Date
July 12, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.132115] ================================================================== [ 19.132164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.132271] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.132615] [ 19.132658] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.132745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.132773] Hardware name: linux,dummy-virt (DT) [ 19.132806] Call trace: [ 19.132828] show_stack+0x20/0x38 (C) [ 19.132881] dump_stack_lvl+0x8c/0xd0 [ 19.132927] print_report+0x118/0x5d0 [ 19.132975] kasan_report+0xdc/0x128 [ 19.133021] __asan_report_load4_noabort+0x20/0x30 [ 19.133075] kasan_atomics_helper+0x42d8/0x4858 [ 19.133126] kasan_atomics+0x198/0x2e0 [ 19.134303] kasan_save_alloc_info+0x40/0x58 [ 19.134907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.135899] The buggy address is located 0 bytes to the right of [ 19.135899] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.136046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.137095] [ 19.137431] ^ [ 19.138446] ================================================================== [ 19.293407] ================================================================== [ 19.293463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.293517] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.295385] [ 19.295997] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.296718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.296884] Hardware name: linux,dummy-virt (DT) [ 19.297452] Call trace: [ 19.297543] show_stack+0x20/0x38 (C) [ 19.298119] dump_stack_lvl+0x8c/0xd0 [ 19.298301] print_report+0x118/0x5d0 [ 19.298352] kasan_report+0xdc/0x128 [ 19.298401] kasan_check_range+0x100/0x1a8 [ 19.298453] __kasan_check_write+0x20/0x30 [ 19.298499] kasan_atomics_helper+0x10c0/0x4858 [ 19.298550] kasan_atomics+0x198/0x2e0 [ 19.298595] kunit_try_run_case+0x170/0x3f0 [ 19.298645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298699] kthread+0x328/0x630 [ 19.298741] ret_from_fork+0x10/0x20 [ 19.298788] [ 19.298810] Allocated by task 265: [ 19.298839] kasan_save_stack+0x3c/0x68 [ 19.298883] kasan_save_track+0x20/0x40 [ 19.298923] kasan_save_alloc_info+0x40/0x58 [ 19.298964] __kasan_kmalloc+0xd4/0xd8 [ 19.299003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.299045] kasan_atomics+0xb8/0x2e0 [ 19.299083] kunit_try_run_case+0x170/0x3f0 [ 19.299122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.299168] kthread+0x328/0x630 [ 19.299221] ret_from_fork+0x10/0x20 [ 19.299259] [ 19.299281] The buggy address belongs to the object at fff00000c65b1c00 [ 19.299281] which belongs to the cache kmalloc-64 of size 64 [ 19.299345] The buggy address is located 0 bytes to the right of [ 19.299345] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.299414] [ 19.299435] The buggy address belongs to the physical page: [ 19.299468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.299526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.299578] page_type: f5(slab) [ 19.299618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.299673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.299717] page dumped because: kasan: bad access detected [ 19.299752] [ 19.299771] Memory state around the buggy address: [ 19.299805] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.299850] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.299896] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.299938] ^ [ 19.299971] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.300016] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.300057] ================================================================== [ 19.483000] ================================================================== [ 19.483328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.483675] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.483984] [ 19.484082] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.484181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.484212] Hardware name: linux,dummy-virt (DT) [ 19.484246] Call trace: [ 19.484281] show_stack+0x20/0x38 (C) [ 19.484332] dump_stack_lvl+0x8c/0xd0 [ 19.484571] print_report+0x118/0x5d0 [ 19.484626] kasan_report+0xdc/0x128 [ 19.485308] __asan_report_load8_noabort+0x20/0x30 [ 19.485546] kasan_atomics_helper+0x3e20/0x4858 [ 19.485774] kasan_atomics+0x198/0x2e0 [ 19.485828] kunit_try_run_case+0x170/0x3f0 [ 19.485876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.486117] kthread+0x328/0x630 [ 19.486165] ret_from_fork+0x10/0x20 [ 19.486226] [ 19.486528] Allocated by task 265: [ 19.486564] kasan_save_stack+0x3c/0x68 [ 19.486698] kasan_save_track+0x20/0x40 [ 19.486804] kasan_save_alloc_info+0x40/0x58 [ 19.486870] __kasan_kmalloc+0xd4/0xd8 [ 19.486907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.486949] kasan_atomics+0xb8/0x2e0 [ 19.486985] kunit_try_run_case+0x170/0x3f0 [ 19.487079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487125] kthread+0x328/0x630 [ 19.487506] ret_from_fork+0x10/0x20 [ 19.487792] [ 19.487994] The buggy address belongs to the object at fff00000c65b1c00 [ 19.487994] which belongs to the cache kmalloc-64 of size 64 [ 19.488204] The buggy address is located 0 bytes to the right of [ 19.488204] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.488488] [ 19.488535] The buggy address belongs to the physical page: [ 19.488570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.488630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.488886] page_type: f5(slab) [ 19.489049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.489404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.489459] page dumped because: kasan: bad access detected [ 19.489494] [ 19.489513] Memory state around the buggy address: [ 19.489551] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.490137] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.490450] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.490498] ^ [ 19.490623] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.490682] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.490725] ================================================================== [ 19.323110] ================================================================== [ 19.323190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.323370] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.323772] [ 19.324078] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.324386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.324463] Hardware name: linux,dummy-virt (DT) [ 19.324535] Call trace: [ 19.324686] show_stack+0x20/0x38 (C) [ 19.324759] dump_stack_lvl+0x8c/0xd0 [ 19.324835] print_report+0x118/0x5d0 [ 19.325243] kasan_report+0xdc/0x128 [ 19.325572] kasan_check_range+0x100/0x1a8 [ 19.325816] __kasan_check_write+0x20/0x30 [ 19.325898] kasan_atomics_helper+0x11f8/0x4858 [ 19.325955] kasan_atomics+0x198/0x2e0 [ 19.326002] kunit_try_run_case+0x170/0x3f0 [ 19.326051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.326128] kthread+0x328/0x630 [ 19.326205] ret_from_fork+0x10/0x20 [ 19.326255] [ 19.326276] Allocated by task 265: [ 19.326314] kasan_save_stack+0x3c/0x68 [ 19.326361] kasan_save_track+0x20/0x40 [ 19.326409] kasan_save_alloc_info+0x40/0x58 [ 19.326462] __kasan_kmalloc+0xd4/0xd8 [ 19.326510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.326551] kasan_atomics+0xb8/0x2e0 [ 19.326590] kunit_try_run_case+0x170/0x3f0 [ 19.326630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.326683] kthread+0x328/0x630 [ 19.326727] ret_from_fork+0x10/0x20 [ 19.326766] [ 19.326787] The buggy address belongs to the object at fff00000c65b1c00 [ 19.326787] which belongs to the cache kmalloc-64 of size 64 [ 19.326851] The buggy address is located 0 bytes to the right of [ 19.326851] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.326920] [ 19.326952] The buggy address belongs to the physical page: [ 19.327006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.327070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.327128] page_type: f5(slab) [ 19.327189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.327245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.327304] page dumped because: kasan: bad access detected [ 19.327340] [ 19.327360] Memory state around the buggy address: [ 19.328065] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.328143] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.328217] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.328530] ^ [ 19.328693] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.329289] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.329458] ================================================================== [ 19.244736] ================================================================== [ 19.244840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.245254] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.245318] [ 19.245396] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.245482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.245550] Hardware name: linux,dummy-virt (DT) [ 19.245585] Call trace: [ 19.245608] show_stack+0x20/0x38 (C) [ 19.245820] dump_stack_lvl+0x8c/0xd0 [ 19.245879] print_report+0x118/0x5d0 [ 19.245928] kasan_report+0xdc/0x128 [ 19.245979] kasan_check_range+0x100/0x1a8 [ 19.246238] __kasan_check_write+0x20/0x30 [ 19.246290] kasan_atomics_helper+0xeb8/0x4858 [ 19.246346] kasan_atomics+0x198/0x2e0 [ 19.246439] kunit_try_run_case+0x170/0x3f0 [ 19.246494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.246704] kthread+0x328/0x630 [ 19.246747] ret_from_fork+0x10/0x20 [ 19.246795] [ 19.246816] Allocated by task 265: [ 19.246845] kasan_save_stack+0x3c/0x68 [ 19.246888] kasan_save_track+0x20/0x40 [ 19.246939] kasan_save_alloc_info+0x40/0x58 [ 19.246982] __kasan_kmalloc+0xd4/0xd8 [ 19.247118] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.247415] kasan_atomics+0xb8/0x2e0 [ 19.247453] kunit_try_run_case+0x170/0x3f0 [ 19.247495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.247897] kthread+0x328/0x630 [ 19.247939] ret_from_fork+0x10/0x20 [ 19.247977] [ 19.248050] The buggy address belongs to the object at fff00000c65b1c00 [ 19.248050] which belongs to the cache kmalloc-64 of size 64 [ 19.248258] The buggy address is located 0 bytes to the right of [ 19.248258] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.248344] [ 19.248367] The buggy address belongs to the physical page: [ 19.248401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.248520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.248668] page_type: f5(slab) [ 19.248711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.248849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.248916] page dumped because: kasan: bad access detected [ 19.248980] [ 19.249002] Memory state around the buggy address: [ 19.249037] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.249126] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.249217] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.249256] ^ [ 19.249291] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.249472] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.249517] ================================================================== [ 19.343338] ================================================================== [ 19.343394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.343446] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.343500] [ 19.343990] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.344383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.344457] Hardware name: linux,dummy-virt (DT) [ 19.344625] Call trace: [ 19.344704] show_stack+0x20/0x38 (C) [ 19.344886] dump_stack_lvl+0x8c/0xd0 [ 19.345075] print_report+0x118/0x5d0 [ 19.345265] kasan_report+0xdc/0x128 [ 19.345325] kasan_check_range+0x100/0x1a8 [ 19.345546] __kasan_check_write+0x20/0x30 [ 19.345764] kasan_atomics_helper+0x12d8/0x4858 [ 19.345856] kasan_atomics+0x198/0x2e0 [ 19.346042] kunit_try_run_case+0x170/0x3f0 [ 19.346278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.346491] kthread+0x328/0x630 [ 19.346546] ret_from_fork+0x10/0x20 [ 19.347026] [ 19.347124] Allocated by task 265: [ 19.347444] kasan_save_stack+0x3c/0x68 [ 19.347524] kasan_save_track+0x20/0x40 [ 19.347741] kasan_save_alloc_info+0x40/0x58 [ 19.347959] __kasan_kmalloc+0xd4/0xd8 [ 19.348183] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.348275] kasan_atomics+0xb8/0x2e0 [ 19.348479] kunit_try_run_case+0x170/0x3f0 [ 19.348596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.349199] kthread+0x328/0x630 [ 19.349295] ret_from_fork+0x10/0x20 [ 19.349356] [ 19.349503] The buggy address belongs to the object at fff00000c65b1c00 [ 19.349503] which belongs to the cache kmalloc-64 of size 64 [ 19.349714] The buggy address is located 0 bytes to the right of [ 19.349714] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.350261] [ 19.350442] The buggy address belongs to the physical page: [ 19.350492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.350716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.351045] page_type: f5(slab) [ 19.351342] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.351500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.351572] page dumped because: kasan: bad access detected [ 19.351924] [ 19.352017] Memory state around the buggy address: [ 19.352112] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.352332] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.352425] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.352591] ^ [ 19.352652] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.352700] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.352750] ================================================================== [ 19.237914] ================================================================== [ 19.237971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.238021] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.238803] [ 19.238841] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.238928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.238956] Hardware name: linux,dummy-virt (DT) [ 19.238989] Call trace: [ 19.239011] show_stack+0x20/0x38 (C) [ 19.239065] dump_stack_lvl+0x8c/0xd0 [ 19.239111] print_report+0x118/0x5d0 [ 19.239160] kasan_report+0xdc/0x128 [ 19.239381] __asan_report_store8_noabort+0x20/0x30 [ 19.239838] kasan_atomics_helper+0x3e5c/0x4858 [ 19.239899] kasan_atomics+0x198/0x2e0 [ 19.240030] kunit_try_run_case+0x170/0x3f0 [ 19.240199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.240255] kthread+0x328/0x630 [ 19.240322] ret_from_fork+0x10/0x20 [ 19.240372] [ 19.240392] Allocated by task 265: [ 19.240653] kasan_save_stack+0x3c/0x68 [ 19.240748] kasan_save_track+0x20/0x40 [ 19.240834] kasan_save_alloc_info+0x40/0x58 [ 19.240928] __kasan_kmalloc+0xd4/0xd8 [ 19.240965] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.241044] kasan_atomics+0xb8/0x2e0 [ 19.241208] kunit_try_run_case+0x170/0x3f0 [ 19.241250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.241297] kthread+0x328/0x630 [ 19.241333] ret_from_fork+0x10/0x20 [ 19.241403] [ 19.241449] The buggy address belongs to the object at fff00000c65b1c00 [ 19.241449] which belongs to the cache kmalloc-64 of size 64 [ 19.241566] The buggy address is located 0 bytes to the right of [ 19.241566] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.241770] [ 19.241851] The buggy address belongs to the physical page: [ 19.241883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.241994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.242108] page_type: f5(slab) [ 19.242778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.242838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.242883] page dumped because: kasan: bad access detected [ 19.242917] [ 19.242938] Memory state around the buggy address: [ 19.242973] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.243327] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.243488] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.243754] ^ [ 19.243798] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.243925] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.243968] ================================================================== [ 19.257396] ================================================================== [ 19.257453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.257504] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.258109] [ 19.258147] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.258247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.258278] Hardware name: linux,dummy-virt (DT) [ 19.258311] Call trace: [ 19.258333] show_stack+0x20/0x38 (C) [ 19.258384] dump_stack_lvl+0x8c/0xd0 [ 19.258432] print_report+0x118/0x5d0 [ 19.258489] kasan_report+0xdc/0x128 [ 19.258537] kasan_check_range+0x100/0x1a8 [ 19.258909] __kasan_check_write+0x20/0x30 [ 19.258961] kasan_atomics_helper+0xf88/0x4858 [ 19.259375] kasan_atomics+0x198/0x2e0 [ 19.259539] kunit_try_run_case+0x170/0x3f0 [ 19.259689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.259758] kthread+0x328/0x630 [ 19.259802] ret_from_fork+0x10/0x20 [ 19.259851] [ 19.259872] Allocated by task 265: [ 19.259937] kasan_save_stack+0x3c/0x68 [ 19.259984] kasan_save_track+0x20/0x40 [ 19.260022] kasan_save_alloc_info+0x40/0x58 [ 19.260417] __kasan_kmalloc+0xd4/0xd8 [ 19.260463] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.260583] kasan_atomics+0xb8/0x2e0 [ 19.260624] kunit_try_run_case+0x170/0x3f0 [ 19.260697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.260745] kthread+0x328/0x630 [ 19.260818] ret_from_fork+0x10/0x20 [ 19.260916] [ 19.260938] The buggy address belongs to the object at fff00000c65b1c00 [ 19.260938] which belongs to the cache kmalloc-64 of size 64 [ 19.261132] The buggy address is located 0 bytes to the right of [ 19.261132] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.261231] [ 19.261350] The buggy address belongs to the physical page: [ 19.261383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.261455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.261506] page_type: f5(slab) [ 19.261637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.261826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.261870] page dumped because: kasan: bad access detected [ 19.262044] [ 19.262064] Memory state around the buggy address: [ 19.262098] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.262516] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.262830] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.263280] ^ [ 19.263475] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.263521] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.263562] ================================================================== [ 19.204489] ================================================================== [ 19.204541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.204607] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.204660] [ 19.204690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.205073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.205314] Hardware name: linux,dummy-virt (DT) [ 19.205380] Call trace: [ 19.205507] show_stack+0x20/0x38 (C) [ 19.205761] dump_stack_lvl+0x8c/0xd0 [ 19.205911] print_report+0x118/0x5d0 [ 19.206008] kasan_report+0xdc/0x128 [ 19.206184] __asan_report_load4_noabort+0x20/0x30 [ 19.206241] kasan_atomics_helper+0x3dd8/0x4858 [ 19.206292] kasan_atomics+0x198/0x2e0 [ 19.206338] kunit_try_run_case+0x170/0x3f0 [ 19.206387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.206785] kthread+0x328/0x630 [ 19.206830] ret_from_fork+0x10/0x20 [ 19.207045] [ 19.207068] Allocated by task 265: [ 19.207098] kasan_save_stack+0x3c/0x68 [ 19.207141] kasan_save_track+0x20/0x40 [ 19.207192] kasan_save_alloc_info+0x40/0x58 [ 19.207267] __kasan_kmalloc+0xd4/0xd8 [ 19.207306] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.207359] kasan_atomics+0xb8/0x2e0 [ 19.207662] kunit_try_run_case+0x170/0x3f0 [ 19.208120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.208184] kthread+0x328/0x630 [ 19.208238] ret_from_fork+0x10/0x20 [ 19.208276] [ 19.208304] The buggy address belongs to the object at fff00000c65b1c00 [ 19.208304] which belongs to the cache kmalloc-64 of size 64 [ 19.208367] The buggy address is located 0 bytes to the right of [ 19.208367] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.208437] [ 19.208512] The buggy address belongs to the physical page: [ 19.208643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.208736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.208875] page_type: f5(slab) [ 19.208917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.209059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.209157] page dumped because: kasan: bad access detected [ 19.209215] [ 19.209234] Memory state around the buggy address: [ 19.209267] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.209313] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.209357] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.209400] ^ [ 19.209434] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209480] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209521] ================================================================== [ 19.423699] ================================================================== [ 19.423824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.423969] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.424029] [ 19.424077] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.424366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.424446] Hardware name: linux,dummy-virt (DT) [ 19.424507] Call trace: [ 19.424534] show_stack+0x20/0x38 (C) [ 19.424585] dump_stack_lvl+0x8c/0xd0 [ 19.424690] print_report+0x118/0x5d0 [ 19.424745] kasan_report+0xdc/0x128 [ 19.424831] __asan_report_load8_noabort+0x20/0x30 [ 19.425086] kasan_atomics_helper+0x3df4/0x4858 [ 19.425149] kasan_atomics+0x198/0x2e0 [ 19.425211] kunit_try_run_case+0x170/0x3f0 [ 19.425267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.425320] kthread+0x328/0x630 [ 19.425364] ret_from_fork+0x10/0x20 [ 19.425622] [ 19.425670] Allocated by task 265: [ 19.425703] kasan_save_stack+0x3c/0x68 [ 19.425812] kasan_save_track+0x20/0x40 [ 19.425871] kasan_save_alloc_info+0x40/0x58 [ 19.425993] __kasan_kmalloc+0xd4/0xd8 [ 19.426036] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.426078] kasan_atomics+0xb8/0x2e0 [ 19.426115] kunit_try_run_case+0x170/0x3f0 [ 19.426163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.426218] kthread+0x328/0x630 [ 19.426405] ret_from_fork+0x10/0x20 [ 19.426697] [ 19.426754] The buggy address belongs to the object at fff00000c65b1c00 [ 19.426754] which belongs to the cache kmalloc-64 of size 64 [ 19.427043] The buggy address is located 0 bytes to the right of [ 19.427043] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.427244] [ 19.427337] The buggy address belongs to the physical page: [ 19.427694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.427881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.427946] page_type: f5(slab) [ 19.428057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.428274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.428384] page dumped because: kasan: bad access detected [ 19.428549] [ 19.428643] Memory state around the buggy address: [ 19.428686] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.428733] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.428780] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.428822] ^ [ 19.428978] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.429349] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.429607] ================================================================== [ 19.102464] ================================================================== [ 19.102520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 19.102571] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.102623] [ 19.102656] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.102740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.103132] Hardware name: linux,dummy-virt (DT) [ 19.103464] Call trace: [ 19.103500] show_stack+0x20/0x38 (C) [ 19.103555] dump_stack_lvl+0x8c/0xd0 [ 19.103601] print_report+0x118/0x5d0 [ 19.103697] kasan_check_range+0x100/0x1a8 [ 19.103745] __kasan_check_write+0x20/0x30 [ 19.104257] kasan_atomics_helper+0x6ec/0x4858 [ 19.104439] kasan_atomics+0x198/0x2e0 [ 19.104488] kunit_try_run_case+0x170/0x3f0 [ 19.104539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.104594] kthread+0x328/0x630 [ 19.104637] ret_from_fork+0x10/0x20 [ 19.104696] [ 19.104717] Allocated by task 265: [ 19.104748] kasan_save_stack+0x3c/0x68 [ 19.105140] kasan_save_track+0x20/0x40 [ 19.105245] kasan_save_alloc_info+0x40/0x58 [ 19.105291] __kasan_kmalloc+0xd4/0xd8 [ 19.105330] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.105372] kasan_atomics+0xb8/0x2e0 [ 19.105409] kunit_try_run_case+0x170/0x3f0 [ 19.105458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.106045] ret_from_fork+0x10/0x20 [ 19.106509] The buggy address is located 0 bytes to the right of [ 19.106509] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.106586] [ 19.106607] The buggy address belongs to the physical page: [ 19.106638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.106696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.107696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.107997] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.109844] ================================================================== [ 19.250453] ================================================================== [ 19.250664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.250847] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.250900] [ 19.250932] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.251079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.251267] Hardware name: linux,dummy-virt (DT) [ 19.251398] Call trace: [ 19.251450] show_stack+0x20/0x38 (C) [ 19.251575] dump_stack_lvl+0x8c/0xd0 [ 19.251622] print_report+0x118/0x5d0 [ 19.252009] kasan_report+0xdc/0x128 [ 19.252094] kasan_check_range+0x100/0x1a8 [ 19.252219] __kasan_check_write+0x20/0x30 [ 19.252291] kasan_atomics_helper+0xf20/0x4858 [ 19.252343] kasan_atomics+0x198/0x2e0 [ 19.252422] kunit_try_run_case+0x170/0x3f0 [ 19.252472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.252722] kthread+0x328/0x630 [ 19.252765] ret_from_fork+0x10/0x20 [ 19.252813] [ 19.252846] Allocated by task 265: [ 19.252875] kasan_save_stack+0x3c/0x68 [ 19.253245] kasan_save_track+0x20/0x40 [ 19.253293] kasan_save_alloc_info+0x40/0x58 [ 19.253334] __kasan_kmalloc+0xd4/0xd8 [ 19.253384] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.253495] kasan_atomics+0xb8/0x2e0 [ 19.253535] kunit_try_run_case+0x170/0x3f0 [ 19.253576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.253771] kthread+0x328/0x630 [ 19.253862] ret_from_fork+0x10/0x20 [ 19.253902] [ 19.253923] The buggy address belongs to the object at fff00000c65b1c00 [ 19.253923] which belongs to the cache kmalloc-64 of size 64 [ 19.253993] The buggy address is located 0 bytes to the right of [ 19.253993] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.254581] [ 19.254669] The buggy address belongs to the physical page: [ 19.254702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.254762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.254813] page_type: f5(slab) [ 19.255153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.255277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.255544] page dumped because: kasan: bad access detected [ 19.255587] [ 19.255607] Memory state around the buggy address: [ 19.255659] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.255707] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.255890] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.255977] ^ [ 19.256014] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.256084] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.256225] ================================================================== [ 19.473887] ================================================================== [ 19.474078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.474242] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.474511] [ 19.474651] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.475107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.475139] Hardware name: linux,dummy-virt (DT) [ 19.475188] Call trace: [ 19.475279] show_stack+0x20/0x38 (C) [ 19.475331] dump_stack_lvl+0x8c/0xd0 [ 19.475814] print_report+0x118/0x5d0 [ 19.475866] kasan_report+0xdc/0x128 [ 19.476141] kasan_check_range+0x100/0x1a8 [ 19.476245] __kasan_check_write+0x20/0x30 [ 19.476293] kasan_atomics_helper+0x175c/0x4858 [ 19.476343] kasan_atomics+0x198/0x2e0 [ 19.476390] kunit_try_run_case+0x170/0x3f0 [ 19.476449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.476503] kthread+0x328/0x630 [ 19.476921] ret_from_fork+0x10/0x20 [ 19.477043] [ 19.477064] Allocated by task 265: [ 19.477093] kasan_save_stack+0x3c/0x68 [ 19.477139] kasan_save_track+0x20/0x40 [ 19.477191] kasan_save_alloc_info+0x40/0x58 [ 19.477246] __kasan_kmalloc+0xd4/0xd8 [ 19.477287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.477804] kasan_atomics+0xb8/0x2e0 [ 19.477973] kunit_try_run_case+0x170/0x3f0 [ 19.478050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.478100] kthread+0x328/0x630 [ 19.478135] ret_from_fork+0x10/0x20 [ 19.478182] [ 19.478205] The buggy address belongs to the object at fff00000c65b1c00 [ 19.478205] which belongs to the cache kmalloc-64 of size 64 [ 19.478269] The buggy address is located 0 bytes to the right of [ 19.478269] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.478337] [ 19.478370] The buggy address belongs to the physical page: [ 19.478404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.479408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.479510] page_type: f5(slab) [ 19.479673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.479857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.480191] page dumped because: kasan: bad access detected [ 19.480535] [ 19.480557] Memory state around the buggy address: [ 19.480659] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.480728] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.480776] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.480817] ^ [ 19.480853] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.480942] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.481133] ================================================================== [ 19.213281] ================================================================== [ 19.213331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.213379] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.213439] [ 19.213593] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.214006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.214042] Hardware name: linux,dummy-virt (DT) [ 19.214074] Call trace: [ 19.214183] show_stack+0x20/0x38 (C) [ 19.214234] dump_stack_lvl+0x8c/0xd0 [ 19.214280] print_report+0x118/0x5d0 [ 19.214328] kasan_report+0xdc/0x128 [ 19.214374] __asan_report_load4_noabort+0x20/0x30 [ 19.214438] kasan_atomics_helper+0x3e04/0x4858 [ 19.214498] kasan_atomics+0x198/0x2e0 [ 19.214546] kunit_try_run_case+0x170/0x3f0 [ 19.214595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.214660] kthread+0x328/0x630 [ 19.214711] ret_from_fork+0x10/0x20 [ 19.214842] [ 19.214861] Allocated by task 265: [ 19.214892] kasan_save_stack+0x3c/0x68 [ 19.214933] kasan_save_track+0x20/0x40 [ 19.214987] kasan_save_alloc_info+0x40/0x58 [ 19.215040] __kasan_kmalloc+0xd4/0xd8 [ 19.215193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.215291] kasan_atomics+0xb8/0x2e0 [ 19.215366] kunit_try_run_case+0x170/0x3f0 [ 19.215429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.215476] kthread+0x328/0x630 [ 19.215511] ret_from_fork+0x10/0x20 [ 19.215547] [ 19.215569] The buggy address belongs to the object at fff00000c65b1c00 [ 19.215569] which belongs to the cache kmalloc-64 of size 64 [ 19.215640] The buggy address is located 0 bytes to the right of [ 19.215640] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.215720] [ 19.215803] The buggy address belongs to the physical page: [ 19.215836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.215894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.216004] page_type: f5(slab) [ 19.216044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.216098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.216152] page dumped because: kasan: bad access detected [ 19.216598] [ 19.216628] Memory state around the buggy address: [ 19.216665] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.216711] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.216757] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.216797] ^ [ 19.216835] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.216892] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.216934] ================================================================== [ 19.416429] ================================================================== [ 19.416584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.416757] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.416838] [ 19.416871] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.417046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.417080] Hardware name: linux,dummy-virt (DT) [ 19.417131] Call trace: [ 19.417158] show_stack+0x20/0x38 (C) [ 19.417298] dump_stack_lvl+0x8c/0xd0 [ 19.417491] print_report+0x118/0x5d0 [ 19.417694] kasan_report+0xdc/0x128 [ 19.417785] kasan_check_range+0x100/0x1a8 [ 19.418117] __kasan_check_write+0x20/0x30 [ 19.418252] kasan_atomics_helper+0x1644/0x4858 [ 19.418325] kasan_atomics+0x198/0x2e0 [ 19.418401] kunit_try_run_case+0x170/0x3f0 [ 19.418456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.418597] kthread+0x328/0x630 [ 19.418641] ret_from_fork+0x10/0x20 [ 19.418734] [ 19.418754] Allocated by task 265: [ 19.418783] kasan_save_stack+0x3c/0x68 [ 19.418947] kasan_save_track+0x20/0x40 [ 19.419002] kasan_save_alloc_info+0x40/0x58 [ 19.419046] __kasan_kmalloc+0xd4/0xd8 [ 19.419190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.419428] kasan_atomics+0xb8/0x2e0 [ 19.419642] kunit_try_run_case+0x170/0x3f0 [ 19.419821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.419917] kthread+0x328/0x630 [ 19.420059] ret_from_fork+0x10/0x20 [ 19.420134] [ 19.420156] The buggy address belongs to the object at fff00000c65b1c00 [ 19.420156] which belongs to the cache kmalloc-64 of size 64 [ 19.420422] The buggy address is located 0 bytes to the right of [ 19.420422] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.420511] [ 19.420554] The buggy address belongs to the physical page: [ 19.421240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.421312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.421520] page_type: f5(slab) [ 19.421574] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.421826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.422035] page dumped because: kasan: bad access detected [ 19.422140] [ 19.422203] Memory state around the buggy address: [ 19.422318] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.422403] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.422457] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.422665] ^ [ 19.422840] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.422928] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.423016] ================================================================== [ 19.409222] ================================================================== [ 19.409298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.409359] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.409644] [ 19.409690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.409870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.409919] Hardware name: linux,dummy-virt (DT) [ 19.409979] Call trace: [ 19.410008] show_stack+0x20/0x38 (C) [ 19.410068] dump_stack_lvl+0x8c/0xd0 [ 19.410115] print_report+0x118/0x5d0 [ 19.410214] kasan_report+0xdc/0x128 [ 19.410265] __asan_report_load8_noabort+0x20/0x30 [ 19.410319] kasan_atomics_helper+0x3db0/0x4858 [ 19.410491] kasan_atomics+0x198/0x2e0 [ 19.410545] kunit_try_run_case+0x170/0x3f0 [ 19.410739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.410957] kthread+0x328/0x630 [ 19.411027] ret_from_fork+0x10/0x20 [ 19.411246] [ 19.411308] Allocated by task 265: [ 19.411457] kasan_save_stack+0x3c/0x68 [ 19.411510] kasan_save_track+0x20/0x40 [ 19.411616] kasan_save_alloc_info+0x40/0x58 [ 19.411728] __kasan_kmalloc+0xd4/0xd8 [ 19.411857] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.411953] kasan_atomics+0xb8/0x2e0 [ 19.412197] kunit_try_run_case+0x170/0x3f0 [ 19.412285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.412428] kthread+0x328/0x630 [ 19.412507] ret_from_fork+0x10/0x20 [ 19.412644] [ 19.412727] The buggy address belongs to the object at fff00000c65b1c00 [ 19.412727] which belongs to the cache kmalloc-64 of size 64 [ 19.412877] The buggy address is located 0 bytes to the right of [ 19.412877] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.412949] [ 19.412978] The buggy address belongs to the physical page: [ 19.413205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.413350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.413455] page_type: f5(slab) [ 19.413781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.413856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.413989] page dumped because: kasan: bad access detected [ 19.414027] [ 19.414047] Memory state around the buggy address: [ 19.414143] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.414508] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.414709] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.414938] ^ [ 19.415078] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.415133] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.415495] ================================================================== [ 19.146343] ================================================================== [ 19.146401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.146826] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.146935] [ 19.147115] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.147322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.147473] Hardware name: linux,dummy-virt (DT) [ 19.147510] Call trace: [ 19.147589] show_stack+0x20/0x38 (C) [ 19.147808] dump_stack_lvl+0x8c/0xd0 [ 19.147919] print_report+0x118/0x5d0 [ 19.147967] kasan_report+0xdc/0x128 [ 19.148014] kasan_check_range+0x100/0x1a8 [ 19.148064] __kasan_check_write+0x20/0x30 [ 19.148110] kasan_atomics_helper+0x99c/0x4858 [ 19.148160] kasan_atomics+0x198/0x2e0 [ 19.148217] kunit_try_run_case+0x170/0x3f0 [ 19.148266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.148332] kthread+0x328/0x630 [ 19.148376] ret_from_fork+0x10/0x20 [ 19.148527] [ 19.148732] Allocated by task 265: [ 19.148779] kasan_save_stack+0x3c/0x68 [ 19.149033] kasan_save_track+0x20/0x40 [ 19.149078] kasan_save_alloc_info+0x40/0x58 [ 19.149140] __kasan_kmalloc+0xd4/0xd8 [ 19.149190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.149232] kasan_atomics+0xb8/0x2e0 [ 19.149269] kunit_try_run_case+0x170/0x3f0 [ 19.149741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.149820] kthread+0x328/0x630 [ 19.149920] ret_from_fork+0x10/0x20 [ 19.149966] [ 19.150009] The buggy address belongs to the object at fff00000c65b1c00 [ 19.150009] which belongs to the cache kmalloc-64 of size 64 [ 19.150102] The buggy address is located 0 bytes to the right of [ 19.150102] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.150338] [ 19.150382] The buggy address belongs to the physical page: [ 19.150413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.150473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.150679] page_type: f5(slab) [ 19.150736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.151384] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.152796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.153737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.153793] kthread+0x328/0x630 [ 19.153842] ret_from_fork+0x10/0x20 [ 19.154095] [ 19.154138] Allocated by task 265: [ 19.154169] kasan_save_stack+0x3c/0x68 [ 19.154222] kasan_save_track+0x20/0x40 [ 19.154262] kasan_save_alloc_info+0x40/0x58 [ 19.154305] __kasan_kmalloc+0xd4/0xd8 [ 19.154345] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.154387] kasan_atomics+0xb8/0x2e0 [ 19.154426] kunit_try_run_case+0x170/0x3f0 [ 19.154812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.155246] kthread+0x328/0x630 [ 19.155294] ret_from_fork+0x10/0x20 [ 19.155331] [ 19.155353] The buggy address belongs to the object at fff00000c65b1c00 [ 19.155353] which belongs to the cache kmalloc-64 of size 64 [ 19.155907] The buggy address is located 0 bytes to the right of [ 19.155907] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.155982] [ 19.156111] The buggy address belongs to the physical page: [ 19.156180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.156268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.156319] page_type: f5(slab) [ 19.156385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.156473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.156516] page dumped because: kasan: bad access detected [ 19.156550] [ 19.156570] Memory state around the buggy address: [ 19.156605] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.156650] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.156696] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.156736] ^ [ 19.156812] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.156858] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.156945] ================================================================== [ 19.095710] ================================================================== [ 19.095766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 19.095816] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.095868] [ 19.095900] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.095983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.096048] Hardware name: linux,dummy-virt (DT) [ 19.096082] Call trace: [ 19.096107] show_stack+0x20/0x38 (C) [ 19.096359] dump_stack_lvl+0x8c/0xd0 [ 19.096691] print_report+0x118/0x5d0 [ 19.096744] kasan_report+0xdc/0x128 [ 19.096793] kasan_check_range+0x100/0x1a8 [ 19.097191] __kasan_check_write+0x20/0x30 [ 19.097276] kasan_atomics_helper+0x684/0x4858 [ 19.097351] kasan_atomics+0x198/0x2e0 [ 19.097397] kunit_try_run_case+0x170/0x3f0 [ 19.097826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.097881] kthread+0x328/0x630 [ 19.097925] ret_from_fork+0x10/0x20 [ 19.097979] [ 19.097999] Allocated by task 265: [ 19.098031] kasan_save_stack+0x3c/0x68 [ 19.098083] kasan_save_track+0x20/0x40 [ 19.098402] kasan_save_alloc_info+0x40/0x58 [ 19.098599] __kasan_kmalloc+0xd4/0xd8 [ 19.098854] kasan_atomics+0xb8/0x2e0 [ 19.098892] kunit_try_run_case+0x170/0x3f0 [ 19.098933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.099680] The buggy address is located 0 bytes to the right of [ 19.099680] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.099748] [ 19.100004] The buggy address belongs to the physical page: [ 19.100075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.100135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.100198] page_type: f5(slab) [ 19.100577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.100687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.100823] page dumped because: kasan: bad access detected [ 19.100909] [ 19.100957] Memory state around the buggy address: [ 19.101056] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.101116] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.101163] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.101215] ^ [ 19.101251] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.101389] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.101542] ================================================================== [ 19.210181] ================================================================== [ 19.210234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.210285] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.210338] [ 19.210368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.210452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.210481] Hardware name: linux,dummy-virt (DT) [ 19.210513] Call trace: [ 19.210535] show_stack+0x20/0x38 (C) [ 19.210583] dump_stack_lvl+0x8c/0xd0 [ 19.210629] print_report+0x118/0x5d0 [ 19.210677] kasan_report+0xdc/0x128 [ 19.210722] kasan_check_range+0x100/0x1a8 [ 19.210772] __kasan_check_write+0x20/0x30 [ 19.210819] kasan_atomics_helper+0xd3c/0x4858 [ 19.210866] kasan_atomics+0x198/0x2e0 [ 19.210912] kunit_try_run_case+0x170/0x3f0 [ 19.210972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.211027] kthread+0x328/0x630 [ 19.211069] ret_from_fork+0x10/0x20 [ 19.211119] [ 19.211138] Allocated by task 265: [ 19.211168] kasan_save_stack+0x3c/0x68 [ 19.211227] kasan_save_track+0x20/0x40 [ 19.211267] kasan_save_alloc_info+0x40/0x58 [ 19.211309] __kasan_kmalloc+0xd4/0xd8 [ 19.211348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.211535] kasan_atomics+0xb8/0x2e0 [ 19.211640] kunit_try_run_case+0x170/0x3f0 [ 19.211681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.211780] kthread+0x328/0x630 [ 19.211817] ret_from_fork+0x10/0x20 [ 19.211881] [ 19.211903] The buggy address belongs to the object at fff00000c65b1c00 [ 19.211903] which belongs to the cache kmalloc-64 of size 64 [ 19.211964] The buggy address is located 0 bytes to the right of [ 19.211964] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.212044] [ 19.212066] The buggy address belongs to the physical page: [ 19.212111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.212168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.212229] page_type: f5(slab) [ 19.212267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.212321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.212366] page dumped because: kasan: bad access detected [ 19.212411] [ 19.212498] Memory state around the buggy address: [ 19.212564] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.212610] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.212654] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.212705] ^ [ 19.212739] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.212802] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.212926] ================================================================== [ 19.218126] ================================================================== [ 19.218192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.218241] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.218293] [ 19.218322] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.218699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.218945] Hardware name: linux,dummy-virt (DT) [ 19.219028] Call trace: [ 19.219052] show_stack+0x20/0x38 (C) [ 19.219102] dump_stack_lvl+0x8c/0xd0 [ 19.219692] print_report+0x118/0x5d0 [ 19.219745] kasan_report+0xdc/0x128 [ 19.219793] kasan_check_range+0x100/0x1a8 [ 19.219844] __kasan_check_read+0x20/0x30 [ 19.219916] kasan_atomics_helper+0xdd4/0x4858 [ 19.220060] kasan_atomics+0x198/0x2e0 [ 19.220280] kunit_try_run_case+0x170/0x3f0 [ 19.220523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.220638] kthread+0x328/0x630 [ 19.220701] ret_from_fork+0x10/0x20 [ 19.220892] [ 19.220912] Allocated by task 265: [ 19.220962] kasan_save_stack+0x3c/0x68 [ 19.221030] kasan_save_track+0x20/0x40 [ 19.221104] kasan_save_alloc_info+0x40/0x58 [ 19.221147] __kasan_kmalloc+0xd4/0xd8 [ 19.221458] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.221767] kasan_atomics+0xb8/0x2e0 [ 19.221871] kunit_try_run_case+0x170/0x3f0 [ 19.221949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.221995] kthread+0x328/0x630 [ 19.222031] ret_from_fork+0x10/0x20 [ 19.222071] [ 19.222456] The buggy address belongs to the object at fff00000c65b1c00 [ 19.222456] which belongs to the cache kmalloc-64 of size 64 [ 19.222527] The buggy address is located 0 bytes to the right of [ 19.222527] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.222843] [ 19.223306] The buggy address belongs to the physical page: [ 19.223443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.223612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.223666] page_type: f5(slab) [ 19.223708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.223762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.223806] page dumped because: kasan: bad access detected [ 19.223842] [ 19.223862] Memory state around the buggy address: [ 19.223897] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.223941] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.224232] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.224394] ^ [ 19.224465] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.224510] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.224551] ================================================================== [ 19.363592] ================================================================== [ 19.363646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.363697] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.364254] [ 19.364434] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.364529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.364557] Hardware name: linux,dummy-virt (DT) [ 19.364726] Call trace: [ 19.364938] show_stack+0x20/0x38 (C) [ 19.365019] dump_stack_lvl+0x8c/0xd0 [ 19.365144] print_report+0x118/0x5d0 [ 19.365217] kasan_report+0xdc/0x128 [ 19.365318] __asan_report_load8_noabort+0x20/0x30 [ 19.365376] kasan_atomics_helper+0x3f04/0x4858 [ 19.365427] kasan_atomics+0x198/0x2e0 [ 19.366008] kunit_try_run_case+0x170/0x3f0 [ 19.366150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.366295] kthread+0x328/0x630 [ 19.366371] ret_from_fork+0x10/0x20 [ 19.366490] [ 19.366574] Allocated by task 265: [ 19.366607] kasan_save_stack+0x3c/0x68 [ 19.366655] kasan_save_track+0x20/0x40 [ 19.366701] kasan_save_alloc_info+0x40/0x58 [ 19.366855] __kasan_kmalloc+0xd4/0xd8 [ 19.366909] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.367003] kasan_atomics+0xb8/0x2e0 [ 19.367048] kunit_try_run_case+0x170/0x3f0 [ 19.367255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.367312] kthread+0x328/0x630 [ 19.367348] ret_from_fork+0x10/0x20 [ 19.367387] [ 19.367877] The buggy address belongs to the object at fff00000c65b1c00 [ 19.367877] which belongs to the cache kmalloc-64 of size 64 [ 19.367965] The buggy address is located 0 bytes to the right of [ 19.367965] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.368617] [ 19.369188] The buggy address belongs to the physical page: [ 19.369497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.369615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.369708] page_type: f5(slab) [ 19.369878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.370238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.370468] page dumped because: kasan: bad access detected [ 19.370512] [ 19.370714] Memory state around the buggy address: [ 19.370893] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.371222] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.371423] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.371499] ^ [ 19.371548] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.371927] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.372141] ================================================================== [ 19.431292] ================================================================== [ 19.431348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.431396] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.432890] [ 19.433456] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.434273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.434406] Hardware name: linux,dummy-virt (DT) [ 19.434440] Call trace: [ 19.434990] show_stack+0x20/0x38 (C) [ 19.435088] dump_stack_lvl+0x8c/0xd0 [ 19.435164] print_report+0x118/0x5d0 [ 19.435232] kasan_report+0xdc/0x128 [ 19.435278] kasan_check_range+0x100/0x1a8 [ 19.436532] __kasan_check_write+0x20/0x30 [ 19.436596] kasan_atomics_helper+0x16d0/0x4858 [ 19.436646] kasan_atomics+0x198/0x2e0 [ 19.436694] kunit_try_run_case+0x170/0x3f0 [ 19.436743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.438192] kthread+0x328/0x630 [ 19.438778] ret_from_fork+0x10/0x20 [ 19.439422] [ 19.439488] Allocated by task 265: [ 19.439522] kasan_save_stack+0x3c/0x68 [ 19.440084] kasan_save_track+0x20/0x40 [ 19.440561] kasan_save_alloc_info+0x40/0x58 [ 19.441019] __kasan_kmalloc+0xd4/0xd8 [ 19.441280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.441331] kasan_atomics+0xb8/0x2e0 [ 19.442091] kunit_try_run_case+0x170/0x3f0 [ 19.442484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.443294] kthread+0x328/0x630 [ 19.443535] ret_from_fork+0x10/0x20 [ 19.443722] [ 19.443745] The buggy address belongs to the object at fff00000c65b1c00 [ 19.443745] which belongs to the cache kmalloc-64 of size 64 [ 19.444281] The buggy address is located 0 bytes to the right of [ 19.444281] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.444754] [ 19.445471] The buggy address belongs to the physical page: [ 19.446106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.446330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.446496] page_type: f5(slab) [ 19.447072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.447459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.447528] page dumped because: kasan: bad access detected [ 19.447966] [ 19.448183] Memory state around the buggy address: [ 19.448223] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.449066] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.449315] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.449386] ^ [ 19.450201] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.450914] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.451274] ================================================================== [ 19.452604] ================================================================== [ 19.452872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.453431] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.454011] [ 19.454070] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.454651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.454700] Hardware name: linux,dummy-virt (DT) [ 19.455119] Call trace: [ 19.455145] show_stack+0x20/0x38 (C) [ 19.456322] dump_stack_lvl+0x8c/0xd0 [ 19.456935] print_report+0x118/0x5d0 [ 19.457313] kasan_report+0xdc/0x128 [ 19.457626] __asan_report_load8_noabort+0x20/0x30 [ 19.457861] kasan_atomics_helper+0x3e10/0x4858 [ 19.458329] kasan_atomics+0x198/0x2e0 [ 19.459324] kunit_try_run_case+0x170/0x3f0 [ 19.459722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.459917] kthread+0x328/0x630 [ 19.460850] ret_from_fork+0x10/0x20 [ 19.461293] [ 19.461477] Allocated by task 265: [ 19.461674] kasan_save_stack+0x3c/0x68 [ 19.462017] kasan_save_track+0x20/0x40 [ 19.462400] kasan_save_alloc_info+0x40/0x58 [ 19.462578] __kasan_kmalloc+0xd4/0xd8 [ 19.463029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.463089] kasan_atomics+0xb8/0x2e0 [ 19.463310] kunit_try_run_case+0x170/0x3f0 [ 19.463356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.463404] kthread+0x328/0x630 [ 19.463438] ret_from_fork+0x10/0x20 [ 19.463475] [ 19.463496] The buggy address belongs to the object at fff00000c65b1c00 [ 19.463496] which belongs to the cache kmalloc-64 of size 64 [ 19.463562] The buggy address is located 0 bytes to the right of [ 19.463562] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.463631] [ 19.465425] The buggy address belongs to the physical page: [ 19.465901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.466718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.466905] page_type: f5(slab) [ 19.466982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.467038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.467925] page dumped because: kasan: bad access detected [ 19.467972] [ 19.468932] Memory state around the buggy address: [ 19.469095] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.469634] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.469781] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.470521] ^ [ 19.470582] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.470632] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471529] ================================================================== [ 19.330544] ================================================================== [ 19.330599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.330651] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.330706] [ 19.331222] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.331329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.331490] Hardware name: linux,dummy-virt (DT) [ 19.331604] Call trace: [ 19.332012] show_stack+0x20/0x38 (C) [ 19.332292] dump_stack_lvl+0x8c/0xd0 [ 19.332471] print_report+0x118/0x5d0 [ 19.332791] kasan_report+0xdc/0x128 [ 19.332882] kasan_check_range+0x100/0x1a8 [ 19.333007] __kasan_check_write+0x20/0x30 [ 19.333218] kasan_atomics_helper+0x126c/0x4858 [ 19.333678] kasan_atomics+0x198/0x2e0 [ 19.333835] kunit_try_run_case+0x170/0x3f0 [ 19.334087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.334865] kthread+0x328/0x630 [ 19.335048] ret_from_fork+0x10/0x20 [ 19.335210] [ 19.335475] Allocated by task 265: [ 19.335571] kasan_save_stack+0x3c/0x68 [ 19.335958] kasan_save_track+0x20/0x40 [ 19.336230] kasan_save_alloc_info+0x40/0x58 [ 19.336378] __kasan_kmalloc+0xd4/0xd8 [ 19.336604] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.336656] kasan_atomics+0xb8/0x2e0 [ 19.336695] kunit_try_run_case+0x170/0x3f0 [ 19.336850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.337216] kthread+0x328/0x630 [ 19.337401] ret_from_fork+0x10/0x20 [ 19.337779] [ 19.338047] The buggy address belongs to the object at fff00000c65b1c00 [ 19.338047] which belongs to the cache kmalloc-64 of size 64 [ 19.338187] The buggy address is located 0 bytes to the right of [ 19.338187] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.338259] [ 19.338525] The buggy address belongs to the physical page: [ 19.338902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.339057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.339136] page_type: f5(slab) [ 19.339389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.339484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.339879] page dumped because: kasan: bad access detected [ 19.339925] [ 19.339946] Memory state around the buggy address: [ 19.340163] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.340240] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.340561] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.340817] ^ [ 19.340863] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.341455] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.341571] ================================================================== [ 19.158160] ================================================================== [ 19.158229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.158291] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.158344] [ 19.158377] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.160612] [ 19.160633] Allocated by task 265: [ 19.160664] kasan_save_stack+0x3c/0x68 [ 19.160710] kasan_save_track+0x20/0x40 [ 19.160749] kasan_save_alloc_info+0x40/0x58 [ 19.160795] __kasan_kmalloc+0xd4/0xd8 [ 19.161631] kthread+0x328/0x630 [ 19.162350] page_type: f5(slab) [ 19.162881] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.166446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.167065] kasan_save_stack+0x3c/0x68 [ 19.167109] kasan_save_track+0x20/0x40 [ 19.167151] kasan_save_alloc_info+0x40/0x58 [ 19.167206] __kasan_kmalloc+0xd4/0xd8 [ 19.167281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.167537] kasan_atomics+0xb8/0x2e0 [ 19.167822] kthread+0x328/0x630 [ 19.168324] page_type: f5(slab) [ 19.168598] page dumped because: kasan: bad access detected [ 19.170120] [ 19.170923] kasan_atomics_helper+0x3dcc/0x4858 [ 19.171921] __kasan_kmalloc+0xd4/0xd8 [ 19.172593] [ 19.172916] page_type: f5(slab) [ 19.173380] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.177837] kasan_save_alloc_info+0x40/0x58 [ 19.178903] [ 19.179369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.181449] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.184273] kthread+0x328/0x630 [ 19.185046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.185972] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.187780] kasan_check_range+0x100/0x1a8 [ 19.189164] __kasan_kmalloc+0xd4/0xd8 [ 19.190238] [ 19.190947] page dumped because: kasan: bad access detected [ 19.192726] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.195622] kunit_try_run_case+0x170/0x3f0 [ 19.197464] ^ [ 19.198916] [ 19.199997] kasan_check_range+0x100/0x1a8 [ 19.201299] kunit_try_run_case+0x170/0x3f0 [ 19.201341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.201388] kthread+0x328/0x630 [ 19.201468] ret_from_fork+0x10/0x20 [ 19.201540] [ 19.201574] The buggy address belongs to the object at fff00000c65b1c00 [ 19.201574] which belongs to the cache kmalloc-64 of size 64 [ 19.201662] The buggy address is located 0 bytes to the right of [ 19.201662] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.201878] [ 19.201899] The buggy address belongs to the physical page: [ 19.201936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.201993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.202087] page_type: f5(slab) [ 19.202129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.202193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.202238] page dumped because: kasan: bad access detected [ 19.202273] [ 19.202293] Memory state around the buggy address: [ 19.202325] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.202370] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.202415] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.202854] ^ [ 19.202892] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.203314] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.203674] ================================================================== [ 19.225999] ================================================================== [ 19.226270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.226345] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.226504] [ 19.226535] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.226617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.226645] Hardware name: linux,dummy-virt (DT) [ 19.226678] Call trace: [ 19.226707] show_stack+0x20/0x38 (C) [ 19.226951] dump_stack_lvl+0x8c/0xd0 [ 19.227186] print_report+0x118/0x5d0 [ 19.227260] kasan_report+0xdc/0x128 [ 19.227753] __asan_report_load8_noabort+0x20/0x30 [ 19.227825] kasan_atomics_helper+0x3f58/0x4858 [ 19.227877] kasan_atomics+0x198/0x2e0 [ 19.228050] kunit_try_run_case+0x170/0x3f0 [ 19.228401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.228464] kthread+0x328/0x630 [ 19.228808] ret_from_fork+0x10/0x20 [ 19.228936] [ 19.228956] Allocated by task 265: [ 19.229012] kasan_save_stack+0x3c/0x68 [ 19.229074] kasan_save_track+0x20/0x40 [ 19.229234] kasan_save_alloc_info+0x40/0x58 [ 19.229276] __kasan_kmalloc+0xd4/0xd8 [ 19.229321] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.229386] kasan_atomics+0xb8/0x2e0 [ 19.229423] kunit_try_run_case+0x170/0x3f0 [ 19.229463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.229846] kthread+0x328/0x630 [ 19.229884] ret_from_fork+0x10/0x20 [ 19.229922] [ 19.230111] The buggy address belongs to the object at fff00000c65b1c00 [ 19.230111] which belongs to the cache kmalloc-64 of size 64 [ 19.230258] The buggy address is located 0 bytes to the right of [ 19.230258] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.230329] [ 19.230350] The buggy address belongs to the physical page: [ 19.230539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.230623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.230715] page_type: f5(slab) [ 19.230773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.230945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.230990] page dumped because: kasan: bad access detected [ 19.231024] [ 19.231188] Memory state around the buggy address: [ 19.231254] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.231402] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.231450] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.231491] ^ [ 19.231527] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.231871] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.231931] ================================================================== [ 19.311905] ================================================================== [ 19.312118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.312199] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.312586] [ 19.312800] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.313084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.313153] Hardware name: linux,dummy-virt (DT) [ 19.313223] Call trace: [ 19.313248] show_stack+0x20/0x38 (C) [ 19.313303] dump_stack_lvl+0x8c/0xd0 [ 19.313350] print_report+0x118/0x5d0 [ 19.313398] kasan_report+0xdc/0x128 [ 19.313443] kasan_check_range+0x100/0x1a8 [ 19.313966] __kasan_check_write+0x20/0x30 [ 19.314046] kasan_atomics_helper+0x1190/0x4858 [ 19.314331] kasan_atomics+0x198/0x2e0 [ 19.314435] kunit_try_run_case+0x170/0x3f0 [ 19.314495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.314692] kthread+0x328/0x630 [ 19.314932] ret_from_fork+0x10/0x20 [ 19.314996] [ 19.315016] Allocated by task 265: [ 19.315048] kasan_save_stack+0x3c/0x68 [ 19.315093] kasan_save_track+0x20/0x40 [ 19.315134] kasan_save_alloc_info+0x40/0x58 [ 19.315195] __kasan_kmalloc+0xd4/0xd8 [ 19.315463] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.316108] kasan_atomics+0xb8/0x2e0 [ 19.316277] kunit_try_run_case+0x170/0x3f0 [ 19.316556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.316733] kthread+0x328/0x630 [ 19.316776] ret_from_fork+0x10/0x20 [ 19.316852] [ 19.317092] The buggy address belongs to the object at fff00000c65b1c00 [ 19.317092] which belongs to the cache kmalloc-64 of size 64 [ 19.317304] The buggy address is located 0 bytes to the right of [ 19.317304] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.317619] [ 19.317648] The buggy address belongs to the physical page: [ 19.317683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.317879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.318163] page_type: f5(slab) [ 19.318403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.318464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.318642] page dumped because: kasan: bad access detected [ 19.319008] [ 19.319053] Memory state around the buggy address: [ 19.319374] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.319428] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.319859] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.320310] ^ [ 19.320357] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.320769] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.321090] ================================================================== [ 19.264828] ================================================================== [ 19.264897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.264948] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.265191] [ 19.265224] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.265537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.265730] Hardware name: linux,dummy-virt (DT) [ 19.265945] Call trace: [ 19.265969] show_stack+0x20/0x38 (C) [ 19.266021] dump_stack_lvl+0x8c/0xd0 [ 19.266070] print_report+0x118/0x5d0 [ 19.266116] kasan_report+0xdc/0x128 [ 19.266164] kasan_check_range+0x100/0x1a8 [ 19.266223] __kasan_check_write+0x20/0x30 [ 19.266301] kasan_atomics_helper+0xff0/0x4858 [ 19.266561] kasan_atomics+0x198/0x2e0 [ 19.266968] kunit_try_run_case+0x170/0x3f0 [ 19.267089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.267145] kthread+0x328/0x630 [ 19.267200] ret_from_fork+0x10/0x20 [ 19.267641] [ 19.267925] Allocated by task 265: [ 19.268012] kasan_save_stack+0x3c/0x68 [ 19.268080] kasan_save_track+0x20/0x40 [ 19.268195] kasan_save_alloc_info+0x40/0x58 [ 19.268360] __kasan_kmalloc+0xd4/0xd8 [ 19.268401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.268445] kasan_atomics+0xb8/0x2e0 [ 19.268483] kunit_try_run_case+0x170/0x3f0 [ 19.268523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.268626] kthread+0x328/0x630 [ 19.268663] ret_from_fork+0x10/0x20 [ 19.269230] [ 19.269383] The buggy address belongs to the object at fff00000c65b1c00 [ 19.269383] which belongs to the cache kmalloc-64 of size 64 [ 19.269451] The buggy address is located 0 bytes to the right of [ 19.269451] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.269520] [ 19.269542] The buggy address belongs to the physical page: [ 19.269575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.270045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.270219] page_type: f5(slab) [ 19.270292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.270350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.270394] page dumped because: kasan: bad access detected [ 19.270449] [ 19.270544] Memory state around the buggy address: [ 19.270579] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.270641] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.270687] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.270729] ^ [ 19.270763] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.270872] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.270914] ================================================================== [ 19.302397] ================================================================== [ 19.302454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.302504] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.303599] [ 19.303654] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.303743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.303771] Hardware name: linux,dummy-virt (DT) [ 19.303805] Call trace: [ 19.303828] show_stack+0x20/0x38 (C) [ 19.303880] dump_stack_lvl+0x8c/0xd0 [ 19.303927] print_report+0x118/0x5d0 [ 19.303975] kasan_report+0xdc/0x128 [ 19.304021] kasan_check_range+0x100/0x1a8 [ 19.304070] __kasan_check_write+0x20/0x30 [ 19.304116] kasan_atomics_helper+0x1128/0x4858 [ 19.304166] kasan_atomics+0x198/0x2e0 [ 19.304355] kunit_try_run_case+0x170/0x3f0 [ 19.304879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.304947] kthread+0x328/0x630 [ 19.304990] ret_from_fork+0x10/0x20 [ 19.305038] [ 19.305059] Allocated by task 265: [ 19.305090] kasan_save_stack+0x3c/0x68 [ 19.305135] kasan_save_track+0x20/0x40 [ 19.305188] kasan_save_alloc_info+0x40/0x58 [ 19.305232] __kasan_kmalloc+0xd4/0xd8 [ 19.305271] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.305312] kasan_atomics+0xb8/0x2e0 [ 19.305350] kunit_try_run_case+0x170/0x3f0 [ 19.305389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.305436] kthread+0x328/0x630 [ 19.305470] ret_from_fork+0x10/0x20 [ 19.305533] [ 19.305555] The buggy address belongs to the object at fff00000c65b1c00 [ 19.305555] which belongs to the cache kmalloc-64 of size 64 [ 19.305619] The buggy address is located 0 bytes to the right of [ 19.305619] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.306912] [ 19.309422] The buggy address belongs to the physical page: [ 19.309474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.309537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.309599] page_type: f5(slab) [ 19.309639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.309694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.309738] page dumped because: kasan: bad access detected [ 19.309773] [ 19.309793] Memory state around the buggy address: [ 19.309828] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.309875] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.309922] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.309968] ^ [ 19.310004] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.310851] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.311063] ================================================================== [ 19.272746] ================================================================== [ 19.272835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.273465] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.273804] [ 19.273841] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.274470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.275540] Hardware name: linux,dummy-virt (DT) [ 19.275764] Call trace: [ 19.275788] show_stack+0x20/0x38 (C) [ 19.276023] dump_stack_lvl+0x8c/0xd0 [ 19.276683] print_report+0x118/0x5d0 [ 19.276794] kasan_report+0xdc/0x128 [ 19.277196] kasan_check_range+0x100/0x1a8 [ 19.277509] __kasan_check_write+0x20/0x30 [ 19.278143] kasan_atomics_helper+0x1058/0x4858 [ 19.278988] kasan_atomics+0x198/0x2e0 [ 19.279050] kunit_try_run_case+0x170/0x3f0 [ 19.279312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.279740] kthread+0x328/0x630 [ 19.280475] ret_from_fork+0x10/0x20 [ 19.280921] [ 19.280973] Allocated by task 265: [ 19.281422] kasan_save_stack+0x3c/0x68 [ 19.281474] kasan_save_track+0x20/0x40 [ 19.282209] kasan_save_alloc_info+0x40/0x58 [ 19.282653] __kasan_kmalloc+0xd4/0xd8 [ 19.283182] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.283569] kasan_atomics+0xb8/0x2e0 [ 19.283616] kunit_try_run_case+0x170/0x3f0 [ 19.284061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.284377] kthread+0x328/0x630 [ 19.284415] ret_from_fork+0x10/0x20 [ 19.284770] [ 19.284969] The buggy address belongs to the object at fff00000c65b1c00 [ 19.284969] which belongs to the cache kmalloc-64 of size 64 [ 19.286146] The buggy address is located 0 bytes to the right of [ 19.286146] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.286406] [ 19.286430] The buggy address belongs to the physical page: [ 19.286535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.286608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.286918] page_type: f5(slab) [ 19.287552] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.288319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.289072] page dumped because: kasan: bad access detected [ 19.289230] [ 19.289251] Memory state around the buggy address: [ 19.289477] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.289672] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.290476] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.290597] ^ [ 19.291008] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.291533] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.291864] ================================================================== [ 19.354404] ================================================================== [ 19.354627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.354858] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.354928] [ 19.354964] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.355054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.355133] Hardware name: linux,dummy-virt (DT) [ 19.355183] Call trace: [ 19.355210] show_stack+0x20/0x38 (C) [ 19.355404] dump_stack_lvl+0x8c/0xd0 [ 19.355857] print_report+0x118/0x5d0 [ 19.355982] kasan_report+0xdc/0x128 [ 19.356213] kasan_check_range+0x100/0x1a8 [ 19.356548] __kasan_check_write+0x20/0x30 [ 19.356702] kasan_atomics_helper+0x1384/0x4858 [ 19.356777] kasan_atomics+0x198/0x2e0 [ 19.357049] kunit_try_run_case+0x170/0x3f0 [ 19.357402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.357613] kthread+0x328/0x630 [ 19.357873] ret_from_fork+0x10/0x20 [ 19.358018] [ 19.358041] Allocated by task 265: [ 19.358071] kasan_save_stack+0x3c/0x68 [ 19.358429] kasan_save_track+0x20/0x40 [ 19.358592] kasan_save_alloc_info+0x40/0x58 [ 19.358665] __kasan_kmalloc+0xd4/0xd8 [ 19.358707] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.358747] kasan_atomics+0xb8/0x2e0 [ 19.358786] kunit_try_run_case+0x170/0x3f0 [ 19.358826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.359044] kthread+0x328/0x630 [ 19.359096] ret_from_fork+0x10/0x20 [ 19.359144] [ 19.359166] The buggy address belongs to the object at fff00000c65b1c00 [ 19.359166] which belongs to the cache kmalloc-64 of size 64 [ 19.359279] The buggy address is located 0 bytes to the right of [ 19.359279] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.359503] [ 19.359530] The buggy address belongs to the physical page: [ 19.359564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.359623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.359677] page_type: f5(slab) [ 19.360116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.360480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.360647] page dumped because: kasan: bad access detected [ 19.360689] [ 19.360709] Memory state around the buggy address: [ 19.361199] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.361971] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.362050] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.362113] ^ [ 19.362220] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.362270] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.362537] ================================================================== [ 19.491595] ================================================================== [ 19.491733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.491794] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.491899] [ 19.491996] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.492081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.492108] Hardware name: linux,dummy-virt (DT) [ 19.492141] Call trace: [ 19.492165] show_stack+0x20/0x38 (C) [ 19.492227] dump_stack_lvl+0x8c/0xd0 [ 19.492274] print_report+0x118/0x5d0 [ 19.492442] kasan_report+0xdc/0x128 [ 19.492964] kasan_check_range+0x100/0x1a8 [ 19.493020] __kasan_check_write+0x20/0x30 [ 19.493066] kasan_atomics_helper+0x17ec/0x4858 [ 19.493115] kasan_atomics+0x198/0x2e0 [ 19.493161] kunit_try_run_case+0x170/0x3f0 [ 19.493219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.493273] kthread+0x328/0x630 [ 19.493316] ret_from_fork+0x10/0x20 [ 19.493370] [ 19.493469] Allocated by task 265: [ 19.493567] kasan_save_stack+0x3c/0x68 [ 19.493611] kasan_save_track+0x20/0x40 [ 19.493795] kasan_save_alloc_info+0x40/0x58 [ 19.494000] __kasan_kmalloc+0xd4/0xd8 [ 19.494184] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.494226] kasan_atomics+0xb8/0x2e0 [ 19.494720] kunit_try_run_case+0x170/0x3f0 [ 19.494789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.494836] kthread+0x328/0x630 [ 19.494873] ret_from_fork+0x10/0x20 [ 19.494910] [ 19.494931] The buggy address belongs to the object at fff00000c65b1c00 [ 19.494931] which belongs to the cache kmalloc-64 of size 64 [ 19.494993] The buggy address is located 0 bytes to the right of [ 19.494993] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.495063] [ 19.495084] The buggy address belongs to the physical page: [ 19.495119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.495186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.495522] page_type: f5(slab) [ 19.495578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.495631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.495755] page dumped because: kasan: bad access detected [ 19.495813] [ 19.495833] Memory state around the buggy address: [ 19.496482] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.496562] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.496608] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.496650] ^ [ 19.496686] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.496733] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.496910] ================================================================== [ 19.232741] ================================================================== [ 19.232795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.232844] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.232900] [ 19.232931] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.233017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.233044] Hardware name: linux,dummy-virt (DT) [ 19.233076] Call trace: [ 19.233099] show_stack+0x20/0x38 (C) [ 19.233479] dump_stack_lvl+0x8c/0xd0 [ 19.233654] print_report+0x118/0x5d0 [ 19.233707] kasan_report+0xdc/0x128 [ 19.233763] kasan_check_range+0x100/0x1a8 [ 19.233812] __kasan_check_write+0x20/0x30 [ 19.234293] kasan_atomics_helper+0xe44/0x4858 [ 19.234363] kasan_atomics+0x198/0x2e0 [ 19.234410] kunit_try_run_case+0x170/0x3f0 [ 19.234459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.234513] kthread+0x328/0x630 [ 19.234555] ret_from_fork+0x10/0x20 [ 19.234621] [ 19.234642] Allocated by task 265: [ 19.234673] kasan_save_stack+0x3c/0x68 [ 19.235127] kasan_save_track+0x20/0x40 [ 19.235309] kasan_save_alloc_info+0x40/0x58 [ 19.235506] __kasan_kmalloc+0xd4/0xd8 [ 19.235544] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.235608] kasan_atomics+0xb8/0x2e0 [ 19.235647] kunit_try_run_case+0x170/0x3f0 [ 19.235689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.235891] kthread+0x328/0x630 [ 19.235933] ret_from_fork+0x10/0x20 [ 19.235973] [ 19.236047] The buggy address belongs to the object at fff00000c65b1c00 [ 19.236047] which belongs to the cache kmalloc-64 of size 64 [ 19.236148] The buggy address is located 0 bytes to the right of [ 19.236148] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.236251] [ 19.236296] The buggy address belongs to the physical page: [ 19.236330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.236594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.236654] page_type: f5(slab) [ 19.236695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.236751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.237031] page dumped because: kasan: bad access detected [ 19.237203] [ 19.237239] Memory state around the buggy address: [ 19.237275] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.237323] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.237418] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.237579] ^ [ 19.237630] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.237677] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.237717] ================================================================== [ 19.373654] ================================================================== [ 19.373845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.373910] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.373976] [ 19.374008] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.374237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.374300] Hardware name: linux,dummy-virt (DT) [ 19.374333] Call trace: [ 19.374359] show_stack+0x20/0x38 (C) [ 19.374409] dump_stack_lvl+0x8c/0xd0 [ 19.374465] print_report+0x118/0x5d0 [ 19.374511] kasan_report+0xdc/0x128 [ 19.374558] kasan_check_range+0x100/0x1a8 [ 19.374618] __kasan_check_write+0x20/0x30 [ 19.374673] kasan_atomics_helper+0x1414/0x4858 [ 19.374724] kasan_atomics+0x198/0x2e0 [ 19.374780] kunit_try_run_case+0x170/0x3f0 [ 19.374831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.374887] kthread+0x328/0x630 [ 19.374930] ret_from_fork+0x10/0x20 [ 19.374984] [ 19.375043] Allocated by task 265: [ 19.375072] kasan_save_stack+0x3c/0x68 [ 19.375117] kasan_save_track+0x20/0x40 [ 19.375155] kasan_save_alloc_info+0x40/0x58 [ 19.375209] __kasan_kmalloc+0xd4/0xd8 [ 19.375255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.375317] kasan_atomics+0xb8/0x2e0 [ 19.375374] kunit_try_run_case+0x170/0x3f0 [ 19.375415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.376470] kthread+0x328/0x630 [ 19.376542] ret_from_fork+0x10/0x20 [ 19.376621] [ 19.376754] The buggy address belongs to the object at fff00000c65b1c00 [ 19.376754] which belongs to the cache kmalloc-64 of size 64 [ 19.376826] The buggy address is located 0 bytes to the right of [ 19.376826] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.376896] [ 19.376919] The buggy address belongs to the physical page: [ 19.376955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.377155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.377251] page_type: f5(slab) [ 19.377293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.377349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.377395] page dumped because: kasan: bad access detected [ 19.377458] [ 19.377484] Memory state around the buggy address: [ 19.377540] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.377588] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.377635] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.377687] ^ [ 19.377731] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.377776] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.377822] ================================================================== [ 19.378963] ================================================================== [ 19.379383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.379596] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.379859] [ 19.379933] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.380385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.380577] Hardware name: linux,dummy-virt (DT) [ 19.380618] Call trace: [ 19.380903] show_stack+0x20/0x38 (C) [ 19.381246] dump_stack_lvl+0x8c/0xd0 [ 19.381476] print_report+0x118/0x5d0 [ 19.381658] kasan_report+0xdc/0x128 [ 19.381807] kasan_check_range+0x100/0x1a8 [ 19.381921] __kasan_check_write+0x20/0x30 [ 19.382123] kasan_atomics_helper+0x147c/0x4858 [ 19.382300] kasan_atomics+0x198/0x2e0 [ 19.382562] kunit_try_run_case+0x170/0x3f0 [ 19.382892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.383452] kthread+0x328/0x630 [ 19.383624] ret_from_fork+0x10/0x20 [ 19.383789] [ 19.383879] Allocated by task 265: [ 19.383960] kasan_save_stack+0x3c/0x68 [ 19.384010] kasan_save_track+0x20/0x40 [ 19.384353] kasan_save_alloc_info+0x40/0x58 [ 19.385260] __kasan_kmalloc+0xd4/0xd8 [ 19.385347] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.385429] kasan_atomics+0xb8/0x2e0 [ 19.385491] kunit_try_run_case+0x170/0x3f0 [ 19.385532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.386063] kthread+0x328/0x630 [ 19.386413] ret_from_fork+0x10/0x20 [ 19.386665] [ 19.386976] The buggy address belongs to the object at fff00000c65b1c00 [ 19.386976] which belongs to the cache kmalloc-64 of size 64 [ 19.387075] The buggy address is located 0 bytes to the right of [ 19.387075] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.387413] [ 19.387562] The buggy address belongs to the physical page: [ 19.387715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.387991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.388302] page_type: f5(slab) [ 19.388517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.388704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.389138] page dumped because: kasan: bad access detected [ 19.389527] [ 19.389561] Memory state around the buggy address: [ 19.389838] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390249] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390350] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.390395] ^ [ 19.390495] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390837] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.391062] ================================================================== [ 19.404975] ================================================================== [ 19.405028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.405131] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.405210] [ 19.405251] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.405346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.405374] Hardware name: linux,dummy-virt (DT) [ 19.405413] Call trace: [ 19.405447] show_stack+0x20/0x38 (C) [ 19.405498] dump_stack_lvl+0x8c/0xd0 [ 19.405555] print_report+0x118/0x5d0 [ 19.405617] kasan_report+0xdc/0x128 [ 19.405664] kasan_check_range+0x100/0x1a8 [ 19.405715] __kasan_check_write+0x20/0x30 [ 19.405761] kasan_atomics_helper+0x15b4/0x4858 [ 19.405810] kasan_atomics+0x198/0x2e0 [ 19.405856] kunit_try_run_case+0x170/0x3f0 [ 19.405905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.405967] kthread+0x328/0x630 [ 19.406013] ret_from_fork+0x10/0x20 [ 19.406061] [ 19.406089] Allocated by task 265: [ 19.406129] kasan_save_stack+0x3c/0x68 [ 19.406191] kasan_save_track+0x20/0x40 [ 19.406233] kasan_save_alloc_info+0x40/0x58 [ 19.406285] __kasan_kmalloc+0xd4/0xd8 [ 19.406327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.406369] kasan_atomics+0xb8/0x2e0 [ 19.406413] kunit_try_run_case+0x170/0x3f0 [ 19.406453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.406501] kthread+0x328/0x630 [ 19.406545] ret_from_fork+0x10/0x20 [ 19.406590] [ 19.406613] The buggy address belongs to the object at fff00000c65b1c00 [ 19.406613] which belongs to the cache kmalloc-64 of size 64 [ 19.406681] The buggy address is located 0 bytes to the right of [ 19.406681] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.406749] [ 19.406779] The buggy address belongs to the physical page: [ 19.406813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.406868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.406918] page_type: f5(slab) [ 19.406956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.407011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.407054] page dumped because: kasan: bad access detected [ 19.407089] [ 19.407118] Memory state around the buggy address: [ 19.407157] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.407279] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.407544] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.407755] ^ [ 19.407956] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408009] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408610] ================================================================== [ 19.017893] ================================================================== [ 19.020017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 19.020272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.020503] kasan_report+0xdc/0x128 [ 19.020804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.021101] kasan_save_alloc_info+0x40/0x58 [ 19.021552] The buggy address is located 0 bytes to the right of [ 19.021552] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.021686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.022070] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.022611] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.023215] ================================================================== [ 19.398120] ================================================================== [ 19.398184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.398329] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.398389] [ 19.398449] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.398671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.398702] Hardware name: linux,dummy-virt (DT) [ 19.398737] Call trace: [ 19.398799] show_stack+0x20/0x38 (C) [ 19.398870] dump_stack_lvl+0x8c/0xd0 [ 19.398916] print_report+0x118/0x5d0 [ 19.398964] kasan_report+0xdc/0x128 [ 19.399010] kasan_check_range+0x100/0x1a8 [ 19.399070] __kasan_check_write+0x20/0x30 [ 19.399126] kasan_atomics_helper+0x154c/0x4858 [ 19.399188] kasan_atomics+0x198/0x2e0 [ 19.399568] kunit_try_run_case+0x170/0x3f0 [ 19.399692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.399845] kthread+0x328/0x630 [ 19.399940] ret_from_fork+0x10/0x20 [ 19.400064] [ 19.400113] Allocated by task 265: [ 19.400145] kasan_save_stack+0x3c/0x68 [ 19.400441] kasan_save_track+0x20/0x40 [ 19.400562] kasan_save_alloc_info+0x40/0x58 [ 19.400671] __kasan_kmalloc+0xd4/0xd8 [ 19.400947] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.401123] kasan_atomics+0xb8/0x2e0 [ 19.401203] kunit_try_run_case+0x170/0x3f0 [ 19.401333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.401440] kthread+0x328/0x630 [ 19.401568] ret_from_fork+0x10/0x20 [ 19.401635] [ 19.401658] The buggy address belongs to the object at fff00000c65b1c00 [ 19.401658] which belongs to the cache kmalloc-64 of size 64 [ 19.401980] The buggy address is located 0 bytes to the right of [ 19.401980] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.402209] [ 19.402269] The buggy address belongs to the physical page: [ 19.402423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.402630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.402830] page_type: f5(slab) [ 19.402986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.403250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.403402] page dumped because: kasan: bad access detected [ 19.403448] [ 19.403468] Memory state around the buggy address: [ 19.403504] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.403551] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.403597] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.403840] ^ [ 19.403966] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404080] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404361] ================================================================== [ 19.391791] ================================================================== [ 19.391920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.391990] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 19.392048] [ 19.392146] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.392255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.392333] Hardware name: linux,dummy-virt (DT) [ 19.392368] Call trace: [ 19.392419] show_stack+0x20/0x38 (C) [ 19.392472] dump_stack_lvl+0x8c/0xd0 [ 19.392526] print_report+0x118/0x5d0 [ 19.392575] kasan_report+0xdc/0x128 [ 19.392621] kasan_check_range+0x100/0x1a8 [ 19.392671] __kasan_check_write+0x20/0x30 [ 19.392717] kasan_atomics_helper+0x14e4/0x4858 [ 19.392765] kasan_atomics+0x198/0x2e0 [ 19.393067] kunit_try_run_case+0x170/0x3f0 [ 19.393271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393385] kthread+0x328/0x630 [ 19.393452] ret_from_fork+0x10/0x20 [ 19.393562] [ 19.393600] Allocated by task 265: [ 19.393633] kasan_save_stack+0x3c/0x68 [ 19.393679] kasan_save_track+0x20/0x40 [ 19.393720] kasan_save_alloc_info+0x40/0x58 [ 19.393928] __kasan_kmalloc+0xd4/0xd8 [ 19.394227] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.394306] kasan_atomics+0xb8/0x2e0 [ 19.394348] kunit_try_run_case+0x170/0x3f0 [ 19.394534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.394609] kthread+0x328/0x630 [ 19.394654] ret_from_fork+0x10/0x20 [ 19.394871] [ 19.394946] The buggy address belongs to the object at fff00000c65b1c00 [ 19.394946] which belongs to the cache kmalloc-64 of size 64 [ 19.395027] The buggy address is located 0 bytes to the right of [ 19.395027] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.395329] [ 19.395393] The buggy address belongs to the physical page: [ 19.395507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.395602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.395783] page_type: f5(slab) [ 19.395830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.395886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.395931] page dumped because: kasan: bad access detected [ 19.396323] [ 19.396403] Memory state around the buggy address: [ 19.396492] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.396804] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.396959] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.397052] ^ [ 19.397088] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.397141] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.397463] ==================================================================
[ 16.394865] ================================================================== [ 16.395451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.395729] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.395955] [ 16.396039] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.396081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.396095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.396117] Call Trace: [ 16.396129] <TASK> [ 16.396143] dump_stack_lvl+0x73/0xb0 [ 16.396170] print_report+0xd1/0x610 [ 16.396193] ? __virt_addr_valid+0x1db/0x2d0 [ 16.396217] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.396240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.396276] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.396300] kasan_report+0x141/0x180 [ 16.396323] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.396351] kasan_check_range+0x10c/0x1c0 [ 16.396376] __kasan_check_write+0x18/0x20 [ 16.396397] kasan_atomics_helper+0x1c18/0x5450 [ 16.396421] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.396446] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.396472] ? kasan_atomics+0x152/0x310 [ 16.396500] kasan_atomics+0x1dc/0x310 [ 16.396523] ? __pfx_kasan_atomics+0x10/0x10 [ 16.396548] ? __pfx_read_tsc+0x10/0x10 [ 16.396570] ? ktime_get_ts64+0x86/0x230 [ 16.396595] kunit_try_run_case+0x1a5/0x480 [ 16.396619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.396644] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.396669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.396694] ? __kthread_parkme+0x82/0x180 [ 16.396716] ? preempt_count_sub+0x50/0x80 [ 16.396742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.396768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.396794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.396821] kthread+0x337/0x6f0 [ 16.396840] ? trace_preempt_on+0x20/0xc0 [ 16.396864] ? __pfx_kthread+0x10/0x10 [ 16.396885] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.396908] ? calculate_sigpending+0x7b/0xa0 [ 16.396933] ? __pfx_kthread+0x10/0x10 [ 16.396955] ret_from_fork+0x116/0x1d0 [ 16.396975] ? __pfx_kthread+0x10/0x10 [ 16.396996] ret_from_fork_asm+0x1a/0x30 [ 16.397028] </TASK> [ 16.397039] [ 16.404140] Allocated by task 282: [ 16.404322] kasan_save_stack+0x45/0x70 [ 16.404517] kasan_save_track+0x18/0x40 [ 16.404700] kasan_save_alloc_info+0x3b/0x50 [ 16.404877] __kasan_kmalloc+0xb7/0xc0 [ 16.405072] __kmalloc_cache_noprof+0x189/0x420 [ 16.405255] kasan_atomics+0x95/0x310 [ 16.405435] kunit_try_run_case+0x1a5/0x480 [ 16.405615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.405858] kthread+0x337/0x6f0 [ 16.406001] ret_from_fork+0x116/0x1d0 [ 16.406167] ret_from_fork_asm+0x1a/0x30 [ 16.406364] [ 16.406448] The buggy address belongs to the object at ffff888102a0a600 [ 16.406448] which belongs to the cache kmalloc-64 of size 64 [ 16.406918] The buggy address is located 0 bytes to the right of [ 16.406918] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.407392] [ 16.407471] The buggy address belongs to the physical page: [ 16.407643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.407883] flags: 0x200000000000000(node=0|zone=2) [ 16.408046] page_type: f5(slab) [ 16.408165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.408492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.408827] page dumped because: kasan: bad access detected [ 16.409074] [ 16.409166] Memory state around the buggy address: [ 16.409398] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.409712] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.410025] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.410254] ^ [ 16.410418] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.410633] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.410855] ================================================================== [ 15.965965] ================================================================== [ 15.966294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.966599] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.966849] [ 15.966956] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.966998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.967010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.967031] Call Trace: [ 15.967046] <TASK> [ 15.967061] dump_stack_lvl+0x73/0xb0 [ 15.967087] print_report+0xd1/0x610 [ 15.967110] ? __virt_addr_valid+0x1db/0x2d0 [ 15.967134] ? kasan_atomics_helper+0x1148/0x5450 [ 15.967157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.967183] ? kasan_atomics_helper+0x1148/0x5450 [ 15.967206] kasan_report+0x141/0x180 [ 15.967229] ? kasan_atomics_helper+0x1148/0x5450 [ 15.967257] kasan_check_range+0x10c/0x1c0 [ 15.967291] __kasan_check_write+0x18/0x20 [ 15.967312] kasan_atomics_helper+0x1148/0x5450 [ 15.967336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.967360] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.967386] ? kasan_atomics+0x152/0x310 [ 15.967413] kasan_atomics+0x1dc/0x310 [ 15.967437] ? __pfx_kasan_atomics+0x10/0x10 [ 15.967462] ? __pfx_read_tsc+0x10/0x10 [ 15.967484] ? ktime_get_ts64+0x86/0x230 [ 15.967509] kunit_try_run_case+0x1a5/0x480 [ 15.967534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.967559] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.967584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.967608] ? __kthread_parkme+0x82/0x180 [ 15.967630] ? preempt_count_sub+0x50/0x80 [ 15.967655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.967683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.967708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.967735] kthread+0x337/0x6f0 [ 15.967755] ? trace_preempt_on+0x20/0xc0 [ 15.967779] ? __pfx_kthread+0x10/0x10 [ 15.967801] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.967824] ? calculate_sigpending+0x7b/0xa0 [ 15.967849] ? __pfx_kthread+0x10/0x10 [ 15.967872] ret_from_fork+0x116/0x1d0 [ 15.967891] ? __pfx_kthread+0x10/0x10 [ 15.967914] ret_from_fork_asm+0x1a/0x30 [ 15.967946] </TASK> [ 15.967956] [ 15.976046] Allocated by task 282: [ 15.976319] kasan_save_stack+0x45/0x70 [ 15.976527] kasan_save_track+0x18/0x40 [ 15.976732] kasan_save_alloc_info+0x3b/0x50 [ 15.976943] __kasan_kmalloc+0xb7/0xc0 [ 15.977163] __kmalloc_cache_noprof+0x189/0x420 [ 15.977370] kasan_atomics+0x95/0x310 [ 15.977557] kunit_try_run_case+0x1a5/0x480 [ 15.977760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.977939] kthread+0x337/0x6f0 [ 15.978134] ret_from_fork+0x116/0x1d0 [ 15.978500] ret_from_fork_asm+0x1a/0x30 [ 15.978719] [ 15.978799] The buggy address belongs to the object at ffff888102a0a600 [ 15.978799] which belongs to the cache kmalloc-64 of size 64 [ 15.979459] The buggy address is located 0 bytes to the right of [ 15.979459] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.980226] [ 15.980350] The buggy address belongs to the physical page: [ 15.980573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.980835] flags: 0x200000000000000(node=0|zone=2) [ 15.981226] page_type: f5(slab) [ 15.981418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.981717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.982032] page dumped because: kasan: bad access detected [ 15.982252] [ 15.982344] Memory state around the buggy address: [ 15.982500] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.982723] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.982962] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.983283] ^ [ 15.983506] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.983817] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.984128] ================================================================== [ 16.637674] ================================================================== [ 16.637944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.638393] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.638618] [ 16.638727] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.638767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.638780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.638802] Call Trace: [ 16.638815] <TASK> [ 16.638829] dump_stack_lvl+0x73/0xb0 [ 16.638855] print_report+0xd1/0x610 [ 16.638877] ? __virt_addr_valid+0x1db/0x2d0 [ 16.638902] ? kasan_atomics_helper+0x218a/0x5450 [ 16.638924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.638949] ? kasan_atomics_helper+0x218a/0x5450 [ 16.638972] kasan_report+0x141/0x180 [ 16.638994] ? kasan_atomics_helper+0x218a/0x5450 [ 16.639022] kasan_check_range+0x10c/0x1c0 [ 16.639048] __kasan_check_write+0x18/0x20 [ 16.639069] kasan_atomics_helper+0x218a/0x5450 [ 16.639093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.639117] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.639144] ? kasan_atomics+0x152/0x310 [ 16.639171] kasan_atomics+0x1dc/0x310 [ 16.639194] ? __pfx_kasan_atomics+0x10/0x10 [ 16.639220] ? __pfx_read_tsc+0x10/0x10 [ 16.639241] ? ktime_get_ts64+0x86/0x230 [ 16.639278] kunit_try_run_case+0x1a5/0x480 [ 16.639304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.639329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.639353] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.639379] ? __kthread_parkme+0x82/0x180 [ 16.639401] ? preempt_count_sub+0x50/0x80 [ 16.639426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.639452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.639478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.639505] kthread+0x337/0x6f0 [ 16.639525] ? trace_preempt_on+0x20/0xc0 [ 16.639549] ? __pfx_kthread+0x10/0x10 [ 16.639571] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.639594] ? calculate_sigpending+0x7b/0xa0 [ 16.639619] ? __pfx_kthread+0x10/0x10 [ 16.639642] ret_from_fork+0x116/0x1d0 [ 16.639662] ? __pfx_kthread+0x10/0x10 [ 16.639683] ret_from_fork_asm+0x1a/0x30 [ 16.639715] </TASK> [ 16.639725] [ 16.646871] Allocated by task 282: [ 16.647047] kasan_save_stack+0x45/0x70 [ 16.647197] kasan_save_track+0x18/0x40 [ 16.647345] kasan_save_alloc_info+0x3b/0x50 [ 16.647495] __kasan_kmalloc+0xb7/0xc0 [ 16.647629] __kmalloc_cache_noprof+0x189/0x420 [ 16.647846] kasan_atomics+0x95/0x310 [ 16.648033] kunit_try_run_case+0x1a5/0x480 [ 16.648239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.648506] kthread+0x337/0x6f0 [ 16.648652] ret_from_fork+0x116/0x1d0 [ 16.648785] ret_from_fork_asm+0x1a/0x30 [ 16.648926] [ 16.648997] The buggy address belongs to the object at ffff888102a0a600 [ 16.648997] which belongs to the cache kmalloc-64 of size 64 [ 16.649481] The buggy address is located 0 bytes to the right of [ 16.649481] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.650041] [ 16.650140] The buggy address belongs to the physical page: [ 16.650410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.650729] flags: 0x200000000000000(node=0|zone=2) [ 16.650940] page_type: f5(slab) [ 16.651100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.651395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.651703] page dumped because: kasan: bad access detected [ 16.651911] [ 16.652005] Memory state around the buggy address: [ 16.652225] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.652511] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.652780] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.653061] ^ [ 16.653289] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653567] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653809] ================================================================== [ 15.840795] ================================================================== [ 15.841401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.841701] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.841946] [ 15.842078] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.842122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.842134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.842309] Call Trace: [ 15.842329] <TASK> [ 15.842344] dump_stack_lvl+0x73/0xb0 [ 15.842373] print_report+0xd1/0x610 [ 15.842396] ? __virt_addr_valid+0x1db/0x2d0 [ 15.842419] ? kasan_atomics_helper+0xe78/0x5450 [ 15.842442] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.842467] ? kasan_atomics_helper+0xe78/0x5450 [ 15.842490] kasan_report+0x141/0x180 [ 15.842513] ? kasan_atomics_helper+0xe78/0x5450 [ 15.842540] kasan_check_range+0x10c/0x1c0 [ 15.842565] __kasan_check_write+0x18/0x20 [ 15.842586] kasan_atomics_helper+0xe78/0x5450 [ 15.842610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.842635] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.842661] ? kasan_atomics+0x152/0x310 [ 15.842688] kasan_atomics+0x1dc/0x310 [ 15.842717] ? __pfx_kasan_atomics+0x10/0x10 [ 15.842743] ? __pfx_read_tsc+0x10/0x10 [ 15.842765] ? ktime_get_ts64+0x86/0x230 [ 15.842790] kunit_try_run_case+0x1a5/0x480 [ 15.842817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.842842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.842866] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.842892] ? __kthread_parkme+0x82/0x180 [ 15.842913] ? preempt_count_sub+0x50/0x80 [ 15.842938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.842964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.842990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.843017] kthread+0x337/0x6f0 [ 15.843037] ? trace_preempt_on+0x20/0xc0 [ 15.843062] ? __pfx_kthread+0x10/0x10 [ 15.843084] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.843107] ? calculate_sigpending+0x7b/0xa0 [ 15.843132] ? __pfx_kthread+0x10/0x10 [ 15.843155] ret_from_fork+0x116/0x1d0 [ 15.843175] ? __pfx_kthread+0x10/0x10 [ 15.843196] ret_from_fork_asm+0x1a/0x30 [ 15.843228] </TASK> [ 15.843338] [ 15.851165] Allocated by task 282: [ 15.851359] kasan_save_stack+0x45/0x70 [ 15.851561] kasan_save_track+0x18/0x40 [ 15.851754] kasan_save_alloc_info+0x3b/0x50 [ 15.852219] __kasan_kmalloc+0xb7/0xc0 [ 15.852382] __kmalloc_cache_noprof+0x189/0x420 [ 15.852546] kasan_atomics+0x95/0x310 [ 15.852700] kunit_try_run_case+0x1a5/0x480 [ 15.852908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.853160] kthread+0x337/0x6f0 [ 15.853343] ret_from_fork+0x116/0x1d0 [ 15.853535] ret_from_fork_asm+0x1a/0x30 [ 15.854128] [ 15.854240] The buggy address belongs to the object at ffff888102a0a600 [ 15.854240] which belongs to the cache kmalloc-64 of size 64 [ 15.854732] The buggy address is located 0 bytes to the right of [ 15.854732] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.855299] [ 15.855396] The buggy address belongs to the physical page: [ 15.855572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.855814] flags: 0x200000000000000(node=0|zone=2) [ 15.855979] page_type: f5(slab) [ 15.856148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.856516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.856855] page dumped because: kasan: bad access detected [ 15.857117] [ 15.857213] Memory state around the buggy address: [ 15.858574] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.858817] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.859450] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.860464] ^ [ 15.861075] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861465] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861920] ================================================================== [ 16.069856] ================================================================== [ 16.070306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 16.070617] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.070909] [ 16.071219] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.071278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.071291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.071312] Call Trace: [ 16.071326] <TASK> [ 16.071340] dump_stack_lvl+0x73/0xb0 [ 16.071368] print_report+0xd1/0x610 [ 16.071390] ? __virt_addr_valid+0x1db/0x2d0 [ 16.071414] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.071436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.071462] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.071486] kasan_report+0x141/0x180 [ 16.071509] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.071538] __asan_report_load4_noabort+0x18/0x20 [ 16.071564] kasan_atomics_helper+0x49ce/0x5450 [ 16.071588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.071614] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.071643] ? kasan_atomics+0x152/0x310 [ 16.071671] kasan_atomics+0x1dc/0x310 [ 16.071695] ? __pfx_kasan_atomics+0x10/0x10 [ 16.071720] ? __pfx_read_tsc+0x10/0x10 [ 16.071741] ? ktime_get_ts64+0x86/0x230 [ 16.071767] kunit_try_run_case+0x1a5/0x480 [ 16.071793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.071818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.071841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.071867] ? __kthread_parkme+0x82/0x180 [ 16.071891] ? preempt_count_sub+0x50/0x80 [ 16.071915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.071941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.072074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.072109] kthread+0x337/0x6f0 [ 16.072129] ? trace_preempt_on+0x20/0xc0 [ 16.072154] ? __pfx_kthread+0x10/0x10 [ 16.072175] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.072199] ? calculate_sigpending+0x7b/0xa0 [ 16.072223] ? __pfx_kthread+0x10/0x10 [ 16.072246] ret_from_fork+0x116/0x1d0 [ 16.072277] ? __pfx_kthread+0x10/0x10 [ 16.072299] ret_from_fork_asm+0x1a/0x30 [ 16.072330] </TASK> [ 16.072341] [ 16.080108] Allocated by task 282: [ 16.080307] kasan_save_stack+0x45/0x70 [ 16.080514] kasan_save_track+0x18/0x40 [ 16.080709] kasan_save_alloc_info+0x3b/0x50 [ 16.080920] __kasan_kmalloc+0xb7/0xc0 [ 16.081183] __kmalloc_cache_noprof+0x189/0x420 [ 16.081425] kasan_atomics+0x95/0x310 [ 16.081620] kunit_try_run_case+0x1a5/0x480 [ 16.081795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.082079] kthread+0x337/0x6f0 [ 16.082272] ret_from_fork+0x116/0x1d0 [ 16.082462] ret_from_fork_asm+0x1a/0x30 [ 16.082660] [ 16.082761] The buggy address belongs to the object at ffff888102a0a600 [ 16.082761] which belongs to the cache kmalloc-64 of size 64 [ 16.083356] The buggy address is located 0 bytes to the right of [ 16.083356] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.083902] [ 16.084114] The buggy address belongs to the physical page: [ 16.084385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.084729] flags: 0x200000000000000(node=0|zone=2) [ 16.084930] page_type: f5(slab) [ 16.085174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.085424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.085653] page dumped because: kasan: bad access detected [ 16.085826] [ 16.085907] Memory state around the buggy address: [ 16.086234] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.086570] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.086907] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.087447] ^ [ 16.087685] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.088092] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.088365] ================================================================== [ 15.946039] ================================================================== [ 15.946469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.946822] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.947339] [ 15.947585] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.947630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.947643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.947664] Call Trace: [ 15.947679] <TASK> [ 15.947694] dump_stack_lvl+0x73/0xb0 [ 15.947722] print_report+0xd1/0x610 [ 15.947744] ? __virt_addr_valid+0x1db/0x2d0 [ 15.947767] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.947790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.947814] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.947838] kasan_report+0x141/0x180 [ 15.947861] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.947889] __asan_report_load4_noabort+0x18/0x20 [ 15.947915] kasan_atomics_helper+0x4a1c/0x5450 [ 15.947941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.947965] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.947991] ? kasan_atomics+0x152/0x310 [ 15.948017] kasan_atomics+0x1dc/0x310 [ 15.948042] ? __pfx_kasan_atomics+0x10/0x10 [ 15.948067] ? __pfx_read_tsc+0x10/0x10 [ 15.948089] ? ktime_get_ts64+0x86/0x230 [ 15.948113] kunit_try_run_case+0x1a5/0x480 [ 15.948138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.948161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.948186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.948211] ? __kthread_parkme+0x82/0x180 [ 15.948232] ? preempt_count_sub+0x50/0x80 [ 15.948256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.948296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.948323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.948349] kthread+0x337/0x6f0 [ 15.948369] ? trace_preempt_on+0x20/0xc0 [ 15.948549] ? __pfx_kthread+0x10/0x10 [ 15.948581] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.948604] ? calculate_sigpending+0x7b/0xa0 [ 15.948631] ? __pfx_kthread+0x10/0x10 [ 15.948654] ret_from_fork+0x116/0x1d0 [ 15.948674] ? __pfx_kthread+0x10/0x10 [ 15.948697] ret_from_fork_asm+0x1a/0x30 [ 15.948729] </TASK> [ 15.948740] [ 15.956892] Allocated by task 282: [ 15.957273] kasan_save_stack+0x45/0x70 [ 15.957460] kasan_save_track+0x18/0x40 [ 15.957633] kasan_save_alloc_info+0x3b/0x50 [ 15.957785] __kasan_kmalloc+0xb7/0xc0 [ 15.957947] __kmalloc_cache_noprof+0x189/0x420 [ 15.958377] kasan_atomics+0x95/0x310 [ 15.958664] kunit_try_run_case+0x1a5/0x480 [ 15.958841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.959208] kthread+0x337/0x6f0 [ 15.959389] ret_from_fork+0x116/0x1d0 [ 15.959557] ret_from_fork_asm+0x1a/0x30 [ 15.959738] [ 15.959831] The buggy address belongs to the object at ffff888102a0a600 [ 15.959831] which belongs to the cache kmalloc-64 of size 64 [ 15.960362] The buggy address is located 0 bytes to the right of [ 15.960362] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.960863] [ 15.960960] The buggy address belongs to the physical page: [ 15.961323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.961570] flags: 0x200000000000000(node=0|zone=2) [ 15.961735] page_type: f5(slab) [ 15.961856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.962195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.962623] page dumped because: kasan: bad access detected [ 15.962884] [ 15.963141] Memory state around the buggy address: [ 15.963334] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.963555] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.963776] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.964243] ^ [ 15.964492] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.964823] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.965527] ================================================================== [ 16.540815] ================================================================== [ 16.541159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.541970] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.542257] [ 16.542360] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.542451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.542466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.542488] Call Trace: [ 16.542523] <TASK> [ 16.542541] dump_stack_lvl+0x73/0xb0 [ 16.542570] print_report+0xd1/0x610 [ 16.542610] ? __virt_addr_valid+0x1db/0x2d0 [ 16.542635] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.542657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.542682] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.542710] kasan_report+0x141/0x180 [ 16.542734] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.542780] __asan_report_load8_noabort+0x18/0x20 [ 16.542807] kasan_atomics_helper+0x4f71/0x5450 [ 16.542831] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.542856] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.542882] ? kasan_atomics+0x152/0x310 [ 16.542909] kasan_atomics+0x1dc/0x310 [ 16.542933] ? __pfx_kasan_atomics+0x10/0x10 [ 16.542958] ? __pfx_read_tsc+0x10/0x10 [ 16.542995] ? ktime_get_ts64+0x86/0x230 [ 16.543034] kunit_try_run_case+0x1a5/0x480 [ 16.543073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.543098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.543123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.543148] ? __kthread_parkme+0x82/0x180 [ 16.543169] ? preempt_count_sub+0x50/0x80 [ 16.543194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.543221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.543246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.543284] kthread+0x337/0x6f0 [ 16.543304] ? trace_preempt_on+0x20/0xc0 [ 16.543329] ? __pfx_kthread+0x10/0x10 [ 16.543350] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.543373] ? calculate_sigpending+0x7b/0xa0 [ 16.543398] ? __pfx_kthread+0x10/0x10 [ 16.543421] ret_from_fork+0x116/0x1d0 [ 16.543441] ? __pfx_kthread+0x10/0x10 [ 16.543462] ret_from_fork_asm+0x1a/0x30 [ 16.543512] </TASK> [ 16.543523] [ 16.550688] Allocated by task 282: [ 16.550873] kasan_save_stack+0x45/0x70 [ 16.551103] kasan_save_track+0x18/0x40 [ 16.551303] kasan_save_alloc_info+0x3b/0x50 [ 16.551521] __kasan_kmalloc+0xb7/0xc0 [ 16.551689] __kmalloc_cache_noprof+0x189/0x420 [ 16.551844] kasan_atomics+0x95/0x310 [ 16.551977] kunit_try_run_case+0x1a5/0x480 [ 16.552121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.552305] kthread+0x337/0x6f0 [ 16.552425] ret_from_fork+0x116/0x1d0 [ 16.552553] ret_from_fork_asm+0x1a/0x30 [ 16.552690] [ 16.552774] The buggy address belongs to the object at ffff888102a0a600 [ 16.552774] which belongs to the cache kmalloc-64 of size 64 [ 16.553328] The buggy address is located 0 bytes to the right of [ 16.553328] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.553963] [ 16.554073] The buggy address belongs to the physical page: [ 16.554375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.554797] flags: 0x200000000000000(node=0|zone=2) [ 16.555052] page_type: f5(slab) [ 16.555241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.555602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.555824] page dumped because: kasan: bad access detected [ 16.555991] [ 16.556059] Memory state around the buggy address: [ 16.556210] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.556554] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.556916] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.557269] ^ [ 16.557514] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.557824] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.558160] ================================================================== [ 15.582939] ================================================================== [ 15.583179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.583651] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.584106] [ 15.584215] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.584259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.584285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.584308] Call Trace: [ 15.584324] <TASK> [ 15.584339] dump_stack_lvl+0x73/0xb0 [ 15.584367] print_report+0xd1/0x610 [ 15.584390] ? __virt_addr_valid+0x1db/0x2d0 [ 15.584414] ? kasan_atomics_helper+0x697/0x5450 [ 15.584437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.584462] ? kasan_atomics_helper+0x697/0x5450 [ 15.584485] kasan_report+0x141/0x180 [ 15.584508] ? kasan_atomics_helper+0x697/0x5450 [ 15.584549] kasan_check_range+0x10c/0x1c0 [ 15.584574] __kasan_check_write+0x18/0x20 [ 15.584595] kasan_atomics_helper+0x697/0x5450 [ 15.584619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.584644] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.584670] ? kasan_atomics+0x152/0x310 [ 15.584697] kasan_atomics+0x1dc/0x310 [ 15.584720] ? __pfx_kasan_atomics+0x10/0x10 [ 15.584746] ? __pfx_read_tsc+0x10/0x10 [ 15.584769] ? ktime_get_ts64+0x86/0x230 [ 15.584793] kunit_try_run_case+0x1a5/0x480 [ 15.584818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.584842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.584866] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.584892] ? __kthread_parkme+0x82/0x180 [ 15.584914] ? preempt_count_sub+0x50/0x80 [ 15.584939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.584964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.585278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.585315] kthread+0x337/0x6f0 [ 15.585336] ? trace_preempt_on+0x20/0xc0 [ 15.585360] ? __pfx_kthread+0x10/0x10 [ 15.585382] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.585406] ? calculate_sigpending+0x7b/0xa0 [ 15.585432] ? __pfx_kthread+0x10/0x10 [ 15.585454] ret_from_fork+0x116/0x1d0 [ 15.585475] ? __pfx_kthread+0x10/0x10 [ 15.585497] ret_from_fork_asm+0x1a/0x30 [ 15.585529] </TASK> [ 15.585539] [ 15.593770] Allocated by task 282: [ 15.593958] kasan_save_stack+0x45/0x70 [ 15.594190] kasan_save_track+0x18/0x40 [ 15.594390] kasan_save_alloc_info+0x3b/0x50 [ 15.594543] __kasan_kmalloc+0xb7/0xc0 [ 15.594678] __kmalloc_cache_noprof+0x189/0x420 [ 15.594904] kasan_atomics+0x95/0x310 [ 15.595191] kunit_try_run_case+0x1a5/0x480 [ 15.595548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.595746] kthread+0x337/0x6f0 [ 15.595869] ret_from_fork+0x116/0x1d0 [ 15.596068] ret_from_fork_asm+0x1a/0x30 [ 15.596286] [ 15.596384] The buggy address belongs to the object at ffff888102a0a600 [ 15.596384] which belongs to the cache kmalloc-64 of size 64 [ 15.596920] The buggy address is located 0 bytes to the right of [ 15.596920] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.597608] [ 15.597689] The buggy address belongs to the physical page: [ 15.597949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.598519] flags: 0x200000000000000(node=0|zone=2) [ 15.598723] page_type: f5(slab) [ 15.598890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.599124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.599448] page dumped because: kasan: bad access detected [ 15.599813] [ 15.599941] Memory state around the buggy address: [ 15.600199] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.600482] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.600708] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.601013] ^ [ 15.601246] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.601584] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.601885] ================================================================== [ 15.640844] ================================================================== [ 15.641738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.642569] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.643239] [ 15.643362] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.643408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.643422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.643445] Call Trace: [ 15.643459] <TASK> [ 15.643474] dump_stack_lvl+0x73/0xb0 [ 15.643504] print_report+0xd1/0x610 [ 15.643528] ? __virt_addr_valid+0x1db/0x2d0 [ 15.643552] ? kasan_atomics_helper+0x860/0x5450 [ 15.643574] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.643599] ? kasan_atomics_helper+0x860/0x5450 [ 15.643623] kasan_report+0x141/0x180 [ 15.643646] ? kasan_atomics_helper+0x860/0x5450 [ 15.643674] kasan_check_range+0x10c/0x1c0 [ 15.643699] __kasan_check_write+0x18/0x20 [ 15.643720] kasan_atomics_helper+0x860/0x5450 [ 15.643745] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.643769] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.643795] ? kasan_atomics+0x152/0x310 [ 15.643822] kasan_atomics+0x1dc/0x310 [ 15.643846] ? __pfx_kasan_atomics+0x10/0x10 [ 15.643871] ? __pfx_read_tsc+0x10/0x10 [ 15.643893] ? ktime_get_ts64+0x86/0x230 [ 15.643918] kunit_try_run_case+0x1a5/0x480 [ 15.643945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.643969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.644053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.644078] ? __kthread_parkme+0x82/0x180 [ 15.644100] ? preempt_count_sub+0x50/0x80 [ 15.644126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.644178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.644206] kthread+0x337/0x6f0 [ 15.644226] ? trace_preempt_on+0x20/0xc0 [ 15.644250] ? __pfx_kthread+0x10/0x10 [ 15.644282] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.644305] ? calculate_sigpending+0x7b/0xa0 [ 15.644329] ? __pfx_kthread+0x10/0x10 [ 15.644352] ret_from_fork+0x116/0x1d0 [ 15.644372] ? __pfx_kthread+0x10/0x10 [ 15.644393] ret_from_fork_asm+0x1a/0x30 [ 15.644426] </TASK> [ 15.644436] [ 15.652538] Allocated by task 282: [ 15.652730] kasan_save_stack+0x45/0x70 [ 15.652938] kasan_save_track+0x18/0x40 [ 15.653103] kasan_save_alloc_info+0x3b/0x50 [ 15.653307] __kasan_kmalloc+0xb7/0xc0 [ 15.653490] __kmalloc_cache_noprof+0x189/0x420 [ 15.653648] kasan_atomics+0x95/0x310 [ 15.653802] kunit_try_run_case+0x1a5/0x480 [ 15.654016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.654451] kthread+0x337/0x6f0 [ 15.654637] ret_from_fork+0x116/0x1d0 [ 15.654787] ret_from_fork_asm+0x1a/0x30 [ 15.654929] [ 15.655001] The buggy address belongs to the object at ffff888102a0a600 [ 15.655001] which belongs to the cache kmalloc-64 of size 64 [ 15.655634] The buggy address is located 0 bytes to the right of [ 15.655634] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.656185] [ 15.656420] The buggy address belongs to the physical page: [ 15.656631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.656930] flags: 0x200000000000000(node=0|zone=2) [ 15.657094] page_type: f5(slab) [ 15.657217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.657565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.657907] page dumped because: kasan: bad access detected [ 15.658161] [ 15.658335] Memory state around the buggy address: [ 15.658561] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.659198] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.659515] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.659773] ^ [ 15.659931] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.660534] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.660912] ================================================================== [ 15.926974] ================================================================== [ 15.927327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.927669] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.928196] [ 15.928317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.928362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.928377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.928398] Call Trace: [ 15.928413] <TASK> [ 15.928429] dump_stack_lvl+0x73/0xb0 [ 15.928458] print_report+0xd1/0x610 [ 15.928481] ? __virt_addr_valid+0x1db/0x2d0 [ 15.928505] ? kasan_atomics_helper+0x1079/0x5450 [ 15.928528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.928552] ? kasan_atomics_helper+0x1079/0x5450 [ 15.928576] kasan_report+0x141/0x180 [ 15.928599] ? kasan_atomics_helper+0x1079/0x5450 [ 15.928627] kasan_check_range+0x10c/0x1c0 [ 15.928652] __kasan_check_write+0x18/0x20 [ 15.928672] kasan_atomics_helper+0x1079/0x5450 [ 15.928696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.928721] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.928747] ? kasan_atomics+0x152/0x310 [ 15.928774] kasan_atomics+0x1dc/0x310 [ 15.928797] ? __pfx_kasan_atomics+0x10/0x10 [ 15.928823] ? __pfx_read_tsc+0x10/0x10 [ 15.928845] ? ktime_get_ts64+0x86/0x230 [ 15.928870] kunit_try_run_case+0x1a5/0x480 [ 15.928896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.928921] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.928945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.928971] ? __kthread_parkme+0x82/0x180 [ 15.928992] ? preempt_count_sub+0x50/0x80 [ 15.929017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.929069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.929096] kthread+0x337/0x6f0 [ 15.929117] ? trace_preempt_on+0x20/0xc0 [ 15.929140] ? __pfx_kthread+0x10/0x10 [ 15.929163] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.929186] ? calculate_sigpending+0x7b/0xa0 [ 15.929211] ? __pfx_kthread+0x10/0x10 [ 15.929234] ret_from_fork+0x116/0x1d0 [ 15.929254] ? __pfx_kthread+0x10/0x10 [ 15.929285] ret_from_fork_asm+0x1a/0x30 [ 15.929317] </TASK> [ 15.929329] [ 15.937625] Allocated by task 282: [ 15.937762] kasan_save_stack+0x45/0x70 [ 15.937910] kasan_save_track+0x18/0x40 [ 15.938320] kasan_save_alloc_info+0x3b/0x50 [ 15.938547] __kasan_kmalloc+0xb7/0xc0 [ 15.938746] __kmalloc_cache_noprof+0x189/0x420 [ 15.939034] kasan_atomics+0x95/0x310 [ 15.939236] kunit_try_run_case+0x1a5/0x480 [ 15.939464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939689] kthread+0x337/0x6f0 [ 15.939812] ret_from_fork+0x116/0x1d0 [ 15.939946] ret_from_fork_asm+0x1a/0x30 [ 15.940455] [ 15.940564] The buggy address belongs to the object at ffff888102a0a600 [ 15.940564] which belongs to the cache kmalloc-64 of size 64 [ 15.941160] The buggy address is located 0 bytes to the right of [ 15.941160] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.941662] [ 15.941758] The buggy address belongs to the physical page: [ 15.942061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.942405] flags: 0x200000000000000(node=0|zone=2) [ 15.942571] page_type: f5(slab) [ 15.942692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.942933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.943275] page dumped because: kasan: bad access detected [ 15.943535] [ 15.943630] Memory state around the buggy address: [ 15.943856] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.944351] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.944641] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.944909] ^ [ 15.945185] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945483] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945706] ================================================================== [ 15.680336] ================================================================== [ 15.680682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.681191] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.681522] [ 15.681614] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.681658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.681671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.681694] Call Trace: [ 15.681711] <TASK> [ 15.681728] dump_stack_lvl+0x73/0xb0 [ 15.681758] print_report+0xd1/0x610 [ 15.681782] ? __virt_addr_valid+0x1db/0x2d0 [ 15.681807] ? kasan_atomics_helper+0x992/0x5450 [ 15.681829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.681855] ? kasan_atomics_helper+0x992/0x5450 [ 15.681879] kasan_report+0x141/0x180 [ 15.681902] ? kasan_atomics_helper+0x992/0x5450 [ 15.681930] kasan_check_range+0x10c/0x1c0 [ 15.681955] __kasan_check_write+0x18/0x20 [ 15.681975] kasan_atomics_helper+0x992/0x5450 [ 15.681999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.682023] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.682049] ? kasan_atomics+0x152/0x310 [ 15.682076] kasan_atomics+0x1dc/0x310 [ 15.682100] ? __pfx_kasan_atomics+0x10/0x10 [ 15.682125] ? __pfx_read_tsc+0x10/0x10 [ 15.682148] ? ktime_get_ts64+0x86/0x230 [ 15.682173] kunit_try_run_case+0x1a5/0x480 [ 15.682200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.682224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.682249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.682285] ? __kthread_parkme+0x82/0x180 [ 15.682307] ? preempt_count_sub+0x50/0x80 [ 15.682496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.682523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.682550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.682578] kthread+0x337/0x6f0 [ 15.682598] ? trace_preempt_on+0x20/0xc0 [ 15.682624] ? __pfx_kthread+0x10/0x10 [ 15.682647] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.682671] ? calculate_sigpending+0x7b/0xa0 [ 15.682697] ? __pfx_kthread+0x10/0x10 [ 15.682728] ret_from_fork+0x116/0x1d0 [ 15.682748] ? __pfx_kthread+0x10/0x10 [ 15.682770] ret_from_fork_asm+0x1a/0x30 [ 15.682803] </TASK> [ 15.682814] [ 15.690824] Allocated by task 282: [ 15.691098] kasan_save_stack+0x45/0x70 [ 15.691326] kasan_save_track+0x18/0x40 [ 15.691505] kasan_save_alloc_info+0x3b/0x50 [ 15.691693] __kasan_kmalloc+0xb7/0xc0 [ 15.691857] __kmalloc_cache_noprof+0x189/0x420 [ 15.692135] kasan_atomics+0x95/0x310 [ 15.692342] kunit_try_run_case+0x1a5/0x480 [ 15.692533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.692712] kthread+0x337/0x6f0 [ 15.692840] ret_from_fork+0x116/0x1d0 [ 15.692976] ret_from_fork_asm+0x1a/0x30 [ 15.693421] [ 15.693523] The buggy address belongs to the object at ffff888102a0a600 [ 15.693523] which belongs to the cache kmalloc-64 of size 64 [ 15.694331] The buggy address is located 0 bytes to the right of [ 15.694331] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.694868] [ 15.694960] The buggy address belongs to the physical page: [ 15.695224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.695484] flags: 0x200000000000000(node=0|zone=2) [ 15.695651] page_type: f5(slab) [ 15.695775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.696467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.696827] page dumped because: kasan: bad access detected [ 15.697238] [ 15.697352] Memory state around the buggy address: [ 15.697575] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.697839] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.698292] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.698620] ^ [ 15.698865] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.699213] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.699445] ================================================================== [ 15.380822] ================================================================== [ 15.381511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.381818] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.382089] [ 15.382200] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.382243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.382255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.382288] Call Trace: [ 15.382299] <TASK> [ 15.382315] dump_stack_lvl+0x73/0xb0 [ 15.382343] print_report+0xd1/0x610 [ 15.382364] ? __virt_addr_valid+0x1db/0x2d0 [ 15.382388] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.382411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.382437] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.382460] kasan_report+0x141/0x180 [ 15.382481] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.382508] __asan_report_load4_noabort+0x18/0x20 [ 15.382534] kasan_atomics_helper+0x4bbc/0x5450 [ 15.382559] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.382583] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.382662] ? kasan_atomics+0x152/0x310 [ 15.382690] kasan_atomics+0x1dc/0x310 [ 15.382717] ? __pfx_kasan_atomics+0x10/0x10 [ 15.382740] ? __pfx_read_tsc+0x10/0x10 [ 15.382762] ? ktime_get_ts64+0x86/0x230 [ 15.382786] kunit_try_run_case+0x1a5/0x480 [ 15.382812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.382836] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.382861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.382884] ? __kthread_parkme+0x82/0x180 [ 15.382905] ? preempt_count_sub+0x50/0x80 [ 15.382930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.382955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.382980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.383018] kthread+0x337/0x6f0 [ 15.383037] ? trace_preempt_on+0x20/0xc0 [ 15.383061] ? __pfx_kthread+0x10/0x10 [ 15.383082] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.383104] ? calculate_sigpending+0x7b/0xa0 [ 15.383129] ? __pfx_kthread+0x10/0x10 [ 15.383162] ret_from_fork+0x116/0x1d0 [ 15.383349] ? __pfx_kthread+0x10/0x10 [ 15.383371] ret_from_fork_asm+0x1a/0x30 [ 15.383402] </TASK> [ 15.383412] [ 15.394060] Allocated by task 282: [ 15.394230] kasan_save_stack+0x45/0x70 [ 15.394422] kasan_save_track+0x18/0x40 [ 15.394618] kasan_save_alloc_info+0x3b/0x50 [ 15.394791] __kasan_kmalloc+0xb7/0xc0 [ 15.394925] __kmalloc_cache_noprof+0x189/0x420 [ 15.395273] kasan_atomics+0x95/0x310 [ 15.395509] kunit_try_run_case+0x1a5/0x480 [ 15.395656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.396007] kthread+0x337/0x6f0 [ 15.396274] ret_from_fork+0x116/0x1d0 [ 15.396501] ret_from_fork_asm+0x1a/0x30 [ 15.396679] [ 15.396777] The buggy address belongs to the object at ffff888102a0a600 [ 15.396777] which belongs to the cache kmalloc-64 of size 64 [ 15.397547] The buggy address is located 0 bytes to the right of [ 15.397547] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.398035] [ 15.398134] The buggy address belongs to the physical page: [ 15.398487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.398807] flags: 0x200000000000000(node=0|zone=2) [ 15.399006] page_type: f5(slab) [ 15.399150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.399567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.399846] page dumped because: kasan: bad access detected [ 15.400042] [ 15.400165] Memory state around the buggy address: [ 15.400542] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.400777] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.401094] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.401592] ^ [ 15.401755] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402173] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402595] ================================================================== [ 15.883951] ================================================================== [ 15.884197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.884875] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.885790] [ 15.885919] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.885965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.885979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.886238] Call Trace: [ 15.886256] <TASK> [ 15.886288] dump_stack_lvl+0x73/0xb0 [ 15.886321] print_report+0xd1/0x610 [ 15.886344] ? __virt_addr_valid+0x1db/0x2d0 [ 15.886369] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.886393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.886418] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.886441] kasan_report+0x141/0x180 [ 15.886463] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.886492] kasan_check_range+0x10c/0x1c0 [ 15.886516] __kasan_check_write+0x18/0x20 [ 15.886536] kasan_atomics_helper+0xfa9/0x5450 [ 15.886561] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.886585] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.886612] ? kasan_atomics+0x152/0x310 [ 15.886640] kasan_atomics+0x1dc/0x310 [ 15.886664] ? __pfx_kasan_atomics+0x10/0x10 [ 15.886690] ? __pfx_read_tsc+0x10/0x10 [ 15.886716] ? ktime_get_ts64+0x86/0x230 [ 15.886741] kunit_try_run_case+0x1a5/0x480 [ 15.886768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886792] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.886818] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.886843] ? __kthread_parkme+0x82/0x180 [ 15.886865] ? preempt_count_sub+0x50/0x80 [ 15.886891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.886943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.886970] kthread+0x337/0x6f0 [ 15.887170] ? trace_preempt_on+0x20/0xc0 [ 15.887197] ? __pfx_kthread+0x10/0x10 [ 15.887219] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.887242] ? calculate_sigpending+0x7b/0xa0 [ 15.887280] ? __pfx_kthread+0x10/0x10 [ 15.887303] ret_from_fork+0x116/0x1d0 [ 15.887323] ? __pfx_kthread+0x10/0x10 [ 15.887345] ret_from_fork_asm+0x1a/0x30 [ 15.887378] </TASK> [ 15.887389] [ 15.899537] Allocated by task 282: [ 15.899726] kasan_save_stack+0x45/0x70 [ 15.899920] kasan_save_track+0x18/0x40 [ 15.900071] kasan_save_alloc_info+0x3b/0x50 [ 15.900296] __kasan_kmalloc+0xb7/0xc0 [ 15.900461] __kmalloc_cache_noprof+0x189/0x420 [ 15.900664] kasan_atomics+0x95/0x310 [ 15.900850] kunit_try_run_case+0x1a5/0x480 [ 15.901043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.901341] kthread+0x337/0x6f0 [ 15.901508] ret_from_fork+0x116/0x1d0 [ 15.901708] ret_from_fork_asm+0x1a/0x30 [ 15.902094] [ 15.902239] The buggy address belongs to the object at ffff888102a0a600 [ 15.902239] which belongs to the cache kmalloc-64 of size 64 [ 15.902738] The buggy address is located 0 bytes to the right of [ 15.902738] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.903141] [ 15.903513] The buggy address belongs to the physical page: [ 15.903791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.904343] flags: 0x200000000000000(node=0|zone=2) [ 15.904585] page_type: f5(slab) [ 15.904714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.905156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.905409] page dumped because: kasan: bad access detected [ 15.905662] [ 15.905755] Memory state around the buggy address: [ 15.905972] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.906330] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.906556] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.906887] ^ [ 15.907076] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.907519] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.907836] ================================================================== [ 16.246357] ================================================================== [ 16.247551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.248252] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.248958] [ 16.249288] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.249340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.249466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.249490] Call Trace: [ 16.249505] <TASK> [ 16.249524] dump_stack_lvl+0x73/0xb0 [ 16.249560] print_report+0xd1/0x610 [ 16.249585] ? __virt_addr_valid+0x1db/0x2d0 [ 16.249610] ? kasan_atomics_helper+0x177f/0x5450 [ 16.249632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.249657] ? kasan_atomics_helper+0x177f/0x5450 [ 16.249682] kasan_report+0x141/0x180 [ 16.249705] ? kasan_atomics_helper+0x177f/0x5450 [ 16.249733] kasan_check_range+0x10c/0x1c0 [ 16.249757] __kasan_check_write+0x18/0x20 [ 16.249778] kasan_atomics_helper+0x177f/0x5450 [ 16.249802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.249826] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.249852] ? kasan_atomics+0x152/0x310 [ 16.249879] kasan_atomics+0x1dc/0x310 [ 16.249902] ? __pfx_kasan_atomics+0x10/0x10 [ 16.249927] ? __pfx_read_tsc+0x10/0x10 [ 16.249950] ? ktime_get_ts64+0x86/0x230 [ 16.249975] kunit_try_run_case+0x1a5/0x480 [ 16.250237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.250278] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.250305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.250330] ? __kthread_parkme+0x82/0x180 [ 16.250353] ? preempt_count_sub+0x50/0x80 [ 16.250378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.250403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.250430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.250456] kthread+0x337/0x6f0 [ 16.250476] ? trace_preempt_on+0x20/0xc0 [ 16.250502] ? __pfx_kthread+0x10/0x10 [ 16.250524] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.250546] ? calculate_sigpending+0x7b/0xa0 [ 16.250572] ? __pfx_kthread+0x10/0x10 [ 16.250595] ret_from_fork+0x116/0x1d0 [ 16.250615] ? __pfx_kthread+0x10/0x10 [ 16.250637] ret_from_fork_asm+0x1a/0x30 [ 16.250670] </TASK> [ 16.250681] [ 16.263728] Allocated by task 282: [ 16.264164] kasan_save_stack+0x45/0x70 [ 16.264506] kasan_save_track+0x18/0x40 [ 16.264717] kasan_save_alloc_info+0x3b/0x50 [ 16.264930] __kasan_kmalloc+0xb7/0xc0 [ 16.266170] __kmalloc_cache_noprof+0x189/0x420 [ 16.266374] kasan_atomics+0x95/0x310 [ 16.266516] kunit_try_run_case+0x1a5/0x480 [ 16.266668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.266854] kthread+0x337/0x6f0 [ 16.266986] ret_from_fork+0x116/0x1d0 [ 16.267121] ret_from_fork_asm+0x1a/0x30 [ 16.267272] [ 16.267349] The buggy address belongs to the object at ffff888102a0a600 [ 16.267349] which belongs to the cache kmalloc-64 of size 64 [ 16.267706] The buggy address is located 0 bytes to the right of [ 16.267706] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.268075] [ 16.268148] The buggy address belongs to the physical page: [ 16.270557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.271493] flags: 0x200000000000000(node=0|zone=2) [ 16.271765] page_type: f5(slab) [ 16.271950] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.272788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.273689] page dumped because: kasan: bad access detected [ 16.273927] [ 16.274339] Memory state around the buggy address: [ 16.274547] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.274855] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.275644] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.276427] ^ [ 16.276744] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.277318] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.278122] ================================================================== [ 16.361099] ================================================================== [ 16.361625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.361923] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.362475] [ 16.362581] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.362623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.362635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.362658] Call Trace: [ 16.362669] <TASK> [ 16.362685] dump_stack_lvl+0x73/0xb0 [ 16.362720] print_report+0xd1/0x610 [ 16.362743] ? __virt_addr_valid+0x1db/0x2d0 [ 16.362767] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.362789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.362815] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.362838] kasan_report+0x141/0x180 [ 16.362862] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.362890] kasan_check_range+0x10c/0x1c0 [ 16.362915] __kasan_check_write+0x18/0x20 [ 16.362936] kasan_atomics_helper+0x1a7f/0x5450 [ 16.362960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.362984] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.363010] ? kasan_atomics+0x152/0x310 [ 16.363037] kasan_atomics+0x1dc/0x310 [ 16.363060] ? __pfx_kasan_atomics+0x10/0x10 [ 16.363086] ? __pfx_read_tsc+0x10/0x10 [ 16.363107] ? ktime_get_ts64+0x86/0x230 [ 16.363132] kunit_try_run_case+0x1a5/0x480 [ 16.363158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.363207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.363233] ? __kthread_parkme+0x82/0x180 [ 16.363254] ? preempt_count_sub+0x50/0x80 [ 16.363289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.363341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.363368] kthread+0x337/0x6f0 [ 16.363387] ? trace_preempt_on+0x20/0xc0 [ 16.363411] ? __pfx_kthread+0x10/0x10 [ 16.363432] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.363455] ? calculate_sigpending+0x7b/0xa0 [ 16.363481] ? __pfx_kthread+0x10/0x10 [ 16.363503] ret_from_fork+0x116/0x1d0 [ 16.363523] ? __pfx_kthread+0x10/0x10 [ 16.363544] ret_from_fork_asm+0x1a/0x30 [ 16.363576] </TASK> [ 16.363587] [ 16.370685] Allocated by task 282: [ 16.370853] kasan_save_stack+0x45/0x70 [ 16.371030] kasan_save_track+0x18/0x40 [ 16.371218] kasan_save_alloc_info+0x3b/0x50 [ 16.371408] __kasan_kmalloc+0xb7/0xc0 [ 16.371594] __kmalloc_cache_noprof+0x189/0x420 [ 16.371786] kasan_atomics+0x95/0x310 [ 16.371956] kunit_try_run_case+0x1a5/0x480 [ 16.372119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.372307] kthread+0x337/0x6f0 [ 16.372430] ret_from_fork+0x116/0x1d0 [ 16.372591] ret_from_fork_asm+0x1a/0x30 [ 16.372791] [ 16.372885] The buggy address belongs to the object at ffff888102a0a600 [ 16.372885] which belongs to the cache kmalloc-64 of size 64 [ 16.373377] The buggy address is located 0 bytes to the right of [ 16.373377] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.373747] [ 16.373842] The buggy address belongs to the physical page: [ 16.374097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.374476] flags: 0x200000000000000(node=0|zone=2) [ 16.374718] page_type: f5(slab) [ 16.374889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.375182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.375488] page dumped because: kasan: bad access detected [ 16.375719] [ 16.375799] Memory state around the buggy address: [ 16.375995] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.376284] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.376564] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.376778] ^ [ 16.376932] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.377152] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.377376] ================================================================== [ 15.699903] ================================================================== [ 15.700451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.700722] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.701043] [ 15.701156] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.701198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.701212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.701233] Call Trace: [ 15.701250] <TASK> [ 15.701617] dump_stack_lvl+0x73/0xb0 [ 15.701660] print_report+0xd1/0x610 [ 15.701685] ? __virt_addr_valid+0x1db/0x2d0 [ 15.701710] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.701733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.701767] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.701790] kasan_report+0x141/0x180 [ 15.701813] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.701841] kasan_check_range+0x10c/0x1c0 [ 15.701866] __kasan_check_write+0x18/0x20 [ 15.701887] kasan_atomics_helper+0xa2b/0x5450 [ 15.701911] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.701935] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.702023] ? kasan_atomics+0x152/0x310 [ 15.702072] kasan_atomics+0x1dc/0x310 [ 15.702097] ? __pfx_kasan_atomics+0x10/0x10 [ 15.702122] ? __pfx_read_tsc+0x10/0x10 [ 15.702144] ? ktime_get_ts64+0x86/0x230 [ 15.702170] kunit_try_run_case+0x1a5/0x480 [ 15.702196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.702244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.702281] ? __kthread_parkme+0x82/0x180 [ 15.702302] ? preempt_count_sub+0x50/0x80 [ 15.702327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.702382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.702410] kthread+0x337/0x6f0 [ 15.702431] ? trace_preempt_on+0x20/0xc0 [ 15.702455] ? __pfx_kthread+0x10/0x10 [ 15.702477] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.702501] ? calculate_sigpending+0x7b/0xa0 [ 15.702528] ? __pfx_kthread+0x10/0x10 [ 15.702551] ret_from_fork+0x116/0x1d0 [ 15.702571] ? __pfx_kthread+0x10/0x10 [ 15.702593] ret_from_fork_asm+0x1a/0x30 [ 15.702626] </TASK> [ 15.702637] [ 15.710663] Allocated by task 282: [ 15.710858] kasan_save_stack+0x45/0x70 [ 15.711152] kasan_save_track+0x18/0x40 [ 15.711367] kasan_save_alloc_info+0x3b/0x50 [ 15.711581] __kasan_kmalloc+0xb7/0xc0 [ 15.711773] __kmalloc_cache_noprof+0x189/0x420 [ 15.712028] kasan_atomics+0x95/0x310 [ 15.712230] kunit_try_run_case+0x1a5/0x480 [ 15.712453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.712686] kthread+0x337/0x6f0 [ 15.712848] ret_from_fork+0x116/0x1d0 [ 15.713107] ret_from_fork_asm+0x1a/0x30 [ 15.713305] [ 15.713391] The buggy address belongs to the object at ffff888102a0a600 [ 15.713391] which belongs to the cache kmalloc-64 of size 64 [ 15.713872] The buggy address is located 0 bytes to the right of [ 15.713872] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.714446] [ 15.714530] The buggy address belongs to the physical page: [ 15.714793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.715233] flags: 0x200000000000000(node=0|zone=2) [ 15.715483] page_type: f5(slab) [ 15.715650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.715945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.716277] page dumped because: kasan: bad access detected [ 15.716537] [ 15.716634] Memory state around the buggy address: [ 15.716862] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.717237] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.717564] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.717842] ^ [ 15.718259] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.718566] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.718839] ================================================================== [ 16.595285] ================================================================== [ 16.595796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.596386] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.597053] [ 16.597221] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.597275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.597290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.597321] Call Trace: [ 16.597336] <TASK> [ 16.597351] dump_stack_lvl+0x73/0xb0 [ 16.597385] print_report+0xd1/0x610 [ 16.597408] ? __virt_addr_valid+0x1db/0x2d0 [ 16.597432] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.597455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.597482] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.597505] kasan_report+0x141/0x180 [ 16.597528] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.597557] kasan_check_range+0x10c/0x1c0 [ 16.597582] __kasan_check_write+0x18/0x20 [ 16.597602] kasan_atomics_helper+0x20c8/0x5450 [ 16.597627] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.597651] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.597676] ? kasan_atomics+0x152/0x310 [ 16.597703] kasan_atomics+0x1dc/0x310 [ 16.597727] ? __pfx_kasan_atomics+0x10/0x10 [ 16.597752] ? __pfx_read_tsc+0x10/0x10 [ 16.597775] ? ktime_get_ts64+0x86/0x230 [ 16.597800] kunit_try_run_case+0x1a5/0x480 [ 16.597825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.597850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.597875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.597900] ? __kthread_parkme+0x82/0x180 [ 16.597921] ? preempt_count_sub+0x50/0x80 [ 16.597947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.597973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.597998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.598026] kthread+0x337/0x6f0 [ 16.598045] ? trace_preempt_on+0x20/0xc0 [ 16.598069] ? __pfx_kthread+0x10/0x10 [ 16.598090] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.598113] ? calculate_sigpending+0x7b/0xa0 [ 16.598138] ? __pfx_kthread+0x10/0x10 [ 16.598161] ret_from_fork+0x116/0x1d0 [ 16.598181] ? __pfx_kthread+0x10/0x10 [ 16.598203] ret_from_fork_asm+0x1a/0x30 [ 16.598235] </TASK> [ 16.598246] [ 16.610065] Allocated by task 282: [ 16.610396] kasan_save_stack+0x45/0x70 [ 16.610758] kasan_save_track+0x18/0x40 [ 16.611110] kasan_save_alloc_info+0x3b/0x50 [ 16.611513] __kasan_kmalloc+0xb7/0xc0 [ 16.611806] __kmalloc_cache_noprof+0x189/0x420 [ 16.611965] kasan_atomics+0x95/0x310 [ 16.612104] kunit_try_run_case+0x1a5/0x480 [ 16.612256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.612495] kthread+0x337/0x6f0 [ 16.612638] ret_from_fork+0x116/0x1d0 [ 16.612830] ret_from_fork_asm+0x1a/0x30 [ 16.612992] [ 16.613088] The buggy address belongs to the object at ffff888102a0a600 [ 16.613088] which belongs to the cache kmalloc-64 of size 64 [ 16.613584] The buggy address is located 0 bytes to the right of [ 16.613584] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.614607] [ 16.614771] The buggy address belongs to the physical page: [ 16.615216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.615465] flags: 0x200000000000000(node=0|zone=2) [ 16.615629] page_type: f5(slab) [ 16.615749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.616050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.616697] page dumped because: kasan: bad access detected [ 16.617157] [ 16.617320] Memory state around the buggy address: [ 16.617724] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.618340] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.618951] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.619561] ^ [ 16.619966] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.620548] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.620767] ================================================================== [ 15.820770] ================================================================== [ 15.821311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.821652] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.821958] [ 15.822248] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.822307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.822319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.822340] Call Trace: [ 15.822354] <TASK> [ 15.822369] dump_stack_lvl+0x73/0xb0 [ 15.822398] print_report+0xd1/0x610 [ 15.822421] ? __virt_addr_valid+0x1db/0x2d0 [ 15.822445] ? kasan_atomics_helper+0xde0/0x5450 [ 15.822467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.822492] ? kasan_atomics_helper+0xde0/0x5450 [ 15.822516] kasan_report+0x141/0x180 [ 15.822539] ? kasan_atomics_helper+0xde0/0x5450 [ 15.822566] kasan_check_range+0x10c/0x1c0 [ 15.822591] __kasan_check_write+0x18/0x20 [ 15.822612] kasan_atomics_helper+0xde0/0x5450 [ 15.822636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.822661] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.822687] ? kasan_atomics+0x152/0x310 [ 15.822720] kasan_atomics+0x1dc/0x310 [ 15.822744] ? __pfx_kasan_atomics+0x10/0x10 [ 15.822769] ? __pfx_read_tsc+0x10/0x10 [ 15.822792] ? ktime_get_ts64+0x86/0x230 [ 15.822818] kunit_try_run_case+0x1a5/0x480 [ 15.822844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.822869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.822893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.822919] ? __kthread_parkme+0x82/0x180 [ 15.822940] ? preempt_count_sub+0x50/0x80 [ 15.822966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.823061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.823088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.823116] kthread+0x337/0x6f0 [ 15.823137] ? trace_preempt_on+0x20/0xc0 [ 15.823161] ? __pfx_kthread+0x10/0x10 [ 15.823183] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.823206] ? calculate_sigpending+0x7b/0xa0 [ 15.823231] ? __pfx_kthread+0x10/0x10 [ 15.823254] ret_from_fork+0x116/0x1d0 [ 15.823285] ? __pfx_kthread+0x10/0x10 [ 15.823307] ret_from_fork_asm+0x1a/0x30 [ 15.823339] </TASK> [ 15.823350] [ 15.831666] Allocated by task 282: [ 15.831852] kasan_save_stack+0x45/0x70 [ 15.832134] kasan_save_track+0x18/0x40 [ 15.832330] kasan_save_alloc_info+0x3b/0x50 [ 15.832499] __kasan_kmalloc+0xb7/0xc0 [ 15.832691] __kmalloc_cache_noprof+0x189/0x420 [ 15.832871] kasan_atomics+0x95/0x310 [ 15.833010] kunit_try_run_case+0x1a5/0x480 [ 15.833158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.833346] kthread+0x337/0x6f0 [ 15.833468] ret_from_fork+0x116/0x1d0 [ 15.833602] ret_from_fork_asm+0x1a/0x30 [ 15.833851] [ 15.834184] The buggy address belongs to the object at ffff888102a0a600 [ 15.834184] which belongs to the cache kmalloc-64 of size 64 [ 15.835169] The buggy address is located 0 bytes to the right of [ 15.835169] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.835845] [ 15.835922] The buggy address belongs to the physical page: [ 15.836097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.836631] flags: 0x200000000000000(node=0|zone=2) [ 15.836879] page_type: f5(slab) [ 15.837052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.837477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.837823] page dumped because: kasan: bad access detected [ 15.838257] [ 15.838359] Memory state around the buggy address: [ 15.838578] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.838828] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.839347] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.839635] ^ [ 15.839795] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840125] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840418] ================================================================== [ 16.516567] ================================================================== [ 16.516914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.517404] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.517737] [ 16.517869] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.517912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.517926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.517948] Call Trace: [ 16.517968] <TASK> [ 16.517982] dump_stack_lvl+0x73/0xb0 [ 16.518010] print_report+0xd1/0x610 [ 16.518047] ? __virt_addr_valid+0x1db/0x2d0 [ 16.518070] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.518093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.518118] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.518141] kasan_report+0x141/0x180 [ 16.518164] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.518192] kasan_check_range+0x10c/0x1c0 [ 16.518217] __kasan_check_write+0x18/0x20 [ 16.518237] kasan_atomics_helper+0x1f43/0x5450 [ 16.518272] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.518296] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.518322] ? kasan_atomics+0x152/0x310 [ 16.518349] kasan_atomics+0x1dc/0x310 [ 16.518372] ? __pfx_kasan_atomics+0x10/0x10 [ 16.518398] ? __pfx_read_tsc+0x10/0x10 [ 16.518421] ? ktime_get_ts64+0x86/0x230 [ 16.518447] kunit_try_run_case+0x1a5/0x480 [ 16.518472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.518497] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.518522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.518547] ? __kthread_parkme+0x82/0x180 [ 16.518569] ? preempt_count_sub+0x50/0x80 [ 16.518594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.518620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.518646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.518673] kthread+0x337/0x6f0 [ 16.518693] ? trace_preempt_on+0x20/0xc0 [ 16.518725] ? __pfx_kthread+0x10/0x10 [ 16.518746] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.518769] ? calculate_sigpending+0x7b/0xa0 [ 16.518795] ? __pfx_kthread+0x10/0x10 [ 16.518818] ret_from_fork+0x116/0x1d0 [ 16.518838] ? __pfx_kthread+0x10/0x10 [ 16.518859] ret_from_fork_asm+0x1a/0x30 [ 16.518891] </TASK> [ 16.518901] [ 16.533332] Allocated by task 282: [ 16.533534] kasan_save_stack+0x45/0x70 [ 16.533702] kasan_save_track+0x18/0x40 [ 16.533899] kasan_save_alloc_info+0x3b/0x50 [ 16.534089] __kasan_kmalloc+0xb7/0xc0 [ 16.534257] __kmalloc_cache_noprof+0x189/0x420 [ 16.534428] kasan_atomics+0x95/0x310 [ 16.534617] kunit_try_run_case+0x1a5/0x480 [ 16.534831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.535053] kthread+0x337/0x6f0 [ 16.535173] ret_from_fork+0x116/0x1d0 [ 16.535358] ret_from_fork_asm+0x1a/0x30 [ 16.535558] [ 16.535658] The buggy address belongs to the object at ffff888102a0a600 [ 16.535658] which belongs to the cache kmalloc-64 of size 64 [ 16.536141] The buggy address is located 0 bytes to the right of [ 16.536141] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.536650] [ 16.536727] The buggy address belongs to the physical page: [ 16.536964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.537260] flags: 0x200000000000000(node=0|zone=2) [ 16.537504] page_type: f5(slab) [ 16.537652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.537956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.538277] page dumped because: kasan: bad access detected [ 16.538486] [ 16.538582] Memory state around the buggy address: [ 16.538776] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.539001] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.539256] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.539584] ^ [ 16.539807] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.540043] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.540257] ================================================================== [ 16.164343] ================================================================== [ 16.164654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 16.165088] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.165391] [ 16.165476] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.165518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.165531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.165552] Call Trace: [ 16.165567] <TASK> [ 16.165581] dump_stack_lvl+0x73/0xb0 [ 16.165608] print_report+0xd1/0x610 [ 16.165631] ? __virt_addr_valid+0x1db/0x2d0 [ 16.165655] ? kasan_atomics_helper+0x151d/0x5450 [ 16.165677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.165703] ? kasan_atomics_helper+0x151d/0x5450 [ 16.165726] kasan_report+0x141/0x180 [ 16.165749] ? kasan_atomics_helper+0x151d/0x5450 [ 16.165777] kasan_check_range+0x10c/0x1c0 [ 16.165802] __kasan_check_write+0x18/0x20 [ 16.165823] kasan_atomics_helper+0x151d/0x5450 [ 16.165847] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.165872] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.165898] ? kasan_atomics+0x152/0x310 [ 16.165925] kasan_atomics+0x1dc/0x310 [ 16.165948] ? __pfx_kasan_atomics+0x10/0x10 [ 16.166081] ? __pfx_read_tsc+0x10/0x10 [ 16.166107] ? ktime_get_ts64+0x86/0x230 [ 16.166132] kunit_try_run_case+0x1a5/0x480 [ 16.166158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.166182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.166206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.166232] ? __kthread_parkme+0x82/0x180 [ 16.166253] ? preempt_count_sub+0x50/0x80 [ 16.166289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.166315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.166342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.166369] kthread+0x337/0x6f0 [ 16.166389] ? trace_preempt_on+0x20/0xc0 [ 16.166413] ? __pfx_kthread+0x10/0x10 [ 16.166434] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.166458] ? calculate_sigpending+0x7b/0xa0 [ 16.166485] ? __pfx_kthread+0x10/0x10 [ 16.166508] ret_from_fork+0x116/0x1d0 [ 16.166527] ? __pfx_kthread+0x10/0x10 [ 16.166548] ret_from_fork_asm+0x1a/0x30 [ 16.166580] </TASK> [ 16.166591] [ 16.174582] Allocated by task 282: [ 16.174763] kasan_save_stack+0x45/0x70 [ 16.175131] kasan_save_track+0x18/0x40 [ 16.175343] kasan_save_alloc_info+0x3b/0x50 [ 16.175498] __kasan_kmalloc+0xb7/0xc0 [ 16.175634] __kmalloc_cache_noprof+0x189/0x420 [ 16.175810] kasan_atomics+0x95/0x310 [ 16.176113] kunit_try_run_case+0x1a5/0x480 [ 16.176344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.176602] kthread+0x337/0x6f0 [ 16.176776] ret_from_fork+0x116/0x1d0 [ 16.177036] ret_from_fork_asm+0x1a/0x30 [ 16.177245] [ 16.177353] The buggy address belongs to the object at ffff888102a0a600 [ 16.177353] which belongs to the cache kmalloc-64 of size 64 [ 16.177733] The buggy address is located 0 bytes to the right of [ 16.177733] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.178380] [ 16.178483] The buggy address belongs to the physical page: [ 16.178699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.179200] flags: 0x200000000000000(node=0|zone=2) [ 16.179387] page_type: f5(slab) [ 16.179547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.179895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.180364] page dumped because: kasan: bad access detected [ 16.180620] [ 16.180714] Memory state around the buggy address: [ 16.180941] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.181260] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.181598] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.181903] ^ [ 16.182192] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.182510] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.182743] ================================================================== [ 16.011725] ================================================================== [ 16.013071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 16.013539] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.013846] [ 16.013950] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.013994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.014008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.014031] Call Trace: [ 16.014045] <TASK> [ 16.014061] dump_stack_lvl+0x73/0xb0 [ 16.014091] print_report+0xd1/0x610 [ 16.014115] ? __virt_addr_valid+0x1db/0x2d0 [ 16.014139] ? kasan_atomics_helper+0x1217/0x5450 [ 16.014162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.014188] ? kasan_atomics_helper+0x1217/0x5450 [ 16.014211] kasan_report+0x141/0x180 [ 16.014234] ? kasan_atomics_helper+0x1217/0x5450 [ 16.014293] kasan_check_range+0x10c/0x1c0 [ 16.014318] __kasan_check_write+0x18/0x20 [ 16.014340] kasan_atomics_helper+0x1217/0x5450 [ 16.014363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.014388] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.014414] ? kasan_atomics+0x152/0x310 [ 16.014442] kasan_atomics+0x1dc/0x310 [ 16.014465] ? __pfx_kasan_atomics+0x10/0x10 [ 16.014489] ? __pfx_read_tsc+0x10/0x10 [ 16.014513] ? ktime_get_ts64+0x86/0x230 [ 16.014538] kunit_try_run_case+0x1a5/0x480 [ 16.014563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.014613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.014637] ? __kthread_parkme+0x82/0x180 [ 16.014659] ? preempt_count_sub+0x50/0x80 [ 16.014684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.014742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.014768] kthread+0x337/0x6f0 [ 16.014788] ? trace_preempt_on+0x20/0xc0 [ 16.014812] ? __pfx_kthread+0x10/0x10 [ 16.014834] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.014857] ? calculate_sigpending+0x7b/0xa0 [ 16.014882] ? __pfx_kthread+0x10/0x10 [ 16.014904] ret_from_fork+0x116/0x1d0 [ 16.014924] ? __pfx_kthread+0x10/0x10 [ 16.014945] ret_from_fork_asm+0x1a/0x30 [ 16.014977] </TASK> [ 16.014989] [ 16.023201] Allocated by task 282: [ 16.023393] kasan_save_stack+0x45/0x70 [ 16.023592] kasan_save_track+0x18/0x40 [ 16.023760] kasan_save_alloc_info+0x3b/0x50 [ 16.023956] __kasan_kmalloc+0xb7/0xc0 [ 16.024191] __kmalloc_cache_noprof+0x189/0x420 [ 16.024363] kasan_atomics+0x95/0x310 [ 16.024548] kunit_try_run_case+0x1a5/0x480 [ 16.024757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.025127] kthread+0x337/0x6f0 [ 16.025326] ret_from_fork+0x116/0x1d0 [ 16.025503] ret_from_fork_asm+0x1a/0x30 [ 16.025646] [ 16.025720] The buggy address belongs to the object at ffff888102a0a600 [ 16.025720] which belongs to the cache kmalloc-64 of size 64 [ 16.026310] The buggy address is located 0 bytes to the right of [ 16.026310] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.026694] [ 16.026798] The buggy address belongs to the physical page: [ 16.027252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.027637] flags: 0x200000000000000(node=0|zone=2) [ 16.027870] page_type: f5(slab) [ 16.028128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.028472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.028760] page dumped because: kasan: bad access detected [ 16.028955] [ 16.029119] Memory state around the buggy address: [ 16.029296] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.029628] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.029955] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.030368] ^ [ 16.030608] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.030911] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031395] ================================================================== [ 16.621192] ================================================================== [ 16.621471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.621807] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.622139] [ 16.622251] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.622303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.622317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.622338] Call Trace: [ 16.622354] <TASK> [ 16.622371] dump_stack_lvl+0x73/0xb0 [ 16.622397] print_report+0xd1/0x610 [ 16.622419] ? __virt_addr_valid+0x1db/0x2d0 [ 16.622443] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.622466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.622491] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.622515] kasan_report+0x141/0x180 [ 16.622538] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.622566] __asan_report_load8_noabort+0x18/0x20 [ 16.622592] kasan_atomics_helper+0x4fb2/0x5450 [ 16.622619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.622645] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.622671] ? kasan_atomics+0x152/0x310 [ 16.622698] kasan_atomics+0x1dc/0x310 [ 16.622728] ? __pfx_kasan_atomics+0x10/0x10 [ 16.622755] ? __pfx_read_tsc+0x10/0x10 [ 16.622776] ? ktime_get_ts64+0x86/0x230 [ 16.622802] kunit_try_run_case+0x1a5/0x480 [ 16.622828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.622854] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.622880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.622906] ? __kthread_parkme+0x82/0x180 [ 16.622928] ? preempt_count_sub+0x50/0x80 [ 16.622952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.622979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.623005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.623031] kthread+0x337/0x6f0 [ 16.623051] ? trace_preempt_on+0x20/0xc0 [ 16.623075] ? __pfx_kthread+0x10/0x10 [ 16.623097] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.623120] ? calculate_sigpending+0x7b/0xa0 [ 16.623145] ? __pfx_kthread+0x10/0x10 [ 16.623168] ret_from_fork+0x116/0x1d0 [ 16.623187] ? __pfx_kthread+0x10/0x10 [ 16.623209] ret_from_fork_asm+0x1a/0x30 [ 16.623241] </TASK> [ 16.623252] [ 16.630175] Allocated by task 282: [ 16.630314] kasan_save_stack+0x45/0x70 [ 16.630456] kasan_save_track+0x18/0x40 [ 16.630616] kasan_save_alloc_info+0x3b/0x50 [ 16.630833] __kasan_kmalloc+0xb7/0xc0 [ 16.631020] __kmalloc_cache_noprof+0x189/0x420 [ 16.631241] kasan_atomics+0x95/0x310 [ 16.631438] kunit_try_run_case+0x1a5/0x480 [ 16.631649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.631847] kthread+0x337/0x6f0 [ 16.631969] ret_from_fork+0x116/0x1d0 [ 16.632150] ret_from_fork_asm+0x1a/0x30 [ 16.632361] [ 16.632458] The buggy address belongs to the object at ffff888102a0a600 [ 16.632458] which belongs to the cache kmalloc-64 of size 64 [ 16.632904] The buggy address is located 0 bytes to the right of [ 16.632904] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.633301] [ 16.633398] The buggy address belongs to the physical page: [ 16.633651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.634000] flags: 0x200000000000000(node=0|zone=2) [ 16.634214] page_type: f5(slab) [ 16.634344] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.634577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.634868] page dumped because: kasan: bad access detected [ 16.635124] [ 16.635216] Memory state around the buggy address: [ 16.635454] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.635780] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.636112] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.636417] ^ [ 16.636609] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.636826] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.637147] ================================================================== [ 16.429223] ================================================================== [ 16.430528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.430835] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.431065] [ 16.431150] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.431195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.431209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.431231] Call Trace: [ 16.431246] <TASK> [ 16.431260] dump_stack_lvl+0x73/0xb0 [ 16.431494] print_report+0xd1/0x610 [ 16.431519] ? __virt_addr_valid+0x1db/0x2d0 [ 16.431544] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.431567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.431591] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.431779] kasan_report+0x141/0x180 [ 16.431804] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.431833] kasan_check_range+0x10c/0x1c0 [ 16.431859] __kasan_check_write+0x18/0x20 [ 16.431879] kasan_atomics_helper+0x1ce1/0x5450 [ 16.431906] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.431930] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.431956] ? kasan_atomics+0x152/0x310 [ 16.431983] kasan_atomics+0x1dc/0x310 [ 16.432007] ? __pfx_kasan_atomics+0x10/0x10 [ 16.432032] ? __pfx_read_tsc+0x10/0x10 [ 16.432054] ? ktime_get_ts64+0x86/0x230 [ 16.432082] kunit_try_run_case+0x1a5/0x480 [ 16.432108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.432133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.432158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.432183] ? __kthread_parkme+0x82/0x180 [ 16.432204] ? preempt_count_sub+0x50/0x80 [ 16.432228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.432255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.432293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.432319] kthread+0x337/0x6f0 [ 16.432340] ? trace_preempt_on+0x20/0xc0 [ 16.432364] ? __pfx_kthread+0x10/0x10 [ 16.432386] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.432409] ? calculate_sigpending+0x7b/0xa0 [ 16.432434] ? __pfx_kthread+0x10/0x10 [ 16.432456] ret_from_fork+0x116/0x1d0 [ 16.432476] ? __pfx_kthread+0x10/0x10 [ 16.432497] ret_from_fork_asm+0x1a/0x30 [ 16.432530] </TASK> [ 16.432541] [ 16.444800] Allocated by task 282: [ 16.444940] kasan_save_stack+0x45/0x70 [ 16.445090] kasan_save_track+0x18/0x40 [ 16.445226] kasan_save_alloc_info+0x3b/0x50 [ 16.445390] __kasan_kmalloc+0xb7/0xc0 [ 16.445525] __kmalloc_cache_noprof+0x189/0x420 [ 16.445682] kasan_atomics+0x95/0x310 [ 16.445816] kunit_try_run_case+0x1a5/0x480 [ 16.445964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.446142] kthread+0x337/0x6f0 [ 16.446278] ret_from_fork+0x116/0x1d0 [ 16.446605] ret_from_fork_asm+0x1a/0x30 [ 16.446958] [ 16.447113] The buggy address belongs to the object at ffff888102a0a600 [ 16.447113] which belongs to the cache kmalloc-64 of size 64 [ 16.448112] The buggy address is located 0 bytes to the right of [ 16.448112] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.449154] [ 16.449329] The buggy address belongs to the physical page: [ 16.449799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.450482] flags: 0x200000000000000(node=0|zone=2) [ 16.450902] page_type: f5(slab) [ 16.451195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.451846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.452483] page dumped because: kasan: bad access detected [ 16.452959] [ 16.453112] Memory state around the buggy address: [ 16.453531] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.454310] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.454921] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.455537] ^ [ 16.455968] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.456603] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.457212] ================================================================== [ 15.444670] ================================================================== [ 15.444972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.445388] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.445700] [ 15.445801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.445843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.445857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.445878] Call Trace: [ 15.445893] <TASK> [ 15.445909] dump_stack_lvl+0x73/0xb0 [ 15.445936] print_report+0xd1/0x610 [ 15.445959] ? __virt_addr_valid+0x1db/0x2d0 [ 15.445983] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.446005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.446030] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.446053] kasan_report+0x141/0x180 [ 15.446076] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.446104] __asan_report_store4_noabort+0x1b/0x30 [ 15.446130] kasan_atomics_helper+0x4b6e/0x5450 [ 15.446155] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.446198] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.446223] ? kasan_atomics+0x152/0x310 [ 15.446251] kasan_atomics+0x1dc/0x310 [ 15.446286] ? __pfx_kasan_atomics+0x10/0x10 [ 15.446311] ? __pfx_read_tsc+0x10/0x10 [ 15.446333] ? ktime_get_ts64+0x86/0x230 [ 15.446358] kunit_try_run_case+0x1a5/0x480 [ 15.446384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.446408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.446433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.446459] ? __kthread_parkme+0x82/0x180 [ 15.446480] ? preempt_count_sub+0x50/0x80 [ 15.446505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.446531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.446558] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.446585] kthread+0x337/0x6f0 [ 15.446605] ? trace_preempt_on+0x20/0xc0 [ 15.446629] ? __pfx_kthread+0x10/0x10 [ 15.446651] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.446674] ? calculate_sigpending+0x7b/0xa0 [ 15.446699] ? __pfx_kthread+0x10/0x10 [ 15.446728] ret_from_fork+0x116/0x1d0 [ 15.446747] ? __pfx_kthread+0x10/0x10 [ 15.446769] ret_from_fork_asm+0x1a/0x30 [ 15.446801] </TASK> [ 15.446811] [ 15.454571] Allocated by task 282: [ 15.454767] kasan_save_stack+0x45/0x70 [ 15.454970] kasan_save_track+0x18/0x40 [ 15.455242] kasan_save_alloc_info+0x3b/0x50 [ 15.455443] __kasan_kmalloc+0xb7/0xc0 [ 15.455613] __kmalloc_cache_noprof+0x189/0x420 [ 15.455813] kasan_atomics+0x95/0x310 [ 15.456005] kunit_try_run_case+0x1a5/0x480 [ 15.456161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.456351] kthread+0x337/0x6f0 [ 15.456475] ret_from_fork+0x116/0x1d0 [ 15.456610] ret_from_fork_asm+0x1a/0x30 [ 15.456753] [ 15.456824] The buggy address belongs to the object at ffff888102a0a600 [ 15.456824] which belongs to the cache kmalloc-64 of size 64 [ 15.457301] The buggy address is located 0 bytes to the right of [ 15.457301] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.458594] [ 15.458691] The buggy address belongs to the physical page: [ 15.458947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.459396] flags: 0x200000000000000(node=0|zone=2) [ 15.459561] page_type: f5(slab) [ 15.459681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.459911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.460354] page dumped because: kasan: bad access detected [ 15.460621] [ 15.460714] Memory state around the buggy address: [ 15.460942] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.461600] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.461855] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.462393] ^ [ 15.462553] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.462778] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463208] ================================================================== [ 16.679918] ================================================================== [ 16.680434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.681058] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.681373] [ 16.681478] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.681522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.681535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.681557] Call Trace: [ 16.681573] <TASK> [ 16.681588] dump_stack_lvl+0x73/0xb0 [ 16.681616] print_report+0xd1/0x610 [ 16.681639] ? __virt_addr_valid+0x1db/0x2d0 [ 16.681662] ? kasan_atomics_helper+0x224c/0x5450 [ 16.681685] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.681710] ? kasan_atomics_helper+0x224c/0x5450 [ 16.681734] kasan_report+0x141/0x180 [ 16.681756] ? kasan_atomics_helper+0x224c/0x5450 [ 16.681785] kasan_check_range+0x10c/0x1c0 [ 16.681810] __kasan_check_write+0x18/0x20 [ 16.681831] kasan_atomics_helper+0x224c/0x5450 [ 16.681856] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.681880] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.681906] ? kasan_atomics+0x152/0x310 [ 16.681933] kasan_atomics+0x1dc/0x310 [ 16.681957] ? __pfx_kasan_atomics+0x10/0x10 [ 16.681983] ? __pfx_read_tsc+0x10/0x10 [ 16.682005] ? ktime_get_ts64+0x86/0x230 [ 16.682031] kunit_try_run_case+0x1a5/0x480 [ 16.682056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.682083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.682107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.682133] ? __kthread_parkme+0x82/0x180 [ 16.682154] ? preempt_count_sub+0x50/0x80 [ 16.682180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.682207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.682233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.682260] kthread+0x337/0x6f0 [ 16.682480] ? trace_preempt_on+0x20/0xc0 [ 16.682507] ? __pfx_kthread+0x10/0x10 [ 16.682529] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.682553] ? calculate_sigpending+0x7b/0xa0 [ 16.682578] ? __pfx_kthread+0x10/0x10 [ 16.682636] ret_from_fork+0x116/0x1d0 [ 16.682658] ? __pfx_kthread+0x10/0x10 [ 16.682679] ret_from_fork_asm+0x1a/0x30 [ 16.682718] </TASK> [ 16.682729] [ 16.692830] Allocated by task 282: [ 16.693209] kasan_save_stack+0x45/0x70 [ 16.693510] kasan_save_track+0x18/0x40 [ 16.693884] kasan_save_alloc_info+0x3b/0x50 [ 16.694198] __kasan_kmalloc+0xb7/0xc0 [ 16.694636] __kmalloc_cache_noprof+0x189/0x420 [ 16.694918] kasan_atomics+0x95/0x310 [ 16.695201] kunit_try_run_case+0x1a5/0x480 [ 16.695603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.696051] kthread+0x337/0x6f0 [ 16.696288] ret_from_fork+0x116/0x1d0 [ 16.696582] ret_from_fork_asm+0x1a/0x30 [ 16.696879] [ 16.696987] The buggy address belongs to the object at ffff888102a0a600 [ 16.696987] which belongs to the cache kmalloc-64 of size 64 [ 16.697478] The buggy address is located 0 bytes to the right of [ 16.697478] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.697981] [ 16.698072] The buggy address belongs to the physical page: [ 16.698635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.699178] flags: 0x200000000000000(node=0|zone=2) [ 16.699581] page_type: f5(slab) [ 16.699874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.700390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.700946] page dumped because: kasan: bad access detected [ 16.701314] [ 16.701545] Memory state around the buggy address: [ 16.701779] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.702068] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.702368] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.702657] ^ [ 16.702872] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.703161] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.703826] ================================================================== [ 16.704935] ================================================================== [ 16.705599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.705906] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.706202] [ 16.706313] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.706356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.706369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.706392] Call Trace: [ 16.706408] <TASK> [ 16.706424] dump_stack_lvl+0x73/0xb0 [ 16.706452] print_report+0xd1/0x610 [ 16.706474] ? __virt_addr_valid+0x1db/0x2d0 [ 16.706498] ? kasan_atomics_helper+0x5115/0x5450 [ 16.706524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.706549] ? kasan_atomics_helper+0x5115/0x5450 [ 16.706572] kasan_report+0x141/0x180 [ 16.706596] ? kasan_atomics_helper+0x5115/0x5450 [ 16.706627] __asan_report_load8_noabort+0x18/0x20 [ 16.706655] kasan_atomics_helper+0x5115/0x5450 [ 16.706680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.706711] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.706738] ? kasan_atomics+0x152/0x310 [ 16.706765] kasan_atomics+0x1dc/0x310 [ 16.706790] ? __pfx_kasan_atomics+0x10/0x10 [ 16.706816] ? __pfx_read_tsc+0x10/0x10 [ 16.706838] ? ktime_get_ts64+0x86/0x230 [ 16.706864] kunit_try_run_case+0x1a5/0x480 [ 16.706890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.706914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.706939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.706965] ? __kthread_parkme+0x82/0x180 [ 16.706986] ? preempt_count_sub+0x50/0x80 [ 16.707011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.707037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.707063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.707090] kthread+0x337/0x6f0 [ 16.707111] ? trace_preempt_on+0x20/0xc0 [ 16.707134] ? __pfx_kthread+0x10/0x10 [ 16.707156] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.707179] ? calculate_sigpending+0x7b/0xa0 [ 16.707205] ? __pfx_kthread+0x10/0x10 [ 16.707227] ret_from_fork+0x116/0x1d0 [ 16.707247] ? __pfx_kthread+0x10/0x10 [ 16.707280] ret_from_fork_asm+0x1a/0x30 [ 16.707312] </TASK> [ 16.707323] [ 16.714285] Allocated by task 282: [ 16.714427] kasan_save_stack+0x45/0x70 [ 16.714596] kasan_save_track+0x18/0x40 [ 16.714800] kasan_save_alloc_info+0x3b/0x50 [ 16.714962] __kasan_kmalloc+0xb7/0xc0 [ 16.715158] __kmalloc_cache_noprof+0x189/0x420 [ 16.715356] kasan_atomics+0x95/0x310 [ 16.715524] kunit_try_run_case+0x1a5/0x480 [ 16.715715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.715938] kthread+0x337/0x6f0 [ 16.716095] ret_from_fork+0x116/0x1d0 [ 16.716255] ret_from_fork_asm+0x1a/0x30 [ 16.716424] [ 16.716509] The buggy address belongs to the object at ffff888102a0a600 [ 16.716509] which belongs to the cache kmalloc-64 of size 64 [ 16.716943] The buggy address is located 0 bytes to the right of [ 16.716943] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.717325] [ 16.717398] The buggy address belongs to the physical page: [ 16.717647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.718002] flags: 0x200000000000000(node=0|zone=2) [ 16.718231] page_type: f5(slab) [ 16.718406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.718666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.718903] page dumped because: kasan: bad access detected [ 16.719076] [ 16.719146] Memory state around the buggy address: [ 16.719381] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.719706] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.720033] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.720366] ^ [ 16.720589] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720911] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.721188] ================================================================== [ 15.602344] ================================================================== [ 15.602682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.602940] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.603563] [ 15.603656] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.603702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.603716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.603738] Call Trace: [ 15.603752] <TASK> [ 15.603767] dump_stack_lvl+0x73/0xb0 [ 15.603795] print_report+0xd1/0x610 [ 15.603818] ? __virt_addr_valid+0x1db/0x2d0 [ 15.603842] ? kasan_atomics_helper+0x72f/0x5450 [ 15.603865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.603891] ? kasan_atomics_helper+0x72f/0x5450 [ 15.603914] kasan_report+0x141/0x180 [ 15.603937] ? kasan_atomics_helper+0x72f/0x5450 [ 15.603965] kasan_check_range+0x10c/0x1c0 [ 15.603989] __kasan_check_write+0x18/0x20 [ 15.604010] kasan_atomics_helper+0x72f/0x5450 [ 15.604034] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.604059] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.604086] ? kasan_atomics+0x152/0x310 [ 15.604113] kasan_atomics+0x1dc/0x310 [ 15.604136] ? __pfx_kasan_atomics+0x10/0x10 [ 15.604163] ? __pfx_read_tsc+0x10/0x10 [ 15.604184] ? ktime_get_ts64+0x86/0x230 [ 15.604209] kunit_try_run_case+0x1a5/0x480 [ 15.604316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.604345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.604369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.604395] ? __kthread_parkme+0x82/0x180 [ 15.604416] ? preempt_count_sub+0x50/0x80 [ 15.604441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.604467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.604493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.604520] kthread+0x337/0x6f0 [ 15.604541] ? trace_preempt_on+0x20/0xc0 [ 15.604564] ? __pfx_kthread+0x10/0x10 [ 15.604586] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.604608] ? calculate_sigpending+0x7b/0xa0 [ 15.604634] ? __pfx_kthread+0x10/0x10 [ 15.604657] ret_from_fork+0x116/0x1d0 [ 15.604677] ? __pfx_kthread+0x10/0x10 [ 15.604699] ret_from_fork_asm+0x1a/0x30 [ 15.604730] </TASK> [ 15.604741] [ 15.612691] Allocated by task 282: [ 15.612876] kasan_save_stack+0x45/0x70 [ 15.613337] kasan_save_track+0x18/0x40 [ 15.613640] kasan_save_alloc_info+0x3b/0x50 [ 15.613869] __kasan_kmalloc+0xb7/0xc0 [ 15.614203] __kmalloc_cache_noprof+0x189/0x420 [ 15.614427] kasan_atomics+0x95/0x310 [ 15.614564] kunit_try_run_case+0x1a5/0x480 [ 15.614736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.614990] kthread+0x337/0x6f0 [ 15.615216] ret_from_fork+0x116/0x1d0 [ 15.615450] ret_from_fork_asm+0x1a/0x30 [ 15.615654] [ 15.615732] The buggy address belongs to the object at ffff888102a0a600 [ 15.615732] which belongs to the cache kmalloc-64 of size 64 [ 15.616277] The buggy address is located 0 bytes to the right of [ 15.616277] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.616655] [ 15.616727] The buggy address belongs to the physical page: [ 15.616951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.617307] flags: 0x200000000000000(node=0|zone=2) [ 15.617540] page_type: f5(slab) [ 15.617871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.618161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.618804] page dumped because: kasan: bad access detected [ 15.619115] [ 15.619210] Memory state around the buggy address: [ 15.619431] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.619684] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.619903] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.620180] ^ [ 15.620421] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.620752] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.621075] ================================================================== [ 15.463670] ================================================================== [ 15.464020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.464356] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.464608] [ 15.464690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.464730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.464744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.464766] Call Trace: [ 15.464781] <TASK> [ 15.464795] dump_stack_lvl+0x73/0xb0 [ 15.464822] print_report+0xd1/0x610 [ 15.464843] ? __virt_addr_valid+0x1db/0x2d0 [ 15.464867] ? kasan_atomics_helper+0x3df/0x5450 [ 15.464890] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.464914] ? kasan_atomics_helper+0x3df/0x5450 [ 15.464937] kasan_report+0x141/0x180 [ 15.464960] ? kasan_atomics_helper+0x3df/0x5450 [ 15.464987] kasan_check_range+0x10c/0x1c0 [ 15.465012] __kasan_check_read+0x15/0x20 [ 15.465033] kasan_atomics_helper+0x3df/0x5450 [ 15.465057] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.465082] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.465108] ? kasan_atomics+0x152/0x310 [ 15.465135] kasan_atomics+0x1dc/0x310 [ 15.465159] ? __pfx_kasan_atomics+0x10/0x10 [ 15.465184] ? __pfx_read_tsc+0x10/0x10 [ 15.465205] ? ktime_get_ts64+0x86/0x230 [ 15.465230] kunit_try_run_case+0x1a5/0x480 [ 15.465255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.465289] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.465315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.465340] ? __kthread_parkme+0x82/0x180 [ 15.465363] ? preempt_count_sub+0x50/0x80 [ 15.465388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.465414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.465440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.465466] kthread+0x337/0x6f0 [ 15.465486] ? trace_preempt_on+0x20/0xc0 [ 15.465510] ? __pfx_kthread+0x10/0x10 [ 15.465532] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.465555] ? calculate_sigpending+0x7b/0xa0 [ 15.465581] ? __pfx_kthread+0x10/0x10 [ 15.465604] ret_from_fork+0x116/0x1d0 [ 15.465623] ? __pfx_kthread+0x10/0x10 [ 15.465645] ret_from_fork_asm+0x1a/0x30 [ 15.465677] </TASK> [ 15.465687] [ 15.476077] Allocated by task 282: [ 15.476216] kasan_save_stack+0x45/0x70 [ 15.476383] kasan_save_track+0x18/0x40 [ 15.476522] kasan_save_alloc_info+0x3b/0x50 [ 15.476674] __kasan_kmalloc+0xb7/0xc0 [ 15.476938] __kmalloc_cache_noprof+0x189/0x420 [ 15.477318] kasan_atomics+0x95/0x310 [ 15.477456] kunit_try_run_case+0x1a5/0x480 [ 15.477619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.477867] kthread+0x337/0x6f0 [ 15.478036] ret_from_fork+0x116/0x1d0 [ 15.479169] ret_from_fork_asm+0x1a/0x30 [ 15.479414] [ 15.479512] The buggy address belongs to the object at ffff888102a0a600 [ 15.479512] which belongs to the cache kmalloc-64 of size 64 [ 15.479947] The buggy address is located 0 bytes to the right of [ 15.479947] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.481775] [ 15.481860] The buggy address belongs to the physical page: [ 15.482032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.482558] flags: 0x200000000000000(node=0|zone=2) [ 15.482787] page_type: f5(slab) [ 15.482931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.483421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.483656] page dumped because: kasan: bad access detected [ 15.483831] [ 15.483928] Memory state around the buggy address: [ 15.484110] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.484351] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.485510] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.485833] ^ [ 15.486297] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486579] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486845] ================================================================== [ 15.801181] ================================================================== [ 15.801504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.801911] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.802416] [ 15.802729] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.802775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.802788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.802809] Call Trace: [ 15.802825] <TASK> [ 15.802839] dump_stack_lvl+0x73/0xb0 [ 15.802868] print_report+0xd1/0x610 [ 15.802891] ? __virt_addr_valid+0x1db/0x2d0 [ 15.802916] ? kasan_atomics_helper+0xd47/0x5450 [ 15.802939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.802964] ? kasan_atomics_helper+0xd47/0x5450 [ 15.802988] kasan_report+0x141/0x180 [ 15.803011] ? kasan_atomics_helper+0xd47/0x5450 [ 15.803039] kasan_check_range+0x10c/0x1c0 [ 15.803064] __kasan_check_write+0x18/0x20 [ 15.803086] kasan_atomics_helper+0xd47/0x5450 [ 15.803110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.803134] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.803161] ? kasan_atomics+0x152/0x310 [ 15.803188] kasan_atomics+0x1dc/0x310 [ 15.803212] ? __pfx_kasan_atomics+0x10/0x10 [ 15.803238] ? __pfx_read_tsc+0x10/0x10 [ 15.803260] ? ktime_get_ts64+0x86/0x230 [ 15.803299] kunit_try_run_case+0x1a5/0x480 [ 15.803325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.803349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.803375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.803401] ? __kthread_parkme+0x82/0x180 [ 15.803490] ? preempt_count_sub+0x50/0x80 [ 15.803518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.803545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.803571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.803598] kthread+0x337/0x6f0 [ 15.803619] ? trace_preempt_on+0x20/0xc0 [ 15.803643] ? __pfx_kthread+0x10/0x10 [ 15.803665] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.803688] ? calculate_sigpending+0x7b/0xa0 [ 15.803714] ? __pfx_kthread+0x10/0x10 [ 15.803737] ret_from_fork+0x116/0x1d0 [ 15.803757] ? __pfx_kthread+0x10/0x10 [ 15.803778] ret_from_fork_asm+0x1a/0x30 [ 15.803811] </TASK> [ 15.803822] [ 15.812224] Allocated by task 282: [ 15.812420] kasan_save_stack+0x45/0x70 [ 15.812623] kasan_save_track+0x18/0x40 [ 15.812814] kasan_save_alloc_info+0x3b/0x50 [ 15.813044] __kasan_kmalloc+0xb7/0xc0 [ 15.813179] __kmalloc_cache_noprof+0x189/0x420 [ 15.813344] kasan_atomics+0x95/0x310 [ 15.813480] kunit_try_run_case+0x1a5/0x480 [ 15.813815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.814368] kthread+0x337/0x6f0 [ 15.814559] ret_from_fork+0x116/0x1d0 [ 15.814754] ret_from_fork_asm+0x1a/0x30 [ 15.814955] [ 15.815116] The buggy address belongs to the object at ffff888102a0a600 [ 15.815116] which belongs to the cache kmalloc-64 of size 64 [ 15.815602] The buggy address is located 0 bytes to the right of [ 15.815602] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.816167] [ 15.816281] The buggy address belongs to the physical page: [ 15.816507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.816820] flags: 0x200000000000000(node=0|zone=2) [ 15.817112] page_type: f5(slab) [ 15.817277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.817574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.817880] page dumped because: kasan: bad access detected [ 15.818317] [ 15.818417] Memory state around the buggy address: [ 15.818630] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.818944] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.819240] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.819468] ^ [ 15.819624] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819906] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820311] ================================================================== [ 16.654221] ================================================================== [ 16.654571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.654910] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.655856] [ 16.655978] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.656024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.656037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.656057] Call Trace: [ 16.656069] <TASK> [ 16.656084] dump_stack_lvl+0x73/0xb0 [ 16.656113] print_report+0xd1/0x610 [ 16.656137] ? __virt_addr_valid+0x1db/0x2d0 [ 16.656159] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.656182] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.656209] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.656232] kasan_report+0x141/0x180 [ 16.656256] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.656295] __asan_report_load8_noabort+0x18/0x20 [ 16.656323] kasan_atomics_helper+0x4fa5/0x5450 [ 16.656347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.656372] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.656398] ? kasan_atomics+0x152/0x310 [ 16.656425] kasan_atomics+0x1dc/0x310 [ 16.656448] ? __pfx_kasan_atomics+0x10/0x10 [ 16.656475] ? __pfx_read_tsc+0x10/0x10 [ 16.656497] ? ktime_get_ts64+0x86/0x230 [ 16.656522] kunit_try_run_case+0x1a5/0x480 [ 16.656547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.656572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.656597] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.656622] ? __kthread_parkme+0x82/0x180 [ 16.656644] ? preempt_count_sub+0x50/0x80 [ 16.656669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.656695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.656721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.656748] kthread+0x337/0x6f0 [ 16.656768] ? trace_preempt_on+0x20/0xc0 [ 16.656792] ? __pfx_kthread+0x10/0x10 [ 16.657319] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.657344] ? calculate_sigpending+0x7b/0xa0 [ 16.657370] ? __pfx_kthread+0x10/0x10 [ 16.657392] ret_from_fork+0x116/0x1d0 [ 16.657797] ? __pfx_kthread+0x10/0x10 [ 16.657827] ret_from_fork_asm+0x1a/0x30 [ 16.657861] </TASK> [ 16.657872] [ 16.668057] Allocated by task 282: [ 16.668494] kasan_save_stack+0x45/0x70 [ 16.668756] kasan_save_track+0x18/0x40 [ 16.669046] kasan_save_alloc_info+0x3b/0x50 [ 16.669408] __kasan_kmalloc+0xb7/0xc0 [ 16.669590] __kmalloc_cache_noprof+0x189/0x420 [ 16.669804] kasan_atomics+0x95/0x310 [ 16.669975] kunit_try_run_case+0x1a5/0x480 [ 16.670166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.670409] kthread+0x337/0x6f0 [ 16.670562] ret_from_fork+0x116/0x1d0 [ 16.670742] ret_from_fork_asm+0x1a/0x30 [ 16.670922] [ 16.671011] The buggy address belongs to the object at ffff888102a0a600 [ 16.671011] which belongs to the cache kmalloc-64 of size 64 [ 16.671999] The buggy address is located 0 bytes to the right of [ 16.671999] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.672809] [ 16.673044] The buggy address belongs to the physical page: [ 16.673482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.673993] flags: 0x200000000000000(node=0|zone=2) [ 16.674397] page_type: f5(slab) [ 16.674678] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.675178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.675780] page dumped because: kasan: bad access detected [ 16.676083] [ 16.676181] Memory state around the buggy address: [ 16.676401] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.676696] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.676985] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.677575] ^ [ 16.677906] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678347] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678822] ================================================================== [ 16.183348] ================================================================== [ 16.183631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.183946] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.184505] [ 16.184617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.184660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.184673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.184694] Call Trace: [ 16.184708] <TASK> [ 16.184721] dump_stack_lvl+0x73/0xb0 [ 16.184748] print_report+0xd1/0x610 [ 16.184772] ? __virt_addr_valid+0x1db/0x2d0 [ 16.184795] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.184817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.184842] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.184866] kasan_report+0x141/0x180 [ 16.184889] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.184917] kasan_check_range+0x10c/0x1c0 [ 16.184942] __kasan_check_write+0x18/0x20 [ 16.185043] kasan_atomics_helper+0x15b6/0x5450 [ 16.185073] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.185098] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.185125] ? kasan_atomics+0x152/0x310 [ 16.185151] kasan_atomics+0x1dc/0x310 [ 16.185175] ? __pfx_kasan_atomics+0x10/0x10 [ 16.185200] ? __pfx_read_tsc+0x10/0x10 [ 16.185223] ? ktime_get_ts64+0x86/0x230 [ 16.185248] kunit_try_run_case+0x1a5/0x480 [ 16.185285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.185309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.185334] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.185360] ? __kthread_parkme+0x82/0x180 [ 16.185381] ? preempt_count_sub+0x50/0x80 [ 16.185405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.185431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.185458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.185484] kthread+0x337/0x6f0 [ 16.185504] ? trace_preempt_on+0x20/0xc0 [ 16.185528] ? __pfx_kthread+0x10/0x10 [ 16.185549] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.185572] ? calculate_sigpending+0x7b/0xa0 [ 16.185598] ? __pfx_kthread+0x10/0x10 [ 16.185620] ret_from_fork+0x116/0x1d0 [ 16.185640] ? __pfx_kthread+0x10/0x10 [ 16.185662] ret_from_fork_asm+0x1a/0x30 [ 16.185694] </TASK> [ 16.185705] [ 16.193823] Allocated by task 282: [ 16.194059] kasan_save_stack+0x45/0x70 [ 16.194281] kasan_save_track+0x18/0x40 [ 16.194420] kasan_save_alloc_info+0x3b/0x50 [ 16.194573] __kasan_kmalloc+0xb7/0xc0 [ 16.194772] __kmalloc_cache_noprof+0x189/0x420 [ 16.195172] kasan_atomics+0x95/0x310 [ 16.195386] kunit_try_run_case+0x1a5/0x480 [ 16.195596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.195794] kthread+0x337/0x6f0 [ 16.195916] ret_from_fork+0x116/0x1d0 [ 16.196194] ret_from_fork_asm+0x1a/0x30 [ 16.196408] [ 16.196507] The buggy address belongs to the object at ffff888102a0a600 [ 16.196507] which belongs to the cache kmalloc-64 of size 64 [ 16.197080] The buggy address is located 0 bytes to the right of [ 16.197080] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.197528] [ 16.197629] The buggy address belongs to the physical page: [ 16.197884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.198371] flags: 0x200000000000000(node=0|zone=2) [ 16.198621] page_type: f5(slab) [ 16.198777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.199255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.199619] page dumped because: kasan: bad access detected [ 16.199877] [ 16.200071] Memory state around the buggy address: [ 16.200304] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.200601] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.200842] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.201182] ^ [ 16.201422] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.201711] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.201945] ================================================================== [ 15.762875] ================================================================== [ 15.763249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.763667] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.763975] [ 15.764063] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.764107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.764120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.764142] Call Trace: [ 15.764157] <TASK> [ 15.764172] dump_stack_lvl+0x73/0xb0 [ 15.764200] print_report+0xd1/0x610 [ 15.764223] ? __virt_addr_valid+0x1db/0x2d0 [ 15.764247] ? kasan_atomics_helper+0xc70/0x5450 [ 15.764281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.764306] ? kasan_atomics_helper+0xc70/0x5450 [ 15.764330] kasan_report+0x141/0x180 [ 15.764353] ? kasan_atomics_helper+0xc70/0x5450 [ 15.764381] kasan_check_range+0x10c/0x1c0 [ 15.764406] __kasan_check_write+0x18/0x20 [ 15.764427] kasan_atomics_helper+0xc70/0x5450 [ 15.764451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.764475] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.764501] ? kasan_atomics+0x152/0x310 [ 15.764529] kasan_atomics+0x1dc/0x310 [ 15.764553] ? __pfx_kasan_atomics+0x10/0x10 [ 15.764579] ? __pfx_read_tsc+0x10/0x10 [ 15.764602] ? ktime_get_ts64+0x86/0x230 [ 15.764627] kunit_try_run_case+0x1a5/0x480 [ 15.764653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.764677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.764703] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.764729] ? __kthread_parkme+0x82/0x180 [ 15.764750] ? preempt_count_sub+0x50/0x80 [ 15.764775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.764801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.764827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.764853] kthread+0x337/0x6f0 [ 15.764873] ? trace_preempt_on+0x20/0xc0 [ 15.764897] ? __pfx_kthread+0x10/0x10 [ 15.764919] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.764941] ? calculate_sigpending+0x7b/0xa0 [ 15.764967] ? __pfx_kthread+0x10/0x10 [ 15.764990] ret_from_fork+0x116/0x1d0 [ 15.765009] ? __pfx_kthread+0x10/0x10 [ 15.765031] ret_from_fork_asm+0x1a/0x30 [ 15.765062] </TASK> [ 15.765073] [ 15.773338] Allocated by task 282: [ 15.773528] kasan_save_stack+0x45/0x70 [ 15.773705] kasan_save_track+0x18/0x40 [ 15.773843] kasan_save_alloc_info+0x3b/0x50 [ 15.773994] __kasan_kmalloc+0xb7/0xc0 [ 15.774129] __kmalloc_cache_noprof+0x189/0x420 [ 15.774296] kasan_atomics+0x95/0x310 [ 15.774741] kunit_try_run_case+0x1a5/0x480 [ 15.774951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.775203] kthread+0x337/0x6f0 [ 15.775595] ret_from_fork+0x116/0x1d0 [ 15.775793] ret_from_fork_asm+0x1a/0x30 [ 15.776045] [ 15.776142] The buggy address belongs to the object at ffff888102a0a600 [ 15.776142] which belongs to the cache kmalloc-64 of size 64 [ 15.776618] The buggy address is located 0 bytes to the right of [ 15.776618] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.777009] [ 15.777081] The buggy address belongs to the physical page: [ 15.777254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.777630] flags: 0x200000000000000(node=0|zone=2) [ 15.777870] page_type: f5(slab) [ 15.778041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.778400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.778710] page dumped because: kasan: bad access detected [ 15.778941] [ 15.779042] Memory state around the buggy address: [ 15.779250] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.779663] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.779958] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.780358] ^ [ 15.780585] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.780888] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781259] ================================================================== [ 16.202513] ================================================================== [ 16.202863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.203406] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.203675] [ 16.203780] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.203822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.203834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.203855] Call Trace: [ 16.203869] <TASK> [ 16.203885] dump_stack_lvl+0x73/0xb0 [ 16.203913] print_report+0xd1/0x610 [ 16.203935] ? __virt_addr_valid+0x1db/0x2d0 [ 16.203959] ? kasan_atomics_helper+0x164f/0x5450 [ 16.204105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.204130] ? kasan_atomics_helper+0x164f/0x5450 [ 16.204153] kasan_report+0x141/0x180 [ 16.204177] ? kasan_atomics_helper+0x164f/0x5450 [ 16.204205] kasan_check_range+0x10c/0x1c0 [ 16.204229] __kasan_check_write+0x18/0x20 [ 16.204250] kasan_atomics_helper+0x164f/0x5450 [ 16.204286] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.204309] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.204338] ? kasan_atomics+0x152/0x310 [ 16.204365] kasan_atomics+0x1dc/0x310 [ 16.204389] ? __pfx_kasan_atomics+0x10/0x10 [ 16.204415] ? __pfx_read_tsc+0x10/0x10 [ 16.204437] ? ktime_get_ts64+0x86/0x230 [ 16.204461] kunit_try_run_case+0x1a5/0x480 [ 16.204486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.204511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.204535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.204561] ? __kthread_parkme+0x82/0x180 [ 16.204582] ? preempt_count_sub+0x50/0x80 [ 16.204607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.204633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.204658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.204686] kthread+0x337/0x6f0 [ 16.204706] ? trace_preempt_on+0x20/0xc0 [ 16.204730] ? __pfx_kthread+0x10/0x10 [ 16.204752] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.204775] ? calculate_sigpending+0x7b/0xa0 [ 16.204800] ? __pfx_kthread+0x10/0x10 [ 16.204822] ret_from_fork+0x116/0x1d0 [ 16.204841] ? __pfx_kthread+0x10/0x10 [ 16.204863] ret_from_fork_asm+0x1a/0x30 [ 16.204895] </TASK> [ 16.204906] [ 16.213056] Allocated by task 282: [ 16.213243] kasan_save_stack+0x45/0x70 [ 16.213461] kasan_save_track+0x18/0x40 [ 16.213622] kasan_save_alloc_info+0x3b/0x50 [ 16.213774] __kasan_kmalloc+0xb7/0xc0 [ 16.213948] __kmalloc_cache_noprof+0x189/0x420 [ 16.214292] kasan_atomics+0x95/0x310 [ 16.214469] kunit_try_run_case+0x1a5/0x480 [ 16.214618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.214885] kthread+0x337/0x6f0 [ 16.215321] ret_from_fork+0x116/0x1d0 [ 16.215481] ret_from_fork_asm+0x1a/0x30 [ 16.215624] [ 16.215697] The buggy address belongs to the object at ffff888102a0a600 [ 16.215697] which belongs to the cache kmalloc-64 of size 64 [ 16.216498] The buggy address is located 0 bytes to the right of [ 16.216498] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.216945] [ 16.217135] The buggy address belongs to the physical page: [ 16.217408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.217736] flags: 0x200000000000000(node=0|zone=2) [ 16.217947] page_type: f5(slab) [ 16.218188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.218498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.218754] page dumped because: kasan: bad access detected [ 16.219195] [ 16.219314] Memory state around the buggy address: [ 16.219542] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.219789] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.220227] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.220530] ^ [ 16.220703] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.221111] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.221373] ================================================================== [ 15.719375] ================================================================== [ 15.719680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.720083] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.720401] [ 15.720499] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.720542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.720557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.720579] Call Trace: [ 15.720595] <TASK> [ 15.720610] dump_stack_lvl+0x73/0xb0 [ 15.720639] print_report+0xd1/0x610 [ 15.720662] ? __virt_addr_valid+0x1db/0x2d0 [ 15.720686] ? kasan_atomics_helper+0xac7/0x5450 [ 15.720709] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.720734] ? kasan_atomics_helper+0xac7/0x5450 [ 15.720757] kasan_report+0x141/0x180 [ 15.720780] ? kasan_atomics_helper+0xac7/0x5450 [ 15.720808] kasan_check_range+0x10c/0x1c0 [ 15.720832] __kasan_check_write+0x18/0x20 [ 15.720853] kasan_atomics_helper+0xac7/0x5450 [ 15.720878] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.720902] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.720929] ? kasan_atomics+0x152/0x310 [ 15.720956] kasan_atomics+0x1dc/0x310 [ 15.721059] ? __pfx_kasan_atomics+0x10/0x10 [ 15.721085] ? __pfx_read_tsc+0x10/0x10 [ 15.721108] ? ktime_get_ts64+0x86/0x230 [ 15.721134] kunit_try_run_case+0x1a5/0x480 [ 15.721160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.721185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.721210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.721235] ? __kthread_parkme+0x82/0x180 [ 15.721258] ? preempt_count_sub+0x50/0x80 [ 15.721294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.721319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.721345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.721372] kthread+0x337/0x6f0 [ 15.721392] ? trace_preempt_on+0x20/0xc0 [ 15.721417] ? __pfx_kthread+0x10/0x10 [ 15.721439] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.721462] ? calculate_sigpending+0x7b/0xa0 [ 15.721488] ? __pfx_kthread+0x10/0x10 [ 15.721510] ret_from_fork+0x116/0x1d0 [ 15.721530] ? __pfx_kthread+0x10/0x10 [ 15.721551] ret_from_fork_asm+0x1a/0x30 [ 15.721583] </TASK> [ 15.721595] [ 15.729621] Allocated by task 282: [ 15.729784] kasan_save_stack+0x45/0x70 [ 15.730152] kasan_save_track+0x18/0x40 [ 15.730316] kasan_save_alloc_info+0x3b/0x50 [ 15.730491] __kasan_kmalloc+0xb7/0xc0 [ 15.730684] __kmalloc_cache_noprof+0x189/0x420 [ 15.730914] kasan_atomics+0x95/0x310 [ 15.731190] kunit_try_run_case+0x1a5/0x480 [ 15.731412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.731630] kthread+0x337/0x6f0 [ 15.731798] ret_from_fork+0x116/0x1d0 [ 15.732037] ret_from_fork_asm+0x1a/0x30 [ 15.732239] [ 15.732354] The buggy address belongs to the object at ffff888102a0a600 [ 15.732354] which belongs to the cache kmalloc-64 of size 64 [ 15.732792] The buggy address is located 0 bytes to the right of [ 15.732792] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.733415] [ 15.733522] The buggy address belongs to the physical page: [ 15.733740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.734229] flags: 0x200000000000000(node=0|zone=2) [ 15.734486] page_type: f5(slab) [ 15.734634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.734923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.737413] page dumped because: kasan: bad access detected [ 15.738095] [ 15.738207] Memory state around the buggy address: [ 15.738700] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.739131] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.739495] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.739726] ^ [ 15.739883] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.740227] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.740573] ================================================================== [ 15.661313] ================================================================== [ 15.661649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.661944] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.662455] [ 15.662554] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.662597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.662612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.662633] Call Trace: [ 15.662649] <TASK> [ 15.662664] dump_stack_lvl+0x73/0xb0 [ 15.662693] print_report+0xd1/0x610 [ 15.662721] ? __virt_addr_valid+0x1db/0x2d0 [ 15.662745] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.662767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.662792] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.662815] kasan_report+0x141/0x180 [ 15.662839] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.662866] kasan_check_range+0x10c/0x1c0 [ 15.662891] __kasan_check_write+0x18/0x20 [ 15.662912] kasan_atomics_helper+0x8f9/0x5450 [ 15.662936] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.662961] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.662988] ? kasan_atomics+0x152/0x310 [ 15.663015] kasan_atomics+0x1dc/0x310 [ 15.663039] ? __pfx_kasan_atomics+0x10/0x10 [ 15.663065] ? __pfx_read_tsc+0x10/0x10 [ 15.663087] ? ktime_get_ts64+0x86/0x230 [ 15.663113] kunit_try_run_case+0x1a5/0x480 [ 15.663138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.663229] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.663258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.663296] ? __kthread_parkme+0x82/0x180 [ 15.663318] ? preempt_count_sub+0x50/0x80 [ 15.663342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.663380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.663406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.663434] kthread+0x337/0x6f0 [ 15.663454] ? trace_preempt_on+0x20/0xc0 [ 15.663477] ? __pfx_kthread+0x10/0x10 [ 15.663499] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.663523] ? calculate_sigpending+0x7b/0xa0 [ 15.663548] ? __pfx_kthread+0x10/0x10 [ 15.663571] ret_from_fork+0x116/0x1d0 [ 15.663590] ? __pfx_kthread+0x10/0x10 [ 15.663612] ret_from_fork_asm+0x1a/0x30 [ 15.663644] </TASK> [ 15.663654] [ 15.671767] Allocated by task 282: [ 15.671949] kasan_save_stack+0x45/0x70 [ 15.672157] kasan_save_track+0x18/0x40 [ 15.672365] kasan_save_alloc_info+0x3b/0x50 [ 15.672622] __kasan_kmalloc+0xb7/0xc0 [ 15.672818] __kmalloc_cache_noprof+0x189/0x420 [ 15.673013] kasan_atomics+0x95/0x310 [ 15.673180] kunit_try_run_case+0x1a5/0x480 [ 15.673342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.673570] kthread+0x337/0x6f0 [ 15.673740] ret_from_fork+0x116/0x1d0 [ 15.673935] ret_from_fork_asm+0x1a/0x30 [ 15.674100] [ 15.674200] The buggy address belongs to the object at ffff888102a0a600 [ 15.674200] which belongs to the cache kmalloc-64 of size 64 [ 15.674860] The buggy address is located 0 bytes to the right of [ 15.674860] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.675541] [ 15.675619] The buggy address belongs to the physical page: [ 15.675797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.676041] flags: 0x200000000000000(node=0|zone=2) [ 15.676279] page_type: f5(slab) [ 15.676446] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.676784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.677115] page dumped because: kasan: bad access detected [ 15.677435] [ 15.677509] Memory state around the buggy address: [ 15.677667] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.677885] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.678101] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.678583] ^ [ 15.678826] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.679437] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.679760] ================================================================== [ 15.862925] ================================================================== [ 15.863274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.863886] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.864528] [ 15.864738] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.864783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.864881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.864905] Call Trace: [ 15.864926] <TASK> [ 15.864942] dump_stack_lvl+0x73/0xb0 [ 15.864973] print_report+0xd1/0x610 [ 15.865008] ? __virt_addr_valid+0x1db/0x2d0 [ 15.865032] ? kasan_atomics_helper+0xf10/0x5450 [ 15.865054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.865079] ? kasan_atomics_helper+0xf10/0x5450 [ 15.865103] kasan_report+0x141/0x180 [ 15.865126] ? kasan_atomics_helper+0xf10/0x5450 [ 15.865153] kasan_check_range+0x10c/0x1c0 [ 15.865178] __kasan_check_write+0x18/0x20 [ 15.865198] kasan_atomics_helper+0xf10/0x5450 [ 15.865223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.865247] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.865283] ? kasan_atomics+0x152/0x310 [ 15.865310] kasan_atomics+0x1dc/0x310 [ 15.865333] ? __pfx_kasan_atomics+0x10/0x10 [ 15.865358] ? __pfx_read_tsc+0x10/0x10 [ 15.865381] ? ktime_get_ts64+0x86/0x230 [ 15.865408] kunit_try_run_case+0x1a5/0x480 [ 15.865434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.865459] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.865484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.865510] ? __kthread_parkme+0x82/0x180 [ 15.865531] ? preempt_count_sub+0x50/0x80 [ 15.865557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.865584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.865611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.865638] kthread+0x337/0x6f0 [ 15.865658] ? trace_preempt_on+0x20/0xc0 [ 15.865683] ? __pfx_kthread+0x10/0x10 [ 15.865705] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.865728] ? calculate_sigpending+0x7b/0xa0 [ 15.865753] ? __pfx_kthread+0x10/0x10 [ 15.865776] ret_from_fork+0x116/0x1d0 [ 15.865795] ? __pfx_kthread+0x10/0x10 [ 15.865817] ret_from_fork_asm+0x1a/0x30 [ 15.865849] </TASK> [ 15.865860] [ 15.874532] Allocated by task 282: [ 15.874719] kasan_save_stack+0x45/0x70 [ 15.874923] kasan_save_track+0x18/0x40 [ 15.875211] kasan_save_alloc_info+0x3b/0x50 [ 15.875441] __kasan_kmalloc+0xb7/0xc0 [ 15.875618] __kmalloc_cache_noprof+0x189/0x420 [ 15.875846] kasan_atomics+0x95/0x310 [ 15.875997] kunit_try_run_case+0x1a5/0x480 [ 15.876149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.876338] kthread+0x337/0x6f0 [ 15.876461] ret_from_fork+0x116/0x1d0 [ 15.876597] ret_from_fork_asm+0x1a/0x30 [ 15.876739] [ 15.876812] The buggy address belongs to the object at ffff888102a0a600 [ 15.876812] which belongs to the cache kmalloc-64 of size 64 [ 15.877326] The buggy address is located 0 bytes to the right of [ 15.877326] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.877884] [ 15.877983] The buggy address belongs to the physical page: [ 15.878242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.878527] flags: 0x200000000000000(node=0|zone=2) [ 15.879186] page_type: f5(slab) [ 15.879346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.879716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.879951] page dumped because: kasan: bad access detected [ 15.880579] [ 15.880683] Memory state around the buggy address: [ 15.880880] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.881338] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.881576] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.881792] ^ [ 15.881965] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.882393] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.883275] ================================================================== [ 15.908244] ================================================================== [ 15.908511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.908840] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.909231] [ 15.909351] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.909395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.909407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.909428] Call Trace: [ 15.909444] <TASK> [ 15.909459] dump_stack_lvl+0x73/0xb0 [ 15.909488] print_report+0xd1/0x610 [ 15.909511] ? __virt_addr_valid+0x1db/0x2d0 [ 15.909536] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.909559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.909583] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.909606] kasan_report+0x141/0x180 [ 15.909630] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.909658] __asan_report_load4_noabort+0x18/0x20 [ 15.909684] kasan_atomics_helper+0x4a36/0x5450 [ 15.909708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.909733] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.909759] ? kasan_atomics+0x152/0x310 [ 15.909786] kasan_atomics+0x1dc/0x310 [ 15.909809] ? __pfx_kasan_atomics+0x10/0x10 [ 15.909834] ? __pfx_read_tsc+0x10/0x10 [ 15.909857] ? ktime_get_ts64+0x86/0x230 [ 15.909882] kunit_try_run_case+0x1a5/0x480 [ 15.909908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.909932] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.909958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.909983] ? __kthread_parkme+0x82/0x180 [ 15.910005] ? preempt_count_sub+0x50/0x80 [ 15.910030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.910056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.910082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.910177] kthread+0x337/0x6f0 [ 15.910199] ? trace_preempt_on+0x20/0xc0 [ 15.910225] ? __pfx_kthread+0x10/0x10 [ 15.910247] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.910280] ? calculate_sigpending+0x7b/0xa0 [ 15.910306] ? __pfx_kthread+0x10/0x10 [ 15.910329] ret_from_fork+0x116/0x1d0 [ 15.910349] ? __pfx_kthread+0x10/0x10 [ 15.910371] ret_from_fork_asm+0x1a/0x30 [ 15.910403] </TASK> [ 15.910414] [ 15.918388] Allocated by task 282: [ 15.918652] kasan_save_stack+0x45/0x70 [ 15.918868] kasan_save_track+0x18/0x40 [ 15.919005] kasan_save_alloc_info+0x3b/0x50 [ 15.919156] __kasan_kmalloc+0xb7/0xc0 [ 15.919302] __kmalloc_cache_noprof+0x189/0x420 [ 15.919459] kasan_atomics+0x95/0x310 [ 15.919741] kunit_try_run_case+0x1a5/0x480 [ 15.919964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.920370] kthread+0x337/0x6f0 [ 15.920664] ret_from_fork+0x116/0x1d0 [ 15.920857] ret_from_fork_asm+0x1a/0x30 [ 15.921055] [ 15.921355] The buggy address belongs to the object at ffff888102a0a600 [ 15.921355] which belongs to the cache kmalloc-64 of size 64 [ 15.921780] The buggy address is located 0 bytes to the right of [ 15.921780] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.922646] [ 15.922757] The buggy address belongs to the physical page: [ 15.922969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.923341] flags: 0x200000000000000(node=0|zone=2) [ 15.923547] page_type: f5(slab) [ 15.923695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.923980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.924209] page dumped because: kasan: bad access detected [ 15.924393] [ 15.924463] Memory state around the buggy address: [ 15.924670] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.924987] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.925496] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.925829] ^ [ 15.926149] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.926387] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.926604] ================================================================== [ 16.031765] ================================================================== [ 16.032162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 16.032517] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.032851] [ 16.032958] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.033106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.033119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.033141] Call Trace: [ 16.033156] <TASK> [ 16.033171] dump_stack_lvl+0x73/0xb0 [ 16.033200] print_report+0xd1/0x610 [ 16.033222] ? __virt_addr_valid+0x1db/0x2d0 [ 16.033245] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.033280] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.033306] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.033329] kasan_report+0x141/0x180 [ 16.033353] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.033381] __asan_report_load4_noabort+0x18/0x20 [ 16.033407] kasan_atomics_helper+0x49e8/0x5450 [ 16.033432] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.033456] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.033483] ? kasan_atomics+0x152/0x310 [ 16.033510] kasan_atomics+0x1dc/0x310 [ 16.033533] ? __pfx_kasan_atomics+0x10/0x10 [ 16.033558] ? __pfx_read_tsc+0x10/0x10 [ 16.033579] ? ktime_get_ts64+0x86/0x230 [ 16.033604] kunit_try_run_case+0x1a5/0x480 [ 16.033629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.033653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.033677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.033702] ? __kthread_parkme+0x82/0x180 [ 16.033723] ? preempt_count_sub+0x50/0x80 [ 16.033748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.033774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.033800] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.033828] kthread+0x337/0x6f0 [ 16.033848] ? trace_preempt_on+0x20/0xc0 [ 16.033871] ? __pfx_kthread+0x10/0x10 [ 16.033893] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.033916] ? calculate_sigpending+0x7b/0xa0 [ 16.033940] ? __pfx_kthread+0x10/0x10 [ 16.034031] ret_from_fork+0x116/0x1d0 [ 16.034057] ? __pfx_kthread+0x10/0x10 [ 16.034078] ret_from_fork_asm+0x1a/0x30 [ 16.034110] </TASK> [ 16.034121] [ 16.041958] Allocated by task 282: [ 16.042211] kasan_save_stack+0x45/0x70 [ 16.042431] kasan_save_track+0x18/0x40 [ 16.042633] kasan_save_alloc_info+0x3b/0x50 [ 16.042857] __kasan_kmalloc+0xb7/0xc0 [ 16.043241] __kmalloc_cache_noprof+0x189/0x420 [ 16.043436] kasan_atomics+0x95/0x310 [ 16.043627] kunit_try_run_case+0x1a5/0x480 [ 16.043836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.044160] kthread+0x337/0x6f0 [ 16.044337] ret_from_fork+0x116/0x1d0 [ 16.044507] ret_from_fork_asm+0x1a/0x30 [ 16.044688] [ 16.044785] The buggy address belongs to the object at ffff888102a0a600 [ 16.044785] which belongs to the cache kmalloc-64 of size 64 [ 16.045369] The buggy address is located 0 bytes to the right of [ 16.045369] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.045872] [ 16.046046] The buggy address belongs to the physical page: [ 16.046227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.046591] flags: 0x200000000000000(node=0|zone=2) [ 16.046832] page_type: f5(slab) [ 16.047201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.047535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.047876] page dumped because: kasan: bad access detected [ 16.048216] [ 16.048301] Memory state around the buggy address: [ 16.048462] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.048719] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.049045] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.049367] ^ [ 16.049580] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.049798] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.050046] ================================================================== [ 16.301656] ================================================================== [ 16.301937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.302451] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.302771] [ 16.302877] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.302921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.302934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.302957] Call Trace: [ 16.303007] <TASK> [ 16.303467] dump_stack_lvl+0x73/0xb0 [ 16.303499] print_report+0xd1/0x610 [ 16.303522] ? __virt_addr_valid+0x1db/0x2d0 [ 16.303546] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.303568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.303593] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.303616] kasan_report+0x141/0x180 [ 16.303639] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.303667] kasan_check_range+0x10c/0x1c0 [ 16.303692] __kasan_check_write+0x18/0x20 [ 16.303713] kasan_atomics_helper+0x18b1/0x5450 [ 16.303737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.303761] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.303787] ? kasan_atomics+0x152/0x310 [ 16.303815] kasan_atomics+0x1dc/0x310 [ 16.303838] ? __pfx_kasan_atomics+0x10/0x10 [ 16.303863] ? __pfx_read_tsc+0x10/0x10 [ 16.303885] ? ktime_get_ts64+0x86/0x230 [ 16.303911] kunit_try_run_case+0x1a5/0x480 [ 16.303937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.303961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.304057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.304085] ? __kthread_parkme+0x82/0x180 [ 16.304107] ? preempt_count_sub+0x50/0x80 [ 16.304134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.304160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.304187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.304214] kthread+0x337/0x6f0 [ 16.304234] ? trace_preempt_on+0x20/0xc0 [ 16.304259] ? __pfx_kthread+0x10/0x10 [ 16.304293] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.304317] ? calculate_sigpending+0x7b/0xa0 [ 16.304341] ? __pfx_kthread+0x10/0x10 [ 16.304364] ret_from_fork+0x116/0x1d0 [ 16.304383] ? __pfx_kthread+0x10/0x10 [ 16.304406] ret_from_fork_asm+0x1a/0x30 [ 16.304437] </TASK> [ 16.304448] [ 16.313838] Allocated by task 282: [ 16.314135] kasan_save_stack+0x45/0x70 [ 16.314473] kasan_save_track+0x18/0x40 [ 16.314679] kasan_save_alloc_info+0x3b/0x50 [ 16.314938] __kasan_kmalloc+0xb7/0xc0 [ 16.315337] __kmalloc_cache_noprof+0x189/0x420 [ 16.315610] kasan_atomics+0x95/0x310 [ 16.315775] kunit_try_run_case+0x1a5/0x480 [ 16.315970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.316294] kthread+0x337/0x6f0 [ 16.316419] ret_from_fork+0x116/0x1d0 [ 16.316569] ret_from_fork_asm+0x1a/0x30 [ 16.316770] [ 16.316868] The buggy address belongs to the object at ffff888102a0a600 [ 16.316868] which belongs to the cache kmalloc-64 of size 64 [ 16.317417] The buggy address is located 0 bytes to the right of [ 16.317417] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.317899] [ 16.317989] The buggy address belongs to the physical page: [ 16.318241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.318742] flags: 0x200000000000000(node=0|zone=2) [ 16.318916] page_type: f5(slab) [ 16.319040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.319288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.319613] page dumped because: kasan: bad access detected [ 16.320065] [ 16.320188] Memory state around the buggy address: [ 16.320436] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.320774] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.321099] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.321426] ^ [ 16.321629] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.321906] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322238] ================================================================== [ 16.499117] ================================================================== [ 16.499798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.500544] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.500779] [ 16.500862] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.500903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.500919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.500942] Call Trace: [ 16.500958] <TASK> [ 16.500973] dump_stack_lvl+0x73/0xb0 [ 16.501002] print_report+0xd1/0x610 [ 16.501024] ? __virt_addr_valid+0x1db/0x2d0 [ 16.501048] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.501072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.501097] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.501121] kasan_report+0x141/0x180 [ 16.501144] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.501172] kasan_check_range+0x10c/0x1c0 [ 16.501199] __kasan_check_write+0x18/0x20 [ 16.501220] kasan_atomics_helper+0x1eaa/0x5450 [ 16.501245] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.501280] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.501307] ? kasan_atomics+0x152/0x310 [ 16.501333] kasan_atomics+0x1dc/0x310 [ 16.501357] ? __pfx_kasan_atomics+0x10/0x10 [ 16.501383] ? __pfx_read_tsc+0x10/0x10 [ 16.501405] ? ktime_get_ts64+0x86/0x230 [ 16.501430] kunit_try_run_case+0x1a5/0x480 [ 16.501456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.501481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.501505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.501531] ? __kthread_parkme+0x82/0x180 [ 16.501552] ? preempt_count_sub+0x50/0x80 [ 16.501577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.501606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.501632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.501659] kthread+0x337/0x6f0 [ 16.501679] ? trace_preempt_on+0x20/0xc0 [ 16.501703] ? __pfx_kthread+0x10/0x10 [ 16.501725] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.501748] ? calculate_sigpending+0x7b/0xa0 [ 16.501772] ? __pfx_kthread+0x10/0x10 [ 16.501795] ret_from_fork+0x116/0x1d0 [ 16.501814] ? __pfx_kthread+0x10/0x10 [ 16.501835] ret_from_fork_asm+0x1a/0x30 [ 16.501867] </TASK> [ 16.501879] [ 16.508723] Allocated by task 282: [ 16.508849] kasan_save_stack+0x45/0x70 [ 16.509048] kasan_save_track+0x18/0x40 [ 16.509244] kasan_save_alloc_info+0x3b/0x50 [ 16.509469] __kasan_kmalloc+0xb7/0xc0 [ 16.509660] __kmalloc_cache_noprof+0x189/0x420 [ 16.509899] kasan_atomics+0x95/0x310 [ 16.510087] kunit_try_run_case+0x1a5/0x480 [ 16.510309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.510517] kthread+0x337/0x6f0 [ 16.510637] ret_from_fork+0x116/0x1d0 [ 16.510776] ret_from_fork_asm+0x1a/0x30 [ 16.510930] [ 16.511027] The buggy address belongs to the object at ffff888102a0a600 [ 16.511027] which belongs to the cache kmalloc-64 of size 64 [ 16.511566] The buggy address is located 0 bytes to the right of [ 16.511566] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.512068] [ 16.512167] The buggy address belongs to the physical page: [ 16.512410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.512659] flags: 0x200000000000000(node=0|zone=2) [ 16.512822] page_type: f5(slab) [ 16.512942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.513177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.513508] page dumped because: kasan: bad access detected [ 16.513764] [ 16.513859] Memory state around the buggy address: [ 16.514086] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.514713] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.515044] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.515372] ^ [ 16.515583] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.515853] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.516096] ================================================================== [ 16.558838] ================================================================== [ 16.559239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.559494] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.559841] [ 16.559949] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.560010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.560024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.560045] Call Trace: [ 16.560058] <TASK> [ 16.560071] dump_stack_lvl+0x73/0xb0 [ 16.560099] print_report+0xd1/0x610 [ 16.560122] ? __virt_addr_valid+0x1db/0x2d0 [ 16.560146] ? kasan_atomics_helper+0x2006/0x5450 [ 16.560168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.560192] ? kasan_atomics_helper+0x2006/0x5450 [ 16.560215] kasan_report+0x141/0x180 [ 16.560239] ? kasan_atomics_helper+0x2006/0x5450 [ 16.560296] kasan_check_range+0x10c/0x1c0 [ 16.560322] __kasan_check_write+0x18/0x20 [ 16.560342] kasan_atomics_helper+0x2006/0x5450 [ 16.560367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.560391] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.560418] ? kasan_atomics+0x152/0x310 [ 16.560445] kasan_atomics+0x1dc/0x310 [ 16.560485] ? __pfx_kasan_atomics+0x10/0x10 [ 16.560511] ? __pfx_read_tsc+0x10/0x10 [ 16.560532] ? ktime_get_ts64+0x86/0x230 [ 16.560557] kunit_try_run_case+0x1a5/0x480 [ 16.560584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.560608] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.560647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.560687] ? __kthread_parkme+0x82/0x180 [ 16.560722] ? preempt_count_sub+0x50/0x80 [ 16.560760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.560799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.560852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.560880] kthread+0x337/0x6f0 [ 16.560899] ? trace_preempt_on+0x20/0xc0 [ 16.560924] ? __pfx_kthread+0x10/0x10 [ 16.560946] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.560969] ? calculate_sigpending+0x7b/0xa0 [ 16.560994] ? __pfx_kthread+0x10/0x10 [ 16.561017] ret_from_fork+0x116/0x1d0 [ 16.561037] ? __pfx_kthread+0x10/0x10 [ 16.561058] ret_from_fork_asm+0x1a/0x30 [ 16.561090] </TASK> [ 16.561101] [ 16.568546] Allocated by task 282: [ 16.568735] kasan_save_stack+0x45/0x70 [ 16.568876] kasan_save_track+0x18/0x40 [ 16.569086] kasan_save_alloc_info+0x3b/0x50 [ 16.569329] __kasan_kmalloc+0xb7/0xc0 [ 16.569509] __kmalloc_cache_noprof+0x189/0x420 [ 16.569698] kasan_atomics+0x95/0x310 [ 16.569881] kunit_try_run_case+0x1a5/0x480 [ 16.570094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.570318] kthread+0x337/0x6f0 [ 16.570508] ret_from_fork+0x116/0x1d0 [ 16.570722] ret_from_fork_asm+0x1a/0x30 [ 16.570881] [ 16.570951] The buggy address belongs to the object at ffff888102a0a600 [ 16.570951] which belongs to the cache kmalloc-64 of size 64 [ 16.571460] The buggy address is located 0 bytes to the right of [ 16.571460] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.571969] [ 16.572066] The buggy address belongs to the physical page: [ 16.572353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.572661] flags: 0x200000000000000(node=0|zone=2) [ 16.572893] page_type: f5(slab) [ 16.573032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.573380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.573707] page dumped because: kasan: bad access detected [ 16.573918] [ 16.573988] Memory state around the buggy address: [ 16.574139] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.574357] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.574661] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.574988] ^ [ 16.575213] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.575554] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.575820] ================================================================== [ 15.487474] ================================================================== [ 15.487776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.488319] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.488596] [ 15.488705] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.488747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.488759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.488782] Call Trace: [ 15.488797] <TASK> [ 15.488811] dump_stack_lvl+0x73/0xb0 [ 15.488841] print_report+0xd1/0x610 [ 15.488864] ? __virt_addr_valid+0x1db/0x2d0 [ 15.488888] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.488911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.488936] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.488959] kasan_report+0x141/0x180 [ 15.489047] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.489078] __asan_report_load4_noabort+0x18/0x20 [ 15.489105] kasan_atomics_helper+0x4b54/0x5450 [ 15.489130] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.489155] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.489181] ? kasan_atomics+0x152/0x310 [ 15.489207] kasan_atomics+0x1dc/0x310 [ 15.489232] ? __pfx_kasan_atomics+0x10/0x10 [ 15.489257] ? __pfx_read_tsc+0x10/0x10 [ 15.489303] ? ktime_get_ts64+0x86/0x230 [ 15.489329] kunit_try_run_case+0x1a5/0x480 [ 15.489355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489380] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.489405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.489430] ? __kthread_parkme+0x82/0x180 [ 15.489452] ? preempt_count_sub+0x50/0x80 [ 15.489476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.489528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.489554] kthread+0x337/0x6f0 [ 15.489575] ? trace_preempt_on+0x20/0xc0 [ 15.489599] ? __pfx_kthread+0x10/0x10 [ 15.489621] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.489644] ? calculate_sigpending+0x7b/0xa0 [ 15.489669] ? __pfx_kthread+0x10/0x10 [ 15.489692] ret_from_fork+0x116/0x1d0 [ 15.489712] ? __pfx_kthread+0x10/0x10 [ 15.489734] ret_from_fork_asm+0x1a/0x30 [ 15.489766] </TASK> [ 15.489776] [ 15.497431] Allocated by task 282: [ 15.497617] kasan_save_stack+0x45/0x70 [ 15.497815] kasan_save_track+0x18/0x40 [ 15.497997] kasan_save_alloc_info+0x3b/0x50 [ 15.498201] __kasan_kmalloc+0xb7/0xc0 [ 15.498372] __kmalloc_cache_noprof+0x189/0x420 [ 15.498526] kasan_atomics+0x95/0x310 [ 15.498658] kunit_try_run_case+0x1a5/0x480 [ 15.498865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.499116] kthread+0x337/0x6f0 [ 15.499291] ret_from_fork+0x116/0x1d0 [ 15.499436] ret_from_fork_asm+0x1a/0x30 [ 15.499573] [ 15.499642] The buggy address belongs to the object at ffff888102a0a600 [ 15.499642] which belongs to the cache kmalloc-64 of size 64 [ 15.500126] The buggy address is located 0 bytes to the right of [ 15.500126] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.500849] [ 15.500939] The buggy address belongs to the physical page: [ 15.501227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.501551] flags: 0x200000000000000(node=0|zone=2) [ 15.501755] page_type: f5(slab) [ 15.501923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.502305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.502531] page dumped because: kasan: bad access detected [ 15.502699] [ 15.502775] Memory state around the buggy address: [ 15.502926] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.503227] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.503755] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.504057] ^ [ 15.504277] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504485] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504693] ================================================================== [ 16.322942] ================================================================== [ 16.323365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.323735] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.324135] [ 16.324224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.324279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.324292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.324314] Call Trace: [ 16.324330] <TASK> [ 16.324344] dump_stack_lvl+0x73/0xb0 [ 16.324373] print_report+0xd1/0x610 [ 16.324397] ? __virt_addr_valid+0x1db/0x2d0 [ 16.324420] ? kasan_atomics_helper+0x194a/0x5450 [ 16.324443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.324468] ? kasan_atomics_helper+0x194a/0x5450 [ 16.324491] kasan_report+0x141/0x180 [ 16.324514] ? kasan_atomics_helper+0x194a/0x5450 [ 16.324542] kasan_check_range+0x10c/0x1c0 [ 16.324567] __kasan_check_write+0x18/0x20 [ 16.324588] kasan_atomics_helper+0x194a/0x5450 [ 16.324612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.324636] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.324662] ? kasan_atomics+0x152/0x310 [ 16.324689] kasan_atomics+0x1dc/0x310 [ 16.324713] ? __pfx_kasan_atomics+0x10/0x10 [ 16.324738] ? __pfx_read_tsc+0x10/0x10 [ 16.324760] ? ktime_get_ts64+0x86/0x230 [ 16.324801] kunit_try_run_case+0x1a5/0x480 [ 16.324827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.324852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.324876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.324901] ? __kthread_parkme+0x82/0x180 [ 16.324922] ? preempt_count_sub+0x50/0x80 [ 16.324946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.324972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.325054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.325083] kthread+0x337/0x6f0 [ 16.325103] ? trace_preempt_on+0x20/0xc0 [ 16.325126] ? __pfx_kthread+0x10/0x10 [ 16.325148] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.325171] ? calculate_sigpending+0x7b/0xa0 [ 16.325196] ? __pfx_kthread+0x10/0x10 [ 16.325218] ret_from_fork+0x116/0x1d0 [ 16.325238] ? __pfx_kthread+0x10/0x10 [ 16.325259] ret_from_fork_asm+0x1a/0x30 [ 16.325304] </TASK> [ 16.325315] [ 16.333403] Allocated by task 282: [ 16.333595] kasan_save_stack+0x45/0x70 [ 16.333798] kasan_save_track+0x18/0x40 [ 16.333992] kasan_save_alloc_info+0x3b/0x50 [ 16.334206] __kasan_kmalloc+0xb7/0xc0 [ 16.334408] __kmalloc_cache_noprof+0x189/0x420 [ 16.334628] kasan_atomics+0x95/0x310 [ 16.334822] kunit_try_run_case+0x1a5/0x480 [ 16.335012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.335228] kthread+0x337/0x6f0 [ 16.335599] ret_from_fork+0x116/0x1d0 [ 16.335784] ret_from_fork_asm+0x1a/0x30 [ 16.336029] [ 16.336133] The buggy address belongs to the object at ffff888102a0a600 [ 16.336133] which belongs to the cache kmalloc-64 of size 64 [ 16.336616] The buggy address is located 0 bytes to the right of [ 16.336616] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.337174] [ 16.337249] The buggy address belongs to the physical page: [ 16.337437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.337680] flags: 0x200000000000000(node=0|zone=2) [ 16.337912] page_type: f5(slab) [ 16.338074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.338423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.338850] page dumped because: kasan: bad access detected [ 16.339028] [ 16.339099] Memory state around the buggy address: [ 16.339254] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.339587] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.339920] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.340243] ^ [ 16.340645] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.340937] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341298] ================================================================== [ 16.482501] ================================================================== [ 16.482827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.483172] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.483459] [ 16.483566] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.483607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.483621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.483643] Call Trace: [ 16.483655] <TASK> [ 16.483669] dump_stack_lvl+0x73/0xb0 [ 16.483697] print_report+0xd1/0x610 [ 16.483720] ? __virt_addr_valid+0x1db/0x2d0 [ 16.483743] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.483766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.483791] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.483814] kasan_report+0x141/0x180 [ 16.483837] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.483865] kasan_check_range+0x10c/0x1c0 [ 16.483890] __kasan_check_write+0x18/0x20 [ 16.483911] kasan_atomics_helper+0x1e12/0x5450 [ 16.483935] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.483960] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.483986] ? kasan_atomics+0x152/0x310 [ 16.484013] kasan_atomics+0x1dc/0x310 [ 16.484037] ? __pfx_kasan_atomics+0x10/0x10 [ 16.484063] ? __pfx_read_tsc+0x10/0x10 [ 16.484085] ? ktime_get_ts64+0x86/0x230 [ 16.484109] kunit_try_run_case+0x1a5/0x480 [ 16.484135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.484159] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.484184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.484210] ? __kthread_parkme+0x82/0x180 [ 16.484231] ? preempt_count_sub+0x50/0x80 [ 16.484256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.484293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.484319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.484346] kthread+0x337/0x6f0 [ 16.484365] ? trace_preempt_on+0x20/0xc0 [ 16.484390] ? __pfx_kthread+0x10/0x10 [ 16.484411] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.484433] ? calculate_sigpending+0x7b/0xa0 [ 16.484459] ? __pfx_kthread+0x10/0x10 [ 16.484481] ret_from_fork+0x116/0x1d0 [ 16.484500] ? __pfx_kthread+0x10/0x10 [ 16.484522] ret_from_fork_asm+0x1a/0x30 [ 16.484553] </TASK> [ 16.484564] [ 16.491592] Allocated by task 282: [ 16.491724] kasan_save_stack+0x45/0x70 [ 16.491887] kasan_save_track+0x18/0x40 [ 16.492074] kasan_save_alloc_info+0x3b/0x50 [ 16.492302] __kasan_kmalloc+0xb7/0xc0 [ 16.492491] __kmalloc_cache_noprof+0x189/0x420 [ 16.492683] kasan_atomics+0x95/0x310 [ 16.492817] kunit_try_run_case+0x1a5/0x480 [ 16.492965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.493193] kthread+0x337/0x6f0 [ 16.493375] ret_from_fork+0x116/0x1d0 [ 16.493562] ret_from_fork_asm+0x1a/0x30 [ 16.493767] [ 16.493862] The buggy address belongs to the object at ffff888102a0a600 [ 16.493862] which belongs to the cache kmalloc-64 of size 64 [ 16.494416] The buggy address is located 0 bytes to the right of [ 16.494416] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.494858] [ 16.494931] The buggy address belongs to the physical page: [ 16.495184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.495510] flags: 0x200000000000000(node=0|zone=2) [ 16.495720] page_type: f5(slab) [ 16.495880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.496182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.496446] page dumped because: kasan: bad access detected [ 16.496671] [ 16.496764] Memory state around the buggy address: [ 16.496988] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.497269] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.497487] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.497703] ^ [ 16.497869] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498185] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498506] ================================================================== [ 15.424742] ================================================================== [ 15.425136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.425896] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.426447] [ 15.426555] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.426597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.426611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.426631] Call Trace: [ 15.426643] <TASK> [ 15.426657] dump_stack_lvl+0x73/0xb0 [ 15.426684] print_report+0xd1/0x610 [ 15.426711] ? __virt_addr_valid+0x1db/0x2d0 [ 15.426732] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.426754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.426778] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.426800] kasan_report+0x141/0x180 [ 15.426821] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.426849] __asan_report_load4_noabort+0x18/0x20 [ 15.426873] kasan_atomics_helper+0x4b88/0x5450 [ 15.426896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.426919] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.426944] ? kasan_atomics+0x152/0x310 [ 15.426969] kasan_atomics+0x1dc/0x310 [ 15.427191] ? __pfx_kasan_atomics+0x10/0x10 [ 15.427217] ? __pfx_read_tsc+0x10/0x10 [ 15.427240] ? ktime_get_ts64+0x86/0x230 [ 15.427279] kunit_try_run_case+0x1a5/0x480 [ 15.427305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.427329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.427353] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.427378] ? __kthread_parkme+0x82/0x180 [ 15.427398] ? preempt_count_sub+0x50/0x80 [ 15.427422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.427447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.427472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.427497] kthread+0x337/0x6f0 [ 15.427517] ? trace_preempt_on+0x20/0xc0 [ 15.427540] ? __pfx_kthread+0x10/0x10 [ 15.427560] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.427582] ? calculate_sigpending+0x7b/0xa0 [ 15.427607] ? __pfx_kthread+0x10/0x10 [ 15.427628] ret_from_fork+0x116/0x1d0 [ 15.427647] ? __pfx_kthread+0x10/0x10 [ 15.427668] ret_from_fork_asm+0x1a/0x30 [ 15.427698] </TASK> [ 15.427816] [ 15.435828] Allocated by task 282: [ 15.436118] kasan_save_stack+0x45/0x70 [ 15.436307] kasan_save_track+0x18/0x40 [ 15.436446] kasan_save_alloc_info+0x3b/0x50 [ 15.436647] __kasan_kmalloc+0xb7/0xc0 [ 15.436836] __kmalloc_cache_noprof+0x189/0x420 [ 15.437060] kasan_atomics+0x95/0x310 [ 15.437403] kunit_try_run_case+0x1a5/0x480 [ 15.437562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.437822] kthread+0x337/0x6f0 [ 15.438036] ret_from_fork+0x116/0x1d0 [ 15.438213] ret_from_fork_asm+0x1a/0x30 [ 15.438398] [ 15.438470] The buggy address belongs to the object at ffff888102a0a600 [ 15.438470] which belongs to the cache kmalloc-64 of size 64 [ 15.438833] The buggy address is located 0 bytes to the right of [ 15.438833] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.439390] [ 15.439485] The buggy address belongs to the physical page: [ 15.439885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.440300] flags: 0x200000000000000(node=0|zone=2) [ 15.440465] page_type: f5(slab) [ 15.440588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.441247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.441587] page dumped because: kasan: bad access detected [ 15.441863] [ 15.441949] Memory state around the buggy address: [ 15.442200] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.442546] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.442855] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.443337] ^ [ 15.443531] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.443831] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.444215] ================================================================== [ 15.505029] ================================================================== [ 15.505752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.506090] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.506424] [ 15.506530] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.506573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.506588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.506610] Call Trace: [ 15.506624] <TASK> [ 15.506638] dump_stack_lvl+0x73/0xb0 [ 15.506664] print_report+0xd1/0x610 [ 15.506687] ? __virt_addr_valid+0x1db/0x2d0 [ 15.506717] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.506739] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.506763] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.506787] kasan_report+0x141/0x180 [ 15.506811] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.506839] kasan_check_range+0x10c/0x1c0 [ 15.506864] __kasan_check_write+0x18/0x20 [ 15.506884] kasan_atomics_helper+0x4a0/0x5450 [ 15.506909] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.506933] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.506959] ? kasan_atomics+0x152/0x310 [ 15.506986] kasan_atomics+0x1dc/0x310 [ 15.507009] ? __pfx_kasan_atomics+0x10/0x10 [ 15.507035] ? __pfx_read_tsc+0x10/0x10 [ 15.507056] ? ktime_get_ts64+0x86/0x230 [ 15.507081] kunit_try_run_case+0x1a5/0x480 [ 15.507106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.507131] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.507155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.507180] ? __kthread_parkme+0x82/0x180 [ 15.507202] ? preempt_count_sub+0x50/0x80 [ 15.507226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.507252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.507457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.507486] kthread+0x337/0x6f0 [ 15.507506] ? trace_preempt_on+0x20/0xc0 [ 15.507531] ? __pfx_kthread+0x10/0x10 [ 15.507553] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.507576] ? calculate_sigpending+0x7b/0xa0 [ 15.507602] ? __pfx_kthread+0x10/0x10 [ 15.507624] ret_from_fork+0x116/0x1d0 [ 15.507643] ? __pfx_kthread+0x10/0x10 [ 15.507664] ret_from_fork_asm+0x1a/0x30 [ 15.507696] </TASK> [ 15.507707] [ 15.515519] Allocated by task 282: [ 15.515688] kasan_save_stack+0x45/0x70 [ 15.515886] kasan_save_track+0x18/0x40 [ 15.516047] kasan_save_alloc_info+0x3b/0x50 [ 15.516249] __kasan_kmalloc+0xb7/0xc0 [ 15.516418] __kmalloc_cache_noprof+0x189/0x420 [ 15.516576] kasan_atomics+0x95/0x310 [ 15.516713] kunit_try_run_case+0x1a5/0x480 [ 15.516881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.517132] kthread+0x337/0x6f0 [ 15.517488] ret_from_fork+0x116/0x1d0 [ 15.517685] ret_from_fork_asm+0x1a/0x30 [ 15.517891] [ 15.517992] The buggy address belongs to the object at ffff888102a0a600 [ 15.517992] which belongs to the cache kmalloc-64 of size 64 [ 15.518629] The buggy address is located 0 bytes to the right of [ 15.518629] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.519220] [ 15.519306] The buggy address belongs to the physical page: [ 15.519484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.519751] flags: 0x200000000000000(node=0|zone=2) [ 15.519984] page_type: f5(slab) [ 15.520286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.520633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.520923] page dumped because: kasan: bad access detected [ 15.521095] [ 15.521187] Memory state around the buggy address: [ 15.521426] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.521752] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.522026] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.522242] ^ [ 15.522554] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.523177] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.523515] ================================================================== [ 15.542779] ================================================================== [ 15.543122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.543475] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.543803] [ 15.543907] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.543948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.543962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.543984] Call Trace: [ 15.543999] <TASK> [ 15.544014] dump_stack_lvl+0x73/0xb0 [ 15.544040] print_report+0xd1/0x610 [ 15.544062] ? __virt_addr_valid+0x1db/0x2d0 [ 15.544089] ? kasan_atomics_helper+0x565/0x5450 [ 15.544111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.544137] ? kasan_atomics_helper+0x565/0x5450 [ 15.544162] kasan_report+0x141/0x180 [ 15.544187] ? kasan_atomics_helper+0x565/0x5450 [ 15.544214] kasan_check_range+0x10c/0x1c0 [ 15.544240] __kasan_check_write+0x18/0x20 [ 15.544275] kasan_atomics_helper+0x565/0x5450 [ 15.544300] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.544324] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.544350] ? kasan_atomics+0x152/0x310 [ 15.544377] kasan_atomics+0x1dc/0x310 [ 15.544401] ? __pfx_kasan_atomics+0x10/0x10 [ 15.544427] ? __pfx_read_tsc+0x10/0x10 [ 15.544449] ? ktime_get_ts64+0x86/0x230 [ 15.544473] kunit_try_run_case+0x1a5/0x480 [ 15.544499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.544523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.544548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.544573] ? __kthread_parkme+0x82/0x180 [ 15.544595] ? preempt_count_sub+0x50/0x80 [ 15.544620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.544646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.544672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.544700] kthread+0x337/0x6f0 [ 15.544720] ? trace_preempt_on+0x20/0xc0 [ 15.544743] ? __pfx_kthread+0x10/0x10 [ 15.544765] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.544787] ? calculate_sigpending+0x7b/0xa0 [ 15.544813] ? __pfx_kthread+0x10/0x10 [ 15.544835] ret_from_fork+0x116/0x1d0 [ 15.544855] ? __pfx_kthread+0x10/0x10 [ 15.544876] ret_from_fork_asm+0x1a/0x30 [ 15.544908] </TASK> [ 15.544919] [ 15.553228] Allocated by task 282: [ 15.553394] kasan_save_stack+0x45/0x70 [ 15.553540] kasan_save_track+0x18/0x40 [ 15.553678] kasan_save_alloc_info+0x3b/0x50 [ 15.553891] __kasan_kmalloc+0xb7/0xc0 [ 15.554232] __kmalloc_cache_noprof+0x189/0x420 [ 15.554469] kasan_atomics+0x95/0x310 [ 15.554662] kunit_try_run_case+0x1a5/0x480 [ 15.554862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.555260] kthread+0x337/0x6f0 [ 15.555434] ret_from_fork+0x116/0x1d0 [ 15.555608] ret_from_fork_asm+0x1a/0x30 [ 15.555789] [ 15.555862] The buggy address belongs to the object at ffff888102a0a600 [ 15.555862] which belongs to the cache kmalloc-64 of size 64 [ 15.556216] The buggy address is located 0 bytes to the right of [ 15.556216] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.557231] [ 15.557417] The buggy address belongs to the physical page: [ 15.557605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.557846] flags: 0x200000000000000(node=0|zone=2) [ 15.558360] page_type: f5(slab) [ 15.558537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.558958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.559426] page dumped because: kasan: bad access detected [ 15.559646] [ 15.559717] Memory state around the buggy address: [ 15.559874] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.560504] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.560814] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.561064] ^ [ 15.561220] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.561451] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.561799] ================================================================== [ 16.411341] ================================================================== [ 16.411684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.412049] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.412400] [ 16.412504] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.412546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.412558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.412578] Call Trace: [ 16.412593] <TASK> [ 16.412606] dump_stack_lvl+0x73/0xb0 [ 16.412632] print_report+0xd1/0x610 [ 16.412655] ? __virt_addr_valid+0x1db/0x2d0 [ 16.412678] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.412702] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.412727] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.412751] kasan_report+0x141/0x180 [ 16.412774] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.412802] __asan_report_load8_noabort+0x18/0x20 [ 16.412828] kasan_atomics_helper+0x4f30/0x5450 [ 16.412853] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.412877] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.412904] ? kasan_atomics+0x152/0x310 [ 16.412930] kasan_atomics+0x1dc/0x310 [ 16.412954] ? __pfx_kasan_atomics+0x10/0x10 [ 16.412980] ? __pfx_read_tsc+0x10/0x10 [ 16.413002] ? ktime_get_ts64+0x86/0x230 [ 16.413028] kunit_try_run_case+0x1a5/0x480 [ 16.413052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.413076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.413100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.413125] ? __kthread_parkme+0x82/0x180 [ 16.413147] ? preempt_count_sub+0x50/0x80 [ 16.413172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.413197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.413223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.413251] kthread+0x337/0x6f0 [ 16.413280] ? trace_preempt_on+0x20/0xc0 [ 16.413304] ? __pfx_kthread+0x10/0x10 [ 16.413325] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.413348] ? calculate_sigpending+0x7b/0xa0 [ 16.413372] ? __pfx_kthread+0x10/0x10 [ 16.413395] ret_from_fork+0x116/0x1d0 [ 16.413415] ? __pfx_kthread+0x10/0x10 [ 16.413436] ret_from_fork_asm+0x1a/0x30 [ 16.413468] </TASK> [ 16.413478] [ 16.420612] Allocated by task 282: [ 16.420795] kasan_save_stack+0x45/0x70 [ 16.420989] kasan_save_track+0x18/0x40 [ 16.421163] kasan_save_alloc_info+0x3b/0x50 [ 16.421355] __kasan_kmalloc+0xb7/0xc0 [ 16.421531] __kmalloc_cache_noprof+0x189/0x420 [ 16.421712] kasan_atomics+0x95/0x310 [ 16.421893] kunit_try_run_case+0x1a5/0x480 [ 16.422063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.422309] kthread+0x337/0x6f0 [ 16.422464] ret_from_fork+0x116/0x1d0 [ 16.422597] ret_from_fork_asm+0x1a/0x30 [ 16.422747] [ 16.422816] The buggy address belongs to the object at ffff888102a0a600 [ 16.422816] which belongs to the cache kmalloc-64 of size 64 [ 16.423168] The buggy address is located 0 bytes to the right of [ 16.423168] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.423699] [ 16.423794] The buggy address belongs to the physical page: [ 16.424044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.424397] flags: 0x200000000000000(node=0|zone=2) [ 16.424577] page_type: f5(slab) [ 16.424699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.424934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.425162] page dumped because: kasan: bad access detected [ 16.425343] [ 16.425414] Memory state around the buggy address: [ 16.425642] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.425961] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.426355] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.426695] ^ [ 16.426930] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.427253] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.427586] ================================================================== [ 16.279247] ================================================================== [ 16.279819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.280076] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.280469] [ 16.280592] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.280641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.280655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.280678] Call Trace: [ 16.280698] <TASK> [ 16.280717] dump_stack_lvl+0x73/0xb0 [ 16.280748] print_report+0xd1/0x610 [ 16.280771] ? __virt_addr_valid+0x1db/0x2d0 [ 16.280795] ? kasan_atomics_helper+0x1818/0x5450 [ 16.280819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.280844] ? kasan_atomics_helper+0x1818/0x5450 [ 16.280867] kasan_report+0x141/0x180 [ 16.280890] ? kasan_atomics_helper+0x1818/0x5450 [ 16.280919] kasan_check_range+0x10c/0x1c0 [ 16.280950] __kasan_check_write+0x18/0x20 [ 16.280971] kasan_atomics_helper+0x1818/0x5450 [ 16.280995] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.281020] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.281046] ? kasan_atomics+0x152/0x310 [ 16.281075] kasan_atomics+0x1dc/0x310 [ 16.281100] ? __pfx_kasan_atomics+0x10/0x10 [ 16.281125] ? __pfx_read_tsc+0x10/0x10 [ 16.281160] ? ktime_get_ts64+0x86/0x230 [ 16.281186] kunit_try_run_case+0x1a5/0x480 [ 16.281215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.281248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.281284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.281343] ? __kthread_parkme+0x82/0x180 [ 16.281366] ? preempt_count_sub+0x50/0x80 [ 16.281391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.281417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.281444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.281471] kthread+0x337/0x6f0 [ 16.281491] ? trace_preempt_on+0x20/0xc0 [ 16.281516] ? __pfx_kthread+0x10/0x10 [ 16.281538] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.281561] ? calculate_sigpending+0x7b/0xa0 [ 16.281588] ? __pfx_kthread+0x10/0x10 [ 16.281610] ret_from_fork+0x116/0x1d0 [ 16.281630] ? __pfx_kthread+0x10/0x10 [ 16.281651] ret_from_fork_asm+0x1a/0x30 [ 16.281683] </TASK> [ 16.281696] [ 16.290277] Allocated by task 282: [ 16.290468] kasan_save_stack+0x45/0x70 [ 16.290663] kasan_save_track+0x18/0x40 [ 16.290851] kasan_save_alloc_info+0x3b/0x50 [ 16.291743] __kasan_kmalloc+0xb7/0xc0 [ 16.291959] __kmalloc_cache_noprof+0x189/0x420 [ 16.292386] kasan_atomics+0x95/0x310 [ 16.292572] kunit_try_run_case+0x1a5/0x480 [ 16.292728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.293035] kthread+0x337/0x6f0 [ 16.293226] ret_from_fork+0x116/0x1d0 [ 16.293502] ret_from_fork_asm+0x1a/0x30 [ 16.293686] [ 16.293761] The buggy address belongs to the object at ffff888102a0a600 [ 16.293761] which belongs to the cache kmalloc-64 of size 64 [ 16.294498] The buggy address is located 0 bytes to the right of [ 16.294498] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.294966] [ 16.295043] The buggy address belongs to the physical page: [ 16.295217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.295697] flags: 0x200000000000000(node=0|zone=2) [ 16.296485] page_type: f5(slab) [ 16.296665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.296949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.297572] page dumped because: kasan: bad access detected [ 16.297863] [ 16.297944] Memory state around the buggy address: [ 16.298315] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.298663] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.299045] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.299365] ^ [ 16.299527] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.299847] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300454] ================================================================== [ 16.126482] ================================================================== [ 16.126793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 16.127283] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.127621] [ 16.127729] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.127770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.127783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.127804] Call Trace: [ 16.127818] <TASK> [ 16.127833] dump_stack_lvl+0x73/0xb0 [ 16.127860] print_report+0xd1/0x610 [ 16.127883] ? __virt_addr_valid+0x1db/0x2d0 [ 16.127908] ? kasan_atomics_helper+0x1467/0x5450 [ 16.127930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.127955] ? kasan_atomics_helper+0x1467/0x5450 [ 16.128086] kasan_report+0x141/0x180 [ 16.128110] ? kasan_atomics_helper+0x1467/0x5450 [ 16.128138] kasan_check_range+0x10c/0x1c0 [ 16.128162] __kasan_check_write+0x18/0x20 [ 16.128183] kasan_atomics_helper+0x1467/0x5450 [ 16.128207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.128231] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.128257] ? kasan_atomics+0x152/0x310 [ 16.128297] kasan_atomics+0x1dc/0x310 [ 16.128320] ? __pfx_kasan_atomics+0x10/0x10 [ 16.128346] ? __pfx_read_tsc+0x10/0x10 [ 16.128367] ? ktime_get_ts64+0x86/0x230 [ 16.128392] kunit_try_run_case+0x1a5/0x480 [ 16.128418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.128443] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.128468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.128494] ? __kthread_parkme+0x82/0x180 [ 16.128515] ? preempt_count_sub+0x50/0x80 [ 16.128541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.128566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.128592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.128619] kthread+0x337/0x6f0 [ 16.128639] ? trace_preempt_on+0x20/0xc0 [ 16.128663] ? __pfx_kthread+0x10/0x10 [ 16.128685] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.128708] ? calculate_sigpending+0x7b/0xa0 [ 16.128734] ? __pfx_kthread+0x10/0x10 [ 16.128757] ret_from_fork+0x116/0x1d0 [ 16.128777] ? __pfx_kthread+0x10/0x10 [ 16.128799] ret_from_fork_asm+0x1a/0x30 [ 16.128831] </TASK> [ 16.128842] [ 16.136872] Allocated by task 282: [ 16.137113] kasan_save_stack+0x45/0x70 [ 16.137323] kasan_save_track+0x18/0x40 [ 16.137496] kasan_save_alloc_info+0x3b/0x50 [ 16.137684] __kasan_kmalloc+0xb7/0xc0 [ 16.137846] __kmalloc_cache_noprof+0x189/0x420 [ 16.138130] kasan_atomics+0x95/0x310 [ 16.138336] kunit_try_run_case+0x1a5/0x480 [ 16.138545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.138762] kthread+0x337/0x6f0 [ 16.138929] ret_from_fork+0x116/0x1d0 [ 16.139315] ret_from_fork_asm+0x1a/0x30 [ 16.139468] [ 16.139550] The buggy address belongs to the object at ffff888102a0a600 [ 16.139550] which belongs to the cache kmalloc-64 of size 64 [ 16.140193] The buggy address is located 0 bytes to the right of [ 16.140193] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.140681] [ 16.140778] The buggy address belongs to the physical page: [ 16.141095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.141417] flags: 0x200000000000000(node=0|zone=2) [ 16.141581] page_type: f5(slab) [ 16.141702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.142062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.142419] page dumped because: kasan: bad access detected [ 16.142669] [ 16.142769] Memory state around the buggy address: [ 16.143170] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.143488] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.143790] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.144188] ^ [ 16.144379] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.144599] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.144906] ================================================================== [ 16.088822] ================================================================== [ 16.089250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 16.089580] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.089839] [ 16.089944] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.090083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.090097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.090118] Call Trace: [ 16.090132] <TASK> [ 16.090146] dump_stack_lvl+0x73/0xb0 [ 16.090174] print_report+0xd1/0x610 [ 16.090197] ? __virt_addr_valid+0x1db/0x2d0 [ 16.090221] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.090244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.090280] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.090303] kasan_report+0x141/0x180 [ 16.090326] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.090354] kasan_check_range+0x10c/0x1c0 [ 16.090378] __kasan_check_read+0x15/0x20 [ 16.090399] kasan_atomics_helper+0x13b5/0x5450 [ 16.090423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.090447] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.090473] ? kasan_atomics+0x152/0x310 [ 16.090500] kasan_atomics+0x1dc/0x310 [ 16.090523] ? __pfx_kasan_atomics+0x10/0x10 [ 16.090548] ? __pfx_read_tsc+0x10/0x10 [ 16.090570] ? ktime_get_ts64+0x86/0x230 [ 16.090594] kunit_try_run_case+0x1a5/0x480 [ 16.090619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.090645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.090669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.090694] ? __kthread_parkme+0x82/0x180 [ 16.090722] ? preempt_count_sub+0x50/0x80 [ 16.090747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.090773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.090798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.090825] kthread+0x337/0x6f0 [ 16.090845] ? trace_preempt_on+0x20/0xc0 [ 16.090869] ? __pfx_kthread+0x10/0x10 [ 16.090890] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.090913] ? calculate_sigpending+0x7b/0xa0 [ 16.090938] ? __pfx_kthread+0x10/0x10 [ 16.091125] ret_from_fork+0x116/0x1d0 [ 16.091157] ? __pfx_kthread+0x10/0x10 [ 16.091179] ret_from_fork_asm+0x1a/0x30 [ 16.091211] </TASK> [ 16.091222] [ 16.098952] Allocated by task 282: [ 16.099277] kasan_save_stack+0x45/0x70 [ 16.099470] kasan_save_track+0x18/0x40 [ 16.099666] kasan_save_alloc_info+0x3b/0x50 [ 16.099840] __kasan_kmalloc+0xb7/0xc0 [ 16.100134] __kmalloc_cache_noprof+0x189/0x420 [ 16.100343] kasan_atomics+0x95/0x310 [ 16.100534] kunit_try_run_case+0x1a5/0x480 [ 16.100737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.101063] kthread+0x337/0x6f0 [ 16.101221] ret_from_fork+0x116/0x1d0 [ 16.101383] ret_from_fork_asm+0x1a/0x30 [ 16.101526] [ 16.101598] The buggy address belongs to the object at ffff888102a0a600 [ 16.101598] which belongs to the cache kmalloc-64 of size 64 [ 16.102136] The buggy address is located 0 bytes to the right of [ 16.102136] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.102690] [ 16.102770] The buggy address belongs to the physical page: [ 16.102945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.103504] flags: 0x200000000000000(node=0|zone=2) [ 16.103751] page_type: f5(slab) [ 16.103922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.104364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.104627] page dumped because: kasan: bad access detected [ 16.104879] [ 16.104980] Memory state around the buggy address: [ 16.105190] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.105488] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.105768] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.106078] ^ [ 16.106436] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.106708] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.106940] ================================================================== [ 16.341675] ================================================================== [ 16.342038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.342361] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.342679] [ 16.342779] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.342822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.342835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.342856] Call Trace: [ 16.342870] <TASK> [ 16.342884] dump_stack_lvl+0x73/0xb0 [ 16.342912] print_report+0xd1/0x610 [ 16.342934] ? __virt_addr_valid+0x1db/0x2d0 [ 16.342958] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.342981] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.343008] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.343031] kasan_report+0x141/0x180 [ 16.343054] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.343082] kasan_check_range+0x10c/0x1c0 [ 16.343107] __kasan_check_write+0x18/0x20 [ 16.343127] kasan_atomics_helper+0x19e3/0x5450 [ 16.343151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.343176] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.343202] ? kasan_atomics+0x152/0x310 [ 16.343228] kasan_atomics+0x1dc/0x310 [ 16.343252] ? __pfx_kasan_atomics+0x10/0x10 [ 16.343287] ? __pfx_read_tsc+0x10/0x10 [ 16.343310] ? ktime_get_ts64+0x86/0x230 [ 16.343334] kunit_try_run_case+0x1a5/0x480 [ 16.343360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.343383] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.343408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.343434] ? __kthread_parkme+0x82/0x180 [ 16.343456] ? preempt_count_sub+0x50/0x80 [ 16.343481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.343507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.343532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.343559] kthread+0x337/0x6f0 [ 16.343579] ? trace_preempt_on+0x20/0xc0 [ 16.343603] ? __pfx_kthread+0x10/0x10 [ 16.343624] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.343647] ? calculate_sigpending+0x7b/0xa0 [ 16.343672] ? __pfx_kthread+0x10/0x10 [ 16.343695] ret_from_fork+0x116/0x1d0 [ 16.343714] ? __pfx_kthread+0x10/0x10 [ 16.343736] ret_from_fork_asm+0x1a/0x30 [ 16.343767] </TASK> [ 16.343779] [ 16.352359] Allocated by task 282: [ 16.352526] kasan_save_stack+0x45/0x70 [ 16.352700] kasan_save_track+0x18/0x40 [ 16.352888] kasan_save_alloc_info+0x3b/0x50 [ 16.353133] __kasan_kmalloc+0xb7/0xc0 [ 16.353286] __kmalloc_cache_noprof+0x189/0x420 [ 16.353444] kasan_atomics+0x95/0x310 [ 16.353579] kunit_try_run_case+0x1a5/0x480 [ 16.353727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.353905] kthread+0x337/0x6f0 [ 16.354071] ret_from_fork+0x116/0x1d0 [ 16.354257] ret_from_fork_asm+0x1a/0x30 [ 16.354772] [ 16.354878] The buggy address belongs to the object at ffff888102a0a600 [ 16.354878] which belongs to the cache kmalloc-64 of size 64 [ 16.355328] The buggy address is located 0 bytes to the right of [ 16.355328] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.355702] [ 16.355778] The buggy address belongs to the physical page: [ 16.355952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.356762] flags: 0x200000000000000(node=0|zone=2) [ 16.357028] page_type: f5(slab) [ 16.357199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.357822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.358174] page dumped because: kasan: bad access detected [ 16.358538] [ 16.358620] Memory state around the buggy address: [ 16.358824] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.359177] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.359413] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.359629] ^ [ 16.359843] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360239] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360575] ================================================================== [ 15.403368] ================================================================== [ 15.403620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.403954] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.404318] [ 15.404403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.404445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.404457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.404477] Call Trace: [ 15.404489] <TASK> [ 15.404501] dump_stack_lvl+0x73/0xb0 [ 15.404528] print_report+0xd1/0x610 [ 15.404549] ? __virt_addr_valid+0x1db/0x2d0 [ 15.404572] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.404594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.404617] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.404639] kasan_report+0x141/0x180 [ 15.404661] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.404687] __asan_report_store4_noabort+0x1b/0x30 [ 15.404713] kasan_atomics_helper+0x4ba2/0x5450 [ 15.404736] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.404758] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.404783] ? kasan_atomics+0x152/0x310 [ 15.404810] kasan_atomics+0x1dc/0x310 [ 15.404831] ? __pfx_kasan_atomics+0x10/0x10 [ 15.404856] ? __pfx_read_tsc+0x10/0x10 [ 15.404877] ? ktime_get_ts64+0x86/0x230 [ 15.404901] kunit_try_run_case+0x1a5/0x480 [ 15.404927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.404950] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.404974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.404998] ? __kthread_parkme+0x82/0x180 [ 15.405019] ? preempt_count_sub+0x50/0x80 [ 15.405043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.405228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.405256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.405296] kthread+0x337/0x6f0 [ 15.405315] ? trace_preempt_on+0x20/0xc0 [ 15.405340] ? __pfx_kthread+0x10/0x10 [ 15.405361] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.405383] ? calculate_sigpending+0x7b/0xa0 [ 15.405407] ? __pfx_kthread+0x10/0x10 [ 15.405429] ret_from_fork+0x116/0x1d0 [ 15.405448] ? __pfx_kthread+0x10/0x10 [ 15.405469] ret_from_fork_asm+0x1a/0x30 [ 15.405499] </TASK> [ 15.405510] [ 15.413309] Allocated by task 282: [ 15.413444] kasan_save_stack+0x45/0x70 [ 15.413590] kasan_save_track+0x18/0x40 [ 15.413725] kasan_save_alloc_info+0x3b/0x50 [ 15.413929] __kasan_kmalloc+0xb7/0xc0 [ 15.414120] __kmalloc_cache_noprof+0x189/0x420 [ 15.414357] kasan_atomics+0x95/0x310 [ 15.414550] kunit_try_run_case+0x1a5/0x480 [ 15.414767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.415019] kthread+0x337/0x6f0 [ 15.415187] ret_from_fork+0x116/0x1d0 [ 15.416334] ret_from_fork_asm+0x1a/0x30 [ 15.416512] [ 15.416964] The buggy address belongs to the object at ffff888102a0a600 [ 15.416964] which belongs to the cache kmalloc-64 of size 64 [ 15.417651] The buggy address is located 0 bytes to the right of [ 15.417651] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.418411] [ 15.418493] The buggy address belongs to the physical page: [ 15.418882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.419395] flags: 0x200000000000000(node=0|zone=2) [ 15.419577] page_type: f5(slab) [ 15.420110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.420405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.420859] page dumped because: kasan: bad access detected [ 15.421119] [ 15.421196] Memory state around the buggy address: [ 15.421666] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.422040] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.422361] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.422673] ^ [ 15.422886] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.423599] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.424092] ================================================================== [ 15.781649] ================================================================== [ 15.781922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.782441] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.782671] [ 15.782763] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.782806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.782819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.782841] Call Trace: [ 15.782856] <TASK> [ 15.782871] dump_stack_lvl+0x73/0xb0 [ 15.782899] print_report+0xd1/0x610 [ 15.782922] ? __virt_addr_valid+0x1db/0x2d0 [ 15.782945] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.782968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.782993] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.783017] kasan_report+0x141/0x180 [ 15.783041] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.783069] __asan_report_load4_noabort+0x18/0x20 [ 15.783096] kasan_atomics_helper+0x4a84/0x5450 [ 15.783320] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.783346] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.783373] ? kasan_atomics+0x152/0x310 [ 15.783400] kasan_atomics+0x1dc/0x310 [ 15.783424] ? __pfx_kasan_atomics+0x10/0x10 [ 15.783450] ? __pfx_read_tsc+0x10/0x10 [ 15.783473] ? ktime_get_ts64+0x86/0x230 [ 15.783498] kunit_try_run_case+0x1a5/0x480 [ 15.783523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.783548] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.783572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.783598] ? __kthread_parkme+0x82/0x180 [ 15.783619] ? preempt_count_sub+0x50/0x80 [ 15.783643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.783670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.783696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.783723] kthread+0x337/0x6f0 [ 15.783746] ? trace_preempt_on+0x20/0xc0 [ 15.783773] ? __pfx_kthread+0x10/0x10 [ 15.783795] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.783818] ? calculate_sigpending+0x7b/0xa0 [ 15.783843] ? __pfx_kthread+0x10/0x10 [ 15.783867] ret_from_fork+0x116/0x1d0 [ 15.783888] ? __pfx_kthread+0x10/0x10 [ 15.783910] ret_from_fork_asm+0x1a/0x30 [ 15.783943] </TASK> [ 15.783954] [ 15.791885] Allocated by task 282: [ 15.792019] kasan_save_stack+0x45/0x70 [ 15.792212] kasan_save_track+0x18/0x40 [ 15.792413] kasan_save_alloc_info+0x3b/0x50 [ 15.792621] __kasan_kmalloc+0xb7/0xc0 [ 15.792807] __kmalloc_cache_noprof+0x189/0x420 [ 15.793030] kasan_atomics+0x95/0x310 [ 15.793191] kunit_try_run_case+0x1a5/0x480 [ 15.793739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.793974] kthread+0x337/0x6f0 [ 15.794280] ret_from_fork+0x116/0x1d0 [ 15.794466] ret_from_fork_asm+0x1a/0x30 [ 15.794629] [ 15.794700] The buggy address belongs to the object at ffff888102a0a600 [ 15.794700] which belongs to the cache kmalloc-64 of size 64 [ 15.795346] The buggy address is located 0 bytes to the right of [ 15.795346] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.795905] [ 15.796001] The buggy address belongs to the physical page: [ 15.796347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.796664] flags: 0x200000000000000(node=0|zone=2) [ 15.796877] page_type: f5(slab) [ 15.797043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.797626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.797924] page dumped because: kasan: bad access detected [ 15.798311] [ 15.798406] Memory state around the buggy address: [ 15.798595] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.798861] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.799210] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.799650] ^ [ 15.799899] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.800545] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.800821] ================================================================== [ 16.457709] ================================================================== [ 16.458418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.459089] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.459708] [ 16.459798] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.459840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.459855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.459876] Call Trace: [ 16.459893] <TASK> [ 16.459910] dump_stack_lvl+0x73/0xb0 [ 16.459937] print_report+0xd1/0x610 [ 16.459960] ? __virt_addr_valid+0x1db/0x2d0 [ 16.459984] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.460007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.460032] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.460056] kasan_report+0x141/0x180 [ 16.460078] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.460107] kasan_check_range+0x10c/0x1c0 [ 16.460132] __kasan_check_write+0x18/0x20 [ 16.460152] kasan_atomics_helper+0x1d7a/0x5450 [ 16.460177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.460202] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.460228] ? kasan_atomics+0x152/0x310 [ 16.460255] kasan_atomics+0x1dc/0x310 [ 16.460296] ? __pfx_kasan_atomics+0x10/0x10 [ 16.460321] ? __pfx_read_tsc+0x10/0x10 [ 16.460343] ? ktime_get_ts64+0x86/0x230 [ 16.460368] kunit_try_run_case+0x1a5/0x480 [ 16.460394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.460418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.460443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.460469] ? __kthread_parkme+0x82/0x180 [ 16.460491] ? preempt_count_sub+0x50/0x80 [ 16.460516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.460542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.460567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.460593] kthread+0x337/0x6f0 [ 16.460613] ? trace_preempt_on+0x20/0xc0 [ 16.460638] ? __pfx_kthread+0x10/0x10 [ 16.460660] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.460682] ? calculate_sigpending+0x7b/0xa0 [ 16.460708] ? __pfx_kthread+0x10/0x10 [ 16.460731] ret_from_fork+0x116/0x1d0 [ 16.460750] ? __pfx_kthread+0x10/0x10 [ 16.460772] ret_from_fork_asm+0x1a/0x30 [ 16.460805] </TASK> [ 16.460815] [ 16.472493] Allocated by task 282: [ 16.472621] kasan_save_stack+0x45/0x70 [ 16.472795] kasan_save_track+0x18/0x40 [ 16.472991] kasan_save_alloc_info+0x3b/0x50 [ 16.473210] __kasan_kmalloc+0xb7/0xc0 [ 16.473534] __kmalloc_cache_noprof+0x189/0x420 [ 16.473924] kasan_atomics+0x95/0x310 [ 16.474247] kunit_try_run_case+0x1a5/0x480 [ 16.474623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.475089] kthread+0x337/0x6f0 [ 16.475396] ret_from_fork+0x116/0x1d0 [ 16.475735] ret_from_fork_asm+0x1a/0x30 [ 16.476090] [ 16.476244] The buggy address belongs to the object at ffff888102a0a600 [ 16.476244] which belongs to the cache kmalloc-64 of size 64 [ 16.477251] The buggy address is located 0 bytes to the right of [ 16.477251] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.478321] [ 16.478477] The buggy address belongs to the physical page: [ 16.478718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.478961] flags: 0x200000000000000(node=0|zone=2) [ 16.479126] page_type: f5(slab) [ 16.479247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.479567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.479853] page dumped because: kasan: bad access detected [ 16.480069] [ 16.480141] Memory state around the buggy address: [ 16.480359] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.480603] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.480900] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.481155] ^ [ 16.481388] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.481682] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.481937] ================================================================== [ 15.523992] ================================================================== [ 15.524626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.524924] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.525311] [ 15.525416] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.525458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.525473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.525495] Call Trace: [ 15.525510] <TASK> [ 15.525526] dump_stack_lvl+0x73/0xb0 [ 15.525554] print_report+0xd1/0x610 [ 15.525577] ? __virt_addr_valid+0x1db/0x2d0 [ 15.525600] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.525623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.525649] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.525673] kasan_report+0x141/0x180 [ 15.525696] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.525725] __asan_report_store4_noabort+0x1b/0x30 [ 15.525751] kasan_atomics_helper+0x4b3a/0x5450 [ 15.525774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.525799] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.525824] ? kasan_atomics+0x152/0x310 [ 15.525852] kasan_atomics+0x1dc/0x310 [ 15.525875] ? __pfx_kasan_atomics+0x10/0x10 [ 15.525901] ? __pfx_read_tsc+0x10/0x10 [ 15.525923] ? ktime_get_ts64+0x86/0x230 [ 15.525949] kunit_try_run_case+0x1a5/0x480 [ 15.525978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.526045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.526072] ? __kthread_parkme+0x82/0x180 [ 15.526095] ? preempt_count_sub+0x50/0x80 [ 15.526120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.526172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.526199] kthread+0x337/0x6f0 [ 15.526219] ? trace_preempt_on+0x20/0xc0 [ 15.526243] ? __pfx_kthread+0x10/0x10 [ 15.526275] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.526298] ? calculate_sigpending+0x7b/0xa0 [ 15.526324] ? __pfx_kthread+0x10/0x10 [ 15.526347] ret_from_fork+0x116/0x1d0 [ 15.526366] ? __pfx_kthread+0x10/0x10 [ 15.526388] ret_from_fork_asm+0x1a/0x30 [ 15.526420] </TASK> [ 15.526431] [ 15.534090] Allocated by task 282: [ 15.534283] kasan_save_stack+0x45/0x70 [ 15.534758] kasan_save_track+0x18/0x40 [ 15.534925] kasan_save_alloc_info+0x3b/0x50 [ 15.535342] __kasan_kmalloc+0xb7/0xc0 [ 15.535537] __kmalloc_cache_noprof+0x189/0x420 [ 15.535699] kasan_atomics+0x95/0x310 [ 15.535875] kunit_try_run_case+0x1a5/0x480 [ 15.536287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.536549] kthread+0x337/0x6f0 [ 15.536697] ret_from_fork+0x116/0x1d0 [ 15.536837] ret_from_fork_asm+0x1a/0x30 [ 15.537136] [ 15.537249] The buggy address belongs to the object at ffff888102a0a600 [ 15.537249] which belongs to the cache kmalloc-64 of size 64 [ 15.537791] The buggy address is located 0 bytes to the right of [ 15.537791] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.538344] [ 15.538444] The buggy address belongs to the physical page: [ 15.538674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.539049] flags: 0x200000000000000(node=0|zone=2) [ 15.539274] page_type: f5(slab) [ 15.539431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.539726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.539982] page dumped because: kasan: bad access detected [ 15.540155] [ 15.540225] Memory state around the buggy address: [ 15.540389] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.540609] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.540920] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.541566] ^ [ 15.541807] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.542200] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.542432] ================================================================== [ 15.985878] ================================================================== [ 15.986617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.986963] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.987331] [ 15.987438] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.987481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.987495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.987518] Call Trace: [ 15.987532] <TASK> [ 15.987548] dump_stack_lvl+0x73/0xb0 [ 15.987576] print_report+0xd1/0x610 [ 15.987599] ? __virt_addr_valid+0x1db/0x2d0 [ 15.987622] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.987645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.987671] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.987694] kasan_report+0x141/0x180 [ 15.987718] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.987748] __asan_report_load4_noabort+0x18/0x20 [ 15.987777] kasan_atomics_helper+0x4a02/0x5450 [ 15.987801] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.987825] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.987852] ? kasan_atomics+0x152/0x310 [ 15.987879] kasan_atomics+0x1dc/0x310 [ 15.987902] ? __pfx_kasan_atomics+0x10/0x10 [ 15.987928] ? __pfx_read_tsc+0x10/0x10 [ 15.987950] ? ktime_get_ts64+0x86/0x230 [ 15.987975] kunit_try_run_case+0x1a5/0x480 [ 15.988193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.988236] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.988274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.988300] ? __kthread_parkme+0x82/0x180 [ 15.988321] ? preempt_count_sub+0x50/0x80 [ 15.988346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.988372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.988398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.988425] kthread+0x337/0x6f0 [ 15.988445] ? trace_preempt_on+0x20/0xc0 [ 15.988470] ? __pfx_kthread+0x10/0x10 [ 15.988492] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.988515] ? calculate_sigpending+0x7b/0xa0 [ 15.988540] ? __pfx_kthread+0x10/0x10 [ 15.988563] ret_from_fork+0x116/0x1d0 [ 15.988584] ? __pfx_kthread+0x10/0x10 [ 15.988606] ret_from_fork_asm+0x1a/0x30 [ 15.988638] </TASK> [ 15.988650] [ 15.997219] Allocated by task 282: [ 15.997381] kasan_save_stack+0x45/0x70 [ 15.997549] kasan_save_track+0x18/0x40 [ 15.997750] kasan_save_alloc_info+0x3b/0x50 [ 15.997966] __kasan_kmalloc+0xb7/0xc0 [ 15.998243] __kmalloc_cache_noprof+0x189/0x420 [ 15.998475] kasan_atomics+0x95/0x310 [ 16.000110] kunit_try_run_case+0x1a5/0x480 [ 16.000804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.001206] kthread+0x337/0x6f0 [ 16.001361] ret_from_fork+0x116/0x1d0 [ 16.001498] ret_from_fork_asm+0x1a/0x30 [ 16.001639] [ 16.001714] The buggy address belongs to the object at ffff888102a0a600 [ 16.001714] which belongs to the cache kmalloc-64 of size 64 [ 16.002217] The buggy address is located 0 bytes to the right of [ 16.002217] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.002608] [ 16.002682] The buggy address belongs to the physical page: [ 16.002891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.004052] flags: 0x200000000000000(node=0|zone=2) [ 16.006342] page_type: f5(slab) [ 16.006512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.006747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.006971] page dumped because: kasan: bad access detected [ 16.007141] [ 16.007212] Memory state around the buggy address: [ 16.007380] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.007593] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.007805] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.008013] ^ [ 16.008165] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.009688] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.010311] ================================================================== [ 16.145423] ================================================================== [ 16.145726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 16.146132] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.146462] [ 16.146572] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.146613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.146627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.146648] Call Trace: [ 16.146660] <TASK> [ 16.146674] dump_stack_lvl+0x73/0xb0 [ 16.146702] print_report+0xd1/0x610 [ 16.146731] ? __virt_addr_valid+0x1db/0x2d0 [ 16.146754] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.146777] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.146802] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.146826] kasan_report+0x141/0x180 [ 16.146849] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.146877] __asan_report_store8_noabort+0x1b/0x30 [ 16.146904] kasan_atomics_helper+0x50d4/0x5450 [ 16.146928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.146953] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.147156] ? kasan_atomics+0x152/0x310 [ 16.147184] kasan_atomics+0x1dc/0x310 [ 16.147208] ? __pfx_kasan_atomics+0x10/0x10 [ 16.147234] ? __pfx_read_tsc+0x10/0x10 [ 16.147255] ? ktime_get_ts64+0x86/0x230 [ 16.147295] kunit_try_run_case+0x1a5/0x480 [ 16.147320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.147344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.147369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.147394] ? __kthread_parkme+0x82/0x180 [ 16.147416] ? preempt_count_sub+0x50/0x80 [ 16.147441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.147467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.147493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.147519] kthread+0x337/0x6f0 [ 16.147539] ? trace_preempt_on+0x20/0xc0 [ 16.147563] ? __pfx_kthread+0x10/0x10 [ 16.147585] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.147607] ? calculate_sigpending+0x7b/0xa0 [ 16.147632] ? __pfx_kthread+0x10/0x10 [ 16.147655] ret_from_fork+0x116/0x1d0 [ 16.147674] ? __pfx_kthread+0x10/0x10 [ 16.147696] ret_from_fork_asm+0x1a/0x30 [ 16.147728] </TASK> [ 16.147739] [ 16.155578] Allocated by task 282: [ 16.155764] kasan_save_stack+0x45/0x70 [ 16.156079] kasan_save_track+0x18/0x40 [ 16.156299] kasan_save_alloc_info+0x3b/0x50 [ 16.156501] __kasan_kmalloc+0xb7/0xc0 [ 16.156668] __kmalloc_cache_noprof+0x189/0x420 [ 16.156865] kasan_atomics+0x95/0x310 [ 16.157110] kunit_try_run_case+0x1a5/0x480 [ 16.157342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.157549] kthread+0x337/0x6f0 [ 16.157715] ret_from_fork+0x116/0x1d0 [ 16.157875] ret_from_fork_asm+0x1a/0x30 [ 16.158146] [ 16.158245] The buggy address belongs to the object at ffff888102a0a600 [ 16.158245] which belongs to the cache kmalloc-64 of size 64 [ 16.158756] The buggy address is located 0 bytes to the right of [ 16.158756] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.159411] [ 16.159518] The buggy address belongs to the physical page: [ 16.159754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.160141] flags: 0x200000000000000(node=0|zone=2) [ 16.160323] page_type: f5(slab) [ 16.160447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.160779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.161199] page dumped because: kasan: bad access detected [ 16.161449] [ 16.161521] Memory state around the buggy address: [ 16.161677] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.161897] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.162302] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.162625] ^ [ 16.162864] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.163451] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.163788] ================================================================== [ 16.221796] ================================================================== [ 16.222186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.222555] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.222835] [ 16.222947] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.223168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.223184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.223206] Call Trace: [ 16.223221] <TASK> [ 16.223235] dump_stack_lvl+0x73/0xb0 [ 16.223280] print_report+0xd1/0x610 [ 16.223303] ? __virt_addr_valid+0x1db/0x2d0 [ 16.223327] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.223350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.223374] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.223397] kasan_report+0x141/0x180 [ 16.223420] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.223448] kasan_check_range+0x10c/0x1c0 [ 16.223473] __kasan_check_write+0x18/0x20 [ 16.223494] kasan_atomics_helper+0x16e7/0x5450 [ 16.223517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.223542] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.223568] ? kasan_atomics+0x152/0x310 [ 16.223595] kasan_atomics+0x1dc/0x310 [ 16.223619] ? __pfx_kasan_atomics+0x10/0x10 [ 16.223644] ? __pfx_read_tsc+0x10/0x10 [ 16.223665] ? ktime_get_ts64+0x86/0x230 [ 16.223689] kunit_try_run_case+0x1a5/0x480 [ 16.223715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.223739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.223764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.223789] ? __kthread_parkme+0x82/0x180 [ 16.223812] ? preempt_count_sub+0x50/0x80 [ 16.223836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.223862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.223888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.223916] kthread+0x337/0x6f0 [ 16.223936] ? trace_preempt_on+0x20/0xc0 [ 16.223960] ? __pfx_kthread+0x10/0x10 [ 16.224004] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.224027] ? calculate_sigpending+0x7b/0xa0 [ 16.224053] ? __pfx_kthread+0x10/0x10 [ 16.224076] ret_from_fork+0x116/0x1d0 [ 16.224095] ? __pfx_kthread+0x10/0x10 [ 16.224117] ret_from_fork_asm+0x1a/0x30 [ 16.224149] </TASK> [ 16.224160] [ 16.233314] Allocated by task 282: [ 16.233507] kasan_save_stack+0x45/0x70 [ 16.233720] kasan_save_track+0x18/0x40 [ 16.233894] kasan_save_alloc_info+0x3b/0x50 [ 16.234084] __kasan_kmalloc+0xb7/0xc0 [ 16.235190] __kmalloc_cache_noprof+0x189/0x420 [ 16.235433] kasan_atomics+0x95/0x310 [ 16.235744] kunit_try_run_case+0x1a5/0x480 [ 16.235943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.236397] kthread+0x337/0x6f0 [ 16.236583] ret_from_fork+0x116/0x1d0 [ 16.236920] ret_from_fork_asm+0x1a/0x30 [ 16.237300] [ 16.237555] The buggy address belongs to the object at ffff888102a0a600 [ 16.237555] which belongs to the cache kmalloc-64 of size 64 [ 16.238287] The buggy address is located 0 bytes to the right of [ 16.238287] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.239216] [ 16.239320] The buggy address belongs to the physical page: [ 16.239733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.240274] flags: 0x200000000000000(node=0|zone=2) [ 16.240606] page_type: f5(slab) [ 16.240863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.241336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.241746] page dumped because: kasan: bad access detected [ 16.242183] [ 16.242409] Memory state around the buggy address: [ 16.242658] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.243273] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.243696] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.244221] ^ [ 16.244569] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245055] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245473] ================================================================== [ 16.050687] ================================================================== [ 16.051237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 16.051599] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.051892] [ 16.052115] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.052160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.052172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.052194] Call Trace: [ 16.052209] <TASK> [ 16.052224] dump_stack_lvl+0x73/0xb0 [ 16.052252] print_report+0xd1/0x610 [ 16.052286] ? __virt_addr_valid+0x1db/0x2d0 [ 16.052311] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.052334] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.052358] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.052381] kasan_report+0x141/0x180 [ 16.052404] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.052431] kasan_check_range+0x10c/0x1c0 [ 16.052456] __kasan_check_write+0x18/0x20 [ 16.052476] kasan_atomics_helper+0x12e6/0x5450 [ 16.052500] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.052524] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.052551] ? kasan_atomics+0x152/0x310 [ 16.052578] kasan_atomics+0x1dc/0x310 [ 16.052601] ? __pfx_kasan_atomics+0x10/0x10 [ 16.052627] ? __pfx_read_tsc+0x10/0x10 [ 16.052648] ? ktime_get_ts64+0x86/0x230 [ 16.052673] kunit_try_run_case+0x1a5/0x480 [ 16.052698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.052723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.052747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.052772] ? __kthread_parkme+0x82/0x180 [ 16.052794] ? preempt_count_sub+0x50/0x80 [ 16.052818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.052846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.052872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.052898] kthread+0x337/0x6f0 [ 16.052918] ? trace_preempt_on+0x20/0xc0 [ 16.052942] ? __pfx_kthread+0x10/0x10 [ 16.053035] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.053064] ? calculate_sigpending+0x7b/0xa0 [ 16.053089] ? __pfx_kthread+0x10/0x10 [ 16.053111] ret_from_fork+0x116/0x1d0 [ 16.053131] ? __pfx_kthread+0x10/0x10 [ 16.053153] ret_from_fork_asm+0x1a/0x30 [ 16.053185] </TASK> [ 16.053196] [ 16.061328] Allocated by task 282: [ 16.061521] kasan_save_stack+0x45/0x70 [ 16.061723] kasan_save_track+0x18/0x40 [ 16.061898] kasan_save_alloc_info+0x3b/0x50 [ 16.062188] __kasan_kmalloc+0xb7/0xc0 [ 16.062380] __kmalloc_cache_noprof+0x189/0x420 [ 16.062584] kasan_atomics+0x95/0x310 [ 16.062764] kunit_try_run_case+0x1a5/0x480 [ 16.062956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.063368] kthread+0x337/0x6f0 [ 16.063539] ret_from_fork+0x116/0x1d0 [ 16.063723] ret_from_fork_asm+0x1a/0x30 [ 16.063886] [ 16.063959] The buggy address belongs to the object at ffff888102a0a600 [ 16.063959] which belongs to the cache kmalloc-64 of size 64 [ 16.064432] The buggy address is located 0 bytes to the right of [ 16.064432] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.065057] [ 16.065155] The buggy address belongs to the physical page: [ 16.065415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.065744] flags: 0x200000000000000(node=0|zone=2) [ 16.065908] page_type: f5(slab) [ 16.066134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.066502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.066840] page dumped because: kasan: bad access detected [ 16.067277] [ 16.067379] Memory state around the buggy address: [ 16.067591] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.067879] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.068259] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.068567] ^ [ 16.068766] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.069159] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.069437] ================================================================== [ 16.576307] ================================================================== [ 16.576537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.576803] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.577174] [ 16.577288] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.577348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.577361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.577381] Call Trace: [ 16.577396] <TASK> [ 16.577410] dump_stack_lvl+0x73/0xb0 [ 16.577437] print_report+0xd1/0x610 [ 16.577460] ? __virt_addr_valid+0x1db/0x2d0 [ 16.577483] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.577505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.577548] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.577572] kasan_report+0x141/0x180 [ 16.577594] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.577637] __asan_report_load8_noabort+0x18/0x20 [ 16.577663] kasan_atomics_helper+0x4f98/0x5450 [ 16.577687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.577712] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.577738] ? kasan_atomics+0x152/0x310 [ 16.577765] kasan_atomics+0x1dc/0x310 [ 16.577806] ? __pfx_kasan_atomics+0x10/0x10 [ 16.577832] ? __pfx_read_tsc+0x10/0x10 [ 16.577854] ? ktime_get_ts64+0x86/0x230 [ 16.577878] kunit_try_run_case+0x1a5/0x480 [ 16.577904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.577928] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.577953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.577978] ? __kthread_parkme+0x82/0x180 [ 16.577999] ? preempt_count_sub+0x50/0x80 [ 16.578040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.578080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.578119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.578159] kthread+0x337/0x6f0 [ 16.578191] ? trace_preempt_on+0x20/0xc0 [ 16.578228] ? __pfx_kthread+0x10/0x10 [ 16.578272] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.578295] ? calculate_sigpending+0x7b/0xa0 [ 16.578321] ? __pfx_kthread+0x10/0x10 [ 16.578343] ret_from_fork+0x116/0x1d0 [ 16.578363] ? __pfx_kthread+0x10/0x10 [ 16.578385] ret_from_fork_asm+0x1a/0x30 [ 16.578418] </TASK> [ 16.578429] [ 16.585822] Allocated by task 282: [ 16.585955] kasan_save_stack+0x45/0x70 [ 16.586094] kasan_save_track+0x18/0x40 [ 16.586311] kasan_save_alloc_info+0x3b/0x50 [ 16.586523] __kasan_kmalloc+0xb7/0xc0 [ 16.586719] __kmalloc_cache_noprof+0x189/0x420 [ 16.586916] kasan_atomics+0x95/0x310 [ 16.587095] kunit_try_run_case+0x1a5/0x480 [ 16.587292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.587516] kthread+0x337/0x6f0 [ 16.587689] ret_from_fork+0x116/0x1d0 [ 16.587874] ret_from_fork_asm+0x1a/0x30 [ 16.588087] [ 16.588161] The buggy address belongs to the object at ffff888102a0a600 [ 16.588161] which belongs to the cache kmalloc-64 of size 64 [ 16.588683] The buggy address is located 0 bytes to the right of [ 16.588683] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.589325] [ 16.589422] The buggy address belongs to the physical page: [ 16.589690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.590032] flags: 0x200000000000000(node=0|zone=2) [ 16.590258] page_type: f5(slab) [ 16.590430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.590770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.591094] page dumped because: kasan: bad access detected [ 16.591342] [ 16.591435] Memory state around the buggy address: [ 16.591652] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.591904] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.592114] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.592327] ^ [ 16.592525] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.593798] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.594421] ================================================================== [ 15.742763] ================================================================== [ 15.743622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.743917] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.744202] [ 15.744323] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.744370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.744384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.744406] Call Trace: [ 15.744423] <TASK> [ 15.744439] dump_stack_lvl+0x73/0xb0 [ 15.744467] print_report+0xd1/0x610 [ 15.744491] ? __virt_addr_valid+0x1db/0x2d0 [ 15.744515] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.744538] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.744563] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.744587] kasan_report+0x141/0x180 [ 15.744610] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.744638] kasan_check_range+0x10c/0x1c0 [ 15.744662] __kasan_check_write+0x18/0x20 [ 15.744683] kasan_atomics_helper+0xb6a/0x5450 [ 15.744707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.744732] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.744758] ? kasan_atomics+0x152/0x310 [ 15.744785] kasan_atomics+0x1dc/0x310 [ 15.744904] ? __pfx_kasan_atomics+0x10/0x10 [ 15.744936] ? __pfx_read_tsc+0x10/0x10 [ 15.744960] ? ktime_get_ts64+0x86/0x230 [ 15.745036] kunit_try_run_case+0x1a5/0x480 [ 15.745063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.745088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.745113] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.745138] ? __kthread_parkme+0x82/0x180 [ 15.745160] ? preempt_count_sub+0x50/0x80 [ 15.745186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.745211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.745237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.745285] kthread+0x337/0x6f0 [ 15.745305] ? trace_preempt_on+0x20/0xc0 [ 15.745330] ? __pfx_kthread+0x10/0x10 [ 15.745352] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.745375] ? calculate_sigpending+0x7b/0xa0 [ 15.745401] ? __pfx_kthread+0x10/0x10 [ 15.745423] ret_from_fork+0x116/0x1d0 [ 15.745443] ? __pfx_kthread+0x10/0x10 [ 15.745466] ret_from_fork_asm+0x1a/0x30 [ 15.745497] </TASK> [ 15.745509] [ 15.754350] Allocated by task 282: [ 15.754538] kasan_save_stack+0x45/0x70 [ 15.754750] kasan_save_track+0x18/0x40 [ 15.754949] kasan_save_alloc_info+0x3b/0x50 [ 15.755244] __kasan_kmalloc+0xb7/0xc0 [ 15.755409] __kmalloc_cache_noprof+0x189/0x420 [ 15.755570] kasan_atomics+0x95/0x310 [ 15.755751] kunit_try_run_case+0x1a5/0x480 [ 15.755959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.756286] kthread+0x337/0x6f0 [ 15.756461] ret_from_fork+0x116/0x1d0 [ 15.756605] ret_from_fork_asm+0x1a/0x30 [ 15.756748] [ 15.756820] The buggy address belongs to the object at ffff888102a0a600 [ 15.756820] which belongs to the cache kmalloc-64 of size 64 [ 15.757349] The buggy address is located 0 bytes to the right of [ 15.757349] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.758172] [ 15.758299] The buggy address belongs to the physical page: [ 15.758483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.758731] flags: 0x200000000000000(node=0|zone=2) [ 15.758897] page_type: f5(slab) [ 15.759047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.759402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.759745] page dumped because: kasan: bad access detected [ 15.760007] [ 15.760102] Memory state around the buggy address: [ 15.760527] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.760854] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.761196] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.761458] ^ [ 15.761685] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.762076] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.762388] ================================================================== [ 16.377994] ================================================================== [ 16.378351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.378685] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.379016] [ 16.379199] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.379241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.379253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.379286] Call Trace: [ 16.379301] <TASK> [ 16.379316] dump_stack_lvl+0x73/0xb0 [ 16.379343] print_report+0xd1/0x610 [ 16.379366] ? __virt_addr_valid+0x1db/0x2d0 [ 16.379390] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.379413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.379439] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.379462] kasan_report+0x141/0x180 [ 16.379485] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.379513] kasan_check_range+0x10c/0x1c0 [ 16.379538] __kasan_check_write+0x18/0x20 [ 16.379559] kasan_atomics_helper+0x1b22/0x5450 [ 16.379584] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.379608] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.379634] ? kasan_atomics+0x152/0x310 [ 16.379661] kasan_atomics+0x1dc/0x310 [ 16.379684] ? __pfx_kasan_atomics+0x10/0x10 [ 16.379709] ? __pfx_read_tsc+0x10/0x10 [ 16.379732] ? ktime_get_ts64+0x86/0x230 [ 16.379756] kunit_try_run_case+0x1a5/0x480 [ 16.379783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.379807] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.379832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.379858] ? __kthread_parkme+0x82/0x180 [ 16.379879] ? preempt_count_sub+0x50/0x80 [ 16.379903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.379928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.379955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.379982] kthread+0x337/0x6f0 [ 16.380002] ? trace_preempt_on+0x20/0xc0 [ 16.380026] ? __pfx_kthread+0x10/0x10 [ 16.380048] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.380070] ? calculate_sigpending+0x7b/0xa0 [ 16.380096] ? __pfx_kthread+0x10/0x10 [ 16.380119] ret_from_fork+0x116/0x1d0 [ 16.380138] ? __pfx_kthread+0x10/0x10 [ 16.380160] ret_from_fork_asm+0x1a/0x30 [ 16.380191] </TASK> [ 16.380202] [ 16.387368] Allocated by task 282: [ 16.387491] kasan_save_stack+0x45/0x70 [ 16.387634] kasan_save_track+0x18/0x40 [ 16.387780] kasan_save_alloc_info+0x3b/0x50 [ 16.387994] __kasan_kmalloc+0xb7/0xc0 [ 16.388179] __kmalloc_cache_noprof+0x189/0x420 [ 16.388407] kasan_atomics+0x95/0x310 [ 16.388594] kunit_try_run_case+0x1a5/0x480 [ 16.388832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.389105] kthread+0x337/0x6f0 [ 16.389252] ret_from_fork+0x116/0x1d0 [ 16.389435] ret_from_fork_asm+0x1a/0x30 [ 16.389574] [ 16.389644] The buggy address belongs to the object at ffff888102a0a600 [ 16.389644] which belongs to the cache kmalloc-64 of size 64 [ 16.390169] The buggy address is located 0 bytes to the right of [ 16.390169] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.390652] [ 16.390737] The buggy address belongs to the physical page: [ 16.390976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.391270] flags: 0x200000000000000(node=0|zone=2) [ 16.391468] page_type: f5(slab) [ 16.391634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.391916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.392221] page dumped because: kasan: bad access detected [ 16.392417] [ 16.392511] Memory state around the buggy address: [ 16.392729] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.392939] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.393151] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.393421] ^ [ 16.393640] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.393949] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.394257] ================================================================== [ 15.562553] ================================================================== [ 15.562793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.563126] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.563467] [ 15.563573] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.563613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.563626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.563648] Call Trace: [ 15.563661] <TASK> [ 15.563676] dump_stack_lvl+0x73/0xb0 [ 15.563704] print_report+0xd1/0x610 [ 15.563726] ? __virt_addr_valid+0x1db/0x2d0 [ 15.563750] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.563773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.563797] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.563822] kasan_report+0x141/0x180 [ 15.563845] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.563872] kasan_check_range+0x10c/0x1c0 [ 15.563897] __kasan_check_write+0x18/0x20 [ 15.563918] kasan_atomics_helper+0x5fe/0x5450 [ 15.563943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.563967] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.563993] ? kasan_atomics+0x152/0x310 [ 15.564020] kasan_atomics+0x1dc/0x310 [ 15.564044] ? __pfx_kasan_atomics+0x10/0x10 [ 15.564070] ? __pfx_read_tsc+0x10/0x10 [ 15.564091] ? ktime_get_ts64+0x86/0x230 [ 15.564116] kunit_try_run_case+0x1a5/0x480 [ 15.564141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.564166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.564190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.564215] ? __kthread_parkme+0x82/0x180 [ 15.564237] ? preempt_count_sub+0x50/0x80 [ 15.564271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.564297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.564323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.564351] kthread+0x337/0x6f0 [ 15.564370] ? trace_preempt_on+0x20/0xc0 [ 15.564393] ? __pfx_kthread+0x10/0x10 [ 15.564415] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.564437] ? calculate_sigpending+0x7b/0xa0 [ 15.564462] ? __pfx_kthread+0x10/0x10 [ 15.564485] ret_from_fork+0x116/0x1d0 [ 15.564504] ? __pfx_kthread+0x10/0x10 [ 15.564527] ret_from_fork_asm+0x1a/0x30 [ 15.564558] </TASK> [ 15.564569] [ 15.572444] Allocated by task 282: [ 15.572600] kasan_save_stack+0x45/0x70 [ 15.572783] kasan_save_track+0x18/0x40 [ 15.572920] kasan_save_alloc_info+0x3b/0x50 [ 15.573072] __kasan_kmalloc+0xb7/0xc0 [ 15.573206] __kmalloc_cache_noprof+0x189/0x420 [ 15.573572] kasan_atomics+0x95/0x310 [ 15.573770] kunit_try_run_case+0x1a5/0x480 [ 15.573976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.574425] kthread+0x337/0x6f0 [ 15.574597] ret_from_fork+0x116/0x1d0 [ 15.574770] ret_from_fork_asm+0x1a/0x30 [ 15.574912] [ 15.575033] The buggy address belongs to the object at ffff888102a0a600 [ 15.575033] which belongs to the cache kmalloc-64 of size 64 [ 15.575595] The buggy address is located 0 bytes to the right of [ 15.575595] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.576145] [ 15.576248] The buggy address belongs to the physical page: [ 15.576487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.576812] flags: 0x200000000000000(node=0|zone=2) [ 15.577146] page_type: f5(slab) [ 15.577349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.577665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.577978] page dumped because: kasan: bad access detected [ 15.578921] [ 15.579091] Memory state around the buggy address: [ 15.579311] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.579608] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.579897] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.581610] ^ [ 15.581847] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.582175] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.582499] ================================================================== [ 15.621531] ================================================================== [ 15.621921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.622156] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 15.622514] [ 15.622619] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.622659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.622673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.622694] Call Trace: [ 15.622715] <TASK> [ 15.622730] dump_stack_lvl+0x73/0xb0 [ 15.622757] print_report+0xd1/0x610 [ 15.622780] ? __virt_addr_valid+0x1db/0x2d0 [ 15.622805] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.622828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.622853] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.622877] kasan_report+0x141/0x180 [ 15.622900] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.622928] kasan_check_range+0x10c/0x1c0 [ 15.622953] __kasan_check_write+0x18/0x20 [ 15.622974] kasan_atomics_helper+0x7c7/0x5450 [ 15.622998] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.623023] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.623049] ? kasan_atomics+0x152/0x310 [ 15.623077] kasan_atomics+0x1dc/0x310 [ 15.623101] ? __pfx_kasan_atomics+0x10/0x10 [ 15.623127] ? __pfx_read_tsc+0x10/0x10 [ 15.623149] ? ktime_get_ts64+0x86/0x230 [ 15.623174] kunit_try_run_case+0x1a5/0x480 [ 15.623200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.623225] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.623250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.623285] ? __kthread_parkme+0x82/0x180 [ 15.623307] ? preempt_count_sub+0x50/0x80 [ 15.623332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.623358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.623383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.623410] kthread+0x337/0x6f0 [ 15.623429] ? trace_preempt_on+0x20/0xc0 [ 15.623454] ? __pfx_kthread+0x10/0x10 [ 15.623475] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.623498] ? calculate_sigpending+0x7b/0xa0 [ 15.623522] ? __pfx_kthread+0x10/0x10 [ 15.623545] ret_from_fork+0x116/0x1d0 [ 15.623565] ? __pfx_kthread+0x10/0x10 [ 15.623587] ret_from_fork_asm+0x1a/0x30 [ 15.623619] </TASK> [ 15.623629] [ 15.631438] Allocated by task 282: [ 15.631616] kasan_save_stack+0x45/0x70 [ 15.632004] kasan_save_track+0x18/0x40 [ 15.632341] kasan_save_alloc_info+0x3b/0x50 [ 15.632533] __kasan_kmalloc+0xb7/0xc0 [ 15.632716] __kmalloc_cache_noprof+0x189/0x420 [ 15.632911] kasan_atomics+0x95/0x310 [ 15.633046] kunit_try_run_case+0x1a5/0x480 [ 15.633226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.633491] kthread+0x337/0x6f0 [ 15.633662] ret_from_fork+0x116/0x1d0 [ 15.633852] ret_from_fork_asm+0x1a/0x30 [ 15.634053] [ 15.634133] The buggy address belongs to the object at ffff888102a0a600 [ 15.634133] which belongs to the cache kmalloc-64 of size 64 [ 15.634505] The buggy address is located 0 bytes to the right of [ 15.634505] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 15.634965] [ 15.635063] The buggy address belongs to the physical page: [ 15.635530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 15.635944] flags: 0x200000000000000(node=0|zone=2) [ 15.636383] page_type: f5(slab) [ 15.636557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.636897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.637307] page dumped because: kasan: bad access detected [ 15.637513] [ 15.637614] Memory state around the buggy address: [ 15.637785] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.638012] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.638335] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.638669] ^ [ 15.638829] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.639046] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640301] ================================================================== [ 16.107564] ================================================================== [ 16.107901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 16.108354] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282 [ 16.108666] [ 16.108764] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.108806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.108818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.108839] Call Trace: [ 16.108852] <TASK> [ 16.108867] dump_stack_lvl+0x73/0xb0 [ 16.108895] print_report+0xd1/0x610 [ 16.108918] ? __virt_addr_valid+0x1db/0x2d0 [ 16.108941] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.109038] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.109068] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.109092] kasan_report+0x141/0x180 [ 16.109116] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.109143] __asan_report_load8_noabort+0x18/0x20 [ 16.109169] kasan_atomics_helper+0x4eae/0x5450 [ 16.109194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.109218] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.109244] ? kasan_atomics+0x152/0x310 [ 16.109282] kasan_atomics+0x1dc/0x310 [ 16.109304] ? __pfx_kasan_atomics+0x10/0x10 [ 16.109330] ? __pfx_read_tsc+0x10/0x10 [ 16.109352] ? ktime_get_ts64+0x86/0x230 [ 16.109377] kunit_try_run_case+0x1a5/0x480 [ 16.109403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.109427] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.109452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.109477] ? __kthread_parkme+0x82/0x180 [ 16.109499] ? preempt_count_sub+0x50/0x80 [ 16.109522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.109549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.109574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.109601] kthread+0x337/0x6f0 [ 16.109621] ? trace_preempt_on+0x20/0xc0 [ 16.109643] ? __pfx_kthread+0x10/0x10 [ 16.109664] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.109688] ? calculate_sigpending+0x7b/0xa0 [ 16.109714] ? __pfx_kthread+0x10/0x10 [ 16.109736] ret_from_fork+0x116/0x1d0 [ 16.109755] ? __pfx_kthread+0x10/0x10 [ 16.109779] ret_from_fork_asm+0x1a/0x30 [ 16.109811] </TASK> [ 16.109822] [ 16.117831] Allocated by task 282: [ 16.118120] kasan_save_stack+0x45/0x70 [ 16.118339] kasan_save_track+0x18/0x40 [ 16.118497] kasan_save_alloc_info+0x3b/0x50 [ 16.118649] __kasan_kmalloc+0xb7/0xc0 [ 16.118815] __kmalloc_cache_noprof+0x189/0x420 [ 16.119223] kasan_atomics+0x95/0x310 [ 16.119417] kunit_try_run_case+0x1a5/0x480 [ 16.119610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.119837] kthread+0x337/0x6f0 [ 16.120091] ret_from_fork+0x116/0x1d0 [ 16.120233] ret_from_fork_asm+0x1a/0x30 [ 16.120387] [ 16.120486] The buggy address belongs to the object at ffff888102a0a600 [ 16.120486] which belongs to the cache kmalloc-64 of size 64 [ 16.121082] The buggy address is located 0 bytes to the right of [ 16.121082] allocated 48-byte region [ffff888102a0a600, ffff888102a0a630) [ 16.121493] [ 16.121594] The buggy address belongs to the physical page: [ 16.121847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a [ 16.122305] flags: 0x200000000000000(node=0|zone=2) [ 16.122526] page_type: f5(slab) [ 16.122683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.123229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.123479] page dumped because: kasan: bad access detected [ 16.123727] [ 16.123821] Memory state around the buggy address: [ 16.124168] ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.124489] ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.124746] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.125075] ^ [ 16.125314] ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.125636] ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.125924] ==================================================================