Date
July 9, 2025, 12:11 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 16.137289] ================================================================== [ 16.137603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.137899] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.138224] [ 16.138355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.138399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.138411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.138432] Call Trace: [ 16.138449] <TASK> [ 16.138467] dump_stack_lvl+0x73/0xb0 [ 16.138498] print_report+0xd1/0x650 [ 16.138522] ? __virt_addr_valid+0x1db/0x2d0 [ 16.138546] ? kasan_atomics_helper+0x194a/0x5450 [ 16.138569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.138593] ? kasan_atomics_helper+0x194a/0x5450 [ 16.138617] kasan_report+0x141/0x180 [ 16.138639] ? kasan_atomics_helper+0x194a/0x5450 [ 16.138666] kasan_check_range+0x10c/0x1c0 [ 16.138691] __kasan_check_write+0x18/0x20 [ 16.138720] kasan_atomics_helper+0x194a/0x5450 [ 16.138743] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.138768] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.138794] ? kasan_atomics+0x152/0x310 [ 16.138821] kasan_atomics+0x1dc/0x310 [ 16.138844] ? __pfx_kasan_atomics+0x10/0x10 [ 16.138870] ? __pfx_read_tsc+0x10/0x10 [ 16.138892] ? ktime_get_ts64+0x86/0x230 [ 16.138916] kunit_try_run_case+0x1a5/0x480 [ 16.138952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.138975] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.139001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.139026] ? __kthread_parkme+0x82/0x180 [ 16.139047] ? preempt_count_sub+0x50/0x80 [ 16.139072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.139098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.139123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.139149] kthread+0x337/0x6f0 [ 16.139168] ? trace_preempt_on+0x20/0xc0 [ 16.139193] ? __pfx_kthread+0x10/0x10 [ 16.139214] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.139237] ? calculate_sigpending+0x7b/0xa0 [ 16.139282] ? __pfx_kthread+0x10/0x10 [ 16.139304] ret_from_fork+0x116/0x1d0 [ 16.139323] ? __pfx_kthread+0x10/0x10 [ 16.139344] ret_from_fork_asm+0x1a/0x30 [ 16.139376] </TASK> [ 16.139386] [ 16.146451] Allocated by task 282: [ 16.146630] kasan_save_stack+0x45/0x70 [ 16.146834] kasan_save_track+0x18/0x40 [ 16.146983] kasan_save_alloc_info+0x3b/0x50 [ 16.147147] __kasan_kmalloc+0xb7/0xc0 [ 16.147360] __kmalloc_cache_noprof+0x189/0x420 [ 16.147585] kasan_atomics+0x95/0x310 [ 16.147772] kunit_try_run_case+0x1a5/0x480 [ 16.147966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.148177] kthread+0x337/0x6f0 [ 16.148372] ret_from_fork+0x116/0x1d0 [ 16.148540] ret_from_fork_asm+0x1a/0x30 [ 16.148708] [ 16.148778] The buggy address belongs to the object at ffff888102ac2380 [ 16.148778] which belongs to the cache kmalloc-64 of size 64 [ 16.149137] The buggy address is located 0 bytes to the right of [ 16.149137] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.149520] [ 16.149593] The buggy address belongs to the physical page: [ 16.149763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.150125] flags: 0x200000000000000(node=0|zone=2) [ 16.150380] page_type: f5(slab) [ 16.150549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.150886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.151228] page dumped because: kasan: bad access detected [ 16.151499] [ 16.151579] Memory state around the buggy address: [ 16.151787] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.152040] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.152270] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.152482] ^ [ 16.152635] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.152847] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.153157] ================================================================== [ 16.171856] ================================================================== [ 16.172199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.172466] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.172804] [ 16.172918] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.172972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.172985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.173006] Call Trace: [ 16.173026] <TASK> [ 16.173046] dump_stack_lvl+0x73/0xb0 [ 16.173077] print_report+0xd1/0x650 [ 16.173101] ? __virt_addr_valid+0x1db/0x2d0 [ 16.173125] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.173147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.173171] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.173195] kasan_report+0x141/0x180 [ 16.173217] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.173244] kasan_check_range+0x10c/0x1c0 [ 16.173276] __kasan_check_write+0x18/0x20 [ 16.173297] kasan_atomics_helper+0x1a7f/0x5450 [ 16.173321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.173344] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.173370] ? kasan_atomics+0x152/0x310 [ 16.173397] kasan_atomics+0x1dc/0x310 [ 16.173420] ? __pfx_kasan_atomics+0x10/0x10 [ 16.173445] ? __pfx_read_tsc+0x10/0x10 [ 16.173468] ? ktime_get_ts64+0x86/0x230 [ 16.173493] kunit_try_run_case+0x1a5/0x480 [ 16.173518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.173542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.173568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.173592] ? __kthread_parkme+0x82/0x180 [ 16.173614] ? preempt_count_sub+0x50/0x80 [ 16.173639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.173664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.173690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.173716] kthread+0x337/0x6f0 [ 16.173736] ? trace_preempt_on+0x20/0xc0 [ 16.173762] ? __pfx_kthread+0x10/0x10 [ 16.173783] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.173806] ? calculate_sigpending+0x7b/0xa0 [ 16.173831] ? __pfx_kthread+0x10/0x10 [ 16.173853] ret_from_fork+0x116/0x1d0 [ 16.173873] ? __pfx_kthread+0x10/0x10 [ 16.173894] ret_from_fork_asm+0x1a/0x30 [ 16.173925] </TASK> [ 16.173945] [ 16.181138] Allocated by task 282: [ 16.181293] kasan_save_stack+0x45/0x70 [ 16.181439] kasan_save_track+0x18/0x40 [ 16.181574] kasan_save_alloc_info+0x3b/0x50 [ 16.181723] __kasan_kmalloc+0xb7/0xc0 [ 16.181855] __kmalloc_cache_noprof+0x189/0x420 [ 16.182022] kasan_atomics+0x95/0x310 [ 16.182283] kunit_try_run_case+0x1a5/0x480 [ 16.182619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.182875] kthread+0x337/0x6f0 [ 16.183050] ret_from_fork+0x116/0x1d0 [ 16.183236] ret_from_fork_asm+0x1a/0x30 [ 16.183448] [ 16.183540] The buggy address belongs to the object at ffff888102ac2380 [ 16.183540] which belongs to the cache kmalloc-64 of size 64 [ 16.184064] The buggy address is located 0 bytes to the right of [ 16.184064] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.184566] [ 16.184639] The buggy address belongs to the physical page: [ 16.184809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.185057] flags: 0x200000000000000(node=0|zone=2) [ 16.185219] page_type: f5(slab) [ 16.185363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.185667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.186027] page dumped because: kasan: bad access detected [ 16.186307] [ 16.186403] Memory state around the buggy address: [ 16.186632] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.186972] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.187316] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.187583] ^ [ 16.187742] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.188078] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.188375] ================================================================== [ 16.223045] ================================================================== [ 16.223353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.223594] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.223814] [ 16.223904] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.223974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.223989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.224011] Call Trace: [ 16.224029] <TASK> [ 16.224048] dump_stack_lvl+0x73/0xb0 [ 16.224080] print_report+0xd1/0x650 [ 16.224103] ? __virt_addr_valid+0x1db/0x2d0 [ 16.224128] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.224171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.224205] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.224229] kasan_report+0x141/0x180 [ 16.224285] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.224334] __asan_report_load8_noabort+0x18/0x20 [ 16.224360] kasan_atomics_helper+0x4f30/0x5450 [ 16.224384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.224408] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.224447] ? kasan_atomics+0x152/0x310 [ 16.224474] kasan_atomics+0x1dc/0x310 [ 16.224498] ? __pfx_kasan_atomics+0x10/0x10 [ 16.224524] ? __pfx_read_tsc+0x10/0x10 [ 16.224547] ? ktime_get_ts64+0x86/0x230 [ 16.224573] kunit_try_run_case+0x1a5/0x480 [ 16.224599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.224622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.224647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.224672] ? __kthread_parkme+0x82/0x180 [ 16.224694] ? preempt_count_sub+0x50/0x80 [ 16.224719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.224744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.224770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.224797] kthread+0x337/0x6f0 [ 16.224816] ? trace_preempt_on+0x20/0xc0 [ 16.224842] ? __pfx_kthread+0x10/0x10 [ 16.224863] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.224886] ? calculate_sigpending+0x7b/0xa0 [ 16.224911] ? __pfx_kthread+0x10/0x10 [ 16.224934] ret_from_fork+0x116/0x1d0 [ 16.224965] ? __pfx_kthread+0x10/0x10 [ 16.224987] ret_from_fork_asm+0x1a/0x30 [ 16.225019] </TASK> [ 16.225031] [ 16.232354] Allocated by task 282: [ 16.232539] kasan_save_stack+0x45/0x70 [ 16.232735] kasan_save_track+0x18/0x40 [ 16.232929] kasan_save_alloc_info+0x3b/0x50 [ 16.233147] __kasan_kmalloc+0xb7/0xc0 [ 16.233342] __kmalloc_cache_noprof+0x189/0x420 [ 16.233536] kasan_atomics+0x95/0x310 [ 16.233688] kunit_try_run_case+0x1a5/0x480 [ 16.233897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.234113] kthread+0x337/0x6f0 [ 16.234234] ret_from_fork+0x116/0x1d0 [ 16.234386] ret_from_fork_asm+0x1a/0x30 [ 16.234525] [ 16.234594] The buggy address belongs to the object at ffff888102ac2380 [ 16.234594] which belongs to the cache kmalloc-64 of size 64 [ 16.234957] The buggy address is located 0 bytes to the right of [ 16.234957] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.235529] [ 16.235629] The buggy address belongs to the physical page: [ 16.235885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.236270] flags: 0x200000000000000(node=0|zone=2) [ 16.236512] page_type: f5(slab) [ 16.236686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.237043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.237372] page dumped because: kasan: bad access detected [ 16.237600] [ 16.237687] Memory state around the buggy address: [ 16.237880] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.238164] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.238431] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.238643] ^ [ 16.238802] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.239060] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.239404] ================================================================== [ 15.849104] ================================================================== [ 15.849376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.849919] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.850210] [ 15.850316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.850358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.850370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.850392] Call Trace: [ 15.850410] <TASK> [ 15.850429] dump_stack_lvl+0x73/0xb0 [ 15.850460] print_report+0xd1/0x650 [ 15.850484] ? __virt_addr_valid+0x1db/0x2d0 [ 15.850507] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.850530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.850566] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.850589] kasan_report+0x141/0x180 [ 15.850613] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.850653] __asan_report_load4_noabort+0x18/0x20 [ 15.850680] kasan_atomics_helper+0x49e8/0x5450 [ 15.850704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.850731] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.850758] ? kasan_atomics+0x152/0x310 [ 15.850784] kasan_atomics+0x1dc/0x310 [ 15.850807] ? __pfx_kasan_atomics+0x10/0x10 [ 15.850833] ? __pfx_read_tsc+0x10/0x10 [ 15.850856] ? ktime_get_ts64+0x86/0x230 [ 15.850881] kunit_try_run_case+0x1a5/0x480 [ 15.850908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.850931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.850967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.850992] ? __kthread_parkme+0x82/0x180 [ 15.851014] ? preempt_count_sub+0x50/0x80 [ 15.851039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.851089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.851115] kthread+0x337/0x6f0 [ 15.851134] ? trace_preempt_on+0x20/0xc0 [ 15.851160] ? __pfx_kthread+0x10/0x10 [ 15.851181] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.851204] ? calculate_sigpending+0x7b/0xa0 [ 15.851229] ? __pfx_kthread+0x10/0x10 [ 15.851251] ret_from_fork+0x116/0x1d0 [ 15.851282] ? __pfx_kthread+0x10/0x10 [ 15.851304] ret_from_fork_asm+0x1a/0x30 [ 15.851336] </TASK> [ 15.851348] [ 15.858998] Allocated by task 282: [ 15.859207] kasan_save_stack+0x45/0x70 [ 15.859411] kasan_save_track+0x18/0x40 [ 15.859548] kasan_save_alloc_info+0x3b/0x50 [ 15.859698] __kasan_kmalloc+0xb7/0xc0 [ 15.859875] __kmalloc_cache_noprof+0x189/0x420 [ 15.860135] kasan_atomics+0x95/0x310 [ 15.860392] kunit_try_run_case+0x1a5/0x480 [ 15.860628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.860909] kthread+0x337/0x6f0 [ 15.861053] ret_from_fork+0x116/0x1d0 [ 15.861236] ret_from_fork_asm+0x1a/0x30 [ 15.861458] [ 15.861530] The buggy address belongs to the object at ffff888102ac2380 [ 15.861530] which belongs to the cache kmalloc-64 of size 64 [ 15.861877] The buggy address is located 0 bytes to the right of [ 15.861877] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.862339] [ 15.862434] The buggy address belongs to the physical page: [ 15.862683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.863095] flags: 0x200000000000000(node=0|zone=2) [ 15.863339] page_type: f5(slab) [ 15.863458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.863684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.863907] page dumped because: kasan: bad access detected [ 15.864158] [ 15.864254] Memory state around the buggy address: [ 15.864490] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.864834] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.865174] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.865526] ^ [ 15.865755] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.866110] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.866489] ================================================================== [ 16.466565] ================================================================== [ 16.466871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.467301] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.467599] [ 16.467685] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.467727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.467739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.467760] Call Trace: [ 16.467779] <TASK> [ 16.467795] dump_stack_lvl+0x73/0xb0 [ 16.467825] print_report+0xd1/0x650 [ 16.467850] ? __virt_addr_valid+0x1db/0x2d0 [ 16.467873] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.467895] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.467920] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.467953] kasan_report+0x141/0x180 [ 16.467976] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.468004] __asan_report_load8_noabort+0x18/0x20 [ 16.468030] kasan_atomics_helper+0x4fa5/0x5450 [ 16.468054] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.468077] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.468104] ? kasan_atomics+0x152/0x310 [ 16.468131] kasan_atomics+0x1dc/0x310 [ 16.468155] ? __pfx_kasan_atomics+0x10/0x10 [ 16.468220] ? __pfx_read_tsc+0x10/0x10 [ 16.468244] ? ktime_get_ts64+0x86/0x230 [ 16.468289] kunit_try_run_case+0x1a5/0x480 [ 16.468315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.468371] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.468398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.468423] ? __kthread_parkme+0x82/0x180 [ 16.468446] ? preempt_count_sub+0x50/0x80 [ 16.468471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.468497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.468553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.468581] kthread+0x337/0x6f0 [ 16.468601] ? trace_preempt_on+0x20/0xc0 [ 16.468626] ? __pfx_kthread+0x10/0x10 [ 16.468648] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.468671] ? calculate_sigpending+0x7b/0xa0 [ 16.468727] ? __pfx_kthread+0x10/0x10 [ 16.468750] ret_from_fork+0x116/0x1d0 [ 16.468769] ? __pfx_kthread+0x10/0x10 [ 16.468792] ret_from_fork_asm+0x1a/0x30 [ 16.468854] </TASK> [ 16.468866] [ 16.476927] Allocated by task 282: [ 16.477140] kasan_save_stack+0x45/0x70 [ 16.477401] kasan_save_track+0x18/0x40 [ 16.477616] kasan_save_alloc_info+0x3b/0x50 [ 16.478038] __kasan_kmalloc+0xb7/0xc0 [ 16.478231] __kmalloc_cache_noprof+0x189/0x420 [ 16.478473] kasan_atomics+0x95/0x310 [ 16.478661] kunit_try_run_case+0x1a5/0x480 [ 16.478875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.479135] kthread+0x337/0x6f0 [ 16.479317] ret_from_fork+0x116/0x1d0 [ 16.479468] ret_from_fork_asm+0x1a/0x30 [ 16.479665] [ 16.479759] The buggy address belongs to the object at ffff888102ac2380 [ 16.479759] which belongs to the cache kmalloc-64 of size 64 [ 16.480618] The buggy address is located 0 bytes to the right of [ 16.480618] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.481175] [ 16.481301] The buggy address belongs to the physical page: [ 16.481556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.481903] flags: 0x200000000000000(node=0|zone=2) [ 16.482075] page_type: f5(slab) [ 16.482197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.482562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.482950] page dumped because: kasan: bad access detected [ 16.483226] [ 16.483337] Memory state around the buggy address: [ 16.483573] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.483827] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.484105] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.484500] ^ [ 16.484728] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.484978] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.485210] ================================================================== [ 15.351768] ================================================================== [ 15.352177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.352549] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.352887] [ 15.353358] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.353411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.353436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.353458] Call Trace: [ 15.353477] <TASK> [ 15.353496] dump_stack_lvl+0x73/0xb0 [ 15.353539] print_report+0xd1/0x650 [ 15.353563] ? __virt_addr_valid+0x1db/0x2d0 [ 15.353598] ? kasan_atomics_helper+0x565/0x5450 [ 15.353622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.353647] ? kasan_atomics_helper+0x565/0x5450 [ 15.353680] kasan_report+0x141/0x180 [ 15.353703] ? kasan_atomics_helper+0x565/0x5450 [ 15.353740] kasan_check_range+0x10c/0x1c0 [ 15.353765] __kasan_check_write+0x18/0x20 [ 15.353787] kasan_atomics_helper+0x565/0x5450 [ 15.353820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.353844] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.353871] ? kasan_atomics+0x152/0x310 [ 15.353910] kasan_atomics+0x1dc/0x310 [ 15.353954] ? __pfx_kasan_atomics+0x10/0x10 [ 15.353991] ? __pfx_read_tsc+0x10/0x10 [ 15.354015] ? ktime_get_ts64+0x86/0x230 [ 15.354041] kunit_try_run_case+0x1a5/0x480 [ 15.354078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.354126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.354165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.354190] ? __kthread_parkme+0x82/0x180 [ 15.354213] ? preempt_count_sub+0x50/0x80 [ 15.354296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.354333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.354360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.354416] kthread+0x337/0x6f0 [ 15.354436] ? trace_preempt_on+0x20/0xc0 [ 15.354461] ? __pfx_kthread+0x10/0x10 [ 15.354494] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.354518] ? calculate_sigpending+0x7b/0xa0 [ 15.354544] ? __pfx_kthread+0x10/0x10 [ 15.354566] ret_from_fork+0x116/0x1d0 [ 15.354586] ? __pfx_kthread+0x10/0x10 [ 15.354608] ret_from_fork_asm+0x1a/0x30 [ 15.354640] </TASK> [ 15.354651] [ 15.362380] Allocated by task 282: [ 15.362610] kasan_save_stack+0x45/0x70 [ 15.362847] kasan_save_track+0x18/0x40 [ 15.363050] kasan_save_alloc_info+0x3b/0x50 [ 15.363418] __kasan_kmalloc+0xb7/0xc0 [ 15.363678] __kmalloc_cache_noprof+0x189/0x420 [ 15.363954] kasan_atomics+0x95/0x310 [ 15.364159] kunit_try_run_case+0x1a5/0x480 [ 15.364436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.364616] kthread+0x337/0x6f0 [ 15.364737] ret_from_fork+0x116/0x1d0 [ 15.364918] ret_from_fork_asm+0x1a/0x30 [ 15.365161] [ 15.365295] The buggy address belongs to the object at ffff888102ac2380 [ 15.365295] which belongs to the cache kmalloc-64 of size 64 [ 15.365860] The buggy address is located 0 bytes to the right of [ 15.365860] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.366389] [ 15.366465] The buggy address belongs to the physical page: [ 15.366643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.366996] flags: 0x200000000000000(node=0|zone=2) [ 15.367311] page_type: f5(slab) [ 15.367487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.367892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.368377] page dumped because: kasan: bad access detected [ 15.368549] [ 15.368618] Memory state around the buggy address: [ 15.368773] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.369103] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.369490] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.369920] ^ [ 15.370198] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370534] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370755] ================================================================== [ 16.396394] ================================================================== [ 16.396743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.397069] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.397486] [ 16.397604] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.397649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.397662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.397683] Call Trace: [ 16.397703] <TASK> [ 16.397720] dump_stack_lvl+0x73/0xb0 [ 16.397753] print_report+0xd1/0x650 [ 16.397801] ? __virt_addr_valid+0x1db/0x2d0 [ 16.397826] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.397849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.397873] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.397896] kasan_report+0x141/0x180 [ 16.397919] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.397959] __asan_report_load8_noabort+0x18/0x20 [ 16.398006] kasan_atomics_helper+0x4f98/0x5450 [ 16.398029] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.398053] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.398080] ? kasan_atomics+0x152/0x310 [ 16.398107] kasan_atomics+0x1dc/0x310 [ 16.398130] ? __pfx_kasan_atomics+0x10/0x10 [ 16.398171] ? __pfx_read_tsc+0x10/0x10 [ 16.398194] ? ktime_get_ts64+0x86/0x230 [ 16.398219] kunit_try_run_case+0x1a5/0x480 [ 16.398245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.398276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.398301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.398326] ? __kthread_parkme+0x82/0x180 [ 16.398348] ? preempt_count_sub+0x50/0x80 [ 16.398404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.398430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.398456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.398482] kthread+0x337/0x6f0 [ 16.398501] ? trace_preempt_on+0x20/0xc0 [ 16.398526] ? __pfx_kthread+0x10/0x10 [ 16.398548] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.398571] ? calculate_sigpending+0x7b/0xa0 [ 16.398596] ? __pfx_kthread+0x10/0x10 [ 16.398618] ret_from_fork+0x116/0x1d0 [ 16.398638] ? __pfx_kthread+0x10/0x10 [ 16.398659] ret_from_fork_asm+0x1a/0x30 [ 16.398691] </TASK> [ 16.398703] [ 16.405814] Allocated by task 282: [ 16.405990] kasan_save_stack+0x45/0x70 [ 16.406133] kasan_save_track+0x18/0x40 [ 16.406293] kasan_save_alloc_info+0x3b/0x50 [ 16.406526] __kasan_kmalloc+0xb7/0xc0 [ 16.406720] __kmalloc_cache_noprof+0x189/0x420 [ 16.406951] kasan_atomics+0x95/0x310 [ 16.407140] kunit_try_run_case+0x1a5/0x480 [ 16.407375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.407572] kthread+0x337/0x6f0 [ 16.407693] ret_from_fork+0x116/0x1d0 [ 16.407824] ret_from_fork_asm+0x1a/0x30 [ 16.407971] [ 16.408069] The buggy address belongs to the object at ffff888102ac2380 [ 16.408069] which belongs to the cache kmalloc-64 of size 64 [ 16.408614] The buggy address is located 0 bytes to the right of [ 16.408614] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.409086] [ 16.409159] The buggy address belongs to the physical page: [ 16.409354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.409643] flags: 0x200000000000000(node=0|zone=2) [ 16.409900] page_type: f5(slab) [ 16.410099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.410486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.410834] page dumped because: kasan: bad access detected [ 16.411093] [ 16.411178] Memory state around the buggy address: [ 16.411357] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.411601] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.411914] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.412280] ^ [ 16.412453] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.412668] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.412931] ================================================================== [ 16.343066] ================================================================== [ 16.343458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.343783] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.344228] [ 16.344373] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.344420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.344454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.344476] Call Trace: [ 16.344496] <TASK> [ 16.344517] dump_stack_lvl+0x73/0xb0 [ 16.344551] print_report+0xd1/0x650 [ 16.344575] ? __virt_addr_valid+0x1db/0x2d0 [ 16.344619] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.344643] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.344668] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.344691] kasan_report+0x141/0x180 [ 16.344714] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.344742] kasan_check_range+0x10c/0x1c0 [ 16.344766] __kasan_check_write+0x18/0x20 [ 16.344786] kasan_atomics_helper+0x1f43/0x5450 [ 16.344810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.344850] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.344877] ? kasan_atomics+0x152/0x310 [ 16.344905] kasan_atomics+0x1dc/0x310 [ 16.344927] ? __pfx_kasan_atomics+0x10/0x10 [ 16.344965] ? __pfx_read_tsc+0x10/0x10 [ 16.344988] ? ktime_get_ts64+0x86/0x230 [ 16.345014] kunit_try_run_case+0x1a5/0x480 [ 16.345057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345081] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.345108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.345134] ? __kthread_parkme+0x82/0x180 [ 16.345158] ? preempt_count_sub+0x50/0x80 [ 16.345184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.345276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.345304] kthread+0x337/0x6f0 [ 16.345324] ? trace_preempt_on+0x20/0xc0 [ 16.345349] ? __pfx_kthread+0x10/0x10 [ 16.345370] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.345413] ? calculate_sigpending+0x7b/0xa0 [ 16.345439] ? __pfx_kthread+0x10/0x10 [ 16.345461] ret_from_fork+0x116/0x1d0 [ 16.345480] ? __pfx_kthread+0x10/0x10 [ 16.345503] ret_from_fork_asm+0x1a/0x30 [ 16.345534] </TASK> [ 16.345546] [ 16.352743] Allocated by task 282: [ 16.352959] kasan_save_stack+0x45/0x70 [ 16.353206] kasan_save_track+0x18/0x40 [ 16.353425] kasan_save_alloc_info+0x3b/0x50 [ 16.353641] __kasan_kmalloc+0xb7/0xc0 [ 16.353829] __kmalloc_cache_noprof+0x189/0x420 [ 16.354040] kasan_atomics+0x95/0x310 [ 16.354228] kunit_try_run_case+0x1a5/0x480 [ 16.354441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.354690] kthread+0x337/0x6f0 [ 16.354874] ret_from_fork+0x116/0x1d0 [ 16.355053] ret_from_fork_asm+0x1a/0x30 [ 16.355273] [ 16.355388] The buggy address belongs to the object at ffff888102ac2380 [ 16.355388] which belongs to the cache kmalloc-64 of size 64 [ 16.355866] The buggy address is located 0 bytes to the right of [ 16.355866] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.356241] [ 16.356337] The buggy address belongs to the physical page: [ 16.356639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.357005] flags: 0x200000000000000(node=0|zone=2) [ 16.357242] page_type: f5(slab) [ 16.357450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.357786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.358149] page dumped because: kasan: bad access detected [ 16.358339] [ 16.358409] Memory state around the buggy address: [ 16.358564] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.358830] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.359189] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.359564] ^ [ 16.359821] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360103] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360415] ================================================================== [ 15.544611] ================================================================== [ 15.544863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.545144] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.545397] [ 15.545489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.545535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.545548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.545570] Call Trace: [ 15.545583] <TASK> [ 15.545600] dump_stack_lvl+0x73/0xb0 [ 15.545632] print_report+0xd1/0x650 [ 15.545656] ? __virt_addr_valid+0x1db/0x2d0 [ 15.545681] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.545703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.545728] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.545751] kasan_report+0x141/0x180 [ 15.545774] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.545800] kasan_check_range+0x10c/0x1c0 [ 15.545825] __kasan_check_write+0x18/0x20 [ 15.545845] kasan_atomics_helper+0xb6a/0x5450 [ 15.545868] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.545892] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.545918] ? kasan_atomics+0x152/0x310 [ 15.545957] kasan_atomics+0x1dc/0x310 [ 15.545980] ? __pfx_kasan_atomics+0x10/0x10 [ 15.546006] ? __pfx_read_tsc+0x10/0x10 [ 15.546030] ? ktime_get_ts64+0x86/0x230 [ 15.546056] kunit_try_run_case+0x1a5/0x480 [ 15.546081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.546106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.546131] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.546157] ? __kthread_parkme+0x82/0x180 [ 15.546179] ? preempt_count_sub+0x50/0x80 [ 15.546205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.546232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.546280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.546307] kthread+0x337/0x6f0 [ 15.546327] ? trace_preempt_on+0x20/0xc0 [ 15.546352] ? __pfx_kthread+0x10/0x10 [ 15.546374] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.546397] ? calculate_sigpending+0x7b/0xa0 [ 15.546422] ? __pfx_kthread+0x10/0x10 [ 15.546445] ret_from_fork+0x116/0x1d0 [ 15.546463] ? __pfx_kthread+0x10/0x10 [ 15.546486] ret_from_fork_asm+0x1a/0x30 [ 15.546520] </TASK> [ 15.546532] [ 15.553635] Allocated by task 282: [ 15.553835] kasan_save_stack+0x45/0x70 [ 15.554025] kasan_save_track+0x18/0x40 [ 15.554211] kasan_save_alloc_info+0x3b/0x50 [ 15.554385] __kasan_kmalloc+0xb7/0xc0 [ 15.554557] __kmalloc_cache_noprof+0x189/0x420 [ 15.554788] kasan_atomics+0x95/0x310 [ 15.554989] kunit_try_run_case+0x1a5/0x480 [ 15.555205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.555450] kthread+0x337/0x6f0 [ 15.555596] ret_from_fork+0x116/0x1d0 [ 15.555776] ret_from_fork_asm+0x1a/0x30 [ 15.555965] [ 15.556066] The buggy address belongs to the object at ffff888102ac2380 [ 15.556066] which belongs to the cache kmalloc-64 of size 64 [ 15.556553] The buggy address is located 0 bytes to the right of [ 15.556553] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.556984] [ 15.557057] The buggy address belongs to the physical page: [ 15.557230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.557489] flags: 0x200000000000000(node=0|zone=2) [ 15.557653] page_type: f5(slab) [ 15.557774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.558123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.558482] page dumped because: kasan: bad access detected [ 15.558734] [ 15.558826] Memory state around the buggy address: [ 15.559056] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.559383] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.559598] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.559807] ^ [ 15.559969] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.560182] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.560476] ================================================================== [ 15.505772] ================================================================== [ 15.506420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.506956] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.507264] [ 15.507382] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.507434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.507447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.507468] Call Trace: [ 15.507488] <TASK> [ 15.507508] dump_stack_lvl+0x73/0xb0 [ 15.507540] print_report+0xd1/0x650 [ 15.507563] ? __virt_addr_valid+0x1db/0x2d0 [ 15.507587] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.507609] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.507634] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.507657] kasan_report+0x141/0x180 [ 15.507679] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.507707] kasan_check_range+0x10c/0x1c0 [ 15.507731] __kasan_check_write+0x18/0x20 [ 15.507751] kasan_atomics_helper+0xa2b/0x5450 [ 15.507775] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.507798] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.507824] ? kasan_atomics+0x152/0x310 [ 15.507852] kasan_atomics+0x1dc/0x310 [ 15.507875] ? __pfx_kasan_atomics+0x10/0x10 [ 15.507901] ? __pfx_read_tsc+0x10/0x10 [ 15.507923] ? ktime_get_ts64+0x86/0x230 [ 15.507960] kunit_try_run_case+0x1a5/0x480 [ 15.507985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.508010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.508035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.508060] ? __kthread_parkme+0x82/0x180 [ 15.508082] ? preempt_count_sub+0x50/0x80 [ 15.508107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.508133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.508158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.508184] kthread+0x337/0x6f0 [ 15.508204] ? trace_preempt_on+0x20/0xc0 [ 15.508228] ? __pfx_kthread+0x10/0x10 [ 15.508249] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.508282] ? calculate_sigpending+0x7b/0xa0 [ 15.508307] ? __pfx_kthread+0x10/0x10 [ 15.508330] ret_from_fork+0x116/0x1d0 [ 15.508350] ? __pfx_kthread+0x10/0x10 [ 15.508371] ret_from_fork_asm+0x1a/0x30 [ 15.508403] </TASK> [ 15.508415] [ 15.515884] Allocated by task 282: [ 15.516071] kasan_save_stack+0x45/0x70 [ 15.516269] kasan_save_track+0x18/0x40 [ 15.516422] kasan_save_alloc_info+0x3b/0x50 [ 15.516571] __kasan_kmalloc+0xb7/0xc0 [ 15.516704] __kmalloc_cache_noprof+0x189/0x420 [ 15.516860] kasan_atomics+0x95/0x310 [ 15.517125] kunit_try_run_case+0x1a5/0x480 [ 15.517422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.517679] kthread+0x337/0x6f0 [ 15.517852] ret_from_fork+0x116/0x1d0 [ 15.518055] ret_from_fork_asm+0x1a/0x30 [ 15.518252] [ 15.518355] The buggy address belongs to the object at ffff888102ac2380 [ 15.518355] which belongs to the cache kmalloc-64 of size 64 [ 15.518846] The buggy address is located 0 bytes to the right of [ 15.518846] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.519338] [ 15.519435] The buggy address belongs to the physical page: [ 15.519666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.520006] flags: 0x200000000000000(node=0|zone=2) [ 15.520201] page_type: f5(slab) [ 15.520389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.520628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.520896] page dumped because: kasan: bad access detected [ 15.521171] [ 15.521275] Memory state around the buggy address: [ 15.521506] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.521778] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.522074] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.522369] ^ [ 15.522537] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.522790] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.523126] ================================================================== [ 16.011330] ================================================================== [ 16.011884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.012270] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.012684] [ 16.012775] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.012817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.012830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.012850] Call Trace: [ 16.012869] <TASK> [ 16.012887] dump_stack_lvl+0x73/0xb0 [ 16.012918] print_report+0xd1/0x650 [ 16.012954] ? __virt_addr_valid+0x1db/0x2d0 [ 16.012977] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.013000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.013024] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.013046] kasan_report+0x141/0x180 [ 16.013068] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.013096] kasan_check_range+0x10c/0x1c0 [ 16.013121] __kasan_check_write+0x18/0x20 [ 16.013142] kasan_atomics_helper+0x15b6/0x5450 [ 16.013166] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.013190] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.013217] ? kasan_atomics+0x152/0x310 [ 16.013244] kasan_atomics+0x1dc/0x310 [ 16.013276] ? __pfx_kasan_atomics+0x10/0x10 [ 16.013302] ? __pfx_read_tsc+0x10/0x10 [ 16.013324] ? ktime_get_ts64+0x86/0x230 [ 16.013349] kunit_try_run_case+0x1a5/0x480 [ 16.013375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.013400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.013427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.013452] ? __kthread_parkme+0x82/0x180 [ 16.013474] ? preempt_count_sub+0x50/0x80 [ 16.013499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.013525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.013550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.013577] kthread+0x337/0x6f0 [ 16.013596] ? trace_preempt_on+0x20/0xc0 [ 16.013621] ? __pfx_kthread+0x10/0x10 [ 16.013643] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.013666] ? calculate_sigpending+0x7b/0xa0 [ 16.013691] ? __pfx_kthread+0x10/0x10 [ 16.013713] ret_from_fork+0x116/0x1d0 [ 16.013733] ? __pfx_kthread+0x10/0x10 [ 16.013756] ret_from_fork_asm+0x1a/0x30 [ 16.013788] </TASK> [ 16.013800] [ 16.021085] Allocated by task 282: [ 16.021265] kasan_save_stack+0x45/0x70 [ 16.021568] kasan_save_track+0x18/0x40 [ 16.021757] kasan_save_alloc_info+0x3b/0x50 [ 16.021977] __kasan_kmalloc+0xb7/0xc0 [ 16.022162] __kmalloc_cache_noprof+0x189/0x420 [ 16.022529] kasan_atomics+0x95/0x310 [ 16.022715] kunit_try_run_case+0x1a5/0x480 [ 16.022861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.023107] kthread+0x337/0x6f0 [ 16.023287] ret_from_fork+0x116/0x1d0 [ 16.023479] ret_from_fork_asm+0x1a/0x30 [ 16.023656] [ 16.023725] The buggy address belongs to the object at ffff888102ac2380 [ 16.023725] which belongs to the cache kmalloc-64 of size 64 [ 16.024091] The buggy address is located 0 bytes to the right of [ 16.024091] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.024909] [ 16.024999] The buggy address belongs to the physical page: [ 16.025229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.025589] flags: 0x200000000000000(node=0|zone=2) [ 16.025809] page_type: f5(slab) [ 16.025956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.026258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.026583] page dumped because: kasan: bad access detected [ 16.026803] [ 16.026895] Memory state around the buggy address: [ 16.027103] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.027438] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.027725] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.027948] ^ [ 16.028100] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.028350] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.028663] ================================================================== [ 15.524047] ================================================================== [ 15.524685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.525059] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.525371] [ 15.525462] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.525507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.525520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.525541] Call Trace: [ 15.525560] <TASK> [ 15.525578] dump_stack_lvl+0x73/0xb0 [ 15.525609] print_report+0xd1/0x650 [ 15.525633] ? __virt_addr_valid+0x1db/0x2d0 [ 15.525656] ? kasan_atomics_helper+0xac7/0x5450 [ 15.525679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.525704] ? kasan_atomics_helper+0xac7/0x5450 [ 15.525726] kasan_report+0x141/0x180 [ 15.525750] ? kasan_atomics_helper+0xac7/0x5450 [ 15.525776] kasan_check_range+0x10c/0x1c0 [ 15.525800] __kasan_check_write+0x18/0x20 [ 15.525821] kasan_atomics_helper+0xac7/0x5450 [ 15.525844] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.525869] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.525895] ? kasan_atomics+0x152/0x310 [ 15.525922] kasan_atomics+0x1dc/0x310 [ 15.525956] ? __pfx_kasan_atomics+0x10/0x10 [ 15.525982] ? __pfx_read_tsc+0x10/0x10 [ 15.526004] ? ktime_get_ts64+0x86/0x230 [ 15.526031] kunit_try_run_case+0x1a5/0x480 [ 15.526056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.526106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.526130] ? __kthread_parkme+0x82/0x180 [ 15.526153] ? preempt_count_sub+0x50/0x80 [ 15.526178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.526228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.526254] kthread+0x337/0x6f0 [ 15.526275] ? trace_preempt_on+0x20/0xc0 [ 15.526299] ? __pfx_kthread+0x10/0x10 [ 15.526320] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.526343] ? calculate_sigpending+0x7b/0xa0 [ 15.526368] ? __pfx_kthread+0x10/0x10 [ 15.526390] ret_from_fork+0x116/0x1d0 [ 15.526409] ? __pfx_kthread+0x10/0x10 [ 15.526430] ret_from_fork_asm+0x1a/0x30 [ 15.526463] </TASK> [ 15.526475] [ 15.535858] Allocated by task 282: [ 15.536021] kasan_save_stack+0x45/0x70 [ 15.536173] kasan_save_track+0x18/0x40 [ 15.536310] kasan_save_alloc_info+0x3b/0x50 [ 15.536461] __kasan_kmalloc+0xb7/0xc0 [ 15.536593] __kmalloc_cache_noprof+0x189/0x420 [ 15.536758] kasan_atomics+0x95/0x310 [ 15.536892] kunit_try_run_case+0x1a5/0x480 [ 15.537089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.537288] kthread+0x337/0x6f0 [ 15.537412] ret_from_fork+0x116/0x1d0 [ 15.537544] ret_from_fork_asm+0x1a/0x30 [ 15.537773] [ 15.537871] The buggy address belongs to the object at ffff888102ac2380 [ 15.537871] which belongs to the cache kmalloc-64 of size 64 [ 15.539127] The buggy address is located 0 bytes to the right of [ 15.539127] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.539912] [ 15.540044] The buggy address belongs to the physical page: [ 15.540316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.540645] flags: 0x200000000000000(node=0|zone=2) [ 15.540881] page_type: f5(slab) [ 15.541132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.541394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.541622] page dumped because: kasan: bad access detected [ 15.541794] [ 15.541865] Memory state around the buggy address: [ 15.542058] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542301] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542525] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.542745] ^ [ 15.542966] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.543317] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.543642] ================================================================== [ 16.103459] ================================================================== [ 16.103761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.104137] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.104456] [ 16.104561] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.104605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.104618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.104639] Call Trace: [ 16.104660] <TASK> [ 16.104680] dump_stack_lvl+0x73/0xb0 [ 16.104712] print_report+0xd1/0x650 [ 16.104737] ? __virt_addr_valid+0x1db/0x2d0 [ 16.104761] ? kasan_atomics_helper+0x1818/0x5450 [ 16.104784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.104807] ? kasan_atomics_helper+0x1818/0x5450 [ 16.104831] kasan_report+0x141/0x180 [ 16.104853] ? kasan_atomics_helper+0x1818/0x5450 [ 16.104880] kasan_check_range+0x10c/0x1c0 [ 16.104905] __kasan_check_write+0x18/0x20 [ 16.104925] kasan_atomics_helper+0x1818/0x5450 [ 16.104960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.104984] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.105010] ? kasan_atomics+0x152/0x310 [ 16.105037] kasan_atomics+0x1dc/0x310 [ 16.105061] ? __pfx_kasan_atomics+0x10/0x10 [ 16.105087] ? __pfx_read_tsc+0x10/0x10 [ 16.105110] ? ktime_get_ts64+0x86/0x230 [ 16.105135] kunit_try_run_case+0x1a5/0x480 [ 16.105160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.105185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.105210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.105235] ? __kthread_parkme+0x82/0x180 [ 16.105277] ? preempt_count_sub+0x50/0x80 [ 16.105303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.105329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.105355] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.105381] kthread+0x337/0x6f0 [ 16.105402] ? trace_preempt_on+0x20/0xc0 [ 16.105427] ? __pfx_kthread+0x10/0x10 [ 16.105448] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.105470] ? calculate_sigpending+0x7b/0xa0 [ 16.105495] ? __pfx_kthread+0x10/0x10 [ 16.105518] ret_from_fork+0x116/0x1d0 [ 16.105537] ? __pfx_kthread+0x10/0x10 [ 16.105559] ret_from_fork_asm+0x1a/0x30 [ 16.105591] </TASK> [ 16.105602] [ 16.112628] Allocated by task 282: [ 16.112815] kasan_save_stack+0x45/0x70 [ 16.113024] kasan_save_track+0x18/0x40 [ 16.113213] kasan_save_alloc_info+0x3b/0x50 [ 16.113420] __kasan_kmalloc+0xb7/0xc0 [ 16.113561] __kmalloc_cache_noprof+0x189/0x420 [ 16.113717] kasan_atomics+0x95/0x310 [ 16.113880] kunit_try_run_case+0x1a5/0x480 [ 16.114123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.114400] kthread+0x337/0x6f0 [ 16.114573] ret_from_fork+0x116/0x1d0 [ 16.114764] ret_from_fork_asm+0x1a/0x30 [ 16.114978] [ 16.115074] The buggy address belongs to the object at ffff888102ac2380 [ 16.115074] which belongs to the cache kmalloc-64 of size 64 [ 16.115542] The buggy address is located 0 bytes to the right of [ 16.115542] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.115956] [ 16.116029] The buggy address belongs to the physical page: [ 16.116200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.116515] flags: 0x200000000000000(node=0|zone=2) [ 16.116747] page_type: f5(slab) [ 16.116918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.117278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.117580] page dumped because: kasan: bad access detected [ 16.117778] [ 16.117846] Memory state around the buggy address: [ 16.118010] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.118249] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.118589] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.118903] ^ [ 16.119140] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.119488] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.119759] ================================================================== [ 16.189012] ================================================================== [ 16.189347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.189653] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.189970] [ 16.190063] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.190106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.190120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.190141] Call Trace: [ 16.190159] <TASK> [ 16.190178] dump_stack_lvl+0x73/0xb0 [ 16.190208] print_report+0xd1/0x650 [ 16.190232] ? __virt_addr_valid+0x1db/0x2d0 [ 16.190277] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.190301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.190326] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.190349] kasan_report+0x141/0x180 [ 16.190372] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.190399] kasan_check_range+0x10c/0x1c0 [ 16.190424] __kasan_check_write+0x18/0x20 [ 16.190444] kasan_atomics_helper+0x1b22/0x5450 [ 16.190468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.190492] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.190519] ? kasan_atomics+0x152/0x310 [ 16.190546] kasan_atomics+0x1dc/0x310 [ 16.190569] ? __pfx_kasan_atomics+0x10/0x10 [ 16.190595] ? __pfx_read_tsc+0x10/0x10 [ 16.190617] ? ktime_get_ts64+0x86/0x230 [ 16.190643] kunit_try_run_case+0x1a5/0x480 [ 16.190669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.190692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.190727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.190752] ? __kthread_parkme+0x82/0x180 [ 16.190774] ? preempt_count_sub+0x50/0x80 [ 16.190799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.190823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.190849] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.190876] kthread+0x337/0x6f0 [ 16.190896] ? trace_preempt_on+0x20/0xc0 [ 16.190921] ? __pfx_kthread+0x10/0x10 [ 16.190953] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.190975] ? calculate_sigpending+0x7b/0xa0 [ 16.191001] ? __pfx_kthread+0x10/0x10 [ 16.191023] ret_from_fork+0x116/0x1d0 [ 16.191042] ? __pfx_kthread+0x10/0x10 [ 16.191063] ret_from_fork_asm+0x1a/0x30 [ 16.191095] </TASK> [ 16.191107] [ 16.198179] Allocated by task 282: [ 16.198382] kasan_save_stack+0x45/0x70 [ 16.198543] kasan_save_track+0x18/0x40 [ 16.198677] kasan_save_alloc_info+0x3b/0x50 [ 16.198829] __kasan_kmalloc+0xb7/0xc0 [ 16.198972] __kmalloc_cache_noprof+0x189/0x420 [ 16.199129] kasan_atomics+0x95/0x310 [ 16.199279] kunit_try_run_case+0x1a5/0x480 [ 16.199489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.199740] kthread+0x337/0x6f0 [ 16.199908] ret_from_fork+0x116/0x1d0 [ 16.200118] ret_from_fork_asm+0x1a/0x30 [ 16.200344] [ 16.200443] The buggy address belongs to the object at ffff888102ac2380 [ 16.200443] which belongs to the cache kmalloc-64 of size 64 [ 16.200996] The buggy address is located 0 bytes to the right of [ 16.200996] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.201566] [ 16.201647] The buggy address belongs to the physical page: [ 16.201865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.202159] flags: 0x200000000000000(node=0|zone=2) [ 16.202366] page_type: f5(slab) [ 16.202538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.202887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.203238] page dumped because: kasan: bad access detected [ 16.203457] [ 16.203537] Memory state around the buggy address: [ 16.203761] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.204069] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.204327] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.204539] ^ [ 16.204693] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.204911] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205232] ================================================================== [ 15.706444] ================================================================== [ 15.706909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.707279] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.707569] [ 15.707659] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.707703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.707716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.707737] Call Trace: [ 15.707757] <TASK> [ 15.707777] dump_stack_lvl+0x73/0xb0 [ 15.707808] print_report+0xd1/0x650 [ 15.707832] ? __virt_addr_valid+0x1db/0x2d0 [ 15.707855] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.707878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.707902] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.707924] kasan_report+0x141/0x180 [ 15.707959] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.707986] kasan_check_range+0x10c/0x1c0 [ 15.708010] __kasan_check_write+0x18/0x20 [ 15.708040] kasan_atomics_helper+0xfa9/0x5450 [ 15.708065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.708088] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.708134] ? kasan_atomics+0x152/0x310 [ 15.708161] kasan_atomics+0x1dc/0x310 [ 15.708185] ? __pfx_kasan_atomics+0x10/0x10 [ 15.708221] ? __pfx_read_tsc+0x10/0x10 [ 15.708245] ? ktime_get_ts64+0x86/0x230 [ 15.708288] kunit_try_run_case+0x1a5/0x480 [ 15.708314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.708349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.708375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.708400] ? __kthread_parkme+0x82/0x180 [ 15.708421] ? preempt_count_sub+0x50/0x80 [ 15.708447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.708472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.708498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.708524] kthread+0x337/0x6f0 [ 15.708543] ? trace_preempt_on+0x20/0xc0 [ 15.708568] ? __pfx_kthread+0x10/0x10 [ 15.708599] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.708622] ? calculate_sigpending+0x7b/0xa0 [ 15.708647] ? __pfx_kthread+0x10/0x10 [ 15.708680] ret_from_fork+0x116/0x1d0 [ 15.708699] ? __pfx_kthread+0x10/0x10 [ 15.708721] ret_from_fork_asm+0x1a/0x30 [ 15.708753] </TASK> [ 15.708765] [ 15.716563] Allocated by task 282: [ 15.716753] kasan_save_stack+0x45/0x70 [ 15.716969] kasan_save_track+0x18/0x40 [ 15.717161] kasan_save_alloc_info+0x3b/0x50 [ 15.717389] __kasan_kmalloc+0xb7/0xc0 [ 15.717577] __kmalloc_cache_noprof+0x189/0x420 [ 15.717736] kasan_atomics+0x95/0x310 [ 15.717870] kunit_try_run_case+0x1a5/0x480 [ 15.718029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.718296] kthread+0x337/0x6f0 [ 15.718464] ret_from_fork+0x116/0x1d0 [ 15.718650] ret_from_fork_asm+0x1a/0x30 [ 15.718854] [ 15.719029] The buggy address belongs to the object at ffff888102ac2380 [ 15.719029] which belongs to the cache kmalloc-64 of size 64 [ 15.719578] The buggy address is located 0 bytes to the right of [ 15.719578] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.719953] [ 15.720050] The buggy address belongs to the physical page: [ 15.720301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.720685] flags: 0x200000000000000(node=0|zone=2) [ 15.721051] page_type: f5(slab) [ 15.721173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.721752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.722094] page dumped because: kasan: bad access detected [ 15.722384] [ 15.722460] Memory state around the buggy address: [ 15.722661] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.722922] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.723283] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.723591] ^ [ 15.723796] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.724113] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.724429] ================================================================== [ 16.205888] ================================================================== [ 16.206292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.206577] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.206805] [ 16.206893] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.206945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.206958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.206980] Call Trace: [ 16.206999] <TASK> [ 16.207017] dump_stack_lvl+0x73/0xb0 [ 16.207048] print_report+0xd1/0x650 [ 16.207071] ? __virt_addr_valid+0x1db/0x2d0 [ 16.207095] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.207118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.207143] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.207166] kasan_report+0x141/0x180 [ 16.207189] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.207217] kasan_check_range+0x10c/0x1c0 [ 16.207241] __kasan_check_write+0x18/0x20 [ 16.207282] kasan_atomics_helper+0x1c18/0x5450 [ 16.207308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.207332] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.207359] ? kasan_atomics+0x152/0x310 [ 16.207386] kasan_atomics+0x1dc/0x310 [ 16.207409] ? __pfx_kasan_atomics+0x10/0x10 [ 16.207435] ? __pfx_read_tsc+0x10/0x10 [ 16.207457] ? ktime_get_ts64+0x86/0x230 [ 16.207482] kunit_try_run_case+0x1a5/0x480 [ 16.207508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.207531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.207557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.207582] ? __kthread_parkme+0x82/0x180 [ 16.207604] ? preempt_count_sub+0x50/0x80 [ 16.207629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.207654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.207682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.207708] kthread+0x337/0x6f0 [ 16.207727] ? trace_preempt_on+0x20/0xc0 [ 16.207752] ? __pfx_kthread+0x10/0x10 [ 16.207773] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.207796] ? calculate_sigpending+0x7b/0xa0 [ 16.207821] ? __pfx_kthread+0x10/0x10 [ 16.207843] ret_from_fork+0x116/0x1d0 [ 16.207862] ? __pfx_kthread+0x10/0x10 [ 16.207883] ret_from_fork_asm+0x1a/0x30 [ 16.207915] </TASK> [ 16.207926] [ 16.215050] Allocated by task 282: [ 16.215234] kasan_save_stack+0x45/0x70 [ 16.215454] kasan_save_track+0x18/0x40 [ 16.215652] kasan_save_alloc_info+0x3b/0x50 [ 16.215869] __kasan_kmalloc+0xb7/0xc0 [ 16.216068] __kmalloc_cache_noprof+0x189/0x420 [ 16.216317] kasan_atomics+0x95/0x310 [ 16.216507] kunit_try_run_case+0x1a5/0x480 [ 16.216719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.216960] kthread+0x337/0x6f0 [ 16.217082] ret_from_fork+0x116/0x1d0 [ 16.217293] ret_from_fork_asm+0x1a/0x30 [ 16.217501] [ 16.217599] The buggy address belongs to the object at ffff888102ac2380 [ 16.217599] which belongs to the cache kmalloc-64 of size 64 [ 16.218087] The buggy address is located 0 bytes to the right of [ 16.218087] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.218556] [ 16.218656] The buggy address belongs to the physical page: [ 16.218904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.219152] flags: 0x200000000000000(node=0|zone=2) [ 16.219339] page_type: f5(slab) [ 16.219463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.219691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.219963] page dumped because: kasan: bad access detected [ 16.220209] [ 16.220328] Memory state around the buggy address: [ 16.220551] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.220864] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.221187] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.221528] ^ [ 16.221752] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.222074] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.222401] ================================================================== [ 15.487259] ================================================================== [ 15.488001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.488251] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.488478] [ 15.488565] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.488608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.488621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.488651] Call Trace: [ 15.488669] <TASK> [ 15.488686] dump_stack_lvl+0x73/0xb0 [ 15.488716] print_report+0xd1/0x650 [ 15.488740] ? __virt_addr_valid+0x1db/0x2d0 [ 15.488764] ? kasan_atomics_helper+0x992/0x5450 [ 15.488787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.488812] ? kasan_atomics_helper+0x992/0x5450 [ 15.488835] kasan_report+0x141/0x180 [ 15.488857] ? kasan_atomics_helper+0x992/0x5450 [ 15.488885] kasan_check_range+0x10c/0x1c0 [ 15.488909] __kasan_check_write+0x18/0x20 [ 15.488930] kasan_atomics_helper+0x992/0x5450 [ 15.488965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.488989] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.489016] ? kasan_atomics+0x152/0x310 [ 15.489043] kasan_atomics+0x1dc/0x310 [ 15.489067] ? __pfx_kasan_atomics+0x10/0x10 [ 15.489093] ? __pfx_read_tsc+0x10/0x10 [ 15.489115] ? ktime_get_ts64+0x86/0x230 [ 15.489140] kunit_try_run_case+0x1a5/0x480 [ 15.489165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489188] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.489214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.489240] ? __kthread_parkme+0x82/0x180 [ 15.489264] ? preempt_count_sub+0x50/0x80 [ 15.489291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.489342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.489369] kthread+0x337/0x6f0 [ 15.489389] ? trace_preempt_on+0x20/0xc0 [ 15.489414] ? __pfx_kthread+0x10/0x10 [ 15.489435] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.489458] ? calculate_sigpending+0x7b/0xa0 [ 15.489484] ? __pfx_kthread+0x10/0x10 [ 15.489508] ret_from_fork+0x116/0x1d0 [ 15.489527] ? __pfx_kthread+0x10/0x10 [ 15.489549] ret_from_fork_asm+0x1a/0x30 [ 15.489581] </TASK> [ 15.489592] [ 15.497439] Allocated by task 282: [ 15.497588] kasan_save_stack+0x45/0x70 [ 15.497740] kasan_save_track+0x18/0x40 [ 15.497874] kasan_save_alloc_info+0x3b/0x50 [ 15.498035] __kasan_kmalloc+0xb7/0xc0 [ 15.498214] __kmalloc_cache_noprof+0x189/0x420 [ 15.498575] kasan_atomics+0x95/0x310 [ 15.498770] kunit_try_run_case+0x1a5/0x480 [ 15.498985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.499240] kthread+0x337/0x6f0 [ 15.499419] ret_from_fork+0x116/0x1d0 [ 15.499606] ret_from_fork_asm+0x1a/0x30 [ 15.499800] [ 15.499894] The buggy address belongs to the object at ffff888102ac2380 [ 15.499894] which belongs to the cache kmalloc-64 of size 64 [ 15.500439] The buggy address is located 0 bytes to the right of [ 15.500439] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.500851] [ 15.500924] The buggy address belongs to the physical page: [ 15.501105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.501552] flags: 0x200000000000000(node=0|zone=2) [ 15.501793] page_type: f5(slab) [ 15.501976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.502355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.502585] page dumped because: kasan: bad access detected [ 15.502761] [ 15.502860] Memory state around the buggy address: [ 15.503094] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.503414] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.503770] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.503989] ^ [ 15.504142] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504595] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504911] ================================================================== [ 15.276339] ================================================================== [ 15.276718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.278205] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.278458] [ 15.278557] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.278603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.278616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.278639] Call Trace: [ 15.278652] <TASK> [ 15.278672] dump_stack_lvl+0x73/0xb0 [ 15.278709] print_report+0xd1/0x650 [ 15.278733] ? __virt_addr_valid+0x1db/0x2d0 [ 15.278758] ? kasan_atomics_helper+0x3df/0x5450 [ 15.278782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.278807] ? kasan_atomics_helper+0x3df/0x5450 [ 15.278830] kasan_report+0x141/0x180 [ 15.278853] ? kasan_atomics_helper+0x3df/0x5450 [ 15.278879] kasan_check_range+0x10c/0x1c0 [ 15.278904] __kasan_check_read+0x15/0x20 [ 15.278924] kasan_atomics_helper+0x3df/0x5450 [ 15.278964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.278988] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.279015] ? kasan_atomics+0x152/0x310 [ 15.279041] kasan_atomics+0x1dc/0x310 [ 15.279065] ? __pfx_kasan_atomics+0x10/0x10 [ 15.279089] ? __pfx_read_tsc+0x10/0x10 [ 15.279112] ? ktime_get_ts64+0x86/0x230 [ 15.279137] kunit_try_run_case+0x1a5/0x480 [ 15.279163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.279187] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.279213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.279237] ? __kthread_parkme+0x82/0x180 [ 15.279259] ? preempt_count_sub+0x50/0x80 [ 15.279284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.279309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.279334] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.279360] kthread+0x337/0x6f0 [ 15.279380] ? trace_preempt_on+0x20/0xc0 [ 15.279405] ? __pfx_kthread+0x10/0x10 [ 15.279427] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.279450] ? calculate_sigpending+0x7b/0xa0 [ 15.279475] ? __pfx_kthread+0x10/0x10 [ 15.279497] ret_from_fork+0x116/0x1d0 [ 15.279795] ? __pfx_kthread+0x10/0x10 [ 15.279829] ret_from_fork_asm+0x1a/0x30 [ 15.279863] </TASK> [ 15.279877] [ 15.288871] Allocated by task 282: [ 15.289081] kasan_save_stack+0x45/0x70 [ 15.289297] kasan_save_track+0x18/0x40 [ 15.289438] kasan_save_alloc_info+0x3b/0x50 [ 15.289588] __kasan_kmalloc+0xb7/0xc0 [ 15.289734] __kmalloc_cache_noprof+0x189/0x420 [ 15.289966] kasan_atomics+0x95/0x310 [ 15.290160] kunit_try_run_case+0x1a5/0x480 [ 15.290395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.290646] kthread+0x337/0x6f0 [ 15.290817] ret_from_fork+0x116/0x1d0 [ 15.291018] ret_from_fork_asm+0x1a/0x30 [ 15.291163] [ 15.291235] The buggy address belongs to the object at ffff888102ac2380 [ 15.291235] which belongs to the cache kmalloc-64 of size 64 [ 15.291719] The buggy address is located 0 bytes to the right of [ 15.291719] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.292301] [ 15.292402] The buggy address belongs to the physical page: [ 15.292623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.292923] flags: 0x200000000000000(node=0|zone=2) [ 15.293161] page_type: f5(slab) [ 15.293332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.293629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.293948] page dumped because: kasan: bad access detected [ 15.294168] [ 15.294247] Memory state around the buggy address: [ 15.294452] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.294739] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.295057] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.295367] ^ [ 15.295588] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.295850] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.296150] ================================================================== [ 15.231782] ================================================================== [ 15.232493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.232771] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.233207] [ 15.233326] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.233370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.233381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.233402] Call Trace: [ 15.233414] <TASK> [ 15.233430] dump_stack_lvl+0x73/0xb0 [ 15.233462] print_report+0xd1/0x650 [ 15.233483] ? __virt_addr_valid+0x1db/0x2d0 [ 15.233506] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.233528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.233551] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.233573] kasan_report+0x141/0x180 [ 15.233594] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.233620] __asan_report_load4_noabort+0x18/0x20 [ 15.233645] kasan_atomics_helper+0x4b88/0x5450 [ 15.233667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.233689] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.233715] ? kasan_atomics+0x152/0x310 [ 15.233740] kasan_atomics+0x1dc/0x310 [ 15.233763] ? __pfx_kasan_atomics+0x10/0x10 [ 15.233787] ? __pfx_read_tsc+0x10/0x10 [ 15.233808] ? ktime_get_ts64+0x86/0x230 [ 15.233833] kunit_try_run_case+0x1a5/0x480 [ 15.233856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.233880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.233904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.233927] ? __kthread_parkme+0x82/0x180 [ 15.234005] ? preempt_count_sub+0x50/0x80 [ 15.234032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.234057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.234082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.234107] kthread+0x337/0x6f0 [ 15.234126] ? trace_preempt_on+0x20/0xc0 [ 15.234150] ? __pfx_kthread+0x10/0x10 [ 15.234171] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.234193] ? calculate_sigpending+0x7b/0xa0 [ 15.234217] ? __pfx_kthread+0x10/0x10 [ 15.234238] ret_from_fork+0x116/0x1d0 [ 15.234256] ? __pfx_kthread+0x10/0x10 [ 15.234286] ret_from_fork_asm+0x1a/0x30 [ 15.234318] </TASK> [ 15.234327] [ 15.242284] Allocated by task 282: [ 15.242433] kasan_save_stack+0x45/0x70 [ 15.242581] kasan_save_track+0x18/0x40 [ 15.242718] kasan_save_alloc_info+0x3b/0x50 [ 15.242863] __kasan_kmalloc+0xb7/0xc0 [ 15.243278] __kmalloc_cache_noprof+0x189/0x420 [ 15.243617] kasan_atomics+0x95/0x310 [ 15.243805] kunit_try_run_case+0x1a5/0x480 [ 15.244022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.244750] kthread+0x337/0x6f0 [ 15.245158] ret_from_fork+0x116/0x1d0 [ 15.245370] ret_from_fork_asm+0x1a/0x30 [ 15.245567] [ 15.245643] The buggy address belongs to the object at ffff888102ac2380 [ 15.245643] which belongs to the cache kmalloc-64 of size 64 [ 15.246387] The buggy address is located 0 bytes to the right of [ 15.246387] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.246877] [ 15.247035] The buggy address belongs to the physical page: [ 15.247230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.247605] flags: 0x200000000000000(node=0|zone=2) [ 15.247797] page_type: f5(slab) [ 15.248030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.248367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.248671] page dumped because: kasan: bad access detected [ 15.248881] [ 15.249203] Memory state around the buggy address: [ 15.249449] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.249726] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.250016] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.250229] ^ [ 15.250614] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.251060] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.251285] ================================================================== [ 16.486134] ================================================================== [ 16.486558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.486901] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.487310] [ 16.487431] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.487510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.487523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.487544] Call Trace: [ 16.487564] <TASK> [ 16.487583] dump_stack_lvl+0x73/0xb0 [ 16.487648] print_report+0xd1/0x650 [ 16.487673] ? __virt_addr_valid+0x1db/0x2d0 [ 16.487696] ? kasan_atomics_helper+0x224c/0x5450 [ 16.487733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.487758] ? kasan_atomics_helper+0x224c/0x5450 [ 16.487781] kasan_report+0x141/0x180 [ 16.487804] ? kasan_atomics_helper+0x224c/0x5450 [ 16.487852] kasan_check_range+0x10c/0x1c0 [ 16.487877] __kasan_check_write+0x18/0x20 [ 16.487899] kasan_atomics_helper+0x224c/0x5450 [ 16.487923] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.487969] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.488031] ? kasan_atomics+0x152/0x310 [ 16.488058] kasan_atomics+0x1dc/0x310 [ 16.488082] ? __pfx_kasan_atomics+0x10/0x10 [ 16.488107] ? __pfx_read_tsc+0x10/0x10 [ 16.488129] ? ktime_get_ts64+0x86/0x230 [ 16.488154] kunit_try_run_case+0x1a5/0x480 [ 16.488210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.488235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.488279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.488305] ? __kthread_parkme+0x82/0x180 [ 16.488357] ? preempt_count_sub+0x50/0x80 [ 16.488384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.488409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.488434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.488461] kthread+0x337/0x6f0 [ 16.488511] ? trace_preempt_on+0x20/0xc0 [ 16.488537] ? __pfx_kthread+0x10/0x10 [ 16.488559] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.488581] ? calculate_sigpending+0x7b/0xa0 [ 16.488606] ? __pfx_kthread+0x10/0x10 [ 16.488628] ret_from_fork+0x116/0x1d0 [ 16.488648] ? __pfx_kthread+0x10/0x10 [ 16.488669] ret_from_fork_asm+0x1a/0x30 [ 16.488701] </TASK> [ 16.488712] [ 16.496748] Allocated by task 282: [ 16.496915] kasan_save_stack+0x45/0x70 [ 16.497163] kasan_save_track+0x18/0x40 [ 16.497391] kasan_save_alloc_info+0x3b/0x50 [ 16.497609] __kasan_kmalloc+0xb7/0xc0 [ 16.497752] __kmalloc_cache_noprof+0x189/0x420 [ 16.498057] kasan_atomics+0x95/0x310 [ 16.498316] kunit_try_run_case+0x1a5/0x480 [ 16.498539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.498768] kthread+0x337/0x6f0 [ 16.499006] ret_from_fork+0x116/0x1d0 [ 16.499180] ret_from_fork_asm+0x1a/0x30 [ 16.499419] [ 16.499495] The buggy address belongs to the object at ffff888102ac2380 [ 16.499495] which belongs to the cache kmalloc-64 of size 64 [ 16.500280] The buggy address is located 0 bytes to the right of [ 16.500280] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.500716] [ 16.500818] The buggy address belongs to the physical page: [ 16.501111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.501491] flags: 0x200000000000000(node=0|zone=2) [ 16.501726] page_type: f5(slab) [ 16.501888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.502199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.502449] page dumped because: kasan: bad access detected [ 16.502703] [ 16.502804] Memory state around the buggy address: [ 16.503074] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.503448] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.503757] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.504094] ^ [ 16.504351] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.504678] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.505001] ================================================================== [ 16.240054] ================================================================== [ 16.240438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.240783] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.241132] [ 16.241224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.241286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.241300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.241321] Call Trace: [ 16.241340] <TASK> [ 16.241358] dump_stack_lvl+0x73/0xb0 [ 16.241388] print_report+0xd1/0x650 [ 16.241413] ? __virt_addr_valid+0x1db/0x2d0 [ 16.241438] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.241461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.241486] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.241509] kasan_report+0x141/0x180 [ 16.241532] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.241560] kasan_check_range+0x10c/0x1c0 [ 16.241585] __kasan_check_write+0x18/0x20 [ 16.241606] kasan_atomics_helper+0x1ce1/0x5450 [ 16.241630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.241654] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.241681] ? kasan_atomics+0x152/0x310 [ 16.241708] kasan_atomics+0x1dc/0x310 [ 16.241731] ? __pfx_kasan_atomics+0x10/0x10 [ 16.241757] ? __pfx_read_tsc+0x10/0x10 [ 16.241779] ? ktime_get_ts64+0x86/0x230 [ 16.241804] kunit_try_run_case+0x1a5/0x480 [ 16.241829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.241854] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.241879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.241904] ? __kthread_parkme+0x82/0x180 [ 16.241926] ? preempt_count_sub+0x50/0x80 [ 16.241962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.241986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.242012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.242039] kthread+0x337/0x6f0 [ 16.242058] ? trace_preempt_on+0x20/0xc0 [ 16.242082] ? __pfx_kthread+0x10/0x10 [ 16.242103] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.242126] ? calculate_sigpending+0x7b/0xa0 [ 16.242151] ? __pfx_kthread+0x10/0x10 [ 16.242174] ret_from_fork+0x116/0x1d0 [ 16.242192] ? __pfx_kthread+0x10/0x10 [ 16.242213] ret_from_fork_asm+0x1a/0x30 [ 16.242246] </TASK> [ 16.242275] [ 16.252705] Allocated by task 282: [ 16.253267] kasan_save_stack+0x45/0x70 [ 16.253851] kasan_save_track+0x18/0x40 [ 16.254421] kasan_save_alloc_info+0x3b/0x50 [ 16.255035] __kasan_kmalloc+0xb7/0xc0 [ 16.255416] __kmalloc_cache_noprof+0x189/0x420 [ 16.255586] kasan_atomics+0x95/0x310 [ 16.255722] kunit_try_run_case+0x1a5/0x480 [ 16.255871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.256664] kthread+0x337/0x6f0 [ 16.257206] ret_from_fork+0x116/0x1d0 [ 16.257851] ret_from_fork_asm+0x1a/0x30 [ 16.258417] [ 16.258589] The buggy address belongs to the object at ffff888102ac2380 [ 16.258589] which belongs to the cache kmalloc-64 of size 64 [ 16.259755] The buggy address is located 0 bytes to the right of [ 16.259755] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.260335] [ 16.260451] The buggy address belongs to the physical page: [ 16.260676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.261034] flags: 0x200000000000000(node=0|zone=2) [ 16.261284] page_type: f5(slab) [ 16.261452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.261736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.262623] page dumped because: kasan: bad access detected [ 16.262979] [ 16.263083] Memory state around the buggy address: [ 16.263482] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.263987] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.264402] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.264750] ^ [ 16.265156] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.265603] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.266031] ================================================================== [ 15.668356] ================================================================== [ 15.668695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.668994] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.669310] [ 15.669413] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.669469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.669482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.669503] Call Trace: [ 15.669522] <TASK> [ 15.669542] dump_stack_lvl+0x73/0xb0 [ 15.669585] print_report+0xd1/0x650 [ 15.669611] ? __virt_addr_valid+0x1db/0x2d0 [ 15.669634] ? kasan_atomics_helper+0xe78/0x5450 [ 15.669669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.669693] ? kasan_atomics_helper+0xe78/0x5450 [ 15.669716] kasan_report+0x141/0x180 [ 15.669738] ? kasan_atomics_helper+0xe78/0x5450 [ 15.669765] kasan_check_range+0x10c/0x1c0 [ 15.669789] __kasan_check_write+0x18/0x20 [ 15.669809] kasan_atomics_helper+0xe78/0x5450 [ 15.669833] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.669865] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.669894] ? kasan_atomics+0x152/0x310 [ 15.669921] kasan_atomics+0x1dc/0x310 [ 15.669961] ? __pfx_kasan_atomics+0x10/0x10 [ 15.669987] ? __pfx_read_tsc+0x10/0x10 [ 15.670009] ? ktime_get_ts64+0x86/0x230 [ 15.670035] kunit_try_run_case+0x1a5/0x480 [ 15.670059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.670083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.670109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.670134] ? __kthread_parkme+0x82/0x180 [ 15.670166] ? preempt_count_sub+0x50/0x80 [ 15.670191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.670227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.670253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.670288] kthread+0x337/0x6f0 [ 15.670308] ? trace_preempt_on+0x20/0xc0 [ 15.670333] ? __pfx_kthread+0x10/0x10 [ 15.670363] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.670386] ? calculate_sigpending+0x7b/0xa0 [ 15.670411] ? __pfx_kthread+0x10/0x10 [ 15.670446] ret_from_fork+0x116/0x1d0 [ 15.670465] ? __pfx_kthread+0x10/0x10 [ 15.670487] ret_from_fork_asm+0x1a/0x30 [ 15.670519] </TASK> [ 15.670530] [ 15.678121] Allocated by task 282: [ 15.678358] kasan_save_stack+0x45/0x70 [ 15.678555] kasan_save_track+0x18/0x40 [ 15.678747] kasan_save_alloc_info+0x3b/0x50 [ 15.678977] __kasan_kmalloc+0xb7/0xc0 [ 15.679111] __kmalloc_cache_noprof+0x189/0x420 [ 15.679290] kasan_atomics+0x95/0x310 [ 15.679480] kunit_try_run_case+0x1a5/0x480 [ 15.679704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.679985] kthread+0x337/0x6f0 [ 15.680111] ret_from_fork+0x116/0x1d0 [ 15.680244] ret_from_fork_asm+0x1a/0x30 [ 15.680383] [ 15.680455] The buggy address belongs to the object at ffff888102ac2380 [ 15.680455] which belongs to the cache kmalloc-64 of size 64 [ 15.681089] The buggy address is located 0 bytes to the right of [ 15.681089] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.681624] [ 15.681696] The buggy address belongs to the physical page: [ 15.681867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.682112] flags: 0x200000000000000(node=0|zone=2) [ 15.682505] page_type: f5(slab) [ 15.682676] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.683051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.683292] page dumped because: kasan: bad access detected [ 15.683583] [ 15.683690] Memory state around the buggy address: [ 15.683906] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.684130] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.684577] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.684921] ^ [ 15.685144] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.685492] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.685810] ================================================================== [ 16.293506] ================================================================== [ 16.294191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.294835] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.295490] [ 16.295605] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.295652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.295666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.295688] Call Trace: [ 16.295708] <TASK> [ 16.295727] dump_stack_lvl+0x73/0xb0 [ 16.295761] print_report+0xd1/0x650 [ 16.295911] ? __virt_addr_valid+0x1db/0x2d0 [ 16.295946] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.295971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.295995] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.296018] kasan_report+0x141/0x180 [ 16.296041] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.296068] kasan_check_range+0x10c/0x1c0 [ 16.296094] __kasan_check_write+0x18/0x20 [ 16.296114] kasan_atomics_helper+0x1e12/0x5450 [ 16.296138] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.296162] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.296188] ? kasan_atomics+0x152/0x310 [ 16.296216] kasan_atomics+0x1dc/0x310 [ 16.296239] ? __pfx_kasan_atomics+0x10/0x10 [ 16.296266] ? __pfx_read_tsc+0x10/0x10 [ 16.296288] ? ktime_get_ts64+0x86/0x230 [ 16.296314] kunit_try_run_case+0x1a5/0x480 [ 16.296339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.296363] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.296389] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.296415] ? __kthread_parkme+0x82/0x180 [ 16.296436] ? preempt_count_sub+0x50/0x80 [ 16.296461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.296487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.296513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.296540] kthread+0x337/0x6f0 [ 16.296560] ? trace_preempt_on+0x20/0xc0 [ 16.296584] ? __pfx_kthread+0x10/0x10 [ 16.296605] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.296627] ? calculate_sigpending+0x7b/0xa0 [ 16.296653] ? __pfx_kthread+0x10/0x10 [ 16.296675] ret_from_fork+0x116/0x1d0 [ 16.296694] ? __pfx_kthread+0x10/0x10 [ 16.296716] ret_from_fork_asm+0x1a/0x30 [ 16.296748] </TASK> [ 16.296760] [ 16.308497] Allocated by task 282: [ 16.308908] kasan_save_stack+0x45/0x70 [ 16.309242] kasan_save_track+0x18/0x40 [ 16.309549] kasan_save_alloc_info+0x3b/0x50 [ 16.309847] __kasan_kmalloc+0xb7/0xc0 [ 16.310125] __kmalloc_cache_noprof+0x189/0x420 [ 16.310451] kasan_atomics+0x95/0x310 [ 16.310742] kunit_try_run_case+0x1a5/0x480 [ 16.310958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.311197] kthread+0x337/0x6f0 [ 16.311600] ret_from_fork+0x116/0x1d0 [ 16.311893] ret_from_fork_asm+0x1a/0x30 [ 16.312202] [ 16.312304] The buggy address belongs to the object at ffff888102ac2380 [ 16.312304] which belongs to the cache kmalloc-64 of size 64 [ 16.313304] The buggy address is located 0 bytes to the right of [ 16.313304] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.313949] [ 16.314198] The buggy address belongs to the physical page: [ 16.314524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.314931] flags: 0x200000000000000(node=0|zone=2) [ 16.315319] page_type: f5(slab) [ 16.315624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.316077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.316594] page dumped because: kasan: bad access detected [ 16.316926] [ 16.317038] Memory state around the buggy address: [ 16.317264] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.317770] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.318185] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.318733] ^ [ 16.319058] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.319485] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.319848] ================================================================== [ 15.809341] ================================================================== [ 15.809724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.810108] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.810629] [ 15.810760] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.810808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.810822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.810844] Call Trace: [ 15.810865] <TASK> [ 15.810885] dump_stack_lvl+0x73/0xb0 [ 15.810920] print_report+0xd1/0x650 [ 15.810955] ? __virt_addr_valid+0x1db/0x2d0 [ 15.810980] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.811004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.811028] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.811094] kasan_report+0x141/0x180 [ 15.811120] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.811147] __asan_report_load4_noabort+0x18/0x20 [ 15.811223] kasan_atomics_helper+0x4a02/0x5450 [ 15.811248] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.811285] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.811311] ? kasan_atomics+0x152/0x310 [ 15.811339] kasan_atomics+0x1dc/0x310 [ 15.811431] ? __pfx_kasan_atomics+0x10/0x10 [ 15.811481] ? __pfx_read_tsc+0x10/0x10 [ 15.811505] ? ktime_get_ts64+0x86/0x230 [ 15.811530] kunit_try_run_case+0x1a5/0x480 [ 15.811556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.811580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.811606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.811631] ? __kthread_parkme+0x82/0x180 [ 15.811653] ? preempt_count_sub+0x50/0x80 [ 15.811678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.811703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.811729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.811756] kthread+0x337/0x6f0 [ 15.811775] ? trace_preempt_on+0x20/0xc0 [ 15.811800] ? __pfx_kthread+0x10/0x10 [ 15.811821] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.811844] ? calculate_sigpending+0x7b/0xa0 [ 15.811869] ? __pfx_kthread+0x10/0x10 [ 15.811892] ret_from_fork+0x116/0x1d0 [ 15.811912] ? __pfx_kthread+0x10/0x10 [ 15.811945] ret_from_fork_asm+0x1a/0x30 [ 15.811978] </TASK> [ 15.811990] [ 15.820396] Allocated by task 282: [ 15.820583] kasan_save_stack+0x45/0x70 [ 15.820892] kasan_save_track+0x18/0x40 [ 15.821168] kasan_save_alloc_info+0x3b/0x50 [ 15.821319] __kasan_kmalloc+0xb7/0xc0 [ 15.821447] __kmalloc_cache_noprof+0x189/0x420 [ 15.821792] kasan_atomics+0x95/0x310 [ 15.822205] kunit_try_run_case+0x1a5/0x480 [ 15.822458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822743] kthread+0x337/0x6f0 [ 15.822901] ret_from_fork+0x116/0x1d0 [ 15.823089] ret_from_fork_asm+0x1a/0x30 [ 15.823288] [ 15.823361] The buggy address belongs to the object at ffff888102ac2380 [ 15.823361] which belongs to the cache kmalloc-64 of size 64 [ 15.823760] The buggy address is located 0 bytes to the right of [ 15.823760] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.824543] [ 15.824645] The buggy address belongs to the physical page: [ 15.824829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.825103] flags: 0x200000000000000(node=0|zone=2) [ 15.825593] page_type: f5(slab) [ 15.825775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.826189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.826607] page dumped because: kasan: bad access detected [ 15.826943] [ 15.827028] Memory state around the buggy address: [ 15.827319] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.827611] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.827913] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.828181] ^ [ 15.828468] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.828712] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.829038] ================================================================== [ 16.077890] ================================================================== [ 16.078611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.079292] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.079887] [ 16.080080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.080127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.080140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.080162] Call Trace: [ 16.080184] <TASK> [ 16.080206] dump_stack_lvl+0x73/0xb0 [ 16.080239] print_report+0xd1/0x650 [ 16.080288] ? __virt_addr_valid+0x1db/0x2d0 [ 16.080313] ? kasan_atomics_helper+0x177f/0x5450 [ 16.080336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.080362] ? kasan_atomics_helper+0x177f/0x5450 [ 16.080385] kasan_report+0x141/0x180 [ 16.080408] ? kasan_atomics_helper+0x177f/0x5450 [ 16.080435] kasan_check_range+0x10c/0x1c0 [ 16.080460] __kasan_check_write+0x18/0x20 [ 16.080480] kasan_atomics_helper+0x177f/0x5450 [ 16.080504] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.080527] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.080554] ? kasan_atomics+0x152/0x310 [ 16.080581] kasan_atomics+0x1dc/0x310 [ 16.080604] ? __pfx_kasan_atomics+0x10/0x10 [ 16.080629] ? __pfx_read_tsc+0x10/0x10 [ 16.080651] ? ktime_get_ts64+0x86/0x230 [ 16.080676] kunit_try_run_case+0x1a5/0x480 [ 16.080702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.080725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.080752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.080777] ? __kthread_parkme+0x82/0x180 [ 16.080799] ? preempt_count_sub+0x50/0x80 [ 16.080824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.080850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.080875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.080903] kthread+0x337/0x6f0 [ 16.080923] ? trace_preempt_on+0x20/0xc0 [ 16.080961] ? __pfx_kthread+0x10/0x10 [ 16.080983] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.081007] ? calculate_sigpending+0x7b/0xa0 [ 16.081034] ? __pfx_kthread+0x10/0x10 [ 16.081059] ret_from_fork+0x116/0x1d0 [ 16.081080] ? __pfx_kthread+0x10/0x10 [ 16.081102] ret_from_fork_asm+0x1a/0x30 [ 16.081134] </TASK> [ 16.081146] [ 16.093431] Allocated by task 282: [ 16.093764] kasan_save_stack+0x45/0x70 [ 16.094131] kasan_save_track+0x18/0x40 [ 16.094498] kasan_save_alloc_info+0x3b/0x50 [ 16.094885] __kasan_kmalloc+0xb7/0xc0 [ 16.095244] __kmalloc_cache_noprof+0x189/0x420 [ 16.095673] kasan_atomics+0x95/0x310 [ 16.096025] kunit_try_run_case+0x1a5/0x480 [ 16.096432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.096902] kthread+0x337/0x6f0 [ 16.097207] ret_from_fork+0x116/0x1d0 [ 16.097579] ret_from_fork_asm+0x1a/0x30 [ 16.097933] [ 16.098100] The buggy address belongs to the object at ffff888102ac2380 [ 16.098100] which belongs to the cache kmalloc-64 of size 64 [ 16.098645] The buggy address is located 0 bytes to the right of [ 16.098645] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.099027] [ 16.099129] The buggy address belongs to the physical page: [ 16.099375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.099670] flags: 0x200000000000000(node=0|zone=2) [ 16.099897] page_type: f5(slab) [ 16.100073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.100393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.100628] page dumped because: kasan: bad access detected [ 16.100882] [ 16.100987] Memory state around the buggy address: [ 16.101168] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.101477] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.101764] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.102068] ^ [ 16.102241] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102518] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102810] ================================================================== [ 15.253077] ================================================================== [ 15.253467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.253707] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.254079] [ 15.254204] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.254248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.254273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.254295] Call Trace: [ 15.254315] <TASK> [ 15.254334] dump_stack_lvl+0x73/0xb0 [ 15.254367] print_report+0xd1/0x650 [ 15.254391] ? __virt_addr_valid+0x1db/0x2d0 [ 15.254415] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.254438] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.254462] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.254486] kasan_report+0x141/0x180 [ 15.254508] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.254535] __asan_report_store4_noabort+0x1b/0x30 [ 15.254562] kasan_atomics_helper+0x4b6e/0x5450 [ 15.254586] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.254610] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.254636] ? kasan_atomics+0x152/0x310 [ 15.254664] kasan_atomics+0x1dc/0x310 [ 15.254687] ? __pfx_kasan_atomics+0x10/0x10 [ 15.254719] ? __pfx_read_tsc+0x10/0x10 [ 15.254741] ? ktime_get_ts64+0x86/0x230 [ 15.254766] kunit_try_run_case+0x1a5/0x480 [ 15.254791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.254815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.254841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.254867] ? __kthread_parkme+0x82/0x180 [ 15.254890] ? preempt_count_sub+0x50/0x80 [ 15.254915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.254998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.255027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.255054] kthread+0x337/0x6f0 [ 15.255074] ? trace_preempt_on+0x20/0xc0 [ 15.255099] ? __pfx_kthread+0x10/0x10 [ 15.255120] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.255144] ? calculate_sigpending+0x7b/0xa0 [ 15.255169] ? __pfx_kthread+0x10/0x10 [ 15.255192] ret_from_fork+0x116/0x1d0 [ 15.255212] ? __pfx_kthread+0x10/0x10 [ 15.255235] ret_from_fork_asm+0x1a/0x30 [ 15.255267] </TASK> [ 15.255280] [ 15.263535] Allocated by task 282: [ 15.263821] kasan_save_stack+0x45/0x70 [ 15.264236] kasan_save_track+0x18/0x40 [ 15.264462] kasan_save_alloc_info+0x3b/0x50 [ 15.264676] __kasan_kmalloc+0xb7/0xc0 [ 15.264848] __kmalloc_cache_noprof+0x189/0x420 [ 15.265017] kasan_atomics+0x95/0x310 [ 15.265151] kunit_try_run_case+0x1a5/0x480 [ 15.265454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.265753] kthread+0x337/0x6f0 [ 15.265925] ret_from_fork+0x116/0x1d0 [ 15.266158] ret_from_fork_asm+0x1a/0x30 [ 15.266327] [ 15.266398] The buggy address belongs to the object at ffff888102ac2380 [ 15.266398] which belongs to the cache kmalloc-64 of size 64 [ 15.266893] The buggy address is located 0 bytes to the right of [ 15.266893] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.267558] [ 15.267660] The buggy address belongs to the physical page: [ 15.267840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.268353] flags: 0x200000000000000(node=0|zone=2) [ 15.268565] page_type: f5(slab) [ 15.268781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.269146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.269457] page dumped because: kasan: bad access detected [ 15.269629] [ 15.269722] Memory state around the buggy address: [ 15.269955] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.270273] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.270551] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.270776] ^ [ 15.270942] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.271267] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.271589] ================================================================== [ 16.505799] ================================================================== [ 16.506177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.506549] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.506882] [ 16.507014] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.507082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.507096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.507151] Call Trace: [ 16.507171] <TASK> [ 16.507191] dump_stack_lvl+0x73/0xb0 [ 16.507225] print_report+0xd1/0x650 [ 16.507279] ? __virt_addr_valid+0x1db/0x2d0 [ 16.507320] ? kasan_atomics_helper+0x5115/0x5450 [ 16.507344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.507368] ? kasan_atomics_helper+0x5115/0x5450 [ 16.507391] kasan_report+0x141/0x180 [ 16.507449] ? kasan_atomics_helper+0x5115/0x5450 [ 16.507477] __asan_report_load8_noabort+0x18/0x20 [ 16.507503] kasan_atomics_helper+0x5115/0x5450 [ 16.507527] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.507550] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.507602] ? kasan_atomics+0x152/0x310 [ 16.507629] kasan_atomics+0x1dc/0x310 [ 16.507653] ? __pfx_kasan_atomics+0x10/0x10 [ 16.507678] ? __pfx_read_tsc+0x10/0x10 [ 16.507700] ? ktime_get_ts64+0x86/0x230 [ 16.507725] kunit_try_run_case+0x1a5/0x480 [ 16.507751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.507775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.507801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.507826] ? __kthread_parkme+0x82/0x180 [ 16.507848] ? preempt_count_sub+0x50/0x80 [ 16.507873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.507899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.507924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.508004] kthread+0x337/0x6f0 [ 16.508026] ? trace_preempt_on+0x20/0xc0 [ 16.508051] ? __pfx_kthread+0x10/0x10 [ 16.508073] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.508096] ? calculate_sigpending+0x7b/0xa0 [ 16.508122] ? __pfx_kthread+0x10/0x10 [ 16.508143] ret_from_fork+0x116/0x1d0 [ 16.508163] ? __pfx_kthread+0x10/0x10 [ 16.508184] ret_from_fork_asm+0x1a/0x30 [ 16.508216] </TASK> [ 16.508227] [ 16.516075] Allocated by task 282: [ 16.516327] kasan_save_stack+0x45/0x70 [ 16.516538] kasan_save_track+0x18/0x40 [ 16.516726] kasan_save_alloc_info+0x3b/0x50 [ 16.516971] __kasan_kmalloc+0xb7/0xc0 [ 16.517173] __kmalloc_cache_noprof+0x189/0x420 [ 16.517432] kasan_atomics+0x95/0x310 [ 16.517675] kunit_try_run_case+0x1a5/0x480 [ 16.517861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.518152] kthread+0x337/0x6f0 [ 16.518324] ret_from_fork+0x116/0x1d0 [ 16.518520] ret_from_fork_asm+0x1a/0x30 [ 16.518728] [ 16.518856] The buggy address belongs to the object at ffff888102ac2380 [ 16.518856] which belongs to the cache kmalloc-64 of size 64 [ 16.519415] The buggy address is located 0 bytes to the right of [ 16.519415] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.519970] [ 16.520061] The buggy address belongs to the physical page: [ 16.520394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.520654] flags: 0x200000000000000(node=0|zone=2) [ 16.520818] page_type: f5(slab) [ 16.520951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.521297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.521638] page dumped because: kasan: bad access detected [ 16.521894] [ 16.522062] Memory state around the buggy address: [ 16.522305] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.522523] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.522745] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.522966] ^ [ 16.523228] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.523648] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.524066] ================================================================== [ 15.612954] ================================================================== [ 15.614042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.614732] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.615415] [ 15.615617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.615663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.615675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.615696] Call Trace: [ 15.615727] <TASK> [ 15.615748] dump_stack_lvl+0x73/0xb0 [ 15.615791] print_report+0xd1/0x650 [ 15.615816] ? __virt_addr_valid+0x1db/0x2d0 [ 15.615839] ? kasan_atomics_helper+0xd47/0x5450 [ 15.615862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.615886] ? kasan_atomics_helper+0xd47/0x5450 [ 15.615909] kasan_report+0x141/0x180 [ 15.615931] ? kasan_atomics_helper+0xd47/0x5450 [ 15.615970] kasan_check_range+0x10c/0x1c0 [ 15.615995] __kasan_check_write+0x18/0x20 [ 15.616017] kasan_atomics_helper+0xd47/0x5450 [ 15.616041] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.616065] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.616091] ? kasan_atomics+0x152/0x310 [ 15.616119] kasan_atomics+0x1dc/0x310 [ 15.616142] ? __pfx_kasan_atomics+0x10/0x10 [ 15.616167] ? __pfx_read_tsc+0x10/0x10 [ 15.616190] ? ktime_get_ts64+0x86/0x230 [ 15.616215] kunit_try_run_case+0x1a5/0x480 [ 15.616241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.616286] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.616314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.616338] ? __kthread_parkme+0x82/0x180 [ 15.616361] ? preempt_count_sub+0x50/0x80 [ 15.616387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.616412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.616438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.616465] kthread+0x337/0x6f0 [ 15.616484] ? trace_preempt_on+0x20/0xc0 [ 15.616510] ? __pfx_kthread+0x10/0x10 [ 15.616531] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.616553] ? calculate_sigpending+0x7b/0xa0 [ 15.616580] ? __pfx_kthread+0x10/0x10 [ 15.616602] ret_from_fork+0x116/0x1d0 [ 15.616622] ? __pfx_kthread+0x10/0x10 [ 15.616643] ret_from_fork_asm+0x1a/0x30 [ 15.616675] </TASK> [ 15.616687] [ 15.629503] Allocated by task 282: [ 15.629862] kasan_save_stack+0x45/0x70 [ 15.630242] kasan_save_track+0x18/0x40 [ 15.630621] kasan_save_alloc_info+0x3b/0x50 [ 15.630782] __kasan_kmalloc+0xb7/0xc0 [ 15.630915] __kmalloc_cache_noprof+0x189/0x420 [ 15.631081] kasan_atomics+0x95/0x310 [ 15.631214] kunit_try_run_case+0x1a5/0x480 [ 15.631606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.632095] kthread+0x337/0x6f0 [ 15.632435] ret_from_fork+0x116/0x1d0 [ 15.632788] ret_from_fork_asm+0x1a/0x30 [ 15.633171] [ 15.633352] The buggy address belongs to the object at ffff888102ac2380 [ 15.633352] which belongs to the cache kmalloc-64 of size 64 [ 15.634431] The buggy address is located 0 bytes to the right of [ 15.634431] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.635198] [ 15.635352] The buggy address belongs to the physical page: [ 15.635837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.636413] flags: 0x200000000000000(node=0|zone=2) [ 15.636577] page_type: f5(slab) [ 15.636698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.636927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.637628] page dumped because: kasan: bad access detected [ 15.638119] [ 15.638295] Memory state around the buggy address: [ 15.638745] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.639374] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.639992] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.640563] ^ [ 15.640717] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640929] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.641154] ================================================================== [ 16.320787] ================================================================== [ 16.321061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.321301] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.321524] [ 16.321617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.321662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.321676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.321697] Call Trace: [ 16.321717] <TASK> [ 16.321737] dump_stack_lvl+0x73/0xb0 [ 16.321768] print_report+0xd1/0x650 [ 16.321792] ? __virt_addr_valid+0x1db/0x2d0 [ 16.321815] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.321837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.321859] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.321881] kasan_report+0x141/0x180 [ 16.321903] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.321929] kasan_check_range+0x10c/0x1c0 [ 16.321964] __kasan_check_write+0x18/0x20 [ 16.321983] kasan_atomics_helper+0x1eaa/0x5450 [ 16.322006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.322028] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.322054] ? kasan_atomics+0x152/0x310 [ 16.322081] kasan_atomics+0x1dc/0x310 [ 16.322103] ? __pfx_kasan_atomics+0x10/0x10 [ 16.322128] ? __pfx_read_tsc+0x10/0x10 [ 16.322149] ? ktime_get_ts64+0x86/0x230 [ 16.322173] kunit_try_run_case+0x1a5/0x480 [ 16.322198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.322221] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.322247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.322271] ? __kthread_parkme+0x82/0x180 [ 16.322292] ? preempt_count_sub+0x50/0x80 [ 16.322316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.322341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.322365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.322389] kthread+0x337/0x6f0 [ 16.322408] ? trace_preempt_on+0x20/0xc0 [ 16.322433] ? __pfx_kthread+0x10/0x10 [ 16.322454] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.322476] ? calculate_sigpending+0x7b/0xa0 [ 16.322500] ? __pfx_kthread+0x10/0x10 [ 16.322521] ret_from_fork+0x116/0x1d0 [ 16.322540] ? __pfx_kthread+0x10/0x10 [ 16.322561] ret_from_fork_asm+0x1a/0x30 [ 16.322593] </TASK> [ 16.322604] [ 16.331841] Allocated by task 282: [ 16.332004] kasan_save_stack+0x45/0x70 [ 16.332351] kasan_save_track+0x18/0x40 [ 16.332537] kasan_save_alloc_info+0x3b/0x50 [ 16.332888] __kasan_kmalloc+0xb7/0xc0 [ 16.333128] __kmalloc_cache_noprof+0x189/0x420 [ 16.333289] kasan_atomics+0x95/0x310 [ 16.333602] kunit_try_run_case+0x1a5/0x480 [ 16.333761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.333958] kthread+0x337/0x6f0 [ 16.334381] ret_from_fork+0x116/0x1d0 [ 16.334584] ret_from_fork_asm+0x1a/0x30 [ 16.334855] [ 16.334962] The buggy address belongs to the object at ffff888102ac2380 [ 16.334962] which belongs to the cache kmalloc-64 of size 64 [ 16.335668] The buggy address is located 0 bytes to the right of [ 16.335668] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.336850] [ 16.336947] The buggy address belongs to the physical page: [ 16.337129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.337748] flags: 0x200000000000000(node=0|zone=2) [ 16.338186] page_type: f5(slab) [ 16.339090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.339349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.339579] page dumped because: kasan: bad access detected [ 16.339752] [ 16.339824] Memory state around the buggy address: [ 16.340062] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.340736] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.341360] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.341577] ^ [ 16.341733] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341959] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.342233] ================================================================== [ 15.886517] ================================================================== [ 15.887070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.887438] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.887778] [ 15.887891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.887956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.887969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.887991] Call Trace: [ 15.888009] <TASK> [ 15.888028] dump_stack_lvl+0x73/0xb0 [ 15.888058] print_report+0xd1/0x650 [ 15.888082] ? __virt_addr_valid+0x1db/0x2d0 [ 15.888106] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.888129] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.888153] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.888187] kasan_report+0x141/0x180 [ 15.888209] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.888248] __asan_report_load4_noabort+0x18/0x20 [ 15.888275] kasan_atomics_helper+0x49ce/0x5450 [ 15.888300] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.888335] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.888361] ? kasan_atomics+0x152/0x310 [ 15.888388] kasan_atomics+0x1dc/0x310 [ 15.888423] ? __pfx_kasan_atomics+0x10/0x10 [ 15.888448] ? __pfx_read_tsc+0x10/0x10 [ 15.888483] ? ktime_get_ts64+0x86/0x230 [ 15.888518] kunit_try_run_case+0x1a5/0x480 [ 15.888543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.888577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.888603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.888628] ? __kthread_parkme+0x82/0x180 [ 15.888650] ? preempt_count_sub+0x50/0x80 [ 15.888674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.888708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.888735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.888771] kthread+0x337/0x6f0 [ 15.888790] ? trace_preempt_on+0x20/0xc0 [ 15.888816] ? __pfx_kthread+0x10/0x10 [ 15.888837] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.888860] ? calculate_sigpending+0x7b/0xa0 [ 15.888884] ? __pfx_kthread+0x10/0x10 [ 15.888907] ret_from_fork+0x116/0x1d0 [ 15.888926] ? __pfx_kthread+0x10/0x10 [ 15.888957] ret_from_fork_asm+0x1a/0x30 [ 15.888988] </TASK> [ 15.888999] [ 15.896618] Allocated by task 282: [ 15.896792] kasan_save_stack+0x45/0x70 [ 15.897007] kasan_save_track+0x18/0x40 [ 15.897212] kasan_save_alloc_info+0x3b/0x50 [ 15.897460] __kasan_kmalloc+0xb7/0xc0 [ 15.897655] __kmalloc_cache_noprof+0x189/0x420 [ 15.897886] kasan_atomics+0x95/0x310 [ 15.898105] kunit_try_run_case+0x1a5/0x480 [ 15.898249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.898574] kthread+0x337/0x6f0 [ 15.898767] ret_from_fork+0x116/0x1d0 [ 15.898979] ret_from_fork_asm+0x1a/0x30 [ 15.899240] [ 15.899410] The buggy address belongs to the object at ffff888102ac2380 [ 15.899410] which belongs to the cache kmalloc-64 of size 64 [ 15.899918] The buggy address is located 0 bytes to the right of [ 15.899918] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.900502] [ 15.900575] The buggy address belongs to the physical page: [ 15.900740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.900994] flags: 0x200000000000000(node=0|zone=2) [ 15.901223] page_type: f5(slab) [ 15.901385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.901737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.902084] page dumped because: kasan: bad access detected [ 15.902280] [ 15.902376] Memory state around the buggy address: [ 15.902639] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.902876] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.903092] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.903457] ^ [ 15.903735] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.904161] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.904779] ================================================================== [ 15.415283] ================================================================== [ 15.415531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.415797] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.416127] [ 15.416218] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.416291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.416304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.416326] Call Trace: [ 15.416345] <TASK> [ 15.416366] dump_stack_lvl+0x73/0xb0 [ 15.416398] print_report+0xd1/0x650 [ 15.416422] ? __virt_addr_valid+0x1db/0x2d0 [ 15.416447] ? kasan_atomics_helper+0x72f/0x5450 [ 15.416469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.416493] ? kasan_atomics_helper+0x72f/0x5450 [ 15.416516] kasan_report+0x141/0x180 [ 15.416539] ? kasan_atomics_helper+0x72f/0x5450 [ 15.416566] kasan_check_range+0x10c/0x1c0 [ 15.416590] __kasan_check_write+0x18/0x20 [ 15.416611] kasan_atomics_helper+0x72f/0x5450 [ 15.416635] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.416660] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.416687] ? kasan_atomics+0x152/0x310 [ 15.416714] kasan_atomics+0x1dc/0x310 [ 15.416737] ? __pfx_kasan_atomics+0x10/0x10 [ 15.416763] ? __pfx_read_tsc+0x10/0x10 [ 15.416785] ? ktime_get_ts64+0x86/0x230 [ 15.416810] kunit_try_run_case+0x1a5/0x480 [ 15.416836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.416860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.416886] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.416911] ? __kthread_parkme+0x82/0x180 [ 15.416944] ? preempt_count_sub+0x50/0x80 [ 15.416970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.416996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.417021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.417049] kthread+0x337/0x6f0 [ 15.417068] ? trace_preempt_on+0x20/0xc0 [ 15.417092] ? __pfx_kthread+0x10/0x10 [ 15.417114] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.417137] ? calculate_sigpending+0x7b/0xa0 [ 15.417162] ? __pfx_kthread+0x10/0x10 [ 15.417184] ret_from_fork+0x116/0x1d0 [ 15.417204] ? __pfx_kthread+0x10/0x10 [ 15.417225] ret_from_fork_asm+0x1a/0x30 [ 15.417257] </TASK> [ 15.417269] [ 15.424894] Allocated by task 282: [ 15.425076] kasan_save_stack+0x45/0x70 [ 15.425223] kasan_save_track+0x18/0x40 [ 15.425358] kasan_save_alloc_info+0x3b/0x50 [ 15.425592] __kasan_kmalloc+0xb7/0xc0 [ 15.425780] __kmalloc_cache_noprof+0x189/0x420 [ 15.426009] kasan_atomics+0x95/0x310 [ 15.426196] kunit_try_run_case+0x1a5/0x480 [ 15.426396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.426571] kthread+0x337/0x6f0 [ 15.426719] ret_from_fork+0x116/0x1d0 [ 15.426906] ret_from_fork_asm+0x1a/0x30 [ 15.427112] [ 15.427206] The buggy address belongs to the object at ffff888102ac2380 [ 15.427206] which belongs to the cache kmalloc-64 of size 64 [ 15.427725] The buggy address is located 0 bytes to the right of [ 15.427725] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.428100] [ 15.428172] The buggy address belongs to the physical page: [ 15.428587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.428946] flags: 0x200000000000000(node=0|zone=2) [ 15.429176] page_type: f5(slab) [ 15.429315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.429545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.429769] page dumped because: kasan: bad access detected [ 15.429950] [ 15.430074] Memory state around the buggy address: [ 15.430324] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.430645] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.430981] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.431305] ^ [ 15.431535] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.431889] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.432174] ================================================================== [ 15.905537] ================================================================== [ 15.905968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.906507] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.906831] [ 15.906923] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.906976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.906990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.907011] Call Trace: [ 15.907028] <TASK> [ 15.907047] dump_stack_lvl+0x73/0xb0 [ 15.907079] print_report+0xd1/0x650 [ 15.907102] ? __virt_addr_valid+0x1db/0x2d0 [ 15.907127] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.907171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.907207] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.907247] kasan_report+0x141/0x180 [ 15.907291] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.907318] kasan_check_range+0x10c/0x1c0 [ 15.907342] __kasan_check_read+0x15/0x20 [ 15.907363] kasan_atomics_helper+0x13b5/0x5450 [ 15.907386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.907410] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.907436] ? kasan_atomics+0x152/0x310 [ 15.907490] kasan_atomics+0x1dc/0x310 [ 15.907513] ? __pfx_kasan_atomics+0x10/0x10 [ 15.907538] ? __pfx_read_tsc+0x10/0x10 [ 15.907570] ? ktime_get_ts64+0x86/0x230 [ 15.907596] kunit_try_run_case+0x1a5/0x480 [ 15.907621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.907645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.907671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.907695] ? __kthread_parkme+0x82/0x180 [ 15.907717] ? preempt_count_sub+0x50/0x80 [ 15.907759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.907793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.907819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.907857] kthread+0x337/0x6f0 [ 15.907877] ? trace_preempt_on+0x20/0xc0 [ 15.907918] ? __pfx_kthread+0x10/0x10 [ 15.907956] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.907979] ? calculate_sigpending+0x7b/0xa0 [ 15.908015] ? __pfx_kthread+0x10/0x10 [ 15.908037] ret_from_fork+0x116/0x1d0 [ 15.908056] ? __pfx_kthread+0x10/0x10 [ 15.908105] ret_from_fork_asm+0x1a/0x30 [ 15.908152] </TASK> [ 15.908174] [ 15.916754] Allocated by task 282: [ 15.916976] kasan_save_stack+0x45/0x70 [ 15.917196] kasan_save_track+0x18/0x40 [ 15.917440] kasan_save_alloc_info+0x3b/0x50 [ 15.917678] __kasan_kmalloc+0xb7/0xc0 [ 15.917896] __kmalloc_cache_noprof+0x189/0x420 [ 15.918112] kasan_atomics+0x95/0x310 [ 15.918327] kunit_try_run_case+0x1a5/0x480 [ 15.918621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.918842] kthread+0x337/0x6f0 [ 15.919005] ret_from_fork+0x116/0x1d0 [ 15.919215] ret_from_fork_asm+0x1a/0x30 [ 15.919408] [ 15.919500] The buggy address belongs to the object at ffff888102ac2380 [ 15.919500] which belongs to the cache kmalloc-64 of size 64 [ 15.920050] The buggy address is located 0 bytes to the right of [ 15.920050] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.920647] [ 15.920749] The buggy address belongs to the physical page: [ 15.920990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.921252] flags: 0x200000000000000(node=0|zone=2) [ 15.921523] page_type: f5(slab) [ 15.921694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.921953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.922377] page dumped because: kasan: bad access detected [ 15.922638] [ 15.922712] Memory state around the buggy address: [ 15.922918] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.923297] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.923678] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.923923] ^ [ 15.924199] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.924568] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.924897] ================================================================== [ 16.361488] ================================================================== [ 16.361793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.362085] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.362400] [ 16.362517] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.362559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.362572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.362593] Call Trace: [ 16.362611] <TASK> [ 16.362629] dump_stack_lvl+0x73/0xb0 [ 16.362659] print_report+0xd1/0x650 [ 16.362682] ? __virt_addr_valid+0x1db/0x2d0 [ 16.362711] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.362733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.362756] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.362778] kasan_report+0x141/0x180 [ 16.362800] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.362827] __asan_report_load8_noabort+0x18/0x20 [ 16.362851] kasan_atomics_helper+0x4f71/0x5450 [ 16.362874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.362896] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.362921] ? kasan_atomics+0x152/0x310 [ 16.363011] kasan_atomics+0x1dc/0x310 [ 16.363036] ? __pfx_kasan_atomics+0x10/0x10 [ 16.363062] ? __pfx_read_tsc+0x10/0x10 [ 16.363086] ? ktime_get_ts64+0x86/0x230 [ 16.363112] kunit_try_run_case+0x1a5/0x480 [ 16.363138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.363190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.363216] ? __kthread_parkme+0x82/0x180 [ 16.363238] ? preempt_count_sub+0x50/0x80 [ 16.363284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.363336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.363363] kthread+0x337/0x6f0 [ 16.363383] ? trace_preempt_on+0x20/0xc0 [ 16.363407] ? __pfx_kthread+0x10/0x10 [ 16.363429] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.363452] ? calculate_sigpending+0x7b/0xa0 [ 16.363478] ? __pfx_kthread+0x10/0x10 [ 16.363500] ret_from_fork+0x116/0x1d0 [ 16.363520] ? __pfx_kthread+0x10/0x10 [ 16.363541] ret_from_fork_asm+0x1a/0x30 [ 16.363573] </TASK> [ 16.363584] [ 16.370743] Allocated by task 282: [ 16.370878] kasan_save_stack+0x45/0x70 [ 16.371094] kasan_save_track+0x18/0x40 [ 16.371318] kasan_save_alloc_info+0x3b/0x50 [ 16.371552] __kasan_kmalloc+0xb7/0xc0 [ 16.371740] __kmalloc_cache_noprof+0x189/0x420 [ 16.371948] kasan_atomics+0x95/0x310 [ 16.372153] kunit_try_run_case+0x1a5/0x480 [ 16.372325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.372502] kthread+0x337/0x6f0 [ 16.372642] ret_from_fork+0x116/0x1d0 [ 16.372829] ret_from_fork_asm+0x1a/0x30 [ 16.373053] [ 16.373147] The buggy address belongs to the object at ffff888102ac2380 [ 16.373147] which belongs to the cache kmalloc-64 of size 64 [ 16.373702] The buggy address is located 0 bytes to the right of [ 16.373702] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.374100] [ 16.374175] The buggy address belongs to the physical page: [ 16.374447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.374819] flags: 0x200000000000000(node=0|zone=2) [ 16.374992] page_type: f5(slab) [ 16.375115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.375417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.375774] page dumped because: kasan: bad access detected [ 16.376041] [ 16.376153] Memory state around the buggy address: [ 16.376403] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.376675] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.376990] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.377204] ^ [ 16.377457] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.377775] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.378104] ================================================================== [ 15.392778] ================================================================== [ 15.393410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.393763] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.394154] [ 15.394273] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.394352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.394388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.394411] Call Trace: [ 15.394430] <TASK> [ 15.394448] dump_stack_lvl+0x73/0xb0 [ 15.394480] print_report+0xd1/0x650 [ 15.394505] ? __virt_addr_valid+0x1db/0x2d0 [ 15.394530] ? kasan_atomics_helper+0x697/0x5450 [ 15.394553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.394579] ? kasan_atomics_helper+0x697/0x5450 [ 15.394633] kasan_report+0x141/0x180 [ 15.394668] ? kasan_atomics_helper+0x697/0x5450 [ 15.394714] kasan_check_range+0x10c/0x1c0 [ 15.394738] __kasan_check_write+0x18/0x20 [ 15.394759] kasan_atomics_helper+0x697/0x5450 [ 15.394784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.394808] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.394835] ? kasan_atomics+0x152/0x310 [ 15.394863] kasan_atomics+0x1dc/0x310 [ 15.394886] ? __pfx_kasan_atomics+0x10/0x10 [ 15.394912] ? __pfx_read_tsc+0x10/0x10 [ 15.394943] ? ktime_get_ts64+0x86/0x230 [ 15.394968] kunit_try_run_case+0x1a5/0x480 [ 15.394994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.395018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.395043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.395068] ? __kthread_parkme+0x82/0x180 [ 15.395090] ? preempt_count_sub+0x50/0x80 [ 15.395116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.395142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.395167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.395193] kthread+0x337/0x6f0 [ 15.395213] ? trace_preempt_on+0x20/0xc0 [ 15.395237] ? __pfx_kthread+0x10/0x10 [ 15.395278] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.395301] ? calculate_sigpending+0x7b/0xa0 [ 15.395327] ? __pfx_kthread+0x10/0x10 [ 15.395349] ret_from_fork+0x116/0x1d0 [ 15.395368] ? __pfx_kthread+0x10/0x10 [ 15.395389] ret_from_fork_asm+0x1a/0x30 [ 15.395421] </TASK> [ 15.395433] [ 15.402837] Allocated by task 282: [ 15.403363] kasan_save_stack+0x45/0x70 [ 15.403738] kasan_save_track+0x18/0x40 [ 15.403922] kasan_save_alloc_info+0x3b/0x50 [ 15.404125] __kasan_kmalloc+0xb7/0xc0 [ 15.404643] __kmalloc_cache_noprof+0x189/0x420 [ 15.405021] kasan_atomics+0x95/0x310 [ 15.405458] kunit_try_run_case+0x1a5/0x480 [ 15.405888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.406374] kthread+0x337/0x6f0 [ 15.406737] ret_from_fork+0x116/0x1d0 [ 15.406920] ret_from_fork_asm+0x1a/0x30 [ 15.407118] [ 15.407216] The buggy address belongs to the object at ffff888102ac2380 [ 15.407216] which belongs to the cache kmalloc-64 of size 64 [ 15.408461] The buggy address is located 0 bytes to the right of [ 15.408461] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.409407] [ 15.409656] The buggy address belongs to the physical page: [ 15.410131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.410756] flags: 0x200000000000000(node=0|zone=2) [ 15.411213] page_type: f5(slab) [ 15.411619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.412177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.412768] page dumped because: kasan: bad access detected [ 15.413103] [ 15.413189] Memory state around the buggy address: [ 15.413371] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.413594] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.413811] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.414044] ^ [ 15.414204] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.414459] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.414677] ================================================================== [ 15.765748] ================================================================== [ 15.766421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.766787] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.767154] [ 15.767278] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.767322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.767334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.767354] Call Trace: [ 15.767373] <TASK> [ 15.767391] dump_stack_lvl+0x73/0xb0 [ 15.767422] print_report+0xd1/0x650 [ 15.767446] ? __virt_addr_valid+0x1db/0x2d0 [ 15.767469] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.767492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.767516] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.767538] kasan_report+0x141/0x180 [ 15.767561] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.767588] __asan_report_load4_noabort+0x18/0x20 [ 15.767614] kasan_atomics_helper+0x4a1c/0x5450 [ 15.767638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.767662] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.767687] ? kasan_atomics+0x152/0x310 [ 15.767727] kasan_atomics+0x1dc/0x310 [ 15.767749] ? __pfx_kasan_atomics+0x10/0x10 [ 15.767775] ? __pfx_read_tsc+0x10/0x10 [ 15.767809] ? ktime_get_ts64+0x86/0x230 [ 15.767834] kunit_try_run_case+0x1a5/0x480 [ 15.767859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.767890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.767916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.767956] ? __kthread_parkme+0x82/0x180 [ 15.767977] ? preempt_count_sub+0x50/0x80 [ 15.768003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.768028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.768053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.768088] kthread+0x337/0x6f0 [ 15.768108] ? trace_preempt_on+0x20/0xc0 [ 15.768133] ? __pfx_kthread+0x10/0x10 [ 15.768164] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.768187] ? calculate_sigpending+0x7b/0xa0 [ 15.768212] ? __pfx_kthread+0x10/0x10 [ 15.768244] ret_from_fork+0x116/0x1d0 [ 15.768264] ? __pfx_kthread+0x10/0x10 [ 15.768285] ret_from_fork_asm+0x1a/0x30 [ 15.768338] </TASK> [ 15.768350] [ 15.775949] Allocated by task 282: [ 15.776124] kasan_save_stack+0x45/0x70 [ 15.776357] kasan_save_track+0x18/0x40 [ 15.776535] kasan_save_alloc_info+0x3b/0x50 [ 15.776752] __kasan_kmalloc+0xb7/0xc0 [ 15.776953] __kmalloc_cache_noprof+0x189/0x420 [ 15.777179] kasan_atomics+0x95/0x310 [ 15.777384] kunit_try_run_case+0x1a5/0x480 [ 15.777605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.777844] kthread+0x337/0x6f0 [ 15.778026] ret_from_fork+0x116/0x1d0 [ 15.778172] ret_from_fork_asm+0x1a/0x30 [ 15.778451] [ 15.778548] The buggy address belongs to the object at ffff888102ac2380 [ 15.778548] which belongs to the cache kmalloc-64 of size 64 [ 15.778969] The buggy address is located 0 bytes to the right of [ 15.778969] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.779315] [ 15.779386] The buggy address belongs to the physical page: [ 15.779549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.779861] flags: 0x200000000000000(node=0|zone=2) [ 15.780211] page_type: f5(slab) [ 15.780398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.780730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.781074] page dumped because: kasan: bad access detected [ 15.781364] [ 15.781435] Memory state around the buggy address: [ 15.781589] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.781802] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.782025] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.782234] ^ [ 15.782725] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.783056] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.783518] ================================================================== [ 16.267158] ================================================================== [ 16.267845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.268381] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.268950] [ 16.269192] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.269243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.269392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.269420] Call Trace: [ 16.269442] <TASK> [ 16.269464] dump_stack_lvl+0x73/0xb0 [ 16.269499] print_report+0xd1/0x650 [ 16.269524] ? __virt_addr_valid+0x1db/0x2d0 [ 16.269549] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.269573] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.269597] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.269620] kasan_report+0x141/0x180 [ 16.269643] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.269670] kasan_check_range+0x10c/0x1c0 [ 16.269695] __kasan_check_write+0x18/0x20 [ 16.269716] kasan_atomics_helper+0x1d7a/0x5450 [ 16.269740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.269764] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.269791] ? kasan_atomics+0x152/0x310 [ 16.269819] kasan_atomics+0x1dc/0x310 [ 16.269842] ? __pfx_kasan_atomics+0x10/0x10 [ 16.269868] ? __pfx_read_tsc+0x10/0x10 [ 16.269890] ? ktime_get_ts64+0x86/0x230 [ 16.269915] kunit_try_run_case+0x1a5/0x480 [ 16.270007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.270034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.270061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.270087] ? __kthread_parkme+0x82/0x180 [ 16.270109] ? preempt_count_sub+0x50/0x80 [ 16.270135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.270161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.270186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.270213] kthread+0x337/0x6f0 [ 16.270232] ? trace_preempt_on+0x20/0xc0 [ 16.270281] ? __pfx_kthread+0x10/0x10 [ 16.270304] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.270328] ? calculate_sigpending+0x7b/0xa0 [ 16.270353] ? __pfx_kthread+0x10/0x10 [ 16.270375] ret_from_fork+0x116/0x1d0 [ 16.270395] ? __pfx_kthread+0x10/0x10 [ 16.270417] ret_from_fork_asm+0x1a/0x30 [ 16.270449] </TASK> [ 16.270460] [ 16.281857] Allocated by task 282: [ 16.282162] kasan_save_stack+0x45/0x70 [ 16.282486] kasan_save_track+0x18/0x40 [ 16.282782] kasan_save_alloc_info+0x3b/0x50 [ 16.283114] __kasan_kmalloc+0xb7/0xc0 [ 16.283428] __kmalloc_cache_noprof+0x189/0x420 [ 16.283750] kasan_atomics+0x95/0x310 [ 16.284047] kunit_try_run_case+0x1a5/0x480 [ 16.284450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.284734] kthread+0x337/0x6f0 [ 16.284912] ret_from_fork+0x116/0x1d0 [ 16.285107] ret_from_fork_asm+0x1a/0x30 [ 16.285310] [ 16.285406] The buggy address belongs to the object at ffff888102ac2380 [ 16.285406] which belongs to the cache kmalloc-64 of size 64 [ 16.285877] The buggy address is located 0 bytes to the right of [ 16.285877] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.286380] [ 16.286473] The buggy address belongs to the physical page: [ 16.286726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.287678] flags: 0x200000000000000(node=0|zone=2) [ 16.288016] page_type: f5(slab) [ 16.288222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.288764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.289210] page dumped because: kasan: bad access detected [ 16.289589] [ 16.289811] Memory state around the buggy address: [ 16.290129] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.290580] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.291014] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.291428] ^ [ 16.291735] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.292167] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.292559] ================================================================== [ 16.029356] ================================================================== [ 16.029714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.030054] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.030420] [ 16.030516] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.030559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.030572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.030592] Call Trace: [ 16.030611] <TASK> [ 16.030628] dump_stack_lvl+0x73/0xb0 [ 16.030658] print_report+0xd1/0x650 [ 16.030681] ? __virt_addr_valid+0x1db/0x2d0 [ 16.030710] ? kasan_atomics_helper+0x164f/0x5450 [ 16.030732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.030756] ? kasan_atomics_helper+0x164f/0x5450 [ 16.030779] kasan_report+0x141/0x180 [ 16.030801] ? kasan_atomics_helper+0x164f/0x5450 [ 16.030828] kasan_check_range+0x10c/0x1c0 [ 16.030853] __kasan_check_write+0x18/0x20 [ 16.030873] kasan_atomics_helper+0x164f/0x5450 [ 16.030897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.030920] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.030958] ? kasan_atomics+0x152/0x310 [ 16.030985] kasan_atomics+0x1dc/0x310 [ 16.031009] ? __pfx_kasan_atomics+0x10/0x10 [ 16.031035] ? __pfx_read_tsc+0x10/0x10 [ 16.031057] ? ktime_get_ts64+0x86/0x230 [ 16.031082] kunit_try_run_case+0x1a5/0x480 [ 16.031108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.031131] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.031157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.031182] ? __kthread_parkme+0x82/0x180 [ 16.031204] ? preempt_count_sub+0x50/0x80 [ 16.031230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.031256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.031293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.031319] kthread+0x337/0x6f0 [ 16.031339] ? trace_preempt_on+0x20/0xc0 [ 16.031364] ? __pfx_kthread+0x10/0x10 [ 16.031386] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.031408] ? calculate_sigpending+0x7b/0xa0 [ 16.031434] ? __pfx_kthread+0x10/0x10 [ 16.031456] ret_from_fork+0x116/0x1d0 [ 16.031475] ? __pfx_kthread+0x10/0x10 [ 16.031497] ret_from_fork_asm+0x1a/0x30 [ 16.031527] </TASK> [ 16.031539] [ 16.038720] Allocated by task 282: [ 16.038853] kasan_save_stack+0x45/0x70 [ 16.039009] kasan_save_track+0x18/0x40 [ 16.039145] kasan_save_alloc_info+0x3b/0x50 [ 16.039427] __kasan_kmalloc+0xb7/0xc0 [ 16.039620] __kmalloc_cache_noprof+0x189/0x420 [ 16.039847] kasan_atomics+0x95/0x310 [ 16.040048] kunit_try_run_case+0x1a5/0x480 [ 16.040256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.040579] kthread+0x337/0x6f0 [ 16.040726] ret_from_fork+0x116/0x1d0 [ 16.040859] ret_from_fork_asm+0x1a/0x30 [ 16.041314] [ 16.041478] The buggy address belongs to the object at ffff888102ac2380 [ 16.041478] which belongs to the cache kmalloc-64 of size 64 [ 16.043217] The buggy address is located 0 bytes to the right of [ 16.043217] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.043608] [ 16.043687] The buggy address belongs to the physical page: [ 16.043861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.044208] flags: 0x200000000000000(node=0|zone=2) [ 16.044448] page_type: f5(slab) [ 16.044717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.045120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.045567] page dumped because: kasan: bad access detected [ 16.045823] [ 16.045915] Memory state around the buggy address: [ 16.046220] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.046689] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.047022] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.047409] ^ [ 16.047642] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.047893] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.048369] ================================================================== [ 16.431687] ================================================================== [ 16.432189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.432501] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.432825] [ 16.432968] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.433013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.433027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.433048] Call Trace: [ 16.433067] <TASK> [ 16.433087] dump_stack_lvl+0x73/0xb0 [ 16.433118] print_report+0xd1/0x650 [ 16.433142] ? __virt_addr_valid+0x1db/0x2d0 [ 16.433167] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.433192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.433216] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.433239] kasan_report+0x141/0x180 [ 16.433283] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.433310] __asan_report_load8_noabort+0x18/0x20 [ 16.433336] kasan_atomics_helper+0x4fb2/0x5450 [ 16.433361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.433386] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.433413] ? kasan_atomics+0x152/0x310 [ 16.433440] kasan_atomics+0x1dc/0x310 [ 16.433463] ? __pfx_kasan_atomics+0x10/0x10 [ 16.433488] ? __pfx_read_tsc+0x10/0x10 [ 16.433511] ? ktime_get_ts64+0x86/0x230 [ 16.433559] kunit_try_run_case+0x1a5/0x480 [ 16.433585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.433609] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.433635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.433660] ? __kthread_parkme+0x82/0x180 [ 16.433682] ? preempt_count_sub+0x50/0x80 [ 16.433728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.433753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.433779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.433805] kthread+0x337/0x6f0 [ 16.433825] ? trace_preempt_on+0x20/0xc0 [ 16.433850] ? __pfx_kthread+0x10/0x10 [ 16.433890] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.433914] ? calculate_sigpending+0x7b/0xa0 [ 16.433950] ? __pfx_kthread+0x10/0x10 [ 16.433973] ret_from_fork+0x116/0x1d0 [ 16.433992] ? __pfx_kthread+0x10/0x10 [ 16.434014] ret_from_fork_asm+0x1a/0x30 [ 16.434046] </TASK> [ 16.434058] [ 16.441151] Allocated by task 282: [ 16.441359] kasan_save_stack+0x45/0x70 [ 16.441565] kasan_save_track+0x18/0x40 [ 16.441759] kasan_save_alloc_info+0x3b/0x50 [ 16.441928] __kasan_kmalloc+0xb7/0xc0 [ 16.442072] __kmalloc_cache_noprof+0x189/0x420 [ 16.442318] kasan_atomics+0x95/0x310 [ 16.442510] kunit_try_run_case+0x1a5/0x480 [ 16.442752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.443012] kthread+0x337/0x6f0 [ 16.443172] ret_from_fork+0x116/0x1d0 [ 16.443336] ret_from_fork_asm+0x1a/0x30 [ 16.443481] [ 16.443571] The buggy address belongs to the object at ffff888102ac2380 [ 16.443571] which belongs to the cache kmalloc-64 of size 64 [ 16.444138] The buggy address is located 0 bytes to the right of [ 16.444138] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.444574] [ 16.444648] The buggy address belongs to the physical page: [ 16.444901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.445304] flags: 0x200000000000000(node=0|zone=2) [ 16.445565] page_type: f5(slab) [ 16.445721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.445987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.446274] page dumped because: kasan: bad access detected [ 16.446522] [ 16.446615] Memory state around the buggy address: [ 16.446845] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.447180] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.447432] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.447748] ^ [ 16.447946] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.448239] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.448567] ================================================================== [ 15.561347] ================================================================== [ 15.561700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.562068] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.562423] [ 15.562539] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.562584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.562596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.562619] Call Trace: [ 15.562637] <TASK> [ 15.562654] dump_stack_lvl+0x73/0xb0 [ 15.562685] print_report+0xd1/0x650 [ 15.562715] ? __virt_addr_valid+0x1db/0x2d0 [ 15.562739] ? kasan_atomics_helper+0xc70/0x5450 [ 15.562762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.562787] ? kasan_atomics_helper+0xc70/0x5450 [ 15.562810] kasan_report+0x141/0x180 [ 15.562832] ? kasan_atomics_helper+0xc70/0x5450 [ 15.562860] kasan_check_range+0x10c/0x1c0 [ 15.562884] __kasan_check_write+0x18/0x20 [ 15.562905] kasan_atomics_helper+0xc70/0x5450 [ 15.562930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.562963] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.562990] ? kasan_atomics+0x152/0x310 [ 15.563017] kasan_atomics+0x1dc/0x310 [ 15.563040] ? __pfx_kasan_atomics+0x10/0x10 [ 15.563065] ? __pfx_read_tsc+0x10/0x10 [ 15.563088] ? ktime_get_ts64+0x86/0x230 [ 15.563113] kunit_try_run_case+0x1a5/0x480 [ 15.563138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.563162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.563188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.563213] ? __kthread_parkme+0x82/0x180 [ 15.563235] ? preempt_count_sub+0x50/0x80 [ 15.563281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.563307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.563333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.563360] kthread+0x337/0x6f0 [ 15.563379] ? trace_preempt_on+0x20/0xc0 [ 15.563404] ? __pfx_kthread+0x10/0x10 [ 15.563425] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.563448] ? calculate_sigpending+0x7b/0xa0 [ 15.563474] ? __pfx_kthread+0x10/0x10 [ 15.563495] ret_from_fork+0x116/0x1d0 [ 15.563514] ? __pfx_kthread+0x10/0x10 [ 15.563535] ret_from_fork_asm+0x1a/0x30 [ 15.563567] </TASK> [ 15.563579] [ 15.571579] Allocated by task 282: [ 15.571761] kasan_save_stack+0x45/0x70 [ 15.572923] kasan_save_track+0x18/0x40 [ 15.573219] kasan_save_alloc_info+0x3b/0x50 [ 15.573384] __kasan_kmalloc+0xb7/0xc0 [ 15.573523] __kmalloc_cache_noprof+0x189/0x420 [ 15.573678] kasan_atomics+0x95/0x310 [ 15.573813] kunit_try_run_case+0x1a5/0x480 [ 15.573973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.574149] kthread+0x337/0x6f0 [ 15.574268] ret_from_fork+0x116/0x1d0 [ 15.574555] ret_from_fork_asm+0x1a/0x30 [ 15.574701] [ 15.574780] The buggy address belongs to the object at ffff888102ac2380 [ 15.574780] which belongs to the cache kmalloc-64 of size 64 [ 15.575724] The buggy address is located 0 bytes to the right of [ 15.575724] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.576896] [ 15.577118] The buggy address belongs to the physical page: [ 15.577456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.577696] flags: 0x200000000000000(node=0|zone=2) [ 15.577866] page_type: f5(slab) [ 15.578000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.578224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.579044] page dumped because: kasan: bad access detected [ 15.579579] [ 15.579740] Memory state around the buggy address: [ 15.580205] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.580854] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.581504] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.582140] ^ [ 15.582593] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.583221] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.583692] ================================================================== [ 15.173512] ================================================================== [ 15.174798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.176152] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.177135] [ 15.177633] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.177781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.177800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.177824] Call Trace: [ 15.177838] <TASK> [ 15.177859] dump_stack_lvl+0x73/0xb0 [ 15.177896] print_report+0xd1/0x650 [ 15.177921] ? __virt_addr_valid+0x1db/0x2d0 [ 15.177980] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.178003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.178026] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.178048] kasan_report+0x141/0x180 [ 15.178070] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.178096] __asan_report_load4_noabort+0x18/0x20 [ 15.178121] kasan_atomics_helper+0x4bbc/0x5450 [ 15.178144] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.178168] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.178195] ? kasan_atomics+0x152/0x310 [ 15.178220] kasan_atomics+0x1dc/0x310 [ 15.178243] ? __pfx_kasan_atomics+0x10/0x10 [ 15.178267] ? __pfx_read_tsc+0x10/0x10 [ 15.178290] ? ktime_get_ts64+0x86/0x230 [ 15.178316] kunit_try_run_case+0x1a5/0x480 [ 15.178342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.178365] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.178390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.178414] ? __kthread_parkme+0x82/0x180 [ 15.178437] ? preempt_count_sub+0x50/0x80 [ 15.178462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.178487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.178512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.178538] kthread+0x337/0x6f0 [ 15.178557] ? trace_preempt_on+0x20/0xc0 [ 15.178582] ? __pfx_kthread+0x10/0x10 [ 15.178603] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.178625] ? calculate_sigpending+0x7b/0xa0 [ 15.178650] ? __pfx_kthread+0x10/0x10 [ 15.178671] ret_from_fork+0x116/0x1d0 [ 15.178690] ? __pfx_kthread+0x10/0x10 [ 15.178715] ret_from_fork_asm+0x1a/0x30 [ 15.178748] </TASK> [ 15.178760] [ 15.194737] Allocated by task 282: [ 15.195214] kasan_save_stack+0x45/0x70 [ 15.195525] kasan_save_track+0x18/0x40 [ 15.195666] kasan_save_alloc_info+0x3b/0x50 [ 15.195810] __kasan_kmalloc+0xb7/0xc0 [ 15.195959] __kmalloc_cache_noprof+0x189/0x420 [ 15.196680] kasan_atomics+0x95/0x310 [ 15.197136] kunit_try_run_case+0x1a5/0x480 [ 15.197706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.198359] kthread+0x337/0x6f0 [ 15.198784] ret_from_fork+0x116/0x1d0 [ 15.199306] ret_from_fork_asm+0x1a/0x30 [ 15.199792] [ 15.199966] The buggy address belongs to the object at ffff888102ac2380 [ 15.199966] which belongs to the cache kmalloc-64 of size 64 [ 15.200666] The buggy address is located 0 bytes to the right of [ 15.200666] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.201668] [ 15.201845] The buggy address belongs to the physical page: [ 15.202573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.203506] flags: 0x200000000000000(node=0|zone=2) [ 15.204192] page_type: f5(slab) [ 15.204516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.205095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.205781] page dumped because: kasan: bad access detected [ 15.206133] [ 15.206479] Memory state around the buggy address: [ 15.207105] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.207692] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.207913] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.208801] ^ [ 15.209421] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.209874] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.210688] ================================================================== [ 15.945384] ================================================================== [ 15.946198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.946435] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.946750] [ 15.946863] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.946905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.946917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.946949] Call Trace: [ 15.946968] <TASK> [ 15.946987] dump_stack_lvl+0x73/0xb0 [ 15.947017] print_report+0xd1/0x650 [ 15.947040] ? __virt_addr_valid+0x1db/0x2d0 [ 15.947062] ? kasan_atomics_helper+0x1467/0x5450 [ 15.947084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.947107] ? kasan_atomics_helper+0x1467/0x5450 [ 15.947128] kasan_report+0x141/0x180 [ 15.947149] ? kasan_atomics_helper+0x1467/0x5450 [ 15.947175] kasan_check_range+0x10c/0x1c0 [ 15.947198] __kasan_check_write+0x18/0x20 [ 15.947218] kasan_atomics_helper+0x1467/0x5450 [ 15.947241] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.947264] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.947289] ? kasan_atomics+0x152/0x310 [ 15.947315] kasan_atomics+0x1dc/0x310 [ 15.947337] ? __pfx_kasan_atomics+0x10/0x10 [ 15.947362] ? __pfx_read_tsc+0x10/0x10 [ 15.947411] ? ktime_get_ts64+0x86/0x230 [ 15.947449] kunit_try_run_case+0x1a5/0x480 [ 15.947475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.947511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.947537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.947574] ? __kthread_parkme+0x82/0x180 [ 15.947597] ? preempt_count_sub+0x50/0x80 [ 15.948248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.948325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.948459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.948493] kthread+0x337/0x6f0 [ 15.948514] ? trace_preempt_on+0x20/0xc0 [ 15.948742] ? __pfx_kthread+0x10/0x10 [ 15.948766] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.948792] ? calculate_sigpending+0x7b/0xa0 [ 15.948821] ? __pfx_kthread+0x10/0x10 [ 15.948844] ret_from_fork+0x116/0x1d0 [ 15.948864] ? __pfx_kthread+0x10/0x10 [ 15.948886] ret_from_fork_asm+0x1a/0x30 [ 15.948919] </TASK> [ 15.948932] [ 15.961763] Allocated by task 282: [ 15.962132] kasan_save_stack+0x45/0x70 [ 15.962652] kasan_save_track+0x18/0x40 [ 15.962919] kasan_save_alloc_info+0x3b/0x50 [ 15.963448] __kasan_kmalloc+0xb7/0xc0 [ 15.963679] __kmalloc_cache_noprof+0x189/0x420 [ 15.963897] kasan_atomics+0x95/0x310 [ 15.964086] kunit_try_run_case+0x1a5/0x480 [ 15.964534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964924] kthread+0x337/0x6f0 [ 15.965248] ret_from_fork+0x116/0x1d0 [ 15.965575] ret_from_fork_asm+0x1a/0x30 [ 15.965892] [ 15.966001] The buggy address belongs to the object at ffff888102ac2380 [ 15.966001] which belongs to the cache kmalloc-64 of size 64 [ 15.966960] The buggy address is located 0 bytes to the right of [ 15.966960] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.967730] [ 15.967985] The buggy address belongs to the physical page: [ 15.968487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.968900] flags: 0x200000000000000(node=0|zone=2) [ 15.969138] page_type: f5(slab) [ 15.969577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.970044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.970627] page dumped because: kasan: bad access detected [ 15.970870] [ 15.970974] Memory state around the buggy address: [ 15.971183] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.972088] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.972569] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.973052] ^ [ 15.973476] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.973966] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.974503] ================================================================== [ 15.211751] ================================================================== [ 15.212027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.212579] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.212873] [ 15.213018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.213064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.213076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.213097] Call Trace: [ 15.213116] <TASK> [ 15.213418] dump_stack_lvl+0x73/0xb0 [ 15.213457] print_report+0xd1/0x650 [ 15.213481] ? __virt_addr_valid+0x1db/0x2d0 [ 15.213504] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.213526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.213548] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.213571] kasan_report+0x141/0x180 [ 15.213593] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.213618] __asan_report_store4_noabort+0x1b/0x30 [ 15.213644] kasan_atomics_helper+0x4ba2/0x5450 [ 15.213667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.213689] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.213714] ? kasan_atomics+0x152/0x310 [ 15.213741] kasan_atomics+0x1dc/0x310 [ 15.213762] ? __pfx_kasan_atomics+0x10/0x10 [ 15.213786] ? __pfx_read_tsc+0x10/0x10 [ 15.213808] ? ktime_get_ts64+0x86/0x230 [ 15.213832] kunit_try_run_case+0x1a5/0x480 [ 15.213857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.213879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.213903] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.213927] ? __kthread_parkme+0x82/0x180 [ 15.214139] ? preempt_count_sub+0x50/0x80 [ 15.214167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.214192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.214219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.214245] kthread+0x337/0x6f0 [ 15.214279] ? trace_preempt_on+0x20/0xc0 [ 15.214304] ? __pfx_kthread+0x10/0x10 [ 15.214325] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.214348] ? calculate_sigpending+0x7b/0xa0 [ 15.214373] ? __pfx_kthread+0x10/0x10 [ 15.214394] ret_from_fork+0x116/0x1d0 [ 15.214413] ? __pfx_kthread+0x10/0x10 [ 15.214433] ret_from_fork_asm+0x1a/0x30 [ 15.214464] </TASK> [ 15.214475] [ 15.222740] Allocated by task 282: [ 15.222903] kasan_save_stack+0x45/0x70 [ 15.223096] kasan_save_track+0x18/0x40 [ 15.223261] kasan_save_alloc_info+0x3b/0x50 [ 15.223524] __kasan_kmalloc+0xb7/0xc0 [ 15.223685] __kmalloc_cache_noprof+0x189/0x420 [ 15.223840] kasan_atomics+0x95/0x310 [ 15.223983] kunit_try_run_case+0x1a5/0x480 [ 15.224149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224556] kthread+0x337/0x6f0 [ 15.224776] ret_from_fork+0x116/0x1d0 [ 15.224970] ret_from_fork_asm+0x1a/0x30 [ 15.225239] [ 15.225418] The buggy address belongs to the object at ffff888102ac2380 [ 15.225418] which belongs to the cache kmalloc-64 of size 64 [ 15.225894] The buggy address is located 0 bytes to the right of [ 15.225894] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.226626] [ 15.226720] The buggy address belongs to the physical page: [ 15.227003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.227390] flags: 0x200000000000000(node=0|zone=2) [ 15.227581] page_type: f5(slab) [ 15.227701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.228025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.228464] page dumped because: kasan: bad access detected [ 15.228683] [ 15.228761] Memory state around the buggy address: [ 15.228962] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.229351] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.229723] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.229948] ^ [ 15.230100] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.230310] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.230623] ================================================================== [ 15.686439] ================================================================== [ 15.686745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.687266] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.687587] [ 15.687704] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.687758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.687771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.687803] Call Trace: [ 15.687822] <TASK> [ 15.687843] dump_stack_lvl+0x73/0xb0 [ 15.687875] print_report+0xd1/0x650 [ 15.687900] ? __virt_addr_valid+0x1db/0x2d0 [ 15.687923] ? kasan_atomics_helper+0xf10/0x5450 [ 15.687957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.687982] ? kasan_atomics_helper+0xf10/0x5450 [ 15.688004] kasan_report+0x141/0x180 [ 15.688027] ? kasan_atomics_helper+0xf10/0x5450 [ 15.688054] kasan_check_range+0x10c/0x1c0 [ 15.688078] __kasan_check_write+0x18/0x20 [ 15.688099] kasan_atomics_helper+0xf10/0x5450 [ 15.688123] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.688147] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.688173] ? kasan_atomics+0x152/0x310 [ 15.688200] kasan_atomics+0x1dc/0x310 [ 15.688226] ? __pfx_kasan_atomics+0x10/0x10 [ 15.688251] ? __pfx_read_tsc+0x10/0x10 [ 15.688301] ? ktime_get_ts64+0x86/0x230 [ 15.688329] kunit_try_run_case+0x1a5/0x480 [ 15.688354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.688388] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.688425] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.688450] ? __kthread_parkme+0x82/0x180 [ 15.688474] ? preempt_count_sub+0x50/0x80 [ 15.688511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.688540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.688568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.688594] kthread+0x337/0x6f0 [ 15.688614] ? trace_preempt_on+0x20/0xc0 [ 15.688639] ? __pfx_kthread+0x10/0x10 [ 15.688662] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.688684] ? calculate_sigpending+0x7b/0xa0 [ 15.688719] ? __pfx_kthread+0x10/0x10 [ 15.688742] ret_from_fork+0x116/0x1d0 [ 15.688762] ? __pfx_kthread+0x10/0x10 [ 15.688795] ret_from_fork_asm+0x1a/0x30 [ 15.688827] </TASK> [ 15.688839] [ 15.696864] Allocated by task 282: [ 15.697010] kasan_save_stack+0x45/0x70 [ 15.697162] kasan_save_track+0x18/0x40 [ 15.697317] kasan_save_alloc_info+0x3b/0x50 [ 15.697531] __kasan_kmalloc+0xb7/0xc0 [ 15.697750] __kmalloc_cache_noprof+0x189/0x420 [ 15.697979] kasan_atomics+0x95/0x310 [ 15.698167] kunit_try_run_case+0x1a5/0x480 [ 15.698374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.698549] kthread+0x337/0x6f0 [ 15.698671] ret_from_fork+0x116/0x1d0 [ 15.698813] ret_from_fork_asm+0x1a/0x30 [ 15.698962] [ 15.699069] The buggy address belongs to the object at ffff888102ac2380 [ 15.699069] which belongs to the cache kmalloc-64 of size 64 [ 15.700074] The buggy address is located 0 bytes to the right of [ 15.700074] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.700697] [ 15.700818] The buggy address belongs to the physical page: [ 15.701018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.701423] flags: 0x200000000000000(node=0|zone=2) [ 15.701687] page_type: f5(slab) [ 15.701840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.702174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.702544] page dumped because: kasan: bad access detected [ 15.702800] [ 15.702892] Memory state around the buggy address: [ 15.703118] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.703446] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.703742] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.704062] ^ [ 15.704284] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.704602] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.704914] ================================================================== [ 15.975276] ================================================================== [ 15.975545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.975858] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.976189] [ 15.976410] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.976456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.976468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.976490] Call Trace: [ 15.976510] <TASK> [ 15.976530] dump_stack_lvl+0x73/0xb0 [ 15.976562] print_report+0xd1/0x650 [ 15.976586] ? __virt_addr_valid+0x1db/0x2d0 [ 15.976611] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.976634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.976659] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.976682] kasan_report+0x141/0x180 [ 15.976705] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.976733] __asan_report_store8_noabort+0x1b/0x30 [ 15.976760] kasan_atomics_helper+0x50d4/0x5450 [ 15.976785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.976809] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.976836] ? kasan_atomics+0x152/0x310 [ 15.976863] kasan_atomics+0x1dc/0x310 [ 15.976887] ? __pfx_kasan_atomics+0x10/0x10 [ 15.976912] ? __pfx_read_tsc+0x10/0x10 [ 15.976946] ? ktime_get_ts64+0x86/0x230 [ 15.976972] kunit_try_run_case+0x1a5/0x480 [ 15.976998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.977023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.977049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.977074] ? __kthread_parkme+0x82/0x180 [ 15.977096] ? preempt_count_sub+0x50/0x80 [ 15.977121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.977147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.977173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.977199] kthread+0x337/0x6f0 [ 15.977219] ? trace_preempt_on+0x20/0xc0 [ 15.977244] ? __pfx_kthread+0x10/0x10 [ 15.977266] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.977288] ? calculate_sigpending+0x7b/0xa0 [ 15.977314] ? __pfx_kthread+0x10/0x10 [ 15.977336] ret_from_fork+0x116/0x1d0 [ 15.977355] ? __pfx_kthread+0x10/0x10 [ 15.977377] ret_from_fork_asm+0x1a/0x30 [ 15.977409] </TASK> [ 15.977420] [ 15.984607] Allocated by task 282: [ 15.984778] kasan_save_stack+0x45/0x70 [ 15.984962] kasan_save_track+0x18/0x40 [ 15.985098] kasan_save_alloc_info+0x3b/0x50 [ 15.985248] __kasan_kmalloc+0xb7/0xc0 [ 15.985485] __kmalloc_cache_noprof+0x189/0x420 [ 15.985707] kasan_atomics+0x95/0x310 [ 15.986002] kunit_try_run_case+0x1a5/0x480 [ 15.986179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.986618] kthread+0x337/0x6f0 [ 15.986772] ret_from_fork+0x116/0x1d0 [ 15.986993] ret_from_fork_asm+0x1a/0x30 [ 15.987198] [ 15.987279] The buggy address belongs to the object at ffff888102ac2380 [ 15.987279] which belongs to the cache kmalloc-64 of size 64 [ 15.987747] The buggy address is located 0 bytes to the right of [ 15.987747] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.988196] [ 15.988273] The buggy address belongs to the physical page: [ 15.988536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.988851] flags: 0x200000000000000(node=0|zone=2) [ 15.989065] page_type: f5(slab) [ 15.989233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.989461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.989686] page dumped because: kasan: bad access detected [ 15.989855] [ 15.989925] Memory state around the buggy address: [ 15.990140] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.990518] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.990837] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.991147] ^ [ 15.991360] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.991645] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.991856] ================================================================== [ 16.120382] ================================================================== [ 16.120691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.120925] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.121412] [ 16.121527] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.121572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.121587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.121611] Call Trace: [ 16.121631] <TASK> [ 16.121650] dump_stack_lvl+0x73/0xb0 [ 16.121681] print_report+0xd1/0x650 [ 16.121706] ? __virt_addr_valid+0x1db/0x2d0 [ 16.121730] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.121753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.121777] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.121799] kasan_report+0x141/0x180 [ 16.121823] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.121851] kasan_check_range+0x10c/0x1c0 [ 16.121875] __kasan_check_write+0x18/0x20 [ 16.121896] kasan_atomics_helper+0x18b1/0x5450 [ 16.121919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.121956] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.121982] ? kasan_atomics+0x152/0x310 [ 16.122009] kasan_atomics+0x1dc/0x310 [ 16.122033] ? __pfx_kasan_atomics+0x10/0x10 [ 16.122058] ? __pfx_read_tsc+0x10/0x10 [ 16.122080] ? ktime_get_ts64+0x86/0x230 [ 16.122104] kunit_try_run_case+0x1a5/0x480 [ 16.122130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.122154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.122180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.122204] ? __kthread_parkme+0x82/0x180 [ 16.122226] ? preempt_count_sub+0x50/0x80 [ 16.122251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.122297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.122322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.122349] kthread+0x337/0x6f0 [ 16.122369] ? trace_preempt_on+0x20/0xc0 [ 16.122393] ? __pfx_kthread+0x10/0x10 [ 16.122414] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.122436] ? calculate_sigpending+0x7b/0xa0 [ 16.122462] ? __pfx_kthread+0x10/0x10 [ 16.122484] ret_from_fork+0x116/0x1d0 [ 16.122503] ? __pfx_kthread+0x10/0x10 [ 16.122524] ret_from_fork_asm+0x1a/0x30 [ 16.122556] </TASK> [ 16.122567] [ 16.129568] Allocated by task 282: [ 16.129744] kasan_save_stack+0x45/0x70 [ 16.129953] kasan_save_track+0x18/0x40 [ 16.130143] kasan_save_alloc_info+0x3b/0x50 [ 16.130379] __kasan_kmalloc+0xb7/0xc0 [ 16.130548] __kmalloc_cache_noprof+0x189/0x420 [ 16.130731] kasan_atomics+0x95/0x310 [ 16.130918] kunit_try_run_case+0x1a5/0x480 [ 16.131102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.131303] kthread+0x337/0x6f0 [ 16.131426] ret_from_fork+0x116/0x1d0 [ 16.131615] ret_from_fork_asm+0x1a/0x30 [ 16.131808] [ 16.131903] The buggy address belongs to the object at ffff888102ac2380 [ 16.131903] which belongs to the cache kmalloc-64 of size 64 [ 16.132447] The buggy address is located 0 bytes to the right of [ 16.132447] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.132901] [ 16.132982] The buggy address belongs to the physical page: [ 16.133153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.133418] flags: 0x200000000000000(node=0|zone=2) [ 16.133625] page_type: f5(slab) [ 16.133796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.134150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.134512] page dumped because: kasan: bad access detected [ 16.134763] [ 16.134855] Memory state around the buggy address: [ 16.135018] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.135233] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.135500] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.135816] ^ [ 16.136045] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.136390] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.136709] ================================================================== [ 15.867358] ================================================================== [ 15.867716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.868644] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.868929] [ 15.869082] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.869126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.869138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.869159] Call Trace: [ 15.869178] <TASK> [ 15.869197] dump_stack_lvl+0x73/0xb0 [ 15.869230] print_report+0xd1/0x650 [ 15.869268] ? __virt_addr_valid+0x1db/0x2d0 [ 15.869292] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.869337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.869363] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.869386] kasan_report+0x141/0x180 [ 15.869420] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.869457] kasan_check_range+0x10c/0x1c0 [ 15.869481] __kasan_check_write+0x18/0x20 [ 15.869501] kasan_atomics_helper+0x12e6/0x5450 [ 15.869536] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.869559] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.869586] ? kasan_atomics+0x152/0x310 [ 15.869622] kasan_atomics+0x1dc/0x310 [ 15.869645] ? __pfx_kasan_atomics+0x10/0x10 [ 15.869681] ? __pfx_read_tsc+0x10/0x10 [ 15.869704] ? ktime_get_ts64+0x86/0x230 [ 15.869729] kunit_try_run_case+0x1a5/0x480 [ 15.869764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.869787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.869813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.869850] ? __kthread_parkme+0x82/0x180 [ 15.869873] ? preempt_count_sub+0x50/0x80 [ 15.869899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.869955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.869982] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.870018] kthread+0x337/0x6f0 [ 15.870038] ? trace_preempt_on+0x20/0xc0 [ 15.870064] ? __pfx_kthread+0x10/0x10 [ 15.870086] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.870108] ? calculate_sigpending+0x7b/0xa0 [ 15.870143] ? __pfx_kthread+0x10/0x10 [ 15.870167] ret_from_fork+0x116/0x1d0 [ 15.870198] ? __pfx_kthread+0x10/0x10 [ 15.870219] ret_from_fork_asm+0x1a/0x30 [ 15.870250] </TASK> [ 15.870261] [ 15.877878] Allocated by task 282: [ 15.878019] kasan_save_stack+0x45/0x70 [ 15.878166] kasan_save_track+0x18/0x40 [ 15.878403] kasan_save_alloc_info+0x3b/0x50 [ 15.878613] __kasan_kmalloc+0xb7/0xc0 [ 15.878804] __kmalloc_cache_noprof+0x189/0x420 [ 15.879037] kasan_atomics+0x95/0x310 [ 15.879225] kunit_try_run_case+0x1a5/0x480 [ 15.879660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.879872] kthread+0x337/0x6f0 [ 15.880015] ret_from_fork+0x116/0x1d0 [ 15.880150] ret_from_fork_asm+0x1a/0x30 [ 15.880290] [ 15.880361] The buggy address belongs to the object at ffff888102ac2380 [ 15.880361] which belongs to the cache kmalloc-64 of size 64 [ 15.881028] The buggy address is located 0 bytes to the right of [ 15.881028] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.881539] [ 15.881614] The buggy address belongs to the physical page: [ 15.881790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.882173] flags: 0x200000000000000(node=0|zone=2) [ 15.882510] page_type: f5(slab) [ 15.882684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.883228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.883666] page dumped because: kasan: bad access detected [ 15.883838] [ 15.883907] Memory state around the buggy address: [ 15.884072] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.884455] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.884803] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.885157] ^ [ 15.885376] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.885684] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.885982] ================================================================== [ 15.372192] ================================================================== [ 15.372985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.373649] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.374303] [ 15.374516] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.374675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.374692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.374721] Call Trace: [ 15.374741] <TASK> [ 15.374761] dump_stack_lvl+0x73/0xb0 [ 15.374795] print_report+0xd1/0x650 [ 15.374820] ? __virt_addr_valid+0x1db/0x2d0 [ 15.374844] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.374867] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.374892] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.374915] kasan_report+0x141/0x180 [ 15.374948] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.374977] kasan_check_range+0x10c/0x1c0 [ 15.375001] __kasan_check_write+0x18/0x20 [ 15.375022] kasan_atomics_helper+0x5fe/0x5450 [ 15.375046] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.375070] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.375097] ? kasan_atomics+0x152/0x310 [ 15.375125] kasan_atomics+0x1dc/0x310 [ 15.375149] ? __pfx_kasan_atomics+0x10/0x10 [ 15.375174] ? __pfx_read_tsc+0x10/0x10 [ 15.375196] ? ktime_get_ts64+0x86/0x230 [ 15.375222] kunit_try_run_case+0x1a5/0x480 [ 15.375248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.375279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.375305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.375330] ? __kthread_parkme+0x82/0x180 [ 15.375352] ? preempt_count_sub+0x50/0x80 [ 15.375378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.375403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.375430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.375456] kthread+0x337/0x6f0 [ 15.375476] ? trace_preempt_on+0x20/0xc0 [ 15.375500] ? __pfx_kthread+0x10/0x10 [ 15.375521] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.375544] ? calculate_sigpending+0x7b/0xa0 [ 15.375570] ? __pfx_kthread+0x10/0x10 [ 15.375592] ret_from_fork+0x116/0x1d0 [ 15.375611] ? __pfx_kthread+0x10/0x10 [ 15.375633] ret_from_fork_asm+0x1a/0x30 [ 15.375664] </TASK> [ 15.375676] [ 15.383558] Allocated by task 282: [ 15.383745] kasan_save_stack+0x45/0x70 [ 15.383961] kasan_save_track+0x18/0x40 [ 15.384136] kasan_save_alloc_info+0x3b/0x50 [ 15.384386] __kasan_kmalloc+0xb7/0xc0 [ 15.384522] __kmalloc_cache_noprof+0x189/0x420 [ 15.384678] kasan_atomics+0x95/0x310 [ 15.384836] kunit_try_run_case+0x1a5/0x480 [ 15.385091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.385432] kthread+0x337/0x6f0 [ 15.385604] ret_from_fork+0x116/0x1d0 [ 15.385825] ret_from_fork_asm+0x1a/0x30 [ 15.386047] [ 15.386186] The buggy address belongs to the object at ffff888102ac2380 [ 15.386186] which belongs to the cache kmalloc-64 of size 64 [ 15.386716] The buggy address is located 0 bytes to the right of [ 15.386716] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.387321] [ 15.387455] The buggy address belongs to the physical page: [ 15.387728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.388117] flags: 0x200000000000000(node=0|zone=2) [ 15.388323] page_type: f5(slab) [ 15.388531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.388893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.389360] page dumped because: kasan: bad access detected [ 15.389626] [ 15.389719] Memory state around the buggy address: [ 15.389995] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.390312] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.390545] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.390872] ^ [ 15.391151] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.391506] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.391760] ================================================================== [ 15.830099] ================================================================== [ 15.831009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.831353] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.831765] [ 15.831882] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.831927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.831951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.831983] Call Trace: [ 15.832004] <TASK> [ 15.832025] dump_stack_lvl+0x73/0xb0 [ 15.832070] print_report+0xd1/0x650 [ 15.832104] ? __virt_addr_valid+0x1db/0x2d0 [ 15.832130] ? kasan_atomics_helper+0x1217/0x5450 [ 15.832165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.832190] ? kasan_atomics_helper+0x1217/0x5450 [ 15.832214] kasan_report+0x141/0x180 [ 15.832236] ? kasan_atomics_helper+0x1217/0x5450 [ 15.832264] kasan_check_range+0x10c/0x1c0 [ 15.832301] __kasan_check_write+0x18/0x20 [ 15.832321] kasan_atomics_helper+0x1217/0x5450 [ 15.832345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.832370] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.832398] ? kasan_atomics+0x152/0x310 [ 15.832425] kasan_atomics+0x1dc/0x310 [ 15.832449] ? __pfx_kasan_atomics+0x10/0x10 [ 15.832475] ? __pfx_read_tsc+0x10/0x10 [ 15.832497] ? ktime_get_ts64+0x86/0x230 [ 15.832522] kunit_try_run_case+0x1a5/0x480 [ 15.832548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.832607] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.832632] ? __kthread_parkme+0x82/0x180 [ 15.832653] ? preempt_count_sub+0x50/0x80 [ 15.832689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.832740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.832767] kthread+0x337/0x6f0 [ 15.832786] ? trace_preempt_on+0x20/0xc0 [ 15.832811] ? __pfx_kthread+0x10/0x10 [ 15.832833] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.832856] ? calculate_sigpending+0x7b/0xa0 [ 15.832881] ? __pfx_kthread+0x10/0x10 [ 15.832903] ret_from_fork+0x116/0x1d0 [ 15.832923] ? __pfx_kthread+0x10/0x10 [ 15.832953] ret_from_fork_asm+0x1a/0x30 [ 15.832987] </TASK> [ 15.832999] [ 15.840646] Allocated by task 282: [ 15.840828] kasan_save_stack+0x45/0x70 [ 15.841044] kasan_save_track+0x18/0x40 [ 15.841203] kasan_save_alloc_info+0x3b/0x50 [ 15.841555] __kasan_kmalloc+0xb7/0xc0 [ 15.841712] __kmalloc_cache_noprof+0x189/0x420 [ 15.841914] kasan_atomics+0x95/0x310 [ 15.842137] kunit_try_run_case+0x1a5/0x480 [ 15.842355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.842567] kthread+0x337/0x6f0 [ 15.842748] ret_from_fork+0x116/0x1d0 [ 15.842923] ret_from_fork_asm+0x1a/0x30 [ 15.843109] [ 15.843214] The buggy address belongs to the object at ffff888102ac2380 [ 15.843214] which belongs to the cache kmalloc-64 of size 64 [ 15.843719] The buggy address is located 0 bytes to the right of [ 15.843719] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.844215] [ 15.844290] The buggy address belongs to the physical page: [ 15.844464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.844705] flags: 0x200000000000000(node=0|zone=2) [ 15.845014] page_type: f5(slab) [ 15.845186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.845708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.845944] page dumped because: kasan: bad access detected [ 15.846114] [ 15.846182] Memory state around the buggy address: [ 15.846488] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.846811] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.847203] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.847644] ^ [ 15.847898] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.848255] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.848492] ================================================================== [ 15.992323] ================================================================== [ 15.992675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.993223] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.993805] [ 15.993919] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.993975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.993987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.994008] Call Trace: [ 15.994026] <TASK> [ 15.994043] dump_stack_lvl+0x73/0xb0 [ 15.994074] print_report+0xd1/0x650 [ 15.994098] ? __virt_addr_valid+0x1db/0x2d0 [ 15.994122] ? kasan_atomics_helper+0x151d/0x5450 [ 15.994145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.994170] ? kasan_atomics_helper+0x151d/0x5450 [ 15.994193] kasan_report+0x141/0x180 [ 15.994216] ? kasan_atomics_helper+0x151d/0x5450 [ 15.994243] kasan_check_range+0x10c/0x1c0 [ 15.994283] __kasan_check_write+0x18/0x20 [ 15.994305] kasan_atomics_helper+0x151d/0x5450 [ 15.994332] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.994357] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.994384] ? kasan_atomics+0x152/0x310 [ 15.994412] kasan_atomics+0x1dc/0x310 [ 15.994436] ? __pfx_kasan_atomics+0x10/0x10 [ 15.994462] ? __pfx_read_tsc+0x10/0x10 [ 15.994484] ? ktime_get_ts64+0x86/0x230 [ 15.994509] kunit_try_run_case+0x1a5/0x480 [ 15.994535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.994561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.994586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.994611] ? __kthread_parkme+0x82/0x180 [ 15.994633] ? preempt_count_sub+0x50/0x80 [ 15.994658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.994683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.994716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.994742] kthread+0x337/0x6f0 [ 15.994762] ? trace_preempt_on+0x20/0xc0 [ 15.994787] ? __pfx_kthread+0x10/0x10 [ 15.994808] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.994831] ? calculate_sigpending+0x7b/0xa0 [ 15.994857] ? __pfx_kthread+0x10/0x10 [ 15.994880] ret_from_fork+0x116/0x1d0 [ 15.994900] ? __pfx_kthread+0x10/0x10 [ 15.994922] ret_from_fork_asm+0x1a/0x30 [ 15.994966] </TASK> [ 15.994977] [ 16.002652] Allocated by task 282: [ 16.003330] kasan_save_stack+0x45/0x70 [ 16.003767] kasan_save_track+0x18/0x40 [ 16.003907] kasan_save_alloc_info+0x3b/0x50 [ 16.004070] __kasan_kmalloc+0xb7/0xc0 [ 16.004204] __kmalloc_cache_noprof+0x189/0x420 [ 16.004620] kasan_atomics+0x95/0x310 [ 16.004814] kunit_try_run_case+0x1a5/0x480 [ 16.005043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.005293] kthread+0x337/0x6f0 [ 16.005413] ret_from_fork+0x116/0x1d0 [ 16.005546] ret_from_fork_asm+0x1a/0x30 [ 16.005686] [ 16.005757] The buggy address belongs to the object at ffff888102ac2380 [ 16.005757] which belongs to the cache kmalloc-64 of size 64 [ 16.006532] The buggy address is located 0 bytes to the right of [ 16.006532] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.006972] [ 16.007048] The buggy address belongs to the physical page: [ 16.007219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.007575] flags: 0x200000000000000(node=0|zone=2) [ 16.007812] page_type: f5(slab) [ 16.007998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.008423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.008813] page dumped because: kasan: bad access detected [ 16.009058] [ 16.009143] Memory state around the buggy address: [ 16.009362] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.009628] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.009908] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.010129] ^ [ 16.010284] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.010500] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.010772] ================================================================== [ 15.747372] ================================================================== [ 15.747734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.748050] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.748542] [ 15.748674] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.748730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.748743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.748765] Call Trace: [ 15.748794] <TASK> [ 15.748813] dump_stack_lvl+0x73/0xb0 [ 15.748846] print_report+0xd1/0x650 [ 15.748870] ? __virt_addr_valid+0x1db/0x2d0 [ 15.748893] ? kasan_atomics_helper+0x1079/0x5450 [ 15.748923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.748957] ? kasan_atomics_helper+0x1079/0x5450 [ 15.748980] kasan_report+0x141/0x180 [ 15.749014] ? kasan_atomics_helper+0x1079/0x5450 [ 15.749043] kasan_check_range+0x10c/0x1c0 [ 15.749077] __kasan_check_write+0x18/0x20 [ 15.749098] kasan_atomics_helper+0x1079/0x5450 [ 15.749122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.749156] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.749182] ? kasan_atomics+0x152/0x310 [ 15.749210] kasan_atomics+0x1dc/0x310 [ 15.749233] ? __pfx_kasan_atomics+0x10/0x10 [ 15.749259] ? __pfx_read_tsc+0x10/0x10 [ 15.749281] ? ktime_get_ts64+0x86/0x230 [ 15.749318] kunit_try_run_case+0x1a5/0x480 [ 15.749343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.749393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.749427] ? __kthread_parkme+0x82/0x180 [ 15.749449] ? preempt_count_sub+0x50/0x80 [ 15.749474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.749562] kthread+0x337/0x6f0 [ 15.749582] ? trace_preempt_on+0x20/0xc0 [ 15.749616] ? __pfx_kthread+0x10/0x10 [ 15.749638] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.749660] ? calculate_sigpending+0x7b/0xa0 [ 15.749697] ? __pfx_kthread+0x10/0x10 [ 15.749719] ret_from_fork+0x116/0x1d0 [ 15.749739] ? __pfx_kthread+0x10/0x10 [ 15.749762] ret_from_fork_asm+0x1a/0x30 [ 15.749795] </TASK> [ 15.749807] [ 15.757587] Allocated by task 282: [ 15.757773] kasan_save_stack+0x45/0x70 [ 15.758004] kasan_save_track+0x18/0x40 [ 15.758164] kasan_save_alloc_info+0x3b/0x50 [ 15.758355] __kasan_kmalloc+0xb7/0xc0 [ 15.758566] __kmalloc_cache_noprof+0x189/0x420 [ 15.758757] kasan_atomics+0x95/0x310 [ 15.758961] kunit_try_run_case+0x1a5/0x480 [ 15.759105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.759455] kthread+0x337/0x6f0 [ 15.759627] ret_from_fork+0x116/0x1d0 [ 15.759763] ret_from_fork_asm+0x1a/0x30 [ 15.759971] [ 15.760069] The buggy address belongs to the object at ffff888102ac2380 [ 15.760069] which belongs to the cache kmalloc-64 of size 64 [ 15.760615] The buggy address is located 0 bytes to the right of [ 15.760615] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.761175] [ 15.761283] The buggy address belongs to the physical page: [ 15.761511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.761862] flags: 0x200000000000000(node=0|zone=2) [ 15.762099] page_type: f5(slab) [ 15.762273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.762514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.762746] page dumped because: kasan: bad access detected [ 15.762917] [ 15.762996] Memory state around the buggy address: [ 15.763212] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.763528] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.763847] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.764170] ^ [ 15.764558] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.764855] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765078] ================================================================== [ 16.153775] ================================================================== [ 16.154161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.154587] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.154950] [ 16.155064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.155107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.155120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.155141] Call Trace: [ 16.155159] <TASK> [ 16.155176] dump_stack_lvl+0x73/0xb0 [ 16.155207] print_report+0xd1/0x650 [ 16.155231] ? __virt_addr_valid+0x1db/0x2d0 [ 16.155255] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.155277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.155302] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.155324] kasan_report+0x141/0x180 [ 16.155347] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.155374] kasan_check_range+0x10c/0x1c0 [ 16.155399] __kasan_check_write+0x18/0x20 [ 16.155419] kasan_atomics_helper+0x19e3/0x5450 [ 16.155442] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.155467] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.155492] ? kasan_atomics+0x152/0x310 [ 16.155520] kasan_atomics+0x1dc/0x310 [ 16.155543] ? __pfx_kasan_atomics+0x10/0x10 [ 16.155569] ? __pfx_read_tsc+0x10/0x10 [ 16.155590] ? ktime_get_ts64+0x86/0x230 [ 16.155615] kunit_try_run_case+0x1a5/0x480 [ 16.155640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.155664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.155689] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.155714] ? __kthread_parkme+0x82/0x180 [ 16.155735] ? preempt_count_sub+0x50/0x80 [ 16.155760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.155785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.155811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.155837] kthread+0x337/0x6f0 [ 16.155856] ? trace_preempt_on+0x20/0xc0 [ 16.155881] ? __pfx_kthread+0x10/0x10 [ 16.155902] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.155925] ? calculate_sigpending+0x7b/0xa0 [ 16.155961] ? __pfx_kthread+0x10/0x10 [ 16.155983] ret_from_fork+0x116/0x1d0 [ 16.156002] ? __pfx_kthread+0x10/0x10 [ 16.156024] ret_from_fork_asm+0x1a/0x30 [ 16.156055] </TASK> [ 16.156066] [ 16.164078] Allocated by task 282: [ 16.164302] kasan_save_stack+0x45/0x70 [ 16.164470] kasan_save_track+0x18/0x40 [ 16.164653] kasan_save_alloc_info+0x3b/0x50 [ 16.164840] __kasan_kmalloc+0xb7/0xc0 [ 16.165010] __kmalloc_cache_noprof+0x189/0x420 [ 16.165211] kasan_atomics+0x95/0x310 [ 16.165386] kunit_try_run_case+0x1a5/0x480 [ 16.165594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.165803] kthread+0x337/0x6f0 [ 16.165970] ret_from_fork+0x116/0x1d0 [ 16.166152] ret_from_fork_asm+0x1a/0x30 [ 16.166309] [ 16.166380] The buggy address belongs to the object at ffff888102ac2380 [ 16.166380] which belongs to the cache kmalloc-64 of size 64 [ 16.166736] The buggy address is located 0 bytes to the right of [ 16.166736] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.167200] [ 16.167320] The buggy address belongs to the physical page: [ 16.167571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.167925] flags: 0x200000000000000(node=0|zone=2) [ 16.168176] page_type: f5(slab) [ 16.168369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.168717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.169038] page dumped because: kasan: bad access detected [ 16.169210] [ 16.169311] Memory state around the buggy address: [ 16.169469] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.169684] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.170014] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.170363] ^ [ 16.170590] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.170916] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.171248] ================================================================== [ 15.584392] ================================================================== [ 15.585093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.585792] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.586468] [ 15.586658] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.586704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.586725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.586747] Call Trace: [ 15.586768] <TASK> [ 15.586798] dump_stack_lvl+0x73/0xb0 [ 15.586831] print_report+0xd1/0x650 [ 15.586855] ? __virt_addr_valid+0x1db/0x2d0 [ 15.586891] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.586914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.586948] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.586972] kasan_report+0x141/0x180 [ 15.586995] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.587022] __asan_report_load4_noabort+0x18/0x20 [ 15.587048] kasan_atomics_helper+0x4a84/0x5450 [ 15.587072] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.587097] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.587124] ? kasan_atomics+0x152/0x310 [ 15.587151] kasan_atomics+0x1dc/0x310 [ 15.587174] ? __pfx_kasan_atomics+0x10/0x10 [ 15.587200] ? __pfx_read_tsc+0x10/0x10 [ 15.587224] ? ktime_get_ts64+0x86/0x230 [ 15.587270] kunit_try_run_case+0x1a5/0x480 [ 15.587300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.587324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.587350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.587376] ? __kthread_parkme+0x82/0x180 [ 15.587399] ? preempt_count_sub+0x50/0x80 [ 15.587424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.587448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.587474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.587501] kthread+0x337/0x6f0 [ 15.587521] ? trace_preempt_on+0x20/0xc0 [ 15.587546] ? __pfx_kthread+0x10/0x10 [ 15.587567] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.587590] ? calculate_sigpending+0x7b/0xa0 [ 15.587615] ? __pfx_kthread+0x10/0x10 [ 15.587638] ret_from_fork+0x116/0x1d0 [ 15.587657] ? __pfx_kthread+0x10/0x10 [ 15.587678] ret_from_fork_asm+0x1a/0x30 [ 15.587710] </TASK> [ 15.587722] [ 15.600101] Allocated by task 282: [ 15.600493] kasan_save_stack+0x45/0x70 [ 15.600879] kasan_save_track+0x18/0x40 [ 15.601279] kasan_save_alloc_info+0x3b/0x50 [ 15.601543] __kasan_kmalloc+0xb7/0xc0 [ 15.601677] __kmalloc_cache_noprof+0x189/0x420 [ 15.601833] kasan_atomics+0x95/0x310 [ 15.602027] kunit_try_run_case+0x1a5/0x480 [ 15.602481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.602997] kthread+0x337/0x6f0 [ 15.603327] ret_from_fork+0x116/0x1d0 [ 15.603692] ret_from_fork_asm+0x1a/0x30 [ 15.604079] [ 15.604234] The buggy address belongs to the object at ffff888102ac2380 [ 15.604234] which belongs to the cache kmalloc-64 of size 64 [ 15.605248] The buggy address is located 0 bytes to the right of [ 15.605248] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.605913] [ 15.605999] The buggy address belongs to the physical page: [ 15.606166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.606800] flags: 0x200000000000000(node=0|zone=2) [ 15.607277] page_type: f5(slab) [ 15.607593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.608277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.608942] page dumped because: kasan: bad access detected [ 15.609457] [ 15.609612] Memory state around the buggy address: [ 15.609979] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.610478] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.610979] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.611460] ^ [ 15.611615] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.611829] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.612054] ================================================================== [ 15.333497] ================================================================== [ 15.333866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.334226] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.334566] [ 15.334679] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.334731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.334744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.334764] Call Trace: [ 15.334783] <TASK> [ 15.334800] dump_stack_lvl+0x73/0xb0 [ 15.334831] print_report+0xd1/0x650 [ 15.334854] ? __virt_addr_valid+0x1db/0x2d0 [ 15.334877] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.334900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.334923] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.335354] kasan_report+0x141/0x180 [ 15.335382] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.335411] __asan_report_store4_noabort+0x1b/0x30 [ 15.335439] kasan_atomics_helper+0x4b3a/0x5450 [ 15.335463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.335488] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.335515] ? kasan_atomics+0x152/0x310 [ 15.335555] kasan_atomics+0x1dc/0x310 [ 15.335581] ? __pfx_kasan_atomics+0x10/0x10 [ 15.335610] ? __pfx_read_tsc+0x10/0x10 [ 15.335646] ? ktime_get_ts64+0x86/0x230 [ 15.335672] kunit_try_run_case+0x1a5/0x480 [ 15.335697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.335721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.335747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.335772] ? __kthread_parkme+0x82/0x180 [ 15.335795] ? preempt_count_sub+0x50/0x80 [ 15.335820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.335846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.335872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.335898] kthread+0x337/0x6f0 [ 15.335918] ? trace_preempt_on+0x20/0xc0 [ 15.335951] ? __pfx_kthread+0x10/0x10 [ 15.335972] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.335995] ? calculate_sigpending+0x7b/0xa0 [ 15.336021] ? __pfx_kthread+0x10/0x10 [ 15.336044] ret_from_fork+0x116/0x1d0 [ 15.336063] ? __pfx_kthread+0x10/0x10 [ 15.336084] ret_from_fork_asm+0x1a/0x30 [ 15.336116] </TASK> [ 15.336137] [ 15.343403] Allocated by task 282: [ 15.343588] kasan_save_stack+0x45/0x70 [ 15.343821] kasan_save_track+0x18/0x40 [ 15.344046] kasan_save_alloc_info+0x3b/0x50 [ 15.344312] __kasan_kmalloc+0xb7/0xc0 [ 15.344525] __kmalloc_cache_noprof+0x189/0x420 [ 15.344767] kasan_atomics+0x95/0x310 [ 15.344964] kunit_try_run_case+0x1a5/0x480 [ 15.345203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.345444] kthread+0x337/0x6f0 [ 15.345581] ret_from_fork+0x116/0x1d0 [ 15.345798] ret_from_fork_asm+0x1a/0x30 [ 15.346010] [ 15.346099] The buggy address belongs to the object at ffff888102ac2380 [ 15.346099] which belongs to the cache kmalloc-64 of size 64 [ 15.346594] The buggy address is located 0 bytes to the right of [ 15.346594] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.347140] [ 15.347239] The buggy address belongs to the physical page: [ 15.347491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.347840] flags: 0x200000000000000(node=0|zone=2) [ 15.348033] page_type: f5(slab) [ 15.348156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.348404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.348631] page dumped because: kasan: bad access detected [ 15.348902] [ 15.348999] Memory state around the buggy address: [ 15.349221] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.349563] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.349878] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.350203] ^ [ 15.350453] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.350759] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.350981] ================================================================== [ 16.378798] ================================================================== [ 16.379220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.379578] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.379875] [ 16.379973] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.380015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.380027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.380049] Call Trace: [ 16.380091] <TASK> [ 16.380108] dump_stack_lvl+0x73/0xb0 [ 16.380138] print_report+0xd1/0x650 [ 16.380162] ? __virt_addr_valid+0x1db/0x2d0 [ 16.380186] ? kasan_atomics_helper+0x2006/0x5450 [ 16.380209] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.380233] ? kasan_atomics_helper+0x2006/0x5450 [ 16.380275] kasan_report+0x141/0x180 [ 16.380298] ? kasan_atomics_helper+0x2006/0x5450 [ 16.380325] kasan_check_range+0x10c/0x1c0 [ 16.380350] __kasan_check_write+0x18/0x20 [ 16.380371] kasan_atomics_helper+0x2006/0x5450 [ 16.380409] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.380433] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.380476] ? kasan_atomics+0x152/0x310 [ 16.380504] kasan_atomics+0x1dc/0x310 [ 16.380527] ? __pfx_kasan_atomics+0x10/0x10 [ 16.380552] ? __pfx_read_tsc+0x10/0x10 [ 16.380574] ? ktime_get_ts64+0x86/0x230 [ 16.380599] kunit_try_run_case+0x1a5/0x480 [ 16.380647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.380672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.380698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.380733] ? __kthread_parkme+0x82/0x180 [ 16.380755] ? preempt_count_sub+0x50/0x80 [ 16.380780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.380806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.380832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.380859] kthread+0x337/0x6f0 [ 16.380909] ? trace_preempt_on+0x20/0xc0 [ 16.380934] ? __pfx_kthread+0x10/0x10 [ 16.380967] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.380991] ? calculate_sigpending+0x7b/0xa0 [ 16.381017] ? __pfx_kthread+0x10/0x10 [ 16.381039] ret_from_fork+0x116/0x1d0 [ 16.381059] ? __pfx_kthread+0x10/0x10 [ 16.381099] ret_from_fork_asm+0x1a/0x30 [ 16.381131] </TASK> [ 16.381144] [ 16.388387] Allocated by task 282: [ 16.388522] kasan_save_stack+0x45/0x70 [ 16.388666] kasan_save_track+0x18/0x40 [ 16.388849] kasan_save_alloc_info+0x3b/0x50 [ 16.389099] __kasan_kmalloc+0xb7/0xc0 [ 16.389337] __kmalloc_cache_noprof+0x189/0x420 [ 16.389596] kasan_atomics+0x95/0x310 [ 16.389790] kunit_try_run_case+0x1a5/0x480 [ 16.390008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.390282] kthread+0x337/0x6f0 [ 16.390452] ret_from_fork+0x116/0x1d0 [ 16.390589] ret_from_fork_asm+0x1a/0x30 [ 16.390734] [ 16.390804] The buggy address belongs to the object at ffff888102ac2380 [ 16.390804] which belongs to the cache kmalloc-64 of size 64 [ 16.391314] The buggy address is located 0 bytes to the right of [ 16.391314] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.391882] [ 16.392005] The buggy address belongs to the physical page: [ 16.392230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.392476] flags: 0x200000000000000(node=0|zone=2) [ 16.392639] page_type: f5(slab) [ 16.392809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.393202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.393590] page dumped because: kasan: bad access detected [ 16.393839] [ 16.393934] Memory state around the buggy address: [ 16.394188] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.394517] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.394800] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.395022] ^ [ 16.395178] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.395510] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.395824] ================================================================== [ 15.725304] ================================================================== [ 15.726057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.726412] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.726742] [ 15.726833] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.726877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.726891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.726912] Call Trace: [ 15.726932] <TASK> [ 15.726963] dump_stack_lvl+0x73/0xb0 [ 15.726992] print_report+0xd1/0x650 [ 15.727016] ? __virt_addr_valid+0x1db/0x2d0 [ 15.727040] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.727063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.727087] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.727120] kasan_report+0x141/0x180 [ 15.727143] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.727170] __asan_report_load4_noabort+0x18/0x20 [ 15.727207] kasan_atomics_helper+0x4a36/0x5450 [ 15.727231] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.727254] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.727280] ? kasan_atomics+0x152/0x310 [ 15.727308] kasan_atomics+0x1dc/0x310 [ 15.727331] ? __pfx_kasan_atomics+0x10/0x10 [ 15.727356] ? __pfx_read_tsc+0x10/0x10 [ 15.727378] ? ktime_get_ts64+0x86/0x230 [ 15.727402] kunit_try_run_case+0x1a5/0x480 [ 15.727428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.727452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.727478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.727503] ? __kthread_parkme+0x82/0x180 [ 15.727525] ? preempt_count_sub+0x50/0x80 [ 15.727550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.727586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.727612] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.727638] kthread+0x337/0x6f0 [ 15.727658] ? trace_preempt_on+0x20/0xc0 [ 15.727682] ? __pfx_kthread+0x10/0x10 [ 15.727704] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.727727] ? calculate_sigpending+0x7b/0xa0 [ 15.727762] ? __pfx_kthread+0x10/0x10 [ 15.727784] ret_from_fork+0x116/0x1d0 [ 15.727803] ? __pfx_kthread+0x10/0x10 [ 15.727835] ret_from_fork_asm+0x1a/0x30 [ 15.727867] </TASK> [ 15.727879] [ 15.735324] Allocated by task 282: [ 15.735498] kasan_save_stack+0x45/0x70 [ 15.735701] kasan_save_track+0x18/0x40 [ 15.735864] kasan_save_alloc_info+0x3b/0x50 [ 15.736074] __kasan_kmalloc+0xb7/0xc0 [ 15.736472] __kmalloc_cache_noprof+0x189/0x420 [ 15.736629] kasan_atomics+0x95/0x310 [ 15.736761] kunit_try_run_case+0x1a5/0x480 [ 15.736906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.737092] kthread+0x337/0x6f0 [ 15.737216] ret_from_fork+0x116/0x1d0 [ 15.737348] ret_from_fork_asm+0x1a/0x30 [ 15.737531] [ 15.737697] The buggy address belongs to the object at ffff888102ac2380 [ 15.737697] which belongs to the cache kmalloc-64 of size 64 [ 15.738695] The buggy address is located 0 bytes to the right of [ 15.738695] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.739969] [ 15.740130] The buggy address belongs to the physical page: [ 15.740675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.741390] flags: 0x200000000000000(node=0|zone=2) [ 15.741831] page_type: f5(slab) [ 15.742149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.742894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.743698] page dumped because: kasan: bad access detected [ 15.744188] [ 15.744354] Memory state around the buggy address: [ 15.744815] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.745324] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.745548] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.745769] ^ [ 15.745923] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746149] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746548] ================================================================== [ 15.314452] ================================================================== [ 15.314698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.315534] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.315874] [ 15.316160] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.316209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.316222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.316244] Call Trace: [ 15.316297] <TASK> [ 15.316316] dump_stack_lvl+0x73/0xb0 [ 15.316362] print_report+0xd1/0x650 [ 15.316386] ? __virt_addr_valid+0x1db/0x2d0 [ 15.316420] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.316443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.316479] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.316502] kasan_report+0x141/0x180 [ 15.316524] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.316560] kasan_check_range+0x10c/0x1c0 [ 15.316584] __kasan_check_write+0x18/0x20 [ 15.316605] kasan_atomics_helper+0x4a0/0x5450 [ 15.316639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.316664] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.316690] ? kasan_atomics+0x152/0x310 [ 15.316727] kasan_atomics+0x1dc/0x310 [ 15.316751] ? __pfx_kasan_atomics+0x10/0x10 [ 15.316776] ? __pfx_read_tsc+0x10/0x10 [ 15.316809] ? ktime_get_ts64+0x86/0x230 [ 15.316835] kunit_try_run_case+0x1a5/0x480 [ 15.316860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.316891] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.316917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.316957] ? __kthread_parkme+0x82/0x180 [ 15.316979] ? preempt_count_sub+0x50/0x80 [ 15.317005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.317031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.317056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.317091] kthread+0x337/0x6f0 [ 15.317111] ? trace_preempt_on+0x20/0xc0 [ 15.317136] ? __pfx_kthread+0x10/0x10 [ 15.317167] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.317190] ? calculate_sigpending+0x7b/0xa0 [ 15.317215] ? __pfx_kthread+0x10/0x10 [ 15.317238] ret_from_fork+0x116/0x1d0 [ 15.317275] ? __pfx_kthread+0x10/0x10 [ 15.317297] ret_from_fork_asm+0x1a/0x30 [ 15.317329] </TASK> [ 15.317341] [ 15.325318] Allocated by task 282: [ 15.325491] kasan_save_stack+0x45/0x70 [ 15.325707] kasan_save_track+0x18/0x40 [ 15.325890] kasan_save_alloc_info+0x3b/0x50 [ 15.326051] __kasan_kmalloc+0xb7/0xc0 [ 15.326294] __kmalloc_cache_noprof+0x189/0x420 [ 15.326524] kasan_atomics+0x95/0x310 [ 15.326716] kunit_try_run_case+0x1a5/0x480 [ 15.326906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.327179] kthread+0x337/0x6f0 [ 15.327380] ret_from_fork+0x116/0x1d0 [ 15.327541] ret_from_fork_asm+0x1a/0x30 [ 15.327744] [ 15.327850] The buggy address belongs to the object at ffff888102ac2380 [ 15.327850] which belongs to the cache kmalloc-64 of size 64 [ 15.328340] The buggy address is located 0 bytes to the right of [ 15.328340] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.328841] [ 15.328947] The buggy address belongs to the physical page: [ 15.329209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.329491] flags: 0x200000000000000(node=0|zone=2) [ 15.329659] page_type: f5(slab) [ 15.329784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.330023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.330375] page dumped because: kasan: bad access detected [ 15.330645] [ 15.330746] Memory state around the buggy address: [ 15.330971] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.331308] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.331620] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.331841] ^ [ 15.332033] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.332384] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.332734] ================================================================== [ 16.049150] ================================================================== [ 16.049675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.050156] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.050446] [ 16.050551] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.050595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.050630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.050652] Call Trace: [ 16.050671] <TASK> [ 16.050693] dump_stack_lvl+0x73/0xb0 [ 16.050731] print_report+0xd1/0x650 [ 16.050755] ? __virt_addr_valid+0x1db/0x2d0 [ 16.050804] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.050827] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.050864] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.050888] kasan_report+0x141/0x180 [ 16.050911] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.050950] kasan_check_range+0x10c/0x1c0 [ 16.050975] __kasan_check_write+0x18/0x20 [ 16.050995] kasan_atomics_helper+0x16e7/0x5450 [ 16.051019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.051043] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.051069] ? kasan_atomics+0x152/0x310 [ 16.051096] kasan_atomics+0x1dc/0x310 [ 16.051118] ? __pfx_kasan_atomics+0x10/0x10 [ 16.051144] ? __pfx_read_tsc+0x10/0x10 [ 16.051166] ? ktime_get_ts64+0x86/0x230 [ 16.051191] kunit_try_run_case+0x1a5/0x480 [ 16.051216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.051240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.051266] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.051290] ? __kthread_parkme+0x82/0x180 [ 16.051313] ? preempt_count_sub+0x50/0x80 [ 16.051338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.051364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.051390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.051416] kthread+0x337/0x6f0 [ 16.051436] ? trace_preempt_on+0x20/0xc0 [ 16.051461] ? __pfx_kthread+0x10/0x10 [ 16.051482] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.051505] ? calculate_sigpending+0x7b/0xa0 [ 16.051531] ? __pfx_kthread+0x10/0x10 [ 16.051553] ret_from_fork+0x116/0x1d0 [ 16.051572] ? __pfx_kthread+0x10/0x10 [ 16.051593] ret_from_fork_asm+0x1a/0x30 [ 16.051625] </TASK> [ 16.051636] [ 16.062609] Allocated by task 282: [ 16.062763] kasan_save_stack+0x45/0x70 [ 16.062913] kasan_save_track+0x18/0x40 [ 16.063681] kasan_save_alloc_info+0x3b/0x50 [ 16.064369] __kasan_kmalloc+0xb7/0xc0 [ 16.065319] __kmalloc_cache_noprof+0x189/0x420 [ 16.065574] kasan_atomics+0x95/0x310 [ 16.065767] kunit_try_run_case+0x1a5/0x480 [ 16.066814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.067356] kthread+0x337/0x6f0 [ 16.067654] ret_from_fork+0x116/0x1d0 [ 16.068019] ret_from_fork_asm+0x1a/0x30 [ 16.068433] [ 16.068594] The buggy address belongs to the object at ffff888102ac2380 [ 16.068594] which belongs to the cache kmalloc-64 of size 64 [ 16.070439] The buggy address is located 0 bytes to the right of [ 16.070439] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.070821] [ 16.070899] The buggy address belongs to the physical page: [ 16.071085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.071333] flags: 0x200000000000000(node=0|zone=2) [ 16.071499] page_type: f5(slab) [ 16.071622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.071854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.072416] page dumped because: kasan: bad access detected [ 16.072872] [ 16.073039] Memory state around the buggy address: [ 16.073466] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.074064] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.074677] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.075293] ^ [ 16.075705] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.076329] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.076928] ================================================================== [ 15.469662] ================================================================== [ 15.469946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.470278] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.470623] [ 15.470737] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.470782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.470795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.470816] Call Trace: [ 15.470836] <TASK> [ 15.470854] dump_stack_lvl+0x73/0xb0 [ 15.470885] print_report+0xd1/0x650 [ 15.470909] ? __virt_addr_valid+0x1db/0x2d0 [ 15.470945] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.470967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.470992] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.471015] kasan_report+0x141/0x180 [ 15.471037] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.471065] kasan_check_range+0x10c/0x1c0 [ 15.471090] __kasan_check_write+0x18/0x20 [ 15.471110] kasan_atomics_helper+0x8f9/0x5450 [ 15.471134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.471158] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.471185] ? kasan_atomics+0x152/0x310 [ 15.471212] kasan_atomics+0x1dc/0x310 [ 15.471235] ? __pfx_kasan_atomics+0x10/0x10 [ 15.471261] ? __pfx_read_tsc+0x10/0x10 [ 15.471283] ? ktime_get_ts64+0x86/0x230 [ 15.471309] kunit_try_run_case+0x1a5/0x480 [ 15.471334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471358] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.471385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.471410] ? __kthread_parkme+0x82/0x180 [ 15.471432] ? preempt_count_sub+0x50/0x80 [ 15.471457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.471509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.471535] kthread+0x337/0x6f0 [ 15.471555] ? trace_preempt_on+0x20/0xc0 [ 15.471580] ? __pfx_kthread+0x10/0x10 [ 15.471602] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.471625] ? calculate_sigpending+0x7b/0xa0 [ 15.471650] ? __pfx_kthread+0x10/0x10 [ 15.471673] ret_from_fork+0x116/0x1d0 [ 15.471692] ? __pfx_kthread+0x10/0x10 [ 15.471714] ret_from_fork_asm+0x1a/0x30 [ 15.471746] </TASK> [ 15.471757] [ 15.478955] Allocated by task 282: [ 15.479084] kasan_save_stack+0x45/0x70 [ 15.479228] kasan_save_track+0x18/0x40 [ 15.479418] kasan_save_alloc_info+0x3b/0x50 [ 15.479691] __kasan_kmalloc+0xb7/0xc0 [ 15.479878] __kmalloc_cache_noprof+0x189/0x420 [ 15.480110] kasan_atomics+0x95/0x310 [ 15.480256] kunit_try_run_case+0x1a5/0x480 [ 15.480402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480576] kthread+0x337/0x6f0 [ 15.480696] ret_from_fork+0x116/0x1d0 [ 15.480883] ret_from_fork_asm+0x1a/0x30 [ 15.481091] [ 15.481189] The buggy address belongs to the object at ffff888102ac2380 [ 15.481189] which belongs to the cache kmalloc-64 of size 64 [ 15.481712] The buggy address is located 0 bytes to the right of [ 15.481712] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.482615] [ 15.482720] The buggy address belongs to the physical page: [ 15.482929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.483222] flags: 0x200000000000000(node=0|zone=2) [ 15.483384] page_type: f5(slab) [ 15.483638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.483992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.484326] page dumped because: kasan: bad access detected [ 15.484521] [ 15.484591] Memory state around the buggy address: [ 15.484747] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.484982] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.485299] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.485609] ^ [ 15.485871] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486386] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486649] ================================================================== [ 15.641957] ================================================================== [ 15.642648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.643473] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.644128] [ 15.644320] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.644367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.644380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.644402] Call Trace: [ 15.644431] <TASK> [ 15.644463] dump_stack_lvl+0x73/0xb0 [ 15.644506] print_report+0xd1/0x650 [ 15.644531] ? __virt_addr_valid+0x1db/0x2d0 [ 15.644554] ? kasan_atomics_helper+0xde0/0x5450 [ 15.644576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.644601] ? kasan_atomics_helper+0xde0/0x5450 [ 15.644624] kasan_report+0x141/0x180 [ 15.644646] ? kasan_atomics_helper+0xde0/0x5450 [ 15.644673] kasan_check_range+0x10c/0x1c0 [ 15.644697] __kasan_check_write+0x18/0x20 [ 15.644718] kasan_atomics_helper+0xde0/0x5450 [ 15.644741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.644765] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.644792] ? kasan_atomics+0x152/0x310 [ 15.644819] kasan_atomics+0x1dc/0x310 [ 15.644842] ? __pfx_kasan_atomics+0x10/0x10 [ 15.644867] ? __pfx_read_tsc+0x10/0x10 [ 15.644889] ? ktime_get_ts64+0x86/0x230 [ 15.644915] kunit_try_run_case+0x1a5/0x480 [ 15.644950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.644974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.645000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.645024] ? __kthread_parkme+0x82/0x180 [ 15.645046] ? preempt_count_sub+0x50/0x80 [ 15.645071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.645097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.645122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.645149] kthread+0x337/0x6f0 [ 15.645169] ? trace_preempt_on+0x20/0xc0 [ 15.645195] ? __pfx_kthread+0x10/0x10 [ 15.645217] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.645240] ? calculate_sigpending+0x7b/0xa0 [ 15.645275] ? __pfx_kthread+0x10/0x10 [ 15.645298] ret_from_fork+0x116/0x1d0 [ 15.645317] ? __pfx_kthread+0x10/0x10 [ 15.645339] ret_from_fork_asm+0x1a/0x30 [ 15.645371] </TASK> [ 15.645383] [ 15.658047] Allocated by task 282: [ 15.658334] kasan_save_stack+0x45/0x70 [ 15.658495] kasan_save_track+0x18/0x40 [ 15.658828] kasan_save_alloc_info+0x3b/0x50 [ 15.659124] __kasan_kmalloc+0xb7/0xc0 [ 15.659435] __kmalloc_cache_noprof+0x189/0x420 [ 15.659758] kasan_atomics+0x95/0x310 [ 15.659912] kunit_try_run_case+0x1a5/0x480 [ 15.660203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.660689] kthread+0x337/0x6f0 [ 15.660877] ret_from_fork+0x116/0x1d0 [ 15.661155] ret_from_fork_asm+0x1a/0x30 [ 15.661401] [ 15.661506] The buggy address belongs to the object at ffff888102ac2380 [ 15.661506] which belongs to the cache kmalloc-64 of size 64 [ 15.662318] The buggy address is located 0 bytes to the right of [ 15.662318] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.662943] [ 15.663026] The buggy address belongs to the physical page: [ 15.663426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.663767] flags: 0x200000000000000(node=0|zone=2) [ 15.663996] page_type: f5(slab) [ 15.664155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.664709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.665101] page dumped because: kasan: bad access detected [ 15.665419] [ 15.665540] Memory state around the buggy address: [ 15.665782] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.666103] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.666428] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.666711] ^ [ 15.666945] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.667226] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.667551] ================================================================== [ 15.784415] ================================================================== [ 15.784806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.785241] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.785580] [ 15.785718] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.785762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.785775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.785796] Call Trace: [ 15.785815] <TASK> [ 15.785844] dump_stack_lvl+0x73/0xb0 [ 15.785876] print_report+0xd1/0x650 [ 15.785899] ? __virt_addr_valid+0x1db/0x2d0 [ 15.785945] ? kasan_atomics_helper+0x1148/0x5450 [ 15.785969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.785994] ? kasan_atomics_helper+0x1148/0x5450 [ 15.786029] kasan_report+0x141/0x180 [ 15.786055] ? kasan_atomics_helper+0x1148/0x5450 [ 15.786093] kasan_check_range+0x10c/0x1c0 [ 15.786117] __kasan_check_write+0x18/0x20 [ 15.786138] kasan_atomics_helper+0x1148/0x5450 [ 15.786162] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.786194] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.786221] ? kasan_atomics+0x152/0x310 [ 15.786249] kasan_atomics+0x1dc/0x310 [ 15.786295] ? __pfx_kasan_atomics+0x10/0x10 [ 15.786320] ? __pfx_read_tsc+0x10/0x10 [ 15.786342] ? ktime_get_ts64+0x86/0x230 [ 15.786368] kunit_try_run_case+0x1a5/0x480 [ 15.786402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.786426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.786462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.786488] ? __kthread_parkme+0x82/0x180 [ 15.786511] ? preempt_count_sub+0x50/0x80 [ 15.786544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.786570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.786596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.786632] kthread+0x337/0x6f0 [ 15.786652] ? trace_preempt_on+0x20/0xc0 [ 15.786676] ? __pfx_kthread+0x10/0x10 [ 15.786711] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.786733] ? calculate_sigpending+0x7b/0xa0 [ 15.786758] ? __pfx_kthread+0x10/0x10 [ 15.786791] ret_from_fork+0x116/0x1d0 [ 15.786811] ? __pfx_kthread+0x10/0x10 [ 15.786832] ret_from_fork_asm+0x1a/0x30 [ 15.786872] </TASK> [ 15.786884] [ 15.794524] Allocated by task 282: [ 15.794708] kasan_save_stack+0x45/0x70 [ 15.794910] kasan_save_track+0x18/0x40 [ 15.795107] kasan_save_alloc_info+0x3b/0x50 [ 15.795257] __kasan_kmalloc+0xb7/0xc0 [ 15.795453] __kmalloc_cache_noprof+0x189/0x420 [ 15.795674] kasan_atomics+0x95/0x310 [ 15.795805] kunit_try_run_case+0x1a5/0x480 [ 15.795960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796135] kthread+0x337/0x6f0 [ 15.796278] ret_from_fork+0x116/0x1d0 [ 15.796471] ret_from_fork_asm+0x1a/0x30 [ 15.796698] [ 15.796795] The buggy address belongs to the object at ffff888102ac2380 [ 15.796795] which belongs to the cache kmalloc-64 of size 64 [ 15.797395] The buggy address is located 0 bytes to the right of [ 15.797395] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.797911] [ 15.798004] The buggy address belongs to the physical page: [ 15.798177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.798553] flags: 0x200000000000000(node=0|zone=2) [ 15.798758] page_type: f5(slab) [ 15.798928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.801432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.802367] page dumped because: kasan: bad access detected [ 15.802704] [ 15.802809] Memory state around the buggy address: [ 15.805098] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.806053] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.806999] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.807233] ^ [ 15.807395] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.807605] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.807812] ================================================================== [ 15.451299] ================================================================== [ 15.451672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.452376] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.452715] [ 15.452820] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.452864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.452877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.452899] Call Trace: [ 15.452918] <TASK> [ 15.452951] dump_stack_lvl+0x73/0xb0 [ 15.452985] print_report+0xd1/0x650 [ 15.453010] ? __virt_addr_valid+0x1db/0x2d0 [ 15.453034] ? kasan_atomics_helper+0x860/0x5450 [ 15.453057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.453081] ? kasan_atomics_helper+0x860/0x5450 [ 15.453105] kasan_report+0x141/0x180 [ 15.453127] ? kasan_atomics_helper+0x860/0x5450 [ 15.453154] kasan_check_range+0x10c/0x1c0 [ 15.453179] __kasan_check_write+0x18/0x20 [ 15.453200] kasan_atomics_helper+0x860/0x5450 [ 15.453224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.453248] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.453290] ? kasan_atomics+0x152/0x310 [ 15.453317] kasan_atomics+0x1dc/0x310 [ 15.453341] ? __pfx_kasan_atomics+0x10/0x10 [ 15.453367] ? __pfx_read_tsc+0x10/0x10 [ 15.453389] ? ktime_get_ts64+0x86/0x230 [ 15.453414] kunit_try_run_case+0x1a5/0x480 [ 15.453440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.453490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.453515] ? __kthread_parkme+0x82/0x180 [ 15.453538] ? preempt_count_sub+0x50/0x80 [ 15.453564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.453615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.453643] kthread+0x337/0x6f0 [ 15.453663] ? trace_preempt_on+0x20/0xc0 [ 15.453687] ? __pfx_kthread+0x10/0x10 [ 15.453709] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.453732] ? calculate_sigpending+0x7b/0xa0 [ 15.453757] ? __pfx_kthread+0x10/0x10 [ 15.453780] ret_from_fork+0x116/0x1d0 [ 15.453799] ? __pfx_kthread+0x10/0x10 [ 15.453821] ret_from_fork_asm+0x1a/0x30 [ 15.453853] </TASK> [ 15.453865] [ 15.461009] Allocated by task 282: [ 15.461192] kasan_save_stack+0x45/0x70 [ 15.461565] kasan_save_track+0x18/0x40 [ 15.461762] kasan_save_alloc_info+0x3b/0x50 [ 15.461987] __kasan_kmalloc+0xb7/0xc0 [ 15.462179] __kmalloc_cache_noprof+0x189/0x420 [ 15.462518] kasan_atomics+0x95/0x310 [ 15.462718] kunit_try_run_case+0x1a5/0x480 [ 15.462921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.463140] kthread+0x337/0x6f0 [ 15.463263] ret_from_fork+0x116/0x1d0 [ 15.463466] ret_from_fork_asm+0x1a/0x30 [ 15.463670] [ 15.463766] The buggy address belongs to the object at ffff888102ac2380 [ 15.463766] which belongs to the cache kmalloc-64 of size 64 [ 15.464229] The buggy address is located 0 bytes to the right of [ 15.464229] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.464642] [ 15.464717] The buggy address belongs to the physical page: [ 15.464889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.465258] flags: 0x200000000000000(node=0|zone=2) [ 15.465504] page_type: f5(slab) [ 15.465675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.466038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.466393] page dumped because: kasan: bad access detected [ 15.466606] [ 15.466699] Memory state around the buggy address: [ 15.466909] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.467215] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.467481] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.467693] ^ [ 15.467915] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.468246] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.468579] ================================================================== [ 16.413695] ================================================================== [ 16.414100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.414477] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.414808] [ 16.414899] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.414951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.414964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.415007] Call Trace: [ 16.415025] <TASK> [ 16.415043] dump_stack_lvl+0x73/0xb0 [ 16.415074] print_report+0xd1/0x650 [ 16.415098] ? __virt_addr_valid+0x1db/0x2d0 [ 16.415122] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.415165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.415190] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.415212] kasan_report+0x141/0x180 [ 16.415235] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.415282] kasan_check_range+0x10c/0x1c0 [ 16.415307] __kasan_check_write+0x18/0x20 [ 16.415327] kasan_atomics_helper+0x20c8/0x5450 [ 16.415351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.415375] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.415401] ? kasan_atomics+0x152/0x310 [ 16.415429] kasan_atomics+0x1dc/0x310 [ 16.415452] ? __pfx_kasan_atomics+0x10/0x10 [ 16.415502] ? __pfx_read_tsc+0x10/0x10 [ 16.415527] ? ktime_get_ts64+0x86/0x230 [ 16.415553] kunit_try_run_case+0x1a5/0x480 [ 16.415581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.415606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.415632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.415657] ? __kthread_parkme+0x82/0x180 [ 16.415679] ? preempt_count_sub+0x50/0x80 [ 16.415704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.415730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.415756] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.415783] kthread+0x337/0x6f0 [ 16.415803] ? trace_preempt_on+0x20/0xc0 [ 16.415829] ? __pfx_kthread+0x10/0x10 [ 16.415850] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.415873] ? calculate_sigpending+0x7b/0xa0 [ 16.415898] ? __pfx_kthread+0x10/0x10 [ 16.415922] ret_from_fork+0x116/0x1d0 [ 16.415950] ? __pfx_kthread+0x10/0x10 [ 16.415971] ret_from_fork_asm+0x1a/0x30 [ 16.416004] </TASK> [ 16.416015] [ 16.423541] Allocated by task 282: [ 16.423745] kasan_save_stack+0x45/0x70 [ 16.423962] kasan_save_track+0x18/0x40 [ 16.424144] kasan_save_alloc_info+0x3b/0x50 [ 16.424347] __kasan_kmalloc+0xb7/0xc0 [ 16.424493] __kmalloc_cache_noprof+0x189/0x420 [ 16.424716] kasan_atomics+0x95/0x310 [ 16.424848] kunit_try_run_case+0x1a5/0x480 [ 16.425093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.425373] kthread+0x337/0x6f0 [ 16.425546] ret_from_fork+0x116/0x1d0 [ 16.425737] ret_from_fork_asm+0x1a/0x30 [ 16.425879] [ 16.425960] The buggy address belongs to the object at ffff888102ac2380 [ 16.425960] which belongs to the cache kmalloc-64 of size 64 [ 16.426353] The buggy address is located 0 bytes to the right of [ 16.426353] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.426947] [ 16.427072] The buggy address belongs to the physical page: [ 16.427381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.427754] flags: 0x200000000000000(node=0|zone=2) [ 16.428011] page_type: f5(slab) [ 16.428165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.428422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.428732] page dumped because: kasan: bad access detected [ 16.428989] [ 16.429083] Memory state around the buggy address: [ 16.429352] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.429619] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.429833] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.430112] ^ [ 16.430368] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.430743] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.431043] ================================================================== [ 16.449105] ================================================================== [ 16.449485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.449862] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 16.450164] [ 16.450271] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.450313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.450325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.450347] Call Trace: [ 16.450365] <TASK> [ 16.450381] dump_stack_lvl+0x73/0xb0 [ 16.450412] print_report+0xd1/0x650 [ 16.450435] ? __virt_addr_valid+0x1db/0x2d0 [ 16.450484] ? kasan_atomics_helper+0x218a/0x5450 [ 16.450507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.450531] ? kasan_atomics_helper+0x218a/0x5450 [ 16.450554] kasan_report+0x141/0x180 [ 16.450594] ? kasan_atomics_helper+0x218a/0x5450 [ 16.450622] kasan_check_range+0x10c/0x1c0 [ 16.450647] __kasan_check_write+0x18/0x20 [ 16.450667] kasan_atomics_helper+0x218a/0x5450 [ 16.450691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.450721] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.450748] ? kasan_atomics+0x152/0x310 [ 16.450775] kasan_atomics+0x1dc/0x310 [ 16.450798] ? __pfx_kasan_atomics+0x10/0x10 [ 16.450823] ? __pfx_read_tsc+0x10/0x10 [ 16.450865] ? ktime_get_ts64+0x86/0x230 [ 16.450890] kunit_try_run_case+0x1a5/0x480 [ 16.450915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.450948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.450974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.450999] ? __kthread_parkme+0x82/0x180 [ 16.451021] ? preempt_count_sub+0x50/0x80 [ 16.451046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.451071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.451097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.451143] kthread+0x337/0x6f0 [ 16.451163] ? trace_preempt_on+0x20/0xc0 [ 16.451187] ? __pfx_kthread+0x10/0x10 [ 16.451209] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.451232] ? calculate_sigpending+0x7b/0xa0 [ 16.451276] ? __pfx_kthread+0x10/0x10 [ 16.451299] ret_from_fork+0x116/0x1d0 [ 16.451317] ? __pfx_kthread+0x10/0x10 [ 16.451339] ret_from_fork_asm+0x1a/0x30 [ 16.451370] </TASK> [ 16.451382] [ 16.458791] Allocated by task 282: [ 16.458921] kasan_save_stack+0x45/0x70 [ 16.459153] kasan_save_track+0x18/0x40 [ 16.459370] kasan_save_alloc_info+0x3b/0x50 [ 16.459600] __kasan_kmalloc+0xb7/0xc0 [ 16.459784] __kmalloc_cache_noprof+0x189/0x420 [ 16.459990] kasan_atomics+0x95/0x310 [ 16.460120] kunit_try_run_case+0x1a5/0x480 [ 16.460281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.460453] kthread+0x337/0x6f0 [ 16.460588] ret_from_fork+0x116/0x1d0 [ 16.460796] ret_from_fork_asm+0x1a/0x30 [ 16.461005] [ 16.461122] The buggy address belongs to the object at ffff888102ac2380 [ 16.461122] which belongs to the cache kmalloc-64 of size 64 [ 16.461697] The buggy address is located 0 bytes to the right of [ 16.461697] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 16.462242] [ 16.462333] The buggy address belongs to the physical page: [ 16.462500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 16.462820] flags: 0x200000000000000(node=0|zone=2) [ 16.463125] page_type: f5(slab) [ 16.463328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.463567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.463790] page dumped because: kasan: bad access detected [ 16.464047] [ 16.464141] Memory state around the buggy address: [ 16.464457] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.464778] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.465125] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.465408] ^ [ 16.465621] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.465824] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.466105] ================================================================== [ 15.297395] ================================================================== [ 15.297720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.298000] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.298228] [ 15.298344] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.298389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.298402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.298423] Call Trace: [ 15.298443] <TASK> [ 15.298463] dump_stack_lvl+0x73/0xb0 [ 15.298494] print_report+0xd1/0x650 [ 15.298519] ? __virt_addr_valid+0x1db/0x2d0 [ 15.298543] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.298566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.298590] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.298613] kasan_report+0x141/0x180 [ 15.298636] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.298663] __asan_report_load4_noabort+0x18/0x20 [ 15.298689] kasan_atomics_helper+0x4b54/0x5450 [ 15.298719] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.298744] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.298771] ? kasan_atomics+0x152/0x310 [ 15.298799] kasan_atomics+0x1dc/0x310 [ 15.298822] ? __pfx_kasan_atomics+0x10/0x10 [ 15.298849] ? __pfx_read_tsc+0x10/0x10 [ 15.298873] ? ktime_get_ts64+0x86/0x230 [ 15.298898] kunit_try_run_case+0x1a5/0x480 [ 15.298923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.298959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.298985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.299010] ? __kthread_parkme+0x82/0x180 [ 15.299031] ? preempt_count_sub+0x50/0x80 [ 15.299056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.299082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.299107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.299134] kthread+0x337/0x6f0 [ 15.299154] ? trace_preempt_on+0x20/0xc0 [ 15.299178] ? __pfx_kthread+0x10/0x10 [ 15.299200] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.299223] ? calculate_sigpending+0x7b/0xa0 [ 15.299248] ? __pfx_kthread+0x10/0x10 [ 15.299293] ret_from_fork+0x116/0x1d0 [ 15.299313] ? __pfx_kthread+0x10/0x10 [ 15.299334] ret_from_fork_asm+0x1a/0x30 [ 15.299366] </TASK> [ 15.299378] [ 15.306699] Allocated by task 282: [ 15.306852] kasan_save_stack+0x45/0x70 [ 15.307067] kasan_save_track+0x18/0x40 [ 15.307268] kasan_save_alloc_info+0x3b/0x50 [ 15.307483] __kasan_kmalloc+0xb7/0xc0 [ 15.307637] __kmalloc_cache_noprof+0x189/0x420 [ 15.307854] kasan_atomics+0x95/0x310 [ 15.308000] kunit_try_run_case+0x1a5/0x480 [ 15.308148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.308348] kthread+0x337/0x6f0 [ 15.308469] ret_from_fork+0x116/0x1d0 [ 15.308627] ret_from_fork_asm+0x1a/0x30 [ 15.308822] [ 15.308917] The buggy address belongs to the object at ffff888102ac2380 [ 15.308917] which belongs to the cache kmalloc-64 of size 64 [ 15.309469] The buggy address is located 0 bytes to the right of [ 15.309469] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.309850] [ 15.309923] The buggy address belongs to the physical page: [ 15.310127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.310488] flags: 0x200000000000000(node=0|zone=2) [ 15.310713] page_type: f5(slab) [ 15.310835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.311077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.311350] page dumped because: kasan: bad access detected [ 15.311623] [ 15.311719] Memory state around the buggy address: [ 15.311950] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.312296] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.312638] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.312982] ^ [ 15.313211] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.313556] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.313870] ================================================================== [ 15.925647] ================================================================== [ 15.926194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.926606] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.926916] [ 15.927080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.927125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.927138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.927160] Call Trace: [ 15.927179] <TASK> [ 15.927200] dump_stack_lvl+0x73/0xb0 [ 15.927230] print_report+0xd1/0x650 [ 15.927254] ? __virt_addr_valid+0x1db/0x2d0 [ 15.927278] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.927301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.927326] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.927350] kasan_report+0x141/0x180 [ 15.927372] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.927399] __asan_report_load8_noabort+0x18/0x20 [ 15.927425] kasan_atomics_helper+0x4eae/0x5450 [ 15.927448] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.927472] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.927508] ? kasan_atomics+0x152/0x310 [ 15.927566] kasan_atomics+0x1dc/0x310 [ 15.927590] ? __pfx_kasan_atomics+0x10/0x10 [ 15.927615] ? __pfx_read_tsc+0x10/0x10 [ 15.927648] ? ktime_get_ts64+0x86/0x230 [ 15.927674] kunit_try_run_case+0x1a5/0x480 [ 15.927699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.927724] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.927749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.927774] ? __kthread_parkme+0x82/0x180 [ 15.927796] ? preempt_count_sub+0x50/0x80 [ 15.927820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.927872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.927898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.927924] kthread+0x337/0x6f0 [ 15.927960] ? trace_preempt_on+0x20/0xc0 [ 15.927985] ? __pfx_kthread+0x10/0x10 [ 15.928007] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.928056] ? calculate_sigpending+0x7b/0xa0 [ 15.928081] ? __pfx_kthread+0x10/0x10 [ 15.928104] ret_from_fork+0x116/0x1d0 [ 15.928134] ? __pfx_kthread+0x10/0x10 [ 15.928156] ret_from_fork_asm+0x1a/0x30 [ 15.928214] </TASK> [ 15.928227] [ 15.936027] Allocated by task 282: [ 15.936239] kasan_save_stack+0x45/0x70 [ 15.936431] kasan_save_track+0x18/0x40 [ 15.936650] kasan_save_alloc_info+0x3b/0x50 [ 15.936879] __kasan_kmalloc+0xb7/0xc0 [ 15.937091] __kmalloc_cache_noprof+0x189/0x420 [ 15.937345] kasan_atomics+0x95/0x310 [ 15.937569] kunit_try_run_case+0x1a5/0x480 [ 15.937798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.938098] kthread+0x337/0x6f0 [ 15.938315] ret_from_fork+0x116/0x1d0 [ 15.938561] ret_from_fork_asm+0x1a/0x30 [ 15.938790] [ 15.938911] The buggy address belongs to the object at ffff888102ac2380 [ 15.938911] which belongs to the cache kmalloc-64 of size 64 [ 15.939630] The buggy address is located 0 bytes to the right of [ 15.939630] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.940209] [ 15.940369] The buggy address belongs to the physical page: [ 15.940539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.940838] flags: 0x200000000000000(node=0|zone=2) [ 15.941154] page_type: f5(slab) [ 15.941427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.941681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.942038] page dumped because: kasan: bad access detected [ 15.942333] [ 15.942450] Memory state around the buggy address: [ 15.942661] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.943000] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.943342] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.943680] ^ [ 15.943925] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.944247] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.944575] ================================================================== [ 15.432814] ================================================================== [ 15.433561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.433804] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282 [ 15.434367] [ 15.434575] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.434619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.434631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.434654] Call Trace: [ 15.434672] <TASK> [ 15.434690] dump_stack_lvl+0x73/0xb0 [ 15.434728] print_report+0xd1/0x650 [ 15.434752] ? __virt_addr_valid+0x1db/0x2d0 [ 15.434775] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.434799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.434823] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.434846] kasan_report+0x141/0x180 [ 15.434869] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.434896] kasan_check_range+0x10c/0x1c0 [ 15.434921] __kasan_check_write+0x18/0x20 [ 15.434954] kasan_atomics_helper+0x7c7/0x5450 [ 15.434979] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.435003] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.435030] ? kasan_atomics+0x152/0x310 [ 15.435057] kasan_atomics+0x1dc/0x310 [ 15.435080] ? __pfx_kasan_atomics+0x10/0x10 [ 15.435106] ? __pfx_read_tsc+0x10/0x10 [ 15.435129] ? ktime_get_ts64+0x86/0x230 [ 15.435154] kunit_try_run_case+0x1a5/0x480 [ 15.435179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.435204] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.435230] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.435255] ? __kthread_parkme+0x82/0x180 [ 15.435287] ? preempt_count_sub+0x50/0x80 [ 15.435313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.435339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.435365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.435392] kthread+0x337/0x6f0 [ 15.435412] ? trace_preempt_on+0x20/0xc0 [ 15.435437] ? __pfx_kthread+0x10/0x10 [ 15.435459] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.435482] ? calculate_sigpending+0x7b/0xa0 [ 15.435507] ? __pfx_kthread+0x10/0x10 [ 15.435530] ret_from_fork+0x116/0x1d0 [ 15.435549] ? __pfx_kthread+0x10/0x10 [ 15.435571] ret_from_fork_asm+0x1a/0x30 [ 15.435603] </TASK> [ 15.435615] [ 15.442796] Allocated by task 282: [ 15.442995] kasan_save_stack+0x45/0x70 [ 15.443182] kasan_save_track+0x18/0x40 [ 15.443447] kasan_save_alloc_info+0x3b/0x50 [ 15.443614] __kasan_kmalloc+0xb7/0xc0 [ 15.443792] __kmalloc_cache_noprof+0x189/0x420 [ 15.444008] kasan_atomics+0x95/0x310 [ 15.444159] kunit_try_run_case+0x1a5/0x480 [ 15.444390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.444647] kthread+0x337/0x6f0 [ 15.444781] ret_from_fork+0x116/0x1d0 [ 15.444976] ret_from_fork_asm+0x1a/0x30 [ 15.445147] [ 15.445240] The buggy address belongs to the object at ffff888102ac2380 [ 15.445240] which belongs to the cache kmalloc-64 of size 64 [ 15.445669] The buggy address is located 0 bytes to the right of [ 15.445669] allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0) [ 15.446046] [ 15.446119] The buggy address belongs to the physical page: [ 15.446300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2 [ 15.446770] flags: 0x200000000000000(node=0|zone=2) [ 15.447011] page_type: f5(slab) [ 15.447179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.447446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.447672] page dumped because: kasan: bad access detected [ 15.447841] [ 15.447910] Memory state around the buggy address: [ 15.448399] ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.448720] ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.449048] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.449501] ^ [ 15.449684] ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449956] ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.450169] ==================================================================