Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.024374] ================================================================== [ 20.024587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.024669] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.025001] [ 20.025055] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.025428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.025671] Hardware name: linux,dummy-virt (DT) [ 20.025723] Call trace: [ 20.025751] show_stack+0x20/0x38 (C) [ 20.025982] dump_stack_lvl+0x8c/0xd0 [ 20.026085] print_report+0x118/0x5d0 [ 20.026186] kasan_report+0xdc/0x128 [ 20.026240] kasan_check_range+0x100/0x1a8 [ 20.026290] __kasan_check_write+0x20/0x30 [ 20.026351] kasan_atomics_helper+0xf88/0x4858 [ 20.026404] kasan_atomics+0x198/0x2e0 [ 20.026665] kunit_try_run_case+0x170/0x3f0 [ 20.026933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.027134] kthread+0x328/0x630 [ 20.027198] ret_from_fork+0x10/0x20 [ 20.027250] [ 20.027704] Allocated by task 265: [ 20.028031] kasan_save_stack+0x3c/0x68 [ 20.028125] kasan_save_track+0x20/0x40 [ 20.028295] kasan_save_alloc_info+0x40/0x58 [ 20.028340] __kasan_kmalloc+0xd4/0xd8 [ 20.028382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.028430] kasan_atomics+0xb8/0x2e0 [ 20.028469] kunit_try_run_case+0x170/0x3f0 [ 20.028875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.029508] kthread+0x328/0x630 [ 20.029604] ret_from_fork+0x10/0x20 [ 20.030011] [ 20.030064] The buggy address belongs to the object at fff00000c799a780 [ 20.030064] which belongs to the cache kmalloc-64 of size 64 [ 20.030175] The buggy address is located 0 bytes to the right of [ 20.030175] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.030263] [ 20.030306] The buggy address belongs to the physical page: [ 20.030582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.030974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.031414] page_type: f5(slab) [ 20.031520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.031575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.031649] page dumped because: kasan: bad access detected [ 20.031968] [ 20.032265] Memory state around the buggy address: [ 20.032411] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.032460] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.032507] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.033176] ^ [ 20.033356] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.033701] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.034143] ================================================================== [ 20.194048] ================================================================== [ 20.194108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.194162] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.194214] [ 20.194250] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.194332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.194360] Hardware name: linux,dummy-virt (DT) [ 20.194394] Call trace: [ 20.194418] show_stack+0x20/0x38 (C) [ 20.194468] dump_stack_lvl+0x8c/0xd0 [ 20.194519] print_report+0x118/0x5d0 [ 20.195752] kasan_report+0xdc/0x128 [ 20.195826] __asan_report_load8_noabort+0x20/0x30 [ 20.195894] kasan_atomics_helper+0x3e10/0x4858 [ 20.195996] kasan_atomics+0x198/0x2e0 [ 20.196163] kunit_try_run_case+0x170/0x3f0 [ 20.196559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.196629] kthread+0x328/0x630 [ 20.196703] ret_from_fork+0x10/0x20 [ 20.196823] [ 20.196863] Allocated by task 265: [ 20.196896] kasan_save_stack+0x3c/0x68 [ 20.196941] kasan_save_track+0x20/0x40 [ 20.196981] kasan_save_alloc_info+0x40/0x58 [ 20.197023] __kasan_kmalloc+0xd4/0xd8 [ 20.197603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.197658] kasan_atomics+0xb8/0x2e0 [ 20.197697] kunit_try_run_case+0x170/0x3f0 [ 20.197899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.197983] kthread+0x328/0x630 [ 20.198018] ret_from_fork+0x10/0x20 [ 20.198186] [ 20.198568] The buggy address belongs to the object at fff00000c799a780 [ 20.198568] which belongs to the cache kmalloc-64 of size 64 [ 20.198658] The buggy address is located 0 bytes to the right of [ 20.198658] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.198726] [ 20.199336] The buggy address belongs to the physical page: [ 20.199405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.199464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.199539] page_type: f5(slab) [ 20.199583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.199874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.199922] page dumped because: kasan: bad access detected [ 20.200089] [ 20.200357] Memory state around the buggy address: [ 20.200400] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.200566] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.200617] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.200657] ^ [ 20.200885] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.200995] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.201319] ================================================================== [ 20.141206] ================================================================== [ 20.141344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.141392] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.141442] [ 20.141472] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.141560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.141587] Hardware name: linux,dummy-virt (DT) [ 20.141618] Call trace: [ 20.141641] show_stack+0x20/0x38 (C) [ 20.141690] dump_stack_lvl+0x8c/0xd0 [ 20.141808] print_report+0x118/0x5d0 [ 20.141868] kasan_report+0xdc/0x128 [ 20.141914] kasan_check_range+0x100/0x1a8 [ 20.141963] __kasan_check_write+0x20/0x30 [ 20.142009] kasan_atomics_helper+0x14e4/0x4858 [ 20.142057] kasan_atomics+0x198/0x2e0 [ 20.142103] kunit_try_run_case+0x170/0x3f0 [ 20.142151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.142203] kthread+0x328/0x630 [ 20.142258] ret_from_fork+0x10/0x20 [ 20.142518] [ 20.142546] Allocated by task 265: [ 20.142635] kasan_save_stack+0x3c/0x68 [ 20.142678] kasan_save_track+0x20/0x40 [ 20.142716] kasan_save_alloc_info+0x40/0x58 [ 20.142758] __kasan_kmalloc+0xd4/0xd8 [ 20.142795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.142835] kasan_atomics+0xb8/0x2e0 [ 20.142882] kunit_try_run_case+0x170/0x3f0 [ 20.142939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.142982] kthread+0x328/0x630 [ 20.143021] ret_from_fork+0x10/0x20 [ 20.143220] [ 20.143310] The buggy address belongs to the object at fff00000c799a780 [ 20.143310] which belongs to the cache kmalloc-64 of size 64 [ 20.143436] The buggy address is located 0 bytes to the right of [ 20.143436] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.143528] [ 20.143556] The buggy address belongs to the physical page: [ 20.143677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.143735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.144323] page_type: f5(slab) [ 20.144434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.144537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.144608] page dumped because: kasan: bad access detected [ 20.144641] [ 20.144661] Memory state around the buggy address: [ 20.144695] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.144740] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.144783] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.144822] ^ [ 20.144868] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.144909] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.144948] ================================================================== [ 20.184925] ================================================================== [ 20.185591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.185801] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.185964] [ 20.186357] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.186456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.186485] Hardware name: linux,dummy-virt (DT) [ 20.186589] Call trace: [ 20.186918] show_stack+0x20/0x38 (C) [ 20.187086] dump_stack_lvl+0x8c/0xd0 [ 20.187140] print_report+0x118/0x5d0 [ 20.187199] kasan_report+0xdc/0x128 [ 20.187246] kasan_check_range+0x100/0x1a8 [ 20.187659] __kasan_check_write+0x20/0x30 [ 20.187721] kasan_atomics_helper+0x16d0/0x4858 [ 20.188155] kasan_atomics+0x198/0x2e0 [ 20.188473] kunit_try_run_case+0x170/0x3f0 [ 20.188523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.188578] kthread+0x328/0x630 [ 20.188622] ret_from_fork+0x10/0x20 [ 20.188804] [ 20.188832] Allocated by task 265: [ 20.188878] kasan_save_stack+0x3c/0x68 [ 20.188926] kasan_save_track+0x20/0x40 [ 20.189508] kasan_save_alloc_info+0x40/0x58 [ 20.189690] __kasan_kmalloc+0xd4/0xd8 [ 20.189729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.189950] kasan_atomics+0xb8/0x2e0 [ 20.189987] kunit_try_run_case+0x170/0x3f0 [ 20.190028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.190073] kthread+0x328/0x630 [ 20.190110] ret_from_fork+0x10/0x20 [ 20.190641] [ 20.190669] The buggy address belongs to the object at fff00000c799a780 [ 20.190669] which belongs to the cache kmalloc-64 of size 64 [ 20.190731] The buggy address is located 0 bytes to the right of [ 20.190731] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.191394] [ 20.191423] The buggy address belongs to the physical page: [ 20.191460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.191652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.191928] page_type: f5(slab) [ 20.192243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.192299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.192345] page dumped because: kasan: bad access detected [ 20.192409] [ 20.192432] Memory state around the buggy address: [ 20.192467] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.192736] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.192976] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.193022] ^ [ 20.193060] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.193298] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.193341] ================================================================== [ 20.035213] ================================================================== [ 20.035706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.036056] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.036210] [ 20.036279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.036572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.036608] Hardware name: linux,dummy-virt (DT) [ 20.037027] Call trace: [ 20.037144] show_stack+0x20/0x38 (C) [ 20.037421] dump_stack_lvl+0x8c/0xd0 [ 20.037541] print_report+0x118/0x5d0 [ 20.037657] kasan_report+0xdc/0x128 [ 20.038099] kasan_check_range+0x100/0x1a8 [ 20.038391] __kasan_check_write+0x20/0x30 [ 20.038535] kasan_atomics_helper+0xff0/0x4858 [ 20.038591] kasan_atomics+0x198/0x2e0 [ 20.039199] kunit_try_run_case+0x170/0x3f0 [ 20.039411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.039632] kthread+0x328/0x630 [ 20.039728] ret_from_fork+0x10/0x20 [ 20.039863] [ 20.039886] Allocated by task 265: [ 20.039927] kasan_save_stack+0x3c/0x68 [ 20.040309] kasan_save_track+0x20/0x40 [ 20.040610] kasan_save_alloc_info+0x40/0x58 [ 20.041084] __kasan_kmalloc+0xd4/0xd8 [ 20.041269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.041445] kasan_atomics+0xb8/0x2e0 [ 20.041507] kunit_try_run_case+0x170/0x3f0 [ 20.041555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.041599] kthread+0x328/0x630 [ 20.041643] ret_from_fork+0x10/0x20 [ 20.041685] [ 20.041726] The buggy address belongs to the object at fff00000c799a780 [ 20.041726] which belongs to the cache kmalloc-64 of size 64 [ 20.041796] The buggy address is located 0 bytes to the right of [ 20.041796] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.041898] [ 20.041938] The buggy address belongs to the physical page: [ 20.041981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.042054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.042108] page_type: f5(slab) [ 20.042176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.042232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.042276] page dumped because: kasan: bad access detected [ 20.042311] [ 20.042342] Memory state around the buggy address: [ 20.042379] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.042423] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.042469] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.042510] ^ [ 20.042547] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.042590] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.042640] ================================================================== [ 20.165644] ================================================================== [ 20.165713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.165772] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.165823] [ 20.166605] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.166861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.167257] Hardware name: linux,dummy-virt (DT) [ 20.167444] Call trace: [ 20.167473] show_stack+0x20/0x38 (C) [ 20.167529] dump_stack_lvl+0x8c/0xd0 [ 20.167594] print_report+0x118/0x5d0 [ 20.167643] kasan_report+0xdc/0x128 [ 20.168072] kasan_check_range+0x100/0x1a8 [ 20.168129] __kasan_check_write+0x20/0x30 [ 20.168184] kasan_atomics_helper+0x1644/0x4858 [ 20.168235] kasan_atomics+0x198/0x2e0 [ 20.168451] kunit_try_run_case+0x170/0x3f0 [ 20.168512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.168577] kthread+0x328/0x630 [ 20.168871] ret_from_fork+0x10/0x20 [ 20.169509] [ 20.169535] Allocated by task 265: [ 20.169570] kasan_save_stack+0x3c/0x68 [ 20.169992] kasan_save_track+0x20/0x40 [ 20.170225] kasan_save_alloc_info+0x40/0x58 [ 20.170270] __kasan_kmalloc+0xd4/0xd8 [ 20.170725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.170893] kasan_atomics+0xb8/0x2e0 [ 20.170933] kunit_try_run_case+0x170/0x3f0 [ 20.171328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.171388] kthread+0x328/0x630 [ 20.171676] ret_from_fork+0x10/0x20 [ 20.171729] [ 20.172090] The buggy address belongs to the object at fff00000c799a780 [ 20.172090] which belongs to the cache kmalloc-64 of size 64 [ 20.172184] The buggy address is located 0 bytes to the right of [ 20.172184] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.172252] [ 20.172566] The buggy address belongs to the physical page: [ 20.172628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.173135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.173229] page_type: f5(slab) [ 20.173578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.173998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.174059] page dumped because: kasan: bad access detected [ 20.174095] [ 20.174117] Memory state around the buggy address: [ 20.174153] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.174198] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.174243] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.174283] ^ [ 20.174319] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.174363] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.174403] ================================================================== [ 20.133000] ================================================================== [ 20.133061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.133112] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.133252] [ 20.133425] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.133853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.133945] Hardware name: linux,dummy-virt (DT) [ 20.133977] Call trace: [ 20.134038] show_stack+0x20/0x38 (C) [ 20.134282] dump_stack_lvl+0x8c/0xd0 [ 20.134434] print_report+0x118/0x5d0 [ 20.134593] kasan_report+0xdc/0x128 [ 20.134694] kasan_check_range+0x100/0x1a8 [ 20.134772] __kasan_check_write+0x20/0x30 [ 20.134884] kasan_atomics_helper+0x1414/0x4858 [ 20.134934] kasan_atomics+0x198/0x2e0 [ 20.134981] kunit_try_run_case+0x170/0x3f0 [ 20.135032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.135086] kthread+0x328/0x630 [ 20.135128] ret_from_fork+0x10/0x20 [ 20.135178] [ 20.135199] Allocated by task 265: [ 20.135229] kasan_save_stack+0x3c/0x68 [ 20.135270] kasan_save_track+0x20/0x40 [ 20.135353] kasan_save_alloc_info+0x40/0x58 [ 20.135395] __kasan_kmalloc+0xd4/0xd8 [ 20.135434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.135474] kasan_atomics+0xb8/0x2e0 [ 20.135511] kunit_try_run_case+0x170/0x3f0 [ 20.135550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.135595] kthread+0x328/0x630 [ 20.135629] ret_from_fork+0x10/0x20 [ 20.135665] [ 20.135687] The buggy address belongs to the object at fff00000c799a780 [ 20.135687] which belongs to the cache kmalloc-64 of size 64 [ 20.135771] The buggy address is located 0 bytes to the right of [ 20.135771] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.135837] [ 20.135867] The buggy address belongs to the physical page: [ 20.135901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.135956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.136004] page_type: f5(slab) [ 20.136053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.136106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.136149] page dumped because: kasan: bad access detected [ 20.136183] [ 20.136203] Memory state around the buggy address: [ 20.136237] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.136293] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.136470] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.136512] ^ [ 20.136613] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.136668] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.136708] ================================================================== [ 20.007873] ================================================================== [ 20.007937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.008003] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.008054] [ 20.008092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.008686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.008838] Hardware name: linux,dummy-virt (DT) [ 20.009011] Call trace: [ 20.009070] show_stack+0x20/0x38 (C) [ 20.009134] dump_stack_lvl+0x8c/0xd0 [ 20.009195] print_report+0x118/0x5d0 [ 20.009278] kasan_report+0xdc/0x128 [ 20.009329] kasan_check_range+0x100/0x1a8 [ 20.009379] __kasan_check_write+0x20/0x30 [ 20.009608] kasan_atomics_helper+0xeb8/0x4858 [ 20.009950] kasan_atomics+0x198/0x2e0 [ 20.010117] kunit_try_run_case+0x170/0x3f0 [ 20.010244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.010307] kthread+0x328/0x630 [ 20.010381] ret_from_fork+0x10/0x20 [ 20.010435] [ 20.010456] Allocated by task 265: [ 20.010497] kasan_save_stack+0x3c/0x68 [ 20.010543] kasan_save_track+0x20/0x40 [ 20.010583] kasan_save_alloc_info+0x40/0x58 [ 20.010625] __kasan_kmalloc+0xd4/0xd8 [ 20.010662] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.010704] kasan_atomics+0xb8/0x2e0 [ 20.010742] kunit_try_run_case+0x170/0x3f0 [ 20.010780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.010825] kthread+0x328/0x630 [ 20.011108] ret_from_fork+0x10/0x20 [ 20.011153] [ 20.011459] The buggy address belongs to the object at fff00000c799a780 [ 20.011459] which belongs to the cache kmalloc-64 of size 64 [ 20.012127] The buggy address is located 0 bytes to the right of [ 20.012127] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.012237] [ 20.012294] The buggy address belongs to the physical page: [ 20.012360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.012655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.012976] page_type: f5(slab) [ 20.013303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.013763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.013973] page dumped because: kasan: bad access detected [ 20.014124] [ 20.014337] Memory state around the buggy address: [ 20.014733] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.014979] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.015031] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.015643] ^ [ 20.015701] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.016050] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.016268] ================================================================== [ 20.136967] ================================================================== [ 20.137020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.137070] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.137119] [ 20.137150] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.137232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.137259] Hardware name: linux,dummy-virt (DT) [ 20.137291] Call trace: [ 20.137315] show_stack+0x20/0x38 (C) [ 20.137436] dump_stack_lvl+0x8c/0xd0 [ 20.137552] print_report+0x118/0x5d0 [ 20.137646] kasan_report+0xdc/0x128 [ 20.138007] kasan_check_range+0x100/0x1a8 [ 20.138061] __kasan_check_write+0x20/0x30 [ 20.138106] kasan_atomics_helper+0x147c/0x4858 [ 20.138155] kasan_atomics+0x198/0x2e0 [ 20.138201] kunit_try_run_case+0x170/0x3f0 [ 20.138249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.138302] kthread+0x328/0x630 [ 20.138345] ret_from_fork+0x10/0x20 [ 20.138391] [ 20.138413] Allocated by task 265: [ 20.138441] kasan_save_stack+0x3c/0x68 [ 20.138483] kasan_save_track+0x20/0x40 [ 20.138521] kasan_save_alloc_info+0x40/0x58 [ 20.138563] __kasan_kmalloc+0xd4/0xd8 [ 20.138600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.138650] kasan_atomics+0xb8/0x2e0 [ 20.138832] kunit_try_run_case+0x170/0x3f0 [ 20.139543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.139609] kthread+0x328/0x630 [ 20.139778] ret_from_fork+0x10/0x20 [ 20.139852] [ 20.139874] The buggy address belongs to the object at fff00000c799a780 [ 20.139874] which belongs to the cache kmalloc-64 of size 64 [ 20.140033] The buggy address is located 0 bytes to the right of [ 20.140033] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.140098] [ 20.140129] The buggy address belongs to the physical page: [ 20.140275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.140328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.140376] page_type: f5(slab) [ 20.140414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.140466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.140509] page dumped because: kasan: bad access detected [ 20.140541] [ 20.140561] Memory state around the buggy address: [ 20.140594] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.140638] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.140682] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.140721] ^ [ 20.140756] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.140798] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.140838] ================================================================== [ 19.955397] ================================================================== [ 19.955569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.955863] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.956053] [ 19.956224] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.956312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.956342] Hardware name: linux,dummy-virt (DT) [ 19.956617] Call trace: [ 19.956659] show_stack+0x20/0x38 (C) [ 19.956714] dump_stack_lvl+0x8c/0xd0 [ 19.956942] print_report+0x118/0x5d0 [ 19.957038] kasan_report+0xdc/0x128 [ 19.957200] __asan_report_load4_noabort+0x20/0x30 [ 19.957289] kasan_atomics_helper+0x3e04/0x4858 [ 19.957412] kasan_atomics+0x198/0x2e0 [ 19.957460] kunit_try_run_case+0x170/0x3f0 [ 19.957700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.957954] kthread+0x328/0x630 [ 19.958208] ret_from_fork+0x10/0x20 [ 19.958326] [ 19.958435] Allocated by task 265: [ 19.958851] kasan_save_stack+0x3c/0x68 [ 19.958963] kasan_save_track+0x20/0x40 [ 19.959072] kasan_save_alloc_info+0x40/0x58 [ 19.959217] __kasan_kmalloc+0xd4/0xd8 [ 19.959255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.959329] kasan_atomics+0xb8/0x2e0 [ 19.959579] kunit_try_run_case+0x170/0x3f0 [ 19.959885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.960056] kthread+0x328/0x630 [ 19.960133] ret_from_fork+0x10/0x20 [ 19.960181] [ 19.960203] The buggy address belongs to the object at fff00000c799a780 [ 19.960203] which belongs to the cache kmalloc-64 of size 64 [ 19.960268] The buggy address is located 0 bytes to the right of [ 19.960268] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.960482] [ 19.960827] The buggy address belongs to the physical page: [ 19.960926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.961129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.961213] page_type: f5(slab) [ 19.961594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.961861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.962117] page dumped because: kasan: bad access detected [ 19.962183] [ 19.962313] Memory state around the buggy address: [ 19.962395] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.962481] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.962608] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.962854] ^ [ 19.963116] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.963256] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.963391] ================================================================== [ 19.964162] ================================================================== [ 19.964583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.965406] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.965750] [ 19.965811] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.965911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.965939] Hardware name: linux,dummy-virt (DT) [ 19.965973] Call trace: [ 19.965999] show_stack+0x20/0x38 (C) [ 19.966055] dump_stack_lvl+0x8c/0xd0 [ 19.966362] print_report+0x118/0x5d0 [ 19.966439] kasan_report+0xdc/0x128 [ 19.966838] kasan_check_range+0x100/0x1a8 [ 19.966902] __kasan_check_read+0x20/0x30 [ 19.967396] kasan_atomics_helper+0xdd4/0x4858 [ 19.967798] kasan_atomics+0x198/0x2e0 [ 19.968025] kunit_try_run_case+0x170/0x3f0 [ 19.968201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.968400] kthread+0x328/0x630 [ 19.968486] ret_from_fork+0x10/0x20 [ 19.968680] [ 19.968778] Allocated by task 265: [ 19.968969] kasan_save_stack+0x3c/0x68 [ 19.969116] kasan_save_track+0x20/0x40 [ 19.969189] kasan_save_alloc_info+0x40/0x58 [ 19.969376] __kasan_kmalloc+0xd4/0xd8 [ 19.969425] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.969598] kasan_atomics+0xb8/0x2e0 [ 19.969647] kunit_try_run_case+0x170/0x3f0 [ 19.969689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.969736] kthread+0x328/0x630 [ 19.969771] ret_from_fork+0x10/0x20 [ 19.969812] [ 19.969837] The buggy address belongs to the object at fff00000c799a780 [ 19.969837] which belongs to the cache kmalloc-64 of size 64 [ 19.970624] The buggy address is located 0 bytes to the right of [ 19.970624] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.970907] [ 19.971135] The buggy address belongs to the physical page: [ 19.971416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.971516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.971822] page_type: f5(slab) [ 19.972103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.972194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.972656] page dumped because: kasan: bad access detected [ 19.972829] [ 19.972901] Memory state around the buggy address: [ 19.973168] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.973446] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.973667] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.974029] ^ [ 19.974146] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974233] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974309] ================================================================== [ 20.202654] ================================================================== [ 20.202727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.202788] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.203454] [ 20.203512] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.203608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.203638] Hardware name: linux,dummy-virt (DT) [ 20.203696] Call trace: [ 20.203724] show_stack+0x20/0x38 (C) [ 20.203787] dump_stack_lvl+0x8c/0xd0 [ 20.203839] print_report+0x118/0x5d0 [ 20.204409] kasan_report+0xdc/0x128 [ 20.204481] kasan_check_range+0x100/0x1a8 [ 20.204533] __kasan_check_write+0x20/0x30 [ 20.205115] kasan_atomics_helper+0x175c/0x4858 [ 20.205430] kasan_atomics+0x198/0x2e0 [ 20.205493] kunit_try_run_case+0x170/0x3f0 [ 20.205551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.205606] kthread+0x328/0x630 [ 20.206207] ret_from_fork+0x10/0x20 [ 20.206373] [ 20.206397] Allocated by task 265: [ 20.206951] kasan_save_stack+0x3c/0x68 [ 20.207018] kasan_save_track+0x20/0x40 [ 20.207416] kasan_save_alloc_info+0x40/0x58 [ 20.207464] __kasan_kmalloc+0xd4/0xd8 [ 20.207503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.207696] kasan_atomics+0xb8/0x2e0 [ 20.207776] kunit_try_run_case+0x170/0x3f0 [ 20.208087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.208398] kthread+0x328/0x630 [ 20.208625] ret_from_fork+0x10/0x20 [ 20.208796] [ 20.208950] The buggy address belongs to the object at fff00000c799a780 [ 20.208950] which belongs to the cache kmalloc-64 of size 64 [ 20.209351] The buggy address is located 0 bytes to the right of [ 20.209351] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.209662] [ 20.209694] The buggy address belongs to the physical page: [ 20.209732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.210398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.210646] page_type: f5(slab) [ 20.210803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.210899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.211064] page dumped because: kasan: bad access detected [ 20.211356] [ 20.211386] Memory state around the buggy address: [ 20.211427] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.211474] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.211520] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.211732] ^ [ 20.211821] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.212007] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.212055] ================================================================== [ 19.880427] ================================================================== [ 19.880541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.880799] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.880871] [ 19.881065] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.881163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.881191] Hardware name: linux,dummy-virt (DT) [ 19.881235] Call trace: [ 19.881412] show_stack+0x20/0x38 (C) [ 19.881491] dump_stack_lvl+0x8c/0xd0 [ 19.881545] print_report+0x118/0x5d0 [ 19.882005] kasan_report+0xdc/0x128 [ 19.882165] __asan_report_load4_noabort+0x20/0x30 [ 19.883091] Allocated by task 265: [ 19.883227] kasan_save_stack+0x3c/0x68 [ 19.884247] kunit_try_run_case+0x170/0x3f0 [ 19.885545] The buggy address is located 0 bytes to the right of [ 19.885545] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.886422] page_type: f5(slab) [ 19.886868] page dumped because: kasan: bad access detected [ 19.887613] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.889945] ================================================================== [ 19.838325] ================================================================== [ 19.838387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.838442] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.839043] [ 19.839232] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.839632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.839898] Hardware name: linux,dummy-virt (DT) [ 19.840059] Call trace: [ 19.840192] show_stack+0x20/0x38 (C) [ 19.840313] dump_stack_lvl+0x8c/0xd0 [ 19.840407] print_report+0x118/0x5d0 [ 19.840483] kasan_report+0xdc/0x128 [ 19.840675] kasan_check_range+0x100/0x1a8 [ 19.841328] kasan_atomics+0x198/0x2e0 [ 19.841551] kunit_try_run_case+0x170/0x3f0 [ 19.841651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.841918] kthread+0x328/0x630 [ 19.842253] [ 19.842961] kasan_save_alloc_info+0x40/0x58 [ 19.843483] kunit_try_run_case+0x170/0x3f0 [ 19.844008] ret_from_fork+0x10/0x20 [ 19.844248] The buggy address is located 0 bytes to the right of [ 19.844248] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.845761] [ 19.846585] ^ [ 19.847151] ================================================================== [ 20.213365] ================================================================== [ 20.213483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.213627] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.214015] [ 20.214192] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.214280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.214778] Hardware name: linux,dummy-virt (DT) [ 20.214917] Call trace: [ 20.214945] show_stack+0x20/0x38 (C) [ 20.215016] dump_stack_lvl+0x8c/0xd0 [ 20.215207] print_report+0x118/0x5d0 [ 20.215257] kasan_report+0xdc/0x128 [ 20.215837] __asan_report_load8_noabort+0x20/0x30 [ 20.216018] kasan_atomics_helper+0x3e20/0x4858 [ 20.216069] kasan_atomics+0x198/0x2e0 [ 20.216118] kunit_try_run_case+0x170/0x3f0 [ 20.216168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.216224] kthread+0x328/0x630 [ 20.216386] ret_from_fork+0x10/0x20 [ 20.216466] [ 20.216558] Allocated by task 265: [ 20.216644] kasan_save_stack+0x3c/0x68 [ 20.216718] kasan_save_track+0x20/0x40 [ 20.216757] kasan_save_alloc_info+0x40/0x58 [ 20.217303] __kasan_kmalloc+0xd4/0xd8 [ 20.217657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.218027] kasan_atomics+0xb8/0x2e0 [ 20.218141] kunit_try_run_case+0x170/0x3f0 [ 20.218331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.218601] kthread+0x328/0x630 [ 20.218928] ret_from_fork+0x10/0x20 [ 20.219392] [ 20.219469] The buggy address belongs to the object at fff00000c799a780 [ 20.219469] which belongs to the cache kmalloc-64 of size 64 [ 20.219822] The buggy address is located 0 bytes to the right of [ 20.219822] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.220174] [ 20.220290] The buggy address belongs to the physical page: [ 20.220327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.220506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.220781] page_type: f5(slab) [ 20.220839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.221015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.221347] page dumped because: kasan: bad access detected [ 20.221458] [ 20.221619] Memory state around the buggy address: [ 20.221873] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.221950] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.222346] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.222570] ^ [ 20.222858] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.222923] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.223085] ================================================================== [ 19.752307] ================================================================== [ 19.754717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 19.754923] [ 19.755347] Hardware name: linux,dummy-virt (DT) [ 19.756444] kasan_atomics_helper+0x5b4/0x4858 [ 19.756597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.759406] [ 19.759505] The buggy address belongs to the physical page: [ 19.760290] page_type: f5(slab) [ 19.761249] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.761418] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.761944] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.764077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 19.764645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.766216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.767869] __kasan_kmalloc+0xd4/0xd8 [ 19.769308] [ 19.769453] The buggy address belongs to the physical page: [ 19.769821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.770099] page_type: f5(slab) [ 19.770494] page dumped because: kasan: bad access detected [ 19.771103] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.773399] ================================================================== [ 19.937659] ================================================================== [ 19.937872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.937943] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.938303] [ 19.938552] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.938995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.939077] Hardware name: linux,dummy-virt (DT) [ 19.939188] Call trace: [ 19.939217] show_stack+0x20/0x38 (C) [ 19.939281] dump_stack_lvl+0x8c/0xd0 [ 19.939585] print_report+0x118/0x5d0 [ 19.939783] kasan_report+0xdc/0x128 [ 19.939906] __asan_report_load4_noabort+0x20/0x30 [ 19.940290] kasan_atomics_helper+0x3dd8/0x4858 [ 19.940437] kasan_atomics+0x198/0x2e0 [ 19.940560] kunit_try_run_case+0x170/0x3f0 [ 19.940634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.941138] kthread+0x328/0x630 [ 19.941565] ret_from_fork+0x10/0x20 [ 19.941718] [ 19.941871] Allocated by task 265: [ 19.942104] kasan_save_stack+0x3c/0x68 [ 19.942386] kasan_save_track+0x20/0x40 [ 19.942719] kasan_save_alloc_info+0x40/0x58 [ 19.942865] __kasan_kmalloc+0xd4/0xd8 [ 19.943256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.943543] kasan_atomics+0xb8/0x2e0 [ 19.943593] kunit_try_run_case+0x170/0x3f0 [ 19.943876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.944038] kthread+0x328/0x630 [ 19.944196] ret_from_fork+0x10/0x20 [ 19.944241] [ 19.944322] The buggy address belongs to the object at fff00000c799a780 [ 19.944322] which belongs to the cache kmalloc-64 of size 64 [ 19.944697] The buggy address is located 0 bytes to the right of [ 19.944697] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.944934] [ 19.944971] The buggy address belongs to the physical page: [ 19.945212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.945279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.945576] page_type: f5(slab) [ 19.945982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.946257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.946448] page dumped because: kasan: bad access detected [ 19.946676] [ 19.946764] Memory state around the buggy address: [ 19.946891] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.946939] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.947317] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.947380] ^ [ 19.947431] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.947539] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.947581] ================================================================== [ 20.155112] ================================================================== [ 20.155188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.155251] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.155625] [ 20.155860] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.156307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.156454] Hardware name: linux,dummy-virt (DT) [ 20.156490] Call trace: [ 20.156834] show_stack+0x20/0x38 (C) [ 20.157253] dump_stack_lvl+0x8c/0xd0 [ 20.157669] print_report+0x118/0x5d0 [ 20.157787] kasan_report+0xdc/0x128 [ 20.157835] __asan_report_load8_noabort+0x20/0x30 [ 20.158018] kasan_atomics_helper+0x3db0/0x4858 [ 20.158070] kasan_atomics+0x198/0x2e0 [ 20.158125] kunit_try_run_case+0x170/0x3f0 [ 20.158176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.158231] kthread+0x328/0x630 [ 20.158275] ret_from_fork+0x10/0x20 [ 20.158328] [ 20.159088] Allocated by task 265: [ 20.159634] kasan_save_stack+0x3c/0x68 [ 20.159859] kasan_save_track+0x20/0x40 [ 20.159902] kasan_save_alloc_info+0x40/0x58 [ 20.159943] __kasan_kmalloc+0xd4/0xd8 [ 20.160252] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.160550] kasan_atomics+0xb8/0x2e0 [ 20.161201] kunit_try_run_case+0x170/0x3f0 [ 20.161695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.161948] kthread+0x328/0x630 [ 20.161985] ret_from_fork+0x10/0x20 [ 20.162234] [ 20.162287] The buggy address belongs to the object at fff00000c799a780 [ 20.162287] which belongs to the cache kmalloc-64 of size 64 [ 20.162353] The buggy address is located 0 bytes to the right of [ 20.162353] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.162420] [ 20.162444] The buggy address belongs to the physical page: [ 20.162480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.163014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.163086] page_type: f5(slab) [ 20.163132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.163354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.163402] page dumped because: kasan: bad access detected [ 20.163578] [ 20.163615] Memory state around the buggy address: [ 20.163653] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.163700] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.164081] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.164131] ^ [ 20.164407] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.164487] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.164657] ================================================================== [ 20.223986] ================================================================== [ 20.224049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.224106] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.224158] [ 20.224198] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.224280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.224310] Hardware name: linux,dummy-virt (DT) [ 20.224344] Call trace: [ 20.225042] show_stack+0x20/0x38 (C) [ 20.225127] dump_stack_lvl+0x8c/0xd0 [ 20.225193] print_report+0x118/0x5d0 [ 20.225622] kasan_report+0xdc/0x128 [ 20.225807] kasan_check_range+0x100/0x1a8 [ 20.226114] __kasan_check_write+0x20/0x30 [ 20.226278] kasan_atomics_helper+0x17ec/0x4858 [ 20.226332] kasan_atomics+0x198/0x2e0 [ 20.226379] kunit_try_run_case+0x170/0x3f0 [ 20.226900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.226984] kthread+0x328/0x630 [ 20.227031] ret_from_fork+0x10/0x20 [ 20.227082] [ 20.227104] Allocated by task 265: [ 20.227136] kasan_save_stack+0x3c/0x68 [ 20.227894] kasan_save_track+0x20/0x40 [ 20.228134] kasan_save_alloc_info+0x40/0x58 [ 20.228192] __kasan_kmalloc+0xd4/0xd8 [ 20.228269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.228322] kasan_atomics+0xb8/0x2e0 [ 20.228541] kunit_try_run_case+0x170/0x3f0 [ 20.228887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.229095] kthread+0x328/0x630 [ 20.229132] ret_from_fork+0x10/0x20 [ 20.229170] [ 20.229195] The buggy address belongs to the object at fff00000c799a780 [ 20.229195] which belongs to the cache kmalloc-64 of size 64 [ 20.229954] The buggy address is located 0 bytes to the right of [ 20.229954] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.230309] [ 20.230494] The buggy address belongs to the physical page: [ 20.230536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.231059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.231301] page_type: f5(slab) [ 20.231520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.232068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.232334] page dumped because: kasan: bad access detected [ 20.232384] [ 20.232406] Memory state around the buggy address: [ 20.232865] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.232917] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.233199] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.233244] ^ [ 20.233281] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.233788] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.234333] ================================================================== [ 20.055687] ================================================================== [ 20.055984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.056056] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.056108] [ 20.056151] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.056893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.057030] Hardware name: linux,dummy-virt (DT) [ 20.057079] Call trace: [ 20.057237] show_stack+0x20/0x38 (C) [ 20.057412] dump_stack_lvl+0x8c/0xd0 [ 20.057585] print_report+0x118/0x5d0 [ 20.057839] kasan_report+0xdc/0x128 [ 20.058157] kasan_check_range+0x100/0x1a8 [ 20.058411] __kasan_check_write+0x20/0x30 [ 20.058518] kasan_atomics_helper+0x10c0/0x4858 [ 20.058666] kasan_atomics+0x198/0x2e0 [ 20.058717] kunit_try_run_case+0x170/0x3f0 [ 20.059114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.059680] kthread+0x328/0x630 [ 20.059878] ret_from_fork+0x10/0x20 [ 20.060005] [ 20.060028] Allocated by task 265: [ 20.060061] kasan_save_stack+0x3c/0x68 [ 20.060107] kasan_save_track+0x20/0x40 [ 20.060153] kasan_save_alloc_info+0x40/0x58 [ 20.060433] __kasan_kmalloc+0xd4/0xd8 [ 20.060870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.061139] kasan_atomics+0xb8/0x2e0 [ 20.061235] kunit_try_run_case+0x170/0x3f0 [ 20.061411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.061567] kthread+0x328/0x630 [ 20.061607] ret_from_fork+0x10/0x20 [ 20.061684] [ 20.061940] The buggy address belongs to the object at fff00000c799a780 [ 20.061940] which belongs to the cache kmalloc-64 of size 64 [ 20.062140] The buggy address is located 0 bytes to the right of [ 20.062140] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.062377] [ 20.062709] The buggy address belongs to the physical page: [ 20.062771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.063075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.063223] page_type: f5(slab) [ 20.063291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.063346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.063391] page dumped because: kasan: bad access detected [ 20.063425] [ 20.063455] Memory state around the buggy address: [ 20.063499] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.063545] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.063591] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.063633] ^ [ 20.063671] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.063714] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.063763] ================================================================== [ 19.995171] ================================================================== [ 19.995239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.995302] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.995354] [ 19.995389] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.995754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.996492] Hardware name: linux,dummy-virt (DT) [ 19.996714] Call trace: [ 19.996782] show_stack+0x20/0x38 (C) [ 19.996921] dump_stack_lvl+0x8c/0xd0 [ 19.996977] print_report+0x118/0x5d0 [ 19.997265] kasan_report+0xdc/0x128 [ 19.997437] __asan_report_store8_noabort+0x20/0x30 [ 19.997959] kasan_atomics_helper+0x3e5c/0x4858 [ 19.998075] kasan_atomics+0x198/0x2e0 [ 19.998210] kunit_try_run_case+0x170/0x3f0 [ 19.998322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.998543] kthread+0x328/0x630 [ 19.998807] ret_from_fork+0x10/0x20 [ 19.999200] [ 19.999238] Allocated by task 265: [ 19.999400] kasan_save_stack+0x3c/0x68 [ 19.999922] kasan_save_track+0x20/0x40 [ 19.999993] kasan_save_alloc_info+0x40/0x58 [ 20.000598] __kasan_kmalloc+0xd4/0xd8 [ 20.000664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.000984] kasan_atomics+0xb8/0x2e0 [ 20.001054] kunit_try_run_case+0x170/0x3f0 [ 20.001116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.001192] kthread+0x328/0x630 [ 20.001451] ret_from_fork+0x10/0x20 [ 20.001600] [ 20.001684] The buggy address belongs to the object at fff00000c799a780 [ 20.001684] which belongs to the cache kmalloc-64 of size 64 [ 20.001933] The buggy address is located 0 bytes to the right of [ 20.001933] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.002237] [ 20.002384] The buggy address belongs to the physical page: [ 20.002632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.003042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.003467] page_type: f5(slab) [ 20.003522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.003879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.004305] page dumped because: kasan: bad access detected [ 20.004362] [ 20.004383] Memory state around the buggy address: [ 20.004560] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.005143] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.005490] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.005765] ^ [ 20.006084] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.006326] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.006392] ================================================================== [ 20.087164] ================================================================== [ 20.087226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.087280] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.087667] [ 20.088046] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.088195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.088226] Hardware name: linux,dummy-virt (DT) [ 20.088393] Call trace: [ 20.088611] show_stack+0x20/0x38 (C) [ 20.088934] dump_stack_lvl+0x8c/0xd0 [ 20.089123] print_report+0x118/0x5d0 [ 20.089240] kasan_report+0xdc/0x128 [ 20.089361] kasan_check_range+0x100/0x1a8 [ 20.089624] __kasan_check_write+0x20/0x30 [ 20.090271] kasan_atomics_helper+0x11f8/0x4858 [ 20.090434] kasan_atomics+0x198/0x2e0 [ 20.090580] kunit_try_run_case+0x170/0x3f0 [ 20.090663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.091204] kthread+0x328/0x630 [ 20.091504] ret_from_fork+0x10/0x20 [ 20.091648] [ 20.091727] Allocated by task 265: [ 20.091803] kasan_save_stack+0x3c/0x68 [ 20.091978] kasan_save_track+0x20/0x40 [ 20.092034] kasan_save_alloc_info+0x40/0x58 [ 20.092257] __kasan_kmalloc+0xd4/0xd8 [ 20.092413] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.092538] kasan_atomics+0xb8/0x2e0 [ 20.092780] kunit_try_run_case+0x170/0x3f0 [ 20.092999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.093115] kthread+0x328/0x630 [ 20.093221] ret_from_fork+0x10/0x20 [ 20.093290] [ 20.093472] The buggy address belongs to the object at fff00000c799a780 [ 20.093472] which belongs to the cache kmalloc-64 of size 64 [ 20.093607] The buggy address is located 0 bytes to the right of [ 20.093607] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.093812] [ 20.094031] The buggy address belongs to the physical page: [ 20.094189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.094389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.094648] page_type: f5(slab) [ 20.094979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.095275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.095363] page dumped because: kasan: bad access detected [ 20.095674] [ 20.095762] Memory state around the buggy address: [ 20.095994] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.096079] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.096334] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.096443] ^ [ 20.096919] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.097001] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.097200] ================================================================== [ 20.148813] ================================================================== [ 20.148923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.148976] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.149026] [ 20.149060] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.149142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.149169] Hardware name: linux,dummy-virt (DT) [ 20.149201] Call trace: [ 20.149224] show_stack+0x20/0x38 (C) [ 20.149273] dump_stack_lvl+0x8c/0xd0 [ 20.149332] print_report+0x118/0x5d0 [ 20.149381] kasan_report+0xdc/0x128 [ 20.149426] kasan_check_range+0x100/0x1a8 [ 20.149482] __kasan_check_write+0x20/0x30 [ 20.149529] kasan_atomics_helper+0x15b4/0x4858 [ 20.149577] kasan_atomics+0x198/0x2e0 [ 20.149707] kunit_try_run_case+0x170/0x3f0 [ 20.149758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.149811] kthread+0x328/0x630 [ 20.149864] ret_from_fork+0x10/0x20 [ 20.149913] [ 20.149934] Allocated by task 265: [ 20.149971] kasan_save_stack+0x3c/0x68 [ 20.150014] kasan_save_track+0x20/0x40 [ 20.150052] kasan_save_alloc_info+0x40/0x58 [ 20.150094] __kasan_kmalloc+0xd4/0xd8 [ 20.150131] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.150172] kasan_atomics+0xb8/0x2e0 [ 20.150239] kunit_try_run_case+0x170/0x3f0 [ 20.150444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.150670] kthread+0x328/0x630 [ 20.150920] ret_from_fork+0x10/0x20 [ 20.151136] [ 20.151240] The buggy address belongs to the object at fff00000c799a780 [ 20.151240] which belongs to the cache kmalloc-64 of size 64 [ 20.151570] The buggy address is located 0 bytes to the right of [ 20.151570] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.151641] [ 20.151708] The buggy address belongs to the physical page: [ 20.151802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.151913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.152067] page_type: f5(slab) [ 20.152108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.152676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.152735] page dumped because: kasan: bad access detected [ 20.152771] [ 20.152791] Memory state around the buggy address: [ 20.152828] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.153169] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.153216] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.153329] ^ [ 20.153368] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.153595] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.153636] ================================================================== [ 20.107624] ================================================================== [ 20.108022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.108111] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.108164] [ 20.108307] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.108404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.108516] Hardware name: linux,dummy-virt (DT) [ 20.108553] Call trace: [ 20.108589] show_stack+0x20/0x38 (C) [ 20.108643] dump_stack_lvl+0x8c/0xd0 [ 20.109162] print_report+0x118/0x5d0 [ 20.109293] kasan_report+0xdc/0x128 [ 20.109582] kasan_check_range+0x100/0x1a8 [ 20.109710] __kasan_check_write+0x20/0x30 [ 20.109773] kasan_atomics_helper+0x12d8/0x4858 [ 20.110156] kasan_atomics+0x198/0x2e0 [ 20.110339] kunit_try_run_case+0x170/0x3f0 [ 20.110570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.110919] kthread+0x328/0x630 [ 20.110989] ret_from_fork+0x10/0x20 [ 20.111043] [ 20.111226] Allocated by task 265: [ 20.111277] kasan_save_stack+0x3c/0x68 [ 20.111746] kasan_save_track+0x20/0x40 [ 20.111972] kasan_save_alloc_info+0x40/0x58 [ 20.112174] __kasan_kmalloc+0xd4/0xd8 [ 20.112393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.112496] kasan_atomics+0xb8/0x2e0 [ 20.112596] kunit_try_run_case+0x170/0x3f0 [ 20.112637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.112685] kthread+0x328/0x630 [ 20.112727] ret_from_fork+0x10/0x20 [ 20.112937] [ 20.113082] The buggy address belongs to the object at fff00000c799a780 [ 20.113082] which belongs to the cache kmalloc-64 of size 64 [ 20.113335] The buggy address is located 0 bytes to the right of [ 20.113335] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.113596] [ 20.113626] The buggy address belongs to the physical page: [ 20.113939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.114473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.114726] page_type: f5(slab) [ 20.114998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.115283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.115542] page dumped because: kasan: bad access detected [ 20.115714] [ 20.115787] Memory state around the buggy address: [ 20.115916] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.116163] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.116421] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.116668] ^ [ 20.116806] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.117065] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.117113] ================================================================== [ 19.869982] ================================================================== [ 19.870357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.870748] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.870823] [ 19.871115] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.871346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.871383] Hardware name: linux,dummy-virt (DT) [ 19.871417] Call trace: [ 19.871748] show_stack+0x20/0x38 (C) [ 19.871885] dump_stack_lvl+0x8c/0xd0 [ 19.871972] print_report+0x118/0x5d0 [ 19.872196] kasan_report+0xdc/0x128 [ 19.872397] kasan_check_range+0x100/0x1a8 [ 19.872458] __kasan_check_write+0x20/0x30 [ 19.872710] kasan_atomics_helper+0xad4/0x4858 [ 19.873162] kasan_atomics+0x198/0x2e0 [ 19.873358] kunit_try_run_case+0x170/0x3f0 [ 19.873419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.873683] kthread+0x328/0x630 [ 19.873797] ret_from_fork+0x10/0x20 [ 19.873993] [ 19.874145] Allocated by task 265: [ 19.874230] kasan_save_stack+0x3c/0x68 [ 19.874284] kasan_save_track+0x20/0x40 [ 19.874480] kasan_save_alloc_info+0x40/0x58 [ 19.874531] __kasan_kmalloc+0xd4/0xd8 [ 19.874581] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.874634] kasan_atomics+0xb8/0x2e0 [ 19.874673] kunit_try_run_case+0x170/0x3f0 [ 19.874724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.874770] kthread+0x328/0x630 [ 19.874814] ret_from_fork+0x10/0x20 [ 19.874874] [ 19.874906] The buggy address belongs to the object at fff00000c799a780 [ 19.874906] which belongs to the cache kmalloc-64 of size 64 [ 19.874979] The buggy address is located 0 bytes to the right of [ 19.874979] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.875045] [ 19.875079] The buggy address belongs to the physical page: [ 19.875124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.875195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.875248] page_type: f5(slab) [ 19.875300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.875382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.875863] page dumped because: kasan: bad access detected [ 19.876157] [ 19.876231] Memory state around the buggy address: [ 19.876305] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.876552] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.876956] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.877287] ^ [ 19.877575] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.877720] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.878145] ================================================================== [ 19.859496] ================================================================== [ 19.859824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.860047] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.860345] [ 19.860410] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.860603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.860673] Hardware name: linux,dummy-virt (DT) [ 19.860943] Call trace: [ 19.860991] show_stack+0x20/0x38 (C) [ 19.861312] dump_stack_lvl+0x8c/0xd0 [ 19.861425] print_report+0x118/0x5d0 [ 19.861520] kasan_report+0xdc/0x128 [ 19.861679] kasan_check_range+0x100/0x1a8 [ 19.861765] __kasan_check_write+0x20/0x30 [ 19.862146] kasan_atomics_helper+0xa6c/0x4858 [ 19.862332] kasan_atomics+0x198/0x2e0 [ 19.862441] kunit_try_run_case+0x170/0x3f0 [ 19.862699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.862955] kthread+0x328/0x630 [ 19.863205] ret_from_fork+0x10/0x20 [ 19.863494] [ 19.863573] Allocated by task 265: [ 19.863704] kasan_save_stack+0x3c/0x68 [ 19.863802] kasan_save_track+0x20/0x40 [ 19.863901] kasan_save_alloc_info+0x40/0x58 [ 19.864152] __kasan_kmalloc+0xd4/0xd8 [ 19.864202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.864332] kasan_atomics+0xb8/0x2e0 [ 19.864629] kunit_try_run_case+0x170/0x3f0 [ 19.864686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.864880] kthread+0x328/0x630 [ 19.864952] ret_from_fork+0x10/0x20 [ 19.865077] [ 19.865103] The buggy address belongs to the object at fff00000c799a780 [ 19.865103] which belongs to the cache kmalloc-64 of size 64 [ 19.865332] The buggy address is located 0 bytes to the right of [ 19.865332] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.865552] [ 19.865655] The buggy address belongs to the physical page: [ 19.865736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.865944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.866001] page_type: f5(slab) [ 19.866205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.866946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.867029] page dumped because: kasan: bad access detected [ 19.867311] [ 19.867381] Memory state around the buggy address: [ 19.867422] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.867483] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.867536] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.867603] ^ [ 19.867665] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.867729] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.868213] ================================================================== [ 19.977001] ================================================================== [ 19.977069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.977134] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.977187] [ 19.977228] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.977515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.977568] Hardware name: linux,dummy-virt (DT) [ 19.977604] Call trace: [ 19.977629] show_stack+0x20/0x38 (C) [ 19.977688] dump_stack_lvl+0x8c/0xd0 [ 19.977739] print_report+0x118/0x5d0 [ 19.977789] kasan_report+0xdc/0x128 [ 19.977836] __asan_report_load8_noabort+0x20/0x30 [ 19.979201] kasan_atomics_helper+0x3f58/0x4858 [ 19.979317] kasan_atomics+0x198/0x2e0 [ 19.979398] kunit_try_run_case+0x170/0x3f0 [ 19.979542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.979604] kthread+0x328/0x630 [ 19.979650] ret_from_fork+0x10/0x20 [ 19.979703] [ 19.979724] Allocated by task 265: [ 19.979757] kasan_save_stack+0x3c/0x68 [ 19.980240] kasan_save_track+0x20/0x40 [ 19.980895] kasan_save_alloc_info+0x40/0x58 [ 19.981290] __kasan_kmalloc+0xd4/0xd8 [ 19.981359] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.981572] kasan_atomics+0xb8/0x2e0 [ 19.981641] kunit_try_run_case+0x170/0x3f0 [ 19.981996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.982717] kthread+0x328/0x630 [ 19.982801] ret_from_fork+0x10/0x20 [ 19.983275] [ 19.983370] The buggy address belongs to the object at fff00000c799a780 [ 19.983370] which belongs to the cache kmalloc-64 of size 64 [ 19.983523] The buggy address is located 0 bytes to the right of [ 19.983523] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.983833] [ 19.983923] The buggy address belongs to the physical page: [ 19.984044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.984194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.984310] page_type: f5(slab) [ 19.984383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.984737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.984868] page dumped because: kasan: bad access detected [ 19.984986] [ 19.985056] Memory state around the buggy address: [ 19.985333] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.985584] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.985711] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.985866] ^ [ 19.986135] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.986225] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.986481] ================================================================== [ 20.125994] ================================================================== [ 20.126251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.126319] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.126370] [ 20.126627] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.127034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.127183] Hardware name: linux,dummy-virt (DT) [ 20.127228] Call trace: [ 20.127253] show_stack+0x20/0x38 (C) [ 20.127747] dump_stack_lvl+0x8c/0xd0 [ 20.127912] print_report+0x118/0x5d0 [ 20.128076] kasan_report+0xdc/0x128 [ 20.128151] __asan_report_load8_noabort+0x20/0x30 [ 20.128827] kasan_atomics_helper+0x3f04/0x4858 [ 20.128948] kasan_atomics+0x198/0x2e0 [ 20.129124] kunit_try_run_case+0x170/0x3f0 [ 20.129241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.129445] kthread+0x328/0x630 [ 20.129504] ret_from_fork+0x10/0x20 [ 20.129873] [ 20.130262] Allocated by task 265: [ 20.130368] kasan_save_stack+0x3c/0x68 [ 20.130475] kasan_save_track+0x20/0x40 [ 20.130607] kasan_save_alloc_info+0x40/0x58 [ 20.130702] __kasan_kmalloc+0xd4/0xd8 [ 20.130743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.130859] kasan_atomics+0xb8/0x2e0 [ 20.130923] kunit_try_run_case+0x170/0x3f0 [ 20.130965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.131011] kthread+0x328/0x630 [ 20.131045] ret_from_fork+0x10/0x20 [ 20.131082] [ 20.131105] The buggy address belongs to the object at fff00000c799a780 [ 20.131105] which belongs to the cache kmalloc-64 of size 64 [ 20.131166] The buggy address is located 0 bytes to the right of [ 20.131166] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.131232] [ 20.131253] The buggy address belongs to the physical page: [ 20.131288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.131354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.131405] page_type: f5(slab) [ 20.131447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.131500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.131544] page dumped because: kasan: bad access detected [ 20.131577] [ 20.131598] Memory state around the buggy address: [ 20.131632] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.131677] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.131721] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.131762] ^ [ 20.131797] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.131849] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.131988] ================================================================== [ 20.145145] ================================================================== [ 20.145194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.145241] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.145291] [ 20.145375] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.145467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.145822] Hardware name: linux,dummy-virt (DT) [ 20.145966] Call trace: [ 20.145989] show_stack+0x20/0x38 (C) [ 20.146113] dump_stack_lvl+0x8c/0xd0 [ 20.146162] print_report+0x118/0x5d0 [ 20.146210] kasan_report+0xdc/0x128 [ 20.146255] kasan_check_range+0x100/0x1a8 [ 20.146304] __kasan_check_write+0x20/0x30 [ 20.146360] kasan_atomics_helper+0x154c/0x4858 [ 20.146415] kasan_atomics+0x198/0x2e0 [ 20.146461] kunit_try_run_case+0x170/0x3f0 [ 20.146509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.146561] kthread+0x328/0x630 [ 20.146603] ret_from_fork+0x10/0x20 [ 20.146650] [ 20.146671] Allocated by task 265: [ 20.146699] kasan_save_stack+0x3c/0x68 [ 20.146742] kasan_save_track+0x20/0x40 [ 20.146781] kasan_save_alloc_info+0x40/0x58 [ 20.146823] __kasan_kmalloc+0xd4/0xd8 [ 20.146869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.146911] kasan_atomics+0xb8/0x2e0 [ 20.146988] kunit_try_run_case+0x170/0x3f0 [ 20.147110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.147173] kthread+0x328/0x630 [ 20.147312] ret_from_fork+0x10/0x20 [ 20.147350] [ 20.147371] The buggy address belongs to the object at fff00000c799a780 [ 20.147371] which belongs to the cache kmalloc-64 of size 64 [ 20.147430] The buggy address is located 0 bytes to the right of [ 20.147430] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.147494] [ 20.147516] The buggy address belongs to the physical page: [ 20.147551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.147657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.147902] page_type: f5(slab) [ 20.148019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.148156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.148207] page dumped because: kasan: bad access detected [ 20.148241] [ 20.148260] Memory state around the buggy address: [ 20.148317] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.148368] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.148412] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.148452] ^ [ 20.148487] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.148528] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.148567] ================================================================== [ 20.175771] ================================================================== [ 20.175833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.175903] Read of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.175954] [ 20.175996] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.176078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.176109] Hardware name: linux,dummy-virt (DT) [ 20.176141] Call trace: [ 20.176167] show_stack+0x20/0x38 (C) [ 20.176216] dump_stack_lvl+0x8c/0xd0 [ 20.176269] print_report+0x118/0x5d0 [ 20.176999] kasan_report+0xdc/0x128 [ 20.177109] __asan_report_load8_noabort+0x20/0x30 [ 20.177466] kasan_atomics_helper+0x3df4/0x4858 [ 20.177832] kasan_atomics+0x198/0x2e0 [ 20.178252] kunit_try_run_case+0x170/0x3f0 [ 20.178671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.178733] kthread+0x328/0x630 [ 20.178779] ret_from_fork+0x10/0x20 [ 20.179413] [ 20.179451] Allocated by task 265: [ 20.179761] kasan_save_stack+0x3c/0x68 [ 20.179894] kasan_save_track+0x20/0x40 [ 20.179933] kasan_save_alloc_info+0x40/0x58 [ 20.179976] __kasan_kmalloc+0xd4/0xd8 [ 20.180013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.180247] kasan_atomics+0xb8/0x2e0 [ 20.180297] kunit_try_run_case+0x170/0x3f0 [ 20.180339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.180677] kthread+0x328/0x630 [ 20.180716] ret_from_fork+0x10/0x20 [ 20.181150] [ 20.181176] The buggy address belongs to the object at fff00000c799a780 [ 20.181176] which belongs to the cache kmalloc-64 of size 64 [ 20.181238] The buggy address is located 0 bytes to the right of [ 20.181238] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.181307] [ 20.181611] The buggy address belongs to the physical page: [ 20.181654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.181892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.181950] page_type: f5(slab) [ 20.181995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.182507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.182559] page dumped because: kasan: bad access detected [ 20.182594] [ 20.182616] Memory state around the buggy address: [ 20.182992] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.183049] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.183142] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.183362] ^ [ 20.183546] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.183700] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.183788] ================================================================== [ 19.989074] ================================================================== [ 19.989136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.989566] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.989637] [ 19.989855] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.990028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.990068] Hardware name: linux,dummy-virt (DT) [ 19.990102] Call trace: [ 19.990153] show_stack+0x20/0x38 (C) [ 19.990216] dump_stack_lvl+0x8c/0xd0 [ 19.990410] print_report+0x118/0x5d0 [ 19.990652] kasan_report+0xdc/0x128 [ 19.990727] kasan_check_range+0x100/0x1a8 [ 19.990781] __kasan_check_write+0x20/0x30 [ 19.990827] kasan_atomics_helper+0xe44/0x4858 [ 19.990887] kasan_atomics+0x198/0x2e0 [ 19.990932] kunit_try_run_case+0x170/0x3f0 [ 19.991295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.991674] kthread+0x328/0x630 [ 19.991816] ret_from_fork+0x10/0x20 [ 19.992057] [ 19.992257] Allocated by task 265: [ 19.992321] kasan_save_stack+0x3c/0x68 [ 19.992445] kasan_save_track+0x20/0x40 [ 19.992515] kasan_save_alloc_info+0x40/0x58 [ 19.992568] __kasan_kmalloc+0xd4/0xd8 [ 19.992616] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.992658] kasan_atomics+0xb8/0x2e0 [ 19.992697] kunit_try_run_case+0x170/0x3f0 [ 19.992737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.992783] kthread+0x328/0x630 [ 19.992828] ret_from_fork+0x10/0x20 [ 19.992879] [ 19.992912] The buggy address belongs to the object at fff00000c799a780 [ 19.992912] which belongs to the cache kmalloc-64 of size 64 [ 19.992982] The buggy address is located 0 bytes to the right of [ 19.992982] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.993046] [ 19.993070] The buggy address belongs to the physical page: [ 19.993105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.993169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.993220] page_type: f5(slab) [ 19.993263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.993315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.993358] page dumped because: kasan: bad access detected [ 19.993407] [ 19.993433] Memory state around the buggy address: [ 19.993467] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.993518] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.993573] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.993620] ^ [ 19.993665] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.993726] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.993782] ================================================================== [ 20.065285] ================================================================== [ 20.065563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.065750] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.065877] [ 20.065921] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.066100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.066149] Hardware name: linux,dummy-virt (DT) [ 20.066185] Call trace: [ 20.066210] show_stack+0x20/0x38 (C) [ 20.066272] dump_stack_lvl+0x8c/0xd0 [ 20.066465] print_report+0x118/0x5d0 [ 20.066717] kasan_report+0xdc/0x128 [ 20.066786] kasan_check_range+0x100/0x1a8 [ 20.066838] __kasan_check_write+0x20/0x30 [ 20.067229] kasan_atomics_helper+0x1128/0x4858 [ 20.067305] kasan_atomics+0x198/0x2e0 [ 20.067354] kunit_try_run_case+0x170/0x3f0 [ 20.067588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.067830] kthread+0x328/0x630 [ 20.067987] ret_from_fork+0x10/0x20 [ 20.068085] [ 20.068472] Allocated by task 265: [ 20.068542] kasan_save_stack+0x3c/0x68 [ 20.068713] kasan_save_track+0x20/0x40 [ 20.068809] kasan_save_alloc_info+0x40/0x58 [ 20.069078] __kasan_kmalloc+0xd4/0xd8 [ 20.069498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.069697] kasan_atomics+0xb8/0x2e0 [ 20.069822] kunit_try_run_case+0x170/0x3f0 [ 20.070015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.070079] kthread+0x328/0x630 [ 20.070120] ret_from_fork+0x10/0x20 [ 20.070352] [ 20.070473] The buggy address belongs to the object at fff00000c799a780 [ 20.070473] which belongs to the cache kmalloc-64 of size 64 [ 20.071000] The buggy address is located 0 bytes to the right of [ 20.071000] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.071222] [ 20.071416] The buggy address belongs to the physical page: [ 20.071472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.071857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.072375] page_type: f5(slab) [ 20.072473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.072836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.072917] page dumped because: kasan: bad access detected [ 20.072983] [ 20.073219] Memory state around the buggy address: [ 20.073320] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.073473] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.074101] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.074231] ^ [ 20.074301] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.074589] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.074678] ================================================================== [ 19.949146] ================================================================== [ 19.949211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.949697] Write of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.949771] [ 19.949822] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.950150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.950366] Hardware name: linux,dummy-virt (DT) [ 19.950431] Call trace: [ 19.950459] show_stack+0x20/0x38 (C) [ 19.950553] dump_stack_lvl+0x8c/0xd0 [ 19.950758] print_report+0x118/0x5d0 [ 19.950812] kasan_report+0xdc/0x128 [ 19.951051] kasan_check_range+0x100/0x1a8 [ 19.951123] __kasan_check_write+0x20/0x30 [ 19.951230] kasan_atomics_helper+0xd3c/0x4858 [ 19.951528] kasan_atomics+0x198/0x2e0 [ 19.951683] kunit_try_run_case+0x170/0x3f0 [ 19.951886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.951999] kthread+0x328/0x630 [ 19.952183] ret_from_fork+0x10/0x20 [ 19.952250] [ 19.952271] Allocated by task 265: [ 19.952304] kasan_save_stack+0x3c/0x68 [ 19.952803] kasan_save_track+0x20/0x40 [ 19.952888] kasan_save_alloc_info+0x40/0x58 [ 19.953050] __kasan_kmalloc+0xd4/0xd8 [ 19.953101] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.953144] kasan_atomics+0xb8/0x2e0 [ 19.953223] kunit_try_run_case+0x170/0x3f0 [ 19.953267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.953324] kthread+0x328/0x630 [ 19.953362] ret_from_fork+0x10/0x20 [ 19.953400] [ 19.953430] The buggy address belongs to the object at fff00000c799a780 [ 19.953430] which belongs to the cache kmalloc-64 of size 64 [ 19.953499] The buggy address is located 0 bytes to the right of [ 19.953499] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.953564] [ 19.953605] The buggy address belongs to the physical page: [ 19.953642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.953700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.953758] page_type: f5(slab) [ 19.953806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.953882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.953925] page dumped because: kasan: bad access detected [ 19.953969] [ 19.953998] Memory state around the buggy address: [ 19.954043] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.954088] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.954139] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.954176] ^ [ 19.954212] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.954256] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.954312] ================================================================== [ 20.098170] ================================================================== [ 20.098240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.098303] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.098358] [ 20.098814] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.099087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.099123] Hardware name: linux,dummy-virt (DT) [ 20.099373] Call trace: [ 20.099787] show_stack+0x20/0x38 (C) [ 20.100012] dump_stack_lvl+0x8c/0xd0 [ 20.100156] print_report+0x118/0x5d0 [ 20.100272] kasan_report+0xdc/0x128 [ 20.100323] kasan_check_range+0x100/0x1a8 [ 20.100393] __kasan_check_write+0x20/0x30 [ 20.100439] kasan_atomics_helper+0x126c/0x4858 [ 20.101081] kasan_atomics+0x198/0x2e0 [ 20.101368] kunit_try_run_case+0x170/0x3f0 [ 20.101454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.101559] kthread+0x328/0x630 [ 20.101872] ret_from_fork+0x10/0x20 [ 20.102213] [ 20.102241] Allocated by task 265: [ 20.102423] kasan_save_stack+0x3c/0x68 [ 20.102573] kasan_save_track+0x20/0x40 [ 20.102656] kasan_save_alloc_info+0x40/0x58 [ 20.102705] __kasan_kmalloc+0xd4/0xd8 [ 20.102745] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.102795] kasan_atomics+0xb8/0x2e0 [ 20.102835] kunit_try_run_case+0x170/0x3f0 [ 20.102895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.102955] kthread+0x328/0x630 [ 20.102993] ret_from_fork+0x10/0x20 [ 20.103031] [ 20.103055] The buggy address belongs to the object at fff00000c799a780 [ 20.103055] which belongs to the cache kmalloc-64 of size 64 [ 20.103137] The buggy address is located 0 bytes to the right of [ 20.103137] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.103204] [ 20.103228] The buggy address belongs to the physical page: [ 20.103264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.103870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.103959] page_type: f5(slab) [ 20.104130] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.104195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.104241] page dumped because: kasan: bad access detected [ 20.104276] [ 20.104298] Memory state around the buggy address: [ 20.105221] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.105573] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.105645] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.105718] ^ [ 20.105791] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.105881] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.106093] ================================================================== [ 20.017465] ================================================================== [ 20.017541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.017603] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.017654] [ 20.017694] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.017779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.017806] Hardware name: linux,dummy-virt (DT) [ 20.017853] Call trace: [ 20.017878] show_stack+0x20/0x38 (C) [ 20.017956] dump_stack_lvl+0x8c/0xd0 [ 20.018007] print_report+0x118/0x5d0 [ 20.018056] kasan_report+0xdc/0x128 [ 20.018101] kasan_check_range+0x100/0x1a8 [ 20.018152] __kasan_check_write+0x20/0x30 [ 20.018200] kasan_atomics_helper+0xf20/0x4858 [ 20.018249] kasan_atomics+0x198/0x2e0 [ 20.018305] kunit_try_run_case+0x170/0x3f0 [ 20.018356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.018424] kthread+0x328/0x630 [ 20.018475] ret_from_fork+0x10/0x20 [ 20.018526] [ 20.018547] Allocated by task 265: [ 20.018579] kasan_save_stack+0x3c/0x68 [ 20.018633] kasan_save_track+0x20/0x40 [ 20.018690] kasan_save_alloc_info+0x40/0x58 [ 20.018734] __kasan_kmalloc+0xd4/0xd8 [ 20.018772] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.018815] kasan_atomics+0xb8/0x2e0 [ 20.018863] kunit_try_run_case+0x170/0x3f0 [ 20.018902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.018947] kthread+0x328/0x630 [ 20.018984] ret_from_fork+0x10/0x20 [ 20.019023] [ 20.019046] The buggy address belongs to the object at fff00000c799a780 [ 20.019046] which belongs to the cache kmalloc-64 of size 64 [ 20.019117] The buggy address is located 0 bytes to the right of [ 20.019117] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.019182] [ 20.019207] The buggy address belongs to the physical page: [ 20.019249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.020260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.020362] page_type: f5(slab) [ 20.020439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.020527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.020573] page dumped because: kasan: bad access detected [ 20.020829] [ 20.020938] Memory state around the buggy address: [ 20.021238] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.021292] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.021614] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.021834] ^ [ 20.022051] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.022178] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.022235] ================================================================== [ 20.044354] ================================================================== [ 20.044422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.044481] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.044531] [ 20.044573] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.044672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.045110] Hardware name: linux,dummy-virt (DT) [ 20.045678] Call trace: [ 20.045837] show_stack+0x20/0x38 (C) [ 20.046408] dump_stack_lvl+0x8c/0xd0 [ 20.046674] print_report+0x118/0x5d0 [ 20.046746] kasan_report+0xdc/0x128 [ 20.046915] kasan_check_range+0x100/0x1a8 [ 20.046978] __kasan_check_write+0x20/0x30 [ 20.047026] kasan_atomics_helper+0x1058/0x4858 [ 20.047127] kasan_atomics+0x198/0x2e0 [ 20.047178] kunit_try_run_case+0x170/0x3f0 [ 20.047228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.047562] kthread+0x328/0x630 [ 20.047932] ret_from_fork+0x10/0x20 [ 20.048138] [ 20.048199] Allocated by task 265: [ 20.048294] kasan_save_stack+0x3c/0x68 [ 20.048371] kasan_save_track+0x20/0x40 [ 20.048412] kasan_save_alloc_info+0x40/0x58 [ 20.048463] __kasan_kmalloc+0xd4/0xd8 [ 20.048806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.049156] kasan_atomics+0xb8/0x2e0 [ 20.049358] kunit_try_run_case+0x170/0x3f0 [ 20.049526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.049674] kthread+0x328/0x630 [ 20.049761] ret_from_fork+0x10/0x20 [ 20.049878] [ 20.050098] The buggy address belongs to the object at fff00000c799a780 [ 20.050098] which belongs to the cache kmalloc-64 of size 64 [ 20.050477] The buggy address is located 0 bytes to the right of [ 20.050477] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.050913] [ 20.051175] The buggy address belongs to the physical page: [ 20.051245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.051307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.051704] page_type: f5(slab) [ 20.051840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.052039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.052091] page dumped because: kasan: bad access detected [ 20.052126] [ 20.052147] Memory state around the buggy address: [ 20.052517] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.052581] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.052925] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.053001] ^ [ 20.053041] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.053693] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.053938] ================================================================== [ 20.075091] ================================================================== [ 20.075148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.075204] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.075273] [ 20.075874] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.076166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.076354] Hardware name: linux,dummy-virt (DT) [ 20.076695] Call trace: [ 20.076794] show_stack+0x20/0x38 (C) [ 20.077225] dump_stack_lvl+0x8c/0xd0 [ 20.077408] print_report+0x118/0x5d0 [ 20.077563] kasan_report+0xdc/0x128 [ 20.077661] kasan_check_range+0x100/0x1a8 [ 20.077914] __kasan_check_write+0x20/0x30 [ 20.078126] kasan_atomics_helper+0x1190/0x4858 [ 20.078455] kasan_atomics+0x198/0x2e0 [ 20.078680] kunit_try_run_case+0x170/0x3f0 [ 20.078853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.079114] kthread+0x328/0x630 [ 20.079320] ret_from_fork+0x10/0x20 [ 20.079755] [ 20.079822] Allocated by task 265: [ 20.079906] kasan_save_stack+0x3c/0x68 [ 20.080005] kasan_save_track+0x20/0x40 [ 20.080141] kasan_save_alloc_info+0x40/0x58 [ 20.080187] __kasan_kmalloc+0xd4/0xd8 [ 20.080383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.080910] kasan_atomics+0xb8/0x2e0 [ 20.081070] kunit_try_run_case+0x170/0x3f0 [ 20.081244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.081692] kthread+0x328/0x630 [ 20.081973] ret_from_fork+0x10/0x20 [ 20.082075] [ 20.082130] The buggy address belongs to the object at fff00000c799a780 [ 20.082130] which belongs to the cache kmalloc-64 of size 64 [ 20.082369] The buggy address is located 0 bytes to the right of [ 20.082369] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.082789] [ 20.082995] The buggy address belongs to the physical page: [ 20.083121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.083218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.083463] page_type: f5(slab) [ 20.083679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.084044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.084275] page dumped because: kasan: bad access detected [ 20.084405] [ 20.084574] Memory state around the buggy address: [ 20.084642] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.084922] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.085346] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.085849] ^ [ 20.086070] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.086132] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.086173] ================================================================== [ 19.822098] ================================================================== [ 19.822286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.822422] Read of size 4 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 19.822763] [ 19.822823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.822993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.823053] Hardware name: linux,dummy-virt (DT) [ 19.823109] Call trace: [ 19.823135] show_stack+0x20/0x38 (C) [ 19.823245] dump_stack_lvl+0x8c/0xd0 [ 19.823298] print_report+0x118/0x5d0 [ 19.823651] kasan_report+0xdc/0x128 [ 19.823883] __asan_report_load4_noabort+0x20/0x30 [ 19.824197] kasan_atomics_helper+0x42d8/0x4858 [ 19.824674] [ 19.825350] [ 19.825380] The buggy address belongs to the physical page: [ 19.825424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.825487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.825538] page_type: f5(slab) [ 19.829939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.829976] Hardware name: linux,dummy-virt (DT) [ 19.830010] Call trace: [ 19.830085] show_stack+0x20/0x38 (C) [ 19.830160] dump_stack_lvl+0x8c/0xd0 [ 19.830228] print_report+0x118/0x5d0 [ 19.830663] kasan_report+0xdc/0x128 [ 19.830740] kasan_check_range+0x100/0x1a8 [ 19.830794] __kasan_check_write+0x20/0x30 [ 19.830904] kasan_atomics_helper+0x934/0x4858 [ 19.830957] kasan_atomics+0x198/0x2e0 [ 19.831004] kunit_try_run_case+0x170/0x3f0 [ 19.831284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.831537] kthread+0x328/0x630 [ 19.831654] ret_from_fork+0x10/0x20 [ 19.831872] [ 19.831944] Allocated by task 265: [ 19.832207] kasan_save_stack+0x3c/0x68 [ 19.832377] kasan_save_track+0x20/0x40 [ 19.832448] kasan_save_alloc_info+0x40/0x58 [ 19.832907] __kasan_kmalloc+0xd4/0xd8 [ 19.833221] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.833294] kasan_atomics+0xb8/0x2e0 [ 19.833362] kunit_try_run_case+0x170/0x3f0 [ 19.833435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.833833] kthread+0x328/0x630 [ 19.834051] ret_from_fork+0x10/0x20 [ 19.834409] [ 19.834545] The buggy address belongs to the object at fff00000c799a780 [ 19.834545] which belongs to the cache kmalloc-64 of size 64 [ 19.834730] The buggy address is located 0 bytes to the right of [ 19.834730] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 19.834832] [ 19.834972] The buggy address belongs to the physical page: [ 19.835006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 19.835325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.835569] page_type: f5(slab) [ 19.835660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.835751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.835894] page dumped because: kasan: bad access detected [ 19.835966] [ 19.836032] Memory state around the buggy address: [ 19.836141] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.836237] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.836339] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.836408] ^ [ 19.836482] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.836687] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.836875] ================================================================== [ 20.118656] ================================================================== [ 20.119009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.119110] Write of size 8 at addr fff00000c799a7b0 by task kunit_try_catch/265 [ 20.119164] [ 20.119254] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.119415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.119445] Hardware name: linux,dummy-virt (DT) [ 20.119897] Call trace: [ 20.119941] show_stack+0x20/0x38 (C) [ 20.120283] dump_stack_lvl+0x8c/0xd0 [ 20.120497] print_report+0x118/0x5d0 [ 20.120603] kasan_report+0xdc/0x128 [ 20.120655] kasan_check_range+0x100/0x1a8 [ 20.120925] __kasan_check_write+0x20/0x30 [ 20.121101] kasan_atomics_helper+0x1384/0x4858 [ 20.121578] kasan_atomics+0x198/0x2e0 [ 20.121753] kunit_try_run_case+0x170/0x3f0 [ 20.121810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.121878] kthread+0x328/0x630 [ 20.121938] ret_from_fork+0x10/0x20 [ 20.122006] [ 20.122049] Allocated by task 265: [ 20.122087] kasan_save_stack+0x3c/0x68 [ 20.122147] kasan_save_track+0x20/0x40 [ 20.122189] kasan_save_alloc_info+0x40/0x58 [ 20.122242] __kasan_kmalloc+0xd4/0xd8 [ 20.122297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.122346] kasan_atomics+0xb8/0x2e0 [ 20.122392] kunit_try_run_case+0x170/0x3f0 [ 20.122432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.122479] kthread+0x328/0x630 [ 20.122522] ret_from_fork+0x10/0x20 [ 20.122562] [ 20.122585] The buggy address belongs to the object at fff00000c799a780 [ 20.122585] which belongs to the cache kmalloc-64 of size 64 [ 20.122669] The buggy address is located 0 bytes to the right of [ 20.122669] allocated 48-byte region [fff00000c799a780, fff00000c799a7b0) [ 20.122735] [ 20.122781] The buggy address belongs to the physical page: [ 20.122817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799a [ 20.123566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.123656] page_type: f5(slab) [ 20.123725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.123796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.124021] page dumped because: kasan: bad access detected [ 20.124066] [ 20.124087] Memory state around the buggy address: [ 20.124153] fff00000c799a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.124208] fff00000c799a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.124368] >fff00000c799a780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.124866] ^ [ 20.124967] fff00000c799a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.125169] fff00000c799a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.125223] ==================================================================
[ 19.527627] ================================================================== [ 19.527681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.527734] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.528220] [ 19.528286] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.529029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.529078] Hardware name: linux,dummy-virt (DT) [ 19.529149] Call trace: [ 19.529197] show_stack+0x20/0x38 (C) [ 19.529253] dump_stack_lvl+0x8c/0xd0 [ 19.529302] print_report+0x118/0x5d0 [ 19.529363] kasan_report+0xdc/0x128 [ 19.529563] kasan_check_range+0x100/0x1a8 [ 19.529912] __kasan_check_write+0x20/0x30 [ 19.530149] kasan_atomics_helper+0xff0/0x4858 [ 19.530675] kasan_atomics+0x198/0x2e0 [ 19.530934] kunit_try_run_case+0x170/0x3f0 [ 19.531483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.531619] kthread+0x328/0x630 [ 19.531846] ret_from_fork+0x10/0x20 [ 19.531986] [ 19.532239] Allocated by task 265: [ 19.532332] kasan_save_stack+0x3c/0x68 [ 19.532510] kasan_save_track+0x20/0x40 [ 19.532771] kasan_save_alloc_info+0x40/0x58 [ 19.532974] __kasan_kmalloc+0xd4/0xd8 [ 19.533115] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.533162] kasan_atomics+0xb8/0x2e0 [ 19.533210] kunit_try_run_case+0x170/0x3f0 [ 19.533298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.533515] kthread+0x328/0x630 [ 19.533927] ret_from_fork+0x10/0x20 [ 19.534018] [ 19.534199] The buggy address belongs to the object at fff00000c7ab9600 [ 19.534199] which belongs to the cache kmalloc-64 of size 64 [ 19.534431] The buggy address is located 0 bytes to the right of [ 19.534431] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.534654] [ 19.534700] The buggy address belongs to the physical page: [ 19.534754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.535003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.535150] page_type: f5(slab) [ 19.535406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.535468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.535545] page dumped because: kasan: bad access detected [ 19.535742] [ 19.535771] Memory state around the buggy address: [ 19.535808] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535865] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535910] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.535947] ^ [ 19.535983] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536027] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536075] ================================================================== [ 19.507329] ================================================================== [ 19.507439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.507562] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.507663] [ 19.507699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.507783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.507981] Hardware name: linux,dummy-virt (DT) [ 19.508245] Call trace: [ 19.508289] show_stack+0x20/0x38 (C) [ 19.508650] dump_stack_lvl+0x8c/0xd0 [ 19.508780] print_report+0x118/0x5d0 [ 19.508908] kasan_report+0xdc/0x128 [ 19.508970] kasan_check_range+0x100/0x1a8 [ 19.509288] __kasan_check_write+0x20/0x30 [ 19.509590] kasan_atomics_helper+0xf20/0x4858 [ 19.509774] kasan_atomics+0x198/0x2e0 [ 19.509960] kunit_try_run_case+0x170/0x3f0 [ 19.510090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.510214] kthread+0x328/0x630 [ 19.510501] ret_from_fork+0x10/0x20 [ 19.510884] [ 19.510912] Allocated by task 265: [ 19.511070] kasan_save_stack+0x3c/0x68 [ 19.512075] kasan_save_track+0x20/0x40 [ 19.512483] kasan_save_alloc_info+0x40/0x58 [ 19.512591] __kasan_kmalloc+0xd4/0xd8 [ 19.512697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.512947] kasan_atomics+0xb8/0x2e0 [ 19.513118] kunit_try_run_case+0x170/0x3f0 [ 19.513343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.513552] kthread+0x328/0x630 [ 19.513622] ret_from_fork+0x10/0x20 [ 19.513660] [ 19.513731] The buggy address belongs to the object at fff00000c7ab9600 [ 19.513731] which belongs to the cache kmalloc-64 of size 64 [ 19.514164] The buggy address is located 0 bytes to the right of [ 19.514164] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.514378] [ 19.514522] The buggy address belongs to the physical page: [ 19.514758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.515115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.515455] page_type: f5(slab) [ 19.515578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.515765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.516021] page dumped because: kasan: bad access detected [ 19.516129] [ 19.516250] Memory state around the buggy address: [ 19.516317] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.516606] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.516799] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.516849] ^ [ 19.517159] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517214] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517600] ================================================================== [ 19.711228] ================================================================== [ 19.711351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.711406] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.711481] [ 19.711521] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.711614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.711652] Hardware name: linux,dummy-virt (DT) [ 19.711684] Call trace: [ 19.711709] show_stack+0x20/0x38 (C) [ 19.711759] dump_stack_lvl+0x8c/0xd0 [ 19.711808] print_report+0x118/0x5d0 [ 19.711855] kasan_report+0xdc/0x128 [ 19.711902] kasan_check_range+0x100/0x1a8 [ 19.711953] __kasan_check_write+0x20/0x30 [ 19.712001] kasan_atomics_helper+0x175c/0x4858 [ 19.712068] kasan_atomics+0x198/0x2e0 [ 19.712114] kunit_try_run_case+0x170/0x3f0 [ 19.712167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.712230] kthread+0x328/0x630 [ 19.712273] ret_from_fork+0x10/0x20 [ 19.712673] [ 19.712707] Allocated by task 265: [ 19.712902] kasan_save_stack+0x3c/0x68 [ 19.713105] kasan_save_track+0x20/0x40 [ 19.713169] kasan_save_alloc_info+0x40/0x58 [ 19.713278] __kasan_kmalloc+0xd4/0xd8 [ 19.713721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.713866] kasan_atomics+0xb8/0x2e0 [ 19.713947] kunit_try_run_case+0x170/0x3f0 [ 19.714303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714489] kthread+0x328/0x630 [ 19.714814] ret_from_fork+0x10/0x20 [ 19.715046] [ 19.715114] The buggy address belongs to the object at fff00000c7ab9600 [ 19.715114] which belongs to the cache kmalloc-64 of size 64 [ 19.715452] The buggy address is located 0 bytes to the right of [ 19.715452] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.715718] [ 19.715763] The buggy address belongs to the physical page: [ 19.716296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.716385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.716552] page_type: f5(slab) [ 19.716598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.716650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.716995] page dumped because: kasan: bad access detected [ 19.717481] [ 19.717511] Memory state around the buggy address: [ 19.717550] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.717785] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.717851] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.718184] ^ [ 19.718280] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.718393] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.718731] ================================================================== [ 19.657661] ================================================================== [ 19.657956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.658055] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.658162] [ 19.658376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.658531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.658566] Hardware name: linux,dummy-virt (DT) [ 19.658908] Call trace: [ 19.659045] show_stack+0x20/0x38 (C) [ 19.659107] dump_stack_lvl+0x8c/0xd0 [ 19.659154] print_report+0x118/0x5d0 [ 19.659514] kasan_report+0xdc/0x128 [ 19.659586] kasan_check_range+0x100/0x1a8 [ 19.659699] __kasan_check_write+0x20/0x30 [ 19.659766] kasan_atomics_helper+0x15b4/0x4858 [ 19.659819] kasan_atomics+0x198/0x2e0 [ 19.660003] kunit_try_run_case+0x170/0x3f0 [ 19.660056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.660111] kthread+0x328/0x630 [ 19.660432] ret_from_fork+0x10/0x20 [ 19.660672] [ 19.660746] Allocated by task 265: [ 19.660892] kasan_save_stack+0x3c/0x68 [ 19.660952] kasan_save_track+0x20/0x40 [ 19.661048] kasan_save_alloc_info+0x40/0x58 [ 19.661122] __kasan_kmalloc+0xd4/0xd8 [ 19.661162] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.661227] kasan_atomics+0xb8/0x2e0 [ 19.661267] kunit_try_run_case+0x170/0x3f0 [ 19.661469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.661618] kthread+0x328/0x630 [ 19.661685] ret_from_fork+0x10/0x20 [ 19.662051] [ 19.662105] The buggy address belongs to the object at fff00000c7ab9600 [ 19.662105] which belongs to the cache kmalloc-64 of size 64 [ 19.662436] The buggy address is located 0 bytes to the right of [ 19.662436] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.662547] [ 19.662703] The buggy address belongs to the physical page: [ 19.663011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.663079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.663513] page_type: f5(slab) [ 19.663690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.664088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.664331] page dumped because: kasan: bad access detected [ 19.664631] [ 19.664753] Memory state around the buggy address: [ 19.664969] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.665209] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.665306] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.665530] ^ [ 19.665592] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665685] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665858] ================================================================== [ 19.676053] ================================================================== [ 19.676139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.676196] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.676302] [ 19.676346] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.676435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.676464] Hardware name: linux,dummy-virt (DT) [ 19.676496] Call trace: [ 19.676526] show_stack+0x20/0x38 (C) [ 19.677034] dump_stack_lvl+0x8c/0xd0 [ 19.677195] print_report+0x118/0x5d0 [ 19.677305] kasan_report+0xdc/0x128 [ 19.677487] kasan_check_range+0x100/0x1a8 [ 19.677541] __kasan_check_write+0x20/0x30 [ 19.677588] kasan_atomics_helper+0x1644/0x4858 [ 19.677639] kasan_atomics+0x198/0x2e0 [ 19.677684] kunit_try_run_case+0x170/0x3f0 [ 19.678228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.678440] kthread+0x328/0x630 [ 19.678575] ret_from_fork+0x10/0x20 [ 19.678706] [ 19.678778] Allocated by task 265: [ 19.678876] kasan_save_stack+0x3c/0x68 [ 19.678921] kasan_save_track+0x20/0x40 [ 19.678960] kasan_save_alloc_info+0x40/0x58 [ 19.679002] __kasan_kmalloc+0xd4/0xd8 [ 19.679050] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.679092] kasan_atomics+0xb8/0x2e0 [ 19.679140] kunit_try_run_case+0x170/0x3f0 [ 19.679180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.679239] kthread+0x328/0x630 [ 19.679275] ret_from_fork+0x10/0x20 [ 19.679314] [ 19.679479] The buggy address belongs to the object at fff00000c7ab9600 [ 19.679479] which belongs to the cache kmalloc-64 of size 64 [ 19.679929] The buggy address is located 0 bytes to the right of [ 19.679929] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.680197] [ 19.680529] The buggy address belongs to the physical page: [ 19.680964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.681030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.681090] page_type: f5(slab) [ 19.681464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.681855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.681907] page dumped because: kasan: bad access detected [ 19.681944] [ 19.681965] Memory state around the buggy address: [ 19.682407] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.682746] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.682996] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.683099] ^ [ 19.683298] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.683367] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.683406] ================================================================== [ 19.603447] ================================================================== [ 19.603750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.603992] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.604054] [ 19.604090] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.604345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.604387] Hardware name: linux,dummy-virt (DT) [ 19.604421] Call trace: [ 19.604483] show_stack+0x20/0x38 (C) [ 19.605135] dump_stack_lvl+0x8c/0xd0 [ 19.605246] print_report+0x118/0x5d0 [ 19.605512] kasan_report+0xdc/0x128 [ 19.605691] kasan_check_range+0x100/0x1a8 [ 19.606081] __kasan_check_write+0x20/0x30 [ 19.606272] kasan_atomics_helper+0x1384/0x4858 [ 19.606674] kasan_atomics+0x198/0x2e0 [ 19.606786] kunit_try_run_case+0x170/0x3f0 [ 19.607069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.607204] kthread+0x328/0x630 [ 19.607480] ret_from_fork+0x10/0x20 [ 19.607625] [ 19.607709] Allocated by task 265: [ 19.607741] kasan_save_stack+0x3c/0x68 [ 19.607851] kasan_save_track+0x20/0x40 [ 19.608165] kasan_save_alloc_info+0x40/0x58 [ 19.608550] __kasan_kmalloc+0xd4/0xd8 [ 19.608684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.608842] kasan_atomics+0xb8/0x2e0 [ 19.608940] kunit_try_run_case+0x170/0x3f0 [ 19.609182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.609400] kthread+0x328/0x630 [ 19.609507] ret_from_fork+0x10/0x20 [ 19.609764] [ 19.609820] The buggy address belongs to the object at fff00000c7ab9600 [ 19.609820] which belongs to the cache kmalloc-64 of size 64 [ 19.610056] The buggy address is located 0 bytes to the right of [ 19.610056] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.610350] [ 19.610482] The buggy address belongs to the physical page: [ 19.610769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.610920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.611363] page_type: f5(slab) [ 19.611430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.611842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.611915] page dumped because: kasan: bad access detected [ 19.611951] [ 19.611972] Memory state around the buggy address: [ 19.612008] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.612483] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.612654] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.612841] ^ [ 19.612888] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612935] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612974] ================================================================== [ 19.562921] ================================================================== [ 19.562974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.563200] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.563280] [ 19.563315] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.563831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.563892] Hardware name: linux,dummy-virt (DT) [ 19.563981] Call trace: [ 19.564009] show_stack+0x20/0x38 (C) [ 19.564064] dump_stack_lvl+0x8c/0xd0 [ 19.564187] print_report+0x118/0x5d0 [ 19.564244] kasan_report+0xdc/0x128 [ 19.564291] kasan_check_range+0x100/0x1a8 [ 19.564352] __kasan_check_write+0x20/0x30 [ 19.564397] kasan_atomics_helper+0x1190/0x4858 [ 19.564675] kasan_atomics+0x198/0x2e0 [ 19.565193] kunit_try_run_case+0x170/0x3f0 [ 19.565297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.565479] kthread+0x328/0x630 [ 19.565527] ret_from_fork+0x10/0x20 [ 19.565576] [ 19.565873] Allocated by task 265: [ 19.566010] kasan_save_stack+0x3c/0x68 [ 19.566108] kasan_save_track+0x20/0x40 [ 19.566553] kasan_save_alloc_info+0x40/0x58 [ 19.566658] __kasan_kmalloc+0xd4/0xd8 [ 19.566772] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.566903] kasan_atomics+0xb8/0x2e0 [ 19.566990] kunit_try_run_case+0x170/0x3f0 [ 19.567207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.567461] kthread+0x328/0x630 [ 19.567760] ret_from_fork+0x10/0x20 [ 19.568011] [ 19.568069] The buggy address belongs to the object at fff00000c7ab9600 [ 19.568069] which belongs to the cache kmalloc-64 of size 64 [ 19.568593] The buggy address is located 0 bytes to the right of [ 19.568593] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.568819] [ 19.568944] The buggy address belongs to the physical page: [ 19.569076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.569346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.569592] page_type: f5(slab) [ 19.569675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.569730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.570152] page dumped because: kasan: bad access detected [ 19.570458] [ 19.570600] Memory state around the buggy address: [ 19.570640] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.570882] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.571337] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.571893] ^ [ 19.572108] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.572438] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.572539] ================================================================== [ 19.455989] ================================================================== [ 19.456044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.456096] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.456147] [ 19.456184] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.456877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.457114] Hardware name: linux,dummy-virt (DT) [ 19.457178] Call trace: [ 19.457295] show_stack+0x20/0x38 (C) [ 19.457533] dump_stack_lvl+0x8c/0xd0 [ 19.457746] print_report+0x118/0x5d0 [ 19.457838] kasan_report+0xdc/0x128 [ 19.458102] kasan_check_range+0x100/0x1a8 [ 19.458373] __kasan_check_read+0x20/0x30 [ 19.458683] kasan_atomics_helper+0xdd4/0x4858 [ 19.458763] kasan_atomics+0x198/0x2e0 [ 19.458811] kunit_try_run_case+0x170/0x3f0 [ 19.459447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.459668] kthread+0x328/0x630 [ 19.459734] ret_from_fork+0x10/0x20 [ 19.460000] [ 19.460194] Allocated by task 265: [ 19.460261] kasan_save_stack+0x3c/0x68 [ 19.460329] kasan_save_track+0x20/0x40 [ 19.460372] kasan_save_alloc_info+0x40/0x58 [ 19.460421] __kasan_kmalloc+0xd4/0xd8 [ 19.460475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.460795] kasan_atomics+0xb8/0x2e0 [ 19.460847] kunit_try_run_case+0x170/0x3f0 [ 19.460888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.460940] kthread+0x328/0x630 [ 19.460976] ret_from_fork+0x10/0x20 [ 19.461144] [ 19.461223] The buggy address belongs to the object at fff00000c7ab9600 [ 19.461223] which belongs to the cache kmalloc-64 of size 64 [ 19.461690] The buggy address is located 0 bytes to the right of [ 19.461690] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.462269] [ 19.462426] The buggy address belongs to the physical page: [ 19.462524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.462609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.462965] page_type: f5(slab) [ 19.463308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.463652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.463902] page dumped because: kasan: bad access detected [ 19.464177] [ 19.464253] Memory state around the buggy address: [ 19.464384] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464712] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464766] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.464945] ^ [ 19.465025] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.465188] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.465267] ================================================================== [ 19.614758] ================================================================== [ 19.615153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.615252] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.615441] [ 19.615485] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.615568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.615598] Hardware name: linux,dummy-virt (DT) [ 19.615932] Call trace: [ 19.615974] show_stack+0x20/0x38 (C) [ 19.616030] dump_stack_lvl+0x8c/0xd0 [ 19.616498] print_report+0x118/0x5d0 [ 19.616922] kasan_report+0xdc/0x128 [ 19.617049] __asan_report_load8_noabort+0x20/0x30 [ 19.617168] kasan_atomics_helper+0x3f04/0x4858 [ 19.617337] kasan_atomics+0x198/0x2e0 [ 19.617410] kunit_try_run_case+0x170/0x3f0 [ 19.617468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.617523] kthread+0x328/0x630 [ 19.617731] ret_from_fork+0x10/0x20 [ 19.617859] [ 19.617888] Allocated by task 265: [ 19.618027] kasan_save_stack+0x3c/0x68 [ 19.618079] kasan_save_track+0x20/0x40 [ 19.618145] kasan_save_alloc_info+0x40/0x58 [ 19.618204] __kasan_kmalloc+0xd4/0xd8 [ 19.618243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.618298] kasan_atomics+0xb8/0x2e0 [ 19.618357] kunit_try_run_case+0x170/0x3f0 [ 19.618397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.618440] kthread+0x328/0x630 [ 19.618489] ret_from_fork+0x10/0x20 [ 19.618527] [ 19.618565] The buggy address belongs to the object at fff00000c7ab9600 [ 19.618565] which belongs to the cache kmalloc-64 of size 64 [ 19.618626] The buggy address is located 0 bytes to the right of [ 19.618626] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.618692] [ 19.618738] The buggy address belongs to the physical page: [ 19.618795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.618849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.618901] page_type: f5(slab) [ 19.618950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.619005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.619047] page dumped because: kasan: bad access detected [ 19.619092] [ 19.619120] Memory state around the buggy address: [ 19.619162] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.619208] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.619253] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.619292] ^ [ 19.619336] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.620158] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.620228] ================================================================== [ 19.621412] ================================================================== [ 19.621467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.621523] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.621765] [ 19.621925] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.622156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.622326] Hardware name: linux,dummy-virt (DT) [ 19.622392] Call trace: [ 19.622558] show_stack+0x20/0x38 (C) [ 19.622619] dump_stack_lvl+0x8c/0xd0 [ 19.622675] print_report+0x118/0x5d0 [ 19.622768] kasan_report+0xdc/0x128 [ 19.622866] kasan_check_range+0x100/0x1a8 [ 19.623070] __kasan_check_write+0x20/0x30 [ 19.623280] kasan_atomics_helper+0x1414/0x4858 [ 19.623366] kasan_atomics+0x198/0x2e0 [ 19.623575] kunit_try_run_case+0x170/0x3f0 [ 19.623655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.623729] kthread+0x328/0x630 [ 19.623773] ret_from_fork+0x10/0x20 [ 19.624042] [ 19.624129] Allocated by task 265: [ 19.624170] kasan_save_stack+0x3c/0x68 [ 19.624237] kasan_save_track+0x20/0x40 [ 19.624483] kasan_save_alloc_info+0x40/0x58 [ 19.624651] __kasan_kmalloc+0xd4/0xd8 [ 19.624728] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.624963] kasan_atomics+0xb8/0x2e0 [ 19.625191] kunit_try_run_case+0x170/0x3f0 [ 19.625368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.625452] kthread+0x328/0x630 [ 19.625489] ret_from_fork+0x10/0x20 [ 19.625797] [ 19.625850] The buggy address belongs to the object at fff00000c7ab9600 [ 19.625850] which belongs to the cache kmalloc-64 of size 64 [ 19.626251] The buggy address is located 0 bytes to the right of [ 19.626251] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.627054] [ 19.627425] The buggy address belongs to the physical page: [ 19.627580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.628017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.628266] page_type: f5(slab) [ 19.628333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.628512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.628708] page dumped because: kasan: bad access detected [ 19.629014] [ 19.629041] Memory state around the buggy address: [ 19.629079] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.629126] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.629557] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.629871] ^ [ 19.630059] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630345] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630549] ================================================================== [ 19.476254] ================================================================== [ 19.476335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.476390] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.476442] [ 19.476478] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.476942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.477143] Hardware name: linux,dummy-virt (DT) [ 19.477222] Call trace: [ 19.477250] show_stack+0x20/0x38 (C) [ 19.477313] dump_stack_lvl+0x8c/0xd0 [ 19.477373] print_report+0x118/0x5d0 [ 19.477426] kasan_report+0xdc/0x128 [ 19.478202] kasan_check_range+0x100/0x1a8 [ 19.478382] __kasan_check_write+0x20/0x30 [ 19.478524] kasan_atomics_helper+0xe44/0x4858 [ 19.478646] kasan_atomics+0x198/0x2e0 [ 19.478834] kunit_try_run_case+0x170/0x3f0 [ 19.479063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.479349] kthread+0x328/0x630 [ 19.479580] ret_from_fork+0x10/0x20 [ 19.479687] [ 19.479757] Allocated by task 265: [ 19.479851] kasan_save_stack+0x3c/0x68 [ 19.479898] kasan_save_track+0x20/0x40 [ 19.480119] kasan_save_alloc_info+0x40/0x58 [ 19.480237] __kasan_kmalloc+0xd4/0xd8 [ 19.480465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.480697] kasan_atomics+0xb8/0x2e0 [ 19.480990] kunit_try_run_case+0x170/0x3f0 [ 19.481085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.481539] kthread+0x328/0x630 [ 19.481737] ret_from_fork+0x10/0x20 [ 19.481864] [ 19.481946] The buggy address belongs to the object at fff00000c7ab9600 [ 19.481946] which belongs to the cache kmalloc-64 of size 64 [ 19.482356] The buggy address is located 0 bytes to the right of [ 19.482356] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.482621] [ 19.482756] The buggy address belongs to the physical page: [ 19.482821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.483167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.483587] page_type: f5(slab) [ 19.483640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.484048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.484338] page dumped because: kasan: bad access detected [ 19.484498] [ 19.484702] Memory state around the buggy address: [ 19.484807] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.485247] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.485303] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.485356] ^ [ 19.485393] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.485437] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.485574] ================================================================== [ 19.701277] ================================================================== [ 19.701495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.701576] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.701670] [ 19.701780] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.701869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.701897] Hardware name: linux,dummy-virt (DT) [ 19.701930] Call trace: [ 19.701954] show_stack+0x20/0x38 (C) [ 19.702005] dump_stack_lvl+0x8c/0xd0 [ 19.702054] print_report+0x118/0x5d0 [ 19.702103] kasan_report+0xdc/0x128 [ 19.702478] __asan_report_load8_noabort+0x20/0x30 [ 19.702765] kasan_atomics_helper+0x3e10/0x4858 [ 19.702980] kasan_atomics+0x198/0x2e0 [ 19.703117] kunit_try_run_case+0x170/0x3f0 [ 19.703201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.703362] kthread+0x328/0x630 [ 19.703414] ret_from_fork+0x10/0x20 [ 19.703806] [ 19.703842] Allocated by task 265: [ 19.704026] kasan_save_stack+0x3c/0x68 [ 19.704114] kasan_save_track+0x20/0x40 [ 19.704387] kasan_save_alloc_info+0x40/0x58 [ 19.704478] __kasan_kmalloc+0xd4/0xd8 [ 19.704587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.704684] kasan_atomics+0xb8/0x2e0 [ 19.704750] kunit_try_run_case+0x170/0x3f0 [ 19.704925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.705168] kthread+0x328/0x630 [ 19.705562] ret_from_fork+0x10/0x20 [ 19.705846] [ 19.705915] The buggy address belongs to the object at fff00000c7ab9600 [ 19.705915] which belongs to the cache kmalloc-64 of size 64 [ 19.706125] The buggy address is located 0 bytes to the right of [ 19.706125] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.706375] [ 19.706402] The buggy address belongs to the physical page: [ 19.706673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.706848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.707057] page_type: f5(slab) [ 19.707147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.707462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.707535] page dumped because: kasan: bad access detected [ 19.707635] [ 19.707776] Memory state around the buggy address: [ 19.708132] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.708192] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.708583] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.709064] ^ [ 19.709116] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.709173] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.709213] ================================================================== [ 19.545721] ================================================================== [ 19.545774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.546051] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.546270] [ 19.546306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.546628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.546715] Hardware name: linux,dummy-virt (DT) [ 19.547017] Call trace: [ 19.547071] show_stack+0x20/0x38 (C) [ 19.547295] dump_stack_lvl+0x8c/0xd0 [ 19.547457] print_report+0x118/0x5d0 [ 19.547751] kasan_report+0xdc/0x128 [ 19.548211] kasan_check_range+0x100/0x1a8 [ 19.548384] __kasan_check_write+0x20/0x30 [ 19.548482] kasan_atomics_helper+0x10c0/0x4858 [ 19.548634] kasan_atomics+0x198/0x2e0 [ 19.548742] kunit_try_run_case+0x170/0x3f0 [ 19.548794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.548849] kthread+0x328/0x630 [ 19.548892] ret_from_fork+0x10/0x20 [ 19.549304] [ 19.549366] Allocated by task 265: [ 19.549607] kasan_save_stack+0x3c/0x68 [ 19.549793] kasan_save_track+0x20/0x40 [ 19.549976] kasan_save_alloc_info+0x40/0x58 [ 19.550099] __kasan_kmalloc+0xd4/0xd8 [ 19.550152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.550195] kasan_atomics+0xb8/0x2e0 [ 19.550422] kunit_try_run_case+0x170/0x3f0 [ 19.550626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.551546] kthread+0x328/0x630 [ 19.551638] ret_from_fork+0x10/0x20 [ 19.551703] [ 19.551727] The buggy address belongs to the object at fff00000c7ab9600 [ 19.551727] which belongs to the cache kmalloc-64 of size 64 [ 19.551805] The buggy address is located 0 bytes to the right of [ 19.551805] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.551911] [ 19.552507] The buggy address belongs to the physical page: [ 19.552671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.552729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.552781] page_type: f5(slab) [ 19.552823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.553436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.553513] page dumped because: kasan: bad access detected [ 19.553678] [ 19.553705] Memory state around the buggy address: [ 19.553743] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.553966] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.554033] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.554288] ^ [ 19.554473] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554695] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554961] ================================================================== [ 19.666604] ================================================================== [ 19.666825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.666978] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.667083] [ 19.667118] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.667241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.667271] Hardware name: linux,dummy-virt (DT) [ 19.667473] Call trace: [ 19.667510] show_stack+0x20/0x38 (C) [ 19.667952] dump_stack_lvl+0x8c/0xd0 [ 19.668014] print_report+0x118/0x5d0 [ 19.668116] kasan_report+0xdc/0x128 [ 19.668174] __asan_report_load8_noabort+0x20/0x30 [ 19.668228] kasan_atomics_helper+0x3db0/0x4858 [ 19.668457] kasan_atomics+0x198/0x2e0 [ 19.668792] kunit_try_run_case+0x170/0x3f0 [ 19.669072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.669233] kthread+0x328/0x630 [ 19.669375] ret_from_fork+0x10/0x20 [ 19.669481] [ 19.669559] Allocated by task 265: [ 19.669590] kasan_save_stack+0x3c/0x68 [ 19.669918] kasan_save_track+0x20/0x40 [ 19.670080] kasan_save_alloc_info+0x40/0x58 [ 19.670162] __kasan_kmalloc+0xd4/0xd8 [ 19.670390] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.670607] kasan_atomics+0xb8/0x2e0 [ 19.670677] kunit_try_run_case+0x170/0x3f0 [ 19.670809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.671067] kthread+0x328/0x630 [ 19.671280] ret_from_fork+0x10/0x20 [ 19.671494] [ 19.671706] The buggy address belongs to the object at fff00000c7ab9600 [ 19.671706] which belongs to the cache kmalloc-64 of size 64 [ 19.671840] The buggy address is located 0 bytes to the right of [ 19.671840] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.671911] [ 19.671995] The buggy address belongs to the physical page: [ 19.672378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.672610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.672817] page_type: f5(slab) [ 19.672865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.672920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.672964] page dumped because: kasan: bad access detected [ 19.673465] [ 19.673750] Memory state around the buggy address: [ 19.673860] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.673912] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.674074] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.674259] ^ [ 19.674304] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.674762] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.674918] ================================================================== [ 19.369509] ================================================================== [ 19.369674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.369734] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.369787] [ 19.370102] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.370489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.371303] print_report+0x118/0x5d0 [ 19.372889] kasan_save_alloc_info+0x40/0x58 [ 19.374571] [ 19.375043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.376748] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.378543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.378573] Hardware name: linux,dummy-virt (DT) [ 19.378604] Call trace: [ 19.378629] show_stack+0x20/0x38 (C) [ 19.378951] dump_stack_lvl+0x8c/0xd0 [ 19.379077] print_report+0x118/0x5d0 [ 19.379408] kasan_report+0xdc/0x128 [ 19.379711] kasan_check_range+0x100/0x1a8 [ 19.379908] __kasan_check_write+0x20/0x30 [ 19.380107] kasan_atomics_helper+0x934/0x4858 [ 19.380465] kasan_atomics+0x198/0x2e0 [ 19.380578] kunit_try_run_case+0x170/0x3f0 [ 19.380785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.381000] kthread+0x328/0x630 [ 19.381156] ret_from_fork+0x10/0x20 [ 19.381273] [ 19.381374] Allocated by task 265: [ 19.381406] kasan_save_stack+0x3c/0x68 [ 19.381455] kasan_save_track+0x20/0x40 [ 19.381495] kasan_save_alloc_info+0x40/0x58 [ 19.381536] __kasan_kmalloc+0xd4/0xd8 [ 19.381573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.381615] kasan_atomics+0xb8/0x2e0 [ 19.381652] kunit_try_run_case+0x170/0x3f0 [ 19.381691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.381736] kthread+0x328/0x630 [ 19.381771] ret_from_fork+0x10/0x20 [ 19.381808] [ 19.381829] The buggy address belongs to the object at fff00000c7ab9600 [ 19.381829] which belongs to the cache kmalloc-64 of size 64 [ 19.381887] The buggy address is located 0 bytes to the right of [ 19.381887] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.381952] [ 19.381974] The buggy address belongs to the physical page: [ 19.382007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.382060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.382110] page_type: f5(slab) [ 19.382148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.382201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.382244] page dumped because: kasan: bad access detected [ 19.382278] [ 19.382298] Memory state around the buggy address: [ 19.382354] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.382536] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.382581] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.382646] ^ [ 19.382683] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.382728] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.382767] ================================================================== [ 19.446912] ================================================================== [ 19.447336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.447515] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.447579] [ 19.447623] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.447979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.448264] Hardware name: linux,dummy-virt (DT) [ 19.448349] Call trace: [ 19.448485] show_stack+0x20/0x38 (C) [ 19.448633] dump_stack_lvl+0x8c/0xd0 [ 19.448721] print_report+0x118/0x5d0 [ 19.448866] kasan_report+0xdc/0x128 [ 19.448977] __asan_report_load4_noabort+0x20/0x30 [ 19.449035] kasan_atomics_helper+0x3e04/0x4858 [ 19.449300] kasan_atomics+0x198/0x2e0 [ 19.449504] kunit_try_run_case+0x170/0x3f0 [ 19.449606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449666] kthread+0x328/0x630 [ 19.449712] ret_from_fork+0x10/0x20 [ 19.449781] [ 19.449809] Allocated by task 265: [ 19.449858] kasan_save_stack+0x3c/0x68 [ 19.449921] kasan_save_track+0x20/0x40 [ 19.449970] kasan_save_alloc_info+0x40/0x58 [ 19.450011] __kasan_kmalloc+0xd4/0xd8 [ 19.450056] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.450101] kasan_atomics+0xb8/0x2e0 [ 19.450139] kunit_try_run_case+0x170/0x3f0 [ 19.450179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.450223] kthread+0x328/0x630 [ 19.450259] ret_from_fork+0x10/0x20 [ 19.450297] [ 19.450518] The buggy address belongs to the object at fff00000c7ab9600 [ 19.450518] which belongs to the cache kmalloc-64 of size 64 [ 19.450845] The buggy address is located 0 bytes to the right of [ 19.450845] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.451389] [ 19.451661] The buggy address belongs to the physical page: [ 19.451735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.451828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.452095] page_type: f5(slab) [ 19.452338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.452528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.453448] page dumped because: kasan: bad access detected [ 19.453528] [ 19.453579] Memory state around the buggy address: [ 19.453644] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.453702] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.453778] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.453846] ^ [ 19.453908] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.454406] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.454515] ================================================================== [ 19.728846] ================================================================== [ 19.728902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.729230] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.729394] [ 19.730091] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.730196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.730292] Hardware name: linux,dummy-virt (DT) [ 19.730387] Call trace: [ 19.730532] show_stack+0x20/0x38 (C) [ 19.730652] dump_stack_lvl+0x8c/0xd0 [ 19.730705] print_report+0x118/0x5d0 [ 19.730957] kasan_report+0xdc/0x128 [ 19.731378] kasan_check_range+0x100/0x1a8 [ 19.731669] __kasan_check_write+0x20/0x30 [ 19.732109] kasan_atomics_helper+0x17ec/0x4858 [ 19.732265] kasan_atomics+0x198/0x2e0 [ 19.732438] kunit_try_run_case+0x170/0x3f0 [ 19.732807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.733091] kthread+0x328/0x630 [ 19.733476] ret_from_fork+0x10/0x20 [ 19.733728] [ 19.733951] Allocated by task 265: [ 19.734274] kasan_save_stack+0x3c/0x68 [ 19.734445] kasan_save_track+0x20/0x40 [ 19.734674] kasan_save_alloc_info+0x40/0x58 [ 19.734828] __kasan_kmalloc+0xd4/0xd8 [ 19.735087] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.735296] kasan_atomics+0xb8/0x2e0 [ 19.735376] kunit_try_run_case+0x170/0x3f0 [ 19.735449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.735524] kthread+0x328/0x630 [ 19.735700] ret_from_fork+0x10/0x20 [ 19.735946] [ 19.735991] The buggy address belongs to the object at fff00000c7ab9600 [ 19.735991] which belongs to the cache kmalloc-64 of size 64 [ 19.736440] The buggy address is located 0 bytes to the right of [ 19.736440] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.736626] [ 19.736841] The buggy address belongs to the physical page: [ 19.736910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.737104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.737506] page_type: f5(slab) [ 19.737593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.737812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.737981] page dumped because: kasan: bad access detected [ 19.738268] [ 19.738296] Memory state around the buggy address: [ 19.738353] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738552] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738617] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.738668] ^ [ 19.738724] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738781] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738819] ================================================================== [ 19.539002] ================================================================== [ 19.539063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.539145] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.539379] [ 19.539415] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.539669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.539713] Hardware name: linux,dummy-virt (DT) [ 19.539879] Call trace: [ 19.539915] show_stack+0x20/0x38 (C) [ 19.539970] dump_stack_lvl+0x8c/0xd0 [ 19.540018] print_report+0x118/0x5d0 [ 19.540330] kasan_report+0xdc/0x128 [ 19.540402] kasan_check_range+0x100/0x1a8 [ 19.540455] __kasan_check_write+0x20/0x30 [ 19.540653] kasan_atomics_helper+0x1058/0x4858 [ 19.540935] kasan_atomics+0x198/0x2e0 [ 19.541073] kunit_try_run_case+0x170/0x3f0 [ 19.541122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.541177] kthread+0x328/0x630 [ 19.541221] ret_from_fork+0x10/0x20 [ 19.541808] [ 19.541995] Allocated by task 265: [ 19.542072] kasan_save_stack+0x3c/0x68 [ 19.542604] kasan_save_track+0x20/0x40 [ 19.542672] kasan_save_alloc_info+0x40/0x58 [ 19.542716] __kasan_kmalloc+0xd4/0xd8 [ 19.542911] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.543021] kasan_atomics+0xb8/0x2e0 [ 19.543162] kunit_try_run_case+0x170/0x3f0 [ 19.543237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.543316] kthread+0x328/0x630 [ 19.543391] ret_from_fork+0x10/0x20 [ 19.543441] [ 19.543475] The buggy address belongs to the object at fff00000c7ab9600 [ 19.543475] which belongs to the cache kmalloc-64 of size 64 [ 19.543544] The buggy address is located 0 bytes to the right of [ 19.543544] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.543609] [ 19.543630] The buggy address belongs to the physical page: [ 19.543664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.543735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.543786] page_type: f5(slab) [ 19.543823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.543886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.543953] page dumped because: kasan: bad access detected [ 19.543995] [ 19.544064] Memory state around the buggy address: [ 19.544110] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544158] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544203] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.544250] ^ [ 19.544291] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544813] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.545247] ================================================================== [ 19.558025] ================================================================== [ 19.558148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.558249] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.558301] [ 19.558351] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.558482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.558540] Hardware name: linux,dummy-virt (DT) [ 19.558575] Call trace: [ 19.558602] show_stack+0x20/0x38 (C) [ 19.558698] dump_stack_lvl+0x8c/0xd0 [ 19.558751] print_report+0x118/0x5d0 [ 19.558806] kasan_report+0xdc/0x128 [ 19.558862] kasan_check_range+0x100/0x1a8 [ 19.558911] __kasan_check_write+0x20/0x30 [ 19.558957] kasan_atomics_helper+0x1128/0x4858 [ 19.559007] kasan_atomics+0x198/0x2e0 [ 19.559052] kunit_try_run_case+0x170/0x3f0 [ 19.559100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.559152] kthread+0x328/0x630 [ 19.559196] ret_from_fork+0x10/0x20 [ 19.559244] [ 19.559266] Allocated by task 265: [ 19.559294] kasan_save_stack+0x3c/0x68 [ 19.559349] kasan_save_track+0x20/0x40 [ 19.559388] kasan_save_alloc_info+0x40/0x58 [ 19.559440] __kasan_kmalloc+0xd4/0xd8 [ 19.559478] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.559519] kasan_atomics+0xb8/0x2e0 [ 19.559571] kunit_try_run_case+0x170/0x3f0 [ 19.559616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.559663] kthread+0x328/0x630 [ 19.559705] ret_from_fork+0x10/0x20 [ 19.559752] [ 19.559775] The buggy address belongs to the object at fff00000c7ab9600 [ 19.559775] which belongs to the cache kmalloc-64 of size 64 [ 19.559843] The buggy address is located 0 bytes to the right of [ 19.559843] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.559910] [ 19.559940] The buggy address belongs to the physical page: [ 19.559983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.560037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.560088] page_type: f5(slab) [ 19.560127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.560184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.560232] page dumped because: kasan: bad access detected [ 19.560267] [ 19.560287] Memory state around the buggy address: [ 19.560685] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.560809] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.560857] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.561911] ^ [ 19.561978] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.562046] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.562112] ================================================================== [ 19.487553] ================================================================== [ 19.487608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.487660] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.487856] [ 19.488303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.488638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.488842] Hardware name: linux,dummy-virt (DT) [ 19.488993] Call trace: [ 19.489096] show_stack+0x20/0x38 (C) [ 19.489289] dump_stack_lvl+0x8c/0xd0 [ 19.489362] print_report+0x118/0x5d0 [ 19.489606] kasan_report+0xdc/0x128 [ 19.489725] __asan_report_store8_noabort+0x20/0x30 [ 19.489953] kasan_atomics_helper+0x3e5c/0x4858 [ 19.490121] kasan_atomics+0x198/0x2e0 [ 19.490174] kunit_try_run_case+0x170/0x3f0 [ 19.490225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490278] kthread+0x328/0x630 [ 19.490776] ret_from_fork+0x10/0x20 [ 19.491413] [ 19.491463] Allocated by task 265: [ 19.491645] kasan_save_stack+0x3c/0x68 [ 19.492047] kasan_save_track+0x20/0x40 [ 19.492172] kasan_save_alloc_info+0x40/0x58 [ 19.492250] __kasan_kmalloc+0xd4/0xd8 [ 19.492292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.492510] kasan_atomics+0xb8/0x2e0 [ 19.492834] kunit_try_run_case+0x170/0x3f0 [ 19.492945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.493099] kthread+0x328/0x630 [ 19.493140] ret_from_fork+0x10/0x20 [ 19.493485] [ 19.493609] The buggy address belongs to the object at fff00000c7ab9600 [ 19.493609] which belongs to the cache kmalloc-64 of size 64 [ 19.493960] The buggy address is located 0 bytes to the right of [ 19.493960] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.494303] [ 19.494603] The buggy address belongs to the physical page: [ 19.494650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.494848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.495002] page_type: f5(slab) [ 19.495145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.495216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.495266] page dumped because: kasan: bad access detected [ 19.495302] [ 19.495335] Memory state around the buggy address: [ 19.495376] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.495424] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.495477] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.495517] ^ [ 19.495560] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.495621] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.495663] ================================================================== [ 19.593963] ================================================================== [ 19.594076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.594171] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.594345] [ 19.594385] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.594471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.594825] Hardware name: linux,dummy-virt (DT) [ 19.594917] Call trace: [ 19.595101] show_stack+0x20/0x38 (C) [ 19.595290] dump_stack_lvl+0x8c/0xd0 [ 19.595410] print_report+0x118/0x5d0 [ 19.595463] kasan_report+0xdc/0x128 [ 19.595549] kasan_check_range+0x100/0x1a8 [ 19.595778] __kasan_check_write+0x20/0x30 [ 19.595995] kasan_atomics_helper+0x12d8/0x4858 [ 19.596064] kasan_atomics+0x198/0x2e0 [ 19.596330] kunit_try_run_case+0x170/0x3f0 [ 19.596411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.596606] kthread+0x328/0x630 [ 19.596700] ret_from_fork+0x10/0x20 [ 19.596838] [ 19.596870] Allocated by task 265: [ 19.596907] kasan_save_stack+0x3c/0x68 [ 19.597424] kasan_save_track+0x20/0x40 [ 19.597672] kasan_save_alloc_info+0x40/0x58 [ 19.597749] __kasan_kmalloc+0xd4/0xd8 [ 19.597924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.598386] kasan_atomics+0xb8/0x2e0 [ 19.598493] kunit_try_run_case+0x170/0x3f0 [ 19.598557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.598892] kthread+0x328/0x630 [ 19.599035] ret_from_fork+0x10/0x20 [ 19.599702] [ 19.599898] The buggy address belongs to the object at fff00000c7ab9600 [ 19.599898] which belongs to the cache kmalloc-64 of size 64 [ 19.600471] The buggy address is located 0 bytes to the right of [ 19.600471] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.600557] [ 19.600582] The buggy address belongs to the physical page: [ 19.600617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.600672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.600730] page_type: f5(slab) [ 19.601068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.601127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.601306] page dumped because: kasan: bad access detected [ 19.601362] [ 19.601403] Memory state around the buggy address: [ 19.601469] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.601530] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.601576] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.601616] ^ [ 19.601659] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.601719] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.601757] ================================================================== [ 19.496138] ================================================================== [ 19.496199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.496250] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.496317] [ 19.496361] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.496904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.497366] Hardware name: linux,dummy-virt (DT) [ 19.497403] Call trace: [ 19.497427] show_stack+0x20/0x38 (C) [ 19.497483] dump_stack_lvl+0x8c/0xd0 [ 19.497583] print_report+0x118/0x5d0 [ 19.497867] kasan_report+0xdc/0x128 [ 19.498167] kasan_check_range+0x100/0x1a8 [ 19.498294] __kasan_check_write+0x20/0x30 [ 19.498519] kasan_atomics_helper+0xeb8/0x4858 [ 19.498655] kasan_atomics+0x198/0x2e0 [ 19.498943] kunit_try_run_case+0x170/0x3f0 [ 19.499211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.499569] kthread+0x328/0x630 [ 19.499729] ret_from_fork+0x10/0x20 [ 19.499846] [ 19.500203] Allocated by task 265: [ 19.500423] kasan_save_stack+0x3c/0x68 [ 19.500715] kasan_save_track+0x20/0x40 [ 19.500984] kasan_save_alloc_info+0x40/0x58 [ 19.501147] __kasan_kmalloc+0xd4/0xd8 [ 19.501336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.501443] kasan_atomics+0xb8/0x2e0 [ 19.501597] kunit_try_run_case+0x170/0x3f0 [ 19.501734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.501815] kthread+0x328/0x630 [ 19.501849] ret_from_fork+0x10/0x20 [ 19.502054] [ 19.502196] The buggy address belongs to the object at fff00000c7ab9600 [ 19.502196] which belongs to the cache kmalloc-64 of size 64 [ 19.502364] The buggy address is located 0 bytes to the right of [ 19.502364] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.502831] [ 19.502871] The buggy address belongs to the physical page: [ 19.503111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.503459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.503643] page_type: f5(slab) [ 19.503747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.503969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.504182] page dumped because: kasan: bad access detected [ 19.504427] [ 19.504498] Memory state around the buggy address: [ 19.504809] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.505014] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.505427] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.505625] ^ [ 19.505860] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506022] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506135] ================================================================== [ 19.466751] ================================================================== [ 19.466804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.466858] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.466909] [ 19.467117] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.467338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.467371] Hardware name: linux,dummy-virt (DT) [ 19.467405] Call trace: [ 19.467429] show_stack+0x20/0x38 (C) [ 19.467488] dump_stack_lvl+0x8c/0xd0 [ 19.467538] print_report+0x118/0x5d0 [ 19.467593] kasan_report+0xdc/0x128 [ 19.467650] __asan_report_load8_noabort+0x20/0x30 [ 19.467704] kasan_atomics_helper+0x3f58/0x4858 [ 19.467752] kasan_atomics+0x198/0x2e0 [ 19.467801] kunit_try_run_case+0x170/0x3f0 [ 19.467852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.467908] kthread+0x328/0x630 [ 19.467951] ret_from_fork+0x10/0x20 [ 19.468000] [ 19.468021] Allocated by task 265: [ 19.468068] kasan_save_stack+0x3c/0x68 [ 19.468120] kasan_save_track+0x20/0x40 [ 19.468175] kasan_save_alloc_info+0x40/0x58 [ 19.468217] __kasan_kmalloc+0xd4/0xd8 [ 19.468256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.468297] kasan_atomics+0xb8/0x2e0 [ 19.468804] kunit_try_run_case+0x170/0x3f0 [ 19.469076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.470020] kthread+0x328/0x630 [ 19.470094] ret_from_fork+0x10/0x20 [ 19.470157] [ 19.470218] The buggy address belongs to the object at fff00000c7ab9600 [ 19.470218] which belongs to the cache kmalloc-64 of size 64 [ 19.470505] The buggy address is located 0 bytes to the right of [ 19.470505] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.470796] [ 19.471207] The buggy address belongs to the physical page: [ 19.471419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.471795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.471879] page_type: f5(slab) [ 19.472408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.472472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.472514] page dumped because: kasan: bad access detected [ 19.473263] [ 19.473384] Memory state around the buggy address: [ 19.473519] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.473788] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.474152] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.474297] ^ [ 19.474390] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474441] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474479] ================================================================== [ 19.574119] ================================================================== [ 19.574183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.574439] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.574501] [ 19.574622] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.574711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.574740] Hardware name: linux,dummy-virt (DT) [ 19.574844] Call trace: [ 19.574872] show_stack+0x20/0x38 (C) [ 19.574926] dump_stack_lvl+0x8c/0xd0 [ 19.574983] print_report+0x118/0x5d0 [ 19.575030] kasan_report+0xdc/0x128 [ 19.575336] kasan_check_range+0x100/0x1a8 [ 19.575742] __kasan_check_write+0x20/0x30 [ 19.575861] kasan_atomics_helper+0x11f8/0x4858 [ 19.575994] kasan_atomics+0x198/0x2e0 [ 19.576241] kunit_try_run_case+0x170/0x3f0 [ 19.576494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.576712] kthread+0x328/0x630 [ 19.576798] ret_from_fork+0x10/0x20 [ 19.577044] [ 19.577155] Allocated by task 265: [ 19.577234] kasan_save_stack+0x3c/0x68 [ 19.577578] kasan_save_track+0x20/0x40 [ 19.577827] kasan_save_alloc_info+0x40/0x58 [ 19.577911] __kasan_kmalloc+0xd4/0xd8 [ 19.578342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.578449] kasan_atomics+0xb8/0x2e0 [ 19.578790] kunit_try_run_case+0x170/0x3f0 [ 19.579005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.579103] kthread+0x328/0x630 [ 19.579287] ret_from_fork+0x10/0x20 [ 19.579472] [ 19.579526] The buggy address belongs to the object at fff00000c7ab9600 [ 19.579526] which belongs to the cache kmalloc-64 of size 64 [ 19.579860] The buggy address is located 0 bytes to the right of [ 19.579860] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.579963] [ 19.580094] The buggy address belongs to the physical page: [ 19.580183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.580262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.580314] page_type: f5(slab) [ 19.580367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.580430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.580472] page dumped because: kasan: bad access detected [ 19.580516] [ 19.580537] Memory state around the buggy address: [ 19.580578] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.580624] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.580669] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.580717] ^ [ 19.580752] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.580796] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.580835] ================================================================== [ 19.684157] ================================================================== [ 19.684249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.684438] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.684513] [ 19.684709] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.684967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.685020] Hardware name: linux,dummy-virt (DT) [ 19.685177] Call trace: [ 19.685254] show_stack+0x20/0x38 (C) [ 19.685328] dump_stack_lvl+0x8c/0xd0 [ 19.685572] print_report+0x118/0x5d0 [ 19.685919] kasan_report+0xdc/0x128 [ 19.686199] __asan_report_load8_noabort+0x20/0x30 [ 19.686426] kasan_atomics_helper+0x3df4/0x4858 [ 19.686565] kasan_atomics+0x198/0x2e0 [ 19.686619] kunit_try_run_case+0x170/0x3f0 [ 19.686677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.686746] kthread+0x328/0x630 [ 19.686808] ret_from_fork+0x10/0x20 [ 19.686867] [ 19.686897] Allocated by task 265: [ 19.686942] kasan_save_stack+0x3c/0x68 [ 19.686995] kasan_save_track+0x20/0x40 [ 19.687045] kasan_save_alloc_info+0x40/0x58 [ 19.687086] __kasan_kmalloc+0xd4/0xd8 [ 19.687135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.687191] kasan_atomics+0xb8/0x2e0 [ 19.687227] kunit_try_run_case+0x170/0x3f0 [ 19.687276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.687332] kthread+0x328/0x630 [ 19.687374] ret_from_fork+0x10/0x20 [ 19.687413] [ 19.687449] The buggy address belongs to the object at fff00000c7ab9600 [ 19.687449] which belongs to the cache kmalloc-64 of size 64 [ 19.687510] The buggy address is located 0 bytes to the right of [ 19.687510] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.687577] [ 19.687607] The buggy address belongs to the physical page: [ 19.687639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.687702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.687755] page_type: f5(slab) [ 19.687794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.687857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.687915] page dumped because: kasan: bad access detected [ 19.687950] [ 19.687969] Memory state around the buggy address: [ 19.688003] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.688058] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.688105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.688145] ^ [ 19.688197] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688254] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688302] ================================================================== [ 19.690616] ================================================================== [ 19.690679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.690732] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.690965] [ 19.691027] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.691121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.691149] Hardware name: linux,dummy-virt (DT) [ 19.691477] Call trace: [ 19.691530] show_stack+0x20/0x38 (C) [ 19.691957] dump_stack_lvl+0x8c/0xd0 [ 19.692034] print_report+0x118/0x5d0 [ 19.692238] kasan_report+0xdc/0x128 [ 19.692398] kasan_check_range+0x100/0x1a8 [ 19.692616] __kasan_check_write+0x20/0x30 [ 19.692729] kasan_atomics_helper+0x16d0/0x4858 [ 19.692938] kasan_atomics+0x198/0x2e0 [ 19.693130] kunit_try_run_case+0x170/0x3f0 [ 19.693233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.693406] kthread+0x328/0x630 [ 19.693478] ret_from_fork+0x10/0x20 [ 19.693551] [ 19.693572] Allocated by task 265: [ 19.693788] kasan_save_stack+0x3c/0x68 [ 19.693997] kasan_save_track+0x20/0x40 [ 19.694069] kasan_save_alloc_info+0x40/0x58 [ 19.694475] __kasan_kmalloc+0xd4/0xd8 [ 19.694559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.694751] kasan_atomics+0xb8/0x2e0 [ 19.694842] kunit_try_run_case+0x170/0x3f0 [ 19.694890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.695130] kthread+0x328/0x630 [ 19.695351] ret_from_fork+0x10/0x20 [ 19.695913] [ 19.696222] The buggy address belongs to the object at fff00000c7ab9600 [ 19.696222] which belongs to the cache kmalloc-64 of size 64 [ 19.696332] The buggy address is located 0 bytes to the right of [ 19.696332] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.696509] [ 19.696705] The buggy address belongs to the physical page: [ 19.696893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.696979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.697316] page_type: f5(slab) [ 19.697450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.697881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.698263] page dumped because: kasan: bad access detected [ 19.698436] [ 19.698542] Memory state around the buggy address: [ 19.698891] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.699021] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.699072] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.699533] ^ [ 19.699797] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700114] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700200] ================================================================== [ 19.582710] ================================================================== [ 19.582772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.582899] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.582974] [ 19.583173] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.583716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.583872] Hardware name: linux,dummy-virt (DT) [ 19.583905] Call trace: [ 19.583932] show_stack+0x20/0x38 (C) [ 19.583985] dump_stack_lvl+0x8c/0xd0 [ 19.584035] print_report+0x118/0x5d0 [ 19.584081] kasan_report+0xdc/0x128 [ 19.584128] kasan_check_range+0x100/0x1a8 [ 19.584183] __kasan_check_write+0x20/0x30 [ 19.584230] kasan_atomics_helper+0x126c/0x4858 [ 19.584280] kasan_atomics+0x198/0x2e0 [ 19.584336] kunit_try_run_case+0x170/0x3f0 [ 19.586054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.586433] kthread+0x328/0x630 [ 19.586541] ret_from_fork+0x10/0x20 [ 19.586686] [ 19.586822] Allocated by task 265: [ 19.586884] kasan_save_stack+0x3c/0x68 [ 19.586941] kasan_save_track+0x20/0x40 [ 19.587169] kasan_save_alloc_info+0x40/0x58 [ 19.587299] __kasan_kmalloc+0xd4/0xd8 [ 19.587409] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.587887] kasan_atomics+0xb8/0x2e0 [ 19.588203] kunit_try_run_case+0x170/0x3f0 [ 19.588280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.588365] kthread+0x328/0x630 [ 19.588448] ret_from_fork+0x10/0x20 [ 19.588490] [ 19.588513] The buggy address belongs to the object at fff00000c7ab9600 [ 19.588513] which belongs to the cache kmalloc-64 of size 64 [ 19.588934] The buggy address is located 0 bytes to the right of [ 19.588934] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.589235] [ 19.589276] The buggy address belongs to the physical page: [ 19.589312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.589378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.589862] page_type: f5(slab) [ 19.590174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.590363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.590419] page dumped because: kasan: bad access detected [ 19.590813] [ 19.590864] Memory state around the buggy address: [ 19.591355] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591414] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591756] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.592165] ^ [ 19.592308] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.592370] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.592410] ================================================================== [ 19.429102] ================================================================== [ 19.429179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.429275] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.429408] [ 19.429441] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.429529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.429585] Hardware name: linux,dummy-virt (DT) [ 19.429617] Call trace: [ 19.429640] show_stack+0x20/0x38 (C) [ 19.429716] dump_stack_lvl+0x8c/0xd0 [ 19.429765] print_report+0x118/0x5d0 [ 19.429971] kasan_report+0xdc/0x128 [ 19.430021] __asan_report_load4_noabort+0x20/0x30 [ 19.430076] kasan_atomics_helper+0x3dd8/0x4858 [ 19.430127] kasan_atomics+0x198/0x2e0 [ 19.430174] kunit_try_run_case+0x170/0x3f0 [ 19.430234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430379] kthread+0x328/0x630 [ 19.430472] ret_from_fork+0x10/0x20 [ 19.430541] [ 19.430564] Allocated by task 265: [ 19.430593] kasan_save_stack+0x3c/0x68 [ 19.430636] kasan_save_track+0x20/0x40 [ 19.430676] kasan_save_alloc_info+0x40/0x58 [ 19.430718] __kasan_kmalloc+0xd4/0xd8 [ 19.430766] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.430807] kasan_atomics+0xb8/0x2e0 [ 19.430846] kunit_try_run_case+0x170/0x3f0 [ 19.430896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430952] kthread+0x328/0x630 [ 19.430988] ret_from_fork+0x10/0x20 [ 19.431038] [ 19.431062] The buggy address belongs to the object at fff00000c7ab9600 [ 19.431062] which belongs to the cache kmalloc-64 of size 64 [ 19.431121] The buggy address is located 0 bytes to the right of [ 19.431121] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.431187] [ 19.431210] The buggy address belongs to the physical page: [ 19.431245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.431300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.431359] page_type: f5(slab) [ 19.431397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.431459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.431510] page dumped because: kasan: bad access detected [ 19.431542] [ 19.431563] Memory state around the buggy address: [ 19.431594] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.431640] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.431689] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.431728] ^ [ 19.431764] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.431809] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.431857] ================================================================== [ 19.652009] ================================================================== [ 19.652439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.652519] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.652817] [ 19.652862] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.653260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.653315] Hardware name: linux,dummy-virt (DT) [ 19.653364] Call trace: [ 19.653389] show_stack+0x20/0x38 (C) [ 19.653444] dump_stack_lvl+0x8c/0xd0 [ 19.653493] print_report+0x118/0x5d0 [ 19.653922] kasan_report+0xdc/0x128 [ 19.653994] kasan_check_range+0x100/0x1a8 [ 19.654194] __kasan_check_write+0x20/0x30 [ 19.654380] kasan_atomics_helper+0x154c/0x4858 [ 19.654516] kasan_atomics+0x198/0x2e0 [ 19.654590] kunit_try_run_case+0x170/0x3f0 [ 19.654651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.654705] kthread+0x328/0x630 [ 19.654775] ret_from_fork+0x10/0x20 [ 19.654841] [ 19.654867] Allocated by task 265: [ 19.654918] kasan_save_stack+0x3c/0x68 [ 19.654983] kasan_save_track+0x20/0x40 [ 19.655024] kasan_save_alloc_info+0x40/0x58 [ 19.655064] __kasan_kmalloc+0xd4/0xd8 [ 19.655122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.655165] kasan_atomics+0xb8/0x2e0 [ 19.655204] kunit_try_run_case+0x170/0x3f0 [ 19.655242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655287] kthread+0x328/0x630 [ 19.655343] ret_from_fork+0x10/0x20 [ 19.655381] [ 19.655404] The buggy address belongs to the object at fff00000c7ab9600 [ 19.655404] which belongs to the cache kmalloc-64 of size 64 [ 19.655465] The buggy address is located 0 bytes to the right of [ 19.655465] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.655551] [ 19.655588] The buggy address belongs to the physical page: [ 19.655630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.655708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.655758] page_type: f5(slab) [ 19.655798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.655851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.655894] page dumped because: kasan: bad access detected [ 19.655944] [ 19.655972] Memory state around the buggy address: [ 19.656015] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656060] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.656164] ^ [ 19.656206] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.656258] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.656329] ================================================================== [ 19.519108] ================================================================== [ 19.519162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.519214] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.519267] [ 19.519302] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.519400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.519429] Hardware name: linux,dummy-virt (DT) [ 19.519460] Call trace: [ 19.519797] show_stack+0x20/0x38 (C) [ 19.519890] dump_stack_lvl+0x8c/0xd0 [ 19.519941] print_report+0x118/0x5d0 [ 19.519998] kasan_report+0xdc/0x128 [ 19.520055] kasan_check_range+0x100/0x1a8 [ 19.520104] __kasan_check_write+0x20/0x30 [ 19.520157] kasan_atomics_helper+0xf88/0x4858 [ 19.520207] kasan_atomics+0x198/0x2e0 [ 19.520252] kunit_try_run_case+0x170/0x3f0 [ 19.520300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.520891] kthread+0x328/0x630 [ 19.521080] ret_from_fork+0x10/0x20 [ 19.521159] [ 19.521188] Allocated by task 265: [ 19.521221] kasan_save_stack+0x3c/0x68 [ 19.521264] kasan_save_track+0x20/0x40 [ 19.521305] kasan_save_alloc_info+0x40/0x58 [ 19.521356] __kasan_kmalloc+0xd4/0xd8 [ 19.521395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.521989] kasan_atomics+0xb8/0x2e0 [ 19.522181] kunit_try_run_case+0x170/0x3f0 [ 19.522254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.522644] kthread+0x328/0x630 [ 19.522857] ret_from_fork+0x10/0x20 [ 19.523004] [ 19.523251] The buggy address belongs to the object at fff00000c7ab9600 [ 19.523251] which belongs to the cache kmalloc-64 of size 64 [ 19.523388] The buggy address is located 0 bytes to the right of [ 19.523388] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.523832] [ 19.523873] The buggy address belongs to the physical page: [ 19.524006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.524107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.524293] page_type: f5(slab) [ 19.524410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.524874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.524944] page dumped because: kasan: bad access detected [ 19.524979] [ 19.525000] Memory state around the buggy address: [ 19.525038] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525084] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525374] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.525915] ^ [ 19.526094] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526176] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526564] ================================================================== [ 19.632706] ================================================================== [ 19.632903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.632996] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.633148] [ 19.633216] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.633378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.633433] Hardware name: linux,dummy-virt (DT) [ 19.633475] Call trace: [ 19.633501] show_stack+0x20/0x38 (C) [ 19.633792] dump_stack_lvl+0x8c/0xd0 [ 19.633962] print_report+0x118/0x5d0 [ 19.634368] kasan_report+0xdc/0x128 [ 19.634514] kasan_check_range+0x100/0x1a8 [ 19.634619] __kasan_check_write+0x20/0x30 [ 19.634696] kasan_atomics_helper+0x147c/0x4858 [ 19.635106] kasan_atomics+0x198/0x2e0 [ 19.635350] kunit_try_run_case+0x170/0x3f0 [ 19.635712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.635837] kthread+0x328/0x630 [ 19.635908] ret_from_fork+0x10/0x20 [ 19.636327] [ 19.636380] Allocated by task 265: [ 19.636619] kasan_save_stack+0x3c/0x68 [ 19.636690] kasan_save_track+0x20/0x40 [ 19.637006] kasan_save_alloc_info+0x40/0x58 [ 19.637118] __kasan_kmalloc+0xd4/0xd8 [ 19.637285] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.637346] kasan_atomics+0xb8/0x2e0 [ 19.637497] kunit_try_run_case+0x170/0x3f0 [ 19.637546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637666] kthread+0x328/0x630 [ 19.637913] ret_from_fork+0x10/0x20 [ 19.637981] [ 19.638015] The buggy address belongs to the object at fff00000c7ab9600 [ 19.638015] which belongs to the cache kmalloc-64 of size 64 [ 19.638082] The buggy address is located 0 bytes to the right of [ 19.638082] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.638148] [ 19.638172] The buggy address belongs to the physical page: [ 19.638206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.638271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.638333] page_type: f5(slab) [ 19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.638775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.639005] page dumped because: kasan: bad access detected [ 19.639080] [ 19.639287] Memory state around the buggy address: [ 19.639435] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.639581] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.639953] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.640027] ^ [ 19.640296] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.640372] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.640412] ================================================================== [ 19.642504] ================================================================== [ 19.642794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.642986] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.643050] [ 19.643086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.643297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.643364] Hardware name: linux,dummy-virt (DT) [ 19.643400] Call trace: [ 19.643712] show_stack+0x20/0x38 (C) [ 19.643976] dump_stack_lvl+0x8c/0xd0 [ 19.644232] print_report+0x118/0x5d0 [ 19.644300] kasan_report+0xdc/0x128 [ 19.644427] kasan_check_range+0x100/0x1a8 [ 19.644482] __kasan_check_write+0x20/0x30 [ 19.644692] kasan_atomics_helper+0x14e4/0x4858 [ 19.644750] kasan_atomics+0x198/0x2e0 [ 19.644798] kunit_try_run_case+0x170/0x3f0 [ 19.644846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.644900] kthread+0x328/0x630 [ 19.645595] ret_from_fork+0x10/0x20 [ 19.645746] [ 19.645812] Allocated by task 265: [ 19.645853] kasan_save_stack+0x3c/0x68 [ 19.645904] kasan_save_track+0x20/0x40 [ 19.645945] kasan_save_alloc_info+0x40/0x58 [ 19.646002] __kasan_kmalloc+0xd4/0xd8 [ 19.646041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.646092] kasan_atomics+0xb8/0x2e0 [ 19.646139] kunit_try_run_case+0x170/0x3f0 [ 19.646187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.646233] kthread+0x328/0x630 [ 19.646268] ret_from_fork+0x10/0x20 [ 19.646305] [ 19.646704] The buggy address belongs to the object at fff00000c7ab9600 [ 19.646704] which belongs to the cache kmalloc-64 of size 64 [ 19.646777] The buggy address is located 0 bytes to the right of [ 19.646777] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.647632] [ 19.647867] The buggy address belongs to the physical page: [ 19.647935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.648027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.648101] page_type: f5(slab) [ 19.648373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.648578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.648956] page dumped because: kasan: bad access detected [ 19.649267] [ 19.649394] Memory state around the buggy address: [ 19.649682] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.649855] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.650011] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.650059] ^ [ 19.650113] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650338] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650859] ================================================================== [ 19.383243] ================================================================== [ 19.383299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.383365] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.383417] [ 19.383450] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.383533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.383563] Hardware name: linux,dummy-virt (DT) [ 19.383596] Call trace: [ 19.383621] show_stack+0x20/0x38 (C) [ 19.383668] dump_stack_lvl+0x8c/0xd0 [ 19.383716] print_report+0x118/0x5d0 [ 19.383765] kasan_report+0xdc/0x128 [ 19.383831] kasan_check_range+0x100/0x1a8 [ 19.383943] __kasan_check_write+0x20/0x30 [ 19.384012] kasan_atomics_helper+0x99c/0x4858 [ 19.384062] kasan_atomics+0x198/0x2e0 [ 19.384109] kunit_try_run_case+0x170/0x3f0 [ 19.384162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.384225] kthread+0x328/0x630 [ 19.384270] ret_from_fork+0x10/0x20 [ 19.384328] [ 19.384349] Allocated by task 265: [ 19.384387] kasan_save_stack+0x3c/0x68 [ 19.384440] kasan_save_track+0x20/0x40 [ 19.384515] kasan_save_alloc_info+0x40/0x58 [ 19.384562] __kasan_kmalloc+0xd4/0xd8 [ 19.384601] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.384643] kasan_atomics+0xb8/0x2e0 [ 19.384681] kunit_try_run_case+0x170/0x3f0 [ 19.384720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.384766] kthread+0x328/0x630 [ 19.384800] ret_from_fork+0x10/0x20 [ 19.384838] [ 19.384859] The buggy address belongs to the object at fff00000c7ab9600 [ 19.384859] which belongs to the cache kmalloc-64 of size 64 [ 19.384917] The buggy address is located 0 bytes to the right of [ 19.384917] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.385034] [ 19.385122] The buggy address belongs to the physical page: [ 19.385162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.385287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.385472] page_type: f5(slab) [ 19.385512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.385567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.385608] page dumped because: kasan: bad access detected [ 19.385643] [ 19.385663] Memory state around the buggy address: [ 19.385698] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.386804] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.387914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.387968] kthread+0x328/0x630 [ 19.388012] ret_from_fork+0x10/0x20 [ 19.388059] [ 19.388080] Allocated by task 265: [ 19.388120] kasan_save_stack+0x3c/0x68 [ 19.388169] kasan_save_track+0x20/0x40 [ 19.388209] kasan_save_alloc_info+0x40/0x58 [ 19.388250] __kasan_kmalloc+0xd4/0xd8 [ 19.388432] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.388500] kasan_atomics+0xb8/0x2e0 [ 19.388540] kunit_try_run_case+0x170/0x3f0 [ 19.388580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388626] kthread+0x328/0x630 [ 19.388660] ret_from_fork+0x10/0x20 [ 19.388696] [ 19.388718] The buggy address belongs to the object at fff00000c7ab9600 [ 19.388718] which belongs to the cache kmalloc-64 of size 64 [ 19.388776] The buggy address is located 0 bytes to the right of [ 19.388776] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.388842] [ 19.388885] The buggy address belongs to the physical page: [ 19.388920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.388972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.389021] page_type: f5(slab) [ 19.389059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.389110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.389152] page dumped because: kasan: bad access detected [ 19.389186] [ 19.389205] Memory state around the buggy address: [ 19.389508] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.390473] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.391380] __kasan_check_write+0x20/0x30 [ 19.391904] [ 19.391943] Allocated by task 265: [ 19.392001] kasan_save_stack+0x3c/0x68 [ 19.392046] kasan_save_track+0x20/0x40 [ 19.392118] kasan_save_alloc_info+0x40/0x58 [ 19.392196] __kasan_kmalloc+0xd4/0xd8 [ 19.392281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.392332] kasan_atomics+0xb8/0x2e0 [ 19.392379] kunit_try_run_case+0x170/0x3f0 [ 19.392419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.392473] kthread+0x328/0x630 [ 19.392539] ret_from_fork+0x10/0x20 [ 19.392576] [ 19.392599] The buggy address belongs to the object at fff00000c7ab9600 [ 19.392599] which belongs to the cache kmalloc-64 of size 64 [ 19.392776] The buggy address is located 0 bytes to the right of [ 19.392776] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.392919] [ 19.393047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.394087] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394315] ================================================================== [ 19.719765] ================================================================== [ 19.720143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.720218] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.720507] [ 19.720806] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.720938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.721235] Hardware name: linux,dummy-virt (DT) [ 19.721292] Call trace: [ 19.721316] show_stack+0x20/0x38 (C) [ 19.721383] dump_stack_lvl+0x8c/0xd0 [ 19.721834] print_report+0x118/0x5d0 [ 19.722302] kasan_report+0xdc/0x128 [ 19.722731] __asan_report_load8_noabort+0x20/0x30 [ 19.722897] kasan_atomics_helper+0x3e20/0x4858 [ 19.723057] kasan_atomics+0x198/0x2e0 [ 19.723199] kunit_try_run_case+0x170/0x3f0 [ 19.723250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.723492] kthread+0x328/0x630 [ 19.723704] ret_from_fork+0x10/0x20 [ 19.723988] [ 19.724148] Allocated by task 265: [ 19.724197] kasan_save_stack+0x3c/0x68 [ 19.724444] kasan_save_track+0x20/0x40 [ 19.724646] kasan_save_alloc_info+0x40/0x58 [ 19.725130] __kasan_kmalloc+0xd4/0xd8 [ 19.725297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.725412] kasan_atomics+0xb8/0x2e0 [ 19.725451] kunit_try_run_case+0x170/0x3f0 [ 19.725492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.725536] kthread+0x328/0x630 [ 19.725572] ret_from_fork+0x10/0x20 [ 19.725608] [ 19.725925] The buggy address belongs to the object at fff00000c7ab9600 [ 19.725925] which belongs to the cache kmalloc-64 of size 64 [ 19.726412] The buggy address is located 0 bytes to the right of [ 19.726412] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.726499] [ 19.726522] The buggy address belongs to the physical page: [ 19.727100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.727185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.727249] page_type: f5(slab) [ 19.727303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.727368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.727422] page dumped because: kasan: bad access detected [ 19.727457] [ 19.727487] Memory state around the buggy address: [ 19.727532] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727585] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727641] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.727681] ^ [ 19.727717] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727763] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727812] ================================================================== [ 19.273888] ================================================================== [ 19.274899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 19.276181] kasan_atomics_helper+0x414/0x4858 [ 19.276240] kasan_atomics+0x198/0x2e0 [ 19.276845] [ 19.278895] __kasan_kmalloc+0xd4/0xd8 [ 19.281364] The buggy address is located 0 bytes to the right of [ 19.281364] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.281786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.283145] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.284038] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.286315] Hardware name: linux,dummy-virt (DT) [ 19.287051] [ 19.288765] [ 19.289707] [ 19.289944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.291719] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.292690] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.295024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.295819] kasan_report+0xdc/0x128 [ 19.296866] kthread+0x328/0x630 [ 19.297656] kasan_save_track+0x20/0x40 [ 19.298091] kunit_try_run_case+0x170/0x3f0 [ 19.299615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.300157] page dumped because: kasan: bad access detected [ 19.301013] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.303655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 19.304391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.305344] __kasan_check_write+0x20/0x30 [ 19.305834] kasan_save_alloc_info+0x40/0x58 [ 19.306042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.306372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.306571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.306866] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.307110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 19.307778] print_report+0x118/0x5d0 [ 19.308821] __kasan_check_write+0x20/0x30 [ 19.309505] kthread+0x328/0x630 [ 19.309878] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.310115] ret_from_fork+0x10/0x20 [ 19.311844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.313272] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.314128] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.315898] [ 19.316440] __kasan_check_write+0x20/0x30 [ 19.318665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.320201] [ 19.320230] The buggy address belongs to the physical page: [ 19.320403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.320663] page dumped because: kasan: bad access detected [ 19.320803] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.321052] ================================================================== [ 19.431979] ================================================================== [ 19.432020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.432065] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.432115] [ 19.432144] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.432235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.432262] Hardware name: linux,dummy-virt (DT) [ 19.432295] Call trace: [ 19.436129] show_stack+0x20/0x38 (C) [ 19.436335] dump_stack_lvl+0x8c/0xd0 [ 19.436392] print_report+0x118/0x5d0 [ 19.436830] kasan_report+0xdc/0x128 [ 19.436895] kasan_check_range+0x100/0x1a8 [ 19.437388] __kasan_check_write+0x20/0x30 [ 19.437902] kasan_atomics_helper+0xd3c/0x4858 [ 19.438154] kasan_atomics+0x198/0x2e0 [ 19.438548] kunit_try_run_case+0x170/0x3f0 [ 19.438785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.438878] kthread+0x328/0x630 [ 19.438980] ret_from_fork+0x10/0x20 [ 19.439374] [ 19.439605] Allocated by task 265: [ 19.439769] kasan_save_stack+0x3c/0x68 [ 19.439912] kasan_save_track+0x20/0x40 [ 19.440054] kasan_save_alloc_info+0x40/0x58 [ 19.440313] __kasan_kmalloc+0xd4/0xd8 [ 19.440577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.440667] kasan_atomics+0xb8/0x2e0 [ 19.440720] kunit_try_run_case+0x170/0x3f0 [ 19.440774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.440821] kthread+0x328/0x630 [ 19.440860] ret_from_fork+0x10/0x20 [ 19.441418] [ 19.441649] The buggy address belongs to the object at fff00000c7ab9600 [ 19.441649] which belongs to the cache kmalloc-64 of size 64 [ 19.441988] The buggy address is located 0 bytes to the right of [ 19.441988] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.442117] [ 19.442495] The buggy address belongs to the physical page: [ 19.442555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.442754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.443282] page_type: f5(slab) [ 19.443403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.443583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.443918] page dumped because: kasan: bad access detected [ 19.444074] [ 19.444121] Memory state around the buggy address: [ 19.444464] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444713] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444780] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.445011] ^ [ 19.445057] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.445317] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.445573] ==================================================================
[ 19.223040] ================================================================== [ 19.223096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.223149] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.223200] [ 19.223231] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.223313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.223342] Hardware name: linux,dummy-virt (DT) [ 19.223375] Call trace: [ 19.223398] show_stack+0x20/0x38 (C) [ 19.223448] dump_stack_lvl+0x8c/0xd0 [ 19.223494] print_report+0x118/0x5d0 [ 19.223543] kasan_report+0xdc/0x128 [ 19.223588] kasan_check_range+0x100/0x1a8 [ 19.223638] __kasan_check_write+0x20/0x30 [ 19.223685] kasan_atomics_helper+0xf20/0x4858 [ 19.223749] kasan_atomics+0x198/0x2e0 [ 19.223797] kunit_try_run_case+0x170/0x3f0 [ 19.223843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.223897] kthread+0x328/0x630 [ 19.223940] ret_from_fork+0x10/0x20 [ 19.223987] [ 19.224007] Allocated by task 265: [ 19.224038] kasan_save_stack+0x3c/0x68 [ 19.224079] kasan_save_track+0x20/0x40 [ 19.224119] kasan_save_alloc_info+0x40/0x58 [ 19.224160] __kasan_kmalloc+0xd4/0xd8 [ 19.224199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.224240] kasan_atomics+0xb8/0x2e0 [ 19.224277] kunit_try_run_case+0x170/0x3f0 [ 19.224316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.224388] kthread+0x328/0x630 [ 19.224427] ret_from_fork+0x10/0x20 [ 19.224465] [ 19.224487] The buggy address belongs to the object at fff00000c63aa000 [ 19.224487] which belongs to the cache kmalloc-64 of size 64 [ 19.224546] The buggy address is located 0 bytes to the right of [ 19.224546] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.224855] [ 19.224883] The buggy address belongs to the physical page: [ 19.224918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.224996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.225046] page_type: f5(slab) [ 19.225131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.225339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.225386] page dumped because: kasan: bad access detected [ 19.226885] [ 19.226914] Memory state around the buggy address: [ 19.226954] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.227210] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.227265] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.227307] ^ [ 19.227342] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.227387] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.227428] ================================================================== [ 19.329064] ================================================================== [ 19.329146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.329266] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.329343] [ 19.329440] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.329797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.329859] Hardware name: linux,dummy-virt (DT) [ 19.329895] Call trace: [ 19.329919] show_stack+0x20/0x38 (C) [ 19.329973] dump_stack_lvl+0x8c/0xd0 [ 19.330384] print_report+0x118/0x5d0 [ 19.330485] kasan_report+0xdc/0x128 [ 19.330673] __asan_report_load8_noabort+0x20/0x30 [ 19.330886] kasan_atomics_helper+0x3db0/0x4858 [ 19.330955] kasan_atomics+0x198/0x2e0 [ 19.331388] kunit_try_run_case+0x170/0x3f0 [ 19.331479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.331632] kthread+0x328/0x630 [ 19.331838] ret_from_fork+0x10/0x20 [ 19.331905] [ 19.331926] Allocated by task 265: [ 19.332319] kasan_save_stack+0x3c/0x68 [ 19.332418] kasan_save_track+0x20/0x40 [ 19.332915] kasan_save_alloc_info+0x40/0x58 [ 19.333059] __kasan_kmalloc+0xd4/0xd8 [ 19.333148] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.333299] kasan_atomics+0xb8/0x2e0 [ 19.333400] kunit_try_run_case+0x170/0x3f0 [ 19.333494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.333554] kthread+0x328/0x630 [ 19.333588] ret_from_fork+0x10/0x20 [ 19.333633] [ 19.333657] The buggy address belongs to the object at fff00000c63aa000 [ 19.333657] which belongs to the cache kmalloc-64 of size 64 [ 19.333738] The buggy address is located 0 bytes to the right of [ 19.333738] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.333805] [ 19.333829] The buggy address belongs to the physical page: [ 19.333864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.333927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.333978] page_type: f5(slab) [ 19.334019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.334083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.334135] page dumped because: kasan: bad access detected [ 19.334177] [ 19.334199] Memory state around the buggy address: [ 19.334247] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.334304] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.334351] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.334391] ^ [ 19.334439] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.334484] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.334526] ================================================================== [ 19.240145] ================================================================== [ 19.240290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.240465] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.240539] [ 19.240598] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.240680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.240753] Hardware name: linux,dummy-virt (DT) [ 19.240789] Call trace: [ 19.240816] show_stack+0x20/0x38 (C) [ 19.240868] dump_stack_lvl+0x8c/0xd0 [ 19.240968] print_report+0x118/0x5d0 [ 19.241023] kasan_report+0xdc/0x128 [ 19.241125] kasan_check_range+0x100/0x1a8 [ 19.241175] __kasan_check_write+0x20/0x30 [ 19.241221] kasan_atomics_helper+0x10c0/0x4858 [ 19.241276] kasan_atomics+0x198/0x2e0 [ 19.241344] kunit_try_run_case+0x170/0x3f0 [ 19.241394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.241447] kthread+0x328/0x630 [ 19.241489] ret_from_fork+0x10/0x20 [ 19.241557] [ 19.241779] Allocated by task 265: [ 19.241819] kasan_save_stack+0x3c/0x68 [ 19.241865] kasan_save_track+0x20/0x40 [ 19.241974] kasan_save_alloc_info+0x40/0x58 [ 19.242048] __kasan_kmalloc+0xd4/0xd8 [ 19.242093] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.242136] kasan_atomics+0xb8/0x2e0 [ 19.242342] kunit_try_run_case+0x170/0x3f0 [ 19.242427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.242492] kthread+0x328/0x630 [ 19.242544] ret_from_fork+0x10/0x20 [ 19.242601] [ 19.242682] The buggy address belongs to the object at fff00000c63aa000 [ 19.242682] which belongs to the cache kmalloc-64 of size 64 [ 19.242857] The buggy address is located 0 bytes to the right of [ 19.242857] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.243005] [ 19.243105] The buggy address belongs to the physical page: [ 19.243188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.243245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.243306] page_type: f5(slab) [ 19.243346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.243400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.243691] page dumped because: kasan: bad access detected [ 19.243743] [ 19.243766] Memory state around the buggy address: [ 19.243801] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.243847] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.243891] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.243931] ^ [ 19.243967] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.244010] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.244050] ================================================================== [ 19.335612] ================================================================== [ 19.336004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.336079] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.336133] [ 19.336167] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.336640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.336923] Hardware name: linux,dummy-virt (DT) [ 19.336967] Call trace: [ 19.336994] show_stack+0x20/0x38 (C) [ 19.337442] dump_stack_lvl+0x8c/0xd0 [ 19.337579] print_report+0x118/0x5d0 [ 19.337632] kasan_report+0xdc/0x128 [ 19.337688] kasan_check_range+0x100/0x1a8 [ 19.338033] __kasan_check_write+0x20/0x30 [ 19.338104] kasan_atomics_helper+0x1644/0x4858 [ 19.338156] kasan_atomics+0x198/0x2e0 [ 19.338201] kunit_try_run_case+0x170/0x3f0 [ 19.338596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.338789] kthread+0x328/0x630 [ 19.338847] ret_from_fork+0x10/0x20 [ 19.339032] [ 19.339097] Allocated by task 265: [ 19.339134] kasan_save_stack+0x3c/0x68 [ 19.339387] kasan_save_track+0x20/0x40 [ 19.339583] kasan_save_alloc_info+0x40/0x58 [ 19.339633] __kasan_kmalloc+0xd4/0xd8 [ 19.339674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.339733] kasan_atomics+0xb8/0x2e0 [ 19.339937] kunit_try_run_case+0x170/0x3f0 [ 19.340024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.340073] kthread+0x328/0x630 [ 19.340107] ret_from_fork+0x10/0x20 [ 19.340144] [ 19.340179] The buggy address belongs to the object at fff00000c63aa000 [ 19.340179] which belongs to the cache kmalloc-64 of size 64 [ 19.340254] The buggy address is located 0 bytes to the right of [ 19.340254] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.340320] [ 19.340344] The buggy address belongs to the physical page: [ 19.340386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.340449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.340507] page_type: f5(slab) [ 19.340559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.340611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.340664] page dumped because: kasan: bad access detected [ 19.340707] [ 19.340758] Memory state around the buggy address: [ 19.340793] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.340846] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.340892] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.340932] ^ [ 19.340968] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.341021] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.341062] ================================================================== [ 19.232646] ================================================================== [ 19.232700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.232765] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.232816] [ 19.232867] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.232950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.232977] Hardware name: linux,dummy-virt (DT) [ 19.233146] Call trace: [ 19.233204] show_stack+0x20/0x38 (C) [ 19.233277] dump_stack_lvl+0x8c/0xd0 [ 19.233359] print_report+0x118/0x5d0 [ 19.233414] kasan_report+0xdc/0x128 [ 19.233468] kasan_check_range+0x100/0x1a8 [ 19.233525] __kasan_check_write+0x20/0x30 [ 19.233608] kasan_atomics_helper+0xff0/0x4858 [ 19.233662] kasan_atomics+0x198/0x2e0 [ 19.233709] kunit_try_run_case+0x170/0x3f0 [ 19.233770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.233824] kthread+0x328/0x630 [ 19.233875] ret_from_fork+0x10/0x20 [ 19.233923] [ 19.233945] Allocated by task 265: [ 19.233983] kasan_save_stack+0x3c/0x68 [ 19.234028] kasan_save_track+0x20/0x40 [ 19.234066] kasan_save_alloc_info+0x40/0x58 [ 19.234107] __kasan_kmalloc+0xd4/0xd8 [ 19.234149] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.234201] kasan_atomics+0xb8/0x2e0 [ 19.234240] kunit_try_run_case+0x170/0x3f0 [ 19.234287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.234333] kthread+0x328/0x630 [ 19.234369] ret_from_fork+0x10/0x20 [ 19.234406] [ 19.234428] The buggy address belongs to the object at fff00000c63aa000 [ 19.234428] which belongs to the cache kmalloc-64 of size 64 [ 19.234488] The buggy address is located 0 bytes to the right of [ 19.234488] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.234554] [ 19.234587] The buggy address belongs to the physical page: [ 19.234619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.234671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.234729] page_type: f5(slab) [ 19.234769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.234865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.234926] page dumped because: kasan: bad access detected [ 19.234974] [ 19.235008] Memory state around the buggy address: [ 19.235044] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.235336] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.235385] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.235449] ^ [ 19.235485] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.235530] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.235590] ================================================================== [ 19.368958] ================================================================== [ 19.369023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.369078] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.369320] [ 19.369375] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.369791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.369875] Hardware name: linux,dummy-virt (DT) [ 19.370101] Call trace: [ 19.370245] show_stack+0x20/0x38 (C) [ 19.370307] dump_stack_lvl+0x8c/0xd0 [ 19.370539] print_report+0x118/0x5d0 [ 19.370601] kasan_report+0xdc/0x128 [ 19.370668] kasan_check_range+0x100/0x1a8 [ 19.370802] __kasan_check_write+0x20/0x30 [ 19.370877] kasan_atomics_helper+0x175c/0x4858 [ 19.371052] kasan_atomics+0x198/0x2e0 [ 19.371589] kunit_try_run_case+0x170/0x3f0 [ 19.371704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.371938] kthread+0x328/0x630 [ 19.372037] ret_from_fork+0x10/0x20 [ 19.372160] [ 19.372182] Allocated by task 265: [ 19.372237] kasan_save_stack+0x3c/0x68 [ 19.372312] kasan_save_track+0x20/0x40 [ 19.372583] kasan_save_alloc_info+0x40/0x58 [ 19.372793] __kasan_kmalloc+0xd4/0xd8 [ 19.373226] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.373402] kasan_atomics+0xb8/0x2e0 [ 19.373517] kunit_try_run_case+0x170/0x3f0 [ 19.373559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.373742] kthread+0x328/0x630 [ 19.374105] ret_from_fork+0x10/0x20 [ 19.374250] [ 19.374421] The buggy address belongs to the object at fff00000c63aa000 [ 19.374421] which belongs to the cache kmalloc-64 of size 64 [ 19.374515] The buggy address is located 0 bytes to the right of [ 19.374515] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.374734] [ 19.374779] The buggy address belongs to the physical page: [ 19.375068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.375198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.375569] page_type: f5(slab) [ 19.375751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.375809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.375860] page dumped because: kasan: bad access detected [ 19.375896] [ 19.375918] Memory state around the buggy address: [ 19.376558] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.376753] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.376804] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.377025] ^ [ 19.377086] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.377140] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.377191] ================================================================== [ 19.387735] ================================================================== [ 19.387799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.387853] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.387904] [ 19.387936] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.388017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.388047] Hardware name: linux,dummy-virt (DT) [ 19.388079] Call trace: [ 19.388103] show_stack+0x20/0x38 (C) [ 19.388152] dump_stack_lvl+0x8c/0xd0 [ 19.388200] print_report+0x118/0x5d0 [ 19.388248] kasan_report+0xdc/0x128 [ 19.388293] kasan_check_range+0x100/0x1a8 [ 19.388343] __kasan_check_write+0x20/0x30 [ 19.388390] kasan_atomics_helper+0x17ec/0x4858 [ 19.388438] kasan_atomics+0x198/0x2e0 [ 19.388484] kunit_try_run_case+0x170/0x3f0 [ 19.388531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388584] kthread+0x328/0x630 [ 19.388627] ret_from_fork+0x10/0x20 [ 19.388674] [ 19.388696] Allocated by task 265: [ 19.388736] kasan_save_stack+0x3c/0x68 [ 19.389176] kasan_save_track+0x20/0x40 [ 19.389438] kasan_save_alloc_info+0x40/0x58 [ 19.389508] __kasan_kmalloc+0xd4/0xd8 [ 19.389573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.390167] kasan_atomics+0xb8/0x2e0 [ 19.390216] kunit_try_run_case+0x170/0x3f0 [ 19.390257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.390303] kthread+0x328/0x630 [ 19.390338] ret_from_fork+0x10/0x20 [ 19.390377] [ 19.390556] The buggy address belongs to the object at fff00000c63aa000 [ 19.390556] which belongs to the cache kmalloc-64 of size 64 [ 19.390639] The buggy address is located 0 bytes to the right of [ 19.390639] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.390780] [ 19.391126] The buggy address belongs to the physical page: [ 19.391270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.391476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.391548] page_type: f5(slab) [ 19.391679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.391744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.391810] page dumped because: kasan: bad access detected [ 19.391845] [ 19.391867] Memory state around the buggy address: [ 19.391918] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.391964] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.392009] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.392086] ^ [ 19.392135] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.392183] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.392225] ================================================================== [ 19.202470] ================================================================== [ 19.202524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.202574] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.202626] [ 19.202659] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.202752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.202782] Hardware name: linux,dummy-virt (DT) [ 19.202813] Call trace: [ 19.203529] show_stack+0x20/0x38 (C) [ 19.203588] dump_stack_lvl+0x8c/0xd0 [ 19.203636] print_report+0x118/0x5d0 [ 19.203683] kasan_report+0xdc/0x128 [ 19.203743] __asan_report_load8_noabort+0x20/0x30 [ 19.203796] kasan_atomics_helper+0x3f58/0x4858 [ 19.203845] kasan_atomics+0x198/0x2e0 [ 19.203894] kunit_try_run_case+0x170/0x3f0 [ 19.203941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.203995] kthread+0x328/0x630 [ 19.204037] ret_from_fork+0x10/0x20 [ 19.204087] [ 19.204107] Allocated by task 265: [ 19.204137] kasan_save_stack+0x3c/0x68 [ 19.204180] kasan_save_track+0x20/0x40 [ 19.204218] kasan_save_alloc_info+0x40/0x58 [ 19.204259] __kasan_kmalloc+0xd4/0xd8 [ 19.204298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.204339] kasan_atomics+0xb8/0x2e0 [ 19.204376] kunit_try_run_case+0x170/0x3f0 [ 19.204417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.204462] kthread+0x328/0x630 [ 19.204497] ret_from_fork+0x10/0x20 [ 19.204534] [ 19.204554] The buggy address belongs to the object at fff00000c63aa000 [ 19.204554] which belongs to the cache kmalloc-64 of size 64 [ 19.204613] The buggy address is located 0 bytes to the right of [ 19.204613] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.204680] [ 19.204702] The buggy address belongs to the physical page: [ 19.204784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.204862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.204911] page_type: f5(slab) [ 19.204958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.205028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.205073] page dumped because: kasan: bad access detected [ 19.205106] [ 19.205126] Memory state around the buggy address: [ 19.205163] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.205220] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.205268] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.205318] ^ [ 19.205373] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.205426] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.205467] ================================================================== [ 19.292845] ================================================================== [ 19.292894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.292942] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.292993] [ 19.293025] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.293105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.293132] Hardware name: linux,dummy-virt (DT) [ 19.293167] Call trace: [ 19.293190] show_stack+0x20/0x38 (C) [ 19.293239] dump_stack_lvl+0x8c/0xd0 [ 19.293286] print_report+0x118/0x5d0 [ 19.293339] kasan_report+0xdc/0x128 [ 19.293387] kasan_check_range+0x100/0x1a8 [ 19.294708] __kasan_check_write+0x20/0x30 [ 19.294815] kasan_atomics_helper+0x147c/0x4858 [ 19.295012] kasan_atomics+0x198/0x2e0 [ 19.295204] kunit_try_run_case+0x170/0x3f0 [ 19.295317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.295422] kthread+0x328/0x630 [ 19.295820] ret_from_fork+0x10/0x20 [ 19.296335] [ 19.296452] Allocated by task 265: [ 19.296541] kasan_save_stack+0x3c/0x68 [ 19.296751] kasan_save_track+0x20/0x40 [ 19.296872] kasan_save_alloc_info+0x40/0x58 [ 19.296918] __kasan_kmalloc+0xd4/0xd8 [ 19.297241] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.297420] kasan_atomics+0xb8/0x2e0 [ 19.297614] kunit_try_run_case+0x170/0x3f0 [ 19.297802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.297954] kthread+0x328/0x630 [ 19.298055] ret_from_fork+0x10/0x20 [ 19.298143] [ 19.298167] The buggy address belongs to the object at fff00000c63aa000 [ 19.298167] which belongs to the cache kmalloc-64 of size 64 [ 19.298664] The buggy address is located 0 bytes to the right of [ 19.298664] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.298967] [ 19.299005] The buggy address belongs to the physical page: [ 19.299197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.299321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.299424] page_type: f5(slab) [ 19.299810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.299885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.299930] page dumped because: kasan: bad access detected [ 19.300238] [ 19.300289] Memory state around the buggy address: [ 19.300337] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.300392] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.300437] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.300479] ^ [ 19.300516] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.300559] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.300656] ================================================================== [ 19.318875] ================================================================== [ 19.318974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.319084] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.319332] [ 19.319380] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.319646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.319754] Hardware name: linux,dummy-virt (DT) [ 19.319975] Call trace: [ 19.320336] show_stack+0x20/0x38 (C) [ 19.320418] dump_stack_lvl+0x8c/0xd0 [ 19.320514] print_report+0x118/0x5d0 [ 19.320596] kasan_report+0xdc/0x128 [ 19.320645] kasan_check_range+0x100/0x1a8 [ 19.320883] __kasan_check_write+0x20/0x30 [ 19.321075] kasan_atomics_helper+0x15b4/0x4858 [ 19.321428] kasan_atomics+0x198/0x2e0 [ 19.321571] kunit_try_run_case+0x170/0x3f0 [ 19.321797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.321855] kthread+0x328/0x630 [ 19.322085] ret_from_fork+0x10/0x20 [ 19.322582] [ 19.322634] Allocated by task 265: [ 19.322793] kasan_save_stack+0x3c/0x68 [ 19.322875] kasan_save_track+0x20/0x40 [ 19.323013] kasan_save_alloc_info+0x40/0x58 [ 19.323089] __kasan_kmalloc+0xd4/0xd8 [ 19.323128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.323344] kasan_atomics+0xb8/0x2e0 [ 19.323577] kunit_try_run_case+0x170/0x3f0 [ 19.323646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.323699] kthread+0x328/0x630 [ 19.323745] ret_from_fork+0x10/0x20 [ 19.323784] [ 19.323808] The buggy address belongs to the object at fff00000c63aa000 [ 19.323808] which belongs to the cache kmalloc-64 of size 64 [ 19.324463] The buggy address is located 0 bytes to the right of [ 19.324463] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.324686] [ 19.325244] The buggy address belongs to the physical page: [ 19.325313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.325404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.325477] page_type: f5(slab) [ 19.325942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.326330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.326438] page dumped because: kasan: bad access detected [ 19.326475] [ 19.326800] Memory state around the buggy address: [ 19.326882] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.326948] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.327392] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.327443] ^ [ 19.327491] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.327546] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.327828] ================================================================== [ 19.217303] ================================================================== [ 19.217355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.217403] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.217453] [ 19.217483] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.217564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.217593] Hardware name: linux,dummy-virt (DT) [ 19.217625] Call trace: [ 19.217648] show_stack+0x20/0x38 (C) [ 19.217698] dump_stack_lvl+0x8c/0xd0 [ 19.217757] print_report+0x118/0x5d0 [ 19.217805] kasan_report+0xdc/0x128 [ 19.217851] kasan_check_range+0x100/0x1a8 [ 19.217901] __kasan_check_write+0x20/0x30 [ 19.218077] kasan_atomics_helper+0xeb8/0x4858 [ 19.218267] kasan_atomics+0x198/0x2e0 [ 19.218498] kunit_try_run_case+0x170/0x3f0 [ 19.218574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.218655] kthread+0x328/0x630 [ 19.218853] ret_from_fork+0x10/0x20 [ 19.219054] [ 19.219136] Allocated by task 265: [ 19.219257] kasan_save_stack+0x3c/0x68 [ 19.219361] kasan_save_track+0x20/0x40 [ 19.219621] kasan_save_alloc_info+0x40/0x58 [ 19.219724] __kasan_kmalloc+0xd4/0xd8 [ 19.219788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.219837] kasan_atomics+0xb8/0x2e0 [ 19.219875] kunit_try_run_case+0x170/0x3f0 [ 19.219915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.219982] kthread+0x328/0x630 [ 19.220034] ret_from_fork+0x10/0x20 [ 19.220079] [ 19.220103] The buggy address belongs to the object at fff00000c63aa000 [ 19.220103] which belongs to the cache kmalloc-64 of size 64 [ 19.220187] The buggy address is located 0 bytes to the right of [ 19.220187] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.220252] [ 19.220294] The buggy address belongs to the physical page: [ 19.220328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.220434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.220742] page_type: f5(slab) [ 19.220827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.220945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.220989] page dumped because: kasan: bad access detected [ 19.221023] [ 19.221043] Memory state around the buggy address: [ 19.221192] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.221332] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.221395] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.221433] ^ [ 19.221469] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.221512] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.221553] ================================================================== [ 19.358155] ================================================================== [ 19.358212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.358263] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.358322] [ 19.358354] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.358444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.358481] Hardware name: linux,dummy-virt (DT) [ 19.358514] Call trace: [ 19.358537] show_stack+0x20/0x38 (C) [ 19.358586] dump_stack_lvl+0x8c/0xd0 [ 19.358639] print_report+0x118/0x5d0 [ 19.358697] kasan_report+0xdc/0x128 [ 19.358833] __asan_report_load8_noabort+0x20/0x30 [ 19.359012] kasan_atomics_helper+0x3e10/0x4858 [ 19.359080] kasan_atomics+0x198/0x2e0 [ 19.360088] kunit_try_run_case+0x170/0x3f0 [ 19.360179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.360442] kthread+0x328/0x630 [ 19.360614] ret_from_fork+0x10/0x20 [ 19.360907] [ 19.361052] Allocated by task 265: [ 19.361120] kasan_save_stack+0x3c/0x68 [ 19.361354] kasan_save_track+0x20/0x40 [ 19.361596] kasan_save_alloc_info+0x40/0x58 [ 19.361831] __kasan_kmalloc+0xd4/0xd8 [ 19.361971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.362095] kasan_atomics+0xb8/0x2e0 [ 19.362134] kunit_try_run_case+0x170/0x3f0 [ 19.362215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.362344] kthread+0x328/0x630 [ 19.362457] ret_from_fork+0x10/0x20 [ 19.362558] [ 19.362603] The buggy address belongs to the object at fff00000c63aa000 [ 19.362603] which belongs to the cache kmalloc-64 of size 64 [ 19.362684] The buggy address is located 0 bytes to the right of [ 19.362684] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.363907] [ 19.363963] The buggy address belongs to the physical page: [ 19.364315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.364375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.364579] page_type: f5(slab) [ 19.364647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.365163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.365582] page dumped because: kasan: bad access detected [ 19.365765] [ 19.365913] Memory state around the buggy address: [ 19.365986] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.366451] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.366558] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.366659] ^ [ 19.367038] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.367114] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.367165] ================================================================== [ 19.286678] ================================================================== [ 19.287150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.287294] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.287402] [ 19.287489] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.287692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.287934] Hardware name: linux,dummy-virt (DT) [ 19.287973] Call trace: [ 19.288139] show_stack+0x20/0x38 (C) [ 19.288230] dump_stack_lvl+0x8c/0xd0 [ 19.288594] print_report+0x118/0x5d0 [ 19.288731] kasan_report+0xdc/0x128 [ 19.288922] kasan_check_range+0x100/0x1a8 [ 19.289046] __kasan_check_write+0x20/0x30 [ 19.289096] kasan_atomics_helper+0x1414/0x4858 [ 19.289438] kasan_atomics+0x198/0x2e0 [ 19.289535] kunit_try_run_case+0x170/0x3f0 [ 19.289878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.290057] kthread+0x328/0x630 [ 19.290178] ret_from_fork+0x10/0x20 [ 19.290306] [ 19.290352] Allocated by task 265: [ 19.290612] kasan_save_stack+0x3c/0x68 [ 19.291174] kasan_save_track+0x20/0x40 [ 19.291282] kasan_save_alloc_info+0x40/0x58 [ 19.291327] __kasan_kmalloc+0xd4/0xd8 [ 19.291399] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.291440] kasan_atomics+0xb8/0x2e0 [ 19.291488] kunit_try_run_case+0x170/0x3f0 [ 19.291527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.291573] kthread+0x328/0x630 [ 19.291618] ret_from_fork+0x10/0x20 [ 19.291655] [ 19.291696] The buggy address belongs to the object at fff00000c63aa000 [ 19.291696] which belongs to the cache kmalloc-64 of size 64 [ 19.291790] The buggy address is located 0 bytes to the right of [ 19.291790] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.291857] [ 19.291890] The buggy address belongs to the physical page: [ 19.291940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.292013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.292063] page_type: f5(slab) [ 19.292104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.292159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.292201] page dumped because: kasan: bad access detected [ 19.292245] [ 19.292266] Memory state around the buggy address: [ 19.292301] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.292346] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.292390] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.292446] ^ [ 19.292494] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.292547] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.292612] ================================================================== [ 19.377785] ================================================================== [ 19.377957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.378253] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.378544] [ 19.378589] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.378672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.378703] Hardware name: linux,dummy-virt (DT) [ 19.378890] Call trace: [ 19.378950] show_stack+0x20/0x38 (C) [ 19.379257] dump_stack_lvl+0x8c/0xd0 [ 19.379454] print_report+0x118/0x5d0 [ 19.379745] kasan_report+0xdc/0x128 [ 19.379826] __asan_report_load8_noabort+0x20/0x30 [ 19.379888] kasan_atomics_helper+0x3e20/0x4858 [ 19.379961] kasan_atomics+0x198/0x2e0 [ 19.380367] kunit_try_run_case+0x170/0x3f0 [ 19.380645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.380858] kthread+0x328/0x630 [ 19.381007] ret_from_fork+0x10/0x20 [ 19.381085] [ 19.381123] Allocated by task 265: [ 19.381327] kasan_save_stack+0x3c/0x68 [ 19.381581] kasan_save_track+0x20/0x40 [ 19.381651] kasan_save_alloc_info+0x40/0x58 [ 19.381868] __kasan_kmalloc+0xd4/0xd8 [ 19.382109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.382186] kasan_atomics+0xb8/0x2e0 [ 19.382337] kunit_try_run_case+0x170/0x3f0 [ 19.382396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.382634] kthread+0x328/0x630 [ 19.382734] ret_from_fork+0x10/0x20 [ 19.382898] [ 19.382958] The buggy address belongs to the object at fff00000c63aa000 [ 19.382958] which belongs to the cache kmalloc-64 of size 64 [ 19.383263] The buggy address is located 0 bytes to the right of [ 19.383263] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.383557] [ 19.383596] The buggy address belongs to the physical page: [ 19.383647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.383810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.383909] page_type: f5(slab) [ 19.383977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.384114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.384158] page dumped because: kasan: bad access detected [ 19.384214] [ 19.384242] Memory state around the buggy address: [ 19.384458] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.384687] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.385077] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.385125] ^ [ 19.385163] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.385540] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.386009] ================================================================== [ 19.227696] ================================================================== [ 19.227771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.227823] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.227897] [ 19.227929] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.228113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.228250] Hardware name: linux,dummy-virt (DT) [ 19.228292] Call trace: [ 19.228318] show_stack+0x20/0x38 (C) [ 19.228384] dump_stack_lvl+0x8c/0xd0 [ 19.228438] print_report+0x118/0x5d0 [ 19.228494] kasan_report+0xdc/0x128 [ 19.228542] kasan_check_range+0x100/0x1a8 [ 19.228728] __kasan_check_write+0x20/0x30 [ 19.228875] kasan_atomics_helper+0xf88/0x4858 [ 19.228994] kasan_atomics+0x198/0x2e0 [ 19.229085] kunit_try_run_case+0x170/0x3f0 [ 19.229152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.229226] kthread+0x328/0x630 [ 19.229279] ret_from_fork+0x10/0x20 [ 19.229341] [ 19.229410] Allocated by task 265: [ 19.229484] kasan_save_stack+0x3c/0x68 [ 19.229529] kasan_save_track+0x20/0x40 [ 19.229596] kasan_save_alloc_info+0x40/0x58 [ 19.229645] __kasan_kmalloc+0xd4/0xd8 [ 19.229692] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.229745] kasan_atomics+0xb8/0x2e0 [ 19.229784] kunit_try_run_case+0x170/0x3f0 [ 19.229845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.229971] kthread+0x328/0x630 [ 19.230136] ret_from_fork+0x10/0x20 [ 19.230182] [ 19.230223] The buggy address belongs to the object at fff00000c63aa000 [ 19.230223] which belongs to the cache kmalloc-64 of size 64 [ 19.230324] The buggy address is located 0 bytes to the right of [ 19.230324] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.230396] [ 19.230421] The buggy address belongs to the physical page: [ 19.230475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.230592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.230731] page_type: f5(slab) [ 19.230784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.230871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.230949] page dumped because: kasan: bad access detected [ 19.230984] [ 19.231004] Memory state around the buggy address: [ 19.231226] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.231273] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.231318] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.231359] ^ [ 19.231393] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.231705] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.231850] ================================================================== [ 19.181062] ================================================================== [ 19.181116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.181168] Read of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.181219] [ 19.181252] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.182794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.182889] Hardware name: linux,dummy-virt (DT) [ 19.182972] Call trace: [ 19.182997] show_stack+0x20/0x38 (C) [ 19.183442] dump_stack_lvl+0x8c/0xd0 [ 19.183504] print_report+0x118/0x5d0 [ 19.183555] kasan_report+0xdc/0x128 [ 19.183915] __asan_report_load4_noabort+0x20/0x30 [ 19.184018] kasan_atomics_helper+0x3e04/0x4858 [ 19.184076] kasan_atomics+0x198/0x2e0 [ 19.184615] kunit_try_run_case+0x170/0x3f0 [ 19.184693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.185040] kthread+0x328/0x630 [ 19.185098] ret_from_fork+0x10/0x20 [ 19.185514] [ 19.185546] Allocated by task 265: [ 19.185671] kasan_save_stack+0x3c/0x68 [ 19.185730] kasan_save_track+0x20/0x40 [ 19.186036] kasan_save_alloc_info+0x40/0x58 [ 19.186144] __kasan_kmalloc+0xd4/0xd8 [ 19.186414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.186916] kasan_atomics+0xb8/0x2e0 [ 19.186973] kunit_try_run_case+0x170/0x3f0 [ 19.187147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.187200] kthread+0x328/0x630 [ 19.187235] ret_from_fork+0x10/0x20 [ 19.187274] [ 19.187295] The buggy address belongs to the object at fff00000c63aa000 [ 19.187295] which belongs to the cache kmalloc-64 of size 64 [ 19.187357] The buggy address is located 0 bytes to the right of [ 19.187357] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.187423] [ 19.187947] The buggy address belongs to the physical page: [ 19.187989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.188271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.188414] page_type: f5(slab) [ 19.188500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.188883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.188952] page dumped because: kasan: bad access detected [ 19.188987] [ 19.189008] Memory state around the buggy address: [ 19.189412] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.189892] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.190332] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.190478] ^ [ 19.190772] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.191229] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.191274] ================================================================== [ 19.192372] ================================================================== [ 19.194228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.194540] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.194809] [ 19.194899] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.194985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.195452] Hardware name: linux,dummy-virt (DT) [ 19.195504] Call trace: [ 19.195530] show_stack+0x20/0x38 (C) [ 19.195593] dump_stack_lvl+0x8c/0xd0 [ 19.195641] print_report+0x118/0x5d0 [ 19.196003] kasan_report+0xdc/0x128 [ 19.196324] kasan_check_range+0x100/0x1a8 [ 19.196491] __kasan_check_read+0x20/0x30 [ 19.196541] kasan_atomics_helper+0xdd4/0x4858 [ 19.196590] kasan_atomics+0x198/0x2e0 [ 19.196638] kunit_try_run_case+0x170/0x3f0 [ 19.196687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.196748] kthread+0x328/0x630 [ 19.196792] ret_from_fork+0x10/0x20 [ 19.196840] [ 19.196861] Allocated by task 265: [ 19.196896] kasan_save_stack+0x3c/0x68 [ 19.196938] kasan_save_track+0x20/0x40 [ 19.196976] kasan_save_alloc_info+0x40/0x58 [ 19.197019] __kasan_kmalloc+0xd4/0xd8 [ 19.197057] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.197100] kasan_atomics+0xb8/0x2e0 [ 19.197138] kunit_try_run_case+0x170/0x3f0 [ 19.197178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.197224] kthread+0x328/0x630 [ 19.197258] ret_from_fork+0x10/0x20 [ 19.197295] [ 19.197322] The buggy address belongs to the object at fff00000c63aa000 [ 19.197322] which belongs to the cache kmalloc-64 of size 64 [ 19.197381] The buggy address is located 0 bytes to the right of [ 19.197381] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.197447] [ 19.197469] The buggy address belongs to the physical page: [ 19.197503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.197557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.197607] page_type: f5(slab) [ 19.197646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.197698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.197748] page dumped because: kasan: bad access detected [ 19.197784] [ 19.197805] Memory state around the buggy address: [ 19.197839] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.197882] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.197926] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.197966] ^ [ 19.198000] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.198044] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.198084] ================================================================== [ 19.271454] ================================================================== [ 19.271674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.271757] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.271828] [ 19.271866] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.271950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.271979] Hardware name: linux,dummy-virt (DT) [ 19.272010] Call trace: [ 19.272036] show_stack+0x20/0x38 (C) [ 19.272095] dump_stack_lvl+0x8c/0xd0 [ 19.272146] print_report+0x118/0x5d0 [ 19.272194] kasan_report+0xdc/0x128 [ 19.272239] kasan_check_range+0x100/0x1a8 [ 19.272289] __kasan_check_write+0x20/0x30 [ 19.272334] kasan_atomics_helper+0x1384/0x4858 [ 19.272383] kasan_atomics+0x198/0x2e0 [ 19.272429] kunit_try_run_case+0x170/0x3f0 [ 19.272478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.272532] kthread+0x328/0x630 [ 19.272582] ret_from_fork+0x10/0x20 [ 19.272632] [ 19.272652] Allocated by task 265: [ 19.272688] kasan_save_stack+0x3c/0x68 [ 19.273141] kasan_save_track+0x20/0x40 [ 19.273422] kasan_save_alloc_info+0x40/0x58 [ 19.273727] __kasan_kmalloc+0xd4/0xd8 [ 19.273789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.273832] kasan_atomics+0xb8/0x2e0 [ 19.274230] kunit_try_run_case+0x170/0x3f0 [ 19.274335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.274387] kthread+0x328/0x630 [ 19.274654] ret_from_fork+0x10/0x20 [ 19.274725] [ 19.274751] The buggy address belongs to the object at fff00000c63aa000 [ 19.274751] which belongs to the cache kmalloc-64 of size 64 [ 19.274812] The buggy address is located 0 bytes to the right of [ 19.274812] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.275368] [ 19.276153] The buggy address belongs to the physical page: [ 19.276251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.276355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.276438] page_type: f5(slab) [ 19.276515] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.276780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.277089] page dumped because: kasan: bad access detected [ 19.277168] [ 19.277342] Memory state around the buggy address: [ 19.277529] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.277627] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.277673] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.277906] ^ [ 19.278086] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.278370] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.278568] ================================================================== [ 19.263621] ================================================================== [ 19.263666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.263724] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.263774] [ 19.263805] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.263886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.263915] Hardware name: linux,dummy-virt (DT) [ 19.263946] Call trace: [ 19.263971] show_stack+0x20/0x38 (C) [ 19.264018] dump_stack_lvl+0x8c/0xd0 [ 19.264409] print_report+0x118/0x5d0 [ 19.264483] kasan_report+0xdc/0x128 [ 19.264886] kasan_check_range+0x100/0x1a8 [ 19.265083] __kasan_check_write+0x20/0x30 [ 19.265152] kasan_atomics_helper+0x12d8/0x4858 [ 19.265249] kasan_atomics+0x198/0x2e0 [ 19.265403] kunit_try_run_case+0x170/0x3f0 [ 19.265532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.265596] kthread+0x328/0x630 [ 19.265639] ret_from_fork+0x10/0x20 [ 19.265689] [ 19.265709] Allocated by task 265: [ 19.265751] kasan_save_stack+0x3c/0x68 [ 19.265792] kasan_save_track+0x20/0x40 [ 19.265832] kasan_save_alloc_info+0x40/0x58 [ 19.265991] __kasan_kmalloc+0xd4/0xd8 [ 19.266038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.266079] kasan_atomics+0xb8/0x2e0 [ 19.266117] kunit_try_run_case+0x170/0x3f0 [ 19.266231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.266316] kthread+0x328/0x630 [ 19.266359] ret_from_fork+0x10/0x20 [ 19.266456] [ 19.266580] The buggy address belongs to the object at fff00000c63aa000 [ 19.266580] which belongs to the cache kmalloc-64 of size 64 [ 19.266686] The buggy address is located 0 bytes to the right of [ 19.266686] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.266874] [ 19.266935] The buggy address belongs to the physical page: [ 19.267590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.267652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.267702] page_type: f5(slab) [ 19.267756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.267818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.267863] page dumped because: kasan: bad access detected [ 19.267896] [ 19.268214] Memory state around the buggy address: [ 19.268422] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.268792] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.268909] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.268952] ^ [ 19.268992] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.269330] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.269552] ================================================================== [ 19.166174] ================================================================== [ 19.166260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.166410] Read of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.166497] [ 19.166534] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.166626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.166817] Hardware name: linux,dummy-virt (DT) [ 19.166902] Call trace: [ 19.167109] show_stack+0x20/0x38 (C) [ 19.167355] dump_stack_lvl+0x8c/0xd0 [ 19.167463] print_report+0x118/0x5d0 [ 19.167692] kasan_report+0xdc/0x128 [ 19.167793] __asan_report_load4_noabort+0x20/0x30 [ 19.168019] kasan_atomics_helper+0x3dd8/0x4858 [ 19.168100] kasan_atomics+0x198/0x2e0 [ 19.168259] kunit_try_run_case+0x170/0x3f0 [ 19.168328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.168558] kthread+0x328/0x630 [ 19.168687] ret_from_fork+0x10/0x20 [ 19.168761] [ 19.168781] Allocated by task 265: [ 19.168811] kasan_save_stack+0x3c/0x68 [ 19.168855] kasan_save_track+0x20/0x40 [ 19.168893] kasan_save_alloc_info+0x40/0x58 [ 19.168935] __kasan_kmalloc+0xd4/0xd8 [ 19.168975] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.169016] kasan_atomics+0xb8/0x2e0 [ 19.169053] kunit_try_run_case+0x170/0x3f0 [ 19.169093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.169138] kthread+0x328/0x630 [ 19.169172] ret_from_fork+0x10/0x20 [ 19.169214] [ 19.169236] The buggy address belongs to the object at fff00000c63aa000 [ 19.169236] which belongs to the cache kmalloc-64 of size 64 [ 19.169295] The buggy address is located 0 bytes to the right of [ 19.169295] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.169367] [ 19.169392] The buggy address belongs to the physical page: [ 19.169426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.169480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.169531] page_type: f5(slab) [ 19.169570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.169736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.169812] page dumped because: kasan: bad access detected [ 19.170122] [ 19.170156] Memory state around the buggy address: [ 19.170191] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.170238] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.170398] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.170465] ^ [ 19.170637] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.170707] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.171046] ================================================================== [ 19.300979] ================================================================== [ 19.301039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.301091] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.301141] [ 19.301184] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.301266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.301294] Hardware name: linux,dummy-virt (DT) [ 19.301333] Call trace: [ 19.301356] show_stack+0x20/0x38 (C) [ 19.301406] dump_stack_lvl+0x8c/0xd0 [ 19.301462] print_report+0x118/0x5d0 [ 19.301510] kasan_report+0xdc/0x128 [ 19.301558] kasan_check_range+0x100/0x1a8 [ 19.301615] __kasan_check_write+0x20/0x30 [ 19.301663] kasan_atomics_helper+0x14e4/0x4858 [ 19.301723] kasan_atomics+0x198/0x2e0 [ 19.301770] kunit_try_run_case+0x170/0x3f0 [ 19.301826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.301881] kthread+0x328/0x630 [ 19.301923] ret_from_fork+0x10/0x20 [ 19.301970] [ 19.301991] Allocated by task 265: [ 19.302020] kasan_save_stack+0x3c/0x68 [ 19.302073] kasan_save_track+0x20/0x40 [ 19.302112] kasan_save_alloc_info+0x40/0x58 [ 19.302154] __kasan_kmalloc+0xd4/0xd8 [ 19.302191] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.302242] kasan_atomics+0xb8/0x2e0 [ 19.302279] kunit_try_run_case+0x170/0x3f0 [ 19.302320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.302363] kthread+0x328/0x630 [ 19.302396] ret_from_fork+0x10/0x20 [ 19.302434] [ 19.302456] The buggy address belongs to the object at fff00000c63aa000 [ 19.302456] which belongs to the cache kmalloc-64 of size 64 [ 19.302515] The buggy address is located 0 bytes to the right of [ 19.302515] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.302581] [ 19.302611] The buggy address belongs to the physical page: [ 19.302652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.303352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.303892] page_type: f5(slab) [ 19.303961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.304040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.304098] page dumped because: kasan: bad access detected [ 19.304133] [ 19.304443] Memory state around the buggy address: [ 19.304851] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.305037] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.305090] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.305536] ^ [ 19.305785] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.305833] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.305874] ================================================================== [ 19.352033] ================================================================== [ 19.352108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.352223] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.352487] [ 19.352625] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.352895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.352982] Hardware name: linux,dummy-virt (DT) [ 19.353039] Call trace: [ 19.353121] show_stack+0x20/0x38 (C) [ 19.353176] dump_stack_lvl+0x8c/0xd0 [ 19.353224] print_report+0x118/0x5d0 [ 19.353313] kasan_report+0xdc/0x128 [ 19.353367] kasan_check_range+0x100/0x1a8 [ 19.353417] __kasan_check_write+0x20/0x30 [ 19.353810] kasan_atomics_helper+0x16d0/0x4858 [ 19.354072] kasan_atomics+0x198/0x2e0 [ 19.354217] kunit_try_run_case+0x170/0x3f0 [ 19.354420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.354538] kthread+0x328/0x630 [ 19.354591] ret_from_fork+0x10/0x20 [ 19.354639] [ 19.354662] Allocated by task 265: [ 19.354937] kasan_save_stack+0x3c/0x68 [ 19.355449] kasan_save_track+0x20/0x40 [ 19.355531] kasan_save_alloc_info+0x40/0x58 [ 19.355697] __kasan_kmalloc+0xd4/0xd8 [ 19.355848] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.355895] kasan_atomics+0xb8/0x2e0 [ 19.355934] kunit_try_run_case+0x170/0x3f0 [ 19.355975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.356028] kthread+0x328/0x630 [ 19.356461] ret_from_fork+0x10/0x20 [ 19.356693] [ 19.356829] The buggy address belongs to the object at fff00000c63aa000 [ 19.356829] which belongs to the cache kmalloc-64 of size 64 [ 19.357012] The buggy address is located 0 bytes to the right of [ 19.357012] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.357159] [ 19.357205] The buggy address belongs to the physical page: [ 19.357241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.357303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.357369] page_type: f5(slab) [ 19.357409] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.357462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.357513] page dumped because: kasan: bad access detected [ 19.357557] [ 19.357579] Memory state around the buggy address: [ 19.357627] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.357681] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.357739] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.357779] ^ [ 19.357815] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.357860] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.357908] ================================================================== [ 19.235891] ================================================================== [ 19.235970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.236025] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.236078] [ 19.236155] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.236265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.236412] Hardware name: linux,dummy-virt (DT) [ 19.236445] Call trace: [ 19.236549] show_stack+0x20/0x38 (C) [ 19.236635] dump_stack_lvl+0x8c/0xd0 [ 19.236685] print_report+0x118/0x5d0 [ 19.236776] kasan_report+0xdc/0x128 [ 19.236853] kasan_check_range+0x100/0x1a8 [ 19.236908] __kasan_check_write+0x20/0x30 [ 19.236983] kasan_atomics_helper+0x1058/0x4858 [ 19.237040] kasan_atomics+0x198/0x2e0 [ 19.237087] kunit_try_run_case+0x170/0x3f0 [ 19.237153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.237217] kthread+0x328/0x630 [ 19.237261] ret_from_fork+0x10/0x20 [ 19.237325] [ 19.237381] Allocated by task 265: [ 19.237412] kasan_save_stack+0x3c/0x68 [ 19.237454] kasan_save_track+0x20/0x40 [ 19.237495] kasan_save_alloc_info+0x40/0x58 [ 19.237537] __kasan_kmalloc+0xd4/0xd8 [ 19.237575] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.237808] kasan_atomics+0xb8/0x2e0 [ 19.237879] kunit_try_run_case+0x170/0x3f0 [ 19.237923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.237967] kthread+0x328/0x630 [ 19.238002] ret_from_fork+0x10/0x20 [ 19.238053] [ 19.238077] The buggy address belongs to the object at fff00000c63aa000 [ 19.238077] which belongs to the cache kmalloc-64 of size 64 [ 19.238143] The buggy address is located 0 bytes to the right of [ 19.238143] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.238314] [ 19.238337] The buggy address belongs to the physical page: [ 19.238404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.238518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.238572] page_type: f5(slab) [ 19.238674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.238799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.238936] page dumped because: kasan: bad access detected [ 19.239075] [ 19.239165] Memory state around the buggy address: [ 19.239232] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.239285] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.239330] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.239371] ^ [ 19.239407] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.239449] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.239525] ================================================================== [ 19.213273] ================================================================== [ 19.213372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.213425] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.213477] [ 19.213517] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.213864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.213923] Hardware name: linux,dummy-virt (DT) [ 19.214075] Call trace: [ 19.214101] show_stack+0x20/0x38 (C) [ 19.214207] dump_stack_lvl+0x8c/0xd0 [ 19.214293] print_report+0x118/0x5d0 [ 19.214352] kasan_report+0xdc/0x128 [ 19.214419] __asan_report_store8_noabort+0x20/0x30 [ 19.214491] kasan_atomics_helper+0x3e5c/0x4858 [ 19.214548] kasan_atomics+0x198/0x2e0 [ 19.214659] kunit_try_run_case+0x170/0x3f0 [ 19.214709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.214774] kthread+0x328/0x630 [ 19.214989] ret_from_fork+0x10/0x20 [ 19.215072] [ 19.215096] Allocated by task 265: [ 19.215127] kasan_save_stack+0x3c/0x68 [ 19.215183] kasan_save_track+0x20/0x40 [ 19.215391] kasan_save_alloc_info+0x40/0x58 [ 19.215521] __kasan_kmalloc+0xd4/0xd8 [ 19.215914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.216006] kasan_atomics+0xb8/0x2e0 [ 19.216113] kunit_try_run_case+0x170/0x3f0 [ 19.216154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.216200] kthread+0x328/0x630 [ 19.216236] ret_from_fork+0x10/0x20 [ 19.216274] [ 19.216314] The buggy address belongs to the object at fff00000c63aa000 [ 19.216314] which belongs to the cache kmalloc-64 of size 64 [ 19.216375] The buggy address is located 0 bytes to the right of [ 19.216375] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.216440] [ 19.216462] The buggy address belongs to the physical page: [ 19.216495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.216549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.216598] page_type: f5(slab) [ 19.216638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.216692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.216770] page dumped because: kasan: bad access detected [ 19.216804] [ 19.216825] Memory state around the buggy address: [ 19.216859] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.216905] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.216950] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.216989] ^ [ 19.217023] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.217064] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.217106] ================================================================== [ 19.279356] ================================================================== [ 19.279417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.279469] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.279932] [ 19.279986] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.280137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.280208] Hardware name: linux,dummy-virt (DT) [ 19.280243] Call trace: [ 19.280268] show_stack+0x20/0x38 (C) [ 19.280408] dump_stack_lvl+0x8c/0xd0 [ 19.280473] print_report+0x118/0x5d0 [ 19.280540] kasan_report+0xdc/0x128 [ 19.280588] __asan_report_load8_noabort+0x20/0x30 [ 19.280963] kasan_atomics_helper+0x3f04/0x4858 [ 19.281033] kasan_atomics+0x198/0x2e0 [ 19.281115] kunit_try_run_case+0x170/0x3f0 [ 19.281167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.281222] kthread+0x328/0x630 [ 19.281565] ret_from_fork+0x10/0x20 [ 19.281732] [ 19.281803] Allocated by task 265: [ 19.281837] kasan_save_stack+0x3c/0x68 [ 19.282228] kasan_save_track+0x20/0x40 [ 19.282487] kasan_save_alloc_info+0x40/0x58 [ 19.282626] __kasan_kmalloc+0xd4/0xd8 [ 19.282854] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.283052] kasan_atomics+0xb8/0x2e0 [ 19.283137] kunit_try_run_case+0x170/0x3f0 [ 19.283177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.283223] kthread+0x328/0x630 [ 19.283257] ret_from_fork+0x10/0x20 [ 19.283293] [ 19.283317] The buggy address belongs to the object at fff00000c63aa000 [ 19.283317] which belongs to the cache kmalloc-64 of size 64 [ 19.283378] The buggy address is located 0 bytes to the right of [ 19.283378] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.283704] [ 19.284230] The buggy address belongs to the physical page: [ 19.284315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.284393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.284706] page_type: f5(slab) [ 19.284794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.284849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.284913] page dumped because: kasan: bad access detected [ 19.284947] [ 19.284969] Memory state around the buggy address: [ 19.285022] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.285069] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.285114] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.285154] ^ [ 19.285191] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.285246] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.285287] ================================================================== [ 19.306473] ================================================================== [ 19.306527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.307264] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.307408] [ 19.307495] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.307655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.307787] Hardware name: linux,dummy-virt (DT) [ 19.307855] Call trace: [ 19.307880] show_stack+0x20/0x38 (C) [ 19.308271] dump_stack_lvl+0x8c/0xd0 [ 19.308407] print_report+0x118/0x5d0 [ 19.308674] kasan_report+0xdc/0x128 [ 19.309075] kasan_check_range+0x100/0x1a8 [ 19.309446] __kasan_check_write+0x20/0x30 [ 19.309546] kasan_atomics_helper+0x154c/0x4858 [ 19.309742] kasan_atomics+0x198/0x2e0 [ 19.309931] kunit_try_run_case+0x170/0x3f0 [ 19.309985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.310095] kthread+0x328/0x630 [ 19.310760] ret_from_fork+0x10/0x20 [ 19.310941] [ 19.311052] Allocated by task 265: [ 19.311162] kasan_save_stack+0x3c/0x68 [ 19.311389] kasan_save_track+0x20/0x40 [ 19.311577] kasan_save_alloc_info+0x40/0x58 [ 19.311667] __kasan_kmalloc+0xd4/0xd8 [ 19.312029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.312167] kasan_atomics+0xb8/0x2e0 [ 19.312382] kunit_try_run_case+0x170/0x3f0 [ 19.312609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.313255] kthread+0x328/0x630 [ 19.313345] ret_from_fork+0x10/0x20 [ 19.313414] [ 19.313472] The buggy address belongs to the object at fff00000c63aa000 [ 19.313472] which belongs to the cache kmalloc-64 of size 64 [ 19.313677] The buggy address is located 0 bytes to the right of [ 19.313677] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.313997] [ 19.314213] The buggy address belongs to the physical page: [ 19.314287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.314690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.314764] page_type: f5(slab) [ 19.315031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.315262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.316106] page dumped because: kasan: bad access detected [ 19.316283] [ 19.316414] Memory state around the buggy address: [ 19.316455] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.316769] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.317151] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.317300] ^ [ 19.317358] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.317752] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.317987] ================================================================== [ 19.244252] ================================================================== [ 19.244298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.244346] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.244396] [ 19.244427] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.244509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.244537] Hardware name: linux,dummy-virt (DT) [ 19.244570] Call trace: [ 19.244594] show_stack+0x20/0x38 (C) [ 19.244642] dump_stack_lvl+0x8c/0xd0 [ 19.244690] print_report+0x118/0x5d0 [ 19.244753] kasan_report+0xdc/0x128 [ 19.244814] kasan_check_range+0x100/0x1a8 [ 19.244903] __kasan_check_write+0x20/0x30 [ 19.244954] kasan_atomics_helper+0x1128/0x4858 [ 19.245021] kasan_atomics+0x198/0x2e0 [ 19.245096] kunit_try_run_case+0x170/0x3f0 [ 19.245147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.245312] kthread+0x328/0x630 [ 19.245363] ret_from_fork+0x10/0x20 [ 19.245412] [ 19.245531] Allocated by task 265: [ 19.245612] kasan_save_stack+0x3c/0x68 [ 19.245676] kasan_save_track+0x20/0x40 [ 19.245731] kasan_save_alloc_info+0x40/0x58 [ 19.245772] __kasan_kmalloc+0xd4/0xd8 [ 19.245811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.246006] kasan_atomics+0xb8/0x2e0 [ 19.246085] kunit_try_run_case+0x170/0x3f0 [ 19.246146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.246231] kthread+0x328/0x630 [ 19.246303] ret_from_fork+0x10/0x20 [ 19.246476] [ 19.246637] The buggy address belongs to the object at fff00000c63aa000 [ 19.246637] which belongs to the cache kmalloc-64 of size 64 [ 19.246782] The buggy address is located 0 bytes to the right of [ 19.246782] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.246853] [ 19.246877] The buggy address belongs to the physical page: [ 19.246909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.246972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.247023] page_type: f5(slab) [ 19.247062] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.247115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.247159] page dumped because: kasan: bad access detected [ 19.247192] [ 19.247214] Memory state around the buggy address: [ 19.247248] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.247293] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.247340] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.247379] ^ [ 19.247415] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.247471] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.247518] ================================================================== [ 19.205656] ================================================================== [ 19.205710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.205774] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.205825] [ 19.205855] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.206266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.206358] Hardware name: linux,dummy-virt (DT) [ 19.206442] Call trace: [ 19.206503] show_stack+0x20/0x38 (C) [ 19.206554] dump_stack_lvl+0x8c/0xd0 [ 19.206638] print_report+0x118/0x5d0 [ 19.206867] kasan_report+0xdc/0x128 [ 19.206922] kasan_check_range+0x100/0x1a8 [ 19.207392] __kasan_check_write+0x20/0x30 [ 19.207455] kasan_atomics_helper+0xe44/0x4858 [ 19.207536] kasan_atomics+0x198/0x2e0 [ 19.207721] kunit_try_run_case+0x170/0x3f0 [ 19.207794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.207849] kthread+0x328/0x630 [ 19.207908] ret_from_fork+0x10/0x20 [ 19.208136] [ 19.208326] Allocated by task 265: [ 19.208475] kasan_save_stack+0x3c/0x68 [ 19.208607] kasan_save_track+0x20/0x40 [ 19.209017] kasan_save_alloc_info+0x40/0x58 [ 19.209192] __kasan_kmalloc+0xd4/0xd8 [ 19.209348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.209531] kasan_atomics+0xb8/0x2e0 [ 19.209636] kunit_try_run_case+0x170/0x3f0 [ 19.209705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.209762] kthread+0x328/0x630 [ 19.209988] ret_from_fork+0x10/0x20 [ 19.210138] [ 19.210330] The buggy address belongs to the object at fff00000c63aa000 [ 19.210330] which belongs to the cache kmalloc-64 of size 64 [ 19.210455] The buggy address is located 0 bytes to the right of [ 19.210455] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.210731] [ 19.210973] The buggy address belongs to the physical page: [ 19.211030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.211085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.211153] page_type: f5(slab) [ 19.211450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.211678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.211777] page dumped because: kasan: bad access detected [ 19.211861] [ 19.212147] Memory state around the buggy address: [ 19.212263] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.212320] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.212363] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.212404] ^ [ 19.212440] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.212485] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.212533] ================================================================== [ 19.172009] ================================================================== [ 19.172073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.172126] Write of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.172177] [ 19.172459] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.172567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.172597] Hardware name: linux,dummy-virt (DT) [ 19.172651] Call trace: [ 19.172679] show_stack+0x20/0x38 (C) [ 19.172742] dump_stack_lvl+0x8c/0xd0 [ 19.173028] print_report+0x118/0x5d0 [ 19.173095] kasan_report+0xdc/0x128 [ 19.173222] kasan_check_range+0x100/0x1a8 [ 19.173276] __kasan_check_write+0x20/0x30 [ 19.173358] kasan_atomics_helper+0xd3c/0x4858 [ 19.173420] kasan_atomics+0x198/0x2e0 [ 19.173466] kunit_try_run_case+0x170/0x3f0 [ 19.173570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.173628] kthread+0x328/0x630 [ 19.173672] ret_from_fork+0x10/0x20 [ 19.173742] [ 19.173764] Allocated by task 265: [ 19.173795] kasan_save_stack+0x3c/0x68 [ 19.173839] kasan_save_track+0x20/0x40 [ 19.173881] kasan_save_alloc_info+0x40/0x58 [ 19.174250] __kasan_kmalloc+0xd4/0xd8 [ 19.174350] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.174758] kasan_atomics+0xb8/0x2e0 [ 19.175146] kunit_try_run_case+0x170/0x3f0 [ 19.175239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.175413] kthread+0x328/0x630 [ 19.175495] ret_from_fork+0x10/0x20 [ 19.175882] [ 19.175910] The buggy address belongs to the object at fff00000c63aa000 [ 19.175910] which belongs to the cache kmalloc-64 of size 64 [ 19.176407] The buggy address is located 0 bytes to the right of [ 19.176407] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.176635] [ 19.176958] The buggy address belongs to the physical page: [ 19.177120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.177582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.177692] page_type: f5(slab) [ 19.178255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.178315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.178366] page dumped because: kasan: bad access detected [ 19.178665] [ 19.178687] Memory state around the buggy address: [ 19.178732] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.179136] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.179187] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.179228] ^ [ 19.179850] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.179901] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.180194] ================================================================== [ 19.247629] ================================================================== [ 19.247672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.247744] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.247797] [ 19.247829] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.247910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.247938] Hardware name: linux,dummy-virt (DT) [ 19.247971] Call trace: [ 19.247995] show_stack+0x20/0x38 (C) [ 19.248043] dump_stack_lvl+0x8c/0xd0 [ 19.248089] print_report+0x118/0x5d0 [ 19.248372] kasan_report+0xdc/0x128 [ 19.248436] kasan_check_range+0x100/0x1a8 [ 19.248489] __kasan_check_write+0x20/0x30 [ 19.248802] kasan_atomics_helper+0x1190/0x4858 [ 19.248928] kasan_atomics+0x198/0x2e0 [ 19.248983] kunit_try_run_case+0x170/0x3f0 [ 19.249031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.249358] kthread+0x328/0x630 [ 19.249409] ret_from_fork+0x10/0x20 [ 19.249536] [ 19.249606] Allocated by task 265: [ 19.249677] kasan_save_stack+0x3c/0x68 [ 19.249783] kasan_save_track+0x20/0x40 [ 19.249874] kasan_save_alloc_info+0x40/0x58 [ 19.250138] __kasan_kmalloc+0xd4/0xd8 [ 19.250298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.250421] kasan_atomics+0xb8/0x2e0 [ 19.250532] kunit_try_run_case+0x170/0x3f0 [ 19.250653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.250735] kthread+0x328/0x630 [ 19.250806] ret_from_fork+0x10/0x20 [ 19.250959] [ 19.251012] The buggy address belongs to the object at fff00000c63aa000 [ 19.251012] which belongs to the cache kmalloc-64 of size 64 [ 19.251073] The buggy address is located 0 bytes to the right of [ 19.251073] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.251139] [ 19.251164] The buggy address belongs to the physical page: [ 19.251196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.251250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.251299] page_type: f5(slab) [ 19.251339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.251391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.251434] page dumped because: kasan: bad access detected [ 19.251468] [ 19.251661] Memory state around the buggy address: [ 19.251793] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.251915] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.252239] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.252306] ^ [ 19.252358] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.252434] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.252557] ================================================================== [ 19.260149] ================================================================== [ 19.260210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.260264] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.260315] [ 19.260370] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.260481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.260512] Hardware name: linux,dummy-virt (DT) [ 19.260572] Call trace: [ 19.260599] show_stack+0x20/0x38 (C) [ 19.260647] dump_stack_lvl+0x8c/0xd0 [ 19.260703] print_report+0x118/0x5d0 [ 19.261062] kasan_report+0xdc/0x128 [ 19.261131] kasan_check_range+0x100/0x1a8 [ 19.261183] __kasan_check_write+0x20/0x30 [ 19.261229] kasan_atomics_helper+0x126c/0x4858 [ 19.261278] kasan_atomics+0x198/0x2e0 [ 19.261402] kunit_try_run_case+0x170/0x3f0 [ 19.261455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.261508] kthread+0x328/0x630 [ 19.261550] ret_from_fork+0x10/0x20 [ 19.261724] [ 19.261755] Allocated by task 265: [ 19.261789] kasan_save_stack+0x3c/0x68 [ 19.261988] kasan_save_track+0x20/0x40 [ 19.262035] kasan_save_alloc_info+0x40/0x58 [ 19.262077] __kasan_kmalloc+0xd4/0xd8 [ 19.262300] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.262436] kasan_atomics+0xb8/0x2e0 [ 19.262478] kunit_try_run_case+0x170/0x3f0 [ 19.262527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.262576] kthread+0x328/0x630 [ 19.262611] ret_from_fork+0x10/0x20 [ 19.262648] [ 19.262671] The buggy address belongs to the object at fff00000c63aa000 [ 19.262671] which belongs to the cache kmalloc-64 of size 64 [ 19.262742] The buggy address is located 0 bytes to the right of [ 19.262742] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.262808] [ 19.262831] The buggy address belongs to the physical page: [ 19.262864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.262925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.262976] page_type: f5(slab) [ 19.263017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.263069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.263123] page dumped because: kasan: bad access detected [ 19.263165] [ 19.263194] Memory state around the buggy address: [ 19.263231] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.263276] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.263321] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.263360] ^ [ 19.263396] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.263441] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.263487] ================================================================== [ 19.109634] ================================================================== [ 19.109687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.109763] Write of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.109815] [ 19.109848] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.109931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.109960] Hardware name: linux,dummy-virt (DT) [ 19.109993] Call trace: [ 19.110017] show_stack+0x20/0x38 (C) [ 19.110066] dump_stack_lvl+0x8c/0xd0 [ 19.110114] print_report+0x118/0x5d0 [ 19.110315] kasan_atomics_helper+0xa6c/0x4858 [ 19.110554] ret_from_fork+0x10/0x20 [ 19.110602] [ 19.110627] Allocated by task 265: [ 19.110658] kasan_save_stack+0x3c/0x68 [ 19.110700] kasan_save_track+0x20/0x40 [ 19.110751] kasan_save_alloc_info+0x40/0x58 [ 19.111281] __kasan_kmalloc+0xd4/0xd8 [ 19.111341] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.111385] kasan_atomics+0xb8/0x2e0 [ 19.111434] kunit_try_run_case+0x170/0x3f0 [ 19.111476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.112164] kthread+0x328/0x630 [ 19.112349] ret_from_fork+0x10/0x20 [ 19.112468] [ 19.112809] The buggy address belongs to the object at fff00000c63aa000 [ 19.112809] which belongs to the cache kmalloc-64 of size 64 [ 19.113113] The buggy address is located 0 bytes to the right of [ 19.113113] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.113322] [ 19.113784] The buggy address belongs to the physical page: [ 19.114521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.117829] Write of size 4 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.120876] ret_from_fork+0x10/0x20 [ 19.121020] [ 19.121170] Allocated by task 265: [ 19.121322] kasan_save_stack+0x3c/0x68 [ 19.121402] kasan_save_track+0x20/0x40 [ 19.121562] kasan_save_alloc_info+0x40/0x58 [ 19.121666] __kasan_kmalloc+0xd4/0xd8 [ 19.121809] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.121925] kasan_atomics+0xb8/0x2e0 [ 19.122082] kunit_try_run_case+0x170/0x3f0 [ 19.122300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.122548] kthread+0x328/0x630 [ 19.122739] ret_from_fork+0x10/0x20 [ 19.122918] [ 19.122974] The buggy address belongs to the object at fff00000c63aa000 [ 19.122974] which belongs to the cache kmalloc-64 of size 64 [ 19.123218] The buggy address is located 0 bytes to the right of [ 19.123218] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.123326] [ 19.123350] The buggy address belongs to the physical page: [ 19.123545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.125834] page dumped because: kasan: bad access detected [ 19.127060] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.129087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.130547] kasan_save_stack+0x3c/0x68 [ 19.131487] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.132478] [ 19.132852] page_type: f5(slab) [ 19.133360] page dumped because: kasan: bad access detected [ 19.134622] ================================================================== [ 19.341504] ================================================================== [ 19.341936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.342026] Read of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.342081] [ 19.342115] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.342648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.342828] Hardware name: linux,dummy-virt (DT) [ 19.343196] Call trace: [ 19.343591] show_stack+0x20/0x38 (C) [ 19.343680] dump_stack_lvl+0x8c/0xd0 [ 19.343760] print_report+0x118/0x5d0 [ 19.343835] kasan_report+0xdc/0x128 [ 19.344230] __asan_report_load8_noabort+0x20/0x30 [ 19.344446] kasan_atomics_helper+0x3df4/0x4858 [ 19.344538] kasan_atomics+0x198/0x2e0 [ 19.344707] kunit_try_run_case+0x170/0x3f0 [ 19.345099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.345189] kthread+0x328/0x630 [ 19.345339] ret_from_fork+0x10/0x20 [ 19.345449] [ 19.345548] Allocated by task 265: [ 19.345580] kasan_save_stack+0x3c/0x68 [ 19.345625] kasan_save_track+0x20/0x40 [ 19.345990] kasan_save_alloc_info+0x40/0x58 [ 19.346486] __kasan_kmalloc+0xd4/0xd8 [ 19.346635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.346803] kasan_atomics+0xb8/0x2e0 [ 19.346845] kunit_try_run_case+0x170/0x3f0 [ 19.346945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.346993] kthread+0x328/0x630 [ 19.347028] ret_from_fork+0x10/0x20 [ 19.347064] [ 19.347086] The buggy address belongs to the object at fff00000c63aa000 [ 19.347086] which belongs to the cache kmalloc-64 of size 64 [ 19.347480] The buggy address is located 0 bytes to the right of [ 19.347480] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.347702] [ 19.347913] The buggy address belongs to the physical page: [ 19.348055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.348116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.348451] page_type: f5(slab) [ 19.348792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.348867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.349093] page dumped because: kasan: bad access detected [ 19.349606] [ 19.349648] Memory state around the buggy address: [ 19.349722] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.349957] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.350008] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.350050] ^ [ 19.350525] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.350610] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.350650] ================================================================== [ 19.253543] ================================================================== [ 19.253604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.253782] Write of size 8 at addr fff00000c63aa030 by task kunit_try_catch/265 [ 19.253894] [ 19.253952] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.254083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.254130] Hardware name: linux,dummy-virt (DT) [ 19.254163] Call trace: [ 19.254189] show_stack+0x20/0x38 (C) [ 19.254245] dump_stack_lvl+0x8c/0xd0 [ 19.254300] print_report+0x118/0x5d0 [ 19.254374] kasan_report+0xdc/0x128 [ 19.254422] kasan_check_range+0x100/0x1a8 [ 19.254471] __kasan_check_write+0x20/0x30 [ 19.254516] kasan_atomics_helper+0x11f8/0x4858 [ 19.254565] kasan_atomics+0x198/0x2e0 [ 19.255090] kunit_try_run_case+0x170/0x3f0 [ 19.255244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.255391] kthread+0x328/0x630 [ 19.255479] ret_from_fork+0x10/0x20 [ 19.255884] [ 19.256518] Allocated by task 265: [ 19.256554] kasan_save_stack+0x3c/0x68 [ 19.256655] kasan_save_track+0x20/0x40 [ 19.256696] kasan_save_alloc_info+0x40/0x58 [ 19.256748] __kasan_kmalloc+0xd4/0xd8 [ 19.256788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.256869] kasan_atomics+0xb8/0x2e0 [ 19.256955] kunit_try_run_case+0x170/0x3f0 [ 19.257355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.257416] kthread+0x328/0x630 [ 19.257451] ret_from_fork+0x10/0x20 [ 19.257489] [ 19.257513] The buggy address belongs to the object at fff00000c63aa000 [ 19.257513] which belongs to the cache kmalloc-64 of size 64 [ 19.257574] The buggy address is located 0 bytes to the right of [ 19.257574] allocated 48-byte region [fff00000c63aa000, fff00000c63aa030) [ 19.257640] [ 19.257664] The buggy address belongs to the physical page: [ 19.257697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063aa [ 19.257763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.257812] page_type: f5(slab) [ 19.257854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.257906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.258012] page dumped because: kasan: bad access detected [ 19.258071] [ 19.258181] Memory state around the buggy address: [ 19.258258] fff00000c63a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.258309] fff00000c63a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.258360] >fff00000c63aa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.258399] ^ [ 19.258436] fff00000c63aa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.258482] fff00000c63aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.258523] ==================================================================
[ 15.360480] ================================================================== [ 15.360848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.361320] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.362022] [ 15.362132] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.362175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.362391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.362414] Call Trace: [ 15.362428] <TASK> [ 15.362454] dump_stack_lvl+0x73/0xb0 [ 15.362484] print_report+0xd1/0x610 [ 15.362506] ? __virt_addr_valid+0x1db/0x2d0 [ 15.362528] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.362561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.362585] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.362607] kasan_report+0x141/0x180 [ 15.362630] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.362658] kasan_check_range+0x10c/0x1c0 [ 15.362682] __kasan_check_write+0x18/0x20 [ 15.362702] kasan_atomics_helper+0x16e7/0x5450 [ 15.362726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.362749] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.362776] ? kasan_atomics+0x152/0x310 [ 15.362803] kasan_atomics+0x1dc/0x310 [ 15.362826] ? __pfx_kasan_atomics+0x10/0x10 [ 15.362851] ? __pfx_read_tsc+0x10/0x10 [ 15.362872] ? ktime_get_ts64+0x86/0x230 [ 15.362897] kunit_try_run_case+0x1a5/0x480 [ 15.362922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.362969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.362994] ? __kthread_parkme+0x82/0x180 [ 15.363015] ? preempt_count_sub+0x50/0x80 [ 15.363040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.363089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.363115] kthread+0x337/0x6f0 [ 15.363135] ? trace_preempt_on+0x20/0xc0 [ 15.363158] ? __pfx_kthread+0x10/0x10 [ 15.363179] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.363202] ? calculate_sigpending+0x7b/0xa0 [ 15.363226] ? __pfx_kthread+0x10/0x10 [ 15.363248] ret_from_fork+0x116/0x1d0 [ 15.363267] ? __pfx_kthread+0x10/0x10 [ 15.363288] ret_from_fork_asm+0x1a/0x30 [ 15.363322] </TASK> [ 15.363332] [ 15.374045] Allocated by task 283: [ 15.374406] kasan_save_stack+0x45/0x70 [ 15.374680] kasan_save_track+0x18/0x40 [ 15.374861] kasan_save_alloc_info+0x3b/0x50 [ 15.375062] __kasan_kmalloc+0xb7/0xc0 [ 15.375243] __kmalloc_cache_noprof+0x189/0x420 [ 15.375462] kasan_atomics+0x95/0x310 [ 15.375931] kunit_try_run_case+0x1a5/0x480 [ 15.376190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.376501] kthread+0x337/0x6f0 [ 15.376765] ret_from_fork+0x116/0x1d0 [ 15.376960] ret_from_fork_asm+0x1a/0x30 [ 15.377285] [ 15.377362] The buggy address belongs to the object at ffff8881026f3680 [ 15.377362] which belongs to the cache kmalloc-64 of size 64 [ 15.378311] The buggy address is located 0 bytes to the right of [ 15.378311] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.378929] [ 15.379164] The buggy address belongs to the physical page: [ 15.379473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.380044] flags: 0x200000000000000(node=0|zone=2) [ 15.380296] page_type: f5(slab) [ 15.380578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.380997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.381366] page dumped because: kasan: bad access detected [ 15.381672] [ 15.381772] Memory state around the buggy address: [ 15.382158] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.382469] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.382935] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.383338] ^ [ 15.383680] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.384064] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.384365] ================================================================== [ 15.006377] ================================================================== [ 15.007032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.007357] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.007716] [ 15.007806] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.007848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.007860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.007881] Call Trace: [ 15.007907] <TASK> [ 15.007922] dump_stack_lvl+0x73/0xb0 [ 15.007949] print_report+0xd1/0x610 [ 15.007982] ? __virt_addr_valid+0x1db/0x2d0 [ 15.008004] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.008027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.008050] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.008073] kasan_report+0x141/0x180 [ 15.008096] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.008123] kasan_check_range+0x10c/0x1c0 [ 15.008148] __kasan_check_write+0x18/0x20 [ 15.008168] kasan_atomics_helper+0xfa9/0x5450 [ 15.008192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.008215] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.008241] ? kasan_atomics+0x152/0x310 [ 15.008268] kasan_atomics+0x1dc/0x310 [ 15.008291] ? __pfx_kasan_atomics+0x10/0x10 [ 15.008316] ? __pfx_read_tsc+0x10/0x10 [ 15.008337] ? ktime_get_ts64+0x86/0x230 [ 15.008364] kunit_try_run_case+0x1a5/0x480 [ 15.008388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.008413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.008446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.008470] ? __kthread_parkme+0x82/0x180 [ 15.008491] ? preempt_count_sub+0x50/0x80 [ 15.008516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.008560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.008585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.008609] kthread+0x337/0x6f0 [ 15.008630] ? trace_preempt_on+0x20/0xc0 [ 15.008653] ? __pfx_kthread+0x10/0x10 [ 15.008675] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.008697] ? calculate_sigpending+0x7b/0xa0 [ 15.008722] ? __pfx_kthread+0x10/0x10 [ 15.008744] ret_from_fork+0x116/0x1d0 [ 15.008772] ? __pfx_kthread+0x10/0x10 [ 15.008794] ret_from_fork_asm+0x1a/0x30 [ 15.008827] </TASK> [ 15.008848] [ 15.016123] Allocated by task 283: [ 15.016305] kasan_save_stack+0x45/0x70 [ 15.016514] kasan_save_track+0x18/0x40 [ 15.016751] kasan_save_alloc_info+0x3b/0x50 [ 15.016925] __kasan_kmalloc+0xb7/0xc0 [ 15.017116] __kmalloc_cache_noprof+0x189/0x420 [ 15.017339] kasan_atomics+0x95/0x310 [ 15.017558] kunit_try_run_case+0x1a5/0x480 [ 15.017741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.017993] kthread+0x337/0x6f0 [ 15.018163] ret_from_fork+0x116/0x1d0 [ 15.018331] ret_from_fork_asm+0x1a/0x30 [ 15.018581] [ 15.018673] The buggy address belongs to the object at ffff8881026f3680 [ 15.018673] which belongs to the cache kmalloc-64 of size 64 [ 15.019188] The buggy address is located 0 bytes to the right of [ 15.019188] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.019738] [ 15.019860] The buggy address belongs to the physical page: [ 15.020074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.020412] flags: 0x200000000000000(node=0|zone=2) [ 15.020640] page_type: f5(slab) [ 15.020789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.021148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.021430] page dumped because: kasan: bad access detected [ 15.021687] [ 15.021799] Memory state around the buggy address: [ 15.021983] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.022239] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.022462] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.022698] ^ [ 15.022853] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.023069] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.023282] ================================================================== [ 15.122668] ================================================================== [ 15.123019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.123296] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.123808] [ 15.123925] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.123968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.123980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.124001] Call Trace: [ 15.124015] <TASK> [ 15.124031] dump_stack_lvl+0x73/0xb0 [ 15.124059] print_report+0xd1/0x610 [ 15.124082] ? __virt_addr_valid+0x1db/0x2d0 [ 15.124105] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.124127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.124151] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.124174] kasan_report+0x141/0x180 [ 15.124197] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.124225] __asan_report_load4_noabort+0x18/0x20 [ 15.124250] kasan_atomics_helper+0x4a02/0x5450 [ 15.124274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.124297] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.124322] ? kasan_atomics+0x152/0x310 [ 15.124349] kasan_atomics+0x1dc/0x310 [ 15.124372] ? __pfx_kasan_atomics+0x10/0x10 [ 15.124397] ? __pfx_read_tsc+0x10/0x10 [ 15.124429] ? ktime_get_ts64+0x86/0x230 [ 15.124470] kunit_try_run_case+0x1a5/0x480 [ 15.124494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.124517] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.124549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.124574] ? __kthread_parkme+0x82/0x180 [ 15.124594] ? preempt_count_sub+0x50/0x80 [ 15.124619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.124644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.124668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.124693] kthread+0x337/0x6f0 [ 15.124713] ? trace_preempt_on+0x20/0xc0 [ 15.124737] ? __pfx_kthread+0x10/0x10 [ 15.124758] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.124780] ? calculate_sigpending+0x7b/0xa0 [ 15.124805] ? __pfx_kthread+0x10/0x10 [ 15.124826] ret_from_fork+0x116/0x1d0 [ 15.124845] ? __pfx_kthread+0x10/0x10 [ 15.124867] ret_from_fork_asm+0x1a/0x30 [ 15.124900] </TASK> [ 15.124910] [ 15.132124] Allocated by task 283: [ 15.132291] kasan_save_stack+0x45/0x70 [ 15.132480] kasan_save_track+0x18/0x40 [ 15.132663] kasan_save_alloc_info+0x3b/0x50 [ 15.132812] __kasan_kmalloc+0xb7/0xc0 [ 15.132945] __kmalloc_cache_noprof+0x189/0x420 [ 15.133100] kasan_atomics+0x95/0x310 [ 15.133330] kunit_try_run_case+0x1a5/0x480 [ 15.133573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.133839] kthread+0x337/0x6f0 [ 15.134010] ret_from_fork+0x116/0x1d0 [ 15.134199] ret_from_fork_asm+0x1a/0x30 [ 15.134375] [ 15.134456] The buggy address belongs to the object at ffff8881026f3680 [ 15.134456] which belongs to the cache kmalloc-64 of size 64 [ 15.135276] The buggy address is located 0 bytes to the right of [ 15.135276] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.135790] [ 15.135877] The buggy address belongs to the physical page: [ 15.136137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.136457] flags: 0x200000000000000(node=0|zone=2) [ 15.136675] page_type: f5(slab) [ 15.136844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.137150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.137485] page dumped because: kasan: bad access detected [ 15.137729] [ 15.137829] Memory state around the buggy address: [ 15.138010] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.138227] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.138456] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.138676] ^ [ 15.138840] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.139127] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.139706] ================================================================== [ 14.556034] ================================================================== [ 14.556358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.557388] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.558078] [ 14.558204] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.558252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.558264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.558287] Call Trace: [ 14.558304] <TASK> [ 14.558321] dump_stack_lvl+0x73/0xb0 [ 14.558352] print_report+0xd1/0x610 [ 14.558374] ? __virt_addr_valid+0x1db/0x2d0 [ 14.558397] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.558609] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.558634] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.558672] kasan_report+0x141/0x180 [ 14.558697] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.558732] __asan_report_store4_noabort+0x1b/0x30 [ 14.558757] kasan_atomics_helper+0x4b6e/0x5450 [ 14.558784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.558810] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.558835] ? kasan_atomics+0x152/0x310 [ 14.558863] kasan_atomics+0x1dc/0x310 [ 14.558886] ? __pfx_kasan_atomics+0x10/0x10 [ 14.558910] ? __pfx_read_tsc+0x10/0x10 [ 14.558932] ? ktime_get_ts64+0x86/0x230 [ 14.558958] kunit_try_run_case+0x1a5/0x480 [ 14.558983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559006] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.559031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.559055] ? __kthread_parkme+0x82/0x180 [ 14.559076] ? preempt_count_sub+0x50/0x80 [ 14.559101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.559177] kthread+0x337/0x6f0 [ 14.559197] ? trace_preempt_on+0x20/0xc0 [ 14.559221] ? __pfx_kthread+0x10/0x10 [ 14.559242] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.559264] ? calculate_sigpending+0x7b/0xa0 [ 14.559289] ? __pfx_kthread+0x10/0x10 [ 14.559311] ret_from_fork+0x116/0x1d0 [ 14.559330] ? __pfx_kthread+0x10/0x10 [ 14.559351] ret_from_fork_asm+0x1a/0x30 [ 14.559384] </TASK> [ 14.559395] [ 14.567678] Allocated by task 283: [ 14.567808] kasan_save_stack+0x45/0x70 [ 14.568143] kasan_save_track+0x18/0x40 [ 14.568340] kasan_save_alloc_info+0x3b/0x50 [ 14.568615] __kasan_kmalloc+0xb7/0xc0 [ 14.568802] __kmalloc_cache_noprof+0x189/0x420 [ 14.569015] kasan_atomics+0x95/0x310 [ 14.569153] kunit_try_run_case+0x1a5/0x480 [ 14.569300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.569497] kthread+0x337/0x6f0 [ 14.569849] ret_from_fork+0x116/0x1d0 [ 14.570039] ret_from_fork_asm+0x1a/0x30 [ 14.570240] [ 14.570348] The buggy address belongs to the object at ffff8881026f3680 [ 14.570348] which belongs to the cache kmalloc-64 of size 64 [ 14.570844] The buggy address is located 0 bytes to the right of [ 14.570844] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.571230] [ 14.571317] The buggy address belongs to the physical page: [ 14.571610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.571981] flags: 0x200000000000000(node=0|zone=2) [ 14.572215] page_type: f5(slab) [ 14.572383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.572781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.573025] page dumped because: kasan: bad access detected [ 14.573204] [ 14.573274] Memory state around the buggy address: [ 14.573499] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.574213] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.574722] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.575028] ^ [ 14.575235] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.575568] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.575945] ================================================================== [ 15.197204] ================================================================== [ 15.197794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.198135] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.198556] [ 15.198667] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.198707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.198719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.198739] Call Trace: [ 15.198751] <TASK> [ 15.198766] dump_stack_lvl+0x73/0xb0 [ 15.198793] print_report+0xd1/0x610 [ 15.198815] ? __virt_addr_valid+0x1db/0x2d0 [ 15.198838] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.198860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.198884] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.198907] kasan_report+0x141/0x180 [ 15.198929] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.198957] __asan_report_load4_noabort+0x18/0x20 [ 15.198982] kasan_atomics_helper+0x49ce/0x5450 [ 15.199006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.199030] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.199055] ? kasan_atomics+0x152/0x310 [ 15.199083] kasan_atomics+0x1dc/0x310 [ 15.199106] ? __pfx_kasan_atomics+0x10/0x10 [ 15.199131] ? __pfx_read_tsc+0x10/0x10 [ 15.199152] ? ktime_get_ts64+0x86/0x230 [ 15.199177] kunit_try_run_case+0x1a5/0x480 [ 15.199202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.199226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.199250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.199275] ? __kthread_parkme+0x82/0x180 [ 15.199296] ? preempt_count_sub+0x50/0x80 [ 15.199321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.199345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.199370] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.199395] kthread+0x337/0x6f0 [ 15.199414] ? trace_preempt_on+0x20/0xc0 [ 15.199449] ? __pfx_kthread+0x10/0x10 [ 15.199469] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.199492] ? calculate_sigpending+0x7b/0xa0 [ 15.199516] ? __pfx_kthread+0x10/0x10 [ 15.199538] ret_from_fork+0x116/0x1d0 [ 15.199558] ? __pfx_kthread+0x10/0x10 [ 15.199579] ret_from_fork_asm+0x1a/0x30 [ 15.199614] </TASK> [ 15.199624] [ 15.206887] Allocated by task 283: [ 15.207072] kasan_save_stack+0x45/0x70 [ 15.207276] kasan_save_track+0x18/0x40 [ 15.207478] kasan_save_alloc_info+0x3b/0x50 [ 15.207850] __kasan_kmalloc+0xb7/0xc0 [ 15.208045] __kmalloc_cache_noprof+0x189/0x420 [ 15.208273] kasan_atomics+0x95/0x310 [ 15.208451] kunit_try_run_case+0x1a5/0x480 [ 15.208646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.208890] kthread+0x337/0x6f0 [ 15.209016] ret_from_fork+0x116/0x1d0 [ 15.209205] ret_from_fork_asm+0x1a/0x30 [ 15.209405] [ 15.209513] The buggy address belongs to the object at ffff8881026f3680 [ 15.209513] which belongs to the cache kmalloc-64 of size 64 [ 15.209989] The buggy address is located 0 bytes to the right of [ 15.209989] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.210486] [ 15.210608] The buggy address belongs to the physical page: [ 15.210843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.211138] flags: 0x200000000000000(node=0|zone=2) [ 15.211354] page_type: f5(slab) [ 15.211529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.211836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.212144] page dumped because: kasan: bad access detected [ 15.212346] [ 15.212415] Memory state around the buggy address: [ 15.212643] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.212956] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.213227] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.213531] ^ [ 15.213721] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.213938] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214152] ================================================================== [ 15.232234] ================================================================== [ 15.232679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.233033] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.233332] [ 15.233415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.233467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.233479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.233500] Call Trace: [ 15.233513] <TASK> [ 15.233527] dump_stack_lvl+0x73/0xb0 [ 15.233554] print_report+0xd1/0x610 [ 15.233588] ? __virt_addr_valid+0x1db/0x2d0 [ 15.233612] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.233634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.233658] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.233680] kasan_report+0x141/0x180 [ 15.233703] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.233732] __asan_report_load8_noabort+0x18/0x20 [ 15.233757] kasan_atomics_helper+0x4eae/0x5450 [ 15.233780] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.233803] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.233829] ? kasan_atomics+0x152/0x310 [ 15.233857] kasan_atomics+0x1dc/0x310 [ 15.233880] ? __pfx_kasan_atomics+0x10/0x10 [ 15.233905] ? __pfx_read_tsc+0x10/0x10 [ 15.233926] ? ktime_get_ts64+0x86/0x230 [ 15.233952] kunit_try_run_case+0x1a5/0x480 [ 15.233977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.234000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.234024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.234049] ? __kthread_parkme+0x82/0x180 [ 15.234070] ? preempt_count_sub+0x50/0x80 [ 15.234095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.234119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.234143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.234169] kthread+0x337/0x6f0 [ 15.234189] ? trace_preempt_on+0x20/0xc0 [ 15.234213] ? __pfx_kthread+0x10/0x10 [ 15.234233] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.234256] ? calculate_sigpending+0x7b/0xa0 [ 15.234281] ? __pfx_kthread+0x10/0x10 [ 15.234303] ret_from_fork+0x116/0x1d0 [ 15.234322] ? __pfx_kthread+0x10/0x10 [ 15.234344] ret_from_fork_asm+0x1a/0x30 [ 15.234377] </TASK> [ 15.234387] [ 15.241468] Allocated by task 283: [ 15.241706] kasan_save_stack+0x45/0x70 [ 15.241908] kasan_save_track+0x18/0x40 [ 15.242061] kasan_save_alloc_info+0x3b/0x50 [ 15.242243] __kasan_kmalloc+0xb7/0xc0 [ 15.242443] __kmalloc_cache_noprof+0x189/0x420 [ 15.242692] kasan_atomics+0x95/0x310 [ 15.242878] kunit_try_run_case+0x1a5/0x480 [ 15.243063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.243288] kthread+0x337/0x6f0 [ 15.243432] ret_from_fork+0x116/0x1d0 [ 15.243632] ret_from_fork_asm+0x1a/0x30 [ 15.243823] [ 15.243909] The buggy address belongs to the object at ffff8881026f3680 [ 15.243909] which belongs to the cache kmalloc-64 of size 64 [ 15.244368] The buggy address is located 0 bytes to the right of [ 15.244368] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.244875] [ 15.244973] The buggy address belongs to the physical page: [ 15.245185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.245428] flags: 0x200000000000000(node=0|zone=2) [ 15.245601] page_type: f5(slab) [ 15.245722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.245957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.246187] page dumped because: kasan: bad access detected [ 15.246476] [ 15.246575] Memory state around the buggy address: [ 15.246798] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.247111] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.247421] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.247781] ^ [ 15.247937] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.248153] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.248368] ================================================================== [ 15.599159] ================================================================== [ 15.599757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.600095] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.600325] [ 15.600414] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.600470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.600482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.600505] Call Trace: [ 15.600525] <TASK> [ 15.600544] dump_stack_lvl+0x73/0xb0 [ 15.600574] print_report+0xd1/0x610 [ 15.600597] ? __virt_addr_valid+0x1db/0x2d0 [ 15.600620] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.600642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.600666] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.600689] kasan_report+0x141/0x180 [ 15.600712] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.600740] kasan_check_range+0x10c/0x1c0 [ 15.600765] __kasan_check_write+0x18/0x20 [ 15.600785] kasan_atomics_helper+0x1d7a/0x5450 [ 15.600810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.600833] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.600859] ? kasan_atomics+0x152/0x310 [ 15.600886] kasan_atomics+0x1dc/0x310 [ 15.600909] ? __pfx_kasan_atomics+0x10/0x10 [ 15.600935] ? __pfx_read_tsc+0x10/0x10 [ 15.600956] ? ktime_get_ts64+0x86/0x230 [ 15.600982] kunit_try_run_case+0x1a5/0x480 [ 15.601007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.601031] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.601056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.601081] ? __kthread_parkme+0x82/0x180 [ 15.601101] ? preempt_count_sub+0x50/0x80 [ 15.601127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.601156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.601180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.601205] kthread+0x337/0x6f0 [ 15.601224] ? trace_preempt_on+0x20/0xc0 [ 15.601247] ? __pfx_kthread+0x10/0x10 [ 15.601269] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.601291] ? calculate_sigpending+0x7b/0xa0 [ 15.601316] ? __pfx_kthread+0x10/0x10 [ 15.601338] ret_from_fork+0x116/0x1d0 [ 15.601357] ? __pfx_kthread+0x10/0x10 [ 15.601378] ret_from_fork_asm+0x1a/0x30 [ 15.601412] </TASK> [ 15.601423] [ 15.609756] Allocated by task 283: [ 15.609973] kasan_save_stack+0x45/0x70 [ 15.610231] kasan_save_track+0x18/0x40 [ 15.610471] kasan_save_alloc_info+0x3b/0x50 [ 15.610726] __kasan_kmalloc+0xb7/0xc0 [ 15.610916] __kmalloc_cache_noprof+0x189/0x420 [ 15.611170] kasan_atomics+0x95/0x310 [ 15.611360] kunit_try_run_case+0x1a5/0x480 [ 15.611708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.611969] kthread+0x337/0x6f0 [ 15.612116] ret_from_fork+0x116/0x1d0 [ 15.612251] ret_from_fork_asm+0x1a/0x30 [ 15.612428] [ 15.612537] The buggy address belongs to the object at ffff8881026f3680 [ 15.612537] which belongs to the cache kmalloc-64 of size 64 [ 15.613099] The buggy address is located 0 bytes to the right of [ 15.613099] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.613529] [ 15.613612] The buggy address belongs to the physical page: [ 15.613789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.614156] flags: 0x200000000000000(node=0|zone=2) [ 15.614390] page_type: f5(slab) [ 15.614589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.614949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.615250] page dumped because: kasan: bad access detected [ 15.615528] [ 15.615632] Memory state around the buggy address: [ 15.615837] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.616188] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.616525] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.616932] ^ [ 15.617157] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.617521] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.617845] ================================================================== [ 15.714417] ================================================================== [ 15.715176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.715503] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.715798] [ 15.715883] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.715925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.715937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.715959] Call Trace: [ 15.715976] <TASK> [ 15.715991] dump_stack_lvl+0x73/0xb0 [ 15.716018] print_report+0xd1/0x610 [ 15.716040] ? __virt_addr_valid+0x1db/0x2d0 [ 15.716063] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.716085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.716109] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.716132] kasan_report+0x141/0x180 [ 15.716155] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.716183] __asan_report_load8_noabort+0x18/0x20 [ 15.716208] kasan_atomics_helper+0x4f98/0x5450 [ 15.716232] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.716255] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.716281] ? kasan_atomics+0x152/0x310 [ 15.716308] kasan_atomics+0x1dc/0x310 [ 15.716332] ? __pfx_kasan_atomics+0x10/0x10 [ 15.716356] ? __pfx_read_tsc+0x10/0x10 [ 15.716378] ? ktime_get_ts64+0x86/0x230 [ 15.716404] kunit_try_run_case+0x1a5/0x480 [ 15.716428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.716462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.716487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.716512] ? __kthread_parkme+0x82/0x180 [ 15.716533] ? preempt_count_sub+0x50/0x80 [ 15.716566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.716591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.716616] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.716641] kthread+0x337/0x6f0 [ 15.716661] ? trace_preempt_on+0x20/0xc0 [ 15.716684] ? __pfx_kthread+0x10/0x10 [ 15.716705] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.716773] ? calculate_sigpending+0x7b/0xa0 [ 15.716825] ? __pfx_kthread+0x10/0x10 [ 15.716847] ret_from_fork+0x116/0x1d0 [ 15.716895] ? __pfx_kthread+0x10/0x10 [ 15.716917] ret_from_fork_asm+0x1a/0x30 [ 15.716976] </TASK> [ 15.716987] [ 15.728615] Allocated by task 283: [ 15.728793] kasan_save_stack+0x45/0x70 [ 15.729004] kasan_save_track+0x18/0x40 [ 15.729189] kasan_save_alloc_info+0x3b/0x50 [ 15.729342] __kasan_kmalloc+0xb7/0xc0 [ 15.729501] __kmalloc_cache_noprof+0x189/0x420 [ 15.729741] kasan_atomics+0x95/0x310 [ 15.729929] kunit_try_run_case+0x1a5/0x480 [ 15.730137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.730348] kthread+0x337/0x6f0 [ 15.730546] ret_from_fork+0x116/0x1d0 [ 15.730724] ret_from_fork_asm+0x1a/0x30 [ 15.730917] [ 15.731014] The buggy address belongs to the object at ffff8881026f3680 [ 15.731014] which belongs to the cache kmalloc-64 of size 64 [ 15.731486] The buggy address is located 0 bytes to the right of [ 15.731486] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.731979] [ 15.732083] The buggy address belongs to the physical page: [ 15.732338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.732617] flags: 0x200000000000000(node=0|zone=2) [ 15.732786] page_type: f5(slab) [ 15.732909] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.733261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.733630] page dumped because: kasan: bad access detected [ 15.733881] [ 15.733974] Memory state around the buggy address: [ 15.734197] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.734474] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.734736] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.735029] ^ [ 15.735254] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.735563] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.735843] ================================================================== [ 15.559687] ================================================================== [ 15.560074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.560338] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.561036] [ 15.561141] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.561187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.561200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.561222] Call Trace: [ 15.561238] <TASK> [ 15.561255] dump_stack_lvl+0x73/0xb0 [ 15.561285] print_report+0xd1/0x610 [ 15.561307] ? __virt_addr_valid+0x1db/0x2d0 [ 15.561330] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.561353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.561376] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.561399] kasan_report+0x141/0x180 [ 15.561422] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.561464] __asan_report_load8_noabort+0x18/0x20 [ 15.561490] kasan_atomics_helper+0x4f30/0x5450 [ 15.561514] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.561538] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.561563] ? kasan_atomics+0x152/0x310 [ 15.561613] kasan_atomics+0x1dc/0x310 [ 15.561637] ? __pfx_kasan_atomics+0x10/0x10 [ 15.561661] ? __pfx_read_tsc+0x10/0x10 [ 15.561683] ? ktime_get_ts64+0x86/0x230 [ 15.561710] kunit_try_run_case+0x1a5/0x480 [ 15.561734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.561757] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.561781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.561823] ? __kthread_parkme+0x82/0x180 [ 15.561844] ? preempt_count_sub+0x50/0x80 [ 15.561869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.561894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.561918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.561943] kthread+0x337/0x6f0 [ 15.561963] ? trace_preempt_on+0x20/0xc0 [ 15.562002] ? __pfx_kthread+0x10/0x10 [ 15.562022] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.562045] ? calculate_sigpending+0x7b/0xa0 [ 15.562069] ? __pfx_kthread+0x10/0x10 [ 15.562091] ret_from_fork+0x116/0x1d0 [ 15.562109] ? __pfx_kthread+0x10/0x10 [ 15.562131] ret_from_fork_asm+0x1a/0x30 [ 15.562164] </TASK> [ 15.562175] [ 15.570146] Allocated by task 283: [ 15.570362] kasan_save_stack+0x45/0x70 [ 15.570564] kasan_save_track+0x18/0x40 [ 15.570751] kasan_save_alloc_info+0x3b/0x50 [ 15.570959] __kasan_kmalloc+0xb7/0xc0 [ 15.571163] __kmalloc_cache_noprof+0x189/0x420 [ 15.571314] kasan_atomics+0x95/0x310 [ 15.571627] kunit_try_run_case+0x1a5/0x480 [ 15.571837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.572052] kthread+0x337/0x6f0 [ 15.572170] ret_from_fork+0x116/0x1d0 [ 15.572299] ret_from_fork_asm+0x1a/0x30 [ 15.572446] [ 15.572539] The buggy address belongs to the object at ffff8881026f3680 [ 15.572539] which belongs to the cache kmalloc-64 of size 64 [ 15.573072] The buggy address is located 0 bytes to the right of [ 15.573072] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.573852] [ 15.574004] The buggy address belongs to the physical page: [ 15.574276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.574705] flags: 0x200000000000000(node=0|zone=2) [ 15.574868] page_type: f5(slab) [ 15.574986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.575213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.575478] page dumped because: kasan: bad access detected [ 15.575968] [ 15.576098] Memory state around the buggy address: [ 15.576352] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.576735] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.577102] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.577430] ^ [ 15.577674] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.577979] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.578283] ================================================================== [ 15.770265] ================================================================== [ 15.770774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.771218] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.771540] [ 15.771654] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.771695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.771706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.771727] Call Trace: [ 15.771742] <TASK> [ 15.771757] dump_stack_lvl+0x73/0xb0 [ 15.771783] print_report+0xd1/0x610 [ 15.771805] ? __virt_addr_valid+0x1db/0x2d0 [ 15.771829] ? kasan_atomics_helper+0x218a/0x5450 [ 15.771850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.771873] ? kasan_atomics_helper+0x218a/0x5450 [ 15.771896] kasan_report+0x141/0x180 [ 15.771918] ? kasan_atomics_helper+0x218a/0x5450 [ 15.771946] kasan_check_range+0x10c/0x1c0 [ 15.771971] __kasan_check_write+0x18/0x20 [ 15.771991] kasan_atomics_helper+0x218a/0x5450 [ 15.772014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.772037] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.772063] ? kasan_atomics+0x152/0x310 [ 15.772090] kasan_atomics+0x1dc/0x310 [ 15.772113] ? __pfx_kasan_atomics+0x10/0x10 [ 15.772138] ? __pfx_read_tsc+0x10/0x10 [ 15.772159] ? ktime_get_ts64+0x86/0x230 [ 15.772185] kunit_try_run_case+0x1a5/0x480 [ 15.772209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.772232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.772256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.772284] ? __kthread_parkme+0x82/0x180 [ 15.772305] ? preempt_count_sub+0x50/0x80 [ 15.772329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.772354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.772378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.772403] kthread+0x337/0x6f0 [ 15.772422] ? trace_preempt_on+0x20/0xc0 [ 15.772455] ? __pfx_kthread+0x10/0x10 [ 15.772476] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.772498] ? calculate_sigpending+0x7b/0xa0 [ 15.772541] ? __pfx_kthread+0x10/0x10 [ 15.772564] ret_from_fork+0x116/0x1d0 [ 15.772582] ? __pfx_kthread+0x10/0x10 [ 15.772603] ret_from_fork_asm+0x1a/0x30 [ 15.772636] </TASK> [ 15.772646] [ 15.784123] Allocated by task 283: [ 15.784301] kasan_save_stack+0x45/0x70 [ 15.784523] kasan_save_track+0x18/0x40 [ 15.785023] kasan_save_alloc_info+0x3b/0x50 [ 15.785208] __kasan_kmalloc+0xb7/0xc0 [ 15.785570] __kmalloc_cache_noprof+0x189/0x420 [ 15.785874] kasan_atomics+0x95/0x310 [ 15.786159] kunit_try_run_case+0x1a5/0x480 [ 15.786320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.786816] kthread+0x337/0x6f0 [ 15.787079] ret_from_fork+0x116/0x1d0 [ 15.787336] ret_from_fork_asm+0x1a/0x30 [ 15.787504] [ 15.787603] The buggy address belongs to the object at ffff8881026f3680 [ 15.787603] which belongs to the cache kmalloc-64 of size 64 [ 15.788495] The buggy address is located 0 bytes to the right of [ 15.788495] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.789107] [ 15.789195] The buggy address belongs to the physical page: [ 15.789613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.790043] flags: 0x200000000000000(node=0|zone=2) [ 15.790355] page_type: f5(slab) [ 15.790532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.790943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.791277] page dumped because: kasan: bad access detected [ 15.791693] [ 15.791792] Memory state around the buggy address: [ 15.792137] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.792521] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.792951] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.793303] ^ [ 15.793481] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.793954] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.794324] ================================================================== [ 15.430637] ================================================================== [ 15.431105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.431703] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.432009] [ 15.432109] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.432154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.432167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.432189] Call Trace: [ 15.432204] <TASK> [ 15.432220] dump_stack_lvl+0x73/0xb0 [ 15.432248] print_report+0xd1/0x610 [ 15.432270] ? __virt_addr_valid+0x1db/0x2d0 [ 15.432293] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.432315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.432339] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.432361] kasan_report+0x141/0x180 [ 15.432384] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.432411] kasan_check_range+0x10c/0x1c0 [ 15.432447] __kasan_check_write+0x18/0x20 [ 15.432468] kasan_atomics_helper+0x18b1/0x5450 [ 15.432492] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.432514] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.432539] ? kasan_atomics+0x152/0x310 [ 15.432567] kasan_atomics+0x1dc/0x310 [ 15.432591] ? __pfx_kasan_atomics+0x10/0x10 [ 15.432615] ? __pfx_read_tsc+0x10/0x10 [ 15.432636] ? ktime_get_ts64+0x86/0x230 [ 15.432662] kunit_try_run_case+0x1a5/0x480 [ 15.432687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.432710] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.432734] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.432759] ? __kthread_parkme+0x82/0x180 [ 15.432779] ? preempt_count_sub+0x50/0x80 [ 15.433037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.433067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.433183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.433211] kthread+0x337/0x6f0 [ 15.433231] ? trace_preempt_on+0x20/0xc0 [ 15.433254] ? __pfx_kthread+0x10/0x10 [ 15.433276] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.433297] ? calculate_sigpending+0x7b/0xa0 [ 15.433322] ? __pfx_kthread+0x10/0x10 [ 15.433344] ret_from_fork+0x116/0x1d0 [ 15.433363] ? __pfx_kthread+0x10/0x10 [ 15.433383] ret_from_fork_asm+0x1a/0x30 [ 15.433416] </TASK> [ 15.433427] [ 15.443311] Allocated by task 283: [ 15.443493] kasan_save_stack+0x45/0x70 [ 15.443846] kasan_save_track+0x18/0x40 [ 15.444016] kasan_save_alloc_info+0x3b/0x50 [ 15.444330] __kasan_kmalloc+0xb7/0xc0 [ 15.444503] __kmalloc_cache_noprof+0x189/0x420 [ 15.444865] kasan_atomics+0x95/0x310 [ 15.445046] kunit_try_run_case+0x1a5/0x480 [ 15.445237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445494] kthread+0x337/0x6f0 [ 15.445875] ret_from_fork+0x116/0x1d0 [ 15.446051] ret_from_fork_asm+0x1a/0x30 [ 15.446298] [ 15.446461] The buggy address belongs to the object at ffff8881026f3680 [ 15.446461] which belongs to the cache kmalloc-64 of size 64 [ 15.447008] The buggy address is located 0 bytes to the right of [ 15.447008] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.447727] [ 15.447813] The buggy address belongs to the physical page: [ 15.448033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.448372] flags: 0x200000000000000(node=0|zone=2) [ 15.448595] page_type: f5(slab) [ 15.449030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.449432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.449888] page dumped because: kasan: bad access detected [ 15.450208] [ 15.450304] Memory state around the buggy address: [ 15.450654] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.451036] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.451391] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.451779] ^ [ 15.452057] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.452318] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.452845] ================================================================== [ 15.508702] ================================================================== [ 15.509405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.509757] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.510081] [ 15.510190] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.510233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.510246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.510268] Call Trace: [ 15.510284] <TASK> [ 15.510301] dump_stack_lvl+0x73/0xb0 [ 15.510328] print_report+0xd1/0x610 [ 15.510349] ? __virt_addr_valid+0x1db/0x2d0 [ 15.510372] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.510393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.510416] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.510447] kasan_report+0x141/0x180 [ 15.510470] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.510496] kasan_check_range+0x10c/0x1c0 [ 15.510520] __kasan_check_write+0x18/0x20 [ 15.510539] kasan_atomics_helper+0x1b22/0x5450 [ 15.510562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.510585] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.510610] ? kasan_atomics+0x152/0x310 [ 15.510636] kasan_atomics+0x1dc/0x310 [ 15.510658] ? __pfx_kasan_atomics+0x10/0x10 [ 15.510682] ? __pfx_read_tsc+0x10/0x10 [ 15.510702] ? ktime_get_ts64+0x86/0x230 [ 15.510728] kunit_try_run_case+0x1a5/0x480 [ 15.510751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.510774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.510798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.510821] ? __kthread_parkme+0x82/0x180 [ 15.510840] ? preempt_count_sub+0x50/0x80 [ 15.510865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.510888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.510911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.510935] kthread+0x337/0x6f0 [ 15.510953] ? trace_preempt_on+0x20/0xc0 [ 15.510976] ? __pfx_kthread+0x10/0x10 [ 15.510997] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.511018] ? calculate_sigpending+0x7b/0xa0 [ 15.511042] ? __pfx_kthread+0x10/0x10 [ 15.511063] ret_from_fork+0x116/0x1d0 [ 15.511081] ? __pfx_kthread+0x10/0x10 [ 15.511101] ret_from_fork_asm+0x1a/0x30 [ 15.511134] </TASK> [ 15.511157] [ 15.519728] Allocated by task 283: [ 15.519935] kasan_save_stack+0x45/0x70 [ 15.520172] kasan_save_track+0x18/0x40 [ 15.520390] kasan_save_alloc_info+0x3b/0x50 [ 15.520619] __kasan_kmalloc+0xb7/0xc0 [ 15.520828] __kmalloc_cache_noprof+0x189/0x420 [ 15.520982] kasan_atomics+0x95/0x310 [ 15.521112] kunit_try_run_case+0x1a5/0x480 [ 15.521257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.521428] kthread+0x337/0x6f0 [ 15.521657] ret_from_fork+0x116/0x1d0 [ 15.521867] ret_from_fork_asm+0x1a/0x30 [ 15.522093] [ 15.522205] The buggy address belongs to the object at ffff8881026f3680 [ 15.522205] which belongs to the cache kmalloc-64 of size 64 [ 15.522796] The buggy address is located 0 bytes to the right of [ 15.522796] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.523422] [ 15.523529] The buggy address belongs to the physical page: [ 15.524085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.524429] flags: 0x200000000000000(node=0|zone=2) [ 15.525184] page_type: f5(slab) [ 15.525345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.526497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.528633] page dumped because: kasan: bad access detected [ 15.529123] [ 15.529208] Memory state around the buggy address: [ 15.529370] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.530000] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.530740] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.531433] ^ [ 15.531956] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532404] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532949] ================================================================== [ 14.523972] ================================================================== [ 14.524725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.524967] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.525196] [ 14.525282] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.525324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.525336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.525357] Call Trace: [ 14.525368] <TASK> [ 14.525384] dump_stack_lvl+0x73/0xb0 [ 14.525428] print_report+0xd1/0x610 [ 14.525461] ? __virt_addr_valid+0x1db/0x2d0 [ 14.525484] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.525504] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.525527] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.525548] kasan_report+0x141/0x180 [ 14.525570] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.525596] __asan_report_load4_noabort+0x18/0x20 [ 14.525620] kasan_atomics_helper+0x4b88/0x5450 [ 14.525643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.525665] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.525689] ? kasan_atomics+0x152/0x310 [ 14.525716] kasan_atomics+0x1dc/0x310 [ 14.525738] ? __pfx_kasan_atomics+0x10/0x10 [ 14.525761] ? __pfx_read_tsc+0x10/0x10 [ 14.525781] ? ktime_get_ts64+0x86/0x230 [ 14.525806] kunit_try_run_case+0x1a5/0x480 [ 14.525874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.525898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.525923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.525946] ? __kthread_parkme+0x82/0x180 [ 14.525967] ? preempt_count_sub+0x50/0x80 [ 14.525990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.526040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.526064] kthread+0x337/0x6f0 [ 14.526082] ? trace_preempt_on+0x20/0xc0 [ 14.526106] ? __pfx_kthread+0x10/0x10 [ 14.526126] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.526148] ? calculate_sigpending+0x7b/0xa0 [ 14.526172] ? __pfx_kthread+0x10/0x10 [ 14.526193] ret_from_fork+0x116/0x1d0 [ 14.526211] ? __pfx_kthread+0x10/0x10 [ 14.526231] ret_from_fork_asm+0x1a/0x30 [ 14.526264] </TASK> [ 14.526274] [ 14.540755] Allocated by task 283: [ 14.541000] kasan_save_stack+0x45/0x70 [ 14.541153] kasan_save_track+0x18/0x40 [ 14.541288] kasan_save_alloc_info+0x3b/0x50 [ 14.541528] __kasan_kmalloc+0xb7/0xc0 [ 14.541873] __kmalloc_cache_noprof+0x189/0x420 [ 14.542376] kasan_atomics+0x95/0x310 [ 14.542838] kunit_try_run_case+0x1a5/0x480 [ 14.543264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.543765] kthread+0x337/0x6f0 [ 14.544160] ret_from_fork+0x116/0x1d0 [ 14.544552] ret_from_fork_asm+0x1a/0x30 [ 14.545106] [ 14.545211] The buggy address belongs to the object at ffff8881026f3680 [ 14.545211] which belongs to the cache kmalloc-64 of size 64 [ 14.546188] The buggy address is located 0 bytes to the right of [ 14.546188] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.547554] [ 14.547750] The buggy address belongs to the physical page: [ 14.548246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.548850] flags: 0x200000000000000(node=0|zone=2) [ 14.549132] page_type: f5(slab) [ 14.549257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.549780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.550597] page dumped because: kasan: bad access detected [ 14.551294] [ 14.551755] Memory state around the buggy address: [ 14.552507] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.552754] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.552975] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.553199] ^ [ 14.553358] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.554256] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.555123] ================================================================== [ 14.658865] ================================================================== [ 14.659260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.659854] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.660274] [ 14.660372] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.660414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.660427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.660458] Call Trace: [ 14.660473] <TASK> [ 14.660488] dump_stack_lvl+0x73/0xb0 [ 14.660516] print_report+0xd1/0x610 [ 14.660538] ? __virt_addr_valid+0x1db/0x2d0 [ 14.660562] ? kasan_atomics_helper+0x565/0x5450 [ 14.660583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.660607] ? kasan_atomics_helper+0x565/0x5450 [ 14.660629] kasan_report+0x141/0x180 [ 14.660654] ? kasan_atomics_helper+0x565/0x5450 [ 14.660692] kasan_check_range+0x10c/0x1c0 [ 14.660717] __kasan_check_write+0x18/0x20 [ 14.660737] kasan_atomics_helper+0x565/0x5450 [ 14.660760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.660784] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.660810] ? kasan_atomics+0x152/0x310 [ 14.660837] kasan_atomics+0x1dc/0x310 [ 14.660860] ? __pfx_kasan_atomics+0x10/0x10 [ 14.660886] ? __pfx_read_tsc+0x10/0x10 [ 14.660907] ? ktime_get_ts64+0x86/0x230 [ 14.660932] kunit_try_run_case+0x1a5/0x480 [ 14.660958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.660981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.661007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.661030] ? __kthread_parkme+0x82/0x180 [ 14.661050] ? preempt_count_sub+0x50/0x80 [ 14.661075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.661099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.661125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.661155] kthread+0x337/0x6f0 [ 14.661175] ? trace_preempt_on+0x20/0xc0 [ 14.661199] ? __pfx_kthread+0x10/0x10 [ 14.661220] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.661242] ? calculate_sigpending+0x7b/0xa0 [ 14.661266] ? __pfx_kthread+0x10/0x10 [ 14.661288] ret_from_fork+0x116/0x1d0 [ 14.661307] ? __pfx_kthread+0x10/0x10 [ 14.661328] ret_from_fork_asm+0x1a/0x30 [ 14.661361] </TASK> [ 14.661371] [ 14.668736] Allocated by task 283: [ 14.668922] kasan_save_stack+0x45/0x70 [ 14.669123] kasan_save_track+0x18/0x40 [ 14.669324] kasan_save_alloc_info+0x3b/0x50 [ 14.669547] __kasan_kmalloc+0xb7/0xc0 [ 14.669787] __kmalloc_cache_noprof+0x189/0x420 [ 14.670014] kasan_atomics+0x95/0x310 [ 14.670215] kunit_try_run_case+0x1a5/0x480 [ 14.670410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.670753] kthread+0x337/0x6f0 [ 14.670916] ret_from_fork+0x116/0x1d0 [ 14.671066] ret_from_fork_asm+0x1a/0x30 [ 14.671207] [ 14.671277] The buggy address belongs to the object at ffff8881026f3680 [ 14.671277] which belongs to the cache kmalloc-64 of size 64 [ 14.671969] The buggy address is located 0 bytes to the right of [ 14.671969] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.672406] [ 14.672488] The buggy address belongs to the physical page: [ 14.672662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.672903] flags: 0x200000000000000(node=0|zone=2) [ 14.673066] page_type: f5(slab) [ 14.673189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.673474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.673848] page dumped because: kasan: bad access detected [ 14.674097] [ 14.674188] Memory state around the buggy address: [ 14.674407] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.674739] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.675062] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.675510] ^ [ 14.675745] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.675965] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.676180] ================================================================== [ 15.334621] ================================================================== [ 15.334982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.335322] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.335834] [ 15.338499] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.338547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.338559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.338581] Call Trace: [ 15.338596] <TASK> [ 15.338611] dump_stack_lvl+0x73/0xb0 [ 15.338670] print_report+0xd1/0x610 [ 15.338692] ? __virt_addr_valid+0x1db/0x2d0 [ 15.338714] ? kasan_atomics_helper+0x164f/0x5450 [ 15.338755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.338778] ? kasan_atomics_helper+0x164f/0x5450 [ 15.338802] kasan_report+0x141/0x180 [ 15.338839] ? kasan_atomics_helper+0x164f/0x5450 [ 15.338867] kasan_check_range+0x10c/0x1c0 [ 15.338906] __kasan_check_write+0x18/0x20 [ 15.338925] kasan_atomics_helper+0x164f/0x5450 [ 15.338949] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.338986] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.339025] ? kasan_atomics+0x152/0x310 [ 15.339053] kasan_atomics+0x1dc/0x310 [ 15.339076] ? __pfx_kasan_atomics+0x10/0x10 [ 15.339102] ? __pfx_read_tsc+0x10/0x10 [ 15.339124] ? ktime_get_ts64+0x86/0x230 [ 15.339149] kunit_try_run_case+0x1a5/0x480 [ 15.339174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339197] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.339223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.339248] ? __kthread_parkme+0x82/0x180 [ 15.339268] ? preempt_count_sub+0x50/0x80 [ 15.339293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.339342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.339367] kthread+0x337/0x6f0 [ 15.339388] ? trace_preempt_on+0x20/0xc0 [ 15.339411] ? __pfx_kthread+0x10/0x10 [ 15.339433] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.339465] ? calculate_sigpending+0x7b/0xa0 [ 15.339490] ? __pfx_kthread+0x10/0x10 [ 15.339512] ret_from_fork+0x116/0x1d0 [ 15.339531] ? __pfx_kthread+0x10/0x10 [ 15.339563] ret_from_fork_asm+0x1a/0x30 [ 15.339596] </TASK> [ 15.339607] [ 15.349554] Allocated by task 283: [ 15.349950] kasan_save_stack+0x45/0x70 [ 15.350123] kasan_save_track+0x18/0x40 [ 15.350458] kasan_save_alloc_info+0x3b/0x50 [ 15.350752] __kasan_kmalloc+0xb7/0xc0 [ 15.351073] __kmalloc_cache_noprof+0x189/0x420 [ 15.351278] kasan_atomics+0x95/0x310 [ 15.351421] kunit_try_run_case+0x1a5/0x480 [ 15.351724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.351957] kthread+0x337/0x6f0 [ 15.352125] ret_from_fork+0x116/0x1d0 [ 15.352316] ret_from_fork_asm+0x1a/0x30 [ 15.352515] [ 15.352988] The buggy address belongs to the object at ffff8881026f3680 [ 15.352988] which belongs to the cache kmalloc-64 of size 64 [ 15.353570] The buggy address is located 0 bytes to the right of [ 15.353570] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.354247] [ 15.354351] The buggy address belongs to the physical page: [ 15.354698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.355115] flags: 0x200000000000000(node=0|zone=2) [ 15.355481] page_type: f5(slab) [ 15.355818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.356203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.356657] page dumped because: kasan: bad access detected [ 15.356988] [ 15.357062] Memory state around the buggy address: [ 15.357319] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.357835] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358155] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.358645] ^ [ 15.358962] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359340] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359767] ================================================================== [ 15.676338] ================================================================== [ 15.676696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.677458] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.677735] [ 15.677820] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.677863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.677875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.677898] Call Trace: [ 15.677914] <TASK> [ 15.677930] dump_stack_lvl+0x73/0xb0 [ 15.677957] print_report+0xd1/0x610 [ 15.677979] ? __virt_addr_valid+0x1db/0x2d0 [ 15.678002] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.678024] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.678048] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.678072] kasan_report+0x141/0x180 [ 15.678095] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.678124] __asan_report_load8_noabort+0x18/0x20 [ 15.678149] kasan_atomics_helper+0x4f71/0x5450 [ 15.678221] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.678244] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.678269] ? kasan_atomics+0x152/0x310 [ 15.678297] kasan_atomics+0x1dc/0x310 [ 15.678320] ? __pfx_kasan_atomics+0x10/0x10 [ 15.678346] ? __pfx_read_tsc+0x10/0x10 [ 15.678368] ? ktime_get_ts64+0x86/0x230 [ 15.678393] kunit_try_run_case+0x1a5/0x480 [ 15.678418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.678452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.678477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.678502] ? __kthread_parkme+0x82/0x180 [ 15.678523] ? preempt_count_sub+0x50/0x80 [ 15.678582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.678608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.678633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.678659] kthread+0x337/0x6f0 [ 15.678678] ? trace_preempt_on+0x20/0xc0 [ 15.678702] ? __pfx_kthread+0x10/0x10 [ 15.678723] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.678746] ? calculate_sigpending+0x7b/0xa0 [ 15.678771] ? __pfx_kthread+0x10/0x10 [ 15.678794] ret_from_fork+0x116/0x1d0 [ 15.678845] ? __pfx_kthread+0x10/0x10 [ 15.678866] ret_from_fork_asm+0x1a/0x30 [ 15.678900] </TASK> [ 15.678910] [ 15.686664] Allocated by task 283: [ 15.686904] kasan_save_stack+0x45/0x70 [ 15.687208] kasan_save_track+0x18/0x40 [ 15.687466] kasan_save_alloc_info+0x3b/0x50 [ 15.687741] __kasan_kmalloc+0xb7/0xc0 [ 15.687934] __kmalloc_cache_noprof+0x189/0x420 [ 15.688152] kasan_atomics+0x95/0x310 [ 15.688286] kunit_try_run_case+0x1a5/0x480 [ 15.688493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.688795] kthread+0x337/0x6f0 [ 15.689000] ret_from_fork+0x116/0x1d0 [ 15.689195] ret_from_fork_asm+0x1a/0x30 [ 15.689416] [ 15.689523] The buggy address belongs to the object at ffff8881026f3680 [ 15.689523] which belongs to the cache kmalloc-64 of size 64 [ 15.690053] The buggy address is located 0 bytes to the right of [ 15.690053] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.690638] [ 15.690753] The buggy address belongs to the physical page: [ 15.691023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.691389] flags: 0x200000000000000(node=0|zone=2) [ 15.691636] page_type: f5(slab) [ 15.691812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.692189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.692550] page dumped because: kasan: bad access detected [ 15.692800] [ 15.692893] Memory state around the buggy address: [ 15.693119] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.693460] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.693764] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.694065] ^ [ 15.694308] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694650] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694984] ================================================================== [ 15.214728] ================================================================== [ 15.215078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.215661] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.216007] [ 15.216115] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.216157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.216170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.216191] Call Trace: [ 15.216206] <TASK> [ 15.216220] dump_stack_lvl+0x73/0xb0 [ 15.216249] print_report+0xd1/0x610 [ 15.216271] ? __virt_addr_valid+0x1db/0x2d0 [ 15.216293] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.216315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.216338] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.216362] kasan_report+0x141/0x180 [ 15.216384] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.216422] kasan_check_range+0x10c/0x1c0 [ 15.216459] __kasan_check_read+0x15/0x20 [ 15.216480] kasan_atomics_helper+0x13b5/0x5450 [ 15.216503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.216526] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.216559] ? kasan_atomics+0x152/0x310 [ 15.216587] kasan_atomics+0x1dc/0x310 [ 15.216610] ? __pfx_kasan_atomics+0x10/0x10 [ 15.216635] ? __pfx_read_tsc+0x10/0x10 [ 15.216656] ? ktime_get_ts64+0x86/0x230 [ 15.216681] kunit_try_run_case+0x1a5/0x480 [ 15.216706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.216730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.216754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.216778] ? __kthread_parkme+0x82/0x180 [ 15.216799] ? preempt_count_sub+0x50/0x80 [ 15.216824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.216848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.216874] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.216899] kthread+0x337/0x6f0 [ 15.216918] ? trace_preempt_on+0x20/0xc0 [ 15.216941] ? __pfx_kthread+0x10/0x10 [ 15.216963] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.216985] ? calculate_sigpending+0x7b/0xa0 [ 15.217010] ? __pfx_kthread+0x10/0x10 [ 15.217033] ret_from_fork+0x116/0x1d0 [ 15.217052] ? __pfx_kthread+0x10/0x10 [ 15.217074] ret_from_fork_asm+0x1a/0x30 [ 15.217107] </TASK> [ 15.217117] [ 15.224300] Allocated by task 283: [ 15.224430] kasan_save_stack+0x45/0x70 [ 15.224680] kasan_save_track+0x18/0x40 [ 15.224874] kasan_save_alloc_info+0x3b/0x50 [ 15.225086] __kasan_kmalloc+0xb7/0xc0 [ 15.225277] __kmalloc_cache_noprof+0x189/0x420 [ 15.225513] kasan_atomics+0x95/0x310 [ 15.225703] kunit_try_run_case+0x1a5/0x480 [ 15.225916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.226172] kthread+0x337/0x6f0 [ 15.226322] ret_from_fork+0x116/0x1d0 [ 15.226503] ret_from_fork_asm+0x1a/0x30 [ 15.226679] [ 15.226752] The buggy address belongs to the object at ffff8881026f3680 [ 15.226752] which belongs to the cache kmalloc-64 of size 64 [ 15.227108] The buggy address is located 0 bytes to the right of [ 15.227108] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.227485] [ 15.227588] The buggy address belongs to the physical page: [ 15.227839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.228185] flags: 0x200000000000000(node=0|zone=2) [ 15.228424] page_type: f5(slab) [ 15.228657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.228916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.229151] page dumped because: kasan: bad access detected [ 15.229326] [ 15.229396] Memory state around the buggy address: [ 15.229622] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.229947] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.230265] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.230651] ^ [ 15.230875] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.231204] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.231528] ================================================================== [ 15.071293] ================================================================== [ 15.071860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.072157] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.072474] [ 15.072596] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.072638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.072650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.072670] Call Trace: [ 15.072685] <TASK> [ 15.072700] dump_stack_lvl+0x73/0xb0 [ 15.072726] print_report+0xd1/0x610 [ 15.072748] ? __virt_addr_valid+0x1db/0x2d0 [ 15.072772] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.072794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.072817] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.072839] kasan_report+0x141/0x180 [ 15.072862] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.072891] __asan_report_load4_noabort+0x18/0x20 [ 15.072915] kasan_atomics_helper+0x4a1c/0x5450 [ 15.072966] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.072989] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.073014] ? kasan_atomics+0x152/0x310 [ 15.073064] kasan_atomics+0x1dc/0x310 [ 15.073087] ? __pfx_kasan_atomics+0x10/0x10 [ 15.073113] ? __pfx_read_tsc+0x10/0x10 [ 15.073139] ? ktime_get_ts64+0x86/0x230 [ 15.073164] kunit_try_run_case+0x1a5/0x480 [ 15.073190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.073213] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.073238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.073280] ? __kthread_parkme+0x82/0x180 [ 15.073301] ? preempt_count_sub+0x50/0x80 [ 15.073326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.073350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.073376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.073402] kthread+0x337/0x6f0 [ 15.073422] ? trace_preempt_on+0x20/0xc0 [ 15.073455] ? __pfx_kthread+0x10/0x10 [ 15.073477] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.073498] ? calculate_sigpending+0x7b/0xa0 [ 15.073523] ? __pfx_kthread+0x10/0x10 [ 15.073557] ret_from_fork+0x116/0x1d0 [ 15.073577] ? __pfx_kthread+0x10/0x10 [ 15.073598] ret_from_fork_asm+0x1a/0x30 [ 15.073651] </TASK> [ 15.073660] [ 15.083884] Allocated by task 283: [ 15.084200] kasan_save_stack+0x45/0x70 [ 15.084493] kasan_save_track+0x18/0x40 [ 15.084650] kasan_save_alloc_info+0x3b/0x50 [ 15.085006] __kasan_kmalloc+0xb7/0xc0 [ 15.085199] __kmalloc_cache_noprof+0x189/0x420 [ 15.085415] kasan_atomics+0x95/0x310 [ 15.085790] kunit_try_run_case+0x1a5/0x480 [ 15.086091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.086433] kthread+0x337/0x6f0 [ 15.086632] ret_from_fork+0x116/0x1d0 [ 15.086886] ret_from_fork_asm+0x1a/0x30 [ 15.087074] [ 15.087164] The buggy address belongs to the object at ffff8881026f3680 [ 15.087164] which belongs to the cache kmalloc-64 of size 64 [ 15.087928] The buggy address is located 0 bytes to the right of [ 15.087928] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.088584] [ 15.088686] The buggy address belongs to the physical page: [ 15.088992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.089425] flags: 0x200000000000000(node=0|zone=2) [ 15.089775] page_type: f5(slab) [ 15.089950] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.090420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.090847] page dumped because: kasan: bad access detected [ 15.091184] [ 15.091260] Memory state around the buggy address: [ 15.091710] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.092014] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.092314] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.092853] ^ [ 15.093172] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093616] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093975] ================================================================== [ 15.453630] ================================================================== [ 15.453958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.454345] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.454888] [ 15.454984] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.455029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.455041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.455063] Call Trace: [ 15.455078] <TASK> [ 15.455095] dump_stack_lvl+0x73/0xb0 [ 15.455124] print_report+0xd1/0x610 [ 15.455145] ? __virt_addr_valid+0x1db/0x2d0 [ 15.455169] ? kasan_atomics_helper+0x194a/0x5450 [ 15.455190] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.455216] ? kasan_atomics_helper+0x194a/0x5450 [ 15.455239] kasan_report+0x141/0x180 [ 15.455262] ? kasan_atomics_helper+0x194a/0x5450 [ 15.455289] kasan_check_range+0x10c/0x1c0 [ 15.455314] __kasan_check_write+0x18/0x20 [ 15.455333] kasan_atomics_helper+0x194a/0x5450 [ 15.455361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.455384] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.455410] ? kasan_atomics+0x152/0x310 [ 15.455447] kasan_atomics+0x1dc/0x310 [ 15.455471] ? __pfx_kasan_atomics+0x10/0x10 [ 15.455496] ? __pfx_read_tsc+0x10/0x10 [ 15.455518] ? ktime_get_ts64+0x86/0x230 [ 15.455555] kunit_try_run_case+0x1a5/0x480 [ 15.455580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.455602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.455627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.455651] ? __kthread_parkme+0x82/0x180 [ 15.455672] ? preempt_count_sub+0x50/0x80 [ 15.455697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.455722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.455746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.455770] kthread+0x337/0x6f0 [ 15.455790] ? trace_preempt_on+0x20/0xc0 [ 15.455813] ? __pfx_kthread+0x10/0x10 [ 15.455834] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.455856] ? calculate_sigpending+0x7b/0xa0 [ 15.455881] ? __pfx_kthread+0x10/0x10 [ 15.455902] ret_from_fork+0x116/0x1d0 [ 15.455921] ? __pfx_kthread+0x10/0x10 [ 15.455942] ret_from_fork_asm+0x1a/0x30 [ 15.455975] </TASK> [ 15.455985] [ 15.463185] Allocated by task 283: [ 15.463323] kasan_save_stack+0x45/0x70 [ 15.463483] kasan_save_track+0x18/0x40 [ 15.463627] kasan_save_alloc_info+0x3b/0x50 [ 15.464035] __kasan_kmalloc+0xb7/0xc0 [ 15.464226] __kmalloc_cache_noprof+0x189/0x420 [ 15.464474] kasan_atomics+0x95/0x310 [ 15.464681] kunit_try_run_case+0x1a5/0x480 [ 15.464915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.465141] kthread+0x337/0x6f0 [ 15.465311] ret_from_fork+0x116/0x1d0 [ 15.465503] ret_from_fork_asm+0x1a/0x30 [ 15.465698] [ 15.465792] The buggy address belongs to the object at ffff8881026f3680 [ 15.465792] which belongs to the cache kmalloc-64 of size 64 [ 15.466273] The buggy address is located 0 bytes to the right of [ 15.466273] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.466807] [ 15.466905] The buggy address belongs to the physical page: [ 15.467134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.467464] flags: 0x200000000000000(node=0|zone=2) [ 15.467713] page_type: f5(slab) [ 15.467904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.468220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.468509] page dumped because: kasan: bad access detected [ 15.468762] [ 15.468864] Memory state around the buggy address: [ 15.469061] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.469357] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.469579] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.469787] ^ [ 15.469954] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.470266] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.470784] ================================================================== [ 15.736577] ================================================================== [ 15.736891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.737186] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.737509] [ 15.737638] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.737683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.737695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.737716] Call Trace: [ 15.737733] <TASK> [ 15.737750] dump_stack_lvl+0x73/0xb0 [ 15.737778] print_report+0xd1/0x610 [ 15.737801] ? __virt_addr_valid+0x1db/0x2d0 [ 15.737825] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.737847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.737871] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.737893] kasan_report+0x141/0x180 [ 15.737915] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.737943] kasan_check_range+0x10c/0x1c0 [ 15.737968] __kasan_check_write+0x18/0x20 [ 15.737988] kasan_atomics_helper+0x20c8/0x5450 [ 15.738012] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.738035] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.738060] ? kasan_atomics+0x152/0x310 [ 15.738087] kasan_atomics+0x1dc/0x310 [ 15.738110] ? __pfx_kasan_atomics+0x10/0x10 [ 15.738135] ? __pfx_read_tsc+0x10/0x10 [ 15.738157] ? ktime_get_ts64+0x86/0x230 [ 15.738182] kunit_try_run_case+0x1a5/0x480 [ 15.738209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.738233] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.738258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.738282] ? __kthread_parkme+0x82/0x180 [ 15.738303] ? preempt_count_sub+0x50/0x80 [ 15.738329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.738353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.738378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.738402] kthread+0x337/0x6f0 [ 15.738422] ? trace_preempt_on+0x20/0xc0 [ 15.738456] ? __pfx_kthread+0x10/0x10 [ 15.738476] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.738498] ? calculate_sigpending+0x7b/0xa0 [ 15.738542] ? __pfx_kthread+0x10/0x10 [ 15.738565] ret_from_fork+0x116/0x1d0 [ 15.738584] ? __pfx_kthread+0x10/0x10 [ 15.738605] ret_from_fork_asm+0x1a/0x30 [ 15.738639] </TASK> [ 15.738650] [ 15.745822] Allocated by task 283: [ 15.745954] kasan_save_stack+0x45/0x70 [ 15.746153] kasan_save_track+0x18/0x40 [ 15.746344] kasan_save_alloc_info+0x3b/0x50 [ 15.746572] __kasan_kmalloc+0xb7/0xc0 [ 15.746708] __kmalloc_cache_noprof+0x189/0x420 [ 15.746930] kasan_atomics+0x95/0x310 [ 15.747118] kunit_try_run_case+0x1a5/0x480 [ 15.747327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.747585] kthread+0x337/0x6f0 [ 15.747751] ret_from_fork+0x116/0x1d0 [ 15.747898] ret_from_fork_asm+0x1a/0x30 [ 15.748101] [ 15.748196] The buggy address belongs to the object at ffff8881026f3680 [ 15.748196] which belongs to the cache kmalloc-64 of size 64 [ 15.748665] The buggy address is located 0 bytes to the right of [ 15.748665] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.749036] [ 15.749109] The buggy address belongs to the physical page: [ 15.749290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.749612] flags: 0x200000000000000(node=0|zone=2) [ 15.749847] page_type: f5(slab) [ 15.750017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.750355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.750682] page dumped because: kasan: bad access detected [ 15.750857] [ 15.750926] Memory state around the buggy address: [ 15.751085] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.751404] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.751747] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.752069] ^ [ 15.752278] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.752614] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.752913] ================================================================== [ 14.902648] ================================================================== [ 14.903105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.903770] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.904069] [ 14.904174] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.904217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.904230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.904250] Call Trace: [ 14.904266] <TASK> [ 14.904281] dump_stack_lvl+0x73/0xb0 [ 14.904310] print_report+0xd1/0x610 [ 14.904333] ? __virt_addr_valid+0x1db/0x2d0 [ 14.904358] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.904380] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.904404] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.904427] kasan_report+0x141/0x180 [ 14.904463] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.904491] __asan_report_load4_noabort+0x18/0x20 [ 14.904517] kasan_atomics_helper+0x4a84/0x5450 [ 14.904555] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.904578] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.904605] ? kasan_atomics+0x152/0x310 [ 14.904632] kasan_atomics+0x1dc/0x310 [ 14.904655] ? __pfx_kasan_atomics+0x10/0x10 [ 14.904680] ? __pfx_read_tsc+0x10/0x10 [ 14.904700] ? ktime_get_ts64+0x86/0x230 [ 14.904725] kunit_try_run_case+0x1a5/0x480 [ 14.904751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.904773] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.904798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.904823] ? __kthread_parkme+0x82/0x180 [ 14.904844] ? preempt_count_sub+0x50/0x80 [ 14.904869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.904893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.904918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.904943] kthread+0x337/0x6f0 [ 14.904963] ? trace_preempt_on+0x20/0xc0 [ 14.904987] ? __pfx_kthread+0x10/0x10 [ 14.905009] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.905030] ? calculate_sigpending+0x7b/0xa0 [ 14.905055] ? __pfx_kthread+0x10/0x10 [ 14.905077] ret_from_fork+0x116/0x1d0 [ 14.905096] ? __pfx_kthread+0x10/0x10 [ 14.905117] ret_from_fork_asm+0x1a/0x30 [ 14.905156] </TASK> [ 14.905166] [ 14.912356] Allocated by task 283: [ 14.912530] kasan_save_stack+0x45/0x70 [ 14.912700] kasan_save_track+0x18/0x40 [ 14.912895] kasan_save_alloc_info+0x3b/0x50 [ 14.913059] __kasan_kmalloc+0xb7/0xc0 [ 14.913250] __kmalloc_cache_noprof+0x189/0x420 [ 14.913452] kasan_atomics+0x95/0x310 [ 14.913675] kunit_try_run_case+0x1a5/0x480 [ 14.913876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.914115] kthread+0x337/0x6f0 [ 14.914294] ret_from_fork+0x116/0x1d0 [ 14.914482] ret_from_fork_asm+0x1a/0x30 [ 14.914682] [ 14.914786] The buggy address belongs to the object at ffff8881026f3680 [ 14.914786] which belongs to the cache kmalloc-64 of size 64 [ 14.915208] The buggy address is located 0 bytes to the right of [ 14.915208] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.915891] [ 14.915965] The buggy address belongs to the physical page: [ 14.916415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.916665] flags: 0x200000000000000(node=0|zone=2) [ 14.916828] page_type: f5(slab) [ 14.916947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.917183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.917524] page dumped because: kasan: bad access detected [ 14.917786] [ 14.917878] Memory state around the buggy address: [ 14.918100] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.918414] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.918857] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.919149] ^ [ 14.919348] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.919657] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.919873] ================================================================== [ 14.694631] ================================================================== [ 14.695021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.695334] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.695712] [ 14.695796] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.695838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.695851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.695871] Call Trace: [ 14.695883] <TASK> [ 14.695898] dump_stack_lvl+0x73/0xb0 [ 14.695925] print_report+0xd1/0x610 [ 14.695947] ? __virt_addr_valid+0x1db/0x2d0 [ 14.695970] ? kasan_atomics_helper+0x697/0x5450 [ 14.695992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.696017] ? kasan_atomics_helper+0x697/0x5450 [ 14.696039] kasan_report+0x141/0x180 [ 14.696062] ? kasan_atomics_helper+0x697/0x5450 [ 14.696090] kasan_check_range+0x10c/0x1c0 [ 14.696115] __kasan_check_write+0x18/0x20 [ 14.696134] kasan_atomics_helper+0x697/0x5450 [ 14.696159] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.696182] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.696207] ? kasan_atomics+0x152/0x310 [ 14.696235] kasan_atomics+0x1dc/0x310 [ 14.696258] ? __pfx_kasan_atomics+0x10/0x10 [ 14.696284] ? __pfx_read_tsc+0x10/0x10 [ 14.696304] ? ktime_get_ts64+0x86/0x230 [ 14.696329] kunit_try_run_case+0x1a5/0x480 [ 14.696353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.696400] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.696425] ? __kthread_parkme+0x82/0x180 [ 14.696457] ? preempt_count_sub+0x50/0x80 [ 14.696481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.696531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.696565] kthread+0x337/0x6f0 [ 14.696584] ? trace_preempt_on+0x20/0xc0 [ 14.696608] ? __pfx_kthread+0x10/0x10 [ 14.696628] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.696651] ? calculate_sigpending+0x7b/0xa0 [ 14.696675] ? __pfx_kthread+0x10/0x10 [ 14.696696] ret_from_fork+0x116/0x1d0 [ 14.696715] ? __pfx_kthread+0x10/0x10 [ 14.696736] ret_from_fork_asm+0x1a/0x30 [ 14.696770] </TASK> [ 14.696780] [ 14.704950] Allocated by task 283: [ 14.705137] kasan_save_stack+0x45/0x70 [ 14.705303] kasan_save_track+0x18/0x40 [ 14.705493] kasan_save_alloc_info+0x3b/0x50 [ 14.705679] __kasan_kmalloc+0xb7/0xc0 [ 14.705814] __kmalloc_cache_noprof+0x189/0x420 [ 14.705970] kasan_atomics+0x95/0x310 [ 14.706103] kunit_try_run_case+0x1a5/0x480 [ 14.706250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.706429] kthread+0x337/0x6f0 [ 14.706611] ret_from_fork+0x116/0x1d0 [ 14.706802] ret_from_fork_asm+0x1a/0x30 [ 14.707171] [ 14.707269] The buggy address belongs to the object at ffff8881026f3680 [ 14.707269] which belongs to the cache kmalloc-64 of size 64 [ 14.707983] The buggy address is located 0 bytes to the right of [ 14.707983] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.708482] [ 14.708594] The buggy address belongs to the physical page: [ 14.708775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.709019] flags: 0x200000000000000(node=0|zone=2) [ 14.709257] page_type: f5(slab) [ 14.709421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.710106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.710343] page dumped because: kasan: bad access detected [ 14.710595] [ 14.710690] Memory state around the buggy address: [ 14.710922] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711207] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711425] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.711963] ^ [ 14.712190] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712517] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712749] ================================================================== [ 15.023885] ================================================================== [ 15.024227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.024627] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.024954] [ 15.025254] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.025301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.025555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.025578] Call Trace: [ 15.025591] <TASK> [ 15.025605] dump_stack_lvl+0x73/0xb0 [ 15.025650] print_report+0xd1/0x610 [ 15.025672] ? __virt_addr_valid+0x1db/0x2d0 [ 15.025695] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.025718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.025742] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.025767] kasan_report+0x141/0x180 [ 15.025790] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.025818] __asan_report_load4_noabort+0x18/0x20 [ 15.025844] kasan_atomics_helper+0x4a36/0x5450 [ 15.025867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.025890] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.025915] ? kasan_atomics+0x152/0x310 [ 15.025942] kasan_atomics+0x1dc/0x310 [ 15.025964] ? __pfx_kasan_atomics+0x10/0x10 [ 15.025990] ? __pfx_read_tsc+0x10/0x10 [ 15.026010] ? ktime_get_ts64+0x86/0x230 [ 15.026036] kunit_try_run_case+0x1a5/0x480 [ 15.026061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.026086] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.026109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.026134] ? __kthread_parkme+0x82/0x180 [ 15.026155] ? preempt_count_sub+0x50/0x80 [ 15.026180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.026205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.026230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.026255] kthread+0x337/0x6f0 [ 15.026275] ? trace_preempt_on+0x20/0xc0 [ 15.026299] ? __pfx_kthread+0x10/0x10 [ 15.026320] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.026342] ? calculate_sigpending+0x7b/0xa0 [ 15.026366] ? __pfx_kthread+0x10/0x10 [ 15.026406] ret_from_fork+0x116/0x1d0 [ 15.026426] ? __pfx_kthread+0x10/0x10 [ 15.026456] ret_from_fork_asm+0x1a/0x30 [ 15.026489] </TASK> [ 15.026499] [ 15.033900] Allocated by task 283: [ 15.034083] kasan_save_stack+0x45/0x70 [ 15.034285] kasan_save_track+0x18/0x40 [ 15.034486] kasan_save_alloc_info+0x3b/0x50 [ 15.034717] __kasan_kmalloc+0xb7/0xc0 [ 15.034896] __kmalloc_cache_noprof+0x189/0x420 [ 15.035120] kasan_atomics+0x95/0x310 [ 15.035280] kunit_try_run_case+0x1a5/0x480 [ 15.035426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.035635] kthread+0x337/0x6f0 [ 15.035758] ret_from_fork+0x116/0x1d0 [ 15.035889] ret_from_fork_asm+0x1a/0x30 [ 15.036027] [ 15.036098] The buggy address belongs to the object at ffff8881026f3680 [ 15.036098] which belongs to the cache kmalloc-64 of size 64 [ 15.036459] The buggy address is located 0 bytes to the right of [ 15.036459] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.036999] [ 15.037097] The buggy address belongs to the physical page: [ 15.037361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.037747] flags: 0x200000000000000(node=0|zone=2) [ 15.037980] page_type: f5(slab) [ 15.038145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.038496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.038830] page dumped because: kasan: bad access detected [ 15.039076] [ 15.039173] Memory state around the buggy address: [ 15.039392] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.039711] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.040022] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.040333] ^ [ 15.041709] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.042568] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.042875] ================================================================== [ 14.576527] ================================================================== [ 14.576889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.577360] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.577781] [ 14.577922] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.577965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.577977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.577999] Call Trace: [ 14.578014] <TASK> [ 14.578032] dump_stack_lvl+0x73/0xb0 [ 14.578060] print_report+0xd1/0x610 [ 14.578082] ? __virt_addr_valid+0x1db/0x2d0 [ 14.578106] ? kasan_atomics_helper+0x3df/0x5450 [ 14.578128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.578152] ? kasan_atomics_helper+0x3df/0x5450 [ 14.578174] kasan_report+0x141/0x180 [ 14.578197] ? kasan_atomics_helper+0x3df/0x5450 [ 14.578246] kasan_check_range+0x10c/0x1c0 [ 14.578272] __kasan_check_read+0x15/0x20 [ 14.578303] kasan_atomics_helper+0x3df/0x5450 [ 14.578326] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.578350] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.578375] ? kasan_atomics+0x152/0x310 [ 14.578403] kasan_atomics+0x1dc/0x310 [ 14.578425] ? __pfx_kasan_atomics+0x10/0x10 [ 14.578459] ? __pfx_read_tsc+0x10/0x10 [ 14.578479] ? ktime_get_ts64+0x86/0x230 [ 14.578506] kunit_try_run_case+0x1a5/0x480 [ 14.578531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.578555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.578601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.578627] ? __kthread_parkme+0x82/0x180 [ 14.578658] ? preempt_count_sub+0x50/0x80 [ 14.578694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.578726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.578753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.578790] kthread+0x337/0x6f0 [ 14.578809] ? trace_preempt_on+0x20/0xc0 [ 14.578833] ? __pfx_kthread+0x10/0x10 [ 14.578855] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.578888] ? calculate_sigpending+0x7b/0xa0 [ 14.578913] ? __pfx_kthread+0x10/0x10 [ 14.578935] ret_from_fork+0x116/0x1d0 [ 14.578965] ? __pfx_kthread+0x10/0x10 [ 14.578987] ret_from_fork_asm+0x1a/0x30 [ 14.579019] </TASK> [ 14.579029] [ 14.591152] Allocated by task 283: [ 14.591530] kasan_save_stack+0x45/0x70 [ 14.591995] kasan_save_track+0x18/0x40 [ 14.592383] kasan_save_alloc_info+0x3b/0x50 [ 14.592854] __kasan_kmalloc+0xb7/0xc0 [ 14.593234] __kmalloc_cache_noprof+0x189/0x420 [ 14.593537] kasan_atomics+0x95/0x310 [ 14.593882] kunit_try_run_case+0x1a5/0x480 [ 14.594027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.594199] kthread+0x337/0x6f0 [ 14.594315] ret_from_fork+0x116/0x1d0 [ 14.594455] ret_from_fork_asm+0x1a/0x30 [ 14.594699] [ 14.594799] The buggy address belongs to the object at ffff8881026f3680 [ 14.594799] which belongs to the cache kmalloc-64 of size 64 [ 14.595300] The buggy address is located 0 bytes to the right of [ 14.595300] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.596010] [ 14.596187] The buggy address belongs to the physical page: [ 14.596422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.596865] flags: 0x200000000000000(node=0|zone=2) [ 14.597098] page_type: f5(slab) [ 14.597276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.597528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.597929] page dumped because: kasan: bad access detected [ 14.598168] [ 14.598237] Memory state around the buggy address: [ 14.598417] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.598946] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.599274] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.599598] ^ [ 14.599842] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600197] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600513] ================================================================== [ 14.856557] ================================================================== [ 14.856931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.857356] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.857752] [ 14.857903] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.857957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.857970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.857990] Call Trace: [ 14.858003] <TASK> [ 14.858018] dump_stack_lvl+0x73/0xb0 [ 14.858044] print_report+0xd1/0x610 [ 14.858066] ? __virt_addr_valid+0x1db/0x2d0 [ 14.858108] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.858145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.858181] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.858205] kasan_report+0x141/0x180 [ 14.858241] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.858283] kasan_check_range+0x10c/0x1c0 [ 14.858321] __kasan_check_write+0x18/0x20 [ 14.858354] kasan_atomics_helper+0xb6a/0x5450 [ 14.858392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.858428] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.858479] ? kasan_atomics+0x152/0x310 [ 14.858553] kasan_atomics+0x1dc/0x310 [ 14.858587] ? __pfx_kasan_atomics+0x10/0x10 [ 14.858612] ? __pfx_read_tsc+0x10/0x10 [ 14.858644] ? ktime_get_ts64+0x86/0x230 [ 14.858670] kunit_try_run_case+0x1a5/0x480 [ 14.858694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.858729] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.858754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.858778] ? __kthread_parkme+0x82/0x180 [ 14.858810] ? preempt_count_sub+0x50/0x80 [ 14.858835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.858860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.858895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.858920] kthread+0x337/0x6f0 [ 14.858939] ? trace_preempt_on+0x20/0xc0 [ 14.858962] ? __pfx_kthread+0x10/0x10 [ 14.858983] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.859006] ? calculate_sigpending+0x7b/0xa0 [ 14.859030] ? __pfx_kthread+0x10/0x10 [ 14.859051] ret_from_fork+0x116/0x1d0 [ 14.859071] ? __pfx_kthread+0x10/0x10 [ 14.859092] ret_from_fork_asm+0x1a/0x30 [ 14.859124] </TASK> [ 14.859134] [ 14.867989] Allocated by task 283: [ 14.868138] kasan_save_stack+0x45/0x70 [ 14.868478] kasan_save_track+0x18/0x40 [ 14.868814] kasan_save_alloc_info+0x3b/0x50 [ 14.869059] __kasan_kmalloc+0xb7/0xc0 [ 14.869198] __kmalloc_cache_noprof+0x189/0x420 [ 14.869352] kasan_atomics+0x95/0x310 [ 14.869747] kunit_try_run_case+0x1a5/0x480 [ 14.869962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.870268] kthread+0x337/0x6f0 [ 14.870451] ret_from_fork+0x116/0x1d0 [ 14.870739] ret_from_fork_asm+0x1a/0x30 [ 14.870956] [ 14.871101] The buggy address belongs to the object at ffff8881026f3680 [ 14.871101] which belongs to the cache kmalloc-64 of size 64 [ 14.871706] The buggy address is located 0 bytes to the right of [ 14.871706] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.872212] [ 14.872466] The buggy address belongs to the physical page: [ 14.872761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.873108] flags: 0x200000000000000(node=0|zone=2) [ 14.873372] page_type: f5(slab) [ 14.873600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.873986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.874294] page dumped because: kasan: bad access detected [ 14.874631] [ 14.874727] Memory state around the buggy address: [ 14.874919] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.875325] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.875666] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.875922] ^ [ 14.876152] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.876511] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.876802] ================================================================== [ 15.753460] ================================================================== [ 15.753865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.754186] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.754587] [ 15.754695] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.754736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.754748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.754770] Call Trace: [ 15.754785] <TASK> [ 15.754801] dump_stack_lvl+0x73/0xb0 [ 15.754827] print_report+0xd1/0x610 [ 15.754848] ? __virt_addr_valid+0x1db/0x2d0 [ 15.754871] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.754893] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.754917] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.754940] kasan_report+0x141/0x180 [ 15.754962] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.754990] __asan_report_load8_noabort+0x18/0x20 [ 15.755016] kasan_atomics_helper+0x4fb2/0x5450 [ 15.755039] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.755062] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.755087] ? kasan_atomics+0x152/0x310 [ 15.755115] kasan_atomics+0x1dc/0x310 [ 15.755137] ? __pfx_kasan_atomics+0x10/0x10 [ 15.755162] ? __pfx_read_tsc+0x10/0x10 [ 15.755183] ? ktime_get_ts64+0x86/0x230 [ 15.755209] kunit_try_run_case+0x1a5/0x480 [ 15.755234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.755257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.755282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.755306] ? __kthread_parkme+0x82/0x180 [ 15.755327] ? preempt_count_sub+0x50/0x80 [ 15.755352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.755376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.755401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.755426] kthread+0x337/0x6f0 [ 15.755455] ? trace_preempt_on+0x20/0xc0 [ 15.755479] ? __pfx_kthread+0x10/0x10 [ 15.755500] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.755541] ? calculate_sigpending+0x7b/0xa0 [ 15.755566] ? __pfx_kthread+0x10/0x10 [ 15.755588] ret_from_fork+0x116/0x1d0 [ 15.755607] ? __pfx_kthread+0x10/0x10 [ 15.755628] ret_from_fork_asm+0x1a/0x30 [ 15.755661] </TASK> [ 15.755672] [ 15.762715] Allocated by task 283: [ 15.762896] kasan_save_stack+0x45/0x70 [ 15.763060] kasan_save_track+0x18/0x40 [ 15.763256] kasan_save_alloc_info+0x3b/0x50 [ 15.763427] __kasan_kmalloc+0xb7/0xc0 [ 15.763643] __kmalloc_cache_noprof+0x189/0x420 [ 15.763842] kasan_atomics+0x95/0x310 [ 15.764025] kunit_try_run_case+0x1a5/0x480 [ 15.764212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.764474] kthread+0x337/0x6f0 [ 15.764634] ret_from_fork+0x116/0x1d0 [ 15.764824] ret_from_fork_asm+0x1a/0x30 [ 15.765001] [ 15.765074] The buggy address belongs to the object at ffff8881026f3680 [ 15.765074] which belongs to the cache kmalloc-64 of size 64 [ 15.765603] The buggy address is located 0 bytes to the right of [ 15.765603] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.766081] [ 15.766174] The buggy address belongs to the physical page: [ 15.766378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.766737] flags: 0x200000000000000(node=0|zone=2) [ 15.766943] page_type: f5(slab) [ 15.767093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.767377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.767639] page dumped because: kasan: bad access detected [ 15.767814] [ 15.767885] Memory state around the buggy address: [ 15.768041] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.768258] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.768498] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.768838] ^ [ 15.769058] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.769379] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.769726] ================================================================== [ 15.842272] ================================================================== [ 15.842669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.843160] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.843455] [ 15.843950] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.844000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.844013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.844037] Call Trace: [ 15.844055] <TASK> [ 15.844074] dump_stack_lvl+0x73/0xb0 [ 15.844206] print_report+0xd1/0x610 [ 15.844232] ? __virt_addr_valid+0x1db/0x2d0 [ 15.844255] ? kasan_atomics_helper+0x5115/0x5450 [ 15.844277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.844301] ? kasan_atomics_helper+0x5115/0x5450 [ 15.844324] kasan_report+0x141/0x180 [ 15.844347] ? kasan_atomics_helper+0x5115/0x5450 [ 15.844376] __asan_report_load8_noabort+0x18/0x20 [ 15.844402] kasan_atomics_helper+0x5115/0x5450 [ 15.844426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.844465] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.844492] ? kasan_atomics+0x152/0x310 [ 15.844520] kasan_atomics+0x1dc/0x310 [ 15.844557] ? __pfx_kasan_atomics+0x10/0x10 [ 15.844582] ? __pfx_read_tsc+0x10/0x10 [ 15.844604] ? ktime_get_ts64+0x86/0x230 [ 15.844631] kunit_try_run_case+0x1a5/0x480 [ 15.844657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.844707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.844732] ? __kthread_parkme+0x82/0x180 [ 15.844753] ? preempt_count_sub+0x50/0x80 [ 15.844779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.844828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.844853] kthread+0x337/0x6f0 [ 15.844873] ? trace_preempt_on+0x20/0xc0 [ 15.844897] ? __pfx_kthread+0x10/0x10 [ 15.844919] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.844941] ? calculate_sigpending+0x7b/0xa0 [ 15.844966] ? __pfx_kthread+0x10/0x10 [ 15.844987] ret_from_fork+0x116/0x1d0 [ 15.845007] ? __pfx_kthread+0x10/0x10 [ 15.845028] ret_from_fork_asm+0x1a/0x30 [ 15.845061] </TASK> [ 15.845073] [ 15.854288] Allocated by task 283: [ 15.854506] kasan_save_stack+0x45/0x70 [ 15.855095] kasan_save_track+0x18/0x40 [ 15.855248] kasan_save_alloc_info+0x3b/0x50 [ 15.855550] __kasan_kmalloc+0xb7/0xc0 [ 15.855811] __kmalloc_cache_noprof+0x189/0x420 [ 15.856140] kasan_atomics+0x95/0x310 [ 15.856288] kunit_try_run_case+0x1a5/0x480 [ 15.856639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.856980] kthread+0x337/0x6f0 [ 15.857113] ret_from_fork+0x116/0x1d0 [ 15.857315] ret_from_fork_asm+0x1a/0x30 [ 15.857503] [ 15.857602] The buggy address belongs to the object at ffff8881026f3680 [ 15.857602] which belongs to the cache kmalloc-64 of size 64 [ 15.858089] The buggy address is located 0 bytes to the right of [ 15.858089] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.859031] [ 15.859117] The buggy address belongs to the physical page: [ 15.859375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.859940] flags: 0x200000000000000(node=0|zone=2) [ 15.860150] page_type: f5(slab) [ 15.860326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.860818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.861218] page dumped because: kasan: bad access detected [ 15.861425] [ 15.861614] Memory state around the buggy address: [ 15.861891] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.862269] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.862635] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.863009] ^ [ 15.863183] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.863653] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.863966] ================================================================== [ 14.601340] ================================================================== [ 14.602077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.602311] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.602662] [ 14.602768] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.602811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.602824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.602845] Call Trace: [ 14.602856] <TASK> [ 14.602871] dump_stack_lvl+0x73/0xb0 [ 14.602898] print_report+0xd1/0x610 [ 14.602920] ? __virt_addr_valid+0x1db/0x2d0 [ 14.602943] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.602966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.602988] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.603011] kasan_report+0x141/0x180 [ 14.603034] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.603062] __asan_report_load4_noabort+0x18/0x20 [ 14.603087] kasan_atomics_helper+0x4b54/0x5450 [ 14.603111] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.603134] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.603159] ? kasan_atomics+0x152/0x310 [ 14.603186] kasan_atomics+0x1dc/0x310 [ 14.603209] ? __pfx_kasan_atomics+0x10/0x10 [ 14.603234] ? __pfx_read_tsc+0x10/0x10 [ 14.603255] ? ktime_get_ts64+0x86/0x230 [ 14.603279] kunit_try_run_case+0x1a5/0x480 [ 14.603303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.603326] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.603351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.603375] ? __kthread_parkme+0x82/0x180 [ 14.603397] ? preempt_count_sub+0x50/0x80 [ 14.603421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.603457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.603482] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.603506] kthread+0x337/0x6f0 [ 14.603525] ? trace_preempt_on+0x20/0xc0 [ 14.603559] ? __pfx_kthread+0x10/0x10 [ 14.603580] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.603602] ? calculate_sigpending+0x7b/0xa0 [ 14.603629] ? __pfx_kthread+0x10/0x10 [ 14.603651] ret_from_fork+0x116/0x1d0 [ 14.603670] ? __pfx_kthread+0x10/0x10 [ 14.603691] ret_from_fork_asm+0x1a/0x30 [ 14.603723] </TASK> [ 14.603733] [ 14.610506] Allocated by task 283: [ 14.610691] kasan_save_stack+0x45/0x70 [ 14.610893] kasan_save_track+0x18/0x40 [ 14.611090] kasan_save_alloc_info+0x3b/0x50 [ 14.611301] __kasan_kmalloc+0xb7/0xc0 [ 14.611498] __kmalloc_cache_noprof+0x189/0x420 [ 14.611729] kasan_atomics+0x95/0x310 [ 14.611918] kunit_try_run_case+0x1a5/0x480 [ 14.612067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.612321] kthread+0x337/0x6f0 [ 14.612490] ret_from_fork+0x116/0x1d0 [ 14.612667] ret_from_fork_asm+0x1a/0x30 [ 14.612833] [ 14.612908] The buggy address belongs to the object at ffff8881026f3680 [ 14.612908] which belongs to the cache kmalloc-64 of size 64 [ 14.613369] The buggy address is located 0 bytes to the right of [ 14.613369] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.613888] [ 14.613976] The buggy address belongs to the physical page: [ 14.614156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.614515] flags: 0x200000000000000(node=0|zone=2) [ 14.614706] page_type: f5(slab) [ 14.614869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.615175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.615477] page dumped because: kasan: bad access detected [ 14.615714] [ 14.615803] Memory state around the buggy address: [ 14.615989] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.616268] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.616532] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.616820] ^ [ 14.616987] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.617199] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.617404] ================================================================== [ 15.043980] ================================================================== [ 15.044605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.044935] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.045942] [ 15.046182] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.046344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.046359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.046392] Call Trace: [ 15.046407] <TASK> [ 15.046422] dump_stack_lvl+0x73/0xb0 [ 15.046499] print_report+0xd1/0x610 [ 15.046545] ? __virt_addr_valid+0x1db/0x2d0 [ 15.046568] ? kasan_atomics_helper+0x1079/0x5450 [ 15.046590] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.046613] ? kasan_atomics_helper+0x1079/0x5450 [ 15.046636] kasan_report+0x141/0x180 [ 15.046659] ? kasan_atomics_helper+0x1079/0x5450 [ 15.046687] kasan_check_range+0x10c/0x1c0 [ 15.046712] __kasan_check_write+0x18/0x20 [ 15.046734] kasan_atomics_helper+0x1079/0x5450 [ 15.046757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.046780] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.046805] ? kasan_atomics+0x152/0x310 [ 15.046833] kasan_atomics+0x1dc/0x310 [ 15.046856] ? __pfx_kasan_atomics+0x10/0x10 [ 15.046881] ? __pfx_read_tsc+0x10/0x10 [ 15.046902] ? ktime_get_ts64+0x86/0x230 [ 15.046926] kunit_try_run_case+0x1a5/0x480 [ 15.046950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.046974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.046997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.047022] ? __kthread_parkme+0x82/0x180 [ 15.047042] ? preempt_count_sub+0x50/0x80 [ 15.047067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.047092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.047116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.047141] kthread+0x337/0x6f0 [ 15.047160] ? trace_preempt_on+0x20/0xc0 [ 15.047183] ? __pfx_kthread+0x10/0x10 [ 15.047204] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.047226] ? calculate_sigpending+0x7b/0xa0 [ 15.047252] ? __pfx_kthread+0x10/0x10 [ 15.047274] ret_from_fork+0x116/0x1d0 [ 15.047292] ? __pfx_kthread+0x10/0x10 [ 15.047313] ret_from_fork_asm+0x1a/0x30 [ 15.047348] </TASK> [ 15.047359] [ 15.060103] Allocated by task 283: [ 15.060276] kasan_save_stack+0x45/0x70 [ 15.060724] kasan_save_track+0x18/0x40 [ 15.060929] kasan_save_alloc_info+0x3b/0x50 [ 15.061134] __kasan_kmalloc+0xb7/0xc0 [ 15.061310] __kmalloc_cache_noprof+0x189/0x420 [ 15.061522] kasan_atomics+0x95/0x310 [ 15.061694] kunit_try_run_case+0x1a5/0x480 [ 15.061883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.062100] kthread+0x337/0x6f0 [ 15.062258] ret_from_fork+0x116/0x1d0 [ 15.062432] ret_from_fork_asm+0x1a/0x30 [ 15.063154] [ 15.063700] The buggy address belongs to the object at ffff8881026f3680 [ 15.063700] which belongs to the cache kmalloc-64 of size 64 [ 15.064390] The buggy address is located 0 bytes to the right of [ 15.064390] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.064916] [ 15.064992] The buggy address belongs to the physical page: [ 15.065171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.065405] flags: 0x200000000000000(node=0|zone=2) [ 15.065620] page_type: f5(slab) [ 15.065873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.066365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.067069] page dumped because: kasan: bad access detected [ 15.067247] [ 15.067318] Memory state around the buggy address: [ 15.067481] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.068113] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.068889] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.069677] ^ [ 15.070223] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.070645] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.070857] ================================================================== [ 15.795157] ================================================================== [ 15.795603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.796106] Read of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.796709] [ 15.796970] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.797019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.797033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.797055] Call Trace: [ 15.797073] <TASK> [ 15.797091] dump_stack_lvl+0x73/0xb0 [ 15.797120] print_report+0xd1/0x610 [ 15.797149] ? __virt_addr_valid+0x1db/0x2d0 [ 15.797172] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.797193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.797217] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.797239] kasan_report+0x141/0x180 [ 15.797263] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.797292] __asan_report_load8_noabort+0x18/0x20 [ 15.797318] kasan_atomics_helper+0x4fa5/0x5450 [ 15.797342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.797365] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.797391] ? kasan_atomics+0x152/0x310 [ 15.797419] kasan_atomics+0x1dc/0x310 [ 15.797454] ? __pfx_kasan_atomics+0x10/0x10 [ 15.797479] ? __pfx_read_tsc+0x10/0x10 [ 15.797501] ? ktime_get_ts64+0x86/0x230 [ 15.797528] kunit_try_run_case+0x1a5/0x480 [ 15.797564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.797588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.797612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.797637] ? __kthread_parkme+0x82/0x180 [ 15.797658] ? preempt_count_sub+0x50/0x80 [ 15.797685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.797711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.797735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.797761] kthread+0x337/0x6f0 [ 15.797780] ? trace_preempt_on+0x20/0xc0 [ 15.797805] ? __pfx_kthread+0x10/0x10 [ 15.797827] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.797853] ? calculate_sigpending+0x7b/0xa0 [ 15.797880] ? __pfx_kthread+0x10/0x10 [ 15.797903] ret_from_fork+0x116/0x1d0 [ 15.797922] ? __pfx_kthread+0x10/0x10 [ 15.797943] ret_from_fork_asm+0x1a/0x30 [ 15.797976] </TASK> [ 15.797987] [ 15.807913] Allocated by task 283: [ 15.808092] kasan_save_stack+0x45/0x70 [ 15.808279] kasan_save_track+0x18/0x40 [ 15.808469] kasan_save_alloc_info+0x3b/0x50 [ 15.809031] __kasan_kmalloc+0xb7/0xc0 [ 15.809182] __kmalloc_cache_noprof+0x189/0x420 [ 15.809548] kasan_atomics+0x95/0x310 [ 15.809874] kunit_try_run_case+0x1a5/0x480 [ 15.810086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.810407] kthread+0x337/0x6f0 [ 15.810599] ret_from_fork+0x116/0x1d0 [ 15.810913] ret_from_fork_asm+0x1a/0x30 [ 15.811197] [ 15.811274] The buggy address belongs to the object at ffff8881026f3680 [ 15.811274] which belongs to the cache kmalloc-64 of size 64 [ 15.812013] The buggy address is located 0 bytes to the right of [ 15.812013] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.812630] [ 15.812820] The buggy address belongs to the physical page: [ 15.813147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.813581] flags: 0x200000000000000(node=0|zone=2) [ 15.813829] page_type: f5(slab) [ 15.813960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.814288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.814863] page dumped because: kasan: bad access detected [ 15.815166] [ 15.815266] Memory state around the buggy address: [ 15.815661] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.816024] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.816331] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.816767] ^ [ 15.817026] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.817403] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.817852] ================================================================== [ 14.796945] ================================================================== [ 14.797304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.797721] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.798342] [ 14.798804] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.798852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.798865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.798888] Call Trace: [ 14.798903] <TASK> [ 14.798919] dump_stack_lvl+0x73/0xb0 [ 14.798947] print_report+0xd1/0x610 [ 14.798969] ? __virt_addr_valid+0x1db/0x2d0 [ 14.798992] ? kasan_atomics_helper+0x992/0x5450 [ 14.799014] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.799037] ? kasan_atomics_helper+0x992/0x5450 [ 14.799060] kasan_report+0x141/0x180 [ 14.799083] ? kasan_atomics_helper+0x992/0x5450 [ 14.799111] kasan_check_range+0x10c/0x1c0 [ 14.799137] __kasan_check_write+0x18/0x20 [ 14.799157] kasan_atomics_helper+0x992/0x5450 [ 14.799181] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.799204] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.799230] ? kasan_atomics+0x152/0x310 [ 14.799257] kasan_atomics+0x1dc/0x310 [ 14.799280] ? __pfx_kasan_atomics+0x10/0x10 [ 14.799305] ? __pfx_read_tsc+0x10/0x10 [ 14.799326] ? ktime_get_ts64+0x86/0x230 [ 14.799351] kunit_try_run_case+0x1a5/0x480 [ 14.799374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.799397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.799422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.799459] ? __kthread_parkme+0x82/0x180 [ 14.799481] ? preempt_count_sub+0x50/0x80 [ 14.799506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.799537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.799563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.799588] kthread+0x337/0x6f0 [ 14.799608] ? trace_preempt_on+0x20/0xc0 [ 14.799631] ? __pfx_kthread+0x10/0x10 [ 14.799653] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.799675] ? calculate_sigpending+0x7b/0xa0 [ 14.799700] ? __pfx_kthread+0x10/0x10 [ 14.799722] ret_from_fork+0x116/0x1d0 [ 14.799742] ? __pfx_kthread+0x10/0x10 [ 14.799763] ret_from_fork_asm+0x1a/0x30 [ 14.799796] </TASK> [ 14.799807] [ 14.808156] Allocated by task 283: [ 14.808345] kasan_save_stack+0x45/0x70 [ 14.808607] kasan_save_track+0x18/0x40 [ 14.808811] kasan_save_alloc_info+0x3b/0x50 [ 14.809052] __kasan_kmalloc+0xb7/0xc0 [ 14.809257] __kmalloc_cache_noprof+0x189/0x420 [ 14.809511] kasan_atomics+0x95/0x310 [ 14.809775] kunit_try_run_case+0x1a5/0x480 [ 14.810036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.810316] kthread+0x337/0x6f0 [ 14.810535] ret_from_fork+0x116/0x1d0 [ 14.810711] ret_from_fork_asm+0x1a/0x30 [ 14.810951] [ 14.811085] The buggy address belongs to the object at ffff8881026f3680 [ 14.811085] which belongs to the cache kmalloc-64 of size 64 [ 14.811649] The buggy address is located 0 bytes to the right of [ 14.811649] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.812184] [ 14.812261] The buggy address belongs to the physical page: [ 14.812555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.812966] flags: 0x200000000000000(node=0|zone=2) [ 14.813205] page_type: f5(slab) [ 14.813373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.813761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.814095] page dumped because: kasan: bad access detected [ 14.814345] [ 14.814448] Memory state around the buggy address: [ 14.814698] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.815014] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.815266] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.815508] ^ [ 14.815749] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.816113] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.816464] ================================================================== [ 15.161897] ================================================================== [ 15.162270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.162807] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.163046] [ 15.163153] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.163196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.163209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.163231] Call Trace: [ 15.163245] <TASK> [ 15.163260] dump_stack_lvl+0x73/0xb0 [ 15.163289] print_report+0xd1/0x610 [ 15.163312] ? __virt_addr_valid+0x1db/0x2d0 [ 15.163336] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.163358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.163381] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.163404] kasan_report+0x141/0x180 [ 15.163427] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.163469] __asan_report_load4_noabort+0x18/0x20 [ 15.163494] kasan_atomics_helper+0x49e8/0x5450 [ 15.163518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.163553] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.163578] ? kasan_atomics+0x152/0x310 [ 15.163606] kasan_atomics+0x1dc/0x310 [ 15.163629] ? __pfx_kasan_atomics+0x10/0x10 [ 15.163654] ? __pfx_read_tsc+0x10/0x10 [ 15.163675] ? ktime_get_ts64+0x86/0x230 [ 15.163701] kunit_try_run_case+0x1a5/0x480 [ 15.163726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.163750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.163775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.163800] ? __kthread_parkme+0x82/0x180 [ 15.163821] ? preempt_count_sub+0x50/0x80 [ 15.163846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.163870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.163895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.163920] kthread+0x337/0x6f0 [ 15.163940] ? trace_preempt_on+0x20/0xc0 [ 15.163964] ? __pfx_kthread+0x10/0x10 [ 15.163984] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.164007] ? calculate_sigpending+0x7b/0xa0 [ 15.164031] ? __pfx_kthread+0x10/0x10 [ 15.164053] ret_from_fork+0x116/0x1d0 [ 15.164072] ? __pfx_kthread+0x10/0x10 [ 15.164093] ret_from_fork_asm+0x1a/0x30 [ 15.164127] </TASK> [ 15.164137] [ 15.171389] Allocated by task 283: [ 15.171621] kasan_save_stack+0x45/0x70 [ 15.171825] kasan_save_track+0x18/0x40 [ 15.172016] kasan_save_alloc_info+0x3b/0x50 [ 15.172224] __kasan_kmalloc+0xb7/0xc0 [ 15.172413] __kmalloc_cache_noprof+0x189/0x420 [ 15.172640] kasan_atomics+0x95/0x310 [ 15.172777] kunit_try_run_case+0x1a5/0x480 [ 15.172941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.173194] kthread+0x337/0x6f0 [ 15.173369] ret_from_fork+0x116/0x1d0 [ 15.173603] ret_from_fork_asm+0x1a/0x30 [ 15.173810] [ 15.173901] The buggy address belongs to the object at ffff8881026f3680 [ 15.173901] which belongs to the cache kmalloc-64 of size 64 [ 15.174257] The buggy address is located 0 bytes to the right of [ 15.174257] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.174887] [ 15.174985] The buggy address belongs to the physical page: [ 15.175236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.175560] flags: 0x200000000000000(node=0|zone=2) [ 15.175785] page_type: f5(slab) [ 15.175905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.176140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.176406] page dumped because: kasan: bad access detected [ 15.177182] [ 15.177293] Memory state around the buggy address: [ 15.177668] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.177972] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.178265] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.178579] ^ [ 15.178761] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179067] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179343] ================================================================== [ 14.920401] ================================================================== [ 14.921132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.921375] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.923016] [ 14.923150] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.923197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.923210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.923232] Call Trace: [ 14.923248] <TASK> [ 14.923264] dump_stack_lvl+0x73/0xb0 [ 14.923293] print_report+0xd1/0x610 [ 14.923316] ? __virt_addr_valid+0x1db/0x2d0 [ 14.923340] ? kasan_atomics_helper+0xd47/0x5450 [ 14.923362] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.923386] ? kasan_atomics_helper+0xd47/0x5450 [ 14.923409] kasan_report+0x141/0x180 [ 14.923432] ? kasan_atomics_helper+0xd47/0x5450 [ 14.923470] kasan_check_range+0x10c/0x1c0 [ 14.923494] __kasan_check_write+0x18/0x20 [ 14.923514] kasan_atomics_helper+0xd47/0x5450 [ 14.923537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.923561] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.923586] ? kasan_atomics+0x152/0x310 [ 14.923614] kasan_atomics+0x1dc/0x310 [ 14.923638] ? __pfx_kasan_atomics+0x10/0x10 [ 14.923663] ? __pfx_read_tsc+0x10/0x10 [ 14.923684] ? ktime_get_ts64+0x86/0x230 [ 14.923711] kunit_try_run_case+0x1a5/0x480 [ 14.923736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.923760] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.923784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.923809] ? __kthread_parkme+0x82/0x180 [ 14.923830] ? preempt_count_sub+0x50/0x80 [ 14.923854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.923879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.923904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.923929] kthread+0x337/0x6f0 [ 14.923948] ? trace_preempt_on+0x20/0xc0 [ 14.923972] ? __pfx_kthread+0x10/0x10 [ 14.923993] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.924015] ? calculate_sigpending+0x7b/0xa0 [ 14.924039] ? __pfx_kthread+0x10/0x10 [ 14.924061] ret_from_fork+0x116/0x1d0 [ 14.924081] ? __pfx_kthread+0x10/0x10 [ 14.924102] ret_from_fork_asm+0x1a/0x30 [ 14.924134] </TASK> [ 14.924144] [ 14.931649] Allocated by task 283: [ 14.931801] kasan_save_stack+0x45/0x70 [ 14.931999] kasan_save_track+0x18/0x40 [ 14.932201] kasan_save_alloc_info+0x3b/0x50 [ 14.932388] __kasan_kmalloc+0xb7/0xc0 [ 14.932552] __kmalloc_cache_noprof+0x189/0x420 [ 14.932780] kasan_atomics+0x95/0x310 [ 14.932941] kunit_try_run_case+0x1a5/0x480 [ 14.933111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.933367] kthread+0x337/0x6f0 [ 14.933524] ret_from_fork+0x116/0x1d0 [ 14.933702] ret_from_fork_asm+0x1a/0x30 [ 14.933886] [ 14.933980] The buggy address belongs to the object at ffff8881026f3680 [ 14.933980] which belongs to the cache kmalloc-64 of size 64 [ 14.934454] The buggy address is located 0 bytes to the right of [ 14.934454] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.934964] [ 14.935061] The buggy address belongs to the physical page: [ 14.935284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.935566] flags: 0x200000000000000(node=0|zone=2) [ 14.935834] page_type: f5(slab) [ 14.936002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.936294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.936607] page dumped because: kasan: bad access detected [ 14.936862] [ 14.936961] Memory state around the buggy address: [ 14.937152] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.937457] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.937764] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.938051] ^ [ 14.938255] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938558] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938840] ================================================================== [ 15.618564] ================================================================== [ 15.618960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.619255] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.619784] [ 15.619932] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.619978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.619991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.620012] Call Trace: [ 15.620029] <TASK> [ 15.620046] dump_stack_lvl+0x73/0xb0 [ 15.620075] print_report+0xd1/0x610 [ 15.620132] ? __virt_addr_valid+0x1db/0x2d0 [ 15.620156] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.620177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.620201] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.620224] kasan_report+0x141/0x180 [ 15.620277] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.620305] kasan_check_range+0x10c/0x1c0 [ 15.620331] __kasan_check_write+0x18/0x20 [ 15.620351] kasan_atomics_helper+0x1e12/0x5450 [ 15.620376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.620429] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.620466] ? kasan_atomics+0x152/0x310 [ 15.620494] kasan_atomics+0x1dc/0x310 [ 15.620518] ? __pfx_kasan_atomics+0x10/0x10 [ 15.620550] ? __pfx_read_tsc+0x10/0x10 [ 15.620573] ? ktime_get_ts64+0x86/0x230 [ 15.620632] kunit_try_run_case+0x1a5/0x480 [ 15.620657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.620681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.620706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.620760] ? __kthread_parkme+0x82/0x180 [ 15.620782] ? preempt_count_sub+0x50/0x80 [ 15.620808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.620833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.620858] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.620913] kthread+0x337/0x6f0 [ 15.620934] ? trace_preempt_on+0x20/0xc0 [ 15.620957] ? __pfx_kthread+0x10/0x10 [ 15.620978] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.621000] ? calculate_sigpending+0x7b/0xa0 [ 15.621052] ? __pfx_kthread+0x10/0x10 [ 15.621075] ret_from_fork+0x116/0x1d0 [ 15.621094] ? __pfx_kthread+0x10/0x10 [ 15.621115] ret_from_fork_asm+0x1a/0x30 [ 15.621183] </TASK> [ 15.621195] [ 15.629251] Allocated by task 283: [ 15.629421] kasan_save_stack+0x45/0x70 [ 15.629639] kasan_save_track+0x18/0x40 [ 15.629850] kasan_save_alloc_info+0x3b/0x50 [ 15.630088] __kasan_kmalloc+0xb7/0xc0 [ 15.630297] __kmalloc_cache_noprof+0x189/0x420 [ 15.630518] kasan_atomics+0x95/0x310 [ 15.630737] kunit_try_run_case+0x1a5/0x480 [ 15.630946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.631199] kthread+0x337/0x6f0 [ 15.631373] ret_from_fork+0x116/0x1d0 [ 15.631593] ret_from_fork_asm+0x1a/0x30 [ 15.631818] [ 15.631912] The buggy address belongs to the object at ffff8881026f3680 [ 15.631912] which belongs to the cache kmalloc-64 of size 64 [ 15.632447] The buggy address is located 0 bytes to the right of [ 15.632447] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.633033] [ 15.633115] The buggy address belongs to the physical page: [ 15.633371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.633636] flags: 0x200000000000000(node=0|zone=2) [ 15.633796] page_type: f5(slab) [ 15.633915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.634140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.634359] page dumped because: kasan: bad access detected [ 15.634538] [ 15.634607] Memory state around the buggy address: [ 15.634760] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.635066] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.635372] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.636020] ^ [ 15.636243] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.636558] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.636863] ================================================================== [ 15.695553] ================================================================== [ 15.695937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.696169] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.696396] [ 15.696616] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.696659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.696672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.696693] Call Trace: [ 15.696706] <TASK> [ 15.696722] dump_stack_lvl+0x73/0xb0 [ 15.696749] print_report+0xd1/0x610 [ 15.696771] ? __virt_addr_valid+0x1db/0x2d0 [ 15.696795] ? kasan_atomics_helper+0x2006/0x5450 [ 15.696847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.696871] ? kasan_atomics_helper+0x2006/0x5450 [ 15.696894] kasan_report+0x141/0x180 [ 15.696949] ? kasan_atomics_helper+0x2006/0x5450 [ 15.696980] kasan_check_range+0x10c/0x1c0 [ 15.697004] __kasan_check_write+0x18/0x20 [ 15.697024] kasan_atomics_helper+0x2006/0x5450 [ 15.697048] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.697071] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.697124] ? kasan_atomics+0x152/0x310 [ 15.697157] kasan_atomics+0x1dc/0x310 [ 15.697181] ? __pfx_kasan_atomics+0x10/0x10 [ 15.697206] ? __pfx_read_tsc+0x10/0x10 [ 15.697227] ? ktime_get_ts64+0x86/0x230 [ 15.697281] kunit_try_run_case+0x1a5/0x480 [ 15.697306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.697329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.697355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.697380] ? __kthread_parkme+0x82/0x180 [ 15.697429] ? preempt_count_sub+0x50/0x80 [ 15.697467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.697492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.697517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.697553] kthread+0x337/0x6f0 [ 15.697573] ? trace_preempt_on+0x20/0xc0 [ 15.697628] ? __pfx_kthread+0x10/0x10 [ 15.697649] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.697672] ? calculate_sigpending+0x7b/0xa0 [ 15.697697] ? __pfx_kthread+0x10/0x10 [ 15.697719] ret_from_fork+0x116/0x1d0 [ 15.697761] ? __pfx_kthread+0x10/0x10 [ 15.697783] ret_from_fork_asm+0x1a/0x30 [ 15.697817] </TASK> [ 15.697828] [ 15.706114] Allocated by task 283: [ 15.706295] kasan_save_stack+0x45/0x70 [ 15.706538] kasan_save_track+0x18/0x40 [ 15.706766] kasan_save_alloc_info+0x3b/0x50 [ 15.706980] __kasan_kmalloc+0xb7/0xc0 [ 15.707158] __kmalloc_cache_noprof+0x189/0x420 [ 15.707396] kasan_atomics+0x95/0x310 [ 15.707656] kunit_try_run_case+0x1a5/0x480 [ 15.707833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.708010] kthread+0x337/0x6f0 [ 15.708133] ret_from_fork+0x116/0x1d0 [ 15.708270] ret_from_fork_asm+0x1a/0x30 [ 15.708416] [ 15.708500] The buggy address belongs to the object at ffff8881026f3680 [ 15.708500] which belongs to the cache kmalloc-64 of size 64 [ 15.709095] The buggy address is located 0 bytes to the right of [ 15.709095] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.709823] [ 15.709957] The buggy address belongs to the physical page: [ 15.710212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.710618] flags: 0x200000000000000(node=0|zone=2) [ 15.710853] page_type: f5(slab) [ 15.711139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.711378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.711621] page dumped because: kasan: bad access detected [ 15.711795] [ 15.711888] Memory state around the buggy address: [ 15.712109] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.712428] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.712786] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.713100] ^ [ 15.713327] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.713684] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.713932] ================================================================== [ 14.940660] ================================================================== [ 14.940918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.941154] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.941383] [ 14.941673] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.941730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.941742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.941763] Call Trace: [ 14.941776] <TASK> [ 14.941790] dump_stack_lvl+0x73/0xb0 [ 14.941817] print_report+0xd1/0x610 [ 14.941841] ? __virt_addr_valid+0x1db/0x2d0 [ 14.941865] ? kasan_atomics_helper+0xde0/0x5450 [ 14.941888] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.941914] ? kasan_atomics_helper+0xde0/0x5450 [ 14.941939] kasan_report+0x141/0x180 [ 14.941962] ? kasan_atomics_helper+0xde0/0x5450 [ 14.941991] kasan_check_range+0x10c/0x1c0 [ 14.942017] __kasan_check_write+0x18/0x20 [ 14.942038] kasan_atomics_helper+0xde0/0x5450 [ 14.942063] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.942088] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.942115] ? kasan_atomics+0x152/0x310 [ 14.942143] kasan_atomics+0x1dc/0x310 [ 14.942168] ? __pfx_kasan_atomics+0x10/0x10 [ 14.942194] ? __pfx_read_tsc+0x10/0x10 [ 14.942216] ? ktime_get_ts64+0x86/0x230 [ 14.942242] kunit_try_run_case+0x1a5/0x480 [ 14.942268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.942319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.942345] ? __kthread_parkme+0x82/0x180 [ 14.942368] ? preempt_count_sub+0x50/0x80 [ 14.942395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.942464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.942492] kthread+0x337/0x6f0 [ 14.942512] ? trace_preempt_on+0x20/0xc0 [ 14.942537] ? __pfx_kthread+0x10/0x10 [ 14.942559] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.942582] ? calculate_sigpending+0x7b/0xa0 [ 14.942621] ? __pfx_kthread+0x10/0x10 [ 14.942645] ret_from_fork+0x116/0x1d0 [ 14.942665] ? __pfx_kthread+0x10/0x10 [ 14.942687] ret_from_fork_asm+0x1a/0x30 [ 14.942722] </TASK> [ 14.942732] [ 14.950854] Allocated by task 283: [ 14.951154] kasan_save_stack+0x45/0x70 [ 14.951359] kasan_save_track+0x18/0x40 [ 14.951566] kasan_save_alloc_info+0x3b/0x50 [ 14.951830] __kasan_kmalloc+0xb7/0xc0 [ 14.951965] __kmalloc_cache_noprof+0x189/0x420 [ 14.952124] kasan_atomics+0x95/0x310 [ 14.952258] kunit_try_run_case+0x1a5/0x480 [ 14.952420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.953811] kthread+0x337/0x6f0 [ 14.954351] ret_from_fork+0x116/0x1d0 [ 14.954952] ret_from_fork_asm+0x1a/0x30 [ 14.955548] [ 14.955964] The buggy address belongs to the object at ffff8881026f3680 [ 14.955964] which belongs to the cache kmalloc-64 of size 64 [ 14.957406] The buggy address is located 0 bytes to the right of [ 14.957406] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.958765] [ 14.959099] The buggy address belongs to the physical page: [ 14.959793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.960053] flags: 0x200000000000000(node=0|zone=2) [ 14.960220] page_type: f5(slab) [ 14.960346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.961027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.961740] page dumped because: kasan: bad access detected [ 14.962259] [ 14.962415] Memory state around the buggy address: [ 14.962871] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.963471] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.964047] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.964262] ^ [ 14.964416] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964917] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.965564] ================================================================== [ 14.777449] ================================================================== [ 14.777813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.778153] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.778551] [ 14.778663] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.778737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.778763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.778783] Call Trace: [ 14.778795] <TASK> [ 14.778823] dump_stack_lvl+0x73/0xb0 [ 14.778853] print_report+0xd1/0x610 [ 14.778876] ? __virt_addr_valid+0x1db/0x2d0 [ 14.778899] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.778921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.778945] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.778968] kasan_report+0x141/0x180 [ 14.778991] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.779019] kasan_check_range+0x10c/0x1c0 [ 14.779044] __kasan_check_write+0x18/0x20 [ 14.779064] kasan_atomics_helper+0x8f9/0x5450 [ 14.779089] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.779142] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.779168] ? kasan_atomics+0x152/0x310 [ 14.779223] kasan_atomics+0x1dc/0x310 [ 14.779248] ? __pfx_kasan_atomics+0x10/0x10 [ 14.779273] ? __pfx_read_tsc+0x10/0x10 [ 14.779305] ? ktime_get_ts64+0x86/0x230 [ 14.779330] kunit_try_run_case+0x1a5/0x480 [ 14.779355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.779445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.779478] ? __kthread_parkme+0x82/0x180 [ 14.779500] ? preempt_count_sub+0x50/0x80 [ 14.779548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.779598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.779624] kthread+0x337/0x6f0 [ 14.779644] ? trace_preempt_on+0x20/0xc0 [ 14.779668] ? __pfx_kthread+0x10/0x10 [ 14.779689] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.779710] ? calculate_sigpending+0x7b/0xa0 [ 14.779735] ? __pfx_kthread+0x10/0x10 [ 14.779757] ret_from_fork+0x116/0x1d0 [ 14.779776] ? __pfx_kthread+0x10/0x10 [ 14.779797] ret_from_fork_asm+0x1a/0x30 [ 14.779831] </TASK> [ 14.779841] [ 14.787777] Allocated by task 283: [ 14.787972] kasan_save_stack+0x45/0x70 [ 14.788198] kasan_save_track+0x18/0x40 [ 14.788416] kasan_save_alloc_info+0x3b/0x50 [ 14.788685] __kasan_kmalloc+0xb7/0xc0 [ 14.788872] __kmalloc_cache_noprof+0x189/0x420 [ 14.789114] kasan_atomics+0x95/0x310 [ 14.789309] kunit_try_run_case+0x1a5/0x480 [ 14.789569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.789842] kthread+0x337/0x6f0 [ 14.790028] ret_from_fork+0x116/0x1d0 [ 14.790250] ret_from_fork_asm+0x1a/0x30 [ 14.790483] [ 14.790622] The buggy address belongs to the object at ffff8881026f3680 [ 14.790622] which belongs to the cache kmalloc-64 of size 64 [ 14.791209] The buggy address is located 0 bytes to the right of [ 14.791209] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.791801] [ 14.791923] The buggy address belongs to the physical page: [ 14.792204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.792624] flags: 0x200000000000000(node=0|zone=2) [ 14.792862] page_type: f5(slab) [ 14.793029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.793371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.793736] page dumped because: kasan: bad access detected [ 14.793991] [ 14.794084] Memory state around the buggy address: [ 14.794321] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.794705] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.794972] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.795317] ^ [ 14.795578] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.795914] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.796258] ================================================================== [ 14.877697] ================================================================== [ 14.878331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.878919] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.879398] [ 14.879633] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.879679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.879691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.879712] Call Trace: [ 14.879727] <TASK> [ 14.879750] dump_stack_lvl+0x73/0xb0 [ 14.879780] print_report+0xd1/0x610 [ 14.879803] ? __virt_addr_valid+0x1db/0x2d0 [ 14.879825] ? kasan_atomics_helper+0xc70/0x5450 [ 14.879847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.879871] ? kasan_atomics_helper+0xc70/0x5450 [ 14.879894] kasan_report+0x141/0x180 [ 14.879918] ? kasan_atomics_helper+0xc70/0x5450 [ 14.879946] kasan_check_range+0x10c/0x1c0 [ 14.879971] __kasan_check_write+0x18/0x20 [ 14.879991] kasan_atomics_helper+0xc70/0x5450 [ 14.880015] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.880038] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.880063] ? kasan_atomics+0x152/0x310 [ 14.880090] kasan_atomics+0x1dc/0x310 [ 14.880113] ? __pfx_kasan_atomics+0x10/0x10 [ 14.880139] ? __pfx_read_tsc+0x10/0x10 [ 14.880159] ? ktime_get_ts64+0x86/0x230 [ 14.880184] kunit_try_run_case+0x1a5/0x480 [ 14.880208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.880231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.880255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.880279] ? __kthread_parkme+0x82/0x180 [ 14.880340] ? preempt_count_sub+0x50/0x80 [ 14.880365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.880401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.880427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.880460] kthread+0x337/0x6f0 [ 14.880479] ? trace_preempt_on+0x20/0xc0 [ 14.880503] ? __pfx_kthread+0x10/0x10 [ 14.880524] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.880546] ? calculate_sigpending+0x7b/0xa0 [ 14.880587] ? __pfx_kthread+0x10/0x10 [ 14.880610] ret_from_fork+0x116/0x1d0 [ 14.880628] ? __pfx_kthread+0x10/0x10 [ 14.880650] ret_from_fork_asm+0x1a/0x30 [ 14.880683] </TASK> [ 14.880694] [ 14.891119] Allocated by task 283: [ 14.891284] kasan_save_stack+0x45/0x70 [ 14.891776] kasan_save_track+0x18/0x40 [ 14.892079] kasan_save_alloc_info+0x3b/0x50 [ 14.892246] __kasan_kmalloc+0xb7/0xc0 [ 14.892646] __kmalloc_cache_noprof+0x189/0x420 [ 14.892901] kasan_atomics+0x95/0x310 [ 14.893213] kunit_try_run_case+0x1a5/0x480 [ 14.893446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.893895] kthread+0x337/0x6f0 [ 14.894153] ret_from_fork+0x116/0x1d0 [ 14.894365] ret_from_fork_asm+0x1a/0x30 [ 14.894760] [ 14.894863] The buggy address belongs to the object at ffff8881026f3680 [ 14.894863] which belongs to the cache kmalloc-64 of size 64 [ 14.895579] The buggy address is located 0 bytes to the right of [ 14.895579] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.896190] [ 14.896427] The buggy address belongs to the physical page: [ 14.896878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.897274] flags: 0x200000000000000(node=0|zone=2) [ 14.897670] page_type: f5(slab) [ 14.897943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.898311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.898831] page dumped because: kasan: bad access detected [ 14.899164] [ 14.899242] Memory state around the buggy address: [ 14.899627] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900043] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900369] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.900795] ^ [ 14.901022] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901462] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901918] ================================================================== [ 15.407858] ================================================================== [ 15.408155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.408384] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.408733] [ 15.409008] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.409276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.409291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.409370] Call Trace: [ 15.409386] <TASK> [ 15.409401] dump_stack_lvl+0x73/0xb0 [ 15.409523] print_report+0xd1/0x610 [ 15.409559] ? __virt_addr_valid+0x1db/0x2d0 [ 15.409652] ? kasan_atomics_helper+0x1818/0x5450 [ 15.409675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.409698] ? kasan_atomics_helper+0x1818/0x5450 [ 15.409721] kasan_report+0x141/0x180 [ 15.409746] ? kasan_atomics_helper+0x1818/0x5450 [ 15.409774] kasan_check_range+0x10c/0x1c0 [ 15.409799] __kasan_check_write+0x18/0x20 [ 15.409818] kasan_atomics_helper+0x1818/0x5450 [ 15.409941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.409963] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.409989] ? kasan_atomics+0x152/0x310 [ 15.410016] kasan_atomics+0x1dc/0x310 [ 15.410040] ? __pfx_kasan_atomics+0x10/0x10 [ 15.410066] ? __pfx_read_tsc+0x10/0x10 [ 15.410088] ? ktime_get_ts64+0x86/0x230 [ 15.410114] kunit_try_run_case+0x1a5/0x480 [ 15.410138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.410161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.410186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.410210] ? __kthread_parkme+0x82/0x180 [ 15.410231] ? preempt_count_sub+0x50/0x80 [ 15.410256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.410280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.410304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.410329] kthread+0x337/0x6f0 [ 15.410349] ? trace_preempt_on+0x20/0xc0 [ 15.410373] ? __pfx_kthread+0x10/0x10 [ 15.410393] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.410415] ? calculate_sigpending+0x7b/0xa0 [ 15.410451] ? __pfx_kthread+0x10/0x10 [ 15.410473] ret_from_fork+0x116/0x1d0 [ 15.410492] ? __pfx_kthread+0x10/0x10 [ 15.410513] ret_from_fork_asm+0x1a/0x30 [ 15.410546] </TASK> [ 15.410557] [ 15.420464] Allocated by task 283: [ 15.420761] kasan_save_stack+0x45/0x70 [ 15.420950] kasan_save_track+0x18/0x40 [ 15.421123] kasan_save_alloc_info+0x3b/0x50 [ 15.421320] __kasan_kmalloc+0xb7/0xc0 [ 15.421524] __kmalloc_cache_noprof+0x189/0x420 [ 15.421963] kasan_atomics+0x95/0x310 [ 15.422215] kunit_try_run_case+0x1a5/0x480 [ 15.422385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.422826] kthread+0x337/0x6f0 [ 15.422979] ret_from_fork+0x116/0x1d0 [ 15.423278] ret_from_fork_asm+0x1a/0x30 [ 15.423556] [ 15.423641] The buggy address belongs to the object at ffff8881026f3680 [ 15.423641] which belongs to the cache kmalloc-64 of size 64 [ 15.424288] The buggy address is located 0 bytes to the right of [ 15.424288] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.424901] [ 15.425003] The buggy address belongs to the physical page: [ 15.425235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.425808] flags: 0x200000000000000(node=0|zone=2) [ 15.426092] page_type: f5(slab) [ 15.426235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.426692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.427106] page dumped because: kasan: bad access detected [ 15.427422] [ 15.427534] Memory state around the buggy address: [ 15.427767] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.428204] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.428524] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.428808] ^ [ 15.429012] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429309] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429856] ================================================================== [ 15.657458] ================================================================== [ 15.657975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.658313] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.658712] [ 15.658800] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.658880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.658892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.658914] Call Trace: [ 15.658930] <TASK> [ 15.658946] dump_stack_lvl+0x73/0xb0 [ 15.659007] print_report+0xd1/0x610 [ 15.659030] ? __virt_addr_valid+0x1db/0x2d0 [ 15.659054] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.659076] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.659099] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.659122] kasan_report+0x141/0x180 [ 15.659145] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.659174] kasan_check_range+0x10c/0x1c0 [ 15.659229] __kasan_check_write+0x18/0x20 [ 15.659250] kasan_atomics_helper+0x1f43/0x5450 [ 15.659274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.659297] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.659323] ? kasan_atomics+0x152/0x310 [ 15.659377] kasan_atomics+0x1dc/0x310 [ 15.659401] ? __pfx_kasan_atomics+0x10/0x10 [ 15.659426] ? __pfx_read_tsc+0x10/0x10 [ 15.659461] ? ktime_get_ts64+0x86/0x230 [ 15.659487] kunit_try_run_case+0x1a5/0x480 [ 15.659542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.659566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.659591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.659615] ? __kthread_parkme+0x82/0x180 [ 15.659637] ? preempt_count_sub+0x50/0x80 [ 15.659664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.659689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.659744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.659769] kthread+0x337/0x6f0 [ 15.659789] ? trace_preempt_on+0x20/0xc0 [ 15.659814] ? __pfx_kthread+0x10/0x10 [ 15.659835] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.659857] ? calculate_sigpending+0x7b/0xa0 [ 15.659882] ? __pfx_kthread+0x10/0x10 [ 15.659904] ret_from_fork+0x116/0x1d0 [ 15.659923] ? __pfx_kthread+0x10/0x10 [ 15.659944] ret_from_fork_asm+0x1a/0x30 [ 15.659979] </TASK> [ 15.659989] [ 15.668037] Allocated by task 283: [ 15.668224] kasan_save_stack+0x45/0x70 [ 15.668450] kasan_save_track+0x18/0x40 [ 15.668681] kasan_save_alloc_info+0x3b/0x50 [ 15.668913] __kasan_kmalloc+0xb7/0xc0 [ 15.669097] __kmalloc_cache_noprof+0x189/0x420 [ 15.669322] kasan_atomics+0x95/0x310 [ 15.669504] kunit_try_run_case+0x1a5/0x480 [ 15.669870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.670076] kthread+0x337/0x6f0 [ 15.670195] ret_from_fork+0x116/0x1d0 [ 15.670325] ret_from_fork_asm+0x1a/0x30 [ 15.670547] [ 15.670643] The buggy address belongs to the object at ffff8881026f3680 [ 15.670643] which belongs to the cache kmalloc-64 of size 64 [ 15.671160] The buggy address is located 0 bytes to the right of [ 15.671160] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.671696] [ 15.671793] The buggy address belongs to the physical page: [ 15.672040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.672382] flags: 0x200000000000000(node=0|zone=2) [ 15.672619] page_type: f5(slab) [ 15.672785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.673113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.673351] page dumped because: kasan: bad access detected [ 15.673526] [ 15.673609] Memory state around the buggy address: [ 15.673843] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.674155] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.674518] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.674822] ^ [ 15.674977] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.675188] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.675394] ================================================================== [ 15.275937] ================================================================== [ 15.276448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.276838] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.277226] [ 15.277309] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.277349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.277361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.277382] Call Trace: [ 15.277396] <TASK> [ 15.277412] dump_stack_lvl+0x73/0xb0 [ 15.277449] print_report+0xd1/0x610 [ 15.277472] ? __virt_addr_valid+0x1db/0x2d0 [ 15.277495] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.277517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.277540] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.277563] kasan_report+0x141/0x180 [ 15.277599] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.277628] __asan_report_store8_noabort+0x1b/0x30 [ 15.277654] kasan_atomics_helper+0x50d4/0x5450 [ 15.277678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.277702] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.277727] ? kasan_atomics+0x152/0x310 [ 15.277755] kasan_atomics+0x1dc/0x310 [ 15.277778] ? __pfx_kasan_atomics+0x10/0x10 [ 15.277803] ? __pfx_read_tsc+0x10/0x10 [ 15.277824] ? ktime_get_ts64+0x86/0x230 [ 15.277849] kunit_try_run_case+0x1a5/0x480 [ 15.277874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.277897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.277921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.277946] ? __kthread_parkme+0x82/0x180 [ 15.277967] ? preempt_count_sub+0x50/0x80 [ 15.277992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.278018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.278042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.278068] kthread+0x337/0x6f0 [ 15.278087] ? trace_preempt_on+0x20/0xc0 [ 15.278110] ? __pfx_kthread+0x10/0x10 [ 15.278131] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.278154] ? calculate_sigpending+0x7b/0xa0 [ 15.278179] ? __pfx_kthread+0x10/0x10 [ 15.278201] ret_from_fork+0x116/0x1d0 [ 15.278220] ? __pfx_kthread+0x10/0x10 [ 15.278241] ret_from_fork_asm+0x1a/0x30 [ 15.278273] </TASK> [ 15.278284] [ 15.289706] Allocated by task 283: [ 15.289905] kasan_save_stack+0x45/0x70 [ 15.290251] kasan_save_track+0x18/0x40 [ 15.290532] kasan_save_alloc_info+0x3b/0x50 [ 15.290851] __kasan_kmalloc+0xb7/0xc0 [ 15.291006] __kmalloc_cache_noprof+0x189/0x420 [ 15.291229] kasan_atomics+0x95/0x310 [ 15.291413] kunit_try_run_case+0x1a5/0x480 [ 15.291883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.292100] kthread+0x337/0x6f0 [ 15.292275] ret_from_fork+0x116/0x1d0 [ 15.292579] ret_from_fork_asm+0x1a/0x30 [ 15.292899] [ 15.293002] The buggy address belongs to the object at ffff8881026f3680 [ 15.293002] which belongs to the cache kmalloc-64 of size 64 [ 15.293681] The buggy address is located 0 bytes to the right of [ 15.293681] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.294250] [ 15.294333] The buggy address belongs to the physical page: [ 15.294603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.294914] flags: 0x200000000000000(node=0|zone=2) [ 15.295134] page_type: f5(slab) [ 15.295292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.296012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.296313] page dumped because: kasan: bad access detected [ 15.296688] [ 15.296790] Memory state around the buggy address: [ 15.296969] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.297403] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.297811] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.298057] ^ [ 15.298390] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.298683] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.299241] ================================================================== [ 15.251278] ================================================================== [ 15.252148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.252802] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.253404] [ 15.254115] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.254163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.254187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.254209] Call Trace: [ 15.254225] <TASK> [ 15.254240] dump_stack_lvl+0x73/0xb0 [ 15.254270] print_report+0xd1/0x610 [ 15.254293] ? __virt_addr_valid+0x1db/0x2d0 [ 15.254316] ? kasan_atomics_helper+0x1467/0x5450 [ 15.254338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.254361] ? kasan_atomics_helper+0x1467/0x5450 [ 15.254384] kasan_report+0x141/0x180 [ 15.254406] ? kasan_atomics_helper+0x1467/0x5450 [ 15.254444] kasan_check_range+0x10c/0x1c0 [ 15.254469] __kasan_check_write+0x18/0x20 [ 15.254491] kasan_atomics_helper+0x1467/0x5450 [ 15.254514] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.254537] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.254563] ? kasan_atomics+0x152/0x310 [ 15.254590] kasan_atomics+0x1dc/0x310 [ 15.254612] ? __pfx_kasan_atomics+0x10/0x10 [ 15.254638] ? __pfx_read_tsc+0x10/0x10 [ 15.254660] ? ktime_get_ts64+0x86/0x230 [ 15.254685] kunit_try_run_case+0x1a5/0x480 [ 15.254710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.254733] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.254758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.254783] ? __kthread_parkme+0x82/0x180 [ 15.254804] ? preempt_count_sub+0x50/0x80 [ 15.254829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.254857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.254882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.254908] kthread+0x337/0x6f0 [ 15.254928] ? trace_preempt_on+0x20/0xc0 [ 15.254952] ? __pfx_kthread+0x10/0x10 [ 15.254973] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.254995] ? calculate_sigpending+0x7b/0xa0 [ 15.255020] ? __pfx_kthread+0x10/0x10 [ 15.255041] ret_from_fork+0x116/0x1d0 [ 15.255060] ? __pfx_kthread+0x10/0x10 [ 15.255081] ret_from_fork_asm+0x1a/0x30 [ 15.255114] </TASK> [ 15.255124] [ 15.268199] Allocated by task 283: [ 15.268343] kasan_save_stack+0x45/0x70 [ 15.268511] kasan_save_track+0x18/0x40 [ 15.268651] kasan_save_alloc_info+0x3b/0x50 [ 15.268802] __kasan_kmalloc+0xb7/0xc0 [ 15.269005] __kmalloc_cache_noprof+0x189/0x420 [ 15.269188] kasan_atomics+0x95/0x310 [ 15.269323] kunit_try_run_case+0x1a5/0x480 [ 15.269511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.269777] kthread+0x337/0x6f0 [ 15.269946] ret_from_fork+0x116/0x1d0 [ 15.270143] ret_from_fork_asm+0x1a/0x30 [ 15.270313] [ 15.270384] The buggy address belongs to the object at ffff8881026f3680 [ 15.270384] which belongs to the cache kmalloc-64 of size 64 [ 15.270830] The buggy address is located 0 bytes to the right of [ 15.270830] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.271492] [ 15.271647] The buggy address belongs to the physical page: [ 15.271902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.272206] flags: 0x200000000000000(node=0|zone=2) [ 15.272396] page_type: f5(slab) [ 15.272580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.272901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.273165] page dumped because: kasan: bad access detected [ 15.273368] [ 15.273472] Memory state around the buggy address: [ 15.273700] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.273984] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.274225] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.274569] ^ [ 15.274787] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.275068] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.275333] ================================================================== [ 15.818761] ================================================================== [ 15.819376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.819934] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.820200] [ 15.820315] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.820360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.820374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.820396] Call Trace: [ 15.820414] <TASK> [ 15.820432] dump_stack_lvl+0x73/0xb0 [ 15.820475] print_report+0xd1/0x610 [ 15.820525] ? __virt_addr_valid+0x1db/0x2d0 [ 15.820751] ? kasan_atomics_helper+0x224c/0x5450 [ 15.820775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.820800] ? kasan_atomics_helper+0x224c/0x5450 [ 15.820823] kasan_report+0x141/0x180 [ 15.820846] ? kasan_atomics_helper+0x224c/0x5450 [ 15.820875] kasan_check_range+0x10c/0x1c0 [ 15.820899] __kasan_check_write+0x18/0x20 [ 15.820919] kasan_atomics_helper+0x224c/0x5450 [ 15.820943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.820966] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.820992] ? kasan_atomics+0x152/0x310 [ 15.821020] kasan_atomics+0x1dc/0x310 [ 15.821043] ? __pfx_kasan_atomics+0x10/0x10 [ 15.821067] ? __pfx_read_tsc+0x10/0x10 [ 15.821089] ? ktime_get_ts64+0x86/0x230 [ 15.821116] kunit_try_run_case+0x1a5/0x480 [ 15.821152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.821175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.821199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.821224] ? __kthread_parkme+0x82/0x180 [ 15.821245] ? preempt_count_sub+0x50/0x80 [ 15.821271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.821296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.821321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.821345] kthread+0x337/0x6f0 [ 15.821365] ? trace_preempt_on+0x20/0xc0 [ 15.821389] ? __pfx_kthread+0x10/0x10 [ 15.821410] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.821433] ? calculate_sigpending+0x7b/0xa0 [ 15.821469] ? __pfx_kthread+0x10/0x10 [ 15.821491] ret_from_fork+0x116/0x1d0 [ 15.821510] ? __pfx_kthread+0x10/0x10 [ 15.821531] ret_from_fork_asm+0x1a/0x30 [ 15.821582] </TASK> [ 15.821594] [ 15.831855] Allocated by task 283: [ 15.832009] kasan_save_stack+0x45/0x70 [ 15.832290] kasan_save_track+0x18/0x40 [ 15.832491] kasan_save_alloc_info+0x3b/0x50 [ 15.832958] __kasan_kmalloc+0xb7/0xc0 [ 15.833201] __kmalloc_cache_noprof+0x189/0x420 [ 15.833475] kasan_atomics+0x95/0x310 [ 15.833775] kunit_try_run_case+0x1a5/0x480 [ 15.833945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.834326] kthread+0x337/0x6f0 [ 15.834491] ret_from_fork+0x116/0x1d0 [ 15.834822] ret_from_fork_asm+0x1a/0x30 [ 15.834988] [ 15.835150] The buggy address belongs to the object at ffff8881026f3680 [ 15.835150] which belongs to the cache kmalloc-64 of size 64 [ 15.835775] The buggy address is located 0 bytes to the right of [ 15.835775] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.836370] [ 15.836465] The buggy address belongs to the physical page: [ 15.836791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.837280] flags: 0x200000000000000(node=0|zone=2) [ 15.837545] page_type: f5(slab) [ 15.837868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.838273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.838598] page dumped because: kasan: bad access detected [ 15.838957] [ 15.839056] Memory state around the buggy address: [ 15.839249] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.839722] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840062] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.840378] ^ [ 15.840592] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.841071] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.841476] ================================================================== [ 15.317359] ================================================================== [ 15.317703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.318039] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.318285] [ 15.318363] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.318402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.318414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.318457] Call Trace: [ 15.318470] <TASK> [ 15.318485] dump_stack_lvl+0x73/0xb0 [ 15.318511] print_report+0xd1/0x610 [ 15.318534] ? __virt_addr_valid+0x1db/0x2d0 [ 15.318558] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.318580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.318604] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.318627] kasan_report+0x141/0x180 [ 15.318649] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.318678] kasan_check_range+0x10c/0x1c0 [ 15.318712] __kasan_check_write+0x18/0x20 [ 15.318732] kasan_atomics_helper+0x15b6/0x5450 [ 15.318757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.318780] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.318806] ? kasan_atomics+0x152/0x310 [ 15.318834] kasan_atomics+0x1dc/0x310 [ 15.318857] ? __pfx_kasan_atomics+0x10/0x10 [ 15.318882] ? __pfx_read_tsc+0x10/0x10 [ 15.318903] ? ktime_get_ts64+0x86/0x230 [ 15.318928] kunit_try_run_case+0x1a5/0x480 [ 15.318953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.318977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.319001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.319025] ? __kthread_parkme+0x82/0x180 [ 15.319046] ? preempt_count_sub+0x50/0x80 [ 15.319071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.319096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.319120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.319145] kthread+0x337/0x6f0 [ 15.319164] ? trace_preempt_on+0x20/0xc0 [ 15.319188] ? __pfx_kthread+0x10/0x10 [ 15.319209] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.319231] ? calculate_sigpending+0x7b/0xa0 [ 15.319256] ? __pfx_kthread+0x10/0x10 [ 15.319277] ret_from_fork+0x116/0x1d0 [ 15.319296] ? __pfx_kthread+0x10/0x10 [ 15.319317] ret_from_fork_asm+0x1a/0x30 [ 15.319350] </TASK> [ 15.319360] [ 15.326489] Allocated by task 283: [ 15.326619] kasan_save_stack+0x45/0x70 [ 15.326829] kasan_save_track+0x18/0x40 [ 15.327021] kasan_save_alloc_info+0x3b/0x50 [ 15.327241] __kasan_kmalloc+0xb7/0xc0 [ 15.327428] __kmalloc_cache_noprof+0x189/0x420 [ 15.327773] kasan_atomics+0x95/0x310 [ 15.327944] kunit_try_run_case+0x1a5/0x480 [ 15.328132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.328342] kthread+0x337/0x6f0 [ 15.328481] ret_from_fork+0x116/0x1d0 [ 15.328826] ret_from_fork_asm+0x1a/0x30 [ 15.328995] [ 15.329081] The buggy address belongs to the object at ffff8881026f3680 [ 15.329081] which belongs to the cache kmalloc-64 of size 64 [ 15.329550] The buggy address is located 0 bytes to the right of [ 15.329550] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.330002] [ 15.330075] The buggy address belongs to the physical page: [ 15.330251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.330500] flags: 0x200000000000000(node=0|zone=2) [ 15.330665] page_type: f5(slab) [ 15.330786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.331018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.331284] page dumped because: kasan: bad access detected [ 15.331563] [ 15.331658] Memory state around the buggy address: [ 15.331877] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.332192] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.332518] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.333188] ^ [ 15.333451] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.333886] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.334108] ================================================================== [ 15.179907] ================================================================== [ 15.180203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.180766] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.181058] [ 15.181167] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.181209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.181221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.181242] Call Trace: [ 15.181257] <TASK> [ 15.181273] dump_stack_lvl+0x73/0xb0 [ 15.181300] print_report+0xd1/0x610 [ 15.181322] ? __virt_addr_valid+0x1db/0x2d0 [ 15.181345] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.181366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.181391] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.181611] kasan_report+0x141/0x180 [ 15.181637] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.181665] kasan_check_range+0x10c/0x1c0 [ 15.181690] __kasan_check_write+0x18/0x20 [ 15.181709] kasan_atomics_helper+0x12e6/0x5450 [ 15.181734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.181757] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.181782] ? kasan_atomics+0x152/0x310 [ 15.181810] kasan_atomics+0x1dc/0x310 [ 15.181833] ? __pfx_kasan_atomics+0x10/0x10 [ 15.181857] ? __pfx_read_tsc+0x10/0x10 [ 15.181879] ? ktime_get_ts64+0x86/0x230 [ 15.181905] kunit_try_run_case+0x1a5/0x480 [ 15.181930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.181978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.182002] ? __kthread_parkme+0x82/0x180 [ 15.182022] ? preempt_count_sub+0x50/0x80 [ 15.182047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.182072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.182096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.182121] kthread+0x337/0x6f0 [ 15.182141] ? trace_preempt_on+0x20/0xc0 [ 15.182164] ? __pfx_kthread+0x10/0x10 [ 15.182184] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.182206] ? calculate_sigpending+0x7b/0xa0 [ 15.182231] ? __pfx_kthread+0x10/0x10 [ 15.182253] ret_from_fork+0x116/0x1d0 [ 15.182272] ? __pfx_kthread+0x10/0x10 [ 15.182293] ret_from_fork_asm+0x1a/0x30 [ 15.182326] </TASK> [ 15.182336] [ 15.189741] Allocated by task 283: [ 15.189893] kasan_save_stack+0x45/0x70 [ 15.190092] kasan_save_track+0x18/0x40 [ 15.190230] kasan_save_alloc_info+0x3b/0x50 [ 15.190379] __kasan_kmalloc+0xb7/0xc0 [ 15.190558] __kmalloc_cache_noprof+0x189/0x420 [ 15.190780] kasan_atomics+0x95/0x310 [ 15.190964] kunit_try_run_case+0x1a5/0x480 [ 15.191112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.191323] kthread+0x337/0x6f0 [ 15.191506] ret_from_fork+0x116/0x1d0 [ 15.191864] ret_from_fork_asm+0x1a/0x30 [ 15.192048] [ 15.192120] The buggy address belongs to the object at ffff8881026f3680 [ 15.192120] which belongs to the cache kmalloc-64 of size 64 [ 15.192487] The buggy address is located 0 bytes to the right of [ 15.192487] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.192860] [ 15.192932] The buggy address belongs to the physical page: [ 15.193108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.193353] flags: 0x200000000000000(node=0|zone=2) [ 15.193581] page_type: f5(slab) [ 15.193750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.194092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.194423] page dumped because: kasan: bad access detected [ 15.194702] [ 15.194792] Memory state around the buggy address: [ 15.195004] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.195465] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.195772] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.195989] ^ [ 15.196145] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.196363] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.196681] ================================================================== [ 14.731139] ================================================================== [ 14.731491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.731875] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.732202] [ 14.732305] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.732345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.732357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.732378] Call Trace: [ 14.732390] <TASK> [ 14.732404] dump_stack_lvl+0x73/0xb0 [ 14.732430] print_report+0xd1/0x610 [ 14.732463] ? __virt_addr_valid+0x1db/0x2d0 [ 14.732487] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.732509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.732533] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.732573] kasan_report+0x141/0x180 [ 14.732596] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.732624] kasan_check_range+0x10c/0x1c0 [ 14.732649] __kasan_check_write+0x18/0x20 [ 14.732669] kasan_atomics_helper+0x7c7/0x5450 [ 14.732704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.732728] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.732754] ? kasan_atomics+0x152/0x310 [ 14.732781] kasan_atomics+0x1dc/0x310 [ 14.732804] ? __pfx_kasan_atomics+0x10/0x10 [ 14.732830] ? __pfx_read_tsc+0x10/0x10 [ 14.732851] ? ktime_get_ts64+0x86/0x230 [ 14.732876] kunit_try_run_case+0x1a5/0x480 [ 14.732901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.732924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.732949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.732973] ? __kthread_parkme+0x82/0x180 [ 14.732993] ? preempt_count_sub+0x50/0x80 [ 14.733018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.733042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.733067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.733093] kthread+0x337/0x6f0 [ 14.733112] ? trace_preempt_on+0x20/0xc0 [ 14.733140] ? __pfx_kthread+0x10/0x10 [ 14.733162] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.733184] ? calculate_sigpending+0x7b/0xa0 [ 14.733208] ? __pfx_kthread+0x10/0x10 [ 14.733230] ret_from_fork+0x116/0x1d0 [ 14.733249] ? __pfx_kthread+0x10/0x10 [ 14.733270] ret_from_fork_asm+0x1a/0x30 [ 14.733303] </TASK> [ 14.733313] [ 14.740708] Allocated by task 283: [ 14.740864] kasan_save_stack+0x45/0x70 [ 14.741042] kasan_save_track+0x18/0x40 [ 14.741215] kasan_save_alloc_info+0x3b/0x50 [ 14.741402] __kasan_kmalloc+0xb7/0xc0 [ 14.742161] __kmalloc_cache_noprof+0x189/0x420 [ 14.742582] kasan_atomics+0x95/0x310 [ 14.742916] kunit_try_run_case+0x1a5/0x480 [ 14.743341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.743626] kthread+0x337/0x6f0 [ 14.743973] ret_from_fork+0x116/0x1d0 [ 14.744398] ret_from_fork_asm+0x1a/0x30 [ 14.744558] [ 14.744632] The buggy address belongs to the object at ffff8881026f3680 [ 14.744632] which belongs to the cache kmalloc-64 of size 64 [ 14.744989] The buggy address is located 0 bytes to the right of [ 14.744989] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.745617] [ 14.745781] The buggy address belongs to the physical page: [ 14.746241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.746924] flags: 0x200000000000000(node=0|zone=2) [ 14.747394] page_type: f5(slab) [ 14.747814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.748653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.749509] page dumped because: kasan: bad access detected [ 14.749997] [ 14.750192] Memory state around the buggy address: [ 14.750536] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.750885] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.751104] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.751317] ^ [ 14.751571] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.752267] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.752754] ================================================================== [ 15.385325] ================================================================== [ 15.385981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.386285] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.386630] [ 15.386814] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.386874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.386887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.386923] Call Trace: [ 15.386950] <TASK> [ 15.387193] dump_stack_lvl+0x73/0xb0 [ 15.387228] print_report+0xd1/0x610 [ 15.387252] ? __virt_addr_valid+0x1db/0x2d0 [ 15.387274] ? kasan_atomics_helper+0x177f/0x5450 [ 15.387296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.387319] ? kasan_atomics_helper+0x177f/0x5450 [ 15.387342] kasan_report+0x141/0x180 [ 15.387365] ? kasan_atomics_helper+0x177f/0x5450 [ 15.387394] kasan_check_range+0x10c/0x1c0 [ 15.387418] __kasan_check_write+0x18/0x20 [ 15.387450] kasan_atomics_helper+0x177f/0x5450 [ 15.387474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.387497] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.387523] ? kasan_atomics+0x152/0x310 [ 15.387675] kasan_atomics+0x1dc/0x310 [ 15.387698] ? __pfx_kasan_atomics+0x10/0x10 [ 15.387724] ? __pfx_read_tsc+0x10/0x10 [ 15.387745] ? ktime_get_ts64+0x86/0x230 [ 15.387771] kunit_try_run_case+0x1a5/0x480 [ 15.387795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.387818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.387842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.387866] ? __kthread_parkme+0x82/0x180 [ 15.387887] ? preempt_count_sub+0x50/0x80 [ 15.387912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.387937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.387961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.387987] kthread+0x337/0x6f0 [ 15.388006] ? trace_preempt_on+0x20/0xc0 [ 15.388029] ? __pfx_kthread+0x10/0x10 [ 15.388051] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.388073] ? calculate_sigpending+0x7b/0xa0 [ 15.388098] ? __pfx_kthread+0x10/0x10 [ 15.388120] ret_from_fork+0x116/0x1d0 [ 15.388140] ? __pfx_kthread+0x10/0x10 [ 15.388160] ret_from_fork_asm+0x1a/0x30 [ 15.388193] </TASK> [ 15.388204] [ 15.397974] Allocated by task 283: [ 15.398257] kasan_save_stack+0x45/0x70 [ 15.398467] kasan_save_track+0x18/0x40 [ 15.398643] kasan_save_alloc_info+0x3b/0x50 [ 15.398995] __kasan_kmalloc+0xb7/0xc0 [ 15.399246] __kmalloc_cache_noprof+0x189/0x420 [ 15.399516] kasan_atomics+0x95/0x310 [ 15.399729] kunit_try_run_case+0x1a5/0x480 [ 15.399988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.400210] kthread+0x337/0x6f0 [ 15.400352] ret_from_fork+0x116/0x1d0 [ 15.400526] ret_from_fork_asm+0x1a/0x30 [ 15.400961] [ 15.401036] The buggy address belongs to the object at ffff8881026f3680 [ 15.401036] which belongs to the cache kmalloc-64 of size 64 [ 15.401701] The buggy address is located 0 bytes to the right of [ 15.401701] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.402262] [ 15.402450] The buggy address belongs to the physical page: [ 15.402753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.403138] flags: 0x200000000000000(node=0|zone=2) [ 15.403343] page_type: f5(slab) [ 15.403641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.403935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.404235] page dumped because: kasan: bad access detected [ 15.404474] [ 15.404552] Memory state around the buggy address: [ 15.405023] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.405407] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.405728] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.406172] ^ [ 15.406460] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.406782] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.407226] ================================================================== [ 15.490119] ================================================================== [ 15.490497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.490728] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.491245] [ 15.491348] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.491391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.491403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.491425] Call Trace: [ 15.491472] <TASK> [ 15.491491] dump_stack_lvl+0x73/0xb0 [ 15.491519] print_report+0xd1/0x610 [ 15.491549] ? __virt_addr_valid+0x1db/0x2d0 [ 15.491574] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.491595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.491619] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.491642] kasan_report+0x141/0x180 [ 15.491683] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.491712] kasan_check_range+0x10c/0x1c0 [ 15.491737] __kasan_check_write+0x18/0x20 [ 15.491757] kasan_atomics_helper+0x1a7f/0x5450 [ 15.491812] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.491834] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.491860] ? kasan_atomics+0x152/0x310 [ 15.491887] kasan_atomics+0x1dc/0x310 [ 15.491910] ? __pfx_kasan_atomics+0x10/0x10 [ 15.491934] ? __pfx_read_tsc+0x10/0x10 [ 15.491957] ? ktime_get_ts64+0x86/0x230 [ 15.491983] kunit_try_run_case+0x1a5/0x480 [ 15.492009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.492033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.492057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.492082] ? __kthread_parkme+0x82/0x180 [ 15.492102] ? preempt_count_sub+0x50/0x80 [ 15.492129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.492154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.492178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.492205] kthread+0x337/0x6f0 [ 15.492242] ? trace_preempt_on+0x20/0xc0 [ 15.492267] ? __pfx_kthread+0x10/0x10 [ 15.492287] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.492310] ? calculate_sigpending+0x7b/0xa0 [ 15.492335] ? __pfx_kthread+0x10/0x10 [ 15.492357] ret_from_fork+0x116/0x1d0 [ 15.492376] ? __pfx_kthread+0x10/0x10 [ 15.492396] ret_from_fork_asm+0x1a/0x30 [ 15.492465] </TASK> [ 15.492475] [ 15.500144] Allocated by task 283: [ 15.500354] kasan_save_stack+0x45/0x70 [ 15.500580] kasan_save_track+0x18/0x40 [ 15.500775] kasan_save_alloc_info+0x3b/0x50 [ 15.500999] __kasan_kmalloc+0xb7/0xc0 [ 15.501187] __kmalloc_cache_noprof+0x189/0x420 [ 15.501408] kasan_atomics+0x95/0x310 [ 15.501610] kunit_try_run_case+0x1a5/0x480 [ 15.501817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.502316] kthread+0x337/0x6f0 [ 15.502446] ret_from_fork+0x116/0x1d0 [ 15.502693] ret_from_fork_asm+0x1a/0x30 [ 15.502888] [ 15.502972] The buggy address belongs to the object at ffff8881026f3680 [ 15.502972] which belongs to the cache kmalloc-64 of size 64 [ 15.503472] The buggy address is located 0 bytes to the right of [ 15.503472] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.503879] [ 15.503950] The buggy address belongs to the physical page: [ 15.504119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.504475] flags: 0x200000000000000(node=0|zone=2) [ 15.505004] page_type: f5(slab) [ 15.505180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.505534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.505772] page dumped because: kasan: bad access detected [ 15.505939] [ 15.506007] Memory state around the buggy address: [ 15.506158] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.506370] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.506590] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.506796] ^ [ 15.506945] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.507425] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.508044] ================================================================== [ 15.142957] ================================================================== [ 15.143293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.143736] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.143990] [ 15.144074] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.144116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.144128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.144149] Call Trace: [ 15.144163] <TASK> [ 15.144177] dump_stack_lvl+0x73/0xb0 [ 15.144204] print_report+0xd1/0x610 [ 15.144227] ? __virt_addr_valid+0x1db/0x2d0 [ 15.144250] ? kasan_atomics_helper+0x1217/0x5450 [ 15.144272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.144296] ? kasan_atomics_helper+0x1217/0x5450 [ 15.144318] kasan_report+0x141/0x180 [ 15.144341] ? kasan_atomics_helper+0x1217/0x5450 [ 15.144370] kasan_check_range+0x10c/0x1c0 [ 15.144395] __kasan_check_write+0x18/0x20 [ 15.144414] kasan_atomics_helper+0x1217/0x5450 [ 15.144451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.144474] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.144499] ? kasan_atomics+0x152/0x310 [ 15.144527] kasan_atomics+0x1dc/0x310 [ 15.144558] ? __pfx_kasan_atomics+0x10/0x10 [ 15.144583] ? __pfx_read_tsc+0x10/0x10 [ 15.144604] ? ktime_get_ts64+0x86/0x230 [ 15.144629] kunit_try_run_case+0x1a5/0x480 [ 15.144653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.144676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.144700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.144725] ? __kthread_parkme+0x82/0x180 [ 15.144745] ? preempt_count_sub+0x50/0x80 [ 15.144770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.144795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.144820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.144846] kthread+0x337/0x6f0 [ 15.144867] ? trace_preempt_on+0x20/0xc0 [ 15.144894] ? __pfx_kthread+0x10/0x10 [ 15.144917] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.144939] ? calculate_sigpending+0x7b/0xa0 [ 15.144963] ? __pfx_kthread+0x10/0x10 [ 15.144986] ret_from_fork+0x116/0x1d0 [ 15.145005] ? __pfx_kthread+0x10/0x10 [ 15.145026] ret_from_fork_asm+0x1a/0x30 [ 15.145059] </TASK> [ 15.145070] [ 15.152382] Allocated by task 283: [ 15.152553] kasan_save_stack+0x45/0x70 [ 15.152863] kasan_save_track+0x18/0x40 [ 15.153057] kasan_save_alloc_info+0x3b/0x50 [ 15.153271] __kasan_kmalloc+0xb7/0xc0 [ 15.153473] __kmalloc_cache_noprof+0x189/0x420 [ 15.153914] kasan_atomics+0x95/0x310 [ 15.154107] kunit_try_run_case+0x1a5/0x480 [ 15.154312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.154622] kthread+0x337/0x6f0 [ 15.154793] ret_from_fork+0x116/0x1d0 [ 15.154980] ret_from_fork_asm+0x1a/0x30 [ 15.155122] [ 15.155192] The buggy address belongs to the object at ffff8881026f3680 [ 15.155192] which belongs to the cache kmalloc-64 of size 64 [ 15.155672] The buggy address is located 0 bytes to the right of [ 15.155672] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.156168] [ 15.156258] The buggy address belongs to the physical page: [ 15.156488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.156931] flags: 0x200000000000000(node=0|zone=2) [ 15.157136] page_type: f5(slab) [ 15.157298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.157693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.157976] page dumped because: kasan: bad access detected [ 15.158228] [ 15.158308] Memory state around the buggy address: [ 15.158510] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.158732] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.158950] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.159166] ^ [ 15.159322] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.159599] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160278] ================================================================== [ 15.578987] ================================================================== [ 15.579319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.579748] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.580134] [ 15.580255] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.580300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.580313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.580335] Call Trace: [ 15.580350] <TASK> [ 15.580364] dump_stack_lvl+0x73/0xb0 [ 15.580420] print_report+0xd1/0x610 [ 15.580454] ? __virt_addr_valid+0x1db/0x2d0 [ 15.580478] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.580500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.580524] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.580558] kasan_report+0x141/0x180 [ 15.580613] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.580642] kasan_check_range+0x10c/0x1c0 [ 15.580667] __kasan_check_write+0x18/0x20 [ 15.580689] kasan_atomics_helper+0x1ce1/0x5450 [ 15.580713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.580736] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.580792] ? kasan_atomics+0x152/0x310 [ 15.580820] kasan_atomics+0x1dc/0x310 [ 15.580843] ? __pfx_kasan_atomics+0x10/0x10 [ 15.580868] ? __pfx_read_tsc+0x10/0x10 [ 15.580889] ? ktime_get_ts64+0x86/0x230 [ 15.580944] kunit_try_run_case+0x1a5/0x480 [ 15.580970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.580993] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.581018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.581043] ? __kthread_parkme+0x82/0x180 [ 15.581063] ? preempt_count_sub+0x50/0x80 [ 15.581088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.581112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.581142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.581168] kthread+0x337/0x6f0 [ 15.581187] ? trace_preempt_on+0x20/0xc0 [ 15.581236] ? __pfx_kthread+0x10/0x10 [ 15.581281] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.581327] ? calculate_sigpending+0x7b/0xa0 [ 15.581375] ? __pfx_kthread+0x10/0x10 [ 15.581455] ret_from_fork+0x116/0x1d0 [ 15.581499] ? __pfx_kthread+0x10/0x10 [ 15.581538] ret_from_fork_asm+0x1a/0x30 [ 15.581572] </TASK> [ 15.581582] [ 15.589712] Allocated by task 283: [ 15.589919] kasan_save_stack+0x45/0x70 [ 15.590090] kasan_save_track+0x18/0x40 [ 15.590279] kasan_save_alloc_info+0x3b/0x50 [ 15.590534] __kasan_kmalloc+0xb7/0xc0 [ 15.590763] __kmalloc_cache_noprof+0x189/0x420 [ 15.591191] kasan_atomics+0x95/0x310 [ 15.591410] kunit_try_run_case+0x1a5/0x480 [ 15.591625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.591870] kthread+0x337/0x6f0 [ 15.592034] ret_from_fork+0x116/0x1d0 [ 15.592216] ret_from_fork_asm+0x1a/0x30 [ 15.592410] [ 15.592601] The buggy address belongs to the object at ffff8881026f3680 [ 15.592601] which belongs to the cache kmalloc-64 of size 64 [ 15.593189] The buggy address is located 0 bytes to the right of [ 15.593189] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.593966] [ 15.594042] The buggy address belongs to the physical page: [ 15.594218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.594538] flags: 0x200000000000000(node=0|zone=2) [ 15.594787] page_type: f5(slab) [ 15.594993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.595372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.595961] page dumped because: kasan: bad access detected [ 15.596238] [ 15.596324] Memory state around the buggy address: [ 15.596512] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.596847] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.597182] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.597518] ^ [ 15.597772] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.598089] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.598408] ================================================================== [ 14.490146] ================================================================== [ 14.490632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.491276] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.491658] [ 14.491898] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.491997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.492008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.492029] Call Trace: [ 14.492045] <TASK> [ 14.492062] dump_stack_lvl+0x73/0xb0 [ 14.492088] print_report+0xd1/0x610 [ 14.492110] ? __virt_addr_valid+0x1db/0x2d0 [ 14.492132] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.492152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.492175] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.492196] kasan_report+0x141/0x180 [ 14.492218] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.492245] __asan_report_store4_noabort+0x1b/0x30 [ 14.492270] kasan_atomics_helper+0x4ba2/0x5450 [ 14.492293] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.492315] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.492340] ? kasan_atomics+0x152/0x310 [ 14.492366] kasan_atomics+0x1dc/0x310 [ 14.492388] ? __pfx_kasan_atomics+0x10/0x10 [ 14.492412] ? __pfx_read_tsc+0x10/0x10 [ 14.492432] ? ktime_get_ts64+0x86/0x230 [ 14.492467] kunit_try_run_case+0x1a5/0x480 [ 14.492492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.492515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.492539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.492562] ? __kthread_parkme+0x82/0x180 [ 14.492582] ? preempt_count_sub+0x50/0x80 [ 14.492617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.492642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.492667] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.492691] kthread+0x337/0x6f0 [ 14.492709] ? trace_preempt_on+0x20/0xc0 [ 14.492743] ? __pfx_kthread+0x10/0x10 [ 14.492774] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.492805] ? calculate_sigpending+0x7b/0xa0 [ 14.492830] ? __pfx_kthread+0x10/0x10 [ 14.492851] ret_from_fork+0x116/0x1d0 [ 14.492869] ? __pfx_kthread+0x10/0x10 [ 14.492888] ret_from_fork_asm+0x1a/0x30 [ 14.492920] </TASK> [ 14.492930] [ 14.508969] Allocated by task 283: [ 14.509343] kasan_save_stack+0x45/0x70 [ 14.509858] kasan_save_track+0x18/0x40 [ 14.510069] kasan_save_alloc_info+0x3b/0x50 [ 14.510219] __kasan_kmalloc+0xb7/0xc0 [ 14.510348] __kmalloc_cache_noprof+0x189/0x420 [ 14.510931] kasan_atomics+0x95/0x310 [ 14.511282] kunit_try_run_case+0x1a5/0x480 [ 14.511725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.512347] kthread+0x337/0x6f0 [ 14.512715] ret_from_fork+0x116/0x1d0 [ 14.513104] ret_from_fork_asm+0x1a/0x30 [ 14.513323] [ 14.513392] The buggy address belongs to the object at ffff8881026f3680 [ 14.513392] which belongs to the cache kmalloc-64 of size 64 [ 14.514373] The buggy address is located 0 bytes to the right of [ 14.514373] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.515693] [ 14.515870] The buggy address belongs to the physical page: [ 14.516146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.516380] flags: 0x200000000000000(node=0|zone=2) [ 14.516949] page_type: f5(slab) [ 14.517263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.518046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.518751] page dumped because: kasan: bad access detected [ 14.518921] [ 14.518988] Memory state around the buggy address: [ 14.519138] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.519344] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.519917] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.520800] ^ [ 14.521215] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.521955] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.522779] ================================================================== [ 15.094886] ================================================================== [ 15.095807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.096121] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.096359] [ 15.096480] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.096523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.096536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.096558] Call Trace: [ 15.096573] <TASK> [ 15.096590] dump_stack_lvl+0x73/0xb0 [ 15.096618] print_report+0xd1/0x610 [ 15.096641] ? __virt_addr_valid+0x1db/0x2d0 [ 15.096664] ? kasan_atomics_helper+0x1148/0x5450 [ 15.096685] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.096708] ? kasan_atomics_helper+0x1148/0x5450 [ 15.096730] kasan_report+0x141/0x180 [ 15.096753] ? kasan_atomics_helper+0x1148/0x5450 [ 15.096781] kasan_check_range+0x10c/0x1c0 [ 15.096806] __kasan_check_write+0x18/0x20 [ 15.096825] kasan_atomics_helper+0x1148/0x5450 [ 15.096849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.096872] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.096897] ? kasan_atomics+0x152/0x310 [ 15.096925] kasan_atomics+0x1dc/0x310 [ 15.096948] ? __pfx_kasan_atomics+0x10/0x10 [ 15.096973] ? __pfx_read_tsc+0x10/0x10 [ 15.096994] ? ktime_get_ts64+0x86/0x230 [ 15.097020] kunit_try_run_case+0x1a5/0x480 [ 15.097044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.097067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.097092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.097116] ? __kthread_parkme+0x82/0x180 [ 15.097143] ? preempt_count_sub+0x50/0x80 [ 15.097167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.097192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.097216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.097241] kthread+0x337/0x6f0 [ 15.097260] ? trace_preempt_on+0x20/0xc0 [ 15.097283] ? __pfx_kthread+0x10/0x10 [ 15.097305] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.097326] ? calculate_sigpending+0x7b/0xa0 [ 15.097351] ? __pfx_kthread+0x10/0x10 [ 15.097373] ret_from_fork+0x116/0x1d0 [ 15.097392] ? __pfx_kthread+0x10/0x10 [ 15.097412] ret_from_fork_asm+0x1a/0x30 [ 15.097455] </TASK> [ 15.097465] [ 15.111303] Allocated by task 283: [ 15.111451] kasan_save_stack+0x45/0x70 [ 15.111620] kasan_save_track+0x18/0x40 [ 15.111760] kasan_save_alloc_info+0x3b/0x50 [ 15.111911] __kasan_kmalloc+0xb7/0xc0 [ 15.112045] __kmalloc_cache_noprof+0x189/0x420 [ 15.112205] kasan_atomics+0x95/0x310 [ 15.112340] kunit_try_run_case+0x1a5/0x480 [ 15.112499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.112967] kthread+0x337/0x6f0 [ 15.113268] ret_from_fork+0x116/0x1d0 [ 15.113607] ret_from_fork_asm+0x1a/0x30 [ 15.113970] [ 15.114130] The buggy address belongs to the object at ffff8881026f3680 [ 15.114130] which belongs to the cache kmalloc-64 of size 64 [ 15.115191] The buggy address is located 0 bytes to the right of [ 15.115191] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.116384] [ 15.116567] The buggy address belongs to the physical page: [ 15.117030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.117822] flags: 0x200000000000000(node=0|zone=2) [ 15.118267] page_type: f5(slab) [ 15.118433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.118803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.119445] page dumped because: kasan: bad access detected [ 15.119953] [ 15.120107] Memory state around the buggy address: [ 15.120530] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.120845] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.121065] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.121292] ^ [ 15.121457] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.121767] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122031] ================================================================== [ 14.713174] ================================================================== [ 14.713412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.713683] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.714016] [ 14.714123] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.714163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.714175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.714197] Call Trace: [ 14.714211] <TASK> [ 14.714226] dump_stack_lvl+0x73/0xb0 [ 14.714251] print_report+0xd1/0x610 [ 14.714273] ? __virt_addr_valid+0x1db/0x2d0 [ 14.714296] ? kasan_atomics_helper+0x72f/0x5450 [ 14.714318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.714340] ? kasan_atomics_helper+0x72f/0x5450 [ 14.714362] kasan_report+0x141/0x180 [ 14.714384] ? kasan_atomics_helper+0x72f/0x5450 [ 14.714412] kasan_check_range+0x10c/0x1c0 [ 14.714446] __kasan_check_write+0x18/0x20 [ 14.714465] kasan_atomics_helper+0x72f/0x5450 [ 14.714488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.714511] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.714536] ? kasan_atomics+0x152/0x310 [ 14.714562] kasan_atomics+0x1dc/0x310 [ 14.714584] ? __pfx_kasan_atomics+0x10/0x10 [ 14.714608] ? __pfx_read_tsc+0x10/0x10 [ 14.714628] ? ktime_get_ts64+0x86/0x230 [ 14.714651] kunit_try_run_case+0x1a5/0x480 [ 14.714675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.714697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.714720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.714743] ? __kthread_parkme+0x82/0x180 [ 14.714762] ? preempt_count_sub+0x50/0x80 [ 14.714786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.714810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.714833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.714856] kthread+0x337/0x6f0 [ 14.714876] ? trace_preempt_on+0x20/0xc0 [ 14.714898] ? __pfx_kthread+0x10/0x10 [ 14.714919] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.714940] ? calculate_sigpending+0x7b/0xa0 [ 14.714963] ? __pfx_kthread+0x10/0x10 [ 14.714985] ret_from_fork+0x116/0x1d0 [ 14.715003] ? __pfx_kthread+0x10/0x10 [ 14.715023] ret_from_fork_asm+0x1a/0x30 [ 14.715073] </TASK> [ 14.715082] [ 14.723546] Allocated by task 283: [ 14.723716] kasan_save_stack+0x45/0x70 [ 14.723892] kasan_save_track+0x18/0x40 [ 14.724061] kasan_save_alloc_info+0x3b/0x50 [ 14.724215] __kasan_kmalloc+0xb7/0xc0 [ 14.724348] __kmalloc_cache_noprof+0x189/0x420 [ 14.724514] kasan_atomics+0x95/0x310 [ 14.724648] kunit_try_run_case+0x1a5/0x480 [ 14.724796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.725010] kthread+0x337/0x6f0 [ 14.725183] ret_from_fork+0x116/0x1d0 [ 14.725367] ret_from_fork_asm+0x1a/0x30 [ 14.725582] [ 14.725681] The buggy address belongs to the object at ffff8881026f3680 [ 14.725681] which belongs to the cache kmalloc-64 of size 64 [ 14.726460] The buggy address is located 0 bytes to the right of [ 14.726460] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.726981] [ 14.727076] The buggy address belongs to the physical page: [ 14.727280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.727688] flags: 0x200000000000000(node=0|zone=2) [ 14.727901] page_type: f5(slab) [ 14.728055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.728288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.728524] page dumped because: kasan: bad access detected [ 14.728695] [ 14.728765] Memory state around the buggy address: [ 14.728920] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.729141] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.729360] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.729657] ^ [ 14.730001] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730315] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730636] ================================================================== [ 14.836311] ================================================================== [ 14.836757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.837192] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.837503] [ 14.837703] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.837765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.837778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.837800] Call Trace: [ 14.837816] <TASK> [ 14.837832] dump_stack_lvl+0x73/0xb0 [ 14.837860] print_report+0xd1/0x610 [ 14.837883] ? __virt_addr_valid+0x1db/0x2d0 [ 14.837907] ? kasan_atomics_helper+0xac7/0x5450 [ 14.837961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.837986] ? kasan_atomics_helper+0xac7/0x5450 [ 14.838009] kasan_report+0x141/0x180 [ 14.838047] ? kasan_atomics_helper+0xac7/0x5450 [ 14.838075] kasan_check_range+0x10c/0x1c0 [ 14.838126] __kasan_check_write+0x18/0x20 [ 14.838146] kasan_atomics_helper+0xac7/0x5450 [ 14.838170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.838205] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.838231] ? kasan_atomics+0x152/0x310 [ 14.838284] kasan_atomics+0x1dc/0x310 [ 14.838308] ? __pfx_kasan_atomics+0x10/0x10 [ 14.838332] ? __pfx_read_tsc+0x10/0x10 [ 14.838365] ? ktime_get_ts64+0x86/0x230 [ 14.838426] kunit_try_run_case+0x1a5/0x480 [ 14.838463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.838486] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.838538] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.838581] ? __kthread_parkme+0x82/0x180 [ 14.838611] ? preempt_count_sub+0x50/0x80 [ 14.838635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.838670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.838696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.838721] kthread+0x337/0x6f0 [ 14.838757] ? trace_preempt_on+0x20/0xc0 [ 14.838790] ? __pfx_kthread+0x10/0x10 [ 14.838811] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.838834] ? calculate_sigpending+0x7b/0xa0 [ 14.838869] ? __pfx_kthread+0x10/0x10 [ 14.838891] ret_from_fork+0x116/0x1d0 [ 14.838936] ? __pfx_kthread+0x10/0x10 [ 14.838958] ret_from_fork_asm+0x1a/0x30 [ 14.839001] </TASK> [ 14.839011] [ 14.847432] Allocated by task 283: [ 14.847673] kasan_save_stack+0x45/0x70 [ 14.847912] kasan_save_track+0x18/0x40 [ 14.848123] kasan_save_alloc_info+0x3b/0x50 [ 14.848340] __kasan_kmalloc+0xb7/0xc0 [ 14.848562] __kmalloc_cache_noprof+0x189/0x420 [ 14.848787] kasan_atomics+0x95/0x310 [ 14.848972] kunit_try_run_case+0x1a5/0x480 [ 14.849173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.849428] kthread+0x337/0x6f0 [ 14.849661] ret_from_fork+0x116/0x1d0 [ 14.849844] ret_from_fork_asm+0x1a/0x30 [ 14.850078] [ 14.850192] The buggy address belongs to the object at ffff8881026f3680 [ 14.850192] which belongs to the cache kmalloc-64 of size 64 [ 14.850793] The buggy address is located 0 bytes to the right of [ 14.850793] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.851391] [ 14.851509] The buggy address belongs to the physical page: [ 14.851807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.852192] flags: 0x200000000000000(node=0|zone=2) [ 14.852429] page_type: f5(slab) [ 14.852674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.853105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.853470] page dumped because: kasan: bad access detected [ 14.853753] [ 14.853846] Memory state around the buggy address: [ 14.854067] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.854386] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.854738] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.854956] ^ [ 14.855113] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855477] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855826] ================================================================== [ 15.535656] ================================================================== [ 15.535978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.536371] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.536838] [ 15.536970] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.537015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.537028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.537050] Call Trace: [ 15.537066] <TASK> [ 15.537085] dump_stack_lvl+0x73/0xb0 [ 15.537113] print_report+0xd1/0x610 [ 15.537206] ? __virt_addr_valid+0x1db/0x2d0 [ 15.537244] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.537266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.537291] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.537314] kasan_report+0x141/0x180 [ 15.537337] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.537366] kasan_check_range+0x10c/0x1c0 [ 15.537390] __kasan_check_write+0x18/0x20 [ 15.537410] kasan_atomics_helper+0x1c18/0x5450 [ 15.537443] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.537467] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.537493] ? kasan_atomics+0x152/0x310 [ 15.537520] kasan_atomics+0x1dc/0x310 [ 15.537562] ? __pfx_kasan_atomics+0x10/0x10 [ 15.537588] ? __pfx_read_tsc+0x10/0x10 [ 15.537609] ? ktime_get_ts64+0x86/0x230 [ 15.537635] kunit_try_run_case+0x1a5/0x480 [ 15.537660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.537682] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.537707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.537732] ? __kthread_parkme+0x82/0x180 [ 15.537753] ? preempt_count_sub+0x50/0x80 [ 15.537777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.537802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.537827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.537852] kthread+0x337/0x6f0 [ 15.537871] ? trace_preempt_on+0x20/0xc0 [ 15.537894] ? __pfx_kthread+0x10/0x10 [ 15.537915] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.537937] ? calculate_sigpending+0x7b/0xa0 [ 15.537962] ? __pfx_kthread+0x10/0x10 [ 15.537984] ret_from_fork+0x116/0x1d0 [ 15.538002] ? __pfx_kthread+0x10/0x10 [ 15.538023] ret_from_fork_asm+0x1a/0x30 [ 15.538056] </TASK> [ 15.538067] [ 15.548317] Allocated by task 283: [ 15.548792] kasan_save_stack+0x45/0x70 [ 15.549071] kasan_save_track+0x18/0x40 [ 15.549350] kasan_save_alloc_info+0x3b/0x50 [ 15.549733] __kasan_kmalloc+0xb7/0xc0 [ 15.549960] __kmalloc_cache_noprof+0x189/0x420 [ 15.550283] kasan_atomics+0x95/0x310 [ 15.550491] kunit_try_run_case+0x1a5/0x480 [ 15.550918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.551267] kthread+0x337/0x6f0 [ 15.551553] ret_from_fork+0x116/0x1d0 [ 15.551715] ret_from_fork_asm+0x1a/0x30 [ 15.552056] [ 15.552179] The buggy address belongs to the object at ffff8881026f3680 [ 15.552179] which belongs to the cache kmalloc-64 of size 64 [ 15.552856] The buggy address is located 0 bytes to the right of [ 15.552856] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.553576] [ 15.553685] The buggy address belongs to the physical page: [ 15.554002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.554354] flags: 0x200000000000000(node=0|zone=2) [ 15.554831] page_type: f5(slab) [ 15.554995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.555355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.555835] page dumped because: kasan: bad access detected [ 15.556117] [ 15.556221] Memory state around the buggy address: [ 15.556462] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.557064] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.557378] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.557850] ^ [ 15.558156] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.558597] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.558982] ================================================================== [ 14.988775] ================================================================== [ 14.989187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.989565] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.989934] [ 14.990017] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.990057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.990069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.990089] Call Trace: [ 14.990100] <TASK> [ 14.990114] dump_stack_lvl+0x73/0xb0 [ 14.990141] print_report+0xd1/0x610 [ 14.990163] ? __virt_addr_valid+0x1db/0x2d0 [ 14.990186] ? kasan_atomics_helper+0xf10/0x5450 [ 14.990207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.990231] ? kasan_atomics_helper+0xf10/0x5450 [ 14.990254] kasan_report+0x141/0x180 [ 14.990277] ? kasan_atomics_helper+0xf10/0x5450 [ 14.990304] kasan_check_range+0x10c/0x1c0 [ 14.990329] __kasan_check_write+0x18/0x20 [ 14.990349] kasan_atomics_helper+0xf10/0x5450 [ 14.990372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.990397] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.990424] ? kasan_atomics+0x152/0x310 [ 14.990464] kasan_atomics+0x1dc/0x310 [ 14.990488] ? __pfx_kasan_atomics+0x10/0x10 [ 14.990513] ? __pfx_read_tsc+0x10/0x10 [ 14.990533] ? ktime_get_ts64+0x86/0x230 [ 14.990558] kunit_try_run_case+0x1a5/0x480 [ 14.990584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.990607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.990632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.990658] ? __kthread_parkme+0x82/0x180 [ 14.990678] ? preempt_count_sub+0x50/0x80 [ 14.990703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.990728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.990753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.990779] kthread+0x337/0x6f0 [ 14.990798] ? trace_preempt_on+0x20/0xc0 [ 14.990821] ? __pfx_kthread+0x10/0x10 [ 14.990843] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.990865] ? calculate_sigpending+0x7b/0xa0 [ 14.990890] ? __pfx_kthread+0x10/0x10 [ 14.990912] ret_from_fork+0x116/0x1d0 [ 14.990931] ? __pfx_kthread+0x10/0x10 [ 14.990952] ret_from_fork_asm+0x1a/0x30 [ 14.990985] </TASK> [ 14.990995] [ 14.998616] Allocated by task 283: [ 14.998760] kasan_save_stack+0x45/0x70 [ 14.998908] kasan_save_track+0x18/0x40 [ 14.999044] kasan_save_alloc_info+0x3b/0x50 [ 14.999193] __kasan_kmalloc+0xb7/0xc0 [ 14.999324] __kmalloc_cache_noprof+0x189/0x420 [ 14.999508] kasan_atomics+0x95/0x310 [ 14.999734] kunit_try_run_case+0x1a5/0x480 [ 14.999940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.000190] kthread+0x337/0x6f0 [ 15.000355] ret_from_fork+0x116/0x1d0 [ 15.000571] ret_from_fork_asm+0x1a/0x30 [ 15.000767] [ 15.000861] The buggy address belongs to the object at ffff8881026f3680 [ 15.000861] which belongs to the cache kmalloc-64 of size 64 [ 15.001332] The buggy address is located 0 bytes to the right of [ 15.001332] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.001728] [ 15.001826] The buggy address belongs to the physical page: [ 15.002108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.002486] flags: 0x200000000000000(node=0|zone=2) [ 15.002742] page_type: f5(slab) [ 15.002938] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.003279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.003634] page dumped because: kasan: bad access detected [ 15.003873] [ 15.003959] Memory state around the buggy address: [ 15.004173] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.004462] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.004758] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.004971] ^ [ 15.005131] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.005471] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.005815] ================================================================== [ 14.753900] ================================================================== [ 14.754593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.755261] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.755916] [ 14.756107] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.756153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.756166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.756189] Call Trace: [ 14.756205] <TASK> [ 14.756222] dump_stack_lvl+0x73/0xb0 [ 14.756250] print_report+0xd1/0x610 [ 14.756273] ? __virt_addr_valid+0x1db/0x2d0 [ 14.756313] ? kasan_atomics_helper+0x860/0x5450 [ 14.756335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.756359] ? kasan_atomics_helper+0x860/0x5450 [ 14.756382] kasan_report+0x141/0x180 [ 14.756405] ? kasan_atomics_helper+0x860/0x5450 [ 14.756432] kasan_check_range+0x10c/0x1c0 [ 14.756467] __kasan_check_write+0x18/0x20 [ 14.756487] kasan_atomics_helper+0x860/0x5450 [ 14.756511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.756553] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.756578] ? kasan_atomics+0x152/0x310 [ 14.756606] kasan_atomics+0x1dc/0x310 [ 14.756629] ? __pfx_kasan_atomics+0x10/0x10 [ 14.756654] ? __pfx_read_tsc+0x10/0x10 [ 14.756676] ? ktime_get_ts64+0x86/0x230 [ 14.756701] kunit_try_run_case+0x1a5/0x480 [ 14.756726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.756751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.756776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.756800] ? __kthread_parkme+0x82/0x180 [ 14.756820] ? preempt_count_sub+0x50/0x80 [ 14.756845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.756870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.756894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.756919] kthread+0x337/0x6f0 [ 14.756938] ? trace_preempt_on+0x20/0xc0 [ 14.756961] ? __pfx_kthread+0x10/0x10 [ 14.756982] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.757004] ? calculate_sigpending+0x7b/0xa0 [ 14.757029] ? __pfx_kthread+0x10/0x10 [ 14.757051] ret_from_fork+0x116/0x1d0 [ 14.757070] ? __pfx_kthread+0x10/0x10 [ 14.757091] ret_from_fork_asm+0x1a/0x30 [ 14.757124] </TASK> [ 14.757138] [ 14.767636] Allocated by task 283: [ 14.767811] kasan_save_stack+0x45/0x70 [ 14.767974] kasan_save_track+0x18/0x40 [ 14.768164] kasan_save_alloc_info+0x3b/0x50 [ 14.768373] __kasan_kmalloc+0xb7/0xc0 [ 14.768618] __kmalloc_cache_noprof+0x189/0x420 [ 14.768816] kasan_atomics+0x95/0x310 [ 14.768951] kunit_try_run_case+0x1a5/0x480 [ 14.769137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.769391] kthread+0x337/0x6f0 [ 14.769622] ret_from_fork+0x116/0x1d0 [ 14.769829] ret_from_fork_asm+0x1a/0x30 [ 14.770027] [ 14.770121] The buggy address belongs to the object at ffff8881026f3680 [ 14.770121] which belongs to the cache kmalloc-64 of size 64 [ 14.770661] The buggy address is located 0 bytes to the right of [ 14.770661] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.771171] [ 14.771262] The buggy address belongs to the physical page: [ 14.771544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.771875] flags: 0x200000000000000(node=0|zone=2) [ 14.772092] page_type: f5(slab) [ 14.772301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.773712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.774256] page dumped because: kasan: bad access detected [ 14.774450] [ 14.774524] Memory state around the buggy address: [ 14.774797] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.775351] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.775800] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.776021] ^ [ 14.776180] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.776400] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.776633] ================================================================== [ 14.966601] ================================================================== [ 14.967249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.967954] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.968409] [ 14.968506] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.968572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.968585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.968606] Call Trace: [ 14.968621] <TASK> [ 14.968647] dump_stack_lvl+0x73/0xb0 [ 14.968676] print_report+0xd1/0x610 [ 14.968699] ? __virt_addr_valid+0x1db/0x2d0 [ 14.968742] ? kasan_atomics_helper+0xe78/0x5450 [ 14.968764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.968788] ? kasan_atomics_helper+0xe78/0x5450 [ 14.968822] kasan_report+0x141/0x180 [ 14.968845] ? kasan_atomics_helper+0xe78/0x5450 [ 14.968873] kasan_check_range+0x10c/0x1c0 [ 14.968898] __kasan_check_write+0x18/0x20 [ 14.968918] kasan_atomics_helper+0xe78/0x5450 [ 14.968942] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.968965] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.968991] ? kasan_atomics+0x152/0x310 [ 14.969018] kasan_atomics+0x1dc/0x310 [ 14.969041] ? __pfx_kasan_atomics+0x10/0x10 [ 14.969066] ? __pfx_read_tsc+0x10/0x10 [ 14.969088] ? ktime_get_ts64+0x86/0x230 [ 14.969113] kunit_try_run_case+0x1a5/0x480 [ 14.969140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.969164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.969188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.969213] ? __kthread_parkme+0x82/0x180 [ 14.969233] ? preempt_count_sub+0x50/0x80 [ 14.969259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.969284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.969309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.969334] kthread+0x337/0x6f0 [ 14.969354] ? trace_preempt_on+0x20/0xc0 [ 14.969377] ? __pfx_kthread+0x10/0x10 [ 14.969398] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.969421] ? calculate_sigpending+0x7b/0xa0 [ 14.969455] ? __pfx_kthread+0x10/0x10 [ 14.969478] ret_from_fork+0x116/0x1d0 [ 14.969497] ? __pfx_kthread+0x10/0x10 [ 14.969536] ret_from_fork_asm+0x1a/0x30 [ 14.969570] </TASK> [ 14.969580] [ 14.980639] Allocated by task 283: [ 14.980826] kasan_save_stack+0x45/0x70 [ 14.980972] kasan_save_track+0x18/0x40 [ 14.981109] kasan_save_alloc_info+0x3b/0x50 [ 14.981310] __kasan_kmalloc+0xb7/0xc0 [ 14.981542] __kmalloc_cache_noprof+0x189/0x420 [ 14.981764] kasan_atomics+0x95/0x310 [ 14.981948] kunit_try_run_case+0x1a5/0x480 [ 14.982108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.982338] kthread+0x337/0x6f0 [ 14.982539] ret_from_fork+0x116/0x1d0 [ 14.982742] ret_from_fork_asm+0x1a/0x30 [ 14.982945] [ 14.983026] The buggy address belongs to the object at ffff8881026f3680 [ 14.983026] which belongs to the cache kmalloc-64 of size 64 [ 14.983583] The buggy address is located 0 bytes to the right of [ 14.983583] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.984087] [ 14.984195] The buggy address belongs to the physical page: [ 14.984432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.984765] flags: 0x200000000000000(node=0|zone=2) [ 14.984928] page_type: f5(slab) [ 14.985047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.985376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.985739] page dumped because: kasan: bad access detected [ 14.985996] [ 14.986089] Memory state around the buggy address: [ 14.986314] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.986655] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.986919] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.987135] ^ [ 14.987364] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987737] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.988050] ================================================================== [ 14.817157] ================================================================== [ 14.817625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.817954] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.818295] [ 14.818432] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.818513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.818558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.818588] Call Trace: [ 14.818601] <TASK> [ 14.818615] dump_stack_lvl+0x73/0xb0 [ 14.818655] print_report+0xd1/0x610 [ 14.818676] ? __virt_addr_valid+0x1db/0x2d0 [ 14.818700] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.818722] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.818746] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.818768] kasan_report+0x141/0x180 [ 14.818791] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.818819] kasan_check_range+0x10c/0x1c0 [ 14.818844] __kasan_check_write+0x18/0x20 [ 14.818863] kasan_atomics_helper+0xa2b/0x5450 [ 14.818887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.818910] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.818935] ? kasan_atomics+0x152/0x310 [ 14.818964] kasan_atomics+0x1dc/0x310 [ 14.818986] ? __pfx_kasan_atomics+0x10/0x10 [ 14.819011] ? __pfx_read_tsc+0x10/0x10 [ 14.819032] ? ktime_get_ts64+0x86/0x230 [ 14.819059] kunit_try_run_case+0x1a5/0x480 [ 14.819084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819107] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.819132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.819157] ? __kthread_parkme+0x82/0x180 [ 14.819178] ? preempt_count_sub+0x50/0x80 [ 14.819203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.819253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.819279] kthread+0x337/0x6f0 [ 14.819298] ? trace_preempt_on+0x20/0xc0 [ 14.819322] ? __pfx_kthread+0x10/0x10 [ 14.819343] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.819366] ? calculate_sigpending+0x7b/0xa0 [ 14.819390] ? __pfx_kthread+0x10/0x10 [ 14.819414] ret_from_fork+0x116/0x1d0 [ 14.819470] ? __pfx_kthread+0x10/0x10 [ 14.819491] ret_from_fork_asm+0x1a/0x30 [ 14.819549] </TASK> [ 14.819559] [ 14.827848] Allocated by task 283: [ 14.828015] kasan_save_stack+0x45/0x70 [ 14.828254] kasan_save_track+0x18/0x40 [ 14.828504] kasan_save_alloc_info+0x3b/0x50 [ 14.828761] __kasan_kmalloc+0xb7/0xc0 [ 14.828973] __kmalloc_cache_noprof+0x189/0x420 [ 14.829195] kasan_atomics+0x95/0x310 [ 14.829346] kunit_try_run_case+0x1a5/0x480 [ 14.829504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829820] kthread+0x337/0x6f0 [ 14.830046] ret_from_fork+0x116/0x1d0 [ 14.830247] ret_from_fork_asm+0x1a/0x30 [ 14.830464] [ 14.830591] The buggy address belongs to the object at ffff8881026f3680 [ 14.830591] which belongs to the cache kmalloc-64 of size 64 [ 14.831138] The buggy address is located 0 bytes to the right of [ 14.831138] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.831716] [ 14.831793] The buggy address belongs to the physical page: [ 14.831968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.832237] flags: 0x200000000000000(node=0|zone=2) [ 14.832481] page_type: f5(slab) [ 14.832713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.833134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.833504] page dumped because: kasan: bad access detected [ 14.833750] [ 14.833820] Memory state around the buggy address: [ 14.833971] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.834265] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.834594] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.834901] ^ [ 14.835119] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.835489] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.835821] ================================================================== [ 15.471369] ================================================================== [ 15.471996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.472326] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.472727] [ 15.472812] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.472856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.472868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.472891] Call Trace: [ 15.472906] <TASK> [ 15.472921] dump_stack_lvl+0x73/0xb0 [ 15.472947] print_report+0xd1/0x610 [ 15.472969] ? __virt_addr_valid+0x1db/0x2d0 [ 15.472992] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.473015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.473040] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.473063] kasan_report+0x141/0x180 [ 15.473086] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.473114] kasan_check_range+0x10c/0x1c0 [ 15.473145] __kasan_check_write+0x18/0x20 [ 15.473174] kasan_atomics_helper+0x19e3/0x5450 [ 15.473198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.473221] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.473246] ? kasan_atomics+0x152/0x310 [ 15.473275] kasan_atomics+0x1dc/0x310 [ 15.473298] ? __pfx_kasan_atomics+0x10/0x10 [ 15.473323] ? __pfx_read_tsc+0x10/0x10 [ 15.473343] ? ktime_get_ts64+0x86/0x230 [ 15.473380] kunit_try_run_case+0x1a5/0x480 [ 15.473405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473429] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.473462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.473488] ? __kthread_parkme+0x82/0x180 [ 15.473508] ? preempt_count_sub+0x50/0x80 [ 15.473532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.473582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.473607] kthread+0x337/0x6f0 [ 15.473652] ? trace_preempt_on+0x20/0xc0 [ 15.473677] ? __pfx_kthread+0x10/0x10 [ 15.473698] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.473720] ? calculate_sigpending+0x7b/0xa0 [ 15.473745] ? __pfx_kthread+0x10/0x10 [ 15.473767] ret_from_fork+0x116/0x1d0 [ 15.473785] ? __pfx_kthread+0x10/0x10 [ 15.473806] ret_from_fork_asm+0x1a/0x30 [ 15.473855] </TASK> [ 15.473865] [ 15.481513] Allocated by task 283: [ 15.481682] kasan_save_stack+0x45/0x70 [ 15.481897] kasan_save_track+0x18/0x40 [ 15.482089] kasan_save_alloc_info+0x3b/0x50 [ 15.482319] __kasan_kmalloc+0xb7/0xc0 [ 15.482528] __kmalloc_cache_noprof+0x189/0x420 [ 15.482755] kasan_atomics+0x95/0x310 [ 15.482937] kunit_try_run_case+0x1a5/0x480 [ 15.483136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.483386] kthread+0x337/0x6f0 [ 15.483564] ret_from_fork+0x116/0x1d0 [ 15.483720] ret_from_fork_asm+0x1a/0x30 [ 15.483856] [ 15.483925] The buggy address belongs to the object at ffff8881026f3680 [ 15.483925] which belongs to the cache kmalloc-64 of size 64 [ 15.484679] The buggy address is located 0 bytes to the right of [ 15.484679] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.485221] [ 15.485317] The buggy address belongs to the physical page: [ 15.485585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.485898] flags: 0x200000000000000(node=0|zone=2) [ 15.486149] page_type: f5(slab) [ 15.486300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.486664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.486932] page dumped because: kasan: bad access detected [ 15.487183] [ 15.487293] Memory state around the buggy address: [ 15.487533] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.487846] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.488174] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.488490] ^ [ 15.488706] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.489306] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.489525] ================================================================== [ 14.641257] ================================================================== [ 14.641763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.642486] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.642814] [ 14.642902] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.642945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.642958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.642981] Call Trace: [ 14.642995] <TASK> [ 14.643011] dump_stack_lvl+0x73/0xb0 [ 14.643051] print_report+0xd1/0x610 [ 14.643074] ? __virt_addr_valid+0x1db/0x2d0 [ 14.643097] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.643119] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.643143] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.643166] kasan_report+0x141/0x180 [ 14.643189] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.643217] __asan_report_store4_noabort+0x1b/0x30 [ 14.643243] kasan_atomics_helper+0x4b3a/0x5450 [ 14.643268] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.643291] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.643316] ? kasan_atomics+0x152/0x310 [ 14.643343] kasan_atomics+0x1dc/0x310 [ 14.643366] ? __pfx_kasan_atomics+0x10/0x10 [ 14.643392] ? __pfx_read_tsc+0x10/0x10 [ 14.643414] ? ktime_get_ts64+0x86/0x230 [ 14.643450] kunit_try_run_case+0x1a5/0x480 [ 14.643475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643498] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.643522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.643557] ? __kthread_parkme+0x82/0x180 [ 14.643577] ? preempt_count_sub+0x50/0x80 [ 14.643602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.643651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.643676] kthread+0x337/0x6f0 [ 14.643695] ? trace_preempt_on+0x20/0xc0 [ 14.643718] ? __pfx_kthread+0x10/0x10 [ 14.643739] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.643761] ? calculate_sigpending+0x7b/0xa0 [ 14.643786] ? __pfx_kthread+0x10/0x10 [ 14.643808] ret_from_fork+0x116/0x1d0 [ 14.643826] ? __pfx_kthread+0x10/0x10 [ 14.643847] ret_from_fork_asm+0x1a/0x30 [ 14.643880] </TASK> [ 14.643890] [ 14.651169] Allocated by task 283: [ 14.651297] kasan_save_stack+0x45/0x70 [ 14.651472] kasan_save_track+0x18/0x40 [ 14.651819] kasan_save_alloc_info+0x3b/0x50 [ 14.652032] __kasan_kmalloc+0xb7/0xc0 [ 14.652215] __kmalloc_cache_noprof+0x189/0x420 [ 14.652373] kasan_atomics+0x95/0x310 [ 14.652519] kunit_try_run_case+0x1a5/0x480 [ 14.652735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.652991] kthread+0x337/0x6f0 [ 14.653165] ret_from_fork+0x116/0x1d0 [ 14.653332] ret_from_fork_asm+0x1a/0x30 [ 14.653538] [ 14.653634] The buggy address belongs to the object at ffff8881026f3680 [ 14.653634] which belongs to the cache kmalloc-64 of size 64 [ 14.654084] The buggy address is located 0 bytes to the right of [ 14.654084] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.654620] [ 14.654712] The buggy address belongs to the physical page: [ 14.654950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.655262] flags: 0x200000000000000(node=0|zone=2) [ 14.655485] page_type: f5(slab) [ 14.655651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.655886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.656115] page dumped because: kasan: bad access detected [ 14.656287] [ 14.656357] Memory state around the buggy address: [ 14.656638] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.656962] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.657283] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.657681] ^ [ 14.657849] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.658069] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.658285] ================================================================== [ 14.457097] ================================================================== [ 14.458555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.458815] Read of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.459040] [ 14.459130] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.459176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.459187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.459209] Call Trace: [ 14.459223] <TASK> [ 14.459240] dump_stack_lvl+0x73/0xb0 [ 14.459268] print_report+0xd1/0x610 [ 14.459290] ? __virt_addr_valid+0x1db/0x2d0 [ 14.459313] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.459333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.459356] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.459378] kasan_report+0x141/0x180 [ 14.459400] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.459427] __asan_report_load4_noabort+0x18/0x20 [ 14.459489] kasan_atomics_helper+0x4bbc/0x5450 [ 14.459512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.459551] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.459577] ? kasan_atomics+0x152/0x310 [ 14.459603] kasan_atomics+0x1dc/0x310 [ 14.459625] ? __pfx_kasan_atomics+0x10/0x10 [ 14.459649] ? __pfx_read_tsc+0x10/0x10 [ 14.459670] ? ktime_get_ts64+0x86/0x230 [ 14.459695] kunit_try_run_case+0x1a5/0x480 [ 14.459720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.459742] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.459767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.459792] ? __kthread_parkme+0x82/0x180 [ 14.459836] ? preempt_count_sub+0x50/0x80 [ 14.459861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.459884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.459908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.459932] kthread+0x337/0x6f0 [ 14.459951] ? trace_preempt_on+0x20/0xc0 [ 14.459974] ? __pfx_kthread+0x10/0x10 [ 14.459994] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.460015] ? calculate_sigpending+0x7b/0xa0 [ 14.460039] ? __pfx_kthread+0x10/0x10 [ 14.460060] ret_from_fork+0x116/0x1d0 [ 14.460079] ? __pfx_kthread+0x10/0x10 [ 14.460099] ret_from_fork_asm+0x1a/0x30 [ 14.460133] </TASK> [ 14.460144] [ 14.474894] Allocated by task 283: [ 14.475132] kasan_save_stack+0x45/0x70 [ 14.475537] kasan_save_track+0x18/0x40 [ 14.475997] kasan_save_alloc_info+0x3b/0x50 [ 14.476397] __kasan_kmalloc+0xb7/0xc0 [ 14.476904] __kmalloc_cache_noprof+0x189/0x420 [ 14.477073] kasan_atomics+0x95/0x310 [ 14.477214] kunit_try_run_case+0x1a5/0x480 [ 14.477360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.477947] kthread+0x337/0x6f0 [ 14.478349] ret_from_fork+0x116/0x1d0 [ 14.478755] ret_from_fork_asm+0x1a/0x30 [ 14.479227] [ 14.479424] The buggy address belongs to the object at ffff8881026f3680 [ 14.479424] which belongs to the cache kmalloc-64 of size 64 [ 14.480667] The buggy address is located 0 bytes to the right of [ 14.480667] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.481377] [ 14.481748] The buggy address belongs to the physical page: [ 14.482242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.483056] flags: 0x200000000000000(node=0|zone=2) [ 14.483232] page_type: f5(slab) [ 14.483357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.484005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.484779] page dumped because: kasan: bad access detected [ 14.485261] [ 14.485457] Memory state around the buggy address: [ 14.485947] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.486735] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.487186] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.487616] ^ [ 14.488039] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.488792] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.489449] ================================================================== [ 15.637481] ================================================================== [ 15.638192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.638448] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.638962] [ 15.639059] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.639102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.639114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.639136] Call Trace: [ 15.639148] <TASK> [ 15.639164] dump_stack_lvl+0x73/0xb0 [ 15.639190] print_report+0xd1/0x610 [ 15.639213] ? __virt_addr_valid+0x1db/0x2d0 [ 15.639236] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.639257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.639281] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.639304] kasan_report+0x141/0x180 [ 15.639327] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.639355] kasan_check_range+0x10c/0x1c0 [ 15.639380] __kasan_check_write+0x18/0x20 [ 15.639399] kasan_atomics_helper+0x1eaa/0x5450 [ 15.639424] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.639457] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.639483] ? kasan_atomics+0x152/0x310 [ 15.639511] kasan_atomics+0x1dc/0x310 [ 15.639534] ? __pfx_kasan_atomics+0x10/0x10 [ 15.639559] ? __pfx_read_tsc+0x10/0x10 [ 15.639580] ? ktime_get_ts64+0x86/0x230 [ 15.639606] kunit_try_run_case+0x1a5/0x480 [ 15.639631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.639654] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.639679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.639704] ? __kthread_parkme+0x82/0x180 [ 15.639771] ? preempt_count_sub+0x50/0x80 [ 15.639822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.639847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.639901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.639926] kthread+0x337/0x6f0 [ 15.639945] ? trace_preempt_on+0x20/0xc0 [ 15.639970] ? __pfx_kthread+0x10/0x10 [ 15.639991] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.640041] ? calculate_sigpending+0x7b/0xa0 [ 15.640067] ? __pfx_kthread+0x10/0x10 [ 15.640089] ret_from_fork+0x116/0x1d0 [ 15.640108] ? __pfx_kthread+0x10/0x10 [ 15.640129] ret_from_fork_asm+0x1a/0x30 [ 15.640189] </TASK> [ 15.640200] [ 15.648229] Allocated by task 283: [ 15.648397] kasan_save_stack+0x45/0x70 [ 15.648691] kasan_save_track+0x18/0x40 [ 15.648907] kasan_save_alloc_info+0x3b/0x50 [ 15.649117] __kasan_kmalloc+0xb7/0xc0 [ 15.649317] __kmalloc_cache_noprof+0x189/0x420 [ 15.649723] kasan_atomics+0x95/0x310 [ 15.650124] kunit_try_run_case+0x1a5/0x480 [ 15.650327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.650603] kthread+0x337/0x6f0 [ 15.650724] ret_from_fork+0x116/0x1d0 [ 15.650946] ret_from_fork_asm+0x1a/0x30 [ 15.651118] [ 15.651198] The buggy address belongs to the object at ffff8881026f3680 [ 15.651198] which belongs to the cache kmalloc-64 of size 64 [ 15.651740] The buggy address is located 0 bytes to the right of [ 15.651740] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.652300] [ 15.652482] The buggy address belongs to the physical page: [ 15.652902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.653144] flags: 0x200000000000000(node=0|zone=2) [ 15.653398] page_type: f5(slab) [ 15.653576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.653905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.654227] page dumped because: kasan: bad access detected [ 15.654535] [ 15.654628] Memory state around the buggy address: [ 15.654848] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.655229] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.655449] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.656001] ^ [ 15.656223] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.656540] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.656846] ================================================================== [ 14.676670] ================================================================== [ 14.677027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.677365] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.678122] [ 14.678228] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.678280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.678292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.678312] Call Trace: [ 14.678326] <TASK> [ 14.678341] dump_stack_lvl+0x73/0xb0 [ 14.678493] print_report+0xd1/0x610 [ 14.678515] ? __virt_addr_valid+0x1db/0x2d0 [ 14.678537] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.678559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.678582] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.678605] kasan_report+0x141/0x180 [ 14.678629] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.678657] kasan_check_range+0x10c/0x1c0 [ 14.678681] __kasan_check_write+0x18/0x20 [ 14.678701] kasan_atomics_helper+0x5fe/0x5450 [ 14.678725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.678748] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.678775] ? kasan_atomics+0x152/0x310 [ 14.678802] kasan_atomics+0x1dc/0x310 [ 14.678825] ? __pfx_kasan_atomics+0x10/0x10 [ 14.678850] ? __pfx_read_tsc+0x10/0x10 [ 14.678871] ? ktime_get_ts64+0x86/0x230 [ 14.678897] kunit_try_run_case+0x1a5/0x480 [ 14.678922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.678944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.678969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.678993] ? __kthread_parkme+0x82/0x180 [ 14.679012] ? preempt_count_sub+0x50/0x80 [ 14.679037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.679062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.679086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.679125] kthread+0x337/0x6f0 [ 14.679145] ? trace_preempt_on+0x20/0xc0 [ 14.679168] ? __pfx_kthread+0x10/0x10 [ 14.679188] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.679211] ? calculate_sigpending+0x7b/0xa0 [ 14.679235] ? __pfx_kthread+0x10/0x10 [ 14.679256] ret_from_fork+0x116/0x1d0 [ 14.679277] ? __pfx_kthread+0x10/0x10 [ 14.679297] ret_from_fork_asm+0x1a/0x30 [ 14.679330] </TASK> [ 14.679340] [ 14.686899] Allocated by task 283: [ 14.687042] kasan_save_stack+0x45/0x70 [ 14.687186] kasan_save_track+0x18/0x40 [ 14.687380] kasan_save_alloc_info+0x3b/0x50 [ 14.687683] __kasan_kmalloc+0xb7/0xc0 [ 14.687865] __kmalloc_cache_noprof+0x189/0x420 [ 14.688022] kasan_atomics+0x95/0x310 [ 14.688156] kunit_try_run_case+0x1a5/0x480 [ 14.688304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688491] kthread+0x337/0x6f0 [ 14.688616] ret_from_fork+0x116/0x1d0 [ 14.688752] ret_from_fork_asm+0x1a/0x30 [ 14.688893] [ 14.688964] The buggy address belongs to the object at ffff8881026f3680 [ 14.688964] which belongs to the cache kmalloc-64 of size 64 [ 14.689325] The buggy address is located 0 bytes to the right of [ 14.689325] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.689843] [ 14.689939] The buggy address belongs to the physical page: [ 14.690191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.690570] flags: 0x200000000000000(node=0|zone=2) [ 14.690803] page_type: f5(slab) [ 14.690967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.691302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.691737] page dumped because: kasan: bad access detected [ 14.691956] [ 14.692055] Memory state around the buggy address: [ 14.692223] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.692453] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.693037] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.693350] ^ [ 14.693517] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.693839] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.694122] ================================================================== [ 15.299873] ================================================================== [ 15.300190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.300417] Write of size 8 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 15.301337] [ 15.301452] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.301497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.301510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.301531] Call Trace: [ 15.301547] <TASK> [ 15.301562] dump_stack_lvl+0x73/0xb0 [ 15.301590] print_report+0xd1/0x610 [ 15.301613] ? __virt_addr_valid+0x1db/0x2d0 [ 15.301635] ? kasan_atomics_helper+0x151d/0x5450 [ 15.301658] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.301681] ? kasan_atomics_helper+0x151d/0x5450 [ 15.301705] kasan_report+0x141/0x180 [ 15.301728] ? kasan_atomics_helper+0x151d/0x5450 [ 15.301756] kasan_check_range+0x10c/0x1c0 [ 15.301781] __kasan_check_write+0x18/0x20 [ 15.301801] kasan_atomics_helper+0x151d/0x5450 [ 15.301825] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.301848] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.301874] ? kasan_atomics+0x152/0x310 [ 15.301902] kasan_atomics+0x1dc/0x310 [ 15.301925] ? __pfx_kasan_atomics+0x10/0x10 [ 15.301950] ? __pfx_read_tsc+0x10/0x10 [ 15.301971] ? ktime_get_ts64+0x86/0x230 [ 15.301996] kunit_try_run_case+0x1a5/0x480 [ 15.302020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.302043] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.302067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.302092] ? __kthread_parkme+0x82/0x180 [ 15.302113] ? preempt_count_sub+0x50/0x80 [ 15.302138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.302163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.302188] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.302214] kthread+0x337/0x6f0 [ 15.302232] ? trace_preempt_on+0x20/0xc0 [ 15.302256] ? __pfx_kthread+0x10/0x10 [ 15.302277] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.302299] ? calculate_sigpending+0x7b/0xa0 [ 15.302324] ? __pfx_kthread+0x10/0x10 [ 15.302346] ret_from_fork+0x116/0x1d0 [ 15.302364] ? __pfx_kthread+0x10/0x10 [ 15.302385] ret_from_fork_asm+0x1a/0x30 [ 15.302418] </TASK> [ 15.302429] [ 15.309262] Allocated by task 283: [ 15.309387] kasan_save_stack+0x45/0x70 [ 15.309816] kasan_save_track+0x18/0x40 [ 15.310006] kasan_save_alloc_info+0x3b/0x50 [ 15.310219] __kasan_kmalloc+0xb7/0xc0 [ 15.310407] __kmalloc_cache_noprof+0x189/0x420 [ 15.310726] kasan_atomics+0x95/0x310 [ 15.310904] kunit_try_run_case+0x1a5/0x480 [ 15.311086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.311298] kthread+0x337/0x6f0 [ 15.311469] ret_from_fork+0x116/0x1d0 [ 15.311599] ret_from_fork_asm+0x1a/0x30 [ 15.311736] [ 15.311805] The buggy address belongs to the object at ffff8881026f3680 [ 15.311805] which belongs to the cache kmalloc-64 of size 64 [ 15.312227] The buggy address is located 0 bytes to the right of [ 15.312227] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 15.312963] [ 15.313161] The buggy address belongs to the physical page: [ 15.313409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 15.313708] flags: 0x200000000000000(node=0|zone=2) [ 15.313874] page_type: f5(slab) [ 15.313993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.314217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.314518] page dumped because: kasan: bad access detected [ 15.314771] [ 15.314862] Memory state around the buggy address: [ 15.315086] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.315409] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.315952] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.316220] ^ [ 15.316369] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316589] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316833] ================================================================== [ 14.617943] ================================================================== [ 14.618536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.618800] Write of size 4 at addr ffff8881026f36b0 by task kunit_try_catch/283 [ 14.619028] [ 14.619112] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.619164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.619176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.619196] Call Trace: [ 14.619210] <TASK> [ 14.619225] dump_stack_lvl+0x73/0xb0 [ 14.619537] print_report+0xd1/0x610 [ 14.620230] ? __virt_addr_valid+0x1db/0x2d0 [ 14.620257] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.620279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.620303] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.620326] kasan_report+0x141/0x180 [ 14.620357] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.620386] kasan_check_range+0x10c/0x1c0 [ 14.620411] __kasan_check_write+0x18/0x20 [ 14.620431] kasan_atomics_helper+0x4a0/0x5450 [ 14.620463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.620487] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.620512] ? kasan_atomics+0x152/0x310 [ 14.620539] kasan_atomics+0x1dc/0x310 [ 14.620562] ? __pfx_kasan_atomics+0x10/0x10 [ 14.620587] ? __pfx_read_tsc+0x10/0x10 [ 14.620608] ? ktime_get_ts64+0x86/0x230 [ 14.620634] kunit_try_run_case+0x1a5/0x480 [ 14.620657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.620707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.620732] ? __kthread_parkme+0x82/0x180 [ 14.620752] ? preempt_count_sub+0x50/0x80 [ 14.620777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.620825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.620850] kthread+0x337/0x6f0 [ 14.620869] ? trace_preempt_on+0x20/0xc0 [ 14.620893] ? __pfx_kthread+0x10/0x10 [ 14.620913] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.620935] ? calculate_sigpending+0x7b/0xa0 [ 14.620959] ? __pfx_kthread+0x10/0x10 [ 14.620982] ret_from_fork+0x116/0x1d0 [ 14.621000] ? __pfx_kthread+0x10/0x10 [ 14.621020] ret_from_fork_asm+0x1a/0x30 [ 14.621054] </TASK> [ 14.621065] [ 14.631156] Allocated by task 283: [ 14.631529] kasan_save_stack+0x45/0x70 [ 14.631810] kasan_save_track+0x18/0x40 [ 14.632061] kasan_save_alloc_info+0x3b/0x50 [ 14.632340] __kasan_kmalloc+0xb7/0xc0 [ 14.632506] __kmalloc_cache_noprof+0x189/0x420 [ 14.632752] kasan_atomics+0x95/0x310 [ 14.633057] kunit_try_run_case+0x1a5/0x480 [ 14.633217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.633470] kthread+0x337/0x6f0 [ 14.633856] ret_from_fork+0x116/0x1d0 [ 14.634025] ret_from_fork_asm+0x1a/0x30 [ 14.634323] [ 14.634401] The buggy address belongs to the object at ffff8881026f3680 [ 14.634401] which belongs to the cache kmalloc-64 of size 64 [ 14.635177] The buggy address is located 0 bytes to the right of [ 14.635177] allocated 48-byte region [ffff8881026f3680, ffff8881026f36b0) [ 14.635884] [ 14.636049] The buggy address belongs to the physical page: [ 14.636269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f3 [ 14.636641] flags: 0x200000000000000(node=0|zone=2) [ 14.636843] page_type: f5(slab) [ 14.636983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.637300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.637941] page dumped because: kasan: bad access detected [ 14.638166] [ 14.638374] Memory state around the buggy address: [ 14.638547] ffff8881026f3580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.638992] ffff8881026f3600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.639242] >ffff8881026f3680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.639735] ^ [ 14.640011] ffff8881026f3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.640264] ffff8881026f3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.640677] ==================================================================
[ 14.917121] ================================================================== [ 14.919054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.919602] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 14.919979] [ 14.920229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.920283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.920296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.920320] Call Trace: [ 14.920333] <TASK> [ 14.920351] dump_stack_lvl+0x73/0xb0 [ 14.920384] print_report+0xd1/0x610 [ 14.920407] ? __virt_addr_valid+0x1db/0x2d0 [ 14.920432] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.920454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.920477] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.920498] kasan_report+0x141/0x180 [ 14.920520] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.920545] __asan_report_load4_noabort+0x18/0x20 [ 14.920570] kasan_atomics_helper+0x4bbc/0x5450 [ 14.920592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.920627] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.920653] ? kasan_atomics+0x152/0x310 [ 14.920679] kasan_atomics+0x1dc/0x310 [ 14.920713] ? __pfx_kasan_atomics+0x10/0x10 [ 14.920738] ? __pfx_read_tsc+0x10/0x10 [ 14.920758] ? ktime_get_ts64+0x86/0x230 [ 14.920782] kunit_try_run_case+0x1a5/0x480 [ 14.920807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.920857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.920881] ? __kthread_parkme+0x82/0x180 [ 14.920902] ? preempt_count_sub+0x50/0x80 [ 14.920926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.920973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.920996] kthread+0x337/0x6f0 [ 14.921081] ? trace_preempt_on+0x20/0xc0 [ 14.921106] ? __pfx_kthread+0x10/0x10 [ 14.921126] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.921148] ? calculate_sigpending+0x7b/0xa0 [ 14.921172] ? __pfx_kthread+0x10/0x10 [ 14.921193] ret_from_fork+0x116/0x1d0 [ 14.921212] ? __pfx_kthread+0x10/0x10 [ 14.921231] ret_from_fork_asm+0x1a/0x30 [ 14.921261] </TASK> [ 14.921273] [ 14.934838] Allocated by task 282: [ 14.935271] kasan_save_stack+0x45/0x70 [ 14.935724] kasan_save_track+0x18/0x40 [ 14.936123] kasan_save_alloc_info+0x3b/0x50 [ 14.936460] __kasan_kmalloc+0xb7/0xc0 [ 14.936697] __kmalloc_cache_noprof+0x189/0x420 [ 14.937151] kasan_atomics+0x95/0x310 [ 14.937463] kunit_try_run_case+0x1a5/0x480 [ 14.937616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.938123] kthread+0x337/0x6f0 [ 14.938448] ret_from_fork+0x116/0x1d0 [ 14.938723] ret_from_fork_asm+0x1a/0x30 [ 14.938868] [ 14.938941] The buggy address belongs to the object at ffff88810342d080 [ 14.938941] which belongs to the cache kmalloc-64 of size 64 [ 14.940075] The buggy address is located 0 bytes to the right of [ 14.940075] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 14.941142] [ 14.941357] The buggy address belongs to the physical page: [ 14.941792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 14.942183] flags: 0x200000000000000(node=0|zone=2) [ 14.942799] page_type: f5(slab) [ 14.943204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.944025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.944594] page dumped because: kasan: bad access detected [ 14.944768] [ 14.944842] Memory state around the buggy address: [ 14.945021] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945370] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.945703] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.946028] ^ [ 14.946303] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.946693] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.947027] ================================================================== [ 16.295083] ================================================================== [ 16.295433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.295749] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.296091] [ 16.296208] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.296258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.296292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.296317] Call Trace: [ 16.296341] <TASK> [ 16.296362] dump_stack_lvl+0x73/0xb0 [ 16.296398] print_report+0xd1/0x610 [ 16.296422] ? __virt_addr_valid+0x1db/0x2d0 [ 16.296456] ? kasan_atomics_helper+0x224c/0x5450 [ 16.296478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.296520] ? kasan_atomics_helper+0x224c/0x5450 [ 16.296543] kasan_report+0x141/0x180 [ 16.296566] ? kasan_atomics_helper+0x224c/0x5450 [ 16.296593] kasan_check_range+0x10c/0x1c0 [ 16.296618] __kasan_check_write+0x18/0x20 [ 16.296638] kasan_atomics_helper+0x224c/0x5450 [ 16.296662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.296684] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.296727] ? kasan_atomics+0x152/0x310 [ 16.296754] kasan_atomics+0x1dc/0x310 [ 16.296777] ? __pfx_kasan_atomics+0x10/0x10 [ 16.296802] ? __pfx_read_tsc+0x10/0x10 [ 16.296824] ? ktime_get_ts64+0x86/0x230 [ 16.296856] kunit_try_run_case+0x1a5/0x480 [ 16.296882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.296923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.296949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.296977] ? __kthread_parkme+0x82/0x180 [ 16.296998] ? preempt_count_sub+0x50/0x80 [ 16.297035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.297059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.297086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.297112] kthread+0x337/0x6f0 [ 16.297150] ? trace_preempt_on+0x20/0xc0 [ 16.297175] ? __pfx_kthread+0x10/0x10 [ 16.297196] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.297220] ? calculate_sigpending+0x7b/0xa0 [ 16.297246] ? __pfx_kthread+0x10/0x10 [ 16.297267] ret_from_fork+0x116/0x1d0 [ 16.297287] ? __pfx_kthread+0x10/0x10 [ 16.297325] ret_from_fork_asm+0x1a/0x30 [ 16.297359] </TASK> [ 16.297370] [ 16.305329] Allocated by task 282: [ 16.305634] kasan_save_stack+0x45/0x70 [ 16.305862] kasan_save_track+0x18/0x40 [ 16.306047] kasan_save_alloc_info+0x3b/0x50 [ 16.306253] __kasan_kmalloc+0xb7/0xc0 [ 16.306459] __kmalloc_cache_noprof+0x189/0x420 [ 16.306680] kasan_atomics+0x95/0x310 [ 16.306868] kunit_try_run_case+0x1a5/0x480 [ 16.307094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.307341] kthread+0x337/0x6f0 [ 16.307600] ret_from_fork+0x116/0x1d0 [ 16.307784] ret_from_fork_asm+0x1a/0x30 [ 16.307980] [ 16.308083] The buggy address belongs to the object at ffff88810342d080 [ 16.308083] which belongs to the cache kmalloc-64 of size 64 [ 16.308634] The buggy address is located 0 bytes to the right of [ 16.308634] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.309151] [ 16.309247] The buggy address belongs to the physical page: [ 16.309503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.309829] flags: 0x200000000000000(node=0|zone=2) [ 16.310078] page_type: f5(slab) [ 16.310215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.310579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.311018] page dumped because: kasan: bad access detected [ 16.311241] [ 16.311322] Memory state around the buggy address: [ 16.311520] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.311856] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.312215] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.312530] ^ [ 16.312758] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.313083] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.313527] ================================================================== [ 15.015194] ================================================================== [ 15.015901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.016551] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.016882] [ 15.016992] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.017264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.017280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.017314] Call Trace: [ 15.017329] <TASK> [ 15.017351] dump_stack_lvl+0x73/0xb0 [ 15.017400] print_report+0xd1/0x610 [ 15.017426] ? __virt_addr_valid+0x1db/0x2d0 [ 15.017462] ? kasan_atomics_helper+0x3df/0x5450 [ 15.017485] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.017520] ? kasan_atomics_helper+0x3df/0x5450 [ 15.017545] kasan_report+0x141/0x180 [ 15.017570] ? kasan_atomics_helper+0x3df/0x5450 [ 15.017608] kasan_check_range+0x10c/0x1c0 [ 15.017633] __kasan_check_read+0x15/0x20 [ 15.017653] kasan_atomics_helper+0x3df/0x5450 [ 15.017677] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.017709] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.017736] ? kasan_atomics+0x152/0x310 [ 15.017773] kasan_atomics+0x1dc/0x310 [ 15.017796] ? __pfx_kasan_atomics+0x10/0x10 [ 15.017821] ? __pfx_read_tsc+0x10/0x10 [ 15.017844] ? ktime_get_ts64+0x86/0x230 [ 15.017878] kunit_try_run_case+0x1a5/0x480 [ 15.017905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.017929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.017964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.017988] ? __kthread_parkme+0x82/0x180 [ 15.018019] ? preempt_count_sub+0x50/0x80 [ 15.018045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.018078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.018103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.018128] kthread+0x337/0x6f0 [ 15.018159] ? trace_preempt_on+0x20/0xc0 [ 15.018183] ? __pfx_kthread+0x10/0x10 [ 15.018204] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.018227] ? calculate_sigpending+0x7b/0xa0 [ 15.018252] ? __pfx_kthread+0x10/0x10 [ 15.018283] ret_from_fork+0x116/0x1d0 [ 15.018302] ? __pfx_kthread+0x10/0x10 [ 15.018322] ret_from_fork_asm+0x1a/0x30 [ 15.018365] </TASK> [ 15.018375] [ 15.026606] Allocated by task 282: [ 15.026803] kasan_save_stack+0x45/0x70 [ 15.027059] kasan_save_track+0x18/0x40 [ 15.027222] kasan_save_alloc_info+0x3b/0x50 [ 15.027468] __kasan_kmalloc+0xb7/0xc0 [ 15.027632] __kmalloc_cache_noprof+0x189/0x420 [ 15.027866] kasan_atomics+0x95/0x310 [ 15.028062] kunit_try_run_case+0x1a5/0x480 [ 15.028278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.028534] kthread+0x337/0x6f0 [ 15.028709] ret_from_fork+0x116/0x1d0 [ 15.028880] ret_from_fork_asm+0x1a/0x30 [ 15.029097] [ 15.029173] The buggy address belongs to the object at ffff88810342d080 [ 15.029173] which belongs to the cache kmalloc-64 of size 64 [ 15.029772] The buggy address is located 0 bytes to the right of [ 15.029772] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.030227] [ 15.030320] The buggy address belongs to the physical page: [ 15.030757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.031114] flags: 0x200000000000000(node=0|zone=2) [ 15.031294] page_type: f5(slab) [ 15.031419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.031654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.031882] page dumped because: kasan: bad access detected [ 15.032087] [ 15.032189] Memory state around the buggy address: [ 15.032411] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032753] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.033085] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.033398] ^ [ 15.033854] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034179] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034399] ================================================================== [ 16.139431] ================================================================== [ 16.140073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.140365] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.140975] [ 16.141080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.141128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.141141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.141165] Call Trace: [ 16.141186] <TASK> [ 16.141208] dump_stack_lvl+0x73/0xb0 [ 16.141237] print_report+0xd1/0x610 [ 16.141260] ? __virt_addr_valid+0x1db/0x2d0 [ 16.141285] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.141306] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.141330] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.141353] kasan_report+0x141/0x180 [ 16.141375] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.141401] __asan_report_load8_noabort+0x18/0x20 [ 16.141427] kasan_atomics_helper+0x4f71/0x5450 [ 16.141450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.141473] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.141500] ? kasan_atomics+0x152/0x310 [ 16.141530] kasan_atomics+0x1dc/0x310 [ 16.141553] ? __pfx_kasan_atomics+0x10/0x10 [ 16.141578] ? __pfx_read_tsc+0x10/0x10 [ 16.141601] ? ktime_get_ts64+0x86/0x230 [ 16.141667] kunit_try_run_case+0x1a5/0x480 [ 16.141693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.141716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.141741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.141766] ? __kthread_parkme+0x82/0x180 [ 16.141787] ? preempt_count_sub+0x50/0x80 [ 16.141812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.141836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.141882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.141908] kthread+0x337/0x6f0 [ 16.141928] ? trace_preempt_on+0x20/0xc0 [ 16.141952] ? __pfx_kthread+0x10/0x10 [ 16.141973] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.141995] ? calculate_sigpending+0x7b/0xa0 [ 16.142030] ? __pfx_kthread+0x10/0x10 [ 16.142052] ret_from_fork+0x116/0x1d0 [ 16.142072] ? __pfx_kthread+0x10/0x10 [ 16.142093] ret_from_fork_asm+0x1a/0x30 [ 16.142125] </TASK> [ 16.142136] [ 16.149337] Allocated by task 282: [ 16.149621] kasan_save_stack+0x45/0x70 [ 16.149850] kasan_save_track+0x18/0x40 [ 16.150049] kasan_save_alloc_info+0x3b/0x50 [ 16.150254] __kasan_kmalloc+0xb7/0xc0 [ 16.150443] __kmalloc_cache_noprof+0x189/0x420 [ 16.150605] kasan_atomics+0x95/0x310 [ 16.150737] kunit_try_run_case+0x1a5/0x480 [ 16.150881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.151141] kthread+0x337/0x6f0 [ 16.151334] ret_from_fork+0x116/0x1d0 [ 16.151664] ret_from_fork_asm+0x1a/0x30 [ 16.151880] [ 16.151978] The buggy address belongs to the object at ffff88810342d080 [ 16.151978] which belongs to the cache kmalloc-64 of size 64 [ 16.152453] The buggy address is located 0 bytes to the right of [ 16.152453] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.152925] [ 16.153033] The buggy address belongs to the physical page: [ 16.153263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.153633] flags: 0x200000000000000(node=0|zone=2) [ 16.153870] page_type: f5(slab) [ 16.154046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.154373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.154704] page dumped because: kasan: bad access detected [ 16.154928] [ 16.155041] Memory state around the buggy address: [ 16.155247] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.155515] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.155852] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.156146] ^ [ 16.156342] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156672] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156970] ================================================================== [ 15.257146] ================================================================== [ 15.257459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.257765] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.258147] [ 15.258289] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.258347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.258363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.258387] Call Trace: [ 15.258418] <TASK> [ 15.258439] dump_stack_lvl+0x73/0xb0 [ 15.258469] print_report+0xd1/0x610 [ 15.258492] ? __virt_addr_valid+0x1db/0x2d0 [ 15.258518] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.258540] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.258564] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.258586] kasan_report+0x141/0x180 [ 15.258608] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.258645] kasan_check_range+0x10c/0x1c0 [ 15.258670] __kasan_check_write+0x18/0x20 [ 15.258689] kasan_atomics_helper+0x8f9/0x5450 [ 15.258724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.258746] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.258781] ? kasan_atomics+0x152/0x310 [ 15.258808] kasan_atomics+0x1dc/0x310 [ 15.258832] ? __pfx_kasan_atomics+0x10/0x10 [ 15.258867] ? __pfx_read_tsc+0x10/0x10 [ 15.258889] ? ktime_get_ts64+0x86/0x230 [ 15.258915] kunit_try_run_case+0x1a5/0x480 [ 15.258940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.258964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.258989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.259023] ? __kthread_parkme+0x82/0x180 [ 15.259045] ? preempt_count_sub+0x50/0x80 [ 15.259070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.259095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.259119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.259145] kthread+0x337/0x6f0 [ 15.259164] ? trace_preempt_on+0x20/0xc0 [ 15.259188] ? __pfx_kthread+0x10/0x10 [ 15.259211] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.259233] ? calculate_sigpending+0x7b/0xa0 [ 15.259258] ? __pfx_kthread+0x10/0x10 [ 15.259280] ret_from_fork+0x116/0x1d0 [ 15.259299] ? __pfx_kthread+0x10/0x10 [ 15.259320] ret_from_fork_asm+0x1a/0x30 [ 15.259352] </TASK> [ 15.259362] [ 15.266774] Allocated by task 282: [ 15.266974] kasan_save_stack+0x45/0x70 [ 15.267211] kasan_save_track+0x18/0x40 [ 15.267401] kasan_save_alloc_info+0x3b/0x50 [ 15.267611] __kasan_kmalloc+0xb7/0xc0 [ 15.267798] __kmalloc_cache_noprof+0x189/0x420 [ 15.267980] kasan_atomics+0x95/0x310 [ 15.268175] kunit_try_run_case+0x1a5/0x480 [ 15.268365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.268698] kthread+0x337/0x6f0 [ 15.268898] ret_from_fork+0x116/0x1d0 [ 15.269057] ret_from_fork_asm+0x1a/0x30 [ 15.269204] [ 15.269316] The buggy address belongs to the object at ffff88810342d080 [ 15.269316] which belongs to the cache kmalloc-64 of size 64 [ 15.270107] The buggy address is located 0 bytes to the right of [ 15.270107] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.270704] [ 15.270815] The buggy address belongs to the physical page: [ 15.271063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.271418] flags: 0x200000000000000(node=0|zone=2) [ 15.271653] page_type: f5(slab) [ 15.271847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.272190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.272536] page dumped because: kasan: bad access detected [ 15.272764] [ 15.272864] Memory state around the buggy address: [ 15.273071] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273312] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.273762] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.274154] ^ [ 15.274312] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.274833] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.275139] ================================================================== [ 15.747644] ================================================================== [ 15.748033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.748450] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.748759] [ 15.748881] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.748959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.748972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.749007] Call Trace: [ 15.749042] <TASK> [ 15.749063] dump_stack_lvl+0x73/0xb0 [ 15.749094] print_report+0xd1/0x610 [ 15.749117] ? __virt_addr_valid+0x1db/0x2d0 [ 15.749141] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.749163] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.749187] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.749209] kasan_report+0x141/0x180 [ 15.749232] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.749259] __asan_report_load8_noabort+0x18/0x20 [ 15.749285] kasan_atomics_helper+0x4eae/0x5450 [ 15.749309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.749332] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.749358] ? kasan_atomics+0x152/0x310 [ 15.749385] kasan_atomics+0x1dc/0x310 [ 15.749415] ? __pfx_kasan_atomics+0x10/0x10 [ 15.749440] ? __pfx_read_tsc+0x10/0x10 [ 15.749462] ? ktime_get_ts64+0x86/0x230 [ 15.749488] kunit_try_run_case+0x1a5/0x480 [ 15.749514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.749564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.749588] ? __kthread_parkme+0x82/0x180 [ 15.749609] ? preempt_count_sub+0x50/0x80 [ 15.749634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.749708] kthread+0x337/0x6f0 [ 15.749727] ? trace_preempt_on+0x20/0xc0 [ 15.749751] ? __pfx_kthread+0x10/0x10 [ 15.749772] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.749796] ? calculate_sigpending+0x7b/0xa0 [ 15.749820] ? __pfx_kthread+0x10/0x10 [ 15.749843] ret_from_fork+0x116/0x1d0 [ 15.749864] ? __pfx_kthread+0x10/0x10 [ 15.749884] ret_from_fork_asm+0x1a/0x30 [ 15.749918] </TASK> [ 15.749929] [ 15.757394] Allocated by task 282: [ 15.757672] kasan_save_stack+0x45/0x70 [ 15.758018] kasan_save_track+0x18/0x40 [ 15.758230] kasan_save_alloc_info+0x3b/0x50 [ 15.758457] __kasan_kmalloc+0xb7/0xc0 [ 15.758650] __kmalloc_cache_noprof+0x189/0x420 [ 15.758887] kasan_atomics+0x95/0x310 [ 15.759032] kunit_try_run_case+0x1a5/0x480 [ 15.759184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.759490] kthread+0x337/0x6f0 [ 15.759732] ret_from_fork+0x116/0x1d0 [ 15.759990] ret_from_fork_asm+0x1a/0x30 [ 15.760282] [ 15.760400] The buggy address belongs to the object at ffff88810342d080 [ 15.760400] which belongs to the cache kmalloc-64 of size 64 [ 15.760883] The buggy address is located 0 bytes to the right of [ 15.760883] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.761358] [ 15.761518] The buggy address belongs to the physical page: [ 15.761806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.762212] flags: 0x200000000000000(node=0|zone=2) [ 15.762481] page_type: f5(slab) [ 15.762635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.762986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.763308] page dumped because: kasan: bad access detected [ 15.763639] [ 15.763766] Memory state around the buggy address: [ 15.763937] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.764209] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.764605] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.764928] ^ [ 15.765217] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765547] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765806] ================================================================== [ 15.589815] ================================================================== [ 15.590268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.590642] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.590919] [ 15.591020] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.591070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.591082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.591105] Call Trace: [ 15.591126] <TASK> [ 15.591146] dump_stack_lvl+0x73/0xb0 [ 15.591176] print_report+0xd1/0x610 [ 15.591199] ? __virt_addr_valid+0x1db/0x2d0 [ 15.591223] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.591245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.591269] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.591292] kasan_report+0x141/0x180 [ 15.591315] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.591342] __asan_report_load4_noabort+0x18/0x20 [ 15.591368] kasan_atomics_helper+0x4a1c/0x5450 [ 15.591392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.591416] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.591460] ? kasan_atomics+0x152/0x310 [ 15.591487] kasan_atomics+0x1dc/0x310 [ 15.591510] ? __pfx_kasan_atomics+0x10/0x10 [ 15.591535] ? __pfx_read_tsc+0x10/0x10 [ 15.591558] ? ktime_get_ts64+0x86/0x230 [ 15.591584] kunit_try_run_case+0x1a5/0x480 [ 15.591609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.591633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.591657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.591682] ? __kthread_parkme+0x82/0x180 [ 15.591703] ? preempt_count_sub+0x50/0x80 [ 15.591729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.591753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.591777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.591802] kthread+0x337/0x6f0 [ 15.591822] ? trace_preempt_on+0x20/0xc0 [ 15.591846] ? __pfx_kthread+0x10/0x10 [ 15.591867] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.591888] ? calculate_sigpending+0x7b/0xa0 [ 15.591915] ? __pfx_kthread+0x10/0x10 [ 15.591936] ret_from_fork+0x116/0x1d0 [ 15.591955] ? __pfx_kthread+0x10/0x10 [ 15.591976] ret_from_fork_asm+0x1a/0x30 [ 15.592007] </TASK> [ 15.592028] [ 15.599263] Allocated by task 282: [ 15.599430] kasan_save_stack+0x45/0x70 [ 15.599638] kasan_save_track+0x18/0x40 [ 15.599778] kasan_save_alloc_info+0x3b/0x50 [ 15.599927] __kasan_kmalloc+0xb7/0xc0 [ 15.600093] __kmalloc_cache_noprof+0x189/0x420 [ 15.600318] kasan_atomics+0x95/0x310 [ 15.600595] kunit_try_run_case+0x1a5/0x480 [ 15.600771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.600994] kthread+0x337/0x6f0 [ 15.601178] ret_from_fork+0x116/0x1d0 [ 15.601338] ret_from_fork_asm+0x1a/0x30 [ 15.601537] [ 15.601635] The buggy address belongs to the object at ffff88810342d080 [ 15.601635] which belongs to the cache kmalloc-64 of size 64 [ 15.602117] The buggy address is located 0 bytes to the right of [ 15.602117] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.602636] [ 15.602734] The buggy address belongs to the physical page: [ 15.602960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.603232] flags: 0x200000000000000(node=0|zone=2) [ 15.603443] page_type: f5(slab) [ 15.603611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.603950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.604226] page dumped because: kasan: bad access detected [ 15.604504] [ 15.604585] Memory state around the buggy address: [ 15.604813] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.605106] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.605378] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.605705] ^ [ 15.605901] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.606202] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.606531] ================================================================== [ 15.479815] ================================================================== [ 15.480194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.480786] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.481306] [ 15.481428] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.481640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.481654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.481677] Call Trace: [ 15.481699] <TASK> [ 15.481720] dump_stack_lvl+0x73/0xb0 [ 15.481762] print_report+0xd1/0x610 [ 15.481786] ? __virt_addr_valid+0x1db/0x2d0 [ 15.481812] ? kasan_atomics_helper+0xe78/0x5450 [ 15.481834] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.481857] ? kasan_atomics_helper+0xe78/0x5450 [ 15.481879] kasan_report+0x141/0x180 [ 15.481902] ? kasan_atomics_helper+0xe78/0x5450 [ 15.481931] kasan_check_range+0x10c/0x1c0 [ 15.481956] __kasan_check_write+0x18/0x20 [ 15.481976] kasan_atomics_helper+0xe78/0x5450 [ 15.481999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.482031] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.482057] ? kasan_atomics+0x152/0x310 [ 15.482084] kasan_atomics+0x1dc/0x310 [ 15.482107] ? __pfx_kasan_atomics+0x10/0x10 [ 15.482131] ? __pfx_read_tsc+0x10/0x10 [ 15.482153] ? ktime_get_ts64+0x86/0x230 [ 15.482178] kunit_try_run_case+0x1a5/0x480 [ 15.482203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.482226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.482252] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.482276] ? __kthread_parkme+0x82/0x180 [ 15.482298] ? preempt_count_sub+0x50/0x80 [ 15.482323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.482347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.482372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.482396] kthread+0x337/0x6f0 [ 15.482416] ? trace_preempt_on+0x20/0xc0 [ 15.482440] ? __pfx_kthread+0x10/0x10 [ 15.482460] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.482482] ? calculate_sigpending+0x7b/0xa0 [ 15.482507] ? __pfx_kthread+0x10/0x10 [ 15.482529] ret_from_fork+0x116/0x1d0 [ 15.482548] ? __pfx_kthread+0x10/0x10 [ 15.482569] ret_from_fork_asm+0x1a/0x30 [ 15.482602] </TASK> [ 15.482612] [ 15.492971] Allocated by task 282: [ 15.493186] kasan_save_stack+0x45/0x70 [ 15.493391] kasan_save_track+0x18/0x40 [ 15.493901] kasan_save_alloc_info+0x3b/0x50 [ 15.494200] __kasan_kmalloc+0xb7/0xc0 [ 15.494791] __kmalloc_cache_noprof+0x189/0x420 [ 15.495030] kasan_atomics+0x95/0x310 [ 15.495172] kunit_try_run_case+0x1a5/0x480 [ 15.495377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.495614] kthread+0x337/0x6f0 [ 15.495798] ret_from_fork+0x116/0x1d0 [ 15.495970] ret_from_fork_asm+0x1a/0x30 [ 15.496179] [ 15.496281] The buggy address belongs to the object at ffff88810342d080 [ 15.496281] which belongs to the cache kmalloc-64 of size 64 [ 15.496764] The buggy address is located 0 bytes to the right of [ 15.496764] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.497214] [ 15.497318] The buggy address belongs to the physical page: [ 15.497673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.497947] flags: 0x200000000000000(node=0|zone=2) [ 15.498200] page_type: f5(slab) [ 15.498376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.498928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.499239] page dumped because: kasan: bad access detected [ 15.499860] [ 15.500005] Memory state around the buggy address: [ 15.500214] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.500738] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.501159] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.501442] ^ [ 15.501792] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.502105] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.502400] ================================================================== [ 15.642886] ================================================================== [ 15.643256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.643589] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.643815] [ 15.643905] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.643951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.643963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.643987] Call Trace: [ 15.644007] <TASK> [ 15.644039] dump_stack_lvl+0x73/0xb0 [ 15.644069] print_report+0xd1/0x610 [ 15.644092] ? __virt_addr_valid+0x1db/0x2d0 [ 15.644116] ? kasan_atomics_helper+0x1217/0x5450 [ 15.644138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.644162] ? kasan_atomics_helper+0x1217/0x5450 [ 15.644185] kasan_report+0x141/0x180 [ 15.644208] ? kasan_atomics_helper+0x1217/0x5450 [ 15.644234] kasan_check_range+0x10c/0x1c0 [ 15.644259] __kasan_check_write+0x18/0x20 [ 15.644279] kasan_atomics_helper+0x1217/0x5450 [ 15.644303] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.644326] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.644352] ? kasan_atomics+0x152/0x310 [ 15.644380] kasan_atomics+0x1dc/0x310 [ 15.644403] ? __pfx_kasan_atomics+0x10/0x10 [ 15.644428] ? __pfx_read_tsc+0x10/0x10 [ 15.644449] ? ktime_get_ts64+0x86/0x230 [ 15.644475] kunit_try_run_case+0x1a5/0x480 [ 15.644500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.644548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.644573] ? __kthread_parkme+0x82/0x180 [ 15.644595] ? preempt_count_sub+0x50/0x80 [ 15.644619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.644669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.644695] kthread+0x337/0x6f0 [ 15.644714] ? trace_preempt_on+0x20/0xc0 [ 15.644738] ? __pfx_kthread+0x10/0x10 [ 15.644758] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.644781] ? calculate_sigpending+0x7b/0xa0 [ 15.644806] ? __pfx_kthread+0x10/0x10 [ 15.644827] ret_from_fork+0x116/0x1d0 [ 15.644851] ? __pfx_kthread+0x10/0x10 [ 15.644872] ret_from_fork_asm+0x1a/0x30 [ 15.644903] </TASK> [ 15.644914] [ 15.658823] Allocated by task 282: [ 15.659048] kasan_save_stack+0x45/0x70 [ 15.659276] kasan_save_track+0x18/0x40 [ 15.660065] kasan_save_alloc_info+0x3b/0x50 [ 15.660335] __kasan_kmalloc+0xb7/0xc0 [ 15.660486] __kmalloc_cache_noprof+0x189/0x420 [ 15.660652] kasan_atomics+0x95/0x310 [ 15.660788] kunit_try_run_case+0x1a5/0x480 [ 15.660946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661533] kthread+0x337/0x6f0 [ 15.661718] ret_from_fork+0x116/0x1d0 [ 15.661853] ret_from_fork_asm+0x1a/0x30 [ 15.661997] [ 15.662310] The buggy address belongs to the object at ffff88810342d080 [ 15.662310] which belongs to the cache kmalloc-64 of size 64 [ 15.663458] The buggy address is located 0 bytes to the right of [ 15.663458] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.664207] [ 15.664288] The buggy address belongs to the physical page: [ 15.664657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.665369] flags: 0x200000000000000(node=0|zone=2) [ 15.665858] page_type: f5(slab) [ 15.666188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.666698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.666937] page dumped because: kasan: bad access detected [ 15.667430] [ 15.667630] Memory state around the buggy address: [ 15.667967] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668198] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.668440] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.669154] ^ [ 15.669626] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.670256] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.670882] ================================================================== [ 16.067075] ================================================================== [ 16.067426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.067695] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.067920] [ 16.068034] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.068081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.068094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.068116] Call Trace: [ 16.068136] <TASK> [ 16.068156] dump_stack_lvl+0x73/0xb0 [ 16.068184] print_report+0xd1/0x610 [ 16.068207] ? __virt_addr_valid+0x1db/0x2d0 [ 16.068234] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.068257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.068280] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.068304] kasan_report+0x141/0x180 [ 16.068327] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.068355] kasan_check_range+0x10c/0x1c0 [ 16.068379] __kasan_check_write+0x18/0x20 [ 16.068399] kasan_atomics_helper+0x1d7a/0x5450 [ 16.068423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.068448] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.068474] ? kasan_atomics+0x152/0x310 [ 16.068500] kasan_atomics+0x1dc/0x310 [ 16.068523] ? __pfx_kasan_atomics+0x10/0x10 [ 16.068547] ? __pfx_read_tsc+0x10/0x10 [ 16.068569] ? ktime_get_ts64+0x86/0x230 [ 16.068594] kunit_try_run_case+0x1a5/0x480 [ 16.068620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068643] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.068669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.068693] ? __kthread_parkme+0x82/0x180 [ 16.068714] ? preempt_count_sub+0x50/0x80 [ 16.068740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.068790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.068815] kthread+0x337/0x6f0 [ 16.068835] ? trace_preempt_on+0x20/0xc0 [ 16.068866] ? __pfx_kthread+0x10/0x10 [ 16.068887] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.068923] ? calculate_sigpending+0x7b/0xa0 [ 16.068948] ? __pfx_kthread+0x10/0x10 [ 16.068970] ret_from_fork+0x116/0x1d0 [ 16.068989] ? __pfx_kthread+0x10/0x10 [ 16.069020] ret_from_fork_asm+0x1a/0x30 [ 16.069051] </TASK> [ 16.069062] [ 16.076525] Allocated by task 282: [ 16.076725] kasan_save_stack+0x45/0x70 [ 16.076937] kasan_save_track+0x18/0x40 [ 16.077151] kasan_save_alloc_info+0x3b/0x50 [ 16.077374] __kasan_kmalloc+0xb7/0xc0 [ 16.077590] __kmalloc_cache_noprof+0x189/0x420 [ 16.077780] kasan_atomics+0x95/0x310 [ 16.077910] kunit_try_run_case+0x1a5/0x480 [ 16.078064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.078236] kthread+0x337/0x6f0 [ 16.078388] ret_from_fork+0x116/0x1d0 [ 16.078808] ret_from_fork_asm+0x1a/0x30 [ 16.079008] [ 16.079115] The buggy address belongs to the object at ffff88810342d080 [ 16.079115] which belongs to the cache kmalloc-64 of size 64 [ 16.079835] The buggy address is located 0 bytes to the right of [ 16.079835] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.080286] [ 16.080384] The buggy address belongs to the physical page: [ 16.080750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.081050] flags: 0x200000000000000(node=0|zone=2) [ 16.081265] page_type: f5(slab) [ 16.081437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.081739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.082039] page dumped because: kasan: bad access detected [ 16.082251] [ 16.082326] Memory state around the buggy address: [ 16.082560] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082844] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.083119] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.083388] ^ [ 16.083643] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.083877] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.084161] ================================================================== [ 16.188978] ================================================================== [ 16.189695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.190363] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.190906] [ 16.191132] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.191182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.191194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.191218] Call Trace: [ 16.191240] <TASK> [ 16.191262] dump_stack_lvl+0x73/0xb0 [ 16.191304] print_report+0xd1/0x610 [ 16.191327] ? __virt_addr_valid+0x1db/0x2d0 [ 16.191362] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.191385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.191426] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.191450] kasan_report+0x141/0x180 [ 16.191473] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.191499] __asan_report_load8_noabort+0x18/0x20 [ 16.191525] kasan_atomics_helper+0x4f98/0x5450 [ 16.191549] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.191571] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.191597] ? kasan_atomics+0x152/0x310 [ 16.191624] kasan_atomics+0x1dc/0x310 [ 16.191646] ? __pfx_kasan_atomics+0x10/0x10 [ 16.191671] ? __pfx_read_tsc+0x10/0x10 [ 16.191693] ? ktime_get_ts64+0x86/0x230 [ 16.191719] kunit_try_run_case+0x1a5/0x480 [ 16.191745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.191768] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.191794] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.191818] ? __kthread_parkme+0x82/0x180 [ 16.191840] ? preempt_count_sub+0x50/0x80 [ 16.191864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.191889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.191915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.191941] kthread+0x337/0x6f0 [ 16.191963] ? trace_preempt_on+0x20/0xc0 [ 16.191987] ? __pfx_kthread+0x10/0x10 [ 16.192021] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.192044] ? calculate_sigpending+0x7b/0xa0 [ 16.192069] ? __pfx_kthread+0x10/0x10 [ 16.192091] ret_from_fork+0x116/0x1d0 [ 16.192109] ? __pfx_kthread+0x10/0x10 [ 16.192130] ret_from_fork_asm+0x1a/0x30 [ 16.192162] </TASK> [ 16.192174] [ 16.202703] Allocated by task 282: [ 16.202870] kasan_save_stack+0x45/0x70 [ 16.203178] kasan_save_track+0x18/0x40 [ 16.203337] kasan_save_alloc_info+0x3b/0x50 [ 16.203573] __kasan_kmalloc+0xb7/0xc0 [ 16.203782] __kmalloc_cache_noprof+0x189/0x420 [ 16.204002] kasan_atomics+0x95/0x310 [ 16.204203] kunit_try_run_case+0x1a5/0x480 [ 16.204428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.204670] kthread+0x337/0x6f0 [ 16.204792] ret_from_fork+0x116/0x1d0 [ 16.204932] ret_from_fork_asm+0x1a/0x30 [ 16.205090] [ 16.205209] The buggy address belongs to the object at ffff88810342d080 [ 16.205209] which belongs to the cache kmalloc-64 of size 64 [ 16.205764] The buggy address is located 0 bytes to the right of [ 16.205764] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.206300] [ 16.206425] The buggy address belongs to the physical page: [ 16.206599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.206927] flags: 0x200000000000000(node=0|zone=2) [ 16.207199] page_type: f5(slab) [ 16.207375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.207718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.208056] page dumped because: kasan: bad access detected [ 16.208295] [ 16.208394] Memory state around the buggy address: [ 16.208633] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.208951] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.209251] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.209572] ^ [ 16.209729] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.210115] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.210362] ================================================================== [ 15.503389] ================================================================== [ 15.504112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.504448] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.504934] [ 15.505309] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.505423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.505437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.505461] Call Trace: [ 15.505481] <TASK> [ 15.505503] dump_stack_lvl+0x73/0xb0 [ 15.505636] print_report+0xd1/0x610 [ 15.505662] ? __virt_addr_valid+0x1db/0x2d0 [ 15.505688] ? kasan_atomics_helper+0xf10/0x5450 [ 15.505710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.505739] ? kasan_atomics_helper+0xf10/0x5450 [ 15.505762] kasan_report+0x141/0x180 [ 15.505785] ? kasan_atomics_helper+0xf10/0x5450 [ 15.505812] kasan_check_range+0x10c/0x1c0 [ 15.505838] __kasan_check_write+0x18/0x20 [ 15.505861] kasan_atomics_helper+0xf10/0x5450 [ 15.505886] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.505911] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.505938] ? kasan_atomics+0x152/0x310 [ 15.505965] kasan_atomics+0x1dc/0x310 [ 15.505987] ? __pfx_kasan_atomics+0x10/0x10 [ 15.506024] ? __pfx_read_tsc+0x10/0x10 [ 15.506046] ? ktime_get_ts64+0x86/0x230 [ 15.506072] kunit_try_run_case+0x1a5/0x480 [ 15.506099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.506122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.506147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.506172] ? __kthread_parkme+0x82/0x180 [ 15.506193] ? preempt_count_sub+0x50/0x80 [ 15.506219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.506243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.506268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.506293] kthread+0x337/0x6f0 [ 15.506312] ? trace_preempt_on+0x20/0xc0 [ 15.506335] ? __pfx_kthread+0x10/0x10 [ 15.506356] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.506378] ? calculate_sigpending+0x7b/0xa0 [ 15.506403] ? __pfx_kthread+0x10/0x10 [ 15.506425] ret_from_fork+0x116/0x1d0 [ 15.506445] ? __pfx_kthread+0x10/0x10 [ 15.506466] ret_from_fork_asm+0x1a/0x30 [ 15.506498] </TASK> [ 15.506509] [ 15.519787] Allocated by task 282: [ 15.519947] kasan_save_stack+0x45/0x70 [ 15.520129] kasan_save_track+0x18/0x40 [ 15.520267] kasan_save_alloc_info+0x3b/0x50 [ 15.520417] __kasan_kmalloc+0xb7/0xc0 [ 15.520756] __kmalloc_cache_noprof+0x189/0x420 [ 15.521170] kasan_atomics+0x95/0x310 [ 15.521495] kunit_try_run_case+0x1a5/0x480 [ 15.521945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.522419] kthread+0x337/0x6f0 [ 15.522732] ret_from_fork+0x116/0x1d0 [ 15.523089] ret_from_fork_asm+0x1a/0x30 [ 15.523458] [ 15.523616] The buggy address belongs to the object at ffff88810342d080 [ 15.523616] which belongs to the cache kmalloc-64 of size 64 [ 15.524674] The buggy address is located 0 bytes to the right of [ 15.524674] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.525791] [ 15.525952] The buggy address belongs to the physical page: [ 15.526156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.526400] flags: 0x200000000000000(node=0|zone=2) [ 15.526846] page_type: f5(slab) [ 15.527151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.527981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.528800] page dumped because: kasan: bad access detected [ 15.529243] [ 15.529315] Memory state around the buggy address: [ 15.529540] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.530154] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.530878] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.531211] ^ [ 15.531370] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.531921] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532544] ================================================================== [ 15.710133] ================================================================== [ 15.710536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.710858] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.711187] [ 15.711305] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.711352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.711364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.711387] Call Trace: [ 15.711455] <TASK> [ 15.711477] dump_stack_lvl+0x73/0xb0 [ 15.711509] print_report+0xd1/0x610 [ 15.711543] ? __virt_addr_valid+0x1db/0x2d0 [ 15.711567] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.711589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.711613] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.711636] kasan_report+0x141/0x180 [ 15.711659] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.711685] __asan_report_load4_noabort+0x18/0x20 [ 15.711710] kasan_atomics_helper+0x49ce/0x5450 [ 15.711736] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.711759] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.711801] ? kasan_atomics+0x152/0x310 [ 15.711828] kasan_atomics+0x1dc/0x310 [ 15.711852] ? __pfx_kasan_atomics+0x10/0x10 [ 15.711876] ? __pfx_read_tsc+0x10/0x10 [ 15.711899] ? ktime_get_ts64+0x86/0x230 [ 15.711924] kunit_try_run_case+0x1a5/0x480 [ 15.711950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.711973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.711999] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.712033] ? __kthread_parkme+0x82/0x180 [ 15.712055] ? preempt_count_sub+0x50/0x80 [ 15.712080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.712104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.712128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.712153] kthread+0x337/0x6f0 [ 15.712173] ? trace_preempt_on+0x20/0xc0 [ 15.712197] ? __pfx_kthread+0x10/0x10 [ 15.712218] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.712240] ? calculate_sigpending+0x7b/0xa0 [ 15.712265] ? __pfx_kthread+0x10/0x10 [ 15.712286] ret_from_fork+0x116/0x1d0 [ 15.712306] ? __pfx_kthread+0x10/0x10 [ 15.712327] ret_from_fork_asm+0x1a/0x30 [ 15.712358] </TASK> [ 15.712368] [ 15.719792] Allocated by task 282: [ 15.719997] kasan_save_stack+0x45/0x70 [ 15.720218] kasan_save_track+0x18/0x40 [ 15.720373] kasan_save_alloc_info+0x3b/0x50 [ 15.720562] __kasan_kmalloc+0xb7/0xc0 [ 15.720737] __kmalloc_cache_noprof+0x189/0x420 [ 15.720917] kasan_atomics+0x95/0x310 [ 15.721180] kunit_try_run_case+0x1a5/0x480 [ 15.721326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.721521] kthread+0x337/0x6f0 [ 15.721640] ret_from_fork+0x116/0x1d0 [ 15.721769] ret_from_fork_asm+0x1a/0x30 [ 15.721904] [ 15.722030] The buggy address belongs to the object at ffff88810342d080 [ 15.722030] which belongs to the cache kmalloc-64 of size 64 [ 15.722586] The buggy address is located 0 bytes to the right of [ 15.722586] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.723124] [ 15.723222] The buggy address belongs to the physical page: [ 15.723488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.723721] flags: 0x200000000000000(node=0|zone=2) [ 15.723881] page_type: f5(slab) [ 15.724005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.724240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.724483] page dumped because: kasan: bad access detected [ 15.724736] [ 15.724886] Memory state around the buggy address: [ 15.725131] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.725483] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.725810] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.726139] ^ [ 15.726474] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726802] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.727132] ================================================================== [ 15.991323] ================================================================== [ 15.992069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.992347] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.992814] [ 15.992913] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.992959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.992972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.992995] Call Trace: [ 15.993027] <TASK> [ 15.993048] dump_stack_lvl+0x73/0xb0 [ 15.993079] print_report+0xd1/0x610 [ 15.993102] ? __virt_addr_valid+0x1db/0x2d0 [ 15.993126] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.993148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.993172] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.993195] kasan_report+0x141/0x180 [ 15.993218] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.993245] kasan_check_range+0x10c/0x1c0 [ 15.993269] __kasan_check_write+0x18/0x20 [ 15.993289] kasan_atomics_helper+0x1b22/0x5450 [ 15.993312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.993335] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.993362] ? kasan_atomics+0x152/0x310 [ 15.993388] kasan_atomics+0x1dc/0x310 [ 15.993411] ? __pfx_kasan_atomics+0x10/0x10 [ 15.993435] ? __pfx_read_tsc+0x10/0x10 [ 15.993457] ? ktime_get_ts64+0x86/0x230 [ 15.993482] kunit_try_run_case+0x1a5/0x480 [ 15.993508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.993557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.993583] ? __kthread_parkme+0x82/0x180 [ 15.993604] ? preempt_count_sub+0x50/0x80 [ 15.993629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.993678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.993703] kthread+0x337/0x6f0 [ 15.993722] ? trace_preempt_on+0x20/0xc0 [ 15.993746] ? __pfx_kthread+0x10/0x10 [ 15.993767] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.993789] ? calculate_sigpending+0x7b/0xa0 [ 15.993814] ? __pfx_kthread+0x10/0x10 [ 15.993835] ret_from_fork+0x116/0x1d0 [ 15.993854] ? __pfx_kthread+0x10/0x10 [ 15.993874] ret_from_fork_asm+0x1a/0x30 [ 15.993906] </TASK> [ 15.993917] [ 16.001901] Allocated by task 282: [ 16.002110] kasan_save_stack+0x45/0x70 [ 16.002320] kasan_save_track+0x18/0x40 [ 16.002616] kasan_save_alloc_info+0x3b/0x50 [ 16.002851] __kasan_kmalloc+0xb7/0xc0 [ 16.003058] __kmalloc_cache_noprof+0x189/0x420 [ 16.003279] kasan_atomics+0x95/0x310 [ 16.003469] kunit_try_run_case+0x1a5/0x480 [ 16.003618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.003789] kthread+0x337/0x6f0 [ 16.003908] ret_from_fork+0x116/0x1d0 [ 16.004049] ret_from_fork_asm+0x1a/0x30 [ 16.004187] [ 16.004259] The buggy address belongs to the object at ffff88810342d080 [ 16.004259] which belongs to the cache kmalloc-64 of size 64 [ 16.004598] The buggy address is located 0 bytes to the right of [ 16.004598] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.004956] [ 16.005039] The buggy address belongs to the physical page: [ 16.005292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.005650] flags: 0x200000000000000(node=0|zone=2) [ 16.005881] page_type: f5(slab) [ 16.006061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.006502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.006847] page dumped because: kasan: bad access detected [ 16.007115] [ 16.007210] Memory state around the buggy address: [ 16.007485] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.007836] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.008198] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.008555] ^ [ 16.008789] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.009100] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.009386] ================================================================== [ 15.766770] ================================================================== [ 15.767250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.767599] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.767881] [ 15.767994] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.768050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.768063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.768085] Call Trace: [ 15.768105] <TASK> [ 15.768126] dump_stack_lvl+0x73/0xb0 [ 15.768166] print_report+0xd1/0x610 [ 15.768190] ? __virt_addr_valid+0x1db/0x2d0 [ 15.768214] ? kasan_atomics_helper+0x1467/0x5450 [ 15.768248] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.768272] ? kasan_atomics_helper+0x1467/0x5450 [ 15.768306] kasan_report+0x141/0x180 [ 15.768329] ? kasan_atomics_helper+0x1467/0x5450 [ 15.768359] kasan_check_range+0x10c/0x1c0 [ 15.768383] __kasan_check_write+0x18/0x20 [ 15.768404] kasan_atomics_helper+0x1467/0x5450 [ 15.768447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.768471] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.768498] ? kasan_atomics+0x152/0x310 [ 15.768526] kasan_atomics+0x1dc/0x310 [ 15.768549] ? __pfx_kasan_atomics+0x10/0x10 [ 15.768574] ? __pfx_read_tsc+0x10/0x10 [ 15.768595] ? ktime_get_ts64+0x86/0x230 [ 15.768621] kunit_try_run_case+0x1a5/0x480 [ 15.768657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.768679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.768715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.768748] ? __kthread_parkme+0x82/0x180 [ 15.768769] ? preempt_count_sub+0x50/0x80 [ 15.768795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.768831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.768859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.768894] kthread+0x337/0x6f0 [ 15.768914] ? trace_preempt_on+0x20/0xc0 [ 15.768937] ? __pfx_kthread+0x10/0x10 [ 15.768958] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.768981] ? calculate_sigpending+0x7b/0xa0 [ 15.769006] ? __pfx_kthread+0x10/0x10 [ 15.769036] ret_from_fork+0x116/0x1d0 [ 15.769055] ? __pfx_kthread+0x10/0x10 [ 15.769075] ret_from_fork_asm+0x1a/0x30 [ 15.769116] </TASK> [ 15.769126] [ 15.776492] Allocated by task 282: [ 15.776640] kasan_save_stack+0x45/0x70 [ 15.776794] kasan_save_track+0x18/0x40 [ 15.776959] kasan_save_alloc_info+0x3b/0x50 [ 15.777184] __kasan_kmalloc+0xb7/0xc0 [ 15.777399] __kmalloc_cache_noprof+0x189/0x420 [ 15.777644] kasan_atomics+0x95/0x310 [ 15.777844] kunit_try_run_case+0x1a5/0x480 [ 15.778074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.778350] kthread+0x337/0x6f0 [ 15.778537] ret_from_fork+0x116/0x1d0 [ 15.778750] ret_from_fork_asm+0x1a/0x30 [ 15.778927] [ 15.779026] The buggy address belongs to the object at ffff88810342d080 [ 15.779026] which belongs to the cache kmalloc-64 of size 64 [ 15.779530] The buggy address is located 0 bytes to the right of [ 15.779530] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.780053] [ 15.780157] The buggy address belongs to the physical page: [ 15.780394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.780679] flags: 0x200000000000000(node=0|zone=2) [ 15.780853] page_type: f5(slab) [ 15.780977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.781220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.781515] page dumped because: kasan: bad access detected [ 15.781776] [ 15.781868] Memory state around the buggy address: [ 15.782102] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.782436] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.782773] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.783091] ^ [ 15.783317] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.783678] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.783984] ================================================================== [ 15.276111] ================================================================== [ 15.276431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.276781] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.277034] [ 15.277126] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.277174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.277187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.277209] Call Trace: [ 15.277229] <TASK> [ 15.277250] dump_stack_lvl+0x73/0xb0 [ 15.277278] print_report+0xd1/0x610 [ 15.277301] ? __virt_addr_valid+0x1db/0x2d0 [ 15.277324] ? kasan_atomics_helper+0x992/0x5450 [ 15.277344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.277367] ? kasan_atomics_helper+0x992/0x5450 [ 15.277388] kasan_report+0x141/0x180 [ 15.277410] ? kasan_atomics_helper+0x992/0x5450 [ 15.277436] kasan_check_range+0x10c/0x1c0 [ 15.277472] __kasan_check_write+0x18/0x20 [ 15.277502] kasan_atomics_helper+0x992/0x5450 [ 15.277525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.277561] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.277587] ? kasan_atomics+0x152/0x310 [ 15.277614] kasan_atomics+0x1dc/0x310 [ 15.277637] ? __pfx_kasan_atomics+0x10/0x10 [ 15.277661] ? __pfx_read_tsc+0x10/0x10 [ 15.277685] ? ktime_get_ts64+0x86/0x230 [ 15.277710] kunit_try_run_case+0x1a5/0x480 [ 15.277736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.277759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.277785] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.277809] ? __kthread_parkme+0x82/0x180 [ 15.277831] ? preempt_count_sub+0x50/0x80 [ 15.277856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.277880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.277906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.277932] kthread+0x337/0x6f0 [ 15.277953] ? trace_preempt_on+0x20/0xc0 [ 15.277977] ? __pfx_kthread+0x10/0x10 [ 15.277998] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.278032] ? calculate_sigpending+0x7b/0xa0 [ 15.278057] ? __pfx_kthread+0x10/0x10 [ 15.278079] ret_from_fork+0x116/0x1d0 [ 15.278098] ? __pfx_kthread+0x10/0x10 [ 15.278119] ret_from_fork_asm+0x1a/0x30 [ 15.278151] </TASK> [ 15.278163] [ 15.286107] Allocated by task 282: [ 15.286321] kasan_save_stack+0x45/0x70 [ 15.286594] kasan_save_track+0x18/0x40 [ 15.286783] kasan_save_alloc_info+0x3b/0x50 [ 15.286988] __kasan_kmalloc+0xb7/0xc0 [ 15.287144] __kmalloc_cache_noprof+0x189/0x420 [ 15.287340] kasan_atomics+0x95/0x310 [ 15.287594] kunit_try_run_case+0x1a5/0x480 [ 15.287789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.288047] kthread+0x337/0x6f0 [ 15.288242] ret_from_fork+0x116/0x1d0 [ 15.288398] ret_from_fork_asm+0x1a/0x30 [ 15.288633] [ 15.288725] The buggy address belongs to the object at ffff88810342d080 [ 15.288725] which belongs to the cache kmalloc-64 of size 64 [ 15.289230] The buggy address is located 0 bytes to the right of [ 15.289230] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.289800] [ 15.289925] The buggy address belongs to the physical page: [ 15.290132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.290376] flags: 0x200000000000000(node=0|zone=2) [ 15.290849] page_type: f5(slab) [ 15.291052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.291394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.291732] page dumped because: kasan: bad access detected [ 15.291987] [ 15.292097] Memory state around the buggy address: [ 15.292298] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.292617] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.292921] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.293247] ^ [ 15.293491] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.293804] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.294122] ================================================================== [ 16.010168] ================================================================== [ 16.010889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.011747] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.012137] [ 16.012234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.012283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.012296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.012320] Call Trace: [ 16.012342] <TASK> [ 16.012363] dump_stack_lvl+0x73/0xb0 [ 16.012394] print_report+0xd1/0x610 [ 16.012418] ? __virt_addr_valid+0x1db/0x2d0 [ 16.012442] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.012464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.012488] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.012512] kasan_report+0x141/0x180 [ 16.012534] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.012561] kasan_check_range+0x10c/0x1c0 [ 16.012586] __kasan_check_write+0x18/0x20 [ 16.012606] kasan_atomics_helper+0x1c18/0x5450 [ 16.012630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.012653] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.012679] ? kasan_atomics+0x152/0x310 [ 16.012706] kasan_atomics+0x1dc/0x310 [ 16.012728] ? __pfx_kasan_atomics+0x10/0x10 [ 16.012753] ? __pfx_read_tsc+0x10/0x10 [ 16.012775] ? ktime_get_ts64+0x86/0x230 [ 16.012801] kunit_try_run_case+0x1a5/0x480 [ 16.012828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.012855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.012881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.012907] ? __kthread_parkme+0x82/0x180 [ 16.012928] ? preempt_count_sub+0x50/0x80 [ 16.012953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.012977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.013001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.013039] kthread+0x337/0x6f0 [ 16.013058] ? trace_preempt_on+0x20/0xc0 [ 16.013083] ? __pfx_kthread+0x10/0x10 [ 16.013104] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.013127] ? calculate_sigpending+0x7b/0xa0 [ 16.013151] ? __pfx_kthread+0x10/0x10 [ 16.013172] ret_from_fork+0x116/0x1d0 [ 16.013192] ? __pfx_kthread+0x10/0x10 [ 16.013212] ret_from_fork_asm+0x1a/0x30 [ 16.013243] </TASK> [ 16.013254] [ 16.021410] Allocated by task 282: [ 16.021606] kasan_save_stack+0x45/0x70 [ 16.021815] kasan_save_track+0x18/0x40 [ 16.022035] kasan_save_alloc_info+0x3b/0x50 [ 16.022230] __kasan_kmalloc+0xb7/0xc0 [ 16.022366] __kmalloc_cache_noprof+0x189/0x420 [ 16.022795] kasan_atomics+0x95/0x310 [ 16.023003] kunit_try_run_case+0x1a5/0x480 [ 16.023211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.023387] kthread+0x337/0x6f0 [ 16.023721] ret_from_fork+0x116/0x1d0 [ 16.023910] ret_from_fork_asm+0x1a/0x30 [ 16.024064] [ 16.024137] The buggy address belongs to the object at ffff88810342d080 [ 16.024137] which belongs to the cache kmalloc-64 of size 64 [ 16.024653] The buggy address is located 0 bytes to the right of [ 16.024653] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.025198] [ 16.025276] The buggy address belongs to the physical page: [ 16.025524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.025902] flags: 0x200000000000000(node=0|zone=2) [ 16.026149] page_type: f5(slab) [ 16.026322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.026772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.027118] page dumped because: kasan: bad access detected [ 16.027306] [ 16.027378] Memory state around the buggy address: [ 16.027792] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.028131] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.028393] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.028608] ^ [ 16.028764] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.028987] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.029316] ================================================================== [ 16.120959] ================================================================== [ 16.121280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.122224] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.122564] [ 16.122665] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.122714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.122727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.122750] Call Trace: [ 16.122774] <TASK> [ 16.122795] dump_stack_lvl+0x73/0xb0 [ 16.122830] print_report+0xd1/0x610 [ 16.122855] ? __virt_addr_valid+0x1db/0x2d0 [ 16.122880] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.122902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.122925] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.122947] kasan_report+0x141/0x180 [ 16.122970] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.122997] kasan_check_range+0x10c/0x1c0 [ 16.123034] __kasan_check_write+0x18/0x20 [ 16.123054] kasan_atomics_helper+0x1f43/0x5450 [ 16.123078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.123101] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.123127] ? kasan_atomics+0x152/0x310 [ 16.123154] kasan_atomics+0x1dc/0x310 [ 16.123177] ? __pfx_kasan_atomics+0x10/0x10 [ 16.123201] ? __pfx_read_tsc+0x10/0x10 [ 16.123223] ? ktime_get_ts64+0x86/0x230 [ 16.123248] kunit_try_run_case+0x1a5/0x480 [ 16.123274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.123297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.123322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.123356] ? __kthread_parkme+0x82/0x180 [ 16.123379] ? preempt_count_sub+0x50/0x80 [ 16.123404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.123440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.123493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.123518] kthread+0x337/0x6f0 [ 16.123538] ? trace_preempt_on+0x20/0xc0 [ 16.123563] ? __pfx_kthread+0x10/0x10 [ 16.123585] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.123608] ? calculate_sigpending+0x7b/0xa0 [ 16.123633] ? __pfx_kthread+0x10/0x10 [ 16.123655] ret_from_fork+0x116/0x1d0 [ 16.123675] ? __pfx_kthread+0x10/0x10 [ 16.123695] ret_from_fork_asm+0x1a/0x30 [ 16.123728] </TASK> [ 16.123740] [ 16.131265] Allocated by task 282: [ 16.131460] kasan_save_stack+0x45/0x70 [ 16.131836] kasan_save_track+0x18/0x40 [ 16.131969] kasan_save_alloc_info+0x3b/0x50 [ 16.132186] __kasan_kmalloc+0xb7/0xc0 [ 16.132391] __kmalloc_cache_noprof+0x189/0x420 [ 16.132620] kasan_atomics+0x95/0x310 [ 16.132771] kunit_try_run_case+0x1a5/0x480 [ 16.132919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.133143] kthread+0x337/0x6f0 [ 16.133310] ret_from_fork+0x116/0x1d0 [ 16.133573] ret_from_fork_asm+0x1a/0x30 [ 16.133766] [ 16.133863] The buggy address belongs to the object at ffff88810342d080 [ 16.133863] which belongs to the cache kmalloc-64 of size 64 [ 16.134313] The buggy address is located 0 bytes to the right of [ 16.134313] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.134941] [ 16.135034] The buggy address belongs to the physical page: [ 16.135204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.135436] flags: 0x200000000000000(node=0|zone=2) [ 16.135599] page_type: f5(slab) [ 16.135722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.135945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.136175] page dumped because: kasan: bad access detected [ 16.136343] [ 16.136410] Memory state around the buggy address: [ 16.136622] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.136936] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.137475] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.137783] ^ [ 16.137998] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.138315] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.138616] ================================================================== [ 16.101830] ================================================================== [ 16.102149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.102455] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.102758] [ 16.102876] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.102922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.102933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.102956] Call Trace: [ 16.102976] <TASK> [ 16.102996] dump_stack_lvl+0x73/0xb0 [ 16.103039] print_report+0xd1/0x610 [ 16.103062] ? __virt_addr_valid+0x1db/0x2d0 [ 16.103085] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.103107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.103131] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.103154] kasan_report+0x141/0x180 [ 16.103177] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.103203] kasan_check_range+0x10c/0x1c0 [ 16.103227] __kasan_check_write+0x18/0x20 [ 16.103247] kasan_atomics_helper+0x1eaa/0x5450 [ 16.103271] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.103294] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.103319] ? kasan_atomics+0x152/0x310 [ 16.103346] kasan_atomics+0x1dc/0x310 [ 16.103369] ? __pfx_kasan_atomics+0x10/0x10 [ 16.103393] ? __pfx_read_tsc+0x10/0x10 [ 16.103415] ? ktime_get_ts64+0x86/0x230 [ 16.103451] kunit_try_run_case+0x1a5/0x480 [ 16.103477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.103499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.103524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.103549] ? __kthread_parkme+0x82/0x180 [ 16.103571] ? preempt_count_sub+0x50/0x80 [ 16.103596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.103620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.103645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.103671] kthread+0x337/0x6f0 [ 16.103691] ? trace_preempt_on+0x20/0xc0 [ 16.103715] ? __pfx_kthread+0x10/0x10 [ 16.103735] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.103760] ? calculate_sigpending+0x7b/0xa0 [ 16.103785] ? __pfx_kthread+0x10/0x10 [ 16.103807] ret_from_fork+0x116/0x1d0 [ 16.103826] ? __pfx_kthread+0x10/0x10 [ 16.103846] ret_from_fork_asm+0x1a/0x30 [ 16.103878] </TASK> [ 16.103889] [ 16.111773] Allocated by task 282: [ 16.111932] kasan_save_stack+0x45/0x70 [ 16.112095] kasan_save_track+0x18/0x40 [ 16.112265] kasan_save_alloc_info+0x3b/0x50 [ 16.112533] __kasan_kmalloc+0xb7/0xc0 [ 16.112723] __kmalloc_cache_noprof+0x189/0x420 [ 16.112956] kasan_atomics+0x95/0x310 [ 16.113105] kunit_try_run_case+0x1a5/0x480 [ 16.113315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.113498] kthread+0x337/0x6f0 [ 16.113619] ret_from_fork+0x116/0x1d0 [ 16.113749] ret_from_fork_asm+0x1a/0x30 [ 16.113886] [ 16.113957] The buggy address belongs to the object at ffff88810342d080 [ 16.113957] which belongs to the cache kmalloc-64 of size 64 [ 16.114828] The buggy address is located 0 bytes to the right of [ 16.114828] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.115397] [ 16.115569] The buggy address belongs to the physical page: [ 16.115801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.116067] flags: 0x200000000000000(node=0|zone=2) [ 16.116230] page_type: f5(slab) [ 16.116350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.116879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.117366] page dumped because: kasan: bad access detected [ 16.117823] [ 16.117922] Memory state around the buggy address: [ 16.118181] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.118438] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.118808] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.119137] ^ [ 16.119361] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.119696] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.119984] ================================================================== [ 15.147920] ================================================================== [ 15.148872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.149392] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.149999] [ 15.150240] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.150288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.150310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.150332] Call Trace: [ 15.150354] <TASK> [ 15.150385] dump_stack_lvl+0x73/0xb0 [ 15.150417] print_report+0xd1/0x610 [ 15.150440] ? __virt_addr_valid+0x1db/0x2d0 [ 15.150465] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.150486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.150511] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.150542] kasan_report+0x141/0x180 [ 15.150564] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.150591] kasan_check_range+0x10c/0x1c0 [ 15.150627] __kasan_check_write+0x18/0x20 [ 15.150646] kasan_atomics_helper+0x5fe/0x5450 [ 15.150670] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.150694] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.150720] ? kasan_atomics+0x152/0x310 [ 15.150748] kasan_atomics+0x1dc/0x310 [ 15.150771] ? __pfx_kasan_atomics+0x10/0x10 [ 15.150796] ? __pfx_read_tsc+0x10/0x10 [ 15.150817] ? ktime_get_ts64+0x86/0x230 [ 15.150843] kunit_try_run_case+0x1a5/0x480 [ 15.150869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.150892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.150918] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.150942] ? __kthread_parkme+0x82/0x180 [ 15.150964] ? preempt_count_sub+0x50/0x80 [ 15.150988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.151022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.151050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.151075] kthread+0x337/0x6f0 [ 15.151095] ? trace_preempt_on+0x20/0xc0 [ 15.151119] ? __pfx_kthread+0x10/0x10 [ 15.151139] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.151162] ? calculate_sigpending+0x7b/0xa0 [ 15.151187] ? __pfx_kthread+0x10/0x10 [ 15.151209] ret_from_fork+0x116/0x1d0 [ 15.151228] ? __pfx_kthread+0x10/0x10 [ 15.151248] ret_from_fork_asm+0x1a/0x30 [ 15.151280] </TASK> [ 15.151292] [ 15.163059] Allocated by task 282: [ 15.163216] kasan_save_stack+0x45/0x70 [ 15.163374] kasan_save_track+0x18/0x40 [ 15.163696] kasan_save_alloc_info+0x3b/0x50 [ 15.164088] __kasan_kmalloc+0xb7/0xc0 [ 15.164424] __kmalloc_cache_noprof+0x189/0x420 [ 15.164913] kasan_atomics+0x95/0x310 [ 15.165276] kunit_try_run_case+0x1a5/0x480 [ 15.165694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.166259] kthread+0x337/0x6f0 [ 15.166620] ret_from_fork+0x116/0x1d0 [ 15.167035] ret_from_fork_asm+0x1a/0x30 [ 15.167405] [ 15.167580] The buggy address belongs to the object at ffff88810342d080 [ 15.167580] which belongs to the cache kmalloc-64 of size 64 [ 15.168314] The buggy address is located 0 bytes to the right of [ 15.168314] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.168705] [ 15.168781] The buggy address belongs to the physical page: [ 15.168961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.169216] flags: 0x200000000000000(node=0|zone=2) [ 15.169383] page_type: f5(slab) [ 15.169559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.169790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.170292] page dumped because: kasan: bad access detected [ 15.170558] [ 15.170655] Memory state around the buggy address: [ 15.170869] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.171171] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.171508] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.171798] ^ [ 15.172038] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.172354] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.172671] ================================================================== [ 15.875824] ================================================================== [ 15.876375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.876812] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.877176] [ 15.877294] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.877342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.877355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.877378] Call Trace: [ 15.877399] <TASK> [ 15.877438] dump_stack_lvl+0x73/0xb0 [ 15.877471] print_report+0xd1/0x610 [ 15.877494] ? __virt_addr_valid+0x1db/0x2d0 [ 15.877519] ? kasan_atomics_helper+0x177f/0x5450 [ 15.877541] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.877565] ? kasan_atomics_helper+0x177f/0x5450 [ 15.877589] kasan_report+0x141/0x180 [ 15.877611] ? kasan_atomics_helper+0x177f/0x5450 [ 15.877639] kasan_check_range+0x10c/0x1c0 [ 15.877665] __kasan_check_write+0x18/0x20 [ 15.877685] kasan_atomics_helper+0x177f/0x5450 [ 15.877709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.877732] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.877759] ? kasan_atomics+0x152/0x310 [ 15.877786] kasan_atomics+0x1dc/0x310 [ 15.877810] ? __pfx_kasan_atomics+0x10/0x10 [ 15.877835] ? __pfx_read_tsc+0x10/0x10 [ 15.877857] ? ktime_get_ts64+0x86/0x230 [ 15.877883] kunit_try_run_case+0x1a5/0x480 [ 15.877910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.877933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.877959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.877983] ? __kthread_parkme+0x82/0x180 [ 15.878004] ? preempt_count_sub+0x50/0x80 [ 15.878039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.878063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.878087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.878113] kthread+0x337/0x6f0 [ 15.878132] ? trace_preempt_on+0x20/0xc0 [ 15.878156] ? __pfx_kthread+0x10/0x10 [ 15.878177] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.878198] ? calculate_sigpending+0x7b/0xa0 [ 15.878223] ? __pfx_kthread+0x10/0x10 [ 15.878244] ret_from_fork+0x116/0x1d0 [ 15.878264] ? __pfx_kthread+0x10/0x10 [ 15.878296] ret_from_fork_asm+0x1a/0x30 [ 15.878327] </TASK> [ 15.878338] [ 15.886408] Allocated by task 282: [ 15.886607] kasan_save_stack+0x45/0x70 [ 15.886818] kasan_save_track+0x18/0x40 [ 15.887007] kasan_save_alloc_info+0x3b/0x50 [ 15.887229] __kasan_kmalloc+0xb7/0xc0 [ 15.887413] __kmalloc_cache_noprof+0x189/0x420 [ 15.887649] kasan_atomics+0x95/0x310 [ 15.887834] kunit_try_run_case+0x1a5/0x480 [ 15.888022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.888201] kthread+0x337/0x6f0 [ 15.888360] ret_from_fork+0x116/0x1d0 [ 15.888693] ret_from_fork_asm+0x1a/0x30 [ 15.888899] [ 15.888991] The buggy address belongs to the object at ffff88810342d080 [ 15.888991] which belongs to the cache kmalloc-64 of size 64 [ 15.889466] The buggy address is located 0 bytes to the right of [ 15.889466] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.889932] [ 15.890040] The buggy address belongs to the physical page: [ 15.890294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.890643] flags: 0x200000000000000(node=0|zone=2) [ 15.890812] page_type: f5(slab) [ 15.890937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.891182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.891410] page dumped because: kasan: bad access detected [ 15.891643] [ 15.891733] Memory state around the buggy address: [ 15.891957] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.892279] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.892595] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.892854] ^ [ 15.893018] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.893234] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.893564] ================================================================== [ 15.727838] ================================================================== [ 15.728286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.728764] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.729104] [ 15.729251] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.729311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.729324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.729346] Call Trace: [ 15.729366] <TASK> [ 15.729386] dump_stack_lvl+0x73/0xb0 [ 15.729437] print_report+0xd1/0x610 [ 15.729461] ? __virt_addr_valid+0x1db/0x2d0 [ 15.729485] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.729508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.729532] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.729555] kasan_report+0x141/0x180 [ 15.729578] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.729605] kasan_check_range+0x10c/0x1c0 [ 15.729629] __kasan_check_read+0x15/0x20 [ 15.729649] kasan_atomics_helper+0x13b5/0x5450 [ 15.729673] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.729695] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.729721] ? kasan_atomics+0x152/0x310 [ 15.729748] kasan_atomics+0x1dc/0x310 [ 15.729771] ? __pfx_kasan_atomics+0x10/0x10 [ 15.729796] ? __pfx_read_tsc+0x10/0x10 [ 15.729817] ? ktime_get_ts64+0x86/0x230 [ 15.729843] kunit_try_run_case+0x1a5/0x480 [ 15.729868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.729891] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.729916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.729941] ? __kthread_parkme+0x82/0x180 [ 15.729962] ? preempt_count_sub+0x50/0x80 [ 15.729987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.730020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.730048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.730106] kthread+0x337/0x6f0 [ 15.730127] ? trace_preempt_on+0x20/0xc0 [ 15.730151] ? __pfx_kthread+0x10/0x10 [ 15.730183] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.730206] ? calculate_sigpending+0x7b/0xa0 [ 15.730231] ? __pfx_kthread+0x10/0x10 [ 15.730252] ret_from_fork+0x116/0x1d0 [ 15.730272] ? __pfx_kthread+0x10/0x10 [ 15.730293] ret_from_fork_asm+0x1a/0x30 [ 15.730353] </TASK> [ 15.730363] [ 15.738717] Allocated by task 282: [ 15.738913] kasan_save_stack+0x45/0x70 [ 15.739150] kasan_save_track+0x18/0x40 [ 15.739364] kasan_save_alloc_info+0x3b/0x50 [ 15.739543] __kasan_kmalloc+0xb7/0xc0 [ 15.739736] __kmalloc_cache_noprof+0x189/0x420 [ 15.740036] kasan_atomics+0x95/0x310 [ 15.740207] kunit_try_run_case+0x1a5/0x480 [ 15.740406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.740652] kthread+0x337/0x6f0 [ 15.740826] ret_from_fork+0x116/0x1d0 [ 15.741057] ret_from_fork_asm+0x1a/0x30 [ 15.741265] [ 15.741335] The buggy address belongs to the object at ffff88810342d080 [ 15.741335] which belongs to the cache kmalloc-64 of size 64 [ 15.741940] The buggy address is located 0 bytes to the right of [ 15.741940] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.742473] [ 15.742608] The buggy address belongs to the physical page: [ 15.742885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.743204] flags: 0x200000000000000(node=0|zone=2) [ 15.743491] page_type: f5(slab) [ 15.743614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.743837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.744125] page dumped because: kasan: bad access detected [ 15.744383] [ 15.744501] Memory state around the buggy address: [ 15.744717] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.745037] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.745342] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.745636] ^ [ 15.745789] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746102] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746555] ================================================================== [ 15.972637] ================================================================== [ 15.972987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.973693] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.974046] [ 15.974158] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.974205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.974239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.974262] Call Trace: [ 15.974283] <TASK> [ 15.974303] dump_stack_lvl+0x73/0xb0 [ 15.974333] print_report+0xd1/0x610 [ 15.974356] ? __virt_addr_valid+0x1db/0x2d0 [ 15.974380] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.974402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.974453] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.974476] kasan_report+0x141/0x180 [ 15.974498] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.974525] kasan_check_range+0x10c/0x1c0 [ 15.974550] __kasan_check_write+0x18/0x20 [ 15.974571] kasan_atomics_helper+0x1a7f/0x5450 [ 15.974594] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.974617] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.974643] ? kasan_atomics+0x152/0x310 [ 15.974686] kasan_atomics+0x1dc/0x310 [ 15.974710] ? __pfx_kasan_atomics+0x10/0x10 [ 15.974735] ? __pfx_read_tsc+0x10/0x10 [ 15.974757] ? ktime_get_ts64+0x86/0x230 [ 15.974782] kunit_try_run_case+0x1a5/0x480 [ 15.974809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.974847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.974873] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.974897] ? __kthread_parkme+0x82/0x180 [ 15.974919] ? preempt_count_sub+0x50/0x80 [ 15.974944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.974971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.974995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.975051] kthread+0x337/0x6f0 [ 15.975071] ? trace_preempt_on+0x20/0xc0 [ 15.975095] ? __pfx_kthread+0x10/0x10 [ 15.975116] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.975138] ? calculate_sigpending+0x7b/0xa0 [ 15.975163] ? __pfx_kthread+0x10/0x10 [ 15.975185] ret_from_fork+0x116/0x1d0 [ 15.975203] ? __pfx_kthread+0x10/0x10 [ 15.975224] ret_from_fork_asm+0x1a/0x30 [ 15.975256] </TASK> [ 15.975267] [ 15.982891] Allocated by task 282: [ 15.983118] kasan_save_stack+0x45/0x70 [ 15.983351] kasan_save_track+0x18/0x40 [ 15.983567] kasan_save_alloc_info+0x3b/0x50 [ 15.983721] __kasan_kmalloc+0xb7/0xc0 [ 15.983855] __kmalloc_cache_noprof+0x189/0x420 [ 15.984023] kasan_atomics+0x95/0x310 [ 15.984159] kunit_try_run_case+0x1a5/0x480 [ 15.984307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.984513] kthread+0x337/0x6f0 [ 15.984682] ret_from_fork+0x116/0x1d0 [ 15.984963] ret_from_fork_asm+0x1a/0x30 [ 15.985170] [ 15.985266] The buggy address belongs to the object at ffff88810342d080 [ 15.985266] which belongs to the cache kmalloc-64 of size 64 [ 15.986212] The buggy address is located 0 bytes to the right of [ 15.986212] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.986806] [ 15.986906] The buggy address belongs to the physical page: [ 15.987112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.987515] flags: 0x200000000000000(node=0|zone=2) [ 15.987693] page_type: f5(slab) [ 15.987814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.988057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.988401] page dumped because: kasan: bad access detected [ 15.988660] [ 15.988755] Memory state around the buggy address: [ 15.989046] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.989273] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.989482] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.989689] ^ [ 15.989840] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990182] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990488] ================================================================== [ 15.784650] ================================================================== [ 15.784905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.785879] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.786256] [ 15.786396] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.786464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.786477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.786500] Call Trace: [ 15.786521] <TASK> [ 15.786551] dump_stack_lvl+0x73/0xb0 [ 15.786585] print_report+0xd1/0x610 [ 15.786620] ? __virt_addr_valid+0x1db/0x2d0 [ 15.786645] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.786666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.786690] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.786722] kasan_report+0x141/0x180 [ 15.786745] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.786772] __asan_report_store8_noabort+0x1b/0x30 [ 15.786809] kasan_atomics_helper+0x50d4/0x5450 [ 15.786832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.786854] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.786881] ? kasan_atomics+0x152/0x310 [ 15.786916] kasan_atomics+0x1dc/0x310 [ 15.786939] ? __pfx_kasan_atomics+0x10/0x10 [ 15.786964] ? __pfx_read_tsc+0x10/0x10 [ 15.786996] ? ktime_get_ts64+0x86/0x230 [ 15.787030] kunit_try_run_case+0x1a5/0x480 [ 15.787055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.787078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.787112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.787136] ? __kthread_parkme+0x82/0x180 [ 15.787159] ? preempt_count_sub+0x50/0x80 [ 15.787195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.787219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.787243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.787277] kthread+0x337/0x6f0 [ 15.787296] ? trace_preempt_on+0x20/0xc0 [ 15.787321] ? __pfx_kthread+0x10/0x10 [ 15.787352] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.787374] ? calculate_sigpending+0x7b/0xa0 [ 15.787399] ? __pfx_kthread+0x10/0x10 [ 15.787448] ret_from_fork+0x116/0x1d0 [ 15.787468] ? __pfx_kthread+0x10/0x10 [ 15.787489] ret_from_fork_asm+0x1a/0x30 [ 15.787532] </TASK> [ 15.787544] [ 15.795166] Allocated by task 282: [ 15.795352] kasan_save_stack+0x45/0x70 [ 15.795535] kasan_save_track+0x18/0x40 [ 15.795750] kasan_save_alloc_info+0x3b/0x50 [ 15.795933] __kasan_kmalloc+0xb7/0xc0 [ 15.796117] __kmalloc_cache_noprof+0x189/0x420 [ 15.796313] kasan_atomics+0x95/0x310 [ 15.796494] kunit_try_run_case+0x1a5/0x480 [ 15.796643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796819] kthread+0x337/0x6f0 [ 15.796949] ret_from_fork+0x116/0x1d0 [ 15.797098] ret_from_fork_asm+0x1a/0x30 [ 15.797239] [ 15.797312] The buggy address belongs to the object at ffff88810342d080 [ 15.797312] which belongs to the cache kmalloc-64 of size 64 [ 15.797666] The buggy address is located 0 bytes to the right of [ 15.797666] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.798294] [ 15.798429] The buggy address belongs to the physical page: [ 15.798715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.799151] flags: 0x200000000000000(node=0|zone=2) [ 15.799435] page_type: f5(slab) [ 15.799608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.799918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.800158] page dumped because: kasan: bad access detected [ 15.800344] [ 15.800465] Memory state around the buggy address: [ 15.800691] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.801041] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.801361] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.801682] ^ [ 15.801893] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802209] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802532] ================================================================== [ 15.571360] ================================================================== [ 15.572061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.572351] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.572760] [ 15.572883] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.572931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.572943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.572970] Call Trace: [ 15.572990] <TASK> [ 15.573022] dump_stack_lvl+0x73/0xb0 [ 15.573052] print_report+0xd1/0x610 [ 15.573077] ? __virt_addr_valid+0x1db/0x2d0 [ 15.573101] ? kasan_atomics_helper+0x1079/0x5450 [ 15.573123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.573147] ? kasan_atomics_helper+0x1079/0x5450 [ 15.573170] kasan_report+0x141/0x180 [ 15.573193] ? kasan_atomics_helper+0x1079/0x5450 [ 15.573220] kasan_check_range+0x10c/0x1c0 [ 15.573244] __kasan_check_write+0x18/0x20 [ 15.573264] kasan_atomics_helper+0x1079/0x5450 [ 15.573290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.573313] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.573339] ? kasan_atomics+0x152/0x310 [ 15.573366] kasan_atomics+0x1dc/0x310 [ 15.573390] ? __pfx_kasan_atomics+0x10/0x10 [ 15.573415] ? __pfx_read_tsc+0x10/0x10 [ 15.573448] ? ktime_get_ts64+0x86/0x230 [ 15.573473] kunit_try_run_case+0x1a5/0x480 [ 15.573499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.573523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.573548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.573574] ? __kthread_parkme+0x82/0x180 [ 15.573595] ? preempt_count_sub+0x50/0x80 [ 15.573619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.573645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.573670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.573695] kthread+0x337/0x6f0 [ 15.573715] ? trace_preempt_on+0x20/0xc0 [ 15.573738] ? __pfx_kthread+0x10/0x10 [ 15.573759] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.573782] ? calculate_sigpending+0x7b/0xa0 [ 15.573808] ? __pfx_kthread+0x10/0x10 [ 15.573829] ret_from_fork+0x116/0x1d0 [ 15.573849] ? __pfx_kthread+0x10/0x10 [ 15.573869] ret_from_fork_asm+0x1a/0x30 [ 15.573901] </TASK> [ 15.573911] [ 15.581592] Allocated by task 282: [ 15.581789] kasan_save_stack+0x45/0x70 [ 15.581997] kasan_save_track+0x18/0x40 [ 15.582186] kasan_save_alloc_info+0x3b/0x50 [ 15.582386] __kasan_kmalloc+0xb7/0xc0 [ 15.582593] __kmalloc_cache_noprof+0x189/0x420 [ 15.582799] kasan_atomics+0x95/0x310 [ 15.582984] kunit_try_run_case+0x1a5/0x480 [ 15.583147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.583351] kthread+0x337/0x6f0 [ 15.583493] ret_from_fork+0x116/0x1d0 [ 15.583693] ret_from_fork_asm+0x1a/0x30 [ 15.583893] [ 15.583992] The buggy address belongs to the object at ffff88810342d080 [ 15.583992] which belongs to the cache kmalloc-64 of size 64 [ 15.584363] The buggy address is located 0 bytes to the right of [ 15.584363] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.585224] [ 15.585327] The buggy address belongs to the physical page: [ 15.585562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.586115] flags: 0x200000000000000(node=0|zone=2) [ 15.586321] page_type: f5(slab) [ 15.586500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.586773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.587119] page dumped because: kasan: bad access detected [ 15.587327] [ 15.587422] Memory state around the buggy address: [ 15.587630] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.587846] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.588072] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.588287] ^ [ 15.588449] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.588766] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.589093] ================================================================== [ 15.173598] ================================================================== [ 15.173972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.174951] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.175200] [ 15.175325] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.175384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.175398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.175421] Call Trace: [ 15.175442] <TASK> [ 15.175463] dump_stack_lvl+0x73/0xb0 [ 15.175494] print_report+0xd1/0x610 [ 15.175519] ? __virt_addr_valid+0x1db/0x2d0 [ 15.175543] ? kasan_atomics_helper+0x697/0x5450 [ 15.175578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.175602] ? kasan_atomics_helper+0x697/0x5450 [ 15.175625] kasan_report+0x141/0x180 [ 15.175647] ? kasan_atomics_helper+0x697/0x5450 [ 15.175684] kasan_check_range+0x10c/0x1c0 [ 15.175709] __kasan_check_write+0x18/0x20 [ 15.175729] kasan_atomics_helper+0x697/0x5450 [ 15.175764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.175787] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.175813] ? kasan_atomics+0x152/0x310 [ 15.175840] kasan_atomics+0x1dc/0x310 [ 15.175872] ? __pfx_kasan_atomics+0x10/0x10 [ 15.175897] ? __pfx_read_tsc+0x10/0x10 [ 15.175930] ? ktime_get_ts64+0x86/0x230 [ 15.175955] kunit_try_run_case+0x1a5/0x480 [ 15.175981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.176005] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.176039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.176064] ? __kthread_parkme+0x82/0x180 [ 15.176086] ? preempt_count_sub+0x50/0x80 [ 15.176111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.176135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.176160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.176186] kthread+0x337/0x6f0 [ 15.176205] ? trace_preempt_on+0x20/0xc0 [ 15.176238] ? __pfx_kthread+0x10/0x10 [ 15.176259] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.176282] ? calculate_sigpending+0x7b/0xa0 [ 15.176318] ? __pfx_kthread+0x10/0x10 [ 15.176340] ret_from_fork+0x116/0x1d0 [ 15.176359] ? __pfx_kthread+0x10/0x10 [ 15.176381] ret_from_fork_asm+0x1a/0x30 [ 15.176413] </TASK> [ 15.176424] [ 15.184105] Allocated by task 282: [ 15.184300] kasan_save_stack+0x45/0x70 [ 15.184528] kasan_save_track+0x18/0x40 [ 15.184722] kasan_save_alloc_info+0x3b/0x50 [ 15.184937] __kasan_kmalloc+0xb7/0xc0 [ 15.185176] __kmalloc_cache_noprof+0x189/0x420 [ 15.185408] kasan_atomics+0x95/0x310 [ 15.185546] kunit_try_run_case+0x1a5/0x480 [ 15.185695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.185899] kthread+0x337/0x6f0 [ 15.186084] ret_from_fork+0x116/0x1d0 [ 15.186275] ret_from_fork_asm+0x1a/0x30 [ 15.186586] [ 15.186689] The buggy address belongs to the object at ffff88810342d080 [ 15.186689] which belongs to the cache kmalloc-64 of size 64 [ 15.187234] The buggy address is located 0 bytes to the right of [ 15.187234] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.187769] [ 15.187870] The buggy address belongs to the physical page: [ 15.188112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.188476] flags: 0x200000000000000(node=0|zone=2) [ 15.188689] page_type: f5(slab) [ 15.188871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.189209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.189523] page dumped because: kasan: bad access detected [ 15.189788] [ 15.189859] Memory state around the buggy address: [ 15.190084] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.190357] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.190889] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.191128] ^ [ 15.191381] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.191868] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.192192] ================================================================== [ 15.624949] ================================================================== [ 15.625426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.625677] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.625900] [ 15.625989] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.626049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.626062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.626085] Call Trace: [ 15.626107] <TASK> [ 15.626129] dump_stack_lvl+0x73/0xb0 [ 15.626158] print_report+0xd1/0x610 [ 15.626181] ? __virt_addr_valid+0x1db/0x2d0 [ 15.626206] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.626231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.626255] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.626279] kasan_report+0x141/0x180 [ 15.626302] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.626329] __asan_report_load4_noabort+0x18/0x20 [ 15.626355] kasan_atomics_helper+0x4a02/0x5450 [ 15.626379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.626402] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.626428] ? kasan_atomics+0x152/0x310 [ 15.626454] kasan_atomics+0x1dc/0x310 [ 15.626492] ? __pfx_kasan_atomics+0x10/0x10 [ 15.626517] ? __pfx_read_tsc+0x10/0x10 [ 15.626539] ? ktime_get_ts64+0x86/0x230 [ 15.626565] kunit_try_run_case+0x1a5/0x480 [ 15.626591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.626615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.626641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.626665] ? __kthread_parkme+0x82/0x180 [ 15.626687] ? preempt_count_sub+0x50/0x80 [ 15.626712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.626737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.626761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.626787] kthread+0x337/0x6f0 [ 15.626806] ? trace_preempt_on+0x20/0xc0 [ 15.626830] ? __pfx_kthread+0x10/0x10 [ 15.626850] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.626872] ? calculate_sigpending+0x7b/0xa0 [ 15.626898] ? __pfx_kthread+0x10/0x10 [ 15.626920] ret_from_fork+0x116/0x1d0 [ 15.626939] ? __pfx_kthread+0x10/0x10 [ 15.626960] ret_from_fork_asm+0x1a/0x30 [ 15.626992] </TASK> [ 15.627003] [ 15.634632] Allocated by task 282: [ 15.634824] kasan_save_stack+0x45/0x70 [ 15.635004] kasan_save_track+0x18/0x40 [ 15.635187] kasan_save_alloc_info+0x3b/0x50 [ 15.635368] __kasan_kmalloc+0xb7/0xc0 [ 15.635537] __kmalloc_cache_noprof+0x189/0x420 [ 15.635748] kasan_atomics+0x95/0x310 [ 15.635918] kunit_try_run_case+0x1a5/0x480 [ 15.636108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.636354] kthread+0x337/0x6f0 [ 15.636495] ret_from_fork+0x116/0x1d0 [ 15.636709] ret_from_fork_asm+0x1a/0x30 [ 15.636854] [ 15.636926] The buggy address belongs to the object at ffff88810342d080 [ 15.636926] which belongs to the cache kmalloc-64 of size 64 [ 15.637285] The buggy address is located 0 bytes to the right of [ 15.637285] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.637650] [ 15.637724] The buggy address belongs to the physical page: [ 15.638006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.638377] flags: 0x200000000000000(node=0|zone=2) [ 15.638865] page_type: f5(slab) [ 15.639079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.639431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.639765] page dumped because: kasan: bad access detected [ 15.639946] [ 15.640026] Memory state around the buggy address: [ 15.640182] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640397] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.641133] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.641474] ^ [ 15.641693] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.641978] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.642268] ================================================================== [ 14.948197] ================================================================== [ 14.948747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.949227] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 14.949570] [ 14.949682] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.949729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.949741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.949763] Call Trace: [ 14.949782] <TASK> [ 14.949802] dump_stack_lvl+0x73/0xb0 [ 14.949845] print_report+0xd1/0x610 [ 14.949869] ? __virt_addr_valid+0x1db/0x2d0 [ 14.949904] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.949926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.949949] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.949971] kasan_report+0x141/0x180 [ 14.949992] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.950029] __asan_report_store4_noabort+0x1b/0x30 [ 14.950056] kasan_atomics_helper+0x4ba2/0x5450 [ 14.950081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.950106] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.950174] ? kasan_atomics+0x152/0x310 [ 14.950200] kasan_atomics+0x1dc/0x310 [ 14.950252] ? __pfx_kasan_atomics+0x10/0x10 [ 14.950276] ? __pfx_read_tsc+0x10/0x10 [ 14.950297] ? ktime_get_ts64+0x86/0x230 [ 14.950323] kunit_try_run_case+0x1a5/0x480 [ 14.950347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.950369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.950404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.950427] ? __kthread_parkme+0x82/0x180 [ 14.950447] ? preempt_count_sub+0x50/0x80 [ 14.950482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.950506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.950529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.950553] kthread+0x337/0x6f0 [ 14.950571] ? trace_preempt_on+0x20/0xc0 [ 14.950594] ? __pfx_kthread+0x10/0x10 [ 14.950623] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.950644] ? calculate_sigpending+0x7b/0xa0 [ 14.950669] ? __pfx_kthread+0x10/0x10 [ 14.950699] ret_from_fork+0x116/0x1d0 [ 14.950718] ? __pfx_kthread+0x10/0x10 [ 14.950737] ret_from_fork_asm+0x1a/0x30 [ 14.950768] </TASK> [ 14.950777] [ 14.959763] Allocated by task 282: [ 14.959997] kasan_save_stack+0x45/0x70 [ 14.960287] kasan_save_track+0x18/0x40 [ 14.960510] kasan_save_alloc_info+0x3b/0x50 [ 14.960704] __kasan_kmalloc+0xb7/0xc0 [ 14.960892] __kmalloc_cache_noprof+0x189/0x420 [ 14.961200] kasan_atomics+0x95/0x310 [ 14.961391] kunit_try_run_case+0x1a5/0x480 [ 14.961674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.961934] kthread+0x337/0x6f0 [ 14.962133] ret_from_fork+0x116/0x1d0 [ 14.962409] ret_from_fork_asm+0x1a/0x30 [ 14.962673] [ 14.962791] The buggy address belongs to the object at ffff88810342d080 [ 14.962791] which belongs to the cache kmalloc-64 of size 64 [ 14.963717] The buggy address is located 0 bytes to the right of [ 14.963717] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 14.964320] [ 14.964471] The buggy address belongs to the physical page: [ 14.964647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 14.964899] flags: 0x200000000000000(node=0|zone=2) [ 14.965079] page_type: f5(slab) [ 14.965364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.965760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.966255] page dumped because: kasan: bad access detected [ 14.966622] [ 14.966716] Memory state around the buggy address: [ 14.966939] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.967297] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.967520] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.967785] ^ [ 14.968462] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.968821] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969196] ================================================================== [ 15.210797] ================================================================== [ 15.211091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.211450] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.211824] [ 15.211960] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.212007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.212036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.212069] Call Trace: [ 15.212089] <TASK> [ 15.212109] dump_stack_lvl+0x73/0xb0 [ 15.212150] print_report+0xd1/0x610 [ 15.212174] ? __virt_addr_valid+0x1db/0x2d0 [ 15.212198] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.212221] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.212244] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.212267] kasan_report+0x141/0x180 [ 15.212289] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.212316] kasan_check_range+0x10c/0x1c0 [ 15.212341] __kasan_check_write+0x18/0x20 [ 15.212361] kasan_atomics_helper+0x7c7/0x5450 [ 15.212384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.212408] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.212434] ? kasan_atomics+0x152/0x310 [ 15.212461] kasan_atomics+0x1dc/0x310 [ 15.212484] ? __pfx_kasan_atomics+0x10/0x10 [ 15.212509] ? __pfx_read_tsc+0x10/0x10 [ 15.212531] ? ktime_get_ts64+0x86/0x230 [ 15.212557] kunit_try_run_case+0x1a5/0x480 [ 15.212583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.212606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.212641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.212665] ? __kthread_parkme+0x82/0x180 [ 15.212687] ? preempt_count_sub+0x50/0x80 [ 15.212722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.212747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.212772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.212798] kthread+0x337/0x6f0 [ 15.212826] ? trace_preempt_on+0x20/0xc0 [ 15.212858] ? __pfx_kthread+0x10/0x10 [ 15.212880] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.212913] ? calculate_sigpending+0x7b/0xa0 [ 15.212938] ? __pfx_kthread+0x10/0x10 [ 15.212960] ret_from_fork+0x116/0x1d0 [ 15.212980] ? __pfx_kthread+0x10/0x10 [ 15.213016] ret_from_fork_asm+0x1a/0x30 [ 15.213049] </TASK> [ 15.213060] [ 15.220626] Allocated by task 282: [ 15.220819] kasan_save_stack+0x45/0x70 [ 15.221072] kasan_save_track+0x18/0x40 [ 15.221269] kasan_save_alloc_info+0x3b/0x50 [ 15.221536] __kasan_kmalloc+0xb7/0xc0 [ 15.221751] __kmalloc_cache_noprof+0x189/0x420 [ 15.221927] kasan_atomics+0x95/0x310 [ 15.222139] kunit_try_run_case+0x1a5/0x480 [ 15.222318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.222602] kthread+0x337/0x6f0 [ 15.222731] ret_from_fork+0x116/0x1d0 [ 15.222954] ret_from_fork_asm+0x1a/0x30 [ 15.223153] [ 15.223246] The buggy address belongs to the object at ffff88810342d080 [ 15.223246] which belongs to the cache kmalloc-64 of size 64 [ 15.223806] The buggy address is located 0 bytes to the right of [ 15.223806] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.224308] [ 15.224409] The buggy address belongs to the physical page: [ 15.224636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.224890] flags: 0x200000000000000(node=0|zone=2) [ 15.225091] page_type: f5(slab) [ 15.225264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.225811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.226167] page dumped because: kasan: bad access detected [ 15.226382] [ 15.226512] Memory state around the buggy address: [ 15.226740] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.227065] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.227284] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.227496] ^ [ 15.227857] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.228216] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.228588] ================================================================== [ 15.192987] ================================================================== [ 15.193329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.193766] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.194109] [ 15.194225] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.194283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.194295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.194329] Call Trace: [ 15.194350] <TASK> [ 15.194370] dump_stack_lvl+0x73/0xb0 [ 15.194399] print_report+0xd1/0x610 [ 15.194455] ? __virt_addr_valid+0x1db/0x2d0 [ 15.194480] ? kasan_atomics_helper+0x72f/0x5450 [ 15.194512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.194536] ? kasan_atomics_helper+0x72f/0x5450 [ 15.194559] kasan_report+0x141/0x180 [ 15.194585] ? kasan_atomics_helper+0x72f/0x5450 [ 15.194612] kasan_check_range+0x10c/0x1c0 [ 15.194646] __kasan_check_write+0x18/0x20 [ 15.194667] kasan_atomics_helper+0x72f/0x5450 [ 15.194691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.194724] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.194750] ? kasan_atomics+0x152/0x310 [ 15.194777] kasan_atomics+0x1dc/0x310 [ 15.194800] ? __pfx_kasan_atomics+0x10/0x10 [ 15.194825] ? __pfx_read_tsc+0x10/0x10 [ 15.194847] ? ktime_get_ts64+0x86/0x230 [ 15.194872] kunit_try_run_case+0x1a5/0x480 [ 15.194898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.194921] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.194947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.194971] ? __kthread_parkme+0x82/0x180 [ 15.194992] ? preempt_count_sub+0x50/0x80 [ 15.195027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.195052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.195085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.195111] kthread+0x337/0x6f0 [ 15.195131] ? trace_preempt_on+0x20/0xc0 [ 15.195165] ? __pfx_kthread+0x10/0x10 [ 15.195187] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.195209] ? calculate_sigpending+0x7b/0xa0 [ 15.195235] ? __pfx_kthread+0x10/0x10 [ 15.195256] ret_from_fork+0x116/0x1d0 [ 15.195276] ? __pfx_kthread+0x10/0x10 [ 15.195297] ret_from_fork_asm+0x1a/0x30 [ 15.195329] </TASK> [ 15.195340] [ 15.203160] Allocated by task 282: [ 15.203341] kasan_save_stack+0x45/0x70 [ 15.203630] kasan_save_track+0x18/0x40 [ 15.203768] kasan_save_alloc_info+0x3b/0x50 [ 15.203929] __kasan_kmalloc+0xb7/0xc0 [ 15.204138] __kmalloc_cache_noprof+0x189/0x420 [ 15.204362] kasan_atomics+0x95/0x310 [ 15.204497] kunit_try_run_case+0x1a5/0x480 [ 15.204646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.204921] kthread+0x337/0x6f0 [ 15.205101] ret_from_fork+0x116/0x1d0 [ 15.205292] ret_from_fork_asm+0x1a/0x30 [ 15.205542] [ 15.205645] The buggy address belongs to the object at ffff88810342d080 [ 15.205645] which belongs to the cache kmalloc-64 of size 64 [ 15.206125] The buggy address is located 0 bytes to the right of [ 15.206125] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.206590] [ 15.206669] The buggy address belongs to the physical page: [ 15.206844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.207098] flags: 0x200000000000000(node=0|zone=2) [ 15.207266] page_type: f5(slab) [ 15.207390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.207623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.207854] page dumped because: kasan: bad access detected [ 15.208126] [ 15.208220] Memory state around the buggy address: [ 15.208488] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.208806] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.209138] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.209451] ^ [ 15.209675] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.209996] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.210221] ================================================================== [ 16.211178] ================================================================== [ 16.211665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.212080] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.212458] [ 16.212619] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.212669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.212682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.212705] Call Trace: [ 16.212725] <TASK> [ 16.212765] dump_stack_lvl+0x73/0xb0 [ 16.212796] print_report+0xd1/0x610 [ 16.212821] ? __virt_addr_valid+0x1db/0x2d0 [ 16.212845] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.212874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.212898] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.212920] kasan_report+0x141/0x180 [ 16.212942] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.212969] kasan_check_range+0x10c/0x1c0 [ 16.212994] __kasan_check_write+0x18/0x20 [ 16.213074] kasan_atomics_helper+0x20c8/0x5450 [ 16.213100] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.213162] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.213189] ? kasan_atomics+0x152/0x310 [ 16.213252] kasan_atomics+0x1dc/0x310 [ 16.213277] ? __pfx_kasan_atomics+0x10/0x10 [ 16.213302] ? __pfx_read_tsc+0x10/0x10 [ 16.213335] ? ktime_get_ts64+0x86/0x230 [ 16.213360] kunit_try_run_case+0x1a5/0x480 [ 16.213387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.213411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.213456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.213481] ? __kthread_parkme+0x82/0x180 [ 16.213503] ? preempt_count_sub+0x50/0x80 [ 16.213527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.213552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.213577] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.213602] kthread+0x337/0x6f0 [ 16.213621] ? trace_preempt_on+0x20/0xc0 [ 16.213645] ? __pfx_kthread+0x10/0x10 [ 16.213667] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.213688] ? calculate_sigpending+0x7b/0xa0 [ 16.213714] ? __pfx_kthread+0x10/0x10 [ 16.213735] ret_from_fork+0x116/0x1d0 [ 16.213755] ? __pfx_kthread+0x10/0x10 [ 16.213776] ret_from_fork_asm+0x1a/0x30 [ 16.213807] </TASK> [ 16.213818] [ 16.221500] Allocated by task 282: [ 16.221730] kasan_save_stack+0x45/0x70 [ 16.221957] kasan_save_track+0x18/0x40 [ 16.222218] kasan_save_alloc_info+0x3b/0x50 [ 16.222566] __kasan_kmalloc+0xb7/0xc0 [ 16.222806] __kmalloc_cache_noprof+0x189/0x420 [ 16.223109] kasan_atomics+0x95/0x310 [ 16.223360] kunit_try_run_case+0x1a5/0x480 [ 16.223655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.223933] kthread+0x337/0x6f0 [ 16.224070] ret_from_fork+0x116/0x1d0 [ 16.224206] ret_from_fork_asm+0x1a/0x30 [ 16.224347] [ 16.224455] The buggy address belongs to the object at ffff88810342d080 [ 16.224455] which belongs to the cache kmalloc-64 of size 64 [ 16.225003] The buggy address is located 0 bytes to the right of [ 16.225003] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.225634] [ 16.225738] The buggy address belongs to the physical page: [ 16.226048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.226344] flags: 0x200000000000000(node=0|zone=2) [ 16.226648] page_type: f5(slab) [ 16.226786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.227063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.227544] page dumped because: kasan: bad access detected [ 16.227832] [ 16.227903] Memory state around the buggy address: [ 16.228081] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.228486] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.228895] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.229270] ^ [ 16.229455] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.229734] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.230110] ================================================================== [ 15.312819] ================================================================== [ 15.313351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.313842] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.314105] [ 15.314220] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.314266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.314279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.314302] Call Trace: [ 15.314326] <TASK> [ 15.314347] dump_stack_lvl+0x73/0xb0 [ 15.314376] print_report+0xd1/0x610 [ 15.314399] ? __virt_addr_valid+0x1db/0x2d0 [ 15.314424] ? kasan_atomics_helper+0xac7/0x5450 [ 15.314448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.314472] ? kasan_atomics_helper+0xac7/0x5450 [ 15.314494] kasan_report+0x141/0x180 [ 15.314517] ? kasan_atomics_helper+0xac7/0x5450 [ 15.314544] kasan_check_range+0x10c/0x1c0 [ 15.314569] __kasan_check_write+0x18/0x20 [ 15.314590] kasan_atomics_helper+0xac7/0x5450 [ 15.314613] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.314636] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.314663] ? kasan_atomics+0x152/0x310 [ 15.314689] kasan_atomics+0x1dc/0x310 [ 15.314713] ? __pfx_kasan_atomics+0x10/0x10 [ 15.314738] ? __pfx_read_tsc+0x10/0x10 [ 15.314760] ? ktime_get_ts64+0x86/0x230 [ 15.314786] kunit_try_run_case+0x1a5/0x480 [ 15.314811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.314861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.314885] ? __kthread_parkme+0x82/0x180 [ 15.314909] ? preempt_count_sub+0x50/0x80 [ 15.314934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.314984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.315021] kthread+0x337/0x6f0 [ 15.315040] ? trace_preempt_on+0x20/0xc0 [ 15.315063] ? __pfx_kthread+0x10/0x10 [ 15.315084] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.315106] ? calculate_sigpending+0x7b/0xa0 [ 15.315131] ? __pfx_kthread+0x10/0x10 [ 15.315153] ret_from_fork+0x116/0x1d0 [ 15.315172] ? __pfx_kthread+0x10/0x10 [ 15.315193] ret_from_fork_asm+0x1a/0x30 [ 15.315224] </TASK> [ 15.315235] [ 15.323207] Allocated by task 282: [ 15.323445] kasan_save_stack+0x45/0x70 [ 15.323641] kasan_save_track+0x18/0x40 [ 15.323780] kasan_save_alloc_info+0x3b/0x50 [ 15.324023] __kasan_kmalloc+0xb7/0xc0 [ 15.324212] __kmalloc_cache_noprof+0x189/0x420 [ 15.324369] kasan_atomics+0x95/0x310 [ 15.324702] kunit_try_run_case+0x1a5/0x480 [ 15.324938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.325167] kthread+0x337/0x6f0 [ 15.325318] ret_from_fork+0x116/0x1d0 [ 15.325536] ret_from_fork_asm+0x1a/0x30 [ 15.325679] [ 15.325751] The buggy address belongs to the object at ffff88810342d080 [ 15.325751] which belongs to the cache kmalloc-64 of size 64 [ 15.327327] The buggy address is located 0 bytes to the right of [ 15.327327] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.329835] [ 15.330005] The buggy address belongs to the physical page: [ 15.330194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.330477] flags: 0x200000000000000(node=0|zone=2) [ 15.330970] page_type: f5(slab) [ 15.331313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.331972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.332521] page dumped because: kasan: bad access detected [ 15.332694] [ 15.332842] Memory state around the buggy address: [ 15.333364] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.334027] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.334424] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.334642] ^ [ 15.334803] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335030] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335245] ================================================================== [ 15.671872] ================================================================== [ 15.672579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.673398] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.674240] [ 15.674343] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.674394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.674406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.674439] Call Trace: [ 15.674460] <TASK> [ 15.674481] dump_stack_lvl+0x73/0xb0 [ 15.674516] print_report+0xd1/0x610 [ 15.674541] ? __virt_addr_valid+0x1db/0x2d0 [ 15.674565] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.674587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.674611] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.674634] kasan_report+0x141/0x180 [ 15.674656] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.674684] __asan_report_load4_noabort+0x18/0x20 [ 15.674709] kasan_atomics_helper+0x49e8/0x5450 [ 15.674733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.674756] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.674782] ? kasan_atomics+0x152/0x310 [ 15.674809] kasan_atomics+0x1dc/0x310 [ 15.674832] ? __pfx_kasan_atomics+0x10/0x10 [ 15.674857] ? __pfx_read_tsc+0x10/0x10 [ 15.674879] ? ktime_get_ts64+0x86/0x230 [ 15.674905] kunit_try_run_case+0x1a5/0x480 [ 15.674931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.674954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.674980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.675004] ? __kthread_parkme+0x82/0x180 [ 15.675037] ? preempt_count_sub+0x50/0x80 [ 15.675061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.675086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.675111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.675136] kthread+0x337/0x6f0 [ 15.675156] ? trace_preempt_on+0x20/0xc0 [ 15.675182] ? __pfx_kthread+0x10/0x10 [ 15.675203] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.675225] ? calculate_sigpending+0x7b/0xa0 [ 15.675251] ? __pfx_kthread+0x10/0x10 [ 15.675273] ret_from_fork+0x116/0x1d0 [ 15.675292] ? __pfx_kthread+0x10/0x10 [ 15.675313] ret_from_fork_asm+0x1a/0x30 [ 15.675344] </TASK> [ 15.675355] [ 15.682806] Allocated by task 282: [ 15.682973] kasan_save_stack+0x45/0x70 [ 15.683201] kasan_save_track+0x18/0x40 [ 15.683339] kasan_save_alloc_info+0x3b/0x50 [ 15.683516] __kasan_kmalloc+0xb7/0xc0 [ 15.683685] __kmalloc_cache_noprof+0x189/0x420 [ 15.683921] kasan_atomics+0x95/0x310 [ 15.684115] kunit_try_run_case+0x1a5/0x480 [ 15.684321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.684598] kthread+0x337/0x6f0 [ 15.684767] ret_from_fork+0x116/0x1d0 [ 15.684920] ret_from_fork_asm+0x1a/0x30 [ 15.685146] [ 15.685220] The buggy address belongs to the object at ffff88810342d080 [ 15.685220] which belongs to the cache kmalloc-64 of size 64 [ 15.685772] The buggy address is located 0 bytes to the right of [ 15.685772] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.686249] [ 15.686327] The buggy address belongs to the physical page: [ 15.686527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.686771] flags: 0x200000000000000(node=0|zone=2) [ 15.686954] page_type: f5(slab) [ 15.687133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.687548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.687942] page dumped because: kasan: bad access detected [ 15.688214] [ 15.688307] Memory state around the buggy address: [ 15.688555] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.688881] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.689132] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.689357] ^ [ 15.689635] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.689959] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.690282] ================================================================== [ 15.894529] ================================================================== [ 15.894891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.896106] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.896409] [ 15.896542] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.896591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.896603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.896627] Call Trace: [ 15.896647] <TASK> [ 15.896667] dump_stack_lvl+0x73/0xb0 [ 15.896700] print_report+0xd1/0x610 [ 15.896724] ? __virt_addr_valid+0x1db/0x2d0 [ 15.896748] ? kasan_atomics_helper+0x1818/0x5450 [ 15.896771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.896795] ? kasan_atomics_helper+0x1818/0x5450 [ 15.896818] kasan_report+0x141/0x180 [ 15.896840] ? kasan_atomics_helper+0x1818/0x5450 [ 15.896872] kasan_check_range+0x10c/0x1c0 [ 15.896896] __kasan_check_write+0x18/0x20 [ 15.896916] kasan_atomics_helper+0x1818/0x5450 [ 15.896939] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.896962] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.896988] ? kasan_atomics+0x152/0x310 [ 15.897028] kasan_atomics+0x1dc/0x310 [ 15.897052] ? __pfx_kasan_atomics+0x10/0x10 [ 15.897077] ? __pfx_read_tsc+0x10/0x10 [ 15.897099] ? ktime_get_ts64+0x86/0x230 [ 15.897125] kunit_try_run_case+0x1a5/0x480 [ 15.897150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.897173] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.897199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.897223] ? __kthread_parkme+0x82/0x180 [ 15.897244] ? preempt_count_sub+0x50/0x80 [ 15.897269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.897293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.897318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.897343] kthread+0x337/0x6f0 [ 15.897362] ? trace_preempt_on+0x20/0xc0 [ 15.897386] ? __pfx_kthread+0x10/0x10 [ 15.897406] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.897439] ? calculate_sigpending+0x7b/0xa0 [ 15.897465] ? __pfx_kthread+0x10/0x10 [ 15.897486] ret_from_fork+0x116/0x1d0 [ 15.897505] ? __pfx_kthread+0x10/0x10 [ 15.897526] ret_from_fork_asm+0x1a/0x30 [ 15.897625] </TASK> [ 15.897640] [ 15.905097] Allocated by task 282: [ 15.905289] kasan_save_stack+0x45/0x70 [ 15.905494] kasan_save_track+0x18/0x40 [ 15.905671] kasan_save_alloc_info+0x3b/0x50 [ 15.905844] __kasan_kmalloc+0xb7/0xc0 [ 15.906006] __kmalloc_cache_noprof+0x189/0x420 [ 15.906242] kasan_atomics+0x95/0x310 [ 15.906412] kunit_try_run_case+0x1a5/0x480 [ 15.906612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.906845] kthread+0x337/0x6f0 [ 15.907018] ret_from_fork+0x116/0x1d0 [ 15.907199] ret_from_fork_asm+0x1a/0x30 [ 15.907387] [ 15.907503] The buggy address belongs to the object at ffff88810342d080 [ 15.907503] which belongs to the cache kmalloc-64 of size 64 [ 15.907968] The buggy address is located 0 bytes to the right of [ 15.907968] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.908376] [ 15.908494] The buggy address belongs to the physical page: [ 15.908748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.909110] flags: 0x200000000000000(node=0|zone=2) [ 15.909325] page_type: f5(slab) [ 15.909501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.909768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.910245] page dumped because: kasan: bad access detected [ 15.910772] [ 15.910967] Memory state around the buggy address: [ 15.911164] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.911377] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.912222] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.913091] ^ [ 15.913529] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.913925] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.914151] ================================================================== [ 16.273709] ================================================================== [ 16.274782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.275580] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.276401] [ 16.276553] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.276629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.276654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.276678] Call Trace: [ 16.276712] <TASK> [ 16.276734] dump_stack_lvl+0x73/0xb0 [ 16.276782] print_report+0xd1/0x610 [ 16.276806] ? __virt_addr_valid+0x1db/0x2d0 [ 16.276830] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.276862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.276885] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.276908] kasan_report+0x141/0x180 [ 16.276937] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.276967] __asan_report_load8_noabort+0x18/0x20 [ 16.276993] kasan_atomics_helper+0x4fa5/0x5450 [ 16.277026] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.277050] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.277076] ? kasan_atomics+0x152/0x310 [ 16.277104] kasan_atomics+0x1dc/0x310 [ 16.277128] ? __pfx_kasan_atomics+0x10/0x10 [ 16.277152] ? __pfx_read_tsc+0x10/0x10 [ 16.277175] ? ktime_get_ts64+0x86/0x230 [ 16.277214] kunit_try_run_case+0x1a5/0x480 [ 16.277241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.277264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.277290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.277314] ? __kthread_parkme+0x82/0x180 [ 16.277336] ? preempt_count_sub+0x50/0x80 [ 16.277361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.277386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.277411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.277436] kthread+0x337/0x6f0 [ 16.277456] ? trace_preempt_on+0x20/0xc0 [ 16.277480] ? __pfx_kthread+0x10/0x10 [ 16.277502] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.277524] ? calculate_sigpending+0x7b/0xa0 [ 16.277549] ? __pfx_kthread+0x10/0x10 [ 16.277571] ret_from_fork+0x116/0x1d0 [ 16.277610] ? __pfx_kthread+0x10/0x10 [ 16.277631] ret_from_fork_asm+0x1a/0x30 [ 16.277663] </TASK> [ 16.277674] [ 16.286368] Allocated by task 282: [ 16.286606] kasan_save_stack+0x45/0x70 [ 16.286819] kasan_save_track+0x18/0x40 [ 16.287034] kasan_save_alloc_info+0x3b/0x50 [ 16.287184] __kasan_kmalloc+0xb7/0xc0 [ 16.287373] __kmalloc_cache_noprof+0x189/0x420 [ 16.287640] kasan_atomics+0x95/0x310 [ 16.287841] kunit_try_run_case+0x1a5/0x480 [ 16.288041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.288269] kthread+0x337/0x6f0 [ 16.288417] ret_from_fork+0x116/0x1d0 [ 16.288549] ret_from_fork_asm+0x1a/0x30 [ 16.288717] [ 16.288807] The buggy address belongs to the object at ffff88810342d080 [ 16.288807] which belongs to the cache kmalloc-64 of size 64 [ 16.289347] The buggy address is located 0 bytes to the right of [ 16.289347] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.289876] [ 16.289973] The buggy address belongs to the physical page: [ 16.290371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.290711] flags: 0x200000000000000(node=0|zone=2) [ 16.290878] page_type: f5(slab) [ 16.291045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.291309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.291856] page dumped because: kasan: bad access detected [ 16.292093] [ 16.292188] Memory state around the buggy address: [ 16.292401] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.292692] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.293032] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.293339] ^ [ 16.293584] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.293897] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.294212] ================================================================== [ 15.418089] ================================================================== [ 15.418761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.419439] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.420071] [ 15.420250] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.420297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.420310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.420333] Call Trace: [ 15.420353] <TASK> [ 15.420374] dump_stack_lvl+0x73/0xb0 [ 15.420405] print_report+0xd1/0x610 [ 15.420449] ? __virt_addr_valid+0x1db/0x2d0 [ 15.420474] ? kasan_atomics_helper+0xd47/0x5450 [ 15.420495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.420519] ? kasan_atomics_helper+0xd47/0x5450 [ 15.420541] kasan_report+0x141/0x180 [ 15.420564] ? kasan_atomics_helper+0xd47/0x5450 [ 15.420591] kasan_check_range+0x10c/0x1c0 [ 15.420619] __kasan_check_write+0x18/0x20 [ 15.420639] kasan_atomics_helper+0xd47/0x5450 [ 15.420663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.420686] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.420713] ? kasan_atomics+0x152/0x310 [ 15.420739] kasan_atomics+0x1dc/0x310 [ 15.420762] ? __pfx_kasan_atomics+0x10/0x10 [ 15.420787] ? __pfx_read_tsc+0x10/0x10 [ 15.420810] ? ktime_get_ts64+0x86/0x230 [ 15.420836] kunit_try_run_case+0x1a5/0x480 [ 15.420866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.420890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.420914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.420939] ? __kthread_parkme+0x82/0x180 [ 15.420961] ? preempt_count_sub+0x50/0x80 [ 15.420986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.421045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.421071] kthread+0x337/0x6f0 [ 15.421090] ? trace_preempt_on+0x20/0xc0 [ 15.421116] ? __pfx_kthread+0x10/0x10 [ 15.421137] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.421160] ? calculate_sigpending+0x7b/0xa0 [ 15.421185] ? __pfx_kthread+0x10/0x10 [ 15.421207] ret_from_fork+0x116/0x1d0 [ 15.421227] ? __pfx_kthread+0x10/0x10 [ 15.421248] ret_from_fork_asm+0x1a/0x30 [ 15.421280] </TASK> [ 15.421290] [ 15.436920] Allocated by task 282: [ 15.437108] kasan_save_stack+0x45/0x70 [ 15.437278] kasan_save_track+0x18/0x40 [ 15.437417] kasan_save_alloc_info+0x3b/0x50 [ 15.437869] __kasan_kmalloc+0xb7/0xc0 [ 15.438227] __kmalloc_cache_noprof+0x189/0x420 [ 15.438762] kasan_atomics+0x95/0x310 [ 15.439144] kunit_try_run_case+0x1a5/0x480 [ 15.439566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.440076] kthread+0x337/0x6f0 [ 15.440420] ret_from_fork+0x116/0x1d0 [ 15.440817] ret_from_fork_asm+0x1a/0x30 [ 15.441105] [ 15.441184] The buggy address belongs to the object at ffff88810342d080 [ 15.441184] which belongs to the cache kmalloc-64 of size 64 [ 15.441585] The buggy address is located 0 bytes to the right of [ 15.441585] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.441958] [ 15.442045] The buggy address belongs to the physical page: [ 15.442222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.442519] flags: 0x200000000000000(node=0|zone=2) [ 15.442962] page_type: f5(slab) [ 15.443334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.444059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.444878] page dumped because: kasan: bad access detected [ 15.445400] [ 15.445630] Memory state around the buggy address: [ 15.446163] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.446839] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.447487] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.447984] ^ [ 15.448333] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.448627] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449149] ================================================================== [ 15.088435] ================================================================== [ 15.089125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.089821] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.090512] [ 15.090690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.090752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.090765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.090788] Call Trace: [ 15.090819] <TASK> [ 15.090849] dump_stack_lvl+0x73/0xb0 [ 15.090881] print_report+0xd1/0x610 [ 15.090905] ? __virt_addr_valid+0x1db/0x2d0 [ 15.090940] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.090963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.090986] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.091018] kasan_report+0x141/0x180 [ 15.091041] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.091068] __asan_report_store4_noabort+0x1b/0x30 [ 15.091094] kasan_atomics_helper+0x4b3a/0x5450 [ 15.091117] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.091140] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.091166] ? kasan_atomics+0x152/0x310 [ 15.091193] kasan_atomics+0x1dc/0x310 [ 15.091215] ? __pfx_kasan_atomics+0x10/0x10 [ 15.091240] ? __pfx_read_tsc+0x10/0x10 [ 15.091261] ? ktime_get_ts64+0x86/0x230 [ 15.091287] kunit_try_run_case+0x1a5/0x480 [ 15.091313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.091336] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.091361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.091385] ? __kthread_parkme+0x82/0x180 [ 15.091407] ? preempt_count_sub+0x50/0x80 [ 15.091452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.091476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.091502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.091527] kthread+0x337/0x6f0 [ 15.091547] ? trace_preempt_on+0x20/0xc0 [ 15.091570] ? __pfx_kthread+0x10/0x10 [ 15.091591] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.091614] ? calculate_sigpending+0x7b/0xa0 [ 15.091640] ? __pfx_kthread+0x10/0x10 [ 15.091661] ret_from_fork+0x116/0x1d0 [ 15.091681] ? __pfx_kthread+0x10/0x10 [ 15.091701] ret_from_fork_asm+0x1a/0x30 [ 15.091733] </TASK> [ 15.091744] [ 15.104919] Allocated by task 282: [ 15.105347] kasan_save_stack+0x45/0x70 [ 15.105799] kasan_save_track+0x18/0x40 [ 15.106161] kasan_save_alloc_info+0x3b/0x50 [ 15.106355] __kasan_kmalloc+0xb7/0xc0 [ 15.106797] __kmalloc_cache_noprof+0x189/0x420 [ 15.107119] kasan_atomics+0x95/0x310 [ 15.107258] kunit_try_run_case+0x1a5/0x480 [ 15.107417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.107595] kthread+0x337/0x6f0 [ 15.107719] ret_from_fork+0x116/0x1d0 [ 15.107857] ret_from_fork_asm+0x1a/0x30 [ 15.108000] [ 15.108451] The buggy address belongs to the object at ffff88810342d080 [ 15.108451] which belongs to the cache kmalloc-64 of size 64 [ 15.110249] The buggy address is located 0 bytes to the right of [ 15.110249] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.111419] [ 15.111667] The buggy address belongs to the physical page: [ 15.112202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.113027] flags: 0x200000000000000(node=0|zone=2) [ 15.113550] page_type: f5(slab) [ 15.113770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.113995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.114226] page dumped because: kasan: bad access detected [ 15.114393] [ 15.114645] Memory state around the buggy address: [ 15.115159] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.115864] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.116548] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.117215] ^ [ 15.117720] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118284] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118518] ================================================================== [ 15.336724] ================================================================== [ 15.337970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.338731] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.339500] [ 15.339716] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.339765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.339798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.339831] Call Trace: [ 15.339853] <TASK> [ 15.339886] dump_stack_lvl+0x73/0xb0 [ 15.339920] print_report+0xd1/0x610 [ 15.339945] ? __virt_addr_valid+0x1db/0x2d0 [ 15.339969] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.339991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.340025] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.340048] kasan_report+0x141/0x180 [ 15.340072] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.340099] kasan_check_range+0x10c/0x1c0 [ 15.340123] __kasan_check_write+0x18/0x20 [ 15.340143] kasan_atomics_helper+0xb6a/0x5450 [ 15.340168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.340191] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.340219] ? kasan_atomics+0x152/0x310 [ 15.340246] kasan_atomics+0x1dc/0x310 [ 15.340270] ? __pfx_kasan_atomics+0x10/0x10 [ 15.340295] ? __pfx_read_tsc+0x10/0x10 [ 15.340318] ? ktime_get_ts64+0x86/0x230 [ 15.340343] kunit_try_run_case+0x1a5/0x480 [ 15.340370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.340393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.340420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.340457] ? __kthread_parkme+0x82/0x180 [ 15.340479] ? preempt_count_sub+0x50/0x80 [ 15.340504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.340529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.340554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.340580] kthread+0x337/0x6f0 [ 15.340600] ? trace_preempt_on+0x20/0xc0 [ 15.340623] ? __pfx_kthread+0x10/0x10 [ 15.340644] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.340666] ? calculate_sigpending+0x7b/0xa0 [ 15.340691] ? __pfx_kthread+0x10/0x10 [ 15.340712] ret_from_fork+0x116/0x1d0 [ 15.340733] ? __pfx_kthread+0x10/0x10 [ 15.340753] ret_from_fork_asm+0x1a/0x30 [ 15.340785] </TASK> [ 15.340795] [ 15.351289] Allocated by task 282: [ 15.351650] kasan_save_stack+0x45/0x70 [ 15.351900] kasan_save_track+0x18/0x40 [ 15.352092] kasan_save_alloc_info+0x3b/0x50 [ 15.352339] __kasan_kmalloc+0xb7/0xc0 [ 15.352550] __kmalloc_cache_noprof+0x189/0x420 [ 15.352778] kasan_atomics+0x95/0x310 [ 15.352985] kunit_try_run_case+0x1a5/0x480 [ 15.353252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.353516] kthread+0x337/0x6f0 [ 15.353694] ret_from_fork+0x116/0x1d0 [ 15.353915] ret_from_fork_asm+0x1a/0x30 [ 15.354143] [ 15.354267] The buggy address belongs to the object at ffff88810342d080 [ 15.354267] which belongs to the cache kmalloc-64 of size 64 [ 15.354961] The buggy address is located 0 bytes to the right of [ 15.354961] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.355672] [ 15.355750] The buggy address belongs to the physical page: [ 15.355961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.356332] flags: 0x200000000000000(node=0|zone=2) [ 15.356820] page_type: f5(slab) [ 15.357077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.358258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.359394] page dumped because: kasan: bad access detected [ 15.359788] [ 15.359890] Memory state around the buggy address: [ 15.360135] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360775] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.361096] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.361596] ^ [ 15.361950] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.362360] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.362861] ================================================================== [ 15.119480] ================================================================== [ 15.120279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.121170] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.122088] [ 15.122343] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.122394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.122407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.122429] Call Trace: [ 15.122451] <TASK> [ 15.122473] dump_stack_lvl+0x73/0xb0 [ 15.122506] print_report+0xd1/0x610 [ 15.122530] ? __virt_addr_valid+0x1db/0x2d0 [ 15.122554] ? kasan_atomics_helper+0x565/0x5450 [ 15.122575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.122599] ? kasan_atomics_helper+0x565/0x5450 [ 15.122622] kasan_report+0x141/0x180 [ 15.122645] ? kasan_atomics_helper+0x565/0x5450 [ 15.122673] kasan_check_range+0x10c/0x1c0 [ 15.122699] __kasan_check_write+0x18/0x20 [ 15.122719] kasan_atomics_helper+0x565/0x5450 [ 15.122745] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.122769] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.122796] ? kasan_atomics+0x152/0x310 [ 15.122823] kasan_atomics+0x1dc/0x310 [ 15.122847] ? __pfx_kasan_atomics+0x10/0x10 [ 15.122871] ? __pfx_read_tsc+0x10/0x10 [ 15.122894] ? ktime_get_ts64+0x86/0x230 [ 15.122921] kunit_try_run_case+0x1a5/0x480 [ 15.122948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.122972] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.122997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.123094] ? __kthread_parkme+0x82/0x180 [ 15.123116] ? preempt_count_sub+0x50/0x80 [ 15.123140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.123165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.123190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.123215] kthread+0x337/0x6f0 [ 15.123235] ? trace_preempt_on+0x20/0xc0 [ 15.123259] ? __pfx_kthread+0x10/0x10 [ 15.123280] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.123303] ? calculate_sigpending+0x7b/0xa0 [ 15.123329] ? __pfx_kthread+0x10/0x10 [ 15.123350] ret_from_fork+0x116/0x1d0 [ 15.123370] ? __pfx_kthread+0x10/0x10 [ 15.123391] ret_from_fork_asm+0x1a/0x30 [ 15.123424] </TASK> [ 15.123435] [ 15.134678] Allocated by task 282: [ 15.135043] kasan_save_stack+0x45/0x70 [ 15.135414] kasan_save_track+0x18/0x40 [ 15.135823] kasan_save_alloc_info+0x3b/0x50 [ 15.136232] __kasan_kmalloc+0xb7/0xc0 [ 15.136610] __kmalloc_cache_noprof+0x189/0x420 [ 15.137048] kasan_atomics+0x95/0x310 [ 15.137394] kunit_try_run_case+0x1a5/0x480 [ 15.137794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.138291] kthread+0x337/0x6f0 [ 15.138566] ret_from_fork+0x116/0x1d0 [ 15.138941] ret_from_fork_asm+0x1a/0x30 [ 15.139093] [ 15.139166] The buggy address belongs to the object at ffff88810342d080 [ 15.139166] which belongs to the cache kmalloc-64 of size 64 [ 15.139593] The buggy address is located 0 bytes to the right of [ 15.139593] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.140806] [ 15.141030] The buggy address belongs to the physical page: [ 15.141544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.142231] flags: 0x200000000000000(node=0|zone=2) [ 15.142713] page_type: f5(slab) [ 15.143048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.143315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.144022] page dumped because: kasan: bad access detected [ 15.144458] [ 15.144600] Memory state around the buggy address: [ 15.144934] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.145156] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.145368] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.145734] ^ [ 15.146133] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.146351] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.146873] ================================================================== [ 15.534265] ================================================================== [ 15.535190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.536100] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.536510] [ 15.536606] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.536656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.536670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.536692] Call Trace: [ 15.536713] <TASK> [ 15.536736] dump_stack_lvl+0x73/0xb0 [ 15.536766] print_report+0xd1/0x610 [ 15.536790] ? __virt_addr_valid+0x1db/0x2d0 [ 15.536817] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.536839] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.536869] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.536892] kasan_report+0x141/0x180 [ 15.536914] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.536941] kasan_check_range+0x10c/0x1c0 [ 15.536965] __kasan_check_write+0x18/0x20 [ 15.536984] kasan_atomics_helper+0xfa9/0x5450 [ 15.537007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.537041] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.537068] ? kasan_atomics+0x152/0x310 [ 15.537094] kasan_atomics+0x1dc/0x310 [ 15.537117] ? __pfx_kasan_atomics+0x10/0x10 [ 15.537141] ? __pfx_read_tsc+0x10/0x10 [ 15.537164] ? ktime_get_ts64+0x86/0x230 [ 15.537190] kunit_try_run_case+0x1a5/0x480 [ 15.537216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.537242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.537271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.537298] ? __kthread_parkme+0x82/0x180 [ 15.537322] ? preempt_count_sub+0x50/0x80 [ 15.537347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.537372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.537396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.537421] kthread+0x337/0x6f0 [ 15.537440] ? trace_preempt_on+0x20/0xc0 [ 15.537464] ? __pfx_kthread+0x10/0x10 [ 15.537494] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.537516] ? calculate_sigpending+0x7b/0xa0 [ 15.537541] ? __pfx_kthread+0x10/0x10 [ 15.537563] ret_from_fork+0x116/0x1d0 [ 15.537582] ? __pfx_kthread+0x10/0x10 [ 15.537604] ret_from_fork_asm+0x1a/0x30 [ 15.537635] </TASK> [ 15.537646] [ 15.545085] Allocated by task 282: [ 15.545262] kasan_save_stack+0x45/0x70 [ 15.545501] kasan_save_track+0x18/0x40 [ 15.545646] kasan_save_alloc_info+0x3b/0x50 [ 15.545862] __kasan_kmalloc+0xb7/0xc0 [ 15.546022] __kmalloc_cache_noprof+0x189/0x420 [ 15.546247] kasan_atomics+0x95/0x310 [ 15.546385] kunit_try_run_case+0x1a5/0x480 [ 15.546539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.546772] kthread+0x337/0x6f0 [ 15.546941] ret_from_fork+0x116/0x1d0 [ 15.547147] ret_from_fork_asm+0x1a/0x30 [ 15.547358] [ 15.547462] The buggy address belongs to the object at ffff88810342d080 [ 15.547462] which belongs to the cache kmalloc-64 of size 64 [ 15.547936] The buggy address is located 0 bytes to the right of [ 15.547936] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.548481] [ 15.548569] The buggy address belongs to the physical page: [ 15.548810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.549120] flags: 0x200000000000000(node=0|zone=2) [ 15.549289] page_type: f5(slab) [ 15.549414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.549649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.549876] page dumped because: kasan: bad access detected [ 15.550107] [ 15.550200] Memory state around the buggy address: [ 15.550681] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.551020] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.551334] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.551928] ^ [ 15.552098] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.552316] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.552531] ================================================================== [ 15.229623] ================================================================== [ 15.230336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.230841] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.231175] [ 15.231294] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.231352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.231365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.231388] Call Trace: [ 15.231420] <TASK> [ 15.231442] dump_stack_lvl+0x73/0xb0 [ 15.231473] print_report+0xd1/0x610 [ 15.231496] ? __virt_addr_valid+0x1db/0x2d0 [ 15.231520] ? kasan_atomics_helper+0x860/0x5450 [ 15.231551] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.231574] ? kasan_atomics_helper+0x860/0x5450 [ 15.231597] kasan_report+0x141/0x180 [ 15.231630] ? kasan_atomics_helper+0x860/0x5450 [ 15.231656] kasan_check_range+0x10c/0x1c0 [ 15.231681] __kasan_check_write+0x18/0x20 [ 15.231702] kasan_atomics_helper+0x860/0x5450 [ 15.231726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.231749] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.231775] ? kasan_atomics+0x152/0x310 [ 15.231801] kasan_atomics+0x1dc/0x310 [ 15.231824] ? __pfx_kasan_atomics+0x10/0x10 [ 15.231849] ? __pfx_read_tsc+0x10/0x10 [ 15.231871] ? ktime_get_ts64+0x86/0x230 [ 15.231897] kunit_try_run_case+0x1a5/0x480 [ 15.231923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.231947] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.231972] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.232004] ? __kthread_parkme+0x82/0x180 [ 15.232036] ? preempt_count_sub+0x50/0x80 [ 15.232063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.232098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.232123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.232149] kthread+0x337/0x6f0 [ 15.232171] ? trace_preempt_on+0x20/0xc0 [ 15.232194] ? __pfx_kthread+0x10/0x10 [ 15.232215] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.232239] ? calculate_sigpending+0x7b/0xa0 [ 15.232264] ? __pfx_kthread+0x10/0x10 [ 15.232289] ret_from_fork+0x116/0x1d0 [ 15.232308] ? __pfx_kthread+0x10/0x10 [ 15.232331] ret_from_fork_asm+0x1a/0x30 [ 15.232363] </TASK> [ 15.232375] [ 15.245592] Allocated by task 282: [ 15.245967] kasan_save_stack+0x45/0x70 [ 15.246242] kasan_save_track+0x18/0x40 [ 15.246644] kasan_save_alloc_info+0x3b/0x50 [ 15.246797] __kasan_kmalloc+0xb7/0xc0 [ 15.246932] __kmalloc_cache_noprof+0x189/0x420 [ 15.247100] kasan_atomics+0x95/0x310 [ 15.247235] kunit_try_run_case+0x1a5/0x480 [ 15.247383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.247837] kthread+0x337/0x6f0 [ 15.248155] ret_from_fork+0x116/0x1d0 [ 15.248517] ret_from_fork_asm+0x1a/0x30 [ 15.248899] [ 15.249068] The buggy address belongs to the object at ffff88810342d080 [ 15.249068] which belongs to the cache kmalloc-64 of size 64 [ 15.250242] The buggy address is located 0 bytes to the right of [ 15.250242] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.251498] [ 15.251692] The buggy address belongs to the physical page: [ 15.252193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.252886] flags: 0x200000000000000(node=0|zone=2) [ 15.253344] page_type: f5(slab) [ 15.253663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.253897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.254138] page dumped because: kasan: bad access detected [ 15.254319] [ 15.254392] Memory state around the buggy address: [ 15.254576] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254839] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.255196] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.255539] ^ [ 15.255696] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.256026] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.256336] ================================================================== [ 15.607158] ================================================================== [ 15.607551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.607888] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.608192] [ 15.608285] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.608331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.608344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.608367] Call Trace: [ 15.608388] <TASK> [ 15.608409] dump_stack_lvl+0x73/0xb0 [ 15.608450] print_report+0xd1/0x610 [ 15.608473] ? __virt_addr_valid+0x1db/0x2d0 [ 15.608499] ? kasan_atomics_helper+0x1148/0x5450 [ 15.608522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.608546] ? kasan_atomics_helper+0x1148/0x5450 [ 15.608569] kasan_report+0x141/0x180 [ 15.608592] ? kasan_atomics_helper+0x1148/0x5450 [ 15.608619] kasan_check_range+0x10c/0x1c0 [ 15.608643] __kasan_check_write+0x18/0x20 [ 15.608663] kasan_atomics_helper+0x1148/0x5450 [ 15.608687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.608710] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.608736] ? kasan_atomics+0x152/0x310 [ 15.608763] kasan_atomics+0x1dc/0x310 [ 15.608786] ? __pfx_kasan_atomics+0x10/0x10 [ 15.608810] ? __pfx_read_tsc+0x10/0x10 [ 15.608832] ? ktime_get_ts64+0x86/0x230 [ 15.608864] kunit_try_run_case+0x1a5/0x480 [ 15.608889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.608913] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.608938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.608963] ? __kthread_parkme+0x82/0x180 [ 15.608985] ? preempt_count_sub+0x50/0x80 [ 15.609021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.609046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.609071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.609096] kthread+0x337/0x6f0 [ 15.609115] ? trace_preempt_on+0x20/0xc0 [ 15.609139] ? __pfx_kthread+0x10/0x10 [ 15.609160] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.609184] ? calculate_sigpending+0x7b/0xa0 [ 15.609209] ? __pfx_kthread+0x10/0x10 [ 15.609231] ret_from_fork+0x116/0x1d0 [ 15.609250] ? __pfx_kthread+0x10/0x10 [ 15.609271] ret_from_fork_asm+0x1a/0x30 [ 15.609302] </TASK> [ 15.609312] [ 15.616801] Allocated by task 282: [ 15.616995] kasan_save_stack+0x45/0x70 [ 15.617172] kasan_save_track+0x18/0x40 [ 15.617366] kasan_save_alloc_info+0x3b/0x50 [ 15.617584] __kasan_kmalloc+0xb7/0xc0 [ 15.617772] __kmalloc_cache_noprof+0x189/0x420 [ 15.617967] kasan_atomics+0x95/0x310 [ 15.618143] kunit_try_run_case+0x1a5/0x480 [ 15.618347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.618526] kthread+0x337/0x6f0 [ 15.618648] ret_from_fork+0x116/0x1d0 [ 15.618781] ret_from_fork_asm+0x1a/0x30 [ 15.618922] [ 15.618995] The buggy address belongs to the object at ffff88810342d080 [ 15.618995] which belongs to the cache kmalloc-64 of size 64 [ 15.619782] The buggy address is located 0 bytes to the right of [ 15.619782] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.620194] [ 15.620269] The buggy address belongs to the physical page: [ 15.620461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.620816] flags: 0x200000000000000(node=0|zone=2) [ 15.621068] page_type: f5(slab) [ 15.621246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.621743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.622047] page dumped because: kasan: bad access detected [ 15.622242] [ 15.622311] Memory state around the buggy address: [ 15.622604] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.622914] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.623198] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.623500] ^ [ 15.623682] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.623900] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.624199] ================================================================== [ 15.691511] ================================================================== [ 15.692033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.692391] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.692743] [ 15.692866] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.692915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.692938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.692961] Call Trace: [ 15.692980] <TASK> [ 15.693001] dump_stack_lvl+0x73/0xb0 [ 15.693051] print_report+0xd1/0x610 [ 15.693073] ? __virt_addr_valid+0x1db/0x2d0 [ 15.693097] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.693119] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.693142] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.693164] kasan_report+0x141/0x180 [ 15.693187] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.693213] kasan_check_range+0x10c/0x1c0 [ 15.693238] __kasan_check_write+0x18/0x20 [ 15.693258] kasan_atomics_helper+0x12e6/0x5450 [ 15.693281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.693314] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.693340] ? kasan_atomics+0x152/0x310 [ 15.693369] kasan_atomics+0x1dc/0x310 [ 15.693403] ? __pfx_kasan_atomics+0x10/0x10 [ 15.693447] ? __pfx_read_tsc+0x10/0x10 [ 15.693469] ? ktime_get_ts64+0x86/0x230 [ 15.693493] kunit_try_run_case+0x1a5/0x480 [ 15.693519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.693542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.693567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.693591] ? __kthread_parkme+0x82/0x180 [ 15.693613] ? preempt_count_sub+0x50/0x80 [ 15.693638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.693663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.693688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.693713] kthread+0x337/0x6f0 [ 15.693733] ? trace_preempt_on+0x20/0xc0 [ 15.693757] ? __pfx_kthread+0x10/0x10 [ 15.693778] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.693800] ? calculate_sigpending+0x7b/0xa0 [ 15.693825] ? __pfx_kthread+0x10/0x10 [ 15.693846] ret_from_fork+0x116/0x1d0 [ 15.693865] ? __pfx_kthread+0x10/0x10 [ 15.693886] ret_from_fork_asm+0x1a/0x30 [ 15.693927] </TASK> [ 15.693938] [ 15.701521] Allocated by task 282: [ 15.701742] kasan_save_stack+0x45/0x70 [ 15.701973] kasan_save_track+0x18/0x40 [ 15.702120] kasan_save_alloc_info+0x3b/0x50 [ 15.702270] __kasan_kmalloc+0xb7/0xc0 [ 15.702406] __kmalloc_cache_noprof+0x189/0x420 [ 15.702583] kasan_atomics+0x95/0x310 [ 15.702764] kunit_try_run_case+0x1a5/0x480 [ 15.702982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.703255] kthread+0x337/0x6f0 [ 15.703485] ret_from_fork+0x116/0x1d0 [ 15.703687] ret_from_fork_asm+0x1a/0x30 [ 15.703887] [ 15.703997] The buggy address belongs to the object at ffff88810342d080 [ 15.703997] which belongs to the cache kmalloc-64 of size 64 [ 15.704512] The buggy address is located 0 bytes to the right of [ 15.704512] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.705058] [ 15.705174] The buggy address belongs to the physical page: [ 15.705399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.705759] flags: 0x200000000000000(node=0|zone=2) [ 15.705982] page_type: f5(slab) [ 15.706173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.706526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.706848] page dumped because: kasan: bad access detected [ 15.707088] [ 15.707203] Memory state around the buggy address: [ 15.707386] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.707699] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.707918] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.708235] ^ [ 15.708522] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.708899] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.709234] ================================================================== [ 14.993179] ================================================================== [ 14.993470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.993765] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 14.994131] [ 14.994248] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.994296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.994307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.994330] Call Trace: [ 14.994350] <TASK> [ 14.994370] dump_stack_lvl+0x73/0xb0 [ 14.994401] print_report+0xd1/0x610 [ 14.994425] ? __virt_addr_valid+0x1db/0x2d0 [ 14.994824] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.994848] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.994993] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.995073] kasan_report+0x141/0x180 [ 14.995097] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.995123] __asan_report_store4_noabort+0x1b/0x30 [ 14.995148] kasan_atomics_helper+0x4b6e/0x5450 [ 14.995172] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.995318] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.995345] ? kasan_atomics+0x152/0x310 [ 14.995391] kasan_atomics+0x1dc/0x310 [ 14.995414] ? __pfx_kasan_atomics+0x10/0x10 [ 14.995577] ? __pfx_read_tsc+0x10/0x10 [ 14.995604] ? ktime_get_ts64+0x86/0x230 [ 14.995630] kunit_try_run_case+0x1a5/0x480 [ 14.995657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.995691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.995717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.995752] ? __kthread_parkme+0x82/0x180 [ 14.995775] ? preempt_count_sub+0x50/0x80 [ 14.995799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.995824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.995849] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.995873] kthread+0x337/0x6f0 [ 14.995893] ? trace_preempt_on+0x20/0xc0 [ 14.995917] ? __pfx_kthread+0x10/0x10 [ 14.995938] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.995960] ? calculate_sigpending+0x7b/0xa0 [ 14.995987] ? __pfx_kthread+0x10/0x10 [ 14.996018] ret_from_fork+0x116/0x1d0 [ 14.996038] ? __pfx_kthread+0x10/0x10 [ 14.996059] ret_from_fork_asm+0x1a/0x30 [ 14.996091] </TASK> [ 14.996112] [ 15.005627] Allocated by task 282: [ 15.005841] kasan_save_stack+0x45/0x70 [ 15.006157] kasan_save_track+0x18/0x40 [ 15.006362] kasan_save_alloc_info+0x3b/0x50 [ 15.006708] __kasan_kmalloc+0xb7/0xc0 [ 15.006893] __kmalloc_cache_noprof+0x189/0x420 [ 15.007249] kasan_atomics+0x95/0x310 [ 15.007391] kunit_try_run_case+0x1a5/0x480 [ 15.007610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.007860] kthread+0x337/0x6f0 [ 15.008075] ret_from_fork+0x116/0x1d0 [ 15.008289] ret_from_fork_asm+0x1a/0x30 [ 15.008566] [ 15.008652] The buggy address belongs to the object at ffff88810342d080 [ 15.008652] which belongs to the cache kmalloc-64 of size 64 [ 15.009575] The buggy address is located 0 bytes to the right of [ 15.009575] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.010228] [ 15.010324] The buggy address belongs to the physical page: [ 15.010565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.010811] flags: 0x200000000000000(node=0|zone=2) [ 15.010987] page_type: f5(slab) [ 15.011153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.011544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.011918] page dumped because: kasan: bad access detected [ 15.012101] [ 15.012172] Memory state around the buggy address: [ 15.012421] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.012746] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.013262] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.013668] ^ [ 15.013879] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.014245] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.014579] ================================================================== [ 15.857604] ================================================================== [ 15.857956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.858628] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.859029] [ 15.859138] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.859186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.859210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.859234] Call Trace: [ 15.859254] <TASK> [ 15.859286] dump_stack_lvl+0x73/0xb0 [ 15.859327] print_report+0xd1/0x610 [ 15.859351] ? __virt_addr_valid+0x1db/0x2d0 [ 15.859385] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.859407] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.859453] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.859476] kasan_report+0x141/0x180 [ 15.859498] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.859526] kasan_check_range+0x10c/0x1c0 [ 15.859551] __kasan_check_write+0x18/0x20 [ 15.859572] kasan_atomics_helper+0x16e7/0x5450 [ 15.859595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.859618] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.859644] ? kasan_atomics+0x152/0x310 [ 15.859670] kasan_atomics+0x1dc/0x310 [ 15.859694] ? __pfx_kasan_atomics+0x10/0x10 [ 15.859719] ? __pfx_read_tsc+0x10/0x10 [ 15.859740] ? ktime_get_ts64+0x86/0x230 [ 15.859765] kunit_try_run_case+0x1a5/0x480 [ 15.859790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.859813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.859839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.859862] ? __kthread_parkme+0x82/0x180 [ 15.859883] ? preempt_count_sub+0x50/0x80 [ 15.859907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.859932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.859957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.859981] kthread+0x337/0x6f0 [ 15.860000] ? trace_preempt_on+0x20/0xc0 [ 15.860034] ? __pfx_kthread+0x10/0x10 [ 15.860065] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.860087] ? calculate_sigpending+0x7b/0xa0 [ 15.860112] ? __pfx_kthread+0x10/0x10 [ 15.860148] ret_from_fork+0x116/0x1d0 [ 15.860167] ? __pfx_kthread+0x10/0x10 [ 15.860188] ret_from_fork_asm+0x1a/0x30 [ 15.860231] </TASK> [ 15.860242] [ 15.867695] Allocated by task 282: [ 15.867843] kasan_save_stack+0x45/0x70 [ 15.867998] kasan_save_track+0x18/0x40 [ 15.868203] kasan_save_alloc_info+0x3b/0x50 [ 15.868456] __kasan_kmalloc+0xb7/0xc0 [ 15.868680] __kmalloc_cache_noprof+0x189/0x420 [ 15.868946] kasan_atomics+0x95/0x310 [ 15.869184] kunit_try_run_case+0x1a5/0x480 [ 15.869440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.869701] kthread+0x337/0x6f0 [ 15.869869] ret_from_fork+0x116/0x1d0 [ 15.870062] ret_from_fork_asm+0x1a/0x30 [ 15.870256] [ 15.870350] The buggy address belongs to the object at ffff88810342d080 [ 15.870350] which belongs to the cache kmalloc-64 of size 64 [ 15.870889] The buggy address is located 0 bytes to the right of [ 15.870889] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.871356] [ 15.871455] The buggy address belongs to the physical page: [ 15.871688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.871993] flags: 0x200000000000000(node=0|zone=2) [ 15.872224] page_type: f5(slab) [ 15.872402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.872693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.873050] page dumped because: kasan: bad access detected [ 15.873306] [ 15.873403] Memory state around the buggy address: [ 15.873634] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.873942] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.874239] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.874602] ^ [ 15.874815] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.875044] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.875257] ================================================================== [ 16.314632] ================================================================== [ 16.315170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.315412] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.315626] [ 16.315713] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.315759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.315771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.315794] Call Trace: [ 16.315814] <TASK> [ 16.315835] dump_stack_lvl+0x73/0xb0 [ 16.315863] print_report+0xd1/0x610 [ 16.315886] ? __virt_addr_valid+0x1db/0x2d0 [ 16.315910] ? kasan_atomics_helper+0x5115/0x5450 [ 16.315944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.315968] ? kasan_atomics_helper+0x5115/0x5450 [ 16.315991] kasan_report+0x141/0x180 [ 16.316024] ? kasan_atomics_helper+0x5115/0x5450 [ 16.316052] __asan_report_load8_noabort+0x18/0x20 [ 16.316078] kasan_atomics_helper+0x5115/0x5450 [ 16.316101] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.316124] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.316150] ? kasan_atomics+0x152/0x310 [ 16.316176] kasan_atomics+0x1dc/0x310 [ 16.316200] ? __pfx_kasan_atomics+0x10/0x10 [ 16.316225] ? __pfx_read_tsc+0x10/0x10 [ 16.316247] ? ktime_get_ts64+0x86/0x230 [ 16.316272] kunit_try_run_case+0x1a5/0x480 [ 16.316297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.316354] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.316381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.316405] ? __kthread_parkme+0x82/0x180 [ 16.316427] ? preempt_count_sub+0x50/0x80 [ 16.316481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.316506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.316531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.316556] kthread+0x337/0x6f0 [ 16.316576] ? trace_preempt_on+0x20/0xc0 [ 16.316600] ? __pfx_kthread+0x10/0x10 [ 16.316621] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.316643] ? calculate_sigpending+0x7b/0xa0 [ 16.316669] ? __pfx_kthread+0x10/0x10 [ 16.316691] ret_from_fork+0x116/0x1d0 [ 16.316711] ? __pfx_kthread+0x10/0x10 [ 16.316732] ret_from_fork_asm+0x1a/0x30 [ 16.316765] </TASK> [ 16.316780] [ 16.324841] Allocated by task 282: [ 16.325053] kasan_save_stack+0x45/0x70 [ 16.325261] kasan_save_track+0x18/0x40 [ 16.325481] kasan_save_alloc_info+0x3b/0x50 [ 16.325638] __kasan_kmalloc+0xb7/0xc0 [ 16.325825] __kmalloc_cache_noprof+0x189/0x420 [ 16.326059] kasan_atomics+0x95/0x310 [ 16.326212] kunit_try_run_case+0x1a5/0x480 [ 16.326425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.326633] kthread+0x337/0x6f0 [ 16.326824] ret_from_fork+0x116/0x1d0 [ 16.327003] ret_from_fork_asm+0x1a/0x30 [ 16.327213] [ 16.327306] The buggy address belongs to the object at ffff88810342d080 [ 16.327306] which belongs to the cache kmalloc-64 of size 64 [ 16.327813] The buggy address is located 0 bytes to the right of [ 16.327813] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.328322] [ 16.328424] The buggy address belongs to the physical page: [ 16.328658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.328986] flags: 0x200000000000000(node=0|zone=2) [ 16.329205] page_type: f5(slab) [ 16.329391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.329739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.330036] page dumped because: kasan: bad access detected [ 16.330307] [ 16.330421] Memory state around the buggy address: [ 16.330641] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.330950] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.331274] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.331859] ^ [ 16.332062] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.332282] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.332736] ================================================================== [ 15.821636] ================================================================== [ 15.821981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.822353] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.822681] [ 15.822772] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.822818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.822830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.822853] Call Trace: [ 15.822873] <TASK> [ 15.822892] dump_stack_lvl+0x73/0xb0 [ 15.822921] print_report+0xd1/0x610 [ 15.822943] ? __virt_addr_valid+0x1db/0x2d0 [ 15.822967] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.822988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.823024] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.823046] kasan_report+0x141/0x180 [ 15.823068] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.823095] kasan_check_range+0x10c/0x1c0 [ 15.823119] __kasan_check_write+0x18/0x20 [ 15.823139] kasan_atomics_helper+0x15b6/0x5450 [ 15.823163] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.823186] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.823212] ? kasan_atomics+0x152/0x310 [ 15.823238] kasan_atomics+0x1dc/0x310 [ 15.823260] ? __pfx_kasan_atomics+0x10/0x10 [ 15.823285] ? __pfx_read_tsc+0x10/0x10 [ 15.823306] ? ktime_get_ts64+0x86/0x230 [ 15.823342] kunit_try_run_case+0x1a5/0x480 [ 15.823370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.823394] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.823447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.823471] ? __kthread_parkme+0x82/0x180 [ 15.823492] ? preempt_count_sub+0x50/0x80 [ 15.823525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.823549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.823574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.823610] kthread+0x337/0x6f0 [ 15.823629] ? trace_preempt_on+0x20/0xc0 [ 15.823653] ? __pfx_kthread+0x10/0x10 [ 15.823673] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.823705] ? calculate_sigpending+0x7b/0xa0 [ 15.823729] ? __pfx_kthread+0x10/0x10 [ 15.823750] ret_from_fork+0x116/0x1d0 [ 15.823780] ? __pfx_kthread+0x10/0x10 [ 15.823801] ret_from_fork_asm+0x1a/0x30 [ 15.823832] </TASK> [ 15.823844] [ 15.831533] Allocated by task 282: [ 15.831717] kasan_save_stack+0x45/0x70 [ 15.831884] kasan_save_track+0x18/0x40 [ 15.832106] kasan_save_alloc_info+0x3b/0x50 [ 15.832293] __kasan_kmalloc+0xb7/0xc0 [ 15.832514] __kmalloc_cache_noprof+0x189/0x420 [ 15.832719] kasan_atomics+0x95/0x310 [ 15.832924] kunit_try_run_case+0x1a5/0x480 [ 15.833081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.833258] kthread+0x337/0x6f0 [ 15.833379] ret_from_fork+0x116/0x1d0 [ 15.833537] ret_from_fork_asm+0x1a/0x30 [ 15.833680] [ 15.833757] The buggy address belongs to the object at ffff88810342d080 [ 15.833757] which belongs to the cache kmalloc-64 of size 64 [ 15.834193] The buggy address is located 0 bytes to the right of [ 15.834193] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.834768] [ 15.834866] The buggy address belongs to the physical page: [ 15.835126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.835500] flags: 0x200000000000000(node=0|zone=2) [ 15.835760] page_type: f5(slab) [ 15.835929] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.836308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.836665] page dumped because: kasan: bad access detected [ 15.836952] [ 15.837055] Memory state around the buggy address: [ 15.837278] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837573] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.837790] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.838005] ^ [ 15.838241] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838605] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838948] ================================================================== [ 15.954434] ================================================================== [ 15.954818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.955171] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.955398] [ 15.955487] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.955533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.955545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.955568] Call Trace: [ 15.955588] <TASK> [ 15.955608] dump_stack_lvl+0x73/0xb0 [ 15.955636] print_report+0xd1/0x610 [ 15.955658] ? __virt_addr_valid+0x1db/0x2d0 [ 15.955681] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.955703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.955727] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.955748] kasan_report+0x141/0x180 [ 15.955770] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.955797] kasan_check_range+0x10c/0x1c0 [ 15.955820] __kasan_check_write+0x18/0x20 [ 15.955841] kasan_atomics_helper+0x19e3/0x5450 [ 15.955863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.955885] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.955911] ? kasan_atomics+0x152/0x310 [ 15.955937] kasan_atomics+0x1dc/0x310 [ 15.955959] ? __pfx_kasan_atomics+0x10/0x10 [ 15.955983] ? __pfx_read_tsc+0x10/0x10 [ 15.956004] ? ktime_get_ts64+0x86/0x230 [ 15.956040] kunit_try_run_case+0x1a5/0x480 [ 15.956065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.956087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.956111] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.956134] ? __kthread_parkme+0x82/0x180 [ 15.956155] ? preempt_count_sub+0x50/0x80 [ 15.956205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.956231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.956255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.956281] kthread+0x337/0x6f0 [ 15.956301] ? trace_preempt_on+0x20/0xc0 [ 15.956325] ? __pfx_kthread+0x10/0x10 [ 15.956346] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.956368] ? calculate_sigpending+0x7b/0xa0 [ 15.956393] ? __pfx_kthread+0x10/0x10 [ 15.956414] ret_from_fork+0x116/0x1d0 [ 15.956434] ? __pfx_kthread+0x10/0x10 [ 15.956454] ret_from_fork_asm+0x1a/0x30 [ 15.956487] </TASK> [ 15.956497] [ 15.964256] Allocated by task 282: [ 15.964401] kasan_save_stack+0x45/0x70 [ 15.964557] kasan_save_track+0x18/0x40 [ 15.964717] kasan_save_alloc_info+0x3b/0x50 [ 15.964934] __kasan_kmalloc+0xb7/0xc0 [ 15.965127] __kmalloc_cache_noprof+0x189/0x420 [ 15.965353] kasan_atomics+0x95/0x310 [ 15.965565] kunit_try_run_case+0x1a5/0x480 [ 15.965771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.966031] kthread+0x337/0x6f0 [ 15.966196] ret_from_fork+0x116/0x1d0 [ 15.966378] ret_from_fork_asm+0x1a/0x30 [ 15.966537] [ 15.966609] The buggy address belongs to the object at ffff88810342d080 [ 15.966609] which belongs to the cache kmalloc-64 of size 64 [ 15.967116] The buggy address is located 0 bytes to the right of [ 15.967116] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.967870] [ 15.967986] The buggy address belongs to the physical page: [ 15.968230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.968576] flags: 0x200000000000000(node=0|zone=2) [ 15.968808] page_type: f5(slab) [ 15.969001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.969274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.969668] page dumped because: kasan: bad access detected [ 15.969855] [ 15.969923] Memory state around the buggy address: [ 15.970087] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.970298] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.970668] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.970990] ^ [ 15.971225] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.971702] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.972027] ================================================================== [ 15.553136] ================================================================== [ 15.553537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.553895] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.554414] [ 15.554534] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.554581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.554594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.554618] Call Trace: [ 15.554640] <TASK> [ 15.554660] dump_stack_lvl+0x73/0xb0 [ 15.554691] print_report+0xd1/0x610 [ 15.554716] ? __virt_addr_valid+0x1db/0x2d0 [ 15.554742] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.554765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.554788] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.554810] kasan_report+0x141/0x180 [ 15.554833] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.554859] __asan_report_load4_noabort+0x18/0x20 [ 15.554885] kasan_atomics_helper+0x4a36/0x5450 [ 15.554908] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.554931] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.554958] ? kasan_atomics+0x152/0x310 [ 15.554985] kasan_atomics+0x1dc/0x310 [ 15.555623] ? __pfx_kasan_atomics+0x10/0x10 [ 15.555672] ? __pfx_read_tsc+0x10/0x10 [ 15.555697] ? ktime_get_ts64+0x86/0x230 [ 15.555723] kunit_try_run_case+0x1a5/0x480 [ 15.555751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.555774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.555801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.555826] ? __kthread_parkme+0x82/0x180 [ 15.555847] ? preempt_count_sub+0x50/0x80 [ 15.555873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.555897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.555922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.555947] kthread+0x337/0x6f0 [ 15.555967] ? trace_preempt_on+0x20/0xc0 [ 15.555991] ? __pfx_kthread+0x10/0x10 [ 15.556024] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.556047] ? calculate_sigpending+0x7b/0xa0 [ 15.556073] ? __pfx_kthread+0x10/0x10 [ 15.556095] ret_from_fork+0x116/0x1d0 [ 15.556115] ? __pfx_kthread+0x10/0x10 [ 15.556136] ret_from_fork_asm+0x1a/0x30 [ 15.556168] </TASK> [ 15.556179] [ 15.563586] Allocated by task 282: [ 15.563743] kasan_save_stack+0x45/0x70 [ 15.563956] kasan_save_track+0x18/0x40 [ 15.564147] kasan_save_alloc_info+0x3b/0x50 [ 15.564301] __kasan_kmalloc+0xb7/0xc0 [ 15.564474] __kmalloc_cache_noprof+0x189/0x420 [ 15.564711] kasan_atomics+0x95/0x310 [ 15.564908] kunit_try_run_case+0x1a5/0x480 [ 15.565092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.565337] kthread+0x337/0x6f0 [ 15.565505] ret_from_fork+0x116/0x1d0 [ 15.565685] ret_from_fork_asm+0x1a/0x30 [ 15.565865] [ 15.565974] The buggy address belongs to the object at ffff88810342d080 [ 15.565974] which belongs to the cache kmalloc-64 of size 64 [ 15.566431] The buggy address is located 0 bytes to the right of [ 15.566431] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.566922] [ 15.567021] The buggy address belongs to the physical page: [ 15.567233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.567568] flags: 0x200000000000000(node=0|zone=2) [ 15.567799] page_type: f5(slab) [ 15.567946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.568231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.568461] page dumped because: kasan: bad access detected [ 15.568632] [ 15.568702] Memory state around the buggy address: [ 15.568867] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569131] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.569486] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.569802] ^ [ 15.570034] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.570287] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.570692] ================================================================== [ 16.157615] ================================================================== [ 16.158201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.158555] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.158862] [ 16.158982] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.159300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.159318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.159342] Call Trace: [ 16.159363] <TASK> [ 16.159385] dump_stack_lvl+0x73/0xb0 [ 16.159418] print_report+0xd1/0x610 [ 16.159876] ? __virt_addr_valid+0x1db/0x2d0 [ 16.159905] ? kasan_atomics_helper+0x2006/0x5450 [ 16.159928] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.159955] ? kasan_atomics_helper+0x2006/0x5450 [ 16.159979] kasan_report+0x141/0x180 [ 16.160002] ? kasan_atomics_helper+0x2006/0x5450 [ 16.160042] kasan_check_range+0x10c/0x1c0 [ 16.160067] __kasan_check_write+0x18/0x20 [ 16.160087] kasan_atomics_helper+0x2006/0x5450 [ 16.160109] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.160133] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.160160] ? kasan_atomics+0x152/0x310 [ 16.160186] kasan_atomics+0x1dc/0x310 [ 16.160209] ? __pfx_kasan_atomics+0x10/0x10 [ 16.160241] ? __pfx_read_tsc+0x10/0x10 [ 16.160264] ? ktime_get_ts64+0x86/0x230 [ 16.160290] kunit_try_run_case+0x1a5/0x480 [ 16.160315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160339] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.160365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.160389] ? __kthread_parkme+0x82/0x180 [ 16.160412] ? preempt_count_sub+0x50/0x80 [ 16.160707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.161640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.161676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.161714] kthread+0x337/0x6f0 [ 16.161924] ? trace_preempt_on+0x20/0xc0 [ 16.161955] ? __pfx_kthread+0x10/0x10 [ 16.161991] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.162025] ? calculate_sigpending+0x7b/0xa0 [ 16.162051] ? __pfx_kthread+0x10/0x10 [ 16.162073] ret_from_fork+0x116/0x1d0 [ 16.162093] ? __pfx_kthread+0x10/0x10 [ 16.162114] ret_from_fork_asm+0x1a/0x30 [ 16.162147] </TASK> [ 16.162160] [ 16.175700] Allocated by task 282: [ 16.176083] kasan_save_stack+0x45/0x70 [ 16.176426] kasan_save_track+0x18/0x40 [ 16.176724] kasan_save_alloc_info+0x3b/0x50 [ 16.176885] __kasan_kmalloc+0xb7/0xc0 [ 16.177037] __kmalloc_cache_noprof+0x189/0x420 [ 16.177200] kasan_atomics+0x95/0x310 [ 16.177336] kunit_try_run_case+0x1a5/0x480 [ 16.177663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.178145] kthread+0x337/0x6f0 [ 16.178476] ret_from_fork+0x116/0x1d0 [ 16.178831] ret_from_fork_asm+0x1a/0x30 [ 16.179203] [ 16.179381] The buggy address belongs to the object at ffff88810342d080 [ 16.179381] which belongs to the cache kmalloc-64 of size 64 [ 16.180471] The buggy address is located 0 bytes to the right of [ 16.180471] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.181576] [ 16.181747] The buggy address belongs to the physical page: [ 16.182134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.182379] flags: 0x200000000000000(node=0|zone=2) [ 16.182860] page_type: f5(slab) [ 16.183187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.183879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.184554] page dumped because: kasan: bad access detected [ 16.184908] [ 16.185085] Memory state around the buggy address: [ 16.185438] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.185916] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.186213] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.186861] ^ [ 16.187140] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.187748] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.187965] ================================================================== [ 15.936833] ================================================================== [ 15.937216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.937564] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.937860] [ 15.937976] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.938036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.938049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.938073] Call Trace: [ 15.938093] <TASK> [ 15.938114] dump_stack_lvl+0x73/0xb0 [ 15.938144] print_report+0xd1/0x610 [ 15.938167] ? __virt_addr_valid+0x1db/0x2d0 [ 15.938191] ? kasan_atomics_helper+0x194a/0x5450 [ 15.938213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.938238] ? kasan_atomics_helper+0x194a/0x5450 [ 15.938261] kasan_report+0x141/0x180 [ 15.938284] ? kasan_atomics_helper+0x194a/0x5450 [ 15.938310] kasan_check_range+0x10c/0x1c0 [ 15.938336] __kasan_check_write+0x18/0x20 [ 15.938357] kasan_atomics_helper+0x194a/0x5450 [ 15.938380] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.938403] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.938429] ? kasan_atomics+0x152/0x310 [ 15.938456] kasan_atomics+0x1dc/0x310 [ 15.938479] ? __pfx_kasan_atomics+0x10/0x10 [ 15.938504] ? __pfx_read_tsc+0x10/0x10 [ 15.938526] ? ktime_get_ts64+0x86/0x230 [ 15.938551] kunit_try_run_case+0x1a5/0x480 [ 15.938577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.938600] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.938625] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.938650] ? __kthread_parkme+0x82/0x180 [ 15.938671] ? preempt_count_sub+0x50/0x80 [ 15.938695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.938720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.938745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.938770] kthread+0x337/0x6f0 [ 15.938790] ? trace_preempt_on+0x20/0xc0 [ 15.938813] ? __pfx_kthread+0x10/0x10 [ 15.938834] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.938856] ? calculate_sigpending+0x7b/0xa0 [ 15.938881] ? __pfx_kthread+0x10/0x10 [ 15.938903] ret_from_fork+0x116/0x1d0 [ 15.938922] ? __pfx_kthread+0x10/0x10 [ 15.938943] ret_from_fork_asm+0x1a/0x30 [ 15.938974] </TASK> [ 15.938984] [ 15.946080] Allocated by task 282: [ 15.946272] kasan_save_stack+0x45/0x70 [ 15.946543] kasan_save_track+0x18/0x40 [ 15.946746] kasan_save_alloc_info+0x3b/0x50 [ 15.946979] __kasan_kmalloc+0xb7/0xc0 [ 15.947139] __kmalloc_cache_noprof+0x189/0x420 [ 15.947292] kasan_atomics+0x95/0x310 [ 15.947451] kunit_try_run_case+0x1a5/0x480 [ 15.947684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.947959] kthread+0x337/0x6f0 [ 15.948139] ret_from_fork+0x116/0x1d0 [ 15.948343] ret_from_fork_asm+0x1a/0x30 [ 15.948612] [ 15.948693] The buggy address belongs to the object at ffff88810342d080 [ 15.948693] which belongs to the cache kmalloc-64 of size 64 [ 15.949154] The buggy address is located 0 bytes to the right of [ 15.949154] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.949644] [ 15.949742] The buggy address belongs to the physical page: [ 15.950004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.950328] flags: 0x200000000000000(node=0|zone=2) [ 15.950584] page_type: f5(slab) [ 15.950726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.950982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.951212] page dumped because: kasan: bad access detected [ 15.951377] [ 15.951446] Memory state around the buggy address: [ 15.951631] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.951942] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.952261] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.952561] ^ [ 15.952840] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.953169] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.953396] ================================================================== [ 16.048351] ================================================================== [ 16.048966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.049414] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.049631] [ 16.049807] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.049856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.049869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.049892] Call Trace: [ 16.049912] <TASK> [ 16.049933] dump_stack_lvl+0x73/0xb0 [ 16.049964] print_report+0xd1/0x610 [ 16.049986] ? __virt_addr_valid+0x1db/0x2d0 [ 16.050021] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.050043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.050068] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.050091] kasan_report+0x141/0x180 [ 16.050112] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.050139] kasan_check_range+0x10c/0x1c0 [ 16.050164] __kasan_check_write+0x18/0x20 [ 16.050183] kasan_atomics_helper+0x1ce1/0x5450 [ 16.050207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.050230] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.050257] ? kasan_atomics+0x152/0x310 [ 16.050283] kasan_atomics+0x1dc/0x310 [ 16.050306] ? __pfx_kasan_atomics+0x10/0x10 [ 16.050331] ? __pfx_read_tsc+0x10/0x10 [ 16.050352] ? ktime_get_ts64+0x86/0x230 [ 16.050378] kunit_try_run_case+0x1a5/0x480 [ 16.050404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.050427] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.050452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.050479] ? __kthread_parkme+0x82/0x180 [ 16.050502] ? preempt_count_sub+0x50/0x80 [ 16.050530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.050557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.050584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.050608] kthread+0x337/0x6f0 [ 16.050629] ? trace_preempt_on+0x20/0xc0 [ 16.050654] ? __pfx_kthread+0x10/0x10 [ 16.050680] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.050723] ? calculate_sigpending+0x7b/0xa0 [ 16.050749] ? __pfx_kthread+0x10/0x10 [ 16.050771] ret_from_fork+0x116/0x1d0 [ 16.050790] ? __pfx_kthread+0x10/0x10 [ 16.050813] ret_from_fork_asm+0x1a/0x30 [ 16.050844] </TASK> [ 16.050855] [ 16.058262] Allocated by task 282: [ 16.058402] kasan_save_stack+0x45/0x70 [ 16.058551] kasan_save_track+0x18/0x40 [ 16.058685] kasan_save_alloc_info+0x3b/0x50 [ 16.058831] __kasan_kmalloc+0xb7/0xc0 [ 16.058960] __kmalloc_cache_noprof+0x189/0x420 [ 16.059372] kasan_atomics+0x95/0x310 [ 16.059686] kunit_try_run_case+0x1a5/0x480 [ 16.059888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.060265] kthread+0x337/0x6f0 [ 16.060608] ret_from_fork+0x116/0x1d0 [ 16.060748] ret_from_fork_asm+0x1a/0x30 [ 16.060888] [ 16.060959] The buggy address belongs to the object at ffff88810342d080 [ 16.060959] which belongs to the cache kmalloc-64 of size 64 [ 16.061316] The buggy address is located 0 bytes to the right of [ 16.061316] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.062390] [ 16.062506] The buggy address belongs to the physical page: [ 16.062761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.063098] flags: 0x200000000000000(node=0|zone=2) [ 16.063304] page_type: f5(slab) [ 16.063456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.063702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.063923] page dumped because: kasan: bad access detected [ 16.064096] [ 16.064164] Memory state around the buggy address: [ 16.064314] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.064524] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.064804] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.065121] ^ [ 16.065340] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.065942] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.066255] ================================================================== [ 16.231108] ================================================================== [ 16.231476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.231851] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.232328] [ 16.232441] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.232521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.232534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.232557] Call Trace: [ 16.232603] <TASK> [ 16.232625] dump_stack_lvl+0x73/0xb0 [ 16.232658] print_report+0xd1/0x610 [ 16.232681] ? __virt_addr_valid+0x1db/0x2d0 [ 16.232706] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.232728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.232752] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.232775] kasan_report+0x141/0x180 [ 16.232798] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.232825] __asan_report_load8_noabort+0x18/0x20 [ 16.232859] kasan_atomics_helper+0x4fb2/0x5450 [ 16.232881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.232904] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.232932] ? kasan_atomics+0x152/0x310 [ 16.232959] kasan_atomics+0x1dc/0x310 [ 16.232982] ? __pfx_kasan_atomics+0x10/0x10 [ 16.233029] ? __pfx_read_tsc+0x10/0x10 [ 16.233052] ? ktime_get_ts64+0x86/0x230 [ 16.233077] kunit_try_run_case+0x1a5/0x480 [ 16.233103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.233126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.233151] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.233176] ? __kthread_parkme+0x82/0x180 [ 16.233198] ? preempt_count_sub+0x50/0x80 [ 16.233222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.233247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.233273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.233298] kthread+0x337/0x6f0 [ 16.233317] ? trace_preempt_on+0x20/0xc0 [ 16.233341] ? __pfx_kthread+0x10/0x10 [ 16.233362] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.233384] ? calculate_sigpending+0x7b/0xa0 [ 16.233427] ? __pfx_kthread+0x10/0x10 [ 16.233449] ret_from_fork+0x116/0x1d0 [ 16.233468] ? __pfx_kthread+0x10/0x10 [ 16.233489] ret_from_fork_asm+0x1a/0x30 [ 16.233521] </TASK> [ 16.233533] [ 16.241684] Allocated by task 282: [ 16.241880] kasan_save_stack+0x45/0x70 [ 16.242106] kasan_save_track+0x18/0x40 [ 16.242300] kasan_save_alloc_info+0x3b/0x50 [ 16.242525] __kasan_kmalloc+0xb7/0xc0 [ 16.242665] __kmalloc_cache_noprof+0x189/0x420 [ 16.242826] kasan_atomics+0x95/0x310 [ 16.242962] kunit_try_run_case+0x1a5/0x480 [ 16.243122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.243440] kthread+0x337/0x6f0 [ 16.243612] ret_from_fork+0x116/0x1d0 [ 16.243803] ret_from_fork_asm+0x1a/0x30 [ 16.244029] [ 16.244127] The buggy address belongs to the object at ffff88810342d080 [ 16.244127] which belongs to the cache kmalloc-64 of size 64 [ 16.246048] The buggy address is located 0 bytes to the right of [ 16.246048] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.246904] [ 16.246991] The buggy address belongs to the physical page: [ 16.247175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.247409] flags: 0x200000000000000(node=0|zone=2) [ 16.247901] page_type: f5(slab) [ 16.248226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.248907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.249629] page dumped because: kasan: bad access detected [ 16.250213] [ 16.250386] Memory state around the buggy address: [ 16.250827] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251319] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.251573] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.252132] ^ [ 16.252288] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.252679] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.253299] ================================================================== [ 15.839917] ================================================================== [ 15.840279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.840554] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.840894] [ 15.841026] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.841075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.841099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.841122] Call Trace: [ 15.841143] <TASK> [ 15.841163] dump_stack_lvl+0x73/0xb0 [ 15.841194] print_report+0xd1/0x610 [ 15.841227] ? __virt_addr_valid+0x1db/0x2d0 [ 15.841252] ? kasan_atomics_helper+0x164f/0x5450 [ 15.841274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.841308] ? kasan_atomics_helper+0x164f/0x5450 [ 15.841331] kasan_report+0x141/0x180 [ 15.841353] ? kasan_atomics_helper+0x164f/0x5450 [ 15.841380] kasan_check_range+0x10c/0x1c0 [ 15.841433] __kasan_check_write+0x18/0x20 [ 15.841457] kasan_atomics_helper+0x164f/0x5450 [ 15.841491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.841515] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.841542] ? kasan_atomics+0x152/0x310 [ 15.841568] kasan_atomics+0x1dc/0x310 [ 15.841591] ? __pfx_kasan_atomics+0x10/0x10 [ 15.841624] ? __pfx_read_tsc+0x10/0x10 [ 15.841646] ? ktime_get_ts64+0x86/0x230 [ 15.841671] kunit_try_run_case+0x1a5/0x480 [ 15.841709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.841732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.841757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.841790] ? __kthread_parkme+0x82/0x180 [ 15.841812] ? preempt_count_sub+0x50/0x80 [ 15.841836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.841870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.841895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.841920] kthread+0x337/0x6f0 [ 15.841940] ? trace_preempt_on+0x20/0xc0 [ 15.841971] ? __pfx_kthread+0x10/0x10 [ 15.841992] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.842028] ? calculate_sigpending+0x7b/0xa0 [ 15.842054] ? __pfx_kthread+0x10/0x10 [ 15.842075] ret_from_fork+0x116/0x1d0 [ 15.842095] ? __pfx_kthread+0x10/0x10 [ 15.842115] ret_from_fork_asm+0x1a/0x30 [ 15.842157] </TASK> [ 15.842168] [ 15.849750] Allocated by task 282: [ 15.849924] kasan_save_stack+0x45/0x70 [ 15.850158] kasan_save_track+0x18/0x40 [ 15.850344] kasan_save_alloc_info+0x3b/0x50 [ 15.850559] __kasan_kmalloc+0xb7/0xc0 [ 15.850757] __kmalloc_cache_noprof+0x189/0x420 [ 15.850977] kasan_atomics+0x95/0x310 [ 15.851171] kunit_try_run_case+0x1a5/0x480 [ 15.851368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.851624] kthread+0x337/0x6f0 [ 15.851805] ret_from_fork+0x116/0x1d0 [ 15.851955] ret_from_fork_asm+0x1a/0x30 [ 15.852107] [ 15.852179] The buggy address belongs to the object at ffff88810342d080 [ 15.852179] which belongs to the cache kmalloc-64 of size 64 [ 15.852555] The buggy address is located 0 bytes to the right of [ 15.852555] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.852927] [ 15.853002] The buggy address belongs to the physical page: [ 15.853290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.853668] flags: 0x200000000000000(node=0|zone=2) [ 15.853904] page_type: f5(slab) [ 15.854085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.854472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.854784] page dumped because: kasan: bad access detected [ 15.854956] [ 15.855035] Memory state around the buggy address: [ 15.855191] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.855426] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.855642] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.855972] ^ [ 15.856204] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.856552] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.856899] ================================================================== [ 15.803282] ================================================================== [ 15.803873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.804184] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.804604] [ 15.804706] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.804754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.804777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.804799] Call Trace: [ 15.804820] <TASK> [ 15.804841] dump_stack_lvl+0x73/0xb0 [ 15.804886] print_report+0xd1/0x610 [ 15.804910] ? __virt_addr_valid+0x1db/0x2d0 [ 15.804934] ? kasan_atomics_helper+0x151d/0x5450 [ 15.804966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.804989] ? kasan_atomics_helper+0x151d/0x5450 [ 15.805027] kasan_report+0x141/0x180 [ 15.805050] ? kasan_atomics_helper+0x151d/0x5450 [ 15.805076] kasan_check_range+0x10c/0x1c0 [ 15.805112] __kasan_check_write+0x18/0x20 [ 15.805131] kasan_atomics_helper+0x151d/0x5450 [ 15.805154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.805189] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.805215] ? kasan_atomics+0x152/0x310 [ 15.805241] kasan_atomics+0x1dc/0x310 [ 15.805275] ? __pfx_kasan_atomics+0x10/0x10 [ 15.805301] ? __pfx_read_tsc+0x10/0x10 [ 15.805323] ? ktime_get_ts64+0x86/0x230 [ 15.805360] kunit_try_run_case+0x1a5/0x480 [ 15.805386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.805438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.805464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.805500] ? __kthread_parkme+0x82/0x180 [ 15.805521] ? preempt_count_sub+0x50/0x80 [ 15.805546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.805583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.805609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.805634] kthread+0x337/0x6f0 [ 15.805664] ? trace_preempt_on+0x20/0xc0 [ 15.805688] ? __pfx_kthread+0x10/0x10 [ 15.805709] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.805742] ? calculate_sigpending+0x7b/0xa0 [ 15.805768] ? __pfx_kthread+0x10/0x10 [ 15.805789] ret_from_fork+0x116/0x1d0 [ 15.805809] ? __pfx_kthread+0x10/0x10 [ 15.805830] ret_from_fork_asm+0x1a/0x30 [ 15.805862] </TASK> [ 15.805876] [ 15.813286] Allocated by task 282: [ 15.813487] kasan_save_stack+0x45/0x70 [ 15.813716] kasan_save_track+0x18/0x40 [ 15.813922] kasan_save_alloc_info+0x3b/0x50 [ 15.814097] __kasan_kmalloc+0xb7/0xc0 [ 15.814303] __kmalloc_cache_noprof+0x189/0x420 [ 15.814540] kasan_atomics+0x95/0x310 [ 15.814712] kunit_try_run_case+0x1a5/0x480 [ 15.814944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.815139] kthread+0x337/0x6f0 [ 15.815262] ret_from_fork+0x116/0x1d0 [ 15.815397] ret_from_fork_asm+0x1a/0x30 [ 15.815570] [ 15.815691] The buggy address belongs to the object at ffff88810342d080 [ 15.815691] which belongs to the cache kmalloc-64 of size 64 [ 15.816320] The buggy address is located 0 bytes to the right of [ 15.816320] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.816921] [ 15.817031] The buggy address belongs to the physical page: [ 15.817282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.817641] flags: 0x200000000000000(node=0|zone=2) [ 15.817815] page_type: f5(slab) [ 15.817989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.818348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.818702] page dumped because: kasan: bad access detected [ 15.818875] [ 15.818945] Memory state around the buggy address: [ 15.819123] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819343] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.819589] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.819855] ^ [ 15.820102] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820434] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820745] ================================================================== [ 16.084699] ================================================================== [ 16.085252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.085571] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.085798] [ 16.085888] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.085934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.085947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.085970] Call Trace: [ 16.085990] <TASK> [ 16.086022] dump_stack_lvl+0x73/0xb0 [ 16.086051] print_report+0xd1/0x610 [ 16.086075] ? __virt_addr_valid+0x1db/0x2d0 [ 16.086100] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.086121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.086145] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.086168] kasan_report+0x141/0x180 [ 16.086190] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.086217] kasan_check_range+0x10c/0x1c0 [ 16.086241] __kasan_check_write+0x18/0x20 [ 16.086261] kasan_atomics_helper+0x1e12/0x5450 [ 16.086285] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.086308] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.086334] ? kasan_atomics+0x152/0x310 [ 16.086360] kasan_atomics+0x1dc/0x310 [ 16.086383] ? __pfx_kasan_atomics+0x10/0x10 [ 16.086407] ? __pfx_read_tsc+0x10/0x10 [ 16.086442] ? ktime_get_ts64+0x86/0x230 [ 16.086467] kunit_try_run_case+0x1a5/0x480 [ 16.086492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.086515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.086541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.086565] ? __kthread_parkme+0x82/0x180 [ 16.086587] ? preempt_count_sub+0x50/0x80 [ 16.086612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.086637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.086662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.086688] kthread+0x337/0x6f0 [ 16.086707] ? trace_preempt_on+0x20/0xc0 [ 16.086731] ? __pfx_kthread+0x10/0x10 [ 16.086752] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.086774] ? calculate_sigpending+0x7b/0xa0 [ 16.086799] ? __pfx_kthread+0x10/0x10 [ 16.086821] ret_from_fork+0x116/0x1d0 [ 16.086840] ? __pfx_kthread+0x10/0x10 [ 16.086861] ret_from_fork_asm+0x1a/0x30 [ 16.086892] </TASK> [ 16.086903] [ 16.094045] Allocated by task 282: [ 16.094216] kasan_save_stack+0x45/0x70 [ 16.094410] kasan_save_track+0x18/0x40 [ 16.094582] kasan_save_alloc_info+0x3b/0x50 [ 16.094774] __kasan_kmalloc+0xb7/0xc0 [ 16.094903] __kmalloc_cache_noprof+0x189/0x420 [ 16.095090] kasan_atomics+0x95/0x310 [ 16.095271] kunit_try_run_case+0x1a5/0x480 [ 16.095520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.095736] kthread+0x337/0x6f0 [ 16.095887] ret_from_fork+0x116/0x1d0 [ 16.096027] ret_from_fork_asm+0x1a/0x30 [ 16.096227] [ 16.096324] The buggy address belongs to the object at ffff88810342d080 [ 16.096324] which belongs to the cache kmalloc-64 of size 64 [ 16.096886] The buggy address is located 0 bytes to the right of [ 16.096886] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.097369] [ 16.097459] The buggy address belongs to the physical page: [ 16.097712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.098052] flags: 0x200000000000000(node=0|zone=2) [ 16.098251] page_type: f5(slab) [ 16.098408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.098692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.098993] page dumped because: kasan: bad access detected [ 16.099206] [ 16.099274] Memory state around the buggy address: [ 16.099426] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.099671] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.099976] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.100266] ^ [ 16.100416] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.100706] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.101035] ================================================================== [ 15.294732] ================================================================== [ 15.295101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.295461] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.295719] [ 15.295820] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.295867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.295879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.295906] Call Trace: [ 15.295927] <TASK> [ 15.295949] dump_stack_lvl+0x73/0xb0 [ 15.295978] print_report+0xd1/0x610 [ 15.296002] ? __virt_addr_valid+0x1db/0x2d0 [ 15.296036] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.296069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.296093] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.296116] kasan_report+0x141/0x180 [ 15.296149] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.296176] kasan_check_range+0x10c/0x1c0 [ 15.296201] __kasan_check_write+0x18/0x20 [ 15.296221] kasan_atomics_helper+0xa2b/0x5450 [ 15.296244] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.296268] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.296294] ? kasan_atomics+0x152/0x310 [ 15.296321] kasan_atomics+0x1dc/0x310 [ 15.296344] ? __pfx_kasan_atomics+0x10/0x10 [ 15.296369] ? __pfx_read_tsc+0x10/0x10 [ 15.296391] ? ktime_get_ts64+0x86/0x230 [ 15.296416] kunit_try_run_case+0x1a5/0x480 [ 15.296442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.296464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.296490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.296514] ? __kthread_parkme+0x82/0x180 [ 15.296536] ? preempt_count_sub+0x50/0x80 [ 15.296561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.296585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.296610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.296636] kthread+0x337/0x6f0 [ 15.296656] ? trace_preempt_on+0x20/0xc0 [ 15.296680] ? __pfx_kthread+0x10/0x10 [ 15.296701] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.296725] ? calculate_sigpending+0x7b/0xa0 [ 15.296762] ? __pfx_kthread+0x10/0x10 [ 15.296784] ret_from_fork+0x116/0x1d0 [ 15.296803] ? __pfx_kthread+0x10/0x10 [ 15.296834] ret_from_fork_asm+0x1a/0x30 [ 15.296872] </TASK> [ 15.296882] [ 15.304807] Allocated by task 282: [ 15.305017] kasan_save_stack+0x45/0x70 [ 15.305232] kasan_save_track+0x18/0x40 [ 15.305417] kasan_save_alloc_info+0x3b/0x50 [ 15.305645] __kasan_kmalloc+0xb7/0xc0 [ 15.305870] __kmalloc_cache_noprof+0x189/0x420 [ 15.306091] kasan_atomics+0x95/0x310 [ 15.306302] kunit_try_run_case+0x1a5/0x480 [ 15.306531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.306780] kthread+0x337/0x6f0 [ 15.306911] ret_from_fork+0x116/0x1d0 [ 15.307063] ret_from_fork_asm+0x1a/0x30 [ 15.307280] [ 15.307376] The buggy address belongs to the object at ffff88810342d080 [ 15.307376] which belongs to the cache kmalloc-64 of size 64 [ 15.307957] The buggy address is located 0 bytes to the right of [ 15.307957] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.308513] [ 15.308602] The buggy address belongs to the physical page: [ 15.308870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.309209] flags: 0x200000000000000(node=0|zone=2) [ 15.309441] page_type: f5(slab) [ 15.309568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.309801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.310037] page dumped because: kasan: bad access detected [ 15.310209] [ 15.310279] Memory state around the buggy address: [ 15.310436] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.310655] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.310872] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.311212] ^ [ 15.311436] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.311749] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.312072] ================================================================== [ 15.059585] ================================================================== [ 15.060278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.060964] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.061658] [ 15.061856] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.061906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.061918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.061950] Call Trace: [ 15.061970] <TASK> [ 15.061992] dump_stack_lvl+0x73/0xb0 [ 15.062039] print_report+0xd1/0x610 [ 15.062063] ? __virt_addr_valid+0x1db/0x2d0 [ 15.062086] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.062108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.062132] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.062154] kasan_report+0x141/0x180 [ 15.062176] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.062203] kasan_check_range+0x10c/0x1c0 [ 15.062227] __kasan_check_write+0x18/0x20 [ 15.062247] kasan_atomics_helper+0x4a0/0x5450 [ 15.062270] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.062293] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.062319] ? kasan_atomics+0x152/0x310 [ 15.062346] kasan_atomics+0x1dc/0x310 [ 15.062370] ? __pfx_kasan_atomics+0x10/0x10 [ 15.062394] ? __pfx_read_tsc+0x10/0x10 [ 15.062440] ? ktime_get_ts64+0x86/0x230 [ 15.062465] kunit_try_run_case+0x1a5/0x480 [ 15.062492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.062514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.062540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.062564] ? __kthread_parkme+0x82/0x180 [ 15.062586] ? preempt_count_sub+0x50/0x80 [ 15.062611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.062635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.062661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.062686] kthread+0x337/0x6f0 [ 15.062705] ? trace_preempt_on+0x20/0xc0 [ 15.062729] ? __pfx_kthread+0x10/0x10 [ 15.062750] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.062773] ? calculate_sigpending+0x7b/0xa0 [ 15.062798] ? __pfx_kthread+0x10/0x10 [ 15.062819] ret_from_fork+0x116/0x1d0 [ 15.062838] ? __pfx_kthread+0x10/0x10 [ 15.062859] ret_from_fork_asm+0x1a/0x30 [ 15.062891] </TASK> [ 15.062903] [ 15.075268] Allocated by task 282: [ 15.075445] kasan_save_stack+0x45/0x70 [ 15.075822] kasan_save_track+0x18/0x40 [ 15.076188] kasan_save_alloc_info+0x3b/0x50 [ 15.076604] __kasan_kmalloc+0xb7/0xc0 [ 15.076960] __kmalloc_cache_noprof+0x189/0x420 [ 15.077383] kasan_atomics+0x95/0x310 [ 15.077749] kunit_try_run_case+0x1a5/0x480 [ 15.078152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.078559] kthread+0x337/0x6f0 [ 15.078685] ret_from_fork+0x116/0x1d0 [ 15.078820] ret_from_fork_asm+0x1a/0x30 [ 15.078963] [ 15.079078] The buggy address belongs to the object at ffff88810342d080 [ 15.079078] which belongs to the cache kmalloc-64 of size 64 [ 15.080157] The buggy address is located 0 bytes to the right of [ 15.080157] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.081263] [ 15.081443] The buggy address belongs to the physical page: [ 15.081892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.082145] flags: 0x200000000000000(node=0|zone=2) [ 15.082312] page_type: f5(slab) [ 15.082464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.083138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.083775] page dumped because: kasan: bad access detected [ 15.084266] [ 15.084445] Memory state around the buggy address: [ 15.084851] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.085462] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.086336] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.086829] ^ [ 15.086987] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087205] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087432] ================================================================== [ 15.450601] ================================================================== [ 15.451679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.452383] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.453257] [ 15.453512] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.453566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.453580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.453603] Call Trace: [ 15.453625] <TASK> [ 15.453648] dump_stack_lvl+0x73/0xb0 [ 15.453682] print_report+0xd1/0x610 [ 15.453728] ? __virt_addr_valid+0x1db/0x2d0 [ 15.453754] ? kasan_atomics_helper+0xde0/0x5450 [ 15.453776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.453800] ? kasan_atomics_helper+0xde0/0x5450 [ 15.453822] kasan_report+0x141/0x180 [ 15.453844] ? kasan_atomics_helper+0xde0/0x5450 [ 15.453870] kasan_check_range+0x10c/0x1c0 [ 15.453896] __kasan_check_write+0x18/0x20 [ 15.453920] kasan_atomics_helper+0xde0/0x5450 [ 15.453943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.453966] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.453993] ? kasan_atomics+0x152/0x310 [ 15.454029] kasan_atomics+0x1dc/0x310 [ 15.454052] ? __pfx_kasan_atomics+0x10/0x10 [ 15.454078] ? __pfx_read_tsc+0x10/0x10 [ 15.454100] ? ktime_get_ts64+0x86/0x230 [ 15.454125] kunit_try_run_case+0x1a5/0x480 [ 15.454151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.454175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.454200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.454224] ? __kthread_parkme+0x82/0x180 [ 15.454246] ? preempt_count_sub+0x50/0x80 [ 15.454272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.454297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.454322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.454348] kthread+0x337/0x6f0 [ 15.454368] ? trace_preempt_on+0x20/0xc0 [ 15.454392] ? __pfx_kthread+0x10/0x10 [ 15.454413] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.454447] ? calculate_sigpending+0x7b/0xa0 [ 15.454473] ? __pfx_kthread+0x10/0x10 [ 15.454494] ret_from_fork+0x116/0x1d0 [ 15.454514] ? __pfx_kthread+0x10/0x10 [ 15.454535] ret_from_fork_asm+0x1a/0x30 [ 15.454567] </TASK> [ 15.454579] [ 15.467390] Allocated by task 282: [ 15.467773] kasan_save_stack+0x45/0x70 [ 15.468067] kasan_save_track+0x18/0x40 [ 15.468204] kasan_save_alloc_info+0x3b/0x50 [ 15.468350] __kasan_kmalloc+0xb7/0xc0 [ 15.468619] __kmalloc_cache_noprof+0x189/0x420 [ 15.469071] kasan_atomics+0x95/0x310 [ 15.469436] kunit_try_run_case+0x1a5/0x480 [ 15.469912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.470404] kthread+0x337/0x6f0 [ 15.470741] ret_from_fork+0x116/0x1d0 [ 15.471102] ret_from_fork_asm+0x1a/0x30 [ 15.471242] [ 15.471315] The buggy address belongs to the object at ffff88810342d080 [ 15.471315] which belongs to the cache kmalloc-64 of size 64 [ 15.471956] The buggy address is located 0 bytes to the right of [ 15.471956] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.472612] [ 15.472721] The buggy address belongs to the physical page: [ 15.473228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.473640] flags: 0x200000000000000(node=0|zone=2) [ 15.473806] page_type: f5(slab) [ 15.473926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.474185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.474552] page dumped because: kasan: bad access detected [ 15.474825] [ 15.474895] Memory state around the buggy address: [ 15.475343] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.475769] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.476080] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.476369] ^ [ 15.477210] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.477685] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.478186] ================================================================== [ 14.969804] ================================================================== [ 14.970373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.970731] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 14.971121] [ 14.971249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.971309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.971322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.971345] Call Trace: [ 14.971359] <TASK> [ 14.971377] dump_stack_lvl+0x73/0xb0 [ 14.971409] print_report+0xd1/0x610 [ 14.971432] ? __virt_addr_valid+0x1db/0x2d0 [ 14.971466] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.971489] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.971512] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.971544] kasan_report+0x141/0x180 [ 14.971566] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.971601] __asan_report_load4_noabort+0x18/0x20 [ 14.971625] kasan_atomics_helper+0x4b88/0x5450 [ 14.971647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.971679] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.971705] ? kasan_atomics+0x152/0x310 [ 14.971731] kasan_atomics+0x1dc/0x310 [ 14.971762] ? __pfx_kasan_atomics+0x10/0x10 [ 14.971787] ? __pfx_read_tsc+0x10/0x10 [ 14.971810] ? ktime_get_ts64+0x86/0x230 [ 14.971844] kunit_try_run_case+0x1a5/0x480 [ 14.971869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.971891] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.971916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.971939] ? __kthread_parkme+0x82/0x180 [ 14.971966] ? preempt_count_sub+0x50/0x80 [ 14.971990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.972030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.972053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.972077] kthread+0x337/0x6f0 [ 14.972095] ? trace_preempt_on+0x20/0xc0 [ 14.972118] ? __pfx_kthread+0x10/0x10 [ 14.972137] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.972159] ? calculate_sigpending+0x7b/0xa0 [ 14.972265] ? __pfx_kthread+0x10/0x10 [ 14.972286] ret_from_fork+0x116/0x1d0 [ 14.972305] ? __pfx_kthread+0x10/0x10 [ 14.972325] ret_from_fork_asm+0x1a/0x30 [ 14.972365] </TASK> [ 14.972374] [ 14.983033] Allocated by task 282: [ 14.983277] kasan_save_stack+0x45/0x70 [ 14.983500] kasan_save_track+0x18/0x40 [ 14.983744] kasan_save_alloc_info+0x3b/0x50 [ 14.983944] __kasan_kmalloc+0xb7/0xc0 [ 14.984196] __kmalloc_cache_noprof+0x189/0x420 [ 14.984354] kasan_atomics+0x95/0x310 [ 14.984486] kunit_try_run_case+0x1a5/0x480 [ 14.984633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.984940] kthread+0x337/0x6f0 [ 14.985580] ret_from_fork+0x116/0x1d0 [ 14.985792] ret_from_fork_asm+0x1a/0x30 [ 14.986091] [ 14.986183] The buggy address belongs to the object at ffff88810342d080 [ 14.986183] which belongs to the cache kmalloc-64 of size 64 [ 14.986860] The buggy address is located 0 bytes to the right of [ 14.986860] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 14.987511] [ 14.987585] The buggy address belongs to the physical page: [ 14.987758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 14.988416] flags: 0x200000000000000(node=0|zone=2) [ 14.988813] page_type: f5(slab) [ 14.988953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.989491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.989796] page dumped because: kasan: bad access detected [ 14.989987] [ 14.990089] Memory state around the buggy address: [ 14.990339] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990767] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.990987] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.991321] ^ [ 14.991706] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.992141] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.992373] ================================================================== [ 16.254379] ================================================================== [ 16.255148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.255539] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.255764] [ 16.255857] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.255908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.255921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.255944] Call Trace: [ 16.255964] <TASK> [ 16.255987] dump_stack_lvl+0x73/0xb0 [ 16.256030] print_report+0xd1/0x610 [ 16.256055] ? __virt_addr_valid+0x1db/0x2d0 [ 16.256079] ? kasan_atomics_helper+0x218a/0x5450 [ 16.256101] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.256125] ? kasan_atomics_helper+0x218a/0x5450 [ 16.256171] kasan_report+0x141/0x180 [ 16.256193] ? kasan_atomics_helper+0x218a/0x5450 [ 16.256221] kasan_check_range+0x10c/0x1c0 [ 16.256263] __kasan_check_write+0x18/0x20 [ 16.256298] kasan_atomics_helper+0x218a/0x5450 [ 16.256322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.256345] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.256371] ? kasan_atomics+0x152/0x310 [ 16.256398] kasan_atomics+0x1dc/0x310 [ 16.256421] ? __pfx_kasan_atomics+0x10/0x10 [ 16.256446] ? __pfx_read_tsc+0x10/0x10 [ 16.256469] ? ktime_get_ts64+0x86/0x230 [ 16.256494] kunit_try_run_case+0x1a5/0x480 [ 16.256533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.256556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.256582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.256607] ? __kthread_parkme+0x82/0x180 [ 16.256645] ? preempt_count_sub+0x50/0x80 [ 16.256671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.256696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.256721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.256762] kthread+0x337/0x6f0 [ 16.256782] ? trace_preempt_on+0x20/0xc0 [ 16.256806] ? __pfx_kthread+0x10/0x10 [ 16.256827] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.256857] ? calculate_sigpending+0x7b/0xa0 [ 16.256882] ? __pfx_kthread+0x10/0x10 [ 16.256904] ret_from_fork+0x116/0x1d0 [ 16.256923] ? __pfx_kthread+0x10/0x10 [ 16.256944] ret_from_fork_asm+0x1a/0x30 [ 16.256976] </TASK> [ 16.256988] [ 16.264685] Allocated by task 282: [ 16.264887] kasan_save_stack+0x45/0x70 [ 16.265130] kasan_save_track+0x18/0x40 [ 16.265266] kasan_save_alloc_info+0x3b/0x50 [ 16.265519] __kasan_kmalloc+0xb7/0xc0 [ 16.265726] __kmalloc_cache_noprof+0x189/0x420 [ 16.265958] kasan_atomics+0x95/0x310 [ 16.266107] kunit_try_run_case+0x1a5/0x480 [ 16.266295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.266691] kthread+0x337/0x6f0 [ 16.266837] ret_from_fork+0x116/0x1d0 [ 16.267055] ret_from_fork_asm+0x1a/0x30 [ 16.267202] [ 16.267274] The buggy address belongs to the object at ffff88810342d080 [ 16.267274] which belongs to the cache kmalloc-64 of size 64 [ 16.267620] The buggy address is located 0 bytes to the right of [ 16.267620] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.268453] [ 16.268553] The buggy address belongs to the physical page: [ 16.268779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.269033] flags: 0x200000000000000(node=0|zone=2) [ 16.269198] page_type: f5(slab) [ 16.269366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.270081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.270432] page dumped because: kasan: bad access detected [ 16.270690] [ 16.270837] Memory state around the buggy address: [ 16.271064] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.271390] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.271661] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.271885] ^ [ 16.272213] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.272609] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.273096] ================================================================== [ 15.363858] ================================================================== [ 15.364579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.365058] Write of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.365692] [ 15.365808] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.365969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.365985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.366017] Call Trace: [ 15.366039] <TASK> [ 15.366059] dump_stack_lvl+0x73/0xb0 [ 15.366093] print_report+0xd1/0x610 [ 15.366117] ? __virt_addr_valid+0x1db/0x2d0 [ 15.366141] ? kasan_atomics_helper+0xc70/0x5450 [ 15.366163] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.366187] ? kasan_atomics_helper+0xc70/0x5450 [ 15.366210] kasan_report+0x141/0x180 [ 15.366232] ? kasan_atomics_helper+0xc70/0x5450 [ 15.366259] kasan_check_range+0x10c/0x1c0 [ 15.366284] __kasan_check_write+0x18/0x20 [ 15.366304] kasan_atomics_helper+0xc70/0x5450 [ 15.366327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.366351] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.366377] ? kasan_atomics+0x152/0x310 [ 15.366404] kasan_atomics+0x1dc/0x310 [ 15.366437] ? __pfx_kasan_atomics+0x10/0x10 [ 15.366461] ? __pfx_read_tsc+0x10/0x10 [ 15.366484] ? ktime_get_ts64+0x86/0x230 [ 15.366510] kunit_try_run_case+0x1a5/0x480 [ 15.366537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.366561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.366586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.366611] ? __kthread_parkme+0x82/0x180 [ 15.366633] ? preempt_count_sub+0x50/0x80 [ 15.366658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.366683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.366708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.366733] kthread+0x337/0x6f0 [ 15.366753] ? trace_preempt_on+0x20/0xc0 [ 15.366777] ? __pfx_kthread+0x10/0x10 [ 15.366798] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.366821] ? calculate_sigpending+0x7b/0xa0 [ 15.366846] ? __pfx_kthread+0x10/0x10 [ 15.366868] ret_from_fork+0x116/0x1d0 [ 15.366888] ? __pfx_kthread+0x10/0x10 [ 15.366909] ret_from_fork_asm+0x1a/0x30 [ 15.366941] </TASK> [ 15.366952] [ 15.378352] Allocated by task 282: [ 15.378770] kasan_save_stack+0x45/0x70 [ 15.379068] kasan_save_track+0x18/0x40 [ 15.379232] kasan_save_alloc_info+0x3b/0x50 [ 15.379790] __kasan_kmalloc+0xb7/0xc0 [ 15.380109] __kmalloc_cache_noprof+0x189/0x420 [ 15.380415] kasan_atomics+0x95/0x310 [ 15.380751] kunit_try_run_case+0x1a5/0x480 [ 15.381058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.381425] kthread+0x337/0x6f0 [ 15.381678] ret_from_fork+0x116/0x1d0 [ 15.381877] ret_from_fork_asm+0x1a/0x30 [ 15.382239] [ 15.382337] The buggy address belongs to the object at ffff88810342d080 [ 15.382337] which belongs to the cache kmalloc-64 of size 64 [ 15.383088] The buggy address is located 0 bytes to the right of [ 15.383088] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.383847] [ 15.383959] The buggy address belongs to the physical page: [ 15.384321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.384810] flags: 0x200000000000000(node=0|zone=2) [ 15.385194] page_type: f5(slab) [ 15.385343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.385589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.385821] page dumped because: kasan: bad access detected [ 15.385994] [ 15.386100] Memory state around the buggy address: [ 15.386405] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.386848] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.387346] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.387991] ^ [ 15.388297] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.388759] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389382] ================================================================== [ 15.390120] ================================================================== [ 15.390798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.391509] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.392170] [ 15.392317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.392394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.392407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.392450] Call Trace: [ 15.392473] <TASK> [ 15.392495] dump_stack_lvl+0x73/0xb0 [ 15.392528] print_report+0xd1/0x610 [ 15.392552] ? __virt_addr_valid+0x1db/0x2d0 [ 15.392594] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.392616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.392640] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.392663] kasan_report+0x141/0x180 [ 15.392685] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.392712] __asan_report_load4_noabort+0x18/0x20 [ 15.392738] kasan_atomics_helper+0x4a84/0x5450 [ 15.392761] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.392784] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.392811] ? kasan_atomics+0x152/0x310 [ 15.392837] kasan_atomics+0x1dc/0x310 [ 15.392866] ? __pfx_kasan_atomics+0x10/0x10 [ 15.392893] ? __pfx_read_tsc+0x10/0x10 [ 15.392915] ? ktime_get_ts64+0x86/0x230 [ 15.392941] kunit_try_run_case+0x1a5/0x480 [ 15.392967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.392991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.393025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.393049] ? __kthread_parkme+0x82/0x180 [ 15.393071] ? preempt_count_sub+0x50/0x80 [ 15.393096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.393120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.393145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.393171] kthread+0x337/0x6f0 [ 15.393191] ? trace_preempt_on+0x20/0xc0 [ 15.393215] ? __pfx_kthread+0x10/0x10 [ 15.393236] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.393258] ? calculate_sigpending+0x7b/0xa0 [ 15.393284] ? __pfx_kthread+0x10/0x10 [ 15.393306] ret_from_fork+0x116/0x1d0 [ 15.393325] ? __pfx_kthread+0x10/0x10 [ 15.393346] ret_from_fork_asm+0x1a/0x30 [ 15.393379] </TASK> [ 15.393389] [ 15.405649] Allocated by task 282: [ 15.406003] kasan_save_stack+0x45/0x70 [ 15.406173] kasan_save_track+0x18/0x40 [ 15.406310] kasan_save_alloc_info+0x3b/0x50 [ 15.406585] __kasan_kmalloc+0xb7/0xc0 [ 15.406975] __kmalloc_cache_noprof+0x189/0x420 [ 15.407430] kasan_atomics+0x95/0x310 [ 15.407790] kunit_try_run_case+0x1a5/0x480 [ 15.408188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.408685] kthread+0x337/0x6f0 [ 15.409002] ret_from_fork+0x116/0x1d0 [ 15.409147] ret_from_fork_asm+0x1a/0x30 [ 15.409289] [ 15.409363] The buggy address belongs to the object at ffff88810342d080 [ 15.409363] which belongs to the cache kmalloc-64 of size 64 [ 15.410465] The buggy address is located 0 bytes to the right of [ 15.410465] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.411585] [ 15.411686] The buggy address belongs to the physical page: [ 15.411971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.412704] flags: 0x200000000000000(node=0|zone=2) [ 15.412908] page_type: f5(slab) [ 15.413044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.413280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.413714] page dumped because: kasan: bad access detected [ 15.414195] [ 15.414350] Memory state around the buggy address: [ 15.414802] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.415429] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.416044] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.416674] ^ [ 15.416833] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.417067] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.417281] ================================================================== [ 15.914887] ================================================================== [ 15.915668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.916628] Write of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.917287] [ 15.917468] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.917516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.917548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.917572] Call Trace: [ 15.917606] <TASK> [ 15.917627] dump_stack_lvl+0x73/0xb0 [ 15.917660] print_report+0xd1/0x610 [ 15.917684] ? __virt_addr_valid+0x1db/0x2d0 [ 15.917708] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.917731] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.917754] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.917777] kasan_report+0x141/0x180 [ 15.917799] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.917826] kasan_check_range+0x10c/0x1c0 [ 15.917850] __kasan_check_write+0x18/0x20 [ 15.917870] kasan_atomics_helper+0x18b1/0x5450 [ 15.917894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.917917] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.917943] ? kasan_atomics+0x152/0x310 [ 15.917970] kasan_atomics+0x1dc/0x310 [ 15.917993] ? __pfx_kasan_atomics+0x10/0x10 [ 15.918028] ? __pfx_read_tsc+0x10/0x10 [ 15.918051] ? ktime_get_ts64+0x86/0x230 [ 15.918076] kunit_try_run_case+0x1a5/0x480 [ 15.918102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.918152] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.918176] ? __kthread_parkme+0x82/0x180 [ 15.918198] ? preempt_count_sub+0x50/0x80 [ 15.918223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.918273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.918298] kthread+0x337/0x6f0 [ 15.918318] ? trace_preempt_on+0x20/0xc0 [ 15.918345] ? __pfx_kthread+0x10/0x10 [ 15.918366] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.918387] ? calculate_sigpending+0x7b/0xa0 [ 15.918413] ? __pfx_kthread+0x10/0x10 [ 15.918446] ret_from_fork+0x116/0x1d0 [ 15.918465] ? __pfx_kthread+0x10/0x10 [ 15.918486] ret_from_fork_asm+0x1a/0x30 [ 15.918517] </TASK> [ 15.918529] [ 15.928832] Allocated by task 282: [ 15.929028] kasan_save_stack+0x45/0x70 [ 15.929182] kasan_save_track+0x18/0x40 [ 15.929313] kasan_save_alloc_info+0x3b/0x50 [ 15.929607] __kasan_kmalloc+0xb7/0xc0 [ 15.929797] __kmalloc_cache_noprof+0x189/0x420 [ 15.930034] kasan_atomics+0x95/0x310 [ 15.930204] kunit_try_run_case+0x1a5/0x480 [ 15.930392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.930620] kthread+0x337/0x6f0 [ 15.930777] ret_from_fork+0x116/0x1d0 [ 15.930924] ret_from_fork_asm+0x1a/0x30 [ 15.931107] [ 15.931199] The buggy address belongs to the object at ffff88810342d080 [ 15.931199] which belongs to the cache kmalloc-64 of size 64 [ 15.931692] The buggy address is located 0 bytes to the right of [ 15.931692] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.932067] [ 15.932139] The buggy address belongs to the physical page: [ 15.932307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.932598] flags: 0x200000000000000(node=0|zone=2) [ 15.933053] page_type: f5(slab) [ 15.933220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.933547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.933834] page dumped because: kasan: bad access detected [ 15.933998] [ 15.934201] Memory state around the buggy address: [ 15.934419] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.934732] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.935003] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.935284] ^ [ 15.935506] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.935780] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936061] ================================================================== [ 16.030133] ================================================================== [ 16.030517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.030809] Read of size 8 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 16.031059] [ 16.031174] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.031221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.031233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.031256] Call Trace: [ 16.031277] <TASK> [ 16.031321] dump_stack_lvl+0x73/0xb0 [ 16.031352] print_report+0xd1/0x610 [ 16.031375] ? __virt_addr_valid+0x1db/0x2d0 [ 16.031399] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.031421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.031453] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.031476] kasan_report+0x141/0x180 [ 16.031498] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.031525] __asan_report_load8_noabort+0x18/0x20 [ 16.031551] kasan_atomics_helper+0x4f30/0x5450 [ 16.031574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.031618] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.031645] ? kasan_atomics+0x152/0x310 [ 16.031673] kasan_atomics+0x1dc/0x310 [ 16.031696] ? __pfx_kasan_atomics+0x10/0x10 [ 16.031721] ? __pfx_read_tsc+0x10/0x10 [ 16.031743] ? ktime_get_ts64+0x86/0x230 [ 16.031768] kunit_try_run_case+0x1a5/0x480 [ 16.031810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.031833] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.031861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.031886] ? __kthread_parkme+0x82/0x180 [ 16.031908] ? preempt_count_sub+0x50/0x80 [ 16.031933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.031977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.032002] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.032039] kthread+0x337/0x6f0 [ 16.032059] ? trace_preempt_on+0x20/0xc0 [ 16.032083] ? __pfx_kthread+0x10/0x10 [ 16.032104] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.032126] ? calculate_sigpending+0x7b/0xa0 [ 16.032172] ? __pfx_kthread+0x10/0x10 [ 16.032194] ret_from_fork+0x116/0x1d0 [ 16.032213] ? __pfx_kthread+0x10/0x10 [ 16.032235] ret_from_fork_asm+0x1a/0x30 [ 16.032268] </TASK> [ 16.032278] [ 16.039652] Allocated by task 282: [ 16.039795] kasan_save_stack+0x45/0x70 [ 16.039945] kasan_save_track+0x18/0x40 [ 16.040121] kasan_save_alloc_info+0x3b/0x50 [ 16.040342] __kasan_kmalloc+0xb7/0xc0 [ 16.040709] __kmalloc_cache_noprof+0x189/0x420 [ 16.040935] kasan_atomics+0x95/0x310 [ 16.041127] kunit_try_run_case+0x1a5/0x480 [ 16.041331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.041626] kthread+0x337/0x6f0 [ 16.041791] ret_from_fork+0x116/0x1d0 [ 16.041972] ret_from_fork_asm+0x1a/0x30 [ 16.042173] [ 16.042268] The buggy address belongs to the object at ffff88810342d080 [ 16.042268] which belongs to the cache kmalloc-64 of size 64 [ 16.042822] The buggy address is located 0 bytes to the right of [ 16.042822] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 16.043268] [ 16.043342] The buggy address belongs to the physical page: [ 16.043562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 16.044119] flags: 0x200000000000000(node=0|zone=2) [ 16.044365] page_type: f5(slab) [ 16.044595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.044929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.045163] page dumped because: kasan: bad access detected [ 16.045374] [ 16.045505] Memory state around the buggy address: [ 16.045750] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.046077] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.046361] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.046759] ^ [ 16.046949] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.047244] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.047577] ================================================================== [ 15.035234] ================================================================== [ 15.035646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.035908] Read of size 4 at addr ffff88810342d0b0 by task kunit_try_catch/282 [ 15.036481] [ 15.036599] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.036648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.036661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.036684] Call Trace: [ 15.036706] <TASK> [ 15.036726] dump_stack_lvl+0x73/0xb0 [ 15.036756] print_report+0xd1/0x610 [ 15.036781] ? __virt_addr_valid+0x1db/0x2d0 [ 15.036805] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.036828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.036859] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.036882] kasan_report+0x141/0x180 [ 15.036906] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.036933] __asan_report_load4_noabort+0x18/0x20 [ 15.036959] kasan_atomics_helper+0x4b54/0x5450 [ 15.036983] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.037006] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.037043] ? kasan_atomics+0x152/0x310 [ 15.037070] kasan_atomics+0x1dc/0x310 [ 15.037094] ? __pfx_kasan_atomics+0x10/0x10 [ 15.037120] ? __pfx_read_tsc+0x10/0x10 [ 15.037142] ? ktime_get_ts64+0x86/0x230 [ 15.037168] kunit_try_run_case+0x1a5/0x480 [ 15.037194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.037243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.037268] ? __kthread_parkme+0x82/0x180 [ 15.037290] ? preempt_count_sub+0x50/0x80 [ 15.037315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.037365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.037390] kthread+0x337/0x6f0 [ 15.037410] ? trace_preempt_on+0x20/0xc0 [ 15.037445] ? __pfx_kthread+0x10/0x10 [ 15.037475] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.037498] ? calculate_sigpending+0x7b/0xa0 [ 15.037523] ? __pfx_kthread+0x10/0x10 [ 15.037555] ret_from_fork+0x116/0x1d0 [ 15.037576] ? __pfx_kthread+0x10/0x10 [ 15.037596] ret_from_fork_asm+0x1a/0x30 [ 15.037629] </TASK> [ 15.037639] [ 15.045429] Allocated by task 282: [ 15.045655] kasan_save_stack+0x45/0x70 [ 15.045866] kasan_save_track+0x18/0x40 [ 15.046072] kasan_save_alloc_info+0x3b/0x50 [ 15.046268] __kasan_kmalloc+0xb7/0xc0 [ 15.047056] __kmalloc_cache_noprof+0x189/0x420 [ 15.047868] kasan_atomics+0x95/0x310 [ 15.048214] kunit_try_run_case+0x1a5/0x480 [ 15.048842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049388] kthread+0x337/0x6f0 [ 15.049605] ret_from_fork+0x116/0x1d0 [ 15.049740] ret_from_fork_asm+0x1a/0x30 [ 15.049878] [ 15.049954] The buggy address belongs to the object at ffff88810342d080 [ 15.049954] which belongs to the cache kmalloc-64 of size 64 [ 15.051248] The buggy address is located 0 bytes to the right of [ 15.051248] allocated 48-byte region [ffff88810342d080, ffff88810342d0b0) [ 15.052469] [ 15.052653] The buggy address belongs to the physical page: [ 15.052826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10342d [ 15.053259] flags: 0x200000000000000(node=0|zone=2) [ 15.053760] page_type: f5(slab) [ 15.054114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.054830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.055330] page dumped because: kasan: bad access detected [ 15.055738] [ 15.055939] Memory state around the buggy address: [ 15.056279] ffff88810342cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.056698] ffff88810342d000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.056918] >ffff88810342d080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.057138] ^ [ 15.057292] ffff88810342d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.057853] ffff88810342d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.058528] ==================================================================
[ 15.362391] ================================================================== [ 15.362626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.362864] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.363100] [ 15.363181] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.363221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.363232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.363253] Call Trace: [ 15.363269] <TASK> [ 15.363284] dump_stack_lvl+0x73/0xb0 [ 15.363311] print_report+0xd1/0x610 [ 15.363333] ? __virt_addr_valid+0x1db/0x2d0 [ 15.363356] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.363377] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.363400] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.363423] kasan_report+0x141/0x180 [ 15.363445] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.363473] __asan_report_load4_noabort+0x18/0x20 [ 15.363497] kasan_atomics_helper+0x49e8/0x5450 [ 15.363520] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.363543] ? kasan_save_alloc_info+0x3b/0x50 [ 15.363573] kasan_atomics+0x1dc/0x310 [ 15.363597] ? __pfx_kasan_atomics+0x10/0x10 [ 15.363622] ? __pfx_read_tsc+0x10/0x10 [ 15.363642] ? ktime_get_ts64+0x86/0x230 [ 15.363667] kunit_try_run_case+0x1a5/0x480 [ 15.363691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363713] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.363738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.363761] ? __kthread_parkme+0x82/0x180 [ 15.363782] ? preempt_count_sub+0x50/0x80 [ 15.363805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.363853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.363878] kthread+0x337/0x6f0 [ 15.363909] ? trace_preempt_on+0x20/0xc0 [ 15.363933] ? __pfx_kthread+0x10/0x10 [ 15.363954] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.363976] ? calculate_sigpending+0x7b/0xa0 [ 15.363999] ? __pfx_kthread+0x10/0x10 [ 15.364022] ret_from_fork+0x116/0x1d0 [ 15.364040] ? __pfx_kthread+0x10/0x10 [ 15.364061] ret_from_fork_asm+0x1a/0x30 [ 15.364093] </TASK> [ 15.364104] [ 15.373091] Allocated by task 282: [ 15.373248] kasan_save_stack+0x45/0x70 [ 15.373443] kasan_save_track+0x18/0x40 [ 15.373625] kasan_save_alloc_info+0x3b/0x50 [ 15.373867] __kasan_kmalloc+0xb7/0xc0 [ 15.374108] __kmalloc_cache_noprof+0x189/0x420 [ 15.374386] kasan_atomics+0x95/0x310 [ 15.374548] kunit_try_run_case+0x1a5/0x480 [ 15.374858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.375117] kthread+0x337/0x6f0 [ 15.375278] ret_from_fork+0x116/0x1d0 [ 15.375414] ret_from_fork_asm+0x1a/0x30 [ 15.375556] [ 15.375629] The buggy address belongs to the object at ffff8881029b7000 [ 15.375629] which belongs to the cache kmalloc-64 of size 64 [ 15.375997] The buggy address is located 0 bytes to the right of [ 15.375997] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.376448] [ 15.376543] The buggy address belongs to the physical page: [ 15.376797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.377157] flags: 0x200000000000000(node=0|zone=2) [ 15.377388] page_type: f5(slab) [ 15.377554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.377901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.378138] page dumped because: kasan: bad access detected [ 15.378311] [ 15.378381] Memory state around the buggy address: [ 15.378775] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.379398] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.379840] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.380259] ^ [ 15.380642] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.380946] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381162] ================================================================== [ 16.019710] ================================================================== [ 16.020122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.020474] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 16.020854] [ 16.021018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.021066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.021079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.021102] Call Trace: [ 16.021119] <TASK> [ 16.021136] dump_stack_lvl+0x73/0xb0 [ 16.021166] print_report+0xd1/0x610 [ 16.021189] ? __virt_addr_valid+0x1db/0x2d0 [ 16.021213] ? kasan_atomics_helper+0x224c/0x5450 [ 16.021262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.021288] ? kasan_atomics_helper+0x224c/0x5450 [ 16.021312] kasan_report+0x141/0x180 [ 16.021335] ? kasan_atomics_helper+0x224c/0x5450 [ 16.021363] kasan_check_range+0x10c/0x1c0 [ 16.021388] __kasan_check_write+0x18/0x20 [ 16.021409] kasan_atomics_helper+0x224c/0x5450 [ 16.021433] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.021458] ? kasan_save_alloc_info+0x3b/0x50 [ 16.021489] kasan_atomics+0x1dc/0x310 [ 16.021514] ? __pfx_kasan_atomics+0x10/0x10 [ 16.021540] ? __pfx_read_tsc+0x10/0x10 [ 16.021562] ? ktime_get_ts64+0x86/0x230 [ 16.021587] kunit_try_run_case+0x1a5/0x480 [ 16.021613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.021638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.021664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.021688] ? __kthread_parkme+0x82/0x180 [ 16.021710] ? preempt_count_sub+0x50/0x80 [ 16.021736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.021761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.021786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.021812] kthread+0x337/0x6f0 [ 16.021832] ? trace_preempt_on+0x20/0xc0 [ 16.021857] ? __pfx_kthread+0x10/0x10 [ 16.021879] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.021913] ? calculate_sigpending+0x7b/0xa0 [ 16.021938] ? __pfx_kthread+0x10/0x10 [ 16.021961] ret_from_fork+0x116/0x1d0 [ 16.022055] ? __pfx_kthread+0x10/0x10 [ 16.022078] ret_from_fork_asm+0x1a/0x30 [ 16.022110] </TASK> [ 16.022123] [ 16.029772] Allocated by task 282: [ 16.029919] kasan_save_stack+0x45/0x70 [ 16.030193] kasan_save_track+0x18/0x40 [ 16.030390] kasan_save_alloc_info+0x3b/0x50 [ 16.030602] __kasan_kmalloc+0xb7/0xc0 [ 16.030798] __kmalloc_cache_noprof+0x189/0x420 [ 16.031060] kasan_atomics+0x95/0x310 [ 16.031285] kunit_try_run_case+0x1a5/0x480 [ 16.031502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.031764] kthread+0x337/0x6f0 [ 16.031922] ret_from_fork+0x116/0x1d0 [ 16.032130] ret_from_fork_asm+0x1a/0x30 [ 16.032349] [ 16.032447] The buggy address belongs to the object at ffff8881029b7000 [ 16.032447] which belongs to the cache kmalloc-64 of size 64 [ 16.032989] The buggy address is located 0 bytes to the right of [ 16.032989] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 16.033552] [ 16.033682] The buggy address belongs to the physical page: [ 16.033952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 16.034314] flags: 0x200000000000000(node=0|zone=2) [ 16.034481] page_type: f5(slab) [ 16.034602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.034843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.035246] page dumped because: kasan: bad access detected [ 16.035501] [ 16.035594] Memory state around the buggy address: [ 16.035817] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.036171] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.036497] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.036731] ^ [ 16.036914] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.037296] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.037609] ================================================================== [ 15.125359] ================================================================== [ 15.125649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.126002] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.126293] [ 15.126405] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.126465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.126481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.126516] Call Trace: [ 15.126532] <TASK> [ 15.126548] dump_stack_lvl+0x73/0xb0 [ 15.126579] print_report+0xd1/0x610 [ 15.126605] ? __virt_addr_valid+0x1db/0x2d0 [ 15.126631] ? kasan_atomics_helper+0xde0/0x5450 [ 15.126657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.126686] ? kasan_atomics_helper+0xde0/0x5450 [ 15.126712] kasan_report+0x141/0x180 [ 15.126737] ? kasan_atomics_helper+0xde0/0x5450 [ 15.126777] kasan_check_range+0x10c/0x1c0 [ 15.126804] __kasan_check_write+0x18/0x20 [ 15.126827] kasan_atomics_helper+0xde0/0x5450 [ 15.126854] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.126882] ? kasan_save_alloc_info+0x3b/0x50 [ 15.127169] kasan_atomics+0x1dc/0x310 [ 15.127215] ? __pfx_kasan_atomics+0x10/0x10 [ 15.127245] ? __pfx_read_tsc+0x10/0x10 [ 15.127270] ? ktime_get_ts64+0x86/0x230 [ 15.127300] kunit_try_run_case+0x1a5/0x480 [ 15.127329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.127357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.127387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.127427] ? __kthread_parkme+0x82/0x180 [ 15.127452] ? preempt_count_sub+0x50/0x80 [ 15.127481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.127575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.127620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.127653] kthread+0x337/0x6f0 [ 15.127687] ? trace_preempt_on+0x20/0xc0 [ 15.127721] ? __pfx_kthread+0x10/0x10 [ 15.127746] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.127774] ? calculate_sigpending+0x7b/0xa0 [ 15.127804] ? __pfx_kthread+0x10/0x10 [ 15.127829] ret_from_fork+0x116/0x1d0 [ 15.127851] ? __pfx_kthread+0x10/0x10 [ 15.127875] ret_from_fork_asm+0x1a/0x30 [ 15.127924] </TASK> [ 15.127936] [ 15.141693] Allocated by task 282: [ 15.142088] kasan_save_stack+0x45/0x70 [ 15.142474] kasan_save_track+0x18/0x40 [ 15.142923] kasan_save_alloc_info+0x3b/0x50 [ 15.143362] __kasan_kmalloc+0xb7/0xc0 [ 15.143756] __kmalloc_cache_noprof+0x189/0x420 [ 15.143940] kasan_atomics+0x95/0x310 [ 15.144333] kunit_try_run_case+0x1a5/0x480 [ 15.144930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.145460] kthread+0x337/0x6f0 [ 15.145825] ret_from_fork+0x116/0x1d0 [ 15.145986] ret_from_fork_asm+0x1a/0x30 [ 15.146330] [ 15.146500] The buggy address belongs to the object at ffff8881029b7000 [ 15.146500] which belongs to the cache kmalloc-64 of size 64 [ 15.147713] The buggy address is located 0 bytes to the right of [ 15.147713] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.148396] [ 15.148743] The buggy address belongs to the physical page: [ 15.149264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.149990] flags: 0x200000000000000(node=0|zone=2) [ 15.150271] page_type: f5(slab) [ 15.150398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.150643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.151012] page dumped because: kasan: bad access detected [ 15.151606] [ 15.151773] Memory state around the buggy address: [ 15.152256] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.153125] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.153817] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.154466] ^ [ 15.155021] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.155441] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.156087] ================================================================== [ 15.641676] ================================================================== [ 15.642274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.643095] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.643416] [ 15.643509] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.643555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.643568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.643591] Call Trace: [ 15.643608] <TASK> [ 15.643626] dump_stack_lvl+0x73/0xb0 [ 15.643658] print_report+0xd1/0x610 [ 15.643682] ? __virt_addr_valid+0x1db/0x2d0 [ 15.643707] ? kasan_atomics_helper+0x1818/0x5450 [ 15.643730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.643754] ? kasan_atomics_helper+0x1818/0x5450 [ 15.643777] kasan_report+0x141/0x180 [ 15.643812] ? kasan_atomics_helper+0x1818/0x5450 [ 15.643840] kasan_check_range+0x10c/0x1c0 [ 15.643866] __kasan_check_write+0x18/0x20 [ 15.643906] kasan_atomics_helper+0x1818/0x5450 [ 15.643930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.643955] ? kasan_save_alloc_info+0x3b/0x50 [ 15.644005] kasan_atomics+0x1dc/0x310 [ 15.644030] ? __pfx_kasan_atomics+0x10/0x10 [ 15.644056] ? __pfx_read_tsc+0x10/0x10 [ 15.644077] ? ktime_get_ts64+0x86/0x230 [ 15.644104] kunit_try_run_case+0x1a5/0x480 [ 15.644130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.644189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.644215] ? __kthread_parkme+0x82/0x180 [ 15.644236] ? preempt_count_sub+0x50/0x80 [ 15.644273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.644324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.644349] kthread+0x337/0x6f0 [ 15.644380] ? trace_preempt_on+0x20/0xc0 [ 15.644408] ? __pfx_kthread+0x10/0x10 [ 15.644442] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.644466] ? calculate_sigpending+0x7b/0xa0 [ 15.644492] ? __pfx_kthread+0x10/0x10 [ 15.644516] ret_from_fork+0x116/0x1d0 [ 15.644536] ? __pfx_kthread+0x10/0x10 [ 15.644557] ret_from_fork_asm+0x1a/0x30 [ 15.644592] </TASK> [ 15.644604] [ 15.652009] Allocated by task 282: [ 15.652142] kasan_save_stack+0x45/0x70 [ 15.652344] kasan_save_track+0x18/0x40 [ 15.652555] kasan_save_alloc_info+0x3b/0x50 [ 15.652803] __kasan_kmalloc+0xb7/0xc0 [ 15.653029] __kmalloc_cache_noprof+0x189/0x420 [ 15.653259] kasan_atomics+0x95/0x310 [ 15.653469] kunit_try_run_case+0x1a5/0x480 [ 15.653679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.653983] kthread+0x337/0x6f0 [ 15.654126] ret_from_fork+0x116/0x1d0 [ 15.654326] ret_from_fork_asm+0x1a/0x30 [ 15.654520] [ 15.654612] The buggy address belongs to the object at ffff8881029b7000 [ 15.654612] which belongs to the cache kmalloc-64 of size 64 [ 15.655160] The buggy address is located 0 bytes to the right of [ 15.655160] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.655617] [ 15.655691] The buggy address belongs to the physical page: [ 15.655866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.656141] flags: 0x200000000000000(node=0|zone=2) [ 15.656306] page_type: f5(slab) [ 15.656505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.656844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.657212] page dumped because: kasan: bad access detected [ 15.657464] [ 15.657555] Memory state around the buggy address: [ 15.657779] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.658120] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.658429] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.658731] ^ [ 15.658898] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659123] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659360] ================================================================== [ 15.678023] ================================================================== [ 15.678376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.678847] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.679126] [ 15.679264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.679306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.679319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.679340] Call Trace: [ 15.679355] <TASK> [ 15.679372] dump_stack_lvl+0x73/0xb0 [ 15.679400] print_report+0xd1/0x610 [ 15.679423] ? __virt_addr_valid+0x1db/0x2d0 [ 15.679447] ? kasan_atomics_helper+0x194a/0x5450 [ 15.679470] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.679495] ? kasan_atomics_helper+0x194a/0x5450 [ 15.679519] kasan_report+0x141/0x180 [ 15.679542] ? kasan_atomics_helper+0x194a/0x5450 [ 15.679570] kasan_check_range+0x10c/0x1c0 [ 15.679594] __kasan_check_write+0x18/0x20 [ 15.679615] kasan_atomics_helper+0x194a/0x5450 [ 15.679639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.679664] ? kasan_save_alloc_info+0x3b/0x50 [ 15.679694] kasan_atomics+0x1dc/0x310 [ 15.679718] ? __pfx_kasan_atomics+0x10/0x10 [ 15.679744] ? __pfx_read_tsc+0x10/0x10 [ 15.679765] ? ktime_get_ts64+0x86/0x230 [ 15.679790] kunit_try_run_case+0x1a5/0x480 [ 15.679815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.679839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.679865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.679890] ? __kthread_parkme+0x82/0x180 [ 15.679922] ? preempt_count_sub+0x50/0x80 [ 15.679948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.680003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.680028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.680054] kthread+0x337/0x6f0 [ 15.680085] ? trace_preempt_on+0x20/0xc0 [ 15.680110] ? __pfx_kthread+0x10/0x10 [ 15.680131] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.680153] ? calculate_sigpending+0x7b/0xa0 [ 15.680178] ? __pfx_kthread+0x10/0x10 [ 15.680201] ret_from_fork+0x116/0x1d0 [ 15.680220] ? __pfx_kthread+0x10/0x10 [ 15.680243] ret_from_fork_asm+0x1a/0x30 [ 15.680276] </TASK> [ 15.680287] [ 15.687781] Allocated by task 282: [ 15.687996] kasan_save_stack+0x45/0x70 [ 15.688168] kasan_save_track+0x18/0x40 [ 15.688380] kasan_save_alloc_info+0x3b/0x50 [ 15.688588] __kasan_kmalloc+0xb7/0xc0 [ 15.688787] __kmalloc_cache_noprof+0x189/0x420 [ 15.689045] kasan_atomics+0x95/0x310 [ 15.689234] kunit_try_run_case+0x1a5/0x480 [ 15.689444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.689674] kthread+0x337/0x6f0 [ 15.689849] ret_from_fork+0x116/0x1d0 [ 15.690066] ret_from_fork_asm+0x1a/0x30 [ 15.690275] [ 15.690365] The buggy address belongs to the object at ffff8881029b7000 [ 15.690365] which belongs to the cache kmalloc-64 of size 64 [ 15.690878] The buggy address is located 0 bytes to the right of [ 15.690878] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.691283] [ 15.691356] The buggy address belongs to the physical page: [ 15.691530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.691771] flags: 0x200000000000000(node=0|zone=2) [ 15.691982] page_type: f5(slab) [ 15.692171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.692538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.692878] page dumped because: kasan: bad access detected [ 15.693164] [ 15.693257] Memory state around the buggy address: [ 15.693478] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.693780] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694031] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.694246] ^ [ 15.694401] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694752] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.695125] ================================================================== [ 15.288129] ================================================================== [ 15.288467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.288711] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.289355] [ 15.289592] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.289636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.289649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.289671] Call Trace: [ 15.289688] <TASK> [ 15.289705] dump_stack_lvl+0x73/0xb0 [ 15.289735] print_report+0xd1/0x610 [ 15.289758] ? __virt_addr_valid+0x1db/0x2d0 [ 15.289782] ? kasan_atomics_helper+0x1148/0x5450 [ 15.289805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.289830] ? kasan_atomics_helper+0x1148/0x5450 [ 15.289853] kasan_report+0x141/0x180 [ 15.289877] ? kasan_atomics_helper+0x1148/0x5450 [ 15.289916] kasan_check_range+0x10c/0x1c0 [ 15.289942] __kasan_check_write+0x18/0x20 [ 15.289962] kasan_atomics_helper+0x1148/0x5450 [ 15.290013] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.290038] ? kasan_save_alloc_info+0x3b/0x50 [ 15.290068] kasan_atomics+0x1dc/0x310 [ 15.290093] ? __pfx_kasan_atomics+0x10/0x10 [ 15.290119] ? __pfx_read_tsc+0x10/0x10 [ 15.290140] ? ktime_get_ts64+0x86/0x230 [ 15.290185] kunit_try_run_case+0x1a5/0x480 [ 15.290211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.290235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.290260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.290285] ? __kthread_parkme+0x82/0x180 [ 15.290306] ? preempt_count_sub+0x50/0x80 [ 15.290332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.290357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.290383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.290408] kthread+0x337/0x6f0 [ 15.290428] ? trace_preempt_on+0x20/0xc0 [ 15.290452] ? __pfx_kthread+0x10/0x10 [ 15.290474] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.290496] ? calculate_sigpending+0x7b/0xa0 [ 15.290521] ? __pfx_kthread+0x10/0x10 [ 15.290544] ret_from_fork+0x116/0x1d0 [ 15.290563] ? __pfx_kthread+0x10/0x10 [ 15.290585] ret_from_fork_asm+0x1a/0x30 [ 15.290619] </TASK> [ 15.290630] [ 15.303938] Allocated by task 282: [ 15.304146] kasan_save_stack+0x45/0x70 [ 15.304503] kasan_save_track+0x18/0x40 [ 15.304643] kasan_save_alloc_info+0x3b/0x50 [ 15.304794] __kasan_kmalloc+0xb7/0xc0 [ 15.305201] __kmalloc_cache_noprof+0x189/0x420 [ 15.305379] kasan_atomics+0x95/0x310 [ 15.305518] kunit_try_run_case+0x1a5/0x480 [ 15.305986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.306574] kthread+0x337/0x6f0 [ 15.306877] ret_from_fork+0x116/0x1d0 [ 15.307261] ret_from_fork_asm+0x1a/0x30 [ 15.307667] [ 15.307832] The buggy address belongs to the object at ffff8881029b7000 [ 15.307832] which belongs to the cache kmalloc-64 of size 64 [ 15.308831] The buggy address is located 0 bytes to the right of [ 15.308831] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.309487] [ 15.309569] The buggy address belongs to the physical page: [ 15.309748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.310332] flags: 0x200000000000000(node=0|zone=2) [ 15.310601] page_type: f5(slab) [ 15.310984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.311659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.312427] page dumped because: kasan: bad access detected [ 15.313006] [ 15.313105] Memory state around the buggy address: [ 15.313624] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.314016] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.314739] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.315277] ^ [ 15.315714] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316138] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316761] ================================================================== [ 14.851487] ================================================================== [ 14.852034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.852349] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.852738] [ 14.852848] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.852903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.852917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.852940] Call Trace: [ 14.852955] <TASK> [ 14.852972] dump_stack_lvl+0x73/0xb0 [ 14.853001] print_report+0xd1/0x610 [ 14.853044] ? __virt_addr_valid+0x1db/0x2d0 [ 14.853069] ? kasan_atomics_helper+0x697/0x5450 [ 14.853093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.853118] ? kasan_atomics_helper+0x697/0x5450 [ 14.853142] kasan_report+0x141/0x180 [ 14.853165] ? kasan_atomics_helper+0x697/0x5450 [ 14.853192] kasan_check_range+0x10c/0x1c0 [ 14.853218] __kasan_check_write+0x18/0x20 [ 14.853239] kasan_atomics_helper+0x697/0x5450 [ 14.853267] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.853294] ? kasan_save_alloc_info+0x3b/0x50 [ 14.853325] kasan_atomics+0x1dc/0x310 [ 14.853350] ? __pfx_kasan_atomics+0x10/0x10 [ 14.853376] ? __pfx_read_tsc+0x10/0x10 [ 14.853398] ? ktime_get_ts64+0x86/0x230 [ 14.853425] kunit_try_run_case+0x1a5/0x480 [ 14.853451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.853474] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.853501] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.853603] ? __kthread_parkme+0x82/0x180 [ 14.853626] ? preempt_count_sub+0x50/0x80 [ 14.853652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.853677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.853703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.853728] kthread+0x337/0x6f0 [ 14.853749] ? trace_preempt_on+0x20/0xc0 [ 14.853774] ? __pfx_kthread+0x10/0x10 [ 14.853795] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.853817] ? calculate_sigpending+0x7b/0xa0 [ 14.853843] ? __pfx_kthread+0x10/0x10 [ 14.853864] ret_from_fork+0x116/0x1d0 [ 14.853883] ? __pfx_kthread+0x10/0x10 [ 14.853918] ret_from_fork_asm+0x1a/0x30 [ 14.853952] </TASK> [ 14.853965] [ 14.861966] Allocated by task 282: [ 14.862173] kasan_save_stack+0x45/0x70 [ 14.862381] kasan_save_track+0x18/0x40 [ 14.862652] kasan_save_alloc_info+0x3b/0x50 [ 14.862851] __kasan_kmalloc+0xb7/0xc0 [ 14.863069] __kmalloc_cache_noprof+0x189/0x420 [ 14.863270] kasan_atomics+0x95/0x310 [ 14.863435] kunit_try_run_case+0x1a5/0x480 [ 14.863806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.864065] kthread+0x337/0x6f0 [ 14.864253] ret_from_fork+0x116/0x1d0 [ 14.864416] ret_from_fork_asm+0x1a/0x30 [ 14.864689] [ 14.864780] The buggy address belongs to the object at ffff8881029b7000 [ 14.864780] which belongs to the cache kmalloc-64 of size 64 [ 14.865301] The buggy address is located 0 bytes to the right of [ 14.865301] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.865748] [ 14.865824] The buggy address belongs to the physical page: [ 14.866037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.866361] flags: 0x200000000000000(node=0|zone=2) [ 14.866822] page_type: f5(slab) [ 14.867014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.867385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.867872] page dumped because: kasan: bad access detected [ 14.868070] [ 14.868183] Memory state around the buggy address: [ 14.868414] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.868732] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869044] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.869322] ^ [ 14.869526] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869803] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.870200] ================================================================== [ 15.003942] ================================================================== [ 15.004769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.005816] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.006921] [ 15.007395] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.007459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.007472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.007709] Call Trace: [ 15.007732] <TASK> [ 15.007753] dump_stack_lvl+0x73/0xb0 [ 15.007784] print_report+0xd1/0x610 [ 15.007809] ? __virt_addr_valid+0x1db/0x2d0 [ 15.007833] ? kasan_atomics_helper+0xac7/0x5450 [ 15.007855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.007879] ? kasan_atomics_helper+0xac7/0x5450 [ 15.007916] kasan_report+0x141/0x180 [ 15.007940] ? kasan_atomics_helper+0xac7/0x5450 [ 15.007991] kasan_check_range+0x10c/0x1c0 [ 15.008016] __kasan_check_write+0x18/0x20 [ 15.008036] kasan_atomics_helper+0xac7/0x5450 [ 15.008060] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.008084] ? kasan_save_alloc_info+0x3b/0x50 [ 15.008115] kasan_atomics+0x1dc/0x310 [ 15.008139] ? __pfx_kasan_atomics+0x10/0x10 [ 15.008164] ? __pfx_read_tsc+0x10/0x10 [ 15.008186] ? ktime_get_ts64+0x86/0x230 [ 15.008212] kunit_try_run_case+0x1a5/0x480 [ 15.008236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.008260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.008285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.008310] ? __kthread_parkme+0x82/0x180 [ 15.008330] ? preempt_count_sub+0x50/0x80 [ 15.008355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.008381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.008407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.008432] kthread+0x337/0x6f0 [ 15.008452] ? trace_preempt_on+0x20/0xc0 [ 15.008477] ? __pfx_kthread+0x10/0x10 [ 15.008498] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.008587] ? calculate_sigpending+0x7b/0xa0 [ 15.008614] ? __pfx_kthread+0x10/0x10 [ 15.008637] ret_from_fork+0x116/0x1d0 [ 15.008656] ? __pfx_kthread+0x10/0x10 [ 15.008677] ret_from_fork_asm+0x1a/0x30 [ 15.008709] </TASK> [ 15.008721] [ 15.028122] Allocated by task 282: [ 15.028279] kasan_save_stack+0x45/0x70 [ 15.028441] kasan_save_track+0x18/0x40 [ 15.029212] kasan_save_alloc_info+0x3b/0x50 [ 15.029920] __kasan_kmalloc+0xb7/0xc0 [ 15.030497] __kmalloc_cache_noprof+0x189/0x420 [ 15.031232] kasan_atomics+0x95/0x310 [ 15.031955] kunit_try_run_case+0x1a5/0x480 [ 15.032439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.032689] kthread+0x337/0x6f0 [ 15.032818] ret_from_fork+0x116/0x1d0 [ 15.033474] ret_from_fork_asm+0x1a/0x30 [ 15.034156] [ 15.034494] The buggy address belongs to the object at ffff8881029b7000 [ 15.034494] which belongs to the cache kmalloc-64 of size 64 [ 15.035465] The buggy address is located 0 bytes to the right of [ 15.035465] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.037261] [ 15.037355] The buggy address belongs to the physical page: [ 15.037885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.038947] flags: 0x200000000000000(node=0|zone=2) [ 15.039619] page_type: f5(slab) [ 15.040272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.040585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.040821] page dumped because: kasan: bad access detected [ 15.041014] [ 15.041087] Memory state around the buggy address: [ 15.041269] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.041590] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.042051] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.042294] ^ [ 15.042628] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.042946] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.043264] ================================================================== [ 14.828694] ================================================================== [ 14.829049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.829398] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.829802] [ 14.829926] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.829970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.829982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.830004] Call Trace: [ 14.830019] <TASK> [ 14.830033] dump_stack_lvl+0x73/0xb0 [ 14.830061] print_report+0xd1/0x610 [ 14.830084] ? __virt_addr_valid+0x1db/0x2d0 [ 14.830108] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.830130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.830153] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.830176] kasan_report+0x141/0x180 [ 14.830199] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.830228] kasan_check_range+0x10c/0x1c0 [ 14.830253] __kasan_check_write+0x18/0x20 [ 14.830273] kasan_atomics_helper+0x5fe/0x5450 [ 14.830298] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.830322] ? kasan_save_alloc_info+0x3b/0x50 [ 14.830353] kasan_atomics+0x1dc/0x310 [ 14.830377] ? __pfx_kasan_atomics+0x10/0x10 [ 14.830403] ? __pfx_read_tsc+0x10/0x10 [ 14.830424] ? ktime_get_ts64+0x86/0x230 [ 14.830449] kunit_try_run_case+0x1a5/0x480 [ 14.830475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.830498] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.830523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.830709] ? __kthread_parkme+0x82/0x180 [ 14.830732] ? preempt_count_sub+0x50/0x80 [ 14.830759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.830790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.830816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.830842] kthread+0x337/0x6f0 [ 14.830862] ? trace_preempt_on+0x20/0xc0 [ 14.830886] ? __pfx_kthread+0x10/0x10 [ 14.830922] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.830944] ? calculate_sigpending+0x7b/0xa0 [ 14.830968] ? __pfx_kthread+0x10/0x10 [ 14.830991] ret_from_fork+0x116/0x1d0 [ 14.831010] ? __pfx_kthread+0x10/0x10 [ 14.831031] ret_from_fork_asm+0x1a/0x30 [ 14.831064] </TASK> [ 14.831075] [ 14.838526] Allocated by task 282: [ 14.838665] kasan_save_stack+0x45/0x70 [ 14.838816] kasan_save_track+0x18/0x40 [ 14.839228] kasan_save_alloc_info+0x3b/0x50 [ 14.839457] __kasan_kmalloc+0xb7/0xc0 [ 14.839646] __kmalloc_cache_noprof+0x189/0x420 [ 14.839870] kasan_atomics+0x95/0x310 [ 14.840071] kunit_try_run_case+0x1a5/0x480 [ 14.840280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.840533] kthread+0x337/0x6f0 [ 14.840702] ret_from_fork+0x116/0x1d0 [ 14.840999] ret_from_fork_asm+0x1a/0x30 [ 14.841212] [ 14.841302] The buggy address belongs to the object at ffff8881029b7000 [ 14.841302] which belongs to the cache kmalloc-64 of size 64 [ 14.841741] The buggy address is located 0 bytes to the right of [ 14.841741] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.844271] [ 14.844357] The buggy address belongs to the physical page: [ 14.844911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.845456] flags: 0x200000000000000(node=0|zone=2) [ 14.845912] page_type: f5(slab) [ 14.846232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.846560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.846864] page dumped because: kasan: bad access detected [ 14.847111] [ 14.847202] Memory state around the buggy address: [ 14.847412] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.847710] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.848805] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.849352] ^ [ 14.850027] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.850418] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.851031] ================================================================== [ 15.742582] ================================================================== [ 15.742887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.743273] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.743606] [ 15.743737] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.743781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.743793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.743814] Call Trace: [ 15.743831] <TASK> [ 15.743848] dump_stack_lvl+0x73/0xb0 [ 15.743875] print_report+0xd1/0x610 [ 15.743909] ? __virt_addr_valid+0x1db/0x2d0 [ 15.743952] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.743994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.744018] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.744041] kasan_report+0x141/0x180 [ 15.744064] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.744092] kasan_check_range+0x10c/0x1c0 [ 15.744116] __kasan_check_write+0x18/0x20 [ 15.744137] kasan_atomics_helper+0x1b22/0x5450 [ 15.744161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.744185] ? kasan_save_alloc_info+0x3b/0x50 [ 15.744216] kasan_atomics+0x1dc/0x310 [ 15.744240] ? __pfx_kasan_atomics+0x10/0x10 [ 15.744265] ? __pfx_read_tsc+0x10/0x10 [ 15.744286] ? ktime_get_ts64+0x86/0x230 [ 15.744312] kunit_try_run_case+0x1a5/0x480 [ 15.744338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.744362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.744408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.744433] ? __kthread_parkme+0x82/0x180 [ 15.744455] ? preempt_count_sub+0x50/0x80 [ 15.744480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.744505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.744532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.744558] kthread+0x337/0x6f0 [ 15.744579] ? trace_preempt_on+0x20/0xc0 [ 15.744604] ? __pfx_kthread+0x10/0x10 [ 15.744626] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.744650] ? calculate_sigpending+0x7b/0xa0 [ 15.744676] ? __pfx_kthread+0x10/0x10 [ 15.744699] ret_from_fork+0x116/0x1d0 [ 15.744719] ? __pfx_kthread+0x10/0x10 [ 15.744740] ret_from_fork_asm+0x1a/0x30 [ 15.744774] </TASK> [ 15.744785] [ 15.751963] Allocated by task 282: [ 15.752164] kasan_save_stack+0x45/0x70 [ 15.752347] kasan_save_track+0x18/0x40 [ 15.752485] kasan_save_alloc_info+0x3b/0x50 [ 15.752650] __kasan_kmalloc+0xb7/0xc0 [ 15.752840] __kmalloc_cache_noprof+0x189/0x420 [ 15.753122] kasan_atomics+0x95/0x310 [ 15.753317] kunit_try_run_case+0x1a5/0x480 [ 15.753528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.753780] kthread+0x337/0x6f0 [ 15.753960] ret_from_fork+0x116/0x1d0 [ 15.754168] ret_from_fork_asm+0x1a/0x30 [ 15.754352] [ 15.754445] The buggy address belongs to the object at ffff8881029b7000 [ 15.754445] which belongs to the cache kmalloc-64 of size 64 [ 15.754810] The buggy address is located 0 bytes to the right of [ 15.754810] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.755249] [ 15.755348] The buggy address belongs to the physical page: [ 15.755603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.755985] flags: 0x200000000000000(node=0|zone=2) [ 15.756225] page_type: f5(slab) [ 15.756415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.756780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.757121] page dumped because: kasan: bad access detected [ 15.757297] [ 15.757367] Memory state around the buggy address: [ 15.757524] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.757820] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.758198] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.758519] ^ [ 15.758773] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.759134] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.759476] ================================================================== [ 15.437640] ================================================================== [ 15.438104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.438580] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.439343] [ 15.439452] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.439497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.439510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.439533] Call Trace: [ 15.439548] <TASK> [ 15.439565] dump_stack_lvl+0x73/0xb0 [ 15.439596] print_report+0xd1/0x610 [ 15.439619] ? __virt_addr_valid+0x1db/0x2d0 [ 15.439643] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.439666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.439690] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.439713] kasan_report+0x141/0x180 [ 15.439736] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.439765] kasan_check_range+0x10c/0x1c0 [ 15.439789] __kasan_check_read+0x15/0x20 [ 15.439809] kasan_atomics_helper+0x13b5/0x5450 [ 15.439834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.439858] ? kasan_save_alloc_info+0x3b/0x50 [ 15.439889] kasan_atomics+0x1dc/0x310 [ 15.439926] ? __pfx_kasan_atomics+0x10/0x10 [ 15.439951] ? __pfx_read_tsc+0x10/0x10 [ 15.439973] ? ktime_get_ts64+0x86/0x230 [ 15.440010] kunit_try_run_case+0x1a5/0x480 [ 15.440036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.440059] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.440085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.440110] ? __kthread_parkme+0x82/0x180 [ 15.440132] ? preempt_count_sub+0x50/0x80 [ 15.440158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.440183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.440208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.440233] kthread+0x337/0x6f0 [ 15.440252] ? trace_preempt_on+0x20/0xc0 [ 15.440278] ? __pfx_kthread+0x10/0x10 [ 15.440303] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.440326] ? calculate_sigpending+0x7b/0xa0 [ 15.440352] ? __pfx_kthread+0x10/0x10 [ 15.440375] ret_from_fork+0x116/0x1d0 [ 15.440394] ? __pfx_kthread+0x10/0x10 [ 15.440416] ret_from_fork_asm+0x1a/0x30 [ 15.440450] </TASK> [ 15.440464] [ 15.448606] Allocated by task 282: [ 15.448753] kasan_save_stack+0x45/0x70 [ 15.448965] kasan_save_track+0x18/0x40 [ 15.449152] kasan_save_alloc_info+0x3b/0x50 [ 15.449362] __kasan_kmalloc+0xb7/0xc0 [ 15.449528] __kmalloc_cache_noprof+0x189/0x420 [ 15.449690] kasan_atomics+0x95/0x310 [ 15.449825] kunit_try_run_case+0x1a5/0x480 [ 15.450111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.450366] kthread+0x337/0x6f0 [ 15.450523] ret_from_fork+0x116/0x1d0 [ 15.450728] ret_from_fork_asm+0x1a/0x30 [ 15.450889] [ 15.450971] The buggy address belongs to the object at ffff8881029b7000 [ 15.450971] which belongs to the cache kmalloc-64 of size 64 [ 15.451450] The buggy address is located 0 bytes to the right of [ 15.451450] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.452005] [ 15.452077] The buggy address belongs to the physical page: [ 15.452249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.452489] flags: 0x200000000000000(node=0|zone=2) [ 15.452651] page_type: f5(slab) [ 15.452770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.453089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.453753] page dumped because: kasan: bad access detected [ 15.454264] [ 15.454451] Memory state around the buggy address: [ 15.454673] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.454964] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.455184] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.455400] ^ [ 15.455554] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.455778] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.456368] ================================================================== [ 15.714690] ================================================================== [ 15.715577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.716312] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.716781] [ 15.716905] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.716951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.716964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.717426] Call Trace: [ 15.717443] <TASK> [ 15.717462] dump_stack_lvl+0x73/0xb0 [ 15.717496] print_report+0xd1/0x610 [ 15.717518] ? __virt_addr_valid+0x1db/0x2d0 [ 15.717543] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.717565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.717589] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.717612] kasan_report+0x141/0x180 [ 15.717636] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.717665] kasan_check_range+0x10c/0x1c0 [ 15.717690] __kasan_check_write+0x18/0x20 [ 15.717709] kasan_atomics_helper+0x1a7f/0x5450 [ 15.717733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.717758] ? kasan_save_alloc_info+0x3b/0x50 [ 15.717788] kasan_atomics+0x1dc/0x310 [ 15.717812] ? __pfx_kasan_atomics+0x10/0x10 [ 15.717837] ? __pfx_read_tsc+0x10/0x10 [ 15.717859] ? ktime_get_ts64+0x86/0x230 [ 15.717884] kunit_try_run_case+0x1a5/0x480 [ 15.717926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.717952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.718003] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.718029] ? __kthread_parkme+0x82/0x180 [ 15.718050] ? preempt_count_sub+0x50/0x80 [ 15.718076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.718102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.718147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.718173] kthread+0x337/0x6f0 [ 15.718193] ? trace_preempt_on+0x20/0xc0 [ 15.718218] ? __pfx_kthread+0x10/0x10 [ 15.718240] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.718262] ? calculate_sigpending+0x7b/0xa0 [ 15.718288] ? __pfx_kthread+0x10/0x10 [ 15.718310] ret_from_fork+0x116/0x1d0 [ 15.718330] ? __pfx_kthread+0x10/0x10 [ 15.718351] ret_from_fork_asm+0x1a/0x30 [ 15.718384] </TASK> [ 15.718396] [ 15.730509] Allocated by task 282: [ 15.730850] kasan_save_stack+0x45/0x70 [ 15.731274] kasan_save_track+0x18/0x40 [ 15.731636] kasan_save_alloc_info+0x3b/0x50 [ 15.732069] __kasan_kmalloc+0xb7/0xc0 [ 15.732442] __kmalloc_cache_noprof+0x189/0x420 [ 15.732865] kasan_atomics+0x95/0x310 [ 15.733251] kunit_try_run_case+0x1a5/0x480 [ 15.733543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.733724] kthread+0x337/0x6f0 [ 15.733846] ret_from_fork+0x116/0x1d0 [ 15.734203] ret_from_fork_asm+0x1a/0x30 [ 15.734598] [ 15.734786] The buggy address belongs to the object at ffff8881029b7000 [ 15.734786] which belongs to the cache kmalloc-64 of size 64 [ 15.735858] The buggy address is located 0 bytes to the right of [ 15.735858] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.736748] [ 15.736825] The buggy address belongs to the physical page: [ 15.737105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.737778] flags: 0x200000000000000(node=0|zone=2) [ 15.738251] page_type: f5(slab) [ 15.738567] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.739261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.739758] page dumped because: kasan: bad access detected [ 15.740121] [ 15.740196] Memory state around the buggy address: [ 15.740355] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.740573] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.740791] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.741056] ^ [ 15.741240] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.741566] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.741884] ================================================================== [ 14.730995] ================================================================== [ 14.731373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.731608] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.732008] [ 14.732122] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.732164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.732176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.732197] Call Trace: [ 14.732213] <TASK> [ 14.732228] dump_stack_lvl+0x73/0xb0 [ 14.732256] print_report+0xd1/0x610 [ 14.732280] ? __virt_addr_valid+0x1db/0x2d0 [ 14.732307] ? kasan_atomics_helper+0x3df/0x5450 [ 14.732330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.732355] ? kasan_atomics_helper+0x3df/0x5450 [ 14.732377] kasan_report+0x141/0x180 [ 14.732400] ? kasan_atomics_helper+0x3df/0x5450 [ 14.732429] kasan_check_range+0x10c/0x1c0 [ 14.732453] __kasan_check_read+0x15/0x20 [ 14.732473] kasan_atomics_helper+0x3df/0x5450 [ 14.732498] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.732523] ? kasan_save_alloc_info+0x3b/0x50 [ 14.732601] kasan_atomics+0x1dc/0x310 [ 14.732626] ? __pfx_kasan_atomics+0x10/0x10 [ 14.732651] ? __pfx_read_tsc+0x10/0x10 [ 14.732674] ? ktime_get_ts64+0x86/0x230 [ 14.732699] kunit_try_run_case+0x1a5/0x480 [ 14.732724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.732747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.732772] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.732796] ? __kthread_parkme+0x82/0x180 [ 14.732818] ? preempt_count_sub+0x50/0x80 [ 14.732843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.732869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.732906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.732931] kthread+0x337/0x6f0 [ 14.732951] ? trace_preempt_on+0x20/0xc0 [ 14.732975] ? __pfx_kthread+0x10/0x10 [ 14.733011] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.733034] ? calculate_sigpending+0x7b/0xa0 [ 14.733059] ? __pfx_kthread+0x10/0x10 [ 14.733082] ret_from_fork+0x116/0x1d0 [ 14.733101] ? __pfx_kthread+0x10/0x10 [ 14.733122] ret_from_fork_asm+0x1a/0x30 [ 14.733155] </TASK> [ 14.733166] [ 14.741058] Allocated by task 282: [ 14.741239] kasan_save_stack+0x45/0x70 [ 14.741583] kasan_save_track+0x18/0x40 [ 14.741786] kasan_save_alloc_info+0x3b/0x50 [ 14.742053] __kasan_kmalloc+0xb7/0xc0 [ 14.742244] __kmalloc_cache_noprof+0x189/0x420 [ 14.742466] kasan_atomics+0x95/0x310 [ 14.742845] kunit_try_run_case+0x1a5/0x480 [ 14.743150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.743332] kthread+0x337/0x6f0 [ 14.743483] ret_from_fork+0x116/0x1d0 [ 14.744015] ret_from_fork_asm+0x1a/0x30 [ 14.744205] [ 14.744306] The buggy address belongs to the object at ffff8881029b7000 [ 14.744306] which belongs to the cache kmalloc-64 of size 64 [ 14.744841] The buggy address is located 0 bytes to the right of [ 14.744841] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.745389] [ 14.745474] The buggy address belongs to the physical page: [ 14.745705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.746118] flags: 0x200000000000000(node=0|zone=2) [ 14.746324] page_type: f5(slab) [ 14.746492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.746888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.747214] page dumped because: kasan: bad access detected [ 14.747450] [ 14.747521] Memory state around the buggy address: [ 14.747762] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.748200] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.748499] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.748862] ^ [ 14.749090] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749383] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749715] ================================================================== [ 15.942197] ================================================================== [ 15.942460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.943220] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.943560] [ 15.943677] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.943723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.943736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.943761] Call Trace: [ 15.943780] <TASK> [ 15.943797] dump_stack_lvl+0x73/0xb0 [ 15.943830] print_report+0xd1/0x610 [ 15.943855] ? __virt_addr_valid+0x1db/0x2d0 [ 15.943879] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.943914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.943939] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.943962] kasan_report+0x141/0x180 [ 15.944006] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.944075] kasan_check_range+0x10c/0x1c0 [ 15.944102] __kasan_check_write+0x18/0x20 [ 15.944124] kasan_atomics_helper+0x20c8/0x5450 [ 15.944149] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.944174] ? kasan_save_alloc_info+0x3b/0x50 [ 15.944236] kasan_atomics+0x1dc/0x310 [ 15.944261] ? __pfx_kasan_atomics+0x10/0x10 [ 15.944287] ? __pfx_read_tsc+0x10/0x10 [ 15.944308] ? ktime_get_ts64+0x86/0x230 [ 15.944335] kunit_try_run_case+0x1a5/0x480 [ 15.944391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.944417] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.944445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.944471] ? __kthread_parkme+0x82/0x180 [ 15.944493] ? preempt_count_sub+0x50/0x80 [ 15.944550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.944576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.944602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.944627] kthread+0x337/0x6f0 [ 15.944648] ? trace_preempt_on+0x20/0xc0 [ 15.944673] ? __pfx_kthread+0x10/0x10 [ 15.944695] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.944717] ? calculate_sigpending+0x7b/0xa0 [ 15.944743] ? __pfx_kthread+0x10/0x10 [ 15.944765] ret_from_fork+0x116/0x1d0 [ 15.944784] ? __pfx_kthread+0x10/0x10 [ 15.944837] ret_from_fork_asm+0x1a/0x30 [ 15.944871] </TASK> [ 15.944883] [ 15.952935] Allocated by task 282: [ 15.953072] kasan_save_stack+0x45/0x70 [ 15.953219] kasan_save_track+0x18/0x40 [ 15.953377] kasan_save_alloc_info+0x3b/0x50 [ 15.953587] __kasan_kmalloc+0xb7/0xc0 [ 15.953779] __kmalloc_cache_noprof+0x189/0x420 [ 15.954123] kasan_atomics+0x95/0x310 [ 15.954323] kunit_try_run_case+0x1a5/0x480 [ 15.954535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.954827] kthread+0x337/0x6f0 [ 15.955064] ret_from_fork+0x116/0x1d0 [ 15.955272] ret_from_fork_asm+0x1a/0x30 [ 15.955417] [ 15.955490] The buggy address belongs to the object at ffff8881029b7000 [ 15.955490] which belongs to the cache kmalloc-64 of size 64 [ 15.955847] The buggy address is located 0 bytes to the right of [ 15.955847] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.956491] [ 15.956639] The buggy address belongs to the physical page: [ 15.956964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.957400] flags: 0x200000000000000(node=0|zone=2) [ 15.957637] page_type: f5(slab) [ 15.957808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.958169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.958407] page dumped because: kasan: bad access detected [ 15.958582] [ 15.958652] Memory state around the buggy address: [ 15.958984] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.959398] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.959755] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.960113] ^ [ 15.960378] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960697] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.961026] ================================================================== [ 15.539765] ================================================================== [ 15.540226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.540822] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.541403] [ 15.541645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.541693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.541714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.541736] Call Trace: [ 15.541750] <TASK> [ 15.541766] dump_stack_lvl+0x73/0xb0 [ 15.541796] print_report+0xd1/0x610 [ 15.541819] ? __virt_addr_valid+0x1db/0x2d0 [ 15.541842] ? kasan_atomics_helper+0x151d/0x5450 [ 15.541864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.541889] ? kasan_atomics_helper+0x151d/0x5450 [ 15.541922] kasan_report+0x141/0x180 [ 15.541945] ? kasan_atomics_helper+0x151d/0x5450 [ 15.541973] kasan_check_range+0x10c/0x1c0 [ 15.542113] __kasan_check_write+0x18/0x20 [ 15.542134] kasan_atomics_helper+0x151d/0x5450 [ 15.542159] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.542184] ? kasan_save_alloc_info+0x3b/0x50 [ 15.542214] kasan_atomics+0x1dc/0x310 [ 15.542273] ? __pfx_kasan_atomics+0x10/0x10 [ 15.542297] ? __pfx_read_tsc+0x10/0x10 [ 15.542319] ? ktime_get_ts64+0x86/0x230 [ 15.542345] kunit_try_run_case+0x1a5/0x480 [ 15.542370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.542393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.542418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.542442] ? __kthread_parkme+0x82/0x180 [ 15.542463] ? preempt_count_sub+0x50/0x80 [ 15.542488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.542513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.542537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.542562] kthread+0x337/0x6f0 [ 15.542582] ? trace_preempt_on+0x20/0xc0 [ 15.542606] ? __pfx_kthread+0x10/0x10 [ 15.542627] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.542649] ? calculate_sigpending+0x7b/0xa0 [ 15.542674] ? __pfx_kthread+0x10/0x10 [ 15.542695] ret_from_fork+0x116/0x1d0 [ 15.542714] ? __pfx_kthread+0x10/0x10 [ 15.542735] ret_from_fork_asm+0x1a/0x30 [ 15.542773] </TASK> [ 15.542785] [ 15.552402] Allocated by task 282: [ 15.552542] kasan_save_stack+0x45/0x70 [ 15.552748] kasan_save_track+0x18/0x40 [ 15.552956] kasan_save_alloc_info+0x3b/0x50 [ 15.553219] __kasan_kmalloc+0xb7/0xc0 [ 15.553419] __kmalloc_cache_noprof+0x189/0x420 [ 15.553619] kasan_atomics+0x95/0x310 [ 15.553755] kunit_try_run_case+0x1a5/0x480 [ 15.553913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.554110] kthread+0x337/0x6f0 [ 15.554281] ret_from_fork+0x116/0x1d0 [ 15.554486] ret_from_fork_asm+0x1a/0x30 [ 15.554682] [ 15.554789] The buggy address belongs to the object at ffff8881029b7000 [ 15.554789] which belongs to the cache kmalloc-64 of size 64 [ 15.555284] The buggy address is located 0 bytes to the right of [ 15.555284] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.555801] [ 15.555911] The buggy address belongs to the physical page: [ 15.556179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.556501] flags: 0x200000000000000(node=0|zone=2) [ 15.556704] page_type: f5(slab) [ 15.556872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.557217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.557524] page dumped because: kasan: bad access detected [ 15.557759] [ 15.557852] Memory state around the buggy address: [ 15.558119] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.558400] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.558678] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.558942] ^ [ 15.559099] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.559485] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.559920] ================================================================== [ 14.711946] ================================================================== [ 14.712265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.712520] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.712811] [ 14.713019] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.713064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.713076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.713098] Call Trace: [ 14.713114] <TASK> [ 14.713130] dump_stack_lvl+0x73/0xb0 [ 14.713158] print_report+0xd1/0x610 [ 14.713181] ? __virt_addr_valid+0x1db/0x2d0 [ 14.713205] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.713226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.713250] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.713274] kasan_report+0x141/0x180 [ 14.713297] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.713325] __asan_report_store4_noabort+0x1b/0x30 [ 14.713351] kasan_atomics_helper+0x4b6e/0x5450 [ 14.713375] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.713400] ? kasan_save_alloc_info+0x3b/0x50 [ 14.713430] kasan_atomics+0x1dc/0x310 [ 14.713455] ? __pfx_kasan_atomics+0x10/0x10 [ 14.713481] ? __pfx_read_tsc+0x10/0x10 [ 14.713502] ? ktime_get_ts64+0x86/0x230 [ 14.713529] kunit_try_run_case+0x1a5/0x480 [ 14.713554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.713578] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.713603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.713628] ? __kthread_parkme+0x82/0x180 [ 14.713650] ? preempt_count_sub+0x50/0x80 [ 14.713674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.713699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.713724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.713750] kthread+0x337/0x6f0 [ 14.713771] ? trace_preempt_on+0x20/0xc0 [ 14.713796] ? __pfx_kthread+0x10/0x10 [ 14.713817] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.713840] ? calculate_sigpending+0x7b/0xa0 [ 14.713865] ? __pfx_kthread+0x10/0x10 [ 14.713888] ret_from_fork+0x116/0x1d0 [ 14.713917] ? __pfx_kthread+0x10/0x10 [ 14.713939] ret_from_fork_asm+0x1a/0x30 [ 14.713971] </TASK> [ 14.713984] [ 14.721910] Allocated by task 282: [ 14.722052] kasan_save_stack+0x45/0x70 [ 14.722204] kasan_save_track+0x18/0x40 [ 14.722343] kasan_save_alloc_info+0x3b/0x50 [ 14.722494] __kasan_kmalloc+0xb7/0xc0 [ 14.722667] __kmalloc_cache_noprof+0x189/0x420 [ 14.723143] kasan_atomics+0x95/0x310 [ 14.723603] kunit_try_run_case+0x1a5/0x480 [ 14.723821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.724124] kthread+0x337/0x6f0 [ 14.724248] ret_from_fork+0x116/0x1d0 [ 14.724382] ret_from_fork_asm+0x1a/0x30 [ 14.724524] [ 14.724624] The buggy address belongs to the object at ffff8881029b7000 [ 14.724624] which belongs to the cache kmalloc-64 of size 64 [ 14.725471] The buggy address is located 0 bytes to the right of [ 14.725471] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.726012] [ 14.726114] The buggy address belongs to the physical page: [ 14.726359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.726870] flags: 0x200000000000000(node=0|zone=2) [ 14.727113] page_type: f5(slab) [ 14.727263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.727498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.727727] page dumped because: kasan: bad access detected [ 14.727996] [ 14.728103] Memory state around the buggy address: [ 14.728330] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.728650] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729081] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.729403] ^ [ 14.729576] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729794] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730281] ================================================================== [ 15.084257] ================================================================== [ 15.084800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.085071] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.085383] [ 15.085571] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.085624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.085637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.085660] Call Trace: [ 15.085676] <TASK> [ 15.085692] dump_stack_lvl+0x73/0xb0 [ 15.085722] print_report+0xd1/0x610 [ 15.085747] ? __virt_addr_valid+0x1db/0x2d0 [ 15.085772] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.085794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.085828] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.085852] kasan_report+0x141/0x180 [ 15.085876] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.085922] __asan_report_load4_noabort+0x18/0x20 [ 15.085948] kasan_atomics_helper+0x4a84/0x5450 [ 15.085990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.086024] ? kasan_save_alloc_info+0x3b/0x50 [ 15.086055] kasan_atomics+0x1dc/0x310 [ 15.086079] ? __pfx_kasan_atomics+0x10/0x10 [ 15.086115] ? __pfx_read_tsc+0x10/0x10 [ 15.086136] ? ktime_get_ts64+0x86/0x230 [ 15.086162] kunit_try_run_case+0x1a5/0x480 [ 15.086187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.086210] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.086245] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.086270] ? __kthread_parkme+0x82/0x180 [ 15.086291] ? preempt_count_sub+0x50/0x80 [ 15.086328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.086353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.086378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.086404] kthread+0x337/0x6f0 [ 15.086424] ? trace_preempt_on+0x20/0xc0 [ 15.086450] ? __pfx_kthread+0x10/0x10 [ 15.086471] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.086494] ? calculate_sigpending+0x7b/0xa0 [ 15.086577] ? __pfx_kthread+0x10/0x10 [ 15.086602] ret_from_fork+0x116/0x1d0 [ 15.086622] ? __pfx_kthread+0x10/0x10 [ 15.086654] ret_from_fork_asm+0x1a/0x30 [ 15.086687] </TASK> [ 15.086699] [ 15.094932] Allocated by task 282: [ 15.095160] kasan_save_stack+0x45/0x70 [ 15.095352] kasan_save_track+0x18/0x40 [ 15.095493] kasan_save_alloc_info+0x3b/0x50 [ 15.095708] __kasan_kmalloc+0xb7/0xc0 [ 15.095934] __kmalloc_cache_noprof+0x189/0x420 [ 15.096176] kasan_atomics+0x95/0x310 [ 15.096370] kunit_try_run_case+0x1a5/0x480 [ 15.096806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.097139] kthread+0x337/0x6f0 [ 15.097313] ret_from_fork+0x116/0x1d0 [ 15.097508] ret_from_fork_asm+0x1a/0x30 [ 15.097801] [ 15.097901] The buggy address belongs to the object at ffff8881029b7000 [ 15.097901] which belongs to the cache kmalloc-64 of size 64 [ 15.098430] The buggy address is located 0 bytes to the right of [ 15.098430] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.099051] [ 15.099154] The buggy address belongs to the physical page: [ 15.099363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.099605] flags: 0x200000000000000(node=0|zone=2) [ 15.099768] page_type: f5(slab) [ 15.099888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.100333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.100936] page dumped because: kasan: bad access detected [ 15.101242] [ 15.101362] Memory state around the buggy address: [ 15.101655] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.101962] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.102199] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.102414] ^ [ 15.102723] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.103119] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.103463] ================================================================== [ 14.959761] ================================================================== [ 14.960141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.960455] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.960914] [ 14.961053] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.961098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.961110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.961131] Call Trace: [ 14.961145] <TASK> [ 14.961159] dump_stack_lvl+0x73/0xb0 [ 14.961189] print_report+0xd1/0x610 [ 14.961212] ? __virt_addr_valid+0x1db/0x2d0 [ 14.961235] ? kasan_atomics_helper+0x992/0x5450 [ 14.961258] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.961283] ? kasan_atomics_helper+0x992/0x5450 [ 14.961306] kasan_report+0x141/0x180 [ 14.961329] ? kasan_atomics_helper+0x992/0x5450 [ 14.961359] kasan_check_range+0x10c/0x1c0 [ 14.961384] __kasan_check_write+0x18/0x20 [ 14.961404] kasan_atomics_helper+0x992/0x5450 [ 14.961429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.961453] ? kasan_save_alloc_info+0x3b/0x50 [ 14.961484] kasan_atomics+0x1dc/0x310 [ 14.961509] ? __pfx_kasan_atomics+0x10/0x10 [ 14.961534] ? __pfx_read_tsc+0x10/0x10 [ 14.961555] ? ktime_get_ts64+0x86/0x230 [ 14.961582] kunit_try_run_case+0x1a5/0x480 [ 14.961608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.961631] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.961656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.961681] ? __kthread_parkme+0x82/0x180 [ 14.961702] ? preempt_count_sub+0x50/0x80 [ 14.961727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.961753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.961778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.961803] kthread+0x337/0x6f0 [ 14.961822] ? trace_preempt_on+0x20/0xc0 [ 14.961846] ? __pfx_kthread+0x10/0x10 [ 14.961866] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.961889] ? calculate_sigpending+0x7b/0xa0 [ 14.961925] ? __pfx_kthread+0x10/0x10 [ 14.961947] ret_from_fork+0x116/0x1d0 [ 14.961967] ? __pfx_kthread+0x10/0x10 [ 14.961987] ret_from_fork_asm+0x1a/0x30 [ 14.962202] </TASK> [ 14.962214] [ 14.970270] Allocated by task 282: [ 14.970456] kasan_save_stack+0x45/0x70 [ 14.970848] kasan_save_track+0x18/0x40 [ 14.971115] kasan_save_alloc_info+0x3b/0x50 [ 14.971299] __kasan_kmalloc+0xb7/0xc0 [ 14.971458] __kmalloc_cache_noprof+0x189/0x420 [ 14.971640] kasan_atomics+0x95/0x310 [ 14.971830] kunit_try_run_case+0x1a5/0x480 [ 14.972055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.972253] kthread+0x337/0x6f0 [ 14.972376] ret_from_fork+0x116/0x1d0 [ 14.972509] ret_from_fork_asm+0x1a/0x30 [ 14.972650] [ 14.972722] The buggy address belongs to the object at ffff8881029b7000 [ 14.972722] which belongs to the cache kmalloc-64 of size 64 [ 14.973092] The buggy address is located 0 bytes to the right of [ 14.973092] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.973475] [ 14.973576] The buggy address belongs to the physical page: [ 14.973831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.974936] flags: 0x200000000000000(node=0|zone=2) [ 14.975202] page_type: f5(slab) [ 14.975377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.975855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.976197] page dumped because: kasan: bad access detected [ 14.976373] [ 14.976444] Memory state around the buggy address: [ 14.976645] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976991] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.977471] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.978008] ^ [ 14.978181] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.978401] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.978666] ================================================================== [ 15.760026] ================================================================== [ 15.760397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.760744] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.761115] [ 15.761223] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.761268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.761280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.761303] Call Trace: [ 15.761318] <TASK> [ 15.761335] dump_stack_lvl+0x73/0xb0 [ 15.761365] print_report+0xd1/0x610 [ 15.761388] ? __virt_addr_valid+0x1db/0x2d0 [ 15.761412] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.761435] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.761460] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.761483] kasan_report+0x141/0x180 [ 15.761507] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.761535] kasan_check_range+0x10c/0x1c0 [ 15.761580] __kasan_check_write+0x18/0x20 [ 15.761601] kasan_atomics_helper+0x1c18/0x5450 [ 15.761627] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.761652] ? kasan_save_alloc_info+0x3b/0x50 [ 15.761683] kasan_atomics+0x1dc/0x310 [ 15.761708] ? __pfx_kasan_atomics+0x10/0x10 [ 15.761734] ? __pfx_read_tsc+0x10/0x10 [ 15.761757] ? ktime_get_ts64+0x86/0x230 [ 15.761782] kunit_try_run_case+0x1a5/0x480 [ 15.761807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.761831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.761856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.761881] ? __kthread_parkme+0x82/0x180 [ 15.761913] ? preempt_count_sub+0x50/0x80 [ 15.761938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.761964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.762009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.762035] kthread+0x337/0x6f0 [ 15.762054] ? trace_preempt_on+0x20/0xc0 [ 15.762079] ? __pfx_kthread+0x10/0x10 [ 15.762100] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.762123] ? calculate_sigpending+0x7b/0xa0 [ 15.762150] ? __pfx_kthread+0x10/0x10 [ 15.762173] ret_from_fork+0x116/0x1d0 [ 15.762192] ? __pfx_kthread+0x10/0x10 [ 15.762213] ret_from_fork_asm+0x1a/0x30 [ 15.762246] </TASK> [ 15.762256] [ 15.769548] Allocated by task 282: [ 15.769716] kasan_save_stack+0x45/0x70 [ 15.769910] kasan_save_track+0x18/0x40 [ 15.770097] kasan_save_alloc_info+0x3b/0x50 [ 15.770295] __kasan_kmalloc+0xb7/0xc0 [ 15.770474] __kmalloc_cache_noprof+0x189/0x420 [ 15.770679] kasan_atomics+0x95/0x310 [ 15.770849] kunit_try_run_case+0x1a5/0x480 [ 15.771056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.771292] kthread+0x337/0x6f0 [ 15.771452] ret_from_fork+0x116/0x1d0 [ 15.771617] ret_from_fork_asm+0x1a/0x30 [ 15.771783] [ 15.771866] The buggy address belongs to the object at ffff8881029b7000 [ 15.771866] which belongs to the cache kmalloc-64 of size 64 [ 15.772360] The buggy address is located 0 bytes to the right of [ 15.772360] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.772721] [ 15.772791] The buggy address belongs to the physical page: [ 15.773098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.773459] flags: 0x200000000000000(node=0|zone=2) [ 15.773696] page_type: f5(slab) [ 15.773865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.774200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.774430] page dumped because: kasan: bad access detected [ 15.774603] [ 15.774674] Memory state around the buggy address: [ 15.774858] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.775211] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.775527] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.775838] ^ [ 15.776123] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.776455] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.776707] ================================================================== [ 15.904200] ================================================================== [ 15.904658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.905050] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.905379] [ 15.905523] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.905568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.905581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.905633] Call Trace: [ 15.905651] <TASK> [ 15.905667] dump_stack_lvl+0x73/0xb0 [ 15.905696] print_report+0xd1/0x610 [ 15.905720] ? __virt_addr_valid+0x1db/0x2d0 [ 15.905744] ? kasan_atomics_helper+0x2006/0x5450 [ 15.905766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.905790] ? kasan_atomics_helper+0x2006/0x5450 [ 15.905813] kasan_report+0x141/0x180 [ 15.905836] ? kasan_atomics_helper+0x2006/0x5450 [ 15.905865] kasan_check_range+0x10c/0x1c0 [ 15.905932] __kasan_check_write+0x18/0x20 [ 15.905953] kasan_atomics_helper+0x2006/0x5450 [ 15.906003] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.906028] ? kasan_save_alloc_info+0x3b/0x50 [ 15.906058] kasan_atomics+0x1dc/0x310 [ 15.906111] ? __pfx_kasan_atomics+0x10/0x10 [ 15.906161] ? __pfx_read_tsc+0x10/0x10 [ 15.906183] ? ktime_get_ts64+0x86/0x230 [ 15.906209] kunit_try_run_case+0x1a5/0x480 [ 15.906234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.906257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.906283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.906308] ? __kthread_parkme+0x82/0x180 [ 15.906328] ? preempt_count_sub+0x50/0x80 [ 15.906354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.906380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.906405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.906429] kthread+0x337/0x6f0 [ 15.906449] ? trace_preempt_on+0x20/0xc0 [ 15.906473] ? __pfx_kthread+0x10/0x10 [ 15.906494] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.906517] ? calculate_sigpending+0x7b/0xa0 [ 15.906542] ? __pfx_kthread+0x10/0x10 [ 15.906564] ret_from_fork+0x116/0x1d0 [ 15.906584] ? __pfx_kthread+0x10/0x10 [ 15.906604] ret_from_fork_asm+0x1a/0x30 [ 15.906637] </TASK> [ 15.906648] [ 15.914593] Allocated by task 282: [ 15.914802] kasan_save_stack+0x45/0x70 [ 15.915059] kasan_save_track+0x18/0x40 [ 15.915263] kasan_save_alloc_info+0x3b/0x50 [ 15.915502] __kasan_kmalloc+0xb7/0xc0 [ 15.915695] __kmalloc_cache_noprof+0x189/0x420 [ 15.915912] kasan_atomics+0x95/0x310 [ 15.916161] kunit_try_run_case+0x1a5/0x480 [ 15.916370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.916639] kthread+0x337/0x6f0 [ 15.916833] ret_from_fork+0x116/0x1d0 [ 15.917079] ret_from_fork_asm+0x1a/0x30 [ 15.917276] [ 15.917407] The buggy address belongs to the object at ffff8881029b7000 [ 15.917407] which belongs to the cache kmalloc-64 of size 64 [ 15.917937] The buggy address is located 0 bytes to the right of [ 15.917937] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.918379] [ 15.918470] The buggy address belongs to the physical page: [ 15.918660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.918984] flags: 0x200000000000000(node=0|zone=2) [ 15.919254] page_type: f5(slab) [ 15.919426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.919801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.920177] page dumped because: kasan: bad access detected [ 15.920391] [ 15.920461] Memory state around the buggy address: [ 15.920618] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920836] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.921201] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.921519] ^ [ 15.921739] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.922092] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.922407] ================================================================== [ 15.560499] ================================================================== [ 15.560871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.561294] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.561583] [ 15.561695] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.561739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.561751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.561772] Call Trace: [ 15.561785] <TASK> [ 15.561803] dump_stack_lvl+0x73/0xb0 [ 15.561831] print_report+0xd1/0x610 [ 15.561854] ? __virt_addr_valid+0x1db/0x2d0 [ 15.561878] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.561911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.561935] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.561958] kasan_report+0x141/0x180 [ 15.561981] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.562020] kasan_check_range+0x10c/0x1c0 [ 15.562045] __kasan_check_write+0x18/0x20 [ 15.562065] kasan_atomics_helper+0x15b6/0x5450 [ 15.562089] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.562113] ? kasan_save_alloc_info+0x3b/0x50 [ 15.562144] kasan_atomics+0x1dc/0x310 [ 15.562168] ? __pfx_kasan_atomics+0x10/0x10 [ 15.562193] ? __pfx_read_tsc+0x10/0x10 [ 15.562215] ? ktime_get_ts64+0x86/0x230 [ 15.562241] kunit_try_run_case+0x1a5/0x480 [ 15.562266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.562290] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.562315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.562339] ? __kthread_parkme+0x82/0x180 [ 15.562360] ? preempt_count_sub+0x50/0x80 [ 15.562386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.562410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.562435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.562460] kthread+0x337/0x6f0 [ 15.562480] ? trace_preempt_on+0x20/0xc0 [ 15.562504] ? __pfx_kthread+0x10/0x10 [ 15.562525] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.562547] ? calculate_sigpending+0x7b/0xa0 [ 15.562572] ? __pfx_kthread+0x10/0x10 [ 15.562593] ret_from_fork+0x116/0x1d0 [ 15.562612] ? __pfx_kthread+0x10/0x10 [ 15.562633] ret_from_fork_asm+0x1a/0x30 [ 15.562666] </TASK> [ 15.562678] [ 15.569735] Allocated by task 282: [ 15.569934] kasan_save_stack+0x45/0x70 [ 15.570252] kasan_save_track+0x18/0x40 [ 15.570451] kasan_save_alloc_info+0x3b/0x50 [ 15.570675] __kasan_kmalloc+0xb7/0xc0 [ 15.570869] __kmalloc_cache_noprof+0x189/0x420 [ 15.571269] kasan_atomics+0x95/0x310 [ 15.571473] kunit_try_run_case+0x1a5/0x480 [ 15.571673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.571851] kthread+0x337/0x6f0 [ 15.572007] ret_from_fork+0x116/0x1d0 [ 15.572199] ret_from_fork_asm+0x1a/0x30 [ 15.572399] [ 15.572499] The buggy address belongs to the object at ffff8881029b7000 [ 15.572499] which belongs to the cache kmalloc-64 of size 64 [ 15.572983] The buggy address is located 0 bytes to the right of [ 15.572983] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.573484] [ 15.573586] The buggy address belongs to the physical page: [ 15.573806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.574147] flags: 0x200000000000000(node=0|zone=2) [ 15.574338] page_type: f5(slab) [ 15.574476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.574822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.575063] page dumped because: kasan: bad access detected [ 15.575237] [ 15.575308] Memory state around the buggy address: [ 15.575464] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.575682] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.575935] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.576565] ^ [ 15.576787] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.577122] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.577437] ================================================================== [ 14.789694] ================================================================== [ 14.790127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.790426] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.790756] [ 14.790851] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.790905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.790918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.790939] Call Trace: [ 14.790954] <TASK> [ 14.790969] dump_stack_lvl+0x73/0xb0 [ 14.791007] print_report+0xd1/0x610 [ 14.791031] ? __virt_addr_valid+0x1db/0x2d0 [ 14.791055] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.791077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.791101] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.791125] kasan_report+0x141/0x180 [ 14.791149] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.791177] __asan_report_store4_noabort+0x1b/0x30 [ 14.791203] kasan_atomics_helper+0x4b3a/0x5450 [ 14.791229] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.791254] ? kasan_save_alloc_info+0x3b/0x50 [ 14.791285] kasan_atomics+0x1dc/0x310 [ 14.791309] ? __pfx_kasan_atomics+0x10/0x10 [ 14.791333] ? __pfx_read_tsc+0x10/0x10 [ 14.791354] ? ktime_get_ts64+0x86/0x230 [ 14.791380] kunit_try_run_case+0x1a5/0x480 [ 14.791404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.791428] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.791453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.791478] ? __kthread_parkme+0x82/0x180 [ 14.791499] ? preempt_count_sub+0x50/0x80 [ 14.791524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.791549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.791574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.791598] kthread+0x337/0x6f0 [ 14.791619] ? trace_preempt_on+0x20/0xc0 [ 14.791643] ? __pfx_kthread+0x10/0x10 [ 14.791664] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.791687] ? calculate_sigpending+0x7b/0xa0 [ 14.791711] ? __pfx_kthread+0x10/0x10 [ 14.791734] ret_from_fork+0x116/0x1d0 [ 14.791753] ? __pfx_kthread+0x10/0x10 [ 14.791774] ret_from_fork_asm+0x1a/0x30 [ 14.791807] </TASK> [ 14.791818] [ 14.799657] Allocated by task 282: [ 14.799842] kasan_save_stack+0x45/0x70 [ 14.800058] kasan_save_track+0x18/0x40 [ 14.800252] kasan_save_alloc_info+0x3b/0x50 [ 14.800824] __kasan_kmalloc+0xb7/0xc0 [ 14.801097] __kmalloc_cache_noprof+0x189/0x420 [ 14.801265] kasan_atomics+0x95/0x310 [ 14.801401] kunit_try_run_case+0x1a5/0x480 [ 14.801615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.801874] kthread+0x337/0x6f0 [ 14.802193] ret_from_fork+0x116/0x1d0 [ 14.802396] ret_from_fork_asm+0x1a/0x30 [ 14.802639] [ 14.802716] The buggy address belongs to the object at ffff8881029b7000 [ 14.802716] which belongs to the cache kmalloc-64 of size 64 [ 14.803372] The buggy address is located 0 bytes to the right of [ 14.803372] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.803973] [ 14.804065] The buggy address belongs to the physical page: [ 14.804269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.804851] flags: 0x200000000000000(node=0|zone=2) [ 14.805102] page_type: f5(slab) [ 14.805227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.805461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.805698] page dumped because: kasan: bad access detected [ 14.806005] [ 14.806105] Memory state around the buggy address: [ 14.806328] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.806647] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.807034] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.807253] ^ [ 14.807410] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.807630] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.808139] ================================================================== [ 15.695683] ================================================================== [ 15.696050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.696394] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.696692] [ 15.696799] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.696839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.696852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.696876] Call Trace: [ 15.696900] <TASK> [ 15.696917] dump_stack_lvl+0x73/0xb0 [ 15.696942] print_report+0xd1/0x610 [ 15.696964] ? __virt_addr_valid+0x1db/0x2d0 [ 15.696988] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.697010] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.697033] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.697055] kasan_report+0x141/0x180 [ 15.697077] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.697104] kasan_check_range+0x10c/0x1c0 [ 15.697128] __kasan_check_write+0x18/0x20 [ 15.697148] kasan_atomics_helper+0x19e3/0x5450 [ 15.697171] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.697195] ? kasan_save_alloc_info+0x3b/0x50 [ 15.697225] kasan_atomics+0x1dc/0x310 [ 15.697248] ? __pfx_kasan_atomics+0x10/0x10 [ 15.697273] ? __pfx_read_tsc+0x10/0x10 [ 15.697293] ? ktime_get_ts64+0x86/0x230 [ 15.697319] kunit_try_run_case+0x1a5/0x480 [ 15.697343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.697365] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.697390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.697414] ? __kthread_parkme+0x82/0x180 [ 15.697435] ? preempt_count_sub+0x50/0x80 [ 15.697459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.697484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.697507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.697531] kthread+0x337/0x6f0 [ 15.697551] ? trace_preempt_on+0x20/0xc0 [ 15.697574] ? __pfx_kthread+0x10/0x10 [ 15.697595] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.697616] ? calculate_sigpending+0x7b/0xa0 [ 15.697641] ? __pfx_kthread+0x10/0x10 [ 15.697663] ret_from_fork+0x116/0x1d0 [ 15.697681] ? __pfx_kthread+0x10/0x10 [ 15.697701] ret_from_fork_asm+0x1a/0x30 [ 15.697734] </TASK> [ 15.697745] [ 15.705034] Allocated by task 282: [ 15.705175] kasan_save_stack+0x45/0x70 [ 15.705321] kasan_save_track+0x18/0x40 [ 15.705457] kasan_save_alloc_info+0x3b/0x50 [ 15.705607] __kasan_kmalloc+0xb7/0xc0 [ 15.705741] __kmalloc_cache_noprof+0x189/0x420 [ 15.705909] kasan_atomics+0x95/0x310 [ 15.706071] kunit_try_run_case+0x1a5/0x480 [ 15.706221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.706404] kthread+0x337/0x6f0 [ 15.706530] ret_from_fork+0x116/0x1d0 [ 15.706666] ret_from_fork_asm+0x1a/0x30 [ 15.706873] [ 15.707005] The buggy address belongs to the object at ffff8881029b7000 [ 15.707005] which belongs to the cache kmalloc-64 of size 64 [ 15.707533] The buggy address is located 0 bytes to the right of [ 15.707533] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.708114] [ 15.708210] The buggy address belongs to the physical page: [ 15.708462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.708806] flags: 0x200000000000000(node=0|zone=2) [ 15.709006] page_type: f5(slab) [ 15.709127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.709362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.709589] page dumped because: kasan: bad access detected [ 15.709764] [ 15.709833] Memory state around the buggy address: [ 15.710105] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.710401] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.710670] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.711833] ^ [ 15.712246] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.712538] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.712815] ================================================================== [ 15.044049] ================================================================== [ 15.044401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.044818] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.045184] [ 15.045308] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.045354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.045367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.045390] Call Trace: [ 15.045408] <TASK> [ 15.045425] dump_stack_lvl+0x73/0xb0 [ 15.045455] print_report+0xd1/0x610 [ 15.045480] ? __virt_addr_valid+0x1db/0x2d0 [ 15.045504] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.045612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.045638] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.045661] kasan_report+0x141/0x180 [ 15.045696] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.045724] kasan_check_range+0x10c/0x1c0 [ 15.045749] __kasan_check_write+0x18/0x20 [ 15.045769] kasan_atomics_helper+0xb6a/0x5450 [ 15.045794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.045819] ? kasan_save_alloc_info+0x3b/0x50 [ 15.045849] kasan_atomics+0x1dc/0x310 [ 15.045874] ? __pfx_kasan_atomics+0x10/0x10 [ 15.045908] ? __pfx_read_tsc+0x10/0x10 [ 15.045931] ? ktime_get_ts64+0x86/0x230 [ 15.045957] kunit_try_run_case+0x1a5/0x480 [ 15.045982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.046006] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.046057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.046083] ? __kthread_parkme+0x82/0x180 [ 15.046104] ? preempt_count_sub+0x50/0x80 [ 15.046140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.046165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.046189] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.046223] kthread+0x337/0x6f0 [ 15.046243] ? trace_preempt_on+0x20/0xc0 [ 15.046267] ? __pfx_kthread+0x10/0x10 [ 15.046299] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.046323] ? calculate_sigpending+0x7b/0xa0 [ 15.046348] ? __pfx_kthread+0x10/0x10 [ 15.046372] ret_from_fork+0x116/0x1d0 [ 15.046393] ? __pfx_kthread+0x10/0x10 [ 15.046413] ret_from_fork_asm+0x1a/0x30 [ 15.046448] </TASK> [ 15.046459] [ 15.054946] Allocated by task 282: [ 15.055162] kasan_save_stack+0x45/0x70 [ 15.055369] kasan_save_track+0x18/0x40 [ 15.055571] kasan_save_alloc_info+0x3b/0x50 [ 15.055995] __kasan_kmalloc+0xb7/0xc0 [ 15.056237] __kmalloc_cache_noprof+0x189/0x420 [ 15.056482] kasan_atomics+0x95/0x310 [ 15.056769] kunit_try_run_case+0x1a5/0x480 [ 15.056993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.057232] kthread+0x337/0x6f0 [ 15.057365] ret_from_fork+0x116/0x1d0 [ 15.057644] ret_from_fork_asm+0x1a/0x30 [ 15.057849] [ 15.057960] The buggy address belongs to the object at ffff8881029b7000 [ 15.057960] which belongs to the cache kmalloc-64 of size 64 [ 15.058490] The buggy address is located 0 bytes to the right of [ 15.058490] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.059054] [ 15.059133] The buggy address belongs to the physical page: [ 15.059308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.059876] flags: 0x200000000000000(node=0|zone=2) [ 15.060162] page_type: f5(slab) [ 15.060340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.060765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.061134] page dumped because: kasan: bad access detected [ 15.061345] [ 15.061454] Memory state around the buggy address: [ 15.061761] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.062104] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.062324] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.062679] ^ [ 15.062924] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.063269] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.063684] ================================================================== [ 15.104054] ================================================================== [ 15.104403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.104972] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.105249] [ 15.105388] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.105431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.105444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.105481] Call Trace: [ 15.105499] <TASK> [ 15.105593] dump_stack_lvl+0x73/0xb0 [ 15.105637] print_report+0xd1/0x610 [ 15.105664] ? __virt_addr_valid+0x1db/0x2d0 [ 15.105692] ? kasan_atomics_helper+0xd47/0x5450 [ 15.105720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.105763] ? kasan_atomics_helper+0xd47/0x5450 [ 15.105791] kasan_report+0x141/0x180 [ 15.105829] ? kasan_atomics_helper+0xd47/0x5450 [ 15.105862] kasan_check_range+0x10c/0x1c0 [ 15.105901] __kasan_check_write+0x18/0x20 [ 15.105934] kasan_atomics_helper+0xd47/0x5450 [ 15.105963] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.105993] ? kasan_save_alloc_info+0x3b/0x50 [ 15.106055] kasan_atomics+0x1dc/0x310 [ 15.106083] ? __pfx_kasan_atomics+0x10/0x10 [ 15.106121] ? __pfx_read_tsc+0x10/0x10 [ 15.106146] ? ktime_get_ts64+0x86/0x230 [ 15.106174] kunit_try_run_case+0x1a5/0x480 [ 15.106214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.106243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.106274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.106304] ? __kthread_parkme+0x82/0x180 [ 15.106330] ? preempt_count_sub+0x50/0x80 [ 15.106359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.106389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.106420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.106454] kthread+0x337/0x6f0 [ 15.106476] ? trace_preempt_on+0x20/0xc0 [ 15.106504] ? __pfx_kthread+0x10/0x10 [ 15.106612] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.106640] ? calculate_sigpending+0x7b/0xa0 [ 15.106670] ? __pfx_kthread+0x10/0x10 [ 15.106704] ret_from_fork+0x116/0x1d0 [ 15.106727] ? __pfx_kthread+0x10/0x10 [ 15.106752] ret_from_fork_asm+0x1a/0x30 [ 15.106804] </TASK> [ 15.106816] [ 15.115161] Allocated by task 282: [ 15.115349] kasan_save_stack+0x45/0x70 [ 15.115636] kasan_save_track+0x18/0x40 [ 15.115842] kasan_save_alloc_info+0x3b/0x50 [ 15.116097] __kasan_kmalloc+0xb7/0xc0 [ 15.116291] __kmalloc_cache_noprof+0x189/0x420 [ 15.116467] kasan_atomics+0x95/0x310 [ 15.116883] kunit_try_run_case+0x1a5/0x480 [ 15.117098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.117358] kthread+0x337/0x6f0 [ 15.117623] ret_from_fork+0x116/0x1d0 [ 15.117814] ret_from_fork_asm+0x1a/0x30 [ 15.118045] [ 15.118148] The buggy address belongs to the object at ffff8881029b7000 [ 15.118148] which belongs to the cache kmalloc-64 of size 64 [ 15.118678] The buggy address is located 0 bytes to the right of [ 15.118678] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.119246] [ 15.119349] The buggy address belongs to the physical page: [ 15.119701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.120135] flags: 0x200000000000000(node=0|zone=2) [ 15.120320] page_type: f5(slab) [ 15.120445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.121026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.121432] page dumped because: kasan: bad access detected [ 15.121808] [ 15.121918] Memory state around the buggy address: [ 15.122150] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122484] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122904] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.123261] ^ [ 15.123476] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.123711] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.124117] ================================================================== [ 15.457161] ================================================================== [ 15.457470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.457821] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.458104] [ 15.458214] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.458256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.458268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.458290] Call Trace: [ 15.458305] <TASK> [ 15.458321] dump_stack_lvl+0x73/0xb0 [ 15.458348] print_report+0xd1/0x610 [ 15.458371] ? __virt_addr_valid+0x1db/0x2d0 [ 15.458395] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.458417] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.458441] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.458464] kasan_report+0x141/0x180 [ 15.458488] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.458516] __asan_report_load8_noabort+0x18/0x20 [ 15.458554] kasan_atomics_helper+0x4eae/0x5450 [ 15.458578] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.458604] ? kasan_save_alloc_info+0x3b/0x50 [ 15.458635] kasan_atomics+0x1dc/0x310 [ 15.458659] ? __pfx_kasan_atomics+0x10/0x10 [ 15.458684] ? __pfx_read_tsc+0x10/0x10 [ 15.458706] ? ktime_get_ts64+0x86/0x230 [ 15.458732] kunit_try_run_case+0x1a5/0x480 [ 15.458757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.458812] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.458837] ? __kthread_parkme+0x82/0x180 [ 15.458858] ? preempt_count_sub+0x50/0x80 [ 15.458884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.458944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.458970] kthread+0x337/0x6f0 [ 15.458998] ? trace_preempt_on+0x20/0xc0 [ 15.459024] ? __pfx_kthread+0x10/0x10 [ 15.459045] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.459068] ? calculate_sigpending+0x7b/0xa0 [ 15.459093] ? __pfx_kthread+0x10/0x10 [ 15.459115] ret_from_fork+0x116/0x1d0 [ 15.459134] ? __pfx_kthread+0x10/0x10 [ 15.459155] ret_from_fork_asm+0x1a/0x30 [ 15.459188] </TASK> [ 15.459199] [ 15.468833] Allocated by task 282: [ 15.469507] kasan_save_stack+0x45/0x70 [ 15.469847] kasan_save_track+0x18/0x40 [ 15.470315] kasan_save_alloc_info+0x3b/0x50 [ 15.470566] __kasan_kmalloc+0xb7/0xc0 [ 15.470962] __kmalloc_cache_noprof+0x189/0x420 [ 15.471220] kasan_atomics+0x95/0x310 [ 15.471406] kunit_try_run_case+0x1a5/0x480 [ 15.471950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.472258] kthread+0x337/0x6f0 [ 15.472567] ret_from_fork+0x116/0x1d0 [ 15.472943] ret_from_fork_asm+0x1a/0x30 [ 15.473283] [ 15.473388] The buggy address belongs to the object at ffff8881029b7000 [ 15.473388] which belongs to the cache kmalloc-64 of size 64 [ 15.474370] The buggy address is located 0 bytes to the right of [ 15.474370] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.475043] [ 15.475150] The buggy address belongs to the physical page: [ 15.475379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.476007] flags: 0x200000000000000(node=0|zone=2) [ 15.476368] page_type: f5(slab) [ 15.476766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.477463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.478175] page dumped because: kasan: bad access detected [ 15.478479] [ 15.478723] Memory state around the buggy address: [ 15.479264] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.479607] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.480265] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.480928] ^ [ 15.481167] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.481453] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.482060] ================================================================== [ 15.828377] ================================================================== [ 15.828880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.829194] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.829413] [ 15.829540] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.829584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.829597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.829618] Call Trace: [ 15.829634] <TASK> [ 15.829649] dump_stack_lvl+0x73/0xb0 [ 15.829677] print_report+0xd1/0x610 [ 15.829700] ? __virt_addr_valid+0x1db/0x2d0 [ 15.829723] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.829746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.829771] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.829794] kasan_report+0x141/0x180 [ 15.829817] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.829845] kasan_check_range+0x10c/0x1c0 [ 15.829870] __kasan_check_write+0x18/0x20 [ 15.829903] kasan_atomics_helper+0x1e12/0x5450 [ 15.829928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.829952] ? kasan_save_alloc_info+0x3b/0x50 [ 15.830003] kasan_atomics+0x1dc/0x310 [ 15.830028] ? __pfx_kasan_atomics+0x10/0x10 [ 15.830076] ? __pfx_read_tsc+0x10/0x10 [ 15.830099] ? ktime_get_ts64+0x86/0x230 [ 15.830125] kunit_try_run_case+0x1a5/0x480 [ 15.830150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.830174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.830198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.830223] ? __kthread_parkme+0x82/0x180 [ 15.830244] ? preempt_count_sub+0x50/0x80 [ 15.830270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.830295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.830319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.830345] kthread+0x337/0x6f0 [ 15.830364] ? trace_preempt_on+0x20/0xc0 [ 15.830389] ? __pfx_kthread+0x10/0x10 [ 15.830411] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.830434] ? calculate_sigpending+0x7b/0xa0 [ 15.830459] ? __pfx_kthread+0x10/0x10 [ 15.830481] ret_from_fork+0x116/0x1d0 [ 15.830500] ? __pfx_kthread+0x10/0x10 [ 15.830521] ret_from_fork_asm+0x1a/0x30 [ 15.830554] </TASK> [ 15.830565] [ 15.838017] Allocated by task 282: [ 15.838231] kasan_save_stack+0x45/0x70 [ 15.838458] kasan_save_track+0x18/0x40 [ 15.838646] kasan_save_alloc_info+0x3b/0x50 [ 15.838800] __kasan_kmalloc+0xb7/0xc0 [ 15.838960] __kmalloc_cache_noprof+0x189/0x420 [ 15.839233] kasan_atomics+0x95/0x310 [ 15.839420] kunit_try_run_case+0x1a5/0x480 [ 15.839628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.839904] kthread+0x337/0x6f0 [ 15.840109] ret_from_fork+0x116/0x1d0 [ 15.840303] ret_from_fork_asm+0x1a/0x30 [ 15.840516] [ 15.840631] The buggy address belongs to the object at ffff8881029b7000 [ 15.840631] which belongs to the cache kmalloc-64 of size 64 [ 15.841216] The buggy address is located 0 bytes to the right of [ 15.841216] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.841743] [ 15.841869] The buggy address belongs to the physical page: [ 15.842168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.842524] flags: 0x200000000000000(node=0|zone=2) [ 15.842781] page_type: f5(slab) [ 15.842936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.843333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.843669] page dumped because: kasan: bad access detected [ 15.843930] [ 15.844048] Memory state around the buggy address: [ 15.844275] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.844514] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.844725] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.845012] ^ [ 15.845245] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.845597] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.845964] ================================================================== [ 15.980884] ================================================================== [ 15.981273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.981668] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.982077] [ 15.982193] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.982268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.982281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.982303] Call Trace: [ 15.982319] <TASK> [ 15.982335] dump_stack_lvl+0x73/0xb0 [ 15.982365] print_report+0xd1/0x610 [ 15.982419] ? __virt_addr_valid+0x1db/0x2d0 [ 15.982444] ? kasan_atomics_helper+0x218a/0x5450 [ 15.982467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.982491] ? kasan_atomics_helper+0x218a/0x5450 [ 15.982514] kasan_report+0x141/0x180 [ 15.982537] ? kasan_atomics_helper+0x218a/0x5450 [ 15.982566] kasan_check_range+0x10c/0x1c0 [ 15.982619] __kasan_check_write+0x18/0x20 [ 15.982640] kasan_atomics_helper+0x218a/0x5450 [ 15.982664] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.982689] ? kasan_save_alloc_info+0x3b/0x50 [ 15.982719] kasan_atomics+0x1dc/0x310 [ 15.982744] ? __pfx_kasan_atomics+0x10/0x10 [ 15.982774] ? __pfx_read_tsc+0x10/0x10 [ 15.982797] ? ktime_get_ts64+0x86/0x230 [ 15.982823] kunit_try_run_case+0x1a5/0x480 [ 15.982849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.982911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.982936] ? __kthread_parkme+0x82/0x180 [ 15.982957] ? preempt_count_sub+0x50/0x80 [ 15.983037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.983064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.983089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.983145] kthread+0x337/0x6f0 [ 15.983166] ? trace_preempt_on+0x20/0xc0 [ 15.983190] ? __pfx_kthread+0x10/0x10 [ 15.983211] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.983233] ? calculate_sigpending+0x7b/0xa0 [ 15.983259] ? __pfx_kthread+0x10/0x10 [ 15.983281] ret_from_fork+0x116/0x1d0 [ 15.983300] ? __pfx_kthread+0x10/0x10 [ 15.983322] ret_from_fork_asm+0x1a/0x30 [ 15.983356] </TASK> [ 15.983397] [ 15.991198] Allocated by task 282: [ 15.991403] kasan_save_stack+0x45/0x70 [ 15.991612] kasan_save_track+0x18/0x40 [ 15.991805] kasan_save_alloc_info+0x3b/0x50 [ 15.992081] __kasan_kmalloc+0xb7/0xc0 [ 15.992281] __kmalloc_cache_noprof+0x189/0x420 [ 15.992518] kasan_atomics+0x95/0x310 [ 15.992738] kunit_try_run_case+0x1a5/0x480 [ 15.992947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.993222] kthread+0x337/0x6f0 [ 15.993403] ret_from_fork+0x116/0x1d0 [ 15.993597] ret_from_fork_asm+0x1a/0x30 [ 15.993827] [ 15.993919] The buggy address belongs to the object at ffff8881029b7000 [ 15.993919] which belongs to the cache kmalloc-64 of size 64 [ 15.994480] The buggy address is located 0 bytes to the right of [ 15.994480] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.995087] [ 15.995259] The buggy address belongs to the physical page: [ 15.995597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.995962] flags: 0x200000000000000(node=0|zone=2) [ 15.996218] page_type: f5(slab) [ 15.996388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.996641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.996870] page dumped because: kasan: bad access detected [ 15.997159] [ 15.997287] Memory state around the buggy address: [ 15.997513] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997836] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.998142] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.998358] ^ [ 15.998567] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.998831] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.999220] ================================================================== [ 15.181449] ================================================================== [ 15.181890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.182261] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.182701] [ 15.182807] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.182853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.182865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.182904] Call Trace: [ 15.182923] <TASK> [ 15.182938] dump_stack_lvl+0x73/0xb0 [ 15.182997] print_report+0xd1/0x610 [ 15.183020] ? __virt_addr_valid+0x1db/0x2d0 [ 15.183045] ? kasan_atomics_helper+0xf10/0x5450 [ 15.183067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.183091] ? kasan_atomics_helper+0xf10/0x5450 [ 15.183114] kasan_report+0x141/0x180 [ 15.183147] ? kasan_atomics_helper+0xf10/0x5450 [ 15.183175] kasan_check_range+0x10c/0x1c0 [ 15.183210] __kasan_check_write+0x18/0x20 [ 15.183231] kasan_atomics_helper+0xf10/0x5450 [ 15.183255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.183281] ? kasan_save_alloc_info+0x3b/0x50 [ 15.183311] kasan_atomics+0x1dc/0x310 [ 15.183335] ? __pfx_kasan_atomics+0x10/0x10 [ 15.183361] ? __pfx_read_tsc+0x10/0x10 [ 15.183383] ? ktime_get_ts64+0x86/0x230 [ 15.183409] kunit_try_run_case+0x1a5/0x480 [ 15.183434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183466] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.183491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.183581] ? __kthread_parkme+0x82/0x180 [ 15.183606] ? preempt_count_sub+0x50/0x80 [ 15.183631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.183682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.183707] kthread+0x337/0x6f0 [ 15.183728] ? trace_preempt_on+0x20/0xc0 [ 15.183753] ? __pfx_kthread+0x10/0x10 [ 15.183774] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.183797] ? calculate_sigpending+0x7b/0xa0 [ 15.183822] ? __pfx_kthread+0x10/0x10 [ 15.183844] ret_from_fork+0x116/0x1d0 [ 15.183863] ? __pfx_kthread+0x10/0x10 [ 15.183884] ret_from_fork_asm+0x1a/0x30 [ 15.183936] </TASK> [ 15.183948] [ 15.192143] Allocated by task 282: [ 15.192357] kasan_save_stack+0x45/0x70 [ 15.192737] kasan_save_track+0x18/0x40 [ 15.192959] kasan_save_alloc_info+0x3b/0x50 [ 15.193200] __kasan_kmalloc+0xb7/0xc0 [ 15.193403] __kmalloc_cache_noprof+0x189/0x420 [ 15.193716] kasan_atomics+0x95/0x310 [ 15.193926] kunit_try_run_case+0x1a5/0x480 [ 15.194103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.194383] kthread+0x337/0x6f0 [ 15.194662] ret_from_fork+0x116/0x1d0 [ 15.194857] ret_from_fork_asm+0x1a/0x30 [ 15.195111] [ 15.195211] The buggy address belongs to the object at ffff8881029b7000 [ 15.195211] which belongs to the cache kmalloc-64 of size 64 [ 15.195806] The buggy address is located 0 bytes to the right of [ 15.195806] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.196365] [ 15.196467] The buggy address belongs to the physical page: [ 15.196949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.197274] flags: 0x200000000000000(node=0|zone=2) [ 15.197442] page_type: f5(slab) [ 15.197574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.198028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.198369] page dumped because: kasan: bad access detected [ 15.198704] [ 15.198811] Memory state around the buggy address: [ 15.199051] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.199377] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.199749] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.200069] ^ [ 15.200250] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200804] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.201154] ================================================================== [ 14.750111] ================================================================== [ 14.750406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.750758] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.751209] [ 14.751322] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.751363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.751375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.751395] Call Trace: [ 14.751411] <TASK> [ 14.751425] dump_stack_lvl+0x73/0xb0 [ 14.751454] print_report+0xd1/0x610 [ 14.751477] ? __virt_addr_valid+0x1db/0x2d0 [ 14.751499] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.751522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.751707] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.751731] kasan_report+0x141/0x180 [ 14.751755] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.751783] __asan_report_load4_noabort+0x18/0x20 [ 14.751809] kasan_atomics_helper+0x4b54/0x5450 [ 14.751834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.751858] ? kasan_save_alloc_info+0x3b/0x50 [ 14.751889] kasan_atomics+0x1dc/0x310 [ 14.751929] ? __pfx_kasan_atomics+0x10/0x10 [ 14.751954] ? __pfx_read_tsc+0x10/0x10 [ 14.751975] ? ktime_get_ts64+0x86/0x230 [ 14.752000] kunit_try_run_case+0x1a5/0x480 [ 14.752025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.752075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.752099] ? __kthread_parkme+0x82/0x180 [ 14.752121] ? preempt_count_sub+0x50/0x80 [ 14.752146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.752196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.752221] kthread+0x337/0x6f0 [ 14.752241] ? trace_preempt_on+0x20/0xc0 [ 14.752266] ? __pfx_kthread+0x10/0x10 [ 14.752287] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.752309] ? calculate_sigpending+0x7b/0xa0 [ 14.752335] ? __pfx_kthread+0x10/0x10 [ 14.752358] ret_from_fork+0x116/0x1d0 [ 14.752377] ? __pfx_kthread+0x10/0x10 [ 14.752398] ret_from_fork_asm+0x1a/0x30 [ 14.752431] </TASK> [ 14.752442] [ 14.760177] Allocated by task 282: [ 14.760339] kasan_save_stack+0x45/0x70 [ 14.760516] kasan_save_track+0x18/0x40 [ 14.760699] kasan_save_alloc_info+0x3b/0x50 [ 14.760854] __kasan_kmalloc+0xb7/0xc0 [ 14.761000] __kmalloc_cache_noprof+0x189/0x420 [ 14.761159] kasan_atomics+0x95/0x310 [ 14.761295] kunit_try_run_case+0x1a5/0x480 [ 14.761443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.761621] kthread+0x337/0x6f0 [ 14.761743] ret_from_fork+0x116/0x1d0 [ 14.761877] ret_from_fork_asm+0x1a/0x30 [ 14.762085] [ 14.762203] The buggy address belongs to the object at ffff8881029b7000 [ 14.762203] which belongs to the cache kmalloc-64 of size 64 [ 14.762731] The buggy address is located 0 bytes to the right of [ 14.762731] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.763698] [ 14.763869] The buggy address belongs to the physical page: [ 14.764637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.764909] flags: 0x200000000000000(node=0|zone=2) [ 14.765321] page_type: f5(slab) [ 14.765493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.765885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.766346] page dumped because: kasan: bad access detected [ 14.766637] [ 14.766722] Memory state around the buggy address: [ 14.766884] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767458] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768096] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.768380] ^ [ 14.768640] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768863] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.769199] ================================================================== [ 15.999763] ================================================================== [ 16.000101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.000480] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 16.000853] [ 16.001029] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.001074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.001086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.001109] Call Trace: [ 16.001125] <TASK> [ 16.001172] dump_stack_lvl+0x73/0xb0 [ 16.001202] print_report+0xd1/0x610 [ 16.001225] ? __virt_addr_valid+0x1db/0x2d0 [ 16.001249] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.001271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.001295] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.001349] kasan_report+0x141/0x180 [ 16.001372] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.001401] __asan_report_load8_noabort+0x18/0x20 [ 16.001426] kasan_atomics_helper+0x4fa5/0x5450 [ 16.001451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.001505] ? kasan_save_alloc_info+0x3b/0x50 [ 16.001536] kasan_atomics+0x1dc/0x310 [ 16.001561] ? __pfx_kasan_atomics+0x10/0x10 [ 16.001586] ? __pfx_read_tsc+0x10/0x10 [ 16.001608] ? ktime_get_ts64+0x86/0x230 [ 16.001665] kunit_try_run_case+0x1a5/0x480 [ 16.001691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.001715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.001741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.001766] ? __kthread_parkme+0x82/0x180 [ 16.001787] ? preempt_count_sub+0x50/0x80 [ 16.001813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.001838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.001863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.001889] kthread+0x337/0x6f0 [ 16.001919] ? trace_preempt_on+0x20/0xc0 [ 16.001991] ? __pfx_kthread+0x10/0x10 [ 16.002014] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.002037] ? calculate_sigpending+0x7b/0xa0 [ 16.002062] ? __pfx_kthread+0x10/0x10 [ 16.002084] ret_from_fork+0x116/0x1d0 [ 16.002103] ? __pfx_kthread+0x10/0x10 [ 16.002124] ret_from_fork_asm+0x1a/0x30 [ 16.002157] </TASK> [ 16.002167] [ 16.010524] Allocated by task 282: [ 16.010717] kasan_save_stack+0x45/0x70 [ 16.010944] kasan_save_track+0x18/0x40 [ 16.011212] kasan_save_alloc_info+0x3b/0x50 [ 16.011424] __kasan_kmalloc+0xb7/0xc0 [ 16.011646] __kmalloc_cache_noprof+0x189/0x420 [ 16.011915] kasan_atomics+0x95/0x310 [ 16.012140] kunit_try_run_case+0x1a5/0x480 [ 16.012367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.012635] kthread+0x337/0x6f0 [ 16.012800] ret_from_fork+0x116/0x1d0 [ 16.013091] ret_from_fork_asm+0x1a/0x30 [ 16.013341] [ 16.013439] The buggy address belongs to the object at ffff8881029b7000 [ 16.013439] which belongs to the cache kmalloc-64 of size 64 [ 16.013916] The buggy address is located 0 bytes to the right of [ 16.013916] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 16.014514] [ 16.014604] The buggy address belongs to the physical page: [ 16.014808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 16.015231] flags: 0x200000000000000(node=0|zone=2) [ 16.015503] page_type: f5(slab) [ 16.015671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.016068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.016398] page dumped because: kasan: bad access detected [ 16.016641] [ 16.016733] Memory state around the buggy address: [ 16.016983] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.017237] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.017496] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.017854] ^ [ 16.018123] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.018440] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.018751] ================================================================== [ 15.222455] ================================================================== [ 15.222931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.223291] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.223633] [ 15.223758] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.223802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.223815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.223848] Call Trace: [ 15.223863] <TASK> [ 15.223879] dump_stack_lvl+0x73/0xb0 [ 15.223917] print_report+0xd1/0x610 [ 15.223940] ? __virt_addr_valid+0x1db/0x2d0 [ 15.223965] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.223988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.224012] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.224040] kasan_report+0x141/0x180 [ 15.224063] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.224091] __asan_report_load4_noabort+0x18/0x20 [ 15.224117] kasan_atomics_helper+0x4a36/0x5450 [ 15.224141] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.224184] ? kasan_save_alloc_info+0x3b/0x50 [ 15.224216] kasan_atomics+0x1dc/0x310 [ 15.224251] ? __pfx_kasan_atomics+0x10/0x10 [ 15.224277] ? __pfx_read_tsc+0x10/0x10 [ 15.224298] ? ktime_get_ts64+0x86/0x230 [ 15.224324] kunit_try_run_case+0x1a5/0x480 [ 15.224349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.224382] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.224406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.224442] ? __kthread_parkme+0x82/0x180 [ 15.224463] ? preempt_count_sub+0x50/0x80 [ 15.224488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.224573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.224627] kthread+0x337/0x6f0 [ 15.224648] ? trace_preempt_on+0x20/0xc0 [ 15.224672] ? __pfx_kthread+0x10/0x10 [ 15.224694] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.224717] ? calculate_sigpending+0x7b/0xa0 [ 15.224742] ? __pfx_kthread+0x10/0x10 [ 15.224764] ret_from_fork+0x116/0x1d0 [ 15.224795] ? __pfx_kthread+0x10/0x10 [ 15.224817] ret_from_fork_asm+0x1a/0x30 [ 15.224861] </TASK> [ 15.224873] [ 15.233256] Allocated by task 282: [ 15.233438] kasan_save_stack+0x45/0x70 [ 15.233857] kasan_save_track+0x18/0x40 [ 15.234113] kasan_save_alloc_info+0x3b/0x50 [ 15.234317] __kasan_kmalloc+0xb7/0xc0 [ 15.234537] __kmalloc_cache_noprof+0x189/0x420 [ 15.234739] kasan_atomics+0x95/0x310 [ 15.234901] kunit_try_run_case+0x1a5/0x480 [ 15.235115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.235366] kthread+0x337/0x6f0 [ 15.235530] ret_from_fork+0x116/0x1d0 [ 15.235693] ret_from_fork_asm+0x1a/0x30 [ 15.235878] [ 15.236092] The buggy address belongs to the object at ffff8881029b7000 [ 15.236092] which belongs to the cache kmalloc-64 of size 64 [ 15.236669] The buggy address is located 0 bytes to the right of [ 15.236669] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.237183] [ 15.237258] The buggy address belongs to the physical page: [ 15.237433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.237936] flags: 0x200000000000000(node=0|zone=2) [ 15.238221] page_type: f5(slab) [ 15.238392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.238820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.239175] page dumped because: kasan: bad access detected [ 15.239350] [ 15.239421] Memory state around the buggy address: [ 15.239773] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240137] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240472] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.240833] ^ [ 15.241103] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241333] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241781] ================================================================== [ 14.913367] ================================================================== [ 14.913948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.914648] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.915200] [ 14.915291] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.915335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.915348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.915370] Call Trace: [ 14.915386] <TASK> [ 14.915402] dump_stack_lvl+0x73/0xb0 [ 14.915431] print_report+0xd1/0x610 [ 14.915454] ? __virt_addr_valid+0x1db/0x2d0 [ 14.915478] ? kasan_atomics_helper+0x860/0x5450 [ 14.915500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.915711] ? kasan_atomics_helper+0x860/0x5450 [ 14.915737] kasan_report+0x141/0x180 [ 14.915761] ? kasan_atomics_helper+0x860/0x5450 [ 14.915790] kasan_check_range+0x10c/0x1c0 [ 14.915815] __kasan_check_write+0x18/0x20 [ 14.915835] kasan_atomics_helper+0x860/0x5450 [ 14.915859] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.915884] ? kasan_save_alloc_info+0x3b/0x50 [ 14.915929] kasan_atomics+0x1dc/0x310 [ 14.915953] ? __pfx_kasan_atomics+0x10/0x10 [ 14.915978] ? __pfx_read_tsc+0x10/0x10 [ 14.916000] ? ktime_get_ts64+0x86/0x230 [ 14.916026] kunit_try_run_case+0x1a5/0x480 [ 14.916051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.916075] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.916101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.916146] ? __kthread_parkme+0x82/0x180 [ 14.916168] ? preempt_count_sub+0x50/0x80 [ 14.916194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.916219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.916244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.916270] kthread+0x337/0x6f0 [ 14.916291] ? trace_preempt_on+0x20/0xc0 [ 14.916315] ? __pfx_kthread+0x10/0x10 [ 14.916337] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.916360] ? calculate_sigpending+0x7b/0xa0 [ 14.916385] ? __pfx_kthread+0x10/0x10 [ 14.916408] ret_from_fork+0x116/0x1d0 [ 14.916428] ? __pfx_kthread+0x10/0x10 [ 14.916450] ret_from_fork_asm+0x1a/0x30 [ 14.916483] </TASK> [ 14.916494] [ 14.930540] Allocated by task 282: [ 14.931106] kasan_save_stack+0x45/0x70 [ 14.931470] kasan_save_track+0x18/0x40 [ 14.931769] kasan_save_alloc_info+0x3b/0x50 [ 14.932242] __kasan_kmalloc+0xb7/0xc0 [ 14.932626] __kmalloc_cache_noprof+0x189/0x420 [ 14.932929] kasan_atomics+0x95/0x310 [ 14.933093] kunit_try_run_case+0x1a5/0x480 [ 14.933245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.933424] kthread+0x337/0x6f0 [ 14.933553] ret_from_fork+0x116/0x1d0 [ 14.933724] ret_from_fork_asm+0x1a/0x30 [ 14.933888] [ 14.933997] The buggy address belongs to the object at ffff8881029b7000 [ 14.933997] which belongs to the cache kmalloc-64 of size 64 [ 14.934489] The buggy address is located 0 bytes to the right of [ 14.934489] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.935246] [ 14.935352] The buggy address belongs to the physical page: [ 14.935665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.936058] flags: 0x200000000000000(node=0|zone=2) [ 14.936286] page_type: f5(slab) [ 14.936423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.936750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.937046] page dumped because: kasan: bad access detected [ 14.937411] [ 14.937485] Memory state around the buggy address: [ 14.937917] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938247] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938543] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.938860] ^ [ 14.939056] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.939338] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.939582] ================================================================== [ 14.870706] ================================================================== [ 14.871090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.871324] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.871816] [ 14.871948] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.872015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.872028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.872049] Call Trace: [ 14.872065] <TASK> [ 14.872079] dump_stack_lvl+0x73/0xb0 [ 14.872110] print_report+0xd1/0x610 [ 14.872133] ? __virt_addr_valid+0x1db/0x2d0 [ 14.872157] ? kasan_atomics_helper+0x72f/0x5450 [ 14.872179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.872203] ? kasan_atomics_helper+0x72f/0x5450 [ 14.872226] kasan_report+0x141/0x180 [ 14.872249] ? kasan_atomics_helper+0x72f/0x5450 [ 14.872277] kasan_check_range+0x10c/0x1c0 [ 14.872302] __kasan_check_write+0x18/0x20 [ 14.872323] kasan_atomics_helper+0x72f/0x5450 [ 14.872347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.872371] ? kasan_save_alloc_info+0x3b/0x50 [ 14.872402] kasan_atomics+0x1dc/0x310 [ 14.872426] ? __pfx_kasan_atomics+0x10/0x10 [ 14.872452] ? __pfx_read_tsc+0x10/0x10 [ 14.872473] ? ktime_get_ts64+0x86/0x230 [ 14.872499] kunit_try_run_case+0x1a5/0x480 [ 14.872600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.872625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.872650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.872676] ? __kthread_parkme+0x82/0x180 [ 14.872697] ? preempt_count_sub+0x50/0x80 [ 14.872723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.872748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.872798] kthread+0x337/0x6f0 [ 14.872819] ? trace_preempt_on+0x20/0xc0 [ 14.872843] ? __pfx_kthread+0x10/0x10 [ 14.872865] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.872887] ? calculate_sigpending+0x7b/0xa0 [ 14.872923] ? __pfx_kthread+0x10/0x10 [ 14.872946] ret_from_fork+0x116/0x1d0 [ 14.872964] ? __pfx_kthread+0x10/0x10 [ 14.872985] ret_from_fork_asm+0x1a/0x30 [ 14.873034] </TASK> [ 14.873046] [ 14.881110] Allocated by task 282: [ 14.881295] kasan_save_stack+0x45/0x70 [ 14.881470] kasan_save_track+0x18/0x40 [ 14.881740] kasan_save_alloc_info+0x3b/0x50 [ 14.881938] __kasan_kmalloc+0xb7/0xc0 [ 14.882157] __kmalloc_cache_noprof+0x189/0x420 [ 14.882381] kasan_atomics+0x95/0x310 [ 14.882626] kunit_try_run_case+0x1a5/0x480 [ 14.882835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.883100] kthread+0x337/0x6f0 [ 14.883264] ret_from_fork+0x116/0x1d0 [ 14.883446] ret_from_fork_asm+0x1a/0x30 [ 14.883822] [ 14.883930] The buggy address belongs to the object at ffff8881029b7000 [ 14.883930] which belongs to the cache kmalloc-64 of size 64 [ 14.884320] The buggy address is located 0 bytes to the right of [ 14.884320] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.884820] [ 14.884930] The buggy address belongs to the physical page: [ 14.885208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.885643] flags: 0x200000000000000(node=0|zone=2) [ 14.885879] page_type: f5(slab) [ 14.886085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.886430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.886808] page dumped because: kasan: bad access detected [ 14.887025] [ 14.887097] Memory state around the buggy address: [ 14.887256] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.887479] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888026] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.888386] ^ [ 14.888698] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.889067] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.889385] ================================================================== [ 15.794162] ================================================================== [ 15.794556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.794902] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.795244] [ 15.795357] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.795400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.795412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.795434] Call Trace: [ 15.795448] <TASK> [ 15.795463] dump_stack_lvl+0x73/0xb0 [ 15.795491] print_report+0xd1/0x610 [ 15.795514] ? __virt_addr_valid+0x1db/0x2d0 [ 15.795537] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.795559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.795583] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.795606] kasan_report+0x141/0x180 [ 15.795629] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.795657] kasan_check_range+0x10c/0x1c0 [ 15.795682] __kasan_check_write+0x18/0x20 [ 15.795701] kasan_atomics_helper+0x1ce1/0x5450 [ 15.795725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.795749] ? kasan_save_alloc_info+0x3b/0x50 [ 15.795779] kasan_atomics+0x1dc/0x310 [ 15.795803] ? __pfx_kasan_atomics+0x10/0x10 [ 15.795828] ? __pfx_read_tsc+0x10/0x10 [ 15.795849] ? ktime_get_ts64+0x86/0x230 [ 15.795874] kunit_try_run_case+0x1a5/0x480 [ 15.795910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.795933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.795958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.796002] ? __kthread_parkme+0x82/0x180 [ 15.796025] ? preempt_count_sub+0x50/0x80 [ 15.796050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.796075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.796124] kthread+0x337/0x6f0 [ 15.796144] ? trace_preempt_on+0x20/0xc0 [ 15.796168] ? __pfx_kthread+0x10/0x10 [ 15.796189] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.796211] ? calculate_sigpending+0x7b/0xa0 [ 15.796236] ? __pfx_kthread+0x10/0x10 [ 15.796283] ret_from_fork+0x116/0x1d0 [ 15.796302] ? __pfx_kthread+0x10/0x10 [ 15.796323] ret_from_fork_asm+0x1a/0x30 [ 15.796356] </TASK> [ 15.796366] [ 15.803549] Allocated by task 282: [ 15.803754] kasan_save_stack+0x45/0x70 [ 15.803956] kasan_save_track+0x18/0x40 [ 15.804190] kasan_save_alloc_info+0x3b/0x50 [ 15.804378] __kasan_kmalloc+0xb7/0xc0 [ 15.804513] __kmalloc_cache_noprof+0x189/0x420 [ 15.804672] kasan_atomics+0x95/0x310 [ 15.804807] kunit_try_run_case+0x1a5/0x480 [ 15.805064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.805328] kthread+0x337/0x6f0 [ 15.805497] ret_from_fork+0x116/0x1d0 [ 15.805686] ret_from_fork_asm+0x1a/0x30 [ 15.805850] [ 15.805934] The buggy address belongs to the object at ffff8881029b7000 [ 15.805934] which belongs to the cache kmalloc-64 of size 64 [ 15.806362] The buggy address is located 0 bytes to the right of [ 15.806362] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.806939] [ 15.807062] The buggy address belongs to the physical page: [ 15.807269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.807511] flags: 0x200000000000000(node=0|zone=2) [ 15.807674] page_type: f5(slab) [ 15.807795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.808169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.808552] page dumped because: kasan: bad access detected [ 15.808827] [ 15.808933] Memory state around the buggy address: [ 15.809188] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.809541] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.809875] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.810190] ^ [ 15.810390] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.810689] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.811013] ================================================================== [ 14.686639] ================================================================== [ 14.687397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.688170] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.688720] [ 14.688850] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.688904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.688915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.688935] Call Trace: [ 14.688950] <TASK> [ 14.688999] dump_stack_lvl+0x73/0xb0 [ 14.689030] print_report+0xd1/0x610 [ 14.689053] ? __virt_addr_valid+0x1db/0x2d0 [ 14.689075] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.689096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.689118] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.689140] kasan_report+0x141/0x180 [ 14.689163] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.689190] __asan_report_load4_noabort+0x18/0x20 [ 14.689214] kasan_atomics_helper+0x4b88/0x5450 [ 14.689237] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.689260] ? kasan_save_alloc_info+0x3b/0x50 [ 14.689289] kasan_atomics+0x1dc/0x310 [ 14.689313] ? __pfx_kasan_atomics+0x10/0x10 [ 14.689337] ? __pfx_read_tsc+0x10/0x10 [ 14.689358] ? ktime_get_ts64+0x86/0x230 [ 14.689383] kunit_try_run_case+0x1a5/0x480 [ 14.689407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689429] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.689454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.689478] ? __kthread_parkme+0x82/0x180 [ 14.689499] ? preempt_count_sub+0x50/0x80 [ 14.689694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.689746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.689771] kthread+0x337/0x6f0 [ 14.689791] ? trace_preempt_on+0x20/0xc0 [ 14.689815] ? __pfx_kthread+0x10/0x10 [ 14.689836] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.689858] ? calculate_sigpending+0x7b/0xa0 [ 14.689882] ? __pfx_kthread+0x10/0x10 [ 14.689917] ret_from_fork+0x116/0x1d0 [ 14.689936] ? __pfx_kthread+0x10/0x10 [ 14.689956] ret_from_fork_asm+0x1a/0x30 [ 14.689989] </TASK> [ 14.690000] [ 14.702435] Allocated by task 282: [ 14.702750] kasan_save_stack+0x45/0x70 [ 14.702974] kasan_save_track+0x18/0x40 [ 14.703115] kasan_save_alloc_info+0x3b/0x50 [ 14.703342] __kasan_kmalloc+0xb7/0xc0 [ 14.703594] __kmalloc_cache_noprof+0x189/0x420 [ 14.703830] kasan_atomics+0x95/0x310 [ 14.704040] kunit_try_run_case+0x1a5/0x480 [ 14.704235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.704466] kthread+0x337/0x6f0 [ 14.704732] ret_from_fork+0x116/0x1d0 [ 14.704919] ret_from_fork_asm+0x1a/0x30 [ 14.705212] [ 14.705296] The buggy address belongs to the object at ffff8881029b7000 [ 14.705296] which belongs to the cache kmalloc-64 of size 64 [ 14.705947] The buggy address is located 0 bytes to the right of [ 14.705947] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.706572] [ 14.706650] The buggy address belongs to the physical page: [ 14.706909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.707258] flags: 0x200000000000000(node=0|zone=2) [ 14.707426] page_type: f5(slab) [ 14.707551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.708155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.708507] page dumped because: kasan: bad access detected [ 14.708768] [ 14.708868] Memory state around the buggy address: [ 14.709116] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.709373] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.709614] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.710151] ^ [ 14.710714] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711010] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711331] ================================================================== [ 15.262214] ================================================================== [ 15.262641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.263038] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.263370] [ 15.263483] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.263624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.263638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.263660] Call Trace: [ 15.263675] <TASK> [ 15.263690] dump_stack_lvl+0x73/0xb0 [ 15.263719] print_report+0xd1/0x610 [ 15.263741] ? __virt_addr_valid+0x1db/0x2d0 [ 15.263765] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.263786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.263810] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.263834] kasan_report+0x141/0x180 [ 15.263867] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.263914] __asan_report_load4_noabort+0x18/0x20 [ 15.263940] kasan_atomics_helper+0x4a1c/0x5450 [ 15.263964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.263989] ? kasan_save_alloc_info+0x3b/0x50 [ 15.264019] kasan_atomics+0x1dc/0x310 [ 15.264063] ? __pfx_kasan_atomics+0x10/0x10 [ 15.264089] ? __pfx_read_tsc+0x10/0x10 [ 15.264109] ? ktime_get_ts64+0x86/0x230 [ 15.264135] kunit_try_run_case+0x1a5/0x480 [ 15.264159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.264182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.264208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.264233] ? __kthread_parkme+0x82/0x180 [ 15.264254] ? preempt_count_sub+0x50/0x80 [ 15.264278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.264303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.264337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.264362] kthread+0x337/0x6f0 [ 15.264382] ? trace_preempt_on+0x20/0xc0 [ 15.264417] ? __pfx_kthread+0x10/0x10 [ 15.264439] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.264461] ? calculate_sigpending+0x7b/0xa0 [ 15.264497] ? __pfx_kthread+0x10/0x10 [ 15.264586] ret_from_fork+0x116/0x1d0 [ 15.264608] ? __pfx_kthread+0x10/0x10 [ 15.264629] ret_from_fork_asm+0x1a/0x30 [ 15.264663] </TASK> [ 15.264674] [ 15.272958] Allocated by task 282: [ 15.273537] kasan_save_stack+0x45/0x70 [ 15.273734] kasan_save_track+0x18/0x40 [ 15.274949] kasan_save_alloc_info+0x3b/0x50 [ 15.275145] __kasan_kmalloc+0xb7/0xc0 [ 15.275281] __kmalloc_cache_noprof+0x189/0x420 [ 15.275557] kasan_atomics+0x95/0x310 [ 15.275789] kunit_try_run_case+0x1a5/0x480 [ 15.275947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.276393] kthread+0x337/0x6f0 [ 15.276824] ret_from_fork+0x116/0x1d0 [ 15.277024] ret_from_fork_asm+0x1a/0x30 [ 15.277166] [ 15.277241] The buggy address belongs to the object at ffff8881029b7000 [ 15.277241] which belongs to the cache kmalloc-64 of size 64 [ 15.278321] The buggy address is located 0 bytes to the right of [ 15.278321] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.279693] [ 15.279886] The buggy address belongs to the physical page: [ 15.280508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.280882] flags: 0x200000000000000(node=0|zone=2) [ 15.281417] page_type: f5(slab) [ 15.281780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.282320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.282558] page dumped because: kasan: bad access detected [ 15.283176] [ 15.283352] Memory state around the buggy address: [ 15.283872] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.284546] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.285066] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.285585] ^ [ 15.286121] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.286426] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.287162] ================================================================== [ 15.064447] ================================================================== [ 15.064870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.065243] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.065571] [ 15.065708] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.065765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.065778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.065800] Call Trace: [ 15.065818] <TASK> [ 15.065834] dump_stack_lvl+0x73/0xb0 [ 15.065864] print_report+0xd1/0x610 [ 15.065888] ? __virt_addr_valid+0x1db/0x2d0 [ 15.065922] ? kasan_atomics_helper+0xc70/0x5450 [ 15.065944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.065987] ? kasan_atomics_helper+0xc70/0x5450 [ 15.066010] kasan_report+0x141/0x180 [ 15.066033] ? kasan_atomics_helper+0xc70/0x5450 [ 15.066071] kasan_check_range+0x10c/0x1c0 [ 15.066096] __kasan_check_write+0x18/0x20 [ 15.066116] kasan_atomics_helper+0xc70/0x5450 [ 15.066151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.066176] ? kasan_save_alloc_info+0x3b/0x50 [ 15.066207] kasan_atomics+0x1dc/0x310 [ 15.066232] ? __pfx_kasan_atomics+0x10/0x10 [ 15.066258] ? __pfx_read_tsc+0x10/0x10 [ 15.066280] ? ktime_get_ts64+0x86/0x230 [ 15.066306] kunit_try_run_case+0x1a5/0x480 [ 15.066332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066355] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.066381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.066406] ? __kthread_parkme+0x82/0x180 [ 15.066428] ? preempt_count_sub+0x50/0x80 [ 15.066461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.066574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.066604] kthread+0x337/0x6f0 [ 15.066636] ? trace_preempt_on+0x20/0xc0 [ 15.066662] ? __pfx_kthread+0x10/0x10 [ 15.066683] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.066718] ? calculate_sigpending+0x7b/0xa0 [ 15.066743] ? __pfx_kthread+0x10/0x10 [ 15.066771] ret_from_fork+0x116/0x1d0 [ 15.066791] ? __pfx_kthread+0x10/0x10 [ 15.066813] ret_from_fork_asm+0x1a/0x30 [ 15.066854] </TASK> [ 15.066866] [ 15.075297] Allocated by task 282: [ 15.075466] kasan_save_stack+0x45/0x70 [ 15.075874] kasan_save_track+0x18/0x40 [ 15.076043] kasan_save_alloc_info+0x3b/0x50 [ 15.076237] __kasan_kmalloc+0xb7/0xc0 [ 15.076499] __kmalloc_cache_noprof+0x189/0x420 [ 15.076796] kasan_atomics+0x95/0x310 [ 15.077024] kunit_try_run_case+0x1a5/0x480 [ 15.077210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.077472] kthread+0x337/0x6f0 [ 15.077712] ret_from_fork+0x116/0x1d0 [ 15.077923] ret_from_fork_asm+0x1a/0x30 [ 15.078115] [ 15.078243] The buggy address belongs to the object at ffff8881029b7000 [ 15.078243] which belongs to the cache kmalloc-64 of size 64 [ 15.078732] The buggy address is located 0 bytes to the right of [ 15.078732] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.079174] [ 15.079287] The buggy address belongs to the physical page: [ 15.079546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.079921] flags: 0x200000000000000(node=0|zone=2) [ 15.080167] page_type: f5(slab) [ 15.080337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.080953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.081277] page dumped because: kasan: bad access detected [ 15.081453] [ 15.081593] Memory state around the buggy address: [ 15.081841] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.082232] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.082555] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.082791] ^ [ 15.082980] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.083301] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.083770] ================================================================== [ 15.156977] ================================================================== [ 15.157293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.157979] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.158548] [ 15.158639] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.158683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.158695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.158717] Call Trace: [ 15.158735] <TASK> [ 15.158751] dump_stack_lvl+0x73/0xb0 [ 15.158786] print_report+0xd1/0x610 [ 15.158808] ? __virt_addr_valid+0x1db/0x2d0 [ 15.158832] ? kasan_atomics_helper+0xe78/0x5450 [ 15.158853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.158877] ? kasan_atomics_helper+0xe78/0x5450 [ 15.159020] kasan_report+0x141/0x180 [ 15.159059] ? kasan_atomics_helper+0xe78/0x5450 [ 15.159088] kasan_check_range+0x10c/0x1c0 [ 15.159126] __kasan_check_write+0x18/0x20 [ 15.159146] kasan_atomics_helper+0xe78/0x5450 [ 15.159170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.159195] ? kasan_save_alloc_info+0x3b/0x50 [ 15.159226] kasan_atomics+0x1dc/0x310 [ 15.159258] ? __pfx_kasan_atomics+0x10/0x10 [ 15.159284] ? __pfx_read_tsc+0x10/0x10 [ 15.159306] ? ktime_get_ts64+0x86/0x230 [ 15.159342] kunit_try_run_case+0x1a5/0x480 [ 15.159367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.159416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.159441] ? __kthread_parkme+0x82/0x180 [ 15.159462] ? preempt_count_sub+0x50/0x80 [ 15.159487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.159601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.159627] kthread+0x337/0x6f0 [ 15.159647] ? trace_preempt_on+0x20/0xc0 [ 15.159671] ? __pfx_kthread+0x10/0x10 [ 15.159693] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.159716] ? calculate_sigpending+0x7b/0xa0 [ 15.159740] ? __pfx_kthread+0x10/0x10 [ 15.159763] ret_from_fork+0x116/0x1d0 [ 15.159783] ? __pfx_kthread+0x10/0x10 [ 15.159804] ret_from_fork_asm+0x1a/0x30 [ 15.159838] </TASK> [ 15.159849] [ 15.171948] Allocated by task 282: [ 15.172179] kasan_save_stack+0x45/0x70 [ 15.172388] kasan_save_track+0x18/0x40 [ 15.172567] kasan_save_alloc_info+0x3b/0x50 [ 15.172722] __kasan_kmalloc+0xb7/0xc0 [ 15.172858] __kmalloc_cache_noprof+0x189/0x420 [ 15.173308] kasan_atomics+0x95/0x310 [ 15.173607] kunit_try_run_case+0x1a5/0x480 [ 15.173825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.174139] kthread+0x337/0x6f0 [ 15.174313] ret_from_fork+0x116/0x1d0 [ 15.174454] ret_from_fork_asm+0x1a/0x30 [ 15.174770] [ 15.174886] The buggy address belongs to the object at ffff8881029b7000 [ 15.174886] which belongs to the cache kmalloc-64 of size 64 [ 15.175449] The buggy address is located 0 bytes to the right of [ 15.175449] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.176048] [ 15.176179] The buggy address belongs to the physical page: [ 15.176405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.176916] flags: 0x200000000000000(node=0|zone=2) [ 15.177091] page_type: f5(slab) [ 15.177303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.177673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.177982] page dumped because: kasan: bad access detected [ 15.178226] [ 15.178321] Memory state around the buggy address: [ 15.178548] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.178824] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179399] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.179809] ^ [ 15.180063] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180376] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180961] ================================================================== [ 14.808618] ================================================================== [ 14.809210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.809645] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.809960] [ 14.810047] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.810090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.810103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.810124] Call Trace: [ 14.810140] <TASK> [ 14.810158] dump_stack_lvl+0x73/0xb0 [ 14.810186] print_report+0xd1/0x610 [ 14.810210] ? __virt_addr_valid+0x1db/0x2d0 [ 14.810234] ? kasan_atomics_helper+0x565/0x5450 [ 14.810257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.810281] ? kasan_atomics_helper+0x565/0x5450 [ 14.810305] kasan_report+0x141/0x180 [ 14.810328] ? kasan_atomics_helper+0x565/0x5450 [ 14.810356] kasan_check_range+0x10c/0x1c0 [ 14.810381] __kasan_check_write+0x18/0x20 [ 14.810463] kasan_atomics_helper+0x565/0x5450 [ 14.810489] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.810514] ? kasan_save_alloc_info+0x3b/0x50 [ 14.810545] kasan_atomics+0x1dc/0x310 [ 14.810569] ? __pfx_kasan_atomics+0x10/0x10 [ 14.810595] ? __pfx_read_tsc+0x10/0x10 [ 14.810617] ? ktime_get_ts64+0x86/0x230 [ 14.810643] kunit_try_run_case+0x1a5/0x480 [ 14.810669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.810692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.810717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.810742] ? __kthread_parkme+0x82/0x180 [ 14.810770] ? preempt_count_sub+0x50/0x80 [ 14.810796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.810821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.810847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.810871] kthread+0x337/0x6f0 [ 14.810952] ? trace_preempt_on+0x20/0xc0 [ 14.810977] ? __pfx_kthread+0x10/0x10 [ 14.811006] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.811030] ? calculate_sigpending+0x7b/0xa0 [ 14.811055] ? __pfx_kthread+0x10/0x10 [ 14.811077] ret_from_fork+0x116/0x1d0 [ 14.811097] ? __pfx_kthread+0x10/0x10 [ 14.811118] ret_from_fork_asm+0x1a/0x30 [ 14.811152] </TASK> [ 14.811163] [ 14.819835] Allocated by task 282: [ 14.820077] kasan_save_stack+0x45/0x70 [ 14.820249] kasan_save_track+0x18/0x40 [ 14.820385] kasan_save_alloc_info+0x3b/0x50 [ 14.820586] __kasan_kmalloc+0xb7/0xc0 [ 14.820781] __kmalloc_cache_noprof+0x189/0x420 [ 14.821051] kasan_atomics+0x95/0x310 [ 14.821241] kunit_try_run_case+0x1a5/0x480 [ 14.821450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.821909] kthread+0x337/0x6f0 [ 14.822174] ret_from_fork+0x116/0x1d0 [ 14.822312] ret_from_fork_asm+0x1a/0x30 [ 14.822453] [ 14.822526] The buggy address belongs to the object at ffff8881029b7000 [ 14.822526] which belongs to the cache kmalloc-64 of size 64 [ 14.822900] The buggy address is located 0 bytes to the right of [ 14.822900] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.823448] [ 14.823547] The buggy address belongs to the physical page: [ 14.824075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.824445] flags: 0x200000000000000(node=0|zone=2) [ 14.824841] page_type: f5(slab) [ 14.825004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.825270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.825498] page dumped because: kasan: bad access detected [ 14.826073] [ 14.826169] Memory state around the buggy address: [ 14.826393] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826680] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.827153] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.827434] ^ [ 14.827723] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.828069] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.828339] ================================================================== [ 15.866142] ================================================================== [ 15.866606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.866853] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.867121] [ 15.867207] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.867249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.867262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.867284] Call Trace: [ 15.867299] <TASK> [ 15.867316] dump_stack_lvl+0x73/0xb0 [ 15.867387] print_report+0xd1/0x610 [ 15.867437] ? __virt_addr_valid+0x1db/0x2d0 [ 15.867461] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.867484] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.867509] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.867532] kasan_report+0x141/0x180 [ 15.867555] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.867583] kasan_check_range+0x10c/0x1c0 [ 15.867642] __kasan_check_write+0x18/0x20 [ 15.867662] kasan_atomics_helper+0x1f43/0x5450 [ 15.867686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.867710] ? kasan_save_alloc_info+0x3b/0x50 [ 15.867741] kasan_atomics+0x1dc/0x310 [ 15.867796] ? __pfx_kasan_atomics+0x10/0x10 [ 15.867821] ? __pfx_read_tsc+0x10/0x10 [ 15.867842] ? ktime_get_ts64+0x86/0x230 [ 15.867867] kunit_try_run_case+0x1a5/0x480 [ 15.867903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.867953] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.868005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.868030] ? __kthread_parkme+0x82/0x180 [ 15.868052] ? preempt_count_sub+0x50/0x80 [ 15.868077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.868133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.868159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.868184] kthread+0x337/0x6f0 [ 15.868204] ? trace_preempt_on+0x20/0xc0 [ 15.868229] ? __pfx_kthread+0x10/0x10 [ 15.868250] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.868272] ? calculate_sigpending+0x7b/0xa0 [ 15.868322] ? __pfx_kthread+0x10/0x10 [ 15.868345] ret_from_fork+0x116/0x1d0 [ 15.868364] ? __pfx_kthread+0x10/0x10 [ 15.868384] ret_from_fork_asm+0x1a/0x30 [ 15.868417] </TASK> [ 15.868428] [ 15.876565] Allocated by task 282: [ 15.876739] kasan_save_stack+0x45/0x70 [ 15.876952] kasan_save_track+0x18/0x40 [ 15.877175] kasan_save_alloc_info+0x3b/0x50 [ 15.877379] __kasan_kmalloc+0xb7/0xc0 [ 15.877602] __kmalloc_cache_noprof+0x189/0x420 [ 15.877818] kasan_atomics+0x95/0x310 [ 15.878073] kunit_try_run_case+0x1a5/0x480 [ 15.878307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.878571] kthread+0x337/0x6f0 [ 15.878729] ret_from_fork+0x116/0x1d0 [ 15.878872] ret_from_fork_asm+0x1a/0x30 [ 15.879107] [ 15.879207] The buggy address belongs to the object at ffff8881029b7000 [ 15.879207] which belongs to the cache kmalloc-64 of size 64 [ 15.879740] The buggy address is located 0 bytes to the right of [ 15.879740] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.880286] [ 15.880370] The buggy address belongs to the physical page: [ 15.880685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.881108] flags: 0x200000000000000(node=0|zone=2) [ 15.881319] page_type: f5(slab) [ 15.881478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.881717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.881960] page dumped because: kasan: bad access detected [ 15.882267] [ 15.882363] Memory state around the buggy address: [ 15.882617] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.882998] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.883325] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.883641] ^ [ 15.883800] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.884060] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.884420] ================================================================== [ 15.885224] ================================================================== [ 15.885672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.886133] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.886446] [ 15.886537] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.886580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.886592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.886614] Call Trace: [ 15.886629] <TASK> [ 15.886644] dump_stack_lvl+0x73/0xb0 [ 15.886709] print_report+0xd1/0x610 [ 15.886736] ? __virt_addr_valid+0x1db/0x2d0 [ 15.886759] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.886812] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.886835] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.886859] kasan_report+0x141/0x180 [ 15.886882] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.886920] __asan_report_load8_noabort+0x18/0x20 [ 15.886995] kasan_atomics_helper+0x4f71/0x5450 [ 15.887022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.887046] ? kasan_save_alloc_info+0x3b/0x50 [ 15.887077] kasan_atomics+0x1dc/0x310 [ 15.887102] ? __pfx_kasan_atomics+0x10/0x10 [ 15.887128] ? __pfx_read_tsc+0x10/0x10 [ 15.887150] ? ktime_get_ts64+0x86/0x230 [ 15.887175] kunit_try_run_case+0x1a5/0x480 [ 15.887200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.887224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.887249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.887274] ? __kthread_parkme+0x82/0x180 [ 15.887295] ? preempt_count_sub+0x50/0x80 [ 15.887320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.887345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.887369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.887394] kthread+0x337/0x6f0 [ 15.887414] ? trace_preempt_on+0x20/0xc0 [ 15.887437] ? __pfx_kthread+0x10/0x10 [ 15.887458] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.887480] ? calculate_sigpending+0x7b/0xa0 [ 15.887505] ? __pfx_kthread+0x10/0x10 [ 15.887527] ret_from_fork+0x116/0x1d0 [ 15.887546] ? __pfx_kthread+0x10/0x10 [ 15.887567] ret_from_fork_asm+0x1a/0x30 [ 15.887600] </TASK> [ 15.887611] [ 15.895056] Allocated by task 282: [ 15.895276] kasan_save_stack+0x45/0x70 [ 15.895481] kasan_save_track+0x18/0x40 [ 15.895698] kasan_save_alloc_info+0x3b/0x50 [ 15.895933] __kasan_kmalloc+0xb7/0xc0 [ 15.896172] __kmalloc_cache_noprof+0x189/0x420 [ 15.896426] kasan_atomics+0x95/0x310 [ 15.896607] kunit_try_run_case+0x1a5/0x480 [ 15.896837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.897162] kthread+0x337/0x6f0 [ 15.897337] ret_from_fork+0x116/0x1d0 [ 15.897531] ret_from_fork_asm+0x1a/0x30 [ 15.897748] [ 15.897847] The buggy address belongs to the object at ffff8881029b7000 [ 15.897847] which belongs to the cache kmalloc-64 of size 64 [ 15.898418] The buggy address is located 0 bytes to the right of [ 15.898418] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.899009] [ 15.899141] The buggy address belongs to the physical page: [ 15.899403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.899732] flags: 0x200000000000000(node=0|zone=2) [ 15.899916] page_type: f5(slab) [ 15.900151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.900525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.900847] page dumped because: kasan: bad access detected [ 15.901057] [ 15.901143] Memory state around the buggy address: [ 15.901440] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.901818] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.902180] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.902450] ^ [ 15.902744] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.903092] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.903400] ================================================================== [ 15.513211] ================================================================== [ 15.513684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.514171] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.514473] [ 15.514748] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.514805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.514818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.515087] Call Trace: [ 15.515111] <TASK> [ 15.515131] dump_stack_lvl+0x73/0xb0 [ 15.515165] print_report+0xd1/0x610 [ 15.515188] ? __virt_addr_valid+0x1db/0x2d0 [ 15.515250] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.515274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.515299] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.515323] kasan_report+0x141/0x180 [ 15.515346] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.515375] __asan_report_store8_noabort+0x1b/0x30 [ 15.515401] kasan_atomics_helper+0x50d4/0x5450 [ 15.515425] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.515450] ? kasan_save_alloc_info+0x3b/0x50 [ 15.515480] kasan_atomics+0x1dc/0x310 [ 15.515504] ? __pfx_kasan_atomics+0x10/0x10 [ 15.515529] ? __pfx_read_tsc+0x10/0x10 [ 15.515552] ? ktime_get_ts64+0x86/0x230 [ 15.515577] kunit_try_run_case+0x1a5/0x480 [ 15.515602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.515626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.515652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.515676] ? __kthread_parkme+0x82/0x180 [ 15.515698] ? preempt_count_sub+0x50/0x80 [ 15.515724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.515749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.515773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.515798] kthread+0x337/0x6f0 [ 15.515819] ? trace_preempt_on+0x20/0xc0 [ 15.515843] ? __pfx_kthread+0x10/0x10 [ 15.515864] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.515886] ? calculate_sigpending+0x7b/0xa0 [ 15.515922] ? __pfx_kthread+0x10/0x10 [ 15.515944] ret_from_fork+0x116/0x1d0 [ 15.515963] ? __pfx_kthread+0x10/0x10 [ 15.515984] ret_from_fork_asm+0x1a/0x30 [ 15.516017] </TASK> [ 15.516028] [ 15.523913] Allocated by task 282: [ 15.524266] kasan_save_stack+0x45/0x70 [ 15.525312] kasan_save_track+0x18/0x40 [ 15.525977] kasan_save_alloc_info+0x3b/0x50 [ 15.526171] __kasan_kmalloc+0xb7/0xc0 [ 15.526311] __kmalloc_cache_noprof+0x189/0x420 [ 15.526790] kasan_atomics+0x95/0x310 [ 15.527306] kunit_try_run_case+0x1a5/0x480 [ 15.527659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.527948] kthread+0x337/0x6f0 [ 15.528369] ret_from_fork+0x116/0x1d0 [ 15.528646] ret_from_fork_asm+0x1a/0x30 [ 15.528800] [ 15.528904] The buggy address belongs to the object at ffff8881029b7000 [ 15.528904] which belongs to the cache kmalloc-64 of size 64 [ 15.530224] The buggy address is located 0 bytes to the right of [ 15.530224] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.531338] [ 15.531592] The buggy address belongs to the physical page: [ 15.532060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.532618] flags: 0x200000000000000(node=0|zone=2) [ 15.533234] page_type: f5(slab) [ 15.533469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.534145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.534454] page dumped because: kasan: bad access detected [ 15.534955] [ 15.535241] Memory state around the buggy address: [ 15.535465] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.535937] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.536478] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.536944] ^ [ 15.537498] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.537937] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.538408] ================================================================== [ 15.961620] ================================================================== [ 15.961964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.962482] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.962881] [ 15.963024] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.963104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.963120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.963142] Call Trace: [ 15.963157] <TASK> [ 15.963172] dump_stack_lvl+0x73/0xb0 [ 15.963201] print_report+0xd1/0x610 [ 15.963224] ? __virt_addr_valid+0x1db/0x2d0 [ 15.963248] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.963270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.963294] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.963318] kasan_report+0x141/0x180 [ 15.963341] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.963402] __asan_report_load8_noabort+0x18/0x20 [ 15.963428] kasan_atomics_helper+0x4fb2/0x5450 [ 15.963452] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.963477] ? kasan_save_alloc_info+0x3b/0x50 [ 15.963535] kasan_atomics+0x1dc/0x310 [ 15.963560] ? __pfx_kasan_atomics+0x10/0x10 [ 15.963585] ? __pfx_read_tsc+0x10/0x10 [ 15.963607] ? ktime_get_ts64+0x86/0x230 [ 15.963633] kunit_try_run_case+0x1a5/0x480 [ 15.963689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963713] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.963738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.963763] ? __kthread_parkme+0x82/0x180 [ 15.963784] ? preempt_count_sub+0x50/0x80 [ 15.963843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.963929] kthread+0x337/0x6f0 [ 15.963949] ? trace_preempt_on+0x20/0xc0 [ 15.964044] ? __pfx_kthread+0x10/0x10 [ 15.964089] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.964158] ? calculate_sigpending+0x7b/0xa0 [ 15.964184] ? __pfx_kthread+0x10/0x10 [ 15.964206] ret_from_fork+0x116/0x1d0 [ 15.964226] ? __pfx_kthread+0x10/0x10 [ 15.964248] ret_from_fork_asm+0x1a/0x30 [ 15.964281] </TASK> [ 15.964292] [ 15.972281] Allocated by task 282: [ 15.972431] kasan_save_stack+0x45/0x70 [ 15.972579] kasan_save_track+0x18/0x40 [ 15.972716] kasan_save_alloc_info+0x3b/0x50 [ 15.972942] __kasan_kmalloc+0xb7/0xc0 [ 15.973111] __kmalloc_cache_noprof+0x189/0x420 [ 15.973512] kasan_atomics+0x95/0x310 [ 15.973705] kunit_try_run_case+0x1a5/0x480 [ 15.973923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.974203] kthread+0x337/0x6f0 [ 15.974374] ret_from_fork+0x116/0x1d0 [ 15.974562] ret_from_fork_asm+0x1a/0x30 [ 15.974730] [ 15.974809] The buggy address belongs to the object at ffff8881029b7000 [ 15.974809] which belongs to the cache kmalloc-64 of size 64 [ 15.975204] The buggy address is located 0 bytes to the right of [ 15.975204] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.975827] [ 15.975964] The buggy address belongs to the physical page: [ 15.976277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.976667] flags: 0x200000000000000(node=0|zone=2) [ 15.976834] page_type: f5(slab) [ 15.977077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.977446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.977791] page dumped because: kasan: bad access detected [ 15.978092] [ 15.978188] Memory state around the buggy address: [ 15.978415] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.978730] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.979125] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.979418] ^ [ 15.979596] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.979813] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.980124] ================================================================== [ 15.578004] ================================================================== [ 15.578343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.578721] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.579166] [ 15.579264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.579306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.579318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.579340] Call Trace: [ 15.579354] <TASK> [ 15.579369] dump_stack_lvl+0x73/0xb0 [ 15.579397] print_report+0xd1/0x610 [ 15.579419] ? __virt_addr_valid+0x1db/0x2d0 [ 15.579443] ? kasan_atomics_helper+0x164f/0x5450 [ 15.579466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.579490] ? kasan_atomics_helper+0x164f/0x5450 [ 15.579513] kasan_report+0x141/0x180 [ 15.579536] ? kasan_atomics_helper+0x164f/0x5450 [ 15.579564] kasan_check_range+0x10c/0x1c0 [ 15.579589] __kasan_check_write+0x18/0x20 [ 15.579609] kasan_atomics_helper+0x164f/0x5450 [ 15.579633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.579657] ? kasan_save_alloc_info+0x3b/0x50 [ 15.579688] kasan_atomics+0x1dc/0x310 [ 15.579713] ? __pfx_kasan_atomics+0x10/0x10 [ 15.579738] ? __pfx_read_tsc+0x10/0x10 [ 15.579759] ? ktime_get_ts64+0x86/0x230 [ 15.579784] kunit_try_run_case+0x1a5/0x480 [ 15.579809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.579831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.579858] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.579883] ? __kthread_parkme+0x82/0x180 [ 15.579915] ? preempt_count_sub+0x50/0x80 [ 15.579940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.579965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.580001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.580027] kthread+0x337/0x6f0 [ 15.580046] ? trace_preempt_on+0x20/0xc0 [ 15.580071] ? __pfx_kthread+0x10/0x10 [ 15.580091] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.580114] ? calculate_sigpending+0x7b/0xa0 [ 15.580139] ? __pfx_kthread+0x10/0x10 [ 15.580161] ret_from_fork+0x116/0x1d0 [ 15.580181] ? __pfx_kthread+0x10/0x10 [ 15.580202] ret_from_fork_asm+0x1a/0x30 [ 15.580235] </TASK> [ 15.580246] [ 15.587357] Allocated by task 282: [ 15.587542] kasan_save_stack+0x45/0x70 [ 15.587748] kasan_save_track+0x18/0x40 [ 15.588099] kasan_save_alloc_info+0x3b/0x50 [ 15.588285] __kasan_kmalloc+0xb7/0xc0 [ 15.588421] __kmalloc_cache_noprof+0x189/0x420 [ 15.588579] kasan_atomics+0x95/0x310 [ 15.588715] kunit_try_run_case+0x1a5/0x480 [ 15.588869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.589059] kthread+0x337/0x6f0 [ 15.589183] ret_from_fork+0x116/0x1d0 [ 15.589315] ret_from_fork_asm+0x1a/0x30 [ 15.589455] [ 15.589533] The buggy address belongs to the object at ffff8881029b7000 [ 15.589533] which belongs to the cache kmalloc-64 of size 64 [ 15.590123] The buggy address is located 0 bytes to the right of [ 15.590123] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.590685] [ 15.590785] The buggy address belongs to the physical page: [ 15.591128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.591476] flags: 0x200000000000000(node=0|zone=2) [ 15.591639] page_type: f5(slab) [ 15.591760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.592138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.592482] page dumped because: kasan: bad access detected [ 15.592738] [ 15.592835] Memory state around the buggy address: [ 15.593095] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.593375] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.593626] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.593840] ^ [ 15.594007] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.594224] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.594545] ================================================================== [ 15.846657] ================================================================== [ 15.847158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.847628] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.848121] [ 15.848234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.848279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.848292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.848313] Call Trace: [ 15.848329] <TASK> [ 15.848345] dump_stack_lvl+0x73/0xb0 [ 15.848374] print_report+0xd1/0x610 [ 15.848398] ? __virt_addr_valid+0x1db/0x2d0 [ 15.848423] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.848445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.848469] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.848493] kasan_report+0x141/0x180 [ 15.848517] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.848546] kasan_check_range+0x10c/0x1c0 [ 15.848571] __kasan_check_write+0x18/0x20 [ 15.848592] kasan_atomics_helper+0x1eaa/0x5450 [ 15.848617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.848641] ? kasan_save_alloc_info+0x3b/0x50 [ 15.848672] kasan_atomics+0x1dc/0x310 [ 15.848697] ? __pfx_kasan_atomics+0x10/0x10 [ 15.848722] ? __pfx_read_tsc+0x10/0x10 [ 15.848744] ? ktime_get_ts64+0x86/0x230 [ 15.848770] kunit_try_run_case+0x1a5/0x480 [ 15.848795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.848819] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.848844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.848870] ? __kthread_parkme+0x82/0x180 [ 15.848902] ? preempt_count_sub+0x50/0x80 [ 15.848963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.849066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.849116] kthread+0x337/0x6f0 [ 15.849138] ? trace_preempt_on+0x20/0xc0 [ 15.849184] ? __pfx_kthread+0x10/0x10 [ 15.849206] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.849229] ? calculate_sigpending+0x7b/0xa0 [ 15.849256] ? __pfx_kthread+0x10/0x10 [ 15.849277] ret_from_fork+0x116/0x1d0 [ 15.849297] ? __pfx_kthread+0x10/0x10 [ 15.849318] ret_from_fork_asm+0x1a/0x30 [ 15.849352] </TASK> [ 15.849363] [ 15.857293] Allocated by task 282: [ 15.857467] kasan_save_stack+0x45/0x70 [ 15.857668] kasan_save_track+0x18/0x40 [ 15.857856] kasan_save_alloc_info+0x3b/0x50 [ 15.858096] __kasan_kmalloc+0xb7/0xc0 [ 15.858280] __kmalloc_cache_noprof+0x189/0x420 [ 15.858528] kasan_atomics+0x95/0x310 [ 15.858716] kunit_try_run_case+0x1a5/0x480 [ 15.858943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.859220] kthread+0x337/0x6f0 [ 15.859388] ret_from_fork+0x116/0x1d0 [ 15.859600] ret_from_fork_asm+0x1a/0x30 [ 15.859790] [ 15.859866] The buggy address belongs to the object at ffff8881029b7000 [ 15.859866] which belongs to the cache kmalloc-64 of size 64 [ 15.860389] The buggy address is located 0 bytes to the right of [ 15.860389] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.860993] [ 15.861124] The buggy address belongs to the physical page: [ 15.861380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.861733] flags: 0x200000000000000(node=0|zone=2) [ 15.862012] page_type: f5(slab) [ 15.862182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.862516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.862885] page dumped because: kasan: bad access detected [ 15.863137] [ 15.863208] Memory state around the buggy address: [ 15.863359] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.863639] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864014] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.864326] ^ [ 15.864524] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864742] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.865094] ================================================================== [ 15.342769] ================================================================== [ 15.343363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.343801] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.344189] [ 15.344286] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.344328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.344340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.344361] Call Trace: [ 15.344375] <TASK> [ 15.344391] dump_stack_lvl+0x73/0xb0 [ 15.344418] print_report+0xd1/0x610 [ 15.344441] ? __virt_addr_valid+0x1db/0x2d0 [ 15.344464] ? kasan_atomics_helper+0x1217/0x5450 [ 15.344486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.344510] ? kasan_atomics_helper+0x1217/0x5450 [ 15.344554] kasan_report+0x141/0x180 [ 15.344578] ? kasan_atomics_helper+0x1217/0x5450 [ 15.344606] kasan_check_range+0x10c/0x1c0 [ 15.344631] __kasan_check_write+0x18/0x20 [ 15.344651] kasan_atomics_helper+0x1217/0x5450 [ 15.344675] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.344700] ? kasan_save_alloc_info+0x3b/0x50 [ 15.344731] kasan_atomics+0x1dc/0x310 [ 15.344755] ? __pfx_kasan_atomics+0x10/0x10 [ 15.344781] ? __pfx_read_tsc+0x10/0x10 [ 15.344802] ? ktime_get_ts64+0x86/0x230 [ 15.344827] kunit_try_run_case+0x1a5/0x480 [ 15.344852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.344876] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.344912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.344937] ? __kthread_parkme+0x82/0x180 [ 15.344958] ? preempt_count_sub+0x50/0x80 [ 15.344984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.345009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.345034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.345059] kthread+0x337/0x6f0 [ 15.345079] ? trace_preempt_on+0x20/0xc0 [ 15.345103] ? __pfx_kthread+0x10/0x10 [ 15.345124] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.345147] ? calculate_sigpending+0x7b/0xa0 [ 15.345182] ? __pfx_kthread+0x10/0x10 [ 15.345205] ret_from_fork+0x116/0x1d0 [ 15.345224] ? __pfx_kthread+0x10/0x10 [ 15.345246] ret_from_fork_asm+0x1a/0x30 [ 15.345278] </TASK> [ 15.345290] [ 15.353449] Allocated by task 282: [ 15.353628] kasan_save_stack+0x45/0x70 [ 15.353919] kasan_save_track+0x18/0x40 [ 15.354285] kasan_save_alloc_info+0x3b/0x50 [ 15.354486] __kasan_kmalloc+0xb7/0xc0 [ 15.354651] __kmalloc_cache_noprof+0x189/0x420 [ 15.354918] kasan_atomics+0x95/0x310 [ 15.355062] kunit_try_run_case+0x1a5/0x480 [ 15.355212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.355389] kthread+0x337/0x6f0 [ 15.355510] ret_from_fork+0x116/0x1d0 [ 15.355819] ret_from_fork_asm+0x1a/0x30 [ 15.356142] [ 15.356242] The buggy address belongs to the object at ffff8881029b7000 [ 15.356242] which belongs to the cache kmalloc-64 of size 64 [ 15.356723] The buggy address is located 0 bytes to the right of [ 15.356723] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.357458] [ 15.357564] The buggy address belongs to the physical page: [ 15.357786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.358215] flags: 0x200000000000000(node=0|zone=2) [ 15.358518] page_type: f5(slab) [ 15.358802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.359129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.359437] page dumped because: kasan: bad access detected [ 15.359724] [ 15.359820] Memory state around the buggy address: [ 15.360094] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360383] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360785] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.361099] ^ [ 15.361297] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361607] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361974] ================================================================== [ 15.659936] ================================================================== [ 15.660324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.660841] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.661239] [ 15.661362] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.661405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.661417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.661450] Call Trace: [ 15.661466] <TASK> [ 15.661481] dump_stack_lvl+0x73/0xb0 [ 15.661510] print_report+0xd1/0x610 [ 15.661533] ? __virt_addr_valid+0x1db/0x2d0 [ 15.661565] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.661588] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.661612] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.661645] kasan_report+0x141/0x180 [ 15.661669] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.661697] kasan_check_range+0x10c/0x1c0 [ 15.661730] __kasan_check_write+0x18/0x20 [ 15.661750] kasan_atomics_helper+0x18b1/0x5450 [ 15.661774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.661810] ? kasan_save_alloc_info+0x3b/0x50 [ 15.661840] kasan_atomics+0x1dc/0x310 [ 15.661865] ? __pfx_kasan_atomics+0x10/0x10 [ 15.661907] ? __pfx_read_tsc+0x10/0x10 [ 15.661929] ? ktime_get_ts64+0x86/0x230 [ 15.661954] kunit_try_run_case+0x1a5/0x480 [ 15.662005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.662067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.662100] ? __kthread_parkme+0x82/0x180 [ 15.662121] ? preempt_count_sub+0x50/0x80 [ 15.662146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.662206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.662232] kthread+0x337/0x6f0 [ 15.662260] ? trace_preempt_on+0x20/0xc0 [ 15.662285] ? __pfx_kthread+0x10/0x10 [ 15.662306] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.662339] ? calculate_sigpending+0x7b/0xa0 [ 15.662364] ? __pfx_kthread+0x10/0x10 [ 15.662387] ret_from_fork+0x116/0x1d0 [ 15.662406] ? __pfx_kthread+0x10/0x10 [ 15.662428] ret_from_fork_asm+0x1a/0x30 [ 15.662461] </TASK> [ 15.662472] [ 15.669903] Allocated by task 282: [ 15.670103] kasan_save_stack+0x45/0x70 [ 15.670249] kasan_save_track+0x18/0x40 [ 15.670405] kasan_save_alloc_info+0x3b/0x50 [ 15.670619] __kasan_kmalloc+0xb7/0xc0 [ 15.670824] __kmalloc_cache_noprof+0x189/0x420 [ 15.671142] kasan_atomics+0x95/0x310 [ 15.671286] kunit_try_run_case+0x1a5/0x480 [ 15.671434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.671611] kthread+0x337/0x6f0 [ 15.671734] ret_from_fork+0x116/0x1d0 [ 15.671868] ret_from_fork_asm+0x1a/0x30 [ 15.672118] [ 15.672231] The buggy address belongs to the object at ffff8881029b7000 [ 15.672231] which belongs to the cache kmalloc-64 of size 64 [ 15.672761] The buggy address is located 0 bytes to the right of [ 15.672761] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.673343] [ 15.673441] The buggy address belongs to the physical page: [ 15.673696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.674086] flags: 0x200000000000000(node=0|zone=2) [ 15.674279] page_type: f5(slab) [ 15.674401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.674775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.675142] page dumped because: kasan: bad access detected [ 15.675390] [ 15.675473] Memory state around the buggy address: [ 15.675699] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.676029] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.676345] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.676656] ^ [ 15.676870] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.677217] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.677530] ================================================================== [ 15.201920] ================================================================== [ 15.202294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.202630] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.202875] [ 15.203006] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.203050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.203063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.203084] Call Trace: [ 15.203100] <TASK> [ 15.203117] dump_stack_lvl+0x73/0xb0 [ 15.203147] print_report+0xd1/0x610 [ 15.203171] ? __virt_addr_valid+0x1db/0x2d0 [ 15.203196] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.203217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.203241] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.203265] kasan_report+0x141/0x180 [ 15.203288] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.203317] kasan_check_range+0x10c/0x1c0 [ 15.203342] __kasan_check_write+0x18/0x20 [ 15.203362] kasan_atomics_helper+0xfa9/0x5450 [ 15.203386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.203411] ? kasan_save_alloc_info+0x3b/0x50 [ 15.203441] kasan_atomics+0x1dc/0x310 [ 15.203466] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203491] ? __pfx_read_tsc+0x10/0x10 [ 15.203512] ? ktime_get_ts64+0x86/0x230 [ 15.203538] kunit_try_run_case+0x1a5/0x480 [ 15.203563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.203612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.203637] ? __kthread_parkme+0x82/0x180 [ 15.203658] ? preempt_count_sub+0x50/0x80 [ 15.203683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.203759] kthread+0x337/0x6f0 [ 15.203780] ? trace_preempt_on+0x20/0xc0 [ 15.203805] ? __pfx_kthread+0x10/0x10 [ 15.203826] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.203849] ? calculate_sigpending+0x7b/0xa0 [ 15.203875] ? __pfx_kthread+0x10/0x10 [ 15.204093] ret_from_fork+0x116/0x1d0 [ 15.204120] ? __pfx_kthread+0x10/0x10 [ 15.204141] ret_from_fork_asm+0x1a/0x30 [ 15.204190] </TASK> [ 15.204202] [ 15.213025] Allocated by task 282: [ 15.213220] kasan_save_stack+0x45/0x70 [ 15.213420] kasan_save_track+0x18/0x40 [ 15.213794] kasan_save_alloc_info+0x3b/0x50 [ 15.214070] __kasan_kmalloc+0xb7/0xc0 [ 15.214266] __kmalloc_cache_noprof+0x189/0x420 [ 15.214492] kasan_atomics+0x95/0x310 [ 15.214737] kunit_try_run_case+0x1a5/0x480 [ 15.214907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.215111] kthread+0x337/0x6f0 [ 15.215234] ret_from_fork+0x116/0x1d0 [ 15.215441] ret_from_fork_asm+0x1a/0x30 [ 15.215748] [ 15.215851] The buggy address belongs to the object at ffff8881029b7000 [ 15.215851] which belongs to the cache kmalloc-64 of size 64 [ 15.216427] The buggy address is located 0 bytes to the right of [ 15.216427] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.217074] [ 15.217151] The buggy address belongs to the physical page: [ 15.217338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.217939] flags: 0x200000000000000(node=0|zone=2) [ 15.218226] page_type: f5(slab) [ 15.218400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.218805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.219178] page dumped because: kasan: bad access detected [ 15.219440] [ 15.219640] Memory state around the buggy address: [ 15.219851] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220187] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220483] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.220860] ^ [ 15.221125] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221438] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221960] ================================================================== [ 15.777179] ================================================================== [ 15.777661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.778056] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.778357] [ 15.778441] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.778482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.778493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.778515] Call Trace: [ 15.778529] <TASK> [ 15.778544] dump_stack_lvl+0x73/0xb0 [ 15.778571] print_report+0xd1/0x610 [ 15.778594] ? __virt_addr_valid+0x1db/0x2d0 [ 15.778618] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.778640] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.778664] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.778686] kasan_report+0x141/0x180 [ 15.778709] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.778737] __asan_report_load8_noabort+0x18/0x20 [ 15.778769] kasan_atomics_helper+0x4f30/0x5450 [ 15.778793] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.778817] ? kasan_save_alloc_info+0x3b/0x50 [ 15.778847] kasan_atomics+0x1dc/0x310 [ 15.778907] ? __pfx_kasan_atomics+0x10/0x10 [ 15.778934] ? __pfx_read_tsc+0x10/0x10 [ 15.778956] ? ktime_get_ts64+0x86/0x230 [ 15.779002] kunit_try_run_case+0x1a5/0x480 [ 15.779029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.779052] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.779078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.779103] ? __kthread_parkme+0x82/0x180 [ 15.779124] ? preempt_count_sub+0x50/0x80 [ 15.779149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.779173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.779200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.779225] kthread+0x337/0x6f0 [ 15.779245] ? trace_preempt_on+0x20/0xc0 [ 15.779269] ? __pfx_kthread+0x10/0x10 [ 15.779289] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.779312] ? calculate_sigpending+0x7b/0xa0 [ 15.779337] ? __pfx_kthread+0x10/0x10 [ 15.779359] ret_from_fork+0x116/0x1d0 [ 15.779378] ? __pfx_kthread+0x10/0x10 [ 15.779399] ret_from_fork_asm+0x1a/0x30 [ 15.779432] </TASK> [ 15.779443] [ 15.786358] Allocated by task 282: [ 15.786552] kasan_save_stack+0x45/0x70 [ 15.786774] kasan_save_track+0x18/0x40 [ 15.786997] kasan_save_alloc_info+0x3b/0x50 [ 15.787194] __kasan_kmalloc+0xb7/0xc0 [ 15.787349] __kmalloc_cache_noprof+0x189/0x420 [ 15.787571] kasan_atomics+0x95/0x310 [ 15.787764] kunit_try_run_case+0x1a5/0x480 [ 15.787961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.788240] kthread+0x337/0x6f0 [ 15.788380] ret_from_fork+0x116/0x1d0 [ 15.788584] ret_from_fork_asm+0x1a/0x30 [ 15.788733] [ 15.788804] The buggy address belongs to the object at ffff8881029b7000 [ 15.788804] which belongs to the cache kmalloc-64 of size 64 [ 15.789179] The buggy address is located 0 bytes to the right of [ 15.789179] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.789536] [ 15.789605] The buggy address belongs to the physical page: [ 15.789836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.790213] flags: 0x200000000000000(node=0|zone=2) [ 15.790447] page_type: f5(slab) [ 15.790616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.790961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.791317] page dumped because: kasan: bad access detected [ 15.791563] [ 15.791657] Memory state around the buggy address: [ 15.791909] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.792230] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.792452] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.792667] ^ [ 15.792821] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.793192] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.793528] ================================================================== [ 15.242293] ================================================================== [ 15.242742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.243109] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.243449] [ 15.243645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.243704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.243716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.243738] Call Trace: [ 15.243754] <TASK> [ 15.243768] dump_stack_lvl+0x73/0xb0 [ 15.243797] print_report+0xd1/0x610 [ 15.243820] ? __virt_addr_valid+0x1db/0x2d0 [ 15.243844] ? kasan_atomics_helper+0x1079/0x5450 [ 15.243866] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.243900] ? kasan_atomics_helper+0x1079/0x5450 [ 15.243923] kasan_report+0x141/0x180 [ 15.243947] ? kasan_atomics_helper+0x1079/0x5450 [ 15.243983] kasan_check_range+0x10c/0x1c0 [ 15.244008] __kasan_check_write+0x18/0x20 [ 15.244052] kasan_atomics_helper+0x1079/0x5450 [ 15.244078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.244104] ? kasan_save_alloc_info+0x3b/0x50 [ 15.244135] kasan_atomics+0x1dc/0x310 [ 15.244168] ? __pfx_kasan_atomics+0x10/0x10 [ 15.244193] ? __pfx_read_tsc+0x10/0x10 [ 15.244215] ? ktime_get_ts64+0x86/0x230 [ 15.244251] kunit_try_run_case+0x1a5/0x480 [ 15.244276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.244299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.244325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.244350] ? __kthread_parkme+0x82/0x180 [ 15.244371] ? preempt_count_sub+0x50/0x80 [ 15.244397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.244422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.244447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.244471] kthread+0x337/0x6f0 [ 15.244491] ? trace_preempt_on+0x20/0xc0 [ 15.244522] ? __pfx_kthread+0x10/0x10 [ 15.244543] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.244566] ? calculate_sigpending+0x7b/0xa0 [ 15.244668] ? __pfx_kthread+0x10/0x10 [ 15.244690] ret_from_fork+0x116/0x1d0 [ 15.244710] ? __pfx_kthread+0x10/0x10 [ 15.244732] ret_from_fork_asm+0x1a/0x30 [ 15.244765] </TASK> [ 15.244776] [ 15.253259] Allocated by task 282: [ 15.253453] kasan_save_stack+0x45/0x70 [ 15.253859] kasan_save_track+0x18/0x40 [ 15.254102] kasan_save_alloc_info+0x3b/0x50 [ 15.254312] __kasan_kmalloc+0xb7/0xc0 [ 15.254507] __kmalloc_cache_noprof+0x189/0x420 [ 15.254794] kasan_atomics+0x95/0x310 [ 15.255013] kunit_try_run_case+0x1a5/0x480 [ 15.255195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.255424] kthread+0x337/0x6f0 [ 15.255554] ret_from_fork+0x116/0x1d0 [ 15.255690] ret_from_fork_asm+0x1a/0x30 [ 15.255831] [ 15.255918] The buggy address belongs to the object at ffff8881029b7000 [ 15.255918] which belongs to the cache kmalloc-64 of size 64 [ 15.256457] The buggy address is located 0 bytes to the right of [ 15.256457] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.257011] [ 15.257107] The buggy address belongs to the physical page: [ 15.257295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.257583] flags: 0x200000000000000(node=0|zone=2) [ 15.257821] page_type: f5(slab) [ 15.258328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.258766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.259151] page dumped because: kasan: bad access detected [ 15.259383] [ 15.259501] Memory state around the buggy address: [ 15.259806] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260159] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260480] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.260811] ^ [ 15.261025] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.261243] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.261754] ================================================================== [ 14.659720] ================================================================== [ 14.660158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.660413] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.660666] [ 14.660782] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.660826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.660837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.660857] Call Trace: [ 14.660869] <TASK> [ 14.660884] dump_stack_lvl+0x73/0xb0 [ 14.660923] print_report+0xd1/0x610 [ 14.660945] ? __virt_addr_valid+0x1db/0x2d0 [ 14.660968] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.660989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.661153] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.661186] kasan_report+0x141/0x180 [ 14.661208] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.661236] __asan_report_store4_noabort+0x1b/0x30 [ 14.661262] kasan_atomics_helper+0x4ba2/0x5450 [ 14.661284] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.661309] ? kasan_save_alloc_info+0x3b/0x50 [ 14.661339] kasan_atomics+0x1dc/0x310 [ 14.661361] ? __pfx_kasan_atomics+0x10/0x10 [ 14.661386] ? __pfx_read_tsc+0x10/0x10 [ 14.661407] ? ktime_get_ts64+0x86/0x230 [ 14.661432] kunit_try_run_case+0x1a5/0x480 [ 14.661457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.661479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.661504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.661528] ? __kthread_parkme+0x82/0x180 [ 14.661548] ? preempt_count_sub+0x50/0x80 [ 14.661573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.661597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.661621] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.661645] kthread+0x337/0x6f0 [ 14.661664] ? trace_preempt_on+0x20/0xc0 [ 14.661688] ? __pfx_kthread+0x10/0x10 [ 14.661707] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.661803] ? calculate_sigpending+0x7b/0xa0 [ 14.661828] ? __pfx_kthread+0x10/0x10 [ 14.661849] ret_from_fork+0x116/0x1d0 [ 14.661868] ? __pfx_kthread+0x10/0x10 [ 14.661888] ret_from_fork_asm+0x1a/0x30 [ 14.661934] </TASK> [ 14.661944] [ 14.671064] Allocated by task 282: [ 14.671278] kasan_save_stack+0x45/0x70 [ 14.671426] kasan_save_track+0x18/0x40 [ 14.671563] kasan_save_alloc_info+0x3b/0x50 [ 14.671713] __kasan_kmalloc+0xb7/0xc0 [ 14.671847] __kmalloc_cache_noprof+0x189/0x420 [ 14.672971] kasan_atomics+0x95/0x310 [ 14.673694] kunit_try_run_case+0x1a5/0x480 [ 14.674309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.675183] kthread+0x337/0x6f0 [ 14.675767] ret_from_fork+0x116/0x1d0 [ 14.676125] ret_from_fork_asm+0x1a/0x30 [ 14.676279] [ 14.676355] The buggy address belongs to the object at ffff8881029b7000 [ 14.676355] which belongs to the cache kmalloc-64 of size 64 [ 14.676716] The buggy address is located 0 bytes to the right of [ 14.676716] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.677103] [ 14.677176] The buggy address belongs to the physical page: [ 14.677352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.677596] flags: 0x200000000000000(node=0|zone=2) [ 14.677761] page_type: f5(slab) [ 14.677882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.678872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.679113] page dumped because: kasan: bad access detected [ 14.679833] [ 14.680324] Memory state around the buggy address: [ 14.680996] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.681704] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.682560] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.683481] ^ [ 14.683921] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.684729] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.685401] ================================================================== [ 14.627714] ================================================================== [ 14.628418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.628745] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.630325] [ 14.630465] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.630515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.630528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.630552] Call Trace: [ 14.630566] <TASK> [ 14.630585] dump_stack_lvl+0x73/0xb0 [ 14.631039] print_report+0xd1/0x610 [ 14.631070] ? __virt_addr_valid+0x1db/0x2d0 [ 14.631096] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.631117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.631140] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.631162] kasan_report+0x141/0x180 [ 14.631184] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.631213] __asan_report_load4_noabort+0x18/0x20 [ 14.631236] kasan_atomics_helper+0x4bbc/0x5450 [ 14.631259] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.631283] ? kasan_save_alloc_info+0x3b/0x50 [ 14.631312] kasan_atomics+0x1dc/0x310 [ 14.631335] ? __pfx_kasan_atomics+0x10/0x10 [ 14.631360] ? __pfx_read_tsc+0x10/0x10 [ 14.631381] ? ktime_get_ts64+0x86/0x230 [ 14.631408] kunit_try_run_case+0x1a5/0x480 [ 14.631434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631457] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.631481] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.631504] ? __kthread_parkme+0x82/0x180 [ 14.631548] ? preempt_count_sub+0x50/0x80 [ 14.631573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.631621] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.631645] kthread+0x337/0x6f0 [ 14.631664] ? trace_preempt_on+0x20/0xc0 [ 14.631688] ? __pfx_kthread+0x10/0x10 [ 14.631709] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.631730] ? calculate_sigpending+0x7b/0xa0 [ 14.631754] ? __pfx_kthread+0x10/0x10 [ 14.631776] ret_from_fork+0x116/0x1d0 [ 14.631794] ? __pfx_kthread+0x10/0x10 [ 14.631814] ret_from_fork_asm+0x1a/0x30 [ 14.631847] </TASK> [ 14.631858] [ 14.643501] Allocated by task 282: [ 14.643870] kasan_save_stack+0x45/0x70 [ 14.644324] kasan_save_track+0x18/0x40 [ 14.644663] kasan_save_alloc_info+0x3b/0x50 [ 14.645190] __kasan_kmalloc+0xb7/0xc0 [ 14.645646] __kmalloc_cache_noprof+0x189/0x420 [ 14.646106] kasan_atomics+0x95/0x310 [ 14.646435] kunit_try_run_case+0x1a5/0x480 [ 14.646888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647396] kthread+0x337/0x6f0 [ 14.647768] ret_from_fork+0x116/0x1d0 [ 14.648097] ret_from_fork_asm+0x1a/0x30 [ 14.648351] [ 14.648428] The buggy address belongs to the object at ffff8881029b7000 [ 14.648428] which belongs to the cache kmalloc-64 of size 64 [ 14.649620] The buggy address is located 0 bytes to the right of [ 14.649620] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.651000] [ 14.651234] The buggy address belongs to the physical page: [ 14.651415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.651909] flags: 0x200000000000000(node=0|zone=2) [ 14.652396] page_type: f5(slab) [ 14.652830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.653692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.653940] page dumped because: kasan: bad access detected [ 14.654376] [ 14.654529] Memory state around the buggy address: [ 14.655047] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.655729] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.656227] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.656444] ^ [ 14.656852] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657549] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.658314] ================================================================== [ 14.769694] ================================================================== [ 14.769946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.770180] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.770408] [ 14.770491] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.770547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.770558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.770580] Call Trace: [ 14.770595] <TASK> [ 14.770611] dump_stack_lvl+0x73/0xb0 [ 14.770638] print_report+0xd1/0x610 [ 14.770661] ? __virt_addr_valid+0x1db/0x2d0 [ 14.770686] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.770708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.770732] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.770755] kasan_report+0x141/0x180 [ 14.770784] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.770811] kasan_check_range+0x10c/0x1c0 [ 14.770836] __kasan_check_write+0x18/0x20 [ 14.770856] kasan_atomics_helper+0x4a0/0x5450 [ 14.770881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.770915] ? kasan_save_alloc_info+0x3b/0x50 [ 14.770945] kasan_atomics+0x1dc/0x310 [ 14.770969] ? __pfx_kasan_atomics+0x10/0x10 [ 14.770994] ? __pfx_read_tsc+0x10/0x10 [ 14.771015] ? ktime_get_ts64+0x86/0x230 [ 14.771041] kunit_try_run_case+0x1a5/0x480 [ 14.771066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.771115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.771140] ? __kthread_parkme+0x82/0x180 [ 14.771161] ? preempt_count_sub+0x50/0x80 [ 14.771186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.771236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.771261] kthread+0x337/0x6f0 [ 14.771281] ? trace_preempt_on+0x20/0xc0 [ 14.771306] ? __pfx_kthread+0x10/0x10 [ 14.771327] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.771349] ? calculate_sigpending+0x7b/0xa0 [ 14.771374] ? __pfx_kthread+0x10/0x10 [ 14.771396] ret_from_fork+0x116/0x1d0 [ 14.771415] ? __pfx_kthread+0x10/0x10 [ 14.771437] ret_from_fork_asm+0x1a/0x30 [ 14.771469] </TASK> [ 14.771480] [ 14.780495] Allocated by task 282: [ 14.780628] kasan_save_stack+0x45/0x70 [ 14.781005] kasan_save_track+0x18/0x40 [ 14.781216] kasan_save_alloc_info+0x3b/0x50 [ 14.781492] __kasan_kmalloc+0xb7/0xc0 [ 14.781718] __kmalloc_cache_noprof+0x189/0x420 [ 14.781933] kasan_atomics+0x95/0x310 [ 14.782071] kunit_try_run_case+0x1a5/0x480 [ 14.782334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.782741] kthread+0x337/0x6f0 [ 14.782887] ret_from_fork+0x116/0x1d0 [ 14.783036] ret_from_fork_asm+0x1a/0x30 [ 14.783238] [ 14.783347] The buggy address belongs to the object at ffff8881029b7000 [ 14.783347] which belongs to the cache kmalloc-64 of size 64 [ 14.783956] The buggy address is located 0 bytes to the right of [ 14.783956] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.784644] [ 14.784716] The buggy address belongs to the physical page: [ 14.785207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.785495] flags: 0x200000000000000(node=0|zone=2) [ 14.785730] page_type: f5(slab) [ 14.785865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.786259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.786568] page dumped because: kasan: bad access detected [ 14.786790] [ 14.786875] Memory state around the buggy address: [ 14.787116] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.787383] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.787665] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.787972] ^ [ 14.788244] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.788466] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789258] ================================================================== [ 14.979225] ================================================================== [ 14.979562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.979849] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.980089] [ 14.980177] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.980220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.980232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.980253] Call Trace: [ 14.980270] <TASK> [ 14.980286] dump_stack_lvl+0x73/0xb0 [ 14.980313] print_report+0xd1/0x610 [ 14.980401] ? __virt_addr_valid+0x1db/0x2d0 [ 14.980430] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.980453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.980476] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.980498] kasan_report+0x141/0x180 [ 14.980522] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.980551] kasan_check_range+0x10c/0x1c0 [ 14.980575] __kasan_check_write+0x18/0x20 [ 14.980595] kasan_atomics_helper+0xa2b/0x5450 [ 14.980619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.980644] ? kasan_save_alloc_info+0x3b/0x50 [ 14.980674] kasan_atomics+0x1dc/0x310 [ 14.980698] ? __pfx_kasan_atomics+0x10/0x10 [ 14.980723] ? __pfx_read_tsc+0x10/0x10 [ 14.980745] ? ktime_get_ts64+0x86/0x230 [ 14.980772] kunit_try_run_case+0x1a5/0x480 [ 14.980798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.980847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.980871] ? __kthread_parkme+0x82/0x180 [ 14.980905] ? preempt_count_sub+0x50/0x80 [ 14.980930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.980980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.981043] kthread+0x337/0x6f0 [ 14.981064] ? trace_preempt_on+0x20/0xc0 [ 14.981088] ? __pfx_kthread+0x10/0x10 [ 14.981110] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.981133] ? calculate_sigpending+0x7b/0xa0 [ 14.981157] ? __pfx_kthread+0x10/0x10 [ 14.981180] ret_from_fork+0x116/0x1d0 [ 14.981199] ? __pfx_kthread+0x10/0x10 [ 14.981221] ret_from_fork_asm+0x1a/0x30 [ 14.981255] </TASK> [ 14.981267] [ 14.989827] Allocated by task 282: [ 14.989974] kasan_save_stack+0x45/0x70 [ 14.990120] kasan_save_track+0x18/0x40 [ 14.990319] kasan_save_alloc_info+0x3b/0x50 [ 14.990537] __kasan_kmalloc+0xb7/0xc0 [ 14.990727] __kmalloc_cache_noprof+0x189/0x420 [ 14.990973] kasan_atomics+0x95/0x310 [ 14.991164] kunit_try_run_case+0x1a5/0x480 [ 14.991379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.991642] kthread+0x337/0x6f0 [ 14.991822] ret_from_fork+0x116/0x1d0 [ 14.992218] ret_from_fork_asm+0x1a/0x30 [ 14.992486] [ 14.992635] The buggy address belongs to the object at ffff8881029b7000 [ 14.992635] which belongs to the cache kmalloc-64 of size 64 [ 14.993025] The buggy address is located 0 bytes to the right of [ 14.993025] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.993468] [ 14.993566] The buggy address belongs to the physical page: [ 14.993824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.994552] flags: 0x200000000000000(node=0|zone=2) [ 14.994756] page_type: f5(slab) [ 14.994932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.995302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.995784] page dumped because: kasan: bad access detected [ 14.996108] [ 14.996196] Memory state around the buggy address: [ 14.996353] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.996571] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.996789] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.998293] ^ [ 14.999221] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000703] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.001762] ================================================================== [ 15.381566] ================================================================== [ 15.381800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.382049] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.382274] [ 15.382358] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.382400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.382413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.382434] Call Trace: [ 15.382449] <TASK> [ 15.382463] dump_stack_lvl+0x73/0xb0 [ 15.382490] print_report+0xd1/0x610 [ 15.382513] ? __virt_addr_valid+0x1db/0x2d0 [ 15.382535] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.382556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.382579] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.382617] kasan_report+0x141/0x180 [ 15.382640] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.382678] kasan_check_range+0x10c/0x1c0 [ 15.382704] __kasan_check_write+0x18/0x20 [ 15.382723] kasan_atomics_helper+0x12e6/0x5450 [ 15.382748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.382778] ? kasan_save_alloc_info+0x3b/0x50 [ 15.382809] kasan_atomics+0x1dc/0x310 [ 15.382833] ? __pfx_kasan_atomics+0x10/0x10 [ 15.382858] ? __pfx_read_tsc+0x10/0x10 [ 15.382880] ? ktime_get_ts64+0x86/0x230 [ 15.382916] kunit_try_run_case+0x1a5/0x480 [ 15.382941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.382965] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.382990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.383015] ? __kthread_parkme+0x82/0x180 [ 15.383036] ? preempt_count_sub+0x50/0x80 [ 15.383061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.383086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.383112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.383139] kthread+0x337/0x6f0 [ 15.383158] ? trace_preempt_on+0x20/0xc0 [ 15.383182] ? __pfx_kthread+0x10/0x10 [ 15.383203] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.383226] ? calculate_sigpending+0x7b/0xa0 [ 15.383251] ? __pfx_kthread+0x10/0x10 [ 15.383273] ret_from_fork+0x116/0x1d0 [ 15.383293] ? __pfx_kthread+0x10/0x10 [ 15.383314] ret_from_fork_asm+0x1a/0x30 [ 15.383348] </TASK> [ 15.383359] [ 15.395627] Allocated by task 282: [ 15.396665] kasan_save_stack+0x45/0x70 [ 15.397419] kasan_save_track+0x18/0x40 [ 15.398324] kasan_save_alloc_info+0x3b/0x50 [ 15.398914] __kasan_kmalloc+0xb7/0xc0 [ 15.399596] __kmalloc_cache_noprof+0x189/0x420 [ 15.400205] kasan_atomics+0x95/0x310 [ 15.400708] kunit_try_run_case+0x1a5/0x480 [ 15.401349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.402278] kthread+0x337/0x6f0 [ 15.402706] ret_from_fork+0x116/0x1d0 [ 15.403316] ret_from_fork_asm+0x1a/0x30 [ 15.403947] [ 15.404375] The buggy address belongs to the object at ffff8881029b7000 [ 15.404375] which belongs to the cache kmalloc-64 of size 64 [ 15.405579] The buggy address is located 0 bytes to the right of [ 15.405579] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.406340] [ 15.406444] The buggy address belongs to the physical page: [ 15.406911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.407512] flags: 0x200000000000000(node=0|zone=2) [ 15.407932] page_type: f5(slab) [ 15.408154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.408460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.409043] page dumped because: kasan: bad access detected [ 15.409385] [ 15.409487] Memory state around the buggy address: [ 15.409810] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410313] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410999] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.411318] ^ [ 15.411508] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.412057] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.412495] ================================================================== [ 16.038425] ================================================================== [ 16.038819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.039151] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 16.039464] [ 16.039574] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.039618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.039630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.039652] Call Trace: [ 16.039669] <TASK> [ 16.039686] dump_stack_lvl+0x73/0xb0 [ 16.039716] print_report+0xd1/0x610 [ 16.039739] ? __virt_addr_valid+0x1db/0x2d0 [ 16.039763] ? kasan_atomics_helper+0x5115/0x5450 [ 16.039786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.039810] ? kasan_atomics_helper+0x5115/0x5450 [ 16.039833] kasan_report+0x141/0x180 [ 16.039856] ? kasan_atomics_helper+0x5115/0x5450 [ 16.039885] __asan_report_load8_noabort+0x18/0x20 [ 16.039922] kasan_atomics_helper+0x5115/0x5450 [ 16.039947] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.039978] ? kasan_save_alloc_info+0x3b/0x50 [ 16.040009] kasan_atomics+0x1dc/0x310 [ 16.040034] ? __pfx_kasan_atomics+0x10/0x10 [ 16.040059] ? __pfx_read_tsc+0x10/0x10 [ 16.040081] ? ktime_get_ts64+0x86/0x230 [ 16.040107] kunit_try_run_case+0x1a5/0x480 [ 16.040133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.040158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.040184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.040209] ? __kthread_parkme+0x82/0x180 [ 16.040230] ? preempt_count_sub+0x50/0x80 [ 16.040256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.040281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.040306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.040332] kthread+0x337/0x6f0 [ 16.040352] ? trace_preempt_on+0x20/0xc0 [ 16.040377] ? __pfx_kthread+0x10/0x10 [ 16.040398] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.040421] ? calculate_sigpending+0x7b/0xa0 [ 16.040446] ? __pfx_kthread+0x10/0x10 [ 16.040468] ret_from_fork+0x116/0x1d0 [ 16.040487] ? __pfx_kthread+0x10/0x10 [ 16.040507] ret_from_fork_asm+0x1a/0x30 [ 16.040540] </TASK> [ 16.040552] [ 16.048197] Allocated by task 282: [ 16.048373] kasan_save_stack+0x45/0x70 [ 16.048585] kasan_save_track+0x18/0x40 [ 16.048780] kasan_save_alloc_info+0x3b/0x50 [ 16.049061] __kasan_kmalloc+0xb7/0xc0 [ 16.049245] __kmalloc_cache_noprof+0x189/0x420 [ 16.049478] kasan_atomics+0x95/0x310 [ 16.049684] kunit_try_run_case+0x1a5/0x480 [ 16.049928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.050208] kthread+0x337/0x6f0 [ 16.050407] ret_from_fork+0x116/0x1d0 [ 16.050603] ret_from_fork_asm+0x1a/0x30 [ 16.050807] [ 16.050941] The buggy address belongs to the object at ffff8881029b7000 [ 16.050941] which belongs to the cache kmalloc-64 of size 64 [ 16.051482] The buggy address is located 0 bytes to the right of [ 16.051482] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 16.052078] [ 16.052164] The buggy address belongs to the physical page: [ 16.052382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 16.052759] flags: 0x200000000000000(node=0|zone=2) [ 16.053103] page_type: f5(slab) [ 16.053426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.053804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.054222] page dumped because: kasan: bad access detected [ 16.054479] [ 16.054571] Memory state around the buggy address: [ 16.054797] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.055144] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.055455] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.055761] ^ [ 16.055959] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.056191] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.056509] ================================================================== [ 14.940073] ================================================================== [ 14.940366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.940793] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.941269] [ 14.941390] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.941432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.941445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.941466] Call Trace: [ 14.941482] <TASK> [ 14.941498] dump_stack_lvl+0x73/0xb0 [ 14.941526] print_report+0xd1/0x610 [ 14.941604] ? __virt_addr_valid+0x1db/0x2d0 [ 14.941630] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.941652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.941676] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.941699] kasan_report+0x141/0x180 [ 14.941722] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.941751] kasan_check_range+0x10c/0x1c0 [ 14.941776] __kasan_check_write+0x18/0x20 [ 14.941796] kasan_atomics_helper+0x8f9/0x5450 [ 14.941820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.941845] ? kasan_save_alloc_info+0x3b/0x50 [ 14.941875] kasan_atomics+0x1dc/0x310 [ 14.941915] ? __pfx_kasan_atomics+0x10/0x10 [ 14.941941] ? __pfx_read_tsc+0x10/0x10 [ 14.941961] ? ktime_get_ts64+0x86/0x230 [ 14.941987] kunit_try_run_case+0x1a5/0x480 [ 14.942012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.942061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.942086] ? __kthread_parkme+0x82/0x180 [ 14.942107] ? preempt_count_sub+0x50/0x80 [ 14.942132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.942182] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.942208] kthread+0x337/0x6f0 [ 14.942227] ? trace_preempt_on+0x20/0xc0 [ 14.942253] ? __pfx_kthread+0x10/0x10 [ 14.942274] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.942297] ? calculate_sigpending+0x7b/0xa0 [ 14.942322] ? __pfx_kthread+0x10/0x10 [ 14.942344] ret_from_fork+0x116/0x1d0 [ 14.942364] ? __pfx_kthread+0x10/0x10 [ 14.942385] ret_from_fork_asm+0x1a/0x30 [ 14.942418] </TASK> [ 14.942429] [ 14.950827] Allocated by task 282: [ 14.950994] kasan_save_stack+0x45/0x70 [ 14.951143] kasan_save_track+0x18/0x40 [ 14.951283] kasan_save_alloc_info+0x3b/0x50 [ 14.951440] __kasan_kmalloc+0xb7/0xc0 [ 14.951576] __kmalloc_cache_noprof+0x189/0x420 [ 14.951835] kasan_atomics+0x95/0x310 [ 14.952046] kunit_try_run_case+0x1a5/0x480 [ 14.952257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.952512] kthread+0x337/0x6f0 [ 14.952682] ret_from_fork+0x116/0x1d0 [ 14.952819] ret_from_fork_asm+0x1a/0x30 [ 14.952972] [ 14.953048] The buggy address belongs to the object at ffff8881029b7000 [ 14.953048] which belongs to the cache kmalloc-64 of size 64 [ 14.954037] The buggy address is located 0 bytes to the right of [ 14.954037] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.954744] [ 14.954846] The buggy address belongs to the physical page: [ 14.955055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.955486] flags: 0x200000000000000(node=0|zone=2) [ 14.955760] page_type: f5(slab) [ 14.955928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.956379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.956741] page dumped because: kasan: bad access detected [ 14.956986] [ 14.957099] Memory state around the buggy address: [ 14.957320] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957623] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957979] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.958441] ^ [ 14.958772] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.959077] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.959345] ================================================================== [ 15.595147] ================================================================== [ 15.595719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.596393] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.596719] [ 15.596831] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.596874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.596886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.596917] Call Trace: [ 15.596931] <TASK> [ 15.596947] dump_stack_lvl+0x73/0xb0 [ 15.596974] print_report+0xd1/0x610 [ 15.596997] ? __virt_addr_valid+0x1db/0x2d0 [ 15.597023] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.597053] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.597076] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.597099] kasan_report+0x141/0x180 [ 15.597122] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.597151] kasan_check_range+0x10c/0x1c0 [ 15.597176] __kasan_check_write+0x18/0x20 [ 15.597196] kasan_atomics_helper+0x16e7/0x5450 [ 15.597220] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.597245] ? kasan_save_alloc_info+0x3b/0x50 [ 15.597276] kasan_atomics+0x1dc/0x310 [ 15.597300] ? __pfx_kasan_atomics+0x10/0x10 [ 15.597325] ? __pfx_read_tsc+0x10/0x10 [ 15.597347] ? ktime_get_ts64+0x86/0x230 [ 15.597372] kunit_try_run_case+0x1a5/0x480 [ 15.597397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.597420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.597447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.597472] ? __kthread_parkme+0x82/0x180 [ 15.597493] ? preempt_count_sub+0x50/0x80 [ 15.597519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.597544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.597568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.597593] kthread+0x337/0x6f0 [ 15.597612] ? trace_preempt_on+0x20/0xc0 [ 15.597636] ? __pfx_kthread+0x10/0x10 [ 15.597657] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.597680] ? calculate_sigpending+0x7b/0xa0 [ 15.597715] ? __pfx_kthread+0x10/0x10 [ 15.597738] ret_from_fork+0x116/0x1d0 [ 15.597757] ? __pfx_kthread+0x10/0x10 [ 15.597778] ret_from_fork_asm+0x1a/0x30 [ 15.597811] </TASK> [ 15.597822] [ 15.604972] Allocated by task 282: [ 15.605149] kasan_save_stack+0x45/0x70 [ 15.605349] kasan_save_track+0x18/0x40 [ 15.605549] kasan_save_alloc_info+0x3b/0x50 [ 15.605764] __kasan_kmalloc+0xb7/0xc0 [ 15.605973] __kmalloc_cache_noprof+0x189/0x420 [ 15.606199] kasan_atomics+0x95/0x310 [ 15.606371] kunit_try_run_case+0x1a5/0x480 [ 15.606564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.606741] kthread+0x337/0x6f0 [ 15.606868] ret_from_fork+0x116/0x1d0 [ 15.607066] ret_from_fork_asm+0x1a/0x30 [ 15.607271] [ 15.607368] The buggy address belongs to the object at ffff8881029b7000 [ 15.607368] which belongs to the cache kmalloc-64 of size 64 [ 15.607909] The buggy address is located 0 bytes to the right of [ 15.607909] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.608386] [ 15.608476] The buggy address belongs to the physical page: [ 15.608734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.609285] flags: 0x200000000000000(node=0|zone=2) [ 15.609526] page_type: f5(slab) [ 15.609650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.610417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.610831] page dumped because: kasan: bad access detected [ 15.611883] [ 15.612219] Memory state around the buggy address: [ 15.612682] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613369] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613673] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.613970] ^ [ 15.614179] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.614459] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.614746] ================================================================== [ 15.413279] ================================================================== [ 15.413616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.413916] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.414223] [ 15.414355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.414401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.414414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.414436] Call Trace: [ 15.414457] <TASK> [ 15.414476] dump_stack_lvl+0x73/0xb0 [ 15.414505] print_report+0xd1/0x610 [ 15.414830] ? __virt_addr_valid+0x1db/0x2d0 [ 15.414858] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.414881] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.414918] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.414941] kasan_report+0x141/0x180 [ 15.414966] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.415008] __asan_report_load4_noabort+0x18/0x20 [ 15.415035] kasan_atomics_helper+0x49ce/0x5450 [ 15.415059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.415083] ? kasan_save_alloc_info+0x3b/0x50 [ 15.415114] kasan_atomics+0x1dc/0x310 [ 15.415140] ? __pfx_kasan_atomics+0x10/0x10 [ 15.415169] ? __pfx_read_tsc+0x10/0x10 [ 15.415192] ? ktime_get_ts64+0x86/0x230 [ 15.415219] kunit_try_run_case+0x1a5/0x480 [ 15.415244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.415268] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.415295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.415319] ? __kthread_parkme+0x82/0x180 [ 15.415342] ? preempt_count_sub+0x50/0x80 [ 15.415369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.415394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.415419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.415444] kthread+0x337/0x6f0 [ 15.415466] ? trace_preempt_on+0x20/0xc0 [ 15.415492] ? __pfx_kthread+0x10/0x10 [ 15.415514] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.415734] ? calculate_sigpending+0x7b/0xa0 [ 15.415763] ? __pfx_kthread+0x10/0x10 [ 15.415786] ret_from_fork+0x116/0x1d0 [ 15.415806] ? __pfx_kthread+0x10/0x10 [ 15.415827] ret_from_fork_asm+0x1a/0x30 [ 15.415861] </TASK> [ 15.415874] [ 15.426552] Allocated by task 282: [ 15.426716] kasan_save_stack+0x45/0x70 [ 15.426979] kasan_save_track+0x18/0x40 [ 15.427157] kasan_save_alloc_info+0x3b/0x50 [ 15.427382] __kasan_kmalloc+0xb7/0xc0 [ 15.427720] __kmalloc_cache_noprof+0x189/0x420 [ 15.428239] kasan_atomics+0x95/0x310 [ 15.428425] kunit_try_run_case+0x1a5/0x480 [ 15.428799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.429069] kthread+0x337/0x6f0 [ 15.429241] ret_from_fork+0x116/0x1d0 [ 15.429497] ret_from_fork_asm+0x1a/0x30 [ 15.429723] [ 15.429826] The buggy address belongs to the object at ffff8881029b7000 [ 15.429826] which belongs to the cache kmalloc-64 of size 64 [ 15.430507] The buggy address is located 0 bytes to the right of [ 15.430507] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.431142] [ 15.431323] The buggy address belongs to the physical page: [ 15.431682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.432019] flags: 0x200000000000000(node=0|zone=2) [ 15.432472] page_type: f5(slab) [ 15.432604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.433395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.433817] page dumped because: kasan: bad access detected [ 15.434110] [ 15.434210] Memory state around the buggy address: [ 15.434399] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.434928] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.435273] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.435565] ^ [ 15.435744] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.436502] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.436947] ================================================================== [ 15.616720] ================================================================== [ 15.617402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.617803] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.618259] [ 15.618455] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.618501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.618514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.618537] Call Trace: [ 15.618553] <TASK> [ 15.618596] dump_stack_lvl+0x73/0xb0 [ 15.618627] print_report+0xd1/0x610 [ 15.618672] ? __virt_addr_valid+0x1db/0x2d0 [ 15.618696] ? kasan_atomics_helper+0x177f/0x5450 [ 15.618718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.618753] ? kasan_atomics_helper+0x177f/0x5450 [ 15.618782] kasan_report+0x141/0x180 [ 15.618805] ? kasan_atomics_helper+0x177f/0x5450 [ 15.618834] kasan_check_range+0x10c/0x1c0 [ 15.618858] __kasan_check_write+0x18/0x20 [ 15.618879] kasan_atomics_helper+0x177f/0x5450 [ 15.618914] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.618938] ? kasan_save_alloc_info+0x3b/0x50 [ 15.618988] kasan_atomics+0x1dc/0x310 [ 15.619013] ? __pfx_kasan_atomics+0x10/0x10 [ 15.619039] ? __pfx_read_tsc+0x10/0x10 [ 15.619061] ? ktime_get_ts64+0x86/0x230 [ 15.619087] kunit_try_run_case+0x1a5/0x480 [ 15.619112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.619136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.619162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.619187] ? __kthread_parkme+0x82/0x180 [ 15.619209] ? preempt_count_sub+0x50/0x80 [ 15.619234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.619258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.619284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.619310] kthread+0x337/0x6f0 [ 15.619330] ? trace_preempt_on+0x20/0xc0 [ 15.619354] ? __pfx_kthread+0x10/0x10 [ 15.619375] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.619398] ? calculate_sigpending+0x7b/0xa0 [ 15.619424] ? __pfx_kthread+0x10/0x10 [ 15.619446] ret_from_fork+0x116/0x1d0 [ 15.619466] ? __pfx_kthread+0x10/0x10 [ 15.619486] ret_from_fork_asm+0x1a/0x30 [ 15.619520] </TASK> [ 15.619532] [ 15.631364] Allocated by task 282: [ 15.631689] kasan_save_stack+0x45/0x70 [ 15.632088] kasan_save_track+0x18/0x40 [ 15.632249] kasan_save_alloc_info+0x3b/0x50 [ 15.632622] __kasan_kmalloc+0xb7/0xc0 [ 15.632989] __kmalloc_cache_noprof+0x189/0x420 [ 15.633362] kasan_atomics+0x95/0x310 [ 15.633500] kunit_try_run_case+0x1a5/0x480 [ 15.633650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.633829] kthread+0x337/0x6f0 [ 15.634098] ret_from_fork+0x116/0x1d0 [ 15.634469] ret_from_fork_asm+0x1a/0x30 [ 15.634860] [ 15.635081] The buggy address belongs to the object at ffff8881029b7000 [ 15.635081] which belongs to the cache kmalloc-64 of size 64 [ 15.636140] The buggy address is located 0 bytes to the right of [ 15.636140] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.637196] [ 15.637276] The buggy address belongs to the physical page: [ 15.637457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.637702] flags: 0x200000000000000(node=0|zone=2) [ 15.637867] page_type: f5(slab) [ 15.638013] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.638319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.638583] page dumped because: kasan: bad access detected [ 15.638835] [ 15.638928] Memory state around the buggy address: [ 15.639086] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.639407] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.639731] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.640094] ^ [ 15.640305] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640605] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640920] ================================================================== [ 15.811647] ================================================================== [ 15.811884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.812167] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.812403] [ 15.812536] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.812580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.812593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.812614] Call Trace: [ 15.812656] <TASK> [ 15.812673] dump_stack_lvl+0x73/0xb0 [ 15.812703] print_report+0xd1/0x610 [ 15.812727] ? __virt_addr_valid+0x1db/0x2d0 [ 15.812751] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.812773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.812797] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.812819] kasan_report+0x141/0x180 [ 15.812842] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.812870] kasan_check_range+0x10c/0x1c0 [ 15.812906] __kasan_check_write+0x18/0x20 [ 15.812925] kasan_atomics_helper+0x1d7a/0x5450 [ 15.812951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.812994] ? kasan_save_alloc_info+0x3b/0x50 [ 15.813024] kasan_atomics+0x1dc/0x310 [ 15.813049] ? __pfx_kasan_atomics+0x10/0x10 [ 15.813074] ? __pfx_read_tsc+0x10/0x10 [ 15.813095] ? ktime_get_ts64+0x86/0x230 [ 15.813121] kunit_try_run_case+0x1a5/0x480 [ 15.813146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813170] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.813215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.813240] ? __kthread_parkme+0x82/0x180 [ 15.813261] ? preempt_count_sub+0x50/0x80 [ 15.813286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.813336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.813379] kthread+0x337/0x6f0 [ 15.813399] ? trace_preempt_on+0x20/0xc0 [ 15.813423] ? __pfx_kthread+0x10/0x10 [ 15.813455] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.813478] ? calculate_sigpending+0x7b/0xa0 [ 15.813503] ? __pfx_kthread+0x10/0x10 [ 15.813525] ret_from_fork+0x116/0x1d0 [ 15.813544] ? __pfx_kthread+0x10/0x10 [ 15.813565] ret_from_fork_asm+0x1a/0x30 [ 15.813598] </TASK> [ 15.813609] [ 15.820702] Allocated by task 282: [ 15.820883] kasan_save_stack+0x45/0x70 [ 15.821118] kasan_save_track+0x18/0x40 [ 15.821311] kasan_save_alloc_info+0x3b/0x50 [ 15.821520] __kasan_kmalloc+0xb7/0xc0 [ 15.821702] __kmalloc_cache_noprof+0x189/0x420 [ 15.821936] kasan_atomics+0x95/0x310 [ 15.822146] kunit_try_run_case+0x1a5/0x480 [ 15.822364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822571] kthread+0x337/0x6f0 [ 15.822757] ret_from_fork+0x116/0x1d0 [ 15.822907] ret_from_fork_asm+0x1a/0x30 [ 15.823083] [ 15.823174] The buggy address belongs to the object at ffff8881029b7000 [ 15.823174] which belongs to the cache kmalloc-64 of size 64 [ 15.823524] The buggy address is located 0 bytes to the right of [ 15.823524] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.823876] [ 15.823956] The buggy address belongs to the physical page: [ 15.824204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.824552] flags: 0x200000000000000(node=0|zone=2) [ 15.824780] page_type: f5(slab) [ 15.824960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.825324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.825652] page dumped because: kasan: bad access detected [ 15.825909] [ 15.826050] Memory state around the buggy address: [ 15.826227] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.826440] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.826665] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.827014] ^ [ 15.827234] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.827543] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.827765] ================================================================== [ 15.482918] ================================================================== [ 15.483563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.483888] Write of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.484637] [ 15.484875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.484941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.484954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.484977] Call Trace: [ 15.484995] <TASK> [ 15.485013] dump_stack_lvl+0x73/0xb0 [ 15.485051] print_report+0xd1/0x610 [ 15.485074] ? __virt_addr_valid+0x1db/0x2d0 [ 15.485098] ? kasan_atomics_helper+0x1467/0x5450 [ 15.485120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.485144] ? kasan_atomics_helper+0x1467/0x5450 [ 15.485167] kasan_report+0x141/0x180 [ 15.485190] ? kasan_atomics_helper+0x1467/0x5450 [ 15.485219] kasan_check_range+0x10c/0x1c0 [ 15.485244] __kasan_check_write+0x18/0x20 [ 15.485264] kasan_atomics_helper+0x1467/0x5450 [ 15.485288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.485312] ? kasan_save_alloc_info+0x3b/0x50 [ 15.485343] kasan_atomics+0x1dc/0x310 [ 15.485368] ? __pfx_kasan_atomics+0x10/0x10 [ 15.485392] ? __pfx_read_tsc+0x10/0x10 [ 15.485414] ? ktime_get_ts64+0x86/0x230 [ 15.485440] kunit_try_run_case+0x1a5/0x480 [ 15.485466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.485489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.485514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.485578] ? __kthread_parkme+0x82/0x180 [ 15.485599] ? preempt_count_sub+0x50/0x80 [ 15.485625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.485650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.485675] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.485700] kthread+0x337/0x6f0 [ 15.485720] ? trace_preempt_on+0x20/0xc0 [ 15.485745] ? __pfx_kthread+0x10/0x10 [ 15.485766] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.485788] ? calculate_sigpending+0x7b/0xa0 [ 15.485813] ? __pfx_kthread+0x10/0x10 [ 15.485836] ret_from_fork+0x116/0x1d0 [ 15.485856] ? __pfx_kthread+0x10/0x10 [ 15.485876] ret_from_fork_asm+0x1a/0x30 [ 15.485921] </TASK> [ 15.485932] [ 15.498997] Allocated by task 282: [ 15.499197] kasan_save_stack+0x45/0x70 [ 15.499394] kasan_save_track+0x18/0x40 [ 15.499567] kasan_save_alloc_info+0x3b/0x50 [ 15.500112] __kasan_kmalloc+0xb7/0xc0 [ 15.500471] __kmalloc_cache_noprof+0x189/0x420 [ 15.500888] kasan_atomics+0x95/0x310 [ 15.501326] kunit_try_run_case+0x1a5/0x480 [ 15.501710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.501974] kthread+0x337/0x6f0 [ 15.502285] ret_from_fork+0x116/0x1d0 [ 15.502471] ret_from_fork_asm+0x1a/0x30 [ 15.503082] [ 15.503187] The buggy address belongs to the object at ffff8881029b7000 [ 15.503187] which belongs to the cache kmalloc-64 of size 64 [ 15.504279] The buggy address is located 0 bytes to the right of [ 15.504279] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.505029] [ 15.505309] The buggy address belongs to the physical page: [ 15.505727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.506273] flags: 0x200000000000000(node=0|zone=2) [ 15.506681] page_type: f5(slab) [ 15.507010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.507329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.508032] page dumped because: kasan: bad access detected [ 15.508496] [ 15.508780] Memory state around the buggy address: [ 15.509258] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.509725] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510233] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.510710] ^ [ 15.511042] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.511493] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.511935] ================================================================== [ 14.889864] ================================================================== [ 14.890252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.890500] Write of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 14.890911] [ 14.891049] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.891093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.891105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.891126] Call Trace: [ 14.891142] <TASK> [ 14.891156] dump_stack_lvl+0x73/0xb0 [ 14.891185] print_report+0xd1/0x610 [ 14.891208] ? __virt_addr_valid+0x1db/0x2d0 [ 14.891232] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.891254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.891279] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.891302] kasan_report+0x141/0x180 [ 14.891325] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.891354] kasan_check_range+0x10c/0x1c0 [ 14.891378] __kasan_check_write+0x18/0x20 [ 14.891399] kasan_atomics_helper+0x7c7/0x5450 [ 14.891422] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.891447] ? kasan_save_alloc_info+0x3b/0x50 [ 14.891478] kasan_atomics+0x1dc/0x310 [ 14.891502] ? __pfx_kasan_atomics+0x10/0x10 [ 14.891772] ? __pfx_read_tsc+0x10/0x10 [ 14.891797] ? ktime_get_ts64+0x86/0x230 [ 14.891824] kunit_try_run_case+0x1a5/0x480 [ 14.891851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.891875] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.891914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.891939] ? __kthread_parkme+0x82/0x180 [ 14.891961] ? preempt_count_sub+0x50/0x80 [ 14.892004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.892081] kthread+0x337/0x6f0 [ 14.892101] ? trace_preempt_on+0x20/0xc0 [ 14.892126] ? __pfx_kthread+0x10/0x10 [ 14.892148] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.892170] ? calculate_sigpending+0x7b/0xa0 [ 14.892196] ? __pfx_kthread+0x10/0x10 [ 14.892218] ret_from_fork+0x116/0x1d0 [ 14.892238] ? __pfx_kthread+0x10/0x10 [ 14.892260] ret_from_fork_asm+0x1a/0x30 [ 14.892292] </TASK> [ 14.892304] [ 14.900167] Allocated by task 282: [ 14.900336] kasan_save_stack+0x45/0x70 [ 14.900600] kasan_save_track+0x18/0x40 [ 14.900746] kasan_save_alloc_info+0x3b/0x50 [ 14.900911] __kasan_kmalloc+0xb7/0xc0 [ 14.901070] __kmalloc_cache_noprof+0x189/0x420 [ 14.901274] kasan_atomics+0x95/0x310 [ 14.901468] kunit_try_run_case+0x1a5/0x480 [ 14.901740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.902034] kthread+0x337/0x6f0 [ 14.902180] ret_from_fork+0x116/0x1d0 [ 14.902315] ret_from_fork_asm+0x1a/0x30 [ 14.902559] [ 14.902668] The buggy address belongs to the object at ffff8881029b7000 [ 14.902668] which belongs to the cache kmalloc-64 of size 64 [ 14.903254] The buggy address is located 0 bytes to the right of [ 14.903254] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 14.905256] [ 14.905365] The buggy address belongs to the physical page: [ 14.905862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 14.906298] flags: 0x200000000000000(node=0|zone=2) [ 14.906485] page_type: f5(slab) [ 14.906847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.907332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.908289] page dumped because: kasan: bad access detected [ 14.908480] [ 14.908863] Memory state around the buggy address: [ 14.909412] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909784] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.910131] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.910811] ^ [ 14.911266] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912106] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912486] ================================================================== [ 15.317591] ================================================================== [ 15.318255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.318536] Read of size 4 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.319341] [ 15.319551] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.319597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.319609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.319632] Call Trace: [ 15.319650] <TASK> [ 15.319667] dump_stack_lvl+0x73/0xb0 [ 15.319698] print_report+0xd1/0x610 [ 15.319721] ? __virt_addr_valid+0x1db/0x2d0 [ 15.319746] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.319768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.319792] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.319815] kasan_report+0x141/0x180 [ 15.319841] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.319870] __asan_report_load4_noabort+0x18/0x20 [ 15.319907] kasan_atomics_helper+0x4a02/0x5450 [ 15.319932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.319956] ? kasan_save_alloc_info+0x3b/0x50 [ 15.319987] kasan_atomics+0x1dc/0x310 [ 15.320013] ? __pfx_kasan_atomics+0x10/0x10 [ 15.320039] ? __pfx_read_tsc+0x10/0x10 [ 15.320061] ? ktime_get_ts64+0x86/0x230 [ 15.320087] kunit_try_run_case+0x1a5/0x480 [ 15.320112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.320135] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.320161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.320186] ? __kthread_parkme+0x82/0x180 [ 15.320208] ? preempt_count_sub+0x50/0x80 [ 15.320233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.320258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.320284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.320309] kthread+0x337/0x6f0 [ 15.320329] ? trace_preempt_on+0x20/0xc0 [ 15.320354] ? __pfx_kthread+0x10/0x10 [ 15.320376] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.320398] ? calculate_sigpending+0x7b/0xa0 [ 15.320423] ? __pfx_kthread+0x10/0x10 [ 15.320445] ret_from_fork+0x116/0x1d0 [ 15.320464] ? __pfx_kthread+0x10/0x10 [ 15.320486] ret_from_fork_asm+0x1a/0x30 [ 15.320519] </TASK> [ 15.320530] [ 15.334513] Allocated by task 282: [ 15.334886] kasan_save_stack+0x45/0x70 [ 15.335141] kasan_save_track+0x18/0x40 [ 15.335279] kasan_save_alloc_info+0x3b/0x50 [ 15.335432] __kasan_kmalloc+0xb7/0xc0 [ 15.335566] __kmalloc_cache_noprof+0x189/0x420 [ 15.335809] kasan_atomics+0x95/0x310 [ 15.336158] kunit_try_run_case+0x1a5/0x480 [ 15.336415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.336807] kthread+0x337/0x6f0 [ 15.336947] ret_from_fork+0x116/0x1d0 [ 15.337146] ret_from_fork_asm+0x1a/0x30 [ 15.337296] [ 15.337372] The buggy address belongs to the object at ffff8881029b7000 [ 15.337372] which belongs to the cache kmalloc-64 of size 64 [ 15.337756] The buggy address is located 0 bytes to the right of [ 15.337756] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.338273] [ 15.338347] The buggy address belongs to the physical page: [ 15.338636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.339054] flags: 0x200000000000000(node=0|zone=2) [ 15.339301] page_type: f5(slab) [ 15.339424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.339750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.340137] page dumped because: kasan: bad access detected [ 15.340368] [ 15.340489] Memory state around the buggy address: [ 15.340683] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.340979] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.341381] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.341595] ^ [ 15.341783] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.342125] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.342401] ================================================================== [ 15.922943] ================================================================== [ 15.923211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.923575] Read of size 8 at addr ffff8881029b7030 by task kunit_try_catch/282 [ 15.924049] [ 15.924190] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.924236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.924250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.924274] Call Trace: [ 15.924290] <TASK> [ 15.924307] dump_stack_lvl+0x73/0xb0 [ 15.924336] print_report+0xd1/0x610 [ 15.924359] ? __virt_addr_valid+0x1db/0x2d0 [ 15.924385] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.924409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.924472] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.924498] kasan_report+0x141/0x180 [ 15.924522] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.924551] __asan_report_load8_noabort+0x18/0x20 [ 15.924576] kasan_atomics_helper+0x4f98/0x5450 [ 15.924629] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.924655] ? kasan_save_alloc_info+0x3b/0x50 [ 15.924686] kasan_atomics+0x1dc/0x310 [ 15.924711] ? __pfx_kasan_atomics+0x10/0x10 [ 15.924735] ? __pfx_read_tsc+0x10/0x10 [ 15.924756] ? ktime_get_ts64+0x86/0x230 [ 15.924782] kunit_try_run_case+0x1a5/0x480 [ 15.924807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.924829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.924855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.924880] ? __kthread_parkme+0x82/0x180 [ 15.924939] ? preempt_count_sub+0x50/0x80 [ 15.924985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.925011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.925036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.925061] kthread+0x337/0x6f0 [ 15.925114] ? trace_preempt_on+0x20/0xc0 [ 15.925139] ? __pfx_kthread+0x10/0x10 [ 15.925161] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.925183] ? calculate_sigpending+0x7b/0xa0 [ 15.925208] ? __pfx_kthread+0x10/0x10 [ 15.925260] ret_from_fork+0x116/0x1d0 [ 15.925280] ? __pfx_kthread+0x10/0x10 [ 15.925301] ret_from_fork_asm+0x1a/0x30 [ 15.925334] </TASK> [ 15.925344] [ 15.933080] Allocated by task 282: [ 15.933269] kasan_save_stack+0x45/0x70 [ 15.933453] kasan_save_track+0x18/0x40 [ 15.933626] kasan_save_alloc_info+0x3b/0x50 [ 15.933843] __kasan_kmalloc+0xb7/0xc0 [ 15.934102] __kmalloc_cache_noprof+0x189/0x420 [ 15.934332] kasan_atomics+0x95/0x310 [ 15.934498] kunit_try_run_case+0x1a5/0x480 [ 15.934736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.935042] kthread+0x337/0x6f0 [ 15.935245] ret_from_fork+0x116/0x1d0 [ 15.935396] ret_from_fork_asm+0x1a/0x30 [ 15.935706] [ 15.935903] The buggy address belongs to the object at ffff8881029b7000 [ 15.935903] which belongs to the cache kmalloc-64 of size 64 [ 15.936461] The buggy address is located 0 bytes to the right of [ 15.936461] allocated 48-byte region [ffff8881029b7000, ffff8881029b7030) [ 15.937038] [ 15.937133] The buggy address belongs to the physical page: [ 15.937360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b7 [ 15.937687] flags: 0x200000000000000(node=0|zone=2) [ 15.937962] page_type: f5(slab) [ 15.938181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.938433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.938660] page dumped because: kasan: bad access detected [ 15.938839] [ 15.938959] Memory state around the buggy address: [ 15.939203] ffff8881029b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.939521] ffff8881029b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.939840] >ffff8881029b7000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.940152] ^ [ 15.940311] ffff8881029b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.940624] ffff8881029b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.940963] ==================================================================