Date
July 10, 2025, 6:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.672836] ================================================================== [ 19.672961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.673015] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.673066] [ 19.673112] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.673330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.673372] Hardware name: linux,dummy-virt (DT) [ 19.673591] Call trace: [ 19.673888] show_stack+0x20/0x38 (C) [ 19.674039] dump_stack_lvl+0x8c/0xd0 [ 19.674090] print_report+0x118/0x608 [ 19.674140] kasan_report+0xdc/0x128 [ 19.674210] kasan_check_range+0x100/0x1a8 [ 19.674263] __kasan_check_write+0x20/0x30 [ 19.674319] kasan_atomics_helper+0x11f8/0x4858 [ 19.674384] kasan_atomics+0x198/0x2e0 [ 19.674432] kunit_try_run_case+0x170/0x3f0 [ 19.674899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675015] kthread+0x328/0x630 [ 19.675214] ret_from_fork+0x10/0x20 [ 19.675265] [ 19.675285] Allocated by task 265: [ 19.675363] kasan_save_stack+0x3c/0x68 [ 19.675414] kasan_save_track+0x20/0x40 [ 19.675456] kasan_save_alloc_info+0x40/0x58 [ 19.675545] __kasan_kmalloc+0xd4/0xd8 [ 19.675586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.675629] kasan_atomics+0xb8/0x2e0 [ 19.675666] kunit_try_run_case+0x170/0x3f0 [ 19.675707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675754] kthread+0x328/0x630 [ 19.675833] ret_from_fork+0x10/0x20 [ 19.675971] [ 19.675992] The buggy address belongs to the object at fff00000c5a01980 [ 19.675992] which belongs to the cache kmalloc-64 of size 64 [ 19.676180] The buggy address is located 0 bytes to the right of [ 19.676180] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.676888] [ 19.676991] The buggy address belongs to the physical page: [ 19.677028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.677567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.677645] page_type: f5(slab) [ 19.677954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.678116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.678162] page dumped because: kasan: bad access detected [ 19.678214] [ 19.678234] Memory state around the buggy address: [ 19.678285] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.678332] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.678388] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.678429] ^ [ 19.678466] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678519] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678692] ================================================================== [ 19.687363] ================================================================== [ 19.687422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.687476] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.687643] [ 19.687677] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.687966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.688001] Hardware name: linux,dummy-virt (DT) [ 19.688034] Call trace: [ 19.688058] show_stack+0x20/0x38 (C) [ 19.688111] dump_stack_lvl+0x8c/0xd0 [ 19.688166] print_report+0x118/0x608 [ 19.688430] kasan_report+0xdc/0x128 [ 19.688478] kasan_check_range+0x100/0x1a8 [ 19.688529] __kasan_check_write+0x20/0x30 [ 19.688575] kasan_atomics_helper+0x12d8/0x4858 [ 19.688627] kasan_atomics+0x198/0x2e0 [ 19.688681] kunit_try_run_case+0x170/0x3f0 [ 19.688933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.689229] kthread+0x328/0x630 [ 19.689346] ret_from_fork+0x10/0x20 [ 19.689395] [ 19.689415] Allocated by task 265: [ 19.689445] kasan_save_stack+0x3c/0x68 [ 19.689487] kasan_save_track+0x20/0x40 [ 19.689527] kasan_save_alloc_info+0x40/0x58 [ 19.689569] __kasan_kmalloc+0xd4/0xd8 [ 19.689608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.690036] kasan_atomics+0xb8/0x2e0 [ 19.690370] kunit_try_run_case+0x170/0x3f0 [ 19.690468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.690516] kthread+0x328/0x630 [ 19.690551] ret_from_fork+0x10/0x20 [ 19.690853] [ 19.690894] The buggy address belongs to the object at fff00000c5a01980 [ 19.690894] which belongs to the cache kmalloc-64 of size 64 [ 19.690964] The buggy address is located 0 bytes to the right of [ 19.690964] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.691030] [ 19.691054] The buggy address belongs to the physical page: [ 19.691113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.691169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.691321] page_type: f5(slab) [ 19.691372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.691428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.691471] page dumped because: kasan: bad access detected [ 19.691506] [ 19.691526] Memory state around the buggy address: [ 19.691634] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.691685] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.691736] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.691986] ^ [ 19.692069] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.692111] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.692225] ================================================================== [ 19.665646] ================================================================== [ 19.665702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.665766] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.666055] [ 19.666279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.666401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.666431] Hardware name: linux,dummy-virt (DT) [ 19.666462] Call trace: [ 19.666688] show_stack+0x20/0x38 (C) [ 19.666848] dump_stack_lvl+0x8c/0xd0 [ 19.666929] print_report+0x118/0x608 [ 19.666986] kasan_report+0xdc/0x128 [ 19.667236] kasan_check_range+0x100/0x1a8 [ 19.667434] __kasan_check_write+0x20/0x30 [ 19.667538] kasan_atomics_helper+0x1190/0x4858 [ 19.667631] kasan_atomics+0x198/0x2e0 [ 19.667698] kunit_try_run_case+0x170/0x3f0 [ 19.667857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667946] kthread+0x328/0x630 [ 19.668035] ret_from_fork+0x10/0x20 [ 19.668137] [ 19.668196] Allocated by task 265: [ 19.668226] kasan_save_stack+0x3c/0x68 [ 19.668270] kasan_save_track+0x20/0x40 [ 19.668309] kasan_save_alloc_info+0x40/0x58 [ 19.668364] __kasan_kmalloc+0xd4/0xd8 [ 19.668402] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.668444] kasan_atomics+0xb8/0x2e0 [ 19.668483] kunit_try_run_case+0x170/0x3f0 [ 19.668870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.669262] kthread+0x328/0x630 [ 19.669428] ret_from_fork+0x10/0x20 [ 19.669513] [ 19.669676] The buggy address belongs to the object at fff00000c5a01980 [ 19.669676] which belongs to the cache kmalloc-64 of size 64 [ 19.669807] The buggy address is located 0 bytes to the right of [ 19.669807] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.669874] [ 19.669897] The buggy address belongs to the physical page: [ 19.670196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.670259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.670330] page_type: f5(slab) [ 19.670387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.670798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.670846] page dumped because: kasan: bad access detected [ 19.670881] [ 19.670901] Memory state around the buggy address: [ 19.670936] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.670989] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.671035] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.671076] ^ [ 19.671113] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671156] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671278] ================================================================== [ 19.660375] ================================================================== [ 19.660430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.660483] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.660535] [ 19.660565] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.660647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.660676] Hardware name: linux,dummy-virt (DT) [ 19.660708] Call trace: [ 19.660733] show_stack+0x20/0x38 (C) [ 19.660783] dump_stack_lvl+0x8c/0xd0 [ 19.660831] print_report+0x118/0x608 [ 19.661243] kasan_report+0xdc/0x128 [ 19.661367] kasan_check_range+0x100/0x1a8 [ 19.661422] __kasan_check_write+0x20/0x30 [ 19.661469] kasan_atomics_helper+0x1128/0x4858 [ 19.661527] kasan_atomics+0x198/0x2e0 [ 19.661764] kunit_try_run_case+0x170/0x3f0 [ 19.661967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.662024] kthread+0x328/0x630 [ 19.662067] ret_from_fork+0x10/0x20 [ 19.662117] [ 19.662137] Allocated by task 265: [ 19.662168] kasan_save_stack+0x3c/0x68 [ 19.662594] kasan_save_track+0x20/0x40 [ 19.662636] kasan_save_alloc_info+0x40/0x58 [ 19.662797] __kasan_kmalloc+0xd4/0xd8 [ 19.662877] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.662989] kasan_atomics+0xb8/0x2e0 [ 19.663083] kunit_try_run_case+0x170/0x3f0 [ 19.663170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.663215] kthread+0x328/0x630 [ 19.663252] ret_from_fork+0x10/0x20 [ 19.663469] [ 19.663529] The buggy address belongs to the object at fff00000c5a01980 [ 19.663529] which belongs to the cache kmalloc-64 of size 64 [ 19.663658] The buggy address is located 0 bytes to the right of [ 19.663658] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.663777] [ 19.663853] The buggy address belongs to the physical page: [ 19.663888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.663941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.664266] page_type: f5(slab) [ 19.664362] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.664462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.664510] page dumped because: kasan: bad access detected [ 19.664544] [ 19.664565] Memory state around the buggy address: [ 19.664658] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.664869] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.664966] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.665008] ^ [ 19.665045] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665096] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665171] ================================================================== [ 19.647457] ================================================================== [ 19.647586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.647640] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.647692] [ 19.647737] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.647881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.647910] Hardware name: linux,dummy-virt (DT) [ 19.647943] Call trace: [ 19.647968] show_stack+0x20/0x38 (C) [ 19.648240] dump_stack_lvl+0x8c/0xd0 [ 19.648493] print_report+0x118/0x608 [ 19.648625] kasan_report+0xdc/0x128 [ 19.648675] kasan_check_range+0x100/0x1a8 [ 19.648724] __kasan_check_write+0x20/0x30 [ 19.649102] kasan_atomics_helper+0x1058/0x4858 [ 19.649182] kasan_atomics+0x198/0x2e0 [ 19.649230] kunit_try_run_case+0x170/0x3f0 [ 19.649282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.649349] kthread+0x328/0x630 [ 19.649394] ret_from_fork+0x10/0x20 [ 19.649442] [ 19.649657] Allocated by task 265: [ 19.649695] kasan_save_stack+0x3c/0x68 [ 19.649892] kasan_save_track+0x20/0x40 [ 19.650178] kasan_save_alloc_info+0x40/0x58 [ 19.650471] __kasan_kmalloc+0xd4/0xd8 [ 19.650513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.650595] kasan_atomics+0xb8/0x2e0 [ 19.650683] kunit_try_run_case+0x170/0x3f0 [ 19.650758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.651021] kthread+0x328/0x630 [ 19.651402] ret_from_fork+0x10/0x20 [ 19.651465] [ 19.651489] The buggy address belongs to the object at fff00000c5a01980 [ 19.651489] which belongs to the cache kmalloc-64 of size 64 [ 19.651585] The buggy address is located 0 bytes to the right of [ 19.651585] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.651672] [ 19.651735] The buggy address belongs to the physical page: [ 19.651769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.651896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.652008] page_type: f5(slab) [ 19.652053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.652304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.652365] page dumped because: kasan: bad access detected [ 19.652399] [ 19.652419] Memory state around the buggy address: [ 19.652578] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.652626] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.652706] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.652747] ^ [ 19.652780] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.652858] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.652922] ================================================================== [ 19.475559] ================================================================== [ 19.475611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 19.476809] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.476881] [ 19.476917] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.477002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.477129] Hardware name: linux,dummy-virt (DT) [ 19.477169] Call trace: [ 19.477229] show_stack+0x20/0x38 (C) [ 19.477313] dump_stack_lvl+0x8c/0xd0 [ 19.477391] print_report+0x118/0x608 [ 19.478335] kasan_check_range+0x100/0x1a8 [ 19.478549] kasan_atomics_helper+0x7cc/0x4858 [ 19.478632] kasan_atomics+0x198/0x2e0 [ 19.478959] kunit_try_run_case+0x170/0x3f0 [ 19.479093] kthread+0x328/0x630 [ 19.479776] ret_from_fork+0x10/0x20 [ 19.480109] [ 19.480150] Allocated by task 265: [ 19.480205] kasan_save_stack+0x3c/0x68 [ 19.480396] __kasan_kmalloc+0xd4/0xd8 [ 19.480436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.480478] kasan_atomics+0xb8/0x2e0 [ 19.480521] kunit_try_run_case+0x170/0x3f0 [ 19.480681] [ 19.480824] [ 19.480848] The buggy address belongs to the physical page: [ 19.481088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.481203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.481815] page_type: f5(slab) [ 19.481859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.481923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.483358] page dumped because: kasan: bad access detected [ 19.483747] [ 19.483798] Memory state around the buggy address: [ 19.483858] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.484607] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.486475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.486763] kasan_check_range+0x100/0x1a8 [ 19.488841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.489250] [ 19.489274] The buggy address belongs to the physical page: [ 19.489307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.489371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.489419] page_type: f5(slab) [ 19.489467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.489729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.489787] page dumped because: kasan: bad access detected [ 19.489953] [ 19.489973] Memory state around the buggy address: [ 19.490009] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.490052] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.490097] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.490137] ^ [ 19.491008] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.491063] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.491104] ================================================================== [ 19.840398] ================================================================== [ 19.840880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.841415] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.841551] [ 19.841587] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.841716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.841830] Hardware name: linux,dummy-virt (DT) [ 19.841940] Call trace: [ 19.841988] show_stack+0x20/0x38 (C) [ 19.842397] dump_stack_lvl+0x8c/0xd0 [ 19.842563] print_report+0x118/0x608 [ 19.842684] kasan_report+0xdc/0x128 [ 19.842734] kasan_check_range+0x100/0x1a8 [ 19.842787] __kasan_check_write+0x20/0x30 [ 19.842836] kasan_atomics_helper+0x17ec/0x4858 [ 19.842899] kasan_atomics+0x198/0x2e0 [ 19.842945] kunit_try_run_case+0x170/0x3f0 [ 19.843399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.843517] kthread+0x328/0x630 [ 19.843564] ret_from_fork+0x10/0x20 [ 19.843770] [ 19.843814] Allocated by task 265: [ 19.843910] kasan_save_stack+0x3c/0x68 [ 19.843960] kasan_save_track+0x20/0x40 [ 19.844001] kasan_save_alloc_info+0x40/0x58 [ 19.844091] __kasan_kmalloc+0xd4/0xd8 [ 19.844151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.844304] kasan_atomics+0xb8/0x2e0 [ 19.844360] kunit_try_run_case+0x170/0x3f0 [ 19.844400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.844448] kthread+0x328/0x630 [ 19.844482] ret_from_fork+0x10/0x20 [ 19.844648] [ 19.845024] The buggy address belongs to the object at fff00000c5a01980 [ 19.845024] which belongs to the cache kmalloc-64 of size 64 [ 19.845176] The buggy address is located 0 bytes to the right of [ 19.845176] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.845308] [ 19.845571] The buggy address belongs to the physical page: [ 19.845613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.845728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.845779] page_type: f5(slab) [ 19.845951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.846006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.846050] page dumped because: kasan: bad access detected [ 19.846334] [ 19.846443] Memory state around the buggy address: [ 19.846484] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.846550] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.846595] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.846759] ^ [ 19.846832] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.847061] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.847102] ================================================================== [ 19.491971] ================================================================== [ 19.492025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.492079] Read of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.492146] [ 19.492286] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.492392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.492473] Hardware name: linux,dummy-virt (DT) [ 19.492508] Call trace: [ 19.492571] show_stack+0x20/0x38 (C) [ 19.492658] dump_stack_lvl+0x8c/0xd0 [ 19.492709] print_report+0x118/0x608 [ 19.492776] kasan_report+0xdc/0x128 [ 19.492826] __asan_report_load4_noabort+0x20/0x30 [ 19.492881] kasan_atomics_helper+0x42d8/0x4858 [ 19.493079] kasan_atomics+0x198/0x2e0 [ 19.493165] kunit_try_run_case+0x170/0x3f0 [ 19.493217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.493282] kthread+0x328/0x630 [ 19.493363] ret_from_fork+0x10/0x20 [ 19.493416] [ 19.493437] Allocated by task 265: [ 19.493498] kasan_save_stack+0x3c/0x68 [ 19.493599] kasan_save_track+0x20/0x40 [ 19.493641] kasan_save_alloc_info+0x40/0x58 [ 19.493682] __kasan_kmalloc+0xd4/0xd8 [ 19.493732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.493933] kasan_atomics+0xb8/0x2e0 [ 19.494382] kthread+0x328/0x630 [ 19.494875] [ 19.495068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.495259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.495302] page dumped because: kasan: bad access detected [ 19.495335] [ 19.495709] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.496116] ================================================================== [ 19.623982] ================================================================== [ 19.624030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.624080] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.624130] [ 19.624182] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.624265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.624293] Hardware name: linux,dummy-virt (DT) [ 19.624325] Call trace: [ 19.624365] show_stack+0x20/0x38 (C) [ 19.624629] dump_stack_lvl+0x8c/0xd0 [ 19.624678] print_report+0x118/0x608 [ 19.624728] kasan_report+0xdc/0x128 [ 19.624782] __asan_report_store8_noabort+0x20/0x30 [ 19.625103] kasan_atomics_helper+0x3e5c/0x4858 [ 19.625776] kasan_atomics+0x198/0x2e0 [ 19.625924] kunit_try_run_case+0x170/0x3f0 [ 19.625976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.626030] kthread+0x328/0x630 [ 19.626075] ret_from_fork+0x10/0x20 [ 19.626124] [ 19.626143] Allocated by task 265: [ 19.626174] kasan_save_stack+0x3c/0x68 [ 19.626216] kasan_save_track+0x20/0x40 [ 19.626255] kasan_save_alloc_info+0x40/0x58 [ 19.626322] __kasan_kmalloc+0xd4/0xd8 [ 19.626376] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.626418] kasan_atomics+0xb8/0x2e0 [ 19.626456] kunit_try_run_case+0x170/0x3f0 [ 19.626508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.626561] kthread+0x328/0x630 [ 19.626597] ret_from_fork+0x10/0x20 [ 19.626635] [ 19.626655] The buggy address belongs to the object at fff00000c5a01980 [ 19.626655] which belongs to the cache kmalloc-64 of size 64 [ 19.626713] The buggy address is located 0 bytes to the right of [ 19.626713] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.626779] [ 19.626802] The buggy address belongs to the physical page: [ 19.626836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.626890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.626939] page_type: f5(slab) [ 19.626979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.627031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.627074] page dumped because: kasan: bad access detected [ 19.627106] [ 19.627199] Memory state around the buggy address: [ 19.627235] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.627298] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.627353] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.627392] ^ [ 19.627441] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.627485] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.627536] ================================================================== [ 19.752614] ================================================================== [ 19.752671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.754025] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.754919] [ 19.755464] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.755822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.756172] Hardware name: linux,dummy-virt (DT) [ 19.756298] Call trace: [ 19.756763] show_stack+0x20/0x38 (C) [ 19.757259] dump_stack_lvl+0x8c/0xd0 [ 19.757696] print_report+0x118/0x608 [ 19.757797] kasan_report+0xdc/0x128 [ 19.757845] kasan_check_range+0x100/0x1a8 [ 19.757897] __kasan_check_write+0x20/0x30 [ 19.757951] kasan_atomics_helper+0x1644/0x4858 [ 19.758003] kasan_atomics+0x198/0x2e0 [ 19.759662] kunit_try_run_case+0x170/0x3f0 [ 19.759737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.759797] kthread+0x328/0x630 [ 19.759844] ret_from_fork+0x10/0x20 [ 19.760681] [ 19.760870] Allocated by task 265: [ 19.761210] kasan_save_stack+0x3c/0x68 [ 19.761269] kasan_save_track+0x20/0x40 [ 19.761312] kasan_save_alloc_info+0x40/0x58 [ 19.761365] __kasan_kmalloc+0xd4/0xd8 [ 19.762131] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.762678] kasan_atomics+0xb8/0x2e0 [ 19.762725] kunit_try_run_case+0x170/0x3f0 [ 19.763159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.763564] kthread+0x328/0x630 [ 19.763851] ret_from_fork+0x10/0x20 [ 19.764241] [ 19.764267] The buggy address belongs to the object at fff00000c5a01980 [ 19.764267] which belongs to the cache kmalloc-64 of size 64 [ 19.765013] The buggy address is located 0 bytes to the right of [ 19.765013] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.765288] [ 19.765374] The buggy address belongs to the physical page: [ 19.765451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.765684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.766109] page_type: f5(slab) [ 19.766158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.767120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.767253] page dumped because: kasan: bad access detected [ 19.769323] [ 19.769562] Memory state around the buggy address: [ 19.769604] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.769912] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.770181] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.770559] ^ [ 19.770718] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.772282] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.772571] ================================================================== [ 19.741313] ================================================================== [ 19.741377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.742011] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.742275] [ 19.742315] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.742580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.742623] Hardware name: linux,dummy-virt (DT) [ 19.742655] Call trace: [ 19.742679] show_stack+0x20/0x38 (C) [ 19.742733] dump_stack_lvl+0x8c/0xd0 [ 19.742784] print_report+0x118/0x608 [ 19.743068] kasan_report+0xdc/0x128 [ 19.743163] __asan_report_load8_noabort+0x20/0x30 [ 19.743218] kasan_atomics_helper+0x3db0/0x4858 [ 19.743281] kasan_atomics+0x198/0x2e0 [ 19.743331] kunit_try_run_case+0x170/0x3f0 [ 19.743738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.743800] kthread+0x328/0x630 [ 19.743846] ret_from_fork+0x10/0x20 [ 19.743895] [ 19.743915] Allocated by task 265: [ 19.743946] kasan_save_stack+0x3c/0x68 [ 19.744042] kasan_save_track+0x20/0x40 [ 19.744246] kasan_save_alloc_info+0x40/0x58 [ 19.744773] __kasan_kmalloc+0xd4/0xd8 [ 19.745015] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.745161] kasan_atomics+0xb8/0x2e0 [ 19.745200] kunit_try_run_case+0x170/0x3f0 [ 19.745241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.745288] kthread+0x328/0x630 [ 19.745333] ret_from_fork+0x10/0x20 [ 19.745382] [ 19.745403] The buggy address belongs to the object at fff00000c5a01980 [ 19.745403] which belongs to the cache kmalloc-64 of size 64 [ 19.745685] The buggy address is located 0 bytes to the right of [ 19.745685] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.746074] [ 19.746101] The buggy address belongs to the physical page: [ 19.746136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.746194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.746249] page_type: f5(slab) [ 19.746446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.746618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.746665] page dumped because: kasan: bad access detected [ 19.746745] [ 19.746877] Memory state around the buggy address: [ 19.746917] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.747562] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.747892] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.748120] ^ [ 19.748160] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.748413] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.749874] ================================================================== [ 19.817302] ================================================================== [ 19.817814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.818387] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.819179] [ 19.819221] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.819306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.820620] Hardware name: linux,dummy-virt (DT) [ 19.821032] Call trace: [ 19.821136] show_stack+0x20/0x38 (C) [ 19.821666] dump_stack_lvl+0x8c/0xd0 [ 19.822248] print_report+0x118/0x608 [ 19.822636] kasan_report+0xdc/0x128 [ 19.823016] __asan_report_load8_noabort+0x20/0x30 [ 19.823700] kasan_atomics_helper+0x3e20/0x4858 [ 19.824166] kasan_atomics+0x198/0x2e0 [ 19.824217] kunit_try_run_case+0x170/0x3f0 [ 19.824940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.825099] kthread+0x328/0x630 [ 19.825973] ret_from_fork+0x10/0x20 [ 19.826037] [ 19.826228] Allocated by task 265: [ 19.826386] kasan_save_stack+0x3c/0x68 [ 19.826494] kasan_save_track+0x20/0x40 [ 19.826541] kasan_save_alloc_info+0x40/0x58 [ 19.827170] __kasan_kmalloc+0xd4/0xd8 [ 19.827509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.827557] kasan_atomics+0xb8/0x2e0 [ 19.828091] kunit_try_run_case+0x170/0x3f0 [ 19.828229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.828727] kthread+0x328/0x630 [ 19.829350] ret_from_fork+0x10/0x20 [ 19.829491] [ 19.830230] The buggy address belongs to the object at fff00000c5a01980 [ 19.830230] which belongs to the cache kmalloc-64 of size 64 [ 19.830500] The buggy address is located 0 bytes to the right of [ 19.830500] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.830573] [ 19.830598] The buggy address belongs to the physical page: [ 19.831401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.831791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.832334] page_type: f5(slab) [ 19.832553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.833132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.833808] page dumped because: kasan: bad access detected [ 19.834260] [ 19.834285] Memory state around the buggy address: [ 19.834482] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.835481] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.835778] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.835926] ^ [ 19.836130] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.836227] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.836360] ================================================================== [ 19.451179] ================================================================== [ 19.451230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 19.451281] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.451331] [ 19.451570] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.451668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.451765] Hardware name: linux,dummy-virt (DT) [ 19.451802] Call trace: [ 19.451828] show_stack+0x20/0x38 (C) [ 19.451880] dump_stack_lvl+0x8c/0xd0 [ 19.451931] print_report+0x118/0x608 [ 19.452219] kasan_check_range+0x100/0x1a8 [ 19.453422] kasan_atomics+0x198/0x2e0 [ 19.453600] kthread+0x328/0x630 [ 19.453851] kasan_save_alloc_info+0x40/0x58 [ 19.453893] __kasan_kmalloc+0xd4/0xd8 [ 19.453936] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.453978] kasan_atomics+0xb8/0x2e0 [ 19.454496] ret_from_fork+0x10/0x20 [ 19.454535] [ 19.454557] The buggy address belongs to the object at fff00000c5a01980 [ 19.454557] which belongs to the cache kmalloc-64 of size 64 [ 19.454900] [ 19.454958] The buggy address belongs to the physical page: [ 19.455046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.455134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.455250] page_type: f5(slab) [ 19.455358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.455423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.455465] page dumped because: kasan: bad access detected [ 19.455499] [ 19.455666] Memory state around the buggy address: [ 19.455759] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.455808] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.455860] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.457556] ^ [ 19.457620] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.457667] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.458238] ================================================================== [ 19.729479] ================================================================== [ 19.729541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.729820] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.729936] [ 19.729967] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.730050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.730126] Hardware name: linux,dummy-virt (DT) [ 19.730162] Call trace: [ 19.730187] show_stack+0x20/0x38 (C) [ 19.730240] dump_stack_lvl+0x8c/0xd0 [ 19.730290] print_report+0x118/0x608 [ 19.730350] kasan_report+0xdc/0x128 [ 19.730898] kasan_check_range+0x100/0x1a8 [ 19.731280] __kasan_check_write+0x20/0x30 [ 19.731349] kasan_atomics_helper+0x154c/0x4858 [ 19.731403] kasan_atomics+0x198/0x2e0 [ 19.731457] kunit_try_run_case+0x170/0x3f0 [ 19.731591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.731822] kthread+0x328/0x630 [ 19.731932] ret_from_fork+0x10/0x20 [ 19.732057] [ 19.732117] Allocated by task 265: [ 19.732432] kasan_save_stack+0x3c/0x68 [ 19.732497] kasan_save_track+0x20/0x40 [ 19.732536] kasan_save_alloc_info+0x40/0x58 [ 19.732599] __kasan_kmalloc+0xd4/0xd8 [ 19.732735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.732778] kasan_atomics+0xb8/0x2e0 [ 19.732901] kunit_try_run_case+0x170/0x3f0 [ 19.732942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.733020] kthread+0x328/0x630 [ 19.733057] ret_from_fork+0x10/0x20 [ 19.733095] [ 19.733117] The buggy address belongs to the object at fff00000c5a01980 [ 19.733117] which belongs to the cache kmalloc-64 of size 64 [ 19.733178] The buggy address is located 0 bytes to the right of [ 19.733178] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.733295] [ 19.733320] The buggy address belongs to the physical page: [ 19.733364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.733419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.733468] page_type: f5(slab) [ 19.733508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.733561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.733717] page dumped because: kasan: bad access detected [ 19.733835] [ 19.733855] Memory state around the buggy address: [ 19.733892] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.734091] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.734144] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.734185] ^ [ 19.734802] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.735079] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.735181] ================================================================== [ 19.653233] ================================================================== [ 19.653279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.653330] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.653394] [ 19.653424] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.653506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.653533] Hardware name: linux,dummy-virt (DT) [ 19.653566] Call trace: [ 19.653589] show_stack+0x20/0x38 (C) [ 19.653683] dump_stack_lvl+0x8c/0xd0 [ 19.653893] print_report+0x118/0x608 [ 19.654243] kasan_report+0xdc/0x128 [ 19.654813] kasan_check_range+0x100/0x1a8 [ 19.655062] __kasan_check_write+0x20/0x30 [ 19.655303] kasan_atomics_helper+0x10c0/0x4858 [ 19.655369] kasan_atomics+0x198/0x2e0 [ 19.655463] kunit_try_run_case+0x170/0x3f0 [ 19.655566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655709] kthread+0x328/0x630 [ 19.655754] ret_from_fork+0x10/0x20 [ 19.655802] [ 19.655823] Allocated by task 265: [ 19.655853] kasan_save_stack+0x3c/0x68 [ 19.656053] kasan_save_track+0x20/0x40 [ 19.656129] kasan_save_alloc_info+0x40/0x58 [ 19.656172] __kasan_kmalloc+0xd4/0xd8 [ 19.656230] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.656271] kasan_atomics+0xb8/0x2e0 [ 19.656312] kunit_try_run_case+0x170/0x3f0 [ 19.656570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.656639] kthread+0x328/0x630 [ 19.656675] ret_from_fork+0x10/0x20 [ 19.656714] [ 19.656787] The buggy address belongs to the object at fff00000c5a01980 [ 19.656787] which belongs to the cache kmalloc-64 of size 64 [ 19.656898] The buggy address is located 0 bytes to the right of [ 19.656898] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.657103] [ 19.657160] The buggy address belongs to the physical page: [ 19.657248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.657766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.657834] page_type: f5(slab) [ 19.657896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.658239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.658287] page dumped because: kasan: bad access detected [ 19.658516] [ 19.658590] Memory state around the buggy address: [ 19.658626] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.658831] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.658892] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.659060] ^ [ 19.659105] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.659202] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.659318] ================================================================== [ 19.628043] ================================================================== [ 19.628095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.628157] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.628209] [ 19.628260] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.628559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.628613] Hardware name: linux,dummy-virt (DT) [ 19.628750] Call trace: [ 19.628822] show_stack+0x20/0x38 (C) [ 19.628872] dump_stack_lvl+0x8c/0xd0 [ 19.628928] print_report+0x118/0x608 [ 19.628985] kasan_report+0xdc/0x128 [ 19.629042] kasan_check_range+0x100/0x1a8 [ 19.629093] __kasan_check_write+0x20/0x30 [ 19.629228] kasan_atomics_helper+0xeb8/0x4858 [ 19.629280] kasan_atomics+0x198/0x2e0 [ 19.629333] kunit_try_run_case+0x170/0x3f0 [ 19.629599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.629797] kthread+0x328/0x630 [ 19.629840] ret_from_fork+0x10/0x20 [ 19.629958] [ 19.629980] Allocated by task 265: [ 19.630009] kasan_save_stack+0x3c/0x68 [ 19.630053] kasan_save_track+0x20/0x40 [ 19.630094] kasan_save_alloc_info+0x40/0x58 [ 19.630147] __kasan_kmalloc+0xd4/0xd8 [ 19.630198] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.630241] kasan_atomics+0xb8/0x2e0 [ 19.630279] kunit_try_run_case+0x170/0x3f0 [ 19.630322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.630377] kthread+0x328/0x630 [ 19.630415] ret_from_fork+0x10/0x20 [ 19.630463] [ 19.630485] The buggy address belongs to the object at fff00000c5a01980 [ 19.630485] which belongs to the cache kmalloc-64 of size 64 [ 19.630544] The buggy address is located 0 bytes to the right of [ 19.630544] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.630618] [ 19.630651] The buggy address belongs to the physical page: [ 19.630779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.630834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.630884] page_type: f5(slab) [ 19.630927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.630981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.631034] page dumped because: kasan: bad access detected [ 19.631187] [ 19.631209] Memory state around the buggy address: [ 19.631249] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.631294] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.631371] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.631414] ^ [ 19.631450] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.631503] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.631542] ================================================================== [ 19.706971] ================================================================== [ 19.707026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.707079] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.707130] [ 19.707163] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.707246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.707274] Hardware name: linux,dummy-virt (DT) [ 19.707306] Call trace: [ 19.707329] show_stack+0x20/0x38 (C) [ 19.707392] dump_stack_lvl+0x8c/0xd0 [ 19.707445] print_report+0x118/0x608 [ 19.707506] kasan_report+0xdc/0x128 [ 19.707555] kasan_check_range+0x100/0x1a8 [ 19.707678] __kasan_check_write+0x20/0x30 [ 19.707933] kasan_atomics_helper+0x1414/0x4858 [ 19.708602] kasan_atomics+0x198/0x2e0 [ 19.708738] kunit_try_run_case+0x170/0x3f0 [ 19.710298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.710568] kthread+0x328/0x630 [ 19.710966] ret_from_fork+0x10/0x20 [ 19.711023] [ 19.711043] Allocated by task 265: [ 19.711074] kasan_save_stack+0x3c/0x68 [ 19.711120] kasan_save_track+0x20/0x40 [ 19.711653] kasan_save_alloc_info+0x40/0x58 [ 19.712112] __kasan_kmalloc+0xd4/0xd8 [ 19.712178] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.712221] kasan_atomics+0xb8/0x2e0 [ 19.712259] kunit_try_run_case+0x170/0x3f0 [ 19.712300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.712722] kthread+0x328/0x630 [ 19.712776] ret_from_fork+0x10/0x20 [ 19.712818] [ 19.712842] The buggy address belongs to the object at fff00000c5a01980 [ 19.712842] which belongs to the cache kmalloc-64 of size 64 [ 19.712960] The buggy address is located 0 bytes to the right of [ 19.712960] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.713257] [ 19.713279] The buggy address belongs to the physical page: [ 19.713313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.713638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.714139] page_type: f5(slab) [ 19.714245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.714309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.714364] page dumped because: kasan: bad access detected [ 19.714399] [ 19.714526] Memory state around the buggy address: [ 19.714570] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.714617] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.714677] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.714880] ^ [ 19.714923] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.715039] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.715078] ================================================================== [ 19.795930] ================================================================== [ 19.796176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.796725] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.796815] [ 19.797459] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.798442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.798484] Hardware name: linux,dummy-virt (DT) [ 19.798655] Call trace: [ 19.799030] show_stack+0x20/0x38 (C) [ 19.799182] dump_stack_lvl+0x8c/0xd0 [ 19.799881] print_report+0x118/0x608 [ 19.799982] kasan_report+0xdc/0x128 [ 19.800032] kasan_check_range+0x100/0x1a8 [ 19.800082] __kasan_check_write+0x20/0x30 [ 19.800431] kasan_atomics_helper+0x16d0/0x4858 [ 19.801223] kasan_atomics+0x198/0x2e0 [ 19.801745] kunit_try_run_case+0x170/0x3f0 [ 19.802208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.802691] kthread+0x328/0x630 [ 19.803084] ret_from_fork+0x10/0x20 [ 19.803283] [ 19.803323] Allocated by task 265: [ 19.803442] kasan_save_stack+0x3c/0x68 [ 19.803876] kasan_save_track+0x20/0x40 [ 19.804460] kasan_save_alloc_info+0x40/0x58 [ 19.805101] __kasan_kmalloc+0xd4/0xd8 [ 19.805565] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.805633] kasan_atomics+0xb8/0x2e0 [ 19.805674] kunit_try_run_case+0x170/0x3f0 [ 19.805715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.805764] kthread+0x328/0x630 [ 19.806506] ret_from_fork+0x10/0x20 [ 19.806637] [ 19.806661] The buggy address belongs to the object at fff00000c5a01980 [ 19.806661] which belongs to the cache kmalloc-64 of size 64 [ 19.806723] The buggy address is located 0 bytes to the right of [ 19.806723] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.806790] [ 19.806813] The buggy address belongs to the physical page: [ 19.808491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.808553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.808615] page_type: f5(slab) [ 19.808657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.808709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.808752] page dumped because: kasan: bad access detected [ 19.808787] [ 19.808807] Memory state around the buggy address: [ 19.808843] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.808890] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.808937] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.808977] ^ [ 19.809013] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.809059] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.809099] ================================================================== [ 19.601960] ================================================================== [ 19.602405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.602544] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.602619] [ 19.602655] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.602739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.603096] Hardware name: linux,dummy-virt (DT) [ 19.603136] Call trace: [ 19.603200] show_stack+0x20/0x38 (C) [ 19.603405] dump_stack_lvl+0x8c/0xd0 [ 19.603462] print_report+0x118/0x608 [ 19.603569] kasan_report+0xdc/0x128 [ 19.603621] kasan_check_range+0x100/0x1a8 [ 19.603672] __kasan_check_read+0x20/0x30 [ 19.603722] kasan_atomics_helper+0xdd4/0x4858 [ 19.603772] kasan_atomics+0x198/0x2e0 [ 19.603855] kunit_try_run_case+0x170/0x3f0 [ 19.603914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.604109] kthread+0x328/0x630 [ 19.604156] ret_from_fork+0x10/0x20 [ 19.604264] [ 19.604314] Allocated by task 265: [ 19.604392] kasan_save_stack+0x3c/0x68 [ 19.604438] kasan_save_track+0x20/0x40 [ 19.604479] kasan_save_alloc_info+0x40/0x58 [ 19.605680] __kasan_kmalloc+0xd4/0xd8 [ 19.605736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.606044] kasan_atomics+0xb8/0x2e0 [ 19.606092] kunit_try_run_case+0x170/0x3f0 [ 19.606138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.606636] kthread+0x328/0x630 [ 19.606780] ret_from_fork+0x10/0x20 [ 19.606822] [ 19.606845] The buggy address belongs to the object at fff00000c5a01980 [ 19.606845] which belongs to the cache kmalloc-64 of size 64 [ 19.606908] The buggy address is located 0 bytes to the right of [ 19.606908] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.606976] [ 19.607000] The buggy address belongs to the physical page: [ 19.607035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.607088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.607803] page_type: f5(slab) [ 19.608075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.608226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.608276] page dumped because: kasan: bad access detected [ 19.608409] [ 19.608436] Memory state around the buggy address: [ 19.608473] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.608604] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.608699] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.608810] ^ [ 19.608846] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.608891] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.608932] ================================================================== [ 19.446714] ================================================================== [ 19.446766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 19.446819] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.446870] [ 19.446903] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.446987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.447014] Hardware name: linux,dummy-virt (DT) [ 19.447047] Call trace: [ 19.447071] show_stack+0x20/0x38 (C) [ 19.447121] dump_stack_lvl+0x8c/0xd0 [ 19.447219] print_report+0x118/0x608 [ 19.447272] kasan_report+0xdc/0x128 [ 19.447320] kasan_check_range+0x100/0x1a8 [ 19.447382] __kasan_check_write+0x20/0x30 [ 19.447435] kasan_atomics_helper+0x5b4/0x4858 [ 19.447484] kasan_atomics+0x198/0x2e0 [ 19.447532] kunit_try_run_case+0x170/0x3f0 [ 19.447582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.447752] [ 19.447852] Allocated by task 265: [ 19.448012] kasan_save_stack+0x3c/0x68 [ 19.448057] kasan_save_track+0x20/0x40 [ 19.448104] kasan_save_alloc_info+0x40/0x58 [ 19.448288] __kasan_kmalloc+0xd4/0xd8 [ 19.448334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.448392] kasan_atomics+0xb8/0x2e0 [ 19.448431] kunit_try_run_case+0x170/0x3f0 [ 19.448611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.448721] kthread+0x328/0x630 [ 19.448802] ret_from_fork+0x10/0x20 [ 19.448873] [ 19.448960] The buggy address is located 0 bytes to the right of [ 19.448960] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.449149] [ 19.449197] The buggy address belongs to the physical page: [ 19.449295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.449356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.449405] page_type: f5(slab) [ 19.449445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.449497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.449539] page dumped because: kasan: bad access detected [ 19.449572] [ 19.449592] Memory state around the buggy address: [ 19.449625] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.449670] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.449713] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.449753] ^ [ 19.449785] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.450418] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.450469] ================================================================== [ 19.503615] ================================================================== [ 19.503694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.503750] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.503802] [ 19.504019] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.504130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.504161] Hardware name: linux,dummy-virt (DT) [ 19.504195] Call trace: [ 19.504218] show_stack+0x20/0x38 (C) [ 19.504503] dump_stack_lvl+0x8c/0xd0 [ 19.504662] print_report+0x118/0x608 [ 19.504711] kasan_report+0xdc/0x128 [ 19.504760] kasan_check_range+0x100/0x1a8 [ 19.504922] __kasan_check_write+0x20/0x30 [ 19.505565] kthread+0x328/0x630 [ 19.505770] kasan_save_track+0x20/0x40 [ 19.506883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.509307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.512609] ret_from_fork+0x10/0x20 [ 19.512720] [ 19.512780] Allocated by task 265: [ 19.512816] kasan_save_stack+0x3c/0x68 [ 19.512893] kasan_save_track+0x20/0x40 [ 19.512936] kasan_save_alloc_info+0x40/0x58 [ 19.512978] __kasan_kmalloc+0xd4/0xd8 [ 19.513056] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.513170] kasan_atomics+0xb8/0x2e0 [ 19.513264] kunit_try_run_case+0x170/0x3f0 [ 19.513305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.513361] kthread+0x328/0x630 [ 19.513435] ret_from_fork+0x10/0x20 [ 19.513569] [ 19.513590] The buggy address belongs to the object at fff00000c5a01980 [ 19.513590] which belongs to the cache kmalloc-64 of size 64 [ 19.514669] The buggy address is located 0 bytes to the right of [ 19.514669] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.514748] [ 19.514782] The buggy address belongs to the physical page: [ 19.514818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.514874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.514924] page_type: f5(slab) [ 19.514965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.515016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.515059] page dumped because: kasan: bad access detected [ 19.515148] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.516401] show_stack+0x20/0x38 (C) [ 19.517130] kasan_save_track+0x20/0x40 [ 19.517170] kasan_save_alloc_info+0x40/0x58 [ 19.517213] __kasan_kmalloc+0xd4/0xd8 [ 19.517254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.517297] kasan_atomics+0xb8/0x2e0 [ 19.517334] kunit_try_run_case+0x170/0x3f0 [ 19.517869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.517995] kthread+0x328/0x630 [ 19.518225] ret_from_fork+0x10/0x20 [ 19.518335] [ 19.518410] The buggy address belongs to the object at fff00000c5a01980 [ 19.518410] which belongs to the cache kmalloc-64 of size 64 [ 19.518622] The buggy address is located 0 bytes to the right of [ 19.518622] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.519023] page dumped because: kasan: bad access detected [ 19.519794] ================================================================== [ 19.564220] ================================================================== [ 19.564297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.564378] Read of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.564431] [ 19.564470] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.564576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.564627] Hardware name: linux,dummy-virt (DT) [ 19.564662] Call trace: [ 19.565309] show_stack+0x20/0x38 (C) [ 19.565438] dump_stack_lvl+0x8c/0xd0 [ 19.565533] print_report+0x118/0x608 [ 19.565599] kasan_report+0xdc/0x128 [ 19.565676] __asan_report_load4_noabort+0x20/0x30 [ 19.565758] kasan_atomics_helper+0x3dd8/0x4858 [ 19.565812] kasan_atomics+0x198/0x2e0 [ 19.565883] kunit_try_run_case+0x170/0x3f0 [ 19.565991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.566059] kthread+0x328/0x630 [ 19.566103] ret_from_fork+0x10/0x20 [ 19.566384] [ 19.566408] Allocated by task 265: [ 19.566496] kasan_save_stack+0x3c/0x68 [ 19.566592] kasan_save_track+0x20/0x40 [ 19.566702] kasan_save_alloc_info+0x40/0x58 [ 19.566863] __kasan_kmalloc+0xd4/0xd8 [ 19.566939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.567199] kasan_atomics+0xb8/0x2e0 [ 19.567294] kunit_try_run_case+0x170/0x3f0 [ 19.567428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.567502] kthread+0x328/0x630 [ 19.567538] ret_from_fork+0x10/0x20 [ 19.567577] [ 19.569057] The buggy address belongs to the object at fff00000c5a01980 [ 19.569057] which belongs to the cache kmalloc-64 of size 64 [ 19.569131] The buggy address is located 0 bytes to the right of [ 19.569131] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.569197] [ 19.569221] The buggy address belongs to the physical page: [ 19.569268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.570185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.570277] page_type: f5(slab) [ 19.570350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.570422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.570678] page dumped because: kasan: bad access detected [ 19.570759] [ 19.570848] Memory state around the buggy address: [ 19.570889] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.571491] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.571553] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.571616] ^ [ 19.571738] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.571803] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.571845] ================================================================== [ 19.716214] ================================================================== [ 19.716410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.716486] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.716594] [ 19.716626] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.716708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.716743] Hardware name: linux,dummy-virt (DT) [ 19.716873] Call trace: [ 19.716898] show_stack+0x20/0x38 (C) [ 19.717090] dump_stack_lvl+0x8c/0xd0 [ 19.717141] print_report+0x118/0x608 [ 19.717190] kasan_report+0xdc/0x128 [ 19.717240] kasan_check_range+0x100/0x1a8 [ 19.717290] __kasan_check_write+0x20/0x30 [ 19.717347] kasan_atomics_helper+0x147c/0x4858 [ 19.717398] kasan_atomics+0x198/0x2e0 [ 19.717445] kunit_try_run_case+0x170/0x3f0 [ 19.717495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.717550] kthread+0x328/0x630 [ 19.717769] ret_from_fork+0x10/0x20 [ 19.717841] [ 19.717861] Allocated by task 265: [ 19.717889] kasan_save_stack+0x3c/0x68 [ 19.717942] kasan_save_track+0x20/0x40 [ 19.717981] kasan_save_alloc_info+0x40/0x58 [ 19.718766] __kasan_kmalloc+0xd4/0xd8 [ 19.719205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.719481] kasan_atomics+0xb8/0x2e0 [ 19.719529] kunit_try_run_case+0x170/0x3f0 [ 19.719571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.719617] kthread+0x328/0x630 [ 19.719653] ret_from_fork+0x10/0x20 [ 19.719692] [ 19.720154] The buggy address belongs to the object at fff00000c5a01980 [ 19.720154] which belongs to the cache kmalloc-64 of size 64 [ 19.720327] The buggy address is located 0 bytes to the right of [ 19.720327] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.720443] [ 19.720549] The buggy address belongs to the physical page: [ 19.720617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.720715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.720895] page_type: f5(slab) [ 19.720954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.721008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.721074] page dumped because: kasan: bad access detected [ 19.721116] [ 19.721143] Memory state around the buggy address: [ 19.721183] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.721229] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.721275] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.721351] ^ [ 19.721386] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.721430] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.721468] ================================================================== [ 19.631860] ================================================================== [ 19.631983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.632118] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.632168] [ 19.632215] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.632403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.632440] Hardware name: linux,dummy-virt (DT) [ 19.632471] Call trace: [ 19.632495] show_stack+0x20/0x38 (C) [ 19.632546] dump_stack_lvl+0x8c/0xd0 [ 19.632602] print_report+0x118/0x608 [ 19.632838] kasan_report+0xdc/0x128 [ 19.632888] kasan_check_range+0x100/0x1a8 [ 19.633033] __kasan_check_write+0x20/0x30 [ 19.633176] kasan_atomics_helper+0xf20/0x4858 [ 19.633228] kasan_atomics+0x198/0x2e0 [ 19.633275] kunit_try_run_case+0x170/0x3f0 [ 19.633326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.633390] kthread+0x328/0x630 [ 19.633435] ret_from_fork+0x10/0x20 [ 19.633482] [ 19.633502] Allocated by task 265: [ 19.633548] kasan_save_stack+0x3c/0x68 [ 19.633591] kasan_save_track+0x20/0x40 [ 19.633644] kasan_save_alloc_info+0x40/0x58 [ 19.633686] __kasan_kmalloc+0xd4/0xd8 [ 19.633751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.633995] kasan_atomics+0xb8/0x2e0 [ 19.634067] kunit_try_run_case+0x170/0x3f0 [ 19.634137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.634185] kthread+0x328/0x630 [ 19.634236] ret_from_fork+0x10/0x20 [ 19.634275] [ 19.634296] The buggy address belongs to the object at fff00000c5a01980 [ 19.634296] which belongs to the cache kmalloc-64 of size 64 [ 19.634365] The buggy address is located 0 bytes to the right of [ 19.634365] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.634439] [ 19.634462] The buggy address belongs to the physical page: [ 19.634506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.634559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.634608] page_type: f5(slab) [ 19.634685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.634804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.634854] page dumped because: kasan: bad access detected [ 19.634896] [ 19.634916] Memory state around the buggy address: [ 19.634949] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.635006] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.635050] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.635110] ^ [ 19.635256] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635358] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635400] ================================================================== [ 19.610465] ================================================================== [ 19.610527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.612288] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.612592] [ 19.612778] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.612921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.612951] Hardware name: linux,dummy-virt (DT) [ 19.612984] Call trace: [ 19.613007] show_stack+0x20/0x38 (C) [ 19.613742] dump_stack_lvl+0x8c/0xd0 [ 19.613806] print_report+0x118/0x608 [ 19.614443] kasan_report+0xdc/0x128 [ 19.615054] __asan_report_load8_noabort+0x20/0x30 [ 19.615115] kasan_atomics_helper+0x3f58/0x4858 [ 19.615190] kasan_atomics+0x198/0x2e0 [ 19.615363] kunit_try_run_case+0x170/0x3f0 [ 19.615603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.615784] kthread+0x328/0x630 [ 19.615989] ret_from_fork+0x10/0x20 [ 19.616078] [ 19.616110] Allocated by task 265: [ 19.616185] kasan_save_stack+0x3c/0x68 [ 19.616269] kasan_save_track+0x20/0x40 [ 19.616348] kasan_save_alloc_info+0x40/0x58 [ 19.616394] __kasan_kmalloc+0xd4/0xd8 [ 19.616434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.616477] kasan_atomics+0xb8/0x2e0 [ 19.616537] kunit_try_run_case+0x170/0x3f0 [ 19.616683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.616731] kthread+0x328/0x630 [ 19.616884] ret_from_fork+0x10/0x20 [ 19.616955] [ 19.617050] The buggy address belongs to the object at fff00000c5a01980 [ 19.617050] which belongs to the cache kmalloc-64 of size 64 [ 19.617109] The buggy address is located 0 bytes to the right of [ 19.617109] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.617183] [ 19.617209] The buggy address belongs to the physical page: [ 19.617242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.617304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.617689] page_type: f5(slab) [ 19.617967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.618026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.618475] page dumped because: kasan: bad access detected [ 19.618753] [ 19.618776] Memory state around the buggy address: [ 19.618811] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.618900] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.619054] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.619097] ^ [ 19.619133] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.619178] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.619247] ================================================================== [ 19.693533] ================================================================== [ 19.693590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.693885] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.694065] [ 19.694100] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.694185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.694238] Hardware name: linux,dummy-virt (DT) [ 19.694272] Call trace: [ 19.694295] show_stack+0x20/0x38 (C) [ 19.694376] dump_stack_lvl+0x8c/0xd0 [ 19.694645] print_report+0x118/0x608 [ 19.694755] kasan_report+0xdc/0x128 [ 19.694859] kasan_check_range+0x100/0x1a8 [ 19.695000] __kasan_check_write+0x20/0x30 [ 19.695096] kasan_atomics_helper+0x1384/0x4858 [ 19.695168] kasan_atomics+0x198/0x2e0 [ 19.695450] kunit_try_run_case+0x170/0x3f0 [ 19.695502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.695558] kthread+0x328/0x630 [ 19.695605] ret_from_fork+0x10/0x20 [ 19.695659] [ 19.695771] Allocated by task 265: [ 19.695926] kasan_save_stack+0x3c/0x68 [ 19.696113] kasan_save_track+0x20/0x40 [ 19.696155] kasan_save_alloc_info+0x40/0x58 [ 19.696216] __kasan_kmalloc+0xd4/0xd8 [ 19.696982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.697357] kasan_atomics+0xb8/0x2e0 [ 19.697401] kunit_try_run_case+0x170/0x3f0 [ 19.697443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.697688] kthread+0x328/0x630 [ 19.697782] ret_from_fork+0x10/0x20 [ 19.697840] [ 19.697862] The buggy address belongs to the object at fff00000c5a01980 [ 19.697862] which belongs to the cache kmalloc-64 of size 64 [ 19.698033] The buggy address is located 0 bytes to the right of [ 19.698033] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.698110] [ 19.698164] The buggy address belongs to the physical page: [ 19.698206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.698261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.698311] page_type: f5(slab) [ 19.698360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.698414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.698457] page dumped because: kasan: bad access detected [ 19.698491] [ 19.698511] Memory state around the buggy address: [ 19.698901] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.699051] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.699098] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.699140] ^ [ 19.699543] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.699593] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.699632] ================================================================== [ 19.641063] ================================================================== [ 19.641112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.641177] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.641239] [ 19.641269] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.641363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.641392] Hardware name: linux,dummy-virt (DT) [ 19.641423] Call trace: [ 19.641446] show_stack+0x20/0x38 (C) [ 19.641589] dump_stack_lvl+0x8c/0xd0 [ 19.641695] print_report+0x118/0x608 [ 19.641745] kasan_report+0xdc/0x128 [ 19.641798] kasan_check_range+0x100/0x1a8 [ 19.642028] __kasan_check_write+0x20/0x30 [ 19.642290] kasan_atomics_helper+0xff0/0x4858 [ 19.642352] kasan_atomics+0x198/0x2e0 [ 19.642401] kunit_try_run_case+0x170/0x3f0 [ 19.642453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.642507] kthread+0x328/0x630 [ 19.642552] ret_from_fork+0x10/0x20 [ 19.642601] [ 19.642621] Allocated by task 265: [ 19.642997] kasan_save_stack+0x3c/0x68 [ 19.643082] kasan_save_track+0x20/0x40 [ 19.643210] kasan_save_alloc_info+0x40/0x58 [ 19.643252] __kasan_kmalloc+0xd4/0xd8 [ 19.643294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.643392] kasan_atomics+0xb8/0x2e0 [ 19.643581] kunit_try_run_case+0x170/0x3f0 [ 19.643654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.643741] kthread+0x328/0x630 [ 19.643884] ret_from_fork+0x10/0x20 [ 19.643923] [ 19.643990] The buggy address belongs to the object at fff00000c5a01980 [ 19.643990] which belongs to the cache kmalloc-64 of size 64 [ 19.644175] The buggy address is located 0 bytes to the right of [ 19.644175] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.644257] [ 19.644279] The buggy address belongs to the physical page: [ 19.644313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.644402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.644557] page_type: f5(slab) [ 19.644603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.644827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.644903] page dumped because: kasan: bad access detected [ 19.644949] [ 19.644971] Memory state around the buggy address: [ 19.645005] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645112] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645212] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.645332] ^ [ 19.645375] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.645419] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.645460] ================================================================== [ 19.809605] ================================================================== [ 19.809658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.809722] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.809774] [ 19.809808] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.809891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.809927] Hardware name: linux,dummy-virt (DT) [ 19.809958] Call trace: [ 19.809982] show_stack+0x20/0x38 (C) [ 19.810033] dump_stack_lvl+0x8c/0xd0 [ 19.810084] print_report+0x118/0x608 [ 19.810133] kasan_report+0xdc/0x128 [ 19.810182] __asan_report_load8_noabort+0x20/0x30 [ 19.810235] kasan_atomics_helper+0x3e10/0x4858 [ 19.810286] kasan_atomics+0x198/0x2e0 [ 19.810335] kunit_try_run_case+0x170/0x3f0 [ 19.810501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.810559] kthread+0x328/0x630 [ 19.810604] ret_from_fork+0x10/0x20 [ 19.810653] [ 19.810673] Allocated by task 265: [ 19.810703] kasan_save_stack+0x3c/0x68 [ 19.810745] kasan_save_track+0x20/0x40 [ 19.810786] kasan_save_alloc_info+0x40/0x58 [ 19.810827] __kasan_kmalloc+0xd4/0xd8 [ 19.810866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.811035] kasan_atomics+0xb8/0x2e0 [ 19.811093] kunit_try_run_case+0x170/0x3f0 [ 19.811298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.811374] kthread+0x328/0x630 [ 19.811418] ret_from_fork+0x10/0x20 [ 19.811456] [ 19.811480] The buggy address belongs to the object at fff00000c5a01980 [ 19.811480] which belongs to the cache kmalloc-64 of size 64 [ 19.811539] The buggy address is located 0 bytes to the right of [ 19.811539] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.811607] [ 19.811629] The buggy address belongs to the physical page: [ 19.811663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.812407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.813365] page_type: f5(slab) [ 19.813412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.813465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.813510] page dumped because: kasan: bad access detected [ 19.813545] [ 19.813565] Memory state around the buggy address: [ 19.813602] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.813648] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.813694] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.813736] ^ [ 19.813772] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.813818] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.813857] ================================================================== [ 19.459573] ================================================================== [ 19.459625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 19.459679] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.459732] [ 19.459764] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.460153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.460184] Hardware name: linux,dummy-virt (DT) [ 19.460217] Call trace: [ 19.460242] show_stack+0x20/0x38 (C) [ 19.460292] dump_stack_lvl+0x8c/0xd0 [ 19.460474] print_report+0x118/0x608 [ 19.460526] kasan_report+0xdc/0x128 [ 19.460597] kasan_check_range+0x100/0x1a8 [ 19.460650] __kasan_check_write+0x20/0x30 [ 19.460707] kasan_atomics_helper+0x684/0x4858 [ 19.464913] __kasan_check_write+0x20/0x30 [ 19.464982] kasan_atomics_helper+0x6ec/0x4858 [ 19.472713] [ 19.472763] The buggy address belongs to the physical page: [ 19.472940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.473151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.473192] page dumped because: kasan: bad access detected [ 19.474022] [ 19.474109] Memory state around the buggy address: [ 19.474217] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.474270] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.474329] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.474541] ^ [ 19.474720] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474829] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474913] ================================================================== [ 19.583766] ================================================================== [ 19.585950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.586022] Read of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.587628] [ 19.587666] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.588217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.588306] Hardware name: linux,dummy-virt (DT) [ 19.588810] Call trace: [ 19.590133] show_stack+0x20/0x38 (C) [ 19.590194] dump_stack_lvl+0x8c/0xd0 [ 19.590353] print_report+0x118/0x608 [ 19.590461] kasan_report+0xdc/0x128 [ 19.590538] __asan_report_load4_noabort+0x20/0x30 [ 19.591051] kasan_atomics_helper+0x3e04/0x4858 [ 19.591306] kasan_atomics+0x198/0x2e0 [ 19.591370] kunit_try_run_case+0x170/0x3f0 [ 19.591457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.591514] kthread+0x328/0x630 [ 19.591560] ret_from_fork+0x10/0x20 [ 19.591613] [ 19.591633] Allocated by task 265: [ 19.591664] kasan_save_stack+0x3c/0x68 [ 19.591709] kasan_save_track+0x20/0x40 [ 19.592439] kasan_save_alloc_info+0x40/0x58 [ 19.592544] __kasan_kmalloc+0xd4/0xd8 [ 19.592913] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.593018] kasan_atomics+0xb8/0x2e0 [ 19.593676] kunit_try_run_case+0x170/0x3f0 [ 19.593854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.594118] kthread+0x328/0x630 [ 19.595388] ret_from_fork+0x10/0x20 [ 19.595441] [ 19.595787] The buggy address belongs to the object at fff00000c5a01980 [ 19.595787] which belongs to the cache kmalloc-64 of size 64 [ 19.596060] The buggy address is located 0 bytes to the right of [ 19.596060] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.596134] [ 19.596195] The buggy address belongs to the physical page: [ 19.596293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.596456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.596615] page_type: f5(slab) [ 19.596657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.596712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.596754] page dumped because: kasan: bad access detected [ 19.596788] [ 19.596849] Memory state around the buggy address: [ 19.596960] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.597007] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.597071] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.597113] ^ [ 19.597211] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.597293] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.598100] ================================================================== [ 19.574053] ================================================================== [ 19.574182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.574245] Write of size 4 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.574314] [ 19.574624] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.574960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.575070] Hardware name: linux,dummy-virt (DT) [ 19.575173] Call trace: [ 19.575296] show_stack+0x20/0x38 (C) [ 19.575511] dump_stack_lvl+0x8c/0xd0 [ 19.575676] print_report+0x118/0x608 [ 19.575731] kasan_report+0xdc/0x128 [ 19.576012] kasan_check_range+0x100/0x1a8 [ 19.576216] __kasan_check_write+0x20/0x30 [ 19.576286] kasan_atomics_helper+0xd3c/0x4858 [ 19.576478] kasan_atomics+0x198/0x2e0 [ 19.576614] kunit_try_run_case+0x170/0x3f0 [ 19.576784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.576889] kthread+0x328/0x630 [ 19.576962] ret_from_fork+0x10/0x20 [ 19.577066] [ 19.577360] Allocated by task 265: [ 19.577400] kasan_save_stack+0x3c/0x68 [ 19.577450] kasan_save_track+0x20/0x40 [ 19.577491] kasan_save_alloc_info+0x40/0x58 [ 19.577535] __kasan_kmalloc+0xd4/0xd8 [ 19.577622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.577667] kasan_atomics+0xb8/0x2e0 [ 19.577726] kunit_try_run_case+0x170/0x3f0 [ 19.577780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.577833] kthread+0x328/0x630 [ 19.577868] ret_from_fork+0x10/0x20 [ 19.578377] [ 19.578439] The buggy address belongs to the object at fff00000c5a01980 [ 19.578439] which belongs to the cache kmalloc-64 of size 64 [ 19.578504] The buggy address is located 0 bytes to the right of [ 19.578504] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.578572] [ 19.578595] The buggy address belongs to the physical page: [ 19.578630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.579114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.580517] page_type: f5(slab) [ 19.580580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.580634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.580722] page dumped because: kasan: bad access detected [ 19.580756] [ 19.580777] Memory state around the buggy address: [ 19.580825] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.580930] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.580985] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.581026] ^ [ 19.581517] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.581774] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.581939] ================================================================== [ 19.679672] ================================================================== [ 19.679728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.679792] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.679993] [ 19.680029] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.680311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.680462] Hardware name: linux,dummy-virt (DT) [ 19.680630] Call trace: [ 19.680756] show_stack+0x20/0x38 (C) [ 19.680942] dump_stack_lvl+0x8c/0xd0 [ 19.681061] print_report+0x118/0x608 [ 19.681298] kasan_report+0xdc/0x128 [ 19.681682] kasan_check_range+0x100/0x1a8 [ 19.681815] __kasan_check_write+0x20/0x30 [ 19.682253] kasan_atomics_helper+0x126c/0x4858 [ 19.682320] kasan_atomics+0x198/0x2e0 [ 19.682660] kunit_try_run_case+0x170/0x3f0 [ 19.682717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.682775] kthread+0x328/0x630 [ 19.683092] ret_from_fork+0x10/0x20 [ 19.683154] [ 19.683175] Allocated by task 265: [ 19.683206] kasan_save_stack+0x3c/0x68 [ 19.683250] kasan_save_track+0x20/0x40 [ 19.683291] kasan_save_alloc_info+0x40/0x58 [ 19.683332] __kasan_kmalloc+0xd4/0xd8 [ 19.683384] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.683431] kasan_atomics+0xb8/0x2e0 [ 19.683468] kunit_try_run_case+0x170/0x3f0 [ 19.683510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.683568] kthread+0x328/0x630 [ 19.683602] ret_from_fork+0x10/0x20 [ 19.683641] [ 19.683662] The buggy address belongs to the object at fff00000c5a01980 [ 19.683662] which belongs to the cache kmalloc-64 of size 64 [ 19.683932] The buggy address is located 0 bytes to the right of [ 19.683932] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.684039] [ 19.684062] The buggy address belongs to the physical page: [ 19.684096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.684150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.684355] page_type: f5(slab) [ 19.684500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.684638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.684700] page dumped because: kasan: bad access detected [ 19.684787] [ 19.684840] Memory state around the buggy address: [ 19.684885] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.684931] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.684977] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.685979] ^ [ 19.686020] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686064] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686104] ================================================================== [ 19.619890] ================================================================== [ 19.619942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.619995] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.620047] [ 19.620080] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.620405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.620439] Hardware name: linux,dummy-virt (DT) [ 19.620477] Call trace: [ 19.620515] show_stack+0x20/0x38 (C) [ 19.620566] dump_stack_lvl+0x8c/0xd0 [ 19.620616] print_report+0x118/0x608 [ 19.620663] kasan_report+0xdc/0x128 [ 19.620712] kasan_check_range+0x100/0x1a8 [ 19.620761] __kasan_check_write+0x20/0x30 [ 19.620809] kasan_atomics_helper+0xe44/0x4858 [ 19.620858] kasan_atomics+0x198/0x2e0 [ 19.621960] kunit_try_run_case+0x170/0x3f0 [ 19.622015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.622071] kthread+0x328/0x630 [ 19.622115] ret_from_fork+0x10/0x20 [ 19.622177] [ 19.622197] Allocated by task 265: [ 19.622237] kasan_save_stack+0x3c/0x68 [ 19.622282] kasan_save_track+0x20/0x40 [ 19.622321] kasan_save_alloc_info+0x40/0x58 [ 19.622372] __kasan_kmalloc+0xd4/0xd8 [ 19.622413] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.622455] kasan_atomics+0xb8/0x2e0 [ 19.622503] kunit_try_run_case+0x170/0x3f0 [ 19.622544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.622602] kthread+0x328/0x630 [ 19.622652] ret_from_fork+0x10/0x20 [ 19.622690] [ 19.622714] The buggy address belongs to the object at fff00000c5a01980 [ 19.622714] which belongs to the cache kmalloc-64 of size 64 [ 19.622796] The buggy address is located 0 bytes to the right of [ 19.622796] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.622862] [ 19.622884] The buggy address belongs to the physical page: [ 19.622918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.622980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.623039] page_type: f5(slab) [ 19.623084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.623161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.623204] page dumped because: kasan: bad access detected [ 19.623238] [ 19.623258] Memory state around the buggy address: [ 19.623290] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.623375] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.623430] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.623541] ^ [ 19.623580] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.623696] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.623736] ================================================================== [ 19.773820] ================================================================== [ 19.773877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.776036] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.776130] [ 19.776171] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.776257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.776285] Hardware name: linux,dummy-virt (DT) [ 19.777304] Call trace: [ 19.777713] show_stack+0x20/0x38 (C) [ 19.777779] dump_stack_lvl+0x8c/0xd0 [ 19.777833] print_report+0x118/0x608 [ 19.778913] kasan_report+0xdc/0x128 [ 19.779003] __asan_report_load8_noabort+0x20/0x30 [ 19.779427] kasan_atomics_helper+0x3df4/0x4858 [ 19.779861] kasan_atomics+0x198/0x2e0 [ 19.780115] kunit_try_run_case+0x170/0x3f0 [ 19.780298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.780494] kthread+0x328/0x630 [ 19.780706] ret_from_fork+0x10/0x20 [ 19.781278] [ 19.781302] Allocated by task 265: [ 19.781333] kasan_save_stack+0x3c/0x68 [ 19.781392] kasan_save_track+0x20/0x40 [ 19.781432] kasan_save_alloc_info+0x40/0x58 [ 19.781475] __kasan_kmalloc+0xd4/0xd8 [ 19.781973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.782849] kasan_atomics+0xb8/0x2e0 [ 19.783024] kunit_try_run_case+0x170/0x3f0 [ 19.783265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.783319] kthread+0x328/0x630 [ 19.784005] ret_from_fork+0x10/0x20 [ 19.785155] [ 19.785354] The buggy address belongs to the object at fff00000c5a01980 [ 19.785354] which belongs to the cache kmalloc-64 of size 64 [ 19.785896] The buggy address is located 0 bytes to the right of [ 19.785896] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.786054] [ 19.786079] The buggy address belongs to the physical page: [ 19.786516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.786763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.786835] page_type: f5(slab) [ 19.787253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.787543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.787591] page dumped because: kasan: bad access detected [ 19.787628] [ 19.788625] Memory state around the buggy address: [ 19.789028] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.789488] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.789542] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.789584] ^ [ 19.790270] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.790724] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.791258] ================================================================== [ 19.814331] ================================================================== [ 19.814396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.814450] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.814501] [ 19.814535] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.814619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.814646] Hardware name: linux,dummy-virt (DT) [ 19.814679] Call trace: [ 19.814702] show_stack+0x20/0x38 (C) [ 19.814751] dump_stack_lvl+0x8c/0xd0 [ 19.814801] print_report+0x118/0x608 [ 19.814851] kasan_report+0xdc/0x128 [ 19.814913] kasan_check_range+0x100/0x1a8 [ 19.814964] __kasan_check_write+0x20/0x30 [ 19.815012] kasan_atomics_helper+0x175c/0x4858 [ 19.815064] kasan_atomics+0x198/0x2e0 [ 19.815114] kunit_try_run_case+0x170/0x3f0 [ 19.815163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.815218] kthread+0x328/0x630 [ 19.815263] ret_from_fork+0x10/0x20 [ 19.815311] [ 19.815331] Allocated by task 265: [ 19.815415] kasan_save_stack+0x3c/0x68 [ 19.815458] kasan_save_track+0x20/0x40 [ 19.815499] kasan_save_alloc_info+0x40/0x58 [ 19.815540] __kasan_kmalloc+0xd4/0xd8 [ 19.815580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.815624] kasan_atomics+0xb8/0x2e0 [ 19.815661] kunit_try_run_case+0x170/0x3f0 [ 19.815702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.815747] kthread+0x328/0x630 [ 19.815783] ret_from_fork+0x10/0x20 [ 19.815820] [ 19.815841] The buggy address belongs to the object at fff00000c5a01980 [ 19.815841] which belongs to the cache kmalloc-64 of size 64 [ 19.815900] The buggy address is located 0 bytes to the right of [ 19.815900] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.815965] [ 19.815987] The buggy address belongs to the physical page: [ 19.816021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.816073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.816123] page_type: f5(slab) [ 19.816162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.816213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.816257] page dumped because: kasan: bad access detected [ 19.816291] [ 19.816310] Memory state around the buggy address: [ 19.816355] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.816400] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.816444] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.816484] ^ [ 19.816951] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817009] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817049] ================================================================== [ 19.721662] ================================================================== [ 19.721709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.721759] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.722327] [ 19.722443] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.722861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.722894] Hardware name: linux,dummy-virt (DT) [ 19.722926] Call trace: [ 19.723053] show_stack+0x20/0x38 (C) [ 19.723237] dump_stack_lvl+0x8c/0xd0 [ 19.723888] print_report+0x118/0x608 [ 19.724022] kasan_report+0xdc/0x128 [ 19.724103] kasan_check_range+0x100/0x1a8 [ 19.724331] __kasan_check_write+0x20/0x30 [ 19.724581] kasan_atomics_helper+0x14e4/0x4858 [ 19.724819] kasan_atomics+0x198/0x2e0 [ 19.724884] kunit_try_run_case+0x170/0x3f0 [ 19.724936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.725125] kthread+0x328/0x630 [ 19.725169] ret_from_fork+0x10/0x20 [ 19.725220] [ 19.725301] Allocated by task 265: [ 19.725349] kasan_save_stack+0x3c/0x68 [ 19.725394] kasan_save_track+0x20/0x40 [ 19.725433] kasan_save_alloc_info+0x40/0x58 [ 19.725476] __kasan_kmalloc+0xd4/0xd8 [ 19.725514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.725556] kasan_atomics+0xb8/0x2e0 [ 19.726048] kunit_try_run_case+0x170/0x3f0 [ 19.726095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.726141] kthread+0x328/0x630 [ 19.726176] ret_from_fork+0x10/0x20 [ 19.726216] [ 19.726238] The buggy address belongs to the object at fff00000c5a01980 [ 19.726238] which belongs to the cache kmalloc-64 of size 64 [ 19.726298] The buggy address is located 0 bytes to the right of [ 19.726298] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.726843] [ 19.726873] The buggy address belongs to the physical page: [ 19.726908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.727189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.727242] page_type: f5(slab) [ 19.727283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.727358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.727597] page dumped because: kasan: bad access detected [ 19.727641] [ 19.727689] Memory state around the buggy address: [ 19.727727] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727773] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727818] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.727859] ^ [ 19.727894] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727938] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.728022] ================================================================== [ 19.735925] ================================================================== [ 19.735977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.736028] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.736382] [ 19.736426] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.736725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.736773] Hardware name: linux,dummy-virt (DT) [ 19.736999] Call trace: [ 19.737098] show_stack+0x20/0x38 (C) [ 19.737160] dump_stack_lvl+0x8c/0xd0 [ 19.737216] print_report+0x118/0x608 [ 19.737331] kasan_report+0xdc/0x128 [ 19.737483] kasan_check_range+0x100/0x1a8 [ 19.737578] __kasan_check_write+0x20/0x30 [ 19.737678] kasan_atomics_helper+0x15b4/0x4858 [ 19.737729] kasan_atomics+0x198/0x2e0 [ 19.737776] kunit_try_run_case+0x170/0x3f0 [ 19.737827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.738407] kthread+0x328/0x630 [ 19.738489] ret_from_fork+0x10/0x20 [ 19.738588] [ 19.738622] Allocated by task 265: [ 19.738650] kasan_save_stack+0x3c/0x68 [ 19.738696] kasan_save_track+0x20/0x40 [ 19.738755] kasan_save_alloc_info+0x40/0x58 [ 19.738864] __kasan_kmalloc+0xd4/0xd8 [ 19.738902] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.738966] kasan_atomics+0xb8/0x2e0 [ 19.739012] kunit_try_run_case+0x170/0x3f0 [ 19.739053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.739108] kthread+0x328/0x630 [ 19.739150] ret_from_fork+0x10/0x20 [ 19.739189] [ 19.739211] The buggy address belongs to the object at fff00000c5a01980 [ 19.739211] which belongs to the cache kmalloc-64 of size 64 [ 19.739271] The buggy address is located 0 bytes to the right of [ 19.739271] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.739638] [ 19.739973] The buggy address belongs to the physical page: [ 19.740011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.740098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.740147] page_type: f5(slab) [ 19.740193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.740400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.740469] page dumped because: kasan: bad access detected [ 19.740553] [ 19.740573] Memory state around the buggy address: [ 19.740627] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.740673] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.740720] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.740762] ^ [ 19.740797] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.740877] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.741052] ================================================================== [ 19.636163] ================================================================== [ 19.636367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.636417] Write of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.636467] [ 19.636499] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.636594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.636634] Hardware name: linux,dummy-virt (DT) [ 19.636665] Call trace: [ 19.636689] show_stack+0x20/0x38 (C) [ 19.636738] dump_stack_lvl+0x8c/0xd0 [ 19.636812] print_report+0x118/0x608 [ 19.636866] kasan_report+0xdc/0x128 [ 19.636959] kasan_check_range+0x100/0x1a8 [ 19.637009] __kasan_check_write+0x20/0x30 [ 19.637056] kasan_atomics_helper+0xf88/0x4858 [ 19.637106] kasan_atomics+0x198/0x2e0 [ 19.637153] kunit_try_run_case+0x170/0x3f0 [ 19.637203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637258] kthread+0x328/0x630 [ 19.637301] ret_from_fork+0x10/0x20 [ 19.637361] [ 19.638711] Allocated by task 265: [ 19.638756] kasan_save_stack+0x3c/0x68 [ 19.638828] kasan_save_track+0x20/0x40 [ 19.638939] kasan_save_alloc_info+0x40/0x58 [ 19.639004] __kasan_kmalloc+0xd4/0xd8 [ 19.639066] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.639108] kasan_atomics+0xb8/0x2e0 [ 19.639147] kunit_try_run_case+0x170/0x3f0 [ 19.639199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.639258] kthread+0x328/0x630 [ 19.639294] ret_from_fork+0x10/0x20 [ 19.639333] [ 19.639364] The buggy address belongs to the object at fff00000c5a01980 [ 19.639364] which belongs to the cache kmalloc-64 of size 64 [ 19.639426] The buggy address is located 0 bytes to the right of [ 19.639426] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.639501] [ 19.639536] The buggy address belongs to the physical page: [ 19.639569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.639659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.639709] page_type: f5(slab) [ 19.639754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.640007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.640110] page dumped because: kasan: bad access detected [ 19.640145] [ 19.640173] Memory state around the buggy address: [ 19.640319] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.640377] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.640459] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.640639] ^ [ 19.640675] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.640780] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.640839] ================================================================== [ 19.700762] ================================================================== [ 19.700815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.700868] Read of size 8 at addr fff00000c5a019b0 by task kunit_try_catch/265 [ 19.700927] [ 19.701001] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.701202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.701589] Hardware name: linux,dummy-virt (DT) [ 19.701862] Call trace: [ 19.701890] show_stack+0x20/0x38 (C) [ 19.702142] dump_stack_lvl+0x8c/0xd0 [ 19.702194] print_report+0x118/0x608 [ 19.702243] kasan_report+0xdc/0x128 [ 19.702400] __asan_report_load8_noabort+0x20/0x30 [ 19.702474] kasan_atomics_helper+0x3f04/0x4858 [ 19.702528] kasan_atomics+0x198/0x2e0 [ 19.702588] kunit_try_run_case+0x170/0x3f0 [ 19.702721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.702778] kthread+0x328/0x630 [ 19.702878] ret_from_fork+0x10/0x20 [ 19.703094] [ 19.703133] Allocated by task 265: [ 19.703249] kasan_save_stack+0x3c/0x68 [ 19.703304] kasan_save_track+0x20/0x40 [ 19.703354] kasan_save_alloc_info+0x40/0x58 [ 19.703396] __kasan_kmalloc+0xd4/0xd8 [ 19.703441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.703483] kasan_atomics+0xb8/0x2e0 [ 19.703520] kunit_try_run_case+0x170/0x3f0 [ 19.703562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.703608] kthread+0x328/0x630 [ 19.703663] ret_from_fork+0x10/0x20 [ 19.703863] [ 19.703968] The buggy address belongs to the object at fff00000c5a01980 [ 19.703968] which belongs to the cache kmalloc-64 of size 64 [ 19.704189] The buggy address is located 0 bytes to the right of [ 19.704189] allocated 48-byte region [fff00000c5a01980, fff00000c5a019b0) [ 19.704312] [ 19.704350] The buggy address belongs to the physical page: [ 19.704384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a01 [ 19.704440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.704489] page_type: f5(slab) [ 19.704527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.704705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.704755] page dumped because: kasan: bad access detected [ 19.704793] [ 19.704813] Memory state around the buggy address: [ 19.704847] fff00000c5a01880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.704894] fff00000c5a01900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.705365] >fff00000c5a01980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.705419] ^ [ 19.705459] fff00000c5a01a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.705503] fff00000c5a01a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.705543] ==================================================================
[ 16.261944] ================================================================== [ 16.262424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.262871] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.263232] [ 16.263316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.263357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.263369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.263390] Call Trace: [ 16.263407] <TASK> [ 16.263422] dump_stack_lvl+0x73/0xb0 [ 16.263449] print_report+0xd1/0x650 [ 16.263473] ? __virt_addr_valid+0x1db/0x2d0 [ 16.263497] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.263519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.263543] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.263566] kasan_report+0x141/0x180 [ 16.263589] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.263616] __asan_report_load8_noabort+0x18/0x20 [ 16.263642] kasan_atomics_helper+0x4f98/0x5450 [ 16.263666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.263690] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.263716] ? kasan_atomics+0x152/0x310 [ 16.263744] kasan_atomics+0x1dc/0x310 [ 16.263768] ? __pfx_kasan_atomics+0x10/0x10 [ 16.263792] ? trace_hardirqs_on+0x37/0xe0 [ 16.263815] ? __pfx_read_tsc+0x10/0x10 [ 16.263837] ? ktime_get_ts64+0x86/0x230 [ 16.263862] kunit_try_run_case+0x1a5/0x480 [ 16.263887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.263913] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.263966] ? __kthread_parkme+0x82/0x180 [ 16.263986] ? preempt_count_sub+0x50/0x80 [ 16.264011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.264062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.264088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.264115] kthread+0x337/0x6f0 [ 16.264134] ? trace_preempt_on+0x20/0xc0 [ 16.264159] ? __pfx_kthread+0x10/0x10 [ 16.264181] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.264204] ? calculate_sigpending+0x7b/0xa0 [ 16.264230] ? __pfx_kthread+0x10/0x10 [ 16.264253] ret_from_fork+0x116/0x1d0 [ 16.264273] ? __pfx_kthread+0x10/0x10 [ 16.264295] ret_from_fork_asm+0x1a/0x30 [ 16.264326] </TASK> [ 16.264338] [ 16.272059] Allocated by task 282: [ 16.272278] kasan_save_stack+0x45/0x70 [ 16.272459] kasan_save_track+0x18/0x40 [ 16.272655] kasan_save_alloc_info+0x3b/0x50 [ 16.272862] __kasan_kmalloc+0xb7/0xc0 [ 16.273065] __kmalloc_cache_noprof+0x189/0x420 [ 16.273250] kasan_atomics+0x95/0x310 [ 16.273431] kunit_try_run_case+0x1a5/0x480 [ 16.273600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.273776] kthread+0x337/0x6f0 [ 16.273938] ret_from_fork+0x116/0x1d0 [ 16.274161] ret_from_fork_asm+0x1a/0x30 [ 16.274362] [ 16.274457] The buggy address belongs to the object at ffff8881027b3900 [ 16.274457] which belongs to the cache kmalloc-64 of size 64 [ 16.274964] The buggy address is located 0 bytes to the right of [ 16.274964] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.275501] [ 16.275586] The buggy address belongs to the physical page: [ 16.275758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.276011] flags: 0x200000000000000(node=0|zone=2) [ 16.276181] page_type: f5(slab) [ 16.276321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.276660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.276995] page dumped because: kasan: bad access detected [ 16.277285] [ 16.277379] Memory state around the buggy address: [ 16.277558] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.277837] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278181] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.278451] ^ [ 16.278636] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.279050] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.279339] ================================================================== [ 15.495339] ================================================================== [ 15.495732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.496003] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.496588] [ 15.496683] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.496725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.496738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.496757] Call Trace: [ 15.496773] <TASK> [ 15.496786] dump_stack_lvl+0x73/0xb0 [ 15.496816] print_report+0xd1/0x650 [ 15.496839] ? __virt_addr_valid+0x1db/0x2d0 [ 15.496862] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.496885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.496970] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.497003] kasan_report+0x141/0x180 [ 15.497027] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.497066] kasan_check_range+0x10c/0x1c0 [ 15.497092] __kasan_check_write+0x18/0x20 [ 15.497135] kasan_atomics_helper+0xfa9/0x5450 [ 15.497159] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.497182] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.497208] ? kasan_atomics+0x152/0x310 [ 15.497236] kasan_atomics+0x1dc/0x310 [ 15.497259] ? __pfx_kasan_atomics+0x10/0x10 [ 15.497301] ? trace_hardirqs_on+0x37/0xe0 [ 15.497325] ? __pfx_read_tsc+0x10/0x10 [ 15.497347] ? ktime_get_ts64+0x86/0x230 [ 15.497371] kunit_try_run_case+0x1a5/0x480 [ 15.497395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.497421] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.497447] ? __kthread_parkme+0x82/0x180 [ 15.497468] ? preempt_count_sub+0x50/0x80 [ 15.497492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.497518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.497544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.497589] kthread+0x337/0x6f0 [ 15.497609] ? trace_preempt_on+0x20/0xc0 [ 15.497633] ? __pfx_kthread+0x10/0x10 [ 15.497655] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.497678] ? calculate_sigpending+0x7b/0xa0 [ 15.497704] ? __pfx_kthread+0x10/0x10 [ 15.497726] ret_from_fork+0x116/0x1d0 [ 15.497746] ? __pfx_kthread+0x10/0x10 [ 15.497767] ret_from_fork_asm+0x1a/0x30 [ 15.497800] </TASK> [ 15.497853] [ 15.506642] Allocated by task 282: [ 15.506777] kasan_save_stack+0x45/0x70 [ 15.507099] kasan_save_track+0x18/0x40 [ 15.507299] kasan_save_alloc_info+0x3b/0x50 [ 15.507513] __kasan_kmalloc+0xb7/0xc0 [ 15.507702] __kmalloc_cache_noprof+0x189/0x420 [ 15.507997] kasan_atomics+0x95/0x310 [ 15.508226] kunit_try_run_case+0x1a5/0x480 [ 15.508398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.508658] kthread+0x337/0x6f0 [ 15.508782] ret_from_fork+0x116/0x1d0 [ 15.509101] ret_from_fork_asm+0x1a/0x30 [ 15.509309] [ 15.509423] The buggy address belongs to the object at ffff8881027b3900 [ 15.509423] which belongs to the cache kmalloc-64 of size 64 [ 15.510222] The buggy address is located 0 bytes to the right of [ 15.510222] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.510757] [ 15.510929] The buggy address belongs to the physical page: [ 15.511116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.511458] flags: 0x200000000000000(node=0|zone=2) [ 15.511693] page_type: f5(slab) [ 15.511951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.512293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.512549] page dumped because: kasan: bad access detected [ 15.512847] [ 15.512998] Memory state around the buggy address: [ 15.513189] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.513412] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.513691] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.514148] ^ [ 15.514397] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.514720] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.515196] ================================================================== [ 16.131053] ================================================================== [ 16.131398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.131670] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.132015] [ 16.133082] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.134063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.134088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.134112] Call Trace: [ 16.134136] <TASK> [ 16.134154] dump_stack_lvl+0x73/0xb0 [ 16.134188] print_report+0xd1/0x650 [ 16.134211] ? __virt_addr_valid+0x1db/0x2d0 [ 16.134236] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.134259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.134284] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.134307] kasan_report+0x141/0x180 [ 16.134330] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.134357] kasan_check_range+0x10c/0x1c0 [ 16.134382] __kasan_check_write+0x18/0x20 [ 16.134403] kasan_atomics_helper+0x1d7a/0x5450 [ 16.134427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.134450] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.134476] ? kasan_atomics+0x152/0x310 [ 16.134504] kasan_atomics+0x1dc/0x310 [ 16.134526] ? __pfx_kasan_atomics+0x10/0x10 [ 16.134550] ? trace_hardirqs_on+0x37/0xe0 [ 16.134575] ? __pfx_read_tsc+0x10/0x10 [ 16.134595] ? ktime_get_ts64+0x86/0x230 [ 16.134620] kunit_try_run_case+0x1a5/0x480 [ 16.134647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.134674] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.134701] ? __kthread_parkme+0x82/0x180 [ 16.134723] ? preempt_count_sub+0x50/0x80 [ 16.134747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.134773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.134799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.134910] kthread+0x337/0x6f0 [ 16.134932] ? trace_preempt_on+0x20/0xc0 [ 16.134957] ? __pfx_kthread+0x10/0x10 [ 16.134978] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.135002] ? calculate_sigpending+0x7b/0xa0 [ 16.135027] ? __pfx_kthread+0x10/0x10 [ 16.135062] ret_from_fork+0x116/0x1d0 [ 16.135081] ? __pfx_kthread+0x10/0x10 [ 16.135102] ret_from_fork_asm+0x1a/0x30 [ 16.135133] </TASK> [ 16.135144] [ 16.143709] Allocated by task 282: [ 16.144016] kasan_save_stack+0x45/0x70 [ 16.144463] kasan_save_track+0x18/0x40 [ 16.144661] kasan_save_alloc_info+0x3b/0x50 [ 16.144938] __kasan_kmalloc+0xb7/0xc0 [ 16.145149] __kmalloc_cache_noprof+0x189/0x420 [ 16.145359] kasan_atomics+0x95/0x310 [ 16.145527] kunit_try_run_case+0x1a5/0x480 [ 16.145697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.146094] kthread+0x337/0x6f0 [ 16.146263] ret_from_fork+0x116/0x1d0 [ 16.146428] ret_from_fork_asm+0x1a/0x30 [ 16.146597] [ 16.146676] The buggy address belongs to the object at ffff8881027b3900 [ 16.146676] which belongs to the cache kmalloc-64 of size 64 [ 16.147267] The buggy address is located 0 bytes to the right of [ 16.147267] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.147640] [ 16.147712] The buggy address belongs to the physical page: [ 16.147899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.148578] flags: 0x200000000000000(node=0|zone=2) [ 16.148814] page_type: f5(slab) [ 16.148981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.149309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.149697] page dumped because: kasan: bad access detected [ 16.149868] [ 16.149938] Memory state around the buggy address: [ 16.150103] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.150330] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.150864] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.151411] ^ [ 16.151775] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.152059] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.152325] ================================================================== [ 15.956394] ================================================================== [ 15.956776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.957542] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.958005] [ 15.958115] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.958157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.958170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.958191] Call Trace: [ 15.958205] <TASK> [ 15.958221] dump_stack_lvl+0x73/0xb0 [ 15.958249] print_report+0xd1/0x650 [ 15.958271] ? __virt_addr_valid+0x1db/0x2d0 [ 15.958295] ? kasan_atomics_helper+0x194a/0x5450 [ 15.958318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.958342] ? kasan_atomics_helper+0x194a/0x5450 [ 15.958366] kasan_report+0x141/0x180 [ 15.958389] ? kasan_atomics_helper+0x194a/0x5450 [ 15.958417] kasan_check_range+0x10c/0x1c0 [ 15.958441] __kasan_check_write+0x18/0x20 [ 15.958462] kasan_atomics_helper+0x194a/0x5450 [ 15.958486] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.958511] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.958538] ? kasan_atomics+0x152/0x310 [ 15.958567] kasan_atomics+0x1dc/0x310 [ 15.958591] ? __pfx_kasan_atomics+0x10/0x10 [ 15.958615] ? trace_hardirqs_on+0x37/0xe0 [ 15.958640] ? __pfx_read_tsc+0x10/0x10 [ 15.958662] ? ktime_get_ts64+0x86/0x230 [ 15.958688] kunit_try_run_case+0x1a5/0x480 [ 15.958713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.958740] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.958766] ? __kthread_parkme+0x82/0x180 [ 15.958787] ? preempt_count_sub+0x50/0x80 [ 15.958812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.958848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.958875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.958901] kthread+0x337/0x6f0 [ 15.958934] ? trace_preempt_on+0x20/0xc0 [ 15.958963] ? __pfx_kthread+0x10/0x10 [ 15.958985] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.959019] ? calculate_sigpending+0x7b/0xa0 [ 15.959054] ? __pfx_kthread+0x10/0x10 [ 15.959077] ret_from_fork+0x116/0x1d0 [ 15.959097] ? __pfx_kthread+0x10/0x10 [ 15.959119] ret_from_fork_asm+0x1a/0x30 [ 15.959151] </TASK> [ 15.959161] [ 15.967785] Allocated by task 282: [ 15.968254] kasan_save_stack+0x45/0x70 [ 15.968503] kasan_save_track+0x18/0x40 [ 15.968698] kasan_save_alloc_info+0x3b/0x50 [ 15.969007] __kasan_kmalloc+0xb7/0xc0 [ 15.969219] __kmalloc_cache_noprof+0x189/0x420 [ 15.969417] kasan_atomics+0x95/0x310 [ 15.969552] kunit_try_run_case+0x1a5/0x480 [ 15.969699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.969914] kthread+0x337/0x6f0 [ 15.970288] ret_from_fork+0x116/0x1d0 [ 15.970482] ret_from_fork_asm+0x1a/0x30 [ 15.970677] [ 15.970772] The buggy address belongs to the object at ffff8881027b3900 [ 15.970772] which belongs to the cache kmalloc-64 of size 64 [ 15.971498] The buggy address is located 0 bytes to the right of [ 15.971498] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.972072] [ 15.972185] The buggy address belongs to the physical page: [ 15.972446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.972793] flags: 0x200000000000000(node=0|zone=2) [ 15.974885] page_type: f5(slab) [ 15.975087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.975327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.975667] page dumped because: kasan: bad access detected [ 15.976065] [ 15.976250] Memory state around the buggy address: [ 15.976482] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.976786] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.977178] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.977499] ^ [ 15.977745] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.978218] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.978541] ================================================================== [ 15.643321] ================================================================== [ 15.643663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.644342] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.644608] [ 15.644695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.644740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.644753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.644774] Call Trace: [ 15.644788] <TASK> [ 15.644802] dump_stack_lvl+0x73/0xb0 [ 15.644833] print_report+0xd1/0x650 [ 15.644855] ? __virt_addr_valid+0x1db/0x2d0 [ 15.644878] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.644901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.644927] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.644951] kasan_report+0x141/0x180 [ 15.644974] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.645001] __asan_report_load4_noabort+0x18/0x20 [ 15.645108] kasan_atomics_helper+0x49e8/0x5450 [ 15.645136] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.645162] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.645189] ? kasan_atomics+0x152/0x310 [ 15.645216] kasan_atomics+0x1dc/0x310 [ 15.645240] ? __pfx_kasan_atomics+0x10/0x10 [ 15.645264] ? trace_hardirqs_on+0x37/0xe0 [ 15.645287] ? __pfx_read_tsc+0x10/0x10 [ 15.645309] ? ktime_get_ts64+0x86/0x230 [ 15.645333] kunit_try_run_case+0x1a5/0x480 [ 15.645359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.645385] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.645414] ? __kthread_parkme+0x82/0x180 [ 15.645436] ? preempt_count_sub+0x50/0x80 [ 15.645460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.645485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.645512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.645539] kthread+0x337/0x6f0 [ 15.645560] ? trace_preempt_on+0x20/0xc0 [ 15.645583] ? __pfx_kthread+0x10/0x10 [ 15.645604] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.645626] ? calculate_sigpending+0x7b/0xa0 [ 15.645651] ? __pfx_kthread+0x10/0x10 [ 15.645675] ret_from_fork+0x116/0x1d0 [ 15.645694] ? __pfx_kthread+0x10/0x10 [ 15.645715] ret_from_fork_asm+0x1a/0x30 [ 15.645746] </TASK> [ 15.645757] [ 15.655040] Allocated by task 282: [ 15.655227] kasan_save_stack+0x45/0x70 [ 15.655447] kasan_save_track+0x18/0x40 [ 15.655635] kasan_save_alloc_info+0x3b/0x50 [ 15.655789] __kasan_kmalloc+0xb7/0xc0 [ 15.655923] __kmalloc_cache_noprof+0x189/0x420 [ 15.656097] kasan_atomics+0x95/0x310 [ 15.656234] kunit_try_run_case+0x1a5/0x480 [ 15.656380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.656898] kthread+0x337/0x6f0 [ 15.657156] ret_from_fork+0x116/0x1d0 [ 15.657380] ret_from_fork_asm+0x1a/0x30 [ 15.657778] [ 15.657947] The buggy address belongs to the object at ffff8881027b3900 [ 15.657947] which belongs to the cache kmalloc-64 of size 64 [ 15.660345] The buggy address is located 0 bytes to the right of [ 15.660345] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.661250] [ 15.661359] The buggy address belongs to the physical page: [ 15.661613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.661933] flags: 0x200000000000000(node=0|zone=2) [ 15.662233] page_type: f5(slab) [ 15.662426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.662767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.663148] page dumped because: kasan: bad access detected [ 15.663333] [ 15.663487] Memory state around the buggy address: [ 15.663758] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.664207] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.664520] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.664769] ^ [ 15.665131] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.665492] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.665823] ================================================================== [ 15.553775] ================================================================== [ 15.554184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.554504] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.554887] [ 15.555046] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.555091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.555104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.555125] Call Trace: [ 15.555139] <TASK> [ 15.555175] dump_stack_lvl+0x73/0xb0 [ 15.555205] print_report+0xd1/0x650 [ 15.555229] ? __virt_addr_valid+0x1db/0x2d0 [ 15.555252] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.555274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.555299] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.555322] kasan_report+0x141/0x180 [ 15.555344] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.555372] __asan_report_load4_noabort+0x18/0x20 [ 15.555398] kasan_atomics_helper+0x4a1c/0x5450 [ 15.555422] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.555445] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.555471] ? kasan_atomics+0x152/0x310 [ 15.555498] kasan_atomics+0x1dc/0x310 [ 15.555545] ? __pfx_kasan_atomics+0x10/0x10 [ 15.555569] ? trace_hardirqs_on+0x37/0xe0 [ 15.555593] ? __pfx_read_tsc+0x10/0x10 [ 15.555614] ? ktime_get_ts64+0x86/0x230 [ 15.555638] kunit_try_run_case+0x1a5/0x480 [ 15.555663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.555689] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.555716] ? __kthread_parkme+0x82/0x180 [ 15.555738] ? preempt_count_sub+0x50/0x80 [ 15.555762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.555788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.555883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.555910] kthread+0x337/0x6f0 [ 15.555930] ? trace_preempt_on+0x20/0xc0 [ 15.555990] ? __pfx_kthread+0x10/0x10 [ 15.556013] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.556044] ? calculate_sigpending+0x7b/0xa0 [ 15.556070] ? __pfx_kthread+0x10/0x10 [ 15.556092] ret_from_fork+0x116/0x1d0 [ 15.556112] ? __pfx_kthread+0x10/0x10 [ 15.556134] ret_from_fork_asm+0x1a/0x30 [ 15.556165] </TASK> [ 15.556177] [ 15.564054] Allocated by task 282: [ 15.564236] kasan_save_stack+0x45/0x70 [ 15.564445] kasan_save_track+0x18/0x40 [ 15.564637] kasan_save_alloc_info+0x3b/0x50 [ 15.565113] __kasan_kmalloc+0xb7/0xc0 [ 15.565372] __kmalloc_cache_noprof+0x189/0x420 [ 15.565614] kasan_atomics+0x95/0x310 [ 15.565877] kunit_try_run_case+0x1a5/0x480 [ 15.566071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.566334] kthread+0x337/0x6f0 [ 15.566485] ret_from_fork+0x116/0x1d0 [ 15.566675] ret_from_fork_asm+0x1a/0x30 [ 15.566885] [ 15.566984] The buggy address belongs to the object at ffff8881027b3900 [ 15.566984] which belongs to the cache kmalloc-64 of size 64 [ 15.567540] The buggy address is located 0 bytes to the right of [ 15.567540] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.568057] [ 15.568133] The buggy address belongs to the physical page: [ 15.568360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.568731] flags: 0x200000000000000(node=0|zone=2) [ 15.569121] page_type: f5(slab) [ 15.569291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.569630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.570134] page dumped because: kasan: bad access detected [ 15.570390] [ 15.570484] Memory state around the buggy address: [ 15.570686] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.571057] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.571391] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.571600] ^ [ 15.571909] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.572273] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.572508] ================================================================== [ 15.860426] ================================================================== [ 15.861336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.861652] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.862340] [ 15.862653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.862763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.862777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.862798] Call Trace: [ 15.862813] <TASK> [ 15.862867] dump_stack_lvl+0x73/0xb0 [ 15.862899] print_report+0xd1/0x650 [ 15.862922] ? __virt_addr_valid+0x1db/0x2d0 [ 15.862944] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.862968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.862999] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.863023] kasan_report+0x141/0x180 [ 15.863058] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.863085] kasan_check_range+0x10c/0x1c0 [ 15.863109] __kasan_check_write+0x18/0x20 [ 15.863130] kasan_atomics_helper+0x16e7/0x5450 [ 15.863154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.863178] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.863205] ? kasan_atomics+0x152/0x310 [ 15.863232] kasan_atomics+0x1dc/0x310 [ 15.863255] ? __pfx_kasan_atomics+0x10/0x10 [ 15.863278] ? trace_hardirqs_on+0x37/0xe0 [ 15.863303] ? __pfx_read_tsc+0x10/0x10 [ 15.863325] ? ktime_get_ts64+0x86/0x230 [ 15.863349] kunit_try_run_case+0x1a5/0x480 [ 15.863374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.863399] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.863425] ? __kthread_parkme+0x82/0x180 [ 15.863446] ? preempt_count_sub+0x50/0x80 [ 15.863471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.863496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.863521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.863548] kthread+0x337/0x6f0 [ 15.863567] ? trace_preempt_on+0x20/0xc0 [ 15.863590] ? __pfx_kthread+0x10/0x10 [ 15.863611] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.863634] ? calculate_sigpending+0x7b/0xa0 [ 15.863659] ? __pfx_kthread+0x10/0x10 [ 15.863681] ret_from_fork+0x116/0x1d0 [ 15.863701] ? __pfx_kthread+0x10/0x10 [ 15.863722] ret_from_fork_asm+0x1a/0x30 [ 15.863753] </TASK> [ 15.863764] [ 15.877385] Allocated by task 282: [ 15.878290] kasan_save_stack+0x45/0x70 [ 15.879110] kasan_save_track+0x18/0x40 [ 15.879448] kasan_save_alloc_info+0x3b/0x50 [ 15.879656] __kasan_kmalloc+0xb7/0xc0 [ 15.880233] __kmalloc_cache_noprof+0x189/0x420 [ 15.880453] kasan_atomics+0x95/0x310 [ 15.880629] kunit_try_run_case+0x1a5/0x480 [ 15.881083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.881330] kthread+0x337/0x6f0 [ 15.881484] ret_from_fork+0x116/0x1d0 [ 15.881650] ret_from_fork_asm+0x1a/0x30 [ 15.882175] [ 15.882277] The buggy address belongs to the object at ffff8881027b3900 [ 15.882277] which belongs to the cache kmalloc-64 of size 64 [ 15.883257] The buggy address is located 0 bytes to the right of [ 15.883257] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.883769] [ 15.884201] The buggy address belongs to the physical page: [ 15.884451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.884786] flags: 0x200000000000000(node=0|zone=2) [ 15.885313] page_type: f5(slab) [ 15.885477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.885776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.886395] page dumped because: kasan: bad access detected [ 15.886634] [ 15.886724] Memory state around the buggy address: [ 15.887250] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.887531] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.887805] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.888559] ^ [ 15.888786] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.889168] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.889468] ================================================================== [ 16.279956] ================================================================== [ 16.280317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.280656] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.281070] [ 16.281171] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.281215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.281228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.281257] Call Trace: [ 16.281270] <TASK> [ 16.281311] dump_stack_lvl+0x73/0xb0 [ 16.281341] print_report+0xd1/0x650 [ 16.281366] ? __virt_addr_valid+0x1db/0x2d0 [ 16.281390] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.281412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.281437] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.281460] kasan_report+0x141/0x180 [ 16.281483] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.281510] kasan_check_range+0x10c/0x1c0 [ 16.281536] __kasan_check_write+0x18/0x20 [ 16.281556] kasan_atomics_helper+0x20c8/0x5450 [ 16.281580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.281604] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.281630] ? kasan_atomics+0x152/0x310 [ 16.281658] kasan_atomics+0x1dc/0x310 [ 16.281681] ? __pfx_kasan_atomics+0x10/0x10 [ 16.281704] ? trace_hardirqs_on+0x37/0xe0 [ 16.281729] ? __pfx_read_tsc+0x10/0x10 [ 16.281751] ? ktime_get_ts64+0x86/0x230 [ 16.281776] kunit_try_run_case+0x1a5/0x480 [ 16.281807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.281834] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.281859] ? __kthread_parkme+0x82/0x180 [ 16.281881] ? preempt_count_sub+0x50/0x80 [ 16.281905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.281931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.281957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.281983] kthread+0x337/0x6f0 [ 16.282004] ? trace_preempt_on+0x20/0xc0 [ 16.282026] ? __pfx_kthread+0x10/0x10 [ 16.282059] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.282082] ? calculate_sigpending+0x7b/0xa0 [ 16.282106] ? __pfx_kthread+0x10/0x10 [ 16.282129] ret_from_fork+0x116/0x1d0 [ 16.282149] ? __pfx_kthread+0x10/0x10 [ 16.282170] ret_from_fork_asm+0x1a/0x30 [ 16.282202] </TASK> [ 16.282213] [ 16.294163] Allocated by task 282: [ 16.294343] kasan_save_stack+0x45/0x70 [ 16.294538] kasan_save_track+0x18/0x40 [ 16.294717] kasan_save_alloc_info+0x3b/0x50 [ 16.295203] __kasan_kmalloc+0xb7/0xc0 [ 16.295514] __kmalloc_cache_noprof+0x189/0x420 [ 16.295730] kasan_atomics+0x95/0x310 [ 16.296303] kunit_try_run_case+0x1a5/0x480 [ 16.296508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.296744] kthread+0x337/0x6f0 [ 16.297104] ret_from_fork+0x116/0x1d0 [ 16.297288] ret_from_fork_asm+0x1a/0x30 [ 16.297473] [ 16.297566] The buggy address belongs to the object at ffff8881027b3900 [ 16.297566] which belongs to the cache kmalloc-64 of size 64 [ 16.298709] The buggy address is located 0 bytes to the right of [ 16.298709] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.299771] [ 16.299862] The buggy address belongs to the physical page: [ 16.300378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.301059] flags: 0x200000000000000(node=0|zone=2) [ 16.301428] page_type: f5(slab) [ 16.301586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.302051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.302365] page dumped because: kasan: bad access detected [ 16.302596] [ 16.302686] Memory state around the buggy address: [ 16.303092] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.303393] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.303691] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.304557] ^ [ 16.305164] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.305472] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.305756] ================================================================== [ 15.382247] ================================================================== [ 15.382858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.383465] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.383775] [ 15.384730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.384783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.384798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.385068] Call Trace: [ 15.385091] <TASK> [ 15.385107] dump_stack_lvl+0x73/0xb0 [ 15.385246] print_report+0xd1/0x650 [ 15.385271] ? __virt_addr_valid+0x1db/0x2d0 [ 15.385400] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.385425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.385477] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.385503] kasan_report+0x141/0x180 [ 15.385527] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.385555] __asan_report_load4_noabort+0x18/0x20 [ 15.385582] kasan_atomics_helper+0x4a84/0x5450 [ 15.385606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.385636] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.385663] ? kasan_atomics+0x152/0x310 [ 15.385691] kasan_atomics+0x1dc/0x310 [ 15.385715] ? __pfx_kasan_atomics+0x10/0x10 [ 15.385740] ? trace_hardirqs_on+0x37/0xe0 [ 15.385764] ? __pfx_read_tsc+0x10/0x10 [ 15.385806] ? ktime_get_ts64+0x86/0x230 [ 15.385831] kunit_try_run_case+0x1a5/0x480 [ 15.385872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.385912] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.385953] ? __kthread_parkme+0x82/0x180 [ 15.385976] ? preempt_count_sub+0x50/0x80 [ 15.386014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.386049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.386090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.386198] kthread+0x337/0x6f0 [ 15.386224] ? trace_preempt_on+0x20/0xc0 [ 15.386249] ? __pfx_kthread+0x10/0x10 [ 15.386271] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.386295] ? calculate_sigpending+0x7b/0xa0 [ 15.386320] ? __pfx_kthread+0x10/0x10 [ 15.386343] ret_from_fork+0x116/0x1d0 [ 15.386364] ? __pfx_kthread+0x10/0x10 [ 15.386385] ret_from_fork_asm+0x1a/0x30 [ 15.386416] </TASK> [ 15.386440] [ 15.395536] Allocated by task 282: [ 15.395679] kasan_save_stack+0x45/0x70 [ 15.395882] kasan_save_track+0x18/0x40 [ 15.396166] kasan_save_alloc_info+0x3b/0x50 [ 15.396550] __kasan_kmalloc+0xb7/0xc0 [ 15.396766] __kmalloc_cache_noprof+0x189/0x420 [ 15.397121] kasan_atomics+0x95/0x310 [ 15.397340] kunit_try_run_case+0x1a5/0x480 [ 15.397545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.397728] kthread+0x337/0x6f0 [ 15.397854] ret_from_fork+0x116/0x1d0 [ 15.397990] ret_from_fork_asm+0x1a/0x30 [ 15.398193] [ 15.398311] The buggy address belongs to the object at ffff8881027b3900 [ 15.398311] which belongs to the cache kmalloc-64 of size 64 [ 15.398907] The buggy address is located 0 bytes to the right of [ 15.398907] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.401079] [ 15.401172] The buggy address belongs to the physical page: [ 15.401344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.401584] flags: 0x200000000000000(node=0|zone=2) [ 15.401745] page_type: f5(slab) [ 15.401870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.402668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.403716] page dumped because: kasan: bad access detected [ 15.404586] [ 15.404849] Memory state around the buggy address: [ 15.405269] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.405508] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.405728] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.406324] ^ [ 15.406800] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.407319] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.407615] ================================================================== [ 15.624146] ================================================================== [ 15.624544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.624897] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.625224] [ 15.625340] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.625385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.625397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.625418] Call Trace: [ 15.625432] <TASK> [ 15.625447] dump_stack_lvl+0x73/0xb0 [ 15.625476] print_report+0xd1/0x650 [ 15.625501] ? __virt_addr_valid+0x1db/0x2d0 [ 15.625525] ? kasan_atomics_helper+0x1217/0x5450 [ 15.625548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.625572] ? kasan_atomics_helper+0x1217/0x5450 [ 15.625595] kasan_report+0x141/0x180 [ 15.625618] ? kasan_atomics_helper+0x1217/0x5450 [ 15.625645] kasan_check_range+0x10c/0x1c0 [ 15.625670] __kasan_check_write+0x18/0x20 [ 15.625690] kasan_atomics_helper+0x1217/0x5450 [ 15.625714] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.625738] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.625765] ? kasan_atomics+0x152/0x310 [ 15.625794] kasan_atomics+0x1dc/0x310 [ 15.625838] ? __pfx_kasan_atomics+0x10/0x10 [ 15.625862] ? trace_hardirqs_on+0x37/0xe0 [ 15.625887] ? __pfx_read_tsc+0x10/0x10 [ 15.625908] ? ktime_get_ts64+0x86/0x230 [ 15.625979] kunit_try_run_case+0x1a5/0x480 [ 15.626009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.626048] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.626075] ? __kthread_parkme+0x82/0x180 [ 15.626096] ? preempt_count_sub+0x50/0x80 [ 15.626120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.626146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.626172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.626199] kthread+0x337/0x6f0 [ 15.626218] ? trace_preempt_on+0x20/0xc0 [ 15.626241] ? __pfx_kthread+0x10/0x10 [ 15.626262] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.626284] ? calculate_sigpending+0x7b/0xa0 [ 15.626311] ? __pfx_kthread+0x10/0x10 [ 15.626334] ret_from_fork+0x116/0x1d0 [ 15.626354] ? __pfx_kthread+0x10/0x10 [ 15.626374] ret_from_fork_asm+0x1a/0x30 [ 15.626406] </TASK> [ 15.626417] [ 15.634305] Allocated by task 282: [ 15.634494] kasan_save_stack+0x45/0x70 [ 15.634717] kasan_save_track+0x18/0x40 [ 15.634943] kasan_save_alloc_info+0x3b/0x50 [ 15.635212] __kasan_kmalloc+0xb7/0xc0 [ 15.635391] __kmalloc_cache_noprof+0x189/0x420 [ 15.635607] kasan_atomics+0x95/0x310 [ 15.635799] kunit_try_run_case+0x1a5/0x480 [ 15.636110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.636324] kthread+0x337/0x6f0 [ 15.636523] ret_from_fork+0x116/0x1d0 [ 15.636701] ret_from_fork_asm+0x1a/0x30 [ 15.636979] [ 15.637064] The buggy address belongs to the object at ffff8881027b3900 [ 15.637064] which belongs to the cache kmalloc-64 of size 64 [ 15.637650] The buggy address is located 0 bytes to the right of [ 15.637650] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.638149] [ 15.638223] The buggy address belongs to the physical page: [ 15.638393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.638671] flags: 0x200000000000000(node=0|zone=2) [ 15.639297] page_type: f5(slab) [ 15.639476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.639954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.640338] page dumped because: kasan: bad access detected [ 15.640612] [ 15.640696] Memory state around the buggy address: [ 15.641091] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.641333] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.641552] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.641767] ^ [ 15.641989] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.642322] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.642645] ================================================================== [ 15.750936] ================================================================== [ 15.751321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.751648] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.752049] [ 15.752133] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.752175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.752187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.752259] Call Trace: [ 15.752277] <TASK> [ 15.752293] dump_stack_lvl+0x73/0xb0 [ 15.752361] print_report+0xd1/0x650 [ 15.752386] ? __virt_addr_valid+0x1db/0x2d0 [ 15.752410] ? kasan_atomics_helper+0x1467/0x5450 [ 15.752444] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.752496] ? kasan_atomics_helper+0x1467/0x5450 [ 15.752520] kasan_report+0x141/0x180 [ 15.752553] ? kasan_atomics_helper+0x1467/0x5450 [ 15.752581] kasan_check_range+0x10c/0x1c0 [ 15.752606] __kasan_check_write+0x18/0x20 [ 15.752626] kasan_atomics_helper+0x1467/0x5450 [ 15.752651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.752675] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.752722] ? kasan_atomics+0x152/0x310 [ 15.752750] kasan_atomics+0x1dc/0x310 [ 15.752773] ? __pfx_kasan_atomics+0x10/0x10 [ 15.752819] ? trace_hardirqs_on+0x37/0xe0 [ 15.752842] ? __pfx_read_tsc+0x10/0x10 [ 15.752875] ? ktime_get_ts64+0x86/0x230 [ 15.752899] kunit_try_run_case+0x1a5/0x480 [ 15.752990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.753019] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.753056] ? __kthread_parkme+0x82/0x180 [ 15.753077] ? preempt_count_sub+0x50/0x80 [ 15.753102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.753128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.753154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.753181] kthread+0x337/0x6f0 [ 15.753200] ? trace_preempt_on+0x20/0xc0 [ 15.753224] ? __pfx_kthread+0x10/0x10 [ 15.753245] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.753268] ? calculate_sigpending+0x7b/0xa0 [ 15.753293] ? __pfx_kthread+0x10/0x10 [ 15.753315] ret_from_fork+0x116/0x1d0 [ 15.753335] ? __pfx_kthread+0x10/0x10 [ 15.753356] ret_from_fork_asm+0x1a/0x30 [ 15.753389] </TASK> [ 15.753401] [ 15.762516] Allocated by task 282: [ 15.762783] kasan_save_stack+0x45/0x70 [ 15.763054] kasan_save_track+0x18/0x40 [ 15.763299] kasan_save_alloc_info+0x3b/0x50 [ 15.763539] __kasan_kmalloc+0xb7/0xc0 [ 15.763676] __kmalloc_cache_noprof+0x189/0x420 [ 15.763981] kasan_atomics+0x95/0x310 [ 15.764243] kunit_try_run_case+0x1a5/0x480 [ 15.764460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.764741] kthread+0x337/0x6f0 [ 15.765042] ret_from_fork+0x116/0x1d0 [ 15.765184] ret_from_fork_asm+0x1a/0x30 [ 15.765326] [ 15.765469] The buggy address belongs to the object at ffff8881027b3900 [ 15.765469] which belongs to the cache kmalloc-64 of size 64 [ 15.766012] The buggy address is located 0 bytes to the right of [ 15.766012] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.766792] [ 15.766957] The buggy address belongs to the physical page: [ 15.767164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.767434] flags: 0x200000000000000(node=0|zone=2) [ 15.767727] page_type: f5(slab) [ 15.767986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.768456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.768749] page dumped because: kasan: bad access detected [ 15.769132] [ 15.769262] Memory state around the buggy address: [ 15.769509] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.769759] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.770376] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.770709] ^ [ 15.771208] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.771511] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.771881] ================================================================== [ 16.152707] ================================================================== [ 16.153064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.153412] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.153849] [ 16.153968] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.154011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.154024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.154056] Call Trace: [ 16.154071] <TASK> [ 16.154086] dump_stack_lvl+0x73/0xb0 [ 16.154115] print_report+0xd1/0x650 [ 16.154138] ? __virt_addr_valid+0x1db/0x2d0 [ 16.154161] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.154183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.154208] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.154232] kasan_report+0x141/0x180 [ 16.154255] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.154283] kasan_check_range+0x10c/0x1c0 [ 16.154307] __kasan_check_write+0x18/0x20 [ 16.154328] kasan_atomics_helper+0x1e12/0x5450 [ 16.154352] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.154376] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.154403] ? kasan_atomics+0x152/0x310 [ 16.154430] kasan_atomics+0x1dc/0x310 [ 16.154453] ? __pfx_kasan_atomics+0x10/0x10 [ 16.154477] ? trace_hardirqs_on+0x37/0xe0 [ 16.154500] ? __pfx_read_tsc+0x10/0x10 [ 16.154522] ? ktime_get_ts64+0x86/0x230 [ 16.154547] kunit_try_run_case+0x1a5/0x480 [ 16.154582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.154608] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.154635] ? __kthread_parkme+0x82/0x180 [ 16.154657] ? preempt_count_sub+0x50/0x80 [ 16.154682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.154707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.154733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.154760] kthread+0x337/0x6f0 [ 16.154780] ? trace_preempt_on+0x20/0xc0 [ 16.154803] ? __pfx_kthread+0x10/0x10 [ 16.154824] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.154847] ? calculate_sigpending+0x7b/0xa0 [ 16.154883] ? __pfx_kthread+0x10/0x10 [ 16.154905] ret_from_fork+0x116/0x1d0 [ 16.154924] ? __pfx_kthread+0x10/0x10 [ 16.154947] ret_from_fork_asm+0x1a/0x30 [ 16.154978] </TASK> [ 16.154989] [ 16.169154] Allocated by task 282: [ 16.169295] kasan_save_stack+0x45/0x70 [ 16.169446] kasan_save_track+0x18/0x40 [ 16.169583] kasan_save_alloc_info+0x3b/0x50 [ 16.169733] __kasan_kmalloc+0xb7/0xc0 [ 16.169874] __kmalloc_cache_noprof+0x189/0x420 [ 16.170041] kasan_atomics+0x95/0x310 [ 16.170314] kunit_try_run_case+0x1a5/0x480 [ 16.170698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.171293] kthread+0x337/0x6f0 [ 16.171611] ret_from_fork+0x116/0x1d0 [ 16.172191] ret_from_fork_asm+0x1a/0x30 [ 16.172572] [ 16.172731] The buggy address belongs to the object at ffff8881027b3900 [ 16.172731] which belongs to the cache kmalloc-64 of size 64 [ 16.173937] The buggy address is located 0 bytes to the right of [ 16.173937] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.175070] [ 16.175148] The buggy address belongs to the physical page: [ 16.175322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.175563] flags: 0x200000000000000(node=0|zone=2) [ 16.175726] page_type: f5(slab) [ 16.176019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.176685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.177562] page dumped because: kasan: bad access detected [ 16.178130] [ 16.178291] Memory state around the buggy address: [ 16.178715] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.179444] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.180169] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.180427] ^ [ 16.180582] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.180804] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.181019] ================================================================== [ 15.730010] ================================================================== [ 15.730297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.730618] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.730954] [ 15.731095] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.731172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.731185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.731206] Call Trace: [ 15.731232] <TASK> [ 15.731248] dump_stack_lvl+0x73/0xb0 [ 15.731279] print_report+0xd1/0x650 [ 15.731302] ? __virt_addr_valid+0x1db/0x2d0 [ 15.731325] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.731348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.731373] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.731396] kasan_report+0x141/0x180 [ 15.731419] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.731447] __asan_report_load8_noabort+0x18/0x20 [ 15.731474] kasan_atomics_helper+0x4eae/0x5450 [ 15.731498] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.731554] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.731580] ? kasan_atomics+0x152/0x310 [ 15.731620] kasan_atomics+0x1dc/0x310 [ 15.731671] ? __pfx_kasan_atomics+0x10/0x10 [ 15.731695] ? trace_hardirqs_on+0x37/0xe0 [ 15.731718] ? __pfx_read_tsc+0x10/0x10 [ 15.731750] ? ktime_get_ts64+0x86/0x230 [ 15.731774] kunit_try_run_case+0x1a5/0x480 [ 15.731799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.731825] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.731852] ? __kthread_parkme+0x82/0x180 [ 15.731874] ? preempt_count_sub+0x50/0x80 [ 15.731925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.731959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.732065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.732092] kthread+0x337/0x6f0 [ 15.732163] ? trace_preempt_on+0x20/0xc0 [ 15.732188] ? __pfx_kthread+0x10/0x10 [ 15.732211] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.732234] ? calculate_sigpending+0x7b/0xa0 [ 15.732259] ? __pfx_kthread+0x10/0x10 [ 15.732282] ret_from_fork+0x116/0x1d0 [ 15.732301] ? __pfx_kthread+0x10/0x10 [ 15.732323] ret_from_fork_asm+0x1a/0x30 [ 15.732354] </TASK> [ 15.732365] [ 15.741159] Allocated by task 282: [ 15.741295] kasan_save_stack+0x45/0x70 [ 15.741500] kasan_save_track+0x18/0x40 [ 15.741696] kasan_save_alloc_info+0x3b/0x50 [ 15.741911] __kasan_kmalloc+0xb7/0xc0 [ 15.742159] __kmalloc_cache_noprof+0x189/0x420 [ 15.742401] kasan_atomics+0x95/0x310 [ 15.742677] kunit_try_run_case+0x1a5/0x480 [ 15.743107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743387] kthread+0x337/0x6f0 [ 15.743513] ret_from_fork+0x116/0x1d0 [ 15.743647] ret_from_fork_asm+0x1a/0x30 [ 15.743796] [ 15.743959] The buggy address belongs to the object at ffff8881027b3900 [ 15.743959] which belongs to the cache kmalloc-64 of size 64 [ 15.744554] The buggy address is located 0 bytes to the right of [ 15.744554] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.745377] [ 15.745505] The buggy address belongs to the physical page: [ 15.745694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.746007] flags: 0x200000000000000(node=0|zone=2) [ 15.746251] page_type: f5(slab) [ 15.746580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.747018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.747268] page dumped because: kasan: bad access detected [ 15.747570] [ 15.747668] Memory state around the buggy address: [ 15.747971] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.748480] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.749003] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.749321] ^ [ 15.749580] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.749938] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.750423] ================================================================== [ 15.798777] ================================================================== [ 15.799388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.799716] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.800409] [ 15.800649] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.800773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.800787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.800829] Call Trace: [ 15.800844] <TASK> [ 15.800861] dump_stack_lvl+0x73/0xb0 [ 15.800925] print_report+0xd1/0x650 [ 15.800960] ? __virt_addr_valid+0x1db/0x2d0 [ 15.800984] ? kasan_atomics_helper+0x151d/0x5450 [ 15.801007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.801042] ? kasan_atomics_helper+0x151d/0x5450 [ 15.801065] kasan_report+0x141/0x180 [ 15.801087] ? kasan_atomics_helper+0x151d/0x5450 [ 15.801115] kasan_check_range+0x10c/0x1c0 [ 15.801140] __kasan_check_write+0x18/0x20 [ 15.801160] kasan_atomics_helper+0x151d/0x5450 [ 15.801184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.801209] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.801235] ? kasan_atomics+0x152/0x310 [ 15.801262] kasan_atomics+0x1dc/0x310 [ 15.801286] ? __pfx_kasan_atomics+0x10/0x10 [ 15.801310] ? trace_hardirqs_on+0x37/0xe0 [ 15.801333] ? __pfx_read_tsc+0x10/0x10 [ 15.801355] ? ktime_get_ts64+0x86/0x230 [ 15.801380] kunit_try_run_case+0x1a5/0x480 [ 15.801405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.801431] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.801457] ? __kthread_parkme+0x82/0x180 [ 15.801478] ? preempt_count_sub+0x50/0x80 [ 15.801503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.801529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.801555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.801582] kthread+0x337/0x6f0 [ 15.801601] ? trace_preempt_on+0x20/0xc0 [ 15.801624] ? __pfx_kthread+0x10/0x10 [ 15.801646] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.801668] ? calculate_sigpending+0x7b/0xa0 [ 15.801693] ? __pfx_kthread+0x10/0x10 [ 15.801715] ret_from_fork+0x116/0x1d0 [ 15.801735] ? __pfx_kthread+0x10/0x10 [ 15.801756] ret_from_fork_asm+0x1a/0x30 [ 15.801788] </TASK> [ 15.801800] [ 15.810047] Allocated by task 282: [ 15.810250] kasan_save_stack+0x45/0x70 [ 15.810455] kasan_save_track+0x18/0x40 [ 15.810650] kasan_save_alloc_info+0x3b/0x50 [ 15.810939] __kasan_kmalloc+0xb7/0xc0 [ 15.811104] __kmalloc_cache_noprof+0x189/0x420 [ 15.811380] kasan_atomics+0x95/0x310 [ 15.811650] kunit_try_run_case+0x1a5/0x480 [ 15.811866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.812221] kthread+0x337/0x6f0 [ 15.812385] ret_from_fork+0x116/0x1d0 [ 15.812568] ret_from_fork_asm+0x1a/0x30 [ 15.812713] [ 15.812810] The buggy address belongs to the object at ffff8881027b3900 [ 15.812810] which belongs to the cache kmalloc-64 of size 64 [ 15.813393] The buggy address is located 0 bytes to the right of [ 15.813393] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.813826] [ 15.813899] The buggy address belongs to the physical page: [ 15.814155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.814532] flags: 0x200000000000000(node=0|zone=2) [ 15.814809] page_type: f5(slab) [ 15.815147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.815389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.815621] page dumped because: kasan: bad access detected [ 15.816151] [ 15.816247] Memory state around the buggy address: [ 15.816543] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.816820] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.817143] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.817358] ^ [ 15.817513] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.817729] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.818100] ================================================================== [ 15.092123] ================================================================== [ 15.093739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.095151] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.095577] [ 15.095671] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.095715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.095728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.095750] Call Trace: [ 15.095767] <TASK> [ 15.095782] dump_stack_lvl+0x73/0xb0 [ 15.096006] print_report+0xd1/0x650 [ 15.096043] ? __virt_addr_valid+0x1db/0x2d0 [ 15.096067] ? kasan_atomics_helper+0x565/0x5450 [ 15.096090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.096115] ? kasan_atomics_helper+0x565/0x5450 [ 15.096138] kasan_report+0x141/0x180 [ 15.096161] ? kasan_atomics_helper+0x565/0x5450 [ 15.096188] kasan_check_range+0x10c/0x1c0 [ 15.096213] __kasan_check_write+0x18/0x20 [ 15.096233] kasan_atomics_helper+0x565/0x5450 [ 15.096258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.096283] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.096309] ? kasan_atomics+0x152/0x310 [ 15.096338] kasan_atomics+0x1dc/0x310 [ 15.096361] ? __pfx_kasan_atomics+0x10/0x10 [ 15.096386] ? trace_hardirqs_on+0x37/0xe0 [ 15.096410] ? __pfx_read_tsc+0x10/0x10 [ 15.096432] ? ktime_get_ts64+0x86/0x230 [ 15.096457] kunit_try_run_case+0x1a5/0x480 [ 15.096482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.096508] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.096533] ? __kthread_parkme+0x82/0x180 [ 15.096554] ? preempt_count_sub+0x50/0x80 [ 15.096579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.096605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.096631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.096657] kthread+0x337/0x6f0 [ 15.096677] ? trace_preempt_on+0x20/0xc0 [ 15.096701] ? __pfx_kthread+0x10/0x10 [ 15.096723] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.096745] ? calculate_sigpending+0x7b/0xa0 [ 15.096770] ? __pfx_kthread+0x10/0x10 [ 15.096851] ret_from_fork+0x116/0x1d0 [ 15.096875] ? __pfx_kthread+0x10/0x10 [ 15.096898] ret_from_fork_asm+0x1a/0x30 [ 15.096929] </TASK> [ 15.096940] [ 15.110555] Allocated by task 282: [ 15.110913] kasan_save_stack+0x45/0x70 [ 15.111131] kasan_save_track+0x18/0x40 [ 15.111273] kasan_save_alloc_info+0x3b/0x50 [ 15.111425] __kasan_kmalloc+0xb7/0xc0 [ 15.111560] __kmalloc_cache_noprof+0x189/0x420 [ 15.111718] kasan_atomics+0x95/0x310 [ 15.111860] kunit_try_run_case+0x1a5/0x480 [ 15.112014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.112201] kthread+0x337/0x6f0 [ 15.112323] ret_from_fork+0x116/0x1d0 [ 15.112707] ret_from_fork_asm+0x1a/0x30 [ 15.113221] [ 15.113302] The buggy address belongs to the object at ffff8881027b3900 [ 15.113302] which belongs to the cache kmalloc-64 of size 64 [ 15.113657] The buggy address is located 0 bytes to the right of [ 15.113657] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.114598] [ 15.114760] The buggy address belongs to the physical page: [ 15.115312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.116078] flags: 0x200000000000000(node=0|zone=2) [ 15.116517] page_type: f5(slab) [ 15.116888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.117561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.118169] page dumped because: kasan: bad access detected [ 15.118349] [ 15.118420] Memory state around the buggy address: [ 15.118575] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.118791] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.119003] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.119696] ^ [ 15.120203] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.120843] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.121459] ================================================================== [ 15.818586] ================================================================== [ 15.818904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.819151] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.819374] [ 15.819456] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.819496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.819523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.819544] Call Trace: [ 15.819571] <TASK> [ 15.819586] dump_stack_lvl+0x73/0xb0 [ 15.819613] print_report+0xd1/0x650 [ 15.819635] ? __virt_addr_valid+0x1db/0x2d0 [ 15.819658] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.819680] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.819704] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.819727] kasan_report+0x141/0x180 [ 15.819750] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.819777] kasan_check_range+0x10c/0x1c0 [ 15.819801] __kasan_check_write+0x18/0x20 [ 15.819828] kasan_atomics_helper+0x15b6/0x5450 [ 15.819852] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.819876] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.819902] ? kasan_atomics+0x152/0x310 [ 15.819929] kasan_atomics+0x1dc/0x310 [ 15.819959] ? __pfx_kasan_atomics+0x10/0x10 [ 15.819982] ? trace_hardirqs_on+0x37/0xe0 [ 15.820013] ? __pfx_read_tsc+0x10/0x10 [ 15.820053] ? ktime_get_ts64+0x86/0x230 [ 15.820078] kunit_try_run_case+0x1a5/0x480 [ 15.820102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820128] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.820155] ? __kthread_parkme+0x82/0x180 [ 15.820177] ? preempt_count_sub+0x50/0x80 [ 15.820202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.820254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.820281] kthread+0x337/0x6f0 [ 15.820302] ? trace_preempt_on+0x20/0xc0 [ 15.820325] ? __pfx_kthread+0x10/0x10 [ 15.820347] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.820379] ? calculate_sigpending+0x7b/0xa0 [ 15.820404] ? __pfx_kthread+0x10/0x10 [ 15.820427] ret_from_fork+0x116/0x1d0 [ 15.820457] ? __pfx_kthread+0x10/0x10 [ 15.820479] ret_from_fork_asm+0x1a/0x30 [ 15.820511] </TASK> [ 15.820522] [ 15.829362] Allocated by task 282: [ 15.829565] kasan_save_stack+0x45/0x70 [ 15.829742] kasan_save_track+0x18/0x40 [ 15.830015] kasan_save_alloc_info+0x3b/0x50 [ 15.830233] __kasan_kmalloc+0xb7/0xc0 [ 15.830403] __kmalloc_cache_noprof+0x189/0x420 [ 15.830561] kasan_atomics+0x95/0x310 [ 15.830697] kunit_try_run_case+0x1a5/0x480 [ 15.830878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.831272] kthread+0x337/0x6f0 [ 15.831455] ret_from_fork+0x116/0x1d0 [ 15.831643] ret_from_fork_asm+0x1a/0x30 [ 15.831968] [ 15.832056] The buggy address belongs to the object at ffff8881027b3900 [ 15.832056] which belongs to the cache kmalloc-64 of size 64 [ 15.832715] The buggy address is located 0 bytes to the right of [ 15.832715] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.833369] [ 15.833503] The buggy address belongs to the physical page: [ 15.833721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.834009] flags: 0x200000000000000(node=0|zone=2) [ 15.834489] page_type: f5(slab) [ 15.834653] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.835141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.835384] page dumped because: kasan: bad access detected [ 15.835571] [ 15.835663] Memory state around the buggy address: [ 15.835921] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.836394] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.836692] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.837019] ^ [ 15.837202] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837422] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837638] ================================================================== [ 15.047683] ================================================================== [ 15.048406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.048876] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.049280] [ 15.049395] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.049439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.049452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.049506] Call Trace: [ 15.049522] <TASK> [ 15.049539] dump_stack_lvl+0x73/0xb0 [ 15.049569] print_report+0xd1/0x650 [ 15.049591] ? __virt_addr_valid+0x1db/0x2d0 [ 15.049645] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.049669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.049694] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.049717] kasan_report+0x141/0x180 [ 15.049740] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.049767] kasan_check_range+0x10c/0x1c0 [ 15.049853] __kasan_check_write+0x18/0x20 [ 15.049935] kasan_atomics_helper+0x4a0/0x5450 [ 15.049961] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.049986] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.050055] ? kasan_atomics+0x152/0x310 [ 15.050085] kasan_atomics+0x1dc/0x310 [ 15.050109] ? __pfx_kasan_atomics+0x10/0x10 [ 15.050132] ? trace_hardirqs_on+0x37/0xe0 [ 15.050156] ? __pfx_read_tsc+0x10/0x10 [ 15.050177] ? ktime_get_ts64+0x86/0x230 [ 15.050202] kunit_try_run_case+0x1a5/0x480 [ 15.050226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.050253] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.050279] ? __kthread_parkme+0x82/0x180 [ 15.050300] ? preempt_count_sub+0x50/0x80 [ 15.050325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.050350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.050376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.050402] kthread+0x337/0x6f0 [ 15.050422] ? trace_preempt_on+0x20/0xc0 [ 15.050445] ? __pfx_kthread+0x10/0x10 [ 15.050466] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.050489] ? calculate_sigpending+0x7b/0xa0 [ 15.050516] ? __pfx_kthread+0x10/0x10 [ 15.050538] ret_from_fork+0x116/0x1d0 [ 15.050557] ? __pfx_kthread+0x10/0x10 [ 15.050579] ret_from_fork_asm+0x1a/0x30 [ 15.050610] </TASK> [ 15.050621] [ 15.059445] Allocated by task 282: [ 15.059631] kasan_save_stack+0x45/0x70 [ 15.059960] kasan_save_track+0x18/0x40 [ 15.060198] kasan_save_alloc_info+0x3b/0x50 [ 15.060413] __kasan_kmalloc+0xb7/0xc0 [ 15.060551] __kmalloc_cache_noprof+0x189/0x420 [ 15.060769] kasan_atomics+0x95/0x310 [ 15.061137] kunit_try_run_case+0x1a5/0x480 [ 15.061357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.061632] kthread+0x337/0x6f0 [ 15.061757] ret_from_fork+0x116/0x1d0 [ 15.062070] ret_from_fork_asm+0x1a/0x30 [ 15.062317] [ 15.062448] The buggy address belongs to the object at ffff8881027b3900 [ 15.062448] which belongs to the cache kmalloc-64 of size 64 [ 15.063021] The buggy address is located 0 bytes to the right of [ 15.063021] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.063562] [ 15.063639] The buggy address belongs to the physical page: [ 15.063890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.064272] flags: 0x200000000000000(node=0|zone=2) [ 15.064506] page_type: f5(slab) [ 15.064662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.064951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.065541] page dumped because: kasan: bad access detected [ 15.065748] [ 15.065885] Memory state around the buggy address: [ 15.066133] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.066545] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.066985] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.067299] ^ [ 15.067503] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.067941] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.068281] ================================================================== [ 15.202862] ================================================================== [ 15.203345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.203842] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.204248] [ 15.204353] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.204396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.204409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.204430] Call Trace: [ 15.204445] <TASK> [ 15.204461] dump_stack_lvl+0x73/0xb0 [ 15.204491] print_report+0xd1/0x650 [ 15.204514] ? __virt_addr_valid+0x1db/0x2d0 [ 15.204538] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.204560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.204585] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.204608] kasan_report+0x141/0x180 [ 15.204631] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.204658] kasan_check_range+0x10c/0x1c0 [ 15.204683] __kasan_check_write+0x18/0x20 [ 15.204703] kasan_atomics_helper+0x7c7/0x5450 [ 15.204727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.204751] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.204778] ? kasan_atomics+0x152/0x310 [ 15.204805] kasan_atomics+0x1dc/0x310 [ 15.204830] ? __pfx_kasan_atomics+0x10/0x10 [ 15.204854] ? trace_hardirqs_on+0x37/0xe0 [ 15.204878] ? __pfx_read_tsc+0x10/0x10 [ 15.204900] ? ktime_get_ts64+0x86/0x230 [ 15.204925] kunit_try_run_case+0x1a5/0x480 [ 15.204950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.204977] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.205003] ? __kthread_parkme+0x82/0x180 [ 15.205024] ? preempt_count_sub+0x50/0x80 [ 15.205059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.205085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.205111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.205138] kthread+0x337/0x6f0 [ 15.205158] ? trace_preempt_on+0x20/0xc0 [ 15.205180] ? __pfx_kthread+0x10/0x10 [ 15.205202] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.205275] ? calculate_sigpending+0x7b/0xa0 [ 15.205305] ? __pfx_kthread+0x10/0x10 [ 15.205327] ret_from_fork+0x116/0x1d0 [ 15.205347] ? __pfx_kthread+0x10/0x10 [ 15.205369] ret_from_fork_asm+0x1a/0x30 [ 15.205400] </TASK> [ 15.205411] [ 15.213538] Allocated by task 282: [ 15.213798] kasan_save_stack+0x45/0x70 [ 15.214172] kasan_save_track+0x18/0x40 [ 15.214342] kasan_save_alloc_info+0x3b/0x50 [ 15.214496] __kasan_kmalloc+0xb7/0xc0 [ 15.214681] __kmalloc_cache_noprof+0x189/0x420 [ 15.214898] kasan_atomics+0x95/0x310 [ 15.215097] kunit_try_run_case+0x1a5/0x480 [ 15.215351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.215535] kthread+0x337/0x6f0 [ 15.215667] ret_from_fork+0x116/0x1d0 [ 15.215901] ret_from_fork_asm+0x1a/0x30 [ 15.216160] [ 15.216258] The buggy address belongs to the object at ffff8881027b3900 [ 15.216258] which belongs to the cache kmalloc-64 of size 64 [ 15.216749] The buggy address is located 0 bytes to the right of [ 15.216749] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.217397] [ 15.217499] The buggy address belongs to the physical page: [ 15.217700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.218062] flags: 0x200000000000000(node=0|zone=2) [ 15.218344] page_type: f5(slab) [ 15.218467] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.218793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.219290] page dumped because: kasan: bad access detected [ 15.219469] [ 15.219539] Memory state around the buggy address: [ 15.219696] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.219987] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.220309] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.220556] ^ [ 15.220714] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220929] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221528] ================================================================== [ 16.028299] ================================================================== [ 16.028614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.029120] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.029686] [ 16.030089] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.030138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.030152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.030174] Call Trace: [ 16.030189] <TASK> [ 16.030204] dump_stack_lvl+0x73/0xb0 [ 16.030235] print_report+0xd1/0x650 [ 16.030258] ? __virt_addr_valid+0x1db/0x2d0 [ 16.030282] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.030305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.030329] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.030352] kasan_report+0x141/0x180 [ 16.030375] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.030402] kasan_check_range+0x10c/0x1c0 [ 16.030427] __kasan_check_write+0x18/0x20 [ 16.030448] kasan_atomics_helper+0x1b22/0x5450 [ 16.030472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.030496] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.030522] ? kasan_atomics+0x152/0x310 [ 16.030550] kasan_atomics+0x1dc/0x310 [ 16.030573] ? __pfx_kasan_atomics+0x10/0x10 [ 16.030597] ? trace_hardirqs_on+0x37/0xe0 [ 16.030622] ? __pfx_read_tsc+0x10/0x10 [ 16.030644] ? ktime_get_ts64+0x86/0x230 [ 16.030669] kunit_try_run_case+0x1a5/0x480 [ 16.030694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.030720] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.030746] ? __kthread_parkme+0x82/0x180 [ 16.030767] ? preempt_count_sub+0x50/0x80 [ 16.030792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.030906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.030948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.030975] kthread+0x337/0x6f0 [ 16.030995] ? trace_preempt_on+0x20/0xc0 [ 16.031018] ? __pfx_kthread+0x10/0x10 [ 16.031052] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.031075] ? calculate_sigpending+0x7b/0xa0 [ 16.031100] ? __pfx_kthread+0x10/0x10 [ 16.031122] ret_from_fork+0x116/0x1d0 [ 16.031142] ? __pfx_kthread+0x10/0x10 [ 16.031163] ret_from_fork_asm+0x1a/0x30 [ 16.031195] </TASK> [ 16.031205] [ 16.043337] Allocated by task 282: [ 16.043505] kasan_save_stack+0x45/0x70 [ 16.044182] kasan_save_track+0x18/0x40 [ 16.044378] kasan_save_alloc_info+0x3b/0x50 [ 16.044548] __kasan_kmalloc+0xb7/0xc0 [ 16.044749] __kmalloc_cache_noprof+0x189/0x420 [ 16.045250] kasan_atomics+0x95/0x310 [ 16.045436] kunit_try_run_case+0x1a5/0x480 [ 16.045790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.046296] kthread+0x337/0x6f0 [ 16.046545] ret_from_fork+0x116/0x1d0 [ 16.046802] ret_from_fork_asm+0x1a/0x30 [ 16.047204] [ 16.047341] The buggy address belongs to the object at ffff8881027b3900 [ 16.047341] which belongs to the cache kmalloc-64 of size 64 [ 16.047843] The buggy address is located 0 bytes to the right of [ 16.047843] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.048702] [ 16.048797] The buggy address belongs to the physical page: [ 16.049288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.049763] flags: 0x200000000000000(node=0|zone=2) [ 16.050176] page_type: f5(slab) [ 16.050409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.050812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.051289] page dumped because: kasan: bad access detected [ 16.051734] [ 16.052097] Memory state around the buggy address: [ 16.052404] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.052986] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.053457] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.053782] ^ [ 16.054183] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.054600] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.055227] ================================================================== [ 15.316083] ================================================================== [ 15.316342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.316677] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.317009] [ 15.317236] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.317280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.317293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.317314] Call Trace: [ 15.317330] <TASK> [ 15.317346] dump_stack_lvl+0x73/0xb0 [ 15.317375] print_report+0xd1/0x650 [ 15.317398] ? __virt_addr_valid+0x1db/0x2d0 [ 15.317421] ? kasan_atomics_helper+0xac7/0x5450 [ 15.317443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.317468] ? kasan_atomics_helper+0xac7/0x5450 [ 15.317492] kasan_report+0x141/0x180 [ 15.317514] ? kasan_atomics_helper+0xac7/0x5450 [ 15.317542] kasan_check_range+0x10c/0x1c0 [ 15.317567] __kasan_check_write+0x18/0x20 [ 15.317588] kasan_atomics_helper+0xac7/0x5450 [ 15.317612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.317636] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.317662] ? kasan_atomics+0x152/0x310 [ 15.317690] kasan_atomics+0x1dc/0x310 [ 15.317713] ? __pfx_kasan_atomics+0x10/0x10 [ 15.317738] ? trace_hardirqs_on+0x37/0xe0 [ 15.317762] ? __pfx_read_tsc+0x10/0x10 [ 15.317784] ? ktime_get_ts64+0x86/0x230 [ 15.317808] kunit_try_run_case+0x1a5/0x480 [ 15.317832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.317858] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.317885] ? __kthread_parkme+0x82/0x180 [ 15.317905] ? preempt_count_sub+0x50/0x80 [ 15.317930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.318114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.318151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.318192] kthread+0x337/0x6f0 [ 15.318212] ? trace_preempt_on+0x20/0xc0 [ 15.318236] ? __pfx_kthread+0x10/0x10 [ 15.318257] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.318280] ? calculate_sigpending+0x7b/0xa0 [ 15.318306] ? __pfx_kthread+0x10/0x10 [ 15.318339] ret_from_fork+0x116/0x1d0 [ 15.318359] ? __pfx_kthread+0x10/0x10 [ 15.318383] ret_from_fork_asm+0x1a/0x30 [ 15.318426] </TASK> [ 15.318437] [ 15.326853] Allocated by task 282: [ 15.327101] kasan_save_stack+0x45/0x70 [ 15.327286] kasan_save_track+0x18/0x40 [ 15.327465] kasan_save_alloc_info+0x3b/0x50 [ 15.327687] __kasan_kmalloc+0xb7/0xc0 [ 15.327949] __kmalloc_cache_noprof+0x189/0x420 [ 15.328182] kasan_atomics+0x95/0x310 [ 15.328353] kunit_try_run_case+0x1a5/0x480 [ 15.328582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.328988] kthread+0x337/0x6f0 [ 15.329189] ret_from_fork+0x116/0x1d0 [ 15.329398] ret_from_fork_asm+0x1a/0x30 [ 15.329586] [ 15.329660] The buggy address belongs to the object at ffff8881027b3900 [ 15.329660] which belongs to the cache kmalloc-64 of size 64 [ 15.330015] The buggy address is located 0 bytes to the right of [ 15.330015] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.330581] [ 15.330677] The buggy address belongs to the physical page: [ 15.330923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.331505] flags: 0x200000000000000(node=0|zone=2) [ 15.331897] page_type: f5(slab) [ 15.332146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.332465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.332693] page dumped because: kasan: bad access detected [ 15.332884] [ 15.332977] Memory state around the buggy address: [ 15.333242] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.333641] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.334080] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.334373] ^ [ 15.334612] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.334915] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335294] ================================================================== [ 15.688515] ================================================================== [ 15.688975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.689438] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.689774] [ 15.690006] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.690064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.690077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.690098] Call Trace: [ 15.690112] <TASK> [ 15.690127] dump_stack_lvl+0x73/0xb0 [ 15.690156] print_report+0xd1/0x650 [ 15.690179] ? __virt_addr_valid+0x1db/0x2d0 [ 15.690203] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.690226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.690250] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.690274] kasan_report+0x141/0x180 [ 15.690297] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.690326] __asan_report_load4_noabort+0x18/0x20 [ 15.690352] kasan_atomics_helper+0x49ce/0x5450 [ 15.690376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.690401] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.690427] ? kasan_atomics+0x152/0x310 [ 15.690491] kasan_atomics+0x1dc/0x310 [ 15.690517] ? __pfx_kasan_atomics+0x10/0x10 [ 15.690541] ? trace_hardirqs_on+0x37/0xe0 [ 15.690577] ? __pfx_read_tsc+0x10/0x10 [ 15.690598] ? ktime_get_ts64+0x86/0x230 [ 15.690623] kunit_try_run_case+0x1a5/0x480 [ 15.690648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.690674] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.690700] ? __kthread_parkme+0x82/0x180 [ 15.690722] ? preempt_count_sub+0x50/0x80 [ 15.690747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.690772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.690797] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.690872] kthread+0x337/0x6f0 [ 15.690894] ? trace_preempt_on+0x20/0xc0 [ 15.690920] ? __pfx_kthread+0x10/0x10 [ 15.690948] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.690971] ? calculate_sigpending+0x7b/0xa0 [ 15.690996] ? __pfx_kthread+0x10/0x10 [ 15.691019] ret_from_fork+0x116/0x1d0 [ 15.691051] ? __pfx_kthread+0x10/0x10 [ 15.691073] ret_from_fork_asm+0x1a/0x30 [ 15.691104] </TASK> [ 15.691116] [ 15.699646] Allocated by task 282: [ 15.699833] kasan_save_stack+0x45/0x70 [ 15.700070] kasan_save_track+0x18/0x40 [ 15.700389] kasan_save_alloc_info+0x3b/0x50 [ 15.700548] __kasan_kmalloc+0xb7/0xc0 [ 15.700686] __kmalloc_cache_noprof+0x189/0x420 [ 15.701092] kasan_atomics+0x95/0x310 [ 15.701321] kunit_try_run_case+0x1a5/0x480 [ 15.701537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.701894] kthread+0x337/0x6f0 [ 15.702119] ret_from_fork+0x116/0x1d0 [ 15.702312] ret_from_fork_asm+0x1a/0x30 [ 15.702519] [ 15.702596] The buggy address belongs to the object at ffff8881027b3900 [ 15.702596] which belongs to the cache kmalloc-64 of size 64 [ 15.702994] The buggy address is located 0 bytes to the right of [ 15.702994] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.703691] [ 15.703796] The buggy address belongs to the physical page: [ 15.704382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.704728] flags: 0x200000000000000(node=0|zone=2) [ 15.704894] page_type: f5(slab) [ 15.705082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.705431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.705773] page dumped because: kasan: bad access detected [ 15.706135] [ 15.706238] Memory state around the buggy address: [ 15.706503] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.706865] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.707207] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.707427] ^ [ 15.707645] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.708191] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.708569] ================================================================== [ 15.335755] ================================================================== [ 15.336314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.336649] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.337118] [ 15.337206] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.337254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.337278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.337298] Call Trace: [ 15.337314] <TASK> [ 15.337329] dump_stack_lvl+0x73/0xb0 [ 15.337371] print_report+0xd1/0x650 [ 15.337395] ? __virt_addr_valid+0x1db/0x2d0 [ 15.337418] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.337441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.337465] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.337489] kasan_report+0x141/0x180 [ 15.337512] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.337539] kasan_check_range+0x10c/0x1c0 [ 15.337564] __kasan_check_write+0x18/0x20 [ 15.337586] kasan_atomics_helper+0xb6a/0x5450 [ 15.337609] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.337634] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.337660] ? kasan_atomics+0x152/0x310 [ 15.337688] kasan_atomics+0x1dc/0x310 [ 15.337711] ? __pfx_kasan_atomics+0x10/0x10 [ 15.337735] ? trace_hardirqs_on+0x37/0xe0 [ 15.337760] ? __pfx_read_tsc+0x10/0x10 [ 15.337781] ? ktime_get_ts64+0x86/0x230 [ 15.337806] kunit_try_run_case+0x1a5/0x480 [ 15.337832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.337857] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.337925] ? __kthread_parkme+0x82/0x180 [ 15.337969] ? preempt_count_sub+0x50/0x80 [ 15.337995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.338020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.338091] kthread+0x337/0x6f0 [ 15.338111] ? trace_preempt_on+0x20/0xc0 [ 15.338134] ? __pfx_kthread+0x10/0x10 [ 15.338166] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.338190] ? calculate_sigpending+0x7b/0xa0 [ 15.338215] ? __pfx_kthread+0x10/0x10 [ 15.338238] ret_from_fork+0x116/0x1d0 [ 15.338258] ? __pfx_kthread+0x10/0x10 [ 15.338279] ret_from_fork_asm+0x1a/0x30 [ 15.338320] </TASK> [ 15.338330] [ 15.346654] Allocated by task 282: [ 15.346824] kasan_save_stack+0x45/0x70 [ 15.347256] kasan_save_track+0x18/0x40 [ 15.347432] kasan_save_alloc_info+0x3b/0x50 [ 15.347651] __kasan_kmalloc+0xb7/0xc0 [ 15.347914] __kmalloc_cache_noprof+0x189/0x420 [ 15.348151] kasan_atomics+0x95/0x310 [ 15.348300] kunit_try_run_case+0x1a5/0x480 [ 15.348449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.348626] kthread+0x337/0x6f0 [ 15.348748] ret_from_fork+0x116/0x1d0 [ 15.348882] ret_from_fork_asm+0x1a/0x30 [ 15.349024] [ 15.349118] The buggy address belongs to the object at ffff8881027b3900 [ 15.349118] which belongs to the cache kmalloc-64 of size 64 [ 15.349473] The buggy address is located 0 bytes to the right of [ 15.349473] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.349839] [ 15.349911] The buggy address belongs to the physical page: [ 15.350095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.350339] flags: 0x200000000000000(node=0|zone=2) [ 15.350504] page_type: f5(slab) [ 15.350623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.352507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.352811] page dumped because: kasan: bad access detected [ 15.352998] [ 15.353349] Memory state around the buggy address: [ 15.354190] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.354597] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.355154] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.355629] ^ [ 15.355861] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.356508] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.356924] ================================================================== [ 16.325660] ================================================================== [ 16.326354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.326594] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.326976] [ 16.327103] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.327146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.327159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.327179] Call Trace: [ 16.327194] <TASK> [ 16.327209] dump_stack_lvl+0x73/0xb0 [ 16.327238] print_report+0xd1/0x650 [ 16.327261] ? __virt_addr_valid+0x1db/0x2d0 [ 16.327284] ? kasan_atomics_helper+0x218a/0x5450 [ 16.327306] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.327331] ? kasan_atomics_helper+0x218a/0x5450 [ 16.327354] kasan_report+0x141/0x180 [ 16.327386] ? kasan_atomics_helper+0x218a/0x5450 [ 16.327414] kasan_check_range+0x10c/0x1c0 [ 16.327439] __kasan_check_write+0x18/0x20 [ 16.327460] kasan_atomics_helper+0x218a/0x5450 [ 16.327484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.327508] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.327535] ? kasan_atomics+0x152/0x310 [ 16.327562] kasan_atomics+0x1dc/0x310 [ 16.327586] ? __pfx_kasan_atomics+0x10/0x10 [ 16.327609] ? trace_hardirqs_on+0x37/0xe0 [ 16.327633] ? __pfx_read_tsc+0x10/0x10 [ 16.327655] ? ktime_get_ts64+0x86/0x230 [ 16.327679] kunit_try_run_case+0x1a5/0x480 [ 16.327703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.327729] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.327756] ? __kthread_parkme+0x82/0x180 [ 16.327777] ? preempt_count_sub+0x50/0x80 [ 16.327802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.327879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.327906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.327952] kthread+0x337/0x6f0 [ 16.327973] ? trace_preempt_on+0x20/0xc0 [ 16.327997] ? __pfx_kthread+0x10/0x10 [ 16.328021] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.328058] ? calculate_sigpending+0x7b/0xa0 [ 16.328084] ? __pfx_kthread+0x10/0x10 [ 16.328107] ret_from_fork+0x116/0x1d0 [ 16.328127] ? __pfx_kthread+0x10/0x10 [ 16.328148] ret_from_fork_asm+0x1a/0x30 [ 16.328179] </TASK> [ 16.328191] [ 16.336151] Allocated by task 282: [ 16.336334] kasan_save_stack+0x45/0x70 [ 16.336534] kasan_save_track+0x18/0x40 [ 16.336729] kasan_save_alloc_info+0x3b/0x50 [ 16.336963] __kasan_kmalloc+0xb7/0xc0 [ 16.337164] __kmalloc_cache_noprof+0x189/0x420 [ 16.337383] kasan_atomics+0x95/0x310 [ 16.337540] kunit_try_run_case+0x1a5/0x480 [ 16.337688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.338115] kthread+0x337/0x6f0 [ 16.338295] ret_from_fork+0x116/0x1d0 [ 16.338468] ret_from_fork_asm+0x1a/0x30 [ 16.338611] [ 16.338683] The buggy address belongs to the object at ffff8881027b3900 [ 16.338683] which belongs to the cache kmalloc-64 of size 64 [ 16.339272] The buggy address is located 0 bytes to the right of [ 16.339272] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.339710] [ 16.339806] The buggy address belongs to the physical page: [ 16.340234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.340588] flags: 0x200000000000000(node=0|zone=2) [ 16.340776] page_type: f5(slab) [ 16.340953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.341270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.341505] page dumped because: kasan: bad access detected [ 16.341677] [ 16.341748] Memory state around the buggy address: [ 16.341904] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.342235] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.342561] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.342872] ^ [ 16.343220] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.343566] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.344025] ================================================================== [ 16.381505] ================================================================== [ 16.381884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.382285] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.382583] [ 16.382668] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.382709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.382721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.382741] Call Trace: [ 16.382755] <TASK> [ 16.382771] dump_stack_lvl+0x73/0xb0 [ 16.382800] print_report+0xd1/0x650 [ 16.382872] ? __virt_addr_valid+0x1db/0x2d0 [ 16.382896] ? kasan_atomics_helper+0x5115/0x5450 [ 16.382919] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.382943] ? kasan_atomics_helper+0x5115/0x5450 [ 16.382967] kasan_report+0x141/0x180 [ 16.382990] ? kasan_atomics_helper+0x5115/0x5450 [ 16.383019] __asan_report_load8_noabort+0x18/0x20 [ 16.383059] kasan_atomics_helper+0x5115/0x5450 [ 16.383083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.383108] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.383136] ? kasan_atomics+0x152/0x310 [ 16.383167] kasan_atomics+0x1dc/0x310 [ 16.383192] ? __pfx_kasan_atomics+0x10/0x10 [ 16.383216] ? trace_hardirqs_on+0x37/0xe0 [ 16.383240] ? __pfx_read_tsc+0x10/0x10 [ 16.383262] ? ktime_get_ts64+0x86/0x230 [ 16.383287] kunit_try_run_case+0x1a5/0x480 [ 16.383312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.383338] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.383364] ? __kthread_parkme+0x82/0x180 [ 16.383385] ? preempt_count_sub+0x50/0x80 [ 16.383411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.383436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.383462] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.383489] kthread+0x337/0x6f0 [ 16.383509] ? trace_preempt_on+0x20/0xc0 [ 16.383532] ? __pfx_kthread+0x10/0x10 [ 16.383554] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.383576] ? calculate_sigpending+0x7b/0xa0 [ 16.383602] ? __pfx_kthread+0x10/0x10 [ 16.383624] ret_from_fork+0x116/0x1d0 [ 16.383643] ? __pfx_kthread+0x10/0x10 [ 16.383665] ret_from_fork_asm+0x1a/0x30 [ 16.383697] </TASK> [ 16.383707] [ 16.391469] Allocated by task 282: [ 16.391607] kasan_save_stack+0x45/0x70 [ 16.391753] kasan_save_track+0x18/0x40 [ 16.391889] kasan_save_alloc_info+0x3b/0x50 [ 16.392055] __kasan_kmalloc+0xb7/0xc0 [ 16.392191] __kmalloc_cache_noprof+0x189/0x420 [ 16.392540] kasan_atomics+0x95/0x310 [ 16.393040] kunit_try_run_case+0x1a5/0x480 [ 16.393272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.393541] kthread+0x337/0x6f0 [ 16.393713] ret_from_fork+0x116/0x1d0 [ 16.393902] ret_from_fork_asm+0x1a/0x30 [ 16.394114] [ 16.394210] The buggy address belongs to the object at ffff8881027b3900 [ 16.394210] which belongs to the cache kmalloc-64 of size 64 [ 16.394623] The buggy address is located 0 bytes to the right of [ 16.394623] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.395268] [ 16.395346] The buggy address belongs to the physical page: [ 16.395521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.395763] flags: 0x200000000000000(node=0|zone=2) [ 16.395925] page_type: f5(slab) [ 16.396071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.396306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.396595] page dumped because: kasan: bad access detected [ 16.396770] [ 16.397104] Memory state around the buggy address: [ 16.397283] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.397503] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.397718] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.397931] ^ [ 16.398154] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.398470] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.398778] ================================================================== [ 15.122265] ================================================================== [ 15.123098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.123751] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.124473] [ 15.124649] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.124693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.124706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.124727] Call Trace: [ 15.124742] <TASK> [ 15.124758] dump_stack_lvl+0x73/0xb0 [ 15.124786] print_report+0xd1/0x650 [ 15.124886] ? __virt_addr_valid+0x1db/0x2d0 [ 15.124912] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.124935] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.124976] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.124999] kasan_report+0x141/0x180 [ 15.125022] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.125060] kasan_check_range+0x10c/0x1c0 [ 15.125086] __kasan_check_write+0x18/0x20 [ 15.125107] kasan_atomics_helper+0x5fe/0x5450 [ 15.125131] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.125156] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.125182] ? kasan_atomics+0x152/0x310 [ 15.125209] kasan_atomics+0x1dc/0x310 [ 15.125233] ? __pfx_kasan_atomics+0x10/0x10 [ 15.125256] ? trace_hardirqs_on+0x37/0xe0 [ 15.125281] ? __pfx_read_tsc+0x10/0x10 [ 15.125303] ? ktime_get_ts64+0x86/0x230 [ 15.125328] kunit_try_run_case+0x1a5/0x480 [ 15.125352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.125378] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.125404] ? __kthread_parkme+0x82/0x180 [ 15.125425] ? preempt_count_sub+0x50/0x80 [ 15.125450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.125476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.125502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.125529] kthread+0x337/0x6f0 [ 15.125549] ? trace_preempt_on+0x20/0xc0 [ 15.125572] ? __pfx_kthread+0x10/0x10 [ 15.125593] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.125616] ? calculate_sigpending+0x7b/0xa0 [ 15.125642] ? __pfx_kthread+0x10/0x10 [ 15.125664] ret_from_fork+0x116/0x1d0 [ 15.125683] ? __pfx_kthread+0x10/0x10 [ 15.125705] ret_from_fork_asm+0x1a/0x30 [ 15.125736] </TASK> [ 15.125747] [ 15.138290] Allocated by task 282: [ 15.138460] kasan_save_stack+0x45/0x70 [ 15.138607] kasan_save_track+0x18/0x40 [ 15.138746] kasan_save_alloc_info+0x3b/0x50 [ 15.139196] __kasan_kmalloc+0xb7/0xc0 [ 15.139566] __kmalloc_cache_noprof+0x189/0x420 [ 15.140062] kasan_atomics+0x95/0x310 [ 15.140412] kunit_try_run_case+0x1a5/0x480 [ 15.140809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.141352] kthread+0x337/0x6f0 [ 15.141487] ret_from_fork+0x116/0x1d0 [ 15.141627] ret_from_fork_asm+0x1a/0x30 [ 15.141769] [ 15.142038] The buggy address belongs to the object at ffff8881027b3900 [ 15.142038] which belongs to the cache kmalloc-64 of size 64 [ 15.143300] The buggy address is located 0 bytes to the right of [ 15.143300] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.144512] [ 15.144660] The buggy address belongs to the physical page: [ 15.144980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.145651] flags: 0x200000000000000(node=0|zone=2) [ 15.146102] page_type: f5(slab) [ 15.146241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.146474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.146701] page dumped because: kasan: bad access detected [ 15.147139] [ 15.147297] Memory state around the buggy address: [ 15.147704] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.148709] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.149464] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.150177] ^ [ 15.150624] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151001] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151714] ================================================================== [ 16.362419] ================================================================== [ 16.362687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.363218] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.363491] [ 16.363575] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.363616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.363629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.363650] Call Trace: [ 16.363663] <TASK> [ 16.363677] dump_stack_lvl+0x73/0xb0 [ 16.363705] print_report+0xd1/0x650 [ 16.363728] ? __virt_addr_valid+0x1db/0x2d0 [ 16.363751] ? kasan_atomics_helper+0x224c/0x5450 [ 16.363774] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.363798] ? kasan_atomics_helper+0x224c/0x5450 [ 16.363821] kasan_report+0x141/0x180 [ 16.363845] ? kasan_atomics_helper+0x224c/0x5450 [ 16.363873] kasan_check_range+0x10c/0x1c0 [ 16.363898] __kasan_check_write+0x18/0x20 [ 16.363918] kasan_atomics_helper+0x224c/0x5450 [ 16.364004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.364043] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.364070] ? kasan_atomics+0x152/0x310 [ 16.364098] kasan_atomics+0x1dc/0x310 [ 16.364122] ? __pfx_kasan_atomics+0x10/0x10 [ 16.364146] ? trace_hardirqs_on+0x37/0xe0 [ 16.364170] ? __pfx_read_tsc+0x10/0x10 [ 16.364192] ? ktime_get_ts64+0x86/0x230 [ 16.364215] kunit_try_run_case+0x1a5/0x480 [ 16.364240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.364266] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.364292] ? __kthread_parkme+0x82/0x180 [ 16.364314] ? preempt_count_sub+0x50/0x80 [ 16.364338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.364364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.364390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.364416] kthread+0x337/0x6f0 [ 16.364436] ? trace_preempt_on+0x20/0xc0 [ 16.364459] ? __pfx_kthread+0x10/0x10 [ 16.364481] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.364504] ? calculate_sigpending+0x7b/0xa0 [ 16.364528] ? __pfx_kthread+0x10/0x10 [ 16.364551] ret_from_fork+0x116/0x1d0 [ 16.364570] ? __pfx_kthread+0x10/0x10 [ 16.364591] ret_from_fork_asm+0x1a/0x30 [ 16.364623] </TASK> [ 16.364633] [ 16.373069] Allocated by task 282: [ 16.373239] kasan_save_stack+0x45/0x70 [ 16.373418] kasan_save_track+0x18/0x40 [ 16.373589] kasan_save_alloc_info+0x3b/0x50 [ 16.373787] __kasan_kmalloc+0xb7/0xc0 [ 16.373998] __kmalloc_cache_noprof+0x189/0x420 [ 16.374181] kasan_atomics+0x95/0x310 [ 16.374317] kunit_try_run_case+0x1a5/0x480 [ 16.374465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.374643] kthread+0x337/0x6f0 [ 16.374764] ret_from_fork+0x116/0x1d0 [ 16.374897] ret_from_fork_asm+0x1a/0x30 [ 16.375045] [ 16.375117] The buggy address belongs to the object at ffff8881027b3900 [ 16.375117] which belongs to the cache kmalloc-64 of size 64 [ 16.375612] The buggy address is located 0 bytes to the right of [ 16.375612] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.376387] [ 16.376486] The buggy address belongs to the physical page: [ 16.376735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.377089] flags: 0x200000000000000(node=0|zone=2) [ 16.377440] page_type: f5(slab) [ 16.377785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.378212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.378445] page dumped because: kasan: bad access detected [ 16.378616] [ 16.378686] Memory state around the buggy address: [ 16.378996] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.379339] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.379658] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.380314] ^ [ 16.380523] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.380792] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.381174] ================================================================== [ 15.068775] ================================================================== [ 15.069209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.069591] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.070109] [ 15.070226] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.070270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.070282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.070303] Call Trace: [ 15.070318] <TASK> [ 15.070334] dump_stack_lvl+0x73/0xb0 [ 15.070364] print_report+0xd1/0x650 [ 15.070387] ? __virt_addr_valid+0x1db/0x2d0 [ 15.070410] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.070475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.070501] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.070525] kasan_report+0x141/0x180 [ 15.070549] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.070610] __asan_report_store4_noabort+0x1b/0x30 [ 15.070638] kasan_atomics_helper+0x4b3a/0x5450 [ 15.070662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.070686] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.070712] ? kasan_atomics+0x152/0x310 [ 15.070740] kasan_atomics+0x1dc/0x310 [ 15.070765] ? __pfx_kasan_atomics+0x10/0x10 [ 15.070789] ? trace_hardirqs_on+0x37/0xe0 [ 15.070937] ? __pfx_read_tsc+0x10/0x10 [ 15.070961] ? ktime_get_ts64+0x86/0x230 [ 15.070985] kunit_try_run_case+0x1a5/0x480 [ 15.071036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071065] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.071092] ? __kthread_parkme+0x82/0x180 [ 15.071113] ? preempt_count_sub+0x50/0x80 [ 15.071138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.071190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.071217] kthread+0x337/0x6f0 [ 15.071236] ? trace_preempt_on+0x20/0xc0 [ 15.071259] ? __pfx_kthread+0x10/0x10 [ 15.071281] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.071304] ? calculate_sigpending+0x7b/0xa0 [ 15.071329] ? __pfx_kthread+0x10/0x10 [ 15.071352] ret_from_fork+0x116/0x1d0 [ 15.071371] ? __pfx_kthread+0x10/0x10 [ 15.071393] ret_from_fork_asm+0x1a/0x30 [ 15.071424] </TASK> [ 15.071436] [ 15.080415] Allocated by task 282: [ 15.080587] kasan_save_stack+0x45/0x70 [ 15.080791] kasan_save_track+0x18/0x40 [ 15.080990] kasan_save_alloc_info+0x3b/0x50 [ 15.081201] __kasan_kmalloc+0xb7/0xc0 [ 15.081382] __kmalloc_cache_noprof+0x189/0x420 [ 15.081606] kasan_atomics+0x95/0x310 [ 15.081779] kunit_try_run_case+0x1a5/0x480 [ 15.081954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.082307] kthread+0x337/0x6f0 [ 15.082441] ret_from_fork+0x116/0x1d0 [ 15.082578] ret_from_fork_asm+0x1a/0x30 [ 15.082722] [ 15.082848] The buggy address belongs to the object at ffff8881027b3900 [ 15.082848] which belongs to the cache kmalloc-64 of size 64 [ 15.083376] The buggy address is located 0 bytes to the right of [ 15.083376] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.084228] [ 15.084332] The buggy address belongs to the physical page: [ 15.084650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.085013] flags: 0x200000000000000(node=0|zone=2) [ 15.085208] page_type: f5(slab) [ 15.088192] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.088526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.088873] page dumped because: kasan: bad access detected [ 15.089095] [ 15.089174] Memory state around the buggy address: [ 15.089368] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.089683] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.090432] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.090648] ^ [ 15.090803] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091010] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091338] ================================================================== [ 16.080498] ================================================================== [ 16.080842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.081367] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.081683] [ 16.081774] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.082141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.082159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.082180] Call Trace: [ 16.082198] <TASK> [ 16.082212] dump_stack_lvl+0x73/0xb0 [ 16.082344] print_report+0xd1/0x650 [ 16.082367] ? __virt_addr_valid+0x1db/0x2d0 [ 16.082391] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.082414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.082438] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.082462] kasan_report+0x141/0x180 [ 16.082485] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.082512] __asan_report_load8_noabort+0x18/0x20 [ 16.082538] kasan_atomics_helper+0x4f30/0x5450 [ 16.082562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.082586] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.082612] ? kasan_atomics+0x152/0x310 [ 16.082640] kasan_atomics+0x1dc/0x310 [ 16.082663] ? __pfx_kasan_atomics+0x10/0x10 [ 16.082687] ? trace_hardirqs_on+0x37/0xe0 [ 16.082711] ? __pfx_read_tsc+0x10/0x10 [ 16.082733] ? ktime_get_ts64+0x86/0x230 [ 16.082758] kunit_try_run_case+0x1a5/0x480 [ 16.082783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.082854] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.082885] ? __kthread_parkme+0x82/0x180 [ 16.082907] ? preempt_count_sub+0x50/0x80 [ 16.082932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.082959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.082985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.083013] kthread+0x337/0x6f0 [ 16.083045] ? trace_preempt_on+0x20/0xc0 [ 16.083068] ? __pfx_kthread+0x10/0x10 [ 16.083090] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.083112] ? calculate_sigpending+0x7b/0xa0 [ 16.083137] ? __pfx_kthread+0x10/0x10 [ 16.083160] ret_from_fork+0x116/0x1d0 [ 16.083178] ? __pfx_kthread+0x10/0x10 [ 16.083200] ret_from_fork_asm+0x1a/0x30 [ 16.083231] </TASK> [ 16.083242] [ 16.093539] Allocated by task 282: [ 16.093694] kasan_save_stack+0x45/0x70 [ 16.094417] kasan_save_track+0x18/0x40 [ 16.094610] kasan_save_alloc_info+0x3b/0x50 [ 16.094779] __kasan_kmalloc+0xb7/0xc0 [ 16.095027] __kmalloc_cache_noprof+0x189/0x420 [ 16.095457] kasan_atomics+0x95/0x310 [ 16.095728] kunit_try_run_case+0x1a5/0x480 [ 16.096253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.096504] kthread+0x337/0x6f0 [ 16.096653] ret_from_fork+0x116/0x1d0 [ 16.096848] ret_from_fork_asm+0x1a/0x30 [ 16.097380] [ 16.097461] The buggy address belongs to the object at ffff8881027b3900 [ 16.097461] which belongs to the cache kmalloc-64 of size 64 [ 16.098289] The buggy address is located 0 bytes to the right of [ 16.098289] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.098951] [ 16.099119] The buggy address belongs to the physical page: [ 16.099455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.100012] flags: 0x200000000000000(node=0|zone=2) [ 16.100262] page_type: f5(slab) [ 16.100417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.100848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.101303] page dumped because: kasan: bad access detected [ 16.101547] [ 16.101625] Memory state around the buggy address: [ 16.101838] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.102543] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.103047] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.103440] ^ [ 16.103606] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.104243] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.104614] ================================================================== [ 15.592194] ================================================================== [ 15.592490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.592871] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.593268] [ 15.593357] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.593399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.593411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.593432] Call Trace: [ 15.593447] <TASK> [ 15.593463] dump_stack_lvl+0x73/0xb0 [ 15.593492] print_report+0xd1/0x650 [ 15.593515] ? __virt_addr_valid+0x1db/0x2d0 [ 15.593538] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.593561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.593585] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.593609] kasan_report+0x141/0x180 [ 15.593632] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.593659] __asan_report_load4_noabort+0x18/0x20 [ 15.593686] kasan_atomics_helper+0x4a02/0x5450 [ 15.593710] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.593734] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.593761] ? kasan_atomics+0x152/0x310 [ 15.593788] kasan_atomics+0x1dc/0x310 [ 15.593876] ? __pfx_kasan_atomics+0x10/0x10 [ 15.593901] ? trace_hardirqs_on+0x37/0xe0 [ 15.593944] ? __pfx_read_tsc+0x10/0x10 [ 15.593966] ? ktime_get_ts64+0x86/0x230 [ 15.593991] kunit_try_run_case+0x1a5/0x480 [ 15.594016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594051] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.594076] ? __kthread_parkme+0x82/0x180 [ 15.594098] ? preempt_count_sub+0x50/0x80 [ 15.594123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.594173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.594223] kthread+0x337/0x6f0 [ 15.594243] ? trace_preempt_on+0x20/0xc0 [ 15.594267] ? __pfx_kthread+0x10/0x10 [ 15.594288] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.594311] ? calculate_sigpending+0x7b/0xa0 [ 15.594335] ? __pfx_kthread+0x10/0x10 [ 15.594358] ret_from_fork+0x116/0x1d0 [ 15.594377] ? __pfx_kthread+0x10/0x10 [ 15.594399] ret_from_fork_asm+0x1a/0x30 [ 15.594431] </TASK> [ 15.594441] [ 15.605696] Allocated by task 282: [ 15.606121] kasan_save_stack+0x45/0x70 [ 15.606423] kasan_save_track+0x18/0x40 [ 15.606701] kasan_save_alloc_info+0x3b/0x50 [ 15.607043] __kasan_kmalloc+0xb7/0xc0 [ 15.607322] __kmalloc_cache_noprof+0x189/0x420 [ 15.607540] kasan_atomics+0x95/0x310 [ 15.607716] kunit_try_run_case+0x1a5/0x480 [ 15.608164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.608382] kthread+0x337/0x6f0 [ 15.608707] ret_from_fork+0x116/0x1d0 [ 15.609108] ret_from_fork_asm+0x1a/0x30 [ 15.609334] [ 15.609426] The buggy address belongs to the object at ffff8881027b3900 [ 15.609426] which belongs to the cache kmalloc-64 of size 64 [ 15.610178] The buggy address is located 0 bytes to the right of [ 15.610178] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.611112] [ 15.611216] The buggy address belongs to the physical page: [ 15.611975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.613388] flags: 0x200000000000000(node=0|zone=2) [ 15.614076] page_type: f5(slab) [ 15.614209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.614445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.614674] page dumped because: kasan: bad access detected [ 15.615540] [ 15.616012] Memory state around the buggy address: [ 15.616641] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.617733] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.618618] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.619789] ^ [ 15.620378] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.620605] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.621266] ================================================================== [ 16.221685] ================================================================== [ 16.222200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.222514] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.222737] [ 16.222820] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.222885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.222898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.222935] Call Trace: [ 16.222949] <TASK> [ 16.222965] dump_stack_lvl+0x73/0xb0 [ 16.222993] print_report+0xd1/0x650 [ 16.223016] ? __virt_addr_valid+0x1db/0x2d0 [ 16.223048] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.223071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.223095] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.223118] kasan_report+0x141/0x180 [ 16.223141] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.223169] __asan_report_load8_noabort+0x18/0x20 [ 16.223195] kasan_atomics_helper+0x4f71/0x5450 [ 16.223219] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.223243] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.223270] ? kasan_atomics+0x152/0x310 [ 16.223297] kasan_atomics+0x1dc/0x310 [ 16.223320] ? __pfx_kasan_atomics+0x10/0x10 [ 16.223344] ? trace_hardirqs_on+0x37/0xe0 [ 16.223392] ? __pfx_read_tsc+0x10/0x10 [ 16.223438] ? ktime_get_ts64+0x86/0x230 [ 16.223463] kunit_try_run_case+0x1a5/0x480 [ 16.223488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.223514] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.223540] ? __kthread_parkme+0x82/0x180 [ 16.223561] ? preempt_count_sub+0x50/0x80 [ 16.223586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.223612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.223640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.223669] kthread+0x337/0x6f0 [ 16.223689] ? trace_preempt_on+0x20/0xc0 [ 16.223712] ? __pfx_kthread+0x10/0x10 [ 16.223734] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.223757] ? calculate_sigpending+0x7b/0xa0 [ 16.223783] ? __pfx_kthread+0x10/0x10 [ 16.223813] ret_from_fork+0x116/0x1d0 [ 16.223832] ? __pfx_kthread+0x10/0x10 [ 16.223885] ret_from_fork_asm+0x1a/0x30 [ 16.223932] </TASK> [ 16.223947] [ 16.231861] Allocated by task 282: [ 16.232084] kasan_save_stack+0x45/0x70 [ 16.232291] kasan_save_track+0x18/0x40 [ 16.232482] kasan_save_alloc_info+0x3b/0x50 [ 16.232819] __kasan_kmalloc+0xb7/0xc0 [ 16.233050] __kmalloc_cache_noprof+0x189/0x420 [ 16.233243] kasan_atomics+0x95/0x310 [ 16.233380] kunit_try_run_case+0x1a5/0x480 [ 16.233576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.233902] kthread+0x337/0x6f0 [ 16.234085] ret_from_fork+0x116/0x1d0 [ 16.234262] ret_from_fork_asm+0x1a/0x30 [ 16.234465] [ 16.234559] The buggy address belongs to the object at ffff8881027b3900 [ 16.234559] which belongs to the cache kmalloc-64 of size 64 [ 16.235115] The buggy address is located 0 bytes to the right of [ 16.235115] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.235482] [ 16.235555] The buggy address belongs to the physical page: [ 16.235988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.236352] flags: 0x200000000000000(node=0|zone=2) [ 16.236585] page_type: f5(slab) [ 16.236815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.237134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.237465] page dumped because: kasan: bad access detected [ 16.237638] [ 16.237707] Memory state around the buggy address: [ 16.237887] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.238347] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.238681] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.239215] ^ [ 16.239442] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.239744] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.240241] ================================================================== [ 16.240636] ================================================================== [ 16.241089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.241565] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.241855] [ 16.241955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.241997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.242011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.242061] Call Trace: [ 16.242077] <TASK> [ 16.242092] dump_stack_lvl+0x73/0xb0 [ 16.242121] print_report+0xd1/0x650 [ 16.242143] ? __virt_addr_valid+0x1db/0x2d0 [ 16.242166] ? kasan_atomics_helper+0x2006/0x5450 [ 16.242189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.242214] ? kasan_atomics_helper+0x2006/0x5450 [ 16.242237] kasan_report+0x141/0x180 [ 16.242285] ? kasan_atomics_helper+0x2006/0x5450 [ 16.242314] kasan_check_range+0x10c/0x1c0 [ 16.242338] __kasan_check_write+0x18/0x20 [ 16.242359] kasan_atomics_helper+0x2006/0x5450 [ 16.242383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.242407] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.242433] ? kasan_atomics+0x152/0x310 [ 16.242461] kasan_atomics+0x1dc/0x310 [ 16.242485] ? __pfx_kasan_atomics+0x10/0x10 [ 16.242509] ? trace_hardirqs_on+0x37/0xe0 [ 16.242532] ? __pfx_read_tsc+0x10/0x10 [ 16.242555] ? ktime_get_ts64+0x86/0x230 [ 16.242579] kunit_try_run_case+0x1a5/0x480 [ 16.242603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.242630] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.242657] ? __kthread_parkme+0x82/0x180 [ 16.242678] ? preempt_count_sub+0x50/0x80 [ 16.242703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.242729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.242754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.242819] kthread+0x337/0x6f0 [ 16.242840] ? trace_preempt_on+0x20/0xc0 [ 16.242863] ? __pfx_kthread+0x10/0x10 [ 16.242895] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.242933] ? calculate_sigpending+0x7b/0xa0 [ 16.242958] ? __pfx_kthread+0x10/0x10 [ 16.242981] ret_from_fork+0x116/0x1d0 [ 16.243001] ? __pfx_kthread+0x10/0x10 [ 16.243023] ret_from_fork_asm+0x1a/0x30 [ 16.243063] </TASK> [ 16.243075] [ 16.250870] Allocated by task 282: [ 16.251035] kasan_save_stack+0x45/0x70 [ 16.251245] kasan_save_track+0x18/0x40 [ 16.251448] kasan_save_alloc_info+0x3b/0x50 [ 16.251820] __kasan_kmalloc+0xb7/0xc0 [ 16.252063] __kmalloc_cache_noprof+0x189/0x420 [ 16.252357] kasan_atomics+0x95/0x310 [ 16.252504] kunit_try_run_case+0x1a5/0x480 [ 16.252655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.252834] kthread+0x337/0x6f0 [ 16.252981] ret_from_fork+0x116/0x1d0 [ 16.253180] ret_from_fork_asm+0x1a/0x30 [ 16.253533] [ 16.253651] The buggy address belongs to the object at ffff8881027b3900 [ 16.253651] which belongs to the cache kmalloc-64 of size 64 [ 16.254337] The buggy address is located 0 bytes to the right of [ 16.254337] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.254717] [ 16.254787] The buggy address belongs to the physical page: [ 16.254960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.255593] flags: 0x200000000000000(node=0|zone=2) [ 16.256148] page_type: f5(slab) [ 16.256546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.257422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.258129] page dumped because: kasan: bad access detected [ 16.258747] [ 16.258909] Memory state around the buggy address: [ 16.259415] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.260236] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.260558] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.260765] ^ [ 16.260924] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.261197] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.261503] ================================================================== [ 16.203199] ================================================================== [ 16.203608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.204017] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.204257] [ 16.204344] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.204386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.204423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.204445] Call Trace: [ 16.204458] <TASK> [ 16.204473] dump_stack_lvl+0x73/0xb0 [ 16.204504] print_report+0xd1/0x650 [ 16.204545] ? __virt_addr_valid+0x1db/0x2d0 [ 16.204569] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.204604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.204649] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.204673] kasan_report+0x141/0x180 [ 16.204696] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.204723] kasan_check_range+0x10c/0x1c0 [ 16.204748] __kasan_check_write+0x18/0x20 [ 16.204798] kasan_atomics_helper+0x1f43/0x5450 [ 16.204823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.204847] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.204891] ? kasan_atomics+0x152/0x310 [ 16.204926] kasan_atomics+0x1dc/0x310 [ 16.204950] ? __pfx_kasan_atomics+0x10/0x10 [ 16.204974] ? trace_hardirqs_on+0x37/0xe0 [ 16.204999] ? __pfx_read_tsc+0x10/0x10 [ 16.205020] ? ktime_get_ts64+0x86/0x230 [ 16.205054] kunit_try_run_case+0x1a5/0x480 [ 16.205079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.205105] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.205131] ? __kthread_parkme+0x82/0x180 [ 16.205153] ? preempt_count_sub+0x50/0x80 [ 16.205177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.205203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.205228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.205256] kthread+0x337/0x6f0 [ 16.205306] ? trace_preempt_on+0x20/0xc0 [ 16.205331] ? __pfx_kthread+0x10/0x10 [ 16.205352] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.205375] ? calculate_sigpending+0x7b/0xa0 [ 16.205401] ? __pfx_kthread+0x10/0x10 [ 16.205423] ret_from_fork+0x116/0x1d0 [ 16.205443] ? __pfx_kthread+0x10/0x10 [ 16.205464] ret_from_fork_asm+0x1a/0x30 [ 16.205496] </TASK> [ 16.205507] [ 16.213453] Allocated by task 282: [ 16.213579] kasan_save_stack+0x45/0x70 [ 16.213723] kasan_save_track+0x18/0x40 [ 16.214027] kasan_save_alloc_info+0x3b/0x50 [ 16.214252] __kasan_kmalloc+0xb7/0xc0 [ 16.214462] __kmalloc_cache_noprof+0x189/0x420 [ 16.214706] kasan_atomics+0x95/0x310 [ 16.214903] kunit_try_run_case+0x1a5/0x480 [ 16.215194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.215442] kthread+0x337/0x6f0 [ 16.215582] ret_from_fork+0x116/0x1d0 [ 16.215754] ret_from_fork_asm+0x1a/0x30 [ 16.215967] [ 16.216075] The buggy address belongs to the object at ffff8881027b3900 [ 16.216075] which belongs to the cache kmalloc-64 of size 64 [ 16.216625] The buggy address is located 0 bytes to the right of [ 16.216625] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.217105] [ 16.217179] The buggy address belongs to the physical page: [ 16.217353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.217594] flags: 0x200000000000000(node=0|zone=2) [ 16.217868] page_type: f5(slab) [ 16.218068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.218555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.218961] page dumped because: kasan: bad access detected [ 16.219155] [ 16.219225] Memory state around the buggy address: [ 16.219380] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.219597] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.219967] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.220300] ^ [ 16.220570] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.220964] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.221265] ================================================================== [ 14.911523] ================================================================== [ 14.912194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.912513] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 14.912803] [ 14.912915] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.912959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.912969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.912990] Call Trace: [ 14.913015] <TASK> [ 14.913041] dump_stack_lvl+0x73/0xb0 [ 14.913072] print_report+0xd1/0x650 [ 14.913094] ? __virt_addr_valid+0x1db/0x2d0 [ 14.913117] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.913140] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.913164] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.913186] kasan_report+0x141/0x180 [ 14.913207] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.913234] __asan_report_load4_noabort+0x18/0x20 [ 14.913259] kasan_atomics_helper+0x4bbc/0x5450 [ 14.913283] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.913305] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.913330] ? kasan_atomics+0x152/0x310 [ 14.913356] kasan_atomics+0x1dc/0x310 [ 14.913378] ? __pfx_kasan_atomics+0x10/0x10 [ 14.913401] ? trace_hardirqs_on+0x37/0xe0 [ 14.913424] ? __pfx_read_tsc+0x10/0x10 [ 14.913445] ? ktime_get_ts64+0x86/0x230 [ 14.913469] kunit_try_run_case+0x1a5/0x480 [ 14.913494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.913519] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.913544] ? __kthread_parkme+0x82/0x180 [ 14.913564] ? preempt_count_sub+0x50/0x80 [ 14.913588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.913612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.913636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.913662] kthread+0x337/0x6f0 [ 14.913681] ? trace_preempt_on+0x20/0xc0 [ 14.913704] ? __pfx_kthread+0x10/0x10 [ 14.913723] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.913745] ? calculate_sigpending+0x7b/0xa0 [ 14.913769] ? __pfx_kthread+0x10/0x10 [ 14.913790] ret_from_fork+0x116/0x1d0 [ 14.913808] ? __pfx_kthread+0x10/0x10 [ 14.913829] ret_from_fork_asm+0x1a/0x30 [ 14.913860] </TASK> [ 14.913870] [ 14.925113] Allocated by task 282: [ 14.925292] kasan_save_stack+0x45/0x70 [ 14.925476] kasan_save_track+0x18/0x40 [ 14.925638] kasan_save_alloc_info+0x3b/0x50 [ 14.925832] __kasan_kmalloc+0xb7/0xc0 [ 14.925992] __kmalloc_cache_noprof+0x189/0x420 [ 14.927071] kasan_atomics+0x95/0x310 [ 14.927385] kunit_try_run_case+0x1a5/0x480 [ 14.927697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.928074] kthread+0x337/0x6f0 [ 14.928487] ret_from_fork+0x116/0x1d0 [ 14.928779] ret_from_fork_asm+0x1a/0x30 [ 14.929194] [ 14.929291] The buggy address belongs to the object at ffff8881027b3900 [ 14.929291] which belongs to the cache kmalloc-64 of size 64 [ 14.929761] The buggy address is located 0 bytes to the right of [ 14.929761] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 14.930788] [ 14.931064] The buggy address belongs to the physical page: [ 14.931578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 14.932126] flags: 0x200000000000000(node=0|zone=2) [ 14.932464] page_type: f5(slab) [ 14.932740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.933315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.933702] page dumped because: kasan: bad access detected [ 14.934150] [ 14.934382] Memory state around the buggy address: [ 14.934780] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.935247] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.935571] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.935873] ^ [ 14.936545] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937054] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937353] ================================================================== [ 15.666427] ================================================================== [ 15.666722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.667251] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.667710] [ 15.667873] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.667960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.667974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.668007] Call Trace: [ 15.668024] <TASK> [ 15.668082] dump_stack_lvl+0x73/0xb0 [ 15.668115] print_report+0xd1/0x650 [ 15.668137] ? __virt_addr_valid+0x1db/0x2d0 [ 15.668171] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.668194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.668219] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.668242] kasan_report+0x141/0x180 [ 15.668264] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.668292] kasan_check_range+0x10c/0x1c0 [ 15.668318] __kasan_check_write+0x18/0x20 [ 15.668339] kasan_atomics_helper+0x12e6/0x5450 [ 15.668363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.668387] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.668413] ? kasan_atomics+0x152/0x310 [ 15.668467] kasan_atomics+0x1dc/0x310 [ 15.668492] ? __pfx_kasan_atomics+0x10/0x10 [ 15.668516] ? trace_hardirqs_on+0x37/0xe0 [ 15.668552] ? __pfx_read_tsc+0x10/0x10 [ 15.668574] ? ktime_get_ts64+0x86/0x230 [ 15.668624] kunit_try_run_case+0x1a5/0x480 [ 15.668649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.668676] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.668713] ? __kthread_parkme+0x82/0x180 [ 15.668734] ? preempt_count_sub+0x50/0x80 [ 15.668758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.668794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.668868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.668896] kthread+0x337/0x6f0 [ 15.668917] ? trace_preempt_on+0x20/0xc0 [ 15.668940] ? __pfx_kthread+0x10/0x10 [ 15.668962] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.668985] ? calculate_sigpending+0x7b/0xa0 [ 15.669009] ? __pfx_kthread+0x10/0x10 [ 15.669043] ret_from_fork+0x116/0x1d0 [ 15.669062] ? __pfx_kthread+0x10/0x10 [ 15.669085] ret_from_fork_asm+0x1a/0x30 [ 15.669116] </TASK> [ 15.669126] [ 15.678200] Allocated by task 282: [ 15.678379] kasan_save_stack+0x45/0x70 [ 15.678579] kasan_save_track+0x18/0x40 [ 15.678757] kasan_save_alloc_info+0x3b/0x50 [ 15.678955] __kasan_kmalloc+0xb7/0xc0 [ 15.679335] __kmalloc_cache_noprof+0x189/0x420 [ 15.679504] kasan_atomics+0x95/0x310 [ 15.679637] kunit_try_run_case+0x1a5/0x480 [ 15.679779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.679958] kthread+0x337/0x6f0 [ 15.680090] ret_from_fork+0x116/0x1d0 [ 15.680224] ret_from_fork_asm+0x1a/0x30 [ 15.680515] [ 15.680854] The buggy address belongs to the object at ffff8881027b3900 [ 15.680854] which belongs to the cache kmalloc-64 of size 64 [ 15.682074] The buggy address is located 0 bytes to the right of [ 15.682074] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.682683] [ 15.682783] The buggy address belongs to the physical page: [ 15.683189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.683590] flags: 0x200000000000000(node=0|zone=2) [ 15.683808] page_type: f5(slab) [ 15.684166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.684420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.684672] page dumped because: kasan: bad access detected [ 15.685288] [ 15.685578] Memory state around the buggy address: [ 15.685808] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.686261] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.686554] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.686977] ^ [ 15.687248] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687539] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687994] ================================================================== [ 15.937174] ================================================================== [ 15.937512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.937822] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.938223] [ 15.938355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.938397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.938410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.938430] Call Trace: [ 15.938445] <TASK> [ 15.938460] dump_stack_lvl+0x73/0xb0 [ 15.938490] print_report+0xd1/0x650 [ 15.938513] ? __virt_addr_valid+0x1db/0x2d0 [ 15.938536] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.938559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.938594] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.938624] kasan_report+0x141/0x180 [ 15.938654] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.938682] kasan_check_range+0x10c/0x1c0 [ 15.938706] __kasan_check_write+0x18/0x20 [ 15.938728] kasan_atomics_helper+0x18b1/0x5450 [ 15.938762] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.938787] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.938819] ? kasan_atomics+0x152/0x310 [ 15.938857] kasan_atomics+0x1dc/0x310 [ 15.938882] ? __pfx_kasan_atomics+0x10/0x10 [ 15.938906] ? trace_hardirqs_on+0x37/0xe0 [ 15.938939] ? __pfx_read_tsc+0x10/0x10 [ 15.938961] ? ktime_get_ts64+0x86/0x230 [ 15.938986] kunit_try_run_case+0x1a5/0x480 [ 15.939011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.939057] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.939084] ? __kthread_parkme+0x82/0x180 [ 15.939104] ? preempt_count_sub+0x50/0x80 [ 15.939139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.939165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.939226] kthread+0x337/0x6f0 [ 15.939246] ? trace_preempt_on+0x20/0xc0 [ 15.939269] ? __pfx_kthread+0x10/0x10 [ 15.939290] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.939323] ? calculate_sigpending+0x7b/0xa0 [ 15.939348] ? __pfx_kthread+0x10/0x10 [ 15.939370] ret_from_fork+0x116/0x1d0 [ 15.939398] ? __pfx_kthread+0x10/0x10 [ 15.939420] ret_from_fork_asm+0x1a/0x30 [ 15.939451] </TASK> [ 15.939472] [ 15.947607] Allocated by task 282: [ 15.947892] kasan_save_stack+0x45/0x70 [ 15.948325] kasan_save_track+0x18/0x40 [ 15.948499] kasan_save_alloc_info+0x3b/0x50 [ 15.948649] __kasan_kmalloc+0xb7/0xc0 [ 15.948782] __kmalloc_cache_noprof+0x189/0x420 [ 15.948939] kasan_atomics+0x95/0x310 [ 15.949083] kunit_try_run_case+0x1a5/0x480 [ 15.949457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.949714] kthread+0x337/0x6f0 [ 15.949907] ret_from_fork+0x116/0x1d0 [ 15.950119] ret_from_fork_asm+0x1a/0x30 [ 15.950344] [ 15.950484] The buggy address belongs to the object at ffff8881027b3900 [ 15.950484] which belongs to the cache kmalloc-64 of size 64 [ 15.950942] The buggy address is located 0 bytes to the right of [ 15.950942] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.951591] [ 15.951684] The buggy address belongs to the physical page: [ 15.952094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.952412] flags: 0x200000000000000(node=0|zone=2) [ 15.952577] page_type: f5(slab) [ 15.952717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.953135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.953680] page dumped because: kasan: bad access detected [ 15.953950] [ 15.954021] Memory state around the buggy address: [ 15.954340] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.954706] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.955014] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.955302] ^ [ 15.955457] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.955674] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.955888] ================================================================== [ 15.295039] ================================================================== [ 15.295629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.296139] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.296454] [ 15.296572] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.296616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.296640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.296661] Call Trace: [ 15.296677] <TASK> [ 15.296692] dump_stack_lvl+0x73/0xb0 [ 15.296721] print_report+0xd1/0x650 [ 15.296744] ? __virt_addr_valid+0x1db/0x2d0 [ 15.296776] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.296799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.296823] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.296857] kasan_report+0x141/0x180 [ 15.296880] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.296908] kasan_check_range+0x10c/0x1c0 [ 15.296933] __kasan_check_write+0x18/0x20 [ 15.296983] kasan_atomics_helper+0xa2b/0x5450 [ 15.297008] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.297081] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.297111] ? kasan_atomics+0x152/0x310 [ 15.297139] kasan_atomics+0x1dc/0x310 [ 15.297163] ? __pfx_kasan_atomics+0x10/0x10 [ 15.297187] ? trace_hardirqs_on+0x37/0xe0 [ 15.297212] ? __pfx_read_tsc+0x10/0x10 [ 15.297234] ? ktime_get_ts64+0x86/0x230 [ 15.297271] kunit_try_run_case+0x1a5/0x480 [ 15.297297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.297336] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.297362] ? __kthread_parkme+0x82/0x180 [ 15.297383] ? preempt_count_sub+0x50/0x80 [ 15.297407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.297441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.297467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.297493] kthread+0x337/0x6f0 [ 15.297524] ? trace_preempt_on+0x20/0xc0 [ 15.297547] ? __pfx_kthread+0x10/0x10 [ 15.297568] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.297599] ? calculate_sigpending+0x7b/0xa0 [ 15.297625] ? __pfx_kthread+0x10/0x10 [ 15.297647] ret_from_fork+0x116/0x1d0 [ 15.297677] ? __pfx_kthread+0x10/0x10 [ 15.297698] ret_from_fork_asm+0x1a/0x30 [ 15.297729] </TASK> [ 15.297748] [ 15.306481] Allocated by task 282: [ 15.306673] kasan_save_stack+0x45/0x70 [ 15.306906] kasan_save_track+0x18/0x40 [ 15.307317] kasan_save_alloc_info+0x3b/0x50 [ 15.307519] __kasan_kmalloc+0xb7/0xc0 [ 15.307722] __kmalloc_cache_noprof+0x189/0x420 [ 15.308052] kasan_atomics+0x95/0x310 [ 15.308249] kunit_try_run_case+0x1a5/0x480 [ 15.308451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.308689] kthread+0x337/0x6f0 [ 15.308930] ret_from_fork+0x116/0x1d0 [ 15.309120] ret_from_fork_asm+0x1a/0x30 [ 15.309321] [ 15.309435] The buggy address belongs to the object at ffff8881027b3900 [ 15.309435] which belongs to the cache kmalloc-64 of size 64 [ 15.310080] The buggy address is located 0 bytes to the right of [ 15.310080] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.310485] [ 15.310561] The buggy address belongs to the physical page: [ 15.310732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.311153] flags: 0x200000000000000(node=0|zone=2) [ 15.311448] page_type: f5(slab) [ 15.311617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.312237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.312569] page dumped because: kasan: bad access detected [ 15.312747] [ 15.312864] Memory state around the buggy address: [ 15.313279] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.313766] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.313990] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.314650] ^ [ 15.314980] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.315299] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.315535] ================================================================== [ 15.152487] ================================================================== [ 15.153152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.153773] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.154473] [ 15.154564] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.154608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.154621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.154641] Call Trace: [ 15.154657] <TASK> [ 15.154673] dump_stack_lvl+0x73/0xb0 [ 15.154702] print_report+0xd1/0x650 [ 15.154725] ? __virt_addr_valid+0x1db/0x2d0 [ 15.154749] ? kasan_atomics_helper+0x697/0x5450 [ 15.154771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.154796] ? kasan_atomics_helper+0x697/0x5450 [ 15.154864] kasan_report+0x141/0x180 [ 15.154888] ? kasan_atomics_helper+0x697/0x5450 [ 15.154916] kasan_check_range+0x10c/0x1c0 [ 15.154941] __kasan_check_write+0x18/0x20 [ 15.154974] kasan_atomics_helper+0x697/0x5450 [ 15.154999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.155023] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.155060] ? kasan_atomics+0x152/0x310 [ 15.155088] kasan_atomics+0x1dc/0x310 [ 15.155111] ? __pfx_kasan_atomics+0x10/0x10 [ 15.155135] ? trace_hardirqs_on+0x37/0xe0 [ 15.155159] ? __pfx_read_tsc+0x10/0x10 [ 15.155181] ? ktime_get_ts64+0x86/0x230 [ 15.155205] kunit_try_run_case+0x1a5/0x480 [ 15.155230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.155257] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.155284] ? __kthread_parkme+0x82/0x180 [ 15.155305] ? preempt_count_sub+0x50/0x80 [ 15.155330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.155357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.155382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.155409] kthread+0x337/0x6f0 [ 15.155429] ? trace_preempt_on+0x20/0xc0 [ 15.155452] ? __pfx_kthread+0x10/0x10 [ 15.155474] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.155497] ? calculate_sigpending+0x7b/0xa0 [ 15.155521] ? __pfx_kthread+0x10/0x10 [ 15.155544] ret_from_fork+0x116/0x1d0 [ 15.155564] ? __pfx_kthread+0x10/0x10 [ 15.155586] ret_from_fork_asm+0x1a/0x30 [ 15.155617] </TASK> [ 15.155628] [ 15.169966] Allocated by task 282: [ 15.170115] kasan_save_stack+0x45/0x70 [ 15.170426] kasan_save_track+0x18/0x40 [ 15.170621] kasan_save_alloc_info+0x3b/0x50 [ 15.170827] __kasan_kmalloc+0xb7/0xc0 [ 15.171073] __kmalloc_cache_noprof+0x189/0x420 [ 15.171237] kasan_atomics+0x95/0x310 [ 15.171397] kunit_try_run_case+0x1a5/0x480 [ 15.171606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.171861] kthread+0x337/0x6f0 [ 15.172129] ret_from_fork+0x116/0x1d0 [ 15.172273] ret_from_fork_asm+0x1a/0x30 [ 15.172490] [ 15.172585] The buggy address belongs to the object at ffff8881027b3900 [ 15.172585] which belongs to the cache kmalloc-64 of size 64 [ 15.173166] The buggy address is located 0 bytes to the right of [ 15.173166] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.173591] [ 15.173690] The buggy address belongs to the physical page: [ 15.173968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.174448] flags: 0x200000000000000(node=0|zone=2) [ 15.174658] page_type: f5(slab) [ 15.174823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.175497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.175819] page dumped because: kasan: bad access detected [ 15.176189] [ 15.176266] Memory state around the buggy address: [ 15.176424] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.176738] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.177172] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.177513] ^ [ 15.177743] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.178157] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.178445] ================================================================== [ 15.453351] ================================================================== [ 15.453700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.454368] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.454710] [ 15.454915] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.455003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.455017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.455050] Call Trace: [ 15.455065] <TASK> [ 15.455080] dump_stack_lvl+0x73/0xb0 [ 15.455111] print_report+0xd1/0x650 [ 15.455133] ? __virt_addr_valid+0x1db/0x2d0 [ 15.455157] ? kasan_atomics_helper+0xe78/0x5450 [ 15.455180] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.455204] ? kasan_atomics_helper+0xe78/0x5450 [ 15.455227] kasan_report+0x141/0x180 [ 15.455285] ? kasan_atomics_helper+0xe78/0x5450 [ 15.455314] kasan_check_range+0x10c/0x1c0 [ 15.455340] __kasan_check_write+0x18/0x20 [ 15.455362] kasan_atomics_helper+0xe78/0x5450 [ 15.455386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.455436] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.455487] ? kasan_atomics+0x152/0x310 [ 15.455515] kasan_atomics+0x1dc/0x310 [ 15.455539] ? __pfx_kasan_atomics+0x10/0x10 [ 15.455562] ? trace_hardirqs_on+0x37/0xe0 [ 15.455587] ? __pfx_read_tsc+0x10/0x10 [ 15.455608] ? ktime_get_ts64+0x86/0x230 [ 15.455633] kunit_try_run_case+0x1a5/0x480 [ 15.455658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.455684] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.455709] ? __kthread_parkme+0x82/0x180 [ 15.455731] ? preempt_count_sub+0x50/0x80 [ 15.455756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.455782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.455807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.455911] kthread+0x337/0x6f0 [ 15.455932] ? trace_preempt_on+0x20/0xc0 [ 15.455961] ? __pfx_kthread+0x10/0x10 [ 15.455983] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.456006] ? calculate_sigpending+0x7b/0xa0 [ 15.456042] ? __pfx_kthread+0x10/0x10 [ 15.456064] ret_from_fork+0x116/0x1d0 [ 15.456084] ? __pfx_kthread+0x10/0x10 [ 15.456106] ret_from_fork_asm+0x1a/0x30 [ 15.456139] </TASK> [ 15.456150] [ 15.465154] Allocated by task 282: [ 15.465292] kasan_save_stack+0x45/0x70 [ 15.465438] kasan_save_track+0x18/0x40 [ 15.465760] kasan_save_alloc_info+0x3b/0x50 [ 15.466493] __kasan_kmalloc+0xb7/0xc0 [ 15.466697] __kmalloc_cache_noprof+0x189/0x420 [ 15.467168] kasan_atomics+0x95/0x310 [ 15.467382] kunit_try_run_case+0x1a5/0x480 [ 15.467536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.467775] kthread+0x337/0x6f0 [ 15.468100] ret_from_fork+0x116/0x1d0 [ 15.468330] ret_from_fork_asm+0x1a/0x30 [ 15.468531] [ 15.468660] The buggy address belongs to the object at ffff8881027b3900 [ 15.468660] which belongs to the cache kmalloc-64 of size 64 [ 15.469270] The buggy address is located 0 bytes to the right of [ 15.469270] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.470252] [ 15.470335] The buggy address belongs to the physical page: [ 15.470588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.471196] flags: 0x200000000000000(node=0|zone=2) [ 15.471458] page_type: f5(slab) [ 15.471614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.472106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.472443] page dumped because: kasan: bad access detected [ 15.472709] [ 15.472848] Memory state around the buggy address: [ 15.473174] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.473514] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.473808] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.474121] ^ [ 15.474555] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.474871] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.475410] ================================================================== [ 15.709004] ================================================================== [ 15.709290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.709605] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.710174] [ 15.710270] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.710362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.710377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.710410] Call Trace: [ 15.710437] <TASK> [ 15.710453] dump_stack_lvl+0x73/0xb0 [ 15.710484] print_report+0xd1/0x650 [ 15.710507] ? __virt_addr_valid+0x1db/0x2d0 [ 15.710529] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.710552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.710577] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.710600] kasan_report+0x141/0x180 [ 15.710623] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.710650] kasan_check_range+0x10c/0x1c0 [ 15.710675] __kasan_check_read+0x15/0x20 [ 15.710696] kasan_atomics_helper+0x13b5/0x5450 [ 15.710720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.710744] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.710770] ? kasan_atomics+0x152/0x310 [ 15.710798] kasan_atomics+0x1dc/0x310 [ 15.710821] ? __pfx_kasan_atomics+0x10/0x10 [ 15.710846] ? trace_hardirqs_on+0x37/0xe0 [ 15.710870] ? __pfx_read_tsc+0x10/0x10 [ 15.710892] ? ktime_get_ts64+0x86/0x230 [ 15.710917] kunit_try_run_case+0x1a5/0x480 [ 15.710999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.711025] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.711065] ? __kthread_parkme+0x82/0x180 [ 15.711086] ? preempt_count_sub+0x50/0x80 [ 15.711110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.711170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.711197] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.711223] kthread+0x337/0x6f0 [ 15.711270] ? trace_preempt_on+0x20/0xc0 [ 15.711293] ? __pfx_kthread+0x10/0x10 [ 15.711315] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.711347] ? calculate_sigpending+0x7b/0xa0 [ 15.711372] ? __pfx_kthread+0x10/0x10 [ 15.711394] ret_from_fork+0x116/0x1d0 [ 15.711414] ? __pfx_kthread+0x10/0x10 [ 15.711435] ret_from_fork_asm+0x1a/0x30 [ 15.711466] </TASK> [ 15.711476] [ 15.720746] Allocated by task 282: [ 15.720929] kasan_save_stack+0x45/0x70 [ 15.721139] kasan_save_track+0x18/0x40 [ 15.721336] kasan_save_alloc_info+0x3b/0x50 [ 15.721753] __kasan_kmalloc+0xb7/0xc0 [ 15.721999] __kmalloc_cache_noprof+0x189/0x420 [ 15.722173] kasan_atomics+0x95/0x310 [ 15.722348] kunit_try_run_case+0x1a5/0x480 [ 15.722555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.722733] kthread+0x337/0x6f0 [ 15.722902] ret_from_fork+0x116/0x1d0 [ 15.723299] ret_from_fork_asm+0x1a/0x30 [ 15.723554] [ 15.723682] The buggy address belongs to the object at ffff8881027b3900 [ 15.723682] which belongs to the cache kmalloc-64 of size 64 [ 15.724310] The buggy address is located 0 bytes to the right of [ 15.724310] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.724699] [ 15.724796] The buggy address belongs to the physical page: [ 15.725160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.725524] flags: 0x200000000000000(node=0|zone=2) [ 15.725734] page_type: f5(slab) [ 15.725932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.726248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.726516] page dumped because: kasan: bad access detected [ 15.726765] [ 15.726863] Memory state around the buggy address: [ 15.727473] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.727697] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.728284] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.728613] ^ [ 15.728900] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.729294] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.729587] ================================================================== [ 15.916460] ================================================================== [ 15.916794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.917111] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.917534] [ 15.917695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.917738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.917751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.917772] Call Trace: [ 15.917788] <TASK> [ 15.917803] dump_stack_lvl+0x73/0xb0 [ 15.917832] print_report+0xd1/0x650 [ 15.917893] ? __virt_addr_valid+0x1db/0x2d0 [ 15.917918] ? kasan_atomics_helper+0x1818/0x5450 [ 15.917941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.917966] ? kasan_atomics_helper+0x1818/0x5450 [ 15.917990] kasan_report+0x141/0x180 [ 15.918013] ? kasan_atomics_helper+0x1818/0x5450 [ 15.918053] kasan_check_range+0x10c/0x1c0 [ 15.918088] __kasan_check_write+0x18/0x20 [ 15.918109] kasan_atomics_helper+0x1818/0x5450 [ 15.918133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.918157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.918183] ? kasan_atomics+0x152/0x310 [ 15.918211] kasan_atomics+0x1dc/0x310 [ 15.918235] ? __pfx_kasan_atomics+0x10/0x10 [ 15.918259] ? trace_hardirqs_on+0x37/0xe0 [ 15.918283] ? __pfx_read_tsc+0x10/0x10 [ 15.918305] ? ktime_get_ts64+0x86/0x230 [ 15.918330] kunit_try_run_case+0x1a5/0x480 [ 15.918355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918381] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.918406] ? __kthread_parkme+0x82/0x180 [ 15.918427] ? preempt_count_sub+0x50/0x80 [ 15.918451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.918504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.918530] kthread+0x337/0x6f0 [ 15.918550] ? trace_preempt_on+0x20/0xc0 [ 15.918573] ? __pfx_kthread+0x10/0x10 [ 15.918595] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.918617] ? calculate_sigpending+0x7b/0xa0 [ 15.918643] ? __pfx_kthread+0x10/0x10 [ 15.918665] ret_from_fork+0x116/0x1d0 [ 15.918685] ? __pfx_kthread+0x10/0x10 [ 15.918706] ret_from_fork_asm+0x1a/0x30 [ 15.918738] </TASK> [ 15.918749] [ 15.926853] Allocated by task 282: [ 15.927090] kasan_save_stack+0x45/0x70 [ 15.927240] kasan_save_track+0x18/0x40 [ 15.927378] kasan_save_alloc_info+0x3b/0x50 [ 15.927529] __kasan_kmalloc+0xb7/0xc0 [ 15.927667] __kmalloc_cache_noprof+0x189/0x420 [ 15.927910] kasan_atomics+0x95/0x310 [ 15.928097] kunit_try_run_case+0x1a5/0x480 [ 15.928246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.928424] kthread+0x337/0x6f0 [ 15.928544] ret_from_fork+0x116/0x1d0 [ 15.928680] ret_from_fork_asm+0x1a/0x30 [ 15.928821] [ 15.928893] The buggy address belongs to the object at ffff8881027b3900 [ 15.928893] which belongs to the cache kmalloc-64 of size 64 [ 15.929332] The buggy address is located 0 bytes to the right of [ 15.929332] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.929702] [ 15.929775] The buggy address belongs to the physical page: [ 15.929947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.932571] flags: 0x200000000000000(node=0|zone=2) [ 15.932871] page_type: f5(slab) [ 15.933199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.933521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.933827] page dumped because: kasan: bad access detected [ 15.934250] [ 15.934334] Memory state around the buggy address: [ 15.934491] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.934811] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.935133] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.935394] ^ [ 15.935883] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936307] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936636] ================================================================== [ 15.240049] ================================================================== [ 15.240387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.240717] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.241266] [ 15.241352] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.241393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.241405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.241426] Call Trace: [ 15.241441] <TASK> [ 15.241455] dump_stack_lvl+0x73/0xb0 [ 15.241484] print_report+0xd1/0x650 [ 15.241507] ? __virt_addr_valid+0x1db/0x2d0 [ 15.241530] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.241553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.241577] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.241600] kasan_report+0x141/0x180 [ 15.241623] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.241650] kasan_check_range+0x10c/0x1c0 [ 15.241675] __kasan_check_write+0x18/0x20 [ 15.241696] kasan_atomics_helper+0x8f9/0x5450 [ 15.241720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.241744] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.241770] ? kasan_atomics+0x152/0x310 [ 15.241797] kasan_atomics+0x1dc/0x310 [ 15.241821] ? __pfx_kasan_atomics+0x10/0x10 [ 15.241844] ? trace_hardirqs_on+0x37/0xe0 [ 15.241868] ? __pfx_read_tsc+0x10/0x10 [ 15.241889] ? ktime_get_ts64+0x86/0x230 [ 15.241913] kunit_try_run_case+0x1a5/0x480 [ 15.241938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.241964] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.241989] ? __kthread_parkme+0x82/0x180 [ 15.242011] ? preempt_count_sub+0x50/0x80 [ 15.242049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.242100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.242127] kthread+0x337/0x6f0 [ 15.242147] ? trace_preempt_on+0x20/0xc0 [ 15.242170] ? __pfx_kthread+0x10/0x10 [ 15.242192] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.242216] ? calculate_sigpending+0x7b/0xa0 [ 15.242241] ? __pfx_kthread+0x10/0x10 [ 15.242263] ret_from_fork+0x116/0x1d0 [ 15.242283] ? __pfx_kthread+0x10/0x10 [ 15.242304] ret_from_fork_asm+0x1a/0x30 [ 15.242335] </TASK> [ 15.242346] [ 15.250709] Allocated by task 282: [ 15.250844] kasan_save_stack+0x45/0x70 [ 15.251203] kasan_save_track+0x18/0x40 [ 15.251404] kasan_save_alloc_info+0x3b/0x50 [ 15.251621] __kasan_kmalloc+0xb7/0xc0 [ 15.251808] __kmalloc_cache_noprof+0x189/0x420 [ 15.252110] kasan_atomics+0x95/0x310 [ 15.252305] kunit_try_run_case+0x1a5/0x480 [ 15.252502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.252698] kthread+0x337/0x6f0 [ 15.252820] ret_from_fork+0x116/0x1d0 [ 15.252955] ret_from_fork_asm+0x1a/0x30 [ 15.253117] [ 15.253189] The buggy address belongs to the object at ffff8881027b3900 [ 15.253189] which belongs to the cache kmalloc-64 of size 64 [ 15.253541] The buggy address is located 0 bytes to the right of [ 15.253541] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.254744] [ 15.255383] The buggy address belongs to the physical page: [ 15.256171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.257396] flags: 0x200000000000000(node=0|zone=2) [ 15.258375] page_type: f5(slab) [ 15.258897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.260079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.261252] page dumped because: kasan: bad access detected [ 15.261623] [ 15.261701] Memory state around the buggy address: [ 15.261859] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.262197] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.262659] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.263350] ^ [ 15.263520] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.263737] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.264439] ================================================================== [ 15.515625] ================================================================== [ 15.516060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.516404] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.516684] [ 15.516865] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.516908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.516928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.516949] Call Trace: [ 15.516964] <TASK> [ 15.516979] dump_stack_lvl+0x73/0xb0 [ 15.517009] print_report+0xd1/0x650 [ 15.517077] ? __virt_addr_valid+0x1db/0x2d0 [ 15.517102] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.517125] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.517151] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.517174] kasan_report+0x141/0x180 [ 15.517196] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.517224] __asan_report_load4_noabort+0x18/0x20 [ 15.517251] kasan_atomics_helper+0x4a36/0x5450 [ 15.517275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.517298] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.517325] ? kasan_atomics+0x152/0x310 [ 15.517351] kasan_atomics+0x1dc/0x310 [ 15.517375] ? __pfx_kasan_atomics+0x10/0x10 [ 15.517399] ? trace_hardirqs_on+0x37/0xe0 [ 15.517422] ? __pfx_read_tsc+0x10/0x10 [ 15.517444] ? ktime_get_ts64+0x86/0x230 [ 15.517469] kunit_try_run_case+0x1a5/0x480 [ 15.517494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.517520] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.517545] ? __kthread_parkme+0x82/0x180 [ 15.517566] ? preempt_count_sub+0x50/0x80 [ 15.517591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.517637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.517664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.517690] kthread+0x337/0x6f0 [ 15.517711] ? trace_preempt_on+0x20/0xc0 [ 15.517734] ? __pfx_kthread+0x10/0x10 [ 15.517755] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.517778] ? calculate_sigpending+0x7b/0xa0 [ 15.517859] ? __pfx_kthread+0x10/0x10 [ 15.517883] ret_from_fork+0x116/0x1d0 [ 15.517904] ? __pfx_kthread+0x10/0x10 [ 15.517945] ret_from_fork_asm+0x1a/0x30 [ 15.517979] </TASK> [ 15.517990] [ 15.525723] Allocated by task 282: [ 15.526087] kasan_save_stack+0x45/0x70 [ 15.526326] kasan_save_track+0x18/0x40 [ 15.526507] kasan_save_alloc_info+0x3b/0x50 [ 15.526723] __kasan_kmalloc+0xb7/0xc0 [ 15.527037] __kmalloc_cache_noprof+0x189/0x420 [ 15.527214] kasan_atomics+0x95/0x310 [ 15.527350] kunit_try_run_case+0x1a5/0x480 [ 15.527577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.527901] kthread+0x337/0x6f0 [ 15.528133] ret_from_fork+0x116/0x1d0 [ 15.528297] ret_from_fork_asm+0x1a/0x30 [ 15.528439] [ 15.528513] The buggy address belongs to the object at ffff8881027b3900 [ 15.528513] which belongs to the cache kmalloc-64 of size 64 [ 15.529152] The buggy address is located 0 bytes to the right of [ 15.529152] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.529673] [ 15.529746] The buggy address belongs to the physical page: [ 15.530110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.530487] flags: 0x200000000000000(node=0|zone=2) [ 15.530708] page_type: f5(slab) [ 15.531053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.531427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.531761] page dumped because: kasan: bad access detected [ 15.532117] [ 15.532198] Memory state around the buggy address: [ 15.532357] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.532696] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.533134] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.533386] ^ [ 15.533605] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.533996] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.534298] ================================================================== [ 15.891180] ================================================================== [ 15.891471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.891837] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.892168] [ 15.892257] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.892302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.892315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.892336] Call Trace: [ 15.892362] <TASK> [ 15.892380] dump_stack_lvl+0x73/0xb0 [ 15.892409] print_report+0xd1/0x650 [ 15.892432] ? __virt_addr_valid+0x1db/0x2d0 [ 15.892457] ? kasan_atomics_helper+0x177f/0x5450 [ 15.892480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.892505] ? kasan_atomics_helper+0x177f/0x5450 [ 15.892529] kasan_report+0x141/0x180 [ 15.892553] ? kasan_atomics_helper+0x177f/0x5450 [ 15.892580] kasan_check_range+0x10c/0x1c0 [ 15.892606] __kasan_check_write+0x18/0x20 [ 15.892627] kasan_atomics_helper+0x177f/0x5450 [ 15.892651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.892674] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.892701] ? kasan_atomics+0x152/0x310 [ 15.892728] kasan_atomics+0x1dc/0x310 [ 15.892751] ? __pfx_kasan_atomics+0x10/0x10 [ 15.892776] ? trace_hardirqs_on+0x37/0xe0 [ 15.892800] ? __pfx_read_tsc+0x10/0x10 [ 15.892822] ? ktime_get_ts64+0x86/0x230 [ 15.892846] kunit_try_run_case+0x1a5/0x480 [ 15.892872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.892899] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.892925] ? __kthread_parkme+0x82/0x180 [ 15.892948] ? preempt_count_sub+0x50/0x80 [ 15.892972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.892997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.893024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.893061] kthread+0x337/0x6f0 [ 15.893106] ? trace_preempt_on+0x20/0xc0 [ 15.893130] ? __pfx_kthread+0x10/0x10 [ 15.893161] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.893184] ? calculate_sigpending+0x7b/0xa0 [ 15.893209] ? __pfx_kthread+0x10/0x10 [ 15.893231] ret_from_fork+0x116/0x1d0 [ 15.893251] ? __pfx_kthread+0x10/0x10 [ 15.893272] ret_from_fork_asm+0x1a/0x30 [ 15.893304] </TASK> [ 15.893315] [ 15.905324] Allocated by task 282: [ 15.905505] kasan_save_stack+0x45/0x70 [ 15.905807] kasan_save_track+0x18/0x40 [ 15.906241] kasan_save_alloc_info+0x3b/0x50 [ 15.906448] __kasan_kmalloc+0xb7/0xc0 [ 15.906623] __kmalloc_cache_noprof+0x189/0x420 [ 15.906833] kasan_atomics+0x95/0x310 [ 15.907370] kunit_try_run_case+0x1a5/0x480 [ 15.907659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.908406] kthread+0x337/0x6f0 [ 15.908588] ret_from_fork+0x116/0x1d0 [ 15.908934] ret_from_fork_asm+0x1a/0x30 [ 15.909357] [ 15.909568] The buggy address belongs to the object at ffff8881027b3900 [ 15.909568] which belongs to the cache kmalloc-64 of size 64 [ 15.910344] The buggy address is located 0 bytes to the right of [ 15.910344] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.911191] [ 15.911299] The buggy address belongs to the physical page: [ 15.911552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.911807] flags: 0x200000000000000(node=0|zone=2) [ 15.912127] page_type: f5(slab) [ 15.912388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.913104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.913692] page dumped because: kasan: bad access detected [ 15.914146] [ 15.914226] Memory state around the buggy address: [ 15.914385] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.914606] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.914879] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.915191] ^ [ 15.915410] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915642] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915973] ================================================================== [ 14.939062] ================================================================== [ 14.939648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.940710] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 14.941448] [ 14.941561] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.941606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.941617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.941638] Call Trace: [ 14.941652] <TASK> [ 14.941666] dump_stack_lvl+0x73/0xb0 [ 14.941697] print_report+0xd1/0x650 [ 14.941719] ? __virt_addr_valid+0x1db/0x2d0 [ 14.941744] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.941765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.941788] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.941977] kasan_report+0x141/0x180 [ 14.942001] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.942041] __asan_report_store4_noabort+0x1b/0x30 [ 14.942067] kasan_atomics_helper+0x4ba2/0x5450 [ 14.942090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.942113] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.942138] ? kasan_atomics+0x152/0x310 [ 14.942164] kasan_atomics+0x1dc/0x310 [ 14.942187] ? __pfx_kasan_atomics+0x10/0x10 [ 14.942209] ? trace_hardirqs_on+0x37/0xe0 [ 14.942233] ? __pfx_read_tsc+0x10/0x10 [ 14.942253] ? ktime_get_ts64+0x86/0x230 [ 14.942277] kunit_try_run_case+0x1a5/0x480 [ 14.942301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942326] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.942351] ? __kthread_parkme+0x82/0x180 [ 14.942371] ? preempt_count_sub+0x50/0x80 [ 14.942395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.942443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.942468] kthread+0x337/0x6f0 [ 14.942487] ? trace_preempt_on+0x20/0xc0 [ 14.942509] ? __pfx_kthread+0x10/0x10 [ 14.942529] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.942551] ? calculate_sigpending+0x7b/0xa0 [ 14.942575] ? __pfx_kthread+0x10/0x10 [ 14.942596] ret_from_fork+0x116/0x1d0 [ 14.942614] ? __pfx_kthread+0x10/0x10 [ 14.942635] ret_from_fork_asm+0x1a/0x30 [ 14.942666] </TASK> [ 14.942675] [ 14.954002] Allocated by task 282: [ 14.954416] kasan_save_stack+0x45/0x70 [ 14.954718] kasan_save_track+0x18/0x40 [ 14.955082] kasan_save_alloc_info+0x3b/0x50 [ 14.955474] __kasan_kmalloc+0xb7/0xc0 [ 14.955671] __kmalloc_cache_noprof+0x189/0x420 [ 14.956114] kasan_atomics+0x95/0x310 [ 14.956365] kunit_try_run_case+0x1a5/0x480 [ 14.956612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.957118] kthread+0x337/0x6f0 [ 14.957385] ret_from_fork+0x116/0x1d0 [ 14.957532] ret_from_fork_asm+0x1a/0x30 [ 14.957888] [ 14.957982] The buggy address belongs to the object at ffff8881027b3900 [ 14.957982] which belongs to the cache kmalloc-64 of size 64 [ 14.958456] The buggy address is located 0 bytes to the right of [ 14.958456] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 14.959377] [ 14.959483] The buggy address belongs to the physical page: [ 14.959691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 14.960291] flags: 0x200000000000000(node=0|zone=2) [ 14.960731] page_type: f5(slab) [ 14.960987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.961429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.961802] page dumped because: kasan: bad access detected [ 14.962169] [ 14.962384] Memory state around the buggy address: [ 14.962607] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.963077] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.963456] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.963724] ^ [ 14.964195] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964501] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964796] ================================================================== [ 16.055705] ================================================================== [ 16.055958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.056277] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.056762] [ 16.056850] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.056893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.056906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.056927] Call Trace: [ 16.057002] <TASK> [ 16.057018] dump_stack_lvl+0x73/0xb0 [ 16.057074] print_report+0xd1/0x650 [ 16.057097] ? __virt_addr_valid+0x1db/0x2d0 [ 16.057132] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.057155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.057179] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.057203] kasan_report+0x141/0x180 [ 16.057234] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.057262] kasan_check_range+0x10c/0x1c0 [ 16.057287] __kasan_check_write+0x18/0x20 [ 16.057318] kasan_atomics_helper+0x1c18/0x5450 [ 16.057342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.057366] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.057393] ? kasan_atomics+0x152/0x310 [ 16.057420] kasan_atomics+0x1dc/0x310 [ 16.057443] ? __pfx_kasan_atomics+0x10/0x10 [ 16.057467] ? trace_hardirqs_on+0x37/0xe0 [ 16.057491] ? __pfx_read_tsc+0x10/0x10 [ 16.057522] ? ktime_get_ts64+0x86/0x230 [ 16.057547] kunit_try_run_case+0x1a5/0x480 [ 16.057572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.057608] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.057635] ? __kthread_parkme+0x82/0x180 [ 16.057657] ? preempt_count_sub+0x50/0x80 [ 16.057683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.057709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.057735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.057762] kthread+0x337/0x6f0 [ 16.057781] ? trace_preempt_on+0x20/0xc0 [ 16.057851] ? __pfx_kthread+0x10/0x10 [ 16.057888] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.057911] ? calculate_sigpending+0x7b/0xa0 [ 16.057935] ? __pfx_kthread+0x10/0x10 [ 16.057959] ret_from_fork+0x116/0x1d0 [ 16.057978] ? __pfx_kthread+0x10/0x10 [ 16.058000] ret_from_fork_asm+0x1a/0x30 [ 16.058046] </TASK> [ 16.058058] [ 16.068974] Allocated by task 282: [ 16.069444] kasan_save_stack+0x45/0x70 [ 16.069633] kasan_save_track+0x18/0x40 [ 16.069854] kasan_save_alloc_info+0x3b/0x50 [ 16.070114] __kasan_kmalloc+0xb7/0xc0 [ 16.070305] __kmalloc_cache_noprof+0x189/0x420 [ 16.070516] kasan_atomics+0x95/0x310 [ 16.070692] kunit_try_run_case+0x1a5/0x480 [ 16.070913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.071727] kthread+0x337/0x6f0 [ 16.072052] ret_from_fork+0x116/0x1d0 [ 16.072315] ret_from_fork_asm+0x1a/0x30 [ 16.072603] [ 16.072683] The buggy address belongs to the object at ffff8881027b3900 [ 16.072683] which belongs to the cache kmalloc-64 of size 64 [ 16.073390] The buggy address is located 0 bytes to the right of [ 16.073390] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.074184] [ 16.074459] The buggy address belongs to the physical page: [ 16.074688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.075118] flags: 0x200000000000000(node=0|zone=2) [ 16.075330] page_type: f5(slab) [ 16.075488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.075800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.076437] page dumped because: kasan: bad access detected [ 16.076693] [ 16.076766] Memory state around the buggy address: [ 16.077011] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077791] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.078285] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.078633] ^ [ 16.078979] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079449] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079775] ================================================================== [ 15.573041] ================================================================== [ 15.573327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.573592] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.574201] [ 15.574318] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.574381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.574395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.574416] Call Trace: [ 15.574432] <TASK> [ 15.574447] dump_stack_lvl+0x73/0xb0 [ 15.574477] print_report+0xd1/0x650 [ 15.574500] ? __virt_addr_valid+0x1db/0x2d0 [ 15.574523] ? kasan_atomics_helper+0x1148/0x5450 [ 15.574545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.574586] ? kasan_atomics_helper+0x1148/0x5450 [ 15.574609] kasan_report+0x141/0x180 [ 15.574632] ? kasan_atomics_helper+0x1148/0x5450 [ 15.574660] kasan_check_range+0x10c/0x1c0 [ 15.574685] __kasan_check_write+0x18/0x20 [ 15.574707] kasan_atomics_helper+0x1148/0x5450 [ 15.574747] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.574771] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.574864] ? kasan_atomics+0x152/0x310 [ 15.574897] kasan_atomics+0x1dc/0x310 [ 15.574938] ? __pfx_kasan_atomics+0x10/0x10 [ 15.574963] ? trace_hardirqs_on+0x37/0xe0 [ 15.574987] ? __pfx_read_tsc+0x10/0x10 [ 15.575009] ? ktime_get_ts64+0x86/0x230 [ 15.575042] kunit_try_run_case+0x1a5/0x480 [ 15.575068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.575094] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.575141] ? __kthread_parkme+0x82/0x180 [ 15.575162] ? preempt_count_sub+0x50/0x80 [ 15.575186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.575212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.575237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.575264] kthread+0x337/0x6f0 [ 15.575284] ? trace_preempt_on+0x20/0xc0 [ 15.575307] ? __pfx_kthread+0x10/0x10 [ 15.575329] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.575352] ? calculate_sigpending+0x7b/0xa0 [ 15.575377] ? __pfx_kthread+0x10/0x10 [ 15.575399] ret_from_fork+0x116/0x1d0 [ 15.575419] ? __pfx_kthread+0x10/0x10 [ 15.575440] ret_from_fork_asm+0x1a/0x30 [ 15.575472] </TASK> [ 15.575482] [ 15.583567] Allocated by task 282: [ 15.583743] kasan_save_stack+0x45/0x70 [ 15.584069] kasan_save_track+0x18/0x40 [ 15.584216] kasan_save_alloc_info+0x3b/0x50 [ 15.584404] __kasan_kmalloc+0xb7/0xc0 [ 15.584587] __kmalloc_cache_noprof+0x189/0x420 [ 15.584813] kasan_atomics+0x95/0x310 [ 15.584977] kunit_try_run_case+0x1a5/0x480 [ 15.585184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.585364] kthread+0x337/0x6f0 [ 15.585526] ret_from_fork+0x116/0x1d0 [ 15.585721] ret_from_fork_asm+0x1a/0x30 [ 15.585914] [ 15.586001] The buggy address belongs to the object at ffff8881027b3900 [ 15.586001] which belongs to the cache kmalloc-64 of size 64 [ 15.586616] The buggy address is located 0 bytes to the right of [ 15.586616] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.587081] [ 15.587158] The buggy address belongs to the physical page: [ 15.587386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.587765] flags: 0x200000000000000(node=0|zone=2) [ 15.588099] page_type: f5(slab) [ 15.588274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.588621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.589067] page dumped because: kasan: bad access detected [ 15.589344] [ 15.589432] Memory state around the buggy address: [ 15.589656] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.590182] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.590481] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.590768] ^ [ 15.591088] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591416] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591714] ================================================================== [ 16.306533] ================================================================== [ 16.306791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.307156] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.307463] [ 16.307653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.307702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.307715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.307736] Call Trace: [ 16.307749] <TASK> [ 16.307763] dump_stack_lvl+0x73/0xb0 [ 16.307793] print_report+0xd1/0x650 [ 16.307864] ? __virt_addr_valid+0x1db/0x2d0 [ 16.307888] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.307912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.307936] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.307972] kasan_report+0x141/0x180 [ 16.307995] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.308023] __asan_report_load8_noabort+0x18/0x20 [ 16.308062] kasan_atomics_helper+0x4fb2/0x5450 [ 16.308085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.308110] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.308135] ? kasan_atomics+0x152/0x310 [ 16.308163] kasan_atomics+0x1dc/0x310 [ 16.308187] ? __pfx_kasan_atomics+0x10/0x10 [ 16.308211] ? trace_hardirqs_on+0x37/0xe0 [ 16.308235] ? __pfx_read_tsc+0x10/0x10 [ 16.308256] ? ktime_get_ts64+0x86/0x230 [ 16.308281] kunit_try_run_case+0x1a5/0x480 [ 16.308307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.308333] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.308359] ? __kthread_parkme+0x82/0x180 [ 16.308380] ? preempt_count_sub+0x50/0x80 [ 16.308405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.308431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.308457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.308484] kthread+0x337/0x6f0 [ 16.308503] ? trace_preempt_on+0x20/0xc0 [ 16.308526] ? __pfx_kthread+0x10/0x10 [ 16.308548] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.308571] ? calculate_sigpending+0x7b/0xa0 [ 16.308597] ? __pfx_kthread+0x10/0x10 [ 16.308620] ret_from_fork+0x116/0x1d0 [ 16.308640] ? __pfx_kthread+0x10/0x10 [ 16.308662] ret_from_fork_asm+0x1a/0x30 [ 16.308694] </TASK> [ 16.308706] [ 16.316632] Allocated by task 282: [ 16.316781] kasan_save_stack+0x45/0x70 [ 16.317092] kasan_save_track+0x18/0x40 [ 16.317278] kasan_save_alloc_info+0x3b/0x50 [ 16.317493] __kasan_kmalloc+0xb7/0xc0 [ 16.317662] __kmalloc_cache_noprof+0x189/0x420 [ 16.317930] kasan_atomics+0x95/0x310 [ 16.318446] kunit_try_run_case+0x1a5/0x480 [ 16.318648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.318918] kthread+0x337/0x6f0 [ 16.319110] ret_from_fork+0x116/0x1d0 [ 16.319316] ret_from_fork_asm+0x1a/0x30 [ 16.319492] [ 16.319573] The buggy address belongs to the object at ffff8881027b3900 [ 16.319573] which belongs to the cache kmalloc-64 of size 64 [ 16.320003] The buggy address is located 0 bytes to the right of [ 16.320003] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.320579] [ 16.320654] The buggy address belongs to the physical page: [ 16.321159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.321524] flags: 0x200000000000000(node=0|zone=2) [ 16.321746] page_type: f5(slab) [ 16.321867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.322113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.322616] page dumped because: kasan: bad access detected [ 16.322940] [ 16.323010] Memory state around the buggy address: [ 16.323176] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.323392] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.323604] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.324287] ^ [ 16.324518] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.324841] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.325181] ================================================================== [ 16.344408] ================================================================== [ 16.344698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.345106] Read of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.345333] [ 16.345417] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.345458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.345470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.345490] Call Trace: [ 16.345505] <TASK> [ 16.345520] dump_stack_lvl+0x73/0xb0 [ 16.345550] print_report+0xd1/0x650 [ 16.345573] ? __virt_addr_valid+0x1db/0x2d0 [ 16.345596] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.345619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.345643] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.345666] kasan_report+0x141/0x180 [ 16.345690] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.345718] __asan_report_load8_noabort+0x18/0x20 [ 16.345745] kasan_atomics_helper+0x4fa5/0x5450 [ 16.345769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.345793] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.345862] ? kasan_atomics+0x152/0x310 [ 16.345891] kasan_atomics+0x1dc/0x310 [ 16.345916] ? __pfx_kasan_atomics+0x10/0x10 [ 16.345940] ? trace_hardirqs_on+0x37/0xe0 [ 16.345964] ? __pfx_read_tsc+0x10/0x10 [ 16.345987] ? ktime_get_ts64+0x86/0x230 [ 16.346011] kunit_try_run_case+0x1a5/0x480 [ 16.346051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.346077] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.346104] ? __kthread_parkme+0x82/0x180 [ 16.346125] ? preempt_count_sub+0x50/0x80 [ 16.346150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.346176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.346202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.346228] kthread+0x337/0x6f0 [ 16.346248] ? trace_preempt_on+0x20/0xc0 [ 16.346271] ? __pfx_kthread+0x10/0x10 [ 16.346293] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.346315] ? calculate_sigpending+0x7b/0xa0 [ 16.346341] ? __pfx_kthread+0x10/0x10 [ 16.346363] ret_from_fork+0x116/0x1d0 [ 16.346383] ? __pfx_kthread+0x10/0x10 [ 16.346404] ret_from_fork_asm+0x1a/0x30 [ 16.346435] </TASK> [ 16.346447] [ 16.354391] Allocated by task 282: [ 16.354560] kasan_save_stack+0x45/0x70 [ 16.354745] kasan_save_track+0x18/0x40 [ 16.354911] kasan_save_alloc_info+0x3b/0x50 [ 16.355139] __kasan_kmalloc+0xb7/0xc0 [ 16.355279] __kmalloc_cache_noprof+0x189/0x420 [ 16.355503] kasan_atomics+0x95/0x310 [ 16.355691] kunit_try_run_case+0x1a5/0x480 [ 16.355976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.356176] kthread+0x337/0x6f0 [ 16.356346] ret_from_fork+0x116/0x1d0 [ 16.356535] ret_from_fork_asm+0x1a/0x30 [ 16.356735] [ 16.356813] The buggy address belongs to the object at ffff8881027b3900 [ 16.356813] which belongs to the cache kmalloc-64 of size 64 [ 16.357258] The buggy address is located 0 bytes to the right of [ 16.357258] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.357625] [ 16.357697] The buggy address belongs to the physical page: [ 16.357869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.358289] flags: 0x200000000000000(node=0|zone=2) [ 16.358518] page_type: f5(slab) [ 16.358682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.359009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.359409] page dumped because: kasan: bad access detected [ 16.359579] [ 16.359648] Memory state around the buggy address: [ 16.359802] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.360022] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.360534] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.360956] ^ [ 16.361206] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.361537] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.361947] ================================================================== [ 15.432109] ================================================================== [ 15.432625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.433047] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.433342] [ 15.433452] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.433493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.433505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.433526] Call Trace: [ 15.433541] <TASK> [ 15.433556] dump_stack_lvl+0x73/0xb0 [ 15.433585] print_report+0xd1/0x650 [ 15.433608] ? __virt_addr_valid+0x1db/0x2d0 [ 15.433631] ? kasan_atomics_helper+0xde0/0x5450 [ 15.433654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.433701] ? kasan_atomics_helper+0xde0/0x5450 [ 15.433726] kasan_report+0x141/0x180 [ 15.433749] ? kasan_atomics_helper+0xde0/0x5450 [ 15.433776] kasan_check_range+0x10c/0x1c0 [ 15.433801] __kasan_check_write+0x18/0x20 [ 15.433822] kasan_atomics_helper+0xde0/0x5450 [ 15.433846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.433870] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.433896] ? kasan_atomics+0x152/0x310 [ 15.433923] kasan_atomics+0x1dc/0x310 [ 15.434005] ? __pfx_kasan_atomics+0x10/0x10 [ 15.434041] ? trace_hardirqs_on+0x37/0xe0 [ 15.434067] ? __pfx_read_tsc+0x10/0x10 [ 15.434090] ? ktime_get_ts64+0x86/0x230 [ 15.434115] kunit_try_run_case+0x1a5/0x480 [ 15.434140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.434166] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.434192] ? __kthread_parkme+0x82/0x180 [ 15.434214] ? preempt_count_sub+0x50/0x80 [ 15.434238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.434264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.434291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.434318] kthread+0x337/0x6f0 [ 15.434338] ? trace_preempt_on+0x20/0xc0 [ 15.434362] ? __pfx_kthread+0x10/0x10 [ 15.434401] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.434424] ? calculate_sigpending+0x7b/0xa0 [ 15.434449] ? __pfx_kthread+0x10/0x10 [ 15.434472] ret_from_fork+0x116/0x1d0 [ 15.434492] ? __pfx_kthread+0x10/0x10 [ 15.434514] ret_from_fork_asm+0x1a/0x30 [ 15.434545] </TASK> [ 15.434556] [ 15.442714] Allocated by task 282: [ 15.443184] kasan_save_stack+0x45/0x70 [ 15.443380] kasan_save_track+0x18/0x40 [ 15.443600] kasan_save_alloc_info+0x3b/0x50 [ 15.443804] __kasan_kmalloc+0xb7/0xc0 [ 15.444287] __kmalloc_cache_noprof+0x189/0x420 [ 15.444493] kasan_atomics+0x95/0x310 [ 15.444690] kunit_try_run_case+0x1a5/0x480 [ 15.445074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445393] kthread+0x337/0x6f0 [ 15.445564] ret_from_fork+0x116/0x1d0 [ 15.445771] ret_from_fork_asm+0x1a/0x30 [ 15.446068] [ 15.446210] The buggy address belongs to the object at ffff8881027b3900 [ 15.446210] which belongs to the cache kmalloc-64 of size 64 [ 15.446744] The buggy address is located 0 bytes to the right of [ 15.446744] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.447413] [ 15.447516] The buggy address belongs to the physical page: [ 15.447707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.448294] flags: 0x200000000000000(node=0|zone=2) [ 15.448464] page_type: f5(slab) [ 15.448642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.449229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.449705] page dumped because: kasan: bad access detected [ 15.449914] [ 15.450059] Memory state around the buggy address: [ 15.450536] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.450813] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.451235] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.451628] ^ [ 15.451878] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.452286] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.452732] ================================================================== [ 15.534779] ================================================================== [ 15.535161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.535540] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.535855] [ 15.536020] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.536074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.536086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.536107] Call Trace: [ 15.536123] <TASK> [ 15.536138] dump_stack_lvl+0x73/0xb0 [ 15.536167] print_report+0xd1/0x650 [ 15.536190] ? __virt_addr_valid+0x1db/0x2d0 [ 15.536214] ? kasan_atomics_helper+0x1079/0x5450 [ 15.536237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.536262] ? kasan_atomics_helper+0x1079/0x5450 [ 15.536285] kasan_report+0x141/0x180 [ 15.536308] ? kasan_atomics_helper+0x1079/0x5450 [ 15.536336] kasan_check_range+0x10c/0x1c0 [ 15.536361] __kasan_check_write+0x18/0x20 [ 15.536382] kasan_atomics_helper+0x1079/0x5450 [ 15.536406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.536430] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.536456] ? kasan_atomics+0x152/0x310 [ 15.536484] kasan_atomics+0x1dc/0x310 [ 15.536507] ? __pfx_kasan_atomics+0x10/0x10 [ 15.536530] ? trace_hardirqs_on+0x37/0xe0 [ 15.536576] ? __pfx_read_tsc+0x10/0x10 [ 15.536597] ? ktime_get_ts64+0x86/0x230 [ 15.536622] kunit_try_run_case+0x1a5/0x480 [ 15.536647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.536673] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.536700] ? __kthread_parkme+0x82/0x180 [ 15.536720] ? preempt_count_sub+0x50/0x80 [ 15.536745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.536770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.536860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.536891] kthread+0x337/0x6f0 [ 15.536912] ? trace_preempt_on+0x20/0xc0 [ 15.536934] ? __pfx_kthread+0x10/0x10 [ 15.536963] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.536985] ? calculate_sigpending+0x7b/0xa0 [ 15.537010] ? __pfx_kthread+0x10/0x10 [ 15.537041] ret_from_fork+0x116/0x1d0 [ 15.537060] ? __pfx_kthread+0x10/0x10 [ 15.537082] ret_from_fork_asm+0x1a/0x30 [ 15.537114] </TASK> [ 15.537124] [ 15.545370] Allocated by task 282: [ 15.545573] kasan_save_stack+0x45/0x70 [ 15.545790] kasan_save_track+0x18/0x40 [ 15.546099] kasan_save_alloc_info+0x3b/0x50 [ 15.546289] __kasan_kmalloc+0xb7/0xc0 [ 15.546442] __kmalloc_cache_noprof+0x189/0x420 [ 15.546691] kasan_atomics+0x95/0x310 [ 15.546921] kunit_try_run_case+0x1a5/0x480 [ 15.547190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.547442] kthread+0x337/0x6f0 [ 15.547575] ret_from_fork+0x116/0x1d0 [ 15.547707] ret_from_fork_asm+0x1a/0x30 [ 15.547855] [ 15.548041] The buggy address belongs to the object at ffff8881027b3900 [ 15.548041] which belongs to the cache kmalloc-64 of size 64 [ 15.548576] The buggy address is located 0 bytes to the right of [ 15.548576] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.549223] [ 15.549317] The buggy address belongs to the physical page: [ 15.549490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.549967] flags: 0x200000000000000(node=0|zone=2) [ 15.550232] page_type: f5(slab) [ 15.550400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.550739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.551053] page dumped because: kasan: bad access detected [ 15.551291] [ 15.551382] Memory state around the buggy address: [ 15.551576] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.551871] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.552297] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.552520] ^ [ 15.552679] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553008] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553331] ================================================================== [ 15.222073] ================================================================== [ 15.222419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.222705] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.223171] [ 15.223283] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.223328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.223340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.223361] Call Trace: [ 15.223375] <TASK> [ 15.223392] dump_stack_lvl+0x73/0xb0 [ 15.223421] print_report+0xd1/0x650 [ 15.223444] ? __virt_addr_valid+0x1db/0x2d0 [ 15.223467] ? kasan_atomics_helper+0x860/0x5450 [ 15.223490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.223515] ? kasan_atomics_helper+0x860/0x5450 [ 15.223538] kasan_report+0x141/0x180 [ 15.223561] ? kasan_atomics_helper+0x860/0x5450 [ 15.223589] kasan_check_range+0x10c/0x1c0 [ 15.223614] __kasan_check_write+0x18/0x20 [ 15.223634] kasan_atomics_helper+0x860/0x5450 [ 15.223658] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.223682] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.223709] ? kasan_atomics+0x152/0x310 [ 15.223736] kasan_atomics+0x1dc/0x310 [ 15.223760] ? __pfx_kasan_atomics+0x10/0x10 [ 15.223784] ? trace_hardirqs_on+0x37/0xe0 [ 15.223848] ? __pfx_read_tsc+0x10/0x10 [ 15.223873] ? ktime_get_ts64+0x86/0x230 [ 15.223897] kunit_try_run_case+0x1a5/0x480 [ 15.223923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.223965] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.223993] ? __kthread_parkme+0x82/0x180 [ 15.224015] ? preempt_count_sub+0x50/0x80 [ 15.224050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.224076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.224129] kthread+0x337/0x6f0 [ 15.224149] ? trace_preempt_on+0x20/0xc0 [ 15.224172] ? __pfx_kthread+0x10/0x10 [ 15.224194] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.224217] ? calculate_sigpending+0x7b/0xa0 [ 15.224242] ? __pfx_kthread+0x10/0x10 [ 15.224264] ret_from_fork+0x116/0x1d0 [ 15.224283] ? __pfx_kthread+0x10/0x10 [ 15.224305] ret_from_fork_asm+0x1a/0x30 [ 15.224337] </TASK> [ 15.224348] [ 15.231753] Allocated by task 282: [ 15.231932] kasan_save_stack+0x45/0x70 [ 15.232151] kasan_save_track+0x18/0x40 [ 15.232336] kasan_save_alloc_info+0x3b/0x50 [ 15.232524] __kasan_kmalloc+0xb7/0xc0 [ 15.232693] __kmalloc_cache_noprof+0x189/0x420 [ 15.232948] kasan_atomics+0x95/0x310 [ 15.233130] kunit_try_run_case+0x1a5/0x480 [ 15.233324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.233527] kthread+0x337/0x6f0 [ 15.233649] ret_from_fork+0x116/0x1d0 [ 15.233782] ret_from_fork_asm+0x1a/0x30 [ 15.233923] [ 15.234020] The buggy address belongs to the object at ffff8881027b3900 [ 15.234020] which belongs to the cache kmalloc-64 of size 64 [ 15.234850] The buggy address is located 0 bytes to the right of [ 15.234850] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.235595] [ 15.235675] The buggy address belongs to the physical page: [ 15.236081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.236464] flags: 0x200000000000000(node=0|zone=2) [ 15.236668] page_type: f5(slab) [ 15.236834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.237155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.237471] page dumped because: kasan: bad access detected [ 15.237684] [ 15.237785] Memory state around the buggy address: [ 15.237981] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.238270] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.238485] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.238696] ^ [ 15.238849] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.239133] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.239449] ================================================================== [ 15.838014] ================================================================== [ 15.838323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.838658] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.839301] [ 15.839512] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.839553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.839566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.839587] Call Trace: [ 15.839602] <TASK> [ 15.839616] dump_stack_lvl+0x73/0xb0 [ 15.839646] print_report+0xd1/0x650 [ 15.839668] ? __virt_addr_valid+0x1db/0x2d0 [ 15.839692] ? kasan_atomics_helper+0x164f/0x5450 [ 15.839714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.839738] ? kasan_atomics_helper+0x164f/0x5450 [ 15.839761] kasan_report+0x141/0x180 [ 15.839784] ? kasan_atomics_helper+0x164f/0x5450 [ 15.839811] kasan_check_range+0x10c/0x1c0 [ 15.839836] __kasan_check_write+0x18/0x20 [ 15.839857] kasan_atomics_helper+0x164f/0x5450 [ 15.839880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.839904] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.839930] ? kasan_atomics+0x152/0x310 [ 15.839962] kasan_atomics+0x1dc/0x310 [ 15.839986] ? __pfx_kasan_atomics+0x10/0x10 [ 15.840009] ? trace_hardirqs_on+0x37/0xe0 [ 15.840044] ? __pfx_read_tsc+0x10/0x10 [ 15.840066] ? ktime_get_ts64+0x86/0x230 [ 15.840090] kunit_try_run_case+0x1a5/0x480 [ 15.840115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840141] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.840166] ? __kthread_parkme+0x82/0x180 [ 15.840187] ? preempt_count_sub+0x50/0x80 [ 15.840211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.840262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.840289] kthread+0x337/0x6f0 [ 15.840309] ? trace_preempt_on+0x20/0xc0 [ 15.840331] ? __pfx_kthread+0x10/0x10 [ 15.840353] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.840376] ? calculate_sigpending+0x7b/0xa0 [ 15.840401] ? __pfx_kthread+0x10/0x10 [ 15.840424] ret_from_fork+0x116/0x1d0 [ 15.840444] ? __pfx_kthread+0x10/0x10 [ 15.840465] ret_from_fork_asm+0x1a/0x30 [ 15.840496] </TASK> [ 15.840507] [ 15.849230] Allocated by task 282: [ 15.849357] kasan_save_stack+0x45/0x70 [ 15.849500] kasan_save_track+0x18/0x40 [ 15.849689] kasan_save_alloc_info+0x3b/0x50 [ 15.849897] __kasan_kmalloc+0xb7/0xc0 [ 15.850091] __kmalloc_cache_noprof+0x189/0x420 [ 15.850402] kasan_atomics+0x95/0x310 [ 15.850604] kunit_try_run_case+0x1a5/0x480 [ 15.850908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.851179] kthread+0x337/0x6f0 [ 15.851391] ret_from_fork+0x116/0x1d0 [ 15.851576] ret_from_fork_asm+0x1a/0x30 [ 15.851718] [ 15.851789] The buggy address belongs to the object at ffff8881027b3900 [ 15.851789] which belongs to the cache kmalloc-64 of size 64 [ 15.852496] The buggy address is located 0 bytes to the right of [ 15.852496] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.853134] [ 15.853245] The buggy address belongs to the physical page: [ 15.853507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.853754] flags: 0x200000000000000(node=0|zone=2) [ 15.853915] page_type: f5(slab) [ 15.854092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.854465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.854940] page dumped because: kasan: bad access detected [ 15.855218] [ 15.855287] Memory state around the buggy address: [ 15.855440] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.855659] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.856082] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.857488] ^ [ 15.858007] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.858520] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.858747] ================================================================== [ 15.026399] ================================================================== [ 15.026711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.027222] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.027545] [ 15.027652] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.027695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.027708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.027730] Call Trace: [ 15.027782] <TASK> [ 15.027865] dump_stack_lvl+0x73/0xb0 [ 15.027937] print_report+0xd1/0x650 [ 15.027982] ? __virt_addr_valid+0x1db/0x2d0 [ 15.028006] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.028038] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.028096] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.028119] kasan_report+0x141/0x180 [ 15.028143] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.028170] __asan_report_load4_noabort+0x18/0x20 [ 15.028222] kasan_atomics_helper+0x4b54/0x5450 [ 15.028247] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.028271] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.028297] ? kasan_atomics+0x152/0x310 [ 15.028325] kasan_atomics+0x1dc/0x310 [ 15.028348] ? __pfx_kasan_atomics+0x10/0x10 [ 15.028372] ? trace_hardirqs_on+0x37/0xe0 [ 15.028397] ? __pfx_read_tsc+0x10/0x10 [ 15.028418] ? ktime_get_ts64+0x86/0x230 [ 15.028470] kunit_try_run_case+0x1a5/0x480 [ 15.028519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.028545] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.028571] ? __kthread_parkme+0x82/0x180 [ 15.028593] ? preempt_count_sub+0x50/0x80 [ 15.028617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.028643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.028669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.028695] kthread+0x337/0x6f0 [ 15.028715] ? trace_preempt_on+0x20/0xc0 [ 15.028738] ? __pfx_kthread+0x10/0x10 [ 15.028759] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.028782] ? calculate_sigpending+0x7b/0xa0 [ 15.028872] ? __pfx_kthread+0x10/0x10 [ 15.028896] ret_from_fork+0x116/0x1d0 [ 15.028917] ? __pfx_kthread+0x10/0x10 [ 15.028939] ret_from_fork_asm+0x1a/0x30 [ 15.028987] </TASK> [ 15.028998] [ 15.038149] Allocated by task 282: [ 15.038336] kasan_save_stack+0x45/0x70 [ 15.038567] kasan_save_track+0x18/0x40 [ 15.038776] kasan_save_alloc_info+0x3b/0x50 [ 15.039143] __kasan_kmalloc+0xb7/0xc0 [ 15.039338] __kmalloc_cache_noprof+0x189/0x420 [ 15.039515] kasan_atomics+0x95/0x310 [ 15.039695] kunit_try_run_case+0x1a5/0x480 [ 15.040038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.040335] kthread+0x337/0x6f0 [ 15.040518] ret_from_fork+0x116/0x1d0 [ 15.040722] ret_from_fork_asm+0x1a/0x30 [ 15.041052] [ 15.041182] The buggy address belongs to the object at ffff8881027b3900 [ 15.041182] which belongs to the cache kmalloc-64 of size 64 [ 15.041684] The buggy address is located 0 bytes to the right of [ 15.041684] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.042468] [ 15.042604] The buggy address belongs to the physical page: [ 15.042986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.043377] flags: 0x200000000000000(node=0|zone=2) [ 15.043606] page_type: f5(slab) [ 15.043861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.044276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.044609] page dumped because: kasan: bad access detected [ 15.044886] [ 15.044975] Memory state around the buggy address: [ 15.045174] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.045506] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.045779] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.046214] ^ [ 15.046376] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.046691] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.047185] ================================================================== [ 15.265333] ================================================================== [ 15.266065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.266729] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.267196] [ 15.267287] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.267330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.267342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.267363] Call Trace: [ 15.267378] <TASK> [ 15.267393] dump_stack_lvl+0x73/0xb0 [ 15.267423] print_report+0xd1/0x650 [ 15.267447] ? __virt_addr_valid+0x1db/0x2d0 [ 15.267470] ? kasan_atomics_helper+0x992/0x5450 [ 15.267492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.267517] ? kasan_atomics_helper+0x992/0x5450 [ 15.267540] kasan_report+0x141/0x180 [ 15.267563] ? kasan_atomics_helper+0x992/0x5450 [ 15.267591] kasan_check_range+0x10c/0x1c0 [ 15.267615] __kasan_check_write+0x18/0x20 [ 15.267636] kasan_atomics_helper+0x992/0x5450 [ 15.267660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.267684] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.267710] ? kasan_atomics+0x152/0x310 [ 15.267737] kasan_atomics+0x1dc/0x310 [ 15.267761] ? __pfx_kasan_atomics+0x10/0x10 [ 15.267785] ? trace_hardirqs_on+0x37/0xe0 [ 15.267878] ? __pfx_read_tsc+0x10/0x10 [ 15.267902] ? ktime_get_ts64+0x86/0x230 [ 15.267952] kunit_try_run_case+0x1a5/0x480 [ 15.267986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.268012] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.268054] ? __kthread_parkme+0x82/0x180 [ 15.268077] ? preempt_count_sub+0x50/0x80 [ 15.268101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.268128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.268154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.268180] kthread+0x337/0x6f0 [ 15.268200] ? trace_preempt_on+0x20/0xc0 [ 15.268222] ? __pfx_kthread+0x10/0x10 [ 15.268244] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.268266] ? calculate_sigpending+0x7b/0xa0 [ 15.268291] ? __pfx_kthread+0x10/0x10 [ 15.268314] ret_from_fork+0x116/0x1d0 [ 15.268333] ? __pfx_kthread+0x10/0x10 [ 15.268355] ret_from_fork_asm+0x1a/0x30 [ 15.268386] </TASK> [ 15.268397] [ 15.283374] Allocated by task 282: [ 15.283710] kasan_save_stack+0x45/0x70 [ 15.284214] kasan_save_track+0x18/0x40 [ 15.284623] kasan_save_alloc_info+0x3b/0x50 [ 15.285075] __kasan_kmalloc+0xb7/0xc0 [ 15.285511] __kmalloc_cache_noprof+0x189/0x420 [ 15.286126] kasan_atomics+0x95/0x310 [ 15.286419] kunit_try_run_case+0x1a5/0x480 [ 15.286666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286856] kthread+0x337/0x6f0 [ 15.287255] ret_from_fork+0x116/0x1d0 [ 15.287640] ret_from_fork_asm+0x1a/0x30 [ 15.288115] [ 15.288300] The buggy address belongs to the object at ffff8881027b3900 [ 15.288300] which belongs to the cache kmalloc-64 of size 64 [ 15.289322] The buggy address is located 0 bytes to the right of [ 15.289322] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.289696] [ 15.289770] The buggy address belongs to the physical page: [ 15.289981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.290586] flags: 0x200000000000000(node=0|zone=2) [ 15.291218] page_type: f5(slab) [ 15.291449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.291686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.291984] page dumped because: kasan: bad access detected [ 15.292251] [ 15.292348] Memory state around the buggy address: [ 15.292579] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.292914] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.293261] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.293618] ^ [ 15.293808] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.294217] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.294513] ================================================================== [ 14.965609] ================================================================== [ 14.966113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.966690] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 14.967224] [ 14.967324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.967367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.967378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.967399] Call Trace: [ 14.967413] <TASK> [ 14.967427] dump_stack_lvl+0x73/0xb0 [ 14.967456] print_report+0xd1/0x650 [ 14.967477] ? __virt_addr_valid+0x1db/0x2d0 [ 14.967499] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.967521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.967544] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.967565] kasan_report+0x141/0x180 [ 14.967587] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.967614] __asan_report_load4_noabort+0x18/0x20 [ 14.967639] kasan_atomics_helper+0x4b88/0x5450 [ 14.967661] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.967684] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.967709] ? kasan_atomics+0x152/0x310 [ 14.967906] kasan_atomics+0x1dc/0x310 [ 14.967953] ? __pfx_kasan_atomics+0x10/0x10 [ 14.967999] ? trace_hardirqs_on+0x37/0xe0 [ 14.968024] ? __pfx_read_tsc+0x10/0x10 [ 14.968058] ? ktime_get_ts64+0x86/0x230 [ 14.968083] kunit_try_run_case+0x1a5/0x480 [ 14.968109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.968135] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.968162] ? __kthread_parkme+0x82/0x180 [ 14.968183] ? preempt_count_sub+0x50/0x80 [ 14.968207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.968233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.968258] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.968285] kthread+0x337/0x6f0 [ 14.968305] ? trace_preempt_on+0x20/0xc0 [ 14.968330] ? __pfx_kthread+0x10/0x10 [ 14.968352] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.968375] ? calculate_sigpending+0x7b/0xa0 [ 14.968400] ? __pfx_kthread+0x10/0x10 [ 14.968424] ret_from_fork+0x116/0x1d0 [ 14.968443] ? __pfx_kthread+0x10/0x10 [ 14.968465] ret_from_fork_asm+0x1a/0x30 [ 14.968498] </TASK> [ 14.968509] [ 14.976661] Allocated by task 282: [ 14.976798] kasan_save_stack+0x45/0x70 [ 14.976945] kasan_save_track+0x18/0x40 [ 14.977091] kasan_save_alloc_info+0x3b/0x50 [ 14.977344] __kasan_kmalloc+0xb7/0xc0 [ 14.977527] __kmalloc_cache_noprof+0x189/0x420 [ 14.977957] kasan_atomics+0x95/0x310 [ 14.978183] kunit_try_run_case+0x1a5/0x480 [ 14.978378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.978649] kthread+0x337/0x6f0 [ 14.978786] ret_from_fork+0x116/0x1d0 [ 14.979117] ret_from_fork_asm+0x1a/0x30 [ 14.979311] [ 14.979385] The buggy address belongs to the object at ffff8881027b3900 [ 14.979385] which belongs to the cache kmalloc-64 of size 64 [ 14.979980] The buggy address is located 0 bytes to the right of [ 14.979980] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 14.980467] [ 14.980542] The buggy address belongs to the physical page: [ 14.980715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 14.981116] flags: 0x200000000000000(node=0|zone=2) [ 14.981357] page_type: f5(slab) [ 14.981585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.982223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.982556] page dumped because: kasan: bad access detected [ 14.982791] [ 14.982867] Memory state around the buggy address: [ 14.983041] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.983576] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.983900] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.984131] ^ [ 14.984337] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.984648] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.985170] ================================================================== [ 14.985533] ================================================================== [ 14.986044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.986493] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 14.986762] [ 14.986867] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.986909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.986922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.987006] Call Trace: [ 14.987022] <TASK> [ 14.987049] dump_stack_lvl+0x73/0xb0 [ 14.987079] print_report+0xd1/0x650 [ 14.987103] ? __virt_addr_valid+0x1db/0x2d0 [ 14.987126] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.987149] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.987173] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.987196] kasan_report+0x141/0x180 [ 14.987219] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.987247] __asan_report_store4_noabort+0x1b/0x30 [ 14.987273] kasan_atomics_helper+0x4b6e/0x5450 [ 14.987298] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.987321] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.987347] ? kasan_atomics+0x152/0x310 [ 14.987375] kasan_atomics+0x1dc/0x310 [ 14.987422] ? __pfx_kasan_atomics+0x10/0x10 [ 14.987446] ? trace_hardirqs_on+0x37/0xe0 [ 14.987470] ? __pfx_read_tsc+0x10/0x10 [ 14.987491] ? ktime_get_ts64+0x86/0x230 [ 14.987516] kunit_try_run_case+0x1a5/0x480 [ 14.987540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.987566] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.987592] ? __kthread_parkme+0x82/0x180 [ 14.987613] ? preempt_count_sub+0x50/0x80 [ 14.987637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.987663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.987689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.987715] kthread+0x337/0x6f0 [ 14.987734] ? trace_preempt_on+0x20/0xc0 [ 14.987757] ? __pfx_kthread+0x10/0x10 [ 14.987779] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.987801] ? calculate_sigpending+0x7b/0xa0 [ 14.987826] ? __pfx_kthread+0x10/0x10 [ 14.987850] ret_from_fork+0x116/0x1d0 [ 14.987869] ? __pfx_kthread+0x10/0x10 [ 14.987910] ret_from_fork_asm+0x1a/0x30 [ 14.987942] </TASK> [ 14.987958] [ 14.996213] Allocated by task 282: [ 14.996347] kasan_save_stack+0x45/0x70 [ 14.996500] kasan_save_track+0x18/0x40 [ 14.996695] kasan_save_alloc_info+0x3b/0x50 [ 14.997020] __kasan_kmalloc+0xb7/0xc0 [ 14.997244] __kmalloc_cache_noprof+0x189/0x420 [ 14.997472] kasan_atomics+0x95/0x310 [ 14.997680] kunit_try_run_case+0x1a5/0x480 [ 14.998126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.998357] kthread+0x337/0x6f0 [ 14.998530] ret_from_fork+0x116/0x1d0 [ 14.998736] ret_from_fork_asm+0x1a/0x30 [ 14.999062] [ 14.999136] The buggy address belongs to the object at ffff8881027b3900 [ 14.999136] which belongs to the cache kmalloc-64 of size 64 [ 14.999625] The buggy address is located 0 bytes to the right of [ 14.999625] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.000368] [ 15.000465] The buggy address belongs to the physical page: [ 15.000649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.000971] flags: 0x200000000000000(node=0|zone=2) [ 15.001320] page_type: f5(slab) [ 15.001489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.001773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.001995] page dumped because: kasan: bad access detected [ 15.002398] [ 15.002497] Memory state around the buggy address: [ 15.002723] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.003259] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.003480] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.003994] ^ [ 15.004249] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.004609] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.005060] ================================================================== [ 15.178894] ================================================================== [ 15.179437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.179866] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.180342] [ 15.180503] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.180546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.180607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.180633] Call Trace: [ 15.180649] <TASK> [ 15.180665] dump_stack_lvl+0x73/0xb0 [ 15.180696] print_report+0xd1/0x650 [ 15.180719] ? __virt_addr_valid+0x1db/0x2d0 [ 15.180744] ? kasan_atomics_helper+0x72f/0x5450 [ 15.180767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.180814] ? kasan_atomics_helper+0x72f/0x5450 [ 15.180873] kasan_report+0x141/0x180 [ 15.180896] ? kasan_atomics_helper+0x72f/0x5450 [ 15.180924] kasan_check_range+0x10c/0x1c0 [ 15.180949] __kasan_check_write+0x18/0x20 [ 15.180978] kasan_atomics_helper+0x72f/0x5450 [ 15.181003] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.181027] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.181067] ? kasan_atomics+0x152/0x310 [ 15.181094] kasan_atomics+0x1dc/0x310 [ 15.181141] ? __pfx_kasan_atomics+0x10/0x10 [ 15.181165] ? trace_hardirqs_on+0x37/0xe0 [ 15.181190] ? __pfx_read_tsc+0x10/0x10 [ 15.181212] ? ktime_get_ts64+0x86/0x230 [ 15.181237] kunit_try_run_case+0x1a5/0x480 [ 15.181262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181288] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.181315] ? __kthread_parkme+0x82/0x180 [ 15.181355] ? preempt_count_sub+0x50/0x80 [ 15.181381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.181434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.181462] kthread+0x337/0x6f0 [ 15.181481] ? trace_preempt_on+0x20/0xc0 [ 15.181504] ? __pfx_kthread+0x10/0x10 [ 15.181526] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.181549] ? calculate_sigpending+0x7b/0xa0 [ 15.181574] ? __pfx_kthread+0x10/0x10 [ 15.181597] ret_from_fork+0x116/0x1d0 [ 15.181616] ? __pfx_kthread+0x10/0x10 [ 15.181638] ret_from_fork_asm+0x1a/0x30 [ 15.181669] </TASK> [ 15.181681] [ 15.193147] Allocated by task 282: [ 15.193472] kasan_save_stack+0x45/0x70 [ 15.193774] kasan_save_track+0x18/0x40 [ 15.194179] kasan_save_alloc_info+0x3b/0x50 [ 15.194486] __kasan_kmalloc+0xb7/0xc0 [ 15.194637] __kmalloc_cache_noprof+0x189/0x420 [ 15.194863] kasan_atomics+0x95/0x310 [ 15.195303] kunit_try_run_case+0x1a5/0x480 [ 15.195594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.196043] kthread+0x337/0x6f0 [ 15.196302] ret_from_fork+0x116/0x1d0 [ 15.196451] ret_from_fork_asm+0x1a/0x30 [ 15.196777] [ 15.196895] The buggy address belongs to the object at ffff8881027b3900 [ 15.196895] which belongs to the cache kmalloc-64 of size 64 [ 15.197421] The buggy address is located 0 bytes to the right of [ 15.197421] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.197946] [ 15.198303] The buggy address belongs to the physical page: [ 15.198560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.198855] flags: 0x200000000000000(node=0|zone=2) [ 15.199137] page_type: f5(slab) [ 15.199308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.199601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.200045] page dumped because: kasan: bad access detected [ 15.200286] [ 15.200386] Memory state around the buggy address: [ 15.200589] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.200867] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.201265] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.201538] ^ [ 15.201694] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.202089] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.202421] ================================================================== [ 15.357733] ================================================================== [ 15.358687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.359217] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.359672] [ 15.359779] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.359822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.359834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.359855] Call Trace: [ 15.359870] <TASK> [ 15.359885] dump_stack_lvl+0x73/0xb0 [ 15.359914] print_report+0xd1/0x650 [ 15.359937] ? __virt_addr_valid+0x1db/0x2d0 [ 15.359967] ? kasan_atomics_helper+0xc70/0x5450 [ 15.359989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.360014] ? kasan_atomics_helper+0xc70/0x5450 [ 15.360047] kasan_report+0x141/0x180 [ 15.360071] ? kasan_atomics_helper+0xc70/0x5450 [ 15.360098] kasan_check_range+0x10c/0x1c0 [ 15.360124] __kasan_check_write+0x18/0x20 [ 15.360145] kasan_atomics_helper+0xc70/0x5450 [ 15.360169] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.360193] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.360220] ? kasan_atomics+0x152/0x310 [ 15.360247] kasan_atomics+0x1dc/0x310 [ 15.360271] ? __pfx_kasan_atomics+0x10/0x10 [ 15.360295] ? trace_hardirqs_on+0x37/0xe0 [ 15.360319] ? __pfx_read_tsc+0x10/0x10 [ 15.360341] ? ktime_get_ts64+0x86/0x230 [ 15.360630] kunit_try_run_case+0x1a5/0x480 [ 15.360832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.360872] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.360900] ? __kthread_parkme+0x82/0x180 [ 15.360922] ? preempt_count_sub+0x50/0x80 [ 15.360948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.360976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.361003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.361051] kthread+0x337/0x6f0 [ 15.361072] ? trace_preempt_on+0x20/0xc0 [ 15.361096] ? __pfx_kthread+0x10/0x10 [ 15.361119] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.361142] ? calculate_sigpending+0x7b/0xa0 [ 15.361167] ? __pfx_kthread+0x10/0x10 [ 15.361190] ret_from_fork+0x116/0x1d0 [ 15.361291] ? __pfx_kthread+0x10/0x10 [ 15.361319] ret_from_fork_asm+0x1a/0x30 [ 15.361352] </TASK> [ 15.361365] [ 15.372324] Allocated by task 282: [ 15.372460] kasan_save_stack+0x45/0x70 [ 15.372608] kasan_save_track+0x18/0x40 [ 15.372744] kasan_save_alloc_info+0x3b/0x50 [ 15.372893] __kasan_kmalloc+0xb7/0xc0 [ 15.373026] __kmalloc_cache_noprof+0x189/0x420 [ 15.373363] kasan_atomics+0x95/0x310 [ 15.373596] kunit_try_run_case+0x1a5/0x480 [ 15.373812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.374245] kthread+0x337/0x6f0 [ 15.374441] ret_from_fork+0x116/0x1d0 [ 15.374643] ret_from_fork_asm+0x1a/0x30 [ 15.374907] [ 15.375063] The buggy address belongs to the object at ffff8881027b3900 [ 15.375063] which belongs to the cache kmalloc-64 of size 64 [ 15.375624] The buggy address is located 0 bytes to the right of [ 15.375624] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.376422] [ 15.376560] The buggy address belongs to the physical page: [ 15.377112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.377541] flags: 0x200000000000000(node=0|zone=2) [ 15.377781] page_type: f5(slab) [ 15.377991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.378456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.378832] page dumped because: kasan: bad access detected [ 15.379169] [ 15.379297] Memory state around the buggy address: [ 15.379621] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.380054] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.380399] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.380841] ^ [ 15.381137] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381467] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381780] ================================================================== [ 15.408701] ================================================================== [ 15.409241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.409689] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.410418] [ 15.410540] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.410584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.410598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.410619] Call Trace: [ 15.410636] <TASK> [ 15.410652] dump_stack_lvl+0x73/0xb0 [ 15.410682] print_report+0xd1/0x650 [ 15.410705] ? __virt_addr_valid+0x1db/0x2d0 [ 15.410728] ? kasan_atomics_helper+0xd47/0x5450 [ 15.410751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.410775] ? kasan_atomics_helper+0xd47/0x5450 [ 15.410798] kasan_report+0x141/0x180 [ 15.410867] ? kasan_atomics_helper+0xd47/0x5450 [ 15.410895] kasan_check_range+0x10c/0x1c0 [ 15.410920] __kasan_check_write+0x18/0x20 [ 15.410939] kasan_atomics_helper+0xd47/0x5450 [ 15.410964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.410988] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.411064] ? kasan_atomics+0x152/0x310 [ 15.411093] kasan_atomics+0x1dc/0x310 [ 15.411117] ? __pfx_kasan_atomics+0x10/0x10 [ 15.411141] ? trace_hardirqs_on+0x37/0xe0 [ 15.411164] ? __pfx_read_tsc+0x10/0x10 [ 15.411186] ? ktime_get_ts64+0x86/0x230 [ 15.411211] kunit_try_run_case+0x1a5/0x480 [ 15.411236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.411263] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.411290] ? __kthread_parkme+0x82/0x180 [ 15.411311] ? preempt_count_sub+0x50/0x80 [ 15.411335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.411361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.411387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.411413] kthread+0x337/0x6f0 [ 15.411434] ? trace_preempt_on+0x20/0xc0 [ 15.411457] ? __pfx_kthread+0x10/0x10 [ 15.411479] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.411502] ? calculate_sigpending+0x7b/0xa0 [ 15.411527] ? __pfx_kthread+0x10/0x10 [ 15.411549] ret_from_fork+0x116/0x1d0 [ 15.411569] ? __pfx_kthread+0x10/0x10 [ 15.411590] ret_from_fork_asm+0x1a/0x30 [ 15.411621] </TASK> [ 15.411632] [ 15.422931] Allocated by task 282: [ 15.423130] kasan_save_stack+0x45/0x70 [ 15.423281] kasan_save_track+0x18/0x40 [ 15.423429] kasan_save_alloc_info+0x3b/0x50 [ 15.423663] __kasan_kmalloc+0xb7/0xc0 [ 15.423867] __kmalloc_cache_noprof+0x189/0x420 [ 15.424205] kasan_atomics+0x95/0x310 [ 15.424441] kunit_try_run_case+0x1a5/0x480 [ 15.424635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.424846] kthread+0x337/0x6f0 [ 15.425233] ret_from_fork+0x116/0x1d0 [ 15.425472] ret_from_fork_asm+0x1a/0x30 [ 15.425667] [ 15.425742] The buggy address belongs to the object at ffff8881027b3900 [ 15.425742] which belongs to the cache kmalloc-64 of size 64 [ 15.426190] The buggy address is located 0 bytes to the right of [ 15.426190] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.426728] [ 15.426800] The buggy address belongs to the physical page: [ 15.426970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.427659] flags: 0x200000000000000(node=0|zone=2) [ 15.428072] page_type: f5(slab) [ 15.428218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.428566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.428803] page dumped because: kasan: bad access detected [ 15.429273] [ 15.429405] Memory state around the buggy address: [ 15.429594] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.430051] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.430294] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.430641] ^ [ 15.430879] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.431411] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.431643] ================================================================== [ 16.001806] ================================================================== [ 16.002207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.002997] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.003313] [ 16.003422] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.003465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.003478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.003498] Call Trace: [ 16.003514] <TASK> [ 16.003530] dump_stack_lvl+0x73/0xb0 [ 16.003559] print_report+0xd1/0x650 [ 16.003582] ? __virt_addr_valid+0x1db/0x2d0 [ 16.003606] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.003629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.003653] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.003676] kasan_report+0x141/0x180 [ 16.003699] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.003726] kasan_check_range+0x10c/0x1c0 [ 16.003751] __kasan_check_write+0x18/0x20 [ 16.003771] kasan_atomics_helper+0x1a7f/0x5450 [ 16.003796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.003820] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.003846] ? kasan_atomics+0x152/0x310 [ 16.003873] kasan_atomics+0x1dc/0x310 [ 16.003897] ? __pfx_kasan_atomics+0x10/0x10 [ 16.003921] ? trace_hardirqs_on+0x37/0xe0 [ 16.003951] ? __pfx_read_tsc+0x10/0x10 [ 16.003973] ? ktime_get_ts64+0x86/0x230 [ 16.003997] kunit_try_run_case+0x1a5/0x480 [ 16.004022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.004144] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.004184] ? __kthread_parkme+0x82/0x180 [ 16.004205] ? preempt_count_sub+0x50/0x80 [ 16.004230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.004256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.004283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.004308] kthread+0x337/0x6f0 [ 16.004328] ? trace_preempt_on+0x20/0xc0 [ 16.004351] ? __pfx_kthread+0x10/0x10 [ 16.004372] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.004396] ? calculate_sigpending+0x7b/0xa0 [ 16.004421] ? __pfx_kthread+0x10/0x10 [ 16.004443] ret_from_fork+0x116/0x1d0 [ 16.004463] ? __pfx_kthread+0x10/0x10 [ 16.004484] ret_from_fork_asm+0x1a/0x30 [ 16.004517] </TASK> [ 16.004528] [ 16.015672] Allocated by task 282: [ 16.015894] kasan_save_stack+0x45/0x70 [ 16.016307] kasan_save_track+0x18/0x40 [ 16.016615] kasan_save_alloc_info+0x3b/0x50 [ 16.016917] __kasan_kmalloc+0xb7/0xc0 [ 16.017110] __kmalloc_cache_noprof+0x189/0x420 [ 16.017327] kasan_atomics+0x95/0x310 [ 16.017504] kunit_try_run_case+0x1a5/0x480 [ 16.017706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.017950] kthread+0x337/0x6f0 [ 16.018547] ret_from_fork+0x116/0x1d0 [ 16.018722] ret_from_fork_asm+0x1a/0x30 [ 16.019350] [ 16.019434] The buggy address belongs to the object at ffff8881027b3900 [ 16.019434] which belongs to the cache kmalloc-64 of size 64 [ 16.020324] The buggy address is located 0 bytes to the right of [ 16.020324] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.021107] [ 16.021217] The buggy address belongs to the physical page: [ 16.021612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.022186] flags: 0x200000000000000(node=0|zone=2) [ 16.022381] page_type: f5(slab) [ 16.022681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.023205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.023531] page dumped because: kasan: bad access detected [ 16.023770] [ 16.023855] Memory state around the buggy address: [ 16.024365] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.024729] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.025471] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.025771] ^ [ 16.026260] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.026671] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.027239] ================================================================== [ 15.772316] ================================================================== [ 15.772729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.773155] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.773571] [ 15.773690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.773734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.773747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.773768] Call Trace: [ 15.773784] <TASK> [ 15.773798] dump_stack_lvl+0x73/0xb0 [ 15.773827] print_report+0xd1/0x650 [ 15.773850] ? __virt_addr_valid+0x1db/0x2d0 [ 15.773873] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.773930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.773954] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.773988] kasan_report+0x141/0x180 [ 15.774011] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.774046] __asan_report_store8_noabort+0x1b/0x30 [ 15.774073] kasan_atomics_helper+0x50d4/0x5450 [ 15.774097] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.774121] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.774146] ? kasan_atomics+0x152/0x310 [ 15.774174] kasan_atomics+0x1dc/0x310 [ 15.774253] ? __pfx_kasan_atomics+0x10/0x10 [ 15.774279] ? trace_hardirqs_on+0x37/0xe0 [ 15.774303] ? __pfx_read_tsc+0x10/0x10 [ 15.774325] ? ktime_get_ts64+0x86/0x230 [ 15.774350] kunit_try_run_case+0x1a5/0x480 [ 15.774375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.774401] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.774427] ? __kthread_parkme+0x82/0x180 [ 15.774448] ? preempt_count_sub+0x50/0x80 [ 15.774473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.774499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.774525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.774551] kthread+0x337/0x6f0 [ 15.774571] ? trace_preempt_on+0x20/0xc0 [ 15.774595] ? __pfx_kthread+0x10/0x10 [ 15.774617] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.774639] ? calculate_sigpending+0x7b/0xa0 [ 15.774664] ? __pfx_kthread+0x10/0x10 [ 15.774702] ret_from_fork+0x116/0x1d0 [ 15.774722] ? __pfx_kthread+0x10/0x10 [ 15.774744] ret_from_fork_asm+0x1a/0x30 [ 15.774785] </TASK> [ 15.774797] [ 15.784554] Allocated by task 282: [ 15.784731] kasan_save_stack+0x45/0x70 [ 15.785187] kasan_save_track+0x18/0x40 [ 15.785368] kasan_save_alloc_info+0x3b/0x50 [ 15.785559] __kasan_kmalloc+0xb7/0xc0 [ 15.785737] __kmalloc_cache_noprof+0x189/0x420 [ 15.786078] kasan_atomics+0x95/0x310 [ 15.786600] kunit_try_run_case+0x1a5/0x480 [ 15.787162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.787592] kthread+0x337/0x6f0 [ 15.788075] ret_from_fork+0x116/0x1d0 [ 15.788352] ret_from_fork_asm+0x1a/0x30 [ 15.788756] [ 15.788995] The buggy address belongs to the object at ffff8881027b3900 [ 15.788995] which belongs to the cache kmalloc-64 of size 64 [ 15.789725] The buggy address is located 0 bytes to the right of [ 15.789725] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.790458] [ 15.790558] The buggy address belongs to the physical page: [ 15.790790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.791479] flags: 0x200000000000000(node=0|zone=2) [ 15.792067] page_type: f5(slab) [ 15.792378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.792706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.793306] page dumped because: kasan: bad access detected [ 15.793749] [ 15.793986] Memory state around the buggy address: [ 15.794397] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.794701] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.795479] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.795963] ^ [ 15.796420] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.797092] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.797608] ================================================================== [ 15.005582] ================================================================== [ 15.006070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.006426] Read of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.006769] [ 15.007004] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.007060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.007073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.007094] Call Trace: [ 15.007110] <TASK> [ 15.007125] dump_stack_lvl+0x73/0xb0 [ 15.007154] print_report+0xd1/0x650 [ 15.007178] ? __virt_addr_valid+0x1db/0x2d0 [ 15.007201] ? kasan_atomics_helper+0x3df/0x5450 [ 15.007223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.007248] ? kasan_atomics_helper+0x3df/0x5450 [ 15.007271] kasan_report+0x141/0x180 [ 15.007293] ? kasan_atomics_helper+0x3df/0x5450 [ 15.007321] kasan_check_range+0x10c/0x1c0 [ 15.007346] __kasan_check_read+0x15/0x20 [ 15.007366] kasan_atomics_helper+0x3df/0x5450 [ 15.007390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.007413] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.007440] ? kasan_atomics+0x152/0x310 [ 15.007467] kasan_atomics+0x1dc/0x310 [ 15.007491] ? __pfx_kasan_atomics+0x10/0x10 [ 15.007514] ? trace_hardirqs_on+0x37/0xe0 [ 15.007538] ? __pfx_read_tsc+0x10/0x10 [ 15.007560] ? ktime_get_ts64+0x86/0x230 [ 15.007584] kunit_try_run_case+0x1a5/0x480 [ 15.007609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.007635] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.007661] ? __kthread_parkme+0x82/0x180 [ 15.007682] ? preempt_count_sub+0x50/0x80 [ 15.007706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.007732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.007757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.007784] kthread+0x337/0x6f0 [ 15.007899] ? trace_preempt_on+0x20/0xc0 [ 15.007943] ? __pfx_kthread+0x10/0x10 [ 15.007969] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.007993] ? calculate_sigpending+0x7b/0xa0 [ 15.008017] ? __pfx_kthread+0x10/0x10 [ 15.008049] ret_from_fork+0x116/0x1d0 [ 15.008068] ? __pfx_kthread+0x10/0x10 [ 15.008089] ret_from_fork_asm+0x1a/0x30 [ 15.008121] </TASK> [ 15.008131] [ 15.016388] Allocated by task 282: [ 15.016595] kasan_save_stack+0x45/0x70 [ 15.016786] kasan_save_track+0x18/0x40 [ 15.017141] kasan_save_alloc_info+0x3b/0x50 [ 15.017359] __kasan_kmalloc+0xb7/0xc0 [ 15.017493] __kmalloc_cache_noprof+0x189/0x420 [ 15.017698] kasan_atomics+0x95/0x310 [ 15.018183] kunit_try_run_case+0x1a5/0x480 [ 15.018405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.018703] kthread+0x337/0x6f0 [ 15.018979] ret_from_fork+0x116/0x1d0 [ 15.019210] ret_from_fork_asm+0x1a/0x30 [ 15.019408] [ 15.019540] The buggy address belongs to the object at ffff8881027b3900 [ 15.019540] which belongs to the cache kmalloc-64 of size 64 [ 15.020178] The buggy address is located 0 bytes to the right of [ 15.020178] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.020697] [ 15.020891] The buggy address belongs to the physical page: [ 15.021188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.021569] flags: 0x200000000000000(node=0|zone=2) [ 15.021881] page_type: f5(slab) [ 15.022113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.022448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.023011] page dumped because: kasan: bad access detected [ 15.023346] [ 15.023430] Memory state around the buggy address: [ 15.023652] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.024127] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.024460] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.024766] ^ [ 15.025112] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.025443] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.025780] ================================================================== [ 16.105347] ================================================================== [ 16.105622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.106425] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.106744] [ 16.106840] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.107083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.107097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.107117] Call Trace: [ 16.107133] <TASK> [ 16.107149] dump_stack_lvl+0x73/0xb0 [ 16.107181] print_report+0xd1/0x650 [ 16.107204] ? __virt_addr_valid+0x1db/0x2d0 [ 16.107228] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.107251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.107275] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.107298] kasan_report+0x141/0x180 [ 16.107322] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.107349] kasan_check_range+0x10c/0x1c0 [ 16.107374] __kasan_check_write+0x18/0x20 [ 16.107395] kasan_atomics_helper+0x1ce1/0x5450 [ 16.107419] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.107443] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.107469] ? kasan_atomics+0x152/0x310 [ 16.107496] kasan_atomics+0x1dc/0x310 [ 16.107520] ? __pfx_kasan_atomics+0x10/0x10 [ 16.107544] ? trace_hardirqs_on+0x37/0xe0 [ 16.107569] ? __pfx_read_tsc+0x10/0x10 [ 16.107592] ? ktime_get_ts64+0x86/0x230 [ 16.107616] kunit_try_run_case+0x1a5/0x480 [ 16.107642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.107669] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.107695] ? __kthread_parkme+0x82/0x180 [ 16.107716] ? preempt_count_sub+0x50/0x80 [ 16.107741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.107767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.107792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.107979] kthread+0x337/0x6f0 [ 16.108001] ? trace_preempt_on+0x20/0xc0 [ 16.108024] ? __pfx_kthread+0x10/0x10 [ 16.108057] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.108081] ? calculate_sigpending+0x7b/0xa0 [ 16.108106] ? __pfx_kthread+0x10/0x10 [ 16.108128] ret_from_fork+0x116/0x1d0 [ 16.108148] ? __pfx_kthread+0x10/0x10 [ 16.108169] ret_from_fork_asm+0x1a/0x30 [ 16.108199] </TASK> [ 16.108211] [ 16.118978] Allocated by task 282: [ 16.119418] kasan_save_stack+0x45/0x70 [ 16.119599] kasan_save_track+0x18/0x40 [ 16.119964] kasan_save_alloc_info+0x3b/0x50 [ 16.120342] __kasan_kmalloc+0xb7/0xc0 [ 16.120517] __kmalloc_cache_noprof+0x189/0x420 [ 16.120723] kasan_atomics+0x95/0x310 [ 16.121291] kunit_try_run_case+0x1a5/0x480 [ 16.121476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.121736] kthread+0x337/0x6f0 [ 16.121911] ret_from_fork+0x116/0x1d0 [ 16.122396] ret_from_fork_asm+0x1a/0x30 [ 16.122592] [ 16.122882] The buggy address belongs to the object at ffff8881027b3900 [ 16.122882] which belongs to the cache kmalloc-64 of size 64 [ 16.123481] The buggy address is located 0 bytes to the right of [ 16.123481] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.124363] [ 16.124468] The buggy address belongs to the physical page: [ 16.124670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.125356] flags: 0x200000000000000(node=0|zone=2) [ 16.125675] page_type: f5(slab) [ 16.125847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.126413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.126731] page dumped because: kasan: bad access detected [ 16.127282] [ 16.127379] Memory state around the buggy address: [ 16.127554] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.128133] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.128359] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.128664] ^ [ 16.129586] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.130439] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.130658] ================================================================== [ 16.181703] ================================================================== [ 16.182450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.182693] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 16.183281] [ 16.183455] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.183498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.183511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.183531] Call Trace: [ 16.183548] <TASK> [ 16.183563] dump_stack_lvl+0x73/0xb0 [ 16.183592] print_report+0xd1/0x650 [ 16.183616] ? __virt_addr_valid+0x1db/0x2d0 [ 16.183640] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.183663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.183687] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.183710] kasan_report+0x141/0x180 [ 16.183733] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.183761] kasan_check_range+0x10c/0x1c0 [ 16.183786] __kasan_check_write+0x18/0x20 [ 16.183866] kasan_atomics_helper+0x1eaa/0x5450 [ 16.183891] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.183932] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.183967] ? kasan_atomics+0x152/0x310 [ 16.183998] kasan_atomics+0x1dc/0x310 [ 16.184022] ? __pfx_kasan_atomics+0x10/0x10 [ 16.184056] ? trace_hardirqs_on+0x37/0xe0 [ 16.184080] ? __pfx_read_tsc+0x10/0x10 [ 16.184103] ? ktime_get_ts64+0x86/0x230 [ 16.184128] kunit_try_run_case+0x1a5/0x480 [ 16.184153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.184180] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.184206] ? __kthread_parkme+0x82/0x180 [ 16.184228] ? preempt_count_sub+0x50/0x80 [ 16.184252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.184279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.184305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.184331] kthread+0x337/0x6f0 [ 16.184351] ? trace_preempt_on+0x20/0xc0 [ 16.184374] ? __pfx_kthread+0x10/0x10 [ 16.184396] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.184420] ? calculate_sigpending+0x7b/0xa0 [ 16.184445] ? __pfx_kthread+0x10/0x10 [ 16.184467] ret_from_fork+0x116/0x1d0 [ 16.184487] ? __pfx_kthread+0x10/0x10 [ 16.184508] ret_from_fork_asm+0x1a/0x30 [ 16.184539] </TASK> [ 16.184551] [ 16.194724] Allocated by task 282: [ 16.194916] kasan_save_stack+0x45/0x70 [ 16.195131] kasan_save_track+0x18/0x40 [ 16.195328] kasan_save_alloc_info+0x3b/0x50 [ 16.195534] __kasan_kmalloc+0xb7/0xc0 [ 16.195701] __kmalloc_cache_noprof+0x189/0x420 [ 16.195913] kasan_atomics+0x95/0x310 [ 16.196213] kunit_try_run_case+0x1a5/0x480 [ 16.196437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.196681] kthread+0x337/0x6f0 [ 16.196892] ret_from_fork+0x116/0x1d0 [ 16.197060] ret_from_fork_asm+0x1a/0x30 [ 16.197245] [ 16.197346] The buggy address belongs to the object at ffff8881027b3900 [ 16.197346] which belongs to the cache kmalloc-64 of size 64 [ 16.197800] The buggy address is located 0 bytes to the right of [ 16.197800] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 16.198195] [ 16.198316] The buggy address belongs to the physical page: [ 16.198572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 16.199091] flags: 0x200000000000000(node=0|zone=2) [ 16.199438] page_type: f5(slab) [ 16.199659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.199907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.200154] page dumped because: kasan: bad access detected [ 16.200377] [ 16.200469] Memory state around the buggy address: [ 16.200753] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.201262] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.201480] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.201692] ^ [ 16.201845] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.202331] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.202698] ================================================================== [ 15.979251] ================================================================== [ 15.979562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.980126] Write of size 8 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.980457] [ 15.980548] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.980592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.980605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.981311] Call Trace: [ 15.981396] <TASK> [ 15.981417] dump_stack_lvl+0x73/0xb0 [ 15.981466] print_report+0xd1/0x650 [ 15.981489] ? __virt_addr_valid+0x1db/0x2d0 [ 15.981513] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.981536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.981561] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.981584] kasan_report+0x141/0x180 [ 15.981606] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.981634] kasan_check_range+0x10c/0x1c0 [ 15.981659] __kasan_check_write+0x18/0x20 [ 15.981680] kasan_atomics_helper+0x19e3/0x5450 [ 15.981704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.981728] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.981755] ? kasan_atomics+0x152/0x310 [ 15.981782] kasan_atomics+0x1dc/0x310 [ 15.981806] ? __pfx_kasan_atomics+0x10/0x10 [ 15.981887] ? trace_hardirqs_on+0x37/0xe0 [ 15.981912] ? __pfx_read_tsc+0x10/0x10 [ 15.981949] ? ktime_get_ts64+0x86/0x230 [ 15.981973] kunit_try_run_case+0x1a5/0x480 [ 15.982000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982026] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.982064] ? __kthread_parkme+0x82/0x180 [ 15.982086] ? preempt_count_sub+0x50/0x80 [ 15.982111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.982162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.982188] kthread+0x337/0x6f0 [ 15.982208] ? trace_preempt_on+0x20/0xc0 [ 15.982231] ? __pfx_kthread+0x10/0x10 [ 15.982253] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.982276] ? calculate_sigpending+0x7b/0xa0 [ 15.982301] ? __pfx_kthread+0x10/0x10 [ 15.982323] ret_from_fork+0x116/0x1d0 [ 15.982343] ? __pfx_kthread+0x10/0x10 [ 15.982364] ret_from_fork_asm+0x1a/0x30 [ 15.982395] </TASK> [ 15.982406] [ 15.991479] Allocated by task 282: [ 15.991719] kasan_save_stack+0x45/0x70 [ 15.992062] kasan_save_track+0x18/0x40 [ 15.992296] kasan_save_alloc_info+0x3b/0x50 [ 15.992455] __kasan_kmalloc+0xb7/0xc0 [ 15.992597] __kmalloc_cache_noprof+0x189/0x420 [ 15.992768] kasan_atomics+0x95/0x310 [ 15.993203] kunit_try_run_case+0x1a5/0x480 [ 15.993441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.993703] kthread+0x337/0x6f0 [ 15.993910] ret_from_fork+0x116/0x1d0 [ 15.994514] ret_from_fork_asm+0x1a/0x30 [ 15.994678] [ 15.994753] The buggy address belongs to the object at ffff8881027b3900 [ 15.994753] which belongs to the cache kmalloc-64 of size 64 [ 15.995191] The buggy address is located 0 bytes to the right of [ 15.995191] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.996025] [ 15.996173] The buggy address belongs to the physical page: [ 15.996445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.996714] flags: 0x200000000000000(node=0|zone=2) [ 15.997176] page_type: f5(slab) [ 15.997369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.997678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.998111] page dumped because: kasan: bad access detected [ 15.998332] [ 15.998427] Memory state around the buggy address: [ 15.998686] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.999552] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.000084] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.000405] ^ [ 16.000621] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.001038] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.001375] ================================================================== [ 15.475904] ================================================================== [ 15.476291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.476663] Write of size 4 at addr ffff8881027b3930 by task kunit_try_catch/282 [ 15.477064] [ 15.477217] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.477262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.477274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.477295] Call Trace: [ 15.477309] <TASK> [ 15.477325] dump_stack_lvl+0x73/0xb0 [ 15.477355] print_report+0xd1/0x650 [ 15.477378] ? __virt_addr_valid+0x1db/0x2d0 [ 15.477401] ? kasan_atomics_helper+0xf10/0x5450 [ 15.477423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.477447] ? kasan_atomics_helper+0xf10/0x5450 [ 15.477471] kasan_report+0x141/0x180 [ 15.477493] ? kasan_atomics_helper+0xf10/0x5450 [ 15.477520] kasan_check_range+0x10c/0x1c0 [ 15.477545] __kasan_check_write+0x18/0x20 [ 15.477565] kasan_atomics_helper+0xf10/0x5450 [ 15.477589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.477613] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.477640] ? kasan_atomics+0x152/0x310 [ 15.477668] kasan_atomics+0x1dc/0x310 [ 15.477691] ? __pfx_kasan_atomics+0x10/0x10 [ 15.477715] ? trace_hardirqs_on+0x37/0xe0 [ 15.477740] ? __pfx_read_tsc+0x10/0x10 [ 15.477762] ? ktime_get_ts64+0x86/0x230 [ 15.477805] kunit_try_run_case+0x1a5/0x480 [ 15.477882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.477910] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.477938] ? __kthread_parkme+0x82/0x180 [ 15.477960] ? preempt_count_sub+0x50/0x80 [ 15.477985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.478011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.478050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.478079] kthread+0x337/0x6f0 [ 15.478099] ? trace_preempt_on+0x20/0xc0 [ 15.478122] ? __pfx_kthread+0x10/0x10 [ 15.478143] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.478166] ? calculate_sigpending+0x7b/0xa0 [ 15.478200] ? __pfx_kthread+0x10/0x10 [ 15.478223] ret_from_fork+0x116/0x1d0 [ 15.478243] ? __pfx_kthread+0x10/0x10 [ 15.478265] ret_from_fork_asm+0x1a/0x30 [ 15.478296] </TASK> [ 15.478307] [ 15.486283] Allocated by task 282: [ 15.486447] kasan_save_stack+0x45/0x70 [ 15.486636] kasan_save_track+0x18/0x40 [ 15.486898] kasan_save_alloc_info+0x3b/0x50 [ 15.487078] __kasan_kmalloc+0xb7/0xc0 [ 15.487210] __kmalloc_cache_noprof+0x189/0x420 [ 15.487362] kasan_atomics+0x95/0x310 [ 15.487547] kunit_try_run_case+0x1a5/0x480 [ 15.487780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.488444] kthread+0x337/0x6f0 [ 15.488619] ret_from_fork+0x116/0x1d0 [ 15.488764] ret_from_fork_asm+0x1a/0x30 [ 15.489156] [ 15.489280] The buggy address belongs to the object at ffff8881027b3900 [ 15.489280] which belongs to the cache kmalloc-64 of size 64 [ 15.489661] The buggy address is located 0 bytes to the right of [ 15.489661] allocated 48-byte region [ffff8881027b3900, ffff8881027b3930) [ 15.490169] [ 15.490265] The buggy address belongs to the physical page: [ 15.490706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b3 [ 15.491155] flags: 0x200000000000000(node=0|zone=2) [ 15.491407] page_type: f5(slab) [ 15.491538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.491763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.492073] page dumped because: kasan: bad access detected [ 15.492317] [ 15.492391] Memory state around the buggy address: [ 15.492607] ffff8881027b3800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.493233] ffff8881027b3880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.493497] >ffff8881027b3900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.493704] ^ [ 15.494069] ffff8881027b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.494436] ffff8881027b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.494755] ==================================================================