Date
July 8, 2025, 7:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.202160] ================================================================== [ 22.202233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 22.202323] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.202373] [ 22.202453] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.202535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.202564] Hardware name: linux,dummy-virt (DT) [ 22.202594] Call trace: [ 22.202620] show_stack+0x20/0x38 (C) [ 22.202668] dump_stack_lvl+0x8c/0xd0 [ 22.202730] print_report+0x118/0x608 [ 22.202776] kasan_report+0xdc/0x128 [ 22.202822] kasan_check_range+0x100/0x1a8 [ 22.202869] __kasan_check_write+0x20/0x30 [ 22.202924] kasan_atomics_helper+0x1058/0x4858 [ 22.202979] kasan_atomics+0x198/0x2e0 [ 22.203024] kunit_try_run_case+0x170/0x3f0 [ 22.203072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.203135] kthread+0x328/0x630 [ 22.203177] ret_from_fork+0x10/0x20 [ 22.203223] [ 22.203245] Allocated by task 265: [ 22.203272] kasan_save_stack+0x3c/0x68 [ 22.203314] kasan_save_track+0x20/0x40 [ 22.203351] kasan_save_alloc_info+0x40/0x58 [ 22.203391] __kasan_kmalloc+0xd4/0xd8 [ 22.203439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.203961] kasan_atomics+0xb8/0x2e0 [ 22.204658] kunit_try_run_case+0x170/0x3f0 [ 22.204935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.205141] kthread+0x328/0x630 [ 22.205243] ret_from_fork+0x10/0x20 [ 22.205396] [ 22.205459] The buggy address belongs to the object at fff00000c569f300 [ 22.205459] which belongs to the cache kmalloc-64 of size 64 [ 22.205631] The buggy address is located 0 bytes to the right of [ 22.205631] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.205782] [ 22.205805] The buggy address belongs to the physical page: [ 22.205838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.206031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.206343] page_type: f5(slab) [ 22.206398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.206603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.206683] page dumped because: kasan: bad access detected [ 22.206730] [ 22.206750] Memory state around the buggy address: [ 22.206965] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.207110] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.207386] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.207763] ^ [ 22.207808] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.208049] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.208184] ================================================================== [ 22.183233] ================================================================== [ 22.183288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 22.183337] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.183389] [ 22.183419] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.183505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.183531] Hardware name: linux,dummy-virt (DT) [ 22.183563] Call trace: [ 22.183587] show_stack+0x20/0x38 (C) [ 22.184231] dump_stack_lvl+0x8c/0xd0 [ 22.184462] print_report+0x118/0x608 [ 22.184592] kasan_report+0xdc/0x128 [ 22.184729] kasan_check_range+0x100/0x1a8 [ 22.184820] __kasan_check_write+0x20/0x30 [ 22.184865] kasan_atomics_helper+0xf88/0x4858 [ 22.184922] kasan_atomics+0x198/0x2e0 [ 22.184967] kunit_try_run_case+0x170/0x3f0 [ 22.185176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.185679] kthread+0x328/0x630 [ 22.185910] ret_from_fork+0x10/0x20 [ 22.186075] [ 22.186135] Allocated by task 265: [ 22.186181] kasan_save_stack+0x3c/0x68 [ 22.186466] kasan_save_track+0x20/0x40 [ 22.186749] kasan_save_alloc_info+0x40/0x58 [ 22.186916] __kasan_kmalloc+0xd4/0xd8 [ 22.187587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.187897] kasan_atomics+0xb8/0x2e0 [ 22.188144] kunit_try_run_case+0x170/0x3f0 [ 22.188315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.188556] kthread+0x328/0x630 [ 22.188617] ret_from_fork+0x10/0x20 [ 22.188657] [ 22.188681] The buggy address belongs to the object at fff00000c569f300 [ 22.188681] which belongs to the cache kmalloc-64 of size 64 [ 22.189064] The buggy address is located 0 bytes to the right of [ 22.189064] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.189304] [ 22.189353] The buggy address belongs to the physical page: [ 22.189769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.189951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.190199] page_type: f5(slab) [ 22.190253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.190449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.190657] page dumped because: kasan: bad access detected [ 22.190963] [ 22.191062] Memory state around the buggy address: [ 22.191240] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.191348] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.191765] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.191975] ^ [ 22.192017] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.192063] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.192114] ================================================================== [ 22.325432] ================================================================== [ 22.325487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.325579] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.325867] [ 22.325919] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.326152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.326249] Hardware name: linux,dummy-virt (DT) [ 22.326284] Call trace: [ 22.326311] show_stack+0x20/0x38 (C) [ 22.326362] dump_stack_lvl+0x8c/0xd0 [ 22.326618] print_report+0x118/0x608 [ 22.326996] kasan_report+0xdc/0x128 [ 22.327079] kasan_check_range+0x100/0x1a8 [ 22.327132] __kasan_check_write+0x20/0x30 [ 22.327176] kasan_atomics_helper+0x1644/0x4858 [ 22.327507] kasan_atomics+0x198/0x2e0 [ 22.327679] kunit_try_run_case+0x170/0x3f0 [ 22.327851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.327948] kthread+0x328/0x630 [ 22.328115] ret_from_fork+0x10/0x20 [ 22.328234] [ 22.328256] Allocated by task 265: [ 22.328287] kasan_save_stack+0x3c/0x68 [ 22.328330] kasan_save_track+0x20/0x40 [ 22.328369] kasan_save_alloc_info+0x40/0x58 [ 22.328576] __kasan_kmalloc+0xd4/0xd8 [ 22.328755] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.328973] kasan_atomics+0xb8/0x2e0 [ 22.329162] kunit_try_run_case+0x170/0x3f0 [ 22.329246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.329395] kthread+0x328/0x630 [ 22.329482] ret_from_fork+0x10/0x20 [ 22.329599] [ 22.329623] The buggy address belongs to the object at fff00000c569f300 [ 22.329623] which belongs to the cache kmalloc-64 of size 64 [ 22.329870] The buggy address is located 0 bytes to the right of [ 22.329870] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.330069] [ 22.330599] The buggy address belongs to the physical page: [ 22.331014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.331115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.331187] page_type: f5(slab) [ 22.331262] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.331347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.331604] page dumped because: kasan: bad access detected [ 22.331967] [ 22.332015] Memory state around the buggy address: [ 22.332216] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.332269] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.332502] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.332548] ^ [ 22.332621] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.332759] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.333050] ================================================================== [ 22.114913] ================================================================== [ 22.115189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 22.115363] Read of size 4 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.115427] [ 22.115579] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.115675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.115704] Hardware name: linux,dummy-virt (DT) [ 22.115751] Call trace: [ 22.115776] show_stack+0x20/0x38 (C) [ 22.116205] dump_stack_lvl+0x8c/0xd0 [ 22.116621] print_report+0x118/0x608 [ 22.116818] kasan_report+0xdc/0x128 [ 22.116881] __asan_report_load4_noabort+0x20/0x30 [ 22.116933] kasan_atomics_helper+0x3dd8/0x4858 [ 22.117000] kasan_atomics+0x198/0x2e0 [ 22.117067] kunit_try_run_case+0x170/0x3f0 [ 22.117116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.117173] kthread+0x328/0x630 [ 22.117218] ret_from_fork+0x10/0x20 [ 22.117269] [ 22.117290] Allocated by task 265: [ 22.117320] kasan_save_stack+0x3c/0x68 [ 22.117374] kasan_save_track+0x20/0x40 [ 22.117434] kasan_save_alloc_info+0x40/0x58 [ 22.117476] __kasan_kmalloc+0xd4/0xd8 [ 22.117523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.117564] kasan_atomics+0xb8/0x2e0 [ 22.117608] kunit_try_run_case+0x170/0x3f0 [ 22.117657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.117703] kthread+0x328/0x630 [ 22.117748] ret_from_fork+0x10/0x20 [ 22.117805] [ 22.117827] The buggy address belongs to the object at fff00000c569f300 [ 22.117827] which belongs to the cache kmalloc-64 of size 64 [ 22.117896] The buggy address is located 0 bytes to the right of [ 22.117896] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.117971] [ 22.118002] The buggy address belongs to the physical page: [ 22.118041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.118098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.118155] page_type: f5(slab) [ 22.118223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.118275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.118317] page dumped because: kasan: bad access detected [ 22.118350] [ 22.118374] Memory state around the buggy address: [ 22.118409] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.118453] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.118498] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.118538] ^ [ 22.118574] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.118621] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.118661] ================================================================== [ 22.286261] ================================================================== [ 22.286354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.286535] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.286650] [ 22.286707] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.286844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.286882] Hardware name: linux,dummy-virt (DT) [ 22.286914] Call trace: [ 22.286939] show_stack+0x20/0x38 (C) [ 22.287111] dump_stack_lvl+0x8c/0xd0 [ 22.287174] print_report+0x118/0x608 [ 22.287327] kasan_report+0xdc/0x128 [ 22.287438] kasan_check_range+0x100/0x1a8 [ 22.287494] __kasan_check_write+0x20/0x30 [ 22.287540] kasan_atomics_helper+0x147c/0x4858 [ 22.287588] kasan_atomics+0x198/0x2e0 [ 22.287635] kunit_try_run_case+0x170/0x3f0 [ 22.288226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.288440] kthread+0x328/0x630 [ 22.288553] ret_from_fork+0x10/0x20 [ 22.288618] [ 22.288641] Allocated by task 265: [ 22.288669] kasan_save_stack+0x3c/0x68 [ 22.288894] kasan_save_track+0x20/0x40 [ 22.289099] kasan_save_alloc_info+0x40/0x58 [ 22.289302] __kasan_kmalloc+0xd4/0xd8 [ 22.289421] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.289689] kasan_atomics+0xb8/0x2e0 [ 22.289791] kunit_try_run_case+0x170/0x3f0 [ 22.289860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.289904] kthread+0x328/0x630 [ 22.290174] ret_from_fork+0x10/0x20 [ 22.290431] [ 22.290471] The buggy address belongs to the object at fff00000c569f300 [ 22.290471] which belongs to the cache kmalloc-64 of size 64 [ 22.290765] The buggy address is located 0 bytes to the right of [ 22.290765] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.290840] [ 22.290861] The buggy address belongs to the physical page: [ 22.291026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.291399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.291661] page_type: f5(slab) [ 22.291770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.292149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.292261] page dumped because: kasan: bad access detected [ 22.292440] [ 22.292632] Memory state around the buggy address: [ 22.292841] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.293035] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.293087] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.293136] ^ [ 22.293173] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.293216] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.293257] ================================================================== [ 22.042949] ================================================================== [ 22.043171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 22.043261] Write of size 4 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.043366] [ 22.043401] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.043817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.043925] Hardware name: linux,dummy-virt (DT) [ 22.044131] Call trace: [ 22.044172] show_stack+0x20/0x38 (C) [ 22.044403] dump_stack_lvl+0x8c/0xd0 [ 22.044577] print_report+0x118/0x608 [ 22.044849] kasan_report+0xdc/0x128 [ 22.045031] kasan_check_range+0x100/0x1a8 [ 22.045302] __kasan_check_write+0x20/0x30 [ 22.045443] kasan_atomics_helper+0xa6c/0x4858 [ 22.045892] kasan_atomics+0x198/0x2e0 [ 22.046086] kunit_try_run_case+0x170/0x3f0 [ 22.046513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.046805] kthread+0x328/0x630 [ 22.047117] ret_from_fork+0x10/0x20 [ 22.047262] [ 22.047302] Allocated by task 265: [ 22.047332] kasan_save_stack+0x3c/0x68 [ 22.047533] kasan_save_track+0x20/0x40 [ 22.047729] kasan_save_alloc_info+0x40/0x58 [ 22.047878] __kasan_kmalloc+0xd4/0xd8 [ 22.047979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.048172] kasan_atomics+0xb8/0x2e0 [ 22.048429] kunit_try_run_case+0x170/0x3f0 [ 22.048525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.048730] kthread+0x328/0x630 [ 22.048790] ret_from_fork+0x10/0x20 [ 22.049150] [ 22.049235] The buggy address belongs to the object at fff00000c569f300 [ 22.049235] which belongs to the cache kmalloc-64 of size 64 [ 22.049353] The buggy address is located 0 bytes to the right of [ 22.049353] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.049594] [ 22.049832] The buggy address belongs to the physical page: [ 22.049878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.049967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.050087] page_type: f5(slab) [ 22.050185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.051081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.051139] page dumped because: kasan: bad access detected [ 22.051318] [ 22.051374] Memory state around the buggy address: [ 22.051411] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.052504] ^ [ 22.054519] [ 22.055055] kasan_atomics_helper+0xad4/0x4858 [ 22.055482] kasan_save_alloc_info+0x40/0x58 [ 22.055533] __kasan_kmalloc+0xd4/0xd8 [ 22.055582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.055624] kasan_atomics+0xb8/0x2e0 [ 22.055661] kunit_try_run_case+0x170/0x3f0 [ 22.055720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.056733] kthread+0x328/0x630 [ 22.056806] ret_from_fork+0x10/0x20 [ 22.056915] [ 22.056995] The buggy address belongs to the object at fff00000c569f300 [ 22.056995] which belongs to the cache kmalloc-64 of size 64 [ 22.057103] The buggy address is located 0 bytes to the right of [ 22.057103] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.057324] [ 22.057639] The buggy address belongs to the physical page: [ 22.057724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.058043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.058234] page_type: f5(slab) [ 22.058320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.058929] [ 22.059462] ^ [ 22.062096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.063438] kasan_atomics+0x198/0x2e0 [ 22.065276] __kasan_kmalloc+0xd4/0xd8 [ 22.065395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.065567] kasan_atomics+0xb8/0x2e0 [ 22.066108] ret_from_fork+0x10/0x20 [ 22.067137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.067899] page dumped because: kasan: bad access detected [ 22.068669] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.070867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 22.071383] Call trace: [ 22.072237] kasan_check_range+0x100/0x1a8 [ 22.074578] kasan_save_alloc_info+0x40/0x58 [ 22.074683] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.074737] kasan_atomics+0xb8/0x2e0 [ 22.074966] [ 22.075147] [ 22.075168] The buggy address belongs to the physical page: [ 22.075444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.077380] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082188] kasan_atomics+0x198/0x2e0 [ 22.084296] kunit_try_run_case+0x170/0x3f0 [ 22.085083] [ 22.085789] The buggy address belongs to the physical page: [ 22.086207] page_type: f5(slab) [ 22.086459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.086747] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.086941] ================================================================== [ 22.367086] ================================================================== [ 22.367243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.367353] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.367673] [ 22.367756] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.367955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.368035] Hardware name: linux,dummy-virt (DT) [ 22.368167] Call trace: [ 22.368207] show_stack+0x20/0x38 (C) [ 22.368258] dump_stack_lvl+0x8c/0xd0 [ 22.368659] print_report+0x118/0x608 [ 22.369050] kasan_report+0xdc/0x128 [ 22.369242] __asan_report_load8_noabort+0x20/0x30 [ 22.369302] kasan_atomics_helper+0x3e20/0x4858 [ 22.369351] kasan_atomics+0x198/0x2e0 [ 22.369397] kunit_try_run_case+0x170/0x3f0 [ 22.369446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.369590] kthread+0x328/0x630 [ 22.369653] ret_from_fork+0x10/0x20 [ 22.369704] [ 22.369738] Allocated by task 265: [ 22.369777] kasan_save_stack+0x3c/0x68 [ 22.369827] kasan_save_track+0x20/0x40 [ 22.369864] kasan_save_alloc_info+0x40/0x58 [ 22.369906] __kasan_kmalloc+0xd4/0xd8 [ 22.369950] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.369991] kasan_atomics+0xb8/0x2e0 [ 22.370066] kunit_try_run_case+0x170/0x3f0 [ 22.370115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.370161] kthread+0x328/0x630 [ 22.370194] ret_from_fork+0x10/0x20 [ 22.370231] [ 22.370259] The buggy address belongs to the object at fff00000c569f300 [ 22.370259] which belongs to the cache kmalloc-64 of size 64 [ 22.370325] The buggy address is located 0 bytes to the right of [ 22.370325] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.370400] [ 22.370430] The buggy address belongs to the physical page: [ 22.370471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.370525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.370575] page_type: f5(slab) [ 22.370637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.370698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.371494] page dumped because: kasan: bad access detected [ 22.371562] [ 22.371801] Memory state around the buggy address: [ 22.371882] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.372113] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.372166] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.372235] ^ [ 22.372271] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.372594] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.372750] ================================================================== [ 22.243121] ================================================================== [ 22.243178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.243229] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.243280] [ 22.243314] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.243396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.243426] Hardware name: linux,dummy-virt (DT) [ 22.243672] Call trace: [ 22.243833] show_stack+0x20/0x38 (C) [ 22.244172] dump_stack_lvl+0x8c/0xd0 [ 22.244406] print_report+0x118/0x608 [ 22.244545] kasan_report+0xdc/0x128 [ 22.244739] kasan_check_range+0x100/0x1a8 [ 22.244795] __kasan_check_write+0x20/0x30 [ 22.244840] kasan_atomics_helper+0x126c/0x4858 [ 22.245078] kasan_atomics+0x198/0x2e0 [ 22.245653] kunit_try_run_case+0x170/0x3f0 [ 22.245797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.245892] kthread+0x328/0x630 [ 22.246038] ret_from_fork+0x10/0x20 [ 22.246130] [ 22.246151] Allocated by task 265: [ 22.246365] kasan_save_stack+0x3c/0x68 [ 22.246552] kasan_save_track+0x20/0x40 [ 22.246862] kasan_save_alloc_info+0x40/0x58 [ 22.247056] __kasan_kmalloc+0xd4/0xd8 [ 22.247158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.247289] kasan_atomics+0xb8/0x2e0 [ 22.247359] kunit_try_run_case+0x170/0x3f0 [ 22.247417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.247464] kthread+0x328/0x630 [ 22.248272] ret_from_fork+0x10/0x20 [ 22.248764] [ 22.248806] The buggy address belongs to the object at fff00000c569f300 [ 22.248806] which belongs to the cache kmalloc-64 of size 64 [ 22.249143] The buggy address is located 0 bytes to the right of [ 22.249143] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.249433] [ 22.249637] The buggy address belongs to the physical page: [ 22.249718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.250011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.250094] page_type: f5(slab) [ 22.250143] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.250803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.250857] page dumped because: kasan: bad access detected [ 22.250897] [ 22.250919] Memory state around the buggy address: [ 22.250962] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.251008] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.251052] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.251101] ^ [ 22.251137] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.251190] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.251234] ================================================================== [ 22.320816] ================================================================== [ 22.320892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.320945] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.320996] [ 22.321030] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.321111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.321138] Hardware name: linux,dummy-virt (DT) [ 22.321171] Call trace: [ 22.321194] show_stack+0x20/0x38 (C) [ 22.321244] dump_stack_lvl+0x8c/0xd0 [ 22.321294] print_report+0x118/0x608 [ 22.321341] kasan_report+0xdc/0x128 [ 22.321398] __asan_report_load8_noabort+0x20/0x30 [ 22.321451] kasan_atomics_helper+0x3db0/0x4858 [ 22.321508] kasan_atomics+0x198/0x2e0 [ 22.321576] kunit_try_run_case+0x170/0x3f0 [ 22.321625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.321681] kthread+0x328/0x630 [ 22.321737] ret_from_fork+0x10/0x20 [ 22.321792] [ 22.321813] Allocated by task 265: [ 22.321843] kasan_save_stack+0x3c/0x68 [ 22.321883] kasan_save_track+0x20/0x40 [ 22.321922] kasan_save_alloc_info+0x40/0x58 [ 22.321962] __kasan_kmalloc+0xd4/0xd8 [ 22.322001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.322040] kasan_atomics+0xb8/0x2e0 [ 22.322077] kunit_try_run_case+0x170/0x3f0 [ 22.322114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.322165] kthread+0x328/0x630 [ 22.322198] ret_from_fork+0x10/0x20 [ 22.322234] [ 22.322264] The buggy address belongs to the object at fff00000c569f300 [ 22.322264] which belongs to the cache kmalloc-64 of size 64 [ 22.322324] The buggy address is located 0 bytes to the right of [ 22.322324] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.322395] [ 22.322417] The buggy address belongs to the physical page: [ 22.322448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.322511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.322560] page_type: f5(slab) [ 22.322599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.322651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.322696] page dumped because: kasan: bad access detected [ 22.323140] [ 22.323584] Memory state around the buggy address: [ 22.323656] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.323731] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.324012] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.324113] ^ [ 22.324594] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.324920] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.324990] ================================================================== [ 22.277323] ================================================================== [ 22.277484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.277734] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.277845] [ 22.277882] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.278116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.278337] Hardware name: linux,dummy-virt (DT) [ 22.278533] Call trace: [ 22.278579] show_stack+0x20/0x38 (C) [ 22.278632] dump_stack_lvl+0x8c/0xd0 [ 22.278864] print_report+0x118/0x608 [ 22.278978] kasan_report+0xdc/0x128 [ 22.279066] kasan_check_range+0x100/0x1a8 [ 22.279119] __kasan_check_write+0x20/0x30 [ 22.279247] kasan_atomics_helper+0x1414/0x4858 [ 22.279320] kasan_atomics+0x198/0x2e0 [ 22.279690] kunit_try_run_case+0x170/0x3f0 [ 22.279787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.280087] kthread+0x328/0x630 [ 22.280278] ret_from_fork+0x10/0x20 [ 22.280394] [ 22.280415] Allocated by task 265: [ 22.280446] kasan_save_stack+0x3c/0x68 [ 22.280488] kasan_save_track+0x20/0x40 [ 22.280528] kasan_save_alloc_info+0x40/0x58 [ 22.280958] __kasan_kmalloc+0xd4/0xd8 [ 22.281195] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.281247] kasan_atomics+0xb8/0x2e0 [ 22.281315] kunit_try_run_case+0x170/0x3f0 [ 22.281992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.282077] kthread+0x328/0x630 [ 22.282136] ret_from_fork+0x10/0x20 [ 22.282174] [ 22.282545] The buggy address belongs to the object at fff00000c569f300 [ 22.282545] which belongs to the cache kmalloc-64 of size 64 [ 22.282997] The buggy address is located 0 bytes to the right of [ 22.282997] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.283072] [ 22.283095] The buggy address belongs to the physical page: [ 22.283150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.283228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.283313] page_type: f5(slab) [ 22.283646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.283736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.284030] page dumped because: kasan: bad access detected [ 22.284115] [ 22.284138] Memory state around the buggy address: [ 22.284475] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.284653] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.284871] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.285014] ^ [ 22.285057] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.285101] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.285168] ================================================================== [ 22.193413] ================================================================== [ 22.193657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 22.193730] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.193781] [ 22.193814] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.193898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.193927] Hardware name: linux,dummy-virt (DT) [ 22.194201] Call trace: [ 22.194245] show_stack+0x20/0x38 (C) [ 22.194571] dump_stack_lvl+0x8c/0xd0 [ 22.194650] print_report+0x118/0x608 [ 22.194777] kasan_report+0xdc/0x128 [ 22.194832] kasan_check_range+0x100/0x1a8 [ 22.194879] __kasan_check_write+0x20/0x30 [ 22.195094] kasan_atomics_helper+0xff0/0x4858 [ 22.195376] kasan_atomics+0x198/0x2e0 [ 22.195566] kunit_try_run_case+0x170/0x3f0 [ 22.195665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.195785] kthread+0x328/0x630 [ 22.195911] ret_from_fork+0x10/0x20 [ 22.196176] [ 22.196211] Allocated by task 265: [ 22.196242] kasan_save_stack+0x3c/0x68 [ 22.196444] kasan_save_track+0x20/0x40 [ 22.196647] kasan_save_alloc_info+0x40/0x58 [ 22.196887] __kasan_kmalloc+0xd4/0xd8 [ 22.197065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.197304] kasan_atomics+0xb8/0x2e0 [ 22.197438] kunit_try_run_case+0x170/0x3f0 [ 22.197526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.197572] kthread+0x328/0x630 [ 22.197659] ret_from_fork+0x10/0x20 [ 22.198115] [ 22.198260] The buggy address belongs to the object at fff00000c569f300 [ 22.198260] which belongs to the cache kmalloc-64 of size 64 [ 22.198501] The buggy address is located 0 bytes to the right of [ 22.198501] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.198724] [ 22.198956] The buggy address belongs to the physical page: [ 22.199124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.199326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.199391] page_type: f5(slab) [ 22.199433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.199611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.199864] page dumped because: kasan: bad access detected [ 22.199946] [ 22.199969] Memory state around the buggy address: [ 22.200218] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.200327] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.200680] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.200788] ^ [ 22.200964] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.201158] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.201213] ================================================================== [ 22.168723] ================================================================== [ 22.168785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 22.168914] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.168980] [ 22.169016] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.169381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.169432] Hardware name: linux,dummy-virt (DT) [ 22.169622] Call trace: [ 22.169658] show_stack+0x20/0x38 (C) [ 22.169790] dump_stack_lvl+0x8c/0xd0 [ 22.169969] print_report+0x118/0x608 [ 22.170056] kasan_report+0xdc/0x128 [ 22.170186] __asan_report_store8_noabort+0x20/0x30 [ 22.170247] kasan_atomics_helper+0x3e5c/0x4858 [ 22.170296] kasan_atomics+0x198/0x2e0 [ 22.170481] kunit_try_run_case+0x170/0x3f0 [ 22.170544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.170972] kthread+0x328/0x630 [ 22.171058] ret_from_fork+0x10/0x20 [ 22.171356] [ 22.171431] Allocated by task 265: [ 22.171603] kasan_save_stack+0x3c/0x68 [ 22.171700] kasan_save_track+0x20/0x40 [ 22.171754] kasan_save_alloc_info+0x40/0x58 [ 22.171797] __kasan_kmalloc+0xd4/0xd8 [ 22.171837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.172226] kasan_atomics+0xb8/0x2e0 [ 22.172459] kunit_try_run_case+0x170/0x3f0 [ 22.172633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.172685] kthread+0x328/0x630 [ 22.172733] ret_from_fork+0x10/0x20 [ 22.173258] [ 22.173354] The buggy address belongs to the object at fff00000c569f300 [ 22.173354] which belongs to the cache kmalloc-64 of size 64 [ 22.173512] The buggy address is located 0 bytes to the right of [ 22.173512] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.173585] [ 22.173607] The buggy address belongs to the physical page: [ 22.173979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.174342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.174643] page_type: f5(slab) [ 22.174887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.175159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.175253] page dumped because: kasan: bad access detected [ 22.175526] [ 22.175621] Memory state around the buggy address: [ 22.175850] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.175920] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.175985] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.176053] ^ [ 22.176090] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.176139] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.176182] ================================================================== [ 22.217811] ================================================================== [ 22.217879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.217929] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.218377] [ 22.218442] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.218537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.218671] Hardware name: linux,dummy-virt (DT) [ 22.218747] Call trace: [ 22.218776] show_stack+0x20/0x38 (C) [ 22.218833] dump_stack_lvl+0x8c/0xd0 [ 22.219231] print_report+0x118/0x608 [ 22.219440] kasan_report+0xdc/0x128 [ 22.219702] kasan_check_range+0x100/0x1a8 [ 22.219859] __kasan_check_write+0x20/0x30 [ 22.219908] kasan_atomics_helper+0x1128/0x4858 [ 22.219958] kasan_atomics+0x198/0x2e0 [ 22.220002] kunit_try_run_case+0x170/0x3f0 [ 22.220060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.220119] kthread+0x328/0x630 [ 22.220162] ret_from_fork+0x10/0x20 [ 22.220221] [ 22.220250] Allocated by task 265: [ 22.220279] kasan_save_stack+0x3c/0x68 [ 22.220331] kasan_save_track+0x20/0x40 [ 22.220379] kasan_save_alloc_info+0x40/0x58 [ 22.220419] __kasan_kmalloc+0xd4/0xd8 [ 22.220474] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.220522] kasan_atomics+0xb8/0x2e0 [ 22.220560] kunit_try_run_case+0x170/0x3f0 [ 22.220597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.220650] kthread+0x328/0x630 [ 22.220693] ret_from_fork+0x10/0x20 [ 22.220742] [ 22.220771] The buggy address belongs to the object at fff00000c569f300 [ 22.220771] which belongs to the cache kmalloc-64 of size 64 [ 22.220846] The buggy address is located 0 bytes to the right of [ 22.220846] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.220914] [ 22.220936] The buggy address belongs to the physical page: [ 22.220967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.221020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.221070] page_type: f5(slab) [ 22.221112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.221192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.221237] page dumped because: kasan: bad access detected [ 22.221280] [ 22.221309] Memory state around the buggy address: [ 22.221343] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.221387] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.221433] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.221474] ^ [ 22.221510] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.221565] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.221611] ================================================================== [ 22.303294] ================================================================== [ 22.303357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.303490] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.303722] [ 22.303763] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.304033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.304153] Hardware name: linux,dummy-virt (DT) [ 22.304368] Call trace: [ 22.304594] show_stack+0x20/0x38 (C) [ 22.304806] dump_stack_lvl+0x8c/0xd0 [ 22.304918] print_report+0x118/0x608 [ 22.305034] kasan_report+0xdc/0x128 [ 22.305094] kasan_check_range+0x100/0x1a8 [ 22.305167] __kasan_check_write+0x20/0x30 [ 22.305566] kasan_atomics_helper+0x154c/0x4858 [ 22.305643] kasan_atomics+0x198/0x2e0 [ 22.305882] kunit_try_run_case+0x170/0x3f0 [ 22.306132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.306248] kthread+0x328/0x630 [ 22.306346] ret_from_fork+0x10/0x20 [ 22.306584] [ 22.306765] Allocated by task 265: [ 22.306960] kasan_save_stack+0x3c/0x68 [ 22.307178] kasan_save_track+0x20/0x40 [ 22.307274] kasan_save_alloc_info+0x40/0x58 [ 22.307389] __kasan_kmalloc+0xd4/0xd8 [ 22.307481] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.307567] kasan_atomics+0xb8/0x2e0 [ 22.307772] kunit_try_run_case+0x170/0x3f0 [ 22.307823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.308033] kthread+0x328/0x630 [ 22.308293] ret_from_fork+0x10/0x20 [ 22.308485] [ 22.308531] The buggy address belongs to the object at fff00000c569f300 [ 22.308531] which belongs to the cache kmalloc-64 of size 64 [ 22.308745] The buggy address is located 0 bytes to the right of [ 22.308745] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.308987] [ 22.309032] The buggy address belongs to the physical page: [ 22.309242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.309406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.309811] page_type: f5(slab) [ 22.310131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.310359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.310435] page dumped because: kasan: bad access detected [ 22.310501] [ 22.310523] Memory state around the buggy address: [ 22.310578] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.310828] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.311020] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.311065] ^ [ 22.311101] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.311145] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.311185] ================================================================== [ 22.295020] ================================================================== [ 22.295075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.295150] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.295479] [ 22.295688] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.295947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.296068] Hardware name: linux,dummy-virt (DT) [ 22.296189] Call trace: [ 22.296314] show_stack+0x20/0x38 (C) [ 22.296509] dump_stack_lvl+0x8c/0xd0 [ 22.296573] print_report+0x118/0x608 [ 22.296626] kasan_report+0xdc/0x128 [ 22.296673] kasan_check_range+0x100/0x1a8 [ 22.297045] __kasan_check_write+0x20/0x30 [ 22.297448] kasan_atomics_helper+0x14e4/0x4858 [ 22.297588] kasan_atomics+0x198/0x2e0 [ 22.297705] kunit_try_run_case+0x170/0x3f0 [ 22.297833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.298093] kthread+0x328/0x630 [ 22.298294] ret_from_fork+0x10/0x20 [ 22.298391] [ 22.298545] Allocated by task 265: [ 22.298622] kasan_save_stack+0x3c/0x68 [ 22.298805] kasan_save_track+0x20/0x40 [ 22.298983] kasan_save_alloc_info+0x40/0x58 [ 22.299130] __kasan_kmalloc+0xd4/0xd8 [ 22.299234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.299278] kasan_atomics+0xb8/0x2e0 [ 22.299321] kunit_try_run_case+0x170/0x3f0 [ 22.299618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.299764] kthread+0x328/0x630 [ 22.299807] ret_from_fork+0x10/0x20 [ 22.299848] [ 22.300210] The buggy address belongs to the object at fff00000c569f300 [ 22.300210] which belongs to the cache kmalloc-64 of size 64 [ 22.300506] The buggy address is located 0 bytes to the right of [ 22.300506] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.300618] [ 22.300763] The buggy address belongs to the physical page: [ 22.300800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.300858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.301300] page_type: f5(slab) [ 22.301371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.301425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.301467] page dumped because: kasan: bad access detected [ 22.301546] [ 22.301569] Memory state around the buggy address: [ 22.301616] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.301682] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.301738] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.301779] ^ [ 22.301816] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.301859] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.301915] ================================================================== [ 22.358206] ================================================================== [ 22.358337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.358451] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.358528] [ 22.358561] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.358644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.358935] Hardware name: linux,dummy-virt (DT) [ 22.358986] Call trace: [ 22.359220] show_stack+0x20/0x38 (C) [ 22.359313] dump_stack_lvl+0x8c/0xd0 [ 22.359370] print_report+0x118/0x608 [ 22.359436] kasan_report+0xdc/0x128 [ 22.359655] kasan_check_range+0x100/0x1a8 [ 22.359803] __kasan_check_write+0x20/0x30 [ 22.359891] kasan_atomics_helper+0x175c/0x4858 [ 22.359949] kasan_atomics+0x198/0x2e0 [ 22.359994] kunit_try_run_case+0x170/0x3f0 [ 22.360042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.360102] kthread+0x328/0x630 [ 22.360327] ret_from_fork+0x10/0x20 [ 22.360788] [ 22.360901] Allocated by task 265: [ 22.361039] kasan_save_stack+0x3c/0x68 [ 22.361181] kasan_save_track+0x20/0x40 [ 22.361476] kasan_save_alloc_info+0x40/0x58 [ 22.361681] __kasan_kmalloc+0xd4/0xd8 [ 22.361914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.362160] kasan_atomics+0xb8/0x2e0 [ 22.362311] kunit_try_run_case+0x170/0x3f0 [ 22.362392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.362474] kthread+0x328/0x630 [ 22.362604] ret_from_fork+0x10/0x20 [ 22.362657] [ 22.362679] The buggy address belongs to the object at fff00000c569f300 [ 22.362679] which belongs to the cache kmalloc-64 of size 64 [ 22.362910] The buggy address is located 0 bytes to the right of [ 22.362910] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.363019] [ 22.363181] The buggy address belongs to the physical page: [ 22.363377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.363518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.363987] page_type: f5(slab) [ 22.364102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.364637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.364917] page dumped because: kasan: bad access detected [ 22.365216] [ 22.365355] Memory state around the buggy address: [ 22.365509] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.365756] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.365836] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.366033] ^ [ 22.366261] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.366319] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.366534] ================================================================== [ 22.374386] ================================================================== [ 22.374458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.374544] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.374597] [ 22.374796] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.374932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.374983] Hardware name: linux,dummy-virt (DT) [ 22.375023] Call trace: [ 22.375049] show_stack+0x20/0x38 (C) [ 22.375101] dump_stack_lvl+0x8c/0xd0 [ 22.375325] print_report+0x118/0x608 [ 22.375390] kasan_report+0xdc/0x128 [ 22.375737] kasan_check_range+0x100/0x1a8 [ 22.376070] __kasan_check_write+0x20/0x30 [ 22.376148] kasan_atomics_helper+0x17ec/0x4858 [ 22.376205] kasan_atomics+0x198/0x2e0 [ 22.376252] kunit_try_run_case+0x170/0x3f0 [ 22.376492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.376743] kthread+0x328/0x630 [ 22.377084] ret_from_fork+0x10/0x20 [ 22.377207] [ 22.377415] Allocated by task 265: [ 22.377684] kasan_save_stack+0x3c/0x68 [ 22.377902] kasan_save_track+0x20/0x40 [ 22.377976] kasan_save_alloc_info+0x40/0x58 [ 22.378208] __kasan_kmalloc+0xd4/0xd8 [ 22.378548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.378680] kasan_atomics+0xb8/0x2e0 [ 22.378933] kunit_try_run_case+0x170/0x3f0 [ 22.379181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.379285] kthread+0x328/0x630 [ 22.379474] ret_from_fork+0x10/0x20 [ 22.379723] [ 22.379763] The buggy address belongs to the object at fff00000c569f300 [ 22.379763] which belongs to the cache kmalloc-64 of size 64 [ 22.380094] The buggy address is located 0 bytes to the right of [ 22.380094] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.380178] [ 22.380202] The buggy address belongs to the physical page: [ 22.380656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.380862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.381348] page_type: f5(slab) [ 22.381405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.381843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.381927] page dumped because: kasan: bad access detected [ 22.382016] [ 22.382039] Memory state around the buggy address: [ 22.382076] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.382348] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.382444] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.382651] ^ [ 22.382862] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.382928] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.382984] ================================================================== [ 22.012267] ================================================================== [ 22.012322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 22.012374] Read of size 4 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.012563] [ 22.012608] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.012859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.012901] Hardware name: linux,dummy-virt (DT) [ 22.013201] Call trace: [ 22.013245] show_stack+0x20/0x38 (C) [ 22.013312] dump_stack_lvl+0x8c/0xd0 [ 22.013440] print_report+0x118/0x608 [ 22.013495] kasan_report+0xdc/0x128 [ 22.013541] __asan_report_load4_noabort+0x20/0x30 [ 22.013703] kasan_atomics_helper+0x42d8/0x4858 [ 22.013824] kunit_try_run_case+0x170/0x3f0 [ 22.014656] kasan_save_alloc_info+0x40/0x58 [ 22.014726] __kasan_kmalloc+0xd4/0xd8 [ 22.014993] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.015249] kthread+0x328/0x630 [ 22.015838] [ 22.015860] The buggy address belongs to the physical page: [ 22.016402] page_type: f5(slab) [ 22.017513] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.017754] ================================================================== [ 22.344489] ================================================================== [ 22.344543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.344592] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.344689] [ 22.344732] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.344816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.344843] Hardware name: linux,dummy-virt (DT) [ 22.344874] Call trace: [ 22.344898] show_stack+0x20/0x38 (C) [ 22.344948] dump_stack_lvl+0x8c/0xd0 [ 22.344995] print_report+0x118/0x608 [ 22.345043] kasan_report+0xdc/0x128 [ 22.345103] kasan_check_range+0x100/0x1a8 [ 22.345160] __kasan_check_write+0x20/0x30 [ 22.345207] kasan_atomics_helper+0x16d0/0x4858 [ 22.345254] kasan_atomics+0x198/0x2e0 [ 22.345300] kunit_try_run_case+0x170/0x3f0 [ 22.345355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.345417] kthread+0x328/0x630 [ 22.345459] ret_from_fork+0x10/0x20 [ 22.345511] [ 22.345534] Allocated by task 265: [ 22.345562] kasan_save_stack+0x3c/0x68 [ 22.345604] kasan_save_track+0x20/0x40 [ 22.345650] kasan_save_alloc_info+0x40/0x58 [ 22.345692] __kasan_kmalloc+0xd4/0xd8 [ 22.345740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.345790] kasan_atomics+0xb8/0x2e0 [ 22.345826] kunit_try_run_case+0x170/0x3f0 [ 22.345865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.345911] kthread+0x328/0x630 [ 22.345945] ret_from_fork+0x10/0x20 [ 22.345982] [ 22.346002] The buggy address belongs to the object at fff00000c569f300 [ 22.346002] which belongs to the cache kmalloc-64 of size 64 [ 22.346061] The buggy address is located 0 bytes to the right of [ 22.346061] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.346135] [ 22.346158] The buggy address belongs to the physical page: [ 22.346199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.346261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.346318] page_type: f5(slab) [ 22.346356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.346408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.346451] page dumped because: kasan: bad access detected [ 22.346483] [ 22.346504] Memory state around the buggy address: [ 22.346539] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.346584] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.346636] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.346682] ^ [ 22.347228] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.347953] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.348013] ================================================================== [ 22.151250] ================================================================== [ 22.151429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 22.151517] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.151570] [ 22.151741] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.151892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.151937] Hardware name: linux,dummy-virt (DT) [ 22.151968] Call trace: [ 22.152124] show_stack+0x20/0x38 (C) [ 22.152336] dump_stack_lvl+0x8c/0xd0 [ 22.152462] print_report+0x118/0x608 [ 22.152626] kasan_report+0xdc/0x128 [ 22.152794] __asan_report_load8_noabort+0x20/0x30 [ 22.153007] kasan_atomics_helper+0x3f58/0x4858 [ 22.153141] kasan_atomics+0x198/0x2e0 [ 22.153232] kunit_try_run_case+0x170/0x3f0 [ 22.153366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.153424] kthread+0x328/0x630 [ 22.153493] ret_from_fork+0x10/0x20 [ 22.153910] [ 22.154358] Allocated by task 265: [ 22.154411] kasan_save_stack+0x3c/0x68 [ 22.154724] kasan_save_track+0x20/0x40 [ 22.154783] kasan_save_alloc_info+0x40/0x58 [ 22.154836] __kasan_kmalloc+0xd4/0xd8 [ 22.154875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.154916] kasan_atomics+0xb8/0x2e0 [ 22.154955] kunit_try_run_case+0x170/0x3f0 [ 22.155343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.155692] kthread+0x328/0x630 [ 22.156106] ret_from_fork+0x10/0x20 [ 22.156176] [ 22.156313] The buggy address belongs to the object at fff00000c569f300 [ 22.156313] which belongs to the cache kmalloc-64 of size 64 [ 22.156544] The buggy address is located 0 bytes to the right of [ 22.156544] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.156963] [ 22.157098] The buggy address belongs to the physical page: [ 22.157161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.157237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.157449] page_type: f5(slab) [ 22.157662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.157984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.158111] page dumped because: kasan: bad access detected [ 22.158311] [ 22.158485] Memory state around the buggy address: [ 22.158527] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.158842] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.159077] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.159347] ^ [ 22.159566] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.159626] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.159951] ================================================================== [ 22.333608] ================================================================== [ 22.333674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.333793] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.334095] [ 22.334379] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.334768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.335055] Hardware name: linux,dummy-virt (DT) [ 22.335101] Call trace: [ 22.335365] show_stack+0x20/0x38 (C) [ 22.335536] dump_stack_lvl+0x8c/0xd0 [ 22.335666] print_report+0x118/0x608 [ 22.335781] kasan_report+0xdc/0x128 [ 22.335846] __asan_report_load8_noabort+0x20/0x30 [ 22.336123] kasan_atomics_helper+0x3df4/0x4858 [ 22.336375] kasan_atomics+0x198/0x2e0 [ 22.336482] kunit_try_run_case+0x170/0x3f0 [ 22.337085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.337229] kthread+0x328/0x630 [ 22.337422] ret_from_fork+0x10/0x20 [ 22.337636] [ 22.337733] Allocated by task 265: [ 22.337912] kasan_save_stack+0x3c/0x68 [ 22.338211] kasan_save_track+0x20/0x40 [ 22.338299] kasan_save_alloc_info+0x40/0x58 [ 22.338433] __kasan_kmalloc+0xd4/0xd8 [ 22.338530] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.338778] kasan_atomics+0xb8/0x2e0 [ 22.339055] kunit_try_run_case+0x170/0x3f0 [ 22.339132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.339346] kthread+0x328/0x630 [ 22.339505] ret_from_fork+0x10/0x20 [ 22.339706] [ 22.339776] The buggy address belongs to the object at fff00000c569f300 [ 22.339776] which belongs to the cache kmalloc-64 of size 64 [ 22.339984] The buggy address is located 0 bytes to the right of [ 22.339984] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.340064] [ 22.340092] The buggy address belongs to the physical page: [ 22.340130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.340350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.340596] page_type: f5(slab) [ 22.340972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.341032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.341076] page dumped because: kasan: bad access detected [ 22.341268] [ 22.341444] Memory state around the buggy address: [ 22.341909] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.341970] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.342162] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.342236] ^ [ 22.342519] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.342832] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.342984] ================================================================== [ 22.032320] ================================================================== [ 22.032373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 22.032700] [ 22.033022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.034000] kasan_check_range+0x100/0x1a8 [ 22.034999] ret_from_fork+0x10/0x20 [ 22.035111] [ 22.035178] Allocated by task 265: [ 22.035225] kasan_save_stack+0x3c/0x68 [ 22.035407] kasan_save_track+0x20/0x40 [ 22.035490] kasan_save_alloc_info+0x40/0x58 [ 22.035549] __kasan_kmalloc+0xd4/0xd8 [ 22.035674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.035925] kasan_atomics+0xb8/0x2e0 [ 22.036112] kunit_try_run_case+0x170/0x3f0 [ 22.036202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.036254] kthread+0x328/0x630 [ 22.036287] ret_from_fork+0x10/0x20 [ 22.036583] [ 22.036827] The buggy address belongs to the object at fff00000c569f300 [ 22.036827] which belongs to the cache kmalloc-64 of size 64 [ 22.037008] The buggy address is located 0 bytes to the right of [ 22.037008] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.037319] [ 22.037467] The buggy address belongs to the physical page: [ 22.037805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.037997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.038116] page_type: f5(slab) [ 22.038364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.039298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.039725] page dumped because: kasan: bad access detected [ 22.039793] [ 22.039842] Memory state around the buggy address: [ 22.040004] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.040262] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.040314] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.040414] ^ [ 22.040878] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.040965] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.041094] ================================================================== [ 22.222831] ================================================================== [ 22.222884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.222955] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.223007] [ 22.223438] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.223557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.223586] Hardware name: linux,dummy-virt (DT) [ 22.223619] Call trace: [ 22.223952] show_stack+0x20/0x38 (C) [ 22.224185] dump_stack_lvl+0x8c/0xd0 [ 22.224471] print_report+0x118/0x608 [ 22.224870] kasan_report+0xdc/0x128 [ 22.225481] kasan_check_range+0x100/0x1a8 [ 22.225771] __kasan_check_write+0x20/0x30 [ 22.225880] kasan_atomics_helper+0x1190/0x4858 [ 22.225961] kasan_atomics+0x198/0x2e0 [ 22.226008] kunit_try_run_case+0x170/0x3f0 [ 22.226077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.226691] kthread+0x328/0x630 [ 22.226959] ret_from_fork+0x10/0x20 [ 22.227492] [ 22.227738] Allocated by task 265: [ 22.227817] kasan_save_stack+0x3c/0x68 [ 22.227888] kasan_save_track+0x20/0x40 [ 22.228041] kasan_save_alloc_info+0x40/0x58 [ 22.228295] __kasan_kmalloc+0xd4/0xd8 [ 22.228497] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.228677] kasan_atomics+0xb8/0x2e0 [ 22.228783] kunit_try_run_case+0x170/0x3f0 [ 22.229028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.229198] kthread+0x328/0x630 [ 22.229601] ret_from_fork+0x10/0x20 [ 22.229674] [ 22.229697] The buggy address belongs to the object at fff00000c569f300 [ 22.229697] which belongs to the cache kmalloc-64 of size 64 [ 22.229965] The buggy address is located 0 bytes to the right of [ 22.229965] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.230267] [ 22.230601] The buggy address belongs to the physical page: [ 22.230648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.231183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.231363] page_type: f5(slab) [ 22.231567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.231637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.231845] page dumped because: kasan: bad access detected [ 22.232073] [ 22.232293] Memory state around the buggy address: [ 22.232506] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.232620] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.232666] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.232867] ^ [ 22.232928] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.233019] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.233191] ================================================================== [ 22.209192] ================================================================== [ 22.209245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.209448] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.209512] [ 22.209547] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.209822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.209998] Hardware name: linux,dummy-virt (DT) [ 22.210042] Call trace: [ 22.210068] show_stack+0x20/0x38 (C) [ 22.210120] dump_stack_lvl+0x8c/0xd0 [ 22.210167] print_report+0x118/0x608 [ 22.210749] kasan_report+0xdc/0x128 [ 22.210828] kasan_check_range+0x100/0x1a8 [ 22.211038] __kasan_check_write+0x20/0x30 [ 22.211209] kasan_atomics_helper+0x10c0/0x4858 [ 22.211270] kasan_atomics+0x198/0x2e0 [ 22.211406] kunit_try_run_case+0x170/0x3f0 [ 22.211586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.211645] kthread+0x328/0x630 [ 22.211688] ret_from_fork+0x10/0x20 [ 22.211967] [ 22.212125] Allocated by task 265: [ 22.212296] kasan_save_stack+0x3c/0x68 [ 22.212518] kasan_save_track+0x20/0x40 [ 22.212745] kasan_save_alloc_info+0x40/0x58 [ 22.212894] __kasan_kmalloc+0xd4/0xd8 [ 22.212981] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.213024] kasan_atomics+0xb8/0x2e0 [ 22.213101] kunit_try_run_case+0x170/0x3f0 [ 22.213429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.213980] kthread+0x328/0x630 [ 22.214255] ret_from_fork+0x10/0x20 [ 22.214475] [ 22.214534] The buggy address belongs to the object at fff00000c569f300 [ 22.214534] which belongs to the cache kmalloc-64 of size 64 [ 22.214787] The buggy address is located 0 bytes to the right of [ 22.214787] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.214960] [ 22.215200] The buggy address belongs to the physical page: [ 22.215255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.215324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.215452] page_type: f5(slab) [ 22.215496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.215688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.216041] page dumped because: kasan: bad access detected [ 22.216131] [ 22.216302] Memory state around the buggy address: [ 22.216345] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.216530] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.216583] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.216768] ^ [ 22.216831] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.217072] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.217212] ================================================================== [ 22.253198] ================================================================== [ 22.253273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.253326] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.253487] [ 22.253545] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.253685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.253746] Hardware name: linux,dummy-virt (DT) [ 22.253778] Call trace: [ 22.253804] show_stack+0x20/0x38 (C) [ 22.253860] dump_stack_lvl+0x8c/0xd0 [ 22.254213] print_report+0x118/0x608 [ 22.254629] kasan_report+0xdc/0x128 [ 22.254707] kasan_check_range+0x100/0x1a8 [ 22.254862] __kasan_check_write+0x20/0x30 [ 22.254912] kasan_atomics_helper+0x12d8/0x4858 [ 22.255230] kasan_atomics+0x198/0x2e0 [ 22.255299] kunit_try_run_case+0x170/0x3f0 [ 22.255640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.255751] kthread+0x328/0x630 [ 22.255867] ret_from_fork+0x10/0x20 [ 22.256030] [ 22.256147] Allocated by task 265: [ 22.256190] kasan_save_stack+0x3c/0x68 [ 22.256241] kasan_save_track+0x20/0x40 [ 22.256281] kasan_save_alloc_info+0x40/0x58 [ 22.256592] __kasan_kmalloc+0xd4/0xd8 [ 22.256705] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.257169] kasan_atomics+0xb8/0x2e0 [ 22.257301] kunit_try_run_case+0x170/0x3f0 [ 22.257378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.257759] kthread+0x328/0x630 [ 22.258003] ret_from_fork+0x10/0x20 [ 22.258083] [ 22.258128] The buggy address belongs to the object at fff00000c569f300 [ 22.258128] which belongs to the cache kmalloc-64 of size 64 [ 22.258205] The buggy address is located 0 bytes to the right of [ 22.258205] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.258655] [ 22.258924] The buggy address belongs to the physical page: [ 22.259093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.259188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.259391] page_type: f5(slab) [ 22.259653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.259808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.259931] page dumped because: kasan: bad access detected [ 22.259968] [ 22.260240] Memory state around the buggy address: [ 22.260376] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.260424] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.260497] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.260553] ^ [ 22.260600] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.260643] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.260689] ================================================================== [ 22.261979] ================================================================== [ 22.262033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.262204] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.262269] [ 22.262473] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.262616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.262648] Hardware name: linux,dummy-virt (DT) [ 22.262678] Call trace: [ 22.262705] show_stack+0x20/0x38 (C) [ 22.262768] dump_stack_lvl+0x8c/0xd0 [ 22.263236] print_report+0x118/0x608 [ 22.263308] kasan_report+0xdc/0x128 [ 22.263355] kasan_check_range+0x100/0x1a8 [ 22.263583] __kasan_check_write+0x20/0x30 [ 22.263688] kasan_atomics_helper+0x1384/0x4858 [ 22.263751] kasan_atomics+0x198/0x2e0 [ 22.263795] kunit_try_run_case+0x170/0x3f0 [ 22.264195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.264303] kthread+0x328/0x630 [ 22.264603] ret_from_fork+0x10/0x20 [ 22.264830] [ 22.265004] Allocated by task 265: [ 22.265321] kasan_save_stack+0x3c/0x68 [ 22.265518] kasan_save_track+0x20/0x40 [ 22.265685] kasan_save_alloc_info+0x40/0x58 [ 22.265820] __kasan_kmalloc+0xd4/0xd8 [ 22.265920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.265981] kasan_atomics+0xb8/0x2e0 [ 22.266020] kunit_try_run_case+0x170/0x3f0 [ 22.266058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.266104] kthread+0x328/0x630 [ 22.266176] ret_from_fork+0x10/0x20 [ 22.266214] [ 22.266237] The buggy address belongs to the object at fff00000c569f300 [ 22.266237] which belongs to the cache kmalloc-64 of size 64 [ 22.266311] The buggy address is located 0 bytes to the right of [ 22.266311] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.266386] [ 22.266423] The buggy address belongs to the physical page: [ 22.266464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.266534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.266583] page_type: f5(slab) [ 22.266658] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.266731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.266793] page dumped because: kasan: bad access detected [ 22.266829] [ 22.266859] Memory state around the buggy address: [ 22.266900] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.266945] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.266990] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.267030] ^ [ 22.267065] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.267108] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.267148] ================================================================== [ 22.268037] ================================================================== [ 22.268481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.268634] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.268981] [ 22.269024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.269130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.269169] Hardware name: linux,dummy-virt (DT) [ 22.269211] Call trace: [ 22.269243] show_stack+0x20/0x38 (C) [ 22.269297] dump_stack_lvl+0x8c/0xd0 [ 22.269578] print_report+0x118/0x608 [ 22.269776] kasan_report+0xdc/0x128 [ 22.269849] __asan_report_load8_noabort+0x20/0x30 [ 22.269901] kasan_atomics_helper+0x3f04/0x4858 [ 22.270160] kasan_atomics+0x198/0x2e0 [ 22.270275] kunit_try_run_case+0x170/0x3f0 [ 22.270456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.270647] kthread+0x328/0x630 [ 22.270929] ret_from_fork+0x10/0x20 [ 22.271088] [ 22.271115] Allocated by task 265: [ 22.271184] kasan_save_stack+0x3c/0x68 [ 22.271342] kasan_save_track+0x20/0x40 [ 22.271408] kasan_save_alloc_info+0x40/0x58 [ 22.271460] __kasan_kmalloc+0xd4/0xd8 [ 22.271556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.271613] kasan_atomics+0xb8/0x2e0 [ 22.271651] kunit_try_run_case+0x170/0x3f0 [ 22.271860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.272068] kthread+0x328/0x630 [ 22.272184] ret_from_fork+0x10/0x20 [ 22.272244] [ 22.272501] The buggy address belongs to the object at fff00000c569f300 [ 22.272501] which belongs to the cache kmalloc-64 of size 64 [ 22.272799] The buggy address is located 0 bytes to the right of [ 22.272799] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.272990] [ 22.273158] The buggy address belongs to the physical page: [ 22.273339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.273937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.274190] page_type: f5(slab) [ 22.274273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.274346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.274563] page dumped because: kasan: bad access detected [ 22.274830] [ 22.275058] Memory state around the buggy address: [ 22.275323] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.275554] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.275787] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.275982] ^ [ 22.276028] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.276209] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.276311] ================================================================== [ 22.348827] ================================================================== [ 22.348879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.349250] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.349517] [ 22.349575] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.349742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.349802] Hardware name: linux,dummy-virt (DT) [ 22.349836] Call trace: [ 22.349866] show_stack+0x20/0x38 (C) [ 22.349919] dump_stack_lvl+0x8c/0xd0 [ 22.349966] print_report+0x118/0x608 [ 22.350252] kasan_report+0xdc/0x128 [ 22.350330] __asan_report_load8_noabort+0x20/0x30 [ 22.350383] kasan_atomics_helper+0x3e10/0x4858 [ 22.350839] kasan_atomics+0x198/0x2e0 [ 22.350997] kunit_try_run_case+0x170/0x3f0 [ 22.351475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.351575] kthread+0x328/0x630 [ 22.351638] ret_from_fork+0x10/0x20 [ 22.351811] [ 22.351834] Allocated by task 265: [ 22.351866] kasan_save_stack+0x3c/0x68 [ 22.351916] kasan_save_track+0x20/0x40 [ 22.351955] kasan_save_alloc_info+0x40/0x58 [ 22.351995] __kasan_kmalloc+0xd4/0xd8 [ 22.352205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.352905] kasan_atomics+0xb8/0x2e0 [ 22.352981] kunit_try_run_case+0x170/0x3f0 [ 22.353156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.353251] kthread+0x328/0x630 [ 22.353478] ret_from_fork+0x10/0x20 [ 22.353660] [ 22.353873] The buggy address belongs to the object at fff00000c569f300 [ 22.353873] which belongs to the cache kmalloc-64 of size 64 [ 22.354162] The buggy address is located 0 bytes to the right of [ 22.354162] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.354303] [ 22.354371] The buggy address belongs to the physical page: [ 22.354499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.354596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.354758] page_type: f5(slab) [ 22.354842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.354895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.354938] page dumped because: kasan: bad access detected [ 22.355109] [ 22.355554] Memory state around the buggy address: [ 22.355601] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.355649] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.355694] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.356193] ^ [ 22.356514] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.356610] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.356654] ================================================================== [ 22.161410] ================================================================== [ 22.161470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 22.161521] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.161572] [ 22.161625] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.161722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.161750] Hardware name: linux,dummy-virt (DT) [ 22.161783] Call trace: [ 22.161807] show_stack+0x20/0x38 (C) [ 22.161861] dump_stack_lvl+0x8c/0xd0 [ 22.161908] print_report+0x118/0x608 [ 22.161955] kasan_report+0xdc/0x128 [ 22.162000] kasan_check_range+0x100/0x1a8 [ 22.162048] __kasan_check_write+0x20/0x30 [ 22.162092] kasan_atomics_helper+0xe44/0x4858 [ 22.162141] kasan_atomics+0x198/0x2e0 [ 22.162195] kunit_try_run_case+0x170/0x3f0 [ 22.162244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.162296] kthread+0x328/0x630 [ 22.162347] ret_from_fork+0x10/0x20 [ 22.162400] [ 22.162421] Allocated by task 265: [ 22.162452] kasan_save_stack+0x3c/0x68 [ 22.162502] kasan_save_track+0x20/0x40 [ 22.162541] kasan_save_alloc_info+0x40/0x58 [ 22.162583] __kasan_kmalloc+0xd4/0xd8 [ 22.162621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.162661] kasan_atomics+0xb8/0x2e0 [ 22.162699] kunit_try_run_case+0x170/0x3f0 [ 22.163105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.163170] kthread+0x328/0x630 [ 22.163470] ret_from_fork+0x10/0x20 [ 22.163542] [ 22.163587] The buggy address belongs to the object at fff00000c569f300 [ 22.163587] which belongs to the cache kmalloc-64 of size 64 [ 22.163970] The buggy address is located 0 bytes to the right of [ 22.163970] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.164200] [ 22.164331] The buggy address belongs to the physical page: [ 22.164366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.164751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.165232] page_type: f5(slab) [ 22.165321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.165574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.165793] page dumped because: kasan: bad access detected [ 22.166036] [ 22.166086] Memory state around the buggy address: [ 22.166253] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.166360] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.166416] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.166610] ^ [ 22.166972] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.167219] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.167319] ================================================================== [ 22.119809] ================================================================== [ 22.119861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 22.120259] Write of size 4 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.120408] [ 22.120589] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.120676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.121029] Hardware name: linux,dummy-virt (DT) [ 22.121462] Call trace: [ 22.121514] show_stack+0x20/0x38 (C) [ 22.121609] dump_stack_lvl+0x8c/0xd0 [ 22.121788] print_report+0x118/0x608 [ 22.121876] kasan_report+0xdc/0x128 [ 22.122099] kasan_check_range+0x100/0x1a8 [ 22.122194] __kasan_check_write+0x20/0x30 [ 22.122524] kasan_atomics_helper+0xd3c/0x4858 [ 22.122583] kasan_atomics+0x198/0x2e0 [ 22.123088] kunit_try_run_case+0x170/0x3f0 [ 22.123315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.123474] kthread+0x328/0x630 [ 22.123553] ret_from_fork+0x10/0x20 [ 22.124024] [ 22.124122] Allocated by task 265: [ 22.124317] kasan_save_stack+0x3c/0x68 [ 22.124545] kasan_save_track+0x20/0x40 [ 22.124887] kasan_save_alloc_info+0x40/0x58 [ 22.125079] __kasan_kmalloc+0xd4/0xd8 [ 22.125167] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.125384] kasan_atomics+0xb8/0x2e0 [ 22.125473] kunit_try_run_case+0x170/0x3f0 [ 22.125718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.125982] kthread+0x328/0x630 [ 22.126324] ret_from_fork+0x10/0x20 [ 22.126677] [ 22.126849] The buggy address belongs to the object at fff00000c569f300 [ 22.126849] which belongs to the cache kmalloc-64 of size 64 [ 22.127201] The buggy address is located 0 bytes to the right of [ 22.127201] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.127337] [ 22.127364] The buggy address belongs to the physical page: [ 22.127593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.127851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.128089] page_type: f5(slab) [ 22.128458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.128659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.128971] page dumped because: kasan: bad access detected [ 22.129050] [ 22.129302] Memory state around the buggy address: [ 22.129436] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.129679] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.130061] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.130251] ^ [ 22.130367] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130455] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130594] ================================================================== [ 22.141917] ================================================================== [ 22.141970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 22.142114] Read of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.142175] [ 22.142216] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.142606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.142895] Hardware name: linux,dummy-virt (DT) [ 22.142976] Call trace: [ 22.143009] show_stack+0x20/0x38 (C) [ 22.143060] dump_stack_lvl+0x8c/0xd0 [ 22.143109] print_report+0x118/0x608 [ 22.143155] kasan_report+0xdc/0x128 [ 22.143221] kasan_check_range+0x100/0x1a8 [ 22.143271] __kasan_check_read+0x20/0x30 [ 22.143339] kasan_atomics_helper+0xdd4/0x4858 [ 22.143395] kasan_atomics+0x198/0x2e0 [ 22.143443] kunit_try_run_case+0x170/0x3f0 [ 22.144131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.144200] kthread+0x328/0x630 [ 22.144243] ret_from_fork+0x10/0x20 [ 22.144305] [ 22.144326] Allocated by task 265: [ 22.144754] kasan_save_stack+0x3c/0x68 [ 22.144956] kasan_save_track+0x20/0x40 [ 22.145012] kasan_save_alloc_info+0x40/0x58 [ 22.145055] __kasan_kmalloc+0xd4/0xd8 [ 22.145532] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.145720] kasan_atomics+0xb8/0x2e0 [ 22.145836] kunit_try_run_case+0x170/0x3f0 [ 22.145927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.145982] kthread+0x328/0x630 [ 22.146023] ret_from_fork+0x10/0x20 [ 22.146210] [ 22.146337] The buggy address belongs to the object at fff00000c569f300 [ 22.146337] which belongs to the cache kmalloc-64 of size 64 [ 22.146784] The buggy address is located 0 bytes to the right of [ 22.146784] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.146867] [ 22.146951] The buggy address belongs to the physical page: [ 22.147498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.147747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.147837] page_type: f5(slab) [ 22.147881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.147933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.148206] page dumped because: kasan: bad access detected [ 22.148493] [ 22.148561] Memory state around the buggy address: [ 22.148894] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.149035] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.149114] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.149155] ^ [ 22.149208] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.149268] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.149307] ================================================================== [ 22.028548] ================================================================== [ 22.028633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 22.028698] Write of size 4 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.028763] [ 22.028796] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.028878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.028907] Hardware name: linux,dummy-virt (DT) [ 22.028949] Call trace: [ 22.028974] show_stack+0x20/0x38 (C) [ 22.029022] dump_stack_lvl+0x8c/0xd0 [ 22.029068] print_report+0x118/0x608 [ 22.029116] kasan_report+0xdc/0x128 [ 22.029161] kasan_check_range+0x100/0x1a8 [ 22.029217] __kasan_check_write+0x20/0x30 [ 22.029265] kasan_atomics_helper+0x99c/0x4858 [ 22.029313] kasan_atomics+0x198/0x2e0 [ 22.029358] kunit_try_run_case+0x170/0x3f0 [ 22.029406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.029457] kthread+0x328/0x630 [ 22.029500] ret_from_fork+0x10/0x20 [ 22.029547] [ 22.029568] Allocated by task 265: [ 22.029598] kasan_save_stack+0x3c/0x68 [ 22.029639] kasan_save_track+0x20/0x40 [ 22.029676] kasan_save_alloc_info+0x40/0x58 [ 22.029728] __kasan_kmalloc+0xd4/0xd8 [ 22.029770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.029810] kasan_atomics+0xb8/0x2e0 [ 22.029848] kunit_try_run_case+0x170/0x3f0 [ 22.029887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.029931] kthread+0x328/0x630 [ 22.029966] ret_from_fork+0x10/0x20 [ 22.030002] [ 22.030022] The buggy address belongs to the object at fff00000c569f300 [ 22.030022] which belongs to the cache kmalloc-64 of size 64 [ 22.030089] The buggy address is located 0 bytes to the right of [ 22.030089] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.030156] [ 22.030187] The buggy address belongs to the physical page: [ 22.030219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.030271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.030319] page_type: f5(slab) [ 22.030357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.030408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.030467] page dumped because: kasan: bad access detected [ 22.030500] [ 22.030522] Memory state around the buggy address: [ 22.030564] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.030610] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.030654] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.030694] ^ [ 22.031564] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.031631] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.031731] ================================================================== [ 22.312664] ================================================================== [ 22.312806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.312860] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.312929] [ 22.313031] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.313129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.313157] Hardware name: linux,dummy-virt (DT) [ 22.313196] Call trace: [ 22.313228] show_stack+0x20/0x38 (C) [ 22.313535] dump_stack_lvl+0x8c/0xd0 [ 22.313611] print_report+0x118/0x608 [ 22.313659] kasan_report+0xdc/0x128 [ 22.314080] kasan_check_range+0x100/0x1a8 [ 22.314309] __kasan_check_write+0x20/0x30 [ 22.314373] kasan_atomics_helper+0x15b4/0x4858 [ 22.314465] kasan_atomics+0x198/0x2e0 [ 22.314626] kunit_try_run_case+0x170/0x3f0 [ 22.314763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.314850] kthread+0x328/0x630 [ 22.314909] ret_from_fork+0x10/0x20 [ 22.314965] [ 22.314988] Allocated by task 265: [ 22.315264] kasan_save_stack+0x3c/0x68 [ 22.315329] kasan_save_track+0x20/0x40 [ 22.315595] kasan_save_alloc_info+0x40/0x58 [ 22.315776] __kasan_kmalloc+0xd4/0xd8 [ 22.315903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.316082] kasan_atomics+0xb8/0x2e0 [ 22.316238] kunit_try_run_case+0x170/0x3f0 [ 22.316283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.316328] kthread+0x328/0x630 [ 22.316369] ret_from_fork+0x10/0x20 [ 22.316578] [ 22.316746] The buggy address belongs to the object at fff00000c569f300 [ 22.316746] which belongs to the cache kmalloc-64 of size 64 [ 22.317034] The buggy address is located 0 bytes to the right of [ 22.317034] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.317238] [ 22.317283] The buggy address belongs to the physical page: [ 22.317491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.317681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.317746] page_type: f5(slab) [ 22.318226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.318332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.318539] page dumped because: kasan: bad access detected [ 22.318687] [ 22.318760] Memory state around the buggy address: [ 22.319092] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.319216] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.319510] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.319643] ^ [ 22.319690] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.319742] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.319969] ================================================================== [ 22.177512] ================================================================== [ 22.177747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 22.177807] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.177866] [ 22.177899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.177981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.178008] Hardware name: linux,dummy-virt (DT) [ 22.178040] Call trace: [ 22.178064] show_stack+0x20/0x38 (C) [ 22.178112] dump_stack_lvl+0x8c/0xd0 [ 22.178159] print_report+0x118/0x608 [ 22.178318] kasan_report+0xdc/0x128 [ 22.178377] kasan_check_range+0x100/0x1a8 [ 22.178427] __kasan_check_write+0x20/0x30 [ 22.178472] kasan_atomics_helper+0xeb8/0x4858 [ 22.178519] kasan_atomics+0x198/0x2e0 [ 22.178565] kunit_try_run_case+0x170/0x3f0 [ 22.178611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.178664] kthread+0x328/0x630 [ 22.178705] ret_from_fork+0x10/0x20 [ 22.178769] [ 22.178789] Allocated by task 265: [ 22.178817] kasan_save_stack+0x3c/0x68 [ 22.178860] kasan_save_track+0x20/0x40 [ 22.178898] kasan_save_alloc_info+0x40/0x58 [ 22.178938] __kasan_kmalloc+0xd4/0xd8 [ 22.178976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.179016] kasan_atomics+0xb8/0x2e0 [ 22.179055] kunit_try_run_case+0x170/0x3f0 [ 22.179094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.179138] kthread+0x328/0x630 [ 22.179172] ret_from_fork+0x10/0x20 [ 22.179209] [ 22.179229] The buggy address belongs to the object at fff00000c569f300 [ 22.179229] which belongs to the cache kmalloc-64 of size 64 [ 22.179287] The buggy address is located 0 bytes to the right of [ 22.179287] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.179352] [ 22.179373] The buggy address belongs to the physical page: [ 22.179405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.179461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.179508] page_type: f5(slab) [ 22.179547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.179598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.179640] page dumped because: kasan: bad access detected [ 22.179673] [ 22.179694] Memory state around the buggy address: [ 22.179738] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.179780] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.179823] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.179861] ^ [ 22.179895] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.179938] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.179977] ================================================================== [ 22.234052] ================================================================== [ 22.234119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.234274] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.234680] [ 22.234794] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.235002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.235061] Hardware name: linux,dummy-virt (DT) [ 22.235133] Call trace: [ 22.235163] show_stack+0x20/0x38 (C) [ 22.235240] dump_stack_lvl+0x8c/0xd0 [ 22.235465] print_report+0x118/0x608 [ 22.235762] kasan_report+0xdc/0x128 [ 22.235972] kasan_check_range+0x100/0x1a8 [ 22.236300] __kasan_check_write+0x20/0x30 [ 22.236405] kasan_atomics_helper+0x11f8/0x4858 [ 22.236511] kasan_atomics+0x198/0x2e0 [ 22.236607] kunit_try_run_case+0x170/0x3f0 [ 22.236721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.236776] kthread+0x328/0x630 [ 22.236818] ret_from_fork+0x10/0x20 [ 22.237441] [ 22.237697] Allocated by task 265: [ 22.237797] kasan_save_stack+0x3c/0x68 [ 22.237912] kasan_save_track+0x20/0x40 [ 22.237969] kasan_save_alloc_info+0x40/0x58 [ 22.238092] __kasan_kmalloc+0xd4/0xd8 [ 22.238160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.238337] kasan_atomics+0xb8/0x2e0 [ 22.238397] kunit_try_run_case+0x170/0x3f0 [ 22.238768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.239050] kthread+0x328/0x630 [ 22.239118] ret_from_fork+0x10/0x20 [ 22.239264] [ 22.239326] The buggy address belongs to the object at fff00000c569f300 [ 22.239326] which belongs to the cache kmalloc-64 of size 64 [ 22.239526] The buggy address is located 0 bytes to the right of [ 22.239526] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.239729] [ 22.239922] The buggy address belongs to the physical page: [ 22.239997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.240204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.240450] page_type: f5(slab) [ 22.240507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.240560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.240943] page dumped because: kasan: bad access detected [ 22.241169] [ 22.241446] Memory state around the buggy address: [ 22.241529] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.241746] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.241871] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.241981] ^ [ 22.242033] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.242077] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.242223] ================================================================== [ 22.132342] ================================================================== [ 22.132512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 22.132724] Read of size 4 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.132800] [ 22.132845] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.133094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.133257] Hardware name: linux,dummy-virt (DT) [ 22.133523] Call trace: [ 22.133568] show_stack+0x20/0x38 (C) [ 22.133622] dump_stack_lvl+0x8c/0xd0 [ 22.133815] print_report+0x118/0x608 [ 22.134022] kasan_report+0xdc/0x128 [ 22.134091] __asan_report_load4_noabort+0x20/0x30 [ 22.134149] kasan_atomics_helper+0x3e04/0x4858 [ 22.134350] kasan_atomics+0x198/0x2e0 [ 22.134543] kunit_try_run_case+0x170/0x3f0 [ 22.134615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.135019] kthread+0x328/0x630 [ 22.135182] ret_from_fork+0x10/0x20 [ 22.135243] [ 22.135439] Allocated by task 265: [ 22.135549] kasan_save_stack+0x3c/0x68 [ 22.135598] kasan_save_track+0x20/0x40 [ 22.135637] kasan_save_alloc_info+0x40/0x58 [ 22.135679] __kasan_kmalloc+0xd4/0xd8 [ 22.136155] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.136345] kasan_atomics+0xb8/0x2e0 [ 22.136554] kunit_try_run_case+0x170/0x3f0 [ 22.136610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.136832] kthread+0x328/0x630 [ 22.136977] ret_from_fork+0x10/0x20 [ 22.137086] [ 22.137304] The buggy address belongs to the object at fff00000c569f300 [ 22.137304] which belongs to the cache kmalloc-64 of size 64 [ 22.137460] The buggy address is located 0 bytes to the right of [ 22.137460] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.137648] [ 22.137674] The buggy address belongs to the physical page: [ 22.137900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.138119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.138199] page_type: f5(slab) [ 22.138417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.138813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.139068] page dumped because: kasan: bad access detected [ 22.139122] [ 22.139535] Memory state around the buggy address: [ 22.139680] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.139742] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.139938] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.140171] ^ [ 22.140269] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.140357] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.140520] ================================================================== [ 22.180090] ================================================================== [ 22.180137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 22.180181] Write of size 8 at addr fff00000c569f330 by task kunit_try_catch/265 [ 22.180231] [ 22.180260] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.180340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.180368] Hardware name: linux,dummy-virt (DT) [ 22.180399] Call trace: [ 22.180421] show_stack+0x20/0x38 (C) [ 22.180467] dump_stack_lvl+0x8c/0xd0 [ 22.180514] print_report+0x118/0x608 [ 22.180561] kasan_report+0xdc/0x128 [ 22.180606] kasan_check_range+0x100/0x1a8 [ 22.180656] __kasan_check_write+0x20/0x30 [ 22.180932] kasan_atomics_helper+0xf20/0x4858 [ 22.180997] kasan_atomics+0x198/0x2e0 [ 22.181043] kunit_try_run_case+0x170/0x3f0 [ 22.181143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.181198] kthread+0x328/0x630 [ 22.181239] ret_from_fork+0x10/0x20 [ 22.181286] [ 22.181308] Allocated by task 265: [ 22.181336] kasan_save_stack+0x3c/0x68 [ 22.181379] kasan_save_track+0x20/0x40 [ 22.181418] kasan_save_alloc_info+0x40/0x58 [ 22.181458] __kasan_kmalloc+0xd4/0xd8 [ 22.181496] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.181537] kasan_atomics+0xb8/0x2e0 [ 22.181572] kunit_try_run_case+0x170/0x3f0 [ 22.181613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.181658] kthread+0x328/0x630 [ 22.181692] ret_from_fork+0x10/0x20 [ 22.181740] [ 22.181761] The buggy address belongs to the object at fff00000c569f300 [ 22.181761] which belongs to the cache kmalloc-64 of size 64 [ 22.181819] The buggy address is located 0 bytes to the right of [ 22.181819] allocated 48-byte region [fff00000c569f300, fff00000c569f330) [ 22.181884] [ 22.181906] The buggy address belongs to the physical page: [ 22.181937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f [ 22.181989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.182038] page_type: f5(slab) [ 22.182074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.182127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.182169] page dumped because: kasan: bad access detected [ 22.182203] [ 22.182223] Memory state around the buggy address: [ 22.182256] fff00000c569f200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.182302] fff00000c569f280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.182344] >fff00000c569f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.182383] ^ [ 22.182414] fff00000c569f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.182458] fff00000c569f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.182497] ==================================================================
[ 16.140365] ================================================================== [ 16.141257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 16.142157] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.142824] [ 16.142984] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.143031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.143057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.143080] Call Trace: [ 16.143096] <TASK> [ 16.143112] dump_stack_lvl+0x73/0xb0 [ 16.143141] print_report+0xd1/0x650 [ 16.143163] ? __virt_addr_valid+0x1db/0x2d0 [ 16.143187] ? kasan_atomics_helper+0xd47/0x5450 [ 16.143218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.143245] ? kasan_atomics_helper+0xd47/0x5450 [ 16.143267] kasan_report+0x141/0x180 [ 16.143290] ? kasan_atomics_helper+0xd47/0x5450 [ 16.143317] kasan_check_range+0x10c/0x1c0 [ 16.143341] __kasan_check_write+0x18/0x20 [ 16.143361] kasan_atomics_helper+0xd47/0x5450 [ 16.143383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.143406] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.143431] ? kasan_atomics+0x152/0x310 [ 16.143458] kasan_atomics+0x1dc/0x310 [ 16.143481] ? __pfx_kasan_atomics+0x10/0x10 [ 16.143505] ? __pfx_read_tsc+0x10/0x10 [ 16.143526] ? ktime_get_ts64+0x86/0x230 [ 16.143551] kunit_try_run_case+0x1a5/0x480 [ 16.143576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.143600] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.143622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.143645] ? __kthread_parkme+0x82/0x180 [ 16.143666] ? preempt_count_sub+0x50/0x80 [ 16.143689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.143713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.143736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.143760] kthread+0x337/0x6f0 [ 16.143780] ? trace_preempt_on+0x20/0xc0 [ 16.143805] ? __pfx_kthread+0x10/0x10 [ 16.143826] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.143847] ? calculate_sigpending+0x7b/0xa0 [ 16.143871] ? __pfx_kthread+0x10/0x10 [ 16.143893] ret_from_fork+0x116/0x1d0 [ 16.143912] ? __pfx_kthread+0x10/0x10 [ 16.143932] ret_from_fork_asm+0x1a/0x30 [ 16.143965] </TASK> [ 16.143976] [ 16.158023] Allocated by task 282: [ 16.158408] kasan_save_stack+0x45/0x70 [ 16.158803] kasan_save_track+0x18/0x40 [ 16.159249] kasan_save_alloc_info+0x3b/0x50 [ 16.159694] __kasan_kmalloc+0xb7/0xc0 [ 16.160001] __kmalloc_cache_noprof+0x189/0x420 [ 16.160289] kasan_atomics+0x95/0x310 [ 16.160656] kunit_try_run_case+0x1a5/0x480 [ 16.161032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.161732] kthread+0x337/0x6f0 [ 16.161867] ret_from_fork+0x116/0x1d0 [ 16.162003] ret_from_fork_asm+0x1a/0x30 [ 16.162256] [ 16.162422] The buggy address belongs to the object at ffff88810261fc00 [ 16.162422] which belongs to the cache kmalloc-64 of size 64 [ 16.163553] The buggy address is located 0 bytes to the right of [ 16.163553] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.164749] [ 16.164996] The buggy address belongs to the physical page: [ 16.165459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.165929] flags: 0x200000000000000(node=0|zone=2) [ 16.166451] page_type: f5(slab) [ 16.166961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.167465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.168106] page dumped because: kasan: bad access detected [ 16.168643] [ 16.168767] Memory state around the buggy address: [ 16.168926] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.169364] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.169969] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.170696] ^ [ 16.171215] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.171947] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.172473] ================================================================== [ 15.908959] ================================================================== [ 15.909225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.910338] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.910858] [ 15.911225] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.911274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.911288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.911311] Call Trace: [ 15.911327] <TASK> [ 15.911344] dump_stack_lvl+0x73/0xb0 [ 15.911374] print_report+0xd1/0x650 [ 15.911397] ? __virt_addr_valid+0x1db/0x2d0 [ 15.911421] ? kasan_atomics_helper+0x860/0x5450 [ 15.911443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.911470] ? kasan_atomics_helper+0x860/0x5450 [ 15.911492] kasan_report+0x141/0x180 [ 15.911528] ? kasan_atomics_helper+0x860/0x5450 [ 15.911555] kasan_check_range+0x10c/0x1c0 [ 15.911581] __kasan_check_write+0x18/0x20 [ 15.911601] kasan_atomics_helper+0x860/0x5450 [ 15.911624] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.911647] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.911673] ? kasan_atomics+0x152/0x310 [ 15.911700] kasan_atomics+0x1dc/0x310 [ 15.911723] ? __pfx_kasan_atomics+0x10/0x10 [ 15.911747] ? __pfx_read_tsc+0x10/0x10 [ 15.911768] ? ktime_get_ts64+0x86/0x230 [ 15.911794] kunit_try_run_case+0x1a5/0x480 [ 15.911819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.911842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.911865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.911889] ? __kthread_parkme+0x82/0x180 [ 15.911909] ? preempt_count_sub+0x50/0x80 [ 15.911934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.911958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.911981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.912003] kthread+0x337/0x6f0 [ 15.912024] ? trace_preempt_on+0x20/0xc0 [ 15.912109] ? __pfx_kthread+0x10/0x10 [ 15.912135] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.912156] ? calculate_sigpending+0x7b/0xa0 [ 15.912181] ? __pfx_kthread+0x10/0x10 [ 15.912203] ret_from_fork+0x116/0x1d0 [ 15.912222] ? __pfx_kthread+0x10/0x10 [ 15.912243] ret_from_fork_asm+0x1a/0x30 [ 15.912274] </TASK> [ 15.912286] [ 15.925740] Allocated by task 282: [ 15.925887] kasan_save_stack+0x45/0x70 [ 15.926316] kasan_save_track+0x18/0x40 [ 15.926759] kasan_save_alloc_info+0x3b/0x50 [ 15.927016] __kasan_kmalloc+0xb7/0xc0 [ 15.927259] __kmalloc_cache_noprof+0x189/0x420 [ 15.927499] kasan_atomics+0x95/0x310 [ 15.927953] kunit_try_run_case+0x1a5/0x480 [ 15.928373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.928756] kthread+0x337/0x6f0 [ 15.929360] ret_from_fork+0x116/0x1d0 [ 15.929730] ret_from_fork_asm+0x1a/0x30 [ 15.929963] [ 15.930253] The buggy address belongs to the object at ffff88810261fc00 [ 15.930253] which belongs to the cache kmalloc-64 of size 64 [ 15.930853] The buggy address is located 0 bytes to the right of [ 15.930853] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.931864] [ 15.931977] The buggy address belongs to the physical page: [ 15.932392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.932876] flags: 0x200000000000000(node=0|zone=2) [ 15.933179] page_type: f5(slab) [ 15.933328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.933967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.934684] page dumped because: kasan: bad access detected [ 15.935056] [ 15.935299] Memory state around the buggy address: [ 15.935759] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.936301] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.936640] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.937053] ^ [ 15.937598] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.938058] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.938536] ================================================================== [ 16.456487] ================================================================== [ 16.456804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 16.457419] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.457964] [ 16.458143] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.458191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.458204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.458226] Call Trace: [ 16.458241] <TASK> [ 16.458257] dump_stack_lvl+0x73/0xb0 [ 16.458285] print_report+0xd1/0x650 [ 16.458308] ? __virt_addr_valid+0x1db/0x2d0 [ 16.458330] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.458351] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.458377] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.458400] kasan_report+0x141/0x180 [ 16.458421] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.458448] __asan_report_load4_noabort+0x18/0x20 [ 16.458472] kasan_atomics_helper+0x49ce/0x5450 [ 16.458495] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.458606] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.458632] ? kasan_atomics+0x152/0x310 [ 16.458658] kasan_atomics+0x1dc/0x310 [ 16.458682] ? __pfx_kasan_atomics+0x10/0x10 [ 16.458706] ? __pfx_read_tsc+0x10/0x10 [ 16.458727] ? ktime_get_ts64+0x86/0x230 [ 16.458751] kunit_try_run_case+0x1a5/0x480 [ 16.458776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.458798] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.458821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.458844] ? __kthread_parkme+0x82/0x180 [ 16.458864] ? preempt_count_sub+0x50/0x80 [ 16.458888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.458912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.458936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.458959] kthread+0x337/0x6f0 [ 16.458979] ? trace_preempt_on+0x20/0xc0 [ 16.459001] ? __pfx_kthread+0x10/0x10 [ 16.459023] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.459080] ? calculate_sigpending+0x7b/0xa0 [ 16.459104] ? __pfx_kthread+0x10/0x10 [ 16.459127] ret_from_fork+0x116/0x1d0 [ 16.459146] ? __pfx_kthread+0x10/0x10 [ 16.459167] ret_from_fork_asm+0x1a/0x30 [ 16.459199] </TASK> [ 16.459211] [ 16.469938] Allocated by task 282: [ 16.470218] kasan_save_stack+0x45/0x70 [ 16.470539] kasan_save_track+0x18/0x40 [ 16.470829] kasan_save_alloc_info+0x3b/0x50 [ 16.471001] __kasan_kmalloc+0xb7/0xc0 [ 16.471275] __kmalloc_cache_noprof+0x189/0x420 [ 16.471861] kasan_atomics+0x95/0x310 [ 16.472062] kunit_try_run_case+0x1a5/0x480 [ 16.472438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.472800] kthread+0x337/0x6f0 [ 16.472977] ret_from_fork+0x116/0x1d0 [ 16.473361] ret_from_fork_asm+0x1a/0x30 [ 16.473569] [ 16.473773] The buggy address belongs to the object at ffff88810261fc00 [ 16.473773] which belongs to the cache kmalloc-64 of size 64 [ 16.474291] The buggy address is located 0 bytes to the right of [ 16.474291] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.475068] [ 16.475361] The buggy address belongs to the physical page: [ 16.475686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.476005] flags: 0x200000000000000(node=0|zone=2) [ 16.476548] page_type: f5(slab) [ 16.476727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.477079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.477773] page dumped because: kasan: bad access detected [ 16.478175] [ 16.478274] Memory state around the buggy address: [ 16.478624] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.478999] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.479550] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.479839] ^ [ 16.480288] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.480696] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.480988] ================================================================== [ 16.081520] ================================================================== [ 16.082319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 16.082703] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.083353] [ 16.083585] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.083632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.083645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.083678] Call Trace: [ 16.083694] <TASK> [ 16.083711] dump_stack_lvl+0x73/0xb0 [ 16.083824] print_report+0xd1/0x650 [ 16.083848] ? __virt_addr_valid+0x1db/0x2d0 [ 16.083871] ? kasan_atomics_helper+0xc70/0x5450 [ 16.083893] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.083920] ? kasan_atomics_helper+0xc70/0x5450 [ 16.083941] kasan_report+0x141/0x180 [ 16.083964] ? kasan_atomics_helper+0xc70/0x5450 [ 16.083991] kasan_check_range+0x10c/0x1c0 [ 16.084015] __kasan_check_write+0x18/0x20 [ 16.084034] kasan_atomics_helper+0xc70/0x5450 [ 16.084080] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.084102] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.084127] ? kasan_atomics+0x152/0x310 [ 16.084154] kasan_atomics+0x1dc/0x310 [ 16.084177] ? __pfx_kasan_atomics+0x10/0x10 [ 16.084202] ? __pfx_read_tsc+0x10/0x10 [ 16.084223] ? ktime_get_ts64+0x86/0x230 [ 16.084247] kunit_try_run_case+0x1a5/0x480 [ 16.084271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.084317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.084340] ? __kthread_parkme+0x82/0x180 [ 16.084361] ? preempt_count_sub+0x50/0x80 [ 16.084384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.084434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.084458] kthread+0x337/0x6f0 [ 16.084477] ? trace_preempt_on+0x20/0xc0 [ 16.084500] ? __pfx_kthread+0x10/0x10 [ 16.084573] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.084596] ? calculate_sigpending+0x7b/0xa0 [ 16.084622] ? __pfx_kthread+0x10/0x10 [ 16.084645] ret_from_fork+0x116/0x1d0 [ 16.084664] ? __pfx_kthread+0x10/0x10 [ 16.084685] ret_from_fork_asm+0x1a/0x30 [ 16.084717] </TASK> [ 16.084729] [ 16.096878] Allocated by task 282: [ 16.097074] kasan_save_stack+0x45/0x70 [ 16.097665] kasan_save_track+0x18/0x40 [ 16.097818] kasan_save_alloc_info+0x3b/0x50 [ 16.098207] __kasan_kmalloc+0xb7/0xc0 [ 16.098551] __kmalloc_cache_noprof+0x189/0x420 [ 16.098949] kasan_atomics+0x95/0x310 [ 16.099221] kunit_try_run_case+0x1a5/0x480 [ 16.099543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.099927] kthread+0x337/0x6f0 [ 16.100364] ret_from_fork+0x116/0x1d0 [ 16.100581] ret_from_fork_asm+0x1a/0x30 [ 16.100870] [ 16.100976] The buggy address belongs to the object at ffff88810261fc00 [ 16.100976] which belongs to the cache kmalloc-64 of size 64 [ 16.101773] The buggy address is located 0 bytes to the right of [ 16.101773] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.102868] [ 16.102971] The buggy address belongs to the physical page: [ 16.103187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.103787] flags: 0x200000000000000(node=0|zone=2) [ 16.104316] page_type: f5(slab) [ 16.104499] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.104956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.105497] page dumped because: kasan: bad access detected [ 16.105782] [ 16.105875] Memory state around the buggy address: [ 16.106363] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.106631] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.107486] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.107937] ^ [ 16.108510] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.108849] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.109370] ================================================================== [ 15.704659] ================================================================== [ 15.705001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.705408] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.705833] [ 15.705926] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.705973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.705987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.706011] Call Trace: [ 15.706076] <TASK> [ 15.706119] dump_stack_lvl+0x73/0xb0 [ 15.706149] print_report+0xd1/0x650 [ 15.706171] ? __virt_addr_valid+0x1db/0x2d0 [ 15.706194] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.706216] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.706243] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.706266] kasan_report+0x141/0x180 [ 15.706288] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.706315] __asan_report_load4_noabort+0x18/0x20 [ 15.706340] kasan_atomics_helper+0x4b54/0x5450 [ 15.706363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.706386] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.706411] ? kasan_atomics+0x152/0x310 [ 15.706438] kasan_atomics+0x1dc/0x310 [ 15.706460] ? __pfx_kasan_atomics+0x10/0x10 [ 15.706486] ? __pfx_read_tsc+0x10/0x10 [ 15.706586] ? ktime_get_ts64+0x86/0x230 [ 15.706640] kunit_try_run_case+0x1a5/0x480 [ 15.706696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.706719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.706742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.706766] ? __kthread_parkme+0x82/0x180 [ 15.706788] ? preempt_count_sub+0x50/0x80 [ 15.706813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.706837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.706861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.706884] kthread+0x337/0x6f0 [ 15.706905] ? trace_preempt_on+0x20/0xc0 [ 15.706928] ? __pfx_kthread+0x10/0x10 [ 15.706949] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.706971] ? calculate_sigpending+0x7b/0xa0 [ 15.706995] ? __pfx_kthread+0x10/0x10 [ 15.707017] ret_from_fork+0x116/0x1d0 [ 15.707037] ? __pfx_kthread+0x10/0x10 [ 15.707107] ret_from_fork_asm+0x1a/0x30 [ 15.707142] </TASK> [ 15.707154] [ 15.716552] Allocated by task 282: [ 15.716798] kasan_save_stack+0x45/0x70 [ 15.717036] kasan_save_track+0x18/0x40 [ 15.717329] kasan_save_alloc_info+0x3b/0x50 [ 15.717614] __kasan_kmalloc+0xb7/0xc0 [ 15.717755] __kmalloc_cache_noprof+0x189/0x420 [ 15.718002] kasan_atomics+0x95/0x310 [ 15.718255] kunit_try_run_case+0x1a5/0x480 [ 15.718539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.718797] kthread+0x337/0x6f0 [ 15.718973] ret_from_fork+0x116/0x1d0 [ 15.719346] ret_from_fork_asm+0x1a/0x30 [ 15.719586] [ 15.719712] The buggy address belongs to the object at ffff88810261fc00 [ 15.719712] which belongs to the cache kmalloc-64 of size 64 [ 15.720358] The buggy address is located 0 bytes to the right of [ 15.720358] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.720808] [ 15.721131] The buggy address belongs to the physical page: [ 15.721488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.721800] flags: 0x200000000000000(node=0|zone=2) [ 15.721970] page_type: f5(slab) [ 15.722107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.722699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.723285] page dumped because: kasan: bad access detected [ 15.723758] [ 15.723853] Memory state around the buggy address: [ 15.724219] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.724451] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.725068] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.725408] ^ [ 15.725653] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726386] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726800] ================================================================== [ 15.998645] ================================================================== [ 15.999404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.999833] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.000459] [ 16.000583] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.000777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.000798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.000820] Call Trace: [ 16.000834] <TASK> [ 16.000850] dump_stack_lvl+0x73/0xb0 [ 16.000884] print_report+0xd1/0x650 [ 16.000906] ? __virt_addr_valid+0x1db/0x2d0 [ 16.000929] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.000951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.000977] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.001001] kasan_report+0x141/0x180 [ 16.001024] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.001063] kasan_check_range+0x10c/0x1c0 [ 16.001088] __kasan_check_write+0x18/0x20 [ 16.001108] kasan_atomics_helper+0xa2b/0x5450 [ 16.001130] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.001153] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.001178] ? kasan_atomics+0x152/0x310 [ 16.001205] kasan_atomics+0x1dc/0x310 [ 16.001228] ? __pfx_kasan_atomics+0x10/0x10 [ 16.001253] ? __pfx_read_tsc+0x10/0x10 [ 16.001274] ? ktime_get_ts64+0x86/0x230 [ 16.001299] kunit_try_run_case+0x1a5/0x480 [ 16.001323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.001345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.001369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.001393] ? __kthread_parkme+0x82/0x180 [ 16.001414] ? preempt_count_sub+0x50/0x80 [ 16.001438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.001463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.001486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.001510] kthread+0x337/0x6f0 [ 16.001530] ? trace_preempt_on+0x20/0xc0 [ 16.001560] ? __pfx_kthread+0x10/0x10 [ 16.001582] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.001603] ? calculate_sigpending+0x7b/0xa0 [ 16.001627] ? __pfx_kthread+0x10/0x10 [ 16.001649] ret_from_fork+0x116/0x1d0 [ 16.001668] ? __pfx_kthread+0x10/0x10 [ 16.001689] ret_from_fork_asm+0x1a/0x30 [ 16.001720] </TASK> [ 16.001732] [ 16.013678] Allocated by task 282: [ 16.014076] kasan_save_stack+0x45/0x70 [ 16.014644] kasan_save_track+0x18/0x40 [ 16.014826] kasan_save_alloc_info+0x3b/0x50 [ 16.015058] __kasan_kmalloc+0xb7/0xc0 [ 16.015475] __kmalloc_cache_noprof+0x189/0x420 [ 16.015799] kasan_atomics+0x95/0x310 [ 16.016123] kunit_try_run_case+0x1a5/0x480 [ 16.016417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.016757] kthread+0x337/0x6f0 [ 16.016900] ret_from_fork+0x116/0x1d0 [ 16.017361] ret_from_fork_asm+0x1a/0x30 [ 16.017721] [ 16.017978] The buggy address belongs to the object at ffff88810261fc00 [ 16.017978] which belongs to the cache kmalloc-64 of size 64 [ 16.018752] The buggy address is located 0 bytes to the right of [ 16.018752] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.019364] [ 16.019776] The buggy address belongs to the physical page: [ 16.019987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.020363] flags: 0x200000000000000(node=0|zone=2) [ 16.020588] page_type: f5(slab) [ 16.020747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.021048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.021374] page dumped because: kasan: bad access detected [ 16.021616] [ 16.021703] Memory state around the buggy address: [ 16.021917] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.022773] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.023282] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.023733] ^ [ 16.023948] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.024644] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.025052] ================================================================== [ 16.837170] ================================================================== [ 16.837414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.837694] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.838333] [ 16.838550] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.838595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.838608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.838636] Call Trace: [ 16.838655] <TASK> [ 16.838672] dump_stack_lvl+0x73/0xb0 [ 16.838699] print_report+0xd1/0x650 [ 16.838722] ? __virt_addr_valid+0x1db/0x2d0 [ 16.838745] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.838766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.838794] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.838816] kasan_report+0x141/0x180 [ 16.838838] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.838865] __asan_report_load8_noabort+0x18/0x20 [ 16.838889] kasan_atomics_helper+0x4f30/0x5450 [ 16.838912] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.838935] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.838960] ? kasan_atomics+0x152/0x310 [ 16.838986] kasan_atomics+0x1dc/0x310 [ 16.839008] ? __pfx_kasan_atomics+0x10/0x10 [ 16.839033] ? __pfx_read_tsc+0x10/0x10 [ 16.839065] ? ktime_get_ts64+0x86/0x230 [ 16.839090] kunit_try_run_case+0x1a5/0x480 [ 16.839114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.839137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.839161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.839184] ? __kthread_parkme+0x82/0x180 [ 16.839204] ? preempt_count_sub+0x50/0x80 [ 16.839229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.839252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.839275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.839299] kthread+0x337/0x6f0 [ 16.839318] ? trace_preempt_on+0x20/0xc0 [ 16.839342] ? __pfx_kthread+0x10/0x10 [ 16.839363] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.839386] ? calculate_sigpending+0x7b/0xa0 [ 16.839410] ? __pfx_kthread+0x10/0x10 [ 16.839432] ret_from_fork+0x116/0x1d0 [ 16.839451] ? __pfx_kthread+0x10/0x10 [ 16.839471] ret_from_fork_asm+0x1a/0x30 [ 16.839502] </TASK> [ 16.839523] [ 16.851823] Allocated by task 282: [ 16.852155] kasan_save_stack+0x45/0x70 [ 16.852516] kasan_save_track+0x18/0x40 [ 16.852856] kasan_save_alloc_info+0x3b/0x50 [ 16.853250] __kasan_kmalloc+0xb7/0xc0 [ 16.853653] __kmalloc_cache_noprof+0x189/0x420 [ 16.854077] kasan_atomics+0x95/0x310 [ 16.854415] kunit_try_run_case+0x1a5/0x480 [ 16.854770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.854944] kthread+0x337/0x6f0 [ 16.855076] ret_from_fork+0x116/0x1d0 [ 16.855211] ret_from_fork_asm+0x1a/0x30 [ 16.855352] [ 16.855425] The buggy address belongs to the object at ffff88810261fc00 [ 16.855425] which belongs to the cache kmalloc-64 of size 64 [ 16.856336] The buggy address is located 0 bytes to the right of [ 16.856336] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.857573] [ 16.857739] The buggy address belongs to the physical page: [ 16.858234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.858949] flags: 0x200000000000000(node=0|zone=2) [ 16.859402] page_type: f5(slab) [ 16.859747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.860366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.860632] page dumped because: kasan: bad access detected [ 16.861108] [ 16.861264] Memory state around the buggy address: [ 16.861723] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.862338] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.862615] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.862832] ^ [ 16.862989] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.863514] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.864251] ================================================================== [ 16.865349] ================================================================== [ 16.865982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.866859] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.867582] [ 16.867761] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.867805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.867818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.867840] Call Trace: [ 16.867859] <TASK> [ 16.867876] dump_stack_lvl+0x73/0xb0 [ 16.867903] print_report+0xd1/0x650 [ 16.867926] ? __virt_addr_valid+0x1db/0x2d0 [ 16.867948] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.867970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.867997] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.868019] kasan_report+0x141/0x180 [ 16.868053] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.868081] kasan_check_range+0x10c/0x1c0 [ 16.868106] __kasan_check_write+0x18/0x20 [ 16.868126] kasan_atomics_helper+0x1ce1/0x5450 [ 16.868149] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.868171] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.868196] ? kasan_atomics+0x152/0x310 [ 16.868223] kasan_atomics+0x1dc/0x310 [ 16.868246] ? __pfx_kasan_atomics+0x10/0x10 [ 16.868271] ? __pfx_read_tsc+0x10/0x10 [ 16.868292] ? ktime_get_ts64+0x86/0x230 [ 16.868315] kunit_try_run_case+0x1a5/0x480 [ 16.868339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.868361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.868384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.868407] ? __kthread_parkme+0x82/0x180 [ 16.868428] ? preempt_count_sub+0x50/0x80 [ 16.868452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.868476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.868499] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.868532] kthread+0x337/0x6f0 [ 16.868552] ? trace_preempt_on+0x20/0xc0 [ 16.868574] ? __pfx_kthread+0x10/0x10 [ 16.868595] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.868616] ? calculate_sigpending+0x7b/0xa0 [ 16.868640] ? __pfx_kthread+0x10/0x10 [ 16.868662] ret_from_fork+0x116/0x1d0 [ 16.868680] ? __pfx_kthread+0x10/0x10 [ 16.868701] ret_from_fork_asm+0x1a/0x30 [ 16.868733] </TASK> [ 16.868744] [ 16.880545] Allocated by task 282: [ 16.880703] kasan_save_stack+0x45/0x70 [ 16.880884] kasan_save_track+0x18/0x40 [ 16.881068] kasan_save_alloc_info+0x3b/0x50 [ 16.881950] __kasan_kmalloc+0xb7/0xc0 [ 16.882184] __kmalloc_cache_noprof+0x189/0x420 [ 16.882411] kasan_atomics+0x95/0x310 [ 16.883147] kunit_try_run_case+0x1a5/0x480 [ 16.883476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.883907] kthread+0x337/0x6f0 [ 16.884182] ret_from_fork+0x116/0x1d0 [ 16.884381] ret_from_fork_asm+0x1a/0x30 [ 16.884742] [ 16.884841] The buggy address belongs to the object at ffff88810261fc00 [ 16.884841] which belongs to the cache kmalloc-64 of size 64 [ 16.885717] The buggy address is located 0 bytes to the right of [ 16.885717] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.886257] [ 16.886353] The buggy address belongs to the physical page: [ 16.886861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.887281] flags: 0x200000000000000(node=0|zone=2) [ 16.887646] page_type: f5(slab) [ 16.888085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.888395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.888968] page dumped because: kasan: bad access detected [ 16.889327] [ 16.889432] Memory state around the buggy address: [ 16.890016] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.890321] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.890795] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.891180] ^ [ 16.891371] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892010] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892479] ================================================================== [ 15.549986] ================================================================== [ 15.551501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.552755] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.554334] [ 15.554451] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.554501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.554513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.554536] Call Trace: [ 15.554550] <TASK> [ 15.554569] dump_stack_lvl+0x73/0xb0 [ 15.554599] print_report+0xd1/0x650 [ 15.554621] ? __virt_addr_valid+0x1db/0x2d0 [ 15.554643] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.554664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.554688] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.554709] kasan_report+0x141/0x180 [ 15.554731] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.554756] __asan_report_load4_noabort+0x18/0x20 [ 15.554779] kasan_atomics_helper+0x4bbc/0x5450 [ 15.554801] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.554822] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.554846] ? kasan_atomics+0x152/0x310 [ 15.554872] kasan_atomics+0x1dc/0x310 [ 15.554893] ? __pfx_kasan_atomics+0x10/0x10 [ 15.554916] ? __pfx_read_tsc+0x10/0x10 [ 15.554937] ? ktime_get_ts64+0x86/0x230 [ 15.554962] kunit_try_run_case+0x1a5/0x480 [ 15.554986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.555007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.555031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.555065] ? __kthread_parkme+0x82/0x180 [ 15.555085] ? preempt_count_sub+0x50/0x80 [ 15.555109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.555132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.555154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.555176] kthread+0x337/0x6f0 [ 15.555196] ? trace_preempt_on+0x20/0xc0 [ 15.555218] ? __pfx_kthread+0x10/0x10 [ 15.555238] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.555258] ? calculate_sigpending+0x7b/0xa0 [ 15.555280] ? __pfx_kthread+0x10/0x10 [ 15.555301] ret_from_fork+0x116/0x1d0 [ 15.555319] ? __pfx_kthread+0x10/0x10 [ 15.555338] ret_from_fork_asm+0x1a/0x30 [ 15.555369] </TASK> [ 15.555381] [ 15.570544] Allocated by task 282: [ 15.571169] kasan_save_stack+0x45/0x70 [ 15.571566] kasan_save_track+0x18/0x40 [ 15.572075] kasan_save_alloc_info+0x3b/0x50 [ 15.572567] __kasan_kmalloc+0xb7/0xc0 [ 15.573005] __kmalloc_cache_noprof+0x189/0x420 [ 15.573571] kasan_atomics+0x95/0x310 [ 15.574158] kunit_try_run_case+0x1a5/0x480 [ 15.574685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.574871] kthread+0x337/0x6f0 [ 15.575360] ret_from_fork+0x116/0x1d0 [ 15.575837] ret_from_fork_asm+0x1a/0x30 [ 15.576367] [ 15.576642] The buggy address belongs to the object at ffff88810261fc00 [ 15.576642] which belongs to the cache kmalloc-64 of size 64 [ 15.577008] The buggy address is located 0 bytes to the right of [ 15.577008] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.578496] [ 15.578671] The buggy address belongs to the physical page: [ 15.579358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.580272] flags: 0x200000000000000(node=0|zone=2) [ 15.580831] page_type: f5(slab) [ 15.580965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.581252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.582252] page dumped because: kasan: bad access detected [ 15.582922] [ 15.583384] Memory state around the buggy address: [ 15.583912] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.584696] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.585236] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.585807] ^ [ 15.586295] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.587108] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.587716] ================================================================== [ 16.653760] ================================================================== [ 16.653988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.654587] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.654807] [ 16.655875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.655926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.655940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.655961] Call Trace: [ 16.655980] <TASK> [ 16.655997] dump_stack_lvl+0x73/0xb0 [ 16.656026] print_report+0xd1/0x650 [ 16.656094] ? __virt_addr_valid+0x1db/0x2d0 [ 16.656118] ? kasan_atomics_helper+0x177f/0x5450 [ 16.656139] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.656165] ? kasan_atomics_helper+0x177f/0x5450 [ 16.656187] kasan_report+0x141/0x180 [ 16.656209] ? kasan_atomics_helper+0x177f/0x5450 [ 16.656236] kasan_check_range+0x10c/0x1c0 [ 16.656260] __kasan_check_write+0x18/0x20 [ 16.656279] kasan_atomics_helper+0x177f/0x5450 [ 16.656302] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.656324] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.656348] ? kasan_atomics+0x152/0x310 [ 16.656375] kasan_atomics+0x1dc/0x310 [ 16.656397] ? __pfx_kasan_atomics+0x10/0x10 [ 16.656421] ? __pfx_read_tsc+0x10/0x10 [ 16.656442] ? ktime_get_ts64+0x86/0x230 [ 16.656468] kunit_try_run_case+0x1a5/0x480 [ 16.656491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.656514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.656537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.656560] ? __kthread_parkme+0x82/0x180 [ 16.656580] ? preempt_count_sub+0x50/0x80 [ 16.656605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.656629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.656653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.656677] kthread+0x337/0x6f0 [ 16.656697] ? trace_preempt_on+0x20/0xc0 [ 16.656720] ? __pfx_kthread+0x10/0x10 [ 16.656741] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.656762] ? calculate_sigpending+0x7b/0xa0 [ 16.656786] ? __pfx_kthread+0x10/0x10 [ 16.656808] ret_from_fork+0x116/0x1d0 [ 16.656827] ? __pfx_kthread+0x10/0x10 [ 16.656847] ret_from_fork_asm+0x1a/0x30 [ 16.656879] </TASK> [ 16.656892] [ 16.664304] Allocated by task 282: [ 16.664456] kasan_save_stack+0x45/0x70 [ 16.664762] kasan_save_track+0x18/0x40 [ 16.664953] kasan_save_alloc_info+0x3b/0x50 [ 16.665151] __kasan_kmalloc+0xb7/0xc0 [ 16.665285] __kmalloc_cache_noprof+0x189/0x420 [ 16.665441] kasan_atomics+0x95/0x310 [ 16.665686] kunit_try_run_case+0x1a5/0x480 [ 16.665893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.666166] kthread+0x337/0x6f0 [ 16.666336] ret_from_fork+0x116/0x1d0 [ 16.666500] ret_from_fork_asm+0x1a/0x30 [ 16.666692] [ 16.666768] The buggy address belongs to the object at ffff88810261fc00 [ 16.666768] which belongs to the cache kmalloc-64 of size 64 [ 16.667207] The buggy address is located 0 bytes to the right of [ 16.667207] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.667903] [ 16.668003] The buggy address belongs to the physical page: [ 16.668247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.668597] flags: 0x200000000000000(node=0|zone=2) [ 16.668803] page_type: f5(slab) [ 16.668966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.669265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.669639] page dumped because: kasan: bad access detected [ 16.669817] [ 16.669888] Memory state around the buggy address: [ 16.670057] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.670377] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.670700] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.671131] ^ [ 16.671292] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.671511] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.671831] ================================================================== [ 16.614312] ================================================================== [ 16.614638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.614965] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.615294] [ 16.615407] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.615450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.615463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.615484] Call Trace: [ 16.615501] <TASK> [ 16.615525] dump_stack_lvl+0x73/0xb0 [ 16.615551] print_report+0xd1/0x650 [ 16.615574] ? __virt_addr_valid+0x1db/0x2d0 [ 16.615595] ? kasan_atomics_helper+0x164f/0x5450 [ 16.615617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.615644] ? kasan_atomics_helper+0x164f/0x5450 [ 16.615665] kasan_report+0x141/0x180 [ 16.615689] ? kasan_atomics_helper+0x164f/0x5450 [ 16.615716] kasan_check_range+0x10c/0x1c0 [ 16.615740] __kasan_check_write+0x18/0x20 [ 16.615760] kasan_atomics_helper+0x164f/0x5450 [ 16.615784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.615805] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.615830] ? kasan_atomics+0x152/0x310 [ 16.615857] kasan_atomics+0x1dc/0x310 [ 16.615880] ? __pfx_kasan_atomics+0x10/0x10 [ 16.615905] ? __pfx_read_tsc+0x10/0x10 [ 16.615926] ? ktime_get_ts64+0x86/0x230 [ 16.615951] kunit_try_run_case+0x1a5/0x480 [ 16.615976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.615999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.616023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.616058] ? __kthread_parkme+0x82/0x180 [ 16.616079] ? preempt_count_sub+0x50/0x80 [ 16.616104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.616128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.616152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.616176] kthread+0x337/0x6f0 [ 16.616196] ? trace_preempt_on+0x20/0xc0 [ 16.616219] ? __pfx_kthread+0x10/0x10 [ 16.616239] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.616261] ? calculate_sigpending+0x7b/0xa0 [ 16.616285] ? __pfx_kthread+0x10/0x10 [ 16.616307] ret_from_fork+0x116/0x1d0 [ 16.616326] ? __pfx_kthread+0x10/0x10 [ 16.616347] ret_from_fork_asm+0x1a/0x30 [ 16.616379] </TASK> [ 16.616391] [ 16.624100] Allocated by task 282: [ 16.624286] kasan_save_stack+0x45/0x70 [ 16.624490] kasan_save_track+0x18/0x40 [ 16.624698] kasan_save_alloc_info+0x3b/0x50 [ 16.624884] __kasan_kmalloc+0xb7/0xc0 [ 16.625071] __kmalloc_cache_noprof+0x189/0x420 [ 16.625284] kasan_atomics+0x95/0x310 [ 16.625452] kunit_try_run_case+0x1a5/0x480 [ 16.625647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.625849] kthread+0x337/0x6f0 [ 16.625970] ret_from_fork+0x116/0x1d0 [ 16.626115] ret_from_fork_asm+0x1a/0x30 [ 16.626257] [ 16.626330] The buggy address belongs to the object at ffff88810261fc00 [ 16.626330] which belongs to the cache kmalloc-64 of size 64 [ 16.626774] The buggy address is located 0 bytes to the right of [ 16.626774] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.627335] [ 16.627433] The buggy address belongs to the physical page: [ 16.627685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.628058] flags: 0x200000000000000(node=0|zone=2) [ 16.628237] page_type: f5(slab) [ 16.628360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.628809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.629171] page dumped because: kasan: bad access detected [ 16.629424] [ 16.629525] Memory state around the buggy address: [ 16.629733] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.629969] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.630303] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.630631] ^ [ 16.630820] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.631094] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.631398] ================================================================== [ 16.380237] ================================================================== [ 16.380609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 16.380845] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.381091] [ 16.381201] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.381243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.381256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.381278] Call Trace: [ 16.381291] <TASK> [ 16.381305] dump_stack_lvl+0x73/0xb0 [ 16.381331] print_report+0xd1/0x650 [ 16.381353] ? __virt_addr_valid+0x1db/0x2d0 [ 16.381374] ? kasan_atomics_helper+0x1217/0x5450 [ 16.381395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.381421] ? kasan_atomics_helper+0x1217/0x5450 [ 16.381442] kasan_report+0x141/0x180 [ 16.381465] ? kasan_atomics_helper+0x1217/0x5450 [ 16.381492] kasan_check_range+0x10c/0x1c0 [ 16.381516] __kasan_check_write+0x18/0x20 [ 16.381535] kasan_atomics_helper+0x1217/0x5450 [ 16.381563] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.381585] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.381610] ? kasan_atomics+0x152/0x310 [ 16.381636] kasan_atomics+0x1dc/0x310 [ 16.381659] ? __pfx_kasan_atomics+0x10/0x10 [ 16.381683] ? __pfx_read_tsc+0x10/0x10 [ 16.381704] ? ktime_get_ts64+0x86/0x230 [ 16.381777] kunit_try_run_case+0x1a5/0x480 [ 16.381806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.381829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.381852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.381876] ? __kthread_parkme+0x82/0x180 [ 16.381896] ? preempt_count_sub+0x50/0x80 [ 16.381921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.381945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.381969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.381992] kthread+0x337/0x6f0 [ 16.382012] ? trace_preempt_on+0x20/0xc0 [ 16.382035] ? __pfx_kthread+0x10/0x10 [ 16.382095] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.382120] ? calculate_sigpending+0x7b/0xa0 [ 16.382143] ? __pfx_kthread+0x10/0x10 [ 16.382166] ret_from_fork+0x116/0x1d0 [ 16.382186] ? __pfx_kthread+0x10/0x10 [ 16.382207] ret_from_fork_asm+0x1a/0x30 [ 16.382238] </TASK> [ 16.382250] [ 16.394779] Allocated by task 282: [ 16.394917] kasan_save_stack+0x45/0x70 [ 16.395134] kasan_save_track+0x18/0x40 [ 16.395452] kasan_save_alloc_info+0x3b/0x50 [ 16.395634] __kasan_kmalloc+0xb7/0xc0 [ 16.395770] __kmalloc_cache_noprof+0x189/0x420 [ 16.395990] kasan_atomics+0x95/0x310 [ 16.396289] kunit_try_run_case+0x1a5/0x480 [ 16.396592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.396841] kthread+0x337/0x6f0 [ 16.396965] ret_from_fork+0x116/0x1d0 [ 16.397119] ret_from_fork_asm+0x1a/0x30 [ 16.397283] [ 16.397414] The buggy address belongs to the object at ffff88810261fc00 [ 16.397414] which belongs to the cache kmalloc-64 of size 64 [ 16.398321] The buggy address is located 0 bytes to the right of [ 16.398321] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.398864] [ 16.398941] The buggy address belongs to the physical page: [ 16.399381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.399894] flags: 0x200000000000000(node=0|zone=2) [ 16.400206] page_type: f5(slab) [ 16.400377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.400738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.401123] page dumped because: kasan: bad access detected [ 16.401315] [ 16.401389] Memory state around the buggy address: [ 16.401564] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.401885] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.402216] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.402537] ^ [ 16.402772] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.403248] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.403561] ================================================================== [ 16.729260] ================================================================== [ 16.729647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.730006] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.730338] [ 16.730425] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.730469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.730482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.730523] Call Trace: [ 16.730538] <TASK> [ 16.730553] dump_stack_lvl+0x73/0xb0 [ 16.730580] print_report+0xd1/0x650 [ 16.730603] ? __virt_addr_valid+0x1db/0x2d0 [ 16.730625] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.730667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.730694] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.730716] kasan_report+0x141/0x180 [ 16.730756] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.730784] kasan_check_range+0x10c/0x1c0 [ 16.730807] __kasan_check_write+0x18/0x20 [ 16.730826] kasan_atomics_helper+0x19e3/0x5450 [ 16.730849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.730871] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.730895] ? kasan_atomics+0x152/0x310 [ 16.730922] kasan_atomics+0x1dc/0x310 [ 16.730961] ? __pfx_kasan_atomics+0x10/0x10 [ 16.730986] ? __pfx_read_tsc+0x10/0x10 [ 16.731007] ? ktime_get_ts64+0x86/0x230 [ 16.731058] kunit_try_run_case+0x1a5/0x480 [ 16.731082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.731118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.731154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.731191] ? __kthread_parkme+0x82/0x180 [ 16.731224] ? preempt_count_sub+0x50/0x80 [ 16.731248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.731272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.731295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.731318] kthread+0x337/0x6f0 [ 16.731337] ? trace_preempt_on+0x20/0xc0 [ 16.731360] ? __pfx_kthread+0x10/0x10 [ 16.731382] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.731404] ? calculate_sigpending+0x7b/0xa0 [ 16.731427] ? __pfx_kthread+0x10/0x10 [ 16.731449] ret_from_fork+0x116/0x1d0 [ 16.731467] ? __pfx_kthread+0x10/0x10 [ 16.731488] ret_from_fork_asm+0x1a/0x30 [ 16.731538] </TASK> [ 16.731549] [ 16.739283] Allocated by task 282: [ 16.739421] kasan_save_stack+0x45/0x70 [ 16.739670] kasan_save_track+0x18/0x40 [ 16.739896] kasan_save_alloc_info+0x3b/0x50 [ 16.740121] __kasan_kmalloc+0xb7/0xc0 [ 16.740273] __kmalloc_cache_noprof+0x189/0x420 [ 16.740563] kasan_atomics+0x95/0x310 [ 16.740754] kunit_try_run_case+0x1a5/0x480 [ 16.740953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.741211] kthread+0x337/0x6f0 [ 16.741355] ret_from_fork+0x116/0x1d0 [ 16.741544] ret_from_fork_asm+0x1a/0x30 [ 16.741773] [ 16.741886] The buggy address belongs to the object at ffff88810261fc00 [ 16.741886] which belongs to the cache kmalloc-64 of size 64 [ 16.742375] The buggy address is located 0 bytes to the right of [ 16.742375] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.743052] [ 16.743158] The buggy address belongs to the physical page: [ 16.743408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.743789] flags: 0x200000000000000(node=0|zone=2) [ 16.744025] page_type: f5(slab) [ 16.744200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.744561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.744913] page dumped because: kasan: bad access detected [ 16.745154] [ 16.745249] Memory state around the buggy address: [ 16.745458] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.745830] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.746158] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.746489] ^ [ 16.746734] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.746965] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.747609] ================================================================== [ 16.748935] ================================================================== [ 16.749562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.749890] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.750208] [ 16.750309] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.750352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.750365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.750388] Call Trace: [ 16.750403] <TASK> [ 16.750417] dump_stack_lvl+0x73/0xb0 [ 16.750444] print_report+0xd1/0x650 [ 16.750466] ? __virt_addr_valid+0x1db/0x2d0 [ 16.750489] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.750789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.750819] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.750841] kasan_report+0x141/0x180 [ 16.750865] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.750995] kasan_check_range+0x10c/0x1c0 [ 16.751025] __kasan_check_write+0x18/0x20 [ 16.751058] kasan_atomics_helper+0x1a7f/0x5450 [ 16.751082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.751104] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.751128] ? kasan_atomics+0x152/0x310 [ 16.751155] kasan_atomics+0x1dc/0x310 [ 16.751178] ? __pfx_kasan_atomics+0x10/0x10 [ 16.751202] ? __pfx_read_tsc+0x10/0x10 [ 16.751224] ? ktime_get_ts64+0x86/0x230 [ 16.751247] kunit_try_run_case+0x1a5/0x480 [ 16.751271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.751295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.751317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.751340] ? __kthread_parkme+0x82/0x180 [ 16.751361] ? preempt_count_sub+0x50/0x80 [ 16.751384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.751408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.751431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.751455] kthread+0x337/0x6f0 [ 16.751474] ? trace_preempt_on+0x20/0xc0 [ 16.751646] ? __pfx_kthread+0x10/0x10 [ 16.751677] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.751701] ? calculate_sigpending+0x7b/0xa0 [ 16.751727] ? __pfx_kthread+0x10/0x10 [ 16.751749] ret_from_fork+0x116/0x1d0 [ 16.751769] ? __pfx_kthread+0x10/0x10 [ 16.751789] ret_from_fork_asm+0x1a/0x30 [ 16.751820] </TASK> [ 16.751832] [ 16.763021] Allocated by task 282: [ 16.763331] kasan_save_stack+0x45/0x70 [ 16.763691] kasan_save_track+0x18/0x40 [ 16.764000] kasan_save_alloc_info+0x3b/0x50 [ 16.764226] __kasan_kmalloc+0xb7/0xc0 [ 16.764400] __kmalloc_cache_noprof+0x189/0x420 [ 16.764809] kasan_atomics+0x95/0x310 [ 16.765001] kunit_try_run_case+0x1a5/0x480 [ 16.765527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.765785] kthread+0x337/0x6f0 [ 16.765949] ret_from_fork+0x116/0x1d0 [ 16.766139] ret_from_fork_asm+0x1a/0x30 [ 16.766325] [ 16.766418] The buggy address belongs to the object at ffff88810261fc00 [ 16.766418] which belongs to the cache kmalloc-64 of size 64 [ 16.767465] The buggy address is located 0 bytes to the right of [ 16.767465] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.768232] [ 16.768318] The buggy address belongs to the physical page: [ 16.768499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.768745] flags: 0x200000000000000(node=0|zone=2) [ 16.768914] page_type: f5(slab) [ 16.769051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.769288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.769526] page dumped because: kasan: bad access detected [ 16.770479] [ 16.770667] Memory state around the buggy address: [ 16.771401] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.772214] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.773067] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.773886] ^ [ 16.774445] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775258] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775938] ================================================================== [ 17.027322] ================================================================== [ 17.027653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 17.027981] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.028312] [ 17.028418] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.028459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.028472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.028493] Call Trace: [ 17.028509] <TASK> [ 17.028525] dump_stack_lvl+0x73/0xb0 [ 17.028550] print_report+0xd1/0x650 [ 17.028572] ? __virt_addr_valid+0x1db/0x2d0 [ 17.028593] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.028662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.028689] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.028710] kasan_report+0x141/0x180 [ 17.028733] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.028760] __asan_report_load8_noabort+0x18/0x20 [ 17.028784] kasan_atomics_helper+0x4f98/0x5450 [ 17.028806] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.028828] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.028853] ? kasan_atomics+0x152/0x310 [ 17.028880] kasan_atomics+0x1dc/0x310 [ 17.028903] ? __pfx_kasan_atomics+0x10/0x10 [ 17.028929] ? __pfx_read_tsc+0x10/0x10 [ 17.028950] ? ktime_get_ts64+0x86/0x230 [ 17.028974] kunit_try_run_case+0x1a5/0x480 [ 17.028998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.029021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.029055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.029080] ? __kthread_parkme+0x82/0x180 [ 17.029099] ? preempt_count_sub+0x50/0x80 [ 17.029123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.029147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.029170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.029194] kthread+0x337/0x6f0 [ 17.029214] ? trace_preempt_on+0x20/0xc0 [ 17.029236] ? __pfx_kthread+0x10/0x10 [ 17.029257] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.029279] ? calculate_sigpending+0x7b/0xa0 [ 17.029303] ? __pfx_kthread+0x10/0x10 [ 17.029325] ret_from_fork+0x116/0x1d0 [ 17.029344] ? __pfx_kthread+0x10/0x10 [ 17.029366] ret_from_fork_asm+0x1a/0x30 [ 17.029400] </TASK> [ 17.029412] [ 17.037492] Allocated by task 282: [ 17.037699] kasan_save_stack+0x45/0x70 [ 17.037900] kasan_save_track+0x18/0x40 [ 17.038106] kasan_save_alloc_info+0x3b/0x50 [ 17.038321] __kasan_kmalloc+0xb7/0xc0 [ 17.038523] __kmalloc_cache_noprof+0x189/0x420 [ 17.038750] kasan_atomics+0x95/0x310 [ 17.038950] kunit_try_run_case+0x1a5/0x480 [ 17.039189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.039415] kthread+0x337/0x6f0 [ 17.039612] ret_from_fork+0x116/0x1d0 [ 17.039822] ret_from_fork_asm+0x1a/0x30 [ 17.039969] [ 17.040096] The buggy address belongs to the object at ffff88810261fc00 [ 17.040096] which belongs to the cache kmalloc-64 of size 64 [ 17.040676] The buggy address is located 0 bytes to the right of [ 17.040676] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.041217] [ 17.041306] The buggy address belongs to the physical page: [ 17.041606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.041948] flags: 0x200000000000000(node=0|zone=2) [ 17.042200] page_type: f5(slab) [ 17.042384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.042744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.043144] page dumped because: kasan: bad access detected [ 17.043400] [ 17.043505] Memory state around the buggy address: [ 17.043747] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.044103] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.044317] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.044525] ^ [ 17.044745] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.045063] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.045371] ================================================================== [ 16.532591] ================================================================== [ 16.532886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 16.533943] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.534428] [ 16.534645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.534696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.534708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.534732] Call Trace: [ 16.534811] <TASK> [ 16.534832] dump_stack_lvl+0x73/0xb0 [ 16.534862] print_report+0xd1/0x650 [ 16.534886] ? __virt_addr_valid+0x1db/0x2d0 [ 16.534908] ? kasan_atomics_helper+0x1467/0x5450 [ 16.534931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.534956] ? kasan_atomics_helper+0x1467/0x5450 [ 16.534978] kasan_report+0x141/0x180 [ 16.535001] ? kasan_atomics_helper+0x1467/0x5450 [ 16.535027] kasan_check_range+0x10c/0x1c0 [ 16.535127] __kasan_check_write+0x18/0x20 [ 16.535149] kasan_atomics_helper+0x1467/0x5450 [ 16.535173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.535195] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.535221] ? kasan_atomics+0x152/0x310 [ 16.535247] kasan_atomics+0x1dc/0x310 [ 16.535270] ? __pfx_kasan_atomics+0x10/0x10 [ 16.535295] ? __pfx_read_tsc+0x10/0x10 [ 16.535316] ? ktime_get_ts64+0x86/0x230 [ 16.535342] kunit_try_run_case+0x1a5/0x480 [ 16.535366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.535389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.535412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.535436] ? __kthread_parkme+0x82/0x180 [ 16.535456] ? preempt_count_sub+0x50/0x80 [ 16.535481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.535524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.535547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.535571] kthread+0x337/0x6f0 [ 16.535593] ? trace_preempt_on+0x20/0xc0 [ 16.535616] ? __pfx_kthread+0x10/0x10 [ 16.535637] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.535659] ? calculate_sigpending+0x7b/0xa0 [ 16.535684] ? __pfx_kthread+0x10/0x10 [ 16.535706] ret_from_fork+0x116/0x1d0 [ 16.535725] ? __pfx_kthread+0x10/0x10 [ 16.535746] ret_from_fork_asm+0x1a/0x30 [ 16.535778] </TASK> [ 16.535790] [ 16.546583] Allocated by task 282: [ 16.546934] kasan_save_stack+0x45/0x70 [ 16.547306] kasan_save_track+0x18/0x40 [ 16.547567] kasan_save_alloc_info+0x3b/0x50 [ 16.547800] __kasan_kmalloc+0xb7/0xc0 [ 16.548181] __kmalloc_cache_noprof+0x189/0x420 [ 16.548368] kasan_atomics+0x95/0x310 [ 16.548732] kunit_try_run_case+0x1a5/0x480 [ 16.549009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.549399] kthread+0x337/0x6f0 [ 16.549676] ret_from_fork+0x116/0x1d0 [ 16.549829] ret_from_fork_asm+0x1a/0x30 [ 16.550359] [ 16.550466] The buggy address belongs to the object at ffff88810261fc00 [ 16.550466] which belongs to the cache kmalloc-64 of size 64 [ 16.551187] The buggy address is located 0 bytes to the right of [ 16.551187] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.551674] [ 16.551774] The buggy address belongs to the physical page: [ 16.552009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.552735] flags: 0x200000000000000(node=0|zone=2) [ 16.553111] page_type: f5(slab) [ 16.553382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.553820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.554275] page dumped because: kasan: bad access detected [ 16.554620] [ 16.554716] Memory state around the buggy address: [ 16.554922] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.555609] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.556027] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.556410] ^ [ 16.556636] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.556936] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.557530] ================================================================== [ 16.507236] ================================================================== [ 16.507545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 16.508373] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.508768] [ 16.508887] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.508932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.508945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.508967] Call Trace: [ 16.508985] <TASK> [ 16.509002] dump_stack_lvl+0x73/0xb0 [ 16.509031] print_report+0xd1/0x650 [ 16.509310] ? __virt_addr_valid+0x1db/0x2d0 [ 16.509341] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.509363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.509390] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.509413] kasan_report+0x141/0x180 [ 16.509436] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.509463] __asan_report_load8_noabort+0x18/0x20 [ 16.509488] kasan_atomics_helper+0x4eae/0x5450 [ 16.509523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.509546] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.509574] ? kasan_atomics+0x152/0x310 [ 16.509604] kasan_atomics+0x1dc/0x310 [ 16.509627] ? __pfx_kasan_atomics+0x10/0x10 [ 16.509651] ? __pfx_read_tsc+0x10/0x10 [ 16.509672] ? ktime_get_ts64+0x86/0x230 [ 16.509697] kunit_try_run_case+0x1a5/0x480 [ 16.509722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.509744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.509768] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.509793] ? __kthread_parkme+0x82/0x180 [ 16.509814] ? preempt_count_sub+0x50/0x80 [ 16.509838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.509863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.509886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.509910] kthread+0x337/0x6f0 [ 16.509930] ? trace_preempt_on+0x20/0xc0 [ 16.509952] ? __pfx_kthread+0x10/0x10 [ 16.509974] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.509996] ? calculate_sigpending+0x7b/0xa0 [ 16.510020] ? __pfx_kthread+0x10/0x10 [ 16.510054] ret_from_fork+0x116/0x1d0 [ 16.510123] ? __pfx_kthread+0x10/0x10 [ 16.510146] ret_from_fork_asm+0x1a/0x30 [ 16.510178] </TASK> [ 16.510190] [ 16.521335] Allocated by task 282: [ 16.521668] kasan_save_stack+0x45/0x70 [ 16.521876] kasan_save_track+0x18/0x40 [ 16.522443] kasan_save_alloc_info+0x3b/0x50 [ 16.522742] __kasan_kmalloc+0xb7/0xc0 [ 16.522934] __kmalloc_cache_noprof+0x189/0x420 [ 16.523371] kasan_atomics+0x95/0x310 [ 16.523615] kunit_try_run_case+0x1a5/0x480 [ 16.523811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.524037] kthread+0x337/0x6f0 [ 16.524203] ret_from_fork+0x116/0x1d0 [ 16.524386] ret_from_fork_asm+0x1a/0x30 [ 16.524863] [ 16.524965] The buggy address belongs to the object at ffff88810261fc00 [ 16.524965] which belongs to the cache kmalloc-64 of size 64 [ 16.525695] The buggy address is located 0 bytes to the right of [ 16.525695] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.526238] [ 16.526345] The buggy address belongs to the physical page: [ 16.526891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.527583] flags: 0x200000000000000(node=0|zone=2) [ 16.527794] page_type: f5(slab) [ 16.527972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.528680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.528997] page dumped because: kasan: bad access detected [ 16.529417] [ 16.529560] Memory state around the buggy address: [ 16.529845] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.530345] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.530786] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.531256] ^ [ 16.531462] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.531782] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.532111] ================================================================== [ 17.064496] ================================================================== [ 17.064961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 17.065431] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.065799] [ 17.065943] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.065988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.066199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.066222] Call Trace: [ 17.066237] <TASK> [ 17.066252] dump_stack_lvl+0x73/0xb0 [ 17.066279] print_report+0xd1/0x650 [ 17.066301] ? __virt_addr_valid+0x1db/0x2d0 [ 17.066324] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.066346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.066372] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.066394] kasan_report+0x141/0x180 [ 17.066417] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.066444] __asan_report_load8_noabort+0x18/0x20 [ 17.066467] kasan_atomics_helper+0x4fb2/0x5450 [ 17.066491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.066512] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.066537] ? kasan_atomics+0x152/0x310 [ 17.066563] kasan_atomics+0x1dc/0x310 [ 17.066586] ? __pfx_kasan_atomics+0x10/0x10 [ 17.066611] ? __pfx_read_tsc+0x10/0x10 [ 17.066632] ? ktime_get_ts64+0x86/0x230 [ 17.066656] kunit_try_run_case+0x1a5/0x480 [ 17.066680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.066703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.066727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.066751] ? __kthread_parkme+0x82/0x180 [ 17.066771] ? preempt_count_sub+0x50/0x80 [ 17.066795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.066819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.066842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.066866] kthread+0x337/0x6f0 [ 17.066885] ? trace_preempt_on+0x20/0xc0 [ 17.066909] ? __pfx_kthread+0x10/0x10 [ 17.066930] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.066952] ? calculate_sigpending+0x7b/0xa0 [ 17.066976] ? __pfx_kthread+0x10/0x10 [ 17.066997] ret_from_fork+0x116/0x1d0 [ 17.067016] ? __pfx_kthread+0x10/0x10 [ 17.067037] ret_from_fork_asm+0x1a/0x30 [ 17.067078] </TASK> [ 17.067089] [ 17.074701] Allocated by task 282: [ 17.074916] kasan_save_stack+0x45/0x70 [ 17.075121] kasan_save_track+0x18/0x40 [ 17.075330] kasan_save_alloc_info+0x3b/0x50 [ 17.075594] __kasan_kmalloc+0xb7/0xc0 [ 17.075802] __kmalloc_cache_noprof+0x189/0x420 [ 17.076032] kasan_atomics+0x95/0x310 [ 17.076249] kunit_try_run_case+0x1a5/0x480 [ 17.076456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.076747] kthread+0x337/0x6f0 [ 17.076950] ret_from_fork+0x116/0x1d0 [ 17.077152] ret_from_fork_asm+0x1a/0x30 [ 17.077372] [ 17.077474] The buggy address belongs to the object at ffff88810261fc00 [ 17.077474] which belongs to the cache kmalloc-64 of size 64 [ 17.077830] The buggy address is located 0 bytes to the right of [ 17.077830] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.078197] [ 17.078268] The buggy address belongs to the physical page: [ 17.078540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.078897] flags: 0x200000000000000(node=0|zone=2) [ 17.079144] page_type: f5(slab) [ 17.079313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.079897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.080147] page dumped because: kasan: bad access detected [ 17.080321] [ 17.080392] Memory state around the buggy address: [ 17.080548] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.080764] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.081079] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.081504] ^ [ 17.081838] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.082464] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.082910] ================================================================== [ 15.800022] ================================================================== [ 15.800401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.800885] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.801326] [ 15.801434] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.801542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.801574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.801640] Call Trace: [ 15.801661] <TASK> [ 15.801691] dump_stack_lvl+0x73/0xb0 [ 15.801722] print_report+0xd1/0x650 [ 15.801746] ? __virt_addr_valid+0x1db/0x2d0 [ 15.801770] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.801791] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.801817] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.801839] kasan_report+0x141/0x180 [ 15.801872] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.801899] kasan_check_range+0x10c/0x1c0 [ 15.801923] __kasan_check_write+0x18/0x20 [ 15.801987] kasan_atomics_helper+0x5fe/0x5450 [ 15.802012] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.802055] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.802127] ? kasan_atomics+0x152/0x310 [ 15.802155] kasan_atomics+0x1dc/0x310 [ 15.802178] ? __pfx_kasan_atomics+0x10/0x10 [ 15.802202] ? __pfx_read_tsc+0x10/0x10 [ 15.802224] ? ktime_get_ts64+0x86/0x230 [ 15.802250] kunit_try_run_case+0x1a5/0x480 [ 15.802275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.802298] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.802322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.802346] ? __kthread_parkme+0x82/0x180 [ 15.802367] ? preempt_count_sub+0x50/0x80 [ 15.802390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.802415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.802438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.802462] kthread+0x337/0x6f0 [ 15.802482] ? trace_preempt_on+0x20/0xc0 [ 15.802505] ? __pfx_kthread+0x10/0x10 [ 15.802526] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.802547] ? calculate_sigpending+0x7b/0xa0 [ 15.802571] ? __pfx_kthread+0x10/0x10 [ 15.802593] ret_from_fork+0x116/0x1d0 [ 15.802611] ? __pfx_kthread+0x10/0x10 [ 15.802633] ret_from_fork_asm+0x1a/0x30 [ 15.802665] </TASK> [ 15.802677] [ 15.813297] Allocated by task 282: [ 15.813432] kasan_save_stack+0x45/0x70 [ 15.813759] kasan_save_track+0x18/0x40 [ 15.814115] kasan_save_alloc_info+0x3b/0x50 [ 15.814330] __kasan_kmalloc+0xb7/0xc0 [ 15.814465] __kmalloc_cache_noprof+0x189/0x420 [ 15.815003] kasan_atomics+0x95/0x310 [ 15.815507] kunit_try_run_case+0x1a5/0x480 [ 15.815735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.816084] kthread+0x337/0x6f0 [ 15.816405] ret_from_fork+0x116/0x1d0 [ 15.816756] ret_from_fork_asm+0x1a/0x30 [ 15.817051] [ 15.817205] The buggy address belongs to the object at ffff88810261fc00 [ 15.817205] which belongs to the cache kmalloc-64 of size 64 [ 15.817994] The buggy address is located 0 bytes to the right of [ 15.817994] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.818739] [ 15.818862] The buggy address belongs to the physical page: [ 15.819269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.819602] flags: 0x200000000000000(node=0|zone=2) [ 15.819821] page_type: f5(slab) [ 15.819989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.820483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.820838] page dumped because: kasan: bad access detected [ 15.821248] [ 15.821430] Memory state around the buggy address: [ 15.821695] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.822144] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.822486] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.822995] ^ [ 15.823294] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.823686] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.824062] ================================================================== [ 16.560108] ================================================================== [ 16.560386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 16.560947] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.561256] [ 16.561348] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.561394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.561408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.561430] Call Trace: [ 16.561444] <TASK> [ 16.561460] dump_stack_lvl+0x73/0xb0 [ 16.561488] print_report+0xd1/0x650 [ 16.561511] ? __virt_addr_valid+0x1db/0x2d0 [ 16.561534] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.561560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.561586] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.561608] kasan_report+0x141/0x180 [ 16.561631] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.561792] __asan_report_store8_noabort+0x1b/0x30 [ 16.561824] kasan_atomics_helper+0x50d4/0x5450 [ 16.561848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.561871] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.561896] ? kasan_atomics+0x152/0x310 [ 16.561924] kasan_atomics+0x1dc/0x310 [ 16.561947] ? __pfx_kasan_atomics+0x10/0x10 [ 16.561972] ? __pfx_read_tsc+0x10/0x10 [ 16.561994] ? ktime_get_ts64+0x86/0x230 [ 16.562018] kunit_try_run_case+0x1a5/0x480 [ 16.562056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.562369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.562395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.562420] ? __kthread_parkme+0x82/0x180 [ 16.562441] ? preempt_count_sub+0x50/0x80 [ 16.562465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.562490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.562513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.562537] kthread+0x337/0x6f0 [ 16.562557] ? trace_preempt_on+0x20/0xc0 [ 16.562582] ? __pfx_kthread+0x10/0x10 [ 16.562602] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.562624] ? calculate_sigpending+0x7b/0xa0 [ 16.562649] ? __pfx_kthread+0x10/0x10 [ 16.562671] ret_from_fork+0x116/0x1d0 [ 16.562691] ? __pfx_kthread+0x10/0x10 [ 16.562713] ret_from_fork_asm+0x1a/0x30 [ 16.562744] </TASK> [ 16.562755] [ 16.570048] Allocated by task 282: [ 16.570198] kasan_save_stack+0x45/0x70 [ 16.570407] kasan_save_track+0x18/0x40 [ 16.570605] kasan_save_alloc_info+0x3b/0x50 [ 16.570854] __kasan_kmalloc+0xb7/0xc0 [ 16.571019] __kmalloc_cache_noprof+0x189/0x420 [ 16.571230] kasan_atomics+0x95/0x310 [ 16.571405] kunit_try_run_case+0x1a5/0x480 [ 16.571662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.571889] kthread+0x337/0x6f0 [ 16.572031] ret_from_fork+0x116/0x1d0 [ 16.572176] ret_from_fork_asm+0x1a/0x30 [ 16.572375] [ 16.572471] The buggy address belongs to the object at ffff88810261fc00 [ 16.572471] which belongs to the cache kmalloc-64 of size 64 [ 16.572933] The buggy address is located 0 bytes to the right of [ 16.572933] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.573470] [ 16.573609] The buggy address belongs to the physical page: [ 16.573839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.574152] flags: 0x200000000000000(node=0|zone=2) [ 16.574365] page_type: f5(slab) [ 16.574549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.574855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.575160] page dumped because: kasan: bad access detected [ 16.575375] [ 16.575448] Memory state around the buggy address: [ 16.575606] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.575827] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.576056] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.576380] ^ [ 16.576603] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.576942] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.577269] ================================================================== [ 16.893225] ================================================================== [ 16.893924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.894437] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.894995] [ 16.895245] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.895296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.895310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.895332] Call Trace: [ 16.895348] <TASK> [ 16.895364] dump_stack_lvl+0x73/0xb0 [ 16.895392] print_report+0xd1/0x650 [ 16.895415] ? __virt_addr_valid+0x1db/0x2d0 [ 16.895439] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.895460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.895487] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.895656] kasan_report+0x141/0x180 [ 16.895689] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.895717] kasan_check_range+0x10c/0x1c0 [ 16.895742] __kasan_check_write+0x18/0x20 [ 16.895762] kasan_atomics_helper+0x1d7a/0x5450 [ 16.895785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.895808] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.895834] ? kasan_atomics+0x152/0x310 [ 16.895860] kasan_atomics+0x1dc/0x310 [ 16.895884] ? __pfx_kasan_atomics+0x10/0x10 [ 16.895908] ? __pfx_read_tsc+0x10/0x10 [ 16.895930] ? ktime_get_ts64+0x86/0x230 [ 16.895954] kunit_try_run_case+0x1a5/0x480 [ 16.895978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.896001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.896025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.896059] ? __kthread_parkme+0x82/0x180 [ 16.896081] ? preempt_count_sub+0x50/0x80 [ 16.896104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.896128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.896151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.896175] kthread+0x337/0x6f0 [ 16.896194] ? trace_preempt_on+0x20/0xc0 [ 16.896217] ? __pfx_kthread+0x10/0x10 [ 16.896238] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.896260] ? calculate_sigpending+0x7b/0xa0 [ 16.896284] ? __pfx_kthread+0x10/0x10 [ 16.896305] ret_from_fork+0x116/0x1d0 [ 16.896324] ? __pfx_kthread+0x10/0x10 [ 16.896345] ret_from_fork_asm+0x1a/0x30 [ 16.896377] </TASK> [ 16.896390] [ 16.908321] Allocated by task 282: [ 16.908458] kasan_save_stack+0x45/0x70 [ 16.908609] kasan_save_track+0x18/0x40 [ 16.908743] kasan_save_alloc_info+0x3b/0x50 [ 16.908887] __kasan_kmalloc+0xb7/0xc0 [ 16.909017] __kmalloc_cache_noprof+0x189/0x420 [ 16.909178] kasan_atomics+0x95/0x310 [ 16.909308] kunit_try_run_case+0x1a5/0x480 [ 16.909450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.909624] kthread+0x337/0x6f0 [ 16.909745] ret_from_fork+0x116/0x1d0 [ 16.909874] ret_from_fork_asm+0x1a/0x30 [ 16.910011] [ 16.911711] The buggy address belongs to the object at ffff88810261fc00 [ 16.911711] which belongs to the cache kmalloc-64 of size 64 [ 16.912193] The buggy address is located 0 bytes to the right of [ 16.912193] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.912806] [ 16.912891] The buggy address belongs to the physical page: [ 16.913083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.913329] flags: 0x200000000000000(node=0|zone=2) [ 16.913524] page_type: f5(slab) [ 16.914876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.915408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.916474] page dumped because: kasan: bad access detected [ 16.916915] [ 16.916992] Memory state around the buggy address: [ 16.917437] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.918110] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.918326] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.918659] ^ [ 16.919139] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.919793] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.920434] ================================================================== [ 17.102198] ================================================================== [ 17.102525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 17.102813] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.103261] [ 17.103364] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.103407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.103420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.103476] Call Trace: [ 17.103494] <TASK> [ 17.103510] dump_stack_lvl+0x73/0xb0 [ 17.103539] print_report+0xd1/0x650 [ 17.103563] ? __virt_addr_valid+0x1db/0x2d0 [ 17.103585] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.103638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.103666] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.103687] kasan_report+0x141/0x180 [ 17.103710] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.103738] __asan_report_load8_noabort+0x18/0x20 [ 17.103793] kasan_atomics_helper+0x4fa5/0x5450 [ 17.103816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.103839] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.103864] ? kasan_atomics+0x152/0x310 [ 17.103919] kasan_atomics+0x1dc/0x310 [ 17.103943] ? __pfx_kasan_atomics+0x10/0x10 [ 17.103968] ? __pfx_read_tsc+0x10/0x10 [ 17.103988] ? ktime_get_ts64+0x86/0x230 [ 17.104013] kunit_try_run_case+0x1a5/0x480 [ 17.104037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.104070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.104094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.104118] ? __kthread_parkme+0x82/0x180 [ 17.104139] ? preempt_count_sub+0x50/0x80 [ 17.104163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.104218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.104242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.104266] kthread+0x337/0x6f0 [ 17.104287] ? trace_preempt_on+0x20/0xc0 [ 17.104336] ? __pfx_kthread+0x10/0x10 [ 17.104359] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.104380] ? calculate_sigpending+0x7b/0xa0 [ 17.104404] ? __pfx_kthread+0x10/0x10 [ 17.104426] ret_from_fork+0x116/0x1d0 [ 17.104471] ? __pfx_kthread+0x10/0x10 [ 17.104492] ret_from_fork_asm+0x1a/0x30 [ 17.104537] </TASK> [ 17.104551] [ 17.112597] Allocated by task 282: [ 17.112804] kasan_save_stack+0x45/0x70 [ 17.113015] kasan_save_track+0x18/0x40 [ 17.113210] kasan_save_alloc_info+0x3b/0x50 [ 17.113434] __kasan_kmalloc+0xb7/0xc0 [ 17.113722] __kmalloc_cache_noprof+0x189/0x420 [ 17.113978] kasan_atomics+0x95/0x310 [ 17.114189] kunit_try_run_case+0x1a5/0x480 [ 17.114441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.114824] kthread+0x337/0x6f0 [ 17.114950] ret_from_fork+0x116/0x1d0 [ 17.115112] ret_from_fork_asm+0x1a/0x30 [ 17.115312] [ 17.115408] The buggy address belongs to the object at ffff88810261fc00 [ 17.115408] which belongs to the cache kmalloc-64 of size 64 [ 17.116175] The buggy address is located 0 bytes to the right of [ 17.116175] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.116803] [ 17.116877] The buggy address belongs to the physical page: [ 17.117060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.117301] flags: 0x200000000000000(node=0|zone=2) [ 17.117819] page_type: f5(slab) [ 17.117991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.118443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.119010] page dumped because: kasan: bad access detected [ 17.119351] [ 17.119426] Memory state around the buggy address: [ 17.119761] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.120091] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.120443] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.120740] ^ [ 17.120900] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121213] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121650] ================================================================== [ 15.660136] ================================================================== [ 15.660788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.661280] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.661701] [ 15.661827] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.661874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.661887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.661910] Call Trace: [ 15.661932] <TASK> [ 15.661987] dump_stack_lvl+0x73/0xb0 [ 15.662017] print_report+0xd1/0x650 [ 15.662053] ? __virt_addr_valid+0x1db/0x2d0 [ 15.662129] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.662191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.662219] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.662240] kasan_report+0x141/0x180 [ 15.662264] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.662291] __asan_report_store4_noabort+0x1b/0x30 [ 15.662316] kasan_atomics_helper+0x4b6e/0x5450 [ 15.662340] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.662362] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.662419] ? kasan_atomics+0x152/0x310 [ 15.662447] kasan_atomics+0x1dc/0x310 [ 15.662471] ? __pfx_kasan_atomics+0x10/0x10 [ 15.662497] ? __pfx_read_tsc+0x10/0x10 [ 15.662520] ? ktime_get_ts64+0x86/0x230 [ 15.662545] kunit_try_run_case+0x1a5/0x480 [ 15.662603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.662651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.662675] ? __kthread_parkme+0x82/0x180 [ 15.662697] ? preempt_count_sub+0x50/0x80 [ 15.662722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.662769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.662794] kthread+0x337/0x6f0 [ 15.662813] ? trace_preempt_on+0x20/0xc0 [ 15.662837] ? __pfx_kthread+0x10/0x10 [ 15.662858] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.662879] ? calculate_sigpending+0x7b/0xa0 [ 15.662905] ? __pfx_kthread+0x10/0x10 [ 15.662927] ret_from_fork+0x116/0x1d0 [ 15.662946] ? __pfx_kthread+0x10/0x10 [ 15.662967] ret_from_fork_asm+0x1a/0x30 [ 15.662999] </TASK> [ 15.663012] [ 15.672284] Allocated by task 282: [ 15.672458] kasan_save_stack+0x45/0x70 [ 15.672623] kasan_save_track+0x18/0x40 [ 15.672901] kasan_save_alloc_info+0x3b/0x50 [ 15.673141] __kasan_kmalloc+0xb7/0xc0 [ 15.673282] __kmalloc_cache_noprof+0x189/0x420 [ 15.673441] kasan_atomics+0x95/0x310 [ 15.673708] kunit_try_run_case+0x1a5/0x480 [ 15.674020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.674344] kthread+0x337/0x6f0 [ 15.674579] ret_from_fork+0x116/0x1d0 [ 15.674799] ret_from_fork_asm+0x1a/0x30 [ 15.674954] [ 15.675145] The buggy address belongs to the object at ffff88810261fc00 [ 15.675145] which belongs to the cache kmalloc-64 of size 64 [ 15.675740] The buggy address is located 0 bytes to the right of [ 15.675740] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.676429] [ 15.676717] The buggy address belongs to the physical page: [ 15.676920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.677578] flags: 0x200000000000000(node=0|zone=2) [ 15.677844] page_type: f5(slab) [ 15.678033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.678503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.678839] page dumped because: kasan: bad access detected [ 15.679183] [ 15.679301] Memory state around the buggy address: [ 15.679544] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.679805] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.680265] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.680531] ^ [ 15.680807] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.681211] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.681837] ================================================================== [ 16.776472] ================================================================== [ 16.776713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.776948] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.777856] [ 16.778464] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.778536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.778550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.778572] Call Trace: [ 16.778591] <TASK> [ 16.778608] dump_stack_lvl+0x73/0xb0 [ 16.778638] print_report+0xd1/0x650 [ 16.778662] ? __virt_addr_valid+0x1db/0x2d0 [ 16.778685] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.778706] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.778732] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.778754] kasan_report+0x141/0x180 [ 16.778778] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.778805] kasan_check_range+0x10c/0x1c0 [ 16.778828] __kasan_check_write+0x18/0x20 [ 16.778848] kasan_atomics_helper+0x1b22/0x5450 [ 16.778870] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.778894] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.778919] ? kasan_atomics+0x152/0x310 [ 16.778946] kasan_atomics+0x1dc/0x310 [ 16.778968] ? __pfx_kasan_atomics+0x10/0x10 [ 16.778992] ? __pfx_read_tsc+0x10/0x10 [ 16.779013] ? ktime_get_ts64+0x86/0x230 [ 16.779038] kunit_try_run_case+0x1a5/0x480 [ 16.779073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.779095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.779117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.779141] ? __kthread_parkme+0x82/0x180 [ 16.779163] ? preempt_count_sub+0x50/0x80 [ 16.779187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.779211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.779234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.779257] kthread+0x337/0x6f0 [ 16.779276] ? trace_preempt_on+0x20/0xc0 [ 16.779300] ? __pfx_kthread+0x10/0x10 [ 16.779321] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.779341] ? calculate_sigpending+0x7b/0xa0 [ 16.779365] ? __pfx_kthread+0x10/0x10 [ 16.779387] ret_from_fork+0x116/0x1d0 [ 16.779406] ? __pfx_kthread+0x10/0x10 [ 16.779426] ret_from_fork_asm+0x1a/0x30 [ 16.779458] </TASK> [ 16.779469] [ 16.795845] Allocated by task 282: [ 16.795983] kasan_save_stack+0x45/0x70 [ 16.796146] kasan_save_track+0x18/0x40 [ 16.796287] kasan_save_alloc_info+0x3b/0x50 [ 16.796438] __kasan_kmalloc+0xb7/0xc0 [ 16.796604] __kmalloc_cache_noprof+0x189/0x420 [ 16.797346] kasan_atomics+0x95/0x310 [ 16.797763] kunit_try_run_case+0x1a5/0x480 [ 16.798306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.798879] kthread+0x337/0x6f0 [ 16.799287] ret_from_fork+0x116/0x1d0 [ 16.799747] ret_from_fork_asm+0x1a/0x30 [ 16.800208] [ 16.800372] The buggy address belongs to the object at ffff88810261fc00 [ 16.800372] which belongs to the cache kmalloc-64 of size 64 [ 16.801463] The buggy address is located 0 bytes to the right of [ 16.801463] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.802275] [ 16.802357] The buggy address belongs to the physical page: [ 16.802686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.803470] flags: 0x200000000000000(node=0|zone=2) [ 16.803983] page_type: f5(slab) [ 16.804378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.804970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.805438] page dumped because: kasan: bad access detected [ 16.805953] [ 16.806030] Memory state around the buggy address: [ 16.806204] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.806426] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.806796] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.807636] ^ [ 16.808067] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.808754] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.809374] ================================================================== [ 15.751896] ================================================================== [ 15.752370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.752892] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.753392] [ 15.753598] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.753658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.753672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.753696] Call Trace: [ 15.753717] <TASK> [ 15.753736] dump_stack_lvl+0x73/0xb0 [ 15.753767] print_report+0xd1/0x650 [ 15.753790] ? __virt_addr_valid+0x1db/0x2d0 [ 15.753814] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.753835] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.753861] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.753884] kasan_report+0x141/0x180 [ 15.753907] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.753934] __asan_report_store4_noabort+0x1b/0x30 [ 15.753959] kasan_atomics_helper+0x4b3a/0x5450 [ 15.753981] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.754004] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.754029] ? kasan_atomics+0x152/0x310 [ 15.754148] kasan_atomics+0x1dc/0x310 [ 15.754178] ? __pfx_kasan_atomics+0x10/0x10 [ 15.754202] ? __pfx_read_tsc+0x10/0x10 [ 15.754238] ? ktime_get_ts64+0x86/0x230 [ 15.754263] kunit_try_run_case+0x1a5/0x480 [ 15.754288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.754311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.754335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.754359] ? __kthread_parkme+0x82/0x180 [ 15.754380] ? preempt_count_sub+0x50/0x80 [ 15.754405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.754429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.754452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.754476] kthread+0x337/0x6f0 [ 15.754495] ? trace_preempt_on+0x20/0xc0 [ 15.754519] ? __pfx_kthread+0x10/0x10 [ 15.754540] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.754561] ? calculate_sigpending+0x7b/0xa0 [ 15.754585] ? __pfx_kthread+0x10/0x10 [ 15.754607] ret_from_fork+0x116/0x1d0 [ 15.754626] ? __pfx_kthread+0x10/0x10 [ 15.754647] ret_from_fork_asm+0x1a/0x30 [ 15.754680] </TASK> [ 15.754692] [ 15.764992] Allocated by task 282: [ 15.765290] kasan_save_stack+0x45/0x70 [ 15.765719] kasan_save_track+0x18/0x40 [ 15.765874] kasan_save_alloc_info+0x3b/0x50 [ 15.766212] __kasan_kmalloc+0xb7/0xc0 [ 15.766464] __kmalloc_cache_noprof+0x189/0x420 [ 15.766737] kasan_atomics+0x95/0x310 [ 15.766911] kunit_try_run_case+0x1a5/0x480 [ 15.767427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.767813] kthread+0x337/0x6f0 [ 15.767990] ret_from_fork+0x116/0x1d0 [ 15.768224] ret_from_fork_asm+0x1a/0x30 [ 15.768429] [ 15.768508] The buggy address belongs to the object at ffff88810261fc00 [ 15.768508] which belongs to the cache kmalloc-64 of size 64 [ 15.769025] The buggy address is located 0 bytes to the right of [ 15.769025] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.769682] [ 15.769793] The buggy address belongs to the physical page: [ 15.769972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.770328] flags: 0x200000000000000(node=0|zone=2) [ 15.770761] page_type: f5(slab) [ 15.770912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.771461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.772003] page dumped because: kasan: bad access detected [ 15.772294] [ 15.772394] Memory state around the buggy address: [ 15.772760] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.773179] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.773849] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.774247] ^ [ 15.774631] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.774964] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.775338] ================================================================== [ 15.824769] ================================================================== [ 15.825238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.825949] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.826437] [ 15.826644] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.826691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.826748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.826774] Call Trace: [ 15.826792] <TASK> [ 15.826857] dump_stack_lvl+0x73/0xb0 [ 15.826888] print_report+0xd1/0x650 [ 15.826923] ? __virt_addr_valid+0x1db/0x2d0 [ 15.826947] ? kasan_atomics_helper+0x697/0x5450 [ 15.826968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.826994] ? kasan_atomics_helper+0x697/0x5450 [ 15.827016] kasan_report+0x141/0x180 [ 15.827048] ? kasan_atomics_helper+0x697/0x5450 [ 15.827076] kasan_check_range+0x10c/0x1c0 [ 15.827100] __kasan_check_write+0x18/0x20 [ 15.827120] kasan_atomics_helper+0x697/0x5450 [ 15.827143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.827166] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.827191] ? kasan_atomics+0x152/0x310 [ 15.827218] kasan_atomics+0x1dc/0x310 [ 15.827241] ? __pfx_kasan_atomics+0x10/0x10 [ 15.827265] ? __pfx_read_tsc+0x10/0x10 [ 15.827287] ? ktime_get_ts64+0x86/0x230 [ 15.827312] kunit_try_run_case+0x1a5/0x480 [ 15.827337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.827359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.827383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.827407] ? __kthread_parkme+0x82/0x180 [ 15.827428] ? preempt_count_sub+0x50/0x80 [ 15.827452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.827476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.827499] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.827569] kthread+0x337/0x6f0 [ 15.827591] ? trace_preempt_on+0x20/0xc0 [ 15.827614] ? __pfx_kthread+0x10/0x10 [ 15.827636] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.827657] ? calculate_sigpending+0x7b/0xa0 [ 15.827682] ? __pfx_kthread+0x10/0x10 [ 15.827703] ret_from_fork+0x116/0x1d0 [ 15.827723] ? __pfx_kthread+0x10/0x10 [ 15.827744] ret_from_fork_asm+0x1a/0x30 [ 15.827776] </TASK> [ 15.827788] [ 15.836858] Allocated by task 282: [ 15.837097] kasan_save_stack+0x45/0x70 [ 15.837623] kasan_save_track+0x18/0x40 [ 15.838225] kasan_save_alloc_info+0x3b/0x50 [ 15.838466] __kasan_kmalloc+0xb7/0xc0 [ 15.838767] __kmalloc_cache_noprof+0x189/0x420 [ 15.839289] kasan_atomics+0x95/0x310 [ 15.839446] kunit_try_run_case+0x1a5/0x480 [ 15.839811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.840032] kthread+0x337/0x6f0 [ 15.840500] ret_from_fork+0x116/0x1d0 [ 15.840764] ret_from_fork_asm+0x1a/0x30 [ 15.840978] [ 15.841179] The buggy address belongs to the object at ffff88810261fc00 [ 15.841179] which belongs to the cache kmalloc-64 of size 64 [ 15.841809] The buggy address is located 0 bytes to the right of [ 15.841809] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.842483] [ 15.842589] The buggy address belongs to the physical page: [ 15.842898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.843519] flags: 0x200000000000000(node=0|zone=2) [ 15.843803] page_type: f5(slab) [ 15.844028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.844371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.845131] page dumped because: kasan: bad access detected [ 15.845435] [ 15.845543] Memory state around the buggy address: [ 15.845776] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.846258] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.846549] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.846982] ^ [ 15.847247] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.847813] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.848285] ================================================================== [ 15.848933] ================================================================== [ 15.849240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.849851] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.850647] [ 15.850747] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.850905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.850922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.850945] Call Trace: [ 15.850976] <TASK> [ 15.850994] dump_stack_lvl+0x73/0xb0 [ 15.851023] print_report+0xd1/0x650 [ 15.851060] ? __virt_addr_valid+0x1db/0x2d0 [ 15.851083] ? kasan_atomics_helper+0x72f/0x5450 [ 15.851104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.851182] ? kasan_atomics_helper+0x72f/0x5450 [ 15.851256] kasan_report+0x141/0x180 [ 15.851281] ? kasan_atomics_helper+0x72f/0x5450 [ 15.851318] kasan_check_range+0x10c/0x1c0 [ 15.851343] __kasan_check_write+0x18/0x20 [ 15.851363] kasan_atomics_helper+0x72f/0x5450 [ 15.851387] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.851408] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.851433] ? kasan_atomics+0x152/0x310 [ 15.851460] kasan_atomics+0x1dc/0x310 [ 15.851482] ? __pfx_kasan_atomics+0x10/0x10 [ 15.851516] ? __pfx_read_tsc+0x10/0x10 [ 15.851538] ? ktime_get_ts64+0x86/0x230 [ 15.851562] kunit_try_run_case+0x1a5/0x480 [ 15.851586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851609] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.851632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.851656] ? __kthread_parkme+0x82/0x180 [ 15.851676] ? preempt_count_sub+0x50/0x80 [ 15.851700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.851747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.851772] kthread+0x337/0x6f0 [ 15.851793] ? trace_preempt_on+0x20/0xc0 [ 15.851815] ? __pfx_kthread+0x10/0x10 [ 15.851836] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.851858] ? calculate_sigpending+0x7b/0xa0 [ 15.851882] ? __pfx_kthread+0x10/0x10 [ 15.851904] ret_from_fork+0x116/0x1d0 [ 15.851922] ? __pfx_kthread+0x10/0x10 [ 15.851943] ret_from_fork_asm+0x1a/0x30 [ 15.851975] </TASK> [ 15.851986] [ 15.865306] Allocated by task 282: [ 15.865450] kasan_save_stack+0x45/0x70 [ 15.865677] kasan_save_track+0x18/0x40 [ 15.866527] kasan_save_alloc_info+0x3b/0x50 [ 15.866723] __kasan_kmalloc+0xb7/0xc0 [ 15.866858] __kmalloc_cache_noprof+0x189/0x420 [ 15.867011] kasan_atomics+0x95/0x310 [ 15.867160] kunit_try_run_case+0x1a5/0x480 [ 15.867300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.867469] kthread+0x337/0x6f0 [ 15.867587] ret_from_fork+0x116/0x1d0 [ 15.867716] ret_from_fork_asm+0x1a/0x30 [ 15.868973] [ 15.869079] The buggy address belongs to the object at ffff88810261fc00 [ 15.869079] which belongs to the cache kmalloc-64 of size 64 [ 15.870140] The buggy address is located 0 bytes to the right of [ 15.870140] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.870684] [ 15.870759] The buggy address belongs to the physical page: [ 15.872095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.872777] flags: 0x200000000000000(node=0|zone=2) [ 15.873213] page_type: f5(slab) [ 15.873500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.873973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.874358] page dumped because: kasan: bad access detected [ 15.874905] [ 15.875009] Memory state around the buggy address: [ 15.875469] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.875973] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.876544] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.877002] ^ [ 15.877364] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.878026] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.878508] ================================================================== [ 16.322990] ================================================================== [ 16.323243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 16.323568] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.323976] [ 16.324092] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.324135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.324149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.324170] Call Trace: [ 16.324185] <TASK> [ 16.324201] dump_stack_lvl+0x73/0xb0 [ 16.324227] print_report+0xd1/0x650 [ 16.324249] ? __virt_addr_valid+0x1db/0x2d0 [ 16.324273] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.324294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.324320] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.324343] kasan_report+0x141/0x180 [ 16.324366] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.324394] __asan_report_load4_noabort+0x18/0x20 [ 16.324418] kasan_atomics_helper+0x4a1c/0x5450 [ 16.324441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.324464] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.324488] ? kasan_atomics+0x152/0x310 [ 16.324515] kasan_atomics+0x1dc/0x310 [ 16.324539] ? __pfx_kasan_atomics+0x10/0x10 [ 16.324564] ? __pfx_read_tsc+0x10/0x10 [ 16.324603] ? ktime_get_ts64+0x86/0x230 [ 16.324629] kunit_try_run_case+0x1a5/0x480 [ 16.324653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.324675] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.324698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.324722] ? __kthread_parkme+0x82/0x180 [ 16.324743] ? preempt_count_sub+0x50/0x80 [ 16.324767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.324792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.324815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.324839] kthread+0x337/0x6f0 [ 16.324859] ? trace_preempt_on+0x20/0xc0 [ 16.324882] ? __pfx_kthread+0x10/0x10 [ 16.324904] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.324925] ? calculate_sigpending+0x7b/0xa0 [ 16.324950] ? __pfx_kthread+0x10/0x10 [ 16.324972] ret_from_fork+0x116/0x1d0 [ 16.324991] ? __pfx_kthread+0x10/0x10 [ 16.325012] ret_from_fork_asm+0x1a/0x30 [ 16.325054] </TASK> [ 16.325067] [ 16.332569] Allocated by task 282: [ 16.332700] kasan_save_stack+0x45/0x70 [ 16.332927] kasan_save_track+0x18/0x40 [ 16.333172] kasan_save_alloc_info+0x3b/0x50 [ 16.333394] __kasan_kmalloc+0xb7/0xc0 [ 16.333595] __kmalloc_cache_noprof+0x189/0x420 [ 16.333865] kasan_atomics+0x95/0x310 [ 16.334036] kunit_try_run_case+0x1a5/0x480 [ 16.334244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.334422] kthread+0x337/0x6f0 [ 16.334560] ret_from_fork+0x116/0x1d0 [ 16.334878] ret_from_fork_asm+0x1a/0x30 [ 16.335362] [ 16.335450] The buggy address belongs to the object at ffff88810261fc00 [ 16.335450] which belongs to the cache kmalloc-64 of size 64 [ 16.335986] The buggy address is located 0 bytes to the right of [ 16.335986] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.336660] [ 16.336755] The buggy address belongs to the physical page: [ 16.337012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.337401] flags: 0x200000000000000(node=0|zone=2) [ 16.337635] page_type: f5(slab) [ 16.337761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.337996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.338273] page dumped because: kasan: bad access detected [ 16.338563] [ 16.338659] Memory state around the buggy address: [ 16.338887] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.339219] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.339440] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.339799] ^ [ 16.340029] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.340715] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341436] ================================================================== [ 16.631951] ================================================================== [ 16.632635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.632952] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.633264] [ 16.633378] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.633421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.633435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.633456] Call Trace: [ 16.633471] <TASK> [ 16.633487] dump_stack_lvl+0x73/0xb0 [ 16.633525] print_report+0xd1/0x650 [ 16.633547] ? __virt_addr_valid+0x1db/0x2d0 [ 16.633575] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.633596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.633622] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.633645] kasan_report+0x141/0x180 [ 16.633667] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.633694] kasan_check_range+0x10c/0x1c0 [ 16.633719] __kasan_check_write+0x18/0x20 [ 16.633738] kasan_atomics_helper+0x16e7/0x5450 [ 16.633760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.633783] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.633808] ? kasan_atomics+0x152/0x310 [ 16.633835] kasan_atomics+0x1dc/0x310 [ 16.633858] ? __pfx_kasan_atomics+0x10/0x10 [ 16.633883] ? __pfx_read_tsc+0x10/0x10 [ 16.633905] ? ktime_get_ts64+0x86/0x230 [ 16.633929] kunit_try_run_case+0x1a5/0x480 [ 16.633954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.633976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.634001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.634024] ? __kthread_parkme+0x82/0x180 [ 16.634056] ? preempt_count_sub+0x50/0x80 [ 16.634080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.634104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.634128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.634151] kthread+0x337/0x6f0 [ 16.634171] ? trace_preempt_on+0x20/0xc0 [ 16.634195] ? __pfx_kthread+0x10/0x10 [ 16.634216] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.634239] ? calculate_sigpending+0x7b/0xa0 [ 16.634263] ? __pfx_kthread+0x10/0x10 [ 16.634285] ret_from_fork+0x116/0x1d0 [ 16.634304] ? __pfx_kthread+0x10/0x10 [ 16.634325] ret_from_fork_asm+0x1a/0x30 [ 16.634357] </TASK> [ 16.634369] [ 16.641307] Allocated by task 282: [ 16.641483] kasan_save_stack+0x45/0x70 [ 16.641689] kasan_save_track+0x18/0x40 [ 16.641880] kasan_save_alloc_info+0x3b/0x50 [ 16.642133] __kasan_kmalloc+0xb7/0xc0 [ 16.642335] __kmalloc_cache_noprof+0x189/0x420 [ 16.642605] kasan_atomics+0x95/0x310 [ 16.642794] kunit_try_run_case+0x1a5/0x480 [ 16.643002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.643264] kthread+0x337/0x6f0 [ 16.643432] ret_from_fork+0x116/0x1d0 [ 16.643734] ret_from_fork_asm+0x1a/0x30 [ 16.643880] [ 16.643952] The buggy address belongs to the object at ffff88810261fc00 [ 16.643952] which belongs to the cache kmalloc-64 of size 64 [ 16.644315] The buggy address is located 0 bytes to the right of [ 16.644315] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.645287] [ 16.645394] The buggy address belongs to the physical page: [ 16.647680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.648087] flags: 0x200000000000000(node=0|zone=2) [ 16.648292] page_type: f5(slab) [ 16.648414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.648734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.649078] page dumped because: kasan: bad access detected [ 16.649253] [ 16.649325] Memory state around the buggy address: [ 16.649518] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.649784] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.652088] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.652429] ^ [ 16.652830] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653078] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653289] ================================================================== [ 17.122283] ================================================================== [ 17.122671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 17.123017] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.123390] [ 17.123508] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.123582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.123596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.123617] Call Trace: [ 17.123633] <TASK> [ 17.123649] dump_stack_lvl+0x73/0xb0 [ 17.123675] print_report+0xd1/0x650 [ 17.123731] ? __virt_addr_valid+0x1db/0x2d0 [ 17.123753] ? kasan_atomics_helper+0x224c/0x5450 [ 17.123794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.123821] ? kasan_atomics_helper+0x224c/0x5450 [ 17.123874] kasan_report+0x141/0x180 [ 17.123898] ? kasan_atomics_helper+0x224c/0x5450 [ 17.123926] kasan_check_range+0x10c/0x1c0 [ 17.123950] __kasan_check_write+0x18/0x20 [ 17.123970] kasan_atomics_helper+0x224c/0x5450 [ 17.124020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.124054] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.124079] ? kasan_atomics+0x152/0x310 [ 17.124134] kasan_atomics+0x1dc/0x310 [ 17.124158] ? __pfx_kasan_atomics+0x10/0x10 [ 17.124182] ? __pfx_read_tsc+0x10/0x10 [ 17.124203] ? ktime_get_ts64+0x86/0x230 [ 17.124228] kunit_try_run_case+0x1a5/0x480 [ 17.124252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.124306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.124330] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.124353] ? __kthread_parkme+0x82/0x180 [ 17.124374] ? preempt_count_sub+0x50/0x80 [ 17.124424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.124450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.124473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.124497] kthread+0x337/0x6f0 [ 17.124527] ? trace_preempt_on+0x20/0xc0 [ 17.124577] ? __pfx_kthread+0x10/0x10 [ 17.124599] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.124621] ? calculate_sigpending+0x7b/0xa0 [ 17.124645] ? __pfx_kthread+0x10/0x10 [ 17.124667] ret_from_fork+0x116/0x1d0 [ 17.124715] ? __pfx_kthread+0x10/0x10 [ 17.124759] ret_from_fork_asm+0x1a/0x30 [ 17.124817] </TASK> [ 17.124829] [ 17.133475] Allocated by task 282: [ 17.133712] kasan_save_stack+0x45/0x70 [ 17.133921] kasan_save_track+0x18/0x40 [ 17.134163] kasan_save_alloc_info+0x3b/0x50 [ 17.134392] __kasan_kmalloc+0xb7/0xc0 [ 17.134640] __kmalloc_cache_noprof+0x189/0x420 [ 17.134864] kasan_atomics+0x95/0x310 [ 17.135014] kunit_try_run_case+0x1a5/0x480 [ 17.135169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.135341] kthread+0x337/0x6f0 [ 17.135512] ret_from_fork+0x116/0x1d0 [ 17.135697] ret_from_fork_asm+0x1a/0x30 [ 17.136012] [ 17.136236] The buggy address belongs to the object at ffff88810261fc00 [ 17.136236] which belongs to the cache kmalloc-64 of size 64 [ 17.136885] The buggy address is located 0 bytes to the right of [ 17.136885] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.137369] [ 17.137501] The buggy address belongs to the physical page: [ 17.137771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.138027] flags: 0x200000000000000(node=0|zone=2) [ 17.138310] page_type: f5(slab) [ 17.138514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.138831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.139150] page dumped because: kasan: bad access detected [ 17.139427] [ 17.139530] Memory state around the buggy address: [ 17.139750] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.140101] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.140481] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.140828] ^ [ 17.141063] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.141311] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.141717] ================================================================== [ 16.280876] ================================================================== [ 16.281121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 16.281458] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.281798] [ 16.282007] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.282062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.282075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.282096] Call Trace: [ 16.282112] <TASK> [ 16.282127] dump_stack_lvl+0x73/0xb0 [ 16.282153] print_report+0xd1/0x650 [ 16.282176] ? __virt_addr_valid+0x1db/0x2d0 [ 16.282198] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.282220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.282247] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.282269] kasan_report+0x141/0x180 [ 16.282293] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.282320] __asan_report_load4_noabort+0x18/0x20 [ 16.282344] kasan_atomics_helper+0x4a36/0x5450 [ 16.282367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.282390] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.282414] ? kasan_atomics+0x152/0x310 [ 16.282441] kasan_atomics+0x1dc/0x310 [ 16.282464] ? __pfx_kasan_atomics+0x10/0x10 [ 16.282489] ? __pfx_read_tsc+0x10/0x10 [ 16.282566] ? ktime_get_ts64+0x86/0x230 [ 16.282593] kunit_try_run_case+0x1a5/0x480 [ 16.282618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.282640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.282664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.282688] ? __kthread_parkme+0x82/0x180 [ 16.282708] ? preempt_count_sub+0x50/0x80 [ 16.282732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.282757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.282780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.282804] kthread+0x337/0x6f0 [ 16.282823] ? trace_preempt_on+0x20/0xc0 [ 16.282846] ? __pfx_kthread+0x10/0x10 [ 16.282867] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.282889] ? calculate_sigpending+0x7b/0xa0 [ 16.282912] ? __pfx_kthread+0x10/0x10 [ 16.282934] ret_from_fork+0x116/0x1d0 [ 16.282953] ? __pfx_kthread+0x10/0x10 [ 16.282975] ret_from_fork_asm+0x1a/0x30 [ 16.283007] </TASK> [ 16.283018] [ 16.290925] Allocated by task 282: [ 16.291067] kasan_save_stack+0x45/0x70 [ 16.291257] kasan_save_track+0x18/0x40 [ 16.291449] kasan_save_alloc_info+0x3b/0x50 [ 16.291660] __kasan_kmalloc+0xb7/0xc0 [ 16.291851] __kmalloc_cache_noprof+0x189/0x420 [ 16.292223] kasan_atomics+0x95/0x310 [ 16.292383] kunit_try_run_case+0x1a5/0x480 [ 16.292573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.292829] kthread+0x337/0x6f0 [ 16.292998] ret_from_fork+0x116/0x1d0 [ 16.293366] ret_from_fork_asm+0x1a/0x30 [ 16.293613] [ 16.293706] The buggy address belongs to the object at ffff88810261fc00 [ 16.293706] which belongs to the cache kmalloc-64 of size 64 [ 16.294227] The buggy address is located 0 bytes to the right of [ 16.294227] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.294794] [ 16.294891] The buggy address belongs to the physical page: [ 16.295198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.295446] flags: 0x200000000000000(node=0|zone=2) [ 16.295900] page_type: f5(slab) [ 16.296125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.296442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.296770] page dumped because: kasan: bad access detected [ 16.296947] [ 16.297018] Memory state around the buggy address: [ 16.297255] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.297583] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.298330] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.298679] ^ [ 16.298907] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.299266] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.299596] ================================================================== [ 16.968573] ================================================================== [ 16.969215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.969700] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.970006] [ 16.970127] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.970170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.970183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.970204] Call Trace: [ 16.970218] <TASK> [ 16.970233] dump_stack_lvl+0x73/0xb0 [ 16.970259] print_report+0xd1/0x650 [ 16.970281] ? __virt_addr_valid+0x1db/0x2d0 [ 16.970303] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.970325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.970350] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.970372] kasan_report+0x141/0x180 [ 16.970433] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.970461] kasan_check_range+0x10c/0x1c0 [ 16.970485] __kasan_check_write+0x18/0x20 [ 16.970504] kasan_atomics_helper+0x1f43/0x5450 [ 16.970540] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.970561] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.970619] ? kasan_atomics+0x152/0x310 [ 16.970646] kasan_atomics+0x1dc/0x310 [ 16.970669] ? __pfx_kasan_atomics+0x10/0x10 [ 16.970693] ? __pfx_read_tsc+0x10/0x10 [ 16.970715] ? ktime_get_ts64+0x86/0x230 [ 16.970771] kunit_try_run_case+0x1a5/0x480 [ 16.970795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.970817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.970842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.970866] ? __kthread_parkme+0x82/0x180 [ 16.970918] ? preempt_count_sub+0x50/0x80 [ 16.970942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.970967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.970991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.971014] kthread+0x337/0x6f0 [ 16.971034] ? trace_preempt_on+0x20/0xc0 [ 16.971069] ? __pfx_kthread+0x10/0x10 [ 16.971090] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.971112] ? calculate_sigpending+0x7b/0xa0 [ 16.971136] ? __pfx_kthread+0x10/0x10 [ 16.971158] ret_from_fork+0x116/0x1d0 [ 16.971176] ? __pfx_kthread+0x10/0x10 [ 16.971197] ret_from_fork_asm+0x1a/0x30 [ 16.971228] </TASK> [ 16.971239] [ 16.979318] Allocated by task 282: [ 16.979496] kasan_save_stack+0x45/0x70 [ 16.979693] kasan_save_track+0x18/0x40 [ 16.979923] kasan_save_alloc_info+0x3b/0x50 [ 16.980155] __kasan_kmalloc+0xb7/0xc0 [ 16.980315] __kmalloc_cache_noprof+0x189/0x420 [ 16.980466] kasan_atomics+0x95/0x310 [ 16.980716] kunit_try_run_case+0x1a5/0x480 [ 16.981002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.981228] kthread+0x337/0x6f0 [ 16.981537] ret_from_fork+0x116/0x1d0 [ 16.981889] ret_from_fork_asm+0x1a/0x30 [ 16.982093] [ 16.982188] The buggy address belongs to the object at ffff88810261fc00 [ 16.982188] which belongs to the cache kmalloc-64 of size 64 [ 16.982708] The buggy address is located 0 bytes to the right of [ 16.982708] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.983227] [ 16.983298] The buggy address belongs to the physical page: [ 16.983464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.984212] flags: 0x200000000000000(node=0|zone=2) [ 16.984445] page_type: f5(slab) [ 16.984692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.985058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.985382] page dumped because: kasan: bad access detected [ 16.985625] [ 16.985754] Memory state around the buggy address: [ 16.985999] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.986225] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.986433] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.987072] ^ [ 16.987364] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.987921] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.988210] ================================================================== [ 16.053633] ================================================================== [ 16.053936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 16.054573] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.055155] [ 16.055415] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.055477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.055491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.055514] Call Trace: [ 16.055529] <TASK> [ 16.055545] dump_stack_lvl+0x73/0xb0 [ 16.055574] print_report+0xd1/0x650 [ 16.055597] ? __virt_addr_valid+0x1db/0x2d0 [ 16.055620] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.055641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.055668] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.055689] kasan_report+0x141/0x180 [ 16.055714] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.055741] kasan_check_range+0x10c/0x1c0 [ 16.055765] __kasan_check_write+0x18/0x20 [ 16.055785] kasan_atomics_helper+0xb6a/0x5450 [ 16.055807] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.055830] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.055855] ? kasan_atomics+0x152/0x310 [ 16.055883] kasan_atomics+0x1dc/0x310 [ 16.055906] ? __pfx_kasan_atomics+0x10/0x10 [ 16.055931] ? __pfx_read_tsc+0x10/0x10 [ 16.055952] ? ktime_get_ts64+0x86/0x230 [ 16.055977] kunit_try_run_case+0x1a5/0x480 [ 16.056002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.056025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.056058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.056132] ? __kthread_parkme+0x82/0x180 [ 16.056153] ? preempt_count_sub+0x50/0x80 [ 16.056177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.056202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.056226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.056249] kthread+0x337/0x6f0 [ 16.056269] ? trace_preempt_on+0x20/0xc0 [ 16.056293] ? __pfx_kthread+0x10/0x10 [ 16.056313] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.056335] ? calculate_sigpending+0x7b/0xa0 [ 16.056360] ? __pfx_kthread+0x10/0x10 [ 16.056382] ret_from_fork+0x116/0x1d0 [ 16.056401] ? __pfx_kthread+0x10/0x10 [ 16.056422] ret_from_fork_asm+0x1a/0x30 [ 16.056454] </TASK> [ 16.056467] [ 16.068737] Allocated by task 282: [ 16.068913] kasan_save_stack+0x45/0x70 [ 16.069129] kasan_save_track+0x18/0x40 [ 16.069748] kasan_save_alloc_info+0x3b/0x50 [ 16.070117] __kasan_kmalloc+0xb7/0xc0 [ 16.070430] __kmalloc_cache_noprof+0x189/0x420 [ 16.070825] kasan_atomics+0x95/0x310 [ 16.071017] kunit_try_run_case+0x1a5/0x480 [ 16.071399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.071666] kthread+0x337/0x6f0 [ 16.071986] ret_from_fork+0x116/0x1d0 [ 16.072359] ret_from_fork_asm+0x1a/0x30 [ 16.072567] [ 16.072770] The buggy address belongs to the object at ffff88810261fc00 [ 16.072770] which belongs to the cache kmalloc-64 of size 64 [ 16.073545] The buggy address is located 0 bytes to the right of [ 16.073545] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.074421] [ 16.074563] The buggy address belongs to the physical page: [ 16.074759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.075438] flags: 0x200000000000000(node=0|zone=2) [ 16.075647] page_type: f5(slab) [ 16.075956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.076540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.076960] page dumped because: kasan: bad access detected [ 16.077371] [ 16.077477] Memory state around the buggy address: [ 16.077913] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.078551] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.078861] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.079315] ^ [ 16.079497] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.080289] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.080789] ================================================================== [ 16.809994] ================================================================== [ 16.810557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.811198] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.811812] [ 16.811997] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.812054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.812067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.812091] Call Trace: [ 16.812106] <TASK> [ 16.812124] dump_stack_lvl+0x73/0xb0 [ 16.812152] print_report+0xd1/0x650 [ 16.812174] ? __virt_addr_valid+0x1db/0x2d0 [ 16.812197] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.812219] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.812245] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.812268] kasan_report+0x141/0x180 [ 16.812289] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.812317] kasan_check_range+0x10c/0x1c0 [ 16.812341] __kasan_check_write+0x18/0x20 [ 16.812361] kasan_atomics_helper+0x1c18/0x5450 [ 16.812383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.812404] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.812430] ? kasan_atomics+0x152/0x310 [ 16.812456] kasan_atomics+0x1dc/0x310 [ 16.812479] ? __pfx_kasan_atomics+0x10/0x10 [ 16.812503] ? __pfx_read_tsc+0x10/0x10 [ 16.812525] ? ktime_get_ts64+0x86/0x230 [ 16.812550] kunit_try_run_case+0x1a5/0x480 [ 16.812574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.812596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.812620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.812644] ? __kthread_parkme+0x82/0x180 [ 16.812674] ? preempt_count_sub+0x50/0x80 [ 16.812698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.812722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.812746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.812769] kthread+0x337/0x6f0 [ 16.812790] ? trace_preempt_on+0x20/0xc0 [ 16.812814] ? __pfx_kthread+0x10/0x10 [ 16.812835] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.812857] ? calculate_sigpending+0x7b/0xa0 [ 16.812881] ? __pfx_kthread+0x10/0x10 [ 16.812903] ret_from_fork+0x116/0x1d0 [ 16.812921] ? __pfx_kthread+0x10/0x10 [ 16.812943] ret_from_fork_asm+0x1a/0x30 [ 16.812974] </TASK> [ 16.812986] [ 16.824008] Allocated by task 282: [ 16.824152] kasan_save_stack+0x45/0x70 [ 16.824296] kasan_save_track+0x18/0x40 [ 16.824433] kasan_save_alloc_info+0x3b/0x50 [ 16.824609] __kasan_kmalloc+0xb7/0xc0 [ 16.824936] __kmalloc_cache_noprof+0x189/0x420 [ 16.825345] kasan_atomics+0x95/0x310 [ 16.825710] kunit_try_run_case+0x1a5/0x480 [ 16.826086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.826670] kthread+0x337/0x6f0 [ 16.826978] ret_from_fork+0x116/0x1d0 [ 16.827388] ret_from_fork_asm+0x1a/0x30 [ 16.827760] [ 16.827928] The buggy address belongs to the object at ffff88810261fc00 [ 16.827928] which belongs to the cache kmalloc-64 of size 64 [ 16.828991] The buggy address is located 0 bytes to the right of [ 16.828991] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.830293] [ 16.830453] The buggy address belongs to the physical page: [ 16.831003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.831296] flags: 0x200000000000000(node=0|zone=2) [ 16.831462] page_type: f5(slab) [ 16.831716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.832369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.833121] page dumped because: kasan: bad access detected [ 16.833636] [ 16.833793] Memory state around the buggy address: [ 16.834199] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.834569] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.835197] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.835455] ^ [ 16.835648] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.836107] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.836621] ================================================================== [ 15.682380] ================================================================== [ 15.682839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.683307] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.683644] [ 15.683770] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.683849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.683862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.683884] Call Trace: [ 15.683902] <TASK> [ 15.683920] dump_stack_lvl+0x73/0xb0 [ 15.683981] print_report+0xd1/0x650 [ 15.684004] ? __virt_addr_valid+0x1db/0x2d0 [ 15.684027] ? kasan_atomics_helper+0x3df/0x5450 [ 15.684107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.684137] ? kasan_atomics_helper+0x3df/0x5450 [ 15.684199] kasan_report+0x141/0x180 [ 15.684222] ? kasan_atomics_helper+0x3df/0x5450 [ 15.684249] kasan_check_range+0x10c/0x1c0 [ 15.684273] __kasan_check_read+0x15/0x20 [ 15.684292] kasan_atomics_helper+0x3df/0x5450 [ 15.684315] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.684337] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.684361] ? kasan_atomics+0x152/0x310 [ 15.684389] kasan_atomics+0x1dc/0x310 [ 15.684413] ? __pfx_kasan_atomics+0x10/0x10 [ 15.684437] ? __pfx_read_tsc+0x10/0x10 [ 15.684459] ? ktime_get_ts64+0x86/0x230 [ 15.684484] kunit_try_run_case+0x1a5/0x480 [ 15.684509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.684531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.684555] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.684579] ? __kthread_parkme+0x82/0x180 [ 15.684601] ? preempt_count_sub+0x50/0x80 [ 15.684626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.684652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.684676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.684700] kthread+0x337/0x6f0 [ 15.684720] ? trace_preempt_on+0x20/0xc0 [ 15.684743] ? __pfx_kthread+0x10/0x10 [ 15.684764] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.684788] ? calculate_sigpending+0x7b/0xa0 [ 15.684812] ? __pfx_kthread+0x10/0x10 [ 15.684833] ret_from_fork+0x116/0x1d0 [ 15.684852] ? __pfx_kthread+0x10/0x10 [ 15.684873] ret_from_fork_asm+0x1a/0x30 [ 15.684906] </TASK> [ 15.684918] [ 15.694588] Allocated by task 282: [ 15.694810] kasan_save_stack+0x45/0x70 [ 15.694960] kasan_save_track+0x18/0x40 [ 15.695105] kasan_save_alloc_info+0x3b/0x50 [ 15.695357] __kasan_kmalloc+0xb7/0xc0 [ 15.695613] __kmalloc_cache_noprof+0x189/0x420 [ 15.695957] kasan_atomics+0x95/0x310 [ 15.696339] kunit_try_run_case+0x1a5/0x480 [ 15.696557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.696885] kthread+0x337/0x6f0 [ 15.697251] ret_from_fork+0x116/0x1d0 [ 15.697416] ret_from_fork_asm+0x1a/0x30 [ 15.697746] [ 15.697825] The buggy address belongs to the object at ffff88810261fc00 [ 15.697825] which belongs to the cache kmalloc-64 of size 64 [ 15.698372] The buggy address is located 0 bytes to the right of [ 15.698372] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.699256] [ 15.699338] The buggy address belongs to the physical page: [ 15.699614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.699985] flags: 0x200000000000000(node=0|zone=2) [ 15.700339] page_type: f5(slab) [ 15.700502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.700736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.701187] page dumped because: kasan: bad access detected [ 15.701372] [ 15.701442] Memory state around the buggy address: [ 15.701852] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.702227] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.702776] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.703086] ^ [ 15.703264] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.703673] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.704063] ================================================================== [ 16.949728] ================================================================== [ 16.950218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.950606] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.950910] [ 16.951075] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.951126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.951140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.951161] Call Trace: [ 16.951178] <TASK> [ 16.951195] dump_stack_lvl+0x73/0xb0 [ 16.951222] print_report+0xd1/0x650 [ 16.951244] ? __virt_addr_valid+0x1db/0x2d0 [ 16.951268] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.951290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.951316] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.951338] kasan_report+0x141/0x180 [ 16.951360] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.951386] kasan_check_range+0x10c/0x1c0 [ 16.951411] __kasan_check_write+0x18/0x20 [ 16.951430] kasan_atomics_helper+0x1eaa/0x5450 [ 16.951454] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.951476] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.951502] ? kasan_atomics+0x152/0x310 [ 16.951529] kasan_atomics+0x1dc/0x310 [ 16.951553] ? __pfx_kasan_atomics+0x10/0x10 [ 16.951577] ? __pfx_read_tsc+0x10/0x10 [ 16.951599] ? ktime_get_ts64+0x86/0x230 [ 16.951625] kunit_try_run_case+0x1a5/0x480 [ 16.951649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.951672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.951695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.951718] ? __kthread_parkme+0x82/0x180 [ 16.951739] ? preempt_count_sub+0x50/0x80 [ 16.951763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.951787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.951811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.951835] kthread+0x337/0x6f0 [ 16.951855] ? trace_preempt_on+0x20/0xc0 [ 16.951877] ? __pfx_kthread+0x10/0x10 [ 16.951897] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.951919] ? calculate_sigpending+0x7b/0xa0 [ 16.951942] ? __pfx_kthread+0x10/0x10 [ 16.951964] ret_from_fork+0x116/0x1d0 [ 16.951983] ? __pfx_kthread+0x10/0x10 [ 16.952004] ret_from_fork_asm+0x1a/0x30 [ 16.952035] </TASK> [ 16.952055] [ 16.960186] Allocated by task 282: [ 16.960428] kasan_save_stack+0x45/0x70 [ 16.960654] kasan_save_track+0x18/0x40 [ 16.960865] kasan_save_alloc_info+0x3b/0x50 [ 16.961117] __kasan_kmalloc+0xb7/0xc0 [ 16.961309] __kmalloc_cache_noprof+0x189/0x420 [ 16.961528] kasan_atomics+0x95/0x310 [ 16.961733] kunit_try_run_case+0x1a5/0x480 [ 16.961970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.962254] kthread+0x337/0x6f0 [ 16.962443] ret_from_fork+0x116/0x1d0 [ 16.962678] ret_from_fork_asm+0x1a/0x30 [ 16.962878] [ 16.963003] The buggy address belongs to the object at ffff88810261fc00 [ 16.963003] which belongs to the cache kmalloc-64 of size 64 [ 16.963514] The buggy address is located 0 bytes to the right of [ 16.963514] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.963976] [ 16.964063] The buggy address belongs to the physical page: [ 16.964231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.964572] flags: 0x200000000000000(node=0|zone=2) [ 16.964802] page_type: f5(slab) [ 16.964967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.965321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.965621] page dumped because: kasan: bad access detected [ 16.965908] [ 16.966073] Memory state around the buggy address: [ 16.966346] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.966650] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.966861] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.967080] ^ [ 16.967242] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.967644] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.968068] ================================================================== [ 15.775930] ================================================================== [ 15.776579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.777060] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.777491] [ 15.777676] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.777791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.777805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.777841] Call Trace: [ 15.777861] <TASK> [ 15.777880] dump_stack_lvl+0x73/0xb0 [ 15.777909] print_report+0xd1/0x650 [ 15.777933] ? __virt_addr_valid+0x1db/0x2d0 [ 15.777958] ? kasan_atomics_helper+0x565/0x5450 [ 15.778061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.778090] ? kasan_atomics_helper+0x565/0x5450 [ 15.778114] kasan_report+0x141/0x180 [ 15.778137] ? kasan_atomics_helper+0x565/0x5450 [ 15.778164] kasan_check_range+0x10c/0x1c0 [ 15.778188] __kasan_check_write+0x18/0x20 [ 15.778208] kasan_atomics_helper+0x565/0x5450 [ 15.778243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.778267] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.778293] ? kasan_atomics+0x152/0x310 [ 15.778319] kasan_atomics+0x1dc/0x310 [ 15.778342] ? __pfx_kasan_atomics+0x10/0x10 [ 15.778366] ? __pfx_read_tsc+0x10/0x10 [ 15.778387] ? ktime_get_ts64+0x86/0x230 [ 15.778412] kunit_try_run_case+0x1a5/0x480 [ 15.778438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.778461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.778485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.778510] ? __kthread_parkme+0x82/0x180 [ 15.778531] ? preempt_count_sub+0x50/0x80 [ 15.778556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.778581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.778604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.778627] kthread+0x337/0x6f0 [ 15.778648] ? trace_preempt_on+0x20/0xc0 [ 15.778672] ? __pfx_kthread+0x10/0x10 [ 15.778693] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.778717] ? calculate_sigpending+0x7b/0xa0 [ 15.778741] ? __pfx_kthread+0x10/0x10 [ 15.778763] ret_from_fork+0x116/0x1d0 [ 15.778782] ? __pfx_kthread+0x10/0x10 [ 15.778803] ret_from_fork_asm+0x1a/0x30 [ 15.778835] </TASK> [ 15.778847] [ 15.788489] Allocated by task 282: [ 15.788735] kasan_save_stack+0x45/0x70 [ 15.788901] kasan_save_track+0x18/0x40 [ 15.789037] kasan_save_alloc_info+0x3b/0x50 [ 15.789199] __kasan_kmalloc+0xb7/0xc0 [ 15.789668] __kmalloc_cache_noprof+0x189/0x420 [ 15.790200] kasan_atomics+0x95/0x310 [ 15.790471] kunit_try_run_case+0x1a5/0x480 [ 15.790700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.790933] kthread+0x337/0x6f0 [ 15.791106] ret_from_fork+0x116/0x1d0 [ 15.791611] ret_from_fork_asm+0x1a/0x30 [ 15.791845] [ 15.791919] The buggy address belongs to the object at ffff88810261fc00 [ 15.791919] which belongs to the cache kmalloc-64 of size 64 [ 15.792379] The buggy address is located 0 bytes to the right of [ 15.792379] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.793396] [ 15.793672] The buggy address belongs to the physical page: [ 15.793862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.794341] flags: 0x200000000000000(node=0|zone=2) [ 15.794706] page_type: f5(slab) [ 15.795181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.795656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.795957] page dumped because: kasan: bad access detected [ 15.796488] [ 15.796597] Memory state around the buggy address: [ 15.796852] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.797307] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.797774] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.798210] ^ [ 15.798506] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.798990] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.799436] ================================================================== [ 15.879451] ================================================================== [ 15.880253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.880786] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.881395] [ 15.881633] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.881785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.881804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.881829] Call Trace: [ 15.881849] <TASK> [ 15.881868] dump_stack_lvl+0x73/0xb0 [ 15.881898] print_report+0xd1/0x650 [ 15.881921] ? __virt_addr_valid+0x1db/0x2d0 [ 15.881944] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.881966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.881993] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.882015] kasan_report+0x141/0x180 [ 15.882037] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.882170] kasan_check_range+0x10c/0x1c0 [ 15.882198] __kasan_check_write+0x18/0x20 [ 15.882218] kasan_atomics_helper+0x7c7/0x5450 [ 15.882242] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.882265] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.882290] ? kasan_atomics+0x152/0x310 [ 15.882318] kasan_atomics+0x1dc/0x310 [ 15.882340] ? __pfx_kasan_atomics+0x10/0x10 [ 15.882365] ? __pfx_read_tsc+0x10/0x10 [ 15.882387] ? ktime_get_ts64+0x86/0x230 [ 15.882412] kunit_try_run_case+0x1a5/0x480 [ 15.882438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882460] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.882484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.882509] ? __kthread_parkme+0x82/0x180 [ 15.882530] ? preempt_count_sub+0x50/0x80 [ 15.882554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.882603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.882627] kthread+0x337/0x6f0 [ 15.882646] ? trace_preempt_on+0x20/0xc0 [ 15.882671] ? __pfx_kthread+0x10/0x10 [ 15.882692] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.882714] ? calculate_sigpending+0x7b/0xa0 [ 15.882737] ? __pfx_kthread+0x10/0x10 [ 15.882760] ret_from_fork+0x116/0x1d0 [ 15.882778] ? __pfx_kthread+0x10/0x10 [ 15.882801] ret_from_fork_asm+0x1a/0x30 [ 15.882833] </TASK> [ 15.882846] [ 15.895714] Allocated by task 282: [ 15.895895] kasan_save_stack+0x45/0x70 [ 15.896340] kasan_save_track+0x18/0x40 [ 15.896671] kasan_save_alloc_info+0x3b/0x50 [ 15.897003] __kasan_kmalloc+0xb7/0xc0 [ 15.897431] __kmalloc_cache_noprof+0x189/0x420 [ 15.897760] kasan_atomics+0x95/0x310 [ 15.897937] kunit_try_run_case+0x1a5/0x480 [ 15.898587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.898830] kthread+0x337/0x6f0 [ 15.899231] ret_from_fork+0x116/0x1d0 [ 15.899430] ret_from_fork_asm+0x1a/0x30 [ 15.899579] [ 15.899679] The buggy address belongs to the object at ffff88810261fc00 [ 15.899679] which belongs to the cache kmalloc-64 of size 64 [ 15.900659] The buggy address is located 0 bytes to the right of [ 15.900659] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.901421] [ 15.901835] The buggy address belongs to the physical page: [ 15.902098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.902725] flags: 0x200000000000000(node=0|zone=2) [ 15.903091] page_type: f5(slab) [ 15.903498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.903972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.904451] page dumped because: kasan: bad access detected [ 15.904901] [ 15.904999] Memory state around the buggy address: [ 15.905476] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.906005] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.906641] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.907104] ^ [ 15.907546] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.907857] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.908465] ================================================================== [ 16.025912] ================================================================== [ 16.026767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 16.027290] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.027539] [ 16.027873] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.028004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.028021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.028054] Call Trace: [ 16.028080] <TASK> [ 16.028097] dump_stack_lvl+0x73/0xb0 [ 16.028126] print_report+0xd1/0x650 [ 16.028149] ? __virt_addr_valid+0x1db/0x2d0 [ 16.028172] ? kasan_atomics_helper+0xac7/0x5450 [ 16.028193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.028219] ? kasan_atomics_helper+0xac7/0x5450 [ 16.028241] kasan_report+0x141/0x180 [ 16.028264] ? kasan_atomics_helper+0xac7/0x5450 [ 16.028290] kasan_check_range+0x10c/0x1c0 [ 16.028315] __kasan_check_write+0x18/0x20 [ 16.028335] kasan_atomics_helper+0xac7/0x5450 [ 16.028357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.028380] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.028405] ? kasan_atomics+0x152/0x310 [ 16.028432] kasan_atomics+0x1dc/0x310 [ 16.028455] ? __pfx_kasan_atomics+0x10/0x10 [ 16.028480] ? __pfx_read_tsc+0x10/0x10 [ 16.028501] ? ktime_get_ts64+0x86/0x230 [ 16.028577] kunit_try_run_case+0x1a5/0x480 [ 16.028602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.028625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.028648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.028671] ? __kthread_parkme+0x82/0x180 [ 16.028693] ? preempt_count_sub+0x50/0x80 [ 16.028717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.028742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.028765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.028788] kthread+0x337/0x6f0 [ 16.028809] ? trace_preempt_on+0x20/0xc0 [ 16.028832] ? __pfx_kthread+0x10/0x10 [ 16.028853] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.028875] ? calculate_sigpending+0x7b/0xa0 [ 16.028900] ? __pfx_kthread+0x10/0x10 [ 16.028922] ret_from_fork+0x116/0x1d0 [ 16.028941] ? __pfx_kthread+0x10/0x10 [ 16.028961] ret_from_fork_asm+0x1a/0x30 [ 16.028993] </TASK> [ 16.029005] [ 16.041098] Allocated by task 282: [ 16.041269] kasan_save_stack+0x45/0x70 [ 16.041716] kasan_save_track+0x18/0x40 [ 16.041906] kasan_save_alloc_info+0x3b/0x50 [ 16.042114] __kasan_kmalloc+0xb7/0xc0 [ 16.042289] __kmalloc_cache_noprof+0x189/0x420 [ 16.042493] kasan_atomics+0x95/0x310 [ 16.043176] kunit_try_run_case+0x1a5/0x480 [ 16.043342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.043870] kthread+0x337/0x6f0 [ 16.044136] ret_from_fork+0x116/0x1d0 [ 16.044380] ret_from_fork_asm+0x1a/0x30 [ 16.044757] [ 16.044864] The buggy address belongs to the object at ffff88810261fc00 [ 16.044864] which belongs to the cache kmalloc-64 of size 64 [ 16.045543] The buggy address is located 0 bytes to the right of [ 16.045543] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.046406] [ 16.046493] The buggy address belongs to the physical page: [ 16.047183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.047635] flags: 0x200000000000000(node=0|zone=2) [ 16.047953] page_type: f5(slab) [ 16.048093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.048703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.049029] page dumped because: kasan: bad access detected [ 16.049490] [ 16.049617] Memory state around the buggy address: [ 16.050149] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.050607] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.051022] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.051691] ^ [ 16.052006] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.052431] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.052888] ================================================================== [ 15.627844] ================================================================== [ 15.629075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.629932] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.630656] [ 15.630754] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.630801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.630813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.630834] Call Trace: [ 15.630853] <TASK> [ 15.630873] dump_stack_lvl+0x73/0xb0 [ 15.630901] print_report+0xd1/0x650 [ 15.630923] ? __virt_addr_valid+0x1db/0x2d0 [ 15.630946] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.630966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.630991] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.631011] kasan_report+0x141/0x180 [ 15.631032] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.631072] __asan_report_load4_noabort+0x18/0x20 [ 15.631097] kasan_atomics_helper+0x4b88/0x5450 [ 15.631118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.631139] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.631164] ? kasan_atomics+0x152/0x310 [ 15.631189] kasan_atomics+0x1dc/0x310 [ 15.631210] ? __pfx_kasan_atomics+0x10/0x10 [ 15.631233] ? __pfx_read_tsc+0x10/0x10 [ 15.631253] ? ktime_get_ts64+0x86/0x230 [ 15.631278] kunit_try_run_case+0x1a5/0x480 [ 15.631303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.631324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.631348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.631370] ? __kthread_parkme+0x82/0x180 [ 15.631390] ? preempt_count_sub+0x50/0x80 [ 15.631413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.631436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.631459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.631481] kthread+0x337/0x6f0 [ 15.631500] ? trace_preempt_on+0x20/0xc0 [ 15.631522] ? __pfx_kthread+0x10/0x10 [ 15.631541] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.631562] ? calculate_sigpending+0x7b/0xa0 [ 15.631585] ? __pfx_kthread+0x10/0x10 [ 15.631606] ret_from_fork+0x116/0x1d0 [ 15.631623] ? __pfx_kthread+0x10/0x10 [ 15.631643] ret_from_fork_asm+0x1a/0x30 [ 15.631674] </TASK> [ 15.631685] [ 15.647851] Allocated by task 282: [ 15.648353] kasan_save_stack+0x45/0x70 [ 15.648770] kasan_save_track+0x18/0x40 [ 15.649236] kasan_save_alloc_info+0x3b/0x50 [ 15.649395] __kasan_kmalloc+0xb7/0xc0 [ 15.649579] __kmalloc_cache_noprof+0x189/0x420 [ 15.650031] kasan_atomics+0x95/0x310 [ 15.650524] kunit_try_run_case+0x1a5/0x480 [ 15.650927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.651426] kthread+0x337/0x6f0 [ 15.651835] ret_from_fork+0x116/0x1d0 [ 15.652184] ret_from_fork_asm+0x1a/0x30 [ 15.652556] [ 15.652636] The buggy address belongs to the object at ffff88810261fc00 [ 15.652636] which belongs to the cache kmalloc-64 of size 64 [ 15.652993] The buggy address is located 0 bytes to the right of [ 15.652993] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.653871] [ 15.653985] The buggy address belongs to the physical page: [ 15.654539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.654947] flags: 0x200000000000000(node=0|zone=2) [ 15.655293] page_type: f5(slab) [ 15.655472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.655940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.656326] page dumped because: kasan: bad access detected [ 15.656668] [ 15.656774] Memory state around the buggy address: [ 15.656986] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.657658] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.657959] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.658364] ^ [ 15.658772] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659095] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659554] ================================================================== [ 17.045861] ================================================================== [ 17.046324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 17.046550] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.046764] [ 17.046844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.046885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.046897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.046920] Call Trace: [ 17.046933] <TASK> [ 17.046949] dump_stack_lvl+0x73/0xb0 [ 17.046973] print_report+0xd1/0x650 [ 17.046995] ? __virt_addr_valid+0x1db/0x2d0 [ 17.047016] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.047037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.047074] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.047113] kasan_report+0x141/0x180 [ 17.047135] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.047200] kasan_check_range+0x10c/0x1c0 [ 17.047250] __kasan_check_write+0x18/0x20 [ 17.047270] kasan_atomics_helper+0x20c8/0x5450 [ 17.047292] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.047315] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.047340] ? kasan_atomics+0x152/0x310 [ 17.047366] kasan_atomics+0x1dc/0x310 [ 17.047389] ? __pfx_kasan_atomics+0x10/0x10 [ 17.047414] ? __pfx_read_tsc+0x10/0x10 [ 17.047435] ? ktime_get_ts64+0x86/0x230 [ 17.047458] kunit_try_run_case+0x1a5/0x480 [ 17.047483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.047516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.047539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.047593] ? __kthread_parkme+0x82/0x180 [ 17.047614] ? preempt_count_sub+0x50/0x80 [ 17.047639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.047664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.047687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.047740] kthread+0x337/0x6f0 [ 17.047761] ? trace_preempt_on+0x20/0xc0 [ 17.047783] ? __pfx_kthread+0x10/0x10 [ 17.047807] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.047829] ? calculate_sigpending+0x7b/0xa0 [ 17.047883] ? __pfx_kthread+0x10/0x10 [ 17.047905] ret_from_fork+0x116/0x1d0 [ 17.047924] ? __pfx_kthread+0x10/0x10 [ 17.047945] ret_from_fork_asm+0x1a/0x30 [ 17.047979] </TASK> [ 17.048022] [ 17.056275] Allocated by task 282: [ 17.056467] kasan_save_stack+0x45/0x70 [ 17.056696] kasan_save_track+0x18/0x40 [ 17.056891] kasan_save_alloc_info+0x3b/0x50 [ 17.057072] __kasan_kmalloc+0xb7/0xc0 [ 17.057304] __kmalloc_cache_noprof+0x189/0x420 [ 17.057580] kasan_atomics+0x95/0x310 [ 17.057776] kunit_try_run_case+0x1a5/0x480 [ 17.057918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.058097] kthread+0x337/0x6f0 [ 17.058215] ret_from_fork+0x116/0x1d0 [ 17.058390] ret_from_fork_asm+0x1a/0x30 [ 17.058583] [ 17.058676] The buggy address belongs to the object at ffff88810261fc00 [ 17.058676] which belongs to the cache kmalloc-64 of size 64 [ 17.059232] The buggy address is located 0 bytes to the right of [ 17.059232] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.059768] [ 17.059863] The buggy address belongs to the physical page: [ 17.060106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.060522] flags: 0x200000000000000(node=0|zone=2) [ 17.060753] page_type: f5(slab) [ 17.060871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.061107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.061326] page dumped because: kasan: bad access detected [ 17.061518] [ 17.061621] Memory state around the buggy address: [ 17.061886] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.062226] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.062640] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.062985] ^ [ 17.063226] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.063582] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.063905] ================================================================== [ 16.921016] ================================================================== [ 16.921803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.922489] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.922884] [ 16.922974] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.923018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.923031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.923067] Call Trace: [ 16.923082] <TASK> [ 16.923099] dump_stack_lvl+0x73/0xb0 [ 16.923128] print_report+0xd1/0x650 [ 16.923150] ? __virt_addr_valid+0x1db/0x2d0 [ 16.923173] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.923194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.923220] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.923242] kasan_report+0x141/0x180 [ 16.923266] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.923294] kasan_check_range+0x10c/0x1c0 [ 16.923318] __kasan_check_write+0x18/0x20 [ 16.923337] kasan_atomics_helper+0x1e12/0x5450 [ 16.923360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.923383] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.923409] ? kasan_atomics+0x152/0x310 [ 16.923436] kasan_atomics+0x1dc/0x310 [ 16.923459] ? __pfx_kasan_atomics+0x10/0x10 [ 16.923485] ? __pfx_read_tsc+0x10/0x10 [ 16.923535] ? ktime_get_ts64+0x86/0x230 [ 16.923559] kunit_try_run_case+0x1a5/0x480 [ 16.923624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.923649] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.923672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.923696] ? __kthread_parkme+0x82/0x180 [ 16.923717] ? preempt_count_sub+0x50/0x80 [ 16.923768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.923793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.923816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.923840] kthread+0x337/0x6f0 [ 16.923859] ? trace_preempt_on+0x20/0xc0 [ 16.923883] ? __pfx_kthread+0x10/0x10 [ 16.923903] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.923925] ? calculate_sigpending+0x7b/0xa0 [ 16.923948] ? __pfx_kthread+0x10/0x10 [ 16.923971] ret_from_fork+0x116/0x1d0 [ 16.923990] ? __pfx_kthread+0x10/0x10 [ 16.924011] ret_from_fork_asm+0x1a/0x30 [ 16.924051] </TASK> [ 16.924064] [ 16.937125] Allocated by task 282: [ 16.937526] kasan_save_stack+0x45/0x70 [ 16.937909] kasan_save_track+0x18/0x40 [ 16.938292] kasan_save_alloc_info+0x3b/0x50 [ 16.938715] __kasan_kmalloc+0xb7/0xc0 [ 16.939093] __kmalloc_cache_noprof+0x189/0x420 [ 16.939404] kasan_atomics+0x95/0x310 [ 16.939710] kunit_try_run_case+0x1a5/0x480 [ 16.940118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.940524] kthread+0x337/0x6f0 [ 16.940828] ret_from_fork+0x116/0x1d0 [ 16.940963] ret_from_fork_asm+0x1a/0x30 [ 16.941113] [ 16.941186] The buggy address belongs to the object at ffff88810261fc00 [ 16.941186] which belongs to the cache kmalloc-64 of size 64 [ 16.941690] The buggy address is located 0 bytes to the right of [ 16.941690] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.942824] [ 16.943020] The buggy address belongs to the physical page: [ 16.943559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.944254] flags: 0x200000000000000(node=0|zone=2) [ 16.944732] page_type: f5(slab) [ 16.944974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.945267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.945547] page dumped because: kasan: bad access detected [ 16.946099] [ 16.946292] Memory state around the buggy address: [ 16.946755] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.947389] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.947822] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.948052] ^ [ 16.948222] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.948600] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.948874] ================================================================== [ 16.403968] ================================================================== [ 16.404406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 16.404663] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.404990] [ 16.405111] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.405156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.405169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.405191] Call Trace: [ 16.405207] <TASK> [ 16.405224] dump_stack_lvl+0x73/0xb0 [ 16.405253] print_report+0xd1/0x650 [ 16.405276] ? __virt_addr_valid+0x1db/0x2d0 [ 16.405299] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.405320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.405346] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.405368] kasan_report+0x141/0x180 [ 16.405391] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.405417] __asan_report_load4_noabort+0x18/0x20 [ 16.405441] kasan_atomics_helper+0x49e8/0x5450 [ 16.405464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.405486] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.406259] ? kasan_atomics+0x152/0x310 [ 16.406297] kasan_atomics+0x1dc/0x310 [ 16.406321] ? __pfx_kasan_atomics+0x10/0x10 [ 16.406347] ? __pfx_read_tsc+0x10/0x10 [ 16.406369] ? ktime_get_ts64+0x86/0x230 [ 16.406394] kunit_try_run_case+0x1a5/0x480 [ 16.406418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.406441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.406464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.406488] ? __kthread_parkme+0x82/0x180 [ 16.406509] ? preempt_count_sub+0x50/0x80 [ 16.406533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.406557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.406580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.406604] kthread+0x337/0x6f0 [ 16.406623] ? trace_preempt_on+0x20/0xc0 [ 16.406648] ? __pfx_kthread+0x10/0x10 [ 16.406669] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.406691] ? calculate_sigpending+0x7b/0xa0 [ 16.406714] ? __pfx_kthread+0x10/0x10 [ 16.406736] ret_from_fork+0x116/0x1d0 [ 16.406755] ? __pfx_kthread+0x10/0x10 [ 16.406775] ret_from_fork_asm+0x1a/0x30 [ 16.406806] </TASK> [ 16.406819] [ 16.418015] Allocated by task 282: [ 16.418240] kasan_save_stack+0x45/0x70 [ 16.418750] kasan_save_track+0x18/0x40 [ 16.418955] kasan_save_alloc_info+0x3b/0x50 [ 16.419400] __kasan_kmalloc+0xb7/0xc0 [ 16.419654] __kmalloc_cache_noprof+0x189/0x420 [ 16.419938] kasan_atomics+0x95/0x310 [ 16.420360] kunit_try_run_case+0x1a5/0x480 [ 16.420609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.421030] kthread+0x337/0x6f0 [ 16.421213] ret_from_fork+0x116/0x1d0 [ 16.421590] ret_from_fork_asm+0x1a/0x30 [ 16.421797] [ 16.421878] The buggy address belongs to the object at ffff88810261fc00 [ 16.421878] which belongs to the cache kmalloc-64 of size 64 [ 16.422725] The buggy address is located 0 bytes to the right of [ 16.422725] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.423427] [ 16.423616] The buggy address belongs to the physical page: [ 16.423986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.424557] flags: 0x200000000000000(node=0|zone=2) [ 16.424832] page_type: f5(slab) [ 16.424987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.425857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.426442] page dumped because: kasan: bad access detected [ 16.426782] [ 16.426883] Memory state around the buggy address: [ 16.427250] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.427567] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.427854] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.428411] ^ [ 16.428614] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.429324] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.429615] ================================================================== [ 16.577969] ================================================================== [ 16.578434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 16.578868] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.579198] [ 16.579292] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.579333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.579346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.579367] Call Trace: [ 16.579382] <TASK> [ 16.579397] dump_stack_lvl+0x73/0xb0 [ 16.579424] print_report+0xd1/0x650 [ 16.579446] ? __virt_addr_valid+0x1db/0x2d0 [ 16.579469] ? kasan_atomics_helper+0x151d/0x5450 [ 16.579490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.579516] ? kasan_atomics_helper+0x151d/0x5450 [ 16.579540] kasan_report+0x141/0x180 [ 16.579562] ? kasan_atomics_helper+0x151d/0x5450 [ 16.579589] kasan_check_range+0x10c/0x1c0 [ 16.579613] __kasan_check_write+0x18/0x20 [ 16.579633] kasan_atomics_helper+0x151d/0x5450 [ 16.579658] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.579681] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.579706] ? kasan_atomics+0x152/0x310 [ 16.579733] kasan_atomics+0x1dc/0x310 [ 16.579755] ? __pfx_kasan_atomics+0x10/0x10 [ 16.579780] ? __pfx_read_tsc+0x10/0x10 [ 16.579801] ? ktime_get_ts64+0x86/0x230 [ 16.579825] kunit_try_run_case+0x1a5/0x480 [ 16.579849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.579872] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.579895] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.579919] ? __kthread_parkme+0x82/0x180 [ 16.579939] ? preempt_count_sub+0x50/0x80 [ 16.579964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.579989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.580012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.580036] kthread+0x337/0x6f0 [ 16.580067] ? trace_preempt_on+0x20/0xc0 [ 16.580090] ? __pfx_kthread+0x10/0x10 [ 16.580111] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.580133] ? calculate_sigpending+0x7b/0xa0 [ 16.580156] ? __pfx_kthread+0x10/0x10 [ 16.580180] ret_from_fork+0x116/0x1d0 [ 16.580199] ? __pfx_kthread+0x10/0x10 [ 16.580220] ret_from_fork_asm+0x1a/0x30 [ 16.580251] </TASK> [ 16.580263] [ 16.587728] Allocated by task 282: [ 16.587903] kasan_save_stack+0x45/0x70 [ 16.588062] kasan_save_track+0x18/0x40 [ 16.588219] kasan_save_alloc_info+0x3b/0x50 [ 16.588433] __kasan_kmalloc+0xb7/0xc0 [ 16.588621] __kmalloc_cache_noprof+0x189/0x420 [ 16.588971] kasan_atomics+0x95/0x310 [ 16.589117] kunit_try_run_case+0x1a5/0x480 [ 16.589266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.589442] kthread+0x337/0x6f0 [ 16.589572] ret_from_fork+0x116/0x1d0 [ 16.589705] ret_from_fork_asm+0x1a/0x30 [ 16.589844] [ 16.589916] The buggy address belongs to the object at ffff88810261fc00 [ 16.589916] which belongs to the cache kmalloc-64 of size 64 [ 16.590523] The buggy address is located 0 bytes to the right of [ 16.590523] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.591087] [ 16.591184] The buggy address belongs to the physical page: [ 16.591423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.591665] flags: 0x200000000000000(node=0|zone=2) [ 16.591833] page_type: f5(slab) [ 16.591954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.592199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.592602] page dumped because: kasan: bad access detected [ 16.592856] [ 16.592952] Memory state around the buggy address: [ 16.593190] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.593529] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.593861] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.594201] ^ [ 16.594436] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.595096] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.595374] ================================================================== [ 16.430237] ================================================================== [ 16.430519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 16.431644] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.431978] [ 16.432196] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.432372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.432387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.432411] Call Trace: [ 16.432427] <TASK> [ 16.432443] dump_stack_lvl+0x73/0xb0 [ 16.432472] print_report+0xd1/0x650 [ 16.432495] ? __virt_addr_valid+0x1db/0x2d0 [ 16.432526] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.432549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.432575] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.432597] kasan_report+0x141/0x180 [ 16.432619] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.432646] kasan_check_range+0x10c/0x1c0 [ 16.432670] __kasan_check_write+0x18/0x20 [ 16.432689] kasan_atomics_helper+0x12e6/0x5450 [ 16.432712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.432734] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.432758] ? kasan_atomics+0x152/0x310 [ 16.432785] kasan_atomics+0x1dc/0x310 [ 16.432808] ? __pfx_kasan_atomics+0x10/0x10 [ 16.432833] ? __pfx_read_tsc+0x10/0x10 [ 16.432854] ? ktime_get_ts64+0x86/0x230 [ 16.432877] kunit_try_run_case+0x1a5/0x480 [ 16.432902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.432924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.432947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.432970] ? __kthread_parkme+0x82/0x180 [ 16.432990] ? preempt_count_sub+0x50/0x80 [ 16.433013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.433053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.433088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.433112] kthread+0x337/0x6f0 [ 16.433131] ? trace_preempt_on+0x20/0xc0 [ 16.433154] ? __pfx_kthread+0x10/0x10 [ 16.433175] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.433196] ? calculate_sigpending+0x7b/0xa0 [ 16.433220] ? __pfx_kthread+0x10/0x10 [ 16.433242] ret_from_fork+0x116/0x1d0 [ 16.433261] ? __pfx_kthread+0x10/0x10 [ 16.433282] ret_from_fork_asm+0x1a/0x30 [ 16.433314] </TASK> [ 16.433325] [ 16.444694] Allocated by task 282: [ 16.444963] kasan_save_stack+0x45/0x70 [ 16.445439] kasan_save_track+0x18/0x40 [ 16.445658] kasan_save_alloc_info+0x3b/0x50 [ 16.445950] __kasan_kmalloc+0xb7/0xc0 [ 16.446381] __kmalloc_cache_noprof+0x189/0x420 [ 16.446649] kasan_atomics+0x95/0x310 [ 16.446905] kunit_try_run_case+0x1a5/0x480 [ 16.447087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.447488] kthread+0x337/0x6f0 [ 16.447666] ret_from_fork+0x116/0x1d0 [ 16.447954] ret_from_fork_asm+0x1a/0x30 [ 16.448175] [ 16.448337] The buggy address belongs to the object at ffff88810261fc00 [ 16.448337] which belongs to the cache kmalloc-64 of size 64 [ 16.449056] The buggy address is located 0 bytes to the right of [ 16.449056] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.449975] [ 16.450098] The buggy address belongs to the physical page: [ 16.450749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.451157] flags: 0x200000000000000(node=0|zone=2) [ 16.451469] page_type: f5(slab) [ 16.451701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.452017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.452555] page dumped because: kasan: bad access detected [ 16.452813] [ 16.452902] Memory state around the buggy address: [ 16.453350] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.453799] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.454264] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.454578] ^ [ 16.454787] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.455094] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.455765] ================================================================== [ 16.299987] ================================================================== [ 16.300587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 16.300878] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.301115] [ 16.301203] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.301247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.301261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.301283] Call Trace: [ 16.301301] <TASK> [ 16.301319] dump_stack_lvl+0x73/0xb0 [ 16.301345] print_report+0xd1/0x650 [ 16.301369] ? __virt_addr_valid+0x1db/0x2d0 [ 16.301391] ? kasan_atomics_helper+0x1079/0x5450 [ 16.301412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.301439] ? kasan_atomics_helper+0x1079/0x5450 [ 16.301461] kasan_report+0x141/0x180 [ 16.301483] ? kasan_atomics_helper+0x1079/0x5450 [ 16.301510] kasan_check_range+0x10c/0x1c0 [ 16.301535] __kasan_check_write+0x18/0x20 [ 16.301559] kasan_atomics_helper+0x1079/0x5450 [ 16.301583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.301605] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.301631] ? kasan_atomics+0x152/0x310 [ 16.301657] kasan_atomics+0x1dc/0x310 [ 16.301681] ? __pfx_kasan_atomics+0x10/0x10 [ 16.301705] ? __pfx_read_tsc+0x10/0x10 [ 16.301727] ? ktime_get_ts64+0x86/0x230 [ 16.301751] kunit_try_run_case+0x1a5/0x480 [ 16.301777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.301800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.301868] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.301895] ? __kthread_parkme+0x82/0x180 [ 16.301916] ? preempt_count_sub+0x50/0x80 [ 16.301941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.301966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.301990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.302014] kthread+0x337/0x6f0 [ 16.302034] ? trace_preempt_on+0x20/0xc0 [ 16.302099] ? __pfx_kthread+0x10/0x10 [ 16.302122] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.302144] ? calculate_sigpending+0x7b/0xa0 [ 16.302168] ? __pfx_kthread+0x10/0x10 [ 16.302191] ret_from_fork+0x116/0x1d0 [ 16.302210] ? __pfx_kthread+0x10/0x10 [ 16.302230] ret_from_fork_asm+0x1a/0x30 [ 16.302263] </TASK> [ 16.302276] [ 16.310367] Allocated by task 282: [ 16.310692] kasan_save_stack+0x45/0x70 [ 16.310897] kasan_save_track+0x18/0x40 [ 16.311191] kasan_save_alloc_info+0x3b/0x50 [ 16.311410] __kasan_kmalloc+0xb7/0xc0 [ 16.311710] __kmalloc_cache_noprof+0x189/0x420 [ 16.311929] kasan_atomics+0x95/0x310 [ 16.312264] kunit_try_run_case+0x1a5/0x480 [ 16.313195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.313467] kthread+0x337/0x6f0 [ 16.313693] ret_from_fork+0x116/0x1d0 [ 16.314129] ret_from_fork_asm+0x1a/0x30 [ 16.314353] [ 16.314455] The buggy address belongs to the object at ffff88810261fc00 [ 16.314455] which belongs to the cache kmalloc-64 of size 64 [ 16.315708] The buggy address is located 0 bytes to the right of [ 16.315708] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.316747] [ 16.316851] The buggy address belongs to the physical page: [ 16.317463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.318033] flags: 0x200000000000000(node=0|zone=2) [ 16.318522] page_type: f5(slab) [ 16.318696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.319013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.319712] page dumped because: kasan: bad access detected [ 16.320171] [ 16.320273] Memory state around the buggy address: [ 16.320484] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.321205] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.321520] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.321818] ^ [ 16.322027] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322262] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322563] ================================================================== [ 16.481828] ================================================================== [ 16.482140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 16.482991] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.483248] [ 16.483340] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.483384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.483399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.483422] Call Trace: [ 16.483440] <TASK> [ 16.483457] dump_stack_lvl+0x73/0xb0 [ 16.483485] print_report+0xd1/0x650 [ 16.483507] ? __virt_addr_valid+0x1db/0x2d0 [ 16.483531] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.483552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.483579] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.483601] kasan_report+0x141/0x180 [ 16.483624] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.483651] kasan_check_range+0x10c/0x1c0 [ 16.483674] __kasan_check_read+0x15/0x20 [ 16.483694] kasan_atomics_helper+0x13b5/0x5450 [ 16.483718] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.483739] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.483765] ? kasan_atomics+0x152/0x310 [ 16.483792] kasan_atomics+0x1dc/0x310 [ 16.483814] ? __pfx_kasan_atomics+0x10/0x10 [ 16.483839] ? __pfx_read_tsc+0x10/0x10 [ 16.483860] ? ktime_get_ts64+0x86/0x230 [ 16.483885] kunit_try_run_case+0x1a5/0x480 [ 16.483909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.483932] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.483955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.483979] ? __kthread_parkme+0x82/0x180 [ 16.484000] ? preempt_count_sub+0x50/0x80 [ 16.484024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.484059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.484083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.484106] kthread+0x337/0x6f0 [ 16.484126] ? trace_preempt_on+0x20/0xc0 [ 16.484148] ? __pfx_kthread+0x10/0x10 [ 16.484170] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.484191] ? calculate_sigpending+0x7b/0xa0 [ 16.484215] ? __pfx_kthread+0x10/0x10 [ 16.484236] ret_from_fork+0x116/0x1d0 [ 16.484256] ? __pfx_kthread+0x10/0x10 [ 16.484278] ret_from_fork_asm+0x1a/0x30 [ 16.484310] </TASK> [ 16.484322] [ 16.495634] Allocated by task 282: [ 16.495997] kasan_save_stack+0x45/0x70 [ 16.496261] kasan_save_track+0x18/0x40 [ 16.496458] kasan_save_alloc_info+0x3b/0x50 [ 16.496813] __kasan_kmalloc+0xb7/0xc0 [ 16.496999] __kmalloc_cache_noprof+0x189/0x420 [ 16.497644] kasan_atomics+0x95/0x310 [ 16.497843] kunit_try_run_case+0x1a5/0x480 [ 16.498057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.498239] kthread+0x337/0x6f0 [ 16.498415] ret_from_fork+0x116/0x1d0 [ 16.498611] ret_from_fork_asm+0x1a/0x30 [ 16.498799] [ 16.498887] The buggy address belongs to the object at ffff88810261fc00 [ 16.498887] which belongs to the cache kmalloc-64 of size 64 [ 16.499827] The buggy address is located 0 bytes to the right of [ 16.499827] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.500721] [ 16.500805] The buggy address belongs to the physical page: [ 16.501198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.501505] flags: 0x200000000000000(node=0|zone=2) [ 16.501971] page_type: f5(slab) [ 16.502221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.502471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.503097] page dumped because: kasan: bad access detected [ 16.503356] [ 16.503443] Memory state around the buggy address: [ 16.503887] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.504271] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.504624] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.505035] ^ [ 16.505452] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.506005] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.506531] ================================================================== [ 15.727382] ================================================================== [ 15.727712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.728603] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.729022] [ 15.729226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.729276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.729291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.729314] Call Trace: [ 15.729332] <TASK> [ 15.729417] dump_stack_lvl+0x73/0xb0 [ 15.729532] print_report+0xd1/0x650 [ 15.729565] ? __virt_addr_valid+0x1db/0x2d0 [ 15.729607] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.729628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.729655] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.729678] kasan_report+0x141/0x180 [ 15.729700] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.729727] kasan_check_range+0x10c/0x1c0 [ 15.729754] __kasan_check_write+0x18/0x20 [ 15.729773] kasan_atomics_helper+0x4a0/0x5450 [ 15.729796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.729820] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.729845] ? kasan_atomics+0x152/0x310 [ 15.729871] kasan_atomics+0x1dc/0x310 [ 15.729895] ? __pfx_kasan_atomics+0x10/0x10 [ 15.729920] ? __pfx_read_tsc+0x10/0x10 [ 15.729943] ? ktime_get_ts64+0x86/0x230 [ 15.729968] kunit_try_run_case+0x1a5/0x480 [ 15.729992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.730015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.730050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.730073] ? __kthread_parkme+0x82/0x180 [ 15.730095] ? preempt_count_sub+0x50/0x80 [ 15.730119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.730143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.730167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.730190] kthread+0x337/0x6f0 [ 15.730210] ? trace_preempt_on+0x20/0xc0 [ 15.730234] ? __pfx_kthread+0x10/0x10 [ 15.730254] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.730275] ? calculate_sigpending+0x7b/0xa0 [ 15.730300] ? __pfx_kthread+0x10/0x10 [ 15.730323] ret_from_fork+0x116/0x1d0 [ 15.730342] ? __pfx_kthread+0x10/0x10 [ 15.730363] ret_from_fork_asm+0x1a/0x30 [ 15.730395] </TASK> [ 15.730408] [ 15.740873] Allocated by task 282: [ 15.741156] kasan_save_stack+0x45/0x70 [ 15.741376] kasan_save_track+0x18/0x40 [ 15.741537] kasan_save_alloc_info+0x3b/0x50 [ 15.741757] __kasan_kmalloc+0xb7/0xc0 [ 15.742000] __kmalloc_cache_noprof+0x189/0x420 [ 15.742340] kasan_atomics+0x95/0x310 [ 15.742600] kunit_try_run_case+0x1a5/0x480 [ 15.742833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743063] kthread+0x337/0x6f0 [ 15.743508] ret_from_fork+0x116/0x1d0 [ 15.743684] ret_from_fork_asm+0x1a/0x30 [ 15.743937] [ 15.744034] The buggy address belongs to the object at ffff88810261fc00 [ 15.744034] which belongs to the cache kmalloc-64 of size 64 [ 15.744842] The buggy address is located 0 bytes to the right of [ 15.744842] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.745621] [ 15.745727] The buggy address belongs to the physical page: [ 15.746074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.746629] flags: 0x200000000000000(node=0|zone=2) [ 15.746837] page_type: f5(slab) [ 15.746989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.747524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.747924] page dumped because: kasan: bad access detected [ 15.748384] [ 15.748476] Memory state around the buggy address: [ 15.748886] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.749206] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.749685] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.750003] ^ [ 15.750238] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.750851] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.751268] ================================================================== [ 16.109975] ================================================================== [ 16.110256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 16.111006] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.111403] [ 16.111766] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.111816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.111830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.111852] Call Trace: [ 16.111872] <TASK> [ 16.111889] dump_stack_lvl+0x73/0xb0 [ 16.111919] print_report+0xd1/0x650 [ 16.111941] ? __virt_addr_valid+0x1db/0x2d0 [ 16.111963] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.111984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.112010] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.112032] kasan_report+0x141/0x180 [ 16.112068] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.112095] __asan_report_load4_noabort+0x18/0x20 [ 16.112119] kasan_atomics_helper+0x4a84/0x5450 [ 16.112142] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.112165] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.112190] ? kasan_atomics+0x152/0x310 [ 16.112216] kasan_atomics+0x1dc/0x310 [ 16.112241] ? __pfx_kasan_atomics+0x10/0x10 [ 16.112265] ? __pfx_read_tsc+0x10/0x10 [ 16.112287] ? ktime_get_ts64+0x86/0x230 [ 16.112311] kunit_try_run_case+0x1a5/0x480 [ 16.112335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.112359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.112382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.112405] ? __kthread_parkme+0x82/0x180 [ 16.112426] ? preempt_count_sub+0x50/0x80 [ 16.112450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.112474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.112497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.112771] kthread+0x337/0x6f0 [ 16.112794] ? trace_preempt_on+0x20/0xc0 [ 16.112833] ? __pfx_kthread+0x10/0x10 [ 16.112854] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.112876] ? calculate_sigpending+0x7b/0xa0 [ 16.112900] ? __pfx_kthread+0x10/0x10 [ 16.112923] ret_from_fork+0x116/0x1d0 [ 16.112941] ? __pfx_kthread+0x10/0x10 [ 16.112963] ret_from_fork_asm+0x1a/0x30 [ 16.112995] </TASK> [ 16.113006] [ 16.125793] Allocated by task 282: [ 16.125933] kasan_save_stack+0x45/0x70 [ 16.126171] kasan_save_track+0x18/0x40 [ 16.126625] kasan_save_alloc_info+0x3b/0x50 [ 16.127021] __kasan_kmalloc+0xb7/0xc0 [ 16.128162] __kmalloc_cache_noprof+0x189/0x420 [ 16.128570] kasan_atomics+0x95/0x310 [ 16.128959] kunit_try_run_case+0x1a5/0x480 [ 16.129345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.129667] kthread+0x337/0x6f0 [ 16.130136] ret_from_fork+0x116/0x1d0 [ 16.130583] ret_from_fork_asm+0x1a/0x30 [ 16.130939] [ 16.131014] The buggy address belongs to the object at ffff88810261fc00 [ 16.131014] which belongs to the cache kmalloc-64 of size 64 [ 16.131870] The buggy address is located 0 bytes to the right of [ 16.131870] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.133576] [ 16.133701] The buggy address belongs to the physical page: [ 16.133876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.134126] flags: 0x200000000000000(node=0|zone=2) [ 16.134343] page_type: f5(slab) [ 16.134657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.134995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.135506] page dumped because: kasan: bad access detected [ 16.136009] [ 16.136119] Memory state around the buggy address: [ 16.136757] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.137246] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.137899] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.138190] ^ [ 16.138654] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.139356] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.139869] ================================================================== [ 15.969196] ================================================================== [ 15.969448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.970722] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.971213] [ 15.972234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.972287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.972301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.972324] Call Trace: [ 15.972337] <TASK> [ 15.972353] dump_stack_lvl+0x73/0xb0 [ 15.972382] print_report+0xd1/0x650 [ 15.972405] ? __virt_addr_valid+0x1db/0x2d0 [ 15.972428] ? kasan_atomics_helper+0x992/0x5450 [ 15.972450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.972475] ? kasan_atomics_helper+0x992/0x5450 [ 15.972496] kasan_report+0x141/0x180 [ 15.972518] ? kasan_atomics_helper+0x992/0x5450 [ 15.972545] kasan_check_range+0x10c/0x1c0 [ 15.972569] __kasan_check_write+0x18/0x20 [ 15.972589] kasan_atomics_helper+0x992/0x5450 [ 15.972612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.972634] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.972659] ? kasan_atomics+0x152/0x310 [ 15.972686] kasan_atomics+0x1dc/0x310 [ 15.972709] ? __pfx_kasan_atomics+0x10/0x10 [ 15.972733] ? __pfx_read_tsc+0x10/0x10 [ 15.972755] ? ktime_get_ts64+0x86/0x230 [ 15.972780] kunit_try_run_case+0x1a5/0x480 [ 15.972804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.972851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.972876] ? __kthread_parkme+0x82/0x180 [ 15.972896] ? preempt_count_sub+0x50/0x80 [ 15.972920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972994] kthread+0x337/0x6f0 [ 15.973014] ? trace_preempt_on+0x20/0xc0 [ 15.973037] ? __pfx_kthread+0x10/0x10 [ 15.973070] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.973092] ? calculate_sigpending+0x7b/0xa0 [ 15.973115] ? __pfx_kthread+0x10/0x10 [ 15.973139] ret_from_fork+0x116/0x1d0 [ 15.973157] ? __pfx_kthread+0x10/0x10 [ 15.973179] ret_from_fork_asm+0x1a/0x30 [ 15.973211] </TASK> [ 15.973225] [ 15.985917] Allocated by task 282: [ 15.986494] kasan_save_stack+0x45/0x70 [ 15.986702] kasan_save_track+0x18/0x40 [ 15.986860] kasan_save_alloc_info+0x3b/0x50 [ 15.987486] __kasan_kmalloc+0xb7/0xc0 [ 15.987798] __kmalloc_cache_noprof+0x189/0x420 [ 15.988012] kasan_atomics+0x95/0x310 [ 15.988443] kunit_try_run_case+0x1a5/0x480 [ 15.988681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.989029] kthread+0x337/0x6f0 [ 15.989370] ret_from_fork+0x116/0x1d0 [ 15.989559] ret_from_fork_asm+0x1a/0x30 [ 15.989899] [ 15.990005] The buggy address belongs to the object at ffff88810261fc00 [ 15.990005] which belongs to the cache kmalloc-64 of size 64 [ 15.990889] The buggy address is located 0 bytes to the right of [ 15.990889] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.991903] [ 15.992007] The buggy address belongs to the physical page: [ 15.992389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.992865] flags: 0x200000000000000(node=0|zone=2) [ 15.993295] page_type: f5(slab) [ 15.993470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.994141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.994588] page dumped because: kasan: bad access detected [ 15.994926] [ 15.995006] Memory state around the buggy address: [ 15.995283] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.995794] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.996091] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.996418] ^ [ 15.997116] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997400] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997861] ================================================================== [ 16.238534] ================================================================== [ 16.239027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 16.239549] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.240418] [ 16.240658] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.240706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.240719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.240742] Call Trace: [ 16.240759] <TASK> [ 16.240789] dump_stack_lvl+0x73/0xb0 [ 16.240818] print_report+0xd1/0x650 [ 16.240840] ? __virt_addr_valid+0x1db/0x2d0 [ 16.240863] ? kasan_atomics_helper+0xf10/0x5450 [ 16.240884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.240911] ? kasan_atomics_helper+0xf10/0x5450 [ 16.240932] kasan_report+0x141/0x180 [ 16.240955] ? kasan_atomics_helper+0xf10/0x5450 [ 16.240982] kasan_check_range+0x10c/0x1c0 [ 16.241006] __kasan_check_write+0x18/0x20 [ 16.241025] kasan_atomics_helper+0xf10/0x5450 [ 16.241060] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.241083] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.241108] ? kasan_atomics+0x152/0x310 [ 16.241135] kasan_atomics+0x1dc/0x310 [ 16.241157] ? __pfx_kasan_atomics+0x10/0x10 [ 16.241181] ? __pfx_read_tsc+0x10/0x10 [ 16.241204] ? ktime_get_ts64+0x86/0x230 [ 16.241230] kunit_try_run_case+0x1a5/0x480 [ 16.241254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.241277] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.241300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.241324] ? __kthread_parkme+0x82/0x180 [ 16.241345] ? preempt_count_sub+0x50/0x80 [ 16.241370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.241396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.241419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.241443] kthread+0x337/0x6f0 [ 16.241462] ? trace_preempt_on+0x20/0xc0 [ 16.241486] ? __pfx_kthread+0x10/0x10 [ 16.241544] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.241575] ? calculate_sigpending+0x7b/0xa0 [ 16.241599] ? __pfx_kthread+0x10/0x10 [ 16.241621] ret_from_fork+0x116/0x1d0 [ 16.241641] ? __pfx_kthread+0x10/0x10 [ 16.241662] ret_from_fork_asm+0x1a/0x30 [ 16.241694] </TASK> [ 16.241705] [ 16.252470] Allocated by task 282: [ 16.252666] kasan_save_stack+0x45/0x70 [ 16.252879] kasan_save_track+0x18/0x40 [ 16.253285] kasan_save_alloc_info+0x3b/0x50 [ 16.253519] __kasan_kmalloc+0xb7/0xc0 [ 16.253722] __kmalloc_cache_noprof+0x189/0x420 [ 16.253912] kasan_atomics+0x95/0x310 [ 16.254057] kunit_try_run_case+0x1a5/0x480 [ 16.254268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.254511] kthread+0x337/0x6f0 [ 16.254729] ret_from_fork+0x116/0x1d0 [ 16.254894] ret_from_fork_asm+0x1a/0x30 [ 16.255180] [ 16.255269] The buggy address belongs to the object at ffff88810261fc00 [ 16.255269] which belongs to the cache kmalloc-64 of size 64 [ 16.255625] The buggy address is located 0 bytes to the right of [ 16.255625] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.256192] [ 16.256283] The buggy address belongs to the physical page: [ 16.256580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.256832] flags: 0x200000000000000(node=0|zone=2) [ 16.257016] page_type: f5(slab) [ 16.257389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.257877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.258428] page dumped because: kasan: bad access detected [ 16.258723] [ 16.258814] Memory state around the buggy address: [ 16.259015] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.259382] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.259707] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.259981] ^ [ 16.260152] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.260372] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.260825] ================================================================== [ 16.988610] ================================================================== [ 16.988996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.989325] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.989694] [ 16.989798] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.989840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.989853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.989907] Call Trace: [ 16.989922] <TASK> [ 16.989938] dump_stack_lvl+0x73/0xb0 [ 16.989964] print_report+0xd1/0x650 [ 16.989986] ? __virt_addr_valid+0x1db/0x2d0 [ 16.990011] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.990076] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.990102] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.990125] kasan_report+0x141/0x180 [ 16.990147] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.990206] __asan_report_load8_noabort+0x18/0x20 [ 16.990232] kasan_atomics_helper+0x4f71/0x5450 [ 16.990254] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.990276] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.990323] ? kasan_atomics+0x152/0x310 [ 16.990349] kasan_atomics+0x1dc/0x310 [ 16.990372] ? __pfx_kasan_atomics+0x10/0x10 [ 16.990397] ? __pfx_read_tsc+0x10/0x10 [ 16.990417] ? ktime_get_ts64+0x86/0x230 [ 16.990442] kunit_try_run_case+0x1a5/0x480 [ 16.990465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.990489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.990522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.990546] ? __kthread_parkme+0x82/0x180 [ 16.990567] ? preempt_count_sub+0x50/0x80 [ 16.990591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.990643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.990690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.990759] kthread+0x337/0x6f0 [ 16.990824] ? trace_preempt_on+0x20/0xc0 [ 16.990914] ? __pfx_kthread+0x10/0x10 [ 16.990959] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.990981] ? calculate_sigpending+0x7b/0xa0 [ 16.991005] ? __pfx_kthread+0x10/0x10 [ 16.991028] ret_from_fork+0x116/0x1d0 [ 16.991055] ? __pfx_kthread+0x10/0x10 [ 16.991077] ret_from_fork_asm+0x1a/0x30 [ 16.991109] </TASK> [ 16.991120] [ 16.999035] Allocated by task 282: [ 16.999250] kasan_save_stack+0x45/0x70 [ 16.999454] kasan_save_track+0x18/0x40 [ 16.999653] kasan_save_alloc_info+0x3b/0x50 [ 16.999885] __kasan_kmalloc+0xb7/0xc0 [ 17.000148] __kmalloc_cache_noprof+0x189/0x420 [ 17.000433] kasan_atomics+0x95/0x310 [ 17.000700] kunit_try_run_case+0x1a5/0x480 [ 17.000913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.001135] kthread+0x337/0x6f0 [ 17.001306] ret_from_fork+0x116/0x1d0 [ 17.001563] ret_from_fork_asm+0x1a/0x30 [ 17.001710] [ 17.001822] The buggy address belongs to the object at ffff88810261fc00 [ 17.001822] which belongs to the cache kmalloc-64 of size 64 [ 17.002363] The buggy address is located 0 bytes to the right of [ 17.002363] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.002934] [ 17.003032] The buggy address belongs to the physical page: [ 17.003320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.003656] flags: 0x200000000000000(node=0|zone=2) [ 17.003917] page_type: f5(slab) [ 17.004083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.004448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.004803] page dumped because: kasan: bad access detected [ 17.005070] [ 17.005160] Memory state around the buggy address: [ 17.005384] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.005792] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.006104] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.006456] ^ [ 17.006682] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.007002] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.007221] ================================================================== [ 16.341878] ================================================================== [ 16.342252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 16.342492] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.342826] [ 16.342936] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.342978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.342991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.343012] Call Trace: [ 16.343027] <TASK> [ 16.343055] dump_stack_lvl+0x73/0xb0 [ 16.343082] print_report+0xd1/0x650 [ 16.343103] ? __virt_addr_valid+0x1db/0x2d0 [ 16.343126] ? kasan_atomics_helper+0x1148/0x5450 [ 16.343148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.343174] ? kasan_atomics_helper+0x1148/0x5450 [ 16.343197] kasan_report+0x141/0x180 [ 16.343220] ? kasan_atomics_helper+0x1148/0x5450 [ 16.343246] kasan_check_range+0x10c/0x1c0 [ 16.343270] __kasan_check_write+0x18/0x20 [ 16.343290] kasan_atomics_helper+0x1148/0x5450 [ 16.343312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.343335] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.343359] ? kasan_atomics+0x152/0x310 [ 16.343385] kasan_atomics+0x1dc/0x310 [ 16.343408] ? __pfx_kasan_atomics+0x10/0x10 [ 16.343432] ? __pfx_read_tsc+0x10/0x10 [ 16.343453] ? ktime_get_ts64+0x86/0x230 [ 16.343477] kunit_try_run_case+0x1a5/0x480 [ 16.343501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.343523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.343547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.343570] ? __kthread_parkme+0x82/0x180 [ 16.343590] ? preempt_count_sub+0x50/0x80 [ 16.343614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.343638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.343661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.343684] kthread+0x337/0x6f0 [ 16.343704] ? trace_preempt_on+0x20/0xc0 [ 16.343726] ? __pfx_kthread+0x10/0x10 [ 16.343748] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.343770] ? calculate_sigpending+0x7b/0xa0 [ 16.343794] ? __pfx_kthread+0x10/0x10 [ 16.343816] ret_from_fork+0x116/0x1d0 [ 16.343835] ? __pfx_kthread+0x10/0x10 [ 16.343856] ret_from_fork_asm+0x1a/0x30 [ 16.343888] </TASK> [ 16.343900] [ 16.352021] Allocated by task 282: [ 16.352402] kasan_save_stack+0x45/0x70 [ 16.352622] kasan_save_track+0x18/0x40 [ 16.353006] kasan_save_alloc_info+0x3b/0x50 [ 16.353403] __kasan_kmalloc+0xb7/0xc0 [ 16.353633] __kmalloc_cache_noprof+0x189/0x420 [ 16.353853] kasan_atomics+0x95/0x310 [ 16.353987] kunit_try_run_case+0x1a5/0x480 [ 16.354282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.354544] kthread+0x337/0x6f0 [ 16.354715] ret_from_fork+0x116/0x1d0 [ 16.354936] ret_from_fork_asm+0x1a/0x30 [ 16.355093] [ 16.355193] The buggy address belongs to the object at ffff88810261fc00 [ 16.355193] which belongs to the cache kmalloc-64 of size 64 [ 16.355674] The buggy address is located 0 bytes to the right of [ 16.355674] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.356333] [ 16.356437] The buggy address belongs to the physical page: [ 16.356736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.357029] flags: 0x200000000000000(node=0|zone=2) [ 16.357282] page_type: f5(slab) [ 16.357435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.357938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.358330] page dumped because: kasan: bad access detected [ 16.358513] [ 16.358610] Memory state around the buggy address: [ 16.358840] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.359235] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.359548] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.359836] ^ [ 16.360019] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360248] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360463] ================================================================== [ 17.142245] ================================================================== [ 17.142590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 17.142994] Read of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.143414] [ 17.143532] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.143576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.143589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.143611] Call Trace: [ 17.143624] <TASK> [ 17.143640] dump_stack_lvl+0x73/0xb0 [ 17.143668] print_report+0xd1/0x650 [ 17.143690] ? __virt_addr_valid+0x1db/0x2d0 [ 17.143713] ? kasan_atomics_helper+0x5115/0x5450 [ 17.143773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.143799] ? kasan_atomics_helper+0x5115/0x5450 [ 17.143821] kasan_report+0x141/0x180 [ 17.143845] ? kasan_atomics_helper+0x5115/0x5450 [ 17.143872] __asan_report_load8_noabort+0x18/0x20 [ 17.143927] kasan_atomics_helper+0x5115/0x5450 [ 17.143953] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.143976] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.144002] ? kasan_atomics+0x152/0x310 [ 17.144029] kasan_atomics+0x1dc/0x310 [ 17.144064] ? __pfx_kasan_atomics+0x10/0x10 [ 17.144118] ? __pfx_read_tsc+0x10/0x10 [ 17.144142] ? ktime_get_ts64+0x86/0x230 [ 17.144166] kunit_try_run_case+0x1a5/0x480 [ 17.144191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.144213] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.144237] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.144262] ? __kthread_parkme+0x82/0x180 [ 17.144282] ? preempt_count_sub+0x50/0x80 [ 17.144306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.144331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.144354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.144378] kthread+0x337/0x6f0 [ 17.144398] ? trace_preempt_on+0x20/0xc0 [ 17.144421] ? __pfx_kthread+0x10/0x10 [ 17.144442] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.144464] ? calculate_sigpending+0x7b/0xa0 [ 17.144488] ? __pfx_kthread+0x10/0x10 [ 17.144542] ret_from_fork+0x116/0x1d0 [ 17.144562] ? __pfx_kthread+0x10/0x10 [ 17.144582] ret_from_fork_asm+0x1a/0x30 [ 17.144614] </TASK> [ 17.144626] [ 17.152356] Allocated by task 282: [ 17.152484] kasan_save_stack+0x45/0x70 [ 17.152643] kasan_save_track+0x18/0x40 [ 17.152996] kasan_save_alloc_info+0x3b/0x50 [ 17.153331] __kasan_kmalloc+0xb7/0xc0 [ 17.153608] __kmalloc_cache_noprof+0x189/0x420 [ 17.153981] kasan_atomics+0x95/0x310 [ 17.154233] kunit_try_run_case+0x1a5/0x480 [ 17.154473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.154750] kthread+0x337/0x6f0 [ 17.154884] ret_from_fork+0x116/0x1d0 [ 17.155013] ret_from_fork_asm+0x1a/0x30 [ 17.155157] [ 17.155228] The buggy address belongs to the object at ffff88810261fc00 [ 17.155228] which belongs to the cache kmalloc-64 of size 64 [ 17.156272] The buggy address is located 0 bytes to the right of [ 17.156272] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.156912] [ 17.157019] The buggy address belongs to the physical page: [ 17.157290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.157680] flags: 0x200000000000000(node=0|zone=2) [ 17.157848] page_type: f5(slab) [ 17.158065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.158409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.158802] page dumped because: kasan: bad access detected [ 17.159051] [ 17.159169] Memory state around the buggy address: [ 17.159399] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.159745] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.160053] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.160368] ^ [ 17.160653] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.160994] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.161323] ================================================================== [ 16.689696] ================================================================== [ 16.690060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.690540] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.690879] [ 16.691024] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.691076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.691089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.691109] Call Trace: [ 16.691125] <TASK> [ 16.691140] dump_stack_lvl+0x73/0xb0 [ 16.691165] print_report+0xd1/0x650 [ 16.691187] ? __virt_addr_valid+0x1db/0x2d0 [ 16.691210] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.691230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.691258] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.691280] kasan_report+0x141/0x180 [ 16.691302] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.691329] kasan_check_range+0x10c/0x1c0 [ 16.691353] __kasan_check_write+0x18/0x20 [ 16.691372] kasan_atomics_helper+0x18b1/0x5450 [ 16.691395] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.691417] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.691443] ? kasan_atomics+0x152/0x310 [ 16.691487] kasan_atomics+0x1dc/0x310 [ 16.691520] ? __pfx_kasan_atomics+0x10/0x10 [ 16.691545] ? __pfx_read_tsc+0x10/0x10 [ 16.691566] ? ktime_get_ts64+0x86/0x230 [ 16.691590] kunit_try_run_case+0x1a5/0x480 [ 16.691613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.691636] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.691659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.691681] ? __kthread_parkme+0x82/0x180 [ 16.691702] ? preempt_count_sub+0x50/0x80 [ 16.691726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.691750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.691773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.691796] kthread+0x337/0x6f0 [ 16.691815] ? trace_preempt_on+0x20/0xc0 [ 16.691839] ? __pfx_kthread+0x10/0x10 [ 16.691859] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.691880] ? calculate_sigpending+0x7b/0xa0 [ 16.691903] ? __pfx_kthread+0x10/0x10 [ 16.691926] ret_from_fork+0x116/0x1d0 [ 16.691944] ? __pfx_kthread+0x10/0x10 [ 16.691964] ret_from_fork_asm+0x1a/0x30 [ 16.691996] </TASK> [ 16.692008] [ 16.699519] Allocated by task 282: [ 16.699678] kasan_save_stack+0x45/0x70 [ 16.699848] kasan_save_track+0x18/0x40 [ 16.699985] kasan_save_alloc_info+0x3b/0x50 [ 16.700145] __kasan_kmalloc+0xb7/0xc0 [ 16.700337] __kmalloc_cache_noprof+0x189/0x420 [ 16.700604] kasan_atomics+0x95/0x310 [ 16.700811] kunit_try_run_case+0x1a5/0x480 [ 16.701028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.701263] kthread+0x337/0x6f0 [ 16.701415] ret_from_fork+0x116/0x1d0 [ 16.701633] ret_from_fork_asm+0x1a/0x30 [ 16.701803] [ 16.701875] The buggy address belongs to the object at ffff88810261fc00 [ 16.701875] which belongs to the cache kmalloc-64 of size 64 [ 16.702239] The buggy address is located 0 bytes to the right of [ 16.702239] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.702649] [ 16.702749] The buggy address belongs to the physical page: [ 16.702998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.703362] flags: 0x200000000000000(node=0|zone=2) [ 16.703723] page_type: f5(slab) [ 16.703894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.704252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.704706] page dumped because: kasan: bad access detected [ 16.704962] [ 16.705066] Memory state around the buggy address: [ 16.705269] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.705583] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.705850] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.706141] ^ [ 16.706342] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.706643] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.706860] ================================================================== [ 16.710683] ================================================================== [ 16.710999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.711321] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.711625] [ 16.711723] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.712109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.712125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.712148] Call Trace: [ 16.712162] <TASK> [ 16.712178] dump_stack_lvl+0x73/0xb0 [ 16.712205] print_report+0xd1/0x650 [ 16.712227] ? __virt_addr_valid+0x1db/0x2d0 [ 16.712249] ? kasan_atomics_helper+0x194a/0x5450 [ 16.712270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.712297] ? kasan_atomics_helper+0x194a/0x5450 [ 16.712319] kasan_report+0x141/0x180 [ 16.712341] ? kasan_atomics_helper+0x194a/0x5450 [ 16.712368] kasan_check_range+0x10c/0x1c0 [ 16.712392] __kasan_check_write+0x18/0x20 [ 16.712412] kasan_atomics_helper+0x194a/0x5450 [ 16.712434] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.712456] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.712482] ? kasan_atomics+0x152/0x310 [ 16.712510] kasan_atomics+0x1dc/0x310 [ 16.712532] ? __pfx_kasan_atomics+0x10/0x10 [ 16.712557] ? __pfx_read_tsc+0x10/0x10 [ 16.712578] ? ktime_get_ts64+0x86/0x230 [ 16.712682] kunit_try_run_case+0x1a5/0x480 [ 16.712709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.712731] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.712755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.712779] ? __kthread_parkme+0x82/0x180 [ 16.712798] ? preempt_count_sub+0x50/0x80 [ 16.712823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.712847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.712870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.712894] kthread+0x337/0x6f0 [ 16.712914] ? trace_preempt_on+0x20/0xc0 [ 16.712936] ? __pfx_kthread+0x10/0x10 [ 16.712958] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.712979] ? calculate_sigpending+0x7b/0xa0 [ 16.713003] ? __pfx_kthread+0x10/0x10 [ 16.713025] ret_from_fork+0x116/0x1d0 [ 16.713054] ? __pfx_kthread+0x10/0x10 [ 16.713076] ret_from_fork_asm+0x1a/0x30 [ 16.713108] </TASK> [ 16.713119] [ 16.720682] Allocated by task 282: [ 16.720857] kasan_save_stack+0x45/0x70 [ 16.721035] kasan_save_track+0x18/0x40 [ 16.721274] kasan_save_alloc_info+0x3b/0x50 [ 16.721489] __kasan_kmalloc+0xb7/0xc0 [ 16.721702] __kmalloc_cache_noprof+0x189/0x420 [ 16.721909] kasan_atomics+0x95/0x310 [ 16.722051] kunit_try_run_case+0x1a5/0x480 [ 16.722199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.722420] kthread+0x337/0x6f0 [ 16.722642] ret_from_fork+0x116/0x1d0 [ 16.722854] ret_from_fork_asm+0x1a/0x30 [ 16.723084] [ 16.723205] The buggy address belongs to the object at ffff88810261fc00 [ 16.723205] which belongs to the cache kmalloc-64 of size 64 [ 16.723670] The buggy address is located 0 bytes to the right of [ 16.723670] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.724249] [ 16.724347] The buggy address belongs to the physical page: [ 16.724627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.724983] flags: 0x200000000000000(node=0|zone=2) [ 16.725205] page_type: f5(slab) [ 16.725394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.725758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.726113] page dumped because: kasan: bad access detected [ 16.726350] [ 16.726445] Memory state around the buggy address: [ 16.726699] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.726994] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.727309] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.727673] ^ [ 16.727959] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.728319] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.728662] ================================================================== [ 16.360857] ================================================================== [ 16.361369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 16.361723] Read of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.361946] [ 16.362028] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.362080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.362093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.362114] Call Trace: [ 16.362130] <TASK> [ 16.362146] dump_stack_lvl+0x73/0xb0 [ 16.362220] print_report+0xd1/0x650 [ 16.362245] ? __virt_addr_valid+0x1db/0x2d0 [ 16.362269] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.362291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.362317] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.362339] kasan_report+0x141/0x180 [ 16.362361] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.362389] __asan_report_load4_noabort+0x18/0x20 [ 16.362414] kasan_atomics_helper+0x4a02/0x5450 [ 16.362436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.362458] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.362483] ? kasan_atomics+0x152/0x310 [ 16.362509] kasan_atomics+0x1dc/0x310 [ 16.362531] ? __pfx_kasan_atomics+0x10/0x10 [ 16.362557] ? __pfx_read_tsc+0x10/0x10 [ 16.362578] ? ktime_get_ts64+0x86/0x230 [ 16.362603] kunit_try_run_case+0x1a5/0x480 [ 16.362627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.362650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.362673] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.362697] ? __kthread_parkme+0x82/0x180 [ 16.362718] ? preempt_count_sub+0x50/0x80 [ 16.362742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.362767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.362790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.362813] kthread+0x337/0x6f0 [ 16.362834] ? trace_preempt_on+0x20/0xc0 [ 16.362856] ? __pfx_kthread+0x10/0x10 [ 16.362878] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.362900] ? calculate_sigpending+0x7b/0xa0 [ 16.362925] ? __pfx_kthread+0x10/0x10 [ 16.362948] ret_from_fork+0x116/0x1d0 [ 16.362967] ? __pfx_kthread+0x10/0x10 [ 16.362989] ret_from_fork_asm+0x1a/0x30 [ 16.363020] </TASK> [ 16.363032] [ 16.371357] Allocated by task 282: [ 16.371558] kasan_save_stack+0x45/0x70 [ 16.371753] kasan_save_track+0x18/0x40 [ 16.371903] kasan_save_alloc_info+0x3b/0x50 [ 16.372152] __kasan_kmalloc+0xb7/0xc0 [ 16.372401] __kmalloc_cache_noprof+0x189/0x420 [ 16.372639] kasan_atomics+0x95/0x310 [ 16.372820] kunit_try_run_case+0x1a5/0x480 [ 16.373008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.373283] kthread+0x337/0x6f0 [ 16.373445] ret_from_fork+0x116/0x1d0 [ 16.373634] ret_from_fork_asm+0x1a/0x30 [ 16.373900] [ 16.373974] The buggy address belongs to the object at ffff88810261fc00 [ 16.373974] which belongs to the cache kmalloc-64 of size 64 [ 16.374335] The buggy address is located 0 bytes to the right of [ 16.374335] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.374699] [ 16.374772] The buggy address belongs to the physical page: [ 16.374943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.375553] flags: 0x200000000000000(node=0|zone=2) [ 16.375792] page_type: f5(slab) [ 16.375963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.376713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.377016] page dumped because: kasan: bad access detected [ 16.377604] [ 16.377690] Memory state around the buggy address: [ 16.377918] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.378259] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.378483] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.378821] ^ [ 16.379105] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.379432] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.379806] ================================================================== [ 15.939462] ================================================================== [ 15.940247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.940745] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.941398] [ 15.941497] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.941542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.941603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.941628] Call Trace: [ 15.941647] <TASK> [ 15.941795] dump_stack_lvl+0x73/0xb0 [ 15.941830] print_report+0xd1/0x650 [ 15.941853] ? __virt_addr_valid+0x1db/0x2d0 [ 15.941877] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.941898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.941925] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.941947] kasan_report+0x141/0x180 [ 15.941970] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.941998] kasan_check_range+0x10c/0x1c0 [ 15.942022] __kasan_check_write+0x18/0x20 [ 15.942053] kasan_atomics_helper+0x8f9/0x5450 [ 15.942125] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.942149] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.942174] ? kasan_atomics+0x152/0x310 [ 15.942201] kasan_atomics+0x1dc/0x310 [ 15.942224] ? __pfx_kasan_atomics+0x10/0x10 [ 15.942249] ? __pfx_read_tsc+0x10/0x10 [ 15.942270] ? ktime_get_ts64+0x86/0x230 [ 15.942295] kunit_try_run_case+0x1a5/0x480 [ 15.942319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.942365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.942390] ? __kthread_parkme+0x82/0x180 [ 15.942412] ? preempt_count_sub+0x50/0x80 [ 15.942436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.942486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.942511] kthread+0x337/0x6f0 [ 15.942531] ? trace_preempt_on+0x20/0xc0 [ 15.942553] ? __pfx_kthread+0x10/0x10 [ 15.942574] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.942596] ? calculate_sigpending+0x7b/0xa0 [ 15.942619] ? __pfx_kthread+0x10/0x10 [ 15.942643] ret_from_fork+0x116/0x1d0 [ 15.942662] ? __pfx_kthread+0x10/0x10 [ 15.942684] ret_from_fork_asm+0x1a/0x30 [ 15.942715] </TASK> [ 15.942728] [ 15.955664] Allocated by task 282: [ 15.955862] kasan_save_stack+0x45/0x70 [ 15.956346] kasan_save_track+0x18/0x40 [ 15.956552] kasan_save_alloc_info+0x3b/0x50 [ 15.956850] __kasan_kmalloc+0xb7/0xc0 [ 15.957022] __kmalloc_cache_noprof+0x189/0x420 [ 15.957567] kasan_atomics+0x95/0x310 [ 15.957881] kunit_try_run_case+0x1a5/0x480 [ 15.958216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.958607] kthread+0x337/0x6f0 [ 15.958789] ret_from_fork+0x116/0x1d0 [ 15.959268] ret_from_fork_asm+0x1a/0x30 [ 15.959678] [ 15.959785] The buggy address belongs to the object at ffff88810261fc00 [ 15.959785] which belongs to the cache kmalloc-64 of size 64 [ 15.960627] The buggy address is located 0 bytes to the right of [ 15.960627] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.961543] [ 15.961805] The buggy address belongs to the physical page: [ 15.962106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.962455] flags: 0x200000000000000(node=0|zone=2) [ 15.962928] page_type: f5(slab) [ 15.963339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.963843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.964468] page dumped because: kasan: bad access detected [ 15.964819] [ 15.964927] Memory state around the buggy address: [ 15.965445] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.965949] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.966539] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.966978] ^ [ 15.967452] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.967902] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.968512] ================================================================== [ 17.083439] ================================================================== [ 17.083796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 17.084021] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.084611] [ 17.084720] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.084761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.084774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.084795] Call Trace: [ 17.084809] <TASK> [ 17.084823] dump_stack_lvl+0x73/0xb0 [ 17.084850] print_report+0xd1/0x650 [ 17.084871] ? __virt_addr_valid+0x1db/0x2d0 [ 17.084894] ? kasan_atomics_helper+0x218a/0x5450 [ 17.084914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.084940] ? kasan_atomics_helper+0x218a/0x5450 [ 17.084963] kasan_report+0x141/0x180 [ 17.084984] ? kasan_atomics_helper+0x218a/0x5450 [ 17.085011] kasan_check_range+0x10c/0x1c0 [ 17.085036] __kasan_check_write+0x18/0x20 [ 17.085066] kasan_atomics_helper+0x218a/0x5450 [ 17.085090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.085113] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.085139] ? kasan_atomics+0x152/0x310 [ 17.085166] kasan_atomics+0x1dc/0x310 [ 17.085189] ? __pfx_kasan_atomics+0x10/0x10 [ 17.085213] ? __pfx_read_tsc+0x10/0x10 [ 17.085234] ? ktime_get_ts64+0x86/0x230 [ 17.085257] kunit_try_run_case+0x1a5/0x480 [ 17.085282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.085304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.085327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.085351] ? __kthread_parkme+0x82/0x180 [ 17.085371] ? preempt_count_sub+0x50/0x80 [ 17.085395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.085420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.085443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.085467] kthread+0x337/0x6f0 [ 17.085486] ? trace_preempt_on+0x20/0xc0 [ 17.085509] ? __pfx_kthread+0x10/0x10 [ 17.085531] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.085557] ? calculate_sigpending+0x7b/0xa0 [ 17.085581] ? __pfx_kthread+0x10/0x10 [ 17.085603] ret_from_fork+0x116/0x1d0 [ 17.085622] ? __pfx_kthread+0x10/0x10 [ 17.085643] ret_from_fork_asm+0x1a/0x30 [ 17.085674] </TASK> [ 17.085694] [ 17.093377] Allocated by task 282: [ 17.093618] kasan_save_stack+0x45/0x70 [ 17.093853] kasan_save_track+0x18/0x40 [ 17.094094] kasan_save_alloc_info+0x3b/0x50 [ 17.094286] __kasan_kmalloc+0xb7/0xc0 [ 17.094438] __kmalloc_cache_noprof+0x189/0x420 [ 17.094789] kasan_atomics+0x95/0x310 [ 17.094995] kunit_try_run_case+0x1a5/0x480 [ 17.095243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.095497] kthread+0x337/0x6f0 [ 17.095669] ret_from_fork+0x116/0x1d0 [ 17.095854] ret_from_fork_asm+0x1a/0x30 [ 17.096035] [ 17.096134] The buggy address belongs to the object at ffff88810261fc00 [ 17.096134] which belongs to the cache kmalloc-64 of size 64 [ 17.096683] The buggy address is located 0 bytes to the right of [ 17.096683] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.097219] [ 17.097323] The buggy address belongs to the physical page: [ 17.097598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.097953] flags: 0x200000000000000(node=0|zone=2) [ 17.098182] page_type: f5(slab) [ 17.098382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.098805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.099028] page dumped because: kasan: bad access detected [ 17.099286] [ 17.099379] Memory state around the buggy address: [ 17.099724] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.100051] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.100346] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.100672] ^ [ 17.100964] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.101291] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.101542] ================================================================== [ 16.261397] ================================================================== [ 16.261951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 16.262280] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.262695] [ 16.262804] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.262847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.262861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.262883] Call Trace: [ 16.262899] <TASK> [ 16.262915] dump_stack_lvl+0x73/0xb0 [ 16.262942] print_report+0xd1/0x650 [ 16.262965] ? __virt_addr_valid+0x1db/0x2d0 [ 16.262988] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.263009] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.263035] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.263123] kasan_report+0x141/0x180 [ 16.263148] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.263177] kasan_check_range+0x10c/0x1c0 [ 16.263202] __kasan_check_write+0x18/0x20 [ 16.263222] kasan_atomics_helper+0xfa9/0x5450 [ 16.263245] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.263267] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.263292] ? kasan_atomics+0x152/0x310 [ 16.263320] kasan_atomics+0x1dc/0x310 [ 16.263344] ? __pfx_kasan_atomics+0x10/0x10 [ 16.263368] ? __pfx_read_tsc+0x10/0x10 [ 16.263390] ? ktime_get_ts64+0x86/0x230 [ 16.263417] kunit_try_run_case+0x1a5/0x480 [ 16.263442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.263464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.263488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.263522] ? __kthread_parkme+0x82/0x180 [ 16.263543] ? preempt_count_sub+0x50/0x80 [ 16.263567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.263591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.263614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.263638] kthread+0x337/0x6f0 [ 16.263658] ? trace_preempt_on+0x20/0xc0 [ 16.263681] ? __pfx_kthread+0x10/0x10 [ 16.263703] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.263724] ? calculate_sigpending+0x7b/0xa0 [ 16.263748] ? __pfx_kthread+0x10/0x10 [ 16.263771] ret_from_fork+0x116/0x1d0 [ 16.263789] ? __pfx_kthread+0x10/0x10 [ 16.263811] ret_from_fork_asm+0x1a/0x30 [ 16.263843] </TASK> [ 16.263856] [ 16.272292] Allocated by task 282: [ 16.272488] kasan_save_stack+0x45/0x70 [ 16.272695] kasan_save_track+0x18/0x40 [ 16.272887] kasan_save_alloc_info+0x3b/0x50 [ 16.273237] __kasan_kmalloc+0xb7/0xc0 [ 16.273371] __kmalloc_cache_noprof+0x189/0x420 [ 16.273526] kasan_atomics+0x95/0x310 [ 16.273742] kunit_try_run_case+0x1a5/0x480 [ 16.273954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.274222] kthread+0x337/0x6f0 [ 16.274401] ret_from_fork+0x116/0x1d0 [ 16.274620] ret_from_fork_asm+0x1a/0x30 [ 16.274820] [ 16.274902] The buggy address belongs to the object at ffff88810261fc00 [ 16.274902] which belongs to the cache kmalloc-64 of size 64 [ 16.275302] The buggy address is located 0 bytes to the right of [ 16.275302] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.275768] [ 16.275866] The buggy address belongs to the physical page: [ 16.276208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.276639] flags: 0x200000000000000(node=0|zone=2) [ 16.276847] page_type: f5(slab) [ 16.277014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.277428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.277756] page dumped because: kasan: bad access detected [ 16.277930] [ 16.278002] Memory state around the buggy address: [ 16.278175] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278503] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278828] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.279382] ^ [ 16.279675] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.279994] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.280449] ================================================================== [ 16.173192] ================================================================== [ 16.173919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 16.174384] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.174642] [ 16.174730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.174772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.174786] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.174807] Call Trace: [ 16.174825] <TASK> [ 16.174842] dump_stack_lvl+0x73/0xb0 [ 16.174869] print_report+0xd1/0x650 [ 16.174892] ? __virt_addr_valid+0x1db/0x2d0 [ 16.174914] ? kasan_atomics_helper+0xde0/0x5450 [ 16.174935] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.174962] ? kasan_atomics_helper+0xde0/0x5450 [ 16.174983] kasan_report+0x141/0x180 [ 16.175005] ? kasan_atomics_helper+0xde0/0x5450 [ 16.175032] kasan_check_range+0x10c/0x1c0 [ 16.175080] __kasan_check_write+0x18/0x20 [ 16.175101] kasan_atomics_helper+0xde0/0x5450 [ 16.175124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.175146] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.175171] ? kasan_atomics+0x152/0x310 [ 16.175199] kasan_atomics+0x1dc/0x310 [ 16.175221] ? __pfx_kasan_atomics+0x10/0x10 [ 16.175246] ? __pfx_read_tsc+0x10/0x10 [ 16.175267] ? ktime_get_ts64+0x86/0x230 [ 16.175291] kunit_try_run_case+0x1a5/0x480 [ 16.175315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.175361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.175386] ? __kthread_parkme+0x82/0x180 [ 16.175406] ? preempt_count_sub+0x50/0x80 [ 16.175431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.175479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.175502] kthread+0x337/0x6f0 [ 16.175567] ? trace_preempt_on+0x20/0xc0 [ 16.175590] ? __pfx_kthread+0x10/0x10 [ 16.175612] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.175633] ? calculate_sigpending+0x7b/0xa0 [ 16.175657] ? __pfx_kthread+0x10/0x10 [ 16.175679] ret_from_fork+0x116/0x1d0 [ 16.175698] ? __pfx_kthread+0x10/0x10 [ 16.175719] ret_from_fork_asm+0x1a/0x30 [ 16.175751] </TASK> [ 16.175763] [ 16.190987] Allocated by task 282: [ 16.191360] kasan_save_stack+0x45/0x70 [ 16.191743] kasan_save_track+0x18/0x40 [ 16.192139] kasan_save_alloc_info+0x3b/0x50 [ 16.192482] __kasan_kmalloc+0xb7/0xc0 [ 16.192847] __kmalloc_cache_noprof+0x189/0x420 [ 16.193215] kasan_atomics+0x95/0x310 [ 16.193778] kunit_try_run_case+0x1a5/0x480 [ 16.194174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.194654] kthread+0x337/0x6f0 [ 16.194894] ret_from_fork+0x116/0x1d0 [ 16.195029] ret_from_fork_asm+0x1a/0x30 [ 16.195431] [ 16.195591] The buggy address belongs to the object at ffff88810261fc00 [ 16.195591] which belongs to the cache kmalloc-64 of size 64 [ 16.196744] The buggy address is located 0 bytes to the right of [ 16.196744] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.197269] [ 16.197433] The buggy address belongs to the physical page: [ 16.197991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.198893] flags: 0x200000000000000(node=0|zone=2) [ 16.199441] page_type: f5(slab) [ 16.199770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.200314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.201137] page dumped because: kasan: bad access detected [ 16.201686] [ 16.201849] Memory state around the buggy address: [ 16.202009] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.202746] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.203605] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.204249] ^ [ 16.204413] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.204872] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205568] ================================================================== [ 16.596650] ================================================================== [ 16.596906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.597152] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.597414] [ 16.597821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.597872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.597890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.597912] Call Trace: [ 16.597929] <TASK> [ 16.597944] dump_stack_lvl+0x73/0xb0 [ 16.597973] print_report+0xd1/0x650 [ 16.597995] ? __virt_addr_valid+0x1db/0x2d0 [ 16.598018] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.598052] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.598079] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.598102] kasan_report+0x141/0x180 [ 16.598125] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.598153] kasan_check_range+0x10c/0x1c0 [ 16.598178] __kasan_check_write+0x18/0x20 [ 16.598197] kasan_atomics_helper+0x15b6/0x5450 [ 16.598221] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.598243] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.598268] ? kasan_atomics+0x152/0x310 [ 16.598295] kasan_atomics+0x1dc/0x310 [ 16.598318] ? __pfx_kasan_atomics+0x10/0x10 [ 16.598343] ? __pfx_read_tsc+0x10/0x10 [ 16.598365] ? ktime_get_ts64+0x86/0x230 [ 16.598389] kunit_try_run_case+0x1a5/0x480 [ 16.598415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.598438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.598461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.598485] ? __kthread_parkme+0x82/0x180 [ 16.598517] ? preempt_count_sub+0x50/0x80 [ 16.598541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.598565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.598590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.598614] kthread+0x337/0x6f0 [ 16.598634] ? trace_preempt_on+0x20/0xc0 [ 16.598657] ? __pfx_kthread+0x10/0x10 [ 16.598680] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.598703] ? calculate_sigpending+0x7b/0xa0 [ 16.598729] ? __pfx_kthread+0x10/0x10 [ 16.598752] ret_from_fork+0x116/0x1d0 [ 16.598772] ? __pfx_kthread+0x10/0x10 [ 16.598793] ret_from_fork_asm+0x1a/0x30 [ 16.598826] </TASK> [ 16.598838] [ 16.606101] Allocated by task 282: [ 16.606281] kasan_save_stack+0x45/0x70 [ 16.606479] kasan_save_track+0x18/0x40 [ 16.606717] kasan_save_alloc_info+0x3b/0x50 [ 16.606868] __kasan_kmalloc+0xb7/0xc0 [ 16.607035] __kmalloc_cache_noprof+0x189/0x420 [ 16.607276] kasan_atomics+0x95/0x310 [ 16.607468] kunit_try_run_case+0x1a5/0x480 [ 16.607803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.608026] kthread+0x337/0x6f0 [ 16.608206] ret_from_fork+0x116/0x1d0 [ 16.608373] ret_from_fork_asm+0x1a/0x30 [ 16.608583] [ 16.608674] The buggy address belongs to the object at ffff88810261fc00 [ 16.608674] which belongs to the cache kmalloc-64 of size 64 [ 16.609056] The buggy address is located 0 bytes to the right of [ 16.609056] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.609621] [ 16.609782] The buggy address belongs to the physical page: [ 16.609964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.610222] flags: 0x200000000000000(node=0|zone=2) [ 16.610389] page_type: f5(slab) [ 16.610512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.610780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.611126] page dumped because: kasan: bad access detected [ 16.611378] [ 16.611487] Memory state around the buggy address: [ 16.611832] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.612061] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.612278] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.612492] ^ [ 16.612728] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.613059] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.613378] ================================================================== [ 15.588737] ================================================================== [ 15.588983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.589829] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 15.590572] [ 15.590761] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.590804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.590816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.590838] Call Trace: [ 15.590862] <TASK> [ 15.590878] dump_stack_lvl+0x73/0xb0 [ 15.590907] print_report+0xd1/0x650 [ 15.590940] ? __virt_addr_valid+0x1db/0x2d0 [ 15.590971] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.590991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.591016] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.591057] kasan_report+0x141/0x180 [ 15.591079] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.591103] __asan_report_store4_noabort+0x1b/0x30 [ 15.591128] kasan_atomics_helper+0x4ba2/0x5450 [ 15.591150] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.591171] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.591196] ? kasan_atomics+0x152/0x310 [ 15.591221] kasan_atomics+0x1dc/0x310 [ 15.591244] ? __pfx_kasan_atomics+0x10/0x10 [ 15.591268] ? __pfx_read_tsc+0x10/0x10 [ 15.591288] ? ktime_get_ts64+0x86/0x230 [ 15.591312] kunit_try_run_case+0x1a5/0x480 [ 15.591336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.591357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.591383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.591406] ? __kthread_parkme+0x82/0x180 [ 15.591425] ? preempt_count_sub+0x50/0x80 [ 15.591448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.591471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.591494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.591516] kthread+0x337/0x6f0 [ 15.591535] ? trace_preempt_on+0x20/0xc0 [ 15.591556] ? __pfx_kthread+0x10/0x10 [ 15.591577] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.591597] ? calculate_sigpending+0x7b/0xa0 [ 15.591620] ? __pfx_kthread+0x10/0x10 [ 15.591641] ret_from_fork+0x116/0x1d0 [ 15.591658] ? __pfx_kthread+0x10/0x10 [ 15.591678] ret_from_fork_asm+0x1a/0x30 [ 15.591708] </TASK> [ 15.591719] [ 15.608975] Allocated by task 282: [ 15.609948] kasan_save_stack+0x45/0x70 [ 15.610748] kasan_save_track+0x18/0x40 [ 15.611445] kasan_save_alloc_info+0x3b/0x50 [ 15.612264] __kasan_kmalloc+0xb7/0xc0 [ 15.612979] __kmalloc_cache_noprof+0x189/0x420 [ 15.613868] kasan_atomics+0x95/0x310 [ 15.614465] kunit_try_run_case+0x1a5/0x480 [ 15.615024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.615227] kthread+0x337/0x6f0 [ 15.615352] ret_from_fork+0x116/0x1d0 [ 15.615487] ret_from_fork_asm+0x1a/0x30 [ 15.615627] [ 15.615701] The buggy address belongs to the object at ffff88810261fc00 [ 15.615701] which belongs to the cache kmalloc-64 of size 64 [ 15.616075] The buggy address is located 0 bytes to the right of [ 15.616075] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 15.617838] [ 15.618010] The buggy address belongs to the physical page: [ 15.618749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 15.619755] flags: 0x200000000000000(node=0|zone=2) [ 15.620374] page_type: f5(slab) [ 15.620796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.621694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.621991] page dumped because: kasan: bad access detected [ 15.622727] [ 15.623088] Memory state around the buggy address: [ 15.623523] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.623750] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.623968] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.624245] ^ [ 15.625065] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.625873] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.626675] ================================================================== [ 16.206471] ================================================================== [ 16.206944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 16.207187] Write of size 4 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.207886] [ 16.208085] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.208130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.208182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.208205] Call Trace: [ 16.208223] <TASK> [ 16.208240] dump_stack_lvl+0x73/0xb0 [ 16.208268] print_report+0xd1/0x650 [ 16.208291] ? __virt_addr_valid+0x1db/0x2d0 [ 16.208314] ? kasan_atomics_helper+0xe78/0x5450 [ 16.208335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.208361] ? kasan_atomics_helper+0xe78/0x5450 [ 16.208383] kasan_report+0x141/0x180 [ 16.208406] ? kasan_atomics_helper+0xe78/0x5450 [ 16.208432] kasan_check_range+0x10c/0x1c0 [ 16.208456] __kasan_check_write+0x18/0x20 [ 16.208476] kasan_atomics_helper+0xe78/0x5450 [ 16.208501] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.208524] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.208549] ? kasan_atomics+0x152/0x310 [ 16.208576] kasan_atomics+0x1dc/0x310 [ 16.208599] ? __pfx_kasan_atomics+0x10/0x10 [ 16.208623] ? __pfx_read_tsc+0x10/0x10 [ 16.208645] ? ktime_get_ts64+0x86/0x230 [ 16.208670] kunit_try_run_case+0x1a5/0x480 [ 16.208695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.208718] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.208741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.208764] ? __kthread_parkme+0x82/0x180 [ 16.208785] ? preempt_count_sub+0x50/0x80 [ 16.208810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.208834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.208858] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.208882] kthread+0x337/0x6f0 [ 16.208902] ? trace_preempt_on+0x20/0xc0 [ 16.208925] ? __pfx_kthread+0x10/0x10 [ 16.208947] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.208969] ? calculate_sigpending+0x7b/0xa0 [ 16.208994] ? __pfx_kthread+0x10/0x10 [ 16.209016] ret_from_fork+0x116/0x1d0 [ 16.209035] ? __pfx_kthread+0x10/0x10 [ 16.209078] ret_from_fork_asm+0x1a/0x30 [ 16.209111] </TASK> [ 16.209123] [ 16.222945] Allocated by task 282: [ 16.223273] kasan_save_stack+0x45/0x70 [ 16.223760] kasan_save_track+0x18/0x40 [ 16.224185] kasan_save_alloc_info+0x3b/0x50 [ 16.224655] __kasan_kmalloc+0xb7/0xc0 [ 16.224987] __kmalloc_cache_noprof+0x189/0x420 [ 16.225525] kasan_atomics+0x95/0x310 [ 16.225687] kunit_try_run_case+0x1a5/0x480 [ 16.225836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.226012] kthread+0x337/0x6f0 [ 16.226289] ret_from_fork+0x116/0x1d0 [ 16.226670] ret_from_fork_asm+0x1a/0x30 [ 16.227320] [ 16.227491] The buggy address belongs to the object at ffff88810261fc00 [ 16.227491] which belongs to the cache kmalloc-64 of size 64 [ 16.228689] The buggy address is located 0 bytes to the right of [ 16.228689] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.230008] [ 16.230137] The buggy address belongs to the physical page: [ 16.230593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.231271] flags: 0x200000000000000(node=0|zone=2) [ 16.231448] page_type: f5(slab) [ 16.231645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.232489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.233229] page dumped because: kasan: bad access detected [ 16.233796] [ 16.234005] Memory state around the buggy address: [ 16.234402] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.234899] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.235319] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.235928] ^ [ 16.236407] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.236985] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.237602] ================================================================== [ 17.007672] ================================================================== [ 17.008419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 17.008804] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 17.009182] [ 17.009290] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.009362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.009375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.009397] Call Trace: [ 17.009411] <TASK> [ 17.009426] dump_stack_lvl+0x73/0xb0 [ 17.009484] print_report+0xd1/0x650 [ 17.009506] ? __virt_addr_valid+0x1db/0x2d0 [ 17.009528] ? kasan_atomics_helper+0x2006/0x5450 [ 17.009549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.009579] ? kasan_atomics_helper+0x2006/0x5450 [ 17.009602] kasan_report+0x141/0x180 [ 17.009624] ? kasan_atomics_helper+0x2006/0x5450 [ 17.009652] kasan_check_range+0x10c/0x1c0 [ 17.009675] __kasan_check_write+0x18/0x20 [ 17.009695] kasan_atomics_helper+0x2006/0x5450 [ 17.009719] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.009743] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.009768] ? kasan_atomics+0x152/0x310 [ 17.009795] kasan_atomics+0x1dc/0x310 [ 17.009817] ? __pfx_kasan_atomics+0x10/0x10 [ 17.009841] ? __pfx_read_tsc+0x10/0x10 [ 17.009862] ? ktime_get_ts64+0x86/0x230 [ 17.009886] kunit_try_run_case+0x1a5/0x480 [ 17.009910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.009933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.009955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.009980] ? __kthread_parkme+0x82/0x180 [ 17.010001] ? preempt_count_sub+0x50/0x80 [ 17.010025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.010059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.010082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.010106] kthread+0x337/0x6f0 [ 17.010126] ? trace_preempt_on+0x20/0xc0 [ 17.010149] ? __pfx_kthread+0x10/0x10 [ 17.010170] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.010192] ? calculate_sigpending+0x7b/0xa0 [ 17.010215] ? __pfx_kthread+0x10/0x10 [ 17.010237] ret_from_fork+0x116/0x1d0 [ 17.010256] ? __pfx_kthread+0x10/0x10 [ 17.010277] ret_from_fork_asm+0x1a/0x30 [ 17.010320] </TASK> [ 17.010333] [ 17.018678] Allocated by task 282: [ 17.018850] kasan_save_stack+0x45/0x70 [ 17.019037] kasan_save_track+0x18/0x40 [ 17.019271] kasan_save_alloc_info+0x3b/0x50 [ 17.019452] __kasan_kmalloc+0xb7/0xc0 [ 17.019703] __kmalloc_cache_noprof+0x189/0x420 [ 17.019911] kasan_atomics+0x95/0x310 [ 17.020142] kunit_try_run_case+0x1a5/0x480 [ 17.020352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.020628] kthread+0x337/0x6f0 [ 17.020810] ret_from_fork+0x116/0x1d0 [ 17.021000] ret_from_fork_asm+0x1a/0x30 [ 17.021211] [ 17.021310] The buggy address belongs to the object at ffff88810261fc00 [ 17.021310] which belongs to the cache kmalloc-64 of size 64 [ 17.021917] The buggy address is located 0 bytes to the right of [ 17.021917] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 17.022366] [ 17.022498] The buggy address belongs to the physical page: [ 17.022754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 17.023134] flags: 0x200000000000000(node=0|zone=2) [ 17.023375] page_type: f5(slab) [ 17.023553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.023905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.024235] page dumped because: kasan: bad access detected [ 17.024483] [ 17.024607] Memory state around the buggy address: [ 17.024813] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.025138] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.025444] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.025813] ^ [ 17.026054] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.026349] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.026866] ================================================================== [ 16.672454] ================================================================== [ 16.672792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.673027] Write of size 8 at addr ffff88810261fc30 by task kunit_try_catch/282 [ 16.673372] [ 16.673497] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.673538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.673558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.673580] Call Trace: [ 16.673594] <TASK> [ 16.673609] dump_stack_lvl+0x73/0xb0 [ 16.673635] print_report+0xd1/0x650 [ 16.673656] ? __virt_addr_valid+0x1db/0x2d0 [ 16.673679] ? kasan_atomics_helper+0x1818/0x5450 [ 16.673700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.673726] ? kasan_atomics_helper+0x1818/0x5450 [ 16.673748] kasan_report+0x141/0x180 [ 16.673770] ? kasan_atomics_helper+0x1818/0x5450 [ 16.673797] kasan_check_range+0x10c/0x1c0 [ 16.673820] __kasan_check_write+0x18/0x20 [ 16.673839] kasan_atomics_helper+0x1818/0x5450 [ 16.673862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.673884] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.673909] ? kasan_atomics+0x152/0x310 [ 16.673937] kasan_atomics+0x1dc/0x310 [ 16.673960] ? __pfx_kasan_atomics+0x10/0x10 [ 16.673984] ? __pfx_read_tsc+0x10/0x10 [ 16.674005] ? ktime_get_ts64+0x86/0x230 [ 16.674028] kunit_try_run_case+0x1a5/0x480 [ 16.674063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.674085] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.674109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.674132] ? __kthread_parkme+0x82/0x180 [ 16.674153] ? preempt_count_sub+0x50/0x80 [ 16.674178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.674204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.674227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.674251] kthread+0x337/0x6f0 [ 16.674270] ? trace_preempt_on+0x20/0xc0 [ 16.674292] ? __pfx_kthread+0x10/0x10 [ 16.674314] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.674334] ? calculate_sigpending+0x7b/0xa0 [ 16.674358] ? __pfx_kthread+0x10/0x10 [ 16.674381] ret_from_fork+0x116/0x1d0 [ 16.674401] ? __pfx_kthread+0x10/0x10 [ 16.674422] ret_from_fork_asm+0x1a/0x30 [ 16.674454] </TASK> [ 16.674466] [ 16.681939] Allocated by task 282: [ 16.682104] kasan_save_stack+0x45/0x70 [ 16.682297] kasan_save_track+0x18/0x40 [ 16.682433] kasan_save_alloc_info+0x3b/0x50 [ 16.682584] __kasan_kmalloc+0xb7/0xc0 [ 16.682777] __kmalloc_cache_noprof+0x189/0x420 [ 16.683161] kasan_atomics+0x95/0x310 [ 16.683333] kunit_try_run_case+0x1a5/0x480 [ 16.683527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.683740] kthread+0x337/0x6f0 [ 16.683901] ret_from_fork+0x116/0x1d0 [ 16.684057] ret_from_fork_asm+0x1a/0x30 [ 16.684261] [ 16.684359] The buggy address belongs to the object at ffff88810261fc00 [ 16.684359] which belongs to the cache kmalloc-64 of size 64 [ 16.684852] The buggy address is located 0 bytes to the right of [ 16.684852] allocated 48-byte region [ffff88810261fc00, ffff88810261fc30) [ 16.685230] [ 16.685303] The buggy address belongs to the physical page: [ 16.685477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f [ 16.685722] flags: 0x200000000000000(node=0|zone=2) [ 16.685885] page_type: f5(slab) [ 16.686024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.686656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.686992] page dumped because: kasan: bad access detected [ 16.687252] [ 16.687347] Memory state around the buggy address: [ 16.687534] ffff88810261fb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.687800] ffff88810261fb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.688019] >ffff88810261fc00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.688242] ^ [ 16.688398] ffff88810261fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.688616] ffff88810261fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.689073] ==================================================================