Date
July 20, 2025, 8:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.713081] ================================================================== [ 17.713778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 17.713902] [ 17.714043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.715205] __kasan_check_write+0x20/0x30 [ 17.716248] kasan_save_stack+0x3c/0x68 [ 17.717499] kthread+0x328/0x630 [ 17.718372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.718943] page_type: f5(slab) [ 17.719755] [ 17.719817] Memory state around the buggy address: [ 17.720041] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.720228] ^ [ 17.722405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 17.722529] [ 17.723382] Hardware name: linux,dummy-virt (DT) [ 17.724377] kasan_atomics+0x198/0x2e0 [ 17.725130] ret_from_fork+0x10/0x20 [ 17.725645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.725985] The buggy address is located 0 bytes to the right of [ 17.725985] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.726415] page dumped because: kasan: bad access detected [ 17.726505] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.726693] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.727992] ================================================================== [ 17.648754] ================================================================== [ 17.649680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 17.649953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.650210] print_report+0x118/0x5d0 [ 17.650952] kasan_save_stack+0x3c/0x68 [ 17.651267] kasan_atomics+0xb8/0x2e0 [ 17.652153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.652416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.652515] page_type: f5(slab) [ 17.652561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.652621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.652700] [ 17.652858] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.653348] ================================================================== [ 17.884417] ================================================================== [ 17.884470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 17.884521] Read of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.884778] [ 17.884822] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.885440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.885536] Hardware name: linux,dummy-virt (DT) [ 17.885605] Call trace: [ 17.885718] show_stack+0x20/0x38 (C) [ 17.885776] dump_stack_lvl+0x8c/0xd0 [ 17.885853] print_report+0x118/0x5d0 [ 17.885901] kasan_report+0xdc/0x128 [ 17.886102] __asan_report_load4_noabort+0x20/0x30 [ 17.886271] kasan_atomics_helper+0x3dd8/0x4858 [ 17.886569] kasan_atomics+0x198/0x2e0 [ 17.886754] kunit_try_run_case+0x170/0x3f0 [ 17.886850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.887015] kthread+0x328/0x630 [ 17.887168] ret_from_fork+0x10/0x20 [ 17.887245] [ 17.887266] Allocated by task 266: [ 17.887611] kasan_save_stack+0x3c/0x68 [ 17.887686] kasan_save_track+0x20/0x40 [ 17.887773] kasan_save_alloc_info+0x40/0x58 [ 17.888069] __kasan_kmalloc+0xd4/0xd8 [ 17.888145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.888212] kasan_atomics+0xb8/0x2e0 [ 17.888250] kunit_try_run_case+0x170/0x3f0 [ 17.888529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.888756] kthread+0x328/0x630 [ 17.888961] ret_from_fork+0x10/0x20 [ 17.889059] [ 17.889159] The buggy address belongs to the object at fff00000c767ae00 [ 17.889159] which belongs to the cache kmalloc-64 of size 64 [ 17.889237] The buggy address is located 0 bytes to the right of [ 17.889237] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.889496] [ 17.889526] The buggy address belongs to the physical page: [ 17.889562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.889627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.889678] page_type: f5(slab) [ 17.889718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.889808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.889855] page dumped because: kasan: bad access detected [ 17.889889] [ 17.889910] Memory state around the buggy address: [ 17.889956] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.890012] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.890068] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.890124] ^ [ 17.890160] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.890231] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.890272] ================================================================== [ 18.170388] ================================================================== [ 18.170509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.170916] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.170984] [ 18.171015] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.171098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.171128] Hardware name: linux,dummy-virt (DT) [ 18.171161] Call trace: [ 18.171198] show_stack+0x20/0x38 (C) [ 18.171250] dump_stack_lvl+0x8c/0xd0 [ 18.171298] print_report+0x118/0x5d0 [ 18.171348] kasan_report+0xdc/0x128 [ 18.172523] __asan_report_load8_noabort+0x20/0x30 [ 18.173071] kasan_atomics_helper+0x3db0/0x4858 [ 18.173130] kasan_atomics+0x198/0x2e0 [ 18.173219] kunit_try_run_case+0x170/0x3f0 [ 18.173521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.173581] kthread+0x328/0x630 [ 18.173932] ret_from_fork+0x10/0x20 [ 18.174411] [ 18.174722] Allocated by task 266: [ 18.175022] kasan_save_stack+0x3c/0x68 [ 18.175567] kasan_save_track+0x20/0x40 [ 18.175626] kasan_save_alloc_info+0x40/0x58 [ 18.175754] __kasan_kmalloc+0xd4/0xd8 [ 18.175979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.176217] kasan_atomics+0xb8/0x2e0 [ 18.176273] kunit_try_run_case+0x170/0x3f0 [ 18.176916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.176972] kthread+0x328/0x630 [ 18.177412] ret_from_fork+0x10/0x20 [ 18.177455] [ 18.177478] The buggy address belongs to the object at fff00000c767ae00 [ 18.177478] which belongs to the cache kmalloc-64 of size 64 [ 18.177754] The buggy address is located 0 bytes to the right of [ 18.177754] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.177960] [ 18.177987] The buggy address belongs to the physical page: [ 18.178455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.178520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.178570] page_type: f5(slab) [ 18.178611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.178666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.178709] page dumped because: kasan: bad access detected [ 18.178744] [ 18.178891] Memory state around the buggy address: [ 18.178931] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.179491] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.179639] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.179685] ^ [ 18.179925] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.180090] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.180285] ================================================================== [ 18.049897] ================================================================== [ 18.050147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.050422] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.050808] [ 18.051153] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.051391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.051421] Hardware name: linux,dummy-virt (DT) [ 18.051454] Call trace: [ 18.051480] show_stack+0x20/0x38 (C) [ 18.052638] dump_stack_lvl+0x8c/0xd0 [ 18.052725] print_report+0x118/0x5d0 [ 18.052777] kasan_report+0xdc/0x128 [ 18.053209] kasan_check_range+0x100/0x1a8 [ 18.053563] __kasan_check_write+0x20/0x30 [ 18.053625] kasan_atomics_helper+0x1190/0x4858 [ 18.053796] kasan_atomics+0x198/0x2e0 [ 18.054077] kunit_try_run_case+0x170/0x3f0 [ 18.054159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.054549] kthread+0x328/0x630 [ 18.054927] ret_from_fork+0x10/0x20 [ 18.054982] [ 18.055448] Allocated by task 266: [ 18.055647] kasan_save_stack+0x3c/0x68 [ 18.055696] kasan_save_track+0x20/0x40 [ 18.056165] kasan_save_alloc_info+0x40/0x58 [ 18.056573] __kasan_kmalloc+0xd4/0xd8 [ 18.056723] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.056963] kasan_atomics+0xb8/0x2e0 [ 18.057008] kunit_try_run_case+0x170/0x3f0 [ 18.057064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.057585] kthread+0x328/0x630 [ 18.057642] ret_from_fork+0x10/0x20 [ 18.057681] [ 18.057706] The buggy address belongs to the object at fff00000c767ae00 [ 18.057706] which belongs to the cache kmalloc-64 of size 64 [ 18.057768] The buggy address is located 0 bytes to the right of [ 18.057768] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.057987] [ 18.058116] The buggy address belongs to the physical page: [ 18.058287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.058435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.059182] page_type: f5(slab) [ 18.059401] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.059457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.059500] page dumped because: kasan: bad access detected [ 18.059990] [ 18.060018] Memory state around the buggy address: [ 18.060089] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.060279] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.060327] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.060499] ^ [ 18.060649] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.060900] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.060997] ================================================================== [ 18.236039] ================================================================== [ 18.236148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.236213] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.236264] [ 18.236294] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.236424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.236455] Hardware name: linux,dummy-virt (DT) [ 18.236489] Call trace: [ 18.236513] show_stack+0x20/0x38 (C) [ 18.236562] dump_stack_lvl+0x8c/0xd0 [ 18.236794] print_report+0x118/0x5d0 [ 18.236858] kasan_report+0xdc/0x128 [ 18.236950] kasan_check_range+0x100/0x1a8 [ 18.237042] __kasan_check_write+0x20/0x30 [ 18.237321] kasan_atomics_helper+0x17ec/0x4858 [ 18.237585] kasan_atomics+0x198/0x2e0 [ 18.237666] kunit_try_run_case+0x170/0x3f0 [ 18.237754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.237850] kthread+0x328/0x630 [ 18.237940] ret_from_fork+0x10/0x20 [ 18.238011] [ 18.238042] Allocated by task 266: [ 18.238074] kasan_save_stack+0x3c/0x68 [ 18.238116] kasan_save_track+0x20/0x40 [ 18.238157] kasan_save_alloc_info+0x40/0x58 [ 18.238452] __kasan_kmalloc+0xd4/0xd8 [ 18.238575] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.238656] kasan_atomics+0xb8/0x2e0 [ 18.238743] kunit_try_run_case+0x170/0x3f0 [ 18.238788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.238834] kthread+0x328/0x630 [ 18.238869] ret_from_fork+0x10/0x20 [ 18.238909] [ 18.238950] The buggy address belongs to the object at fff00000c767ae00 [ 18.238950] which belongs to the cache kmalloc-64 of size 64 [ 18.239018] The buggy address is located 0 bytes to the right of [ 18.239018] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.239094] [ 18.239123] The buggy address belongs to the physical page: [ 18.239166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.239229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.239289] page_type: f5(slab) [ 18.239333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.239392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.239444] page dumped because: kasan: bad access detected [ 18.239480] [ 18.239503] Memory state around the buggy address: [ 18.239551] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.239597] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.239651] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.239692] ^ [ 18.239727] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.239779] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.239828] ================================================================== [ 18.228989] ================================================================== [ 18.229058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.229222] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.229322] [ 18.229445] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.229693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.229762] Hardware name: linux,dummy-virt (DT) [ 18.229863] Call trace: [ 18.229913] show_stack+0x20/0x38 (C) [ 18.230035] dump_stack_lvl+0x8c/0xd0 [ 18.230130] print_report+0x118/0x5d0 [ 18.230514] kasan_report+0xdc/0x128 [ 18.230633] __asan_report_load8_noabort+0x20/0x30 [ 18.230758] kasan_atomics_helper+0x3e20/0x4858 [ 18.230854] kasan_atomics+0x198/0x2e0 [ 18.230963] kunit_try_run_case+0x170/0x3f0 [ 18.231067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.231165] kthread+0x328/0x630 [ 18.231239] ret_from_fork+0x10/0x20 [ 18.231552] [ 18.231659] Allocated by task 266: [ 18.231737] kasan_save_stack+0x3c/0x68 [ 18.232070] kasan_save_track+0x20/0x40 [ 18.232211] kasan_save_alloc_info+0x40/0x58 [ 18.232288] __kasan_kmalloc+0xd4/0xd8 [ 18.232415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.232503] kasan_atomics+0xb8/0x2e0 [ 18.232602] kunit_try_run_case+0x170/0x3f0 [ 18.232698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.232806] kthread+0x328/0x630 [ 18.232854] ret_from_fork+0x10/0x20 [ 18.232902] [ 18.232927] The buggy address belongs to the object at fff00000c767ae00 [ 18.232927] which belongs to the cache kmalloc-64 of size 64 [ 18.232988] The buggy address is located 0 bytes to the right of [ 18.232988] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.233199] [ 18.233274] The buggy address belongs to the physical page: [ 18.233344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.233476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.233887] page_type: f5(slab) [ 18.233973] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.234055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.234148] page dumped because: kasan: bad access detected [ 18.234183] [ 18.234238] Memory state around the buggy address: [ 18.234271] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.234318] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.234365] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.234407] ^ [ 18.234442] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.234644] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.234800] ================================================================== [ 18.190783] ================================================================== [ 18.190833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.191175] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.191404] [ 18.191440] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.191521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.191550] Hardware name: linux,dummy-virt (DT) [ 18.192212] Call trace: [ 18.192255] show_stack+0x20/0x38 (C) [ 18.192313] dump_stack_lvl+0x8c/0xd0 [ 18.192364] print_report+0x118/0x5d0 [ 18.192413] kasan_report+0xdc/0x128 [ 18.192682] __asan_report_load8_noabort+0x20/0x30 [ 18.192737] kasan_atomics_helper+0x3df4/0x4858 [ 18.192788] kasan_atomics+0x198/0x2e0 [ 18.193308] kunit_try_run_case+0x170/0x3f0 [ 18.193382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.193494] kthread+0x328/0x630 [ 18.193552] ret_from_fork+0x10/0x20 [ 18.193624] [ 18.194010] Allocated by task 266: [ 18.194298] kasan_save_stack+0x3c/0x68 [ 18.194347] kasan_save_track+0x20/0x40 [ 18.194388] kasan_save_alloc_info+0x40/0x58 [ 18.194430] __kasan_kmalloc+0xd4/0xd8 [ 18.194471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.195222] kasan_atomics+0xb8/0x2e0 [ 18.195272] kunit_try_run_case+0x170/0x3f0 [ 18.195313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.195360] kthread+0x328/0x630 [ 18.195397] ret_from_fork+0x10/0x20 [ 18.195436] [ 18.195550] The buggy address belongs to the object at fff00000c767ae00 [ 18.195550] which belongs to the cache kmalloc-64 of size 64 [ 18.195663] The buggy address is located 0 bytes to the right of [ 18.195663] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.196159] [ 18.196198] The buggy address belongs to the physical page: [ 18.196233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.196290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.196340] page_type: f5(slab) [ 18.196381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.196434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.197144] page dumped because: kasan: bad access detected [ 18.197180] [ 18.197432] Memory state around the buggy address: [ 18.197781] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.197953] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.198070] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.198112] ^ [ 18.198372] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.198425] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.198467] ================================================================== [ 18.073582] ================================================================== [ 18.073635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.073686] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.074199] [ 18.074249] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.074733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.074763] Hardware name: linux,dummy-virt (DT) [ 18.074997] Call trace: [ 18.075099] show_stack+0x20/0x38 (C) [ 18.075378] dump_stack_lvl+0x8c/0xd0 [ 18.075472] print_report+0x118/0x5d0 [ 18.075787] kasan_report+0xdc/0x128 [ 18.075844] kasan_check_range+0x100/0x1a8 [ 18.075892] __kasan_check_write+0x20/0x30 [ 18.075939] kasan_atomics_helper+0x126c/0x4858 [ 18.075989] kasan_atomics+0x198/0x2e0 [ 18.076036] kunit_try_run_case+0x170/0x3f0 [ 18.076085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.077223] kthread+0x328/0x630 [ 18.077305] ret_from_fork+0x10/0x20 [ 18.077356] [ 18.077387] Allocated by task 266: [ 18.077417] kasan_save_stack+0x3c/0x68 [ 18.077489] kasan_save_track+0x20/0x40 [ 18.077639] kasan_save_alloc_info+0x40/0x58 [ 18.077790] __kasan_kmalloc+0xd4/0xd8 [ 18.078030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.078170] kasan_atomics+0xb8/0x2e0 [ 18.078235] kunit_try_run_case+0x170/0x3f0 [ 18.078278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.078554] kthread+0x328/0x630 [ 18.078636] ret_from_fork+0x10/0x20 [ 18.078890] [ 18.079060] The buggy address belongs to the object at fff00000c767ae00 [ 18.079060] which belongs to the cache kmalloc-64 of size 64 [ 18.079425] The buggy address is located 0 bytes to the right of [ 18.079425] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.079599] [ 18.079663] The buggy address belongs to the physical page: [ 18.079726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.079781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.079830] page_type: f5(slab) [ 18.080142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.080220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.080742] page dumped because: kasan: bad access detected [ 18.080829] [ 18.080852] Memory state around the buggy address: [ 18.081169] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.081662] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.081715] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.081759] ^ [ 18.081797] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.082480] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.082686] ================================================================== [ 17.796725] ================================================================== [ 17.796826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 17.797233] Write of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.797336] [ 17.797509] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.797936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.799966] kunit_try_run_case+0x170/0x3f0 [ 17.802222] [ 17.802858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.804344] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.807340] Call trace: [ 17.807871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.807927] kthread+0x328/0x630 [ 17.807980] ret_from_fork+0x10/0x20 [ 17.808030] [ 17.808051] Allocated by task 266: [ 17.808082] kasan_save_stack+0x3c/0x68 [ 17.808125] kasan_save_track+0x20/0x40 [ 17.808166] kasan_save_alloc_info+0x40/0x58 [ 17.808712] __kasan_kmalloc+0xd4/0xd8 [ 17.808947] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.809078] kasan_atomics+0xb8/0x2e0 [ 17.809137] kunit_try_run_case+0x170/0x3f0 [ 17.809177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.809238] kthread+0x328/0x630 [ 17.809281] ret_from_fork+0x10/0x20 [ 17.809631] [ 17.809748] The buggy address belongs to the object at fff00000c767ae00 [ 17.809748] which belongs to the cache kmalloc-64 of size 64 [ 17.809862] The buggy address is located 0 bytes to the right of [ 17.809862] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.809957] [ 17.810348] The buggy address belongs to the physical page: [ 17.810408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.810770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.810890] page_type: f5(slab) [ 17.810989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.811061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.811422] page dumped because: kasan: bad access detected [ 17.811497] [ 17.811541] Memory state around the buggy address: [ 17.811647] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.811714] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.811779] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.811905] ^ [ 17.811945] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.814538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.816328] [ 17.816352] Allocated by task 266: [ 17.816383] kasan_save_stack+0x3c/0x68 [ 17.816753] kasan_save_track+0x20/0x40 [ 17.816909] kasan_save_alloc_info+0x40/0x58 [ 17.817025] __kasan_kmalloc+0xd4/0xd8 [ 17.817184] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.817267] kasan_atomics+0xb8/0x2e0 [ 17.817325] kunit_try_run_case+0x170/0x3f0 [ 17.817366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.817759] kthread+0x328/0x630 [ 17.818456] ret_from_fork+0x10/0x20 [ 17.819029] [ 17.819206] The buggy address belongs to the object at fff00000c767ae00 [ 17.819206] which belongs to the cache kmalloc-64 of size 64 [ 17.819438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.819657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.819856] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.820102] ================================================================== [ 17.912051] ================================================================== [ 17.912106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 17.912158] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.912407] [ 17.912473] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.912568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.912607] Hardware name: linux,dummy-virt (DT) [ 17.912639] Call trace: [ 17.912674] show_stack+0x20/0x38 (C) [ 17.912729] dump_stack_lvl+0x8c/0xd0 [ 17.912777] print_report+0x118/0x5d0 [ 17.912847] kasan_report+0xdc/0x128 [ 17.913516] kasan_check_range+0x100/0x1a8 [ 17.913667] __kasan_check_read+0x20/0x30 [ 17.914062] kasan_atomics_helper+0xdd4/0x4858 [ 17.914172] kasan_atomics+0x198/0x2e0 [ 17.914303] kunit_try_run_case+0x170/0x3f0 [ 17.914463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.914551] kthread+0x328/0x630 [ 17.914594] ret_from_fork+0x10/0x20 [ 17.914813] [ 17.914876] Allocated by task 266: [ 17.914961] kasan_save_stack+0x3c/0x68 [ 17.915622] kasan_save_track+0x20/0x40 [ 17.916026] kasan_save_alloc_info+0x40/0x58 [ 17.916162] __kasan_kmalloc+0xd4/0xd8 [ 17.916228] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.916271] kasan_atomics+0xb8/0x2e0 [ 17.916539] kunit_try_run_case+0x170/0x3f0 [ 17.916758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.917146] kthread+0x328/0x630 [ 17.917302] ret_from_fork+0x10/0x20 [ 17.917768] [ 17.917824] The buggy address belongs to the object at fff00000c767ae00 [ 17.917824] which belongs to the cache kmalloc-64 of size 64 [ 17.918001] The buggy address is located 0 bytes to the right of [ 17.918001] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.918136] [ 17.918202] The buggy address belongs to the physical page: [ 17.918325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.918385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.918828] page_type: f5(slab) [ 17.919229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.919326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.919389] page dumped because: kasan: bad access detected [ 17.919993] [ 17.920024] Memory state around the buggy address: [ 17.920318] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.920486] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.920733] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.920934] ^ [ 17.920996] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.921129] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.921183] ================================================================== [ 17.892568] ================================================================== [ 17.892723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 17.892799] Write of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.892853] [ 17.892994] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.893148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.893244] Hardware name: linux,dummy-virt (DT) [ 17.893302] Call trace: [ 17.893328] show_stack+0x20/0x38 (C) [ 17.893637] dump_stack_lvl+0x8c/0xd0 [ 17.893785] print_report+0x118/0x5d0 [ 17.894213] kasan_report+0xdc/0x128 [ 17.894308] kasan_check_range+0x100/0x1a8 [ 17.894432] __kasan_check_write+0x20/0x30 [ 17.894549] kasan_atomics_helper+0xd3c/0x4858 [ 17.894692] kasan_atomics+0x198/0x2e0 [ 17.894742] kunit_try_run_case+0x170/0x3f0 [ 17.895076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.895332] kthread+0x328/0x630 [ 17.895673] ret_from_fork+0x10/0x20 [ 17.895842] [ 17.895913] Allocated by task 266: [ 17.895980] kasan_save_stack+0x3c/0x68 [ 17.896205] kasan_save_track+0x20/0x40 [ 17.896402] kasan_save_alloc_info+0x40/0x58 [ 17.896664] __kasan_kmalloc+0xd4/0xd8 [ 17.896787] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.896843] kasan_atomics+0xb8/0x2e0 [ 17.897040] kunit_try_run_case+0x170/0x3f0 [ 17.897572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.897660] kthread+0x328/0x630 [ 17.897709] ret_from_fork+0x10/0x20 [ 17.897750] [ 17.897773] The buggy address belongs to the object at fff00000c767ae00 [ 17.897773] which belongs to the cache kmalloc-64 of size 64 [ 17.897835] The buggy address is located 0 bytes to the right of [ 17.897835] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.898207] [ 17.898716] The buggy address belongs to the physical page: [ 17.899010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.899149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.899228] page_type: f5(slab) [ 17.899289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.899351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.899396] page dumped because: kasan: bad access detected [ 17.899431] [ 17.899462] Memory state around the buggy address: [ 17.899510] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.899572] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.899618] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.899680] ^ [ 17.899716] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.899781] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.899831] ================================================================== [ 18.218148] ================================================================== [ 18.218290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.218513] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.218572] [ 18.218605] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.218688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.218718] Hardware name: linux,dummy-virt (DT) [ 18.218751] Call trace: [ 18.218776] show_stack+0x20/0x38 (C) [ 18.218826] dump_stack_lvl+0x8c/0xd0 [ 18.219609] print_report+0x118/0x5d0 [ 18.220021] kasan_report+0xdc/0x128 [ 18.220081] __asan_report_load8_noabort+0x20/0x30 [ 18.220137] kasan_atomics_helper+0x3e10/0x4858 [ 18.220199] kasan_atomics+0x198/0x2e0 [ 18.220738] kunit_try_run_case+0x170/0x3f0 [ 18.220816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.221313] kthread+0x328/0x630 [ 18.221394] ret_from_fork+0x10/0x20 [ 18.222304] [ 18.222329] Allocated by task 266: [ 18.222370] kasan_save_stack+0x3c/0x68 [ 18.222414] kasan_save_track+0x20/0x40 [ 18.222464] kasan_save_alloc_info+0x40/0x58 [ 18.222507] __kasan_kmalloc+0xd4/0xd8 [ 18.222545] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.222587] kasan_atomics+0xb8/0x2e0 [ 18.222624] kunit_try_run_case+0x170/0x3f0 [ 18.222664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.222710] kthread+0x328/0x630 [ 18.222746] ret_from_fork+0x10/0x20 [ 18.222783] [ 18.222804] The buggy address belongs to the object at fff00000c767ae00 [ 18.222804] which belongs to the cache kmalloc-64 of size 64 [ 18.222864] The buggy address is located 0 bytes to the right of [ 18.222864] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.222931] [ 18.222954] The buggy address belongs to the physical page: [ 18.222988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.223042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.223092] page_type: f5(slab) [ 18.223131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.223184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.223238] page dumped because: kasan: bad access detected [ 18.223272] [ 18.223293] Memory state around the buggy address: [ 18.223327] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.223373] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.223418] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.223458] ^ [ 18.223495] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.223540] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.223578] ================================================================== [ 18.127704] ================================================================== [ 18.127760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.128290] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.128373] [ 18.128407] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.128686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.128717] Hardware name: linux,dummy-virt (DT) [ 18.129239] Call trace: [ 18.129326] show_stack+0x20/0x38 (C) [ 18.129382] dump_stack_lvl+0x8c/0xd0 [ 18.129596] print_report+0x118/0x5d0 [ 18.129674] kasan_report+0xdc/0x128 [ 18.129768] kasan_check_range+0x100/0x1a8 [ 18.130199] __kasan_check_write+0x20/0x30 [ 18.130262] kasan_atomics_helper+0x147c/0x4858 [ 18.130564] kasan_atomics+0x198/0x2e0 [ 18.130795] kunit_try_run_case+0x170/0x3f0 [ 18.131078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.131320] kthread+0x328/0x630 [ 18.131388] ret_from_fork+0x10/0x20 [ 18.131442] [ 18.131464] Allocated by task 266: [ 18.131495] kasan_save_stack+0x3c/0x68 [ 18.131538] kasan_save_track+0x20/0x40 [ 18.131578] kasan_save_alloc_info+0x40/0x58 [ 18.131619] __kasan_kmalloc+0xd4/0xd8 [ 18.132327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.132802] kasan_atomics+0xb8/0x2e0 [ 18.132914] kunit_try_run_case+0x170/0x3f0 [ 18.133148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.133471] kthread+0x328/0x630 [ 18.133678] ret_from_fork+0x10/0x20 [ 18.133846] [ 18.134039] The buggy address belongs to the object at fff00000c767ae00 [ 18.134039] which belongs to the cache kmalloc-64 of size 64 [ 18.134103] The buggy address is located 0 bytes to the right of [ 18.134103] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.134171] [ 18.134204] The buggy address belongs to the physical page: [ 18.134757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.134841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.134924] page_type: f5(slab) [ 18.135031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.135086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.135410] page dumped because: kasan: bad access detected [ 18.135721] [ 18.135746] Memory state around the buggy address: [ 18.135804] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.136135] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.136329] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.136559] ^ [ 18.136639] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.136828] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.136943] ================================================================== [ 18.115608] ================================================================== [ 18.115803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.115887] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.116148] [ 18.116360] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.116790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.117217] Hardware name: linux,dummy-virt (DT) [ 18.117257] Call trace: [ 18.117431] show_stack+0x20/0x38 (C) [ 18.117781] dump_stack_lvl+0x8c/0xd0 [ 18.117942] print_report+0x118/0x5d0 [ 18.117994] kasan_report+0xdc/0x128 [ 18.118539] kasan_check_range+0x100/0x1a8 [ 18.118752] __kasan_check_write+0x20/0x30 [ 18.119144] kasan_atomics_helper+0x1414/0x4858 [ 18.119800] kasan_atomics+0x198/0x2e0 [ 18.119890] kunit_try_run_case+0x170/0x3f0 [ 18.120230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.120598] kthread+0x328/0x630 [ 18.120977] ret_from_fork+0x10/0x20 [ 18.121049] [ 18.121074] Allocated by task 266: [ 18.121104] kasan_save_stack+0x3c/0x68 [ 18.121155] kasan_save_track+0x20/0x40 [ 18.121352] kasan_save_alloc_info+0x40/0x58 [ 18.121417] __kasan_kmalloc+0xd4/0xd8 [ 18.121464] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.121850] kasan_atomics+0xb8/0x2e0 [ 18.121907] kunit_try_run_case+0x170/0x3f0 [ 18.122217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.122520] kthread+0x328/0x630 [ 18.122564] ret_from_fork+0x10/0x20 [ 18.122660] [ 18.122900] The buggy address belongs to the object at fff00000c767ae00 [ 18.122900] which belongs to the cache kmalloc-64 of size 64 [ 18.123403] The buggy address is located 0 bytes to the right of [ 18.123403] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.123531] [ 18.123696] The buggy address belongs to the physical page: [ 18.123889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.124115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.124430] page_type: f5(slab) [ 18.124499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.124955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.125006] page dumped because: kasan: bad access detected [ 18.125041] [ 18.125070] Memory state around the buggy address: [ 18.125107] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.125153] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.125208] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.125727] ^ [ 18.125999] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.126046] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.126118] ================================================================== [ 18.138184] ================================================================== [ 18.138254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.138305] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.138943] [ 18.139008] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.139094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.139125] Hardware name: linux,dummy-virt (DT) [ 18.139159] Call trace: [ 18.139903] show_stack+0x20/0x38 (C) [ 18.140284] dump_stack_lvl+0x8c/0xd0 [ 18.140356] print_report+0x118/0x5d0 [ 18.140419] kasan_report+0xdc/0x128 [ 18.140474] kasan_check_range+0x100/0x1a8 [ 18.140864] __kasan_check_write+0x20/0x30 [ 18.141200] kasan_atomics_helper+0x14e4/0x4858 [ 18.141256] kasan_atomics+0x198/0x2e0 [ 18.141598] kunit_try_run_case+0x170/0x3f0 [ 18.141665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.141763] kthread+0x328/0x630 [ 18.141808] ret_from_fork+0x10/0x20 [ 18.142339] [ 18.142368] Allocated by task 266: [ 18.142404] kasan_save_stack+0x3c/0x68 [ 18.142451] kasan_save_track+0x20/0x40 [ 18.142916] kasan_save_alloc_info+0x40/0x58 [ 18.143082] __kasan_kmalloc+0xd4/0xd8 [ 18.143204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.143883] kasan_atomics+0xb8/0x2e0 [ 18.143930] kunit_try_run_case+0x170/0x3f0 [ 18.143969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.144307] kthread+0x328/0x630 [ 18.144635] ret_from_fork+0x10/0x20 [ 18.144779] [ 18.144802] The buggy address belongs to the object at fff00000c767ae00 [ 18.144802] which belongs to the cache kmalloc-64 of size 64 [ 18.145277] The buggy address is located 0 bytes to the right of [ 18.145277] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.145385] [ 18.145408] The buggy address belongs to the physical page: [ 18.145442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.145496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.145546] page_type: f5(slab) [ 18.146026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.146239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.146291] page dumped because: kasan: bad access detected [ 18.146615] [ 18.146642] Memory state around the buggy address: [ 18.146833] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.147061] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.147110] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.147480] ^ [ 18.147772] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.148093] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.148624] ================================================================== [ 18.083596] ================================================================== [ 18.083985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.084278] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.084492] [ 18.084644] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.084738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.085007] Hardware name: linux,dummy-virt (DT) [ 18.085371] Call trace: [ 18.085507] show_stack+0x20/0x38 (C) [ 18.085566] dump_stack_lvl+0x8c/0xd0 [ 18.085616] print_report+0x118/0x5d0 [ 18.085808] kasan_report+0xdc/0x128 [ 18.086158] kasan_check_range+0x100/0x1a8 [ 18.086238] __kasan_check_write+0x20/0x30 [ 18.086475] kasan_atomics_helper+0x12d8/0x4858 [ 18.086932] kasan_atomics+0x198/0x2e0 [ 18.087239] kunit_try_run_case+0x170/0x3f0 [ 18.087296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.087352] kthread+0x328/0x630 [ 18.087395] ret_from_fork+0x10/0x20 [ 18.088152] [ 18.088181] Allocated by task 266: [ 18.088224] kasan_save_stack+0x3c/0x68 [ 18.088741] kasan_save_track+0x20/0x40 [ 18.088970] kasan_save_alloc_info+0x40/0x58 [ 18.089040] __kasan_kmalloc+0xd4/0xd8 [ 18.089084] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.089132] kasan_atomics+0xb8/0x2e0 [ 18.089169] kunit_try_run_case+0x170/0x3f0 [ 18.089513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.089741] kthread+0x328/0x630 [ 18.089777] ret_from_fork+0x10/0x20 [ 18.090071] [ 18.090199] The buggy address belongs to the object at fff00000c767ae00 [ 18.090199] which belongs to the cache kmalloc-64 of size 64 [ 18.090782] The buggy address is located 0 bytes to the right of [ 18.090782] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.090867] [ 18.091260] The buggy address belongs to the physical page: [ 18.091305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.091537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.091589] page_type: f5(slab) [ 18.091997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.092180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.092330] page dumped because: kasan: bad access detected [ 18.092372] [ 18.092521] Memory state around the buggy address: [ 18.092560] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.092835] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.092889] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.092930] ^ [ 18.092968] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093599] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093697] ================================================================== [ 17.736420] ================================================================== [ 17.736476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 17.736564] Write of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.736626] [ 17.737028] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.737392] Hardware name: linux,dummy-virt (DT) [ 17.737874] dump_stack_lvl+0x8c/0xd0 [ 17.738060] print_report+0x118/0x5d0 [ 17.738463] kasan_atomics_helper+0x684/0x4858 [ 17.739056] kunit_try_run_case+0x170/0x3f0 [ 17.739221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.739321] kthread+0x328/0x630 [ 17.739373] ret_from_fork+0x10/0x20 [ 17.740017] kasan_save_track+0x20/0x40 [ 17.740104] kasan_save_alloc_info+0x40/0x58 [ 17.740165] __kasan_kmalloc+0xd4/0xd8 [ 17.740390] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.740975] kthread+0x328/0x630 [ 17.741069] ret_from_fork+0x10/0x20 [ 17.741111] [ 17.741134] The buggy address belongs to the object at fff00000c767ae00 [ 17.741134] which belongs to the cache kmalloc-64 of size 64 [ 17.741808] [ 17.741847] The buggy address belongs to the physical page: [ 17.741971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.742876] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.743208] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.743301] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.743816] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.744126] ================================================================== [ 17.972969] ================================================================== [ 17.973035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 17.973095] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.973598] [ 17.973639] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.973763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.973933] Hardware name: linux,dummy-virt (DT) [ 17.974132] Call trace: [ 17.974165] show_stack+0x20/0x38 (C) [ 17.974460] dump_stack_lvl+0x8c/0xd0 [ 17.974850] print_report+0x118/0x5d0 [ 17.975022] kasan_report+0xdc/0x128 [ 17.975219] kasan_check_range+0x100/0x1a8 [ 17.975467] __kasan_check_write+0x20/0x30 [ 17.975815] kasan_atomics_helper+0xf20/0x4858 [ 17.976019] kasan_atomics+0x198/0x2e0 [ 17.976354] kunit_try_run_case+0x170/0x3f0 [ 17.976558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.976616] kthread+0x328/0x630 [ 17.977007] ret_from_fork+0x10/0x20 [ 17.977077] [ 17.977098] Allocated by task 266: [ 17.977128] kasan_save_stack+0x3c/0x68 [ 17.977296] kasan_save_track+0x20/0x40 [ 17.977654] kasan_save_alloc_info+0x40/0x58 [ 17.977928] __kasan_kmalloc+0xd4/0xd8 [ 17.978132] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.978308] kasan_atomics+0xb8/0x2e0 [ 17.978357] kunit_try_run_case+0x170/0x3f0 [ 17.978435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.978695] kthread+0x328/0x630 [ 17.978747] ret_from_fork+0x10/0x20 [ 17.978940] [ 17.979011] The buggy address belongs to the object at fff00000c767ae00 [ 17.979011] which belongs to the cache kmalloc-64 of size 64 [ 17.979507] The buggy address is located 0 bytes to the right of [ 17.979507] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.979994] [ 17.980934] The buggy address belongs to the physical page: [ 17.980973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.981215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.981601] page_type: f5(slab) [ 17.981690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.981746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.982050] page dumped because: kasan: bad access detected [ 17.982240] [ 17.982263] Memory state around the buggy address: [ 17.982587] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983027] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983306] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.983478] ^ [ 17.983522] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.983566] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.983731] ================================================================== [ 18.105335] ================================================================== [ 18.105634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.105692] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.105997] [ 18.106074] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.106336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.106372] Hardware name: linux,dummy-virt (DT) [ 18.106406] Call trace: [ 18.106594] show_stack+0x20/0x38 (C) [ 18.106978] dump_stack_lvl+0x8c/0xd0 [ 18.107047] print_report+0x118/0x5d0 [ 18.107105] kasan_report+0xdc/0x128 [ 18.107153] __asan_report_load8_noabort+0x20/0x30 [ 18.107217] kasan_atomics_helper+0x3f04/0x4858 [ 18.107267] kasan_atomics+0x198/0x2e0 [ 18.107316] kunit_try_run_case+0x170/0x3f0 [ 18.107367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.107424] kthread+0x328/0x630 [ 18.107468] ret_from_fork+0x10/0x20 [ 18.107799] [ 18.107883] Allocated by task 266: [ 18.107923] kasan_save_stack+0x3c/0x68 [ 18.108387] kasan_save_track+0x20/0x40 [ 18.108429] kasan_save_alloc_info+0x40/0x58 [ 18.108471] __kasan_kmalloc+0xd4/0xd8 [ 18.108998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.109078] kasan_atomics+0xb8/0x2e0 [ 18.109117] kunit_try_run_case+0x170/0x3f0 [ 18.109166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.109731] kthread+0x328/0x630 [ 18.109773] ret_from_fork+0x10/0x20 [ 18.109813] [ 18.109838] The buggy address belongs to the object at fff00000c767ae00 [ 18.109838] which belongs to the cache kmalloc-64 of size 64 [ 18.109901] The buggy address is located 0 bytes to the right of [ 18.109901] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.110252] [ 18.110509] The buggy address belongs to the physical page: [ 18.110552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.110811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.110864] page_type: f5(slab) [ 18.111470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.111822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.112123] page dumped because: kasan: bad access detected [ 18.112488] [ 18.112514] Memory state around the buggy address: [ 18.113208] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.113373] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.113450] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.113492] ^ [ 18.113910] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.113987] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.114351] ================================================================== [ 18.224093] ================================================================== [ 18.224144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.224225] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.224279] [ 18.224311] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.224394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.224422] Hardware name: linux,dummy-virt (DT) [ 18.224456] Call trace: [ 18.224480] show_stack+0x20/0x38 (C) [ 18.224533] dump_stack_lvl+0x8c/0xd0 [ 18.224588] print_report+0x118/0x5d0 [ 18.225466] kasan_report+0xdc/0x128 [ 18.225546] kasan_check_range+0x100/0x1a8 [ 18.225596] __kasan_check_write+0x20/0x30 [ 18.225645] kasan_atomics_helper+0x175c/0x4858 [ 18.226004] kasan_atomics+0x198/0x2e0 [ 18.226199] kunit_try_run_case+0x170/0x3f0 [ 18.226333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.226407] kthread+0x328/0x630 [ 18.226597] ret_from_fork+0x10/0x20 [ 18.226870] [ 18.226990] Allocated by task 266: [ 18.227074] kasan_save_stack+0x3c/0x68 [ 18.227130] kasan_save_track+0x20/0x40 [ 18.227169] kasan_save_alloc_info+0x40/0x58 [ 18.227224] __kasan_kmalloc+0xd4/0xd8 [ 18.227262] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.227313] kasan_atomics+0xb8/0x2e0 [ 18.227349] kunit_try_run_case+0x170/0x3f0 [ 18.227390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.227435] kthread+0x328/0x630 [ 18.227471] ret_from_fork+0x10/0x20 [ 18.227522] [ 18.227566] The buggy address belongs to the object at fff00000c767ae00 [ 18.227566] which belongs to the cache kmalloc-64 of size 64 [ 18.227641] The buggy address is located 0 bytes to the right of [ 18.227641] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.227720] [ 18.227765] The buggy address belongs to the physical page: [ 18.227818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.227881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.227931] page_type: f5(slab) [ 18.227971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.228030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.228075] page dumped because: kasan: bad access detected [ 18.228127] [ 18.228170] Memory state around the buggy address: [ 18.228214] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.228259] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.228304] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.228344] ^ [ 18.228379] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.228424] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.228499] ================================================================== [ 17.901137] ================================================================== [ 17.901201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 17.901253] Read of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.901305] [ 17.901773] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.902170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.902410] Hardware name: linux,dummy-virt (DT) [ 17.902460] Call trace: [ 17.902522] show_stack+0x20/0x38 (C) [ 17.903019] dump_stack_lvl+0x8c/0xd0 [ 17.903088] print_report+0x118/0x5d0 [ 17.903474] kasan_report+0xdc/0x128 [ 17.903746] __asan_report_load4_noabort+0x20/0x30 [ 17.904072] kasan_atomics_helper+0x3e04/0x4858 [ 17.904261] kasan_atomics+0x198/0x2e0 [ 17.904353] kunit_try_run_case+0x170/0x3f0 [ 17.904412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.904802] kthread+0x328/0x630 [ 17.905216] ret_from_fork+0x10/0x20 [ 17.905467] [ 17.905537] Allocated by task 266: [ 17.905689] kasan_save_stack+0x3c/0x68 [ 17.905752] kasan_save_track+0x20/0x40 [ 17.905823] kasan_save_alloc_info+0x40/0x58 [ 17.905869] __kasan_kmalloc+0xd4/0xd8 [ 17.906266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.906598] kasan_atomics+0xb8/0x2e0 [ 17.906659] kunit_try_run_case+0x170/0x3f0 [ 17.907096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.907316] kthread+0x328/0x630 [ 17.907516] ret_from_fork+0x10/0x20 [ 17.907594] [ 17.907637] The buggy address belongs to the object at fff00000c767ae00 [ 17.907637] which belongs to the cache kmalloc-64 of size 64 [ 17.908146] The buggy address is located 0 bytes to the right of [ 17.908146] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.908358] [ 17.908467] The buggy address belongs to the physical page: [ 17.908595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.908654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.908718] page_type: f5(slab) [ 17.908766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.909283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.909373] page dumped because: kasan: bad access detected [ 17.909412] [ 17.909904] Memory state around the buggy address: [ 17.910122] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.910181] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.910343] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.910428] ^ [ 17.910485] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.910624] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.910702] ================================================================== [ 18.062576] ================================================================== [ 18.062772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.062825] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.062877] [ 18.062911] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.062994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.063021] Hardware name: linux,dummy-virt (DT) [ 18.063055] Call trace: [ 18.063079] show_stack+0x20/0x38 (C) [ 18.063130] dump_stack_lvl+0x8c/0xd0 [ 18.063179] print_report+0x118/0x5d0 [ 18.063730] kasan_report+0xdc/0x128 [ 18.064950] kasan_check_range+0x100/0x1a8 [ 18.065025] __kasan_check_write+0x20/0x30 [ 18.065137] kasan_atomics_helper+0x11f8/0x4858 [ 18.065198] kasan_atomics+0x198/0x2e0 [ 18.065432] kunit_try_run_case+0x170/0x3f0 [ 18.065506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.065688] kthread+0x328/0x630 [ 18.066085] ret_from_fork+0x10/0x20 [ 18.066153] [ 18.066309] Allocated by task 266: [ 18.066543] kasan_save_stack+0x3c/0x68 [ 18.066590] kasan_save_track+0x20/0x40 [ 18.066629] kasan_save_alloc_info+0x40/0x58 [ 18.066671] __kasan_kmalloc+0xd4/0xd8 [ 18.067105] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.067174] kasan_atomics+0xb8/0x2e0 [ 18.067786] kunit_try_run_case+0x170/0x3f0 [ 18.067845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.068242] kthread+0x328/0x630 [ 18.068607] ret_from_fork+0x10/0x20 [ 18.068664] [ 18.068691] The buggy address belongs to the object at fff00000c767ae00 [ 18.068691] which belongs to the cache kmalloc-64 of size 64 [ 18.068753] The buggy address is located 0 bytes to the right of [ 18.068753] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.069379] [ 18.069411] The buggy address belongs to the physical page: [ 18.069493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.069557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.069628] page_type: f5(slab) [ 18.069670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.069724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.069954] page dumped because: kasan: bad access detected [ 18.070217] [ 18.070300] Memory state around the buggy address: [ 18.070337] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.070686] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.070741] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.070783] ^ [ 18.070821] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.070864] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.070905] ================================================================== [ 17.958862] ================================================================== [ 17.959438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 17.959588] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.959642] [ 17.959676] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.959760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.959791] Hardware name: linux,dummy-virt (DT) [ 17.959824] Call trace: [ 17.959849] show_stack+0x20/0x38 (C) [ 17.960324] dump_stack_lvl+0x8c/0xd0 [ 17.960813] print_report+0x118/0x5d0 [ 17.961168] kasan_report+0xdc/0x128 [ 17.961362] kasan_check_range+0x100/0x1a8 [ 17.961439] __kasan_check_write+0x20/0x30 [ 17.961501] kasan_atomics_helper+0xeb8/0x4858 [ 17.961708] kasan_atomics+0x198/0x2e0 [ 17.961990] kunit_try_run_case+0x170/0x3f0 [ 17.962412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.962479] kthread+0x328/0x630 [ 17.962901] ret_from_fork+0x10/0x20 [ 17.963161] [ 17.963494] Allocated by task 266: [ 17.963943] kasan_save_stack+0x3c/0x68 [ 17.963999] kasan_save_track+0x20/0x40 [ 17.964259] kasan_save_alloc_info+0x40/0x58 [ 17.964506] __kasan_kmalloc+0xd4/0xd8 [ 17.964547] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.964908] kasan_atomics+0xb8/0x2e0 [ 17.965283] kunit_try_run_case+0x170/0x3f0 [ 17.965404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.965741] kthread+0x328/0x630 [ 17.965783] ret_from_fork+0x10/0x20 [ 17.966148] [ 17.966381] The buggy address belongs to the object at fff00000c767ae00 [ 17.966381] which belongs to the cache kmalloc-64 of size 64 [ 17.966679] The buggy address is located 0 bytes to the right of [ 17.966679] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.967043] [ 17.967077] The buggy address belongs to the physical page: [ 17.967512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.967956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.968046] page_type: f5(slab) [ 17.968267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.968328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.968372] page dumped because: kasan: bad access detected [ 17.968406] [ 17.968710] Memory state around the buggy address: [ 17.969205] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.969258] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.969353] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.969723] ^ [ 17.969768] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.970038] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.970104] ================================================================== [ 18.149310] ================================================================== [ 18.149779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.150180] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.150251] [ 18.150285] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.150368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.150397] Hardware name: linux,dummy-virt (DT) [ 18.151048] Call trace: [ 18.151368] show_stack+0x20/0x38 (C) [ 18.151821] dump_stack_lvl+0x8c/0xd0 [ 18.151886] print_report+0x118/0x5d0 [ 18.152202] kasan_report+0xdc/0x128 [ 18.152304] kasan_check_range+0x100/0x1a8 [ 18.152364] __kasan_check_write+0x20/0x30 [ 18.152835] kasan_atomics_helper+0x154c/0x4858 [ 18.152987] kasan_atomics+0x198/0x2e0 [ 18.153177] kunit_try_run_case+0x170/0x3f0 [ 18.153338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.153416] kthread+0x328/0x630 [ 18.153695] ret_from_fork+0x10/0x20 [ 18.154039] [ 18.154062] Allocated by task 266: [ 18.154093] kasan_save_stack+0x3c/0x68 [ 18.154136] kasan_save_track+0x20/0x40 [ 18.154177] kasan_save_alloc_info+0x40/0x58 [ 18.154229] __kasan_kmalloc+0xd4/0xd8 [ 18.154270] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.154311] kasan_atomics+0xb8/0x2e0 [ 18.154839] kunit_try_run_case+0x170/0x3f0 [ 18.155451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.155536] kthread+0x328/0x630 [ 18.155571] ret_from_fork+0x10/0x20 [ 18.155940] [ 18.155967] The buggy address belongs to the object at fff00000c767ae00 [ 18.155967] which belongs to the cache kmalloc-64 of size 64 [ 18.156060] The buggy address is located 0 bytes to the right of [ 18.156060] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.156259] [ 18.156371] The buggy address belongs to the physical page: [ 18.156556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.156644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.156696] page_type: f5(slab) [ 18.157166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.157312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.157357] page dumped because: kasan: bad access detected [ 18.157812] [ 18.157846] Memory state around the buggy address: [ 18.157890] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.158162] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.158221] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.158567] ^ [ 18.158617] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.158958] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.159002] ================================================================== [ 17.946644] ================================================================== [ 17.946698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 17.946750] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.946804] [ 17.946839] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.946921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.948802] Hardware name: linux,dummy-virt (DT) [ 17.949027] Call trace: [ 17.949135] show_stack+0x20/0x38 (C) [ 17.949445] dump_stack_lvl+0x8c/0xd0 [ 17.949602] print_report+0x118/0x5d0 [ 17.949674] kasan_report+0xdc/0x128 [ 17.949723] __asan_report_store8_noabort+0x20/0x30 [ 17.949901] kasan_atomics_helper+0x3e5c/0x4858 [ 17.949955] kasan_atomics+0x198/0x2e0 [ 17.950025] kunit_try_run_case+0x170/0x3f0 [ 17.950078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.950132] kthread+0x328/0x630 [ 17.950497] ret_from_fork+0x10/0x20 [ 17.951345] [ 17.951498] Allocated by task 266: [ 17.951731] kasan_save_stack+0x3c/0x68 [ 17.952119] kasan_save_track+0x20/0x40 [ 17.952218] kasan_save_alloc_info+0x40/0x58 [ 17.952260] __kasan_kmalloc+0xd4/0xd8 [ 17.952299] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.952786] kasan_atomics+0xb8/0x2e0 [ 17.953205] kunit_try_run_case+0x170/0x3f0 [ 17.953251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.953305] kthread+0x328/0x630 [ 17.953690] ret_from_fork+0x10/0x20 [ 17.953733] [ 17.953755] The buggy address belongs to the object at fff00000c767ae00 [ 17.953755] which belongs to the cache kmalloc-64 of size 64 [ 17.953817] The buggy address is located 0 bytes to the right of [ 17.953817] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.953885] [ 17.954418] The buggy address belongs to the physical page: [ 17.954460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.954537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.954622] page_type: f5(slab) [ 17.954945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.955014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.955166] page dumped because: kasan: bad access detected [ 17.955211] [ 17.955545] Memory state around the buggy address: [ 17.955901] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.956294] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.956417] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.956724] ^ [ 17.956773] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.957167] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.957327] ================================================================== [ 18.160168] ================================================================== [ 18.160252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.160687] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.160747] [ 18.161325] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.161677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.161849] Hardware name: linux,dummy-virt (DT) [ 18.161889] Call trace: [ 18.161915] show_stack+0x20/0x38 (C) [ 18.162002] dump_stack_lvl+0x8c/0xd0 [ 18.162306] print_report+0x118/0x5d0 [ 18.162725] kasan_report+0xdc/0x128 [ 18.163047] kasan_check_range+0x100/0x1a8 [ 18.163422] __kasan_check_write+0x20/0x30 [ 18.163653] kasan_atomics_helper+0x15b4/0x4858 [ 18.163707] kasan_atomics+0x198/0x2e0 [ 18.164255] kunit_try_run_case+0x170/0x3f0 [ 18.164614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.164678] kthread+0x328/0x630 [ 18.164942] ret_from_fork+0x10/0x20 [ 18.164999] [ 18.165029] Allocated by task 266: [ 18.165066] kasan_save_stack+0x3c/0x68 [ 18.165294] kasan_save_track+0x20/0x40 [ 18.165335] kasan_save_alloc_info+0x40/0x58 [ 18.165376] __kasan_kmalloc+0xd4/0xd8 [ 18.165416] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.165968] kasan_atomics+0xb8/0x2e0 [ 18.166034] kunit_try_run_case+0x170/0x3f0 [ 18.166100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.166154] kthread+0x328/0x630 [ 18.166282] ret_from_fork+0x10/0x20 [ 18.166569] [ 18.166593] The buggy address belongs to the object at fff00000c767ae00 [ 18.166593] which belongs to the cache kmalloc-64 of size 64 [ 18.166657] The buggy address is located 0 bytes to the right of [ 18.166657] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.166724] [ 18.166880] The buggy address belongs to the physical page: [ 18.166920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.167455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.167704] page_type: f5(slab) [ 18.167769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.167884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.168004] page dumped because: kasan: bad access detected [ 18.168232] [ 18.168256] Memory state around the buggy address: [ 18.168381] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168429] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168920] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.168972] ^ [ 18.169108] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169166] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169327] ================================================================== [ 17.932389] ================================================================== [ 17.932449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 17.932500] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.932552] [ 17.932661] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.932750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.932780] Hardware name: linux,dummy-virt (DT) [ 17.932816] Call trace: [ 17.932846] show_stack+0x20/0x38 (C) [ 17.932929] dump_stack_lvl+0x8c/0xd0 [ 17.933317] print_report+0x118/0x5d0 [ 17.933675] kasan_report+0xdc/0x128 [ 17.934064] kasan_check_range+0x100/0x1a8 [ 17.934458] __kasan_check_write+0x20/0x30 [ 17.934646] kasan_atomics_helper+0xe44/0x4858 [ 17.934757] kasan_atomics+0x198/0x2e0 [ 17.934951] kunit_try_run_case+0x170/0x3f0 [ 17.935055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.935959] kthread+0x328/0x630 [ 17.939632] ret_from_fork+0x10/0x20 [ 17.939773] [ 17.939798] Allocated by task 266: [ 17.939881] kasan_save_stack+0x3c/0x68 [ 17.940484] kasan_save_track+0x20/0x40 [ 17.940530] kasan_save_alloc_info+0x40/0x58 [ 17.940592] __kasan_kmalloc+0xd4/0xd8 [ 17.940648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.940798] kasan_atomics+0xb8/0x2e0 [ 17.940930] kunit_try_run_case+0x170/0x3f0 [ 17.941104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.941151] kthread+0x328/0x630 [ 17.941210] ret_from_fork+0x10/0x20 [ 17.941250] [ 17.941273] The buggy address belongs to the object at fff00000c767ae00 [ 17.941273] which belongs to the cache kmalloc-64 of size 64 [ 17.941333] The buggy address is located 0 bytes to the right of [ 17.941333] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.941398] [ 17.941422] The buggy address belongs to the physical page: [ 17.941456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.941737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.941846] page_type: f5(slab) [ 17.942222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.942279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.942376] page dumped because: kasan: bad access detected [ 17.942509] [ 17.942536] Memory state around the buggy address: [ 17.942640] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.942725] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.943231] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.943346] ^ [ 17.943842] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.944110] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.944644] ================================================================== [ 18.017079] ================================================================== [ 18.017133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.017184] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.017250] [ 18.017282] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.017366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.017396] Hardware name: linux,dummy-virt (DT) [ 18.017430] Call trace: [ 18.019024] show_stack+0x20/0x38 (C) [ 18.019365] dump_stack_lvl+0x8c/0xd0 [ 18.019430] print_report+0x118/0x5d0 [ 18.019883] kasan_report+0xdc/0x128 [ 18.019995] kasan_check_range+0x100/0x1a8 [ 18.020457] __kasan_check_write+0x20/0x30 [ 18.020575] kasan_atomics_helper+0x10c0/0x4858 [ 18.020627] kasan_atomics+0x198/0x2e0 [ 18.021072] kunit_try_run_case+0x170/0x3f0 [ 18.021151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.021492] kthread+0x328/0x630 [ 18.021731] ret_from_fork+0x10/0x20 [ 18.021861] [ 18.021883] Allocated by task 266: [ 18.022337] kasan_save_stack+0x3c/0x68 [ 18.022636] kasan_save_track+0x20/0x40 [ 18.022878] kasan_save_alloc_info+0x40/0x58 [ 18.022925] __kasan_kmalloc+0xd4/0xd8 [ 18.023215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.023265] kasan_atomics+0xb8/0x2e0 [ 18.023747] kunit_try_run_case+0x170/0x3f0 [ 18.023802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.023905] kthread+0x328/0x630 [ 18.023941] ret_from_fork+0x10/0x20 [ 18.024076] [ 18.024394] The buggy address belongs to the object at fff00000c767ae00 [ 18.024394] which belongs to the cache kmalloc-64 of size 64 [ 18.024964] The buggy address is located 0 bytes to the right of [ 18.024964] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.025467] [ 18.025651] The buggy address belongs to the physical page: [ 18.025856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.026117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.026259] page_type: f5(slab) [ 18.026304] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.026609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.027064] page dumped because: kasan: bad access detected [ 18.027105] [ 18.027530] Memory state around the buggy address: [ 18.028199] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.028847] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.029181] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.029597] ^ [ 18.030549] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.031086] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.031368] ================================================================== [ 17.985147] ================================================================== [ 17.986141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 17.986395] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.986820] [ 17.986988] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.987234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.987270] Hardware name: linux,dummy-virt (DT) [ 17.987792] Call trace: [ 17.988139] show_stack+0x20/0x38 (C) [ 17.988461] dump_stack_lvl+0x8c/0xd0 [ 17.988664] print_report+0x118/0x5d0 [ 17.988969] kasan_report+0xdc/0x128 [ 17.989174] kasan_check_range+0x100/0x1a8 [ 17.989562] __kasan_check_write+0x20/0x30 [ 17.989762] kasan_atomics_helper+0xf88/0x4858 [ 17.990175] kasan_atomics+0x198/0x2e0 [ 17.990650] kunit_try_run_case+0x170/0x3f0 [ 17.990776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.991131] kthread+0x328/0x630 [ 17.991386] ret_from_fork+0x10/0x20 [ 17.991874] [ 17.992026] Allocated by task 266: [ 17.992061] kasan_save_stack+0x3c/0x68 [ 17.992235] kasan_save_track+0x20/0x40 [ 17.992274] kasan_save_alloc_info+0x40/0x58 [ 17.992319] __kasan_kmalloc+0xd4/0xd8 [ 17.993572] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.993638] kasan_atomics+0xb8/0x2e0 [ 17.993676] kunit_try_run_case+0x170/0x3f0 [ 17.993718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.993764] kthread+0x328/0x630 [ 17.993800] ret_from_fork+0x10/0x20 [ 17.993839] [ 17.993985] The buggy address belongs to the object at fff00000c767ae00 [ 17.993985] which belongs to the cache kmalloc-64 of size 64 [ 17.994051] The buggy address is located 0 bytes to the right of [ 17.994051] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.994118] [ 17.994141] The buggy address belongs to the physical page: [ 17.994222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.994277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.994326] page_type: f5(slab) [ 17.994579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.994860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.994929] page dumped because: kasan: bad access detected [ 17.995031] [ 17.995052] Memory state around the buggy address: [ 17.995086] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.995181] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.995238] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.995310] ^ [ 17.995437] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.995547] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.995716] ================================================================== [ 18.094594] ================================================================== [ 18.094647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.094698] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.094749] [ 18.094782] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.094864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.094892] Hardware name: linux,dummy-virt (DT) [ 18.095503] Call trace: [ 18.095544] show_stack+0x20/0x38 (C) [ 18.095870] dump_stack_lvl+0x8c/0xd0 [ 18.095929] print_report+0x118/0x5d0 [ 18.096406] kasan_report+0xdc/0x128 [ 18.096492] kasan_check_range+0x100/0x1a8 [ 18.096549] __kasan_check_write+0x20/0x30 [ 18.096814] kasan_atomics_helper+0x1384/0x4858 [ 18.097024] kasan_atomics+0x198/0x2e0 [ 18.097313] kunit_try_run_case+0x170/0x3f0 [ 18.097560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.097793] kthread+0x328/0x630 [ 18.098033] ret_from_fork+0x10/0x20 [ 18.098089] [ 18.098113] Allocated by task 266: [ 18.098355] kasan_save_stack+0x3c/0x68 [ 18.098664] kasan_save_track+0x20/0x40 [ 18.098907] kasan_save_alloc_info+0x40/0x58 [ 18.099262] __kasan_kmalloc+0xd4/0xd8 [ 18.099476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.099627] kasan_atomics+0xb8/0x2e0 [ 18.099671] kunit_try_run_case+0x170/0x3f0 [ 18.099713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.099758] kthread+0x328/0x630 [ 18.099791] ret_from_fork+0x10/0x20 [ 18.099830] [ 18.099854] The buggy address belongs to the object at fff00000c767ae00 [ 18.099854] which belongs to the cache kmalloc-64 of size 64 [ 18.100480] The buggy address is located 0 bytes to the right of [ 18.100480] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.101051] [ 18.101080] The buggy address belongs to the physical page: [ 18.101227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.101433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.101498] page_type: f5(slab) [ 18.101539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.101752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.102054] page dumped because: kasan: bad access detected [ 18.102092] [ 18.102235] Memory state around the buggy address: [ 18.102438] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.103114] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.103469] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.103519] ^ [ 18.103708] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.103959] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.104433] ================================================================== [ 17.996222] ================================================================== [ 17.996274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 17.996325] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.996376] [ 17.996407] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.996488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.996562] Hardware name: linux,dummy-virt (DT) [ 17.996596] Call trace: [ 17.996632] show_stack+0x20/0x38 (C) [ 17.996681] dump_stack_lvl+0x8c/0xd0 [ 17.996730] print_report+0x118/0x5d0 [ 17.996777] kasan_report+0xdc/0x128 [ 17.996825] kasan_check_range+0x100/0x1a8 [ 17.997021] __kasan_check_write+0x20/0x30 [ 17.997135] kasan_atomics_helper+0xff0/0x4858 [ 17.997196] kasan_atomics+0x198/0x2e0 [ 17.997244] kunit_try_run_case+0x170/0x3f0 [ 17.997292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.997374] kthread+0x328/0x630 [ 17.997428] ret_from_fork+0x10/0x20 [ 17.997532] [ 17.997554] Allocated by task 266: [ 17.997585] kasan_save_stack+0x3c/0x68 [ 17.997627] kasan_save_track+0x20/0x40 [ 17.997742] kasan_save_alloc_info+0x40/0x58 [ 17.997818] __kasan_kmalloc+0xd4/0xd8 [ 17.997881] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.997929] kasan_atomics+0xb8/0x2e0 [ 17.997967] kunit_try_run_case+0x170/0x3f0 [ 17.998146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.998212] kthread+0x328/0x630 [ 17.998279] ret_from_fork+0x10/0x20 [ 17.998319] [ 17.998342] The buggy address belongs to the object at fff00000c767ae00 [ 17.998342] which belongs to the cache kmalloc-64 of size 64 [ 17.998402] The buggy address is located 0 bytes to the right of [ 17.998402] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.998537] [ 17.998633] The buggy address belongs to the physical page: [ 17.998734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.998816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.998864] page_type: f5(slab) [ 17.998902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.998955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.999061] page dumped because: kasan: bad access detected [ 17.999097] [ 17.999141] Memory state around the buggy address: [ 17.999176] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.999242] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.999405] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.999689] ^ [ 17.999739] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999783] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999849] ================================================================== [ 18.000938] ================================================================== [ 18.001063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.001249] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.001494] [ 18.001588] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.001701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.001729] Hardware name: linux,dummy-virt (DT) [ 18.001763] Call trace: [ 18.001955] show_stack+0x20/0x38 (C) [ 18.002300] dump_stack_lvl+0x8c/0xd0 [ 18.002440] print_report+0x118/0x5d0 [ 18.003039] kasan_report+0xdc/0x128 [ 18.003208] kasan_check_range+0x100/0x1a8 [ 18.003262] __kasan_check_write+0x20/0x30 [ 18.004222] kasan_atomics_helper+0x1058/0x4858 [ 18.004784] kasan_atomics+0x198/0x2e0 [ 18.004849] kunit_try_run_case+0x170/0x3f0 [ 18.005723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.005793] kthread+0x328/0x630 [ 18.006485] ret_from_fork+0x10/0x20 [ 18.006927] [ 18.006958] Allocated by task 266: [ 18.007733] kasan_save_stack+0x3c/0x68 [ 18.007908] kasan_save_track+0x20/0x40 [ 18.007964] kasan_save_alloc_info+0x40/0x58 [ 18.008611] __kasan_kmalloc+0xd4/0xd8 [ 18.009070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.009260] kasan_atomics+0xb8/0x2e0 [ 18.009529] kunit_try_run_case+0x170/0x3f0 [ 18.009574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.009620] kthread+0x328/0x630 [ 18.009655] ret_from_fork+0x10/0x20 [ 18.010610] [ 18.011089] The buggy address belongs to the object at fff00000c767ae00 [ 18.011089] which belongs to the cache kmalloc-64 of size 64 [ 18.011662] The buggy address is located 0 bytes to the right of [ 18.011662] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.012023] [ 18.012455] The buggy address belongs to the physical page: [ 18.012580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.013228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.013300] page_type: f5(slab) [ 18.013342] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.013477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.013784] page dumped because: kasan: bad access detected [ 18.013836] [ 18.013857] Memory state around the buggy address: [ 18.014258] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.014449] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.014694] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.015065] ^ [ 18.015110] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.015156] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.015204] ================================================================== [ 17.658851] ================================================================== [ 17.658905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 17.659164] Hardware name: linux,dummy-virt (DT) [ 17.659580] __kasan_check_read+0x20/0x30 [ 17.659840] kthread+0x328/0x630 [ 17.660232] __kasan_kmalloc+0xd4/0xd8 [ 17.660992] The buggy address is located 0 bytes to the right of [ 17.660992] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.661423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.661635] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.661763] ^ [ 17.661924] ================================================================== [ 18.199344] ================================================================== [ 18.199399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.199450] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.199502] [ 18.199534] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.199616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.200511] Hardware name: linux,dummy-virt (DT) [ 18.201003] Call trace: [ 18.201874] show_stack+0x20/0x38 (C) [ 18.202080] dump_stack_lvl+0x8c/0xd0 [ 18.202134] print_report+0x118/0x5d0 [ 18.202195] kasan_report+0xdc/0x128 [ 18.202952] kasan_check_range+0x100/0x1a8 [ 18.203025] __kasan_check_write+0x20/0x30 [ 18.203432] kasan_atomics_helper+0x16d0/0x4858 [ 18.203597] kasan_atomics+0x198/0x2e0 [ 18.203688] kunit_try_run_case+0x170/0x3f0 [ 18.204521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.205259] kthread+0x328/0x630 [ 18.205314] ret_from_fork+0x10/0x20 [ 18.205822] [ 18.205860] Allocated by task 266: [ 18.206077] kasan_save_stack+0x3c/0x68 [ 18.206578] kasan_save_track+0x20/0x40 [ 18.207112] kasan_save_alloc_info+0x40/0x58 [ 18.207705] __kasan_kmalloc+0xd4/0xd8 [ 18.208054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.208101] kasan_atomics+0xb8/0x2e0 [ 18.208141] kunit_try_run_case+0x170/0x3f0 [ 18.208181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.208240] kthread+0x328/0x630 [ 18.208969] ret_from_fork+0x10/0x20 [ 18.209037] [ 18.209071] The buggy address belongs to the object at fff00000c767ae00 [ 18.209071] which belongs to the cache kmalloc-64 of size 64 [ 18.210250] The buggy address is located 0 bytes to the right of [ 18.210250] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.210536] [ 18.210649] The buggy address belongs to the physical page: [ 18.210685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.211710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.212291] page_type: f5(slab) [ 18.212775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.213241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.213311] page dumped because: kasan: bad access detected [ 18.213794] [ 18.214576] Memory state around the buggy address: [ 18.214752] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.214851] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.215536] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.215960] ^ [ 18.216065] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.216760] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.216838] ================================================================== [ 18.181367] ================================================================== [ 18.181420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.181469] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.181521] [ 18.181554] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.182111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.182154] Hardware name: linux,dummy-virt (DT) [ 18.182244] Call trace: [ 18.182405] show_stack+0x20/0x38 (C) [ 18.183156] dump_stack_lvl+0x8c/0xd0 [ 18.183243] print_report+0x118/0x5d0 [ 18.183292] kasan_report+0xdc/0x128 [ 18.183342] kasan_check_range+0x100/0x1a8 [ 18.184051] __kasan_check_write+0x20/0x30 [ 18.184200] kasan_atomics_helper+0x1644/0x4858 [ 18.184251] kasan_atomics+0x198/0x2e0 [ 18.184300] kunit_try_run_case+0x170/0x3f0 [ 18.184350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.184406] kthread+0x328/0x630 [ 18.184449] ret_from_fork+0x10/0x20 [ 18.184943] [ 18.184982] Allocated by task 266: [ 18.185013] kasan_save_stack+0x3c/0x68 [ 18.185067] kasan_save_track+0x20/0x40 [ 18.185410] kasan_save_alloc_info+0x40/0x58 [ 18.185892] __kasan_kmalloc+0xd4/0xd8 [ 18.185984] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.186181] kasan_atomics+0xb8/0x2e0 [ 18.186295] kunit_try_run_case+0x170/0x3f0 [ 18.186353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.186553] kthread+0x328/0x630 [ 18.186590] ret_from_fork+0x10/0x20 [ 18.186813] [ 18.186843] The buggy address belongs to the object at fff00000c767ae00 [ 18.186843] which belongs to the cache kmalloc-64 of size 64 [ 18.187392] The buggy address is located 0 bytes to the right of [ 18.187392] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.187512] [ 18.187566] The buggy address belongs to the physical page: [ 18.187601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.188134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.188251] page_type: f5(slab) [ 18.188328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.188694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.188745] page dumped because: kasan: bad access detected [ 18.189080] [ 18.189108] Memory state around the buggy address: [ 18.189294] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189363] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189416] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.189459] ^ [ 18.189530] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.189964] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.190344] ================================================================== [ 17.922805] ================================================================== [ 17.922860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 17.922913] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 17.923722] [ 17.923774] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.923878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.923967] Hardware name: linux,dummy-virt (DT) [ 17.924003] Call trace: [ 17.924044] show_stack+0x20/0x38 (C) [ 17.924443] dump_stack_lvl+0x8c/0xd0 [ 17.924673] print_report+0x118/0x5d0 [ 17.924739] kasan_report+0xdc/0x128 [ 17.924787] __asan_report_load8_noabort+0x20/0x30 [ 17.924842] kasan_atomics_helper+0x3f58/0x4858 [ 17.924946] kasan_atomics+0x198/0x2e0 [ 17.925027] kunit_try_run_case+0x170/0x3f0 [ 17.925261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.925585] kthread+0x328/0x630 [ 17.925965] ret_from_fork+0x10/0x20 [ 17.926212] [ 17.926271] Allocated by task 266: [ 17.926432] kasan_save_stack+0x3c/0x68 [ 17.926499] kasan_save_track+0x20/0x40 [ 17.926566] kasan_save_alloc_info+0x40/0x58 [ 17.926609] __kasan_kmalloc+0xd4/0xd8 [ 17.927291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.927475] kasan_atomics+0xb8/0x2e0 [ 17.927542] kunit_try_run_case+0x170/0x3f0 [ 17.927596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.927953] kthread+0x328/0x630 [ 17.928011] ret_from_fork+0x10/0x20 [ 17.928068] [ 17.928100] The buggy address belongs to the object at fff00000c767ae00 [ 17.928100] which belongs to the cache kmalloc-64 of size 64 [ 17.928160] The buggy address is located 0 bytes to the right of [ 17.928160] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 17.928239] [ 17.928262] The buggy address belongs to the physical page: [ 17.928355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 17.928443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.928494] page_type: f5(slab) [ 17.928545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.928607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.928660] page dumped because: kasan: bad access detected [ 17.928694] [ 17.928716] Memory state around the buggy address: [ 17.928776] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.928835] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.929235] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.929911] ^ [ 17.929970] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930293] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930888] ================================================================== [ 18.032795] ================================================================== [ 18.033439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.033742] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266 [ 18.034110] [ 18.034614] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.034988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.035021] Hardware name: linux,dummy-virt (DT) [ 18.035384] Call trace: [ 18.035560] show_stack+0x20/0x38 (C) [ 18.035873] dump_stack_lvl+0x8c/0xd0 [ 18.036248] print_report+0x118/0x5d0 [ 18.036387] kasan_report+0xdc/0x128 [ 18.036440] kasan_check_range+0x100/0x1a8 [ 18.036944] __kasan_check_write+0x20/0x30 [ 18.037263] kasan_atomics_helper+0x1128/0x4858 [ 18.037504] kasan_atomics+0x198/0x2e0 [ 18.037678] kunit_try_run_case+0x170/0x3f0 [ 18.038303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.038688] kthread+0x328/0x630 [ 18.038739] ret_from_fork+0x10/0x20 [ 18.039010] [ 18.039172] Allocated by task 266: [ 18.039453] kasan_save_stack+0x3c/0x68 [ 18.039521] kasan_save_track+0x20/0x40 [ 18.039653] kasan_save_alloc_info+0x40/0x58 [ 18.039698] __kasan_kmalloc+0xd4/0xd8 [ 18.039799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.040117] kasan_atomics+0xb8/0x2e0 [ 18.040156] kunit_try_run_case+0x170/0x3f0 [ 18.040207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.041238] kthread+0x328/0x630 [ 18.041435] ret_from_fork+0x10/0x20 [ 18.041774] [ 18.041802] The buggy address belongs to the object at fff00000c767ae00 [ 18.041802] which belongs to the cache kmalloc-64 of size 64 [ 18.042034] The buggy address is located 0 bytes to the right of [ 18.042034] allocated 48-byte region [fff00000c767ae00, fff00000c767ae30) [ 18.042354] [ 18.042587] The buggy address belongs to the physical page: [ 18.042803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a [ 18.042871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.042924] page_type: f5(slab) [ 18.043198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.043691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.043988] page dumped because: kasan: bad access detected [ 18.044377] [ 18.044672] Memory state around the buggy address: [ 18.045073] fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.045176] fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.045649] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.046016] ^ [ 18.046064] fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.046899] fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.046956] ==================================================================
[ 15.397973] ================================================================== [ 15.398460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.398827] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.399085] [ 15.399179] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.399226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.399238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.399261] Call Trace: [ 15.399273] <TASK> [ 15.399338] dump_stack_lvl+0x73/0xb0 [ 15.399373] print_report+0xd1/0x610 [ 15.399396] ? __virt_addr_valid+0x1db/0x2d0 [ 15.399432] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.399454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.399485] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.399509] kasan_report+0x141/0x180 [ 15.399532] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.399560] __asan_report_store4_noabort+0x1b/0x30 [ 15.399585] kasan_atomics_helper+0x4ba2/0x5450 [ 15.399608] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.399630] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.399656] ? kasan_atomics+0x152/0x310 [ 15.399683] kasan_atomics+0x1dc/0x310 [ 15.399706] ? __pfx_kasan_atomics+0x10/0x10 [ 15.399739] ? __pfx_read_tsc+0x10/0x10 [ 15.399761] ? ktime_get_ts64+0x86/0x230 [ 15.399798] kunit_try_run_case+0x1a5/0x480 [ 15.399835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.399859] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.399884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.399908] ? __kthread_parkme+0x82/0x180 [ 15.399929] ? preempt_count_sub+0x50/0x80 [ 15.399963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.399988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.400012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.400086] kthread+0x337/0x6f0 [ 15.400108] ? trace_preempt_on+0x20/0xc0 [ 15.400132] ? __pfx_kthread+0x10/0x10 [ 15.400152] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.400175] ? calculate_sigpending+0x7b/0xa0 [ 15.400200] ? __pfx_kthread+0x10/0x10 [ 15.400222] ret_from_fork+0x116/0x1d0 [ 15.400241] ? __pfx_kthread+0x10/0x10 [ 15.400262] ret_from_fork_asm+0x1a/0x30 [ 15.400293] </TASK> [ 15.400304] [ 15.408994] Allocated by task 283: [ 15.409314] kasan_save_stack+0x45/0x70 [ 15.409552] kasan_save_track+0x18/0x40 [ 15.409752] kasan_save_alloc_info+0x3b/0x50 [ 15.409988] __kasan_kmalloc+0xb7/0xc0 [ 15.410282] __kmalloc_cache_noprof+0x189/0x420 [ 15.410515] kasan_atomics+0x95/0x310 [ 15.410653] kunit_try_run_case+0x1a5/0x480 [ 15.410933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.411441] kthread+0x337/0x6f0 [ 15.411585] ret_from_fork+0x116/0x1d0 [ 15.411770] ret_from_fork_asm+0x1a/0x30 [ 15.412001] [ 15.412107] The buggy address belongs to the object at ffff8881038b5600 [ 15.412107] which belongs to the cache kmalloc-64 of size 64 [ 15.412676] The buggy address is located 0 bytes to the right of [ 15.412676] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.413052] [ 15.413169] The buggy address belongs to the physical page: [ 15.413429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.413800] flags: 0x200000000000000(node=0|zone=2) [ 15.414485] page_type: f5(slab) [ 15.414620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.415073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.415431] page dumped because: kasan: bad access detected [ 15.415870] [ 15.415996] Memory state around the buggy address: [ 15.416398] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.416748] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.417142] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.417428] ^ [ 15.417648] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.418281] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.418898] ================================================================== [ 16.031905] ================================================================== [ 16.032487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 16.032810] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.033142] [ 16.033257] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.033302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.033314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.033336] Call Trace: [ 16.033352] <TASK> [ 16.033367] dump_stack_lvl+0x73/0xb0 [ 16.033396] print_report+0xd1/0x610 [ 16.033420] ? __virt_addr_valid+0x1db/0x2d0 [ 16.033445] ? kasan_atomics_helper+0x1079/0x5450 [ 16.033479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.033503] ? kasan_atomics_helper+0x1079/0x5450 [ 16.033526] kasan_report+0x141/0x180 [ 16.033549] ? kasan_atomics_helper+0x1079/0x5450 [ 16.033576] kasan_check_range+0x10c/0x1c0 [ 16.033601] __kasan_check_write+0x18/0x20 [ 16.033621] kasan_atomics_helper+0x1079/0x5450 [ 16.033645] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.033668] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.033695] ? kasan_atomics+0x152/0x310 [ 16.033722] kasan_atomics+0x1dc/0x310 [ 16.033746] ? __pfx_kasan_atomics+0x10/0x10 [ 16.033771] ? __pfx_read_tsc+0x10/0x10 [ 16.033846] ? ktime_get_ts64+0x86/0x230 [ 16.033873] kunit_try_run_case+0x1a5/0x480 [ 16.033899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.033922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.033948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.033972] ? __kthread_parkme+0x82/0x180 [ 16.033993] ? preempt_count_sub+0x50/0x80 [ 16.034018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.034074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.034100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.034134] kthread+0x337/0x6f0 [ 16.034155] ? trace_preempt_on+0x20/0xc0 [ 16.034179] ? __pfx_kthread+0x10/0x10 [ 16.034201] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.034225] ? calculate_sigpending+0x7b/0xa0 [ 16.034250] ? __pfx_kthread+0x10/0x10 [ 16.034273] ret_from_fork+0x116/0x1d0 [ 16.034293] ? __pfx_kthread+0x10/0x10 [ 16.034315] ret_from_fork_asm+0x1a/0x30 [ 16.034347] </TASK> [ 16.034358] [ 16.042729] Allocated by task 283: [ 16.042957] kasan_save_stack+0x45/0x70 [ 16.043177] kasan_save_track+0x18/0x40 [ 16.043376] kasan_save_alloc_info+0x3b/0x50 [ 16.043606] __kasan_kmalloc+0xb7/0xc0 [ 16.043858] __kmalloc_cache_noprof+0x189/0x420 [ 16.044027] kasan_atomics+0x95/0x310 [ 16.044401] kunit_try_run_case+0x1a5/0x480 [ 16.044632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.044928] kthread+0x337/0x6f0 [ 16.045102] ret_from_fork+0x116/0x1d0 [ 16.045304] ret_from_fork_asm+0x1a/0x30 [ 16.045512] [ 16.045600] The buggy address belongs to the object at ffff8881038b5600 [ 16.045600] which belongs to the cache kmalloc-64 of size 64 [ 16.046089] The buggy address is located 0 bytes to the right of [ 16.046089] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.046484] [ 16.046587] The buggy address belongs to the physical page: [ 16.046847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.047319] flags: 0x200000000000000(node=0|zone=2) [ 16.047498] page_type: f5(slab) [ 16.047624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.047919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.048261] page dumped because: kasan: bad access detected [ 16.048525] [ 16.048622] Memory state around the buggy address: [ 16.048957] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.049301] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.049615] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.049952] ^ [ 16.050162] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.050583] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.050932] ================================================================== [ 15.466902] ================================================================== [ 15.467409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.467768] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.468195] [ 15.468359] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.468409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.468422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.468446] Call Trace: [ 15.468465] <TASK> [ 15.468495] dump_stack_lvl+0x73/0xb0 [ 15.468566] print_report+0xd1/0x610 [ 15.468591] ? __virt_addr_valid+0x1db/0x2d0 [ 15.468616] ? kasan_atomics_helper+0x3df/0x5450 [ 15.468639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.468693] ? kasan_atomics_helper+0x3df/0x5450 [ 15.468717] kasan_report+0x141/0x180 [ 15.468741] ? kasan_atomics_helper+0x3df/0x5450 [ 15.468769] kasan_check_range+0x10c/0x1c0 [ 15.468803] __kasan_check_read+0x15/0x20 [ 15.468825] kasan_atomics_helper+0x3df/0x5450 [ 15.468849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.468874] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.468900] ? kasan_atomics+0x152/0x310 [ 15.468929] kasan_atomics+0x1dc/0x310 [ 15.468954] ? __pfx_kasan_atomics+0x10/0x10 [ 15.469011] ? __pfx_read_tsc+0x10/0x10 [ 15.469036] ? ktime_get_ts64+0x86/0x230 [ 15.469087] kunit_try_run_case+0x1a5/0x480 [ 15.469132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.469157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.469184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.469210] ? __kthread_parkme+0x82/0x180 [ 15.469233] ? preempt_count_sub+0x50/0x80 [ 15.469260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.469286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.469311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.469406] kthread+0x337/0x6f0 [ 15.469431] ? trace_preempt_on+0x20/0xc0 [ 15.469458] ? __pfx_kthread+0x10/0x10 [ 15.469493] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.469518] ? calculate_sigpending+0x7b/0xa0 [ 15.469544] ? __pfx_kthread+0x10/0x10 [ 15.469568] ret_from_fork+0x116/0x1d0 [ 15.469589] ? __pfx_kthread+0x10/0x10 [ 15.469611] ret_from_fork_asm+0x1a/0x30 [ 15.469645] </TASK> [ 15.469656] [ 15.480158] Allocated by task 283: [ 15.480396] kasan_save_stack+0x45/0x70 [ 15.480631] kasan_save_track+0x18/0x40 [ 15.480995] kasan_save_alloc_info+0x3b/0x50 [ 15.481193] __kasan_kmalloc+0xb7/0xc0 [ 15.481540] __kmalloc_cache_noprof+0x189/0x420 [ 15.481970] kasan_atomics+0x95/0x310 [ 15.482212] kunit_try_run_case+0x1a5/0x480 [ 15.482489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.482773] kthread+0x337/0x6f0 [ 15.482957] ret_from_fork+0x116/0x1d0 [ 15.483175] ret_from_fork_asm+0x1a/0x30 [ 15.483596] [ 15.483703] The buggy address belongs to the object at ffff8881038b5600 [ 15.483703] which belongs to the cache kmalloc-64 of size 64 [ 15.484385] The buggy address is located 0 bytes to the right of [ 15.484385] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.485079] [ 15.485224] The buggy address belongs to the physical page: [ 15.485520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.485935] flags: 0x200000000000000(node=0|zone=2) [ 15.486273] page_type: f5(slab) [ 15.486503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.486972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.487325] page dumped because: kasan: bad access detected [ 15.487584] [ 15.487690] Memory state around the buggy address: [ 15.488053] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.488324] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.488565] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.489243] ^ [ 15.489508] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.489894] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.490249] ================================================================== [ 16.199017] ================================================================== [ 16.200197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 16.201324] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.202072] [ 16.202388] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.202446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.202460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.202493] Call Trace: [ 16.202512] <TASK> [ 16.202528] dump_stack_lvl+0x73/0xb0 [ 16.202561] print_report+0xd1/0x610 [ 16.202585] ? __virt_addr_valid+0x1db/0x2d0 [ 16.202609] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.202631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.202654] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.202676] kasan_report+0x141/0x180 [ 16.202700] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.202727] __asan_report_load4_noabort+0x18/0x20 [ 16.202754] kasan_atomics_helper+0x49ce/0x5450 [ 16.202777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.202800] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.202826] ? kasan_atomics+0x152/0x310 [ 16.202854] kasan_atomics+0x1dc/0x310 [ 16.202878] ? __pfx_kasan_atomics+0x10/0x10 [ 16.202902] ? __pfx_read_tsc+0x10/0x10 [ 16.202924] ? ktime_get_ts64+0x86/0x230 [ 16.202959] kunit_try_run_case+0x1a5/0x480 [ 16.202986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.203010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.203045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.203134] ? __kthread_parkme+0x82/0x180 [ 16.203158] ? preempt_count_sub+0x50/0x80 [ 16.203183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.203209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.203232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.203257] kthread+0x337/0x6f0 [ 16.203278] ? trace_preempt_on+0x20/0xc0 [ 16.203302] ? __pfx_kthread+0x10/0x10 [ 16.203323] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.203347] ? calculate_sigpending+0x7b/0xa0 [ 16.203371] ? __pfx_kthread+0x10/0x10 [ 16.203393] ret_from_fork+0x116/0x1d0 [ 16.203413] ? __pfx_kthread+0x10/0x10 [ 16.203435] ret_from_fork_asm+0x1a/0x30 [ 16.203466] </TASK> [ 16.203489] [ 16.216728] Allocated by task 283: [ 16.217235] kasan_save_stack+0x45/0x70 [ 16.217441] kasan_save_track+0x18/0x40 [ 16.217599] kasan_save_alloc_info+0x3b/0x50 [ 16.217757] __kasan_kmalloc+0xb7/0xc0 [ 16.217945] __kmalloc_cache_noprof+0x189/0x420 [ 16.218478] kasan_atomics+0x95/0x310 [ 16.218892] kunit_try_run_case+0x1a5/0x480 [ 16.219410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.219984] kthread+0x337/0x6f0 [ 16.220371] ret_from_fork+0x116/0x1d0 [ 16.221031] ret_from_fork_asm+0x1a/0x30 [ 16.221501] [ 16.221702] The buggy address belongs to the object at ffff8881038b5600 [ 16.221702] which belongs to the cache kmalloc-64 of size 64 [ 16.222335] The buggy address is located 0 bytes to the right of [ 16.222335] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.222734] [ 16.222831] The buggy address belongs to the physical page: [ 16.223011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.223444] flags: 0x200000000000000(node=0|zone=2) [ 16.223694] page_type: f5(slab) [ 16.223900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.224255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.224648] page dumped because: kasan: bad access detected [ 16.224921] [ 16.225031] Memory state around the buggy address: [ 16.225227] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.225524] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.225784] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.226393] ^ [ 16.226638] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.226975] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.227453] ================================================================== [ 15.442640] ================================================================== [ 15.443270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.443980] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.444232] [ 15.444332] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.444379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.444393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.444417] Call Trace: [ 15.444432] <TASK> [ 15.444448] dump_stack_lvl+0x73/0xb0 [ 15.444520] print_report+0xd1/0x610 [ 15.444547] ? __virt_addr_valid+0x1db/0x2d0 [ 15.444572] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.444596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.444622] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.444646] kasan_report+0x141/0x180 [ 15.444670] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.444697] __asan_report_store4_noabort+0x1b/0x30 [ 15.444725] kasan_atomics_helper+0x4b6e/0x5450 [ 15.444748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.444810] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.444837] ? kasan_atomics+0x152/0x310 [ 15.444880] kasan_atomics+0x1dc/0x310 [ 15.444919] ? __pfx_kasan_atomics+0x10/0x10 [ 15.444945] ? __pfx_read_tsc+0x10/0x10 [ 15.444969] ? ktime_get_ts64+0x86/0x230 [ 15.444996] kunit_try_run_case+0x1a5/0x480 [ 15.445042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.445068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.445094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.445120] ? __kthread_parkme+0x82/0x180 [ 15.445143] ? preempt_count_sub+0x50/0x80 [ 15.445169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.445195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.445265] kthread+0x337/0x6f0 [ 15.445288] ? trace_preempt_on+0x20/0xc0 [ 15.445327] ? __pfx_kthread+0x10/0x10 [ 15.445351] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.445375] ? calculate_sigpending+0x7b/0xa0 [ 15.445400] ? __pfx_kthread+0x10/0x10 [ 15.445424] ret_from_fork+0x116/0x1d0 [ 15.445445] ? __pfx_kthread+0x10/0x10 [ 15.445477] ret_from_fork_asm+0x1a/0x30 [ 15.445510] </TASK> [ 15.445523] [ 15.455549] Allocated by task 283: [ 15.455776] kasan_save_stack+0x45/0x70 [ 15.455991] kasan_save_track+0x18/0x40 [ 15.456338] kasan_save_alloc_info+0x3b/0x50 [ 15.456572] __kasan_kmalloc+0xb7/0xc0 [ 15.456759] __kmalloc_cache_noprof+0x189/0x420 [ 15.457107] kasan_atomics+0x95/0x310 [ 15.457363] kunit_try_run_case+0x1a5/0x480 [ 15.457713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.457995] kthread+0x337/0x6f0 [ 15.458224] ret_from_fork+0x116/0x1d0 [ 15.458567] ret_from_fork_asm+0x1a/0x30 [ 15.458729] [ 15.459015] The buggy address belongs to the object at ffff8881038b5600 [ 15.459015] which belongs to the cache kmalloc-64 of size 64 [ 15.459769] The buggy address is located 0 bytes to the right of [ 15.459769] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.460608] [ 15.460811] The buggy address belongs to the physical page: [ 15.461090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.461411] flags: 0x200000000000000(node=0|zone=2) [ 15.461671] page_type: f5(slab) [ 15.461924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.462403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.462767] page dumped because: kasan: bad access detected [ 15.463089] [ 15.463321] Memory state around the buggy address: [ 15.463518] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.463909] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.464368] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.464676] ^ [ 15.465049] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.465702] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.466263] ================================================================== [ 15.816755] ================================================================== [ 15.817846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.818666] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.819448] [ 15.819684] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.819733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.819746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.819789] Call Trace: [ 15.819837] <TASK> [ 15.819856] dump_stack_lvl+0x73/0xb0 [ 15.819888] print_report+0xd1/0x610 [ 15.819924] ? __virt_addr_valid+0x1db/0x2d0 [ 15.819948] ? kasan_atomics_helper+0xac7/0x5450 [ 15.819970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.819994] ? kasan_atomics_helper+0xac7/0x5450 [ 15.820070] kasan_report+0x141/0x180 [ 15.820098] ? kasan_atomics_helper+0xac7/0x5450 [ 15.820126] kasan_check_range+0x10c/0x1c0 [ 15.820151] __kasan_check_write+0x18/0x20 [ 15.820172] kasan_atomics_helper+0xac7/0x5450 [ 15.820195] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.820219] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.820246] ? kasan_atomics+0x152/0x310 [ 15.820273] kasan_atomics+0x1dc/0x310 [ 15.820297] ? __pfx_kasan_atomics+0x10/0x10 [ 15.820323] ? __pfx_read_tsc+0x10/0x10 [ 15.820345] ? ktime_get_ts64+0x86/0x230 [ 15.820371] kunit_try_run_case+0x1a5/0x480 [ 15.820397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820421] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.820447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.820483] ? __kthread_parkme+0x82/0x180 [ 15.820505] ? preempt_count_sub+0x50/0x80 [ 15.820531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.820580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.820606] kthread+0x337/0x6f0 [ 15.820627] ? trace_preempt_on+0x20/0xc0 [ 15.820652] ? __pfx_kthread+0x10/0x10 [ 15.820674] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.820697] ? calculate_sigpending+0x7b/0xa0 [ 15.820721] ? __pfx_kthread+0x10/0x10 [ 15.820745] ret_from_fork+0x116/0x1d0 [ 15.820783] ? __pfx_kthread+0x10/0x10 [ 15.820805] ret_from_fork_asm+0x1a/0x30 [ 15.820838] </TASK> [ 15.820849] [ 15.833636] Allocated by task 283: [ 15.834037] kasan_save_stack+0x45/0x70 [ 15.834610] kasan_save_track+0x18/0x40 [ 15.835010] kasan_save_alloc_info+0x3b/0x50 [ 15.835551] __kasan_kmalloc+0xb7/0xc0 [ 15.836012] __kmalloc_cache_noprof+0x189/0x420 [ 15.836544] kasan_atomics+0x95/0x310 [ 15.836933] kunit_try_run_case+0x1a5/0x480 [ 15.837406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.838004] kthread+0x337/0x6f0 [ 15.838396] ret_from_fork+0x116/0x1d0 [ 15.838799] ret_from_fork_asm+0x1a/0x30 [ 15.839206] [ 15.839598] The buggy address belongs to the object at ffff8881038b5600 [ 15.839598] which belongs to the cache kmalloc-64 of size 64 [ 15.840941] The buggy address is located 0 bytes to the right of [ 15.840941] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.841589] [ 15.841674] The buggy address belongs to the physical page: [ 15.841968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.842820] flags: 0x200000000000000(node=0|zone=2) [ 15.843453] page_type: f5(slab) [ 15.843801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.844546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.845096] page dumped because: kasan: bad access detected [ 15.845288] [ 15.845365] Memory state around the buggy address: [ 15.845541] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.845976] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.846740] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.847544] ^ [ 15.848057] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.848949] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.849683] ================================================================== [ 15.364988] ================================================================== [ 15.365837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.366117] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.366353] [ 15.366451] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.366897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.366928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.366953] Call Trace: [ 15.366968] <TASK> [ 15.366988] dump_stack_lvl+0x73/0xb0 [ 15.367264] print_report+0xd1/0x610 [ 15.367292] ? __virt_addr_valid+0x1db/0x2d0 [ 15.367316] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.367350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.367373] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.367395] kasan_report+0x141/0x180 [ 15.367429] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.367455] __asan_report_load4_noabort+0x18/0x20 [ 15.367489] kasan_atomics_helper+0x4bbc/0x5450 [ 15.367511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.367534] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.367559] ? kasan_atomics+0x152/0x310 [ 15.367585] kasan_atomics+0x1dc/0x310 [ 15.367608] ? __pfx_kasan_atomics+0x10/0x10 [ 15.367632] ? __pfx_read_tsc+0x10/0x10 [ 15.367654] ? ktime_get_ts64+0x86/0x230 [ 15.367679] kunit_try_run_case+0x1a5/0x480 [ 15.367706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.367728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.367754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.367792] ? __kthread_parkme+0x82/0x180 [ 15.367813] ? preempt_count_sub+0x50/0x80 [ 15.367838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.367863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.367887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.367911] kthread+0x337/0x6f0 [ 15.367931] ? trace_preempt_on+0x20/0xc0 [ 15.367955] ? __pfx_kthread+0x10/0x10 [ 15.367976] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.367999] ? calculate_sigpending+0x7b/0xa0 [ 15.368024] ? __pfx_kthread+0x10/0x10 [ 15.368061] ret_from_fork+0x116/0x1d0 [ 15.368081] ? __pfx_kthread+0x10/0x10 [ 15.368102] ret_from_fork_asm+0x1a/0x30 [ 15.368134] </TASK> [ 15.368145] [ 15.385800] Allocated by task 283: [ 15.386308] kasan_save_stack+0x45/0x70 [ 15.386737] kasan_save_track+0x18/0x40 [ 15.386892] kasan_save_alloc_info+0x3b/0x50 [ 15.387324] __kasan_kmalloc+0xb7/0xc0 [ 15.387758] __kmalloc_cache_noprof+0x189/0x420 [ 15.388277] kasan_atomics+0x95/0x310 [ 15.388663] kunit_try_run_case+0x1a5/0x480 [ 15.388849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.389051] kthread+0x337/0x6f0 [ 15.389487] ret_from_fork+0x116/0x1d0 [ 15.389890] ret_from_fork_asm+0x1a/0x30 [ 15.390569] [ 15.390688] The buggy address belongs to the object at ffff8881038b5600 [ 15.390688] which belongs to the cache kmalloc-64 of size 64 [ 15.391355] The buggy address is located 0 bytes to the right of [ 15.391355] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.391768] [ 15.391850] The buggy address belongs to the physical page: [ 15.392128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.392577] flags: 0x200000000000000(node=0|zone=2) [ 15.392781] page_type: f5(slab) [ 15.392913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.393400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.393941] page dumped because: kasan: bad access detected [ 15.394266] [ 15.394345] Memory state around the buggy address: [ 15.394580] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.394935] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.395698] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.396043] ^ [ 15.396312] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.396682] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397016] ================================================================== [ 16.289866] ================================================================== [ 16.290515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 16.290941] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.291419] [ 16.291591] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.291649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.291663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.291713] Call Trace: [ 16.291729] <TASK> [ 16.291745] dump_stack_lvl+0x73/0xb0 [ 16.291789] print_report+0xd1/0x610 [ 16.291823] ? __virt_addr_valid+0x1db/0x2d0 [ 16.291858] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.291882] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.291934] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.291958] kasan_report+0x141/0x180 [ 16.292009] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.292052] __asan_report_store8_noabort+0x1b/0x30 [ 16.292079] kasan_atomics_helper+0x50d4/0x5450 [ 16.292103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.292174] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.292217] ? kasan_atomics+0x152/0x310 [ 16.292248] kasan_atomics+0x1dc/0x310 [ 16.292272] ? __pfx_kasan_atomics+0x10/0x10 [ 16.292328] ? __pfx_read_tsc+0x10/0x10 [ 16.292353] ? ktime_get_ts64+0x86/0x230 [ 16.292378] kunit_try_run_case+0x1a5/0x480 [ 16.292438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.292462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.292508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.292533] ? __kthread_parkme+0x82/0x180 [ 16.292556] ? preempt_count_sub+0x50/0x80 [ 16.292582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.292608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.292661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.292687] kthread+0x337/0x6f0 [ 16.292735] ? trace_preempt_on+0x20/0xc0 [ 16.292760] ? __pfx_kthread+0x10/0x10 [ 16.292796] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.292820] ? calculate_sigpending+0x7b/0xa0 [ 16.292861] ? __pfx_kthread+0x10/0x10 [ 16.292885] ret_from_fork+0x116/0x1d0 [ 16.292920] ? __pfx_kthread+0x10/0x10 [ 16.292957] ret_from_fork_asm+0x1a/0x30 [ 16.293002] </TASK> [ 16.293028] [ 16.302710] Allocated by task 283: [ 16.302888] kasan_save_stack+0x45/0x70 [ 16.303151] kasan_save_track+0x18/0x40 [ 16.303440] kasan_save_alloc_info+0x3b/0x50 [ 16.303734] __kasan_kmalloc+0xb7/0xc0 [ 16.303933] __kmalloc_cache_noprof+0x189/0x420 [ 16.304199] kasan_atomics+0x95/0x310 [ 16.304410] kunit_try_run_case+0x1a5/0x480 [ 16.304746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.305013] kthread+0x337/0x6f0 [ 16.305186] ret_from_fork+0x116/0x1d0 [ 16.305378] ret_from_fork_asm+0x1a/0x30 [ 16.305571] [ 16.305649] The buggy address belongs to the object at ffff8881038b5600 [ 16.305649] which belongs to the cache kmalloc-64 of size 64 [ 16.306546] The buggy address is located 0 bytes to the right of [ 16.306546] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.307439] [ 16.307587] The buggy address belongs to the physical page: [ 16.307916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.308279] flags: 0x200000000000000(node=0|zone=2) [ 16.308546] page_type: f5(slab) [ 16.308743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.309089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.309572] page dumped because: kasan: bad access detected [ 16.309989] [ 16.310065] Memory state around the buggy address: [ 16.310232] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.310457] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.310948] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.311436] ^ [ 16.311730] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.312209] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.312607] ================================================================== [ 15.490887] ================================================================== [ 15.491133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.491817] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.492368] [ 15.492552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.492709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.492751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.492775] Call Trace: [ 15.492794] <TASK> [ 15.492812] dump_stack_lvl+0x73/0xb0 [ 15.492844] print_report+0xd1/0x610 [ 15.492868] ? __virt_addr_valid+0x1db/0x2d0 [ 15.492892] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.492915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.492939] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.492963] kasan_report+0x141/0x180 [ 15.492986] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.493013] __asan_report_load4_noabort+0x18/0x20 [ 15.493104] kasan_atomics_helper+0x4b54/0x5450 [ 15.493129] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.493153] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.493180] ? kasan_atomics+0x152/0x310 [ 15.493208] kasan_atomics+0x1dc/0x310 [ 15.493232] ? __pfx_kasan_atomics+0x10/0x10 [ 15.493258] ? __pfx_read_tsc+0x10/0x10 [ 15.493281] ? ktime_get_ts64+0x86/0x230 [ 15.493307] kunit_try_run_case+0x1a5/0x480 [ 15.493333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.493356] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.493382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.493407] ? __kthread_parkme+0x82/0x180 [ 15.493429] ? preempt_count_sub+0x50/0x80 [ 15.493505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.493530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.493555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.493580] kthread+0x337/0x6f0 [ 15.493600] ? trace_preempt_on+0x20/0xc0 [ 15.493656] ? __pfx_kthread+0x10/0x10 [ 15.493679] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.493703] ? calculate_sigpending+0x7b/0xa0 [ 15.493728] ? __pfx_kthread+0x10/0x10 [ 15.493751] ret_from_fork+0x116/0x1d0 [ 15.493772] ? __pfx_kthread+0x10/0x10 [ 15.493794] ret_from_fork_asm+0x1a/0x30 [ 15.493851] </TASK> [ 15.493862] [ 15.503531] Allocated by task 283: [ 15.503801] kasan_save_stack+0x45/0x70 [ 15.504013] kasan_save_track+0x18/0x40 [ 15.504274] kasan_save_alloc_info+0x3b/0x50 [ 15.504514] __kasan_kmalloc+0xb7/0xc0 [ 15.504729] __kmalloc_cache_noprof+0x189/0x420 [ 15.504977] kasan_atomics+0x95/0x310 [ 15.505120] kunit_try_run_case+0x1a5/0x480 [ 15.505276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.505461] kthread+0x337/0x6f0 [ 15.505652] ret_from_fork+0x116/0x1d0 [ 15.505920] ret_from_fork_asm+0x1a/0x30 [ 15.506354] [ 15.506648] The buggy address belongs to the object at ffff8881038b5600 [ 15.506648] which belongs to the cache kmalloc-64 of size 64 [ 15.507557] The buggy address is located 0 bytes to the right of [ 15.507557] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.508461] [ 15.508614] The buggy address belongs to the physical page: [ 15.508915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.509377] flags: 0x200000000000000(node=0|zone=2) [ 15.509631] page_type: f5(slab) [ 15.509761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.509999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.510373] page dumped because: kasan: bad access detected [ 15.510937] [ 15.511156] Memory state around the buggy address: [ 15.511566] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.511959] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.512388] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.512622] ^ [ 15.512899] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.513722] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.514356] ================================================================== [ 16.313518] ================================================================== [ 16.313953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 16.314517] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.314957] [ 16.315115] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.315163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.315176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.315198] Call Trace: [ 16.315216] <TASK> [ 16.315232] dump_stack_lvl+0x73/0xb0 [ 16.315265] print_report+0xd1/0x610 [ 16.315289] ? __virt_addr_valid+0x1db/0x2d0 [ 16.315313] ? kasan_atomics_helper+0x151d/0x5450 [ 16.315349] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.315374] ? kasan_atomics_helper+0x151d/0x5450 [ 16.315397] kasan_report+0x141/0x180 [ 16.315434] ? kasan_atomics_helper+0x151d/0x5450 [ 16.315505] kasan_check_range+0x10c/0x1c0 [ 16.315531] __kasan_check_write+0x18/0x20 [ 16.315552] kasan_atomics_helper+0x151d/0x5450 [ 16.315588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.315612] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.315638] ? kasan_atomics+0x152/0x310 [ 16.315667] kasan_atomics+0x1dc/0x310 [ 16.315691] ? __pfx_kasan_atomics+0x10/0x10 [ 16.315717] ? __pfx_read_tsc+0x10/0x10 [ 16.315740] ? ktime_get_ts64+0x86/0x230 [ 16.315765] kunit_try_run_case+0x1a5/0x480 [ 16.315801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.315826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.315869] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.315895] ? __kthread_parkme+0x82/0x180 [ 16.315939] ? preempt_count_sub+0x50/0x80 [ 16.315965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.315991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.316027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.316054] kthread+0x337/0x6f0 [ 16.316076] ? trace_preempt_on+0x20/0xc0 [ 16.316100] ? __pfx_kthread+0x10/0x10 [ 16.316123] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.316147] ? calculate_sigpending+0x7b/0xa0 [ 16.316172] ? __pfx_kthread+0x10/0x10 [ 16.316195] ret_from_fork+0x116/0x1d0 [ 16.316216] ? __pfx_kthread+0x10/0x10 [ 16.316238] ret_from_fork_asm+0x1a/0x30 [ 16.316270] </TASK> [ 16.316281] [ 16.325984] Allocated by task 283: [ 16.326282] kasan_save_stack+0x45/0x70 [ 16.326558] kasan_save_track+0x18/0x40 [ 16.326788] kasan_save_alloc_info+0x3b/0x50 [ 16.327009] __kasan_kmalloc+0xb7/0xc0 [ 16.327257] __kmalloc_cache_noprof+0x189/0x420 [ 16.327572] kasan_atomics+0x95/0x310 [ 16.327773] kunit_try_run_case+0x1a5/0x480 [ 16.328048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.328291] kthread+0x337/0x6f0 [ 16.328600] ret_from_fork+0x116/0x1d0 [ 16.329080] ret_from_fork_asm+0x1a/0x30 [ 16.329295] [ 16.329423] The buggy address belongs to the object at ffff8881038b5600 [ 16.329423] which belongs to the cache kmalloc-64 of size 64 [ 16.329970] The buggy address is located 0 bytes to the right of [ 16.329970] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.330565] [ 16.330664] The buggy address belongs to the physical page: [ 16.330917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.331219] flags: 0x200000000000000(node=0|zone=2) [ 16.331382] page_type: f5(slab) [ 16.331581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.332174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.332649] page dumped because: kasan: bad access detected [ 16.333002] [ 16.333201] Memory state around the buggy address: [ 16.333442] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.333818] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.334354] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.334948] ^ [ 16.335341] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.335699] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.336088] ================================================================== [ 16.360901] ================================================================== [ 16.361322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.361682] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.362149] [ 16.362238] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.362282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.362294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.362316] Call Trace: [ 16.362332] <TASK> [ 16.362348] dump_stack_lvl+0x73/0xb0 [ 16.362379] print_report+0xd1/0x610 [ 16.362402] ? __virt_addr_valid+0x1db/0x2d0 [ 16.362497] ? kasan_atomics_helper+0x164f/0x5450 [ 16.362522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.362580] ? kasan_atomics_helper+0x164f/0x5450 [ 16.362605] kasan_report+0x141/0x180 [ 16.362657] ? kasan_atomics_helper+0x164f/0x5450 [ 16.362684] kasan_check_range+0x10c/0x1c0 [ 16.362710] __kasan_check_write+0x18/0x20 [ 16.362731] kasan_atomics_helper+0x164f/0x5450 [ 16.362754] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.362778] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.362806] ? kasan_atomics+0x152/0x310 [ 16.362834] kasan_atomics+0x1dc/0x310 [ 16.362858] ? __pfx_kasan_atomics+0x10/0x10 [ 16.362885] ? __pfx_read_tsc+0x10/0x10 [ 16.362906] ? ktime_get_ts64+0x86/0x230 [ 16.362932] kunit_try_run_case+0x1a5/0x480 [ 16.362985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.363048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.363121] ? __kthread_parkme+0x82/0x180 [ 16.363176] ? preempt_count_sub+0x50/0x80 [ 16.363201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.363264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.363289] kthread+0x337/0x6f0 [ 16.363336] ? trace_preempt_on+0x20/0xc0 [ 16.363362] ? __pfx_kthread+0x10/0x10 [ 16.363384] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.363419] ? calculate_sigpending+0x7b/0xa0 [ 16.363444] ? __pfx_kthread+0x10/0x10 [ 16.363477] ret_from_fork+0x116/0x1d0 [ 16.363525] ? __pfx_kthread+0x10/0x10 [ 16.363547] ret_from_fork_asm+0x1a/0x30 [ 16.363580] </TASK> [ 16.363602] [ 16.373665] Allocated by task 283: [ 16.373966] kasan_save_stack+0x45/0x70 [ 16.374255] kasan_save_track+0x18/0x40 [ 16.374485] kasan_save_alloc_info+0x3b/0x50 [ 16.374663] __kasan_kmalloc+0xb7/0xc0 [ 16.374852] __kmalloc_cache_noprof+0x189/0x420 [ 16.375142] kasan_atomics+0x95/0x310 [ 16.375336] kunit_try_run_case+0x1a5/0x480 [ 16.375497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.375678] kthread+0x337/0x6f0 [ 16.375803] ret_from_fork+0x116/0x1d0 [ 16.375981] ret_from_fork_asm+0x1a/0x30 [ 16.376449] [ 16.376573] The buggy address belongs to the object at ffff8881038b5600 [ 16.376573] which belongs to the cache kmalloc-64 of size 64 [ 16.377176] The buggy address is located 0 bytes to the right of [ 16.377176] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.378238] [ 16.378347] The buggy address belongs to the physical page: [ 16.378629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.379180] flags: 0x200000000000000(node=0|zone=2) [ 16.379512] page_type: f5(slab) [ 16.379709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.380041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.380392] page dumped because: kasan: bad access detected [ 16.380695] [ 16.380838] Memory state around the buggy address: [ 16.381240] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.381462] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.381809] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.382300] ^ [ 16.382858] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.383806] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.384526] ================================================================== [ 16.648727] ================================================================== [ 16.649008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.649722] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.650563] [ 16.650761] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.650815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.650829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.650852] Call Trace: [ 16.650871] <TASK> [ 16.650899] dump_stack_lvl+0x73/0xb0 [ 16.650934] print_report+0xd1/0x610 [ 16.650960] ? __virt_addr_valid+0x1db/0x2d0 [ 16.650986] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.651008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.651032] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.651054] kasan_report+0x141/0x180 [ 16.651079] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.651107] kasan_check_range+0x10c/0x1c0 [ 16.651133] __kasan_check_write+0x18/0x20 [ 16.651154] kasan_atomics_helper+0x1e12/0x5450 [ 16.651177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.651201] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.651227] ? kasan_atomics+0x152/0x310 [ 16.651256] kasan_atomics+0x1dc/0x310 [ 16.651281] ? __pfx_kasan_atomics+0x10/0x10 [ 16.651306] ? __pfx_read_tsc+0x10/0x10 [ 16.651329] ? ktime_get_ts64+0x86/0x230 [ 16.651355] kunit_try_run_case+0x1a5/0x480 [ 16.651380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.651404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.651430] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.651455] ? __kthread_parkme+0x82/0x180 [ 16.651487] ? preempt_count_sub+0x50/0x80 [ 16.651523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.651548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.651584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.651609] kthread+0x337/0x6f0 [ 16.651631] ? trace_preempt_on+0x20/0xc0 [ 16.651654] ? __pfx_kthread+0x10/0x10 [ 16.651676] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.651700] ? calculate_sigpending+0x7b/0xa0 [ 16.651725] ? __pfx_kthread+0x10/0x10 [ 16.651748] ret_from_fork+0x116/0x1d0 [ 16.651767] ? __pfx_kthread+0x10/0x10 [ 16.651800] ret_from_fork_asm+0x1a/0x30 [ 16.651832] </TASK> [ 16.651844] [ 16.664993] Allocated by task 283: [ 16.665144] kasan_save_stack+0x45/0x70 [ 16.665300] kasan_save_track+0x18/0x40 [ 16.665437] kasan_save_alloc_info+0x3b/0x50 [ 16.665602] __kasan_kmalloc+0xb7/0xc0 [ 16.665736] __kmalloc_cache_noprof+0x189/0x420 [ 16.666453] kasan_atomics+0x95/0x310 [ 16.666921] kunit_try_run_case+0x1a5/0x480 [ 16.667377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.667972] kthread+0x337/0x6f0 [ 16.668343] ret_from_fork+0x116/0x1d0 [ 16.668790] ret_from_fork_asm+0x1a/0x30 [ 16.669244] [ 16.669499] The buggy address belongs to the object at ffff8881038b5600 [ 16.669499] which belongs to the cache kmalloc-64 of size 64 [ 16.670305] The buggy address is located 0 bytes to the right of [ 16.670305] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.670687] [ 16.670765] The buggy address belongs to the physical page: [ 16.670945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.671276] flags: 0x200000000000000(node=0|zone=2) [ 16.671530] page_type: f5(slab) [ 16.671704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.672464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.672900] page dumped because: kasan: bad access detected [ 16.673147] [ 16.673368] Memory state around the buggy address: [ 16.673559] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.674148] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.674534] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.674885] ^ [ 16.675206] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.675497] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.675977] ================================================================== [ 15.569724] ================================================================== [ 15.570802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.571575] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.572613] [ 15.572722] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.573117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.573144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.573171] Call Trace: [ 15.573192] <TASK> [ 15.573265] dump_stack_lvl+0x73/0xb0 [ 15.573307] print_report+0xd1/0x610 [ 15.573331] ? __virt_addr_valid+0x1db/0x2d0 [ 15.573357] ? kasan_atomics_helper+0x565/0x5450 [ 15.573379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.573405] ? kasan_atomics_helper+0x565/0x5450 [ 15.573429] kasan_report+0x141/0x180 [ 15.573453] ? kasan_atomics_helper+0x565/0x5450 [ 15.573492] kasan_check_range+0x10c/0x1c0 [ 15.573518] __kasan_check_write+0x18/0x20 [ 15.573540] kasan_atomics_helper+0x565/0x5450 [ 15.573564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.573588] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.573616] ? kasan_atomics+0x152/0x310 [ 15.573645] kasan_atomics+0x1dc/0x310 [ 15.573669] ? __pfx_kasan_atomics+0x10/0x10 [ 15.573695] ? __pfx_read_tsc+0x10/0x10 [ 15.573718] ? ktime_get_ts64+0x86/0x230 [ 15.573745] kunit_try_run_case+0x1a5/0x480 [ 15.573791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.573816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.573843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.573868] ? __kthread_parkme+0x82/0x180 [ 15.573890] ? preempt_count_sub+0x50/0x80 [ 15.573916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.573942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.573967] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.573992] kthread+0x337/0x6f0 [ 15.574013] ? trace_preempt_on+0x20/0xc0 [ 15.574056] ? __pfx_kthread+0x10/0x10 [ 15.574078] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.574108] ? calculate_sigpending+0x7b/0xa0 [ 15.574134] ? __pfx_kthread+0x10/0x10 [ 15.574157] ret_from_fork+0x116/0x1d0 [ 15.574179] ? __pfx_kthread+0x10/0x10 [ 15.574202] ret_from_fork_asm+0x1a/0x30 [ 15.574234] </TASK> [ 15.574247] [ 15.592952] Allocated by task 283: [ 15.593108] kasan_save_stack+0x45/0x70 [ 15.593270] kasan_save_track+0x18/0x40 [ 15.593417] kasan_save_alloc_info+0x3b/0x50 [ 15.593791] __kasan_kmalloc+0xb7/0xc0 [ 15.594173] __kmalloc_cache_noprof+0x189/0x420 [ 15.594669] kasan_atomics+0x95/0x310 [ 15.595078] kunit_try_run_case+0x1a5/0x480 [ 15.595569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.596111] kthread+0x337/0x6f0 [ 15.596519] ret_from_fork+0x116/0x1d0 [ 15.596812] ret_from_fork_asm+0x1a/0x30 [ 15.597362] [ 15.597526] The buggy address belongs to the object at ffff8881038b5600 [ 15.597526] which belongs to the cache kmalloc-64 of size 64 [ 15.598512] The buggy address is located 0 bytes to the right of [ 15.598512] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.599106] [ 15.599279] The buggy address belongs to the physical page: [ 15.599915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.600761] flags: 0x200000000000000(node=0|zone=2) [ 15.601332] page_type: f5(slab) [ 15.601557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.602090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.602911] page dumped because: kasan: bad access detected [ 15.603238] [ 15.603379] Memory state around the buggy address: [ 15.603785] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.604427] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.604668] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.605217] ^ [ 15.605717] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.606721] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.607572] ================================================================== [ 16.860137] ================================================================== [ 16.860814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.861423] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.861664] [ 16.861830] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.861882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.861894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.861917] Call Trace: [ 16.861938] <TASK> [ 16.861955] dump_stack_lvl+0x73/0xb0 [ 16.861989] print_report+0xd1/0x610 [ 16.862013] ? __virt_addr_valid+0x1db/0x2d0 [ 16.862037] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.862059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.862082] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.862114] kasan_report+0x141/0x180 [ 16.862137] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.862165] __asan_report_load8_noabort+0x18/0x20 [ 16.862190] kasan_atomics_helper+0x4fa5/0x5450 [ 16.862214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.862237] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.862264] ? kasan_atomics+0x152/0x310 [ 16.862291] kasan_atomics+0x1dc/0x310 [ 16.862315] ? __pfx_kasan_atomics+0x10/0x10 [ 16.862340] ? __pfx_read_tsc+0x10/0x10 [ 16.862364] ? ktime_get_ts64+0x86/0x230 [ 16.862390] kunit_try_run_case+0x1a5/0x480 [ 16.862415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.862439] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.862465] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.862501] ? __kthread_parkme+0x82/0x180 [ 16.862523] ? preempt_count_sub+0x50/0x80 [ 16.862548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.862574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.862598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.862622] kthread+0x337/0x6f0 [ 16.862644] ? trace_preempt_on+0x20/0xc0 [ 16.862668] ? __pfx_kthread+0x10/0x10 [ 16.862690] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.862713] ? calculate_sigpending+0x7b/0xa0 [ 16.862739] ? __pfx_kthread+0x10/0x10 [ 16.862780] ret_from_fork+0x116/0x1d0 [ 16.862801] ? __pfx_kthread+0x10/0x10 [ 16.862822] ret_from_fork_asm+0x1a/0x30 [ 16.862854] </TASK> [ 16.862866] [ 16.872061] Allocated by task 283: [ 16.872201] kasan_save_stack+0x45/0x70 [ 16.872355] kasan_save_track+0x18/0x40 [ 16.872558] kasan_save_alloc_info+0x3b/0x50 [ 16.872812] __kasan_kmalloc+0xb7/0xc0 [ 16.873008] __kmalloc_cache_noprof+0x189/0x420 [ 16.873238] kasan_atomics+0x95/0x310 [ 16.873428] kunit_try_run_case+0x1a5/0x480 [ 16.873593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.873810] kthread+0x337/0x6f0 [ 16.873987] ret_from_fork+0x116/0x1d0 [ 16.874193] ret_from_fork_asm+0x1a/0x30 [ 16.874397] [ 16.874506] The buggy address belongs to the object at ffff8881038b5600 [ 16.874506] which belongs to the cache kmalloc-64 of size 64 [ 16.875040] The buggy address is located 0 bytes to the right of [ 16.875040] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.875565] [ 16.875649] The buggy address belongs to the physical page: [ 16.875919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.876237] flags: 0x200000000000000(node=0|zone=2) [ 16.876452] page_type: f5(slab) [ 16.876643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.876964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.877282] page dumped because: kasan: bad access detected [ 16.877534] [ 16.877630] Memory state around the buggy address: [ 16.877879] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.878129] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.878409] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.878743] ^ [ 16.878989] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.879273] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.879513] ================================================================== [ 15.727377] ================================================================== [ 15.727727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.728156] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.728478] [ 15.728606] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.728654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.728667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.728690] Call Trace: [ 15.728709] <TASK> [ 15.728726] dump_stack_lvl+0x73/0xb0 [ 15.728758] print_report+0xd1/0x610 [ 15.728782] ? __virt_addr_valid+0x1db/0x2d0 [ 15.728807] ? kasan_atomics_helper+0x860/0x5450 [ 15.728829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.728854] ? kasan_atomics_helper+0x860/0x5450 [ 15.728877] kasan_report+0x141/0x180 [ 15.728901] ? kasan_atomics_helper+0x860/0x5450 [ 15.728928] kasan_check_range+0x10c/0x1c0 [ 15.728954] __kasan_check_write+0x18/0x20 [ 15.728975] kasan_atomics_helper+0x860/0x5450 [ 15.729014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.729048] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.729074] ? kasan_atomics+0x152/0x310 [ 15.729152] kasan_atomics+0x1dc/0x310 [ 15.729180] ? __pfx_kasan_atomics+0x10/0x10 [ 15.729206] ? __pfx_read_tsc+0x10/0x10 [ 15.729230] ? ktime_get_ts64+0x86/0x230 [ 15.729257] kunit_try_run_case+0x1a5/0x480 [ 15.729283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.729307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.729334] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.729359] ? __kthread_parkme+0x82/0x180 [ 15.729381] ? preempt_count_sub+0x50/0x80 [ 15.729406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.729441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.729466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.729509] kthread+0x337/0x6f0 [ 15.729530] ? trace_preempt_on+0x20/0xc0 [ 15.729556] ? __pfx_kthread+0x10/0x10 [ 15.729578] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.729600] ? calculate_sigpending+0x7b/0xa0 [ 15.729635] ? __pfx_kthread+0x10/0x10 [ 15.729658] ret_from_fork+0x116/0x1d0 [ 15.729677] ? __pfx_kthread+0x10/0x10 [ 15.729711] ret_from_fork_asm+0x1a/0x30 [ 15.729743] </TASK> [ 15.729754] [ 15.738621] Allocated by task 283: [ 15.738763] kasan_save_stack+0x45/0x70 [ 15.739020] kasan_save_track+0x18/0x40 [ 15.739261] kasan_save_alloc_info+0x3b/0x50 [ 15.739534] __kasan_kmalloc+0xb7/0xc0 [ 15.739775] __kmalloc_cache_noprof+0x189/0x420 [ 15.740030] kasan_atomics+0x95/0x310 [ 15.740305] kunit_try_run_case+0x1a5/0x480 [ 15.740529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.740741] kthread+0x337/0x6f0 [ 15.740906] ret_from_fork+0x116/0x1d0 [ 15.741218] ret_from_fork_asm+0x1a/0x30 [ 15.741418] [ 15.741532] The buggy address belongs to the object at ffff8881038b5600 [ 15.741532] which belongs to the cache kmalloc-64 of size 64 [ 15.742106] The buggy address is located 0 bytes to the right of [ 15.742106] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.742898] [ 15.743025] The buggy address belongs to the physical page: [ 15.743314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.743666] flags: 0x200000000000000(node=0|zone=2) [ 15.743982] page_type: f5(slab) [ 15.744213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.744485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.744722] page dumped because: kasan: bad access detected [ 15.744902] [ 15.744977] Memory state around the buggy address: [ 15.745243] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.745582] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.746079] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.746373] ^ [ 15.746548] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746782] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.747109] ================================================================== [ 16.898547] ================================================================== [ 16.898941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.899325] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.899670] [ 16.899811] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.899860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.899873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.899896] Call Trace: [ 16.899917] <TASK> [ 16.899934] dump_stack_lvl+0x73/0xb0 [ 16.899966] print_report+0xd1/0x610 [ 16.899990] ? __virt_addr_valid+0x1db/0x2d0 [ 16.900014] ? kasan_atomics_helper+0x5115/0x5450 [ 16.900036] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.900058] ? kasan_atomics_helper+0x5115/0x5450 [ 16.900081] kasan_report+0x141/0x180 [ 16.900104] ? kasan_atomics_helper+0x5115/0x5450 [ 16.900132] __asan_report_load8_noabort+0x18/0x20 [ 16.900160] kasan_atomics_helper+0x5115/0x5450 [ 16.900186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.900210] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.900237] ? kasan_atomics+0x152/0x310 [ 16.900264] kasan_atomics+0x1dc/0x310 [ 16.900287] ? __pfx_kasan_atomics+0x10/0x10 [ 16.900313] ? __pfx_read_tsc+0x10/0x10 [ 16.900336] ? ktime_get_ts64+0x86/0x230 [ 16.900362] kunit_try_run_case+0x1a5/0x480 [ 16.900388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.900412] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.900439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.900464] ? __kthread_parkme+0x82/0x180 [ 16.900497] ? preempt_count_sub+0x50/0x80 [ 16.900523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.900548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.900573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.900598] kthread+0x337/0x6f0 [ 16.900619] ? trace_preempt_on+0x20/0xc0 [ 16.900644] ? __pfx_kthread+0x10/0x10 [ 16.900666] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.900689] ? calculate_sigpending+0x7b/0xa0 [ 16.900715] ? __pfx_kthread+0x10/0x10 [ 16.900739] ret_from_fork+0x116/0x1d0 [ 16.900777] ? __pfx_kthread+0x10/0x10 [ 16.900800] ret_from_fork_asm+0x1a/0x30 [ 16.900833] </TASK> [ 16.900845] [ 16.908118] Allocated by task 283: [ 16.908303] kasan_save_stack+0x45/0x70 [ 16.908495] kasan_save_track+0x18/0x40 [ 16.908682] kasan_save_alloc_info+0x3b/0x50 [ 16.908909] __kasan_kmalloc+0xb7/0xc0 [ 16.909060] __kmalloc_cache_noprof+0x189/0x420 [ 16.909265] kasan_atomics+0x95/0x310 [ 16.909453] kunit_try_run_case+0x1a5/0x480 [ 16.909669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.909930] kthread+0x337/0x6f0 [ 16.910058] ret_from_fork+0x116/0x1d0 [ 16.910202] ret_from_fork_asm+0x1a/0x30 [ 16.910348] [ 16.910424] The buggy address belongs to the object at ffff8881038b5600 [ 16.910424] which belongs to the cache kmalloc-64 of size 64 [ 16.910822] The buggy address is located 0 bytes to the right of [ 16.910822] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.911212] [ 16.911312] The buggy address belongs to the physical page: [ 16.911585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.911962] flags: 0x200000000000000(node=0|zone=2) [ 16.912202] page_type: f5(slab) [ 16.912374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.912734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.913099] page dumped because: kasan: bad access detected [ 16.913356] [ 16.913451] Memory state around the buggy address: [ 16.913687] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.913985] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.914216] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.914438] ^ [ 16.914679] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.915035] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.915361] ================================================================== [ 16.228000] ================================================================== [ 16.228319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 16.228925] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.229382] [ 16.229528] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.229575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.229588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.229612] Call Trace: [ 16.229630] <TASK> [ 16.229657] dump_stack_lvl+0x73/0xb0 [ 16.229691] print_report+0xd1/0x610 [ 16.229714] ? __virt_addr_valid+0x1db/0x2d0 [ 16.229750] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.229773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.229798] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.229821] kasan_report+0x141/0x180 [ 16.229844] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.229873] kasan_check_range+0x10c/0x1c0 [ 16.229901] __kasan_check_read+0x15/0x20 [ 16.229922] kasan_atomics_helper+0x13b5/0x5450 [ 16.229946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.229970] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.229996] ? kasan_atomics+0x152/0x310 [ 16.230024] kasan_atomics+0x1dc/0x310 [ 16.230048] ? __pfx_kasan_atomics+0x10/0x10 [ 16.230082] ? __pfx_read_tsc+0x10/0x10 [ 16.230112] ? ktime_get_ts64+0x86/0x230 [ 16.230138] kunit_try_run_case+0x1a5/0x480 [ 16.230175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.230199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.230226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.230251] ? __kthread_parkme+0x82/0x180 [ 16.230273] ? preempt_count_sub+0x50/0x80 [ 16.230297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.230323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.230348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.230426] kthread+0x337/0x6f0 [ 16.230448] ? trace_preempt_on+0x20/0xc0 [ 16.230483] ? __pfx_kthread+0x10/0x10 [ 16.230515] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.230538] ? calculate_sigpending+0x7b/0xa0 [ 16.230574] ? __pfx_kthread+0x10/0x10 [ 16.230608] ret_from_fork+0x116/0x1d0 [ 16.230627] ? __pfx_kthread+0x10/0x10 [ 16.230649] ret_from_fork_asm+0x1a/0x30 [ 16.230691] </TASK> [ 16.230702] [ 16.239656] Allocated by task 283: [ 16.239868] kasan_save_stack+0x45/0x70 [ 16.240021] kasan_save_track+0x18/0x40 [ 16.240240] kasan_save_alloc_info+0x3b/0x50 [ 16.240529] __kasan_kmalloc+0xb7/0xc0 [ 16.240785] __kmalloc_cache_noprof+0x189/0x420 [ 16.241033] kasan_atomics+0x95/0x310 [ 16.241278] kunit_try_run_case+0x1a5/0x480 [ 16.241493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.241747] kthread+0x337/0x6f0 [ 16.241925] ret_from_fork+0x116/0x1d0 [ 16.242172] ret_from_fork_asm+0x1a/0x30 [ 16.242359] [ 16.242434] The buggy address belongs to the object at ffff8881038b5600 [ 16.242434] which belongs to the cache kmalloc-64 of size 64 [ 16.242989] The buggy address is located 0 bytes to the right of [ 16.242989] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.243732] [ 16.243897] The buggy address belongs to the physical page: [ 16.244298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.244613] flags: 0x200000000000000(node=0|zone=2) [ 16.244832] page_type: f5(slab) [ 16.245020] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.245434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.245709] page dumped because: kasan: bad access detected [ 16.245889] [ 16.245963] Memory state around the buggy address: [ 16.246129] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.246353] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.246750] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.247071] ^ [ 16.247300] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.247761] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.248111] ================================================================== [ 15.930743] ================================================================== [ 15.931160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.931537] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.931880] [ 15.931981] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.932026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.932039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.932060] Call Trace: [ 15.932076] <TASK> [ 15.932092] dump_stack_lvl+0x73/0xb0 [ 15.932122] print_report+0xd1/0x610 [ 15.932146] ? __virt_addr_valid+0x1db/0x2d0 [ 15.932169] ? kasan_atomics_helper+0xde0/0x5450 [ 15.932192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.932215] ? kasan_atomics_helper+0xde0/0x5450 [ 15.932238] kasan_report+0x141/0x180 [ 15.932262] ? kasan_atomics_helper+0xde0/0x5450 [ 15.932289] kasan_check_range+0x10c/0x1c0 [ 15.932314] __kasan_check_write+0x18/0x20 [ 15.932335] kasan_atomics_helper+0xde0/0x5450 [ 15.932358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.932382] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.932408] ? kasan_atomics+0x152/0x310 [ 15.932436] kasan_atomics+0x1dc/0x310 [ 15.932460] ? __pfx_kasan_atomics+0x10/0x10 [ 15.932497] ? __pfx_read_tsc+0x10/0x10 [ 15.932519] ? ktime_get_ts64+0x86/0x230 [ 15.932545] kunit_try_run_case+0x1a5/0x480 [ 15.932570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.932595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.932620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.932645] ? __kthread_parkme+0x82/0x180 [ 15.932667] ? preempt_count_sub+0x50/0x80 [ 15.932692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.932719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.932743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.932769] kthread+0x337/0x6f0 [ 15.932789] ? trace_preempt_on+0x20/0xc0 [ 15.932813] ? __pfx_kthread+0x10/0x10 [ 15.932835] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.932859] ? calculate_sigpending+0x7b/0xa0 [ 15.932884] ? __pfx_kthread+0x10/0x10 [ 15.932907] ret_from_fork+0x116/0x1d0 [ 15.932928] ? __pfx_kthread+0x10/0x10 [ 15.932950] ret_from_fork_asm+0x1a/0x30 [ 15.932982] </TASK> [ 15.932993] [ 15.941229] Allocated by task 283: [ 15.941370] kasan_save_stack+0x45/0x70 [ 15.941532] kasan_save_track+0x18/0x40 [ 15.941988] kasan_save_alloc_info+0x3b/0x50 [ 15.942494] __kasan_kmalloc+0xb7/0xc0 [ 15.942695] __kmalloc_cache_noprof+0x189/0x420 [ 15.942920] kasan_atomics+0x95/0x310 [ 15.943114] kunit_try_run_case+0x1a5/0x480 [ 15.943324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.943592] kthread+0x337/0x6f0 [ 15.943848] ret_from_fork+0x116/0x1d0 [ 15.943993] ret_from_fork_asm+0x1a/0x30 [ 15.944396] [ 15.944486] The buggy address belongs to the object at ffff8881038b5600 [ 15.944486] which belongs to the cache kmalloc-64 of size 64 [ 15.945043] The buggy address is located 0 bytes to the right of [ 15.945043] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.945624] [ 15.945721] The buggy address belongs to the physical page: [ 15.946243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.946592] flags: 0x200000000000000(node=0|zone=2) [ 15.946808] page_type: f5(slab) [ 15.946984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.947296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.947622] page dumped because: kasan: bad access detected [ 15.947976] [ 15.948103] Memory state around the buggy address: [ 15.948315] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.948582] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.948861] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.949570] ^ [ 15.949767] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.950201] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.950535] ================================================================== [ 16.544969] ================================================================== [ 16.545556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.546003] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.546394] [ 16.546544] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.546589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.546603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.546626] Call Trace: [ 16.546644] <TASK> [ 16.546660] dump_stack_lvl+0x73/0xb0 [ 16.546713] print_report+0xd1/0x610 [ 16.546738] ? __virt_addr_valid+0x1db/0x2d0 [ 16.546797] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.546821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.546845] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.546869] kasan_report+0x141/0x180 [ 16.546892] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.546920] kasan_check_range+0x10c/0x1c0 [ 16.546945] __kasan_check_write+0x18/0x20 [ 16.546967] kasan_atomics_helper+0x1b22/0x5450 [ 16.546991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.547014] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.547099] ? kasan_atomics+0x152/0x310 [ 16.547151] kasan_atomics+0x1dc/0x310 [ 16.547175] ? __pfx_kasan_atomics+0x10/0x10 [ 16.547202] ? __pfx_read_tsc+0x10/0x10 [ 16.547225] ? ktime_get_ts64+0x86/0x230 [ 16.547251] kunit_try_run_case+0x1a5/0x480 [ 16.547277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.547301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.547345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.547370] ? __kthread_parkme+0x82/0x180 [ 16.547392] ? preempt_count_sub+0x50/0x80 [ 16.547417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.547443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.547478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.547504] kthread+0x337/0x6f0 [ 16.547541] ? trace_preempt_on+0x20/0xc0 [ 16.547568] ? __pfx_kthread+0x10/0x10 [ 16.547604] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.547628] ? calculate_sigpending+0x7b/0xa0 [ 16.547654] ? __pfx_kthread+0x10/0x10 [ 16.547692] ret_from_fork+0x116/0x1d0 [ 16.547712] ? __pfx_kthread+0x10/0x10 [ 16.547747] ret_from_fork_asm+0x1a/0x30 [ 16.547799] </TASK> [ 16.547810] [ 16.556696] Allocated by task 283: [ 16.556910] kasan_save_stack+0x45/0x70 [ 16.557155] kasan_save_track+0x18/0x40 [ 16.557376] kasan_save_alloc_info+0x3b/0x50 [ 16.557603] __kasan_kmalloc+0xb7/0xc0 [ 16.557794] __kmalloc_cache_noprof+0x189/0x420 [ 16.558092] kasan_atomics+0x95/0x310 [ 16.558266] kunit_try_run_case+0x1a5/0x480 [ 16.558549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.558818] kthread+0x337/0x6f0 [ 16.558974] ret_from_fork+0x116/0x1d0 [ 16.559252] ret_from_fork_asm+0x1a/0x30 [ 16.559454] [ 16.559569] The buggy address belongs to the object at ffff8881038b5600 [ 16.559569] which belongs to the cache kmalloc-64 of size 64 [ 16.560173] The buggy address is located 0 bytes to the right of [ 16.560173] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.560727] [ 16.560859] The buggy address belongs to the physical page: [ 16.561345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.561694] flags: 0x200000000000000(node=0|zone=2) [ 16.561913] page_type: f5(slab) [ 16.562226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.562579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.562954] page dumped because: kasan: bad access detected [ 16.563309] [ 16.563404] Memory state around the buggy address: [ 16.563645] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.564014] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.564257] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.564605] ^ [ 16.564846] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.565175] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.565601] ================================================================== [ 16.130795] ================================================================== [ 16.131027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 16.131784] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.132455] [ 16.132730] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.132776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.132788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.132811] Call Trace: [ 16.132829] <TASK> [ 16.132871] dump_stack_lvl+0x73/0xb0 [ 16.132903] print_report+0xd1/0x610 [ 16.132928] ? __virt_addr_valid+0x1db/0x2d0 [ 16.132964] ? kasan_atomics_helper+0x1217/0x5450 [ 16.132986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.133010] ? kasan_atomics_helper+0x1217/0x5450 [ 16.133032] kasan_report+0x141/0x180 [ 16.133080] ? kasan_atomics_helper+0x1217/0x5450 [ 16.133107] kasan_check_range+0x10c/0x1c0 [ 16.133131] __kasan_check_write+0x18/0x20 [ 16.133178] kasan_atomics_helper+0x1217/0x5450 [ 16.133203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.133226] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.133251] ? kasan_atomics+0x152/0x310 [ 16.133280] kasan_atomics+0x1dc/0x310 [ 16.133330] ? __pfx_kasan_atomics+0x10/0x10 [ 16.133355] ? __pfx_read_tsc+0x10/0x10 [ 16.133388] ? ktime_get_ts64+0x86/0x230 [ 16.133414] kunit_try_run_case+0x1a5/0x480 [ 16.133440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.133463] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.133499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.133523] ? __kthread_parkme+0x82/0x180 [ 16.133545] ? preempt_count_sub+0x50/0x80 [ 16.133570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.133596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.133620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.133645] kthread+0x337/0x6f0 [ 16.133666] ? trace_preempt_on+0x20/0xc0 [ 16.133690] ? __pfx_kthread+0x10/0x10 [ 16.133711] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.133735] ? calculate_sigpending+0x7b/0xa0 [ 16.133760] ? __pfx_kthread+0x10/0x10 [ 16.133794] ret_from_fork+0x116/0x1d0 [ 16.133815] ? __pfx_kthread+0x10/0x10 [ 16.133836] ret_from_fork_asm+0x1a/0x30 [ 16.133868] </TASK> [ 16.133879] [ 16.142751] Allocated by task 283: [ 16.142977] kasan_save_stack+0x45/0x70 [ 16.143204] kasan_save_track+0x18/0x40 [ 16.143562] kasan_save_alloc_info+0x3b/0x50 [ 16.143828] __kasan_kmalloc+0xb7/0xc0 [ 16.144037] __kmalloc_cache_noprof+0x189/0x420 [ 16.144373] kasan_atomics+0x95/0x310 [ 16.144601] kunit_try_run_case+0x1a5/0x480 [ 16.144970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.145235] kthread+0x337/0x6f0 [ 16.145459] ret_from_fork+0x116/0x1d0 [ 16.145674] ret_from_fork_asm+0x1a/0x30 [ 16.145919] [ 16.146021] The buggy address belongs to the object at ffff8881038b5600 [ 16.146021] which belongs to the cache kmalloc-64 of size 64 [ 16.146686] The buggy address is located 0 bytes to the right of [ 16.146686] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.147400] [ 16.147526] The buggy address belongs to the physical page: [ 16.147869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.148482] flags: 0x200000000000000(node=0|zone=2) [ 16.148745] page_type: f5(slab) [ 16.148934] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.149346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.149684] page dumped because: kasan: bad access detected [ 16.150096] [ 16.150178] Memory state around the buggy address: [ 16.150424] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.150788] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.151188] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.151408] ^ [ 16.151741] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.152074] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.152310] ================================================================== [ 16.676756] ================================================================== [ 16.677168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.677820] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.678146] [ 16.678273] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.678323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.678336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.678360] Call Trace: [ 16.678379] <TASK> [ 16.678396] dump_stack_lvl+0x73/0xb0 [ 16.678429] print_report+0xd1/0x610 [ 16.678453] ? __virt_addr_valid+0x1db/0x2d0 [ 16.678491] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.678514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.678538] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.678560] kasan_report+0x141/0x180 [ 16.678583] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.678610] kasan_check_range+0x10c/0x1c0 [ 16.678635] __kasan_check_write+0x18/0x20 [ 16.678656] kasan_atomics_helper+0x1eaa/0x5450 [ 16.678679] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.678702] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.678729] ? kasan_atomics+0x152/0x310 [ 16.678756] kasan_atomics+0x1dc/0x310 [ 16.678780] ? __pfx_kasan_atomics+0x10/0x10 [ 16.678806] ? __pfx_read_tsc+0x10/0x10 [ 16.678828] ? ktime_get_ts64+0x86/0x230 [ 16.678854] kunit_try_run_case+0x1a5/0x480 [ 16.678891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.678914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.678940] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.678966] ? __kthread_parkme+0x82/0x180 [ 16.678988] ? preempt_count_sub+0x50/0x80 [ 16.679013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.679038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.679062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.679087] kthread+0x337/0x6f0 [ 16.679108] ? trace_preempt_on+0x20/0xc0 [ 16.679134] ? __pfx_kthread+0x10/0x10 [ 16.679155] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.679178] ? calculate_sigpending+0x7b/0xa0 [ 16.679203] ? __pfx_kthread+0x10/0x10 [ 16.679226] ret_from_fork+0x116/0x1d0 [ 16.679245] ? __pfx_kthread+0x10/0x10 [ 16.679267] ret_from_fork_asm+0x1a/0x30 [ 16.679299] </TASK> [ 16.679311] [ 16.693669] Allocated by task 283: [ 16.693824] kasan_save_stack+0x45/0x70 [ 16.693975] kasan_save_track+0x18/0x40 [ 16.694250] kasan_save_alloc_info+0x3b/0x50 [ 16.694478] __kasan_kmalloc+0xb7/0xc0 [ 16.694667] __kmalloc_cache_noprof+0x189/0x420 [ 16.694829] kasan_atomics+0x95/0x310 [ 16.695036] kunit_try_run_case+0x1a5/0x480 [ 16.695260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.695524] kthread+0x337/0x6f0 [ 16.695668] ret_from_fork+0x116/0x1d0 [ 16.695882] ret_from_fork_asm+0x1a/0x30 [ 16.696075] [ 16.696151] The buggy address belongs to the object at ffff8881038b5600 [ 16.696151] which belongs to the cache kmalloc-64 of size 64 [ 16.696744] The buggy address is located 0 bytes to the right of [ 16.696744] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.697185] [ 16.697262] The buggy address belongs to the physical page: [ 16.697538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.698046] flags: 0x200000000000000(node=0|zone=2) [ 16.698252] page_type: f5(slab) [ 16.698427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.698736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.699064] page dumped because: kasan: bad access detected [ 16.699299] [ 16.699373] Memory state around the buggy address: [ 16.699571] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.700042] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.700342] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.700593] ^ [ 16.700800] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.701131] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.701443] ================================================================== [ 16.095665] ================================================================== [ 16.096586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 16.096965] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.097307] [ 16.097425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.099639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.099663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.099688] Call Trace: [ 16.099708] <TASK> [ 16.099726] dump_stack_lvl+0x73/0xb0 [ 16.099762] print_report+0xd1/0x610 [ 16.099786] ? __virt_addr_valid+0x1db/0x2d0 [ 16.099809] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.099846] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.099870] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.099895] kasan_report+0x141/0x180 [ 16.099918] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.099945] __asan_report_load4_noabort+0x18/0x20 [ 16.099970] kasan_atomics_helper+0x4a02/0x5450 [ 16.099995] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.100018] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.100046] ? kasan_atomics+0x152/0x310 [ 16.100074] kasan_atomics+0x1dc/0x310 [ 16.100099] ? __pfx_kasan_atomics+0x10/0x10 [ 16.100126] ? __pfx_read_tsc+0x10/0x10 [ 16.100149] ? ktime_get_ts64+0x86/0x230 [ 16.100175] kunit_try_run_case+0x1a5/0x480 [ 16.100200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.100224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.100250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.100275] ? __kthread_parkme+0x82/0x180 [ 16.100296] ? preempt_count_sub+0x50/0x80 [ 16.100322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.100348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.100373] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.100398] kthread+0x337/0x6f0 [ 16.100419] ? trace_preempt_on+0x20/0xc0 [ 16.100442] ? __pfx_kthread+0x10/0x10 [ 16.100465] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.100499] ? calculate_sigpending+0x7b/0xa0 [ 16.100526] ? __pfx_kthread+0x10/0x10 [ 16.100550] ret_from_fork+0x116/0x1d0 [ 16.100570] ? __pfx_kthread+0x10/0x10 [ 16.100594] ret_from_fork_asm+0x1a/0x30 [ 16.100626] </TASK> [ 16.100637] [ 16.115456] Allocated by task 283: [ 16.115847] kasan_save_stack+0x45/0x70 [ 16.116323] kasan_save_track+0x18/0x40 [ 16.116633] kasan_save_alloc_info+0x3b/0x50 [ 16.116822] __kasan_kmalloc+0xb7/0xc0 [ 16.117290] __kmalloc_cache_noprof+0x189/0x420 [ 16.117754] kasan_atomics+0x95/0x310 [ 16.118265] kunit_try_run_case+0x1a5/0x480 [ 16.118579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.118929] kthread+0x337/0x6f0 [ 16.119489] ret_from_fork+0x116/0x1d0 [ 16.119778] ret_from_fork_asm+0x1a/0x30 [ 16.119930] [ 16.120008] The buggy address belongs to the object at ffff8881038b5600 [ 16.120008] which belongs to the cache kmalloc-64 of size 64 [ 16.121252] The buggy address is located 0 bytes to the right of [ 16.121252] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.122636] [ 16.122844] The buggy address belongs to the physical page: [ 16.123329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.123588] flags: 0x200000000000000(node=0|zone=2) [ 16.123759] page_type: f5(slab) [ 16.124120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.125024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.125874] page dumped because: kasan: bad access detected [ 16.126388] [ 16.126571] Memory state around the buggy address: [ 16.127169] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.127661] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.128119] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.128912] ^ [ 16.129443] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.130157] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.130388] ================================================================== [ 15.970063] ================================================================== [ 15.970420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.970769] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.971100] [ 15.971207] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.971249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.971262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.971283] Call Trace: [ 15.971299] <TASK> [ 15.971314] dump_stack_lvl+0x73/0xb0 [ 15.971343] print_report+0xd1/0x610 [ 15.971366] ? __virt_addr_valid+0x1db/0x2d0 [ 15.971388] ? kasan_atomics_helper+0xf10/0x5450 [ 15.971410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.971434] ? kasan_atomics_helper+0xf10/0x5450 [ 15.971456] kasan_report+0x141/0x180 [ 15.971538] ? kasan_atomics_helper+0xf10/0x5450 [ 15.971568] kasan_check_range+0x10c/0x1c0 [ 15.971593] __kasan_check_write+0x18/0x20 [ 15.971613] kasan_atomics_helper+0xf10/0x5450 [ 15.971636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.971660] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.971686] ? kasan_atomics+0x152/0x310 [ 15.971713] kasan_atomics+0x1dc/0x310 [ 15.971737] ? __pfx_kasan_atomics+0x10/0x10 [ 15.971762] ? __pfx_read_tsc+0x10/0x10 [ 15.971784] ? ktime_get_ts64+0x86/0x230 [ 15.971810] kunit_try_run_case+0x1a5/0x480 [ 15.971835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.971858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.971884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.971908] ? __kthread_parkme+0x82/0x180 [ 15.971929] ? preempt_count_sub+0x50/0x80 [ 15.971953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.971978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972028] kthread+0x337/0x6f0 [ 15.972048] ? trace_preempt_on+0x20/0xc0 [ 15.972073] ? __pfx_kthread+0x10/0x10 [ 15.972095] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.972118] ? calculate_sigpending+0x7b/0xa0 [ 15.972142] ? __pfx_kthread+0x10/0x10 [ 15.972165] ret_from_fork+0x116/0x1d0 [ 15.972186] ? __pfx_kthread+0x10/0x10 [ 15.972207] ret_from_fork_asm+0x1a/0x30 [ 15.972239] </TASK> [ 15.972250] [ 15.981479] Allocated by task 283: [ 15.981651] kasan_save_stack+0x45/0x70 [ 15.981868] kasan_save_track+0x18/0x40 [ 15.982053] kasan_save_alloc_info+0x3b/0x50 [ 15.982527] __kasan_kmalloc+0xb7/0xc0 [ 15.982732] __kmalloc_cache_noprof+0x189/0x420 [ 15.982961] kasan_atomics+0x95/0x310 [ 15.983221] kunit_try_run_case+0x1a5/0x480 [ 15.983411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.983675] kthread+0x337/0x6f0 [ 15.983873] ret_from_fork+0x116/0x1d0 [ 15.984092] ret_from_fork_asm+0x1a/0x30 [ 15.984288] [ 15.984390] The buggy address belongs to the object at ffff8881038b5600 [ 15.984390] which belongs to the cache kmalloc-64 of size 64 [ 15.984915] The buggy address is located 0 bytes to the right of [ 15.984915] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.985698] [ 15.985814] The buggy address belongs to the physical page: [ 15.986108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.986413] flags: 0x200000000000000(node=0|zone=2) [ 15.986669] page_type: f5(slab) [ 15.986889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.987397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.987658] page dumped because: kasan: bad access detected [ 15.987990] [ 15.988124] Memory state around the buggy address: [ 15.988356] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.988702] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.989188] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.989418] ^ [ 15.989598] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990156] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990505] ================================================================== [ 16.269648] ================================================================== [ 16.270119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 16.270462] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.270879] [ 16.270995] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.271071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.271086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.271107] Call Trace: [ 16.271134] <TASK> [ 16.271150] dump_stack_lvl+0x73/0xb0 [ 16.271180] print_report+0xd1/0x610 [ 16.271216] ? __virt_addr_valid+0x1db/0x2d0 [ 16.271239] ? kasan_atomics_helper+0x1467/0x5450 [ 16.271262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.271284] ? kasan_atomics_helper+0x1467/0x5450 [ 16.271317] kasan_report+0x141/0x180 [ 16.271339] ? kasan_atomics_helper+0x1467/0x5450 [ 16.271367] kasan_check_range+0x10c/0x1c0 [ 16.271401] __kasan_check_write+0x18/0x20 [ 16.271422] kasan_atomics_helper+0x1467/0x5450 [ 16.271446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.271488] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.271513] ? kasan_atomics+0x152/0x310 [ 16.271552] kasan_atomics+0x1dc/0x310 [ 16.271576] ? __pfx_kasan_atomics+0x10/0x10 [ 16.271601] ? __pfx_read_tsc+0x10/0x10 [ 16.271623] ? ktime_get_ts64+0x86/0x230 [ 16.271648] kunit_try_run_case+0x1a5/0x480 [ 16.271673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.271698] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.271723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.271747] ? __kthread_parkme+0x82/0x180 [ 16.271769] ? preempt_count_sub+0x50/0x80 [ 16.271812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.271838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.271862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.271898] kthread+0x337/0x6f0 [ 16.271918] ? trace_preempt_on+0x20/0xc0 [ 16.271942] ? __pfx_kthread+0x10/0x10 [ 16.271965] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.271988] ? calculate_sigpending+0x7b/0xa0 [ 16.272013] ? __pfx_kthread+0x10/0x10 [ 16.272068] ret_from_fork+0x116/0x1d0 [ 16.272092] ? __pfx_kthread+0x10/0x10 [ 16.272115] ret_from_fork_asm+0x1a/0x30 [ 16.272158] </TASK> [ 16.272171] [ 16.280872] Allocated by task 283: [ 16.281083] kasan_save_stack+0x45/0x70 [ 16.281366] kasan_save_track+0x18/0x40 [ 16.281602] kasan_save_alloc_info+0x3b/0x50 [ 16.281861] __kasan_kmalloc+0xb7/0xc0 [ 16.282108] __kmalloc_cache_noprof+0x189/0x420 [ 16.282358] kasan_atomics+0x95/0x310 [ 16.282582] kunit_try_run_case+0x1a5/0x480 [ 16.282816] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.283009] kthread+0x337/0x6f0 [ 16.283230] ret_from_fork+0x116/0x1d0 [ 16.283454] ret_from_fork_asm+0x1a/0x30 [ 16.283643] [ 16.283720] The buggy address belongs to the object at ffff8881038b5600 [ 16.283720] which belongs to the cache kmalloc-64 of size 64 [ 16.284084] The buggy address is located 0 bytes to the right of [ 16.284084] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.284905] [ 16.285017] The buggy address belongs to the physical page: [ 16.285280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.285582] flags: 0x200000000000000(node=0|zone=2) [ 16.285753] page_type: f5(slab) [ 16.285879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.286430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.287061] page dumped because: kasan: bad access detected [ 16.287258] [ 16.287339] Memory state around the buggy address: [ 16.287578] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.287935] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.288339] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.288614] ^ [ 16.288777] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.289119] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.289446] ================================================================== [ 15.991117] ================================================================== [ 15.991370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.991741] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.992306] [ 15.992429] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.992489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.992502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.992524] Call Trace: [ 15.992543] <TASK> [ 15.992558] dump_stack_lvl+0x73/0xb0 [ 15.992593] print_report+0xd1/0x610 [ 15.992617] ? __virt_addr_valid+0x1db/0x2d0 [ 15.992640] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.992663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.992686] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.992710] kasan_report+0x141/0x180 [ 15.992735] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.992762] kasan_check_range+0x10c/0x1c0 [ 15.992788] __kasan_check_write+0x18/0x20 [ 15.992821] kasan_atomics_helper+0xfa9/0x5450 [ 15.992846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.992869] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.992896] ? kasan_atomics+0x152/0x310 [ 15.992925] kasan_atomics+0x1dc/0x310 [ 15.992950] ? __pfx_kasan_atomics+0x10/0x10 [ 15.992976] ? __pfx_read_tsc+0x10/0x10 [ 15.992998] ? ktime_get_ts64+0x86/0x230 [ 15.993024] kunit_try_run_case+0x1a5/0x480 [ 15.993144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.993199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.993225] ? __kthread_parkme+0x82/0x180 [ 15.993248] ? preempt_count_sub+0x50/0x80 [ 15.993275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.993326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.993352] kthread+0x337/0x6f0 [ 15.993373] ? trace_preempt_on+0x20/0xc0 [ 15.993397] ? __pfx_kthread+0x10/0x10 [ 15.993419] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.993444] ? calculate_sigpending+0x7b/0xa0 [ 15.993482] ? __pfx_kthread+0x10/0x10 [ 15.993505] ret_from_fork+0x116/0x1d0 [ 15.993527] ? __pfx_kthread+0x10/0x10 [ 15.993550] ret_from_fork_asm+0x1a/0x30 [ 15.993583] </TASK> [ 15.993594] [ 16.002027] Allocated by task 283: [ 16.002451] kasan_save_stack+0x45/0x70 [ 16.002683] kasan_save_track+0x18/0x40 [ 16.002996] kasan_save_alloc_info+0x3b/0x50 [ 16.003230] __kasan_kmalloc+0xb7/0xc0 [ 16.003372] __kmalloc_cache_noprof+0x189/0x420 [ 16.003574] kasan_atomics+0x95/0x310 [ 16.003765] kunit_try_run_case+0x1a5/0x480 [ 16.003985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.004430] kthread+0x337/0x6f0 [ 16.004572] ret_from_fork+0x116/0x1d0 [ 16.004715] ret_from_fork_asm+0x1a/0x30 [ 16.005107] [ 16.005211] The buggy address belongs to the object at ffff8881038b5600 [ 16.005211] which belongs to the cache kmalloc-64 of size 64 [ 16.005744] The buggy address is located 0 bytes to the right of [ 16.005744] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.006323] [ 16.006407] The buggy address belongs to the physical page: [ 16.006671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.007061] flags: 0x200000000000000(node=0|zone=2) [ 16.007263] page_type: f5(slab) [ 16.007435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.007751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.008061] page dumped because: kasan: bad access detected [ 16.008296] [ 16.008369] Memory state around the buggy address: [ 16.008610] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.008926] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.009149] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.009371] ^ [ 16.009547] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.009776] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.009997] ================================================================== [ 15.419518] ================================================================== [ 15.419937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.420234] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.420677] [ 15.420888] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.420939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.420951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.420974] Call Trace: [ 15.420992] <TASK> [ 15.421008] dump_stack_lvl+0x73/0xb0 [ 15.421040] print_report+0xd1/0x610 [ 15.421064] ? __virt_addr_valid+0x1db/0x2d0 [ 15.421086] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.421166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.421204] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.421227] kasan_report+0x141/0x180 [ 15.421250] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.421277] __asan_report_load4_noabort+0x18/0x20 [ 15.421302] kasan_atomics_helper+0x4b88/0x5450 [ 15.421325] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.421347] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.421374] ? kasan_atomics+0x152/0x310 [ 15.421401] kasan_atomics+0x1dc/0x310 [ 15.421424] ? __pfx_kasan_atomics+0x10/0x10 [ 15.421449] ? __pfx_read_tsc+0x10/0x10 [ 15.421481] ? ktime_get_ts64+0x86/0x230 [ 15.421507] kunit_try_run_case+0x1a5/0x480 [ 15.421532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.421582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.421606] ? __kthread_parkme+0x82/0x180 [ 15.421627] ? preempt_count_sub+0x50/0x80 [ 15.421653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.421728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.421753] kthread+0x337/0x6f0 [ 15.421774] ? trace_preempt_on+0x20/0xc0 [ 15.421809] ? __pfx_kthread+0x10/0x10 [ 15.421830] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.421853] ? calculate_sigpending+0x7b/0xa0 [ 15.421907] ? __pfx_kthread+0x10/0x10 [ 15.421930] ret_from_fork+0x116/0x1d0 [ 15.421949] ? __pfx_kthread+0x10/0x10 [ 15.421981] ret_from_fork_asm+0x1a/0x30 [ 15.422013] </TASK> [ 15.422024] [ 15.431377] Allocated by task 283: [ 15.431637] kasan_save_stack+0x45/0x70 [ 15.431936] kasan_save_track+0x18/0x40 [ 15.432221] kasan_save_alloc_info+0x3b/0x50 [ 15.432533] __kasan_kmalloc+0xb7/0xc0 [ 15.432734] __kmalloc_cache_noprof+0x189/0x420 [ 15.432926] kasan_atomics+0x95/0x310 [ 15.433432] kunit_try_run_case+0x1a5/0x480 [ 15.433605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.433956] kthread+0x337/0x6f0 [ 15.434218] ret_from_fork+0x116/0x1d0 [ 15.434395] ret_from_fork_asm+0x1a/0x30 [ 15.434553] [ 15.434656] The buggy address belongs to the object at ffff8881038b5600 [ 15.434656] which belongs to the cache kmalloc-64 of size 64 [ 15.435335] The buggy address is located 0 bytes to the right of [ 15.435335] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.435919] [ 15.436068] The buggy address belongs to the physical page: [ 15.436260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.436541] flags: 0x200000000000000(node=0|zone=2) [ 15.437010] page_type: f5(slab) [ 15.437393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.437801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.438277] page dumped because: kasan: bad access detected [ 15.438528] [ 15.438605] Memory state around the buggy address: [ 15.438794] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.439252] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.439692] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.440003] ^ [ 15.440263] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440517] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440852] ================================================================== [ 16.701980] ================================================================== [ 16.702479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.702819] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.703155] [ 16.703277] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.703322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.703335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.703359] Call Trace: [ 16.703375] <TASK> [ 16.703392] dump_stack_lvl+0x73/0xb0 [ 16.703422] print_report+0xd1/0x610 [ 16.703446] ? __virt_addr_valid+0x1db/0x2d0 [ 16.703482] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.703505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.703529] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.703552] kasan_report+0x141/0x180 [ 16.703575] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.703603] kasan_check_range+0x10c/0x1c0 [ 16.703627] __kasan_check_write+0x18/0x20 [ 16.703648] kasan_atomics_helper+0x1f43/0x5450 [ 16.703672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.703696] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.703721] ? kasan_atomics+0x152/0x310 [ 16.703750] kasan_atomics+0x1dc/0x310 [ 16.703773] ? __pfx_kasan_atomics+0x10/0x10 [ 16.703799] ? __pfx_read_tsc+0x10/0x10 [ 16.703821] ? ktime_get_ts64+0x86/0x230 [ 16.703847] kunit_try_run_case+0x1a5/0x480 [ 16.703873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.703897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.703923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.703948] ? __kthread_parkme+0x82/0x180 [ 16.703970] ? preempt_count_sub+0x50/0x80 [ 16.703995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.704021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.704046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.704071] kthread+0x337/0x6f0 [ 16.704092] ? trace_preempt_on+0x20/0xc0 [ 16.704117] ? __pfx_kthread+0x10/0x10 [ 16.704138] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.704163] ? calculate_sigpending+0x7b/0xa0 [ 16.704187] ? __pfx_kthread+0x10/0x10 [ 16.704211] ret_from_fork+0x116/0x1d0 [ 16.704231] ? __pfx_kthread+0x10/0x10 [ 16.704252] ret_from_fork_asm+0x1a/0x30 [ 16.704284] </TASK> [ 16.704295] [ 16.711931] Allocated by task 283: [ 16.712119] kasan_save_stack+0x45/0x70 [ 16.712325] kasan_save_track+0x18/0x40 [ 16.712533] kasan_save_alloc_info+0x3b/0x50 [ 16.712722] __kasan_kmalloc+0xb7/0xc0 [ 16.712889] __kmalloc_cache_noprof+0x189/0x420 [ 16.713114] kasan_atomics+0x95/0x310 [ 16.713288] kunit_try_run_case+0x1a5/0x480 [ 16.713487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.713724] kthread+0x337/0x6f0 [ 16.713920] ret_from_fork+0x116/0x1d0 [ 16.714061] ret_from_fork_asm+0x1a/0x30 [ 16.714213] [ 16.714290] The buggy address belongs to the object at ffff8881038b5600 [ 16.714290] which belongs to the cache kmalloc-64 of size 64 [ 16.714671] The buggy address is located 0 bytes to the right of [ 16.714671] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.715055] [ 16.715131] The buggy address belongs to the physical page: [ 16.715395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.715763] flags: 0x200000000000000(node=0|zone=2) [ 16.716276] page_type: f5(slab) [ 16.716450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.716711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.716945] page dumped because: kasan: bad access detected [ 16.717122] [ 16.717195] Memory state around the buggy address: [ 16.717355] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.717631] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.718202] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.718547] ^ [ 16.718778] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.719107] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.719439] ================================================================== [ 16.412838] ================================================================== [ 16.413198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.413596] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.413950] [ 16.414072] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.414133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.414145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.414169] Call Trace: [ 16.414189] <TASK> [ 16.414205] dump_stack_lvl+0x73/0xb0 [ 16.414236] print_report+0xd1/0x610 [ 16.414260] ? __virt_addr_valid+0x1db/0x2d0 [ 16.414284] ? kasan_atomics_helper+0x177f/0x5450 [ 16.414306] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.414330] ? kasan_atomics_helper+0x177f/0x5450 [ 16.414354] kasan_report+0x141/0x180 [ 16.414392] ? kasan_atomics_helper+0x177f/0x5450 [ 16.414420] kasan_check_range+0x10c/0x1c0 [ 16.414445] __kasan_check_write+0x18/0x20 [ 16.414465] kasan_atomics_helper+0x177f/0x5450 [ 16.414500] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.414524] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.414551] ? kasan_atomics+0x152/0x310 [ 16.414601] kasan_atomics+0x1dc/0x310 [ 16.414650] ? __pfx_kasan_atomics+0x10/0x10 [ 16.414676] ? __pfx_read_tsc+0x10/0x10 [ 16.414728] ? ktime_get_ts64+0x86/0x230 [ 16.414778] kunit_try_run_case+0x1a5/0x480 [ 16.414805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.414830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.414855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.414881] ? __kthread_parkme+0x82/0x180 [ 16.414902] ? preempt_count_sub+0x50/0x80 [ 16.414927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.414952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.414977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.415003] kthread+0x337/0x6f0 [ 16.415024] ? trace_preempt_on+0x20/0xc0 [ 16.415067] ? __pfx_kthread+0x10/0x10 [ 16.415090] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.415114] ? calculate_sigpending+0x7b/0xa0 [ 16.415139] ? __pfx_kthread+0x10/0x10 [ 16.415162] ret_from_fork+0x116/0x1d0 [ 16.415218] ? __pfx_kthread+0x10/0x10 [ 16.415240] ret_from_fork_asm+0x1a/0x30 [ 16.415273] </TASK> [ 16.415284] [ 16.427995] Allocated by task 283: [ 16.428438] kasan_save_stack+0x45/0x70 [ 16.428786] kasan_save_track+0x18/0x40 [ 16.429281] kasan_save_alloc_info+0x3b/0x50 [ 16.429516] __kasan_kmalloc+0xb7/0xc0 [ 16.429696] __kmalloc_cache_noprof+0x189/0x420 [ 16.430084] kasan_atomics+0x95/0x310 [ 16.430488] kunit_try_run_case+0x1a5/0x480 [ 16.430705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.431232] kthread+0x337/0x6f0 [ 16.431667] ret_from_fork+0x116/0x1d0 [ 16.431965] ret_from_fork_asm+0x1a/0x30 [ 16.432320] [ 16.432441] The buggy address belongs to the object at ffff8881038b5600 [ 16.432441] which belongs to the cache kmalloc-64 of size 64 [ 16.433302] The buggy address is located 0 bytes to the right of [ 16.433302] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.434233] [ 16.434359] The buggy address belongs to the physical page: [ 16.434620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.435274] flags: 0x200000000000000(node=0|zone=2) [ 16.435769] page_type: f5(slab) [ 16.436080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.436721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.437127] page dumped because: kasan: bad access detected [ 16.437373] [ 16.437499] Memory state around the buggy address: [ 16.437712] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.437976] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.438339] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.438595] ^ [ 16.438858] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.439171] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.439394] ================================================================== [ 16.719942] ================================================================== [ 16.720638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.721032] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.721324] [ 16.721409] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.721453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.721465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.721497] Call Trace: [ 16.721512] <TASK> [ 16.721527] dump_stack_lvl+0x73/0xb0 [ 16.721558] print_report+0xd1/0x610 [ 16.721581] ? __virt_addr_valid+0x1db/0x2d0 [ 16.721605] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.721627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.721650] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.721673] kasan_report+0x141/0x180 [ 16.721696] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.721723] __asan_report_load8_noabort+0x18/0x20 [ 16.721748] kasan_atomics_helper+0x4f71/0x5450 [ 16.721772] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.721805] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.721830] ? kasan_atomics+0x152/0x310 [ 16.721858] kasan_atomics+0x1dc/0x310 [ 16.721881] ? __pfx_kasan_atomics+0x10/0x10 [ 16.721906] ? __pfx_read_tsc+0x10/0x10 [ 16.721929] ? ktime_get_ts64+0x86/0x230 [ 16.721954] kunit_try_run_case+0x1a5/0x480 [ 16.721980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.722004] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.722031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.722055] ? __kthread_parkme+0x82/0x180 [ 16.722077] ? preempt_count_sub+0x50/0x80 [ 16.722109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.722134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.722158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.722183] kthread+0x337/0x6f0 [ 16.722204] ? trace_preempt_on+0x20/0xc0 [ 16.722229] ? __pfx_kthread+0x10/0x10 [ 16.722250] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.722273] ? calculate_sigpending+0x7b/0xa0 [ 16.722298] ? __pfx_kthread+0x10/0x10 [ 16.722321] ret_from_fork+0x116/0x1d0 [ 16.722341] ? __pfx_kthread+0x10/0x10 [ 16.722362] ret_from_fork_asm+0x1a/0x30 [ 16.722394] </TASK> [ 16.722405] [ 16.730056] Allocated by task 283: [ 16.730202] kasan_save_stack+0x45/0x70 [ 16.730351] kasan_save_track+0x18/0x40 [ 16.730557] kasan_save_alloc_info+0x3b/0x50 [ 16.730775] __kasan_kmalloc+0xb7/0xc0 [ 16.730969] __kmalloc_cache_noprof+0x189/0x420 [ 16.731139] kasan_atomics+0x95/0x310 [ 16.731277] kunit_try_run_case+0x1a5/0x480 [ 16.731435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.731630] kthread+0x337/0x6f0 [ 16.731756] ret_from_fork+0x116/0x1d0 [ 16.731898] ret_from_fork_asm+0x1a/0x30 [ 16.732048] [ 16.732125] The buggy address belongs to the object at ffff8881038b5600 [ 16.732125] which belongs to the cache kmalloc-64 of size 64 [ 16.733398] The buggy address is located 0 bytes to the right of [ 16.733398] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.735229] [ 16.735609] The buggy address belongs to the physical page: [ 16.736226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.737190] flags: 0x200000000000000(node=0|zone=2) [ 16.737845] page_type: f5(slab) [ 16.738387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.739386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.740392] page dumped because: kasan: bad access detected [ 16.741170] [ 16.741505] Memory state around the buggy address: [ 16.741678] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.742442] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.743315] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.743562] ^ [ 16.743726] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.744385] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.744624] ================================================================== [ 15.747703] ================================================================== [ 15.748515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.748791] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.749308] [ 15.749448] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.749507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.749520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.749553] Call Trace: [ 15.749573] <TASK> [ 15.749590] dump_stack_lvl+0x73/0xb0 [ 15.749635] print_report+0xd1/0x610 [ 15.749660] ? __virt_addr_valid+0x1db/0x2d0 [ 15.749684] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.749707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.749740] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.749764] kasan_report+0x141/0x180 [ 15.749788] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.749827] kasan_check_range+0x10c/0x1c0 [ 15.749852] __kasan_check_write+0x18/0x20 [ 15.749873] kasan_atomics_helper+0x8f9/0x5450 [ 15.749897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.749922] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.749958] ? kasan_atomics+0x152/0x310 [ 15.749987] kasan_atomics+0x1dc/0x310 [ 15.750022] ? __pfx_kasan_atomics+0x10/0x10 [ 15.750099] ? __pfx_read_tsc+0x10/0x10 [ 15.750133] ? ktime_get_ts64+0x86/0x230 [ 15.750159] kunit_try_run_case+0x1a5/0x480 [ 15.750187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.750224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.750252] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.750289] ? __kthread_parkme+0x82/0x180 [ 15.750312] ? preempt_count_sub+0x50/0x80 [ 15.750338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.750364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.750399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.750425] kthread+0x337/0x6f0 [ 15.750447] ? trace_preempt_on+0x20/0xc0 [ 15.750487] ? __pfx_kthread+0x10/0x10 [ 15.750510] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.750535] ? calculate_sigpending+0x7b/0xa0 [ 15.750561] ? __pfx_kthread+0x10/0x10 [ 15.750595] ret_from_fork+0x116/0x1d0 [ 15.750616] ? __pfx_kthread+0x10/0x10 [ 15.750638] ret_from_fork_asm+0x1a/0x30 [ 15.750682] </TASK> [ 15.750694] [ 15.759823] Allocated by task 283: [ 15.759967] kasan_save_stack+0x45/0x70 [ 15.760117] kasan_save_track+0x18/0x40 [ 15.760259] kasan_save_alloc_info+0x3b/0x50 [ 15.760423] __kasan_kmalloc+0xb7/0xc0 [ 15.760626] __kmalloc_cache_noprof+0x189/0x420 [ 15.760853] kasan_atomics+0x95/0x310 [ 15.761558] kunit_try_run_case+0x1a5/0x480 [ 15.761786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.762088] kthread+0x337/0x6f0 [ 15.762276] ret_from_fork+0x116/0x1d0 [ 15.762484] ret_from_fork_asm+0x1a/0x30 [ 15.762685] [ 15.762792] The buggy address belongs to the object at ffff8881038b5600 [ 15.762792] which belongs to the cache kmalloc-64 of size 64 [ 15.763455] The buggy address is located 0 bytes to the right of [ 15.763455] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.764259] [ 15.764386] The buggy address belongs to the physical page: [ 15.764647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.765030] flags: 0x200000000000000(node=0|zone=2) [ 15.765490] page_type: f5(slab) [ 15.765636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.766008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.766397] page dumped because: kasan: bad access detected [ 15.766672] [ 15.766763] Memory state around the buggy address: [ 15.767066] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.767305] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.767533] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.767811] ^ [ 15.768136] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.768481] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.768810] ================================================================== [ 15.769341] ================================================================== [ 15.769597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.769852] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.770185] [ 15.770292] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.770337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.770349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.770371] Call Trace: [ 15.770388] <TASK> [ 15.770403] dump_stack_lvl+0x73/0xb0 [ 15.770433] print_report+0xd1/0x610 [ 15.770456] ? __virt_addr_valid+0x1db/0x2d0 [ 15.770515] ? kasan_atomics_helper+0x992/0x5450 [ 15.770538] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.770561] ? kasan_atomics_helper+0x992/0x5450 [ 15.770755] kasan_report+0x141/0x180 [ 15.770783] ? kasan_atomics_helper+0x992/0x5450 [ 15.770821] kasan_check_range+0x10c/0x1c0 [ 15.770846] __kasan_check_write+0x18/0x20 [ 15.770866] kasan_atomics_helper+0x992/0x5450 [ 15.770889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.770912] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.770953] ? kasan_atomics+0x152/0x310 [ 15.770980] kasan_atomics+0x1dc/0x310 [ 15.771017] ? __pfx_kasan_atomics+0x10/0x10 [ 15.771093] ? __pfx_read_tsc+0x10/0x10 [ 15.771117] ? ktime_get_ts64+0x86/0x230 [ 15.771142] kunit_try_run_case+0x1a5/0x480 [ 15.771169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.771193] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.771218] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.771243] ? __kthread_parkme+0x82/0x180 [ 15.771264] ? preempt_count_sub+0x50/0x80 [ 15.771289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.771314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.771339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.771364] kthread+0x337/0x6f0 [ 15.771386] ? trace_preempt_on+0x20/0xc0 [ 15.771410] ? __pfx_kthread+0x10/0x10 [ 15.771432] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.771465] ? calculate_sigpending+0x7b/0xa0 [ 15.771500] ? __pfx_kthread+0x10/0x10 [ 15.771523] ret_from_fork+0x116/0x1d0 [ 15.771556] ? __pfx_kthread+0x10/0x10 [ 15.771579] ret_from_fork_asm+0x1a/0x30 [ 15.771611] </TASK> [ 15.771622] [ 15.780493] Allocated by task 283: [ 15.780637] kasan_save_stack+0x45/0x70 [ 15.781063] kasan_save_track+0x18/0x40 [ 15.781273] kasan_save_alloc_info+0x3b/0x50 [ 15.781503] __kasan_kmalloc+0xb7/0xc0 [ 15.781696] __kmalloc_cache_noprof+0x189/0x420 [ 15.781925] kasan_atomics+0x95/0x310 [ 15.782123] kunit_try_run_case+0x1a5/0x480 [ 15.782336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.782838] kthread+0x337/0x6f0 [ 15.782981] ret_from_fork+0x116/0x1d0 [ 15.783344] ret_from_fork_asm+0x1a/0x30 [ 15.783531] [ 15.783636] The buggy address belongs to the object at ffff8881038b5600 [ 15.783636] which belongs to the cache kmalloc-64 of size 64 [ 15.784316] The buggy address is located 0 bytes to the right of [ 15.784316] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.784934] [ 15.785037] The buggy address belongs to the physical page: [ 15.785335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.785699] flags: 0x200000000000000(node=0|zone=2) [ 15.786006] page_type: f5(slab) [ 15.786196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.786512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.786752] page dumped because: kasan: bad access detected [ 15.787315] [ 15.787422] Memory state around the buggy address: [ 15.787683] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.788169] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.788461] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.788849] ^ [ 15.789070] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.789410] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.789721] ================================================================== [ 16.566636] ================================================================== [ 16.567311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.567675] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.568024] [ 16.568159] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.568206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.568219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.568259] Call Trace: [ 16.568273] <TASK> [ 16.568288] dump_stack_lvl+0x73/0xb0 [ 16.568319] print_report+0xd1/0x610 [ 16.568344] ? __virt_addr_valid+0x1db/0x2d0 [ 16.568368] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.568392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.568416] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.568440] kasan_report+0x141/0x180 [ 16.568491] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.568534] kasan_check_range+0x10c/0x1c0 [ 16.568560] __kasan_check_write+0x18/0x20 [ 16.568594] kasan_atomics_helper+0x1c18/0x5450 [ 16.568633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.568657] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.568683] ? kasan_atomics+0x152/0x310 [ 16.568712] kasan_atomics+0x1dc/0x310 [ 16.568736] ? __pfx_kasan_atomics+0x10/0x10 [ 16.568806] ? __pfx_read_tsc+0x10/0x10 [ 16.568829] ? ktime_get_ts64+0x86/0x230 [ 16.568855] kunit_try_run_case+0x1a5/0x480 [ 16.568881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.568906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.568931] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.568956] ? __kthread_parkme+0x82/0x180 [ 16.568978] ? preempt_count_sub+0x50/0x80 [ 16.569033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.569063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.569087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.569131] kthread+0x337/0x6f0 [ 16.569154] ? trace_preempt_on+0x20/0xc0 [ 16.569177] ? __pfx_kthread+0x10/0x10 [ 16.569200] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.569225] ? calculate_sigpending+0x7b/0xa0 [ 16.569249] ? __pfx_kthread+0x10/0x10 [ 16.569273] ret_from_fork+0x116/0x1d0 [ 16.569293] ? __pfx_kthread+0x10/0x10 [ 16.569315] ret_from_fork_asm+0x1a/0x30 [ 16.569347] </TASK> [ 16.569359] [ 16.577391] Allocated by task 283: [ 16.577575] kasan_save_stack+0x45/0x70 [ 16.577851] kasan_save_track+0x18/0x40 [ 16.578038] kasan_save_alloc_info+0x3b/0x50 [ 16.578296] __kasan_kmalloc+0xb7/0xc0 [ 16.578526] __kmalloc_cache_noprof+0x189/0x420 [ 16.578748] kasan_atomics+0x95/0x310 [ 16.578960] kunit_try_run_case+0x1a5/0x480 [ 16.579170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.579426] kthread+0x337/0x6f0 [ 16.579599] ret_from_fork+0x116/0x1d0 [ 16.579737] ret_from_fork_asm+0x1a/0x30 [ 16.579944] [ 16.580048] The buggy address belongs to the object at ffff8881038b5600 [ 16.580048] which belongs to the cache kmalloc-64 of size 64 [ 16.580594] The buggy address is located 0 bytes to the right of [ 16.580594] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.581160] [ 16.581268] The buggy address belongs to the physical page: [ 16.581525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.581872] flags: 0x200000000000000(node=0|zone=2) [ 16.582159] page_type: f5(slab) [ 16.582340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.582727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.583090] page dumped because: kasan: bad access detected [ 16.583347] [ 16.583442] Memory state around the buggy address: [ 16.583700] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.583988] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.584205] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.584456] ^ [ 16.584695] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.585059] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.585403] ================================================================== [ 16.523855] ================================================================== [ 16.524339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.524727] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.525149] [ 16.525263] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.525309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.525322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.525346] Call Trace: [ 16.525364] <TASK> [ 16.525379] dump_stack_lvl+0x73/0xb0 [ 16.525410] print_report+0xd1/0x610 [ 16.525434] ? __virt_addr_valid+0x1db/0x2d0 [ 16.525458] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.525492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.525516] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.525539] kasan_report+0x141/0x180 [ 16.525563] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.525591] kasan_check_range+0x10c/0x1c0 [ 16.525637] __kasan_check_write+0x18/0x20 [ 16.525658] kasan_atomics_helper+0x1a7f/0x5450 [ 16.525682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.525723] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.525749] ? kasan_atomics+0x152/0x310 [ 16.525783] kasan_atomics+0x1dc/0x310 [ 16.525808] ? __pfx_kasan_atomics+0x10/0x10 [ 16.525833] ? __pfx_read_tsc+0x10/0x10 [ 16.525855] ? ktime_get_ts64+0x86/0x230 [ 16.525881] kunit_try_run_case+0x1a5/0x480 [ 16.525906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.525929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.525955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.526011] ? __kthread_parkme+0x82/0x180 [ 16.526087] ? preempt_count_sub+0x50/0x80 [ 16.526118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.526166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.526192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.526216] kthread+0x337/0x6f0 [ 16.526237] ? trace_preempt_on+0x20/0xc0 [ 16.526262] ? __pfx_kthread+0x10/0x10 [ 16.526284] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.526308] ? calculate_sigpending+0x7b/0xa0 [ 16.526352] ? __pfx_kthread+0x10/0x10 [ 16.526374] ret_from_fork+0x116/0x1d0 [ 16.526395] ? __pfx_kthread+0x10/0x10 [ 16.526416] ret_from_fork_asm+0x1a/0x30 [ 16.526448] </TASK> [ 16.526459] [ 16.535211] Allocated by task 283: [ 16.535389] kasan_save_stack+0x45/0x70 [ 16.535595] kasan_save_track+0x18/0x40 [ 16.535825] kasan_save_alloc_info+0x3b/0x50 [ 16.536145] __kasan_kmalloc+0xb7/0xc0 [ 16.536336] __kmalloc_cache_noprof+0x189/0x420 [ 16.536569] kasan_atomics+0x95/0x310 [ 16.536785] kunit_try_run_case+0x1a5/0x480 [ 16.537100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.537398] kthread+0x337/0x6f0 [ 16.537612] ret_from_fork+0x116/0x1d0 [ 16.537837] ret_from_fork_asm+0x1a/0x30 [ 16.538121] [ 16.538230] The buggy address belongs to the object at ffff8881038b5600 [ 16.538230] which belongs to the cache kmalloc-64 of size 64 [ 16.538807] The buggy address is located 0 bytes to the right of [ 16.538807] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.539380] [ 16.539495] The buggy address belongs to the physical page: [ 16.539751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.540539] flags: 0x200000000000000(node=0|zone=2) [ 16.540736] page_type: f5(slab) [ 16.540961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.541397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.541751] page dumped because: kasan: bad access detected [ 16.542033] [ 16.542123] Memory state around the buggy address: [ 16.542441] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.542807] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.543193] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.543507] ^ [ 16.543740] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.544139] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.544444] ================================================================== [ 15.669174] ================================================================== [ 15.669555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.669948] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.670408] [ 15.670639] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.670687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.670700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.670726] Call Trace: [ 15.670746] <TASK> [ 15.670763] dump_stack_lvl+0x73/0xb0 [ 15.670837] print_report+0xd1/0x610 [ 15.670862] ? __virt_addr_valid+0x1db/0x2d0 [ 15.670886] ? kasan_atomics_helper+0x72f/0x5450 [ 15.670946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.670970] ? kasan_atomics_helper+0x72f/0x5450 [ 15.670993] kasan_report+0x141/0x180 [ 15.671028] ? kasan_atomics_helper+0x72f/0x5450 [ 15.671066] kasan_check_range+0x10c/0x1c0 [ 15.671092] __kasan_check_write+0x18/0x20 [ 15.671141] kasan_atomics_helper+0x72f/0x5450 [ 15.671165] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.671189] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.671227] ? kasan_atomics+0x152/0x310 [ 15.671254] kasan_atomics+0x1dc/0x310 [ 15.671279] ? __pfx_kasan_atomics+0x10/0x10 [ 15.671305] ? __pfx_read_tsc+0x10/0x10 [ 15.671328] ? ktime_get_ts64+0x86/0x230 [ 15.671354] kunit_try_run_case+0x1a5/0x480 [ 15.671379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.671403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.671429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.671490] ? __kthread_parkme+0x82/0x180 [ 15.671514] ? preempt_count_sub+0x50/0x80 [ 15.671538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.671574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.671599] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.671625] kthread+0x337/0x6f0 [ 15.671663] ? trace_preempt_on+0x20/0xc0 [ 15.671697] ? __pfx_kthread+0x10/0x10 [ 15.671719] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.671768] ? calculate_sigpending+0x7b/0xa0 [ 15.671801] ? __pfx_kthread+0x10/0x10 [ 15.671825] ret_from_fork+0x116/0x1d0 [ 15.671847] ? __pfx_kthread+0x10/0x10 [ 15.671879] ret_from_fork_asm+0x1a/0x30 [ 15.671928] </TASK> [ 15.671940] [ 15.681411] Allocated by task 283: [ 15.682463] kasan_save_stack+0x45/0x70 [ 15.683173] kasan_save_track+0x18/0x40 [ 15.683684] kasan_save_alloc_info+0x3b/0x50 [ 15.684817] __kasan_kmalloc+0xb7/0xc0 [ 15.685772] __kmalloc_cache_noprof+0x189/0x420 [ 15.685955] kasan_atomics+0x95/0x310 [ 15.686602] kunit_try_run_case+0x1a5/0x480 [ 15.687013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.687465] kthread+0x337/0x6f0 [ 15.687652] ret_from_fork+0x116/0x1d0 [ 15.687923] ret_from_fork_asm+0x1a/0x30 [ 15.688389] [ 15.688515] The buggy address belongs to the object at ffff8881038b5600 [ 15.688515] which belongs to the cache kmalloc-64 of size 64 [ 15.689458] The buggy address is located 0 bytes to the right of [ 15.689458] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.690720] [ 15.691255] The buggy address belongs to the physical page: [ 15.691532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.692214] flags: 0x200000000000000(node=0|zone=2) [ 15.692592] page_type: f5(slab) [ 15.692951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.693789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.694490] page dumped because: kasan: bad access detected [ 15.694735] [ 15.695219] Memory state around the buggy address: [ 15.695451] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.695761] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.696442] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.697266] ^ [ 15.697572] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698285] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698614] ================================================================== [ 16.623902] ================================================================== [ 16.624281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.624641] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.625037] [ 16.625157] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.625221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.625247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.625270] Call Trace: [ 16.625297] <TASK> [ 16.625312] dump_stack_lvl+0x73/0xb0 [ 16.625343] print_report+0xd1/0x610 [ 16.625368] ? __virt_addr_valid+0x1db/0x2d0 [ 16.625391] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.625414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.625437] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.625461] kasan_report+0x141/0x180 [ 16.625494] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.625522] kasan_check_range+0x10c/0x1c0 [ 16.625547] __kasan_check_write+0x18/0x20 [ 16.625567] kasan_atomics_helper+0x1d7a/0x5450 [ 16.625592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.625616] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.625642] ? kasan_atomics+0x152/0x310 [ 16.625670] kasan_atomics+0x1dc/0x310 [ 16.625694] ? __pfx_kasan_atomics+0x10/0x10 [ 16.625719] ? __pfx_read_tsc+0x10/0x10 [ 16.625741] ? ktime_get_ts64+0x86/0x230 [ 16.625786] kunit_try_run_case+0x1a5/0x480 [ 16.625812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.625836] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.625862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.625887] ? __kthread_parkme+0x82/0x180 [ 16.625909] ? preempt_count_sub+0x50/0x80 [ 16.625933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.625959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.625983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.626008] kthread+0x337/0x6f0 [ 16.626045] ? trace_preempt_on+0x20/0xc0 [ 16.626070] ? __pfx_kthread+0x10/0x10 [ 16.626110] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.626147] ? calculate_sigpending+0x7b/0xa0 [ 16.626186] ? __pfx_kthread+0x10/0x10 [ 16.626222] ret_from_fork+0x116/0x1d0 [ 16.626243] ? __pfx_kthread+0x10/0x10 [ 16.626278] ret_from_fork_asm+0x1a/0x30 [ 16.626336] </TASK> [ 16.626347] [ 16.634355] Allocated by task 283: [ 16.634530] kasan_save_stack+0x45/0x70 [ 16.634777] kasan_save_track+0x18/0x40 [ 16.634969] kasan_save_alloc_info+0x3b/0x50 [ 16.635163] __kasan_kmalloc+0xb7/0xc0 [ 16.635363] __kmalloc_cache_noprof+0x189/0x420 [ 16.635610] kasan_atomics+0x95/0x310 [ 16.635790] kunit_try_run_case+0x1a5/0x480 [ 16.636008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.636237] kthread+0x337/0x6f0 [ 16.636368] ret_from_fork+0x116/0x1d0 [ 16.636801] ret_from_fork_asm+0x1a/0x30 [ 16.637356] [ 16.638731] The buggy address belongs to the object at ffff8881038b5600 [ 16.638731] which belongs to the cache kmalloc-64 of size 64 [ 16.639271] The buggy address is located 0 bytes to the right of [ 16.639271] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.639675] [ 16.639757] The buggy address belongs to the physical page: [ 16.640372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.641153] flags: 0x200000000000000(node=0|zone=2) [ 16.641647] page_type: f5(slab) [ 16.642017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.642721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.643510] page dumped because: kasan: bad access detected [ 16.644068] [ 16.644312] Memory state around the buggy address: [ 16.644581] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.644908] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.645570] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.646252] ^ [ 16.646604] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646984] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.647635] ================================================================== [ 16.788625] ================================================================== [ 16.789014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.789353] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.789679] [ 16.789776] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.789834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.789847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.789871] Call Trace: [ 16.789887] <TASK> [ 16.789902] dump_stack_lvl+0x73/0xb0 [ 16.789933] print_report+0xd1/0x610 [ 16.789959] ? __virt_addr_valid+0x1db/0x2d0 [ 16.789984] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.790005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.790029] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.790052] kasan_report+0x141/0x180 [ 16.790075] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.790108] kasan_check_range+0x10c/0x1c0 [ 16.790133] __kasan_check_write+0x18/0x20 [ 16.790154] kasan_atomics_helper+0x20c8/0x5450 [ 16.790177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.790201] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.790227] ? kasan_atomics+0x152/0x310 [ 16.790255] kasan_atomics+0x1dc/0x310 [ 16.790279] ? __pfx_kasan_atomics+0x10/0x10 [ 16.790305] ? __pfx_read_tsc+0x10/0x10 [ 16.790327] ? ktime_get_ts64+0x86/0x230 [ 16.790353] kunit_try_run_case+0x1a5/0x480 [ 16.790378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.790402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.790427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.790452] ? __kthread_parkme+0x82/0x180 [ 16.790483] ? preempt_count_sub+0x50/0x80 [ 16.790510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.790535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.790559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.790584] kthread+0x337/0x6f0 [ 16.790605] ? trace_preempt_on+0x20/0xc0 [ 16.790630] ? __pfx_kthread+0x10/0x10 [ 16.790652] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.790677] ? calculate_sigpending+0x7b/0xa0 [ 16.790702] ? __pfx_kthread+0x10/0x10 [ 16.790725] ret_from_fork+0x116/0x1d0 [ 16.790744] ? __pfx_kthread+0x10/0x10 [ 16.790766] ret_from_fork_asm+0x1a/0x30 [ 16.790812] </TASK> [ 16.790824] [ 16.798321] Allocated by task 283: [ 16.798457] kasan_save_stack+0x45/0x70 [ 16.798614] kasan_save_track+0x18/0x40 [ 16.798755] kasan_save_alloc_info+0x3b/0x50 [ 16.798910] __kasan_kmalloc+0xb7/0xc0 [ 16.799048] __kmalloc_cache_noprof+0x189/0x420 [ 16.799209] kasan_atomics+0x95/0x310 [ 16.799346] kunit_try_run_case+0x1a5/0x480 [ 16.799518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.799775] kthread+0x337/0x6f0 [ 16.799945] ret_from_fork+0x116/0x1d0 [ 16.800134] ret_from_fork_asm+0x1a/0x30 [ 16.800350] [ 16.800456] The buggy address belongs to the object at ffff8881038b5600 [ 16.800456] which belongs to the cache kmalloc-64 of size 64 [ 16.801303] The buggy address is located 0 bytes to the right of [ 16.801303] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.801783] [ 16.801881] The buggy address belongs to the physical page: [ 16.802138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.802440] flags: 0x200000000000000(node=0|zone=2) [ 16.802646] page_type: f5(slab) [ 16.802772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.803118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.803429] page dumped because: kasan: bad access detected [ 16.803633] [ 16.803708] Memory state around the buggy address: [ 16.804095] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.804364] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.804685] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.805065] ^ [ 16.805275] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.805515] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.805910] ================================================================== [ 16.806393] ================================================================== [ 16.806657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.806907] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.807218] [ 16.807344] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.807391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.807403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.807427] Call Trace: [ 16.807444] <TASK> [ 16.807460] dump_stack_lvl+0x73/0xb0 [ 16.807502] print_report+0xd1/0x610 [ 16.807540] ? __virt_addr_valid+0x1db/0x2d0 [ 16.807565] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.807588] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.807612] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.807635] kasan_report+0x141/0x180 [ 16.807658] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.807686] __asan_report_load8_noabort+0x18/0x20 [ 16.807712] kasan_atomics_helper+0x4fb2/0x5450 [ 16.807737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.807760] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.807786] ? kasan_atomics+0x152/0x310 [ 16.807814] kasan_atomics+0x1dc/0x310 [ 16.807838] ? __pfx_kasan_atomics+0x10/0x10 [ 16.807863] ? __pfx_read_tsc+0x10/0x10 [ 16.807886] ? ktime_get_ts64+0x86/0x230 [ 16.807913] kunit_try_run_case+0x1a5/0x480 [ 16.807938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.807963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.807989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.808014] ? __kthread_parkme+0x82/0x180 [ 16.808036] ? preempt_count_sub+0x50/0x80 [ 16.808061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.808086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.808111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.808136] kthread+0x337/0x6f0 [ 16.808158] ? trace_preempt_on+0x20/0xc0 [ 16.808183] ? __pfx_kthread+0x10/0x10 [ 16.808205] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.808228] ? calculate_sigpending+0x7b/0xa0 [ 16.808253] ? __pfx_kthread+0x10/0x10 [ 16.808276] ret_from_fork+0x116/0x1d0 [ 16.808297] ? __pfx_kthread+0x10/0x10 [ 16.808319] ret_from_fork_asm+0x1a/0x30 [ 16.808351] </TASK> [ 16.808363] [ 16.816034] Allocated by task 283: [ 16.816226] kasan_save_stack+0x45/0x70 [ 16.816436] kasan_save_track+0x18/0x40 [ 16.816648] kasan_save_alloc_info+0x3b/0x50 [ 16.816976] __kasan_kmalloc+0xb7/0xc0 [ 16.817150] __kmalloc_cache_noprof+0x189/0x420 [ 16.817376] kasan_atomics+0x95/0x310 [ 16.817524] kunit_try_run_case+0x1a5/0x480 [ 16.817690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.818100] kthread+0x337/0x6f0 [ 16.818286] ret_from_fork+0x116/0x1d0 [ 16.818488] ret_from_fork_asm+0x1a/0x30 [ 16.818660] [ 16.818758] The buggy address belongs to the object at ffff8881038b5600 [ 16.818758] which belongs to the cache kmalloc-64 of size 64 [ 16.819254] The buggy address is located 0 bytes to the right of [ 16.819254] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.819762] [ 16.821671] The buggy address belongs to the physical page: [ 16.822649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.823624] flags: 0x200000000000000(node=0|zone=2) [ 16.824083] page_type: f5(slab) [ 16.824231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.824501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.825310] page dumped because: kasan: bad access detected [ 16.825857] [ 16.826063] Memory state around the buggy address: [ 16.826528] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.826979] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.827203] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.827425] ^ [ 16.827645] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.828356] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.828595] ================================================================== [ 16.829638] ================================================================== [ 16.830376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.831134] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.831868] [ 16.832055] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.832104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.832117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.832175] Call Trace: [ 16.832197] <TASK> [ 16.832229] dump_stack_lvl+0x73/0xb0 [ 16.832264] print_report+0xd1/0x610 [ 16.832291] ? __virt_addr_valid+0x1db/0x2d0 [ 16.832315] ? kasan_atomics_helper+0x218a/0x5450 [ 16.832337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.832361] ? kasan_atomics_helper+0x218a/0x5450 [ 16.832383] kasan_report+0x141/0x180 [ 16.832407] ? kasan_atomics_helper+0x218a/0x5450 [ 16.832436] kasan_check_range+0x10c/0x1c0 [ 16.832462] __kasan_check_write+0x18/0x20 [ 16.832494] kasan_atomics_helper+0x218a/0x5450 [ 16.832518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.832541] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.832569] ? kasan_atomics+0x152/0x310 [ 16.832598] kasan_atomics+0x1dc/0x310 [ 16.832621] ? __pfx_kasan_atomics+0x10/0x10 [ 16.832648] ? __pfx_read_tsc+0x10/0x10 [ 16.832672] ? ktime_get_ts64+0x86/0x230 [ 16.832698] kunit_try_run_case+0x1a5/0x480 [ 16.832724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.832748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.832795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.832820] ? __kthread_parkme+0x82/0x180 [ 16.832842] ? preempt_count_sub+0x50/0x80 [ 16.832869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.832897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.832923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.832947] kthread+0x337/0x6f0 [ 16.832968] ? trace_preempt_on+0x20/0xc0 [ 16.832993] ? __pfx_kthread+0x10/0x10 [ 16.833016] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.833039] ? calculate_sigpending+0x7b/0xa0 [ 16.833065] ? __pfx_kthread+0x10/0x10 [ 16.833087] ret_from_fork+0x116/0x1d0 [ 16.833107] ? __pfx_kthread+0x10/0x10 [ 16.833129] ret_from_fork_asm+0x1a/0x30 [ 16.833162] </TASK> [ 16.833174] [ 16.846015] Allocated by task 283: [ 16.846367] kasan_save_stack+0x45/0x70 [ 16.846797] kasan_save_track+0x18/0x40 [ 16.847176] kasan_save_alloc_info+0x3b/0x50 [ 16.847586] __kasan_kmalloc+0xb7/0xc0 [ 16.847969] __kmalloc_cache_noprof+0x189/0x420 [ 16.848401] kasan_atomics+0x95/0x310 [ 16.848805] kunit_try_run_case+0x1a5/0x480 [ 16.849059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.849556] kthread+0x337/0x6f0 [ 16.849686] ret_from_fork+0x116/0x1d0 [ 16.849988] ret_from_fork_asm+0x1a/0x30 [ 16.850375] [ 16.850550] The buggy address belongs to the object at ffff8881038b5600 [ 16.850550] which belongs to the cache kmalloc-64 of size 64 [ 16.851514] The buggy address is located 0 bytes to the right of [ 16.851514] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.852239] [ 16.852428] The buggy address belongs to the physical page: [ 16.852962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.853633] flags: 0x200000000000000(node=0|zone=2) [ 16.853815] page_type: f5(slab) [ 16.853943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.854185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.854419] page dumped because: kasan: bad access detected [ 16.854922] [ 16.855082] Memory state around the buggy address: [ 16.855544] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.856186] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.856839] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.857456] ^ [ 16.857922] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.858564] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.859197] ================================================================== [ 16.439893] ================================================================== [ 16.440350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.440615] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.441193] [ 16.441311] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.441358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.441371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.441393] Call Trace: [ 16.441410] <TASK> [ 16.441426] dump_stack_lvl+0x73/0xb0 [ 16.441456] print_report+0xd1/0x610 [ 16.441491] ? __virt_addr_valid+0x1db/0x2d0 [ 16.441515] ? kasan_atomics_helper+0x1818/0x5450 [ 16.441538] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.441561] ? kasan_atomics_helper+0x1818/0x5450 [ 16.441586] kasan_report+0x141/0x180 [ 16.441610] ? kasan_atomics_helper+0x1818/0x5450 [ 16.441638] kasan_check_range+0x10c/0x1c0 [ 16.441663] __kasan_check_write+0x18/0x20 [ 16.441683] kasan_atomics_helper+0x1818/0x5450 [ 16.441707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.441731] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.441757] ? kasan_atomics+0x152/0x310 [ 16.441785] kasan_atomics+0x1dc/0x310 [ 16.441809] ? __pfx_kasan_atomics+0x10/0x10 [ 16.441835] ? __pfx_read_tsc+0x10/0x10 [ 16.441857] ? ktime_get_ts64+0x86/0x230 [ 16.441882] kunit_try_run_case+0x1a5/0x480 [ 16.441909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.441932] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.441958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.441983] ? __kthread_parkme+0x82/0x180 [ 16.442003] ? preempt_count_sub+0x50/0x80 [ 16.442028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.442054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.442078] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.442112] kthread+0x337/0x6f0 [ 16.442132] ? trace_preempt_on+0x20/0xc0 [ 16.442157] ? __pfx_kthread+0x10/0x10 [ 16.442179] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.442223] ? calculate_sigpending+0x7b/0xa0 [ 16.442248] ? __pfx_kthread+0x10/0x10 [ 16.442270] ret_from_fork+0x116/0x1d0 [ 16.442291] ? __pfx_kthread+0x10/0x10 [ 16.442313] ret_from_fork_asm+0x1a/0x30 [ 16.442344] </TASK> [ 16.442355] [ 16.450867] Allocated by task 283: [ 16.451149] kasan_save_stack+0x45/0x70 [ 16.451388] kasan_save_track+0x18/0x40 [ 16.451603] kasan_save_alloc_info+0x3b/0x50 [ 16.451803] __kasan_kmalloc+0xb7/0xc0 [ 16.451945] __kmalloc_cache_noprof+0x189/0x420 [ 16.452169] kasan_atomics+0x95/0x310 [ 16.452317] kunit_try_run_case+0x1a5/0x480 [ 16.452507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.452791] kthread+0x337/0x6f0 [ 16.452971] ret_from_fork+0x116/0x1d0 [ 16.453269] ret_from_fork_asm+0x1a/0x30 [ 16.453492] [ 16.453623] The buggy address belongs to the object at ffff8881038b5600 [ 16.453623] which belongs to the cache kmalloc-64 of size 64 [ 16.454172] The buggy address is located 0 bytes to the right of [ 16.454172] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.454992] [ 16.455129] The buggy address belongs to the physical page: [ 16.455412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.455860] flags: 0x200000000000000(node=0|zone=2) [ 16.456189] page_type: f5(slab) [ 16.456407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.456825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.457256] page dumped because: kasan: bad access detected [ 16.457530] [ 16.457627] Memory state around the buggy address: [ 16.457883] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.458274] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.458606] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.458853] ^ [ 16.459084] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.459426] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.459745] ================================================================== [ 15.514907] ================================================================== [ 15.515356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.515688] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.516114] [ 15.516259] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.516307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.516355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.516378] Call Trace: [ 15.516395] <TASK> [ 15.516411] dump_stack_lvl+0x73/0xb0 [ 15.516443] print_report+0xd1/0x610 [ 15.516478] ? __virt_addr_valid+0x1db/0x2d0 [ 15.516536] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.516559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.516583] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.516605] kasan_report+0x141/0x180 [ 15.516629] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.516657] kasan_check_range+0x10c/0x1c0 [ 15.516682] __kasan_check_write+0x18/0x20 [ 15.516737] kasan_atomics_helper+0x4a0/0x5450 [ 15.516761] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.516784] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.516811] ? kasan_atomics+0x152/0x310 [ 15.516839] kasan_atomics+0x1dc/0x310 [ 15.516863] ? __pfx_kasan_atomics+0x10/0x10 [ 15.516920] ? __pfx_read_tsc+0x10/0x10 [ 15.516943] ? ktime_get_ts64+0x86/0x230 [ 15.516968] kunit_try_run_case+0x1a5/0x480 [ 15.516994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.517018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.517045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.517102] ? __kthread_parkme+0x82/0x180 [ 15.517124] ? preempt_count_sub+0x50/0x80 [ 15.517150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.517176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.517202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.517226] kthread+0x337/0x6f0 [ 15.517248] ? trace_preempt_on+0x20/0xc0 [ 15.517305] ? __pfx_kthread+0x10/0x10 [ 15.517328] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.517352] ? calculate_sigpending+0x7b/0xa0 [ 15.517376] ? __pfx_kthread+0x10/0x10 [ 15.517400] ret_from_fork+0x116/0x1d0 [ 15.517420] ? __pfx_kthread+0x10/0x10 [ 15.517442] ret_from_fork_asm+0x1a/0x30 [ 15.517482] </TASK> [ 15.517494] [ 15.526794] Allocated by task 283: [ 15.526963] kasan_save_stack+0x45/0x70 [ 15.527321] kasan_save_track+0x18/0x40 [ 15.527464] kasan_save_alloc_info+0x3b/0x50 [ 15.527696] __kasan_kmalloc+0xb7/0xc0 [ 15.527935] __kmalloc_cache_noprof+0x189/0x420 [ 15.528200] kasan_atomics+0x95/0x310 [ 15.528438] kunit_try_run_case+0x1a5/0x480 [ 15.528599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.528778] kthread+0x337/0x6f0 [ 15.529131] ret_from_fork+0x116/0x1d0 [ 15.529328] ret_from_fork_asm+0x1a/0x30 [ 15.529546] [ 15.529680] The buggy address belongs to the object at ffff8881038b5600 [ 15.529680] which belongs to the cache kmalloc-64 of size 64 [ 15.530122] The buggy address is located 0 bytes to the right of [ 15.530122] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.531127] [ 15.531265] The buggy address belongs to the physical page: [ 15.531520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.532130] flags: 0x200000000000000(node=0|zone=2) [ 15.532391] page_type: f5(slab) [ 15.532597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.532952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.533355] page dumped because: kasan: bad access detected [ 15.533567] [ 15.533668] Memory state around the buggy address: [ 15.533932] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.534304] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.534704] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.535098] ^ [ 15.535324] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.535789] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.536210] ================================================================== [ 16.586124] ================================================================== [ 16.586456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.586842] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.587174] [ 16.587306] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.587353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.587366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.587390] Call Trace: [ 16.587406] <TASK> [ 16.587440] dump_stack_lvl+0x73/0xb0 [ 16.587484] print_report+0xd1/0x610 [ 16.587508] ? __virt_addr_valid+0x1db/0x2d0 [ 16.587532] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.587555] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.587579] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.587622] kasan_report+0x141/0x180 [ 16.587646] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.587674] __asan_report_load8_noabort+0x18/0x20 [ 16.587700] kasan_atomics_helper+0x4f30/0x5450 [ 16.587725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.587749] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.587809] ? kasan_atomics+0x152/0x310 [ 16.587838] kasan_atomics+0x1dc/0x310 [ 16.587863] ? __pfx_kasan_atomics+0x10/0x10 [ 16.587889] ? __pfx_read_tsc+0x10/0x10 [ 16.587913] ? ktime_get_ts64+0x86/0x230 [ 16.587939] kunit_try_run_case+0x1a5/0x480 [ 16.587964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.587989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.588015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.588040] ? __kthread_parkme+0x82/0x180 [ 16.588062] ? preempt_count_sub+0x50/0x80 [ 16.588104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.588132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.588157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.588182] kthread+0x337/0x6f0 [ 16.588203] ? trace_preempt_on+0x20/0xc0 [ 16.588227] ? __pfx_kthread+0x10/0x10 [ 16.588250] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.588288] ? calculate_sigpending+0x7b/0xa0 [ 16.588329] ? __pfx_kthread+0x10/0x10 [ 16.588366] ret_from_fork+0x116/0x1d0 [ 16.588386] ? __pfx_kthread+0x10/0x10 [ 16.588422] ret_from_fork_asm+0x1a/0x30 [ 16.588477] </TASK> [ 16.588488] [ 16.596277] Allocated by task 283: [ 16.596436] kasan_save_stack+0x45/0x70 [ 16.596640] kasan_save_track+0x18/0x40 [ 16.596840] kasan_save_alloc_info+0x3b/0x50 [ 16.597070] __kasan_kmalloc+0xb7/0xc0 [ 16.597268] __kmalloc_cache_noprof+0x189/0x420 [ 16.597498] kasan_atomics+0x95/0x310 [ 16.597653] kunit_try_run_case+0x1a5/0x480 [ 16.597919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.598204] kthread+0x337/0x6f0 [ 16.598360] ret_from_fork+0x116/0x1d0 [ 16.598555] ret_from_fork_asm+0x1a/0x30 [ 16.598804] [ 16.598886] The buggy address belongs to the object at ffff8881038b5600 [ 16.598886] which belongs to the cache kmalloc-64 of size 64 [ 16.599380] The buggy address is located 0 bytes to the right of [ 16.599380] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.599926] [ 16.600035] The buggy address belongs to the physical page: [ 16.600293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.600639] flags: 0x200000000000000(node=0|zone=2) [ 16.600807] page_type: f5(slab) [ 16.600979] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.601331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.601661] page dumped because: kasan: bad access detected [ 16.601933] [ 16.602006] Memory state around the buggy address: [ 16.602167] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.602387] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.602744] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.603121] ^ [ 16.603366] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.603727] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.604097] ================================================================== [ 16.880267] ================================================================== [ 16.880648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.880985] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.881281] [ 16.881398] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.881444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.881456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.881985] Call Trace: [ 16.882010] <TASK> [ 16.882028] dump_stack_lvl+0x73/0xb0 [ 16.882065] print_report+0xd1/0x610 [ 16.882089] ? __virt_addr_valid+0x1db/0x2d0 [ 16.882123] ? kasan_atomics_helper+0x224c/0x5450 [ 16.882146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.882170] ? kasan_atomics_helper+0x224c/0x5450 [ 16.882193] kasan_report+0x141/0x180 [ 16.882217] ? kasan_atomics_helper+0x224c/0x5450 [ 16.882245] kasan_check_range+0x10c/0x1c0 [ 16.882271] __kasan_check_write+0x18/0x20 [ 16.882291] kasan_atomics_helper+0x224c/0x5450 [ 16.882315] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.882339] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.882365] ? kasan_atomics+0x152/0x310 [ 16.882394] kasan_atomics+0x1dc/0x310 [ 16.882418] ? __pfx_kasan_atomics+0x10/0x10 [ 16.882443] ? __pfx_read_tsc+0x10/0x10 [ 16.882480] ? ktime_get_ts64+0x86/0x230 [ 16.882507] kunit_try_run_case+0x1a5/0x480 [ 16.882534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.882557] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.882584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.882610] ? __kthread_parkme+0x82/0x180 [ 16.882632] ? preempt_count_sub+0x50/0x80 [ 16.882659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.882685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.882709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.882734] kthread+0x337/0x6f0 [ 16.882755] ? trace_preempt_on+0x20/0xc0 [ 16.882803] ? __pfx_kthread+0x10/0x10 [ 16.882826] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.882849] ? calculate_sigpending+0x7b/0xa0 [ 16.882875] ? __pfx_kthread+0x10/0x10 [ 16.882898] ret_from_fork+0x116/0x1d0 [ 16.882918] ? __pfx_kthread+0x10/0x10 [ 16.882940] ret_from_fork_asm+0x1a/0x30 [ 16.882973] </TASK> [ 16.882985] [ 16.890305] Allocated by task 283: [ 16.890456] kasan_save_stack+0x45/0x70 [ 16.890681] kasan_save_track+0x18/0x40 [ 16.890903] kasan_save_alloc_info+0x3b/0x50 [ 16.891122] __kasan_kmalloc+0xb7/0xc0 [ 16.891314] __kmalloc_cache_noprof+0x189/0x420 [ 16.891550] kasan_atomics+0x95/0x310 [ 16.891744] kunit_try_run_case+0x1a5/0x480 [ 16.891979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.892239] kthread+0x337/0x6f0 [ 16.892412] ret_from_fork+0x116/0x1d0 [ 16.892619] ret_from_fork_asm+0x1a/0x30 [ 16.892837] [ 16.892939] The buggy address belongs to the object at ffff8881038b5600 [ 16.892939] which belongs to the cache kmalloc-64 of size 64 [ 16.893326] The buggy address is located 0 bytes to the right of [ 16.893326] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.893871] [ 16.893975] The buggy address belongs to the physical page: [ 16.894252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.894608] flags: 0x200000000000000(node=0|zone=2) [ 16.894858] page_type: f5(slab) [ 16.895025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.895330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.895625] page dumped because: kasan: bad access detected [ 16.895917] [ 16.896018] Memory state around the buggy address: [ 16.896254] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.896533] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.896783] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.897010] ^ [ 16.897172] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.897438] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.897781] ================================================================== [ 16.074423] ================================================================== [ 16.074738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 16.075125] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.075429] [ 16.075531] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.075577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.075590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.075613] Call Trace: [ 16.075631] <TASK> [ 16.075647] dump_stack_lvl+0x73/0xb0 [ 16.075702] print_report+0xd1/0x610 [ 16.075726] ? __virt_addr_valid+0x1db/0x2d0 [ 16.075749] ? kasan_atomics_helper+0x1148/0x5450 [ 16.075772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.075806] ? kasan_atomics_helper+0x1148/0x5450 [ 16.075829] kasan_report+0x141/0x180 [ 16.075853] ? kasan_atomics_helper+0x1148/0x5450 [ 16.075880] kasan_check_range+0x10c/0x1c0 [ 16.075923] __kasan_check_write+0x18/0x20 [ 16.075944] kasan_atomics_helper+0x1148/0x5450 [ 16.075968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.075991] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.076018] ? kasan_atomics+0x152/0x310 [ 16.076064] kasan_atomics+0x1dc/0x310 [ 16.076089] ? __pfx_kasan_atomics+0x10/0x10 [ 16.076114] ? __pfx_read_tsc+0x10/0x10 [ 16.076136] ? ktime_get_ts64+0x86/0x230 [ 16.076162] kunit_try_run_case+0x1a5/0x480 [ 16.076205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.076229] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.076255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.076280] ? __kthread_parkme+0x82/0x180 [ 16.076303] ? preempt_count_sub+0x50/0x80 [ 16.076328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.076353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.076378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.076420] kthread+0x337/0x6f0 [ 16.076442] ? trace_preempt_on+0x20/0xc0 [ 16.076465] ? __pfx_kthread+0x10/0x10 [ 16.076498] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.076521] ? calculate_sigpending+0x7b/0xa0 [ 16.076547] ? __pfx_kthread+0x10/0x10 [ 16.076569] ret_from_fork+0x116/0x1d0 [ 16.076589] ? __pfx_kthread+0x10/0x10 [ 16.076628] ret_from_fork_asm+0x1a/0x30 [ 16.076661] </TASK> [ 16.076672] [ 16.085640] Allocated by task 283: [ 16.085771] kasan_save_stack+0x45/0x70 [ 16.085919] kasan_save_track+0x18/0x40 [ 16.086258] kasan_save_alloc_info+0x3b/0x50 [ 16.086733] __kasan_kmalloc+0xb7/0xc0 [ 16.086912] __kmalloc_cache_noprof+0x189/0x420 [ 16.087274] kasan_atomics+0x95/0x310 [ 16.087432] kunit_try_run_case+0x1a5/0x480 [ 16.087646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.087910] kthread+0x337/0x6f0 [ 16.088109] ret_from_fork+0x116/0x1d0 [ 16.088314] ret_from_fork_asm+0x1a/0x30 [ 16.088536] [ 16.088654] The buggy address belongs to the object at ffff8881038b5600 [ 16.088654] which belongs to the cache kmalloc-64 of size 64 [ 16.089227] The buggy address is located 0 bytes to the right of [ 16.089227] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.089798] [ 16.089896] The buggy address belongs to the physical page: [ 16.090157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.090883] flags: 0x200000000000000(node=0|zone=2) [ 16.091119] page_type: f5(slab) [ 16.091355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.091720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.092257] page dumped because: kasan: bad access detected [ 16.092430] [ 16.092511] Memory state around the buggy address: [ 16.092729] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.093049] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.093380] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.093737] ^ [ 16.093895] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.094116] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.094329] ================================================================== [ 16.385216] ================================================================== [ 16.385458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.385755] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.386143] [ 16.386547] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.386617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.386631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.386667] Call Trace: [ 16.386697] <TASK> [ 16.386712] dump_stack_lvl+0x73/0xb0 [ 16.386758] print_report+0xd1/0x610 [ 16.386805] ? __virt_addr_valid+0x1db/0x2d0 [ 16.386831] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.386853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.386979] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.387010] kasan_report+0x141/0x180 [ 16.387035] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.387064] kasan_check_range+0x10c/0x1c0 [ 16.387089] __kasan_check_write+0x18/0x20 [ 16.387454] kasan_atomics_helper+0x16e7/0x5450 [ 16.387493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.387518] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.387546] ? kasan_atomics+0x152/0x310 [ 16.387574] kasan_atomics+0x1dc/0x310 [ 16.387598] ? __pfx_kasan_atomics+0x10/0x10 [ 16.387623] ? __pfx_read_tsc+0x10/0x10 [ 16.387645] ? ktime_get_ts64+0x86/0x230 [ 16.387672] kunit_try_run_case+0x1a5/0x480 [ 16.387697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.387721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.387748] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.387773] ? __kthread_parkme+0x82/0x180 [ 16.387796] ? preempt_count_sub+0x50/0x80 [ 16.387831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.387857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.387883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.387908] kthread+0x337/0x6f0 [ 16.387929] ? trace_preempt_on+0x20/0xc0 [ 16.387954] ? __pfx_kthread+0x10/0x10 [ 16.387976] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.388000] ? calculate_sigpending+0x7b/0xa0 [ 16.388025] ? __pfx_kthread+0x10/0x10 [ 16.388061] ret_from_fork+0x116/0x1d0 [ 16.388082] ? __pfx_kthread+0x10/0x10 [ 16.388105] ret_from_fork_asm+0x1a/0x30 [ 16.388138] </TASK> [ 16.388150] [ 16.400440] Allocated by task 283: [ 16.400654] kasan_save_stack+0x45/0x70 [ 16.401141] kasan_save_track+0x18/0x40 [ 16.401519] kasan_save_alloc_info+0x3b/0x50 [ 16.401765] __kasan_kmalloc+0xb7/0xc0 [ 16.402061] __kmalloc_cache_noprof+0x189/0x420 [ 16.402359] kasan_atomics+0x95/0x310 [ 16.402855] kunit_try_run_case+0x1a5/0x480 [ 16.403185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.403572] kthread+0x337/0x6f0 [ 16.403748] ret_from_fork+0x116/0x1d0 [ 16.403917] ret_from_fork_asm+0x1a/0x30 [ 16.404463] [ 16.404590] The buggy address belongs to the object at ffff8881038b5600 [ 16.404590] which belongs to the cache kmalloc-64 of size 64 [ 16.405356] The buggy address is located 0 bytes to the right of [ 16.405356] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.406144] [ 16.406240] The buggy address belongs to the physical page: [ 16.406520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.407209] flags: 0x200000000000000(node=0|zone=2) [ 16.407416] page_type: f5(slab) [ 16.407600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.408189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.408767] page dumped because: kasan: bad access detected [ 16.409067] [ 16.409170] Memory state around the buggy address: [ 16.409648] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.409982] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.410525] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.410923] ^ [ 16.411138] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.411751] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.412104] ================================================================== [ 16.770307] ================================================================== [ 16.770716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.771213] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.771619] [ 16.771718] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.771766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.771779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.771802] Call Trace: [ 16.771820] <TASK> [ 16.771836] dump_stack_lvl+0x73/0xb0 [ 16.771868] print_report+0xd1/0x610 [ 16.771892] ? __virt_addr_valid+0x1db/0x2d0 [ 16.771917] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.771939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.771963] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.771994] kasan_report+0x141/0x180 [ 16.772017] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.772045] __asan_report_load8_noabort+0x18/0x20 [ 16.772070] kasan_atomics_helper+0x4f98/0x5450 [ 16.772095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.772118] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.772144] ? kasan_atomics+0x152/0x310 [ 16.772172] kasan_atomics+0x1dc/0x310 [ 16.772196] ? __pfx_kasan_atomics+0x10/0x10 [ 16.772222] ? __pfx_read_tsc+0x10/0x10 [ 16.772244] ? ktime_get_ts64+0x86/0x230 [ 16.772270] kunit_try_run_case+0x1a5/0x480 [ 16.772295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.772319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.772346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.772371] ? __kthread_parkme+0x82/0x180 [ 16.772393] ? preempt_count_sub+0x50/0x80 [ 16.772418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.772443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.772478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.772515] kthread+0x337/0x6f0 [ 16.772537] ? trace_preempt_on+0x20/0xc0 [ 16.772562] ? __pfx_kthread+0x10/0x10 [ 16.772583] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.772607] ? calculate_sigpending+0x7b/0xa0 [ 16.772632] ? __pfx_kthread+0x10/0x10 [ 16.772655] ret_from_fork+0x116/0x1d0 [ 16.772675] ? __pfx_kthread+0x10/0x10 [ 16.772698] ret_from_fork_asm+0x1a/0x30 [ 16.772731] </TASK> [ 16.772741] [ 16.780231] Allocated by task 283: [ 16.780422] kasan_save_stack+0x45/0x70 [ 16.780606] kasan_save_track+0x18/0x40 [ 16.780803] kasan_save_alloc_info+0x3b/0x50 [ 16.780994] __kasan_kmalloc+0xb7/0xc0 [ 16.781169] __kmalloc_cache_noprof+0x189/0x420 [ 16.781357] kasan_atomics+0x95/0x310 [ 16.781550] kunit_try_run_case+0x1a5/0x480 [ 16.781737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.782058] kthread+0x337/0x6f0 [ 16.782225] ret_from_fork+0x116/0x1d0 [ 16.782374] ret_from_fork_asm+0x1a/0x30 [ 16.782528] [ 16.782601] The buggy address belongs to the object at ffff8881038b5600 [ 16.782601] which belongs to the cache kmalloc-64 of size 64 [ 16.782960] The buggy address is located 0 bytes to the right of [ 16.782960] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.783337] [ 16.783412] The buggy address belongs to the physical page: [ 16.783656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.784388] flags: 0x200000000000000(node=0|zone=2) [ 16.784633] page_type: f5(slab) [ 16.784806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.785149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.785505] page dumped because: kasan: bad access detected [ 16.785753] [ 16.785894] Memory state around the buggy address: [ 16.786107] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.786331] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.786564] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.786802] ^ [ 16.787033] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.787363] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.787702] ================================================================== [ 15.951021] ================================================================== [ 15.951400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.951721] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.952196] [ 15.952317] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.952363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.952375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.952398] Call Trace: [ 15.952414] <TASK> [ 15.952429] dump_stack_lvl+0x73/0xb0 [ 15.952461] print_report+0xd1/0x610 [ 15.952498] ? __virt_addr_valid+0x1db/0x2d0 [ 15.952522] ? kasan_atomics_helper+0xe78/0x5450 [ 15.952545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.952570] ? kasan_atomics_helper+0xe78/0x5450 [ 15.952592] kasan_report+0x141/0x180 [ 15.952616] ? kasan_atomics_helper+0xe78/0x5450 [ 15.952643] kasan_check_range+0x10c/0x1c0 [ 15.952668] __kasan_check_write+0x18/0x20 [ 15.952689] kasan_atomics_helper+0xe78/0x5450 [ 15.952713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.952736] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.952763] ? kasan_atomics+0x152/0x310 [ 15.952791] kasan_atomics+0x1dc/0x310 [ 15.952815] ? __pfx_kasan_atomics+0x10/0x10 [ 15.952840] ? __pfx_read_tsc+0x10/0x10 [ 15.952862] ? ktime_get_ts64+0x86/0x230 [ 15.952888] kunit_try_run_case+0x1a5/0x480 [ 15.952913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.952937] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.952963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.952988] ? __kthread_parkme+0x82/0x180 [ 15.953010] ? preempt_count_sub+0x50/0x80 [ 15.953035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.953061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.953085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.953110] kthread+0x337/0x6f0 [ 15.953131] ? trace_preempt_on+0x20/0xc0 [ 15.953155] ? __pfx_kthread+0x10/0x10 [ 15.953177] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.953201] ? calculate_sigpending+0x7b/0xa0 [ 15.953225] ? __pfx_kthread+0x10/0x10 [ 15.953248] ret_from_fork+0x116/0x1d0 [ 15.953269] ? __pfx_kthread+0x10/0x10 [ 15.953290] ret_from_fork_asm+0x1a/0x30 [ 15.953322] </TASK> [ 15.953334] [ 15.961912] Allocated by task 283: [ 15.962187] kasan_save_stack+0x45/0x70 [ 15.962361] kasan_save_track+0x18/0x40 [ 15.962516] kasan_save_alloc_info+0x3b/0x50 [ 15.962673] __kasan_kmalloc+0xb7/0xc0 [ 15.962889] __kmalloc_cache_noprof+0x189/0x420 [ 15.963232] kasan_atomics+0x95/0x310 [ 15.963424] kunit_try_run_case+0x1a5/0x480 [ 15.963650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964072] kthread+0x337/0x6f0 [ 15.964252] ret_from_fork+0x116/0x1d0 [ 15.964425] ret_from_fork_asm+0x1a/0x30 [ 15.964594] [ 15.964696] The buggy address belongs to the object at ffff8881038b5600 [ 15.964696] which belongs to the cache kmalloc-64 of size 64 [ 15.965392] The buggy address is located 0 bytes to the right of [ 15.965392] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.965919] [ 15.966019] The buggy address belongs to the physical page: [ 15.966259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.966562] flags: 0x200000000000000(node=0|zone=2) [ 15.966776] page_type: f5(slab) [ 15.966977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.967543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.967895] page dumped because: kasan: bad access detected [ 15.968159] [ 15.968234] Memory state around the buggy address: [ 15.968394] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968630] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968853] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.969070] ^ [ 15.969230] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969452] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969683] ================================================================== [ 16.173503] ================================================================== [ 16.173835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 16.174197] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.174572] [ 16.174730] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.174788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.174800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.174824] Call Trace: [ 16.174839] <TASK> [ 16.174854] dump_stack_lvl+0x73/0xb0 [ 16.174883] print_report+0xd1/0x610 [ 16.174907] ? __virt_addr_valid+0x1db/0x2d0 [ 16.174930] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.174951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.174975] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.174997] kasan_report+0x141/0x180 [ 16.175019] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.175047] kasan_check_range+0x10c/0x1c0 [ 16.175072] __kasan_check_write+0x18/0x20 [ 16.175092] kasan_atomics_helper+0x12e6/0x5450 [ 16.175116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.175138] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.175164] ? kasan_atomics+0x152/0x310 [ 16.175191] kasan_atomics+0x1dc/0x310 [ 16.175215] ? __pfx_kasan_atomics+0x10/0x10 [ 16.175239] ? __pfx_read_tsc+0x10/0x10 [ 16.175261] ? ktime_get_ts64+0x86/0x230 [ 16.175285] kunit_try_run_case+0x1a5/0x480 [ 16.175310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175334] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.175359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.175383] ? __kthread_parkme+0x82/0x180 [ 16.175404] ? preempt_count_sub+0x50/0x80 [ 16.175429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.175490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.175514] kthread+0x337/0x6f0 [ 16.175535] ? trace_preempt_on+0x20/0xc0 [ 16.175570] ? __pfx_kthread+0x10/0x10 [ 16.175592] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.175614] ? calculate_sigpending+0x7b/0xa0 [ 16.175640] ? __pfx_kthread+0x10/0x10 [ 16.175662] ret_from_fork+0x116/0x1d0 [ 16.175715] ? __pfx_kthread+0x10/0x10 [ 16.175737] ret_from_fork_asm+0x1a/0x30 [ 16.175806] </TASK> [ 16.175817] [ 16.185564] Allocated by task 283: [ 16.185961] kasan_save_stack+0x45/0x70 [ 16.186210] kasan_save_track+0x18/0x40 [ 16.186544] kasan_save_alloc_info+0x3b/0x50 [ 16.186721] __kasan_kmalloc+0xb7/0xc0 [ 16.187061] __kmalloc_cache_noprof+0x189/0x420 [ 16.187225] kasan_atomics+0x95/0x310 [ 16.187361] kunit_try_run_case+0x1a5/0x480 [ 16.187535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.187794] kthread+0x337/0x6f0 [ 16.188005] ret_from_fork+0x116/0x1d0 [ 16.188408] ret_from_fork_asm+0x1a/0x30 [ 16.188614] [ 16.188744] The buggy address belongs to the object at ffff8881038b5600 [ 16.188744] which belongs to the cache kmalloc-64 of size 64 [ 16.189188] The buggy address is located 0 bytes to the right of [ 16.189188] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.190269] [ 16.190367] The buggy address belongs to the physical page: [ 16.190561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.190815] flags: 0x200000000000000(node=0|zone=2) [ 16.190982] page_type: f5(slab) [ 16.191105] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.191340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.191579] page dumped because: kasan: bad access detected [ 16.191764] [ 16.192813] Memory state around the buggy address: [ 16.193026] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.194326] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.194729] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.195583] ^ [ 16.196214] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.197431] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.198337] ================================================================== [ 16.152740] ================================================================== [ 16.153382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 16.153745] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.154198] [ 16.154308] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.154354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.154366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.154388] Call Trace: [ 16.154405] <TASK> [ 16.154422] dump_stack_lvl+0x73/0xb0 [ 16.154452] print_report+0xd1/0x610 [ 16.154489] ? __virt_addr_valid+0x1db/0x2d0 [ 16.154513] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.154536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.154592] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.154616] kasan_report+0x141/0x180 [ 16.154638] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.154699] __asan_report_load4_noabort+0x18/0x20 [ 16.154724] kasan_atomics_helper+0x49e8/0x5450 [ 16.154747] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.154791] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.154817] ? kasan_atomics+0x152/0x310 [ 16.154845] kasan_atomics+0x1dc/0x310 [ 16.154868] ? __pfx_kasan_atomics+0x10/0x10 [ 16.154893] ? __pfx_read_tsc+0x10/0x10 [ 16.154915] ? ktime_get_ts64+0x86/0x230 [ 16.154940] kunit_try_run_case+0x1a5/0x480 [ 16.154965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.154989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.155014] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.155038] ? __kthread_parkme+0x82/0x180 [ 16.155059] ? preempt_count_sub+0x50/0x80 [ 16.155084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.155109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.155133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.155158] kthread+0x337/0x6f0 [ 16.155178] ? trace_preempt_on+0x20/0xc0 [ 16.155203] ? __pfx_kthread+0x10/0x10 [ 16.155225] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.155248] ? calculate_sigpending+0x7b/0xa0 [ 16.155273] ? __pfx_kthread+0x10/0x10 [ 16.155295] ret_from_fork+0x116/0x1d0 [ 16.155315] ? __pfx_kthread+0x10/0x10 [ 16.155335] ret_from_fork_asm+0x1a/0x30 [ 16.155367] </TASK> [ 16.155377] [ 16.164232] Allocated by task 283: [ 16.164366] kasan_save_stack+0x45/0x70 [ 16.164600] kasan_save_track+0x18/0x40 [ 16.164791] kasan_save_alloc_info+0x3b/0x50 [ 16.165002] __kasan_kmalloc+0xb7/0xc0 [ 16.165189] __kmalloc_cache_noprof+0x189/0x420 [ 16.165409] kasan_atomics+0x95/0x310 [ 16.165601] kunit_try_run_case+0x1a5/0x480 [ 16.165810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.166007] kthread+0x337/0x6f0 [ 16.166138] ret_from_fork+0x116/0x1d0 [ 16.166272] ret_from_fork_asm+0x1a/0x30 [ 16.166411] [ 16.166620] The buggy address belongs to the object at ffff8881038b5600 [ 16.166620] which belongs to the cache kmalloc-64 of size 64 [ 16.167381] The buggy address is located 0 bytes to the right of [ 16.167381] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.167889] [ 16.167990] The buggy address belongs to the physical page: [ 16.168238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.168661] flags: 0x200000000000000(node=0|zone=2) [ 16.169041] page_type: f5(slab) [ 16.169245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.169647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.169968] page dumped because: kasan: bad access detected [ 16.170249] [ 16.170349] Memory state around the buggy address: [ 16.170591] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.170920] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.171345] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.171797] ^ [ 16.172006] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.172364] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.172852] ================================================================== [ 16.745754] ================================================================== [ 16.746987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.748009] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.748712] [ 16.748981] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.749042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.749056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.749079] Call Trace: [ 16.749099] <TASK> [ 16.749118] dump_stack_lvl+0x73/0xb0 [ 16.749154] print_report+0xd1/0x610 [ 16.749178] ? __virt_addr_valid+0x1db/0x2d0 [ 16.749202] ? kasan_atomics_helper+0x2006/0x5450 [ 16.749224] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.749249] ? kasan_atomics_helper+0x2006/0x5450 [ 16.749272] kasan_report+0x141/0x180 [ 16.749295] ? kasan_atomics_helper+0x2006/0x5450 [ 16.749322] kasan_check_range+0x10c/0x1c0 [ 16.749347] __kasan_check_write+0x18/0x20 [ 16.749367] kasan_atomics_helper+0x2006/0x5450 [ 16.749391] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.749414] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.749443] ? kasan_atomics+0x152/0x310 [ 16.749482] kasan_atomics+0x1dc/0x310 [ 16.749506] ? __pfx_kasan_atomics+0x10/0x10 [ 16.749531] ? __pfx_read_tsc+0x10/0x10 [ 16.749555] ? ktime_get_ts64+0x86/0x230 [ 16.749582] kunit_try_run_case+0x1a5/0x480 [ 16.749607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.749632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.749658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.749682] ? __kthread_parkme+0x82/0x180 [ 16.749705] ? preempt_count_sub+0x50/0x80 [ 16.749730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.749755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.749779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.749831] kthread+0x337/0x6f0 [ 16.749852] ? trace_preempt_on+0x20/0xc0 [ 16.749877] ? __pfx_kthread+0x10/0x10 [ 16.749899] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.749923] ? calculate_sigpending+0x7b/0xa0 [ 16.749948] ? __pfx_kthread+0x10/0x10 [ 16.749971] ret_from_fork+0x116/0x1d0 [ 16.749990] ? __pfx_kthread+0x10/0x10 [ 16.750012] ret_from_fork_asm+0x1a/0x30 [ 16.750044] </TASK> [ 16.750056] [ 16.762273] Allocated by task 283: [ 16.762411] kasan_save_stack+0x45/0x70 [ 16.762580] kasan_save_track+0x18/0x40 [ 16.762722] kasan_save_alloc_info+0x3b/0x50 [ 16.762922] __kasan_kmalloc+0xb7/0xc0 [ 16.763120] __kmalloc_cache_noprof+0x189/0x420 [ 16.763352] kasan_atomics+0x95/0x310 [ 16.763551] kunit_try_run_case+0x1a5/0x480 [ 16.763727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.763910] kthread+0x337/0x6f0 [ 16.764179] ret_from_fork+0x116/0x1d0 [ 16.764378] ret_from_fork_asm+0x1a/0x30 [ 16.764600] [ 16.764703] The buggy address belongs to the object at ffff8881038b5600 [ 16.764703] which belongs to the cache kmalloc-64 of size 64 [ 16.765110] The buggy address is located 0 bytes to the right of [ 16.765110] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.765634] [ 16.765724] The buggy address belongs to the physical page: [ 16.765970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.766253] flags: 0x200000000000000(node=0|zone=2) [ 16.766490] page_type: f5(slab) [ 16.766667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.767197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.767524] page dumped because: kasan: bad access detected [ 16.767728] [ 16.767806] Memory state around the buggy address: [ 16.768041] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.768329] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.768641] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.768949] ^ [ 16.769167] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.769390] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.769678] ================================================================== [ 16.010804] ================================================================== [ 16.011368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 16.011739] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.012172] [ 16.012296] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.012342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.012354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.012376] Call Trace: [ 16.012391] <TASK> [ 16.012406] dump_stack_lvl+0x73/0xb0 [ 16.012437] print_report+0xd1/0x610 [ 16.012460] ? __virt_addr_valid+0x1db/0x2d0 [ 16.012497] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.012519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.012543] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.012566] kasan_report+0x141/0x180 [ 16.012589] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.012617] __asan_report_load4_noabort+0x18/0x20 [ 16.012642] kasan_atomics_helper+0x4a36/0x5450 [ 16.012665] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.012689] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.012715] ? kasan_atomics+0x152/0x310 [ 16.012744] kasan_atomics+0x1dc/0x310 [ 16.012770] ? __pfx_kasan_atomics+0x10/0x10 [ 16.012797] ? __pfx_read_tsc+0x10/0x10 [ 16.012821] ? ktime_get_ts64+0x86/0x230 [ 16.012846] kunit_try_run_case+0x1a5/0x480 [ 16.012872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.012896] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.012922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.012947] ? __kthread_parkme+0x82/0x180 [ 16.012969] ? preempt_count_sub+0x50/0x80 [ 16.012994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.013019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.013087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.013114] kthread+0x337/0x6f0 [ 16.013135] ? trace_preempt_on+0x20/0xc0 [ 16.013159] ? __pfx_kthread+0x10/0x10 [ 16.013182] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.013205] ? calculate_sigpending+0x7b/0xa0 [ 16.013230] ? __pfx_kthread+0x10/0x10 [ 16.013253] ret_from_fork+0x116/0x1d0 [ 16.013273] ? __pfx_kthread+0x10/0x10 [ 16.013295] ret_from_fork_asm+0x1a/0x30 [ 16.013328] </TASK> [ 16.013339] [ 16.022283] Allocated by task 283: [ 16.022491] kasan_save_stack+0x45/0x70 [ 16.022845] kasan_save_track+0x18/0x40 [ 16.023274] kasan_save_alloc_info+0x3b/0x50 [ 16.023517] __kasan_kmalloc+0xb7/0xc0 [ 16.023712] __kmalloc_cache_noprof+0x189/0x420 [ 16.024030] kasan_atomics+0x95/0x310 [ 16.024304] kunit_try_run_case+0x1a5/0x480 [ 16.024464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.024663] kthread+0x337/0x6f0 [ 16.024913] ret_from_fork+0x116/0x1d0 [ 16.025202] ret_from_fork_asm+0x1a/0x30 [ 16.025409] [ 16.025522] The buggy address belongs to the object at ffff8881038b5600 [ 16.025522] which belongs to the cache kmalloc-64 of size 64 [ 16.026272] The buggy address is located 0 bytes to the right of [ 16.026272] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.026769] [ 16.026873] The buggy address belongs to the physical page: [ 16.027300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.027577] flags: 0x200000000000000(node=0|zone=2) [ 16.027750] page_type: f5(slab) [ 16.027877] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.028119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.028413] page dumped because: kasan: bad access detected [ 16.028682] [ 16.028918] Memory state around the buggy address: [ 16.029300] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.029622] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.029949] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.030354] ^ [ 16.030824] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031114] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031442] ================================================================== [ 15.909815] ================================================================== [ 15.910238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.910614] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.911353] [ 15.911498] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.911547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.911559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.911583] Call Trace: [ 15.911601] <TASK> [ 15.911617] dump_stack_lvl+0x73/0xb0 [ 15.911649] print_report+0xd1/0x610 [ 15.911673] ? __virt_addr_valid+0x1db/0x2d0 [ 15.911696] ? kasan_atomics_helper+0xd47/0x5450 [ 15.911719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.911743] ? kasan_atomics_helper+0xd47/0x5450 [ 15.911766] kasan_report+0x141/0x180 [ 15.911806] ? kasan_atomics_helper+0xd47/0x5450 [ 15.911835] kasan_check_range+0x10c/0x1c0 [ 15.911860] __kasan_check_write+0x18/0x20 [ 15.911882] kasan_atomics_helper+0xd47/0x5450 [ 15.911907] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.911930] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.911957] ? kasan_atomics+0x152/0x310 [ 15.911985] kasan_atomics+0x1dc/0x310 [ 15.912009] ? __pfx_kasan_atomics+0x10/0x10 [ 15.912035] ? __pfx_read_tsc+0x10/0x10 [ 15.912105] ? ktime_get_ts64+0x86/0x230 [ 15.912132] kunit_try_run_case+0x1a5/0x480 [ 15.912158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.912182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.912209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.912234] ? __kthread_parkme+0x82/0x180 [ 15.912257] ? preempt_count_sub+0x50/0x80 [ 15.912282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.912307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.912332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.912357] kthread+0x337/0x6f0 [ 15.912378] ? trace_preempt_on+0x20/0xc0 [ 15.912403] ? __pfx_kthread+0x10/0x10 [ 15.912425] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.912449] ? calculate_sigpending+0x7b/0xa0 [ 15.912486] ? __pfx_kthread+0x10/0x10 [ 15.912509] ret_from_fork+0x116/0x1d0 [ 15.912529] ? __pfx_kthread+0x10/0x10 [ 15.912551] ret_from_fork_asm+0x1a/0x30 [ 15.912583] </TASK> [ 15.912593] [ 15.921406] Allocated by task 283: [ 15.921555] kasan_save_stack+0x45/0x70 [ 15.921708] kasan_save_track+0x18/0x40 [ 15.921850] kasan_save_alloc_info+0x3b/0x50 [ 15.922005] __kasan_kmalloc+0xb7/0xc0 [ 15.922148] __kmalloc_cache_noprof+0x189/0x420 [ 15.922311] kasan_atomics+0x95/0x310 [ 15.922451] kunit_try_run_case+0x1a5/0x480 [ 15.922677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.922935] kthread+0x337/0x6f0 [ 15.923313] ret_from_fork+0x116/0x1d0 [ 15.923544] ret_from_fork_asm+0x1a/0x30 [ 15.923747] [ 15.923948] The buggy address belongs to the object at ffff8881038b5600 [ 15.923948] which belongs to the cache kmalloc-64 of size 64 [ 15.925021] The buggy address is located 0 bytes to the right of [ 15.925021] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.925617] [ 15.925728] The buggy address belongs to the physical page: [ 15.926309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.926632] flags: 0x200000000000000(node=0|zone=2) [ 15.926892] page_type: f5(slab) [ 15.927112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.927370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.927619] page dumped because: kasan: bad access detected [ 15.927814] [ 15.927913] Memory state around the buggy address: [ 15.928153] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.928568] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.928905] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.929405] ^ [ 15.929627] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.929952] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.930349] ================================================================== [ 15.699842] ================================================================== [ 15.700248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.700596] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.701522] [ 15.701873] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.701935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.701950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.701975] Call Trace: [ 15.701994] <TASK> [ 15.702052] dump_stack_lvl+0x73/0xb0 [ 15.702156] print_report+0xd1/0x610 [ 15.702183] ? __virt_addr_valid+0x1db/0x2d0 [ 15.702208] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.702232] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.702258] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.702281] kasan_report+0x141/0x180 [ 15.702305] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.702333] kasan_check_range+0x10c/0x1c0 [ 15.702359] __kasan_check_write+0x18/0x20 [ 15.702380] kasan_atomics_helper+0x7c7/0x5450 [ 15.702405] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.702429] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.702455] ? kasan_atomics+0x152/0x310 [ 15.702495] kasan_atomics+0x1dc/0x310 [ 15.702520] ? __pfx_kasan_atomics+0x10/0x10 [ 15.702546] ? __pfx_read_tsc+0x10/0x10 [ 15.702569] ? ktime_get_ts64+0x86/0x230 [ 15.702596] kunit_try_run_case+0x1a5/0x480 [ 15.702621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.702672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.702697] ? __kthread_parkme+0x82/0x180 [ 15.702720] ? preempt_count_sub+0x50/0x80 [ 15.702746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.702796] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.702822] kthread+0x337/0x6f0 [ 15.702843] ? trace_preempt_on+0x20/0xc0 [ 15.702867] ? __pfx_kthread+0x10/0x10 [ 15.702890] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.702914] ? calculate_sigpending+0x7b/0xa0 [ 15.702940] ? __pfx_kthread+0x10/0x10 [ 15.702962] ret_from_fork+0x116/0x1d0 [ 15.702983] ? __pfx_kthread+0x10/0x10 [ 15.703005] ret_from_fork_asm+0x1a/0x30 [ 15.703072] </TASK> [ 15.703085] [ 15.715285] Allocated by task 283: [ 15.716014] kasan_save_stack+0x45/0x70 [ 15.716479] kasan_save_track+0x18/0x40 [ 15.716913] kasan_save_alloc_info+0x3b/0x50 [ 15.717414] __kasan_kmalloc+0xb7/0xc0 [ 15.717821] __kmalloc_cache_noprof+0x189/0x420 [ 15.718337] kasan_atomics+0x95/0x310 [ 15.718600] kunit_try_run_case+0x1a5/0x480 [ 15.718759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.718943] kthread+0x337/0x6f0 [ 15.719105] ret_from_fork+0x116/0x1d0 [ 15.719339] ret_from_fork_asm+0x1a/0x30 [ 15.719595] [ 15.719720] The buggy address belongs to the object at ffff8881038b5600 [ 15.719720] which belongs to the cache kmalloc-64 of size 64 [ 15.720562] The buggy address is located 0 bytes to the right of [ 15.720562] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.721188] [ 15.721298] The buggy address belongs to the physical page: [ 15.721624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.722085] flags: 0x200000000000000(node=0|zone=2) [ 15.722439] page_type: f5(slab) [ 15.722658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.723144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.723692] page dumped because: kasan: bad access detected [ 15.724033] [ 15.724135] Memory state around the buggy address: [ 15.724454] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.724904] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.725318] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.725640] ^ [ 15.726052] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726440] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726793] ================================================================== [ 16.502819] ================================================================== [ 16.503272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.503594] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.503969] [ 16.504151] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.504200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.504213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.504236] Call Trace: [ 16.504276] <TASK> [ 16.504293] dump_stack_lvl+0x73/0xb0 [ 16.504339] print_report+0xd1/0x610 [ 16.504376] ? __virt_addr_valid+0x1db/0x2d0 [ 16.504414] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.504450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.504499] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.504536] kasan_report+0x141/0x180 [ 16.504574] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.504615] kasan_check_range+0x10c/0x1c0 [ 16.504652] __kasan_check_write+0x18/0x20 [ 16.504673] kasan_atomics_helper+0x19e3/0x5450 [ 16.504697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.504721] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.504747] ? kasan_atomics+0x152/0x310 [ 16.504775] kasan_atomics+0x1dc/0x310 [ 16.504817] ? __pfx_kasan_atomics+0x10/0x10 [ 16.504844] ? __pfx_read_tsc+0x10/0x10 [ 16.504866] ? ktime_get_ts64+0x86/0x230 [ 16.504891] kunit_try_run_case+0x1a5/0x480 [ 16.504916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.504940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.504966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.504991] ? __kthread_parkme+0x82/0x180 [ 16.505014] ? preempt_count_sub+0x50/0x80 [ 16.505111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.505136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.505161] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.505188] kthread+0x337/0x6f0 [ 16.505210] ? trace_preempt_on+0x20/0xc0 [ 16.505234] ? __pfx_kthread+0x10/0x10 [ 16.505256] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.505279] ? calculate_sigpending+0x7b/0xa0 [ 16.505304] ? __pfx_kthread+0x10/0x10 [ 16.505327] ret_from_fork+0x116/0x1d0 [ 16.505347] ? __pfx_kthread+0x10/0x10 [ 16.505369] ret_from_fork_asm+0x1a/0x30 [ 16.505400] </TASK> [ 16.505412] [ 16.514141] Allocated by task 283: [ 16.514372] kasan_save_stack+0x45/0x70 [ 16.514599] kasan_save_track+0x18/0x40 [ 16.514851] kasan_save_alloc_info+0x3b/0x50 [ 16.515135] __kasan_kmalloc+0xb7/0xc0 [ 16.515321] __kmalloc_cache_noprof+0x189/0x420 [ 16.515556] kasan_atomics+0x95/0x310 [ 16.515714] kunit_try_run_case+0x1a5/0x480 [ 16.515891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.516133] kthread+0x337/0x6f0 [ 16.516267] ret_from_fork+0x116/0x1d0 [ 16.516417] ret_from_fork_asm+0x1a/0x30 [ 16.516661] [ 16.516811] The buggy address belongs to the object at ffff8881038b5600 [ 16.516811] which belongs to the cache kmalloc-64 of size 64 [ 16.517681] The buggy address is located 0 bytes to the right of [ 16.517681] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.518380] [ 16.518490] The buggy address belongs to the physical page: [ 16.518743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.519148] flags: 0x200000000000000(node=0|zone=2) [ 16.519325] page_type: f5(slab) [ 16.519485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.519884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.520358] page dumped because: kasan: bad access detected [ 16.520656] [ 16.520774] Memory state around the buggy address: [ 16.521076] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.521411] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.521734] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.522006] ^ [ 16.522527] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.522913] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.523328] ================================================================== [ 15.536917] ================================================================== [ 15.537401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.537729] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.538091] [ 15.538186] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.538231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.538245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.538270] Call Trace: [ 15.538288] <TASK> [ 15.538304] dump_stack_lvl+0x73/0xb0 [ 15.538335] print_report+0xd1/0x610 [ 15.538360] ? __virt_addr_valid+0x1db/0x2d0 [ 15.538385] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.538408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.538432] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.538455] kasan_report+0x141/0x180 [ 15.538491] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.538519] __asan_report_store4_noabort+0x1b/0x30 [ 15.538546] kasan_atomics_helper+0x4b3a/0x5450 [ 15.538570] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.538593] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.538620] ? kasan_atomics+0x152/0x310 [ 15.538648] kasan_atomics+0x1dc/0x310 [ 15.538672] ? __pfx_kasan_atomics+0x10/0x10 [ 15.538698] ? __pfx_read_tsc+0x10/0x10 [ 15.538722] ? ktime_get_ts64+0x86/0x230 [ 15.538747] kunit_try_run_case+0x1a5/0x480 [ 15.538779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.538826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.538854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.538879] ? __kthread_parkme+0x82/0x180 [ 15.538900] ? preempt_count_sub+0x50/0x80 [ 15.538927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.538953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.538977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.539003] kthread+0x337/0x6f0 [ 15.539024] ? trace_preempt_on+0x20/0xc0 [ 15.539057] ? __pfx_kthread+0x10/0x10 [ 15.539079] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.539102] ? calculate_sigpending+0x7b/0xa0 [ 15.539129] ? __pfx_kthread+0x10/0x10 [ 15.539151] ret_from_fork+0x116/0x1d0 [ 15.539172] ? __pfx_kthread+0x10/0x10 [ 15.539194] ret_from_fork_asm+0x1a/0x30 [ 15.539226] </TASK> [ 15.539238] [ 15.549338] Allocated by task 283: [ 15.549558] kasan_save_stack+0x45/0x70 [ 15.549747] kasan_save_track+0x18/0x40 [ 15.550575] kasan_save_alloc_info+0x3b/0x50 [ 15.550749] __kasan_kmalloc+0xb7/0xc0 [ 15.550891] __kmalloc_cache_noprof+0x189/0x420 [ 15.551065] kasan_atomics+0x95/0x310 [ 15.551204] kunit_try_run_case+0x1a5/0x480 [ 15.551355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.552210] kthread+0x337/0x6f0 [ 15.552414] ret_from_fork+0x116/0x1d0 [ 15.552625] ret_from_fork_asm+0x1a/0x30 [ 15.552829] [ 15.552930] The buggy address belongs to the object at ffff8881038b5600 [ 15.552930] which belongs to the cache kmalloc-64 of size 64 [ 15.553440] The buggy address is located 0 bytes to the right of [ 15.553440] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.555498] [ 15.555928] The buggy address belongs to the physical page: [ 15.557000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.558080] flags: 0x200000000000000(node=0|zone=2) [ 15.558903] page_type: f5(slab) [ 15.559622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.560541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.561625] page dumped because: kasan: bad access detected [ 15.562687] [ 15.562918] Memory state around the buggy address: [ 15.563655] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.564536] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.565161] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.566115] ^ [ 15.566793] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.567642] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.568520] ================================================================== [ 15.642378] ================================================================== [ 15.642888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.643409] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.644179] [ 15.644429] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.644486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.644499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.644522] Call Trace: [ 15.644560] <TASK> [ 15.644587] dump_stack_lvl+0x73/0xb0 [ 15.644619] print_report+0xd1/0x610 [ 15.644656] ? __virt_addr_valid+0x1db/0x2d0 [ 15.644680] ? kasan_atomics_helper+0x697/0x5450 [ 15.644702] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.644737] ? kasan_atomics_helper+0x697/0x5450 [ 15.644761] kasan_report+0x141/0x180 [ 15.644785] ? kasan_atomics_helper+0x697/0x5450 [ 15.644812] kasan_check_range+0x10c/0x1c0 [ 15.644837] __kasan_check_write+0x18/0x20 [ 15.644858] kasan_atomics_helper+0x697/0x5450 [ 15.644882] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.644906] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.644932] ? kasan_atomics+0x152/0x310 [ 15.644960] kasan_atomics+0x1dc/0x310 [ 15.644984] ? __pfx_kasan_atomics+0x10/0x10 [ 15.645010] ? __pfx_read_tsc+0x10/0x10 [ 15.645042] ? ktime_get_ts64+0x86/0x230 [ 15.645069] kunit_try_run_case+0x1a5/0x480 [ 15.645094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.645117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.645144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.645168] ? __kthread_parkme+0x82/0x180 [ 15.645190] ? preempt_count_sub+0x50/0x80 [ 15.645215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.645240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.645265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.645290] kthread+0x337/0x6f0 [ 15.645311] ? trace_preempt_on+0x20/0xc0 [ 15.645335] ? __pfx_kthread+0x10/0x10 [ 15.645357] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.645380] ? calculate_sigpending+0x7b/0xa0 [ 15.645405] ? __pfx_kthread+0x10/0x10 [ 15.645428] ret_from_fork+0x116/0x1d0 [ 15.645449] ? __pfx_kthread+0x10/0x10 [ 15.645481] ret_from_fork_asm+0x1a/0x30 [ 15.645512] </TASK> [ 15.645523] [ 15.658979] Allocated by task 283: [ 15.659230] kasan_save_stack+0x45/0x70 [ 15.659660] kasan_save_track+0x18/0x40 [ 15.659935] kasan_save_alloc_info+0x3b/0x50 [ 15.660135] __kasan_kmalloc+0xb7/0xc0 [ 15.660300] __kmalloc_cache_noprof+0x189/0x420 [ 15.660727] kasan_atomics+0x95/0x310 [ 15.660930] kunit_try_run_case+0x1a5/0x480 [ 15.661083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661393] kthread+0x337/0x6f0 [ 15.661676] ret_from_fork+0x116/0x1d0 [ 15.661945] ret_from_fork_asm+0x1a/0x30 [ 15.662209] [ 15.662308] The buggy address belongs to the object at ffff8881038b5600 [ 15.662308] which belongs to the cache kmalloc-64 of size 64 [ 15.662839] The buggy address is located 0 bytes to the right of [ 15.662839] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.663450] [ 15.663565] The buggy address belongs to the physical page: [ 15.663987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.664346] flags: 0x200000000000000(node=0|zone=2) [ 15.664647] page_type: f5(slab) [ 15.664838] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.665210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.665561] page dumped because: kasan: bad access detected [ 15.665889] [ 15.665976] Memory state around the buggy address: [ 15.666233] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.666696] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667013] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.667537] ^ [ 15.667732] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668130] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668504] ================================================================== [ 15.790362] ================================================================== [ 15.790696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.791109] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.791596] [ 15.791695] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.791742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.791754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.791779] Call Trace: [ 15.791796] <TASK> [ 15.791825] dump_stack_lvl+0x73/0xb0 [ 15.791858] print_report+0xd1/0x610 [ 15.791894] ? __virt_addr_valid+0x1db/0x2d0 [ 15.791919] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.791941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.791965] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.791988] kasan_report+0x141/0x180 [ 15.792011] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.792038] kasan_check_range+0x10c/0x1c0 [ 15.792062] __kasan_check_write+0x18/0x20 [ 15.792083] kasan_atomics_helper+0xa2b/0x5450 [ 15.792107] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.792130] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.792157] ? kasan_atomics+0x152/0x310 [ 15.792184] kasan_atomics+0x1dc/0x310 [ 15.792208] ? __pfx_kasan_atomics+0x10/0x10 [ 15.792234] ? __pfx_read_tsc+0x10/0x10 [ 15.792257] ? ktime_get_ts64+0x86/0x230 [ 15.792282] kunit_try_run_case+0x1a5/0x480 [ 15.792309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.792385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.792413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.792439] ? __kthread_parkme+0x82/0x180 [ 15.792461] ? preempt_count_sub+0x50/0x80 [ 15.792498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.792534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.792559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.792596] kthread+0x337/0x6f0 [ 15.792617] ? trace_preempt_on+0x20/0xc0 [ 15.792642] ? __pfx_kthread+0x10/0x10 [ 15.792665] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.792688] ? calculate_sigpending+0x7b/0xa0 [ 15.792713] ? __pfx_kthread+0x10/0x10 [ 15.792737] ret_from_fork+0x116/0x1d0 [ 15.792757] ? __pfx_kthread+0x10/0x10 [ 15.792780] ret_from_fork_asm+0x1a/0x30 [ 15.792822] </TASK> [ 15.792833] [ 15.802266] Allocated by task 283: [ 15.802445] kasan_save_stack+0x45/0x70 [ 15.802667] kasan_save_track+0x18/0x40 [ 15.802838] kasan_save_alloc_info+0x3b/0x50 [ 15.802988] __kasan_kmalloc+0xb7/0xc0 [ 15.803121] __kmalloc_cache_noprof+0x189/0x420 [ 15.803279] kasan_atomics+0x95/0x310 [ 15.803414] kunit_try_run_case+0x1a5/0x480 [ 15.803987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804668] kthread+0x337/0x6f0 [ 15.805234] ret_from_fork+0x116/0x1d0 [ 15.805624] ret_from_fork_asm+0x1a/0x30 [ 15.806002] [ 15.806228] The buggy address belongs to the object at ffff8881038b5600 [ 15.806228] which belongs to the cache kmalloc-64 of size 64 [ 15.807540] The buggy address is located 0 bytes to the right of [ 15.807540] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.808429] [ 15.808645] The buggy address belongs to the physical page: [ 15.809273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.809872] flags: 0x200000000000000(node=0|zone=2) [ 15.810329] page_type: f5(slab) [ 15.810460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.810712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.811493] page dumped because: kasan: bad access detected [ 15.812403] [ 15.812591] Memory state around the buggy address: [ 15.813154] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.813780] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.814291] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.814633] ^ [ 15.815201] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.815891] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.816378] ================================================================== [ 16.248436] ================================================================== [ 16.248778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 16.249393] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.249748] [ 16.249941] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.249999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.250012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.250046] Call Trace: [ 16.250110] <TASK> [ 16.250127] dump_stack_lvl+0x73/0xb0 [ 16.250159] print_report+0xd1/0x610 [ 16.250193] ? __virt_addr_valid+0x1db/0x2d0 [ 16.250217] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.250239] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.250275] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.250298] kasan_report+0x141/0x180 [ 16.250322] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.250349] __asan_report_load8_noabort+0x18/0x20 [ 16.250385] kasan_atomics_helper+0x4eae/0x5450 [ 16.250408] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.250432] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.250479] ? kasan_atomics+0x152/0x310 [ 16.250506] kasan_atomics+0x1dc/0x310 [ 16.250530] ? __pfx_kasan_atomics+0x10/0x10 [ 16.250564] ? __pfx_read_tsc+0x10/0x10 [ 16.250586] ? ktime_get_ts64+0x86/0x230 [ 16.250611] kunit_try_run_case+0x1a5/0x480 [ 16.250646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.250671] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.250696] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.250721] ? __kthread_parkme+0x82/0x180 [ 16.250743] ? preempt_count_sub+0x50/0x80 [ 16.250767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.250792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.250817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.250841] kthread+0x337/0x6f0 [ 16.250862] ? trace_preempt_on+0x20/0xc0 [ 16.250886] ? __pfx_kthread+0x10/0x10 [ 16.250908] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.250932] ? calculate_sigpending+0x7b/0xa0 [ 16.250957] ? __pfx_kthread+0x10/0x10 [ 16.250979] ret_from_fork+0x116/0x1d0 [ 16.251000] ? __pfx_kthread+0x10/0x10 [ 16.251021] ret_from_fork_asm+0x1a/0x30 [ 16.251053] </TASK> [ 16.251064] [ 16.259819] Allocated by task 283: [ 16.260008] kasan_save_stack+0x45/0x70 [ 16.260436] kasan_save_track+0x18/0x40 [ 16.260637] kasan_save_alloc_info+0x3b/0x50 [ 16.260822] __kasan_kmalloc+0xb7/0xc0 [ 16.261040] __kmalloc_cache_noprof+0x189/0x420 [ 16.261418] kasan_atomics+0x95/0x310 [ 16.261799] kunit_try_run_case+0x1a5/0x480 [ 16.262025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.262294] kthread+0x337/0x6f0 [ 16.262504] ret_from_fork+0x116/0x1d0 [ 16.262697] ret_from_fork_asm+0x1a/0x30 [ 16.262977] [ 16.263056] The buggy address belongs to the object at ffff8881038b5600 [ 16.263056] which belongs to the cache kmalloc-64 of size 64 [ 16.263421] The buggy address is located 0 bytes to the right of [ 16.263421] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.263817] [ 16.263896] The buggy address belongs to the physical page: [ 16.264307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.264697] flags: 0x200000000000000(node=0|zone=2) [ 16.265197] page_type: f5(slab) [ 16.265373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.265738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.266637] page dumped because: kasan: bad access detected [ 16.266996] [ 16.267174] Memory state around the buggy address: [ 16.267380] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.267686] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.268209] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.268552] ^ [ 16.268716] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.268938] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.269156] ================================================================== [ 16.460455] ================================================================== [ 16.460847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.461297] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.461635] [ 16.461726] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.461825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.461839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.461875] Call Trace: [ 16.461904] <TASK> [ 16.461919] dump_stack_lvl+0x73/0xb0 [ 16.461967] print_report+0xd1/0x610 [ 16.462005] ? __virt_addr_valid+0x1db/0x2d0 [ 16.462108] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.462148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.462185] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.462209] kasan_report+0x141/0x180 [ 16.462233] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.462260] kasan_check_range+0x10c/0x1c0 [ 16.462285] __kasan_check_write+0x18/0x20 [ 16.462305] kasan_atomics_helper+0x18b1/0x5450 [ 16.462330] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.462353] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.462379] ? kasan_atomics+0x152/0x310 [ 16.462407] kasan_atomics+0x1dc/0x310 [ 16.462431] ? __pfx_kasan_atomics+0x10/0x10 [ 16.462457] ? __pfx_read_tsc+0x10/0x10 [ 16.462491] ? ktime_get_ts64+0x86/0x230 [ 16.462517] kunit_try_run_case+0x1a5/0x480 [ 16.462543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.462567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.462593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.462618] ? __kthread_parkme+0x82/0x180 [ 16.462639] ? preempt_count_sub+0x50/0x80 [ 16.462665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.462690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.462714] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.462739] kthread+0x337/0x6f0 [ 16.462780] ? trace_preempt_on+0x20/0xc0 [ 16.462804] ? __pfx_kthread+0x10/0x10 [ 16.462827] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.462871] ? calculate_sigpending+0x7b/0xa0 [ 16.462896] ? __pfx_kthread+0x10/0x10 [ 16.462933] ret_from_fork+0x116/0x1d0 [ 16.462954] ? __pfx_kthread+0x10/0x10 [ 16.462990] ret_from_fork_asm+0x1a/0x30 [ 16.463084] </TASK> [ 16.463114] [ 16.472300] Allocated by task 283: [ 16.472522] kasan_save_stack+0x45/0x70 [ 16.472700] kasan_save_track+0x18/0x40 [ 16.472901] kasan_save_alloc_info+0x3b/0x50 [ 16.473238] __kasan_kmalloc+0xb7/0xc0 [ 16.473433] __kmalloc_cache_noprof+0x189/0x420 [ 16.473702] kasan_atomics+0x95/0x310 [ 16.473957] kunit_try_run_case+0x1a5/0x480 [ 16.474246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.474524] kthread+0x337/0x6f0 [ 16.474697] ret_from_fork+0x116/0x1d0 [ 16.474910] ret_from_fork_asm+0x1a/0x30 [ 16.475135] [ 16.475239] The buggy address belongs to the object at ffff8881038b5600 [ 16.475239] which belongs to the cache kmalloc-64 of size 64 [ 16.475713] The buggy address is located 0 bytes to the right of [ 16.475713] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.476101] [ 16.476201] The buggy address belongs to the physical page: [ 16.476464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.477179] flags: 0x200000000000000(node=0|zone=2) [ 16.477439] page_type: f5(slab) [ 16.477649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.478112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.478415] page dumped because: kasan: bad access detected [ 16.478609] [ 16.478685] Memory state around the buggy address: [ 16.478875] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.479267] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.479653] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.480125] ^ [ 16.480401] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.480795] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.481355] ================================================================== [ 15.870495] ================================================================== [ 15.870916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.871480] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.871741] [ 15.871858] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.871902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.871916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.871938] Call Trace: [ 15.871956] <TASK> [ 15.871971] dump_stack_lvl+0x73/0xb0 [ 15.872002] print_report+0xd1/0x610 [ 15.872027] ? __virt_addr_valid+0x1db/0x2d0 [ 15.872052] ? kasan_atomics_helper+0xc70/0x5450 [ 15.872074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.872098] ? kasan_atomics_helper+0xc70/0x5450 [ 15.872121] kasan_report+0x141/0x180 [ 15.872145] ? kasan_atomics_helper+0xc70/0x5450 [ 15.872173] kasan_check_range+0x10c/0x1c0 [ 15.872197] __kasan_check_write+0x18/0x20 [ 15.872218] kasan_atomics_helper+0xc70/0x5450 [ 15.872290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.872314] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.872340] ? kasan_atomics+0x152/0x310 [ 15.872369] kasan_atomics+0x1dc/0x310 [ 15.872392] ? __pfx_kasan_atomics+0x10/0x10 [ 15.872417] ? __pfx_read_tsc+0x10/0x10 [ 15.872441] ? ktime_get_ts64+0x86/0x230 [ 15.872466] kunit_try_run_case+0x1a5/0x480 [ 15.872504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.872527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.872554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.872579] ? __kthread_parkme+0x82/0x180 [ 15.872600] ? preempt_count_sub+0x50/0x80 [ 15.872625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.872650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.872674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.872699] kthread+0x337/0x6f0 [ 15.872721] ? trace_preempt_on+0x20/0xc0 [ 15.872745] ? __pfx_kthread+0x10/0x10 [ 15.872767] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.872790] ? calculate_sigpending+0x7b/0xa0 [ 15.872815] ? __pfx_kthread+0x10/0x10 [ 15.872838] ret_from_fork+0x116/0x1d0 [ 15.872859] ? __pfx_kthread+0x10/0x10 [ 15.872890] ret_from_fork_asm+0x1a/0x30 [ 15.872922] </TASK> [ 15.872933] [ 15.881403] Allocated by task 283: [ 15.881578] kasan_save_stack+0x45/0x70 [ 15.881729] kasan_save_track+0x18/0x40 [ 15.881871] kasan_save_alloc_info+0x3b/0x50 [ 15.882142] __kasan_kmalloc+0xb7/0xc0 [ 15.882344] __kmalloc_cache_noprof+0x189/0x420 [ 15.882587] kasan_atomics+0x95/0x310 [ 15.882785] kunit_try_run_case+0x1a5/0x480 [ 15.883007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.883413] kthread+0x337/0x6f0 [ 15.883604] ret_from_fork+0x116/0x1d0 [ 15.883760] ret_from_fork_asm+0x1a/0x30 [ 15.883979] [ 15.884149] The buggy address belongs to the object at ffff8881038b5600 [ 15.884149] which belongs to the cache kmalloc-64 of size 64 [ 15.884592] The buggy address is located 0 bytes to the right of [ 15.884592] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.885255] [ 15.885335] The buggy address belongs to the physical page: [ 15.885590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.886151] flags: 0x200000000000000(node=0|zone=2) [ 15.886372] page_type: f5(slab) [ 15.886527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.886794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.887031] page dumped because: kasan: bad access detected [ 15.887214] [ 15.887288] Memory state around the buggy address: [ 15.887451] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.887693] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.888018] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.888699] ^ [ 15.889279] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.889598] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.889938] ================================================================== [ 16.604830] ================================================================== [ 16.605262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.605655] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.605922] [ 16.606038] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.606110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.606124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.606145] Call Trace: [ 16.606161] <TASK> [ 16.606196] dump_stack_lvl+0x73/0xb0 [ 16.606227] print_report+0xd1/0x610 [ 16.606268] ? __virt_addr_valid+0x1db/0x2d0 [ 16.606292] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.606315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.606339] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.606362] kasan_report+0x141/0x180 [ 16.606386] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.606415] kasan_check_range+0x10c/0x1c0 [ 16.606440] __kasan_check_write+0x18/0x20 [ 16.606461] kasan_atomics_helper+0x1ce1/0x5450 [ 16.606496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.606519] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.606562] ? kasan_atomics+0x152/0x310 [ 16.606605] kasan_atomics+0x1dc/0x310 [ 16.606643] ? __pfx_kasan_atomics+0x10/0x10 [ 16.606682] ? __pfx_read_tsc+0x10/0x10 [ 16.606719] ? ktime_get_ts64+0x86/0x230 [ 16.606777] kunit_try_run_case+0x1a5/0x480 [ 16.606832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.606869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.606907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.606946] ? __kthread_parkme+0x82/0x180 [ 16.606981] ? preempt_count_sub+0x50/0x80 [ 16.607019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.607058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.607096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.607135] kthread+0x337/0x6f0 [ 16.607170] ? trace_preempt_on+0x20/0xc0 [ 16.607208] ? __pfx_kthread+0x10/0x10 [ 16.607230] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.607253] ? calculate_sigpending+0x7b/0xa0 [ 16.607278] ? __pfx_kthread+0x10/0x10 [ 16.607301] ret_from_fork+0x116/0x1d0 [ 16.607321] ? __pfx_kthread+0x10/0x10 [ 16.607343] ret_from_fork_asm+0x1a/0x30 [ 16.607375] </TASK> [ 16.607386] [ 16.615391] Allocated by task 283: [ 16.615596] kasan_save_stack+0x45/0x70 [ 16.615821] kasan_save_track+0x18/0x40 [ 16.616013] kasan_save_alloc_info+0x3b/0x50 [ 16.616251] __kasan_kmalloc+0xb7/0xc0 [ 16.616445] __kmalloc_cache_noprof+0x189/0x420 [ 16.616697] kasan_atomics+0x95/0x310 [ 16.616920] kunit_try_run_case+0x1a5/0x480 [ 16.617135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.617393] kthread+0x337/0x6f0 [ 16.617579] ret_from_fork+0x116/0x1d0 [ 16.617793] ret_from_fork_asm+0x1a/0x30 [ 16.617994] [ 16.618093] The buggy address belongs to the object at ffff8881038b5600 [ 16.618093] which belongs to the cache kmalloc-64 of size 64 [ 16.618621] The buggy address is located 0 bytes to the right of [ 16.618621] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.619150] [ 16.619270] The buggy address belongs to the physical page: [ 16.619549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.619929] flags: 0x200000000000000(node=0|zone=2) [ 16.620165] page_type: f5(slab) [ 16.620356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.620618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.620915] page dumped because: kasan: bad access detected [ 16.621192] [ 16.621309] Memory state around the buggy address: [ 16.621576] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.621944] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.622258] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.622576] ^ [ 16.622833] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.623091] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.623314] ================================================================== [ 16.051461] ================================================================== [ 16.051789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 16.052104] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.052631] [ 16.052744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.052787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.052800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.052823] Call Trace: [ 16.052838] <TASK> [ 16.052853] dump_stack_lvl+0x73/0xb0 [ 16.052885] print_report+0xd1/0x610 [ 16.052908] ? __virt_addr_valid+0x1db/0x2d0 [ 16.052932] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.052954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.052979] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.053003] kasan_report+0x141/0x180 [ 16.053026] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.053053] __asan_report_load4_noabort+0x18/0x20 [ 16.053078] kasan_atomics_helper+0x4a1c/0x5450 [ 16.053102] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.053126] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.053152] ? kasan_atomics+0x152/0x310 [ 16.053180] kasan_atomics+0x1dc/0x310 [ 16.053204] ? __pfx_kasan_atomics+0x10/0x10 [ 16.053229] ? __pfx_read_tsc+0x10/0x10 [ 16.053253] ? ktime_get_ts64+0x86/0x230 [ 16.053278] kunit_try_run_case+0x1a5/0x480 [ 16.053304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.053329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.053355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.053380] ? __kthread_parkme+0x82/0x180 [ 16.053402] ? preempt_count_sub+0x50/0x80 [ 16.053428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.053454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.053492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.053517] kthread+0x337/0x6f0 [ 16.053539] ? trace_preempt_on+0x20/0xc0 [ 16.053563] ? __pfx_kthread+0x10/0x10 [ 16.053586] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.053610] ? calculate_sigpending+0x7b/0xa0 [ 16.053636] ? __pfx_kthread+0x10/0x10 [ 16.053659] ret_from_fork+0x116/0x1d0 [ 16.053679] ? __pfx_kthread+0x10/0x10 [ 16.053701] ret_from_fork_asm+0x1a/0x30 [ 16.053733] </TASK> [ 16.053744] [ 16.065106] Allocated by task 283: [ 16.065306] kasan_save_stack+0x45/0x70 [ 16.065552] kasan_save_track+0x18/0x40 [ 16.065949] kasan_save_alloc_info+0x3b/0x50 [ 16.066189] __kasan_kmalloc+0xb7/0xc0 [ 16.066385] __kmalloc_cache_noprof+0x189/0x420 [ 16.066627] kasan_atomics+0x95/0x310 [ 16.066998] kunit_try_run_case+0x1a5/0x480 [ 16.067289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.067483] kthread+0x337/0x6f0 [ 16.067611] ret_from_fork+0x116/0x1d0 [ 16.067751] ret_from_fork_asm+0x1a/0x30 [ 16.067962] [ 16.068083] The buggy address belongs to the object at ffff8881038b5600 [ 16.068083] which belongs to the cache kmalloc-64 of size 64 [ 16.068636] The buggy address is located 0 bytes to the right of [ 16.068636] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.069401] [ 16.069515] The buggy address belongs to the physical page: [ 16.069693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.069938] flags: 0x200000000000000(node=0|zone=2) [ 16.070121] page_type: f5(slab) [ 16.070327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.070721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.071361] page dumped because: kasan: bad access detected [ 16.071554] [ 16.071672] Memory state around the buggy address: [ 16.071994] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.072384] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.072711] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.073035] ^ [ 16.073224] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.073547] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.073864] ================================================================== [ 15.608319] ================================================================== [ 15.608941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.609402] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.610174] [ 15.610484] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.610567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.610581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.610605] Call Trace: [ 15.610636] <TASK> [ 15.610654] dump_stack_lvl+0x73/0xb0 [ 15.610688] print_report+0xd1/0x610 [ 15.610712] ? __virt_addr_valid+0x1db/0x2d0 [ 15.610738] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.610762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.610786] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.610809] kasan_report+0x141/0x180 [ 15.610833] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.610862] kasan_check_range+0x10c/0x1c0 [ 15.610887] __kasan_check_write+0x18/0x20 [ 15.610908] kasan_atomics_helper+0x5fe/0x5450 [ 15.610945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.610969] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.610995] ? kasan_atomics+0x152/0x310 [ 15.611074] kasan_atomics+0x1dc/0x310 [ 15.611116] ? __pfx_kasan_atomics+0x10/0x10 [ 15.611143] ? __pfx_read_tsc+0x10/0x10 [ 15.611167] ? ktime_get_ts64+0x86/0x230 [ 15.611205] kunit_try_run_case+0x1a5/0x480 [ 15.611231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.611267] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.611292] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.611318] ? __kthread_parkme+0x82/0x180 [ 15.611351] ? preempt_count_sub+0x50/0x80 [ 15.611378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.611403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.611438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.611463] kthread+0x337/0x6f0 [ 15.611502] ? trace_preempt_on+0x20/0xc0 [ 15.611526] ? __pfx_kthread+0x10/0x10 [ 15.611548] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.611583] ? calculate_sigpending+0x7b/0xa0 [ 15.611607] ? __pfx_kthread+0x10/0x10 [ 15.611642] ret_from_fork+0x116/0x1d0 [ 15.611663] ? __pfx_kthread+0x10/0x10 [ 15.611685] ret_from_fork_asm+0x1a/0x30 [ 15.611728] </TASK> [ 15.611740] [ 15.627262] Allocated by task 283: [ 15.627544] kasan_save_stack+0x45/0x70 [ 15.628022] kasan_save_track+0x18/0x40 [ 15.628503] kasan_save_alloc_info+0x3b/0x50 [ 15.628945] __kasan_kmalloc+0xb7/0xc0 [ 15.629361] __kmalloc_cache_noprof+0x189/0x420 [ 15.629731] kasan_atomics+0x95/0x310 [ 15.629898] kunit_try_run_case+0x1a5/0x480 [ 15.630055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.630642] kthread+0x337/0x6f0 [ 15.631105] ret_from_fork+0x116/0x1d0 [ 15.631499] ret_from_fork_asm+0x1a/0x30 [ 15.631907] [ 15.632082] The buggy address belongs to the object at ffff8881038b5600 [ 15.632082] which belongs to the cache kmalloc-64 of size 64 [ 15.633121] The buggy address is located 0 bytes to the right of [ 15.633121] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.634031] [ 15.634114] The buggy address belongs to the physical page: [ 15.634777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.635071] flags: 0x200000000000000(node=0|zone=2) [ 15.635521] page_type: f5(slab) [ 15.635807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.636287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.636532] page dumped because: kasan: bad access detected [ 15.636709] [ 15.636791] Memory state around the buggy address: [ 15.637339] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.638229] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.638959] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.639724] ^ [ 15.640300] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.641125] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.641642] ================================================================== [ 15.890613] ================================================================== [ 15.891064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.891422] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.891739] [ 15.891923] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.891970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.891982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.892004] Call Trace: [ 15.892021] <TASK> [ 15.892067] dump_stack_lvl+0x73/0xb0 [ 15.892101] print_report+0xd1/0x610 [ 15.892125] ? __virt_addr_valid+0x1db/0x2d0 [ 15.892148] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.892170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.892194] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.892217] kasan_report+0x141/0x180 [ 15.892240] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.892267] __asan_report_load4_noabort+0x18/0x20 [ 15.892293] kasan_atomics_helper+0x4a84/0x5450 [ 15.892318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.892341] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.892367] ? kasan_atomics+0x152/0x310 [ 15.892396] kasan_atomics+0x1dc/0x310 [ 15.892419] ? __pfx_kasan_atomics+0x10/0x10 [ 15.892443] ? __pfx_read_tsc+0x10/0x10 [ 15.892465] ? ktime_get_ts64+0x86/0x230 [ 15.892503] kunit_try_run_case+0x1a5/0x480 [ 15.892530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.892555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.892580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.892604] ? __kthread_parkme+0x82/0x180 [ 15.892626] ? preempt_count_sub+0x50/0x80 [ 15.892651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.892677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.892701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.892726] kthread+0x337/0x6f0 [ 15.892747] ? trace_preempt_on+0x20/0xc0 [ 15.892771] ? __pfx_kthread+0x10/0x10 [ 15.892793] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.892817] ? calculate_sigpending+0x7b/0xa0 [ 15.892841] ? __pfx_kthread+0x10/0x10 [ 15.892863] ret_from_fork+0x116/0x1d0 [ 15.892884] ? __pfx_kthread+0x10/0x10 [ 15.892906] ret_from_fork_asm+0x1a/0x30 [ 15.892937] </TASK> [ 15.892950] [ 15.901171] Allocated by task 283: [ 15.901363] kasan_save_stack+0x45/0x70 [ 15.901582] kasan_save_track+0x18/0x40 [ 15.901786] kasan_save_alloc_info+0x3b/0x50 [ 15.901971] __kasan_kmalloc+0xb7/0xc0 [ 15.902341] __kmalloc_cache_noprof+0x189/0x420 [ 15.902555] kasan_atomics+0x95/0x310 [ 15.902741] kunit_try_run_case+0x1a5/0x480 [ 15.902990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.903534] kthread+0x337/0x6f0 [ 15.903714] ret_from_fork+0x116/0x1d0 [ 15.903915] ret_from_fork_asm+0x1a/0x30 [ 15.904169] [ 15.904273] The buggy address belongs to the object at ffff8881038b5600 [ 15.904273] which belongs to the cache kmalloc-64 of size 64 [ 15.904739] The buggy address is located 0 bytes to the right of [ 15.904739] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.905324] [ 15.905428] The buggy address belongs to the physical page: [ 15.905681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.906062] flags: 0x200000000000000(node=0|zone=2) [ 15.906242] page_type: f5(slab) [ 15.906368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.906621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.906858] page dumped because: kasan: bad access detected [ 15.907039] [ 15.907113] Memory state around the buggy address: [ 15.907276] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.907650] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.908139] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.908478] ^ [ 15.908708] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.909195] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.909423] ================================================================== [ 15.850738] ================================================================== [ 15.851252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.851515] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 15.851753] [ 15.851844] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.851890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.851904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.851927] Call Trace: [ 15.851945] <TASK> [ 15.851962] dump_stack_lvl+0x73/0xb0 [ 15.851993] print_report+0xd1/0x610 [ 15.852016] ? __virt_addr_valid+0x1db/0x2d0 [ 15.852039] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.852062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.852085] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.852108] kasan_report+0x141/0x180 [ 15.852131] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.852159] kasan_check_range+0x10c/0x1c0 [ 15.852184] __kasan_check_write+0x18/0x20 [ 15.852204] kasan_atomics_helper+0xb6a/0x5450 [ 15.852240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.852264] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.852290] ? kasan_atomics+0x152/0x310 [ 15.852319] kasan_atomics+0x1dc/0x310 [ 15.852343] ? __pfx_kasan_atomics+0x10/0x10 [ 15.852368] ? __pfx_read_tsc+0x10/0x10 [ 15.852391] ? ktime_get_ts64+0x86/0x230 [ 15.852416] kunit_try_run_case+0x1a5/0x480 [ 15.852441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.852465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.852501] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.852526] ? __kthread_parkme+0x82/0x180 [ 15.852547] ? preempt_count_sub+0x50/0x80 [ 15.852572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.852597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.852622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.852647] kthread+0x337/0x6f0 [ 15.852668] ? trace_preempt_on+0x20/0xc0 [ 15.852692] ? __pfx_kthread+0x10/0x10 [ 15.852715] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.852739] ? calculate_sigpending+0x7b/0xa0 [ 15.852765] ? __pfx_kthread+0x10/0x10 [ 15.852787] ret_from_fork+0x116/0x1d0 [ 15.852808] ? __pfx_kthread+0x10/0x10 [ 15.852877] ret_from_fork_asm+0x1a/0x30 [ 15.852911] </TASK> [ 15.852922] [ 15.861478] Allocated by task 283: [ 15.861637] kasan_save_stack+0x45/0x70 [ 15.861793] kasan_save_track+0x18/0x40 [ 15.861937] kasan_save_alloc_info+0x3b/0x50 [ 15.862155] __kasan_kmalloc+0xb7/0xc0 [ 15.862619] __kmalloc_cache_noprof+0x189/0x420 [ 15.862920] kasan_atomics+0x95/0x310 [ 15.863144] kunit_try_run_case+0x1a5/0x480 [ 15.863366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.863607] kthread+0x337/0x6f0 [ 15.863766] ret_from_fork+0x116/0x1d0 [ 15.863975] ret_from_fork_asm+0x1a/0x30 [ 15.864337] [ 15.864438] The buggy address belongs to the object at ffff8881038b5600 [ 15.864438] which belongs to the cache kmalloc-64 of size 64 [ 15.865086] The buggy address is located 0 bytes to the right of [ 15.865086] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 15.865589] [ 15.865690] The buggy address belongs to the physical page: [ 15.865966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 15.866310] flags: 0x200000000000000(node=0|zone=2) [ 15.866494] page_type: f5(slab) [ 15.866621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.866859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.867155] page dumped because: kasan: bad access detected [ 15.867414] [ 15.867521] Memory state around the buggy address: [ 15.867749] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.868411] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.868783] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.869238] ^ [ 15.869494] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.869733] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.869962] ================================================================== [ 16.336763] ================================================================== [ 16.337228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.337623] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.338082] [ 16.338255] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.338303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.338315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.338359] Call Trace: [ 16.338376] <TASK> [ 16.338392] dump_stack_lvl+0x73/0xb0 [ 16.338424] print_report+0xd1/0x610 [ 16.338449] ? __virt_addr_valid+0x1db/0x2d0 [ 16.338483] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.338507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.338531] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.338555] kasan_report+0x141/0x180 [ 16.338578] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.338609] kasan_check_range+0x10c/0x1c0 [ 16.338634] __kasan_check_write+0x18/0x20 [ 16.338655] kasan_atomics_helper+0x15b6/0x5450 [ 16.338680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.338704] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.338730] ? kasan_atomics+0x152/0x310 [ 16.338758] kasan_atomics+0x1dc/0x310 [ 16.338806] ? __pfx_kasan_atomics+0x10/0x10 [ 16.338833] ? __pfx_read_tsc+0x10/0x10 [ 16.338867] ? ktime_get_ts64+0x86/0x230 [ 16.338893] kunit_try_run_case+0x1a5/0x480 [ 16.338918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.338943] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.338969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.338994] ? __kthread_parkme+0x82/0x180 [ 16.339016] ? preempt_count_sub+0x50/0x80 [ 16.339041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.339066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.339092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.339117] kthread+0x337/0x6f0 [ 16.339138] ? trace_preempt_on+0x20/0xc0 [ 16.339162] ? __pfx_kthread+0x10/0x10 [ 16.339185] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.339208] ? calculate_sigpending+0x7b/0xa0 [ 16.339251] ? __pfx_kthread+0x10/0x10 [ 16.339274] ret_from_fork+0x116/0x1d0 [ 16.339309] ? __pfx_kthread+0x10/0x10 [ 16.339331] ret_from_fork_asm+0x1a/0x30 [ 16.339379] </TASK> [ 16.339404] [ 16.349666] Allocated by task 283: [ 16.349938] kasan_save_stack+0x45/0x70 [ 16.350298] kasan_save_track+0x18/0x40 [ 16.350515] kasan_save_alloc_info+0x3b/0x50 [ 16.350683] __kasan_kmalloc+0xb7/0xc0 [ 16.350855] __kmalloc_cache_noprof+0x189/0x420 [ 16.351372] kasan_atomics+0x95/0x310 [ 16.351582] kunit_try_run_case+0x1a5/0x480 [ 16.351733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.352017] kthread+0x337/0x6f0 [ 16.352405] ret_from_fork+0x116/0x1d0 [ 16.352846] ret_from_fork_asm+0x1a/0x30 [ 16.353042] [ 16.353142] The buggy address belongs to the object at ffff8881038b5600 [ 16.353142] which belongs to the cache kmalloc-64 of size 64 [ 16.353780] The buggy address is located 0 bytes to the right of [ 16.353780] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.354526] [ 16.354603] The buggy address belongs to the physical page: [ 16.354780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.355651] flags: 0x200000000000000(node=0|zone=2) [ 16.355955] page_type: f5(slab) [ 16.356271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.356689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.357240] page dumped because: kasan: bad access detected [ 16.357416] [ 16.357531] Memory state around the buggy address: [ 16.357815] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.358400] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.358746] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.359154] ^ [ 16.359490] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.359763] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360373] ================================================================== [ 16.481759] ================================================================== [ 16.482055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.482669] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283 [ 16.483132] [ 16.483250] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.483296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.483309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.483333] Call Trace: [ 16.483352] <TASK> [ 16.483368] dump_stack_lvl+0x73/0xb0 [ 16.483400] print_report+0xd1/0x610 [ 16.483447] ? __virt_addr_valid+0x1db/0x2d0 [ 16.483481] ? kasan_atomics_helper+0x194a/0x5450 [ 16.483505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.483528] ? kasan_atomics_helper+0x194a/0x5450 [ 16.483551] kasan_report+0x141/0x180 [ 16.483575] ? kasan_atomics_helper+0x194a/0x5450 [ 16.483603] kasan_check_range+0x10c/0x1c0 [ 16.483629] __kasan_check_write+0x18/0x20 [ 16.483650] kasan_atomics_helper+0x194a/0x5450 [ 16.483673] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.483697] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.483744] ? kasan_atomics+0x152/0x310 [ 16.483792] kasan_atomics+0x1dc/0x310 [ 16.483816] ? __pfx_kasan_atomics+0x10/0x10 [ 16.483860] ? __pfx_read_tsc+0x10/0x10 [ 16.483882] ? ktime_get_ts64+0x86/0x230 [ 16.483908] kunit_try_run_case+0x1a5/0x480 [ 16.483934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.483958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.483983] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.484008] ? __kthread_parkme+0x82/0x180 [ 16.484120] ? preempt_count_sub+0x50/0x80 [ 16.484147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.484188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.484213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.484238] kthread+0x337/0x6f0 [ 16.484260] ? trace_preempt_on+0x20/0xc0 [ 16.484284] ? __pfx_kthread+0x10/0x10 [ 16.484306] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.484330] ? calculate_sigpending+0x7b/0xa0 [ 16.484355] ? __pfx_kthread+0x10/0x10 [ 16.484378] ret_from_fork+0x116/0x1d0 [ 16.484398] ? __pfx_kthread+0x10/0x10 [ 16.484420] ret_from_fork_asm+0x1a/0x30 [ 16.484452] </TASK> [ 16.484464] [ 16.493658] Allocated by task 283: [ 16.493893] kasan_save_stack+0x45/0x70 [ 16.494174] kasan_save_track+0x18/0x40 [ 16.494326] kasan_save_alloc_info+0x3b/0x50 [ 16.494496] __kasan_kmalloc+0xb7/0xc0 [ 16.494639] __kmalloc_cache_noprof+0x189/0x420 [ 16.494832] kasan_atomics+0x95/0x310 [ 16.494976] kunit_try_run_case+0x1a5/0x480 [ 16.495190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.495381] kthread+0x337/0x6f0 [ 16.495522] ret_from_fork+0x116/0x1d0 [ 16.495695] ret_from_fork_asm+0x1a/0x30 [ 16.495931] [ 16.496083] The buggy address belongs to the object at ffff8881038b5600 [ 16.496083] which belongs to the cache kmalloc-64 of size 64 [ 16.496656] The buggy address is located 0 bytes to the right of [ 16.496656] allocated 48-byte region [ffff8881038b5600, ffff8881038b5630) [ 16.497537] [ 16.497646] The buggy address belongs to the physical page: [ 16.497913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5 [ 16.498307] flags: 0x200000000000000(node=0|zone=2) [ 16.498626] page_type: f5(slab) [ 16.498820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.499164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.499516] page dumped because: kasan: bad access detected [ 16.499757] [ 16.499946] Memory state around the buggy address: [ 16.500197] ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.500552] ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.500890] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.501260] ^ [ 16.501484] ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.501784] ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.502342] ==================================================================