Date
July 23, 2025, 2:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.229416] ================================================================== [ 18.229611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.229810] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.230092] [ 18.230144] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.230334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.230399] Hardware name: linux,dummy-virt (DT) [ 18.230479] Call trace: [ 18.230505] show_stack+0x20/0x38 (C) [ 18.230696] dump_stack_lvl+0x8c/0xd0 [ 18.230997] print_report+0x118/0x5d0 [ 18.231202] kasan_report+0xdc/0x128 [ 18.231427] __asan_report_store8_noabort+0x20/0x30 [ 18.231607] kasan_atomics_helper+0x3e5c/0x4858 [ 18.231687] kasan_atomics+0x198/0x2e0 [ 18.231904] kunit_try_run_case+0x170/0x3f0 [ 18.232129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.232383] kthread+0x328/0x630 [ 18.232626] ret_from_fork+0x10/0x20 [ 18.232740] [ 18.232823] Allocated by task 265: [ 18.232970] kasan_save_stack+0x3c/0x68 [ 18.233140] kasan_save_track+0x20/0x40 [ 18.233428] kasan_save_alloc_info+0x40/0x58 [ 18.233635] __kasan_kmalloc+0xd4/0xd8 [ 18.233710] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.233900] kasan_atomics+0xb8/0x2e0 [ 18.234011] kunit_try_run_case+0x170/0x3f0 [ 18.234059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.234106] kthread+0x328/0x630 [ 18.234548] ret_from_fork+0x10/0x20 [ 18.234909] [ 18.234939] The buggy address belongs to the object at fff00000c3f8b900 [ 18.234939] which belongs to the cache kmalloc-64 of size 64 [ 18.235007] The buggy address is located 0 bytes to the right of [ 18.235007] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.235676] [ 18.235845] The buggy address belongs to the physical page: [ 18.236027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.236154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.236530] page_type: f5(slab) [ 18.236703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.236952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.237411] page dumped because: kasan: bad access detected [ 18.237514] [ 18.237537] Memory state around the buggy address: [ 18.237722] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.237842] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.238032] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.238268] ^ [ 18.238329] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.238864] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.238975] ================================================================== [ 18.343440] ================================================================== [ 18.343483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.343529] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.343581] [ 18.343612] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.343694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.343723] Hardware name: linux,dummy-virt (DT) [ 18.343756] Call trace: [ 18.343778] show_stack+0x20/0x38 (C) [ 18.343829] dump_stack_lvl+0x8c/0xd0 [ 18.343981] print_report+0x118/0x5d0 [ 18.344541] kasan_report+0xdc/0x128 [ 18.344707] __asan_report_load8_noabort+0x20/0x30 [ 18.345136] kasan_atomics_helper+0x3f04/0x4858 [ 18.345233] kasan_atomics+0x198/0x2e0 [ 18.345307] kunit_try_run_case+0x170/0x3f0 [ 18.346559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.346658] kthread+0x328/0x630 [ 18.346745] ret_from_fork+0x10/0x20 [ 18.346931] [ 18.347111] Allocated by task 265: [ 18.347184] kasan_save_stack+0x3c/0x68 [ 18.347239] kasan_save_track+0x20/0x40 [ 18.347281] kasan_save_alloc_info+0x40/0x58 [ 18.347505] __kasan_kmalloc+0xd4/0xd8 [ 18.347699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.347790] kasan_atomics+0xb8/0x2e0 [ 18.348102] kunit_try_run_case+0x170/0x3f0 [ 18.348240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.348336] kthread+0x328/0x630 [ 18.348708] ret_from_fork+0x10/0x20 [ 18.348748] [ 18.349131] The buggy address belongs to the object at fff00000c3f8b900 [ 18.349131] which belongs to the cache kmalloc-64 of size 64 [ 18.349531] The buggy address is located 0 bytes to the right of [ 18.349531] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.349627] [ 18.349651] The buggy address belongs to the physical page: [ 18.349755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.350018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.350260] page_type: f5(slab) [ 18.350511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.350577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.351127] page dumped because: kasan: bad access detected [ 18.351180] [ 18.351451] Memory state around the buggy address: [ 18.351646] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.351899] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.352220] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.352436] ^ [ 18.352664] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.352842] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.352952] ================================================================== [ 18.193102] ================================================================== [ 18.193155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.193210] Read of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.193641] [ 18.193872] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.194422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.194757] Hardware name: linux,dummy-virt (DT) [ 18.194884] Call trace: [ 18.194928] show_stack+0x20/0x38 (C) [ 18.195506] dump_stack_lvl+0x8c/0xd0 [ 18.195675] print_report+0x118/0x5d0 [ 18.195915] kasan_report+0xdc/0x128 [ 18.196087] __asan_report_load4_noabort+0x20/0x30 [ 18.196212] kasan_atomics_helper+0x3e04/0x4858 [ 18.196478] kasan_atomics+0x198/0x2e0 [ 18.196716] kunit_try_run_case+0x170/0x3f0 [ 18.196796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.197163] kthread+0x328/0x630 [ 18.197347] ret_from_fork+0x10/0x20 [ 18.197812] [ 18.198133] Allocated by task 265: [ 18.198200] kasan_save_stack+0x3c/0x68 [ 18.198250] kasan_save_track+0x20/0x40 [ 18.198310] kasan_save_alloc_info+0x40/0x58 [ 18.198634] __kasan_kmalloc+0xd4/0xd8 [ 18.198726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.199146] kasan_atomics+0xb8/0x2e0 [ 18.199286] kunit_try_run_case+0x170/0x3f0 [ 18.199784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.199860] kthread+0x328/0x630 [ 18.200017] ret_from_fork+0x10/0x20 [ 18.200100] [ 18.200143] The buggy address belongs to the object at fff00000c3f8b900 [ 18.200143] which belongs to the cache kmalloc-64 of size 64 [ 18.200209] The buggy address is located 0 bytes to the right of [ 18.200209] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.200290] [ 18.200313] The buggy address belongs to the physical page: [ 18.200347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.200405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.200460] page_type: f5(slab) [ 18.200501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.200556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.200609] page dumped because: kasan: bad access detected [ 18.200654] [ 18.200683] Memory state around the buggy address: [ 18.200728] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.200774] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.200820] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.200890] ^ [ 18.200957] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.201846] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.201927] ================================================================== [ 18.431350] ================================================================== [ 18.431666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.431764] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.431834] [ 18.431943] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.432033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.432063] Hardware name: linux,dummy-virt (DT) [ 18.432095] Call trace: [ 18.432119] show_stack+0x20/0x38 (C) [ 18.432168] dump_stack_lvl+0x8c/0xd0 [ 18.432216] print_report+0x118/0x5d0 [ 18.432264] kasan_report+0xdc/0x128 [ 18.432312] kasan_check_range+0x100/0x1a8 [ 18.432375] __kasan_check_write+0x20/0x30 [ 18.432422] kasan_atomics_helper+0x175c/0x4858 [ 18.432472] kasan_atomics+0x198/0x2e0 [ 18.432518] kunit_try_run_case+0x170/0x3f0 [ 18.432567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.432621] kthread+0x328/0x630 [ 18.432663] ret_from_fork+0x10/0x20 [ 18.432712] [ 18.432732] Allocated by task 265: [ 18.432763] kasan_save_stack+0x3c/0x68 [ 18.432806] kasan_save_track+0x20/0x40 [ 18.432873] kasan_save_alloc_info+0x40/0x58 [ 18.432916] __kasan_kmalloc+0xd4/0xd8 [ 18.432956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.433004] kasan_atomics+0xb8/0x2e0 [ 18.433044] kunit_try_run_case+0x170/0x3f0 [ 18.433083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.433130] kthread+0x328/0x630 [ 18.433173] ret_from_fork+0x10/0x20 [ 18.433212] [ 18.433233] The buggy address belongs to the object at fff00000c3f8b900 [ 18.433233] which belongs to the cache kmalloc-64 of size 64 [ 18.433294] The buggy address is located 0 bytes to the right of [ 18.433294] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.433364] [ 18.433386] The buggy address belongs to the physical page: [ 18.433418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.433473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.433523] page_type: f5(slab) [ 18.433572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.433627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.433681] page dumped because: kasan: bad access detected [ 18.433717] [ 18.433739] Memory state around the buggy address: [ 18.433773] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.433825] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.433881] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.434111] ^ [ 18.434172] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.434380] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.435252] ================================================================== [ 18.407877] ================================================================== [ 18.407944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.407998] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.408052] [ 18.408092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.408388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.408443] Hardware name: linux,dummy-virt (DT) [ 18.408476] Call trace: [ 18.408502] show_stack+0x20/0x38 (C) [ 18.408929] dump_stack_lvl+0x8c/0xd0 [ 18.409268] print_report+0x118/0x5d0 [ 18.409483] kasan_report+0xdc/0x128 [ 18.409537] __asan_report_load8_noabort+0x20/0x30 [ 18.409592] kasan_atomics_helper+0x3df4/0x4858 [ 18.409644] kasan_atomics+0x198/0x2e0 [ 18.409692] kunit_try_run_case+0x170/0x3f0 [ 18.410016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.410170] kthread+0x328/0x630 [ 18.410250] ret_from_fork+0x10/0x20 [ 18.410328] [ 18.410386] Allocated by task 265: [ 18.410693] kasan_save_stack+0x3c/0x68 [ 18.411043] kasan_save_track+0x20/0x40 [ 18.411175] kasan_save_alloc_info+0x40/0x58 [ 18.411258] __kasan_kmalloc+0xd4/0xd8 [ 18.411383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.411471] kasan_atomics+0xb8/0x2e0 [ 18.411577] kunit_try_run_case+0x170/0x3f0 [ 18.411665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.412016] kthread+0x328/0x630 [ 18.412086] ret_from_fork+0x10/0x20 [ 18.412208] [ 18.412286] The buggy address belongs to the object at fff00000c3f8b900 [ 18.412286] which belongs to the cache kmalloc-64 of size 64 [ 18.412667] The buggy address is located 0 bytes to the right of [ 18.412667] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.412836] [ 18.412904] The buggy address belongs to the physical page: [ 18.412977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.413166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.413309] page_type: f5(slab) [ 18.413395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.413465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.413513] page dumped because: kasan: bad access detected [ 18.413547] [ 18.413901] Memory state around the buggy address: [ 18.414295] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.414660] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.414752] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.414942] ^ [ 18.415047] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.415376] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.415427] ================================================================== [ 18.258034] ================================================================== [ 18.258164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.258222] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.258276] [ 18.258363] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.258461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.258504] Hardware name: linux,dummy-virt (DT) [ 18.258538] Call trace: [ 18.258907] show_stack+0x20/0x38 (C) [ 18.259123] dump_stack_lvl+0x8c/0xd0 [ 18.259218] print_report+0x118/0x5d0 [ 18.259661] kasan_report+0xdc/0x128 [ 18.259752] kasan_check_range+0x100/0x1a8 [ 18.260118] __kasan_check_write+0x20/0x30 [ 18.260318] kasan_atomics_helper+0xf88/0x4858 [ 18.260505] kasan_atomics+0x198/0x2e0 [ 18.260612] kunit_try_run_case+0x170/0x3f0 [ 18.260664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.260964] kthread+0x328/0x630 [ 18.261154] ret_from_fork+0x10/0x20 [ 18.261667] [ 18.261847] Allocated by task 265: [ 18.261916] kasan_save_stack+0x3c/0x68 [ 18.262290] kasan_save_track+0x20/0x40 [ 18.262546] kasan_save_alloc_info+0x40/0x58 [ 18.262649] __kasan_kmalloc+0xd4/0xd8 [ 18.262885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.262978] kasan_atomics+0xb8/0x2e0 [ 18.263306] kunit_try_run_case+0x170/0x3f0 [ 18.263356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.263403] kthread+0x328/0x630 [ 18.263439] ret_from_fork+0x10/0x20 [ 18.263687] [ 18.264090] The buggy address belongs to the object at fff00000c3f8b900 [ 18.264090] which belongs to the cache kmalloc-64 of size 64 [ 18.264332] The buggy address is located 0 bytes to the right of [ 18.264332] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.264758] [ 18.265009] The buggy address belongs to the physical page: [ 18.265058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.265119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.265203] page_type: f5(slab) [ 18.265246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.265301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.265347] page dumped because: kasan: bad access detected [ 18.265383] [ 18.265411] Memory state around the buggy address: [ 18.265446] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.265503] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.265559] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.265601] ^ [ 18.265650] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.265696] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.265736] ================================================================== [ 18.401888] ================================================================== [ 18.402247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.402531] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.402628] [ 18.402830] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.403022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.403100] Hardware name: linux,dummy-virt (DT) [ 18.403152] Call trace: [ 18.403178] show_stack+0x20/0x38 (C) [ 18.403583] dump_stack_lvl+0x8c/0xd0 [ 18.403681] print_report+0x118/0x5d0 [ 18.403758] kasan_report+0xdc/0x128 [ 18.404126] kasan_check_range+0x100/0x1a8 [ 18.404318] __kasan_check_write+0x20/0x30 [ 18.404593] kasan_atomics_helper+0x1644/0x4858 [ 18.404817] kasan_atomics+0x198/0x2e0 [ 18.404930] kunit_try_run_case+0x170/0x3f0 [ 18.405027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.405088] kthread+0x328/0x630 [ 18.405136] ret_from_fork+0x10/0x20 [ 18.405191] [ 18.405218] Allocated by task 265: [ 18.405250] kasan_save_stack+0x3c/0x68 [ 18.405294] kasan_save_track+0x20/0x40 [ 18.405345] kasan_save_alloc_info+0x40/0x58 [ 18.405386] __kasan_kmalloc+0xd4/0xd8 [ 18.405435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.405481] kasan_atomics+0xb8/0x2e0 [ 18.405526] kunit_try_run_case+0x170/0x3f0 [ 18.405567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.405614] kthread+0x328/0x630 [ 18.405649] ret_from_fork+0x10/0x20 [ 18.405686] [ 18.405708] The buggy address belongs to the object at fff00000c3f8b900 [ 18.405708] which belongs to the cache kmalloc-64 of size 64 [ 18.405780] The buggy address is located 0 bytes to the right of [ 18.405780] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.405870] [ 18.405895] The buggy address belongs to the physical page: [ 18.405937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.405993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.406044] page_type: f5(slab) [ 18.406090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.406151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.406197] page dumped because: kasan: bad access detected [ 18.406232] [ 18.406263] Memory state around the buggy address: [ 18.406297] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.406344] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.406392] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.406433] ^ [ 18.406475] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.406522] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.406564] ================================================================== [ 18.285704] ================================================================== [ 18.285837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.285955] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.286321] [ 18.286571] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.286991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.287129] Hardware name: linux,dummy-virt (DT) [ 18.287227] Call trace: [ 18.287350] show_stack+0x20/0x38 (C) [ 18.287423] dump_stack_lvl+0x8c/0xd0 [ 18.287607] print_report+0x118/0x5d0 [ 18.287665] kasan_report+0xdc/0x128 [ 18.287721] kasan_check_range+0x100/0x1a8 [ 18.288010] __kasan_check_write+0x20/0x30 [ 18.288118] kasan_atomics_helper+0x10c0/0x4858 [ 18.288453] kasan_atomics+0x198/0x2e0 [ 18.288657] kunit_try_run_case+0x170/0x3f0 [ 18.288828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.288915] kthread+0x328/0x630 [ 18.288992] ret_from_fork+0x10/0x20 [ 18.289364] [ 18.289750] Allocated by task 265: [ 18.289822] kasan_save_stack+0x3c/0x68 [ 18.289985] kasan_save_track+0x20/0x40 [ 18.290049] kasan_save_alloc_info+0x40/0x58 [ 18.290100] __kasan_kmalloc+0xd4/0xd8 [ 18.290138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.290180] kasan_atomics+0xb8/0x2e0 [ 18.290218] kunit_try_run_case+0x170/0x3f0 [ 18.290259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.290304] kthread+0x328/0x630 [ 18.290383] ret_from_fork+0x10/0x20 [ 18.290425] [ 18.290453] The buggy address belongs to the object at fff00000c3f8b900 [ 18.290453] which belongs to the cache kmalloc-64 of size 64 [ 18.290517] The buggy address is located 0 bytes to the right of [ 18.290517] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.290899] [ 18.290925] The buggy address belongs to the physical page: [ 18.291881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.291957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.292481] page_type: f5(slab) [ 18.292583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.292862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.293355] page dumped because: kasan: bad access detected [ 18.293439] [ 18.293699] Memory state around the buggy address: [ 18.293778] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.294287] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.294606] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.294776] ^ [ 18.294917] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.294980] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.295036] ================================================================== [ 18.301397] ================================================================== [ 18.301450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.301500] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.301554] [ 18.301584] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.301668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.301696] Hardware name: linux,dummy-virt (DT) [ 18.301730] Call trace: [ 18.301789] show_stack+0x20/0x38 (C) [ 18.301844] dump_stack_lvl+0x8c/0xd0 [ 18.302880] print_report+0x118/0x5d0 [ 18.302936] kasan_report+0xdc/0x128 [ 18.303547] kasan_check_range+0x100/0x1a8 [ 18.303836] __kasan_check_write+0x20/0x30 [ 18.303932] kasan_atomics_helper+0x1190/0x4858 [ 18.304040] kasan_atomics+0x198/0x2e0 [ 18.304107] kunit_try_run_case+0x170/0x3f0 [ 18.304212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.304378] kthread+0x328/0x630 [ 18.304846] ret_from_fork+0x10/0x20 [ 18.304969] [ 18.305064] Allocated by task 265: [ 18.305143] kasan_save_stack+0x3c/0x68 [ 18.305274] kasan_save_track+0x20/0x40 [ 18.305341] kasan_save_alloc_info+0x40/0x58 [ 18.305478] __kasan_kmalloc+0xd4/0xd8 [ 18.305519] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.305883] kasan_atomics+0xb8/0x2e0 [ 18.306288] kunit_try_run_case+0x170/0x3f0 [ 18.306390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.306473] kthread+0x328/0x630 [ 18.306541] ret_from_fork+0x10/0x20 [ 18.306596] [ 18.306890] The buggy address belongs to the object at fff00000c3f8b900 [ 18.306890] which belongs to the cache kmalloc-64 of size 64 [ 18.306971] The buggy address is located 0 bytes to the right of [ 18.306971] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.307088] [ 18.307345] The buggy address belongs to the physical page: [ 18.307397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.307482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.307560] page_type: f5(slab) [ 18.307827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.308006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.308566] page dumped because: kasan: bad access detected [ 18.308619] [ 18.308674] Memory state around the buggy address: [ 18.308734] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.308930] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.309212] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.309411] ^ [ 18.309648] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.309970] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.310344] ================================================================== [ 18.265976] ================================================================== [ 18.266027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.266088] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.266141] [ 18.266170] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.266263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.266291] Hardware name: linux,dummy-virt (DT) [ 18.266324] Call trace: [ 18.266347] show_stack+0x20/0x38 (C) [ 18.266397] dump_stack_lvl+0x8c/0xd0 [ 18.266449] print_report+0x118/0x5d0 [ 18.266504] kasan_report+0xdc/0x128 [ 18.266551] kasan_check_range+0x100/0x1a8 [ 18.266629] __kasan_check_write+0x20/0x30 [ 18.267310] kasan_atomics_helper+0xff0/0x4858 [ 18.267756] kasan_atomics+0x198/0x2e0 [ 18.267834] kunit_try_run_case+0x170/0x3f0 [ 18.267932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.268222] kthread+0x328/0x630 [ 18.268363] ret_from_fork+0x10/0x20 [ 18.268784] [ 18.268819] Allocated by task 265: [ 18.268870] kasan_save_stack+0x3c/0x68 [ 18.269192] kasan_save_track+0x20/0x40 [ 18.269553] kasan_save_alloc_info+0x40/0x58 [ 18.269734] __kasan_kmalloc+0xd4/0xd8 [ 18.269812] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.269934] kasan_atomics+0xb8/0x2e0 [ 18.270021] kunit_try_run_case+0x170/0x3f0 [ 18.270189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.270250] kthread+0x328/0x630 [ 18.270464] ret_from_fork+0x10/0x20 [ 18.270690] [ 18.270977] The buggy address belongs to the object at fff00000c3f8b900 [ 18.270977] which belongs to the cache kmalloc-64 of size 64 [ 18.271181] The buggy address is located 0 bytes to the right of [ 18.271181] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.271601] [ 18.271640] The buggy address belongs to the physical page: [ 18.271818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.272036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.272095] page_type: f5(slab) [ 18.272301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.272541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.272916] page dumped because: kasan: bad access detected [ 18.272994] [ 18.273174] Memory state around the buggy address: [ 18.273307] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.273551] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.273916] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.274007] ^ [ 18.274440] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.274520] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.274562] ================================================================== [ 18.320987] ================================================================== [ 18.321079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.321132] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.321526] [ 18.321686] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.321786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.321896] Hardware name: linux,dummy-virt (DT) [ 18.321931] Call trace: [ 18.321957] show_stack+0x20/0x38 (C) [ 18.322136] dump_stack_lvl+0x8c/0xd0 [ 18.322475] print_report+0x118/0x5d0 [ 18.322656] kasan_report+0xdc/0x128 [ 18.322866] kasan_check_range+0x100/0x1a8 [ 18.323010] __kasan_check_write+0x20/0x30 [ 18.323061] kasan_atomics_helper+0x126c/0x4858 [ 18.323111] kasan_atomics+0x198/0x2e0 [ 18.323157] kunit_try_run_case+0x170/0x3f0 [ 18.323206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.323261] kthread+0x328/0x630 [ 18.323304] ret_from_fork+0x10/0x20 [ 18.323352] [ 18.323373] Allocated by task 265: [ 18.323404] kasan_save_stack+0x3c/0x68 [ 18.323446] kasan_save_track+0x20/0x40 [ 18.323885] kasan_save_alloc_info+0x40/0x58 [ 18.324345] __kasan_kmalloc+0xd4/0xd8 [ 18.324450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.324494] kasan_atomics+0xb8/0x2e0 [ 18.324534] kunit_try_run_case+0x170/0x3f0 [ 18.324575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.324626] kthread+0x328/0x630 [ 18.324669] ret_from_fork+0x10/0x20 [ 18.324707] [ 18.324747] The buggy address belongs to the object at fff00000c3f8b900 [ 18.324747] which belongs to the cache kmalloc-64 of size 64 [ 18.324813] The buggy address is located 0 bytes to the right of [ 18.324813] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.324892] [ 18.324930] The buggy address belongs to the physical page: [ 18.324973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.325029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.325088] page_type: f5(slab) [ 18.325128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.325204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.325260] page dumped because: kasan: bad access detected [ 18.325302] [ 18.325323] Memory state around the buggy address: [ 18.325357] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.325405] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.325487] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.325532] ^ [ 18.325569] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.325619] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.325665] ================================================================== [ 18.326716] ================================================================== [ 18.326772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.327298] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.327361] [ 18.327569] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.328179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.328231] Hardware name: linux,dummy-virt (DT) [ 18.328412] Call trace: [ 18.328574] show_stack+0x20/0x38 (C) [ 18.329047] dump_stack_lvl+0x8c/0xd0 [ 18.329248] print_report+0x118/0x5d0 [ 18.329307] kasan_report+0xdc/0x128 [ 18.329374] kasan_check_range+0x100/0x1a8 [ 18.329672] __kasan_check_write+0x20/0x30 [ 18.329782] kasan_atomics_helper+0x12d8/0x4858 [ 18.330207] kasan_atomics+0x198/0x2e0 [ 18.330374] kunit_try_run_case+0x170/0x3f0 [ 18.330514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.330575] kthread+0x328/0x630 [ 18.331003] ret_from_fork+0x10/0x20 [ 18.331421] [ 18.331479] Allocated by task 265: [ 18.331533] kasan_save_stack+0x3c/0x68 [ 18.331703] kasan_save_track+0x20/0x40 [ 18.331780] kasan_save_alloc_info+0x40/0x58 [ 18.331997] __kasan_kmalloc+0xd4/0xd8 [ 18.332206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.332288] kasan_atomics+0xb8/0x2e0 [ 18.332806] kunit_try_run_case+0x170/0x3f0 [ 18.332920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.333270] kthread+0x328/0x630 [ 18.333324] ret_from_fork+0x10/0x20 [ 18.333737] [ 18.334186] The buggy address belongs to the object at fff00000c3f8b900 [ 18.334186] which belongs to the cache kmalloc-64 of size 64 [ 18.334403] The buggy address is located 0 bytes to the right of [ 18.334403] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.334953] [ 18.335057] The buggy address belongs to the physical page: [ 18.335131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.335197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.335251] page_type: f5(slab) [ 18.335755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.336119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.336222] page dumped because: kasan: bad access detected [ 18.336328] [ 18.336351] Memory state around the buggy address: [ 18.336816] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.337128] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.337281] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.337676] ^ [ 18.338118] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.338215] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.338462] ================================================================== [ 18.354114] ================================================================== [ 18.354207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.354578] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.354699] [ 18.354812] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.355260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.355325] Hardware name: linux,dummy-virt (DT) [ 18.355406] Call trace: [ 18.355501] show_stack+0x20/0x38 (C) [ 18.355592] dump_stack_lvl+0x8c/0xd0 [ 18.355644] print_report+0x118/0x5d0 [ 18.355700] kasan_report+0xdc/0x128 [ 18.356035] kasan_check_range+0x100/0x1a8 [ 18.356395] __kasan_check_write+0x20/0x30 [ 18.356527] kasan_atomics_helper+0x1414/0x4858 [ 18.356626] kasan_atomics+0x198/0x2e0 [ 18.356747] kunit_try_run_case+0x170/0x3f0 [ 18.356866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.357011] kthread+0x328/0x630 [ 18.357062] ret_from_fork+0x10/0x20 [ 18.357393] [ 18.357450] Allocated by task 265: [ 18.357607] kasan_save_stack+0x3c/0x68 [ 18.357780] kasan_save_track+0x20/0x40 [ 18.357923] kasan_save_alloc_info+0x40/0x58 [ 18.358057] __kasan_kmalloc+0xd4/0xd8 [ 18.358167] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.358288] kasan_atomics+0xb8/0x2e0 [ 18.358331] kunit_try_run_case+0x170/0x3f0 [ 18.358407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.358755] kthread+0x328/0x630 [ 18.358819] ret_from_fork+0x10/0x20 [ 18.358994] [ 18.359029] The buggy address belongs to the object at fff00000c3f8b900 [ 18.359029] which belongs to the cache kmalloc-64 of size 64 [ 18.359303] The buggy address is located 0 bytes to the right of [ 18.359303] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.359758] [ 18.359801] The buggy address belongs to the physical page: [ 18.359871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.360288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.360406] page_type: f5(slab) [ 18.360482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.360789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.360886] page dumped because: kasan: bad access detected [ 18.361030] [ 18.361091] Memory state around the buggy address: [ 18.361153] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.361202] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.361473] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.361607] ^ [ 18.361971] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.362089] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.362173] ================================================================== [ 18.363431] ================================================================== [ 18.363496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.363550] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.363604] [ 18.363639] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.363723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.363751] Hardware name: linux,dummy-virt (DT) [ 18.363785] Call trace: [ 18.363867] show_stack+0x20/0x38 (C) [ 18.363926] dump_stack_lvl+0x8c/0xd0 [ 18.363976] print_report+0x118/0x5d0 [ 18.364032] kasan_report+0xdc/0x128 [ 18.364081] kasan_check_range+0x100/0x1a8 [ 18.364138] __kasan_check_write+0x20/0x30 [ 18.364186] kasan_atomics_helper+0x147c/0x4858 [ 18.364237] kasan_atomics+0x198/0x2e0 [ 18.364284] kunit_try_run_case+0x170/0x3f0 [ 18.364333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.364393] kthread+0x328/0x630 [ 18.364436] ret_from_fork+0x10/0x20 [ 18.364489] [ 18.364511] Allocated by task 265: [ 18.364545] kasan_save_stack+0x3c/0x68 [ 18.364590] kasan_save_track+0x20/0x40 [ 18.364635] kasan_save_alloc_info+0x40/0x58 [ 18.364678] __kasan_kmalloc+0xd4/0xd8 [ 18.364716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.364758] kasan_atomics+0xb8/0x2e0 [ 18.364801] kunit_try_run_case+0x170/0x3f0 [ 18.364842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.365549] kthread+0x328/0x630 [ 18.365842] ret_from_fork+0x10/0x20 [ 18.365917] [ 18.365964] The buggy address belongs to the object at fff00000c3f8b900 [ 18.365964] which belongs to the cache kmalloc-64 of size 64 [ 18.366263] The buggy address is located 0 bytes to the right of [ 18.366263] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.366409] [ 18.366441] The buggy address belongs to the physical page: [ 18.366477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.366814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.366923] page_type: f5(slab) [ 18.366979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.367392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.367494] page dumped because: kasan: bad access detected [ 18.367596] [ 18.367732] Memory state around the buggy address: [ 18.367925] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.368070] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.368148] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.368516] ^ [ 18.368672] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.368768] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.369041] ================================================================== [ 18.424071] ================================================================== [ 18.424139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.424192] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.424253] [ 18.424286] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.424370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.424398] Hardware name: linux,dummy-virt (DT) [ 18.424431] Call trace: [ 18.424453] show_stack+0x20/0x38 (C) [ 18.424504] dump_stack_lvl+0x8c/0xd0 [ 18.424551] print_report+0x118/0x5d0 [ 18.424601] kasan_report+0xdc/0x128 [ 18.425194] __asan_report_load8_noabort+0x20/0x30 [ 18.425468] kasan_atomics_helper+0x3e10/0x4858 [ 18.425623] kasan_atomics+0x198/0x2e0 [ 18.425928] kunit_try_run_case+0x170/0x3f0 [ 18.426091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.426162] kthread+0x328/0x630 [ 18.426206] ret_from_fork+0x10/0x20 [ 18.426274] [ 18.426324] Allocated by task 265: [ 18.426383] kasan_save_stack+0x3c/0x68 [ 18.426753] kasan_save_track+0x20/0x40 [ 18.426893] kasan_save_alloc_info+0x40/0x58 [ 18.426969] __kasan_kmalloc+0xd4/0xd8 [ 18.427308] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.427392] kasan_atomics+0xb8/0x2e0 [ 18.427466] kunit_try_run_case+0x170/0x3f0 [ 18.427609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.427696] kthread+0x328/0x630 [ 18.428002] ret_from_fork+0x10/0x20 [ 18.428062] [ 18.428084] The buggy address belongs to the object at fff00000c3f8b900 [ 18.428084] which belongs to the cache kmalloc-64 of size 64 [ 18.428147] The buggy address is located 0 bytes to the right of [ 18.428147] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.428217] [ 18.428239] The buggy address belongs to the physical page: [ 18.428272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.428442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.428610] page_type: f5(slab) [ 18.428685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.429035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.429119] page dumped because: kasan: bad access detected [ 18.429176] [ 18.429198] Memory state around the buggy address: [ 18.429235] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.429586] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.429689] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.430009] ^ [ 18.430091] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.430455] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.430525] ================================================================== [ 18.184159] ================================================================== [ 18.184213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.184266] Write of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.184319] [ 18.184760] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.184930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.184979] Hardware name: linux,dummy-virt (DT) [ 18.185014] Call trace: [ 18.185039] show_stack+0x20/0x38 (C) [ 18.185375] dump_stack_lvl+0x8c/0xd0 [ 18.185726] print_report+0x118/0x5d0 [ 18.185802] kasan_report+0xdc/0x128 [ 18.185864] kasan_check_range+0x100/0x1a8 [ 18.185956] __kasan_check_write+0x20/0x30 [ 18.186012] kasan_atomics_helper+0xd3c/0x4858 [ 18.186063] kasan_atomics+0x198/0x2e0 [ 18.186180] kunit_try_run_case+0x170/0x3f0 [ 18.186231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.186288] kthread+0x328/0x630 [ 18.186511] ret_from_fork+0x10/0x20 [ 18.186749] [ 18.187078] Allocated by task 265: [ 18.187183] kasan_save_stack+0x3c/0x68 [ 18.187280] kasan_save_track+0x20/0x40 [ 18.187459] kasan_save_alloc_info+0x40/0x58 [ 18.187507] __kasan_kmalloc+0xd4/0xd8 [ 18.187942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.188032] kasan_atomics+0xb8/0x2e0 [ 18.188094] kunit_try_run_case+0x170/0x3f0 [ 18.188434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.188501] kthread+0x328/0x630 [ 18.189131] ret_from_fork+0x10/0x20 [ 18.189378] [ 18.189496] The buggy address belongs to the object at fff00000c3f8b900 [ 18.189496] which belongs to the cache kmalloc-64 of size 64 [ 18.189705] The buggy address is located 0 bytes to the right of [ 18.189705] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.190135] [ 18.190198] The buggy address belongs to the physical page: [ 18.190279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.190521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.190940] page_type: f5(slab) [ 18.191011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.191260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.191423] page dumped because: kasan: bad access detected [ 18.191556] [ 18.191794] Memory state around the buggy address: [ 18.191838] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.192163] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.192344] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.192484] ^ [ 18.192553] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.192610] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.192652] ================================================================== [ 18.085102] ================================================================== [ 18.085163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 18.085214] Read of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.085267] [ 18.085296] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.085378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.085636] Hardware name: linux,dummy-virt (DT) [ 18.085737] Call trace: [ 18.085764] show_stack+0x20/0x38 (C) [ 18.086024] dump_stack_lvl+0x8c/0xd0 [ 18.086078] print_report+0x118/0x5d0 [ 18.086577] kasan_atomics_helper+0x42d8/0x4858 [ 18.087580] kasan_save_track+0x20/0x40 [ 18.087628] kasan_save_alloc_info+0x40/0x58 [ 18.088210] kunit_try_run_case+0x170/0x3f0 [ 18.088831] The buggy address is located 0 bytes to the right of [ 18.088831] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.091089] ================================================================== [ 18.379696] ================================================================== [ 18.379919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.379993] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.380048] [ 18.380091] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.380177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.380220] Hardware name: linux,dummy-virt (DT) [ 18.380263] Call trace: [ 18.380287] show_stack+0x20/0x38 (C) [ 18.380339] dump_stack_lvl+0x8c/0xd0 [ 18.380393] print_report+0x118/0x5d0 [ 18.380442] kasan_report+0xdc/0x128 [ 18.380496] kasan_check_range+0x100/0x1a8 [ 18.380546] __kasan_check_write+0x20/0x30 [ 18.380597] kasan_atomics_helper+0x154c/0x4858 [ 18.380647] kasan_atomics+0x198/0x2e0 [ 18.380695] kunit_try_run_case+0x170/0x3f0 [ 18.380744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.380800] kthread+0x328/0x630 [ 18.380842] ret_from_fork+0x10/0x20 [ 18.380902] [ 18.380924] Allocated by task 265: [ 18.380953] kasan_save_stack+0x3c/0x68 [ 18.380997] kasan_save_track+0x20/0x40 [ 18.381036] kasan_save_alloc_info+0x40/0x58 [ 18.381079] __kasan_kmalloc+0xd4/0xd8 [ 18.381127] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.381177] kasan_atomics+0xb8/0x2e0 [ 18.381215] kunit_try_run_case+0x170/0x3f0 [ 18.381256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.381301] kthread+0x328/0x630 [ 18.381344] ret_from_fork+0x10/0x20 [ 18.381384] [ 18.381416] The buggy address belongs to the object at fff00000c3f8b900 [ 18.381416] which belongs to the cache kmalloc-64 of size 64 [ 18.381480] The buggy address is located 0 bytes to the right of [ 18.381480] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.381557] [ 18.381587] The buggy address belongs to the physical page: [ 18.381623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.381678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.381728] page_type: f5(slab) [ 18.381768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.381823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.381877] page dumped because: kasan: bad access detected [ 18.381911] [ 18.382876] Memory state around the buggy address: [ 18.382946] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.383030] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.383098] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.383158] ^ [ 18.383217] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.383287] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.383375] ================================================================== [ 18.369903] ================================================================== [ 18.370091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.370176] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.370397] [ 18.370447] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.370535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.370609] Hardware name: linux,dummy-virt (DT) [ 18.370704] Call trace: [ 18.370799] show_stack+0x20/0x38 (C) [ 18.370867] dump_stack_lvl+0x8c/0xd0 [ 18.371109] print_report+0x118/0x5d0 [ 18.371379] kasan_report+0xdc/0x128 [ 18.371487] kasan_check_range+0x100/0x1a8 [ 18.371861] __kasan_check_write+0x20/0x30 [ 18.371997] kasan_atomics_helper+0x14e4/0x4858 [ 18.372107] kasan_atomics+0x198/0x2e0 [ 18.372290] kunit_try_run_case+0x170/0x3f0 [ 18.372345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.372793] kthread+0x328/0x630 [ 18.373201] ret_from_fork+0x10/0x20 [ 18.373389] [ 18.373519] Allocated by task 265: [ 18.373647] kasan_save_stack+0x3c/0x68 [ 18.373716] kasan_save_track+0x20/0x40 [ 18.373797] kasan_save_alloc_info+0x40/0x58 [ 18.374096] __kasan_kmalloc+0xd4/0xd8 [ 18.374452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.374598] kasan_atomics+0xb8/0x2e0 [ 18.374672] kunit_try_run_case+0x170/0x3f0 [ 18.374799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.374889] kthread+0x328/0x630 [ 18.374997] ret_from_fork+0x10/0x20 [ 18.375039] [ 18.375063] The buggy address belongs to the object at fff00000c3f8b900 [ 18.375063] which belongs to the cache kmalloc-64 of size 64 [ 18.375358] The buggy address is located 0 bytes to the right of [ 18.375358] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.375944] [ 18.375985] The buggy address belongs to the physical page: [ 18.376065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.376126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.376491] page_type: f5(slab) [ 18.376892] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.377058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.377234] page dumped because: kasan: bad access detected [ 18.377271] [ 18.377569] Memory state around the buggy address: [ 18.377889] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.377973] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.378136] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.378182] ^ [ 18.378586] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378651] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378816] ================================================================== [ 18.275682] ================================================================== [ 18.275883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.275947] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.276056] [ 18.276092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.276318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.276351] Hardware name: linux,dummy-virt (DT) [ 18.276409] Call trace: [ 18.276466] show_stack+0x20/0x38 (C) [ 18.276520] dump_stack_lvl+0x8c/0xd0 [ 18.276738] print_report+0x118/0x5d0 [ 18.277044] kasan_report+0xdc/0x128 [ 18.277105] kasan_check_range+0x100/0x1a8 [ 18.277280] __kasan_check_write+0x20/0x30 [ 18.277522] kasan_atomics_helper+0x1058/0x4858 [ 18.277592] kasan_atomics+0x198/0x2e0 [ 18.277977] kunit_try_run_case+0x170/0x3f0 [ 18.278242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.278536] kthread+0x328/0x630 [ 18.278645] ret_from_fork+0x10/0x20 [ 18.278840] [ 18.279000] Allocated by task 265: [ 18.279034] kasan_save_stack+0x3c/0x68 [ 18.279080] kasan_save_track+0x20/0x40 [ 18.279295] kasan_save_alloc_info+0x40/0x58 [ 18.279746] __kasan_kmalloc+0xd4/0xd8 [ 18.279998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.280173] kasan_atomics+0xb8/0x2e0 [ 18.280262] kunit_try_run_case+0x170/0x3f0 [ 18.280375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.280424] kthread+0x328/0x630 [ 18.280580] ret_from_fork+0x10/0x20 [ 18.281035] [ 18.281124] The buggy address belongs to the object at fff00000c3f8b900 [ 18.281124] which belongs to the cache kmalloc-64 of size 64 [ 18.281425] The buggy address is located 0 bytes to the right of [ 18.281425] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.281806] [ 18.281971] The buggy address belongs to the physical page: [ 18.282081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.282339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.282583] page_type: f5(slab) [ 18.282645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.283176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.283241] page dumped because: kasan: bad access detected [ 18.283278] [ 18.283525] Memory state around the buggy address: [ 18.283612] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.283696] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.284057] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.284158] ^ [ 18.284200] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.284870] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.284940] ================================================================== [ 18.240180] ================================================================== [ 18.240236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.240290] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.240344] [ 18.240565] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.240767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.240799] Hardware name: linux,dummy-virt (DT) [ 18.240833] Call trace: [ 18.240870] show_stack+0x20/0x38 (C) [ 18.240923] dump_stack_lvl+0x8c/0xd0 [ 18.240970] print_report+0x118/0x5d0 [ 18.241038] kasan_report+0xdc/0x128 [ 18.241085] kasan_check_range+0x100/0x1a8 [ 18.241135] __kasan_check_write+0x20/0x30 [ 18.241182] kasan_atomics_helper+0xeb8/0x4858 [ 18.241240] kasan_atomics+0x198/0x2e0 [ 18.241291] kunit_try_run_case+0x170/0x3f0 [ 18.241343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.241398] kthread+0x328/0x630 [ 18.241442] ret_from_fork+0x10/0x20 [ 18.241490] [ 18.241511] Allocated by task 265: [ 18.241544] kasan_save_stack+0x3c/0x68 [ 18.241590] kasan_save_track+0x20/0x40 [ 18.241633] kasan_save_alloc_info+0x40/0x58 [ 18.241674] __kasan_kmalloc+0xd4/0xd8 [ 18.241726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.241771] kasan_atomics+0xb8/0x2e0 [ 18.241809] kunit_try_run_case+0x170/0x3f0 [ 18.242019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.242204] kthread+0x328/0x630 [ 18.242410] ret_from_fork+0x10/0x20 [ 18.242926] [ 18.243256] The buggy address belongs to the object at fff00000c3f8b900 [ 18.243256] which belongs to the cache kmalloc-64 of size 64 [ 18.243332] The buggy address is located 0 bytes to the right of [ 18.243332] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.243403] [ 18.243424] The buggy address belongs to the physical page: [ 18.243458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.244207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.244283] page_type: f5(slab) [ 18.244327] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.244667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.244964] page dumped because: kasan: bad access detected [ 18.245253] [ 18.245669] Memory state around the buggy address: [ 18.245765] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.246219] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.246342] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.246597] ^ [ 18.246787] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.246843] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.246896] ================================================================== [ 18.416190] ================================================================== [ 18.416402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.416493] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.416559] [ 18.416641] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.416731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.416759] Hardware name: linux,dummy-virt (DT) [ 18.416808] Call trace: [ 18.416833] show_stack+0x20/0x38 (C) [ 18.416895] dump_stack_lvl+0x8c/0xd0 [ 18.416942] print_report+0x118/0x5d0 [ 18.417241] kasan_report+0xdc/0x128 [ 18.417583] kasan_check_range+0x100/0x1a8 [ 18.417656] __kasan_check_write+0x20/0x30 [ 18.417713] kasan_atomics_helper+0x16d0/0x4858 [ 18.418220] kasan_atomics+0x198/0x2e0 [ 18.418305] kunit_try_run_case+0x170/0x3f0 [ 18.418357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.418478] kthread+0x328/0x630 [ 18.418549] ret_from_fork+0x10/0x20 [ 18.418715] [ 18.418743] Allocated by task 265: [ 18.418773] kasan_save_stack+0x3c/0x68 [ 18.418843] kasan_save_track+0x20/0x40 [ 18.418894] kasan_save_alloc_info+0x40/0x58 [ 18.419237] __kasan_kmalloc+0xd4/0xd8 [ 18.419457] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.419613] kasan_atomics+0xb8/0x2e0 [ 18.419696] kunit_try_run_case+0x170/0x3f0 [ 18.419813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.419889] kthread+0x328/0x630 [ 18.419979] ret_from_fork+0x10/0x20 [ 18.420125] [ 18.420185] The buggy address belongs to the object at fff00000c3f8b900 [ 18.420185] which belongs to the cache kmalloc-64 of size 64 [ 18.420434] The buggy address is located 0 bytes to the right of [ 18.420434] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.420636] [ 18.420686] The buggy address belongs to the physical page: [ 18.421012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.421080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.421134] page_type: f5(slab) [ 18.421485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.421830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.421920] page dumped because: kasan: bad access detected [ 18.421975] [ 18.422068] Memory state around the buggy address: [ 18.422177] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.422226] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.422533] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.422675] ^ [ 18.422738] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.423091] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.423369] ================================================================== [ 18.383996] ================================================================== [ 18.384050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.384102] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.384389] [ 18.384865] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.384973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.385018] Hardware name: linux,dummy-virt (DT) [ 18.385053] Call trace: [ 18.385128] show_stack+0x20/0x38 (C) [ 18.385203] dump_stack_lvl+0x8c/0xd0 [ 18.385253] print_report+0x118/0x5d0 [ 18.385318] kasan_report+0xdc/0x128 [ 18.385369] kasan_check_range+0x100/0x1a8 [ 18.385699] __kasan_check_write+0x20/0x30 [ 18.385786] kasan_atomics_helper+0x15b4/0x4858 [ 18.386126] kasan_atomics+0x198/0x2e0 [ 18.386223] kunit_try_run_case+0x170/0x3f0 [ 18.386275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.386330] kthread+0x328/0x630 [ 18.386483] ret_from_fork+0x10/0x20 [ 18.386538] [ 18.386582] Allocated by task 265: [ 18.386612] kasan_save_stack+0x3c/0x68 [ 18.386963] kasan_save_track+0x20/0x40 [ 18.387038] kasan_save_alloc_info+0x40/0x58 [ 18.387450] __kasan_kmalloc+0xd4/0xd8 [ 18.387585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.387664] kasan_atomics+0xb8/0x2e0 [ 18.387815] kunit_try_run_case+0x170/0x3f0 [ 18.388146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.388291] kthread+0x328/0x630 [ 18.388624] ret_from_fork+0x10/0x20 [ 18.388824] [ 18.389151] The buggy address belongs to the object at fff00000c3f8b900 [ 18.389151] which belongs to the cache kmalloc-64 of size 64 [ 18.389722] The buggy address is located 0 bytes to the right of [ 18.389722] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.390088] [ 18.390511] The buggy address belongs to the physical page: [ 18.390595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.390696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.390753] page_type: f5(slab) [ 18.390796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.390870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.390917] page dumped because: kasan: bad access detected [ 18.391230] [ 18.391307] Memory state around the buggy address: [ 18.391635] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.391772] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.391987] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.392175] ^ [ 18.392544] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.392650] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.392726] ================================================================== [ 18.310934] ================================================================== [ 18.311266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.311338] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.311562] [ 18.311730] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.311881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.311917] Hardware name: linux,dummy-virt (DT) [ 18.311996] Call trace: [ 18.312161] show_stack+0x20/0x38 (C) [ 18.312353] dump_stack_lvl+0x8c/0xd0 [ 18.312438] print_report+0x118/0x5d0 [ 18.312491] kasan_report+0xdc/0x128 [ 18.312537] kasan_check_range+0x100/0x1a8 [ 18.312890] __kasan_check_write+0x20/0x30 [ 18.312963] kasan_atomics_helper+0x11f8/0x4858 [ 18.313017] kasan_atomics+0x198/0x2e0 [ 18.313063] kunit_try_run_case+0x170/0x3f0 [ 18.313660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.313746] kthread+0x328/0x630 [ 18.313894] ret_from_fork+0x10/0x20 [ 18.313955] [ 18.313982] Allocated by task 265: [ 18.314066] kasan_save_stack+0x3c/0x68 [ 18.314114] kasan_save_track+0x20/0x40 [ 18.314864] kasan_save_alloc_info+0x40/0x58 [ 18.315017] __kasan_kmalloc+0xd4/0xd8 [ 18.315147] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.315273] kasan_atomics+0xb8/0x2e0 [ 18.315375] kunit_try_run_case+0x170/0x3f0 [ 18.315437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.315605] kthread+0x328/0x630 [ 18.315791] ret_from_fork+0x10/0x20 [ 18.315872] [ 18.316006] The buggy address belongs to the object at fff00000c3f8b900 [ 18.316006] which belongs to the cache kmalloc-64 of size 64 [ 18.316118] The buggy address is located 0 bytes to the right of [ 18.316118] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.316413] [ 18.316511] The buggy address belongs to the physical page: [ 18.316837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.316969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.317066] page_type: f5(slab) [ 18.317369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.317526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.317872] page dumped because: kasan: bad access detected [ 18.318354] [ 18.318402] Memory state around the buggy address: [ 18.318616] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.318993] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.319309] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.319483] ^ [ 18.319578] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.319792] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.320014] ================================================================== [ 18.247907] ================================================================== [ 18.247963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.248016] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.248070] [ 18.248100] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.248626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.248886] Hardware name: linux,dummy-virt (DT) [ 18.248937] Call trace: [ 18.249083] show_stack+0x20/0x38 (C) [ 18.249144] dump_stack_lvl+0x8c/0xd0 [ 18.249191] print_report+0x118/0x5d0 [ 18.249446] kasan_report+0xdc/0x128 [ 18.249816] kasan_check_range+0x100/0x1a8 [ 18.249907] __kasan_check_write+0x20/0x30 [ 18.250159] kasan_atomics_helper+0xf20/0x4858 [ 18.250229] kasan_atomics+0x198/0x2e0 [ 18.250449] kunit_try_run_case+0x170/0x3f0 [ 18.250640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.251178] kthread+0x328/0x630 [ 18.251340] ret_from_fork+0x10/0x20 [ 18.251531] [ 18.251592] Allocated by task 265: [ 18.251624] kasan_save_stack+0x3c/0x68 [ 18.251675] kasan_save_track+0x20/0x40 [ 18.251716] kasan_save_alloc_info+0x40/0x58 [ 18.252090] __kasan_kmalloc+0xd4/0xd8 [ 18.252326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.252421] kasan_atomics+0xb8/0x2e0 [ 18.252642] kunit_try_run_case+0x170/0x3f0 [ 18.252739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.252901] kthread+0x328/0x630 [ 18.252941] ret_from_fork+0x10/0x20 [ 18.253326] [ 18.253573] The buggy address belongs to the object at fff00000c3f8b900 [ 18.253573] which belongs to the cache kmalloc-64 of size 64 [ 18.253884] The buggy address is located 0 bytes to the right of [ 18.253884] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.254171] [ 18.254208] The buggy address belongs to the physical page: [ 18.254382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.254589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.254651] page_type: f5(slab) [ 18.254693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.254750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.254993] page dumped because: kasan: bad access detected [ 18.255343] [ 18.255454] Memory state around the buggy address: [ 18.255609] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255661] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255940] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.256390] ^ [ 18.256606] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.256923] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.257252] ================================================================== [ 18.339688] ================================================================== [ 18.339824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.339894] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.339955] [ 18.340056] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.340146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.340176] Hardware name: linux,dummy-virt (DT) [ 18.340328] Call trace: [ 18.340408] show_stack+0x20/0x38 (C) [ 18.340571] dump_stack_lvl+0x8c/0xd0 [ 18.340633] print_report+0x118/0x5d0 [ 18.340867] kasan_report+0xdc/0x128 [ 18.341040] kasan_check_range+0x100/0x1a8 [ 18.341158] __kasan_check_write+0x20/0x30 [ 18.341231] kasan_atomics_helper+0x1384/0x4858 [ 18.341419] kasan_atomics+0x198/0x2e0 [ 18.341472] kunit_try_run_case+0x170/0x3f0 [ 18.341553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.341875] kthread+0x328/0x630 [ 18.341940] ret_from_fork+0x10/0x20 [ 18.341992] [ 18.342013] Allocated by task 265: [ 18.342044] kasan_save_stack+0x3c/0x68 [ 18.342087] kasan_save_track+0x20/0x40 [ 18.342128] kasan_save_alloc_info+0x40/0x58 [ 18.342169] __kasan_kmalloc+0xd4/0xd8 [ 18.342209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.342249] kasan_atomics+0xb8/0x2e0 [ 18.342287] kunit_try_run_case+0x170/0x3f0 [ 18.342344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.342395] kthread+0x328/0x630 [ 18.342428] ret_from_fork+0x10/0x20 [ 18.342479] [ 18.342512] The buggy address belongs to the object at fff00000c3f8b900 [ 18.342512] which belongs to the cache kmalloc-64 of size 64 [ 18.342584] The buggy address is located 0 bytes to the right of [ 18.342584] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.342656] [ 18.342688] The buggy address belongs to the physical page: [ 18.342722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.342777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.342833] page_type: f5(slab) [ 18.342885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.342941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.342986] page dumped because: kasan: bad access detected [ 18.343020] [ 18.343042] Memory state around the buggy address: [ 18.343085] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.343132] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.343178] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.343220] ^ [ 18.343265] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.343310] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.343351] ================================================================== [ 18.444431] ================================================================== [ 18.444515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.444887] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.444971] [ 18.445006] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.445191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.445227] Hardware name: linux,dummy-virt (DT) [ 18.445297] Call trace: [ 18.445323] show_stack+0x20/0x38 (C) [ 18.445385] dump_stack_lvl+0x8c/0xd0 [ 18.445431] print_report+0x118/0x5d0 [ 18.445479] kasan_report+0xdc/0x128 [ 18.445525] kasan_check_range+0x100/0x1a8 [ 18.445878] __kasan_check_write+0x20/0x30 [ 18.446289] kasan_atomics_helper+0x17ec/0x4858 [ 18.446368] kasan_atomics+0x198/0x2e0 [ 18.446536] kunit_try_run_case+0x170/0x3f0 [ 18.446933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.447111] kthread+0x328/0x630 [ 18.447198] ret_from_fork+0x10/0x20 [ 18.447385] [ 18.447537] Allocated by task 265: [ 18.447569] kasan_save_stack+0x3c/0x68 [ 18.447742] kasan_save_track+0x20/0x40 [ 18.447872] kasan_save_alloc_info+0x40/0x58 [ 18.448142] __kasan_kmalloc+0xd4/0xd8 [ 18.448273] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.448350] kasan_atomics+0xb8/0x2e0 [ 18.448500] kunit_try_run_case+0x170/0x3f0 [ 18.448569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.448658] kthread+0x328/0x630 [ 18.448793] ret_from_fork+0x10/0x20 [ 18.448865] [ 18.448903] The buggy address belongs to the object at fff00000c3f8b900 [ 18.448903] which belongs to the cache kmalloc-64 of size 64 [ 18.449279] The buggy address is located 0 bytes to the right of [ 18.449279] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.449659] [ 18.449714] The buggy address belongs to the physical page: [ 18.449767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.449939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.450056] page_type: f5(slab) [ 18.450210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.450365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.450416] page dumped because: kasan: bad access detected [ 18.450459] [ 18.450481] Memory state around the buggy address: [ 18.450551] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.450917] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.450986] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.451207] ^ [ 18.451255] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.451475] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.451576] ================================================================== [ 18.214396] ================================================================== [ 18.214570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.214771] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.214894] [ 18.214939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.215050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.215080] Hardware name: linux,dummy-virt (DT) [ 18.215112] Call trace: [ 18.215135] show_stack+0x20/0x38 (C) [ 18.215199] dump_stack_lvl+0x8c/0xd0 [ 18.215257] print_report+0x118/0x5d0 [ 18.215319] kasan_report+0xdc/0x128 [ 18.215369] __asan_report_load8_noabort+0x20/0x30 [ 18.215433] kasan_atomics_helper+0x3f58/0x4858 [ 18.215489] kasan_atomics+0x198/0x2e0 [ 18.215538] kunit_try_run_case+0x170/0x3f0 [ 18.215589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.215654] kthread+0x328/0x630 [ 18.215710] ret_from_fork+0x10/0x20 [ 18.215779] [ 18.215823] Allocated by task 265: [ 18.215870] kasan_save_stack+0x3c/0x68 [ 18.215925] kasan_save_track+0x20/0x40 [ 18.215965] kasan_save_alloc_info+0x40/0x58 [ 18.216020] __kasan_kmalloc+0xd4/0xd8 [ 18.216065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.216119] kasan_atomics+0xb8/0x2e0 [ 18.216183] kunit_try_run_case+0x170/0x3f0 [ 18.216226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.216273] kthread+0x328/0x630 [ 18.216308] ret_from_fork+0x10/0x20 [ 18.216357] [ 18.216393] The buggy address belongs to the object at fff00000c3f8b900 [ 18.216393] which belongs to the cache kmalloc-64 of size 64 [ 18.216465] The buggy address is located 0 bytes to the right of [ 18.216465] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.216536] [ 18.216567] The buggy address belongs to the physical page: [ 18.216609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.216676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.216727] page_type: f5(slab) [ 18.216768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.216824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.217896] page dumped because: kasan: bad access detected [ 18.217964] [ 18.218031] Memory state around the buggy address: [ 18.218097] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.218182] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.218240] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.218520] ^ [ 18.218705] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.218761] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.218803] ================================================================== [ 18.202639] ================================================================== [ 18.202963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.203419] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.203547] [ 18.203646] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.203812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.203841] Hardware name: linux,dummy-virt (DT) [ 18.203899] Call trace: [ 18.204305] show_stack+0x20/0x38 (C) [ 18.204712] dump_stack_lvl+0x8c/0xd0 [ 18.204877] print_report+0x118/0x5d0 [ 18.205167] kasan_report+0xdc/0x128 [ 18.205488] kasan_check_range+0x100/0x1a8 [ 18.205795] __kasan_check_read+0x20/0x30 [ 18.205888] kasan_atomics_helper+0xdd4/0x4858 [ 18.206077] kasan_atomics+0x198/0x2e0 [ 18.206139] kunit_try_run_case+0x170/0x3f0 [ 18.206396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.206752] kthread+0x328/0x630 [ 18.207065] ret_from_fork+0x10/0x20 [ 18.207232] [ 18.207313] Allocated by task 265: [ 18.207458] kasan_save_stack+0x3c/0x68 [ 18.207525] kasan_save_track+0x20/0x40 [ 18.207566] kasan_save_alloc_info+0x40/0x58 [ 18.207616] __kasan_kmalloc+0xd4/0xd8 [ 18.207843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.208050] kasan_atomics+0xb8/0x2e0 [ 18.208444] kunit_try_run_case+0x170/0x3f0 [ 18.208775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.209017] kthread+0x328/0x630 [ 18.209252] ret_from_fork+0x10/0x20 [ 18.209354] [ 18.209382] The buggy address belongs to the object at fff00000c3f8b900 [ 18.209382] which belongs to the cache kmalloc-64 of size 64 [ 18.209793] The buggy address is located 0 bytes to the right of [ 18.209793] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.210009] [ 18.210148] The buggy address belongs to the physical page: [ 18.210430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.210893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.211075] page_type: f5(slab) [ 18.211123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.211199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.211244] page dumped because: kasan: bad access detected [ 18.211605] [ 18.211687] Memory state around the buggy address: [ 18.211956] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.212015] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.212492] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.212685] ^ [ 18.213033] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.213116] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.213364] ================================================================== [ 18.393812] ================================================================== [ 18.394153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.394234] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.394289] [ 18.394323] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.394494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.394571] Hardware name: linux,dummy-virt (DT) [ 18.394634] Call trace: [ 18.394728] show_stack+0x20/0x38 (C) [ 18.394797] dump_stack_lvl+0x8c/0xd0 [ 18.394884] print_report+0x118/0x5d0 [ 18.394934] kasan_report+0xdc/0x128 [ 18.395271] __asan_report_load8_noabort+0x20/0x30 [ 18.395623] kasan_atomics_helper+0x3db0/0x4858 [ 18.395787] kasan_atomics+0x198/0x2e0 [ 18.395916] kunit_try_run_case+0x170/0x3f0 [ 18.396014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.396111] kthread+0x328/0x630 [ 18.396214] ret_from_fork+0x10/0x20 [ 18.396266] [ 18.396618] Allocated by task 265: [ 18.396981] kasan_save_stack+0x3c/0x68 [ 18.397089] kasan_save_track+0x20/0x40 [ 18.397164] kasan_save_alloc_info+0x40/0x58 [ 18.397288] __kasan_kmalloc+0xd4/0xd8 [ 18.397376] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.397484] kasan_atomics+0xb8/0x2e0 [ 18.397523] kunit_try_run_case+0x170/0x3f0 [ 18.397594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.397928] kthread+0x328/0x630 [ 18.398334] ret_from_fork+0x10/0x20 [ 18.398416] [ 18.398484] The buggy address belongs to the object at fff00000c3f8b900 [ 18.398484] which belongs to the cache kmalloc-64 of size 64 [ 18.398847] The buggy address is located 0 bytes to the right of [ 18.398847] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.399006] [ 18.399101] The buggy address belongs to the physical page: [ 18.399136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.399203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.399255] page_type: f5(slab) [ 18.399623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.399955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.400059] page dumped because: kasan: bad access detected [ 18.400168] [ 18.400239] Memory state around the buggy address: [ 18.400360] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.400412] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.400484] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.400788] ^ [ 18.400992] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.401206] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.401331] ================================================================== [ 18.219014] ================================================================== [ 18.219063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.219780] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.219936] [ 18.219972] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.220140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.220188] Hardware name: linux,dummy-virt (DT) [ 18.220225] Call trace: [ 18.220329] show_stack+0x20/0x38 (C) [ 18.220386] dump_stack_lvl+0x8c/0xd0 [ 18.220452] print_report+0x118/0x5d0 [ 18.220793] kasan_report+0xdc/0x128 [ 18.220864] kasan_check_range+0x100/0x1a8 [ 18.220918] __kasan_check_write+0x20/0x30 [ 18.221386] kasan_atomics_helper+0xe44/0x4858 [ 18.221620] kasan_atomics+0x198/0x2e0 [ 18.221706] kunit_try_run_case+0x170/0x3f0 [ 18.221914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.222039] kthread+0x328/0x630 [ 18.222240] ret_from_fork+0x10/0x20 [ 18.222303] [ 18.222352] Allocated by task 265: [ 18.222385] kasan_save_stack+0x3c/0x68 [ 18.222443] kasan_save_track+0x20/0x40 [ 18.222671] kasan_save_alloc_info+0x40/0x58 [ 18.222841] __kasan_kmalloc+0xd4/0xd8 [ 18.223109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.223408] kasan_atomics+0xb8/0x2e0 [ 18.223493] kunit_try_run_case+0x170/0x3f0 [ 18.223968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.224285] kthread+0x328/0x630 [ 18.224398] ret_from_fork+0x10/0x20 [ 18.224749] [ 18.225009] The buggy address belongs to the object at fff00000c3f8b900 [ 18.225009] which belongs to the cache kmalloc-64 of size 64 [ 18.225374] The buggy address is located 0 bytes to the right of [ 18.225374] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.225695] [ 18.225747] The buggy address belongs to the physical page: [ 18.226083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.226350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.226511] page_type: f5(slab) [ 18.227012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.227249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.227324] page dumped because: kasan: bad access detected [ 18.227475] [ 18.227507] Memory state around the buggy address: [ 18.227713] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.227842] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.228059] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.228213] ^ [ 18.228525] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.228698] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.228910] ================================================================== [ 18.098466] ================================================================== [ 18.098529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.098848] Write of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.099073] [ 18.099144] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.099351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.099409] Hardware name: linux,dummy-virt (DT) [ 18.099449] Call trace: [ 18.099598] show_stack+0x20/0x38 (C) [ 18.099812] dump_stack_lvl+0x8c/0xd0 [ 18.099969] print_report+0x118/0x5d0 [ 18.100041] kasan_report+0xdc/0x128 [ 18.100317] kasan_check_range+0x100/0x1a8 [ 18.100419] __kasan_check_write+0x20/0x30 [ 18.100563] kasan_atomics_helper+0x99c/0x4858 [ 18.100625] kasan_atomics+0x198/0x2e0 [ 18.100870] kunit_try_run_case+0x170/0x3f0 [ 18.100998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.101203] kthread+0x328/0x630 [ 18.101254] ret_from_fork+0x10/0x20 [ 18.101470] [ 18.101508] Allocated by task 265: [ 18.101682] kasan_save_stack+0x3c/0x68 [ 18.101920] kasan_save_track+0x20/0x40 [ 18.102073] kasan_save_alloc_info+0x40/0x58 [ 18.102216] __kasan_kmalloc+0xd4/0xd8 [ 18.102313] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.102392] kasan_atomics+0xb8/0x2e0 [ 18.102583] kunit_try_run_case+0x170/0x3f0 [ 18.102679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.102904] kthread+0x328/0x630 [ 18.103033] ret_from_fork+0x10/0x20 [ 18.103111] [ 18.103140] The buggy address belongs to the object at fff00000c3f8b900 [ 18.103140] which belongs to the cache kmalloc-64 of size 64 [ 18.103205] The buggy address is located 0 bytes to the right of [ 18.103205] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.103488] [ 18.103535] The buggy address belongs to the physical page: [ 18.103579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.103647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.103707] page_type: f5(slab) [ 18.103748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.103818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.103872] page dumped because: kasan: bad access detected [ 18.103926] [ 18.103960] Memory state around the buggy address: [ 18.103993] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.104051] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.104098] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.104138] ^ [ 18.104175] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.105600] ================================================================== [ 18.112473] ================================================================== [ 18.112648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.112709] Write of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.112817] [ 18.112863] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.112949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.113148] Hardware name: linux,dummy-virt (DT) [ 18.113286] Call trace: [ 18.113344] show_stack+0x20/0x38 (C) [ 18.113462] dump_stack_lvl+0x8c/0xd0 [ 18.113536] print_report+0x118/0x5d0 [ 18.113685] kasan_report+0xdc/0x128 [ 18.113739] kasan_check_range+0x100/0x1a8 [ 18.113791] __kasan_check_write+0x20/0x30 [ 18.113844] kasan_atomics_helper+0xa6c/0x4858 [ 18.113904] kasan_atomics+0x198/0x2e0 [ 18.113950] kunit_try_run_case+0x170/0x3f0 [ 18.114223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.114317] kthread+0x328/0x630 [ 18.114416] ret_from_fork+0x10/0x20 [ 18.114477] [ 18.114538] Allocated by task 265: [ 18.114628] kasan_save_stack+0x3c/0x68 [ 18.114697] kasan_save_track+0x20/0x40 [ 18.114744] kasan_save_alloc_info+0x40/0x58 [ 18.114795] __kasan_kmalloc+0xd4/0xd8 [ 18.114834] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.114886] kasan_atomics+0xb8/0x2e0 [ 18.114925] kunit_try_run_case+0x170/0x3f0 [ 18.114966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.115014] kthread+0x328/0x630 [ 18.115049] ret_from_fork+0x10/0x20 [ 18.115279] [ 18.115541] The buggy address belongs to the object at fff00000c3f8b900 [ 18.115541] which belongs to the cache kmalloc-64 of size 64 [ 18.115780] The buggy address is located 0 bytes to the right of [ 18.115780] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.116003] [ 18.116047] The buggy address belongs to the physical page: [ 18.116082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.116294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.116423] page_type: f5(slab) [ 18.116496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.116552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.116616] page dumped because: kasan: bad access detected [ 18.116651] [ 18.116671] Memory state around the buggy address: [ 18.116712] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.116770] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.116830] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.116888] ^ [ 18.116925] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.117219] ================================================================== [ 18.435583] ================================================================== [ 18.435640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.435707] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.435982] [ 18.436028] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.436122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.436467] Hardware name: linux,dummy-virt (DT) [ 18.436538] Call trace: [ 18.436588] show_stack+0x20/0x38 (C) [ 18.436649] dump_stack_lvl+0x8c/0xd0 [ 18.436789] print_report+0x118/0x5d0 [ 18.436885] kasan_report+0xdc/0x128 [ 18.436940] __asan_report_load8_noabort+0x20/0x30 [ 18.437292] kasan_atomics_helper+0x3e20/0x4858 [ 18.437373] kasan_atomics+0x198/0x2e0 [ 18.437433] kunit_try_run_case+0x170/0x3f0 [ 18.437490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.437557] kthread+0x328/0x630 [ 18.437614] ret_from_fork+0x10/0x20 [ 18.437916] [ 18.437960] Allocated by task 265: [ 18.438002] kasan_save_stack+0x3c/0x68 [ 18.438059] kasan_save_track+0x20/0x40 [ 18.438392] kasan_save_alloc_info+0x40/0x58 [ 18.438483] __kasan_kmalloc+0xd4/0xd8 [ 18.438557] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.438895] kasan_atomics+0xb8/0x2e0 [ 18.439079] kunit_try_run_case+0x170/0x3f0 [ 18.439174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.439398] kthread+0x328/0x630 [ 18.439502] ret_from_fork+0x10/0x20 [ 18.439553] [ 18.439576] The buggy address belongs to the object at fff00000c3f8b900 [ 18.439576] which belongs to the cache kmalloc-64 of size 64 [ 18.439638] The buggy address is located 0 bytes to the right of [ 18.439638] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.440433] [ 18.440520] The buggy address belongs to the physical page: [ 18.440591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.440960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.441037] page_type: f5(slab) [ 18.441119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.441456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.441818] page dumped because: kasan: bad access detected [ 18.442321] [ 18.442389] Memory state around the buggy address: [ 18.442449] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.442511] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.443272] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.443338] ^ [ 18.443381] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.443436] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.443479] ================================================================== [ 18.295997] ================================================================== [ 18.296061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.296114] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.296216] [ 18.296267] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.296354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.296413] Hardware name: linux,dummy-virt (DT) [ 18.296447] Call trace: [ 18.296471] show_stack+0x20/0x38 (C) [ 18.296523] dump_stack_lvl+0x8c/0xd0 [ 18.296729] print_report+0x118/0x5d0 [ 18.297060] kasan_report+0xdc/0x128 [ 18.297126] kasan_check_range+0x100/0x1a8 [ 18.297178] __kasan_check_write+0x20/0x30 [ 18.297235] kasan_atomics_helper+0x1128/0x4858 [ 18.297421] kasan_atomics+0x198/0x2e0 [ 18.297787] kunit_try_run_case+0x170/0x3f0 [ 18.297922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.298154] kthread+0x328/0x630 [ 18.298341] ret_from_fork+0x10/0x20 [ 18.298413] [ 18.298442] Allocated by task 265: [ 18.298471] kasan_save_stack+0x3c/0x68 [ 18.298561] kasan_save_track+0x20/0x40 [ 18.298667] kasan_save_alloc_info+0x40/0x58 [ 18.298888] __kasan_kmalloc+0xd4/0xd8 [ 18.299110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.299236] kasan_atomics+0xb8/0x2e0 [ 18.299572] kunit_try_run_case+0x170/0x3f0 [ 18.299641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.299833] kthread+0x328/0x630 [ 18.300019] ret_from_fork+0x10/0x20 [ 18.300075] [ 18.300098] The buggy address belongs to the object at fff00000c3f8b900 [ 18.300098] which belongs to the cache kmalloc-64 of size 64 [ 18.300169] The buggy address is located 0 bytes to the right of [ 18.300169] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.300270] [ 18.300313] The buggy address belongs to the physical page: [ 18.300349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.300406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.300469] page_type: f5(slab) [ 18.300509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.300565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.300611] page dumped because: kasan: bad access detected [ 18.300646] [ 18.300686] Memory state around the buggy address: [ 18.300730] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300797] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300861] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.300905] ^ [ 18.300954] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.301019] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.301059] ================================================================== [ 18.172801] ================================================================== [ 18.172891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.172957] Read of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265 [ 18.173536] [ 18.174131] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.174236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.174276] Hardware name: linux,dummy-virt (DT) [ 18.174311] Call trace: [ 18.174342] show_stack+0x20/0x38 (C) [ 18.174612] dump_stack_lvl+0x8c/0xd0 [ 18.174780] print_report+0x118/0x5d0 [ 18.175081] kasan_report+0xdc/0x128 [ 18.175360] __asan_report_load4_noabort+0x20/0x30 [ 18.175475] kasan_atomics_helper+0x3dd8/0x4858 [ 18.175637] kasan_atomics+0x198/0x2e0 [ 18.175690] kunit_try_run_case+0x170/0x3f0 [ 18.175738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.175995] kthread+0x328/0x630 [ 18.176346] ret_from_fork+0x10/0x20 [ 18.176723] [ 18.176787] Allocated by task 265: [ 18.177055] kasan_save_stack+0x3c/0x68 [ 18.177237] kasan_save_track+0x20/0x40 [ 18.177323] kasan_save_alloc_info+0x40/0x58 [ 18.177451] __kasan_kmalloc+0xd4/0xd8 [ 18.177541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.177582] kasan_atomics+0xb8/0x2e0 [ 18.177829] kunit_try_run_case+0x170/0x3f0 [ 18.178209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.178480] kthread+0x328/0x630 [ 18.178729] ret_from_fork+0x10/0x20 [ 18.178986] [ 18.179167] The buggy address belongs to the object at fff00000c3f8b900 [ 18.179167] which belongs to the cache kmalloc-64 of size 64 [ 18.179355] The buggy address is located 0 bytes to the right of [ 18.179355] allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930) [ 18.179437] [ 18.179723] The buggy address belongs to the physical page: [ 18.179901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b [ 18.180000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.180344] page_type: f5(slab) [ 18.180548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.180899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.181357] page dumped because: kasan: bad access detected [ 18.181760] [ 18.182356] Memory state around the buggy address: [ 18.182427] fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.182753] fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.183003] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.183116] ^ [ 18.183195] fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.183447] fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.183575] ==================================================================
[ 15.649297] ================================================================== [ 15.649576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.650289] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.650972] [ 15.651178] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.651225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.651248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.651271] Call Trace: [ 15.651290] <TASK> [ 15.651318] dump_stack_lvl+0x73/0xb0 [ 15.651347] print_report+0xd1/0x610 [ 15.651369] ? __virt_addr_valid+0x1db/0x2d0 [ 15.651393] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.651414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.651437] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.651469] kasan_report+0x141/0x180 [ 15.651492] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.651519] kasan_check_range+0x10c/0x1c0 [ 15.651553] __kasan_check_read+0x15/0x20 [ 15.651573] kasan_atomics_helper+0x13b5/0x5450 [ 15.651597] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.651621] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.651647] ? kasan_atomics+0x152/0x310 [ 15.651674] kasan_atomics+0x1dc/0x310 [ 15.651698] ? __pfx_kasan_atomics+0x10/0x10 [ 15.651723] ? __pfx_read_tsc+0x10/0x10 [ 15.651744] ? ktime_get_ts64+0x86/0x230 [ 15.651768] kunit_try_run_case+0x1a5/0x480 [ 15.651794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.651836] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.651861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.651886] ? __kthread_parkme+0x82/0x180 [ 15.651917] ? preempt_count_sub+0x50/0x80 [ 15.651941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.651967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.651991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.652025] kthread+0x337/0x6f0 [ 15.652046] ? trace_preempt_on+0x20/0xc0 [ 15.652069] ? __pfx_kthread+0x10/0x10 [ 15.652111] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.652135] ? calculate_sigpending+0x7b/0xa0 [ 15.652161] ? __pfx_kthread+0x10/0x10 [ 15.652183] ret_from_fork+0x116/0x1d0 [ 15.652204] ? __pfx_kthread+0x10/0x10 [ 15.652225] ret_from_fork_asm+0x1a/0x30 [ 15.652257] </TASK> [ 15.652269] [ 15.659695] Allocated by task 282: [ 15.659885] kasan_save_stack+0x45/0x70 [ 15.660120] kasan_save_track+0x18/0x40 [ 15.660316] kasan_save_alloc_info+0x3b/0x50 [ 15.660530] __kasan_kmalloc+0xb7/0xc0 [ 15.660747] __kmalloc_cache_noprof+0x189/0x420 [ 15.660965] kasan_atomics+0x95/0x310 [ 15.661230] kunit_try_run_case+0x1a5/0x480 [ 15.661417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661634] kthread+0x337/0x6f0 [ 15.661833] ret_from_fork+0x116/0x1d0 [ 15.662000] ret_from_fork_asm+0x1a/0x30 [ 15.662227] [ 15.662301] The buggy address belongs to the object at ffff8881025e4100 [ 15.662301] which belongs to the cache kmalloc-64 of size 64 [ 15.662783] The buggy address is located 0 bytes to the right of [ 15.662783] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.663333] [ 15.663408] The buggy address belongs to the physical page: [ 15.663583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.663840] flags: 0x200000000000000(node=0|zone=2) [ 15.664007] page_type: f5(slab) [ 15.664129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.664743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.665115] page dumped because: kasan: bad access detected [ 15.665369] [ 15.665464] Memory state around the buggy address: [ 15.665622] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.665852] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.666075] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.666392] ^ [ 15.666590] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.667547] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668343] ================================================================== [ 15.181266] ================================================================== [ 15.181625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.181929] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.182261] [ 15.182372] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.182416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.182429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.182450] Call Trace: [ 15.182464] <TASK> [ 15.182478] dump_stack_lvl+0x73/0xb0 [ 15.182507] print_report+0xd1/0x610 [ 15.182528] ? __virt_addr_valid+0x1db/0x2d0 [ 15.182551] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.182572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.182596] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.182618] kasan_report+0x141/0x180 [ 15.182640] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.182666] kasan_check_range+0x10c/0x1c0 [ 15.182690] __kasan_check_write+0x18/0x20 [ 15.182710] kasan_atomics_helper+0x7c7/0x5450 [ 15.182733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.182755] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.182781] ? kasan_atomics+0x152/0x310 [ 15.182808] kasan_atomics+0x1dc/0x310 [ 15.182842] ? __pfx_kasan_atomics+0x10/0x10 [ 15.182867] ? __pfx_read_tsc+0x10/0x10 [ 15.182888] ? ktime_get_ts64+0x86/0x230 [ 15.182913] kunit_try_run_case+0x1a5/0x480 [ 15.182938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.182961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.182986] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.183010] ? __kthread_parkme+0x82/0x180 [ 15.183031] ? preempt_count_sub+0x50/0x80 [ 15.183056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.183116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.183141] kthread+0x337/0x6f0 [ 15.183161] ? trace_preempt_on+0x20/0xc0 [ 15.183185] ? __pfx_kthread+0x10/0x10 [ 15.183206] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.183229] ? calculate_sigpending+0x7b/0xa0 [ 15.183254] ? __pfx_kthread+0x10/0x10 [ 15.183276] ret_from_fork+0x116/0x1d0 [ 15.183295] ? __pfx_kthread+0x10/0x10 [ 15.183317] ret_from_fork_asm+0x1a/0x30 [ 15.183347] </TASK> [ 15.183358] [ 15.190642] Allocated by task 282: [ 15.190809] kasan_save_stack+0x45/0x70 [ 15.190993] kasan_save_track+0x18/0x40 [ 15.191235] kasan_save_alloc_info+0x3b/0x50 [ 15.191391] __kasan_kmalloc+0xb7/0xc0 [ 15.191525] __kmalloc_cache_noprof+0x189/0x420 [ 15.191684] kasan_atomics+0x95/0x310 [ 15.191830] kunit_try_run_case+0x1a5/0x480 [ 15.191994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.192220] kthread+0x337/0x6f0 [ 15.192404] ret_from_fork+0x116/0x1d0 [ 15.192591] ret_from_fork_asm+0x1a/0x30 [ 15.192786] [ 15.192901] The buggy address belongs to the object at ffff8881025e4100 [ 15.192901] which belongs to the cache kmalloc-64 of size 64 [ 15.193709] The buggy address is located 0 bytes to the right of [ 15.193709] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.194242] [ 15.194342] The buggy address belongs to the physical page: [ 15.194596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.194922] flags: 0x200000000000000(node=0|zone=2) [ 15.195152] page_type: f5(slab) [ 15.195277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.195593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.195919] page dumped because: kasan: bad access detected [ 15.196196] [ 15.196269] Memory state around the buggy address: [ 15.196492] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.196770] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.197011] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.197581] ^ [ 15.197775] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.198180] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.198487] ================================================================== [ 15.419827] ================================================================== [ 15.420361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.420650] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.420905] [ 15.421017] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.421059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.421071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.421093] Call Trace: [ 15.421107] <TASK> [ 15.421122] dump_stack_lvl+0x73/0xb0 [ 15.421149] print_report+0xd1/0x610 [ 15.421172] ? __virt_addr_valid+0x1db/0x2d0 [ 15.421194] ? kasan_atomics_helper+0xf10/0x5450 [ 15.421216] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.421239] ? kasan_atomics_helper+0xf10/0x5450 [ 15.421261] kasan_report+0x141/0x180 [ 15.421284] ? kasan_atomics_helper+0xf10/0x5450 [ 15.421309] kasan_check_range+0x10c/0x1c0 [ 15.421333] __kasan_check_write+0x18/0x20 [ 15.421353] kasan_atomics_helper+0xf10/0x5450 [ 15.421378] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.421403] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.421429] ? kasan_atomics+0x152/0x310 [ 15.421455] kasan_atomics+0x1dc/0x310 [ 15.421479] ? __pfx_kasan_atomics+0x10/0x10 [ 15.421504] ? __pfx_read_tsc+0x10/0x10 [ 15.421526] ? ktime_get_ts64+0x86/0x230 [ 15.421551] kunit_try_run_case+0x1a5/0x480 [ 15.421575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.421622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.421647] ? __kthread_parkme+0x82/0x180 [ 15.421668] ? preempt_count_sub+0x50/0x80 [ 15.421692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.421717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.421741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.421765] kthread+0x337/0x6f0 [ 15.421785] ? trace_preempt_on+0x20/0xc0 [ 15.421809] ? __pfx_kthread+0x10/0x10 [ 15.421840] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.421862] ? calculate_sigpending+0x7b/0xa0 [ 15.421886] ? __pfx_kthread+0x10/0x10 [ 15.421908] ret_from_fork+0x116/0x1d0 [ 15.421927] ? __pfx_kthread+0x10/0x10 [ 15.421947] ret_from_fork_asm+0x1a/0x30 [ 15.421978] </TASK> [ 15.421990] [ 15.429865] Allocated by task 282: [ 15.430003] kasan_save_stack+0x45/0x70 [ 15.430223] kasan_save_track+0x18/0x40 [ 15.430483] kasan_save_alloc_info+0x3b/0x50 [ 15.430683] __kasan_kmalloc+0xb7/0xc0 [ 15.430856] __kmalloc_cache_noprof+0x189/0x420 [ 15.431047] kasan_atomics+0x95/0x310 [ 15.431323] kunit_try_run_case+0x1a5/0x480 [ 15.431503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.431713] kthread+0x337/0x6f0 [ 15.431884] ret_from_fork+0x116/0x1d0 [ 15.432047] ret_from_fork_asm+0x1a/0x30 [ 15.432359] [ 15.432436] The buggy address belongs to the object at ffff8881025e4100 [ 15.432436] which belongs to the cache kmalloc-64 of size 64 [ 15.432927] The buggy address is located 0 bytes to the right of [ 15.432927] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.433298] [ 15.433372] The buggy address belongs to the physical page: [ 15.433548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.433793] flags: 0x200000000000000(node=0|zone=2) [ 15.433967] page_type: f5(slab) [ 15.434089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.434325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.434582] page dumped because: kasan: bad access detected [ 15.434924] [ 15.435019] Memory state around the buggy address: [ 15.435450] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.435768] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.436107] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.436421] ^ [ 15.436581] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.436800] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.437032] ================================================================== [ 15.477444] ================================================================== [ 15.477679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.479043] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.479585] [ 15.479707] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.479754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.479768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.479790] Call Trace: [ 15.479808] <TASK> [ 15.479834] dump_stack_lvl+0x73/0xb0 [ 15.479864] print_report+0xd1/0x610 [ 15.479886] ? __virt_addr_valid+0x1db/0x2d0 [ 15.479908] ? kasan_atomics_helper+0x1079/0x5450 [ 15.479931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.479954] ? kasan_atomics_helper+0x1079/0x5450 [ 15.479976] kasan_report+0x141/0x180 [ 15.479998] ? kasan_atomics_helper+0x1079/0x5450 [ 15.480025] kasan_check_range+0x10c/0x1c0 [ 15.480049] __kasan_check_write+0x18/0x20 [ 15.480070] kasan_atomics_helper+0x1079/0x5450 [ 15.480321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.480346] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.480373] ? kasan_atomics+0x152/0x310 [ 15.480401] kasan_atomics+0x1dc/0x310 [ 15.480460] ? __pfx_kasan_atomics+0x10/0x10 [ 15.480484] ? __pfx_read_tsc+0x10/0x10 [ 15.480506] ? ktime_get_ts64+0x86/0x230 [ 15.480532] kunit_try_run_case+0x1a5/0x480 [ 15.480558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480581] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.480607] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.480631] ? __kthread_parkme+0x82/0x180 [ 15.480651] ? preempt_count_sub+0x50/0x80 [ 15.480675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.480749] kthread+0x337/0x6f0 [ 15.480769] ? trace_preempt_on+0x20/0xc0 [ 15.480793] ? __pfx_kthread+0x10/0x10 [ 15.480825] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.480853] ? calculate_sigpending+0x7b/0xa0 [ 15.480878] ? __pfx_kthread+0x10/0x10 [ 15.480900] ret_from_fork+0x116/0x1d0 [ 15.480919] ? __pfx_kthread+0x10/0x10 [ 15.480941] ret_from_fork_asm+0x1a/0x30 [ 15.480971] </TASK> [ 15.480982] [ 15.492485] Allocated by task 282: [ 15.492737] kasan_save_stack+0x45/0x70 [ 15.492940] kasan_save_track+0x18/0x40 [ 15.493419] kasan_save_alloc_info+0x3b/0x50 [ 15.493701] __kasan_kmalloc+0xb7/0xc0 [ 15.494024] __kmalloc_cache_noprof+0x189/0x420 [ 15.494565] kasan_atomics+0x95/0x310 [ 15.494805] kunit_try_run_case+0x1a5/0x480 [ 15.495023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.495746] kthread+0x337/0x6f0 [ 15.495986] ret_from_fork+0x116/0x1d0 [ 15.496418] ret_from_fork_asm+0x1a/0x30 [ 15.496614] [ 15.496709] The buggy address belongs to the object at ffff8881025e4100 [ 15.496709] which belongs to the cache kmalloc-64 of size 64 [ 15.497611] The buggy address is located 0 bytes to the right of [ 15.497611] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.498607] [ 15.498708] The buggy address belongs to the physical page: [ 15.498965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.499553] flags: 0x200000000000000(node=0|zone=2) [ 15.500025] page_type: f5(slab) [ 15.500359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.500688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.501019] page dumped because: kasan: bad access detected [ 15.501695] [ 15.501791] Memory state around the buggy address: [ 15.502495] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.502935] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.503390] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.503687] ^ [ 15.503908] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504571] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.505010] ================================================================== [ 16.288261] ================================================================== [ 16.288583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.288954] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.289344] [ 16.289450] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.289529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.289543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.289563] Call Trace: [ 16.289578] <TASK> [ 16.289594] dump_stack_lvl+0x73/0xb0 [ 16.289622] print_report+0xd1/0x610 [ 16.289644] ? __virt_addr_valid+0x1db/0x2d0 [ 16.289713] ? kasan_atomics_helper+0x5115/0x5450 [ 16.289737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.289759] ? kasan_atomics_helper+0x5115/0x5450 [ 16.289782] kasan_report+0x141/0x180 [ 16.289805] ? kasan_atomics_helper+0x5115/0x5450 [ 16.289844] __asan_report_load8_noabort+0x18/0x20 [ 16.289869] kasan_atomics_helper+0x5115/0x5450 [ 16.289893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.289915] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.289941] ? kasan_atomics+0x152/0x310 [ 16.290000] kasan_atomics+0x1dc/0x310 [ 16.290024] ? __pfx_kasan_atomics+0x10/0x10 [ 16.290049] ? __pfx_read_tsc+0x10/0x10 [ 16.290070] ? ktime_get_ts64+0x86/0x230 [ 16.290116] kunit_try_run_case+0x1a5/0x480 [ 16.290168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.290191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.290215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.290240] ? __kthread_parkme+0x82/0x180 [ 16.290261] ? preempt_count_sub+0x50/0x80 [ 16.290285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.290310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.290334] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.290359] kthread+0x337/0x6f0 [ 16.290380] ? trace_preempt_on+0x20/0xc0 [ 16.290402] ? __pfx_kthread+0x10/0x10 [ 16.290424] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.290446] ? calculate_sigpending+0x7b/0xa0 [ 16.290470] ? __pfx_kthread+0x10/0x10 [ 16.290492] ret_from_fork+0x116/0x1d0 [ 16.290511] ? __pfx_kthread+0x10/0x10 [ 16.290533] ret_from_fork_asm+0x1a/0x30 [ 16.290564] </TASK> [ 16.290574] [ 16.297943] Allocated by task 282: [ 16.298096] kasan_save_stack+0x45/0x70 [ 16.298290] kasan_save_track+0x18/0x40 [ 16.298486] kasan_save_alloc_info+0x3b/0x50 [ 16.298721] __kasan_kmalloc+0xb7/0xc0 [ 16.298919] __kmalloc_cache_noprof+0x189/0x420 [ 16.299179] kasan_atomics+0x95/0x310 [ 16.299376] kunit_try_run_case+0x1a5/0x480 [ 16.299581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.299833] kthread+0x337/0x6f0 [ 16.300012] ret_from_fork+0x116/0x1d0 [ 16.300229] ret_from_fork_asm+0x1a/0x30 [ 16.300416] [ 16.300492] The buggy address belongs to the object at ffff8881025e4100 [ 16.300492] which belongs to the cache kmalloc-64 of size 64 [ 16.301014] The buggy address is located 0 bytes to the right of [ 16.301014] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.301530] [ 16.301632] The buggy address belongs to the physical page: [ 16.301848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.302097] flags: 0x200000000000000(node=0|zone=2) [ 16.302263] page_type: f5(slab) [ 16.302387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.302733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.303157] page dumped because: kasan: bad access detected [ 16.303409] [ 16.303491] Memory state around the buggy address: [ 16.303649] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.303878] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.304122] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.304387] ^ [ 16.304634] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.304995] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.305366] ================================================================== [ 15.944864] ================================================================== [ 15.945603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.946292] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.946682] [ 15.946771] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.946825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.946839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.946861] Call Trace: [ 15.946878] <TASK> [ 15.946895] dump_stack_lvl+0x73/0xb0 [ 15.946924] print_report+0xd1/0x610 [ 15.946947] ? __virt_addr_valid+0x1db/0x2d0 [ 15.946969] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.946991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.947014] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.947037] kasan_report+0x141/0x180 [ 15.947060] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.947094] kasan_check_range+0x10c/0x1c0 [ 15.947119] __kasan_check_write+0x18/0x20 [ 15.947139] kasan_atomics_helper+0x1a7f/0x5450 [ 15.947163] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.947186] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.947211] ? kasan_atomics+0x152/0x310 [ 15.947239] kasan_atomics+0x1dc/0x310 [ 15.947262] ? __pfx_kasan_atomics+0x10/0x10 [ 15.947288] ? __pfx_read_tsc+0x10/0x10 [ 15.947310] ? ktime_get_ts64+0x86/0x230 [ 15.947335] kunit_try_run_case+0x1a5/0x480 [ 15.947360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.947384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.947408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.947432] ? __kthread_parkme+0x82/0x180 [ 15.947453] ? preempt_count_sub+0x50/0x80 [ 15.947478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.947503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.947527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.947553] kthread+0x337/0x6f0 [ 15.947573] ? trace_preempt_on+0x20/0xc0 [ 15.947596] ? __pfx_kthread+0x10/0x10 [ 15.947617] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.947640] ? calculate_sigpending+0x7b/0xa0 [ 15.947663] ? __pfx_kthread+0x10/0x10 [ 15.947686] ret_from_fork+0x116/0x1d0 [ 15.947705] ? __pfx_kthread+0x10/0x10 [ 15.947727] ret_from_fork_asm+0x1a/0x30 [ 15.947757] </TASK> [ 15.947768] [ 15.958894] Allocated by task 282: [ 15.959074] kasan_save_stack+0x45/0x70 [ 15.959221] kasan_save_track+0x18/0x40 [ 15.959567] kasan_save_alloc_info+0x3b/0x50 [ 15.959779] __kasan_kmalloc+0xb7/0xc0 [ 15.959991] __kmalloc_cache_noprof+0x189/0x420 [ 15.960209] kasan_atomics+0x95/0x310 [ 15.960421] kunit_try_run_case+0x1a5/0x480 [ 15.960643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.960928] kthread+0x337/0x6f0 [ 15.961096] ret_from_fork+0x116/0x1d0 [ 15.961338] ret_from_fork_asm+0x1a/0x30 [ 15.961537] [ 15.961636] The buggy address belongs to the object at ffff8881025e4100 [ 15.961636] which belongs to the cache kmalloc-64 of size 64 [ 15.962155] The buggy address is located 0 bytes to the right of [ 15.962155] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.962627] [ 15.962727] The buggy address belongs to the physical page: [ 15.963014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.963361] flags: 0x200000000000000(node=0|zone=2) [ 15.963622] page_type: f5(slab) [ 15.963786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.964119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.964475] page dumped because: kasan: bad access detected [ 15.964744] [ 15.964934] Memory state around the buggy address: [ 15.965173] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.965543] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.965766] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.966108] ^ [ 15.966361] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.966726] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.967004] ================================================================== [ 16.184412] ================================================================== [ 16.184769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.185088] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.185352] [ 16.185439] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.185482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.185495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.185516] Call Trace: [ 16.185530] <TASK> [ 16.185546] dump_stack_lvl+0x73/0xb0 [ 16.185574] print_report+0xd1/0x610 [ 16.185596] ? __virt_addr_valid+0x1db/0x2d0 [ 16.185619] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.185641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.185663] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.185686] kasan_report+0x141/0x180 [ 16.185707] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.185734] kasan_check_range+0x10c/0x1c0 [ 16.185757] __kasan_check_write+0x18/0x20 [ 16.185777] kasan_atomics_helper+0x20c8/0x5450 [ 16.185800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.186140] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.186173] ? kasan_atomics+0x152/0x310 [ 16.186201] kasan_atomics+0x1dc/0x310 [ 16.186226] ? __pfx_kasan_atomics+0x10/0x10 [ 16.186251] ? __pfx_read_tsc+0x10/0x10 [ 16.186273] ? ktime_get_ts64+0x86/0x230 [ 16.186297] kunit_try_run_case+0x1a5/0x480 [ 16.186322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.186345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.186371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.186395] ? __kthread_parkme+0x82/0x180 [ 16.186416] ? preempt_count_sub+0x50/0x80 [ 16.186441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.186465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.186489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.186514] kthread+0x337/0x6f0 [ 16.186534] ? trace_preempt_on+0x20/0xc0 [ 16.186557] ? __pfx_kthread+0x10/0x10 [ 16.186579] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.186600] ? calculate_sigpending+0x7b/0xa0 [ 16.186624] ? __pfx_kthread+0x10/0x10 [ 16.186647] ret_from_fork+0x116/0x1d0 [ 16.186666] ? __pfx_kthread+0x10/0x10 [ 16.186687] ret_from_fork_asm+0x1a/0x30 [ 16.186718] </TASK> [ 16.186729] [ 16.194981] Allocated by task 282: [ 16.195211] kasan_save_stack+0x45/0x70 [ 16.195423] kasan_save_track+0x18/0x40 [ 16.195605] kasan_save_alloc_info+0x3b/0x50 [ 16.195831] __kasan_kmalloc+0xb7/0xc0 [ 16.195967] __kmalloc_cache_noprof+0x189/0x420 [ 16.196310] kasan_atomics+0x95/0x310 [ 16.196611] kunit_try_run_case+0x1a5/0x480 [ 16.196827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.197104] kthread+0x337/0x6f0 [ 16.197271] ret_from_fork+0x116/0x1d0 [ 16.197455] ret_from_fork_asm+0x1a/0x30 [ 16.197646] [ 16.197741] The buggy address belongs to the object at ffff8881025e4100 [ 16.197741] which belongs to the cache kmalloc-64 of size 64 [ 16.198290] The buggy address is located 0 bytes to the right of [ 16.198290] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.198791] [ 16.198898] The buggy address belongs to the physical page: [ 16.199180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.199531] flags: 0x200000000000000(node=0|zone=2) [ 16.199756] page_type: f5(slab) [ 16.199951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.200315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.200668] page dumped because: kasan: bad access detected [ 16.200917] [ 16.201042] Memory state around the buggy address: [ 16.201300] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.201627] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.201948] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.202296] ^ [ 16.202513] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.202811] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.203029] ================================================================== [ 15.706558] ================================================================== [ 15.706966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.707593] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.708170] [ 15.708285] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.708330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.708343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.708365] Call Trace: [ 15.708380] <TASK> [ 15.708396] dump_stack_lvl+0x73/0xb0 [ 15.708422] print_report+0xd1/0x610 [ 15.708444] ? __virt_addr_valid+0x1db/0x2d0 [ 15.708467] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.708488] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.708511] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.708533] kasan_report+0x141/0x180 [ 15.708556] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.708583] __asan_report_store8_noabort+0x1b/0x30 [ 15.708608] kasan_atomics_helper+0x50d4/0x5450 [ 15.708632] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.708654] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.708680] ? kasan_atomics+0x152/0x310 [ 15.708707] kasan_atomics+0x1dc/0x310 [ 15.708730] ? __pfx_kasan_atomics+0x10/0x10 [ 15.708755] ? __pfx_read_tsc+0x10/0x10 [ 15.708776] ? ktime_get_ts64+0x86/0x230 [ 15.708800] kunit_try_run_case+0x1a5/0x480 [ 15.708837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.708863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.708888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.708912] ? __kthread_parkme+0x82/0x180 [ 15.708933] ? preempt_count_sub+0x50/0x80 [ 15.708956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.708981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.709029] kthread+0x337/0x6f0 [ 15.709049] ? trace_preempt_on+0x20/0xc0 [ 15.709072] ? __pfx_kthread+0x10/0x10 [ 15.709114] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.709136] ? calculate_sigpending+0x7b/0xa0 [ 15.709160] ? __pfx_kthread+0x10/0x10 [ 15.709195] ret_from_fork+0x116/0x1d0 [ 15.709215] ? __pfx_kthread+0x10/0x10 [ 15.709247] ret_from_fork_asm+0x1a/0x30 [ 15.709277] </TASK> [ 15.709288] [ 15.717202] Allocated by task 282: [ 15.717386] kasan_save_stack+0x45/0x70 [ 15.717567] kasan_save_track+0x18/0x40 [ 15.717726] kasan_save_alloc_info+0x3b/0x50 [ 15.717976] __kasan_kmalloc+0xb7/0xc0 [ 15.718187] __kmalloc_cache_noprof+0x189/0x420 [ 15.718384] kasan_atomics+0x95/0x310 [ 15.718566] kunit_try_run_case+0x1a5/0x480 [ 15.718777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.719004] kthread+0x337/0x6f0 [ 15.719260] ret_from_fork+0x116/0x1d0 [ 15.719405] ret_from_fork_asm+0x1a/0x30 [ 15.719548] [ 15.719621] The buggy address belongs to the object at ffff8881025e4100 [ 15.719621] which belongs to the cache kmalloc-64 of size 64 [ 15.719992] The buggy address is located 0 bytes to the right of [ 15.719992] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.720905] [ 15.721030] The buggy address belongs to the physical page: [ 15.721318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.721696] flags: 0x200000000000000(node=0|zone=2) [ 15.721874] page_type: f5(slab) [ 15.721996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.722612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.722998] page dumped because: kasan: bad access detected [ 15.723297] [ 15.723389] Memory state around the buggy address: [ 15.723632] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.723925] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.724256] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.724550] ^ [ 15.724781] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.725115] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.725417] ================================================================== [ 15.840691] ================================================================== [ 15.842031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.842572] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.842805] [ 15.842906] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.842952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.842966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.842988] Call Trace: [ 15.843005] <TASK> [ 15.843022] dump_stack_lvl+0x73/0xb0 [ 15.843051] print_report+0xd1/0x610 [ 15.843075] ? __virt_addr_valid+0x1db/0x2d0 [ 15.843098] ? kasan_atomics_helper+0x1818/0x5450 [ 15.843120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.843143] ? kasan_atomics_helper+0x1818/0x5450 [ 15.843166] kasan_report+0x141/0x180 [ 15.843188] ? kasan_atomics_helper+0x1818/0x5450 [ 15.843216] kasan_check_range+0x10c/0x1c0 [ 15.843289] __kasan_check_write+0x18/0x20 [ 15.843311] kasan_atomics_helper+0x1818/0x5450 [ 15.843334] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.843408] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.843435] ? kasan_atomics+0x152/0x310 [ 15.843473] kasan_atomics+0x1dc/0x310 [ 15.843497] ? __pfx_kasan_atomics+0x10/0x10 [ 15.843522] ? __pfx_read_tsc+0x10/0x10 [ 15.843545] ? ktime_get_ts64+0x86/0x230 [ 15.843570] kunit_try_run_case+0x1a5/0x480 [ 15.843596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.843620] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.843645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.843715] ? __kthread_parkme+0x82/0x180 [ 15.843736] ? preempt_count_sub+0x50/0x80 [ 15.843770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.843794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.843827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.843851] kthread+0x337/0x6f0 [ 15.843872] ? trace_preempt_on+0x20/0xc0 [ 15.843895] ? __pfx_kthread+0x10/0x10 [ 15.843917] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.843939] ? calculate_sigpending+0x7b/0xa0 [ 15.843963] ? __pfx_kthread+0x10/0x10 [ 15.843986] ret_from_fork+0x116/0x1d0 [ 15.844005] ? __pfx_kthread+0x10/0x10 [ 15.844026] ret_from_fork_asm+0x1a/0x30 [ 15.844056] </TASK> [ 15.844068] [ 15.857784] Allocated by task 282: [ 15.857970] kasan_save_stack+0x45/0x70 [ 15.858561] kasan_save_track+0x18/0x40 [ 15.858760] kasan_save_alloc_info+0x3b/0x50 [ 15.858975] __kasan_kmalloc+0xb7/0xc0 [ 15.859486] __kmalloc_cache_noprof+0x189/0x420 [ 15.859727] kasan_atomics+0x95/0x310 [ 15.859912] kunit_try_run_case+0x1a5/0x480 [ 15.860337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.860773] kthread+0x337/0x6f0 [ 15.861039] ret_from_fork+0x116/0x1d0 [ 15.861364] ret_from_fork_asm+0x1a/0x30 [ 15.861547] [ 15.861641] The buggy address belongs to the object at ffff8881025e4100 [ 15.861641] which belongs to the cache kmalloc-64 of size 64 [ 15.862054] The buggy address is located 0 bytes to the right of [ 15.862054] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.862711] [ 15.862788] The buggy address belongs to the physical page: [ 15.863049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.863437] flags: 0x200000000000000(node=0|zone=2) [ 15.863647] page_type: f5(slab) [ 15.863808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.864173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.864527] page dumped because: kasan: bad access detected [ 15.864772] [ 15.864884] Memory state around the buggy address: [ 15.865104] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.865428] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.865646] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.866166] ^ [ 15.866396] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.866685] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.866922] ================================================================== [ 15.315425] ================================================================== [ 15.315707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.315954] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.316182] [ 15.316270] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.316313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.316326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.316349] Call Trace: [ 15.316368] <TASK> [ 15.316383] dump_stack_lvl+0x73/0xb0 [ 15.316412] print_report+0xd1/0x610 [ 15.316557] ? __virt_addr_valid+0x1db/0x2d0 [ 15.316584] ? kasan_atomics_helper+0xc70/0x5450 [ 15.316607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.316631] ? kasan_atomics_helper+0xc70/0x5450 [ 15.316655] kasan_report+0x141/0x180 [ 15.316678] ? kasan_atomics_helper+0xc70/0x5450 [ 15.316705] kasan_check_range+0x10c/0x1c0 [ 15.316730] __kasan_check_write+0x18/0x20 [ 15.316750] kasan_atomics_helper+0xc70/0x5450 [ 15.316773] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.316796] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.316835] ? kasan_atomics+0x152/0x310 [ 15.316867] kasan_atomics+0x1dc/0x310 [ 15.316891] ? __pfx_kasan_atomics+0x10/0x10 [ 15.316916] ? __pfx_read_tsc+0x10/0x10 [ 15.316938] ? ktime_get_ts64+0x86/0x230 [ 15.316963] kunit_try_run_case+0x1a5/0x480 [ 15.316988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.317012] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.317037] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.317061] ? __kthread_parkme+0x82/0x180 [ 15.317082] ? preempt_count_sub+0x50/0x80 [ 15.317115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.317140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.317166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.317191] kthread+0x337/0x6f0 [ 15.317211] ? trace_preempt_on+0x20/0xc0 [ 15.317235] ? __pfx_kthread+0x10/0x10 [ 15.317256] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.317278] ? calculate_sigpending+0x7b/0xa0 [ 15.317304] ? __pfx_kthread+0x10/0x10 [ 15.317326] ret_from_fork+0x116/0x1d0 [ 15.317346] ? __pfx_kthread+0x10/0x10 [ 15.317367] ret_from_fork_asm+0x1a/0x30 [ 15.317398] </TASK> [ 15.317409] [ 15.325145] Allocated by task 282: [ 15.325514] kasan_save_stack+0x45/0x70 [ 15.325668] kasan_save_track+0x18/0x40 [ 15.325807] kasan_save_alloc_info+0x3b/0x50 [ 15.326033] __kasan_kmalloc+0xb7/0xc0 [ 15.326383] __kmalloc_cache_noprof+0x189/0x420 [ 15.326575] kasan_atomics+0x95/0x310 [ 15.326730] kunit_try_run_case+0x1a5/0x480 [ 15.326892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.327072] kthread+0x337/0x6f0 [ 15.327196] ret_from_fork+0x116/0x1d0 [ 15.327333] ret_from_fork_asm+0x1a/0x30 [ 15.327475] [ 15.327547] The buggy address belongs to the object at ffff8881025e4100 [ 15.327547] which belongs to the cache kmalloc-64 of size 64 [ 15.327960] The buggy address is located 0 bytes to the right of [ 15.327960] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.328518] [ 15.328630] The buggy address belongs to the physical page: [ 15.328901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.329489] flags: 0x200000000000000(node=0|zone=2) [ 15.329730] page_type: f5(slab) [ 15.329912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.330339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.330654] page dumped because: kasan: bad access detected [ 15.330880] [ 15.330982] Memory state around the buggy address: [ 15.331219] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.331532] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.331753] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.332060] ^ [ 15.332514] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.332733] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.332964] ================================================================== [ 16.242669] ================================================================== [ 16.243007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.243418] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.243753] [ 16.243888] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.243935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.243947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.243969] Call Trace: [ 16.243987] <TASK> [ 16.244003] dump_stack_lvl+0x73/0xb0 [ 16.244061] print_report+0xd1/0x610 [ 16.244105] ? __virt_addr_valid+0x1db/0x2d0 [ 16.244127] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.244149] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.244201] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.244223] kasan_report+0x141/0x180 [ 16.244246] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.244274] __asan_report_load8_noabort+0x18/0x20 [ 16.244300] kasan_atomics_helper+0x4fa5/0x5450 [ 16.244350] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.244373] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.244397] ? kasan_atomics+0x152/0x310 [ 16.244425] kasan_atomics+0x1dc/0x310 [ 16.244448] ? __pfx_kasan_atomics+0x10/0x10 [ 16.244473] ? __pfx_read_tsc+0x10/0x10 [ 16.244523] ? ktime_get_ts64+0x86/0x230 [ 16.244547] kunit_try_run_case+0x1a5/0x480 [ 16.244572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.244595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.244619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.244670] ? __kthread_parkme+0x82/0x180 [ 16.244692] ? preempt_count_sub+0x50/0x80 [ 16.244715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.244740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.244764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.244788] kthread+0x337/0x6f0 [ 16.244809] ? trace_preempt_on+0x20/0xc0 [ 16.244841] ? __pfx_kthread+0x10/0x10 [ 16.244866] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.244889] ? calculate_sigpending+0x7b/0xa0 [ 16.244913] ? __pfx_kthread+0x10/0x10 [ 16.244936] ret_from_fork+0x116/0x1d0 [ 16.244955] ? __pfx_kthread+0x10/0x10 [ 16.244977] ret_from_fork_asm+0x1a/0x30 [ 16.245008] </TASK> [ 16.245019] [ 16.252798] Allocated by task 282: [ 16.253272] kasan_save_stack+0x45/0x70 [ 16.253425] kasan_save_track+0x18/0x40 [ 16.253600] kasan_save_alloc_info+0x3b/0x50 [ 16.254739] __kasan_kmalloc+0xb7/0xc0 [ 16.254955] __kmalloc_cache_noprof+0x189/0x420 [ 16.255268] kasan_atomics+0x95/0x310 [ 16.255549] kunit_try_run_case+0x1a5/0x480 [ 16.256040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.256646] kthread+0x337/0x6f0 [ 16.257105] ret_from_fork+0x116/0x1d0 [ 16.257562] ret_from_fork_asm+0x1a/0x30 [ 16.258031] [ 16.258342] The buggy address belongs to the object at ffff8881025e4100 [ 16.258342] which belongs to the cache kmalloc-64 of size 64 [ 16.259585] The buggy address is located 0 bytes to the right of [ 16.259585] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.260384] [ 16.260669] The buggy address belongs to the physical page: [ 16.261281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.261526] flags: 0x200000000000000(node=0|zone=2) [ 16.261689] page_type: f5(slab) [ 16.261824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.262053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.263120] page dumped because: kasan: bad access detected [ 16.263711] [ 16.263998] Memory state around the buggy address: [ 16.264553] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.265321] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.266048] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.266596] ^ [ 16.266758] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.267068] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.267575] ================================================================== [ 15.891483] ================================================================== [ 15.891811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.892305] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.892679] [ 15.892778] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.892835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.892853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.892875] Call Trace: [ 15.892891] <TASK> [ 15.892907] dump_stack_lvl+0x73/0xb0 [ 15.892937] print_report+0xd1/0x610 [ 15.892960] ? __virt_addr_valid+0x1db/0x2d0 [ 15.892982] ? kasan_atomics_helper+0x194a/0x5450 [ 15.893004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.893027] ? kasan_atomics_helper+0x194a/0x5450 [ 15.893049] kasan_report+0x141/0x180 [ 15.893073] ? kasan_atomics_helper+0x194a/0x5450 [ 15.893349] kasan_check_range+0x10c/0x1c0 [ 15.893380] __kasan_check_write+0x18/0x20 [ 15.893401] kasan_atomics_helper+0x194a/0x5450 [ 15.893424] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.893448] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.893474] ? kasan_atomics+0x152/0x310 [ 15.893502] kasan_atomics+0x1dc/0x310 [ 15.893526] ? __pfx_kasan_atomics+0x10/0x10 [ 15.893551] ? __pfx_read_tsc+0x10/0x10 [ 15.893572] ? ktime_get_ts64+0x86/0x230 [ 15.893597] kunit_try_run_case+0x1a5/0x480 [ 15.893622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.893646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.893670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.893695] ? __kthread_parkme+0x82/0x180 [ 15.893717] ? preempt_count_sub+0x50/0x80 [ 15.893744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.893769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.893794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.893828] kthread+0x337/0x6f0 [ 15.893850] ? trace_preempt_on+0x20/0xc0 [ 15.893873] ? __pfx_kthread+0x10/0x10 [ 15.893894] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.893918] ? calculate_sigpending+0x7b/0xa0 [ 15.893942] ? __pfx_kthread+0x10/0x10 [ 15.893965] ret_from_fork+0x116/0x1d0 [ 15.893985] ? __pfx_kthread+0x10/0x10 [ 15.894008] ret_from_fork_asm+0x1a/0x30 [ 15.894039] </TASK> [ 15.894050] [ 15.904921] Allocated by task 282: [ 15.905112] kasan_save_stack+0x45/0x70 [ 15.905731] kasan_save_track+0x18/0x40 [ 15.906034] kasan_save_alloc_info+0x3b/0x50 [ 15.906231] __kasan_kmalloc+0xb7/0xc0 [ 15.906423] __kmalloc_cache_noprof+0x189/0x420 [ 15.906633] kasan_atomics+0x95/0x310 [ 15.906811] kunit_try_run_case+0x1a5/0x480 [ 15.907018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.907592] kthread+0x337/0x6f0 [ 15.907742] ret_from_fork+0x116/0x1d0 [ 15.908160] ret_from_fork_asm+0x1a/0x30 [ 15.908482] [ 15.908587] The buggy address belongs to the object at ffff8881025e4100 [ 15.908587] which belongs to the cache kmalloc-64 of size 64 [ 15.909178] The buggy address is located 0 bytes to the right of [ 15.909178] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.909566] [ 15.909648] The buggy address belongs to the physical page: [ 15.909837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.910352] flags: 0x200000000000000(node=0|zone=2) [ 15.910527] page_type: f5(slab) [ 15.910652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.911058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.911750] page dumped because: kasan: bad access detected [ 15.912276] [ 15.912436] Memory state around the buggy address: [ 15.912889] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.913488] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.913710] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.913936] ^ [ 15.914134] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.914780] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915429] ================================================================== [ 15.437935] ================================================================== [ 15.438548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.438846] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.439122] [ 15.439231] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.439273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.439286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.439307] Call Trace: [ 15.439320] <TASK> [ 15.439334] dump_stack_lvl+0x73/0xb0 [ 15.439360] print_report+0xd1/0x610 [ 15.439384] ? __virt_addr_valid+0x1db/0x2d0 [ 15.439411] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.439434] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.439459] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.439483] kasan_report+0x141/0x180 [ 15.439506] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.439534] kasan_check_range+0x10c/0x1c0 [ 15.439559] __kasan_check_write+0x18/0x20 [ 15.439579] kasan_atomics_helper+0xfa9/0x5450 [ 15.439602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.439624] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.439650] ? kasan_atomics+0x152/0x310 [ 15.439679] kasan_atomics+0x1dc/0x310 [ 15.439703] ? __pfx_kasan_atomics+0x10/0x10 [ 15.439729] ? __pfx_read_tsc+0x10/0x10 [ 15.439749] ? ktime_get_ts64+0x86/0x230 [ 15.439773] kunit_try_run_case+0x1a5/0x480 [ 15.439798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.439831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.439856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.439880] ? __kthread_parkme+0x82/0x180 [ 15.439900] ? preempt_count_sub+0x50/0x80 [ 15.439924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.439948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.439973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.439996] kthread+0x337/0x6f0 [ 15.440017] ? trace_preempt_on+0x20/0xc0 [ 15.440041] ? __pfx_kthread+0x10/0x10 [ 15.440062] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.440084] ? calculate_sigpending+0x7b/0xa0 [ 15.440120] ? __pfx_kthread+0x10/0x10 [ 15.440143] ret_from_fork+0x116/0x1d0 [ 15.440162] ? __pfx_kthread+0x10/0x10 [ 15.440183] ret_from_fork_asm+0x1a/0x30 [ 15.440213] </TASK> [ 15.440225] [ 15.447965] Allocated by task 282: [ 15.448195] kasan_save_stack+0x45/0x70 [ 15.448380] kasan_save_track+0x18/0x40 [ 15.448594] kasan_save_alloc_info+0x3b/0x50 [ 15.448787] __kasan_kmalloc+0xb7/0xc0 [ 15.448969] __kmalloc_cache_noprof+0x189/0x420 [ 15.449219] kasan_atomics+0x95/0x310 [ 15.449408] kunit_try_run_case+0x1a5/0x480 [ 15.449797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.450036] kthread+0x337/0x6f0 [ 15.450206] ret_from_fork+0x116/0x1d0 [ 15.450375] ret_from_fork_asm+0x1a/0x30 [ 15.450578] [ 15.450691] The buggy address belongs to the object at ffff8881025e4100 [ 15.450691] which belongs to the cache kmalloc-64 of size 64 [ 15.451196] The buggy address is located 0 bytes to the right of [ 15.451196] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.451628] [ 15.451703] The buggy address belongs to the physical page: [ 15.451888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.452238] flags: 0x200000000000000(node=0|zone=2) [ 15.452474] page_type: f5(slab) [ 15.452641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.452999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.453502] page dumped because: kasan: bad access detected [ 15.453759] [ 15.453860] Memory state around the buggy address: [ 15.454031] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.454251] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.454471] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.454788] ^ [ 15.455029] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.455450] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.455924] ================================================================== [ 15.567473] ================================================================== [ 15.567836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.568171] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.568505] [ 15.568608] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.568652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.568665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.568687] Call Trace: [ 15.568705] <TASK> [ 15.568722] dump_stack_lvl+0x73/0xb0 [ 15.568750] print_report+0xd1/0x610 [ 15.568772] ? __virt_addr_valid+0x1db/0x2d0 [ 15.568795] ? kasan_atomics_helper+0x1217/0x5450 [ 15.568828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.568856] ? kasan_atomics_helper+0x1217/0x5450 [ 15.568878] kasan_report+0x141/0x180 [ 15.568901] ? kasan_atomics_helper+0x1217/0x5450 [ 15.568928] kasan_check_range+0x10c/0x1c0 [ 15.568952] __kasan_check_write+0x18/0x20 [ 15.568972] kasan_atomics_helper+0x1217/0x5450 [ 15.568997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.569019] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.569046] ? kasan_atomics+0x152/0x310 [ 15.569073] kasan_atomics+0x1dc/0x310 [ 15.569108] ? __pfx_kasan_atomics+0x10/0x10 [ 15.569133] ? __pfx_read_tsc+0x10/0x10 [ 15.569155] ? ktime_get_ts64+0x86/0x230 [ 15.569179] kunit_try_run_case+0x1a5/0x480 [ 15.569215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.569239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.569274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.569307] ? __kthread_parkme+0x82/0x180 [ 15.569328] ? preempt_count_sub+0x50/0x80 [ 15.569352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.569388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.569413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.569438] kthread+0x337/0x6f0 [ 15.569459] ? trace_preempt_on+0x20/0xc0 [ 15.569482] ? __pfx_kthread+0x10/0x10 [ 15.569503] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.569526] ? calculate_sigpending+0x7b/0xa0 [ 15.569550] ? __pfx_kthread+0x10/0x10 [ 15.569573] ret_from_fork+0x116/0x1d0 [ 15.569601] ? __pfx_kthread+0x10/0x10 [ 15.569623] ret_from_fork_asm+0x1a/0x30 [ 15.569654] </TASK> [ 15.569676] [ 15.577616] Allocated by task 282: [ 15.577800] kasan_save_stack+0x45/0x70 [ 15.578010] kasan_save_track+0x18/0x40 [ 15.578229] kasan_save_alloc_info+0x3b/0x50 [ 15.578410] __kasan_kmalloc+0xb7/0xc0 [ 15.578625] __kmalloc_cache_noprof+0x189/0x420 [ 15.578822] kasan_atomics+0x95/0x310 [ 15.579020] kunit_try_run_case+0x1a5/0x480 [ 15.579174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.579350] kthread+0x337/0x6f0 [ 15.579473] ret_from_fork+0x116/0x1d0 [ 15.579608] ret_from_fork_asm+0x1a/0x30 [ 15.579750] [ 15.579834] The buggy address belongs to the object at ffff8881025e4100 [ 15.579834] which belongs to the cache kmalloc-64 of size 64 [ 15.580189] The buggy address is located 0 bytes to the right of [ 15.580189] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.580912] [ 15.581034] The buggy address belongs to the physical page: [ 15.581564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.581926] flags: 0x200000000000000(node=0|zone=2) [ 15.582160] page_type: f5(slab) [ 15.582326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.582743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.582990] page dumped because: kasan: bad access detected [ 15.583387] [ 15.583484] Memory state around the buggy address: [ 15.583712] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.584026] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.584453] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.584748] ^ [ 15.584923] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.585142] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.585694] ================================================================== [ 16.078568] ================================================================== [ 16.078865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.079099] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.079577] [ 16.079699] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.079742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.079755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.079776] Call Trace: [ 16.079792] <TASK> [ 16.079808] dump_stack_lvl+0x73/0xb0 [ 16.079847] print_report+0xd1/0x610 [ 16.079869] ? __virt_addr_valid+0x1db/0x2d0 [ 16.079892] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.079914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.079937] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.079960] kasan_report+0x141/0x180 [ 16.079983] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.080009] kasan_check_range+0x10c/0x1c0 [ 16.080034] __kasan_check_write+0x18/0x20 [ 16.080054] kasan_atomics_helper+0x1eaa/0x5450 [ 16.080078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.080111] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.080136] ? kasan_atomics+0x152/0x310 [ 16.080164] kasan_atomics+0x1dc/0x310 [ 16.080187] ? __pfx_kasan_atomics+0x10/0x10 [ 16.080212] ? __pfx_read_tsc+0x10/0x10 [ 16.080234] ? ktime_get_ts64+0x86/0x230 [ 16.080259] kunit_try_run_case+0x1a5/0x480 [ 16.080284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.080308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.080333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.080358] ? __kthread_parkme+0x82/0x180 [ 16.080378] ? preempt_count_sub+0x50/0x80 [ 16.080403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.080427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.080452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.080477] kthread+0x337/0x6f0 [ 16.080498] ? trace_preempt_on+0x20/0xc0 [ 16.080522] ? __pfx_kthread+0x10/0x10 [ 16.080545] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.080567] ? calculate_sigpending+0x7b/0xa0 [ 16.080592] ? __pfx_kthread+0x10/0x10 [ 16.080614] ret_from_fork+0x116/0x1d0 [ 16.080634] ? __pfx_kthread+0x10/0x10 [ 16.080656] ret_from_fork_asm+0x1a/0x30 [ 16.080687] </TASK> [ 16.080698] [ 16.088301] Allocated by task 282: [ 16.088480] kasan_save_stack+0x45/0x70 [ 16.088667] kasan_save_track+0x18/0x40 [ 16.088858] kasan_save_alloc_info+0x3b/0x50 [ 16.089070] __kasan_kmalloc+0xb7/0xc0 [ 16.089223] __kmalloc_cache_noprof+0x189/0x420 [ 16.089427] kasan_atomics+0x95/0x310 [ 16.089599] kunit_try_run_case+0x1a5/0x480 [ 16.089780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.090001] kthread+0x337/0x6f0 [ 16.090203] ret_from_fork+0x116/0x1d0 [ 16.090339] ret_from_fork_asm+0x1a/0x30 [ 16.090479] [ 16.090551] The buggy address belongs to the object at ffff8881025e4100 [ 16.090551] which belongs to the cache kmalloc-64 of size 64 [ 16.090992] The buggy address is located 0 bytes to the right of [ 16.090992] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.091790] [ 16.091873] The buggy address belongs to the physical page: [ 16.092047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.092667] flags: 0x200000000000000(node=0|zone=2) [ 16.092868] page_type: f5(slab) [ 16.092994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.093392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.093739] page dumped because: kasan: bad access detected [ 16.094015] [ 16.094112] Memory state around the buggy address: [ 16.094322] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.094650] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.094960] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.095178] ^ [ 16.095490] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.095789] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.096095] ================================================================== [ 15.333542] ================================================================== [ 15.333904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.334468] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.334759] [ 15.334875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.334917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.334931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.334952] Call Trace: [ 15.334967] <TASK> [ 15.334981] dump_stack_lvl+0x73/0xb0 [ 15.335009] print_report+0xd1/0x610 [ 15.335031] ? __virt_addr_valid+0x1db/0x2d0 [ 15.335054] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.335076] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.335099] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.335122] kasan_report+0x141/0x180 [ 15.335144] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.335171] __asan_report_load4_noabort+0x18/0x20 [ 15.335196] kasan_atomics_helper+0x4a84/0x5450 [ 15.335219] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.335242] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.335267] ? kasan_atomics+0x152/0x310 [ 15.335294] kasan_atomics+0x1dc/0x310 [ 15.335317] ? __pfx_kasan_atomics+0x10/0x10 [ 15.335342] ? __pfx_read_tsc+0x10/0x10 [ 15.335364] ? ktime_get_ts64+0x86/0x230 [ 15.335388] kunit_try_run_case+0x1a5/0x480 [ 15.335412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.335436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.335460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.335484] ? __kthread_parkme+0x82/0x180 [ 15.335505] ? preempt_count_sub+0x50/0x80 [ 15.335529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.335554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.335589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.335614] kthread+0x337/0x6f0 [ 15.335635] ? trace_preempt_on+0x20/0xc0 [ 15.335659] ? __pfx_kthread+0x10/0x10 [ 15.335680] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.335703] ? calculate_sigpending+0x7b/0xa0 [ 15.335727] ? __pfx_kthread+0x10/0x10 [ 15.335749] ret_from_fork+0x116/0x1d0 [ 15.335769] ? __pfx_kthread+0x10/0x10 [ 15.335790] ret_from_fork_asm+0x1a/0x30 [ 15.335831] </TASK> [ 15.335845] [ 15.344545] Allocated by task 282: [ 15.344859] kasan_save_stack+0x45/0x70 [ 15.345286] kasan_save_track+0x18/0x40 [ 15.345547] kasan_save_alloc_info+0x3b/0x50 [ 15.345706] __kasan_kmalloc+0xb7/0xc0 [ 15.345863] __kmalloc_cache_noprof+0x189/0x420 [ 15.346733] kasan_atomics+0x95/0x310 [ 15.346944] kunit_try_run_case+0x1a5/0x480 [ 15.347349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.347941] kthread+0x337/0x6f0 [ 15.348077] ret_from_fork+0x116/0x1d0 [ 15.348285] ret_from_fork_asm+0x1a/0x30 [ 15.348467] [ 15.348564] The buggy address belongs to the object at ffff8881025e4100 [ 15.348564] which belongs to the cache kmalloc-64 of size 64 [ 15.349075] The buggy address is located 0 bytes to the right of [ 15.349075] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.349918] [ 15.350089] The buggy address belongs to the physical page: [ 15.350398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.350779] flags: 0x200000000000000(node=0|zone=2) [ 15.351090] page_type: f5(slab) [ 15.351263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.351672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.352085] page dumped because: kasan: bad access detected [ 15.352303] [ 15.352400] Memory state around the buggy address: [ 15.352603] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.352929] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.353503] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.353874] ^ [ 15.354104] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.354527] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.354891] ================================================================== [ 15.013368] ================================================================== [ 15.013657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.013979] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.014313] [ 15.014415] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.014458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.014470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.014491] Call Trace: [ 15.014504] <TASK> [ 15.014517] dump_stack_lvl+0x73/0xb0 [ 15.014545] print_report+0xd1/0x610 [ 15.014566] ? __virt_addr_valid+0x1db/0x2d0 [ 15.014586] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.014607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.014629] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.014649] kasan_report+0x141/0x180 [ 15.014671] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.014696] __asan_report_store4_noabort+0x1b/0x30 [ 15.014720] kasan_atomics_helper+0x4b6e/0x5450 [ 15.014742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.014762] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.014786] ? kasan_atomics+0x152/0x310 [ 15.014824] kasan_atomics+0x1dc/0x310 [ 15.014845] ? __pfx_kasan_atomics+0x10/0x10 [ 15.014869] ? __pfx_read_tsc+0x10/0x10 [ 15.014888] ? ktime_get_ts64+0x86/0x230 [ 15.014911] kunit_try_run_case+0x1a5/0x480 [ 15.014935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.014956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.014979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.015003] ? __kthread_parkme+0x82/0x180 [ 15.015126] ? preempt_count_sub+0x50/0x80 [ 15.015152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.015219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.015243] kthread+0x337/0x6f0 [ 15.015263] ? trace_preempt_on+0x20/0xc0 [ 15.015433] ? __pfx_kthread+0x10/0x10 [ 15.015459] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.015482] ? calculate_sigpending+0x7b/0xa0 [ 15.015506] ? __pfx_kthread+0x10/0x10 [ 15.015529] ret_from_fork+0x116/0x1d0 [ 15.015548] ? __pfx_kthread+0x10/0x10 [ 15.015569] ret_from_fork_asm+0x1a/0x30 [ 15.015600] </TASK> [ 15.015612] [ 15.023293] Allocated by task 282: [ 15.023479] kasan_save_stack+0x45/0x70 [ 15.023626] kasan_save_track+0x18/0x40 [ 15.023765] kasan_save_alloc_info+0x3b/0x50 [ 15.023929] __kasan_kmalloc+0xb7/0xc0 [ 15.024093] __kmalloc_cache_noprof+0x189/0x420 [ 15.024323] kasan_atomics+0x95/0x310 [ 15.024511] kunit_try_run_case+0x1a5/0x480 [ 15.024717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.024986] kthread+0x337/0x6f0 [ 15.025153] ret_from_fork+0x116/0x1d0 [ 15.025339] ret_from_fork_asm+0x1a/0x30 [ 15.025481] [ 15.025554] The buggy address belongs to the object at ffff8881025e4100 [ 15.025554] which belongs to the cache kmalloc-64 of size 64 [ 15.026106] The buggy address is located 0 bytes to the right of [ 15.026106] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.026530] [ 15.026603] The buggy address belongs to the physical page: [ 15.026776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.027027] flags: 0x200000000000000(node=0|zone=2) [ 15.027321] page_type: f5(slab) [ 15.027487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.027836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.028269] page dumped because: kasan: bad access detected [ 15.028524] [ 15.028617] Memory state around the buggy address: [ 15.028838] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.029060] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.029395] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.029710] ^ [ 15.029926] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.030224] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.030454] ================================================================== [ 15.787347] ================================================================== [ 15.787677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.788087] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.788768] [ 15.788903] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.788961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.788975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.788997] Call Trace: [ 15.789013] <TASK> [ 15.789028] dump_stack_lvl+0x73/0xb0 [ 15.789066] print_report+0xd1/0x610 [ 15.789089] ? __virt_addr_valid+0x1db/0x2d0 [ 15.789123] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.789157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.789189] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.789212] kasan_report+0x141/0x180 [ 15.789235] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.789272] kasan_check_range+0x10c/0x1c0 [ 15.789296] __kasan_check_write+0x18/0x20 [ 15.789316] kasan_atomics_helper+0x16e7/0x5450 [ 15.789339] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.789361] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.789387] ? kasan_atomics+0x152/0x310 [ 15.789414] kasan_atomics+0x1dc/0x310 [ 15.789437] ? __pfx_kasan_atomics+0x10/0x10 [ 15.790009] ? __pfx_read_tsc+0x10/0x10 [ 15.790042] ? ktime_get_ts64+0x86/0x230 [ 15.790081] kunit_try_run_case+0x1a5/0x480 [ 15.790122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.790577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.790615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.790654] ? __kthread_parkme+0x82/0x180 [ 15.790675] ? preempt_count_sub+0x50/0x80 [ 15.790699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.790997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.791023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.791047] kthread+0x337/0x6f0 [ 15.791069] ? trace_preempt_on+0x20/0xc0 [ 15.791092] ? __pfx_kthread+0x10/0x10 [ 15.791114] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.791136] ? calculate_sigpending+0x7b/0xa0 [ 15.791160] ? __pfx_kthread+0x10/0x10 [ 15.791182] ret_from_fork+0x116/0x1d0 [ 15.791201] ? __pfx_kthread+0x10/0x10 [ 15.791222] ret_from_fork_asm+0x1a/0x30 [ 15.791253] </TASK> [ 15.791264] [ 15.802069] Allocated by task 282: [ 15.802240] kasan_save_stack+0x45/0x70 [ 15.802446] kasan_save_track+0x18/0x40 [ 15.802630] kasan_save_alloc_info+0x3b/0x50 [ 15.802838] __kasan_kmalloc+0xb7/0xc0 [ 15.803022] __kmalloc_cache_noprof+0x189/0x420 [ 15.803507] kasan_atomics+0x95/0x310 [ 15.803777] kunit_try_run_case+0x1a5/0x480 [ 15.803969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804346] kthread+0x337/0x6f0 [ 15.804511] ret_from_fork+0x116/0x1d0 [ 15.804844] ret_from_fork_asm+0x1a/0x30 [ 15.805129] [ 15.805294] The buggy address belongs to the object at ffff8881025e4100 [ 15.805294] which belongs to the cache kmalloc-64 of size 64 [ 15.805800] The buggy address is located 0 bytes to the right of [ 15.805800] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.806531] [ 15.806803] The buggy address belongs to the physical page: [ 15.807053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.807529] flags: 0x200000000000000(node=0|zone=2) [ 15.807864] page_type: f5(slab) [ 15.808033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.808552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.808887] page dumped because: kasan: bad access detected [ 15.809294] [ 15.809387] Memory state around the buggy address: [ 15.809578] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.810013] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.810405] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.810843] ^ [ 15.811047] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.811650] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.812024] ================================================================== [ 15.669255] ================================================================== [ 15.669998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.670836] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.671424] [ 15.671540] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.671586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.671599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.671622] Call Trace: [ 15.671636] <TASK> [ 15.671652] dump_stack_lvl+0x73/0xb0 [ 15.671682] print_report+0xd1/0x610 [ 15.671706] ? __virt_addr_valid+0x1db/0x2d0 [ 15.671730] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.671752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.671775] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.671799] kasan_report+0x141/0x180 [ 15.671836] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.671863] __asan_report_load8_noabort+0x18/0x20 [ 15.671888] kasan_atomics_helper+0x4eae/0x5450 [ 15.671912] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.671936] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.671961] ? kasan_atomics+0x152/0x310 [ 15.671988] kasan_atomics+0x1dc/0x310 [ 15.672011] ? __pfx_kasan_atomics+0x10/0x10 [ 15.672049] ? __pfx_read_tsc+0x10/0x10 [ 15.672071] ? ktime_get_ts64+0x86/0x230 [ 15.672095] kunit_try_run_case+0x1a5/0x480 [ 15.672132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.672156] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.672181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.672216] ? __kthread_parkme+0x82/0x180 [ 15.672236] ? preempt_count_sub+0x50/0x80 [ 15.672260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.672285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.672309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.672333] kthread+0x337/0x6f0 [ 15.672354] ? trace_preempt_on+0x20/0xc0 [ 15.672377] ? __pfx_kthread+0x10/0x10 [ 15.672398] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.672421] ? calculate_sigpending+0x7b/0xa0 [ 15.672445] ? __pfx_kthread+0x10/0x10 [ 15.672467] ret_from_fork+0x116/0x1d0 [ 15.672486] ? __pfx_kthread+0x10/0x10 [ 15.672507] ret_from_fork_asm+0x1a/0x30 [ 15.672537] </TASK> [ 15.672549] [ 15.680087] Allocated by task 282: [ 15.680419] kasan_save_stack+0x45/0x70 [ 15.680618] kasan_save_track+0x18/0x40 [ 15.680872] kasan_save_alloc_info+0x3b/0x50 [ 15.681023] __kasan_kmalloc+0xb7/0xc0 [ 15.681158] __kmalloc_cache_noprof+0x189/0x420 [ 15.681359] kasan_atomics+0x95/0x310 [ 15.681551] kunit_try_run_case+0x1a5/0x480 [ 15.681784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.682074] kthread+0x337/0x6f0 [ 15.682257] ret_from_fork+0x116/0x1d0 [ 15.682447] ret_from_fork_asm+0x1a/0x30 [ 15.682647] [ 15.682769] The buggy address belongs to the object at ffff8881025e4100 [ 15.682769] which belongs to the cache kmalloc-64 of size 64 [ 15.683364] The buggy address is located 0 bytes to the right of [ 15.683364] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.683920] [ 15.684021] The buggy address belongs to the physical page: [ 15.684370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.684710] flags: 0x200000000000000(node=0|zone=2) [ 15.684949] page_type: f5(slab) [ 15.685138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.685474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.685778] page dumped because: kasan: bad access detected [ 15.686076] [ 15.686158] Memory state around the buggy address: [ 15.686382] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.686678] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.687004] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.687331] ^ [ 15.687492] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687712] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.688066] ================================================================== [ 16.268630] ================================================================== [ 16.268971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.269529] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.270337] [ 16.270480] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.270527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.270540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.270562] Call Trace: [ 16.270578] <TASK> [ 16.270593] dump_stack_lvl+0x73/0xb0 [ 16.270623] print_report+0xd1/0x610 [ 16.270645] ? __virt_addr_valid+0x1db/0x2d0 [ 16.270668] ? kasan_atomics_helper+0x224c/0x5450 [ 16.270690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.270712] ? kasan_atomics_helper+0x224c/0x5450 [ 16.270734] kasan_report+0x141/0x180 [ 16.270757] ? kasan_atomics_helper+0x224c/0x5450 [ 16.270784] kasan_check_range+0x10c/0x1c0 [ 16.270809] __kasan_check_write+0x18/0x20 [ 16.270876] kasan_atomics_helper+0x224c/0x5450 [ 16.270900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.270922] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.270947] ? kasan_atomics+0x152/0x310 [ 16.270975] kasan_atomics+0x1dc/0x310 [ 16.270998] ? __pfx_kasan_atomics+0x10/0x10 [ 16.271023] ? __pfx_read_tsc+0x10/0x10 [ 16.271044] ? ktime_get_ts64+0x86/0x230 [ 16.271069] kunit_try_run_case+0x1a5/0x480 [ 16.271117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.271142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.271167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.271192] ? __kthread_parkme+0x82/0x180 [ 16.271214] ? preempt_count_sub+0x50/0x80 [ 16.271238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.271263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.271286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.271311] kthread+0x337/0x6f0 [ 16.271331] ? trace_preempt_on+0x20/0xc0 [ 16.271355] ? __pfx_kthread+0x10/0x10 [ 16.271377] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.271399] ? calculate_sigpending+0x7b/0xa0 [ 16.271423] ? __pfx_kthread+0x10/0x10 [ 16.271445] ret_from_fork+0x116/0x1d0 [ 16.271465] ? __pfx_kthread+0x10/0x10 [ 16.271486] ret_from_fork_asm+0x1a/0x30 [ 16.271517] </TASK> [ 16.271528] [ 16.279272] Allocated by task 282: [ 16.279462] kasan_save_stack+0x45/0x70 [ 16.279662] kasan_save_track+0x18/0x40 [ 16.279904] kasan_save_alloc_info+0x3b/0x50 [ 16.280118] __kasan_kmalloc+0xb7/0xc0 [ 16.280311] __kmalloc_cache_noprof+0x189/0x420 [ 16.280558] kasan_atomics+0x95/0x310 [ 16.280750] kunit_try_run_case+0x1a5/0x480 [ 16.280999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.281277] kthread+0x337/0x6f0 [ 16.281479] ret_from_fork+0x116/0x1d0 [ 16.281686] ret_from_fork_asm+0x1a/0x30 [ 16.281891] [ 16.281975] The buggy address belongs to the object at ffff8881025e4100 [ 16.281975] which belongs to the cache kmalloc-64 of size 64 [ 16.282401] The buggy address is located 0 bytes to the right of [ 16.282401] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.282771] [ 16.282878] The buggy address belongs to the physical page: [ 16.283185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.283531] flags: 0x200000000000000(node=0|zone=2) [ 16.283759] page_type: f5(slab) [ 16.283944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.284245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.284487] page dumped because: kasan: bad access detected [ 16.284704] [ 16.284792] Memory state around the buggy address: [ 16.285808] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.286057] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.286372] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.286721] ^ [ 16.286937] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.287284] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.287607] ================================================================== [ 15.725941] ================================================================== [ 15.726396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.726712] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.726957] [ 15.727047] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.727090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.727103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.727125] Call Trace: [ 15.727142] <TASK> [ 15.727157] dump_stack_lvl+0x73/0xb0 [ 15.727184] print_report+0xd1/0x610 [ 15.727218] ? __virt_addr_valid+0x1db/0x2d0 [ 15.727240] ? kasan_atomics_helper+0x151d/0x5450 [ 15.727261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.727296] ? kasan_atomics_helper+0x151d/0x5450 [ 15.727319] kasan_report+0x141/0x180 [ 15.727342] ? kasan_atomics_helper+0x151d/0x5450 [ 15.727368] kasan_check_range+0x10c/0x1c0 [ 15.727392] __kasan_check_write+0x18/0x20 [ 15.727411] kasan_atomics_helper+0x151d/0x5450 [ 15.727436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.727460] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.727486] ? kasan_atomics+0x152/0x310 [ 15.727514] kasan_atomics+0x1dc/0x310 [ 15.727537] ? __pfx_kasan_atomics+0x10/0x10 [ 15.727562] ? __pfx_read_tsc+0x10/0x10 [ 15.727583] ? ktime_get_ts64+0x86/0x230 [ 15.727606] kunit_try_run_case+0x1a5/0x480 [ 15.727631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.727654] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.727678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.727702] ? __kthread_parkme+0x82/0x180 [ 15.727732] ? preempt_count_sub+0x50/0x80 [ 15.727756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.727780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.727822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.727847] kthread+0x337/0x6f0 [ 15.727867] ? trace_preempt_on+0x20/0xc0 [ 15.727899] ? __pfx_kthread+0x10/0x10 [ 15.727920] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.727943] ? calculate_sigpending+0x7b/0xa0 [ 15.727977] ? __pfx_kthread+0x10/0x10 [ 15.728000] ret_from_fork+0x116/0x1d0 [ 15.728019] ? __pfx_kthread+0x10/0x10 [ 15.728040] ret_from_fork_asm+0x1a/0x30 [ 15.728071] </TASK> [ 15.728081] [ 15.735765] Allocated by task 282: [ 15.735919] kasan_save_stack+0x45/0x70 [ 15.736147] kasan_save_track+0x18/0x40 [ 15.736315] kasan_save_alloc_info+0x3b/0x50 [ 15.736519] __kasan_kmalloc+0xb7/0xc0 [ 15.736704] __kmalloc_cache_noprof+0x189/0x420 [ 15.736901] kasan_atomics+0x95/0x310 [ 15.737094] kunit_try_run_case+0x1a5/0x480 [ 15.737330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.737571] kthread+0x337/0x6f0 [ 15.737744] ret_from_fork+0x116/0x1d0 [ 15.737939] ret_from_fork_asm+0x1a/0x30 [ 15.738163] [ 15.738265] The buggy address belongs to the object at ffff8881025e4100 [ 15.738265] which belongs to the cache kmalloc-64 of size 64 [ 15.738769] The buggy address is located 0 bytes to the right of [ 15.738769] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.739334] [ 15.739458] The buggy address belongs to the physical page: [ 15.739686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.740028] flags: 0x200000000000000(node=0|zone=2) [ 15.740243] page_type: f5(slab) [ 15.740426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.740707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.740993] page dumped because: kasan: bad access detected [ 15.741302] [ 15.741400] Memory state around the buggy address: [ 15.741623] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.741948] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.742267] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.742649] ^ [ 15.742808] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.743036] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.743701] ================================================================== [ 16.059779] ================================================================== [ 16.060029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.060381] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.060645] [ 16.060730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.060772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.060785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.060807] Call Trace: [ 16.060831] <TASK> [ 16.060869] dump_stack_lvl+0x73/0xb0 [ 16.060897] print_report+0xd1/0x610 [ 16.060919] ? __virt_addr_valid+0x1db/0x2d0 [ 16.060941] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.060963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.060986] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.061008] kasan_report+0x141/0x180 [ 16.061031] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.061059] kasan_check_range+0x10c/0x1c0 [ 16.061082] __kasan_check_write+0x18/0x20 [ 16.061113] kasan_atomics_helper+0x1e12/0x5450 [ 16.061163] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.061186] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.061212] ? kasan_atomics+0x152/0x310 [ 16.061238] kasan_atomics+0x1dc/0x310 [ 16.061262] ? __pfx_kasan_atomics+0x10/0x10 [ 16.061287] ? __pfx_read_tsc+0x10/0x10 [ 16.061307] ? ktime_get_ts64+0x86/0x230 [ 16.061332] kunit_try_run_case+0x1a5/0x480 [ 16.061357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.061381] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.061405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.061431] ? __kthread_parkme+0x82/0x180 [ 16.061452] ? preempt_count_sub+0x50/0x80 [ 16.061477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.061505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.061533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.061559] kthread+0x337/0x6f0 [ 16.061601] ? trace_preempt_on+0x20/0xc0 [ 16.061626] ? __pfx_kthread+0x10/0x10 [ 16.061648] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.061670] ? calculate_sigpending+0x7b/0xa0 [ 16.061696] ? __pfx_kthread+0x10/0x10 [ 16.061719] ret_from_fork+0x116/0x1d0 [ 16.061739] ? __pfx_kthread+0x10/0x10 [ 16.061762] ret_from_fork_asm+0x1a/0x30 [ 16.061793] </TASK> [ 16.061805] [ 16.070229] Allocated by task 282: [ 16.070426] kasan_save_stack+0x45/0x70 [ 16.070627] kasan_save_track+0x18/0x40 [ 16.070766] kasan_save_alloc_info+0x3b/0x50 [ 16.070930] __kasan_kmalloc+0xb7/0xc0 [ 16.071066] __kmalloc_cache_noprof+0x189/0x420 [ 16.071456] kasan_atomics+0x95/0x310 [ 16.071646] kunit_try_run_case+0x1a5/0x480 [ 16.071943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.072192] kthread+0x337/0x6f0 [ 16.072317] ret_from_fork+0x116/0x1d0 [ 16.072453] ret_from_fork_asm+0x1a/0x30 [ 16.072636] [ 16.072734] The buggy address belongs to the object at ffff8881025e4100 [ 16.072734] which belongs to the cache kmalloc-64 of size 64 [ 16.073496] The buggy address is located 0 bytes to the right of [ 16.073496] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.073994] [ 16.074083] The buggy address belongs to the physical page: [ 16.074306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.074577] flags: 0x200000000000000(node=0|zone=2) [ 16.074745] page_type: f5(slab) [ 16.074879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.075225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.075560] page dumped because: kasan: bad access detected [ 16.075788] [ 16.075869] Memory state around the buggy address: [ 16.076026] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.076675] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.076964] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.077290] ^ [ 16.077501] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.077791] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.078070] ================================================================== [ 15.526062] ================================================================== [ 15.526664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.527037] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.527300] [ 15.527412] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.527458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.527472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.527493] Call Trace: [ 15.527508] <TASK> [ 15.527525] dump_stack_lvl+0x73/0xb0 [ 15.527554] print_report+0xd1/0x610 [ 15.527576] ? __virt_addr_valid+0x1db/0x2d0 [ 15.527598] ? kasan_atomics_helper+0x1148/0x5450 [ 15.527620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.527643] ? kasan_atomics_helper+0x1148/0x5450 [ 15.527666] kasan_report+0x141/0x180 [ 15.527689] ? kasan_atomics_helper+0x1148/0x5450 [ 15.527716] kasan_check_range+0x10c/0x1c0 [ 15.527740] __kasan_check_write+0x18/0x20 [ 15.527760] kasan_atomics_helper+0x1148/0x5450 [ 15.527783] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.527806] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.527842] ? kasan_atomics+0x152/0x310 [ 15.527870] kasan_atomics+0x1dc/0x310 [ 15.527893] ? __pfx_kasan_atomics+0x10/0x10 [ 15.527918] ? __pfx_read_tsc+0x10/0x10 [ 15.527939] ? ktime_get_ts64+0x86/0x230 [ 15.527963] kunit_try_run_case+0x1a5/0x480 [ 15.527989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528012] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.528036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.528061] ? __kthread_parkme+0x82/0x180 [ 15.528082] ? preempt_count_sub+0x50/0x80 [ 15.528127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.528175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.528200] kthread+0x337/0x6f0 [ 15.528220] ? trace_preempt_on+0x20/0xc0 [ 15.528242] ? __pfx_kthread+0x10/0x10 [ 15.528264] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.528286] ? calculate_sigpending+0x7b/0xa0 [ 15.528310] ? __pfx_kthread+0x10/0x10 [ 15.528332] ret_from_fork+0x116/0x1d0 [ 15.528351] ? __pfx_kthread+0x10/0x10 [ 15.528372] ret_from_fork_asm+0x1a/0x30 [ 15.528403] </TASK> [ 15.528414] [ 15.536338] Allocated by task 282: [ 15.536506] kasan_save_stack+0x45/0x70 [ 15.536718] kasan_save_track+0x18/0x40 [ 15.536873] kasan_save_alloc_info+0x3b/0x50 [ 15.537051] __kasan_kmalloc+0xb7/0xc0 [ 15.537364] __kmalloc_cache_noprof+0x189/0x420 [ 15.537592] kasan_atomics+0x95/0x310 [ 15.537802] kunit_try_run_case+0x1a5/0x480 [ 15.538022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.538247] kthread+0x337/0x6f0 [ 15.538414] ret_from_fork+0x116/0x1d0 [ 15.538593] ret_from_fork_asm+0x1a/0x30 [ 15.538826] [ 15.538949] The buggy address belongs to the object at ffff8881025e4100 [ 15.538949] which belongs to the cache kmalloc-64 of size 64 [ 15.539472] The buggy address is located 0 bytes to the right of [ 15.539472] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.540066] [ 15.540252] The buggy address belongs to the physical page: [ 15.540505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.540888] flags: 0x200000000000000(node=0|zone=2) [ 15.541153] page_type: f5(slab) [ 15.541322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.541668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.541991] page dumped because: kasan: bad access detected [ 15.542975] [ 15.543582] Memory state around the buggy address: [ 15.544056] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.544635] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.545264] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.545782] ^ [ 15.546355] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.546891] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.547498] ================================================================== [ 15.604858] ================================================================== [ 15.605211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.605825] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.606192] [ 15.606325] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.606368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.606381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.606402] Call Trace: [ 15.606416] <TASK> [ 15.606429] dump_stack_lvl+0x73/0xb0 [ 15.606457] print_report+0xd1/0x610 [ 15.606480] ? __virt_addr_valid+0x1db/0x2d0 [ 15.606502] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.606524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.606547] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.606569] kasan_report+0x141/0x180 [ 15.606593] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.606621] kasan_check_range+0x10c/0x1c0 [ 15.606645] __kasan_check_write+0x18/0x20 [ 15.606665] kasan_atomics_helper+0x12e6/0x5450 [ 15.606688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.606711] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.606736] ? kasan_atomics+0x152/0x310 [ 15.606763] kasan_atomics+0x1dc/0x310 [ 15.606787] ? __pfx_kasan_atomics+0x10/0x10 [ 15.606823] ? __pfx_read_tsc+0x10/0x10 [ 15.606844] ? ktime_get_ts64+0x86/0x230 [ 15.606868] kunit_try_run_case+0x1a5/0x480 [ 15.606903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.606927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.606951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.606987] ? __kthread_parkme+0x82/0x180 [ 15.607008] ? preempt_count_sub+0x50/0x80 [ 15.607032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.607057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.607091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.607123] kthread+0x337/0x6f0 [ 15.607155] ? trace_preempt_on+0x20/0xc0 [ 15.607181] ? __pfx_kthread+0x10/0x10 [ 15.607204] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.607229] ? calculate_sigpending+0x7b/0xa0 [ 15.607255] ? __pfx_kthread+0x10/0x10 [ 15.607286] ret_from_fork+0x116/0x1d0 [ 15.607306] ? __pfx_kthread+0x10/0x10 [ 15.607329] ret_from_fork_asm+0x1a/0x30 [ 15.607370] </TASK> [ 15.607381] [ 15.615445] Allocated by task 282: [ 15.615625] kasan_save_stack+0x45/0x70 [ 15.615804] kasan_save_track+0x18/0x40 [ 15.615952] kasan_save_alloc_info+0x3b/0x50 [ 15.616313] __kasan_kmalloc+0xb7/0xc0 [ 15.616497] __kmalloc_cache_noprof+0x189/0x420 [ 15.616713] kasan_atomics+0x95/0x310 [ 15.616908] kunit_try_run_case+0x1a5/0x480 [ 15.617145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.617382] kthread+0x337/0x6f0 [ 15.617508] ret_from_fork+0x116/0x1d0 [ 15.617644] ret_from_fork_asm+0x1a/0x30 [ 15.617786] [ 15.617869] The buggy address belongs to the object at ffff8881025e4100 [ 15.617869] which belongs to the cache kmalloc-64 of size 64 [ 15.618301] The buggy address is located 0 bytes to the right of [ 15.618301] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.619155] [ 15.619280] The buggy address belongs to the physical page: [ 15.619494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.619772] flags: 0x200000000000000(node=0|zone=2) [ 15.620188] page_type: f5(slab) [ 15.620384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.620763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.621166] page dumped because: kasan: bad access detected [ 15.621436] [ 15.621511] Memory state around the buggy address: [ 15.621693] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.622054] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.622428] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.622713] ^ [ 15.622965] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.623312] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.623600] ================================================================== [ 15.867774] ================================================================== [ 15.868087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.868761] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.869334] [ 15.869429] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.869476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.869489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.869511] Call Trace: [ 15.869526] <TASK> [ 15.869686] dump_stack_lvl+0x73/0xb0 [ 15.869723] print_report+0xd1/0x610 [ 15.869747] ? __virt_addr_valid+0x1db/0x2d0 [ 15.869770] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.869791] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.869824] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.869848] kasan_report+0x141/0x180 [ 15.869881] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.869908] kasan_check_range+0x10c/0x1c0 [ 15.869932] __kasan_check_write+0x18/0x20 [ 15.869963] kasan_atomics_helper+0x18b1/0x5450 [ 15.869987] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.870010] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.870035] ? kasan_atomics+0x152/0x310 [ 15.870072] kasan_atomics+0x1dc/0x310 [ 15.870096] ? __pfx_kasan_atomics+0x10/0x10 [ 15.870121] ? __pfx_read_tsc+0x10/0x10 [ 15.870164] ? ktime_get_ts64+0x86/0x230 [ 15.870189] kunit_try_run_case+0x1a5/0x480 [ 15.870214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.870237] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.870261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.870286] ? __kthread_parkme+0x82/0x180 [ 15.870308] ? preempt_count_sub+0x50/0x80 [ 15.870332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.870357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.870380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.870405] kthread+0x337/0x6f0 [ 15.870425] ? trace_preempt_on+0x20/0xc0 [ 15.870448] ? __pfx_kthread+0x10/0x10 [ 15.870470] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.870491] ? calculate_sigpending+0x7b/0xa0 [ 15.870524] ? __pfx_kthread+0x10/0x10 [ 15.870546] ret_from_fork+0x116/0x1d0 [ 15.870566] ? __pfx_kthread+0x10/0x10 [ 15.870597] ret_from_fork_asm+0x1a/0x30 [ 15.870628] </TASK> [ 15.870639] [ 15.881597] Allocated by task 282: [ 15.881735] kasan_save_stack+0x45/0x70 [ 15.881950] kasan_save_track+0x18/0x40 [ 15.882153] kasan_save_alloc_info+0x3b/0x50 [ 15.882345] __kasan_kmalloc+0xb7/0xc0 [ 15.882481] __kmalloc_cache_noprof+0x189/0x420 [ 15.882790] kasan_atomics+0x95/0x310 [ 15.882990] kunit_try_run_case+0x1a5/0x480 [ 15.883274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.883489] kthread+0x337/0x6f0 [ 15.883664] ret_from_fork+0x116/0x1d0 [ 15.883856] ret_from_fork_asm+0x1a/0x30 [ 15.884049] [ 15.884185] The buggy address belongs to the object at ffff8881025e4100 [ 15.884185] which belongs to the cache kmalloc-64 of size 64 [ 15.884691] The buggy address is located 0 bytes to the right of [ 15.884691] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.885209] [ 15.885330] The buggy address belongs to the physical page: [ 15.885548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.885793] flags: 0x200000000000000(node=0|zone=2) [ 15.885969] page_type: f5(slab) [ 15.886131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.886532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.886891] page dumped because: kasan: bad access detected [ 15.887172] [ 15.887248] Memory state around the buggy address: [ 15.887408] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.887697] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.888056] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.888516] ^ [ 15.888741] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.889395] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.889940] ================================================================== [ 15.967493] ================================================================== [ 15.967964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.968377] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.968605] [ 15.968691] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.968735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.968748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.968770] Call Trace: [ 15.968785] <TASK> [ 15.968835] dump_stack_lvl+0x73/0xb0 [ 15.968870] print_report+0xd1/0x610 [ 15.968893] ? __virt_addr_valid+0x1db/0x2d0 [ 15.968917] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.968939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.968962] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.968985] kasan_report+0x141/0x180 [ 15.969008] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.969054] kasan_check_range+0x10c/0x1c0 [ 15.969078] __kasan_check_write+0x18/0x20 [ 15.969099] kasan_atomics_helper+0x1b22/0x5450 [ 15.969137] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.969167] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.969193] ? kasan_atomics+0x152/0x310 [ 15.969221] kasan_atomics+0x1dc/0x310 [ 15.969261] ? __pfx_kasan_atomics+0x10/0x10 [ 15.969287] ? __pfx_read_tsc+0x10/0x10 [ 15.969309] ? ktime_get_ts64+0x86/0x230 [ 15.969334] kunit_try_run_case+0x1a5/0x480 [ 15.969360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.969435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.969461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.969485] ? __kthread_parkme+0x82/0x180 [ 15.969507] ? preempt_count_sub+0x50/0x80 [ 15.969530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.969556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.969580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.969606] kthread+0x337/0x6f0 [ 15.969626] ? trace_preempt_on+0x20/0xc0 [ 15.969650] ? __pfx_kthread+0x10/0x10 [ 15.969671] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.969693] ? calculate_sigpending+0x7b/0xa0 [ 15.969718] ? __pfx_kthread+0x10/0x10 [ 15.969740] ret_from_fork+0x116/0x1d0 [ 15.969759] ? __pfx_kthread+0x10/0x10 [ 15.969781] ret_from_fork_asm+0x1a/0x30 [ 15.969822] </TASK> [ 15.969833] [ 15.977859] Allocated by task 282: [ 15.978019] kasan_save_stack+0x45/0x70 [ 15.978223] kasan_save_track+0x18/0x40 [ 15.978419] kasan_save_alloc_info+0x3b/0x50 [ 15.978629] __kasan_kmalloc+0xb7/0xc0 [ 15.978934] __kmalloc_cache_noprof+0x189/0x420 [ 15.979105] kasan_atomics+0x95/0x310 [ 15.979295] kunit_try_run_case+0x1a5/0x480 [ 15.979504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.979748] kthread+0x337/0x6f0 [ 15.979904] ret_from_fork+0x116/0x1d0 [ 15.980075] ret_from_fork_asm+0x1a/0x30 [ 15.980308] [ 15.980416] The buggy address belongs to the object at ffff8881025e4100 [ 15.980416] which belongs to the cache kmalloc-64 of size 64 [ 15.980881] The buggy address is located 0 bytes to the right of [ 15.980881] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.981547] [ 15.981628] The buggy address belongs to the physical page: [ 15.981895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.982350] flags: 0x200000000000000(node=0|zone=2) [ 15.982614] page_type: f5(slab) [ 15.982780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.983080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.983417] page dumped because: kasan: bad access detected [ 15.983669] [ 15.983773] Memory state around the buggy address: [ 15.984015] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.984361] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.984707] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.985047] ^ [ 15.985346] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.985673] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.985938] ================================================================== [ 16.165051] ================================================================== [ 16.165401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.165770] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.166140] [ 16.166288] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.166332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.166345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.166367] Call Trace: [ 16.166383] <TASK> [ 16.166425] dump_stack_lvl+0x73/0xb0 [ 16.166454] print_report+0xd1/0x610 [ 16.166478] ? __virt_addr_valid+0x1db/0x2d0 [ 16.166501] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.166523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.166545] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.166568] kasan_report+0x141/0x180 [ 16.166591] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.166617] __asan_report_load8_noabort+0x18/0x20 [ 16.166642] kasan_atomics_helper+0x4f98/0x5450 [ 16.166665] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.166688] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.166713] ? kasan_atomics+0x152/0x310 [ 16.166740] kasan_atomics+0x1dc/0x310 [ 16.166763] ? __pfx_kasan_atomics+0x10/0x10 [ 16.166788] ? __pfx_read_tsc+0x10/0x10 [ 16.166810] ? ktime_get_ts64+0x86/0x230 [ 16.166876] kunit_try_run_case+0x1a5/0x480 [ 16.166902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.166926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.166950] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.166974] ? __kthread_parkme+0x82/0x180 [ 16.166995] ? preempt_count_sub+0x50/0x80 [ 16.167019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.167043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.167067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.167111] kthread+0x337/0x6f0 [ 16.167132] ? trace_preempt_on+0x20/0xc0 [ 16.167156] ? __pfx_kthread+0x10/0x10 [ 16.167178] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.167200] ? calculate_sigpending+0x7b/0xa0 [ 16.167224] ? __pfx_kthread+0x10/0x10 [ 16.167247] ret_from_fork+0x116/0x1d0 [ 16.167266] ? __pfx_kthread+0x10/0x10 [ 16.167287] ret_from_fork_asm+0x1a/0x30 [ 16.167370] </TASK> [ 16.167381] [ 16.175262] Allocated by task 282: [ 16.175476] kasan_save_stack+0x45/0x70 [ 16.175687] kasan_save_track+0x18/0x40 [ 16.175876] kasan_save_alloc_info+0x3b/0x50 [ 16.176163] __kasan_kmalloc+0xb7/0xc0 [ 16.176343] __kmalloc_cache_noprof+0x189/0x420 [ 16.176592] kasan_atomics+0x95/0x310 [ 16.176734] kunit_try_run_case+0x1a5/0x480 [ 16.176910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.177195] kthread+0x337/0x6f0 [ 16.177370] ret_from_fork+0x116/0x1d0 [ 16.177528] ret_from_fork_asm+0x1a/0x30 [ 16.177721] [ 16.177850] The buggy address belongs to the object at ffff8881025e4100 [ 16.177850] which belongs to the cache kmalloc-64 of size 64 [ 16.178407] The buggy address is located 0 bytes to the right of [ 16.178407] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.178974] [ 16.179130] The buggy address belongs to the physical page: [ 16.179391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.179736] flags: 0x200000000000000(node=0|zone=2) [ 16.179991] page_type: f5(slab) [ 16.180242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.180581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.180922] page dumped because: kasan: bad access detected [ 16.181200] [ 16.181331] Memory state around the buggy address: [ 16.181555] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.181783] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.182205] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.182517] ^ [ 16.182761] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.183146] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.183429] ================================================================== [ 16.126021] ================================================================== [ 16.126476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.126867] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.127238] [ 16.127378] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.127424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.127437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.127458] Call Trace: [ 16.127475] <TASK> [ 16.127492] dump_stack_lvl+0x73/0xb0 [ 16.127520] print_report+0xd1/0x610 [ 16.127570] ? __virt_addr_valid+0x1db/0x2d0 [ 16.127592] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.127614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.127637] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.127659] kasan_report+0x141/0x180 [ 16.127683] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.127710] __asan_report_load8_noabort+0x18/0x20 [ 16.127735] kasan_atomics_helper+0x4f71/0x5450 [ 16.127759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.127783] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.127808] ? kasan_atomics+0x152/0x310 [ 16.127850] kasan_atomics+0x1dc/0x310 [ 16.127873] ? __pfx_kasan_atomics+0x10/0x10 [ 16.127898] ? __pfx_read_tsc+0x10/0x10 [ 16.127919] ? ktime_get_ts64+0x86/0x230 [ 16.127944] kunit_try_run_case+0x1a5/0x480 [ 16.127969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.127993] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.128017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.128041] ? __kthread_parkme+0x82/0x180 [ 16.128062] ? preempt_count_sub+0x50/0x80 [ 16.128136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.128164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.128189] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.128213] kthread+0x337/0x6f0 [ 16.128234] ? trace_preempt_on+0x20/0xc0 [ 16.128258] ? __pfx_kthread+0x10/0x10 [ 16.128279] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.128302] ? calculate_sigpending+0x7b/0xa0 [ 16.128326] ? __pfx_kthread+0x10/0x10 [ 16.128349] ret_from_fork+0x116/0x1d0 [ 16.128368] ? __pfx_kthread+0x10/0x10 [ 16.128390] ret_from_fork_asm+0x1a/0x30 [ 16.128421] </TASK> [ 16.128432] [ 16.136402] Allocated by task 282: [ 16.136552] kasan_save_stack+0x45/0x70 [ 16.136701] kasan_save_track+0x18/0x40 [ 16.136864] kasan_save_alloc_info+0x3b/0x50 [ 16.137127] __kasan_kmalloc+0xb7/0xc0 [ 16.137320] __kmalloc_cache_noprof+0x189/0x420 [ 16.137574] kasan_atomics+0x95/0x310 [ 16.137768] kunit_try_run_case+0x1a5/0x480 [ 16.138017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.138305] kthread+0x337/0x6f0 [ 16.138487] ret_from_fork+0x116/0x1d0 [ 16.138672] ret_from_fork_asm+0x1a/0x30 [ 16.138869] [ 16.138951] The buggy address belongs to the object at ffff8881025e4100 [ 16.138951] which belongs to the cache kmalloc-64 of size 64 [ 16.139490] The buggy address is located 0 bytes to the right of [ 16.139490] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.139992] [ 16.140123] The buggy address belongs to the physical page: [ 16.140395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.140756] flags: 0x200000000000000(node=0|zone=2) [ 16.141027] page_type: f5(slab) [ 16.141253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.141627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.141995] page dumped because: kasan: bad access detected [ 16.142288] [ 16.142379] Memory state around the buggy address: [ 16.142612] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.142941] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.143339] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.143787] ^ [ 16.144022] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.144384] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.144698] ================================================================== [ 15.744375] ================================================================== [ 15.744713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.745048] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.745449] [ 15.745559] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.745602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.745616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.745648] Call Trace: [ 15.745665] <TASK> [ 15.745679] dump_stack_lvl+0x73/0xb0 [ 15.745707] print_report+0xd1/0x610 [ 15.745738] ? __virt_addr_valid+0x1db/0x2d0 [ 15.745761] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.745783] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.745825] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.745847] kasan_report+0x141/0x180 [ 15.745870] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.745896] kasan_check_range+0x10c/0x1c0 [ 15.745921] __kasan_check_write+0x18/0x20 [ 15.745940] kasan_atomics_helper+0x15b6/0x5450 [ 15.745963] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.745985] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.746010] ? kasan_atomics+0x152/0x310 [ 15.746037] kasan_atomics+0x1dc/0x310 [ 15.746059] ? __pfx_kasan_atomics+0x10/0x10 [ 15.746084] ? __pfx_read_tsc+0x10/0x10 [ 15.746115] ? ktime_get_ts64+0x86/0x230 [ 15.746139] kunit_try_run_case+0x1a5/0x480 [ 15.746173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.746196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.746232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.746256] ? __kthread_parkme+0x82/0x180 [ 15.746277] ? preempt_count_sub+0x50/0x80 [ 15.746312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.746336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.746360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.746384] kthread+0x337/0x6f0 [ 15.746404] ? trace_preempt_on+0x20/0xc0 [ 15.746428] ? __pfx_kthread+0x10/0x10 [ 15.746449] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.746472] ? calculate_sigpending+0x7b/0xa0 [ 15.746497] ? __pfx_kthread+0x10/0x10 [ 15.746520] ret_from_fork+0x116/0x1d0 [ 15.746539] ? __pfx_kthread+0x10/0x10 [ 15.746560] ret_from_fork_asm+0x1a/0x30 [ 15.746592] </TASK> [ 15.746602] [ 15.754562] Allocated by task 282: [ 15.754741] kasan_save_stack+0x45/0x70 [ 15.754896] kasan_save_track+0x18/0x40 [ 15.755123] kasan_save_alloc_info+0x3b/0x50 [ 15.755321] __kasan_kmalloc+0xb7/0xc0 [ 15.755459] __kmalloc_cache_noprof+0x189/0x420 [ 15.755683] kasan_atomics+0x95/0x310 [ 15.755871] kunit_try_run_case+0x1a5/0x480 [ 15.756110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.756301] kthread+0x337/0x6f0 [ 15.756424] ret_from_fork+0x116/0x1d0 [ 15.756558] ret_from_fork_asm+0x1a/0x30 [ 15.756699] [ 15.756771] The buggy address belongs to the object at ffff8881025e4100 [ 15.756771] which belongs to the cache kmalloc-64 of size 64 [ 15.757313] The buggy address is located 0 bytes to the right of [ 15.757313] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.758049] [ 15.758124] The buggy address belongs to the physical page: [ 15.758296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.758538] flags: 0x200000000000000(node=0|zone=2) [ 15.759437] page_type: f5(slab) [ 15.759740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.761039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.762320] page dumped because: kasan: bad access detected [ 15.763141] [ 15.763312] Memory state around the buggy address: [ 15.763703] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.763939] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.764379] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.764973] ^ [ 15.765393] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765985] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.766593] ================================================================== [ 15.145800] ================================================================== [ 15.146602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.146890] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.147235] [ 15.147327] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.147371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.147384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.147406] Call Trace: [ 15.147424] <TASK> [ 15.147441] dump_stack_lvl+0x73/0xb0 [ 15.147468] print_report+0xd1/0x610 [ 15.147490] ? __virt_addr_valid+0x1db/0x2d0 [ 15.147513] ? kasan_atomics_helper+0x697/0x5450 [ 15.147535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.147558] ? kasan_atomics_helper+0x697/0x5450 [ 15.147581] kasan_report+0x141/0x180 [ 15.147604] ? kasan_atomics_helper+0x697/0x5450 [ 15.147630] kasan_check_range+0x10c/0x1c0 [ 15.147654] __kasan_check_write+0x18/0x20 [ 15.147674] kasan_atomics_helper+0x697/0x5450 [ 15.147697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.147721] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.147747] ? kasan_atomics+0x152/0x310 [ 15.147775] kasan_atomics+0x1dc/0x310 [ 15.147798] ? __pfx_kasan_atomics+0x10/0x10 [ 15.147835] ? __pfx_read_tsc+0x10/0x10 [ 15.147856] ? ktime_get_ts64+0x86/0x230 [ 15.147881] kunit_try_run_case+0x1a5/0x480 [ 15.147906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.147929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.147953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.147978] ? __kthread_parkme+0x82/0x180 [ 15.147998] ? preempt_count_sub+0x50/0x80 [ 15.148023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.148047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.148072] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.148105] kthread+0x337/0x6f0 [ 15.148125] ? trace_preempt_on+0x20/0xc0 [ 15.148148] ? __pfx_kthread+0x10/0x10 [ 15.148169] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.148192] ? calculate_sigpending+0x7b/0xa0 [ 15.148216] ? __pfx_kthread+0x10/0x10 [ 15.148238] ret_from_fork+0x116/0x1d0 [ 15.148257] ? __pfx_kthread+0x10/0x10 [ 15.148279] ret_from_fork_asm+0x1a/0x30 [ 15.148310] </TASK> [ 15.148322] [ 15.155597] Allocated by task 282: [ 15.155746] kasan_save_stack+0x45/0x70 [ 15.155959] kasan_save_track+0x18/0x40 [ 15.156141] kasan_save_alloc_info+0x3b/0x50 [ 15.156340] __kasan_kmalloc+0xb7/0xc0 [ 15.156484] __kmalloc_cache_noprof+0x189/0x420 [ 15.156715] kasan_atomics+0x95/0x310 [ 15.156867] kunit_try_run_case+0x1a5/0x480 [ 15.157017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.157194] kthread+0x337/0x6f0 [ 15.157317] ret_from_fork+0x116/0x1d0 [ 15.157453] ret_from_fork_asm+0x1a/0x30 [ 15.157595] [ 15.157668] The buggy address belongs to the object at ffff8881025e4100 [ 15.157668] which belongs to the cache kmalloc-64 of size 64 [ 15.158181] The buggy address is located 0 bytes to the right of [ 15.158181] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.158728] [ 15.158904] The buggy address belongs to the physical page: [ 15.159240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.159591] flags: 0x200000000000000(node=0|zone=2) [ 15.159833] page_type: f5(slab) [ 15.160001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.160268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.160497] page dumped because: kasan: bad access detected [ 15.160671] [ 15.160742] Memory state around the buggy address: [ 15.161121] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.161450] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.161779] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.162080] ^ [ 15.162301] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.162521] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.162737] ================================================================== [ 15.293057] ================================================================== [ 15.293795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.294420] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.295048] [ 15.295222] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.295266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.295280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.295302] Call Trace: [ 15.295318] <TASK> [ 15.295333] dump_stack_lvl+0x73/0xb0 [ 15.295362] print_report+0xd1/0x610 [ 15.295385] ? __virt_addr_valid+0x1db/0x2d0 [ 15.295408] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.295429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.295453] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.295475] kasan_report+0x141/0x180 [ 15.295498] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.295524] kasan_check_range+0x10c/0x1c0 [ 15.295549] __kasan_check_write+0x18/0x20 [ 15.295569] kasan_atomics_helper+0xb6a/0x5450 [ 15.295592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.295615] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.295641] ? kasan_atomics+0x152/0x310 [ 15.295668] kasan_atomics+0x1dc/0x310 [ 15.295691] ? __pfx_kasan_atomics+0x10/0x10 [ 15.295716] ? __pfx_read_tsc+0x10/0x10 [ 15.295737] ? ktime_get_ts64+0x86/0x230 [ 15.295761] kunit_try_run_case+0x1a5/0x480 [ 15.295786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.295810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.295845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.295869] ? __kthread_parkme+0x82/0x180 [ 15.295890] ? preempt_count_sub+0x50/0x80 [ 15.295913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.295938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.295962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.295986] kthread+0x337/0x6f0 [ 15.296006] ? trace_preempt_on+0x20/0xc0 [ 15.296030] ? __pfx_kthread+0x10/0x10 [ 15.296051] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.296073] ? calculate_sigpending+0x7b/0xa0 [ 15.296109] ? __pfx_kthread+0x10/0x10 [ 15.296132] ret_from_fork+0x116/0x1d0 [ 15.296151] ? __pfx_kthread+0x10/0x10 [ 15.296172] ret_from_fork_asm+0x1a/0x30 [ 15.296202] </TASK> [ 15.296213] [ 15.307164] Allocated by task 282: [ 15.307327] kasan_save_stack+0x45/0x70 [ 15.307483] kasan_save_track+0x18/0x40 [ 15.307682] kasan_save_alloc_info+0x3b/0x50 [ 15.307907] __kasan_kmalloc+0xb7/0xc0 [ 15.308071] __kmalloc_cache_noprof+0x189/0x420 [ 15.308277] kasan_atomics+0x95/0x310 [ 15.308453] kunit_try_run_case+0x1a5/0x480 [ 15.308635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.308882] kthread+0x337/0x6f0 [ 15.309031] ret_from_fork+0x116/0x1d0 [ 15.309242] ret_from_fork_asm+0x1a/0x30 [ 15.309428] [ 15.309530] The buggy address belongs to the object at ffff8881025e4100 [ 15.309530] which belongs to the cache kmalloc-64 of size 64 [ 15.309971] The buggy address is located 0 bytes to the right of [ 15.309971] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.310594] [ 15.310694] The buggy address belongs to the physical page: [ 15.310970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.311355] flags: 0x200000000000000(node=0|zone=2) [ 15.311586] page_type: f5(slab) [ 15.311737] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.312056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.312382] page dumped because: kasan: bad access detected [ 15.312606] [ 15.312694] Memory state around the buggy address: [ 15.312901] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.313241] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.313525] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.313796] ^ [ 15.313998] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.314494] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.314781] ================================================================== [ 15.624080] ================================================================== [ 15.624422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.624669] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.625034] [ 15.625142] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.625185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.625198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.625219] Call Trace: [ 15.625235] <TASK> [ 15.625249] dump_stack_lvl+0x73/0xb0 [ 15.625276] print_report+0xd1/0x610 [ 15.625299] ? __virt_addr_valid+0x1db/0x2d0 [ 15.625322] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.625345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.625368] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.625392] kasan_report+0x141/0x180 [ 15.625428] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.625455] __asan_report_load4_noabort+0x18/0x20 [ 15.625479] kasan_atomics_helper+0x49ce/0x5450 [ 15.625503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.625526] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.625551] ? kasan_atomics+0x152/0x310 [ 15.625589] kasan_atomics+0x1dc/0x310 [ 15.625613] ? __pfx_kasan_atomics+0x10/0x10 [ 15.625642] ? __pfx_read_tsc+0x10/0x10 [ 15.625678] ? ktime_get_ts64+0x86/0x230 [ 15.625702] kunit_try_run_case+0x1a5/0x480 [ 15.625727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.625752] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.625777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.625801] ? __kthread_parkme+0x82/0x180 [ 15.625831] ? preempt_count_sub+0x50/0x80 [ 15.625854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.625880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.625905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.625929] kthread+0x337/0x6f0 [ 15.625950] ? trace_preempt_on+0x20/0xc0 [ 15.625973] ? __pfx_kthread+0x10/0x10 [ 15.625994] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.626016] ? calculate_sigpending+0x7b/0xa0 [ 15.626041] ? __pfx_kthread+0x10/0x10 [ 15.626063] ret_from_fork+0x116/0x1d0 [ 15.626083] ? __pfx_kthread+0x10/0x10 [ 15.626114] ret_from_fork_asm+0x1a/0x30 [ 15.626144] </TASK> [ 15.626155] [ 15.633728] Allocated by task 282: [ 15.634194] kasan_save_stack+0x45/0x70 [ 15.634605] kasan_save_track+0x18/0x40 [ 15.634755] kasan_save_alloc_info+0x3b/0x50 [ 15.636154] __kasan_kmalloc+0xb7/0xc0 [ 15.636500] __kmalloc_cache_noprof+0x189/0x420 [ 15.636939] kasan_atomics+0x95/0x310 [ 15.637268] kunit_try_run_case+0x1a5/0x480 [ 15.637630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.638060] kthread+0x337/0x6f0 [ 15.638413] ret_from_fork+0x116/0x1d0 [ 15.638742] ret_from_fork_asm+0x1a/0x30 [ 15.638902] [ 15.638979] The buggy address belongs to the object at ffff8881025e4100 [ 15.638979] which belongs to the cache kmalloc-64 of size 64 [ 15.639786] The buggy address is located 0 bytes to the right of [ 15.639786] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.641092] [ 15.641295] The buggy address belongs to the physical page: [ 15.641824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.642604] flags: 0x200000000000000(node=0|zone=2) [ 15.642938] page_type: f5(slab) [ 15.643063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.643734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.644451] page dumped because: kasan: bad access detected [ 15.644874] [ 15.644947] Memory state around the buggy address: [ 15.645123] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.645644] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.646107] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.646738] ^ [ 15.646960] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.647839] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.648282] ================================================================== [ 15.986479] ================================================================== [ 15.986860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.987358] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.987923] [ 15.988029] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.988072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.988085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.988107] Call Trace: [ 15.988125] <TASK> [ 15.988142] dump_stack_lvl+0x73/0xb0 [ 15.988171] print_report+0xd1/0x610 [ 15.988194] ? __virt_addr_valid+0x1db/0x2d0 [ 15.988231] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.988254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.988277] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.988299] kasan_report+0x141/0x180 [ 15.988322] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.988349] kasan_check_range+0x10c/0x1c0 [ 15.988373] __kasan_check_write+0x18/0x20 [ 15.988393] kasan_atomics_helper+0x1c18/0x5450 [ 15.988417] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.988440] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.988465] ? kasan_atomics+0x152/0x310 [ 15.988514] kasan_atomics+0x1dc/0x310 [ 15.988538] ? __pfx_kasan_atomics+0x10/0x10 [ 15.988563] ? __pfx_read_tsc+0x10/0x10 [ 15.988586] ? ktime_get_ts64+0x86/0x230 [ 15.988610] kunit_try_run_case+0x1a5/0x480 [ 15.988636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.988661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.988686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.988728] ? __kthread_parkme+0x82/0x180 [ 15.988749] ? preempt_count_sub+0x50/0x80 [ 15.988774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.988799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.988862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.988888] kthread+0x337/0x6f0 [ 15.988909] ? trace_preempt_on+0x20/0xc0 [ 15.988969] ? __pfx_kthread+0x10/0x10 [ 15.988992] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.989014] ? calculate_sigpending+0x7b/0xa0 [ 15.989038] ? __pfx_kthread+0x10/0x10 [ 15.989060] ret_from_fork+0x116/0x1d0 [ 15.989079] ? __pfx_kthread+0x10/0x10 [ 15.989111] ret_from_fork_asm+0x1a/0x30 [ 15.989144] </TASK> [ 15.989155] [ 15.997597] Allocated by task 282: [ 15.997808] kasan_save_stack+0x45/0x70 [ 15.998019] kasan_save_track+0x18/0x40 [ 15.998211] kasan_save_alloc_info+0x3b/0x50 [ 15.998421] __kasan_kmalloc+0xb7/0xc0 [ 15.998691] __kmalloc_cache_noprof+0x189/0x420 [ 15.998860] kasan_atomics+0x95/0x310 [ 15.999056] kunit_try_run_case+0x1a5/0x480 [ 15.999274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.999538] kthread+0x337/0x6f0 [ 15.999728] ret_from_fork+0x116/0x1d0 [ 15.999951] ret_from_fork_asm+0x1a/0x30 [ 16.000153] [ 16.000267] The buggy address belongs to the object at ffff8881025e4100 [ 16.000267] which belongs to the cache kmalloc-64 of size 64 [ 16.000767] The buggy address is located 0 bytes to the right of [ 16.000767] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.001334] [ 16.001434] The buggy address belongs to the physical page: [ 16.001707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.002063] flags: 0x200000000000000(node=0|zone=2) [ 16.002325] page_type: f5(slab) [ 16.002502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.002809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.003054] page dumped because: kasan: bad access detected [ 16.003465] [ 16.003561] Memory state around the buggy address: [ 16.003785] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.004083] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.004426] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.004685] ^ [ 16.004965] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.005335] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.005648] ================================================================== [ 15.688584] ================================================================== [ 15.688931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.689311] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.689655] [ 15.689751] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.689795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.689808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.689841] Call Trace: [ 15.689854] <TASK> [ 15.689869] dump_stack_lvl+0x73/0xb0 [ 15.689896] print_report+0xd1/0x610 [ 15.689918] ? __virt_addr_valid+0x1db/0x2d0 [ 15.689941] ? kasan_atomics_helper+0x1467/0x5450 [ 15.689963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.689986] ? kasan_atomics_helper+0x1467/0x5450 [ 15.690009] kasan_report+0x141/0x180 [ 15.690032] ? kasan_atomics_helper+0x1467/0x5450 [ 15.690058] kasan_check_range+0x10c/0x1c0 [ 15.690083] __kasan_check_write+0x18/0x20 [ 15.690103] kasan_atomics_helper+0x1467/0x5450 [ 15.690126] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.690149] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.690174] ? kasan_atomics+0x152/0x310 [ 15.690200] kasan_atomics+0x1dc/0x310 [ 15.690234] ? __pfx_kasan_atomics+0x10/0x10 [ 15.690258] ? __pfx_read_tsc+0x10/0x10 [ 15.690279] ? ktime_get_ts64+0x86/0x230 [ 15.690315] kunit_try_run_case+0x1a5/0x480 [ 15.690340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.690364] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.690388] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.690412] ? __kthread_parkme+0x82/0x180 [ 15.690444] ? preempt_count_sub+0x50/0x80 [ 15.690477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.690501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.690525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.690560] kthread+0x337/0x6f0 [ 15.690581] ? trace_preempt_on+0x20/0xc0 [ 15.690604] ? __pfx_kthread+0x10/0x10 [ 15.690625] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.690647] ? calculate_sigpending+0x7b/0xa0 [ 15.690671] ? __pfx_kthread+0x10/0x10 [ 15.690693] ret_from_fork+0x116/0x1d0 [ 15.690712] ? __pfx_kthread+0x10/0x10 [ 15.690733] ret_from_fork_asm+0x1a/0x30 [ 15.690763] </TASK> [ 15.690774] [ 15.698871] Allocated by task 282: [ 15.699070] kasan_save_stack+0x45/0x70 [ 15.699293] kasan_save_track+0x18/0x40 [ 15.699483] kasan_save_alloc_info+0x3b/0x50 [ 15.699674] __kasan_kmalloc+0xb7/0xc0 [ 15.699884] __kmalloc_cache_noprof+0x189/0x420 [ 15.700075] kasan_atomics+0x95/0x310 [ 15.700283] kunit_try_run_case+0x1a5/0x480 [ 15.700452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.700710] kthread+0x337/0x6f0 [ 15.700858] ret_from_fork+0x116/0x1d0 [ 15.701064] ret_from_fork_asm+0x1a/0x30 [ 15.701260] [ 15.701362] The buggy address belongs to the object at ffff8881025e4100 [ 15.701362] which belongs to the cache kmalloc-64 of size 64 [ 15.701738] The buggy address is located 0 bytes to the right of [ 15.701738] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.702119] [ 15.702195] The buggy address belongs to the physical page: [ 15.702370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.702614] flags: 0x200000000000000(node=0|zone=2) [ 15.702779] page_type: f5(slab) [ 15.702949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.703609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.703957] page dumped because: kasan: bad access detected [ 15.704206] [ 15.704301] Memory state around the buggy address: [ 15.704523] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.704856] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705242] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.705464] ^ [ 15.705622] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.705851] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.706066] ================================================================== [ 15.456606] ================================================================== [ 15.456974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.457309] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.457726] [ 15.457835] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.457881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.457896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.457917] Call Trace: [ 15.457933] <TASK> [ 15.457947] dump_stack_lvl+0x73/0xb0 [ 15.457976] print_report+0xd1/0x610 [ 15.457998] ? __virt_addr_valid+0x1db/0x2d0 [ 15.458021] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.458042] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.458065] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.458088] kasan_report+0x141/0x180 [ 15.458123] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.458150] __asan_report_load4_noabort+0x18/0x20 [ 15.458175] kasan_atomics_helper+0x4a36/0x5450 [ 15.458197] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.458220] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.458271] ? kasan_atomics+0x152/0x310 [ 15.458298] kasan_atomics+0x1dc/0x310 [ 15.458321] ? __pfx_kasan_atomics+0x10/0x10 [ 15.458364] ? __pfx_read_tsc+0x10/0x10 [ 15.458384] ? ktime_get_ts64+0x86/0x230 [ 15.458408] kunit_try_run_case+0x1a5/0x480 [ 15.458450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458474] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.458498] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.458521] ? __kthread_parkme+0x82/0x180 [ 15.458542] ? preempt_count_sub+0x50/0x80 [ 15.458566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.458632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.458656] kthread+0x337/0x6f0 [ 15.458677] ? trace_preempt_on+0x20/0xc0 [ 15.458700] ? __pfx_kthread+0x10/0x10 [ 15.458721] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.458744] ? calculate_sigpending+0x7b/0xa0 [ 15.458767] ? __pfx_kthread+0x10/0x10 [ 15.458807] ret_from_fork+0x116/0x1d0 [ 15.458836] ? __pfx_kthread+0x10/0x10 [ 15.458857] ret_from_fork_asm+0x1a/0x30 [ 15.458888] </TASK> [ 15.458899] [ 15.467027] Allocated by task 282: [ 15.467199] kasan_save_stack+0x45/0x70 [ 15.467426] kasan_save_track+0x18/0x40 [ 15.467609] kasan_save_alloc_info+0x3b/0x50 [ 15.467823] __kasan_kmalloc+0xb7/0xc0 [ 15.468005] __kmalloc_cache_noprof+0x189/0x420 [ 15.468192] kasan_atomics+0x95/0x310 [ 15.468385] kunit_try_run_case+0x1a5/0x480 [ 15.468601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.469015] kthread+0x337/0x6f0 [ 15.469215] ret_from_fork+0x116/0x1d0 [ 15.469371] ret_from_fork_asm+0x1a/0x30 [ 15.469583] [ 15.469699] The buggy address belongs to the object at ffff8881025e4100 [ 15.469699] which belongs to the cache kmalloc-64 of size 64 [ 15.470271] The buggy address is located 0 bytes to the right of [ 15.470271] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.470843] [ 15.470945] The buggy address belongs to the physical page: [ 15.471327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.471626] flags: 0x200000000000000(node=0|zone=2) [ 15.471791] page_type: f5(slab) [ 15.472125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.472454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.472767] page dumped because: kasan: bad access detected [ 15.473022] [ 15.474005] Memory state around the buggy address: [ 15.474200] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.474435] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.474660] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.476199] ^ [ 15.476543] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.476767] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.477001] ================================================================== [ 16.223043] ================================================================== [ 16.223480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.223807] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.224243] [ 16.224373] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.224418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.224431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.224453] Call Trace: [ 16.224468] <TASK> [ 16.224485] dump_stack_lvl+0x73/0xb0 [ 16.224543] print_report+0xd1/0x610 [ 16.224565] ? __virt_addr_valid+0x1db/0x2d0 [ 16.224587] ? kasan_atomics_helper+0x218a/0x5450 [ 16.224609] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.224632] ? kasan_atomics_helper+0x218a/0x5450 [ 16.224654] kasan_report+0x141/0x180 [ 16.224676] ? kasan_atomics_helper+0x218a/0x5450 [ 16.224733] kasan_check_range+0x10c/0x1c0 [ 16.224758] __kasan_check_write+0x18/0x20 [ 16.224801] kasan_atomics_helper+0x218a/0x5450 [ 16.224862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.224910] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.224936] ? kasan_atomics+0x152/0x310 [ 16.224964] kasan_atomics+0x1dc/0x310 [ 16.224987] ? __pfx_kasan_atomics+0x10/0x10 [ 16.225012] ? __pfx_read_tsc+0x10/0x10 [ 16.225033] ? ktime_get_ts64+0x86/0x230 [ 16.225057] kunit_try_run_case+0x1a5/0x480 [ 16.225102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.225126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.225151] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.225175] ? __kthread_parkme+0x82/0x180 [ 16.225196] ? preempt_count_sub+0x50/0x80 [ 16.225220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.225245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.225269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.225326] kthread+0x337/0x6f0 [ 16.225347] ? trace_preempt_on+0x20/0xc0 [ 16.225370] ? __pfx_kthread+0x10/0x10 [ 16.225394] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.225420] ? calculate_sigpending+0x7b/0xa0 [ 16.225474] ? __pfx_kthread+0x10/0x10 [ 16.225498] ret_from_fork+0x116/0x1d0 [ 16.225517] ? __pfx_kthread+0x10/0x10 [ 16.225539] ret_from_fork_asm+0x1a/0x30 [ 16.225570] </TASK> [ 16.225581] [ 16.233910] Allocated by task 282: [ 16.234124] kasan_save_stack+0x45/0x70 [ 16.234327] kasan_save_track+0x18/0x40 [ 16.234518] kasan_save_alloc_info+0x3b/0x50 [ 16.234726] __kasan_kmalloc+0xb7/0xc0 [ 16.234920] __kmalloc_cache_noprof+0x189/0x420 [ 16.235161] kasan_atomics+0x95/0x310 [ 16.235349] kunit_try_run_case+0x1a5/0x480 [ 16.235561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.235792] kthread+0x337/0x6f0 [ 16.235928] ret_from_fork+0x116/0x1d0 [ 16.236063] ret_from_fork_asm+0x1a/0x30 [ 16.236318] [ 16.236417] The buggy address belongs to the object at ffff8881025e4100 [ 16.236417] which belongs to the cache kmalloc-64 of size 64 [ 16.236974] The buggy address is located 0 bytes to the right of [ 16.236974] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.237550] [ 16.237640] The buggy address belongs to the physical page: [ 16.237925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.238310] flags: 0x200000000000000(node=0|zone=2) [ 16.238553] page_type: f5(slab) [ 16.238729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.239126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.239456] page dumped because: kasan: bad access detected [ 16.239712] [ 16.239810] Memory state around the buggy address: [ 16.239981] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.240307] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.240667] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.241001] ^ [ 16.241189] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.241477] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.241870] ================================================================== [ 15.253065] ================================================================== [ 15.253308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.253629] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.253979] [ 15.254085] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.254128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.254141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.254163] Call Trace: [ 15.254178] <TASK> [ 15.254194] dump_stack_lvl+0x73/0xb0 [ 15.254220] print_report+0xd1/0x610 [ 15.254242] ? __virt_addr_valid+0x1db/0x2d0 [ 15.254265] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.254287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.254310] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.254331] kasan_report+0x141/0x180 [ 15.254353] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.254379] kasan_check_range+0x10c/0x1c0 [ 15.254417] __kasan_check_write+0x18/0x20 [ 15.254436] kasan_atomics_helper+0xa2b/0x5450 [ 15.254459] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.254483] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.254509] ? kasan_atomics+0x152/0x310 [ 15.254536] kasan_atomics+0x1dc/0x310 [ 15.254559] ? __pfx_kasan_atomics+0x10/0x10 [ 15.254584] ? __pfx_read_tsc+0x10/0x10 [ 15.254605] ? ktime_get_ts64+0x86/0x230 [ 15.254630] kunit_try_run_case+0x1a5/0x480 [ 15.254654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.254678] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.254703] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.254727] ? __kthread_parkme+0x82/0x180 [ 15.254747] ? preempt_count_sub+0x50/0x80 [ 15.254771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.254795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.254828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.254854] kthread+0x337/0x6f0 [ 15.254874] ? trace_preempt_on+0x20/0xc0 [ 15.254898] ? __pfx_kthread+0x10/0x10 [ 15.254918] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.254941] ? calculate_sigpending+0x7b/0xa0 [ 15.254964] ? __pfx_kthread+0x10/0x10 [ 15.254987] ret_from_fork+0x116/0x1d0 [ 15.255006] ? __pfx_kthread+0x10/0x10 [ 15.255027] ret_from_fork_asm+0x1a/0x30 [ 15.255057] </TASK> [ 15.255068] [ 15.262504] Allocated by task 282: [ 15.262678] kasan_save_stack+0x45/0x70 [ 15.262882] kasan_save_track+0x18/0x40 [ 15.263024] kasan_save_alloc_info+0x3b/0x50 [ 15.263393] __kasan_kmalloc+0xb7/0xc0 [ 15.263534] __kmalloc_cache_noprof+0x189/0x420 [ 15.263692] kasan_atomics+0x95/0x310 [ 15.263837] kunit_try_run_case+0x1a5/0x480 [ 15.264043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.264582] kthread+0x337/0x6f0 [ 15.264741] ret_from_fork+0x116/0x1d0 [ 15.264934] ret_from_fork_asm+0x1a/0x30 [ 15.265146] [ 15.265226] The buggy address belongs to the object at ffff8881025e4100 [ 15.265226] which belongs to the cache kmalloc-64 of size 64 [ 15.265685] The buggy address is located 0 bytes to the right of [ 15.265685] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.266189] [ 15.266289] The buggy address belongs to the physical page: [ 15.266551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.266801] flags: 0x200000000000000(node=0|zone=2) [ 15.266976] page_type: f5(slab) [ 15.267179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.267525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.267881] page dumped because: kasan: bad access detected [ 15.268185] [ 15.268279] Memory state around the buggy address: [ 15.268488] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.268715] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.269048] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.269350] ^ [ 15.269571] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.269851] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.270165] ================================================================== [ 15.104787] ================================================================== [ 15.105603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.106259] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.106886] [ 15.107061] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.107105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.107118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.107139] Call Trace: [ 15.107155] <TASK> [ 15.107171] dump_stack_lvl+0x73/0xb0 [ 15.107199] print_report+0xd1/0x610 [ 15.107221] ? __virt_addr_valid+0x1db/0x2d0 [ 15.107243] ? kasan_atomics_helper+0x565/0x5450 [ 15.107264] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.107288] ? kasan_atomics_helper+0x565/0x5450 [ 15.107310] kasan_report+0x141/0x180 [ 15.107332] ? kasan_atomics_helper+0x565/0x5450 [ 15.107359] kasan_check_range+0x10c/0x1c0 [ 15.107383] __kasan_check_write+0x18/0x20 [ 15.107403] kasan_atomics_helper+0x565/0x5450 [ 15.107426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.107449] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.107474] ? kasan_atomics+0x152/0x310 [ 15.107501] kasan_atomics+0x1dc/0x310 [ 15.107524] ? __pfx_kasan_atomics+0x10/0x10 [ 15.107549] ? __pfx_read_tsc+0x10/0x10 [ 15.107570] ? ktime_get_ts64+0x86/0x230 [ 15.107594] kunit_try_run_case+0x1a5/0x480 [ 15.107619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.107667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.107692] ? __kthread_parkme+0x82/0x180 [ 15.107713] ? preempt_count_sub+0x50/0x80 [ 15.107737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.107786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.107821] kthread+0x337/0x6f0 [ 15.107842] ? trace_preempt_on+0x20/0xc0 [ 15.107865] ? __pfx_kthread+0x10/0x10 [ 15.107887] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.107909] ? calculate_sigpending+0x7b/0xa0 [ 15.107934] ? __pfx_kthread+0x10/0x10 [ 15.107956] ret_from_fork+0x116/0x1d0 [ 15.107975] ? __pfx_kthread+0x10/0x10 [ 15.107997] ret_from_fork_asm+0x1a/0x30 [ 15.108028] </TASK> [ 15.108040] [ 15.119791] Allocated by task 282: [ 15.119988] kasan_save_stack+0x45/0x70 [ 15.120267] kasan_save_track+0x18/0x40 [ 15.120448] kasan_save_alloc_info+0x3b/0x50 [ 15.120631] __kasan_kmalloc+0xb7/0xc0 [ 15.120798] __kmalloc_cache_noprof+0x189/0x420 [ 15.120999] kasan_atomics+0x95/0x310 [ 15.121242] kunit_try_run_case+0x1a5/0x480 [ 15.121391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.121568] kthread+0x337/0x6f0 [ 15.121696] ret_from_fork+0x116/0x1d0 [ 15.121892] ret_from_fork_asm+0x1a/0x30 [ 15.122092] [ 15.122190] The buggy address belongs to the object at ffff8881025e4100 [ 15.122190] which belongs to the cache kmalloc-64 of size 64 [ 15.122926] The buggy address is located 0 bytes to the right of [ 15.122926] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.123420] [ 15.123513] The buggy address belongs to the physical page: [ 15.123688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.123946] flags: 0x200000000000000(node=0|zone=2) [ 15.124222] page_type: f5(slab) [ 15.124391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.124738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.125044] page dumped because: kasan: bad access detected [ 15.125301] [ 15.125382] Memory state around the buggy address: [ 15.125605] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.125878] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.126223] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.126494] ^ [ 15.126688] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.126973] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.127281] ================================================================== [ 15.066792] ================================================================== [ 15.067344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.067639] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.067910] [ 15.068000] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.068044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.068058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.068080] Call Trace: [ 15.068098] <TASK> [ 15.068113] dump_stack_lvl+0x73/0xb0 [ 15.068140] print_report+0xd1/0x610 [ 15.068162] ? __virt_addr_valid+0x1db/0x2d0 [ 15.068185] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.068207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.068230] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.068252] kasan_report+0x141/0x180 [ 15.068275] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.068301] kasan_check_range+0x10c/0x1c0 [ 15.068325] __kasan_check_write+0x18/0x20 [ 15.068345] kasan_atomics_helper+0x4a0/0x5450 [ 15.068369] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.068392] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.068417] ? kasan_atomics+0x152/0x310 [ 15.068444] kasan_atomics+0x1dc/0x310 [ 15.068467] ? __pfx_kasan_atomics+0x10/0x10 [ 15.068493] ? __pfx_read_tsc+0x10/0x10 [ 15.068514] ? ktime_get_ts64+0x86/0x230 [ 15.068539] kunit_try_run_case+0x1a5/0x480 [ 15.068563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.068587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.068611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.068635] ? __kthread_parkme+0x82/0x180 [ 15.068655] ? preempt_count_sub+0x50/0x80 [ 15.068679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.068703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.068727] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.068751] kthread+0x337/0x6f0 [ 15.068772] ? trace_preempt_on+0x20/0xc0 [ 15.068795] ? __pfx_kthread+0x10/0x10 [ 15.068825] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.068853] ? calculate_sigpending+0x7b/0xa0 [ 15.068877] ? __pfx_kthread+0x10/0x10 [ 15.068899] ret_from_fork+0x116/0x1d0 [ 15.068918] ? __pfx_kthread+0x10/0x10 [ 15.068938] ret_from_fork_asm+0x1a/0x30 [ 15.068969] </TASK> [ 15.068981] [ 15.076436] Allocated by task 282: [ 15.076564] kasan_save_stack+0x45/0x70 [ 15.076707] kasan_save_track+0x18/0x40 [ 15.076860] kasan_save_alloc_info+0x3b/0x50 [ 15.077012] __kasan_kmalloc+0xb7/0xc0 [ 15.077146] __kmalloc_cache_noprof+0x189/0x420 [ 15.077543] kasan_atomics+0x95/0x310 [ 15.077736] kunit_try_run_case+0x1a5/0x480 [ 15.077954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.078364] kthread+0x337/0x6f0 [ 15.078536] ret_from_fork+0x116/0x1d0 [ 15.078727] ret_from_fork_asm+0x1a/0x30 [ 15.078938] [ 15.079040] The buggy address belongs to the object at ffff8881025e4100 [ 15.079040] which belongs to the cache kmalloc-64 of size 64 [ 15.079967] The buggy address is located 0 bytes to the right of [ 15.079967] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.080381] [ 15.080456] The buggy address belongs to the physical page: [ 15.080631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.080915] flags: 0x200000000000000(node=0|zone=2) [ 15.081156] page_type: f5(slab) [ 15.081325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.081665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.081944] page dumped because: kasan: bad access detected [ 15.082120] [ 15.082192] Memory state around the buggy address: [ 15.082348] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.082568] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.083235] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.083560] ^ [ 15.083786] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.084123] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.084398] ================================================================== [ 16.024145] ================================================================== [ 16.024851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.025208] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.025543] [ 16.025646] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.025689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.025702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.025745] Call Trace: [ 16.025759] <TASK> [ 16.025774] dump_stack_lvl+0x73/0xb0 [ 16.025801] print_report+0xd1/0x610 [ 16.025835] ? __virt_addr_valid+0x1db/0x2d0 [ 16.025858] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.025879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.025904] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.025946] kasan_report+0x141/0x180 [ 16.025968] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.025996] kasan_check_range+0x10c/0x1c0 [ 16.026020] __kasan_check_write+0x18/0x20 [ 16.026040] kasan_atomics_helper+0x1ce1/0x5450 [ 16.026064] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.026087] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.026125] ? kasan_atomics+0x152/0x310 [ 16.026153] kasan_atomics+0x1dc/0x310 [ 16.026177] ? __pfx_kasan_atomics+0x10/0x10 [ 16.026202] ? __pfx_read_tsc+0x10/0x10 [ 16.026224] ? ktime_get_ts64+0x86/0x230 [ 16.026248] kunit_try_run_case+0x1a5/0x480 [ 16.026274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.026297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.026322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.026347] ? __kthread_parkme+0x82/0x180 [ 16.026369] ? preempt_count_sub+0x50/0x80 [ 16.026393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.026419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.026443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.026468] kthread+0x337/0x6f0 [ 16.026489] ? trace_preempt_on+0x20/0xc0 [ 16.026513] ? __pfx_kthread+0x10/0x10 [ 16.026535] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.026558] ? calculate_sigpending+0x7b/0xa0 [ 16.026584] ? __pfx_kthread+0x10/0x10 [ 16.026609] ret_from_fork+0x116/0x1d0 [ 16.026629] ? __pfx_kthread+0x10/0x10 [ 16.026654] ret_from_fork_asm+0x1a/0x30 [ 16.026687] </TASK> [ 16.026698] [ 16.034045] Allocated by task 282: [ 16.034299] kasan_save_stack+0x45/0x70 [ 16.034441] kasan_save_track+0x18/0x40 [ 16.034575] kasan_save_alloc_info+0x3b/0x50 [ 16.034747] __kasan_kmalloc+0xb7/0xc0 [ 16.034942] __kmalloc_cache_noprof+0x189/0x420 [ 16.035160] kasan_atomics+0x95/0x310 [ 16.035500] kunit_try_run_case+0x1a5/0x480 [ 16.035655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.035846] kthread+0x337/0x6f0 [ 16.036038] ret_from_fork+0x116/0x1d0 [ 16.036392] ret_from_fork_asm+0x1a/0x30 [ 16.036593] [ 16.036695] The buggy address belongs to the object at ffff8881025e4100 [ 16.036695] which belongs to the cache kmalloc-64 of size 64 [ 16.037066] The buggy address is located 0 bytes to the right of [ 16.037066] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.037601] [ 16.037700] The buggy address belongs to the physical page: [ 16.037891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.038220] flags: 0x200000000000000(node=0|zone=2) [ 16.038458] page_type: f5(slab) [ 16.038641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.038914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.039137] page dumped because: kasan: bad access detected [ 16.039309] [ 16.039379] Memory state around the buggy address: [ 16.039531] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.039834] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.040144] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.040451] ^ [ 16.040669] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.041305] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.041518] ================================================================== [ 15.048578] ================================================================== [ 15.049073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.049712] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.049999] [ 15.050087] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.050139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.050152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.050174] Call Trace: [ 15.050191] <TASK> [ 15.050207] dump_stack_lvl+0x73/0xb0 [ 15.050234] print_report+0xd1/0x610 [ 15.050256] ? __virt_addr_valid+0x1db/0x2d0 [ 15.050279] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.050301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.050324] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.050347] kasan_report+0x141/0x180 [ 15.050371] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.050397] __asan_report_load4_noabort+0x18/0x20 [ 15.050423] kasan_atomics_helper+0x4b54/0x5450 [ 15.050446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.050469] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.050495] ? kasan_atomics+0x152/0x310 [ 15.050522] kasan_atomics+0x1dc/0x310 [ 15.050546] ? __pfx_kasan_atomics+0x10/0x10 [ 15.050571] ? __pfx_read_tsc+0x10/0x10 [ 15.050591] ? ktime_get_ts64+0x86/0x230 [ 15.050616] kunit_try_run_case+0x1a5/0x480 [ 15.050642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.050664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.050689] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.050714] ? __kthread_parkme+0x82/0x180 [ 15.050735] ? preempt_count_sub+0x50/0x80 [ 15.050760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.050784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.050808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.050843] kthread+0x337/0x6f0 [ 15.050863] ? trace_preempt_on+0x20/0xc0 [ 15.050886] ? __pfx_kthread+0x10/0x10 [ 15.050908] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.050930] ? calculate_sigpending+0x7b/0xa0 [ 15.050955] ? __pfx_kthread+0x10/0x10 [ 15.050979] ret_from_fork+0x116/0x1d0 [ 15.051001] ? __pfx_kthread+0x10/0x10 [ 15.051022] ret_from_fork_asm+0x1a/0x30 [ 15.051054] </TASK> [ 15.051064] [ 15.058358] Allocated by task 282: [ 15.058540] kasan_save_stack+0x45/0x70 [ 15.058744] kasan_save_track+0x18/0x40 [ 15.058947] kasan_save_alloc_info+0x3b/0x50 [ 15.059199] __kasan_kmalloc+0xb7/0xc0 [ 15.059339] __kmalloc_cache_noprof+0x189/0x420 [ 15.059527] kasan_atomics+0x95/0x310 [ 15.059717] kunit_try_run_case+0x1a5/0x480 [ 15.059937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.060187] kthread+0x337/0x6f0 [ 15.060343] ret_from_fork+0x116/0x1d0 [ 15.060501] ret_from_fork_asm+0x1a/0x30 [ 15.060702] [ 15.060794] The buggy address belongs to the object at ffff8881025e4100 [ 15.060794] which belongs to the cache kmalloc-64 of size 64 [ 15.061299] The buggy address is located 0 bytes to the right of [ 15.061299] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.061782] [ 15.061890] The buggy address belongs to the physical page: [ 15.062147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.062442] flags: 0x200000000000000(node=0|zone=2) [ 15.062690] page_type: f5(slab) [ 15.062847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.063196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.063508] page dumped because: kasan: bad access detected [ 15.063717] [ 15.063825] Memory state around the buggy address: [ 15.064020] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.064340] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.064589] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.064805] ^ [ 15.065045] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.065590] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.065871] ================================================================== [ 15.812764] ================================================================== [ 15.813173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.813907] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.814508] [ 15.814722] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.814850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.814865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.814887] Call Trace: [ 15.814905] <TASK> [ 15.814923] dump_stack_lvl+0x73/0xb0 [ 15.814952] print_report+0xd1/0x610 [ 15.814975] ? __virt_addr_valid+0x1db/0x2d0 [ 15.814998] ? kasan_atomics_helper+0x177f/0x5450 [ 15.815019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.815043] ? kasan_atomics_helper+0x177f/0x5450 [ 15.815066] kasan_report+0x141/0x180 [ 15.815088] ? kasan_atomics_helper+0x177f/0x5450 [ 15.815115] kasan_check_range+0x10c/0x1c0 [ 15.815139] __kasan_check_write+0x18/0x20 [ 15.815159] kasan_atomics_helper+0x177f/0x5450 [ 15.815183] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.815206] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.815231] ? kasan_atomics+0x152/0x310 [ 15.815258] kasan_atomics+0x1dc/0x310 [ 15.815282] ? __pfx_kasan_atomics+0x10/0x10 [ 15.815307] ? __pfx_read_tsc+0x10/0x10 [ 15.815328] ? ktime_get_ts64+0x86/0x230 [ 15.815352] kunit_try_run_case+0x1a5/0x480 [ 15.815377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.815399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.815423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.815447] ? __kthread_parkme+0x82/0x180 [ 15.815468] ? preempt_count_sub+0x50/0x80 [ 15.815491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.815516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.815541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.815565] kthread+0x337/0x6f0 [ 15.815585] ? trace_preempt_on+0x20/0xc0 [ 15.815608] ? __pfx_kthread+0x10/0x10 [ 15.815631] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.815654] ? calculate_sigpending+0x7b/0xa0 [ 15.815679] ? __pfx_kthread+0x10/0x10 [ 15.815701] ret_from_fork+0x116/0x1d0 [ 15.815720] ? __pfx_kthread+0x10/0x10 [ 15.815741] ret_from_fork_asm+0x1a/0x30 [ 15.815772] </TASK> [ 15.815783] [ 15.825725] Allocated by task 282: [ 15.826006] kasan_save_stack+0x45/0x70 [ 15.826295] kasan_save_track+0x18/0x40 [ 15.826461] kasan_save_alloc_info+0x3b/0x50 [ 15.826682] __kasan_kmalloc+0xb7/0xc0 [ 15.827036] __kmalloc_cache_noprof+0x189/0x420 [ 15.827224] kasan_atomics+0x95/0x310 [ 15.827560] kunit_try_run_case+0x1a5/0x480 [ 15.827737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.828156] kthread+0x337/0x6f0 [ 15.828397] ret_from_fork+0x116/0x1d0 [ 15.828548] ret_from_fork_asm+0x1a/0x30 [ 15.828748] [ 15.828860] The buggy address belongs to the object at ffff8881025e4100 [ 15.828860] which belongs to the cache kmalloc-64 of size 64 [ 15.829546] The buggy address is located 0 bytes to the right of [ 15.829546] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.830190] [ 15.830431] The buggy address belongs to the physical page: [ 15.831360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.831618] flags: 0x200000000000000(node=0|zone=2) [ 15.831790] page_type: f5(slab) [ 15.831945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.832190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.832423] page dumped because: kasan: bad access detected [ 15.832600] [ 15.832675] Memory state around the buggy address: [ 15.833375] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.834502] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.835613] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.836560] ^ [ 15.837289] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838337] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.839297] ================================================================== [ 14.941328] ================================================================== [ 14.942739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.943963] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 14.944883] [ 14.945353] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.945406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.945420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.945442] Call Trace: [ 14.945457] <TASK> [ 14.945472] dump_stack_lvl+0x73/0xb0 [ 14.945504] print_report+0xd1/0x610 [ 14.945525] ? __virt_addr_valid+0x1db/0x2d0 [ 14.945548] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.945569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.945591] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.945613] kasan_report+0x141/0x180 [ 14.945634] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.945659] __asan_report_load4_noabort+0x18/0x20 [ 14.945683] kasan_atomics_helper+0x4bbc/0x5450 [ 14.945705] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.945725] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.945750] ? kasan_atomics+0x152/0x310 [ 14.945776] kasan_atomics+0x1dc/0x310 [ 14.945797] ? __pfx_kasan_atomics+0x10/0x10 [ 14.946116] ? __pfx_read_tsc+0x10/0x10 [ 14.946144] ? ktime_get_ts64+0x86/0x230 [ 14.946171] kunit_try_run_case+0x1a5/0x480 [ 14.946246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.946270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.946295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.946319] ? __kthread_parkme+0x82/0x180 [ 14.946339] ? preempt_count_sub+0x50/0x80 [ 14.946362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.946385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.946408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.946431] kthread+0x337/0x6f0 [ 14.946450] ? trace_preempt_on+0x20/0xc0 [ 14.946473] ? __pfx_kthread+0x10/0x10 [ 14.946492] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.946513] ? calculate_sigpending+0x7b/0xa0 [ 14.946536] ? __pfx_kthread+0x10/0x10 [ 14.946557] ret_from_fork+0x116/0x1d0 [ 14.946575] ? __pfx_kthread+0x10/0x10 [ 14.946595] ret_from_fork_asm+0x1a/0x30 [ 14.946626] </TASK> [ 14.946636] [ 14.960521] Allocated by task 282: [ 14.960789] kasan_save_stack+0x45/0x70 [ 14.960961] kasan_save_track+0x18/0x40 [ 14.961109] kasan_save_alloc_info+0x3b/0x50 [ 14.961650] __kasan_kmalloc+0xb7/0xc0 [ 14.962025] __kmalloc_cache_noprof+0x189/0x420 [ 14.962514] kasan_atomics+0x95/0x310 [ 14.962877] kunit_try_run_case+0x1a5/0x480 [ 14.963314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.963794] kthread+0x337/0x6f0 [ 14.963944] ret_from_fork+0x116/0x1d0 [ 14.964078] ret_from_fork_asm+0x1a/0x30 [ 14.964221] [ 14.964388] The buggy address belongs to the object at ffff8881025e4100 [ 14.964388] which belongs to the cache kmalloc-64 of size 64 [ 14.965682] The buggy address is located 0 bytes to the right of [ 14.965682] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 14.966931] [ 14.967098] The buggy address belongs to the physical page: [ 14.967436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 14.967689] flags: 0x200000000000000(node=0|zone=2) [ 14.967873] page_type: f5(slab) [ 14.967997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.968251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.968718] page dumped because: kasan: bad access detected [ 14.968950] [ 14.969051] Memory state around the buggy address: [ 14.969234] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.969668] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.970018] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.970431] ^ [ 14.970646] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.970955] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.971240] ================================================================== [ 15.401871] ================================================================== [ 15.402246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.402534] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.402844] [ 15.403027] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.403074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.403088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.403110] Call Trace: [ 15.403130] <TASK> [ 15.403148] dump_stack_lvl+0x73/0xb0 [ 15.403177] print_report+0xd1/0x610 [ 15.403201] ? __virt_addr_valid+0x1db/0x2d0 [ 15.403224] ? kasan_atomics_helper+0xe78/0x5450 [ 15.403246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.403268] ? kasan_atomics_helper+0xe78/0x5450 [ 15.403290] kasan_report+0x141/0x180 [ 15.403313] ? kasan_atomics_helper+0xe78/0x5450 [ 15.403339] kasan_check_range+0x10c/0x1c0 [ 15.403363] __kasan_check_write+0x18/0x20 [ 15.403383] kasan_atomics_helper+0xe78/0x5450 [ 15.403406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.403428] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.403454] ? kasan_atomics+0x152/0x310 [ 15.403481] kasan_atomics+0x1dc/0x310 [ 15.403505] ? __pfx_kasan_atomics+0x10/0x10 [ 15.403529] ? __pfx_read_tsc+0x10/0x10 [ 15.403552] ? ktime_get_ts64+0x86/0x230 [ 15.403576] kunit_try_run_case+0x1a5/0x480 [ 15.403601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.403624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.403648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.403672] ? __kthread_parkme+0x82/0x180 [ 15.403693] ? preempt_count_sub+0x50/0x80 [ 15.403717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.403742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.403766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.403790] kthread+0x337/0x6f0 [ 15.403823] ? trace_preempt_on+0x20/0xc0 [ 15.403848] ? __pfx_kthread+0x10/0x10 [ 15.403869] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.403892] ? calculate_sigpending+0x7b/0xa0 [ 15.403917] ? __pfx_kthread+0x10/0x10 [ 15.403940] ret_from_fork+0x116/0x1d0 [ 15.403960] ? __pfx_kthread+0x10/0x10 [ 15.403981] ret_from_fork_asm+0x1a/0x30 [ 15.404012] </TASK> [ 15.404024] [ 15.412076] Allocated by task 282: [ 15.412272] kasan_save_stack+0x45/0x70 [ 15.412471] kasan_save_track+0x18/0x40 [ 15.412648] kasan_save_alloc_info+0x3b/0x50 [ 15.412868] __kasan_kmalloc+0xb7/0xc0 [ 15.413043] __kmalloc_cache_noprof+0x189/0x420 [ 15.413260] kasan_atomics+0x95/0x310 [ 15.413444] kunit_try_run_case+0x1a5/0x480 [ 15.413627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.413880] kthread+0x337/0x6f0 [ 15.414051] ret_from_fork+0x116/0x1d0 [ 15.414273] ret_from_fork_asm+0x1a/0x30 [ 15.414469] [ 15.414557] The buggy address belongs to the object at ffff8881025e4100 [ 15.414557] which belongs to the cache kmalloc-64 of size 64 [ 15.415040] The buggy address is located 0 bytes to the right of [ 15.415040] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.415556] [ 15.415640] The buggy address belongs to the physical page: [ 15.415879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.416269] flags: 0x200000000000000(node=0|zone=2) [ 15.416472] page_type: f5(slab) [ 15.416635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.416929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.417290] page dumped because: kasan: bad access detected [ 15.417500] [ 15.417600] Memory state around the buggy address: [ 15.417790] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.418112] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.418345] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.418563] ^ [ 15.418720] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.419010] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.419321] ================================================================== [ 15.217107] ================================================================== [ 15.217493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.217794] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.218043] [ 15.218132] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.218174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.218186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.218208] Call Trace: [ 15.218224] <TASK> [ 15.218239] dump_stack_lvl+0x73/0xb0 [ 15.218265] print_report+0xd1/0x610 [ 15.218288] ? __virt_addr_valid+0x1db/0x2d0 [ 15.218310] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.218332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.218355] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.218378] kasan_report+0x141/0x180 [ 15.218403] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.218429] kasan_check_range+0x10c/0x1c0 [ 15.218453] __kasan_check_write+0x18/0x20 [ 15.218474] kasan_atomics_helper+0x8f9/0x5450 [ 15.218496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.218519] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.218545] ? kasan_atomics+0x152/0x310 [ 15.218573] kasan_atomics+0x1dc/0x310 [ 15.218596] ? __pfx_kasan_atomics+0x10/0x10 [ 15.218621] ? __pfx_read_tsc+0x10/0x10 [ 15.218642] ? ktime_get_ts64+0x86/0x230 [ 15.218667] kunit_try_run_case+0x1a5/0x480 [ 15.218692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.218717] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.218743] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.218771] ? __kthread_parkme+0x82/0x180 [ 15.218792] ? preempt_count_sub+0x50/0x80 [ 15.218826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.218852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.218878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.218902] kthread+0x337/0x6f0 [ 15.218934] ? trace_preempt_on+0x20/0xc0 [ 15.218958] ? __pfx_kthread+0x10/0x10 [ 15.218979] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.219001] ? calculate_sigpending+0x7b/0xa0 [ 15.219027] ? __pfx_kthread+0x10/0x10 [ 15.219049] ret_from_fork+0x116/0x1d0 [ 15.219069] ? __pfx_kthread+0x10/0x10 [ 15.219091] ret_from_fork_asm+0x1a/0x30 [ 15.219122] </TASK> [ 15.219134] [ 15.226717] Allocated by task 282: [ 15.226876] kasan_save_stack+0x45/0x70 [ 15.227083] kasan_save_track+0x18/0x40 [ 15.227294] kasan_save_alloc_info+0x3b/0x50 [ 15.227517] __kasan_kmalloc+0xb7/0xc0 [ 15.227709] __kmalloc_cache_noprof+0x189/0x420 [ 15.227943] kasan_atomics+0x95/0x310 [ 15.228162] kunit_try_run_case+0x1a5/0x480 [ 15.228386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.228617] kthread+0x337/0x6f0 [ 15.228770] ret_from_fork+0x116/0x1d0 [ 15.228921] ret_from_fork_asm+0x1a/0x30 [ 15.229065] [ 15.229139] The buggy address belongs to the object at ffff8881025e4100 [ 15.229139] which belongs to the cache kmalloc-64 of size 64 [ 15.229852] The buggy address is located 0 bytes to the right of [ 15.229852] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.230594] [ 15.230699] The buggy address belongs to the physical page: [ 15.230885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.231130] flags: 0x200000000000000(node=0|zone=2) [ 15.231293] page_type: f5(slab) [ 15.231472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.231822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.232247] page dumped because: kasan: bad access detected [ 15.232499] [ 15.232594] Memory state around the buggy address: [ 15.232826] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.233114] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.233380] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.233596] ^ [ 15.233832] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.234253] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.234550] ================================================================== [ 15.548712] ================================================================== [ 15.549059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.549707] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.550202] [ 15.550330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.550377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.550390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.550412] Call Trace: [ 15.550428] <TASK> [ 15.550443] dump_stack_lvl+0x73/0xb0 [ 15.550472] print_report+0xd1/0x610 [ 15.550494] ? __virt_addr_valid+0x1db/0x2d0 [ 15.550517] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.550539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.550562] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.550584] kasan_report+0x141/0x180 [ 15.550607] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.550634] __asan_report_load4_noabort+0x18/0x20 [ 15.550659] kasan_atomics_helper+0x4a02/0x5450 [ 15.550683] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.550706] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.550731] ? kasan_atomics+0x152/0x310 [ 15.550759] kasan_atomics+0x1dc/0x310 [ 15.550782] ? __pfx_kasan_atomics+0x10/0x10 [ 15.550808] ? __pfx_read_tsc+0x10/0x10 [ 15.550841] ? ktime_get_ts64+0x86/0x230 [ 15.550866] kunit_try_run_case+0x1a5/0x480 [ 15.550893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.550915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.550940] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.550964] ? __kthread_parkme+0x82/0x180 [ 15.550985] ? preempt_count_sub+0x50/0x80 [ 15.551009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.551034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.551057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.551082] kthread+0x337/0x6f0 [ 15.551103] ? trace_preempt_on+0x20/0xc0 [ 15.551126] ? __pfx_kthread+0x10/0x10 [ 15.551147] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.551170] ? calculate_sigpending+0x7b/0xa0 [ 15.551193] ? __pfx_kthread+0x10/0x10 [ 15.551215] ret_from_fork+0x116/0x1d0 [ 15.551234] ? __pfx_kthread+0x10/0x10 [ 15.551255] ret_from_fork_asm+0x1a/0x30 [ 15.551286] </TASK> [ 15.551308] [ 15.559120] Allocated by task 282: [ 15.559318] kasan_save_stack+0x45/0x70 [ 15.559520] kasan_save_track+0x18/0x40 [ 15.559721] kasan_save_alloc_info+0x3b/0x50 [ 15.559967] __kasan_kmalloc+0xb7/0xc0 [ 15.560218] __kmalloc_cache_noprof+0x189/0x420 [ 15.560470] kasan_atomics+0x95/0x310 [ 15.560608] kunit_try_run_case+0x1a5/0x480 [ 15.560826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.561062] kthread+0x337/0x6f0 [ 15.561319] ret_from_fork+0x116/0x1d0 [ 15.561458] ret_from_fork_asm+0x1a/0x30 [ 15.561642] [ 15.561739] The buggy address belongs to the object at ffff8881025e4100 [ 15.561739] which belongs to the cache kmalloc-64 of size 64 [ 15.562291] The buggy address is located 0 bytes to the right of [ 15.562291] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.562834] [ 15.562939] The buggy address belongs to the physical page: [ 15.563199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.563537] flags: 0x200000000000000(node=0|zone=2) [ 15.563782] page_type: f5(slab) [ 15.563973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.564323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.564653] page dumped because: kasan: bad access detected [ 15.564843] [ 15.564922] Memory state around the buggy address: [ 15.565085] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.565308] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.565528] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.565906] ^ [ 15.566192] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.566509] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.566836] ================================================================== [ 14.971869] ================================================================== [ 14.972360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.972648] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 14.972969] [ 14.973071] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.973116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.973128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.973151] Call Trace: [ 14.973163] <TASK> [ 14.973179] dump_stack_lvl+0x73/0xb0 [ 14.973206] print_report+0xd1/0x610 [ 14.973228] ? __virt_addr_valid+0x1db/0x2d0 [ 14.973249] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.973270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.973292] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.973313] kasan_report+0x141/0x180 [ 14.973334] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.973360] __asan_report_store4_noabort+0x1b/0x30 [ 14.973384] kasan_atomics_helper+0x4ba2/0x5450 [ 14.973405] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.973427] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.973451] ? kasan_atomics+0x152/0x310 [ 14.973477] kasan_atomics+0x1dc/0x310 [ 14.973499] ? __pfx_kasan_atomics+0x10/0x10 [ 14.973522] ? __pfx_read_tsc+0x10/0x10 [ 14.973542] ? ktime_get_ts64+0x86/0x230 [ 14.973565] kunit_try_run_case+0x1a5/0x480 [ 14.973588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.973633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.973657] ? __kthread_parkme+0x82/0x180 [ 14.973676] ? preempt_count_sub+0x50/0x80 [ 14.973698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.973744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.973768] kthread+0x337/0x6f0 [ 14.973787] ? trace_preempt_on+0x20/0xc0 [ 14.973809] ? __pfx_kthread+0x10/0x10 [ 14.973994] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.974016] ? calculate_sigpending+0x7b/0xa0 [ 14.974039] ? __pfx_kthread+0x10/0x10 [ 14.974060] ret_from_fork+0x116/0x1d0 [ 14.974078] ? __pfx_kthread+0x10/0x10 [ 14.974111] ret_from_fork_asm+0x1a/0x30 [ 14.974140] </TASK> [ 14.974150] [ 14.982269] Allocated by task 282: [ 14.982448] kasan_save_stack+0x45/0x70 [ 14.982623] kasan_save_track+0x18/0x40 [ 14.982796] kasan_save_alloc_info+0x3b/0x50 [ 14.983000] __kasan_kmalloc+0xb7/0xc0 [ 14.983168] __kmalloc_cache_noprof+0x189/0x420 [ 14.983431] kasan_atomics+0x95/0x310 [ 14.983601] kunit_try_run_case+0x1a5/0x480 [ 14.983750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.983994] kthread+0x337/0x6f0 [ 14.984198] ret_from_fork+0x116/0x1d0 [ 14.984389] ret_from_fork_asm+0x1a/0x30 [ 14.984529] [ 14.984701] The buggy address belongs to the object at ffff8881025e4100 [ 14.984701] which belongs to the cache kmalloc-64 of size 64 [ 14.985184] The buggy address is located 0 bytes to the right of [ 14.985184] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 14.985795] [ 14.985888] The buggy address belongs to the physical page: [ 14.986063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 14.986306] flags: 0x200000000000000(node=0|zone=2) [ 14.986471] page_type: f5(slab) [ 14.986635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.987006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.987605] page dumped because: kasan: bad access detected [ 14.987782] [ 14.987864] Memory state around the buggy address: [ 14.988019] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.988691] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.989045] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.989634] ^ [ 14.989789] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990217] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990723] ================================================================== [ 15.767390] ================================================================== [ 15.768077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.768681] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.769779] [ 15.769975] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.770034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.770047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.770069] Call Trace: [ 15.770085] <TASK> [ 15.770100] dump_stack_lvl+0x73/0xb0 [ 15.770140] print_report+0xd1/0x610 [ 15.770162] ? __virt_addr_valid+0x1db/0x2d0 [ 15.770183] ? kasan_atomics_helper+0x164f/0x5450 [ 15.770216] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.770238] ? kasan_atomics_helper+0x164f/0x5450 [ 15.770261] kasan_report+0x141/0x180 [ 15.770283] ? kasan_atomics_helper+0x164f/0x5450 [ 15.770309] kasan_check_range+0x10c/0x1c0 [ 15.770333] __kasan_check_write+0x18/0x20 [ 15.770354] kasan_atomics_helper+0x164f/0x5450 [ 15.770386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.770408] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.770433] ? kasan_atomics+0x152/0x310 [ 15.770471] kasan_atomics+0x1dc/0x310 [ 15.770495] ? __pfx_kasan_atomics+0x10/0x10 [ 15.770520] ? __pfx_read_tsc+0x10/0x10 [ 15.770541] ? ktime_get_ts64+0x86/0x230 [ 15.770574] kunit_try_run_case+0x1a5/0x480 [ 15.770598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.770632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.770657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.770680] ? __kthread_parkme+0x82/0x180 [ 15.770701] ? preempt_count_sub+0x50/0x80 [ 15.770725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.770750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.770774] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.770798] kthread+0x337/0x6f0 [ 15.770826] ? trace_preempt_on+0x20/0xc0 [ 15.770850] ? __pfx_kthread+0x10/0x10 [ 15.770871] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.770894] ? calculate_sigpending+0x7b/0xa0 [ 15.770917] ? __pfx_kthread+0x10/0x10 [ 15.770940] ret_from_fork+0x116/0x1d0 [ 15.770958] ? __pfx_kthread+0x10/0x10 [ 15.770979] ret_from_fork_asm+0x1a/0x30 [ 15.771010] </TASK> [ 15.771021] [ 15.778906] Allocated by task 282: [ 15.779045] kasan_save_stack+0x45/0x70 [ 15.779458] kasan_save_track+0x18/0x40 [ 15.779617] kasan_save_alloc_info+0x3b/0x50 [ 15.779843] __kasan_kmalloc+0xb7/0xc0 [ 15.779979] __kmalloc_cache_noprof+0x189/0x420 [ 15.780138] kasan_atomics+0x95/0x310 [ 15.780295] kunit_try_run_case+0x1a5/0x480 [ 15.780529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.780922] kthread+0x337/0x6f0 [ 15.781095] ret_from_fork+0x116/0x1d0 [ 15.781314] ret_from_fork_asm+0x1a/0x30 [ 15.781511] [ 15.781597] The buggy address belongs to the object at ffff8881025e4100 [ 15.781597] which belongs to the cache kmalloc-64 of size 64 [ 15.782086] The buggy address is located 0 bytes to the right of [ 15.782086] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.782619] [ 15.782719] The buggy address belongs to the physical page: [ 15.782959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.783327] flags: 0x200000000000000(node=0|zone=2) [ 15.783556] page_type: f5(slab) [ 15.783736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.784060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.784467] page dumped because: kasan: bad access detected [ 15.784711] [ 15.784830] Memory state around the buggy address: [ 15.785053] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.785349] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.785568] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.785786] ^ [ 15.786045] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.786568] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.786950] ================================================================== [ 15.378835] ================================================================== [ 15.379515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.379916] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.380307] [ 15.380408] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.380454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.380531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.380554] Call Trace: [ 15.380619] <TASK> [ 15.380637] dump_stack_lvl+0x73/0xb0 [ 15.380668] print_report+0xd1/0x610 [ 15.380690] ? __virt_addr_valid+0x1db/0x2d0 [ 15.380712] ? kasan_atomics_helper+0xde0/0x5450 [ 15.380735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.380757] ? kasan_atomics_helper+0xde0/0x5450 [ 15.380779] kasan_report+0x141/0x180 [ 15.380801] ? kasan_atomics_helper+0xde0/0x5450 [ 15.380839] kasan_check_range+0x10c/0x1c0 [ 15.380868] __kasan_check_write+0x18/0x20 [ 15.380888] kasan_atomics_helper+0xde0/0x5450 [ 15.380911] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.380935] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.380961] ? kasan_atomics+0x152/0x310 [ 15.380988] kasan_atomics+0x1dc/0x310 [ 15.381011] ? __pfx_kasan_atomics+0x10/0x10 [ 15.381035] ? __pfx_read_tsc+0x10/0x10 [ 15.381057] ? ktime_get_ts64+0x86/0x230 [ 15.381081] kunit_try_run_case+0x1a5/0x480 [ 15.381207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.381231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.381256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.381281] ? __kthread_parkme+0x82/0x180 [ 15.381302] ? preempt_count_sub+0x50/0x80 [ 15.381326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.381351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.381375] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.381400] kthread+0x337/0x6f0 [ 15.381420] ? trace_preempt_on+0x20/0xc0 [ 15.381444] ? __pfx_kthread+0x10/0x10 [ 15.381466] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.381488] ? calculate_sigpending+0x7b/0xa0 [ 15.381513] ? __pfx_kthread+0x10/0x10 [ 15.381535] ret_from_fork+0x116/0x1d0 [ 15.381554] ? __pfx_kthread+0x10/0x10 [ 15.381575] ret_from_fork_asm+0x1a/0x30 [ 15.381608] </TASK> [ 15.381619] [ 15.391214] Allocated by task 282: [ 15.391394] kasan_save_stack+0x45/0x70 [ 15.391573] kasan_save_track+0x18/0x40 [ 15.391766] kasan_save_alloc_info+0x3b/0x50 [ 15.391985] __kasan_kmalloc+0xb7/0xc0 [ 15.392682] __kmalloc_cache_noprof+0x189/0x420 [ 15.392902] kasan_atomics+0x95/0x310 [ 15.393094] kunit_try_run_case+0x1a5/0x480 [ 15.393473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.393829] kthread+0x337/0x6f0 [ 15.394008] ret_from_fork+0x116/0x1d0 [ 15.394311] ret_from_fork_asm+0x1a/0x30 [ 15.394477] [ 15.394692] The buggy address belongs to the object at ffff8881025e4100 [ 15.394692] which belongs to the cache kmalloc-64 of size 64 [ 15.395317] The buggy address is located 0 bytes to the right of [ 15.395317] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.395992] [ 15.396103] The buggy address belongs to the physical page: [ 15.396302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.396783] flags: 0x200000000000000(node=0|zone=2) [ 15.397113] page_type: f5(slab) [ 15.397357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.397764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.398175] page dumped because: kasan: bad access detected [ 15.398413] [ 15.398626] Memory state around the buggy address: [ 15.398834] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.399228] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.399499] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.399753] ^ [ 15.399990] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.400292] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.400625] ================================================================== [ 15.916359] ================================================================== [ 15.917103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.917687] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.917931] [ 15.918022] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.918066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.918108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.918129] Call Trace: [ 15.918146] <TASK> [ 15.918161] dump_stack_lvl+0x73/0xb0 [ 15.918212] print_report+0xd1/0x610 [ 15.918236] ? __virt_addr_valid+0x1db/0x2d0 [ 15.918259] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.918281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.918304] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.918327] kasan_report+0x141/0x180 [ 15.918349] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.918377] kasan_check_range+0x10c/0x1c0 [ 15.918423] __kasan_check_write+0x18/0x20 [ 15.918443] kasan_atomics_helper+0x19e3/0x5450 [ 15.918466] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.918490] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.918517] ? kasan_atomics+0x152/0x310 [ 15.918544] kasan_atomics+0x1dc/0x310 [ 15.918568] ? __pfx_kasan_atomics+0x10/0x10 [ 15.918611] ? __pfx_read_tsc+0x10/0x10 [ 15.918633] ? ktime_get_ts64+0x86/0x230 [ 15.918659] kunit_try_run_case+0x1a5/0x480 [ 15.918685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918708] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.918732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.918756] ? __kthread_parkme+0x82/0x180 [ 15.918777] ? preempt_count_sub+0x50/0x80 [ 15.918801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.918877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.918903] kthread+0x337/0x6f0 [ 15.918923] ? trace_preempt_on+0x20/0xc0 [ 15.918946] ? __pfx_kthread+0x10/0x10 [ 15.918967] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.918989] ? calculate_sigpending+0x7b/0xa0 [ 15.919014] ? __pfx_kthread+0x10/0x10 [ 15.919051] ret_from_fork+0x116/0x1d0 [ 15.919071] ? __pfx_kthread+0x10/0x10 [ 15.919110] ret_from_fork_asm+0x1a/0x30 [ 15.919141] </TASK> [ 15.919152] [ 15.931662] Allocated by task 282: [ 15.931797] kasan_save_stack+0x45/0x70 [ 15.932264] kasan_save_track+0x18/0x40 [ 15.932624] kasan_save_alloc_info+0x3b/0x50 [ 15.933032] __kasan_kmalloc+0xb7/0xc0 [ 15.933408] __kmalloc_cache_noprof+0x189/0x420 [ 15.933834] kasan_atomics+0x95/0x310 [ 15.934210] kunit_try_run_case+0x1a5/0x480 [ 15.934601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.935014] kthread+0x337/0x6f0 [ 15.935299] ret_from_fork+0x116/0x1d0 [ 15.935648] ret_from_fork_asm+0x1a/0x30 [ 15.935861] [ 15.935938] The buggy address belongs to the object at ffff8881025e4100 [ 15.935938] which belongs to the cache kmalloc-64 of size 64 [ 15.936807] The buggy address is located 0 bytes to the right of [ 15.936807] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.937697] [ 15.937780] The buggy address belongs to the physical page: [ 15.937969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.938561] flags: 0x200000000000000(node=0|zone=2) [ 15.939016] page_type: f5(slab) [ 15.939353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.940020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.940668] page dumped because: kasan: bad access detected [ 15.940863] [ 15.940938] Memory state around the buggy address: [ 15.941129] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.941777] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.942429] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.943058] ^ [ 15.943419] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.943643] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.943962] ================================================================== [ 16.203645] ================================================================== [ 16.204009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.204838] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.205214] [ 16.205328] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.205372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.205384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.205406] Call Trace: [ 16.205420] <TASK> [ 16.205436] dump_stack_lvl+0x73/0xb0 [ 16.205463] print_report+0xd1/0x610 [ 16.205486] ? __virt_addr_valid+0x1db/0x2d0 [ 16.205508] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.205570] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.205595] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.205617] kasan_report+0x141/0x180 [ 16.205640] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.205667] __asan_report_load8_noabort+0x18/0x20 [ 16.205723] kasan_atomics_helper+0x4fb2/0x5450 [ 16.205748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.205771] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.205797] ? kasan_atomics+0x152/0x310 [ 16.205834] kasan_atomics+0x1dc/0x310 [ 16.205859] ? __pfx_kasan_atomics+0x10/0x10 [ 16.205915] ? __pfx_read_tsc+0x10/0x10 [ 16.205937] ? ktime_get_ts64+0x86/0x230 [ 16.205961] kunit_try_run_case+0x1a5/0x480 [ 16.205986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.206009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.206063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.206107] ? __kthread_parkme+0x82/0x180 [ 16.206130] ? preempt_count_sub+0x50/0x80 [ 16.206153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.206206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.206230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.206255] kthread+0x337/0x6f0 [ 16.206276] ? trace_preempt_on+0x20/0xc0 [ 16.206299] ? __pfx_kthread+0x10/0x10 [ 16.206320] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.206343] ? calculate_sigpending+0x7b/0xa0 [ 16.206366] ? __pfx_kthread+0x10/0x10 [ 16.206389] ret_from_fork+0x116/0x1d0 [ 16.206408] ? __pfx_kthread+0x10/0x10 [ 16.206429] ret_from_fork_asm+0x1a/0x30 [ 16.206460] </TASK> [ 16.206501] [ 16.214439] Allocated by task 282: [ 16.214621] kasan_save_stack+0x45/0x70 [ 16.214867] kasan_save_track+0x18/0x40 [ 16.215064] kasan_save_alloc_info+0x3b/0x50 [ 16.215305] __kasan_kmalloc+0xb7/0xc0 [ 16.215514] __kmalloc_cache_noprof+0x189/0x420 [ 16.215766] kasan_atomics+0x95/0x310 [ 16.215960] kunit_try_run_case+0x1a5/0x480 [ 16.216208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.216460] kthread+0x337/0x6f0 [ 16.216642] ret_from_fork+0x116/0x1d0 [ 16.216781] ret_from_fork_asm+0x1a/0x30 [ 16.216940] [ 16.217017] The buggy address belongs to the object at ffff8881025e4100 [ 16.217017] which belongs to the cache kmalloc-64 of size 64 [ 16.217528] The buggy address is located 0 bytes to the right of [ 16.217528] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.218161] [ 16.218244] The buggy address belongs to the physical page: [ 16.218422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.218670] flags: 0x200000000000000(node=0|zone=2) [ 16.218951] page_type: f5(slab) [ 16.219185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.219530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.219908] page dumped because: kasan: bad access detected [ 16.220203] [ 16.220332] Memory state around the buggy address: [ 16.220552] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.220889] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.221261] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.221539] ^ [ 16.221698] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.222017] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.222369] ================================================================== [ 16.096844] ================================================================== [ 16.097097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.097331] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.097559] [ 16.097644] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.098773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.098795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.098842] Call Trace: [ 16.098860] <TASK> [ 16.098876] dump_stack_lvl+0x73/0xb0 [ 16.098914] print_report+0xd1/0x610 [ 16.098937] ? __virt_addr_valid+0x1db/0x2d0 [ 16.098960] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.098982] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.099005] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.099027] kasan_report+0x141/0x180 [ 16.099051] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.099579] kasan_check_range+0x10c/0x1c0 [ 16.099635] __kasan_check_write+0x18/0x20 [ 16.099661] kasan_atomics_helper+0x1f43/0x5450 [ 16.099685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.099709] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.099736] ? kasan_atomics+0x152/0x310 [ 16.099764] kasan_atomics+0x1dc/0x310 [ 16.099787] ? __pfx_kasan_atomics+0x10/0x10 [ 16.099812] ? __pfx_read_tsc+0x10/0x10 [ 16.099843] ? ktime_get_ts64+0x86/0x230 [ 16.099867] kunit_try_run_case+0x1a5/0x480 [ 16.099892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.099915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.099940] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.099964] ? __kthread_parkme+0x82/0x180 [ 16.099984] ? preempt_count_sub+0x50/0x80 [ 16.100009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.100034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.100058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.100106] kthread+0x337/0x6f0 [ 16.100127] ? trace_preempt_on+0x20/0xc0 [ 16.100150] ? __pfx_kthread+0x10/0x10 [ 16.100172] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.100194] ? calculate_sigpending+0x7b/0xa0 [ 16.100219] ? __pfx_kthread+0x10/0x10 [ 16.100241] ret_from_fork+0x116/0x1d0 [ 16.100260] ? __pfx_kthread+0x10/0x10 [ 16.100282] ret_from_fork_asm+0x1a/0x30 [ 16.100313] </TASK> [ 16.100324] [ 16.117402] Allocated by task 282: [ 16.117597] kasan_save_stack+0x45/0x70 [ 16.117789] kasan_save_track+0x18/0x40 [ 16.118028] kasan_save_alloc_info+0x3b/0x50 [ 16.118299] __kasan_kmalloc+0xb7/0xc0 [ 16.118437] __kmalloc_cache_noprof+0x189/0x420 [ 16.118664] kasan_atomics+0x95/0x310 [ 16.118868] kunit_try_run_case+0x1a5/0x480 [ 16.119049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.119366] kthread+0x337/0x6f0 [ 16.119497] ret_from_fork+0x116/0x1d0 [ 16.119629] ret_from_fork_asm+0x1a/0x30 [ 16.119840] [ 16.119974] The buggy address belongs to the object at ffff8881025e4100 [ 16.119974] which belongs to the cache kmalloc-64 of size 64 [ 16.120580] The buggy address is located 0 bytes to the right of [ 16.120580] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.121164] [ 16.121264] The buggy address belongs to the physical page: [ 16.121470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.121868] flags: 0x200000000000000(node=0|zone=2) [ 16.122068] page_type: f5(slab) [ 16.122294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.122655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.122990] page dumped because: kasan: bad access detected [ 16.123273] [ 16.123374] Memory state around the buggy address: [ 16.123630] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.123877] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.124179] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.124497] ^ [ 16.124696] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.125057] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.125289] ================================================================== [ 15.586196] ================================================================== [ 15.586739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.587014] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.587514] [ 15.587614] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.587657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.587682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.587703] Call Trace: [ 15.587717] <TASK> [ 15.587733] dump_stack_lvl+0x73/0xb0 [ 15.587771] print_report+0xd1/0x610 [ 15.587794] ? __virt_addr_valid+0x1db/0x2d0 [ 15.587827] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.587849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.587872] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.587894] kasan_report+0x141/0x180 [ 15.587917] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.587944] __asan_report_load4_noabort+0x18/0x20 [ 15.587969] kasan_atomics_helper+0x49e8/0x5450 [ 15.587993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.588016] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.588041] ? kasan_atomics+0x152/0x310 [ 15.588068] kasan_atomics+0x1dc/0x310 [ 15.588091] ? __pfx_kasan_atomics+0x10/0x10 [ 15.588116] ? __pfx_read_tsc+0x10/0x10 [ 15.588138] ? ktime_get_ts64+0x86/0x230 [ 15.588163] kunit_try_run_case+0x1a5/0x480 [ 15.588188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.588211] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.588235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.588270] ? __kthread_parkme+0x82/0x180 [ 15.588291] ? preempt_count_sub+0x50/0x80 [ 15.588315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.588351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.588374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.588399] kthread+0x337/0x6f0 [ 15.588420] ? trace_preempt_on+0x20/0xc0 [ 15.588453] ? __pfx_kthread+0x10/0x10 [ 15.588475] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.588498] ? calculate_sigpending+0x7b/0xa0 [ 15.588532] ? __pfx_kthread+0x10/0x10 [ 15.588555] ret_from_fork+0x116/0x1d0 [ 15.588574] ? __pfx_kthread+0x10/0x10 [ 15.588595] ret_from_fork_asm+0x1a/0x30 [ 15.588634] </TASK> [ 15.588645] [ 15.596666] Allocated by task 282: [ 15.596799] kasan_save_stack+0x45/0x70 [ 15.596981] kasan_save_track+0x18/0x40 [ 15.597270] kasan_save_alloc_info+0x3b/0x50 [ 15.597511] __kasan_kmalloc+0xb7/0xc0 [ 15.597683] __kmalloc_cache_noprof+0x189/0x420 [ 15.597903] kasan_atomics+0x95/0x310 [ 15.598111] kunit_try_run_case+0x1a5/0x480 [ 15.598310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.598532] kthread+0x337/0x6f0 [ 15.598721] ret_from_fork+0x116/0x1d0 [ 15.598891] ret_from_fork_asm+0x1a/0x30 [ 15.599102] [ 15.599195] The buggy address belongs to the object at ffff8881025e4100 [ 15.599195] which belongs to the cache kmalloc-64 of size 64 [ 15.599550] The buggy address is located 0 bytes to the right of [ 15.599550] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.600004] [ 15.600111] The buggy address belongs to the physical page: [ 15.600367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.600723] flags: 0x200000000000000(node=0|zone=2) [ 15.600975] page_type: f5(slab) [ 15.601240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.601591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.601946] page dumped because: kasan: bad access detected [ 15.602261] [ 15.602335] Memory state around the buggy address: [ 15.602492] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.602712] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.603038] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.603408] ^ [ 15.603663] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.603994] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.604365] ================================================================== [ 15.127671] ================================================================== [ 15.128101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.128766] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.129119] [ 15.129229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.129272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.129285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.129307] Call Trace: [ 15.129322] <TASK> [ 15.129336] dump_stack_lvl+0x73/0xb0 [ 15.129363] print_report+0xd1/0x610 [ 15.129384] ? __virt_addr_valid+0x1db/0x2d0 [ 15.129407] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.129428] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.129452] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.129474] kasan_report+0x141/0x180 [ 15.129497] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.129523] kasan_check_range+0x10c/0x1c0 [ 15.129547] __kasan_check_write+0x18/0x20 [ 15.129567] kasan_atomics_helper+0x5fe/0x5450 [ 15.129590] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.129613] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.129638] ? kasan_atomics+0x152/0x310 [ 15.129665] kasan_atomics+0x1dc/0x310 [ 15.129688] ? __pfx_kasan_atomics+0x10/0x10 [ 15.129713] ? __pfx_read_tsc+0x10/0x10 [ 15.129734] ? ktime_get_ts64+0x86/0x230 [ 15.129759] kunit_try_run_case+0x1a5/0x480 [ 15.129784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.129807] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.129842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.129866] ? __kthread_parkme+0x82/0x180 [ 15.129887] ? preempt_count_sub+0x50/0x80 [ 15.129911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.129936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.129959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.129984] kthread+0x337/0x6f0 [ 15.130005] ? trace_preempt_on+0x20/0xc0 [ 15.130028] ? __pfx_kthread+0x10/0x10 [ 15.130050] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.130072] ? calculate_sigpending+0x7b/0xa0 [ 15.130104] ? __pfx_kthread+0x10/0x10 [ 15.130126] ret_from_fork+0x116/0x1d0 [ 15.130145] ? __pfx_kthread+0x10/0x10 [ 15.130166] ret_from_fork_asm+0x1a/0x30 [ 15.130197] </TASK> [ 15.130209] [ 15.137715] Allocated by task 282: [ 15.137908] kasan_save_stack+0x45/0x70 [ 15.138117] kasan_save_track+0x18/0x40 [ 15.138312] kasan_save_alloc_info+0x3b/0x50 [ 15.138502] __kasan_kmalloc+0xb7/0xc0 [ 15.138678] __kmalloc_cache_noprof+0x189/0x420 [ 15.138886] kasan_atomics+0x95/0x310 [ 15.139073] kunit_try_run_case+0x1a5/0x480 [ 15.139299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.139537] kthread+0x337/0x6f0 [ 15.139664] ret_from_fork+0x116/0x1d0 [ 15.139799] ret_from_fork_asm+0x1a/0x30 [ 15.140003] [ 15.140109] The buggy address belongs to the object at ffff8881025e4100 [ 15.140109] which belongs to the cache kmalloc-64 of size 64 [ 15.140543] The buggy address is located 0 bytes to the right of [ 15.140543] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.141091] [ 15.141186] The buggy address belongs to the physical page: [ 15.141410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.141736] flags: 0x200000000000000(node=0|zone=2) [ 15.141954] page_type: f5(slab) [ 15.142077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.142430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.142733] page dumped because: kasan: bad access detected [ 15.142938] [ 15.143023] Memory state around the buggy address: [ 15.143390] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.143688] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.143948] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.144317] ^ [ 15.144511] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.144804] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.145111] ================================================================== [ 15.505932] ================================================================== [ 15.506654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.506985] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.507751] [ 15.508009] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.508057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.508071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.508205] Call Trace: [ 15.508226] <TASK> [ 15.508245] dump_stack_lvl+0x73/0xb0 [ 15.508276] print_report+0xd1/0x610 [ 15.508300] ? __virt_addr_valid+0x1db/0x2d0 [ 15.508323] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.508345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.508369] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.508392] kasan_report+0x141/0x180 [ 15.508414] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.508440] __asan_report_load4_noabort+0x18/0x20 [ 15.508464] kasan_atomics_helper+0x4a1c/0x5450 [ 15.508488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.508511] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.508536] ? kasan_atomics+0x152/0x310 [ 15.508563] kasan_atomics+0x1dc/0x310 [ 15.508586] ? __pfx_kasan_atomics+0x10/0x10 [ 15.508610] ? __pfx_read_tsc+0x10/0x10 [ 15.508632] ? ktime_get_ts64+0x86/0x230 [ 15.508657] kunit_try_run_case+0x1a5/0x480 [ 15.508682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.508705] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.508729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.508755] ? __kthread_parkme+0x82/0x180 [ 15.508775] ? preempt_count_sub+0x50/0x80 [ 15.508800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.508839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.508868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.508892] kthread+0x337/0x6f0 [ 15.508913] ? trace_preempt_on+0x20/0xc0 [ 15.508936] ? __pfx_kthread+0x10/0x10 [ 15.508957] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.508980] ? calculate_sigpending+0x7b/0xa0 [ 15.509004] ? __pfx_kthread+0x10/0x10 [ 15.509026] ret_from_fork+0x116/0x1d0 [ 15.509045] ? __pfx_kthread+0x10/0x10 [ 15.509066] ret_from_fork_asm+0x1a/0x30 [ 15.509097] </TASK> [ 15.509108] [ 15.516922] Allocated by task 282: [ 15.517110] kasan_save_stack+0x45/0x70 [ 15.517288] kasan_save_track+0x18/0x40 [ 15.517501] kasan_save_alloc_info+0x3b/0x50 [ 15.517718] __kasan_kmalloc+0xb7/0xc0 [ 15.517895] __kmalloc_cache_noprof+0x189/0x420 [ 15.518139] kasan_atomics+0x95/0x310 [ 15.518324] kunit_try_run_case+0x1a5/0x480 [ 15.518540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.518789] kthread+0x337/0x6f0 [ 15.518987] ret_from_fork+0x116/0x1d0 [ 15.519173] ret_from_fork_asm+0x1a/0x30 [ 15.519451] [ 15.519525] The buggy address belongs to the object at ffff8881025e4100 [ 15.519525] which belongs to the cache kmalloc-64 of size 64 [ 15.520206] The buggy address is located 0 bytes to the right of [ 15.520206] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.520772] [ 15.520981] The buggy address belongs to the physical page: [ 15.521440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.521799] flags: 0x200000000000000(node=0|zone=2) [ 15.522048] page_type: f5(slab) [ 15.522370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.522725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.523064] page dumped because: kasan: bad access detected [ 15.523306] [ 15.523391] Memory state around the buggy address: [ 15.523556] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.523780] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.524169] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.524518] ^ [ 15.524769] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.525135] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.525444] ================================================================== [ 14.991288] ================================================================== [ 14.991585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.992079] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 14.992566] [ 14.992661] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.992704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.992717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.992738] Call Trace: [ 14.992750] <TASK> [ 14.992763] dump_stack_lvl+0x73/0xb0 [ 14.992790] print_report+0xd1/0x610 [ 14.992825] ? __virt_addr_valid+0x1db/0x2d0 [ 14.992851] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.992872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.992894] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.992915] kasan_report+0x141/0x180 [ 14.992936] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.992962] __asan_report_load4_noabort+0x18/0x20 [ 14.992986] kasan_atomics_helper+0x4b88/0x5450 [ 14.993007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.993029] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.993053] ? kasan_atomics+0x152/0x310 [ 14.993078] kasan_atomics+0x1dc/0x310 [ 14.993101] ? __pfx_kasan_atomics+0x10/0x10 [ 14.993124] ? __pfx_read_tsc+0x10/0x10 [ 14.993145] ? ktime_get_ts64+0x86/0x230 [ 14.993168] kunit_try_run_case+0x1a5/0x480 [ 14.993192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993282] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.993306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.993330] ? __kthread_parkme+0x82/0x180 [ 14.993349] ? preempt_count_sub+0x50/0x80 [ 14.993372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.993418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.993442] kthread+0x337/0x6f0 [ 14.993461] ? trace_preempt_on+0x20/0xc0 [ 14.993483] ? __pfx_kthread+0x10/0x10 [ 14.993503] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.993524] ? calculate_sigpending+0x7b/0xa0 [ 14.993547] ? __pfx_kthread+0x10/0x10 [ 14.993569] ret_from_fork+0x116/0x1d0 [ 14.993587] ? __pfx_kthread+0x10/0x10 [ 14.993607] ret_from_fork_asm+0x1a/0x30 [ 14.993636] </TASK> [ 14.993646] [ 15.002843] Allocated by task 282: [ 15.003030] kasan_save_stack+0x45/0x70 [ 15.003433] kasan_save_track+0x18/0x40 [ 15.003633] kasan_save_alloc_info+0x3b/0x50 [ 15.003850] __kasan_kmalloc+0xb7/0xc0 [ 15.003986] __kmalloc_cache_noprof+0x189/0x420 [ 15.004144] kasan_atomics+0x95/0x310 [ 15.004307] kunit_try_run_case+0x1a5/0x480 [ 15.005339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.005751] kthread+0x337/0x6f0 [ 15.006066] ret_from_fork+0x116/0x1d0 [ 15.006510] ret_from_fork_asm+0x1a/0x30 [ 15.006962] [ 15.007070] The buggy address belongs to the object at ffff8881025e4100 [ 15.007070] which belongs to the cache kmalloc-64 of size 64 [ 15.007917] The buggy address is located 0 bytes to the right of [ 15.007917] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.008478] [ 15.008578] The buggy address belongs to the physical page: [ 15.008785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.009157] flags: 0x200000000000000(node=0|zone=2) [ 15.009331] page_type: f5(slab) [ 15.009452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.009791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.010172] page dumped because: kasan: bad access detected [ 15.010456] [ 15.010556] Memory state around the buggy address: [ 15.010750] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.011039] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.011408] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.011622] ^ [ 15.011996] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.012529] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.012808] ================================================================== [ 16.145361] ================================================================== [ 16.145719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.146084] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.146347] [ 16.146434] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.146476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.146490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.146512] Call Trace: [ 16.146529] <TASK> [ 16.146544] dump_stack_lvl+0x73/0xb0 [ 16.146569] print_report+0xd1/0x610 [ 16.146591] ? __virt_addr_valid+0x1db/0x2d0 [ 16.146613] ? kasan_atomics_helper+0x2006/0x5450 [ 16.146635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.146657] ? kasan_atomics_helper+0x2006/0x5450 [ 16.146679] kasan_report+0x141/0x180 [ 16.146702] ? kasan_atomics_helper+0x2006/0x5450 [ 16.146728] kasan_check_range+0x10c/0x1c0 [ 16.146751] __kasan_check_write+0x18/0x20 [ 16.146771] kasan_atomics_helper+0x2006/0x5450 [ 16.146794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.147235] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.147276] ? kasan_atomics+0x152/0x310 [ 16.147305] kasan_atomics+0x1dc/0x310 [ 16.147330] ? __pfx_kasan_atomics+0x10/0x10 [ 16.147355] ? __pfx_read_tsc+0x10/0x10 [ 16.147376] ? ktime_get_ts64+0x86/0x230 [ 16.147401] kunit_try_run_case+0x1a5/0x480 [ 16.147426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.147449] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.147474] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.147499] ? __kthread_parkme+0x82/0x180 [ 16.147520] ? preempt_count_sub+0x50/0x80 [ 16.147544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.147568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.147592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.147617] kthread+0x337/0x6f0 [ 16.147638] ? trace_preempt_on+0x20/0xc0 [ 16.147661] ? __pfx_kthread+0x10/0x10 [ 16.147682] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.147704] ? calculate_sigpending+0x7b/0xa0 [ 16.147729] ? __pfx_kthread+0x10/0x10 [ 16.147751] ret_from_fork+0x116/0x1d0 [ 16.147771] ? __pfx_kthread+0x10/0x10 [ 16.147792] ret_from_fork_asm+0x1a/0x30 [ 16.147840] </TASK> [ 16.147852] [ 16.156262] Allocated by task 282: [ 16.156453] kasan_save_stack+0x45/0x70 [ 16.156691] kasan_save_track+0x18/0x40 [ 16.156940] kasan_save_alloc_info+0x3b/0x50 [ 16.157185] __kasan_kmalloc+0xb7/0xc0 [ 16.157377] __kmalloc_cache_noprof+0x189/0x420 [ 16.157612] kasan_atomics+0x95/0x310 [ 16.157843] kunit_try_run_case+0x1a5/0x480 [ 16.158032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.158317] kthread+0x337/0x6f0 [ 16.158493] ret_from_fork+0x116/0x1d0 [ 16.158664] ret_from_fork_asm+0x1a/0x30 [ 16.158807] [ 16.158963] The buggy address belongs to the object at ffff8881025e4100 [ 16.158963] which belongs to the cache kmalloc-64 of size 64 [ 16.159520] The buggy address is located 0 bytes to the right of [ 16.159520] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.160009] [ 16.160163] The buggy address belongs to the physical page: [ 16.160444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.160767] flags: 0x200000000000000(node=0|zone=2) [ 16.161048] page_type: f5(slab) [ 16.161264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.161595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.161962] page dumped because: kasan: bad access detected [ 16.162251] [ 16.162365] Memory state around the buggy address: [ 16.162571] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.162912] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.163280] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.163658] ^ [ 16.163845] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.164150] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.164465] ================================================================== [ 15.198903] ================================================================== [ 15.199143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.199371] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.199596] [ 15.199679] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.199721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.199734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.199756] Call Trace: [ 15.199770] <TASK> [ 15.199785] dump_stack_lvl+0x73/0xb0 [ 15.199923] print_report+0xd1/0x610 [ 15.199951] ? __virt_addr_valid+0x1db/0x2d0 [ 15.199974] ? kasan_atomics_helper+0x860/0x5450 [ 15.200004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.200028] ? kasan_atomics_helper+0x860/0x5450 [ 15.200051] kasan_report+0x141/0x180 [ 15.200074] ? kasan_atomics_helper+0x860/0x5450 [ 15.200101] kasan_check_range+0x10c/0x1c0 [ 15.200125] __kasan_check_write+0x18/0x20 [ 15.200145] kasan_atomics_helper+0x860/0x5450 [ 15.200168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.200191] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.200216] ? kasan_atomics+0x152/0x310 [ 15.200244] kasan_atomics+0x1dc/0x310 [ 15.200267] ? __pfx_kasan_atomics+0x10/0x10 [ 15.200291] ? __pfx_read_tsc+0x10/0x10 [ 15.200313] ? ktime_get_ts64+0x86/0x230 [ 15.200337] kunit_try_run_case+0x1a5/0x480 [ 15.200361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.200385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.200409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.200434] ? __kthread_parkme+0x82/0x180 [ 15.200455] ? preempt_count_sub+0x50/0x80 [ 15.200478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.200503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.200527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.200552] kthread+0x337/0x6f0 [ 15.200573] ? trace_preempt_on+0x20/0xc0 [ 15.200596] ? __pfx_kthread+0x10/0x10 [ 15.200617] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.200639] ? calculate_sigpending+0x7b/0xa0 [ 15.200663] ? __pfx_kthread+0x10/0x10 [ 15.200686] ret_from_fork+0x116/0x1d0 [ 15.200705] ? __pfx_kthread+0x10/0x10 [ 15.200727] ret_from_fork_asm+0x1a/0x30 [ 15.200757] </TASK> [ 15.200768] [ 15.208954] Allocated by task 282: [ 15.209091] kasan_save_stack+0x45/0x70 [ 15.209291] kasan_save_track+0x18/0x40 [ 15.209485] kasan_save_alloc_info+0x3b/0x50 [ 15.209675] __kasan_kmalloc+0xb7/0xc0 [ 15.209855] __kmalloc_cache_noprof+0x189/0x420 [ 15.210077] kasan_atomics+0x95/0x310 [ 15.210246] kunit_try_run_case+0x1a5/0x480 [ 15.210436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.210642] kthread+0x337/0x6f0 [ 15.210765] ret_from_fork+0x116/0x1d0 [ 15.210913] ret_from_fork_asm+0x1a/0x30 [ 15.211055] [ 15.211212] The buggy address belongs to the object at ffff8881025e4100 [ 15.211212] which belongs to the cache kmalloc-64 of size 64 [ 15.211740] The buggy address is located 0 bytes to the right of [ 15.211740] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.212461] [ 15.212543] The buggy address belongs to the physical page: [ 15.212720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.213026] flags: 0x200000000000000(node=0|zone=2) [ 15.213498] page_type: f5(slab) [ 15.213670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.213982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.214309] page dumped because: kasan: bad access detected [ 15.214547] [ 15.214622] Memory state around the buggy address: [ 15.214827] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.215133] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.215414] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.215687] ^ [ 15.215903] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.216288] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.216564] ================================================================== [ 16.041960] ================================================================== [ 16.042349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.042705] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.043065] [ 16.043249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.043292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.043325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.043346] Call Trace: [ 16.043364] <TASK> [ 16.043380] dump_stack_lvl+0x73/0xb0 [ 16.043407] print_report+0xd1/0x610 [ 16.043430] ? __virt_addr_valid+0x1db/0x2d0 [ 16.043452] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.043474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.043516] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.043539] kasan_report+0x141/0x180 [ 16.043561] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.043589] kasan_check_range+0x10c/0x1c0 [ 16.043612] __kasan_check_write+0x18/0x20 [ 16.043633] kasan_atomics_helper+0x1d7a/0x5450 [ 16.043656] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.043694] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.043720] ? kasan_atomics+0x152/0x310 [ 16.043747] kasan_atomics+0x1dc/0x310 [ 16.043770] ? __pfx_kasan_atomics+0x10/0x10 [ 16.043796] ? __pfx_read_tsc+0x10/0x10 [ 16.043829] ? ktime_get_ts64+0x86/0x230 [ 16.043854] kunit_try_run_case+0x1a5/0x480 [ 16.043879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.043903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.043927] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.043952] ? __kthread_parkme+0x82/0x180 [ 16.043973] ? preempt_count_sub+0x50/0x80 [ 16.043998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.044022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.044047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.044071] kthread+0x337/0x6f0 [ 16.044092] ? trace_preempt_on+0x20/0xc0 [ 16.044115] ? __pfx_kthread+0x10/0x10 [ 16.044137] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.044159] ? calculate_sigpending+0x7b/0xa0 [ 16.044184] ? __pfx_kthread+0x10/0x10 [ 16.044206] ret_from_fork+0x116/0x1d0 [ 16.044226] ? __pfx_kthread+0x10/0x10 [ 16.044248] ret_from_fork_asm+0x1a/0x30 [ 16.044278] </TASK> [ 16.044289] [ 16.051636] Allocated by task 282: [ 16.051765] kasan_save_stack+0x45/0x70 [ 16.051917] kasan_save_track+0x18/0x40 [ 16.052050] kasan_save_alloc_info+0x3b/0x50 [ 16.052196] __kasan_kmalloc+0xb7/0xc0 [ 16.052327] __kmalloc_cache_noprof+0x189/0x420 [ 16.052517] kasan_atomics+0x95/0x310 [ 16.052851] kunit_try_run_case+0x1a5/0x480 [ 16.053293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.053543] kthread+0x337/0x6f0 [ 16.053712] ret_from_fork+0x116/0x1d0 [ 16.053906] ret_from_fork_asm+0x1a/0x30 [ 16.054154] [ 16.054250] The buggy address belongs to the object at ffff8881025e4100 [ 16.054250] which belongs to the cache kmalloc-64 of size 64 [ 16.054622] The buggy address is located 0 bytes to the right of [ 16.054622] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.055087] [ 16.055184] The buggy address belongs to the physical page: [ 16.055442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.055808] flags: 0x200000000000000(node=0|zone=2) [ 16.056038] page_type: f5(slab) [ 16.056293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.056588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.056858] page dumped because: kasan: bad access detected [ 16.057028] [ 16.057146] Memory state around the buggy address: [ 16.057366] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.057681] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.058011] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.058309] ^ [ 16.058462] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.058673] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.059005] ================================================================== [ 16.006164] ================================================================== [ 16.006591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.006929] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 16.007383] [ 16.007522] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 16.007564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.007578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.007599] Call Trace: [ 16.007614] <TASK> [ 16.007628] dump_stack_lvl+0x73/0xb0 [ 16.007656] print_report+0xd1/0x610 [ 16.007715] ? __virt_addr_valid+0x1db/0x2d0 [ 16.007738] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.007760] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.007783] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.007806] kasan_report+0x141/0x180 [ 16.007873] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.007900] __asan_report_load8_noabort+0x18/0x20 [ 16.007925] kasan_atomics_helper+0x4f30/0x5450 [ 16.007948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.007971] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.008027] ? kasan_atomics+0x152/0x310 [ 16.008054] kasan_atomics+0x1dc/0x310 [ 16.008078] ? __pfx_kasan_atomics+0x10/0x10 [ 16.008112] ? __pfx_read_tsc+0x10/0x10 [ 16.008134] ? ktime_get_ts64+0x86/0x230 [ 16.008189] kunit_try_run_case+0x1a5/0x480 [ 16.008215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.008239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.008264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.008288] ? __kthread_parkme+0x82/0x180 [ 16.008309] ? preempt_count_sub+0x50/0x80 [ 16.008364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.008390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.008414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.008439] kthread+0x337/0x6f0 [ 16.008459] ? trace_preempt_on+0x20/0xc0 [ 16.008507] ? __pfx_kthread+0x10/0x10 [ 16.008529] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.008553] ? calculate_sigpending+0x7b/0xa0 [ 16.008578] ? __pfx_kthread+0x10/0x10 [ 16.008603] ret_from_fork+0x116/0x1d0 [ 16.008623] ? __pfx_kthread+0x10/0x10 [ 16.008646] ret_from_fork_asm+0x1a/0x30 [ 16.008676] </TASK> [ 16.008687] [ 16.015736] Allocated by task 282: [ 16.015878] kasan_save_stack+0x45/0x70 [ 16.016021] kasan_save_track+0x18/0x40 [ 16.016323] kasan_save_alloc_info+0x3b/0x50 [ 16.016552] __kasan_kmalloc+0xb7/0xc0 [ 16.016742] __kmalloc_cache_noprof+0x189/0x420 [ 16.016976] kasan_atomics+0x95/0x310 [ 16.017221] kunit_try_run_case+0x1a5/0x480 [ 16.017666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.017928] kthread+0x337/0x6f0 [ 16.018106] ret_from_fork+0x116/0x1d0 [ 16.018296] ret_from_fork_asm+0x1a/0x30 [ 16.018516] [ 16.018613] The buggy address belongs to the object at ffff8881025e4100 [ 16.018613] which belongs to the cache kmalloc-64 of size 64 [ 16.019019] The buggy address is located 0 bytes to the right of [ 16.019019] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 16.019642] [ 16.019889] The buggy address belongs to the physical page: [ 16.020200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 16.020559] flags: 0x200000000000000(node=0|zone=2) [ 16.020802] page_type: f5(slab) [ 16.020974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.021283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.021588] page dumped because: kasan: bad access detected [ 16.021766] [ 16.021848] Memory state around the buggy address: [ 16.022006] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.022229] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.022569] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.022893] ^ [ 16.023117] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.023433] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.023746] ================================================================== [ 15.031024] ================================================================== [ 15.031490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.031726] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.032056] [ 15.032165] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.032209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.032222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.032244] Call Trace: [ 15.032257] <TASK> [ 15.032272] dump_stack_lvl+0x73/0xb0 [ 15.032298] print_report+0xd1/0x610 [ 15.032321] ? __virt_addr_valid+0x1db/0x2d0 [ 15.032343] ? kasan_atomics_helper+0x3df/0x5450 [ 15.032365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.032389] ? kasan_atomics_helper+0x3df/0x5450 [ 15.032411] kasan_report+0x141/0x180 [ 15.032434] ? kasan_atomics_helper+0x3df/0x5450 [ 15.032460] kasan_check_range+0x10c/0x1c0 [ 15.032483] __kasan_check_read+0x15/0x20 [ 15.032503] kasan_atomics_helper+0x3df/0x5450 [ 15.032527] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.032550] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.032575] ? kasan_atomics+0x152/0x310 [ 15.032603] kasan_atomics+0x1dc/0x310 [ 15.032626] ? __pfx_kasan_atomics+0x10/0x10 [ 15.032651] ? __pfx_read_tsc+0x10/0x10 [ 15.032672] ? ktime_get_ts64+0x86/0x230 [ 15.032696] kunit_try_run_case+0x1a5/0x480 [ 15.032720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.032744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.032768] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.032792] ? __kthread_parkme+0x82/0x180 [ 15.032823] ? preempt_count_sub+0x50/0x80 [ 15.032853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.032877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.032901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.032926] kthread+0x337/0x6f0 [ 15.032946] ? trace_preempt_on+0x20/0xc0 [ 15.032969] ? __pfx_kthread+0x10/0x10 [ 15.032990] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.033012] ? calculate_sigpending+0x7b/0xa0 [ 15.033036] ? __pfx_kthread+0x10/0x10 [ 15.033058] ret_from_fork+0x116/0x1d0 [ 15.033077] ? __pfx_kthread+0x10/0x10 [ 15.033110] ret_from_fork_asm+0x1a/0x30 [ 15.033142] </TASK> [ 15.033152] [ 15.040742] Allocated by task 282: [ 15.040943] kasan_save_stack+0x45/0x70 [ 15.041207] kasan_save_track+0x18/0x40 [ 15.041377] kasan_save_alloc_info+0x3b/0x50 [ 15.041576] __kasan_kmalloc+0xb7/0xc0 [ 15.041741] __kmalloc_cache_noprof+0x189/0x420 [ 15.041972] kasan_atomics+0x95/0x310 [ 15.042171] kunit_try_run_case+0x1a5/0x480 [ 15.042360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.042566] kthread+0x337/0x6f0 [ 15.042690] ret_from_fork+0x116/0x1d0 [ 15.042895] ret_from_fork_asm+0x1a/0x30 [ 15.043093] [ 15.043192] The buggy address belongs to the object at ffff8881025e4100 [ 15.043192] which belongs to the cache kmalloc-64 of size 64 [ 15.043659] The buggy address is located 0 bytes to the right of [ 15.043659] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.044190] [ 15.044264] The buggy address belongs to the physical page: [ 15.044503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.044810] flags: 0x200000000000000(node=0|zone=2) [ 15.045040] page_type: f5(slab) [ 15.045322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.045612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.045853] page dumped because: kasan: bad access detected [ 15.046030] [ 15.046102] Memory state around the buggy address: [ 15.046260] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.046480] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.046698] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.046974] ^ [ 15.047333] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.047654] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.047981] ================================================================== [ 15.084876] ================================================================== [ 15.085213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.085546] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.085899] [ 15.086079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.086123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.086136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.086157] Call Trace: [ 15.086171] <TASK> [ 15.086186] dump_stack_lvl+0x73/0xb0 [ 15.086213] print_report+0xd1/0x610 [ 15.086236] ? __virt_addr_valid+0x1db/0x2d0 [ 15.086259] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.086281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.086304] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.086327] kasan_report+0x141/0x180 [ 15.086350] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.086377] __asan_report_store4_noabort+0x1b/0x30 [ 15.086403] kasan_atomics_helper+0x4b3a/0x5450 [ 15.086427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.086450] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.086475] ? kasan_atomics+0x152/0x310 [ 15.086502] kasan_atomics+0x1dc/0x310 [ 15.086526] ? __pfx_kasan_atomics+0x10/0x10 [ 15.086550] ? __pfx_read_tsc+0x10/0x10 [ 15.086572] ? ktime_get_ts64+0x86/0x230 [ 15.086597] kunit_try_run_case+0x1a5/0x480 [ 15.086621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.086645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.086669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.086694] ? __kthread_parkme+0x82/0x180 [ 15.086716] ? preempt_count_sub+0x50/0x80 [ 15.086741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.086765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.086790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.086825] kthread+0x337/0x6f0 [ 15.086846] ? trace_preempt_on+0x20/0xc0 [ 15.086869] ? __pfx_kthread+0x10/0x10 [ 15.086891] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.086913] ? calculate_sigpending+0x7b/0xa0 [ 15.086937] ? __pfx_kthread+0x10/0x10 [ 15.086959] ret_from_fork+0x116/0x1d0 [ 15.086978] ? __pfx_kthread+0x10/0x10 [ 15.086999] ret_from_fork_asm+0x1a/0x30 [ 15.087029] </TASK> [ 15.087040] [ 15.095582] Allocated by task 282: [ 15.095714] kasan_save_stack+0x45/0x70 [ 15.095870] kasan_save_track+0x18/0x40 [ 15.096008] kasan_save_alloc_info+0x3b/0x50 [ 15.096158] __kasan_kmalloc+0xb7/0xc0 [ 15.096292] __kmalloc_cache_noprof+0x189/0x420 [ 15.096472] kasan_atomics+0x95/0x310 [ 15.096610] kunit_try_run_case+0x1a5/0x480 [ 15.096759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.096954] kthread+0x337/0x6f0 [ 15.097081] ret_from_fork+0x116/0x1d0 [ 15.097217] ret_from_fork_asm+0x1a/0x30 [ 15.097359] [ 15.097431] The buggy address belongs to the object at ffff8881025e4100 [ 15.097431] which belongs to the cache kmalloc-64 of size 64 [ 15.097804] The buggy address is located 0 bytes to the right of [ 15.097804] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.098187] [ 15.098263] The buggy address belongs to the physical page: [ 15.098437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.098680] flags: 0x200000000000000(node=0|zone=2) [ 15.098854] page_type: f5(slab) [ 15.098977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.099212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.099440] page dumped because: kasan: bad access detected [ 15.099701] [ 15.099871] Memory state around the buggy address: [ 15.100272] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.100869] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.101529] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.102122] ^ [ 15.102524] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.103143] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.103767] ================================================================== [ 15.355630] ================================================================== [ 15.356253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.356640] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.357013] [ 15.357230] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.357341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.357356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.357378] Call Trace: [ 15.357395] <TASK> [ 15.357410] dump_stack_lvl+0x73/0xb0 [ 15.357439] print_report+0xd1/0x610 [ 15.357588] ? __virt_addr_valid+0x1db/0x2d0 [ 15.357614] ? kasan_atomics_helper+0xd47/0x5450 [ 15.357636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.357660] ? kasan_atomics_helper+0xd47/0x5450 [ 15.357682] kasan_report+0x141/0x180 [ 15.357705] ? kasan_atomics_helper+0xd47/0x5450 [ 15.357731] kasan_check_range+0x10c/0x1c0 [ 15.357755] __kasan_check_write+0x18/0x20 [ 15.357775] kasan_atomics_helper+0xd47/0x5450 [ 15.357798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.357835] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.357861] ? kasan_atomics+0x152/0x310 [ 15.357888] kasan_atomics+0x1dc/0x310 [ 15.357911] ? __pfx_kasan_atomics+0x10/0x10 [ 15.357936] ? __pfx_read_tsc+0x10/0x10 [ 15.357957] ? ktime_get_ts64+0x86/0x230 [ 15.357981] kunit_try_run_case+0x1a5/0x480 [ 15.358006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.358030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.358055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.358079] ? __kthread_parkme+0x82/0x180 [ 15.358112] ? preempt_count_sub+0x50/0x80 [ 15.358138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.358164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.358189] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.358213] kthread+0x337/0x6f0 [ 15.358233] ? trace_preempt_on+0x20/0xc0 [ 15.358257] ? __pfx_kthread+0x10/0x10 [ 15.358278] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.358301] ? calculate_sigpending+0x7b/0xa0 [ 15.358325] ? __pfx_kthread+0x10/0x10 [ 15.358347] ret_from_fork+0x116/0x1d0 [ 15.358366] ? __pfx_kthread+0x10/0x10 [ 15.358388] ret_from_fork_asm+0x1a/0x30 [ 15.358418] </TASK> [ 15.358429] [ 15.368131] Allocated by task 282: [ 15.368514] kasan_save_stack+0x45/0x70 [ 15.368790] kasan_save_track+0x18/0x40 [ 15.369001] kasan_save_alloc_info+0x3b/0x50 [ 15.369364] __kasan_kmalloc+0xb7/0xc0 [ 15.369557] __kmalloc_cache_noprof+0x189/0x420 [ 15.369867] kasan_atomics+0x95/0x310 [ 15.370061] kunit_try_run_case+0x1a5/0x480 [ 15.370391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.370642] kthread+0x337/0x6f0 [ 15.370919] ret_from_fork+0x116/0x1d0 [ 15.371069] ret_from_fork_asm+0x1a/0x30 [ 15.371285] [ 15.371386] The buggy address belongs to the object at ffff8881025e4100 [ 15.371386] which belongs to the cache kmalloc-64 of size 64 [ 15.371879] The buggy address is located 0 bytes to the right of [ 15.371879] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.372794] [ 15.372920] The buggy address belongs to the physical page: [ 15.373327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.373670] flags: 0x200000000000000(node=0|zone=2) [ 15.373974] page_type: f5(slab) [ 15.374176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.374588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.374977] page dumped because: kasan: bad access detected [ 15.375318] [ 15.375397] Memory state around the buggy address: [ 15.375618] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.376104] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.376472] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.376883] ^ [ 15.377228] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.377527] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.377939] ================================================================== [ 15.163157] ================================================================== [ 15.163396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.163635] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.164037] [ 15.164148] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.164191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.164203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.164225] Call Trace: [ 15.164239] <TASK> [ 15.164253] dump_stack_lvl+0x73/0xb0 [ 15.164281] print_report+0xd1/0x610 [ 15.164303] ? __virt_addr_valid+0x1db/0x2d0 [ 15.164326] ? kasan_atomics_helper+0x72f/0x5450 [ 15.164347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.164370] ? kasan_atomics_helper+0x72f/0x5450 [ 15.164392] kasan_report+0x141/0x180 [ 15.164415] ? kasan_atomics_helper+0x72f/0x5450 [ 15.164442] kasan_check_range+0x10c/0x1c0 [ 15.164466] __kasan_check_write+0x18/0x20 [ 15.164486] kasan_atomics_helper+0x72f/0x5450 [ 15.164509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.164531] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.164556] ? kasan_atomics+0x152/0x310 [ 15.164583] kasan_atomics+0x1dc/0x310 [ 15.164606] ? __pfx_kasan_atomics+0x10/0x10 [ 15.164631] ? __pfx_read_tsc+0x10/0x10 [ 15.164652] ? ktime_get_ts64+0x86/0x230 [ 15.164677] kunit_try_run_case+0x1a5/0x480 [ 15.164702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.164725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.164749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.164774] ? __kthread_parkme+0x82/0x180 [ 15.164794] ? preempt_count_sub+0x50/0x80 [ 15.164831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.164861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.164885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.164911] kthread+0x337/0x6f0 [ 15.164931] ? trace_preempt_on+0x20/0xc0 [ 15.164955] ? __pfx_kthread+0x10/0x10 [ 15.164975] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.164998] ? calculate_sigpending+0x7b/0xa0 [ 15.165022] ? __pfx_kthread+0x10/0x10 [ 15.165045] ret_from_fork+0x116/0x1d0 [ 15.165064] ? __pfx_kthread+0x10/0x10 [ 15.165085] ret_from_fork_asm+0x1a/0x30 [ 15.165116] </TASK> [ 15.165127] [ 15.172886] Allocated by task 282: [ 15.173019] kasan_save_stack+0x45/0x70 [ 15.173338] kasan_save_track+0x18/0x40 [ 15.173532] kasan_save_alloc_info+0x3b/0x50 [ 15.173726] __kasan_kmalloc+0xb7/0xc0 [ 15.173873] __kmalloc_cache_noprof+0x189/0x420 [ 15.174103] kasan_atomics+0x95/0x310 [ 15.174299] kunit_try_run_case+0x1a5/0x480 [ 15.174476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.174740] kthread+0x337/0x6f0 [ 15.174903] ret_from_fork+0x116/0x1d0 [ 15.175073] ret_from_fork_asm+0x1a/0x30 [ 15.175261] [ 15.175359] The buggy address belongs to the object at ffff8881025e4100 [ 15.175359] which belongs to the cache kmalloc-64 of size 64 [ 15.175782] The buggy address is located 0 bytes to the right of [ 15.175782] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.176323] [ 15.176421] The buggy address belongs to the physical page: [ 15.176680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.177051] flags: 0x200000000000000(node=0|zone=2) [ 15.177322] page_type: f5(slab) [ 15.177448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.177766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.178132] page dumped because: kasan: bad access detected [ 15.178358] [ 15.178436] Memory state around the buggy address: [ 15.178632] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.178914] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.179263] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.179557] ^ [ 15.179756] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180058] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180356] ================================================================== [ 15.235202] ================================================================== [ 15.235509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.235740] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.235982] [ 15.236067] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.236111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.236124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.236146] Call Trace: [ 15.236163] <TASK> [ 15.236180] dump_stack_lvl+0x73/0xb0 [ 15.236206] print_report+0xd1/0x610 [ 15.236227] ? __virt_addr_valid+0x1db/0x2d0 [ 15.236251] ? kasan_atomics_helper+0x992/0x5450 [ 15.236273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.236295] ? kasan_atomics_helper+0x992/0x5450 [ 15.236318] kasan_report+0x141/0x180 [ 15.236341] ? kasan_atomics_helper+0x992/0x5450 [ 15.236367] kasan_check_range+0x10c/0x1c0 [ 15.236391] __kasan_check_write+0x18/0x20 [ 15.236411] kasan_atomics_helper+0x992/0x5450 [ 15.236434] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.236456] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.236482] ? kasan_atomics+0x152/0x310 [ 15.236509] kasan_atomics+0x1dc/0x310 [ 15.236532] ? __pfx_kasan_atomics+0x10/0x10 [ 15.236557] ? __pfx_read_tsc+0x10/0x10 [ 15.236579] ? ktime_get_ts64+0x86/0x230 [ 15.236604] kunit_try_run_case+0x1a5/0x480 [ 15.236628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.236652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.236676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.236700] ? __kthread_parkme+0x82/0x180 [ 15.236721] ? preempt_count_sub+0x50/0x80 [ 15.236746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.236770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.236795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.236829] kthread+0x337/0x6f0 [ 15.236853] ? trace_preempt_on+0x20/0xc0 [ 15.236876] ? __pfx_kthread+0x10/0x10 [ 15.236897] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.236919] ? calculate_sigpending+0x7b/0xa0 [ 15.236943] ? __pfx_kthread+0x10/0x10 [ 15.236965] ret_from_fork+0x116/0x1d0 [ 15.236984] ? __pfx_kthread+0x10/0x10 [ 15.237006] ret_from_fork_asm+0x1a/0x30 [ 15.237036] </TASK> [ 15.237047] [ 15.244780] Allocated by task 282: [ 15.244971] kasan_save_stack+0x45/0x70 [ 15.245173] kasan_save_track+0x18/0x40 [ 15.245366] kasan_save_alloc_info+0x3b/0x50 [ 15.245544] __kasan_kmalloc+0xb7/0xc0 [ 15.245723] __kmalloc_cache_noprof+0x189/0x420 [ 15.245893] kasan_atomics+0x95/0x310 [ 15.246029] kunit_try_run_case+0x1a5/0x480 [ 15.246406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.246663] kthread+0x337/0x6f0 [ 15.246852] ret_from_fork+0x116/0x1d0 [ 15.247047] ret_from_fork_asm+0x1a/0x30 [ 15.247276] [ 15.247380] The buggy address belongs to the object at ffff8881025e4100 [ 15.247380] which belongs to the cache kmalloc-64 of size 64 [ 15.247841] The buggy address is located 0 bytes to the right of [ 15.247841] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.248385] [ 15.248480] The buggy address belongs to the physical page: [ 15.248667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.248925] flags: 0x200000000000000(node=0|zone=2) [ 15.249154] page_type: f5(slab) [ 15.249418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.249758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.250002] page dumped because: kasan: bad access detected [ 15.250380] [ 15.250477] Memory state around the buggy address: [ 15.250703] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.251041] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.251514] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.251797] ^ [ 15.251986] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.252307] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.252579] ================================================================== [ 15.270669] ================================================================== [ 15.271003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.271350] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282 [ 15.271583] [ 15.271675] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 15.271725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.271738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.271761] Call Trace: [ 15.271774] <TASK> [ 15.271790] dump_stack_lvl+0x73/0xb0 [ 15.271829] print_report+0xd1/0x610 [ 15.271852] ? __virt_addr_valid+0x1db/0x2d0 [ 15.271875] ? kasan_atomics_helper+0xac7/0x5450 [ 15.271898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.271921] ? kasan_atomics_helper+0xac7/0x5450 [ 15.271945] kasan_report+0x141/0x180 [ 15.271968] ? kasan_atomics_helper+0xac7/0x5450 [ 15.271994] kasan_check_range+0x10c/0x1c0 [ 15.272019] __kasan_check_write+0x18/0x20 [ 15.272039] kasan_atomics_helper+0xac7/0x5450 [ 15.272062] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.272085] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.272122] ? kasan_atomics+0x152/0x310 [ 15.272149] kasan_atomics+0x1dc/0x310 [ 15.272172] ? __pfx_kasan_atomics+0x10/0x10 [ 15.272197] ? __pfx_read_tsc+0x10/0x10 [ 15.272218] ? ktime_get_ts64+0x86/0x230 [ 15.272241] kunit_try_run_case+0x1a5/0x480 [ 15.272267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.272290] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.272315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.272338] ? __kthread_parkme+0x82/0x180 [ 15.272358] ? preempt_count_sub+0x50/0x80 [ 15.272382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.272407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.272431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.272455] kthread+0x337/0x6f0 [ 15.272475] ? trace_preempt_on+0x20/0xc0 [ 15.272498] ? __pfx_kthread+0x10/0x10 [ 15.272520] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.272542] ? calculate_sigpending+0x7b/0xa0 [ 15.272565] ? __pfx_kthread+0x10/0x10 [ 15.272588] ret_from_fork+0x116/0x1d0 [ 15.272607] ? __pfx_kthread+0x10/0x10 [ 15.272629] ret_from_fork_asm+0x1a/0x30 [ 15.272659] </TASK> [ 15.272671] [ 15.281182] Allocated by task 282: [ 15.281498] kasan_save_stack+0x45/0x70 [ 15.281861] kasan_save_track+0x18/0x40 [ 15.282228] kasan_save_alloc_info+0x3b/0x50 [ 15.282605] __kasan_kmalloc+0xb7/0xc0 [ 15.282943] __kmalloc_cache_noprof+0x189/0x420 [ 15.283161] kasan_atomics+0x95/0x310 [ 15.283296] kunit_try_run_case+0x1a5/0x480 [ 15.283445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.283622] kthread+0x337/0x6f0 [ 15.283763] ret_from_fork+0x116/0x1d0 [ 15.283910] ret_from_fork_asm+0x1a/0x30 [ 15.284054] [ 15.284128] The buggy address belongs to the object at ffff8881025e4100 [ 15.284128] which belongs to the cache kmalloc-64 of size 64 [ 15.284485] The buggy address is located 0 bytes to the right of [ 15.284485] allocated 48-byte region [ffff8881025e4100, ffff8881025e4130) [ 15.284864] [ 15.284937] The buggy address belongs to the physical page: [ 15.285111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4 [ 15.285355] flags: 0x200000000000000(node=0|zone=2) [ 15.285521] page_type: f5(slab) [ 15.285834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.286458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.287228] page dumped because: kasan: bad access detected [ 15.287696] [ 15.287863] Memory state around the buggy address: [ 15.288296] ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.288907] ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.289498] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.290099] ^ [ 15.290509] ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.291110] ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.291691] ==================================================================