Date
July 8, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.007909] ================================================================== [ 22.007972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 22.008060] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.008426] [ 22.008519] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.008649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.008712] Hardware name: linux,dummy-virt (DT) [ 22.008749] Call trace: [ 22.008818] show_stack+0x20/0x38 (C) [ 22.008879] dump_stack_lvl+0x8c/0xd0 [ 22.009078] print_report+0x118/0x608 [ 22.009146] kasan_report+0xdc/0x128 [ 22.009207] kasan_check_range+0x100/0x1a8 [ 22.009264] __kasan_check_write+0x20/0x30 [ 22.009310] kasan_atomics_helper+0x1058/0x4858 [ 22.009544] kasan_atomics+0x198/0x2e0 [ 22.009919] kunit_try_run_case+0x170/0x3f0 [ 22.010113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.010212] kthread+0x328/0x630 [ 22.010297] ret_from_fork+0x10/0x20 [ 22.010395] [ 22.010454] Allocated by task 265: [ 22.010487] kasan_save_stack+0x3c/0x68 [ 22.010530] kasan_save_track+0x20/0x40 [ 22.010743] kasan_save_alloc_info+0x40/0x58 [ 22.010856] __kasan_kmalloc+0xd4/0xd8 [ 22.010907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.010983] kasan_atomics+0xb8/0x2e0 [ 22.011181] kunit_try_run_case+0x170/0x3f0 [ 22.011365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.011419] kthread+0x328/0x630 [ 22.011461] ret_from_fork+0x10/0x20 [ 22.011527] [ 22.011598] The buggy address belongs to the object at fff00000c63cef80 [ 22.011598] which belongs to the cache kmalloc-64 of size 64 [ 22.011785] The buggy address is located 0 bytes to the right of [ 22.011785] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.011934] [ 22.012014] The buggy address belongs to the physical page: [ 22.012215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.012287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.012518] page_type: f5(slab) [ 22.012685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.012760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.012812] page dumped because: kasan: bad access detected [ 22.012883] [ 22.012914] Memory state around the buggy address: [ 22.012950] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.012997] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.013042] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.013084] ^ [ 22.013129] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.013185] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.013234] ================================================================== [ 21.937530] ================================================================== [ 21.937581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.937632] Read of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.937686] [ 21.937718] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.938331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.938375] Hardware name: linux,dummy-virt (DT) [ 21.938407] Call trace: [ 21.938686] show_stack+0x20/0x38 (C) [ 21.938802] dump_stack_lvl+0x8c/0xd0 [ 21.938993] print_report+0x118/0x608 [ 21.939042] kasan_report+0xdc/0x128 [ 21.939280] __asan_report_load4_noabort+0x20/0x30 [ 21.939426] kasan_atomics_helper+0x3e04/0x4858 [ 21.939475] kasan_atomics+0x198/0x2e0 [ 21.939536] kunit_try_run_case+0x170/0x3f0 [ 21.939693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.939899] kthread+0x328/0x630 [ 21.940030] ret_from_fork+0x10/0x20 [ 21.940124] [ 21.940486] Allocated by task 265: [ 21.940525] kasan_save_stack+0x3c/0x68 [ 21.940573] kasan_save_track+0x20/0x40 [ 21.940613] kasan_save_alloc_info+0x40/0x58 [ 21.940656] __kasan_kmalloc+0xd4/0xd8 [ 21.940693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.940931] kasan_atomics+0xb8/0x2e0 [ 21.941050] kunit_try_run_case+0x170/0x3f0 [ 21.941097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.941143] kthread+0x328/0x630 [ 21.941192] ret_from_fork+0x10/0x20 [ 21.941231] [ 21.941329] The buggy address belongs to the object at fff00000c63cef80 [ 21.941329] which belongs to the cache kmalloc-64 of size 64 [ 21.941419] The buggy address is located 0 bytes to the right of [ 21.941419] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.941853] [ 21.941909] The buggy address belongs to the physical page: [ 21.941946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.942005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.942056] page_type: f5(slab) [ 21.942108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.942173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.942274] page dumped because: kasan: bad access detected [ 21.942681] [ 21.942993] Memory state around the buggy address: [ 21.943032] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.943109] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.943241] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.943318] ^ [ 21.943355] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.943465] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.943793] ================================================================== [ 22.050995] ================================================================== [ 22.051045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.051247] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.051374] [ 22.051408] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.051518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.051547] Hardware name: linux,dummy-virt (DT) [ 22.051580] Call trace: [ 22.051820] show_stack+0x20/0x38 (C) [ 22.051973] dump_stack_lvl+0x8c/0xd0 [ 22.052080] print_report+0x118/0x608 [ 22.052226] kasan_report+0xdc/0x128 [ 22.052341] kasan_check_range+0x100/0x1a8 [ 22.052426] __kasan_check_write+0x20/0x30 [ 22.052530] kasan_atomics_helper+0x12d8/0x4858 [ 22.052599] kasan_atomics+0x198/0x2e0 [ 22.052647] kunit_try_run_case+0x170/0x3f0 [ 22.052697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.052778] kthread+0x328/0x630 [ 22.052926] ret_from_fork+0x10/0x20 [ 22.053051] [ 22.053178] Allocated by task 265: [ 22.053242] kasan_save_stack+0x3c/0x68 [ 22.053324] kasan_save_track+0x20/0x40 [ 22.053401] kasan_save_alloc_info+0x40/0x58 [ 22.053489] __kasan_kmalloc+0xd4/0xd8 [ 22.053538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.053580] kasan_atomics+0xb8/0x2e0 [ 22.053833] kunit_try_run_case+0x170/0x3f0 [ 22.053919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.054003] kthread+0x328/0x630 [ 22.054100] ret_from_fork+0x10/0x20 [ 22.054272] [ 22.054397] The buggy address belongs to the object at fff00000c63cef80 [ 22.054397] which belongs to the cache kmalloc-64 of size 64 [ 22.054536] The buggy address is located 0 bytes to the right of [ 22.054536] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.054605] [ 22.054629] The buggy address belongs to the physical page: [ 22.054897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.055050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.055170] page_type: f5(slab) [ 22.055438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.055593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.055662] page dumped because: kasan: bad access detected [ 22.055768] [ 22.055892] Memory state around the buggy address: [ 22.055946] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.056007] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.056053] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.056095] ^ [ 22.056531] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.056683] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.057026] ================================================================== [ 21.957587] ================================================================== [ 21.957830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.957889] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.958077] [ 21.958108] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.958222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.958249] Hardware name: linux,dummy-virt (DT) [ 21.958282] Call trace: [ 21.958305] show_stack+0x20/0x38 (C) [ 21.958354] dump_stack_lvl+0x8c/0xd0 [ 21.958963] print_report+0x118/0x608 [ 21.959021] kasan_report+0xdc/0x128 [ 21.959244] kasan_check_range+0x100/0x1a8 [ 21.959303] __kasan_check_write+0x20/0x30 [ 21.959408] kasan_atomics_helper+0xe44/0x4858 [ 21.959673] kasan_atomics+0x198/0x2e0 [ 21.959903] kunit_try_run_case+0x170/0x3f0 [ 21.960076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.960143] kthread+0x328/0x630 [ 21.960276] ret_from_fork+0x10/0x20 [ 21.960324] [ 21.960345] Allocated by task 265: [ 21.960375] kasan_save_stack+0x3c/0x68 [ 21.960417] kasan_save_track+0x20/0x40 [ 21.960557] kasan_save_alloc_info+0x40/0x58 [ 21.960615] __kasan_kmalloc+0xd4/0xd8 [ 21.960654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.960748] kasan_atomics+0xb8/0x2e0 [ 21.960788] kunit_try_run_case+0x170/0x3f0 [ 21.960828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.960914] kthread+0x328/0x630 [ 21.961088] ret_from_fork+0x10/0x20 [ 21.961225] [ 21.961249] The buggy address belongs to the object at fff00000c63cef80 [ 21.961249] which belongs to the cache kmalloc-64 of size 64 [ 21.961450] The buggy address is located 0 bytes to the right of [ 21.961450] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.961529] [ 21.961594] The buggy address belongs to the physical page: [ 21.961712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.961794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.961878] page_type: f5(slab) [ 21.961958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.962136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.962756] page dumped because: kasan: bad access detected [ 21.962804] [ 21.962847] Memory state around the buggy address: [ 21.962883] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.962937] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.963152] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.963358] ^ [ 21.963398] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.963682] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.963880] ================================================================== [ 22.030413] ================================================================== [ 22.030464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.030513] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.030565] [ 22.030597] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.030679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.030732] Hardware name: linux,dummy-virt (DT) [ 22.030775] Call trace: [ 22.030798] show_stack+0x20/0x38 (C) [ 22.030847] dump_stack_lvl+0x8c/0xd0 [ 22.030905] print_report+0x118/0x608 [ 22.030954] kasan_report+0xdc/0x128 [ 22.031014] kasan_check_range+0x100/0x1a8 [ 22.031072] __kasan_check_write+0x20/0x30 [ 22.031118] kasan_atomics_helper+0x1190/0x4858 [ 22.031983] kasan_atomics+0x198/0x2e0 [ 22.032095] kunit_try_run_case+0x170/0x3f0 [ 22.032484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.032561] kthread+0x328/0x630 [ 22.032710] ret_from_fork+0x10/0x20 [ 22.032958] [ 22.033366] Allocated by task 265: [ 22.033998] kasan_save_stack+0x3c/0x68 [ 22.036437] kasan_save_track+0x20/0x40 [ 22.036495] kasan_save_alloc_info+0x40/0x58 [ 22.036538] __kasan_kmalloc+0xd4/0xd8 [ 22.036579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.036622] kasan_atomics+0xb8/0x2e0 [ 22.036661] kunit_try_run_case+0x170/0x3f0 [ 22.036702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.036751] kthread+0x328/0x630 [ 22.036786] ret_from_fork+0x10/0x20 [ 22.036825] [ 22.036847] The buggy address belongs to the object at fff00000c63cef80 [ 22.036847] which belongs to the cache kmalloc-64 of size 64 [ 22.036909] The buggy address is located 0 bytes to the right of [ 22.036909] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.036979] [ 22.037003] The buggy address belongs to the physical page: [ 22.037037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.037093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.037143] page_type: f5(slab) [ 22.037198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.037252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.037295] page dumped because: kasan: bad access detected [ 22.037329] [ 22.037350] Memory state around the buggy address: [ 22.037384] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.037429] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.038812] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.039270] ^ [ 22.039546] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.039593] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.039635] ================================================================== [ 21.856016] ================================================================== [ 21.856095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.856242] Read of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.856303] [ 21.856333] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.856452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.856481] Hardware name: linux,dummy-virt (DT) [ 21.856549] Call trace: [ 21.856574] show_stack+0x20/0x38 (C) [ 21.856636] dump_stack_lvl+0x8c/0xd0 [ 21.856691] print_report+0x118/0x608 [ 21.856768] kasan_report+0xdc/0x128 [ 21.856826] __asan_report_load4_noabort+0x20/0x30 [ 21.856878] kasan_atomics_helper+0x42d8/0x4858 [ 21.856933] kasan_atomics+0x198/0x2e0 [ 21.856980] kunit_try_run_case+0x170/0x3f0 [ 21.857444] kasan_save_stack+0x3c/0x68 [ 21.857671] __kasan_kmalloc+0xd4/0xd8 [ 21.857756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.857798] kasan_atomics+0xb8/0x2e0 [ 21.857835] kunit_try_run_case+0x170/0x3f0 [ 21.857994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.858147] kthread+0x328/0x630 [ 21.858281] ret_from_fork+0x10/0x20 [ 21.858388] [ 21.858438] The buggy address belongs to the object at fff00000c63cef80 [ 21.858438] which belongs to the cache kmalloc-64 of size 64 [ 21.858593] [ 21.858652] The buggy address belongs to the physical page: [ 21.858741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.859267] [ 21.859350] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.860772] ================================================================== [ 22.098365] ================================================================== [ 22.098448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.098501] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.098572] [ 22.098818] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.098945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.098982] Hardware name: linux,dummy-virt (DT) [ 22.099017] Call trace: [ 22.099074] show_stack+0x20/0x38 (C) [ 22.099127] dump_stack_lvl+0x8c/0xd0 [ 22.099254] print_report+0x118/0x608 [ 22.099330] kasan_report+0xdc/0x128 [ 22.099382] kasan_check_range+0x100/0x1a8 [ 22.099433] __kasan_check_write+0x20/0x30 [ 22.099478] kasan_atomics_helper+0x15b4/0x4858 [ 22.099527] kasan_atomics+0x198/0x2e0 [ 22.099584] kunit_try_run_case+0x170/0x3f0 [ 22.099634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.099815] kthread+0x328/0x630 [ 22.099928] ret_from_fork+0x10/0x20 [ 22.100017] [ 22.100048] Allocated by task 265: [ 22.100126] kasan_save_stack+0x3c/0x68 [ 22.100456] kasan_save_track+0x20/0x40 [ 22.100556] kasan_save_alloc_info+0x40/0x58 [ 22.100640] __kasan_kmalloc+0xd4/0xd8 [ 22.100681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.100749] kasan_atomics+0xb8/0x2e0 [ 22.100789] kunit_try_run_case+0x170/0x3f0 [ 22.100837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.100883] kthread+0x328/0x630 [ 22.100917] ret_from_fork+0x10/0x20 [ 22.100956] [ 22.100979] The buggy address belongs to the object at fff00000c63cef80 [ 22.100979] which belongs to the cache kmalloc-64 of size 64 [ 22.101050] The buggy address is located 0 bytes to the right of [ 22.101050] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.101133] [ 22.101177] The buggy address belongs to the physical page: [ 22.101222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.101278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.101346] page_type: f5(slab) [ 22.101415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.101469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.101527] page dumped because: kasan: bad access detected [ 22.101566] [ 22.101588] Memory state around the buggy address: [ 22.101621] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.101681] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.101732] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.101774] ^ [ 22.101816] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.101869] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.101907] ================================================================== [ 22.013507] ================================================================== [ 22.013558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.013620] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.013673] [ 22.013703] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.013784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.013823] Hardware name: linux,dummy-virt (DT) [ 22.013856] Call trace: [ 22.013879] show_stack+0x20/0x38 (C) [ 22.013929] dump_stack_lvl+0x8c/0xd0 [ 22.013975] print_report+0x118/0x608 [ 22.014023] kasan_report+0xdc/0x128 [ 22.014070] kasan_check_range+0x100/0x1a8 [ 22.014119] __kasan_check_write+0x20/0x30 [ 22.014595] kasan_atomics_helper+0x10c0/0x4858 [ 22.014983] kasan_atomics+0x198/0x2e0 [ 22.015042] kunit_try_run_case+0x170/0x3f0 [ 22.015093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.015252] kthread+0x328/0x630 [ 22.015304] ret_from_fork+0x10/0x20 [ 22.015393] [ 22.015450] Allocated by task 265: [ 22.015483] kasan_save_stack+0x3c/0x68 [ 22.016137] kasan_save_track+0x20/0x40 [ 22.016456] kasan_save_alloc_info+0x40/0x58 [ 22.016610] __kasan_kmalloc+0xd4/0xd8 [ 22.016794] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.016938] kasan_atomics+0xb8/0x2e0 [ 22.016984] kunit_try_run_case+0x170/0x3f0 [ 22.017048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.017101] kthread+0x328/0x630 [ 22.017265] ret_from_fork+0x10/0x20 [ 22.017531] [ 22.017575] The buggy address belongs to the object at fff00000c63cef80 [ 22.017575] which belongs to the cache kmalloc-64 of size 64 [ 22.017997] The buggy address is located 0 bytes to the right of [ 22.017997] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.018220] [ 22.018436] The buggy address belongs to the physical page: [ 22.018770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.018846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.019471] page_type: f5(slab) [ 22.019636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.019698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.019742] page dumped because: kasan: bad access detected [ 22.019959] [ 22.020470] Memory state around the buggy address: [ 22.020532] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.020582] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.020896] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.021035] ^ [ 22.021094] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.021334] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.021726] ================================================================== [ 21.878632] ================================================================== [ 21.878687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.878738] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.878788] [ 21.878820] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.878921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.878951] Hardware name: linux,dummy-virt (DT) [ 21.878984] Call trace: [ 21.879009] show_stack+0x20/0x38 (C) [ 21.879056] dump_stack_lvl+0x8c/0xd0 [ 21.879114] print_report+0x118/0x608 [ 21.879463] kasan_report+0xdc/0x128 [ 21.879740] kasan_check_range+0x100/0x1a8 [ 21.879818] __kasan_check_write+0x20/0x30 [ 21.879998] kasan_atomics_helper+0xa6c/0x4858 [ 21.880050] kasan_atomics+0x198/0x2e0 [ 21.880369] kunit_try_run_case+0x170/0x3f0 [ 21.880531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.880795] kthread+0x328/0x630 [ 21.880931] ret_from_fork+0x10/0x20 [ 21.881114] [ 21.881194] Allocated by task 265: [ 21.881225] kasan_save_stack+0x3c/0x68 [ 21.881269] kasan_save_track+0x20/0x40 [ 21.881529] kasan_save_alloc_info+0x40/0x58 [ 21.881651] __kasan_kmalloc+0xd4/0xd8 [ 21.881759] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.882021] kasan_atomics+0xb8/0x2e0 [ 21.882180] kunit_try_run_case+0x170/0x3f0 [ 21.882330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.882465] kthread+0x328/0x630 [ 21.882526] ret_from_fork+0x10/0x20 [ 21.882565] [ 21.882586] The buggy address belongs to the object at fff00000c63cef80 [ 21.882586] which belongs to the cache kmalloc-64 of size 64 [ 21.882856] The buggy address is located 0 bytes to the right of [ 21.882856] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.883037] [ 21.883145] The buggy address belongs to the physical page: [ 21.883523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.883603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.883828] page_type: f5(slab) [ 21.883898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.883949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.883991] page dumped because: kasan: bad access detected [ 21.884026] [ 21.884046] Memory state around the buggy address: [ 21.884078] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.884146] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.884203] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.884372] ^ [ 21.884486] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.884581] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.884675] ================================================================== [ 22.130744] ================================================================== [ 22.130793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.130860] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.130922] [ 22.130953] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.131034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.131063] Hardware name: linux,dummy-virt (DT) [ 22.131094] Call trace: [ 22.131116] show_stack+0x20/0x38 (C) [ 22.131179] dump_stack_lvl+0x8c/0xd0 [ 22.131228] print_report+0x118/0x608 [ 22.131277] kasan_report+0xdc/0x128 [ 22.131351] __asan_report_load8_noabort+0x20/0x30 [ 22.131402] kasan_atomics_helper+0x3e20/0x4858 [ 22.131771] kasan_atomics+0x198/0x2e0 [ 22.131841] kunit_try_run_case+0x170/0x3f0 [ 22.132083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.132245] kthread+0x328/0x630 [ 22.132341] ret_from_fork+0x10/0x20 [ 22.132460] [ 22.132548] Allocated by task 265: [ 22.132693] kasan_save_stack+0x3c/0x68 [ 22.132736] kasan_save_track+0x20/0x40 [ 22.132777] kasan_save_alloc_info+0x40/0x58 [ 22.132817] __kasan_kmalloc+0xd4/0xd8 [ 22.132857] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.133025] kasan_atomics+0xb8/0x2e0 [ 22.133065] kunit_try_run_case+0x170/0x3f0 [ 22.133175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.133266] kthread+0x328/0x630 [ 22.133304] ret_from_fork+0x10/0x20 [ 22.133380] [ 22.133459] The buggy address belongs to the object at fff00000c63cef80 [ 22.133459] which belongs to the cache kmalloc-64 of size 64 [ 22.133576] The buggy address is located 0 bytes to the right of [ 22.133576] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.133946] [ 22.134024] The buggy address belongs to the physical page: [ 22.134189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.134307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.134423] page_type: f5(slab) [ 22.134506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.134634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.134709] page dumped because: kasan: bad access detected [ 22.134744] [ 22.134764] Memory state around the buggy address: [ 22.134797] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.135214] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.135383] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.135466] ^ [ 22.135541] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.135926] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.136034] ================================================================== [ 21.964497] ================================================================== [ 21.964551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.964604] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.964656] [ 21.964687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.964772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.964844] Hardware name: linux,dummy-virt (DT) [ 21.964929] Call trace: [ 21.964993] show_stack+0x20/0x38 (C) [ 21.965044] dump_stack_lvl+0x8c/0xd0 [ 21.965144] print_report+0x118/0x608 [ 21.965207] kasan_report+0xdc/0x128 [ 21.965255] __asan_report_store8_noabort+0x20/0x30 [ 21.965308] kasan_atomics_helper+0x3e5c/0x4858 [ 21.965378] kasan_atomics+0x198/0x2e0 [ 21.965501] kunit_try_run_case+0x170/0x3f0 [ 21.965618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.965888] kthread+0x328/0x630 [ 21.966091] ret_from_fork+0x10/0x20 [ 21.966595] [ 21.966617] Allocated by task 265: [ 21.966647] kasan_save_stack+0x3c/0x68 [ 21.966732] kasan_save_track+0x20/0x40 [ 21.967069] kasan_save_alloc_info+0x40/0x58 [ 21.967115] __kasan_kmalloc+0xd4/0xd8 [ 21.967152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.967201] kasan_atomics+0xb8/0x2e0 [ 21.967239] kunit_try_run_case+0x170/0x3f0 [ 21.967279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.967325] kthread+0x328/0x630 [ 21.967358] ret_from_fork+0x10/0x20 [ 21.967396] [ 21.967418] The buggy address belongs to the object at fff00000c63cef80 [ 21.967418] which belongs to the cache kmalloc-64 of size 64 [ 21.967479] The buggy address is located 0 bytes to the right of [ 21.967479] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.967591] [ 21.967613] The buggy address belongs to the physical page: [ 21.967648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.967919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.967978] page_type: f5(slab) [ 21.968019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.968263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.968311] page dumped because: kasan: bad access detected [ 21.968344] [ 21.968394] Memory state around the buggy address: [ 21.968518] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.968662] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.968779] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.968819] ^ [ 21.968853] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.968913] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.968954] ================================================================== [ 22.065592] ================================================================== [ 22.065642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.065693] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.065747] [ 22.065777] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.065858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.065887] Hardware name: linux,dummy-virt (DT) [ 22.065932] Call trace: [ 22.065955] show_stack+0x20/0x38 (C) [ 22.066006] dump_stack_lvl+0x8c/0xd0 [ 22.066055] print_report+0x118/0x608 [ 22.066103] kasan_report+0xdc/0x128 [ 22.066150] __asan_report_load8_noabort+0x20/0x30 [ 22.066218] kasan_atomics_helper+0x3f04/0x4858 [ 22.066581] kasan_atomics+0x198/0x2e0 [ 22.066870] kunit_try_run_case+0x170/0x3f0 [ 22.066948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.067069] kthread+0x328/0x630 [ 22.067137] ret_from_fork+0x10/0x20 [ 22.067205] [ 22.067436] Allocated by task 265: [ 22.067503] kasan_save_stack+0x3c/0x68 [ 22.067690] kasan_save_track+0x20/0x40 [ 22.068124] kasan_save_alloc_info+0x40/0x58 [ 22.068270] __kasan_kmalloc+0xd4/0xd8 [ 22.068365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.068516] kasan_atomics+0xb8/0x2e0 [ 22.068589] kunit_try_run_case+0x170/0x3f0 [ 22.068631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.069068] kthread+0x328/0x630 [ 22.069377] ret_from_fork+0x10/0x20 [ 22.069626] [ 22.069654] The buggy address belongs to the object at fff00000c63cef80 [ 22.069654] which belongs to the cache kmalloc-64 of size 64 [ 22.069882] The buggy address is located 0 bytes to the right of [ 22.069882] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.070242] [ 22.070375] The buggy address belongs to the physical page: [ 22.070437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.070651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.071000] page_type: f5(slab) [ 22.071211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.071354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.071646] page dumped because: kasan: bad access detected [ 22.071973] [ 22.072183] Memory state around the buggy address: [ 22.072258] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.072628] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.072694] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.073036] ^ [ 22.073153] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.073317] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.073609] ================================================================== [ 22.082963] ================================================================== [ 22.083014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.083064] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.083116] [ 22.083169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.083263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.083299] Hardware name: linux,dummy-virt (DT) [ 22.083340] Call trace: [ 22.083363] show_stack+0x20/0x38 (C) [ 22.083417] dump_stack_lvl+0x8c/0xd0 [ 22.083466] print_report+0x118/0x608 [ 22.084351] kasan_report+0xdc/0x128 [ 22.084422] kasan_check_range+0x100/0x1a8 [ 22.084495] __kasan_check_write+0x20/0x30 [ 22.084626] kasan_atomics_helper+0x147c/0x4858 [ 22.084682] kasan_atomics+0x198/0x2e0 [ 22.084750] kunit_try_run_case+0x170/0x3f0 [ 22.085073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.085193] kthread+0x328/0x630 [ 22.085635] ret_from_fork+0x10/0x20 [ 22.085818] [ 22.085887] Allocated by task 265: [ 22.086037] kasan_save_stack+0x3c/0x68 [ 22.086083] kasan_save_track+0x20/0x40 [ 22.086482] kasan_save_alloc_info+0x40/0x58 [ 22.086718] __kasan_kmalloc+0xd4/0xd8 [ 22.086883] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.087000] kasan_atomics+0xb8/0x2e0 [ 22.087801] kunit_try_run_case+0x170/0x3f0 [ 22.087867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.087916] kthread+0x328/0x630 [ 22.087950] ret_from_fork+0x10/0x20 [ 22.087990] [ 22.088013] The buggy address belongs to the object at fff00000c63cef80 [ 22.088013] which belongs to the cache kmalloc-64 of size 64 [ 22.088076] The buggy address is located 0 bytes to the right of [ 22.088076] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.088143] [ 22.088176] The buggy address belongs to the physical page: [ 22.088212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.088271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.088320] page_type: f5(slab) [ 22.088363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.088418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.088461] page dumped because: kasan: bad access detected [ 22.088496] [ 22.088517] Memory state around the buggy address: [ 22.088551] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.088597] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.088642] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.088683] ^ [ 22.088716] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.088761] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.088799] ================================================================== [ 22.041866] ================================================================== [ 22.041924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.041978] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.042029] [ 22.042064] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.042147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.042202] Hardware name: linux,dummy-virt (DT) [ 22.042236] Call trace: [ 22.042262] show_stack+0x20/0x38 (C) [ 22.042313] dump_stack_lvl+0x8c/0xd0 [ 22.042362] print_report+0x118/0x608 [ 22.042408] kasan_report+0xdc/0x128 [ 22.042455] kasan_check_range+0x100/0x1a8 [ 22.042503] __kasan_check_write+0x20/0x30 [ 22.042549] kasan_atomics_helper+0x11f8/0x4858 [ 22.042598] kasan_atomics+0x198/0x2e0 [ 22.042644] kunit_try_run_case+0x170/0x3f0 [ 22.042693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.042747] kthread+0x328/0x630 [ 22.042789] ret_from_fork+0x10/0x20 [ 22.042839] [ 22.042859] Allocated by task 265: [ 22.042887] kasan_save_stack+0x3c/0x68 [ 22.042935] kasan_save_track+0x20/0x40 [ 22.042974] kasan_save_alloc_info+0x40/0x58 [ 22.043016] __kasan_kmalloc+0xd4/0xd8 [ 22.043054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.043096] kasan_atomics+0xb8/0x2e0 [ 22.043132] kunit_try_run_case+0x170/0x3f0 [ 22.043188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.045237] kthread+0x328/0x630 [ 22.045295] ret_from_fork+0x10/0x20 [ 22.045335] [ 22.045358] The buggy address belongs to the object at fff00000c63cef80 [ 22.045358] which belongs to the cache kmalloc-64 of size 64 [ 22.045419] The buggy address is located 0 bytes to the right of [ 22.045419] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.045486] [ 22.045509] The buggy address belongs to the physical page: [ 22.045543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.045599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.045649] page_type: f5(slab) [ 22.045689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.045743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.045786] page dumped because: kasan: bad access detected [ 22.045820] [ 22.045841] Memory state around the buggy address: [ 22.045875] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.045919] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.045963] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.046005] ^ [ 22.046039] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.046081] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.046121] ================================================================== [ 22.117122] ================================================================== [ 22.117191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.117415] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.117474] [ 22.117615] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.117702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.117732] Hardware name: linux,dummy-virt (DT) [ 22.117764] Call trace: [ 22.117885] show_stack+0x20/0x38 (C) [ 22.117980] dump_stack_lvl+0x8c/0xd0 [ 22.118032] print_report+0x118/0x608 [ 22.118258] kasan_report+0xdc/0x128 [ 22.118321] kasan_check_range+0x100/0x1a8 [ 22.118413] __kasan_check_write+0x20/0x30 [ 22.118460] kasan_atomics_helper+0x16d0/0x4858 [ 22.118511] kasan_atomics+0x198/0x2e0 [ 22.118668] kunit_try_run_case+0x170/0x3f0 [ 22.118770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.118854] kthread+0x328/0x630 [ 22.118907] ret_from_fork+0x10/0x20 [ 22.118955] [ 22.118976] Allocated by task 265: [ 22.119005] kasan_save_stack+0x3c/0x68 [ 22.119047] kasan_save_track+0x20/0x40 [ 22.119087] kasan_save_alloc_info+0x40/0x58 [ 22.119128] __kasan_kmalloc+0xd4/0xd8 [ 22.119179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.119416] kasan_atomics+0xb8/0x2e0 [ 22.119559] kunit_try_run_case+0x170/0x3f0 [ 22.119672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.119851] kthread+0x328/0x630 [ 22.119885] ret_from_fork+0x10/0x20 [ 22.119925] [ 22.119946] The buggy address belongs to the object at fff00000c63cef80 [ 22.119946] which belongs to the cache kmalloc-64 of size 64 [ 22.120008] The buggy address is located 0 bytes to the right of [ 22.120008] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.120172] [ 22.120220] The buggy address belongs to the physical page: [ 22.120354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.120474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.120749] page_type: f5(slab) [ 22.120811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.120865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.120909] page dumped because: kasan: bad access detected [ 22.120944] [ 22.120964] Memory state around the buggy address: [ 22.121018] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.121063] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.121123] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.121175] ^ [ 22.121211] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.121254] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.121295] ================================================================== [ 22.121495] ================================================================== [ 22.121543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.121593] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.121645] [ 22.121676] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.121757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.122021] Hardware name: linux,dummy-virt (DT) [ 22.122077] Call trace: [ 22.122146] show_stack+0x20/0x38 (C) [ 22.122213] dump_stack_lvl+0x8c/0xd0 [ 22.122270] print_report+0x118/0x608 [ 22.122541] kasan_report+0xdc/0x128 [ 22.122631] __asan_report_load8_noabort+0x20/0x30 [ 22.122716] kasan_atomics_helper+0x3e10/0x4858 [ 22.122778] kasan_atomics+0x198/0x2e0 [ 22.122833] kunit_try_run_case+0x170/0x3f0 [ 22.122884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.122968] kthread+0x328/0x630 [ 22.123012] ret_from_fork+0x10/0x20 [ 22.123067] [ 22.123175] Allocated by task 265: [ 22.123242] kasan_save_stack+0x3c/0x68 [ 22.123287] kasan_save_track+0x20/0x40 [ 22.123348] kasan_save_alloc_info+0x40/0x58 [ 22.123392] __kasan_kmalloc+0xd4/0xd8 [ 22.123429] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.123471] kasan_atomics+0xb8/0x2e0 [ 22.123518] kunit_try_run_case+0x170/0x3f0 [ 22.123559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.123605] kthread+0x328/0x630 [ 22.123639] ret_from_fork+0x10/0x20 [ 22.123842] [ 22.123965] The buggy address belongs to the object at fff00000c63cef80 [ 22.123965] which belongs to the cache kmalloc-64 of size 64 [ 22.124119] The buggy address is located 0 bytes to the right of [ 22.124119] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.124421] [ 22.124448] The buggy address belongs to the physical page: [ 22.124531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.124689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.124799] page_type: f5(slab) [ 22.124857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.124963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.125019] page dumped because: kasan: bad access detected [ 22.125112] [ 22.125222] Memory state around the buggy address: [ 22.125297] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.125357] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.125403] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.125444] ^ [ 22.125480] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.125685] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.125731] ================================================================== [ 22.136470] ================================================================== [ 22.136520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.136723] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.136785] [ 22.136890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.136981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.137029] Hardware name: linux,dummy-virt (DT) [ 22.137103] Call trace: [ 22.137174] show_stack+0x20/0x38 (C) [ 22.137225] dump_stack_lvl+0x8c/0xd0 [ 22.137592] print_report+0x118/0x608 [ 22.137755] kasan_report+0xdc/0x128 [ 22.137807] kasan_check_range+0x100/0x1a8 [ 22.137859] __kasan_check_write+0x20/0x30 [ 22.137904] kasan_atomics_helper+0x17ec/0x4858 [ 22.137993] kasan_atomics+0x198/0x2e0 [ 22.138048] kunit_try_run_case+0x170/0x3f0 [ 22.138100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.138418] kthread+0x328/0x630 [ 22.138512] ret_from_fork+0x10/0x20 [ 22.138571] [ 22.138610] Allocated by task 265: [ 22.138642] kasan_save_stack+0x3c/0x68 [ 22.138684] kasan_save_track+0x20/0x40 [ 22.138724] kasan_save_alloc_info+0x40/0x58 [ 22.139060] __kasan_kmalloc+0xd4/0xd8 [ 22.139134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.139221] kasan_atomics+0xb8/0x2e0 [ 22.139289] kunit_try_run_case+0x170/0x3f0 [ 22.139332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.139979] kthread+0x328/0x630 [ 22.140136] ret_from_fork+0x10/0x20 [ 22.140285] [ 22.140425] The buggy address belongs to the object at fff00000c63cef80 [ 22.140425] which belongs to the cache kmalloc-64 of size 64 [ 22.140546] The buggy address is located 0 bytes to the right of [ 22.140546] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.140612] [ 22.140635] The buggy address belongs to the physical page: [ 22.140670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.141060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.141548] page_type: f5(slab) [ 22.141635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.141699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.141744] page dumped because: kasan: bad access detected [ 22.141781] [ 22.141802] Memory state around the buggy address: [ 22.141836] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.141882] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.141976] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.142021] ^ [ 22.142057] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.142104] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.142183] ================================================================== [ 22.089009] ================================================================== [ 22.089057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.089105] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.089172] [ 22.089201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.089285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.089314] Hardware name: linux,dummy-virt (DT) [ 22.089346] Call trace: [ 22.089369] show_stack+0x20/0x38 (C) [ 22.089417] dump_stack_lvl+0x8c/0xd0 [ 22.089464] print_report+0x118/0x608 [ 22.089512] kasan_report+0xdc/0x128 [ 22.089557] kasan_check_range+0x100/0x1a8 [ 22.089609] __kasan_check_write+0x20/0x30 [ 22.089655] kasan_atomics_helper+0x14e4/0x4858 [ 22.089705] kasan_atomics+0x198/0x2e0 [ 22.089752] kunit_try_run_case+0x170/0x3f0 [ 22.089799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.089853] kthread+0x328/0x630 [ 22.089896] ret_from_fork+0x10/0x20 [ 22.089942] [ 22.089962] Allocated by task 265: [ 22.089991] kasan_save_stack+0x3c/0x68 [ 22.090032] kasan_save_track+0x20/0x40 [ 22.090072] kasan_save_alloc_info+0x40/0x58 [ 22.090115] __kasan_kmalloc+0xd4/0xd8 [ 22.090185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.090228] kasan_atomics+0xb8/0x2e0 [ 22.090447] kunit_try_run_case+0x170/0x3f0 [ 22.090500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.090578] kthread+0x328/0x630 [ 22.090613] ret_from_fork+0x10/0x20 [ 22.090670] [ 22.090720] The buggy address belongs to the object at fff00000c63cef80 [ 22.090720] which belongs to the cache kmalloc-64 of size 64 [ 22.090783] The buggy address is located 0 bytes to the right of [ 22.090783] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.090850] [ 22.090871] The buggy address belongs to the physical page: [ 22.090910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.090965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.091013] page_type: f5(slab) [ 22.091054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.091107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.091150] page dumped because: kasan: bad access detected [ 22.091196] [ 22.091218] Memory state around the buggy address: [ 22.091252] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.091297] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.091342] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.091540] ^ [ 22.091768] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.092132] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.092200] ================================================================== [ 22.102715] ================================================================== [ 22.102823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.102875] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.102936] [ 22.103083] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.103177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.103214] Hardware name: linux,dummy-virt (DT) [ 22.103248] Call trace: [ 22.103288] show_stack+0x20/0x38 (C) [ 22.103340] dump_stack_lvl+0x8c/0xd0 [ 22.103387] print_report+0x118/0x608 [ 22.103453] kasan_report+0xdc/0x128 [ 22.103534] __asan_report_load8_noabort+0x20/0x30 [ 22.103609] kasan_atomics_helper+0x3db0/0x4858 [ 22.103658] kasan_atomics+0x198/0x2e0 [ 22.103901] kunit_try_run_case+0x170/0x3f0 [ 22.104024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.104154] kthread+0x328/0x630 [ 22.104279] ret_from_fork+0x10/0x20 [ 22.104347] [ 22.104385] Allocated by task 265: [ 22.104462] kasan_save_stack+0x3c/0x68 [ 22.104743] kasan_save_track+0x20/0x40 [ 22.104971] kasan_save_alloc_info+0x40/0x58 [ 22.105099] __kasan_kmalloc+0xd4/0xd8 [ 22.105211] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.105357] kasan_atomics+0xb8/0x2e0 [ 22.105504] kunit_try_run_case+0x170/0x3f0 [ 22.105564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.105637] kthread+0x328/0x630 [ 22.105683] ret_from_fork+0x10/0x20 [ 22.105720] [ 22.105742] The buggy address belongs to the object at fff00000c63cef80 [ 22.105742] which belongs to the cache kmalloc-64 of size 64 [ 22.106017] The buggy address is located 0 bytes to the right of [ 22.106017] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.106106] [ 22.106129] The buggy address belongs to the physical page: [ 22.106289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.106462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.106586] page_type: f5(slab) [ 22.106734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.106807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.106851] page dumped because: kasan: bad access detected [ 22.106884] [ 22.106911] Memory state around the buggy address: [ 22.107091] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.107250] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.107334] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.107430] ^ [ 22.107488] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.107559] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.107903] ================================================================== [ 21.951395] ================================================================== [ 21.951731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.951879] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.951984] [ 21.952023] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.952142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.952181] Hardware name: linux,dummy-virt (DT) [ 21.952215] Call trace: [ 21.952341] show_stack+0x20/0x38 (C) [ 21.952400] dump_stack_lvl+0x8c/0xd0 [ 21.952451] print_report+0x118/0x608 [ 21.952499] kasan_report+0xdc/0x128 [ 21.952565] __asan_report_load8_noabort+0x20/0x30 [ 21.952616] kasan_atomics_helper+0x3f58/0x4858 [ 21.952688] kasan_atomics+0x198/0x2e0 [ 21.952809] kunit_try_run_case+0x170/0x3f0 [ 21.952908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.952962] kthread+0x328/0x630 [ 21.953348] ret_from_fork+0x10/0x20 [ 21.953452] [ 21.953492] Allocated by task 265: [ 21.953522] kasan_save_stack+0x3c/0x68 [ 21.953567] kasan_save_track+0x20/0x40 [ 21.953607] kasan_save_alloc_info+0x40/0x58 [ 21.953647] __kasan_kmalloc+0xd4/0xd8 [ 21.953686] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.953728] kasan_atomics+0xb8/0x2e0 [ 21.953766] kunit_try_run_case+0x170/0x3f0 [ 21.953827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.953874] kthread+0x328/0x630 [ 21.953930] ret_from_fork+0x10/0x20 [ 21.954093] [ 21.954128] The buggy address belongs to the object at fff00000c63cef80 [ 21.954128] which belongs to the cache kmalloc-64 of size 64 [ 21.954198] The buggy address is located 0 bytes to the right of [ 21.954198] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.954304] [ 21.954330] The buggy address belongs to the physical page: [ 21.954502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.954684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.954772] page_type: f5(slab) [ 21.954813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.954866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.954913] page dumped because: kasan: bad access detected [ 21.955086] [ 21.955915] Memory state around the buggy address: [ 21.955959] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.956008] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.956051] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.956274] ^ [ 21.956390] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.956436] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.956477] ================================================================== [ 21.970433] ================================================================== [ 21.971314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.971438] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.971948] [ 21.971987] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.972103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.972134] Hardware name: linux,dummy-virt (DT) [ 21.972337] Call trace: [ 21.972564] show_stack+0x20/0x38 (C) [ 21.972624] dump_stack_lvl+0x8c/0xd0 [ 21.972934] print_report+0x118/0x608 [ 21.973034] kasan_report+0xdc/0x128 [ 21.973122] kasan_check_range+0x100/0x1a8 [ 21.973349] __kasan_check_write+0x20/0x30 [ 21.973419] kasan_atomics_helper+0xeb8/0x4858 [ 21.973782] kasan_atomics+0x198/0x2e0 [ 21.973839] kunit_try_run_case+0x170/0x3f0 [ 21.974060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.974206] kthread+0x328/0x630 [ 21.974298] ret_from_fork+0x10/0x20 [ 21.974690] [ 21.974716] Allocated by task 265: [ 21.974836] kasan_save_stack+0x3c/0x68 [ 21.975017] kasan_save_track+0x20/0x40 [ 21.975346] kasan_save_alloc_info+0x40/0x58 [ 21.975723] __kasan_kmalloc+0xd4/0xd8 [ 21.975778] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.975819] kasan_atomics+0xb8/0x2e0 [ 21.975856] kunit_try_run_case+0x170/0x3f0 [ 21.976058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.976124] kthread+0x328/0x630 [ 21.976422] ret_from_fork+0x10/0x20 [ 21.976795] [ 21.976824] The buggy address belongs to the object at fff00000c63cef80 [ 21.976824] which belongs to the cache kmalloc-64 of size 64 [ 21.977036] The buggy address is located 0 bytes to the right of [ 21.977036] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.977219] [ 21.977475] The buggy address belongs to the physical page: [ 21.977520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.977695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.977939] page_type: f5(slab) [ 21.977989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.978153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.978395] page dumped because: kasan: bad access detected [ 21.978476] [ 21.978497] Memory state around the buggy address: [ 21.978533] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.978978] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.979116] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.979394] ^ [ 21.979478] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.979835] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.979903] ================================================================== [ 22.000855] ================================================================== [ 22.001015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 22.001114] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.001180] [ 22.001212] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.001295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.001661] Hardware name: linux,dummy-virt (DT) [ 22.001806] Call trace: [ 22.001833] show_stack+0x20/0x38 (C) [ 22.001884] dump_stack_lvl+0x8c/0xd0 [ 22.001951] print_report+0x118/0x608 [ 22.001999] kasan_report+0xdc/0x128 [ 22.002272] kasan_check_range+0x100/0x1a8 [ 22.002354] __kasan_check_write+0x20/0x30 [ 22.002428] kasan_atomics_helper+0xff0/0x4858 [ 22.002490] kasan_atomics+0x198/0x2e0 [ 22.002546] kunit_try_run_case+0x170/0x3f0 [ 22.002597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.002651] kthread+0x328/0x630 [ 22.002693] ret_from_fork+0x10/0x20 [ 22.002741] [ 22.002762] Allocated by task 265: [ 22.002791] kasan_save_stack+0x3c/0x68 [ 22.002844] kasan_save_track+0x20/0x40 [ 22.003105] kasan_save_alloc_info+0x40/0x58 [ 22.003271] __kasan_kmalloc+0xd4/0xd8 [ 22.003322] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.003408] kasan_atomics+0xb8/0x2e0 [ 22.003450] kunit_try_run_case+0x170/0x3f0 [ 22.003490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.003549] kthread+0x328/0x630 [ 22.003613] ret_from_fork+0x10/0x20 [ 22.003654] [ 22.003677] The buggy address belongs to the object at fff00000c63cef80 [ 22.003677] which belongs to the cache kmalloc-64 of size 64 [ 22.004296] The buggy address is located 0 bytes to the right of [ 22.004296] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.004479] [ 22.004625] The buggy address belongs to the physical page: [ 22.004772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.004848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.004927] page_type: f5(slab) [ 22.005033] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.005430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.005482] page dumped because: kasan: bad access detected [ 22.005526] [ 22.005548] Memory state around the buggy address: [ 22.005625] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.005686] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.005750] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.006138] ^ [ 22.006481] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.006736] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.006786] ================================================================== [ 21.945716] ================================================================== [ 21.945770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.945823] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.946230] [ 21.946265] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.946437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.946702] Hardware name: linux,dummy-virt (DT) [ 21.946964] Call trace: [ 21.947058] show_stack+0x20/0x38 (C) [ 21.947184] dump_stack_lvl+0x8c/0xd0 [ 21.947236] print_report+0x118/0x608 [ 21.947284] kasan_report+0xdc/0x128 [ 21.947331] kasan_check_range+0x100/0x1a8 [ 21.947380] __kasan_check_read+0x20/0x30 [ 21.947425] kasan_atomics_helper+0xdd4/0x4858 [ 21.947474] kasan_atomics+0x198/0x2e0 [ 21.947530] kunit_try_run_case+0x170/0x3f0 [ 21.947578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.947786] kthread+0x328/0x630 [ 21.947949] ret_from_fork+0x10/0x20 [ 21.948001] [ 21.948313] Allocated by task 265: [ 21.948427] kasan_save_stack+0x3c/0x68 [ 21.948478] kasan_save_track+0x20/0x40 [ 21.948567] kasan_save_alloc_info+0x40/0x58 [ 21.948609] __kasan_kmalloc+0xd4/0xd8 [ 21.948648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.948918] kasan_atomics+0xb8/0x2e0 [ 21.948969] kunit_try_run_case+0x170/0x3f0 [ 21.949011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.949057] kthread+0x328/0x630 [ 21.949093] ret_from_fork+0x10/0x20 [ 21.949132] [ 21.949152] The buggy address belongs to the object at fff00000c63cef80 [ 21.949152] which belongs to the cache kmalloc-64 of size 64 [ 21.949223] The buggy address is located 0 bytes to the right of [ 21.949223] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.949566] [ 21.949655] The buggy address belongs to the physical page: [ 21.949698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.949768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.949817] page_type: f5(slab) [ 21.949941] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.950177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.950220] page dumped because: kasan: bad access detected [ 21.950254] [ 21.950275] Memory state around the buggy address: [ 21.950310] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.950353] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.950397] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.950437] ^ [ 21.950472] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.950809] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.950853] ================================================================== [ 22.046387] ================================================================== [ 22.046438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.046510] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.046561] [ 22.046634] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.046877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.046930] Hardware name: linux,dummy-virt (DT) [ 22.046964] Call trace: [ 22.047064] show_stack+0x20/0x38 (C) [ 22.047170] dump_stack_lvl+0x8c/0xd0 [ 22.047436] print_report+0x118/0x608 [ 22.047717] kasan_report+0xdc/0x128 [ 22.047840] kasan_check_range+0x100/0x1a8 [ 22.047946] __kasan_check_write+0x20/0x30 [ 22.048016] kasan_atomics_helper+0x126c/0x4858 [ 22.048065] kasan_atomics+0x198/0x2e0 [ 22.048127] kunit_try_run_case+0x170/0x3f0 [ 22.048190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.048245] kthread+0x328/0x630 [ 22.048287] ret_from_fork+0x10/0x20 [ 22.048361] [ 22.048389] Allocated by task 265: [ 22.048418] kasan_save_stack+0x3c/0x68 [ 22.048477] kasan_save_track+0x20/0x40 [ 22.048517] kasan_save_alloc_info+0x40/0x58 [ 22.048565] __kasan_kmalloc+0xd4/0xd8 [ 22.048612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.048654] kasan_atomics+0xb8/0x2e0 [ 22.048691] kunit_try_run_case+0x170/0x3f0 [ 22.048741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.048786] kthread+0x328/0x630 [ 22.048822] ret_from_fork+0x10/0x20 [ 22.048860] [ 22.048890] The buggy address belongs to the object at fff00000c63cef80 [ 22.048890] which belongs to the cache kmalloc-64 of size 64 [ 22.048951] The buggy address is located 0 bytes to the right of [ 22.048951] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.049017] [ 22.049048] The buggy address belongs to the physical page: [ 22.049090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.049168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.049217] page_type: f5(slab) [ 22.049257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.049310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.049353] page dumped because: kasan: bad access detected [ 22.049387] [ 22.049658] Memory state around the buggy address: [ 22.049702] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.049763] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.050046] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.050191] ^ [ 22.050260] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.050528] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.050656] ================================================================== [ 22.126369] ================================================================== [ 22.126606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.126666] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.126855] [ 22.126979] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.127067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.127115] Hardware name: linux,dummy-virt (DT) [ 22.127214] Call trace: [ 22.127272] show_stack+0x20/0x38 (C) [ 22.127325] dump_stack_lvl+0x8c/0xd0 [ 22.127374] print_report+0x118/0x608 [ 22.127422] kasan_report+0xdc/0x128 [ 22.127584] kasan_check_range+0x100/0x1a8 [ 22.127677] __kasan_check_write+0x20/0x30 [ 22.127763] kasan_atomics_helper+0x175c/0x4858 [ 22.127822] kasan_atomics+0x198/0x2e0 [ 22.127928] kunit_try_run_case+0x170/0x3f0 [ 22.127999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.128089] kthread+0x328/0x630 [ 22.128223] ret_from_fork+0x10/0x20 [ 22.128329] [ 22.128350] Allocated by task 265: [ 22.128379] kasan_save_stack+0x3c/0x68 [ 22.128560] kasan_save_track+0x20/0x40 [ 22.128600] kasan_save_alloc_info+0x40/0x58 [ 22.128643] __kasan_kmalloc+0xd4/0xd8 [ 22.128681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.128814] kasan_atomics+0xb8/0x2e0 [ 22.128876] kunit_try_run_case+0x170/0x3f0 [ 22.128918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.128993] kthread+0x328/0x630 [ 22.129081] ret_from_fork+0x10/0x20 [ 22.129130] [ 22.129151] The buggy address belongs to the object at fff00000c63cef80 [ 22.129151] which belongs to the cache kmalloc-64 of size 64 [ 22.129342] The buggy address is located 0 bytes to the right of [ 22.129342] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.129467] [ 22.129546] The buggy address belongs to the physical page: [ 22.129662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.129799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.129893] page_type: f5(slab) [ 22.130028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.130134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.130192] page dumped because: kasan: bad access detected [ 22.130227] [ 22.130247] Memory state around the buggy address: [ 22.130290] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.130336] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.130387] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.130432] ^ [ 22.130467] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.130520] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130559] ================================================================== [ 22.074556] ================================================================== [ 22.074609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.074886] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.075098] [ 22.075138] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.075291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.075336] Hardware name: linux,dummy-virt (DT) [ 22.075370] Call trace: [ 22.075404] show_stack+0x20/0x38 (C) [ 22.075456] dump_stack_lvl+0x8c/0xd0 [ 22.075967] print_report+0x118/0x608 [ 22.076031] kasan_report+0xdc/0x128 [ 22.076170] kasan_check_range+0x100/0x1a8 [ 22.076369] __kasan_check_write+0x20/0x30 [ 22.076686] kasan_atomics_helper+0x1414/0x4858 [ 22.076877] kasan_atomics+0x198/0x2e0 [ 22.076954] kunit_try_run_case+0x170/0x3f0 [ 22.077128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.077291] kthread+0x328/0x630 [ 22.077614] ret_from_fork+0x10/0x20 [ 22.077773] [ 22.077981] Allocated by task 265: [ 22.078226] kasan_save_stack+0x3c/0x68 [ 22.078347] kasan_save_track+0x20/0x40 [ 22.078520] kasan_save_alloc_info+0x40/0x58 [ 22.078638] __kasan_kmalloc+0xd4/0xd8 [ 22.078706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.079054] kasan_atomics+0xb8/0x2e0 [ 22.079130] kunit_try_run_case+0x170/0x3f0 [ 22.079475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.079621] kthread+0x328/0x630 [ 22.079689] ret_from_fork+0x10/0x20 [ 22.079779] [ 22.079823] The buggy address belongs to the object at fff00000c63cef80 [ 22.079823] which belongs to the cache kmalloc-64 of size 64 [ 22.080339] The buggy address is located 0 bytes to the right of [ 22.080339] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.080689] [ 22.081063] The buggy address belongs to the physical page: [ 22.081266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.081534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.081681] page_type: f5(slab) [ 22.082035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.082218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.082267] page dumped because: kasan: bad access detected [ 22.082302] [ 22.082372] Memory state around the buggy address: [ 22.082426] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.082488] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.082534] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.082575] ^ [ 22.082619] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.082672] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082720] ================================================================== [ 21.925740] ================================================================== [ 21.925790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.926095] Read of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.926173] [ 21.926205] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.926286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.926316] Hardware name: linux,dummy-virt (DT) [ 21.926350] Call trace: [ 21.926373] show_stack+0x20/0x38 (C) [ 21.926444] dump_stack_lvl+0x8c/0xd0 [ 21.926493] print_report+0x118/0x608 [ 21.926543] kasan_report+0xdc/0x128 [ 21.926590] __asan_report_load4_noabort+0x20/0x30 [ 21.926643] kasan_atomics_helper+0x3dd8/0x4858 [ 21.926693] kasan_atomics+0x198/0x2e0 [ 21.926740] kunit_try_run_case+0x170/0x3f0 [ 21.926790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.926856] kthread+0x328/0x630 [ 21.926908] ret_from_fork+0x10/0x20 [ 21.926955] [ 21.926981] Allocated by task 265: [ 21.927142] kasan_save_stack+0x3c/0x68 [ 21.927314] kasan_save_track+0x20/0x40 [ 21.927353] kasan_save_alloc_info+0x40/0x58 [ 21.927482] __kasan_kmalloc+0xd4/0xd8 [ 21.927523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.927565] kasan_atomics+0xb8/0x2e0 [ 21.927605] kunit_try_run_case+0x170/0x3f0 [ 21.927645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.927691] kthread+0x328/0x630 [ 21.927726] ret_from_fork+0x10/0x20 [ 21.928041] [ 21.928184] The buggy address belongs to the object at fff00000c63cef80 [ 21.928184] which belongs to the cache kmalloc-64 of size 64 [ 21.928569] The buggy address is located 0 bytes to the right of [ 21.928569] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.928642] [ 21.928664] The buggy address belongs to the physical page: [ 21.928782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.928853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.928950] page_type: f5(slab) [ 21.928990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.929085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.929296] page dumped because: kasan: bad access detected [ 21.929465] [ 21.929486] Memory state around the buggy address: [ 21.929519] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.929587] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.929692] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.929884] ^ [ 21.929920] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.929998] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.930040] ================================================================== [ 21.980945] ================================================================== [ 21.981000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.981052] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.981105] [ 21.981774] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.982511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.982542] Hardware name: linux,dummy-virt (DT) [ 21.982575] Call trace: [ 21.982600] show_stack+0x20/0x38 (C) [ 21.982653] dump_stack_lvl+0x8c/0xd0 [ 21.982701] print_report+0x118/0x608 [ 21.982748] kasan_report+0xdc/0x128 [ 21.982794] kasan_check_range+0x100/0x1a8 [ 21.982843] __kasan_check_write+0x20/0x30 [ 21.982897] kasan_atomics_helper+0xf20/0x4858 [ 21.982946] kasan_atomics+0x198/0x2e0 [ 21.982993] kunit_try_run_case+0x170/0x3f0 [ 21.983042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.983096] kthread+0x328/0x630 [ 21.983140] ret_from_fork+0x10/0x20 [ 21.983198] [ 21.983218] Allocated by task 265: [ 21.983249] kasan_save_stack+0x3c/0x68 [ 21.983291] kasan_save_track+0x20/0x40 [ 21.983332] kasan_save_alloc_info+0x40/0x58 [ 21.983373] __kasan_kmalloc+0xd4/0xd8 [ 21.983413] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.983453] kasan_atomics+0xb8/0x2e0 [ 21.983490] kunit_try_run_case+0x170/0x3f0 [ 21.984707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.984816] kthread+0x328/0x630 [ 21.985058] ret_from_fork+0x10/0x20 [ 21.985326] [ 21.985460] The buggy address belongs to the object at fff00000c63cef80 [ 21.985460] which belongs to the cache kmalloc-64 of size 64 [ 21.985683] The buggy address is located 0 bytes to the right of [ 21.985683] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.985804] [ 21.986200] The buggy address belongs to the physical page: [ 21.986244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.986300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.986352] page_type: f5(slab) [ 21.986626] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.986938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.987123] page dumped because: kasan: bad access detected [ 21.987169] [ 21.987191] Memory state around the buggy address: [ 21.987376] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.987504] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.987968] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.988040] ^ [ 21.988082] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.988127] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.988593] ================================================================== [ 22.108407] ================================================================== [ 22.108457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.108506] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.108605] [ 22.108637] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.108719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.108746] Hardware name: linux,dummy-virt (DT) [ 22.108914] Call trace: [ 22.108948] show_stack+0x20/0x38 (C) [ 22.109001] dump_stack_lvl+0x8c/0xd0 [ 22.109080] print_report+0x118/0x608 [ 22.109175] kasan_report+0xdc/0x128 [ 22.109405] kasan_check_range+0x100/0x1a8 [ 22.109465] __kasan_check_write+0x20/0x30 [ 22.109514] kasan_atomics_helper+0x1644/0x4858 [ 22.109573] kasan_atomics+0x198/0x2e0 [ 22.109635] kunit_try_run_case+0x170/0x3f0 [ 22.109733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.109834] kthread+0x328/0x630 [ 22.109878] ret_from_fork+0x10/0x20 [ 22.109967] [ 22.110016] Allocated by task 265: [ 22.110063] kasan_save_stack+0x3c/0x68 [ 22.110107] kasan_save_track+0x20/0x40 [ 22.110145] kasan_save_alloc_info+0x40/0x58 [ 22.110220] __kasan_kmalloc+0xd4/0xd8 [ 22.110259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.110301] kasan_atomics+0xb8/0x2e0 [ 22.110338] kunit_try_run_case+0x170/0x3f0 [ 22.110379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.110540] kthread+0x328/0x630 [ 22.110578] ret_from_fork+0x10/0x20 [ 22.110615] [ 22.110675] The buggy address belongs to the object at fff00000c63cef80 [ 22.110675] which belongs to the cache kmalloc-64 of size 64 [ 22.110764] The buggy address is located 0 bytes to the right of [ 22.110764] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.110857] [ 22.110881] The buggy address belongs to the physical page: [ 22.111020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.111231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.111346] page_type: f5(slab) [ 22.111409] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.111483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.111566] page dumped because: kasan: bad access detected [ 22.111638] [ 22.111660] Memory state around the buggy address: [ 22.111693] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111739] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111817] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.111859] ^ [ 22.111982] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.112027] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.112123] ================================================================== [ 21.990565] ================================================================== [ 21.990773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.990827] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.990880] [ 21.991358] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.991463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.991633] Hardware name: linux,dummy-virt (DT) [ 21.991699] Call trace: [ 21.991726] show_stack+0x20/0x38 (C) [ 21.992353] dump_stack_lvl+0x8c/0xd0 [ 21.992585] print_report+0x118/0x608 [ 21.992702] kasan_report+0xdc/0x128 [ 21.992903] kasan_check_range+0x100/0x1a8 [ 21.992952] __kasan_check_write+0x20/0x30 [ 21.993319] kasan_atomics_helper+0xf88/0x4858 [ 21.993505] kasan_atomics+0x198/0x2e0 [ 21.993930] kunit_try_run_case+0x170/0x3f0 [ 21.994319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.994375] kthread+0x328/0x630 [ 21.994913] ret_from_fork+0x10/0x20 [ 21.995101] [ 21.995275] Allocated by task 265: [ 21.995409] kasan_save_stack+0x3c/0x68 [ 21.995458] kasan_save_track+0x20/0x40 [ 21.995507] kasan_save_alloc_info+0x40/0x58 [ 21.996361] __kasan_kmalloc+0xd4/0xd8 [ 21.996484] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.996668] kasan_atomics+0xb8/0x2e0 [ 21.996717] kunit_try_run_case+0x170/0x3f0 [ 21.996907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.997261] kthread+0x328/0x630 [ 21.997370] ret_from_fork+0x10/0x20 [ 21.997411] [ 21.997623] The buggy address belongs to the object at fff00000c63cef80 [ 21.997623] which belongs to the cache kmalloc-64 of size 64 [ 21.998057] The buggy address is located 0 bytes to the right of [ 21.998057] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.998374] [ 21.998398] The buggy address belongs to the physical page: [ 21.998687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.998750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.998802] page_type: f5(slab) [ 21.998843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.998901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.998944] page dumped because: kasan: bad access detected [ 21.999867] [ 21.999896] Memory state around the buggy address: [ 21.999933] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.999980] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.000025] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.000067] ^ [ 22.000101] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.000145] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.000363] ================================================================== [ 21.863439] ================================================================== [ 21.863832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.863930] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.864018] [ 21.864145] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.864306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.864367] Hardware name: linux,dummy-virt (DT) [ 21.864437] Call trace: [ 21.864518] show_stack+0x20/0x38 (C) [ 21.864698] dump_stack_lvl+0x8c/0xd0 [ 21.864824] print_report+0x118/0x608 [ 21.864973] kasan_report+0xdc/0x128 [ 21.865042] kasan_check_range+0x100/0x1a8 [ 21.865126] __kasan_check_write+0x20/0x30 [ 21.865182] kasan_atomics_helper+0x99c/0x4858 [ 21.865232] kasan_atomics+0x198/0x2e0 [ 21.865549] kunit_try_run_case+0x170/0x3f0 [ 21.865626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.865756] kthread+0x328/0x630 [ 21.865899] ret_from_fork+0x10/0x20 [ 21.866152] [ 21.866273] Allocated by task 265: [ 21.866304] kasan_save_stack+0x3c/0x68 [ 21.866365] kasan_save_track+0x20/0x40 [ 21.866404] kasan_save_alloc_info+0x40/0x58 [ 21.866446] __kasan_kmalloc+0xd4/0xd8 [ 21.866611] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.866679] kasan_atomics+0xb8/0x2e0 [ 21.866797] kunit_try_run_case+0x170/0x3f0 [ 21.866869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.866969] kthread+0x328/0x630 [ 21.867005] ret_from_fork+0x10/0x20 [ 21.867214] [ 21.867475] The buggy address belongs to the object at fff00000c63cef80 [ 21.867475] which belongs to the cache kmalloc-64 of size 64 [ 21.867742] The buggy address is located 0 bytes to the right of [ 21.867742] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.867885] [ 21.867907] The buggy address belongs to the physical page: [ 21.867947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.868050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.868289] page_type: f5(slab) [ 21.868347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.868398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.868635] page dumped because: kasan: bad access detected [ 21.868735] [ 21.868846] Memory state around the buggy address: [ 21.868972] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.869084] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.869179] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.869332] ^ [ 21.869485] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.869602] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.869701] ================================================================== [ 21.886399] ================================================================== [ 21.886541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.886594] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.886776] [ 21.886857] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.886985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.887302] kasan_report+0xdc/0x128 [ 21.888667] __kasan_kmalloc+0xd4/0xd8 [ 21.888782] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.888895] kasan_atomics+0xb8/0x2e0 [ 21.889071] kunit_try_run_case+0x170/0x3f0 [ 21.889504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.889584] kthread+0x328/0x630 [ 21.889636] ret_from_fork+0x10/0x20 [ 21.889676] [ 21.889699] The buggy address belongs to the object at fff00000c63cef80 [ 21.889699] which belongs to the cache kmalloc-64 of size 64 [ 21.890208] page dumped because: kasan: bad access detected [ 21.890946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 21.893597] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.894978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.896411] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.898920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.900723] kthread+0x328/0x630 [ 21.901517] kasan_atomics+0xb8/0x2e0 [ 21.901981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.903267] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.906901] kunit_try_run_case+0x170/0x3f0 [ 21.907289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.907832] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.909492] Call trace: [ 21.911016] kasan_save_stack+0x3c/0x68 [ 21.911578] kunit_try_run_case+0x170/0x3f0 [ 21.913079] page dumped because: kasan: bad access detected [ 21.914324] ================================================================== [ 21.723985] ================================================================== [ 21.744021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 21.747270] kthread+0x328/0x630 [ 21.747378] [ 21.748319] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.749484] [ 21.751202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.752061] ^ [ 21.752306] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.753460] ================================================================== [ 22.057486] ================================================================== [ 22.057537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.057908] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.057977] [ 22.058084] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.058184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.058229] Hardware name: linux,dummy-virt (DT) [ 22.058262] Call trace: [ 22.058322] show_stack+0x20/0x38 (C) [ 22.058387] dump_stack_lvl+0x8c/0xd0 [ 22.058450] print_report+0x118/0x608 [ 22.058497] kasan_report+0xdc/0x128 [ 22.058544] kasan_check_range+0x100/0x1a8 [ 22.058830] __kasan_check_write+0x20/0x30 [ 22.058904] kasan_atomics_helper+0x1384/0x4858 [ 22.058963] kasan_atomics+0x198/0x2e0 [ 22.059020] kunit_try_run_case+0x170/0x3f0 [ 22.059073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.059127] kthread+0x328/0x630 [ 22.059180] ret_from_fork+0x10/0x20 [ 22.059229] [ 22.059249] Allocated by task 265: [ 22.059277] kasan_save_stack+0x3c/0x68 [ 22.059329] kasan_save_track+0x20/0x40 [ 22.059427] kasan_save_alloc_info+0x40/0x58 [ 22.059478] __kasan_kmalloc+0xd4/0xd8 [ 22.060145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.060699] kasan_atomics+0xb8/0x2e0 [ 22.060782] kunit_try_run_case+0x170/0x3f0 [ 22.060855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.060931] kthread+0x328/0x630 [ 22.061248] ret_from_fork+0x10/0x20 [ 22.061759] [ 22.062127] The buggy address belongs to the object at fff00000c63cef80 [ 22.062127] which belongs to the cache kmalloc-64 of size 64 [ 22.062233] The buggy address is located 0 bytes to the right of [ 22.062233] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.062312] [ 22.062334] The buggy address belongs to the physical page: [ 22.062371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.062650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.063066] page_type: f5(slab) [ 22.063192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.063788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.063887] page dumped because: kasan: bad access detected [ 22.063925] [ 22.063946] Memory state around the buggy address: [ 22.064318] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.064514] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.064606] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.064809] ^ [ 22.065035] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.065222] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.065325] ================================================================== [ 21.870904] ================================================================== [ 21.871066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 21.871298] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.871363] [ 21.871555] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.871754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.871853] Hardware name: linux,dummy-virt (DT) [ 21.872854] __kasan_check_write+0x20/0x30 [ 21.873886] [ 21.874021] Allocated by task 265: [ 21.874188] kasan_save_stack+0x3c/0x68 [ 21.874295] kasan_save_track+0x20/0x40 [ 21.874473] kasan_save_alloc_info+0x40/0x58 [ 21.874617] __kasan_kmalloc+0xd4/0xd8 [ 21.874765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.874838] kasan_atomics+0xb8/0x2e0 [ 21.874902] kunit_try_run_case+0x170/0x3f0 [ 21.875227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.875365] kthread+0x328/0x630 [ 21.875591] ret_from_fork+0x10/0x20 [ 21.875749] [ 21.875868] The buggy address belongs to the object at fff00000c63cef80 [ 21.875868] which belongs to the cache kmalloc-64 of size 64 [ 21.876051] The buggy address is located 0 bytes to the right of [ 21.876051] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.876222] [ 21.876254] The buggy address belongs to the physical page: [ 21.876289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.876345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.876630] page_type: f5(slab) [ 21.876830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.876979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.877057] page dumped because: kasan: bad access detected [ 21.877100] [ 21.877122] Memory state around the buggy address: [ 21.877303] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.877489] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.877591] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.877714] ^ [ 21.877827] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.877937] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.878079] ================================================================== [ 22.093056] ================================================================== [ 22.093146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.093218] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.093274] [ 22.093334] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.093418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.093476] Hardware name: linux,dummy-virt (DT) [ 22.093510] Call trace: [ 22.093591] show_stack+0x20/0x38 (C) [ 22.093643] dump_stack_lvl+0x8c/0xd0 [ 22.093691] print_report+0x118/0x608 [ 22.093738] kasan_report+0xdc/0x128 [ 22.093783] kasan_check_range+0x100/0x1a8 [ 22.093839] __kasan_check_write+0x20/0x30 [ 22.093904] kasan_atomics_helper+0x154c/0x4858 [ 22.093959] kasan_atomics+0x198/0x2e0 [ 22.094006] kunit_try_run_case+0x170/0x3f0 [ 22.094065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.094339] kthread+0x328/0x630 [ 22.094453] ret_from_fork+0x10/0x20 [ 22.094525] [ 22.094561] Allocated by task 265: [ 22.094794] kasan_save_stack+0x3c/0x68 [ 22.094849] kasan_save_track+0x20/0x40 [ 22.094976] kasan_save_alloc_info+0x40/0x58 [ 22.095020] __kasan_kmalloc+0xd4/0xd8 [ 22.095060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.095107] kasan_atomics+0xb8/0x2e0 [ 22.095153] kunit_try_run_case+0x170/0x3f0 [ 22.095221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.095286] kthread+0x328/0x630 [ 22.095322] ret_from_fork+0x10/0x20 [ 22.095361] [ 22.095430] The buggy address belongs to the object at fff00000c63cef80 [ 22.095430] which belongs to the cache kmalloc-64 of size 64 [ 22.095543] The buggy address is located 0 bytes to the right of [ 22.095543] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.095628] [ 22.095661] The buggy address belongs to the physical page: [ 22.095696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.095753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.095803] page_type: f5(slab) [ 22.096077] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.096234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.096346] page dumped because: kasan: bad access detected [ 22.096702] [ 22.096746] Memory state around the buggy address: [ 22.096822] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.096934] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.096981] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.097021] ^ [ 22.097346] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.097467] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.097558] ================================================================== [ 21.931175] ================================================================== [ 21.931243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.931443] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 21.931690] [ 21.931876] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.932244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.932276] Hardware name: linux,dummy-virt (DT) [ 21.932307] Call trace: [ 21.932333] show_stack+0x20/0x38 (C) [ 21.932545] dump_stack_lvl+0x8c/0xd0 [ 21.932596] print_report+0x118/0x608 [ 21.932740] kasan_report+0xdc/0x128 [ 21.933001] kasan_check_range+0x100/0x1a8 [ 21.933052] __kasan_check_write+0x20/0x30 [ 21.933098] kasan_atomics_helper+0xd3c/0x4858 [ 21.933148] kasan_atomics+0x198/0x2e0 [ 21.933404] kunit_try_run_case+0x170/0x3f0 [ 21.933579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.933636] kthread+0x328/0x630 [ 21.933677] ret_from_fork+0x10/0x20 [ 21.933726] [ 21.933748] Allocated by task 265: [ 21.933803] kasan_save_stack+0x3c/0x68 [ 21.933989] kasan_save_track+0x20/0x40 [ 21.934364] kasan_save_alloc_info+0x40/0x58 [ 21.934415] __kasan_kmalloc+0xd4/0xd8 [ 21.934456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.934815] kasan_atomics+0xb8/0x2e0 [ 21.935007] kunit_try_run_case+0x170/0x3f0 [ 21.935057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.935382] kthread+0x328/0x630 [ 21.935424] ret_from_fork+0x10/0x20 [ 21.935476] [ 21.935499] The buggy address belongs to the object at fff00000c63cef80 [ 21.935499] which belongs to the cache kmalloc-64 of size 64 [ 21.935561] The buggy address is located 0 bytes to the right of [ 21.935561] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 21.935750] [ 21.935934] The buggy address belongs to the physical page: [ 21.936112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 21.936231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.936421] page_type: f5(slab) [ 21.936462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.936514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.936556] page dumped because: kasan: bad access detected [ 21.936633] [ 21.936654] Memory state around the buggy address: [ 21.936688] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.936733] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.936778] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.936820] ^ [ 21.936888] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.936980] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.937020] ================================================================== [ 22.023078] ================================================================== [ 22.023142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.023375] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.023685] [ 22.024090] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.024442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.024587] Hardware name: linux,dummy-virt (DT) [ 22.025016] Call trace: [ 22.025112] show_stack+0x20/0x38 (C) [ 22.025290] dump_stack_lvl+0x8c/0xd0 [ 22.025575] print_report+0x118/0x608 [ 22.025757] kasan_report+0xdc/0x128 [ 22.026305] kasan_check_range+0x100/0x1a8 [ 22.026485] __kasan_check_write+0x20/0x30 [ 22.026555] kasan_atomics_helper+0x1128/0x4858 [ 22.026743] kasan_atomics+0x198/0x2e0 [ 22.026851] kunit_try_run_case+0x170/0x3f0 [ 22.027036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.027294] kthread+0x328/0x630 [ 22.027593] ret_from_fork+0x10/0x20 [ 22.028111] [ 22.028235] Allocated by task 265: [ 22.028274] kasan_save_stack+0x3c/0x68 [ 22.028331] kasan_save_track+0x20/0x40 [ 22.028372] kasan_save_alloc_info+0x40/0x58 [ 22.028426] __kasan_kmalloc+0xd4/0xd8 [ 22.028466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.028508] kasan_atomics+0xb8/0x2e0 [ 22.028546] kunit_try_run_case+0x170/0x3f0 [ 22.028587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.028644] kthread+0x328/0x630 [ 22.028693] ret_from_fork+0x10/0x20 [ 22.028731] [ 22.028760] The buggy address belongs to the object at fff00000c63cef80 [ 22.028760] which belongs to the cache kmalloc-64 of size 64 [ 22.028822] The buggy address is located 0 bytes to the right of [ 22.028822] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.028902] [ 22.028937] The buggy address belongs to the physical page: [ 22.028973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.029031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.029081] page_type: f5(slab) [ 22.029120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.029543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.029596] page dumped because: kasan: bad access detected [ 22.029632] [ 22.029801] Memory state around the buggy address: [ 22.029840] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.029889] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.029935] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.029976] ^ [ 22.030029] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.030101] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.030167] ================================================================== [ 22.112918] ================================================================== [ 22.113057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.113110] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265 [ 22.113256] [ 22.113290] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.113419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.113465] Hardware name: linux,dummy-virt (DT) [ 22.113498] Call trace: [ 22.113538] show_stack+0x20/0x38 (C) [ 22.113589] dump_stack_lvl+0x8c/0xd0 [ 22.113779] print_report+0x118/0x608 [ 22.113960] kasan_report+0xdc/0x128 [ 22.114045] __asan_report_load8_noabort+0x20/0x30 [ 22.114119] kasan_atomics_helper+0x3df4/0x4858 [ 22.114195] kasan_atomics+0x198/0x2e0 [ 22.114260] kunit_try_run_case+0x170/0x3f0 [ 22.114312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.114380] kthread+0x328/0x630 [ 22.114425] ret_from_fork+0x10/0x20 [ 22.114490] [ 22.114511] Allocated by task 265: [ 22.114541] kasan_save_stack+0x3c/0x68 [ 22.114582] kasan_save_track+0x20/0x40 [ 22.114734] kasan_save_alloc_info+0x40/0x58 [ 22.114782] __kasan_kmalloc+0xd4/0xd8 [ 22.114822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.114873] kasan_atomics+0xb8/0x2e0 [ 22.114919] kunit_try_run_case+0x170/0x3f0 [ 22.114994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.115060] kthread+0x328/0x630 [ 22.115094] ret_from_fork+0x10/0x20 [ 22.115206] [ 22.115234] The buggy address belongs to the object at fff00000c63cef80 [ 22.115234] which belongs to the cache kmalloc-64 of size 64 [ 22.115296] The buggy address is located 0 bytes to the right of [ 22.115296] allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0) [ 22.115536] [ 22.115624] The buggy address belongs to the physical page: [ 22.115699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce [ 22.115758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.115835] page_type: f5(slab) [ 22.115900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.115954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.116106] page dumped because: kasan: bad access detected [ 22.116246] [ 22.116309] Memory state around the buggy address: [ 22.116360] fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.116408] fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.116470] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.116512] ^ [ 22.116548] fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.116591] fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.116632] ==================================================================
[ 14.907766] ================================================================== [ 14.909572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.910546] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 14.911460] [ 14.911763] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.911813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.911824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.911845] Call Trace: [ 14.911857] <TASK> [ 14.911872] dump_stack_lvl+0x73/0xb0 [ 14.911904] print_report+0xd1/0x650 [ 14.911927] ? __virt_addr_valid+0x1db/0x2d0 [ 14.911952] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.911974] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.911997] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.912020] kasan_report+0x141/0x180 [ 14.912041] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.912068] __asan_report_load4_noabort+0x18/0x20 [ 14.912093] kasan_atomics_helper+0x4bbc/0x5450 [ 14.912115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.912139] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.912165] ? kasan_atomics+0x152/0x310 [ 14.912191] kasan_atomics+0x1dc/0x310 [ 14.912214] ? __pfx_kasan_atomics+0x10/0x10 [ 14.912239] ? __pfx_read_tsc+0x10/0x10 [ 14.912259] ? ktime_get_ts64+0x86/0x230 [ 14.912285] kunit_try_run_case+0x1a5/0x480 [ 14.912309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.912356] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.912380] ? __kthread_parkme+0x82/0x180 [ 14.912401] ? preempt_count_sub+0x50/0x80 [ 14.912426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.912476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.912501] kthread+0x337/0x6f0 [ 14.912520] ? trace_preempt_on+0x20/0xc0 [ 14.912544] ? __pfx_kthread+0x10/0x10 [ 14.912564] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.912586] ? calculate_sigpending+0x7b/0xa0 [ 14.912624] ? __pfx_kthread+0x10/0x10 [ 14.912675] ret_from_fork+0x116/0x1d0 [ 14.912693] ? __pfx_kthread+0x10/0x10 [ 14.912714] ret_from_fork_asm+0x1a/0x30 [ 14.912758] </TASK> [ 14.912768] [ 14.924189] Allocated by task 283: [ 14.924350] kasan_save_stack+0x45/0x70 [ 14.924804] kasan_save_track+0x18/0x40 [ 14.925034] kasan_save_alloc_info+0x3b/0x50 [ 14.925404] __kasan_kmalloc+0xb7/0xc0 [ 14.925844] __kmalloc_cache_noprof+0x189/0x420 [ 14.926169] kasan_atomics+0x95/0x310 [ 14.926530] kunit_try_run_case+0x1a5/0x480 [ 14.926757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.927076] kthread+0x337/0x6f0 [ 14.927274] ret_from_fork+0x116/0x1d0 [ 14.927457] ret_from_fork_asm+0x1a/0x30 [ 14.927942] [ 14.928096] The buggy address belongs to the object at ffff888102ba6080 [ 14.928096] which belongs to the cache kmalloc-64 of size 64 [ 14.928668] The buggy address is located 0 bytes to the right of [ 14.928668] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 14.929650] [ 14.929870] The buggy address belongs to the physical page: [ 14.930241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 14.930671] flags: 0x200000000000000(node=0|zone=2) [ 14.930901] page_type: f5(slab) [ 14.931098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.931476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.931745] page dumped because: kasan: bad access detected [ 14.932089] [ 14.932195] Memory state around the buggy address: [ 14.932375] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.932734] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.933053] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.933362] ^ [ 14.933527] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.934033] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.934247] ================================================================== [ 15.143490] ================================================================== [ 15.143850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.144345] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.144850] [ 15.144987] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.145029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.145043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.145064] Call Trace: [ 15.145080] <TASK> [ 15.145108] dump_stack_lvl+0x73/0xb0 [ 15.145139] print_report+0xd1/0x650 [ 15.145161] ? __virt_addr_valid+0x1db/0x2d0 [ 15.145198] ? kasan_atomics_helper+0x72f/0x5450 [ 15.145221] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.145244] ? kasan_atomics_helper+0x72f/0x5450 [ 15.145267] kasan_report+0x141/0x180 [ 15.145290] ? kasan_atomics_helper+0x72f/0x5450 [ 15.145327] kasan_check_range+0x10c/0x1c0 [ 15.145352] __kasan_check_write+0x18/0x20 [ 15.145374] kasan_atomics_helper+0x72f/0x5450 [ 15.145407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.145432] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.145458] ? kasan_atomics+0x152/0x310 [ 15.145485] kasan_atomics+0x1dc/0x310 [ 15.145517] ? __pfx_kasan_atomics+0x10/0x10 [ 15.145550] ? __pfx_read_tsc+0x10/0x10 [ 15.145572] ? ktime_get_ts64+0x86/0x230 [ 15.145597] kunit_try_run_case+0x1a5/0x480 [ 15.145641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.145665] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.145690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.145720] ? __kthread_parkme+0x82/0x180 [ 15.145741] ? preempt_count_sub+0x50/0x80 [ 15.145776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.145801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.145838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.145863] kthread+0x337/0x6f0 [ 15.145884] ? trace_preempt_on+0x20/0xc0 [ 15.145909] ? __pfx_kthread+0x10/0x10 [ 15.145978] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.146015] ? calculate_sigpending+0x7b/0xa0 [ 15.146042] ? __pfx_kthread+0x10/0x10 [ 15.146065] ret_from_fork+0x116/0x1d0 [ 15.146085] ? __pfx_kthread+0x10/0x10 [ 15.146107] ret_from_fork_asm+0x1a/0x30 [ 15.146149] </TASK> [ 15.146160] [ 15.160798] Allocated by task 283: [ 15.161221] kasan_save_stack+0x45/0x70 [ 15.161578] kasan_save_track+0x18/0x40 [ 15.161789] kasan_save_alloc_info+0x3b/0x50 [ 15.162233] __kasan_kmalloc+0xb7/0xc0 [ 15.162591] __kmalloc_cache_noprof+0x189/0x420 [ 15.162816] kasan_atomics+0x95/0x310 [ 15.163343] kunit_try_run_case+0x1a5/0x480 [ 15.163722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.164290] kthread+0x337/0x6f0 [ 15.164457] ret_from_fork+0x116/0x1d0 [ 15.164874] ret_from_fork_asm+0x1a/0x30 [ 15.165332] [ 15.165572] The buggy address belongs to the object at ffff888102ba6080 [ 15.165572] which belongs to the cache kmalloc-64 of size 64 [ 15.166662] The buggy address is located 0 bytes to the right of [ 15.166662] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.167462] [ 15.167628] The buggy address belongs to the physical page: [ 15.167868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.168661] flags: 0x200000000000000(node=0|zone=2) [ 15.169448] page_type: f5(slab) [ 15.169663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.170250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.170723] page dumped because: kasan: bad access detected [ 15.171015] [ 15.171110] Memory state around the buggy address: [ 15.171322] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.171961] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.172615] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.173110] ^ [ 15.173333] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.173864] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.174454] ================================================================== [ 16.227029] ================================================================== [ 16.227324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.227707] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.227929] [ 16.228013] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.228055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.228068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.228089] Call Trace: [ 16.228103] <TASK> [ 16.228119] dump_stack_lvl+0x73/0xb0 [ 16.228147] print_report+0xd1/0x650 [ 16.228170] ? __virt_addr_valid+0x1db/0x2d0 [ 16.228193] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.228216] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.228241] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.228264] kasan_report+0x141/0x180 [ 16.228287] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.228315] kasan_check_range+0x10c/0x1c0 [ 16.228340] __kasan_check_write+0x18/0x20 [ 16.228360] kasan_atomics_helper+0x20c8/0x5450 [ 16.228384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.228408] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.228435] ? kasan_atomics+0x152/0x310 [ 16.228462] kasan_atomics+0x1dc/0x310 [ 16.228485] ? __pfx_kasan_atomics+0x10/0x10 [ 16.228511] ? __pfx_read_tsc+0x10/0x10 [ 16.228532] ? ktime_get_ts64+0x86/0x230 [ 16.228557] kunit_try_run_case+0x1a5/0x480 [ 16.228583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.228618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.228645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.228669] ? __kthread_parkme+0x82/0x180 [ 16.228691] ? preempt_count_sub+0x50/0x80 [ 16.228716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.228741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.228767] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.228794] kthread+0x337/0x6f0 [ 16.228814] ? trace_preempt_on+0x20/0xc0 [ 16.228838] ? __pfx_kthread+0x10/0x10 [ 16.228860] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.228883] ? calculate_sigpending+0x7b/0xa0 [ 16.228909] ? __pfx_kthread+0x10/0x10 [ 16.228931] ret_from_fork+0x116/0x1d0 [ 16.228958] ? __pfx_kthread+0x10/0x10 [ 16.228980] ret_from_fork_asm+0x1a/0x30 [ 16.229013] </TASK> [ 16.229025] [ 16.236747] Allocated by task 283: [ 16.236943] kasan_save_stack+0x45/0x70 [ 16.237162] kasan_save_track+0x18/0x40 [ 16.237362] kasan_save_alloc_info+0x3b/0x50 [ 16.237577] __kasan_kmalloc+0xb7/0xc0 [ 16.237785] __kmalloc_cache_noprof+0x189/0x420 [ 16.237980] kasan_atomics+0x95/0x310 [ 16.238112] kunit_try_run_case+0x1a5/0x480 [ 16.238258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.238521] kthread+0x337/0x6f0 [ 16.238697] ret_from_fork+0x116/0x1d0 [ 16.238862] ret_from_fork_asm+0x1a/0x30 [ 16.239000] [ 16.239069] The buggy address belongs to the object at ffff888102ba6080 [ 16.239069] which belongs to the cache kmalloc-64 of size 64 [ 16.239417] The buggy address is located 0 bytes to the right of [ 16.239417] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.240121] [ 16.240220] The buggy address belongs to the physical page: [ 16.240476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.240849] flags: 0x200000000000000(node=0|zone=2) [ 16.241091] page_type: f5(slab) [ 16.241216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.241443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.241903] page dumped because: kasan: bad access detected [ 16.242156] [ 16.242252] Memory state around the buggy address: [ 16.242440] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.242778] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.243053] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.243285] ^ [ 16.243443] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.243674] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.244010] ================================================================== [ 15.060770] ================================================================== [ 15.061633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.062106] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.062396] [ 15.062506] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.062551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.062565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.062588] Call Trace: [ 15.062619] <TASK> [ 15.062639] dump_stack_lvl+0x73/0xb0 [ 15.062672] print_report+0xd1/0x650 [ 15.062695] ? __virt_addr_valid+0x1db/0x2d0 [ 15.062720] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.062742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.062767] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.062790] kasan_report+0x141/0x180 [ 15.062813] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.062840] __asan_report_store4_noabort+0x1b/0x30 [ 15.062867] kasan_atomics_helper+0x4b3a/0x5450 [ 15.062891] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.062914] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.062942] ? kasan_atomics+0x152/0x310 [ 15.062970] kasan_atomics+0x1dc/0x310 [ 15.062993] ? __pfx_kasan_atomics+0x10/0x10 [ 15.063019] ? __pfx_read_tsc+0x10/0x10 [ 15.063041] ? ktime_get_ts64+0x86/0x230 [ 15.063067] kunit_try_run_case+0x1a5/0x480 [ 15.063093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.063117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.063143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.063170] ? __kthread_parkme+0x82/0x180 [ 15.063193] ? preempt_count_sub+0x50/0x80 [ 15.063219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.063245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.063271] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.063297] kthread+0x337/0x6f0 [ 15.063317] ? trace_preempt_on+0x20/0xc0 [ 15.063343] ? __pfx_kthread+0x10/0x10 [ 15.063365] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.063387] ? calculate_sigpending+0x7b/0xa0 [ 15.063414] ? __pfx_kthread+0x10/0x10 [ 15.063437] ret_from_fork+0x116/0x1d0 [ 15.063457] ? __pfx_kthread+0x10/0x10 [ 15.063478] ret_from_fork_asm+0x1a/0x30 [ 15.063512] </TASK> [ 15.063524] [ 15.072198] Allocated by task 283: [ 15.072657] kasan_save_stack+0x45/0x70 [ 15.072868] kasan_save_track+0x18/0x40 [ 15.073166] kasan_save_alloc_info+0x3b/0x50 [ 15.073349] __kasan_kmalloc+0xb7/0xc0 [ 15.073539] __kmalloc_cache_noprof+0x189/0x420 [ 15.073780] kasan_atomics+0x95/0x310 [ 15.073917] kunit_try_run_case+0x1a5/0x480 [ 15.074336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.074642] kthread+0x337/0x6f0 [ 15.074791] ret_from_fork+0x116/0x1d0 [ 15.075076] ret_from_fork_asm+0x1a/0x30 [ 15.075294] [ 15.075382] The buggy address belongs to the object at ffff888102ba6080 [ 15.075382] which belongs to the cache kmalloc-64 of size 64 [ 15.075859] The buggy address is located 0 bytes to the right of [ 15.075859] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.076345] [ 15.076447] The buggy address belongs to the physical page: [ 15.076709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.077359] flags: 0x200000000000000(node=0|zone=2) [ 15.077660] page_type: f5(slab) [ 15.077853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.078088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.078705] page dumped because: kasan: bad access detected [ 15.078996] [ 15.079107] Memory state around the buggy address: [ 15.079442] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.079743] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.080259] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.080583] ^ [ 15.080821] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.081166] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.081518] ================================================================== [ 16.329404] ================================================================== [ 16.329803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.330338] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.330681] [ 16.330808] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.330848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.330861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.330882] Call Trace: [ 16.330899] <TASK> [ 16.330914] dump_stack_lvl+0x73/0xb0 [ 16.330942] print_report+0xd1/0x650 [ 16.330965] ? __virt_addr_valid+0x1db/0x2d0 [ 16.330988] ? kasan_atomics_helper+0x224c/0x5450 [ 16.331011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.331035] ? kasan_atomics_helper+0x224c/0x5450 [ 16.331057] kasan_report+0x141/0x180 [ 16.331080] ? kasan_atomics_helper+0x224c/0x5450 [ 16.331109] kasan_check_range+0x10c/0x1c0 [ 16.331134] __kasan_check_write+0x18/0x20 [ 16.331155] kasan_atomics_helper+0x224c/0x5450 [ 16.331179] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.331203] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.331229] ? kasan_atomics+0x152/0x310 [ 16.331257] kasan_atomics+0x1dc/0x310 [ 16.331280] ? __pfx_kasan_atomics+0x10/0x10 [ 16.331306] ? __pfx_read_tsc+0x10/0x10 [ 16.331327] ? ktime_get_ts64+0x86/0x230 [ 16.331352] kunit_try_run_case+0x1a5/0x480 [ 16.331389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.331413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.331439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.331476] ? __kthread_parkme+0x82/0x180 [ 16.331498] ? preempt_count_sub+0x50/0x80 [ 16.331523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.331559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.331584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.331627] kthread+0x337/0x6f0 [ 16.331646] ? trace_preempt_on+0x20/0xc0 [ 16.331692] ? __pfx_kthread+0x10/0x10 [ 16.331715] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.331737] ? calculate_sigpending+0x7b/0xa0 [ 16.331763] ? __pfx_kthread+0x10/0x10 [ 16.331785] ret_from_fork+0x116/0x1d0 [ 16.331805] ? __pfx_kthread+0x10/0x10 [ 16.331826] ret_from_fork_asm+0x1a/0x30 [ 16.331860] </TASK> [ 16.331870] [ 16.339637] Allocated by task 283: [ 16.339763] kasan_save_stack+0x45/0x70 [ 16.339906] kasan_save_track+0x18/0x40 [ 16.340098] kasan_save_alloc_info+0x3b/0x50 [ 16.340322] __kasan_kmalloc+0xb7/0xc0 [ 16.340507] __kmalloc_cache_noprof+0x189/0x420 [ 16.340710] kasan_atomics+0x95/0x310 [ 16.340851] kunit_try_run_case+0x1a5/0x480 [ 16.341301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.341576] kthread+0x337/0x6f0 [ 16.341819] ret_from_fork+0x116/0x1d0 [ 16.342012] ret_from_fork_asm+0x1a/0x30 [ 16.342159] [ 16.342229] The buggy address belongs to the object at ffff888102ba6080 [ 16.342229] which belongs to the cache kmalloc-64 of size 64 [ 16.342678] The buggy address is located 0 bytes to the right of [ 16.342678] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.343172] [ 16.343244] The buggy address belongs to the physical page: [ 16.343416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.343767] flags: 0x200000000000000(node=0|zone=2) [ 16.344004] page_type: f5(slab) [ 16.344198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.344628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.344982] page dumped because: kasan: bad access detected [ 16.345239] [ 16.345324] Memory state around the buggy address: [ 16.345479] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.345828] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.346162] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.346421] ^ [ 16.346810] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.347154] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.347403] ================================================================== [ 16.173714] ================================================================== [ 16.174376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.174703] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.175011] [ 16.175121] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.175163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.175175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.175197] Call Trace: [ 16.175214] <TASK> [ 16.175231] dump_stack_lvl+0x73/0xb0 [ 16.175259] print_report+0xd1/0x650 [ 16.175282] ? __virt_addr_valid+0x1db/0x2d0 [ 16.175305] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.175327] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.175351] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.175374] kasan_report+0x141/0x180 [ 16.175397] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.175425] __asan_report_load8_noabort+0x18/0x20 [ 16.175451] kasan_atomics_helper+0x4f71/0x5450 [ 16.175475] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.175500] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.175541] ? kasan_atomics+0x152/0x310 [ 16.175568] kasan_atomics+0x1dc/0x310 [ 16.175592] ? __pfx_kasan_atomics+0x10/0x10 [ 16.175627] ? __pfx_read_tsc+0x10/0x10 [ 16.175649] ? ktime_get_ts64+0x86/0x230 [ 16.175674] kunit_try_run_case+0x1a5/0x480 [ 16.175699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175724] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.175749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.175775] ? __kthread_parkme+0x82/0x180 [ 16.175796] ? preempt_count_sub+0x50/0x80 [ 16.175822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.175847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.175873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.175899] kthread+0x337/0x6f0 [ 16.175919] ? trace_preempt_on+0x20/0xc0 [ 16.175944] ? __pfx_kthread+0x10/0x10 [ 16.175966] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.175989] ? calculate_sigpending+0x7b/0xa0 [ 16.176015] ? __pfx_kthread+0x10/0x10 [ 16.176037] ret_from_fork+0x116/0x1d0 [ 16.176056] ? __pfx_kthread+0x10/0x10 [ 16.176077] ret_from_fork_asm+0x1a/0x30 [ 16.176109] </TASK> [ 16.176119] [ 16.183459] Allocated by task 283: [ 16.183693] kasan_save_stack+0x45/0x70 [ 16.183853] kasan_save_track+0x18/0x40 [ 16.184043] kasan_save_alloc_info+0x3b/0x50 [ 16.184238] __kasan_kmalloc+0xb7/0xc0 [ 16.184418] __kmalloc_cache_noprof+0x189/0x420 [ 16.184630] kasan_atomics+0x95/0x310 [ 16.184815] kunit_try_run_case+0x1a5/0x480 [ 16.184999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.185174] kthread+0x337/0x6f0 [ 16.185293] ret_from_fork+0x116/0x1d0 [ 16.185423] ret_from_fork_asm+0x1a/0x30 [ 16.185562] [ 16.185641] The buggy address belongs to the object at ffff888102ba6080 [ 16.185641] which belongs to the cache kmalloc-64 of size 64 [ 16.185990] The buggy address is located 0 bytes to the right of [ 16.185990] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.186449] [ 16.186644] The buggy address belongs to the physical page: [ 16.186890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.187229] flags: 0x200000000000000(node=0|zone=2) [ 16.187450] page_type: f5(slab) [ 16.187675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.188009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.188338] page dumped because: kasan: bad access detected [ 16.188687] [ 16.188784] Memory state around the buggy address: [ 16.188947] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.189161] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.189374] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.189806] ^ [ 16.190032] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.190357] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.190922] ================================================================== [ 15.728519] ================================================================== [ 15.729209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.729465] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.729737] [ 15.729957] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.730005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.730030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.730053] Call Trace: [ 15.730074] <TASK> [ 15.730106] dump_stack_lvl+0x73/0xb0 [ 15.730138] print_report+0xd1/0x650 [ 15.730173] ? __virt_addr_valid+0x1db/0x2d0 [ 15.730199] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.730222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.730247] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.730270] kasan_report+0x141/0x180 [ 15.730294] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.730322] __asan_report_load8_noabort+0x18/0x20 [ 15.730349] kasan_atomics_helper+0x4eae/0x5450 [ 15.730377] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.730401] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.730430] ? kasan_atomics+0x152/0x310 [ 15.730468] kasan_atomics+0x1dc/0x310 [ 15.730492] ? __pfx_kasan_atomics+0x10/0x10 [ 15.730537] ? __pfx_read_tsc+0x10/0x10 [ 15.730561] ? ktime_get_ts64+0x86/0x230 [ 15.730587] kunit_try_run_case+0x1a5/0x480 [ 15.730626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.730650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.730676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.730701] ? __kthread_parkme+0x82/0x180 [ 15.730724] ? preempt_count_sub+0x50/0x80 [ 15.730749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.730775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.730801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.730827] kthread+0x337/0x6f0 [ 15.730848] ? trace_preempt_on+0x20/0xc0 [ 15.730873] ? __pfx_kthread+0x10/0x10 [ 15.730895] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.730918] ? calculate_sigpending+0x7b/0xa0 [ 15.730943] ? __pfx_kthread+0x10/0x10 [ 15.730966] ret_from_fork+0x116/0x1d0 [ 15.730986] ? __pfx_kthread+0x10/0x10 [ 15.731007] ret_from_fork_asm+0x1a/0x30 [ 15.731041] </TASK> [ 15.731052] [ 15.740881] Allocated by task 283: [ 15.741015] kasan_save_stack+0x45/0x70 [ 15.741160] kasan_save_track+0x18/0x40 [ 15.741295] kasan_save_alloc_info+0x3b/0x50 [ 15.741444] __kasan_kmalloc+0xb7/0xc0 [ 15.741628] __kmalloc_cache_noprof+0x189/0x420 [ 15.741971] kasan_atomics+0x95/0x310 [ 15.742308] kunit_try_run_case+0x1a5/0x480 [ 15.742834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743342] kthread+0x337/0x6f0 [ 15.743730] ret_from_fork+0x116/0x1d0 [ 15.744060] ret_from_fork_asm+0x1a/0x30 [ 15.744406] [ 15.744573] The buggy address belongs to the object at ffff888102ba6080 [ 15.744573] which belongs to the cache kmalloc-64 of size 64 [ 15.745629] The buggy address is located 0 bytes to the right of [ 15.745629] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.746744] [ 15.746911] The buggy address belongs to the physical page: [ 15.747393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.748158] flags: 0x200000000000000(node=0|zone=2) [ 15.748501] page_type: f5(slab) [ 15.748834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.749120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.749345] page dumped because: kasan: bad access detected [ 15.749535] [ 15.749697] Memory state around the buggy address: [ 15.750105] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.750811] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.751408] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.752019] ^ [ 15.752436] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.753147] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.753650] ================================================================== [ 16.097093] ================================================================== [ 16.097542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.097900] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.098465] [ 16.098680] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.098821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.098835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.098856] Call Trace: [ 16.098873] <TASK> [ 16.098890] dump_stack_lvl+0x73/0xb0 [ 16.098921] print_report+0xd1/0x650 [ 16.098942] ? __virt_addr_valid+0x1db/0x2d0 [ 16.098966] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.098989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.099013] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.099036] kasan_report+0x141/0x180 [ 16.099059] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.099088] kasan_check_range+0x10c/0x1c0 [ 16.099112] __kasan_check_write+0x18/0x20 [ 16.099133] kasan_atomics_helper+0x1d7a/0x5450 [ 16.099156] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.099180] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.099206] ? kasan_atomics+0x152/0x310 [ 16.099233] kasan_atomics+0x1dc/0x310 [ 16.099257] ? __pfx_kasan_atomics+0x10/0x10 [ 16.099282] ? __pfx_read_tsc+0x10/0x10 [ 16.099304] ? ktime_get_ts64+0x86/0x230 [ 16.099328] kunit_try_run_case+0x1a5/0x480 [ 16.099353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.099377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.099402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.099427] ? __kthread_parkme+0x82/0x180 [ 16.099449] ? preempt_count_sub+0x50/0x80 [ 16.099474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.099617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.099647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.099673] kthread+0x337/0x6f0 [ 16.099694] ? trace_preempt_on+0x20/0xc0 [ 16.099719] ? __pfx_kthread+0x10/0x10 [ 16.099740] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.099763] ? calculate_sigpending+0x7b/0xa0 [ 16.099788] ? __pfx_kthread+0x10/0x10 [ 16.099811] ret_from_fork+0x116/0x1d0 [ 16.099830] ? __pfx_kthread+0x10/0x10 [ 16.099851] ret_from_fork_asm+0x1a/0x30 [ 16.099884] </TASK> [ 16.099895] [ 16.109901] Allocated by task 283: [ 16.110216] kasan_save_stack+0x45/0x70 [ 16.110372] kasan_save_track+0x18/0x40 [ 16.110715] kasan_save_alloc_info+0x3b/0x50 [ 16.110941] __kasan_kmalloc+0xb7/0xc0 [ 16.111123] __kmalloc_cache_noprof+0x189/0x420 [ 16.111327] kasan_atomics+0x95/0x310 [ 16.111495] kunit_try_run_case+0x1a5/0x480 [ 16.111934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.112130] kthread+0x337/0x6f0 [ 16.112422] ret_from_fork+0x116/0x1d0 [ 16.112637] ret_from_fork_asm+0x1a/0x30 [ 16.113001] [ 16.113085] The buggy address belongs to the object at ffff888102ba6080 [ 16.113085] which belongs to the cache kmalloc-64 of size 64 [ 16.113771] The buggy address is located 0 bytes to the right of [ 16.113771] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.114471] [ 16.114552] The buggy address belongs to the physical page: [ 16.115042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.115452] flags: 0x200000000000000(node=0|zone=2) [ 16.115655] page_type: f5(slab) [ 16.115984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.116403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.116743] page dumped because: kasan: bad access detected [ 16.117004] [ 16.117086] Memory state around the buggy address: [ 16.117288] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.117575] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.118195] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.118611] ^ [ 16.118795] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.119221] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.119619] ================================================================== [ 16.156394] ================================================================== [ 16.156750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.157188] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.157518] [ 16.157635] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.157676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.157689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.157714] Call Trace: [ 16.157731] <TASK> [ 16.157748] dump_stack_lvl+0x73/0xb0 [ 16.157775] print_report+0xd1/0x650 [ 16.157797] ? __virt_addr_valid+0x1db/0x2d0 [ 16.157819] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.157840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.157863] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.157885] kasan_report+0x141/0x180 [ 16.157922] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.157951] kasan_check_range+0x10c/0x1c0 [ 16.157975] __kasan_check_write+0x18/0x20 [ 16.157996] kasan_atomics_helper+0x1f43/0x5450 [ 16.158020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.158044] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.158071] ? kasan_atomics+0x152/0x310 [ 16.158100] kasan_atomics+0x1dc/0x310 [ 16.158124] ? __pfx_kasan_atomics+0x10/0x10 [ 16.158149] ? __pfx_read_tsc+0x10/0x10 [ 16.158171] ? ktime_get_ts64+0x86/0x230 [ 16.158197] kunit_try_run_case+0x1a5/0x480 [ 16.158222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.158246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.158271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.158296] ? __kthread_parkme+0x82/0x180 [ 16.158318] ? preempt_count_sub+0x50/0x80 [ 16.158344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.158370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.158396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.158422] kthread+0x337/0x6f0 [ 16.158441] ? trace_preempt_on+0x20/0xc0 [ 16.158466] ? __pfx_kthread+0x10/0x10 [ 16.158488] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.158510] ? calculate_sigpending+0x7b/0xa0 [ 16.158545] ? __pfx_kthread+0x10/0x10 [ 16.158567] ret_from_fork+0x116/0x1d0 [ 16.158587] ? __pfx_kthread+0x10/0x10 [ 16.158619] ret_from_fork_asm+0x1a/0x30 [ 16.158652] </TASK> [ 16.158663] [ 16.166062] Allocated by task 283: [ 16.166224] kasan_save_stack+0x45/0x70 [ 16.166401] kasan_save_track+0x18/0x40 [ 16.166582] kasan_save_alloc_info+0x3b/0x50 [ 16.166787] __kasan_kmalloc+0xb7/0xc0 [ 16.166949] __kmalloc_cache_noprof+0x189/0x420 [ 16.167105] kasan_atomics+0x95/0x310 [ 16.167239] kunit_try_run_case+0x1a5/0x480 [ 16.167385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.167667] kthread+0x337/0x6f0 [ 16.167835] ret_from_fork+0x116/0x1d0 [ 16.168035] ret_from_fork_asm+0x1a/0x30 [ 16.168232] [ 16.168324] The buggy address belongs to the object at ffff888102ba6080 [ 16.168324] which belongs to the cache kmalloc-64 of size 64 [ 16.168934] The buggy address is located 0 bytes to the right of [ 16.168934] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.169367] [ 16.169438] The buggy address belongs to the physical page: [ 16.169710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.170245] flags: 0x200000000000000(node=0|zone=2) [ 16.170546] page_type: f5(slab) [ 16.170677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.170907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.171131] page dumped because: kasan: bad access detected [ 16.171302] [ 16.171370] Memory state around the buggy address: [ 16.171592] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.171925] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.172237] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.172545] ^ [ 16.172775] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.173079] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.173297] ================================================================== [ 15.662329] ================================================================== [ 15.662700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.663179] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.663514] [ 15.663636] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.663680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.663692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.663714] Call Trace: [ 15.663731] <TASK> [ 15.663749] dump_stack_lvl+0x73/0xb0 [ 15.663778] print_report+0xd1/0x650 [ 15.663801] ? __virt_addr_valid+0x1db/0x2d0 [ 15.663826] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.663847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.663871] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.663894] kasan_report+0x141/0x180 [ 15.663917] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.663945] kasan_check_range+0x10c/0x1c0 [ 15.663970] __kasan_check_write+0x18/0x20 [ 15.663990] kasan_atomics_helper+0x12e6/0x5450 [ 15.664014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.664038] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.664065] ? kasan_atomics+0x152/0x310 [ 15.664092] kasan_atomics+0x1dc/0x310 [ 15.664115] ? __pfx_kasan_atomics+0x10/0x10 [ 15.664141] ? __pfx_read_tsc+0x10/0x10 [ 15.664163] ? ktime_get_ts64+0x86/0x230 [ 15.664189] kunit_try_run_case+0x1a5/0x480 [ 15.664214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.664238] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.664265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.664290] ? __kthread_parkme+0x82/0x180 [ 15.664312] ? preempt_count_sub+0x50/0x80 [ 15.664338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.664363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.664389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.664415] kthread+0x337/0x6f0 [ 15.664435] ? trace_preempt_on+0x20/0xc0 [ 15.664460] ? __pfx_kthread+0x10/0x10 [ 15.664482] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.664504] ? calculate_sigpending+0x7b/0xa0 [ 15.664530] ? __pfx_kthread+0x10/0x10 [ 15.664552] ret_from_fork+0x116/0x1d0 [ 15.664571] ? __pfx_kthread+0x10/0x10 [ 15.664593] ret_from_fork_asm+0x1a/0x30 [ 15.664635] </TASK> [ 15.664646] [ 15.672109] Allocated by task 283: [ 15.672298] kasan_save_stack+0x45/0x70 [ 15.672511] kasan_save_track+0x18/0x40 [ 15.672710] kasan_save_alloc_info+0x3b/0x50 [ 15.672874] __kasan_kmalloc+0xb7/0xc0 [ 15.673017] __kmalloc_cache_noprof+0x189/0x420 [ 15.673243] kasan_atomics+0x95/0x310 [ 15.673433] kunit_try_run_case+0x1a5/0x480 [ 15.673647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.673897] kthread+0x337/0x6f0 [ 15.674049] ret_from_fork+0x116/0x1d0 [ 15.674222] ret_from_fork_asm+0x1a/0x30 [ 15.674402] [ 15.674495] The buggy address belongs to the object at ffff888102ba6080 [ 15.674495] which belongs to the cache kmalloc-64 of size 64 [ 15.674974] The buggy address is located 0 bytes to the right of [ 15.674974] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.675446] [ 15.675539] The buggy address belongs to the physical page: [ 15.675798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.676107] flags: 0x200000000000000(node=0|zone=2) [ 15.676296] page_type: f5(slab) [ 15.676416] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.677008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.677296] page dumped because: kasan: bad access detected [ 15.677466] [ 15.677613] Memory state around the buggy address: [ 15.677848] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.678145] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.678415] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.678814] ^ [ 15.679010] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.679264] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.679477] ================================================================== [ 15.697820] ================================================================== [ 15.698212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.699146] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.699410] [ 15.699503] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.699548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.699561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.699584] Call Trace: [ 15.699612] <TASK> [ 15.699630] dump_stack_lvl+0x73/0xb0 [ 15.699662] print_report+0xd1/0x650 [ 15.699685] ? __virt_addr_valid+0x1db/0x2d0 [ 15.699710] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.700738] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.700782] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.700806] kasan_report+0x141/0x180 [ 15.700831] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.700866] kasan_check_range+0x10c/0x1c0 [ 15.700891] __kasan_check_read+0x15/0x20 [ 15.700910] kasan_atomics_helper+0x13b5/0x5450 [ 15.700934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.700959] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.700986] ? kasan_atomics+0x152/0x310 [ 15.701012] kasan_atomics+0x1dc/0x310 [ 15.701036] ? __pfx_kasan_atomics+0x10/0x10 [ 15.701061] ? __pfx_read_tsc+0x10/0x10 [ 15.701084] ? ktime_get_ts64+0x86/0x230 [ 15.701109] kunit_try_run_case+0x1a5/0x480 [ 15.701136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701160] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.701187] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.701212] ? __kthread_parkme+0x82/0x180 [ 15.701234] ? preempt_count_sub+0x50/0x80 [ 15.701259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.701310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.701336] kthread+0x337/0x6f0 [ 15.701356] ? trace_preempt_on+0x20/0xc0 [ 15.701381] ? __pfx_kthread+0x10/0x10 [ 15.701403] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.701425] ? calculate_sigpending+0x7b/0xa0 [ 15.701451] ? __pfx_kthread+0x10/0x10 [ 15.701474] ret_from_fork+0x116/0x1d0 [ 15.701493] ? __pfx_kthread+0x10/0x10 [ 15.701526] ret_from_fork_asm+0x1a/0x30 [ 15.701560] </TASK> [ 15.701572] [ 15.714093] Allocated by task 283: [ 15.714477] kasan_save_stack+0x45/0x70 [ 15.714897] kasan_save_track+0x18/0x40 [ 15.715279] kasan_save_alloc_info+0x3b/0x50 [ 15.715464] __kasan_kmalloc+0xb7/0xc0 [ 15.715893] __kmalloc_cache_noprof+0x189/0x420 [ 15.716280] kasan_atomics+0x95/0x310 [ 15.716414] kunit_try_run_case+0x1a5/0x480 [ 15.716610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.717116] kthread+0x337/0x6f0 [ 15.717432] ret_from_fork+0x116/0x1d0 [ 15.717830] ret_from_fork_asm+0x1a/0x30 [ 15.718205] [ 15.718377] The buggy address belongs to the object at ffff888102ba6080 [ 15.718377] which belongs to the cache kmalloc-64 of size 64 [ 15.719165] The buggy address is located 0 bytes to the right of [ 15.719165] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.719541] [ 15.719627] The buggy address belongs to the physical page: [ 15.719939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.720693] flags: 0x200000000000000(node=0|zone=2) [ 15.721033] page_type: f5(slab) [ 15.721158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.721387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.721876] page dumped because: kasan: bad access detected [ 15.722374] [ 15.722536] Memory state around the buggy address: [ 15.723057] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.723732] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.724335] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.725039] ^ [ 15.725382] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.725657] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726281] ================================================================== [ 16.348167] ================================================================== [ 16.348490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.348818] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.349152] [ 16.349261] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.349312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.349324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.349345] Call Trace: [ 16.349358] <TASK> [ 16.349384] dump_stack_lvl+0x73/0xb0 [ 16.349413] print_report+0xd1/0x650 [ 16.349435] ? __virt_addr_valid+0x1db/0x2d0 [ 16.349458] ? kasan_atomics_helper+0x5115/0x5450 [ 16.349480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.349504] ? kasan_atomics_helper+0x5115/0x5450 [ 16.349540] kasan_report+0x141/0x180 [ 16.349564] ? kasan_atomics_helper+0x5115/0x5450 [ 16.349592] __asan_report_load8_noabort+0x18/0x20 [ 16.349627] kasan_atomics_helper+0x5115/0x5450 [ 16.349651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.349684] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.349715] ? kasan_atomics+0x152/0x310 [ 16.349742] kasan_atomics+0x1dc/0x310 [ 16.349776] ? __pfx_kasan_atomics+0x10/0x10 [ 16.349802] ? __pfx_read_tsc+0x10/0x10 [ 16.349823] ? ktime_get_ts64+0x86/0x230 [ 16.349848] kunit_try_run_case+0x1a5/0x480 [ 16.349882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.349906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.349931] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.349967] ? __kthread_parkme+0x82/0x180 [ 16.349988] ? preempt_count_sub+0x50/0x80 [ 16.350014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.350039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.350064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.350091] kthread+0x337/0x6f0 [ 16.350111] ? trace_preempt_on+0x20/0xc0 [ 16.350135] ? __pfx_kthread+0x10/0x10 [ 16.350157] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.350180] ? calculate_sigpending+0x7b/0xa0 [ 16.350205] ? __pfx_kthread+0x10/0x10 [ 16.350227] ret_from_fork+0x116/0x1d0 [ 16.350246] ? __pfx_kthread+0x10/0x10 [ 16.350276] ret_from_fork_asm+0x1a/0x30 [ 16.350310] </TASK> [ 16.350320] [ 16.357697] Allocated by task 283: [ 16.357907] kasan_save_stack+0x45/0x70 [ 16.358206] kasan_save_track+0x18/0x40 [ 16.358435] kasan_save_alloc_info+0x3b/0x50 [ 16.358888] __kasan_kmalloc+0xb7/0xc0 [ 16.359068] __kmalloc_cache_noprof+0x189/0x420 [ 16.359249] kasan_atomics+0x95/0x310 [ 16.359448] kunit_try_run_case+0x1a5/0x480 [ 16.359665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.359941] kthread+0x337/0x6f0 [ 16.360064] ret_from_fork+0x116/0x1d0 [ 16.360197] ret_from_fork_asm+0x1a/0x30 [ 16.360359] [ 16.360454] The buggy address belongs to the object at ffff888102ba6080 [ 16.360454] which belongs to the cache kmalloc-64 of size 64 [ 16.361501] The buggy address is located 0 bytes to the right of [ 16.361501] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.361936] [ 16.362009] The buggy address belongs to the physical page: [ 16.362180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.362653] flags: 0x200000000000000(node=0|zone=2) [ 16.362885] page_type: f5(slab) [ 16.363049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.363384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.363763] page dumped because: kasan: bad access detected [ 16.363935] [ 16.364007] Memory state around the buggy address: [ 16.364162] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.364419] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.365052] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.365398] ^ [ 16.365634] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.365946] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.366250] ================================================================== [ 15.548765] ================================================================== [ 15.549274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.549834] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.550261] [ 15.550390] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.550438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.550451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.550473] Call Trace: [ 15.550493] <TASK> [ 15.550675] dump_stack_lvl+0x73/0xb0 [ 15.550712] print_report+0xd1/0x650 [ 15.550737] ? __virt_addr_valid+0x1db/0x2d0 [ 15.550762] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.550784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.550845] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.550868] kasan_report+0x141/0x180 [ 15.550892] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.550921] __asan_report_load4_noabort+0x18/0x20 [ 15.550947] kasan_atomics_helper+0x4a1c/0x5450 [ 15.550971] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.550994] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.551021] ? kasan_atomics+0x152/0x310 [ 15.551049] kasan_atomics+0x1dc/0x310 [ 15.551072] ? __pfx_kasan_atomics+0x10/0x10 [ 15.551097] ? __pfx_read_tsc+0x10/0x10 [ 15.551119] ? ktime_get_ts64+0x86/0x230 [ 15.551145] kunit_try_run_case+0x1a5/0x480 [ 15.551172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.551195] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.551222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.551247] ? __kthread_parkme+0x82/0x180 [ 15.551269] ? preempt_count_sub+0x50/0x80 [ 15.551295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.551320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.551346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.551373] kthread+0x337/0x6f0 [ 15.551393] ? trace_preempt_on+0x20/0xc0 [ 15.551419] ? __pfx_kthread+0x10/0x10 [ 15.551441] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.551464] ? calculate_sigpending+0x7b/0xa0 [ 15.551491] ? __pfx_kthread+0x10/0x10 [ 15.551526] ret_from_fork+0x116/0x1d0 [ 15.551545] ? __pfx_kthread+0x10/0x10 [ 15.551568] ret_from_fork_asm+0x1a/0x30 [ 15.551613] </TASK> [ 15.551624] [ 15.558717] Allocated by task 283: [ 15.558898] kasan_save_stack+0x45/0x70 [ 15.559101] kasan_save_track+0x18/0x40 [ 15.559299] kasan_save_alloc_info+0x3b/0x50 [ 15.559515] __kasan_kmalloc+0xb7/0xc0 [ 15.559716] __kmalloc_cache_noprof+0x189/0x420 [ 15.559916] kasan_atomics+0x95/0x310 [ 15.560077] kunit_try_run_case+0x1a5/0x480 [ 15.560231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.560409] kthread+0x337/0x6f0 [ 15.560573] ret_from_fork+0x116/0x1d0 [ 15.560768] ret_from_fork_asm+0x1a/0x30 [ 15.561153] [ 15.561313] The buggy address belongs to the object at ffff888102ba6080 [ 15.561313] which belongs to the cache kmalloc-64 of size 64 [ 15.561828] The buggy address is located 0 bytes to the right of [ 15.561828] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.562298] [ 15.562397] The buggy address belongs to the physical page: [ 15.562643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.562886] flags: 0x200000000000000(node=0|zone=2) [ 15.563109] page_type: f5(slab) [ 15.563277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.563618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.563841] page dumped because: kasan: bad access detected [ 15.564008] [ 15.564137] Memory state around the buggy address: [ 15.564359] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.564908] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.565226] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.565440] ^ [ 15.565730] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.566035] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.566306] ================================================================== [ 15.754256] ================================================================== [ 15.754498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.754785] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.755103] [ 15.755339] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.755389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.755403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.755425] Call Trace: [ 15.755444] <TASK> [ 15.755464] dump_stack_lvl+0x73/0xb0 [ 15.755498] print_report+0xd1/0x650 [ 15.755522] ? __virt_addr_valid+0x1db/0x2d0 [ 15.755547] ? kasan_atomics_helper+0x1467/0x5450 [ 15.755570] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.755595] ? kasan_atomics_helper+0x1467/0x5450 [ 15.755644] kasan_report+0x141/0x180 [ 15.755667] ? kasan_atomics_helper+0x1467/0x5450 [ 15.755695] kasan_check_range+0x10c/0x1c0 [ 15.755721] __kasan_check_write+0x18/0x20 [ 15.755741] kasan_atomics_helper+0x1467/0x5450 [ 15.755765] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.755790] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.755816] ? kasan_atomics+0x152/0x310 [ 15.755844] kasan_atomics+0x1dc/0x310 [ 15.755867] ? __pfx_kasan_atomics+0x10/0x10 [ 15.755893] ? __pfx_read_tsc+0x10/0x10 [ 15.755915] ? ktime_get_ts64+0x86/0x230 [ 15.755942] kunit_try_run_case+0x1a5/0x480 [ 15.755967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.755991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.756017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.756042] ? __kthread_parkme+0x82/0x180 [ 15.756065] ? preempt_count_sub+0x50/0x80 [ 15.756090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.756116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.756142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.756169] kthread+0x337/0x6f0 [ 15.756189] ? trace_preempt_on+0x20/0xc0 [ 15.756214] ? __pfx_kthread+0x10/0x10 [ 15.756236] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.756258] ? calculate_sigpending+0x7b/0xa0 [ 15.756284] ? __pfx_kthread+0x10/0x10 [ 15.756307] ret_from_fork+0x116/0x1d0 [ 15.756326] ? __pfx_kthread+0x10/0x10 [ 15.756347] ret_from_fork_asm+0x1a/0x30 [ 15.756380] </TASK> [ 15.756391] [ 15.763669] Allocated by task 283: [ 15.763848] kasan_save_stack+0x45/0x70 [ 15.764051] kasan_save_track+0x18/0x40 [ 15.764249] kasan_save_alloc_info+0x3b/0x50 [ 15.764468] __kasan_kmalloc+0xb7/0xc0 [ 15.764643] __kmalloc_cache_noprof+0x189/0x420 [ 15.764799] kasan_atomics+0x95/0x310 [ 15.765003] kunit_try_run_case+0x1a5/0x480 [ 15.765223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.765476] kthread+0x337/0x6f0 [ 15.765667] ret_from_fork+0x116/0x1d0 [ 15.765810] ret_from_fork_asm+0x1a/0x30 [ 15.765950] [ 15.766020] The buggy address belongs to the object at ffff888102ba6080 [ 15.766020] which belongs to the cache kmalloc-64 of size 64 [ 15.766422] The buggy address is located 0 bytes to the right of [ 15.766422] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.766976] [ 15.767074] The buggy address belongs to the physical page: [ 15.767328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.767737] flags: 0x200000000000000(node=0|zone=2) [ 15.767958] page_type: f5(slab) [ 15.768114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.768380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.768614] page dumped because: kasan: bad access detected [ 15.768784] [ 15.768870] Memory state around the buggy address: [ 15.769235] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.769554] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.769892] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.770305] ^ [ 15.770540] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.770817] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.771029] ================================================================== [ 15.995477] ================================================================== [ 15.995848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.996238] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.996591] [ 15.996787] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.996845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.996858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.996880] Call Trace: [ 15.996901] <TASK> [ 15.996921] dump_stack_lvl+0x73/0xb0 [ 15.996985] print_report+0xd1/0x650 [ 15.997009] ? __virt_addr_valid+0x1db/0x2d0 [ 15.997032] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.997066] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.997091] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.997140] kasan_report+0x141/0x180 [ 15.997163] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.997219] kasan_check_range+0x10c/0x1c0 [ 15.997243] __kasan_check_write+0x18/0x20 [ 15.997264] kasan_atomics_helper+0x1b22/0x5450 [ 15.997288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.997312] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.997339] ? kasan_atomics+0x152/0x310 [ 15.997392] kasan_atomics+0x1dc/0x310 [ 15.997415] ? __pfx_kasan_atomics+0x10/0x10 [ 15.997451] ? __pfx_read_tsc+0x10/0x10 [ 15.997475] ? ktime_get_ts64+0x86/0x230 [ 15.997501] kunit_try_run_case+0x1a5/0x480 [ 15.997527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.997551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.997578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.997655] ? __kthread_parkme+0x82/0x180 [ 15.997678] ? preempt_count_sub+0x50/0x80 [ 15.997719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.997745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.997771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.997826] kthread+0x337/0x6f0 [ 15.997847] ? trace_preempt_on+0x20/0xc0 [ 15.997872] ? __pfx_kthread+0x10/0x10 [ 15.997906] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.997929] ? calculate_sigpending+0x7b/0xa0 [ 15.997955] ? __pfx_kthread+0x10/0x10 [ 15.997978] ret_from_fork+0x116/0x1d0 [ 15.997999] ? __pfx_kthread+0x10/0x10 [ 15.998020] ret_from_fork_asm+0x1a/0x30 [ 15.998054] </TASK> [ 15.998065] [ 16.008621] Allocated by task 283: [ 16.008898] kasan_save_stack+0x45/0x70 [ 16.009205] kasan_save_track+0x18/0x40 [ 16.009496] kasan_save_alloc_info+0x3b/0x50 [ 16.009834] __kasan_kmalloc+0xb7/0xc0 [ 16.010116] __kmalloc_cache_noprof+0x189/0x420 [ 16.010421] kasan_atomics+0x95/0x310 [ 16.010756] kunit_try_run_case+0x1a5/0x480 [ 16.010960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.011361] kthread+0x337/0x6f0 [ 16.011676] ret_from_fork+0x116/0x1d0 [ 16.011850] ret_from_fork_asm+0x1a/0x30 [ 16.012234] [ 16.012371] The buggy address belongs to the object at ffff888102ba6080 [ 16.012371] which belongs to the cache kmalloc-64 of size 64 [ 16.013161] The buggy address is located 0 bytes to the right of [ 16.013161] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.013993] [ 16.014215] The buggy address belongs to the physical page: [ 16.014534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.015017] flags: 0x200000000000000(node=0|zone=2) [ 16.015333] page_type: f5(slab) [ 16.015617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.016048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.016476] page dumped because: kasan: bad access detected [ 16.016856] [ 16.016989] Memory state around the buggy address: [ 16.017282] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.017878] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.018251] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.018752] ^ [ 16.019070] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.019485] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.019884] ================================================================== [ 15.567120] ================================================================== [ 15.567471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.567790] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.568012] [ 15.568099] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.568142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.568155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.568176] Call Trace: [ 15.568195] <TASK> [ 15.568212] dump_stack_lvl+0x73/0xb0 [ 15.568241] print_report+0xd1/0x650 [ 15.568263] ? __virt_addr_valid+0x1db/0x2d0 [ 15.568286] ? kasan_atomics_helper+0x1148/0x5450 [ 15.568308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.568331] ? kasan_atomics_helper+0x1148/0x5450 [ 15.568372] kasan_report+0x141/0x180 [ 15.568396] ? kasan_atomics_helper+0x1148/0x5450 [ 15.568423] kasan_check_range+0x10c/0x1c0 [ 15.568449] __kasan_check_write+0x18/0x20 [ 15.568469] kasan_atomics_helper+0x1148/0x5450 [ 15.568493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.568526] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.568553] ? kasan_atomics+0x152/0x310 [ 15.568580] kasan_atomics+0x1dc/0x310 [ 15.568615] ? __pfx_kasan_atomics+0x10/0x10 [ 15.568641] ? __pfx_read_tsc+0x10/0x10 [ 15.568663] ? ktime_get_ts64+0x86/0x230 [ 15.568689] kunit_try_run_case+0x1a5/0x480 [ 15.568715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.568739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.568765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.568790] ? __kthread_parkme+0x82/0x180 [ 15.568812] ? preempt_count_sub+0x50/0x80 [ 15.568838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.568863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.568889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.568915] kthread+0x337/0x6f0 [ 15.568935] ? trace_preempt_on+0x20/0xc0 [ 15.568960] ? __pfx_kthread+0x10/0x10 [ 15.568981] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.569004] ? calculate_sigpending+0x7b/0xa0 [ 15.569029] ? __pfx_kthread+0x10/0x10 [ 15.569052] ret_from_fork+0x116/0x1d0 [ 15.569071] ? __pfx_kthread+0x10/0x10 [ 15.569092] ret_from_fork_asm+0x1a/0x30 [ 15.569126] </TASK> [ 15.569136] [ 15.576625] Allocated by task 283: [ 15.576819] kasan_save_stack+0x45/0x70 [ 15.576995] kasan_save_track+0x18/0x40 [ 15.577185] kasan_save_alloc_info+0x3b/0x50 [ 15.577335] __kasan_kmalloc+0xb7/0xc0 [ 15.577497] __kmalloc_cache_noprof+0x189/0x420 [ 15.577745] kasan_atomics+0x95/0x310 [ 15.577932] kunit_try_run_case+0x1a5/0x480 [ 15.578138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.578357] kthread+0x337/0x6f0 [ 15.578477] ret_from_fork+0x116/0x1d0 [ 15.578617] ret_from_fork_asm+0x1a/0x30 [ 15.578785] [ 15.578881] The buggy address belongs to the object at ffff888102ba6080 [ 15.578881] which belongs to the cache kmalloc-64 of size 64 [ 15.579412] The buggy address is located 0 bytes to the right of [ 15.579412] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.579928] [ 15.580001] The buggy address belongs to the physical page: [ 15.580245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.580570] flags: 0x200000000000000(node=0|zone=2) [ 15.580814] page_type: f5(slab) [ 15.580951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.581253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.581476] page dumped because: kasan: bad access detected [ 15.581656] [ 15.581728] Memory state around the buggy address: [ 15.581881] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.582187] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.582680] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.582989] ^ [ 15.583207] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.583641] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.583855] ================================================================== [ 14.954110] ================================================================== [ 14.954664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.955168] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 14.955402] [ 14.955487] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.955528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.955540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.955560] Call Trace: [ 14.955572] <TASK> [ 14.955587] dump_stack_lvl+0x73/0xb0 [ 14.955626] print_report+0xd1/0x650 [ 14.955649] ? __virt_addr_valid+0x1db/0x2d0 [ 14.955670] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.955692] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.955716] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.955738] kasan_report+0x141/0x180 [ 14.955760] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.955787] __asan_report_load4_noabort+0x18/0x20 [ 14.955812] kasan_atomics_helper+0x4b88/0x5450 [ 14.955835] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.955858] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.955883] ? kasan_atomics+0x152/0x310 [ 14.955909] kasan_atomics+0x1dc/0x310 [ 14.955932] ? __pfx_kasan_atomics+0x10/0x10 [ 14.955956] ? __pfx_read_tsc+0x10/0x10 [ 14.955977] ? ktime_get_ts64+0x86/0x230 [ 14.956001] kunit_try_run_case+0x1a5/0x480 [ 14.956025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.956049] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.956220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.956247] ? __kthread_parkme+0x82/0x180 [ 14.956289] ? preempt_count_sub+0x50/0x80 [ 14.956316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.956343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.956369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.956396] kthread+0x337/0x6f0 [ 14.956417] ? trace_preempt_on+0x20/0xc0 [ 14.956442] ? __pfx_kthread+0x10/0x10 [ 14.956465] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.956488] ? calculate_sigpending+0x7b/0xa0 [ 14.956522] ? __pfx_kthread+0x10/0x10 [ 14.956545] ret_from_fork+0x116/0x1d0 [ 14.956574] ? __pfx_kthread+0x10/0x10 [ 14.956595] ret_from_fork_asm+0x1a/0x30 [ 14.956645] </TASK> [ 14.956657] [ 14.965696] Allocated by task 283: [ 14.965882] kasan_save_stack+0x45/0x70 [ 14.966163] kasan_save_track+0x18/0x40 [ 14.966336] kasan_save_alloc_info+0x3b/0x50 [ 14.966586] __kasan_kmalloc+0xb7/0xc0 [ 14.967518] __kmalloc_cache_noprof+0x189/0x420 [ 14.967725] kasan_atomics+0x95/0x310 [ 14.967884] kunit_try_run_case+0x1a5/0x480 [ 14.968205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.968448] kthread+0x337/0x6f0 [ 14.968651] ret_from_fork+0x116/0x1d0 [ 14.968856] ret_from_fork_asm+0x1a/0x30 [ 14.969101] [ 14.969218] The buggy address belongs to the object at ffff888102ba6080 [ 14.969218] which belongs to the cache kmalloc-64 of size 64 [ 14.969799] The buggy address is located 0 bytes to the right of [ 14.969799] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 14.970214] [ 14.970286] The buggy address belongs to the physical page: [ 14.970458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 14.970707] flags: 0x200000000000000(node=0|zone=2) [ 14.970871] page_type: f5(slab) [ 14.970991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.971538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.971902] page dumped because: kasan: bad access detected [ 14.972158] [ 14.972256] Memory state around the buggy address: [ 14.972431] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.972892] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.973115] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.973444] ^ [ 14.973793] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.974190] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.974502] ================================================================== [ 16.073425] ================================================================== [ 16.074075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.074316] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.074692] [ 16.074809] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.074992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.075009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.075032] Call Trace: [ 16.075051] <TASK> [ 16.075069] dump_stack_lvl+0x73/0xb0 [ 16.075183] print_report+0xd1/0x650 [ 16.075208] ? __virt_addr_valid+0x1db/0x2d0 [ 16.075233] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.075256] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.075280] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.075458] kasan_report+0x141/0x180 [ 16.075483] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.075523] kasan_check_range+0x10c/0x1c0 [ 16.075548] __kasan_check_write+0x18/0x20 [ 16.075569] kasan_atomics_helper+0x1ce1/0x5450 [ 16.075593] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.075630] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.075658] ? kasan_atomics+0x152/0x310 [ 16.075687] kasan_atomics+0x1dc/0x310 [ 16.075710] ? __pfx_kasan_atomics+0x10/0x10 [ 16.075735] ? __pfx_read_tsc+0x10/0x10 [ 16.075758] ? ktime_get_ts64+0x86/0x230 [ 16.075784] kunit_try_run_case+0x1a5/0x480 [ 16.075810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.075861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.075886] ? __kthread_parkme+0x82/0x180 [ 16.075908] ? preempt_count_sub+0x50/0x80 [ 16.075933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.075986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.076012] kthread+0x337/0x6f0 [ 16.076032] ? trace_preempt_on+0x20/0xc0 [ 16.076057] ? __pfx_kthread+0x10/0x10 [ 16.076078] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.076101] ? calculate_sigpending+0x7b/0xa0 [ 16.076127] ? __pfx_kthread+0x10/0x10 [ 16.076149] ret_from_fork+0x116/0x1d0 [ 16.076168] ? __pfx_kthread+0x10/0x10 [ 16.076189] ret_from_fork_asm+0x1a/0x30 [ 16.076222] </TASK> [ 16.076233] [ 16.086411] Allocated by task 283: [ 16.086546] kasan_save_stack+0x45/0x70 [ 16.087018] kasan_save_track+0x18/0x40 [ 16.087162] kasan_save_alloc_info+0x3b/0x50 [ 16.087493] __kasan_kmalloc+0xb7/0xc0 [ 16.087786] __kmalloc_cache_noprof+0x189/0x420 [ 16.087960] kasan_atomics+0x95/0x310 [ 16.088265] kunit_try_run_case+0x1a5/0x480 [ 16.088547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.088884] kthread+0x337/0x6f0 [ 16.089131] ret_from_fork+0x116/0x1d0 [ 16.089277] ret_from_fork_asm+0x1a/0x30 [ 16.089716] [ 16.089901] The buggy address belongs to the object at ffff888102ba6080 [ 16.089901] which belongs to the cache kmalloc-64 of size 64 [ 16.090399] The buggy address is located 0 bytes to the right of [ 16.090399] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.091152] [ 16.091432] The buggy address belongs to the physical page: [ 16.091686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.092086] flags: 0x200000000000000(node=0|zone=2) [ 16.092393] page_type: f5(slab) [ 16.092557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.093054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.093490] page dumped because: kasan: bad access detected [ 16.093830] [ 16.093908] Memory state around the buggy address: [ 16.094108] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.094588] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.094996] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.095303] ^ [ 16.095649] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.096012] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.096380] ================================================================== [ 16.209092] ================================================================== [ 16.209321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.209649] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.210279] [ 16.210389] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.210431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.210444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.210465] Call Trace: [ 16.210480] <TASK> [ 16.210495] dump_stack_lvl+0x73/0xb0 [ 16.210532] print_report+0xd1/0x650 [ 16.210555] ? __virt_addr_valid+0x1db/0x2d0 [ 16.210579] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.210612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.210637] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.210662] kasan_report+0x141/0x180 [ 16.210685] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.210713] __asan_report_load8_noabort+0x18/0x20 [ 16.210739] kasan_atomics_helper+0x4f98/0x5450 [ 16.210763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.210786] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.210814] ? kasan_atomics+0x152/0x310 [ 16.210842] kasan_atomics+0x1dc/0x310 [ 16.210865] ? __pfx_kasan_atomics+0x10/0x10 [ 16.210891] ? __pfx_read_tsc+0x10/0x10 [ 16.210912] ? ktime_get_ts64+0x86/0x230 [ 16.210938] kunit_try_run_case+0x1a5/0x480 [ 16.210963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.210986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.211013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.211038] ? __kthread_parkme+0x82/0x180 [ 16.211059] ? preempt_count_sub+0x50/0x80 [ 16.211084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.211109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.211135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.211161] kthread+0x337/0x6f0 [ 16.211181] ? trace_preempt_on+0x20/0xc0 [ 16.211206] ? __pfx_kthread+0x10/0x10 [ 16.211227] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.211251] ? calculate_sigpending+0x7b/0xa0 [ 16.211276] ? __pfx_kthread+0x10/0x10 [ 16.211299] ret_from_fork+0x116/0x1d0 [ 16.211318] ? __pfx_kthread+0x10/0x10 [ 16.211339] ret_from_fork_asm+0x1a/0x30 [ 16.211372] </TASK> [ 16.211382] [ 16.218670] Allocated by task 283: [ 16.218850] kasan_save_stack+0x45/0x70 [ 16.219050] kasan_save_track+0x18/0x40 [ 16.219241] kasan_save_alloc_info+0x3b/0x50 [ 16.219451] __kasan_kmalloc+0xb7/0xc0 [ 16.219642] __kmalloc_cache_noprof+0x189/0x420 [ 16.219859] kasan_atomics+0x95/0x310 [ 16.220043] kunit_try_run_case+0x1a5/0x480 [ 16.220186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.220359] kthread+0x337/0x6f0 [ 16.220478] ret_from_fork+0x116/0x1d0 [ 16.220616] ret_from_fork_asm+0x1a/0x30 [ 16.220753] [ 16.220821] The buggy address belongs to the object at ffff888102ba6080 [ 16.220821] which belongs to the cache kmalloc-64 of size 64 [ 16.221840] The buggy address is located 0 bytes to the right of [ 16.221840] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.222392] [ 16.222492] The buggy address belongs to the physical page: [ 16.222762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.223120] flags: 0x200000000000000(node=0|zone=2) [ 16.223282] page_type: f5(slab) [ 16.223399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.223634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.223858] page dumped because: kasan: bad access detected [ 16.224080] [ 16.224231] Memory state around the buggy address: [ 16.224454] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.224993] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.225208] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.225419] ^ [ 16.225708] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.226036] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.226456] ================================================================== [ 16.278293] ================================================================== [ 16.279065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.279755] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.280409] [ 16.280624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.280676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.280689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.280711] Call Trace: [ 16.280727] <TASK> [ 16.280744] dump_stack_lvl+0x73/0xb0 [ 16.280775] print_report+0xd1/0x650 [ 16.280798] ? __virt_addr_valid+0x1db/0x2d0 [ 16.280833] ? kasan_atomics_helper+0x218a/0x5450 [ 16.280856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.280881] ? kasan_atomics_helper+0x218a/0x5450 [ 16.280915] kasan_report+0x141/0x180 [ 16.280937] ? kasan_atomics_helper+0x218a/0x5450 [ 16.280966] kasan_check_range+0x10c/0x1c0 [ 16.280991] __kasan_check_write+0x18/0x20 [ 16.281011] kasan_atomics_helper+0x218a/0x5450 [ 16.281036] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.281061] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.281088] ? kasan_atomics+0x152/0x310 [ 16.281115] kasan_atomics+0x1dc/0x310 [ 16.281139] ? __pfx_kasan_atomics+0x10/0x10 [ 16.281165] ? __pfx_read_tsc+0x10/0x10 [ 16.281188] ? ktime_get_ts64+0x86/0x230 [ 16.281214] kunit_try_run_case+0x1a5/0x480 [ 16.281240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.281264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.281289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.281314] ? __kthread_parkme+0x82/0x180 [ 16.281336] ? preempt_count_sub+0x50/0x80 [ 16.281362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.281388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.281413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.281440] kthread+0x337/0x6f0 [ 16.281459] ? trace_preempt_on+0x20/0xc0 [ 16.281484] ? __pfx_kthread+0x10/0x10 [ 16.281513] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.281535] ? calculate_sigpending+0x7b/0xa0 [ 16.281561] ? __pfx_kthread+0x10/0x10 [ 16.281583] ret_from_fork+0x116/0x1d0 [ 16.281610] ? __pfx_kthread+0x10/0x10 [ 16.281632] ret_from_fork_asm+0x1a/0x30 [ 16.281665] </TASK> [ 16.281677] [ 16.293127] Allocated by task 283: [ 16.293259] kasan_save_stack+0x45/0x70 [ 16.293406] kasan_save_track+0x18/0x40 [ 16.293590] kasan_save_alloc_info+0x3b/0x50 [ 16.293772] __kasan_kmalloc+0xb7/0xc0 [ 16.293906] __kmalloc_cache_noprof+0x189/0x420 [ 16.294131] kasan_atomics+0x95/0x310 [ 16.294317] kunit_try_run_case+0x1a5/0x480 [ 16.294529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.294815] kthread+0x337/0x6f0 [ 16.294949] ret_from_fork+0x116/0x1d0 [ 16.295162] ret_from_fork_asm+0x1a/0x30 [ 16.295300] [ 16.295392] The buggy address belongs to the object at ffff888102ba6080 [ 16.295392] which belongs to the cache kmalloc-64 of size 64 [ 16.296080] The buggy address is located 0 bytes to the right of [ 16.296080] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.296655] [ 16.296752] The buggy address belongs to the physical page: [ 16.296947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.297204] flags: 0x200000000000000(node=0|zone=2) [ 16.297440] page_type: f5(slab) [ 16.297776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.298149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.298480] page dumped because: kasan: bad access detected [ 16.298705] [ 16.298775] Memory state around the buggy address: [ 16.298959] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.299275] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.299587] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.299890] ^ [ 16.300118] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300456] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300807] ================================================================== [ 15.680101] ================================================================== [ 15.680566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.680839] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.681330] [ 15.681445] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.681490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.681514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.681537] Call Trace: [ 15.681555] <TASK> [ 15.681573] dump_stack_lvl+0x73/0xb0 [ 15.681614] print_report+0xd1/0x650 [ 15.681637] ? __virt_addr_valid+0x1db/0x2d0 [ 15.681662] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.681683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.681714] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.681737] kasan_report+0x141/0x180 [ 15.681760] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.681787] __asan_report_load4_noabort+0x18/0x20 [ 15.681813] kasan_atomics_helper+0x49ce/0x5450 [ 15.681837] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.681860] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.681887] ? kasan_atomics+0x152/0x310 [ 15.681915] kasan_atomics+0x1dc/0x310 [ 15.681938] ? __pfx_kasan_atomics+0x10/0x10 [ 15.681963] ? __pfx_read_tsc+0x10/0x10 [ 15.681985] ? ktime_get_ts64+0x86/0x230 [ 15.682011] kunit_try_run_case+0x1a5/0x480 [ 15.682037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.682060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.682087] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.682112] ? __kthread_parkme+0x82/0x180 [ 15.682134] ? preempt_count_sub+0x50/0x80 [ 15.682160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.682185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.682210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.682236] kthread+0x337/0x6f0 [ 15.682256] ? trace_preempt_on+0x20/0xc0 [ 15.682281] ? __pfx_kthread+0x10/0x10 [ 15.682303] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.682326] ? calculate_sigpending+0x7b/0xa0 [ 15.682351] ? __pfx_kthread+0x10/0x10 [ 15.682374] ret_from_fork+0x116/0x1d0 [ 15.682393] ? __pfx_kthread+0x10/0x10 [ 15.682415] ret_from_fork_asm+0x1a/0x30 [ 15.682449] </TASK> [ 15.682460] [ 15.689862] Allocated by task 283: [ 15.690043] kasan_save_stack+0x45/0x70 [ 15.690246] kasan_save_track+0x18/0x40 [ 15.690394] kasan_save_alloc_info+0x3b/0x50 [ 15.690620] __kasan_kmalloc+0xb7/0xc0 [ 15.690805] __kmalloc_cache_noprof+0x189/0x420 [ 15.690961] kasan_atomics+0x95/0x310 [ 15.691092] kunit_try_run_case+0x1a5/0x480 [ 15.691238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.691412] kthread+0x337/0x6f0 [ 15.691546] ret_from_fork+0x116/0x1d0 [ 15.691743] ret_from_fork_asm+0x1a/0x30 [ 15.691941] [ 15.692033] The buggy address belongs to the object at ffff888102ba6080 [ 15.692033] which belongs to the cache kmalloc-64 of size 64 [ 15.692553] The buggy address is located 0 bytes to the right of [ 15.692553] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.693065] [ 15.693137] The buggy address belongs to the physical page: [ 15.693307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.693908] flags: 0x200000000000000(node=0|zone=2) [ 15.694146] page_type: f5(slab) [ 15.694306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.694642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.694949] page dumped because: kasan: bad access detected [ 15.695137] [ 15.695205] Memory state around the buggy address: [ 15.695396] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.695883] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.696150] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.696419] ^ [ 15.696687] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.696966] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.697240] ================================================================== [ 15.969075] ================================================================== [ 15.969858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.970646] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.971290] [ 15.971515] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.971565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.971585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.971624] Call Trace: [ 15.971644] <TASK> [ 15.971665] dump_stack_lvl+0x73/0xb0 [ 15.971698] print_report+0xd1/0x650 [ 15.971722] ? __virt_addr_valid+0x1db/0x2d0 [ 15.971747] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.971771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.971794] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.971818] kasan_report+0x141/0x180 [ 15.971841] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.971868] kasan_check_range+0x10c/0x1c0 [ 15.971894] __kasan_check_write+0x18/0x20 [ 15.971914] kasan_atomics_helper+0x1a7f/0x5450 [ 15.971938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.971962] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.971990] ? kasan_atomics+0x152/0x310 [ 15.972017] kasan_atomics+0x1dc/0x310 [ 15.972040] ? __pfx_kasan_atomics+0x10/0x10 [ 15.972065] ? __pfx_read_tsc+0x10/0x10 [ 15.972088] ? ktime_get_ts64+0x86/0x230 [ 15.972114] kunit_try_run_case+0x1a5/0x480 [ 15.972140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.972191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.972215] ? __kthread_parkme+0x82/0x180 [ 15.972238] ? preempt_count_sub+0x50/0x80 [ 15.972264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972342] kthread+0x337/0x6f0 [ 15.972361] ? trace_preempt_on+0x20/0xc0 [ 15.972386] ? __pfx_kthread+0x10/0x10 [ 15.972408] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.972431] ? calculate_sigpending+0x7b/0xa0 [ 15.972457] ? __pfx_kthread+0x10/0x10 [ 15.972479] ret_from_fork+0x116/0x1d0 [ 15.972519] ? __pfx_kthread+0x10/0x10 [ 15.972542] ret_from_fork_asm+0x1a/0x30 [ 15.972575] </TASK> [ 15.972586] [ 15.984707] Allocated by task 283: [ 15.985089] kasan_save_stack+0x45/0x70 [ 15.985490] kasan_save_track+0x18/0x40 [ 15.985889] kasan_save_alloc_info+0x3b/0x50 [ 15.986174] __kasan_kmalloc+0xb7/0xc0 [ 15.986309] __kmalloc_cache_noprof+0x189/0x420 [ 15.986467] kasan_atomics+0x95/0x310 [ 15.986640] kunit_try_run_case+0x1a5/0x480 [ 15.987036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.987342] kthread+0x337/0x6f0 [ 15.987467] ret_from_fork+0x116/0x1d0 [ 15.987806] ret_from_fork_asm+0x1a/0x30 [ 15.988202] [ 15.988380] The buggy address belongs to the object at ffff888102ba6080 [ 15.988380] which belongs to the cache kmalloc-64 of size 64 [ 15.989421] The buggy address is located 0 bytes to the right of [ 15.989421] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.990100] [ 15.990175] The buggy address belongs to the physical page: [ 15.990346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.990608] flags: 0x200000000000000(node=0|zone=2) [ 15.990894] page_type: f5(slab) [ 15.991082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.991369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.991758] page dumped because: kasan: bad access detected [ 15.991973] [ 15.992071] Memory state around the buggy address: [ 15.992369] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.992748] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.993039] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.993428] ^ [ 15.993722] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.994019] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.994351] ================================================================== [ 15.847325] ================================================================== [ 15.848140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.848475] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.848827] [ 15.848943] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.848997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.849010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.849032] Call Trace: [ 15.849049] <TASK> [ 15.849078] dump_stack_lvl+0x73/0xb0 [ 15.849110] print_report+0xd1/0x650 [ 15.849133] ? __virt_addr_valid+0x1db/0x2d0 [ 15.849169] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.849192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.849228] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.849251] kasan_report+0x141/0x180 [ 15.849274] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.849314] kasan_check_range+0x10c/0x1c0 [ 15.849339] __kasan_check_write+0x18/0x20 [ 15.849360] kasan_atomics_helper+0x16e7/0x5450 [ 15.849396] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.849420] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.849447] ? kasan_atomics+0x152/0x310 [ 15.849484] kasan_atomics+0x1dc/0x310 [ 15.849532] ? __pfx_kasan_atomics+0x10/0x10 [ 15.849558] ? __pfx_read_tsc+0x10/0x10 [ 15.849590] ? ktime_get_ts64+0x86/0x230 [ 15.849631] kunit_try_run_case+0x1a5/0x480 [ 15.849657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.849721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.849747] ? __kthread_parkme+0x82/0x180 [ 15.849769] ? preempt_count_sub+0x50/0x80 [ 15.849795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.849856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.849883] kthread+0x337/0x6f0 [ 15.849903] ? trace_preempt_on+0x20/0xc0 [ 15.849940] ? __pfx_kthread+0x10/0x10 [ 15.849961] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.849984] ? calculate_sigpending+0x7b/0xa0 [ 15.850010] ? __pfx_kthread+0x10/0x10 [ 15.850033] ret_from_fork+0x116/0x1d0 [ 15.850053] ? __pfx_kthread+0x10/0x10 [ 15.850074] ret_from_fork_asm+0x1a/0x30 [ 15.850108] </TASK> [ 15.850119] [ 15.857722] Allocated by task 283: [ 15.857852] kasan_save_stack+0x45/0x70 [ 15.857995] kasan_save_track+0x18/0x40 [ 15.858211] kasan_save_alloc_info+0x3b/0x50 [ 15.858424] __kasan_kmalloc+0xb7/0xc0 [ 15.858646] __kmalloc_cache_noprof+0x189/0x420 [ 15.858870] kasan_atomics+0x95/0x310 [ 15.859004] kunit_try_run_case+0x1a5/0x480 [ 15.859196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.859455] kthread+0x337/0x6f0 [ 15.859673] ret_from_fork+0x116/0x1d0 [ 15.859841] ret_from_fork_asm+0x1a/0x30 [ 15.860039] [ 15.860120] The buggy address belongs to the object at ffff888102ba6080 [ 15.860120] which belongs to the cache kmalloc-64 of size 64 [ 15.860682] The buggy address is located 0 bytes to the right of [ 15.860682] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.861064] [ 15.861137] The buggy address belongs to the physical page: [ 15.861305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.861710] flags: 0x200000000000000(node=0|zone=2) [ 15.861942] page_type: f5(slab) [ 15.862107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.862441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.862798] page dumped because: kasan: bad access detected [ 15.863001] [ 15.863116] Memory state around the buggy address: [ 15.863294] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.863533] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.863866] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.864204] ^ [ 15.864428] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864768] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.865084] ================================================================== [ 15.037583] ================================================================== [ 15.037881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.038418] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.038784] [ 15.038883] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.038966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.038982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.039004] Call Trace: [ 15.039034] <TASK> [ 15.039050] dump_stack_lvl+0x73/0xb0 [ 15.039082] print_report+0xd1/0x650 [ 15.039117] ? __virt_addr_valid+0x1db/0x2d0 [ 15.039142] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.039164] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.039197] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.039220] kasan_report+0x141/0x180 [ 15.039244] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.039282] kasan_check_range+0x10c/0x1c0 [ 15.039307] __kasan_check_write+0x18/0x20 [ 15.039328] kasan_atomics_helper+0x4a0/0x5450 [ 15.039351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.039375] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.039403] ? kasan_atomics+0x152/0x310 [ 15.039430] kasan_atomics+0x1dc/0x310 [ 15.039454] ? __pfx_kasan_atomics+0x10/0x10 [ 15.039480] ? __pfx_read_tsc+0x10/0x10 [ 15.039502] ? ktime_get_ts64+0x86/0x230 [ 15.039528] kunit_try_run_case+0x1a5/0x480 [ 15.039561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.039586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.039627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.039652] ? __kthread_parkme+0x82/0x180 [ 15.039674] ? preempt_count_sub+0x50/0x80 [ 15.039700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.039726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.039751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.039778] kthread+0x337/0x6f0 [ 15.039798] ? trace_preempt_on+0x20/0xc0 [ 15.039823] ? __pfx_kthread+0x10/0x10 [ 15.039845] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.039868] ? calculate_sigpending+0x7b/0xa0 [ 15.039893] ? __pfx_kthread+0x10/0x10 [ 15.039916] ret_from_fork+0x116/0x1d0 [ 15.039985] ? __pfx_kthread+0x10/0x10 [ 15.040008] ret_from_fork_asm+0x1a/0x30 [ 15.040054] </TASK> [ 15.040065] [ 15.048511] Allocated by task 283: [ 15.048797] kasan_save_stack+0x45/0x70 [ 15.049062] kasan_save_track+0x18/0x40 [ 15.049270] kasan_save_alloc_info+0x3b/0x50 [ 15.049423] __kasan_kmalloc+0xb7/0xc0 [ 15.049656] __kmalloc_cache_noprof+0x189/0x420 [ 15.049908] kasan_atomics+0x95/0x310 [ 15.050153] kunit_try_run_case+0x1a5/0x480 [ 15.050346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.050647] kthread+0x337/0x6f0 [ 15.050817] ret_from_fork+0x116/0x1d0 [ 15.051094] ret_from_fork_asm+0x1a/0x30 [ 15.051302] [ 15.051387] The buggy address belongs to the object at ffff888102ba6080 [ 15.051387] which belongs to the cache kmalloc-64 of size 64 [ 15.051913] The buggy address is located 0 bytes to the right of [ 15.051913] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.052366] [ 15.052442] The buggy address belongs to the physical page: [ 15.052721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.053073] flags: 0x200000000000000(node=0|zone=2) [ 15.053294] page_type: f5(slab) [ 15.053414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.053652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.054420] page dumped because: kasan: bad access detected [ 15.055619] [ 15.055751] Memory state around the buggy address: [ 15.056111] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.056434] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.057185] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.057499] ^ [ 15.057730] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.058674] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059441] ================================================================== [ 15.901804] ================================================================== [ 15.902051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.902323] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.902680] [ 15.902792] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.902833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.902845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.902865] Call Trace: [ 15.902882] <TASK> [ 15.902897] dump_stack_lvl+0x73/0xb0 [ 15.902924] print_report+0xd1/0x650 [ 15.902946] ? __virt_addr_valid+0x1db/0x2d0 [ 15.902970] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.902991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.903013] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.903036] kasan_report+0x141/0x180 [ 15.903058] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.903085] kasan_check_range+0x10c/0x1c0 [ 15.903109] __kasan_check_write+0x18/0x20 [ 15.903128] kasan_atomics_helper+0x18b1/0x5450 [ 15.903151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.903173] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.903198] ? kasan_atomics+0x152/0x310 [ 15.903226] kasan_atomics+0x1dc/0x310 [ 15.903248] ? __pfx_kasan_atomics+0x10/0x10 [ 15.903273] ? __pfx_read_tsc+0x10/0x10 [ 15.903294] ? ktime_get_ts64+0x86/0x230 [ 15.903319] kunit_try_run_case+0x1a5/0x480 [ 15.903344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903366] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.903391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.903415] ? __kthread_parkme+0x82/0x180 [ 15.903436] ? preempt_count_sub+0x50/0x80 [ 15.903461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.903510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.903534] kthread+0x337/0x6f0 [ 15.903554] ? trace_preempt_on+0x20/0xc0 [ 15.903579] ? __pfx_kthread+0x10/0x10 [ 15.903838] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.903872] ? calculate_sigpending+0x7b/0xa0 [ 15.903913] ? __pfx_kthread+0x10/0x10 [ 15.903937] ret_from_fork+0x116/0x1d0 [ 15.903957] ? __pfx_kthread+0x10/0x10 [ 15.903979] ret_from_fork_asm+0x1a/0x30 [ 15.904013] </TASK> [ 15.904025] [ 15.912046] Allocated by task 283: [ 15.912271] kasan_save_stack+0x45/0x70 [ 15.912422] kasan_save_track+0x18/0x40 [ 15.912621] kasan_save_alloc_info+0x3b/0x50 [ 15.912887] __kasan_kmalloc+0xb7/0xc0 [ 15.913155] __kmalloc_cache_noprof+0x189/0x420 [ 15.913470] kasan_atomics+0x95/0x310 [ 15.913713] kunit_try_run_case+0x1a5/0x480 [ 15.913972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.914194] kthread+0x337/0x6f0 [ 15.914316] ret_from_fork+0x116/0x1d0 [ 15.914479] ret_from_fork_asm+0x1a/0x30 [ 15.914756] [ 15.914855] The buggy address belongs to the object at ffff888102ba6080 [ 15.914855] which belongs to the cache kmalloc-64 of size 64 [ 15.915510] The buggy address is located 0 bytes to the right of [ 15.915510] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.915945] [ 15.916045] The buggy address belongs to the physical page: [ 15.916349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.916690] flags: 0x200000000000000(node=0|zone=2) [ 15.916939] page_type: f5(slab) [ 15.917079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.917392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.917745] page dumped because: kasan: bad access detected [ 15.917995] [ 15.918066] Memory state around the buggy address: [ 15.918222] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.918533] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.918909] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.919321] ^ [ 15.919618] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.919838] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920203] ================================================================== [ 14.935141] ================================================================== [ 14.935426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.935826] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 14.936162] [ 14.936274] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.936314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.936326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.936345] Call Trace: [ 14.936356] <TASK> [ 14.936370] dump_stack_lvl+0x73/0xb0 [ 14.936398] print_report+0xd1/0x650 [ 14.936420] ? __virt_addr_valid+0x1db/0x2d0 [ 14.936442] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.936463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.936487] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.936509] kasan_report+0x141/0x180 [ 14.936531] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.936558] __asan_report_store4_noabort+0x1b/0x30 [ 14.936583] kasan_atomics_helper+0x4ba2/0x5450 [ 14.936634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.936657] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.936694] ? kasan_atomics+0x152/0x310 [ 14.936720] kasan_atomics+0x1dc/0x310 [ 14.936742] ? __pfx_kasan_atomics+0x10/0x10 [ 14.936766] ? __pfx_read_tsc+0x10/0x10 [ 14.936786] ? ktime_get_ts64+0x86/0x230 [ 14.936811] kunit_try_run_case+0x1a5/0x480 [ 14.936835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.936858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.936881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.936906] ? __kthread_parkme+0x82/0x180 [ 14.936926] ? preempt_count_sub+0x50/0x80 [ 14.936950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.936975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.937000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.937035] kthread+0x337/0x6f0 [ 14.937054] ? trace_preempt_on+0x20/0xc0 [ 14.937077] ? __pfx_kthread+0x10/0x10 [ 14.937115] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.937137] ? calculate_sigpending+0x7b/0xa0 [ 14.937161] ? __pfx_kthread+0x10/0x10 [ 14.937182] ret_from_fork+0x116/0x1d0 [ 14.937200] ? __pfx_kthread+0x10/0x10 [ 14.937221] ret_from_fork_asm+0x1a/0x30 [ 14.937254] </TASK> [ 14.937264] [ 14.945166] Allocated by task 283: [ 14.945296] kasan_save_stack+0x45/0x70 [ 14.945439] kasan_save_track+0x18/0x40 [ 14.945791] kasan_save_alloc_info+0x3b/0x50 [ 14.946123] __kasan_kmalloc+0xb7/0xc0 [ 14.946433] __kmalloc_cache_noprof+0x189/0x420 [ 14.946639] kasan_atomics+0x95/0x310 [ 14.946870] kunit_try_run_case+0x1a5/0x480 [ 14.947186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.947361] kthread+0x337/0x6f0 [ 14.947550] ret_from_fork+0x116/0x1d0 [ 14.947762] ret_from_fork_asm+0x1a/0x30 [ 14.947971] [ 14.948097] The buggy address belongs to the object at ffff888102ba6080 [ 14.948097] which belongs to the cache kmalloc-64 of size 64 [ 14.948616] The buggy address is located 0 bytes to the right of [ 14.948616] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 14.949097] [ 14.949380] The buggy address belongs to the physical page: [ 14.949609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 14.949975] flags: 0x200000000000000(node=0|zone=2) [ 14.950242] page_type: f5(slab) [ 14.950370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.950729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.951086] page dumped because: kasan: bad access detected [ 14.951346] [ 14.951443] Memory state around the buggy address: [ 14.951703] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.951916] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.952126] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.952336] ^ [ 14.952681] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.953283] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.953505] ================================================================== [ 15.921091] ================================================================== [ 15.921393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.921814] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.922135] [ 15.922283] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.922339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.922352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.922374] Call Trace: [ 15.922390] <TASK> [ 15.922438] dump_stack_lvl+0x73/0xb0 [ 15.922472] print_report+0xd1/0x650 [ 15.922520] ? __virt_addr_valid+0x1db/0x2d0 [ 15.922545] ? kasan_atomics_helper+0x194a/0x5450 [ 15.922568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.922592] ? kasan_atomics_helper+0x194a/0x5450 [ 15.922624] kasan_report+0x141/0x180 [ 15.922648] ? kasan_atomics_helper+0x194a/0x5450 [ 15.922675] kasan_check_range+0x10c/0x1c0 [ 15.922701] __kasan_check_write+0x18/0x20 [ 15.922753] kasan_atomics_helper+0x194a/0x5450 [ 15.922790] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.922825] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.922852] ? kasan_atomics+0x152/0x310 [ 15.922879] kasan_atomics+0x1dc/0x310 [ 15.922903] ? __pfx_kasan_atomics+0x10/0x10 [ 15.922928] ? __pfx_read_tsc+0x10/0x10 [ 15.922950] ? ktime_get_ts64+0x86/0x230 [ 15.922975] kunit_try_run_case+0x1a5/0x480 [ 15.923002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.923026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.923052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.923078] ? __kthread_parkme+0x82/0x180 [ 15.923099] ? preempt_count_sub+0x50/0x80 [ 15.923124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.923149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.923176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.923202] kthread+0x337/0x6f0 [ 15.923222] ? trace_preempt_on+0x20/0xc0 [ 15.923247] ? __pfx_kthread+0x10/0x10 [ 15.923269] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.923292] ? calculate_sigpending+0x7b/0xa0 [ 15.923318] ? __pfx_kthread+0x10/0x10 [ 15.923341] ret_from_fork+0x116/0x1d0 [ 15.923360] ? __pfx_kthread+0x10/0x10 [ 15.923382] ret_from_fork_asm+0x1a/0x30 [ 15.923415] </TASK> [ 15.923427] [ 15.931199] Allocated by task 283: [ 15.931368] kasan_save_stack+0x45/0x70 [ 15.931616] kasan_save_track+0x18/0x40 [ 15.931851] kasan_save_alloc_info+0x3b/0x50 [ 15.932069] __kasan_kmalloc+0xb7/0xc0 [ 15.932282] __kmalloc_cache_noprof+0x189/0x420 [ 15.932555] kasan_atomics+0x95/0x310 [ 15.932758] kunit_try_run_case+0x1a5/0x480 [ 15.932911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.933159] kthread+0x337/0x6f0 [ 15.933366] ret_from_fork+0x116/0x1d0 [ 15.933584] ret_from_fork_asm+0x1a/0x30 [ 15.933740] [ 15.933886] The buggy address belongs to the object at ffff888102ba6080 [ 15.933886] which belongs to the cache kmalloc-64 of size 64 [ 15.934394] The buggy address is located 0 bytes to the right of [ 15.934394] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.934849] [ 15.934984] The buggy address belongs to the physical page: [ 15.935255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.935718] flags: 0x200000000000000(node=0|zone=2) [ 15.935949] page_type: f5(slab) [ 15.936107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.936339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.936767] page dumped because: kasan: bad access detected [ 15.937095] [ 15.937179] Memory state around the buggy address: [ 15.937357] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.937731] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.937952] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.938289] ^ [ 15.938564] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.938944] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.939274] ================================================================== [ 15.615747] ================================================================== [ 15.616840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.617744] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.618413] [ 15.618512] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.618559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.618572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.618595] Call Trace: [ 15.618628] <TASK> [ 15.618647] dump_stack_lvl+0x73/0xb0 [ 15.618682] print_report+0xd1/0x650 [ 15.618705] ? __virt_addr_valid+0x1db/0x2d0 [ 15.618730] ? kasan_atomics_helper+0x1217/0x5450 [ 15.618753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.618777] ? kasan_atomics_helper+0x1217/0x5450 [ 15.618800] kasan_report+0x141/0x180 [ 15.618823] ? kasan_atomics_helper+0x1217/0x5450 [ 15.618851] kasan_check_range+0x10c/0x1c0 [ 15.618876] __kasan_check_write+0x18/0x20 [ 15.618895] kasan_atomics_helper+0x1217/0x5450 [ 15.618919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.618943] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.618971] ? kasan_atomics+0x152/0x310 [ 15.618997] kasan_atomics+0x1dc/0x310 [ 15.619021] ? __pfx_kasan_atomics+0x10/0x10 [ 15.619046] ? __pfx_read_tsc+0x10/0x10 [ 15.619069] ? ktime_get_ts64+0x86/0x230 [ 15.619095] kunit_try_run_case+0x1a5/0x480 [ 15.619120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.619144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.619170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.619194] ? __kthread_parkme+0x82/0x180 [ 15.619217] ? preempt_count_sub+0x50/0x80 [ 15.619244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.619271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.619296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.619322] kthread+0x337/0x6f0 [ 15.619342] ? trace_preempt_on+0x20/0xc0 [ 15.619368] ? __pfx_kthread+0x10/0x10 [ 15.619390] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.619413] ? calculate_sigpending+0x7b/0xa0 [ 15.619439] ? __pfx_kthread+0x10/0x10 [ 15.619462] ret_from_fork+0x116/0x1d0 [ 15.619481] ? __pfx_kthread+0x10/0x10 [ 15.619665] ret_from_fork_asm+0x1a/0x30 [ 15.619714] </TASK> [ 15.619727] [ 15.634686] Allocated by task 283: [ 15.635067] kasan_save_stack+0x45/0x70 [ 15.635365] kasan_save_track+0x18/0x40 [ 15.635525] kasan_save_alloc_info+0x3b/0x50 [ 15.635959] __kasan_kmalloc+0xb7/0xc0 [ 15.636331] __kmalloc_cache_noprof+0x189/0x420 [ 15.636795] kasan_atomics+0x95/0x310 [ 15.637153] kunit_try_run_case+0x1a5/0x480 [ 15.637446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.637821] kthread+0x337/0x6f0 [ 15.638141] ret_from_fork+0x116/0x1d0 [ 15.638500] ret_from_fork_asm+0x1a/0x30 [ 15.638840] [ 15.639062] The buggy address belongs to the object at ffff888102ba6080 [ 15.639062] which belongs to the cache kmalloc-64 of size 64 [ 15.639792] The buggy address is located 0 bytes to the right of [ 15.639792] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.640155] [ 15.640230] The buggy address belongs to the physical page: [ 15.640401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.640958] flags: 0x200000000000000(node=0|zone=2) [ 15.641323] page_type: f5(slab) [ 15.641709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.642144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.642609] page dumped because: kasan: bad access detected [ 15.642786] [ 15.642855] Memory state around the buggy address: [ 15.643013] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.643231] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.643452] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.643718] ^ [ 15.643903] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.644249] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.644632] ================================================================== [ 16.020819] ================================================================== [ 16.021825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.022268] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.022969] [ 16.023107] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.023155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.023167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.023189] Call Trace: [ 16.023209] <TASK> [ 16.023231] dump_stack_lvl+0x73/0xb0 [ 16.023264] print_report+0xd1/0x650 [ 16.023286] ? __virt_addr_valid+0x1db/0x2d0 [ 16.023311] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.023333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.023358] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.023382] kasan_report+0x141/0x180 [ 16.023406] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.023434] kasan_check_range+0x10c/0x1c0 [ 16.023460] __kasan_check_write+0x18/0x20 [ 16.023480] kasan_atomics_helper+0x1c18/0x5450 [ 16.023528] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.023561] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.023590] ? kasan_atomics+0x152/0x310 [ 16.023634] kasan_atomics+0x1dc/0x310 [ 16.023658] ? __pfx_kasan_atomics+0x10/0x10 [ 16.023683] ? __pfx_read_tsc+0x10/0x10 [ 16.023705] ? ktime_get_ts64+0x86/0x230 [ 16.023731] kunit_try_run_case+0x1a5/0x480 [ 16.023757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.023781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.023807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.023832] ? __kthread_parkme+0x82/0x180 [ 16.023853] ? preempt_count_sub+0x50/0x80 [ 16.023879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.023905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.023930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.023956] kthread+0x337/0x6f0 [ 16.023976] ? trace_preempt_on+0x20/0xc0 [ 16.024001] ? __pfx_kthread+0x10/0x10 [ 16.024023] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.024049] ? calculate_sigpending+0x7b/0xa0 [ 16.024075] ? __pfx_kthread+0x10/0x10 [ 16.024097] ret_from_fork+0x116/0x1d0 [ 16.024116] ? __pfx_kthread+0x10/0x10 [ 16.024138] ret_from_fork_asm+0x1a/0x30 [ 16.024173] </TASK> [ 16.024185] [ 16.035646] Allocated by task 283: [ 16.035851] kasan_save_stack+0x45/0x70 [ 16.036152] kasan_save_track+0x18/0x40 [ 16.036433] kasan_save_alloc_info+0x3b/0x50 [ 16.036744] __kasan_kmalloc+0xb7/0xc0 [ 16.037019] __kmalloc_cache_noprof+0x189/0x420 [ 16.037333] kasan_atomics+0x95/0x310 [ 16.037631] kunit_try_run_case+0x1a5/0x480 [ 16.037943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.038296] kthread+0x337/0x6f0 [ 16.038615] ret_from_fork+0x116/0x1d0 [ 16.038927] ret_from_fork_asm+0x1a/0x30 [ 16.039220] [ 16.039351] The buggy address belongs to the object at ffff888102ba6080 [ 16.039351] which belongs to the cache kmalloc-64 of size 64 [ 16.040214] The buggy address is located 0 bytes to the right of [ 16.040214] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.041102] [ 16.041186] The buggy address belongs to the physical page: [ 16.041445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.041905] flags: 0x200000000000000(node=0|zone=2) [ 16.042371] page_type: f5(slab) [ 16.042562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.042924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.043427] page dumped because: kasan: bad access detected [ 16.043756] [ 16.043999] Memory state around the buggy address: [ 16.044312] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.044839] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.045250] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.045720] ^ [ 16.046041] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.046494] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.046994] ================================================================== [ 16.191516] ================================================================== [ 16.191888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.192198] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.192480] [ 16.192684] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.192726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.192737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.192758] Call Trace: [ 16.192772] <TASK> [ 16.192788] dump_stack_lvl+0x73/0xb0 [ 16.192841] print_report+0xd1/0x650 [ 16.192864] ? __virt_addr_valid+0x1db/0x2d0 [ 16.192887] ? kasan_atomics_helper+0x2006/0x5450 [ 16.192909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.192934] ? kasan_atomics_helper+0x2006/0x5450 [ 16.192957] kasan_report+0x141/0x180 [ 16.192981] ? kasan_atomics_helper+0x2006/0x5450 [ 16.193008] kasan_check_range+0x10c/0x1c0 [ 16.193034] __kasan_check_write+0x18/0x20 [ 16.193061] kasan_atomics_helper+0x2006/0x5450 [ 16.193085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.193109] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.193135] ? kasan_atomics+0x152/0x310 [ 16.193162] kasan_atomics+0x1dc/0x310 [ 16.193185] ? __pfx_kasan_atomics+0x10/0x10 [ 16.193210] ? __pfx_read_tsc+0x10/0x10 [ 16.193232] ? ktime_get_ts64+0x86/0x230 [ 16.193257] kunit_try_run_case+0x1a5/0x480 [ 16.193282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.193306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.193331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.193356] ? __kthread_parkme+0x82/0x180 [ 16.193378] ? preempt_count_sub+0x50/0x80 [ 16.193404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.193429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.193456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.193482] kthread+0x337/0x6f0 [ 16.193501] ? trace_preempt_on+0x20/0xc0 [ 16.193526] ? __pfx_kthread+0x10/0x10 [ 16.193548] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.193570] ? calculate_sigpending+0x7b/0xa0 [ 16.193596] ? __pfx_kthread+0x10/0x10 [ 16.193628] ret_from_fork+0x116/0x1d0 [ 16.193648] ? __pfx_kthread+0x10/0x10 [ 16.193669] ret_from_fork_asm+0x1a/0x30 [ 16.193702] </TASK> [ 16.193717] [ 16.200701] Allocated by task 283: [ 16.200878] kasan_save_stack+0x45/0x70 [ 16.201077] kasan_save_track+0x18/0x40 [ 16.201266] kasan_save_alloc_info+0x3b/0x50 [ 16.201475] __kasan_kmalloc+0xb7/0xc0 [ 16.201910] __kmalloc_cache_noprof+0x189/0x420 [ 16.202132] kasan_atomics+0x95/0x310 [ 16.202324] kunit_try_run_case+0x1a5/0x480 [ 16.202542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.202811] kthread+0x337/0x6f0 [ 16.202964] ret_from_fork+0x116/0x1d0 [ 16.203124] ret_from_fork_asm+0x1a/0x30 [ 16.203311] [ 16.203388] The buggy address belongs to the object at ffff888102ba6080 [ 16.203388] which belongs to the cache kmalloc-64 of size 64 [ 16.204246] The buggy address is located 0 bytes to the right of [ 16.204246] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.204782] [ 16.204876] The buggy address belongs to the physical page: [ 16.205074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.205597] flags: 0x200000000000000(node=0|zone=2) [ 16.205825] page_type: f5(slab) [ 16.206014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.206328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.206698] page dumped because: kasan: bad access detected [ 16.206868] [ 16.206937] Memory state around the buggy address: [ 16.207090] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.207303] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.207520] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.207852] ^ [ 16.208079] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.208403] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.208751] ================================================================== [ 15.645223] ================================================================== [ 15.645639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.645984] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.646287] [ 15.646411] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.646472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.646488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.646512] Call Trace: [ 15.646534] <TASK> [ 15.646557] dump_stack_lvl+0x73/0xb0 [ 15.646588] print_report+0xd1/0x650 [ 15.646623] ? __virt_addr_valid+0x1db/0x2d0 [ 15.646658] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.646681] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.646707] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.646732] kasan_report+0x141/0x180 [ 15.646755] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.646783] __asan_report_load4_noabort+0x18/0x20 [ 15.646810] kasan_atomics_helper+0x49e8/0x5450 [ 15.646834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.646857] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.646884] ? kasan_atomics+0x152/0x310 [ 15.646912] kasan_atomics+0x1dc/0x310 [ 15.646935] ? __pfx_kasan_atomics+0x10/0x10 [ 15.646960] ? __pfx_read_tsc+0x10/0x10 [ 15.646983] ? ktime_get_ts64+0x86/0x230 [ 15.647009] kunit_try_run_case+0x1a5/0x480 [ 15.647035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.647059] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.647086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.647111] ? __kthread_parkme+0x82/0x180 [ 15.647133] ? preempt_count_sub+0x50/0x80 [ 15.647159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.647184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.647210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.647236] kthread+0x337/0x6f0 [ 15.647255] ? trace_preempt_on+0x20/0xc0 [ 15.647282] ? __pfx_kthread+0x10/0x10 [ 15.647305] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.647328] ? calculate_sigpending+0x7b/0xa0 [ 15.647354] ? __pfx_kthread+0x10/0x10 [ 15.647377] ret_from_fork+0x116/0x1d0 [ 15.647396] ? __pfx_kthread+0x10/0x10 [ 15.647418] ret_from_fork_asm+0x1a/0x30 [ 15.647452] </TASK> [ 15.647463] [ 15.654656] Allocated by task 283: [ 15.654784] kasan_save_stack+0x45/0x70 [ 15.654959] kasan_save_track+0x18/0x40 [ 15.655154] kasan_save_alloc_info+0x3b/0x50 [ 15.655367] __kasan_kmalloc+0xb7/0xc0 [ 15.655622] __kmalloc_cache_noprof+0x189/0x420 [ 15.655817] kasan_atomics+0x95/0x310 [ 15.655973] kunit_try_run_case+0x1a5/0x480 [ 15.656167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.656401] kthread+0x337/0x6f0 [ 15.656566] ret_from_fork+0x116/0x1d0 [ 15.656763] ret_from_fork_asm+0x1a/0x30 [ 15.656942] [ 15.657012] The buggy address belongs to the object at ffff888102ba6080 [ 15.657012] which belongs to the cache kmalloc-64 of size 64 [ 15.657507] The buggy address is located 0 bytes to the right of [ 15.657507] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.657982] [ 15.658084] The buggy address belongs to the physical page: [ 15.658317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.658704] flags: 0x200000000000000(node=0|zone=2) [ 15.658925] page_type: f5(slab) [ 15.659083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.659365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.659743] page dumped because: kasan: bad access detected [ 15.659996] [ 15.660080] Memory state around the buggy address: [ 15.660278] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.660559] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.660860] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.661138] ^ [ 15.661349] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.661610] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.661827] ================================================================== [ 14.996833] ================================================================== [ 14.997211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.997579] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 14.997920] [ 14.998078] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.998137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.998150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.998173] Call Trace: [ 14.998190] <TASK> [ 14.998207] dump_stack_lvl+0x73/0xb0 [ 14.998238] print_report+0xd1/0x650 [ 14.998261] ? __virt_addr_valid+0x1db/0x2d0 [ 14.998285] ? kasan_atomics_helper+0x3df/0x5450 [ 14.998308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.998332] ? kasan_atomics_helper+0x3df/0x5450 [ 14.998355] kasan_report+0x141/0x180 [ 14.998378] ? kasan_atomics_helper+0x3df/0x5450 [ 14.998405] kasan_check_range+0x10c/0x1c0 [ 14.998430] __kasan_check_read+0x15/0x20 [ 14.998451] kasan_atomics_helper+0x3df/0x5450 [ 14.998474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.998499] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.998527] ? kasan_atomics+0x152/0x310 [ 14.998556] kasan_atomics+0x1dc/0x310 [ 14.998581] ? __pfx_kasan_atomics+0x10/0x10 [ 14.998616] ? __pfx_read_tsc+0x10/0x10 [ 14.998639] ? ktime_get_ts64+0x86/0x230 [ 14.998665] kunit_try_run_case+0x1a5/0x480 [ 14.998692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.998716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.998742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.998767] ? __kthread_parkme+0x82/0x180 [ 14.998789] ? preempt_count_sub+0x50/0x80 [ 14.998815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.998851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.998877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.998904] kthread+0x337/0x6f0 [ 14.998935] ? trace_preempt_on+0x20/0xc0 [ 14.998960] ? __pfx_kthread+0x10/0x10 [ 14.998982] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.999005] ? calculate_sigpending+0x7b/0xa0 [ 14.999031] ? __pfx_kthread+0x10/0x10 [ 14.999053] ret_from_fork+0x116/0x1d0 [ 14.999073] ? __pfx_kthread+0x10/0x10 [ 14.999094] ret_from_fork_asm+0x1a/0x30 [ 14.999129] </TASK> [ 14.999139] [ 15.007572] Allocated by task 283: [ 15.007748] kasan_save_stack+0x45/0x70 [ 15.007895] kasan_save_track+0x18/0x40 [ 15.008092] kasan_save_alloc_info+0x3b/0x50 [ 15.008459] __kasan_kmalloc+0xb7/0xc0 [ 15.008632] __kmalloc_cache_noprof+0x189/0x420 [ 15.009062] kasan_atomics+0x95/0x310 [ 15.009408] kunit_try_run_case+0x1a5/0x480 [ 15.009714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.009969] kthread+0x337/0x6f0 [ 15.010178] ret_from_fork+0x116/0x1d0 [ 15.010391] ret_from_fork_asm+0x1a/0x30 [ 15.010532] [ 15.010613] The buggy address belongs to the object at ffff888102ba6080 [ 15.010613] which belongs to the cache kmalloc-64 of size 64 [ 15.011361] The buggy address is located 0 bytes to the right of [ 15.011361] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.011968] [ 15.012079] The buggy address belongs to the physical page: [ 15.012300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.012538] flags: 0x200000000000000(node=0|zone=2) [ 15.012881] page_type: f5(slab) [ 15.013232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.013674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.013916] page dumped because: kasan: bad access detected [ 15.014384] [ 15.014487] Memory state around the buggy address: [ 15.014735] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.014954] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.015221] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.015580] ^ [ 15.015846] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016302] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016621] ================================================================== [ 15.082248] ================================================================== [ 15.082578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.082923] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.083298] [ 15.083416] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.083472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.083484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.083530] Call Trace: [ 15.083551] <TASK> [ 15.083573] dump_stack_lvl+0x73/0xb0 [ 15.083616] print_report+0xd1/0x650 [ 15.083651] ? __virt_addr_valid+0x1db/0x2d0 [ 15.083676] ? kasan_atomics_helper+0x565/0x5450 [ 15.083700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.083735] ? kasan_atomics_helper+0x565/0x5450 [ 15.083758] kasan_report+0x141/0x180 [ 15.083782] ? kasan_atomics_helper+0x565/0x5450 [ 15.083818] kasan_check_range+0x10c/0x1c0 [ 15.083845] __kasan_check_write+0x18/0x20 [ 15.083866] kasan_atomics_helper+0x565/0x5450 [ 15.083900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.083924] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.084001] ? kasan_atomics+0x152/0x310 [ 15.084039] kasan_atomics+0x1dc/0x310 [ 15.084063] ? __pfx_kasan_atomics+0x10/0x10 [ 15.084100] ? __pfx_read_tsc+0x10/0x10 [ 15.084123] ? ktime_get_ts64+0x86/0x230 [ 15.084149] kunit_try_run_case+0x1a5/0x480 [ 15.084175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.084199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.084226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.084260] ? __kthread_parkme+0x82/0x180 [ 15.084281] ? preempt_count_sub+0x50/0x80 [ 15.084307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.084343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.084368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.084395] kthread+0x337/0x6f0 [ 15.084414] ? trace_preempt_on+0x20/0xc0 [ 15.084440] ? __pfx_kthread+0x10/0x10 [ 15.084462] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.084484] ? calculate_sigpending+0x7b/0xa0 [ 15.084521] ? __pfx_kthread+0x10/0x10 [ 15.084544] ret_from_fork+0x116/0x1d0 [ 15.084564] ? __pfx_kthread+0x10/0x10 [ 15.084585] ret_from_fork_asm+0x1a/0x30 [ 15.084629] </TASK> [ 15.084641] [ 15.093322] Allocated by task 283: [ 15.093458] kasan_save_stack+0x45/0x70 [ 15.093617] kasan_save_track+0x18/0x40 [ 15.093878] kasan_save_alloc_info+0x3b/0x50 [ 15.094376] __kasan_kmalloc+0xb7/0xc0 [ 15.094673] __kmalloc_cache_noprof+0x189/0x420 [ 15.094914] kasan_atomics+0x95/0x310 [ 15.095164] kunit_try_run_case+0x1a5/0x480 [ 15.095404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.095717] kthread+0x337/0x6f0 [ 15.095860] ret_from_fork+0x116/0x1d0 [ 15.095995] ret_from_fork_asm+0x1a/0x30 [ 15.096136] [ 15.096206] The buggy address belongs to the object at ffff888102ba6080 [ 15.096206] which belongs to the cache kmalloc-64 of size 64 [ 15.096713] The buggy address is located 0 bytes to the right of [ 15.096713] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.097743] [ 15.097824] The buggy address belongs to the physical page: [ 15.098171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.098568] flags: 0x200000000000000(node=0|zone=2) [ 15.098921] page_type: f5(slab) [ 15.099156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.099402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.099853] page dumped because: kasan: bad access detected [ 15.100191] [ 15.100272] Memory state around the buggy address: [ 15.100428] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.100789] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.101199] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.101645] ^ [ 15.101851] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.102171] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.102384] ================================================================== [ 15.865801] ================================================================== [ 15.866192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.866546] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.866904] [ 15.866996] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.867039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.867051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.867073] Call Trace: [ 15.867088] <TASK> [ 15.867104] dump_stack_lvl+0x73/0xb0 [ 15.867134] print_report+0xd1/0x650 [ 15.867158] ? __virt_addr_valid+0x1db/0x2d0 [ 15.867194] ? kasan_atomics_helper+0x177f/0x5450 [ 15.867217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.867242] ? kasan_atomics_helper+0x177f/0x5450 [ 15.867276] kasan_report+0x141/0x180 [ 15.867299] ? kasan_atomics_helper+0x177f/0x5450 [ 15.867327] kasan_check_range+0x10c/0x1c0 [ 15.867352] __kasan_check_write+0x18/0x20 [ 15.867373] kasan_atomics_helper+0x177f/0x5450 [ 15.867398] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.867422] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.867449] ? kasan_atomics+0x152/0x310 [ 15.867477] kasan_atomics+0x1dc/0x310 [ 15.867519] ? __pfx_kasan_atomics+0x10/0x10 [ 15.867545] ? __pfx_read_tsc+0x10/0x10 [ 15.867568] ? ktime_get_ts64+0x86/0x230 [ 15.867594] kunit_try_run_case+0x1a5/0x480 [ 15.867630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.867657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.867693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.867718] ? __kthread_parkme+0x82/0x180 [ 15.867740] ? preempt_count_sub+0x50/0x80 [ 15.867779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.867805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.867831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.867857] kthread+0x337/0x6f0 [ 15.867878] ? trace_preempt_on+0x20/0xc0 [ 15.867903] ? __pfx_kthread+0x10/0x10 [ 15.867925] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.867948] ? calculate_sigpending+0x7b/0xa0 [ 15.867974] ? __pfx_kthread+0x10/0x10 [ 15.867996] ret_from_fork+0x116/0x1d0 [ 15.868016] ? __pfx_kthread+0x10/0x10 [ 15.868037] ret_from_fork_asm+0x1a/0x30 [ 15.868071] </TASK> [ 15.868082] [ 15.875623] Allocated by task 283: [ 15.875833] kasan_save_stack+0x45/0x70 [ 15.875996] kasan_save_track+0x18/0x40 [ 15.876202] kasan_save_alloc_info+0x3b/0x50 [ 15.876412] __kasan_kmalloc+0xb7/0xc0 [ 15.876609] __kmalloc_cache_noprof+0x189/0x420 [ 15.876857] kasan_atomics+0x95/0x310 [ 15.877010] kunit_try_run_case+0x1a5/0x480 [ 15.877157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.877428] kthread+0x337/0x6f0 [ 15.877629] ret_from_fork+0x116/0x1d0 [ 15.877821] ret_from_fork_asm+0x1a/0x30 [ 15.877997] [ 15.878082] The buggy address belongs to the object at ffff888102ba6080 [ 15.878082] which belongs to the cache kmalloc-64 of size 64 [ 15.878614] The buggy address is located 0 bytes to the right of [ 15.878614] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.879132] [ 15.879235] The buggy address belongs to the physical page: [ 15.879446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.879717] flags: 0x200000000000000(node=0|zone=2) [ 15.879880] page_type: f5(slab) [ 15.880000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.880353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.880718] page dumped because: kasan: bad access detected [ 15.880968] [ 15.881065] Memory state around the buggy address: [ 15.881291] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.881611] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.881831] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.882044] ^ [ 15.882217] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.882579] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.882940] ================================================================== [ 16.138833] ================================================================== [ 16.139385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.139734] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.140038] [ 16.140148] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.140190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.140203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.140225] Call Trace: [ 16.140240] <TASK> [ 16.140256] dump_stack_lvl+0x73/0xb0 [ 16.140284] print_report+0xd1/0x650 [ 16.140308] ? __virt_addr_valid+0x1db/0x2d0 [ 16.140332] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.140355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.140379] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.140403] kasan_report+0x141/0x180 [ 16.140426] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.140454] kasan_check_range+0x10c/0x1c0 [ 16.140481] __kasan_check_write+0x18/0x20 [ 16.140501] kasan_atomics_helper+0x1eaa/0x5450 [ 16.140537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.140561] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.140588] ? kasan_atomics+0x152/0x310 [ 16.140627] kasan_atomics+0x1dc/0x310 [ 16.140651] ? __pfx_kasan_atomics+0x10/0x10 [ 16.140677] ? __pfx_read_tsc+0x10/0x10 [ 16.140700] ? ktime_get_ts64+0x86/0x230 [ 16.140726] kunit_try_run_case+0x1a5/0x480 [ 16.140752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.140776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.140802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.140826] ? __kthread_parkme+0x82/0x180 [ 16.140848] ? preempt_count_sub+0x50/0x80 [ 16.140873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.140898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.140924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.140950] kthread+0x337/0x6f0 [ 16.140971] ? trace_preempt_on+0x20/0xc0 [ 16.140996] ? __pfx_kthread+0x10/0x10 [ 16.141017] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.141039] ? calculate_sigpending+0x7b/0xa0 [ 16.141065] ? __pfx_kthread+0x10/0x10 [ 16.141087] ret_from_fork+0x116/0x1d0 [ 16.141106] ? __pfx_kthread+0x10/0x10 [ 16.141127] ret_from_fork_asm+0x1a/0x30 [ 16.141160] </TASK> [ 16.141171] [ 16.149012] Allocated by task 283: [ 16.149172] kasan_save_stack+0x45/0x70 [ 16.149361] kasan_save_track+0x18/0x40 [ 16.149530] kasan_save_alloc_info+0x3b/0x50 [ 16.149764] __kasan_kmalloc+0xb7/0xc0 [ 16.149938] __kmalloc_cache_noprof+0x189/0x420 [ 16.150123] kasan_atomics+0x95/0x310 [ 16.150313] kunit_try_run_case+0x1a5/0x480 [ 16.150502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.150752] kthread+0x337/0x6f0 [ 16.150904] ret_from_fork+0x116/0x1d0 [ 16.151063] ret_from_fork_asm+0x1a/0x30 [ 16.151204] [ 16.151290] The buggy address belongs to the object at ffff888102ba6080 [ 16.151290] which belongs to the cache kmalloc-64 of size 64 [ 16.151903] The buggy address is located 0 bytes to the right of [ 16.151903] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.152382] [ 16.152481] The buggy address belongs to the physical page: [ 16.152743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.153052] flags: 0x200000000000000(node=0|zone=2) [ 16.153228] page_type: f5(slab) [ 16.153374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.153758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.154008] page dumped because: kasan: bad access detected [ 16.154177] [ 16.154246] Memory state around the buggy address: [ 16.154400] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.154691] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.155061] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.155371] ^ [ 16.155549] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.155772] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.155981] ================================================================== [ 15.584237] ================================================================== [ 15.584528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.584892] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.585224] [ 15.585334] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.585374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.585386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.585407] Call Trace: [ 15.585424] <TASK> [ 15.585440] dump_stack_lvl+0x73/0xb0 [ 15.585481] print_report+0xd1/0x650 [ 15.585504] ? __virt_addr_valid+0x1db/0x2d0 [ 15.585540] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.585563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.585587] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.585620] kasan_report+0x141/0x180 [ 15.585643] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.585671] __asan_report_load4_noabort+0x18/0x20 [ 15.585697] kasan_atomics_helper+0x4a02/0x5450 [ 15.585727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.585753] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.585782] ? kasan_atomics+0x152/0x310 [ 15.585810] kasan_atomics+0x1dc/0x310 [ 15.585834] ? __pfx_kasan_atomics+0x10/0x10 [ 15.585859] ? __pfx_read_tsc+0x10/0x10 [ 15.585882] ? ktime_get_ts64+0x86/0x230 [ 15.585908] kunit_try_run_case+0x1a5/0x480 [ 15.585934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.585958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.585985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.586010] ? __kthread_parkme+0x82/0x180 [ 15.586032] ? preempt_count_sub+0x50/0x80 [ 15.586058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.586083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.586109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.586135] kthread+0x337/0x6f0 [ 15.586155] ? trace_preempt_on+0x20/0xc0 [ 15.586180] ? __pfx_kthread+0x10/0x10 [ 15.586201] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.586224] ? calculate_sigpending+0x7b/0xa0 [ 15.586249] ? __pfx_kthread+0x10/0x10 [ 15.586272] ret_from_fork+0x116/0x1d0 [ 15.586291] ? __pfx_kthread+0x10/0x10 [ 15.586312] ret_from_fork_asm+0x1a/0x30 [ 15.586346] </TASK> [ 15.586357] [ 15.597816] Allocated by task 283: [ 15.597958] kasan_save_stack+0x45/0x70 [ 15.598112] kasan_save_track+0x18/0x40 [ 15.598251] kasan_save_alloc_info+0x3b/0x50 [ 15.598401] __kasan_kmalloc+0xb7/0xc0 [ 15.599104] __kmalloc_cache_noprof+0x189/0x420 [ 15.599698] kasan_atomics+0x95/0x310 [ 15.600233] kunit_try_run_case+0x1a5/0x480 [ 15.600883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.601562] kthread+0x337/0x6f0 [ 15.602038] ret_from_fork+0x116/0x1d0 [ 15.602540] ret_from_fork_asm+0x1a/0x30 [ 15.603101] [ 15.603407] The buggy address belongs to the object at ffff888102ba6080 [ 15.603407] which belongs to the cache kmalloc-64 of size 64 [ 15.604447] The buggy address is located 0 bytes to the right of [ 15.604447] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.605431] [ 15.605750] The buggy address belongs to the physical page: [ 15.606332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.607167] flags: 0x200000000000000(node=0|zone=2) [ 15.607342] page_type: f5(slab) [ 15.607463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.608493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.609345] page dumped because: kasan: bad access detected [ 15.609969] [ 15.610051] Memory state around the buggy address: [ 15.610209] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.610430] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.611453] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.612349] ^ [ 15.613002] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613937] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.614470] ================================================================== [ 16.047908] ================================================================== [ 16.048770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.049110] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.049721] [ 16.049974] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.050024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.050037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.050168] Call Trace: [ 16.050193] <TASK> [ 16.050213] dump_stack_lvl+0x73/0xb0 [ 16.050247] print_report+0xd1/0x650 [ 16.050270] ? __virt_addr_valid+0x1db/0x2d0 [ 16.050294] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.050317] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.050343] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.050366] kasan_report+0x141/0x180 [ 16.050389] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.050417] __asan_report_load8_noabort+0x18/0x20 [ 16.050443] kasan_atomics_helper+0x4f30/0x5450 [ 16.050467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.050491] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.050528] ? kasan_atomics+0x152/0x310 [ 16.050557] kasan_atomics+0x1dc/0x310 [ 16.050580] ? __pfx_kasan_atomics+0x10/0x10 [ 16.050617] ? __pfx_read_tsc+0x10/0x10 [ 16.050640] ? ktime_get_ts64+0x86/0x230 [ 16.050667] kunit_try_run_case+0x1a5/0x480 [ 16.050694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.050720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.050747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.050772] ? __kthread_parkme+0x82/0x180 [ 16.050794] ? preempt_count_sub+0x50/0x80 [ 16.050820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.050847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.050873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.050899] kthread+0x337/0x6f0 [ 16.050919] ? trace_preempt_on+0x20/0xc0 [ 16.050945] ? __pfx_kthread+0x10/0x10 [ 16.050967] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.050990] ? calculate_sigpending+0x7b/0xa0 [ 16.051016] ? __pfx_kthread+0x10/0x10 [ 16.051039] ret_from_fork+0x116/0x1d0 [ 16.051059] ? __pfx_kthread+0x10/0x10 [ 16.051080] ret_from_fork_asm+0x1a/0x30 [ 16.051113] </TASK> [ 16.051125] [ 16.062214] Allocated by task 283: [ 16.062348] kasan_save_stack+0x45/0x70 [ 16.062631] kasan_save_track+0x18/0x40 [ 16.063040] kasan_save_alloc_info+0x3b/0x50 [ 16.063264] __kasan_kmalloc+0xb7/0xc0 [ 16.063450] __kmalloc_cache_noprof+0x189/0x420 [ 16.063943] kasan_atomics+0x95/0x310 [ 16.064130] kunit_try_run_case+0x1a5/0x480 [ 16.064333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.064740] kthread+0x337/0x6f0 [ 16.065082] ret_from_fork+0x116/0x1d0 [ 16.065346] ret_from_fork_asm+0x1a/0x30 [ 16.065717] [ 16.065916] The buggy address belongs to the object at ffff888102ba6080 [ 16.065916] which belongs to the cache kmalloc-64 of size 64 [ 16.066534] The buggy address is located 0 bytes to the right of [ 16.066534] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.067335] [ 16.067562] The buggy address belongs to the physical page: [ 16.067875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.068224] flags: 0x200000000000000(node=0|zone=2) [ 16.068459] page_type: f5(slab) [ 16.068835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.069241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.069667] page dumped because: kasan: bad access detected [ 16.069921] [ 16.070148] Memory state around the buggy address: [ 16.070328] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.070783] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.071151] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.071555] ^ [ 16.071762] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.072131] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.072431] ================================================================== [ 14.975109] ================================================================== [ 14.975362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.975628] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 14.975853] [ 14.975945] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.975992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.976332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.976366] Call Trace: [ 14.976389] <TASK> [ 14.976411] dump_stack_lvl+0x73/0xb0 [ 14.976445] print_report+0xd1/0x650 [ 14.976470] ? __virt_addr_valid+0x1db/0x2d0 [ 14.976510] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.976542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.976566] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.976613] kasan_report+0x141/0x180 [ 14.976636] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.976664] __asan_report_store4_noabort+0x1b/0x30 [ 14.976692] kasan_atomics_helper+0x4b6e/0x5450 [ 14.976716] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.976750] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.976777] ? kasan_atomics+0x152/0x310 [ 14.976815] kasan_atomics+0x1dc/0x310 [ 14.976839] ? __pfx_kasan_atomics+0x10/0x10 [ 14.976865] ? __pfx_read_tsc+0x10/0x10 [ 14.976897] ? ktime_get_ts64+0x86/0x230 [ 14.976923] kunit_try_run_case+0x1a5/0x480 [ 14.976950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.977359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.977399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.977436] ? __kthread_parkme+0x82/0x180 [ 14.977460] ? preempt_count_sub+0x50/0x80 [ 14.977497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.977535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.977562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.977597] kthread+0x337/0x6f0 [ 14.977627] ? trace_preempt_on+0x20/0xc0 [ 14.977653] ? __pfx_kthread+0x10/0x10 [ 14.977687] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.977717] ? calculate_sigpending+0x7b/0xa0 [ 14.977753] ? __pfx_kthread+0x10/0x10 [ 14.977777] ret_from_fork+0x116/0x1d0 [ 14.977797] ? __pfx_kthread+0x10/0x10 [ 14.977819] ret_from_fork_asm+0x1a/0x30 [ 14.977854] </TASK> [ 14.977866] [ 14.987445] Allocated by task 283: [ 14.987589] kasan_save_stack+0x45/0x70 [ 14.987756] kasan_save_track+0x18/0x40 [ 14.987894] kasan_save_alloc_info+0x3b/0x50 [ 14.988167] __kasan_kmalloc+0xb7/0xc0 [ 14.988376] __kmalloc_cache_noprof+0x189/0x420 [ 14.988731] kasan_atomics+0x95/0x310 [ 14.988964] kunit_try_run_case+0x1a5/0x480 [ 14.989185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.989444] kthread+0x337/0x6f0 [ 14.989687] ret_from_fork+0x116/0x1d0 [ 14.989898] ret_from_fork_asm+0x1a/0x30 [ 14.990155] [ 14.990252] The buggy address belongs to the object at ffff888102ba6080 [ 14.990252] which belongs to the cache kmalloc-64 of size 64 [ 14.990888] The buggy address is located 0 bytes to the right of [ 14.990888] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 14.991312] [ 14.991385] The buggy address belongs to the physical page: [ 14.991556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 14.991805] flags: 0x200000000000000(node=0|zone=2) [ 14.992295] page_type: f5(slab) [ 14.992494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.992892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.993518] page dumped because: kasan: bad access detected [ 14.993839] [ 14.994018] Memory state around the buggy address: [ 14.994242] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.994650] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.995020] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.995355] ^ [ 14.995588] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.995898] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.996275] ================================================================== [ 15.262577] ================================================================== [ 15.262912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.263231] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.263988] [ 15.264360] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.264410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.264423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.264446] Call Trace: [ 15.264507] <TASK> [ 15.264540] dump_stack_lvl+0x73/0xb0 [ 15.264574] print_report+0xd1/0x650 [ 15.264597] ? __virt_addr_valid+0x1db/0x2d0 [ 15.264634] ? kasan_atomics_helper+0x992/0x5450 [ 15.264656] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.264681] ? kasan_atomics_helper+0x992/0x5450 [ 15.264704] kasan_report+0x141/0x180 [ 15.264726] ? kasan_atomics_helper+0x992/0x5450 [ 15.264755] kasan_check_range+0x10c/0x1c0 [ 15.264780] __kasan_check_write+0x18/0x20 [ 15.264801] kasan_atomics_helper+0x992/0x5450 [ 15.264826] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.264849] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.264876] ? kasan_atomics+0x152/0x310 [ 15.264904] kasan_atomics+0x1dc/0x310 [ 15.264927] ? __pfx_kasan_atomics+0x10/0x10 [ 15.264952] ? __pfx_read_tsc+0x10/0x10 [ 15.264975] ? ktime_get_ts64+0x86/0x230 [ 15.265001] kunit_try_run_case+0x1a5/0x480 [ 15.265026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.265051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.265077] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.265103] ? __kthread_parkme+0x82/0x180 [ 15.265125] ? preempt_count_sub+0x50/0x80 [ 15.265150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.265176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.265202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.265229] kthread+0x337/0x6f0 [ 15.265248] ? trace_preempt_on+0x20/0xc0 [ 15.265274] ? __pfx_kthread+0x10/0x10 [ 15.265295] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.265318] ? calculate_sigpending+0x7b/0xa0 [ 15.265344] ? __pfx_kthread+0x10/0x10 [ 15.265367] ret_from_fork+0x116/0x1d0 [ 15.265386] ? __pfx_kthread+0x10/0x10 [ 15.265407] ret_from_fork_asm+0x1a/0x30 [ 15.265441] </TASK> [ 15.265453] [ 15.276800] Allocated by task 283: [ 15.276983] kasan_save_stack+0x45/0x70 [ 15.277175] kasan_save_track+0x18/0x40 [ 15.277357] kasan_save_alloc_info+0x3b/0x50 [ 15.277893] __kasan_kmalloc+0xb7/0xc0 [ 15.278133] __kmalloc_cache_noprof+0x189/0x420 [ 15.278455] kasan_atomics+0x95/0x310 [ 15.278834] kunit_try_run_case+0x1a5/0x480 [ 15.279140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.279485] kthread+0x337/0x6f0 [ 15.279762] ret_from_fork+0x116/0x1d0 [ 15.279947] ret_from_fork_asm+0x1a/0x30 [ 15.280134] [ 15.280224] The buggy address belongs to the object at ffff888102ba6080 [ 15.280224] which belongs to the cache kmalloc-64 of size 64 [ 15.281275] The buggy address is located 0 bytes to the right of [ 15.281275] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.282177] [ 15.282431] The buggy address belongs to the physical page: [ 15.282945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.283446] flags: 0x200000000000000(node=0|zone=2) [ 15.283855] page_type: f5(slab) [ 15.284146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.284476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.285139] page dumped because: kasan: bad access detected [ 15.285389] [ 15.285483] Memory state around the buggy address: [ 15.285924] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.286235] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.286706] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.287194] ^ [ 15.287530] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288003] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288294] ================================================================== [ 15.370353] ================================================================== [ 15.370764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.371211] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.371671] [ 15.371802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.372060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.372074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.372096] Call Trace: [ 15.372113] <TASK> [ 15.372131] dump_stack_lvl+0x73/0xb0 [ 15.372198] print_report+0xd1/0x650 [ 15.372222] ? __virt_addr_valid+0x1db/0x2d0 [ 15.372246] ? kasan_atomics_helper+0xc70/0x5450 [ 15.372269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.372294] ? kasan_atomics_helper+0xc70/0x5450 [ 15.372317] kasan_report+0x141/0x180 [ 15.372340] ? kasan_atomics_helper+0xc70/0x5450 [ 15.372367] kasan_check_range+0x10c/0x1c0 [ 15.372393] __kasan_check_write+0x18/0x20 [ 15.372413] kasan_atomics_helper+0xc70/0x5450 [ 15.372436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.372460] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.372486] ? kasan_atomics+0x152/0x310 [ 15.372514] kasan_atomics+0x1dc/0x310 [ 15.372537] ? __pfx_kasan_atomics+0x10/0x10 [ 15.372563] ? __pfx_read_tsc+0x10/0x10 [ 15.372585] ? ktime_get_ts64+0x86/0x230 [ 15.372621] kunit_try_run_case+0x1a5/0x480 [ 15.372647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.372672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.372697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.372721] ? __kthread_parkme+0x82/0x180 [ 15.372743] ? preempt_count_sub+0x50/0x80 [ 15.372768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.372793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.372819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.372845] kthread+0x337/0x6f0 [ 15.372866] ? trace_preempt_on+0x20/0xc0 [ 15.372891] ? __pfx_kthread+0x10/0x10 [ 15.372913] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.372935] ? calculate_sigpending+0x7b/0xa0 [ 15.372960] ? __pfx_kthread+0x10/0x10 [ 15.372983] ret_from_fork+0x116/0x1d0 [ 15.373003] ? __pfx_kthread+0x10/0x10 [ 15.373024] ret_from_fork_asm+0x1a/0x30 [ 15.373058] </TASK> [ 15.373069] [ 15.384237] Allocated by task 283: [ 15.384530] kasan_save_stack+0x45/0x70 [ 15.384921] kasan_save_track+0x18/0x40 [ 15.385219] kasan_save_alloc_info+0x3b/0x50 [ 15.385565] __kasan_kmalloc+0xb7/0xc0 [ 15.385899] __kmalloc_cache_noprof+0x189/0x420 [ 15.386116] kasan_atomics+0x95/0x310 [ 15.386295] kunit_try_run_case+0x1a5/0x480 [ 15.386489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.387022] kthread+0x337/0x6f0 [ 15.387311] ret_from_fork+0x116/0x1d0 [ 15.387719] ret_from_fork_asm+0x1a/0x30 [ 15.388025] [ 15.388135] The buggy address belongs to the object at ffff888102ba6080 [ 15.388135] which belongs to the cache kmalloc-64 of size 64 [ 15.388898] The buggy address is located 0 bytes to the right of [ 15.388898] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.389787] [ 15.389892] The buggy address belongs to the physical page: [ 15.390289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.390950] flags: 0x200000000000000(node=0|zone=2) [ 15.391255] page_type: f5(slab) [ 15.391531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.392074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.392396] page dumped because: kasan: bad access detected [ 15.392855] [ 15.393095] Memory state around the buggy address: [ 15.393434] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.393964] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.394263] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.394841] ^ [ 15.395147] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.395646] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.396134] ================================================================== [ 15.829287] ================================================================== [ 15.829664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.830035] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.830342] [ 15.830470] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.830545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.830559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.830582] Call Trace: [ 15.830619] <TASK> [ 15.830637] dump_stack_lvl+0x73/0xb0 [ 15.830668] print_report+0xd1/0x650 [ 15.830692] ? __virt_addr_valid+0x1db/0x2d0 [ 15.830726] ? kasan_atomics_helper+0x164f/0x5450 [ 15.830748] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.830773] ? kasan_atomics_helper+0x164f/0x5450 [ 15.830807] kasan_report+0x141/0x180 [ 15.830830] ? kasan_atomics_helper+0x164f/0x5450 [ 15.830858] kasan_check_range+0x10c/0x1c0 [ 15.830892] __kasan_check_write+0x18/0x20 [ 15.830913] kasan_atomics_helper+0x164f/0x5450 [ 15.830937] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.830972] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.831000] ? kasan_atomics+0x152/0x310 [ 15.831028] kasan_atomics+0x1dc/0x310 [ 15.831062] ? __pfx_kasan_atomics+0x10/0x10 [ 15.831087] ? __pfx_read_tsc+0x10/0x10 [ 15.831110] ? ktime_get_ts64+0x86/0x230 [ 15.831136] kunit_try_run_case+0x1a5/0x480 [ 15.831171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.831195] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.831227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.831253] ? __kthread_parkme+0x82/0x180 [ 15.831275] ? preempt_count_sub+0x50/0x80 [ 15.831301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.831326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.831353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.831379] kthread+0x337/0x6f0 [ 15.831399] ? trace_preempt_on+0x20/0xc0 [ 15.831424] ? __pfx_kthread+0x10/0x10 [ 15.831446] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.831468] ? calculate_sigpending+0x7b/0xa0 [ 15.831516] ? __pfx_kthread+0x10/0x10 [ 15.831539] ret_from_fork+0x116/0x1d0 [ 15.831559] ? __pfx_kthread+0x10/0x10 [ 15.831581] ret_from_fork_asm+0x1a/0x30 [ 15.831624] </TASK> [ 15.831635] [ 15.839147] Allocated by task 283: [ 15.839300] kasan_save_stack+0x45/0x70 [ 15.839446] kasan_save_track+0x18/0x40 [ 15.839616] kasan_save_alloc_info+0x3b/0x50 [ 15.839847] __kasan_kmalloc+0xb7/0xc0 [ 15.840034] __kmalloc_cache_noprof+0x189/0x420 [ 15.840258] kasan_atomics+0x95/0x310 [ 15.840446] kunit_try_run_case+0x1a5/0x480 [ 15.840687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.840923] kthread+0x337/0x6f0 [ 15.841045] ret_from_fork+0x116/0x1d0 [ 15.841219] ret_from_fork_asm+0x1a/0x30 [ 15.841429] [ 15.841569] The buggy address belongs to the object at ffff888102ba6080 [ 15.841569] which belongs to the cache kmalloc-64 of size 64 [ 15.842078] The buggy address is located 0 bytes to the right of [ 15.842078] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.842657] [ 15.842760] The buggy address belongs to the physical page: [ 15.842980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.843318] flags: 0x200000000000000(node=0|zone=2) [ 15.843552] page_type: f5(slab) [ 15.843688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.843917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.844147] page dumped because: kasan: bad access detected [ 15.844409] [ 15.844538] Memory state around the buggy address: [ 15.844768] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.845081] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.845392] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.845733] ^ [ 15.845924] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.846219] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.846433] ================================================================== [ 15.397414] ================================================================== [ 15.397761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.398420] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.399110] [ 15.399223] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.399365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.399381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.399404] Call Trace: [ 15.399422] <TASK> [ 15.399441] dump_stack_lvl+0x73/0xb0 [ 15.399473] print_report+0xd1/0x650 [ 15.399514] ? __virt_addr_valid+0x1db/0x2d0 [ 15.399539] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.399562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.399587] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.399619] kasan_report+0x141/0x180 [ 15.399643] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.399670] __asan_report_load4_noabort+0x18/0x20 [ 15.399696] kasan_atomics_helper+0x4a84/0x5450 [ 15.399719] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.399743] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.399770] ? kasan_atomics+0x152/0x310 [ 15.399797] kasan_atomics+0x1dc/0x310 [ 15.399820] ? __pfx_kasan_atomics+0x10/0x10 [ 15.399845] ? __pfx_read_tsc+0x10/0x10 [ 15.399867] ? ktime_get_ts64+0x86/0x230 [ 15.399893] kunit_try_run_case+0x1a5/0x480 [ 15.399917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.399942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.399968] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.399992] ? __kthread_parkme+0x82/0x180 [ 15.400014] ? preempt_count_sub+0x50/0x80 [ 15.400038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.400065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.400090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.400117] kthread+0x337/0x6f0 [ 15.400137] ? trace_preempt_on+0x20/0xc0 [ 15.400163] ? __pfx_kthread+0x10/0x10 [ 15.400185] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.400208] ? calculate_sigpending+0x7b/0xa0 [ 15.400234] ? __pfx_kthread+0x10/0x10 [ 15.400257] ret_from_fork+0x116/0x1d0 [ 15.400276] ? __pfx_kthread+0x10/0x10 [ 15.400298] ret_from_fork_asm+0x1a/0x30 [ 15.400331] </TASK> [ 15.400342] [ 15.407274] Allocated by task 283: [ 15.407461] kasan_save_stack+0x45/0x70 [ 15.407682] kasan_save_track+0x18/0x40 [ 15.407881] kasan_save_alloc_info+0x3b/0x50 [ 15.408327] __kasan_kmalloc+0xb7/0xc0 [ 15.408520] __kmalloc_cache_noprof+0x189/0x420 [ 15.408721] kasan_atomics+0x95/0x310 [ 15.408915] kunit_try_run_case+0x1a5/0x480 [ 15.409096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.409275] kthread+0x337/0x6f0 [ 15.409393] ret_from_fork+0x116/0x1d0 [ 15.409661] ret_from_fork_asm+0x1a/0x30 [ 15.409864] [ 15.409956] The buggy address belongs to the object at ffff888102ba6080 [ 15.409956] which belongs to the cache kmalloc-64 of size 64 [ 15.410420] The buggy address is located 0 bytes to the right of [ 15.410420] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.410895] [ 15.411058] The buggy address belongs to the physical page: [ 15.411278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.411510] flags: 0x200000000000000(node=0|zone=2) [ 15.411960] page_type: f5(slab) [ 15.412143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.412408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.412974] page dumped because: kasan: bad access detected [ 15.413194] [ 15.413288] Memory state around the buggy address: [ 15.413490] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.413781] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.414020] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.414232] ^ [ 15.414384] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.414662] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.414982] ================================================================== [ 15.811246] ================================================================== [ 15.811556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.811978] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.812317] [ 15.812434] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.812480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.812513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.812536] Call Trace: [ 15.812554] <TASK> [ 15.812575] dump_stack_lvl+0x73/0xb0 [ 15.812614] print_report+0xd1/0x650 [ 15.812648] ? __virt_addr_valid+0x1db/0x2d0 [ 15.812673] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.812695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.812731] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.812754] kasan_report+0x141/0x180 [ 15.812777] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.812805] kasan_check_range+0x10c/0x1c0 [ 15.812830] __kasan_check_write+0x18/0x20 [ 15.812851] kasan_atomics_helper+0x15b6/0x5450 [ 15.812875] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.812899] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.812937] ? kasan_atomics+0x152/0x310 [ 15.812964] kasan_atomics+0x1dc/0x310 [ 15.812998] ? __pfx_kasan_atomics+0x10/0x10 [ 15.813024] ? __pfx_read_tsc+0x10/0x10 [ 15.813046] ? ktime_get_ts64+0x86/0x230 [ 15.813073] kunit_try_run_case+0x1a5/0x480 [ 15.813098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.813148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.813173] ? __kthread_parkme+0x82/0x180 [ 15.813195] ? preempt_count_sub+0x50/0x80 [ 15.813230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.813282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.813319] kthread+0x337/0x6f0 [ 15.813339] ? trace_preempt_on+0x20/0xc0 [ 15.813364] ? __pfx_kthread+0x10/0x10 [ 15.813387] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.813410] ? calculate_sigpending+0x7b/0xa0 [ 15.813435] ? __pfx_kthread+0x10/0x10 [ 15.813458] ret_from_fork+0x116/0x1d0 [ 15.813477] ? __pfx_kthread+0x10/0x10 [ 15.813518] ret_from_fork_asm+0x1a/0x30 [ 15.813551] </TASK> [ 15.813562] [ 15.821162] Allocated by task 283: [ 15.821347] kasan_save_stack+0x45/0x70 [ 15.821567] kasan_save_track+0x18/0x40 [ 15.821775] kasan_save_alloc_info+0x3b/0x50 [ 15.821929] __kasan_kmalloc+0xb7/0xc0 [ 15.822063] __kmalloc_cache_noprof+0x189/0x420 [ 15.822309] kasan_atomics+0x95/0x310 [ 15.822515] kunit_try_run_case+0x1a5/0x480 [ 15.822733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822987] kthread+0x337/0x6f0 [ 15.823149] ret_from_fork+0x116/0x1d0 [ 15.823282] ret_from_fork_asm+0x1a/0x30 [ 15.823448] [ 15.823568] The buggy address belongs to the object at ffff888102ba6080 [ 15.823568] which belongs to the cache kmalloc-64 of size 64 [ 15.824107] The buggy address is located 0 bytes to the right of [ 15.824107] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.824477] [ 15.824569] The buggy address belongs to the physical page: [ 15.824830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.825242] flags: 0x200000000000000(node=0|zone=2) [ 15.825535] page_type: f5(slab) [ 15.825713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.826054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.826314] page dumped because: kasan: bad access detected [ 15.826509] [ 15.826584] Memory state around the buggy address: [ 15.826824] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.827170] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.827534] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.827855] ^ [ 15.828025] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.828240] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.828526] ================================================================== [ 15.103245] ================================================================== [ 15.103952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.104194] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.104461] [ 15.104568] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.104619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.104631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.104653] Call Trace: [ 15.104671] <TASK> [ 15.104687] dump_stack_lvl+0x73/0xb0 [ 15.104717] print_report+0xd1/0x650 [ 15.104740] ? __virt_addr_valid+0x1db/0x2d0 [ 15.104831] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.104857] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.104883] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.104917] kasan_report+0x141/0x180 [ 15.104977] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.105005] kasan_check_range+0x10c/0x1c0 [ 15.105030] __kasan_check_write+0x18/0x20 [ 15.105051] kasan_atomics_helper+0x5fe/0x5450 [ 15.105076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.105109] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.105137] ? kasan_atomics+0x152/0x310 [ 15.105163] kasan_atomics+0x1dc/0x310 [ 15.105198] ? __pfx_kasan_atomics+0x10/0x10 [ 15.105224] ? __pfx_read_tsc+0x10/0x10 [ 15.105246] ? ktime_get_ts64+0x86/0x230 [ 15.105281] kunit_try_run_case+0x1a5/0x480 [ 15.105306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.105340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.105366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.105392] ? __kthread_parkme+0x82/0x180 [ 15.105413] ? preempt_count_sub+0x50/0x80 [ 15.105438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.105464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.105490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.105516] kthread+0x337/0x6f0 [ 15.105536] ? trace_preempt_on+0x20/0xc0 [ 15.105561] ? __pfx_kthread+0x10/0x10 [ 15.105583] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.105615] ? calculate_sigpending+0x7b/0xa0 [ 15.105651] ? __pfx_kthread+0x10/0x10 [ 15.105673] ret_from_fork+0x116/0x1d0 [ 15.105694] ? __pfx_kthread+0x10/0x10 [ 15.105729] ret_from_fork_asm+0x1a/0x30 [ 15.105763] </TASK> [ 15.105774] [ 15.114278] Allocated by task 283: [ 15.114566] kasan_save_stack+0x45/0x70 [ 15.114842] kasan_save_track+0x18/0x40 [ 15.115154] kasan_save_alloc_info+0x3b/0x50 [ 15.115312] __kasan_kmalloc+0xb7/0xc0 [ 15.115497] __kmalloc_cache_noprof+0x189/0x420 [ 15.115747] kasan_atomics+0x95/0x310 [ 15.115979] kunit_try_run_case+0x1a5/0x480 [ 15.116234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.116475] kthread+0x337/0x6f0 [ 15.116680] ret_from_fork+0x116/0x1d0 [ 15.116877] ret_from_fork_asm+0x1a/0x30 [ 15.117139] [ 15.117224] The buggy address belongs to the object at ffff888102ba6080 [ 15.117224] which belongs to the cache kmalloc-64 of size 64 [ 15.117693] The buggy address is located 0 bytes to the right of [ 15.117693] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.118060] [ 15.118151] The buggy address belongs to the physical page: [ 15.118455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.119379] flags: 0x200000000000000(node=0|zone=2) [ 15.119707] page_type: f5(slab) [ 15.119871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.120203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.120435] page dumped because: kasan: bad access detected [ 15.120639] [ 15.120736] Memory state around the buggy address: [ 15.120979] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.121350] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.121779] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.122126] ^ [ 15.122286] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122743] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.123103] ================================================================== [ 15.940059] ================================================================== [ 15.940414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.940795] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.941202] [ 15.941372] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.941440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.941453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.941476] Call Trace: [ 15.941517] <TASK> [ 15.941534] dump_stack_lvl+0x73/0xb0 [ 15.941563] print_report+0xd1/0x650 [ 15.941586] ? __virt_addr_valid+0x1db/0x2d0 [ 15.941623] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.941645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.941670] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.941694] kasan_report+0x141/0x180 [ 15.941720] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.941748] kasan_check_range+0x10c/0x1c0 [ 15.941804] __kasan_check_write+0x18/0x20 [ 15.941824] kasan_atomics_helper+0x19e3/0x5450 [ 15.941849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.941883] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.941910] ? kasan_atomics+0x152/0x310 [ 15.941937] kasan_atomics+0x1dc/0x310 [ 15.941960] ? __pfx_kasan_atomics+0x10/0x10 [ 15.941986] ? __pfx_read_tsc+0x10/0x10 [ 15.942008] ? ktime_get_ts64+0x86/0x230 [ 15.942034] kunit_try_run_case+0x1a5/0x480 [ 15.942058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.942107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.942133] ? __kthread_parkme+0x82/0x180 [ 15.942155] ? preempt_count_sub+0x50/0x80 [ 15.942181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.942233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.942259] kthread+0x337/0x6f0 [ 15.942279] ? trace_preempt_on+0x20/0xc0 [ 15.942304] ? __pfx_kthread+0x10/0x10 [ 15.942326] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.942349] ? calculate_sigpending+0x7b/0xa0 [ 15.942374] ? __pfx_kthread+0x10/0x10 [ 15.942397] ret_from_fork+0x116/0x1d0 [ 15.942417] ? __pfx_kthread+0x10/0x10 [ 15.942439] ret_from_fork_asm+0x1a/0x30 [ 15.942471] </TASK> [ 15.942483] [ 15.954834] Allocated by task 283: [ 15.955197] kasan_save_stack+0x45/0x70 [ 15.955626] kasan_save_track+0x18/0x40 [ 15.956012] kasan_save_alloc_info+0x3b/0x50 [ 15.956438] __kasan_kmalloc+0xb7/0xc0 [ 15.956710] __kmalloc_cache_noprof+0x189/0x420 [ 15.956871] kasan_atomics+0x95/0x310 [ 15.957005] kunit_try_run_case+0x1a5/0x480 [ 15.957152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.957329] kthread+0x337/0x6f0 [ 15.957452] ret_from_fork+0x116/0x1d0 [ 15.957848] ret_from_fork_asm+0x1a/0x30 [ 15.958209] [ 15.958448] The buggy address belongs to the object at ffff888102ba6080 [ 15.958448] which belongs to the cache kmalloc-64 of size 64 [ 15.959562] The buggy address is located 0 bytes to the right of [ 15.959562] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.960706] [ 15.960906] The buggy address belongs to the physical page: [ 15.961405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.962134] flags: 0x200000000000000(node=0|zone=2) [ 15.962623] page_type: f5(slab) [ 15.962810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.963042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.963270] page dumped because: kasan: bad access detected [ 15.963441] [ 15.963581] Memory state around the buggy address: [ 15.964040] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.964695] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.965320] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.965976] ^ [ 15.966424] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.967090] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.967697] ================================================================== [ 15.469971] ================================================================== [ 15.470369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.470738] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.471017] [ 15.471150] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.471195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.471207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.471230] Call Trace: [ 15.471250] <TASK> [ 15.471271] dump_stack_lvl+0x73/0xb0 [ 15.471301] print_report+0xd1/0x650 [ 15.471325] ? __virt_addr_valid+0x1db/0x2d0 [ 15.471350] ? kasan_atomics_helper+0xf10/0x5450 [ 15.471373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.471397] ? kasan_atomics_helper+0xf10/0x5450 [ 15.471420] kasan_report+0x141/0x180 [ 15.471443] ? kasan_atomics_helper+0xf10/0x5450 [ 15.471470] kasan_check_range+0x10c/0x1c0 [ 15.471495] __kasan_check_write+0x18/0x20 [ 15.471547] kasan_atomics_helper+0xf10/0x5450 [ 15.471572] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.471596] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.471634] ? kasan_atomics+0x152/0x310 [ 15.471661] kasan_atomics+0x1dc/0x310 [ 15.471685] ? __pfx_kasan_atomics+0x10/0x10 [ 15.471710] ? __pfx_read_tsc+0x10/0x10 [ 15.471732] ? ktime_get_ts64+0x86/0x230 [ 15.471760] kunit_try_run_case+0x1a5/0x480 [ 15.471787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.471837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.471863] ? __kthread_parkme+0x82/0x180 [ 15.471885] ? preempt_count_sub+0x50/0x80 [ 15.471911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.471964] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.471990] kthread+0x337/0x6f0 [ 15.472009] ? trace_preempt_on+0x20/0xc0 [ 15.472034] ? __pfx_kthread+0x10/0x10 [ 15.472075] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.472098] ? calculate_sigpending+0x7b/0xa0 [ 15.472124] ? __pfx_kthread+0x10/0x10 [ 15.472147] ret_from_fork+0x116/0x1d0 [ 15.472166] ? __pfx_kthread+0x10/0x10 [ 15.472187] ret_from_fork_asm+0x1a/0x30 [ 15.472221] </TASK> [ 15.472232] [ 15.479774] Allocated by task 283: [ 15.479915] kasan_save_stack+0x45/0x70 [ 15.480063] kasan_save_track+0x18/0x40 [ 15.480310] kasan_save_alloc_info+0x3b/0x50 [ 15.480544] __kasan_kmalloc+0xb7/0xc0 [ 15.480750] __kmalloc_cache_noprof+0x189/0x420 [ 15.481225] kasan_atomics+0x95/0x310 [ 15.481441] kunit_try_run_case+0x1a5/0x480 [ 15.481727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.481978] kthread+0x337/0x6f0 [ 15.482135] ret_from_fork+0x116/0x1d0 [ 15.482269] ret_from_fork_asm+0x1a/0x30 [ 15.482453] [ 15.482621] The buggy address belongs to the object at ffff888102ba6080 [ 15.482621] which belongs to the cache kmalloc-64 of size 64 [ 15.483132] The buggy address is located 0 bytes to the right of [ 15.483132] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.483729] [ 15.483814] The buggy address belongs to the physical page: [ 15.483985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.484221] flags: 0x200000000000000(node=0|zone=2) [ 15.484385] page_type: f5(slab) [ 15.484506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.484842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.485177] page dumped because: kasan: bad access detected [ 15.485427] [ 15.485521] Memory state around the buggy address: [ 15.485729] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.485945] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.486158] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.486368] ^ [ 15.486567] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486897] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.487245] ================================================================== [ 15.529781] ================================================================== [ 15.530366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.530724] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.531022] [ 15.531120] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.531165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.531178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.531201] Call Trace: [ 15.531221] <TASK> [ 15.531241] dump_stack_lvl+0x73/0xb0 [ 15.531271] print_report+0xd1/0x650 [ 15.531294] ? __virt_addr_valid+0x1db/0x2d0 [ 15.531318] ? kasan_atomics_helper+0x1079/0x5450 [ 15.531341] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.531365] ? kasan_atomics_helper+0x1079/0x5450 [ 15.531389] kasan_report+0x141/0x180 [ 15.531412] ? kasan_atomics_helper+0x1079/0x5450 [ 15.531439] kasan_check_range+0x10c/0x1c0 [ 15.531464] __kasan_check_write+0x18/0x20 [ 15.531486] kasan_atomics_helper+0x1079/0x5450 [ 15.531522] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.531546] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.531573] ? kasan_atomics+0x152/0x310 [ 15.531611] kasan_atomics+0x1dc/0x310 [ 15.531635] ? __pfx_kasan_atomics+0x10/0x10 [ 15.531660] ? __pfx_read_tsc+0x10/0x10 [ 15.531683] ? ktime_get_ts64+0x86/0x230 [ 15.531709] kunit_try_run_case+0x1a5/0x480 [ 15.531735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.531759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.531785] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.531810] ? __kthread_parkme+0x82/0x180 [ 15.531831] ? preempt_count_sub+0x50/0x80 [ 15.531857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.531883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.531909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.531935] kthread+0x337/0x6f0 [ 15.531955] ? trace_preempt_on+0x20/0xc0 [ 15.531980] ? __pfx_kthread+0x10/0x10 [ 15.532002] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.532024] ? calculate_sigpending+0x7b/0xa0 [ 15.532051] ? __pfx_kthread+0x10/0x10 [ 15.532075] ret_from_fork+0x116/0x1d0 [ 15.532096] ? __pfx_kthread+0x10/0x10 [ 15.532118] ret_from_fork_asm+0x1a/0x30 [ 15.532153] </TASK> [ 15.532164] [ 15.539429] Allocated by task 283: [ 15.539732] kasan_save_stack+0x45/0x70 [ 15.539929] kasan_save_track+0x18/0x40 [ 15.540106] kasan_save_alloc_info+0x3b/0x50 [ 15.540305] __kasan_kmalloc+0xb7/0xc0 [ 15.540484] __kmalloc_cache_noprof+0x189/0x420 [ 15.540687] kasan_atomics+0x95/0x310 [ 15.540821] kunit_try_run_case+0x1a5/0x480 [ 15.540969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.541226] kthread+0x337/0x6f0 [ 15.541398] ret_from_fork+0x116/0x1d0 [ 15.541589] ret_from_fork_asm+0x1a/0x30 [ 15.541801] [ 15.541883] The buggy address belongs to the object at ffff888102ba6080 [ 15.541883] which belongs to the cache kmalloc-64 of size 64 [ 15.542283] The buggy address is located 0 bytes to the right of [ 15.542283] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.542655] [ 15.542728] The buggy address belongs to the physical page: [ 15.542963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.543309] flags: 0x200000000000000(node=0|zone=2) [ 15.543613] page_type: f5(slab) [ 15.543784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.544119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.544402] page dumped because: kasan: bad access detected [ 15.544698] [ 15.544792] Memory state around the buggy address: [ 15.545016] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.545244] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.545495] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.545799] ^ [ 15.546003] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.546287] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.547209] ================================================================== [ 15.123735] ================================================================== [ 15.124229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.124510] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.124857] [ 15.124972] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.125015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.125028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.125051] Call Trace: [ 15.125065] <TASK> [ 15.125082] dump_stack_lvl+0x73/0xb0 [ 15.125113] print_report+0xd1/0x650 [ 15.125136] ? __virt_addr_valid+0x1db/0x2d0 [ 15.125161] ? kasan_atomics_helper+0x697/0x5450 [ 15.125232] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.125259] ? kasan_atomics_helper+0x697/0x5450 [ 15.125282] kasan_report+0x141/0x180 [ 15.125318] ? kasan_atomics_helper+0x697/0x5450 [ 15.125346] kasan_check_range+0x10c/0x1c0 [ 15.125371] __kasan_check_write+0x18/0x20 [ 15.125404] kasan_atomics_helper+0x697/0x5450 [ 15.125428] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.125452] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.125487] ? kasan_atomics+0x152/0x310 [ 15.125515] kasan_atomics+0x1dc/0x310 [ 15.125538] ? __pfx_kasan_atomics+0x10/0x10 [ 15.125584] ? __pfx_read_tsc+0x10/0x10 [ 15.125616] ? ktime_get_ts64+0x86/0x230 [ 15.125644] kunit_try_run_case+0x1a5/0x480 [ 15.125669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.125701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.125731] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.125766] ? __kthread_parkme+0x82/0x180 [ 15.125787] ? preempt_count_sub+0x50/0x80 [ 15.125813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.125838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.125864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.125890] kthread+0x337/0x6f0 [ 15.125909] ? trace_preempt_on+0x20/0xc0 [ 15.125970] ? __pfx_kthread+0x10/0x10 [ 15.125992] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.126016] ? calculate_sigpending+0x7b/0xa0 [ 15.126042] ? __pfx_kthread+0x10/0x10 [ 15.126065] ret_from_fork+0x116/0x1d0 [ 15.126094] ? __pfx_kthread+0x10/0x10 [ 15.126116] ret_from_fork_asm+0x1a/0x30 [ 15.126149] </TASK> [ 15.126172] [ 15.134313] Allocated by task 283: [ 15.134529] kasan_save_stack+0x45/0x70 [ 15.134727] kasan_save_track+0x18/0x40 [ 15.134941] kasan_save_alloc_info+0x3b/0x50 [ 15.135210] __kasan_kmalloc+0xb7/0xc0 [ 15.135402] __kmalloc_cache_noprof+0x189/0x420 [ 15.135637] kasan_atomics+0x95/0x310 [ 15.135772] kunit_try_run_case+0x1a5/0x480 [ 15.136223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.136499] kthread+0x337/0x6f0 [ 15.136690] ret_from_fork+0x116/0x1d0 [ 15.136884] ret_from_fork_asm+0x1a/0x30 [ 15.137147] [ 15.137251] The buggy address belongs to the object at ffff888102ba6080 [ 15.137251] which belongs to the cache kmalloc-64 of size 64 [ 15.137781] The buggy address is located 0 bytes to the right of [ 15.137781] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.138391] [ 15.138489] The buggy address belongs to the physical page: [ 15.138755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.139161] flags: 0x200000000000000(node=0|zone=2) [ 15.139431] page_type: f5(slab) [ 15.139664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.140093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.140374] page dumped because: kasan: bad access detected [ 15.140725] [ 15.140811] Memory state around the buggy address: [ 15.140980] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.141198] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.141412] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.141893] ^ [ 15.142255] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.142792] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.143112] ================================================================== [ 15.451596] ================================================================== [ 15.451861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.452318] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.452541] [ 15.452641] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.452686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.452699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.452722] Call Trace: [ 15.452742] <TASK> [ 15.452762] dump_stack_lvl+0x73/0xb0 [ 15.452792] print_report+0xd1/0x650 [ 15.452814] ? __virt_addr_valid+0x1db/0x2d0 [ 15.452838] ? kasan_atomics_helper+0xe78/0x5450 [ 15.452861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.452885] ? kasan_atomics_helper+0xe78/0x5450 [ 15.452908] kasan_report+0x141/0x180 [ 15.452930] ? kasan_atomics_helper+0xe78/0x5450 [ 15.452958] kasan_check_range+0x10c/0x1c0 [ 15.452983] __kasan_check_write+0x18/0x20 [ 15.453003] kasan_atomics_helper+0xe78/0x5450 [ 15.453027] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.453051] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.453088] ? kasan_atomics+0x152/0x310 [ 15.453115] kasan_atomics+0x1dc/0x310 [ 15.453139] ? __pfx_kasan_atomics+0x10/0x10 [ 15.453165] ? __pfx_read_tsc+0x10/0x10 [ 15.453187] ? ktime_get_ts64+0x86/0x230 [ 15.453214] kunit_try_run_case+0x1a5/0x480 [ 15.453239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.453291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.453316] ? __kthread_parkme+0x82/0x180 [ 15.453338] ? preempt_count_sub+0x50/0x80 [ 15.453364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.453415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.453441] kthread+0x337/0x6f0 [ 15.453461] ? trace_preempt_on+0x20/0xc0 [ 15.453487] ? __pfx_kthread+0x10/0x10 [ 15.453515] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.453538] ? calculate_sigpending+0x7b/0xa0 [ 15.453564] ? __pfx_kthread+0x10/0x10 [ 15.453586] ret_from_fork+0x116/0x1d0 [ 15.453616] ? __pfx_kthread+0x10/0x10 [ 15.453638] ret_from_fork_asm+0x1a/0x30 [ 15.453671] </TASK> [ 15.453683] [ 15.461514] Allocated by task 283: [ 15.461720] kasan_save_stack+0x45/0x70 [ 15.461899] kasan_save_track+0x18/0x40 [ 15.462035] kasan_save_alloc_info+0x3b/0x50 [ 15.462185] __kasan_kmalloc+0xb7/0xc0 [ 15.462316] __kmalloc_cache_noprof+0x189/0x420 [ 15.462473] kasan_atomics+0x95/0x310 [ 15.462693] kunit_try_run_case+0x1a5/0x480 [ 15.462904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.463158] kthread+0x337/0x6f0 [ 15.463327] ret_from_fork+0x116/0x1d0 [ 15.463518] ret_from_fork_asm+0x1a/0x30 [ 15.463733] [ 15.463828] The buggy address belongs to the object at ffff888102ba6080 [ 15.463828] which belongs to the cache kmalloc-64 of size 64 [ 15.464322] The buggy address is located 0 bytes to the right of [ 15.464322] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.465127] [ 15.465211] The buggy address belongs to the physical page: [ 15.465436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.465834] flags: 0x200000000000000(node=0|zone=2) [ 15.466063] page_type: f5(slab) [ 15.466248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.466478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.466864] page dumped because: kasan: bad access detected [ 15.467115] [ 15.467192] Memory state around the buggy address: [ 15.467408] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.467664] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.468246] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.468513] ^ [ 15.468746] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.468961] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.469248] ================================================================== [ 16.301368] ================================================================== [ 16.302189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.302698] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.303022] [ 16.303235] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.303315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.303328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.303360] Call Trace: [ 16.303376] <TASK> [ 16.303393] dump_stack_lvl+0x73/0xb0 [ 16.303422] print_report+0xd1/0x650 [ 16.303446] ? __virt_addr_valid+0x1db/0x2d0 [ 16.303469] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.303492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.303516] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.303567] kasan_report+0x141/0x180 [ 16.303589] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.303635] __asan_report_load8_noabort+0x18/0x20 [ 16.303662] kasan_atomics_helper+0x4fa5/0x5450 [ 16.303686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.303710] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.303736] ? kasan_atomics+0x152/0x310 [ 16.303763] kasan_atomics+0x1dc/0x310 [ 16.303787] ? __pfx_kasan_atomics+0x10/0x10 [ 16.303812] ? __pfx_read_tsc+0x10/0x10 [ 16.303834] ? ktime_get_ts64+0x86/0x230 [ 16.303858] kunit_try_run_case+0x1a5/0x480 [ 16.303883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.303907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.303962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.303988] ? __kthread_parkme+0x82/0x180 [ 16.304032] ? preempt_count_sub+0x50/0x80 [ 16.304058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.304083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.304109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.304136] kthread+0x337/0x6f0 [ 16.304155] ? trace_preempt_on+0x20/0xc0 [ 16.304180] ? __pfx_kthread+0x10/0x10 [ 16.304201] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.304224] ? calculate_sigpending+0x7b/0xa0 [ 16.304250] ? __pfx_kthread+0x10/0x10 [ 16.304273] ret_from_fork+0x116/0x1d0 [ 16.304292] ? __pfx_kthread+0x10/0x10 [ 16.304314] ret_from_fork_asm+0x1a/0x30 [ 16.304346] </TASK> [ 16.304356] [ 16.317198] Allocated by task 283: [ 16.317550] kasan_save_stack+0x45/0x70 [ 16.318088] kasan_save_track+0x18/0x40 [ 16.318568] kasan_save_alloc_info+0x3b/0x50 [ 16.319001] __kasan_kmalloc+0xb7/0xc0 [ 16.319301] __kmalloc_cache_noprof+0x189/0x420 [ 16.319621] kasan_atomics+0x95/0x310 [ 16.319759] kunit_try_run_case+0x1a5/0x480 [ 16.319910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.320089] kthread+0x337/0x6f0 [ 16.320210] ret_from_fork+0x116/0x1d0 [ 16.320342] ret_from_fork_asm+0x1a/0x30 [ 16.320482] [ 16.320657] The buggy address belongs to the object at ffff888102ba6080 [ 16.320657] which belongs to the cache kmalloc-64 of size 64 [ 16.321842] The buggy address is located 0 bytes to the right of [ 16.321842] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.323025] [ 16.323214] The buggy address belongs to the physical page: [ 16.323789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.324475] flags: 0x200000000000000(node=0|zone=2) [ 16.324953] page_type: f5(slab) [ 16.325281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.325992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.326636] page dumped because: kasan: bad access detected [ 16.326811] [ 16.326879] Memory state around the buggy address: [ 16.327035] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.327252] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.327472] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.327710] ^ [ 16.327965] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.328332] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.328697] ================================================================== [ 15.175457] ================================================================== [ 15.176427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.177204] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.177682] [ 15.177952] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.178161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.178178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.178201] Call Trace: [ 15.178220] <TASK> [ 15.178240] dump_stack_lvl+0x73/0xb0 [ 15.178273] print_report+0xd1/0x650 [ 15.178297] ? __virt_addr_valid+0x1db/0x2d0 [ 15.178321] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.178343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.178368] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.178391] kasan_report+0x141/0x180 [ 15.178413] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.178441] kasan_check_range+0x10c/0x1c0 [ 15.178466] __kasan_check_write+0x18/0x20 [ 15.178488] kasan_atomics_helper+0x7c7/0x5450 [ 15.178646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.178675] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.178715] ? kasan_atomics+0x152/0x310 [ 15.178742] kasan_atomics+0x1dc/0x310 [ 15.178803] ? __pfx_kasan_atomics+0x10/0x10 [ 15.178832] ? __pfx_read_tsc+0x10/0x10 [ 15.178854] ? ktime_get_ts64+0x86/0x230 [ 15.178880] kunit_try_run_case+0x1a5/0x480 [ 15.178904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.178945] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.178971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.178996] ? __kthread_parkme+0x82/0x180 [ 15.179017] ? preempt_count_sub+0x50/0x80 [ 15.179043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.179069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.179094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.179121] kthread+0x337/0x6f0 [ 15.179141] ? trace_preempt_on+0x20/0xc0 [ 15.179166] ? __pfx_kthread+0x10/0x10 [ 15.179187] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.179210] ? calculate_sigpending+0x7b/0xa0 [ 15.179236] ? __pfx_kthread+0x10/0x10 [ 15.179258] ret_from_fork+0x116/0x1d0 [ 15.179277] ? __pfx_kthread+0x10/0x10 [ 15.179299] ret_from_fork_asm+0x1a/0x30 [ 15.179332] </TASK> [ 15.179342] [ 15.191777] Allocated by task 283: [ 15.192094] kasan_save_stack+0x45/0x70 [ 15.192367] kasan_save_track+0x18/0x40 [ 15.192717] kasan_save_alloc_info+0x3b/0x50 [ 15.193094] __kasan_kmalloc+0xb7/0xc0 [ 15.193281] __kmalloc_cache_noprof+0x189/0x420 [ 15.193495] kasan_atomics+0x95/0x310 [ 15.193947] kunit_try_run_case+0x1a5/0x480 [ 15.194163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.194401] kthread+0x337/0x6f0 [ 15.194849] ret_from_fork+0x116/0x1d0 [ 15.195115] ret_from_fork_asm+0x1a/0x30 [ 15.195440] [ 15.195679] The buggy address belongs to the object at ffff888102ba6080 [ 15.195679] which belongs to the cache kmalloc-64 of size 64 [ 15.196768] The buggy address is located 0 bytes to the right of [ 15.196768] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.197956] [ 15.198271] The buggy address belongs to the physical page: [ 15.198741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.199329] flags: 0x200000000000000(node=0|zone=2) [ 15.199830] page_type: f5(slab) [ 15.200150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.200737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.201288] page dumped because: kasan: bad access detected [ 15.201966] [ 15.202057] Memory state around the buggy address: [ 15.202283] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.202888] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.203426] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.204025] ^ [ 15.204238] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.204781] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.205225] ================================================================== [ 15.343404] ================================================================== [ 15.344083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.344409] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.345109] [ 15.345213] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.345470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.345485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.345509] Call Trace: [ 15.345530] <TASK> [ 15.345558] dump_stack_lvl+0x73/0xb0 [ 15.345648] print_report+0xd1/0x650 [ 15.345673] ? __virt_addr_valid+0x1db/0x2d0 [ 15.345697] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.345724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.345749] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.345771] kasan_report+0x141/0x180 [ 15.345795] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.345822] kasan_check_range+0x10c/0x1c0 [ 15.345846] __kasan_check_write+0x18/0x20 [ 15.345867] kasan_atomics_helper+0xb6a/0x5450 [ 15.345890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.345914] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.345942] ? kasan_atomics+0x152/0x310 [ 15.345969] kasan_atomics+0x1dc/0x310 [ 15.345992] ? __pfx_kasan_atomics+0x10/0x10 [ 15.346018] ? __pfx_read_tsc+0x10/0x10 [ 15.346039] ? ktime_get_ts64+0x86/0x230 [ 15.346066] kunit_try_run_case+0x1a5/0x480 [ 15.346092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.346143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.346168] ? __kthread_parkme+0x82/0x180 [ 15.346190] ? preempt_count_sub+0x50/0x80 [ 15.346215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.346266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.346293] kthread+0x337/0x6f0 [ 15.346312] ? trace_preempt_on+0x20/0xc0 [ 15.346338] ? __pfx_kthread+0x10/0x10 [ 15.346359] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.346382] ? calculate_sigpending+0x7b/0xa0 [ 15.346409] ? __pfx_kthread+0x10/0x10 [ 15.346432] ret_from_fork+0x116/0x1d0 [ 15.346451] ? __pfx_kthread+0x10/0x10 [ 15.346472] ret_from_fork_asm+0x1a/0x30 [ 15.346506] </TASK> [ 15.346517] [ 15.357070] Allocated by task 283: [ 15.357505] kasan_save_stack+0x45/0x70 [ 15.357805] kasan_save_track+0x18/0x40 [ 15.358179] kasan_save_alloc_info+0x3b/0x50 [ 15.358500] __kasan_kmalloc+0xb7/0xc0 [ 15.358895] __kmalloc_cache_noprof+0x189/0x420 [ 15.359216] kasan_atomics+0x95/0x310 [ 15.359582] kunit_try_run_case+0x1a5/0x480 [ 15.359917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.360350] kthread+0x337/0x6f0 [ 15.360654] ret_from_fork+0x116/0x1d0 [ 15.360849] ret_from_fork_asm+0x1a/0x30 [ 15.361038] [ 15.361125] The buggy address belongs to the object at ffff888102ba6080 [ 15.361125] which belongs to the cache kmalloc-64 of size 64 [ 15.361887] The buggy address is located 0 bytes to the right of [ 15.361887] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.362933] [ 15.363024] The buggy address belongs to the physical page: [ 15.363422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.363889] flags: 0x200000000000000(node=0|zone=2) [ 15.364114] page_type: f5(slab) [ 15.364268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.364868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.365365] page dumped because: kasan: bad access detected [ 15.365837] [ 15.365943] Memory state around the buggy address: [ 15.366346] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.366846] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.367274] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.367838] ^ [ 15.368125] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.368788] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.369223] ================================================================== [ 15.433694] ================================================================== [ 15.433933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.434665] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.435002] [ 15.435115] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.435159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.435172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.435194] Call Trace: [ 15.435211] <TASK> [ 15.435227] dump_stack_lvl+0x73/0xb0 [ 15.435257] print_report+0xd1/0x650 [ 15.435281] ? __virt_addr_valid+0x1db/0x2d0 [ 15.435305] ? kasan_atomics_helper+0xde0/0x5450 [ 15.435328] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.435352] ? kasan_atomics_helper+0xde0/0x5450 [ 15.435375] kasan_report+0x141/0x180 [ 15.435398] ? kasan_atomics_helper+0xde0/0x5450 [ 15.435426] kasan_check_range+0x10c/0x1c0 [ 15.435451] __kasan_check_write+0x18/0x20 [ 15.435472] kasan_atomics_helper+0xde0/0x5450 [ 15.435496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.435533] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.435562] ? kasan_atomics+0x152/0x310 [ 15.435591] kasan_atomics+0x1dc/0x310 [ 15.435626] ? __pfx_kasan_atomics+0x10/0x10 [ 15.435651] ? __pfx_read_tsc+0x10/0x10 [ 15.435674] ? ktime_get_ts64+0x86/0x230 [ 15.435700] kunit_try_run_case+0x1a5/0x480 [ 15.435725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.435750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.435777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.435802] ? __kthread_parkme+0x82/0x180 [ 15.435824] ? preempt_count_sub+0x50/0x80 [ 15.435849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.435875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.435900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.435926] kthread+0x337/0x6f0 [ 15.435946] ? trace_preempt_on+0x20/0xc0 [ 15.435972] ? __pfx_kthread+0x10/0x10 [ 15.435993] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.436015] ? calculate_sigpending+0x7b/0xa0 [ 15.436041] ? __pfx_kthread+0x10/0x10 [ 15.436064] ret_from_fork+0x116/0x1d0 [ 15.436083] ? __pfx_kthread+0x10/0x10 [ 15.436105] ret_from_fork_asm+0x1a/0x30 [ 15.436137] </TASK> [ 15.436147] [ 15.443621] Allocated by task 283: [ 15.443794] kasan_save_stack+0x45/0x70 [ 15.443997] kasan_save_track+0x18/0x40 [ 15.444191] kasan_save_alloc_info+0x3b/0x50 [ 15.444404] __kasan_kmalloc+0xb7/0xc0 [ 15.444711] __kmalloc_cache_noprof+0x189/0x420 [ 15.444885] kasan_atomics+0x95/0x310 [ 15.445018] kunit_try_run_case+0x1a5/0x480 [ 15.445164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445339] kthread+0x337/0x6f0 [ 15.445462] ret_from_fork+0x116/0x1d0 [ 15.445610] ret_from_fork_asm+0x1a/0x30 [ 15.445816] [ 15.445911] The buggy address belongs to the object at ffff888102ba6080 [ 15.445911] which belongs to the cache kmalloc-64 of size 64 [ 15.446431] The buggy address is located 0 bytes to the right of [ 15.446431] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.446855] [ 15.446953] The buggy address belongs to the physical page: [ 15.447207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.447516] flags: 0x200000000000000(node=0|zone=2) [ 15.447757] page_type: f5(slab) [ 15.447878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.448107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.448341] page dumped because: kasan: bad access detected [ 15.448590] [ 15.448694] Memory state around the buggy address: [ 15.448919] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449245] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.449673] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.449999] ^ [ 15.450231] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.450591] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.450893] ================================================================== [ 15.771811] ================================================================== [ 15.772282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.772719] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.773016] [ 15.773131] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.773177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.773190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.773213] Call Trace: [ 15.773232] <TASK> [ 15.773253] dump_stack_lvl+0x73/0xb0 [ 15.773284] print_report+0xd1/0x650 [ 15.773308] ? __virt_addr_valid+0x1db/0x2d0 [ 15.773332] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.773355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.773379] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.773402] kasan_report+0x141/0x180 [ 15.773425] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.773453] __asan_report_store8_noabort+0x1b/0x30 [ 15.773479] kasan_atomics_helper+0x50d4/0x5450 [ 15.773513] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.773537] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.773564] ? kasan_atomics+0x152/0x310 [ 15.773592] kasan_atomics+0x1dc/0x310 [ 15.773627] ? __pfx_kasan_atomics+0x10/0x10 [ 15.773653] ? __pfx_read_tsc+0x10/0x10 [ 15.773675] ? ktime_get_ts64+0x86/0x230 [ 15.773702] kunit_try_run_case+0x1a5/0x480 [ 15.773732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.773755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.773782] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.773806] ? __kthread_parkme+0x82/0x180 [ 15.773828] ? preempt_count_sub+0x50/0x80 [ 15.773854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.773878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.773904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.773930] kthread+0x337/0x6f0 [ 15.773950] ? trace_preempt_on+0x20/0xc0 [ 15.773975] ? __pfx_kthread+0x10/0x10 [ 15.773997] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.774019] ? calculate_sigpending+0x7b/0xa0 [ 15.774045] ? __pfx_kthread+0x10/0x10 [ 15.774067] ret_from_fork+0x116/0x1d0 [ 15.774086] ? __pfx_kthread+0x10/0x10 [ 15.774108] ret_from_fork_asm+0x1a/0x30 [ 15.774141] </TASK> [ 15.774153] [ 15.781716] Allocated by task 283: [ 15.781929] kasan_save_stack+0x45/0x70 [ 15.782143] kasan_save_track+0x18/0x40 [ 15.782323] kasan_save_alloc_info+0x3b/0x50 [ 15.782571] __kasan_kmalloc+0xb7/0xc0 [ 15.782825] __kmalloc_cache_noprof+0x189/0x420 [ 15.783077] kasan_atomics+0x95/0x310 [ 15.783274] kunit_try_run_case+0x1a5/0x480 [ 15.783481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.783743] kthread+0x337/0x6f0 [ 15.783923] ret_from_fork+0x116/0x1d0 [ 15.784111] ret_from_fork_asm+0x1a/0x30 [ 15.784332] [ 15.784402] The buggy address belongs to the object at ffff888102ba6080 [ 15.784402] which belongs to the cache kmalloc-64 of size 64 [ 15.784758] The buggy address is located 0 bytes to the right of [ 15.784758] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.785559] [ 15.785663] The buggy address belongs to the physical page: [ 15.785923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.786319] flags: 0x200000000000000(node=0|zone=2) [ 15.786594] page_type: f5(slab) [ 15.786796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.787177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.787523] page dumped because: kasan: bad access detected [ 15.787783] [ 15.787877] Memory state around the buggy address: [ 15.788102] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.788417] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.788834] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.789064] ^ [ 15.789218] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.789430] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.789758] ================================================================== [ 15.316633] ================================================================== [ 15.317031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.317466] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.318030] [ 15.318143] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.318185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.318198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.318220] Call Trace: [ 15.318236] <TASK> [ 15.318253] dump_stack_lvl+0x73/0xb0 [ 15.318284] print_report+0xd1/0x650 [ 15.318307] ? __virt_addr_valid+0x1db/0x2d0 [ 15.318330] ? kasan_atomics_helper+0xac7/0x5450 [ 15.318352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.318376] ? kasan_atomics_helper+0xac7/0x5450 [ 15.318398] kasan_report+0x141/0x180 [ 15.318422] ? kasan_atomics_helper+0xac7/0x5450 [ 15.318449] kasan_check_range+0x10c/0x1c0 [ 15.318473] __kasan_check_write+0x18/0x20 [ 15.318493] kasan_atomics_helper+0xac7/0x5450 [ 15.318683] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.318708] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.318735] ? kasan_atomics+0x152/0x310 [ 15.318762] kasan_atomics+0x1dc/0x310 [ 15.318786] ? __pfx_kasan_atomics+0x10/0x10 [ 15.318842] ? __pfx_read_tsc+0x10/0x10 [ 15.318864] ? ktime_get_ts64+0x86/0x230 [ 15.318889] kunit_try_run_case+0x1a5/0x480 [ 15.318915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.318939] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.318965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.318990] ? __kthread_parkme+0x82/0x180 [ 15.319013] ? preempt_count_sub+0x50/0x80 [ 15.319038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.319064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.319090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.319116] kthread+0x337/0x6f0 [ 15.319136] ? trace_preempt_on+0x20/0xc0 [ 15.319162] ? __pfx_kthread+0x10/0x10 [ 15.319184] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.319207] ? calculate_sigpending+0x7b/0xa0 [ 15.319232] ? __pfx_kthread+0x10/0x10 [ 15.319255] ret_from_fork+0x116/0x1d0 [ 15.319273] ? __pfx_kthread+0x10/0x10 [ 15.319296] ret_from_fork_asm+0x1a/0x30 [ 15.319329] </TASK> [ 15.319340] [ 15.330215] Allocated by task 283: [ 15.330397] kasan_save_stack+0x45/0x70 [ 15.330995] kasan_save_track+0x18/0x40 [ 15.331254] kasan_save_alloc_info+0x3b/0x50 [ 15.331697] __kasan_kmalloc+0xb7/0xc0 [ 15.331941] __kmalloc_cache_noprof+0x189/0x420 [ 15.332269] kasan_atomics+0x95/0x310 [ 15.332667] kunit_try_run_case+0x1a5/0x480 [ 15.332878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.333113] kthread+0x337/0x6f0 [ 15.333273] ret_from_fork+0x116/0x1d0 [ 15.333447] ret_from_fork_asm+0x1a/0x30 [ 15.333900] [ 15.334128] The buggy address belongs to the object at ffff888102ba6080 [ 15.334128] which belongs to the cache kmalloc-64 of size 64 [ 15.335009] The buggy address is located 0 bytes to the right of [ 15.335009] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.335849] [ 15.335957] The buggy address belongs to the physical page: [ 15.336189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.336808] flags: 0x200000000000000(node=0|zone=2) [ 15.337082] page_type: f5(slab) [ 15.337384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.337919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.338533] page dumped because: kasan: bad access detected [ 15.338859] [ 15.339068] Memory state around the buggy address: [ 15.339388] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.339918] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.340393] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.341148] ^ [ 15.341442] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.341938] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.342420] ================================================================== [ 16.120397] ================================================================== [ 16.120783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.121528] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.122084] [ 16.122180] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.122227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.122239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.122261] Call Trace: [ 16.122280] <TASK> [ 16.122297] dump_stack_lvl+0x73/0xb0 [ 16.122330] print_report+0xd1/0x650 [ 16.122354] ? __virt_addr_valid+0x1db/0x2d0 [ 16.122378] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.122401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.122425] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.122449] kasan_report+0x141/0x180 [ 16.122472] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.122500] kasan_check_range+0x10c/0x1c0 [ 16.122527] __kasan_check_write+0x18/0x20 [ 16.122548] kasan_atomics_helper+0x1e12/0x5450 [ 16.122574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.122598] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.122637] ? kasan_atomics+0x152/0x310 [ 16.122664] kasan_atomics+0x1dc/0x310 [ 16.122687] ? __pfx_kasan_atomics+0x10/0x10 [ 16.122712] ? __pfx_read_tsc+0x10/0x10 [ 16.122734] ? ktime_get_ts64+0x86/0x230 [ 16.122760] kunit_try_run_case+0x1a5/0x480 [ 16.122784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.122808] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.122834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.122859] ? __kthread_parkme+0x82/0x180 [ 16.122880] ? preempt_count_sub+0x50/0x80 [ 16.122905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.122931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.122956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.122982] kthread+0x337/0x6f0 [ 16.123002] ? trace_preempt_on+0x20/0xc0 [ 16.123027] ? __pfx_kthread+0x10/0x10 [ 16.123049] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.123071] ? calculate_sigpending+0x7b/0xa0 [ 16.123096] ? __pfx_kthread+0x10/0x10 [ 16.123119] ret_from_fork+0x116/0x1d0 [ 16.123138] ? __pfx_kthread+0x10/0x10 [ 16.123160] ret_from_fork_asm+0x1a/0x30 [ 16.123192] </TASK> [ 16.123203] [ 16.130623] Allocated by task 283: [ 16.130807] kasan_save_stack+0x45/0x70 [ 16.130989] kasan_save_track+0x18/0x40 [ 16.131126] kasan_save_alloc_info+0x3b/0x50 [ 16.131337] __kasan_kmalloc+0xb7/0xc0 [ 16.131526] __kmalloc_cache_noprof+0x189/0x420 [ 16.131745] kasan_atomics+0x95/0x310 [ 16.131918] kunit_try_run_case+0x1a5/0x480 [ 16.132066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.132243] kthread+0x337/0x6f0 [ 16.132411] ret_from_fork+0x116/0x1d0 [ 16.132595] ret_from_fork_asm+0x1a/0x30 [ 16.132805] [ 16.132897] The buggy address belongs to the object at ffff888102ba6080 [ 16.132897] which belongs to the cache kmalloc-64 of size 64 [ 16.133561] The buggy address is located 0 bytes to the right of [ 16.133561] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.133938] [ 16.134011] The buggy address belongs to the physical page: [ 16.134306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.134851] flags: 0x200000000000000(node=0|zone=2) [ 16.135100] page_type: f5(slab) [ 16.135272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.135507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.135744] page dumped because: kasan: bad access detected [ 16.136205] [ 16.136299] Memory state around the buggy address: [ 16.136544] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.136815] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.137116] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.137328] ^ [ 16.137482] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.137969] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.138294] ================================================================== [ 15.415656] ================================================================== [ 15.416073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.416363] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.416765] [ 15.416880] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.416924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.416937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.416960] Call Trace: [ 15.416977] <TASK> [ 15.416994] dump_stack_lvl+0x73/0xb0 [ 15.417024] print_report+0xd1/0x650 [ 15.417047] ? __virt_addr_valid+0x1db/0x2d0 [ 15.417072] ? kasan_atomics_helper+0xd47/0x5450 [ 15.417094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.417118] ? kasan_atomics_helper+0xd47/0x5450 [ 15.417141] kasan_report+0x141/0x180 [ 15.417164] ? kasan_atomics_helper+0xd47/0x5450 [ 15.417192] kasan_check_range+0x10c/0x1c0 [ 15.417216] __kasan_check_write+0x18/0x20 [ 15.417236] kasan_atomics_helper+0xd47/0x5450 [ 15.417260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.417283] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.417310] ? kasan_atomics+0x152/0x310 [ 15.417337] kasan_atomics+0x1dc/0x310 [ 15.417361] ? __pfx_kasan_atomics+0x10/0x10 [ 15.417385] ? __pfx_read_tsc+0x10/0x10 [ 15.417408] ? ktime_get_ts64+0x86/0x230 [ 15.417434] kunit_try_run_case+0x1a5/0x480 [ 15.417459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.417520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.417546] ? __kthread_parkme+0x82/0x180 [ 15.417567] ? preempt_count_sub+0x50/0x80 [ 15.417593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.417656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.417682] kthread+0x337/0x6f0 [ 15.417702] ? trace_preempt_on+0x20/0xc0 [ 15.417731] ? __pfx_kthread+0x10/0x10 [ 15.417752] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.417774] ? calculate_sigpending+0x7b/0xa0 [ 15.417800] ? __pfx_kthread+0x10/0x10 [ 15.417822] ret_from_fork+0x116/0x1d0 [ 15.417842] ? __pfx_kthread+0x10/0x10 [ 15.417863] ret_from_fork_asm+0x1a/0x30 [ 15.417896] </TASK> [ 15.417906] [ 15.425498] Allocated by task 283: [ 15.425683] kasan_save_stack+0x45/0x70 [ 15.426093] kasan_save_track+0x18/0x40 [ 15.426233] kasan_save_alloc_info+0x3b/0x50 [ 15.426382] __kasan_kmalloc+0xb7/0xc0 [ 15.426517] __kmalloc_cache_noprof+0x189/0x420 [ 15.426755] kasan_atomics+0x95/0x310 [ 15.426960] kunit_try_run_case+0x1a5/0x480 [ 15.427173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.427438] kthread+0x337/0x6f0 [ 15.427741] ret_from_fork+0x116/0x1d0 [ 15.427885] ret_from_fork_asm+0x1a/0x30 [ 15.428024] [ 15.428094] The buggy address belongs to the object at ffff888102ba6080 [ 15.428094] which belongs to the cache kmalloc-64 of size 64 [ 15.428575] The buggy address is located 0 bytes to the right of [ 15.428575] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.429215] [ 15.429289] The buggy address belongs to the physical page: [ 15.429459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.430002] flags: 0x200000000000000(node=0|zone=2) [ 15.430225] page_type: f5(slab) [ 15.430345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.430571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.431052] page dumped because: kasan: bad access detected [ 15.431304] [ 15.431401] Memory state around the buggy address: [ 15.431704] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.431966] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.432179] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.432389] ^ [ 15.432587] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.432911] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.433225] ================================================================== [ 15.883539] ================================================================== [ 15.883895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.884243] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.884543] [ 15.884802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.884860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.884872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.884905] Call Trace: [ 15.884920] <TASK> [ 15.884935] dump_stack_lvl+0x73/0xb0 [ 15.884965] print_report+0xd1/0x650 [ 15.884997] ? __virt_addr_valid+0x1db/0x2d0 [ 15.885022] ? kasan_atomics_helper+0x1818/0x5450 [ 15.885045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.885079] ? kasan_atomics_helper+0x1818/0x5450 [ 15.885102] kasan_report+0x141/0x180 [ 15.885125] ? kasan_atomics_helper+0x1818/0x5450 [ 15.885153] kasan_check_range+0x10c/0x1c0 [ 15.885178] __kasan_check_write+0x18/0x20 [ 15.885200] kasan_atomics_helper+0x1818/0x5450 [ 15.885224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.885249] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.885276] ? kasan_atomics+0x152/0x310 [ 15.885305] kasan_atomics+0x1dc/0x310 [ 15.885329] ? __pfx_kasan_atomics+0x10/0x10 [ 15.885355] ? __pfx_read_tsc+0x10/0x10 [ 15.885377] ? ktime_get_ts64+0x86/0x230 [ 15.885412] kunit_try_run_case+0x1a5/0x480 [ 15.885438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.885472] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.885516] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.885542] ? __kthread_parkme+0x82/0x180 [ 15.885563] ? preempt_count_sub+0x50/0x80 [ 15.885589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.885625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.885651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.885677] kthread+0x337/0x6f0 [ 15.885697] ? trace_preempt_on+0x20/0xc0 [ 15.885725] ? __pfx_kthread+0x10/0x10 [ 15.885747] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.885770] ? calculate_sigpending+0x7b/0xa0 [ 15.885796] ? __pfx_kthread+0x10/0x10 [ 15.885819] ret_from_fork+0x116/0x1d0 [ 15.885848] ? __pfx_kthread+0x10/0x10 [ 15.885869] ret_from_fork_asm+0x1a/0x30 [ 15.885915] </TASK> [ 15.885925] [ 15.893508] Allocated by task 283: [ 15.893670] kasan_save_stack+0x45/0x70 [ 15.893822] kasan_save_track+0x18/0x40 [ 15.893960] kasan_save_alloc_info+0x3b/0x50 [ 15.894138] __kasan_kmalloc+0xb7/0xc0 [ 15.894337] __kmalloc_cache_noprof+0x189/0x420 [ 15.894613] kasan_atomics+0x95/0x310 [ 15.894806] kunit_try_run_case+0x1a5/0x480 [ 15.895020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.895275] kthread+0x337/0x6f0 [ 15.895445] ret_from_fork+0x116/0x1d0 [ 15.895670] ret_from_fork_asm+0x1a/0x30 [ 15.895826] [ 15.895946] The buggy address belongs to the object at ffff888102ba6080 [ 15.895946] which belongs to the cache kmalloc-64 of size 64 [ 15.896406] The buggy address is located 0 bytes to the right of [ 15.896406] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.896978] [ 15.897097] The buggy address belongs to the physical page: [ 15.897368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.897677] flags: 0x200000000000000(node=0|zone=2) [ 15.897883] page_type: f5(slab) [ 15.898030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.898439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.898828] page dumped because: kasan: bad access detected [ 15.899078] [ 15.899170] Memory state around the buggy address: [ 15.899368] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.899620] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.899838] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.900138] ^ [ 15.900409] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.900791] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.901180] ================================================================== [ 15.205915] ================================================================== [ 15.206564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.206906] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.207633] [ 15.207755] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.207802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.207815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.207839] Call Trace: [ 15.207859] <TASK> [ 15.207878] dump_stack_lvl+0x73/0xb0 [ 15.207912] print_report+0xd1/0x650 [ 15.208093] ? __virt_addr_valid+0x1db/0x2d0 [ 15.208119] ? kasan_atomics_helper+0x860/0x5450 [ 15.208143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.208168] ? kasan_atomics_helper+0x860/0x5450 [ 15.208192] kasan_report+0x141/0x180 [ 15.208257] ? kasan_atomics_helper+0x860/0x5450 [ 15.208285] kasan_check_range+0x10c/0x1c0 [ 15.208311] __kasan_check_write+0x18/0x20 [ 15.208332] kasan_atomics_helper+0x860/0x5450 [ 15.208357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.208381] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.208409] ? kasan_atomics+0x152/0x310 [ 15.208437] kasan_atomics+0x1dc/0x310 [ 15.208460] ? __pfx_kasan_atomics+0x10/0x10 [ 15.208485] ? __pfx_read_tsc+0x10/0x10 [ 15.208522] ? ktime_get_ts64+0x86/0x230 [ 15.208548] kunit_try_run_case+0x1a5/0x480 [ 15.208574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.208610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.208637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.208662] ? __kthread_parkme+0x82/0x180 [ 15.208684] ? preempt_count_sub+0x50/0x80 [ 15.208711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.208736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.208762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.208788] kthread+0x337/0x6f0 [ 15.208808] ? trace_preempt_on+0x20/0xc0 [ 15.208833] ? __pfx_kthread+0x10/0x10 [ 15.208854] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.208877] ? calculate_sigpending+0x7b/0xa0 [ 15.208902] ? __pfx_kthread+0x10/0x10 [ 15.208936] ret_from_fork+0x116/0x1d0 [ 15.208955] ? __pfx_kthread+0x10/0x10 [ 15.208977] ret_from_fork_asm+0x1a/0x30 [ 15.209010] </TASK> [ 15.209022] [ 15.220896] Allocated by task 283: [ 15.221285] kasan_save_stack+0x45/0x70 [ 15.221488] kasan_save_track+0x18/0x40 [ 15.221860] kasan_save_alloc_info+0x3b/0x50 [ 15.222370] __kasan_kmalloc+0xb7/0xc0 [ 15.222611] __kmalloc_cache_noprof+0x189/0x420 [ 15.223293] kasan_atomics+0x95/0x310 [ 15.223509] kunit_try_run_case+0x1a5/0x480 [ 15.223726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224288] kthread+0x337/0x6f0 [ 15.224562] ret_from_fork+0x116/0x1d0 [ 15.225034] ret_from_fork_asm+0x1a/0x30 [ 15.225362] [ 15.225457] The buggy address belongs to the object at ffff888102ba6080 [ 15.225457] which belongs to the cache kmalloc-64 of size 64 [ 15.226464] The buggy address is located 0 bytes to the right of [ 15.226464] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.227213] [ 15.227328] The buggy address belongs to the physical page: [ 15.227851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.228756] flags: 0x200000000000000(node=0|zone=2) [ 15.229174] page_type: f5(slab) [ 15.229354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.229910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.230427] page dumped because: kasan: bad access detected [ 15.230849] [ 15.231113] Memory state around the buggy address: [ 15.231314] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.231821] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.232514] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.232829] ^ [ 15.233226] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233916] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.234236] ================================================================== [ 15.017157] ================================================================== [ 15.017523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.017860] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.018297] [ 15.018424] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.018468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.018493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.018514] Call Trace: [ 15.018538] <TASK> [ 15.018554] dump_stack_lvl+0x73/0xb0 [ 15.018585] print_report+0xd1/0x650 [ 15.018624] ? __virt_addr_valid+0x1db/0x2d0 [ 15.018649] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.018672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.018697] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.018720] kasan_report+0x141/0x180 [ 15.018742] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.018771] __asan_report_load4_noabort+0x18/0x20 [ 15.018806] kasan_atomics_helper+0x4b54/0x5450 [ 15.018830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.018865] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.018892] ? kasan_atomics+0x152/0x310 [ 15.018919] kasan_atomics+0x1dc/0x310 [ 15.019002] ? __pfx_kasan_atomics+0x10/0x10 [ 15.019028] ? __pfx_read_tsc+0x10/0x10 [ 15.019061] ? ktime_get_ts64+0x86/0x230 [ 15.019088] kunit_try_run_case+0x1a5/0x480 [ 15.019113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.019146] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.019172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.019197] ? __kthread_parkme+0x82/0x180 [ 15.019229] ? preempt_count_sub+0x50/0x80 [ 15.019255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.019280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.019315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.019341] kthread+0x337/0x6f0 [ 15.019362] ? trace_preempt_on+0x20/0xc0 [ 15.019397] ? __pfx_kthread+0x10/0x10 [ 15.019419] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.019443] ? calculate_sigpending+0x7b/0xa0 [ 15.019478] ? __pfx_kthread+0x10/0x10 [ 15.019501] ret_from_fork+0x116/0x1d0 [ 15.019520] ? __pfx_kthread+0x10/0x10 [ 15.019553] ret_from_fork_asm+0x1a/0x30 [ 15.019596] </TASK> [ 15.019616] [ 15.028112] Allocated by task 283: [ 15.028316] kasan_save_stack+0x45/0x70 [ 15.028540] kasan_save_track+0x18/0x40 [ 15.028733] kasan_save_alloc_info+0x3b/0x50 [ 15.028998] __kasan_kmalloc+0xb7/0xc0 [ 15.029198] __kmalloc_cache_noprof+0x189/0x420 [ 15.029410] kasan_atomics+0x95/0x310 [ 15.029658] kunit_try_run_case+0x1a5/0x480 [ 15.029810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.029985] kthread+0x337/0x6f0 [ 15.030104] ret_from_fork+0x116/0x1d0 [ 15.030234] ret_from_fork_asm+0x1a/0x30 [ 15.030440] [ 15.030657] The buggy address belongs to the object at ffff888102ba6080 [ 15.030657] which belongs to the cache kmalloc-64 of size 64 [ 15.031438] The buggy address is located 0 bytes to the right of [ 15.031438] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.032177] [ 15.032309] The buggy address belongs to the physical page: [ 15.032562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.032838] flags: 0x200000000000000(node=0|zone=2) [ 15.033183] page_type: f5(slab) [ 15.033361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.033776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.034005] page dumped because: kasan: bad access detected [ 15.034174] [ 15.034243] Memory state around the buggy address: [ 15.034399] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035186] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.035517] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.035863] ^ [ 15.036341] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.036750] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.037088] ================================================================== [ 15.289657] ================================================================== [ 15.290177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.291028] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.291705] [ 15.291820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.291965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.291981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.292005] Call Trace: [ 15.292024] <TASK> [ 15.292041] dump_stack_lvl+0x73/0xb0 [ 15.292113] print_report+0xd1/0x650 [ 15.292141] ? __virt_addr_valid+0x1db/0x2d0 [ 15.292166] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.292188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.292214] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.292237] kasan_report+0x141/0x180 [ 15.292260] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.292287] kasan_check_range+0x10c/0x1c0 [ 15.292313] __kasan_check_write+0x18/0x20 [ 15.292333] kasan_atomics_helper+0xa2b/0x5450 [ 15.292357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.292381] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.292408] ? kasan_atomics+0x152/0x310 [ 15.292436] kasan_atomics+0x1dc/0x310 [ 15.292459] ? __pfx_kasan_atomics+0x10/0x10 [ 15.292484] ? __pfx_read_tsc+0x10/0x10 [ 15.292514] ? ktime_get_ts64+0x86/0x230 [ 15.292541] kunit_try_run_case+0x1a5/0x480 [ 15.292566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.292629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.292654] ? __kthread_parkme+0x82/0x180 [ 15.292675] ? preempt_count_sub+0x50/0x80 [ 15.292701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.292753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.292780] kthread+0x337/0x6f0 [ 15.292800] ? trace_preempt_on+0x20/0xc0 [ 15.292825] ? __pfx_kthread+0x10/0x10 [ 15.292846] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.292869] ? calculate_sigpending+0x7b/0xa0 [ 15.292895] ? __pfx_kthread+0x10/0x10 [ 15.292918] ret_from_fork+0x116/0x1d0 [ 15.292937] ? __pfx_kthread+0x10/0x10 [ 15.292959] ret_from_fork_asm+0x1a/0x30 [ 15.292993] </TASK> [ 15.293003] [ 15.303952] Allocated by task 283: [ 15.304259] kasan_save_stack+0x45/0x70 [ 15.304455] kasan_save_track+0x18/0x40 [ 15.304873] kasan_save_alloc_info+0x3b/0x50 [ 15.305193] __kasan_kmalloc+0xb7/0xc0 [ 15.305574] __kmalloc_cache_noprof+0x189/0x420 [ 15.305806] kasan_atomics+0x95/0x310 [ 15.305984] kunit_try_run_case+0x1a5/0x480 [ 15.306178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.306416] kthread+0x337/0x6f0 [ 15.306847] ret_from_fork+0x116/0x1d0 [ 15.307275] ret_from_fork_asm+0x1a/0x30 [ 15.307579] [ 15.307815] The buggy address belongs to the object at ffff888102ba6080 [ 15.307815] which belongs to the cache kmalloc-64 of size 64 [ 15.308558] The buggy address is located 0 bytes to the right of [ 15.308558] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.309236] [ 15.309335] The buggy address belongs to the physical page: [ 15.309876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.310334] flags: 0x200000000000000(node=0|zone=2) [ 15.310810] page_type: f5(slab) [ 15.311120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.311769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.312171] page dumped because: kasan: bad access detected [ 15.312407] [ 15.312705] Memory state around the buggy address: [ 15.312971] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.313450] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.313785] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.314079] ^ [ 15.314288] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.314949] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.315375] ================================================================== [ 15.790587] ================================================================== [ 15.791021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.791399] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.792016] [ 15.792119] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.792162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.792175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.792198] Call Trace: [ 15.792215] <TASK> [ 15.792233] dump_stack_lvl+0x73/0xb0 [ 15.792264] print_report+0xd1/0x650 [ 15.792288] ? __virt_addr_valid+0x1db/0x2d0 [ 15.792313] ? kasan_atomics_helper+0x151d/0x5450 [ 15.792336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.792360] ? kasan_atomics_helper+0x151d/0x5450 [ 15.792383] kasan_report+0x141/0x180 [ 15.792406] ? kasan_atomics_helper+0x151d/0x5450 [ 15.792434] kasan_check_range+0x10c/0x1c0 [ 15.792459] __kasan_check_write+0x18/0x20 [ 15.792480] kasan_atomics_helper+0x151d/0x5450 [ 15.792504] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.792528] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.792555] ? kasan_atomics+0x152/0x310 [ 15.792582] kasan_atomics+0x1dc/0x310 [ 15.792616] ? __pfx_kasan_atomics+0x10/0x10 [ 15.792641] ? __pfx_read_tsc+0x10/0x10 [ 15.792664] ? ktime_get_ts64+0x86/0x230 [ 15.792689] kunit_try_run_case+0x1a5/0x480 [ 15.792727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.792751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.792799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.792824] ? __kthread_parkme+0x82/0x180 [ 15.792847] ? preempt_count_sub+0x50/0x80 [ 15.792888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.792914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.792954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.792980] kthread+0x337/0x6f0 [ 15.793000] ? trace_preempt_on+0x20/0xc0 [ 15.793025] ? __pfx_kthread+0x10/0x10 [ 15.793047] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.793070] ? calculate_sigpending+0x7b/0xa0 [ 15.793095] ? __pfx_kthread+0x10/0x10 [ 15.793117] ret_from_fork+0x116/0x1d0 [ 15.793136] ? __pfx_kthread+0x10/0x10 [ 15.793158] ret_from_fork_asm+0x1a/0x30 [ 15.793191] </TASK> [ 15.793202] [ 15.802568] Allocated by task 283: [ 15.802723] kasan_save_stack+0x45/0x70 [ 15.802979] kasan_save_track+0x18/0x40 [ 15.803174] kasan_save_alloc_info+0x3b/0x50 [ 15.803386] __kasan_kmalloc+0xb7/0xc0 [ 15.803568] __kmalloc_cache_noprof+0x189/0x420 [ 15.803772] kasan_atomics+0x95/0x310 [ 15.803998] kunit_try_run_case+0x1a5/0x480 [ 15.804238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804521] kthread+0x337/0x6f0 [ 15.804684] ret_from_fork+0x116/0x1d0 [ 15.804892] ret_from_fork_asm+0x1a/0x30 [ 15.805083] [ 15.805182] The buggy address belongs to the object at ffff888102ba6080 [ 15.805182] which belongs to the cache kmalloc-64 of size 64 [ 15.805628] The buggy address is located 0 bytes to the right of [ 15.805628] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.806152] [ 15.806248] The buggy address belongs to the physical page: [ 15.806528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.806876] flags: 0x200000000000000(node=0|zone=2) [ 15.807113] page_type: f5(slab) [ 15.807269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.807573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.807814] page dumped because: kasan: bad access detected [ 15.808073] [ 15.808191] Memory state around the buggy address: [ 15.808443] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.808820] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.809145] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.809423] ^ [ 15.809660] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.809979] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.810296] ================================================================== [ 15.488225] ================================================================== [ 15.488588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.488973] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.489329] [ 15.489443] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.489488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.489501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.489525] Call Trace: [ 15.489545] <TASK> [ 15.489565] dump_stack_lvl+0x73/0xb0 [ 15.489596] print_report+0xd1/0x650 [ 15.489632] ? __virt_addr_valid+0x1db/0x2d0 [ 15.489656] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.489679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.489707] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.489730] kasan_report+0x141/0x180 [ 15.489754] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.489782] kasan_check_range+0x10c/0x1c0 [ 15.489806] __kasan_check_write+0x18/0x20 [ 15.489827] kasan_atomics_helper+0xfa9/0x5450 [ 15.489852] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.489876] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.489937] ? kasan_atomics+0x152/0x310 [ 15.489965] kasan_atomics+0x1dc/0x310 [ 15.489990] ? __pfx_kasan_atomics+0x10/0x10 [ 15.490015] ? __pfx_read_tsc+0x10/0x10 [ 15.490038] ? ktime_get_ts64+0x86/0x230 [ 15.490064] kunit_try_run_case+0x1a5/0x480 [ 15.490090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.490114] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.490140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.490166] ? __kthread_parkme+0x82/0x180 [ 15.490188] ? preempt_count_sub+0x50/0x80 [ 15.490214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.490239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.490265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.490292] kthread+0x337/0x6f0 [ 15.490311] ? trace_preempt_on+0x20/0xc0 [ 15.490337] ? __pfx_kthread+0x10/0x10 [ 15.490358] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.490381] ? calculate_sigpending+0x7b/0xa0 [ 15.490407] ? __pfx_kthread+0x10/0x10 [ 15.490429] ret_from_fork+0x116/0x1d0 [ 15.490449] ? __pfx_kthread+0x10/0x10 [ 15.490470] ret_from_fork_asm+0x1a/0x30 [ 15.490504] </TASK> [ 15.490522] [ 15.498399] Allocated by task 283: [ 15.498616] kasan_save_stack+0x45/0x70 [ 15.498821] kasan_save_track+0x18/0x40 [ 15.499031] kasan_save_alloc_info+0x3b/0x50 [ 15.499230] __kasan_kmalloc+0xb7/0xc0 [ 15.499363] __kmalloc_cache_noprof+0x189/0x420 [ 15.499626] kasan_atomics+0x95/0x310 [ 15.499816] kunit_try_run_case+0x1a5/0x480 [ 15.500041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.500237] kthread+0x337/0x6f0 [ 15.500359] ret_from_fork+0x116/0x1d0 [ 15.500492] ret_from_fork_asm+0x1a/0x30 [ 15.500713] [ 15.500809] The buggy address belongs to the object at ffff888102ba6080 [ 15.500809] which belongs to the cache kmalloc-64 of size 64 [ 15.501328] The buggy address is located 0 bytes to the right of [ 15.501328] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.502045] [ 15.502168] The buggy address belongs to the physical page: [ 15.502415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.502743] flags: 0x200000000000000(node=0|zone=2) [ 15.502909] page_type: f5(slab) [ 15.503034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.503311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.503658] page dumped because: kasan: bad access detected [ 15.503931] [ 15.504024] Memory state around the buggy address: [ 15.504450] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504722] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.504936] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.505144] ^ [ 15.505336] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.505847] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.506188] ================================================================== [ 15.235379] ================================================================== [ 15.235854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.236572] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.237308] [ 15.237531] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.237584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.237597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.237634] Call Trace: [ 15.237649] <TASK> [ 15.237709] dump_stack_lvl+0x73/0xb0 [ 15.237748] print_report+0xd1/0x650 [ 15.237772] ? __virt_addr_valid+0x1db/0x2d0 [ 15.237797] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.237819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.237844] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.237868] kasan_report+0x141/0x180 [ 15.237891] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.237919] kasan_check_range+0x10c/0x1c0 [ 15.237943] __kasan_check_write+0x18/0x20 [ 15.237963] kasan_atomics_helper+0x8f9/0x5450 [ 15.237988] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.238011] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.238039] ? kasan_atomics+0x152/0x310 [ 15.238066] kasan_atomics+0x1dc/0x310 [ 15.238090] ? __pfx_kasan_atomics+0x10/0x10 [ 15.238115] ? __pfx_read_tsc+0x10/0x10 [ 15.238137] ? ktime_get_ts64+0x86/0x230 [ 15.238163] kunit_try_run_case+0x1a5/0x480 [ 15.238191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.238214] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.238241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.238266] ? __kthread_parkme+0x82/0x180 [ 15.238288] ? preempt_count_sub+0x50/0x80 [ 15.238314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.238340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.238364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.238391] kthread+0x337/0x6f0 [ 15.238411] ? trace_preempt_on+0x20/0xc0 [ 15.238436] ? __pfx_kthread+0x10/0x10 [ 15.238458] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.238479] ? calculate_sigpending+0x7b/0xa0 [ 15.238515] ? __pfx_kthread+0x10/0x10 [ 15.238537] ret_from_fork+0x116/0x1d0 [ 15.238556] ? __pfx_kthread+0x10/0x10 [ 15.238578] ret_from_fork_asm+0x1a/0x30 [ 15.238621] </TASK> [ 15.238632] [ 15.249288] Allocated by task 283: [ 15.249671] kasan_save_stack+0x45/0x70 [ 15.249871] kasan_save_track+0x18/0x40 [ 15.250059] kasan_save_alloc_info+0x3b/0x50 [ 15.250264] __kasan_kmalloc+0xb7/0xc0 [ 15.250447] __kmalloc_cache_noprof+0x189/0x420 [ 15.251130] kasan_atomics+0x95/0x310 [ 15.251334] kunit_try_run_case+0x1a5/0x480 [ 15.251725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.252133] kthread+0x337/0x6f0 [ 15.252430] ret_from_fork+0x116/0x1d0 [ 15.252887] ret_from_fork_asm+0x1a/0x30 [ 15.253138] [ 15.253387] The buggy address belongs to the object at ffff888102ba6080 [ 15.253387] which belongs to the cache kmalloc-64 of size 64 [ 15.254316] The buggy address is located 0 bytes to the right of [ 15.254316] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.255290] [ 15.255389] The buggy address belongs to the physical page: [ 15.255860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.256404] flags: 0x200000000000000(node=0|zone=2) [ 15.256764] page_type: f5(slab) [ 15.256930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.257248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.257854] page dumped because: kasan: bad access detected [ 15.258153] [ 15.258375] Memory state around the buggy address: [ 15.258855] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.259298] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.259822] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.260130] ^ [ 15.260336] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260889] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.261364] ================================================================== [ 15.507156] ================================================================== [ 15.507478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.508148] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 15.508376] [ 15.508502] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.508549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.508562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.508585] Call Trace: [ 15.508616] <TASK> [ 15.508635] dump_stack_lvl+0x73/0xb0 [ 15.508667] print_report+0xd1/0x650 [ 15.508690] ? __virt_addr_valid+0x1db/0x2d0 [ 15.508713] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.508734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.508757] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.508778] kasan_report+0x141/0x180 [ 15.508800] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.508827] __asan_report_load4_noabort+0x18/0x20 [ 15.508852] kasan_atomics_helper+0x4a36/0x5450 [ 15.508874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.508897] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.508948] ? kasan_atomics+0x152/0x310 [ 15.508974] kasan_atomics+0x1dc/0x310 [ 15.509009] ? __pfx_kasan_atomics+0x10/0x10 [ 15.509034] ? __pfx_read_tsc+0x10/0x10 [ 15.509072] ? ktime_get_ts64+0x86/0x230 [ 15.509110] kunit_try_run_case+0x1a5/0x480 [ 15.509135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.509159] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.509186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.509211] ? __kthread_parkme+0x82/0x180 [ 15.509233] ? preempt_count_sub+0x50/0x80 [ 15.509259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.509284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.509310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.509337] kthread+0x337/0x6f0 [ 15.509357] ? trace_preempt_on+0x20/0xc0 [ 15.509383] ? __pfx_kthread+0x10/0x10 [ 15.509404] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.509444] ? calculate_sigpending+0x7b/0xa0 [ 15.509470] ? __pfx_kthread+0x10/0x10 [ 15.509493] ret_from_fork+0x116/0x1d0 [ 15.509513] ? __pfx_kthread+0x10/0x10 [ 15.509544] ret_from_fork_asm+0x1a/0x30 [ 15.509578] </TASK> [ 15.509590] [ 15.518918] Allocated by task 283: [ 15.519065] kasan_save_stack+0x45/0x70 [ 15.519277] kasan_save_track+0x18/0x40 [ 15.519483] kasan_save_alloc_info+0x3b/0x50 [ 15.519971] __kasan_kmalloc+0xb7/0xc0 [ 15.520140] __kmalloc_cache_noprof+0x189/0x420 [ 15.520495] kasan_atomics+0x95/0x310 [ 15.520876] kunit_try_run_case+0x1a5/0x480 [ 15.521159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.521518] kthread+0x337/0x6f0 [ 15.521694] ret_from_fork+0x116/0x1d0 [ 15.521978] ret_from_fork_asm+0x1a/0x30 [ 15.522139] [ 15.522240] The buggy address belongs to the object at ffff888102ba6080 [ 15.522240] which belongs to the cache kmalloc-64 of size 64 [ 15.523055] The buggy address is located 0 bytes to the right of [ 15.523055] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 15.523849] [ 15.523938] The buggy address belongs to the physical page: [ 15.524304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 15.524741] flags: 0x200000000000000(node=0|zone=2) [ 15.525036] page_type: f5(slab) [ 15.525216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.525726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.526070] page dumped because: kasan: bad access detected [ 15.526306] [ 15.526388] Memory state around the buggy address: [ 15.526824] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.527082] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.527483] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.527965] ^ [ 15.528127] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528540] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528934] ================================================================== [ 16.244592] ================================================================== [ 16.244963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.245307] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283 [ 16.245680] [ 16.245774] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.245820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.245832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.245855] Call Trace: [ 16.245873] <TASK> [ 16.245888] dump_stack_lvl+0x73/0xb0 [ 16.245919] print_report+0xd1/0x650 [ 16.245944] ? __virt_addr_valid+0x1db/0x2d0 [ 16.245969] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.245995] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.246021] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.246047] kasan_report+0x141/0x180 [ 16.246070] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.246099] __asan_report_load8_noabort+0x18/0x20 [ 16.246125] kasan_atomics_helper+0x4fb2/0x5450 [ 16.246149] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.246173] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.246199] ? kasan_atomics+0x152/0x310 [ 16.246227] kasan_atomics+0x1dc/0x310 [ 16.246250] ? __pfx_kasan_atomics+0x10/0x10 [ 16.246276] ? __pfx_read_tsc+0x10/0x10 [ 16.246297] ? ktime_get_ts64+0x86/0x230 [ 16.246322] kunit_try_run_case+0x1a5/0x480 [ 16.246347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.246371] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.246397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.246422] ? __kthread_parkme+0x82/0x180 [ 16.246443] ? preempt_count_sub+0x50/0x80 [ 16.246468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.246494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.247370] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.247443] kthread+0x337/0x6f0 [ 16.247466] ? trace_preempt_on+0x20/0xc0 [ 16.247523] ? __pfx_kthread+0x10/0x10 [ 16.247546] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.247570] ? calculate_sigpending+0x7b/0xa0 [ 16.247597] ? __pfx_kthread+0x10/0x10 [ 16.247632] ret_from_fork+0x116/0x1d0 [ 16.247652] ? __pfx_kthread+0x10/0x10 [ 16.247675] ret_from_fork_asm+0x1a/0x30 [ 16.247709] </TASK> [ 16.247721] [ 16.264506] Allocated by task 283: [ 16.264654] kasan_save_stack+0x45/0x70 [ 16.264808] kasan_save_track+0x18/0x40 [ 16.264946] kasan_save_alloc_info+0x3b/0x50 [ 16.265096] __kasan_kmalloc+0xb7/0xc0 [ 16.265228] __kmalloc_cache_noprof+0x189/0x420 [ 16.265386] kasan_atomics+0x95/0x310 [ 16.265519] kunit_try_run_case+0x1a5/0x480 [ 16.265807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.266264] kthread+0x337/0x6f0 [ 16.266586] ret_from_fork+0x116/0x1d0 [ 16.266923] ret_from_fork_asm+0x1a/0x30 [ 16.267327] [ 16.267485] The buggy address belongs to the object at ffff888102ba6080 [ 16.267485] which belongs to the cache kmalloc-64 of size 64 [ 16.268828] The buggy address is located 0 bytes to the right of [ 16.268828] allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0) [ 16.269961] [ 16.270132] The buggy address belongs to the physical page: [ 16.270651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6 [ 16.271459] flags: 0x200000000000000(node=0|zone=2) [ 16.272032] page_type: f5(slab) [ 16.272377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.273108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.273939] page dumped because: kasan: bad access detected [ 16.274454] [ 16.274596] Memory state around the buggy address: [ 16.274999] ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275476] ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.275926] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.276138] ^ [ 16.276290] ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.276525] ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.277141] ==================================================================