_try_run_case+0x1a5/0x480 [ 16.141900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.141924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.141957] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.141981] ? __kthread_parkme+0x82/0x180 [ 16.142003] ? preempt_count_sub+0x50/0x80 [ 16.142037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.142062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.142086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.142118] kthread+0x337/0x6f0 [ 16.142138] ? trace_preempt_on+0x20/0xc0 [ 16.142176] ? __pfx_kthread+0x10/0x10 [ 16.142198] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.142220] ? calculate_sigpending+0x7b/0xa0 [ 16.142245] ? __pfx_kthread+0x10/0x10 [ 16.142267] ret_from_fork+0x116/0x1d0 [ 16.142287] ? __pfx_kthread+0x10/0x10 [ 16.142309] ret_from_fork_asm+0x1a/0x30 [ 16.142341] </TASK> [ 16.142355] [ 16.150305] Allocated by task 283: [ 16.150519] kasan_save_stack+0x45/0x70 [ 16.150714] kasan_save_track+0x18/0x40 [ 16.150902] kasan_save_alloc_info+0x3b/0x50 [ 16.151152] __kasan_kmalloc+0xb7/0xc0 [ 16.151362] __kmalloc_cache_noprof+0x189/0x420 [ 16.151576] kasan_atomics+0x95/0x310 [ 16.151772] kunit_try_run_case+0x1a5/0x480 [ 16.151983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.152238] kthread+0x337/0x6f0 [ 16.152483] ret_from_fork+0x116/0x1d0 [ 16.152620] ret_from_fork_asm+0x1a/0x30 [ 16.152763] [ 16.152837] The buggy address belongs to the object at ffff8881027c5180 [ 16.152837] which belongs to the cache kmalloc-64 of size 64 [ 16.153242] The buggy address is located 0 bytes to the right of [ 16.153242] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.153816] [ 16.153918] The buggy address belongs to the physical page: [ 16.154446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.154800] flags: 0x200000000000000(node=0|zone=2) [ 16.155029] page_type: f5(slab) [ 16.155222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.155573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.155893] page dumped because: kasan: bad access detected [ 16.156071] [ 16.156515] Memory state around the buggy address: [ 16.157174] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.157918] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.158451] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.158670] ^ [ 16.158829] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.159050] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.159683] ================================================================== [ 16.034039] ================================================================== [ 16.034377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 16.034667] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.034993] [ 16.035090] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.035134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.035157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.035180] Call Trace: [ 16.035194] <TASK> [ 16.035210] dump_stack_lvl+0x73/0xb0 [ 16.035238] print_report+0xd1/0x610 [ 16.035261] ? __virt_addr_valid+0x1db/0x2d0 [ 16.035284] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.035306] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.035340] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.035362] kasan_report+0x141/0x180 [ 16.035385] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.035411] __asan_report_load8_noabort+0x18/0x20 [ 16.035437] kasan_atomics_helper+0x4eae/0x5450 [ 16.035460] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.035485] ? kasan_save_alloc_info+0x3b/0x50 [ 16.035509] ? kasan_save_stack+0x45/0x70 [ 16.035533] kasan_atomics+0x1dc/0x310 [ 16.035557] ? __pfx_kasan_atomics+0x10/0x10 [ 16.035581] ? __pfx_read_tsc+0x10/0x10 [ 16.035603] ? ktime_get_ts64+0x86/0x230 [ 16.035628] kunit_try_run_case+0x1a5/0x480 [ 16.035653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.035677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.035701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.035724] ? __kthread_parkme+0x82/0x180 [ 16.035746] ? preempt_count_sub+0x50/0x80 [ 16.035771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.035796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.035819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.035845] kthread+0x337/0x6f0 [ 16.035865] ? trace_preempt_on+0x20/0xc0 [ 16.035889] ? __pfx_kthread+0x10/0x10 [ 16.035911] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.035933] ? calculate_sigpending+0x7b/0xa0 [ 16.035957] ? __pfx_kthread+0x10/0x10 [ 16.035979] ret_from_fork+0x116/0x1d0 [ 16.035999] ? __pfx_kthread+0x10/0x10 [ 16.036020] ret_from_fork_asm+0x1a/0x30 [ 16.036051] </TASK> [ 16.036064] [ 16.043302] Allocated by task 283: [ 16.043441] kasan_save_stack+0x45/0x70 [ 16.043589] kasan_save_track+0x18/0x40 [ 16.043728] kasan_save_alloc_info+0x3b/0x50 [ 16.043879] __kasan_kmalloc+0xb7/0xc0 [ 16.044071] __kmalloc_cache_noprof+0x189/0x420 [ 16.044336] kasan_atomics+0x95/0x310 [ 16.044525] kunit_try_run_case+0x1a5/0x480 [ 16.044975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.045237] kthread+0x337/0x6f0 [ 16.045404] ret_from_fork+0x116/0x1d0 [ 16.045592] ret_from_fork_asm+0x1a/0x30 [ 16.045790] [ 16.045888] The buggy address belongs to the object at ffff8881027c5180 [ 16.045888] which belongs to the cache kmalloc-64 of size 64 [ 16.046374] The buggy address is located 0 bytes to the right of [ 16.046374] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.046754] [ 16.046906] The buggy address belongs to the physical page: [ 16.047169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.047798] flags: 0x200000000000000(node=0|zone=2) [ 16.048020] page_type: f5(slab) [ 16.048154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.048397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.048628] page dumped because: kasan: bad access detected [ 16.048804] [ 16.048876] Memory state around the buggy address: [ 16.049035] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.049266] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.049487] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.049960] ^ [ 16.050195] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.050796] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.051111] ================================================================== [ 16.405615] ================================================================== [ 16.406536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.407291] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.407984] [ 16.408236] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.408283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.408315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.408343] Call Trace: [ 16.408365] <TASK> [ 16.408385] dump_stack_lvl+0x73/0xb0 [ 16.408414] print_report+0xd1/0x610 [ 16.408437] ? __virt_addr_valid+0x1db/0x2d0 [ 16.408461] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.408483] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.408506] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.408528] kasan_report+0x141/0x180 [ 16.408551] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.408577] kasan_check_range+0x10c/0x1c0 [ 16.408601] __kasan_check_write+0x18/0x20 [ 16.408621] kasan_atomics_helper+0x1e12/0x5450 [ 16.408644] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.408669] ? kasan_save_alloc_info+0x3b/0x50 [ 16.408693] ? kasan_save_stack+0x45/0x70 [ 16.408717] kasan_atomics+0x1dc/0x310 [ 16.408740] ? __pfx_kasan_atomics+0x10/0x10 [ 16.408765] ? __pfx_read_tsc+0x10/0x10 [ 16.408787] ? ktime_get_ts64+0x86/0x230 [ 16.408812] kunit_try_run_case+0x1a5/0x480 [ 16.408838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.408862] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.408886] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.408910] ? __kthread_parkme+0x82/0x180 [ 16.408931] ? preempt_count_sub+0x50/0x80 [ 16.408956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.408980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.409005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.409030] kthread+0x337/0x6f0 [ 16.409049] ? trace_preempt_on+0x20/0xc0 [ 16.409073] ? __pfx_kthread+0x10/0x10 [ 16.409094] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.409116] ? calculate_sigpending+0x7b/0xa0 [ 16.409140] ? __pfx_kthread+0x10/0x10 [ 16.409175] ret_from_fork+0x116/0x1d0 [ 16.409194] ? __pfx_kthread+0x10/0x10 [ 16.409217] ret_from_fork_asm+0x1a/0x30 [ 16.409247] </TASK> [ 16.409259] [ 16.421209] Allocated by task 283: [ 16.421342] kasan_save_stack+0x45/0x70 [ 16.421489] kasan_save_track+0x18/0x40 [ 16.421799] kasan_save_alloc_info+0x3b/0x50 [ 16.422016] __kasan_kmalloc+0xb7/0xc0 [ 16.422219] __kmalloc_cache_noprof+0x189/0x420 [ 16.422537] kasan_atomics+0x95/0x310 [ 16.422672] kunit_try_run_case+0x1a5/0x480 [ 16.423018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.423282] kthread+0x337/0x6f0 [ 16.423446] ret_from_fork+0x116/0x1d0 [ 16.423610] ret_from_fork_asm+0x1a/0x30 [ 16.423781] [ 16.423855] The buggy address belongs to the object at ffff8881027c5180 [ 16.423855] which belongs to the cache kmalloc-64 of size 64 [ 16.424375] The buggy address is located 0 bytes to the right of [ 16.424375] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.424855] [ 16.424949] The buggy address belongs to the physical page: [ 16.425127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.425381] flags: 0x200000000000000(node=0|zone=2) [ 16.425715] page_type: f5(slab) [ 16.425884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.426238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.426629] page dumped because: kasan: bad access detected [ 16.426855] [ 16.426957] Memory state around the buggy address: [ 16.427154] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.427375] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.427665] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.427989] ^ [ 16.428225] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.428553] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.428841] ================================================================== [ 16.451716] ================================================================== [ 16.452485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.452958] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.453302] [ 16.453508] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.453556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.453581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.453606] Call Trace: [ 16.453626] <TASK> [ 16.453645] dump_stack_lvl+0x73/0xb0 [ 16.453676] print_report+0xd1/0x610 [ 16.453699] ? __virt_addr_valid+0x1db/0x2d0 [ 16.453724] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.453756] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.453780] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.453803] kasan_report+0x141/0x180 [ 16.453836] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.453863] kasan_check_range+0x10c/0x1c0 [ 16.453887] __kasan_check_write+0x18/0x20 [ 16.453907] kasan_atomics_helper+0x1f43/0x5450 [ 16.453930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.453953] ? kasan_save_alloc_info+0x3b/0x50 [ 16.453977] ? kasan_save_stack+0x45/0x70 [ 16.454001] kasan_atomics+0x1dc/0x310 [ 16.454024] ? __pfx_kasan_atomics+0x10/0x10 [ 16.454049] ? __pfx_read_tsc+0x10/0x10 [ 16.454074] ? ktime_get_ts64+0x86/0x230 [ 16.454099] kunit_try_run_case+0x1a5/0x480 [ 16.454125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.454157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.454181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.454206] ? __kthread_parkme+0x82/0x180 [ 16.454227] ? preempt_count_sub+0x50/0x80 [ 16.454253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.454278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.454320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.454346] kthread+0x337/0x6f0 [ 16.454365] ? trace_preempt_on+0x20/0xc0 [ 16.454389] ? __pfx_kthread+0x10/0x10 [ 16.454411] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.454434] ? calculate_sigpending+0x7b/0xa0 [ 16.454460] ? __pfx_kthread+0x10/0x10 [ 16.454482] ret_from_fork+0x116/0x1d0 [ 16.454502] ? __pfx_kthread+0x10/0x10 [ 16.454524] ret_from_fork_asm+0x1a/0x30 [ 16.454555] </TASK> [ 16.454567] [ 16.467220] Allocated by task 283: [ 16.467507] kasan_save_stack+0x45/0x70 [ 16.467880] kasan_save_track+0x18/0x40 [ 16.468265] kasan_save_alloc_info+0x3b/0x50 [ 16.468689] __kasan_kmalloc+0xb7/0xc0 [ 16.469047] __kmalloc_cache_noprof+0x189/0x420 [ 16.469493] kasan_atomics+0x95/0x310 [ 16.469638] kunit_try_run_case+0x1a5/0x480 [ 16.469975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.470482] kthread+0x337/0x6f0 [ 16.470726] ret_from_fork+0x116/0x1d0 [ 16.470863] ret_from_fork_asm+0x1a/0x30 [ 16.471006] [ 16.471081] The buggy address belongs to the object at ffff8881027c5180 [ 16.471081] which belongs to the cache kmalloc-64 of size 64 [ 16.471789] The buggy address is located 0 bytes to the right of [ 16.471789] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.472905] [ 16.473088] The buggy address belongs to the physical page: [ 16.473787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.474520] flags: 0x200000000000000(node=0|zone=2) [ 16.474941] page_type: f5(slab) [ 16.475067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.475328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.475797] page dumped because: kasan: bad access detected [ 16.476229] [ 16.476303] Memory state around the buggy address: [ 16.476469] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.476690] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.476911] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.477130] ^ [ 16.477592] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.478400] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.479013] ================================================================== [ 15.634752] ================================================================== [ 15.635036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.635275] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.635630] [ 15.635742] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.636167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.636182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.636228] Call Trace: [ 15.636245] <TASK> [ 15.636263] dump_stack_lvl+0x73/0xb0 [ 15.636295] print_report+0xd1/0x610 [ 15.636330] ? __virt_addr_valid+0x1db/0x2d0 [ 15.636352] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.636373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.636397] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.636437] kasan_report+0x141/0x180 [ 15.636461] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.636487] kasan_check_range+0x10c/0x1c0 [ 15.636511] __kasan_check_write+0x18/0x20 [ 15.636530] kasan_atomics_helper+0xb6a/0x5450 [ 15.636553] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.636577] ? kasan_save_alloc_info+0x3b/0x50 [ 15.636602] ? kasan_save_stack+0x45/0x70 [ 15.636626] kasan_atomics+0x1dc/0x310 [ 15.636666] ? __pfx_kasan_atomics+0x10/0x10 [ 15.636691] ? __pfx_read_tsc+0x10/0x10 [ 15.636713] ? ktime_get_ts64+0x86/0x230 [ 15.636739] kunit_try_run_case+0x1a5/0x480 [ 15.636765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.636789] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.636813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.636913] ? __kthread_parkme+0x82/0x180 [ 15.636939] ? preempt_count_sub+0x50/0x80 [ 15.636964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.636988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.637013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.637037] kthread+0x337/0x6f0 [ 15.637100] ? trace_preempt_on+0x20/0xc0 [ 15.637152] ? __pfx_kthread+0x10/0x10 [ 15.637189] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.637214] ? calculate_sigpending+0x7b/0xa0 [ 15.637253] ? __pfx_kthread+0x10/0x10 [ 15.637288] ret_from_fork+0x116/0x1d0 [ 15.637308] ? __pfx_kthread+0x10/0x10 [ 15.637330] ret_from_fork_asm+0x1a/0x30 [ 15.637361] </TASK> [ 15.637373] [ 15.646678] Allocated by task 283: [ 15.646948] kasan_save_stack+0x45/0x70 [ 15.647180] kasan_save_track+0x18/0x40 [ 15.647375] kasan_save_alloc_info+0x3b/0x50 [ 15.647634] __kasan_kmalloc+0xb7/0xc0 [ 15.647832] __kmalloc_cache_noprof+0x189/0x420 [ 15.648124] kasan_atomics+0x95/0x310 [ 15.648314] kunit_try_run_case+0x1a5/0x480 [ 15.648532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.648772] kthread+0x337/0x6f0 [ 15.648990] ret_from_fork+0x116/0x1d0 [ 15.649212] ret_from_fork_asm+0x1a/0x30 [ 15.649428] [ 15.649526] The buggy address belongs to the object at ffff8881027c5180 [ 15.649526] which belongs to the cache kmalloc-64 of size 64 [ 15.650010] The buggy address is located 0 bytes to the right of [ 15.650010] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.650610] [ 15.650729] The buggy address belongs to the physical page: [ 15.651079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.651719] flags: 0x200000000000000(node=0|zone=2) [ 15.652101] page_type: f5(slab) [ 15.652276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.652928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.653279] page dumped because: kasan: bad access detected [ 15.653551] [ 15.653624] Memory state around the buggy address: [ 15.653781] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.654192] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.654663] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.655045] ^ [ 15.655265] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.655691] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.656073] ================================================================== [ 15.677976] ================================================================== [ 15.678391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.678799] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.679182] [ 15.679300] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.679347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.679361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.679385] Call Trace: [ 15.679403] <TASK> [ 15.679421] dump_stack_lvl+0x73/0xb0 [ 15.679450] print_report+0xd1/0x610 [ 15.679473] ? __virt_addr_valid+0x1db/0x2d0 [ 15.679496] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.679519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.679542] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.679565] kasan_report+0x141/0x180 [ 15.679587] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.679614] __asan_report_load4_noabort+0x18/0x20 [ 15.679640] kasan_atomics_helper+0x4a84/0x5450 [ 15.679663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.679687] ? kasan_save_alloc_info+0x3b/0x50 [ 15.679713] ? kasan_save_stack+0x45/0x70 [ 15.679739] kasan_atomics+0x1dc/0x310 [ 15.679762] ? __pfx_kasan_atomics+0x10/0x10 [ 15.679787] ? __pfx_read_tsc+0x10/0x10 [ 15.679809] ? ktime_get_ts64+0x86/0x230 [ 15.679835] kunit_try_run_case+0x1a5/0x480 [ 15.679861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.679884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.679909] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.679933] ? __kthread_parkme+0x82/0x180 [ 15.679954] ? preempt_count_sub+0x50/0x80 [ 15.679979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.680026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.680063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.680101] kthread+0x337/0x6f0 [ 15.680121] ? trace_preempt_on+0x20/0xc0 [ 15.680167] ? __pfx_kthread+0x10/0x10 [ 15.680202] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.680237] ? calculate_sigpending+0x7b/0xa0 [ 15.680275] ? __pfx_kthread+0x10/0x10 [ 15.680297] ret_from_fork+0x116/0x1d0 [ 15.680334] ? __pfx_kthread+0x10/0x10 [ 15.680368] ret_from_fork_asm+0x1a/0x30 [ 15.680412] </TASK> [ 15.680436] [ 15.689221] Allocated by task 283: [ 15.689413] kasan_save_stack+0x45/0x70 [ 15.689618] kasan_save_track+0x18/0x40 [ 15.689805] kasan_save_alloc_info+0x3b/0x50 [ 15.690268] __kasan_kmalloc+0xb7/0xc0 [ 15.690704] __kmalloc_cache_noprof+0x189/0x420 [ 15.690937] kasan_atomics+0x95/0x310 [ 15.691224] kunit_try_run_case+0x1a5/0x480 [ 15.691565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.691741] kthread+0x337/0x6f0 [ 15.691908] ret_from_fork+0x116/0x1d0 [ 15.692105] ret_from_fork_asm+0x1a/0x30 [ 15.692369] [ 15.692470] The buggy address belongs to the object at ffff8881027c5180 [ 15.692470] which belongs to the cache kmalloc-64 of size 64 [ 15.693027] The buggy address is located 0 bytes to the right of [ 15.693027] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.693626] [ 15.693750] The buggy address belongs to the physical page: [ 15.694206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.694627] flags: 0x200000000000000(node=0|zone=2) [ 15.694923] page_type: f5(slab) [ 15.695100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.695831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.696082] page dumped because: kasan: bad access detected [ 15.696399] [ 15.696505] Memory state around the buggy address: [ 15.696759] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.697184] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.697403] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.697612] ^ [ 15.698025] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698382] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698720] ================================================================== [ 15.268390] ================================================================== [ 15.268736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.269117] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.269449] [ 15.269655] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.269698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.269710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.269732] Call Trace: [ 15.269751] <TASK> [ 15.269767] dump_stack_lvl+0x73/0xb0 [ 15.269796] print_report+0xd1/0x610 [ 15.269818] ? __virt_addr_valid+0x1db/0x2d0 [ 15.269840] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.269861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.269904] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.270186] kasan_report+0x141/0x180 [ 15.270208] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.270235] __asan_report_load4_noabort+0x18/0x20 [ 15.270259] kasan_atomics_helper+0x4b88/0x5450 [ 15.270282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.270340] ? kasan_save_alloc_info+0x3b/0x50 [ 15.270363] ? kasan_save_stack+0x45/0x70 [ 15.270387] kasan_atomics+0x1dc/0x310 [ 15.270409] ? __pfx_kasan_atomics+0x10/0x10 [ 15.270434] ? __pfx_read_tsc+0x10/0x10 [ 15.270454] ? ktime_get_ts64+0x86/0x230 [ 15.270478] kunit_try_run_case+0x1a5/0x480 [ 15.270520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.270543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.270568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.270591] ? __kthread_parkme+0x82/0x180 [ 15.270611] ? preempt_count_sub+0x50/0x80 [ 15.270635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.270659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.270682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.270706] kthread+0x337/0x6f0 [ 15.270725] ? trace_preempt_on+0x20/0xc0 [ 15.270748] ? __pfx_kthread+0x10/0x10 [ 15.270768] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.270790] ? calculate_sigpending+0x7b/0xa0 [ 15.270814] ? __pfx_kthread+0x10/0x10 [ 15.270835] ret_from_fork+0x116/0x1d0 [ 15.270900] ? __pfx_kthread+0x10/0x10 [ 15.270924] ret_from_fork_asm+0x1a/0x30 [ 15.270954] </TASK> [ 15.270964] [ 15.279488] Allocated by task 283: [ 15.279660] kasan_save_stack+0x45/0x70 [ 15.279891] kasan_save_track+0x18/0x40 [ 15.280114] kasan_save_alloc_info+0x3b/0x50 [ 15.280305] __kasan_kmalloc+0xb7/0xc0 [ 15.280516] __kmalloc_cache_noprof+0x189/0x420 [ 15.280737] kasan_atomics+0x95/0x310 [ 15.280918] kunit_try_run_case+0x1a5/0x480 [ 15.281131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.281698] kthread+0x337/0x6f0 [ 15.281898] ret_from_fork+0x116/0x1d0 [ 15.282081] ret_from_fork_asm+0x1a/0x30 [ 15.282330] [ 15.282422] The buggy address belongs to the object at ffff8881027c5180 [ 15.282422] which belongs to the cache kmalloc-64 of size 64 [ 15.283234] The buggy address is located 0 bytes to the right of [ 15.283234] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.283827] [ 15.283984] The buggy address belongs to the physical page: [ 15.284311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.284684] flags: 0x200000000000000(node=0|zone=2) [ 15.285003] page_type: f5(slab) [ 15.285230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.285624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.285959] page dumped because: kasan: bad access detected [ 15.286631] [ 15.286713] Memory state around the buggy address: [ 15.286876] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.287098] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.287429] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.288042] ^ [ 15.288226] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288781] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.289224] ================================================================== [ 16.160581] ================================================================== [ 16.161392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.162036] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.162779] [ 16.162964] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.163008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.163034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.163058] Call Trace: [ 16.163076] <TASK> [ 16.163104] dump_stack_lvl+0x73/0xb0 [ 16.163132] print_report+0xd1/0x610 [ 16.163171] ? __virt_addr_valid+0x1db/0x2d0 [ 16.163193] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.163216] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.163253] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.163276] kasan_report+0x141/0x180 [ 16.163298] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.163335] kasan_check_range+0x10c/0x1c0 [ 16.163360] __kasan_check_write+0x18/0x20 [ 16.163380] kasan_atomics_helper+0x16e7/0x5450 [ 16.163402] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.163426] ? kasan_save_alloc_info+0x3b/0x50 [ 16.163450] ? kasan_save_stack+0x45/0x70 [ 16.163474] kasan_atomics+0x1dc/0x310 [ 16.163506] ? __pfx_kasan_atomics+0x10/0x10 [ 16.163530] ? __pfx_read_tsc+0x10/0x10 [ 16.163552] ? ktime_get_ts64+0x86/0x230 [ 16.163586] kunit_try_run_case+0x1a5/0x480 [ 16.163611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.163635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.163667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.163691] ? __kthread_parkme+0x82/0x180 [ 16.163712] ? preempt_count_sub+0x50/0x80 [ 16.163747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.163771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.163796] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.163820] kthread+0x337/0x6f0 [ 16.163841] ? trace_preempt_on+0x20/0xc0 [ 16.163874] ? __pfx_kthread+0x10/0x10 [ 16.163895] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.163918] ? calculate_sigpending+0x7b/0xa0 [ 16.163952] ? __pfx_kthread+0x10/0x10 [ 16.163975] ret_from_fork+0x116/0x1d0 [ 16.163994] ? __pfx_kthread+0x10/0x10 [ 16.164016] ret_from_fork_asm+0x1a/0x30 [ 16.164056] </TASK> [ 16.164068] [ 16.177129] Allocated by task 283: [ 16.177517] kasan_save_stack+0x45/0x70 [ 16.177685] kasan_save_track+0x18/0x40 [ 16.177824] kasan_save_alloc_info+0x3b/0x50 [ 16.177978] __kasan_kmalloc+0xb7/0xc0 [ 16.178115] __kmalloc_cache_noprof+0x189/0x420 [ 16.178450] kasan_atomics+0x95/0x310 [ 16.178752] kunit_try_run_case+0x1a5/0x480 [ 16.179055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.179501] kthread+0x337/0x6f0 [ 16.179706] ret_from_fork+0x116/0x1d0 [ 16.180067] ret_from_fork_asm+0x1a/0x30 [ 16.180288] [ 16.180480] The buggy address belongs to the object at ffff8881027c5180 [ 16.180480] which belongs to the cache kmalloc-64 of size 64 [ 16.181105] The buggy address is located 0 bytes to the right of [ 16.181105] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.181689] [ 16.181851] The buggy address belongs to the physical page: [ 16.182236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.182665] flags: 0x200000000000000(node=0|zone=2) [ 16.183113] page_type: f5(slab) [ 16.183248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.183548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.184228] page dumped because: kasan: bad access detected [ 16.184661] [ 16.184737] Memory state around the buggy address: [ 16.185113] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.185673] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.185896] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.186115] ^ [ 16.186288] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.186646] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.186949] ================================================================== [ 16.337654] ================================================================== [ 16.338064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.338504] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.338852] [ 16.338987] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.339031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.339044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.339076] Call Trace: [ 16.339093] <TASK> [ 16.339108] dump_stack_lvl+0x73/0xb0 [ 16.339159] print_report+0xd1/0x610 [ 16.339182] ? __virt_addr_valid+0x1db/0x2d0 [ 16.339206] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.339240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.339264] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.339287] kasan_report+0x141/0x180 [ 16.339331] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.339358] __asan_report_load8_noabort+0x18/0x20 [ 16.339383] kasan_atomics_helper+0x4f30/0x5450 [ 16.339407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.339431] ? kasan_save_alloc_info+0x3b/0x50 [ 16.339455] ? kasan_save_stack+0x45/0x70 [ 16.339479] kasan_atomics+0x1dc/0x310 [ 16.339512] ? __pfx_kasan_atomics+0x10/0x10 [ 16.339537] ? __pfx_read_tsc+0x10/0x10 [ 16.339559] ? ktime_get_ts64+0x86/0x230 [ 16.339596] kunit_try_run_case+0x1a5/0x480 [ 16.339622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.339646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.339681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.339705] ? __kthread_parkme+0x82/0x180 [ 16.339737] ? preempt_count_sub+0x50/0x80 [ 16.339761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.339786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.339821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.339846] kthread+0x337/0x6f0 [ 16.339866] ? trace_preempt_on+0x20/0xc0 [ 16.339902] ? __pfx_kthread+0x10/0x10 [ 16.339924] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.339947] ? calculate_sigpending+0x7b/0xa0 [ 16.339982] ? __pfx_kthread+0x10/0x10 [ 16.340004] ret_from_fork+0x116/0x1d0 [ 16.340023] ? __pfx_kthread+0x10/0x10 [ 16.340057] ret_from_fork_asm+0x1a/0x30 [ 16.340088] </TASK> [ 16.340099] [ 16.347230] Allocated by task 283: [ 16.347445] kasan_save_stack+0x45/0x70 [ 16.347650] kasan_save_track+0x18/0x40 [ 16.347842] kasan_save_alloc_info+0x3b/0x50 [ 16.348055] __kasan_kmalloc+0xb7/0xc0 [ 16.348256] __kmalloc_cache_noprof+0x189/0x420 [ 16.348540] kasan_atomics+0x95/0x310 [ 16.348755] kunit_try_run_case+0x1a5/0x480 [ 16.348970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.349227] kthread+0x337/0x6f0 [ 16.349423] ret_from_fork+0x116/0x1d0 [ 16.349564] ret_from_fork_asm+0x1a/0x30 [ 16.349709] [ 16.349783] The buggy address belongs to the object at ffff8881027c5180 [ 16.349783] which belongs to the cache kmalloc-64 of size 64 [ 16.350157] The buggy address is located 0 bytes to the right of [ 16.350157] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.350754] [ 16.350855] The buggy address belongs to the physical page: [ 16.351115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.351531] flags: 0x200000000000000(node=0|zone=2) [ 16.351776] page_type: f5(slab) [ 16.351983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.352337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.352689] page dumped because: kasan: bad access detected [ 16.352952] [ 16.353027] Memory state around the buggy address: [ 16.353197] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.353444] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.353701] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.354039] ^ [ 16.354327] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.354672] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.355010] ================================================================== [ 15.213086] ================================================================== [ 15.214138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.214584] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.215016] [ 15.215111] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.215391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.215583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.215608] Call Trace: [ 15.215622] <TASK> [ 15.215640] dump_stack_lvl+0x73/0xb0 [ 15.215673] print_report+0xd1/0x610 [ 15.215697] ? __virt_addr_valid+0x1db/0x2d0 [ 15.215720] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.215742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.215766] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.215787] kasan_report+0x141/0x180 [ 15.215809] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.215834] __asan_report_load4_noabort+0x18/0x20 [ 15.215923] kasan_atomics_helper+0x4bbc/0x5450 [ 15.215946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.215968] ? kasan_save_alloc_info+0x3b/0x50 [ 15.215991] ? kasan_save_stack+0x45/0x70 [ 15.216015] kasan_atomics+0x1dc/0x310 [ 15.216037] ? __pfx_kasan_atomics+0x10/0x10 [ 15.216060] ? __pfx_read_tsc+0x10/0x10 [ 15.216081] ? ktime_get_ts64+0x86/0x230 [ 15.216106] kunit_try_run_case+0x1a5/0x480 [ 15.216131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.216166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.216190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.216212] ? __kthread_parkme+0x82/0x180 [ 15.216232] ? preempt_count_sub+0x50/0x80 [ 15.216255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.216278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.216301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.216338] kthread+0x337/0x6f0 [ 15.216357] ? trace_preempt_on+0x20/0xc0 [ 15.216380] ? __pfx_kthread+0x10/0x10 [ 15.216400] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.216422] ? calculate_sigpending+0x7b/0xa0 [ 15.216445] ? __pfx_kthread+0x10/0x10 [ 15.216467] ret_from_fork+0x116/0x1d0 [ 15.216486] ? __pfx_kthread+0x10/0x10 [ 15.216506] ret_from_fork_asm+0x1a/0x30 [ 15.216537] </TASK> [ 15.216548] [ 15.227849] Allocated by task 283: [ 15.228269] kasan_save_stack+0x45/0x70 [ 15.228656] kasan_save_track+0x18/0x40 [ 15.228829] kasan_save_alloc_info+0x3b/0x50 [ 15.229276] __kasan_kmalloc+0xb7/0xc0 [ 15.229611] __kmalloc_cache_noprof+0x189/0x420 [ 15.229837] kasan_atomics+0x95/0x310 [ 15.230224] kunit_try_run_case+0x1a5/0x480 [ 15.230483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.231109] kthread+0x337/0x6f0 [ 15.231432] ret_from_fork+0x116/0x1d0 [ 15.231723] ret_from_fork_asm+0x1a/0x30 [ 15.231977] [ 15.232257] The buggy address belongs to the object at ffff8881027c5180 [ 15.232257] which belongs to the cache kmalloc-64 of size 64 [ 15.232878] The buggy address is located 0 bytes to the right of [ 15.232878] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.233761] [ 15.233913] The buggy address belongs to the physical page: [ 15.234269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.234662] flags: 0x200000000000000(node=0|zone=2) [ 15.235172] page_type: f5(slab) [ 15.235479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.235815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.236334] page dumped because: kasan: bad access detected [ 15.236708] [ 15.236810] Memory state around the buggy address: [ 15.237346] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.237648] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.238155] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.238534] ^ [ 15.238831] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.239365] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.239785] ================================================================== [ 15.868807] ================================================================== [ 15.869056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.869606] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.870278] [ 15.870430] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.870624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.870654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.870679] Call Trace: [ 15.870699] <TASK> [ 15.870839] dump_stack_lvl+0x73/0xb0 [ 15.870892] print_report+0xd1/0x610 [ 15.870915] ? __virt_addr_valid+0x1db/0x2d0 [ 15.870939] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.870960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.870984] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.871006] kasan_report+0x141/0x180 [ 15.871029] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.871055] __asan_report_load4_noabort+0x18/0x20 [ 15.871081] kasan_atomics_helper+0x4a1c/0x5450 [ 15.871105] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.871128] ? kasan_save_alloc_info+0x3b/0x50 [ 15.871163] ? kasan_save_stack+0x45/0x70 [ 15.871186] kasan_atomics+0x1dc/0x310 [ 15.871210] ? __pfx_kasan_atomics+0x10/0x10 [ 15.871235] ? __pfx_read_tsc+0x10/0x10 [ 15.871258] ? ktime_get_ts64+0x86/0x230 [ 15.871283] kunit_try_run_case+0x1a5/0x480 [ 15.871309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.871332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.871359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.871383] ? __kthread_parkme+0x82/0x180 [ 15.871405] ? preempt_count_sub+0x50/0x80 [ 15.871430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.871454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.871478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.871503] kthread+0x337/0x6f0 [ 15.871523] ? trace_preempt_on+0x20/0xc0 [ 15.871548] ? __pfx_kthread+0x10/0x10 [ 15.871570] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.871592] ? calculate_sigpending+0x7b/0xa0 [ 15.871617] ? __pfx_kthread+0x10/0x10 [ 15.871639] ret_from_fork+0x116/0x1d0 [ 15.871659] ? __pfx_kthread+0x10/0x10 [ 15.871682] ret_from_fork_asm+0x1a/0x30 [ 15.871713] </TASK> [ 15.871726] [ 15.882568] Allocated by task 283: [ 15.883100] kasan_save_stack+0x45/0x70 [ 15.883405] kasan_save_track+0x18/0x40 [ 15.883552] kasan_save_alloc_info+0x3b/0x50 [ 15.883902] __kasan_kmalloc+0xb7/0xc0 [ 15.884085] __kmalloc_cache_noprof+0x189/0x420 [ 15.884317] kasan_atomics+0x95/0x310 [ 15.884510] kunit_try_run_case+0x1a5/0x480 [ 15.884709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.884954] kthread+0x337/0x6f0 [ 15.885545] ret_from_fork+0x116/0x1d0 [ 15.885695] ret_from_fork_asm+0x1a/0x30 [ 15.886096] [ 15.886242] The buggy address belongs to the object at ffff8881027c5180 [ 15.886242] which belongs to the cache kmalloc-64 of size 64 [ 15.886822] The buggy address is located 0 bytes to the right of [ 15.886822] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.887597] [ 15.887817] The buggy address belongs to the physical page: [ 15.888099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.888592] flags: 0x200000000000000(node=0|zone=2) [ 15.888800] page_type: f5(slab) [ 15.889110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.889400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.889744] page dumped because: kasan: bad access detected [ 15.889974] [ 15.890125] Memory state around the buggy address: [ 15.890776] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.891251] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.891600] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.892127] ^ [ 15.892359] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.892819] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.893207] ================================================================== [ 15.980636] ================================================================== [ 15.981454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.981748] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.982034] [ 15.982152] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.982199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.982212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.982235] Call Trace: [ 15.982253] <TASK> [ 15.982269] dump_stack_lvl+0x73/0xb0 [ 15.982297] print_report+0xd1/0x610 [ 15.982330] ? __virt_addr_valid+0x1db/0x2d0 [ 15.982355] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.982379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.982403] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.982428] kasan_report+0x141/0x180 [ 15.982451] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.982480] kasan_check_range+0x10c/0x1c0 [ 15.982506] __kasan_check_write+0x18/0x20 [ 15.982526] kasan_atomics_helper+0x12e6/0x5450 [ 15.982550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.982573] ? kasan_save_alloc_info+0x3b/0x50 [ 15.982597] ? kasan_save_stack+0x45/0x70 [ 15.982623] kasan_atomics+0x1dc/0x310 [ 15.982646] ? __pfx_kasan_atomics+0x10/0x10 [ 15.982671] ? __pfx_read_tsc+0x10/0x10 [ 15.982693] ? ktime_get_ts64+0x86/0x230 [ 15.982718] kunit_try_run_case+0x1a5/0x480 [ 15.982745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.982795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.982822] ? __kthread_parkme+0x82/0x180 [ 15.982843] ? preempt_count_sub+0x50/0x80 [ 15.982868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.982920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.982946] kthread+0x337/0x6f0 [ 15.982966] ? trace_preempt_on+0x20/0xc0 [ 15.982990] ? __pfx_kthread+0x10/0x10 [ 15.983012] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.983035] ? calculate_sigpending+0x7b/0xa0 [ 15.983062] ? __pfx_kthread+0x10/0x10 [ 15.983084] ret_from_fork+0x116/0x1d0 [ 15.983105] ? __pfx_kthread+0x10/0x10 [ 15.983126] ret_from_fork_asm+0x1a/0x30 [ 15.983167] </TASK> [ 15.983179] [ 15.990728] Allocated by task 283: [ 15.990862] kasan_save_stack+0x45/0x70 [ 15.991010] kasan_save_track+0x18/0x40 [ 15.991159] kasan_save_alloc_info+0x3b/0x50 [ 15.991376] __kasan_kmalloc+0xb7/0xc0 [ 15.991565] __kmalloc_cache_noprof+0x189/0x420 [ 15.991787] kasan_atomics+0x95/0x310 [ 15.991976] kunit_try_run_case+0x1a5/0x480 [ 15.992158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.992341] kthread+0x337/0x6f0 [ 15.992467] ret_from_fork+0x116/0x1d0 [ 15.992767] ret_from_fork_asm+0x1a/0x30 [ 15.992968] [ 15.993066] The buggy address belongs to the object at ffff8881027c5180 [ 15.993066] which belongs to the cache kmalloc-64 of size 64 [ 15.993809] The buggy address is located 0 bytes to the right of [ 15.993809] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.994195] [ 15.994271] The buggy address belongs to the physical page: [ 15.994449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.994905] flags: 0x200000000000000(node=0|zone=2) [ 15.995151] page_type: f5(slab) [ 15.995329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.995672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.996012] page dumped because: kasan: bad access detected [ 15.996242] [ 15.996344] Memory state around the buggy address: [ 15.996509] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.996732] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.996954] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.997183] ^ [ 15.997500] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997827] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.998162] ================================================================== [ 15.387261] ================================================================== [ 15.387645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.388206] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.388796] [ 15.388963] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.389013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.389026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.389050] Call Trace: [ 15.389070] <TASK> [ 15.389088] dump_stack_lvl+0x73/0xb0 [ 15.389119] print_report+0xd1/0x610 [ 15.389141] ? __virt_addr_valid+0x1db/0x2d0 [ 15.389177] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.389199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.389222] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.389245] kasan_report+0x141/0x180 [ 15.389268] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.389551] __asan_report_store4_noabort+0x1b/0x30 [ 15.389583] kasan_atomics_helper+0x4b3a/0x5450 [ 15.389607] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.389630] ? kasan_save_alloc_info+0x3b/0x50 [ 15.389654] ? kasan_save_stack+0x45/0x70 [ 15.389679] kasan_atomics+0x1dc/0x310 [ 15.389704] ? __pfx_kasan_atomics+0x10/0x10 [ 15.389729] ? __pfx_read_tsc+0x10/0x10 [ 15.389751] ? ktime_get_ts64+0x86/0x230 [ 15.389776] kunit_try_run_case+0x1a5/0x480 [ 15.389801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.389825] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.389850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.389875] ? __kthread_parkme+0x82/0x180 [ 15.389899] ? preempt_count_sub+0x50/0x80 [ 15.389925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.389949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.389974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.389999] kthread+0x337/0x6f0 [ 15.390018] ? trace_preempt_on+0x20/0xc0 [ 15.390042] ? __pfx_kthread+0x10/0x10 [ 15.390064] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.390086] ? calculate_sigpending+0x7b/0xa0 [ 15.390111] ? __pfx_kthread+0x10/0x10 [ 15.390134] ret_from_fork+0x116/0x1d0 [ 15.390164] ? __pfx_kthread+0x10/0x10 [ 15.390186] ret_from_fork_asm+0x1a/0x30 [ 15.390218] </TASK> [ 15.390229] [ 15.400137] Allocated by task 283: [ 15.400498] kasan_save_stack+0x45/0x70 [ 15.400806] kasan_save_track+0x18/0x40 [ 15.400959] kasan_save_alloc_info+0x3b/0x50 [ 15.401227] __kasan_kmalloc+0xb7/0xc0 [ 15.401585] __kmalloc_cache_noprof+0x189/0x420 [ 15.401893] kasan_atomics+0x95/0x310 [ 15.402344] kunit_try_run_case+0x1a5/0x480 [ 15.402563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.402809] kthread+0x337/0x6f0 [ 15.403173] ret_from_fork+0x116/0x1d0 [ 15.403560] ret_from_fork_asm+0x1a/0x30 [ 15.403750] [ 15.403936] The buggy address belongs to the object at ffff8881027c5180 [ 15.403936] which belongs to the cache kmalloc-64 of size 64 [ 15.404627] The buggy address is located 0 bytes to the right of [ 15.404627] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.405289] [ 15.405484] The buggy address belongs to the physical page: [ 15.405720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.406047] flags: 0x200000000000000(node=0|zone=2) [ 15.406545] page_type: f5(slab) [ 15.406692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.407207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.407581] page dumped because: kasan: bad access detected [ 15.408023] [ 15.408106] Memory state around the buggy address: [ 15.408341] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.408616] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.409163] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.409525] ^ [ 15.409738] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410034] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410619] ================================================================== [ 15.240632] ================================================================== [ 15.240951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.241605] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.242422] [ 15.242710] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.242759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.242772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.242794] Call Trace: [ 15.242811] <TASK> [ 15.242828] dump_stack_lvl+0x73/0xb0 [ 15.242857] print_report+0xd1/0x610 [ 15.242879] ? __virt_addr_valid+0x1db/0x2d0 [ 15.242904] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.242925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.242968] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.242989] kasan_report+0x141/0x180 [ 15.243011] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.243037] __asan_report_store4_noabort+0x1b/0x30 [ 15.243061] kasan_atomics_helper+0x4ba2/0x5450 [ 15.243083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.243106] ? kasan_save_alloc_info+0x3b/0x50 [ 15.243129] ? kasan_save_stack+0x45/0x70 [ 15.243163] kasan_atomics+0x1dc/0x310 [ 15.243186] ? __pfx_kasan_atomics+0x10/0x10 [ 15.243209] ? __pfx_read_tsc+0x10/0x10 [ 15.243230] ? ktime_get_ts64+0x86/0x230 [ 15.243254] kunit_try_run_case+0x1a5/0x480 [ 15.243279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.243302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.243325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.243348] ? __kthread_parkme+0x82/0x180 [ 15.243368] ? preempt_count_sub+0x50/0x80 [ 15.243391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.243415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.243438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.243462] kthread+0x337/0x6f0 [ 15.243481] ? trace_preempt_on+0x20/0xc0 [ 15.243504] ? __pfx_kthread+0x10/0x10 [ 15.243524] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.243545] ? calculate_sigpending+0x7b/0xa0 [ 15.243569] ? __pfx_kthread+0x10/0x10 [ 15.243590] ret_from_fork+0x116/0x1d0 [ 15.243609] ? __pfx_kthread+0x10/0x10 [ 15.243629] ret_from_fork_asm+0x1a/0x30 [ 15.243659] </TASK> [ 15.243670] [ 15.258022] Allocated by task 283: [ 15.258174] kasan_save_stack+0x45/0x70 [ 15.258374] kasan_save_track+0x18/0x40 [ 15.258823] kasan_save_alloc_info+0x3b/0x50 [ 15.259281] __kasan_kmalloc+0xb7/0xc0 [ 15.259656] __kmalloc_cache_noprof+0x189/0x420 [ 15.260178] kasan_atomics+0x95/0x310 [ 15.260601] kunit_try_run_case+0x1a5/0x480 [ 15.261088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.261340] kthread+0x337/0x6f0 [ 15.261668] ret_from_fork+0x116/0x1d0 [ 15.262056] ret_from_fork_asm+0x1a/0x30 [ 15.262360] [ 15.262437] The buggy address belongs to the object at ffff8881027c5180 [ 15.262437] which belongs to the cache kmalloc-64 of size 64 [ 15.262787] The buggy address is located 0 bytes to the right of [ 15.262787] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.263414] [ 15.263502] The buggy address belongs to the physical page: [ 15.263716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.264072] flags: 0x200000000000000(node=0|zone=2) [ 15.264328] page_type: f5(slab) [ 15.264504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.264870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.265287] page dumped because: kasan: bad access detected [ 15.265470] [ 15.265571] Memory state around the buggy address: [ 15.265824] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.266076] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.266414] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.266841] ^ [ 15.267012] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.267542] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.267835] ================================================================== [ 16.084192] ================================================================== [ 16.084873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 16.085574] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.086013] [ 16.086213] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.086262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.086275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.086320] Call Trace: [ 16.086352] <TASK> [ 16.086373] dump_stack_lvl+0x73/0xb0 [ 16.086404] print_report+0xd1/0x610 [ 16.086439] ? __virt_addr_valid+0x1db/0x2d0 [ 16.086464] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.086487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.086509] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.086531] kasan_report+0x141/0x180 [ 16.086553] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.086580] __asan_report_store8_noabort+0x1b/0x30 [ 16.086606] kasan_atomics_helper+0x50d4/0x5450 [ 16.086629] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.086653] ? kasan_save_alloc_info+0x3b/0x50 [ 16.086677] ? kasan_save_stack+0x45/0x70 [ 16.086702] kasan_atomics+0x1dc/0x310 [ 16.086726] ? __pfx_kasan_atomics+0x10/0x10 [ 16.086751] ? __pfx_read_tsc+0x10/0x10 [ 16.086773] ? ktime_get_ts64+0x86/0x230 [ 16.086798] kunit_try_run_case+0x1a5/0x480 [ 16.086824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.086847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.086872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.086895] ? __kthread_parkme+0x82/0x180 [ 16.086917] ? preempt_count_sub+0x50/0x80 [ 16.086942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.086966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.086990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.087015] kthread+0x337/0x6f0 [ 16.087035] ? trace_preempt_on+0x20/0xc0 [ 16.087060] ? __pfx_kthread+0x10/0x10 [ 16.087082] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.087104] ? calculate_sigpending+0x7b/0xa0 [ 16.087129] ? __pfx_kthread+0x10/0x10 [ 16.087162] ret_from_fork+0x116/0x1d0 [ 16.087182] ? __pfx_kthread+0x10/0x10 [ 16.087203] ret_from_fork_asm+0x1a/0x30 [ 16.087235] </TASK> [ 16.087247] [ 16.094820] Allocated by task 283: [ 16.094959] kasan_save_stack+0x45/0x70 [ 16.095117] kasan_save_track+0x18/0x40 [ 16.095341] kasan_save_alloc_info+0x3b/0x50 [ 16.095555] __kasan_kmalloc+0xb7/0xc0 [ 16.095745] __kmalloc_cache_noprof+0x189/0x420 [ 16.095969] kasan_atomics+0x95/0x310 [ 16.096246] kunit_try_run_case+0x1a5/0x480 [ 16.096403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.096602] kthread+0x337/0x6f0 [ 16.096774] ret_from_fork+0x116/0x1d0 [ 16.096965] ret_from_fork_asm+0x1a/0x30 [ 16.097201] [ 16.097301] The buggy address belongs to the object at ffff8881027c5180 [ 16.097301] which belongs to the cache kmalloc-64 of size 64 [ 16.097787] The buggy address is located 0 bytes to the right of [ 16.097787] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.098181] [ 16.098306] The buggy address belongs to the physical page: [ 16.098558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.098912] flags: 0x200000000000000(node=0|zone=2) [ 16.099213] page_type: f5(slab) [ 16.099454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.099795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.100060] page dumped because: kasan: bad access detected [ 16.100253] [ 16.100335] Memory state around the buggy address: [ 16.100565] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.100914] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.101268] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.101629] ^ [ 16.101852] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102159] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102452] ================================================================== [ 16.121275] ================================================================== [ 16.121640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.122140] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.122553] [ 16.122657] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.122701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.122714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.122736] Call Trace: [ 16.122753] <TASK> [ 16.122770] dump_stack_lvl+0x73/0xb0 [ 16.122799] print_report+0xd1/0x610 [ 16.122822] ? __virt_addr_valid+0x1db/0x2d0 [ 16.122845] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.122867] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.122890] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.122912] kasan_report+0x141/0x180 [ 16.122934] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.122961] kasan_check_range+0x10c/0x1c0 [ 16.122985] __kasan_check_write+0x18/0x20 [ 16.123004] kasan_atomics_helper+0x15b6/0x5450 [ 16.123034] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.123058] ? kasan_save_alloc_info+0x3b/0x50 [ 16.123082] ? kasan_save_stack+0x45/0x70 [ 16.123106] kasan_atomics+0x1dc/0x310 [ 16.123130] ? __pfx_kasan_atomics+0x10/0x10 [ 16.123164] ? __pfx_read_tsc+0x10/0x10 [ 16.123187] ? ktime_get_ts64+0x86/0x230 [ 16.123212] kunit_try_run_case+0x1a5/0x480 [ 16.123237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.123261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.123285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.123309] ? __kthread_parkme+0x82/0x180 [ 16.123331] ? preempt_count_sub+0x50/0x80 [ 16.123356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.123381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.123405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.123429] kthread+0x337/0x6f0 [ 16.123449] ? trace_preempt_on+0x20/0xc0 [ 16.123473] ? __pfx_kthread+0x10/0x10 [ 16.123505] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.123527] ? calculate_sigpending+0x7b/0xa0 [ 16.123552] ? __pfx_kthread+0x10/0x10 [ 16.123585] ret_from_fork+0x116/0x1d0 [ 16.123604] ? __pfx_kthread+0x10/0x10 [ 16.123625] ret_from_fork_asm+0x1a/0x30 [ 16.123656] </TASK> [ 16.123667] [ 16.131617] Allocated by task 283: [ 16.131783] kasan_save_stack+0x45/0x70 [ 16.131934] kasan_save_track+0x18/0x40 [ 16.132073] kasan_save_alloc_info+0x3b/0x50 [ 16.132235] __kasan_kmalloc+0xb7/0xc0 [ 16.132428] __kmalloc_cache_noprof+0x189/0x420 [ 16.132649] kasan_atomics+0x95/0x310 [ 16.132835] kunit_try_run_case+0x1a5/0x480 [ 16.133121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.133480] kthread+0x337/0x6f0 [ 16.133651] ret_from_fork+0x116/0x1d0 [ 16.133839] ret_from_fork_asm+0x1a/0x30 [ 16.134036] [ 16.134114] The buggy address belongs to the object at ffff8881027c5180 [ 16.134114] which belongs to the cache kmalloc-64 of size 64 [ 16.134817] The buggy address is located 0 bytes to the right of [ 16.134817] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.135407] [ 16.135490] The buggy address belongs to the physical page: [ 16.135667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.136023] flags: 0x200000000000000(node=0|zone=2) [ 16.136253] page_type: f5(slab) [ 16.136467] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.136786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.137109] page dumped because: kasan: bad access detected [ 16.137295] [ 16.137414] Memory state around the buggy address: [ 16.137652] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.137948] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.138262] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.138657] ^ [ 16.138875] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.139184] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.139528] ================================================================== [ 15.459390] ================================================================== [ 15.459982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.460268] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.460699] [ 15.460816] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.460863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.460878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.460902] Call Trace: [ 15.460921] <TASK> [ 15.460939] dump_stack_lvl+0x73/0xb0 [ 15.460968] print_report+0xd1/0x610 [ 15.460993] ? __virt_addr_valid+0x1db/0x2d0 [ 15.461017] ? kasan_atomics_helper+0x697/0x5450 [ 15.461038] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.461061] ? kasan_atomics_helper+0x697/0x5450 [ 15.461083] kasan_report+0x141/0x180 [ 15.461106] ? kasan_atomics_helper+0x697/0x5450 [ 15.461132] kasan_check_range+0x10c/0x1c0 [ 15.461168] __kasan_check_write+0x18/0x20 [ 15.461188] kasan_atomics_helper+0x697/0x5450 [ 15.461212] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.461236] ? kasan_save_alloc_info+0x3b/0x50 [ 15.461260] ? kasan_save_stack+0x45/0x70 [ 15.461285] kasan_atomics+0x1dc/0x310 [ 15.461308] ? __pfx_kasan_atomics+0x10/0x10 [ 15.461332] ? __pfx_read_tsc+0x10/0x10 [ 15.461355] ? ktime_get_ts64+0x86/0x230 [ 15.461380] kunit_try_run_case+0x1a5/0x480 [ 15.461406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.461430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.461454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.461479] ? __kthread_parkme+0x82/0x180 [ 15.461500] ? preempt_count_sub+0x50/0x80 [ 15.461525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.461549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.461574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.461598] kthread+0x337/0x6f0 [ 15.461618] ? trace_preempt_on+0x20/0xc0 [ 15.461642] ? __pfx_kthread+0x10/0x10 [ 15.461663] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.461686] ? calculate_sigpending+0x7b/0xa0 [ 15.461710] ? __pfx_kthread+0x10/0x10 [ 15.461732] ret_from_fork+0x116/0x1d0 [ 15.461751] ? __pfx_kthread+0x10/0x10 [ 15.461773] ret_from_fork_asm+0x1a/0x30 [ 15.461804] </TASK> [ 15.461816] [ 15.469792] Allocated by task 283: [ 15.469936] kasan_save_stack+0x45/0x70 [ 15.470079] kasan_save_track+0x18/0x40 [ 15.470225] kasan_save_alloc_info+0x3b/0x50 [ 15.470374] __kasan_kmalloc+0xb7/0xc0 [ 15.470506] __kmalloc_cache_noprof+0x189/0x420 [ 15.470776] kasan_atomics+0x95/0x310 [ 15.470963] kunit_try_run_case+0x1a5/0x480 [ 15.471237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.471510] kthread+0x337/0x6f0 [ 15.471638] ret_from_fork+0x116/0x1d0 [ 15.471771] ret_from_fork_asm+0x1a/0x30 [ 15.471911] [ 15.471983] The buggy address belongs to the object at ffff8881027c5180 [ 15.471983] which belongs to the cache kmalloc-64 of size 64 [ 15.473187] The buggy address is located 0 bytes to the right of [ 15.473187] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.473762] [ 15.473858] The buggy address belongs to the physical page: [ 15.474074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.474405] flags: 0x200000000000000(node=0|zone=2) [ 15.474630] page_type: f5(slab) [ 15.474809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.475200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.475589] page dumped because: kasan: bad access detected [ 15.475819] [ 15.475963] Memory state around the buggy address: [ 15.476137] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.476420] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.476813] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.477065] ^ [ 15.477496] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.478141] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.478466] ================================================================== [ 16.103078] ================================================================== [ 16.103445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 16.103772] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.104139] [ 16.104249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.104295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.104324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.104348] Call Trace: [ 16.104367] <TASK> [ 16.104384] dump_stack_lvl+0x73/0xb0 [ 16.104425] print_report+0xd1/0x610 [ 16.104449] ? __virt_addr_valid+0x1db/0x2d0 [ 16.104482] ? kasan_atomics_helper+0x151d/0x5450 [ 16.104504] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.104527] ? kasan_atomics_helper+0x151d/0x5450 [ 16.104559] kasan_report+0x141/0x180 [ 16.104582] ? kasan_atomics_helper+0x151d/0x5450 [ 16.104609] kasan_check_range+0x10c/0x1c0 [ 16.104635] __kasan_check_write+0x18/0x20 [ 16.104664] kasan_atomics_helper+0x151d/0x5450 [ 16.104687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.104712] ? kasan_save_alloc_info+0x3b/0x50 [ 16.104746] ? kasan_save_stack+0x45/0x70 [ 16.104770] kasan_atomics+0x1dc/0x310 [ 16.104793] ? __pfx_kasan_atomics+0x10/0x10 [ 16.104818] ? __pfx_read_tsc+0x10/0x10 [ 16.104840] ? ktime_get_ts64+0x86/0x230 [ 16.104865] kunit_try_run_case+0x1a5/0x480 [ 16.104891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.104914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.104938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.104972] ? __kthread_parkme+0x82/0x180 [ 16.104993] ? preempt_count_sub+0x50/0x80 [ 16.105018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.105053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.105077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.105102] kthread+0x337/0x6f0 [ 16.105122] ? trace_preempt_on+0x20/0xc0 [ 16.105155] ? __pfx_kthread+0x10/0x10 [ 16.105177] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.105199] ? calculate_sigpending+0x7b/0xa0 [ 16.105223] ? __pfx_kthread+0x10/0x10 [ 16.105246] ret_from_fork+0x116/0x1d0 [ 16.105266] ? __pfx_kthread+0x10/0x10 [ 16.105287] ret_from_fork_asm+0x1a/0x30 [ 16.105319] </TASK> [ 16.105330] [ 16.112981] Allocated by task 283: [ 16.113190] kasan_save_stack+0x45/0x70 [ 16.113404] kasan_save_track+0x18/0x40 [ 16.113547] kasan_save_alloc_info+0x3b/0x50 [ 16.113786] __kasan_kmalloc+0xb7/0xc0 [ 16.113951] __kmalloc_cache_noprof+0x189/0x420 [ 16.114185] kasan_atomics+0x95/0x310 [ 16.114406] kunit_try_run_case+0x1a5/0x480 [ 16.114605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.114851] kthread+0x337/0x6f0 [ 16.115034] ret_from_fork+0x116/0x1d0 [ 16.115209] ret_from_fork_asm+0x1a/0x30 [ 16.115414] [ 16.115509] The buggy address belongs to the object at ffff8881027c5180 [ 16.115509] which belongs to the cache kmalloc-64 of size 64 [ 16.116001] The buggy address is located 0 bytes to the right of [ 16.116001] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.116618] [ 16.116700] The buggy address belongs to the physical page: [ 16.116954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.117298] flags: 0x200000000000000(node=0|zone=2) [ 16.117520] page_type: f5(slab) [ 16.117645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.117879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.118110] page dumped because: kasan: bad access detected [ 16.118393] [ 16.118487] Memory state around the buggy address: [ 16.118882] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.119214] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.119639] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.119855] ^ [ 16.120011] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.120237] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.120595] ================================================================== [ 16.562160] ================================================================== [ 16.562498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.562736] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.562962] [ 16.563051] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.563100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.563113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.563136] Call Trace: [ 16.563164] <TASK> [ 16.563180] dump_stack_lvl+0x73/0xb0 [ 16.563206] print_report+0xd1/0x610 [ 16.563230] ? __virt_addr_valid+0x1db/0x2d0 [ 16.563253] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.563275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.563309] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.563331] kasan_report+0x141/0x180 [ 16.563353] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.563391] __asan_report_load8_noabort+0x18/0x20 [ 16.563415] kasan_atomics_helper+0x4fb2/0x5450 [ 16.563438] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.563461] ? kasan_save_alloc_info+0x3b/0x50 [ 16.563485] ? kasan_save_stack+0x45/0x70 [ 16.563508] kasan_atomics+0x1dc/0x310 [ 16.563532] ? __pfx_kasan_atomics+0x10/0x10 [ 16.563556] ? __pfx_read_tsc+0x10/0x10 [ 16.563577] ? ktime_get_ts64+0x86/0x230 [ 16.563602] kunit_try_run_case+0x1a5/0x480 [ 16.563627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.563650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.563674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.563698] ? __kthread_parkme+0x82/0x180 [ 16.563719] ? preempt_count_sub+0x50/0x80 [ 16.563743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.563767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.563791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.563815] kthread+0x337/0x6f0 [ 16.563835] ? trace_preempt_on+0x20/0xc0 [ 16.563859] ? __pfx_kthread+0x10/0x10 [ 16.563880] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.563901] ? calculate_sigpending+0x7b/0xa0 [ 16.563925] ? __pfx_kthread+0x10/0x10 [ 16.563947] ret_from_fork+0x116/0x1d0 [ 16.563966] ? __pfx_kthread+0x10/0x10 [ 16.563987] ret_from_fork_asm+0x1a/0x30 [ 16.564019] </TASK> [ 16.564030] [ 16.572049] Allocated by task 283: [ 16.572235] kasan_save_stack+0x45/0x70 [ 16.572533] kasan_save_track+0x18/0x40 [ 16.572674] kasan_save_alloc_info+0x3b/0x50 [ 16.572877] __kasan_kmalloc+0xb7/0xc0 [ 16.573069] __kmalloc_cache_noprof+0x189/0x420 [ 16.573348] kasan_atomics+0x95/0x310 [ 16.573520] kunit_try_run_case+0x1a5/0x480 [ 16.573755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.573998] kthread+0x337/0x6f0 [ 16.574167] ret_from_fork+0x116/0x1d0 [ 16.574399] ret_from_fork_asm+0x1a/0x30 [ 16.574567] [ 16.574644] The buggy address belongs to the object at ffff8881027c5180 [ 16.574644] which belongs to the cache kmalloc-64 of size 64 [ 16.575184] The buggy address is located 0 bytes to the right of [ 16.575184] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.575740] [ 16.575840] The buggy address belongs to the physical page: [ 16.576086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.576506] flags: 0x200000000000000(node=0|zone=2) [ 16.576720] page_type: f5(slab) [ 16.576915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.577231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.577621] page dumped because: kasan: bad access detected [ 16.577871] [ 16.577978] Memory state around the buggy address: [ 16.578161] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.578423] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.578799] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.579139] ^ [ 16.579459] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.579790] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.580087] ================================================================== [ 15.961648] ================================================================== [ 15.961958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.962606] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.962947] [ 15.963080] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.963126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.963139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.963174] Call Trace: [ 15.963195] <TASK> [ 15.963355] dump_stack_lvl+0x73/0xb0 [ 15.963388] print_report+0xd1/0x610 [ 15.963411] ? __virt_addr_valid+0x1db/0x2d0 [ 15.963436] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.963524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.963548] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.963627] kasan_report+0x141/0x180 [ 15.963651] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.963678] __asan_report_load4_noabort+0x18/0x20 [ 15.963703] kasan_atomics_helper+0x49e8/0x5450 [ 15.963728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.963753] ? kasan_save_alloc_info+0x3b/0x50 [ 15.963777] ? kasan_save_stack+0x45/0x70 [ 15.963801] kasan_atomics+0x1dc/0x310 [ 15.963825] ? __pfx_kasan_atomics+0x10/0x10 [ 15.963849] ? __pfx_read_tsc+0x10/0x10 [ 15.963871] ? ktime_get_ts64+0x86/0x230 [ 15.963896] kunit_try_run_case+0x1a5/0x480 [ 15.963923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963946] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.963971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.963994] ? __kthread_parkme+0x82/0x180 [ 15.964015] ? preempt_count_sub+0x50/0x80 [ 15.964039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.964065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.964114] kthread+0x337/0x6f0 [ 15.964134] ? trace_preempt_on+0x20/0xc0 [ 15.964169] ? __pfx_kthread+0x10/0x10 [ 15.964190] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.964213] ? calculate_sigpending+0x7b/0xa0 [ 15.964238] ? __pfx_kthread+0x10/0x10 [ 15.964259] ret_from_fork+0x116/0x1d0 [ 15.964279] ? __pfx_kthread+0x10/0x10 [ 15.964300] ret_from_fork_asm+0x1a/0x30 [ 15.964349] </TASK> [ 15.964360] [ 15.971774] Allocated by task 283: [ 15.971938] kasan_save_stack+0x45/0x70 [ 15.972085] kasan_save_track+0x18/0x40 [ 15.972233] kasan_save_alloc_info+0x3b/0x50 [ 15.972391] __kasan_kmalloc+0xb7/0xc0 [ 15.972580] __kmalloc_cache_noprof+0x189/0x420 [ 15.972799] kasan_atomics+0x95/0x310 [ 15.972990] kunit_try_run_case+0x1a5/0x480 [ 15.973189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.973372] kthread+0x337/0x6f0 [ 15.973498] ret_from_fork+0x116/0x1d0 [ 15.973850] ret_from_fork_asm+0x1a/0x30 [ 15.974059] [ 15.974169] The buggy address belongs to the object at ffff8881027c5180 [ 15.974169] which belongs to the cache kmalloc-64 of size 64 [ 15.974768] The buggy address is located 0 bytes to the right of [ 15.974768] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.975262] [ 15.975379] The buggy address belongs to the physical page: [ 15.975623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.975924] flags: 0x200000000000000(node=0|zone=2) [ 15.976179] page_type: f5(slab) [ 15.976363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.976628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.976972] page dumped because: kasan: bad access detected [ 15.977216] [ 15.977290] Memory state around the buggy address: [ 15.977525] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.977817] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.978085] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.978311] ^ [ 15.978540] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.978860] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.979125] ================================================================== [ 16.598748] ================================================================== [ 16.599428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.599783] Read of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.600124] [ 16.600245] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.600298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.600311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.600337] Call Trace: [ 16.600364] <TASK> [ 16.600380] dump_stack_lvl+0x73/0xb0 [ 16.600408] print_report+0xd1/0x610 [ 16.600430] ? __virt_addr_valid+0x1db/0x2d0 [ 16.600453] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.600474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.600506] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.600529] kasan_report+0x141/0x180 [ 16.600552] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.600589] __asan_report_load8_noabort+0x18/0x20 [ 16.600615] kasan_atomics_helper+0x4fa5/0x5450 [ 16.600637] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.600669] ? kasan_save_alloc_info+0x3b/0x50 [ 16.600694] ? kasan_save_stack+0x45/0x70 [ 16.600718] kasan_atomics+0x1dc/0x310 [ 16.600751] ? __pfx_kasan_atomics+0x10/0x10 [ 16.600775] ? __pfx_read_tsc+0x10/0x10 [ 16.600797] ? ktime_get_ts64+0x86/0x230 [ 16.600821] kunit_try_run_case+0x1a5/0x480 [ 16.600854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.600877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.600912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.600938] ? __kthread_parkme+0x82/0x180 [ 16.600959] ? preempt_count_sub+0x50/0x80 [ 16.600983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.601017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.601042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.601077] kthread+0x337/0x6f0 [ 16.601096] ? trace_preempt_on+0x20/0xc0 [ 16.601120] ? __pfx_kthread+0x10/0x10 [ 16.601149] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.601171] ? calculate_sigpending+0x7b/0xa0 [ 16.601196] ? __pfx_kthread+0x10/0x10 [ 16.601218] ret_from_fork+0x116/0x1d0 [ 16.601237] ? __pfx_kthread+0x10/0x10 [ 16.601258] ret_from_fork_asm+0x1a/0x30 [ 16.601289] </TASK> [ 16.601300] [ 16.608984] Allocated by task 283: [ 16.609186] kasan_save_stack+0x45/0x70 [ 16.609401] kasan_save_track+0x18/0x40 [ 16.609540] kasan_save_alloc_info+0x3b/0x50 [ 16.609694] __kasan_kmalloc+0xb7/0xc0 [ 16.609830] __kmalloc_cache_noprof+0x189/0x420 [ 16.609989] kasan_atomics+0x95/0x310 [ 16.610124] kunit_try_run_case+0x1a5/0x480 [ 16.610285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.610570] kthread+0x337/0x6f0 [ 16.610741] ret_from_fork+0x116/0x1d0 [ 16.610928] ret_from_fork_asm+0x1a/0x30 [ 16.611127] [ 16.611233] The buggy address belongs to the object at ffff8881027c5180 [ 16.611233] which belongs to the cache kmalloc-64 of size 64 [ 16.611834] The buggy address is located 0 bytes to the right of [ 16.611834] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.612220] [ 16.612293] The buggy address belongs to the physical page: [ 16.612737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.613118] flags: 0x200000000000000(node=0|zone=2) [ 16.613364] page_type: f5(slab) [ 16.613639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.614023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.614466] page dumped because: kasan: bad access detected [ 16.614753] [ 16.614864] Memory state around the buggy address: [ 16.615086] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.615327] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.615649] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.615967] ^ [ 16.616125] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.616383] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.616860] ================================================================== [ 16.261748] ================================================================== [ 16.262094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.262496] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.262754] [ 16.262844] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.262890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.262904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.262928] Call Trace: [ 16.262947] <TASK> [ 16.262965] dump_stack_lvl+0x73/0xb0 [ 16.262994] print_report+0xd1/0x610 [ 16.263017] ? __virt_addr_valid+0x1db/0x2d0 [ 16.263041] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.263062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.263085] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.263108] kasan_report+0x141/0x180 [ 16.263130] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.263167] kasan_check_range+0x10c/0x1c0 [ 16.263191] __kasan_check_write+0x18/0x20 [ 16.263212] kasan_atomics_helper+0x19e3/0x5450 [ 16.263234] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.263257] ? kasan_save_alloc_info+0x3b/0x50 [ 16.263281] ? kasan_save_stack+0x45/0x70 [ 16.263305] kasan_atomics+0x1dc/0x310 [ 16.263352] ? __pfx_kasan_atomics+0x10/0x10 [ 16.263377] ? __pfx_read_tsc+0x10/0x10 [ 16.263399] ? ktime_get_ts64+0x86/0x230 [ 16.263437] kunit_try_run_case+0x1a5/0x480 [ 16.263462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.263485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.263510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.263534] ? __kthread_parkme+0x82/0x180 [ 16.263554] ? preempt_count_sub+0x50/0x80 [ 16.263579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.263604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.263628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.263652] kthread+0x337/0x6f0 [ 16.263674] ? trace_preempt_on+0x20/0xc0 [ 16.263699] ? __pfx_kthread+0x10/0x10 [ 16.263720] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.263742] ? calculate_sigpending+0x7b/0xa0 [ 16.263767] ? __pfx_kthread+0x10/0x10 [ 16.263789] ret_from_fork+0x116/0x1d0 [ 16.263808] ? __pfx_kthread+0x10/0x10 [ 16.263829] ret_from_fork_asm+0x1a/0x30 [ 16.263860] </TASK> [ 16.263870] [ 16.271840] Allocated by task 283: [ 16.272006] kasan_save_stack+0x45/0x70 [ 16.272164] kasan_save_track+0x18/0x40 [ 16.272305] kasan_save_alloc_info+0x3b/0x50 [ 16.272463] __kasan_kmalloc+0xb7/0xc0 [ 16.272599] __kmalloc_cache_noprof+0x189/0x420 [ 16.272759] kasan_atomics+0x95/0x310 [ 16.272894] kunit_try_run_case+0x1a5/0x480 [ 16.273245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.273793] kthread+0x337/0x6f0 [ 16.273990] ret_from_fork+0x116/0x1d0 [ 16.274193] ret_from_fork_asm+0x1a/0x30 [ 16.274414] [ 16.274515] The buggy address belongs to the object at ffff8881027c5180 [ 16.274515] which belongs to the cache kmalloc-64 of size 64 [ 16.275080] The buggy address is located 0 bytes to the right of [ 16.275080] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.275651] [ 16.275727] The buggy address belongs to the physical page: [ 16.275908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.276296] flags: 0x200000000000000(node=0|zone=2) [ 16.276671] page_type: f5(slab) [ 16.276829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.277150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.277477] page dumped because: kasan: bad access detected [ 16.277735] [ 16.277833] Memory state around the buggy address: [ 16.278054] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278453] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278756] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.279064] ^ [ 16.279289] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.279636] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.279929] ================================================================== [ 16.206277] ================================================================== [ 16.206635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.207126] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.207493] [ 16.207622] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.207667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.207680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.207715] Call Trace: [ 16.207733] <TASK> [ 16.207749] dump_stack_lvl+0x73/0xb0 [ 16.207789] print_report+0xd1/0x610 [ 16.207812] ? __virt_addr_valid+0x1db/0x2d0 [ 16.207835] ? kasan_atomics_helper+0x1818/0x5450 [ 16.207856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.207879] ? kasan_atomics_helper+0x1818/0x5450 [ 16.207901] kasan_report+0x141/0x180 [ 16.207923] ? kasan_atomics_helper+0x1818/0x5450 [ 16.207950] kasan_check_range+0x10c/0x1c0 [ 16.207974] __kasan_check_write+0x18/0x20 [ 16.207994] kasan_atomics_helper+0x1818/0x5450 [ 16.208017] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.208041] ? kasan_save_alloc_info+0x3b/0x50 [ 16.208065] ? kasan_save_stack+0x45/0x70 [ 16.208088] kasan_atomics+0x1dc/0x310 [ 16.208111] ? __pfx_kasan_atomics+0x10/0x10 [ 16.208136] ? __pfx_read_tsc+0x10/0x10 [ 16.208167] ? ktime_get_ts64+0x86/0x230 [ 16.208192] kunit_try_run_case+0x1a5/0x480 [ 16.208218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.208241] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.208265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.208289] ? __kthread_parkme+0x82/0x180 [ 16.208310] ? preempt_count_sub+0x50/0x80 [ 16.208338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.208363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.208387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.208411] kthread+0x337/0x6f0 [ 16.208431] ? trace_preempt_on+0x20/0xc0 [ 16.208454] ? __pfx_kthread+0x10/0x10 [ 16.208476] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.208498] ? calculate_sigpending+0x7b/0xa0 [ 16.208522] ? __pfx_kthread+0x10/0x10 [ 16.208555] ret_from_fork+0x116/0x1d0 [ 16.208574] ? __pfx_kthread+0x10/0x10 [ 16.208596] ret_from_fork_asm+0x1a/0x30 [ 16.208639] </TASK> [ 16.208651] [ 16.216748] Allocated by task 283: [ 16.216885] kasan_save_stack+0x45/0x70 [ 16.217120] kasan_save_track+0x18/0x40 [ 16.217472] kasan_save_alloc_info+0x3b/0x50 [ 16.217627] __kasan_kmalloc+0xb7/0xc0 [ 16.217762] __kmalloc_cache_noprof+0x189/0x420 [ 16.217935] kasan_atomics+0x95/0x310 [ 16.218124] kunit_try_run_case+0x1a5/0x480 [ 16.218359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.218640] kthread+0x337/0x6f0 [ 16.218836] ret_from_fork+0x116/0x1d0 [ 16.219027] ret_from_fork_asm+0x1a/0x30 [ 16.219230] [ 16.219306] The buggy address belongs to the object at ffff8881027c5180 [ 16.219306] which belongs to the cache kmalloc-64 of size 64 [ 16.219793] The buggy address is located 0 bytes to the right of [ 16.219793] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.220284] [ 16.220450] The buggy address belongs to the physical page: [ 16.220653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.221021] flags: 0x200000000000000(node=0|zone=2) [ 16.221247] page_type: f5(slab) [ 16.221523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.221765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.221998] page dumped because: kasan: bad access detected [ 16.222194] [ 16.222311] Memory state around the buggy address: [ 16.222536] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.222880] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.223210] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.223530] ^ [ 16.223690] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.223912] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.224250] ================================================================== [ 15.614186] ================================================================== [ 15.614631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.615033] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.615353] [ 15.615442] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.615486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.615500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.615523] Call Trace: [ 15.615541] <TASK> [ 15.615557] dump_stack_lvl+0x73/0xb0 [ 15.615587] print_report+0xd1/0x610 [ 15.615610] ? __virt_addr_valid+0x1db/0x2d0 [ 15.615635] ? kasan_atomics_helper+0xac7/0x5450 [ 15.615657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.615680] ? kasan_atomics_helper+0xac7/0x5450 [ 15.615703] kasan_report+0x141/0x180 [ 15.615726] ? kasan_atomics_helper+0xac7/0x5450 [ 15.615753] kasan_check_range+0x10c/0x1c0 [ 15.615777] __kasan_check_write+0x18/0x20 [ 15.615797] kasan_atomics_helper+0xac7/0x5450 [ 15.615820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.615844] ? kasan_save_alloc_info+0x3b/0x50 [ 15.615868] ? kasan_save_stack+0x45/0x70 [ 15.615892] kasan_atomics+0x1dc/0x310 [ 15.615916] ? __pfx_kasan_atomics+0x10/0x10 [ 15.615941] ? __pfx_read_tsc+0x10/0x10 [ 15.615965] ? ktime_get_ts64+0x86/0x230 [ 15.615990] kunit_try_run_case+0x1a5/0x480 [ 15.616016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.616040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.616064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.616089] ? __kthread_parkme+0x82/0x180 [ 15.616110] ? preempt_count_sub+0x50/0x80 [ 15.616135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.616169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.616194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.616219] kthread+0x337/0x6f0 [ 15.616239] ? trace_preempt_on+0x20/0xc0 [ 15.616263] ? __pfx_kthread+0x10/0x10 [ 15.616285] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.616307] ? calculate_sigpending+0x7b/0xa0 [ 15.616336] ? __pfx_kthread+0x10/0x10 [ 15.616358] ret_from_fork+0x116/0x1d0 [ 15.616377] ? __pfx_kthread+0x10/0x10 [ 15.616399] ret_from_fork_asm+0x1a/0x30 [ 15.616431] </TASK> [ 15.616443] [ 15.625297] Allocated by task 283: [ 15.625539] kasan_save_stack+0x45/0x70 [ 15.625761] kasan_save_track+0x18/0x40 [ 15.626062] kasan_save_alloc_info+0x3b/0x50 [ 15.626245] __kasan_kmalloc+0xb7/0xc0 [ 15.626667] __kmalloc_cache_noprof+0x189/0x420 [ 15.627012] kasan_atomics+0x95/0x310 [ 15.627217] kunit_try_run_case+0x1a5/0x480 [ 15.627491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.627753] kthread+0x337/0x6f0 [ 15.627972] ret_from_fork+0x116/0x1d0 [ 15.628195] ret_from_fork_asm+0x1a/0x30 [ 15.628430] [ 15.628532] The buggy address belongs to the object at ffff8881027c5180 [ 15.628532] which belongs to the cache kmalloc-64 of size 64 [ 15.629119] The buggy address is located 0 bytes to the right of [ 15.629119] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.629628] [ 15.629728] The buggy address belongs to the physical page: [ 15.630033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.630426] flags: 0x200000000000000(node=0|zone=2) [ 15.630679] page_type: f5(slab) [ 15.630819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.631186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.631691] page dumped because: kasan: bad access detected [ 15.631929] [ 15.632098] Memory state around the buggy address: [ 15.632337] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.632664] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.633054] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.633393] ^ [ 15.633633] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633968] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.634292] ================================================================== [ 16.243139] ================================================================== [ 16.243875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.244224] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.244534] [ 16.244674] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.244719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.244733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.244757] Call Trace: [ 16.244775] <TASK> [ 16.244791] dump_stack_lvl+0x73/0xb0 [ 16.244819] print_report+0xd1/0x610 [ 16.244842] ? __virt_addr_valid+0x1db/0x2d0 [ 16.244865] ? kasan_atomics_helper+0x194a/0x5450 [ 16.244887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.244910] ? kasan_atomics_helper+0x194a/0x5450 [ 16.244933] kasan_report+0x141/0x180 [ 16.244955] ? kasan_atomics_helper+0x194a/0x5450 [ 16.244982] kasan_check_range+0x10c/0x1c0 [ 16.245006] __kasan_check_write+0x18/0x20 [ 16.245025] kasan_atomics_helper+0x194a/0x5450 [ 16.245049] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.245071] ? kasan_save_alloc_info+0x3b/0x50 [ 16.245096] ? kasan_save_stack+0x45/0x70 [ 16.245122] kasan_atomics+0x1dc/0x310 [ 16.245157] ? __pfx_kasan_atomics+0x10/0x10 [ 16.245182] ? __pfx_read_tsc+0x10/0x10 [ 16.245204] ? ktime_get_ts64+0x86/0x230 [ 16.245229] kunit_try_run_case+0x1a5/0x480 [ 16.245254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.245278] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.245302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.245326] ? __kthread_parkme+0x82/0x180 [ 16.245347] ? preempt_count_sub+0x50/0x80 [ 16.245372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.245397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.245421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.245445] kthread+0x337/0x6f0 [ 16.245465] ? trace_preempt_on+0x20/0xc0 [ 16.245489] ? __pfx_kthread+0x10/0x10 [ 16.245510] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.245532] ? calculate_sigpending+0x7b/0xa0 [ 16.245557] ? __pfx_kthread+0x10/0x10 [ 16.245578] ret_from_fork+0x116/0x1d0 [ 16.245598] ? __pfx_kthread+0x10/0x10 [ 16.245619] ret_from_fork_asm+0x1a/0x30 [ 16.245650] </TASK> [ 16.245661] [ 16.252816] Allocated by task 283: [ 16.252971] kasan_save_stack+0x45/0x70 [ 16.253179] kasan_save_track+0x18/0x40 [ 16.253373] kasan_save_alloc_info+0x3b/0x50 [ 16.253585] __kasan_kmalloc+0xb7/0xc0 [ 16.253964] __kmalloc_cache_noprof+0x189/0x420 [ 16.254201] kasan_atomics+0x95/0x310 [ 16.254484] kunit_try_run_case+0x1a5/0x480 [ 16.254720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.254975] kthread+0x337/0x6f0 [ 16.255155] ret_from_fork+0x116/0x1d0 [ 16.255383] ret_from_fork_asm+0x1a/0x30 [ 16.255584] [ 16.255683] The buggy address belongs to the object at ffff8881027c5180 [ 16.255683] which belongs to the cache kmalloc-64 of size 64 [ 16.256227] The buggy address is located 0 bytes to the right of [ 16.256227] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.256729] [ 16.256805] The buggy address belongs to the physical page: [ 16.256982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.257286] flags: 0x200000000000000(node=0|zone=2) [ 16.257535] page_type: f5(slab) [ 16.257718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.258104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.258681] page dumped because: kasan: bad access detected [ 16.258953] [ 16.259059] Memory state around the buggy address: [ 16.259282] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.259567] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.259788] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.260006] ^ [ 16.260180] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.260785] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.261102] ================================================================== [ 16.355779] ================================================================== [ 16.356157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.356515] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.356849] [ 16.356961] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.357006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.357031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.357053] Call Trace: [ 16.357070] <TASK> [ 16.357085] dump_stack_lvl+0x73/0xb0 [ 16.357113] print_report+0xd1/0x610 [ 16.357135] ? __virt_addr_valid+0x1db/0x2d0 [ 16.357167] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.357189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.357212] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.357235] kasan_report+0x141/0x180 [ 16.357260] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.357286] kasan_check_range+0x10c/0x1c0 [ 16.357317] __kasan_check_write+0x18/0x20 [ 16.357337] kasan_atomics_helper+0x1ce1/0x5450 [ 16.357361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.357385] ? kasan_save_alloc_info+0x3b/0x50 [ 16.357410] ? kasan_save_stack+0x45/0x70 [ 16.357434] kasan_atomics+0x1dc/0x310 [ 16.357458] ? __pfx_kasan_atomics+0x10/0x10 [ 16.357482] ? __pfx_read_tsc+0x10/0x10 [ 16.357504] ? ktime_get_ts64+0x86/0x230 [ 16.357529] kunit_try_run_case+0x1a5/0x480 [ 16.357554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.357578] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.357602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.357627] ? __kthread_parkme+0x82/0x180 [ 16.357647] ? preempt_count_sub+0x50/0x80 [ 16.357671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.357696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.357719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.357744] kthread+0x337/0x6f0 [ 16.357764] ? trace_preempt_on+0x20/0xc0 [ 16.357788] ? __pfx_kthread+0x10/0x10 [ 16.357833] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.357856] ? calculate_sigpending+0x7b/0xa0 [ 16.357893] ? __pfx_kthread+0x10/0x10 [ 16.357915] ret_from_fork+0x116/0x1d0 [ 16.357935] ? __pfx_kthread+0x10/0x10 [ 16.357956] ret_from_fork_asm+0x1a/0x30 [ 16.357998] </TASK> [ 16.358009] [ 16.365848] Allocated by task 283: [ 16.366032] kasan_save_stack+0x45/0x70 [ 16.366241] kasan_save_track+0x18/0x40 [ 16.366438] kasan_save_alloc_info+0x3b/0x50 [ 16.366668] __kasan_kmalloc+0xb7/0xc0 [ 16.366873] __kmalloc_cache_noprof+0x189/0x420 [ 16.367087] kasan_atomics+0x95/0x310 [ 16.367310] kunit_try_run_case+0x1a5/0x480 [ 16.367551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.367801] kthread+0x337/0x6f0 [ 16.367996] ret_from_fork+0x116/0x1d0 [ 16.368188] ret_from_fork_asm+0x1a/0x30 [ 16.368437] [ 16.368541] The buggy address belongs to the object at ffff8881027c5180 [ 16.368541] which belongs to the cache kmalloc-64 of size 64 [ 16.368941] The buggy address is located 0 bytes to the right of [ 16.368941] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.369351] [ 16.369427] The buggy address belongs to the physical page: [ 16.369604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.369849] flags: 0x200000000000000(node=0|zone=2) [ 16.370018] page_type: f5(slab) [ 16.370190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.370574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.370913] page dumped because: kasan: bad access detected [ 16.371174] [ 16.371270] Memory state around the buggy address: [ 16.371527] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.371850] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.372183] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.372537] ^ [ 16.372772] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.373123] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.373462] ================================================================== [ 15.916406] ================================================================== [ 15.916897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.917226] Read of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.917669] [ 15.917937] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.917987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.918001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.918025] Call Trace: [ 15.918044] <TASK> [ 15.918063] dump_stack_lvl+0x73/0xb0 [ 15.918093] print_report+0xd1/0x610 [ 15.918117] ? __virt_addr_valid+0x1db/0x2d0 [ 15.918141] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.918173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.918196] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.918371] kasan_report+0x141/0x180 [ 15.918395] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.918422] __asan_report_load4_noabort+0x18/0x20 [ 15.918447] kasan_atomics_helper+0x4a02/0x5450 [ 15.918470] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.918494] ? kasan_save_alloc_info+0x3b/0x50 [ 15.918518] ? kasan_save_stack+0x45/0x70 [ 15.918542] kasan_atomics+0x1dc/0x310 [ 15.918565] ? __pfx_kasan_atomics+0x10/0x10 [ 15.918593] ? __pfx_read_tsc+0x10/0x10 [ 15.918615] ? ktime_get_ts64+0x86/0x230 [ 15.918641] kunit_try_run_case+0x1a5/0x480 [ 15.918666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.918714] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.918738] ? __kthread_parkme+0x82/0x180 [ 15.918759] ? preempt_count_sub+0x50/0x80 [ 15.918784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.918832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.918857] kthread+0x337/0x6f0 [ 15.918877] ? trace_preempt_on+0x20/0xc0 [ 15.918901] ? __pfx_kthread+0x10/0x10 [ 15.918922] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.918946] ? calculate_sigpending+0x7b/0xa0 [ 15.918972] ? __pfx_kthread+0x10/0x10 [ 15.918995] ret_from_fork+0x116/0x1d0 [ 15.919014] ? __pfx_kthread+0x10/0x10 [ 15.919035] ret_from_fork_asm+0x1a/0x30 [ 15.919066] </TASK> [ 15.919079] [ 15.928660] Allocated by task 283: [ 15.928915] kasan_save_stack+0x45/0x70 [ 15.929080] kasan_save_track+0x18/0x40 [ 15.929286] kasan_save_alloc_info+0x3b/0x50 [ 15.929471] __kasan_kmalloc+0xb7/0xc0 [ 15.929660] __kmalloc_cache_noprof+0x189/0x420 [ 15.929849] kasan_atomics+0x95/0x310 [ 15.930020] kunit_try_run_case+0x1a5/0x480 [ 15.930593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.930797] kthread+0x337/0x6f0 [ 15.931090] ret_from_fork+0x116/0x1d0 [ 15.931275] ret_from_fork_asm+0x1a/0x30 [ 15.931594] [ 15.931676] The buggy address belongs to the object at ffff8881027c5180 [ 15.931676] which belongs to the cache kmalloc-64 of size 64 [ 15.932444] The buggy address is located 0 bytes to the right of [ 15.932444] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.933089] [ 15.933274] The buggy address belongs to the physical page: [ 15.933579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.934035] flags: 0x200000000000000(node=0|zone=2) [ 15.934280] page_type: f5(slab) [ 15.934534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.934965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.935293] page dumped because: kasan: bad access detected [ 15.935518] [ 15.935608] Memory state around the buggy address: [ 15.935821] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.936125] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.936699] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.937099] ^ [ 15.937298] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.937748] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.938114] ================================================================== [ 16.374040] ================================================================== [ 16.374405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.374752] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.375086] [ 16.375208] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.375254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.375267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.375290] Call Trace: [ 16.375307] <TASK> [ 16.375324] dump_stack_lvl+0x73/0xb0 [ 16.375352] print_report+0xd1/0x610 [ 16.375375] ? __virt_addr_valid+0x1db/0x2d0 [ 16.375398] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.375419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.375442] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.375465] kasan_report+0x141/0x180 [ 16.375487] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.375514] kasan_check_range+0x10c/0x1c0 [ 16.375538] __kasan_check_write+0x18/0x20 [ 16.375558] kasan_atomics_helper+0x1d7a/0x5450 [ 16.375581] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.375605] ? kasan_save_alloc_info+0x3b/0x50 [ 16.375630] ? kasan_save_stack+0x45/0x70 [ 16.375654] kasan_atomics+0x1dc/0x310 [ 16.375677] ? __pfx_kasan_atomics+0x10/0x10 [ 16.375702] ? __pfx_read_tsc+0x10/0x10 [ 16.375724] ? ktime_get_ts64+0x86/0x230 [ 16.375749] kunit_try_run_case+0x1a5/0x480 [ 16.375775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375798] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.375824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.375848] ? __kthread_parkme+0x82/0x180 [ 16.375869] ? preempt_count_sub+0x50/0x80 [ 16.375893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.375941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.375966] kthread+0x337/0x6f0 [ 16.375985] ? trace_preempt_on+0x20/0xc0 [ 16.376009] ? __pfx_kthread+0x10/0x10 [ 16.376031] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.376053] ? calculate_sigpending+0x7b/0xa0 [ 16.376077] ? __pfx_kthread+0x10/0x10 [ 16.376099] ret_from_fork+0x116/0x1d0 [ 16.376118] ? __pfx_kthread+0x10/0x10 [ 16.376139] ret_from_fork_asm+0x1a/0x30 [ 16.377066] </TASK> [ 16.377080] [ 16.392802] Allocated by task 283: [ 16.392951] kasan_save_stack+0x45/0x70 [ 16.393107] kasan_save_track+0x18/0x40 [ 16.393465] kasan_save_alloc_info+0x3b/0x50 [ 16.393849] __kasan_kmalloc+0xb7/0xc0 [ 16.394214] __kmalloc_cache_noprof+0x189/0x420 [ 16.394647] kasan_atomics+0x95/0x310 [ 16.394985] kunit_try_run_case+0x1a5/0x480 [ 16.395456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.395928] kthread+0x337/0x6f0 [ 16.396056] ret_from_fork+0x116/0x1d0 [ 16.396207] ret_from_fork_asm+0x1a/0x30 [ 16.396482] [ 16.396654] The buggy address belongs to the object at ffff8881027c5180 [ 16.396654] which belongs to the cache kmalloc-64 of size 64 [ 16.397705] The buggy address is located 0 bytes to the right of [ 16.397705] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.398749] [ 16.398827] The buggy address belongs to the physical page: [ 16.399005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.399262] flags: 0x200000000000000(node=0|zone=2) [ 16.399703] page_type: f5(slab) [ 16.399993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.400661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.401337] page dumped because: kasan: bad access detected [ 16.401797] [ 16.401960] Memory state around the buggy address: [ 16.402408] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.403008] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.403276] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.403899] ^ [ 16.404361] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.404709] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.404929] ================================================================== [ 15.699609] ================================================================== [ 15.700581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.701717] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.702875] [ 15.703067] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.703118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.703131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.703167] Call Trace: [ 15.703186] <TASK> [ 15.703204] dump_stack_lvl+0x73/0xb0 [ 15.703237] print_report+0xd1/0x610 [ 15.703261] ? __virt_addr_valid+0x1db/0x2d0 [ 15.703284] ? kasan_atomics_helper+0xd47/0x5450 [ 15.703307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.703343] ? kasan_atomics_helper+0xd47/0x5450 [ 15.703366] kasan_report+0x141/0x180 [ 15.703389] ? kasan_atomics_helper+0xd47/0x5450 [ 15.703415] kasan_check_range+0x10c/0x1c0 [ 15.703439] __kasan_check_write+0x18/0x20 [ 15.703459] kasan_atomics_helper+0xd47/0x5450 [ 15.703483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.703507] ? kasan_save_alloc_info+0x3b/0x50 [ 15.703531] ? kasan_save_stack+0x45/0x70 [ 15.703556] kasan_atomics+0x1dc/0x310 [ 15.703580] ? __pfx_kasan_atomics+0x10/0x10 [ 15.703605] ? __pfx_read_tsc+0x10/0x10 [ 15.703628] ? ktime_get_ts64+0x86/0x230 [ 15.703653] kunit_try_run_case+0x1a5/0x480 [ 15.703679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.703703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.703727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.703752] ? __kthread_parkme+0x82/0x180 [ 15.703774] ? preempt_count_sub+0x50/0x80 [ 15.703799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.703823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.703848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.703874] kthread+0x337/0x6f0 [ 15.703895] ? trace_preempt_on+0x20/0xc0 [ 15.703920] ? __pfx_kthread+0x10/0x10 [ 15.703941] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.703964] ? calculate_sigpending+0x7b/0xa0 [ 15.703989] ? __pfx_kthread+0x10/0x10 [ 15.704011] ret_from_fork+0x116/0x1d0 [ 15.704031] ? __pfx_kthread+0x10/0x10 [ 15.704052] ret_from_fork_asm+0x1a/0x30 [ 15.704085] </TASK> [ 15.704096] [ 15.712105] Allocated by task 283: [ 15.712307] kasan_save_stack+0x45/0x70 [ 15.712525] kasan_save_track+0x18/0x40 [ 15.712800] kasan_save_alloc_info+0x3b/0x50 [ 15.713067] __kasan_kmalloc+0xb7/0xc0 [ 15.713259] __kmalloc_cache_noprof+0x189/0x420 [ 15.713549] kasan_atomics+0x95/0x310 [ 15.713688] kunit_try_run_case+0x1a5/0x480 [ 15.713885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.714153] kthread+0x337/0x6f0 [ 15.714340] ret_from_fork+0x116/0x1d0 [ 15.714595] ret_from_fork_asm+0x1a/0x30 [ 15.714774] [ 15.714849] The buggy address belongs to the object at ffff8881027c5180 [ 15.714849] which belongs to the cache kmalloc-64 of size 64 [ 15.715404] The buggy address is located 0 bytes to the right of [ 15.715404] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.715871] [ 15.715963] The buggy address belongs to the physical page: [ 15.716231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.716597] flags: 0x200000000000000(node=0|zone=2) [ 15.716801] page_type: f5(slab) [ 15.716954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.717201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.717434] page dumped because: kasan: bad access detected [ 15.717609] [ 15.717682] Memory state around the buggy address: [ 15.717905] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.718286] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.718613] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.719239] ^ [ 15.719702] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720071] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720449] ================================================================== [ 15.792969] ================================================================== [ 15.793234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.793498] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.794478] [ 15.794675] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.794786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.794802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.794825] Call Trace: [ 15.794842] <TASK> [ 15.794859] dump_stack_lvl+0x73/0xb0 [ 15.794890] print_report+0xd1/0x610 [ 15.794913] ? __virt_addr_valid+0x1db/0x2d0 [ 15.794936] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.794958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.794981] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.795003] kasan_report+0x141/0x180 [ 15.795034] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.795061] kasan_check_range+0x10c/0x1c0 [ 15.795085] __kasan_check_write+0x18/0x20 [ 15.795216] kasan_atomics_helper+0xfa9/0x5450 [ 15.795243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.795268] ? kasan_save_alloc_info+0x3b/0x50 [ 15.795292] ? kasan_save_stack+0x45/0x70 [ 15.795325] kasan_atomics+0x1dc/0x310 [ 15.795348] ? __pfx_kasan_atomics+0x10/0x10 [ 15.795374] ? __pfx_read_tsc+0x10/0x10 [ 15.795396] ? ktime_get_ts64+0x86/0x230 [ 15.795422] kunit_try_run_case+0x1a5/0x480 [ 15.795447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.795471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.795495] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.795519] ? __kthread_parkme+0x82/0x180 [ 15.795540] ? preempt_count_sub+0x50/0x80 [ 15.795565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.795590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.795614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.795639] kthread+0x337/0x6f0 [ 15.795661] ? trace_preempt_on+0x20/0xc0 [ 15.795685] ? __pfx_kthread+0x10/0x10 [ 15.795707] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.795729] ? calculate_sigpending+0x7b/0xa0 [ 15.795754] ? __pfx_kthread+0x10/0x10 [ 15.795777] ret_from_fork+0x116/0x1d0 [ 15.795796] ? __pfx_kthread+0x10/0x10 [ 15.795818] ret_from_fork_asm+0x1a/0x30 [ 15.795849] </TASK> [ 15.795862] [ 15.806627] Allocated by task 283: [ 15.806808] kasan_save_stack+0x45/0x70 [ 15.807219] kasan_save_track+0x18/0x40 [ 15.807377] kasan_save_alloc_info+0x3b/0x50 [ 15.807799] __kasan_kmalloc+0xb7/0xc0 [ 15.808053] __kmalloc_cache_noprof+0x189/0x420 [ 15.808278] kasan_atomics+0x95/0x310 [ 15.808477] kunit_try_run_case+0x1a5/0x480 [ 15.808935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.809167] kthread+0x337/0x6f0 [ 15.809512] ret_from_fork+0x116/0x1d0 [ 15.809755] ret_from_fork_asm+0x1a/0x30 [ 15.809960] [ 15.810052] The buggy address belongs to the object at ffff8881027c5180 [ 15.810052] which belongs to the cache kmalloc-64 of size 64 [ 15.810816] The buggy address is located 0 bytes to the right of [ 15.810816] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.811620] [ 15.811713] The buggy address belongs to the physical page: [ 15.811946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.812587] flags: 0x200000000000000(node=0|zone=2) [ 15.812879] page_type: f5(slab) [ 15.813155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.813461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.813875] page dumped because: kasan: bad access detected [ 15.814316] [ 15.814494] Memory state around the buggy address: [ 15.814795] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.815099] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.815704] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.816077] ^ [ 15.816293] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.816810] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.817349] ================================================================== [ 16.225250] ================================================================== [ 16.225666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.226030] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.226396] [ 16.226525] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.226572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.226585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.226609] Call Trace: [ 16.226626] <TASK> [ 16.226656] dump_stack_lvl+0x73/0xb0 [ 16.226684] print_report+0xd1/0x610 [ 16.226706] ? __virt_addr_valid+0x1db/0x2d0 [ 16.226741] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.226763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.226786] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.226817] kasan_report+0x141/0x180 [ 16.226839] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.226866] kasan_check_range+0x10c/0x1c0 [ 16.226900] __kasan_check_write+0x18/0x20 [ 16.226919] kasan_atomics_helper+0x18b1/0x5450 [ 16.226943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.226975] ? kasan_save_alloc_info+0x3b/0x50 [ 16.226999] ? kasan_save_stack+0x45/0x70 [ 16.227023] kasan_atomics+0x1dc/0x310 [ 16.227056] ? __pfx_kasan_atomics+0x10/0x10 [ 16.227081] ? __pfx_read_tsc+0x10/0x10 [ 16.227103] ? ktime_get_ts64+0x86/0x230 [ 16.227128] kunit_try_run_case+0x1a5/0x480 [ 16.227172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.227196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.227221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.227255] ? __kthread_parkme+0x82/0x180 [ 16.227277] ? preempt_count_sub+0x50/0x80 [ 16.227301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.227325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.227349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.227374] kthread+0x337/0x6f0 [ 16.227395] ? trace_preempt_on+0x20/0xc0 [ 16.227418] ? __pfx_kthread+0x10/0x10 [ 16.227440] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.227462] ? calculate_sigpending+0x7b/0xa0 [ 16.227486] ? __pfx_kthread+0x10/0x10 [ 16.227508] ret_from_fork+0x116/0x1d0 [ 16.227527] ? __pfx_kthread+0x10/0x10 [ 16.227548] ret_from_fork_asm+0x1a/0x30 [ 16.227580] </TASK> [ 16.227590] [ 16.235509] Allocated by task 283: [ 16.235695] kasan_save_stack+0x45/0x70 [ 16.235895] kasan_save_track+0x18/0x40 [ 16.236081] kasan_save_alloc_info+0x3b/0x50 [ 16.236309] __kasan_kmalloc+0xb7/0xc0 [ 16.236497] __kmalloc_cache_noprof+0x189/0x420 [ 16.236719] kasan_atomics+0x95/0x310 [ 16.236897] kunit_try_run_case+0x1a5/0x480 [ 16.237095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.237334] kthread+0x337/0x6f0 [ 16.237456] ret_from_fork+0x116/0x1d0 [ 16.237620] ret_from_fork_asm+0x1a/0x30 [ 16.237844] [ 16.237956] The buggy address belongs to the object at ffff8881027c5180 [ 16.237956] which belongs to the cache kmalloc-64 of size 64 [ 16.238499] The buggy address is located 0 bytes to the right of [ 16.238499] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.239026] [ 16.239125] The buggy address belongs to the physical page: [ 16.239394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.239714] flags: 0x200000000000000(node=0|zone=2) [ 16.239913] page_type: f5(slab) [ 16.240104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.240490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.240770] page dumped because: kasan: bad access detected [ 16.240941] [ 16.241011] Memory state around the buggy address: [ 16.241175] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.241388] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.241602] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.241812] ^ [ 16.241966] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.242262] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.242583] ================================================================== [ 15.656732] ================================================================== [ 15.656977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.657589] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.658131] [ 15.658261] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.658327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.658341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.658379] Call Trace: [ 15.658410] <TASK> [ 15.658426] dump_stack_lvl+0x73/0xb0 [ 15.658483] print_report+0xd1/0x610 [ 15.658520] ? __virt_addr_valid+0x1db/0x2d0 [ 15.658556] ? kasan_atomics_helper+0xc70/0x5450 [ 15.658591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.658627] ? kasan_atomics_helper+0xc70/0x5450 [ 15.658664] kasan_report+0x141/0x180 [ 15.658700] ? kasan_atomics_helper+0xc70/0x5450 [ 15.658740] kasan_check_range+0x10c/0x1c0 [ 15.658778] __kasan_check_write+0x18/0x20 [ 15.658799] kasan_atomics_helper+0xc70/0x5450 [ 15.658848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.658886] ? kasan_save_alloc_info+0x3b/0x50 [ 15.658925] ? kasan_save_stack+0x45/0x70 [ 15.658963] kasan_atomics+0x1dc/0x310 [ 15.658986] ? __pfx_kasan_atomics+0x10/0x10 [ 15.659025] ? __pfx_read_tsc+0x10/0x10 [ 15.659060] ? ktime_get_ts64+0x86/0x230 [ 15.659097] kunit_try_run_case+0x1a5/0x480 [ 15.659123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.659156] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.659181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.659205] ? __kthread_parkme+0x82/0x180 [ 15.659226] ? preempt_count_sub+0x50/0x80 [ 15.659250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.659274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.659299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.659323] kthread+0x337/0x6f0 [ 15.659343] ? trace_preempt_on+0x20/0xc0 [ 15.659367] ? __pfx_kthread+0x10/0x10 [ 15.659389] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.659411] ? calculate_sigpending+0x7b/0xa0 [ 15.659487] ? __pfx_kthread+0x10/0x10 [ 15.659511] ret_from_fork+0x116/0x1d0 [ 15.659530] ? __pfx_kthread+0x10/0x10 [ 15.659552] ret_from_fork_asm+0x1a/0x30 [ 15.659583] </TASK> [ 15.659596] [ 15.668388] Allocated by task 283: [ 15.668592] kasan_save_stack+0x45/0x70 [ 15.668747] kasan_save_track+0x18/0x40 [ 15.669071] kasan_save_alloc_info+0x3b/0x50 [ 15.669375] __kasan_kmalloc+0xb7/0xc0 [ 15.669552] __kmalloc_cache_noprof+0x189/0x420 [ 15.669789] kasan_atomics+0x95/0x310 [ 15.670022] kunit_try_run_case+0x1a5/0x480 [ 15.670241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.670609] kthread+0x337/0x6f0 [ 15.670773] ret_from_fork+0x116/0x1d0 [ 15.670988] ret_from_fork_asm+0x1a/0x30 [ 15.671274] [ 15.671418] The buggy address belongs to the object at ffff8881027c5180 [ 15.671418] which belongs to the cache kmalloc-64 of size 64 [ 15.672054] The buggy address is located 0 bytes to the right of [ 15.672054] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.672548] [ 15.672624] The buggy address belongs to the physical page: [ 15.672796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.673028] flags: 0x200000000000000(node=0|zone=2) [ 15.673517] page_type: f5(slab) [ 15.673708] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.674368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.674711] page dumped because: kasan: bad access detected [ 15.675075] [ 15.675174] Memory state around the buggy address: [ 15.675341] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.675706] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.676051] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.676393] ^ [ 15.676666] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.677229] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.677605] ================================================================== [ 15.505203] ================================================================== [ 15.505547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.506217] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.506610] [ 15.506732] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.506778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.506792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.506816] Call Trace: [ 15.506834] <TASK> [ 15.506852] dump_stack_lvl+0x73/0xb0 [ 15.506882] print_report+0xd1/0x610 [ 15.506906] ? __virt_addr_valid+0x1db/0x2d0 [ 15.506929] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.506950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.506973] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.506994] kasan_report+0x141/0x180 [ 15.507018] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.507044] kasan_check_range+0x10c/0x1c0 [ 15.507068] __kasan_check_write+0x18/0x20 [ 15.507088] kasan_atomics_helper+0x7c7/0x5450 [ 15.507111] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.507135] ? kasan_save_alloc_info+0x3b/0x50 [ 15.507169] ? kasan_save_stack+0x45/0x70 [ 15.507194] kasan_atomics+0x1dc/0x310 [ 15.507216] ? __pfx_kasan_atomics+0x10/0x10 [ 15.507241] ? __pfx_read_tsc+0x10/0x10 [ 15.507263] ? ktime_get_ts64+0x86/0x230 [ 15.507290] kunit_try_run_case+0x1a5/0x480 [ 15.507325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.507348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.507373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.507397] ? __kthread_parkme+0x82/0x180 [ 15.507418] ? preempt_count_sub+0x50/0x80 [ 15.507443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.507468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.507492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.507516] kthread+0x337/0x6f0 [ 15.507537] ? trace_preempt_on+0x20/0xc0 [ 15.507561] ? __pfx_kthread+0x10/0x10 [ 15.507583] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.507605] ? calculate_sigpending+0x7b/0xa0 [ 15.507629] ? __pfx_kthread+0x10/0x10 [ 15.507652] ret_from_fork+0x116/0x1d0 [ 15.507671] ? __pfx_kthread+0x10/0x10 [ 15.507692] ret_from_fork_asm+0x1a/0x30 [ 15.507723] </TASK> [ 15.507735] [ 15.519262] Allocated by task 283: [ 15.519548] kasan_save_stack+0x45/0x70 [ 15.519904] kasan_save_track+0x18/0x40 [ 15.520096] kasan_save_alloc_info+0x3b/0x50 [ 15.520483] __kasan_kmalloc+0xb7/0xc0 [ 15.520666] __kmalloc_cache_noprof+0x189/0x420 [ 15.520888] kasan_atomics+0x95/0x310 [ 15.521173] kunit_try_run_case+0x1a5/0x480 [ 15.521374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.522003] kthread+0x337/0x6f0 [ 15.522193] ret_from_fork+0x116/0x1d0 [ 15.522553] ret_from_fork_asm+0x1a/0x30 [ 15.522723] [ 15.522826] The buggy address belongs to the object at ffff8881027c5180 [ 15.522826] which belongs to the cache kmalloc-64 of size 64 [ 15.523588] The buggy address is located 0 bytes to the right of [ 15.523588] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.524402] [ 15.524513] The buggy address belongs to the physical page: [ 15.524893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.525313] flags: 0x200000000000000(node=0|zone=2) [ 15.525580] page_type: f5(slab) [ 15.525732] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.526476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.526821] page dumped because: kasan: bad access detected [ 15.527126] [ 15.527221] Memory state around the buggy address: [ 15.527684] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.528105] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.528400] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.528871] ^ [ 15.529241] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.529635] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.530155] ================================================================== [ 15.593664] ================================================================== [ 15.593936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.594289] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.594666] [ 15.594784] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.594829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.594842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.594901] Call Trace: [ 15.594940] <TASK> [ 15.594957] dump_stack_lvl+0x73/0xb0 [ 15.594986] print_report+0xd1/0x610 [ 15.595009] ? __virt_addr_valid+0x1db/0x2d0 [ 15.595033] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.595055] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.595078] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.595118] kasan_report+0x141/0x180 [ 15.595141] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.595177] kasan_check_range+0x10c/0x1c0 [ 15.595201] __kasan_check_write+0x18/0x20 [ 15.595241] kasan_atomics_helper+0xa2b/0x5450 [ 15.595264] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.595288] ? kasan_save_alloc_info+0x3b/0x50 [ 15.595313] ? kasan_save_stack+0x45/0x70 [ 15.595337] kasan_atomics+0x1dc/0x310 [ 15.595360] ? __pfx_kasan_atomics+0x10/0x10 [ 15.595385] ? __pfx_read_tsc+0x10/0x10 [ 15.595407] ? ktime_get_ts64+0x86/0x230 [ 15.595432] kunit_try_run_case+0x1a5/0x480 [ 15.595457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595480] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.595505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.595529] ? __kthread_parkme+0x82/0x180 [ 15.595550] ? preempt_count_sub+0x50/0x80 [ 15.595575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.595626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.595652] kthread+0x337/0x6f0 [ 15.595689] ? trace_preempt_on+0x20/0xc0 [ 15.595714] ? __pfx_kthread+0x10/0x10 [ 15.595736] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.595758] ? calculate_sigpending+0x7b/0xa0 [ 15.595800] ? __pfx_kthread+0x10/0x10 [ 15.595823] ret_from_fork+0x116/0x1d0 [ 15.595843] ? __pfx_kthread+0x10/0x10 [ 15.595909] ret_from_fork_asm+0x1a/0x30 [ 15.595941] </TASK> [ 15.595953] [ 15.604537] Allocated by task 283: [ 15.604694] kasan_save_stack+0x45/0x70 [ 15.604958] kasan_save_track+0x18/0x40 [ 15.605167] kasan_save_alloc_info+0x3b/0x50 [ 15.605661] __kasan_kmalloc+0xb7/0xc0 [ 15.605810] __kmalloc_cache_noprof+0x189/0x420 [ 15.606044] kasan_atomics+0x95/0x310 [ 15.606268] kunit_try_run_case+0x1a5/0x480 [ 15.606475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.606782] kthread+0x337/0x6f0 [ 15.606990] ret_from_fork+0x116/0x1d0 [ 15.607243] ret_from_fork_asm+0x1a/0x30 [ 15.607463] [ 15.607566] The buggy address belongs to the object at ffff8881027c5180 [ 15.607566] which belongs to the cache kmalloc-64 of size 64 [ 15.608118] The buggy address is located 0 bytes to the right of [ 15.608118] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.608685] [ 15.608788] The buggy address belongs to the physical page: [ 15.609089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.609447] flags: 0x200000000000000(node=0|zone=2) [ 15.609677] page_type: f5(slab) [ 15.609890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.610140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.610549] page dumped because: kasan: bad access detected [ 15.610830] [ 15.611005] Memory state around the buggy address: [ 15.611243] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.611794] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.612383] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.612699] ^ [ 15.612973] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613243] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613648] ================================================================== [ 15.744621] ================================================================== [ 15.744869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.745670] Write of size 4 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 15.746015] [ 15.746327] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.746376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.746389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.746413] Call Trace: [ 15.746432] <TASK> [ 15.746450] dump_stack_lvl+0x73/0xb0 [ 15.746549] print_report+0xd1/0x610 [ 15.746572] ? __virt_addr_valid+0x1db/0x2d0 [ 15.746596] ? kasan_atomics_helper+0xe78/0x5450 [ 15.746618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.746641] ? kasan_atomics_helper+0xe78/0x5450 [ 15.746663] kasan_report+0x141/0x180 [ 15.746685] ? kasan_atomics_helper+0xe78/0x5450 [ 15.746711] kasan_check_range+0x10c/0x1c0 [ 15.746737] __kasan_check_write+0x18/0x20 [ 15.746757] kasan_atomics_helper+0xe78/0x5450 [ 15.746780] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.746804] ? kasan_save_alloc_info+0x3b/0x50 [ 15.746828] ? kasan_save_stack+0x45/0x70 [ 15.746852] kasan_atomics+0x1dc/0x310 [ 15.746875] ? __pfx_kasan_atomics+0x10/0x10 [ 15.746901] ? __pfx_read_tsc+0x10/0x10 [ 15.746924] ? ktime_get_ts64+0x86/0x230 [ 15.746949] kunit_try_run_case+0x1a5/0x480 [ 15.746975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.746998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.747023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.747047] ? __kthread_parkme+0x82/0x180 [ 15.747069] ? preempt_count_sub+0x50/0x80 [ 15.747093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.747118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.747154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.747179] kthread+0x337/0x6f0 [ 15.747199] ? trace_preempt_on+0x20/0xc0 [ 15.747223] ? __pfx_kthread+0x10/0x10 [ 15.747245] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.747267] ? calculate_sigpending+0x7b/0xa0 [ 15.747292] ? __pfx_kthread+0x10/0x10 [ 15.747316] ret_from_fork+0x116/0x1d0 [ 15.747337] ? __pfx_kthread+0x10/0x10 [ 15.747359] ret_from_fork_asm+0x1a/0x30 [ 15.747390] </TASK> [ 15.747401] [ 15.757928] Allocated by task 283: [ 15.758443] kasan_save_stack+0x45/0x70 [ 15.758613] kasan_save_track+0x18/0x40 [ 15.758791] kasan_save_alloc_info+0x3b/0x50 [ 15.759271] __kasan_kmalloc+0xb7/0xc0 [ 15.759453] __kmalloc_cache_noprof+0x189/0x420 [ 15.759740] kasan_atomics+0x95/0x310 [ 15.760025] kunit_try_run_case+0x1a5/0x480 [ 15.760346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.760550] kthread+0x337/0x6f0 [ 15.760799] ret_from_fork+0x116/0x1d0 [ 15.761023] ret_from_fork_asm+0x1a/0x30 [ 15.761272] [ 15.761473] The buggy address belongs to the object at ffff8881027c5180 [ 15.761473] which belongs to the cache kmalloc-64 of size 64 [ 15.762133] The buggy address is located 0 bytes to the right of [ 15.762133] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 15.762742] [ 15.762927] The buggy address belongs to the physical page: [ 15.763130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 15.763740] flags: 0x200000000000000(node=0|zone=2) [ 15.764117] page_type: f5(slab) [ 15.764305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.764796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.765277] page dumped because: kasan: bad access detected [ 15.765613] [ 15.765693] Memory state around the buggy address: [ 15.765995] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.766567] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.766893] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.767472] ^ [ 15.767701] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.768089] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.768397] ================================================================== [ 16.502923] ================================================================== [ 16.503254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.503622] Write of size 8 at addr ffff8881027c51b0 by task kunit_try_catch/283 [ 16.503951] [ 16.504083] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.504128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.504151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.504174] Call Trace: [ 16.504192] <TASK> [ 16.504207] dump_stack_lvl+0x73/0xb0 [ 16.504245] print_report+0xd1/0x610 [ 16.504267] ? __virt_addr_valid+0x1db/0x2d0 [ 16.504290] ? kasan_atomics_helper+0x2006/0x5450 [ 16.504341] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.504364] ? kasan_atomics_helper+0x2006/0x5450 [ 16.504386] kasan_report+0x141/0x180 [ 16.504409] ? kasan_atomics_helper+0x2006/0x5450 [ 16.504436] kasan_check_range+0x10c/0x1c0 [ 16.504459] __kasan_check_write+0x18/0x20 [ 16.504479] kasan_atomics_helper+0x2006/0x5450 [ 16.504503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.504526] ? kasan_save_alloc_info+0x3b/0x50 [ 16.504550] ? kasan_save_stack+0x45/0x70 [ 16.504574] kasan_atomics+0x1dc/0x310 [ 16.504597] ? __pfx_kasan_atomics+0x10/0x10 [ 16.504621] ? __pfx_read_tsc+0x10/0x10 [ 16.504643] ? ktime_get_ts64+0x86/0x230 [ 16.504667] kunit_try_run_case+0x1a5/0x480 [ 16.504692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.504715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.504740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.504764] ? __kthread_parkme+0x82/0x180 [ 16.504785] ? preempt_count_sub+0x50/0x80 [ 16.504810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.504844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.504868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.504903] kthread+0x337/0x6f0 [ 16.504924] ? trace_preempt_on+0x20/0xc0 [ 16.504949] ? __pfx_kthread+0x10/0x10 [ 16.504971] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.504994] ? calculate_sigpending+0x7b/0xa0 [ 16.505018] ? __pfx_kthread+0x10/0x10 [ 16.505040] ret_from_fork+0x116/0x1d0 [ 16.505059] ? __pfx_kthread+0x10/0x10 [ 16.505081] ret_from_fork_asm+0x1a/0x30 [ 16.505112] </TASK> [ 16.505124] [ 16.512818] Allocated by task 283: [ 16.513012] kasan_save_stack+0x45/0x70 [ 16.513167] kasan_save_track+0x18/0x40 [ 16.513306] kasan_save_alloc_info+0x3b/0x50 [ 16.513459] __kasan_kmalloc+0xb7/0xc0 [ 16.513603] __kmalloc_cache_noprof+0x189/0x420 [ 16.513840] kasan_atomics+0x95/0x310 [ 16.514051] kunit_try_run_case+0x1a5/0x480 [ 16.514349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.514621] kthread+0x337/0x6f0 [ 16.514907] ret_from_fork+0x116/0x1d0 [ 16.515183] ret_from_fork_asm+0x1a/0x30 [ 16.515722] [ 16.516261] The buggy address belongs to the object at ffff8881027c5180 [ 16.516261] which belongs to the cache kmalloc-64 of size 64 [ 16.517327] The buggy address is located 0 bytes to the right of [ 16.517327] allocated 48-byte region [ffff8881027c5180, ffff8881027c51b0) [ 16.517979] [ 16.518063] The buggy address belongs to the physical page: [ 16.518481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c5 [ 16.518891] flags: 0x200000000000000(node=0|zone=2) [ 16.519205] page_type: f5(slab) [ 16.519396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.519876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.520266] page dumped because: kasan: bad access detected [ 16.520732] [ 16.520821] Memory state around the buggy address: [ 16.521205] ffff8881027c5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.521637] ffff8881027c5100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.522011] >ffff8881027c5180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.522290] ^ [ 16.522614] ffff8881027c5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.523091] ffff8881027c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.523500] ==================================================================