Date
July 11, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.497669] ================================================================== [ 19.497835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.499306] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.499381] [ 19.499416] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.499977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.500006] Hardware name: linux,dummy-virt (DT) [ 19.500060] Call trace: [ 19.500086] show_stack+0x20/0x38 (C) [ 19.500237] dump_stack_lvl+0x8c/0xd0 [ 19.500670] print_report+0x118/0x608 [ 19.501271] kasan_report+0xdc/0x128 [ 19.501891] kasan_check_range+0x100/0x1a8 [ 19.502793] __kasan_check_write+0x20/0x30 [ 19.502970] kasan_atomics_helper+0x11f8/0x4858 [ 19.503020] kasan_atomics+0x198/0x2e0 [ 19.503616] kunit_try_run_case+0x170/0x3f0 [ 19.505329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.505416] kthread+0x328/0x630 [ 19.505460] ret_from_fork+0x10/0x20 [ 19.505511] [ 19.505531] Allocated by task 266: [ 19.505560] kasan_save_stack+0x3c/0x68 [ 19.505612] kasan_save_track+0x20/0x40 [ 19.505651] kasan_save_alloc_info+0x40/0x58 [ 19.505693] __kasan_kmalloc+0xd4/0xd8 [ 19.505731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.505772] kasan_atomics+0xb8/0x2e0 [ 19.505809] kunit_try_run_case+0x170/0x3f0 [ 19.505862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.507490] kthread+0x328/0x630 [ 19.507530] ret_from_fork+0x10/0x20 [ 19.507567] [ 19.507591] The buggy address belongs to the object at fff00000c5906f00 [ 19.507591] which belongs to the cache kmalloc-64 of size 64 [ 19.507652] The buggy address is located 0 bytes to the right of [ 19.507652] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.507725] [ 19.507748] The buggy address belongs to the physical page: [ 19.507781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.507835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.507906] page_type: f5(slab) [ 19.507947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.508006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.509364] page dumped because: kasan: bad access detected [ 19.509398] [ 19.510151] Memory state around the buggy address: [ 19.510654] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.510719] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.510764] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.510807] ^ [ 19.510857] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.510901] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.510941] ================================================================== [ 19.524560] ================================================================== [ 19.524613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.524668] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.524719] [ 19.524752] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.529472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.529905] Hardware name: linux,dummy-virt (DT) [ 19.530431] Call trace: [ 19.530529] show_stack+0x20/0x38 (C) [ 19.530940] dump_stack_lvl+0x8c/0xd0 [ 19.531804] print_report+0x118/0x608 [ 19.532111] kasan_report+0xdc/0x128 [ 19.534129] kasan_check_range+0x100/0x1a8 [ 19.534345] __kasan_check_write+0x20/0x30 [ 19.534445] kasan_atomics_helper+0x1384/0x4858 [ 19.535002] kasan_atomics+0x198/0x2e0 [ 19.535070] kunit_try_run_case+0x170/0x3f0 [ 19.535711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.535778] kthread+0x328/0x630 [ 19.535823] ret_from_fork+0x10/0x20 [ 19.535889] [ 19.535910] Allocated by task 266: [ 19.535939] kasan_save_stack+0x3c/0x68 [ 19.539099] kasan_save_track+0x20/0x40 [ 19.539193] kasan_save_alloc_info+0x40/0x58 [ 19.539239] __kasan_kmalloc+0xd4/0xd8 [ 19.539276] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.540143] kasan_atomics+0xb8/0x2e0 [ 19.540195] kunit_try_run_case+0x170/0x3f0 [ 19.541232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.541342] kthread+0x328/0x630 [ 19.542404] ret_from_fork+0x10/0x20 [ 19.543984] [ 19.544152] The buggy address belongs to the object at fff00000c5906f00 [ 19.544152] which belongs to the cache kmalloc-64 of size 64 [ 19.544475] The buggy address is located 0 bytes to the right of [ 19.544475] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.544634] [ 19.544741] The buggy address belongs to the physical page: [ 19.544933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.545170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.545221] page_type: f5(slab) [ 19.545261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.545661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.546654] page dumped because: kasan: bad access detected [ 19.546707] [ 19.546744] Memory state around the buggy address: [ 19.548433] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.548487] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.548533] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.548694] ^ [ 19.548753] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.548899] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.549892] ================================================================== [ 19.397991] ================================================================== [ 19.398313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.398395] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.398463] [ 19.398497] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.398589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.398626] Hardware name: linux,dummy-virt (DT) [ 19.398659] Call trace: [ 19.398690] show_stack+0x20/0x38 (C) [ 19.398802] dump_stack_lvl+0x8c/0xd0 [ 19.398899] print_report+0x118/0x608 [ 19.398997] kasan_report+0xdc/0x128 [ 19.399333] kasan_check_range+0x100/0x1a8 [ 19.399422] __kasan_check_read+0x20/0x30 [ 19.399572] kasan_atomics_helper+0xdd4/0x4858 [ 19.401263] kasan_atomics+0x198/0x2e0 [ 19.401346] kunit_try_run_case+0x170/0x3f0 [ 19.401429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.401545] kthread+0x328/0x630 [ 19.401623] ret_from_fork+0x10/0x20 [ 19.401717] [ 19.401829] Allocated by task 266: [ 19.401911] kasan_save_stack+0x3c/0x68 [ 19.401984] kasan_save_track+0x20/0x40 [ 19.402137] kasan_save_alloc_info+0x40/0x58 [ 19.402203] __kasan_kmalloc+0xd4/0xd8 [ 19.402261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.402301] kasan_atomics+0xb8/0x2e0 [ 19.402339] kunit_try_run_case+0x170/0x3f0 [ 19.402385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402464] kthread+0x328/0x630 [ 19.402531] ret_from_fork+0x10/0x20 [ 19.402568] [ 19.402597] The buggy address belongs to the object at fff00000c5906f00 [ 19.402597] which belongs to the cache kmalloc-64 of size 64 [ 19.402680] The buggy address is located 0 bytes to the right of [ 19.402680] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.402777] [ 19.402801] The buggy address belongs to the physical page: [ 19.402833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.402896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.402973] page_type: f5(slab) [ 19.403207] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.403271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.403339] page dumped because: kasan: bad access detected [ 19.403373] [ 19.403393] Memory state around the buggy address: [ 19.403681] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.403787] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.404637] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.404690] ^ [ 19.404812] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.405228] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.405449] ================================================================== [ 19.597884] ================================================================== [ 19.597931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.597985] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.598035] [ 19.598066] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.598276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.598324] Hardware name: linux,dummy-virt (DT) [ 19.598501] Call trace: [ 19.598525] show_stack+0x20/0x38 (C) [ 19.598575] dump_stack_lvl+0x8c/0xd0 [ 19.598623] print_report+0x118/0x608 [ 19.598670] kasan_report+0xdc/0x128 [ 19.598744] __asan_report_load8_noabort+0x20/0x30 [ 19.598798] kasan_atomics_helper+0x3df4/0x4858 [ 19.598857] kasan_atomics+0x198/0x2e0 [ 19.598904] kunit_try_run_case+0x170/0x3f0 [ 19.599167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.599548] kthread+0x328/0x630 [ 19.599595] ret_from_fork+0x10/0x20 [ 19.599644] [ 19.599664] Allocated by task 266: [ 19.599693] kasan_save_stack+0x3c/0x68 [ 19.599735] kasan_save_track+0x20/0x40 [ 19.599784] kasan_save_alloc_info+0x40/0x58 [ 19.599944] __kasan_kmalloc+0xd4/0xd8 [ 19.599994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.600058] kasan_atomics+0xb8/0x2e0 [ 19.600097] kunit_try_run_case+0x170/0x3f0 [ 19.600136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.600181] kthread+0x328/0x630 [ 19.600214] ret_from_fork+0x10/0x20 [ 19.600251] [ 19.600271] The buggy address belongs to the object at fff00000c5906f00 [ 19.600271] which belongs to the cache kmalloc-64 of size 64 [ 19.600347] The buggy address is located 0 bytes to the right of [ 19.600347] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.600421] [ 19.600443] The buggy address belongs to the physical page: [ 19.600475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.600629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.600701] page_type: f5(slab) [ 19.601158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.601315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.601382] page dumped because: kasan: bad access detected [ 19.601485] [ 19.601517] Memory state around the buggy address: [ 19.601550] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.601595] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.601640] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.601681] ^ [ 19.601716] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.601757] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.601797] ================================================================== [ 19.551973] ================================================================== [ 19.552043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.552283] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.553448] [ 19.553553] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.553647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.553677] Hardware name: linux,dummy-virt (DT) [ 19.553712] Call trace: [ 19.553887] show_stack+0x20/0x38 (C) [ 19.553943] dump_stack_lvl+0x8c/0xd0 [ 19.553994] print_report+0x118/0x608 [ 19.554043] kasan_report+0xdc/0x128 [ 19.554089] __asan_report_load8_noabort+0x20/0x30 [ 19.554683] kasan_atomics_helper+0x3f04/0x4858 [ 19.554757] kasan_atomics+0x198/0x2e0 [ 19.555102] kunit_try_run_case+0x170/0x3f0 [ 19.555362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.555448] kthread+0x328/0x630 [ 19.555492] ret_from_fork+0x10/0x20 [ 19.555549] [ 19.555569] Allocated by task 266: [ 19.555599] kasan_save_stack+0x3c/0x68 [ 19.555811] kasan_save_track+0x20/0x40 [ 19.555861] kasan_save_alloc_info+0x40/0x58 [ 19.555904] __kasan_kmalloc+0xd4/0xd8 [ 19.555940] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.555981] kasan_atomics+0xb8/0x2e0 [ 19.556028] kunit_try_run_case+0x170/0x3f0 [ 19.556185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.556230] kthread+0x328/0x630 [ 19.556265] ret_from_fork+0x10/0x20 [ 19.556302] [ 19.556324] The buggy address belongs to the object at fff00000c5906f00 [ 19.556324] which belongs to the cache kmalloc-64 of size 64 [ 19.556384] The buggy address is located 0 bytes to the right of [ 19.556384] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.556450] [ 19.556472] The buggy address belongs to the physical page: [ 19.556507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.556562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.556612] page_type: f5(slab) [ 19.556651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.556704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.556748] page dumped because: kasan: bad access detected [ 19.556780] [ 19.556801] Memory state around the buggy address: [ 19.556834] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.556890] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.556934] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.556976] ^ [ 19.557010] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.557054] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.557095] ================================================================== [ 19.391706] ================================================================== [ 19.391829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.391902] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.391979] [ 19.392010] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.392121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.392149] Hardware name: linux,dummy-virt (DT) [ 19.392183] Call trace: [ 19.392205] show_stack+0x20/0x38 (C) [ 19.392256] dump_stack_lvl+0x8c/0xd0 [ 19.392303] print_report+0x118/0x608 [ 19.392496] kasan_report+0xdc/0x128 [ 19.392556] __asan_report_load4_noabort+0x20/0x30 [ 19.392621] kasan_atomics_helper+0x3e04/0x4858 [ 19.392670] kasan_atomics+0x198/0x2e0 [ 19.392723] kunit_try_run_case+0x170/0x3f0 [ 19.392812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.392914] kthread+0x328/0x630 [ 19.393289] ret_from_fork+0x10/0x20 [ 19.393656] [ 19.393737] Allocated by task 266: [ 19.393807] kasan_save_stack+0x3c/0x68 [ 19.393958] kasan_save_track+0x20/0x40 [ 19.394011] kasan_save_alloc_info+0x40/0x58 [ 19.394052] __kasan_kmalloc+0xd4/0xd8 [ 19.394127] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.394450] kasan_atomics+0xb8/0x2e0 [ 19.394516] kunit_try_run_case+0x170/0x3f0 [ 19.394615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.394684] kthread+0x328/0x630 [ 19.395399] ret_from_fork+0x10/0x20 [ 19.395712] [ 19.395779] The buggy address belongs to the object at fff00000c5906f00 [ 19.395779] which belongs to the cache kmalloc-64 of size 64 [ 19.396463] The buggy address is located 0 bytes to the right of [ 19.396463] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.396538] [ 19.396562] The buggy address belongs to the physical page: [ 19.396595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.396650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.396700] page_type: f5(slab) [ 19.396740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.396794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.396835] page dumped because: kasan: bad access detected [ 19.396879] [ 19.396899] Memory state around the buggy address: [ 19.396931] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.396977] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.397024] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.397179] ^ [ 19.397302] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.397357] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.397438] ================================================================== [ 19.316253] ================================================================== [ 19.316453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.316515] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.316582] [ 19.316635] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.316946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.316988] Hardware name: linux,dummy-virt (DT) [ 19.317052] Call trace: [ 19.317078] show_stack+0x20/0x38 (C) [ 19.317165] dump_stack_lvl+0x8c/0xd0 [ 19.317263] print_report+0x118/0x608 [ 19.317312] kasan_report+0xdc/0x128 [ 19.317463] kasan_check_range+0x100/0x1a8 [ 19.317517] __kasan_check_write+0x20/0x30 [ 19.317717] kasan_atomics_helper+0xa6c/0x4858 [ 19.317779] kasan_atomics+0x198/0x2e0 [ 19.317826] kunit_try_run_case+0x170/0x3f0 [ 19.317887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.317942] kthread+0x328/0x630 [ 19.317986] ret_from_fork+0x10/0x20 [ 19.318035] [ 19.318055] Allocated by task 266: [ 19.318094] kasan_save_stack+0x3c/0x68 [ 19.318139] kasan_save_track+0x20/0x40 [ 19.318179] kasan_save_alloc_info+0x40/0x58 [ 19.318221] __kasan_kmalloc+0xd4/0xd8 [ 19.318260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.318299] kasan_atomics+0xb8/0x2e0 [ 19.318335] kunit_try_run_case+0x170/0x3f0 [ 19.318384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.318429] kthread+0x328/0x630 [ 19.318463] ret_from_fork+0x10/0x20 [ 19.318502] [ 19.318522] The buggy address belongs to the object at fff00000c5906f00 [ 19.318522] which belongs to the cache kmalloc-64 of size 64 [ 19.318595] The buggy address is located 0 bytes to the right of [ 19.318595] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.318660] [ 19.319043] The buggy address belongs to the physical page: [ 19.319081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.319136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.319186] page_type: f5(slab) [ 19.319225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.319314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.319459] page dumped because: kasan: bad access detected [ 19.319561] [ 19.319594] Memory state around the buggy address: [ 19.319634] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.319678] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.320030] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.320174] ^ [ 19.320253] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.320338] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.321332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.322184] kthread+0x328/0x630 [ 19.322450] __kasan_kmalloc+0xd4/0xd8 [ 19.322498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.322540] kasan_atomics+0xb8/0x2e0 [ 19.322577] kunit_try_run_case+0x170/0x3f0 [ 19.322623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.322671] kthread+0x328/0x630 [ 19.322714] ret_from_fork+0x10/0x20 [ 19.323288] [ 19.323378] The buggy address belongs to the object at fff00000c5906f00 [ 19.323378] which belongs to the cache kmalloc-64 of size 64 [ 19.323451] The buggy address is located 0 bytes to the right of [ 19.323451] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.323515] [ 19.323537] The buggy address belongs to the physical page: [ 19.323567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.323621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.323669] page_type: f5(slab) [ 19.323708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.323759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.328382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.328495] kasan_atomics+0xb8/0x2e0 [ 19.331894] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.331934] ================================================================== [ 19.196144] ================================================================== [ 19.196194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 19.196393] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.196581] [ 19.196639] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.196742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.196789] Hardware name: linux,dummy-virt (DT) [ 19.196824] Call trace: [ 19.196877] show_stack+0x20/0x38 (C) [ 19.196957] dump_stack_lvl+0x8c/0xd0 [ 19.197024] print_report+0x118/0x608 [ 19.197089] kasan_report+0xdc/0x128 [ 19.197138] __asan_report_load4_noabort+0x20/0x30 [ 19.197192] kasan_atomics_helper+0x40fc/0x4858 [ 19.197366] kasan_atomics+0x198/0x2e0 [ 19.197442] kunit_try_run_case+0x170/0x3f0 [ 19.197629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.197736] kthread+0x328/0x630 [ 19.197810] ret_from_fork+0x10/0x20 [ 19.197890] [ 19.197930] Allocated by task 266: [ 19.197978] kasan_save_stack+0x3c/0x68 [ 19.198023] kasan_save_track+0x20/0x40 [ 19.198077] kasan_save_alloc_info+0x40/0x58 [ 19.198157] __kasan_kmalloc+0xd4/0xd8 [ 19.198213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.198258] kasan_atomics+0xb8/0x2e0 [ 19.198295] kunit_try_run_case+0x170/0x3f0 [ 19.198333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.198378] kthread+0x328/0x630 [ 19.198583] ret_from_fork+0x10/0x20 [ 19.198644] [ 19.198823] The buggy address belongs to the object at fff00000c5906f00 [ 19.198823] which belongs to the cache kmalloc-64 of size 64 [ 19.198988] The buggy address is located 0 bytes to the right of [ 19.198988] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.199091] [ 19.199160] The buggy address belongs to the physical page: [ 19.199221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.199343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.199459] page_type: f5(slab) [ 19.199579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.199632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.199675] page dumped because: kasan: bad access detected [ 19.199707] [ 19.199779] Memory state around the buggy address: [ 19.199813] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.199866] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.199911] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.200077] ^ [ 19.200199] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.200326] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.200412] ================================================================== [ 19.221499] ================================================================== [ 19.224027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 19.228130] The buggy address is located 0 bytes to the right of [ 19.228130] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.229682] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.230646] ================================================================== [ 19.590568] ================================================================== [ 19.590616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.590665] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.590745] [ 19.590778] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.590892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.590922] Hardware name: linux,dummy-virt (DT) [ 19.590956] Call trace: [ 19.590978] show_stack+0x20/0x38 (C) [ 19.591030] dump_stack_lvl+0x8c/0xd0 [ 19.591118] print_report+0x118/0x608 [ 19.591167] kasan_report+0xdc/0x128 [ 19.591258] __asan_report_load8_noabort+0x20/0x30 [ 19.591313] kasan_atomics_helper+0x3db0/0x4858 [ 19.591366] kasan_atomics+0x198/0x2e0 [ 19.591433] kunit_try_run_case+0x170/0x3f0 [ 19.591695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.591832] kthread+0x328/0x630 [ 19.591913] ret_from_fork+0x10/0x20 [ 19.592016] [ 19.592042] Allocated by task 266: [ 19.592071] kasan_save_stack+0x3c/0x68 [ 19.592263] kasan_save_track+0x20/0x40 [ 19.592355] kasan_save_alloc_info+0x40/0x58 [ 19.592535] __kasan_kmalloc+0xd4/0xd8 [ 19.592593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.592672] kasan_atomics+0xb8/0x2e0 [ 19.592757] kunit_try_run_case+0x170/0x3f0 [ 19.592873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.592917] kthread+0x328/0x630 [ 19.592951] ret_from_fork+0x10/0x20 [ 19.592987] [ 19.593009] The buggy address belongs to the object at fff00000c5906f00 [ 19.593009] which belongs to the cache kmalloc-64 of size 64 [ 19.593067] The buggy address is located 0 bytes to the right of [ 19.593067] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.593134] [ 19.593156] The buggy address belongs to the physical page: [ 19.593187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.593241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.593291] page_type: f5(slab) [ 19.593330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.593382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.593425] page dumped because: kasan: bad access detected [ 19.593458] [ 19.593489] Memory state around the buggy address: [ 19.593606] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.593652] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.593696] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.593737] ^ [ 19.593771] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593814] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.593863] ================================================================== [ 19.617646] ================================================================== [ 19.617692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.617741] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.617812] [ 19.617881] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.617965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.617993] Hardware name: linux,dummy-virt (DT) [ 19.618025] Call trace: [ 19.618047] show_stack+0x20/0x38 (C) [ 19.618094] dump_stack_lvl+0x8c/0xd0 [ 19.618141] print_report+0x118/0x608 [ 19.618201] kasan_report+0xdc/0x128 [ 19.618249] kasan_check_range+0x100/0x1a8 [ 19.618299] __kasan_check_write+0x20/0x30 [ 19.618344] kasan_atomics_helper+0x17ec/0x4858 [ 19.618394] kasan_atomics+0x198/0x2e0 [ 19.618439] kunit_try_run_case+0x170/0x3f0 [ 19.618487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.618651] kthread+0x328/0x630 [ 19.618735] ret_from_fork+0x10/0x20 [ 19.618882] [ 19.618902] Allocated by task 266: [ 19.619024] kasan_save_stack+0x3c/0x68 [ 19.619151] kasan_save_track+0x20/0x40 [ 19.619193] kasan_save_alloc_info+0x40/0x58 [ 19.619260] __kasan_kmalloc+0xd4/0xd8 [ 19.619299] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.619345] kasan_atomics+0xb8/0x2e0 [ 19.619383] kunit_try_run_case+0x170/0x3f0 [ 19.619422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.619466] kthread+0x328/0x630 [ 19.619501] ret_from_fork+0x10/0x20 [ 19.619538] [ 19.619559] The buggy address belongs to the object at fff00000c5906f00 [ 19.619559] which belongs to the cache kmalloc-64 of size 64 [ 19.619616] The buggy address is located 0 bytes to the right of [ 19.619616] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.619681] [ 19.619704] The buggy address belongs to the physical page: [ 19.619735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.619829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.620042] page_type: f5(slab) [ 19.620465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.620533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.620621] page dumped because: kasan: bad access detected [ 19.620679] [ 19.620699] Memory state around the buggy address: [ 19.620780] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.620825] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.620879] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.620925] ^ [ 19.620959] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.621004] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.621042] ================================================================== [ 19.201354] ================================================================== [ 19.201406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 19.201528] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.206295] Memory state around the buggy address: [ 19.207026] ================================================================== [ 19.453499] ================================================================== [ 19.453926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.454010] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.454142] [ 19.454191] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.454279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.454542] Hardware name: linux,dummy-virt (DT) [ 19.454592] Call trace: [ 19.454624] show_stack+0x20/0x38 (C) [ 19.454755] dump_stack_lvl+0x8c/0xd0 [ 19.454976] print_report+0x118/0x608 [ 19.455030] kasan_report+0xdc/0x128 [ 19.455085] kasan_check_range+0x100/0x1a8 [ 19.455137] __kasan_check_write+0x20/0x30 [ 19.455182] kasan_atomics_helper+0xff0/0x4858 [ 19.455232] kasan_atomics+0x198/0x2e0 [ 19.455278] kunit_try_run_case+0x170/0x3f0 [ 19.455340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.455395] kthread+0x328/0x630 [ 19.455437] ret_from_fork+0x10/0x20 [ 19.455487] [ 19.455507] Allocated by task 266: [ 19.455537] kasan_save_stack+0x3c/0x68 [ 19.455581] kasan_save_track+0x20/0x40 [ 19.455619] kasan_save_alloc_info+0x40/0x58 [ 19.455666] __kasan_kmalloc+0xd4/0xd8 [ 19.455706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.455745] kasan_atomics+0xb8/0x2e0 [ 19.455782] kunit_try_run_case+0x170/0x3f0 [ 19.455822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.455876] kthread+0x328/0x630 [ 19.455911] ret_from_fork+0x10/0x20 [ 19.455948] [ 19.455971] The buggy address belongs to the object at fff00000c5906f00 [ 19.455971] which belongs to the cache kmalloc-64 of size 64 [ 19.456030] The buggy address is located 0 bytes to the right of [ 19.456030] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.456094] [ 19.456116] The buggy address belongs to the physical page: [ 19.456149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.456204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.456262] page_type: f5(slab) [ 19.456300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.456353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.456396] page dumped because: kasan: bad access detected [ 19.456429] [ 19.456448] Memory state around the buggy address: [ 19.456481] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.456527] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.456650] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.456691] ^ [ 19.456727] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.456768] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.456831] ================================================================== [ 19.584182] ================================================================== [ 19.584233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.584286] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.584338] [ 19.584369] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.584451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.584480] Hardware name: linux,dummy-virt (DT) [ 19.584521] Call trace: [ 19.584646] show_stack+0x20/0x38 (C) [ 19.584702] dump_stack_lvl+0x8c/0xd0 [ 19.584881] print_report+0x118/0x608 [ 19.585134] kasan_report+0xdc/0x128 [ 19.585383] kasan_check_range+0x100/0x1a8 [ 19.585561] __kasan_check_write+0x20/0x30 [ 19.585664] kasan_atomics_helper+0x15b4/0x4858 [ 19.586121] kasan_atomics+0x198/0x2e0 [ 19.586214] kunit_try_run_case+0x170/0x3f0 [ 19.586482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.586620] kthread+0x328/0x630 [ 19.586665] ret_from_fork+0x10/0x20 [ 19.587054] [ 19.587148] Allocated by task 266: [ 19.587226] kasan_save_stack+0x3c/0x68 [ 19.587321] kasan_save_track+0x20/0x40 [ 19.587551] kasan_save_alloc_info+0x40/0x58 [ 19.588430] __kasan_kmalloc+0xd4/0xd8 [ 19.588513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.588904] kasan_atomics+0xb8/0x2e0 [ 19.589059] kunit_try_run_case+0x170/0x3f0 [ 19.589180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.589227] kthread+0x328/0x630 [ 19.589322] ret_from_fork+0x10/0x20 [ 19.589379] [ 19.589402] The buggy address belongs to the object at fff00000c5906f00 [ 19.589402] which belongs to the cache kmalloc-64 of size 64 [ 19.589462] The buggy address is located 0 bytes to the right of [ 19.589462] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.589527] [ 19.589548] The buggy address belongs to the physical page: [ 19.589581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.589633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.589683] page_type: f5(slab) [ 19.589722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.589836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.589890] page dumped because: kasan: bad access detected [ 19.589924] [ 19.589945] Memory state around the buggy address: [ 19.589989] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.590034] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.590080] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.590121] ^ [ 19.590153] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.590203] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.590350] ================================================================== [ 19.407738] ================================================================== [ 19.407942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.408124] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.408179] [ 19.408235] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.408329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.408357] Hardware name: linux,dummy-virt (DT) [ 19.408391] Call trace: [ 19.408414] show_stack+0x20/0x38 (C) [ 19.408472] dump_stack_lvl+0x8c/0xd0 [ 19.408521] print_report+0x118/0x608 [ 19.408570] kasan_report+0xdc/0x128 [ 19.408616] __asan_report_load8_noabort+0x20/0x30 [ 19.408669] kasan_atomics_helper+0x3f58/0x4858 [ 19.408717] kasan_atomics+0x198/0x2e0 [ 19.408765] kunit_try_run_case+0x170/0x3f0 [ 19.408823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.408892] kthread+0x328/0x630 [ 19.408935] ret_from_fork+0x10/0x20 [ 19.408983] [ 19.409004] Allocated by task 266: [ 19.409034] kasan_save_stack+0x3c/0x68 [ 19.409096] kasan_save_track+0x20/0x40 [ 19.409137] kasan_save_alloc_info+0x40/0x58 [ 19.409178] __kasan_kmalloc+0xd4/0xd8 [ 19.409223] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.409264] kasan_atomics+0xb8/0x2e0 [ 19.409301] kunit_try_run_case+0x170/0x3f0 [ 19.409340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.409385] kthread+0x328/0x630 [ 19.409419] ret_from_fork+0x10/0x20 [ 19.409455] [ 19.409478] The buggy address belongs to the object at fff00000c5906f00 [ 19.409478] which belongs to the cache kmalloc-64 of size 64 [ 19.409536] The buggy address is located 0 bytes to the right of [ 19.409536] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.409602] [ 19.409633] The buggy address belongs to the physical page: [ 19.409666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.409721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.409775] page_type: f5(slab) [ 19.409823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.409893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.410181] page dumped because: kasan: bad access detected [ 19.410230] [ 19.410953] Memory state around the buggy address: [ 19.411123] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.411171] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.411217] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.411257] ^ [ 19.411292] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.411346] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.411387] ================================================================== [ 19.344776] ================================================================== [ 19.344862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 19.344955] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.345036] [ 19.345081] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.345172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.345226] Hardware name: linux,dummy-virt (DT) [ 19.345259] Call trace: [ 19.345300] show_stack+0x20/0x38 (C) [ 19.345350] dump_stack_lvl+0x8c/0xd0 [ 19.345400] print_report+0x118/0x608 [ 19.345449] kasan_report+0xdc/0x128 [ 19.345495] kasan_check_range+0x100/0x1a8 [ 19.345544] __kasan_check_write+0x20/0x30 [ 19.345593] kasan_atomics_helper+0xc08/0x4858 [ 19.346003] kasan_atomics+0x198/0x2e0 [ 19.346400] kunit_try_run_case+0x170/0x3f0 [ 19.346673] [ 19.346820] kasan_save_stack+0x3c/0x68 [ 19.347798] kunit_try_run_case+0x170/0x3f0 [ 19.347876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.348384] kthread+0x328/0x630 [ 19.348577] ret_from_fork+0x10/0x20 [ 19.348672] [ 19.348694] The buggy address belongs to the object at fff00000c5906f00 [ 19.348694] which belongs to the cache kmalloc-64 of size 64 [ 19.349626] The buggy address belongs to the physical page: [ 19.350048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.351377] page dumped because: kasan: bad access detected [ 19.351648] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.352336] ^ [ 19.357828] kthread+0x328/0x630 [ 19.357974] ret_from_fork+0x10/0x20 [ 19.358017] [ 19.358038] The buggy address belongs to the object at fff00000c5906f00 [ 19.358038] which belongs to the cache kmalloc-64 of size 64 [ 19.358110] The buggy address is located 0 bytes to the right of [ 19.358110] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.358485] [ 19.358658] The buggy address belongs to the physical page: [ 19.358890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.359217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.359496] page_type: f5(slab) [ 19.359649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.359731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.360070] page dumped because: kasan: bad access detected [ 19.360192] [ 19.360475] Memory state around the buggy address: [ 19.360715] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.360859] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.360905] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.360944] ^ [ 19.360979] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.361024] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.361983] ================================================================== [ 19.576275] ================================================================== [ 19.576323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.576370] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.576420] [ 19.576457] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.576759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.576787] Hardware name: linux,dummy-virt (DT) [ 19.576820] Call trace: [ 19.576854] show_stack+0x20/0x38 (C) [ 19.576903] dump_stack_lvl+0x8c/0xd0 [ 19.576953] print_report+0x118/0x608 [ 19.577000] kasan_report+0xdc/0x128 [ 19.577046] kasan_check_range+0x100/0x1a8 [ 19.577096] __kasan_check_write+0x20/0x30 [ 19.577141] kasan_atomics_helper+0x154c/0x4858 [ 19.577191] kasan_atomics+0x198/0x2e0 [ 19.577242] kunit_try_run_case+0x170/0x3f0 [ 19.577288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.577341] kthread+0x328/0x630 [ 19.577392] ret_from_fork+0x10/0x20 [ 19.578935] [ 19.579595] Allocated by task 266: [ 19.579763] kasan_save_stack+0x3c/0x68 [ 19.579993] kasan_save_track+0x20/0x40 [ 19.580037] kasan_save_alloc_info+0x40/0x58 [ 19.580166] __kasan_kmalloc+0xd4/0xd8 [ 19.580323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.580517] kasan_atomics+0xb8/0x2e0 [ 19.580562] kunit_try_run_case+0x170/0x3f0 [ 19.580600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.580646] kthread+0x328/0x630 [ 19.580907] ret_from_fork+0x10/0x20 [ 19.581081] [ 19.581106] The buggy address belongs to the object at fff00000c5906f00 [ 19.581106] which belongs to the cache kmalloc-64 of size 64 [ 19.581245] The buggy address is located 0 bytes to the right of [ 19.581245] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.581735] [ 19.581889] The buggy address belongs to the physical page: [ 19.582024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.582080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.582227] page_type: f5(slab) [ 19.582267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.582320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.582416] page dumped because: kasan: bad access detected [ 19.582570] [ 19.582591] Memory state around the buggy address: [ 19.582624] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.582788] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.582834] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.582884] ^ [ 19.582917] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.583110] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.583341] ================================================================== [ 19.594080] ================================================================== [ 19.594135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.594182] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.594232] [ 19.594264] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.594428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.594489] Hardware name: linux,dummy-virt (DT) [ 19.594546] Call trace: [ 19.594920] show_stack+0x20/0x38 (C) [ 19.594975] dump_stack_lvl+0x8c/0xd0 [ 19.595024] print_report+0x118/0x608 [ 19.595070] kasan_report+0xdc/0x128 [ 19.595141] kasan_check_range+0x100/0x1a8 [ 19.595368] __kasan_check_write+0x20/0x30 [ 19.595513] kasan_atomics_helper+0x1644/0x4858 [ 19.595563] kasan_atomics+0x198/0x2e0 [ 19.595612] kunit_try_run_case+0x170/0x3f0 [ 19.595682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.595737] kthread+0x328/0x630 [ 19.595779] ret_from_fork+0x10/0x20 [ 19.595828] [ 19.595858] Allocated by task 266: [ 19.595886] kasan_save_stack+0x3c/0x68 [ 19.595928] kasan_save_track+0x20/0x40 [ 19.595966] kasan_save_alloc_info+0x40/0x58 [ 19.596008] __kasan_kmalloc+0xd4/0xd8 [ 19.596071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.596279] kasan_atomics+0xb8/0x2e0 [ 19.596458] kunit_try_run_case+0x170/0x3f0 [ 19.596499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.596591] kthread+0x328/0x630 [ 19.596627] ret_from_fork+0x10/0x20 [ 19.596663] [ 19.596737] The buggy address belongs to the object at fff00000c5906f00 [ 19.596737] which belongs to the cache kmalloc-64 of size 64 [ 19.596869] The buggy address is located 0 bytes to the right of [ 19.596869] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.596935] [ 19.596958] The buggy address belongs to the physical page: [ 19.596990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.597042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.597092] page_type: f5(slab) [ 19.597133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.597186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.597229] page dumped because: kasan: bad access detected [ 19.597264] [ 19.597285] Memory state around the buggy address: [ 19.597318] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.597363] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.597448] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.597490] ^ [ 19.597524] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.597624] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.597664] ================================================================== [ 19.421597] ================================================================== [ 19.421651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.421704] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.421755] [ 19.421789] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.421896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.422137] Hardware name: linux,dummy-virt (DT) [ 19.422276] Call trace: [ 19.422306] show_stack+0x20/0x38 (C) [ 19.422360] dump_stack_lvl+0x8c/0xd0 [ 19.422418] print_report+0x118/0x608 [ 19.422466] kasan_report+0xdc/0x128 [ 19.422515] __asan_report_store8_noabort+0x20/0x30 [ 19.422568] kasan_atomics_helper+0x3e5c/0x4858 [ 19.422621] kasan_atomics+0x198/0x2e0 [ 19.422669] kunit_try_run_case+0x170/0x3f0 [ 19.422725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.422781] kthread+0x328/0x630 [ 19.423219] ret_from_fork+0x10/0x20 [ 19.423518] [ 19.423541] Allocated by task 266: [ 19.423736] kasan_save_stack+0x3c/0x68 [ 19.423917] kasan_save_track+0x20/0x40 [ 19.424372] kasan_save_alloc_info+0x40/0x58 [ 19.424650] __kasan_kmalloc+0xd4/0xd8 [ 19.424763] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.424860] kasan_atomics+0xb8/0x2e0 [ 19.424974] kunit_try_run_case+0x170/0x3f0 [ 19.425015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.425061] kthread+0x328/0x630 [ 19.425094] ret_from_fork+0x10/0x20 [ 19.425133] [ 19.425165] The buggy address belongs to the object at fff00000c5906f00 [ 19.425165] which belongs to the cache kmalloc-64 of size 64 [ 19.425225] The buggy address is located 0 bytes to the right of [ 19.425225] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.425290] [ 19.425330] The buggy address belongs to the physical page: [ 19.425382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.425445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.425507] page_type: f5(slab) [ 19.425547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.425599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.425652] page dumped because: kasan: bad access detected [ 19.425707] [ 19.425726] Memory state around the buggy address: [ 19.425760] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.425803] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.426074] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.426228] ^ [ 19.426268] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.426355] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.426420] ================================================================== [ 19.609383] ================================================================== [ 19.609431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.609479] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.609531] [ 19.609563] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.609647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.609676] Hardware name: linux,dummy-virt (DT) [ 19.609716] Call trace: [ 19.609836] show_stack+0x20/0x38 (C) [ 19.610090] dump_stack_lvl+0x8c/0xd0 [ 19.610346] print_report+0x118/0x608 [ 19.610522] kasan_report+0xdc/0x128 [ 19.610598] kasan_check_range+0x100/0x1a8 [ 19.610654] __kasan_check_write+0x20/0x30 [ 19.610786] kasan_atomics_helper+0x175c/0x4858 [ 19.610835] kasan_atomics+0x198/0x2e0 [ 19.610891] kunit_try_run_case+0x170/0x3f0 [ 19.610940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.610993] kthread+0x328/0x630 [ 19.611036] ret_from_fork+0x10/0x20 [ 19.611085] [ 19.611105] Allocated by task 266: [ 19.611133] kasan_save_stack+0x3c/0x68 [ 19.611175] kasan_save_track+0x20/0x40 [ 19.611213] kasan_save_alloc_info+0x40/0x58 [ 19.611255] __kasan_kmalloc+0xd4/0xd8 [ 19.611292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.611341] kasan_atomics+0xb8/0x2e0 [ 19.611377] kunit_try_run_case+0x170/0x3f0 [ 19.611416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.611462] kthread+0x328/0x630 [ 19.611512] ret_from_fork+0x10/0x20 [ 19.611548] [ 19.611622] The buggy address belongs to the object at fff00000c5906f00 [ 19.611622] which belongs to the cache kmalloc-64 of size 64 [ 19.611715] The buggy address is located 0 bytes to the right of [ 19.611715] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.611782] [ 19.611807] The buggy address belongs to the physical page: [ 19.611848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.611901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.611950] page_type: f5(slab) [ 19.612029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.612229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.612340] page dumped because: kasan: bad access detected [ 19.612387] [ 19.612406] Memory state around the buggy address: [ 19.612451] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.612498] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.612552] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.612592] ^ [ 19.612627] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612718] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.612761] ================================================================== [ 19.369478] ================================================================== [ 19.369541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.369815] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.370173] [ 19.370452] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.370584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.370612] Hardware name: linux,dummy-virt (DT) [ 19.370648] Call trace: [ 19.370670] show_stack+0x20/0x38 (C) [ 19.370725] dump_stack_lvl+0x8c/0xd0 [ 19.370773] print_report+0x118/0x608 [ 19.370821] kasan_report+0xdc/0x128 [ 19.372282] __asan_report_load4_noabort+0x20/0x30 [ 19.372816] kasan_atomics_helper+0x3dd8/0x4858 [ 19.373238] kasan_atomics+0x198/0x2e0 [ 19.373652] kunit_try_run_case+0x170/0x3f0 [ 19.373738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.374197] kthread+0x328/0x630 [ 19.374268] ret_from_fork+0x10/0x20 [ 19.374904] [ 19.374969] Allocated by task 266: [ 19.375003] kasan_save_stack+0x3c/0x68 [ 19.375650] kasan_save_track+0x20/0x40 [ 19.376194] kasan_save_alloc_info+0x40/0x58 [ 19.376250] __kasan_kmalloc+0xd4/0xd8 [ 19.376805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.376876] kasan_atomics+0xb8/0x2e0 [ 19.377566] kunit_try_run_case+0x170/0x3f0 [ 19.377949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.378259] kthread+0x328/0x630 [ 19.378590] ret_from_fork+0x10/0x20 [ 19.379537] [ 19.379567] The buggy address belongs to the object at fff00000c5906f00 [ 19.379567] which belongs to the cache kmalloc-64 of size 64 [ 19.379633] The buggy address is located 0 bytes to the right of [ 19.379633] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.379699] [ 19.379720] The buggy address belongs to the physical page: [ 19.379755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.380870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.381363] page_type: f5(slab) [ 19.381683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.381740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.381782] page dumped because: kasan: bad access detected [ 19.383250] [ 19.383445] Memory state around the buggy address: [ 19.383483] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.383927] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.384266] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.384943] ^ [ 19.384995] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.385043] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.385085] ================================================================== [ 19.565476] ================================================================== [ 19.565529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.565581] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.565632] [ 19.565873] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.566141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.566171] Hardware name: linux,dummy-virt (DT) [ 19.566206] Call trace: [ 19.566230] show_stack+0x20/0x38 (C) [ 19.566282] dump_stack_lvl+0x8c/0xd0 [ 19.566328] print_report+0x118/0x608 [ 19.566377] kasan_report+0xdc/0x128 [ 19.566424] kasan_check_range+0x100/0x1a8 [ 19.566475] __kasan_check_write+0x20/0x30 [ 19.566520] kasan_atomics_helper+0x147c/0x4858 [ 19.566570] kasan_atomics+0x198/0x2e0 [ 19.566616] kunit_try_run_case+0x170/0x3f0 [ 19.566664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.566727] kthread+0x328/0x630 [ 19.566771] ret_from_fork+0x10/0x20 [ 19.566819] [ 19.566847] Allocated by task 266: [ 19.566877] kasan_save_stack+0x3c/0x68 [ 19.566917] kasan_save_track+0x20/0x40 [ 19.566958] kasan_save_alloc_info+0x40/0x58 [ 19.567487] __kasan_kmalloc+0xd4/0xd8 [ 19.567573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.567613] kasan_atomics+0xb8/0x2e0 [ 19.567663] kunit_try_run_case+0x170/0x3f0 [ 19.567761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.567827] kthread+0x328/0x630 [ 19.567875] ret_from_fork+0x10/0x20 [ 19.567915] [ 19.567938] The buggy address belongs to the object at fff00000c5906f00 [ 19.567938] which belongs to the cache kmalloc-64 of size 64 [ 19.568108] The buggy address is located 0 bytes to the right of [ 19.568108] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.568256] [ 19.568332] The buggy address belongs to the physical page: [ 19.568410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.568751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.568809] page_type: f5(slab) [ 19.569026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.569092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.569175] page dumped because: kasan: bad access detected [ 19.569262] [ 19.569307] Memory state around the buggy address: [ 19.569373] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.569418] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.569675] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.569721] ^ [ 19.569754] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.569798] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.569837] ================================================================== [ 19.612941] ================================================================== [ 19.612989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.613038] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.613089] [ 19.613119] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.613199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.613228] Hardware name: linux,dummy-virt (DT) [ 19.613347] Call trace: [ 19.613485] show_stack+0x20/0x38 (C) [ 19.613535] dump_stack_lvl+0x8c/0xd0 [ 19.613590] print_report+0x118/0x608 [ 19.613902] kasan_report+0xdc/0x128 [ 19.614108] __asan_report_load8_noabort+0x20/0x30 [ 19.614278] kasan_atomics_helper+0x3e20/0x4858 [ 19.614428] kasan_atomics+0x198/0x2e0 [ 19.614482] kunit_try_run_case+0x170/0x3f0 [ 19.614531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.614586] kthread+0x328/0x630 [ 19.614630] ret_from_fork+0x10/0x20 [ 19.614678] [ 19.614754] Allocated by task 266: [ 19.614827] kasan_save_stack+0x3c/0x68 [ 19.614928] kasan_save_track+0x20/0x40 [ 19.615416] kasan_save_alloc_info+0x40/0x58 [ 19.615554] __kasan_kmalloc+0xd4/0xd8 [ 19.615612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.615795] kasan_atomics+0xb8/0x2e0 [ 19.615833] kunit_try_run_case+0x170/0x3f0 [ 19.615882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.615965] kthread+0x328/0x630 [ 19.616141] ret_from_fork+0x10/0x20 [ 19.616244] [ 19.616264] The buggy address belongs to the object at fff00000c5906f00 [ 19.616264] which belongs to the cache kmalloc-64 of size 64 [ 19.616442] The buggy address is located 0 bytes to the right of [ 19.616442] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.616508] [ 19.616556] The buggy address belongs to the physical page: [ 19.616717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.616874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.616925] page_type: f5(slab) [ 19.616964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.617014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.617064] page dumped because: kasan: bad access detected [ 19.617098] [ 19.617117] Memory state around the buggy address: [ 19.617150] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.617196] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.617240] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.617281] ^ [ 19.617315] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.617362] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.617401] ================================================================== [ 19.293606] ================================================================== [ 19.293659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.293749] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.293857] [ 19.293892] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.293974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.294003] Hardware name: linux,dummy-virt (DT) [ 19.294177] Call trace: [ 19.294715] kasan_atomics_helper+0x42d8/0x4858 [ 19.296603] kasan_atomics+0xb8/0x2e0 [ 19.297860] [ 19.298087] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.298559] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.300254] dump_stack_lvl+0x8c/0xd0 [ 19.300303] print_report+0x118/0x608 [ 19.300351] kasan_report+0xdc/0x128 [ 19.300399] kasan_check_range+0x100/0x1a8 [ 19.300447] __kasan_check_write+0x20/0x30 [ 19.300626] kasan_atomics_helper+0x934/0x4858 [ 19.300684] kasan_atomics+0x198/0x2e0 [ 19.300825] kunit_try_run_case+0x170/0x3f0 [ 19.300898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.301061] kthread+0x328/0x630 [ 19.301105] ret_from_fork+0x10/0x20 [ 19.301153] [ 19.301173] Allocated by task 266: [ 19.301203] kasan_save_stack+0x3c/0x68 [ 19.301273] kasan_save_track+0x20/0x40 [ 19.301401] kasan_save_alloc_info+0x40/0x58 [ 19.301539] __kasan_kmalloc+0xd4/0xd8 [ 19.301578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.301688] kasan_atomics+0xb8/0x2e0 [ 19.301744] kunit_try_run_case+0x170/0x3f0 [ 19.301783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.301832] kthread+0x328/0x630 [ 19.301876] ret_from_fork+0x10/0x20 [ 19.301912] [ 19.301933] The buggy address belongs to the object at fff00000c5906f00 [ 19.301933] which belongs to the cache kmalloc-64 of size 64 [ 19.302290] The buggy address is located 0 bytes to the right of [ 19.302290] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.302371] [ 19.302403] The buggy address belongs to the physical page: [ 19.302437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.302654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.302707] page_type: f5(slab) [ 19.302748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.302922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.303033] page dumped because: kasan: bad access detected [ 19.303093] [ 19.303113] Memory state around the buggy address: [ 19.303148] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.303350] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.303397] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.303637] ^ [ 19.303729] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.303864] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.304049] ================================================================== [ 19.466132] ================================================================== [ 19.466188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.466339] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.466414] [ 19.466460] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.467101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.467143] Hardware name: linux,dummy-virt (DT) [ 19.467176] Call trace: [ 19.467208] show_stack+0x20/0x38 (C) [ 19.467424] dump_stack_lvl+0x8c/0xd0 [ 19.468972] print_report+0x118/0x608 [ 19.469036] kasan_report+0xdc/0x128 [ 19.469086] kasan_check_range+0x100/0x1a8 [ 19.469135] __kasan_check_write+0x20/0x30 [ 19.469184] kasan_atomics_helper+0x10c0/0x4858 [ 19.469236] kasan_atomics+0x198/0x2e0 [ 19.469282] kunit_try_run_case+0x170/0x3f0 [ 19.469332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.469386] kthread+0x328/0x630 [ 19.469429] ret_from_fork+0x10/0x20 [ 19.469479] [ 19.469499] Allocated by task 266: [ 19.469529] kasan_save_stack+0x3c/0x68 [ 19.469573] kasan_save_track+0x20/0x40 [ 19.469610] kasan_save_alloc_info+0x40/0x58 [ 19.469652] __kasan_kmalloc+0xd4/0xd8 [ 19.469689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.469731] kasan_atomics+0xb8/0x2e0 [ 19.469768] kunit_try_run_case+0x170/0x3f0 [ 19.469806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.469861] kthread+0x328/0x630 [ 19.469958] ret_from_fork+0x10/0x20 [ 19.469996] [ 19.470076] The buggy address belongs to the object at fff00000c5906f00 [ 19.470076] which belongs to the cache kmalloc-64 of size 64 [ 19.470433] The buggy address is located 0 bytes to the right of [ 19.470433] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.470503] [ 19.470553] The buggy address belongs to the physical page: [ 19.470667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.470792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.470892] page_type: f5(slab) [ 19.470980] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.471188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.471272] page dumped because: kasan: bad access detected [ 19.471418] [ 19.471512] Memory state around the buggy address: [ 19.471581] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.471667] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.471753] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.471858] ^ [ 19.471892] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471963] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.472003] ================================================================== [ 19.488929] ================================================================== [ 19.489026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.489252] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.489326] [ 19.489489] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.489585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.489614] Hardware name: linux,dummy-virt (DT) [ 19.489647] Call trace: [ 19.489670] show_stack+0x20/0x38 (C) [ 19.489720] dump_stack_lvl+0x8c/0xd0 [ 19.489775] print_report+0x118/0x608 [ 19.490240] kasan_report+0xdc/0x128 [ 19.490494] kasan_check_range+0x100/0x1a8 [ 19.490557] __kasan_check_write+0x20/0x30 [ 19.490609] kasan_atomics_helper+0x1190/0x4858 [ 19.490662] kasan_atomics+0x198/0x2e0 [ 19.491289] kunit_try_run_case+0x170/0x3f0 [ 19.491628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.492149] kthread+0x328/0x630 [ 19.492194] ret_from_fork+0x10/0x20 [ 19.492242] [ 19.492263] Allocated by task 266: [ 19.492414] kasan_save_stack+0x3c/0x68 [ 19.492465] kasan_save_track+0x20/0x40 [ 19.492505] kasan_save_alloc_info+0x40/0x58 [ 19.492597] __kasan_kmalloc+0xd4/0xd8 [ 19.492726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.492767] kasan_atomics+0xb8/0x2e0 [ 19.493808] kunit_try_run_case+0x170/0x3f0 [ 19.493897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.493944] kthread+0x328/0x630 [ 19.493977] ret_from_fork+0x10/0x20 [ 19.494253] [ 19.494299] The buggy address belongs to the object at fff00000c5906f00 [ 19.494299] which belongs to the cache kmalloc-64 of size 64 [ 19.494360] The buggy address is located 0 bytes to the right of [ 19.494360] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.494426] [ 19.494454] The buggy address belongs to the physical page: [ 19.494487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.494729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.494785] page_type: f5(slab) [ 19.494999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.495204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.495249] page dumped because: kasan: bad access detected [ 19.495627] [ 19.495652] Memory state around the buggy address: [ 19.495686] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.495733] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.495778] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.496164] ^ [ 19.496331] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.496441] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.496482] ================================================================== [ 19.511434] ================================================================== [ 19.511495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.511548] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.511599] [ 19.511633] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.511717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.511746] Hardware name: linux,dummy-virt (DT) [ 19.511779] Call trace: [ 19.511803] show_stack+0x20/0x38 (C) [ 19.511866] dump_stack_lvl+0x8c/0xd0 [ 19.511915] print_report+0x118/0x608 [ 19.511961] kasan_report+0xdc/0x128 [ 19.512008] kasan_check_range+0x100/0x1a8 [ 19.512057] __kasan_check_write+0x20/0x30 [ 19.512103] kasan_atomics_helper+0x126c/0x4858 [ 19.512151] kasan_atomics+0x198/0x2e0 [ 19.512198] kunit_try_run_case+0x170/0x3f0 [ 19.512250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.512304] kthread+0x328/0x630 [ 19.512346] ret_from_fork+0x10/0x20 [ 19.512394] [ 19.512414] Allocated by task 266: [ 19.512443] kasan_save_stack+0x3c/0x68 [ 19.512484] kasan_save_track+0x20/0x40 [ 19.512522] kasan_save_alloc_info+0x40/0x58 [ 19.512564] __kasan_kmalloc+0xd4/0xd8 [ 19.512600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.512641] kasan_atomics+0xb8/0x2e0 [ 19.512677] kunit_try_run_case+0x170/0x3f0 [ 19.512718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.512761] kthread+0x328/0x630 [ 19.512795] ret_from_fork+0x10/0x20 [ 19.512835] [ 19.513806] The buggy address belongs to the object at fff00000c5906f00 [ 19.513806] which belongs to the cache kmalloc-64 of size 64 [ 19.514081] The buggy address is located 0 bytes to the right of [ 19.514081] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.514150] [ 19.514172] The buggy address belongs to the physical page: [ 19.514206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.514260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.514313] page_type: f5(slab) [ 19.514353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.514406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.514449] page dumped because: kasan: bad access detected [ 19.514487] [ 19.514508] Memory state around the buggy address: [ 19.514541] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.514586] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.514687] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.516268] ^ [ 19.516324] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.516369] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.516410] ================================================================== [ 19.473160] ================================================================== [ 19.473222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.473274] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.473571] [ 19.473699] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.473802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.473860] Hardware name: linux,dummy-virt (DT) [ 19.473896] Call trace: [ 19.473942] show_stack+0x20/0x38 (C) [ 19.473996] dump_stack_lvl+0x8c/0xd0 [ 19.474054] print_report+0x118/0x608 [ 19.474112] kasan_report+0xdc/0x128 [ 19.474158] kasan_check_range+0x100/0x1a8 [ 19.474208] __kasan_check_write+0x20/0x30 [ 19.474265] kasan_atomics_helper+0x1128/0x4858 [ 19.474313] kasan_atomics+0x198/0x2e0 [ 19.474360] kunit_try_run_case+0x170/0x3f0 [ 19.474409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.474461] kthread+0x328/0x630 [ 19.474504] ret_from_fork+0x10/0x20 [ 19.474551] [ 19.474815] Allocated by task 266: [ 19.475152] kasan_save_stack+0x3c/0x68 [ 19.475212] kasan_save_track+0x20/0x40 [ 19.475646] kasan_save_alloc_info+0x40/0x58 [ 19.476107] __kasan_kmalloc+0xd4/0xd8 [ 19.476179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.476221] kasan_atomics+0xb8/0x2e0 [ 19.476477] kunit_try_run_case+0x170/0x3f0 [ 19.476562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.477216] kthread+0x328/0x630 [ 19.477266] ret_from_fork+0x10/0x20 [ 19.477920] [ 19.477948] The buggy address belongs to the object at fff00000c5906f00 [ 19.477948] which belongs to the cache kmalloc-64 of size 64 [ 19.478465] The buggy address is located 0 bytes to the right of [ 19.478465] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.480082] [ 19.480108] The buggy address belongs to the physical page: [ 19.480141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.480621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.480996] page_type: f5(slab) [ 19.481917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.482157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.482413] page dumped because: kasan: bad access detected [ 19.482449] [ 19.483043] Memory state around the buggy address: [ 19.483085] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.484033] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.484353] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.484712] ^ [ 19.486519] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.486570] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.486610] ================================================================== [ 19.444832] ================================================================== [ 19.444904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.445028] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.445304] [ 19.445352] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.445680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.445758] Hardware name: linux,dummy-virt (DT) [ 19.445803] Call trace: [ 19.445985] show_stack+0x20/0x38 (C) [ 19.446213] dump_stack_lvl+0x8c/0xd0 [ 19.446543] print_report+0x118/0x608 [ 19.446705] kasan_report+0xdc/0x128 [ 19.446936] kasan_check_range+0x100/0x1a8 [ 19.447023] __kasan_check_write+0x20/0x30 [ 19.447106] kasan_atomics_helper+0xf88/0x4858 [ 19.447288] kasan_atomics+0x198/0x2e0 [ 19.447369] kunit_try_run_case+0x170/0x3f0 [ 19.447440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.447728] kthread+0x328/0x630 [ 19.447782] ret_from_fork+0x10/0x20 [ 19.447851] [ 19.447935] Allocated by task 266: [ 19.448180] kasan_save_stack+0x3c/0x68 [ 19.448242] kasan_save_track+0x20/0x40 [ 19.448358] kasan_save_alloc_info+0x40/0x58 [ 19.448433] __kasan_kmalloc+0xd4/0xd8 [ 19.448650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.448728] kasan_atomics+0xb8/0x2e0 [ 19.449180] kunit_try_run_case+0x170/0x3f0 [ 19.449390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449509] kthread+0x328/0x630 [ 19.449653] ret_from_fork+0x10/0x20 [ 19.449716] [ 19.449765] The buggy address belongs to the object at fff00000c5906f00 [ 19.449765] which belongs to the cache kmalloc-64 of size 64 [ 19.450048] The buggy address is located 0 bytes to the right of [ 19.450048] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.450146] [ 19.450175] The buggy address belongs to the physical page: [ 19.450208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.450405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.450876] page_type: f5(slab) [ 19.450953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.451296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.451448] page dumped because: kasan: bad access detected [ 19.451505] [ 19.451553] Memory state around the buggy address: [ 19.451650] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.451710] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451772] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.452005] ^ [ 19.452130] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452197] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.452299] ================================================================== [ 19.304676] ================================================================== [ 19.305017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.305177] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.305286] [ 19.305365] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.305451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.305579] Hardware name: linux,dummy-virt (DT) [ 19.305669] Call trace: [ 19.305695] show_stack+0x20/0x38 (C) [ 19.305749] dump_stack_lvl+0x8c/0xd0 [ 19.305796] print_report+0x118/0x608 [ 19.306055] kasan_report+0xdc/0x128 [ 19.306259] kasan_check_range+0x100/0x1a8 [ 19.306333] __kasan_check_write+0x20/0x30 [ 19.306442] kasan_atomics_helper+0x99c/0x4858 [ 19.306493] kasan_atomics+0x198/0x2e0 [ 19.306560] kunit_try_run_case+0x170/0x3f0 [ 19.306822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.307119] kthread+0x328/0x630 [ 19.307171] ret_from_fork+0x10/0x20 [ 19.307382] [ 19.307851] Allocated by task 266: [ 19.307894] kasan_save_stack+0x3c/0x68 [ 19.308139] kasan_save_track+0x20/0x40 [ 19.308308] kasan_save_alloc_info+0x40/0x58 [ 19.308402] __kasan_kmalloc+0xd4/0xd8 [ 19.308635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.308718] kasan_atomics+0xb8/0x2e0 [ 19.308757] kunit_try_run_case+0x170/0x3f0 [ 19.308966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.309141] kthread+0x328/0x630 [ 19.309180] ret_from_fork+0x10/0x20 [ 19.309392] [ 19.309519] The buggy address belongs to the object at fff00000c5906f00 [ 19.309519] which belongs to the cache kmalloc-64 of size 64 [ 19.309614] The buggy address is located 0 bytes to the right of [ 19.309614] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.309697] [ 19.309737] The buggy address belongs to the physical page: [ 19.309787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.309850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.309956] page_type: f5(slab) [ 19.310046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.310154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.310288] page dumped because: kasan: bad access detected [ 19.310323] [ 19.310344] Memory state around the buggy address: [ 19.310377] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.310422] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.310508] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.310693] ^ [ 19.310818] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.310893] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.311001] ================================================================== [ 19.602080] ================================================================== [ 19.602130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.602185] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.602236] [ 19.602267] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.602349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.602390] Hardware name: linux,dummy-virt (DT) [ 19.602423] Call trace: [ 19.602446] show_stack+0x20/0x38 (C) [ 19.602495] dump_stack_lvl+0x8c/0xd0 [ 19.602543] print_report+0x118/0x608 [ 19.602590] kasan_report+0xdc/0x128 [ 19.602636] kasan_check_range+0x100/0x1a8 [ 19.602686] __kasan_check_write+0x20/0x30 [ 19.602756] kasan_atomics_helper+0x16d0/0x4858 [ 19.602897] kasan_atomics+0x198/0x2e0 [ 19.603023] kunit_try_run_case+0x170/0x3f0 [ 19.603100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.603155] kthread+0x328/0x630 [ 19.603198] ret_from_fork+0x10/0x20 [ 19.603245] [ 19.603265] Allocated by task 266: [ 19.603294] kasan_save_stack+0x3c/0x68 [ 19.603339] kasan_save_track+0x20/0x40 [ 19.603377] kasan_save_alloc_info+0x40/0x58 [ 19.603428] __kasan_kmalloc+0xd4/0xd8 [ 19.603551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.603599] kasan_atomics+0xb8/0x2e0 [ 19.603637] kunit_try_run_case+0x170/0x3f0 [ 19.603849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.603895] kthread+0x328/0x630 [ 19.603977] ret_from_fork+0x10/0x20 [ 19.604015] [ 19.604042] The buggy address belongs to the object at fff00000c5906f00 [ 19.604042] which belongs to the cache kmalloc-64 of size 64 [ 19.604101] The buggy address is located 0 bytes to the right of [ 19.604101] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.604183] [ 19.604205] The buggy address belongs to the physical page: [ 19.604237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.604289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.604338] page_type: f5(slab) [ 19.604375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.604426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.604469] page dumped because: kasan: bad access detected [ 19.604502] [ 19.604522] Memory state around the buggy address: [ 19.604567] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.604613] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.604664] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.604705] ^ [ 19.604739] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.604781] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.604867] ================================================================== [ 19.387114] ================================================================== [ 19.387175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.387233] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.387286] [ 19.387331] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.387416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.387445] Hardware name: linux,dummy-virt (DT) [ 19.387477] Call trace: [ 19.387503] show_stack+0x20/0x38 (C) [ 19.387552] dump_stack_lvl+0x8c/0xd0 [ 19.387602] print_report+0x118/0x608 [ 19.387649] kasan_report+0xdc/0x128 [ 19.387696] kasan_check_range+0x100/0x1a8 [ 19.387744] __kasan_check_write+0x20/0x30 [ 19.387791] kasan_atomics_helper+0xd3c/0x4858 [ 19.387855] kasan_atomics+0x198/0x2e0 [ 19.387931] kunit_try_run_case+0x170/0x3f0 [ 19.388061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388146] kthread+0x328/0x630 [ 19.388193] ret_from_fork+0x10/0x20 [ 19.388243] [ 19.388264] Allocated by task 266: [ 19.388295] kasan_save_stack+0x3c/0x68 [ 19.388347] kasan_save_track+0x20/0x40 [ 19.388388] kasan_save_alloc_info+0x40/0x58 [ 19.388442] __kasan_kmalloc+0xd4/0xd8 [ 19.388483] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.388525] kasan_atomics+0xb8/0x2e0 [ 19.388562] kunit_try_run_case+0x170/0x3f0 [ 19.388602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388647] kthread+0x328/0x630 [ 19.388681] ret_from_fork+0x10/0x20 [ 19.388719] [ 19.388741] The buggy address belongs to the object at fff00000c5906f00 [ 19.388741] which belongs to the cache kmalloc-64 of size 64 [ 19.388800] The buggy address is located 0 bytes to the right of [ 19.388800] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.388876] [ 19.389269] The buggy address belongs to the physical page: [ 19.389306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.389389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.389442] page_type: f5(slab) [ 19.389483] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.389532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.389574] page dumped because: kasan: bad access detected [ 19.389612] [ 19.389633] Memory state around the buggy address: [ 19.389666] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.389726] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.389772] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.389812] ^ [ 19.390676] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390821] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.390897] ================================================================== [ 19.363556] ================================================================== [ 19.364697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.364807] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.364932] [ 19.364984] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.365069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.365098] Hardware name: linux,dummy-virt (DT) [ 19.365130] Call trace: [ 19.365175] show_stack+0x20/0x38 (C) [ 19.365265] dump_stack_lvl+0x8c/0xd0 [ 19.365323] print_report+0x118/0x608 [ 19.365517] kasan_report+0xdc/0x128 [ 19.365673] kasan_check_range+0x100/0x1a8 [ 19.365724] __kasan_check_write+0x20/0x30 [ 19.365790] kasan_atomics_helper+0xca0/0x4858 [ 19.365861] kasan_atomics+0x198/0x2e0 [ 19.365910] kunit_try_run_case+0x170/0x3f0 [ 19.365967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.366260] kasan_save_stack+0x3c/0x68 [ 19.366605] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.366648] kasan_atomics+0xb8/0x2e0 [ 19.366686] kunit_try_run_case+0x170/0x3f0 [ 19.368066] ret_from_fork+0x10/0x20 [ 19.368121] [ 19.368143] The buggy address belongs to the object at fff00000c5906f00 [ 19.368143] which belongs to the cache kmalloc-64 of size 64 [ 19.368205] The buggy address is located 0 bytes to the right of [ 19.368205] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.368272] [ 19.368300] The buggy address belongs to the physical page: [ 19.368332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.368392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.368443] page_type: f5(slab) [ 19.368481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.368533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.368575] page dumped because: kasan: bad access detected [ 19.368608] [ 19.368628] Memory state around the buggy address: [ 19.368659] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.368704] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.368748] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.368788] ^ [ 19.368822] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.368927] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.368968] ================================================================== [ 19.457609] ================================================================== [ 19.457673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.457725] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.457776] [ 19.457806] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.457902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.457933] Hardware name: linux,dummy-virt (DT) [ 19.458484] Call trace: [ 19.458575] show_stack+0x20/0x38 (C) [ 19.458668] dump_stack_lvl+0x8c/0xd0 [ 19.459077] print_report+0x118/0x608 [ 19.459277] kasan_report+0xdc/0x128 [ 19.459416] kasan_check_range+0x100/0x1a8 [ 19.459537] __kasan_check_write+0x20/0x30 [ 19.459716] kasan_atomics_helper+0x1058/0x4858 [ 19.459856] kasan_atomics+0x198/0x2e0 [ 19.459908] kunit_try_run_case+0x170/0x3f0 [ 19.459955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.460039] kthread+0x328/0x630 [ 19.460218] ret_from_fork+0x10/0x20 [ 19.460353] [ 19.460445] Allocated by task 266: [ 19.460817] kasan_save_stack+0x3c/0x68 [ 19.460872] kasan_save_track+0x20/0x40 [ 19.460942] kasan_save_alloc_info+0x40/0x58 [ 19.460986] __kasan_kmalloc+0xd4/0xd8 [ 19.461024] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.461787] kasan_atomics+0xb8/0x2e0 [ 19.462181] kunit_try_run_case+0x170/0x3f0 [ 19.462286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.462829] kthread+0x328/0x630 [ 19.462910] ret_from_fork+0x10/0x20 [ 19.462985] [ 19.463035] The buggy address belongs to the object at fff00000c5906f00 [ 19.463035] which belongs to the cache kmalloc-64 of size 64 [ 19.463111] The buggy address is located 0 bytes to the right of [ 19.463111] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.463197] [ 19.463221] The buggy address belongs to the physical page: [ 19.463254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.463543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.463693] page_type: f5(slab) [ 19.463756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.464023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.464102] page dumped because: kasan: bad access detected [ 19.464195] [ 19.464245] Memory state around the buggy address: [ 19.464315] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.464417] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464500] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.464545] ^ [ 19.464580] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.464624] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.464917] ================================================================== [ 19.516625] ================================================================== [ 19.516681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.516730] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.516780] [ 19.516813] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.516912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.516939] Hardware name: linux,dummy-virt (DT) [ 19.516972] Call trace: [ 19.517240] show_stack+0x20/0x38 (C) [ 19.517300] dump_stack_lvl+0x8c/0xd0 [ 19.517350] print_report+0x118/0x608 [ 19.517507] kasan_report+0xdc/0x128 [ 19.517566] kasan_check_range+0x100/0x1a8 [ 19.517614] __kasan_check_write+0x20/0x30 [ 19.517668] kasan_atomics_helper+0x12d8/0x4858 [ 19.517717] kasan_atomics+0x198/0x2e0 [ 19.517763] kunit_try_run_case+0x170/0x3f0 [ 19.517813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.517878] kthread+0x328/0x630 [ 19.517926] ret_from_fork+0x10/0x20 [ 19.517987] [ 19.518008] Allocated by task 266: [ 19.518037] kasan_save_stack+0x3c/0x68 [ 19.518201] kasan_save_track+0x20/0x40 [ 19.518337] kasan_save_alloc_info+0x40/0x58 [ 19.518398] __kasan_kmalloc+0xd4/0xd8 [ 19.518436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.518476] kasan_atomics+0xb8/0x2e0 [ 19.518512] kunit_try_run_case+0x170/0x3f0 [ 19.518553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.518596] kthread+0x328/0x630 [ 19.518632] ret_from_fork+0x10/0x20 [ 19.518669] [ 19.518716] The buggy address belongs to the object at fff00000c5906f00 [ 19.518716] which belongs to the cache kmalloc-64 of size 64 [ 19.518809] The buggy address is located 0 bytes to the right of [ 19.518809] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.518916] [ 19.518972] The buggy address belongs to the physical page: [ 19.519013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.520551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.520899] page_type: f5(slab) [ 19.520949] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.521262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.521384] page dumped because: kasan: bad access detected [ 19.521448] [ 19.521476] Memory state around the buggy address: [ 19.521663] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.521881] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.521926] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.521968] ^ [ 19.522004] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.522047] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.522134] ================================================================== [ 19.570547] ================================================================== [ 19.570788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.571257] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.571395] [ 19.571491] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.571573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.571603] Hardware name: linux,dummy-virt (DT) [ 19.571637] Call trace: [ 19.571668] show_stack+0x20/0x38 (C) [ 19.571720] dump_stack_lvl+0x8c/0xd0 [ 19.571791] print_report+0x118/0x608 [ 19.571850] kasan_report+0xdc/0x128 [ 19.571922] kasan_check_range+0x100/0x1a8 [ 19.571972] __kasan_check_write+0x20/0x30 [ 19.572438] kasan_atomics_helper+0x14e4/0x4858 [ 19.572616] kasan_atomics+0x198/0x2e0 [ 19.572663] kunit_try_run_case+0x170/0x3f0 [ 19.572710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.573501] kthread+0x328/0x630 [ 19.573551] ret_from_fork+0x10/0x20 [ 19.573598] [ 19.573672] Allocated by task 266: [ 19.574625] kasan_save_stack+0x3c/0x68 [ 19.574674] kasan_save_track+0x20/0x40 [ 19.574713] kasan_save_alloc_info+0x40/0x58 [ 19.574812] __kasan_kmalloc+0xd4/0xd8 [ 19.574861] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.574900] kasan_atomics+0xb8/0x2e0 [ 19.574938] kunit_try_run_case+0x170/0x3f0 [ 19.574976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.575028] kthread+0x328/0x630 [ 19.575082] ret_from_fork+0x10/0x20 [ 19.575132] [ 19.575154] The buggy address belongs to the object at fff00000c5906f00 [ 19.575154] which belongs to the cache kmalloc-64 of size 64 [ 19.575214] The buggy address is located 0 bytes to the right of [ 19.575214] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.575278] [ 19.575327] The buggy address belongs to the physical page: [ 19.575367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.575419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.575468] page_type: f5(slab) [ 19.575507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.575560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.575602] page dumped because: kasan: bad access detected [ 19.575639] [ 19.575660] Memory state around the buggy address: [ 19.575692] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.575737] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.575782] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.575822] ^ [ 19.575863] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.575907] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.575945] ================================================================== [ 19.605137] ================================================================== [ 19.605183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.605229] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.605279] [ 19.605309] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.605389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.605418] Hardware name: linux,dummy-virt (DT) [ 19.605450] Call trace: [ 19.605472] show_stack+0x20/0x38 (C) [ 19.605553] dump_stack_lvl+0x8c/0xd0 [ 19.605749] print_report+0x118/0x608 [ 19.605799] kasan_report+0xdc/0x128 [ 19.605857] __asan_report_load8_noabort+0x20/0x30 [ 19.605919] kasan_atomics_helper+0x3e10/0x4858 [ 19.605968] kasan_atomics+0x198/0x2e0 [ 19.606016] kunit_try_run_case+0x170/0x3f0 [ 19.606065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.606118] kthread+0x328/0x630 [ 19.606168] ret_from_fork+0x10/0x20 [ 19.606217] [ 19.606249] Allocated by task 266: [ 19.606289] kasan_save_stack+0x3c/0x68 [ 19.606330] kasan_save_track+0x20/0x40 [ 19.606368] kasan_save_alloc_info+0x40/0x58 [ 19.606735] __kasan_kmalloc+0xd4/0xd8 [ 19.606889] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.606954] kasan_atomics+0xb8/0x2e0 [ 19.607075] kunit_try_run_case+0x170/0x3f0 [ 19.607482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.607550] kthread+0x328/0x630 [ 19.607639] ret_from_fork+0x10/0x20 [ 19.607685] [ 19.607732] The buggy address belongs to the object at fff00000c5906f00 [ 19.607732] which belongs to the cache kmalloc-64 of size 64 [ 19.607855] The buggy address is located 0 bytes to the right of [ 19.607855] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.607930] [ 19.608026] The buggy address belongs to the physical page: [ 19.608150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.608204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.608254] page_type: f5(slab) [ 19.608291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.608344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.608387] page dumped because: kasan: bad access detected [ 19.608421] [ 19.608440] Memory state around the buggy address: [ 19.608471] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.608516] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.608567] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.608608] ^ [ 19.608679] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.608852] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.608891] ================================================================== [ 19.412474] ================================================================== [ 19.412544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.412598] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.412649] [ 19.412680] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.414808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.414853] Hardware name: linux,dummy-virt (DT) [ 19.414888] Call trace: [ 19.414912] show_stack+0x20/0x38 (C) [ 19.414968] dump_stack_lvl+0x8c/0xd0 [ 19.415015] print_report+0x118/0x608 [ 19.415064] kasan_report+0xdc/0x128 [ 19.415109] kasan_check_range+0x100/0x1a8 [ 19.415159] __kasan_check_write+0x20/0x30 [ 19.415205] kasan_atomics_helper+0xe44/0x4858 [ 19.415255] kasan_atomics+0x198/0x2e0 [ 19.415300] kunit_try_run_case+0x170/0x3f0 [ 19.415356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.415409] kthread+0x328/0x630 [ 19.415455] ret_from_fork+0x10/0x20 [ 19.415502] [ 19.415523] Allocated by task 266: [ 19.415551] kasan_save_stack+0x3c/0x68 [ 19.415594] kasan_save_track+0x20/0x40 [ 19.415634] kasan_save_alloc_info+0x40/0x58 [ 19.415677] __kasan_kmalloc+0xd4/0xd8 [ 19.415716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.415756] kasan_atomics+0xb8/0x2e0 [ 19.415794] kunit_try_run_case+0x170/0x3f0 [ 19.415834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.415898] kthread+0x328/0x630 [ 19.415931] ret_from_fork+0x10/0x20 [ 19.416223] [ 19.416540] The buggy address belongs to the object at fff00000c5906f00 [ 19.416540] which belongs to the cache kmalloc-64 of size 64 [ 19.417871] The buggy address is located 0 bytes to the right of [ 19.417871] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.417943] [ 19.417965] The buggy address belongs to the physical page: [ 19.418576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.418683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.419026] page_type: f5(slab) [ 19.419168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.419274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.419327] page dumped because: kasan: bad access detected [ 19.419572] [ 19.419597] Memory state around the buggy address: [ 19.419635] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.419679] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420009] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.420096] ^ [ 19.420199] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420451] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.420520] ================================================================== [ 19.557320] ================================================================== [ 19.557367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.557414] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.557465] [ 19.557497] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.557579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.557606] Hardware name: linux,dummy-virt (DT) [ 19.557639] Call trace: [ 19.558030] show_stack+0x20/0x38 (C) [ 19.558218] dump_stack_lvl+0x8c/0xd0 [ 19.558379] print_report+0x118/0x608 [ 19.558427] kasan_report+0xdc/0x128 [ 19.558475] kasan_check_range+0x100/0x1a8 [ 19.558523] __kasan_check_write+0x20/0x30 [ 19.558569] kasan_atomics_helper+0x1414/0x4858 [ 19.558627] kasan_atomics+0x198/0x2e0 [ 19.558675] kunit_try_run_case+0x170/0x3f0 [ 19.559005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.559242] kthread+0x328/0x630 [ 19.559354] ret_from_fork+0x10/0x20 [ 19.559424] [ 19.559540] Allocated by task 266: [ 19.559569] kasan_save_stack+0x3c/0x68 [ 19.559632] kasan_save_track+0x20/0x40 [ 19.559804] kasan_save_alloc_info+0x40/0x58 [ 19.559885] __kasan_kmalloc+0xd4/0xd8 [ 19.559923] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.560041] kasan_atomics+0xb8/0x2e0 [ 19.560078] kunit_try_run_case+0x170/0x3f0 [ 19.560119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.560368] kthread+0x328/0x630 [ 19.560412] ret_from_fork+0x10/0x20 [ 19.561093] [ 19.561148] The buggy address belongs to the object at fff00000c5906f00 [ 19.561148] which belongs to the cache kmalloc-64 of size 64 [ 19.561221] The buggy address is located 0 bytes to the right of [ 19.561221] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.561356] [ 19.561379] The buggy address belongs to the physical page: [ 19.561413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.561807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.561880] page_type: f5(slab) [ 19.561946] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.562206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.562532] page dumped because: kasan: bad access detected [ 19.562616] [ 19.562638] Memory state around the buggy address: [ 19.562673] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.563652] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.563701] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.564201] ^ [ 19.564242] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.564288] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.564375] ================================================================== [ 19.437687] ================================================================== [ 19.437745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.437797] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.437863] [ 19.437907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.438013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.438042] Hardware name: linux,dummy-virt (DT) [ 19.438084] Call trace: [ 19.438109] show_stack+0x20/0x38 (C) [ 19.438157] dump_stack_lvl+0x8c/0xd0 [ 19.438207] print_report+0x118/0x608 [ 19.438262] kasan_report+0xdc/0x128 [ 19.438308] kasan_check_range+0x100/0x1a8 [ 19.438358] __kasan_check_write+0x20/0x30 [ 19.438408] kasan_atomics_helper+0xf20/0x4858 [ 19.438458] kasan_atomics+0x198/0x2e0 [ 19.438504] kunit_try_run_case+0x170/0x3f0 [ 19.438553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.438625] kthread+0x328/0x630 [ 19.438669] ret_from_fork+0x10/0x20 [ 19.438733] [ 19.438782] Allocated by task 266: [ 19.438811] kasan_save_stack+0x3c/0x68 [ 19.439109] kasan_save_track+0x20/0x40 [ 19.440237] kasan_save_alloc_info+0x40/0x58 [ 19.440303] __kasan_kmalloc+0xd4/0xd8 [ 19.440464] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.440658] kasan_atomics+0xb8/0x2e0 [ 19.440729] kunit_try_run_case+0x170/0x3f0 [ 19.440903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.440995] kthread+0x328/0x630 [ 19.441062] ret_from_fork+0x10/0x20 [ 19.441216] [ 19.441295] The buggy address belongs to the object at fff00000c5906f00 [ 19.441295] which belongs to the cache kmalloc-64 of size 64 [ 19.441394] The buggy address is located 0 bytes to the right of [ 19.441394] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.441565] [ 19.441618] The buggy address belongs to the physical page: [ 19.441651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.441900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.441962] page_type: f5(slab) [ 19.442004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.442062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.442104] page dumped because: kasan: bad access detected [ 19.442139] [ 19.442159] Memory state around the buggy address: [ 19.442193] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.442240] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.442283] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.442323] ^ [ 19.442356] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.442401] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.442440] ================================================================== [ 19.427323] ================================================================== [ 19.427405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.427476] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266 [ 19.427546] [ 19.427668] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.427895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.428005] Hardware name: linux,dummy-virt (DT) [ 19.428087] Call trace: [ 19.428201] show_stack+0x20/0x38 (C) [ 19.428257] dump_stack_lvl+0x8c/0xd0 [ 19.428331] print_report+0x118/0x608 [ 19.428380] kasan_report+0xdc/0x128 [ 19.428453] kasan_check_range+0x100/0x1a8 [ 19.428808] __kasan_check_write+0x20/0x30 [ 19.430041] kasan_atomics_helper+0xeb8/0x4858 [ 19.430402] kasan_atomics+0x198/0x2e0 [ 19.431613] kunit_try_run_case+0x170/0x3f0 [ 19.431814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.431916] kthread+0x328/0x630 [ 19.432110] ret_from_fork+0x10/0x20 [ 19.432190] [ 19.432212] Allocated by task 266: [ 19.432461] kasan_save_stack+0x3c/0x68 [ 19.432516] kasan_save_track+0x20/0x40 [ 19.432562] kasan_save_alloc_info+0x40/0x58 [ 19.432791] __kasan_kmalloc+0xd4/0xd8 [ 19.432913] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.433154] kasan_atomics+0xb8/0x2e0 [ 19.433287] kunit_try_run_case+0x170/0x3f0 [ 19.433474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.433551] kthread+0x328/0x630 [ 19.433825] ret_from_fork+0x10/0x20 [ 19.433922] [ 19.434190] The buggy address belongs to the object at fff00000c5906f00 [ 19.434190] which belongs to the cache kmalloc-64 of size 64 [ 19.434276] The buggy address is located 0 bytes to the right of [ 19.434276] allocated 48-byte region [fff00000c5906f00, fff00000c5906f30) [ 19.434583] [ 19.434656] The buggy address belongs to the physical page: [ 19.434728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.434919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.434998] page_type: f5(slab) [ 19.435079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.435141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.435187] page dumped because: kasan: bad access detected [ 19.435452] [ 19.435476] Memory state around the buggy address: [ 19.435554] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.435623] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.435687] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.435906] ^ [ 19.436059] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.436137] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.436271] ================================================================== [ 19.183648] ================================================================== [ 19.183702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 19.183934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.184677] kasan_save_stack+0x3c/0x68 [ 19.184718] kasan_save_track+0x20/0x40 [ 19.184806] __kasan_kmalloc+0xd4/0xd8 [ 19.184894] kasan_atomics+0xb8/0x2e0 [ 19.189229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.190811] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.192011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.192949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.193017] kthread+0x328/0x630 [ 19.193062] ret_from_fork+0x10/0x20 [ 19.193129] [ 19.193223] kasan_save_stack+0x3c/0x68 [ 19.193526] kasan_atomics+0xb8/0x2e0 [ 19.194273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 19.194326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.194414] page_type: f5(slab) [ 19.194465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.194518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.194576] page dumped because: kasan: bad access detected [ 19.194629] [ 19.194649] Memory state around the buggy address: [ 19.194682] fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.194815] fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.195192] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.195395] ^ [ 19.195548] fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.195655] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.195777] ==================================================================
[ 16.180098] ================================================================== [ 16.180451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.180824] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.181265] [ 16.181387] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.181431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.181444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.181464] Call Trace: [ 16.181480] <TASK> [ 16.181497] dump_stack_lvl+0x73/0xb0 [ 16.181529] print_report+0xd1/0x650 [ 16.181552] ? __virt_addr_valid+0x1db/0x2d0 [ 16.181576] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.181599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.181623] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.181646] kasan_report+0x141/0x180 [ 16.181670] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.181698] kasan_check_range+0x10c/0x1c0 [ 16.181724] __kasan_check_write+0x18/0x20 [ 16.181766] kasan_atomics_helper+0x20c8/0x5450 [ 16.181791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.181815] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.181841] ? kasan_atomics+0x152/0x310 [ 16.181869] kasan_atomics+0x1dc/0x310 [ 16.181893] ? __pfx_kasan_atomics+0x10/0x10 [ 16.181928] ? __pfx_read_tsc+0x10/0x10 [ 16.181950] ? ktime_get_ts64+0x86/0x230 [ 16.181975] kunit_try_run_case+0x1a5/0x480 [ 16.182000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.182025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.182051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.182077] ? __kthread_parkme+0x82/0x180 [ 16.182098] ? preempt_count_sub+0x50/0x80 [ 16.182123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.182150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.182175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.182201] kthread+0x337/0x6f0 [ 16.182221] ? trace_preempt_on+0x20/0xc0 [ 16.182245] ? __pfx_kthread+0x10/0x10 [ 16.182266] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.182289] ? calculate_sigpending+0x7b/0xa0 [ 16.182314] ? __pfx_kthread+0x10/0x10 [ 16.182337] ret_from_fork+0x116/0x1d0 [ 16.182356] ? __pfx_kthread+0x10/0x10 [ 16.182378] ret_from_fork_asm+0x1a/0x30 [ 16.182411] </TASK> [ 16.182422] [ 16.189852] Allocated by task 282: [ 16.190026] kasan_save_stack+0x45/0x70 [ 16.190192] kasan_save_track+0x18/0x40 [ 16.190392] kasan_save_alloc_info+0x3b/0x50 [ 16.190588] __kasan_kmalloc+0xb7/0xc0 [ 16.190759] __kmalloc_cache_noprof+0x189/0x420 [ 16.190998] kasan_atomics+0x95/0x310 [ 16.191164] kunit_try_run_case+0x1a5/0x480 [ 16.191329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.191505] kthread+0x337/0x6f0 [ 16.191626] ret_from_fork+0x116/0x1d0 [ 16.191784] ret_from_fork_asm+0x1a/0x30 [ 16.191933] [ 16.192003] The buggy address belongs to the object at ffff888102a1a680 [ 16.192003] which belongs to the cache kmalloc-64 of size 64 [ 16.192371] The buggy address is located 0 bytes to the right of [ 16.192371] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.192944] [ 16.193041] The buggy address belongs to the physical page: [ 16.193294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.193648] flags: 0x200000000000000(node=0|zone=2) [ 16.193894] page_type: f5(slab) [ 16.194022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.194254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.194482] page dumped because: kasan: bad access detected [ 16.194659] [ 16.194727] Memory state around the buggy address: [ 16.194965] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.195293] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.195626] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.195983] ^ [ 16.196214] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.196542] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.196888] ================================================================== [ 15.699838] ================================================================== [ 15.700570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.701272] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.701934] [ 15.702153] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.702195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.702207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.702229] Call Trace: [ 15.702244] <TASK> [ 15.702261] dump_stack_lvl+0x73/0xb0 [ 15.702291] print_report+0xd1/0x650 [ 15.702313] ? __virt_addr_valid+0x1db/0x2d0 [ 15.702337] ? kasan_atomics_helper+0x1467/0x5450 [ 15.702359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.702385] ? kasan_atomics_helper+0x1467/0x5450 [ 15.702408] kasan_report+0x141/0x180 [ 15.702431] ? kasan_atomics_helper+0x1467/0x5450 [ 15.702459] kasan_check_range+0x10c/0x1c0 [ 15.702483] __kasan_check_write+0x18/0x20 [ 15.702508] kasan_atomics_helper+0x1467/0x5450 [ 15.702532] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.702556] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.702582] ? kasan_atomics+0x152/0x310 [ 15.702610] kasan_atomics+0x1dc/0x310 [ 15.702633] ? __pfx_kasan_atomics+0x10/0x10 [ 15.702659] ? __pfx_read_tsc+0x10/0x10 [ 15.702680] ? ktime_get_ts64+0x86/0x230 [ 15.702705] kunit_try_run_case+0x1a5/0x480 [ 15.702731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.702790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.702816] ? __kthread_parkme+0x82/0x180 [ 15.702838] ? preempt_count_sub+0x50/0x80 [ 15.702863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.702915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.702954] kthread+0x337/0x6f0 [ 15.702973] ? trace_preempt_on+0x20/0xc0 [ 15.702998] ? __pfx_kthread+0x10/0x10 [ 15.703019] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.703042] ? calculate_sigpending+0x7b/0xa0 [ 15.703066] ? __pfx_kthread+0x10/0x10 [ 15.703089] ret_from_fork+0x116/0x1d0 [ 15.703109] ? __pfx_kthread+0x10/0x10 [ 15.703131] ret_from_fork_asm+0x1a/0x30 [ 15.703164] </TASK> [ 15.703175] [ 15.710567] Allocated by task 282: [ 15.710696] kasan_save_stack+0x45/0x70 [ 15.710906] kasan_save_track+0x18/0x40 [ 15.711109] kasan_save_alloc_info+0x3b/0x50 [ 15.711425] __kasan_kmalloc+0xb7/0xc0 [ 15.711611] __kmalloc_cache_noprof+0x189/0x420 [ 15.711893] kasan_atomics+0x95/0x310 [ 15.712041] kunit_try_run_case+0x1a5/0x480 [ 15.712190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.712447] kthread+0x337/0x6f0 [ 15.712616] ret_from_fork+0x116/0x1d0 [ 15.712825] ret_from_fork_asm+0x1a/0x30 [ 15.713033] [ 15.713108] The buggy address belongs to the object at ffff888102a1a680 [ 15.713108] which belongs to the cache kmalloc-64 of size 64 [ 15.713575] The buggy address is located 0 bytes to the right of [ 15.713575] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.714099] [ 15.714186] The buggy address belongs to the physical page: [ 15.714408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.714721] flags: 0x200000000000000(node=0|zone=2) [ 15.714912] page_type: f5(slab) [ 15.715083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.715385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.715610] page dumped because: kasan: bad access detected [ 15.715780] [ 15.715849] Memory state around the buggy address: [ 15.716011] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.716268] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.716873] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.717204] ^ [ 15.717428] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.717743] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.718066] ================================================================== [ 15.882286] ================================================================== [ 15.882634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.882999] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.883250] [ 15.883357] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.883399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.883426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.883447] Call Trace: [ 15.883462] <TASK> [ 15.883479] dump_stack_lvl+0x73/0xb0 [ 15.883507] print_report+0xd1/0x650 [ 15.883529] ? __virt_addr_valid+0x1db/0x2d0 [ 15.883552] ? kasan_atomics_helper+0x194a/0x5450 [ 15.883575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.883599] ? kasan_atomics_helper+0x194a/0x5450 [ 15.883623] kasan_report+0x141/0x180 [ 15.883646] ? kasan_atomics_helper+0x194a/0x5450 [ 15.883674] kasan_check_range+0x10c/0x1c0 [ 15.883699] __kasan_check_write+0x18/0x20 [ 15.883719] kasan_atomics_helper+0x194a/0x5450 [ 15.883742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.883778] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.883804] ? kasan_atomics+0x152/0x310 [ 15.883831] kasan_atomics+0x1dc/0x310 [ 15.883855] ? __pfx_kasan_atomics+0x10/0x10 [ 15.883880] ? __pfx_read_tsc+0x10/0x10 [ 15.883902] ? ktime_get_ts64+0x86/0x230 [ 15.883936] kunit_try_run_case+0x1a5/0x480 [ 15.883962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.883985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.884010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.884035] ? __kthread_parkme+0x82/0x180 [ 15.884056] ? preempt_count_sub+0x50/0x80 [ 15.884081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.884106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.884131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.884157] kthread+0x337/0x6f0 [ 15.884177] ? trace_preempt_on+0x20/0xc0 [ 15.884201] ? __pfx_kthread+0x10/0x10 [ 15.884222] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.884245] ? calculate_sigpending+0x7b/0xa0 [ 15.884270] ? __pfx_kthread+0x10/0x10 [ 15.884293] ret_from_fork+0x116/0x1d0 [ 15.884312] ? __pfx_kthread+0x10/0x10 [ 15.884333] ret_from_fork_asm+0x1a/0x30 [ 15.884366] </TASK> [ 15.884377] [ 15.892991] Allocated by task 282: [ 15.893192] kasan_save_stack+0x45/0x70 [ 15.893395] kasan_save_track+0x18/0x40 [ 15.893583] kasan_save_alloc_info+0x3b/0x50 [ 15.893848] __kasan_kmalloc+0xb7/0xc0 [ 15.894025] __kmalloc_cache_noprof+0x189/0x420 [ 15.894218] kasan_atomics+0x95/0x310 [ 15.894429] kunit_try_run_case+0x1a5/0x480 [ 15.894645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.894899] kthread+0x337/0x6f0 [ 15.895074] ret_from_fork+0x116/0x1d0 [ 15.895262] ret_from_fork_asm+0x1a/0x30 [ 15.895473] [ 15.895542] The buggy address belongs to the object at ffff888102a1a680 [ 15.895542] which belongs to the cache kmalloc-64 of size 64 [ 15.896143] The buggy address is located 0 bytes to the right of [ 15.896143] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.896497] [ 15.896912] The buggy address belongs to the physical page: [ 15.897189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.897525] flags: 0x200000000000000(node=0|zone=2) [ 15.897743] page_type: f5(slab) [ 15.898655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.901682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.901973] page dumped because: kasan: bad access detected [ 15.902145] [ 15.902281] Memory state around the buggy address: [ 15.902461] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.902681] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.903183] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.903901] ^ [ 15.904672] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.905023] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.905342] ================================================================== [ 15.948338] ================================================================== [ 15.949748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.950284] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.950999] [ 15.951171] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.951217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.951230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.951252] Call Trace: [ 15.951267] <TASK> [ 15.951283] dump_stack_lvl+0x73/0xb0 [ 15.951345] print_report+0xd1/0x650 [ 15.951368] ? __virt_addr_valid+0x1db/0x2d0 [ 15.951393] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.951427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.951452] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.951475] kasan_report+0x141/0x180 [ 15.951499] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.951527] kasan_check_range+0x10c/0x1c0 [ 15.951552] __kasan_check_write+0x18/0x20 [ 15.951572] kasan_atomics_helper+0x1b22/0x5450 [ 15.951596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.951621] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.951648] ? kasan_atomics+0x152/0x310 [ 15.951675] kasan_atomics+0x1dc/0x310 [ 15.951699] ? __pfx_kasan_atomics+0x10/0x10 [ 15.951724] ? __pfx_read_tsc+0x10/0x10 [ 15.951745] ? ktime_get_ts64+0x86/0x230 [ 15.951780] kunit_try_run_case+0x1a5/0x480 [ 15.951806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.951830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.951856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.951883] ? __kthread_parkme+0x82/0x180 [ 15.951906] ? preempt_count_sub+0x50/0x80 [ 15.951945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.951970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.951995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.952022] kthread+0x337/0x6f0 [ 15.952041] ? trace_preempt_on+0x20/0xc0 [ 15.952066] ? __pfx_kthread+0x10/0x10 [ 15.952090] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.952112] ? calculate_sigpending+0x7b/0xa0 [ 15.952137] ? __pfx_kthread+0x10/0x10 [ 15.952160] ret_from_fork+0x116/0x1d0 [ 15.952179] ? __pfx_kthread+0x10/0x10 [ 15.952201] ret_from_fork_asm+0x1a/0x30 [ 15.952235] </TASK> [ 15.952246] [ 15.961128] Allocated by task 282: [ 15.961322] kasan_save_stack+0x45/0x70 [ 15.961530] kasan_save_track+0x18/0x40 [ 15.961720] kasan_save_alloc_info+0x3b/0x50 [ 15.961968] __kasan_kmalloc+0xb7/0xc0 [ 15.962194] __kmalloc_cache_noprof+0x189/0x420 [ 15.962349] kasan_atomics+0x95/0x310 [ 15.962481] kunit_try_run_case+0x1a5/0x480 [ 15.962687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963076] kthread+0x337/0x6f0 [ 15.963330] ret_from_fork+0x116/0x1d0 [ 15.963570] ret_from_fork_asm+0x1a/0x30 [ 15.963883] [ 15.963966] The buggy address belongs to the object at ffff888102a1a680 [ 15.963966] which belongs to the cache kmalloc-64 of size 64 [ 15.964489] The buggy address is located 0 bytes to the right of [ 15.964489] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.965019] [ 15.965116] The buggy address belongs to the physical page: [ 15.965370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.965741] flags: 0x200000000000000(node=0|zone=2) [ 15.965999] page_type: f5(slab) [ 15.966166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.966487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.966913] page dumped because: kasan: bad access detected [ 15.967182] [ 15.967304] Memory state around the buggy address: [ 15.967532] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.967869] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968254] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.968584] ^ [ 15.968799] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969116] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969547] ================================================================== [ 16.125467] ================================================================== [ 16.125808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.126177] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.126485] [ 16.126590] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.126634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.126647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.126669] Call Trace: [ 16.126686] <TASK> [ 16.126702] dump_stack_lvl+0x73/0xb0 [ 16.126733] print_report+0xd1/0x650 [ 16.126768] ? __virt_addr_valid+0x1db/0x2d0 [ 16.126793] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.126816] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.126841] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.126865] kasan_report+0x141/0x180 [ 16.126888] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.126917] __asan_report_load8_noabort+0x18/0x20 [ 16.126955] kasan_atomics_helper+0x4f71/0x5450 [ 16.126980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.127007] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.127033] ? kasan_atomics+0x152/0x310 [ 16.127062] kasan_atomics+0x1dc/0x310 [ 16.127086] ? __pfx_kasan_atomics+0x10/0x10 [ 16.127112] ? __pfx_read_tsc+0x10/0x10 [ 16.127136] ? ktime_get_ts64+0x86/0x230 [ 16.127161] kunit_try_run_case+0x1a5/0x480 [ 16.127187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.127212] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.127238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.127264] ? __kthread_parkme+0x82/0x180 [ 16.127286] ? preempt_count_sub+0x50/0x80 [ 16.127311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.127337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.127363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.127391] kthread+0x337/0x6f0 [ 16.127411] ? trace_preempt_on+0x20/0xc0 [ 16.127437] ? __pfx_kthread+0x10/0x10 [ 16.127459] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.127482] ? calculate_sigpending+0x7b/0xa0 [ 16.127507] ? __pfx_kthread+0x10/0x10 [ 16.127530] ret_from_fork+0x116/0x1d0 [ 16.127550] ? __pfx_kthread+0x10/0x10 [ 16.127572] ret_from_fork_asm+0x1a/0x30 [ 16.127608] </TASK> [ 16.127619] [ 16.134750] Allocated by task 282: [ 16.134965] kasan_save_stack+0x45/0x70 [ 16.135159] kasan_save_track+0x18/0x40 [ 16.135351] kasan_save_alloc_info+0x3b/0x50 [ 16.135560] __kasan_kmalloc+0xb7/0xc0 [ 16.135746] __kmalloc_cache_noprof+0x189/0x420 [ 16.135916] kasan_atomics+0x95/0x310 [ 16.136091] kunit_try_run_case+0x1a5/0x480 [ 16.136239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.136417] kthread+0x337/0x6f0 [ 16.136538] ret_from_fork+0x116/0x1d0 [ 16.136680] ret_from_fork_asm+0x1a/0x30 [ 16.136901] [ 16.137005] The buggy address belongs to the object at ffff888102a1a680 [ 16.137005] which belongs to the cache kmalloc-64 of size 64 [ 16.137461] The buggy address is located 0 bytes to the right of [ 16.137461] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.138000] [ 16.138075] The buggy address belongs to the physical page: [ 16.138301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.138624] flags: 0x200000000000000(node=0|zone=2) [ 16.138868] page_type: f5(slab) [ 16.139025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.139341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.139612] page dumped because: kasan: bad access detected [ 16.139882] [ 16.139983] Memory state around the buggy address: [ 16.140185] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.140460] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.140790] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.141052] ^ [ 16.141275] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.141514] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.141726] ================================================================== [ 15.194609] ================================================================== [ 15.195217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.195479] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.195850] [ 15.195949] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.195992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.196005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.196026] Call Trace: [ 15.196040] <TASK> [ 15.196055] dump_stack_lvl+0x73/0xb0 [ 15.196086] print_report+0xd1/0x650 [ 15.196109] ? __virt_addr_valid+0x1db/0x2d0 [ 15.196132] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.196206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.196231] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.196254] kasan_report+0x141/0x180 [ 15.196421] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.196451] kasan_check_range+0x10c/0x1c0 [ 15.196476] __kasan_check_write+0x18/0x20 [ 15.196497] kasan_atomics_helper+0xa2b/0x5450 [ 15.196521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.196546] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.196572] ? kasan_atomics+0x152/0x310 [ 15.196613] kasan_atomics+0x1dc/0x310 [ 15.196637] ? __pfx_kasan_atomics+0x10/0x10 [ 15.196675] ? __pfx_read_tsc+0x10/0x10 [ 15.196696] ? ktime_get_ts64+0x86/0x230 [ 15.196721] kunit_try_run_case+0x1a5/0x480 [ 15.196747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.196791] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.196817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.196853] ? __kthread_parkme+0x82/0x180 [ 15.196875] ? preempt_count_sub+0x50/0x80 [ 15.196902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.196941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.196969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.196995] kthread+0x337/0x6f0 [ 15.197073] ? trace_preempt_on+0x20/0xc0 [ 15.197102] ? __pfx_kthread+0x10/0x10 [ 15.197124] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.197147] ? calculate_sigpending+0x7b/0xa0 [ 15.197182] ? __pfx_kthread+0x10/0x10 [ 15.197205] ret_from_fork+0x116/0x1d0 [ 15.197225] ? __pfx_kthread+0x10/0x10 [ 15.197258] ret_from_fork_asm+0x1a/0x30 [ 15.197291] </TASK> [ 15.197302] [ 15.205973] Allocated by task 282: [ 15.206115] kasan_save_stack+0x45/0x70 [ 15.206261] kasan_save_track+0x18/0x40 [ 15.206395] kasan_save_alloc_info+0x3b/0x50 [ 15.206802] __kasan_kmalloc+0xb7/0xc0 [ 15.207064] __kmalloc_cache_noprof+0x189/0x420 [ 15.207312] kasan_atomics+0x95/0x310 [ 15.207541] kunit_try_run_case+0x1a5/0x480 [ 15.207802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.208171] kthread+0x337/0x6f0 [ 15.208438] ret_from_fork+0x116/0x1d0 [ 15.208610] ret_from_fork_asm+0x1a/0x30 [ 15.208857] [ 15.209000] The buggy address belongs to the object at ffff888102a1a680 [ 15.209000] which belongs to the cache kmalloc-64 of size 64 [ 15.209610] The buggy address is located 0 bytes to the right of [ 15.209610] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.210258] [ 15.210451] The buggy address belongs to the physical page: [ 15.210728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.211098] flags: 0x200000000000000(node=0|zone=2) [ 15.211396] page_type: f5(slab) [ 15.211569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.211828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.212322] page dumped because: kasan: bad access detected [ 15.212502] [ 15.212573] Memory state around the buggy address: [ 15.212727] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.212994] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.213329] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.214024] ^ [ 15.214337] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214630] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.215081] ================================================================== [ 15.215554] ================================================================== [ 15.215912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.216343] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.216885] [ 15.216989] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.217032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.217044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.217064] Call Trace: [ 15.217081] <TASK> [ 15.217097] dump_stack_lvl+0x73/0xb0 [ 15.217125] print_report+0xd1/0x650 [ 15.217148] ? __virt_addr_valid+0x1db/0x2d0 [ 15.217171] ? kasan_atomics_helper+0xac7/0x5450 [ 15.217193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.217259] ? kasan_atomics_helper+0xac7/0x5450 [ 15.217282] kasan_report+0x141/0x180 [ 15.217317] ? kasan_atomics_helper+0xac7/0x5450 [ 15.217344] kasan_check_range+0x10c/0x1c0 [ 15.217369] __kasan_check_write+0x18/0x20 [ 15.217390] kasan_atomics_helper+0xac7/0x5450 [ 15.217414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.217439] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.217465] ? kasan_atomics+0x152/0x310 [ 15.217492] kasan_atomics+0x1dc/0x310 [ 15.217516] ? __pfx_kasan_atomics+0x10/0x10 [ 15.217542] ? __pfx_read_tsc+0x10/0x10 [ 15.217678] ? ktime_get_ts64+0x86/0x230 [ 15.217708] kunit_try_run_case+0x1a5/0x480 [ 15.217828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.217884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.217909] ? __kthread_parkme+0x82/0x180 [ 15.217942] ? preempt_count_sub+0x50/0x80 [ 15.217967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.218019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.218045] kthread+0x337/0x6f0 [ 15.218125] ? trace_preempt_on+0x20/0xc0 [ 15.218153] ? __pfx_kthread+0x10/0x10 [ 15.218175] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.218199] ? calculate_sigpending+0x7b/0xa0 [ 15.218224] ? __pfx_kthread+0x10/0x10 [ 15.218247] ret_from_fork+0x116/0x1d0 [ 15.218267] ? __pfx_kthread+0x10/0x10 [ 15.218288] ret_from_fork_asm+0x1a/0x30 [ 15.218322] </TASK> [ 15.218333] [ 15.232780] Allocated by task 282: [ 15.233168] kasan_save_stack+0x45/0x70 [ 15.233767] kasan_save_track+0x18/0x40 [ 15.234266] kasan_save_alloc_info+0x3b/0x50 [ 15.234706] __kasan_kmalloc+0xb7/0xc0 [ 15.235169] __kmalloc_cache_noprof+0x189/0x420 [ 15.235626] kasan_atomics+0x95/0x310 [ 15.236108] kunit_try_run_case+0x1a5/0x480 [ 15.236281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.236459] kthread+0x337/0x6f0 [ 15.236580] ret_from_fork+0x116/0x1d0 [ 15.236713] ret_from_fork_asm+0x1a/0x30 [ 15.236951] [ 15.237025] The buggy address belongs to the object at ffff888102a1a680 [ 15.237025] which belongs to the cache kmalloc-64 of size 64 [ 15.237568] The buggy address is located 0 bytes to the right of [ 15.237568] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.238257] [ 15.238379] The buggy address belongs to the physical page: [ 15.238814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.239338] flags: 0x200000000000000(node=0|zone=2) [ 15.239594] page_type: f5(slab) [ 15.239744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.240209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.240540] page dumped because: kasan: bad access detected [ 15.240848] [ 15.240979] Memory state around the buggy address: [ 15.241271] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.241543] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.241965] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.242344] ^ [ 15.242556] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.243138] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.243427] ================================================================== [ 15.498352] ================================================================== [ 15.498595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.498882] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.499228] [ 15.499377] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.499448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.499474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.499507] Call Trace: [ 15.499521] <TASK> [ 15.499549] dump_stack_lvl+0x73/0xb0 [ 15.499592] print_report+0xd1/0x650 [ 15.499628] ? __virt_addr_valid+0x1db/0x2d0 [ 15.499651] ? kasan_atomics_helper+0x1148/0x5450 [ 15.499672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.499695] ? kasan_atomics_helper+0x1148/0x5450 [ 15.499716] kasan_report+0x141/0x180 [ 15.499738] ? kasan_atomics_helper+0x1148/0x5450 [ 15.499780] kasan_check_range+0x10c/0x1c0 [ 15.499805] __kasan_check_write+0x18/0x20 [ 15.499825] kasan_atomics_helper+0x1148/0x5450 [ 15.499849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.499873] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.499900] ? kasan_atomics+0x152/0x310 [ 15.499939] kasan_atomics+0x1dc/0x310 [ 15.499963] ? __pfx_kasan_atomics+0x10/0x10 [ 15.499988] ? __pfx_read_tsc+0x10/0x10 [ 15.500010] ? ktime_get_ts64+0x86/0x230 [ 15.500056] kunit_try_run_case+0x1a5/0x480 [ 15.500082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.500106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.500132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.500157] ? __kthread_parkme+0x82/0x180 [ 15.500178] ? preempt_count_sub+0x50/0x80 [ 15.500204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.500229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.500254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.500280] kthread+0x337/0x6f0 [ 15.500300] ? trace_preempt_on+0x20/0xc0 [ 15.500324] ? __pfx_kthread+0x10/0x10 [ 15.500346] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.500369] ? calculate_sigpending+0x7b/0xa0 [ 15.500394] ? __pfx_kthread+0x10/0x10 [ 15.500417] ret_from_fork+0x116/0x1d0 [ 15.500436] ? __pfx_kthread+0x10/0x10 [ 15.500457] ret_from_fork_asm+0x1a/0x30 [ 15.500490] </TASK> [ 15.500502] [ 15.508717] Allocated by task 282: [ 15.508910] kasan_save_stack+0x45/0x70 [ 15.509064] kasan_save_track+0x18/0x40 [ 15.509276] kasan_save_alloc_info+0x3b/0x50 [ 15.509504] __kasan_kmalloc+0xb7/0xc0 [ 15.509715] __kmalloc_cache_noprof+0x189/0x420 [ 15.509883] kasan_atomics+0x95/0x310 [ 15.510107] kunit_try_run_case+0x1a5/0x480 [ 15.510335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.510543] kthread+0x337/0x6f0 [ 15.510727] ret_from_fork+0x116/0x1d0 [ 15.510936] ret_from_fork_asm+0x1a/0x30 [ 15.511125] [ 15.511206] The buggy address belongs to the object at ffff888102a1a680 [ 15.511206] which belongs to the cache kmalloc-64 of size 64 [ 15.511678] The buggy address is located 0 bytes to the right of [ 15.511678] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.512198] [ 15.512315] The buggy address belongs to the physical page: [ 15.512579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.513000] flags: 0x200000000000000(node=0|zone=2) [ 15.513237] page_type: f5(slab) [ 15.513353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.513692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.514040] page dumped because: kasan: bad access detected [ 15.514208] [ 15.514276] Memory state around the buggy address: [ 15.514425] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.514636] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.515012] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.515320] ^ [ 15.515536] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.515842] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.516341] ================================================================== [ 15.923939] ================================================================== [ 15.924275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.924596] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.924882] [ 15.924977] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.925019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.925033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.925053] Call Trace: [ 15.925069] <TASK> [ 15.925084] dump_stack_lvl+0x73/0xb0 [ 15.925114] print_report+0xd1/0x650 [ 15.925137] ? __virt_addr_valid+0x1db/0x2d0 [ 15.925161] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.925183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.925208] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.925231] kasan_report+0x141/0x180 [ 15.925254] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.925282] kasan_check_range+0x10c/0x1c0 [ 15.925308] __kasan_check_write+0x18/0x20 [ 15.925329] kasan_atomics_helper+0x1a7f/0x5450 [ 15.925353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.925377] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.925402] ? kasan_atomics+0x152/0x310 [ 15.925430] kasan_atomics+0x1dc/0x310 [ 15.925453] ? __pfx_kasan_atomics+0x10/0x10 [ 15.925480] ? __pfx_read_tsc+0x10/0x10 [ 15.925502] ? ktime_get_ts64+0x86/0x230 [ 15.925527] kunit_try_run_case+0x1a5/0x480 [ 15.925553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.925577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.925603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.925630] ? __kthread_parkme+0x82/0x180 [ 15.925651] ? preempt_count_sub+0x50/0x80 [ 15.925676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.925702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.925728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.925777] kthread+0x337/0x6f0 [ 15.925796] ? trace_preempt_on+0x20/0xc0 [ 15.925820] ? __pfx_kthread+0x10/0x10 [ 15.925842] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.925864] ? calculate_sigpending+0x7b/0xa0 [ 15.925889] ? __pfx_kthread+0x10/0x10 [ 15.925913] ret_from_fork+0x116/0x1d0 [ 15.925941] ? __pfx_kthread+0x10/0x10 [ 15.925962] ret_from_fork_asm+0x1a/0x30 [ 15.925995] </TASK> [ 15.926006] [ 15.934975] Allocated by task 282: [ 15.935137] kasan_save_stack+0x45/0x70 [ 15.935290] kasan_save_track+0x18/0x40 [ 15.935566] kasan_save_alloc_info+0x3b/0x50 [ 15.935716] __kasan_kmalloc+0xb7/0xc0 [ 15.935874] __kmalloc_cache_noprof+0x189/0x420 [ 15.936414] kasan_atomics+0x95/0x310 [ 15.936790] kunit_try_run_case+0x1a5/0x480 [ 15.937311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.937852] kthread+0x337/0x6f0 [ 15.938114] ret_from_fork+0x116/0x1d0 [ 15.938487] ret_from_fork_asm+0x1a/0x30 [ 15.938655] [ 15.938728] The buggy address belongs to the object at ffff888102a1a680 [ 15.938728] which belongs to the cache kmalloc-64 of size 64 [ 15.939831] The buggy address is located 0 bytes to the right of [ 15.939831] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.940345] [ 15.940420] The buggy address belongs to the physical page: [ 15.940593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.941071] flags: 0x200000000000000(node=0|zone=2) [ 15.941551] page_type: f5(slab) [ 15.941869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.942723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.943428] page dumped because: kasan: bad access detected [ 15.944005] [ 15.944166] Memory state around the buggy address: [ 15.944609] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.945171] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.945474] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.945687] ^ [ 15.945880] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.946558] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.947200] ================================================================== [ 15.430371] ================================================================== [ 15.430690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.431293] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.431866] [ 15.432117] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.432165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.432178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.432199] Call Trace: [ 15.432215] <TASK> [ 15.432233] dump_stack_lvl+0x73/0xb0 [ 15.432263] print_report+0xd1/0x650 [ 15.432287] ? __virt_addr_valid+0x1db/0x2d0 [ 15.432312] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.432334] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.432359] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.432382] kasan_report+0x141/0x180 [ 15.432405] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.432434] __asan_report_load4_noabort+0x18/0x20 [ 15.432459] kasan_atomics_helper+0x4a36/0x5450 [ 15.432483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.432507] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.432533] ? kasan_atomics+0x152/0x310 [ 15.432561] kasan_atomics+0x1dc/0x310 [ 15.432585] ? __pfx_kasan_atomics+0x10/0x10 [ 15.432611] ? __pfx_read_tsc+0x10/0x10 [ 15.432632] ? ktime_get_ts64+0x86/0x230 [ 15.432657] kunit_try_run_case+0x1a5/0x480 [ 15.432682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.432706] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.432730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.432878] ? __kthread_parkme+0x82/0x180 [ 15.432902] ? preempt_count_sub+0x50/0x80 [ 15.432948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.432974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.433000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.433026] kthread+0x337/0x6f0 [ 15.433046] ? trace_preempt_on+0x20/0xc0 [ 15.433070] ? __pfx_kthread+0x10/0x10 [ 15.433092] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.433115] ? calculate_sigpending+0x7b/0xa0 [ 15.433141] ? __pfx_kthread+0x10/0x10 [ 15.433163] ret_from_fork+0x116/0x1d0 [ 15.433183] ? __pfx_kthread+0x10/0x10 [ 15.433204] ret_from_fork_asm+0x1a/0x30 [ 15.433237] </TASK> [ 15.433249] [ 15.442829] Allocated by task 282: [ 15.443052] kasan_save_stack+0x45/0x70 [ 15.443292] kasan_save_track+0x18/0x40 [ 15.443431] kasan_save_alloc_info+0x3b/0x50 [ 15.443579] __kasan_kmalloc+0xb7/0xc0 [ 15.443708] __kmalloc_cache_noprof+0x189/0x420 [ 15.444202] kasan_atomics+0x95/0x310 [ 15.444626] kunit_try_run_case+0x1a5/0x480 [ 15.445093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445585] kthread+0x337/0x6f0 [ 15.445938] ret_from_fork+0x116/0x1d0 [ 15.446312] ret_from_fork_asm+0x1a/0x30 [ 15.446586] [ 15.446795] The buggy address belongs to the object at ffff888102a1a680 [ 15.446795] which belongs to the cache kmalloc-64 of size 64 [ 15.447284] The buggy address is located 0 bytes to the right of [ 15.447284] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.447660] [ 15.447756] The buggy address belongs to the physical page: [ 15.448351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.449068] flags: 0x200000000000000(node=0|zone=2) [ 15.449529] page_type: f5(slab) [ 15.449874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.450547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.451245] page dumped because: kasan: bad access detected [ 15.451461] [ 15.451677] Memory state around the buggy address: [ 15.452153] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.452545] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.453012] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.453228] ^ [ 15.453381] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.453597] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.454085] ================================================================== [ 16.103675] ================================================================== [ 16.104232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.104673] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.105443] [ 16.105553] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.105599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.105612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.105634] Call Trace: [ 16.105650] <TASK> [ 16.105667] dump_stack_lvl+0x73/0xb0 [ 16.105701] print_report+0xd1/0x650 [ 16.105725] ? __virt_addr_valid+0x1db/0x2d0 [ 16.105751] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.105992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.106017] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.106041] kasan_report+0x141/0x180 [ 16.106064] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.106093] kasan_check_range+0x10c/0x1c0 [ 16.106118] __kasan_check_write+0x18/0x20 [ 16.106139] kasan_atomics_helper+0x1f43/0x5450 [ 16.106164] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.106188] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.106214] ? kasan_atomics+0x152/0x310 [ 16.106245] kasan_atomics+0x1dc/0x310 [ 16.106268] ? __pfx_kasan_atomics+0x10/0x10 [ 16.106295] ? __pfx_read_tsc+0x10/0x10 [ 16.106317] ? ktime_get_ts64+0x86/0x230 [ 16.106343] kunit_try_run_case+0x1a5/0x480 [ 16.106371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.106396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.106421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.106447] ? __kthread_parkme+0x82/0x180 [ 16.106469] ? preempt_count_sub+0x50/0x80 [ 16.106496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.106531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.106557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.106583] kthread+0x337/0x6f0 [ 16.106604] ? trace_preempt_on+0x20/0xc0 [ 16.106628] ? __pfx_kthread+0x10/0x10 [ 16.106651] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.106673] ? calculate_sigpending+0x7b/0xa0 [ 16.106698] ? __pfx_kthread+0x10/0x10 [ 16.106721] ret_from_fork+0x116/0x1d0 [ 16.106740] ? __pfx_kthread+0x10/0x10 [ 16.106824] ret_from_fork_asm+0x1a/0x30 [ 16.106858] </TASK> [ 16.106869] [ 16.117153] Allocated by task 282: [ 16.117347] kasan_save_stack+0x45/0x70 [ 16.117518] kasan_save_track+0x18/0x40 [ 16.117707] kasan_save_alloc_info+0x3b/0x50 [ 16.117859] __kasan_kmalloc+0xb7/0xc0 [ 16.118008] __kmalloc_cache_noprof+0x189/0x420 [ 16.118232] kasan_atomics+0x95/0x310 [ 16.118439] kunit_try_run_case+0x1a5/0x480 [ 16.118747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.119057] kthread+0x337/0x6f0 [ 16.119187] ret_from_fork+0x116/0x1d0 [ 16.119320] ret_from_fork_asm+0x1a/0x30 [ 16.119460] [ 16.119549] The buggy address belongs to the object at ffff888102a1a680 [ 16.119549] which belongs to the cache kmalloc-64 of size 64 [ 16.120415] The buggy address is located 0 bytes to the right of [ 16.120415] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.120929] [ 16.121009] The buggy address belongs to the physical page: [ 16.121221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.121541] flags: 0x200000000000000(node=0|zone=2) [ 16.121784] page_type: f5(slab) [ 16.121980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.122241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.122519] page dumped because: kasan: bad access detected [ 16.122764] [ 16.122844] Memory state around the buggy address: [ 16.123136] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.123366] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.123675] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.124123] ^ [ 16.124316] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.124566] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.124966] ================================================================== [ 15.618225] ================================================================== [ 15.618526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.618856] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.619207] [ 15.619316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.619358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.619370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.619391] Call Trace: [ 15.619407] <TASK> [ 15.619423] dump_stack_lvl+0x73/0xb0 [ 15.619452] print_report+0xd1/0x650 [ 15.619475] ? __virt_addr_valid+0x1db/0x2d0 [ 15.619498] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.619521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.619545] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.619568] kasan_report+0x141/0x180 [ 15.619592] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.619643] __asan_report_load4_noabort+0x18/0x20 [ 15.619670] kasan_atomics_helper+0x49ce/0x5450 [ 15.619695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.619735] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.619771] ? kasan_atomics+0x152/0x310 [ 15.619800] kasan_atomics+0x1dc/0x310 [ 15.619823] ? __pfx_kasan_atomics+0x10/0x10 [ 15.619850] ? __pfx_read_tsc+0x10/0x10 [ 15.619871] ? ktime_get_ts64+0x86/0x230 [ 15.619897] kunit_try_run_case+0x1a5/0x480 [ 15.619933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.619976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.620001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.620026] ? __kthread_parkme+0x82/0x180 [ 15.620048] ? preempt_count_sub+0x50/0x80 [ 15.620073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.620098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.620125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.620151] kthread+0x337/0x6f0 [ 15.620170] ? trace_preempt_on+0x20/0xc0 [ 15.620211] ? __pfx_kthread+0x10/0x10 [ 15.620233] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.620255] ? calculate_sigpending+0x7b/0xa0 [ 15.620280] ? __pfx_kthread+0x10/0x10 [ 15.620303] ret_from_fork+0x116/0x1d0 [ 15.620322] ? __pfx_kthread+0x10/0x10 [ 15.620343] ret_from_fork_asm+0x1a/0x30 [ 15.620392] </TASK> [ 15.620403] [ 15.628002] Allocated by task 282: [ 15.628200] kasan_save_stack+0x45/0x70 [ 15.628423] kasan_save_track+0x18/0x40 [ 15.628637] kasan_save_alloc_info+0x3b/0x50 [ 15.628886] __kasan_kmalloc+0xb7/0xc0 [ 15.629104] __kmalloc_cache_noprof+0x189/0x420 [ 15.629258] kasan_atomics+0x95/0x310 [ 15.629442] kunit_try_run_case+0x1a5/0x480 [ 15.629645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.630049] kthread+0x337/0x6f0 [ 15.630261] ret_from_fork+0x116/0x1d0 [ 15.630780] ret_from_fork_asm+0x1a/0x30 [ 15.630968] [ 15.631096] The buggy address belongs to the object at ffff888102a1a680 [ 15.631096] which belongs to the cache kmalloc-64 of size 64 [ 15.631565] The buggy address is located 0 bytes to the right of [ 15.631565] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.632207] [ 15.632364] The buggy address belongs to the physical page: [ 15.633078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.634327] flags: 0x200000000000000(node=0|zone=2) [ 15.634725] page_type: f5(slab) [ 15.634854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.635198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.635685] page dumped because: kasan: bad access detected [ 15.636156] [ 15.636271] Memory state around the buggy address: [ 15.636425] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.636636] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.636844] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.637069] ^ [ 15.637224] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.637434] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.637679] ================================================================== [ 16.214202] ================================================================== [ 16.214782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.215219] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.215505] [ 16.215590] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.215632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.215644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.215664] Call Trace: [ 16.215679] <TASK> [ 16.215695] dump_stack_lvl+0x73/0xb0 [ 16.215722] print_report+0xd1/0x650 [ 16.215767] ? __virt_addr_valid+0x1db/0x2d0 [ 16.215791] ? kasan_atomics_helper+0x218a/0x5450 [ 16.215813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.215837] ? kasan_atomics_helper+0x218a/0x5450 [ 16.215861] kasan_report+0x141/0x180 [ 16.215883] ? kasan_atomics_helper+0x218a/0x5450 [ 16.215912] kasan_check_range+0x10c/0x1c0 [ 16.215946] __kasan_check_write+0x18/0x20 [ 16.215966] kasan_atomics_helper+0x218a/0x5450 [ 16.215991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.216015] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.216041] ? kasan_atomics+0x152/0x310 [ 16.216069] kasan_atomics+0x1dc/0x310 [ 16.216093] ? __pfx_kasan_atomics+0x10/0x10 [ 16.216118] ? __pfx_read_tsc+0x10/0x10 [ 16.216139] ? ktime_get_ts64+0x86/0x230 [ 16.216164] kunit_try_run_case+0x1a5/0x480 [ 16.216189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216213] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.216238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.216263] ? __kthread_parkme+0x82/0x180 [ 16.216284] ? preempt_count_sub+0x50/0x80 [ 16.216309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.216362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.216389] kthread+0x337/0x6f0 [ 16.216408] ? trace_preempt_on+0x20/0xc0 [ 16.216432] ? __pfx_kthread+0x10/0x10 [ 16.216454] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.216477] ? calculate_sigpending+0x7b/0xa0 [ 16.216502] ? __pfx_kthread+0x10/0x10 [ 16.216524] ret_from_fork+0x116/0x1d0 [ 16.216543] ? __pfx_kthread+0x10/0x10 [ 16.216565] ret_from_fork_asm+0x1a/0x30 [ 16.216598] </TASK> [ 16.216609] [ 16.224019] Allocated by task 282: [ 16.224144] kasan_save_stack+0x45/0x70 [ 16.224286] kasan_save_track+0x18/0x40 [ 16.224465] kasan_save_alloc_info+0x3b/0x50 [ 16.224682] __kasan_kmalloc+0xb7/0xc0 [ 16.224897] __kmalloc_cache_noprof+0x189/0x420 [ 16.225137] kasan_atomics+0x95/0x310 [ 16.225326] kunit_try_run_case+0x1a5/0x480 [ 16.225536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.225812] kthread+0x337/0x6f0 [ 16.225951] ret_from_fork+0x116/0x1d0 [ 16.226085] ret_from_fork_asm+0x1a/0x30 [ 16.226290] [ 16.226387] The buggy address belongs to the object at ffff888102a1a680 [ 16.226387] which belongs to the cache kmalloc-64 of size 64 [ 16.226897] The buggy address is located 0 bytes to the right of [ 16.226897] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.227389] [ 16.227463] The buggy address belongs to the physical page: [ 16.227704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.228042] flags: 0x200000000000000(node=0|zone=2) [ 16.228243] page_type: f5(slab) [ 16.228361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.228592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.228843] page dumped because: kasan: bad access detected [ 16.230234] [ 16.230776] Memory state around the buggy address: [ 16.231416] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.232460] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.233362] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.234492] ^ [ 16.234912] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.235639] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.236542] ================================================================== [ 15.592895] ================================================================== [ 15.593548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.594138] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.594522] [ 15.594630] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.594673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.594686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.594708] Call Trace: [ 15.594726] <TASK> [ 15.594742] dump_stack_lvl+0x73/0xb0 [ 15.594773] print_report+0xd1/0x650 [ 15.594797] ? __virt_addr_valid+0x1db/0x2d0 [ 15.594821] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.594845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.594870] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.594895] kasan_report+0x141/0x180 [ 15.594930] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.594960] kasan_check_range+0x10c/0x1c0 [ 15.594984] __kasan_check_write+0x18/0x20 [ 15.595004] kasan_atomics_helper+0x12e6/0x5450 [ 15.595028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.595051] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.595078] ? kasan_atomics+0x152/0x310 [ 15.595404] kasan_atomics+0x1dc/0x310 [ 15.595432] ? __pfx_kasan_atomics+0x10/0x10 [ 15.595460] ? __pfx_read_tsc+0x10/0x10 [ 15.595481] ? ktime_get_ts64+0x86/0x230 [ 15.595506] kunit_try_run_case+0x1a5/0x480 [ 15.595532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.595581] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.595606] ? __kthread_parkme+0x82/0x180 [ 15.595628] ? preempt_count_sub+0x50/0x80 [ 15.595653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.595706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.595733] kthread+0x337/0x6f0 [ 15.595762] ? trace_preempt_on+0x20/0xc0 [ 15.595787] ? __pfx_kthread+0x10/0x10 [ 15.595808] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.595830] ? calculate_sigpending+0x7b/0xa0 [ 15.595856] ? __pfx_kthread+0x10/0x10 [ 15.595878] ret_from_fork+0x116/0x1d0 [ 15.595898] ? __pfx_kthread+0x10/0x10 [ 15.595934] ret_from_fork_asm+0x1a/0x30 [ 15.595967] </TASK> [ 15.595977] [ 15.607396] Allocated by task 282: [ 15.607658] kasan_save_stack+0x45/0x70 [ 15.608002] kasan_save_track+0x18/0x40 [ 15.608283] kasan_save_alloc_info+0x3b/0x50 [ 15.608571] __kasan_kmalloc+0xb7/0xc0 [ 15.608887] __kmalloc_cache_noprof+0x189/0x420 [ 15.609226] kasan_atomics+0x95/0x310 [ 15.609441] kunit_try_run_case+0x1a5/0x480 [ 15.609641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.609943] kthread+0x337/0x6f0 [ 15.610380] ret_from_fork+0x116/0x1d0 [ 15.610641] ret_from_fork_asm+0x1a/0x30 [ 15.610937] [ 15.611035] The buggy address belongs to the object at ffff888102a1a680 [ 15.611035] which belongs to the cache kmalloc-64 of size 64 [ 15.611884] The buggy address is located 0 bytes to the right of [ 15.611884] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.612573] [ 15.612775] The buggy address belongs to the physical page: [ 15.613245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.613679] flags: 0x200000000000000(node=0|zone=2) [ 15.614000] page_type: f5(slab) [ 15.614198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.614525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.615108] page dumped because: kasan: bad access detected [ 15.615353] [ 15.615433] Memory state around the buggy address: [ 15.615749] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.616108] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.616406] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.616684] ^ [ 15.616962] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.617248] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.617560] ================================================================== [ 14.972136] ================================================================== [ 14.972396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.972735] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.973021] [ 14.973102] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.973142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.973154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.973175] Call Trace: [ 14.973188] <TASK> [ 14.973202] dump_stack_lvl+0x73/0xb0 [ 14.973229] print_report+0xd1/0x650 [ 14.973252] ? __virt_addr_valid+0x1db/0x2d0 [ 14.973274] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.973296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.973319] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.973341] kasan_report+0x141/0x180 [ 14.973363] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.973391] __asan_report_store4_noabort+0x1b/0x30 [ 14.973416] kasan_atomics_helper+0x4b3a/0x5450 [ 14.973440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.973462] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.973486] ? kasan_atomics+0x152/0x310 [ 14.973513] kasan_atomics+0x1dc/0x310 [ 14.973535] ? __pfx_kasan_atomics+0x10/0x10 [ 14.973560] ? __pfx_read_tsc+0x10/0x10 [ 14.973581] ? ktime_get_ts64+0x86/0x230 [ 14.973605] kunit_try_run_case+0x1a5/0x480 [ 14.973775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973806] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.973832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.973857] ? __kthread_parkme+0x82/0x180 [ 14.973878] ? preempt_count_sub+0x50/0x80 [ 14.973903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.973971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.973997] kthread+0x337/0x6f0 [ 14.974063] ? trace_preempt_on+0x20/0xc0 [ 14.974090] ? __pfx_kthread+0x10/0x10 [ 14.974112] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.974135] ? calculate_sigpending+0x7b/0xa0 [ 14.974159] ? __pfx_kthread+0x10/0x10 [ 14.974182] ret_from_fork+0x116/0x1d0 [ 14.974202] ? __pfx_kthread+0x10/0x10 [ 14.974223] ret_from_fork_asm+0x1a/0x30 [ 14.974256] </TASK> [ 14.974267] [ 14.981735] Allocated by task 282: [ 14.982060] kasan_save_stack+0x45/0x70 [ 14.982209] kasan_save_track+0x18/0x40 [ 14.982348] kasan_save_alloc_info+0x3b/0x50 [ 14.982506] __kasan_kmalloc+0xb7/0xc0 [ 14.982755] __kmalloc_cache_noprof+0x189/0x420 [ 14.983054] kasan_atomics+0x95/0x310 [ 14.983249] kunit_try_run_case+0x1a5/0x480 [ 14.983633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.983808] kthread+0x337/0x6f0 [ 14.983937] ret_from_fork+0x116/0x1d0 [ 14.984070] ret_from_fork_asm+0x1a/0x30 [ 14.984393] [ 14.984495] The buggy address belongs to the object at ffff888102a1a680 [ 14.984495] which belongs to the cache kmalloc-64 of size 64 [ 14.985264] The buggy address is located 0 bytes to the right of [ 14.985264] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.986023] [ 14.986194] The buggy address belongs to the physical page: [ 14.986425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.986756] flags: 0x200000000000000(node=0|zone=2) [ 14.987060] page_type: f5(slab) [ 14.987228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.987528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.987819] page dumped because: kasan: bad access detected [ 14.988076] [ 14.988225] Memory state around the buggy address: [ 14.988421] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.988718] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.989080] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.989533] ^ [ 14.989697] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990018] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990406] ================================================================== [ 15.516755] ================================================================== [ 15.517123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.517583] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.517871] [ 15.517965] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.518008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.518020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.518041] Call Trace: [ 15.518056] <TASK> [ 15.518072] dump_stack_lvl+0x73/0xb0 [ 15.518100] print_report+0xd1/0x650 [ 15.518122] ? __virt_addr_valid+0x1db/0x2d0 [ 15.518146] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.518168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.518193] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.518216] kasan_report+0x141/0x180 [ 15.518238] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.518267] __asan_report_load4_noabort+0x18/0x20 [ 15.518292] kasan_atomics_helper+0x4a02/0x5450 [ 15.518317] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.518340] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.518366] ? kasan_atomics+0x152/0x310 [ 15.518394] kasan_atomics+0x1dc/0x310 [ 15.518417] ? __pfx_kasan_atomics+0x10/0x10 [ 15.518443] ? __pfx_read_tsc+0x10/0x10 [ 15.518464] ? ktime_get_ts64+0x86/0x230 [ 15.518489] kunit_try_run_case+0x1a5/0x480 [ 15.518519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.518543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.518568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.518593] ? __kthread_parkme+0x82/0x180 [ 15.518614] ? preempt_count_sub+0x50/0x80 [ 15.518641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.518666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.518691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.518718] kthread+0x337/0x6f0 [ 15.518737] ? trace_preempt_on+0x20/0xc0 [ 15.518771] ? __pfx_kthread+0x10/0x10 [ 15.518816] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.518839] ? calculate_sigpending+0x7b/0xa0 [ 15.518865] ? __pfx_kthread+0x10/0x10 [ 15.518907] ret_from_fork+0x116/0x1d0 [ 15.518936] ? __pfx_kthread+0x10/0x10 [ 15.518958] ret_from_fork_asm+0x1a/0x30 [ 15.518992] </TASK> [ 15.519002] [ 15.527431] Allocated by task 282: [ 15.527556] kasan_save_stack+0x45/0x70 [ 15.527694] kasan_save_track+0x18/0x40 [ 15.527877] kasan_save_alloc_info+0x3b/0x50 [ 15.528319] __kasan_kmalloc+0xb7/0xc0 [ 15.528538] __kmalloc_cache_noprof+0x189/0x420 [ 15.528801] kasan_atomics+0x95/0x310 [ 15.529000] kunit_try_run_case+0x1a5/0x480 [ 15.529204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.529458] kthread+0x337/0x6f0 [ 15.529670] ret_from_fork+0x116/0x1d0 [ 15.529907] ret_from_fork_asm+0x1a/0x30 [ 15.530053] [ 15.530150] The buggy address belongs to the object at ffff888102a1a680 [ 15.530150] which belongs to the cache kmalloc-64 of size 64 [ 15.530668] The buggy address is located 0 bytes to the right of [ 15.530668] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.531232] [ 15.531353] The buggy address belongs to the physical page: [ 15.531523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.531763] flags: 0x200000000000000(node=0|zone=2) [ 15.531998] page_type: f5(slab) [ 15.532162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.532502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.532743] page dumped because: kasan: bad access detected [ 15.533034] [ 15.533131] Memory state around the buggy address: [ 15.533344] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.533610] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.533820] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.534034] ^ [ 15.534454] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.534791] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.535158] ================================================================== [ 15.455067] ================================================================== [ 15.455819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.456529] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.457424] [ 15.457641] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.457694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.457707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.457728] Call Trace: [ 15.457745] <TASK> [ 15.457761] dump_stack_lvl+0x73/0xb0 [ 15.457790] print_report+0xd1/0x650 [ 15.457833] ? __virt_addr_valid+0x1db/0x2d0 [ 15.457856] ? kasan_atomics_helper+0x1079/0x5450 [ 15.457879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.457904] ? kasan_atomics_helper+0x1079/0x5450 [ 15.457940] kasan_report+0x141/0x180 [ 15.457963] ? kasan_atomics_helper+0x1079/0x5450 [ 15.457992] kasan_check_range+0x10c/0x1c0 [ 15.458018] __kasan_check_write+0x18/0x20 [ 15.458038] kasan_atomics_helper+0x1079/0x5450 [ 15.458062] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.458086] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.458112] ? kasan_atomics+0x152/0x310 [ 15.458140] kasan_atomics+0x1dc/0x310 [ 15.458163] ? __pfx_kasan_atomics+0x10/0x10 [ 15.458188] ? __pfx_read_tsc+0x10/0x10 [ 15.458210] ? ktime_get_ts64+0x86/0x230 [ 15.458234] kunit_try_run_case+0x1a5/0x480 [ 15.458260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458283] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.458309] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.458334] ? __kthread_parkme+0x82/0x180 [ 15.458355] ? preempt_count_sub+0x50/0x80 [ 15.458380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.458431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.458457] kthread+0x337/0x6f0 [ 15.458476] ? trace_preempt_on+0x20/0xc0 [ 15.458504] ? __pfx_kthread+0x10/0x10 [ 15.458527] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.458549] ? calculate_sigpending+0x7b/0xa0 [ 15.458574] ? __pfx_kthread+0x10/0x10 [ 15.458596] ret_from_fork+0x116/0x1d0 [ 15.458616] ? __pfx_kthread+0x10/0x10 [ 15.458637] ret_from_fork_asm+0x1a/0x30 [ 15.458670] </TASK> [ 15.458681] [ 15.469465] Allocated by task 282: [ 15.469803] kasan_save_stack+0x45/0x70 [ 15.470271] kasan_save_track+0x18/0x40 [ 15.470635] kasan_save_alloc_info+0x3b/0x50 [ 15.471138] __kasan_kmalloc+0xb7/0xc0 [ 15.471570] __kmalloc_cache_noprof+0x189/0x420 [ 15.472031] kasan_atomics+0x95/0x310 [ 15.472384] kunit_try_run_case+0x1a5/0x480 [ 15.472784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.473274] kthread+0x337/0x6f0 [ 15.473456] ret_from_fork+0x116/0x1d0 [ 15.473851] ret_from_fork_asm+0x1a/0x30 [ 15.474072] [ 15.474144] The buggy address belongs to the object at ffff888102a1a680 [ 15.474144] which belongs to the cache kmalloc-64 of size 64 [ 15.474495] The buggy address is located 0 bytes to the right of [ 15.474495] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.474968] [ 15.475087] The buggy address belongs to the physical page: [ 15.475340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.475692] flags: 0x200000000000000(node=0|zone=2) [ 15.475983] page_type: f5(slab) [ 15.476111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.476420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.476756] page dumped because: kasan: bad access detected [ 15.477068] [ 15.477158] Memory state around the buggy address: [ 15.477399] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.477728] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.477965] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.478467] ^ [ 15.478714] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.479054] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.479357] ================================================================== [ 16.006791] ================================================================== [ 16.007107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.007591] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.008135] [ 16.008334] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.008377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.008390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.008411] Call Trace: [ 16.008426] <TASK> [ 16.008442] dump_stack_lvl+0x73/0xb0 [ 16.008472] print_report+0xd1/0x650 [ 16.008496] ? __virt_addr_valid+0x1db/0x2d0 [ 16.008519] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.008542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.008567] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.008590] kasan_report+0x141/0x180 [ 16.008614] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.008642] kasan_check_range+0x10c/0x1c0 [ 16.008667] __kasan_check_write+0x18/0x20 [ 16.008689] kasan_atomics_helper+0x1ce1/0x5450 [ 16.008726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.008761] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.008799] ? kasan_atomics+0x152/0x310 [ 16.008827] kasan_atomics+0x1dc/0x310 [ 16.008851] ? __pfx_kasan_atomics+0x10/0x10 [ 16.008877] ? __pfx_read_tsc+0x10/0x10 [ 16.008899] ? ktime_get_ts64+0x86/0x230 [ 16.008935] kunit_try_run_case+0x1a5/0x480 [ 16.008961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.008985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.009011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.009036] ? __kthread_parkme+0x82/0x180 [ 16.009057] ? preempt_count_sub+0x50/0x80 [ 16.009083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.009108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.009134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.009161] kthread+0x337/0x6f0 [ 16.009180] ? trace_preempt_on+0x20/0xc0 [ 16.009204] ? __pfx_kthread+0x10/0x10 [ 16.009226] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.009249] ? calculate_sigpending+0x7b/0xa0 [ 16.009274] ? __pfx_kthread+0x10/0x10 [ 16.009296] ret_from_fork+0x116/0x1d0 [ 16.009316] ? __pfx_kthread+0x10/0x10 [ 16.009337] ret_from_fork_asm+0x1a/0x30 [ 16.009379] </TASK> [ 16.009390] [ 16.017214] Allocated by task 282: [ 16.017721] kasan_save_stack+0x45/0x70 [ 16.018208] kasan_save_track+0x18/0x40 [ 16.018573] kasan_save_alloc_info+0x3b/0x50 [ 16.019044] __kasan_kmalloc+0xb7/0xc0 [ 16.019394] __kmalloc_cache_noprof+0x189/0x420 [ 16.019828] kasan_atomics+0x95/0x310 [ 16.020187] kunit_try_run_case+0x1a5/0x480 [ 16.020589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.021321] kthread+0x337/0x6f0 [ 16.021693] ret_from_fork+0x116/0x1d0 [ 16.022003] ret_from_fork_asm+0x1a/0x30 [ 16.022145] [ 16.022215] The buggy address belongs to the object at ffff888102a1a680 [ 16.022215] which belongs to the cache kmalloc-64 of size 64 [ 16.022566] The buggy address is located 0 bytes to the right of [ 16.022566] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.022957] [ 16.023029] The buggy address belongs to the physical page: [ 16.023504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.024135] flags: 0x200000000000000(node=0|zone=2) [ 16.024300] page_type: f5(slab) [ 16.024419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.024647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.025131] page dumped because: kasan: bad access detected [ 16.025610] [ 16.025765] Memory state around the buggy address: [ 16.026275] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.026985] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.027603] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.028477] ^ [ 16.028916] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.029633] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.030164] ================================================================== [ 15.402726] ================================================================== [ 15.403562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.404503] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.405321] [ 15.405490] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.405546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.405559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.405580] Call Trace: [ 15.405593] <TASK> [ 15.405608] dump_stack_lvl+0x73/0xb0 [ 15.405636] print_report+0xd1/0x650 [ 15.405660] ? __virt_addr_valid+0x1db/0x2d0 [ 15.405685] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.405707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.405732] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.405783] kasan_report+0x141/0x180 [ 15.405806] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.405845] kasan_check_range+0x10c/0x1c0 [ 15.405870] __kasan_check_write+0x18/0x20 [ 15.405891] kasan_atomics_helper+0xfa9/0x5450 [ 15.405916] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.405949] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.405975] ? kasan_atomics+0x152/0x310 [ 15.406004] kasan_atomics+0x1dc/0x310 [ 15.406027] ? __pfx_kasan_atomics+0x10/0x10 [ 15.406053] ? __pfx_read_tsc+0x10/0x10 [ 15.406075] ? ktime_get_ts64+0x86/0x230 [ 15.406100] kunit_try_run_case+0x1a5/0x480 [ 15.406125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.406149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.406175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.406200] ? __kthread_parkme+0x82/0x180 [ 15.406221] ? preempt_count_sub+0x50/0x80 [ 15.406245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.406271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.406296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.406323] kthread+0x337/0x6f0 [ 15.406342] ? trace_preempt_on+0x20/0xc0 [ 15.406367] ? __pfx_kthread+0x10/0x10 [ 15.406388] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.406411] ? calculate_sigpending+0x7b/0xa0 [ 15.406436] ? __pfx_kthread+0x10/0x10 [ 15.406459] ret_from_fork+0x116/0x1d0 [ 15.406478] ? __pfx_kthread+0x10/0x10 [ 15.406499] ret_from_fork_asm+0x1a/0x30 [ 15.406535] </TASK> [ 15.406546] [ 15.419023] Allocated by task 282: [ 15.419427] kasan_save_stack+0x45/0x70 [ 15.419840] kasan_save_track+0x18/0x40 [ 15.420033] kasan_save_alloc_info+0x3b/0x50 [ 15.420498] __kasan_kmalloc+0xb7/0xc0 [ 15.420784] __kmalloc_cache_noprof+0x189/0x420 [ 15.421105] kasan_atomics+0x95/0x310 [ 15.421243] kunit_try_run_case+0x1a5/0x480 [ 15.421390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.421564] kthread+0x337/0x6f0 [ 15.421685] ret_from_fork+0x116/0x1d0 [ 15.421851] ret_from_fork_asm+0x1a/0x30 [ 15.422002] [ 15.422178] The buggy address belongs to the object at ffff888102a1a680 [ 15.422178] which belongs to the cache kmalloc-64 of size 64 [ 15.422732] The buggy address is located 0 bytes to the right of [ 15.422732] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.423523] [ 15.423655] The buggy address belongs to the physical page: [ 15.423855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.424409] flags: 0x200000000000000(node=0|zone=2) [ 15.424671] page_type: f5(slab) [ 15.424941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.425182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.425496] page dumped because: kasan: bad access detected [ 15.426156] [ 15.426244] Memory state around the buggy address: [ 15.426519] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.427104] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.427421] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.427878] ^ [ 15.428223] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.428647] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429191] ================================================================== [ 14.913580] ================================================================== [ 14.913805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.914356] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.914686] [ 14.914995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.915041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.915054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.915074] Call Trace: [ 14.915090] <TASK> [ 14.915105] dump_stack_lvl+0x73/0xb0 [ 14.915135] print_report+0xd1/0x650 [ 14.915217] ? __virt_addr_valid+0x1db/0x2d0 [ 14.915241] ? kasan_atomics_helper+0x3df/0x5450 [ 14.915264] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.915288] ? kasan_atomics_helper+0x3df/0x5450 [ 14.915311] kasan_report+0x141/0x180 [ 14.915334] ? kasan_atomics_helper+0x3df/0x5450 [ 14.915362] kasan_check_range+0x10c/0x1c0 [ 14.915387] __kasan_check_read+0x15/0x20 [ 14.915406] kasan_atomics_helper+0x3df/0x5450 [ 14.915430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.915454] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.915480] ? kasan_atomics+0x152/0x310 [ 14.915508] kasan_atomics+0x1dc/0x310 [ 14.915531] ? __pfx_kasan_atomics+0x10/0x10 [ 14.915556] ? __pfx_read_tsc+0x10/0x10 [ 14.915579] ? ktime_get_ts64+0x86/0x230 [ 14.915603] kunit_try_run_case+0x1a5/0x480 [ 14.915629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.915653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.915678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.915702] ? __kthread_parkme+0x82/0x180 [ 14.915724] ? preempt_count_sub+0x50/0x80 [ 14.915749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.915775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.915801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.915827] kthread+0x337/0x6f0 [ 14.915847] ? trace_preempt_on+0x20/0xc0 [ 14.915872] ? __pfx_kthread+0x10/0x10 [ 14.915894] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.915916] ? calculate_sigpending+0x7b/0xa0 [ 14.915956] ? __pfx_kthread+0x10/0x10 [ 14.915978] ret_from_fork+0x116/0x1d0 [ 14.915998] ? __pfx_kthread+0x10/0x10 [ 14.916058] ret_from_fork_asm+0x1a/0x30 [ 14.916093] </TASK> [ 14.916104] [ 14.924404] Allocated by task 282: [ 14.924558] kasan_save_stack+0x45/0x70 [ 14.924706] kasan_save_track+0x18/0x40 [ 14.925146] kasan_save_alloc_info+0x3b/0x50 [ 14.925356] __kasan_kmalloc+0xb7/0xc0 [ 14.925538] __kmalloc_cache_noprof+0x189/0x420 [ 14.925713] kasan_atomics+0x95/0x310 [ 14.926019] kunit_try_run_case+0x1a5/0x480 [ 14.926209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.926640] kthread+0x337/0x6f0 [ 14.926770] ret_from_fork+0x116/0x1d0 [ 14.926903] ret_from_fork_asm+0x1a/0x30 [ 14.927057] [ 14.927150] The buggy address belongs to the object at ffff888102a1a680 [ 14.927150] which belongs to the cache kmalloc-64 of size 64 [ 14.927842] The buggy address is located 0 bytes to the right of [ 14.927842] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.928557] [ 14.928634] The buggy address belongs to the physical page: [ 14.928805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.929146] flags: 0x200000000000000(node=0|zone=2) [ 14.929383] page_type: f5(slab) [ 14.929554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.929897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.930285] page dumped because: kasan: bad access detected [ 14.930675] [ 14.930751] Memory state around the buggy address: [ 14.930995] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.931407] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.931626] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.931879] ^ [ 14.932117] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.932487] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.932800] ================================================================== [ 14.933243] ================================================================== [ 14.933672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.934234] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.934660] [ 14.934777] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.934818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.934831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.934851] Call Trace: [ 14.934866] <TASK> [ 14.934882] dump_stack_lvl+0x73/0xb0 [ 14.934913] print_report+0xd1/0x650 [ 14.934953] ? __virt_addr_valid+0x1db/0x2d0 [ 14.934978] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.935001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.935083] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.935108] kasan_report+0x141/0x180 [ 14.935131] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.935159] __asan_report_load4_noabort+0x18/0x20 [ 14.935186] kasan_atomics_helper+0x4b54/0x5450 [ 14.935210] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.935234] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.935261] ? kasan_atomics+0x152/0x310 [ 14.935289] kasan_atomics+0x1dc/0x310 [ 14.935312] ? __pfx_kasan_atomics+0x10/0x10 [ 14.935337] ? __pfx_read_tsc+0x10/0x10 [ 14.935359] ? ktime_get_ts64+0x86/0x230 [ 14.935383] kunit_try_run_case+0x1a5/0x480 [ 14.935409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.935433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.935457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.935482] ? __kthread_parkme+0x82/0x180 [ 14.935504] ? preempt_count_sub+0x50/0x80 [ 14.935529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.935555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.935579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.935605] kthread+0x337/0x6f0 [ 14.935626] ? trace_preempt_on+0x20/0xc0 [ 14.935649] ? __pfx_kthread+0x10/0x10 [ 14.935671] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.935694] ? calculate_sigpending+0x7b/0xa0 [ 14.935719] ? __pfx_kthread+0x10/0x10 [ 14.935741] ret_from_fork+0x116/0x1d0 [ 14.935768] ? __pfx_kthread+0x10/0x10 [ 14.935789] ret_from_fork_asm+0x1a/0x30 [ 14.935822] </TASK> [ 14.935833] [ 14.944178] Allocated by task 282: [ 14.944357] kasan_save_stack+0x45/0x70 [ 14.944530] kasan_save_track+0x18/0x40 [ 14.944670] kasan_save_alloc_info+0x3b/0x50 [ 14.944928] __kasan_kmalloc+0xb7/0xc0 [ 14.945122] __kmalloc_cache_noprof+0x189/0x420 [ 14.945354] kasan_atomics+0x95/0x310 [ 14.945537] kunit_try_run_case+0x1a5/0x480 [ 14.945735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.945950] kthread+0x337/0x6f0 [ 14.946072] ret_from_fork+0x116/0x1d0 [ 14.946384] ret_from_fork_asm+0x1a/0x30 [ 14.946590] [ 14.946687] The buggy address belongs to the object at ffff888102a1a680 [ 14.946687] which belongs to the cache kmalloc-64 of size 64 [ 14.947139] The buggy address is located 0 bytes to the right of [ 14.947139] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.947506] [ 14.947784] The buggy address belongs to the physical page: [ 14.948186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.948518] flags: 0x200000000000000(node=0|zone=2) [ 14.948682] page_type: f5(slab) [ 14.948938] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.949436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.949809] page dumped because: kasan: bad access detected [ 14.950009] [ 14.950080] Memory state around the buggy address: [ 14.950236] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.950856] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.951202] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.951552] ^ [ 14.951708] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.952131] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.952588] ================================================================== [ 15.090893] ================================================================== [ 15.091381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.091815] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.092050] [ 15.092133] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.092174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.092187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.092208] Call Trace: [ 15.092223] <TASK> [ 15.092240] dump_stack_lvl+0x73/0xb0 [ 15.092269] print_report+0xd1/0x650 [ 15.092291] ? __virt_addr_valid+0x1db/0x2d0 [ 15.092315] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.092338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.092373] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.092397] kasan_report+0x141/0x180 [ 15.092420] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.092448] kasan_check_range+0x10c/0x1c0 [ 15.092473] __kasan_check_write+0x18/0x20 [ 15.092493] kasan_atomics_helper+0x7c7/0x5450 [ 15.092517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.092541] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.092568] ? kasan_atomics+0x152/0x310 [ 15.092597] kasan_atomics+0x1dc/0x310 [ 15.092621] ? __pfx_kasan_atomics+0x10/0x10 [ 15.092647] ? __pfx_read_tsc+0x10/0x10 [ 15.092669] ? ktime_get_ts64+0x86/0x230 [ 15.092694] kunit_try_run_case+0x1a5/0x480 [ 15.092719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.092744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.092778] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.092803] ? __kthread_parkme+0x82/0x180 [ 15.092824] ? preempt_count_sub+0x50/0x80 [ 15.092850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.092876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.092901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.092938] kthread+0x337/0x6f0 [ 15.092958] ? trace_preempt_on+0x20/0xc0 [ 15.092981] ? __pfx_kthread+0x10/0x10 [ 15.093003] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.093026] ? calculate_sigpending+0x7b/0xa0 [ 15.093051] ? __pfx_kthread+0x10/0x10 [ 15.093083] ret_from_fork+0x116/0x1d0 [ 15.093103] ? __pfx_kthread+0x10/0x10 [ 15.093124] ret_from_fork_asm+0x1a/0x30 [ 15.093158] </TASK> [ 15.093168] [ 15.100839] Allocated by task 282: [ 15.101026] kasan_save_stack+0x45/0x70 [ 15.101331] kasan_save_track+0x18/0x40 [ 15.101530] kasan_save_alloc_info+0x3b/0x50 [ 15.101740] __kasan_kmalloc+0xb7/0xc0 [ 15.101937] __kmalloc_cache_noprof+0x189/0x420 [ 15.102169] kasan_atomics+0x95/0x310 [ 15.102394] kunit_try_run_case+0x1a5/0x480 [ 15.102581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.102811] kthread+0x337/0x6f0 [ 15.102970] ret_from_fork+0x116/0x1d0 [ 15.103101] ret_from_fork_asm+0x1a/0x30 [ 15.103240] [ 15.103309] The buggy address belongs to the object at ffff888102a1a680 [ 15.103309] which belongs to the cache kmalloc-64 of size 64 [ 15.103654] The buggy address is located 0 bytes to the right of [ 15.103654] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.104941] [ 15.105076] The buggy address belongs to the physical page: [ 15.105292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.105577] flags: 0x200000000000000(node=0|zone=2) [ 15.105804] page_type: f5(slab) [ 15.105941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.106230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.106457] page dumped because: kasan: bad access detected [ 15.106629] [ 15.106698] Memory state around the buggy address: [ 15.106852] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.107194] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.107558] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.107977] ^ [ 15.108195] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.108612] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.108929] ================================================================== [ 14.860992] ================================================================== [ 14.861227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.861468] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.863698] [ 14.864126] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.864173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.864186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.864206] Call Trace: [ 14.864221] <TASK> [ 14.864235] dump_stack_lvl+0x73/0xb0 [ 14.864266] print_report+0xd1/0x650 [ 14.864288] ? __virt_addr_valid+0x1db/0x2d0 [ 14.864311] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.864332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.864355] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.864378] kasan_report+0x141/0x180 [ 14.864400] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.864426] __asan_report_load4_noabort+0x18/0x20 [ 14.864451] kasan_atomics_helper+0x4b88/0x5450 [ 14.864474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.864497] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.864521] ? kasan_atomics+0x152/0x310 [ 14.864548] kasan_atomics+0x1dc/0x310 [ 14.864571] ? __pfx_kasan_atomics+0x10/0x10 [ 14.864594] ? __pfx_read_tsc+0x10/0x10 [ 14.864615] ? ktime_get_ts64+0x86/0x230 [ 14.864639] kunit_try_run_case+0x1a5/0x480 [ 14.864664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.864687] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.864712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.864736] ? __kthread_parkme+0x82/0x180 [ 14.864791] ? preempt_count_sub+0x50/0x80 [ 14.864816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.864841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.864877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.864902] kthread+0x337/0x6f0 [ 14.864931] ? trace_preempt_on+0x20/0xc0 [ 14.864955] ? __pfx_kthread+0x10/0x10 [ 14.864975] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.864997] ? calculate_sigpending+0x7b/0xa0 [ 14.865080] ? __pfx_kthread+0x10/0x10 [ 14.865104] ret_from_fork+0x116/0x1d0 [ 14.865123] ? __pfx_kthread+0x10/0x10 [ 14.865143] ret_from_fork_asm+0x1a/0x30 [ 14.865175] </TASK> [ 14.865185] [ 14.879667] Allocated by task 282: [ 14.879824] kasan_save_stack+0x45/0x70 [ 14.880347] kasan_save_track+0x18/0x40 [ 14.880709] kasan_save_alloc_info+0x3b/0x50 [ 14.881227] __kasan_kmalloc+0xb7/0xc0 [ 14.881587] __kmalloc_cache_noprof+0x189/0x420 [ 14.882075] kasan_atomics+0x95/0x310 [ 14.882434] kunit_try_run_case+0x1a5/0x480 [ 14.882722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.883408] kthread+0x337/0x6f0 [ 14.883562] ret_from_fork+0x116/0x1d0 [ 14.883981] ret_from_fork_asm+0x1a/0x30 [ 14.884330] [ 14.884404] The buggy address belongs to the object at ffff888102a1a680 [ 14.884404] which belongs to the cache kmalloc-64 of size 64 [ 14.884764] The buggy address is located 0 bytes to the right of [ 14.884764] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.885989] [ 14.886147] The buggy address belongs to the physical page: [ 14.886671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.887481] flags: 0x200000000000000(node=0|zone=2) [ 14.888159] page_type: f5(slab) [ 14.888394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.888624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.888966] page dumped because: kasan: bad access detected [ 14.889506] [ 14.889708] Memory state around the buggy address: [ 14.890158] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.891003] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.891781] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.892601] ^ [ 14.892947] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.893549] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.894150] ================================================================== [ 15.736511] ================================================================== [ 15.736822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.737245] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.737546] [ 15.737626] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.737664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.737675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.737696] Call Trace: [ 15.737709] <TASK> [ 15.737722] dump_stack_lvl+0x73/0xb0 [ 15.737750] print_report+0xd1/0x650 [ 15.737773] ? __virt_addr_valid+0x1db/0x2d0 [ 15.737797] ? kasan_atomics_helper+0x151d/0x5450 [ 15.737820] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.737845] ? kasan_atomics_helper+0x151d/0x5450 [ 15.737868] kasan_report+0x141/0x180 [ 15.737892] ? kasan_atomics_helper+0x151d/0x5450 [ 15.737931] kasan_check_range+0x10c/0x1c0 [ 15.737957] __kasan_check_write+0x18/0x20 [ 15.737979] kasan_atomics_helper+0x151d/0x5450 [ 15.738005] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.738031] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.738058] ? kasan_atomics+0x152/0x310 [ 15.738086] kasan_atomics+0x1dc/0x310 [ 15.738110] ? __pfx_kasan_atomics+0x10/0x10 [ 15.738135] ? __pfx_read_tsc+0x10/0x10 [ 15.738157] ? ktime_get_ts64+0x86/0x230 [ 15.738183] kunit_try_run_case+0x1a5/0x480 [ 15.738208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.738232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.738258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.738283] ? __kthread_parkme+0x82/0x180 [ 15.738304] ? preempt_count_sub+0x50/0x80 [ 15.738328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.738354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.738380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.738407] kthread+0x337/0x6f0 [ 15.738426] ? trace_preempt_on+0x20/0xc0 [ 15.738451] ? __pfx_kthread+0x10/0x10 [ 15.738473] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.738495] ? calculate_sigpending+0x7b/0xa0 [ 15.738528] ? __pfx_kthread+0x10/0x10 [ 15.738551] ret_from_fork+0x116/0x1d0 [ 15.738571] ? __pfx_kthread+0x10/0x10 [ 15.738592] ret_from_fork_asm+0x1a/0x30 [ 15.738636] </TASK> [ 15.738646] [ 15.749274] Allocated by task 282: [ 15.749581] kasan_save_stack+0x45/0x70 [ 15.749787] kasan_save_track+0x18/0x40 [ 15.750098] kasan_save_alloc_info+0x3b/0x50 [ 15.750358] __kasan_kmalloc+0xb7/0xc0 [ 15.750608] __kmalloc_cache_noprof+0x189/0x420 [ 15.750917] kasan_atomics+0x95/0x310 [ 15.751087] kunit_try_run_case+0x1a5/0x480 [ 15.751302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.751527] kthread+0x337/0x6f0 [ 15.751686] ret_from_fork+0x116/0x1d0 [ 15.752113] ret_from_fork_asm+0x1a/0x30 [ 15.752386] [ 15.752475] The buggy address belongs to the object at ffff888102a1a680 [ 15.752475] which belongs to the cache kmalloc-64 of size 64 [ 15.753194] The buggy address is located 0 bytes to the right of [ 15.753194] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.753713] [ 15.754000] The buggy address belongs to the physical page: [ 15.754230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.754668] flags: 0x200000000000000(node=0|zone=2) [ 15.755000] page_type: f5(slab) [ 15.755137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.755468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.755994] page dumped because: kasan: bad access detected [ 15.756240] [ 15.756431] Memory state around the buggy address: [ 15.756689] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.757143] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.757457] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.757741] ^ [ 15.758153] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.758519] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.758817] ================================================================== [ 16.142204] ================================================================== [ 16.142550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.142916] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.143283] [ 16.143391] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.143433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.143445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.143465] Call Trace: [ 16.143480] <TASK> [ 16.143496] dump_stack_lvl+0x73/0xb0 [ 16.143524] print_report+0xd1/0x650 [ 16.143546] ? __virt_addr_valid+0x1db/0x2d0 [ 16.143570] ? kasan_atomics_helper+0x2006/0x5450 [ 16.143593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.143617] ? kasan_atomics_helper+0x2006/0x5450 [ 16.143641] kasan_report+0x141/0x180 [ 16.143664] ? kasan_atomics_helper+0x2006/0x5450 [ 16.143693] kasan_check_range+0x10c/0x1c0 [ 16.143719] __kasan_check_write+0x18/0x20 [ 16.143762] kasan_atomics_helper+0x2006/0x5450 [ 16.143786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.143810] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.143836] ? kasan_atomics+0x152/0x310 [ 16.143865] kasan_atomics+0x1dc/0x310 [ 16.143888] ? __pfx_kasan_atomics+0x10/0x10 [ 16.143914] ? __pfx_read_tsc+0x10/0x10 [ 16.143944] ? ktime_get_ts64+0x86/0x230 [ 16.143969] kunit_try_run_case+0x1a5/0x480 [ 16.143994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.144043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.144069] ? __kthread_parkme+0x82/0x180 [ 16.144090] ? preempt_count_sub+0x50/0x80 [ 16.144115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.144167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.144194] kthread+0x337/0x6f0 [ 16.144214] ? trace_preempt_on+0x20/0xc0 [ 16.144238] ? __pfx_kthread+0x10/0x10 [ 16.144260] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.144283] ? calculate_sigpending+0x7b/0xa0 [ 16.144308] ? __pfx_kthread+0x10/0x10 [ 16.144331] ret_from_fork+0x116/0x1d0 [ 16.144351] ? __pfx_kthread+0x10/0x10 [ 16.144373] ret_from_fork_asm+0x1a/0x30 [ 16.144406] </TASK> [ 16.144416] [ 16.151521] Allocated by task 282: [ 16.151694] kasan_save_stack+0x45/0x70 [ 16.151939] kasan_save_track+0x18/0x40 [ 16.152134] kasan_save_alloc_info+0x3b/0x50 [ 16.152333] __kasan_kmalloc+0xb7/0xc0 [ 16.152499] __kmalloc_cache_noprof+0x189/0x420 [ 16.152686] kasan_atomics+0x95/0x310 [ 16.152897] kunit_try_run_case+0x1a5/0x480 [ 16.153056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.153233] kthread+0x337/0x6f0 [ 16.153356] ret_from_fork+0x116/0x1d0 [ 16.153548] ret_from_fork_asm+0x1a/0x30 [ 16.153762] [ 16.153859] The buggy address belongs to the object at ffff888102a1a680 [ 16.153859] which belongs to the cache kmalloc-64 of size 64 [ 16.154407] The buggy address is located 0 bytes to the right of [ 16.154407] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.155000] [ 16.155076] The buggy address belongs to the physical page: [ 16.155273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.155511] flags: 0x200000000000000(node=0|zone=2) [ 16.155671] page_type: f5(slab) [ 16.155813] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.156114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.156449] page dumped because: kasan: bad access detected [ 16.156699] [ 16.156819] Memory state around the buggy address: [ 16.157048] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.157988] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.158340] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.158640] ^ [ 16.160480] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.160712] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.160966] ================================================================== [ 14.837556] ================================================================== [ 14.838448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.839818] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.840108] [ 14.840266] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.840311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.840323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.840343] Call Trace: [ 14.840356] <TASK> [ 14.840553] dump_stack_lvl+0x73/0xb0 [ 14.840591] print_report+0xd1/0x650 [ 14.840614] ? __virt_addr_valid+0x1db/0x2d0 [ 14.840638] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.840660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.840683] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.840726] kasan_report+0x141/0x180 [ 14.840748] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.840981] __asan_report_store4_noabort+0x1b/0x30 [ 14.841008] kasan_atomics_helper+0x4ba2/0x5450 [ 14.841031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.841054] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.841080] ? kasan_atomics+0x152/0x310 [ 14.841106] kasan_atomics+0x1dc/0x310 [ 14.841129] ? __pfx_kasan_atomics+0x10/0x10 [ 14.841153] ? __pfx_read_tsc+0x10/0x10 [ 14.841173] ? ktime_get_ts64+0x86/0x230 [ 14.841237] kunit_try_run_case+0x1a5/0x480 [ 14.841275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.841300] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.841326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.841352] ? __kthread_parkme+0x82/0x180 [ 14.841372] ? preempt_count_sub+0x50/0x80 [ 14.841396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.841420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.841445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.841471] kthread+0x337/0x6f0 [ 14.841490] ? trace_preempt_on+0x20/0xc0 [ 14.841513] ? __pfx_kthread+0x10/0x10 [ 14.841534] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.841556] ? calculate_sigpending+0x7b/0xa0 [ 14.841580] ? __pfx_kthread+0x10/0x10 [ 14.841602] ret_from_fork+0x116/0x1d0 [ 14.841623] ? __pfx_kthread+0x10/0x10 [ 14.841644] ret_from_fork_asm+0x1a/0x30 [ 14.841678] </TASK> [ 14.841688] [ 14.851211] Allocated by task 282: [ 14.851658] kasan_save_stack+0x45/0x70 [ 14.851863] kasan_save_track+0x18/0x40 [ 14.852056] kasan_save_alloc_info+0x3b/0x50 [ 14.852228] __kasan_kmalloc+0xb7/0xc0 [ 14.852383] __kmalloc_cache_noprof+0x189/0x420 [ 14.852558] kasan_atomics+0x95/0x310 [ 14.852711] kunit_try_run_case+0x1a5/0x480 [ 14.852876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.853092] kthread+0x337/0x6f0 [ 14.853243] ret_from_fork+0x116/0x1d0 [ 14.853397] ret_from_fork_asm+0x1a/0x30 [ 14.853554] [ 14.853758] The buggy address belongs to the object at ffff888102a1a680 [ 14.853758] which belongs to the cache kmalloc-64 of size 64 [ 14.854352] The buggy address is located 0 bytes to the right of [ 14.854352] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.854731] [ 14.854804] The buggy address belongs to the physical page: [ 14.855009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.855474] flags: 0x200000000000000(node=0|zone=2) [ 14.855766] page_type: f5(slab) [ 14.855953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.856371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.856777] page dumped because: kasan: bad access detected [ 14.857170] [ 14.857382] Memory state around the buggy address: [ 14.857547] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.857858] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.858092] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.858323] ^ [ 14.858476] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.860304] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.860540] ================================================================== [ 14.816556] ================================================================== [ 14.817415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.817768] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.818352] [ 14.818467] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.818516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.818528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.818547] Call Trace: [ 14.818558] <TASK> [ 14.818574] dump_stack_lvl+0x73/0xb0 [ 14.818603] print_report+0xd1/0x650 [ 14.818626] ? __virt_addr_valid+0x1db/0x2d0 [ 14.818650] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.818671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.818695] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.818718] kasan_report+0x141/0x180 [ 14.818740] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.818767] __asan_report_load4_noabort+0x18/0x20 [ 14.818793] kasan_atomics_helper+0x4bbc/0x5450 [ 14.818816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.818839] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.818866] ? kasan_atomics+0x152/0x310 [ 14.818908] kasan_atomics+0x1dc/0x310 [ 14.818942] ? __pfx_kasan_atomics+0x10/0x10 [ 14.818967] ? __pfx_read_tsc+0x10/0x10 [ 14.818989] ? ktime_get_ts64+0x86/0x230 [ 14.819014] kunit_try_run_case+0x1a5/0x480 [ 14.819039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819062] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.819098] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.819123] ? __kthread_parkme+0x82/0x180 [ 14.819143] ? preempt_count_sub+0x50/0x80 [ 14.819168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.819216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.819242] kthread+0x337/0x6f0 [ 14.819260] ? trace_preempt_on+0x20/0xc0 [ 14.819284] ? __pfx_kthread+0x10/0x10 [ 14.819306] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.819328] ? calculate_sigpending+0x7b/0xa0 [ 14.819352] ? __pfx_kthread+0x10/0x10 [ 14.819374] ret_from_fork+0x116/0x1d0 [ 14.819391] ? __pfx_kthread+0x10/0x10 [ 14.819413] ret_from_fork_asm+0x1a/0x30 [ 14.819444] </TASK> [ 14.819454] [ 14.827182] Allocated by task 282: [ 14.827319] kasan_save_stack+0x45/0x70 [ 14.827474] kasan_save_track+0x18/0x40 [ 14.827663] kasan_save_alloc_info+0x3b/0x50 [ 14.828224] __kasan_kmalloc+0xb7/0xc0 [ 14.828437] __kmalloc_cache_noprof+0x189/0x420 [ 14.828654] kasan_atomics+0x95/0x310 [ 14.828876] kunit_try_run_case+0x1a5/0x480 [ 14.829192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829412] kthread+0x337/0x6f0 [ 14.829556] ret_from_fork+0x116/0x1d0 [ 14.829687] ret_from_fork_asm+0x1a/0x30 [ 14.829854] [ 14.829964] The buggy address belongs to the object at ffff888102a1a680 [ 14.829964] which belongs to the cache kmalloc-64 of size 64 [ 14.830591] The buggy address is located 0 bytes to the right of [ 14.830591] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.831153] [ 14.831251] The buggy address belongs to the physical page: [ 14.831681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.831959] flags: 0x200000000000000(node=0|zone=2) [ 14.832552] page_type: f5(slab) [ 14.832734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.833126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.833421] page dumped because: kasan: bad access detected [ 14.833621] [ 14.833690] Memory state around the buggy address: [ 14.833845] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.834250] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.834587] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.834938] ^ [ 14.835226] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.835485] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.835699] ================================================================== [ 15.021913] ================================================================== [ 15.022568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.023368] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.023873] [ 15.024008] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.024053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.024066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.024087] Call Trace: [ 15.024105] <TASK> [ 15.024121] dump_stack_lvl+0x73/0xb0 [ 15.024151] print_report+0xd1/0x650 [ 15.024173] ? __virt_addr_valid+0x1db/0x2d0 [ 15.024205] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.024229] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.024253] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.024276] kasan_report+0x141/0x180 [ 15.024299] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.024328] kasan_check_range+0x10c/0x1c0 [ 15.024353] __kasan_check_write+0x18/0x20 [ 15.024374] kasan_atomics_helper+0x5fe/0x5450 [ 15.024398] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.024422] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.024448] ? kasan_atomics+0x152/0x310 [ 15.024476] kasan_atomics+0x1dc/0x310 [ 15.024499] ? __pfx_kasan_atomics+0x10/0x10 [ 15.024525] ? __pfx_read_tsc+0x10/0x10 [ 15.024546] ? ktime_get_ts64+0x86/0x230 [ 15.024572] kunit_try_run_case+0x1a5/0x480 [ 15.024597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.024621] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.024646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.024671] ? __kthread_parkme+0x82/0x180 [ 15.024694] ? preempt_count_sub+0x50/0x80 [ 15.024719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.024754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.024780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.024806] kthread+0x337/0x6f0 [ 15.024826] ? trace_preempt_on+0x20/0xc0 [ 15.024850] ? __pfx_kthread+0x10/0x10 [ 15.024871] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.024894] ? calculate_sigpending+0x7b/0xa0 [ 15.024931] ? __pfx_kthread+0x10/0x10 [ 15.024954] ret_from_fork+0x116/0x1d0 [ 15.024972] ? __pfx_kthread+0x10/0x10 [ 15.024994] ret_from_fork_asm+0x1a/0x30 [ 15.025029] </TASK> [ 15.025041] [ 15.033398] Allocated by task 282: [ 15.033558] kasan_save_stack+0x45/0x70 [ 15.033759] kasan_save_track+0x18/0x40 [ 15.033903] kasan_save_alloc_info+0x3b/0x50 [ 15.034063] __kasan_kmalloc+0xb7/0xc0 [ 15.034196] __kmalloc_cache_noprof+0x189/0x420 [ 15.034351] kasan_atomics+0x95/0x310 [ 15.034562] kunit_try_run_case+0x1a5/0x480 [ 15.034794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.035112] kthread+0x337/0x6f0 [ 15.035283] ret_from_fork+0x116/0x1d0 [ 15.035474] ret_from_fork_asm+0x1a/0x30 [ 15.035737] [ 15.035882] The buggy address belongs to the object at ffff888102a1a680 [ 15.035882] which belongs to the cache kmalloc-64 of size 64 [ 15.036691] The buggy address is located 0 bytes to the right of [ 15.036691] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.037763] [ 15.038649] The buggy address belongs to the physical page: [ 15.039391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.039956] flags: 0x200000000000000(node=0|zone=2) [ 15.040140] page_type: f5(slab) [ 15.040265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.040497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.040731] page dumped because: kasan: bad access detected [ 15.040905] [ 15.041869] Memory state around the buggy address: [ 15.042583] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.043530] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.044320] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.044649] ^ [ 15.044952] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.045375] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.045780] ================================================================== [ 15.243946] ================================================================== [ 15.244368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.244719] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.245037] [ 15.245195] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.245250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.245263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.245282] Call Trace: [ 15.245297] <TASK> [ 15.245401] dump_stack_lvl+0x73/0xb0 [ 15.245432] print_report+0xd1/0x650 [ 15.245455] ? __virt_addr_valid+0x1db/0x2d0 [ 15.245479] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.245501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.245526] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.245549] kasan_report+0x141/0x180 [ 15.245572] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.245599] kasan_check_range+0x10c/0x1c0 [ 15.245625] __kasan_check_write+0x18/0x20 [ 15.245678] kasan_atomics_helper+0xb6a/0x5450 [ 15.245703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.245738] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.245772] ? kasan_atomics+0x152/0x310 [ 15.245799] kasan_atomics+0x1dc/0x310 [ 15.245824] ? __pfx_kasan_atomics+0x10/0x10 [ 15.245849] ? __pfx_read_tsc+0x10/0x10 [ 15.245871] ? ktime_get_ts64+0x86/0x230 [ 15.245897] kunit_try_run_case+0x1a5/0x480 [ 15.245964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.245988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.246047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.246072] ? __kthread_parkme+0x82/0x180 [ 15.246104] ? preempt_count_sub+0x50/0x80 [ 15.246269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.246303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.246329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.246355] kthread+0x337/0x6f0 [ 15.246378] ? trace_preempt_on+0x20/0xc0 [ 15.246402] ? __pfx_kthread+0x10/0x10 [ 15.246423] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.246446] ? calculate_sigpending+0x7b/0xa0 [ 15.246472] ? __pfx_kthread+0x10/0x10 [ 15.246494] ret_from_fork+0x116/0x1d0 [ 15.246523] ? __pfx_kthread+0x10/0x10 [ 15.246546] ret_from_fork_asm+0x1a/0x30 [ 15.246579] </TASK> [ 15.246590] [ 15.255706] Allocated by task 282: [ 15.255842] kasan_save_stack+0x45/0x70 [ 15.256097] kasan_save_track+0x18/0x40 [ 15.256295] kasan_save_alloc_info+0x3b/0x50 [ 15.256509] __kasan_kmalloc+0xb7/0xc0 [ 15.256702] __kmalloc_cache_noprof+0x189/0x420 [ 15.256997] kasan_atomics+0x95/0x310 [ 15.257183] kunit_try_run_case+0x1a5/0x480 [ 15.257508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257723] kthread+0x337/0x6f0 [ 15.257905] ret_from_fork+0x116/0x1d0 [ 15.258350] ret_from_fork_asm+0x1a/0x30 [ 15.258558] [ 15.258674] The buggy address belongs to the object at ffff888102a1a680 [ 15.258674] which belongs to the cache kmalloc-64 of size 64 [ 15.259149] The buggy address is located 0 bytes to the right of [ 15.259149] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.259827] [ 15.259972] The buggy address belongs to the physical page: [ 15.260167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.260732] flags: 0x200000000000000(node=0|zone=2) [ 15.260908] page_type: f5(slab) [ 15.261046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.261474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.261853] page dumped because: kasan: bad access detected [ 15.262348] [ 15.262452] Memory state around the buggy address: [ 15.262633] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.263121] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.263391] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.263679] ^ [ 15.264488] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.264947] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.265475] ================================================================== [ 15.565374] ================================================================== [ 15.566226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.566846] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.567085] [ 15.567171] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.567213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.567226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.567247] Call Trace: [ 15.567263] <TASK> [ 15.567279] dump_stack_lvl+0x73/0xb0 [ 15.567307] print_report+0xd1/0x650 [ 15.567331] ? __virt_addr_valid+0x1db/0x2d0 [ 15.567355] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.567378] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.567403] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.567427] kasan_report+0x141/0x180 [ 15.567450] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.567479] __asan_report_load4_noabort+0x18/0x20 [ 15.567505] kasan_atomics_helper+0x49e8/0x5450 [ 15.567529] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.567554] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.567579] ? kasan_atomics+0x152/0x310 [ 15.567607] kasan_atomics+0x1dc/0x310 [ 15.567631] ? __pfx_kasan_atomics+0x10/0x10 [ 15.567657] ? __pfx_read_tsc+0x10/0x10 [ 15.567678] ? ktime_get_ts64+0x86/0x230 [ 15.567704] kunit_try_run_case+0x1a5/0x480 [ 15.567728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.567801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.567853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.567950] ? __kthread_parkme+0x82/0x180 [ 15.567972] ? preempt_count_sub+0x50/0x80 [ 15.568007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.568033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.568060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.568087] kthread+0x337/0x6f0 [ 15.568107] ? trace_preempt_on+0x20/0xc0 [ 15.568131] ? __pfx_kthread+0x10/0x10 [ 15.568153] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.568176] ? calculate_sigpending+0x7b/0xa0 [ 15.568200] ? __pfx_kthread+0x10/0x10 [ 15.568223] ret_from_fork+0x116/0x1d0 [ 15.568241] ? __pfx_kthread+0x10/0x10 [ 15.568264] ret_from_fork_asm+0x1a/0x30 [ 15.568297] </TASK> [ 15.568307] [ 15.580277] Allocated by task 282: [ 15.580443] kasan_save_stack+0x45/0x70 [ 15.580644] kasan_save_track+0x18/0x40 [ 15.581659] kasan_save_alloc_info+0x3b/0x50 [ 15.581852] __kasan_kmalloc+0xb7/0xc0 [ 15.582162] __kmalloc_cache_noprof+0x189/0x420 [ 15.582398] kasan_atomics+0x95/0x310 [ 15.582583] kunit_try_run_case+0x1a5/0x480 [ 15.583110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.583360] kthread+0x337/0x6f0 [ 15.583538] ret_from_fork+0x116/0x1d0 [ 15.583914] ret_from_fork_asm+0x1a/0x30 [ 15.584216] [ 15.584423] The buggy address belongs to the object at ffff888102a1a680 [ 15.584423] which belongs to the cache kmalloc-64 of size 64 [ 15.585141] The buggy address is located 0 bytes to the right of [ 15.585141] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.585821] [ 15.586035] The buggy address belongs to the physical page: [ 15.586397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.586853] flags: 0x200000000000000(node=0|zone=2) [ 15.587072] page_type: f5(slab) [ 15.587247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.587574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.588157] page dumped because: kasan: bad access detected [ 15.588468] [ 15.588543] Memory state around the buggy address: [ 15.589072] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.589505] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.589977] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.590385] ^ [ 15.590694] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591136] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591437] ================================================================== [ 15.047033] ================================================================== [ 15.047414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.048067] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.048489] [ 15.048749] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.048796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.048808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.048829] Call Trace: [ 15.048846] <TASK> [ 15.048861] dump_stack_lvl+0x73/0xb0 [ 15.048893] print_report+0xd1/0x650 [ 15.048916] ? __virt_addr_valid+0x1db/0x2d0 [ 15.049032] ? kasan_atomics_helper+0x697/0x5450 [ 15.049055] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.049080] ? kasan_atomics_helper+0x697/0x5450 [ 15.049103] kasan_report+0x141/0x180 [ 15.049127] ? kasan_atomics_helper+0x697/0x5450 [ 15.049156] kasan_check_range+0x10c/0x1c0 [ 15.049181] __kasan_check_write+0x18/0x20 [ 15.049202] kasan_atomics_helper+0x697/0x5450 [ 15.049226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.049250] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.049276] ? kasan_atomics+0x152/0x310 [ 15.049321] kasan_atomics+0x1dc/0x310 [ 15.049345] ? __pfx_kasan_atomics+0x10/0x10 [ 15.049371] ? __pfx_read_tsc+0x10/0x10 [ 15.049392] ? ktime_get_ts64+0x86/0x230 [ 15.049417] kunit_try_run_case+0x1a5/0x480 [ 15.049442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.049491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.049516] ? __kthread_parkme+0x82/0x180 [ 15.049537] ? preempt_count_sub+0x50/0x80 [ 15.049562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.049639] kthread+0x337/0x6f0 [ 15.049659] ? trace_preempt_on+0x20/0xc0 [ 15.049683] ? __pfx_kthread+0x10/0x10 [ 15.049705] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.049727] ? calculate_sigpending+0x7b/0xa0 [ 15.049760] ? __pfx_kthread+0x10/0x10 [ 15.049783] ret_from_fork+0x116/0x1d0 [ 15.049802] ? __pfx_kthread+0x10/0x10 [ 15.049823] ret_from_fork_asm+0x1a/0x30 [ 15.049858] </TASK> [ 15.049868] [ 15.060395] Allocated by task 282: [ 15.060549] kasan_save_stack+0x45/0x70 [ 15.060791] kasan_save_track+0x18/0x40 [ 15.061325] kasan_save_alloc_info+0x3b/0x50 [ 15.061525] __kasan_kmalloc+0xb7/0xc0 [ 15.061711] __kmalloc_cache_noprof+0x189/0x420 [ 15.062021] kasan_atomics+0x95/0x310 [ 15.062356] kunit_try_run_case+0x1a5/0x480 [ 15.062612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.063019] kthread+0x337/0x6f0 [ 15.063196] ret_from_fork+0x116/0x1d0 [ 15.063366] ret_from_fork_asm+0x1a/0x30 [ 15.063700] [ 15.063851] The buggy address belongs to the object at ffff888102a1a680 [ 15.063851] which belongs to the cache kmalloc-64 of size 64 [ 15.064559] The buggy address is located 0 bytes to the right of [ 15.064559] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.065357] [ 15.065480] The buggy address belongs to the physical page: [ 15.065724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.066112] flags: 0x200000000000000(node=0|zone=2) [ 15.066531] page_type: f5(slab) [ 15.066691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.067251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.067577] page dumped because: kasan: bad access detected [ 15.067941] [ 15.068017] Memory state around the buggy address: [ 15.068388] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.068839] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.069142] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.069584] ^ [ 15.069818] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.070222] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.070672] ================================================================== [ 15.638659] ================================================================== [ 15.639117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.639633] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.640472] [ 15.640583] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.640626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.640640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.640661] Call Trace: [ 15.640699] <TASK> [ 15.640731] dump_stack_lvl+0x73/0xb0 [ 15.640762] print_report+0xd1/0x650 [ 15.640799] ? __virt_addr_valid+0x1db/0x2d0 [ 15.640836] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.640858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.640897] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.640950] kasan_report+0x141/0x180 [ 15.640974] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.641014] kasan_check_range+0x10c/0x1c0 [ 15.641038] __kasan_check_read+0x15/0x20 [ 15.641059] kasan_atomics_helper+0x13b5/0x5450 [ 15.641407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.641437] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.641464] ? kasan_atomics+0x152/0x310 [ 15.641492] kasan_atomics+0x1dc/0x310 [ 15.641515] ? __pfx_kasan_atomics+0x10/0x10 [ 15.641541] ? __pfx_read_tsc+0x10/0x10 [ 15.641562] ? ktime_get_ts64+0x86/0x230 [ 15.641587] kunit_try_run_case+0x1a5/0x480 [ 15.641611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.641636] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.641660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.641685] ? __kthread_parkme+0x82/0x180 [ 15.641706] ? preempt_count_sub+0x50/0x80 [ 15.641731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.641756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.641782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.641808] kthread+0x337/0x6f0 [ 15.641828] ? trace_preempt_on+0x20/0xc0 [ 15.642779] ? __pfx_kthread+0x10/0x10 [ 15.642820] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.642846] ? calculate_sigpending+0x7b/0xa0 [ 15.642871] ? __pfx_kthread+0x10/0x10 [ 15.642895] ret_from_fork+0x116/0x1d0 [ 15.642916] ? __pfx_kthread+0x10/0x10 [ 15.642954] ret_from_fork_asm+0x1a/0x30 [ 15.642992] </TASK> [ 15.643004] [ 15.658281] Allocated by task 282: [ 15.658555] kasan_save_stack+0x45/0x70 [ 15.658871] kasan_save_track+0x18/0x40 [ 15.659112] kasan_save_alloc_info+0x3b/0x50 [ 15.659464] __kasan_kmalloc+0xb7/0xc0 [ 15.659600] __kmalloc_cache_noprof+0x189/0x420 [ 15.659784] kasan_atomics+0x95/0x310 [ 15.660146] kunit_try_run_case+0x1a5/0x480 [ 15.660546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661094] kthread+0x337/0x6f0 [ 15.661411] ret_from_fork+0x116/0x1d0 [ 15.661752] ret_from_fork_asm+0x1a/0x30 [ 15.662129] [ 15.662204] The buggy address belongs to the object at ffff888102a1a680 [ 15.662204] which belongs to the cache kmalloc-64 of size 64 [ 15.662566] The buggy address is located 0 bytes to the right of [ 15.662566] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.663359] [ 15.663532] The buggy address belongs to the physical page: [ 15.664089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.664765] flags: 0x200000000000000(node=0|zone=2) [ 15.665213] page_type: f5(slab) [ 15.665505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.666258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.667015] page dumped because: kasan: bad access detected [ 15.667195] [ 15.667265] Memory state around the buggy address: [ 15.667422] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667638] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.668084] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.668695] ^ [ 15.669193] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.669813] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.670420] ================================================================== [ 15.267816] ================================================================== [ 15.268559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.269235] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.269758] [ 15.269988] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.270074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.270223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.270250] Call Trace: [ 15.270266] <TASK> [ 15.270295] dump_stack_lvl+0x73/0xb0 [ 15.270360] print_report+0xd1/0x650 [ 15.270386] ? __virt_addr_valid+0x1db/0x2d0 [ 15.270412] ? kasan_atomics_helper+0xc70/0x5450 [ 15.270436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.270462] ? kasan_atomics_helper+0xc70/0x5450 [ 15.270486] kasan_report+0x141/0x180 [ 15.270520] ? kasan_atomics_helper+0xc70/0x5450 [ 15.270548] kasan_check_range+0x10c/0x1c0 [ 15.270573] __kasan_check_write+0x18/0x20 [ 15.270592] kasan_atomics_helper+0xc70/0x5450 [ 15.270617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.270640] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.270666] ? kasan_atomics+0x152/0x310 [ 15.270695] kasan_atomics+0x1dc/0x310 [ 15.270719] ? __pfx_kasan_atomics+0x10/0x10 [ 15.270744] ? __pfx_read_tsc+0x10/0x10 [ 15.270777] ? ktime_get_ts64+0x86/0x230 [ 15.270802] kunit_try_run_case+0x1a5/0x480 [ 15.270828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.270852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.270877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.270901] ? __kthread_parkme+0x82/0x180 [ 15.270934] ? preempt_count_sub+0x50/0x80 [ 15.270961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.270986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.271013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.271039] kthread+0x337/0x6f0 [ 15.271059] ? trace_preempt_on+0x20/0xc0 [ 15.271082] ? __pfx_kthread+0x10/0x10 [ 15.271104] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.271126] ? calculate_sigpending+0x7b/0xa0 [ 15.271152] ? __pfx_kthread+0x10/0x10 [ 15.271174] ret_from_fork+0x116/0x1d0 [ 15.271193] ? __pfx_kthread+0x10/0x10 [ 15.271214] ret_from_fork_asm+0x1a/0x30 [ 15.271247] </TASK> [ 15.271258] [ 15.282620] Allocated by task 282: [ 15.283109] kasan_save_stack+0x45/0x70 [ 15.283382] kasan_save_track+0x18/0x40 [ 15.283799] kasan_save_alloc_info+0x3b/0x50 [ 15.284035] __kasan_kmalloc+0xb7/0xc0 [ 15.284210] __kmalloc_cache_noprof+0x189/0x420 [ 15.284415] kasan_atomics+0x95/0x310 [ 15.284590] kunit_try_run_case+0x1a5/0x480 [ 15.285081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.285369] kthread+0x337/0x6f0 [ 15.285762] ret_from_fork+0x116/0x1d0 [ 15.285981] ret_from_fork_asm+0x1a/0x30 [ 15.286168] [ 15.286259] The buggy address belongs to the object at ffff888102a1a680 [ 15.286259] which belongs to the cache kmalloc-64 of size 64 [ 15.286744] The buggy address is located 0 bytes to the right of [ 15.286744] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.287669] [ 15.287992] The buggy address belongs to the physical page: [ 15.288312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.288639] flags: 0x200000000000000(node=0|zone=2) [ 15.289187] page_type: f5(slab) [ 15.289366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.289680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.290459] page dumped because: kasan: bad access detected [ 15.290769] [ 15.291101] Memory state around the buggy address: [ 15.291462] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.292298] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.292857] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.293170] ^ [ 15.293382] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.293671] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.294267] ================================================================== [ 15.376050] ================================================================== [ 15.377076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.377331] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.377551] [ 15.377638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.377682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.377695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.377716] Call Trace: [ 15.378137] <TASK> [ 15.378159] dump_stack_lvl+0x73/0xb0 [ 15.378190] print_report+0xd1/0x650 [ 15.378214] ? __virt_addr_valid+0x1db/0x2d0 [ 15.378238] ? kasan_atomics_helper+0xf10/0x5450 [ 15.378261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.378287] ? kasan_atomics_helper+0xf10/0x5450 [ 15.378310] kasan_report+0x141/0x180 [ 15.378333] ? kasan_atomics_helper+0xf10/0x5450 [ 15.378362] kasan_check_range+0x10c/0x1c0 [ 15.378437] __kasan_check_write+0x18/0x20 [ 15.378779] kasan_atomics_helper+0xf10/0x5450 [ 15.378813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.378838] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.378864] ? kasan_atomics+0x152/0x310 [ 15.378893] kasan_atomics+0x1dc/0x310 [ 15.378917] ? __pfx_kasan_atomics+0x10/0x10 [ 15.378953] ? __pfx_read_tsc+0x10/0x10 [ 15.378974] ? ktime_get_ts64+0x86/0x230 [ 15.378999] kunit_try_run_case+0x1a5/0x480 [ 15.379024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.379048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.379073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.379098] ? __kthread_parkme+0x82/0x180 [ 15.379119] ? preempt_count_sub+0x50/0x80 [ 15.379144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.379170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.379195] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.379222] kthread+0x337/0x6f0 [ 15.379241] ? trace_preempt_on+0x20/0xc0 [ 15.379265] ? __pfx_kthread+0x10/0x10 [ 15.379287] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.379311] ? calculate_sigpending+0x7b/0xa0 [ 15.379336] ? __pfx_kthread+0x10/0x10 [ 15.379359] ret_from_fork+0x116/0x1d0 [ 15.379378] ? __pfx_kthread+0x10/0x10 [ 15.379400] ret_from_fork_asm+0x1a/0x30 [ 15.379433] </TASK> [ 15.379444] [ 15.388994] Allocated by task 282: [ 15.389187] kasan_save_stack+0x45/0x70 [ 15.389400] kasan_save_track+0x18/0x40 [ 15.389599] kasan_save_alloc_info+0x3b/0x50 [ 15.389875] __kasan_kmalloc+0xb7/0xc0 [ 15.391074] __kmalloc_cache_noprof+0x189/0x420 [ 15.391558] kasan_atomics+0x95/0x310 [ 15.391708] kunit_try_run_case+0x1a5/0x480 [ 15.391867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.392136] kthread+0x337/0x6f0 [ 15.392470] ret_from_fork+0x116/0x1d0 [ 15.392878] ret_from_fork_asm+0x1a/0x30 [ 15.393335] [ 15.393496] The buggy address belongs to the object at ffff888102a1a680 [ 15.393496] which belongs to the cache kmalloc-64 of size 64 [ 15.394716] The buggy address is located 0 bytes to the right of [ 15.394716] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.395850] [ 15.396044] The buggy address belongs to the physical page: [ 15.396562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.397265] flags: 0x200000000000000(node=0|zone=2) [ 15.397723] page_type: f5(slab) [ 15.398080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.398672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.399272] page dumped because: kasan: bad access detected [ 15.399700] [ 15.399772] Memory state around the buggy address: [ 15.400239] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.400704] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.400977] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.401189] ^ [ 15.401344] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.401560] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.401834] ================================================================== [ 15.821256] ================================================================== [ 15.821828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.823329] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.823687] [ 15.823771] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.823812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.823824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.823845] Call Trace: [ 15.823858] <TASK> [ 15.823871] dump_stack_lvl+0x73/0xb0 [ 15.823901] print_report+0xd1/0x650 [ 15.823935] ? __virt_addr_valid+0x1db/0x2d0 [ 15.823959] ? kasan_atomics_helper+0x177f/0x5450 [ 15.823982] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.824007] ? kasan_atomics_helper+0x177f/0x5450 [ 15.824030] kasan_report+0x141/0x180 [ 15.824053] ? kasan_atomics_helper+0x177f/0x5450 [ 15.824082] kasan_check_range+0x10c/0x1c0 [ 15.824106] __kasan_check_write+0x18/0x20 [ 15.824127] kasan_atomics_helper+0x177f/0x5450 [ 15.824151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.824175] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.824201] ? kasan_atomics+0x152/0x310 [ 15.824229] kasan_atomics+0x1dc/0x310 [ 15.824252] ? __pfx_kasan_atomics+0x10/0x10 [ 15.824300] ? __pfx_read_tsc+0x10/0x10 [ 15.824322] ? ktime_get_ts64+0x86/0x230 [ 15.824348] kunit_try_run_case+0x1a5/0x480 [ 15.824373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.824398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.824429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.824454] ? __kthread_parkme+0x82/0x180 [ 15.824475] ? preempt_count_sub+0x50/0x80 [ 15.824500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.824526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.824551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.824578] kthread+0x337/0x6f0 [ 15.824597] ? trace_preempt_on+0x20/0xc0 [ 15.824632] ? __pfx_kthread+0x10/0x10 [ 15.824653] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.824676] ? calculate_sigpending+0x7b/0xa0 [ 15.824713] ? __pfx_kthread+0x10/0x10 [ 15.824735] ret_from_fork+0x116/0x1d0 [ 15.824755] ? __pfx_kthread+0x10/0x10 [ 15.824777] ret_from_fork_asm+0x1a/0x30 [ 15.824810] </TASK> [ 15.824820] [ 15.836352] Allocated by task 282: [ 15.836705] kasan_save_stack+0x45/0x70 [ 15.836939] kasan_save_track+0x18/0x40 [ 15.837140] kasan_save_alloc_info+0x3b/0x50 [ 15.837344] __kasan_kmalloc+0xb7/0xc0 [ 15.837523] __kmalloc_cache_noprof+0x189/0x420 [ 15.837736] kasan_atomics+0x95/0x310 [ 15.838282] kunit_try_run_case+0x1a5/0x480 [ 15.838514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.838887] kthread+0x337/0x6f0 [ 15.839046] ret_from_fork+0x116/0x1d0 [ 15.839365] ret_from_fork_asm+0x1a/0x30 [ 15.839642] [ 15.839743] The buggy address belongs to the object at ffff888102a1a680 [ 15.839743] which belongs to the cache kmalloc-64 of size 64 [ 15.840429] The buggy address is located 0 bytes to the right of [ 15.840429] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.841299] [ 15.841408] The buggy address belongs to the physical page: [ 15.841654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.842151] flags: 0x200000000000000(node=0|zone=2) [ 15.842458] page_type: f5(slab) [ 15.842595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.843222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.843622] page dumped because: kasan: bad access detected [ 15.844064] [ 15.844165] Memory state around the buggy address: [ 15.844375] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.844684] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.845143] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.845527] ^ [ 15.845744] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.846211] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.846582] ================================================================== [ 14.894531] ================================================================== [ 14.894761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.895081] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.895375] [ 14.895456] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.895496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.895508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.895527] Call Trace: [ 14.895542] <TASK> [ 14.895556] dump_stack_lvl+0x73/0xb0 [ 14.895584] print_report+0xd1/0x650 [ 14.895605] ? __virt_addr_valid+0x1db/0x2d0 [ 14.895628] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.895650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.895673] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.895695] kasan_report+0x141/0x180 [ 14.895881] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.895912] __asan_report_store4_noabort+0x1b/0x30 [ 14.895972] kasan_atomics_helper+0x4b6e/0x5450 [ 14.895997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.896021] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.896196] ? kasan_atomics+0x152/0x310 [ 14.896230] kasan_atomics+0x1dc/0x310 [ 14.896253] ? __pfx_kasan_atomics+0x10/0x10 [ 14.896279] ? __pfx_read_tsc+0x10/0x10 [ 14.896301] ? ktime_get_ts64+0x86/0x230 [ 14.896327] kunit_try_run_case+0x1a5/0x480 [ 14.896352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.896376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.896402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.896426] ? __kthread_parkme+0x82/0x180 [ 14.896448] ? preempt_count_sub+0x50/0x80 [ 14.896473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.896499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.896524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.896551] kthread+0x337/0x6f0 [ 14.896571] ? trace_preempt_on+0x20/0xc0 [ 14.896596] ? __pfx_kthread+0x10/0x10 [ 14.896617] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.896640] ? calculate_sigpending+0x7b/0xa0 [ 14.896665] ? __pfx_kthread+0x10/0x10 [ 14.896687] ret_from_fork+0x116/0x1d0 [ 14.896706] ? __pfx_kthread+0x10/0x10 [ 14.896728] ret_from_fork_asm+0x1a/0x30 [ 14.896761] </TASK> [ 14.896772] [ 14.905046] Allocated by task 282: [ 14.905236] kasan_save_stack+0x45/0x70 [ 14.905442] kasan_save_track+0x18/0x40 [ 14.905638] kasan_save_alloc_info+0x3b/0x50 [ 14.905827] __kasan_kmalloc+0xb7/0xc0 [ 14.906128] __kmalloc_cache_noprof+0x189/0x420 [ 14.906320] kasan_atomics+0x95/0x310 [ 14.906459] kunit_try_run_case+0x1a5/0x480 [ 14.906672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.907081] kthread+0x337/0x6f0 [ 14.907242] ret_from_fork+0x116/0x1d0 [ 14.907419] ret_from_fork_asm+0x1a/0x30 [ 14.907590] [ 14.907661] The buggy address belongs to the object at ffff888102a1a680 [ 14.907661] which belongs to the cache kmalloc-64 of size 64 [ 14.908213] The buggy address is located 0 bytes to the right of [ 14.908213] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.908598] [ 14.908708] The buggy address belongs to the physical page: [ 14.909279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.909648] flags: 0x200000000000000(node=0|zone=2) [ 14.909885] page_type: f5(slab) [ 14.910070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.910429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.910754] page dumped because: kasan: bad access detected [ 14.910937] [ 14.911008] Memory state around the buggy address: [ 14.911164] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.911489] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.911951] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.912344] ^ [ 14.912519] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912744] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.913140] ================================================================== [ 15.313621] ================================================================== [ 15.314299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.314660] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.314900] [ 15.315121] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.315163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.315175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.315207] Call Trace: [ 15.315221] <TASK> [ 15.315237] dump_stack_lvl+0x73/0xb0 [ 15.315265] print_report+0xd1/0x650 [ 15.315301] ? __virt_addr_valid+0x1db/0x2d0 [ 15.315325] ? kasan_atomics_helper+0xd47/0x5450 [ 15.315348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.315372] ? kasan_atomics_helper+0xd47/0x5450 [ 15.315396] kasan_report+0x141/0x180 [ 15.315419] ? kasan_atomics_helper+0xd47/0x5450 [ 15.315448] kasan_check_range+0x10c/0x1c0 [ 15.315474] __kasan_check_write+0x18/0x20 [ 15.315495] kasan_atomics_helper+0xd47/0x5450 [ 15.315519] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.315552] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.315578] ? kasan_atomics+0x152/0x310 [ 15.315606] kasan_atomics+0x1dc/0x310 [ 15.315640] ? __pfx_kasan_atomics+0x10/0x10 [ 15.315666] ? __pfx_read_tsc+0x10/0x10 [ 15.315688] ? ktime_get_ts64+0x86/0x230 [ 15.315714] kunit_try_run_case+0x1a5/0x480 [ 15.315752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.315776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.315802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.315849] ? __kthread_parkme+0x82/0x180 [ 15.315870] ? preempt_count_sub+0x50/0x80 [ 15.315896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.315931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.315956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.315984] kthread+0x337/0x6f0 [ 15.316004] ? trace_preempt_on+0x20/0xc0 [ 15.316030] ? __pfx_kthread+0x10/0x10 [ 15.316051] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.316073] ? calculate_sigpending+0x7b/0xa0 [ 15.316099] ? __pfx_kthread+0x10/0x10 [ 15.316121] ret_from_fork+0x116/0x1d0 [ 15.316140] ? __pfx_kthread+0x10/0x10 [ 15.316171] ret_from_fork_asm+0x1a/0x30 [ 15.316204] </TASK> [ 15.316215] [ 15.324166] Allocated by task 282: [ 15.324357] kasan_save_stack+0x45/0x70 [ 15.324524] kasan_save_track+0x18/0x40 [ 15.324743] kasan_save_alloc_info+0x3b/0x50 [ 15.324907] __kasan_kmalloc+0xb7/0xc0 [ 15.325053] __kmalloc_cache_noprof+0x189/0x420 [ 15.325212] kasan_atomics+0x95/0x310 [ 15.325421] kunit_try_run_case+0x1a5/0x480 [ 15.325634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.325882] kthread+0x337/0x6f0 [ 15.326130] ret_from_fork+0x116/0x1d0 [ 15.326345] ret_from_fork_asm+0x1a/0x30 [ 15.326492] [ 15.326570] The buggy address belongs to the object at ffff888102a1a680 [ 15.326570] which belongs to the cache kmalloc-64 of size 64 [ 15.327370] The buggy address is located 0 bytes to the right of [ 15.327370] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.327930] [ 15.328016] The buggy address belongs to the physical page: [ 15.328263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.328613] flags: 0x200000000000000(node=0|zone=2) [ 15.328864] page_type: f5(slab) [ 15.329038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.329353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.329627] page dumped because: kasan: bad access detected [ 15.329799] [ 15.329869] Memory state around the buggy address: [ 15.330034] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.330249] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.330600] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.331233] ^ [ 15.331461] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.331773] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.332100] ================================================================== [ 15.071270] ================================================================== [ 15.071614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.072296] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.072670] [ 15.072891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.072947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.072961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.072981] Call Trace: [ 15.072995] <TASK> [ 15.073010] dump_stack_lvl+0x73/0xb0 [ 15.073041] print_report+0xd1/0x650 [ 15.073064] ? __virt_addr_valid+0x1db/0x2d0 [ 15.073089] ? kasan_atomics_helper+0x72f/0x5450 [ 15.073111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.073136] ? kasan_atomics_helper+0x72f/0x5450 [ 15.073160] kasan_report+0x141/0x180 [ 15.073183] ? kasan_atomics_helper+0x72f/0x5450 [ 15.073211] kasan_check_range+0x10c/0x1c0 [ 15.073236] __kasan_check_write+0x18/0x20 [ 15.073257] kasan_atomics_helper+0x72f/0x5450 [ 15.073281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.073305] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.073331] ? kasan_atomics+0x152/0x310 [ 15.073360] kasan_atomics+0x1dc/0x310 [ 15.073383] ? __pfx_kasan_atomics+0x10/0x10 [ 15.073408] ? __pfx_read_tsc+0x10/0x10 [ 15.073431] ? ktime_get_ts64+0x86/0x230 [ 15.073456] kunit_try_run_case+0x1a5/0x480 [ 15.073482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.073506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.073530] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.073556] ? __kthread_parkme+0x82/0x180 [ 15.073576] ? preempt_count_sub+0x50/0x80 [ 15.073600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.073626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.073653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.073679] kthread+0x337/0x6f0 [ 15.073698] ? trace_preempt_on+0x20/0xc0 [ 15.073724] ? __pfx_kthread+0x10/0x10 [ 15.073745] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.073783] ? calculate_sigpending+0x7b/0xa0 [ 15.073808] ? __pfx_kthread+0x10/0x10 [ 15.073831] ret_from_fork+0x116/0x1d0 [ 15.073849] ? __pfx_kthread+0x10/0x10 [ 15.073872] ret_from_fork_asm+0x1a/0x30 [ 15.073905] </TASK> [ 15.073915] [ 15.082045] Allocated by task 282: [ 15.082178] kasan_save_stack+0x45/0x70 [ 15.082324] kasan_save_track+0x18/0x40 [ 15.082457] kasan_save_alloc_info+0x3b/0x50 [ 15.083005] __kasan_kmalloc+0xb7/0xc0 [ 15.083193] __kmalloc_cache_noprof+0x189/0x420 [ 15.083417] kasan_atomics+0x95/0x310 [ 15.083612] kunit_try_run_case+0x1a5/0x480 [ 15.083898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.084252] kthread+0x337/0x6f0 [ 15.084410] ret_from_fork+0x116/0x1d0 [ 15.084543] ret_from_fork_asm+0x1a/0x30 [ 15.084732] [ 15.084838] The buggy address belongs to the object at ffff888102a1a680 [ 15.084838] which belongs to the cache kmalloc-64 of size 64 [ 15.085337] The buggy address is located 0 bytes to the right of [ 15.085337] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.085699] [ 15.085769] The buggy address belongs to the physical page: [ 15.086126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.086488] flags: 0x200000000000000(node=0|zone=2) [ 15.086699] page_type: f5(slab) [ 15.086959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.087195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.087420] page dumped because: kasan: bad access detected [ 15.087590] [ 15.087745] Memory state around the buggy address: [ 15.088105] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.088612] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.089053] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.089354] ^ [ 15.089538] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.089753] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.090017] ================================================================== [ 15.759482] ================================================================== [ 15.759743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.760431] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.760868] [ 15.761064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.761107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.761121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.761253] Call Trace: [ 15.761270] <TASK> [ 15.761288] dump_stack_lvl+0x73/0xb0 [ 15.761318] print_report+0xd1/0x650 [ 15.761343] ? __virt_addr_valid+0x1db/0x2d0 [ 15.761366] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.761389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.761414] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.761437] kasan_report+0x141/0x180 [ 15.761460] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.761490] kasan_check_range+0x10c/0x1c0 [ 15.761515] __kasan_check_write+0x18/0x20 [ 15.761536] kasan_atomics_helper+0x15b6/0x5450 [ 15.761561] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.761585] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.761612] ? kasan_atomics+0x152/0x310 [ 15.761640] kasan_atomics+0x1dc/0x310 [ 15.761664] ? __pfx_kasan_atomics+0x10/0x10 [ 15.761689] ? __pfx_read_tsc+0x10/0x10 [ 15.761711] ? ktime_get_ts64+0x86/0x230 [ 15.761736] kunit_try_run_case+0x1a5/0x480 [ 15.761772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.761796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.761821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.761847] ? __kthread_parkme+0x82/0x180 [ 15.761868] ? preempt_count_sub+0x50/0x80 [ 15.761894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.761933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.761959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.761987] kthread+0x337/0x6f0 [ 15.762007] ? trace_preempt_on+0x20/0xc0 [ 15.762032] ? __pfx_kthread+0x10/0x10 [ 15.762055] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.762077] ? calculate_sigpending+0x7b/0xa0 [ 15.762103] ? __pfx_kthread+0x10/0x10 [ 15.762125] ret_from_fork+0x116/0x1d0 [ 15.762144] ? __pfx_kthread+0x10/0x10 [ 15.762166] ret_from_fork_asm+0x1a/0x30 [ 15.762200] </TASK> [ 15.762211] [ 15.771854] Allocated by task 282: [ 15.772210] kasan_save_stack+0x45/0x70 [ 15.772410] kasan_save_track+0x18/0x40 [ 15.772598] kasan_save_alloc_info+0x3b/0x50 [ 15.772790] __kasan_kmalloc+0xb7/0xc0 [ 15.773115] __kmalloc_cache_noprof+0x189/0x420 [ 15.773334] kasan_atomics+0x95/0x310 [ 15.773508] kunit_try_run_case+0x1a5/0x480 [ 15.773707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.774133] kthread+0x337/0x6f0 [ 15.774379] ret_from_fork+0x116/0x1d0 [ 15.774541] ret_from_fork_asm+0x1a/0x30 [ 15.774746] [ 15.774833] The buggy address belongs to the object at ffff888102a1a680 [ 15.774833] which belongs to the cache kmalloc-64 of size 64 [ 15.775545] The buggy address is located 0 bytes to the right of [ 15.775545] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.776250] [ 15.776340] The buggy address belongs to the physical page: [ 15.776581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.777136] flags: 0x200000000000000(node=0|zone=2) [ 15.777429] page_type: f5(slab) [ 15.777555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.778117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.778514] page dumped because: kasan: bad access detected [ 15.778738] [ 15.778902] Memory state around the buggy address: [ 15.779197] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.779633] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.780030] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.780336] ^ [ 15.780541] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781102] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781700] ================================================================== [ 15.905984] ================================================================== [ 15.907159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.907430] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.907780] [ 15.907891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.907952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.907966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.907988] Call Trace: [ 15.908002] <TASK> [ 15.908017] dump_stack_lvl+0x73/0xb0 [ 15.908047] print_report+0xd1/0x650 [ 15.908071] ? __virt_addr_valid+0x1db/0x2d0 [ 15.908095] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.908118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.908143] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.908166] kasan_report+0x141/0x180 [ 15.908190] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.908218] kasan_check_range+0x10c/0x1c0 [ 15.908244] __kasan_check_write+0x18/0x20 [ 15.908265] kasan_atomics_helper+0x19e3/0x5450 [ 15.908289] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.908313] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.908339] ? kasan_atomics+0x152/0x310 [ 15.908367] kasan_atomics+0x1dc/0x310 [ 15.908390] ? __pfx_kasan_atomics+0x10/0x10 [ 15.908416] ? __pfx_read_tsc+0x10/0x10 [ 15.908437] ? ktime_get_ts64+0x86/0x230 [ 15.908463] kunit_try_run_case+0x1a5/0x480 [ 15.908488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.908537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.908562] ? __kthread_parkme+0x82/0x180 [ 15.908584] ? preempt_count_sub+0x50/0x80 [ 15.908608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.908660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.908686] kthread+0x337/0x6f0 [ 15.908705] ? trace_preempt_on+0x20/0xc0 [ 15.908730] ? __pfx_kthread+0x10/0x10 [ 15.908772] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.908796] ? calculate_sigpending+0x7b/0xa0 [ 15.908821] ? __pfx_kthread+0x10/0x10 [ 15.908844] ret_from_fork+0x116/0x1d0 [ 15.908862] ? __pfx_kthread+0x10/0x10 [ 15.908884] ret_from_fork_asm+0x1a/0x30 [ 15.908947] </TASK> [ 15.908958] [ 15.916029] Allocated by task 282: [ 15.916214] kasan_save_stack+0x45/0x70 [ 15.916423] kasan_save_track+0x18/0x40 [ 15.916617] kasan_save_alloc_info+0x3b/0x50 [ 15.916860] __kasan_kmalloc+0xb7/0xc0 [ 15.917122] __kmalloc_cache_noprof+0x189/0x420 [ 15.917313] kasan_atomics+0x95/0x310 [ 15.917487] kunit_try_run_case+0x1a5/0x480 [ 15.917664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.917911] kthread+0x337/0x6f0 [ 15.918098] ret_from_fork+0x116/0x1d0 [ 15.918255] ret_from_fork_asm+0x1a/0x30 [ 15.918448] [ 15.918540] The buggy address belongs to the object at ffff888102a1a680 [ 15.918540] which belongs to the cache kmalloc-64 of size 64 [ 15.919062] The buggy address is located 0 bytes to the right of [ 15.919062] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.919552] [ 15.919648] The buggy address belongs to the physical page: [ 15.919907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.920251] flags: 0x200000000000000(node=0|zone=2) [ 15.920441] page_type: f5(slab) [ 15.920561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.920826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.921064] page dumped because: kasan: bad access detected [ 15.921276] [ 15.921370] Memory state around the buggy address: [ 15.921594] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.921936] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.922253] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.922583] ^ [ 15.922756] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.923024] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.923350] ================================================================== [ 16.055957] ================================================================== [ 16.057036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.057371] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.057694] [ 16.057842] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.057886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.057898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.057931] Call Trace: [ 16.057950] <TASK> [ 16.057966] dump_stack_lvl+0x73/0xb0 [ 16.057996] print_report+0xd1/0x650 [ 16.058018] ? __virt_addr_valid+0x1db/0x2d0 [ 16.058052] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.058075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.058099] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.058133] kasan_report+0x141/0x180 [ 16.058157] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.058184] kasan_check_range+0x10c/0x1c0 [ 16.058210] __kasan_check_write+0x18/0x20 [ 16.058231] kasan_atomics_helper+0x1e12/0x5450 [ 16.058255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.058279] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.058306] ? kasan_atomics+0x152/0x310 [ 16.058335] kasan_atomics+0x1dc/0x310 [ 16.058359] ? __pfx_kasan_atomics+0x10/0x10 [ 16.058394] ? __pfx_read_tsc+0x10/0x10 [ 16.058417] ? ktime_get_ts64+0x86/0x230 [ 16.058442] kunit_try_run_case+0x1a5/0x480 [ 16.058480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.058508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.058544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.058569] ? __kthread_parkme+0x82/0x180 [ 16.058591] ? preempt_count_sub+0x50/0x80 [ 16.058616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.058642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.058668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.058695] kthread+0x337/0x6f0 [ 16.058716] ? trace_preempt_on+0x20/0xc0 [ 16.058740] ? __pfx_kthread+0x10/0x10 [ 16.058772] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.058795] ? calculate_sigpending+0x7b/0xa0 [ 16.058820] ? __pfx_kthread+0x10/0x10 [ 16.058843] ret_from_fork+0x116/0x1d0 [ 16.058863] ? __pfx_kthread+0x10/0x10 [ 16.058885] ret_from_fork_asm+0x1a/0x30 [ 16.058928] </TASK> [ 16.058938] [ 16.067655] Allocated by task 282: [ 16.068216] kasan_save_stack+0x45/0x70 [ 16.068508] kasan_save_track+0x18/0x40 [ 16.069116] kasan_save_alloc_info+0x3b/0x50 [ 16.069353] __kasan_kmalloc+0xb7/0xc0 [ 16.069541] __kmalloc_cache_noprof+0x189/0x420 [ 16.069949] kasan_atomics+0x95/0x310 [ 16.070209] kunit_try_run_case+0x1a5/0x480 [ 16.070417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.070661] kthread+0x337/0x6f0 [ 16.071160] ret_from_fork+0x116/0x1d0 [ 16.071432] ret_from_fork_asm+0x1a/0x30 [ 16.071753] [ 16.071859] The buggy address belongs to the object at ffff888102a1a680 [ 16.071859] which belongs to the cache kmalloc-64 of size 64 [ 16.072350] The buggy address is located 0 bytes to the right of [ 16.072350] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.073139] [ 16.073378] The buggy address belongs to the physical page: [ 16.073839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.074174] flags: 0x200000000000000(node=0|zone=2) [ 16.074350] page_type: f5(slab) [ 16.074474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.074718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.074985] page dumped because: kasan: bad access detected [ 16.075236] [ 16.075332] Memory state around the buggy address: [ 16.075560] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.075891] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077104] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.077842] ^ [ 16.078362] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079160] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079864] ================================================================== [ 15.671504] ================================================================== [ 15.672193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.672965] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.673527] [ 15.673733] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.673777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.673790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.673811] Call Trace: [ 15.673828] <TASK> [ 15.673844] dump_stack_lvl+0x73/0xb0 [ 15.673883] print_report+0xd1/0x650 [ 15.673907] ? __virt_addr_valid+0x1db/0x2d0 [ 15.673947] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.673972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.673997] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.674021] kasan_report+0x141/0x180 [ 15.674053] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.674082] __asan_report_load8_noabort+0x18/0x20 [ 15.674119] kasan_atomics_helper+0x4eae/0x5450 [ 15.674142] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.674166] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.674193] ? kasan_atomics+0x152/0x310 [ 15.674220] kasan_atomics+0x1dc/0x310 [ 15.674243] ? __pfx_kasan_atomics+0x10/0x10 [ 15.674269] ? __pfx_read_tsc+0x10/0x10 [ 15.674290] ? ktime_get_ts64+0x86/0x230 [ 15.674316] kunit_try_run_case+0x1a5/0x480 [ 15.674341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.674366] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.674390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.674415] ? __kthread_parkme+0x82/0x180 [ 15.674436] ? preempt_count_sub+0x50/0x80 [ 15.674461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.674487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.674517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.674543] kthread+0x337/0x6f0 [ 15.674562] ? trace_preempt_on+0x20/0xc0 [ 15.674587] ? __pfx_kthread+0x10/0x10 [ 15.674608] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.674630] ? calculate_sigpending+0x7b/0xa0 [ 15.674656] ? __pfx_kthread+0x10/0x10 [ 15.674679] ret_from_fork+0x116/0x1d0 [ 15.674698] ? __pfx_kthread+0x10/0x10 [ 15.674720] ret_from_fork_asm+0x1a/0x30 [ 15.674753] </TASK> [ 15.674765] [ 15.686953] Allocated by task 282: [ 15.687356] kasan_save_stack+0x45/0x70 [ 15.687726] kasan_save_track+0x18/0x40 [ 15.688105] kasan_save_alloc_info+0x3b/0x50 [ 15.688499] __kasan_kmalloc+0xb7/0xc0 [ 15.688851] __kmalloc_cache_noprof+0x189/0x420 [ 15.689298] kasan_atomics+0x95/0x310 [ 15.689576] kunit_try_run_case+0x1a5/0x480 [ 15.689724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.689934] kthread+0x337/0x6f0 [ 15.690060] ret_from_fork+0x116/0x1d0 [ 15.690193] ret_from_fork_asm+0x1a/0x30 [ 15.690334] [ 15.690403] The buggy address belongs to the object at ffff888102a1a680 [ 15.690403] which belongs to the cache kmalloc-64 of size 64 [ 15.690767] The buggy address is located 0 bytes to the right of [ 15.690767] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.691843] [ 15.692016] The buggy address belongs to the physical page: [ 15.692487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.693375] flags: 0x200000000000000(node=0|zone=2) [ 15.693830] page_type: f5(slab) [ 15.694134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.694802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.695446] page dumped because: kasan: bad access detected [ 15.695961] [ 15.696151] Memory state around the buggy address: [ 15.696568] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.697139] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.697357] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.697570] ^ [ 15.697723] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698336] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698965] ================================================================== [ 15.988262] ================================================================== [ 15.988516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.989137] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.989489] [ 15.989623] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.989679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.989693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.989713] Call Trace: [ 15.989726] <TASK> [ 15.989740] dump_stack_lvl+0x73/0xb0 [ 15.989780] print_report+0xd1/0x650 [ 15.989804] ? __virt_addr_valid+0x1db/0x2d0 [ 15.989829] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.989861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.989887] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.989910] kasan_report+0x141/0x180 [ 15.989951] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.989979] __asan_report_load8_noabort+0x18/0x20 [ 15.990005] kasan_atomics_helper+0x4f30/0x5450 [ 15.990030] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.990054] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.990080] ? kasan_atomics+0x152/0x310 [ 15.990109] kasan_atomics+0x1dc/0x310 [ 15.990142] ? __pfx_kasan_atomics+0x10/0x10 [ 15.990167] ? __pfx_read_tsc+0x10/0x10 [ 15.990190] ? ktime_get_ts64+0x86/0x230 [ 15.990227] kunit_try_run_case+0x1a5/0x480 [ 15.990253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.990277] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.990302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.990327] ? __kthread_parkme+0x82/0x180 [ 15.990348] ? preempt_count_sub+0x50/0x80 [ 15.990373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.990399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.990424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.990451] kthread+0x337/0x6f0 [ 15.990479] ? trace_preempt_on+0x20/0xc0 [ 15.990511] ? __pfx_kthread+0x10/0x10 [ 15.990532] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.990566] ? calculate_sigpending+0x7b/0xa0 [ 15.990590] ? __pfx_kthread+0x10/0x10 [ 15.990613] ret_from_fork+0x116/0x1d0 [ 15.990632] ? __pfx_kthread+0x10/0x10 [ 15.990654] ret_from_fork_asm+0x1a/0x30 [ 15.990688] </TASK> [ 15.990698] [ 15.998208] Allocated by task 282: [ 15.998336] kasan_save_stack+0x45/0x70 [ 15.998518] kasan_save_track+0x18/0x40 [ 15.998734] kasan_save_alloc_info+0x3b/0x50 [ 15.998950] __kasan_kmalloc+0xb7/0xc0 [ 15.999140] __kmalloc_cache_noprof+0x189/0x420 [ 15.999362] kasan_atomics+0x95/0x310 [ 15.999729] kunit_try_run_case+0x1a5/0x480 [ 15.999970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.000190] kthread+0x337/0x6f0 [ 16.000393] ret_from_fork+0x116/0x1d0 [ 16.000544] ret_from_fork_asm+0x1a/0x30 [ 16.000747] [ 16.000852] The buggy address belongs to the object at ffff888102a1a680 [ 16.000852] which belongs to the cache kmalloc-64 of size 64 [ 16.001363] The buggy address is located 0 bytes to the right of [ 16.001363] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.001968] [ 16.002041] The buggy address belongs to the physical page: [ 16.002217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.002459] flags: 0x200000000000000(node=0|zone=2) [ 16.002674] page_type: f5(slab) [ 16.002979] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.003322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.003657] page dumped because: kasan: bad access detected [ 16.004123] [ 16.004218] Memory state around the buggy address: [ 16.004373] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.004589] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.004994] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.005312] ^ [ 16.005514] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.005729] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.006275] ================================================================== [ 15.804064] ================================================================== [ 15.804402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.804895] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.805136] [ 15.805221] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.805263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.805275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.805295] Call Trace: [ 15.805311] <TASK> [ 15.805327] dump_stack_lvl+0x73/0xb0 [ 15.805356] print_report+0xd1/0x650 [ 15.805379] ? __virt_addr_valid+0x1db/0x2d0 [ 15.805403] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.805425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.805449] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.805473] kasan_report+0x141/0x180 [ 15.805495] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.805523] kasan_check_range+0x10c/0x1c0 [ 15.805548] __kasan_check_write+0x18/0x20 [ 15.805568] kasan_atomics_helper+0x16e7/0x5450 [ 15.805592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.805616] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.805642] ? kasan_atomics+0x152/0x310 [ 15.805670] kasan_atomics+0x1dc/0x310 [ 15.805693] ? __pfx_kasan_atomics+0x10/0x10 [ 15.805718] ? __pfx_read_tsc+0x10/0x10 [ 15.805739] ? ktime_get_ts64+0x86/0x230 [ 15.805779] kunit_try_run_case+0x1a5/0x480 [ 15.805804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.805828] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.805852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.805877] ? __kthread_parkme+0x82/0x180 [ 15.805898] ? preempt_count_sub+0x50/0x80 [ 15.805933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.805959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.805984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.806011] kthread+0x337/0x6f0 [ 15.806031] ? trace_preempt_on+0x20/0xc0 [ 15.806055] ? __pfx_kthread+0x10/0x10 [ 15.806077] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.806100] ? calculate_sigpending+0x7b/0xa0 [ 15.806125] ? __pfx_kthread+0x10/0x10 [ 15.806148] ret_from_fork+0x116/0x1d0 [ 15.806167] ? __pfx_kthread+0x10/0x10 [ 15.806189] ret_from_fork_asm+0x1a/0x30 [ 15.806222] </TASK> [ 15.806233] [ 15.813846] Allocated by task 282: [ 15.814000] kasan_save_stack+0x45/0x70 [ 15.814175] kasan_save_track+0x18/0x40 [ 15.814371] kasan_save_alloc_info+0x3b/0x50 [ 15.814543] __kasan_kmalloc+0xb7/0xc0 [ 15.814736] __kmalloc_cache_noprof+0x189/0x420 [ 15.814927] kasan_atomics+0x95/0x310 [ 15.815119] kunit_try_run_case+0x1a5/0x480 [ 15.815309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.815543] kthread+0x337/0x6f0 [ 15.815665] ret_from_fork+0x116/0x1d0 [ 15.815797] ret_from_fork_asm+0x1a/0x30 [ 15.815963] [ 15.816063] The buggy address belongs to the object at ffff888102a1a680 [ 15.816063] which belongs to the cache kmalloc-64 of size 64 [ 15.816587] The buggy address is located 0 bytes to the right of [ 15.816587] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.817037] [ 15.817109] The buggy address belongs to the physical page: [ 15.817465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.817791] flags: 0x200000000000000(node=0|zone=2) [ 15.818019] page_type: f5(slab) [ 15.818174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.818465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.818791] page dumped because: kasan: bad access detected [ 15.818972] [ 15.819055] Memory state around the buggy address: [ 15.819278] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.819561] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.819878] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.820161] ^ [ 15.820362] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820600] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820812] ================================================================== [ 15.480013] ================================================================== [ 15.480317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.480672] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.481023] [ 15.481215] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.481255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.481267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.481287] Call Trace: [ 15.481300] <TASK> [ 15.481314] dump_stack_lvl+0x73/0xb0 [ 15.481342] print_report+0xd1/0x650 [ 15.481365] ? __virt_addr_valid+0x1db/0x2d0 [ 15.481389] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.481414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.481438] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.481461] kasan_report+0x141/0x180 [ 15.481484] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.481512] __asan_report_load4_noabort+0x18/0x20 [ 15.481538] kasan_atomics_helper+0x4a1c/0x5450 [ 15.481562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.481586] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.481612] ? kasan_atomics+0x152/0x310 [ 15.481639] kasan_atomics+0x1dc/0x310 [ 15.481663] ? __pfx_kasan_atomics+0x10/0x10 [ 15.481711] ? __pfx_read_tsc+0x10/0x10 [ 15.481732] ? ktime_get_ts64+0x86/0x230 [ 15.481766] kunit_try_run_case+0x1a5/0x480 [ 15.481792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.481815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.481857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.481896] ? __kthread_parkme+0x82/0x180 [ 15.481928] ? preempt_count_sub+0x50/0x80 [ 15.481953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.481979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.482004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.482031] kthread+0x337/0x6f0 [ 15.482051] ? trace_preempt_on+0x20/0xc0 [ 15.482075] ? __pfx_kthread+0x10/0x10 [ 15.482097] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.482120] ? calculate_sigpending+0x7b/0xa0 [ 15.482145] ? __pfx_kthread+0x10/0x10 [ 15.482168] ret_from_fork+0x116/0x1d0 [ 15.482187] ? __pfx_kthread+0x10/0x10 [ 15.482209] ret_from_fork_asm+0x1a/0x30 [ 15.482244] </TASK> [ 15.482276] [ 15.490190] Allocated by task 282: [ 15.490382] kasan_save_stack+0x45/0x70 [ 15.490632] kasan_save_track+0x18/0x40 [ 15.490850] kasan_save_alloc_info+0x3b/0x50 [ 15.491083] __kasan_kmalloc+0xb7/0xc0 [ 15.491271] __kmalloc_cache_noprof+0x189/0x420 [ 15.491494] kasan_atomics+0x95/0x310 [ 15.491688] kunit_try_run_case+0x1a5/0x480 [ 15.491935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.492188] kthread+0x337/0x6f0 [ 15.492320] ret_from_fork+0x116/0x1d0 [ 15.492498] ret_from_fork_asm+0x1a/0x30 [ 15.492638] [ 15.492730] The buggy address belongs to the object at ffff888102a1a680 [ 15.492730] which belongs to the cache kmalloc-64 of size 64 [ 15.493275] The buggy address is located 0 bytes to the right of [ 15.493275] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.493817] [ 15.493916] The buggy address belongs to the physical page: [ 15.494156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.494498] flags: 0x200000000000000(node=0|zone=2) [ 15.494736] page_type: f5(slab) [ 15.494893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.495135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.495361] page dumped because: kasan: bad access detected [ 15.495532] [ 15.495607] Memory state around the buggy address: [ 15.495958] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.496280] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.496602] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.496953] ^ [ 15.497206] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.497520] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.497836] ================================================================== [ 14.990757] ================================================================== [ 14.991107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.991607] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.992098] [ 14.992208] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.992250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.992263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.992284] Call Trace: [ 14.992298] <TASK> [ 14.992313] dump_stack_lvl+0x73/0xb0 [ 14.992343] print_report+0xd1/0x650 [ 14.992368] ? __virt_addr_valid+0x1db/0x2d0 [ 14.992392] ? kasan_atomics_helper+0x565/0x5450 [ 14.992416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.992441] ? kasan_atomics_helper+0x565/0x5450 [ 14.992464] kasan_report+0x141/0x180 [ 14.992487] ? kasan_atomics_helper+0x565/0x5450 [ 14.992517] kasan_check_range+0x10c/0x1c0 [ 14.992543] __kasan_check_write+0x18/0x20 [ 14.992564] kasan_atomics_helper+0x565/0x5450 [ 14.992588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.992612] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.992639] ? kasan_atomics+0x152/0x310 [ 14.992667] kasan_atomics+0x1dc/0x310 [ 14.992691] ? __pfx_kasan_atomics+0x10/0x10 [ 14.992717] ? __pfx_read_tsc+0x10/0x10 [ 14.992738] ? ktime_get_ts64+0x86/0x230 [ 14.992775] kunit_try_run_case+0x1a5/0x480 [ 14.992800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.992825] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.992851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.992876] ? __kthread_parkme+0x82/0x180 [ 14.992896] ? preempt_count_sub+0x50/0x80 [ 14.992934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.992960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.993012] kthread+0x337/0x6f0 [ 14.993032] ? trace_preempt_on+0x20/0xc0 [ 14.993057] ? __pfx_kthread+0x10/0x10 [ 14.993079] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.993102] ? calculate_sigpending+0x7b/0xa0 [ 14.993128] ? __pfx_kthread+0x10/0x10 [ 14.993150] ret_from_fork+0x116/0x1d0 [ 14.993169] ? __pfx_kthread+0x10/0x10 [ 14.993191] ret_from_fork_asm+0x1a/0x30 [ 14.993224] </TASK> [ 14.993402] [ 15.007734] Allocated by task 282: [ 15.008236] kasan_save_stack+0x45/0x70 [ 15.008697] kasan_save_track+0x18/0x40 [ 15.008880] kasan_save_alloc_info+0x3b/0x50 [ 15.009049] __kasan_kmalloc+0xb7/0xc0 [ 15.009420] __kmalloc_cache_noprof+0x189/0x420 [ 15.009927] kasan_atomics+0x95/0x310 [ 15.010350] kunit_try_run_case+0x1a5/0x480 [ 15.010727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.011279] kthread+0x337/0x6f0 [ 15.011574] ret_from_fork+0x116/0x1d0 [ 15.011977] ret_from_fork_asm+0x1a/0x30 [ 15.012378] [ 15.012533] The buggy address belongs to the object at ffff888102a1a680 [ 15.012533] which belongs to the cache kmalloc-64 of size 64 [ 15.012930] The buggy address is located 0 bytes to the right of [ 15.012930] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.013369] [ 15.013453] The buggy address belongs to the physical page: [ 15.013627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.014115] flags: 0x200000000000000(node=0|zone=2) [ 15.014604] page_type: f5(slab) [ 15.014961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.015714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.016443] page dumped because: kasan: bad access detected [ 15.017044] [ 15.017199] Memory state around the buggy address: [ 15.017620] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.018288] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.018984] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.019694] ^ [ 15.020152] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.020873] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.021330] ================================================================== [ 16.161421] ================================================================== [ 16.161664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.161960] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.162243] [ 16.162614] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.162661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.162675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.162695] Call Trace: [ 16.162709] <TASK> [ 16.162723] dump_stack_lvl+0x73/0xb0 [ 16.164526] print_report+0xd1/0x650 [ 16.164553] ? __virt_addr_valid+0x1db/0x2d0 [ 16.164580] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.164604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.164629] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.164653] kasan_report+0x141/0x180 [ 16.164676] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.164705] __asan_report_load8_noabort+0x18/0x20 [ 16.164732] kasan_atomics_helper+0x4f98/0x5450 [ 16.164782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.164806] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.164833] ? kasan_atomics+0x152/0x310 [ 16.164861] kasan_atomics+0x1dc/0x310 [ 16.164884] ? __pfx_kasan_atomics+0x10/0x10 [ 16.164910] ? __pfx_read_tsc+0x10/0x10 [ 16.164986] ? ktime_get_ts64+0x86/0x230 [ 16.165013] kunit_try_run_case+0x1a5/0x480 [ 16.165039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.165063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.165089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.165114] ? __kthread_parkme+0x82/0x180 [ 16.165135] ? preempt_count_sub+0x50/0x80 [ 16.165160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.165185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.165211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.165237] kthread+0x337/0x6f0 [ 16.165257] ? trace_preempt_on+0x20/0xc0 [ 16.165281] ? __pfx_kthread+0x10/0x10 [ 16.165302] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.165325] ? calculate_sigpending+0x7b/0xa0 [ 16.165351] ? __pfx_kthread+0x10/0x10 [ 16.165374] ret_from_fork+0x116/0x1d0 [ 16.165394] ? __pfx_kthread+0x10/0x10 [ 16.165415] ret_from_fork_asm+0x1a/0x30 [ 16.165450] </TASK> [ 16.165462] [ 16.172399] Allocated by task 282: [ 16.172584] kasan_save_stack+0x45/0x70 [ 16.172790] kasan_save_track+0x18/0x40 [ 16.172988] kasan_save_alloc_info+0x3b/0x50 [ 16.173191] __kasan_kmalloc+0xb7/0xc0 [ 16.173359] __kmalloc_cache_noprof+0x189/0x420 [ 16.173563] kasan_atomics+0x95/0x310 [ 16.173724] kunit_try_run_case+0x1a5/0x480 [ 16.173953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.174141] kthread+0x337/0x6f0 [ 16.174262] ret_from_fork+0x116/0x1d0 [ 16.174395] ret_from_fork_asm+0x1a/0x30 [ 16.174567] [ 16.174659] The buggy address belongs to the object at ffff888102a1a680 [ 16.174659] which belongs to the cache kmalloc-64 of size 64 [ 16.175220] The buggy address is located 0 bytes to the right of [ 16.175220] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.175591] [ 16.175664] The buggy address belongs to the physical page: [ 16.175947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.176307] flags: 0x200000000000000(node=0|zone=2) [ 16.176542] page_type: f5(slab) [ 16.176720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.177101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.177352] page dumped because: kasan: bad access detected [ 16.177524] [ 16.177593] Memory state around the buggy address: [ 16.177766] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.178058] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.178375] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.178692] ^ [ 16.178948] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.179233] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.179448] ================================================================== [ 16.237609] ================================================================== [ 16.238719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.239275] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.239498] [ 16.239581] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.239621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.239634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.239654] Call Trace: [ 16.239669] <TASK> [ 16.239684] dump_stack_lvl+0x73/0xb0 [ 16.239714] print_report+0xd1/0x650 [ 16.239739] ? __virt_addr_valid+0x1db/0x2d0 [ 16.240127] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.240429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.240466] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.240505] kasan_report+0x141/0x180 [ 16.240530] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.240560] __asan_report_load8_noabort+0x18/0x20 [ 16.240586] kasan_atomics_helper+0x4fa5/0x5450 [ 16.240610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.240634] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.240660] ? kasan_atomics+0x152/0x310 [ 16.240691] kasan_atomics+0x1dc/0x310 [ 16.240715] ? __pfx_kasan_atomics+0x10/0x10 [ 16.240740] ? __pfx_read_tsc+0x10/0x10 [ 16.240775] ? ktime_get_ts64+0x86/0x230 [ 16.240801] kunit_try_run_case+0x1a5/0x480 [ 16.240826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.240851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.240877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.240902] ? __kthread_parkme+0x82/0x180 [ 16.240934] ? preempt_count_sub+0x50/0x80 [ 16.240959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.240985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.241011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.241037] kthread+0x337/0x6f0 [ 16.241056] ? trace_preempt_on+0x20/0xc0 [ 16.241081] ? __pfx_kthread+0x10/0x10 [ 16.241103] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.241129] ? calculate_sigpending+0x7b/0xa0 [ 16.241155] ? __pfx_kthread+0x10/0x10 [ 16.241179] ret_from_fork+0x116/0x1d0 [ 16.241199] ? __pfx_kthread+0x10/0x10 [ 16.241221] ret_from_fork_asm+0x1a/0x30 [ 16.241254] </TASK> [ 16.241265] [ 16.254509] Allocated by task 282: [ 16.254894] kasan_save_stack+0x45/0x70 [ 16.255204] kasan_save_track+0x18/0x40 [ 16.255464] kasan_save_alloc_info+0x3b/0x50 [ 16.255612] __kasan_kmalloc+0xb7/0xc0 [ 16.255742] __kmalloc_cache_noprof+0x189/0x420 [ 16.256188] kasan_atomics+0x95/0x310 [ 16.256552] kunit_try_run_case+0x1a5/0x480 [ 16.256985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.257477] kthread+0x337/0x6f0 [ 16.257780] ret_from_fork+0x116/0x1d0 [ 16.258124] ret_from_fork_asm+0x1a/0x30 [ 16.258263] [ 16.258333] The buggy address belongs to the object at ffff888102a1a680 [ 16.258333] which belongs to the cache kmalloc-64 of size 64 [ 16.258679] The buggy address is located 0 bytes to the right of [ 16.258679] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.259743] [ 16.259940] The buggy address belongs to the physical page: [ 16.260430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.261153] flags: 0x200000000000000(node=0|zone=2) [ 16.261702] page_type: f5(slab) [ 16.262066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.262735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.263230] page dumped because: kasan: bad access detected [ 16.263396] [ 16.263464] Memory state around the buggy address: [ 16.263612] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.263846] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.264158] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.264491] ^ [ 16.264644] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.265065] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.265351] ================================================================== [ 15.332547] ================================================================== [ 15.332817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.333181] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.333684] [ 15.333884] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.333938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.333951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.333971] Call Trace: [ 15.333987] <TASK> [ 15.334002] dump_stack_lvl+0x73/0xb0 [ 15.334043] print_report+0xd1/0x650 [ 15.334066] ? __virt_addr_valid+0x1db/0x2d0 [ 15.334102] ? kasan_atomics_helper+0xde0/0x5450 [ 15.334125] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.334149] ? kasan_atomics_helper+0xde0/0x5450 [ 15.334172] kasan_report+0x141/0x180 [ 15.334195] ? kasan_atomics_helper+0xde0/0x5450 [ 15.334223] kasan_check_range+0x10c/0x1c0 [ 15.334248] __kasan_check_write+0x18/0x20 [ 15.334268] kasan_atomics_helper+0xde0/0x5450 [ 15.334292] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.334316] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.334343] ? kasan_atomics+0x152/0x310 [ 15.334370] kasan_atomics+0x1dc/0x310 [ 15.334394] ? __pfx_kasan_atomics+0x10/0x10 [ 15.334419] ? __pfx_read_tsc+0x10/0x10 [ 15.334450] ? ktime_get_ts64+0x86/0x230 [ 15.334476] kunit_try_run_case+0x1a5/0x480 [ 15.334517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.334543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.334568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.334594] ? __kthread_parkme+0x82/0x180 [ 15.334624] ? preempt_count_sub+0x50/0x80 [ 15.334649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.334675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.334712] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.334738] kthread+0x337/0x6f0 [ 15.334767] ? trace_preempt_on+0x20/0xc0 [ 15.334792] ? __pfx_kthread+0x10/0x10 [ 15.334823] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.334846] ? calculate_sigpending+0x7b/0xa0 [ 15.334872] ? __pfx_kthread+0x10/0x10 [ 15.334905] ret_from_fork+0x116/0x1d0 [ 15.334933] ? __pfx_kthread+0x10/0x10 [ 15.334955] ret_from_fork_asm+0x1a/0x30 [ 15.334988] </TASK> [ 15.334998] [ 15.342641] Allocated by task 282: [ 15.342883] kasan_save_stack+0x45/0x70 [ 15.343080] kasan_save_track+0x18/0x40 [ 15.343282] kasan_save_alloc_info+0x3b/0x50 [ 15.343495] __kasan_kmalloc+0xb7/0xc0 [ 15.343685] __kmalloc_cache_noprof+0x189/0x420 [ 15.343928] kasan_atomics+0x95/0x310 [ 15.344087] kunit_try_run_case+0x1a5/0x480 [ 15.344274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.344481] kthread+0x337/0x6f0 [ 15.344651] ret_from_fork+0x116/0x1d0 [ 15.344852] ret_from_fork_asm+0x1a/0x30 [ 15.345033] [ 15.345154] The buggy address belongs to the object at ffff888102a1a680 [ 15.345154] which belongs to the cache kmalloc-64 of size 64 [ 15.345632] The buggy address is located 0 bytes to the right of [ 15.345632] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.346077] [ 15.346151] The buggy address belongs to the physical page: [ 15.346323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.346568] flags: 0x200000000000000(node=0|zone=2) [ 15.346730] page_type: f5(slab) [ 15.346897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.347556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.347900] page dumped because: kasan: bad access detected [ 15.348161] [ 15.348253] Memory state around the buggy address: [ 15.348468] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.348682] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.348895] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.349115] ^ [ 15.349270] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.349548] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.350028] ================================================================== [ 15.350585] ================================================================== [ 15.351058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.351427] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.351786] [ 15.351892] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.351944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.351957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.351979] Call Trace: [ 15.351996] <TASK> [ 15.352013] dump_stack_lvl+0x73/0xb0 [ 15.352042] print_report+0xd1/0x650 [ 15.352065] ? __virt_addr_valid+0x1db/0x2d0 [ 15.352091] ? kasan_atomics_helper+0xe78/0x5450 [ 15.352113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.352137] ? kasan_atomics_helper+0xe78/0x5450 [ 15.352171] kasan_report+0x141/0x180 [ 15.352194] ? kasan_atomics_helper+0xe78/0x5450 [ 15.352222] kasan_check_range+0x10c/0x1c0 [ 15.352257] __kasan_check_write+0x18/0x20 [ 15.352280] kasan_atomics_helper+0xe78/0x5450 [ 15.352304] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.352336] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.352362] ? kasan_atomics+0x152/0x310 [ 15.352390] kasan_atomics+0x1dc/0x310 [ 15.352424] ? __pfx_kasan_atomics+0x10/0x10 [ 15.352451] ? __pfx_read_tsc+0x10/0x10 [ 15.352473] ? ktime_get_ts64+0x86/0x230 [ 15.352508] kunit_try_run_case+0x1a5/0x480 [ 15.352533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.352567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.352592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.352617] ? __kthread_parkme+0x82/0x180 [ 15.352648] ? preempt_count_sub+0x50/0x80 [ 15.352673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.352699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.352771] kthread+0x337/0x6f0 [ 15.352791] ? trace_preempt_on+0x20/0xc0 [ 15.352816] ? __pfx_kthread+0x10/0x10 [ 15.352846] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.352869] ? calculate_sigpending+0x7b/0xa0 [ 15.352905] ? __pfx_kthread+0x10/0x10 [ 15.352937] ret_from_fork+0x116/0x1d0 [ 15.352956] ? __pfx_kthread+0x10/0x10 [ 15.352978] ret_from_fork_asm+0x1a/0x30 [ 15.353020] </TASK> [ 15.353030] [ 15.363983] Allocated by task 282: [ 15.364281] kasan_save_stack+0x45/0x70 [ 15.364509] kasan_save_track+0x18/0x40 [ 15.364667] kasan_save_alloc_info+0x3b/0x50 [ 15.364877] __kasan_kmalloc+0xb7/0xc0 [ 15.365263] __kmalloc_cache_noprof+0x189/0x420 [ 15.365543] kasan_atomics+0x95/0x310 [ 15.365806] kunit_try_run_case+0x1a5/0x480 [ 15.366115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.366313] kthread+0x337/0x6f0 [ 15.366609] ret_from_fork+0x116/0x1d0 [ 15.366807] ret_from_fork_asm+0x1a/0x30 [ 15.367107] [ 15.367181] The buggy address belongs to the object at ffff888102a1a680 [ 15.367181] which belongs to the cache kmalloc-64 of size 64 [ 15.367669] The buggy address is located 0 bytes to the right of [ 15.367669] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.368417] [ 15.368520] The buggy address belongs to the physical page: [ 15.368990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.369305] flags: 0x200000000000000(node=0|zone=2) [ 15.369668] page_type: f5(slab) [ 15.369828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.370265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.370681] page dumped because: kasan: bad access detected [ 15.370892] [ 15.371075] Memory state around the buggy address: [ 15.371435] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.371773] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.372178] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.372523] ^ [ 15.372734] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.373239] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.373618] ================================================================== [ 16.266488] ================================================================== [ 16.267068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.267396] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.267692] [ 16.267831] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.267874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.267909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.267939] Call Trace: [ 16.267956] <TASK> [ 16.267973] dump_stack_lvl+0x73/0xb0 [ 16.268003] print_report+0xd1/0x650 [ 16.268027] ? __virt_addr_valid+0x1db/0x2d0 [ 16.268060] ? kasan_atomics_helper+0x224c/0x5450 [ 16.268082] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.268107] ? kasan_atomics_helper+0x224c/0x5450 [ 16.268141] kasan_report+0x141/0x180 [ 16.268164] ? kasan_atomics_helper+0x224c/0x5450 [ 16.268193] kasan_check_range+0x10c/0x1c0 [ 16.268218] __kasan_check_write+0x18/0x20 [ 16.268239] kasan_atomics_helper+0x224c/0x5450 [ 16.268263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.268287] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.268313] ? kasan_atomics+0x152/0x310 [ 16.268350] kasan_atomics+0x1dc/0x310 [ 16.268374] ? __pfx_kasan_atomics+0x10/0x10 [ 16.268399] ? __pfx_read_tsc+0x10/0x10 [ 16.268431] ? ktime_get_ts64+0x86/0x230 [ 16.268456] kunit_try_run_case+0x1a5/0x480 [ 16.268482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.268506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.268531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.268564] ? __kthread_parkme+0x82/0x180 [ 16.268585] ? preempt_count_sub+0x50/0x80 [ 16.268621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.268647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.268672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.268698] kthread+0x337/0x6f0 [ 16.268718] ? trace_preempt_on+0x20/0xc0 [ 16.268742] ? __pfx_kthread+0x10/0x10 [ 16.268778] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.268800] ? calculate_sigpending+0x7b/0xa0 [ 16.268825] ? __pfx_kthread+0x10/0x10 [ 16.268847] ret_from_fork+0x116/0x1d0 [ 16.268867] ? __pfx_kthread+0x10/0x10 [ 16.268888] ret_from_fork_asm+0x1a/0x30 [ 16.268929] </TASK> [ 16.268940] [ 16.276287] Allocated by task 282: [ 16.276409] kasan_save_stack+0x45/0x70 [ 16.276583] kasan_save_track+0x18/0x40 [ 16.276798] kasan_save_alloc_info+0x3b/0x50 [ 16.277113] __kasan_kmalloc+0xb7/0xc0 [ 16.277336] __kmalloc_cache_noprof+0x189/0x420 [ 16.277558] kasan_atomics+0x95/0x310 [ 16.277758] kunit_try_run_case+0x1a5/0x480 [ 16.277981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.278272] kthread+0x337/0x6f0 [ 16.278461] ret_from_fork+0x116/0x1d0 [ 16.278668] ret_from_fork_asm+0x1a/0x30 [ 16.278949] [ 16.279037] The buggy address belongs to the object at ffff888102a1a680 [ 16.279037] which belongs to the cache kmalloc-64 of size 64 [ 16.279580] The buggy address is located 0 bytes to the right of [ 16.279580] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.280222] [ 16.280335] The buggy address belongs to the physical page: [ 16.280660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.281020] flags: 0x200000000000000(node=0|zone=2) [ 16.281410] page_type: f5(slab) [ 16.281757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.282073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.282295] page dumped because: kasan: bad access detected [ 16.282458] [ 16.282536] Memory state around the buggy address: [ 16.282767] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.283211] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.283561] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.283991] ^ [ 16.284252] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.284516] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.284815] ================================================================== [ 16.080729] ================================================================== [ 16.080981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.082109] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.083203] [ 16.083411] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.083456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.083469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.083492] Call Trace: [ 16.083507] <TASK> [ 16.083524] dump_stack_lvl+0x73/0xb0 [ 16.083556] print_report+0xd1/0x650 [ 16.083581] ? __virt_addr_valid+0x1db/0x2d0 [ 16.083606] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.083629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.083654] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.083677] kasan_report+0x141/0x180 [ 16.083700] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.083729] kasan_check_range+0x10c/0x1c0 [ 16.083781] __kasan_check_write+0x18/0x20 [ 16.083802] kasan_atomics_helper+0x1eaa/0x5450 [ 16.083826] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.083850] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.083877] ? kasan_atomics+0x152/0x310 [ 16.083907] kasan_atomics+0x1dc/0x310 [ 16.083942] ? __pfx_kasan_atomics+0x10/0x10 [ 16.083968] ? __pfx_read_tsc+0x10/0x10 [ 16.083993] ? ktime_get_ts64+0x86/0x230 [ 16.084021] kunit_try_run_case+0x1a5/0x480 [ 16.084048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.084099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.084124] ? __kthread_parkme+0x82/0x180 [ 16.084147] ? preempt_count_sub+0x50/0x80 [ 16.084172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.084224] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.084251] kthread+0x337/0x6f0 [ 16.084271] ? trace_preempt_on+0x20/0xc0 [ 16.084297] ? __pfx_kthread+0x10/0x10 [ 16.084319] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.084342] ? calculate_sigpending+0x7b/0xa0 [ 16.084368] ? __pfx_kthread+0x10/0x10 [ 16.084390] ret_from_fork+0x116/0x1d0 [ 16.084409] ? __pfx_kthread+0x10/0x10 [ 16.084430] ret_from_fork_asm+0x1a/0x30 [ 16.084463] </TASK> [ 16.084474] [ 16.095363] Allocated by task 282: [ 16.095557] kasan_save_stack+0x45/0x70 [ 16.095784] kasan_save_track+0x18/0x40 [ 16.095990] kasan_save_alloc_info+0x3b/0x50 [ 16.096177] __kasan_kmalloc+0xb7/0xc0 [ 16.096309] __kmalloc_cache_noprof+0x189/0x420 [ 16.096487] kasan_atomics+0x95/0x310 [ 16.096676] kunit_try_run_case+0x1a5/0x480 [ 16.096898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.097213] kthread+0x337/0x6f0 [ 16.097338] ret_from_fork+0x116/0x1d0 [ 16.097472] ret_from_fork_asm+0x1a/0x30 [ 16.097649] [ 16.097744] The buggy address belongs to the object at ffff888102a1a680 [ 16.097744] which belongs to the cache kmalloc-64 of size 64 [ 16.098308] The buggy address is located 0 bytes to the right of [ 16.098308] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.098727] [ 16.098801] The buggy address belongs to the physical page: [ 16.099061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.099511] flags: 0x200000000000000(node=0|zone=2) [ 16.099690] page_type: f5(slab) [ 16.099812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.100325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.100687] page dumped because: kasan: bad access detected [ 16.100979] [ 16.101069] Memory state around the buggy address: [ 16.101290] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.101601] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.101958] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.102203] ^ [ 16.102431] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102660] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.103109] ================================================================== [ 15.109269] ================================================================== [ 15.109998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.110358] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.110652] [ 15.110782] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.110823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.110835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.110855] Call Trace: [ 15.110869] <TASK> [ 15.110884] dump_stack_lvl+0x73/0xb0 [ 15.110913] print_report+0xd1/0x650 [ 15.110946] ? __virt_addr_valid+0x1db/0x2d0 [ 15.110970] ? kasan_atomics_helper+0x860/0x5450 [ 15.110992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.111027] ? kasan_atomics_helper+0x860/0x5450 [ 15.111057] kasan_report+0x141/0x180 [ 15.111080] ? kasan_atomics_helper+0x860/0x5450 [ 15.111108] kasan_check_range+0x10c/0x1c0 [ 15.111133] __kasan_check_write+0x18/0x20 [ 15.111153] kasan_atomics_helper+0x860/0x5450 [ 15.111178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.111201] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.111228] ? kasan_atomics+0x152/0x310 [ 15.111256] kasan_atomics+0x1dc/0x310 [ 15.111279] ? __pfx_kasan_atomics+0x10/0x10 [ 15.111305] ? __pfx_read_tsc+0x10/0x10 [ 15.111327] ? ktime_get_ts64+0x86/0x230 [ 15.111352] kunit_try_run_case+0x1a5/0x480 [ 15.111378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.111402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.111428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.111453] ? __kthread_parkme+0x82/0x180 [ 15.111476] ? preempt_count_sub+0x50/0x80 [ 15.111502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.111527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.111553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.111581] kthread+0x337/0x6f0 [ 15.111601] ? trace_preempt_on+0x20/0xc0 [ 15.111625] ? __pfx_kthread+0x10/0x10 [ 15.111646] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.111669] ? calculate_sigpending+0x7b/0xa0 [ 15.111696] ? __pfx_kthread+0x10/0x10 [ 15.111720] ret_from_fork+0x116/0x1d0 [ 15.111742] ? __pfx_kthread+0x10/0x10 [ 15.111764] ret_from_fork_asm+0x1a/0x30 [ 15.111797] </TASK> [ 15.111807] [ 15.130384] Allocated by task 282: [ 15.130973] kasan_save_stack+0x45/0x70 [ 15.131145] kasan_save_track+0x18/0x40 [ 15.131285] kasan_save_alloc_info+0x3b/0x50 [ 15.131440] __kasan_kmalloc+0xb7/0xc0 [ 15.131577] __kmalloc_cache_noprof+0x189/0x420 [ 15.131734] kasan_atomics+0x95/0x310 [ 15.132402] kunit_try_run_case+0x1a5/0x480 [ 15.132845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.133465] kthread+0x337/0x6f0 [ 15.133823] ret_from_fork+0x116/0x1d0 [ 15.134419] ret_from_fork_asm+0x1a/0x30 [ 15.134871] [ 15.135042] The buggy address belongs to the object at ffff888102a1a680 [ 15.135042] which belongs to the cache kmalloc-64 of size 64 [ 15.136279] The buggy address is located 0 bytes to the right of [ 15.136279] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.137005] [ 15.137265] The buggy address belongs to the physical page: [ 15.137797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.138239] flags: 0x200000000000000(node=0|zone=2) [ 15.138735] page_type: f5(slab) [ 15.139081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.139640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.140176] page dumped because: kasan: bad access detected [ 15.140679] [ 15.140889] Memory state around the buggy address: [ 15.141120] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.141734] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.141965] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.142627] ^ [ 15.143166] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.143825] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.144510] ================================================================== [ 16.030747] ================================================================== [ 16.031418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.032085] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.032719] [ 16.032901] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.032959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.032972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.032993] Call Trace: [ 16.033009] <TASK> [ 16.033025] dump_stack_lvl+0x73/0xb0 [ 16.033056] print_report+0xd1/0x650 [ 16.033089] ? __virt_addr_valid+0x1db/0x2d0 [ 16.033114] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.033137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.033167] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.033191] kasan_report+0x141/0x180 [ 16.033214] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.033243] kasan_check_range+0x10c/0x1c0 [ 16.033268] __kasan_check_write+0x18/0x20 [ 16.033289] kasan_atomics_helper+0x1d7a/0x5450 [ 16.033314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.033338] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.033366] ? kasan_atomics+0x152/0x310 [ 16.033394] kasan_atomics+0x1dc/0x310 [ 16.033418] ? __pfx_kasan_atomics+0x10/0x10 [ 16.033444] ? __pfx_read_tsc+0x10/0x10 [ 16.033466] ? ktime_get_ts64+0x86/0x230 [ 16.033491] kunit_try_run_case+0x1a5/0x480 [ 16.033517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.033543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.033568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.033594] ? __kthread_parkme+0x82/0x180 [ 16.033615] ? preempt_count_sub+0x50/0x80 [ 16.033641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.033667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.033693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.033719] kthread+0x337/0x6f0 [ 16.033738] ? trace_preempt_on+0x20/0xc0 [ 16.033783] ? __pfx_kthread+0x10/0x10 [ 16.033806] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.033829] ? calculate_sigpending+0x7b/0xa0 [ 16.033853] ? __pfx_kthread+0x10/0x10 [ 16.033876] ret_from_fork+0x116/0x1d0 [ 16.033895] ? __pfx_kthread+0x10/0x10 [ 16.033917] ret_from_fork_asm+0x1a/0x30 [ 16.033959] </TASK> [ 16.033970] [ 16.046089] Allocated by task 282: [ 16.046385] kasan_save_stack+0x45/0x70 [ 16.046794] kasan_save_track+0x18/0x40 [ 16.046984] kasan_save_alloc_info+0x3b/0x50 [ 16.047410] __kasan_kmalloc+0xb7/0xc0 [ 16.047735] __kmalloc_cache_noprof+0x189/0x420 [ 16.047902] kasan_atomics+0x95/0x310 [ 16.048268] kunit_try_run_case+0x1a5/0x480 [ 16.048661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.049177] kthread+0x337/0x6f0 [ 16.049300] ret_from_fork+0x116/0x1d0 [ 16.049433] ret_from_fork_asm+0x1a/0x30 [ 16.049575] [ 16.049646] The buggy address belongs to the object at ffff888102a1a680 [ 16.049646] which belongs to the cache kmalloc-64 of size 64 [ 16.050129] The buggy address is located 0 bytes to the right of [ 16.050129] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.050616] [ 16.050727] The buggy address belongs to the physical page: [ 16.050937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.051429] flags: 0x200000000000000(node=0|zone=2) [ 16.051740] page_type: f5(slab) [ 16.051932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.052260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.052519] page dumped because: kasan: bad access detected [ 16.052794] [ 16.052886] Memory state around the buggy address: [ 16.053098] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.053434] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.053750] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.054073] ^ [ 16.054296] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.054541] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.055045] ================================================================== [ 14.953110] ================================================================== [ 14.953446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.953710] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 14.954145] [ 14.954229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.954331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.954345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.954367] Call Trace: [ 14.954382] <TASK> [ 14.954397] dump_stack_lvl+0x73/0xb0 [ 14.954426] print_report+0xd1/0x650 [ 14.954449] ? __virt_addr_valid+0x1db/0x2d0 [ 14.954472] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.954493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.954524] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.954548] kasan_report+0x141/0x180 [ 14.954571] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.954599] kasan_check_range+0x10c/0x1c0 [ 14.954625] __kasan_check_write+0x18/0x20 [ 14.954646] kasan_atomics_helper+0x4a0/0x5450 [ 14.954669] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.954694] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.954720] ? kasan_atomics+0x152/0x310 [ 14.954747] kasan_atomics+0x1dc/0x310 [ 14.954772] ? __pfx_kasan_atomics+0x10/0x10 [ 14.954798] ? __pfx_read_tsc+0x10/0x10 [ 14.954819] ? ktime_get_ts64+0x86/0x230 [ 14.954844] kunit_try_run_case+0x1a5/0x480 [ 14.954868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.954892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.954928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.954954] ? __kthread_parkme+0x82/0x180 [ 14.954974] ? preempt_count_sub+0x50/0x80 [ 14.954999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.955075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.955102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.955129] kthread+0x337/0x6f0 [ 14.955148] ? trace_preempt_on+0x20/0xc0 [ 14.955173] ? __pfx_kthread+0x10/0x10 [ 14.955194] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.955217] ? calculate_sigpending+0x7b/0xa0 [ 14.955241] ? __pfx_kthread+0x10/0x10 [ 14.955264] ret_from_fork+0x116/0x1d0 [ 14.955283] ? __pfx_kthread+0x10/0x10 [ 14.955305] ret_from_fork_asm+0x1a/0x30 [ 14.955338] </TASK> [ 14.955348] [ 14.963476] Allocated by task 282: [ 14.963666] kasan_save_stack+0x45/0x70 [ 14.963837] kasan_save_track+0x18/0x40 [ 14.964066] kasan_save_alloc_info+0x3b/0x50 [ 14.964424] __kasan_kmalloc+0xb7/0xc0 [ 14.964587] __kmalloc_cache_noprof+0x189/0x420 [ 14.964745] kasan_atomics+0x95/0x310 [ 14.964943] kunit_try_run_case+0x1a5/0x480 [ 14.965278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.965514] kthread+0x337/0x6f0 [ 14.965636] ret_from_fork+0x116/0x1d0 [ 14.965876] ret_from_fork_asm+0x1a/0x30 [ 14.966216] [ 14.966319] The buggy address belongs to the object at ffff888102a1a680 [ 14.966319] which belongs to the cache kmalloc-64 of size 64 [ 14.966759] The buggy address is located 0 bytes to the right of [ 14.966759] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 14.967312] [ 14.967429] The buggy address belongs to the physical page: [ 14.967602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 14.967841] flags: 0x200000000000000(node=0|zone=2) [ 14.968015] page_type: f5(slab) [ 14.968180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.968519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.968980] page dumped because: kasan: bad access detected [ 14.969161] [ 14.969230] Memory state around the buggy address: [ 14.969382] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.969595] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.969810] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.970365] ^ [ 14.970615] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.971225] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.971556] ================================================================== [ 15.969994] ================================================================== [ 15.970557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.971038] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.971303] [ 15.971416] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.971457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.971470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.971491] Call Trace: [ 15.971506] <TASK> [ 15.971522] dump_stack_lvl+0x73/0xb0 [ 15.971553] print_report+0xd1/0x650 [ 15.971576] ? __virt_addr_valid+0x1db/0x2d0 [ 15.971600] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.971623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.971649] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.971672] kasan_report+0x141/0x180 [ 15.971695] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.971724] kasan_check_range+0x10c/0x1c0 [ 15.971749] __kasan_check_write+0x18/0x20 [ 15.971805] kasan_atomics_helper+0x1c18/0x5450 [ 15.971830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.971865] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.971891] ? kasan_atomics+0x152/0x310 [ 15.971927] kasan_atomics+0x1dc/0x310 [ 15.971952] ? __pfx_kasan_atomics+0x10/0x10 [ 15.971978] ? __pfx_read_tsc+0x10/0x10 [ 15.971999] ? ktime_get_ts64+0x86/0x230 [ 15.972024] kunit_try_run_case+0x1a5/0x480 [ 15.972076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972100] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.972125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.972178] ? __kthread_parkme+0x82/0x180 [ 15.972199] ? preempt_count_sub+0x50/0x80 [ 15.972224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972303] kthread+0x337/0x6f0 [ 15.972349] ? trace_preempt_on+0x20/0xc0 [ 15.972373] ? __pfx_kthread+0x10/0x10 [ 15.972396] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.972430] ? calculate_sigpending+0x7b/0xa0 [ 15.972454] ? __pfx_kthread+0x10/0x10 [ 15.972478] ret_from_fork+0x116/0x1d0 [ 15.972522] ? __pfx_kthread+0x10/0x10 [ 15.972544] ret_from_fork_asm+0x1a/0x30 [ 15.972578] </TASK> [ 15.972599] [ 15.980476] Allocated by task 282: [ 15.980646] kasan_save_stack+0x45/0x70 [ 15.980903] kasan_save_track+0x18/0x40 [ 15.981142] kasan_save_alloc_info+0x3b/0x50 [ 15.981351] __kasan_kmalloc+0xb7/0xc0 [ 15.981540] __kmalloc_cache_noprof+0x189/0x420 [ 15.981786] kasan_atomics+0x95/0x310 [ 15.981941] kunit_try_run_case+0x1a5/0x480 [ 15.982139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.982310] kthread+0x337/0x6f0 [ 15.982429] ret_from_fork+0x116/0x1d0 [ 15.982564] ret_from_fork_asm+0x1a/0x30 [ 15.982708] [ 15.982851] The buggy address belongs to the object at ffff888102a1a680 [ 15.982851] which belongs to the cache kmalloc-64 of size 64 [ 15.983418] The buggy address is located 0 bytes to the right of [ 15.983418] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.984027] [ 15.984122] The buggy address belongs to the physical page: [ 15.984334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.984566] flags: 0x200000000000000(node=0|zone=2) [ 15.984811] page_type: f5(slab) [ 15.984986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.985335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.985636] page dumped because: kasan: bad access detected [ 15.985957] [ 15.986062] Memory state around the buggy address: [ 15.986252] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.986493] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.986705] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.986933] ^ [ 15.987165] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.987471] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.987776] ================================================================== [ 15.145113] ================================================================== [ 15.145346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.145574] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.145967] [ 15.146182] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.146226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.146238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.146259] Call Trace: [ 15.146276] <TASK> [ 15.146292] dump_stack_lvl+0x73/0xb0 [ 15.146454] print_report+0xd1/0x650 [ 15.146480] ? __virt_addr_valid+0x1db/0x2d0 [ 15.146525] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.146547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.146572] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.146596] kasan_report+0x141/0x180 [ 15.146620] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.146648] kasan_check_range+0x10c/0x1c0 [ 15.146675] __kasan_check_write+0x18/0x20 [ 15.146698] kasan_atomics_helper+0x8f9/0x5450 [ 15.146723] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.146748] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.146796] ? kasan_atomics+0x152/0x310 [ 15.146824] kasan_atomics+0x1dc/0x310 [ 15.146858] ? __pfx_kasan_atomics+0x10/0x10 [ 15.146884] ? __pfx_read_tsc+0x10/0x10 [ 15.146906] ? ktime_get_ts64+0x86/0x230 [ 15.146939] kunit_try_run_case+0x1a5/0x480 [ 15.146965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.147023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.147059] ? __kthread_parkme+0x82/0x180 [ 15.147134] ? preempt_count_sub+0x50/0x80 [ 15.147159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.147197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.147223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.147260] kthread+0x337/0x6f0 [ 15.147281] ? trace_preempt_on+0x20/0xc0 [ 15.147306] ? __pfx_kthread+0x10/0x10 [ 15.147328] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.147361] ? calculate_sigpending+0x7b/0xa0 [ 15.147385] ? __pfx_kthread+0x10/0x10 [ 15.147407] ret_from_fork+0x116/0x1d0 [ 15.147437] ? __pfx_kthread+0x10/0x10 [ 15.147459] ret_from_fork_asm+0x1a/0x30 [ 15.147492] </TASK> [ 15.147503] [ 15.161639] Allocated by task 282: [ 15.161786] kasan_save_stack+0x45/0x70 [ 15.162170] kasan_save_track+0x18/0x40 [ 15.162539] kasan_save_alloc_info+0x3b/0x50 [ 15.162993] __kasan_kmalloc+0xb7/0xc0 [ 15.163565] __kmalloc_cache_noprof+0x189/0x420 [ 15.164094] kasan_atomics+0x95/0x310 [ 15.164465] kunit_try_run_case+0x1a5/0x480 [ 15.164890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.165595] kthread+0x337/0x6f0 [ 15.166047] ret_from_fork+0x116/0x1d0 [ 15.166413] ret_from_fork_asm+0x1a/0x30 [ 15.166794] [ 15.166974] The buggy address belongs to the object at ffff888102a1a680 [ 15.166974] which belongs to the cache kmalloc-64 of size 64 [ 15.168360] The buggy address is located 0 bytes to the right of [ 15.168360] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.168741] [ 15.168816] The buggy address belongs to the physical page: [ 15.169014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.169369] flags: 0x200000000000000(node=0|zone=2) [ 15.169627] page_type: f5(slab) [ 15.169811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.170173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.170496] page dumped because: kasan: bad access detected [ 15.170725] [ 15.170832] Memory state around the buggy address: [ 15.171296] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.171626] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.171893] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.172260] ^ [ 15.172528] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.172934] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.173200] ================================================================== [ 16.197376] ================================================================== [ 16.197623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.198037] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.198286] [ 16.198368] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.198408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.198421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.198441] Call Trace: [ 16.198455] <TASK> [ 16.198471] dump_stack_lvl+0x73/0xb0 [ 16.198499] print_report+0xd1/0x650 [ 16.198526] ? __virt_addr_valid+0x1db/0x2d0 [ 16.198551] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.198573] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.198598] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.198621] kasan_report+0x141/0x180 [ 16.198644] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.198672] __asan_report_load8_noabort+0x18/0x20 [ 16.198698] kasan_atomics_helper+0x4fb2/0x5450 [ 16.198722] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.198768] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.198794] ? kasan_atomics+0x152/0x310 [ 16.198822] kasan_atomics+0x1dc/0x310 [ 16.198845] ? __pfx_kasan_atomics+0x10/0x10 [ 16.198871] ? __pfx_read_tsc+0x10/0x10 [ 16.198892] ? ktime_get_ts64+0x86/0x230 [ 16.198917] kunit_try_run_case+0x1a5/0x480 [ 16.198951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.198975] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.199000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.199026] ? __kthread_parkme+0x82/0x180 [ 16.199047] ? preempt_count_sub+0x50/0x80 [ 16.199072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.199099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.199126] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.199152] kthread+0x337/0x6f0 [ 16.199172] ? trace_preempt_on+0x20/0xc0 [ 16.199196] ? __pfx_kthread+0x10/0x10 [ 16.199218] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.199240] ? calculate_sigpending+0x7b/0xa0 [ 16.199265] ? __pfx_kthread+0x10/0x10 [ 16.199288] ret_from_fork+0x116/0x1d0 [ 16.199307] ? __pfx_kthread+0x10/0x10 [ 16.199329] ret_from_fork_asm+0x1a/0x30 [ 16.199362] </TASK> [ 16.199374] [ 16.206681] Allocated by task 282: [ 16.206860] kasan_save_stack+0x45/0x70 [ 16.207064] kasan_save_track+0x18/0x40 [ 16.207236] kasan_save_alloc_info+0x3b/0x50 [ 16.207387] __kasan_kmalloc+0xb7/0xc0 [ 16.207521] __kmalloc_cache_noprof+0x189/0x420 [ 16.207678] kasan_atomics+0x95/0x310 [ 16.207838] kunit_try_run_case+0x1a5/0x480 [ 16.207996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.208175] kthread+0x337/0x6f0 [ 16.208343] ret_from_fork+0x116/0x1d0 [ 16.208531] ret_from_fork_asm+0x1a/0x30 [ 16.208730] [ 16.208846] The buggy address belongs to the object at ffff888102a1a680 [ 16.208846] which belongs to the cache kmalloc-64 of size 64 [ 16.209374] The buggy address is located 0 bytes to the right of [ 16.209374] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.209880] [ 16.209964] The buggy address belongs to the physical page: [ 16.210136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.210375] flags: 0x200000000000000(node=0|zone=2) [ 16.210541] page_type: f5(slab) [ 16.210663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.211023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.211369] page dumped because: kasan: bad access detected [ 16.211626] [ 16.211725] Memory state around the buggy address: [ 16.211992] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.212310] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.212633] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.212990] ^ [ 16.213220] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.213536] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.213776] ================================================================== [ 15.782528] ================================================================== [ 15.783527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.783955] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.784193] [ 15.784283] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.784326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.784339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.784359] Call Trace: [ 15.784373] <TASK> [ 15.784389] dump_stack_lvl+0x73/0xb0 [ 15.784419] print_report+0xd1/0x650 [ 15.784441] ? __virt_addr_valid+0x1db/0x2d0 [ 15.784465] ? kasan_atomics_helper+0x164f/0x5450 [ 15.784488] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.784513] ? kasan_atomics_helper+0x164f/0x5450 [ 15.784536] kasan_report+0x141/0x180 [ 15.784559] ? kasan_atomics_helper+0x164f/0x5450 [ 15.784587] kasan_check_range+0x10c/0x1c0 [ 15.784612] __kasan_check_write+0x18/0x20 [ 15.784633] kasan_atomics_helper+0x164f/0x5450 [ 15.784656] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.784680] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.784707] ? kasan_atomics+0x152/0x310 [ 15.784734] kasan_atomics+0x1dc/0x310 [ 15.784769] ? __pfx_kasan_atomics+0x10/0x10 [ 15.784796] ? __pfx_read_tsc+0x10/0x10 [ 15.784818] ? ktime_get_ts64+0x86/0x230 [ 15.784843] kunit_try_run_case+0x1a5/0x480 [ 15.785023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.785048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.785074] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.785100] ? __kthread_parkme+0x82/0x180 [ 15.785121] ? preempt_count_sub+0x50/0x80 [ 15.785148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.785174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.785201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.785227] kthread+0x337/0x6f0 [ 15.785248] ? trace_preempt_on+0x20/0xc0 [ 15.785272] ? __pfx_kthread+0x10/0x10 [ 15.785296] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.785318] ? calculate_sigpending+0x7b/0xa0 [ 15.785343] ? __pfx_kthread+0x10/0x10 [ 15.785366] ret_from_fork+0x116/0x1d0 [ 15.785386] ? __pfx_kthread+0x10/0x10 [ 15.785408] ret_from_fork_asm+0x1a/0x30 [ 15.785441] </TASK> [ 15.785452] [ 15.795950] Allocated by task 282: [ 15.796139] kasan_save_stack+0x45/0x70 [ 15.796346] kasan_save_track+0x18/0x40 [ 15.796539] kasan_save_alloc_info+0x3b/0x50 [ 15.796847] __kasan_kmalloc+0xb7/0xc0 [ 15.796993] __kmalloc_cache_noprof+0x189/0x420 [ 15.797149] kasan_atomics+0x95/0x310 [ 15.797314] kunit_try_run_case+0x1a5/0x480 [ 15.797524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.797826] kthread+0x337/0x6f0 [ 15.797988] ret_from_fork+0x116/0x1d0 [ 15.798151] ret_from_fork_asm+0x1a/0x30 [ 15.798291] [ 15.798362] The buggy address belongs to the object at ffff888102a1a680 [ 15.798362] which belongs to the cache kmalloc-64 of size 64 [ 15.798861] The buggy address is located 0 bytes to the right of [ 15.798861] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.799413] [ 15.799485] The buggy address belongs to the physical page: [ 15.799667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.800410] flags: 0x200000000000000(node=0|zone=2) [ 15.800627] page_type: f5(slab) [ 15.800773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.801107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.801357] page dumped because: kasan: bad access detected [ 15.801582] [ 15.801679] Memory state around the buggy address: [ 15.802011] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.802298] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.802586] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.802898] ^ [ 15.803088] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.803306] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.803518] ================================================================== [ 15.718485] ================================================================== [ 15.718723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.719082] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.719568] [ 15.719777] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.719818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.719830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.719850] Call Trace: [ 15.719865] <TASK> [ 15.719881] dump_stack_lvl+0x73/0xb0 [ 15.719908] print_report+0xd1/0x650 [ 15.719942] ? __virt_addr_valid+0x1db/0x2d0 [ 15.719966] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.719989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.720012] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.720036] kasan_report+0x141/0x180 [ 15.720059] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.720088] __asan_report_store8_noabort+0x1b/0x30 [ 15.720115] kasan_atomics_helper+0x50d4/0x5450 [ 15.720139] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.720163] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.720189] ? kasan_atomics+0x152/0x310 [ 15.720217] kasan_atomics+0x1dc/0x310 [ 15.720241] ? __pfx_kasan_atomics+0x10/0x10 [ 15.720266] ? __pfx_read_tsc+0x10/0x10 [ 15.720287] ? ktime_get_ts64+0x86/0x230 [ 15.720312] kunit_try_run_case+0x1a5/0x480 [ 15.720337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.720361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.720386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.720411] ? __kthread_parkme+0x82/0x180 [ 15.720432] ? preempt_count_sub+0x50/0x80 [ 15.720457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.720482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.720508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.720534] kthread+0x337/0x6f0 [ 15.720554] ? trace_preempt_on+0x20/0xc0 [ 15.720578] ? __pfx_kthread+0x10/0x10 [ 15.720600] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.720623] ? calculate_sigpending+0x7b/0xa0 [ 15.720648] ? __pfx_kthread+0x10/0x10 [ 15.720670] ret_from_fork+0x116/0x1d0 [ 15.720690] ? __pfx_kthread+0x10/0x10 [ 15.720711] ret_from_fork_asm+0x1a/0x30 [ 15.720744] </TASK> [ 15.720768] [ 15.728207] Allocated by task 282: [ 15.728382] kasan_save_stack+0x45/0x70 [ 15.728586] kasan_save_track+0x18/0x40 [ 15.728809] kasan_save_alloc_info+0x3b/0x50 [ 15.729033] __kasan_kmalloc+0xb7/0xc0 [ 15.729225] __kmalloc_cache_noprof+0x189/0x420 [ 15.729434] kasan_atomics+0x95/0x310 [ 15.729610] kunit_try_run_case+0x1a5/0x480 [ 15.729757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.729943] kthread+0x337/0x6f0 [ 15.730063] ret_from_fork+0x116/0x1d0 [ 15.730195] ret_from_fork_asm+0x1a/0x30 [ 15.730335] [ 15.730404] The buggy address belongs to the object at ffff888102a1a680 [ 15.730404] which belongs to the cache kmalloc-64 of size 64 [ 15.730858] The buggy address is located 0 bytes to the right of [ 15.730858] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.731930] [ 15.732005] The buggy address belongs to the physical page: [ 15.732176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.732413] flags: 0x200000000000000(node=0|zone=2) [ 15.732573] page_type: f5(slab) [ 15.732691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.733404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.733746] page dumped because: kasan: bad access detected [ 15.734022] [ 15.734118] Memory state around the buggy address: [ 15.734313] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.734534] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.734748] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.735083] ^ [ 15.735311] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.735634] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.736031] ================================================================== [ 16.285526] ================================================================== [ 16.285988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.286356] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 16.286662] [ 16.286789] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.286831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.286854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.286875] Call Trace: [ 16.286888] <TASK> [ 16.286903] dump_stack_lvl+0x73/0xb0 [ 16.286942] print_report+0xd1/0x650 [ 16.286964] ? __virt_addr_valid+0x1db/0x2d0 [ 16.286987] ? kasan_atomics_helper+0x5115/0x5450 [ 16.287040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.287064] ? kasan_atomics_helper+0x5115/0x5450 [ 16.287087] kasan_report+0x141/0x180 [ 16.287121] ? kasan_atomics_helper+0x5115/0x5450 [ 16.287175] __asan_report_load8_noabort+0x18/0x20 [ 16.287201] kasan_atomics_helper+0x5115/0x5450 [ 16.287226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.287260] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.287287] ? kasan_atomics+0x152/0x310 [ 16.287340] kasan_atomics+0x1dc/0x310 [ 16.287365] ? __pfx_kasan_atomics+0x10/0x10 [ 16.287401] ? __pfx_read_tsc+0x10/0x10 [ 16.287423] ? ktime_get_ts64+0x86/0x230 [ 16.287468] kunit_try_run_case+0x1a5/0x480 [ 16.287495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.287519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.287545] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.287570] ? __kthread_parkme+0x82/0x180 [ 16.287610] ? preempt_count_sub+0x50/0x80 [ 16.287648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.287711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.287769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.287795] kthread+0x337/0x6f0 [ 16.287815] ? trace_preempt_on+0x20/0xc0 [ 16.287851] ? __pfx_kthread+0x10/0x10 [ 16.287872] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.287895] ? calculate_sigpending+0x7b/0xa0 [ 16.287929] ? __pfx_kthread+0x10/0x10 [ 16.287951] ret_from_fork+0x116/0x1d0 [ 16.287971] ? __pfx_kthread+0x10/0x10 [ 16.287993] ret_from_fork_asm+0x1a/0x30 [ 16.288026] </TASK> [ 16.288037] [ 16.295824] Allocated by task 282: [ 16.296152] kasan_save_stack+0x45/0x70 [ 16.296449] kasan_save_track+0x18/0x40 [ 16.296683] kasan_save_alloc_info+0x3b/0x50 [ 16.296972] __kasan_kmalloc+0xb7/0xc0 [ 16.297102] __kmalloc_cache_noprof+0x189/0x420 [ 16.297252] kasan_atomics+0x95/0x310 [ 16.297380] kunit_try_run_case+0x1a5/0x480 [ 16.297589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.298036] kthread+0x337/0x6f0 [ 16.298275] ret_from_fork+0x116/0x1d0 [ 16.298531] ret_from_fork_asm+0x1a/0x30 [ 16.298743] [ 16.298851] The buggy address belongs to the object at ffff888102a1a680 [ 16.298851] which belongs to the cache kmalloc-64 of size 64 [ 16.299337] The buggy address is located 0 bytes to the right of [ 16.299337] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 16.299928] [ 16.300085] The buggy address belongs to the physical page: [ 16.300453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 16.300723] flags: 0x200000000000000(node=0|zone=2) [ 16.301167] page_type: f5(slab) [ 16.301375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.301757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.302053] page dumped because: kasan: bad access detected [ 16.302469] [ 16.302683] Memory state around the buggy address: [ 16.302894] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.303218] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.303476] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.303679] ^ [ 16.304065] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.304415] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.304768] ================================================================== [ 15.847274] ================================================================== [ 15.847712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.847958] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.848809] [ 15.848970] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.849018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.849031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.849052] Call Trace: [ 15.849069] <TASK> [ 15.849087] dump_stack_lvl+0x73/0xb0 [ 15.849118] print_report+0xd1/0x650 [ 15.849141] ? __virt_addr_valid+0x1db/0x2d0 [ 15.849165] ? kasan_atomics_helper+0x1818/0x5450 [ 15.849188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.849212] ? kasan_atomics_helper+0x1818/0x5450 [ 15.849235] kasan_report+0x141/0x180 [ 15.849258] ? kasan_atomics_helper+0x1818/0x5450 [ 15.849286] kasan_check_range+0x10c/0x1c0 [ 15.849311] __kasan_check_write+0x18/0x20 [ 15.849331] kasan_atomics_helper+0x1818/0x5450 [ 15.849356] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.849379] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.849406] ? kasan_atomics+0x152/0x310 [ 15.849433] kasan_atomics+0x1dc/0x310 [ 15.849457] ? __pfx_kasan_atomics+0x10/0x10 [ 15.849482] ? __pfx_read_tsc+0x10/0x10 [ 15.849504] ? ktime_get_ts64+0x86/0x230 [ 15.849529] kunit_try_run_case+0x1a5/0x480 [ 15.849554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.849602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.849627] ? __kthread_parkme+0x82/0x180 [ 15.849649] ? preempt_count_sub+0x50/0x80 [ 15.849675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.849725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.849753] kthread+0x337/0x6f0 [ 15.849773] ? trace_preempt_on+0x20/0xc0 [ 15.849797] ? __pfx_kthread+0x10/0x10 [ 15.849818] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.849841] ? calculate_sigpending+0x7b/0xa0 [ 15.849866] ? __pfx_kthread+0x10/0x10 [ 15.849889] ret_from_fork+0x116/0x1d0 [ 15.849907] ? __pfx_kthread+0x10/0x10 [ 15.849940] ret_from_fork_asm+0x1a/0x30 [ 15.849973] </TASK> [ 15.849984] [ 15.857319] Allocated by task 282: [ 15.857495] kasan_save_stack+0x45/0x70 [ 15.857697] kasan_save_track+0x18/0x40 [ 15.858010] kasan_save_alloc_info+0x3b/0x50 [ 15.858223] __kasan_kmalloc+0xb7/0xc0 [ 15.858372] __kmalloc_cache_noprof+0x189/0x420 [ 15.858535] kasan_atomics+0x95/0x310 [ 15.858669] kunit_try_run_case+0x1a5/0x480 [ 15.858868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.859233] kthread+0x337/0x6f0 [ 15.859408] ret_from_fork+0x116/0x1d0 [ 15.859581] ret_from_fork_asm+0x1a/0x30 [ 15.859725] [ 15.859941] The buggy address belongs to the object at ffff888102a1a680 [ 15.859941] which belongs to the cache kmalloc-64 of size 64 [ 15.860387] The buggy address is located 0 bytes to the right of [ 15.860387] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.860810] [ 15.860905] The buggy address belongs to the physical page: [ 15.861165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.861520] flags: 0x200000000000000(node=0|zone=2) [ 15.861765] page_type: f5(slab) [ 15.861942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.862243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.862507] page dumped because: kasan: bad access detected [ 15.862753] [ 15.862853] Memory state around the buggy address: [ 15.863057] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.863273] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.863489] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.863805] ^ [ 15.864037] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864345] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864561] ================================================================== [ 15.864978] ================================================================== [ 15.865319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.865670] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.866012] [ 15.866118] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.866160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.866172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.866192] Call Trace: [ 15.866206] <TASK> [ 15.866220] dump_stack_lvl+0x73/0xb0 [ 15.866249] print_report+0xd1/0x650 [ 15.866272] ? __virt_addr_valid+0x1db/0x2d0 [ 15.866295] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.866317] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.866342] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.866365] kasan_report+0x141/0x180 [ 15.866388] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.866415] kasan_check_range+0x10c/0x1c0 [ 15.866440] __kasan_check_write+0x18/0x20 [ 15.866473] kasan_atomics_helper+0x18b1/0x5450 [ 15.866497] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.866528] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.866554] ? kasan_atomics+0x152/0x310 [ 15.866583] kasan_atomics+0x1dc/0x310 [ 15.866608] ? __pfx_kasan_atomics+0x10/0x10 [ 15.866633] ? __pfx_read_tsc+0x10/0x10 [ 15.866655] ? ktime_get_ts64+0x86/0x230 [ 15.866682] kunit_try_run_case+0x1a5/0x480 [ 15.866710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.866736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.866769] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.866794] ? __kthread_parkme+0x82/0x180 [ 15.866816] ? preempt_count_sub+0x50/0x80 [ 15.866840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.866866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.866892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.866929] kthread+0x337/0x6f0 [ 15.866950] ? trace_preempt_on+0x20/0xc0 [ 15.866974] ? __pfx_kthread+0x10/0x10 [ 15.866996] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.867018] ? calculate_sigpending+0x7b/0xa0 [ 15.867043] ? __pfx_kthread+0x10/0x10 [ 15.867065] ret_from_fork+0x116/0x1d0 [ 15.867086] ? __pfx_kthread+0x10/0x10 [ 15.867107] ret_from_fork_asm+0x1a/0x30 [ 15.867141] </TASK> [ 15.867151] [ 15.874490] Allocated by task 282: [ 15.874653] kasan_save_stack+0x45/0x70 [ 15.874862] kasan_save_track+0x18/0x40 [ 15.875011] kasan_save_alloc_info+0x3b/0x50 [ 15.875191] __kasan_kmalloc+0xb7/0xc0 [ 15.875384] __kmalloc_cache_noprof+0x189/0x420 [ 15.875607] kasan_atomics+0x95/0x310 [ 15.875835] kunit_try_run_case+0x1a5/0x480 [ 15.876036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.876220] kthread+0x337/0x6f0 [ 15.876391] ret_from_fork+0x116/0x1d0 [ 15.876572] ret_from_fork_asm+0x1a/0x30 [ 15.876712] [ 15.876861] The buggy address belongs to the object at ffff888102a1a680 [ 15.876861] which belongs to the cache kmalloc-64 of size 64 [ 15.877394] The buggy address is located 0 bytes to the right of [ 15.877394] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.877762] [ 15.877856] The buggy address belongs to the physical page: [ 15.878186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.878621] flags: 0x200000000000000(node=0|zone=2) [ 15.878885] page_type: f5(slab) [ 15.879026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.879300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.879531] page dumped because: kasan: bad access detected [ 15.879767] [ 15.879862] Memory state around the buggy address: [ 15.880099] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.880429] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.880669] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.881064] ^ [ 15.881282] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.881498] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.881778] ================================================================== [ 15.535767] ================================================================== [ 15.536176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.536583] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.537236] [ 15.537350] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.537392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.537405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.537426] Call Trace: [ 15.537441] <TASK> [ 15.537457] dump_stack_lvl+0x73/0xb0 [ 15.537487] print_report+0xd1/0x650 [ 15.537510] ? __virt_addr_valid+0x1db/0x2d0 [ 15.537533] ? kasan_atomics_helper+0x1217/0x5450 [ 15.537556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.537581] ? kasan_atomics_helper+0x1217/0x5450 [ 15.537604] kasan_report+0x141/0x180 [ 15.537628] ? kasan_atomics_helper+0x1217/0x5450 [ 15.537656] kasan_check_range+0x10c/0x1c0 [ 15.537681] __kasan_check_write+0x18/0x20 [ 15.537703] kasan_atomics_helper+0x1217/0x5450 [ 15.537727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.538786] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.538835] ? kasan_atomics+0x152/0x310 [ 15.538867] kasan_atomics+0x1dc/0x310 [ 15.538894] ? __pfx_kasan_atomics+0x10/0x10 [ 15.538930] ? __pfx_read_tsc+0x10/0x10 [ 15.538953] ? ktime_get_ts64+0x86/0x230 [ 15.538982] kunit_try_run_case+0x1a5/0x480 [ 15.539010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.539034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.539059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.539085] ? __kthread_parkme+0x82/0x180 [ 15.539106] ? preempt_count_sub+0x50/0x80 [ 15.539132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.539158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.539184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.539211] kthread+0x337/0x6f0 [ 15.539231] ? trace_preempt_on+0x20/0xc0 [ 15.539256] ? __pfx_kthread+0x10/0x10 [ 15.539278] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.539300] ? calculate_sigpending+0x7b/0xa0 [ 15.539325] ? __pfx_kthread+0x10/0x10 [ 15.539347] ret_from_fork+0x116/0x1d0 [ 15.539367] ? __pfx_kthread+0x10/0x10 [ 15.539388] ret_from_fork_asm+0x1a/0x30 [ 15.539421] </TASK> [ 15.539432] [ 15.551531] Allocated by task 282: [ 15.551665] kasan_save_stack+0x45/0x70 [ 15.552171] kasan_save_track+0x18/0x40 [ 15.552512] kasan_save_alloc_info+0x3b/0x50 [ 15.553000] __kasan_kmalloc+0xb7/0xc0 [ 15.553391] __kmalloc_cache_noprof+0x189/0x420 [ 15.553930] kasan_atomics+0x95/0x310 [ 15.554326] kunit_try_run_case+0x1a5/0x480 [ 15.554766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.555296] kthread+0x337/0x6f0 [ 15.555647] ret_from_fork+0x116/0x1d0 [ 15.556087] ret_from_fork_asm+0x1a/0x30 [ 15.556487] [ 15.556699] The buggy address belongs to the object at ffff888102a1a680 [ 15.556699] which belongs to the cache kmalloc-64 of size 64 [ 15.557686] The buggy address is located 0 bytes to the right of [ 15.557686] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.558203] [ 15.558280] The buggy address belongs to the physical page: [ 15.558452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.558694] flags: 0x200000000000000(node=0|zone=2) [ 15.558878] page_type: f5(slab) [ 15.559009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.559587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.560509] page dumped because: kasan: bad access detected [ 15.561163] [ 15.561340] Memory state around the buggy address: [ 15.561607] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.562197] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.562420] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.562641] ^ [ 15.562956] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.563610] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.564306] ================================================================== [ 15.173763] ================================================================== [ 15.174235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.174519] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.174884] [ 15.175001] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.175054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.175066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.175087] Call Trace: [ 15.175274] <TASK> [ 15.175299] dump_stack_lvl+0x73/0xb0 [ 15.175333] print_report+0xd1/0x650 [ 15.175371] ? __virt_addr_valid+0x1db/0x2d0 [ 15.175405] ? kasan_atomics_helper+0x992/0x5450 [ 15.175428] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.175453] ? kasan_atomics_helper+0x992/0x5450 [ 15.175487] kasan_report+0x141/0x180 [ 15.175510] ? kasan_atomics_helper+0x992/0x5450 [ 15.175538] kasan_check_range+0x10c/0x1c0 [ 15.175562] __kasan_check_write+0x18/0x20 [ 15.175582] kasan_atomics_helper+0x992/0x5450 [ 15.175606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.175630] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.175656] ? kasan_atomics+0x152/0x310 [ 15.175685] kasan_atomics+0x1dc/0x310 [ 15.175708] ? __pfx_kasan_atomics+0x10/0x10 [ 15.175734] ? __pfx_read_tsc+0x10/0x10 [ 15.175763] ? ktime_get_ts64+0x86/0x230 [ 15.175799] kunit_try_run_case+0x1a5/0x480 [ 15.175823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.175847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.175883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.175915] ? __kthread_parkme+0x82/0x180 [ 15.175947] ? preempt_count_sub+0x50/0x80 [ 15.175972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.176009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.176034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.176061] kthread+0x337/0x6f0 [ 15.176081] ? trace_preempt_on+0x20/0xc0 [ 15.176106] ? __pfx_kthread+0x10/0x10 [ 15.176128] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.176151] ? calculate_sigpending+0x7b/0xa0 [ 15.176176] ? __pfx_kthread+0x10/0x10 [ 15.176200] ret_from_fork+0x116/0x1d0 [ 15.176219] ? __pfx_kthread+0x10/0x10 [ 15.176241] ret_from_fork_asm+0x1a/0x30 [ 15.176275] </TASK> [ 15.176343] [ 15.185023] Allocated by task 282: [ 15.185166] kasan_save_stack+0x45/0x70 [ 15.185392] kasan_save_track+0x18/0x40 [ 15.185586] kasan_save_alloc_info+0x3b/0x50 [ 15.185800] __kasan_kmalloc+0xb7/0xc0 [ 15.186119] __kmalloc_cache_noprof+0x189/0x420 [ 15.186276] kasan_atomics+0x95/0x310 [ 15.186543] kunit_try_run_case+0x1a5/0x480 [ 15.186815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.187108] kthread+0x337/0x6f0 [ 15.187321] ret_from_fork+0x116/0x1d0 [ 15.187500] ret_from_fork_asm+0x1a/0x30 [ 15.187698] [ 15.187815] The buggy address belongs to the object at ffff888102a1a680 [ 15.187815] which belongs to the cache kmalloc-64 of size 64 [ 15.188449] The buggy address is located 0 bytes to the right of [ 15.188449] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.188836] [ 15.189000] The buggy address belongs to the physical page: [ 15.189418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.189784] flags: 0x200000000000000(node=0|zone=2) [ 15.189961] page_type: f5(slab) [ 15.190197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.190550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.190874] page dumped because: kasan: bad access detected [ 15.191362] [ 15.191466] Memory state around the buggy address: [ 15.191689] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.192276] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.192502] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.192846] ^ [ 15.193243] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.193604] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.193985] ================================================================== [ 15.294970] ================================================================== [ 15.295405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.295746] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282 [ 15.296077] [ 15.296164] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.296209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.296222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.296243] Call Trace: [ 15.296261] <TASK> [ 15.296278] dump_stack_lvl+0x73/0xb0 [ 15.296320] print_report+0xd1/0x650 [ 15.296343] ? __virt_addr_valid+0x1db/0x2d0 [ 15.296368] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.296403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.296428] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.296452] kasan_report+0x141/0x180 [ 15.296486] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.296514] __asan_report_load4_noabort+0x18/0x20 [ 15.296540] kasan_atomics_helper+0x4a84/0x5450 [ 15.296565] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.296588] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.296614] ? kasan_atomics+0x152/0x310 [ 15.296642] kasan_atomics+0x1dc/0x310 [ 15.296665] ? __pfx_kasan_atomics+0x10/0x10 [ 15.296691] ? __pfx_read_tsc+0x10/0x10 [ 15.296713] ? ktime_get_ts64+0x86/0x230 [ 15.296738] kunit_try_run_case+0x1a5/0x480 [ 15.296773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.296797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.296832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.296857] ? __kthread_parkme+0x82/0x180 [ 15.296889] ? preempt_count_sub+0x50/0x80 [ 15.296916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.296950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.296976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.297002] kthread+0x337/0x6f0 [ 15.297021] ? trace_preempt_on+0x20/0xc0 [ 15.297055] ? __pfx_kthread+0x10/0x10 [ 15.297076] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.297098] ? calculate_sigpending+0x7b/0xa0 [ 15.297134] ? __pfx_kthread+0x10/0x10 [ 15.297157] ret_from_fork+0x116/0x1d0 [ 15.297176] ? __pfx_kthread+0x10/0x10 [ 15.297198] ret_from_fork_asm+0x1a/0x30 [ 15.297240] </TASK> [ 15.297251] [ 15.305204] Allocated by task 282: [ 15.305375] kasan_save_stack+0x45/0x70 [ 15.305575] kasan_save_track+0x18/0x40 [ 15.305778] kasan_save_alloc_info+0x3b/0x50 [ 15.305990] __kasan_kmalloc+0xb7/0xc0 [ 15.306124] __kmalloc_cache_noprof+0x189/0x420 [ 15.306303] kasan_atomics+0x95/0x310 [ 15.306490] kunit_try_run_case+0x1a5/0x480 [ 15.306728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.307074] kthread+0x337/0x6f0 [ 15.307197] ret_from_fork+0x116/0x1d0 [ 15.307329] ret_from_fork_asm+0x1a/0x30 [ 15.307526] [ 15.307618] The buggy address belongs to the object at ffff888102a1a680 [ 15.307618] which belongs to the cache kmalloc-64 of size 64 [ 15.308332] The buggy address is located 0 bytes to the right of [ 15.308332] allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0) [ 15.308912] [ 15.309022] The buggy address belongs to the physical page: [ 15.309287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a [ 15.309632] flags: 0x200000000000000(node=0|zone=2) [ 15.309904] page_type: f5(slab) [ 15.310087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.310317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.310545] page dumped because: kasan: bad access detected [ 15.310734] [ 15.310827] Memory state around the buggy address: [ 15.311088] ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.311416] ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.311732] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.312098] ^ [ 15.312252] ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.312465] ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.312676] ==================================================================