Date
July 6, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.012307] ================================================================== [ 21.012582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.012651] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.012702] [ 21.012743] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.012823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.013407] Hardware name: linux,dummy-virt (DT) [ 21.013505] Call trace: [ 21.013689] show_stack+0x20/0x38 (C) [ 21.013747] dump_stack_lvl+0x8c/0xd0 [ 21.013796] print_report+0x118/0x608 [ 21.013843] kasan_report+0xdc/0x128 [ 21.014063] __asan_report_store8_noabort+0x20/0x30 [ 21.014446] kasan_atomics_helper+0x3e5c/0x4858 [ 21.014642] kasan_atomics+0x198/0x2e0 [ 21.014693] kunit_try_run_case+0x170/0x3f0 [ 21.014753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.014833] kthread+0x328/0x630 [ 21.014875] ret_from_fork+0x10/0x20 [ 21.014932] [ 21.014955] Allocated by task 265: [ 21.014984] kasan_save_stack+0x3c/0x68 [ 21.015036] kasan_save_track+0x20/0x40 [ 21.015077] kasan_save_alloc_info+0x40/0x58 [ 21.015118] __kasan_kmalloc+0xd4/0xd8 [ 21.015165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.015217] kasan_atomics+0xb8/0x2e0 [ 21.015254] kunit_try_run_case+0x170/0x3f0 [ 21.015296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.015353] kthread+0x328/0x630 [ 21.015397] ret_from_fork+0x10/0x20 [ 21.015435] [ 21.015455] The buggy address belongs to the object at fff00000c56d1100 [ 21.015455] which belongs to the cache kmalloc-64 of size 64 [ 21.015514] The buggy address is located 0 bytes to the right of [ 21.015514] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.015579] [ 21.015609] The buggy address belongs to the physical page: [ 21.015658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.015711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.015761] page_type: f5(slab) [ 21.015809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.015871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.015918] page dumped because: kasan: bad access detected [ 21.015954] [ 21.015973] Memory state around the buggy address: [ 21.016007] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.016052] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.016096] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.016136] ^ [ 21.016178] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.016616] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.017022] ================================================================== [ 21.155301] ================================================================== [ 21.155438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.155497] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.155550] [ 21.155581] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.155661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.155716] Hardware name: linux,dummy-virt (DT) [ 21.155749] Call trace: [ 21.155774] show_stack+0x20/0x38 (C) [ 21.155846] dump_stack_lvl+0x8c/0xd0 [ 21.155895] print_report+0x118/0x608 [ 21.155942] kasan_report+0xdc/0x128 [ 21.155989] kasan_check_range+0x100/0x1a8 [ 21.156153] __kasan_check_write+0x20/0x30 [ 21.156255] kasan_atomics_helper+0x15b4/0x4858 [ 21.156308] kasan_atomics+0x198/0x2e0 [ 21.156410] kunit_try_run_case+0x170/0x3f0 [ 21.156477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.156558] kthread+0x328/0x630 [ 21.156785] ret_from_fork+0x10/0x20 [ 21.156988] [ 21.157015] Allocated by task 265: [ 21.157084] kasan_save_stack+0x3c/0x68 [ 21.157207] kasan_save_track+0x20/0x40 [ 21.157284] kasan_save_alloc_info+0x40/0x58 [ 21.157328] __kasan_kmalloc+0xd4/0xd8 [ 21.157367] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.157407] kasan_atomics+0xb8/0x2e0 [ 21.157445] kunit_try_run_case+0x170/0x3f0 [ 21.157515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.157561] kthread+0x328/0x630 [ 21.157830] ret_from_fork+0x10/0x20 [ 21.157906] [ 21.158177] The buggy address belongs to the object at fff00000c56d1100 [ 21.158177] which belongs to the cache kmalloc-64 of size 64 [ 21.158401] The buggy address is located 0 bytes to the right of [ 21.158401] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.158603] [ 21.158660] The buggy address belongs to the physical page: [ 21.158788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.158894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.158982] page_type: f5(slab) [ 21.159101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.159164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.159217] page dumped because: kasan: bad access detected [ 21.159270] [ 21.159290] Memory state around the buggy address: [ 21.159324] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.159378] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.159423] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.159465] ^ [ 21.159498] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159542] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159590] ================================================================== [ 21.200639] ================================================================== [ 21.200826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.201066] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.201156] [ 21.201203] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.201399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.201822] Hardware name: linux,dummy-virt (DT) [ 21.201897] Call trace: [ 21.201944] show_stack+0x20/0x38 (C) [ 21.202005] dump_stack_lvl+0x8c/0xd0 [ 21.202055] print_report+0x118/0x608 [ 21.202103] kasan_report+0xdc/0x128 [ 21.202161] kasan_check_range+0x100/0x1a8 [ 21.202219] __kasan_check_write+0x20/0x30 [ 21.202266] kasan_atomics_helper+0x17ec/0x4858 [ 21.202315] kasan_atomics+0x198/0x2e0 [ 21.202380] kunit_try_run_case+0x170/0x3f0 [ 21.202437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.202642] kthread+0x328/0x630 [ 21.202769] ret_from_fork+0x10/0x20 [ 21.203139] [ 21.203228] Allocated by task 265: [ 21.203324] kasan_save_stack+0x3c/0x68 [ 21.203429] kasan_save_track+0x20/0x40 [ 21.203517] kasan_save_alloc_info+0x40/0x58 [ 21.203624] __kasan_kmalloc+0xd4/0xd8 [ 21.203743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.203822] kasan_atomics+0xb8/0x2e0 [ 21.203861] kunit_try_run_case+0x170/0x3f0 [ 21.203900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.203947] kthread+0x328/0x630 [ 21.203981] ret_from_fork+0x10/0x20 [ 21.204145] [ 21.204260] The buggy address belongs to the object at fff00000c56d1100 [ 21.204260] which belongs to the cache kmalloc-64 of size 64 [ 21.204353] The buggy address is located 0 bytes to the right of [ 21.204353] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.204477] [ 21.204498] The buggy address belongs to the physical page: [ 21.204531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.204757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.204865] page_type: f5(slab) [ 21.204961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.205075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.205226] page dumped because: kasan: bad access detected [ 21.205335] [ 21.205455] Memory state around the buggy address: [ 21.205514] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.205560] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.205817] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.205979] ^ [ 21.206055] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.206236] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.206515] ================================================================== [ 21.036580] ================================================================== [ 21.036761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.036823] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.037257] [ 21.037601] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.037732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.038257] Hardware name: linux,dummy-virt (DT) [ 21.038348] Call trace: [ 21.038696] show_stack+0x20/0x38 (C) [ 21.038847] dump_stack_lvl+0x8c/0xd0 [ 21.039157] print_report+0x118/0x608 [ 21.039386] kasan_report+0xdc/0x128 [ 21.039584] kasan_check_range+0x100/0x1a8 [ 21.039739] __kasan_check_write+0x20/0x30 [ 21.039794] kasan_atomics_helper+0xf88/0x4858 [ 21.039846] kasan_atomics+0x198/0x2e0 [ 21.040019] kunit_try_run_case+0x170/0x3f0 [ 21.040514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.040689] kthread+0x328/0x630 [ 21.040775] ret_from_fork+0x10/0x20 [ 21.041037] [ 21.041065] Allocated by task 265: [ 21.041097] kasan_save_stack+0x3c/0x68 [ 21.041676] kasan_save_track+0x20/0x40 [ 21.041832] kasan_save_alloc_info+0x40/0x58 [ 21.042098] __kasan_kmalloc+0xd4/0xd8 [ 21.042234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.042373] kasan_atomics+0xb8/0x2e0 [ 21.042519] kunit_try_run_case+0x170/0x3f0 [ 21.042652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.042780] kthread+0x328/0x630 [ 21.042853] ret_from_fork+0x10/0x20 [ 21.043057] [ 21.043225] The buggy address belongs to the object at fff00000c56d1100 [ 21.043225] which belongs to the cache kmalloc-64 of size 64 [ 21.043337] The buggy address is located 0 bytes to the right of [ 21.043337] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.043525] [ 21.043570] The buggy address belongs to the physical page: [ 21.043604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.043658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.044301] page_type: f5(slab) [ 21.044460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.044697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.044781] page dumped because: kasan: bad access detected [ 21.044957] [ 21.045265] Memory state around the buggy address: [ 21.045612] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.045857] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.046263] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.046394] ^ [ 21.046446] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.046567] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.046984] ================================================================== [ 20.992631] ================================================================== [ 20.992848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.993107] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.993161] [ 20.993208] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.993287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.993684] Hardware name: linux,dummy-virt (DT) [ 20.994015] Call trace: [ 20.994334] show_stack+0x20/0x38 (C) [ 20.994489] dump_stack_lvl+0x8c/0xd0 [ 20.994699] print_report+0x118/0x608 [ 20.994851] kasan_report+0xdc/0x128 [ 20.994901] __asan_report_load8_noabort+0x20/0x30 [ 20.995325] kasan_atomics_helper+0x3f58/0x4858 [ 20.995576] kasan_atomics+0x198/0x2e0 [ 20.995795] kunit_try_run_case+0x170/0x3f0 [ 20.995973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.996155] kthread+0x328/0x630 [ 20.996378] ret_from_fork+0x10/0x20 [ 20.996794] [ 20.996879] Allocated by task 265: [ 20.997013] kasan_save_stack+0x3c/0x68 [ 20.997109] kasan_save_track+0x20/0x40 [ 20.997290] kasan_save_alloc_info+0x40/0x58 [ 20.997452] __kasan_kmalloc+0xd4/0xd8 [ 20.997599] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.997648] kasan_atomics+0xb8/0x2e0 [ 20.997852] kunit_try_run_case+0x170/0x3f0 [ 20.998068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.998368] kthread+0x328/0x630 [ 20.998525] ret_from_fork+0x10/0x20 [ 20.998766] [ 20.998823] The buggy address belongs to the object at fff00000c56d1100 [ 20.998823] which belongs to the cache kmalloc-64 of size 64 [ 20.998900] The buggy address is located 0 bytes to the right of [ 20.998900] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.998966] [ 20.999139] The buggy address belongs to the physical page: [ 20.999204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.999272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.999333] page_type: f5(slab) [ 20.999380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.999433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.999486] page dumped because: kasan: bad access detected [ 20.999529] [ 20.999550] Memory state around the buggy address: [ 20.999584] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.999630] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.999674] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.999728] ^ [ 20.999769] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.999814] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.999864] ================================================================== [ 21.146502] ================================================================== [ 21.146552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.146604] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.146654] [ 21.146686] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.146766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.146795] Hardware name: linux,dummy-virt (DT) [ 21.146828] Call trace: [ 21.146854] show_stack+0x20/0x38 (C) [ 21.146901] dump_stack_lvl+0x8c/0xd0 [ 21.146949] print_report+0x118/0x608 [ 21.146996] kasan_report+0xdc/0x128 [ 21.147043] kasan_check_range+0x100/0x1a8 [ 21.147091] __kasan_check_write+0x20/0x30 [ 21.147138] kasan_atomics_helper+0x14e4/0x4858 [ 21.147187] kasan_atomics+0x198/0x2e0 [ 21.147249] kunit_try_run_case+0x170/0x3f0 [ 21.147298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.147352] kthread+0x328/0x630 [ 21.147394] ret_from_fork+0x10/0x20 [ 21.147442] [ 21.147462] Allocated by task 265: [ 21.147490] kasan_save_stack+0x3c/0x68 [ 21.147532] kasan_save_track+0x20/0x40 [ 21.147571] kasan_save_alloc_info+0x40/0x58 [ 21.147613] __kasan_kmalloc+0xd4/0xd8 [ 21.147652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.147692] kasan_atomics+0xb8/0x2e0 [ 21.147730] kunit_try_run_case+0x170/0x3f0 [ 21.147769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.147813] kthread+0x328/0x630 [ 21.147848] ret_from_fork+0x10/0x20 [ 21.147885] [ 21.147905] The buggy address belongs to the object at fff00000c56d1100 [ 21.147905] which belongs to the cache kmalloc-64 of size 64 [ 21.147964] The buggy address is located 0 bytes to the right of [ 21.147964] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.148028] [ 21.148048] The buggy address belongs to the physical page: [ 21.148080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.148133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.148180] page_type: f5(slab) [ 21.148297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.148364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.148407] page dumped because: kasan: bad access detected [ 21.148441] [ 21.148461] Memory state around the buggy address: [ 21.148495] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.148567] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.148642] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.148685] ^ [ 21.148718] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148768] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148824] ================================================================== [ 21.194228] ================================================================== [ 21.194545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.194623] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.194680] [ 21.194715] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.195029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.195071] Hardware name: linux,dummy-virt (DT) [ 21.195222] Call trace: [ 21.195248] show_stack+0x20/0x38 (C) [ 21.195302] dump_stack_lvl+0x8c/0xd0 [ 21.195483] print_report+0x118/0x608 [ 21.195565] kasan_report+0xdc/0x128 [ 21.195774] __asan_report_load8_noabort+0x20/0x30 [ 21.195841] kasan_atomics_helper+0x3e20/0x4858 [ 21.195953] kasan_atomics+0x198/0x2e0 [ 21.196079] kunit_try_run_case+0x170/0x3f0 [ 21.196149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.196221] kthread+0x328/0x630 [ 21.196265] ret_from_fork+0x10/0x20 [ 21.196314] [ 21.196345] Allocated by task 265: [ 21.196392] kasan_save_stack+0x3c/0x68 [ 21.196436] kasan_save_track+0x20/0x40 [ 21.196499] kasan_save_alloc_info+0x40/0x58 [ 21.196584] __kasan_kmalloc+0xd4/0xd8 [ 21.196624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.196665] kasan_atomics+0xb8/0x2e0 [ 21.196705] kunit_try_run_case+0x170/0x3f0 [ 21.196840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.197065] kthread+0x328/0x630 [ 21.197142] ret_from_fork+0x10/0x20 [ 21.197184] [ 21.197408] The buggy address belongs to the object at fff00000c56d1100 [ 21.197408] which belongs to the cache kmalloc-64 of size 64 [ 21.197598] The buggy address is located 0 bytes to the right of [ 21.197598] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.197952] [ 21.198239] The buggy address belongs to the physical page: [ 21.198319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.198375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.198453] page_type: f5(slab) [ 21.198494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.198546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.198589] page dumped because: kasan: bad access detected [ 21.198749] [ 21.198883] Memory state around the buggy address: [ 21.199181] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.199269] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.199315] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.199646] ^ [ 21.199753] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200029] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200134] ================================================================== [ 21.018594] ================================================================== [ 21.018647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.018699] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.018964] [ 21.019007] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.019107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.019323] Hardware name: linux,dummy-virt (DT) [ 21.019619] Call trace: [ 21.019966] show_stack+0x20/0x38 (C) [ 21.020053] dump_stack_lvl+0x8c/0xd0 [ 21.020269] print_report+0x118/0x608 [ 21.020331] kasan_report+0xdc/0x128 [ 21.020382] kasan_check_range+0x100/0x1a8 [ 21.020451] __kasan_check_write+0x20/0x30 [ 21.020700] kasan_atomics_helper+0xeb8/0x4858 [ 21.020805] kasan_atomics+0x198/0x2e0 [ 21.021115] kunit_try_run_case+0x170/0x3f0 [ 21.021328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.021548] kthread+0x328/0x630 [ 21.021638] ret_from_fork+0x10/0x20 [ 21.021771] [ 21.021894] Allocated by task 265: [ 21.022061] kasan_save_stack+0x3c/0x68 [ 21.022309] kasan_save_track+0x20/0x40 [ 21.022513] kasan_save_alloc_info+0x40/0x58 [ 21.022706] __kasan_kmalloc+0xd4/0xd8 [ 21.022791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.023115] kasan_atomics+0xb8/0x2e0 [ 21.023185] kunit_try_run_case+0x170/0x3f0 [ 21.023367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.023893] kthread+0x328/0x630 [ 21.024308] ret_from_fork+0x10/0x20 [ 21.024361] [ 21.024397] The buggy address belongs to the object at fff00000c56d1100 [ 21.024397] which belongs to the cache kmalloc-64 of size 64 [ 21.024634] The buggy address is located 0 bytes to the right of [ 21.024634] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.025075] [ 21.025301] The buggy address belongs to the physical page: [ 21.025639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.026121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.026457] page_type: f5(slab) [ 21.026560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.026795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.027009] page dumped because: kasan: bad access detected [ 21.027180] [ 21.027657] Memory state around the buggy address: [ 21.027821] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.027914] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.028342] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.029004] ^ [ 21.029089] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.029245] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.029646] ================================================================== [ 21.065700] ================================================================== [ 21.065869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.065922] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.065974] [ 21.066135] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.066928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.067240] Hardware name: linux,dummy-virt (DT) [ 21.067315] Call trace: [ 21.067342] show_stack+0x20/0x38 (C) [ 21.067731] dump_stack_lvl+0x8c/0xd0 [ 21.067864] print_report+0x118/0x608 [ 21.068280] kasan_report+0xdc/0x128 [ 21.068424] kasan_check_range+0x100/0x1a8 [ 21.068602] __kasan_check_write+0x20/0x30 [ 21.068692] kasan_atomics_helper+0x10c0/0x4858 [ 21.069249] kasan_atomics+0x198/0x2e0 [ 21.069481] kunit_try_run_case+0x170/0x3f0 [ 21.069962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.070050] kthread+0x328/0x630 [ 21.070222] ret_from_fork+0x10/0x20 [ 21.070443] [ 21.070494] Allocated by task 265: [ 21.070688] kasan_save_stack+0x3c/0x68 [ 21.070805] kasan_save_track+0x20/0x40 [ 21.071205] kasan_save_alloc_info+0x40/0x58 [ 21.071537] __kasan_kmalloc+0xd4/0xd8 [ 21.071681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.071989] kasan_atomics+0xb8/0x2e0 [ 21.072164] kunit_try_run_case+0x170/0x3f0 [ 21.072487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.072621] kthread+0x328/0x630 [ 21.073098] ret_from_fork+0x10/0x20 [ 21.073297] [ 21.073705] The buggy address belongs to the object at fff00000c56d1100 [ 21.073705] which belongs to the cache kmalloc-64 of size 64 [ 21.073869] The buggy address is located 0 bytes to the right of [ 21.073869] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.073939] [ 21.073962] The buggy address belongs to the physical page: [ 21.073994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.074566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.074680] page_type: f5(slab) [ 21.075110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.075383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.075459] page dumped because: kasan: bad access detected [ 21.075755] [ 21.075990] Memory state around the buggy address: [ 21.076095] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.076347] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.076672] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.076814] ^ [ 21.077023] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.077228] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.077441] ================================================================== [ 21.078537] ================================================================== [ 21.078598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.078983] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.079133] [ 21.079218] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.079463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.079527] Hardware name: linux,dummy-virt (DT) [ 21.079772] Call trace: [ 21.080026] show_stack+0x20/0x38 (C) [ 21.080393] dump_stack_lvl+0x8c/0xd0 [ 21.080603] print_report+0x118/0x608 [ 21.080664] kasan_report+0xdc/0x128 [ 21.081042] kasan_check_range+0x100/0x1a8 [ 21.081114] __kasan_check_write+0x20/0x30 [ 21.081287] kasan_atomics_helper+0x1128/0x4858 [ 21.081373] kasan_atomics+0x198/0x2e0 [ 21.081429] kunit_try_run_case+0x170/0x3f0 [ 21.081783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.082280] kthread+0x328/0x630 [ 21.082411] ret_from_fork+0x10/0x20 [ 21.082492] [ 21.082531] Allocated by task 265: [ 21.082573] kasan_save_stack+0x3c/0x68 [ 21.082629] kasan_save_track+0x20/0x40 [ 21.082693] kasan_save_alloc_info+0x40/0x58 [ 21.082748] __kasan_kmalloc+0xd4/0xd8 [ 21.082817] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.082865] kasan_atomics+0xb8/0x2e0 [ 21.082907] kunit_try_run_case+0x170/0x3f0 [ 21.082948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.083014] kthread+0x328/0x630 [ 21.083050] ret_from_fork+0x10/0x20 [ 21.083137] [ 21.083169] The buggy address belongs to the object at fff00000c56d1100 [ 21.083169] which belongs to the cache kmalloc-64 of size 64 [ 21.083247] The buggy address is located 0 bytes to the right of [ 21.083247] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.083314] [ 21.083335] The buggy address belongs to the physical page: [ 21.083378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.083430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.083500] page_type: f5(slab) [ 21.083550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.083621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.083669] page dumped because: kasan: bad access detected [ 21.083703] [ 21.083722] Memory state around the buggy address: [ 21.083757] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.083802] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.083860] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.083901] ^ [ 21.083950] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.083995] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.084044] ================================================================== [ 21.171232] ================================================================== [ 21.171306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.171356] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.171442] [ 21.171473] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.171698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.171762] Hardware name: linux,dummy-virt (DT) [ 21.171798] Call trace: [ 21.171849] show_stack+0x20/0x38 (C) [ 21.171932] dump_stack_lvl+0x8c/0xd0 [ 21.172002] print_report+0x118/0x608 [ 21.172087] kasan_report+0xdc/0x128 [ 21.172158] __asan_report_load8_noabort+0x20/0x30 [ 21.172257] kasan_atomics_helper+0x3df4/0x4858 [ 21.172309] kasan_atomics+0x198/0x2e0 [ 21.172355] kunit_try_run_case+0x170/0x3f0 [ 21.172478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.172630] kthread+0x328/0x630 [ 21.172683] ret_from_fork+0x10/0x20 [ 21.172787] [ 21.172812] Allocated by task 265: [ 21.173066] kasan_save_stack+0x3c/0x68 [ 21.173147] kasan_save_track+0x20/0x40 [ 21.173224] kasan_save_alloc_info+0x40/0x58 [ 21.173305] __kasan_kmalloc+0xd4/0xd8 [ 21.173362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.173409] kasan_atomics+0xb8/0x2e0 [ 21.173493] kunit_try_run_case+0x170/0x3f0 [ 21.173564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.173611] kthread+0x328/0x630 [ 21.173644] ret_from_fork+0x10/0x20 [ 21.173680] [ 21.173919] The buggy address belongs to the object at fff00000c56d1100 [ 21.173919] which belongs to the cache kmalloc-64 of size 64 [ 21.174056] The buggy address is located 0 bytes to the right of [ 21.174056] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.174180] [ 21.174480] The buggy address belongs to the physical page: [ 21.174578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.174718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.174876] page_type: f5(slab) [ 21.174917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.174969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.175124] page dumped because: kasan: bad access detected [ 21.175244] [ 21.175571] Memory state around the buggy address: [ 21.175643] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.175689] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.176035] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.176159] ^ [ 21.176402] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176569] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176695] ================================================================== [ 21.030489] ================================================================== [ 21.030803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.030878] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.030938] [ 21.031149] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.031257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.031342] Hardware name: linux,dummy-virt (DT) [ 21.031379] Call trace: [ 21.031404] show_stack+0x20/0x38 (C) [ 21.031800] dump_stack_lvl+0x8c/0xd0 [ 21.032062] print_report+0x118/0x608 [ 21.032279] kasan_report+0xdc/0x128 [ 21.032417] kasan_check_range+0x100/0x1a8 [ 21.032540] __kasan_check_write+0x20/0x30 [ 21.032734] kasan_atomics_helper+0xf20/0x4858 [ 21.032892] kasan_atomics+0x198/0x2e0 [ 21.033560] kunit_try_run_case+0x170/0x3f0 [ 21.033705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.033879] kthread+0x328/0x630 [ 21.033957] ret_from_fork+0x10/0x20 [ 21.034183] [ 21.034375] Allocated by task 265: [ 21.034538] kasan_save_stack+0x3c/0x68 [ 21.034608] kasan_save_track+0x20/0x40 [ 21.034649] kasan_save_alloc_info+0x40/0x58 [ 21.034709] __kasan_kmalloc+0xd4/0xd8 [ 21.034747] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.034799] kasan_atomics+0xb8/0x2e0 [ 21.034839] kunit_try_run_case+0x170/0x3f0 [ 21.034892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.034953] kthread+0x328/0x630 [ 21.034987] ret_from_fork+0x10/0x20 [ 21.035026] [ 21.035056] The buggy address belongs to the object at fff00000c56d1100 [ 21.035056] which belongs to the cache kmalloc-64 of size 64 [ 21.035116] The buggy address is located 0 bytes to the right of [ 21.035116] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.035211] [ 21.035256] The buggy address belongs to the physical page: [ 21.035289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.035356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.035404] page_type: f5(slab) [ 21.035442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.035494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.035536] page dumped because: kasan: bad access detected [ 21.035579] [ 21.035598] Memory state around the buggy address: [ 21.035645] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.035696] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.035740] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.035794] ^ [ 21.035826] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.035886] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.035926] ================================================================== [ 21.165442] ================================================================== [ 21.165556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.165677] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.165770] [ 21.165939] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.166266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.166389] Hardware name: linux,dummy-virt (DT) [ 21.166534] Call trace: [ 21.166605] show_stack+0x20/0x38 (C) [ 21.166774] dump_stack_lvl+0x8c/0xd0 [ 21.166821] print_report+0x118/0x608 [ 21.166869] kasan_report+0xdc/0x128 [ 21.166915] kasan_check_range+0x100/0x1a8 [ 21.167454] __kasan_check_write+0x20/0x30 [ 21.167534] kasan_atomics_helper+0x1644/0x4858 [ 21.167863] kasan_atomics+0x198/0x2e0 [ 21.168034] kunit_try_run_case+0x170/0x3f0 [ 21.168148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.168317] kthread+0x328/0x630 [ 21.168413] ret_from_fork+0x10/0x20 [ 21.168474] [ 21.168496] Allocated by task 265: [ 21.168526] kasan_save_stack+0x3c/0x68 [ 21.168568] kasan_save_track+0x20/0x40 [ 21.168618] kasan_save_alloc_info+0x40/0x58 [ 21.168660] __kasan_kmalloc+0xd4/0xd8 [ 21.168703] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.168752] kasan_atomics+0xb8/0x2e0 [ 21.168789] kunit_try_run_case+0x170/0x3f0 [ 21.168835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.168884] kthread+0x328/0x630 [ 21.168918] ret_from_fork+0x10/0x20 [ 21.168965] [ 21.168995] The buggy address belongs to the object at fff00000c56d1100 [ 21.168995] which belongs to the cache kmalloc-64 of size 64 [ 21.169055] The buggy address is located 0 bytes to the right of [ 21.169055] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.169121] [ 21.169142] The buggy address belongs to the physical page: [ 21.169174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.169236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.169285] page_type: f5(slab) [ 21.169322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.169374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.169859] page dumped because: kasan: bad access detected [ 21.169960] [ 21.170136] Memory state around the buggy address: [ 21.170175] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.170406] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.170497] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.170631] ^ [ 21.170760] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.170805] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.170845] ================================================================== [ 21.148937] ================================================================== [ 21.148995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.149051] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.149102] [ 21.149130] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.149222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.149259] Hardware name: linux,dummy-virt (DT) [ 21.149289] Call trace: [ 21.149324] show_stack+0x20/0x38 (C) [ 21.149372] dump_stack_lvl+0x8c/0xd0 [ 21.149419] print_report+0x118/0x608 [ 21.149492] kasan_report+0xdc/0x128 [ 21.149541] kasan_check_range+0x100/0x1a8 [ 21.149658] __kasan_check_write+0x20/0x30 [ 21.149741] kasan_atomics_helper+0x154c/0x4858 [ 21.149791] kasan_atomics+0x198/0x2e0 [ 21.149837] kunit_try_run_case+0x170/0x3f0 [ 21.149886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.149973] kthread+0x328/0x630 [ 21.150091] ret_from_fork+0x10/0x20 [ 21.150249] [ 21.150282] Allocated by task 265: [ 21.150386] kasan_save_stack+0x3c/0x68 [ 21.150566] kasan_save_track+0x20/0x40 [ 21.150607] kasan_save_alloc_info+0x40/0x58 [ 21.150650] __kasan_kmalloc+0xd4/0xd8 [ 21.150688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.150771] kasan_atomics+0xb8/0x2e0 [ 21.150812] kunit_try_run_case+0x170/0x3f0 [ 21.150887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.150933] kthread+0x328/0x630 [ 21.150968] ret_from_fork+0x10/0x20 [ 21.151006] [ 21.151093] The buggy address belongs to the object at fff00000c56d1100 [ 21.151093] which belongs to the cache kmalloc-64 of size 64 [ 21.151188] The buggy address is located 0 bytes to the right of [ 21.151188] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.151344] [ 21.151395] The buggy address belongs to the physical page: [ 21.151479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.151785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.151905] page_type: f5(slab) [ 21.151984] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.152036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.152257] page dumped because: kasan: bad access detected [ 21.152493] [ 21.152672] Memory state around the buggy address: [ 21.152756] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.152987] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.153302] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.153351] ^ [ 21.153386] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153731] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153930] ================================================================== [ 21.128451] ================================================================== [ 21.128499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.128545] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.128597] [ 21.128626] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.128707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.128734] Hardware name: linux,dummy-virt (DT) [ 21.128765] Call trace: [ 21.128788] show_stack+0x20/0x38 (C) [ 21.128837] dump_stack_lvl+0x8c/0xd0 [ 21.128883] print_report+0x118/0x608 [ 21.128931] kasan_report+0xdc/0x128 [ 21.128976] kasan_check_range+0x100/0x1a8 [ 21.129026] __kasan_check_write+0x20/0x30 [ 21.129072] kasan_atomics_helper+0x1414/0x4858 [ 21.130811] kasan_atomics+0x198/0x2e0 [ 21.130915] kunit_try_run_case+0x170/0x3f0 [ 21.131114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.131304] kthread+0x328/0x630 [ 21.131354] ret_from_fork+0x10/0x20 [ 21.131402] [ 21.131433] Allocated by task 265: [ 21.131473] kasan_save_stack+0x3c/0x68 [ 21.131525] kasan_save_track+0x20/0x40 [ 21.131575] kasan_save_alloc_info+0x40/0x58 [ 21.131626] __kasan_kmalloc+0xd4/0xd8 [ 21.131674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.131715] kasan_atomics+0xb8/0x2e0 [ 21.131752] kunit_try_run_case+0x170/0x3f0 [ 21.131793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.131839] kthread+0x328/0x630 [ 21.131881] ret_from_fork+0x10/0x20 [ 21.131926] [ 21.131954] The buggy address belongs to the object at fff00000c56d1100 [ 21.131954] which belongs to the cache kmalloc-64 of size 64 [ 21.132015] The buggy address is located 0 bytes to the right of [ 21.132015] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.132079] [ 21.132109] The buggy address belongs to the physical page: [ 21.132165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.132240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.132306] page_type: f5(slab) [ 21.132351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.132411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.132454] page dumped because: kasan: bad access detected [ 21.132488] [ 21.132529] Memory state around the buggy address: [ 21.132564] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.132609] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.132668] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.132710] ^ [ 21.132752] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.132805] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.132843] ================================================================== [ 20.963423] ================================================================== [ 20.963487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.963540] Write of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.964022] [ 20.964224] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.964321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.964349] Hardware name: linux,dummy-virt (DT) [ 20.964415] Call trace: [ 20.964442] show_stack+0x20/0x38 (C) [ 20.964665] dump_stack_lvl+0x8c/0xd0 [ 20.964800] print_report+0x118/0x608 [ 20.964852] kasan_report+0xdc/0x128 [ 20.964900] kasan_check_range+0x100/0x1a8 [ 20.964955] __kasan_check_write+0x20/0x30 [ 20.965043] kasan_atomics_helper+0xd3c/0x4858 [ 20.965096] kasan_atomics+0x198/0x2e0 [ 20.965156] kunit_try_run_case+0x170/0x3f0 [ 20.965226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.965280] kthread+0x328/0x630 [ 20.965324] ret_from_fork+0x10/0x20 [ 20.965371] [ 20.965392] Allocated by task 265: [ 20.965423] kasan_save_stack+0x3c/0x68 [ 20.965715] kasan_save_track+0x20/0x40 [ 20.966277] kasan_save_alloc_info+0x40/0x58 [ 20.966350] __kasan_kmalloc+0xd4/0xd8 [ 20.966391] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.966442] kasan_atomics+0xb8/0x2e0 [ 20.966626] kunit_try_run_case+0x170/0x3f0 [ 20.966670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.966717] kthread+0x328/0x630 [ 20.966895] ret_from_fork+0x10/0x20 [ 20.967097] [ 20.967368] The buggy address belongs to the object at fff00000c56d1100 [ 20.967368] which belongs to the cache kmalloc-64 of size 64 [ 20.967483] The buggy address is located 0 bytes to the right of [ 20.967483] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.967853] [ 20.968040] The buggy address belongs to the physical page: [ 20.968309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.968505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.968924] page_type: f5(slab) [ 20.969309] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.969395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.969440] page dumped because: kasan: bad access detected [ 20.969736] [ 20.969879] Memory state around the buggy address: [ 20.970115] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.970245] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.970299] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.970508] ^ [ 20.970770] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.971145] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.971329] ================================================================== [ 21.122891] ================================================================== [ 21.122938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.122988] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.123039] [ 21.123070] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.123148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.123177] Hardware name: linux,dummy-virt (DT) [ 21.123225] Call trace: [ 21.123251] show_stack+0x20/0x38 (C) [ 21.123299] dump_stack_lvl+0x8c/0xd0 [ 21.123347] print_report+0x118/0x608 [ 21.123394] kasan_report+0xdc/0x128 [ 21.123441] __asan_report_load8_noabort+0x20/0x30 [ 21.123491] kasan_atomics_helper+0x3f04/0x4858 [ 21.123540] kasan_atomics+0x198/0x2e0 [ 21.123587] kunit_try_run_case+0x170/0x3f0 [ 21.123636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.123688] kthread+0x328/0x630 [ 21.123732] ret_from_fork+0x10/0x20 [ 21.123780] [ 21.123800] Allocated by task 265: [ 21.123829] kasan_save_stack+0x3c/0x68 [ 21.123870] kasan_save_track+0x20/0x40 [ 21.123909] kasan_save_alloc_info+0x40/0x58 [ 21.123951] __kasan_kmalloc+0xd4/0xd8 [ 21.123988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.124029] kasan_atomics+0xb8/0x2e0 [ 21.124065] kunit_try_run_case+0x170/0x3f0 [ 21.124105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.124148] kthread+0x328/0x630 [ 21.124181] ret_from_fork+0x10/0x20 [ 21.127436] [ 21.127460] The buggy address belongs to the object at fff00000c56d1100 [ 21.127460] which belongs to the cache kmalloc-64 of size 64 [ 21.127530] The buggy address is located 0 bytes to the right of [ 21.127530] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.127596] [ 21.127617] The buggy address belongs to the physical page: [ 21.127649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.127704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.127754] page_type: f5(slab) [ 21.127793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.127845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.127888] page dumped because: kasan: bad access detected [ 21.127922] [ 21.127942] Memory state around the buggy address: [ 21.127976] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.128020] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.128065] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.128105] ^ [ 21.128141] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128183] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128237] ================================================================== [ 21.133080] ================================================================== [ 21.133128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.133175] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.133977] [ 21.134569] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.135126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.135202] Hardware name: linux,dummy-virt (DT) [ 21.135483] Call trace: [ 21.135713] show_stack+0x20/0x38 (C) [ 21.136116] dump_stack_lvl+0x8c/0xd0 [ 21.136623] print_report+0x118/0x608 [ 21.136710] kasan_report+0xdc/0x128 [ 21.136786] kasan_check_range+0x100/0x1a8 [ 21.136938] __kasan_check_write+0x20/0x30 [ 21.137342] kasan_atomics_helper+0x147c/0x4858 [ 21.137527] kasan_atomics+0x198/0x2e0 [ 21.137624] kunit_try_run_case+0x170/0x3f0 [ 21.137802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.138145] kthread+0x328/0x630 [ 21.138376] ret_from_fork+0x10/0x20 [ 21.139136] [ 21.139213] Allocated by task 265: [ 21.139265] kasan_save_stack+0x3c/0x68 [ 21.139383] kasan_save_track+0x20/0x40 [ 21.139634] kasan_save_alloc_info+0x40/0x58 [ 21.139989] __kasan_kmalloc+0xd4/0xd8 [ 21.140150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.140355] kasan_atomics+0xb8/0x2e0 [ 21.140862] kunit_try_run_case+0x170/0x3f0 [ 21.141251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.141912] kthread+0x328/0x630 [ 21.142031] ret_from_fork+0x10/0x20 [ 21.142131] [ 21.142444] The buggy address belongs to the object at fff00000c56d1100 [ 21.142444] which belongs to the cache kmalloc-64 of size 64 [ 21.142699] The buggy address is located 0 bytes to the right of [ 21.142699] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.142877] [ 21.142908] The buggy address belongs to the physical page: [ 21.142942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.143053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.143451] page_type: f5(slab) [ 21.143571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.143964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.144233] page dumped because: kasan: bad access detected [ 21.144653] [ 21.144680] Memory state around the buggy address: [ 21.145048] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.145244] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.145489] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.145581] ^ [ 21.145619] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.145663] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.145702] ================================================================== [ 21.085214] ================================================================== [ 21.085269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.085321] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.085622] [ 21.085719] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.085806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.085835] Hardware name: linux,dummy-virt (DT) [ 21.086045] Call trace: [ 21.086317] show_stack+0x20/0x38 (C) [ 21.086600] dump_stack_lvl+0x8c/0xd0 [ 21.086704] print_report+0x118/0x608 [ 21.086892] kasan_report+0xdc/0x128 [ 21.086954] kasan_check_range+0x100/0x1a8 [ 21.087373] __kasan_check_write+0x20/0x30 [ 21.087625] kasan_atomics_helper+0x1190/0x4858 [ 21.087842] kasan_atomics+0x198/0x2e0 [ 21.087933] kunit_try_run_case+0x170/0x3f0 [ 21.088099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.088179] kthread+0x328/0x630 [ 21.088424] ret_from_fork+0x10/0x20 [ 21.088849] [ 21.089035] Allocated by task 265: [ 21.089189] kasan_save_stack+0x3c/0x68 [ 21.089348] kasan_save_track+0x20/0x40 [ 21.089421] kasan_save_alloc_info+0x40/0x58 [ 21.089508] __kasan_kmalloc+0xd4/0xd8 [ 21.089929] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.090232] kasan_atomics+0xb8/0x2e0 [ 21.090594] kunit_try_run_case+0x170/0x3f0 [ 21.090878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.091138] kthread+0x328/0x630 [ 21.091253] ret_from_fork+0x10/0x20 [ 21.091575] [ 21.091663] The buggy address belongs to the object at fff00000c56d1100 [ 21.091663] which belongs to the cache kmalloc-64 of size 64 [ 21.092215] The buggy address is located 0 bytes to the right of [ 21.092215] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.092330] [ 21.092374] The buggy address belongs to the physical page: [ 21.092814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.092898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.093208] page_type: f5(slab) [ 21.093491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.093581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.093884] page dumped because: kasan: bad access detected [ 21.094106] [ 21.094395] Memory state around the buggy address: [ 21.094442] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.094846] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.095047] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.095125] ^ [ 21.095296] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.095541] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.095597] ================================================================== [ 20.871017] ================================================================== [ 20.871186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.871682] Call trace: [ 20.872573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.873333] __kasan_kmalloc+0xd4/0xd8 [ 20.874449] The buggy address is located 0 bytes to the right of [ 20.874449] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.875272] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.876982] Call trace: [ 20.878629] [ 20.878678] Allocated by task 265: [ 20.878708] kasan_save_stack+0x3c/0x68 [ 20.878752] kasan_save_track+0x20/0x40 [ 20.878793] kasan_save_alloc_info+0x40/0x58 [ 20.879041] __kasan_kmalloc+0xd4/0xd8 [ 20.879091] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.879665] kasan_atomics+0xb8/0x2e0 [ 20.879809] kunit_try_run_case+0x170/0x3f0 [ 20.879925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.880025] kthread+0x328/0x630 [ 20.880061] ret_from_fork+0x10/0x20 [ 20.880144] [ 20.880409] The buggy address belongs to the object at fff00000c56d1100 [ 20.880409] which belongs to the cache kmalloc-64 of size 64 [ 20.880488] The buggy address is located 0 bytes to the right of [ 20.880488] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.880670] [ 20.880868] The buggy address belongs to the physical page: [ 20.880954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.881059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.881182] page_type: f5(slab) [ 20.881291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.881418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.881569] page dumped because: kasan: bad access detected [ 20.881785] [ 20.881867] Memory state around the buggy address: [ 20.881921] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.881983] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.882028] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.882384] ^ [ 20.882448] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.882494] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.882533] ================================================================== [ 21.176920] ================================================================== [ 21.176968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.177017] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.177067] [ 21.177124] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.177219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.177248] Hardware name: linux,dummy-virt (DT) [ 21.177279] Call trace: [ 21.177304] show_stack+0x20/0x38 (C) [ 21.177351] dump_stack_lvl+0x8c/0xd0 [ 21.177400] print_report+0x118/0x608 [ 21.177594] kasan_report+0xdc/0x128 [ 21.177872] kasan_check_range+0x100/0x1a8 [ 21.177990] __kasan_check_write+0x20/0x30 [ 21.178039] kasan_atomics_helper+0x16d0/0x4858 [ 21.178113] kasan_atomics+0x198/0x2e0 [ 21.178159] kunit_try_run_case+0x170/0x3f0 [ 21.178219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.178422] kthread+0x328/0x630 [ 21.178563] ret_from_fork+0x10/0x20 [ 21.178720] [ 21.179019] Allocated by task 265: [ 21.179148] kasan_save_stack+0x3c/0x68 [ 21.179256] kasan_save_track+0x20/0x40 [ 21.179320] kasan_save_alloc_info+0x40/0x58 [ 21.179403] __kasan_kmalloc+0xd4/0xd8 [ 21.179501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.179615] kasan_atomics+0xb8/0x2e0 [ 21.179693] kunit_try_run_case+0x170/0x3f0 [ 21.179788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.179835] kthread+0x328/0x630 [ 21.179918] ret_from_fork+0x10/0x20 [ 21.180495] [ 21.180616] The buggy address belongs to the object at fff00000c56d1100 [ 21.180616] which belongs to the cache kmalloc-64 of size 64 [ 21.180805] The buggy address is located 0 bytes to the right of [ 21.180805] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.180900] [ 21.180960] The buggy address belongs to the physical page: [ 21.180994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.181210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.181410] page_type: f5(slab) [ 21.181573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.181920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.182044] page dumped because: kasan: bad access detected [ 21.182307] [ 21.182332] Memory state around the buggy address: [ 21.182376] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.182422] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.182471] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.182634] ^ [ 21.182734] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183051] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183267] ================================================================== [ 21.183628] ================================================================== [ 21.183700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.183764] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.183826] [ 21.183856] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.183948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.183989] Hardware name: linux,dummy-virt (DT) [ 21.184027] Call trace: [ 21.184099] show_stack+0x20/0x38 (C) [ 21.184175] dump_stack_lvl+0x8c/0xd0 [ 21.184236] print_report+0x118/0x608 [ 21.184283] kasan_report+0xdc/0x128 [ 21.184331] __asan_report_load8_noabort+0x20/0x30 [ 21.184380] kasan_atomics_helper+0x3e10/0x4858 [ 21.184428] kasan_atomics+0x198/0x2e0 [ 21.184476] kunit_try_run_case+0x170/0x3f0 [ 21.184523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.184577] kthread+0x328/0x630 [ 21.184626] ret_from_fork+0x10/0x20 [ 21.184683] [ 21.184704] Allocated by task 265: [ 21.184734] kasan_save_stack+0x3c/0x68 [ 21.184784] kasan_save_track+0x20/0x40 [ 21.184825] kasan_save_alloc_info+0x40/0x58 [ 21.184867] __kasan_kmalloc+0xd4/0xd8 [ 21.184905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.184946] kasan_atomics+0xb8/0x2e0 [ 21.184990] kunit_try_run_case+0x170/0x3f0 [ 21.185038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185082] kthread+0x328/0x630 [ 21.185126] ret_from_fork+0x10/0x20 [ 21.185162] [ 21.185182] The buggy address belongs to the object at fff00000c56d1100 [ 21.185182] which belongs to the cache kmalloc-64 of size 64 [ 21.185734] The buggy address is located 0 bytes to the right of [ 21.185734] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.185827] [ 21.185848] The buggy address belongs to the physical page: [ 21.186292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.186364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.186414] page_type: f5(slab) [ 21.186595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.186648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.186692] page dumped because: kasan: bad access detected [ 21.186847] [ 21.186876] Memory state around the buggy address: [ 21.186931] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.187000] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.187051] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.187122] ^ [ 21.187204] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187252] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187426] ================================================================== [ 21.000134] ================================================================== [ 21.000545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.000942] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.001041] [ 21.001076] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.001517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.001594] Hardware name: linux,dummy-virt (DT) [ 21.001888] Call trace: [ 21.001965] show_stack+0x20/0x38 (C) [ 21.002159] dump_stack_lvl+0x8c/0xd0 [ 21.002434] print_report+0x118/0x608 [ 21.002560] kasan_report+0xdc/0x128 [ 21.002815] kasan_check_range+0x100/0x1a8 [ 21.003097] __kasan_check_write+0x20/0x30 [ 21.003303] kasan_atomics_helper+0xe44/0x4858 [ 21.003389] kasan_atomics+0x198/0x2e0 [ 21.003447] kunit_try_run_case+0x170/0x3f0 [ 21.003494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.004061] kthread+0x328/0x630 [ 21.004173] ret_from_fork+0x10/0x20 [ 21.004753] [ 21.004781] Allocated by task 265: [ 21.004830] kasan_save_stack+0x3c/0x68 [ 21.005066] kasan_save_track+0x20/0x40 [ 21.005142] kasan_save_alloc_info+0x40/0x58 [ 21.005447] __kasan_kmalloc+0xd4/0xd8 [ 21.005737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.005998] kasan_atomics+0xb8/0x2e0 [ 21.006053] kunit_try_run_case+0x170/0x3f0 [ 21.006457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.006722] kthread+0x328/0x630 [ 21.006881] ret_from_fork+0x10/0x20 [ 21.006926] [ 21.007366] The buggy address belongs to the object at fff00000c56d1100 [ 21.007366] which belongs to the cache kmalloc-64 of size 64 [ 21.007723] The buggy address is located 0 bytes to the right of [ 21.007723] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.007797] [ 21.007819] The buggy address belongs to the physical page: [ 21.008166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.008415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.008686] page_type: f5(slab) [ 21.008821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.008876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.009105] page dumped because: kasan: bad access detected [ 21.009453] [ 21.009627] Memory state around the buggy address: [ 21.009756] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.009915] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.009964] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.010220] ^ [ 21.010467] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.010946] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.011257] ================================================================== [ 20.951317] ================================================================== [ 20.951371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.951553] Read of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.951715] [ 20.951861] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.952344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.952528] Hardware name: linux,dummy-virt (DT) [ 20.952571] Call trace: [ 20.952630] show_stack+0x20/0x38 (C) [ 20.952811] dump_stack_lvl+0x8c/0xd0 [ 20.952930] print_report+0x118/0x608 [ 20.952984] kasan_report+0xdc/0x128 [ 20.953091] __asan_report_load4_noabort+0x20/0x30 [ 20.953143] kasan_atomics_helper+0x3dd8/0x4858 [ 20.953251] kasan_atomics+0x198/0x2e0 [ 20.953304] kunit_try_run_case+0x170/0x3f0 [ 20.953503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.953978] kthread+0x328/0x630 [ 20.954270] ret_from_fork+0x10/0x20 [ 20.954453] [ 20.954544] Allocated by task 265: [ 20.954969] kasan_save_stack+0x3c/0x68 [ 20.955103] kasan_save_track+0x20/0x40 [ 20.955213] kasan_save_alloc_info+0x40/0x58 [ 20.955623] __kasan_kmalloc+0xd4/0xd8 [ 20.955803] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.955933] kasan_atomics+0xb8/0x2e0 [ 20.956102] kunit_try_run_case+0x170/0x3f0 [ 20.956350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.956445] kthread+0x328/0x630 [ 20.956485] ret_from_fork+0x10/0x20 [ 20.956683] [ 20.956771] The buggy address belongs to the object at fff00000c56d1100 [ 20.956771] which belongs to the cache kmalloc-64 of size 64 [ 20.957132] The buggy address is located 0 bytes to the right of [ 20.957132] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.957389] [ 20.957446] The buggy address belongs to the physical page: [ 20.957646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.957925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.958160] page_type: f5(slab) [ 20.958431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.958693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.958863] page dumped because: kasan: bad access detected [ 20.959356] [ 20.959435] Memory state around the buggy address: [ 20.959481] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.959537] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.959830] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.960285] ^ [ 20.960539] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.960769] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.960858] ================================================================== [ 21.097077] ================================================================== [ 21.097213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.097439] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.097877] [ 21.098135] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.098449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.098519] Hardware name: linux,dummy-virt (DT) [ 21.098553] Call trace: [ 21.098584] show_stack+0x20/0x38 (C) [ 21.098639] dump_stack_lvl+0x8c/0xd0 [ 21.098686] print_report+0x118/0x608 [ 21.099072] kasan_report+0xdc/0x128 [ 21.099345] kasan_check_range+0x100/0x1a8 [ 21.099530] __kasan_check_write+0x20/0x30 [ 21.099777] kasan_atomics_helper+0x11f8/0x4858 [ 21.100051] kasan_atomics+0x198/0x2e0 [ 21.100345] kunit_try_run_case+0x170/0x3f0 [ 21.100552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.100803] kthread+0x328/0x630 [ 21.100874] ret_from_fork+0x10/0x20 [ 21.100923] [ 21.100993] Allocated by task 265: [ 21.101227] kasan_save_stack+0x3c/0x68 [ 21.101703] kasan_save_track+0x20/0x40 [ 21.101769] kasan_save_alloc_info+0x40/0x58 [ 21.101814] __kasan_kmalloc+0xd4/0xd8 [ 21.101852] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.101894] kasan_atomics+0xb8/0x2e0 [ 21.101931] kunit_try_run_case+0x170/0x3f0 [ 21.101972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.102016] kthread+0x328/0x630 [ 21.102050] ret_from_fork+0x10/0x20 [ 21.102088] [ 21.102111] The buggy address belongs to the object at fff00000c56d1100 [ 21.102111] which belongs to the cache kmalloc-64 of size 64 [ 21.102172] The buggy address is located 0 bytes to the right of [ 21.102172] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.102249] [ 21.102271] The buggy address belongs to the physical page: [ 21.102304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.102357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.102408] page_type: f5(slab) [ 21.102451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.102503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.102546] page dumped because: kasan: bad access detected [ 21.102580] [ 21.102600] Memory state around the buggy address: [ 21.102635] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.102679] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.102724] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.102764] ^ [ 21.102800] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.102841] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.102881] ================================================================== [ 21.058586] ================================================================== [ 21.058647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.058700] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.058849] [ 21.058983] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.059168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.059497] Hardware name: linux,dummy-virt (DT) [ 21.059681] Call trace: [ 21.059887] show_stack+0x20/0x38 (C) [ 21.060159] dump_stack_lvl+0x8c/0xd0 [ 21.060248] print_report+0x118/0x608 [ 21.060671] kasan_report+0xdc/0x128 [ 21.060914] kasan_check_range+0x100/0x1a8 [ 21.060988] __kasan_check_write+0x20/0x30 [ 21.061375] kasan_atomics_helper+0x1058/0x4858 [ 21.061637] kasan_atomics+0x198/0x2e0 [ 21.061740] kunit_try_run_case+0x170/0x3f0 [ 21.061919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.062156] kthread+0x328/0x630 [ 21.062237] ret_from_fork+0x10/0x20 [ 21.062607] [ 21.062653] Allocated by task 265: [ 21.062758] kasan_save_stack+0x3c/0x68 [ 21.062821] kasan_save_track+0x20/0x40 [ 21.062862] kasan_save_alloc_info+0x40/0x58 [ 21.062910] __kasan_kmalloc+0xd4/0xd8 [ 21.062956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.062998] kasan_atomics+0xb8/0x2e0 [ 21.063042] kunit_try_run_case+0x170/0x3f0 [ 21.063082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.063134] kthread+0x328/0x630 [ 21.063170] ret_from_fork+0x10/0x20 [ 21.063227] [ 21.063249] The buggy address belongs to the object at fff00000c56d1100 [ 21.063249] which belongs to the cache kmalloc-64 of size 64 [ 21.063324] The buggy address is located 0 bytes to the right of [ 21.063324] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.063400] [ 21.063423] The buggy address belongs to the physical page: [ 21.063471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.063534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.063584] page_type: f5(slab) [ 21.063633] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.063708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.063751] page dumped because: kasan: bad access detected [ 21.063785] [ 21.063814] Memory state around the buggy address: [ 21.063853] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.063921] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.063967] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.064007] ^ [ 21.064050] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.064104] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.064142] ================================================================== [ 21.114840] ================================================================== [ 21.114892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.114942] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.114993] [ 21.115064] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.115148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.115175] Hardware name: linux,dummy-virt (DT) [ 21.115506] Call trace: [ 21.115547] show_stack+0x20/0x38 (C) [ 21.115603] dump_stack_lvl+0x8c/0xd0 [ 21.115650] print_report+0x118/0x608 [ 21.115699] kasan_report+0xdc/0x128 [ 21.115745] kasan_check_range+0x100/0x1a8 [ 21.115795] __kasan_check_write+0x20/0x30 [ 21.115841] kasan_atomics_helper+0x1384/0x4858 [ 21.115889] kasan_atomics+0x198/0x2e0 [ 21.115936] kunit_try_run_case+0x170/0x3f0 [ 21.116020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.116100] kthread+0x328/0x630 [ 21.116145] ret_from_fork+0x10/0x20 [ 21.116617] [ 21.116655] Allocated by task 265: [ 21.116688] kasan_save_stack+0x3c/0x68 [ 21.116733] kasan_save_track+0x20/0x40 [ 21.117361] kasan_save_alloc_info+0x40/0x58 [ 21.117431] __kasan_kmalloc+0xd4/0xd8 [ 21.117627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.117808] kasan_atomics+0xb8/0x2e0 [ 21.117905] kunit_try_run_case+0x170/0x3f0 [ 21.118416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.118514] kthread+0x328/0x630 [ 21.118672] ret_from_fork+0x10/0x20 [ 21.118874] [ 21.118932] The buggy address belongs to the object at fff00000c56d1100 [ 21.118932] which belongs to the cache kmalloc-64 of size 64 [ 21.119001] The buggy address is located 0 bytes to the right of [ 21.119001] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.119273] [ 21.119424] The buggy address belongs to the physical page: [ 21.119757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.119819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.120147] page_type: f5(slab) [ 21.120542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.122260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.122313] page dumped because: kasan: bad access detected [ 21.122349] [ 21.122369] Memory state around the buggy address: [ 21.122404] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.122456] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.122501] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.122542] ^ [ 21.122577] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.122621] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.122659] ================================================================== [ 20.982783] ================================================================== [ 20.982929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.983128] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.983208] [ 20.983560] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.983679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.983713] Hardware name: linux,dummy-virt (DT) [ 20.983746] Call trace: [ 20.983770] show_stack+0x20/0x38 (C) [ 20.983969] dump_stack_lvl+0x8c/0xd0 [ 20.984032] print_report+0x118/0x608 [ 20.984082] kasan_report+0xdc/0x128 [ 20.984487] kasan_check_range+0x100/0x1a8 [ 20.984630] __kasan_check_read+0x20/0x30 [ 20.984764] kasan_atomics_helper+0xdd4/0x4858 [ 20.984868] kasan_atomics+0x198/0x2e0 [ 20.984922] kunit_try_run_case+0x170/0x3f0 [ 20.984972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.985026] kthread+0x328/0x630 [ 20.985069] ret_from_fork+0x10/0x20 [ 20.985343] [ 20.985918] Allocated by task 265: [ 20.985970] kasan_save_stack+0x3c/0x68 [ 20.986266] kasan_save_track+0x20/0x40 [ 20.986326] kasan_save_alloc_info+0x40/0x58 [ 20.986368] __kasan_kmalloc+0xd4/0xd8 [ 20.986408] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.986613] kasan_atomics+0xb8/0x2e0 [ 20.986841] kunit_try_run_case+0x170/0x3f0 [ 20.987624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.987775] kthread+0x328/0x630 [ 20.988707] ret_from_fork+0x10/0x20 [ 20.989008] [ 20.989170] The buggy address belongs to the object at fff00000c56d1100 [ 20.989170] which belongs to the cache kmalloc-64 of size 64 [ 20.989414] The buggy address is located 0 bytes to the right of [ 20.989414] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.989862] [ 20.990040] The buggy address belongs to the physical page: [ 20.990149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.990367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.990733] page_type: f5(slab) [ 20.990825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.991011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.991094] page dumped because: kasan: bad access detected [ 20.991139] [ 20.991168] Memory state around the buggy address: [ 20.991227] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.991279] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.991323] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.991361] ^ [ 20.991398] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.991442] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.991482] ================================================================== [ 20.887880] ================================================================== [ 20.887970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.888130] Write of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.888242] [ 20.888300] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.888411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.888517] Hardware name: linux,dummy-virt (DT) [ 20.888553] Call trace: [ 20.888613] show_stack+0x20/0x38 (C) [ 20.888938] kasan_report+0xdc/0x128 [ 20.889286] kasan_atomics_helper+0xad4/0x4858 [ 20.890489] kasan_save_alloc_info+0x40/0x58 [ 20.890624] __kasan_kmalloc+0xd4/0xd8 [ 20.890785] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.890850] kasan_atomics+0xb8/0x2e0 [ 20.890887] kunit_try_run_case+0x170/0x3f0 [ 20.891098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.891349] kthread+0x328/0x630 [ 20.891515] ret_from_fork+0x10/0x20 [ 20.891555] [ 20.891687] The buggy address belongs to the object at fff00000c56d1100 [ 20.891687] which belongs to the cache kmalloc-64 of size 64 [ 20.891894] The buggy address is located 0 bytes to the right of [ 20.891894] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.892238] [ 20.892281] The buggy address belongs to the physical page: [ 20.892331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.892388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.892439] page_type: f5(slab) [ 20.892488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.892542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.892814] page dumped because: kasan: bad access detected [ 20.893085] [ 20.893126] Memory state around the buggy address: [ 20.893185] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.893500] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.893824] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.893871] ^ [ 20.894164] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.894347] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.896561] Read of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.897057] kasan_atomics_helper+0x3dcc/0x4858 [ 20.898626] kasan_save_alloc_info+0x40/0x58 [ 20.898711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.899007] kasan_atomics+0xb8/0x2e0 [ 20.899791] [ 20.900508] [ 20.901039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.901516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.901704] [ 20.902054] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.902553] ^ [ 20.902912] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.904879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.907113] kasan_save_alloc_info+0x40/0x58 [ 20.907388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.907470] kasan_atomics+0xb8/0x2e0 [ 20.907674] kunit_try_run_case+0x170/0x3f0 [ 20.907913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.908728] [ 20.909162] [ 20.909425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.910257] page dumped because: kasan: bad access detected [ 20.910676] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.911031] ^ [ 20.911554] ================================================================== [ 20.752721] ================================================================== [ 20.754706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 20.754864] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.755030] Call trace: [ 20.755423] kasan_atomics+0x198/0x2e0 [ 20.755723] kasan_save_stack+0x3c/0x68 [ 20.755888] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.757017] [ 20.765721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.766826] page dumped because: kasan: bad access detected [ 20.767906] Call trace: [ 20.768857] kasan_save_stack+0x3c/0x68 [ 20.769893] The buggy address is located 0 bytes to the right of [ 20.769893] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.771019] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.772574] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.776395] kasan_atomics+0xb8/0x2e0 [ 20.777803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.778455] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.780148] kasan_atomics_helper+0x54c/0x4858 [ 20.782047] The buggy address is located 0 bytes to the right of [ 20.782047] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.783785] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.785441] ================================================================== [ 20.973047] ================================================================== [ 20.973172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.973239] Read of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.973291] [ 20.973334] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.973426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.973459] Hardware name: linux,dummy-virt (DT) [ 20.973584] Call trace: [ 20.973786] show_stack+0x20/0x38 (C) [ 20.974100] dump_stack_lvl+0x8c/0xd0 [ 20.974258] print_report+0x118/0x608 [ 20.974359] kasan_report+0xdc/0x128 [ 20.974416] __asan_report_load4_noabort+0x20/0x30 [ 20.974472] kasan_atomics_helper+0x3e04/0x4858 [ 20.974523] kasan_atomics+0x198/0x2e0 [ 20.975157] kunit_try_run_case+0x170/0x3f0 [ 20.975341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.975521] kthread+0x328/0x630 [ 20.975637] ret_from_fork+0x10/0x20 [ 20.976217] [ 20.976723] Allocated by task 265: [ 20.977123] kasan_save_stack+0x3c/0x68 [ 20.977219] kasan_save_track+0x20/0x40 [ 20.977397] kasan_save_alloc_info+0x40/0x58 [ 20.977538] __kasan_kmalloc+0xd4/0xd8 [ 20.977580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.977743] kasan_atomics+0xb8/0x2e0 [ 20.978026] kunit_try_run_case+0x170/0x3f0 [ 20.978103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.978339] kthread+0x328/0x630 [ 20.978531] ret_from_fork+0x10/0x20 [ 20.978612] [ 20.978673] The buggy address belongs to the object at fff00000c56d1100 [ 20.978673] which belongs to the cache kmalloc-64 of size 64 [ 20.978982] The buggy address is located 0 bytes to the right of [ 20.978982] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.979323] [ 20.979395] The buggy address belongs to the physical page: [ 20.979523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.979596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.979650] page_type: f5(slab) [ 20.979692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.979744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.979812] page dumped because: kasan: bad access detected [ 20.979855] [ 20.979884] Memory state around the buggy address: [ 20.979942] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.979989] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.980039] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.980079] ^ [ 20.980122] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.980167] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.980218] ================================================================== [ 20.883133] ================================================================== [ 20.883266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.883318] Write of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 20.883370] [ 20.883402] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.883484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.883623] Hardware name: linux,dummy-virt (DT) [ 20.883738] Call trace: [ 20.883786] show_stack+0x20/0x38 (C) [ 20.883841] dump_stack_lvl+0x8c/0xd0 [ 20.883889] print_report+0x118/0x608 [ 20.884026] kasan_report+0xdc/0x128 [ 20.884230] kasan_check_range+0x100/0x1a8 [ 20.884292] __kasan_check_write+0x20/0x30 [ 20.884370] kasan_atomics_helper+0xa6c/0x4858 [ 20.884422] kasan_atomics+0x198/0x2e0 [ 20.884469] kunit_try_run_case+0x170/0x3f0 [ 20.884528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.884583] kthread+0x328/0x630 [ 20.884627] ret_from_fork+0x10/0x20 [ 20.884684] [ 20.884705] Allocated by task 265: [ 20.884735] kasan_save_stack+0x3c/0x68 [ 20.884779] kasan_save_track+0x20/0x40 [ 20.884819] kasan_save_alloc_info+0x40/0x58 [ 20.884860] __kasan_kmalloc+0xd4/0xd8 [ 20.884913] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.884956] kasan_atomics+0xb8/0x2e0 [ 20.884994] kunit_try_run_case+0x170/0x3f0 [ 20.885034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.885096] kthread+0x328/0x630 [ 20.885131] ret_from_fork+0x10/0x20 [ 20.885169] [ 20.885202] The buggy address belongs to the object at fff00000c56d1100 [ 20.885202] which belongs to the cache kmalloc-64 of size 64 [ 20.885554] The buggy address is located 0 bytes to the right of [ 20.885554] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 20.885885] [ 20.885913] The buggy address belongs to the physical page: [ 20.886014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 20.886095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.886243] page_type: f5(slab) [ 20.886282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.886372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.886486] page dumped because: kasan: bad access detected [ 20.886520] [ 20.886580] Memory state around the buggy address: [ 20.886696] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.886913] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.886959] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.887029] ^ [ 20.887264] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.887463] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.887592] ================================================================== [ 21.159782] ================================================================== [ 21.159850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.159900] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.159960] [ 21.159999] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.160078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.160106] Hardware name: linux,dummy-virt (DT) [ 21.160138] Call trace: [ 21.160177] show_stack+0x20/0x38 (C) [ 21.160453] dump_stack_lvl+0x8c/0xd0 [ 21.160528] print_report+0x118/0x608 [ 21.160761] kasan_report+0xdc/0x128 [ 21.160823] __asan_report_load8_noabort+0x20/0x30 [ 21.160902] kasan_atomics_helper+0x3db0/0x4858 [ 21.160953] kasan_atomics+0x198/0x2e0 [ 21.161000] kunit_try_run_case+0x170/0x3f0 [ 21.161049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.161103] kthread+0x328/0x630 [ 21.161147] ret_from_fork+0x10/0x20 [ 21.161357] [ 21.161430] Allocated by task 265: [ 21.161488] kasan_save_stack+0x3c/0x68 [ 21.161553] kasan_save_track+0x20/0x40 [ 21.161821] kasan_save_alloc_info+0x40/0x58 [ 21.161943] __kasan_kmalloc+0xd4/0xd8 [ 21.162003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.162068] kasan_atomics+0xb8/0x2e0 [ 21.162174] kunit_try_run_case+0x170/0x3f0 [ 21.162267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.162356] kthread+0x328/0x630 [ 21.162421] ret_from_fork+0x10/0x20 [ 21.162607] [ 21.162706] The buggy address belongs to the object at fff00000c56d1100 [ 21.162706] which belongs to the cache kmalloc-64 of size 64 [ 21.162768] The buggy address is located 0 bytes to the right of [ 21.162768] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.162834] [ 21.162855] The buggy address belongs to the physical page: [ 21.163030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.163178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.163293] page_type: f5(slab) [ 21.163388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.163476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.163682] page dumped because: kasan: bad access detected [ 21.163827] [ 21.163851] Memory state around the buggy address: [ 21.163981] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.164063] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.164128] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.164180] ^ [ 21.164228] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.164271] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.164591] ================================================================== [ 21.103081] ================================================================== [ 21.103128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.103172] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.103323] [ 21.103361] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.103492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.103560] Hardware name: linux,dummy-virt (DT) [ 21.103626] Call trace: [ 21.103650] show_stack+0x20/0x38 (C) [ 21.103717] dump_stack_lvl+0x8c/0xd0 [ 21.103787] print_report+0x118/0x608 [ 21.103836] kasan_report+0xdc/0x128 [ 21.103882] kasan_check_range+0x100/0x1a8 [ 21.103949] __kasan_check_write+0x20/0x30 [ 21.103996] kasan_atomics_helper+0x126c/0x4858 [ 21.104045] kasan_atomics+0x198/0x2e0 [ 21.104278] kunit_try_run_case+0x170/0x3f0 [ 21.104328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.104521] kthread+0x328/0x630 [ 21.104626] ret_from_fork+0x10/0x20 [ 21.104692] [ 21.104741] Allocated by task 265: [ 21.104773] kasan_save_stack+0x3c/0x68 [ 21.104852] kasan_save_track+0x20/0x40 [ 21.105020] kasan_save_alloc_info+0x40/0x58 [ 21.105106] __kasan_kmalloc+0xd4/0xd8 [ 21.105226] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.105271] kasan_atomics+0xb8/0x2e0 [ 21.105308] kunit_try_run_case+0x170/0x3f0 [ 21.105387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.105488] kthread+0x328/0x630 [ 21.105612] ret_from_fork+0x10/0x20 [ 21.105699] [ 21.105721] The buggy address belongs to the object at fff00000c56d1100 [ 21.105721] which belongs to the cache kmalloc-64 of size 64 [ 21.105780] The buggy address is located 0 bytes to the right of [ 21.105780] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.105845] [ 21.105866] The buggy address belongs to the physical page: [ 21.106157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.106316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.106418] page_type: f5(slab) [ 21.106461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.106515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.106558] page dumped because: kasan: bad access detected [ 21.106602] [ 21.106633] Memory state around the buggy address: [ 21.106668] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.106713] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.106764] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.106804] ^ [ 21.106840] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106882] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106922] ================================================================== [ 21.107326] ================================================================== [ 21.107546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.107654] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.107707] [ 21.107736] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.107816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.107843] Hardware name: linux,dummy-virt (DT) [ 21.107876] Call trace: [ 21.107899] show_stack+0x20/0x38 (C) [ 21.108102] dump_stack_lvl+0x8c/0xd0 [ 21.108163] print_report+0x118/0x608 [ 21.108225] kasan_report+0xdc/0x128 [ 21.108271] kasan_check_range+0x100/0x1a8 [ 21.108321] __kasan_check_write+0x20/0x30 [ 21.108545] kasan_atomics_helper+0x12d8/0x4858 [ 21.108763] kasan_atomics+0x198/0x2e0 [ 21.108894] kunit_try_run_case+0x170/0x3f0 [ 21.109009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.109091] kthread+0x328/0x630 [ 21.109219] ret_from_fork+0x10/0x20 [ 21.109283] [ 21.109304] Allocated by task 265: [ 21.109334] kasan_save_stack+0x3c/0x68 [ 21.109444] kasan_save_track+0x20/0x40 [ 21.109608] kasan_save_alloc_info+0x40/0x58 [ 21.109898] __kasan_kmalloc+0xd4/0xd8 [ 21.110180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.110343] kasan_atomics+0xb8/0x2e0 [ 21.110522] kunit_try_run_case+0x170/0x3f0 [ 21.110634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.110784] kthread+0x328/0x630 [ 21.110865] ret_from_fork+0x10/0x20 [ 21.110972] [ 21.111110] The buggy address belongs to the object at fff00000c56d1100 [ 21.111110] which belongs to the cache kmalloc-64 of size 64 [ 21.111172] The buggy address is located 0 bytes to the right of [ 21.111172] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.111247] [ 21.111268] The buggy address belongs to the physical page: [ 21.111607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.111717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.111881] page_type: f5(slab) [ 21.112027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.112266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.112411] page dumped because: kasan: bad access detected [ 21.112551] [ 21.112572] Memory state around the buggy address: [ 21.112864] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.113097] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.113280] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.113649] ^ [ 21.113693] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.113737] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.113777] ================================================================== [ 21.187761] ================================================================== [ 21.187937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.187999] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.188048] [ 21.188143] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.188245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.188471] Hardware name: linux,dummy-virt (DT) [ 21.188514] Call trace: [ 21.188537] show_stack+0x20/0x38 (C) [ 21.188590] dump_stack_lvl+0x8c/0xd0 [ 21.188785] print_report+0x118/0x608 [ 21.188859] kasan_report+0xdc/0x128 [ 21.188921] kasan_check_range+0x100/0x1a8 [ 21.188973] __kasan_check_write+0x20/0x30 [ 21.189094] kasan_atomics_helper+0x175c/0x4858 [ 21.189208] kasan_atomics+0x198/0x2e0 [ 21.189369] kunit_try_run_case+0x170/0x3f0 [ 21.189427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.189548] kthread+0x328/0x630 [ 21.189606] ret_from_fork+0x10/0x20 [ 21.189764] [ 21.189825] Allocated by task 265: [ 21.189855] kasan_save_stack+0x3c/0x68 [ 21.190015] kasan_save_track+0x20/0x40 [ 21.190058] kasan_save_alloc_info+0x40/0x58 [ 21.190309] __kasan_kmalloc+0xd4/0xd8 [ 21.190435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.190547] kasan_atomics+0xb8/0x2e0 [ 21.190851] kunit_try_run_case+0x170/0x3f0 [ 21.191030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.191141] kthread+0x328/0x630 [ 21.191257] ret_from_fork+0x10/0x20 [ 21.191354] [ 21.191504] The buggy address belongs to the object at fff00000c56d1100 [ 21.191504] which belongs to the cache kmalloc-64 of size 64 [ 21.191594] The buggy address is located 0 bytes to the right of [ 21.191594] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.191660] [ 21.191681] The buggy address belongs to the physical page: [ 21.191728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.191780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.191961] page_type: f5(slab) [ 21.192012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.192553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.192838] page dumped because: kasan: bad access detected [ 21.192935] [ 21.192956] Memory state around the buggy address: [ 21.192993] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.193325] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.193431] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.193526] ^ [ 21.193562] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193751] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193869] ================================================================== [ 21.049032] ================================================================== [ 21.049104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.049283] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265 [ 21.049383] [ 21.049419] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.049747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.049855] Hardware name: linux,dummy-virt (DT) [ 21.049966] Call trace: [ 21.049990] show_stack+0x20/0x38 (C) [ 21.050044] dump_stack_lvl+0x8c/0xd0 [ 21.050451] print_report+0x118/0x608 [ 21.050528] kasan_report+0xdc/0x128 [ 21.050728] kasan_check_range+0x100/0x1a8 [ 21.050933] __kasan_check_write+0x20/0x30 [ 21.051015] kasan_atomics_helper+0xff0/0x4858 [ 21.051067] kasan_atomics+0x198/0x2e0 [ 21.051288] kunit_try_run_case+0x170/0x3f0 [ 21.051618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.051884] kthread+0x328/0x630 [ 21.052165] ret_from_fork+0x10/0x20 [ 21.052284] [ 21.052309] Allocated by task 265: [ 21.052395] kasan_save_stack+0x3c/0x68 [ 21.052795] kasan_save_track+0x20/0x40 [ 21.052967] kasan_save_alloc_info+0x40/0x58 [ 21.053083] __kasan_kmalloc+0xd4/0xd8 [ 21.053245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.053335] kasan_atomics+0xb8/0x2e0 [ 21.053376] kunit_try_run_case+0x170/0x3f0 [ 21.053437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.053845] kthread+0x328/0x630 [ 21.054005] ret_from_fork+0x10/0x20 [ 21.054167] [ 21.054311] The buggy address belongs to the object at fff00000c56d1100 [ 21.054311] which belongs to the cache kmalloc-64 of size 64 [ 21.054443] The buggy address is located 0 bytes to the right of [ 21.054443] allocated 48-byte region [fff00000c56d1100, fff00000c56d1130) [ 21.054658] [ 21.054847] The buggy address belongs to the physical page: [ 21.055211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1 [ 21.055488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.055637] page_type: f5(slab) [ 21.055689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.055742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.055920] page dumped because: kasan: bad access detected [ 21.056174] [ 21.056342] Memory state around the buggy address: [ 21.056575] fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.056654] fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.056979] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.057037] ^ [ 21.057077] fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.057122] fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.057547] ==================================================================
[ 14.309738] ================================================================== [ 14.310003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.310730] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.311083] [ 14.311237] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.311322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.311337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.311371] Call Trace: [ 14.311389] <TASK> [ 14.311406] dump_stack_lvl+0x73/0xb0 [ 14.311436] print_report+0xd1/0x650 [ 14.311460] ? __virt_addr_valid+0x1db/0x2d0 [ 14.311484] ? kasan_atomics_helper+0x860/0x5450 [ 14.311506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.311532] ? kasan_atomics_helper+0x860/0x5450 [ 14.311555] kasan_report+0x141/0x180 [ 14.311579] ? kasan_atomics_helper+0x860/0x5450 [ 14.311607] kasan_check_range+0x10c/0x1c0 [ 14.311632] __kasan_check_write+0x18/0x20 [ 14.311652] kasan_atomics_helper+0x860/0x5450 [ 14.311677] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.311701] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.311727] ? kasan_save_alloc_info+0x3b/0x50 [ 14.311752] ? kasan_atomics+0x152/0x310 [ 14.311782] kasan_atomics+0x1dc/0x310 [ 14.311807] ? __pfx_kasan_atomics+0x10/0x10 [ 14.311834] ? __pfx_read_tsc+0x10/0x10 [ 14.311856] ? ktime_get_ts64+0x86/0x230 [ 14.311882] kunit_try_run_case+0x1a5/0x480 [ 14.311907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.311931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.311967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.311992] ? __kthread_parkme+0x82/0x180 [ 14.312013] ? preempt_count_sub+0x50/0x80 [ 14.312038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.312064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.312114] kthread+0x337/0x6f0 [ 14.312191] ? trace_preempt_on+0x20/0xc0 [ 14.312252] ? __pfx_kthread+0x10/0x10 [ 14.312276] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.312327] ? calculate_sigpending+0x7b/0xa0 [ 14.312365] ? __pfx_kthread+0x10/0x10 [ 14.312402] ret_from_fork+0x116/0x1d0 [ 14.312436] ? __pfx_kthread+0x10/0x10 [ 14.312480] ret_from_fork_asm+0x1a/0x30 [ 14.312529] </TASK> [ 14.312564] [ 14.322846] Allocated by task 282: [ 14.323316] kasan_save_stack+0x45/0x70 [ 14.323568] kasan_save_track+0x18/0x40 [ 14.323768] kasan_save_alloc_info+0x3b/0x50 [ 14.324003] __kasan_kmalloc+0xb7/0xc0 [ 14.324344] __kmalloc_cache_noprof+0x189/0x420 [ 14.324668] kasan_atomics+0x95/0x310 [ 14.324911] kunit_try_run_case+0x1a5/0x480 [ 14.325197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.325461] kthread+0x337/0x6f0 [ 14.325733] ret_from_fork+0x116/0x1d0 [ 14.325929] ret_from_fork_asm+0x1a/0x30 [ 14.326189] [ 14.326311] The buggy address belongs to the object at ffff888103a18380 [ 14.326311] which belongs to the cache kmalloc-64 of size 64 [ 14.326957] The buggy address is located 0 bytes to the right of [ 14.326957] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.327736] [ 14.327839] The buggy address belongs to the physical page: [ 14.328105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.328466] flags: 0x200000000000000(node=0|zone=2) [ 14.328828] page_type: f5(slab) [ 14.328962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.329197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.329635] page dumped because: kasan: bad access detected [ 14.329914] [ 14.330030] Memory state around the buggy address: [ 14.330589] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.331104] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.331448] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.331817] ^ [ 14.331993] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.332647] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.333042] ================================================================== [ 15.001827] ================================================================== [ 15.002664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.003352] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.003996] [ 15.004222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.004269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.004283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.004307] Call Trace: [ 15.004324] <TASK> [ 15.004340] dump_stack_lvl+0x73/0xb0 [ 15.004380] print_report+0xd1/0x650 [ 15.004404] ? __virt_addr_valid+0x1db/0x2d0 [ 15.004428] ? kasan_atomics_helper+0x177f/0x5450 [ 15.004461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.004486] ? kasan_atomics_helper+0x177f/0x5450 [ 15.004509] kasan_report+0x141/0x180 [ 15.004532] ? kasan_atomics_helper+0x177f/0x5450 [ 15.004560] kasan_check_range+0x10c/0x1c0 [ 15.004585] __kasan_check_write+0x18/0x20 [ 15.004606] kasan_atomics_helper+0x177f/0x5450 [ 15.004630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.004654] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.004679] ? kasan_save_alloc_info+0x3b/0x50 [ 15.004704] ? kasan_atomics+0x152/0x310 [ 15.004732] kasan_atomics+0x1dc/0x310 [ 15.004757] ? __pfx_kasan_atomics+0x10/0x10 [ 15.004783] ? __pfx_read_tsc+0x10/0x10 [ 15.004805] ? ktime_get_ts64+0x86/0x230 [ 15.004831] kunit_try_run_case+0x1a5/0x480 [ 15.004857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.004880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.004905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.004930] ? __kthread_parkme+0x82/0x180 [ 15.004963] ? preempt_count_sub+0x50/0x80 [ 15.004989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.005014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.005038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.005069] kthread+0x337/0x6f0 [ 15.005090] ? trace_preempt_on+0x20/0xc0 [ 15.005114] ? __pfx_kthread+0x10/0x10 [ 15.005135] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.005158] ? calculate_sigpending+0x7b/0xa0 [ 15.005183] ? __pfx_kthread+0x10/0x10 [ 15.005206] ret_from_fork+0x116/0x1d0 [ 15.005226] ? __pfx_kthread+0x10/0x10 [ 15.005248] ret_from_fork_asm+0x1a/0x30 [ 15.005280] </TASK> [ 15.005293] [ 15.018144] Allocated by task 282: [ 15.018488] kasan_save_stack+0x45/0x70 [ 15.018861] kasan_save_track+0x18/0x40 [ 15.019254] kasan_save_alloc_info+0x3b/0x50 [ 15.019535] __kasan_kmalloc+0xb7/0xc0 [ 15.019673] __kmalloc_cache_noprof+0x189/0x420 [ 15.019832] kasan_atomics+0x95/0x310 [ 15.020001] kunit_try_run_case+0x1a5/0x480 [ 15.020378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.020758] kthread+0x337/0x6f0 [ 15.020882] ret_from_fork+0x116/0x1d0 [ 15.021028] ret_from_fork_asm+0x1a/0x30 [ 15.021433] [ 15.021614] The buggy address belongs to the object at ffff888103a18380 [ 15.021614] which belongs to the cache kmalloc-64 of size 64 [ 15.022720] The buggy address is located 0 bytes to the right of [ 15.022720] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.023694] [ 15.023824] The buggy address belongs to the physical page: [ 15.024221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.024470] flags: 0x200000000000000(node=0|zone=2) [ 15.024636] page_type: f5(slab) [ 15.024759] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.025008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.025341] page dumped because: kasan: bad access detected [ 15.025556] [ 15.025655] Memory state around the buggy address: [ 15.025903] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.026214] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.026535] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.026790] ^ [ 15.027269] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.027521] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.028168] ================================================================== [ 14.288585] ================================================================== [ 14.288953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.289617] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.289852] [ 14.289952] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.289998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.290012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.290036] Call Trace: [ 14.290054] <TASK> [ 14.290070] dump_stack_lvl+0x73/0xb0 [ 14.290099] print_report+0xd1/0x650 [ 14.290124] ? __virt_addr_valid+0x1db/0x2d0 [ 14.290148] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.290171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.290195] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.290219] kasan_report+0x141/0x180 [ 14.290242] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.290270] kasan_check_range+0x10c/0x1c0 [ 14.290295] __kasan_check_write+0x18/0x20 [ 14.290316] kasan_atomics_helper+0x7c7/0x5450 [ 14.290340] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.290365] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.290391] ? kasan_save_alloc_info+0x3b/0x50 [ 14.290415] ? kasan_atomics+0x152/0x310 [ 14.290444] kasan_atomics+0x1dc/0x310 [ 14.290468] ? __pfx_kasan_atomics+0x10/0x10 [ 14.290494] ? __pfx_read_tsc+0x10/0x10 [ 14.290516] ? ktime_get_ts64+0x86/0x230 [ 14.290542] kunit_try_run_case+0x1a5/0x480 [ 14.290567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.290591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.290616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.290642] ? __kthread_parkme+0x82/0x180 [ 14.290663] ? preempt_count_sub+0x50/0x80 [ 14.290688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.290713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.290736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.290761] kthread+0x337/0x6f0 [ 14.290783] ? trace_preempt_on+0x20/0xc0 [ 14.290806] ? __pfx_kthread+0x10/0x10 [ 14.290829] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.290851] ? calculate_sigpending+0x7b/0xa0 [ 14.290877] ? __pfx_kthread+0x10/0x10 [ 14.290900] ret_from_fork+0x116/0x1d0 [ 14.290920] ? __pfx_kthread+0x10/0x10 [ 14.290951] ret_from_fork_asm+0x1a/0x30 [ 14.290982] </TASK> [ 14.290996] [ 14.299708] Allocated by task 282: [ 14.299848] kasan_save_stack+0x45/0x70 [ 14.300006] kasan_save_track+0x18/0x40 [ 14.300140] kasan_save_alloc_info+0x3b/0x50 [ 14.300285] __kasan_kmalloc+0xb7/0xc0 [ 14.300418] __kmalloc_cache_noprof+0x189/0x420 [ 14.300570] kasan_atomics+0x95/0x310 [ 14.300703] kunit_try_run_case+0x1a5/0x480 [ 14.300847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.301383] kthread+0x337/0x6f0 [ 14.301832] ret_from_fork+0x116/0x1d0 [ 14.302056] ret_from_fork_asm+0x1a/0x30 [ 14.302254] [ 14.302369] The buggy address belongs to the object at ffff888103a18380 [ 14.302369] which belongs to the cache kmalloc-64 of size 64 [ 14.302749] The buggy address is located 0 bytes to the right of [ 14.302749] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.303327] [ 14.303406] The buggy address belongs to the physical page: [ 14.303923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.304579] flags: 0x200000000000000(node=0|zone=2) [ 14.304872] page_type: f5(slab) [ 14.305010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.305713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.306063] page dumped because: kasan: bad access detected [ 14.306373] [ 14.306576] Memory state around the buggy address: [ 14.306842] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.307291] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.307731] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.308130] ^ [ 14.308289] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.308520] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.308885] ================================================================== [ 14.224813] ================================================================== [ 14.225191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.225630] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.225989] [ 14.226121] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.226178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.226204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.226228] Call Trace: [ 14.226246] <TASK> [ 14.226264] dump_stack_lvl+0x73/0xb0 [ 14.226325] print_report+0xd1/0x650 [ 14.226351] ? __virt_addr_valid+0x1db/0x2d0 [ 14.226387] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.226410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.226434] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.226517] kasan_report+0x141/0x180 [ 14.226545] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.226574] kasan_check_range+0x10c/0x1c0 [ 14.226620] __kasan_check_write+0x18/0x20 [ 14.226642] kasan_atomics_helper+0x5fe/0x5450 [ 14.226680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.226717] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.226756] ? kasan_save_alloc_info+0x3b/0x50 [ 14.226781] ? kasan_atomics+0x152/0x310 [ 14.226824] kasan_atomics+0x1dc/0x310 [ 14.226861] ? __pfx_kasan_atomics+0x10/0x10 [ 14.226895] ? __pfx_read_tsc+0x10/0x10 [ 14.226918] ? ktime_get_ts64+0x86/0x230 [ 14.226962] kunit_try_run_case+0x1a5/0x480 [ 14.226987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.227010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.227036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.227059] ? __kthread_parkme+0x82/0x180 [ 14.227090] ? preempt_count_sub+0x50/0x80 [ 14.227122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.227147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.227170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.227195] kthread+0x337/0x6f0 [ 14.227217] ? trace_preempt_on+0x20/0xc0 [ 14.227241] ? __pfx_kthread+0x10/0x10 [ 14.227263] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.227285] ? calculate_sigpending+0x7b/0xa0 [ 14.227310] ? __pfx_kthread+0x10/0x10 [ 14.227332] ret_from_fork+0x116/0x1d0 [ 14.227353] ? __pfx_kthread+0x10/0x10 [ 14.227374] ret_from_fork_asm+0x1a/0x30 [ 14.227407] </TASK> [ 14.227419] [ 14.237989] Allocated by task 282: [ 14.238216] kasan_save_stack+0x45/0x70 [ 14.238422] kasan_save_track+0x18/0x40 [ 14.238761] kasan_save_alloc_info+0x3b/0x50 [ 14.239077] __kasan_kmalloc+0xb7/0xc0 [ 14.239257] __kmalloc_cache_noprof+0x189/0x420 [ 14.239508] kasan_atomics+0x95/0x310 [ 14.239691] kunit_try_run_case+0x1a5/0x480 [ 14.239884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.240240] kthread+0x337/0x6f0 [ 14.240435] ret_from_fork+0x116/0x1d0 [ 14.240726] ret_from_fork_asm+0x1a/0x30 [ 14.240934] [ 14.241106] The buggy address belongs to the object at ffff888103a18380 [ 14.241106] which belongs to the cache kmalloc-64 of size 64 [ 14.241792] The buggy address is located 0 bytes to the right of [ 14.241792] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.242404] [ 14.242484] The buggy address belongs to the physical page: [ 14.242669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.243276] flags: 0x200000000000000(node=0|zone=2) [ 14.243705] page_type: f5(slab) [ 14.243835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.244711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.244971] page dumped because: kasan: bad access detected [ 14.245155] [ 14.245228] Memory state around the buggy address: [ 14.245515] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.245966] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.246177] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.246383] ^ [ 14.246534] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.246742] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.247036] ================================================================== [ 15.489184] ================================================================== [ 15.489705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.490279] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.490891] [ 15.491030] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.491075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.491091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.491122] Call Trace: [ 15.491141] <TASK> [ 15.491159] dump_stack_lvl+0x73/0xb0 [ 15.491189] print_report+0xd1/0x650 [ 15.491212] ? __virt_addr_valid+0x1db/0x2d0 [ 15.491237] ? kasan_atomics_helper+0x5115/0x5450 [ 15.491260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.491284] ? kasan_atomics_helper+0x5115/0x5450 [ 15.491308] kasan_report+0x141/0x180 [ 15.491331] ? kasan_atomics_helper+0x5115/0x5450 [ 15.491359] __asan_report_load8_noabort+0x18/0x20 [ 15.491386] kasan_atomics_helper+0x5115/0x5450 [ 15.491411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.491434] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.491460] ? kasan_save_alloc_info+0x3b/0x50 [ 15.491484] ? kasan_atomics+0x152/0x310 [ 15.491512] kasan_atomics+0x1dc/0x310 [ 15.491537] ? __pfx_kasan_atomics+0x10/0x10 [ 15.491563] ? __pfx_read_tsc+0x10/0x10 [ 15.491586] ? ktime_get_ts64+0x86/0x230 [ 15.491612] kunit_try_run_case+0x1a5/0x480 [ 15.491638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.491661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.491685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.491710] ? __kthread_parkme+0x82/0x180 [ 15.491731] ? preempt_count_sub+0x50/0x80 [ 15.491756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.491781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.491806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.491829] kthread+0x337/0x6f0 [ 15.491850] ? trace_preempt_on+0x20/0xc0 [ 15.491875] ? __pfx_kthread+0x10/0x10 [ 15.491897] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.491919] ? calculate_sigpending+0x7b/0xa0 [ 15.491953] ? __pfx_kthread+0x10/0x10 [ 15.491978] ret_from_fork+0x116/0x1d0 [ 15.491998] ? __pfx_kthread+0x10/0x10 [ 15.492020] ret_from_fork_asm+0x1a/0x30 [ 15.492052] </TASK> [ 15.492065] [ 15.499961] Allocated by task 282: [ 15.500658] kasan_save_stack+0x45/0x70 [ 15.500844] kasan_save_track+0x18/0x40 [ 15.501055] kasan_save_alloc_info+0x3b/0x50 [ 15.501251] __kasan_kmalloc+0xb7/0xc0 [ 15.501410] __kmalloc_cache_noprof+0x189/0x420 [ 15.501624] kasan_atomics+0x95/0x310 [ 15.501803] kunit_try_run_case+0x1a5/0x480 [ 15.502016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.502808] kthread+0x337/0x6f0 [ 15.502954] ret_from_fork+0x116/0x1d0 [ 15.503304] ret_from_fork_asm+0x1a/0x30 [ 15.503594] [ 15.503808] The buggy address belongs to the object at ffff888103a18380 [ 15.503808] which belongs to the cache kmalloc-64 of size 64 [ 15.504746] The buggy address is located 0 bytes to the right of [ 15.504746] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.505605] [ 15.505704] The buggy address belongs to the physical page: [ 15.505958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.506444] flags: 0x200000000000000(node=0|zone=2) [ 15.506762] page_type: f5(slab) [ 15.506926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.507482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.507805] page dumped because: kasan: bad access detected [ 15.508141] [ 15.508235] Memory state around the buggy address: [ 15.508431] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.508901] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.509378] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.509780] ^ [ 15.510091] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510347] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510660] ================================================================== [ 15.079152] ================================================================== [ 15.079783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.080197] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.080506] [ 15.080614] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.080659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.080673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.080696] Call Trace: [ 15.080714] <TASK> [ 15.080733] dump_stack_lvl+0x73/0xb0 [ 15.080762] print_report+0xd1/0x650 [ 15.080786] ? __virt_addr_valid+0x1db/0x2d0 [ 15.080810] ? kasan_atomics_helper+0x194a/0x5450 [ 15.080833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.080857] ? kasan_atomics_helper+0x194a/0x5450 [ 15.080880] kasan_report+0x141/0x180 [ 15.080903] ? kasan_atomics_helper+0x194a/0x5450 [ 15.080932] kasan_check_range+0x10c/0x1c0 [ 15.080967] __kasan_check_write+0x18/0x20 [ 15.080988] kasan_atomics_helper+0x194a/0x5450 [ 15.081012] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.081037] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.081063] ? kasan_save_alloc_info+0x3b/0x50 [ 15.081088] ? kasan_atomics+0x152/0x310 [ 15.081117] kasan_atomics+0x1dc/0x310 [ 15.081141] ? __pfx_kasan_atomics+0x10/0x10 [ 15.081167] ? __pfx_read_tsc+0x10/0x10 [ 15.081213] ? ktime_get_ts64+0x86/0x230 [ 15.081238] kunit_try_run_case+0x1a5/0x480 [ 15.081264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.081288] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.081314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.081339] ? __kthread_parkme+0x82/0x180 [ 15.081361] ? preempt_count_sub+0x50/0x80 [ 15.081386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.081412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.081436] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.081460] kthread+0x337/0x6f0 [ 15.081482] ? trace_preempt_on+0x20/0xc0 [ 15.081506] ? __pfx_kthread+0x10/0x10 [ 15.081529] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.081551] ? calculate_sigpending+0x7b/0xa0 [ 15.081596] ? __pfx_kthread+0x10/0x10 [ 15.081619] ret_from_fork+0x116/0x1d0 [ 15.081639] ? __pfx_kthread+0x10/0x10 [ 15.081661] ret_from_fork_asm+0x1a/0x30 [ 15.081693] </TASK> [ 15.081707] [ 15.089664] Allocated by task 282: [ 15.089831] kasan_save_stack+0x45/0x70 [ 15.090055] kasan_save_track+0x18/0x40 [ 15.090225] kasan_save_alloc_info+0x3b/0x50 [ 15.090386] __kasan_kmalloc+0xb7/0xc0 [ 15.090525] __kmalloc_cache_noprof+0x189/0x420 [ 15.090747] kasan_atomics+0x95/0x310 [ 15.090949] kunit_try_run_case+0x1a5/0x480 [ 15.091161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.091441] kthread+0x337/0x6f0 [ 15.091576] ret_from_fork+0x116/0x1d0 [ 15.091711] ret_from_fork_asm+0x1a/0x30 [ 15.091851] [ 15.091983] The buggy address belongs to the object at ffff888103a18380 [ 15.091983] which belongs to the cache kmalloc-64 of size 64 [ 15.092838] The buggy address is located 0 bytes to the right of [ 15.092838] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.093351] [ 15.093428] The buggy address belongs to the physical page: [ 15.093987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.094268] flags: 0x200000000000000(node=0|zone=2) [ 15.094435] page_type: f5(slab) [ 15.094561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.095340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.095716] page dumped because: kasan: bad access detected [ 15.095972] [ 15.096046] Memory state around the buggy address: [ 15.096249] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.096589] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.096808] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.097145] ^ [ 15.097399] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.097745] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.098043] ================================================================== [ 14.897598] ================================================================== [ 14.898332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.898723] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.899174] [ 14.899265] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.899309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.899322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.899355] Call Trace: [ 14.899373] <TASK> [ 14.899390] dump_stack_lvl+0x73/0xb0 [ 14.899429] print_report+0xd1/0x650 [ 14.899453] ? __virt_addr_valid+0x1db/0x2d0 [ 14.899476] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.899499] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.899523] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.899546] kasan_report+0x141/0x180 [ 14.899570] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.899598] __asan_report_store8_noabort+0x1b/0x30 [ 14.899621] kasan_atomics_helper+0x50d4/0x5450 [ 14.899645] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.899668] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.899693] ? kasan_save_alloc_info+0x3b/0x50 [ 14.899717] ? kasan_atomics+0x152/0x310 [ 14.899747] kasan_atomics+0x1dc/0x310 [ 14.899772] ? __pfx_kasan_atomics+0x10/0x10 [ 14.899798] ? __pfx_read_tsc+0x10/0x10 [ 14.899820] ? ktime_get_ts64+0x86/0x230 [ 14.899844] kunit_try_run_case+0x1a5/0x480 [ 14.899871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.899895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.899920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.899954] ? __kthread_parkme+0x82/0x180 [ 14.899976] ? preempt_count_sub+0x50/0x80 [ 14.900001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.900026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.900050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.900083] kthread+0x337/0x6f0 [ 14.900104] ? trace_preempt_on+0x20/0xc0 [ 14.900128] ? __pfx_kthread+0x10/0x10 [ 14.900151] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.900173] ? calculate_sigpending+0x7b/0xa0 [ 14.900198] ? __pfx_kthread+0x10/0x10 [ 14.900221] ret_from_fork+0x116/0x1d0 [ 14.900241] ? __pfx_kthread+0x10/0x10 [ 14.900262] ret_from_fork_asm+0x1a/0x30 [ 14.900294] </TASK> [ 14.900306] [ 14.907981] Allocated by task 282: [ 14.908176] kasan_save_stack+0x45/0x70 [ 14.908339] kasan_save_track+0x18/0x40 [ 14.908535] kasan_save_alloc_info+0x3b/0x50 [ 14.908694] __kasan_kmalloc+0xb7/0xc0 [ 14.908848] __kmalloc_cache_noprof+0x189/0x420 [ 14.909105] kasan_atomics+0x95/0x310 [ 14.909299] kunit_try_run_case+0x1a5/0x480 [ 14.909486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.909696] kthread+0x337/0x6f0 [ 14.909821] ret_from_fork+0x116/0x1d0 [ 14.909965] ret_from_fork_asm+0x1a/0x30 [ 14.910230] [ 14.910331] The buggy address belongs to the object at ffff888103a18380 [ 14.910331] which belongs to the cache kmalloc-64 of size 64 [ 14.910846] The buggy address is located 0 bytes to the right of [ 14.910846] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.911395] [ 14.911484] The buggy address belongs to the physical page: [ 14.911710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.912048] flags: 0x200000000000000(node=0|zone=2) [ 14.912229] page_type: f5(slab) [ 14.912355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.912657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.913012] page dumped because: kasan: bad access detected [ 14.913425] [ 14.913500] Memory state around the buggy address: [ 14.913658] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.913876] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.914157] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.914487] ^ [ 14.914716] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.915048] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.915296] ================================================================== [ 14.268113] ================================================================== [ 14.268588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.269017] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.269444] [ 14.269655] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.269742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.269758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.269781] Call Trace: [ 14.269799] <TASK> [ 14.269824] dump_stack_lvl+0x73/0xb0 [ 14.269855] print_report+0xd1/0x650 [ 14.269895] ? __virt_addr_valid+0x1db/0x2d0 [ 14.269933] ? kasan_atomics_helper+0x72f/0x5450 [ 14.270001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.270039] ? kasan_atomics_helper+0x72f/0x5450 [ 14.270076] kasan_report+0x141/0x180 [ 14.270110] ? kasan_atomics_helper+0x72f/0x5450 [ 14.270137] kasan_check_range+0x10c/0x1c0 [ 14.270173] __kasan_check_write+0x18/0x20 [ 14.270194] kasan_atomics_helper+0x72f/0x5450 [ 14.270219] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.270243] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.270268] ? kasan_save_alloc_info+0x3b/0x50 [ 14.270293] ? kasan_atomics+0x152/0x310 [ 14.270321] kasan_atomics+0x1dc/0x310 [ 14.270346] ? __pfx_kasan_atomics+0x10/0x10 [ 14.270372] ? __pfx_read_tsc+0x10/0x10 [ 14.270393] ? ktime_get_ts64+0x86/0x230 [ 14.270419] kunit_try_run_case+0x1a5/0x480 [ 14.270462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.270512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.270539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.270738] ? __kthread_parkme+0x82/0x180 [ 14.270770] ? preempt_count_sub+0x50/0x80 [ 14.270796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.270858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.270884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.270919] kthread+0x337/0x6f0 [ 14.270954] ? trace_preempt_on+0x20/0xc0 [ 14.270980] ? __pfx_kthread+0x10/0x10 [ 14.271002] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.271025] ? calculate_sigpending+0x7b/0xa0 [ 14.271050] ? __pfx_kthread+0x10/0x10 [ 14.271081] ret_from_fork+0x116/0x1d0 [ 14.271101] ? __pfx_kthread+0x10/0x10 [ 14.271155] ret_from_fork_asm+0x1a/0x30 [ 14.271202] </TASK> [ 14.271216] [ 14.279865] Allocated by task 282: [ 14.280051] kasan_save_stack+0x45/0x70 [ 14.280198] kasan_save_track+0x18/0x40 [ 14.280356] kasan_save_alloc_info+0x3b/0x50 [ 14.280727] __kasan_kmalloc+0xb7/0xc0 [ 14.280932] __kmalloc_cache_noprof+0x189/0x420 [ 14.281141] kasan_atomics+0x95/0x310 [ 14.281370] kunit_try_run_case+0x1a5/0x480 [ 14.281644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.281963] kthread+0x337/0x6f0 [ 14.282151] ret_from_fork+0x116/0x1d0 [ 14.282372] ret_from_fork_asm+0x1a/0x30 [ 14.282653] [ 14.282758] The buggy address belongs to the object at ffff888103a18380 [ 14.282758] which belongs to the cache kmalloc-64 of size 64 [ 14.283448] The buggy address is located 0 bytes to the right of [ 14.283448] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.284140] [ 14.284266] The buggy address belongs to the physical page: [ 14.284625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.285077] flags: 0x200000000000000(node=0|zone=2) [ 14.285397] page_type: f5(slab) [ 14.285621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.285861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.286102] page dumped because: kasan: bad access detected [ 14.286279] [ 14.286352] Memory state around the buggy address: [ 14.286510] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.286730] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.287093] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.287616] ^ [ 14.287783] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.288015] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.288234] ================================================================== [ 14.933560] ================================================================== [ 14.933906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.934440] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.934783] [ 14.934874] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.934917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.934931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.934965] Call Trace: [ 14.934981] <TASK> [ 14.934996] dump_stack_lvl+0x73/0xb0 [ 14.935025] print_report+0xd1/0x650 [ 14.935049] ? __virt_addr_valid+0x1db/0x2d0 [ 14.935073] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.935096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.935128] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.935152] kasan_report+0x141/0x180 [ 14.935176] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.935204] kasan_check_range+0x10c/0x1c0 [ 14.935229] __kasan_check_write+0x18/0x20 [ 14.935250] kasan_atomics_helper+0x15b6/0x5450 [ 14.935274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.935298] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.935335] ? kasan_save_alloc_info+0x3b/0x50 [ 14.935360] ? kasan_atomics+0x152/0x310 [ 14.935389] kasan_atomics+0x1dc/0x310 [ 14.935413] ? __pfx_kasan_atomics+0x10/0x10 [ 14.935439] ? __pfx_read_tsc+0x10/0x10 [ 14.935461] ? ktime_get_ts64+0x86/0x230 [ 14.935486] kunit_try_run_case+0x1a5/0x480 [ 14.935513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.935537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.935561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.935585] ? __kthread_parkme+0x82/0x180 [ 14.935607] ? preempt_count_sub+0x50/0x80 [ 14.935632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.935658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.935682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.935706] kthread+0x337/0x6f0 [ 14.935727] ? trace_preempt_on+0x20/0xc0 [ 14.935751] ? __pfx_kthread+0x10/0x10 [ 14.935774] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.935796] ? calculate_sigpending+0x7b/0xa0 [ 14.935821] ? __pfx_kthread+0x10/0x10 [ 14.935843] ret_from_fork+0x116/0x1d0 [ 14.935863] ? __pfx_kthread+0x10/0x10 [ 14.935886] ret_from_fork_asm+0x1a/0x30 [ 14.935917] </TASK> [ 14.935930] [ 14.944060] Allocated by task 282: [ 14.944248] kasan_save_stack+0x45/0x70 [ 14.944430] kasan_save_track+0x18/0x40 [ 14.944569] kasan_save_alloc_info+0x3b/0x50 [ 14.944792] __kasan_kmalloc+0xb7/0xc0 [ 14.944980] __kmalloc_cache_noprof+0x189/0x420 [ 14.945204] kasan_atomics+0x95/0x310 [ 14.945368] kunit_try_run_case+0x1a5/0x480 [ 14.945575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.945750] kthread+0x337/0x6f0 [ 14.945874] ret_from_fork+0x116/0x1d0 [ 14.946017] ret_from_fork_asm+0x1a/0x30 [ 14.946158] [ 14.946232] The buggy address belongs to the object at ffff888103a18380 [ 14.946232] which belongs to the cache kmalloc-64 of size 64 [ 14.946585] The buggy address is located 0 bytes to the right of [ 14.946585] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.947122] [ 14.947236] The buggy address belongs to the physical page: [ 14.947495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.947850] flags: 0x200000000000000(node=0|zone=2) [ 14.948126] page_type: f5(slab) [ 14.948301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.948645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.948994] page dumped because: kasan: bad access detected [ 14.949210] [ 14.949285] Memory state around the buggy address: [ 14.949443] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.949664] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.949900] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.950428] ^ [ 14.950661] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.951004] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.951580] ================================================================== [ 14.201568] ================================================================== [ 14.202003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.202466] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.202958] [ 14.203170] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.203256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.203271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.203322] Call Trace: [ 14.203341] <TASK> [ 14.203359] dump_stack_lvl+0x73/0xb0 [ 14.203390] print_report+0xd1/0x650 [ 14.203414] ? __virt_addr_valid+0x1db/0x2d0 [ 14.203437] ? kasan_atomics_helper+0x565/0x5450 [ 14.203460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.203569] ? kasan_atomics_helper+0x565/0x5450 [ 14.203623] kasan_report+0x141/0x180 [ 14.203649] ? kasan_atomics_helper+0x565/0x5450 [ 14.203677] kasan_check_range+0x10c/0x1c0 [ 14.203704] __kasan_check_write+0x18/0x20 [ 14.203725] kasan_atomics_helper+0x565/0x5450 [ 14.203750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.203774] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.203799] ? kasan_save_alloc_info+0x3b/0x50 [ 14.203825] ? kasan_atomics+0x152/0x310 [ 14.203879] kasan_atomics+0x1dc/0x310 [ 14.203904] ? __pfx_kasan_atomics+0x10/0x10 [ 14.203931] ? __pfx_read_tsc+0x10/0x10 [ 14.203970] ? ktime_get_ts64+0x86/0x230 [ 14.203996] kunit_try_run_case+0x1a5/0x480 [ 14.204048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.204083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.204118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.204143] ? __kthread_parkme+0x82/0x180 [ 14.204164] ? preempt_count_sub+0x50/0x80 [ 14.204188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.204214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.204238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.204262] kthread+0x337/0x6f0 [ 14.204283] ? trace_preempt_on+0x20/0xc0 [ 14.204308] ? __pfx_kthread+0x10/0x10 [ 14.204329] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.204352] ? calculate_sigpending+0x7b/0xa0 [ 14.204377] ? __pfx_kthread+0x10/0x10 [ 14.204400] ret_from_fork+0x116/0x1d0 [ 14.204419] ? __pfx_kthread+0x10/0x10 [ 14.204442] ret_from_fork_asm+0x1a/0x30 [ 14.204557] </TASK> [ 14.204574] [ 14.214362] Allocated by task 282: [ 14.214680] kasan_save_stack+0x45/0x70 [ 14.214880] kasan_save_track+0x18/0x40 [ 14.215080] kasan_save_alloc_info+0x3b/0x50 [ 14.215234] __kasan_kmalloc+0xb7/0xc0 [ 14.215369] __kmalloc_cache_noprof+0x189/0x420 [ 14.215878] kasan_atomics+0x95/0x310 [ 14.216115] kunit_try_run_case+0x1a5/0x480 [ 14.216336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.216715] kthread+0x337/0x6f0 [ 14.216843] ret_from_fork+0x116/0x1d0 [ 14.216992] ret_from_fork_asm+0x1a/0x30 [ 14.217181] [ 14.217286] The buggy address belongs to the object at ffff888103a18380 [ 14.217286] which belongs to the cache kmalloc-64 of size 64 [ 14.218351] The buggy address is located 0 bytes to the right of [ 14.218351] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.218712] [ 14.218807] The buggy address belongs to the physical page: [ 14.219144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.219887] flags: 0x200000000000000(node=0|zone=2) [ 14.220439] page_type: f5(slab) [ 14.220742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.221149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.221416] page dumped because: kasan: bad access detected [ 14.221611] [ 14.221843] Memory state around the buggy address: [ 14.222143] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.222574] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.222801] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.223218] ^ [ 14.223618] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.223960] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.224263] ================================================================== [ 15.247739] ================================================================== [ 15.248301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.248785] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.249024] [ 15.249227] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.249272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.249286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.249309] Call Trace: [ 15.249325] <TASK> [ 15.249342] dump_stack_lvl+0x73/0xb0 [ 15.249370] print_report+0xd1/0x650 [ 15.249392] ? __virt_addr_valid+0x1db/0x2d0 [ 15.249416] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.249449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.249472] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.249495] kasan_report+0x141/0x180 [ 15.249520] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.249548] kasan_check_range+0x10c/0x1c0 [ 15.249573] __kasan_check_write+0x18/0x20 [ 15.249593] kasan_atomics_helper+0x1e12/0x5450 [ 15.249617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.249641] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.249666] ? kasan_save_alloc_info+0x3b/0x50 [ 15.249691] ? kasan_atomics+0x152/0x310 [ 15.249720] kasan_atomics+0x1dc/0x310 [ 15.249745] ? __pfx_kasan_atomics+0x10/0x10 [ 15.249771] ? __pfx_read_tsc+0x10/0x10 [ 15.249792] ? ktime_get_ts64+0x86/0x230 [ 15.249818] kunit_try_run_case+0x1a5/0x480 [ 15.249842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.249890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.249915] ? __kthread_parkme+0x82/0x180 [ 15.249937] ? preempt_count_sub+0x50/0x80 [ 15.249976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.250005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.250031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.250056] kthread+0x337/0x6f0 [ 15.250084] ? trace_preempt_on+0x20/0xc0 [ 15.250109] ? __pfx_kthread+0x10/0x10 [ 15.250131] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.250154] ? calculate_sigpending+0x7b/0xa0 [ 15.250178] ? __pfx_kthread+0x10/0x10 [ 15.250202] ret_from_fork+0x116/0x1d0 [ 15.250222] ? __pfx_kthread+0x10/0x10 [ 15.250244] ret_from_fork_asm+0x1a/0x30 [ 15.250277] </TASK> [ 15.250289] [ 15.257931] Allocated by task 282: [ 15.258081] kasan_save_stack+0x45/0x70 [ 15.258274] kasan_save_track+0x18/0x40 [ 15.258472] kasan_save_alloc_info+0x3b/0x50 [ 15.258683] __kasan_kmalloc+0xb7/0xc0 [ 15.258871] __kmalloc_cache_noprof+0x189/0x420 [ 15.259136] kasan_atomics+0x95/0x310 [ 15.259278] kunit_try_run_case+0x1a5/0x480 [ 15.259436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.259694] kthread+0x337/0x6f0 [ 15.259869] ret_from_fork+0x116/0x1d0 [ 15.260076] ret_from_fork_asm+0x1a/0x30 [ 15.260246] [ 15.260336] The buggy address belongs to the object at ffff888103a18380 [ 15.260336] which belongs to the cache kmalloc-64 of size 64 [ 15.260798] The buggy address is located 0 bytes to the right of [ 15.260798] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.261319] [ 15.261415] The buggy address belongs to the physical page: [ 15.261629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.261874] flags: 0x200000000000000(node=0|zone=2) [ 15.262048] page_type: f5(slab) [ 15.262173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.262442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.263188] page dumped because: kasan: bad access detected [ 15.263371] [ 15.263451] Memory state around the buggy address: [ 15.263622] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.263839] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.264198] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.264526] ^ [ 15.264755] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.265098] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.265426] ================================================================== [ 14.107791] ================================================================== [ 14.108084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.108358] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.109052] [ 14.109222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.109268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.109282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.109304] Call Trace: [ 14.109323] <TASK> [ 14.109340] dump_stack_lvl+0x73/0xb0 [ 14.109370] print_report+0xd1/0x650 [ 14.109393] ? __virt_addr_valid+0x1db/0x2d0 [ 14.109417] ? kasan_atomics_helper+0x3df/0x5450 [ 14.109450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.109473] ? kasan_atomics_helper+0x3df/0x5450 [ 14.109496] kasan_report+0x141/0x180 [ 14.109529] ? kasan_atomics_helper+0x3df/0x5450 [ 14.109557] kasan_check_range+0x10c/0x1c0 [ 14.109582] __kasan_check_read+0x15/0x20 [ 14.109602] kasan_atomics_helper+0x3df/0x5450 [ 14.109636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.109660] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.109684] ? kasan_save_alloc_info+0x3b/0x50 [ 14.109709] ? kasan_atomics+0x152/0x310 [ 14.109737] kasan_atomics+0x1dc/0x310 [ 14.109761] ? __pfx_kasan_atomics+0x10/0x10 [ 14.109786] ? __pfx_read_tsc+0x10/0x10 [ 14.109808] ? ktime_get_ts64+0x86/0x230 [ 14.109834] kunit_try_run_case+0x1a5/0x480 [ 14.109860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.109883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.109906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.109931] ? __kthread_parkme+0x82/0x180 [ 14.109964] ? preempt_count_sub+0x50/0x80 [ 14.109988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.110013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.110038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.110234] kthread+0x337/0x6f0 [ 14.110258] ? trace_preempt_on+0x20/0xc0 [ 14.110284] ? __pfx_kthread+0x10/0x10 [ 14.110306] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.110329] ? calculate_sigpending+0x7b/0xa0 [ 14.110354] ? __pfx_kthread+0x10/0x10 [ 14.110378] ret_from_fork+0x116/0x1d0 [ 14.110398] ? __pfx_kthread+0x10/0x10 [ 14.110420] ret_from_fork_asm+0x1a/0x30 [ 14.110451] </TASK> [ 14.110513] [ 14.119956] Allocated by task 282: [ 14.120278] kasan_save_stack+0x45/0x70 [ 14.120430] kasan_save_track+0x18/0x40 [ 14.120832] kasan_save_alloc_info+0x3b/0x50 [ 14.121003] __kasan_kmalloc+0xb7/0xc0 [ 14.121138] __kmalloc_cache_noprof+0x189/0x420 [ 14.121333] kasan_atomics+0x95/0x310 [ 14.121525] kunit_try_run_case+0x1a5/0x480 [ 14.121954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.122273] kthread+0x337/0x6f0 [ 14.122414] ret_from_fork+0x116/0x1d0 [ 14.122684] ret_from_fork_asm+0x1a/0x30 [ 14.122833] [ 14.122907] The buggy address belongs to the object at ffff888103a18380 [ 14.122907] which belongs to the cache kmalloc-64 of size 64 [ 14.123558] The buggy address is located 0 bytes to the right of [ 14.123558] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.123926] [ 14.124150] The buggy address belongs to the physical page: [ 14.124446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.124850] flags: 0x200000000000000(node=0|zone=2) [ 14.125356] page_type: f5(slab) [ 14.125615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.125862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.126298] page dumped because: kasan: bad access detected [ 14.126889] [ 14.126995] Memory state around the buggy address: [ 14.127379] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.127692] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.127998] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.128359] ^ [ 14.128562] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.128953] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.129377] ================================================================== [ 14.153029] ================================================================== [ 14.153448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.154154] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.154828] [ 14.154987] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.155034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.155050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.155073] Call Trace: [ 14.155092] <TASK> [ 14.155113] dump_stack_lvl+0x73/0xb0 [ 14.155141] print_report+0xd1/0x650 [ 14.155164] ? __virt_addr_valid+0x1db/0x2d0 [ 14.155188] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.155210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.155271] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.155297] kasan_report+0x141/0x180 [ 14.155321] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.155378] kasan_check_range+0x10c/0x1c0 [ 14.155404] __kasan_check_write+0x18/0x20 [ 14.155436] kasan_atomics_helper+0x4a0/0x5450 [ 14.155517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.155547] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.155572] ? kasan_save_alloc_info+0x3b/0x50 [ 14.155597] ? kasan_atomics+0x152/0x310 [ 14.155627] kasan_atomics+0x1dc/0x310 [ 14.155652] ? __pfx_kasan_atomics+0x10/0x10 [ 14.155678] ? __pfx_read_tsc+0x10/0x10 [ 14.155699] ? ktime_get_ts64+0x86/0x230 [ 14.155725] kunit_try_run_case+0x1a5/0x480 [ 14.155749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155773] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.155798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.155824] ? __kthread_parkme+0x82/0x180 [ 14.155845] ? preempt_count_sub+0x50/0x80 [ 14.155870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.155919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.155957] kthread+0x337/0x6f0 [ 14.155978] ? trace_preempt_on+0x20/0xc0 [ 14.156002] ? __pfx_kthread+0x10/0x10 [ 14.156023] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.156046] ? calculate_sigpending+0x7b/0xa0 [ 14.156071] ? __pfx_kthread+0x10/0x10 [ 14.156093] ret_from_fork+0x116/0x1d0 [ 14.156113] ? __pfx_kthread+0x10/0x10 [ 14.156136] ret_from_fork_asm+0x1a/0x30 [ 14.156167] </TASK> [ 14.156180] [ 14.166855] Allocated by task 282: [ 14.167052] kasan_save_stack+0x45/0x70 [ 14.167519] kasan_save_track+0x18/0x40 [ 14.167862] kasan_save_alloc_info+0x3b/0x50 [ 14.168038] __kasan_kmalloc+0xb7/0xc0 [ 14.168246] __kmalloc_cache_noprof+0x189/0x420 [ 14.168654] kasan_atomics+0x95/0x310 [ 14.168877] kunit_try_run_case+0x1a5/0x480 [ 14.169106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.169585] kthread+0x337/0x6f0 [ 14.169796] ret_from_fork+0x116/0x1d0 [ 14.170059] ret_from_fork_asm+0x1a/0x30 [ 14.170282] [ 14.170370] The buggy address belongs to the object at ffff888103a18380 [ 14.170370] which belongs to the cache kmalloc-64 of size 64 [ 14.171285] The buggy address is located 0 bytes to the right of [ 14.171285] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.171861] [ 14.172033] The buggy address belongs to the physical page: [ 14.172423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.172908] flags: 0x200000000000000(node=0|zone=2) [ 14.173115] page_type: f5(slab) [ 14.173353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.173788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.174157] page dumped because: kasan: bad access detected [ 14.174369] [ 14.174469] Memory state around the buggy address: [ 14.174976] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.175570] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.176001] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.176433] ^ [ 14.176782] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.177121] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.177453] ================================================================== [ 14.669045] ================================================================== [ 14.669599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.670274] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.670895] [ 14.671149] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.671197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.671222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.671245] Call Trace: [ 14.671262] <TASK> [ 14.671278] dump_stack_lvl+0x73/0xb0 [ 14.671320] print_report+0xd1/0x650 [ 14.671344] ? __virt_addr_valid+0x1db/0x2d0 [ 14.671367] ? kasan_atomics_helper+0x1079/0x5450 [ 14.671390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.671414] ? kasan_atomics_helper+0x1079/0x5450 [ 14.671437] kasan_report+0x141/0x180 [ 14.671503] ? kasan_atomics_helper+0x1079/0x5450 [ 14.671533] kasan_check_range+0x10c/0x1c0 [ 14.671559] __kasan_check_write+0x18/0x20 [ 14.671580] kasan_atomics_helper+0x1079/0x5450 [ 14.671604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.671627] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.671654] ? kasan_save_alloc_info+0x3b/0x50 [ 14.671679] ? kasan_atomics+0x152/0x310 [ 14.671707] kasan_atomics+0x1dc/0x310 [ 14.671731] ? __pfx_kasan_atomics+0x10/0x10 [ 14.671758] ? __pfx_read_tsc+0x10/0x10 [ 14.671780] ? ktime_get_ts64+0x86/0x230 [ 14.671806] kunit_try_run_case+0x1a5/0x480 [ 14.671831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.671855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.671880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.671905] ? __kthread_parkme+0x82/0x180 [ 14.671928] ? preempt_count_sub+0x50/0x80 [ 14.671966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.671992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.672016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.672041] kthread+0x337/0x6f0 [ 14.672062] ? trace_preempt_on+0x20/0xc0 [ 14.672087] ? __pfx_kthread+0x10/0x10 [ 14.672109] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.672132] ? calculate_sigpending+0x7b/0xa0 [ 14.672157] ? __pfx_kthread+0x10/0x10 [ 14.672181] ret_from_fork+0x116/0x1d0 [ 14.672200] ? __pfx_kthread+0x10/0x10 [ 14.672223] ret_from_fork_asm+0x1a/0x30 [ 14.672255] </TASK> [ 14.672269] [ 14.686726] Allocated by task 282: [ 14.687090] kasan_save_stack+0x45/0x70 [ 14.687535] kasan_save_track+0x18/0x40 [ 14.687915] kasan_save_alloc_info+0x3b/0x50 [ 14.688324] __kasan_kmalloc+0xb7/0xc0 [ 14.688462] __kmalloc_cache_noprof+0x189/0x420 [ 14.688841] kasan_atomics+0x95/0x310 [ 14.689206] kunit_try_run_case+0x1a5/0x480 [ 14.689803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.690382] kthread+0x337/0x6f0 [ 14.690561] ret_from_fork+0x116/0x1d0 [ 14.690988] ret_from_fork_asm+0x1a/0x30 [ 14.691388] [ 14.691475] The buggy address belongs to the object at ffff888103a18380 [ 14.691475] which belongs to the cache kmalloc-64 of size 64 [ 14.691832] The buggy address is located 0 bytes to the right of [ 14.691832] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.692221] [ 14.692354] The buggy address belongs to the physical page: [ 14.692716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.693118] flags: 0x200000000000000(node=0|zone=2) [ 14.693340] page_type: f5(slab) [ 14.693475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.693901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.694239] page dumped because: kasan: bad access detected [ 14.694601] [ 14.694693] Memory state around the buggy address: [ 14.694967] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.695359] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.695635] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.695881] ^ [ 14.696114] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.696591] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.696808] ================================================================== [ 14.977242] ================================================================== [ 14.977565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.977986] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.978280] [ 14.978392] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.978437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.978451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.978475] Call Trace: [ 14.978495] <TASK> [ 14.978512] dump_stack_lvl+0x73/0xb0 [ 14.978540] print_report+0xd1/0x650 [ 14.978575] ? __virt_addr_valid+0x1db/0x2d0 [ 14.978601] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.978624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.978647] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.978671] kasan_report+0x141/0x180 [ 14.978695] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.978736] kasan_check_range+0x10c/0x1c0 [ 14.978761] __kasan_check_write+0x18/0x20 [ 14.978783] kasan_atomics_helper+0x16e7/0x5450 [ 14.978808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.978831] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.978857] ? kasan_save_alloc_info+0x3b/0x50 [ 14.978883] ? kasan_atomics+0x152/0x310 [ 14.978912] kasan_atomics+0x1dc/0x310 [ 14.978937] ? __pfx_kasan_atomics+0x10/0x10 [ 14.978974] ? __pfx_read_tsc+0x10/0x10 [ 14.978996] ? ktime_get_ts64+0x86/0x230 [ 14.979022] kunit_try_run_case+0x1a5/0x480 [ 14.979048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.979080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.979104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.979134] ? __kthread_parkme+0x82/0x180 [ 14.979156] ? preempt_count_sub+0x50/0x80 [ 14.979181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.979206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.979230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.979256] kthread+0x337/0x6f0 [ 14.979277] ? trace_preempt_on+0x20/0xc0 [ 14.979301] ? __pfx_kthread+0x10/0x10 [ 14.979324] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.979346] ? calculate_sigpending+0x7b/0xa0 [ 14.979371] ? __pfx_kthread+0x10/0x10 [ 14.979394] ret_from_fork+0x116/0x1d0 [ 14.979414] ? __pfx_kthread+0x10/0x10 [ 14.979436] ret_from_fork_asm+0x1a/0x30 [ 14.979468] </TASK> [ 14.979481] [ 14.986869] Allocated by task 282: [ 14.987070] kasan_save_stack+0x45/0x70 [ 14.987236] kasan_save_track+0x18/0x40 [ 14.987373] kasan_save_alloc_info+0x3b/0x50 [ 14.987529] __kasan_kmalloc+0xb7/0xc0 [ 14.987727] __kmalloc_cache_noprof+0x189/0x420 [ 14.987958] kasan_atomics+0x95/0x310 [ 14.988253] kunit_try_run_case+0x1a5/0x480 [ 14.988452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.988628] kthread+0x337/0x6f0 [ 14.988751] ret_from_fork+0x116/0x1d0 [ 14.988884] ret_from_fork_asm+0x1a/0x30 [ 14.989882] [ 14.990009] The buggy address belongs to the object at ffff888103a18380 [ 14.990009] which belongs to the cache kmalloc-64 of size 64 [ 14.991727] The buggy address is located 0 bytes to the right of [ 14.991727] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.993249] [ 14.993524] The buggy address belongs to the physical page: [ 14.993976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.995210] flags: 0x200000000000000(node=0|zone=2) [ 14.995628] page_type: f5(slab) [ 14.996129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.996604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.996844] page dumped because: kasan: bad access detected [ 14.997287] [ 14.997497] Memory state around the buggy address: [ 14.997957] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.998621] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.999270] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.999492] ^ [ 14.999650] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.999867] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000506] ================================================================== [ 15.052812] ================================================================== [ 15.053192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.053836] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.054205] [ 15.054302] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.054348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.054363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.054387] Call Trace: [ 15.054406] <TASK> [ 15.054437] dump_stack_lvl+0x73/0xb0 [ 15.054497] print_report+0xd1/0x650 [ 15.054521] ? __virt_addr_valid+0x1db/0x2d0 [ 15.054546] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.054568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.054592] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.054615] kasan_report+0x141/0x180 [ 15.054639] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.054667] kasan_check_range+0x10c/0x1c0 [ 15.054692] __kasan_check_write+0x18/0x20 [ 15.054713] kasan_atomics_helper+0x18b1/0x5450 [ 15.054737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.054776] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.054802] ? kasan_save_alloc_info+0x3b/0x50 [ 15.054838] ? kasan_atomics+0x152/0x310 [ 15.054867] kasan_atomics+0x1dc/0x310 [ 15.054891] ? __pfx_kasan_atomics+0x10/0x10 [ 15.054917] ? __pfx_read_tsc+0x10/0x10 [ 15.054951] ? ktime_get_ts64+0x86/0x230 [ 15.054977] kunit_try_run_case+0x1a5/0x480 [ 15.055002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.055026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.055050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.055085] ? __kthread_parkme+0x82/0x180 [ 15.055107] ? preempt_count_sub+0x50/0x80 [ 15.055155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.055180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.055205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.055229] kthread+0x337/0x6f0 [ 15.055251] ? trace_preempt_on+0x20/0xc0 [ 15.055276] ? __pfx_kthread+0x10/0x10 [ 15.055319] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.055342] ? calculate_sigpending+0x7b/0xa0 [ 15.055367] ? __pfx_kthread+0x10/0x10 [ 15.055391] ret_from_fork+0x116/0x1d0 [ 15.055411] ? __pfx_kthread+0x10/0x10 [ 15.055433] ret_from_fork_asm+0x1a/0x30 [ 15.055465] </TASK> [ 15.055478] [ 15.066452] Allocated by task 282: [ 15.066641] kasan_save_stack+0x45/0x70 [ 15.066835] kasan_save_track+0x18/0x40 [ 15.067029] kasan_save_alloc_info+0x3b/0x50 [ 15.067752] __kasan_kmalloc+0xb7/0xc0 [ 15.067973] __kmalloc_cache_noprof+0x189/0x420 [ 15.068445] kasan_atomics+0x95/0x310 [ 15.068807] kunit_try_run_case+0x1a5/0x480 [ 15.069025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.069688] kthread+0x337/0x6f0 [ 15.069900] ret_from_fork+0x116/0x1d0 [ 15.070269] ret_from_fork_asm+0x1a/0x30 [ 15.070473] [ 15.070571] The buggy address belongs to the object at ffff888103a18380 [ 15.070571] which belongs to the cache kmalloc-64 of size 64 [ 15.071065] The buggy address is located 0 bytes to the right of [ 15.071065] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.071589] [ 15.071686] The buggy address belongs to the physical page: [ 15.071925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.072696] flags: 0x200000000000000(node=0|zone=2) [ 15.073089] page_type: f5(slab) [ 15.073392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.073898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.074602] page dumped because: kasan: bad access detected [ 15.075072] [ 15.075237] Memory state around the buggy address: [ 15.075455] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.075749] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.076053] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.076348] ^ [ 15.076557] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.076848] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.077538] ================================================================== [ 15.284186] ================================================================== [ 15.284539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.284880] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.285231] [ 15.285343] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.285385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.285399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.285421] Call Trace: [ 15.285438] <TASK> [ 15.285456] dump_stack_lvl+0x73/0xb0 [ 15.285484] print_report+0xd1/0x650 [ 15.285507] ? __virt_addr_valid+0x1db/0x2d0 [ 15.285531] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.285554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.285576] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.285600] kasan_report+0x141/0x180 [ 15.285623] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.285650] kasan_check_range+0x10c/0x1c0 [ 15.285674] __kasan_check_write+0x18/0x20 [ 15.285695] kasan_atomics_helper+0x1f43/0x5450 [ 15.285719] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.285741] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.285767] ? kasan_save_alloc_info+0x3b/0x50 [ 15.285791] ? kasan_atomics+0x152/0x310 [ 15.285818] kasan_atomics+0x1dc/0x310 [ 15.285842] ? __pfx_kasan_atomics+0x10/0x10 [ 15.285868] ? __pfx_read_tsc+0x10/0x10 [ 15.285908] ? ktime_get_ts64+0x86/0x230 [ 15.285933] kunit_try_run_case+0x1a5/0x480 [ 15.285970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.285994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.286018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.286043] ? __kthread_parkme+0x82/0x180 [ 15.286066] ? preempt_count_sub+0x50/0x80 [ 15.286090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.286115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.286177] kthread+0x337/0x6f0 [ 15.286199] ? trace_preempt_on+0x20/0xc0 [ 15.286224] ? __pfx_kthread+0x10/0x10 [ 15.286245] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.286268] ? calculate_sigpending+0x7b/0xa0 [ 15.286293] ? __pfx_kthread+0x10/0x10 [ 15.286316] ret_from_fork+0x116/0x1d0 [ 15.286336] ? __pfx_kthread+0x10/0x10 [ 15.286358] ret_from_fork_asm+0x1a/0x30 [ 15.286391] </TASK> [ 15.286403] [ 15.294260] Allocated by task 282: [ 15.294453] kasan_save_stack+0x45/0x70 [ 15.294656] kasan_save_track+0x18/0x40 [ 15.294861] kasan_save_alloc_info+0x3b/0x50 [ 15.295095] __kasan_kmalloc+0xb7/0xc0 [ 15.295273] __kmalloc_cache_noprof+0x189/0x420 [ 15.295441] kasan_atomics+0x95/0x310 [ 15.295577] kunit_try_run_case+0x1a5/0x480 [ 15.295724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.295900] kthread+0x337/0x6f0 [ 15.296034] ret_from_fork+0x116/0x1d0 [ 15.296426] ret_from_fork_asm+0x1a/0x30 [ 15.296629] [ 15.296727] The buggy address belongs to the object at ffff888103a18380 [ 15.296727] which belongs to the cache kmalloc-64 of size 64 [ 15.297406] The buggy address is located 0 bytes to the right of [ 15.297406] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.297895] [ 15.298244] The buggy address belongs to the physical page: [ 15.299692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.300134] flags: 0x200000000000000(node=0|zone=2) [ 15.300307] page_type: f5(slab) [ 15.300439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.300682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.300921] page dumped because: kasan: bad access detected [ 15.301226] [ 15.301321] Memory state around the buggy address: [ 15.301489] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.301748] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.302094] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.302340] ^ [ 15.302550] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302880] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.303194] ================================================================== [ 14.577815] ================================================================== [ 14.578341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.578780] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.579033] [ 14.579268] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.579315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.579341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.579365] Call Trace: [ 14.579381] <TASK> [ 14.579399] dump_stack_lvl+0x73/0xb0 [ 14.579439] print_report+0xd1/0x650 [ 14.579486] ? __virt_addr_valid+0x1db/0x2d0 [ 14.579510] ? kasan_atomics_helper+0xf10/0x5450 [ 14.579543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.579567] ? kasan_atomics_helper+0xf10/0x5450 [ 14.579590] kasan_report+0x141/0x180 [ 14.579614] ? kasan_atomics_helper+0xf10/0x5450 [ 14.579642] kasan_check_range+0x10c/0x1c0 [ 14.579667] __kasan_check_write+0x18/0x20 [ 14.579688] kasan_atomics_helper+0xf10/0x5450 [ 14.579712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.579735] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.579760] ? kasan_save_alloc_info+0x3b/0x50 [ 14.579785] ? kasan_atomics+0x152/0x310 [ 14.579813] kasan_atomics+0x1dc/0x310 [ 14.579837] ? __pfx_kasan_atomics+0x10/0x10 [ 14.579863] ? __pfx_read_tsc+0x10/0x10 [ 14.579885] ? ktime_get_ts64+0x86/0x230 [ 14.579918] kunit_try_run_case+0x1a5/0x480 [ 14.579957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.579982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.580006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.580031] ? __kthread_parkme+0x82/0x180 [ 14.580067] ? preempt_count_sub+0x50/0x80 [ 14.580093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.580117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.580141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.580166] kthread+0x337/0x6f0 [ 14.580187] ? trace_preempt_on+0x20/0xc0 [ 14.580211] ? __pfx_kthread+0x10/0x10 [ 14.580233] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.580257] ? calculate_sigpending+0x7b/0xa0 [ 14.580282] ? __pfx_kthread+0x10/0x10 [ 14.580306] ret_from_fork+0x116/0x1d0 [ 14.580326] ? __pfx_kthread+0x10/0x10 [ 14.580348] ret_from_fork_asm+0x1a/0x30 [ 14.580381] </TASK> [ 14.580394] [ 14.594889] Allocated by task 282: [ 14.595036] kasan_save_stack+0x45/0x70 [ 14.595188] kasan_save_track+0x18/0x40 [ 14.595326] kasan_save_alloc_info+0x3b/0x50 [ 14.595476] __kasan_kmalloc+0xb7/0xc0 [ 14.595610] __kmalloc_cache_noprof+0x189/0x420 [ 14.595769] kasan_atomics+0x95/0x310 [ 14.595903] kunit_try_run_case+0x1a5/0x480 [ 14.596347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.596836] kthread+0x337/0x6f0 [ 14.597227] ret_from_fork+0x116/0x1d0 [ 14.597692] ret_from_fork_asm+0x1a/0x30 [ 14.598067] [ 14.598226] The buggy address belongs to the object at ffff888103a18380 [ 14.598226] which belongs to the cache kmalloc-64 of size 64 [ 14.600933] The buggy address is located 0 bytes to the right of [ 14.600933] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.602287] [ 14.602411] The buggy address belongs to the physical page: [ 14.602595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.602838] flags: 0x200000000000000(node=0|zone=2) [ 14.603793] page_type: f5(slab) [ 14.604988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.606162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.607169] page dumped because: kasan: bad access detected [ 14.607508] [ 14.607718] Memory state around the buggy address: [ 14.607895] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.608864] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.609233] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.609740] ^ [ 14.610093] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610509] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610987] ================================================================== [ 14.083402] ================================================================== [ 14.085039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.085784] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.086045] [ 14.086148] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.086196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.086210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.086233] Call Trace: [ 14.086250] <TASK> [ 14.086266] dump_stack_lvl+0x73/0xb0 [ 14.086296] print_report+0xd1/0x650 [ 14.086319] ? __virt_addr_valid+0x1db/0x2d0 [ 14.086343] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.086365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.086389] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.086411] kasan_report+0x141/0x180 [ 14.086435] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.086462] __asan_report_store4_noabort+0x1b/0x30 [ 14.086484] kasan_atomics_helper+0x4b6e/0x5450 [ 14.086508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.086531] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.086556] ? kasan_save_alloc_info+0x3b/0x50 [ 14.086582] ? kasan_atomics+0x152/0x310 [ 14.086610] kasan_atomics+0x1dc/0x310 [ 14.086633] ? __pfx_kasan_atomics+0x10/0x10 [ 14.086659] ? __pfx_read_tsc+0x10/0x10 [ 14.086681] ? ktime_get_ts64+0x86/0x230 [ 14.086706] kunit_try_run_case+0x1a5/0x480 [ 14.086731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.086755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.086780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.086805] ? __kthread_parkme+0x82/0x180 [ 14.086827] ? preempt_count_sub+0x50/0x80 [ 14.086851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.086876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.086900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.086925] kthread+0x337/0x6f0 [ 14.086957] ? trace_preempt_on+0x20/0xc0 [ 14.086982] ? __pfx_kthread+0x10/0x10 [ 14.087003] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.087026] ? calculate_sigpending+0x7b/0xa0 [ 14.087050] ? __pfx_kthread+0x10/0x10 [ 14.087073] ret_from_fork+0x116/0x1d0 [ 14.087093] ? __pfx_kthread+0x10/0x10 [ 14.087121] ret_from_fork_asm+0x1a/0x30 [ 14.087153] </TASK> [ 14.087166] [ 14.097716] Allocated by task 282: [ 14.097859] kasan_save_stack+0x45/0x70 [ 14.098085] kasan_save_track+0x18/0x40 [ 14.098311] kasan_save_alloc_info+0x3b/0x50 [ 14.098654] __kasan_kmalloc+0xb7/0xc0 [ 14.098860] __kmalloc_cache_noprof+0x189/0x420 [ 14.099035] kasan_atomics+0x95/0x310 [ 14.099178] kunit_try_run_case+0x1a5/0x480 [ 14.099416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.099674] kthread+0x337/0x6f0 [ 14.099847] ret_from_fork+0x116/0x1d0 [ 14.100227] ret_from_fork_asm+0x1a/0x30 [ 14.100379] [ 14.100454] The buggy address belongs to the object at ffff888103a18380 [ 14.100454] which belongs to the cache kmalloc-64 of size 64 [ 14.101182] The buggy address is located 0 bytes to the right of [ 14.101182] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.101776] [ 14.101875] The buggy address belongs to the physical page: [ 14.102139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.102526] flags: 0x200000000000000(node=0|zone=2) [ 14.102773] page_type: f5(slab) [ 14.102897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.103279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.103879] page dumped because: kasan: bad access detected [ 14.104074] [ 14.104202] Memory state around the buggy address: [ 14.104458] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.104747] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.105181] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.105399] ^ [ 14.105576] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.106012] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.106537] ================================================================== [ 15.353146] ================================================================== [ 15.353418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.354554] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.354879] [ 15.355080] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.355139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.355154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.355178] Call Trace: [ 15.355196] <TASK> [ 15.355213] dump_stack_lvl+0x73/0xb0 [ 15.355244] print_report+0xd1/0x650 [ 15.355267] ? __virt_addr_valid+0x1db/0x2d0 [ 15.355291] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.355314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.355338] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.355361] kasan_report+0x141/0x180 [ 15.355384] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.355412] __asan_report_load8_noabort+0x18/0x20 [ 15.355437] kasan_atomics_helper+0x4f98/0x5450 [ 15.355461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.355484] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.355511] ? kasan_save_alloc_info+0x3b/0x50 [ 15.355535] ? kasan_atomics+0x152/0x310 [ 15.355564] kasan_atomics+0x1dc/0x310 [ 15.355588] ? __pfx_kasan_atomics+0x10/0x10 [ 15.355613] ? __pfx_read_tsc+0x10/0x10 [ 15.355636] ? ktime_get_ts64+0x86/0x230 [ 15.355661] kunit_try_run_case+0x1a5/0x480 [ 15.355686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.355709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.355735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.355759] ? __kthread_parkme+0x82/0x180 [ 15.355779] ? preempt_count_sub+0x50/0x80 [ 15.355804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.355829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.355853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.355878] kthread+0x337/0x6f0 [ 15.355899] ? trace_preempt_on+0x20/0xc0 [ 15.355924] ? __pfx_kthread+0x10/0x10 [ 15.355957] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.355979] ? calculate_sigpending+0x7b/0xa0 [ 15.356004] ? __pfx_kthread+0x10/0x10 [ 15.356027] ret_from_fork+0x116/0x1d0 [ 15.356046] ? __pfx_kthread+0x10/0x10 [ 15.356082] ret_from_fork_asm+0x1a/0x30 [ 15.356114] </TASK> [ 15.356127] [ 15.365662] Allocated by task 282: [ 15.365845] kasan_save_stack+0x45/0x70 [ 15.366012] kasan_save_track+0x18/0x40 [ 15.366390] kasan_save_alloc_info+0x3b/0x50 [ 15.366671] __kasan_kmalloc+0xb7/0xc0 [ 15.366820] __kmalloc_cache_noprof+0x189/0x420 [ 15.367253] kasan_atomics+0x95/0x310 [ 15.367527] kunit_try_run_case+0x1a5/0x480 [ 15.367723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.368103] kthread+0x337/0x6f0 [ 15.368261] ret_from_fork+0x116/0x1d0 [ 15.368427] ret_from_fork_asm+0x1a/0x30 [ 15.368605] [ 15.368692] The buggy address belongs to the object at ffff888103a18380 [ 15.368692] which belongs to the cache kmalloc-64 of size 64 [ 15.369600] The buggy address is located 0 bytes to the right of [ 15.369600] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.370304] [ 15.370561] The buggy address belongs to the physical page: [ 15.370835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.371336] flags: 0x200000000000000(node=0|zone=2) [ 15.371667] page_type: f5(slab) [ 15.371959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.372521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.372965] page dumped because: kasan: bad access detected [ 15.373429] [ 15.373635] Memory state around the buggy address: [ 15.373924] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.374475] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.374885] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.375389] ^ [ 15.375625] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.375965] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.376445] ================================================================== [ 15.462693] ================================================================== [ 15.463073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.463406] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.464083] [ 15.464214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.464260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.464275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.464297] Call Trace: [ 15.464315] <TASK> [ 15.464332] dump_stack_lvl+0x73/0xb0 [ 15.464363] print_report+0xd1/0x650 [ 15.464387] ? __virt_addr_valid+0x1db/0x2d0 [ 15.464410] ? kasan_atomics_helper+0x224c/0x5450 [ 15.464433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.464458] ? kasan_atomics_helper+0x224c/0x5450 [ 15.464481] kasan_report+0x141/0x180 [ 15.464505] ? kasan_atomics_helper+0x224c/0x5450 [ 15.464532] kasan_check_range+0x10c/0x1c0 [ 15.464558] __kasan_check_write+0x18/0x20 [ 15.464580] kasan_atomics_helper+0x224c/0x5450 [ 15.464604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.464627] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.464652] ? kasan_save_alloc_info+0x3b/0x50 [ 15.464677] ? kasan_atomics+0x152/0x310 [ 15.464705] kasan_atomics+0x1dc/0x310 [ 15.464730] ? __pfx_kasan_atomics+0x10/0x10 [ 15.464755] ? __pfx_read_tsc+0x10/0x10 [ 15.464778] ? ktime_get_ts64+0x86/0x230 [ 15.464803] kunit_try_run_case+0x1a5/0x480 [ 15.464830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.464854] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.464878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.464902] ? __kthread_parkme+0x82/0x180 [ 15.464924] ? preempt_count_sub+0x50/0x80 [ 15.464961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.464986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.465012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.465036] kthread+0x337/0x6f0 [ 15.465056] ? trace_preempt_on+0x20/0xc0 [ 15.465090] ? __pfx_kthread+0x10/0x10 [ 15.465113] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.465135] ? calculate_sigpending+0x7b/0xa0 [ 15.465160] ? __pfx_kthread+0x10/0x10 [ 15.465184] ret_from_fork+0x116/0x1d0 [ 15.465204] ? __pfx_kthread+0x10/0x10 [ 15.465226] ret_from_fork_asm+0x1a/0x30 [ 15.465259] </TASK> [ 15.465272] [ 15.475889] Allocated by task 282: [ 15.476303] kasan_save_stack+0x45/0x70 [ 15.476626] kasan_save_track+0x18/0x40 [ 15.476996] kasan_save_alloc_info+0x3b/0x50 [ 15.477329] __kasan_kmalloc+0xb7/0xc0 [ 15.477635] __kmalloc_cache_noprof+0x189/0x420 [ 15.477856] kasan_atomics+0x95/0x310 [ 15.478043] kunit_try_run_case+0x1a5/0x480 [ 15.478494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.478840] kthread+0x337/0x6f0 [ 15.479214] ret_from_fork+0x116/0x1d0 [ 15.479409] ret_from_fork_asm+0x1a/0x30 [ 15.479600] [ 15.479694] The buggy address belongs to the object at ffff888103a18380 [ 15.479694] which belongs to the cache kmalloc-64 of size 64 [ 15.480445] The buggy address is located 0 bytes to the right of [ 15.480445] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.481361] [ 15.481579] The buggy address belongs to the physical page: [ 15.481951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.482688] flags: 0x200000000000000(node=0|zone=2) [ 15.483164] page_type: f5(slab) [ 15.483418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.483924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.484375] page dumped because: kasan: bad access detected [ 15.484614] [ 15.484707] Memory state around the buggy address: [ 15.484920] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.485492] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.486091] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.486583] ^ [ 15.487053] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.487407] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.487709] ================================================================== [ 14.247487] ================================================================== [ 14.248008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.248461] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.248880] [ 14.248987] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.249034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.249048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.249073] Call Trace: [ 14.249090] <TASK> [ 14.249107] dump_stack_lvl+0x73/0xb0 [ 14.249136] print_report+0xd1/0x650 [ 14.249159] ? __virt_addr_valid+0x1db/0x2d0 [ 14.249184] ? kasan_atomics_helper+0x697/0x5450 [ 14.249207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.249230] ? kasan_atomics_helper+0x697/0x5450 [ 14.249254] kasan_report+0x141/0x180 [ 14.249278] ? kasan_atomics_helper+0x697/0x5450 [ 14.249306] kasan_check_range+0x10c/0x1c0 [ 14.249331] __kasan_check_write+0x18/0x20 [ 14.249352] kasan_atomics_helper+0x697/0x5450 [ 14.249376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.249399] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.249425] ? kasan_save_alloc_info+0x3b/0x50 [ 14.249449] ? kasan_atomics+0x152/0x310 [ 14.249478] kasan_atomics+0x1dc/0x310 [ 14.249502] ? __pfx_kasan_atomics+0x10/0x10 [ 14.249529] ? __pfx_read_tsc+0x10/0x10 [ 14.249551] ? ktime_get_ts64+0x86/0x230 [ 14.249576] kunit_try_run_case+0x1a5/0x480 [ 14.249600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.249624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.249648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.249674] ? __kthread_parkme+0x82/0x180 [ 14.249695] ? preempt_count_sub+0x50/0x80 [ 14.249720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.249746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.249770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.249795] kthread+0x337/0x6f0 [ 14.249816] ? trace_preempt_on+0x20/0xc0 [ 14.249841] ? __pfx_kthread+0x10/0x10 [ 14.249862] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.249885] ? calculate_sigpending+0x7b/0xa0 [ 14.249910] ? __pfx_kthread+0x10/0x10 [ 14.249933] ret_from_fork+0x116/0x1d0 [ 14.249963] ? __pfx_kthread+0x10/0x10 [ 14.249985] ret_from_fork_asm+0x1a/0x30 [ 14.250017] </TASK> [ 14.250030] [ 14.257971] Allocated by task 282: [ 14.258274] kasan_save_stack+0x45/0x70 [ 14.258541] kasan_save_track+0x18/0x40 [ 14.258747] kasan_save_alloc_info+0x3b/0x50 [ 14.258974] __kasan_kmalloc+0xb7/0xc0 [ 14.259243] __kmalloc_cache_noprof+0x189/0x420 [ 14.259468] kasan_atomics+0x95/0x310 [ 14.259667] kunit_try_run_case+0x1a5/0x480 [ 14.260016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.260271] kthread+0x337/0x6f0 [ 14.260422] ret_from_fork+0x116/0x1d0 [ 14.260558] ret_from_fork_asm+0x1a/0x30 [ 14.260701] [ 14.260773] The buggy address belongs to the object at ffff888103a18380 [ 14.260773] which belongs to the cache kmalloc-64 of size 64 [ 14.261123] The buggy address is located 0 bytes to the right of [ 14.261123] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.261475] [ 14.261548] The buggy address belongs to the physical page: [ 14.261754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.262386] flags: 0x200000000000000(node=0|zone=2) [ 14.262809] page_type: f5(slab) [ 14.263001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.263546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.264003] page dumped because: kasan: bad access detected [ 14.264604] [ 14.264759] Memory state around the buggy address: [ 14.265043] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.265378] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.265965] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.266356] ^ [ 14.266738] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.267231] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.267667] ================================================================== [ 14.462395] ================================================================== [ 14.463072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.463426] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.463776] [ 14.463889] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.463934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.463958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.463981] Call Trace: [ 14.463998] <TASK> [ 14.464014] dump_stack_lvl+0x73/0xb0 [ 14.464045] print_report+0xd1/0x650 [ 14.464086] ? __virt_addr_valid+0x1db/0x2d0 [ 14.464111] ? kasan_atomics_helper+0xc70/0x5450 [ 14.464133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.464157] ? kasan_atomics_helper+0xc70/0x5450 [ 14.464180] kasan_report+0x141/0x180 [ 14.464204] ? kasan_atomics_helper+0xc70/0x5450 [ 14.464232] kasan_check_range+0x10c/0x1c0 [ 14.464257] __kasan_check_write+0x18/0x20 [ 14.464278] kasan_atomics_helper+0xc70/0x5450 [ 14.464301] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.464325] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.464351] ? kasan_save_alloc_info+0x3b/0x50 [ 14.464374] ? kasan_atomics+0x152/0x310 [ 14.464403] kasan_atomics+0x1dc/0x310 [ 14.464426] ? __pfx_kasan_atomics+0x10/0x10 [ 14.464452] ? __pfx_read_tsc+0x10/0x10 [ 14.464474] ? ktime_get_ts64+0x86/0x230 [ 14.464500] kunit_try_run_case+0x1a5/0x480 [ 14.464525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.464548] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.464572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.464597] ? __kthread_parkme+0x82/0x180 [ 14.464618] ? preempt_count_sub+0x50/0x80 [ 14.464643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.464667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.464691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.464716] kthread+0x337/0x6f0 [ 14.464736] ? trace_preempt_on+0x20/0xc0 [ 14.464760] ? __pfx_kthread+0x10/0x10 [ 14.464783] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.464804] ? calculate_sigpending+0x7b/0xa0 [ 14.464829] ? __pfx_kthread+0x10/0x10 [ 14.464852] ret_from_fork+0x116/0x1d0 [ 14.464871] ? __pfx_kthread+0x10/0x10 [ 14.464894] ret_from_fork_asm+0x1a/0x30 [ 14.464926] </TASK> [ 14.464948] [ 14.472932] Allocated by task 282: [ 14.473190] kasan_save_stack+0x45/0x70 [ 14.473395] kasan_save_track+0x18/0x40 [ 14.473893] kasan_save_alloc_info+0x3b/0x50 [ 14.474215] __kasan_kmalloc+0xb7/0xc0 [ 14.474368] __kmalloc_cache_noprof+0x189/0x420 [ 14.474727] kasan_atomics+0x95/0x310 [ 14.474918] kunit_try_run_case+0x1a5/0x480 [ 14.475168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.475355] kthread+0x337/0x6f0 [ 14.475478] ret_from_fork+0x116/0x1d0 [ 14.475614] ret_from_fork_asm+0x1a/0x30 [ 14.475806] [ 14.475906] The buggy address belongs to the object at ffff888103a18380 [ 14.475906] which belongs to the cache kmalloc-64 of size 64 [ 14.476418] The buggy address is located 0 bytes to the right of [ 14.476418] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.477257] [ 14.477359] The buggy address belongs to the physical page: [ 14.477750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.478014] flags: 0x200000000000000(node=0|zone=2) [ 14.478182] page_type: f5(slab) [ 14.478450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.478796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.479154] page dumped because: kasan: bad access detected [ 14.479411] [ 14.479508] Memory state around the buggy address: [ 14.479839] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.480190] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.480582] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.480830] ^ [ 14.480998] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.481772] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.482045] ================================================================== [ 15.183340] ================================================================== [ 15.183826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.184375] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.184747] [ 15.184844] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.184886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.184900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.184922] Call Trace: [ 15.184949] <TASK> [ 15.184963] dump_stack_lvl+0x73/0xb0 [ 15.184993] print_report+0xd1/0x650 [ 15.185016] ? __virt_addr_valid+0x1db/0x2d0 [ 15.185039] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.185061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.185097] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.185121] kasan_report+0x141/0x180 [ 15.185144] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.185173] __asan_report_load8_noabort+0x18/0x20 [ 15.185198] kasan_atomics_helper+0x4f30/0x5450 [ 15.185223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.185246] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.185273] ? kasan_save_alloc_info+0x3b/0x50 [ 15.185298] ? kasan_atomics+0x152/0x310 [ 15.185326] kasan_atomics+0x1dc/0x310 [ 15.185351] ? __pfx_kasan_atomics+0x10/0x10 [ 15.185377] ? __pfx_read_tsc+0x10/0x10 [ 15.185400] ? ktime_get_ts64+0x86/0x230 [ 15.185427] kunit_try_run_case+0x1a5/0x480 [ 15.185453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.185478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.185504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.185531] ? __kthread_parkme+0x82/0x180 [ 15.185552] ? preempt_count_sub+0x50/0x80 [ 15.185578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.185604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.185628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.185653] kthread+0x337/0x6f0 [ 15.185676] ? trace_preempt_on+0x20/0xc0 [ 15.185701] ? __pfx_kthread+0x10/0x10 [ 15.185724] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.185746] ? calculate_sigpending+0x7b/0xa0 [ 15.185772] ? __pfx_kthread+0x10/0x10 [ 15.185794] ret_from_fork+0x116/0x1d0 [ 15.185814] ? __pfx_kthread+0x10/0x10 [ 15.185837] ret_from_fork_asm+0x1a/0x30 [ 15.185868] </TASK> [ 15.185882] [ 15.193383] Allocated by task 282: [ 15.193572] kasan_save_stack+0x45/0x70 [ 15.193775] kasan_save_track+0x18/0x40 [ 15.193955] kasan_save_alloc_info+0x3b/0x50 [ 15.194178] __kasan_kmalloc+0xb7/0xc0 [ 15.194316] __kmalloc_cache_noprof+0x189/0x420 [ 15.194542] kasan_atomics+0x95/0x310 [ 15.194734] kunit_try_run_case+0x1a5/0x480 [ 15.194883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.195069] kthread+0x337/0x6f0 [ 15.195264] ret_from_fork+0x116/0x1d0 [ 15.195458] ret_from_fork_asm+0x1a/0x30 [ 15.195658] [ 15.195757] The buggy address belongs to the object at ffff888103a18380 [ 15.195757] which belongs to the cache kmalloc-64 of size 64 [ 15.196158] The buggy address is located 0 bytes to the right of [ 15.196158] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.196725] [ 15.196826] The buggy address belongs to the physical page: [ 15.197114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.197404] flags: 0x200000000000000(node=0|zone=2) [ 15.197620] page_type: f5(slab) [ 15.197792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.198133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.198375] page dumped because: kasan: bad access detected [ 15.198550] [ 15.198624] Memory state around the buggy address: [ 15.198780] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199110] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199441] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.199755] ^ [ 15.199913] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200138] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200354] ================================================================== [ 15.120293] ================================================================== [ 15.121400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.121662] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.121893] [ 15.121998] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.122043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.122065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.122086] Call Trace: [ 15.122104] <TASK> [ 15.122122] dump_stack_lvl+0x73/0xb0 [ 15.122152] print_report+0xd1/0x650 [ 15.122175] ? __virt_addr_valid+0x1db/0x2d0 [ 15.122199] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.122223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.122247] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.122270] kasan_report+0x141/0x180 [ 15.122293] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.122321] kasan_check_range+0x10c/0x1c0 [ 15.122347] __kasan_check_write+0x18/0x20 [ 15.122368] kasan_atomics_helper+0x1a7f/0x5450 [ 15.122392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.122415] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.122441] ? kasan_save_alloc_info+0x3b/0x50 [ 15.122466] ? kasan_atomics+0x152/0x310 [ 15.122494] kasan_atomics+0x1dc/0x310 [ 15.122518] ? __pfx_kasan_atomics+0x10/0x10 [ 15.122543] ? __pfx_read_tsc+0x10/0x10 [ 15.122565] ? ktime_get_ts64+0x86/0x230 [ 15.122591] kunit_try_run_case+0x1a5/0x480 [ 15.122617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.122642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.122667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.122691] ? __kthread_parkme+0x82/0x180 [ 15.122713] ? preempt_count_sub+0x50/0x80 [ 15.122739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.122765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.122789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.122814] kthread+0x337/0x6f0 [ 15.122836] ? trace_preempt_on+0x20/0xc0 [ 15.122860] ? __pfx_kthread+0x10/0x10 [ 15.122882] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.122905] ? calculate_sigpending+0x7b/0xa0 [ 15.122929] ? __pfx_kthread+0x10/0x10 [ 15.123262] ret_from_fork+0x116/0x1d0 [ 15.123287] ? __pfx_kthread+0x10/0x10 [ 15.123312] ret_from_fork_asm+0x1a/0x30 [ 15.123526] </TASK> [ 15.123551] [ 15.136193] Allocated by task 282: [ 15.136517] kasan_save_stack+0x45/0x70 [ 15.136793] kasan_save_track+0x18/0x40 [ 15.136990] kasan_save_alloc_info+0x3b/0x50 [ 15.137336] __kasan_kmalloc+0xb7/0xc0 [ 15.137489] __kmalloc_cache_noprof+0x189/0x420 [ 15.137828] kasan_atomics+0x95/0x310 [ 15.138036] kunit_try_run_case+0x1a5/0x480 [ 15.138338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.138664] kthread+0x337/0x6f0 [ 15.138829] ret_from_fork+0x116/0x1d0 [ 15.139161] ret_from_fork_asm+0x1a/0x30 [ 15.139400] [ 15.139486] The buggy address belongs to the object at ffff888103a18380 [ 15.139486] which belongs to the cache kmalloc-64 of size 64 [ 15.140002] The buggy address is located 0 bytes to the right of [ 15.140002] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.140764] [ 15.140987] The buggy address belongs to the physical page: [ 15.141231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.141726] flags: 0x200000000000000(node=0|zone=2) [ 15.142014] page_type: f5(slab) [ 15.142237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.142661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.142991] page dumped because: kasan: bad access detected [ 15.143398] [ 15.143480] Memory state around the buggy address: [ 15.143827] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.144174] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.144561] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.144922] ^ [ 15.145172] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.145470] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.145765] ================================================================== [ 14.422709] ================================================================== [ 14.423058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.423406] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.423699] [ 14.423983] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.424032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.424046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.424069] Call Trace: [ 14.424085] <TASK> [ 14.424102] dump_stack_lvl+0x73/0xb0 [ 14.424132] print_report+0xd1/0x650 [ 14.424156] ? __virt_addr_valid+0x1db/0x2d0 [ 14.424180] ? kasan_atomics_helper+0xac7/0x5450 [ 14.424201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.424225] ? kasan_atomics_helper+0xac7/0x5450 [ 14.424248] kasan_report+0x141/0x180 [ 14.424272] ? kasan_atomics_helper+0xac7/0x5450 [ 14.424299] kasan_check_range+0x10c/0x1c0 [ 14.424325] __kasan_check_write+0x18/0x20 [ 14.424345] kasan_atomics_helper+0xac7/0x5450 [ 14.424369] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.424392] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.424417] ? kasan_save_alloc_info+0x3b/0x50 [ 14.424442] ? kasan_atomics+0x152/0x310 [ 14.424471] kasan_atomics+0x1dc/0x310 [ 14.424498] ? __pfx_kasan_atomics+0x10/0x10 [ 14.424526] ? __pfx_read_tsc+0x10/0x10 [ 14.424548] ? ktime_get_ts64+0x86/0x230 [ 14.424573] kunit_try_run_case+0x1a5/0x480 [ 14.424598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.424622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.424647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.424671] ? __kthread_parkme+0x82/0x180 [ 14.424746] ? preempt_count_sub+0x50/0x80 [ 14.424775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.424801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.424825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.424849] kthread+0x337/0x6f0 [ 14.424871] ? trace_preempt_on+0x20/0xc0 [ 14.424895] ? __pfx_kthread+0x10/0x10 [ 14.424917] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.424950] ? calculate_sigpending+0x7b/0xa0 [ 14.424976] ? __pfx_kthread+0x10/0x10 [ 14.424999] ret_from_fork+0x116/0x1d0 [ 14.425019] ? __pfx_kthread+0x10/0x10 [ 14.425041] ret_from_fork_asm+0x1a/0x30 [ 14.425083] </TASK> [ 14.425096] [ 14.433760] Allocated by task 282: [ 14.433962] kasan_save_stack+0x45/0x70 [ 14.434171] kasan_save_track+0x18/0x40 [ 14.434331] kasan_save_alloc_info+0x3b/0x50 [ 14.434633] __kasan_kmalloc+0xb7/0xc0 [ 14.434832] __kmalloc_cache_noprof+0x189/0x420 [ 14.435049] kasan_atomics+0x95/0x310 [ 14.435234] kunit_try_run_case+0x1a5/0x480 [ 14.435417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.435827] kthread+0x337/0x6f0 [ 14.436034] ret_from_fork+0x116/0x1d0 [ 14.436191] ret_from_fork_asm+0x1a/0x30 [ 14.436400] [ 14.436502] The buggy address belongs to the object at ffff888103a18380 [ 14.436502] which belongs to the cache kmalloc-64 of size 64 [ 14.437051] The buggy address is located 0 bytes to the right of [ 14.437051] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.437552] [ 14.437700] The buggy address belongs to the physical page: [ 14.437902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.438303] flags: 0x200000000000000(node=0|zone=2) [ 14.438571] page_type: f5(slab) [ 14.438698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.439039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.439390] page dumped because: kasan: bad access detected [ 14.439569] [ 14.439642] Memory state around the buggy address: [ 14.439800] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.440031] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.440330] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.441060] ^ [ 14.441314] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.441670] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.441965] ================================================================== [ 14.772800] ================================================================== [ 14.773249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.773622] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.773846] [ 14.773931] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.773984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.773999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.774022] Call Trace: [ 14.774039] <TASK> [ 14.774057] dump_stack_lvl+0x73/0xb0 [ 14.774084] print_report+0xd1/0x650 [ 14.774109] ? __virt_addr_valid+0x1db/0x2d0 [ 14.774131] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.774165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.774189] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.774213] kasan_report+0x141/0x180 [ 14.774236] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.774264] __asan_report_load4_noabort+0x18/0x20 [ 14.774290] kasan_atomics_helper+0x49e8/0x5450 [ 14.774314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.774339] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.774364] ? kasan_save_alloc_info+0x3b/0x50 [ 14.774389] ? kasan_atomics+0x152/0x310 [ 14.774417] kasan_atomics+0x1dc/0x310 [ 14.774442] ? __pfx_kasan_atomics+0x10/0x10 [ 14.774468] ? __pfx_read_tsc+0x10/0x10 [ 14.774489] ? ktime_get_ts64+0x86/0x230 [ 14.774514] kunit_try_run_case+0x1a5/0x480 [ 14.774540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.774563] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.774587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.774612] ? __kthread_parkme+0x82/0x180 [ 14.774634] ? preempt_count_sub+0x50/0x80 [ 14.774659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.774684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.774710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.774735] kthread+0x337/0x6f0 [ 14.774756] ? trace_preempt_on+0x20/0xc0 [ 14.774780] ? __pfx_kthread+0x10/0x10 [ 14.774802] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.774825] ? calculate_sigpending+0x7b/0xa0 [ 14.774851] ? __pfx_kthread+0x10/0x10 [ 14.774874] ret_from_fork+0x116/0x1d0 [ 14.774894] ? __pfx_kthread+0x10/0x10 [ 14.774916] ret_from_fork_asm+0x1a/0x30 [ 14.774957] </TASK> [ 14.774970] [ 14.782591] Allocated by task 282: [ 14.782775] kasan_save_stack+0x45/0x70 [ 14.783003] kasan_save_track+0x18/0x40 [ 14.783453] kasan_save_alloc_info+0x3b/0x50 [ 14.783652] __kasan_kmalloc+0xb7/0xc0 [ 14.783784] __kmalloc_cache_noprof+0x189/0x420 [ 14.783950] kasan_atomics+0x95/0x310 [ 14.784086] kunit_try_run_case+0x1a5/0x480 [ 14.784231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.785593] kthread+0x337/0x6f0 [ 14.785775] ret_from_fork+0x116/0x1d0 [ 14.785977] ret_from_fork_asm+0x1a/0x30 [ 14.786540] [ 14.786649] The buggy address belongs to the object at ffff888103a18380 [ 14.786649] which belongs to the cache kmalloc-64 of size 64 [ 14.787699] The buggy address is located 0 bytes to the right of [ 14.787699] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.788652] [ 14.788767] The buggy address belongs to the physical page: [ 14.789373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.789901] flags: 0x200000000000000(node=0|zone=2) [ 14.790354] page_type: f5(slab) [ 14.790645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.790990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.791544] page dumped because: kasan: bad access detected [ 14.791979] [ 14.792235] Memory state around the buggy address: [ 14.792463] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.792775] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.793083] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.793381] ^ [ 14.793591] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.793884] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.794554] ================================================================== [ 15.228914] ================================================================== [ 15.229268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.230091] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.230416] [ 15.230532] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.230581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.230595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.230619] Call Trace: [ 15.230638] <TASK> [ 15.230656] dump_stack_lvl+0x73/0xb0 [ 15.230685] print_report+0xd1/0x650 [ 15.230709] ? __virt_addr_valid+0x1db/0x2d0 [ 15.230733] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.230756] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.230780] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.230803] kasan_report+0x141/0x180 [ 15.230826] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.230854] kasan_check_range+0x10c/0x1c0 [ 15.230879] __kasan_check_write+0x18/0x20 [ 15.230899] kasan_atomics_helper+0x1d7a/0x5450 [ 15.230927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.230964] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.230989] ? kasan_save_alloc_info+0x3b/0x50 [ 15.231014] ? kasan_atomics+0x152/0x310 [ 15.231043] kasan_atomics+0x1dc/0x310 [ 15.231068] ? __pfx_kasan_atomics+0x10/0x10 [ 15.231093] ? __pfx_read_tsc+0x10/0x10 [ 15.231120] ? ktime_get_ts64+0x86/0x230 [ 15.231145] kunit_try_run_case+0x1a5/0x480 [ 15.231171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.231194] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.231220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.231244] ? __kthread_parkme+0x82/0x180 [ 15.231266] ? preempt_count_sub+0x50/0x80 [ 15.231291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.231318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.231342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.231367] kthread+0x337/0x6f0 [ 15.231389] ? trace_preempt_on+0x20/0xc0 [ 15.231413] ? __pfx_kthread+0x10/0x10 [ 15.231435] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.231458] ? calculate_sigpending+0x7b/0xa0 [ 15.231483] ? __pfx_kthread+0x10/0x10 [ 15.231506] ret_from_fork+0x116/0x1d0 [ 15.231526] ? __pfx_kthread+0x10/0x10 [ 15.231548] ret_from_fork_asm+0x1a/0x30 [ 15.231580] </TASK> [ 15.231592] [ 15.239347] Allocated by task 282: [ 15.239485] kasan_save_stack+0x45/0x70 [ 15.239628] kasan_save_track+0x18/0x40 [ 15.239820] kasan_save_alloc_info+0x3b/0x50 [ 15.240074] __kasan_kmalloc+0xb7/0xc0 [ 15.240396] __kmalloc_cache_noprof+0x189/0x420 [ 15.240554] kasan_atomics+0x95/0x310 [ 15.240690] kunit_try_run_case+0x1a5/0x480 [ 15.240838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.241066] kthread+0x337/0x6f0 [ 15.241239] ret_from_fork+0x116/0x1d0 [ 15.241434] ret_from_fork_asm+0x1a/0x30 [ 15.241660] [ 15.241770] The buggy address belongs to the object at ffff888103a18380 [ 15.241770] which belongs to the cache kmalloc-64 of size 64 [ 15.242465] The buggy address is located 0 bytes to the right of [ 15.242465] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.242960] [ 15.243060] The buggy address belongs to the physical page: [ 15.243336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.243676] flags: 0x200000000000000(node=0|zone=2) [ 15.243846] page_type: f5(slab) [ 15.243990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.244335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.244840] page dumped because: kasan: bad access detected [ 15.245090] [ 15.245192] Memory state around the buggy address: [ 15.245363] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.245583] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.245837] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.246195] ^ [ 15.246578] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246948] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.247238] ================================================================== [ 15.146853] ================================================================== [ 15.147226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.147690] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.148264] [ 15.148472] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.148523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.148538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.148562] Call Trace: [ 15.148582] <TASK> [ 15.148600] dump_stack_lvl+0x73/0xb0 [ 15.148631] print_report+0xd1/0x650 [ 15.148655] ? __virt_addr_valid+0x1db/0x2d0 [ 15.148678] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.148703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.148727] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.148751] kasan_report+0x141/0x180 [ 15.148775] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.148803] kasan_check_range+0x10c/0x1c0 [ 15.148828] __kasan_check_write+0x18/0x20 [ 15.148849] kasan_atomics_helper+0x1b22/0x5450 [ 15.148873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.148896] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.148922] ? kasan_save_alloc_info+0x3b/0x50 [ 15.148960] ? kasan_atomics+0x152/0x310 [ 15.148988] kasan_atomics+0x1dc/0x310 [ 15.149012] ? __pfx_kasan_atomics+0x10/0x10 [ 15.149038] ? __pfx_read_tsc+0x10/0x10 [ 15.149059] ? ktime_get_ts64+0x86/0x230 [ 15.149086] kunit_try_run_case+0x1a5/0x480 [ 15.149112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.149136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.149160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.149185] ? __kthread_parkme+0x82/0x180 [ 15.149206] ? preempt_count_sub+0x50/0x80 [ 15.149231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.149257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.149281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.149306] kthread+0x337/0x6f0 [ 15.149327] ? trace_preempt_on+0x20/0xc0 [ 15.149351] ? __pfx_kthread+0x10/0x10 [ 15.149374] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.149396] ? calculate_sigpending+0x7b/0xa0 [ 15.149422] ? __pfx_kthread+0x10/0x10 [ 15.149444] ret_from_fork+0x116/0x1d0 [ 15.149464] ? __pfx_kthread+0x10/0x10 [ 15.149486] ret_from_fork_asm+0x1a/0x30 [ 15.149518] </TASK> [ 15.149531] [ 15.157287] Allocated by task 282: [ 15.157490] kasan_save_stack+0x45/0x70 [ 15.157662] kasan_save_track+0x18/0x40 [ 15.157802] kasan_save_alloc_info+0x3b/0x50 [ 15.157968] __kasan_kmalloc+0xb7/0xc0 [ 15.158230] __kmalloc_cache_noprof+0x189/0x420 [ 15.158456] kasan_atomics+0x95/0x310 [ 15.158646] kunit_try_run_case+0x1a5/0x480 [ 15.158841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.159122] kthread+0x337/0x6f0 [ 15.159265] ret_from_fork+0x116/0x1d0 [ 15.159457] ret_from_fork_asm+0x1a/0x30 [ 15.159613] [ 15.159712] The buggy address belongs to the object at ffff888103a18380 [ 15.159712] which belongs to the cache kmalloc-64 of size 64 [ 15.160250] The buggy address is located 0 bytes to the right of [ 15.160250] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.160619] [ 15.160695] The buggy address belongs to the physical page: [ 15.160934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.161304] flags: 0x200000000000000(node=0|zone=2) [ 15.161542] page_type: f5(slab) [ 15.161710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.162319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.162564] page dumped because: kasan: bad access detected [ 15.162736] [ 15.162810] Memory state around the buggy address: [ 15.163045] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.163389] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.163694] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.163990] ^ [ 15.164273] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164557] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164843] ================================================================== [ 15.098690] ================================================================== [ 15.099463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.099757] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.100238] [ 15.100570] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.100620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.100633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.100657] Call Trace: [ 15.100746] <TASK> [ 15.100766] dump_stack_lvl+0x73/0xb0 [ 15.100798] print_report+0xd1/0x650 [ 15.100824] ? __virt_addr_valid+0x1db/0x2d0 [ 15.100849] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.100873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.100897] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.100920] kasan_report+0x141/0x180 [ 15.100959] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.101011] kasan_check_range+0x10c/0x1c0 [ 15.101038] __kasan_check_write+0x18/0x20 [ 15.101059] kasan_atomics_helper+0x19e3/0x5450 [ 15.101112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.101137] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.101163] ? kasan_save_alloc_info+0x3b/0x50 [ 15.101206] ? kasan_atomics+0x152/0x310 [ 15.101235] kasan_atomics+0x1dc/0x310 [ 15.101259] ? __pfx_kasan_atomics+0x10/0x10 [ 15.101285] ? __pfx_read_tsc+0x10/0x10 [ 15.101308] ? ktime_get_ts64+0x86/0x230 [ 15.101334] kunit_try_run_case+0x1a5/0x480 [ 15.101359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.101383] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.101408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.101433] ? __kthread_parkme+0x82/0x180 [ 15.101454] ? preempt_count_sub+0x50/0x80 [ 15.101479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.101520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.101545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.101570] kthread+0x337/0x6f0 [ 15.101592] ? trace_preempt_on+0x20/0xc0 [ 15.101616] ? __pfx_kthread+0x10/0x10 [ 15.101638] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.101661] ? calculate_sigpending+0x7b/0xa0 [ 15.101687] ? __pfx_kthread+0x10/0x10 [ 15.101710] ret_from_fork+0x116/0x1d0 [ 15.101731] ? __pfx_kthread+0x10/0x10 [ 15.101753] ret_from_fork_asm+0x1a/0x30 [ 15.101786] </TASK> [ 15.101798] [ 15.109686] Allocated by task 282: [ 15.109823] kasan_save_stack+0x45/0x70 [ 15.110047] kasan_save_track+0x18/0x40 [ 15.110255] kasan_save_alloc_info+0x3b/0x50 [ 15.110496] __kasan_kmalloc+0xb7/0xc0 [ 15.110706] __kmalloc_cache_noprof+0x189/0x420 [ 15.110957] kasan_atomics+0x95/0x310 [ 15.111134] kunit_try_run_case+0x1a5/0x480 [ 15.111360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.111604] kthread+0x337/0x6f0 [ 15.111751] ret_from_fork+0x116/0x1d0 [ 15.111980] ret_from_fork_asm+0x1a/0x30 [ 15.112232] [ 15.112341] The buggy address belongs to the object at ffff888103a18380 [ 15.112341] which belongs to the cache kmalloc-64 of size 64 [ 15.112822] The buggy address is located 0 bytes to the right of [ 15.112822] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.113387] [ 15.113495] The buggy address belongs to the physical page: [ 15.113733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.114047] flags: 0x200000000000000(node=0|zone=2) [ 15.114214] page_type: f5(slab) [ 15.114341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.114933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.115299] page dumped because: kasan: bad access detected [ 15.115672] [ 15.115748] Memory state around the buggy address: [ 15.115904] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.116242] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.116569] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.116917] ^ [ 15.117081] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.117299] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118086] ================================================================== [ 14.635719] ================================================================== [ 14.636073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.636441] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.637022] [ 14.637258] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.637324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.637339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.637362] Call Trace: [ 14.637381] <TASK> [ 14.637411] dump_stack_lvl+0x73/0xb0 [ 14.637441] print_report+0xd1/0x650 [ 14.637519] ? __virt_addr_valid+0x1db/0x2d0 [ 14.637547] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.637604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.637629] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.637663] kasan_report+0x141/0x180 [ 14.637687] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.637732] __asan_report_load4_noabort+0x18/0x20 [ 14.637767] kasan_atomics_helper+0x4a36/0x5450 [ 14.637792] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.637825] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.637851] ? kasan_save_alloc_info+0x3b/0x50 [ 14.637876] ? kasan_atomics+0x152/0x310 [ 14.637904] kasan_atomics+0x1dc/0x310 [ 14.637928] ? __pfx_kasan_atomics+0x10/0x10 [ 14.637964] ? __pfx_read_tsc+0x10/0x10 [ 14.638012] ? ktime_get_ts64+0x86/0x230 [ 14.638039] kunit_try_run_case+0x1a5/0x480 [ 14.638064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.638098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.638122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.638163] ? __kthread_parkme+0x82/0x180 [ 14.638193] ? preempt_count_sub+0x50/0x80 [ 14.638218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.638242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.638277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.638302] kthread+0x337/0x6f0 [ 14.638323] ? trace_preempt_on+0x20/0xc0 [ 14.638347] ? __pfx_kthread+0x10/0x10 [ 14.638370] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.638392] ? calculate_sigpending+0x7b/0xa0 [ 14.638417] ? __pfx_kthread+0x10/0x10 [ 14.638440] ret_from_fork+0x116/0x1d0 [ 14.638460] ? __pfx_kthread+0x10/0x10 [ 14.638491] ret_from_fork_asm+0x1a/0x30 [ 14.638524] </TASK> [ 14.638537] [ 14.653437] Allocated by task 282: [ 14.653849] kasan_save_stack+0x45/0x70 [ 14.654286] kasan_save_track+0x18/0x40 [ 14.654726] kasan_save_alloc_info+0x3b/0x50 [ 14.655085] __kasan_kmalloc+0xb7/0xc0 [ 14.655238] __kmalloc_cache_noprof+0x189/0x420 [ 14.655736] kasan_atomics+0x95/0x310 [ 14.656198] kunit_try_run_case+0x1a5/0x480 [ 14.656354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.656701] kthread+0x337/0x6f0 [ 14.657131] ret_from_fork+0x116/0x1d0 [ 14.657564] ret_from_fork_asm+0x1a/0x30 [ 14.657949] [ 14.658165] The buggy address belongs to the object at ffff888103a18380 [ 14.658165] which belongs to the cache kmalloc-64 of size 64 [ 14.659220] The buggy address is located 0 bytes to the right of [ 14.659220] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.659923] [ 14.660102] The buggy address belongs to the physical page: [ 14.660672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.661691] flags: 0x200000000000000(node=0|zone=2) [ 14.661869] page_type: f5(slab) [ 14.662009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.662452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.663269] page dumped because: kasan: bad access detected [ 14.663861] [ 14.664048] Memory state around the buggy address: [ 14.664720] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.665557] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.666030] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.666548] ^ [ 14.667080] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.667576] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.668228] ================================================================== [ 14.717562] ================================================================== [ 14.717996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.718710] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.719036] [ 14.719142] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.719201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.719215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.719239] Call Trace: [ 14.719254] <TASK> [ 14.719270] dump_stack_lvl+0x73/0xb0 [ 14.719299] print_report+0xd1/0x650 [ 14.719322] ? __virt_addr_valid+0x1db/0x2d0 [ 14.719346] ? kasan_atomics_helper+0x1148/0x5450 [ 14.719369] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.719392] ? kasan_atomics_helper+0x1148/0x5450 [ 14.719415] kasan_report+0x141/0x180 [ 14.719439] ? kasan_atomics_helper+0x1148/0x5450 [ 14.719467] kasan_check_range+0x10c/0x1c0 [ 14.719492] __kasan_check_write+0x18/0x20 [ 14.719512] kasan_atomics_helper+0x1148/0x5450 [ 14.719536] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.719560] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.719584] ? kasan_save_alloc_info+0x3b/0x50 [ 14.719609] ? kasan_atomics+0x152/0x310 [ 14.719637] kasan_atomics+0x1dc/0x310 [ 14.719660] ? __pfx_kasan_atomics+0x10/0x10 [ 14.719687] ? __pfx_read_tsc+0x10/0x10 [ 14.719710] ? ktime_get_ts64+0x86/0x230 [ 14.719735] kunit_try_run_case+0x1a5/0x480 [ 14.719760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.719809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.719833] ? __kthread_parkme+0x82/0x180 [ 14.719855] ? preempt_count_sub+0x50/0x80 [ 14.719879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.719929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.719964] kthread+0x337/0x6f0 [ 14.719985] ? trace_preempt_on+0x20/0xc0 [ 14.720010] ? __pfx_kthread+0x10/0x10 [ 14.720032] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.720055] ? calculate_sigpending+0x7b/0xa0 [ 14.720080] ? __pfx_kthread+0x10/0x10 [ 14.720102] ret_from_fork+0x116/0x1d0 [ 14.720122] ? __pfx_kthread+0x10/0x10 [ 14.720144] ret_from_fork_asm+0x1a/0x30 [ 14.720188] </TASK> [ 14.720209] [ 14.728245] Allocated by task 282: [ 14.728430] kasan_save_stack+0x45/0x70 [ 14.728605] kasan_save_track+0x18/0x40 [ 14.728743] kasan_save_alloc_info+0x3b/0x50 [ 14.728894] __kasan_kmalloc+0xb7/0xc0 [ 14.729085] __kmalloc_cache_noprof+0x189/0x420 [ 14.729317] kasan_atomics+0x95/0x310 [ 14.729612] kunit_try_run_case+0x1a5/0x480 [ 14.729758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.729933] kthread+0x337/0x6f0 [ 14.730063] ret_from_fork+0x116/0x1d0 [ 14.730195] ret_from_fork_asm+0x1a/0x30 [ 14.730435] [ 14.730534] The buggy address belongs to the object at ffff888103a18380 [ 14.730534] which belongs to the cache kmalloc-64 of size 64 [ 14.731072] The buggy address is located 0 bytes to the right of [ 14.731072] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.731556] [ 14.731631] The buggy address belongs to the physical page: [ 14.731805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.732319] flags: 0x200000000000000(node=0|zone=2) [ 14.732559] page_type: f5(slab) [ 14.732735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.733095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.733395] page dumped because: kasan: bad access detected [ 14.733627] [ 14.733726] Memory state around the buggy address: [ 14.733931] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.734230] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.734501] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.734806] ^ [ 14.735049] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735334] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735587] ================================================================== [ 15.265979] ================================================================== [ 15.266443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.266808] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.267178] [ 15.267286] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.267329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.267342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.267365] Call Trace: [ 15.267381] <TASK> [ 15.267397] dump_stack_lvl+0x73/0xb0 [ 15.267437] print_report+0xd1/0x650 [ 15.267469] ? __virt_addr_valid+0x1db/0x2d0 [ 15.267492] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.267515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.267539] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.267563] kasan_report+0x141/0x180 [ 15.267586] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.267613] kasan_check_range+0x10c/0x1c0 [ 15.267638] __kasan_check_write+0x18/0x20 [ 15.267659] kasan_atomics_helper+0x1eaa/0x5450 [ 15.267684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.267707] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.267732] ? kasan_save_alloc_info+0x3b/0x50 [ 15.267757] ? kasan_atomics+0x152/0x310 [ 15.267785] kasan_atomics+0x1dc/0x310 [ 15.267809] ? __pfx_kasan_atomics+0x10/0x10 [ 15.267836] ? __pfx_read_tsc+0x10/0x10 [ 15.267858] ? ktime_get_ts64+0x86/0x230 [ 15.267884] kunit_try_run_case+0x1a5/0x480 [ 15.267910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.267933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.267969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.267994] ? __kthread_parkme+0x82/0x180 [ 15.268015] ? preempt_count_sub+0x50/0x80 [ 15.268040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.268065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.268090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.268114] kthread+0x337/0x6f0 [ 15.268136] ? trace_preempt_on+0x20/0xc0 [ 15.268160] ? __pfx_kthread+0x10/0x10 [ 15.268183] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.268206] ? calculate_sigpending+0x7b/0xa0 [ 15.268231] ? __pfx_kthread+0x10/0x10 [ 15.268256] ret_from_fork+0x116/0x1d0 [ 15.268275] ? __pfx_kthread+0x10/0x10 [ 15.268297] ret_from_fork_asm+0x1a/0x30 [ 15.268330] </TASK> [ 15.268344] [ 15.276233] Allocated by task 282: [ 15.276399] kasan_save_stack+0x45/0x70 [ 15.276552] kasan_save_track+0x18/0x40 [ 15.276748] kasan_save_alloc_info+0x3b/0x50 [ 15.276925] __kasan_kmalloc+0xb7/0xc0 [ 15.277100] __kmalloc_cache_noprof+0x189/0x420 [ 15.277302] kasan_atomics+0x95/0x310 [ 15.277474] kunit_try_run_case+0x1a5/0x480 [ 15.277659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.277898] kthread+0x337/0x6f0 [ 15.278084] ret_from_fork+0x116/0x1d0 [ 15.278259] ret_from_fork_asm+0x1a/0x30 [ 15.278437] [ 15.278527] The buggy address belongs to the object at ffff888103a18380 [ 15.278527] which belongs to the cache kmalloc-64 of size 64 [ 15.278878] The buggy address is located 0 bytes to the right of [ 15.278878] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.279260] [ 15.279337] The buggy address belongs to the physical page: [ 15.279512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.280091] flags: 0x200000000000000(node=0|zone=2) [ 15.280347] page_type: f5(slab) [ 15.280521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.280864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.281213] page dumped because: kasan: bad access detected [ 15.281674] [ 15.281772] Memory state around the buggy address: [ 15.281955] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.282452] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.282721] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.283028] ^ [ 15.283306] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283524] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283740] ================================================================== [ 14.482442] ================================================================== [ 14.482750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.483009] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.483305] [ 14.483423] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.483467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.483482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.483504] Call Trace: [ 14.483521] <TASK> [ 14.483538] dump_stack_lvl+0x73/0xb0 [ 14.483566] print_report+0xd1/0x650 [ 14.483590] ? __virt_addr_valid+0x1db/0x2d0 [ 14.483613] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.483636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.483659] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.483682] kasan_report+0x141/0x180 [ 14.483705] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.483732] __asan_report_load4_noabort+0x18/0x20 [ 14.483758] kasan_atomics_helper+0x4a84/0x5450 [ 14.483842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.483866] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.483892] ? kasan_save_alloc_info+0x3b/0x50 [ 14.483917] ? kasan_atomics+0x152/0x310 [ 14.483961] kasan_atomics+0x1dc/0x310 [ 14.483985] ? __pfx_kasan_atomics+0x10/0x10 [ 14.484011] ? __pfx_read_tsc+0x10/0x10 [ 14.484033] ? ktime_get_ts64+0x86/0x230 [ 14.484059] kunit_try_run_case+0x1a5/0x480 [ 14.484086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.484110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.484134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.484159] ? __kthread_parkme+0x82/0x180 [ 14.484179] ? preempt_count_sub+0x50/0x80 [ 14.484205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.484230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.484254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.484278] kthread+0x337/0x6f0 [ 14.484298] ? trace_preempt_on+0x20/0xc0 [ 14.484322] ? __pfx_kthread+0x10/0x10 [ 14.484344] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.484367] ? calculate_sigpending+0x7b/0xa0 [ 14.484392] ? __pfx_kthread+0x10/0x10 [ 14.484415] ret_from_fork+0x116/0x1d0 [ 14.484434] ? __pfx_kthread+0x10/0x10 [ 14.484456] ret_from_fork_asm+0x1a/0x30 [ 14.484531] </TASK> [ 14.484544] [ 14.492774] Allocated by task 282: [ 14.492976] kasan_save_stack+0x45/0x70 [ 14.493177] kasan_save_track+0x18/0x40 [ 14.493363] kasan_save_alloc_info+0x3b/0x50 [ 14.493571] __kasan_kmalloc+0xb7/0xc0 [ 14.493740] __kmalloc_cache_noprof+0x189/0x420 [ 14.493919] kasan_atomics+0x95/0x310 [ 14.494065] kunit_try_run_case+0x1a5/0x480 [ 14.494244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.494681] kthread+0x337/0x6f0 [ 14.494830] ret_from_fork+0x116/0x1d0 [ 14.495209] ret_from_fork_asm+0x1a/0x30 [ 14.495366] [ 14.495441] The buggy address belongs to the object at ffff888103a18380 [ 14.495441] which belongs to the cache kmalloc-64 of size 64 [ 14.495805] The buggy address is located 0 bytes to the right of [ 14.495805] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.496387] [ 14.496603] The buggy address belongs to the physical page: [ 14.497085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.497378] flags: 0x200000000000000(node=0|zone=2) [ 14.497547] page_type: f5(slab) [ 14.497670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.498803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.499098] page dumped because: kasan: bad access detected [ 14.499340] [ 14.499435] Memory state around the buggy address: [ 14.500000] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.500664] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.501001] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.501634] ^ [ 14.501869] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.502539] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.503328] ================================================================== [ 14.838027] ================================================================== [ 14.838524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.838782] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.839311] [ 14.839460] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.839506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.839522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.839545] Call Trace: [ 14.839560] <TASK> [ 14.839576] dump_stack_lvl+0x73/0xb0 [ 14.839604] print_report+0xd1/0x650 [ 14.839628] ? __virt_addr_valid+0x1db/0x2d0 [ 14.839651] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.839674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.839698] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.839722] kasan_report+0x141/0x180 [ 14.839745] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.839773] kasan_check_range+0x10c/0x1c0 [ 14.839797] __kasan_check_read+0x15/0x20 [ 14.839818] kasan_atomics_helper+0x13b5/0x5450 [ 14.839843] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.839866] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.839891] ? kasan_save_alloc_info+0x3b/0x50 [ 14.839916] ? kasan_atomics+0x152/0x310 [ 14.839957] kasan_atomics+0x1dc/0x310 [ 14.839981] ? __pfx_kasan_atomics+0x10/0x10 [ 14.840007] ? __pfx_read_tsc+0x10/0x10 [ 14.840030] ? ktime_get_ts64+0x86/0x230 [ 14.840055] kunit_try_run_case+0x1a5/0x480 [ 14.840081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.840105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.840130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.840154] ? __kthread_parkme+0x82/0x180 [ 14.840175] ? preempt_count_sub+0x50/0x80 [ 14.840201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.840226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.840250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.840274] kthread+0x337/0x6f0 [ 14.840296] ? trace_preempt_on+0x20/0xc0 [ 14.840321] ? __pfx_kthread+0x10/0x10 [ 14.840343] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.840366] ? calculate_sigpending+0x7b/0xa0 [ 14.840391] ? __pfx_kthread+0x10/0x10 [ 14.840414] ret_from_fork+0x116/0x1d0 [ 14.840434] ? __pfx_kthread+0x10/0x10 [ 14.840456] ret_from_fork_asm+0x1a/0x30 [ 14.840488] </TASK> [ 14.840501] [ 14.847956] Allocated by task 282: [ 14.848161] kasan_save_stack+0x45/0x70 [ 14.848309] kasan_save_track+0x18/0x40 [ 14.848447] kasan_save_alloc_info+0x3b/0x50 [ 14.848598] __kasan_kmalloc+0xb7/0xc0 [ 14.848732] __kmalloc_cache_noprof+0x189/0x420 [ 14.848889] kasan_atomics+0x95/0x310 [ 14.849035] kunit_try_run_case+0x1a5/0x480 [ 14.849185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.849361] kthread+0x337/0x6f0 [ 14.849558] ret_from_fork+0x116/0x1d0 [ 14.849747] ret_from_fork_asm+0x1a/0x30 [ 14.849954] [ 14.850053] The buggy address belongs to the object at ffff888103a18380 [ 14.850053] which belongs to the cache kmalloc-64 of size 64 [ 14.851004] The buggy address is located 0 bytes to the right of [ 14.851004] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.851576] [ 14.851652] The buggy address belongs to the physical page: [ 14.851826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.852116] flags: 0x200000000000000(node=0|zone=2) [ 14.852361] page_type: f5(slab) [ 14.852537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.852891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.853485] page dumped because: kasan: bad access detected [ 14.853749] [ 14.853853] Memory state around the buggy address: [ 14.854084] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.854338] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.854560] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.854776] ^ [ 14.854933] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855524] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855844] ================================================================== [ 14.697552] ================================================================== [ 14.697862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.698269] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.698672] [ 14.698765] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.698808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.698822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.698845] Call Trace: [ 14.698863] <TASK> [ 14.698880] dump_stack_lvl+0x73/0xb0 [ 14.698911] print_report+0xd1/0x650 [ 14.698935] ? __virt_addr_valid+0x1db/0x2d0 [ 14.698973] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.698995] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.699020] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.699044] kasan_report+0x141/0x180 [ 14.699079] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.699107] __asan_report_load4_noabort+0x18/0x20 [ 14.699136] kasan_atomics_helper+0x4a1c/0x5450 [ 14.699161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.699184] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.699210] ? kasan_save_alloc_info+0x3b/0x50 [ 14.699234] ? kasan_atomics+0x152/0x310 [ 14.699262] kasan_atomics+0x1dc/0x310 [ 14.699287] ? __pfx_kasan_atomics+0x10/0x10 [ 14.699322] ? __pfx_read_tsc+0x10/0x10 [ 14.699345] ? ktime_get_ts64+0x86/0x230 [ 14.699370] kunit_try_run_case+0x1a5/0x480 [ 14.699395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.699420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.699445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.699469] ? __kthread_parkme+0x82/0x180 [ 14.699491] ? preempt_count_sub+0x50/0x80 [ 14.699517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.699542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.699565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.699590] kthread+0x337/0x6f0 [ 14.699611] ? trace_preempt_on+0x20/0xc0 [ 14.699636] ? __pfx_kthread+0x10/0x10 [ 14.699658] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.699680] ? calculate_sigpending+0x7b/0xa0 [ 14.699705] ? __pfx_kthread+0x10/0x10 [ 14.699728] ret_from_fork+0x116/0x1d0 [ 14.699747] ? __pfx_kthread+0x10/0x10 [ 14.699770] ret_from_fork_asm+0x1a/0x30 [ 14.699801] </TASK> [ 14.699814] [ 14.708563] Allocated by task 282: [ 14.708753] kasan_save_stack+0x45/0x70 [ 14.708919] kasan_save_track+0x18/0x40 [ 14.709066] kasan_save_alloc_info+0x3b/0x50 [ 14.709414] __kasan_kmalloc+0xb7/0xc0 [ 14.709604] __kmalloc_cache_noprof+0x189/0x420 [ 14.709842] kasan_atomics+0x95/0x310 [ 14.710005] kunit_try_run_case+0x1a5/0x480 [ 14.710358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.710651] kthread+0x337/0x6f0 [ 14.710781] ret_from_fork+0x116/0x1d0 [ 14.710991] ret_from_fork_asm+0x1a/0x30 [ 14.711193] [ 14.711268] The buggy address belongs to the object at ffff888103a18380 [ 14.711268] which belongs to the cache kmalloc-64 of size 64 [ 14.711619] The buggy address is located 0 bytes to the right of [ 14.711619] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.712182] [ 14.712283] The buggy address belongs to the physical page: [ 14.712505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.712793] flags: 0x200000000000000(node=0|zone=2) [ 14.713198] page_type: f5(slab) [ 14.713356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.713666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.714160] page dumped because: kasan: bad access detected [ 14.714338] [ 14.714411] Memory state around the buggy address: [ 14.714569] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.714961] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.715666] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.716004] ^ [ 14.716163] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.716378] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.716593] ================================================================== [ 15.425670] ================================================================== [ 15.426019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.426702] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.427025] [ 15.427166] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.427213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.427226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.427248] Call Trace: [ 15.427263] <TASK> [ 15.427278] dump_stack_lvl+0x73/0xb0 [ 15.427309] print_report+0xd1/0x650 [ 15.427331] ? __virt_addr_valid+0x1db/0x2d0 [ 15.427356] ? kasan_atomics_helper+0x218a/0x5450 [ 15.427378] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.427402] ? kasan_atomics_helper+0x218a/0x5450 [ 15.427425] kasan_report+0x141/0x180 [ 15.427448] ? kasan_atomics_helper+0x218a/0x5450 [ 15.427476] kasan_check_range+0x10c/0x1c0 [ 15.427501] __kasan_check_write+0x18/0x20 [ 15.427521] kasan_atomics_helper+0x218a/0x5450 [ 15.427547] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.427571] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.427596] ? kasan_save_alloc_info+0x3b/0x50 [ 15.427621] ? kasan_atomics+0x152/0x310 [ 15.427649] kasan_atomics+0x1dc/0x310 [ 15.427673] ? __pfx_kasan_atomics+0x10/0x10 [ 15.427699] ? __pfx_read_tsc+0x10/0x10 [ 15.427721] ? ktime_get_ts64+0x86/0x230 [ 15.427746] kunit_try_run_case+0x1a5/0x480 [ 15.427772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.427794] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.427819] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.427844] ? __kthread_parkme+0x82/0x180 [ 15.427865] ? preempt_count_sub+0x50/0x80 [ 15.427890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.427914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.427938] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.427986] kthread+0x337/0x6f0 [ 15.428007] ? trace_preempt_on+0x20/0xc0 [ 15.428031] ? __pfx_kthread+0x10/0x10 [ 15.428053] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.428088] ? calculate_sigpending+0x7b/0xa0 [ 15.428112] ? __pfx_kthread+0x10/0x10 [ 15.428136] ret_from_fork+0x116/0x1d0 [ 15.428156] ? __pfx_kthread+0x10/0x10 [ 15.428179] ret_from_fork_asm+0x1a/0x30 [ 15.428211] </TASK> [ 15.428223] [ 15.435747] Allocated by task 282: [ 15.435905] kasan_save_stack+0x45/0x70 [ 15.436092] kasan_save_track+0x18/0x40 [ 15.436291] kasan_save_alloc_info+0x3b/0x50 [ 15.436500] __kasan_kmalloc+0xb7/0xc0 [ 15.436683] __kmalloc_cache_noprof+0x189/0x420 [ 15.436869] kasan_atomics+0x95/0x310 [ 15.437023] kunit_try_run_case+0x1a5/0x480 [ 15.437361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.437539] kthread+0x337/0x6f0 [ 15.437662] ret_from_fork+0x116/0x1d0 [ 15.437796] ret_from_fork_asm+0x1a/0x30 [ 15.437980] [ 15.438075] The buggy address belongs to the object at ffff888103a18380 [ 15.438075] which belongs to the cache kmalloc-64 of size 64 [ 15.438612] The buggy address is located 0 bytes to the right of [ 15.438612] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.439202] [ 15.439280] The buggy address belongs to the physical page: [ 15.439457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.439702] flags: 0x200000000000000(node=0|zone=2) [ 15.439909] page_type: f5(slab) [ 15.440096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.440444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.440791] page dumped because: kasan: bad access detected [ 15.441079] [ 15.441157] Memory state around the buggy address: [ 15.441313] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.441538] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.441859] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.442182] ^ [ 15.442631] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.442857] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.443157] ================================================================== [ 14.795749] ================================================================== [ 14.796109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.796798] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.797232] [ 14.797457] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.797508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.797619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.797645] Call Trace: [ 14.797666] <TASK> [ 14.797684] dump_stack_lvl+0x73/0xb0 [ 14.797716] print_report+0xd1/0x650 [ 14.797741] ? __virt_addr_valid+0x1db/0x2d0 [ 14.797774] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.797798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.797820] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.797844] kasan_report+0x141/0x180 [ 14.797870] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.797897] kasan_check_range+0x10c/0x1c0 [ 14.797923] __kasan_check_write+0x18/0x20 [ 14.797953] kasan_atomics_helper+0x12e6/0x5450 [ 14.797980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.798004] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.798030] ? kasan_save_alloc_info+0x3b/0x50 [ 14.798054] ? kasan_atomics+0x152/0x310 [ 14.798111] kasan_atomics+0x1dc/0x310 [ 14.798136] ? __pfx_kasan_atomics+0x10/0x10 [ 14.798161] ? __pfx_read_tsc+0x10/0x10 [ 14.798184] ? ktime_get_ts64+0x86/0x230 [ 14.798209] kunit_try_run_case+0x1a5/0x480 [ 14.798235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.798284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.798309] ? __kthread_parkme+0x82/0x180 [ 14.798331] ? preempt_count_sub+0x50/0x80 [ 14.798355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.798404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.798429] kthread+0x337/0x6f0 [ 14.798449] ? trace_preempt_on+0x20/0xc0 [ 14.798474] ? __pfx_kthread+0x10/0x10 [ 14.798496] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.798519] ? calculate_sigpending+0x7b/0xa0 [ 14.798544] ? __pfx_kthread+0x10/0x10 [ 14.798567] ret_from_fork+0x116/0x1d0 [ 14.798587] ? __pfx_kthread+0x10/0x10 [ 14.798608] ret_from_fork_asm+0x1a/0x30 [ 14.798640] </TASK> [ 14.798654] [ 14.809916] Allocated by task 282: [ 14.810345] kasan_save_stack+0x45/0x70 [ 14.810575] kasan_save_track+0x18/0x40 [ 14.810871] kasan_save_alloc_info+0x3b/0x50 [ 14.811217] __kasan_kmalloc+0xb7/0xc0 [ 14.811409] __kmalloc_cache_noprof+0x189/0x420 [ 14.811615] kasan_atomics+0x95/0x310 [ 14.811792] kunit_try_run_case+0x1a5/0x480 [ 14.812001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.812548] kthread+0x337/0x6f0 [ 14.812928] ret_from_fork+0x116/0x1d0 [ 14.813208] ret_from_fork_asm+0x1a/0x30 [ 14.813503] [ 14.813721] The buggy address belongs to the object at ffff888103a18380 [ 14.813721] which belongs to the cache kmalloc-64 of size 64 [ 14.814985] The buggy address is located 0 bytes to the right of [ 14.814985] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.815732] [ 14.815968] The buggy address belongs to the physical page: [ 14.816371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.816707] flags: 0x200000000000000(node=0|zone=2) [ 14.816925] page_type: f5(slab) [ 14.817067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.817418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.817689] page dumped because: kasan: bad access detected [ 14.817954] [ 14.818047] Memory state around the buggy address: [ 14.818286] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.818540] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.818865] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.819230] ^ [ 14.819393] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.819719] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820001] ================================================================== [ 14.178016] ================================================================== [ 14.178398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.178926] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.179486] [ 14.179748] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.179848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.179932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.179974] Call Trace: [ 14.179992] <TASK> [ 14.180007] dump_stack_lvl+0x73/0xb0 [ 14.180038] print_report+0xd1/0x650 [ 14.180062] ? __virt_addr_valid+0x1db/0x2d0 [ 14.180086] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.180110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.180134] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.180158] kasan_report+0x141/0x180 [ 14.180181] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.180211] __asan_report_store4_noabort+0x1b/0x30 [ 14.180235] kasan_atomics_helper+0x4b3a/0x5450 [ 14.180261] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.180284] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.180310] ? kasan_save_alloc_info+0x3b/0x50 [ 14.180334] ? kasan_atomics+0x152/0x310 [ 14.180362] kasan_atomics+0x1dc/0x310 [ 14.180387] ? __pfx_kasan_atomics+0x10/0x10 [ 14.180413] ? __pfx_read_tsc+0x10/0x10 [ 14.180435] ? ktime_get_ts64+0x86/0x230 [ 14.180523] kunit_try_run_case+0x1a5/0x480 [ 14.180555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.180579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.180605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.180629] ? __kthread_parkme+0x82/0x180 [ 14.180650] ? preempt_count_sub+0x50/0x80 [ 14.180675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.180700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.180725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.180750] kthread+0x337/0x6f0 [ 14.180771] ? trace_preempt_on+0x20/0xc0 [ 14.180796] ? __pfx_kthread+0x10/0x10 [ 14.180818] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.180840] ? calculate_sigpending+0x7b/0xa0 [ 14.180865] ? __pfx_kthread+0x10/0x10 [ 14.180888] ret_from_fork+0x116/0x1d0 [ 14.180908] ? __pfx_kthread+0x10/0x10 [ 14.180930] ret_from_fork_asm+0x1a/0x30 [ 14.180975] </TASK> [ 14.180988] [ 14.190974] Allocated by task 282: [ 14.191367] kasan_save_stack+0x45/0x70 [ 14.191724] kasan_save_track+0x18/0x40 [ 14.191975] kasan_save_alloc_info+0x3b/0x50 [ 14.192214] __kasan_kmalloc+0xb7/0xc0 [ 14.192347] __kmalloc_cache_noprof+0x189/0x420 [ 14.192500] kasan_atomics+0x95/0x310 [ 14.192959] kunit_try_run_case+0x1a5/0x480 [ 14.193264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.193733] kthread+0x337/0x6f0 [ 14.193928] ret_from_fork+0x116/0x1d0 [ 14.194225] ret_from_fork_asm+0x1a/0x30 [ 14.194415] [ 14.194697] The buggy address belongs to the object at ffff888103a18380 [ 14.194697] which belongs to the cache kmalloc-64 of size 64 [ 14.195200] The buggy address is located 0 bytes to the right of [ 14.195200] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.195874] [ 14.195964] The buggy address belongs to the physical page: [ 14.196248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.196823] flags: 0x200000000000000(node=0|zone=2) [ 14.197103] page_type: f5(slab) [ 14.197297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.197694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.198075] page dumped because: kasan: bad access detected [ 14.198340] [ 14.198457] Memory state around the buggy address: [ 14.198895] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.199251] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.199748] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.200062] ^ [ 14.200305] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.200630] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.201061] ================================================================== [ 15.303711] ================================================================== [ 15.304007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.304389] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.304803] [ 15.304919] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.304983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.304998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.305022] Call Trace: [ 15.305039] <TASK> [ 15.305056] dump_stack_lvl+0x73/0xb0 [ 15.305094] print_report+0xd1/0x650 [ 15.305118] ? __virt_addr_valid+0x1db/0x2d0 [ 15.305142] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.305165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.305189] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.305213] kasan_report+0x141/0x180 [ 15.305236] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.305264] __asan_report_load8_noabort+0x18/0x20 [ 15.305289] kasan_atomics_helper+0x4f71/0x5450 [ 15.305313] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.305338] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.305363] ? kasan_save_alloc_info+0x3b/0x50 [ 15.305388] ? kasan_atomics+0x152/0x310 [ 15.305416] kasan_atomics+0x1dc/0x310 [ 15.305441] ? __pfx_kasan_atomics+0x10/0x10 [ 15.305466] ? __pfx_read_tsc+0x10/0x10 [ 15.305489] ? ktime_get_ts64+0x86/0x230 [ 15.305515] kunit_try_run_case+0x1a5/0x480 [ 15.305541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.305589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.305614] ? __kthread_parkme+0x82/0x180 [ 15.305636] ? preempt_count_sub+0x50/0x80 [ 15.305660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.305709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.305734] kthread+0x337/0x6f0 [ 15.305768] ? trace_preempt_on+0x20/0xc0 [ 15.305793] ? __pfx_kthread+0x10/0x10 [ 15.305815] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.305838] ? calculate_sigpending+0x7b/0xa0 [ 15.305864] ? __pfx_kthread+0x10/0x10 [ 15.305888] ret_from_fork+0x116/0x1d0 [ 15.305909] ? __pfx_kthread+0x10/0x10 [ 15.305932] ret_from_fork_asm+0x1a/0x30 [ 15.305972] </TASK> [ 15.305985] [ 15.314414] Allocated by task 282: [ 15.314581] kasan_save_stack+0x45/0x70 [ 15.314737] kasan_save_track+0x18/0x40 [ 15.314932] kasan_save_alloc_info+0x3b/0x50 [ 15.315199] __kasan_kmalloc+0xb7/0xc0 [ 15.315383] __kmalloc_cache_noprof+0x189/0x420 [ 15.315587] kasan_atomics+0x95/0x310 [ 15.315774] kunit_try_run_case+0x1a5/0x480 [ 15.315961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.316235] kthread+0x337/0x6f0 [ 15.316407] ret_from_fork+0x116/0x1d0 [ 15.316564] ret_from_fork_asm+0x1a/0x30 [ 15.316705] [ 15.316779] The buggy address belongs to the object at ffff888103a18380 [ 15.316779] which belongs to the cache kmalloc-64 of size 64 [ 15.317369] The buggy address is located 0 bytes to the right of [ 15.317369] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.317774] [ 15.317850] The buggy address belongs to the physical page: [ 15.318032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.318278] flags: 0x200000000000000(node=0|zone=2) [ 15.318512] page_type: f5(slab) [ 15.318683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.319085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.319396] page dumped because: kasan: bad access detected [ 15.319622] [ 15.319695] Memory state around the buggy address: [ 15.319851] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320090] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320416] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.320740] ^ [ 15.320979] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.321358] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.321652] ================================================================== [ 15.378117] ================================================================== [ 15.378380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.378618] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.380743] [ 15.380848] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.380896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.380912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.380934] Call Trace: [ 15.380969] <TASK> [ 15.381104] dump_stack_lvl+0x73/0xb0 [ 15.381356] print_report+0xd1/0x650 [ 15.381385] ? __virt_addr_valid+0x1db/0x2d0 [ 15.381410] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.381433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.381457] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.381481] kasan_report+0x141/0x180 [ 15.381505] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.381534] kasan_check_range+0x10c/0x1c0 [ 15.381559] __kasan_check_write+0x18/0x20 [ 15.381580] kasan_atomics_helper+0x20c8/0x5450 [ 15.381605] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.381628] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.381654] ? kasan_save_alloc_info+0x3b/0x50 [ 15.381678] ? kasan_atomics+0x152/0x310 [ 15.381707] kasan_atomics+0x1dc/0x310 [ 15.381730] ? __pfx_kasan_atomics+0x10/0x10 [ 15.381756] ? __pfx_read_tsc+0x10/0x10 [ 15.381777] ? ktime_get_ts64+0x86/0x230 [ 15.381803] kunit_try_run_case+0x1a5/0x480 [ 15.381828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.381851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.381874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.381899] ? __kthread_parkme+0x82/0x180 [ 15.381920] ? preempt_count_sub+0x50/0x80 [ 15.381970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.381995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.382019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.382302] kthread+0x337/0x6f0 [ 15.382328] ? trace_preempt_on+0x20/0xc0 [ 15.382354] ? __pfx_kthread+0x10/0x10 [ 15.382377] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.382400] ? calculate_sigpending+0x7b/0xa0 [ 15.382425] ? __pfx_kthread+0x10/0x10 [ 15.382447] ret_from_fork+0x116/0x1d0 [ 15.382480] ? __pfx_kthread+0x10/0x10 [ 15.382502] ret_from_fork_asm+0x1a/0x30 [ 15.382534] </TASK> [ 15.382547] [ 15.392962] Allocated by task 282: [ 15.393291] kasan_save_stack+0x45/0x70 [ 15.393660] kasan_save_track+0x18/0x40 [ 15.394202] kasan_save_alloc_info+0x3b/0x50 [ 15.394677] __kasan_kmalloc+0xb7/0xc0 [ 15.395081] __kmalloc_cache_noprof+0x189/0x420 [ 15.395528] kasan_atomics+0x95/0x310 [ 15.395886] kunit_try_run_case+0x1a5/0x480 [ 15.396352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.396926] kthread+0x337/0x6f0 [ 15.397248] ret_from_fork+0x116/0x1d0 [ 15.397622] ret_from_fork_asm+0x1a/0x30 [ 15.397999] [ 15.398200] The buggy address belongs to the object at ffff888103a18380 [ 15.398200] which belongs to the cache kmalloc-64 of size 64 [ 15.399296] The buggy address is located 0 bytes to the right of [ 15.399296] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.400599] [ 15.400776] The buggy address belongs to the physical page: [ 15.401319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.401765] flags: 0x200000000000000(node=0|zone=2) [ 15.401936] page_type: f5(slab) [ 15.402074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.402310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.402542] page dumped because: kasan: bad access detected [ 15.402716] [ 15.402789] Memory state around the buggy address: [ 15.402954] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.403239] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.403458] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.404024] ^ [ 15.404392] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.404610] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.405251] ================================================================== [ 14.397423] ================================================================== [ 14.398160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.398992] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.399704] [ 14.399886] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.399932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.399958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.399982] Call Trace: [ 14.400002] <TASK> [ 14.400020] dump_stack_lvl+0x73/0xb0 [ 14.400049] print_report+0xd1/0x650 [ 14.400081] ? __virt_addr_valid+0x1db/0x2d0 [ 14.400104] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.400127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.400150] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.400173] kasan_report+0x141/0x180 [ 14.400196] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.400224] kasan_check_range+0x10c/0x1c0 [ 14.400249] __kasan_check_write+0x18/0x20 [ 14.400270] kasan_atomics_helper+0xa2b/0x5450 [ 14.400294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.400318] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.400342] ? kasan_save_alloc_info+0x3b/0x50 [ 14.400366] ? kasan_atomics+0x152/0x310 [ 14.400394] kasan_atomics+0x1dc/0x310 [ 14.400419] ? __pfx_kasan_atomics+0x10/0x10 [ 14.400445] ? __pfx_read_tsc+0x10/0x10 [ 14.400485] ? ktime_get_ts64+0x86/0x230 [ 14.400512] kunit_try_run_case+0x1a5/0x480 [ 14.400537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.400560] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.400586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.400610] ? __kthread_parkme+0x82/0x180 [ 14.400632] ? preempt_count_sub+0x50/0x80 [ 14.400657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.400682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.400707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.400731] kthread+0x337/0x6f0 [ 14.400752] ? trace_preempt_on+0x20/0xc0 [ 14.400777] ? __pfx_kthread+0x10/0x10 [ 14.400799] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.400821] ? calculate_sigpending+0x7b/0xa0 [ 14.400846] ? __pfx_kthread+0x10/0x10 [ 14.400870] ret_from_fork+0x116/0x1d0 [ 14.400890] ? __pfx_kthread+0x10/0x10 [ 14.400911] ret_from_fork_asm+0x1a/0x30 [ 14.400953] </TASK> [ 14.400966] [ 14.413421] Allocated by task 282: [ 14.413613] kasan_save_stack+0x45/0x70 [ 14.413824] kasan_save_track+0x18/0x40 [ 14.414036] kasan_save_alloc_info+0x3b/0x50 [ 14.414238] __kasan_kmalloc+0xb7/0xc0 [ 14.414405] __kmalloc_cache_noprof+0x189/0x420 [ 14.414696] kasan_atomics+0x95/0x310 [ 14.415021] kunit_try_run_case+0x1a5/0x480 [ 14.415210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.415386] kthread+0x337/0x6f0 [ 14.415509] ret_from_fork+0x116/0x1d0 [ 14.416045] ret_from_fork_asm+0x1a/0x30 [ 14.416248] [ 14.416326] The buggy address belongs to the object at ffff888103a18380 [ 14.416326] which belongs to the cache kmalloc-64 of size 64 [ 14.417059] The buggy address is located 0 bytes to the right of [ 14.417059] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.417687] [ 14.417794] The buggy address belongs to the physical page: [ 14.418008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.418522] flags: 0x200000000000000(node=0|zone=2) [ 14.418788] page_type: f5(slab) [ 14.418976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.419352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.419851] page dumped because: kasan: bad access detected [ 14.420101] [ 14.420177] Memory state around the buggy address: [ 14.420478] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.420697] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.421084] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.421417] ^ [ 14.421776] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.422008] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.422272] ================================================================== [ 14.531834] ================================================================== [ 14.532173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.532408] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.532721] [ 14.532832] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.532875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.532902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.532925] Call Trace: [ 14.532954] <TASK> [ 14.532973] dump_stack_lvl+0x73/0xb0 [ 14.533002] print_report+0xd1/0x650 [ 14.533026] ? __virt_addr_valid+0x1db/0x2d0 [ 14.533050] ? kasan_atomics_helper+0xde0/0x5450 [ 14.533072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.533099] ? kasan_atomics_helper+0xde0/0x5450 [ 14.533122] kasan_report+0x141/0x180 [ 14.533154] ? kasan_atomics_helper+0xde0/0x5450 [ 14.533182] kasan_check_range+0x10c/0x1c0 [ 14.533208] __kasan_check_write+0x18/0x20 [ 14.533230] kasan_atomics_helper+0xde0/0x5450 [ 14.533254] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.533278] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.533304] ? kasan_save_alloc_info+0x3b/0x50 [ 14.533329] ? kasan_atomics+0x152/0x310 [ 14.533357] kasan_atomics+0x1dc/0x310 [ 14.533383] ? __pfx_kasan_atomics+0x10/0x10 [ 14.533409] ? __pfx_read_tsc+0x10/0x10 [ 14.533431] ? ktime_get_ts64+0x86/0x230 [ 14.533457] kunit_try_run_case+0x1a5/0x480 [ 14.533494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.533518] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.533543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.533568] ? __kthread_parkme+0x82/0x180 [ 14.533591] ? preempt_count_sub+0x50/0x80 [ 14.533616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.533641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.533666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.533690] kthread+0x337/0x6f0 [ 14.533712] ? trace_preempt_on+0x20/0xc0 [ 14.533737] ? __pfx_kthread+0x10/0x10 [ 14.533759] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.533782] ? calculate_sigpending+0x7b/0xa0 [ 14.533807] ? __pfx_kthread+0x10/0x10 [ 14.533830] ret_from_fork+0x116/0x1d0 [ 14.533850] ? __pfx_kthread+0x10/0x10 [ 14.533872] ret_from_fork_asm+0x1a/0x30 [ 14.533904] </TASK> [ 14.533918] [ 14.543408] Allocated by task 282: [ 14.543656] kasan_save_stack+0x45/0x70 [ 14.543848] kasan_save_track+0x18/0x40 [ 14.544064] kasan_save_alloc_info+0x3b/0x50 [ 14.544281] __kasan_kmalloc+0xb7/0xc0 [ 14.544470] __kmalloc_cache_noprof+0x189/0x420 [ 14.544718] kasan_atomics+0x95/0x310 [ 14.544879] kunit_try_run_case+0x1a5/0x480 [ 14.545074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.545350] kthread+0x337/0x6f0 [ 14.545561] ret_from_fork+0x116/0x1d0 [ 14.545700] ret_from_fork_asm+0x1a/0x30 [ 14.545845] [ 14.545957] The buggy address belongs to the object at ffff888103a18380 [ 14.545957] which belongs to the cache kmalloc-64 of size 64 [ 14.546772] The buggy address is located 0 bytes to the right of [ 14.546772] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.547371] [ 14.547485] The buggy address belongs to the physical page: [ 14.547696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.548013] flags: 0x200000000000000(node=0|zone=2) [ 14.548379] page_type: f5(slab) [ 14.548585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.548918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.549280] page dumped because: kasan: bad access detected [ 14.549533] [ 14.549628] Memory state around the buggy address: [ 14.549796] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.550016] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.550678] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.551003] ^ [ 14.551244] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.551641] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.552002] ================================================================== [ 14.035201] ================================================================== [ 14.035534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.035875] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.036279] [ 14.036366] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.036480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.036495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.036515] Call Trace: [ 14.036541] <TASK> [ 14.036558] dump_stack_lvl+0x73/0xb0 [ 14.036586] print_report+0xd1/0x650 [ 14.036620] ? __virt_addr_valid+0x1db/0x2d0 [ 14.036642] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.036663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.036685] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.036715] kasan_report+0x141/0x180 [ 14.036738] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.036764] __asan_report_store4_noabort+0x1b/0x30 [ 14.036794] kasan_atomics_helper+0x4ba2/0x5450 [ 14.036817] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.036839] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.036863] ? kasan_save_alloc_info+0x3b/0x50 [ 14.036885] ? kasan_atomics+0x152/0x310 [ 14.036912] kasan_atomics+0x1dc/0x310 [ 14.036945] ? __pfx_kasan_atomics+0x10/0x10 [ 14.036969] ? __pfx_read_tsc+0x10/0x10 [ 14.036990] ? ktime_get_ts64+0x86/0x230 [ 14.037013] kunit_try_run_case+0x1a5/0x480 [ 14.037036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.037058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.037082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.037113] ? __kthread_parkme+0x82/0x180 [ 14.037134] ? preempt_count_sub+0x50/0x80 [ 14.037159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.037193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.037216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.037241] kthread+0x337/0x6f0 [ 14.037270] ? trace_preempt_on+0x20/0xc0 [ 14.037293] ? __pfx_kthread+0x10/0x10 [ 14.037314] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.037335] ? calculate_sigpending+0x7b/0xa0 [ 14.037369] ? __pfx_kthread+0x10/0x10 [ 14.037392] ret_from_fork+0x116/0x1d0 [ 14.037410] ? __pfx_kthread+0x10/0x10 [ 14.037440] ret_from_fork_asm+0x1a/0x30 [ 14.037523] </TASK> [ 14.037538] [ 14.048159] Allocated by task 282: [ 14.048459] kasan_save_stack+0x45/0x70 [ 14.048841] kasan_save_track+0x18/0x40 [ 14.049013] kasan_save_alloc_info+0x3b/0x50 [ 14.049260] __kasan_kmalloc+0xb7/0xc0 [ 14.049875] __kmalloc_cache_noprof+0x189/0x420 [ 14.050081] kasan_atomics+0x95/0x310 [ 14.050333] kunit_try_run_case+0x1a5/0x480 [ 14.050717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.050969] kthread+0x337/0x6f0 [ 14.051309] ret_from_fork+0x116/0x1d0 [ 14.051474] ret_from_fork_asm+0x1a/0x30 [ 14.051820] [ 14.051925] The buggy address belongs to the object at ffff888103a18380 [ 14.051925] which belongs to the cache kmalloc-64 of size 64 [ 14.052627] The buggy address is located 0 bytes to the right of [ 14.052627] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.053357] [ 14.053469] The buggy address belongs to the physical page: [ 14.053922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.054430] flags: 0x200000000000000(node=0|zone=2) [ 14.054837] page_type: f5(slab) [ 14.055107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.055588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.056032] page dumped because: kasan: bad access detected [ 14.056316] [ 14.056397] Memory state around the buggy address: [ 14.056855] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.057178] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.057648] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.057982] ^ [ 14.058397] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.058880] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.059190] ================================================================== [ 15.444298] ================================================================== [ 15.444834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.445243] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.445480] [ 15.445621] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.445664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.445678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.445699] Call Trace: [ 15.445716] <TASK> [ 15.445733] dump_stack_lvl+0x73/0xb0 [ 15.445760] print_report+0xd1/0x650 [ 15.445784] ? __virt_addr_valid+0x1db/0x2d0 [ 15.445806] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.445829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.445854] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.445877] kasan_report+0x141/0x180 [ 15.445902] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.445929] __asan_report_load8_noabort+0x18/0x20 [ 15.445968] kasan_atomics_helper+0x4fa5/0x5450 [ 15.445993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.446016] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.446041] ? kasan_save_alloc_info+0x3b/0x50 [ 15.446076] ? kasan_atomics+0x152/0x310 [ 15.446104] kasan_atomics+0x1dc/0x310 [ 15.446128] ? __pfx_kasan_atomics+0x10/0x10 [ 15.446154] ? __pfx_read_tsc+0x10/0x10 [ 15.446176] ? ktime_get_ts64+0x86/0x230 [ 15.446201] kunit_try_run_case+0x1a5/0x480 [ 15.446227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.446250] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.446274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.446299] ? __kthread_parkme+0x82/0x180 [ 15.446319] ? preempt_count_sub+0x50/0x80 [ 15.446344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.446368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.446392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.446417] kthread+0x337/0x6f0 [ 15.446437] ? trace_preempt_on+0x20/0xc0 [ 15.446461] ? __pfx_kthread+0x10/0x10 [ 15.446483] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.446506] ? calculate_sigpending+0x7b/0xa0 [ 15.446529] ? __pfx_kthread+0x10/0x10 [ 15.446553] ret_from_fork+0x116/0x1d0 [ 15.446573] ? __pfx_kthread+0x10/0x10 [ 15.446595] ret_from_fork_asm+0x1a/0x30 [ 15.446627] </TASK> [ 15.446640] [ 15.454441] Allocated by task 282: [ 15.454605] kasan_save_stack+0x45/0x70 [ 15.454790] kasan_save_track+0x18/0x40 [ 15.454967] kasan_save_alloc_info+0x3b/0x50 [ 15.455271] __kasan_kmalloc+0xb7/0xc0 [ 15.455449] __kmalloc_cache_noprof+0x189/0x420 [ 15.455627] kasan_atomics+0x95/0x310 [ 15.455800] kunit_try_run_case+0x1a5/0x480 [ 15.456022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.456244] kthread+0x337/0x6f0 [ 15.456415] ret_from_fork+0x116/0x1d0 [ 15.456604] ret_from_fork_asm+0x1a/0x30 [ 15.456797] [ 15.456886] The buggy address belongs to the object at ffff888103a18380 [ 15.456886] which belongs to the cache kmalloc-64 of size 64 [ 15.457247] The buggy address is located 0 bytes to the right of [ 15.457247] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.457876] [ 15.457984] The buggy address belongs to the physical page: [ 15.458485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.458739] flags: 0x200000000000000(node=0|zone=2) [ 15.458905] page_type: f5(slab) [ 15.459090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.459439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.459784] page dumped because: kasan: bad access detected [ 15.460002] [ 15.460076] Memory state around the buggy address: [ 15.460247] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.460570] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.460895] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.461160] ^ [ 15.461319] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.461622] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.461954] ================================================================== [ 14.952080] ================================================================== [ 14.952427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.952773] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.953219] [ 14.953319] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.953362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.953376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.953398] Call Trace: [ 14.953414] <TASK> [ 14.953448] dump_stack_lvl+0x73/0xb0 [ 14.953476] print_report+0xd1/0x650 [ 14.953500] ? __virt_addr_valid+0x1db/0x2d0 [ 14.953523] ? kasan_atomics_helper+0x164f/0x5450 [ 14.953548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.953571] ? kasan_atomics_helper+0x164f/0x5450 [ 14.953596] kasan_report+0x141/0x180 [ 14.953620] ? kasan_atomics_helper+0x164f/0x5450 [ 14.953648] kasan_check_range+0x10c/0x1c0 [ 14.953674] __kasan_check_write+0x18/0x20 [ 14.953695] kasan_atomics_helper+0x164f/0x5450 [ 14.953720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.953744] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.953769] ? kasan_save_alloc_info+0x3b/0x50 [ 14.953794] ? kasan_atomics+0x152/0x310 [ 14.953822] kasan_atomics+0x1dc/0x310 [ 14.953847] ? __pfx_kasan_atomics+0x10/0x10 [ 14.953873] ? __pfx_read_tsc+0x10/0x10 [ 14.953895] ? ktime_get_ts64+0x86/0x230 [ 14.953920] kunit_try_run_case+0x1a5/0x480 [ 14.953956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.953979] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.954004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.954029] ? __kthread_parkme+0x82/0x180 [ 14.954052] ? preempt_count_sub+0x50/0x80 [ 14.954085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.954110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.954135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.954160] kthread+0x337/0x6f0 [ 14.954181] ? trace_preempt_on+0x20/0xc0 [ 14.954206] ? __pfx_kthread+0x10/0x10 [ 14.954228] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.954251] ? calculate_sigpending+0x7b/0xa0 [ 14.954276] ? __pfx_kthread+0x10/0x10 [ 14.954298] ret_from_fork+0x116/0x1d0 [ 14.954317] ? __pfx_kthread+0x10/0x10 [ 14.954339] ret_from_fork_asm+0x1a/0x30 [ 14.954371] </TASK> [ 14.954384] [ 14.967061] Allocated by task 282: [ 14.967751] kasan_save_stack+0x45/0x70 [ 14.968328] kasan_save_track+0x18/0x40 [ 14.968812] kasan_save_alloc_info+0x3b/0x50 [ 14.969424] __kasan_kmalloc+0xb7/0xc0 [ 14.969900] __kmalloc_cache_noprof+0x189/0x420 [ 14.970379] kasan_atomics+0x95/0x310 [ 14.970531] kunit_try_run_case+0x1a5/0x480 [ 14.970689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.970868] kthread+0x337/0x6f0 [ 14.971007] ret_from_fork+0x116/0x1d0 [ 14.971152] ret_from_fork_asm+0x1a/0x30 [ 14.971316] [ 14.971423] The buggy address belongs to the object at ffff888103a18380 [ 14.971423] which belongs to the cache kmalloc-64 of size 64 [ 14.971964] The buggy address is located 0 bytes to the right of [ 14.971964] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.972424] [ 14.972529] The buggy address belongs to the physical page: [ 14.972793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.973220] flags: 0x200000000000000(node=0|zone=2) [ 14.973391] page_type: f5(slab) [ 14.973564] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.973905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.974172] page dumped because: kasan: bad access detected [ 14.974474] [ 14.974573] Memory state around the buggy address: [ 14.974806] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.975059] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.975346] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.975663] ^ [ 14.975886] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976116] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976589] ================================================================== [ 15.322137] ================================================================== [ 15.322489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.322783] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.323288] [ 15.323381] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.323425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.323439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.323462] Call Trace: [ 15.323480] <TASK> [ 15.323496] dump_stack_lvl+0x73/0xb0 [ 15.323523] print_report+0xd1/0x650 [ 15.323547] ? __virt_addr_valid+0x1db/0x2d0 [ 15.323570] ? kasan_atomics_helper+0x2006/0x5450 [ 15.323593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.323616] ? kasan_atomics_helper+0x2006/0x5450 [ 15.323642] kasan_report+0x141/0x180 [ 15.323674] ? kasan_atomics_helper+0x2006/0x5450 [ 15.323702] kasan_check_range+0x10c/0x1c0 [ 15.323727] __kasan_check_write+0x18/0x20 [ 15.323750] kasan_atomics_helper+0x2006/0x5450 [ 15.323775] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.323799] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.323825] ? kasan_save_alloc_info+0x3b/0x50 [ 15.323849] ? kasan_atomics+0x152/0x310 [ 15.323877] kasan_atomics+0x1dc/0x310 [ 15.323901] ? __pfx_kasan_atomics+0x10/0x10 [ 15.323927] ? __pfx_read_tsc+0x10/0x10 [ 15.323959] ? ktime_get_ts64+0x86/0x230 [ 15.323986] kunit_try_run_case+0x1a5/0x480 [ 15.324011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.324034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.324059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.324093] ? __kthread_parkme+0x82/0x180 [ 15.324113] ? preempt_count_sub+0x50/0x80 [ 15.324139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.324165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.324189] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.324214] kthread+0x337/0x6f0 [ 15.324235] ? trace_preempt_on+0x20/0xc0 [ 15.324260] ? __pfx_kthread+0x10/0x10 [ 15.324281] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.324304] ? calculate_sigpending+0x7b/0xa0 [ 15.324329] ? __pfx_kthread+0x10/0x10 [ 15.324351] ret_from_fork+0x116/0x1d0 [ 15.324371] ? __pfx_kthread+0x10/0x10 [ 15.324394] ret_from_fork_asm+0x1a/0x30 [ 15.324426] </TASK> [ 15.324438] [ 15.336297] Allocated by task 282: [ 15.336859] kasan_save_stack+0x45/0x70 [ 15.337375] kasan_save_track+0x18/0x40 [ 15.338004] kasan_save_alloc_info+0x3b/0x50 [ 15.338585] __kasan_kmalloc+0xb7/0xc0 [ 15.338889] __kmalloc_cache_noprof+0x189/0x420 [ 15.339550] kasan_atomics+0x95/0x310 [ 15.339700] kunit_try_run_case+0x1a5/0x480 [ 15.339851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.340042] kthread+0x337/0x6f0 [ 15.340786] ret_from_fork+0x116/0x1d0 [ 15.341241] ret_from_fork_asm+0x1a/0x30 [ 15.341750] [ 15.342083] The buggy address belongs to the object at ffff888103a18380 [ 15.342083] which belongs to the cache kmalloc-64 of size 64 [ 15.343472] The buggy address is located 0 bytes to the right of [ 15.343472] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.343859] [ 15.343938] The buggy address belongs to the physical page: [ 15.344534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.345510] flags: 0x200000000000000(node=0|zone=2) [ 15.346180] page_type: f5(slab) [ 15.346650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.347529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.348211] page dumped because: kasan: bad access detected [ 15.348395] [ 15.348471] Memory state around the buggy address: [ 15.348631] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.348851] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.349392] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.350287] ^ [ 15.350930] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.351928] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.352514] ================================================================== [ 14.915793] ================================================================== [ 14.916251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.916671] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.917055] [ 14.917177] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.917222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.917237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.917260] Call Trace: [ 14.917276] <TASK> [ 14.917293] dump_stack_lvl+0x73/0xb0 [ 14.917322] print_report+0xd1/0x650 [ 14.917346] ? __virt_addr_valid+0x1db/0x2d0 [ 14.917369] ? kasan_atomics_helper+0x151d/0x5450 [ 14.917392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.917416] ? kasan_atomics_helper+0x151d/0x5450 [ 14.917440] kasan_report+0x141/0x180 [ 14.917464] ? kasan_atomics_helper+0x151d/0x5450 [ 14.917491] kasan_check_range+0x10c/0x1c0 [ 14.917516] __kasan_check_write+0x18/0x20 [ 14.917537] kasan_atomics_helper+0x151d/0x5450 [ 14.917560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.917584] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.917610] ? kasan_save_alloc_info+0x3b/0x50 [ 14.917634] ? kasan_atomics+0x152/0x310 [ 14.917663] kasan_atomics+0x1dc/0x310 [ 14.917689] ? __pfx_kasan_atomics+0x10/0x10 [ 14.917715] ? __pfx_read_tsc+0x10/0x10 [ 14.917738] ? ktime_get_ts64+0x86/0x230 [ 14.917763] kunit_try_run_case+0x1a5/0x480 [ 14.917788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.917811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.917835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.917861] ? __kthread_parkme+0x82/0x180 [ 14.917882] ? preempt_count_sub+0x50/0x80 [ 14.917906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.917932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.917969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.917994] kthread+0x337/0x6f0 [ 14.918014] ? trace_preempt_on+0x20/0xc0 [ 14.918039] ? __pfx_kthread+0x10/0x10 [ 14.918061] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.918083] ? calculate_sigpending+0x7b/0xa0 [ 14.918108] ? __pfx_kthread+0x10/0x10 [ 14.918131] ret_from_fork+0x116/0x1d0 [ 14.918151] ? __pfx_kthread+0x10/0x10 [ 14.918173] ret_from_fork_asm+0x1a/0x30 [ 14.918204] </TASK> [ 14.918218] [ 14.925411] Allocated by task 282: [ 14.925612] kasan_save_stack+0x45/0x70 [ 14.925814] kasan_save_track+0x18/0x40 [ 14.926019] kasan_save_alloc_info+0x3b/0x50 [ 14.926437] __kasan_kmalloc+0xb7/0xc0 [ 14.926628] __kmalloc_cache_noprof+0x189/0x420 [ 14.926853] kasan_atomics+0x95/0x310 [ 14.927060] kunit_try_run_case+0x1a5/0x480 [ 14.927276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.927488] kthread+0x337/0x6f0 [ 14.927612] ret_from_fork+0x116/0x1d0 [ 14.927749] ret_from_fork_asm+0x1a/0x30 [ 14.927897] [ 14.927983] The buggy address belongs to the object at ffff888103a18380 [ 14.927983] which belongs to the cache kmalloc-64 of size 64 [ 14.928449] The buggy address is located 0 bytes to the right of [ 14.928449] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.929026] [ 14.929125] The buggy address belongs to the physical page: [ 14.929348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.929620] flags: 0x200000000000000(node=0|zone=2) [ 14.929786] page_type: f5(slab) [ 14.929911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.930531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.930878] page dumped because: kasan: bad access detected [ 14.931241] [ 14.931343] Memory state around the buggy address: [ 14.931576] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.931849] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.932185] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.932404] ^ [ 14.932561] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.932779] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.933030] ================================================================== [ 15.201185] ================================================================== [ 15.201610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.202289] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.202517] [ 15.202603] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.202646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.202659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.202682] Call Trace: [ 15.202698] <TASK> [ 15.202715] dump_stack_lvl+0x73/0xb0 [ 15.202742] print_report+0xd1/0x650 [ 15.202766] ? __virt_addr_valid+0x1db/0x2d0 [ 15.202790] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.202813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.202836] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.202860] kasan_report+0x141/0x180 [ 15.202884] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.202911] kasan_check_range+0x10c/0x1c0 [ 15.202937] __kasan_check_write+0x18/0x20 [ 15.202970] kasan_atomics_helper+0x1ce1/0x5450 [ 15.202996] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.203019] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.203044] ? kasan_save_alloc_info+0x3b/0x50 [ 15.203068] ? kasan_atomics+0x152/0x310 [ 15.203098] kasan_atomics+0x1dc/0x310 [ 15.203132] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203159] ? __pfx_read_tsc+0x10/0x10 [ 15.203181] ? ktime_get_ts64+0x86/0x230 [ 15.203207] kunit_try_run_case+0x1a5/0x480 [ 15.203233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.203280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.203305] ? __kthread_parkme+0x82/0x180 [ 15.203327] ? preempt_count_sub+0x50/0x80 [ 15.203352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.203426] kthread+0x337/0x6f0 [ 15.203458] ? trace_preempt_on+0x20/0xc0 [ 15.203484] ? __pfx_kthread+0x10/0x10 [ 15.203506] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.203528] ? calculate_sigpending+0x7b/0xa0 [ 15.203554] ? __pfx_kthread+0x10/0x10 [ 15.203577] ret_from_fork+0x116/0x1d0 [ 15.203597] ? __pfx_kthread+0x10/0x10 [ 15.203620] ret_from_fork_asm+0x1a/0x30 [ 15.203651] </TASK> [ 15.203665] [ 15.215868] Allocated by task 282: [ 15.216057] kasan_save_stack+0x45/0x70 [ 15.216255] kasan_save_track+0x18/0x40 [ 15.216437] kasan_save_alloc_info+0x3b/0x50 [ 15.216644] __kasan_kmalloc+0xb7/0xc0 [ 15.216834] __kmalloc_cache_noprof+0x189/0x420 [ 15.217058] kasan_atomics+0x95/0x310 [ 15.217730] kunit_try_run_case+0x1a5/0x480 [ 15.218209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.218524] kthread+0x337/0x6f0 [ 15.218809] ret_from_fork+0x116/0x1d0 [ 15.219242] ret_from_fork_asm+0x1a/0x30 [ 15.219515] [ 15.219734] The buggy address belongs to the object at ffff888103a18380 [ 15.219734] which belongs to the cache kmalloc-64 of size 64 [ 15.220653] The buggy address is located 0 bytes to the right of [ 15.220653] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.221470] [ 15.221569] The buggy address belongs to the physical page: [ 15.221814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.222377] flags: 0x200000000000000(node=0|zone=2) [ 15.222829] page_type: f5(slab) [ 15.223086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.223536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.223862] page dumped because: kasan: bad access detected [ 15.224366] [ 15.224463] Memory state around the buggy address: [ 15.224856] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.225390] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.225873] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.226529] ^ [ 15.226820] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.227490] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.227806] ================================================================== [ 14.013774] ================================================================== [ 14.014503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.015038] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.015383] [ 14.015675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.015725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.015749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.015772] Call Trace: [ 14.015786] <TASK> [ 14.015802] dump_stack_lvl+0x73/0xb0 [ 14.015844] print_report+0xd1/0x650 [ 14.015866] ? __virt_addr_valid+0x1db/0x2d0 [ 14.015891] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.015923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.015954] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.015976] kasan_report+0x141/0x180 [ 14.015998] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.016024] __asan_report_load4_noabort+0x18/0x20 [ 14.016048] kasan_atomics_helper+0x4bbc/0x5450 [ 14.016081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.016103] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.016128] ? kasan_save_alloc_info+0x3b/0x50 [ 14.016151] ? kasan_atomics+0x152/0x310 [ 14.016179] kasan_atomics+0x1dc/0x310 [ 14.016201] ? __pfx_kasan_atomics+0x10/0x10 [ 14.016225] ? __pfx_read_tsc+0x10/0x10 [ 14.016246] ? ktime_get_ts64+0x86/0x230 [ 14.016272] kunit_try_run_case+0x1a5/0x480 [ 14.016297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.016318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.016342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.016365] ? __kthread_parkme+0x82/0x180 [ 14.016385] ? preempt_count_sub+0x50/0x80 [ 14.016409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.016433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.016457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.016527] kthread+0x337/0x6f0 [ 14.016549] ? trace_preempt_on+0x20/0xc0 [ 14.016573] ? __pfx_kthread+0x10/0x10 [ 14.016595] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.016616] ? calculate_sigpending+0x7b/0xa0 [ 14.016641] ? __pfx_kthread+0x10/0x10 [ 14.016663] ret_from_fork+0x116/0x1d0 [ 14.016682] ? __pfx_kthread+0x10/0x10 [ 14.016702] ret_from_fork_asm+0x1a/0x30 [ 14.016734] </TASK> [ 14.016746] [ 14.025701] Allocated by task 282: [ 14.025884] kasan_save_stack+0x45/0x70 [ 14.026138] kasan_save_track+0x18/0x40 [ 14.026314] kasan_save_alloc_info+0x3b/0x50 [ 14.026596] __kasan_kmalloc+0xb7/0xc0 [ 14.026736] __kmalloc_cache_noprof+0x189/0x420 [ 14.026895] kasan_atomics+0x95/0x310 [ 14.027061] kunit_try_run_case+0x1a5/0x480 [ 14.027297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.027553] kthread+0x337/0x6f0 [ 14.027722] ret_from_fork+0x116/0x1d0 [ 14.027984] ret_from_fork_asm+0x1a/0x30 [ 14.028185] [ 14.028260] The buggy address belongs to the object at ffff888103a18380 [ 14.028260] which belongs to the cache kmalloc-64 of size 64 [ 14.028855] The buggy address is located 0 bytes to the right of [ 14.028855] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.029571] [ 14.029671] The buggy address belongs to the physical page: [ 14.029850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.030317] flags: 0x200000000000000(node=0|zone=2) [ 14.030564] page_type: f5(slab) [ 14.030738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.031220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.031622] page dumped because: kasan: bad access detected [ 14.031842] [ 14.031971] Memory state around the buggy address: [ 14.032300] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.032804] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.033118] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.033435] ^ [ 14.033823] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.034185] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.034537] ================================================================== [ 14.059969] ================================================================== [ 14.060219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.061061] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.061430] [ 14.061593] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.061638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.061652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.061672] Call Trace: [ 14.061690] <TASK> [ 14.061706] dump_stack_lvl+0x73/0xb0 [ 14.061734] print_report+0xd1/0x650 [ 14.061756] ? __virt_addr_valid+0x1db/0x2d0 [ 14.061872] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.061900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.061992] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.062018] kasan_report+0x141/0x180 [ 14.062041] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.062078] __asan_report_load4_noabort+0x18/0x20 [ 14.062102] kasan_atomics_helper+0x4b88/0x5450 [ 14.062124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.062147] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.062171] ? kasan_save_alloc_info+0x3b/0x50 [ 14.062194] ? kasan_atomics+0x152/0x310 [ 14.062222] kasan_atomics+0x1dc/0x310 [ 14.062244] ? __pfx_kasan_atomics+0x10/0x10 [ 14.062268] ? __pfx_read_tsc+0x10/0x10 [ 14.062289] ? ktime_get_ts64+0x86/0x230 [ 14.062314] kunit_try_run_case+0x1a5/0x480 [ 14.062338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.062359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.062384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.062408] ? __kthread_parkme+0x82/0x180 [ 14.062428] ? preempt_count_sub+0x50/0x80 [ 14.062451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.062484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.062507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.062530] kthread+0x337/0x6f0 [ 14.062550] ? trace_preempt_on+0x20/0xc0 [ 14.062573] ? __pfx_kthread+0x10/0x10 [ 14.062595] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.062616] ? calculate_sigpending+0x7b/0xa0 [ 14.062640] ? __pfx_kthread+0x10/0x10 [ 14.062661] ret_from_fork+0x116/0x1d0 [ 14.062679] ? __pfx_kthread+0x10/0x10 [ 14.062700] ret_from_fork_asm+0x1a/0x30 [ 14.062731] </TASK> [ 14.062743] [ 14.071849] Allocated by task 282: [ 14.072031] kasan_save_stack+0x45/0x70 [ 14.072300] kasan_save_track+0x18/0x40 [ 14.072682] kasan_save_alloc_info+0x3b/0x50 [ 14.072863] __kasan_kmalloc+0xb7/0xc0 [ 14.073008] __kmalloc_cache_noprof+0x189/0x420 [ 14.073261] kasan_atomics+0x95/0x310 [ 14.073725] kunit_try_run_case+0x1a5/0x480 [ 14.073926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.074199] kthread+0x337/0x6f0 [ 14.074324] ret_from_fork+0x116/0x1d0 [ 14.074702] ret_from_fork_asm+0x1a/0x30 [ 14.074924] [ 14.075038] The buggy address belongs to the object at ffff888103a18380 [ 14.075038] which belongs to the cache kmalloc-64 of size 64 [ 14.075448] The buggy address is located 0 bytes to the right of [ 14.075448] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.076024] [ 14.076275] The buggy address belongs to the physical page: [ 14.076464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.076818] flags: 0x200000000000000(node=0|zone=2) [ 14.077062] page_type: f5(slab) [ 14.077245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.077647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.077967] page dumped because: kasan: bad access detected [ 14.078190] [ 14.078289] Memory state around the buggy address: [ 14.078493] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.078713] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.078978] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.079684] ^ [ 14.079852] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.081372] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.082244] ================================================================== [ 14.552607] ================================================================== [ 14.553021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.553419] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.553741] [ 14.553851] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.553910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.553924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.553958] Call Trace: [ 14.553984] <TASK> [ 14.554001] dump_stack_lvl+0x73/0xb0 [ 14.554030] print_report+0xd1/0x650 [ 14.554054] ? __virt_addr_valid+0x1db/0x2d0 [ 14.554077] ? kasan_atomics_helper+0xe78/0x5450 [ 14.554100] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.554124] ? kasan_atomics_helper+0xe78/0x5450 [ 14.554157] kasan_report+0x141/0x180 [ 14.554180] ? kasan_atomics_helper+0xe78/0x5450 [ 14.554208] kasan_check_range+0x10c/0x1c0 [ 14.554233] __kasan_check_write+0x18/0x20 [ 14.554254] kasan_atomics_helper+0xe78/0x5450 [ 14.554278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.554302] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.554327] ? kasan_save_alloc_info+0x3b/0x50 [ 14.554352] ? kasan_atomics+0x152/0x310 [ 14.554380] kasan_atomics+0x1dc/0x310 [ 14.554404] ? __pfx_kasan_atomics+0x10/0x10 [ 14.554430] ? __pfx_read_tsc+0x10/0x10 [ 14.554453] ? ktime_get_ts64+0x86/0x230 [ 14.554478] kunit_try_run_case+0x1a5/0x480 [ 14.554503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.554526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.554551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.554576] ? __kthread_parkme+0x82/0x180 [ 14.554597] ? preempt_count_sub+0x50/0x80 [ 14.554622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.554647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.554671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.554695] kthread+0x337/0x6f0 [ 14.554718] ? trace_preempt_on+0x20/0xc0 [ 14.554743] ? __pfx_kthread+0x10/0x10 [ 14.554765] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.554788] ? calculate_sigpending+0x7b/0xa0 [ 14.554813] ? __pfx_kthread+0x10/0x10 [ 14.554835] ret_from_fork+0x116/0x1d0 [ 14.554855] ? __pfx_kthread+0x10/0x10 [ 14.554877] ret_from_fork_asm+0x1a/0x30 [ 14.554908] </TASK> [ 14.554920] [ 14.564256] Allocated by task 282: [ 14.564537] kasan_save_stack+0x45/0x70 [ 14.564732] kasan_save_track+0x18/0x40 [ 14.564922] kasan_save_alloc_info+0x3b/0x50 [ 14.565235] __kasan_kmalloc+0xb7/0xc0 [ 14.565423] __kmalloc_cache_noprof+0x189/0x420 [ 14.565902] kasan_atomics+0x95/0x310 [ 14.566081] kunit_try_run_case+0x1a5/0x480 [ 14.566316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.566486] kthread+0x337/0x6f0 [ 14.566608] ret_from_fork+0x116/0x1d0 [ 14.566752] ret_from_fork_asm+0x1a/0x30 [ 14.566889] [ 14.566979] The buggy address belongs to the object at ffff888103a18380 [ 14.566979] which belongs to the cache kmalloc-64 of size 64 [ 14.567563] The buggy address is located 0 bytes to the right of [ 14.567563] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.568514] [ 14.568611] The buggy address belongs to the physical page: [ 14.569376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.570676] flags: 0x200000000000000(node=0|zone=2) [ 14.570861] page_type: f5(slab) [ 14.571005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.571859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.572620] page dumped because: kasan: bad access detected [ 14.573157] [ 14.573279] Memory state around the buggy address: [ 14.573683] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.574242] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.574790] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.575021] ^ [ 14.575657] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576335] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576989] ================================================================== [ 14.820565] ================================================================== [ 14.820890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.821226] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.821543] [ 14.821632] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.821676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.821689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.821713] Call Trace: [ 14.821732] <TASK> [ 14.821750] dump_stack_lvl+0x73/0xb0 [ 14.821778] print_report+0xd1/0x650 [ 14.821802] ? __virt_addr_valid+0x1db/0x2d0 [ 14.821825] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.821848] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.821872] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.821895] kasan_report+0x141/0x180 [ 14.821919] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.821958] __asan_report_load4_noabort+0x18/0x20 [ 14.821984] kasan_atomics_helper+0x49ce/0x5450 [ 14.822008] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.822031] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.822057] ? kasan_save_alloc_info+0x3b/0x50 [ 14.822092] ? kasan_atomics+0x152/0x310 [ 14.822120] kasan_atomics+0x1dc/0x310 [ 14.822144] ? __pfx_kasan_atomics+0x10/0x10 [ 14.822170] ? __pfx_read_tsc+0x10/0x10 [ 14.822192] ? ktime_get_ts64+0x86/0x230 [ 14.822216] kunit_try_run_case+0x1a5/0x480 [ 14.822242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.822266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.822291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.822315] ? __kthread_parkme+0x82/0x180 [ 14.822337] ? preempt_count_sub+0x50/0x80 [ 14.822362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.822387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.822411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.822436] kthread+0x337/0x6f0 [ 14.822457] ? trace_preempt_on+0x20/0xc0 [ 14.822481] ? __pfx_kthread+0x10/0x10 [ 14.822503] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.822526] ? calculate_sigpending+0x7b/0xa0 [ 14.822551] ? __pfx_kthread+0x10/0x10 [ 14.822575] ret_from_fork+0x116/0x1d0 [ 14.822595] ? __pfx_kthread+0x10/0x10 [ 14.822618] ret_from_fork_asm+0x1a/0x30 [ 14.822649] </TASK> [ 14.822663] [ 14.830103] Allocated by task 282: [ 14.830289] kasan_save_stack+0x45/0x70 [ 14.830482] kasan_save_track+0x18/0x40 [ 14.830627] kasan_save_alloc_info+0x3b/0x50 [ 14.830840] __kasan_kmalloc+0xb7/0xc0 [ 14.831048] __kmalloc_cache_noprof+0x189/0x420 [ 14.831281] kasan_atomics+0x95/0x310 [ 14.831450] kunit_try_run_case+0x1a5/0x480 [ 14.831642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.831858] kthread+0x337/0x6f0 [ 14.832046] ret_from_fork+0x116/0x1d0 [ 14.832232] ret_from_fork_asm+0x1a/0x30 [ 14.832417] [ 14.832490] The buggy address belongs to the object at ffff888103a18380 [ 14.832490] which belongs to the cache kmalloc-64 of size 64 [ 14.832867] The buggy address is located 0 bytes to the right of [ 14.832867] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.833433] [ 14.833528] The buggy address belongs to the physical page: [ 14.833704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.833957] flags: 0x200000000000000(node=0|zone=2) [ 14.834353] page_type: f5(slab) [ 14.834522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.834869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.835233] page dumped because: kasan: bad access detected [ 14.835471] [ 14.835569] Memory state around the buggy address: [ 14.835754] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.836054] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.836367] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.836593] ^ [ 14.836751] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.836987] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.837453] ================================================================== [ 14.856297] ================================================================== [ 14.858807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.859132] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.859505] [ 14.859595] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.859640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.859654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.859675] Call Trace: [ 14.859694] <TASK> [ 14.859711] dump_stack_lvl+0x73/0xb0 [ 14.859740] print_report+0xd1/0x650 [ 14.859764] ? __virt_addr_valid+0x1db/0x2d0 [ 14.859788] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.859811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.859835] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.859859] kasan_report+0x141/0x180 [ 14.859883] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.859969] __asan_report_load8_noabort+0x18/0x20 [ 14.859998] kasan_atomics_helper+0x4eae/0x5450 [ 14.860023] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.860047] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.860083] ? kasan_save_alloc_info+0x3b/0x50 [ 14.860111] ? kasan_atomics+0x152/0x310 [ 14.860141] kasan_atomics+0x1dc/0x310 [ 14.860166] ? __pfx_kasan_atomics+0x10/0x10 [ 14.860193] ? __pfx_read_tsc+0x10/0x10 [ 14.860217] ? ktime_get_ts64+0x86/0x230 [ 14.860245] kunit_try_run_case+0x1a5/0x480 [ 14.860272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.860295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.860320] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.860344] ? __kthread_parkme+0x82/0x180 [ 14.860366] ? preempt_count_sub+0x50/0x80 [ 14.860391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.860415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.860441] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.860465] kthread+0x337/0x6f0 [ 14.860487] ? trace_preempt_on+0x20/0xc0 [ 14.860512] ? __pfx_kthread+0x10/0x10 [ 14.860535] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.860558] ? calculate_sigpending+0x7b/0xa0 [ 14.860583] ? __pfx_kthread+0x10/0x10 [ 14.860606] ret_from_fork+0x116/0x1d0 [ 14.860627] ? __pfx_kthread+0x10/0x10 [ 14.860649] ret_from_fork_asm+0x1a/0x30 [ 14.860681] </TASK> [ 14.860695] [ 14.871067] Allocated by task 282: [ 14.871211] kasan_save_stack+0x45/0x70 [ 14.871357] kasan_save_track+0x18/0x40 [ 14.871492] kasan_save_alloc_info+0x3b/0x50 [ 14.871637] __kasan_kmalloc+0xb7/0xc0 [ 14.871832] __kmalloc_cache_noprof+0x189/0x420 [ 14.872065] kasan_atomics+0x95/0x310 [ 14.872255] kunit_try_run_case+0x1a5/0x480 [ 14.872459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872710] kthread+0x337/0x6f0 [ 14.872830] ret_from_fork+0x116/0x1d0 [ 14.872985] ret_from_fork_asm+0x1a/0x30 [ 14.873327] [ 14.873426] The buggy address belongs to the object at ffff888103a18380 [ 14.873426] which belongs to the cache kmalloc-64 of size 64 [ 14.873819] The buggy address is located 0 bytes to the right of [ 14.873819] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.874455] [ 14.874562] The buggy address belongs to the physical page: [ 14.874788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.875133] flags: 0x200000000000000(node=0|zone=2) [ 14.875364] page_type: f5(slab) [ 14.875517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.875824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.876914] page dumped because: kasan: bad access detected [ 14.877160] [ 14.877268] Memory state around the buggy address: [ 14.877465] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.877703] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.878003] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.878329] ^ [ 14.878549] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.878842] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.879167] ================================================================== [ 14.879703] ================================================================== [ 14.880037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.880501] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.880731] [ 14.880846] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.880893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.880907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.880931] Call Trace: [ 14.880959] <TASK> [ 14.880978] dump_stack_lvl+0x73/0xb0 [ 14.881009] print_report+0xd1/0x650 [ 14.881033] ? __virt_addr_valid+0x1db/0x2d0 [ 14.881057] ? kasan_atomics_helper+0x1467/0x5450 [ 14.881079] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.881104] ? kasan_atomics_helper+0x1467/0x5450 [ 14.881128] kasan_report+0x141/0x180 [ 14.881152] ? kasan_atomics_helper+0x1467/0x5450 [ 14.881180] kasan_check_range+0x10c/0x1c0 [ 14.881208] __kasan_check_write+0x18/0x20 [ 14.881230] kasan_atomics_helper+0x1467/0x5450 [ 14.881255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.881280] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.881305] ? kasan_save_alloc_info+0x3b/0x50 [ 14.881329] ? kasan_atomics+0x152/0x310 [ 14.881357] kasan_atomics+0x1dc/0x310 [ 14.881381] ? __pfx_kasan_atomics+0x10/0x10 [ 14.881407] ? __pfx_read_tsc+0x10/0x10 [ 14.881429] ? ktime_get_ts64+0x86/0x230 [ 14.881455] kunit_try_run_case+0x1a5/0x480 [ 14.881480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.881504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.881544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.881568] ? __kthread_parkme+0x82/0x180 [ 14.881591] ? preempt_count_sub+0x50/0x80 [ 14.881616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.881641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.881666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.881690] kthread+0x337/0x6f0 [ 14.881712] ? trace_preempt_on+0x20/0xc0 [ 14.881736] ? __pfx_kthread+0x10/0x10 [ 14.881758] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.881781] ? calculate_sigpending+0x7b/0xa0 [ 14.881806] ? __pfx_kthread+0x10/0x10 [ 14.881829] ret_from_fork+0x116/0x1d0 [ 14.881848] ? __pfx_kthread+0x10/0x10 [ 14.881870] ret_from_fork_asm+0x1a/0x30 [ 14.881902] </TASK> [ 14.881915] [ 14.889632] Allocated by task 282: [ 14.889823] kasan_save_stack+0x45/0x70 [ 14.890017] kasan_save_track+0x18/0x40 [ 14.890262] kasan_save_alloc_info+0x3b/0x50 [ 14.890476] __kasan_kmalloc+0xb7/0xc0 [ 14.890633] __kmalloc_cache_noprof+0x189/0x420 [ 14.890859] kasan_atomics+0x95/0x310 [ 14.891024] kunit_try_run_case+0x1a5/0x480 [ 14.891319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.891522] kthread+0x337/0x6f0 [ 14.891696] ret_from_fork+0x116/0x1d0 [ 14.891866] ret_from_fork_asm+0x1a/0x30 [ 14.892060] [ 14.892168] The buggy address belongs to the object at ffff888103a18380 [ 14.892168] which belongs to the cache kmalloc-64 of size 64 [ 14.892604] The buggy address is located 0 bytes to the right of [ 14.892604] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.893057] [ 14.893133] The buggy address belongs to the physical page: [ 14.893307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.893550] flags: 0x200000000000000(node=0|zone=2) [ 14.893716] page_type: f5(slab) [ 14.893884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.894237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.894733] page dumped because: kasan: bad access detected [ 14.894910] [ 14.894993] Memory state around the buggy address: [ 14.895157] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.895379] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.895597] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.895972] ^ [ 14.896374] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.896710] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.897051] ================================================================== [ 14.611757] ================================================================== [ 14.612098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.612449] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.612795] [ 14.612914] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.613193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.613209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.613262] Call Trace: [ 14.613282] <TASK> [ 14.613316] dump_stack_lvl+0x73/0xb0 [ 14.613358] print_report+0xd1/0x650 [ 14.613382] ? __virt_addr_valid+0x1db/0x2d0 [ 14.613417] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.613439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.613463] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.613486] kasan_report+0x141/0x180 [ 14.613563] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.613595] kasan_check_range+0x10c/0x1c0 [ 14.613654] __kasan_check_write+0x18/0x20 [ 14.613675] kasan_atomics_helper+0xfa9/0x5450 [ 14.613728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.613752] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.613779] ? kasan_save_alloc_info+0x3b/0x50 [ 14.613803] ? kasan_atomics+0x152/0x310 [ 14.613831] kasan_atomics+0x1dc/0x310 [ 14.613856] ? __pfx_kasan_atomics+0x10/0x10 [ 14.613881] ? __pfx_read_tsc+0x10/0x10 [ 14.613904] ? ktime_get_ts64+0x86/0x230 [ 14.613930] kunit_try_run_case+0x1a5/0x480 [ 14.613965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.613989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.614013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.614038] ? __kthread_parkme+0x82/0x180 [ 14.614060] ? preempt_count_sub+0x50/0x80 [ 14.614099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.614124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.614149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.614173] kthread+0x337/0x6f0 [ 14.614195] ? trace_preempt_on+0x20/0xc0 [ 14.614220] ? __pfx_kthread+0x10/0x10 [ 14.614245] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.614268] ? calculate_sigpending+0x7b/0xa0 [ 14.614293] ? __pfx_kthread+0x10/0x10 [ 14.614316] ret_from_fork+0x116/0x1d0 [ 14.614336] ? __pfx_kthread+0x10/0x10 [ 14.614359] ret_from_fork_asm+0x1a/0x30 [ 14.614391] </TASK> [ 14.614404] [ 14.624363] Allocated by task 282: [ 14.624615] kasan_save_stack+0x45/0x70 [ 14.625063] kasan_save_track+0x18/0x40 [ 14.625318] kasan_save_alloc_info+0x3b/0x50 [ 14.625586] __kasan_kmalloc+0xb7/0xc0 [ 14.625816] __kmalloc_cache_noprof+0x189/0x420 [ 14.626061] kasan_atomics+0x95/0x310 [ 14.626264] kunit_try_run_case+0x1a5/0x480 [ 14.626603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.626865] kthread+0x337/0x6f0 [ 14.627100] ret_from_fork+0x116/0x1d0 [ 14.627286] ret_from_fork_asm+0x1a/0x30 [ 14.627571] [ 14.627793] The buggy address belongs to the object at ffff888103a18380 [ 14.627793] which belongs to the cache kmalloc-64 of size 64 [ 14.628376] The buggy address is located 0 bytes to the right of [ 14.628376] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.629587] [ 14.629705] The buggy address belongs to the physical page: [ 14.629887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.630479] flags: 0x200000000000000(node=0|zone=2) [ 14.630667] page_type: f5(slab) [ 14.630842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.631323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.631655] page dumped because: kasan: bad access detected [ 14.632106] [ 14.632288] Memory state around the buggy address: [ 14.632723] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.633077] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.633521] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.634064] ^ [ 14.634342] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634804] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.635176] ================================================================== [ 15.165450] ================================================================== [ 15.165863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.166133] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.166636] [ 15.166770] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.166814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.166827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.166850] Call Trace: [ 15.166867] <TASK> [ 15.166883] dump_stack_lvl+0x73/0xb0 [ 15.166911] print_report+0xd1/0x650 [ 15.166934] ? __virt_addr_valid+0x1db/0x2d0 [ 15.166969] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.166993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.167019] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.167043] kasan_report+0x141/0x180 [ 15.167068] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.167108] kasan_check_range+0x10c/0x1c0 [ 15.167139] __kasan_check_write+0x18/0x20 [ 15.167160] kasan_atomics_helper+0x1c18/0x5450 [ 15.167185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.167208] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.167234] ? kasan_save_alloc_info+0x3b/0x50 [ 15.167258] ? kasan_atomics+0x152/0x310 [ 15.167287] kasan_atomics+0x1dc/0x310 [ 15.167311] ? __pfx_kasan_atomics+0x10/0x10 [ 15.167338] ? __pfx_read_tsc+0x10/0x10 [ 15.167361] ? ktime_get_ts64+0x86/0x230 [ 15.167385] kunit_try_run_case+0x1a5/0x480 [ 15.167411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.167434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.167461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.167486] ? __kthread_parkme+0x82/0x180 [ 15.167507] ? preempt_count_sub+0x50/0x80 [ 15.167532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.167558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.167583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.167607] kthread+0x337/0x6f0 [ 15.167629] ? trace_preempt_on+0x20/0xc0 [ 15.167654] ? __pfx_kthread+0x10/0x10 [ 15.167676] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.167699] ? calculate_sigpending+0x7b/0xa0 [ 15.167724] ? __pfx_kthread+0x10/0x10 [ 15.167746] ret_from_fork+0x116/0x1d0 [ 15.167766] ? __pfx_kthread+0x10/0x10 [ 15.167788] ret_from_fork_asm+0x1a/0x30 [ 15.167820] </TASK> [ 15.167834] [ 15.175306] Allocated by task 282: [ 15.175495] kasan_save_stack+0x45/0x70 [ 15.175702] kasan_save_track+0x18/0x40 [ 15.175892] kasan_save_alloc_info+0x3b/0x50 [ 15.176160] __kasan_kmalloc+0xb7/0xc0 [ 15.176332] __kmalloc_cache_noprof+0x189/0x420 [ 15.176525] kasan_atomics+0x95/0x310 [ 15.176715] kunit_try_run_case+0x1a5/0x480 [ 15.176913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.177176] kthread+0x337/0x6f0 [ 15.177305] ret_from_fork+0x116/0x1d0 [ 15.177439] ret_from_fork_asm+0x1a/0x30 [ 15.177579] [ 15.177653] The buggy address belongs to the object at ffff888103a18380 [ 15.177653] which belongs to the cache kmalloc-64 of size 64 [ 15.178014] The buggy address is located 0 bytes to the right of [ 15.178014] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.178731] [ 15.178830] The buggy address belongs to the physical page: [ 15.179079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.179327] flags: 0x200000000000000(node=0|zone=2) [ 15.179494] page_type: f5(slab) [ 15.179623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.179885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.180455] page dumped because: kasan: bad access detected [ 15.180714] [ 15.180816] Memory state around the buggy address: [ 15.181056] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.181392] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.181726] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.182056] ^ [ 15.182261] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.182523] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.182767] ================================================================== [ 14.333568] ================================================================== [ 14.334323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.334742] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.335032] [ 14.335198] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.335263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.335291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.335330] Call Trace: [ 14.335359] <TASK> [ 14.335390] dump_stack_lvl+0x73/0xb0 [ 14.335433] print_report+0xd1/0x650 [ 14.335483] ? __virt_addr_valid+0x1db/0x2d0 [ 14.335520] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.335556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.335595] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.335629] kasan_report+0x141/0x180 [ 14.335654] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.335736] kasan_check_range+0x10c/0x1c0 [ 14.335768] __kasan_check_write+0x18/0x20 [ 14.335790] kasan_atomics_helper+0x8f9/0x5450 [ 14.335814] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.335839] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.335864] ? kasan_save_alloc_info+0x3b/0x50 [ 14.335889] ? kasan_atomics+0x152/0x310 [ 14.335918] kasan_atomics+0x1dc/0x310 [ 14.335953] ? __pfx_kasan_atomics+0x10/0x10 [ 14.335979] ? __pfx_read_tsc+0x10/0x10 [ 14.336001] ? ktime_get_ts64+0x86/0x230 [ 14.336027] kunit_try_run_case+0x1a5/0x480 [ 14.336053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.336077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.336103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.336127] ? __kthread_parkme+0x82/0x180 [ 14.336149] ? preempt_count_sub+0x50/0x80 [ 14.336175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.336200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.336224] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.336250] kthread+0x337/0x6f0 [ 14.336271] ? trace_preempt_on+0x20/0xc0 [ 14.336296] ? __pfx_kthread+0x10/0x10 [ 14.336318] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.336340] ? calculate_sigpending+0x7b/0xa0 [ 14.336365] ? __pfx_kthread+0x10/0x10 [ 14.336388] ret_from_fork+0x116/0x1d0 [ 14.336408] ? __pfx_kthread+0x10/0x10 [ 14.336430] ret_from_fork_asm+0x1a/0x30 [ 14.336603] </TASK> [ 14.336624] [ 14.353212] Allocated by task 282: [ 14.353404] kasan_save_stack+0x45/0x70 [ 14.353897] kasan_save_track+0x18/0x40 [ 14.354086] kasan_save_alloc_info+0x3b/0x50 [ 14.354364] __kasan_kmalloc+0xb7/0xc0 [ 14.354750] __kmalloc_cache_noprof+0x189/0x420 [ 14.354987] kasan_atomics+0x95/0x310 [ 14.355237] kunit_try_run_case+0x1a5/0x480 [ 14.355634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.356042] kthread+0x337/0x6f0 [ 14.356334] ret_from_fork+0x116/0x1d0 [ 14.356485] ret_from_fork_asm+0x1a/0x30 [ 14.356723] [ 14.356906] The buggy address belongs to the object at ffff888103a18380 [ 14.356906] which belongs to the cache kmalloc-64 of size 64 [ 14.357837] The buggy address is located 0 bytes to the right of [ 14.357837] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.358429] [ 14.358645] The buggy address belongs to the physical page: [ 14.358927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.359350] flags: 0x200000000000000(node=0|zone=2) [ 14.359693] page_type: f5(slab) [ 14.359892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.360258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.360646] page dumped because: kasan: bad access detected [ 14.360987] [ 14.361188] Memory state around the buggy address: [ 14.361439] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.361985] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.362401] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.362829] ^ [ 14.363148] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.363438] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.363806] ================================================================== [ 14.442587] ================================================================== [ 14.442887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.443248] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.443479] [ 14.443566] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.443607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.443621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.443642] Call Trace: [ 14.443661] <TASK> [ 14.443678] dump_stack_lvl+0x73/0xb0 [ 14.443705] print_report+0xd1/0x650 [ 14.443727] ? __virt_addr_valid+0x1db/0x2d0 [ 14.443796] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.443821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.443846] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.443869] kasan_report+0x141/0x180 [ 14.443894] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.443921] kasan_check_range+0x10c/0x1c0 [ 14.443960] __kasan_check_write+0x18/0x20 [ 14.443981] kasan_atomics_helper+0xb6a/0x5450 [ 14.444005] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.444029] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.444054] ? kasan_save_alloc_info+0x3b/0x50 [ 14.444078] ? kasan_atomics+0x152/0x310 [ 14.444106] kasan_atomics+0x1dc/0x310 [ 14.444130] ? __pfx_kasan_atomics+0x10/0x10 [ 14.444156] ? __pfx_read_tsc+0x10/0x10 [ 14.444177] ? ktime_get_ts64+0x86/0x230 [ 14.444202] kunit_try_run_case+0x1a5/0x480 [ 14.444227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.444251] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.444274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.444299] ? __kthread_parkme+0x82/0x180 [ 14.444321] ? preempt_count_sub+0x50/0x80 [ 14.444344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.444369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.444393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.444417] kthread+0x337/0x6f0 [ 14.444438] ? trace_preempt_on+0x20/0xc0 [ 14.444620] ? __pfx_kthread+0x10/0x10 [ 14.444652] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.444676] ? calculate_sigpending+0x7b/0xa0 [ 14.444701] ? __pfx_kthread+0x10/0x10 [ 14.444724] ret_from_fork+0x116/0x1d0 [ 14.444745] ? __pfx_kthread+0x10/0x10 [ 14.444767] ret_from_fork_asm+0x1a/0x30 [ 14.444799] </TASK> [ 14.444813] [ 14.453657] Allocated by task 282: [ 14.453792] kasan_save_stack+0x45/0x70 [ 14.453949] kasan_save_track+0x18/0x40 [ 14.454086] kasan_save_alloc_info+0x3b/0x50 [ 14.454237] __kasan_kmalloc+0xb7/0xc0 [ 14.454372] __kmalloc_cache_noprof+0x189/0x420 [ 14.454539] kasan_atomics+0x95/0x310 [ 14.454730] kunit_try_run_case+0x1a5/0x480 [ 14.455202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.455508] kthread+0x337/0x6f0 [ 14.455689] ret_from_fork+0x116/0x1d0 [ 14.455879] ret_from_fork_asm+0x1a/0x30 [ 14.456058] [ 14.456167] The buggy address belongs to the object at ffff888103a18380 [ 14.456167] which belongs to the cache kmalloc-64 of size 64 [ 14.456923] The buggy address is located 0 bytes to the right of [ 14.456923] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.457373] [ 14.457451] The buggy address belongs to the physical page: [ 14.457734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.458195] flags: 0x200000000000000(node=0|zone=2) [ 14.458423] page_type: f5(slab) [ 14.458639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.458927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.459371] page dumped because: kasan: bad access detected [ 14.459729] [ 14.459832] Memory state around the buggy address: [ 14.460041] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.460325] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.460788] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.461094] ^ [ 14.461322] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.461679] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.461907] ================================================================== [ 15.028891] ================================================================== [ 15.030121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.030760] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.031444] [ 15.031618] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.031662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.031676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.031699] Call Trace: [ 15.031717] <TASK> [ 15.031734] dump_stack_lvl+0x73/0xb0 [ 15.031762] print_report+0xd1/0x650 [ 15.031785] ? __virt_addr_valid+0x1db/0x2d0 [ 15.031809] ? kasan_atomics_helper+0x1818/0x5450 [ 15.031833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.031857] ? kasan_atomics_helper+0x1818/0x5450 [ 15.031880] kasan_report+0x141/0x180 [ 15.031904] ? kasan_atomics_helper+0x1818/0x5450 [ 15.031931] kasan_check_range+0x10c/0x1c0 [ 15.031969] __kasan_check_write+0x18/0x20 [ 15.031990] kasan_atomics_helper+0x1818/0x5450 [ 15.032014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.032038] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.032063] ? kasan_save_alloc_info+0x3b/0x50 [ 15.032088] ? kasan_atomics+0x152/0x310 [ 15.032117] kasan_atomics+0x1dc/0x310 [ 15.032140] ? __pfx_kasan_atomics+0x10/0x10 [ 15.032167] ? __pfx_read_tsc+0x10/0x10 [ 15.032190] ? ktime_get_ts64+0x86/0x230 [ 15.032215] kunit_try_run_case+0x1a5/0x480 [ 15.032241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.032264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.032289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.032313] ? __kthread_parkme+0x82/0x180 [ 15.032335] ? preempt_count_sub+0x50/0x80 [ 15.032360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.032385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.032409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.032434] kthread+0x337/0x6f0 [ 15.032455] ? trace_preempt_on+0x20/0xc0 [ 15.032479] ? __pfx_kthread+0x10/0x10 [ 15.032502] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.032525] ? calculate_sigpending+0x7b/0xa0 [ 15.032550] ? __pfx_kthread+0x10/0x10 [ 15.032573] ret_from_fork+0x116/0x1d0 [ 15.032593] ? __pfx_kthread+0x10/0x10 [ 15.032615] ret_from_fork_asm+0x1a/0x30 [ 15.032647] </TASK> [ 15.032661] [ 15.042856] Allocated by task 282: [ 15.043062] kasan_save_stack+0x45/0x70 [ 15.043265] kasan_save_track+0x18/0x40 [ 15.043451] kasan_save_alloc_info+0x3b/0x50 [ 15.043653] __kasan_kmalloc+0xb7/0xc0 [ 15.043831] __kmalloc_cache_noprof+0x189/0x420 [ 15.044052] kasan_atomics+0x95/0x310 [ 15.044622] kunit_try_run_case+0x1a5/0x480 [ 15.044780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.044972] kthread+0x337/0x6f0 [ 15.045098] ret_from_fork+0x116/0x1d0 [ 15.045235] ret_from_fork_asm+0x1a/0x30 [ 15.045378] [ 15.045452] The buggy address belongs to the object at ffff888103a18380 [ 15.045452] which belongs to the cache kmalloc-64 of size 64 [ 15.045805] The buggy address is located 0 bytes to the right of [ 15.045805] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.046969] [ 15.047124] The buggy address belongs to the physical page: [ 15.047578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.048279] flags: 0x200000000000000(node=0|zone=2) [ 15.048732] page_type: f5(slab) [ 15.049042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.049385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.049700] page dumped because: kasan: bad access detected [ 15.049937] [ 15.050024] Memory state around the buggy address: [ 15.050187] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.050654] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.050898] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.051393] ^ [ 15.051622] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.051928] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.052201] ================================================================== [ 15.405843] ================================================================== [ 15.406192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.406918] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 15.407332] [ 15.407438] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.407483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.407496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.407520] Call Trace: [ 15.407539] <TASK> [ 15.407558] dump_stack_lvl+0x73/0xb0 [ 15.407587] print_report+0xd1/0x650 [ 15.407611] ? __virt_addr_valid+0x1db/0x2d0 [ 15.407638] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.407661] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.407686] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.407709] kasan_report+0x141/0x180 [ 15.407733] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.407761] __asan_report_load8_noabort+0x18/0x20 [ 15.407786] kasan_atomics_helper+0x4fb2/0x5450 [ 15.407811] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.407834] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.407858] ? kasan_save_alloc_info+0x3b/0x50 [ 15.407883] ? kasan_atomics+0x152/0x310 [ 15.407911] kasan_atomics+0x1dc/0x310 [ 15.407936] ? __pfx_kasan_atomics+0x10/0x10 [ 15.407974] ? __pfx_read_tsc+0x10/0x10 [ 15.407997] ? ktime_get_ts64+0x86/0x230 [ 15.408022] kunit_try_run_case+0x1a5/0x480 [ 15.408047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.408082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.408107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.408131] ? __kthread_parkme+0x82/0x180 [ 15.408153] ? preempt_count_sub+0x50/0x80 [ 15.408177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.408203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.408227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.408251] kthread+0x337/0x6f0 [ 15.408272] ? trace_preempt_on+0x20/0xc0 [ 15.408296] ? __pfx_kthread+0x10/0x10 [ 15.408317] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.408341] ? calculate_sigpending+0x7b/0xa0 [ 15.408366] ? __pfx_kthread+0x10/0x10 [ 15.408388] ret_from_fork+0x116/0x1d0 [ 15.408408] ? __pfx_kthread+0x10/0x10 [ 15.408431] ret_from_fork_asm+0x1a/0x30 [ 15.408463] </TASK> [ 15.408475] [ 15.416079] Allocated by task 282: [ 15.416278] kasan_save_stack+0x45/0x70 [ 15.416456] kasan_save_track+0x18/0x40 [ 15.416649] kasan_save_alloc_info+0x3b/0x50 [ 15.416830] __kasan_kmalloc+0xb7/0xc0 [ 15.417029] __kmalloc_cache_noprof+0x189/0x420 [ 15.417223] kasan_atomics+0x95/0x310 [ 15.417379] kunit_try_run_case+0x1a5/0x480 [ 15.417592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.417828] kthread+0x337/0x6f0 [ 15.418009] ret_from_fork+0x116/0x1d0 [ 15.418199] ret_from_fork_asm+0x1a/0x30 [ 15.418341] [ 15.418415] The buggy address belongs to the object at ffff888103a18380 [ 15.418415] which belongs to the cache kmalloc-64 of size 64 [ 15.418931] The buggy address is located 0 bytes to the right of [ 15.418931] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 15.419315] [ 15.419390] The buggy address belongs to the physical page: [ 15.419568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 15.420053] flags: 0x200000000000000(node=0|zone=2) [ 15.420300] page_type: f5(slab) [ 15.420519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.420752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.420991] page dumped because: kasan: bad access detected [ 15.421163] [ 15.421236] Memory state around the buggy address: [ 15.421471] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.421800] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.422225] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.422550] ^ [ 15.422780] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.423117] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.423461] ================================================================== [ 14.130151] ================================================================== [ 14.130597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.131229] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.131635] [ 14.131800] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.131860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.131874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.131898] Call Trace: [ 14.131916] <TASK> [ 14.131934] dump_stack_lvl+0x73/0xb0 [ 14.131975] print_report+0xd1/0x650 [ 14.131999] ? __virt_addr_valid+0x1db/0x2d0 [ 14.132023] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.132091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.132115] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.132177] kasan_report+0x141/0x180 [ 14.132202] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.132242] __asan_report_load4_noabort+0x18/0x20 [ 14.132268] kasan_atomics_helper+0x4b54/0x5450 [ 14.132291] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.132315] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.132340] ? kasan_save_alloc_info+0x3b/0x50 [ 14.132364] ? kasan_atomics+0x152/0x310 [ 14.132393] kasan_atomics+0x1dc/0x310 [ 14.132418] ? __pfx_kasan_atomics+0x10/0x10 [ 14.132443] ? __pfx_read_tsc+0x10/0x10 [ 14.132481] ? ktime_get_ts64+0x86/0x230 [ 14.132506] kunit_try_run_case+0x1a5/0x480 [ 14.132532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.132711] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.132738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.132794] ? __kthread_parkme+0x82/0x180 [ 14.132816] ? preempt_count_sub+0x50/0x80 [ 14.132854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.132879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.132904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.132944] kthread+0x337/0x6f0 [ 14.132965] ? trace_preempt_on+0x20/0xc0 [ 14.132990] ? __pfx_kthread+0x10/0x10 [ 14.133011] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.133034] ? calculate_sigpending+0x7b/0xa0 [ 14.133060] ? __pfx_kthread+0x10/0x10 [ 14.133094] ret_from_fork+0x116/0x1d0 [ 14.133115] ? __pfx_kthread+0x10/0x10 [ 14.133138] ret_from_fork_asm+0x1a/0x30 [ 14.133184] </TASK> [ 14.133199] [ 14.142313] Allocated by task 282: [ 14.142831] kasan_save_stack+0x45/0x70 [ 14.143102] kasan_save_track+0x18/0x40 [ 14.143254] kasan_save_alloc_info+0x3b/0x50 [ 14.143535] __kasan_kmalloc+0xb7/0xc0 [ 14.143674] __kmalloc_cache_noprof+0x189/0x420 [ 14.143832] kasan_atomics+0x95/0x310 [ 14.144246] kunit_try_run_case+0x1a5/0x480 [ 14.144522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.144762] kthread+0x337/0x6f0 [ 14.144997] ret_from_fork+0x116/0x1d0 [ 14.145321] ret_from_fork_asm+0x1a/0x30 [ 14.145601] [ 14.145685] The buggy address belongs to the object at ffff888103a18380 [ 14.145685] which belongs to the cache kmalloc-64 of size 64 [ 14.146261] The buggy address is located 0 bytes to the right of [ 14.146261] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.147103] [ 14.147209] The buggy address belongs to the physical page: [ 14.147592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.147922] flags: 0x200000000000000(node=0|zone=2) [ 14.148278] page_type: f5(slab) [ 14.148586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.148893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.149346] page dumped because: kasan: bad access detected [ 14.149736] [ 14.149834] Memory state around the buggy address: [ 14.150064] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.150366] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.150830] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.151192] ^ [ 14.151623] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.151908] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.152352] ================================================================== [ 14.736196] ================================================================== [ 14.736787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.737041] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.737745] [ 14.737838] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.737882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.737896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.737919] Call Trace: [ 14.737933] <TASK> [ 14.737959] dump_stack_lvl+0x73/0xb0 [ 14.737987] print_report+0xd1/0x650 [ 14.738010] ? __virt_addr_valid+0x1db/0x2d0 [ 14.738034] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.738056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.738090] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.738113] kasan_report+0x141/0x180 [ 14.738137] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.738165] __asan_report_load4_noabort+0x18/0x20 [ 14.738191] kasan_atomics_helper+0x4a02/0x5450 [ 14.738215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.738239] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.738265] ? kasan_save_alloc_info+0x3b/0x50 [ 14.738290] ? kasan_atomics+0x152/0x310 [ 14.738317] kasan_atomics+0x1dc/0x310 [ 14.738342] ? __pfx_kasan_atomics+0x10/0x10 [ 14.738368] ? __pfx_read_tsc+0x10/0x10 [ 14.738391] ? ktime_get_ts64+0x86/0x230 [ 14.738416] kunit_try_run_case+0x1a5/0x480 [ 14.738442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.738490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.738515] ? __kthread_parkme+0x82/0x180 [ 14.738535] ? preempt_count_sub+0x50/0x80 [ 14.738560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.738610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.738635] kthread+0x337/0x6f0 [ 14.738656] ? trace_preempt_on+0x20/0xc0 [ 14.738681] ? __pfx_kthread+0x10/0x10 [ 14.738703] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.738726] ? calculate_sigpending+0x7b/0xa0 [ 14.738751] ? __pfx_kthread+0x10/0x10 [ 14.738774] ret_from_fork+0x116/0x1d0 [ 14.738794] ? __pfx_kthread+0x10/0x10 [ 14.738816] ret_from_fork_asm+0x1a/0x30 [ 14.738848] </TASK> [ 14.738861] [ 14.746326] Allocated by task 282: [ 14.746515] kasan_save_stack+0x45/0x70 [ 14.746802] kasan_save_track+0x18/0x40 [ 14.746966] kasan_save_alloc_info+0x3b/0x50 [ 14.747123] __kasan_kmalloc+0xb7/0xc0 [ 14.747258] __kmalloc_cache_noprof+0x189/0x420 [ 14.747415] kasan_atomics+0x95/0x310 [ 14.747550] kunit_try_run_case+0x1a5/0x480 [ 14.747743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.748015] kthread+0x337/0x6f0 [ 14.748336] ret_from_fork+0x116/0x1d0 [ 14.748532] ret_from_fork_asm+0x1a/0x30 [ 14.748737] [ 14.748838] The buggy address belongs to the object at ffff888103a18380 [ 14.748838] which belongs to the cache kmalloc-64 of size 64 [ 14.749636] The buggy address is located 0 bytes to the right of [ 14.749636] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.750082] [ 14.750184] The buggy address belongs to the physical page: [ 14.750448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.750766] flags: 0x200000000000000(node=0|zone=2) [ 14.750993] page_type: f5(slab) [ 14.751196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.751509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.751806] page dumped because: kasan: bad access detected [ 14.752046] [ 14.752145] Memory state around the buggy address: [ 14.752355] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.752577] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.752795] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.753022] ^ [ 14.753181] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.753505] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.753834] ================================================================== [ 14.504061] ================================================================== [ 14.504378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.505332] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.506165] [ 14.506301] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.506349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.506365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.506387] Call Trace: [ 14.506402] <TASK> [ 14.506419] dump_stack_lvl+0x73/0xb0 [ 14.506449] print_report+0xd1/0x650 [ 14.506632] ? __virt_addr_valid+0x1db/0x2d0 [ 14.506661] ? kasan_atomics_helper+0xd47/0x5450 [ 14.506684] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.506709] ? kasan_atomics_helper+0xd47/0x5450 [ 14.506732] kasan_report+0x141/0x180 [ 14.506756] ? kasan_atomics_helper+0xd47/0x5450 [ 14.506783] kasan_check_range+0x10c/0x1c0 [ 14.506809] __kasan_check_write+0x18/0x20 [ 14.506831] kasan_atomics_helper+0xd47/0x5450 [ 14.506856] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.506879] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.506905] ? kasan_save_alloc_info+0x3b/0x50 [ 14.506930] ? kasan_atomics+0x152/0x310 [ 14.506971] kasan_atomics+0x1dc/0x310 [ 14.506996] ? __pfx_kasan_atomics+0x10/0x10 [ 14.507022] ? __pfx_read_tsc+0x10/0x10 [ 14.507044] ? ktime_get_ts64+0x86/0x230 [ 14.507100] kunit_try_run_case+0x1a5/0x480 [ 14.507153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.507331] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.507363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.507390] ? __kthread_parkme+0x82/0x180 [ 14.507412] ? preempt_count_sub+0x50/0x80 [ 14.507437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.507470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.507496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.507520] kthread+0x337/0x6f0 [ 14.507542] ? trace_preempt_on+0x20/0xc0 [ 14.507566] ? __pfx_kthread+0x10/0x10 [ 14.507587] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.507610] ? calculate_sigpending+0x7b/0xa0 [ 14.507634] ? __pfx_kthread+0x10/0x10 [ 14.507658] ret_from_fork+0x116/0x1d0 [ 14.507677] ? __pfx_kthread+0x10/0x10 [ 14.507698] ret_from_fork_asm+0x1a/0x30 [ 14.507730] </TASK> [ 14.507743] [ 14.522659] Allocated by task 282: [ 14.523013] kasan_save_stack+0x45/0x70 [ 14.523506] kasan_save_track+0x18/0x40 [ 14.523885] kasan_save_alloc_info+0x3b/0x50 [ 14.524093] __kasan_kmalloc+0xb7/0xc0 [ 14.524226] __kmalloc_cache_noprof+0x189/0x420 [ 14.524380] kasan_atomics+0x95/0x310 [ 14.524513] kunit_try_run_case+0x1a5/0x480 [ 14.524661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.524965] kthread+0x337/0x6f0 [ 14.525127] ret_from_fork+0x116/0x1d0 [ 14.525291] ret_from_fork_asm+0x1a/0x30 [ 14.525468] [ 14.525561] The buggy address belongs to the object at ffff888103a18380 [ 14.525561] which belongs to the cache kmalloc-64 of size 64 [ 14.525950] The buggy address is located 0 bytes to the right of [ 14.525950] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.526692] [ 14.526768] The buggy address belongs to the physical page: [ 14.526946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.527638] flags: 0x200000000000000(node=0|zone=2) [ 14.527837] page_type: f5(slab) [ 14.528015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.528289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.528552] page dumped because: kasan: bad access detected [ 14.528809] [ 14.528905] Memory state around the buggy address: [ 14.529261] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.529556] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.529869] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.530304] ^ [ 14.530588] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.531006] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.531350] ================================================================== [ 14.754403] ================================================================== [ 14.755156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.755395] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.755616] [ 14.755702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.755745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.755759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.755781] Call Trace: [ 14.755796] <TASK> [ 14.755811] dump_stack_lvl+0x73/0xb0 [ 14.755841] print_report+0xd1/0x650 [ 14.755864] ? __virt_addr_valid+0x1db/0x2d0 [ 14.755888] ? kasan_atomics_helper+0x1217/0x5450 [ 14.755911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.755934] ? kasan_atomics_helper+0x1217/0x5450 [ 14.755968] kasan_report+0x141/0x180 [ 14.756009] ? kasan_atomics_helper+0x1217/0x5450 [ 14.756038] kasan_check_range+0x10c/0x1c0 [ 14.756063] __kasan_check_write+0x18/0x20 [ 14.756094] kasan_atomics_helper+0x1217/0x5450 [ 14.756119] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.756142] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.756169] ? kasan_save_alloc_info+0x3b/0x50 [ 14.756193] ? kasan_atomics+0x152/0x310 [ 14.756221] kasan_atomics+0x1dc/0x310 [ 14.756245] ? __pfx_kasan_atomics+0x10/0x10 [ 14.756271] ? __pfx_read_tsc+0x10/0x10 [ 14.756293] ? ktime_get_ts64+0x86/0x230 [ 14.756320] kunit_try_run_case+0x1a5/0x480 [ 14.756344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.756367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.756392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.756417] ? __kthread_parkme+0x82/0x180 [ 14.756438] ? preempt_count_sub+0x50/0x80 [ 14.756463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.756489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.756514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.756539] kthread+0x337/0x6f0 [ 14.756559] ? trace_preempt_on+0x20/0xc0 [ 14.756584] ? __pfx_kthread+0x10/0x10 [ 14.756607] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.756630] ? calculate_sigpending+0x7b/0xa0 [ 14.756655] ? __pfx_kthread+0x10/0x10 [ 14.756677] ret_from_fork+0x116/0x1d0 [ 14.756697] ? __pfx_kthread+0x10/0x10 [ 14.756719] ret_from_fork_asm+0x1a/0x30 [ 14.756751] </TASK> [ 14.756764] [ 14.764590] Allocated by task 282: [ 14.764781] kasan_save_stack+0x45/0x70 [ 14.764947] kasan_save_track+0x18/0x40 [ 14.765173] kasan_save_alloc_info+0x3b/0x50 [ 14.765388] __kasan_kmalloc+0xb7/0xc0 [ 14.765537] __kmalloc_cache_noprof+0x189/0x420 [ 14.765752] kasan_atomics+0x95/0x310 [ 14.765932] kunit_try_run_case+0x1a5/0x480 [ 14.766157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.766397] kthread+0x337/0x6f0 [ 14.766545] ret_from_fork+0x116/0x1d0 [ 14.766694] ret_from_fork_asm+0x1a/0x30 [ 14.766834] [ 14.766908] The buggy address belongs to the object at ffff888103a18380 [ 14.766908] which belongs to the cache kmalloc-64 of size 64 [ 14.767277] The buggy address is located 0 bytes to the right of [ 14.767277] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.767643] [ 14.767718] The buggy address belongs to the physical page: [ 14.767925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.768723] flags: 0x200000000000000(node=0|zone=2) [ 14.768973] page_type: f5(slab) [ 14.769224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.769572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.769816] page dumped because: kasan: bad access detected [ 14.770009] [ 14.770084] Memory state around the buggy address: [ 14.770242] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.770462] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.770682] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.771058] ^ [ 14.771294] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.771630] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.771962] ================================================================== [ 14.364447] ================================================================== [ 14.364797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.365119] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282 [ 14.365457] [ 14.365821] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.365871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.365886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.365909] Call Trace: [ 14.365928] <TASK> [ 14.365958] dump_stack_lvl+0x73/0xb0 [ 14.365988] print_report+0xd1/0x650 [ 14.366050] ? __virt_addr_valid+0x1db/0x2d0 [ 14.366077] ? kasan_atomics_helper+0x992/0x5450 [ 14.366130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.366154] ? kasan_atomics_helper+0x992/0x5450 [ 14.366177] kasan_report+0x141/0x180 [ 14.366200] ? kasan_atomics_helper+0x992/0x5450 [ 14.366227] kasan_check_range+0x10c/0x1c0 [ 14.366253] __kasan_check_write+0x18/0x20 [ 14.366273] kasan_atomics_helper+0x992/0x5450 [ 14.366297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.366321] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.366377] ? kasan_save_alloc_info+0x3b/0x50 [ 14.366404] ? kasan_atomics+0x152/0x310 [ 14.366433] kasan_atomics+0x1dc/0x310 [ 14.366456] ? __pfx_kasan_atomics+0x10/0x10 [ 14.366493] ? __pfx_read_tsc+0x10/0x10 [ 14.366514] ? ktime_get_ts64+0x86/0x230 [ 14.366625] kunit_try_run_case+0x1a5/0x480 [ 14.366652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.366677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.366702] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.366727] ? __kthread_parkme+0x82/0x180 [ 14.366749] ? preempt_count_sub+0x50/0x80 [ 14.366774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.366799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.366824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.366849] kthread+0x337/0x6f0 [ 14.366870] ? trace_preempt_on+0x20/0xc0 [ 14.366896] ? __pfx_kthread+0x10/0x10 [ 14.366918] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.366952] ? calculate_sigpending+0x7b/0xa0 [ 14.366978] ? __pfx_kthread+0x10/0x10 [ 14.367000] ret_from_fork+0x116/0x1d0 [ 14.367021] ? __pfx_kthread+0x10/0x10 [ 14.367043] ret_from_fork_asm+0x1a/0x30 [ 14.367089] </TASK> [ 14.367104] [ 14.382354] Allocated by task 282: [ 14.382558] kasan_save_stack+0x45/0x70 [ 14.382968] kasan_save_track+0x18/0x40 [ 14.383380] kasan_save_alloc_info+0x3b/0x50 [ 14.383914] __kasan_kmalloc+0xb7/0xc0 [ 14.384403] __kmalloc_cache_noprof+0x189/0x420 [ 14.384958] kasan_atomics+0x95/0x310 [ 14.385257] kunit_try_run_case+0x1a5/0x480 [ 14.385636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.386236] kthread+0x337/0x6f0 [ 14.386396] ret_from_fork+0x116/0x1d0 [ 14.386848] ret_from_fork_asm+0x1a/0x30 [ 14.387090] [ 14.387291] The buggy address belongs to the object at ffff888103a18380 [ 14.387291] which belongs to the cache kmalloc-64 of size 64 [ 14.388000] The buggy address is located 0 bytes to the right of [ 14.388000] allocated 48-byte region [ffff888103a18380, ffff888103a183b0) [ 14.389233] [ 14.389426] The buggy address belongs to the physical page: [ 14.390020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 14.390776] flags: 0x200000000000000(node=0|zone=2) [ 14.391282] page_type: f5(slab) [ 14.391598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.392053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.392280] page dumped because: kasan: bad access detected [ 14.392450] [ 14.392677] Memory state around the buggy address: [ 14.393141] ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.393796] ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.394682] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.395483] ^ [ 14.396063] ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.396817] ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.397044] ==================================================================