Date
July 16, 2025, 3:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.430475] ================================================================== [ 19.430529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.430579] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.430631] [ 19.430663] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.434977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.435044] Hardware name: linux,dummy-virt (DT) [ 19.435078] Call trace: [ 19.435102] show_stack+0x20/0x38 (C) [ 19.435159] dump_stack_lvl+0x8c/0xd0 [ 19.435212] print_report+0x118/0x5d0 [ 19.435262] kasan_report+0xdc/0x128 [ 19.435310] __asan_report_load8_noabort+0x20/0x30 [ 19.435362] kasan_atomics_helper+0x3e10/0x4858 [ 19.435413] kasan_atomics+0x198/0x2e0 [ 19.435460] kunit_try_run_case+0x170/0x3f0 [ 19.435508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.435563] kthread+0x328/0x630 [ 19.435606] ret_from_fork+0x10/0x20 [ 19.435655] [ 19.435674] Allocated by task 265: [ 19.435705] kasan_save_stack+0x3c/0x68 [ 19.436091] kasan_save_track+0x20/0x40 [ 19.436132] kasan_save_alloc_info+0x40/0x58 [ 19.436173] __kasan_kmalloc+0xd4/0xd8 [ 19.436212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.436253] kasan_atomics+0xb8/0x2e0 [ 19.436289] kunit_try_run_case+0x170/0x3f0 [ 19.436330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.436374] kthread+0x328/0x630 [ 19.436410] ret_from_fork+0x10/0x20 [ 19.436446] [ 19.436467] The buggy address belongs to the object at fff00000c595e380 [ 19.436467] which belongs to the cache kmalloc-64 of size 64 [ 19.436530] The buggy address is located 0 bytes to the right of [ 19.436530] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.436600] [ 19.436622] The buggy address belongs to the physical page: [ 19.436656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.436725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.436777] page_type: f5(slab) [ 19.436818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.436871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.436920] page dumped because: kasan: bad access detected [ 19.436959] [ 19.436978] Memory state around the buggy address: [ 19.437014] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.437060] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.437106] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.437148] ^ [ 19.437183] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.437229] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.437269] ================================================================== [ 19.273596] ================================================================== [ 19.273838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.273913] Write of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.274060] [ 19.274185] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.274280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.274308] Hardware name: linux,dummy-virt (DT) [ 19.274911] Call trace: [ 19.274957] show_stack+0x20/0x38 (C) [ 19.275019] dump_stack_lvl+0x8c/0xd0 [ 19.275104] print_report+0x118/0x5d0 [ 19.275180] kasan_report+0xdc/0x128 [ 19.275309] kasan_check_range+0x100/0x1a8 [ 19.275409] __kasan_check_write+0x20/0x30 [ 19.275493] kasan_atomics_helper+0xca0/0x4858 [ 19.275604] kasan_atomics+0x198/0x2e0 [ 19.275678] kunit_try_run_case+0x170/0x3f0 [ 19.275740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.276148] kthread+0x328/0x630 [ 19.276848] ret_from_fork+0x10/0x20 [ 19.276949] [ 19.277018] Allocated by task 265: [ 19.277097] kasan_save_stack+0x3c/0x68 [ 19.277275] kasan_save_track+0x20/0x40 [ 19.277317] kasan_save_alloc_info+0x40/0x58 [ 19.277547] __kasan_kmalloc+0xd4/0xd8 [ 19.277608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.277913] kasan_atomics+0xb8/0x2e0 [ 19.278002] kunit_try_run_case+0x170/0x3f0 [ 19.278045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.278101] kthread+0x328/0x630 [ 19.278144] ret_from_fork+0x10/0x20 [ 19.278185] [ 19.278213] The buggy address belongs to the object at fff00000c595e380 [ 19.278213] which belongs to the cache kmalloc-64 of size 64 [ 19.278279] The buggy address is located 0 bytes to the right of [ 19.278279] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.278356] [ 19.278380] The buggy address belongs to the physical page: [ 19.278414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.278489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.278552] page_type: f5(slab) [ 19.278591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.278654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.278697] page dumped because: kasan: bad access detected [ 19.278742] [ 19.278761] Memory state around the buggy address: [ 19.278795] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.278840] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.278886] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.278927] ^ [ 19.278960] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.279004] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.279157] ================================================================== [ 19.327420] ================================================================== [ 19.327553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.327602] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.327655] [ 19.327840] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.327974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.328004] Hardware name: linux,dummy-virt (DT) [ 19.328036] Call trace: [ 19.328060] show_stack+0x20/0x38 (C) [ 19.328110] dump_stack_lvl+0x8c/0xd0 [ 19.328158] print_report+0x118/0x5d0 [ 19.328204] kasan_report+0xdc/0x128 [ 19.328251] kasan_check_range+0x100/0x1a8 [ 19.328394] __kasan_check_write+0x20/0x30 [ 19.328440] kasan_atomics_helper+0xf88/0x4858 [ 19.328594] kasan_atomics+0x198/0x2e0 [ 19.328672] kunit_try_run_case+0x170/0x3f0 [ 19.328735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.328800] kthread+0x328/0x630 [ 19.328970] ret_from_fork+0x10/0x20 [ 19.329108] [ 19.329177] Allocated by task 265: [ 19.329215] kasan_save_stack+0x3c/0x68 [ 19.329279] kasan_save_track+0x20/0x40 [ 19.329330] kasan_save_alloc_info+0x40/0x58 [ 19.329373] __kasan_kmalloc+0xd4/0xd8 [ 19.329430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.329493] kasan_atomics+0xb8/0x2e0 [ 19.329577] kunit_try_run_case+0x170/0x3f0 [ 19.329618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.329663] kthread+0x328/0x630 [ 19.329698] ret_from_fork+0x10/0x20 [ 19.329765] [ 19.329890] The buggy address belongs to the object at fff00000c595e380 [ 19.329890] which belongs to the cache kmalloc-64 of size 64 [ 19.330110] The buggy address is located 0 bytes to the right of [ 19.330110] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.330212] [ 19.330327] The buggy address belongs to the physical page: [ 19.330370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.330682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.330755] page_type: f5(slab) [ 19.330839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.330895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.330939] page dumped because: kasan: bad access detected [ 19.331085] [ 19.331227] Memory state around the buggy address: [ 19.331285] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.331435] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.331585] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.331917] ^ [ 19.331988] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.332093] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.332209] ================================================================== [ 19.333116] ================================================================== [ 19.333198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.333254] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.333306] [ 19.333493] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.333738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.333778] Hardware name: linux,dummy-virt (DT) [ 19.333810] Call trace: [ 19.333942] show_stack+0x20/0x38 (C) [ 19.334088] dump_stack_lvl+0x8c/0xd0 [ 19.334188] print_report+0x118/0x5d0 [ 19.334375] kasan_report+0xdc/0x128 [ 19.334422] kasan_check_range+0x100/0x1a8 [ 19.334584] __kasan_check_write+0x20/0x30 [ 19.334656] kasan_atomics_helper+0xff0/0x4858 [ 19.334769] kasan_atomics+0x198/0x2e0 [ 19.334844] kunit_try_run_case+0x170/0x3f0 [ 19.334910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.334977] kthread+0x328/0x630 [ 19.335021] ret_from_fork+0x10/0x20 [ 19.335078] [ 19.335116] Allocated by task 265: [ 19.335148] kasan_save_stack+0x3c/0x68 [ 19.335237] kasan_save_track+0x20/0x40 [ 19.335291] kasan_save_alloc_info+0x40/0x58 [ 19.335333] __kasan_kmalloc+0xd4/0xd8 [ 19.335460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.335501] kasan_atomics+0xb8/0x2e0 [ 19.335786] kunit_try_run_case+0x170/0x3f0 [ 19.335893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.336019] kthread+0x328/0x630 [ 19.336143] ret_from_fork+0x10/0x20 [ 19.336491] [ 19.336532] The buggy address belongs to the object at fff00000c595e380 [ 19.336532] which belongs to the cache kmalloc-64 of size 64 [ 19.336600] The buggy address is located 0 bytes to the right of [ 19.336600] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.336703] [ 19.336735] The buggy address belongs to the physical page: [ 19.336782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.337118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.337275] page_type: f5(slab) [ 19.337321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.337408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.337537] page dumped because: kasan: bad access detected [ 19.337626] [ 19.338515] Memory state around the buggy address: [ 19.338558] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.338606] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.338652] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.338693] ^ [ 19.338738] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.338783] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.338825] ================================================================== [ 19.449557] ================================================================== [ 19.449616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.449786] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.449981] [ 19.450017] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.450112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.450294] Hardware name: linux,dummy-virt (DT) [ 19.450338] Call trace: [ 19.450363] show_stack+0x20/0x38 (C) [ 19.450582] dump_stack_lvl+0x8c/0xd0 [ 19.450667] print_report+0x118/0x5d0 [ 19.450731] kasan_report+0xdc/0x128 [ 19.450852] kasan_check_range+0x100/0x1a8 [ 19.450906] __kasan_check_write+0x20/0x30 [ 19.450976] kasan_atomics_helper+0x17ec/0x4858 [ 19.451339] kasan_atomics+0x198/0x2e0 [ 19.451414] kunit_try_run_case+0x170/0x3f0 [ 19.451577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.451651] kthread+0x328/0x630 [ 19.451701] ret_from_fork+0x10/0x20 [ 19.451759] [ 19.451779] Allocated by task 265: [ 19.451945] kasan_save_stack+0x3c/0x68 [ 19.452190] kasan_save_track+0x20/0x40 [ 19.452306] kasan_save_alloc_info+0x40/0x58 [ 19.452384] __kasan_kmalloc+0xd4/0xd8 [ 19.452611] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.452656] kasan_atomics+0xb8/0x2e0 [ 19.452748] kunit_try_run_case+0x170/0x3f0 [ 19.452863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.452988] kthread+0x328/0x630 [ 19.453066] ret_from_fork+0x10/0x20 [ 19.453217] [ 19.453239] The buggy address belongs to the object at fff00000c595e380 [ 19.453239] which belongs to the cache kmalloc-64 of size 64 [ 19.453440] The buggy address is located 0 bytes to the right of [ 19.453440] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.453540] [ 19.453561] The buggy address belongs to the physical page: [ 19.453603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.453693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.453992] page_type: f5(slab) [ 19.454074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.454192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.454291] page dumped because: kasan: bad access detected [ 19.454377] [ 19.454397] Memory state around the buggy address: [ 19.454432] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.454478] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.454858] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.455048] ^ [ 19.455111] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.455173] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.455318] ================================================================== [ 19.394626] ================================================================== [ 19.394750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.394815] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.395123] [ 19.395242] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.395441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.395539] Hardware name: linux,dummy-virt (DT) [ 19.395676] Call trace: [ 19.395766] show_stack+0x20/0x38 (C) [ 19.395843] dump_stack_lvl+0x8c/0xd0 [ 19.395892] print_report+0x118/0x5d0 [ 19.395961] kasan_report+0xdc/0x128 [ 19.396009] kasan_check_range+0x100/0x1a8 [ 19.396057] __kasan_check_write+0x20/0x30 [ 19.396253] kasan_atomics_helper+0x154c/0x4858 [ 19.396304] kasan_atomics+0x198/0x2e0 [ 19.396349] kunit_try_run_case+0x170/0x3f0 [ 19.396432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.396583] kthread+0x328/0x630 [ 19.396765] ret_from_fork+0x10/0x20 [ 19.397063] [ 19.397085] Allocated by task 265: [ 19.397113] kasan_save_stack+0x3c/0x68 [ 19.397164] kasan_save_track+0x20/0x40 [ 19.397270] kasan_save_alloc_info+0x40/0x58 [ 19.397365] __kasan_kmalloc+0xd4/0xd8 [ 19.397523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.397611] kasan_atomics+0xb8/0x2e0 [ 19.397918] kunit_try_run_case+0x170/0x3f0 [ 19.397963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.398008] kthread+0x328/0x630 [ 19.398043] ret_from_fork+0x10/0x20 [ 19.398081] [ 19.398102] The buggy address belongs to the object at fff00000c595e380 [ 19.398102] which belongs to the cache kmalloc-64 of size 64 [ 19.398164] The buggy address is located 0 bytes to the right of [ 19.398164] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.398231] [ 19.398254] The buggy address belongs to the physical page: [ 19.398287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.398344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.398394] page_type: f5(slab) [ 19.398433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.398487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.398530] page dumped because: kasan: bad access detected [ 19.398565] [ 19.398585] Memory state around the buggy address: [ 19.398618] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.398664] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.398720] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.398761] ^ [ 19.398795] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.398840] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.398880] ================================================================== [ 19.181108] ================================================================== [ 19.181168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.181226] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.181279] [ 19.181313] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.182192] kthread+0x328/0x630 [ 19.182864] kasan_save_track+0x20/0x40 [ 19.184738] [ 19.184903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.187567] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.189701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.189746] Hardware name: linux,dummy-virt (DT) [ 19.189824] Call trace: [ 19.189850] show_stack+0x20/0x38 (C) [ 19.189937] dump_stack_lvl+0x8c/0xd0 [ 19.190289] print_report+0x118/0x5d0 [ 19.190413] kasan_report+0xdc/0x128 [ 19.190519] kasan_check_range+0x100/0x1a8 [ 19.190608] __kasan_check_write+0x20/0x30 [ 19.190658] kasan_atomics_helper+0x934/0x4858 [ 19.190858] kasan_atomics+0x198/0x2e0 [ 19.190919] kunit_try_run_case+0x170/0x3f0 [ 19.191281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.191388] kthread+0x328/0x630 [ 19.191593] ret_from_fork+0x10/0x20 [ 19.191795] [ 19.191888] Allocated by task 265: [ 19.191967] kasan_save_stack+0x3c/0x68 [ 19.192090] kasan_save_track+0x20/0x40 [ 19.192319] kasan_save_alloc_info+0x40/0x58 [ 19.192518] __kasan_kmalloc+0xd4/0xd8 [ 19.192623] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.192704] kasan_atomics+0xb8/0x2e0 [ 19.192872] kunit_try_run_case+0x170/0x3f0 [ 19.192961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.193152] kthread+0x328/0x630 [ 19.193186] ret_from_fork+0x10/0x20 [ 19.193581] [ 19.193730] The buggy address belongs to the object at fff00000c595e380 [ 19.193730] which belongs to the cache kmalloc-64 of size 64 [ 19.193799] The buggy address is located 0 bytes to the right of [ 19.193799] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.193933] [ 19.193985] The buggy address belongs to the physical page: [ 19.194047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.194121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.194173] page_type: f5(slab) [ 19.194213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.194268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.195760] ================================================================== [ 19.263012] ================================================================== [ 19.263076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 19.263129] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.263502] [ 19.263921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.263952] Hardware name: linux,dummy-virt (DT) [ 19.263985] Call trace: [ 19.264018] show_stack+0x20/0x38 (C) [ 19.264224] dump_stack_lvl+0x8c/0xd0 [ 19.264435] print_report+0x118/0x5d0 [ 19.264679] kasan_report+0xdc/0x128 [ 19.265107] __asan_report_load4_noabort+0x20/0x30 [ 19.265276] kasan_atomics_helper+0x3de4/0x4858 [ 19.266030] kthread+0x328/0x630 [ 19.266595] [ 19.267328] kasan_save_alloc_info+0x40/0x58 [ 19.267524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.268036] kunit_try_run_case+0x170/0x3f0 [ 19.268081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.268128] kthread+0x328/0x630 [ 19.268163] ret_from_fork+0x10/0x20 [ 19.268371] [ 19.268801] The buggy address belongs to the object at fff00000c595e380 [ 19.268801] which belongs to the cache kmalloc-64 of size 64 [ 19.269009] The buggy address is located 0 bytes to the right of [ 19.269009] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.269219] [ 19.269574] The buggy address belongs to the physical page: [ 19.269869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.270046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.270416] page_type: f5(slab) [ 19.270487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.270756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.271052] page dumped because: kasan: bad access detected [ 19.271136] [ 19.271363] Memory state around the buggy address: [ 19.271531] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.271683] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.271803] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.271902] ^ [ 19.272064] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.272111] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.272158] ================================================================== [ 19.374010] ================================================================== [ 19.374146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.374200] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.374251] [ 19.374303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.374394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.374422] Hardware name: linux,dummy-virt (DT) [ 19.374454] Call trace: [ 19.374477] show_stack+0x20/0x38 (C) [ 19.374526] dump_stack_lvl+0x8c/0xd0 [ 19.374574] print_report+0x118/0x5d0 [ 19.374622] kasan_report+0xdc/0x128 [ 19.374668] kasan_check_range+0x100/0x1a8 [ 19.374739] __kasan_check_write+0x20/0x30 [ 19.374785] kasan_atomics_helper+0x1384/0x4858 [ 19.374835] kasan_atomics+0x198/0x2e0 [ 19.374881] kunit_try_run_case+0x170/0x3f0 [ 19.374929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.374984] kthread+0x328/0x630 [ 19.375027] ret_from_fork+0x10/0x20 [ 19.375074] [ 19.375102] Allocated by task 265: [ 19.375131] kasan_save_stack+0x3c/0x68 [ 19.375173] kasan_save_track+0x20/0x40 [ 19.375213] kasan_save_alloc_info+0x40/0x58 [ 19.375254] __kasan_kmalloc+0xd4/0xd8 [ 19.375293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.375334] kasan_atomics+0xb8/0x2e0 [ 19.375382] kunit_try_run_case+0x170/0x3f0 [ 19.375424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.375476] kthread+0x328/0x630 [ 19.375519] ret_from_fork+0x10/0x20 [ 19.375557] [ 19.375585] The buggy address belongs to the object at fff00000c595e380 [ 19.375585] which belongs to the cache kmalloc-64 of size 64 [ 19.375646] The buggy address is located 0 bytes to the right of [ 19.375646] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.375725] [ 19.375746] The buggy address belongs to the physical page: [ 19.375779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.375834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.375883] page_type: f5(slab) [ 19.375922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.375976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.376048] page dumped because: kasan: bad access detected [ 19.376099] [ 19.376118] Memory state around the buggy address: [ 19.376152] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.376368] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.376459] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.376599] ^ [ 19.376829] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.376891] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.376935] ================================================================== [ 19.355415] ================================================================== [ 19.355579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.355966] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.356025] [ 19.356057] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.356143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.356172] Hardware name: linux,dummy-virt (DT) [ 19.356203] Call trace: [ 19.356225] show_stack+0x20/0x38 (C) [ 19.356277] dump_stack_lvl+0x8c/0xd0 [ 19.356326] print_report+0x118/0x5d0 [ 19.356375] kasan_report+0xdc/0x128 [ 19.356423] kasan_check_range+0x100/0x1a8 [ 19.356471] __kasan_check_write+0x20/0x30 [ 19.356517] kasan_atomics_helper+0x1190/0x4858 [ 19.356567] kasan_atomics+0x198/0x2e0 [ 19.356612] kunit_try_run_case+0x170/0x3f0 [ 19.356661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.356727] kthread+0x328/0x630 [ 19.356770] ret_from_fork+0x10/0x20 [ 19.356818] [ 19.356984] Allocated by task 265: [ 19.357017] kasan_save_stack+0x3c/0x68 [ 19.357150] kasan_save_track+0x20/0x40 [ 19.357309] kasan_save_alloc_info+0x40/0x58 [ 19.357396] __kasan_kmalloc+0xd4/0xd8 [ 19.357434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.357476] kasan_atomics+0xb8/0x2e0 [ 19.357680] kunit_try_run_case+0x170/0x3f0 [ 19.357742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.357799] kthread+0x328/0x630 [ 19.357834] ret_from_fork+0x10/0x20 [ 19.357870] [ 19.357897] The buggy address belongs to the object at fff00000c595e380 [ 19.357897] which belongs to the cache kmalloc-64 of size 64 [ 19.357961] The buggy address is located 0 bytes to the right of [ 19.357961] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.358031] [ 19.358062] The buggy address belongs to the physical page: [ 19.358094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.358150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.358200] page_type: f5(slab) [ 19.358239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.358293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.358352] page dumped because: kasan: bad access detected [ 19.358388] [ 19.358407] Memory state around the buggy address: [ 19.358441] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.358496] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.358543] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.358585] ^ [ 19.358620] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.358664] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.359950] ================================================================== [ 19.377114] ================================================================== [ 19.377163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.377210] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.377263] [ 19.377291] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.377536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.377594] Hardware name: linux,dummy-virt (DT) [ 19.377631] Call trace: [ 19.377656] show_stack+0x20/0x38 (C) [ 19.377707] dump_stack_lvl+0x8c/0xd0 [ 19.377814] print_report+0x118/0x5d0 [ 19.377918] kasan_report+0xdc/0x128 [ 19.377968] __asan_report_load8_noabort+0x20/0x30 [ 19.378021] kasan_atomics_helper+0x3f04/0x4858 [ 19.378199] kasan_atomics+0x198/0x2e0 [ 19.378249] kunit_try_run_case+0x170/0x3f0 [ 19.378297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.378377] kthread+0x328/0x630 [ 19.378422] ret_from_fork+0x10/0x20 [ 19.378488] [ 19.378534] Allocated by task 265: [ 19.378599] kasan_save_stack+0x3c/0x68 [ 19.378646] kasan_save_track+0x20/0x40 [ 19.378736] kasan_save_alloc_info+0x40/0x58 [ 19.378807] __kasan_kmalloc+0xd4/0xd8 [ 19.378873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.378941] kasan_atomics+0xb8/0x2e0 [ 19.379036] kunit_try_run_case+0x170/0x3f0 [ 19.379083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.379147] kthread+0x328/0x630 [ 19.379209] ret_from_fork+0x10/0x20 [ 19.379255] [ 19.379275] The buggy address belongs to the object at fff00000c595e380 [ 19.379275] which belongs to the cache kmalloc-64 of size 64 [ 19.379338] The buggy address is located 0 bytes to the right of [ 19.379338] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.379408] [ 19.379428] The buggy address belongs to the physical page: [ 19.379461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.379518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.379570] page_type: f5(slab) [ 19.379828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.379918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.380004] page dumped because: kasan: bad access detected [ 19.380119] [ 19.380201] Memory state around the buggy address: [ 19.380528] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.380633] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.380758] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.380873] ^ [ 19.380909] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.380957] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.381159] ================================================================== [ 19.424301] ================================================================== [ 19.424403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.424457] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.424727] [ 19.424779] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.424869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.425053] Hardware name: linux,dummy-virt (DT) [ 19.425132] Call trace: [ 19.425157] show_stack+0x20/0x38 (C) [ 19.425269] dump_stack_lvl+0x8c/0xd0 [ 19.425354] print_report+0x118/0x5d0 [ 19.425412] kasan_report+0xdc/0x128 [ 19.425737] kasan_check_range+0x100/0x1a8 [ 19.425812] __kasan_check_write+0x20/0x30 [ 19.426009] kasan_atomics_helper+0x16d0/0x4858 [ 19.426217] kasan_atomics+0x198/0x2e0 [ 19.426288] kunit_try_run_case+0x170/0x3f0 [ 19.426423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.426486] kthread+0x328/0x630 [ 19.426532] ret_from_fork+0x10/0x20 [ 19.426621] [ 19.426643] Allocated by task 265: [ 19.426672] kasan_save_stack+0x3c/0x68 [ 19.426730] kasan_save_track+0x20/0x40 [ 19.426870] kasan_save_alloc_info+0x40/0x58 [ 19.426926] __kasan_kmalloc+0xd4/0xd8 [ 19.427100] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.427161] kasan_atomics+0xb8/0x2e0 [ 19.427521] kunit_try_run_case+0x170/0x3f0 [ 19.427651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.427725] kthread+0x328/0x630 [ 19.427760] ret_from_fork+0x10/0x20 [ 19.427803] [ 19.427825] The buggy address belongs to the object at fff00000c595e380 [ 19.427825] which belongs to the cache kmalloc-64 of size 64 [ 19.427892] The buggy address is located 0 bytes to the right of [ 19.427892] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.428467] [ 19.428683] The buggy address belongs to the physical page: [ 19.428782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.429076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.429156] page_type: f5(slab) [ 19.429208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.429276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.429322] page dumped because: kasan: bad access detected [ 19.429368] [ 19.429388] Memory state around the buggy address: [ 19.429839] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.429893] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.429963] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.430015] ^ [ 19.430051] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.430098] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.430141] ================================================================== [ 19.399852] ================================================================== [ 19.399905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.399953] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.400005] [ 19.400036] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.400266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.400313] Hardware name: linux,dummy-virt (DT) [ 19.400366] Call trace: [ 19.400411] show_stack+0x20/0x38 (C) [ 19.400518] dump_stack_lvl+0x8c/0xd0 [ 19.400574] print_report+0x118/0x5d0 [ 19.400659] kasan_report+0xdc/0x128 [ 19.400707] kasan_check_range+0x100/0x1a8 [ 19.400908] __kasan_check_write+0x20/0x30 [ 19.401058] kasan_atomics_helper+0x15b4/0x4858 [ 19.401132] kasan_atomics+0x198/0x2e0 [ 19.401198] kunit_try_run_case+0x170/0x3f0 [ 19.401253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.401375] kthread+0x328/0x630 [ 19.401417] ret_from_fork+0x10/0x20 [ 19.401494] [ 19.401539] Allocated by task 265: [ 19.401577] kasan_save_stack+0x3c/0x68 [ 19.401642] kasan_save_track+0x20/0x40 [ 19.401688] kasan_save_alloc_info+0x40/0x58 [ 19.401742] __kasan_kmalloc+0xd4/0xd8 [ 19.401789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.401906] kasan_atomics+0xb8/0x2e0 [ 19.401953] kunit_try_run_case+0x170/0x3f0 [ 19.401996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402042] kthread+0x328/0x630 [ 19.402077] ret_from_fork+0x10/0x20 [ 19.402115] [ 19.402281] The buggy address belongs to the object at fff00000c595e380 [ 19.402281] which belongs to the cache kmalloc-64 of size 64 [ 19.402345] The buggy address is located 0 bytes to the right of [ 19.402345] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.402512] [ 19.402592] The buggy address belongs to the physical page: [ 19.402627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.402682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.402754] page_type: f5(slab) [ 19.402794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.402848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.402892] page dumped because: kasan: bad access detected [ 19.402927] [ 19.402986] Memory state around the buggy address: [ 19.403137] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.403185] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.403238] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.403280] ^ [ 19.403314] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.403359] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.403635] ================================================================== [ 19.415087] ================================================================== [ 19.415147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.415208] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.415639] [ 19.415772] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.415910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.415993] Hardware name: linux,dummy-virt (DT) [ 19.416076] Call trace: [ 19.416139] show_stack+0x20/0x38 (C) [ 19.416205] dump_stack_lvl+0x8c/0xd0 [ 19.416523] print_report+0x118/0x5d0 [ 19.416903] kasan_report+0xdc/0x128 [ 19.417036] __asan_report_load8_noabort+0x20/0x30 [ 19.417180] kasan_atomics_helper+0x3df4/0x4858 [ 19.417393] kasan_atomics+0x198/0x2e0 [ 19.417656] kunit_try_run_case+0x170/0x3f0 [ 19.417858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.417949] kthread+0x328/0x630 [ 19.418012] ret_from_fork+0x10/0x20 [ 19.418063] [ 19.418083] Allocated by task 265: [ 19.418115] kasan_save_stack+0x3c/0x68 [ 19.418181] kasan_save_track+0x20/0x40 [ 19.418229] kasan_save_alloc_info+0x40/0x58 [ 19.418273] __kasan_kmalloc+0xd4/0xd8 [ 19.418310] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.418352] kasan_atomics+0xb8/0x2e0 [ 19.418390] kunit_try_run_case+0x170/0x3f0 [ 19.418445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.418492] kthread+0x328/0x630 [ 19.418525] ret_from_fork+0x10/0x20 [ 19.418562] [ 19.418582] The buggy address belongs to the object at fff00000c595e380 [ 19.418582] which belongs to the cache kmalloc-64 of size 64 [ 19.418646] The buggy address is located 0 bytes to the right of [ 19.418646] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.418739] [ 19.419263] The buggy address belongs to the physical page: [ 19.419762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.419836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.419889] page_type: f5(slab) [ 19.420236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.420969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.421051] page dumped because: kasan: bad access detected [ 19.421103] [ 19.421159] Memory state around the buggy address: [ 19.421367] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.421765] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.421823] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.422017] ^ [ 19.422254] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.422642] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.422789] ================================================================== [ 19.368888] ================================================================== [ 19.368943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.368990] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.369254] [ 19.369303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.369426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.369492] Hardware name: linux,dummy-virt (DT) [ 19.369534] Call trace: [ 19.369558] show_stack+0x20/0x38 (C) [ 19.369608] dump_stack_lvl+0x8c/0xd0 [ 19.369661] print_report+0x118/0x5d0 [ 19.369840] kasan_report+0xdc/0x128 [ 19.369908] kasan_check_range+0x100/0x1a8 [ 19.369996] __kasan_check_write+0x20/0x30 [ 19.370107] kasan_atomics_helper+0x12d8/0x4858 [ 19.370185] kasan_atomics+0x198/0x2e0 [ 19.370249] kunit_try_run_case+0x170/0x3f0 [ 19.370314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.370484] kthread+0x328/0x630 [ 19.370564] ret_from_fork+0x10/0x20 [ 19.370638] [ 19.370719] Allocated by task 265: [ 19.370787] kasan_save_stack+0x3c/0x68 [ 19.370829] kasan_save_track+0x20/0x40 [ 19.370924] kasan_save_alloc_info+0x40/0x58 [ 19.370966] __kasan_kmalloc+0xd4/0xd8 [ 19.371045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.371089] kasan_atomics+0xb8/0x2e0 [ 19.371125] kunit_try_run_case+0x170/0x3f0 [ 19.371166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.371407] kthread+0x328/0x630 [ 19.371513] ret_from_fork+0x10/0x20 [ 19.371626] [ 19.371765] The buggy address belongs to the object at fff00000c595e380 [ 19.371765] which belongs to the cache kmalloc-64 of size 64 [ 19.371997] The buggy address is located 0 bytes to the right of [ 19.371997] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.372067] [ 19.372088] The buggy address belongs to the physical page: [ 19.372129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.372243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.372313] page_type: f5(slab) [ 19.372350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.372404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.372448] page dumped because: kasan: bad access detected [ 19.372483] [ 19.372640] Memory state around the buggy address: [ 19.372674] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.372729] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.372776] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.372899] ^ [ 19.373113] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.373304] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.373348] ================================================================== [ 19.364939] ================================================================== [ 19.364995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.365063] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.365141] [ 19.365272] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.365424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.365453] Hardware name: linux,dummy-virt (DT) [ 19.365499] Call trace: [ 19.365523] show_stack+0x20/0x38 (C) [ 19.365573] dump_stack_lvl+0x8c/0xd0 [ 19.365627] print_report+0x118/0x5d0 [ 19.365821] kasan_report+0xdc/0x128 [ 19.366028] kasan_check_range+0x100/0x1a8 [ 19.366083] __kasan_check_write+0x20/0x30 [ 19.366149] kasan_atomics_helper+0x126c/0x4858 [ 19.366200] kasan_atomics+0x198/0x2e0 [ 19.366385] kunit_try_run_case+0x170/0x3f0 [ 19.366474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.366546] kthread+0x328/0x630 [ 19.366608] ret_from_fork+0x10/0x20 [ 19.366675] [ 19.366979] Allocated by task 265: [ 19.367034] kasan_save_stack+0x3c/0x68 [ 19.367076] kasan_save_track+0x20/0x40 [ 19.367157] kasan_save_alloc_info+0x40/0x58 [ 19.367200] __kasan_kmalloc+0xd4/0xd8 [ 19.367239] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.367289] kasan_atomics+0xb8/0x2e0 [ 19.367326] kunit_try_run_case+0x170/0x3f0 [ 19.367367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.367413] kthread+0x328/0x630 [ 19.367446] ret_from_fork+0x10/0x20 [ 19.367484] [ 19.367504] The buggy address belongs to the object at fff00000c595e380 [ 19.367504] which belongs to the cache kmalloc-64 of size 64 [ 19.367567] The buggy address is located 0 bytes to the right of [ 19.367567] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.367800] [ 19.367875] The buggy address belongs to the physical page: [ 19.367955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.368081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.368172] page_type: f5(slab) [ 19.368212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.368267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.368312] page dumped because: kasan: bad access detected [ 19.368363] [ 19.368382] Memory state around the buggy address: [ 19.368416] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.368462] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.368509] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.368551] ^ [ 19.368586] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.368635] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.368693] ================================================================== [ 19.279723] ================================================================== [ 19.279779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.279830] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.280086] [ 19.280171] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.280299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.280347] Hardware name: linux,dummy-virt (DT) [ 19.280381] Call trace: [ 19.280431] show_stack+0x20/0x38 (C) [ 19.280483] dump_stack_lvl+0x8c/0xd0 [ 19.280546] print_report+0x118/0x5d0 [ 19.280631] kasan_report+0xdc/0x128 [ 19.280681] __asan_report_load4_noabort+0x20/0x30 [ 19.280810] kasan_atomics_helper+0x3dd8/0x4858 [ 19.280871] kasan_atomics+0x198/0x2e0 [ 19.281024] kunit_try_run_case+0x170/0x3f0 [ 19.281155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.281219] kthread+0x328/0x630 [ 19.281262] ret_from_fork+0x10/0x20 [ 19.281313] [ 19.281353] Allocated by task 265: [ 19.281410] kasan_save_stack+0x3c/0x68 [ 19.281454] kasan_save_track+0x20/0x40 [ 19.281510] kasan_save_alloc_info+0x40/0x58 [ 19.281567] __kasan_kmalloc+0xd4/0xd8 [ 19.281607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.281648] kasan_atomics+0xb8/0x2e0 [ 19.281698] kunit_try_run_case+0x170/0x3f0 [ 19.281836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.281882] kthread+0x328/0x630 [ 19.282080] ret_from_fork+0x10/0x20 [ 19.282149] [ 19.282189] The buggy address belongs to the object at fff00000c595e380 [ 19.282189] which belongs to the cache kmalloc-64 of size 64 [ 19.282285] The buggy address is located 0 bytes to the right of [ 19.282285] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.282354] [ 19.282456] The buggy address belongs to the physical page: [ 19.282498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.282648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.282791] page_type: f5(slab) [ 19.282845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.282896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.283046] page dumped because: kasan: bad access detected [ 19.283089] [ 19.283223] Memory state around the buggy address: [ 19.283328] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.283422] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.283520] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.283725] ^ [ 19.283862] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.283965] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.284045] ================================================================== [ 19.386738] ================================================================== [ 19.386820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.386876] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.386957] [ 19.387006] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.387090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.387127] Hardware name: linux,dummy-virt (DT) [ 19.387239] Call trace: [ 19.387303] show_stack+0x20/0x38 (C) [ 19.387442] dump_stack_lvl+0x8c/0xd0 [ 19.387493] print_report+0x118/0x5d0 [ 19.387602] kasan_report+0xdc/0x128 [ 19.387658] kasan_check_range+0x100/0x1a8 [ 19.387707] __kasan_check_write+0x20/0x30 [ 19.387766] kasan_atomics_helper+0x147c/0x4858 [ 19.387817] kasan_atomics+0x198/0x2e0 [ 19.387863] kunit_try_run_case+0x170/0x3f0 [ 19.387923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.387977] kthread+0x328/0x630 [ 19.388028] ret_from_fork+0x10/0x20 [ 19.388077] [ 19.388320] Allocated by task 265: [ 19.388349] kasan_save_stack+0x3c/0x68 [ 19.388391] kasan_save_track+0x20/0x40 [ 19.388429] kasan_save_alloc_info+0x40/0x58 [ 19.388472] __kasan_kmalloc+0xd4/0xd8 [ 19.388509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.388551] kasan_atomics+0xb8/0x2e0 [ 19.388589] kunit_try_run_case+0x170/0x3f0 [ 19.388663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388785] kthread+0x328/0x630 [ 19.388821] ret_from_fork+0x10/0x20 [ 19.388914] [ 19.389004] The buggy address belongs to the object at fff00000c595e380 [ 19.389004] which belongs to the cache kmalloc-64 of size 64 [ 19.389199] The buggy address is located 0 bytes to the right of [ 19.389199] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.389416] [ 19.389506] The buggy address belongs to the physical page: [ 19.389580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.389674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.389771] page_type: f5(slab) [ 19.389843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.389940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.390030] page dumped because: kasan: bad access detected [ 19.390140] [ 19.390220] Memory state around the buggy address: [ 19.390344] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390497] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390645] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.390686] ^ [ 19.390729] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390774] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390813] ================================================================== [ 19.312431] ================================================================== [ 19.312504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.312556] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.312743] [ 19.312788] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.312873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.312901] Hardware name: linux,dummy-virt (DT) [ 19.312940] Call trace: [ 19.313085] show_stack+0x20/0x38 (C) [ 19.313168] dump_stack_lvl+0x8c/0xd0 [ 19.313218] print_report+0x118/0x5d0 [ 19.313268] kasan_report+0xdc/0x128 [ 19.313353] __asan_report_store8_noabort+0x20/0x30 [ 19.313436] kasan_atomics_helper+0x3e5c/0x4858 [ 19.313506] kasan_atomics+0x198/0x2e0 [ 19.313559] kunit_try_run_case+0x170/0x3f0 [ 19.313610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.313663] kthread+0x328/0x630 [ 19.313718] ret_from_fork+0x10/0x20 [ 19.313767] [ 19.313922] Allocated by task 265: [ 19.313964] kasan_save_stack+0x3c/0x68 [ 19.314007] kasan_save_track+0x20/0x40 [ 19.314237] kasan_save_alloc_info+0x40/0x58 [ 19.314322] __kasan_kmalloc+0xd4/0xd8 [ 19.314542] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.314614] kasan_atomics+0xb8/0x2e0 [ 19.314654] kunit_try_run_case+0x170/0x3f0 [ 19.314703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.314759] kthread+0x328/0x630 [ 19.314794] ret_from_fork+0x10/0x20 [ 19.314833] [ 19.314853] The buggy address belongs to the object at fff00000c595e380 [ 19.314853] which belongs to the cache kmalloc-64 of size 64 [ 19.314926] The buggy address is located 0 bytes to the right of [ 19.314926] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.314995] [ 19.315017] The buggy address belongs to the physical page: [ 19.315052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.315109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.315159] page_type: f5(slab) [ 19.315199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.315252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.315296] page dumped because: kasan: bad access detected [ 19.315344] [ 19.315364] Memory state around the buggy address: [ 19.315398] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.315444] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.315489] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.315541] ^ [ 19.315577] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.315857] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.315899] ================================================================== [ 19.343214] ================================================================== [ 19.343427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.343634] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.343857] [ 19.344066] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.344201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.344329] Hardware name: linux,dummy-virt (DT) [ 19.344399] Call trace: [ 19.344424] show_stack+0x20/0x38 (C) [ 19.344474] dump_stack_lvl+0x8c/0xd0 [ 19.344878] print_report+0x118/0x5d0 [ 19.345044] kasan_report+0xdc/0x128 [ 19.345141] kasan_check_range+0x100/0x1a8 [ 19.345394] __kasan_check_write+0x20/0x30 [ 19.345463] kasan_atomics_helper+0x10c0/0x4858 [ 19.345797] kasan_atomics+0x198/0x2e0 [ 19.345883] kunit_try_run_case+0x170/0x3f0 [ 19.345957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.346126] kthread+0x328/0x630 [ 19.346214] ret_from_fork+0x10/0x20 [ 19.346385] [ 19.346426] Allocated by task 265: [ 19.346458] kasan_save_stack+0x3c/0x68 [ 19.346535] kasan_save_track+0x20/0x40 [ 19.346913] kasan_save_alloc_info+0x40/0x58 [ 19.347019] __kasan_kmalloc+0xd4/0xd8 [ 19.347235] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.347422] kasan_atomics+0xb8/0x2e0 [ 19.347500] kunit_try_run_case+0x170/0x3f0 [ 19.347644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.347734] kthread+0x328/0x630 [ 19.347919] ret_from_fork+0x10/0x20 [ 19.348168] [ 19.348356] The buggy address belongs to the object at fff00000c595e380 [ 19.348356] which belongs to the cache kmalloc-64 of size 64 [ 19.348485] The buggy address is located 0 bytes to the right of [ 19.348485] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.348575] [ 19.348596] The buggy address belongs to the physical page: [ 19.348630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.348795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.348845] page_type: f5(slab) [ 19.348924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.348988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.349176] page dumped because: kasan: bad access detected [ 19.349299] [ 19.349358] Memory state around the buggy address: [ 19.349437] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.349522] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.349796] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.349899] ^ [ 19.349965] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.350036] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.350076] ================================================================== [ 19.437511] ================================================================== [ 19.437559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.437608] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.437659] [ 19.437691] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.438897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.439242] Hardware name: linux,dummy-virt (DT) [ 19.439353] Call trace: [ 19.440450] show_stack+0x20/0x38 (C) [ 19.440776] dump_stack_lvl+0x8c/0xd0 [ 19.440923] print_report+0x118/0x5d0 [ 19.440986] kasan_report+0xdc/0x128 [ 19.441035] kasan_check_range+0x100/0x1a8 [ 19.441085] __kasan_check_write+0x20/0x30 [ 19.441130] kasan_atomics_helper+0x175c/0x4858 [ 19.441180] kasan_atomics+0x198/0x2e0 [ 19.441228] kunit_try_run_case+0x170/0x3f0 [ 19.441275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.441335] kthread+0x328/0x630 [ 19.441379] ret_from_fork+0x10/0x20 [ 19.441427] [ 19.441448] Allocated by task 265: [ 19.441495] kasan_save_stack+0x3c/0x68 [ 19.441540] kasan_save_track+0x20/0x40 [ 19.441581] kasan_save_alloc_info+0x40/0x58 [ 19.441622] __kasan_kmalloc+0xd4/0xd8 [ 19.441662] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.441704] kasan_atomics+0xb8/0x2e0 [ 19.441771] kunit_try_run_case+0x170/0x3f0 [ 19.441812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.441866] kthread+0x328/0x630 [ 19.441902] ret_from_fork+0x10/0x20 [ 19.441939] [ 19.441969] The buggy address belongs to the object at fff00000c595e380 [ 19.441969] which belongs to the cache kmalloc-64 of size 64 [ 19.442031] The buggy address is located 0 bytes to the right of [ 19.442031] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.442100] [ 19.442122] The buggy address belongs to the physical page: [ 19.442164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.442220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.442281] page_type: f5(slab) [ 19.442343] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.442397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.442442] page dumped because: kasan: bad access detected [ 19.442493] [ 19.442513] Memory state around the buggy address: [ 19.442548] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.442603] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.442659] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.442700] ^ [ 19.443213] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.443310] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.443359] ================================================================== [ 19.306854] ================================================================== [ 19.306927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.307016] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.307079] [ 19.307114] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.307235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.307269] Hardware name: linux,dummy-virt (DT) [ 19.307364] Call trace: [ 19.307396] show_stack+0x20/0x38 (C) [ 19.307560] dump_stack_lvl+0x8c/0xd0 [ 19.307740] print_report+0x118/0x5d0 [ 19.307932] kasan_report+0xdc/0x128 [ 19.308131] kasan_check_range+0x100/0x1a8 [ 19.308309] __kasan_check_write+0x20/0x30 [ 19.308413] kasan_atomics_helper+0xe44/0x4858 [ 19.308492] kasan_atomics+0x198/0x2e0 [ 19.308578] kunit_try_run_case+0x170/0x3f0 [ 19.308678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.308792] kthread+0x328/0x630 [ 19.308835] ret_from_fork+0x10/0x20 [ 19.309129] [ 19.309157] Allocated by task 265: [ 19.309187] kasan_save_stack+0x3c/0x68 [ 19.309271] kasan_save_track+0x20/0x40 [ 19.309383] kasan_save_alloc_info+0x40/0x58 [ 19.309480] __kasan_kmalloc+0xd4/0xd8 [ 19.309573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.309648] kasan_atomics+0xb8/0x2e0 [ 19.309697] kunit_try_run_case+0x170/0x3f0 [ 19.309747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.309967] kthread+0x328/0x630 [ 19.310072] ret_from_fork+0x10/0x20 [ 19.310158] [ 19.310216] The buggy address belongs to the object at fff00000c595e380 [ 19.310216] which belongs to the cache kmalloc-64 of size 64 [ 19.310350] The buggy address is located 0 bytes to the right of [ 19.310350] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.310419] [ 19.310458] The buggy address belongs to the physical page: [ 19.310734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.310828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.310882] page_type: f5(slab) [ 19.310923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.310987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.311046] page dumped because: kasan: bad access detected [ 19.311082] [ 19.311101] Memory state around the buggy address: [ 19.311134] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.311180] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.311225] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.311267] ^ [ 19.311300] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.311346] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.311388] ================================================================== [ 19.360366] ================================================================== [ 19.360420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.360469] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.360521] [ 19.360552] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.360636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.360664] Hardware name: linux,dummy-virt (DT) [ 19.360696] Call trace: [ 19.360734] show_stack+0x20/0x38 (C) [ 19.360813] dump_stack_lvl+0x8c/0xd0 [ 19.360879] print_report+0x118/0x5d0 [ 19.360960] kasan_report+0xdc/0x128 [ 19.361007] kasan_check_range+0x100/0x1a8 [ 19.361072] __kasan_check_write+0x20/0x30 [ 19.361170] kasan_atomics_helper+0x11f8/0x4858 [ 19.361268] kasan_atomics+0x198/0x2e0 [ 19.361337] kunit_try_run_case+0x170/0x3f0 [ 19.361413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.361501] kthread+0x328/0x630 [ 19.361625] ret_from_fork+0x10/0x20 [ 19.361780] [ 19.361829] Allocated by task 265: [ 19.361888] kasan_save_stack+0x3c/0x68 [ 19.361932] kasan_save_track+0x20/0x40 [ 19.361999] kasan_save_alloc_info+0x40/0x58 [ 19.362042] __kasan_kmalloc+0xd4/0xd8 [ 19.362081] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.362139] kasan_atomics+0xb8/0x2e0 [ 19.362195] kunit_try_run_case+0x170/0x3f0 [ 19.362237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.362282] kthread+0x328/0x630 [ 19.362316] ret_from_fork+0x10/0x20 [ 19.362394] [ 19.362475] The buggy address belongs to the object at fff00000c595e380 [ 19.362475] which belongs to the cache kmalloc-64 of size 64 [ 19.362559] The buggy address is located 0 bytes to the right of [ 19.362559] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.362628] [ 19.362649] The buggy address belongs to the physical page: [ 19.362683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.362748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.362799] page_type: f5(slab) [ 19.362836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.363102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.363149] page dumped because: kasan: bad access detected [ 19.363184] [ 19.363222] Memory state around the buggy address: [ 19.363333] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.363401] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.363502] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.363670] ^ [ 19.363707] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.363760] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.363842] ================================================================== [ 19.443534] ================================================================== [ 19.443581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.443630] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.443683] [ 19.443732] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.443839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.443869] Hardware name: linux,dummy-virt (DT) [ 19.443902] Call trace: [ 19.443924] show_stack+0x20/0x38 (C) [ 19.443973] dump_stack_lvl+0x8c/0xd0 [ 19.444023] print_report+0x118/0x5d0 [ 19.444072] kasan_report+0xdc/0x128 [ 19.444379] __asan_report_load8_noabort+0x20/0x30 [ 19.444534] kasan_atomics_helper+0x3e20/0x4858 [ 19.444598] kasan_atomics+0x198/0x2e0 [ 19.445007] kunit_try_run_case+0x170/0x3f0 [ 19.445125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.445210] kthread+0x328/0x630 [ 19.445399] ret_from_fork+0x10/0x20 [ 19.445656] [ 19.445684] Allocated by task 265: [ 19.445782] kasan_save_stack+0x3c/0x68 [ 19.445839] kasan_save_track+0x20/0x40 [ 19.445955] kasan_save_alloc_info+0x40/0x58 [ 19.446061] __kasan_kmalloc+0xd4/0xd8 [ 19.446138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.446181] kasan_atomics+0xb8/0x2e0 [ 19.446227] kunit_try_run_case+0x170/0x3f0 [ 19.446265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.446313] kthread+0x328/0x630 [ 19.446346] ret_from_fork+0x10/0x20 [ 19.446616] [ 19.446793] The buggy address belongs to the object at fff00000c595e380 [ 19.446793] which belongs to the cache kmalloc-64 of size 64 [ 19.447020] The buggy address is located 0 bytes to the right of [ 19.447020] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.447100] [ 19.447171] The buggy address belongs to the physical page: [ 19.447240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.447392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.447472] page_type: f5(slab) [ 19.447695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.447765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.447982] page dumped because: kasan: bad access detected [ 19.448025] [ 19.448045] Memory state around the buggy address: [ 19.448138] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.448258] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.448344] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.448651] ^ [ 19.448727] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.448774] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.448974] ================================================================== [ 19.321158] ================================================================== [ 19.321510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.321645] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.321700] [ 19.321765] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.321878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.321935] Hardware name: linux,dummy-virt (DT) [ 19.322003] Call trace: [ 19.322048] show_stack+0x20/0x38 (C) [ 19.322097] dump_stack_lvl+0x8c/0xd0 [ 19.322164] print_report+0x118/0x5d0 [ 19.322220] kasan_report+0xdc/0x128 [ 19.322268] kasan_check_range+0x100/0x1a8 [ 19.322316] __kasan_check_write+0x20/0x30 [ 19.322462] kasan_atomics_helper+0xf20/0x4858 [ 19.322680] kasan_atomics+0x198/0x2e0 [ 19.322751] kunit_try_run_case+0x170/0x3f0 [ 19.322827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.322890] kthread+0x328/0x630 [ 19.323058] ret_from_fork+0x10/0x20 [ 19.323134] [ 19.323201] Allocated by task 265: [ 19.323319] kasan_save_stack+0x3c/0x68 [ 19.323421] kasan_save_track+0x20/0x40 [ 19.323546] kasan_save_alloc_info+0x40/0x58 [ 19.323669] __kasan_kmalloc+0xd4/0xd8 [ 19.323756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.323901] kasan_atomics+0xb8/0x2e0 [ 19.323968] kunit_try_run_case+0x170/0x3f0 [ 19.324008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.324194] kthread+0x328/0x630 [ 19.324230] ret_from_fork+0x10/0x20 [ 19.324268] [ 19.324289] The buggy address belongs to the object at fff00000c595e380 [ 19.324289] which belongs to the cache kmalloc-64 of size 64 [ 19.324489] The buggy address is located 0 bytes to the right of [ 19.324489] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.324596] [ 19.324665] The buggy address belongs to the physical page: [ 19.325087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.325247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.325333] page_type: f5(slab) [ 19.325376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.325430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.325474] page dumped because: kasan: bad access detected [ 19.325850] [ 19.325918] Memory state around the buggy address: [ 19.326030] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.326217] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.326401] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.326524] ^ [ 19.326597] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.326672] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.326723] ================================================================== [ 19.285096] ================================================================== [ 19.285164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.285241] Write of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.285294] [ 19.285329] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.285414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.285441] Hardware name: linux,dummy-virt (DT) [ 19.285474] Call trace: [ 19.285497] show_stack+0x20/0x38 (C) [ 19.285545] dump_stack_lvl+0x8c/0xd0 [ 19.285734] print_report+0x118/0x5d0 [ 19.285965] kasan_report+0xdc/0x128 [ 19.286025] kasan_check_range+0x100/0x1a8 [ 19.286076] __kasan_check_write+0x20/0x30 [ 19.286122] kasan_atomics_helper+0xd3c/0x4858 [ 19.286181] kasan_atomics+0x198/0x2e0 [ 19.286227] kunit_try_run_case+0x170/0x3f0 [ 19.286274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.286337] kthread+0x328/0x630 [ 19.286380] ret_from_fork+0x10/0x20 [ 19.286429] [ 19.286459] Allocated by task 265: [ 19.286489] kasan_save_stack+0x3c/0x68 [ 19.286533] kasan_save_track+0x20/0x40 [ 19.286573] kasan_save_alloc_info+0x40/0x58 [ 19.286624] __kasan_kmalloc+0xd4/0xd8 [ 19.286665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.287009] kasan_atomics+0xb8/0x2e0 [ 19.287330] kunit_try_run_case+0x170/0x3f0 [ 19.287429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.287515] kthread+0x328/0x630 [ 19.287587] ret_from_fork+0x10/0x20 [ 19.287628] [ 19.287651] The buggy address belongs to the object at fff00000c595e380 [ 19.287651] which belongs to the cache kmalloc-64 of size 64 [ 19.287827] The buggy address is located 0 bytes to the right of [ 19.287827] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.287902] [ 19.287924] The buggy address belongs to the physical page: [ 19.288094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.288187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.288303] page_type: f5(slab) [ 19.288474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.288684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.288825] page dumped because: kasan: bad access detected [ 19.288950] [ 19.289019] Memory state around the buggy address: [ 19.289057] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.289104] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.289427] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.289529] ^ [ 19.289595] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.289652] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.289979] ================================================================== [ 19.316037] ================================================================== [ 19.316081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.316124] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.316185] [ 19.316217] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.316300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.316328] Hardware name: linux,dummy-virt (DT) [ 19.316371] Call trace: [ 19.316394] show_stack+0x20/0x38 (C) [ 19.316441] dump_stack_lvl+0x8c/0xd0 [ 19.316489] print_report+0x118/0x5d0 [ 19.316545] kasan_report+0xdc/0x128 [ 19.316592] kasan_check_range+0x100/0x1a8 [ 19.316648] __kasan_check_write+0x20/0x30 [ 19.316693] kasan_atomics_helper+0xeb8/0x4858 [ 19.316754] kasan_atomics+0x198/0x2e0 [ 19.316798] kunit_try_run_case+0x170/0x3f0 [ 19.316846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.316900] kthread+0x328/0x630 [ 19.316945] ret_from_fork+0x10/0x20 [ 19.316992] [ 19.317013] Allocated by task 265: [ 19.317041] kasan_save_stack+0x3c/0x68 [ 19.317096] kasan_save_track+0x20/0x40 [ 19.317571] kasan_save_alloc_info+0x40/0x58 [ 19.317628] __kasan_kmalloc+0xd4/0xd8 [ 19.317670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.317750] kasan_atomics+0xb8/0x2e0 [ 19.317828] kunit_try_run_case+0x170/0x3f0 [ 19.317874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.317921] kthread+0x328/0x630 [ 19.317957] ret_from_fork+0x10/0x20 [ 19.318097] [ 19.318187] The buggy address belongs to the object at fff00000c595e380 [ 19.318187] which belongs to the cache kmalloc-64 of size 64 [ 19.318329] The buggy address is located 0 bytes to the right of [ 19.318329] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.318443] [ 19.318641] The buggy address belongs to the physical page: [ 19.318962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.319057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.319109] page_type: f5(slab) [ 19.319240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.319388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.319529] page dumped because: kasan: bad access detected [ 19.319672] [ 19.319739] Memory state around the buggy address: [ 19.319950] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.320023] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.320226] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.320325] ^ [ 19.320364] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.320422] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.320469] ================================================================== [ 19.381596] ================================================================== [ 19.381753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.381808] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.381859] [ 19.381910] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.382031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.382089] Hardware name: linux,dummy-virt (DT) [ 19.382123] Call trace: [ 19.382174] show_stack+0x20/0x38 (C) [ 19.382254] dump_stack_lvl+0x8c/0xd0 [ 19.382320] print_report+0x118/0x5d0 [ 19.382386] kasan_report+0xdc/0x128 [ 19.382449] kasan_check_range+0x100/0x1a8 [ 19.382499] __kasan_check_write+0x20/0x30 [ 19.382544] kasan_atomics_helper+0x1414/0x4858 [ 19.382620] kasan_atomics+0x198/0x2e0 [ 19.382667] kunit_try_run_case+0x170/0x3f0 [ 19.382819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.382876] kthread+0x328/0x630 [ 19.382919] ret_from_fork+0x10/0x20 [ 19.382993] [ 19.383032] Allocated by task 265: [ 19.383078] kasan_save_stack+0x3c/0x68 [ 19.383121] kasan_save_track+0x20/0x40 [ 19.383180] kasan_save_alloc_info+0x40/0x58 [ 19.383254] __kasan_kmalloc+0xd4/0xd8 [ 19.383350] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.383436] kasan_atomics+0xb8/0x2e0 [ 19.383558] kunit_try_run_case+0x170/0x3f0 [ 19.383637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.383832] kthread+0x328/0x630 [ 19.383895] ret_from_fork+0x10/0x20 [ 19.383934] [ 19.383966] The buggy address belongs to the object at fff00000c595e380 [ 19.383966] which belongs to the cache kmalloc-64 of size 64 [ 19.384034] The buggy address is located 0 bytes to the right of [ 19.384034] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.384103] [ 19.384124] The buggy address belongs to the physical page: [ 19.384157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.384213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.384445] page_type: f5(slab) [ 19.384534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.384644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.384838] page dumped because: kasan: bad access detected [ 19.384906] [ 19.385005] Memory state around the buggy address: [ 19.385307] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.385400] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.385519] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.385673] ^ [ 19.385797] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.385861] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.385900] ================================================================== [ 19.351200] ================================================================== [ 19.351305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.351406] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.351550] [ 19.351617] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.351758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.351810] Hardware name: linux,dummy-virt (DT) [ 19.351843] Call trace: [ 19.351868] show_stack+0x20/0x38 (C) [ 19.351925] dump_stack_lvl+0x8c/0xd0 [ 19.351973] print_report+0x118/0x5d0 [ 19.352340] kasan_report+0xdc/0x128 [ 19.352445] kasan_check_range+0x100/0x1a8 [ 19.352544] __kasan_check_write+0x20/0x30 [ 19.352653] kasan_atomics_helper+0x1128/0x4858 [ 19.352938] kasan_atomics+0x198/0x2e0 [ 19.353054] kunit_try_run_case+0x170/0x3f0 [ 19.353142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.353250] kthread+0x328/0x630 [ 19.353352] ret_from_fork+0x10/0x20 [ 19.353504] [ 19.353568] Allocated by task 265: [ 19.353599] kasan_save_stack+0x3c/0x68 [ 19.353640] kasan_save_track+0x20/0x40 [ 19.353680] kasan_save_alloc_info+0x40/0x58 [ 19.353738] __kasan_kmalloc+0xd4/0xd8 [ 19.353777] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.353824] kasan_atomics+0xb8/0x2e0 [ 19.353881] kunit_try_run_case+0x170/0x3f0 [ 19.353921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.353967] kthread+0x328/0x630 [ 19.354004] ret_from_fork+0x10/0x20 [ 19.354042] [ 19.354071] The buggy address belongs to the object at fff00000c595e380 [ 19.354071] which belongs to the cache kmalloc-64 of size 64 [ 19.354142] The buggy address is located 0 bytes to the right of [ 19.354142] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.354219] [ 19.354249] The buggy address belongs to the physical page: [ 19.354284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.354349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.354408] page_type: f5(slab) [ 19.354457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.354510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.354556] page dumped because: kasan: bad access detected [ 19.354591] [ 19.354611] Memory state around the buggy address: [ 19.354644] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.354699] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.354756] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.354798] ^ [ 19.354833] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.354878] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.354919] ================================================================== [ 19.290684] ================================================================== [ 19.290827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.291066] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.291134] [ 19.291183] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.291271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.291580] Hardware name: linux,dummy-virt (DT) [ 19.291677] Call trace: [ 19.291757] show_stack+0x20/0x38 (C) [ 19.291829] dump_stack_lvl+0x8c/0xd0 [ 19.291949] print_report+0x118/0x5d0 [ 19.292112] kasan_report+0xdc/0x128 [ 19.292208] __asan_report_load4_noabort+0x20/0x30 [ 19.292310] kasan_atomics_helper+0x3e04/0x4858 [ 19.292391] kasan_atomics+0x198/0x2e0 [ 19.292447] kunit_try_run_case+0x170/0x3f0 [ 19.292503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.292813] kthread+0x328/0x630 [ 19.292905] ret_from_fork+0x10/0x20 [ 19.293062] [ 19.293121] Allocated by task 265: [ 19.293197] kasan_save_stack+0x3c/0x68 [ 19.293342] kasan_save_track+0x20/0x40 [ 19.293529] kasan_save_alloc_info+0x40/0x58 [ 19.293646] __kasan_kmalloc+0xd4/0xd8 [ 19.293783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.293829] kasan_atomics+0xb8/0x2e0 [ 19.293878] kunit_try_run_case+0x170/0x3f0 [ 19.293941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.293987] kthread+0x328/0x630 [ 19.294032] ret_from_fork+0x10/0x20 [ 19.294078] [ 19.294114] The buggy address belongs to the object at fff00000c595e380 [ 19.294114] which belongs to the cache kmalloc-64 of size 64 [ 19.294179] The buggy address is located 0 bytes to the right of [ 19.294179] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.294248] [ 19.294270] The buggy address belongs to the physical page: [ 19.294305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.294361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.294413] page_type: f5(slab) [ 19.294452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.294518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.294562] page dumped because: kasan: bad access detected [ 19.294595] [ 19.294614] Memory state around the buggy address: [ 19.294646] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.294692] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.294749] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.294791] ^ [ 19.294826] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.294871] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.294912] ================================================================== [ 19.295736] ================================================================== [ 19.295818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.296051] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.296147] [ 19.296183] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.296269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.296298] Hardware name: linux,dummy-virt (DT) [ 19.296331] Call trace: [ 19.296353] show_stack+0x20/0x38 (C) [ 19.296402] dump_stack_lvl+0x8c/0xd0 [ 19.296450] print_report+0x118/0x5d0 [ 19.296498] kasan_report+0xdc/0x128 [ 19.296762] kasan_check_range+0x100/0x1a8 [ 19.296824] __kasan_check_read+0x20/0x30 [ 19.296885] kasan_atomics_helper+0xdd4/0x4858 [ 19.296968] kasan_atomics+0x198/0x2e0 [ 19.297016] kunit_try_run_case+0x170/0x3f0 [ 19.297079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.297164] kthread+0x328/0x630 [ 19.297271] ret_from_fork+0x10/0x20 [ 19.297501] [ 19.297590] Allocated by task 265: [ 19.297625] kasan_save_stack+0x3c/0x68 [ 19.297672] kasan_save_track+0x20/0x40 [ 19.297763] kasan_save_alloc_info+0x40/0x58 [ 19.297808] __kasan_kmalloc+0xd4/0xd8 [ 19.297875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.297939] kasan_atomics+0xb8/0x2e0 [ 19.297977] kunit_try_run_case+0x170/0x3f0 [ 19.298036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298112] kthread+0x328/0x630 [ 19.298148] ret_from_fork+0x10/0x20 [ 19.298187] [ 19.298207] The buggy address belongs to the object at fff00000c595e380 [ 19.298207] which belongs to the cache kmalloc-64 of size 64 [ 19.298450] The buggy address is located 0 bytes to the right of [ 19.298450] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.298529] [ 19.298550] The buggy address belongs to the physical page: [ 19.298585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.298833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.299275] page_type: f5(slab) [ 19.299447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.299557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.299602] page dumped because: kasan: bad access detected [ 19.299637] [ 19.299657] Memory state around the buggy address: [ 19.299758] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.299806] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.299852] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.299893] ^ [ 19.299928] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.299972] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.300013] ================================================================== [ 19.300362] ================================================================== [ 19.300414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.300464] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.300515] [ 19.300546] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.300627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.300656] Hardware name: linux,dummy-virt (DT) [ 19.300689] Call trace: [ 19.300726] show_stack+0x20/0x38 (C) [ 19.300775] dump_stack_lvl+0x8c/0xd0 [ 19.300828] print_report+0x118/0x5d0 [ 19.300876] kasan_report+0xdc/0x128 [ 19.300928] __asan_report_load8_noabort+0x20/0x30 [ 19.301107] kasan_atomics_helper+0x3f58/0x4858 [ 19.301235] kasan_atomics+0x198/0x2e0 [ 19.301321] kunit_try_run_case+0x170/0x3f0 [ 19.301770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.301901] kthread+0x328/0x630 [ 19.301996] ret_from_fork+0x10/0x20 [ 19.302259] [ 19.302388] Allocated by task 265: [ 19.302577] kasan_save_stack+0x3c/0x68 [ 19.302665] kasan_save_track+0x20/0x40 [ 19.302811] kasan_save_alloc_info+0x40/0x58 [ 19.302891] __kasan_kmalloc+0xd4/0xd8 [ 19.302930] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.302972] kasan_atomics+0xb8/0x2e0 [ 19.303346] kunit_try_run_case+0x170/0x3f0 [ 19.303784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.303985] kthread+0x328/0x630 [ 19.304065] ret_from_fork+0x10/0x20 [ 19.304251] [ 19.304291] The buggy address belongs to the object at fff00000c595e380 [ 19.304291] which belongs to the cache kmalloc-64 of size 64 [ 19.304371] The buggy address is located 0 bytes to the right of [ 19.304371] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.304447] [ 19.304470] The buggy address belongs to the physical page: [ 19.304560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.304635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.304730] page_type: f5(slab) [ 19.304772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.304840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.304896] page dumped because: kasan: bad access detected [ 19.305113] [ 19.305209] Memory state around the buggy address: [ 19.305296] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305344] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.305390] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.305431] ^ [ 19.305466] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.305510] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.305695] ================================================================== [ 19.404184] ================================================================== [ 19.404276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.404454] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.404509] [ 19.404539] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.404620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.404650] Hardware name: linux,dummy-virt (DT) [ 19.404680] Call trace: [ 19.404704] show_stack+0x20/0x38 (C) [ 19.404765] dump_stack_lvl+0x8c/0xd0 [ 19.404814] print_report+0x118/0x5d0 [ 19.405046] kasan_report+0xdc/0x128 [ 19.405133] __asan_report_load8_noabort+0x20/0x30 [ 19.405217] kasan_atomics_helper+0x3db0/0x4858 [ 19.405268] kasan_atomics+0x198/0x2e0 [ 19.405362] kunit_try_run_case+0x170/0x3f0 [ 19.405411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.405466] kthread+0x328/0x630 [ 19.405510] ret_from_fork+0x10/0x20 [ 19.405558] [ 19.405578] Allocated by task 265: [ 19.405617] kasan_save_stack+0x3c/0x68 [ 19.405659] kasan_save_track+0x20/0x40 [ 19.405703] kasan_save_alloc_info+0x40/0x58 [ 19.405756] __kasan_kmalloc+0xd4/0xd8 [ 19.405795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.405836] kasan_atomics+0xb8/0x2e0 [ 19.405873] kunit_try_run_case+0x170/0x3f0 [ 19.405913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.405959] kthread+0x328/0x630 [ 19.405992] ret_from_fork+0x10/0x20 [ 19.406029] [ 19.406049] The buggy address belongs to the object at fff00000c595e380 [ 19.406049] which belongs to the cache kmalloc-64 of size 64 [ 19.406110] The buggy address is located 0 bytes to the right of [ 19.406110] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.406179] [ 19.406210] The buggy address belongs to the physical page: [ 19.406242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.406308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.406361] page_type: f5(slab) [ 19.406407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.406467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.406512] page dumped because: kasan: bad access detected [ 19.406550] [ 19.406569] Memory state around the buggy address: [ 19.406602] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406652] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406698] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.406749] ^ [ 19.406784] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.406827] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.406867] ================================================================== [ 19.339017] ================================================================== [ 19.339066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.339114] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.339165] [ 19.339197] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.339755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.339788] Hardware name: linux,dummy-virt (DT) [ 19.339821] Call trace: [ 19.339846] show_stack+0x20/0x38 (C) [ 19.339896] dump_stack_lvl+0x8c/0xd0 [ 19.339946] print_report+0x118/0x5d0 [ 19.339992] kasan_report+0xdc/0x128 [ 19.340041] kasan_check_range+0x100/0x1a8 [ 19.340091] __kasan_check_write+0x20/0x30 [ 19.340137] kasan_atomics_helper+0x1058/0x4858 [ 19.340187] kasan_atomics+0x198/0x2e0 [ 19.340232] kunit_try_run_case+0x170/0x3f0 [ 19.340281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.340335] kthread+0x328/0x630 [ 19.340376] ret_from_fork+0x10/0x20 [ 19.340424] [ 19.340445] Allocated by task 265: [ 19.340473] kasan_save_stack+0x3c/0x68 [ 19.340516] kasan_save_track+0x20/0x40 [ 19.340556] kasan_save_alloc_info+0x40/0x58 [ 19.340597] __kasan_kmalloc+0xd4/0xd8 [ 19.340639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.340683] kasan_atomics+0xb8/0x2e0 [ 19.340732] kunit_try_run_case+0x170/0x3f0 [ 19.341140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.341200] kthread+0x328/0x630 [ 19.341393] ret_from_fork+0x10/0x20 [ 19.341504] [ 19.341527] The buggy address belongs to the object at fff00000c595e380 [ 19.341527] which belongs to the cache kmalloc-64 of size 64 [ 19.341592] The buggy address is located 0 bytes to the right of [ 19.341592] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.341660] [ 19.341696] The buggy address belongs to the physical page: [ 19.341738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.341808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.341868] page_type: f5(slab) [ 19.341921] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.341976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.342020] page dumped because: kasan: bad access detected [ 19.342076] [ 19.342105] Memory state around the buggy address: [ 19.342147] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.342194] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.342240] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.342282] ^ [ 19.342325] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.342385] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.342425] ================================================================== [ 19.406987] ================================================================== [ 19.407029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.407408] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.407463] [ 19.407507] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.407601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.407629] Hardware name: linux,dummy-virt (DT) [ 19.407662] Call trace: [ 19.407685] show_stack+0x20/0x38 (C) [ 19.407765] dump_stack_lvl+0x8c/0xd0 [ 19.407922] print_report+0x118/0x5d0 [ 19.408261] kasan_report+0xdc/0x128 [ 19.408400] kasan_check_range+0x100/0x1a8 [ 19.408508] __kasan_check_write+0x20/0x30 [ 19.408615] kasan_atomics_helper+0x1644/0x4858 [ 19.408742] kasan_atomics+0x198/0x2e0 [ 19.408895] kunit_try_run_case+0x170/0x3f0 [ 19.408986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.409128] kthread+0x328/0x630 [ 19.409237] ret_from_fork+0x10/0x20 [ 19.409413] [ 19.409480] Allocated by task 265: [ 19.409520] kasan_save_stack+0x3c/0x68 [ 19.409561] kasan_save_track+0x20/0x40 [ 19.410226] kasan_save_alloc_info+0x40/0x58 [ 19.410276] __kasan_kmalloc+0xd4/0xd8 [ 19.410317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.410359] kasan_atomics+0xb8/0x2e0 [ 19.410395] kunit_try_run_case+0x170/0x3f0 [ 19.410436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.410482] kthread+0x328/0x630 [ 19.410515] ret_from_fork+0x10/0x20 [ 19.410553] [ 19.410574] The buggy address belongs to the object at fff00000c595e380 [ 19.410574] which belongs to the cache kmalloc-64 of size 64 [ 19.410636] The buggy address is located 0 bytes to the right of [ 19.410636] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.410705] [ 19.410763] The buggy address belongs to the physical page: [ 19.410837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.410945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.410997] page_type: f5(slab) [ 19.411042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.412089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.412648] page dumped because: kasan: bad access detected [ 19.412977] [ 19.413028] Memory state around the buggy address: [ 19.413069] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.413118] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.413172] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.413231] ^ [ 19.413277] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.413332] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.413374] ================================================================== [ 19.391703] ================================================================== [ 19.392009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.392059] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265 [ 19.392345] [ 19.392381] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.392493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.392523] Hardware name: linux,dummy-virt (DT) [ 19.392566] Call trace: [ 19.392592] show_stack+0x20/0x38 (C) [ 19.392649] dump_stack_lvl+0x8c/0xd0 [ 19.392700] print_report+0x118/0x5d0 [ 19.392758] kasan_report+0xdc/0x128 [ 19.392805] kasan_check_range+0x100/0x1a8 [ 19.392861] __kasan_check_write+0x20/0x30 [ 19.392909] kasan_atomics_helper+0x14e4/0x4858 [ 19.392963] kasan_atomics+0x198/0x2e0 [ 19.393009] kunit_try_run_case+0x170/0x3f0 [ 19.393057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393112] kthread+0x328/0x630 [ 19.393154] ret_from_fork+0x10/0x20 [ 19.393212] [ 19.393241] Allocated by task 265: [ 19.393278] kasan_save_stack+0x3c/0x68 [ 19.393336] kasan_save_track+0x20/0x40 [ 19.393376] kasan_save_alloc_info+0x40/0x58 [ 19.393420] __kasan_kmalloc+0xd4/0xd8 [ 19.393458] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.393500] kasan_atomics+0xb8/0x2e0 [ 19.393538] kunit_try_run_case+0x170/0x3f0 [ 19.393578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393623] kthread+0x328/0x630 [ 19.393663] ret_from_fork+0x10/0x20 [ 19.393702] [ 19.393731] The buggy address belongs to the object at fff00000c595e380 [ 19.393731] which belongs to the cache kmalloc-64 of size 64 [ 19.393792] The buggy address is located 0 bytes to the right of [ 19.393792] allocated 48-byte region [fff00000c595e380, fff00000c595e3b0) [ 19.393860] [ 19.393882] The buggy address belongs to the physical page: [ 19.393916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 19.393971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.394020] page_type: f5(slab) [ 19.394059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.394136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.394182] page dumped because: kasan: bad access detected [ 19.394216] [ 19.394235] Memory state around the buggy address: [ 19.394269] fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394316] fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394362] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.394404] ^ [ 19.394438] fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.394484] fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.394522] ==================================================================
[ 15.669639] ================================================================== [ 15.669960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.671952] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.672457] [ 15.672555] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.672606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.672621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.672645] Call Trace: [ 15.672663] <TASK> [ 15.672680] dump_stack_lvl+0x73/0xb0 [ 15.672714] print_report+0xd1/0x610 [ 15.672739] ? __virt_addr_valid+0x1db/0x2d0 [ 15.672779] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.672805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.672833] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.672857] kasan_report+0x141/0x180 [ 15.672881] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.672910] __asan_report_load4_noabort+0x18/0x20 [ 15.672937] kasan_atomics_helper+0x4a1c/0x5450 [ 15.672962] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.672987] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.673014] ? kasan_atomics+0x152/0x310 [ 15.673043] kasan_atomics+0x1dc/0x310 [ 15.673066] ? __pfx_kasan_atomics+0x10/0x10 [ 15.673093] ? __pfx_read_tsc+0x10/0x10 [ 15.673116] ? ktime_get_ts64+0x86/0x230 [ 15.673143] kunit_try_run_case+0x1a5/0x480 [ 15.673171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.673196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.673224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.673250] ? __kthread_parkme+0x82/0x180 [ 15.673273] ? preempt_count_sub+0x50/0x80 [ 15.673299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.673327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.673354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.673381] kthread+0x337/0x6f0 [ 15.673402] ? trace_preempt_on+0x20/0xc0 [ 15.673427] ? __pfx_kthread+0x10/0x10 [ 15.673450] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.673473] ? calculate_sigpending+0x7b/0xa0 [ 15.673500] ? __pfx_kthread+0x10/0x10 [ 15.673523] ret_from_fork+0x116/0x1d0 [ 15.673544] ? __pfx_kthread+0x10/0x10 [ 15.673566] ret_from_fork_asm+0x1a/0x30 [ 15.673600] </TASK> [ 15.673611] [ 15.687650] Allocated by task 282: [ 15.687872] kasan_save_stack+0x45/0x70 [ 15.688085] kasan_save_track+0x18/0x40 [ 15.688270] kasan_save_alloc_info+0x3b/0x50 [ 15.688458] __kasan_kmalloc+0xb7/0xc0 [ 15.689008] __kmalloc_cache_noprof+0x189/0x420 [ 15.689338] kasan_atomics+0x95/0x310 [ 15.689606] kunit_try_run_case+0x1a5/0x480 [ 15.689900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.690241] kthread+0x337/0x6f0 [ 15.690483] ret_from_fork+0x116/0x1d0 [ 15.690705] ret_from_fork_asm+0x1a/0x30 [ 15.691010] [ 15.691276] The buggy address belongs to the object at ffff888103082e00 [ 15.691276] which belongs to the cache kmalloc-64 of size 64 [ 15.691916] The buggy address is located 0 bytes to the right of [ 15.691916] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.692642] [ 15.692781] The buggy address belongs to the physical page: [ 15.693168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.693659] flags: 0x200000000000000(node=0|zone=2) [ 15.693908] page_type: f5(slab) [ 15.694228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.694713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.695059] page dumped because: kasan: bad access detected [ 15.695401] [ 15.695640] Memory state around the buggy address: [ 15.695918] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.696261] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.696769] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.697162] ^ [ 15.697408] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698010] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698403] ================================================================== [ 16.465927] ================================================================== [ 16.466270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.466630] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.467008] [ 16.467113] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.467159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.467484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.467584] Call Trace: [ 16.467605] <TASK> [ 16.467635] dump_stack_lvl+0x73/0xb0 [ 16.467682] print_report+0xd1/0x610 [ 16.467721] ? __virt_addr_valid+0x1db/0x2d0 [ 16.467787] ? kasan_atomics_helper+0x218a/0x5450 [ 16.467970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.468080] ? kasan_atomics_helper+0x218a/0x5450 [ 16.468166] kasan_report+0x141/0x180 [ 16.468286] ? kasan_atomics_helper+0x218a/0x5450 [ 16.468628] kasan_check_range+0x10c/0x1c0 [ 16.468671] __kasan_check_write+0x18/0x20 [ 16.468707] kasan_atomics_helper+0x218a/0x5450 [ 16.468733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.468782] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.468811] ? kasan_atomics+0x152/0x310 [ 16.468852] kasan_atomics+0x1dc/0x310 [ 16.468877] ? __pfx_kasan_atomics+0x10/0x10 [ 16.468903] ? __pfx_read_tsc+0x10/0x10 [ 16.468926] ? ktime_get_ts64+0x86/0x230 [ 16.468953] kunit_try_run_case+0x1a5/0x480 [ 16.468979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.469004] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.469031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.469058] ? __kthread_parkme+0x82/0x180 [ 16.469081] ? preempt_count_sub+0x50/0x80 [ 16.469106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.469133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.469160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.469188] kthread+0x337/0x6f0 [ 16.469209] ? trace_preempt_on+0x20/0xc0 [ 16.469234] ? __pfx_kthread+0x10/0x10 [ 16.469256] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.469280] ? calculate_sigpending+0x7b/0xa0 [ 16.469306] ? __pfx_kthread+0x10/0x10 [ 16.469329] ret_from_fork+0x116/0x1d0 [ 16.469349] ? __pfx_kthread+0x10/0x10 [ 16.469371] ret_from_fork_asm+0x1a/0x30 [ 16.469404] </TASK> [ 16.469416] [ 16.480752] Allocated by task 282: [ 16.481121] kasan_save_stack+0x45/0x70 [ 16.481344] kasan_save_track+0x18/0x40 [ 16.481713] kasan_save_alloc_info+0x3b/0x50 [ 16.481963] __kasan_kmalloc+0xb7/0xc0 [ 16.482268] __kmalloc_cache_noprof+0x189/0x420 [ 16.482635] kasan_atomics+0x95/0x310 [ 16.482922] kunit_try_run_case+0x1a5/0x480 [ 16.483149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.483402] kthread+0x337/0x6f0 [ 16.483753] ret_from_fork+0x116/0x1d0 [ 16.484024] ret_from_fork_asm+0x1a/0x30 [ 16.484296] [ 16.484541] The buggy address belongs to the object at ffff888103082e00 [ 16.484541] which belongs to the cache kmalloc-64 of size 64 [ 16.485207] The buggy address is located 0 bytes to the right of [ 16.485207] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.485891] [ 16.486123] The buggy address belongs to the physical page: [ 16.486372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.486987] flags: 0x200000000000000(node=0|zone=2) [ 16.487212] page_type: f5(slab) [ 16.487599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.488062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.488371] page dumped because: kasan: bad access detected [ 16.488805] [ 16.488965] Memory state around the buggy address: [ 16.489342] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.489834] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.490171] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.490644] ^ [ 16.490984] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.491277] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.491736] ================================================================== [ 16.444459] ================================================================== [ 16.445214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.445659] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.445996] [ 16.446361] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.446428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.446454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.446477] Call Trace: [ 16.446494] <TASK> [ 16.446511] dump_stack_lvl+0x73/0xb0 [ 16.446543] print_report+0xd1/0x610 [ 16.446568] ? __virt_addr_valid+0x1db/0x2d0 [ 16.446593] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.446617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.446643] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.446668] kasan_report+0x141/0x180 [ 16.446692] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.446721] __asan_report_load8_noabort+0x18/0x20 [ 16.446749] kasan_atomics_helper+0x4fb2/0x5450 [ 16.446784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.446810] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.446837] ? kasan_atomics+0x152/0x310 [ 16.446865] kasan_atomics+0x1dc/0x310 [ 16.446890] ? __pfx_kasan_atomics+0x10/0x10 [ 16.446915] ? __pfx_read_tsc+0x10/0x10 [ 16.446938] ? ktime_get_ts64+0x86/0x230 [ 16.446965] kunit_try_run_case+0x1a5/0x480 [ 16.446992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.447018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.447044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.447070] ? __kthread_parkme+0x82/0x180 [ 16.447092] ? preempt_count_sub+0x50/0x80 [ 16.447118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.447145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.447172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.447204] kthread+0x337/0x6f0 [ 16.447225] ? trace_preempt_on+0x20/0xc0 [ 16.447250] ? __pfx_kthread+0x10/0x10 [ 16.447273] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.447297] ? calculate_sigpending+0x7b/0xa0 [ 16.447323] ? __pfx_kthread+0x10/0x10 [ 16.447346] ret_from_fork+0x116/0x1d0 [ 16.447366] ? __pfx_kthread+0x10/0x10 [ 16.447388] ret_from_fork_asm+0x1a/0x30 [ 16.447421] </TASK> [ 16.447431] [ 16.456113] Allocated by task 282: [ 16.456252] kasan_save_stack+0x45/0x70 [ 16.456439] kasan_save_track+0x18/0x40 [ 16.456603] kasan_save_alloc_info+0x3b/0x50 [ 16.456837] __kasan_kmalloc+0xb7/0xc0 [ 16.456976] __kmalloc_cache_noprof+0x189/0x420 [ 16.457133] kasan_atomics+0x95/0x310 [ 16.457269] kunit_try_run_case+0x1a5/0x480 [ 16.457464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.457760] kthread+0x337/0x6f0 [ 16.457890] ret_from_fork+0x116/0x1d0 [ 16.458025] ret_from_fork_asm+0x1a/0x30 [ 16.458216] [ 16.458313] The buggy address belongs to the object at ffff888103082e00 [ 16.458313] which belongs to the cache kmalloc-64 of size 64 [ 16.460090] The buggy address is located 0 bytes to the right of [ 16.460090] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.460837] [ 16.460946] The buggy address belongs to the physical page: [ 16.461232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.461489] flags: 0x200000000000000(node=0|zone=2) [ 16.461887] page_type: f5(slab) [ 16.462128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.462362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.462797] page dumped because: kasan: bad access detected [ 16.462985] [ 16.463057] Memory state around the buggy address: [ 16.463216] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.463429] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.463784] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.464120] ^ [ 16.464555] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.465151] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.465375] ================================================================== [ 16.121475] ================================================================== [ 16.121862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.122187] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.122537] [ 16.122646] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.122690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.122704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.122726] Call Trace: [ 16.122739] <TASK> [ 16.122753] dump_stack_lvl+0x73/0xb0 [ 16.122794] print_report+0xd1/0x610 [ 16.122818] ? __virt_addr_valid+0x1db/0x2d0 [ 16.122843] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.122866] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.122892] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.122917] kasan_report+0x141/0x180 [ 16.122941] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.122969] kasan_check_range+0x10c/0x1c0 [ 16.122996] __kasan_check_write+0x18/0x20 [ 16.123018] kasan_atomics_helper+0x1a7f/0x5450 [ 16.123043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.123069] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.123098] ? kasan_atomics+0x152/0x310 [ 16.123127] kasan_atomics+0x1dc/0x310 [ 16.123152] ? __pfx_kasan_atomics+0x10/0x10 [ 16.123185] ? __pfx_read_tsc+0x10/0x10 [ 16.123208] ? ktime_get_ts64+0x86/0x230 [ 16.123234] kunit_try_run_case+0x1a5/0x480 [ 16.123260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.123285] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.123312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.123338] ? __kthread_parkme+0x82/0x180 [ 16.123361] ? preempt_count_sub+0x50/0x80 [ 16.123387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.123414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.123440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.123467] kthread+0x337/0x6f0 [ 16.123489] ? trace_preempt_on+0x20/0xc0 [ 16.123514] ? __pfx_kthread+0x10/0x10 [ 16.123536] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.123559] ? calculate_sigpending+0x7b/0xa0 [ 16.123585] ? __pfx_kthread+0x10/0x10 [ 16.123609] ret_from_fork+0x116/0x1d0 [ 16.123629] ? __pfx_kthread+0x10/0x10 [ 16.123651] ret_from_fork_asm+0x1a/0x30 [ 16.123683] </TASK> [ 16.123694] [ 16.132411] Allocated by task 282: [ 16.132607] kasan_save_stack+0x45/0x70 [ 16.132822] kasan_save_track+0x18/0x40 [ 16.132986] kasan_save_alloc_info+0x3b/0x50 [ 16.133157] __kasan_kmalloc+0xb7/0xc0 [ 16.133330] __kmalloc_cache_noprof+0x189/0x420 [ 16.133528] kasan_atomics+0x95/0x310 [ 16.133695] kunit_try_run_case+0x1a5/0x480 [ 16.134751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.135576] kthread+0x337/0x6f0 [ 16.136168] ret_from_fork+0x116/0x1d0 [ 16.136772] ret_from_fork_asm+0x1a/0x30 [ 16.137364] [ 16.137796] The buggy address belongs to the object at ffff888103082e00 [ 16.137796] which belongs to the cache kmalloc-64 of size 64 [ 16.139485] The buggy address is located 0 bytes to the right of [ 16.139485] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.141172] [ 16.141531] The buggy address belongs to the physical page: [ 16.142234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.143182] flags: 0x200000000000000(node=0|zone=2) [ 16.143884] page_type: f5(slab) [ 16.144361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.145300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.146236] page dumped because: kasan: bad access detected [ 16.146649] [ 16.146856] Memory state around the buggy address: [ 16.147025] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.147257] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.147541] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.148400] ^ [ 16.148933] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.149667] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.150356] ================================================================== [ 15.564656] ================================================================== [ 15.565337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.566010] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.566302] [ 15.566388] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.566459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.566473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.566495] Call Trace: [ 15.566512] <TASK> [ 15.566529] dump_stack_lvl+0x73/0xb0 [ 15.566560] print_report+0xd1/0x610 [ 15.566585] ? __virt_addr_valid+0x1db/0x2d0 [ 15.566611] ? kasan_atomics_helper+0xf10/0x5450 [ 15.566635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.566660] ? kasan_atomics_helper+0xf10/0x5450 [ 15.566685] kasan_report+0x141/0x180 [ 15.566709] ? kasan_atomics_helper+0xf10/0x5450 [ 15.566737] kasan_check_range+0x10c/0x1c0 [ 15.566772] __kasan_check_write+0x18/0x20 [ 15.566794] kasan_atomics_helper+0xf10/0x5450 [ 15.566819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.566843] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.566872] ? kasan_atomics+0x152/0x310 [ 15.566899] kasan_atomics+0x1dc/0x310 [ 15.566924] ? __pfx_kasan_atomics+0x10/0x10 [ 15.566950] ? __pfx_read_tsc+0x10/0x10 [ 15.566973] ? ktime_get_ts64+0x86/0x230 [ 15.567000] kunit_try_run_case+0x1a5/0x480 [ 15.567026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.567052] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.567080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.567106] ? __kthread_parkme+0x82/0x180 [ 15.567128] ? preempt_count_sub+0x50/0x80 [ 15.567155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.567185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.567212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.567241] kthread+0x337/0x6f0 [ 15.567262] ? trace_preempt_on+0x20/0xc0 [ 15.567288] ? __pfx_kthread+0x10/0x10 [ 15.567311] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.567334] ? calculate_sigpending+0x7b/0xa0 [ 15.567363] ? __pfx_kthread+0x10/0x10 [ 15.567389] ret_from_fork+0x116/0x1d0 [ 15.567410] ? __pfx_kthread+0x10/0x10 [ 15.567452] ret_from_fork_asm+0x1a/0x30 [ 15.567485] </TASK> [ 15.567496] [ 15.579665] Allocated by task 282: [ 15.579995] kasan_save_stack+0x45/0x70 [ 15.580353] kasan_save_track+0x18/0x40 [ 15.580722] kasan_save_alloc_info+0x3b/0x50 [ 15.580941] __kasan_kmalloc+0xb7/0xc0 [ 15.581077] __kmalloc_cache_noprof+0x189/0x420 [ 15.581236] kasan_atomics+0x95/0x310 [ 15.581372] kunit_try_run_case+0x1a5/0x480 [ 15.581730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.582206] kthread+0x337/0x6f0 [ 15.582523] ret_from_fork+0x116/0x1d0 [ 15.582863] ret_from_fork_asm+0x1a/0x30 [ 15.583237] [ 15.583393] The buggy address belongs to the object at ffff888103082e00 [ 15.583393] which belongs to the cache kmalloc-64 of size 64 [ 15.584464] The buggy address is located 0 bytes to the right of [ 15.584464] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.584927] [ 15.585001] The buggy address belongs to the physical page: [ 15.585178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.585445] flags: 0x200000000000000(node=0|zone=2) [ 15.585871] page_type: f5(slab) [ 15.586158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.586838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.587508] page dumped because: kasan: bad access detected [ 15.587984] [ 15.588142] Memory state around the buggy address: [ 15.588576] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.589192] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.589815] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.590091] ^ [ 15.590250] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.590561] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591165] ================================================================== [ 15.536398] ================================================================== [ 15.537087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.537726] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.538348] [ 15.538531] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.538578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.538590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.538612] Call Trace: [ 15.538627] <TASK> [ 15.538643] dump_stack_lvl+0x73/0xb0 [ 15.538674] print_report+0xd1/0x610 [ 15.538699] ? __virt_addr_valid+0x1db/0x2d0 [ 15.538724] ? kasan_atomics_helper+0xe78/0x5450 [ 15.538749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.538792] ? kasan_atomics_helper+0xe78/0x5450 [ 15.538816] kasan_report+0x141/0x180 [ 15.538841] ? kasan_atomics_helper+0xe78/0x5450 [ 15.538870] kasan_check_range+0x10c/0x1c0 [ 15.538896] __kasan_check_write+0x18/0x20 [ 15.538917] kasan_atomics_helper+0xe78/0x5450 [ 15.538942] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.538967] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.538995] ? kasan_atomics+0x152/0x310 [ 15.539024] kasan_atomics+0x1dc/0x310 [ 15.539048] ? __pfx_kasan_atomics+0x10/0x10 [ 15.539074] ? __pfx_read_tsc+0x10/0x10 [ 15.539096] ? ktime_get_ts64+0x86/0x230 [ 15.539124] kunit_try_run_case+0x1a5/0x480 [ 15.539151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.539177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.539211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.539238] ? __kthread_parkme+0x82/0x180 [ 15.539261] ? preempt_count_sub+0x50/0x80 [ 15.539287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.539314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.539341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.539370] kthread+0x337/0x6f0 [ 15.539392] ? trace_preempt_on+0x20/0xc0 [ 15.539416] ? __pfx_kthread+0x10/0x10 [ 15.539457] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.539480] ? calculate_sigpending+0x7b/0xa0 [ 15.539507] ? __pfx_kthread+0x10/0x10 [ 15.539531] ret_from_fork+0x116/0x1d0 [ 15.539551] ? __pfx_kthread+0x10/0x10 [ 15.539573] ret_from_fork_asm+0x1a/0x30 [ 15.539605] </TASK> [ 15.539616] [ 15.552139] Allocated by task 282: [ 15.552482] kasan_save_stack+0x45/0x70 [ 15.552817] kasan_save_track+0x18/0x40 [ 15.552959] kasan_save_alloc_info+0x3b/0x50 [ 15.553112] __kasan_kmalloc+0xb7/0xc0 [ 15.553248] __kmalloc_cache_noprof+0x189/0x420 [ 15.553410] kasan_atomics+0x95/0x310 [ 15.553769] kunit_try_run_case+0x1a5/0x480 [ 15.554132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.554616] kthread+0x337/0x6f0 [ 15.554916] ret_from_fork+0x116/0x1d0 [ 15.555262] ret_from_fork_asm+0x1a/0x30 [ 15.555632] [ 15.555804] The buggy address belongs to the object at ffff888103082e00 [ 15.555804] which belongs to the cache kmalloc-64 of size 64 [ 15.556850] The buggy address is located 0 bytes to the right of [ 15.556850] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.557292] [ 15.557367] The buggy address belongs to the physical page: [ 15.557812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.558485] flags: 0x200000000000000(node=0|zone=2) [ 15.558914] page_type: f5(slab) [ 15.559203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.559807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.560039] page dumped because: kasan: bad access detected [ 15.560214] [ 15.560286] Memory state around the buggy address: [ 15.560481] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.561089] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.561705] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.562301] ^ [ 15.562740] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.563348] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.563959] ================================================================== [ 15.593042] ================================================================== [ 15.594089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.594992] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.595234] [ 15.595325] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.595373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.595386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.595411] Call Trace: [ 15.595429] <TASK> [ 15.595446] dump_stack_lvl+0x73/0xb0 [ 15.595479] print_report+0xd1/0x610 [ 15.595504] ? __virt_addr_valid+0x1db/0x2d0 [ 15.595530] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.595553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.595578] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.595602] kasan_report+0x141/0x180 [ 15.595626] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.595655] kasan_check_range+0x10c/0x1c0 [ 15.595680] __kasan_check_write+0x18/0x20 [ 15.595701] kasan_atomics_helper+0xfa9/0x5450 [ 15.595868] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.595901] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.595930] ? kasan_atomics+0x152/0x310 [ 15.595960] kasan_atomics+0x1dc/0x310 [ 15.595984] ? __pfx_kasan_atomics+0x10/0x10 [ 15.596011] ? __pfx_read_tsc+0x10/0x10 [ 15.596034] ? ktime_get_ts64+0x86/0x230 [ 15.596061] kunit_try_run_case+0x1a5/0x480 [ 15.596088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.596113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.596140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.596166] ? __kthread_parkme+0x82/0x180 [ 15.596188] ? preempt_count_sub+0x50/0x80 [ 15.596214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.596242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.596269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.596296] kthread+0x337/0x6f0 [ 15.596317] ? trace_preempt_on+0x20/0xc0 [ 15.596343] ? __pfx_kthread+0x10/0x10 [ 15.596365] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.596388] ? calculate_sigpending+0x7b/0xa0 [ 15.596415] ? __pfx_kthread+0x10/0x10 [ 15.596438] ret_from_fork+0x116/0x1d0 [ 15.596787] ? __pfx_kthread+0x10/0x10 [ 15.596811] ret_from_fork_asm+0x1a/0x30 [ 15.596845] </TASK> [ 15.596856] [ 15.609518] Allocated by task 282: [ 15.609901] kasan_save_stack+0x45/0x70 [ 15.610287] kasan_save_track+0x18/0x40 [ 15.610657] kasan_save_alloc_info+0x3b/0x50 [ 15.611069] __kasan_kmalloc+0xb7/0xc0 [ 15.611462] __kmalloc_cache_noprof+0x189/0x420 [ 15.611893] kasan_atomics+0x95/0x310 [ 15.612243] kunit_try_run_case+0x1a5/0x480 [ 15.612710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.613289] kthread+0x337/0x6f0 [ 15.613659] ret_from_fork+0x116/0x1d0 [ 15.613855] ret_from_fork_asm+0x1a/0x30 [ 15.613995] [ 15.614069] The buggy address belongs to the object at ffff888103082e00 [ 15.614069] which belongs to the cache kmalloc-64 of size 64 [ 15.614413] The buggy address is located 0 bytes to the right of [ 15.614413] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.614898] [ 15.614982] The buggy address belongs to the physical page: [ 15.615199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.615549] flags: 0x200000000000000(node=0|zone=2) [ 15.615782] page_type: f5(slab) [ 15.615927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.616270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.616500] page dumped because: kasan: bad access detected [ 15.616731] [ 15.616838] Memory state around the buggy address: [ 15.617091] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.617587] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.618388] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.618689] ^ [ 15.618932] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.619421] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.619842] ================================================================== [ 15.620542] ================================================================== [ 15.620953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.621530] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.622101] [ 15.622225] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.622273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.622286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.622308] Call Trace: [ 15.622324] <TASK> [ 15.622340] dump_stack_lvl+0x73/0xb0 [ 15.622371] print_report+0xd1/0x610 [ 15.622395] ? __virt_addr_valid+0x1db/0x2d0 [ 15.622420] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.622653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.622684] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.622710] kasan_report+0x141/0x180 [ 15.622735] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.622778] __asan_report_load4_noabort+0x18/0x20 [ 15.622806] kasan_atomics_helper+0x4a36/0x5450 [ 15.622831] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.622855] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.622885] ? kasan_atomics+0x152/0x310 [ 15.622914] kasan_atomics+0x1dc/0x310 [ 15.622938] ? __pfx_kasan_atomics+0x10/0x10 [ 15.622965] ? __pfx_read_tsc+0x10/0x10 [ 15.622987] ? ktime_get_ts64+0x86/0x230 [ 15.623014] kunit_try_run_case+0x1a5/0x480 [ 15.623042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.623068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.623094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.623120] ? __kthread_parkme+0x82/0x180 [ 15.623143] ? preempt_count_sub+0x50/0x80 [ 15.623169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.623203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.623230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.623258] kthread+0x337/0x6f0 [ 15.623279] ? trace_preempt_on+0x20/0xc0 [ 15.623304] ? __pfx_kthread+0x10/0x10 [ 15.623326] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.623350] ? calculate_sigpending+0x7b/0xa0 [ 15.623376] ? __pfx_kthread+0x10/0x10 [ 15.623400] ret_from_fork+0x116/0x1d0 [ 15.623420] ? __pfx_kthread+0x10/0x10 [ 15.623455] ret_from_fork_asm+0x1a/0x30 [ 15.623488] </TASK> [ 15.623499] [ 15.634252] Allocated by task 282: [ 15.634788] kasan_save_stack+0x45/0x70 [ 15.634997] kasan_save_track+0x18/0x40 [ 15.635268] kasan_save_alloc_info+0x3b/0x50 [ 15.635593] __kasan_kmalloc+0xb7/0xc0 [ 15.635899] __kmalloc_cache_noprof+0x189/0x420 [ 15.636216] kasan_atomics+0x95/0x310 [ 15.636504] kunit_try_run_case+0x1a5/0x480 [ 15.636804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.637151] kthread+0x337/0x6f0 [ 15.637458] ret_from_fork+0x116/0x1d0 [ 15.637641] ret_from_fork_asm+0x1a/0x30 [ 15.637943] [ 15.638049] The buggy address belongs to the object at ffff888103082e00 [ 15.638049] which belongs to the cache kmalloc-64 of size 64 [ 15.638850] The buggy address is located 0 bytes to the right of [ 15.638850] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.639509] [ 15.639605] The buggy address belongs to the physical page: [ 15.639957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.640355] flags: 0x200000000000000(node=0|zone=2) [ 15.640735] page_type: f5(slab) [ 15.640912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.641248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.641744] page dumped because: kasan: bad access detected [ 15.642099] [ 15.642202] Memory state around the buggy address: [ 15.642623] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.643023] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.643418] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.643788] ^ [ 15.644116] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.644501] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.644914] ================================================================== [ 15.299298] ================================================================== [ 15.299850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.300196] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.300656] [ 15.300750] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.300924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.301070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.301094] Call Trace: [ 15.301111] <TASK> [ 15.301126] dump_stack_lvl+0x73/0xb0 [ 15.301160] print_report+0xd1/0x610 [ 15.301185] ? __virt_addr_valid+0x1db/0x2d0 [ 15.301210] ? kasan_atomics_helper+0x860/0x5450 [ 15.301234] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.301260] ? kasan_atomics_helper+0x860/0x5450 [ 15.301284] kasan_report+0x141/0x180 [ 15.301308] ? kasan_atomics_helper+0x860/0x5450 [ 15.301336] kasan_check_range+0x10c/0x1c0 [ 15.301362] __kasan_check_write+0x18/0x20 [ 15.301384] kasan_atomics_helper+0x860/0x5450 [ 15.301409] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.301460] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.301489] ? kasan_atomics+0x152/0x310 [ 15.301518] kasan_atomics+0x1dc/0x310 [ 15.301541] ? __pfx_kasan_atomics+0x10/0x10 [ 15.301570] ? __pfx_read_tsc+0x10/0x10 [ 15.301593] ? ktime_get_ts64+0x86/0x230 [ 15.301619] kunit_try_run_case+0x1a5/0x480 [ 15.301646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.301672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.301700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.301726] ? __kthread_parkme+0x82/0x180 [ 15.301749] ? preempt_count_sub+0x50/0x80 [ 15.301788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.301815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.301842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.301870] kthread+0x337/0x6f0 [ 15.301891] ? trace_preempt_on+0x20/0xc0 [ 15.301916] ? __pfx_kthread+0x10/0x10 [ 15.301939] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.301962] ? calculate_sigpending+0x7b/0xa0 [ 15.301989] ? __pfx_kthread+0x10/0x10 [ 15.302012] ret_from_fork+0x116/0x1d0 [ 15.302032] ? __pfx_kthread+0x10/0x10 [ 15.302055] ret_from_fork_asm+0x1a/0x30 [ 15.302088] </TASK> [ 15.302099] [ 15.311811] Allocated by task 282: [ 15.312116] kasan_save_stack+0x45/0x70 [ 15.312386] kasan_save_track+0x18/0x40 [ 15.312559] kasan_save_alloc_info+0x3b/0x50 [ 15.312895] __kasan_kmalloc+0xb7/0xc0 [ 15.313094] __kmalloc_cache_noprof+0x189/0x420 [ 15.313404] kasan_atomics+0x95/0x310 [ 15.313606] kunit_try_run_case+0x1a5/0x480 [ 15.313978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.314297] kthread+0x337/0x6f0 [ 15.314495] ret_from_fork+0x116/0x1d0 [ 15.314804] ret_from_fork_asm+0x1a/0x30 [ 15.315014] [ 15.315240] The buggy address belongs to the object at ffff888103082e00 [ 15.315240] which belongs to the cache kmalloc-64 of size 64 [ 15.315959] The buggy address is located 0 bytes to the right of [ 15.315959] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.316729] [ 15.316831] The buggy address belongs to the physical page: [ 15.317148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.317640] flags: 0x200000000000000(node=0|zone=2) [ 15.317889] page_type: f5(slab) [ 15.318043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.318371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.318935] page dumped because: kasan: bad access detected [ 15.319137] [ 15.319245] Memory state around the buggy address: [ 15.319647] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320045] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320413] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.320788] ^ [ 15.320996] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.321404] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.321791] ================================================================== [ 15.970079] ================================================================== [ 15.970306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.970805] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.971354] [ 15.971461] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.971505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.971518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.971540] Call Trace: [ 15.971555] <TASK> [ 15.971580] dump_stack_lvl+0x73/0xb0 [ 15.971612] print_report+0xd1/0x610 [ 15.971636] ? __virt_addr_valid+0x1db/0x2d0 [ 15.971660] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.971683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.971708] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.971733] kasan_report+0x141/0x180 [ 15.971756] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.971796] kasan_check_range+0x10c/0x1c0 [ 15.971822] __kasan_check_write+0x18/0x20 [ 15.971843] kasan_atomics_helper+0x16e7/0x5450 [ 15.971868] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.971893] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.971920] ? kasan_atomics+0x152/0x310 [ 15.971948] kasan_atomics+0x1dc/0x310 [ 15.971973] ? __pfx_kasan_atomics+0x10/0x10 [ 15.971999] ? __pfx_read_tsc+0x10/0x10 [ 15.972021] ? ktime_get_ts64+0x86/0x230 [ 15.972047] kunit_try_run_case+0x1a5/0x480 [ 15.972073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.972124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.972150] ? __kthread_parkme+0x82/0x180 [ 15.972172] ? preempt_count_sub+0x50/0x80 [ 15.972198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972251] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972279] kthread+0x337/0x6f0 [ 15.972300] ? trace_preempt_on+0x20/0xc0 [ 15.972325] ? __pfx_kthread+0x10/0x10 [ 15.972347] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.972370] ? calculate_sigpending+0x7b/0xa0 [ 15.972396] ? __pfx_kthread+0x10/0x10 [ 15.972418] ret_from_fork+0x116/0x1d0 [ 15.972450] ? __pfx_kthread+0x10/0x10 [ 15.972472] ret_from_fork_asm+0x1a/0x30 [ 15.972504] </TASK> [ 15.972515] [ 15.979641] Allocated by task 282: [ 15.979827] kasan_save_stack+0x45/0x70 [ 15.980031] kasan_save_track+0x18/0x40 [ 15.980225] kasan_save_alloc_info+0x3b/0x50 [ 15.980450] __kasan_kmalloc+0xb7/0xc0 [ 15.980639] __kmalloc_cache_noprof+0x189/0x420 [ 15.980877] kasan_atomics+0x95/0x310 [ 15.981050] kunit_try_run_case+0x1a5/0x480 [ 15.981217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.981450] kthread+0x337/0x6f0 [ 15.981602] ret_from_fork+0x116/0x1d0 [ 15.981734] ret_from_fork_asm+0x1a/0x30 [ 15.981944] [ 15.982039] The buggy address belongs to the object at ffff888103082e00 [ 15.982039] which belongs to the cache kmalloc-64 of size 64 [ 15.982555] The buggy address is located 0 bytes to the right of [ 15.982555] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.982998] [ 15.983070] The buggy address belongs to the physical page: [ 15.983246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.983483] flags: 0x200000000000000(node=0|zone=2) [ 15.983655] page_type: f5(slab) [ 15.985002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.985890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.986811] page dumped because: kasan: bad access detected [ 15.987573] [ 15.987900] Memory state around the buggy address: [ 15.988456] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.989229] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.989474] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.989692] ^ [ 15.989864] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990087] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990303] ================================================================== [ 15.276081] ================================================================== [ 15.276662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.277123] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.277598] [ 15.277711] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.277757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.277782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.277804] Call Trace: [ 15.277820] <TASK> [ 15.277834] dump_stack_lvl+0x73/0xb0 [ 15.277865] print_report+0xd1/0x610 [ 15.277891] ? __virt_addr_valid+0x1db/0x2d0 [ 15.277917] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.277941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.277967] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.277991] kasan_report+0x141/0x180 [ 15.278015] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.278043] kasan_check_range+0x10c/0x1c0 [ 15.278068] __kasan_check_write+0x18/0x20 [ 15.278090] kasan_atomics_helper+0x7c7/0x5450 [ 15.278115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.278140] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.278169] ? kasan_atomics+0x152/0x310 [ 15.278197] kasan_atomics+0x1dc/0x310 [ 15.278222] ? __pfx_kasan_atomics+0x10/0x10 [ 15.278249] ? __pfx_read_tsc+0x10/0x10 [ 15.278271] ? ktime_get_ts64+0x86/0x230 [ 15.278298] kunit_try_run_case+0x1a5/0x480 [ 15.278325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.278351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.278379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.278406] ? __kthread_parkme+0x82/0x180 [ 15.278529] ? preempt_count_sub+0x50/0x80 [ 15.278560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.278587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.278615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.278643] kthread+0x337/0x6f0 [ 15.278664] ? trace_preempt_on+0x20/0xc0 [ 15.278690] ? __pfx_kthread+0x10/0x10 [ 15.278714] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.278738] ? calculate_sigpending+0x7b/0xa0 [ 15.278775] ? __pfx_kthread+0x10/0x10 [ 15.278799] ret_from_fork+0x116/0x1d0 [ 15.278820] ? __pfx_kthread+0x10/0x10 [ 15.278843] ret_from_fork_asm+0x1a/0x30 [ 15.278876] </TASK> [ 15.278887] [ 15.288678] Allocated by task 282: [ 15.289023] kasan_save_stack+0x45/0x70 [ 15.289338] kasan_save_track+0x18/0x40 [ 15.289559] kasan_save_alloc_info+0x3b/0x50 [ 15.289932] __kasan_kmalloc+0xb7/0xc0 [ 15.290135] __kmalloc_cache_noprof+0x189/0x420 [ 15.290417] kasan_atomics+0x95/0x310 [ 15.290602] kunit_try_run_case+0x1a5/0x480 [ 15.290926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.291191] kthread+0x337/0x6f0 [ 15.291349] ret_from_fork+0x116/0x1d0 [ 15.291696] ret_from_fork_asm+0x1a/0x30 [ 15.291916] [ 15.292009] The buggy address belongs to the object at ffff888103082e00 [ 15.292009] which belongs to the cache kmalloc-64 of size 64 [ 15.292747] The buggy address is located 0 bytes to the right of [ 15.292747] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.293331] [ 15.293541] The buggy address belongs to the physical page: [ 15.293909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.294331] flags: 0x200000000000000(node=0|zone=2) [ 15.294643] page_type: f5(slab) [ 15.294816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.295149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.295487] page dumped because: kasan: bad access detected [ 15.295724] [ 15.296071] Memory state around the buggy address: [ 15.296268] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.296724] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.297136] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.297443] ^ [ 15.297787] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.298152] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.298549] ================================================================== [ 16.368394] ================================================================== [ 16.368719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.369180] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.369883] [ 16.370114] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.370283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.370302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.370325] Call Trace: [ 16.370342] <TASK> [ 16.370357] dump_stack_lvl+0x73/0xb0 [ 16.370390] print_report+0xd1/0x610 [ 16.370414] ? __virt_addr_valid+0x1db/0x2d0 [ 16.370447] ? kasan_atomics_helper+0x2006/0x5450 [ 16.370472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.370497] ? kasan_atomics_helper+0x2006/0x5450 [ 16.370522] kasan_report+0x141/0x180 [ 16.370546] ? kasan_atomics_helper+0x2006/0x5450 [ 16.370576] kasan_check_range+0x10c/0x1c0 [ 16.370603] __kasan_check_write+0x18/0x20 [ 16.370624] kasan_atomics_helper+0x2006/0x5450 [ 16.370649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.370674] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.370702] ? kasan_atomics+0x152/0x310 [ 16.370730] kasan_atomics+0x1dc/0x310 [ 16.370755] ? __pfx_kasan_atomics+0x10/0x10 [ 16.370796] ? __pfx_read_tsc+0x10/0x10 [ 16.370819] ? ktime_get_ts64+0x86/0x230 [ 16.370845] kunit_try_run_case+0x1a5/0x480 [ 16.370872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.370897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.370924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.370950] ? __kthread_parkme+0x82/0x180 [ 16.370972] ? preempt_count_sub+0x50/0x80 [ 16.370997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.371024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.371052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.371079] kthread+0x337/0x6f0 [ 16.371100] ? trace_preempt_on+0x20/0xc0 [ 16.371125] ? __pfx_kthread+0x10/0x10 [ 16.371148] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.371171] ? calculate_sigpending+0x7b/0xa0 [ 16.371205] ? __pfx_kthread+0x10/0x10 [ 16.371228] ret_from_fork+0x116/0x1d0 [ 16.371249] ? __pfx_kthread+0x10/0x10 [ 16.371271] ret_from_fork_asm+0x1a/0x30 [ 16.371304] </TASK> [ 16.371316] [ 16.382508] Allocated by task 282: [ 16.382717] kasan_save_stack+0x45/0x70 [ 16.383035] kasan_save_track+0x18/0x40 [ 16.383220] kasan_save_alloc_info+0x3b/0x50 [ 16.383413] __kasan_kmalloc+0xb7/0xc0 [ 16.383807] __kmalloc_cache_noprof+0x189/0x420 [ 16.384162] kasan_atomics+0x95/0x310 [ 16.384442] kunit_try_run_case+0x1a5/0x480 [ 16.384753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.385120] kthread+0x337/0x6f0 [ 16.385368] ret_from_fork+0x116/0x1d0 [ 16.385719] ret_from_fork_asm+0x1a/0x30 [ 16.386044] [ 16.386232] The buggy address belongs to the object at ffff888103082e00 [ 16.386232] which belongs to the cache kmalloc-64 of size 64 [ 16.387025] The buggy address is located 0 bytes to the right of [ 16.387025] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.387792] [ 16.387983] The buggy address belongs to the physical page: [ 16.388282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.388820] flags: 0x200000000000000(node=0|zone=2) [ 16.389137] page_type: f5(slab) [ 16.389388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.389986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.390411] page dumped because: kasan: bad access detected [ 16.390733] [ 16.390946] Memory state around the buggy address: [ 16.391163] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.391443] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.392037] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.392417] ^ [ 16.392796] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.393173] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.393603] ================================================================== [ 15.699526] ================================================================== [ 15.699842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.700245] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.700563] [ 15.700755] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.700815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.700829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.700853] Call Trace: [ 15.700880] <TASK> [ 15.700897] dump_stack_lvl+0x73/0xb0 [ 15.700929] print_report+0xd1/0x610 [ 15.700954] ? __virt_addr_valid+0x1db/0x2d0 [ 15.700979] ? kasan_atomics_helper+0x1148/0x5450 [ 15.701003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.701030] ? kasan_atomics_helper+0x1148/0x5450 [ 15.701055] kasan_report+0x141/0x180 [ 15.701079] ? kasan_atomics_helper+0x1148/0x5450 [ 15.701108] kasan_check_range+0x10c/0x1c0 [ 15.701135] __kasan_check_write+0x18/0x20 [ 15.701157] kasan_atomics_helper+0x1148/0x5450 [ 15.701182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.701208] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.701246] ? kasan_atomics+0x152/0x310 [ 15.701275] kasan_atomics+0x1dc/0x310 [ 15.701299] ? __pfx_kasan_atomics+0x10/0x10 [ 15.701326] ? __pfx_read_tsc+0x10/0x10 [ 15.701349] ? ktime_get_ts64+0x86/0x230 [ 15.701375] kunit_try_run_case+0x1a5/0x480 [ 15.701403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.701487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.701514] ? __kthread_parkme+0x82/0x180 [ 15.701538] ? preempt_count_sub+0x50/0x80 [ 15.701563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.701636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.701664] kthread+0x337/0x6f0 [ 15.701685] ? trace_preempt_on+0x20/0xc0 [ 15.701710] ? __pfx_kthread+0x10/0x10 [ 15.701733] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.701757] ? calculate_sigpending+0x7b/0xa0 [ 15.701794] ? __pfx_kthread+0x10/0x10 [ 15.701818] ret_from_fork+0x116/0x1d0 [ 15.701838] ? __pfx_kthread+0x10/0x10 [ 15.701879] ret_from_fork_asm+0x1a/0x30 [ 15.701911] </TASK> [ 15.701923] [ 15.710015] Allocated by task 282: [ 15.710199] kasan_save_stack+0x45/0x70 [ 15.710404] kasan_save_track+0x18/0x40 [ 15.710599] kasan_save_alloc_info+0x3b/0x50 [ 15.710807] __kasan_kmalloc+0xb7/0xc0 [ 15.710946] __kmalloc_cache_noprof+0x189/0x420 [ 15.711174] kasan_atomics+0x95/0x310 [ 15.711371] kunit_try_run_case+0x1a5/0x480 [ 15.711720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.711967] kthread+0x337/0x6f0 [ 15.712133] ret_from_fork+0x116/0x1d0 [ 15.712318] ret_from_fork_asm+0x1a/0x30 [ 15.712555] [ 15.712694] The buggy address belongs to the object at ffff888103082e00 [ 15.712694] which belongs to the cache kmalloc-64 of size 64 [ 15.713291] The buggy address is located 0 bytes to the right of [ 15.713291] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.713865] [ 15.713963] The buggy address belongs to the physical page: [ 15.714328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.714671] flags: 0x200000000000000(node=0|zone=2) [ 15.714884] page_type: f5(slab) [ 15.715007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.715350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.715838] page dumped because: kasan: bad access detected [ 15.716081] [ 15.716197] Memory state around the buggy address: [ 15.716422] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.716712] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.717011] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.717313] ^ [ 15.717586] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.717903] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.718200] ================================================================== [ 16.518870] ================================================================== [ 16.519382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.519865] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.520284] [ 16.520393] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.520440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.520453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.520477] Call Trace: [ 16.520493] <TASK> [ 16.520508] dump_stack_lvl+0x73/0xb0 [ 16.520542] print_report+0xd1/0x610 [ 16.520568] ? __virt_addr_valid+0x1db/0x2d0 [ 16.520593] ? kasan_atomics_helper+0x224c/0x5450 [ 16.520621] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.520648] ? kasan_atomics_helper+0x224c/0x5450 [ 16.520673] kasan_report+0x141/0x180 [ 16.520698] ? kasan_atomics_helper+0x224c/0x5450 [ 16.520728] kasan_check_range+0x10c/0x1c0 [ 16.520755] __kasan_check_write+0x18/0x20 [ 16.520789] kasan_atomics_helper+0x224c/0x5450 [ 16.520814] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.520840] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.520867] ? kasan_atomics+0x152/0x310 [ 16.520896] kasan_atomics+0x1dc/0x310 [ 16.520920] ? __pfx_kasan_atomics+0x10/0x10 [ 16.520946] ? __pfx_read_tsc+0x10/0x10 [ 16.520969] ? ktime_get_ts64+0x86/0x230 [ 16.520996] kunit_try_run_case+0x1a5/0x480 [ 16.521022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.521048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.521075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.521101] ? __kthread_parkme+0x82/0x180 [ 16.521124] ? preempt_count_sub+0x50/0x80 [ 16.521150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.521176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.521204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.521232] kthread+0x337/0x6f0 [ 16.521252] ? trace_preempt_on+0x20/0xc0 [ 16.521278] ? __pfx_kthread+0x10/0x10 [ 16.521301] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.521324] ? calculate_sigpending+0x7b/0xa0 [ 16.521350] ? __pfx_kthread+0x10/0x10 [ 16.521374] ret_from_fork+0x116/0x1d0 [ 16.521394] ? __pfx_kthread+0x10/0x10 [ 16.521416] ret_from_fork_asm+0x1a/0x30 [ 16.521706] </TASK> [ 16.521723] [ 16.532163] Allocated by task 282: [ 16.532343] kasan_save_stack+0x45/0x70 [ 16.532533] kasan_save_track+0x18/0x40 [ 16.532714] kasan_save_alloc_info+0x3b/0x50 [ 16.533773] __kasan_kmalloc+0xb7/0xc0 [ 16.534160] __kmalloc_cache_noprof+0x189/0x420 [ 16.534615] kasan_atomics+0x95/0x310 [ 16.534999] kunit_try_run_case+0x1a5/0x480 [ 16.535421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.535953] kthread+0x337/0x6f0 [ 16.536295] ret_from_fork+0x116/0x1d0 [ 16.536692] ret_from_fork_asm+0x1a/0x30 [ 16.537081] [ 16.537283] The buggy address belongs to the object at ffff888103082e00 [ 16.537283] which belongs to the cache kmalloc-64 of size 64 [ 16.538055] The buggy address is located 0 bytes to the right of [ 16.538055] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.538458] [ 16.538673] The buggy address belongs to the physical page: [ 16.539238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.539989] flags: 0x200000000000000(node=0|zone=2) [ 16.540548] page_type: f5(slab) [ 16.540854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.541447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.542195] page dumped because: kasan: bad access detected [ 16.542376] [ 16.542456] Memory state around the buggy address: [ 16.542616] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.542851] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.543161] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.543440] ^ [ 16.543647] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.544047] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.544268] ================================================================== [ 15.508053] ================================================================== [ 15.508383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.509028] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.509345] [ 15.509675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.509957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.509976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.510013] Call Trace: [ 15.510031] <TASK> [ 15.510050] dump_stack_lvl+0x73/0xb0 [ 15.510086] print_report+0xd1/0x610 [ 15.510111] ? __virt_addr_valid+0x1db/0x2d0 [ 15.510139] ? kasan_atomics_helper+0xde0/0x5450 [ 15.510167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.510195] ? kasan_atomics_helper+0xde0/0x5450 [ 15.510218] kasan_report+0x141/0x180 [ 15.510243] ? kasan_atomics_helper+0xde0/0x5450 [ 15.510272] kasan_check_range+0x10c/0x1c0 [ 15.510300] __kasan_check_write+0x18/0x20 [ 15.510322] kasan_atomics_helper+0xde0/0x5450 [ 15.510346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.510371] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.510400] ? kasan_atomics+0x152/0x310 [ 15.510428] kasan_atomics+0x1dc/0x310 [ 15.510468] ? __pfx_kasan_atomics+0x10/0x10 [ 15.510494] ? __pfx_read_tsc+0x10/0x10 [ 15.510517] ? ktime_get_ts64+0x86/0x230 [ 15.510545] kunit_try_run_case+0x1a5/0x480 [ 15.510573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.510598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.510626] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.510652] ? __kthread_parkme+0x82/0x180 [ 15.510675] ? preempt_count_sub+0x50/0x80 [ 15.510701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.510728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.510755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.510794] kthread+0x337/0x6f0 [ 15.510814] ? trace_preempt_on+0x20/0xc0 [ 15.510841] ? __pfx_kthread+0x10/0x10 [ 15.510862] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.510887] ? calculate_sigpending+0x7b/0xa0 [ 15.510914] ? __pfx_kthread+0x10/0x10 [ 15.510936] ret_from_fork+0x116/0x1d0 [ 15.510956] ? __pfx_kthread+0x10/0x10 [ 15.510979] ret_from_fork_asm+0x1a/0x30 [ 15.511012] </TASK> [ 15.511024] [ 15.522377] Allocated by task 282: [ 15.522574] kasan_save_stack+0x45/0x70 [ 15.522752] kasan_save_track+0x18/0x40 [ 15.523812] kasan_save_alloc_info+0x3b/0x50 [ 15.524279] __kasan_kmalloc+0xb7/0xc0 [ 15.524719] __kmalloc_cache_noprof+0x189/0x420 [ 15.525212] kasan_atomics+0x95/0x310 [ 15.525653] kunit_try_run_case+0x1a5/0x480 [ 15.526146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.526720] kthread+0x337/0x6f0 [ 15.527031] ret_from_fork+0x116/0x1d0 [ 15.527389] ret_from_fork_asm+0x1a/0x30 [ 15.527795] [ 15.527957] The buggy address belongs to the object at ffff888103082e00 [ 15.527957] which belongs to the cache kmalloc-64 of size 64 [ 15.528492] The buggy address is located 0 bytes to the right of [ 15.528492] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.529580] [ 15.529722] The buggy address belongs to the physical page: [ 15.529907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.530152] flags: 0x200000000000000(node=0|zone=2) [ 15.530318] page_type: f5(slab) [ 15.530466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.531120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.531783] page dumped because: kasan: bad access detected [ 15.532251] [ 15.532407] Memory state around the buggy address: [ 15.532844] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.533483] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.534076] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.534388] ^ [ 15.534826] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.535357] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.535906] ================================================================== [ 15.033608] ================================================================== [ 15.033903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.034644] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.034936] [ 15.035113] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.035158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.035169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.035193] Call Trace: [ 15.035206] <TASK> [ 15.035219] dump_stack_lvl+0x73/0xb0 [ 15.035247] print_report+0xd1/0x610 [ 15.035271] ? __virt_addr_valid+0x1db/0x2d0 [ 15.035295] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.035317] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.035343] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.035366] kasan_report+0x141/0x180 [ 15.035401] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.035429] __asan_report_load4_noabort+0x18/0x20 [ 15.035478] kasan_atomics_helper+0x4b88/0x5450 [ 15.035502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.035526] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.035553] ? kasan_atomics+0x152/0x310 [ 15.035581] kasan_atomics+0x1dc/0x310 [ 15.035604] ? __pfx_kasan_atomics+0x10/0x10 [ 15.035629] ? __pfx_read_tsc+0x10/0x10 [ 15.035652] ? ktime_get_ts64+0x86/0x230 [ 15.035677] kunit_try_run_case+0x1a5/0x480 [ 15.035702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.035727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.035753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.035789] ? __kthread_parkme+0x82/0x180 [ 15.035810] ? preempt_count_sub+0x50/0x80 [ 15.035836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.035861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.035887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.035914] kthread+0x337/0x6f0 [ 15.035934] ? trace_preempt_on+0x20/0xc0 [ 15.035968] ? __pfx_kthread+0x10/0x10 [ 15.035999] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.036022] ? calculate_sigpending+0x7b/0xa0 [ 15.036059] ? __pfx_kthread+0x10/0x10 [ 15.036082] ret_from_fork+0x116/0x1d0 [ 15.036102] ? __pfx_kthread+0x10/0x10 [ 15.036122] ret_from_fork_asm+0x1a/0x30 [ 15.036163] </TASK> [ 15.036173] [ 15.044665] Allocated by task 282: [ 15.044812] kasan_save_stack+0x45/0x70 [ 15.044955] kasan_save_track+0x18/0x40 [ 15.045200] kasan_save_alloc_info+0x3b/0x50 [ 15.045434] __kasan_kmalloc+0xb7/0xc0 [ 15.045620] __kmalloc_cache_noprof+0x189/0x420 [ 15.045787] kasan_atomics+0x95/0x310 [ 15.045959] kunit_try_run_case+0x1a5/0x480 [ 15.046391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.046604] kthread+0x337/0x6f0 [ 15.046803] ret_from_fork+0x116/0x1d0 [ 15.046961] ret_from_fork_asm+0x1a/0x30 [ 15.047213] [ 15.047289] The buggy address belongs to the object at ffff888103082e00 [ 15.047289] which belongs to the cache kmalloc-64 of size 64 [ 15.047878] The buggy address is located 0 bytes to the right of [ 15.047878] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.048478] [ 15.048664] The buggy address belongs to the physical page: [ 15.048902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.049338] flags: 0x200000000000000(node=0|zone=2) [ 15.049591] page_type: f5(slab) [ 15.049727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.050112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.050424] page dumped because: kasan: bad access detected [ 15.050673] [ 15.050783] Memory state around the buggy address: [ 15.050941] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.051161] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.051382] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.051596] ^ [ 15.051754] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.052117] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.052451] ================================================================== [ 15.384592] ================================================================== [ 15.384960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.385324] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.385951] [ 15.386061] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.386105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.386118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.386140] Call Trace: [ 15.386156] <TASK> [ 15.386171] dump_stack_lvl+0x73/0xb0 [ 15.386202] print_report+0xd1/0x610 [ 15.386227] ? __virt_addr_valid+0x1db/0x2d0 [ 15.386252] ? kasan_atomics_helper+0xac7/0x5450 [ 15.386275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.386301] ? kasan_atomics_helper+0xac7/0x5450 [ 15.386325] kasan_report+0x141/0x180 [ 15.386349] ? kasan_atomics_helper+0xac7/0x5450 [ 15.386378] kasan_check_range+0x10c/0x1c0 [ 15.386404] __kasan_check_write+0x18/0x20 [ 15.386426] kasan_atomics_helper+0xac7/0x5450 [ 15.386462] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.386488] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.386516] ? kasan_atomics+0x152/0x310 [ 15.386544] kasan_atomics+0x1dc/0x310 [ 15.386568] ? __pfx_kasan_atomics+0x10/0x10 [ 15.386594] ? __pfx_read_tsc+0x10/0x10 [ 15.386617] ? ktime_get_ts64+0x86/0x230 [ 15.386643] kunit_try_run_case+0x1a5/0x480 [ 15.386671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.386696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.386723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.386750] ? __kthread_parkme+0x82/0x180 [ 15.386784] ? preempt_count_sub+0x50/0x80 [ 15.386810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.386837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.386864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.386892] kthread+0x337/0x6f0 [ 15.386913] ? trace_preempt_on+0x20/0xc0 [ 15.386939] ? __pfx_kthread+0x10/0x10 [ 15.386962] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.386985] ? calculate_sigpending+0x7b/0xa0 [ 15.387012] ? __pfx_kthread+0x10/0x10 [ 15.387035] ret_from_fork+0x116/0x1d0 [ 15.387055] ? __pfx_kthread+0x10/0x10 [ 15.387077] ret_from_fork_asm+0x1a/0x30 [ 15.387109] </TASK> [ 15.387120] [ 15.394560] Allocated by task 282: [ 15.394688] kasan_save_stack+0x45/0x70 [ 15.394846] kasan_save_track+0x18/0x40 [ 15.394985] kasan_save_alloc_info+0x3b/0x50 [ 15.395139] __kasan_kmalloc+0xb7/0xc0 [ 15.395334] __kmalloc_cache_noprof+0x189/0x420 [ 15.395654] kasan_atomics+0x95/0x310 [ 15.395882] kunit_try_run_case+0x1a5/0x480 [ 15.396267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.396539] kthread+0x337/0x6f0 [ 15.396717] ret_from_fork+0x116/0x1d0 [ 15.396926] ret_from_fork_asm+0x1a/0x30 [ 15.397187] [ 15.397284] The buggy address belongs to the object at ffff888103082e00 [ 15.397284] which belongs to the cache kmalloc-64 of size 64 [ 15.397672] The buggy address is located 0 bytes to the right of [ 15.397672] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.398474] [ 15.398578] The buggy address belongs to the physical page: [ 15.398841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.399169] flags: 0x200000000000000(node=0|zone=2) [ 15.399343] page_type: f5(slab) [ 15.399466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.399707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.400008] page dumped because: kasan: bad access detected [ 15.400267] [ 15.400368] Memory state around the buggy address: [ 15.400595] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.400930] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.401256] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.401505] ^ [ 15.401662] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402220] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402535] ================================================================== [ 15.775843] ================================================================== [ 15.776540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.776899] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.777152] [ 15.777234] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.777277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.777289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.777311] Call Trace: [ 15.777326] <TASK> [ 15.777340] dump_stack_lvl+0x73/0xb0 [ 15.777368] print_report+0xd1/0x610 [ 15.777392] ? __virt_addr_valid+0x1db/0x2d0 [ 15.777417] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.777441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.777466] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.777517] kasan_report+0x141/0x180 [ 15.777555] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.777597] kasan_check_range+0x10c/0x1c0 [ 15.777636] __kasan_check_write+0x18/0x20 [ 15.777671] kasan_atomics_helper+0x12e6/0x5450 [ 15.777710] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.777735] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.777772] ? kasan_atomics+0x152/0x310 [ 15.777800] kasan_atomics+0x1dc/0x310 [ 15.777825] ? __pfx_kasan_atomics+0x10/0x10 [ 15.777867] ? __pfx_read_tsc+0x10/0x10 [ 15.777891] ? ktime_get_ts64+0x86/0x230 [ 15.777917] kunit_try_run_case+0x1a5/0x480 [ 15.777944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.777969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.777995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.778021] ? __kthread_parkme+0x82/0x180 [ 15.778061] ? preempt_count_sub+0x50/0x80 [ 15.778087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.778114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.778140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.778169] kthread+0x337/0x6f0 [ 15.778190] ? trace_preempt_on+0x20/0xc0 [ 15.778215] ? __pfx_kthread+0x10/0x10 [ 15.778236] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.778260] ? calculate_sigpending+0x7b/0xa0 [ 15.778286] ? __pfx_kthread+0x10/0x10 [ 15.778309] ret_from_fork+0x116/0x1d0 [ 15.778329] ? __pfx_kthread+0x10/0x10 [ 15.778351] ret_from_fork_asm+0x1a/0x30 [ 15.778383] </TASK> [ 15.778394] [ 15.786604] Allocated by task 282: [ 15.786775] kasan_save_stack+0x45/0x70 [ 15.786993] kasan_save_track+0x18/0x40 [ 15.787226] kasan_save_alloc_info+0x3b/0x50 [ 15.787432] __kasan_kmalloc+0xb7/0xc0 [ 15.787636] __kmalloc_cache_noprof+0x189/0x420 [ 15.787817] kasan_atomics+0x95/0x310 [ 15.788008] kunit_try_run_case+0x1a5/0x480 [ 15.788230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.788498] kthread+0x337/0x6f0 [ 15.788669] ret_from_fork+0x116/0x1d0 [ 15.788844] ret_from_fork_asm+0x1a/0x30 [ 15.789038] [ 15.789157] The buggy address belongs to the object at ffff888103082e00 [ 15.789157] which belongs to the cache kmalloc-64 of size 64 [ 15.789691] The buggy address is located 0 bytes to the right of [ 15.789691] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.790169] [ 15.790271] The buggy address belongs to the physical page: [ 15.790557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.790862] flags: 0x200000000000000(node=0|zone=2) [ 15.791094] page_type: f5(slab) [ 15.791257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.791636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.792006] page dumped because: kasan: bad access detected [ 15.792183] [ 15.792275] Memory state around the buggy address: [ 15.792507] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.792846] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.793162] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.793404] ^ [ 15.793556] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.793781] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.794179] ================================================================== [ 15.794846] ================================================================== [ 15.795469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.795974] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.796768] [ 15.796915] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.796965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.796979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.797001] Call Trace: [ 15.797017] <TASK> [ 15.797034] dump_stack_lvl+0x73/0xb0 [ 15.797086] print_report+0xd1/0x610 [ 15.797113] ? __virt_addr_valid+0x1db/0x2d0 [ 15.797137] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.797161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.797187] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.797212] kasan_report+0x141/0x180 [ 15.797236] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.797283] __asan_report_load4_noabort+0x18/0x20 [ 15.797310] kasan_atomics_helper+0x49ce/0x5450 [ 15.797336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.797361] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.797388] ? kasan_atomics+0x152/0x310 [ 15.797434] kasan_atomics+0x1dc/0x310 [ 15.797469] ? __pfx_kasan_atomics+0x10/0x10 [ 15.797495] ? __pfx_read_tsc+0x10/0x10 [ 15.797517] ? ktime_get_ts64+0x86/0x230 [ 15.797543] kunit_try_run_case+0x1a5/0x480 [ 15.797571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.797596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.797640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.797667] ? __kthread_parkme+0x82/0x180 [ 15.797689] ? preempt_count_sub+0x50/0x80 [ 15.797715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.797742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.797779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.797824] kthread+0x337/0x6f0 [ 15.797858] ? trace_preempt_on+0x20/0xc0 [ 15.797884] ? __pfx_kthread+0x10/0x10 [ 15.797919] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.797956] ? calculate_sigpending+0x7b/0xa0 [ 15.797982] ? __pfx_kthread+0x10/0x10 [ 15.798006] ret_from_fork+0x116/0x1d0 [ 15.798026] ? __pfx_kthread+0x10/0x10 [ 15.798048] ret_from_fork_asm+0x1a/0x30 [ 15.798080] </TASK> [ 15.798092] [ 15.810258] Allocated by task 282: [ 15.810602] kasan_save_stack+0x45/0x70 [ 15.810988] kasan_save_track+0x18/0x40 [ 15.811356] kasan_save_alloc_info+0x3b/0x50 [ 15.811658] __kasan_kmalloc+0xb7/0xc0 [ 15.811806] __kmalloc_cache_noprof+0x189/0x420 [ 15.811962] kasan_atomics+0x95/0x310 [ 15.812096] kunit_try_run_case+0x1a5/0x480 [ 15.812240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.812415] kthread+0x337/0x6f0 [ 15.812808] ret_from_fork+0x116/0x1d0 [ 15.813141] ret_from_fork_asm+0x1a/0x30 [ 15.813577] [ 15.813777] The buggy address belongs to the object at ffff888103082e00 [ 15.813777] which belongs to the cache kmalloc-64 of size 64 [ 15.814856] The buggy address is located 0 bytes to the right of [ 15.814856] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.816035] [ 15.816201] The buggy address belongs to the physical page: [ 15.816800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.817508] flags: 0x200000000000000(node=0|zone=2) [ 15.817950] page_type: f5(slab) [ 15.818236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.818874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.819103] page dumped because: kasan: bad access detected [ 15.819287] [ 15.819358] Memory state around the buggy address: [ 15.819641] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.820238] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.820922] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.821556] ^ [ 15.822060] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.822779] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.823401] ================================================================== [ 15.645493] ================================================================== [ 15.645728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.646732] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.647070] [ 15.647330] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.647381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.647396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.647418] Call Trace: [ 15.647434] <TASK> [ 15.647462] dump_stack_lvl+0x73/0xb0 [ 15.647495] print_report+0xd1/0x610 [ 15.647520] ? __virt_addr_valid+0x1db/0x2d0 [ 15.647544] ? kasan_atomics_helper+0x1079/0x5450 [ 15.647568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.647593] ? kasan_atomics_helper+0x1079/0x5450 [ 15.647618] kasan_report+0x141/0x180 [ 15.647642] ? kasan_atomics_helper+0x1079/0x5450 [ 15.647670] kasan_check_range+0x10c/0x1c0 [ 15.647695] __kasan_check_write+0x18/0x20 [ 15.647717] kasan_atomics_helper+0x1079/0x5450 [ 15.647741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.647778] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.647807] ? kasan_atomics+0x152/0x310 [ 15.647836] kasan_atomics+0x1dc/0x310 [ 15.647860] ? __pfx_kasan_atomics+0x10/0x10 [ 15.647890] ? __pfx_read_tsc+0x10/0x10 [ 15.647914] ? ktime_get_ts64+0x86/0x230 [ 15.647941] kunit_try_run_case+0x1a5/0x480 [ 15.647967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.647995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.648022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.648052] ? __kthread_parkme+0x82/0x180 [ 15.648078] ? preempt_count_sub+0x50/0x80 [ 15.648105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.648132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.648160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.648188] kthread+0x337/0x6f0 [ 15.648209] ? trace_preempt_on+0x20/0xc0 [ 15.648236] ? __pfx_kthread+0x10/0x10 [ 15.648258] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.648283] ? calculate_sigpending+0x7b/0xa0 [ 15.648310] ? __pfx_kthread+0x10/0x10 [ 15.648333] ret_from_fork+0x116/0x1d0 [ 15.648353] ? __pfx_kthread+0x10/0x10 [ 15.648376] ret_from_fork_asm+0x1a/0x30 [ 15.648409] </TASK> [ 15.648420] [ 15.658693] Allocated by task 282: [ 15.658886] kasan_save_stack+0x45/0x70 [ 15.659084] kasan_save_track+0x18/0x40 [ 15.659271] kasan_save_alloc_info+0x3b/0x50 [ 15.659775] __kasan_kmalloc+0xb7/0xc0 [ 15.660072] __kmalloc_cache_noprof+0x189/0x420 [ 15.660387] kasan_atomics+0x95/0x310 [ 15.660585] kunit_try_run_case+0x1a5/0x480 [ 15.660965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661302] kthread+0x337/0x6f0 [ 15.661568] ret_from_fork+0x116/0x1d0 [ 15.661869] ret_from_fork_asm+0x1a/0x30 [ 15.662030] [ 15.662267] The buggy address belongs to the object at ffff888103082e00 [ 15.662267] which belongs to the cache kmalloc-64 of size 64 [ 15.662885] The buggy address is located 0 bytes to the right of [ 15.662885] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.663397] [ 15.663795] The buggy address belongs to the physical page: [ 15.664036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.664433] flags: 0x200000000000000(node=0|zone=2) [ 15.664823] page_type: f5(slab) [ 15.665175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.665526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.665935] page dumped because: kasan: bad access detected [ 15.666261] [ 15.666341] Memory state around the buggy address: [ 15.666804] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667186] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667647] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.668043] ^ [ 15.668269] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668733] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.669118] ================================================================== [ 16.085932] ================================================================== [ 16.086256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.086735] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.086990] [ 16.087078] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.087124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.087137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.087159] Call Trace: [ 16.087175] <TASK> [ 16.087195] dump_stack_lvl+0x73/0xb0 [ 16.087225] print_report+0xd1/0x610 [ 16.087250] ? __virt_addr_valid+0x1db/0x2d0 [ 16.087275] ? kasan_atomics_helper+0x194a/0x5450 [ 16.087299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.087325] ? kasan_atomics_helper+0x194a/0x5450 [ 16.087349] kasan_report+0x141/0x180 [ 16.087373] ? kasan_atomics_helper+0x194a/0x5450 [ 16.087402] kasan_check_range+0x10c/0x1c0 [ 16.087428] __kasan_check_write+0x18/0x20 [ 16.087461] kasan_atomics_helper+0x194a/0x5450 [ 16.087486] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.087511] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.087539] ? kasan_atomics+0x152/0x310 [ 16.087567] kasan_atomics+0x1dc/0x310 [ 16.087591] ? __pfx_kasan_atomics+0x10/0x10 [ 16.087618] ? __pfx_read_tsc+0x10/0x10 [ 16.087641] ? ktime_get_ts64+0x86/0x230 [ 16.087668] kunit_try_run_case+0x1a5/0x480 [ 16.087695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.087721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.087748] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.087785] ? __kthread_parkme+0x82/0x180 [ 16.087807] ? preempt_count_sub+0x50/0x80 [ 16.087834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.087860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.087888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.087916] kthread+0x337/0x6f0 [ 16.087936] ? trace_preempt_on+0x20/0xc0 [ 16.087961] ? __pfx_kthread+0x10/0x10 [ 16.087983] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.088007] ? calculate_sigpending+0x7b/0xa0 [ 16.088033] ? __pfx_kthread+0x10/0x10 [ 16.088057] ret_from_fork+0x116/0x1d0 [ 16.088076] ? __pfx_kthread+0x10/0x10 [ 16.088099] ret_from_fork_asm+0x1a/0x30 [ 16.088131] </TASK> [ 16.088142] [ 16.095726] Allocated by task 282: [ 16.095919] kasan_save_stack+0x45/0x70 [ 16.096127] kasan_save_track+0x18/0x40 [ 16.096313] kasan_save_alloc_info+0x3b/0x50 [ 16.096475] __kasan_kmalloc+0xb7/0xc0 [ 16.096662] __kmalloc_cache_noprof+0x189/0x420 [ 16.096899] kasan_atomics+0x95/0x310 [ 16.097053] kunit_try_run_case+0x1a5/0x480 [ 16.097203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.097428] kthread+0x337/0x6f0 [ 16.097617] ret_from_fork+0x116/0x1d0 [ 16.097821] ret_from_fork_asm+0x1a/0x30 [ 16.098021] [ 16.098121] The buggy address belongs to the object at ffff888103082e00 [ 16.098121] which belongs to the cache kmalloc-64 of size 64 [ 16.098626] The buggy address is located 0 bytes to the right of [ 16.098626] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.099007] [ 16.099092] The buggy address belongs to the physical page: [ 16.099350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.099706] flags: 0x200000000000000(node=0|zone=2) [ 16.099949] page_type: f5(slab) [ 16.100099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.100334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.100906] page dumped because: kasan: bad access detected [ 16.101165] [ 16.101272] Memory state around the buggy address: [ 16.101489] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.101715] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.102042] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.102362] ^ [ 16.102595] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102904] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.103201] ================================================================== [ 16.180267] ================================================================== [ 16.180924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.181388] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.181930] [ 16.182170] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.182231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.182245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.182269] Call Trace: [ 16.182287] <TASK> [ 16.182305] dump_stack_lvl+0x73/0xb0 [ 16.182337] print_report+0xd1/0x610 [ 16.182363] ? __virt_addr_valid+0x1db/0x2d0 [ 16.182389] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.182413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.182438] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.182568] kasan_report+0x141/0x180 [ 16.182595] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.182624] kasan_check_range+0x10c/0x1c0 [ 16.182650] __kasan_check_write+0x18/0x20 [ 16.182672] kasan_atomics_helper+0x1c18/0x5450 [ 16.182731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.182757] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.182796] ? kasan_atomics+0x152/0x310 [ 16.182825] kasan_atomics+0x1dc/0x310 [ 16.182852] ? __pfx_kasan_atomics+0x10/0x10 [ 16.182879] ? __pfx_read_tsc+0x10/0x10 [ 16.182902] ? ktime_get_ts64+0x86/0x230 [ 16.182929] kunit_try_run_case+0x1a5/0x480 [ 16.182955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.182980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.183008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.183034] ? __kthread_parkme+0x82/0x180 [ 16.183057] ? preempt_count_sub+0x50/0x80 [ 16.183083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.183110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.183138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.183165] kthread+0x337/0x6f0 [ 16.183193] ? trace_preempt_on+0x20/0xc0 [ 16.183219] ? __pfx_kthread+0x10/0x10 [ 16.183241] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.183264] ? calculate_sigpending+0x7b/0xa0 [ 16.183291] ? __pfx_kthread+0x10/0x10 [ 16.183314] ret_from_fork+0x116/0x1d0 [ 16.183334] ? __pfx_kthread+0x10/0x10 [ 16.183357] ret_from_fork_asm+0x1a/0x30 [ 16.183389] </TASK> [ 16.183401] [ 16.192916] Allocated by task 282: [ 16.193058] kasan_save_stack+0x45/0x70 [ 16.193206] kasan_save_track+0x18/0x40 [ 16.193345] kasan_save_alloc_info+0x3b/0x50 [ 16.193497] __kasan_kmalloc+0xb7/0xc0 [ 16.194159] __kmalloc_cache_noprof+0x189/0x420 [ 16.194605] kasan_atomics+0x95/0x310 [ 16.195066] kunit_try_run_case+0x1a5/0x480 [ 16.195368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.195819] kthread+0x337/0x6f0 [ 16.196239] ret_from_fork+0x116/0x1d0 [ 16.196516] ret_from_fork_asm+0x1a/0x30 [ 16.196733] [ 16.196845] The buggy address belongs to the object at ffff888103082e00 [ 16.196845] which belongs to the cache kmalloc-64 of size 64 [ 16.197384] The buggy address is located 0 bytes to the right of [ 16.197384] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.198737] [ 16.198937] The buggy address belongs to the physical page: [ 16.199411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.200505] flags: 0x200000000000000(node=0|zone=2) [ 16.200996] page_type: f5(slab) [ 16.201125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.201355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.201845] page dumped because: kasan: bad access detected [ 16.202017] [ 16.202089] Memory state around the buggy address: [ 16.202242] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.202793] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.203896] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.204673] ^ [ 16.205059] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205283] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205522] ================================================================== [ 15.053067] ================================================================== [ 15.053888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.054444] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.054992] [ 15.055104] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.055149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.055162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.055189] Call Trace: [ 15.055205] <TASK> [ 15.055220] dump_stack_lvl+0x73/0xb0 [ 15.055251] print_report+0xd1/0x610 [ 15.055275] ? __virt_addr_valid+0x1db/0x2d0 [ 15.055301] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.055325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.055351] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.055375] kasan_report+0x141/0x180 [ 15.055399] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.055428] __asan_report_store4_noabort+0x1b/0x30 [ 15.055466] kasan_atomics_helper+0x4b6e/0x5450 [ 15.055492] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.055517] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.055545] ? kasan_atomics+0x152/0x310 [ 15.055574] kasan_atomics+0x1dc/0x310 [ 15.055608] ? __pfx_kasan_atomics+0x10/0x10 [ 15.055635] ? __pfx_read_tsc+0x10/0x10 [ 15.055672] ? ktime_get_ts64+0x86/0x230 [ 15.055698] kunit_try_run_case+0x1a5/0x480 [ 15.055737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.055772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.055799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.055825] ? __kthread_parkme+0x82/0x180 [ 15.055849] ? preempt_count_sub+0x50/0x80 [ 15.055875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.055901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.055929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.055966] kthread+0x337/0x6f0 [ 15.055998] ? trace_preempt_on+0x20/0xc0 [ 15.056036] ? __pfx_kthread+0x10/0x10 [ 15.056068] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.056092] ? calculate_sigpending+0x7b/0xa0 [ 15.056119] ? __pfx_kthread+0x10/0x10 [ 15.056154] ret_from_fork+0x116/0x1d0 [ 15.056174] ? __pfx_kthread+0x10/0x10 [ 15.056197] ret_from_fork_asm+0x1a/0x30 [ 15.056230] </TASK> [ 15.056241] [ 15.065403] Allocated by task 282: [ 15.065606] kasan_save_stack+0x45/0x70 [ 15.065755] kasan_save_track+0x18/0x40 [ 15.065906] kasan_save_alloc_info+0x3b/0x50 [ 15.066059] __kasan_kmalloc+0xb7/0xc0 [ 15.066195] __kmalloc_cache_noprof+0x189/0x420 [ 15.066357] kasan_atomics+0x95/0x310 [ 15.066501] kunit_try_run_case+0x1a5/0x480 [ 15.066656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.066908] kthread+0x337/0x6f0 [ 15.067138] ret_from_fork+0x116/0x1d0 [ 15.067335] ret_from_fork_asm+0x1a/0x30 [ 15.067652] [ 15.067751] The buggy address belongs to the object at ffff888103082e00 [ 15.067751] which belongs to the cache kmalloc-64 of size 64 [ 15.068736] The buggy address is located 0 bytes to the right of [ 15.068736] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.069352] [ 15.069449] The buggy address belongs to the physical page: [ 15.069626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.069879] flags: 0x200000000000000(node=0|zone=2) [ 15.070046] page_type: f5(slab) [ 15.070169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.070403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.070635] page dumped because: kasan: bad access detected [ 15.070946] [ 15.071044] Memory state around the buggy address: [ 15.071279] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.071815] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.072154] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.072485] ^ [ 15.072715] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.073171] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.073486] ================================================================== [ 16.544789] ================================================================== [ 16.545236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.545571] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.545955] [ 16.546112] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.546170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.546185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.546234] Call Trace: [ 16.546249] <TASK> [ 16.546265] dump_stack_lvl+0x73/0xb0 [ 16.546308] print_report+0xd1/0x610 [ 16.546333] ? __virt_addr_valid+0x1db/0x2d0 [ 16.546358] ? kasan_atomics_helper+0x5115/0x5450 [ 16.546382] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.546407] ? kasan_atomics_helper+0x5115/0x5450 [ 16.546451] kasan_report+0x141/0x180 [ 16.546476] ? kasan_atomics_helper+0x5115/0x5450 [ 16.546535] __asan_report_load8_noabort+0x18/0x20 [ 16.546563] kasan_atomics_helper+0x5115/0x5450 [ 16.546625] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.546650] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.546690] ? kasan_atomics+0x152/0x310 [ 16.546718] kasan_atomics+0x1dc/0x310 [ 16.546743] ? __pfx_kasan_atomics+0x10/0x10 [ 16.546778] ? __pfx_read_tsc+0x10/0x10 [ 16.546801] ? ktime_get_ts64+0x86/0x230 [ 16.546827] kunit_try_run_case+0x1a5/0x480 [ 16.546884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.546910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.546948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.546975] ? __kthread_parkme+0x82/0x180 [ 16.547026] ? preempt_count_sub+0x50/0x80 [ 16.547052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.547080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.547118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.547146] kthread+0x337/0x6f0 [ 16.547167] ? trace_preempt_on+0x20/0xc0 [ 16.547196] ? __pfx_kthread+0x10/0x10 [ 16.547219] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.547243] ? calculate_sigpending+0x7b/0xa0 [ 16.547269] ? __pfx_kthread+0x10/0x10 [ 16.547293] ret_from_fork+0x116/0x1d0 [ 16.547313] ? __pfx_kthread+0x10/0x10 [ 16.547335] ret_from_fork_asm+0x1a/0x30 [ 16.547368] </TASK> [ 16.547380] [ 16.555449] Allocated by task 282: [ 16.555609] kasan_save_stack+0x45/0x70 [ 16.555820] kasan_save_track+0x18/0x40 [ 16.555998] kasan_save_alloc_info+0x3b/0x50 [ 16.556170] __kasan_kmalloc+0xb7/0xc0 [ 16.556492] __kmalloc_cache_noprof+0x189/0x420 [ 16.556784] kasan_atomics+0x95/0x310 [ 16.556980] kunit_try_run_case+0x1a5/0x480 [ 16.557141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.557406] kthread+0x337/0x6f0 [ 16.557635] ret_from_fork+0x116/0x1d0 [ 16.557830] ret_from_fork_asm+0x1a/0x30 [ 16.558058] [ 16.558139] The buggy address belongs to the object at ffff888103082e00 [ 16.558139] which belongs to the cache kmalloc-64 of size 64 [ 16.558742] The buggy address is located 0 bytes to the right of [ 16.558742] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.559185] [ 16.559284] The buggy address belongs to the physical page: [ 16.559618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.559986] flags: 0x200000000000000(node=0|zone=2) [ 16.560243] page_type: f5(slab) [ 16.560386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.560746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.561031] page dumped because: kasan: bad access detected [ 16.561331] [ 16.561471] Memory state around the buggy address: [ 16.561669] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.561984] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.562396] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.562712] ^ [ 16.562918] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.563247] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.563628] ================================================================== [ 15.114922] ================================================================== [ 15.115715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.116629] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.117576] [ 15.117815] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.117865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.117879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.117904] Call Trace: [ 15.117919] <TASK> [ 15.117937] dump_stack_lvl+0x73/0xb0 [ 15.117969] print_report+0xd1/0x610 [ 15.117994] ? __virt_addr_valid+0x1db/0x2d0 [ 15.118019] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.118083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.118111] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.118135] kasan_report+0x141/0x180 [ 15.118192] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.118221] kasan_check_range+0x10c/0x1c0 [ 15.118247] __kasan_check_write+0x18/0x20 [ 15.118270] kasan_atomics_helper+0x4a0/0x5450 [ 15.118295] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.118320] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.118348] ? kasan_atomics+0x152/0x310 [ 15.118377] kasan_atomics+0x1dc/0x310 [ 15.118402] ? __pfx_kasan_atomics+0x10/0x10 [ 15.118427] ? __pfx_read_tsc+0x10/0x10 [ 15.118461] ? ktime_get_ts64+0x86/0x230 [ 15.118487] kunit_try_run_case+0x1a5/0x480 [ 15.118514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.118538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.118565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.118592] ? __kthread_parkme+0x82/0x180 [ 15.118615] ? preempt_count_sub+0x50/0x80 [ 15.118640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.118667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.118693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.118722] kthread+0x337/0x6f0 [ 15.118743] ? trace_preempt_on+0x20/0xc0 [ 15.118778] ? __pfx_kthread+0x10/0x10 [ 15.118801] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.118824] ? calculate_sigpending+0x7b/0xa0 [ 15.118850] ? __pfx_kthread+0x10/0x10 [ 15.118873] ret_from_fork+0x116/0x1d0 [ 15.118893] ? __pfx_kthread+0x10/0x10 [ 15.118915] ret_from_fork_asm+0x1a/0x30 [ 15.118949] </TASK> [ 15.118960] [ 15.133893] Allocated by task 282: [ 15.134107] kasan_save_stack+0x45/0x70 [ 15.134638] kasan_save_track+0x18/0x40 [ 15.135123] kasan_save_alloc_info+0x3b/0x50 [ 15.135872] __kasan_kmalloc+0xb7/0xc0 [ 15.136318] __kmalloc_cache_noprof+0x189/0x420 [ 15.136844] kasan_atomics+0x95/0x310 [ 15.137304] kunit_try_run_case+0x1a5/0x480 [ 15.137794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.138371] kthread+0x337/0x6f0 [ 15.138661] ret_from_fork+0x116/0x1d0 [ 15.139211] ret_from_fork_asm+0x1a/0x30 [ 15.139412] [ 15.139615] The buggy address belongs to the object at ffff888103082e00 [ 15.139615] which belongs to the cache kmalloc-64 of size 64 [ 15.140722] The buggy address is located 0 bytes to the right of [ 15.140722] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.141413] [ 15.141602] The buggy address belongs to the physical page: [ 15.142147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.142841] flags: 0x200000000000000(node=0|zone=2) [ 15.143206] page_type: f5(slab) [ 15.143618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.144486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.145086] page dumped because: kasan: bad access detected [ 15.145434] [ 15.145509] Memory state around the buggy address: [ 15.145692] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.147395] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.147722] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.147959] ^ [ 15.148128] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.148352] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.148572] ================================================================== [ 15.737813] ================================================================== [ 15.738304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.738963] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.739299] [ 15.739432] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.739493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.739507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.739530] Call Trace: [ 15.739547] <TASK> [ 15.739580] dump_stack_lvl+0x73/0xb0 [ 15.739612] print_report+0xd1/0x610 [ 15.739655] ? __virt_addr_valid+0x1db/0x2d0 [ 15.739680] ? kasan_atomics_helper+0x1217/0x5450 [ 15.739704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.739730] ? kasan_atomics_helper+0x1217/0x5450 [ 15.739754] kasan_report+0x141/0x180 [ 15.739789] ? kasan_atomics_helper+0x1217/0x5450 [ 15.739817] kasan_check_range+0x10c/0x1c0 [ 15.739843] __kasan_check_write+0x18/0x20 [ 15.739865] kasan_atomics_helper+0x1217/0x5450 [ 15.739890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.739916] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.739944] ? kasan_atomics+0x152/0x310 [ 15.739972] kasan_atomics+0x1dc/0x310 [ 15.739996] ? __pfx_kasan_atomics+0x10/0x10 [ 15.740023] ? __pfx_read_tsc+0x10/0x10 [ 15.740045] ? ktime_get_ts64+0x86/0x230 [ 15.740071] kunit_try_run_case+0x1a5/0x480 [ 15.740099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.740124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.740151] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.740178] ? __kthread_parkme+0x82/0x180 [ 15.740201] ? preempt_count_sub+0x50/0x80 [ 15.740226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.740252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.740298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.740325] kthread+0x337/0x6f0 [ 15.740347] ? trace_preempt_on+0x20/0xc0 [ 15.740371] ? __pfx_kthread+0x10/0x10 [ 15.740410] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.740433] ? calculate_sigpending+0x7b/0xa0 [ 15.740473] ? __pfx_kthread+0x10/0x10 [ 15.740507] ret_from_fork+0x116/0x1d0 [ 15.740528] ? __pfx_kthread+0x10/0x10 [ 15.740550] ret_from_fork_asm+0x1a/0x30 [ 15.740583] </TASK> [ 15.740594] [ 15.748501] Allocated by task 282: [ 15.748703] kasan_save_stack+0x45/0x70 [ 15.748943] kasan_save_track+0x18/0x40 [ 15.749179] kasan_save_alloc_info+0x3b/0x50 [ 15.749415] __kasan_kmalloc+0xb7/0xc0 [ 15.749668] __kmalloc_cache_noprof+0x189/0x420 [ 15.749978] kasan_atomics+0x95/0x310 [ 15.750149] kunit_try_run_case+0x1a5/0x480 [ 15.750295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.750487] kthread+0x337/0x6f0 [ 15.750654] ret_from_fork+0x116/0x1d0 [ 15.750851] ret_from_fork_asm+0x1a/0x30 [ 15.751207] [ 15.751278] The buggy address belongs to the object at ffff888103082e00 [ 15.751278] which belongs to the cache kmalloc-64 of size 64 [ 15.752029] The buggy address is located 0 bytes to the right of [ 15.752029] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.752802] [ 15.752888] The buggy address belongs to the physical page: [ 15.753081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.753318] flags: 0x200000000000000(node=0|zone=2) [ 15.753478] page_type: f5(slab) [ 15.753597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.753909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.754268] page dumped because: kasan: bad access detected [ 15.754538] [ 15.754651] Memory state around the buggy address: [ 15.754914] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.755289] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.755651] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.755978] ^ [ 15.756151] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.756363] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.756731] ================================================================== [ 16.237981] ================================================================== [ 16.238854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.239360] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.239965] [ 16.240158] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.240204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.240218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.240241] Call Trace: [ 16.240258] <TASK> [ 16.240276] dump_stack_lvl+0x73/0xb0 [ 16.240306] print_report+0xd1/0x610 [ 16.240349] ? __virt_addr_valid+0x1db/0x2d0 [ 16.240374] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.240398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.240424] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.240448] kasan_report+0x141/0x180 [ 16.240483] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.240511] kasan_check_range+0x10c/0x1c0 [ 16.240537] __kasan_check_write+0x18/0x20 [ 16.240558] kasan_atomics_helper+0x1ce1/0x5450 [ 16.240583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.240608] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.240636] ? kasan_atomics+0x152/0x310 [ 16.240663] kasan_atomics+0x1dc/0x310 [ 16.240687] ? __pfx_kasan_atomics+0x10/0x10 [ 16.240715] ? __pfx_read_tsc+0x10/0x10 [ 16.240737] ? ktime_get_ts64+0x86/0x230 [ 16.240775] kunit_try_run_case+0x1a5/0x480 [ 16.240803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.240829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.240859] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.240887] ? __kthread_parkme+0x82/0x180 [ 16.240910] ? preempt_count_sub+0x50/0x80 [ 16.240936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.240963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.240990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.241018] kthread+0x337/0x6f0 [ 16.241040] ? trace_preempt_on+0x20/0xc0 [ 16.241066] ? __pfx_kthread+0x10/0x10 [ 16.241089] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.241112] ? calculate_sigpending+0x7b/0xa0 [ 16.241138] ? __pfx_kthread+0x10/0x10 [ 16.241161] ret_from_fork+0x116/0x1d0 [ 16.241181] ? __pfx_kthread+0x10/0x10 [ 16.241203] ret_from_fork_asm+0x1a/0x30 [ 16.241235] </TASK> [ 16.241247] [ 16.248596] Allocated by task 282: [ 16.248803] kasan_save_stack+0x45/0x70 [ 16.248989] kasan_save_track+0x18/0x40 [ 16.249172] kasan_save_alloc_info+0x3b/0x50 [ 16.249384] __kasan_kmalloc+0xb7/0xc0 [ 16.249628] __kmalloc_cache_noprof+0x189/0x420 [ 16.249847] kasan_atomics+0x95/0x310 [ 16.250058] kunit_try_run_case+0x1a5/0x480 [ 16.250264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.250611] kthread+0x337/0x6f0 [ 16.250786] ret_from_fork+0x116/0x1d0 [ 16.250956] ret_from_fork_asm+0x1a/0x30 [ 16.251192] [ 16.251319] The buggy address belongs to the object at ffff888103082e00 [ 16.251319] which belongs to the cache kmalloc-64 of size 64 [ 16.251887] The buggy address is located 0 bytes to the right of [ 16.251887] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.252426] [ 16.252549] The buggy address belongs to the physical page: [ 16.252859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.253091] flags: 0x200000000000000(node=0|zone=2) [ 16.253249] page_type: f5(slab) [ 16.253367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.253888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.254229] page dumped because: kasan: bad access detected [ 16.254498] [ 16.254624] Memory state around the buggy address: [ 16.254895] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.255266] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.255635] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.255986] ^ [ 16.256201] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256565] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256802] ================================================================== [ 15.718834] ================================================================== [ 15.719192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.719550] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.719863] [ 15.719993] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.720052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.720079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.720100] Call Trace: [ 15.720117] <TASK> [ 15.720133] dump_stack_lvl+0x73/0xb0 [ 15.720164] print_report+0xd1/0x610 [ 15.720188] ? __virt_addr_valid+0x1db/0x2d0 [ 15.720214] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.720238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.720264] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.720289] kasan_report+0x141/0x180 [ 15.720313] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.720342] __asan_report_load4_noabort+0x18/0x20 [ 15.720369] kasan_atomics_helper+0x4a02/0x5450 [ 15.720412] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.720446] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.720474] ? kasan_atomics+0x152/0x310 [ 15.720502] kasan_atomics+0x1dc/0x310 [ 15.720526] ? __pfx_kasan_atomics+0x10/0x10 [ 15.720552] ? __pfx_read_tsc+0x10/0x10 [ 15.720575] ? ktime_get_ts64+0x86/0x230 [ 15.720617] kunit_try_run_case+0x1a5/0x480 [ 15.720658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.720696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.720736] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.720799] ? __kthread_parkme+0x82/0x180 [ 15.720835] ? preempt_count_sub+0x50/0x80 [ 15.720887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.720916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.720942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.720971] kthread+0x337/0x6f0 [ 15.720992] ? trace_preempt_on+0x20/0xc0 [ 15.721016] ? __pfx_kthread+0x10/0x10 [ 15.721039] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.721063] ? calculate_sigpending+0x7b/0xa0 [ 15.721089] ? __pfx_kthread+0x10/0x10 [ 15.721113] ret_from_fork+0x116/0x1d0 [ 15.721133] ? __pfx_kthread+0x10/0x10 [ 15.721155] ret_from_fork_asm+0x1a/0x30 [ 15.721188] </TASK> [ 15.721200] [ 15.729214] Allocated by task 282: [ 15.729340] kasan_save_stack+0x45/0x70 [ 15.729582] kasan_save_track+0x18/0x40 [ 15.729790] kasan_save_alloc_info+0x3b/0x50 [ 15.730026] __kasan_kmalloc+0xb7/0xc0 [ 15.730220] __kmalloc_cache_noprof+0x189/0x420 [ 15.730504] kasan_atomics+0x95/0x310 [ 15.730736] kunit_try_run_case+0x1a5/0x480 [ 15.730982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.731246] kthread+0x337/0x6f0 [ 15.731403] ret_from_fork+0x116/0x1d0 [ 15.731666] ret_from_fork_asm+0x1a/0x30 [ 15.731880] [ 15.731986] The buggy address belongs to the object at ffff888103082e00 [ 15.731986] which belongs to the cache kmalloc-64 of size 64 [ 15.732372] The buggy address is located 0 bytes to the right of [ 15.732372] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.733158] [ 15.733261] The buggy address belongs to the physical page: [ 15.733574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.733958] flags: 0x200000000000000(node=0|zone=2) [ 15.734187] page_type: f5(slab) [ 15.734337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.734565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.734809] page dumped because: kasan: bad access detected [ 15.735084] [ 15.735207] Memory state around the buggy address: [ 15.735459] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.736014] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.736349] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.736665] ^ [ 15.736899] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.737133] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.737342] ================================================================== [ 16.342740] ================================================================== [ 16.343104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.343589] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.344168] [ 16.344390] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.344442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.344567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.344592] Call Trace: [ 16.344609] <TASK> [ 16.344626] dump_stack_lvl+0x73/0xb0 [ 16.344660] print_report+0xd1/0x610 [ 16.344685] ? __virt_addr_valid+0x1db/0x2d0 [ 16.344711] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.344735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.344773] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.344797] kasan_report+0x141/0x180 [ 16.344821] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.344851] __asan_report_load8_noabort+0x18/0x20 [ 16.344879] kasan_atomics_helper+0x4f71/0x5450 [ 16.344904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.344929] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.344957] ? kasan_atomics+0x152/0x310 [ 16.344986] kasan_atomics+0x1dc/0x310 [ 16.345011] ? __pfx_kasan_atomics+0x10/0x10 [ 16.345038] ? __pfx_read_tsc+0x10/0x10 [ 16.345062] ? ktime_get_ts64+0x86/0x230 [ 16.345088] kunit_try_run_case+0x1a5/0x480 [ 16.345115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.345167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.345194] ? __kthread_parkme+0x82/0x180 [ 16.345216] ? preempt_count_sub+0x50/0x80 [ 16.345242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.345269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.345296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.345324] kthread+0x337/0x6f0 [ 16.345345] ? trace_preempt_on+0x20/0xc0 [ 16.345371] ? __pfx_kthread+0x10/0x10 [ 16.345394] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.345418] ? calculate_sigpending+0x7b/0xa0 [ 16.345457] ? __pfx_kthread+0x10/0x10 [ 16.345481] ret_from_fork+0x116/0x1d0 [ 16.345501] ? __pfx_kthread+0x10/0x10 [ 16.345524] ret_from_fork_asm+0x1a/0x30 [ 16.345557] </TASK> [ 16.345568] [ 16.356295] Allocated by task 282: [ 16.356798] kasan_save_stack+0x45/0x70 [ 16.357119] kasan_save_track+0x18/0x40 [ 16.357330] kasan_save_alloc_info+0x3b/0x50 [ 16.357673] __kasan_kmalloc+0xb7/0xc0 [ 16.357950] __kmalloc_cache_noprof+0x189/0x420 [ 16.358237] kasan_atomics+0x95/0x310 [ 16.358559] kunit_try_run_case+0x1a5/0x480 [ 16.358870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.359219] kthread+0x337/0x6f0 [ 16.359388] ret_from_fork+0x116/0x1d0 [ 16.359724] ret_from_fork_asm+0x1a/0x30 [ 16.360011] [ 16.360118] The buggy address belongs to the object at ffff888103082e00 [ 16.360118] which belongs to the cache kmalloc-64 of size 64 [ 16.360901] The buggy address is located 0 bytes to the right of [ 16.360901] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.361578] [ 16.361797] The buggy address belongs to the physical page: [ 16.362045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.362353] flags: 0x200000000000000(node=0|zone=2) [ 16.362803] page_type: f5(slab) [ 16.363066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.363472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.363908] page dumped because: kasan: bad access detected [ 16.364236] [ 16.364446] Memory state around the buggy address: [ 16.364746] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.365083] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.365359] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.366067] ^ [ 16.366282] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.366784] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.367210] ================================================================== [ 15.013540] ================================================================== [ 15.013890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.014322] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.014806] [ 15.015000] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.015047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.015059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.015082] Call Trace: [ 15.015127] <TASK> [ 15.015143] dump_stack_lvl+0x73/0xb0 [ 15.015175] print_report+0xd1/0x610 [ 15.015216] ? __virt_addr_valid+0x1db/0x2d0 [ 15.015241] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.015264] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.015289] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.015313] kasan_report+0x141/0x180 [ 15.015336] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.015363] __asan_report_store4_noabort+0x1b/0x30 [ 15.015390] kasan_atomics_helper+0x4ba2/0x5450 [ 15.015414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.015437] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.015464] ? kasan_atomics+0x152/0x310 [ 15.015491] kasan_atomics+0x1dc/0x310 [ 15.015515] ? __pfx_kasan_atomics+0x10/0x10 [ 15.015542] ? __pfx_read_tsc+0x10/0x10 [ 15.015564] ? ktime_get_ts64+0x86/0x230 [ 15.015590] kunit_try_run_case+0x1a5/0x480 [ 15.015616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.015667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.015692] ? __kthread_parkme+0x82/0x180 [ 15.015714] ? preempt_count_sub+0x50/0x80 [ 15.015739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.015803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.015840] kthread+0x337/0x6f0 [ 15.015860] ? trace_preempt_on+0x20/0xc0 [ 15.015885] ? __pfx_kthread+0x10/0x10 [ 15.015918] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.015942] ? calculate_sigpending+0x7b/0xa0 [ 15.015969] ? __pfx_kthread+0x10/0x10 [ 15.016003] ret_from_fork+0x116/0x1d0 [ 15.016033] ? __pfx_kthread+0x10/0x10 [ 15.016055] ret_from_fork_asm+0x1a/0x30 [ 15.016086] </TASK> [ 15.016096] [ 15.024368] Allocated by task 282: [ 15.024543] kasan_save_stack+0x45/0x70 [ 15.024738] kasan_save_track+0x18/0x40 [ 15.024887] kasan_save_alloc_info+0x3b/0x50 [ 15.025038] __kasan_kmalloc+0xb7/0xc0 [ 15.025173] __kmalloc_cache_noprof+0x189/0x420 [ 15.025563] kasan_atomics+0x95/0x310 [ 15.025770] kunit_try_run_case+0x1a5/0x480 [ 15.026006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.026262] kthread+0x337/0x6f0 [ 15.026554] ret_from_fork+0x116/0x1d0 [ 15.026770] ret_from_fork_asm+0x1a/0x30 [ 15.026994] [ 15.027162] The buggy address belongs to the object at ffff888103082e00 [ 15.027162] which belongs to the cache kmalloc-64 of size 64 [ 15.027706] The buggy address is located 0 bytes to the right of [ 15.027706] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.028401] [ 15.028475] The buggy address belongs to the physical page: [ 15.028834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.029267] flags: 0x200000000000000(node=0|zone=2) [ 15.029427] page_type: f5(slab) [ 15.029543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.029776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.029994] page dumped because: kasan: bad access detected [ 15.030501] [ 15.030596] Memory state around the buggy address: [ 15.030826] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.031455] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.031834] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.032043] ^ [ 15.032195] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032404] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.033120] ================================================================== [ 16.206883] ================================================================== [ 16.208305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.209229] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.209579] [ 16.209985] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.210036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.210050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.210072] Call Trace: [ 16.210086] <TASK> [ 16.210103] dump_stack_lvl+0x73/0xb0 [ 16.210160] print_report+0xd1/0x610 [ 16.210185] ? __virt_addr_valid+0x1db/0x2d0 [ 16.210210] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.210234] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.210260] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.210284] kasan_report+0x141/0x180 [ 16.210308] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.210436] __asan_report_load8_noabort+0x18/0x20 [ 16.210479] kasan_atomics_helper+0x4f30/0x5450 [ 16.210505] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.210531] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.210561] ? kasan_atomics+0x152/0x310 [ 16.210589] kasan_atomics+0x1dc/0x310 [ 16.210614] ? __pfx_kasan_atomics+0x10/0x10 [ 16.210640] ? __pfx_read_tsc+0x10/0x10 [ 16.210663] ? ktime_get_ts64+0x86/0x230 [ 16.210690] kunit_try_run_case+0x1a5/0x480 [ 16.210717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.210743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.210781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.210807] ? __kthread_parkme+0x82/0x180 [ 16.210831] ? preempt_count_sub+0x50/0x80 [ 16.210857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.210883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.210911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.210939] kthread+0x337/0x6f0 [ 16.210960] ? trace_preempt_on+0x20/0xc0 [ 16.210985] ? __pfx_kthread+0x10/0x10 [ 16.211007] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.211030] ? calculate_sigpending+0x7b/0xa0 [ 16.211056] ? __pfx_kthread+0x10/0x10 [ 16.211079] ret_from_fork+0x116/0x1d0 [ 16.211099] ? __pfx_kthread+0x10/0x10 [ 16.211121] ret_from_fork_asm+0x1a/0x30 [ 16.211154] </TASK> [ 16.211166] [ 16.224970] Allocated by task 282: [ 16.225331] kasan_save_stack+0x45/0x70 [ 16.225708] kasan_save_track+0x18/0x40 [ 16.226178] kasan_save_alloc_info+0x3b/0x50 [ 16.226606] __kasan_kmalloc+0xb7/0xc0 [ 16.226843] __kmalloc_cache_noprof+0x189/0x420 [ 16.227001] kasan_atomics+0x95/0x310 [ 16.227136] kunit_try_run_case+0x1a5/0x480 [ 16.227287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.227546] kthread+0x337/0x6f0 [ 16.228205] ret_from_fork+0x116/0x1d0 [ 16.228693] ret_from_fork_asm+0x1a/0x30 [ 16.229161] [ 16.229347] The buggy address belongs to the object at ffff888103082e00 [ 16.229347] which belongs to the cache kmalloc-64 of size 64 [ 16.230754] The buggy address is located 0 bytes to the right of [ 16.230754] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.231160] [ 16.231242] The buggy address belongs to the physical page: [ 16.231414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.231888] flags: 0x200000000000000(node=0|zone=2) [ 16.232319] page_type: f5(slab) [ 16.232486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.233073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.233298] page dumped because: kasan: bad access detected [ 16.233485] [ 16.233659] Memory state around the buggy address: [ 16.234122] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.234809] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.235434] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.236028] ^ [ 16.236186] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.236406] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.237052] ================================================================== [ 16.029261] ================================================================== [ 16.030044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.030753] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.031146] [ 16.031244] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.031292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.031305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.031329] Call Trace: [ 16.031346] <TASK> [ 16.031364] dump_stack_lvl+0x73/0xb0 [ 16.031396] print_report+0xd1/0x610 [ 16.031421] ? __virt_addr_valid+0x1db/0x2d0 [ 16.031455] ? kasan_atomics_helper+0x1818/0x5450 [ 16.031478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.031504] ? kasan_atomics_helper+0x1818/0x5450 [ 16.031529] kasan_report+0x141/0x180 [ 16.031553] ? kasan_atomics_helper+0x1818/0x5450 [ 16.031582] kasan_check_range+0x10c/0x1c0 [ 16.031608] __kasan_check_write+0x18/0x20 [ 16.031630] kasan_atomics_helper+0x1818/0x5450 [ 16.031655] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.031681] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.031708] ? kasan_atomics+0x152/0x310 [ 16.031737] kasan_atomics+0x1dc/0x310 [ 16.031771] ? __pfx_kasan_atomics+0x10/0x10 [ 16.031798] ? __pfx_read_tsc+0x10/0x10 [ 16.031822] ? ktime_get_ts64+0x86/0x230 [ 16.031848] kunit_try_run_case+0x1a5/0x480 [ 16.031874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.031900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.031926] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.031953] ? __kthread_parkme+0x82/0x180 [ 16.031976] ? preempt_count_sub+0x50/0x80 [ 16.032002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.032028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.032055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.032083] kthread+0x337/0x6f0 [ 16.032103] ? trace_preempt_on+0x20/0xc0 [ 16.032129] ? __pfx_kthread+0x10/0x10 [ 16.032151] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.032175] ? calculate_sigpending+0x7b/0xa0 [ 16.032201] ? __pfx_kthread+0x10/0x10 [ 16.032224] ret_from_fork+0x116/0x1d0 [ 16.032245] ? __pfx_kthread+0x10/0x10 [ 16.032267] ret_from_fork_asm+0x1a/0x30 [ 16.032299] </TASK> [ 16.032310] [ 16.044678] Allocated by task 282: [ 16.045008] kasan_save_stack+0x45/0x70 [ 16.045356] kasan_save_track+0x18/0x40 [ 16.045809] kasan_save_alloc_info+0x3b/0x50 [ 16.046201] __kasan_kmalloc+0xb7/0xc0 [ 16.046601] __kmalloc_cache_noprof+0x189/0x420 [ 16.047005] kasan_atomics+0x95/0x310 [ 16.047352] kunit_try_run_case+0x1a5/0x480 [ 16.047757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.048242] kthread+0x337/0x6f0 [ 16.048708] ret_from_fork+0x116/0x1d0 [ 16.049059] ret_from_fork_asm+0x1a/0x30 [ 16.049405] [ 16.049593] The buggy address belongs to the object at ffff888103082e00 [ 16.049593] which belongs to the cache kmalloc-64 of size 64 [ 16.050690] The buggy address is located 0 bytes to the right of [ 16.050690] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.051174] [ 16.051253] The buggy address belongs to the physical page: [ 16.051430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.052134] flags: 0x200000000000000(node=0|zone=2) [ 16.052610] page_type: f5(slab) [ 16.052917] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.053598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.054241] page dumped because: kasan: bad access detected [ 16.054747] [ 16.054918] Memory state around the buggy address: [ 16.055129] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.055354] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.055857] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.056453] ^ [ 16.056895] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.057493] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.058022] ================================================================== [ 16.297054] ================================================================== [ 16.297562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.297972] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.298532] [ 16.298620] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.298665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.298678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.298700] Call Trace: [ 16.298713] <TASK> [ 16.298729] dump_stack_lvl+0x73/0xb0 [ 16.298757] print_report+0xd1/0x610 [ 16.298794] ? __virt_addr_valid+0x1db/0x2d0 [ 16.298856] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.298906] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.298932] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.298956] kasan_report+0x141/0x180 [ 16.298980] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.299009] kasan_check_range+0x10c/0x1c0 [ 16.299034] __kasan_check_write+0x18/0x20 [ 16.299087] kasan_atomics_helper+0x1eaa/0x5450 [ 16.299112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.299138] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.299166] ? kasan_atomics+0x152/0x310 [ 16.299227] kasan_atomics+0x1dc/0x310 [ 16.299253] ? __pfx_kasan_atomics+0x10/0x10 [ 16.299279] ? __pfx_read_tsc+0x10/0x10 [ 16.299301] ? ktime_get_ts64+0x86/0x230 [ 16.299327] kunit_try_run_case+0x1a5/0x480 [ 16.299353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.299379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.299406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.299432] ? __kthread_parkme+0x82/0x180 [ 16.299493] ? preempt_count_sub+0x50/0x80 [ 16.299543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.299571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.299598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.299626] kthread+0x337/0x6f0 [ 16.299648] ? trace_preempt_on+0x20/0xc0 [ 16.299673] ? __pfx_kthread+0x10/0x10 [ 16.299695] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.299720] ? calculate_sigpending+0x7b/0xa0 [ 16.299746] ? __pfx_kthread+0x10/0x10 [ 16.299783] ret_from_fork+0x116/0x1d0 [ 16.299804] ? __pfx_kthread+0x10/0x10 [ 16.299827] ret_from_fork_asm+0x1a/0x30 [ 16.299860] </TASK> [ 16.299872] [ 16.308352] Allocated by task 282: [ 16.308594] kasan_save_stack+0x45/0x70 [ 16.308835] kasan_save_track+0x18/0x40 [ 16.308976] kasan_save_alloc_info+0x3b/0x50 [ 16.309135] __kasan_kmalloc+0xb7/0xc0 [ 16.309313] __kmalloc_cache_noprof+0x189/0x420 [ 16.309685] kasan_atomics+0x95/0x310 [ 16.309888] kunit_try_run_case+0x1a5/0x480 [ 16.310059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.310309] kthread+0x337/0x6f0 [ 16.310489] ret_from_fork+0x116/0x1d0 [ 16.310715] ret_from_fork_asm+0x1a/0x30 [ 16.310927] [ 16.311028] The buggy address belongs to the object at ffff888103082e00 [ 16.311028] which belongs to the cache kmalloc-64 of size 64 [ 16.311620] The buggy address is located 0 bytes to the right of [ 16.311620] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.312185] [ 16.312314] The buggy address belongs to the physical page: [ 16.312630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.313026] flags: 0x200000000000000(node=0|zone=2) [ 16.313281] page_type: f5(slab) [ 16.313455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.313829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.314190] page dumped because: kasan: bad access detected [ 16.314396] [ 16.314537] Memory state around the buggy address: [ 16.314832] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.315201] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.315504] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.315912] ^ [ 16.316151] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.316421] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.316800] ================================================================== [ 16.276230] ================================================================== [ 16.276474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.276836] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.277324] [ 16.277412] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.277456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.277469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.277491] Call Trace: [ 16.277506] <TASK> [ 16.277522] dump_stack_lvl+0x73/0xb0 [ 16.277552] print_report+0xd1/0x610 [ 16.277576] ? __virt_addr_valid+0x1db/0x2d0 [ 16.277601] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.277625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.277651] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.277675] kasan_report+0x141/0x180 [ 16.277699] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.277727] kasan_check_range+0x10c/0x1c0 [ 16.277753] __kasan_check_write+0x18/0x20 [ 16.277788] kasan_atomics_helper+0x1e12/0x5450 [ 16.277813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.277837] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.277865] ? kasan_atomics+0x152/0x310 [ 16.277892] kasan_atomics+0x1dc/0x310 [ 16.277916] ? __pfx_kasan_atomics+0x10/0x10 [ 16.277943] ? __pfx_read_tsc+0x10/0x10 [ 16.277965] ? ktime_get_ts64+0x86/0x230 [ 16.277991] kunit_try_run_case+0x1a5/0x480 [ 16.278018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.278043] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.278069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.278096] ? __kthread_parkme+0x82/0x180 [ 16.278118] ? preempt_count_sub+0x50/0x80 [ 16.278144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.278172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.278198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.278227] kthread+0x337/0x6f0 [ 16.278247] ? trace_preempt_on+0x20/0xc0 [ 16.278272] ? __pfx_kthread+0x10/0x10 [ 16.278294] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.278318] ? calculate_sigpending+0x7b/0xa0 [ 16.278382] ? __pfx_kthread+0x10/0x10 [ 16.278407] ret_from_fork+0x116/0x1d0 [ 16.278453] ? __pfx_kthread+0x10/0x10 [ 16.278499] ret_from_fork_asm+0x1a/0x30 [ 16.278532] </TASK> [ 16.278543] [ 16.287490] Allocated by task 282: [ 16.287699] kasan_save_stack+0x45/0x70 [ 16.287930] kasan_save_track+0x18/0x40 [ 16.288115] kasan_save_alloc_info+0x3b/0x50 [ 16.288352] __kasan_kmalloc+0xb7/0xc0 [ 16.288610] __kmalloc_cache_noprof+0x189/0x420 [ 16.288856] kasan_atomics+0x95/0x310 [ 16.289047] kunit_try_run_case+0x1a5/0x480 [ 16.289253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.289553] kthread+0x337/0x6f0 [ 16.289725] ret_from_fork+0x116/0x1d0 [ 16.289889] ret_from_fork_asm+0x1a/0x30 [ 16.290119] [ 16.290245] The buggy address belongs to the object at ffff888103082e00 [ 16.290245] which belongs to the cache kmalloc-64 of size 64 [ 16.290803] The buggy address is located 0 bytes to the right of [ 16.290803] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.291339] [ 16.291493] The buggy address belongs to the physical page: [ 16.291751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.292009] flags: 0x200000000000000(node=0|zone=2) [ 16.292170] page_type: f5(slab) [ 16.292289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.292551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.292929] page dumped because: kasan: bad access detected [ 16.293175] [ 16.293267] Memory state around the buggy address: [ 16.293539] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.293869] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.294183] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.294392] ^ [ 16.294543] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295055] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295415] ================================================================== [ 16.151437] ================================================================== [ 16.151703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.151962] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.152263] [ 16.152375] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.152420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.152434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.152468] Call Trace: [ 16.152485] <TASK> [ 16.152501] dump_stack_lvl+0x73/0xb0 [ 16.152532] print_report+0xd1/0x610 [ 16.152557] ? __virt_addr_valid+0x1db/0x2d0 [ 16.152582] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.152606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.152631] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.152656] kasan_report+0x141/0x180 [ 16.152681] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.152713] kasan_check_range+0x10c/0x1c0 [ 16.152742] __kasan_check_write+0x18/0x20 [ 16.152775] kasan_atomics_helper+0x1b22/0x5450 [ 16.152801] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.152827] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.152855] ? kasan_atomics+0x152/0x310 [ 16.152884] kasan_atomics+0x1dc/0x310 [ 16.152913] ? __pfx_kasan_atomics+0x10/0x10 [ 16.152941] ? __pfx_read_tsc+0x10/0x10 [ 16.152966] ? ktime_get_ts64+0x86/0x230 [ 16.152993] kunit_try_run_case+0x1a5/0x480 [ 16.153020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.153045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.153073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.153099] ? __kthread_parkme+0x82/0x180 [ 16.153124] ? preempt_count_sub+0x50/0x80 [ 16.153149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.153177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.153203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.153230] kthread+0x337/0x6f0 [ 16.153251] ? trace_preempt_on+0x20/0xc0 [ 16.153275] ? __pfx_kthread+0x10/0x10 [ 16.153298] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.153322] ? calculate_sigpending+0x7b/0xa0 [ 16.153349] ? __pfx_kthread+0x10/0x10 [ 16.153371] ret_from_fork+0x116/0x1d0 [ 16.153392] ? __pfx_kthread+0x10/0x10 [ 16.153415] ret_from_fork_asm+0x1a/0x30 [ 16.153462] </TASK> [ 16.153474] [ 16.166822] Allocated by task 282: [ 16.167275] kasan_save_stack+0x45/0x70 [ 16.167718] kasan_save_track+0x18/0x40 [ 16.167879] kasan_save_alloc_info+0x3b/0x50 [ 16.168035] __kasan_kmalloc+0xb7/0xc0 [ 16.168174] __kmalloc_cache_noprof+0x189/0x420 [ 16.168334] kasan_atomics+0x95/0x310 [ 16.168749] kunit_try_run_case+0x1a5/0x480 [ 16.169232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.169693] kthread+0x337/0x6f0 [ 16.169989] ret_from_fork+0x116/0x1d0 [ 16.170319] ret_from_fork_asm+0x1a/0x30 [ 16.170752] [ 16.170995] The buggy address belongs to the object at ffff888103082e00 [ 16.170995] which belongs to the cache kmalloc-64 of size 64 [ 16.171720] The buggy address is located 0 bytes to the right of [ 16.171720] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.172473] [ 16.172702] The buggy address belongs to the physical page: [ 16.172964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.173296] flags: 0x200000000000000(node=0|zone=2) [ 16.173836] page_type: f5(slab) [ 16.174104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.174742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.175215] page dumped because: kasan: bad access detected [ 16.175602] [ 16.175699] Memory state around the buggy address: [ 16.175929] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.176236] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.176909] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.177353] ^ [ 16.177864] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.178326] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.178859] ================================================================== [ 16.492602] ================================================================== [ 16.492947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.493577] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.494104] [ 16.494215] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.494390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.494405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.494428] Call Trace: [ 16.494457] <TASK> [ 16.494474] dump_stack_lvl+0x73/0xb0 [ 16.494509] print_report+0xd1/0x610 [ 16.494534] ? __virt_addr_valid+0x1db/0x2d0 [ 16.494558] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.494582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.494608] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.494631] kasan_report+0x141/0x180 [ 16.494657] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.494686] __asan_report_load8_noabort+0x18/0x20 [ 16.494714] kasan_atomics_helper+0x4fa5/0x5450 [ 16.494739] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.494777] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.494805] ? kasan_atomics+0x152/0x310 [ 16.494832] kasan_atomics+0x1dc/0x310 [ 16.494857] ? __pfx_kasan_atomics+0x10/0x10 [ 16.494884] ? __pfx_read_tsc+0x10/0x10 [ 16.494907] ? ktime_get_ts64+0x86/0x230 [ 16.494934] kunit_try_run_case+0x1a5/0x480 [ 16.494961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.494987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.495013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.495040] ? __kthread_parkme+0x82/0x180 [ 16.495062] ? preempt_count_sub+0x50/0x80 [ 16.495088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.495115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.495143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.495170] kthread+0x337/0x6f0 [ 16.495195] ? trace_preempt_on+0x20/0xc0 [ 16.495220] ? __pfx_kthread+0x10/0x10 [ 16.495242] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.495265] ? calculate_sigpending+0x7b/0xa0 [ 16.495291] ? __pfx_kthread+0x10/0x10 [ 16.495315] ret_from_fork+0x116/0x1d0 [ 16.495335] ? __pfx_kthread+0x10/0x10 [ 16.495357] ret_from_fork_asm+0x1a/0x30 [ 16.495390] </TASK> [ 16.495402] [ 16.506029] Allocated by task 282: [ 16.506338] kasan_save_stack+0x45/0x70 [ 16.506677] kasan_save_track+0x18/0x40 [ 16.506897] kasan_save_alloc_info+0x3b/0x50 [ 16.507098] __kasan_kmalloc+0xb7/0xc0 [ 16.507277] __kmalloc_cache_noprof+0x189/0x420 [ 16.507868] kasan_atomics+0x95/0x310 [ 16.508095] kunit_try_run_case+0x1a5/0x480 [ 16.508294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.508708] kthread+0x337/0x6f0 [ 16.509018] ret_from_fork+0x116/0x1d0 [ 16.509352] ret_from_fork_asm+0x1a/0x30 [ 16.509652] [ 16.509908] The buggy address belongs to the object at ffff888103082e00 [ 16.509908] which belongs to the cache kmalloc-64 of size 64 [ 16.510738] The buggy address is located 0 bytes to the right of [ 16.510738] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.511403] [ 16.511833] The buggy address belongs to the physical page: [ 16.512134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.512686] flags: 0x200000000000000(node=0|zone=2) [ 16.513128] page_type: f5(slab) [ 16.513309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.513984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.514410] page dumped because: kasan: bad access detected [ 16.514799] [ 16.514900] Memory state around the buggy address: [ 16.515115] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.515418] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.515998] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.516596] ^ [ 16.516830] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.517136] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.517423] ================================================================== [ 16.317346] ================================================================== [ 16.317617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.318094] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.318601] [ 16.318721] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.318816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.318830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.318852] Call Trace: [ 16.318867] <TASK> [ 16.318881] dump_stack_lvl+0x73/0xb0 [ 16.318948] print_report+0xd1/0x610 [ 16.319000] ? __virt_addr_valid+0x1db/0x2d0 [ 16.319025] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.319049] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.319076] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.319101] kasan_report+0x141/0x180 [ 16.319126] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.319159] kasan_check_range+0x10c/0x1c0 [ 16.319193] __kasan_check_write+0x18/0x20 [ 16.319215] kasan_atomics_helper+0x1f43/0x5450 [ 16.319243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.319269] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.319296] ? kasan_atomics+0x152/0x310 [ 16.319325] kasan_atomics+0x1dc/0x310 [ 16.319350] ? __pfx_kasan_atomics+0x10/0x10 [ 16.319377] ? __pfx_read_tsc+0x10/0x10 [ 16.319401] ? ktime_get_ts64+0x86/0x230 [ 16.319427] kunit_try_run_case+0x1a5/0x480 [ 16.319454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.319479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.319506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.319532] ? __kthread_parkme+0x82/0x180 [ 16.319555] ? preempt_count_sub+0x50/0x80 [ 16.319581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.319608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.319635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.319699] kthread+0x337/0x6f0 [ 16.319745] ? trace_preempt_on+0x20/0xc0 [ 16.319969] ? __pfx_kthread+0x10/0x10 [ 16.320024] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.320049] ? calculate_sigpending+0x7b/0xa0 [ 16.320076] ? __pfx_kthread+0x10/0x10 [ 16.320099] ret_from_fork+0x116/0x1d0 [ 16.320120] ? __pfx_kthread+0x10/0x10 [ 16.320143] ret_from_fork_asm+0x1a/0x30 [ 16.320176] </TASK> [ 16.320188] [ 16.331063] Allocated by task 282: [ 16.331416] kasan_save_stack+0x45/0x70 [ 16.331638] kasan_save_track+0x18/0x40 [ 16.331827] kasan_save_alloc_info+0x3b/0x50 [ 16.332029] __kasan_kmalloc+0xb7/0xc0 [ 16.332200] __kmalloc_cache_noprof+0x189/0x420 [ 16.332404] kasan_atomics+0x95/0x310 [ 16.332919] kunit_try_run_case+0x1a5/0x480 [ 16.333194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.333511] kthread+0x337/0x6f0 [ 16.333811] ret_from_fork+0x116/0x1d0 [ 16.334100] ret_from_fork_asm+0x1a/0x30 [ 16.334397] [ 16.334550] The buggy address belongs to the object at ffff888103082e00 [ 16.334550] which belongs to the cache kmalloc-64 of size 64 [ 16.335330] The buggy address is located 0 bytes to the right of [ 16.335330] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.336031] [ 16.336233] The buggy address belongs to the physical page: [ 16.336626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.336984] flags: 0x200000000000000(node=0|zone=2) [ 16.337203] page_type: f5(slab) [ 16.337367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.337972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.338367] page dumped because: kasan: bad access detected [ 16.338796] [ 16.338909] Memory state around the buggy address: [ 16.339306] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.339723] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.340156] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.340565] ^ [ 16.340889] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341307] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341713] ================================================================== [ 15.367072] ================================================================== [ 15.367388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.367883] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.368178] [ 15.368294] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.368341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.368354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.368377] Call Trace: [ 15.368392] <TASK> [ 15.368408] dump_stack_lvl+0x73/0xb0 [ 15.368441] print_report+0xd1/0x610 [ 15.368465] ? __virt_addr_valid+0x1db/0x2d0 [ 15.368491] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.368515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.368540] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.368565] kasan_report+0x141/0x180 [ 15.368589] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.368617] kasan_check_range+0x10c/0x1c0 [ 15.368643] __kasan_check_write+0x18/0x20 [ 15.368664] kasan_atomics_helper+0xa2b/0x5450 [ 15.368690] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.368716] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.368745] ? kasan_atomics+0x152/0x310 [ 15.368786] kasan_atomics+0x1dc/0x310 [ 15.368811] ? __pfx_kasan_atomics+0x10/0x10 [ 15.368838] ? __pfx_read_tsc+0x10/0x10 [ 15.368861] ? ktime_get_ts64+0x86/0x230 [ 15.368888] kunit_try_run_case+0x1a5/0x480 [ 15.368914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.368939] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.368967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.368994] ? __kthread_parkme+0x82/0x180 [ 15.369017] ? preempt_count_sub+0x50/0x80 [ 15.369044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.369071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.369098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.369126] kthread+0x337/0x6f0 [ 15.369147] ? trace_preempt_on+0x20/0xc0 [ 15.369173] ? __pfx_kthread+0x10/0x10 [ 15.369195] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.369219] ? calculate_sigpending+0x7b/0xa0 [ 15.369245] ? __pfx_kthread+0x10/0x10 [ 15.369268] ret_from_fork+0x116/0x1d0 [ 15.369289] ? __pfx_kthread+0x10/0x10 [ 15.369312] ret_from_fork_asm+0x1a/0x30 [ 15.369345] </TASK> [ 15.369356] [ 15.376894] Allocated by task 282: [ 15.377060] kasan_save_stack+0x45/0x70 [ 15.377212] kasan_save_track+0x18/0x40 [ 15.377354] kasan_save_alloc_info+0x3b/0x50 [ 15.377524] __kasan_kmalloc+0xb7/0xc0 [ 15.377721] __kmalloc_cache_noprof+0x189/0x420 [ 15.377959] kasan_atomics+0x95/0x310 [ 15.378154] kunit_try_run_case+0x1a5/0x480 [ 15.378372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.378630] kthread+0x337/0x6f0 [ 15.378811] ret_from_fork+0x116/0x1d0 [ 15.379025] ret_from_fork_asm+0x1a/0x30 [ 15.379202] [ 15.379277] The buggy address belongs to the object at ffff888103082e00 [ 15.379277] which belongs to the cache kmalloc-64 of size 64 [ 15.379789] The buggy address is located 0 bytes to the right of [ 15.379789] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.380297] [ 15.380397] The buggy address belongs to the physical page: [ 15.380621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.380967] flags: 0x200000000000000(node=0|zone=2) [ 15.381204] page_type: f5(slab) [ 15.381376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.381696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.381964] page dumped because: kasan: bad access detected [ 15.382139] [ 15.382211] Memory state around the buggy address: [ 15.382369] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.382646] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.382972] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.383421] ^ [ 15.383633] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.383864] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.384080] ================================================================== [ 15.149899] ================================================================== [ 15.151992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.153785] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.155138] [ 15.155477] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.155531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.155546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.155570] Call Trace: [ 15.155592] <TASK> [ 15.155611] dump_stack_lvl+0x73/0xb0 [ 15.156006] print_report+0xd1/0x610 [ 15.156034] ? __virt_addr_valid+0x1db/0x2d0 [ 15.156073] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.156099] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.156163] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.156188] kasan_report+0x141/0x180 [ 15.156213] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.156242] __asan_report_store4_noabort+0x1b/0x30 [ 15.156271] kasan_atomics_helper+0x4b3a/0x5450 [ 15.156297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.156322] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.156351] ? kasan_atomics+0x152/0x310 [ 15.156380] kasan_atomics+0x1dc/0x310 [ 15.156406] ? __pfx_kasan_atomics+0x10/0x10 [ 15.156432] ? __pfx_read_tsc+0x10/0x10 [ 15.156466] ? ktime_get_ts64+0x86/0x230 [ 15.156493] kunit_try_run_case+0x1a5/0x480 [ 15.156521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.156546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.156574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.156600] ? __kthread_parkme+0x82/0x180 [ 15.156624] ? preempt_count_sub+0x50/0x80 [ 15.156651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.156678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.156705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.156733] kthread+0x337/0x6f0 [ 15.156754] ? trace_preempt_on+0x20/0xc0 [ 15.156799] ? __pfx_kthread+0x10/0x10 [ 15.156822] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.156845] ? calculate_sigpending+0x7b/0xa0 [ 15.156873] ? __pfx_kthread+0x10/0x10 [ 15.156898] ret_from_fork+0x116/0x1d0 [ 15.156919] ? __pfx_kthread+0x10/0x10 [ 15.156941] ret_from_fork_asm+0x1a/0x30 [ 15.156974] </TASK> [ 15.156986] [ 15.172552] Allocated by task 282: [ 15.172749] kasan_save_stack+0x45/0x70 [ 15.173356] kasan_save_track+0x18/0x40 [ 15.173667] kasan_save_alloc_info+0x3b/0x50 [ 15.174104] __kasan_kmalloc+0xb7/0xc0 [ 15.174443] __kmalloc_cache_noprof+0x189/0x420 [ 15.174823] kasan_atomics+0x95/0x310 [ 15.175305] kunit_try_run_case+0x1a5/0x480 [ 15.175630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.176162] kthread+0x337/0x6f0 [ 15.176305] ret_from_fork+0x116/0x1d0 [ 15.176727] ret_from_fork_asm+0x1a/0x30 [ 15.176947] [ 15.177275] The buggy address belongs to the object at ffff888103082e00 [ 15.177275] which belongs to the cache kmalloc-64 of size 64 [ 15.177945] The buggy address is located 0 bytes to the right of [ 15.177945] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.179337] [ 15.179457] The buggy address belongs to the physical page: [ 15.179661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.180296] flags: 0x200000000000000(node=0|zone=2) [ 15.180860] page_type: f5(slab) [ 15.181132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.181426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.181823] page dumped because: kasan: bad access detected [ 15.182211] [ 15.182316] Memory state around the buggy address: [ 15.182859] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.183376] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.184028] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.184567] ^ [ 15.184769] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.185306] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.185918] ================================================================== [ 15.450959] ================================================================== [ 15.451279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.451922] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.452402] [ 15.452585] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.452634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.452648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.452670] Call Trace: [ 15.452685] <TASK> [ 15.452700] dump_stack_lvl+0x73/0xb0 [ 15.452733] print_report+0xd1/0x610 [ 15.452772] ? __virt_addr_valid+0x1db/0x2d0 [ 15.452797] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.453110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.453137] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.453162] kasan_report+0x141/0x180 [ 15.453187] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.453217] __asan_report_load4_noabort+0x18/0x20 [ 15.453244] kasan_atomics_helper+0x4a84/0x5450 [ 15.453270] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.453296] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.453325] ? kasan_atomics+0x152/0x310 [ 15.453354] kasan_atomics+0x1dc/0x310 [ 15.453378] ? __pfx_kasan_atomics+0x10/0x10 [ 15.453405] ? __pfx_read_tsc+0x10/0x10 [ 15.453428] ? ktime_get_ts64+0x86/0x230 [ 15.453466] kunit_try_run_case+0x1a5/0x480 [ 15.453493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.453547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.453574] ? __kthread_parkme+0x82/0x180 [ 15.453597] ? preempt_count_sub+0x50/0x80 [ 15.453624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.453680] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.453708] kthread+0x337/0x6f0 [ 15.453729] ? trace_preempt_on+0x20/0xc0 [ 15.453755] ? __pfx_kthread+0x10/0x10 [ 15.453791] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.453814] ? calculate_sigpending+0x7b/0xa0 [ 15.453841] ? __pfx_kthread+0x10/0x10 [ 15.453864] ret_from_fork+0x116/0x1d0 [ 15.453884] ? __pfx_kthread+0x10/0x10 [ 15.453907] ret_from_fork_asm+0x1a/0x30 [ 15.453940] </TASK> [ 15.453951] [ 15.463455] Allocated by task 282: [ 15.463632] kasan_save_stack+0x45/0x70 [ 15.464004] kasan_save_track+0x18/0x40 [ 15.464206] kasan_save_alloc_info+0x3b/0x50 [ 15.464404] __kasan_kmalloc+0xb7/0xc0 [ 15.464720] __kmalloc_cache_noprof+0x189/0x420 [ 15.464940] kasan_atomics+0x95/0x310 [ 15.465136] kunit_try_run_case+0x1a5/0x480 [ 15.465333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.465770] kthread+0x337/0x6f0 [ 15.466009] ret_from_fork+0x116/0x1d0 [ 15.466199] ret_from_fork_asm+0x1a/0x30 [ 15.466509] [ 15.466613] The buggy address belongs to the object at ffff888103082e00 [ 15.466613] which belongs to the cache kmalloc-64 of size 64 [ 15.467217] The buggy address is located 0 bytes to the right of [ 15.467217] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.467902] [ 15.468003] The buggy address belongs to the physical page: [ 15.468197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.468756] flags: 0x200000000000000(node=0|zone=2) [ 15.469009] page_type: f5(slab) [ 15.469167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.469656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.470039] page dumped because: kasan: bad access detected [ 15.470354] [ 15.470450] Memory state around the buggy address: [ 15.470838] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.471195] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.471570] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.471828] ^ [ 15.472136] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.472611] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.472919] ================================================================== [ 14.989907] ================================================================== [ 14.991715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.992159] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 14.992502] [ 14.992658] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.992706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.992749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.992789] Call Trace: [ 14.992801] <TASK> [ 14.992818] dump_stack_lvl+0x73/0xb0 [ 14.992850] print_report+0xd1/0x610 [ 14.992874] ? __virt_addr_valid+0x1db/0x2d0 [ 14.992899] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.992922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.992947] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.992970] kasan_report+0x141/0x180 [ 14.993009] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.993037] __asan_report_load4_noabort+0x18/0x20 [ 14.993063] kasan_atomics_helper+0x4bbc/0x5450 [ 14.993087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.993138] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.993167] ? kasan_atomics+0x152/0x310 [ 14.993207] kasan_atomics+0x1dc/0x310 [ 14.993231] ? __pfx_kasan_atomics+0x10/0x10 [ 14.993257] ? __pfx_read_tsc+0x10/0x10 [ 14.993279] ? ktime_get_ts64+0x86/0x230 [ 14.993306] kunit_try_run_case+0x1a5/0x480 [ 14.993333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993358] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.993384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.993409] ? __kthread_parkme+0x82/0x180 [ 14.993432] ? preempt_count_sub+0x50/0x80 [ 14.993467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.993520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.993546] kthread+0x337/0x6f0 [ 14.993566] ? trace_preempt_on+0x20/0xc0 [ 14.993591] ? __pfx_kthread+0x10/0x10 [ 14.993612] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.993635] ? calculate_sigpending+0x7b/0xa0 [ 14.993661] ? __pfx_kthread+0x10/0x10 [ 14.993684] ret_from_fork+0x116/0x1d0 [ 14.993704] ? __pfx_kthread+0x10/0x10 [ 14.993725] ret_from_fork_asm+0x1a/0x30 [ 14.993767] </TASK> [ 14.993778] [ 15.002540] Allocated by task 282: [ 15.002728] kasan_save_stack+0x45/0x70 [ 15.002995] kasan_save_track+0x18/0x40 [ 15.003251] kasan_save_alloc_info+0x3b/0x50 [ 15.003461] __kasan_kmalloc+0xb7/0xc0 [ 15.003598] __kmalloc_cache_noprof+0x189/0x420 [ 15.003770] kasan_atomics+0x95/0x310 [ 15.004145] kunit_try_run_case+0x1a5/0x480 [ 15.004374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.004772] kthread+0x337/0x6f0 [ 15.005031] ret_from_fork+0x116/0x1d0 [ 15.005282] ret_from_fork_asm+0x1a/0x30 [ 15.005431] [ 15.005505] The buggy address belongs to the object at ffff888103082e00 [ 15.005505] which belongs to the cache kmalloc-64 of size 64 [ 15.006336] The buggy address is located 0 bytes to the right of [ 15.006336] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.006872] [ 15.007047] The buggy address belongs to the physical page: [ 15.007362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.007756] flags: 0x200000000000000(node=0|zone=2) [ 15.007940] page_type: f5(slab) [ 15.008066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.008706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.009078] page dumped because: kasan: bad access detected [ 15.009411] [ 15.009565] Memory state around the buggy address: [ 15.009814] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.010250] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.010541] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.010882] ^ [ 15.011271] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.011623] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.011968] ================================================================== [ 16.394363] ================================================================== [ 16.394961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.395405] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.395814] [ 16.396032] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.396275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.396290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.396312] Call Trace: [ 16.396328] <TASK> [ 16.396343] dump_stack_lvl+0x73/0xb0 [ 16.396375] print_report+0xd1/0x610 [ 16.396399] ? __virt_addr_valid+0x1db/0x2d0 [ 16.396423] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.396463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.396489] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.396513] kasan_report+0x141/0x180 [ 16.396537] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.396566] __asan_report_load8_noabort+0x18/0x20 [ 16.396593] kasan_atomics_helper+0x4f98/0x5450 [ 16.396618] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.396643] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.396671] ? kasan_atomics+0x152/0x310 [ 16.396700] kasan_atomics+0x1dc/0x310 [ 16.396724] ? __pfx_kasan_atomics+0x10/0x10 [ 16.396751] ? __pfx_read_tsc+0x10/0x10 [ 16.396786] ? ktime_get_ts64+0x86/0x230 [ 16.396812] kunit_try_run_case+0x1a5/0x480 [ 16.396840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.396865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.396892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.396918] ? __kthread_parkme+0x82/0x180 [ 16.396940] ? preempt_count_sub+0x50/0x80 [ 16.396966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.396993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.397020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.397048] kthread+0x337/0x6f0 [ 16.397068] ? trace_preempt_on+0x20/0xc0 [ 16.397094] ? __pfx_kthread+0x10/0x10 [ 16.397116] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.397139] ? calculate_sigpending+0x7b/0xa0 [ 16.397166] ? __pfx_kthread+0x10/0x10 [ 16.397188] ret_from_fork+0x116/0x1d0 [ 16.397209] ? __pfx_kthread+0x10/0x10 [ 16.397231] ret_from_fork_asm+0x1a/0x30 [ 16.397263] </TASK> [ 16.397275] [ 16.407525] Allocated by task 282: [ 16.408039] kasan_save_stack+0x45/0x70 [ 16.408319] kasan_save_track+0x18/0x40 [ 16.408595] kasan_save_alloc_info+0x3b/0x50 [ 16.408920] __kasan_kmalloc+0xb7/0xc0 [ 16.409114] __kmalloc_cache_noprof+0x189/0x420 [ 16.409492] kasan_atomics+0x95/0x310 [ 16.409706] kunit_try_run_case+0x1a5/0x480 [ 16.410069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.410397] kthread+0x337/0x6f0 [ 16.410698] ret_from_fork+0x116/0x1d0 [ 16.410860] ret_from_fork_asm+0x1a/0x30 [ 16.411211] [ 16.411295] The buggy address belongs to the object at ffff888103082e00 [ 16.411295] which belongs to the cache kmalloc-64 of size 64 [ 16.412058] The buggy address is located 0 bytes to the right of [ 16.412058] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.412759] [ 16.413010] The buggy address belongs to the physical page: [ 16.413243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.413620] flags: 0x200000000000000(node=0|zone=2) [ 16.413881] page_type: f5(slab) [ 16.414261] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.414785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.415099] page dumped because: kasan: bad access detected [ 16.415456] [ 16.415641] Memory state around the buggy address: [ 16.415978] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.416367] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.416844] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.417191] ^ [ 16.417425] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.417872] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.418240] ================================================================== [ 15.212443] ================================================================== [ 15.212737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.213479] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.213841] [ 15.214135] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.214185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.214199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.214222] Call Trace: [ 15.214239] <TASK> [ 15.214255] dump_stack_lvl+0x73/0xb0 [ 15.214288] print_report+0xd1/0x610 [ 15.214314] ? __virt_addr_valid+0x1db/0x2d0 [ 15.214466] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.214490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.214516] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.214540] kasan_report+0x141/0x180 [ 15.214565] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.214593] kasan_check_range+0x10c/0x1c0 [ 15.214619] __kasan_check_write+0x18/0x20 [ 15.214641] kasan_atomics_helper+0x5fe/0x5450 [ 15.214665] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.214690] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.214717] ? kasan_atomics+0x152/0x310 [ 15.214746] kasan_atomics+0x1dc/0x310 [ 15.214783] ? __pfx_kasan_atomics+0x10/0x10 [ 15.214810] ? __pfx_read_tsc+0x10/0x10 [ 15.214833] ? ktime_get_ts64+0x86/0x230 [ 15.214859] kunit_try_run_case+0x1a5/0x480 [ 15.214887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.214914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.214941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.214969] ? __kthread_parkme+0x82/0x180 [ 15.214995] ? preempt_count_sub+0x50/0x80 [ 15.215021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.215048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.215075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.215104] kthread+0x337/0x6f0 [ 15.215125] ? trace_preempt_on+0x20/0xc0 [ 15.215151] ? __pfx_kthread+0x10/0x10 [ 15.215174] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.215201] ? calculate_sigpending+0x7b/0xa0 [ 15.215228] ? __pfx_kthread+0x10/0x10 [ 15.215251] ret_from_fork+0x116/0x1d0 [ 15.215272] ? __pfx_kthread+0x10/0x10 [ 15.215294] ret_from_fork_asm+0x1a/0x30 [ 15.215327] </TASK> [ 15.215338] [ 15.226475] Allocated by task 282: [ 15.226754] kasan_save_stack+0x45/0x70 [ 15.226968] kasan_save_track+0x18/0x40 [ 15.227467] kasan_save_alloc_info+0x3b/0x50 [ 15.227632] __kasan_kmalloc+0xb7/0xc0 [ 15.227965] __kmalloc_cache_noprof+0x189/0x420 [ 15.228371] kasan_atomics+0x95/0x310 [ 15.228550] kunit_try_run_case+0x1a5/0x480 [ 15.228915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.229379] kthread+0x337/0x6f0 [ 15.229581] ret_from_fork+0x116/0x1d0 [ 15.229771] ret_from_fork_asm+0x1a/0x30 [ 15.229953] [ 15.230309] The buggy address belongs to the object at ffff888103082e00 [ 15.230309] which belongs to the cache kmalloc-64 of size 64 [ 15.230943] The buggy address is located 0 bytes to the right of [ 15.230943] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.231681] [ 15.231807] The buggy address belongs to the physical page: [ 15.232186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.232743] flags: 0x200000000000000(node=0|zone=2) [ 15.233085] page_type: f5(slab) [ 15.233277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.233819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.234276] page dumped because: kasan: bad access detected [ 15.234649] [ 15.234832] Memory state around the buggy address: [ 15.235191] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.235552] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.235837] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.236277] ^ [ 15.236449] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.237006] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.237385] ================================================================== [ 15.952776] ================================================================== [ 15.953087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.953412] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.953712] [ 15.953808] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.953851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.953864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.953886] Call Trace: [ 15.953899] <TASK> [ 15.953913] dump_stack_lvl+0x73/0xb0 [ 15.953942] print_report+0xd1/0x610 [ 15.953967] ? __virt_addr_valid+0x1db/0x2d0 [ 15.953992] ? kasan_atomics_helper+0x164f/0x5450 [ 15.954015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.954040] ? kasan_atomics_helper+0x164f/0x5450 [ 15.954064] kasan_report+0x141/0x180 [ 15.954087] ? kasan_atomics_helper+0x164f/0x5450 [ 15.954116] kasan_check_range+0x10c/0x1c0 [ 15.954141] __kasan_check_write+0x18/0x20 [ 15.954163] kasan_atomics_helper+0x164f/0x5450 [ 15.954187] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.954211] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.954239] ? kasan_atomics+0x152/0x310 [ 15.954267] kasan_atomics+0x1dc/0x310 [ 15.954291] ? __pfx_kasan_atomics+0x10/0x10 [ 15.954317] ? __pfx_read_tsc+0x10/0x10 [ 15.954339] ? ktime_get_ts64+0x86/0x230 [ 15.954365] kunit_try_run_case+0x1a5/0x480 [ 15.954392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.954417] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.954444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.954469] ? __kthread_parkme+0x82/0x180 [ 15.954492] ? preempt_count_sub+0x50/0x80 [ 15.954518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.954546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.954574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.954612] kthread+0x337/0x6f0 [ 15.954634] ? trace_preempt_on+0x20/0xc0 [ 15.954659] ? __pfx_kthread+0x10/0x10 [ 15.954681] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.954706] ? calculate_sigpending+0x7b/0xa0 [ 15.954733] ? __pfx_kthread+0x10/0x10 [ 15.954756] ret_from_fork+0x116/0x1d0 [ 15.954788] ? __pfx_kthread+0x10/0x10 [ 15.954810] ret_from_fork_asm+0x1a/0x30 [ 15.954843] </TASK> [ 15.954854] [ 15.962521] Allocated by task 282: [ 15.962677] kasan_save_stack+0x45/0x70 [ 15.962882] kasan_save_track+0x18/0x40 [ 15.963060] kasan_save_alloc_info+0x3b/0x50 [ 15.963278] __kasan_kmalloc+0xb7/0xc0 [ 15.963414] __kmalloc_cache_noprof+0x189/0x420 [ 15.963673] kasan_atomics+0x95/0x310 [ 15.963831] kunit_try_run_case+0x1a5/0x480 [ 15.964039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964221] kthread+0x337/0x6f0 [ 15.964386] ret_from_fork+0x116/0x1d0 [ 15.964519] ret_from_fork_asm+0x1a/0x30 [ 15.964662] [ 15.964756] The buggy address belongs to the object at ffff888103082e00 [ 15.964756] which belongs to the cache kmalloc-64 of size 64 [ 15.965274] The buggy address is located 0 bytes to the right of [ 15.965274] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.965948] [ 15.966044] The buggy address belongs to the physical page: [ 15.966242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.966577] flags: 0x200000000000000(node=0|zone=2) [ 15.966740] page_type: f5(slab) [ 15.966894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.967242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.967607] page dumped because: kasan: bad access detected [ 15.967821] [ 15.967892] Memory state around the buggy address: [ 15.968043] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968255] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968465] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.968737] ^ [ 15.968965] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969275] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969617] ================================================================== [ 15.348023] ================================================================== [ 15.348370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.348962] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.349260] [ 15.349377] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.349423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.349437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.349472] Call Trace: [ 15.349490] <TASK> [ 15.349507] dump_stack_lvl+0x73/0xb0 [ 15.349541] print_report+0xd1/0x610 [ 15.349566] ? __virt_addr_valid+0x1db/0x2d0 [ 15.349593] ? kasan_atomics_helper+0x992/0x5450 [ 15.349617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.349642] ? kasan_atomics_helper+0x992/0x5450 [ 15.349667] kasan_report+0x141/0x180 [ 15.349690] ? kasan_atomics_helper+0x992/0x5450 [ 15.349718] kasan_check_range+0x10c/0x1c0 [ 15.349744] __kasan_check_write+0x18/0x20 [ 15.349778] kasan_atomics_helper+0x992/0x5450 [ 15.349803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.349829] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.349857] ? kasan_atomics+0x152/0x310 [ 15.349886] kasan_atomics+0x1dc/0x310 [ 15.349911] ? __pfx_kasan_atomics+0x10/0x10 [ 15.349938] ? __pfx_read_tsc+0x10/0x10 [ 15.349961] ? ktime_get_ts64+0x86/0x230 [ 15.349988] kunit_try_run_case+0x1a5/0x480 [ 15.350015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.350040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.350069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.350095] ? __kthread_parkme+0x82/0x180 [ 15.350118] ? preempt_count_sub+0x50/0x80 [ 15.350144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.350171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.350198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.350225] kthread+0x337/0x6f0 [ 15.350246] ? trace_preempt_on+0x20/0xc0 [ 15.350271] ? __pfx_kthread+0x10/0x10 [ 15.350293] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.350317] ? calculate_sigpending+0x7b/0xa0 [ 15.350343] ? __pfx_kthread+0x10/0x10 [ 15.350366] ret_from_fork+0x116/0x1d0 [ 15.350386] ? __pfx_kthread+0x10/0x10 [ 15.350409] ret_from_fork_asm+0x1a/0x30 [ 15.350440] </TASK> [ 15.350452] [ 15.358089] Allocated by task 282: [ 15.358251] kasan_save_stack+0x45/0x70 [ 15.358463] kasan_save_track+0x18/0x40 [ 15.358609] kasan_save_alloc_info+0x3b/0x50 [ 15.358824] __kasan_kmalloc+0xb7/0xc0 [ 15.358993] __kmalloc_cache_noprof+0x189/0x420 [ 15.359153] kasan_atomics+0x95/0x310 [ 15.359350] kunit_try_run_case+0x1a5/0x480 [ 15.360313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.360708] kthread+0x337/0x6f0 [ 15.360875] ret_from_fork+0x116/0x1d0 [ 15.361077] ret_from_fork_asm+0x1a/0x30 [ 15.361245] [ 15.361344] The buggy address belongs to the object at ffff888103082e00 [ 15.361344] which belongs to the cache kmalloc-64 of size 64 [ 15.361908] The buggy address is located 0 bytes to the right of [ 15.361908] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.362308] [ 15.362384] The buggy address belongs to the physical page: [ 15.362563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.362922] flags: 0x200000000000000(node=0|zone=2) [ 15.363171] page_type: f5(slab) [ 15.363346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.363585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.363827] page dumped because: kasan: bad access detected [ 15.364007] [ 15.364096] Memory state around the buggy address: [ 15.364326] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.364935] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.365265] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.365690] ^ [ 15.365903] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.366155] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.366420] ================================================================== [ 15.474187] ================================================================== [ 15.474595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.475134] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.476145] [ 15.476515] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.476567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.476582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.476606] Call Trace: [ 15.476624] <TASK> [ 15.476640] dump_stack_lvl+0x73/0xb0 [ 15.476674] print_report+0xd1/0x610 [ 15.476699] ? __virt_addr_valid+0x1db/0x2d0 [ 15.476724] ? kasan_atomics_helper+0xd47/0x5450 [ 15.476749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.476785] ? kasan_atomics_helper+0xd47/0x5450 [ 15.476809] kasan_report+0x141/0x180 [ 15.476833] ? kasan_atomics_helper+0xd47/0x5450 [ 15.476861] kasan_check_range+0x10c/0x1c0 [ 15.476887] __kasan_check_write+0x18/0x20 [ 15.476909] kasan_atomics_helper+0xd47/0x5450 [ 15.476934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.476959] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.476987] ? kasan_atomics+0x152/0x310 [ 15.477015] kasan_atomics+0x1dc/0x310 [ 15.477041] ? __pfx_kasan_atomics+0x10/0x10 [ 15.477069] ? __pfx_read_tsc+0x10/0x10 [ 15.477092] ? ktime_get_ts64+0x86/0x230 [ 15.477119] kunit_try_run_case+0x1a5/0x480 [ 15.477145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.477170] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.477198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.477225] ? __kthread_parkme+0x82/0x180 [ 15.477247] ? preempt_count_sub+0x50/0x80 [ 15.477273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.477301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.477328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.477356] kthread+0x337/0x6f0 [ 15.477377] ? trace_preempt_on+0x20/0xc0 [ 15.477403] ? __pfx_kthread+0x10/0x10 [ 15.477425] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.477597] ? calculate_sigpending+0x7b/0xa0 [ 15.477631] ? __pfx_kthread+0x10/0x10 [ 15.477696] ret_from_fork+0x116/0x1d0 [ 15.477719] ? __pfx_kthread+0x10/0x10 [ 15.477741] ret_from_fork_asm+0x1a/0x30 [ 15.477783] </TASK> [ 15.477797] [ 15.493149] Allocated by task 282: [ 15.493304] kasan_save_stack+0x45/0x70 [ 15.493802] kasan_save_track+0x18/0x40 [ 15.494181] kasan_save_alloc_info+0x3b/0x50 [ 15.494550] __kasan_kmalloc+0xb7/0xc0 [ 15.494744] __kmalloc_cache_noprof+0x189/0x420 [ 15.494959] kasan_atomics+0x95/0x310 [ 15.495138] kunit_try_run_case+0x1a5/0x480 [ 15.495325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.496028] kthread+0x337/0x6f0 [ 15.496235] ret_from_fork+0x116/0x1d0 [ 15.496774] ret_from_fork_asm+0x1a/0x30 [ 15.497293] [ 15.497417] The buggy address belongs to the object at ffff888103082e00 [ 15.497417] which belongs to the cache kmalloc-64 of size 64 [ 15.498175] The buggy address is located 0 bytes to the right of [ 15.498175] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.499117] [ 15.499245] The buggy address belongs to the physical page: [ 15.499621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.500441] flags: 0x200000000000000(node=0|zone=2) [ 15.500884] page_type: f5(slab) [ 15.501051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.501368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.502262] page dumped because: kasan: bad access detected [ 15.502881] [ 15.503155] Memory state around the buggy address: [ 15.503724] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.504135] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.504684] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.505142] ^ [ 15.505368] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.506182] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.506841] ================================================================== [ 15.931833] ================================================================== [ 15.933076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.933446] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.934421] [ 15.934520] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.934568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.934582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.934606] Call Trace: [ 15.934621] <TASK> [ 15.934638] dump_stack_lvl+0x73/0xb0 [ 15.934672] print_report+0xd1/0x610 [ 15.934697] ? __virt_addr_valid+0x1db/0x2d0 [ 15.934722] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.934745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.934787] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.934812] kasan_report+0x141/0x180 [ 15.934835] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.934863] kasan_check_range+0x10c/0x1c0 [ 15.934889] __kasan_check_write+0x18/0x20 [ 15.934910] kasan_atomics_helper+0x15b6/0x5450 [ 15.934934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.934958] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.934985] ? kasan_atomics+0x152/0x310 [ 15.935015] kasan_atomics+0x1dc/0x310 [ 15.935038] ? __pfx_kasan_atomics+0x10/0x10 [ 15.935067] ? __pfx_read_tsc+0x10/0x10 [ 15.935093] ? ktime_get_ts64+0x86/0x230 [ 15.935122] kunit_try_run_case+0x1a5/0x480 [ 15.935149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.935174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.935207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.935233] ? __kthread_parkme+0x82/0x180 [ 15.935255] ? preempt_count_sub+0x50/0x80 [ 15.935281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.935309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.935336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.935364] kthread+0x337/0x6f0 [ 15.935385] ? trace_preempt_on+0x20/0xc0 [ 15.935410] ? __pfx_kthread+0x10/0x10 [ 15.935433] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.935456] ? calculate_sigpending+0x7b/0xa0 [ 15.935483] ? __pfx_kthread+0x10/0x10 [ 15.935506] ret_from_fork+0x116/0x1d0 [ 15.935528] ? __pfx_kthread+0x10/0x10 [ 15.935552] ret_from_fork_asm+0x1a/0x30 [ 15.935585] </TASK> [ 15.935596] [ 15.944397] Allocated by task 282: [ 15.944535] kasan_save_stack+0x45/0x70 [ 15.944702] kasan_save_track+0x18/0x40 [ 15.944926] kasan_save_alloc_info+0x3b/0x50 [ 15.945141] __kasan_kmalloc+0xb7/0xc0 [ 15.945329] __kmalloc_cache_noprof+0x189/0x420 [ 15.945618] kasan_atomics+0x95/0x310 [ 15.945804] kunit_try_run_case+0x1a5/0x480 [ 15.945982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.946162] kthread+0x337/0x6f0 [ 15.946286] ret_from_fork+0x116/0x1d0 [ 15.946471] ret_from_fork_asm+0x1a/0x30 [ 15.946669] [ 15.946779] The buggy address belongs to the object at ffff888103082e00 [ 15.946779] which belongs to the cache kmalloc-64 of size 64 [ 15.947317] The buggy address is located 0 bytes to the right of [ 15.947317] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.947921] [ 15.948020] The buggy address belongs to the physical page: [ 15.948263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.948631] flags: 0x200000000000000(node=0|zone=2) [ 15.948808] page_type: f5(slab) [ 15.948933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.949186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.949519] page dumped because: kasan: bad access detected [ 15.949967] [ 15.950071] Memory state around the buggy address: [ 15.950298] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.950628] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.950859] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.951092] ^ [ 15.951324] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.951834] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.952137] ================================================================== [ 15.842863] ================================================================== [ 15.843252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.843533] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.843883] [ 15.843994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.844039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.844051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.844074] Call Trace: [ 15.844088] <TASK> [ 15.844102] dump_stack_lvl+0x73/0xb0 [ 15.844132] print_report+0xd1/0x610 [ 15.844157] ? __virt_addr_valid+0x1db/0x2d0 [ 15.844183] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.844207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.844233] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.844257] kasan_report+0x141/0x180 [ 15.844282] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.844311] __asan_report_load8_noabort+0x18/0x20 [ 15.844340] kasan_atomics_helper+0x4eae/0x5450 [ 15.844365] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.844390] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.844417] ? kasan_atomics+0x152/0x310 [ 15.844454] kasan_atomics+0x1dc/0x310 [ 15.844479] ? __pfx_kasan_atomics+0x10/0x10 [ 15.844505] ? __pfx_read_tsc+0x10/0x10 [ 15.844528] ? ktime_get_ts64+0x86/0x230 [ 15.844554] kunit_try_run_case+0x1a5/0x480 [ 15.844581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.844633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.844660] ? __kthread_parkme+0x82/0x180 [ 15.844682] ? preempt_count_sub+0x50/0x80 [ 15.844707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.844775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.844803] kthread+0x337/0x6f0 [ 15.844824] ? trace_preempt_on+0x20/0xc0 [ 15.844849] ? __pfx_kthread+0x10/0x10 [ 15.844871] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.844894] ? calculate_sigpending+0x7b/0xa0 [ 15.844921] ? __pfx_kthread+0x10/0x10 [ 15.844944] ret_from_fork+0x116/0x1d0 [ 15.844964] ? __pfx_kthread+0x10/0x10 [ 15.844987] ret_from_fork_asm+0x1a/0x30 [ 15.845018] </TASK> [ 15.845029] [ 15.852270] Allocated by task 282: [ 15.852431] kasan_save_stack+0x45/0x70 [ 15.852641] kasan_save_track+0x18/0x40 [ 15.852809] kasan_save_alloc_info+0x3b/0x50 [ 15.853031] __kasan_kmalloc+0xb7/0xc0 [ 15.853184] __kmalloc_cache_noprof+0x189/0x420 [ 15.853389] kasan_atomics+0x95/0x310 [ 15.853572] kunit_try_run_case+0x1a5/0x480 [ 15.853791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.854028] kthread+0x337/0x6f0 [ 15.854177] ret_from_fork+0x116/0x1d0 [ 15.854326] ret_from_fork_asm+0x1a/0x30 [ 15.854590] [ 15.854775] The buggy address belongs to the object at ffff888103082e00 [ 15.854775] which belongs to the cache kmalloc-64 of size 64 [ 15.855203] The buggy address is located 0 bytes to the right of [ 15.855203] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.855571] [ 15.855643] The buggy address belongs to the physical page: [ 15.855850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.856284] flags: 0x200000000000000(node=0|zone=2) [ 15.856515] page_type: f5(slab) [ 15.856658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.856900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.857129] page dumped because: kasan: bad access detected [ 15.857302] [ 15.857390] Memory state around the buggy address: [ 15.857832] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.858151] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.858471] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.858960] ^ [ 15.859166] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.859387] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.859602] ================================================================== [ 15.991612] ================================================================== [ 15.992369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.993336] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.994150] [ 15.994458] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.994515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.994529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.994553] Call Trace: [ 15.994570] <TASK> [ 15.994587] dump_stack_lvl+0x73/0xb0 [ 15.994621] print_report+0xd1/0x610 [ 15.994646] ? __virt_addr_valid+0x1db/0x2d0 [ 15.994672] ? kasan_atomics_helper+0x177f/0x5450 [ 15.994696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.994722] ? kasan_atomics_helper+0x177f/0x5450 [ 15.994747] kasan_report+0x141/0x180 [ 15.994783] ? kasan_atomics_helper+0x177f/0x5450 [ 15.994812] kasan_check_range+0x10c/0x1c0 [ 15.994838] __kasan_check_write+0x18/0x20 [ 15.994859] kasan_atomics_helper+0x177f/0x5450 [ 15.994884] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.994909] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.994936] ? kasan_atomics+0x152/0x310 [ 15.994965] kasan_atomics+0x1dc/0x310 [ 15.994989] ? __pfx_kasan_atomics+0x10/0x10 [ 15.995015] ? __pfx_read_tsc+0x10/0x10 [ 15.995037] ? ktime_get_ts64+0x86/0x230 [ 15.995064] kunit_try_run_case+0x1a5/0x480 [ 15.995091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.995116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.995143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.995169] ? __kthread_parkme+0x82/0x180 [ 15.995198] ? preempt_count_sub+0x50/0x80 [ 15.995223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.995252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.995279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.995307] kthread+0x337/0x6f0 [ 15.995328] ? trace_preempt_on+0x20/0xc0 [ 15.995352] ? __pfx_kthread+0x10/0x10 [ 15.995374] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.995398] ? calculate_sigpending+0x7b/0xa0 [ 15.995431] ? __pfx_kthread+0x10/0x10 [ 15.995453] ret_from_fork+0x116/0x1d0 [ 15.995474] ? __pfx_kthread+0x10/0x10 [ 15.995496] ret_from_fork_asm+0x1a/0x30 [ 15.995529] </TASK> [ 15.995540] [ 16.011871] Allocated by task 282: [ 16.012258] kasan_save_stack+0x45/0x70 [ 16.012778] kasan_save_track+0x18/0x40 [ 16.013194] kasan_save_alloc_info+0x3b/0x50 [ 16.013359] __kasan_kmalloc+0xb7/0xc0 [ 16.013879] __kmalloc_cache_noprof+0x189/0x420 [ 16.014484] kasan_atomics+0x95/0x310 [ 16.014961] kunit_try_run_case+0x1a5/0x480 [ 16.015123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.015311] kthread+0x337/0x6f0 [ 16.015664] ret_from_fork+0x116/0x1d0 [ 16.016192] ret_from_fork_asm+0x1a/0x30 [ 16.016757] [ 16.017063] The buggy address belongs to the object at ffff888103082e00 [ 16.017063] which belongs to the cache kmalloc-64 of size 64 [ 16.018227] The buggy address is located 0 bytes to the right of [ 16.018227] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.019364] [ 16.019700] The buggy address belongs to the physical page: [ 16.020201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.020673] flags: 0x200000000000000(node=0|zone=2) [ 16.021256] page_type: f5(slab) [ 16.021757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.022293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.022948] page dumped because: kasan: bad access detected [ 16.023638] [ 16.023957] Memory state around the buggy address: [ 16.024158] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.024384] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.025375] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.026253] ^ [ 16.026676] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.027173] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.027400] ================================================================== [ 16.257217] ================================================================== [ 16.257445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.257966] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.258365] [ 16.258476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.258538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.258566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.258603] Call Trace: [ 16.258617] <TASK> [ 16.258644] dump_stack_lvl+0x73/0xb0 [ 16.258675] print_report+0xd1/0x610 [ 16.258714] ? __virt_addr_valid+0x1db/0x2d0 [ 16.258752] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.258786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.258824] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.258860] kasan_report+0x141/0x180 [ 16.258883] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.258923] kasan_check_range+0x10c/0x1c0 [ 16.258949] __kasan_check_write+0x18/0x20 [ 16.258971] kasan_atomics_helper+0x1d7a/0x5450 [ 16.258997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.259022] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.259050] ? kasan_atomics+0x152/0x310 [ 16.259080] kasan_atomics+0x1dc/0x310 [ 16.259106] ? __pfx_kasan_atomics+0x10/0x10 [ 16.259133] ? __pfx_read_tsc+0x10/0x10 [ 16.259157] ? ktime_get_ts64+0x86/0x230 [ 16.259188] kunit_try_run_case+0x1a5/0x480 [ 16.259214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.259240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.259268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.259295] ? __kthread_parkme+0x82/0x180 [ 16.259318] ? preempt_count_sub+0x50/0x80 [ 16.259344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.259371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.259398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.259426] kthread+0x337/0x6f0 [ 16.259457] ? trace_preempt_on+0x20/0xc0 [ 16.259483] ? __pfx_kthread+0x10/0x10 [ 16.259507] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.259531] ? calculate_sigpending+0x7b/0xa0 [ 16.259558] ? __pfx_kthread+0x10/0x10 [ 16.259582] ret_from_fork+0x116/0x1d0 [ 16.259603] ? __pfx_kthread+0x10/0x10 [ 16.259625] ret_from_fork_asm+0x1a/0x30 [ 16.259657] </TASK> [ 16.259668] [ 16.267604] Allocated by task 282: [ 16.267812] kasan_save_stack+0x45/0x70 [ 16.268045] kasan_save_track+0x18/0x40 [ 16.268255] kasan_save_alloc_info+0x3b/0x50 [ 16.268506] __kasan_kmalloc+0xb7/0xc0 [ 16.268706] __kmalloc_cache_noprof+0x189/0x420 [ 16.268924] kasan_atomics+0x95/0x310 [ 16.269076] kunit_try_run_case+0x1a5/0x480 [ 16.269278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.269642] kthread+0x337/0x6f0 [ 16.269775] ret_from_fork+0x116/0x1d0 [ 16.269908] ret_from_fork_asm+0x1a/0x30 [ 16.270111] [ 16.270243] The buggy address belongs to the object at ffff888103082e00 [ 16.270243] which belongs to the cache kmalloc-64 of size 64 [ 16.270966] The buggy address is located 0 bytes to the right of [ 16.270966] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.271510] [ 16.271636] The buggy address belongs to the physical page: [ 16.271891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.272271] flags: 0x200000000000000(node=0|zone=2) [ 16.272583] page_type: f5(slab) [ 16.272776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.273083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.273458] page dumped because: kasan: bad access detected [ 16.273710] [ 16.273815] Memory state around the buggy address: [ 16.274063] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.274378] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.274703] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.275038] ^ [ 16.275296] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275614] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275835] ================================================================== [ 15.094220] ================================================================== [ 15.094657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.094910] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.095136] [ 15.095228] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.095271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.095284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.095306] Call Trace: [ 15.095323] <TASK> [ 15.095338] dump_stack_lvl+0x73/0xb0 [ 15.095366] print_report+0xd1/0x610 [ 15.095390] ? __virt_addr_valid+0x1db/0x2d0 [ 15.095413] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.095436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.095459] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.095482] kasan_report+0x141/0x180 [ 15.095505] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.095532] __asan_report_load4_noabort+0x18/0x20 [ 15.095558] kasan_atomics_helper+0x4b54/0x5450 [ 15.095581] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.095604] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.095630] ? kasan_atomics+0x152/0x310 [ 15.095658] kasan_atomics+0x1dc/0x310 [ 15.095694] ? __pfx_kasan_atomics+0x10/0x10 [ 15.095742] ? __pfx_read_tsc+0x10/0x10 [ 15.095782] ? ktime_get_ts64+0x86/0x230 [ 15.095811] kunit_try_run_case+0x1a5/0x480 [ 15.095838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.095864] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.095891] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.095917] ? __kthread_parkme+0x82/0x180 [ 15.095940] ? preempt_count_sub+0x50/0x80 [ 15.095967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.095993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.096021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.096049] kthread+0x337/0x6f0 [ 15.096070] ? trace_preempt_on+0x20/0xc0 [ 15.096095] ? __pfx_kthread+0x10/0x10 [ 15.096118] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.096141] ? calculate_sigpending+0x7b/0xa0 [ 15.096168] ? __pfx_kthread+0x10/0x10 [ 15.096193] ret_from_fork+0x116/0x1d0 [ 15.096217] ? __pfx_kthread+0x10/0x10 [ 15.096239] ret_from_fork_asm+0x1a/0x30 [ 15.096274] </TASK> [ 15.096284] [ 15.105284] Allocated by task 282: [ 15.105529] kasan_save_stack+0x45/0x70 [ 15.105675] kasan_save_track+0x18/0x40 [ 15.105823] kasan_save_alloc_info+0x3b/0x50 [ 15.105979] __kasan_kmalloc+0xb7/0xc0 [ 15.106115] __kmalloc_cache_noprof+0x189/0x420 [ 15.106304] kasan_atomics+0x95/0x310 [ 15.106671] kunit_try_run_case+0x1a5/0x480 [ 15.106908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.107280] kthread+0x337/0x6f0 [ 15.107583] ret_from_fork+0x116/0x1d0 [ 15.107785] ret_from_fork_asm+0x1a/0x30 [ 15.107995] [ 15.108094] The buggy address belongs to the object at ffff888103082e00 [ 15.108094] which belongs to the cache kmalloc-64 of size 64 [ 15.108489] The buggy address is located 0 bytes to the right of [ 15.108489] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.108869] [ 15.108945] The buggy address belongs to the physical page: [ 15.109119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.109360] flags: 0x200000000000000(node=0|zone=2) [ 15.109561] page_type: f5(slab) [ 15.109753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.110106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.110450] page dumped because: kasan: bad access detected [ 15.110703] [ 15.110814] Memory state around the buggy address: [ 15.111024] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.111332] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.112409] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.113799] ^ [ 15.114071] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.114295] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.114512] ================================================================== [ 15.860310] ================================================================== [ 15.860653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.861050] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.861354] [ 15.861466] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.861508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.861521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.861543] Call Trace: [ 15.861558] <TASK> [ 15.861572] dump_stack_lvl+0x73/0xb0 [ 15.861601] print_report+0xd1/0x610 [ 15.861625] ? __virt_addr_valid+0x1db/0x2d0 [ 15.861649] ? kasan_atomics_helper+0x1467/0x5450 [ 15.861672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.861698] ? kasan_atomics_helper+0x1467/0x5450 [ 15.861722] kasan_report+0x141/0x180 [ 15.861746] ? kasan_atomics_helper+0x1467/0x5450 [ 15.861786] kasan_check_range+0x10c/0x1c0 [ 15.861812] __kasan_check_write+0x18/0x20 [ 15.861833] kasan_atomics_helper+0x1467/0x5450 [ 15.861858] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.861883] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.861910] ? kasan_atomics+0x152/0x310 [ 15.861938] kasan_atomics+0x1dc/0x310 [ 15.861962] ? __pfx_kasan_atomics+0x10/0x10 [ 15.861989] ? __pfx_read_tsc+0x10/0x10 [ 15.862011] ? ktime_get_ts64+0x86/0x230 [ 15.862037] kunit_try_run_case+0x1a5/0x480 [ 15.862063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.862089] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.862115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.862140] ? __kthread_parkme+0x82/0x180 [ 15.862163] ? preempt_count_sub+0x50/0x80 [ 15.862188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.862215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.862241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.862268] kthread+0x337/0x6f0 [ 15.862289] ? trace_preempt_on+0x20/0xc0 [ 15.862314] ? __pfx_kthread+0x10/0x10 [ 15.862335] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.862359] ? calculate_sigpending+0x7b/0xa0 [ 15.862384] ? __pfx_kthread+0x10/0x10 [ 15.862407] ret_from_fork+0x116/0x1d0 [ 15.862427] ? __pfx_kthread+0x10/0x10 [ 15.862450] ret_from_fork_asm+0x1a/0x30 [ 15.862483] </TASK> [ 15.862495] [ 15.870301] Allocated by task 282: [ 15.870489] kasan_save_stack+0x45/0x70 [ 15.870674] kasan_save_track+0x18/0x40 [ 15.870873] kasan_save_alloc_info+0x3b/0x50 [ 15.871047] __kasan_kmalloc+0xb7/0xc0 [ 15.871223] __kmalloc_cache_noprof+0x189/0x420 [ 15.871386] kasan_atomics+0x95/0x310 [ 15.871521] kunit_try_run_case+0x1a5/0x480 [ 15.871671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.871859] kthread+0x337/0x6f0 [ 15.871983] ret_from_fork+0x116/0x1d0 [ 15.872176] ret_from_fork_asm+0x1a/0x30 [ 15.872375] [ 15.872475] The buggy address belongs to the object at ffff888103082e00 [ 15.872475] which belongs to the cache kmalloc-64 of size 64 [ 15.873038] The buggy address is located 0 bytes to the right of [ 15.873038] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.873600] [ 15.873696] The buggy address belongs to the physical page: [ 15.873952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.874308] flags: 0x200000000000000(node=0|zone=2) [ 15.874563] page_type: f5(slab) [ 15.874713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.874971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.875203] page dumped because: kasan: bad access detected [ 15.875469] [ 15.875562] Memory state around the buggy address: [ 15.875800] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.876132] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.876441] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.876719] ^ [ 15.876910] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.877157] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.877516] ================================================================== [ 15.256286] ================================================================== [ 15.256594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.256953] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.257531] [ 15.257654] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.257700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.257713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.257737] Call Trace: [ 15.257750] <TASK> [ 15.257777] dump_stack_lvl+0x73/0xb0 [ 15.257809] print_report+0xd1/0x610 [ 15.257834] ? __virt_addr_valid+0x1db/0x2d0 [ 15.257860] ? kasan_atomics_helper+0x72f/0x5450 [ 15.257883] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.257909] ? kasan_atomics_helper+0x72f/0x5450 [ 15.257933] kasan_report+0x141/0x180 [ 15.257957] ? kasan_atomics_helper+0x72f/0x5450 [ 15.257986] kasan_check_range+0x10c/0x1c0 [ 15.258012] __kasan_check_write+0x18/0x20 [ 15.258033] kasan_atomics_helper+0x72f/0x5450 [ 15.258058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.258083] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.258110] ? kasan_atomics+0x152/0x310 [ 15.258139] kasan_atomics+0x1dc/0x310 [ 15.258164] ? __pfx_kasan_atomics+0x10/0x10 [ 15.258191] ? __pfx_read_tsc+0x10/0x10 [ 15.258214] ? ktime_get_ts64+0x86/0x230 [ 15.258241] kunit_try_run_case+0x1a5/0x480 [ 15.258268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.258293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.258321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.258348] ? __kthread_parkme+0x82/0x180 [ 15.258371] ? preempt_count_sub+0x50/0x80 [ 15.258398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.258426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.258464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.258493] kthread+0x337/0x6f0 [ 15.258518] ? trace_preempt_on+0x20/0xc0 [ 15.258544] ? __pfx_kthread+0x10/0x10 [ 15.258568] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.258591] ? calculate_sigpending+0x7b/0xa0 [ 15.258619] ? __pfx_kthread+0x10/0x10 [ 15.258644] ret_from_fork+0x116/0x1d0 [ 15.258663] ? __pfx_kthread+0x10/0x10 [ 15.258686] ret_from_fork_asm+0x1a/0x30 [ 15.258718] </TASK> [ 15.258730] [ 15.266343] Allocated by task 282: [ 15.266479] kasan_save_stack+0x45/0x70 [ 15.266624] kasan_save_track+0x18/0x40 [ 15.266771] kasan_save_alloc_info+0x3b/0x50 [ 15.266924] __kasan_kmalloc+0xb7/0xc0 [ 15.267071] __kmalloc_cache_noprof+0x189/0x420 [ 15.267297] kasan_atomics+0x95/0x310 [ 15.267486] kunit_try_run_case+0x1a5/0x480 [ 15.267699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.267962] kthread+0x337/0x6f0 [ 15.268203] ret_from_fork+0x116/0x1d0 [ 15.268363] ret_from_fork_asm+0x1a/0x30 [ 15.268630] [ 15.268712] The buggy address belongs to the object at ffff888103082e00 [ 15.268712] which belongs to the cache kmalloc-64 of size 64 [ 15.269078] The buggy address is located 0 bytes to the right of [ 15.269078] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.269446] [ 15.269519] The buggy address belongs to the physical page: [ 15.269959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.270318] flags: 0x200000000000000(node=0|zone=2) [ 15.270551] page_type: f5(slab) [ 15.270721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.271095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.271441] page dumped because: kasan: bad access detected [ 15.271692] [ 15.272328] Memory state around the buggy address: [ 15.272559] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.272876] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.273096] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.273419] ^ [ 15.274609] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.274912] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.275216] ================================================================== [ 15.878016] ================================================================== [ 15.878298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.878716] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.879022] [ 15.879211] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.879256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.879269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.879290] Call Trace: [ 15.879304] <TASK> [ 15.879318] dump_stack_lvl+0x73/0xb0 [ 15.879348] print_report+0xd1/0x610 [ 15.879373] ? __virt_addr_valid+0x1db/0x2d0 [ 15.879398] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.879421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.879447] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.879471] kasan_report+0x141/0x180 [ 15.879495] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.879523] __asan_report_store8_noabort+0x1b/0x30 [ 15.879551] kasan_atomics_helper+0x50d4/0x5450 [ 15.879576] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.879601] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.879628] ? kasan_atomics+0x152/0x310 [ 15.879656] kasan_atomics+0x1dc/0x310 [ 15.879680] ? __pfx_kasan_atomics+0x10/0x10 [ 15.879706] ? __pfx_read_tsc+0x10/0x10 [ 15.879728] ? ktime_get_ts64+0x86/0x230 [ 15.879755] kunit_try_run_case+0x1a5/0x480 [ 15.879792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.879817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.879844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.879870] ? __kthread_parkme+0x82/0x180 [ 15.879892] ? preempt_count_sub+0x50/0x80 [ 15.879918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.879946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.879973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.880001] kthread+0x337/0x6f0 [ 15.880022] ? trace_preempt_on+0x20/0xc0 [ 15.880047] ? __pfx_kthread+0x10/0x10 [ 15.880069] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.880093] ? calculate_sigpending+0x7b/0xa0 [ 15.880119] ? __pfx_kthread+0x10/0x10 [ 15.880143] ret_from_fork+0x116/0x1d0 [ 15.880163] ? __pfx_kthread+0x10/0x10 [ 15.880186] ret_from_fork_asm+0x1a/0x30 [ 15.880228] </TASK> [ 15.880240] [ 15.887494] Allocated by task 282: [ 15.887862] kasan_save_stack+0x45/0x70 [ 15.888064] kasan_save_track+0x18/0x40 [ 15.888209] kasan_save_alloc_info+0x3b/0x50 [ 15.888420] __kasan_kmalloc+0xb7/0xc0 [ 15.888577] __kmalloc_cache_noprof+0x189/0x420 [ 15.888737] kasan_atomics+0x95/0x310 [ 15.888938] kunit_try_run_case+0x1a5/0x480 [ 15.889153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.889413] kthread+0x337/0x6f0 [ 15.889588] ret_from_fork+0x116/0x1d0 [ 15.889724] ret_from_fork_asm+0x1a/0x30 [ 15.890926] [ 15.891350] The buggy address belongs to the object at ffff888103082e00 [ 15.891350] which belongs to the cache kmalloc-64 of size 64 [ 15.893225] The buggy address is located 0 bytes to the right of [ 15.893225] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.894329] [ 15.894723] The buggy address belongs to the physical page: [ 15.895388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.896139] flags: 0x200000000000000(node=0|zone=2) [ 15.896953] page_type: f5(slab) [ 15.897363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.897939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.898174] page dumped because: kasan: bad access detected [ 15.898347] [ 15.898421] Memory state around the buggy address: [ 15.899357] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.900316] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.901279] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.902091] ^ [ 15.902797] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.903293] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.904021] ================================================================== [ 15.322351] ================================================================== [ 15.322655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.323425] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.323875] [ 15.323972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.324084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.324157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.324181] Call Trace: [ 15.324198] <TASK> [ 15.324215] dump_stack_lvl+0x73/0xb0 [ 15.324250] print_report+0xd1/0x610 [ 15.324275] ? __virt_addr_valid+0x1db/0x2d0 [ 15.324300] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.324324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.324350] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.324374] kasan_report+0x141/0x180 [ 15.324398] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.324427] kasan_check_range+0x10c/0x1c0 [ 15.324464] __kasan_check_write+0x18/0x20 [ 15.324486] kasan_atomics_helper+0x8f9/0x5450 [ 15.324511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.324536] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.324563] ? kasan_atomics+0x152/0x310 [ 15.324592] kasan_atomics+0x1dc/0x310 [ 15.324616] ? __pfx_kasan_atomics+0x10/0x10 [ 15.324644] ? __pfx_read_tsc+0x10/0x10 [ 15.324667] ? ktime_get_ts64+0x86/0x230 [ 15.324694] kunit_try_run_case+0x1a5/0x480 [ 15.324720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.324745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.324786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.324812] ? __kthread_parkme+0x82/0x180 [ 15.324835] ? preempt_count_sub+0x50/0x80 [ 15.324861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.324889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.324916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.324944] kthread+0x337/0x6f0 [ 15.324966] ? trace_preempt_on+0x20/0xc0 [ 15.324991] ? __pfx_kthread+0x10/0x10 [ 15.325014] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.325038] ? calculate_sigpending+0x7b/0xa0 [ 15.325065] ? __pfx_kthread+0x10/0x10 [ 15.325088] ret_from_fork+0x116/0x1d0 [ 15.325108] ? __pfx_kthread+0x10/0x10 [ 15.325131] ret_from_fork_asm+0x1a/0x30 [ 15.325163] </TASK> [ 15.325173] [ 15.335060] Allocated by task 282: [ 15.335368] kasan_save_stack+0x45/0x70 [ 15.335643] kasan_save_track+0x18/0x40 [ 15.335831] kasan_save_alloc_info+0x3b/0x50 [ 15.336046] __kasan_kmalloc+0xb7/0xc0 [ 15.336220] __kmalloc_cache_noprof+0x189/0x420 [ 15.336433] kasan_atomics+0x95/0x310 [ 15.336968] kunit_try_run_case+0x1a5/0x480 [ 15.337174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.337395] kthread+0x337/0x6f0 [ 15.337689] ret_from_fork+0x116/0x1d0 [ 15.337877] ret_from_fork_asm+0x1a/0x30 [ 15.338200] [ 15.338284] The buggy address belongs to the object at ffff888103082e00 [ 15.338284] which belongs to the cache kmalloc-64 of size 64 [ 15.338936] The buggy address is located 0 bytes to the right of [ 15.338936] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.339609] [ 15.339792] The buggy address belongs to the physical page: [ 15.340156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.340605] flags: 0x200000000000000(node=0|zone=2) [ 15.340832] page_type: f5(slab) [ 15.341004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.341324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.341887] page dumped because: kasan: bad access detected [ 15.342222] [ 15.342306] Memory state around the buggy address: [ 15.342522] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342996] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.343387] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.343839] ^ [ 15.344154] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.344590] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.344899] ================================================================== [ 16.059585] ================================================================== [ 16.060436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.061125] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.061769] [ 16.061943] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.061988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.062002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.062024] Call Trace: [ 16.062039] <TASK> [ 16.062055] dump_stack_lvl+0x73/0xb0 [ 16.062086] print_report+0xd1/0x610 [ 16.062110] ? __virt_addr_valid+0x1db/0x2d0 [ 16.062135] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.062158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.062184] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.062209] kasan_report+0x141/0x180 [ 16.062233] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.062262] kasan_check_range+0x10c/0x1c0 [ 16.062288] __kasan_check_write+0x18/0x20 [ 16.062311] kasan_atomics_helper+0x18b1/0x5450 [ 16.062336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.062361] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.062388] ? kasan_atomics+0x152/0x310 [ 16.062417] kasan_atomics+0x1dc/0x310 [ 16.062450] ? __pfx_kasan_atomics+0x10/0x10 [ 16.062476] ? __pfx_read_tsc+0x10/0x10 [ 16.062499] ? ktime_get_ts64+0x86/0x230 [ 16.062525] kunit_try_run_case+0x1a5/0x480 [ 16.062552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.062578] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.062605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.062630] ? __kthread_parkme+0x82/0x180 [ 16.062653] ? preempt_count_sub+0x50/0x80 [ 16.062678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.062706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.062732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.062770] kthread+0x337/0x6f0 [ 16.062791] ? trace_preempt_on+0x20/0xc0 [ 16.062816] ? __pfx_kthread+0x10/0x10 [ 16.062838] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.062861] ? calculate_sigpending+0x7b/0xa0 [ 16.062888] ? __pfx_kthread+0x10/0x10 [ 16.062910] ret_from_fork+0x116/0x1d0 [ 16.062931] ? __pfx_kthread+0x10/0x10 [ 16.062953] ret_from_fork_asm+0x1a/0x30 [ 16.062985] </TASK> [ 16.062996] [ 16.073580] Allocated by task 282: [ 16.073724] kasan_save_stack+0x45/0x70 [ 16.073883] kasan_save_track+0x18/0x40 [ 16.074022] kasan_save_alloc_info+0x3b/0x50 [ 16.074175] __kasan_kmalloc+0xb7/0xc0 [ 16.074310] __kmalloc_cache_noprof+0x189/0x420 [ 16.074527] kasan_atomics+0x95/0x310 [ 16.074866] kunit_try_run_case+0x1a5/0x480 [ 16.075235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.075782] kthread+0x337/0x6f0 [ 16.076150] ret_from_fork+0x116/0x1d0 [ 16.076497] ret_from_fork_asm+0x1a/0x30 [ 16.076906] [ 16.077065] The buggy address belongs to the object at ffff888103082e00 [ 16.077065] which belongs to the cache kmalloc-64 of size 64 [ 16.078310] The buggy address is located 0 bytes to the right of [ 16.078310] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.079523] [ 16.079686] The buggy address belongs to the physical page: [ 16.080175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.080945] flags: 0x200000000000000(node=0|zone=2) [ 16.081215] page_type: f5(slab) [ 16.081338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.081619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.082318] page dumped because: kasan: bad access detected [ 16.082838] [ 16.082994] Memory state around the buggy address: [ 16.083410] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.084028] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.084606] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.084832] ^ [ 16.084991] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.085208] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.085424] ================================================================== [ 15.757352] ================================================================== [ 15.757699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.758091] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.758450] [ 15.758578] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.758624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.758636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.758659] Call Trace: [ 15.758672] <TASK> [ 15.758687] dump_stack_lvl+0x73/0xb0 [ 15.758739] print_report+0xd1/0x610 [ 15.758775] ? __virt_addr_valid+0x1db/0x2d0 [ 15.758801] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.758825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.758851] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.758875] kasan_report+0x141/0x180 [ 15.758899] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.758944] __asan_report_load4_noabort+0x18/0x20 [ 15.759000] kasan_atomics_helper+0x49e8/0x5450 [ 15.759039] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.759065] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.759119] ? kasan_atomics+0x152/0x310 [ 15.759162] kasan_atomics+0x1dc/0x310 [ 15.759193] ? __pfx_kasan_atomics+0x10/0x10 [ 15.759220] ? __pfx_read_tsc+0x10/0x10 [ 15.759244] ? ktime_get_ts64+0x86/0x230 [ 15.759271] kunit_try_run_case+0x1a5/0x480 [ 15.759298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.759324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.759351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.759377] ? __kthread_parkme+0x82/0x180 [ 15.759400] ? preempt_count_sub+0x50/0x80 [ 15.759425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.759452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.759482] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.759511] kthread+0x337/0x6f0 [ 15.759532] ? trace_preempt_on+0x20/0xc0 [ 15.759556] ? __pfx_kthread+0x10/0x10 [ 15.759589] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.759612] ? calculate_sigpending+0x7b/0xa0 [ 15.759639] ? __pfx_kthread+0x10/0x10 [ 15.759662] ret_from_fork+0x116/0x1d0 [ 15.759683] ? __pfx_kthread+0x10/0x10 [ 15.759705] ret_from_fork_asm+0x1a/0x30 [ 15.759738] </TASK> [ 15.759749] [ 15.767315] Allocated by task 282: [ 15.767525] kasan_save_stack+0x45/0x70 [ 15.767776] kasan_save_track+0x18/0x40 [ 15.767990] kasan_save_alloc_info+0x3b/0x50 [ 15.768293] __kasan_kmalloc+0xb7/0xc0 [ 15.768519] __kmalloc_cache_noprof+0x189/0x420 [ 15.768729] kasan_atomics+0x95/0x310 [ 15.768916] kunit_try_run_case+0x1a5/0x480 [ 15.769152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.769404] kthread+0x337/0x6f0 [ 15.769582] ret_from_fork+0x116/0x1d0 [ 15.769778] ret_from_fork_asm+0x1a/0x30 [ 15.769990] [ 15.770115] The buggy address belongs to the object at ffff888103082e00 [ 15.770115] which belongs to the cache kmalloc-64 of size 64 [ 15.770692] The buggy address is located 0 bytes to the right of [ 15.770692] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.771236] [ 15.771310] The buggy address belongs to the physical page: [ 15.771478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.771853] flags: 0x200000000000000(node=0|zone=2) [ 15.772082] page_type: f5(slab) [ 15.772242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.772520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.772872] page dumped because: kasan: bad access detected [ 15.773139] [ 15.773231] Memory state around the buggy address: [ 15.773383] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.773695] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.774112] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.774408] ^ [ 15.774670] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.774997] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.775331] ================================================================== [ 15.825049] ================================================================== [ 15.825640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.825904] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.826229] [ 15.826336] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.826382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.826396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.826418] Call Trace: [ 15.826434] <TASK> [ 15.826450] dump_stack_lvl+0x73/0xb0 [ 15.826489] print_report+0xd1/0x610 [ 15.826515] ? __virt_addr_valid+0x1db/0x2d0 [ 15.826539] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.826563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.826589] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.826613] kasan_report+0x141/0x180 [ 15.826638] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.826666] kasan_check_range+0x10c/0x1c0 [ 15.826692] __kasan_check_read+0x15/0x20 [ 15.826714] kasan_atomics_helper+0x13b5/0x5450 [ 15.826739] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.826777] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.826804] ? kasan_atomics+0x152/0x310 [ 15.826833] kasan_atomics+0x1dc/0x310 [ 15.826857] ? __pfx_kasan_atomics+0x10/0x10 [ 15.826884] ? __pfx_read_tsc+0x10/0x10 [ 15.826906] ? ktime_get_ts64+0x86/0x230 [ 15.826934] kunit_try_run_case+0x1a5/0x480 [ 15.826961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.826987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.827013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.827039] ? __kthread_parkme+0x82/0x180 [ 15.827062] ? preempt_count_sub+0x50/0x80 [ 15.827088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.827115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.827142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.827170] kthread+0x337/0x6f0 [ 15.827195] ? trace_preempt_on+0x20/0xc0 [ 15.827219] ? __pfx_kthread+0x10/0x10 [ 15.827242] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.827265] ? calculate_sigpending+0x7b/0xa0 [ 15.827291] ? __pfx_kthread+0x10/0x10 [ 15.827314] ret_from_fork+0x116/0x1d0 [ 15.827334] ? __pfx_kthread+0x10/0x10 [ 15.827356] ret_from_fork_asm+0x1a/0x30 [ 15.827389] </TASK> [ 15.827400] [ 15.834816] Allocated by task 282: [ 15.835037] kasan_save_stack+0x45/0x70 [ 15.835188] kasan_save_track+0x18/0x40 [ 15.835335] kasan_save_alloc_info+0x3b/0x50 [ 15.835664] __kasan_kmalloc+0xb7/0xc0 [ 15.835866] __kmalloc_cache_noprof+0x189/0x420 [ 15.836091] kasan_atomics+0x95/0x310 [ 15.836279] kunit_try_run_case+0x1a5/0x480 [ 15.836435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.836702] kthread+0x337/0x6f0 [ 15.836864] ret_from_fork+0x116/0x1d0 [ 15.837003] ret_from_fork_asm+0x1a/0x30 [ 15.837148] [ 15.837222] The buggy address belongs to the object at ffff888103082e00 [ 15.837222] which belongs to the cache kmalloc-64 of size 64 [ 15.837971] The buggy address is located 0 bytes to the right of [ 15.837971] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.838515] [ 15.838594] The buggy address belongs to the physical page: [ 15.838833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.839122] flags: 0x200000000000000(node=0|zone=2) [ 15.839364] page_type: f5(slab) [ 15.839516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.839804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.840129] page dumped because: kasan: bad access detected [ 15.840336] [ 15.840407] Memory state around the buggy address: [ 15.840649] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840947] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.841223] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.841550] ^ [ 15.841805] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842080] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842330] ================================================================== [ 15.238132] ================================================================== [ 15.238383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.239109] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.239714] [ 15.240068] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.240119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.240133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.240156] Call Trace: [ 15.240170] <TASK> [ 15.240185] dump_stack_lvl+0x73/0xb0 [ 15.240220] print_report+0xd1/0x610 [ 15.240246] ? __virt_addr_valid+0x1db/0x2d0 [ 15.240271] ? kasan_atomics_helper+0x697/0x5450 [ 15.240295] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.240321] ? kasan_atomics_helper+0x697/0x5450 [ 15.240345] kasan_report+0x141/0x180 [ 15.240369] ? kasan_atomics_helper+0x697/0x5450 [ 15.240397] kasan_check_range+0x10c/0x1c0 [ 15.240423] __kasan_check_write+0x18/0x20 [ 15.240453] kasan_atomics_helper+0x697/0x5450 [ 15.240478] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.240503] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.240531] ? kasan_atomics+0x152/0x310 [ 15.240559] kasan_atomics+0x1dc/0x310 [ 15.240584] ? __pfx_kasan_atomics+0x10/0x10 [ 15.240610] ? __pfx_read_tsc+0x10/0x10 [ 15.240633] ? ktime_get_ts64+0x86/0x230 [ 15.240660] kunit_try_run_case+0x1a5/0x480 [ 15.240687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.240712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.240740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.240780] ? __kthread_parkme+0x82/0x180 [ 15.240803] ? preempt_count_sub+0x50/0x80 [ 15.240830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.240856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.240886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.240914] kthread+0x337/0x6f0 [ 15.240935] ? trace_preempt_on+0x20/0xc0 [ 15.240961] ? __pfx_kthread+0x10/0x10 [ 15.240984] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.241008] ? calculate_sigpending+0x7b/0xa0 [ 15.241035] ? __pfx_kthread+0x10/0x10 [ 15.241059] ret_from_fork+0x116/0x1d0 [ 15.241079] ? __pfx_kthread+0x10/0x10 [ 15.241101] ret_from_fork_asm+0x1a/0x30 [ 15.241133] </TASK> [ 15.241144] [ 15.248520] Allocated by task 282: [ 15.248677] kasan_save_stack+0x45/0x70 [ 15.248874] kasan_save_track+0x18/0x40 [ 15.249041] kasan_save_alloc_info+0x3b/0x50 [ 15.249256] __kasan_kmalloc+0xb7/0xc0 [ 15.249427] __kmalloc_cache_noprof+0x189/0x420 [ 15.249607] kasan_atomics+0x95/0x310 [ 15.249739] kunit_try_run_case+0x1a5/0x480 [ 15.249899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.250152] kthread+0x337/0x6f0 [ 15.250321] ret_from_fork+0x116/0x1d0 [ 15.250507] ret_from_fork_asm+0x1a/0x30 [ 15.250649] [ 15.250722] The buggy address belongs to the object at ffff888103082e00 [ 15.250722] which belongs to the cache kmalloc-64 of size 64 [ 15.251368] The buggy address is located 0 bytes to the right of [ 15.251368] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.252011] [ 15.252085] The buggy address belongs to the physical page: [ 15.252255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.252489] flags: 0x200000000000000(node=0|zone=2) [ 15.252648] page_type: f5(slab) [ 15.252778] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.253122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.253454] page dumped because: kasan: bad access detected [ 15.253702] [ 15.253807] Memory state around the buggy address: [ 15.254026] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.254339] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.254652] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.254963] ^ [ 15.255160] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.255457] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.255714] ================================================================== [ 15.905126] ================================================================== [ 15.905362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.905613] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.905846] [ 15.905933] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.905978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.905992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.906014] Call Trace: [ 15.906031] <TASK> [ 15.906048] dump_stack_lvl+0x73/0xb0 [ 15.906075] print_report+0xd1/0x610 [ 15.906099] ? __virt_addr_valid+0x1db/0x2d0 [ 15.906123] ? kasan_atomics_helper+0x151d/0x5450 [ 15.906146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.906170] ? kasan_atomics_helper+0x151d/0x5450 [ 15.906192] kasan_report+0x141/0x180 [ 15.906215] ? kasan_atomics_helper+0x151d/0x5450 [ 15.906242] kasan_check_range+0x10c/0x1c0 [ 15.906266] __kasan_check_write+0x18/0x20 [ 15.906286] kasan_atomics_helper+0x151d/0x5450 [ 15.906309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.906332] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.906358] ? kasan_atomics+0x152/0x310 [ 15.906385] kasan_atomics+0x1dc/0x310 [ 15.906409] ? __pfx_kasan_atomics+0x10/0x10 [ 15.906434] ? __pfx_read_tsc+0x10/0x10 [ 15.906456] ? ktime_get_ts64+0x86/0x230 [ 15.906481] kunit_try_run_case+0x1a5/0x480 [ 15.906508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.906531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.906557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.906581] ? __kthread_parkme+0x82/0x180 [ 15.906603] ? preempt_count_sub+0x50/0x80 [ 15.906628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.906653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.906679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.906705] kthread+0x337/0x6f0 [ 15.906725] ? trace_preempt_on+0x20/0xc0 [ 15.906748] ? __pfx_kthread+0x10/0x10 [ 15.906793] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.906815] ? calculate_sigpending+0x7b/0xa0 [ 15.906839] ? __pfx_kthread+0x10/0x10 [ 15.906861] ret_from_fork+0x116/0x1d0 [ 15.906880] ? __pfx_kthread+0x10/0x10 [ 15.906902] ret_from_fork_asm+0x1a/0x30 [ 15.906933] </TASK> [ 15.906944] [ 15.918311] Allocated by task 282: [ 15.918622] kasan_save_stack+0x45/0x70 [ 15.918971] kasan_save_track+0x18/0x40 [ 15.919129] kasan_save_alloc_info+0x3b/0x50 [ 15.919347] __kasan_kmalloc+0xb7/0xc0 [ 15.919757] __kmalloc_cache_noprof+0x189/0x420 [ 15.919991] kasan_atomics+0x95/0x310 [ 15.920153] kunit_try_run_case+0x1a5/0x480 [ 15.920512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.920862] kthread+0x337/0x6f0 [ 15.921123] ret_from_fork+0x116/0x1d0 [ 15.921381] ret_from_fork_asm+0x1a/0x30 [ 15.921667] [ 15.921944] The buggy address belongs to the object at ffff888103082e00 [ 15.921944] which belongs to the cache kmalloc-64 of size 64 [ 15.922587] The buggy address is located 0 bytes to the right of [ 15.922587] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.923221] [ 15.923440] The buggy address belongs to the physical page: [ 15.923669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.924011] flags: 0x200000000000000(node=0|zone=2) [ 15.924230] page_type: f5(slab) [ 15.924398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.925064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.925510] page dumped because: kasan: bad access detected [ 15.925834] [ 15.925937] Memory state around the buggy address: [ 15.926304] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.926859] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.927272] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.927747] ^ [ 15.928049] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.928452] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.929228] ================================================================== [ 16.103733] ================================================================== [ 16.104203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.104451] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.104748] [ 16.104871] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.104915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.104928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.104951] Call Trace: [ 16.104967] <TASK> [ 16.104982] dump_stack_lvl+0x73/0xb0 [ 16.105011] print_report+0xd1/0x610 [ 16.105036] ? __virt_addr_valid+0x1db/0x2d0 [ 16.105061] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.105085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.105111] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.105135] kasan_report+0x141/0x180 [ 16.105159] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.105188] kasan_check_range+0x10c/0x1c0 [ 16.105225] __kasan_check_write+0x18/0x20 [ 16.105247] kasan_atomics_helper+0x19e3/0x5450 [ 16.105273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.105299] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.105326] ? kasan_atomics+0x152/0x310 [ 16.105354] kasan_atomics+0x1dc/0x310 [ 16.105379] ? __pfx_kasan_atomics+0x10/0x10 [ 16.105405] ? __pfx_read_tsc+0x10/0x10 [ 16.105428] ? ktime_get_ts64+0x86/0x230 [ 16.105455] kunit_try_run_case+0x1a5/0x480 [ 16.105481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.105507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.105533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.105560] ? __kthread_parkme+0x82/0x180 [ 16.105582] ? preempt_count_sub+0x50/0x80 [ 16.105608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.105635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.105661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.105697] kthread+0x337/0x6f0 [ 16.105718] ? trace_preempt_on+0x20/0xc0 [ 16.105743] ? __pfx_kthread+0x10/0x10 [ 16.105776] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.105799] ? calculate_sigpending+0x7b/0xa0 [ 16.105825] ? __pfx_kthread+0x10/0x10 [ 16.105848] ret_from_fork+0x116/0x1d0 [ 16.105868] ? __pfx_kthread+0x10/0x10 [ 16.105891] ret_from_fork_asm+0x1a/0x30 [ 16.105922] </TASK> [ 16.105933] [ 16.113649] Allocated by task 282: [ 16.113806] kasan_save_stack+0x45/0x70 [ 16.113998] kasan_save_track+0x18/0x40 [ 16.114170] kasan_save_alloc_info+0x3b/0x50 [ 16.114368] __kasan_kmalloc+0xb7/0xc0 [ 16.114547] __kmalloc_cache_noprof+0x189/0x420 [ 16.114707] kasan_atomics+0x95/0x310 [ 16.114891] kunit_try_run_case+0x1a5/0x480 [ 16.115106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.115344] kthread+0x337/0x6f0 [ 16.115467] ret_from_fork+0x116/0x1d0 [ 16.115744] ret_from_fork_asm+0x1a/0x30 [ 16.115954] [ 16.116051] The buggy address belongs to the object at ffff888103082e00 [ 16.116051] which belongs to the cache kmalloc-64 of size 64 [ 16.116516] The buggy address is located 0 bytes to the right of [ 16.116516] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.117121] [ 16.117209] The buggy address belongs to the physical page: [ 16.117426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.117731] flags: 0x200000000000000(node=0|zone=2) [ 16.117978] page_type: f5(slab) [ 16.118139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.118446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.118750] page dumped because: kasan: bad access detected [ 16.118980] [ 16.119070] Memory state around the buggy address: [ 16.119272] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.119584] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.119897] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.120183] ^ [ 16.120380] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.120643] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.120919] ================================================================== [ 16.419727] ================================================================== [ 16.420104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.420585] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282 [ 16.421104] [ 16.421300] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.421348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.421361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.421383] Call Trace: [ 16.421399] <TASK> [ 16.421415] dump_stack_lvl+0x73/0xb0 [ 16.421447] print_report+0xd1/0x610 [ 16.421559] ? __virt_addr_valid+0x1db/0x2d0 [ 16.421584] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.421608] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.421633] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.421657] kasan_report+0x141/0x180 [ 16.421681] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.421710] kasan_check_range+0x10c/0x1c0 [ 16.421736] __kasan_check_write+0x18/0x20 [ 16.421758] kasan_atomics_helper+0x20c8/0x5450 [ 16.421796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.421821] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.421848] ? kasan_atomics+0x152/0x310 [ 16.421877] kasan_atomics+0x1dc/0x310 [ 16.421900] ? __pfx_kasan_atomics+0x10/0x10 [ 16.421926] ? __pfx_read_tsc+0x10/0x10 [ 16.421948] ? ktime_get_ts64+0x86/0x230 [ 16.421975] kunit_try_run_case+0x1a5/0x480 [ 16.422001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.422026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.422053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.422079] ? __kthread_parkme+0x82/0x180 [ 16.422101] ? preempt_count_sub+0x50/0x80 [ 16.422127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.422153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.422180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.422208] kthread+0x337/0x6f0 [ 16.422229] ? trace_preempt_on+0x20/0xc0 [ 16.422253] ? __pfx_kthread+0x10/0x10 [ 16.422276] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.422299] ? calculate_sigpending+0x7b/0xa0 [ 16.422325] ? __pfx_kthread+0x10/0x10 [ 16.422348] ret_from_fork+0x116/0x1d0 [ 16.422369] ? __pfx_kthread+0x10/0x10 [ 16.422391] ret_from_fork_asm+0x1a/0x30 [ 16.422422] </TASK> [ 16.422434] [ 16.433054] Allocated by task 282: [ 16.433450] kasan_save_stack+0x45/0x70 [ 16.433677] kasan_save_track+0x18/0x40 [ 16.434004] kasan_save_alloc_info+0x3b/0x50 [ 16.434309] __kasan_kmalloc+0xb7/0xc0 [ 16.434638] __kmalloc_cache_noprof+0x189/0x420 [ 16.434880] kasan_atomics+0x95/0x310 [ 16.435210] kunit_try_run_case+0x1a5/0x480 [ 16.435536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.435851] kthread+0x337/0x6f0 [ 16.436172] ret_from_fork+0x116/0x1d0 [ 16.436374] ret_from_fork_asm+0x1a/0x30 [ 16.436774] [ 16.436908] The buggy address belongs to the object at ffff888103082e00 [ 16.436908] which belongs to the cache kmalloc-64 of size 64 [ 16.437600] The buggy address is located 0 bytes to the right of [ 16.437600] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 16.438328] [ 16.438450] The buggy address belongs to the physical page: [ 16.438843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 16.439283] flags: 0x200000000000000(node=0|zone=2) [ 16.439597] page_type: f5(slab) [ 16.439751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.440259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.440736] page dumped because: kasan: bad access detected [ 16.441014] [ 16.441241] Memory state around the buggy address: [ 16.441473] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.441927] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.442243] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.442758] ^ [ 16.443058] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.443499] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.443879] ================================================================== [ 15.074071] ================================================================== [ 15.074305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.074541] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.074837] [ 15.074945] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.074989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.075001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.075022] Call Trace: [ 15.075040] <TASK> [ 15.075056] dump_stack_lvl+0x73/0xb0 [ 15.075085] print_report+0xd1/0x610 [ 15.075109] ? __virt_addr_valid+0x1db/0x2d0 [ 15.075133] ? kasan_atomics_helper+0x3df/0x5450 [ 15.075155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.075183] ? kasan_atomics_helper+0x3df/0x5450 [ 15.075206] kasan_report+0x141/0x180 [ 15.075229] ? kasan_atomics_helper+0x3df/0x5450 [ 15.075256] kasan_check_range+0x10c/0x1c0 [ 15.075280] __kasan_check_read+0x15/0x20 [ 15.075300] kasan_atomics_helper+0x3df/0x5450 [ 15.075325] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.075348] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.075374] ? kasan_atomics+0x152/0x310 [ 15.075401] kasan_atomics+0x1dc/0x310 [ 15.075424] ? __pfx_kasan_atomics+0x10/0x10 [ 15.075449] ? __pfx_read_tsc+0x10/0x10 [ 15.075470] ? ktime_get_ts64+0x86/0x230 [ 15.075497] kunit_try_run_case+0x1a5/0x480 [ 15.075522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.075545] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.075571] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.075596] ? __kthread_parkme+0x82/0x180 [ 15.075617] ? preempt_count_sub+0x50/0x80 [ 15.075642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.075667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.075692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.075719] kthread+0x337/0x6f0 [ 15.075739] ? trace_preempt_on+0x20/0xc0 [ 15.075784] ? __pfx_kthread+0x10/0x10 [ 15.075805] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.075827] ? calculate_sigpending+0x7b/0xa0 [ 15.075864] ? __pfx_kthread+0x10/0x10 [ 15.075887] ret_from_fork+0x116/0x1d0 [ 15.075906] ? __pfx_kthread+0x10/0x10 [ 15.075926] ret_from_fork_asm+0x1a/0x30 [ 15.075958] </TASK> [ 15.075970] [ 15.084994] Allocated by task 282: [ 15.085192] kasan_save_stack+0x45/0x70 [ 15.085397] kasan_save_track+0x18/0x40 [ 15.085593] kasan_save_alloc_info+0x3b/0x50 [ 15.085822] __kasan_kmalloc+0xb7/0xc0 [ 15.085966] __kmalloc_cache_noprof+0x189/0x420 [ 15.086125] kasan_atomics+0x95/0x310 [ 15.086263] kunit_try_run_case+0x1a5/0x480 [ 15.086412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.086733] kthread+0x337/0x6f0 [ 15.086926] ret_from_fork+0x116/0x1d0 [ 15.087119] ret_from_fork_asm+0x1a/0x30 [ 15.087532] [ 15.087646] The buggy address belongs to the object at ffff888103082e00 [ 15.087646] which belongs to the cache kmalloc-64 of size 64 [ 15.088284] The buggy address is located 0 bytes to the right of [ 15.088284] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.088866] [ 15.088970] The buggy address belongs to the physical page: [ 15.089261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.089621] flags: 0x200000000000000(node=0|zone=2) [ 15.089865] page_type: f5(slab) [ 15.090039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.090403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.090910] page dumped because: kasan: bad access detected [ 15.091171] [ 15.091298] Memory state around the buggy address: [ 15.091647] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.091969] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.092430] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.092818] ^ [ 15.092988] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093296] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093728] ================================================================== [ 15.186628] ================================================================== [ 15.187191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.187646] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.187903] [ 15.188189] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.188367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.188383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.188407] Call Trace: [ 15.188426] <TASK> [ 15.188455] dump_stack_lvl+0x73/0xb0 [ 15.188489] print_report+0xd1/0x610 [ 15.188514] ? __virt_addr_valid+0x1db/0x2d0 [ 15.188541] ? kasan_atomics_helper+0x565/0x5450 [ 15.188565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.188591] ? kasan_atomics_helper+0x565/0x5450 [ 15.188616] kasan_report+0x141/0x180 [ 15.188639] ? kasan_atomics_helper+0x565/0x5450 [ 15.188668] kasan_check_range+0x10c/0x1c0 [ 15.188694] __kasan_check_write+0x18/0x20 [ 15.188716] kasan_atomics_helper+0x565/0x5450 [ 15.188741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.188780] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.188808] ? kasan_atomics+0x152/0x310 [ 15.188837] kasan_atomics+0x1dc/0x310 [ 15.188862] ? __pfx_kasan_atomics+0x10/0x10 [ 15.188889] ? __pfx_read_tsc+0x10/0x10 [ 15.188912] ? ktime_get_ts64+0x86/0x230 [ 15.188940] kunit_try_run_case+0x1a5/0x480 [ 15.188966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.189007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.189035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.189061] ? __kthread_parkme+0x82/0x180 [ 15.189085] ? preempt_count_sub+0x50/0x80 [ 15.189112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.189140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.189167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.189195] kthread+0x337/0x6f0 [ 15.189217] ? trace_preempt_on+0x20/0xc0 [ 15.189242] ? __pfx_kthread+0x10/0x10 [ 15.189265] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.189290] ? calculate_sigpending+0x7b/0xa0 [ 15.189317] ? __pfx_kthread+0x10/0x10 [ 15.189341] ret_from_fork+0x116/0x1d0 [ 15.189362] ? __pfx_kthread+0x10/0x10 [ 15.189384] ret_from_fork_asm+0x1a/0x30 [ 15.189416] </TASK> [ 15.189428] [ 15.200694] Allocated by task 282: [ 15.200901] kasan_save_stack+0x45/0x70 [ 15.201273] kasan_save_track+0x18/0x40 [ 15.201593] kasan_save_alloc_info+0x3b/0x50 [ 15.201815] __kasan_kmalloc+0xb7/0xc0 [ 15.202132] __kmalloc_cache_noprof+0x189/0x420 [ 15.202434] kasan_atomics+0x95/0x310 [ 15.202722] kunit_try_run_case+0x1a5/0x480 [ 15.202927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203369] kthread+0x337/0x6f0 [ 15.203550] ret_from_fork+0x116/0x1d0 [ 15.203875] ret_from_fork_asm+0x1a/0x30 [ 15.204079] [ 15.204276] The buggy address belongs to the object at ffff888103082e00 [ 15.204276] which belongs to the cache kmalloc-64 of size 64 [ 15.204965] The buggy address is located 0 bytes to the right of [ 15.204965] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.205836] [ 15.205987] The buggy address belongs to the physical page: [ 15.206520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.206965] flags: 0x200000000000000(node=0|zone=2) [ 15.207368] page_type: f5(slab) [ 15.207539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.207856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.208341] page dumped because: kasan: bad access detected [ 15.208686] [ 15.208776] Memory state around the buggy address: [ 15.209194] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.209749] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.210170] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.210609] ^ [ 15.210919] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.211407] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.211669] ================================================================== [ 15.403108] ================================================================== [ 15.403399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.403717] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.404081] [ 15.404184] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.404229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.404242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.404264] Call Trace: [ 15.404281] <TASK> [ 15.404297] dump_stack_lvl+0x73/0xb0 [ 15.404328] print_report+0xd1/0x610 [ 15.404353] ? __virt_addr_valid+0x1db/0x2d0 [ 15.404378] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.404402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.404428] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.404453] kasan_report+0x141/0x180 [ 15.404477] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.404506] kasan_check_range+0x10c/0x1c0 [ 15.404532] __kasan_check_write+0x18/0x20 [ 15.404554] kasan_atomics_helper+0xb6a/0x5450 [ 15.404579] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.404604] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.404632] ? kasan_atomics+0x152/0x310 [ 15.404660] kasan_atomics+0x1dc/0x310 [ 15.404684] ? __pfx_kasan_atomics+0x10/0x10 [ 15.404710] ? __pfx_read_tsc+0x10/0x10 [ 15.404732] ? ktime_get_ts64+0x86/0x230 [ 15.404769] kunit_try_run_case+0x1a5/0x480 [ 15.404797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.404833] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.404860] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.404886] ? __kthread_parkme+0x82/0x180 [ 15.404909] ? preempt_count_sub+0x50/0x80 [ 15.404935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.404962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.404989] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.405016] kthread+0x337/0x6f0 [ 15.405037] ? trace_preempt_on+0x20/0xc0 [ 15.405062] ? __pfx_kthread+0x10/0x10 [ 15.405085] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.405108] ? calculate_sigpending+0x7b/0xa0 [ 15.405135] ? __pfx_kthread+0x10/0x10 [ 15.405158] ret_from_fork+0x116/0x1d0 [ 15.405178] ? __pfx_kthread+0x10/0x10 [ 15.405200] ret_from_fork_asm+0x1a/0x30 [ 15.405233] </TASK> [ 15.405244] [ 15.417195] Allocated by task 282: [ 15.417356] kasan_save_stack+0x45/0x70 [ 15.417568] kasan_save_track+0x18/0x40 [ 15.418501] kasan_save_alloc_info+0x3b/0x50 [ 15.418680] __kasan_kmalloc+0xb7/0xc0 [ 15.418832] __kmalloc_cache_noprof+0x189/0x420 [ 15.418999] kasan_atomics+0x95/0x310 [ 15.419269] kunit_try_run_case+0x1a5/0x480 [ 15.419460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.419723] kthread+0x337/0x6f0 [ 15.419903] ret_from_fork+0x116/0x1d0 [ 15.420066] ret_from_fork_asm+0x1a/0x30 [ 15.420266] [ 15.420350] The buggy address belongs to the object at ffff888103082e00 [ 15.420350] which belongs to the cache kmalloc-64 of size 64 [ 15.420952] The buggy address is located 0 bytes to the right of [ 15.420952] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.421468] [ 15.421543] The buggy address belongs to the physical page: [ 15.421714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.422278] flags: 0x200000000000000(node=0|zone=2) [ 15.422535] page_type: f5(slab) [ 15.422725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.423340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.424475] page dumped because: kasan: bad access detected [ 15.424718] [ 15.424812] Memory state around the buggy address: [ 15.425184] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.425537] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.425833] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.426148] ^ [ 15.426359] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.426879] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.427285] ================================================================== [ 15.428394] ================================================================== [ 15.428724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.429151] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282 [ 15.429755] [ 15.429887] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.429937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.429951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.429975] Call Trace: [ 15.429993] <TASK> [ 15.430010] dump_stack_lvl+0x73/0xb0 [ 15.430042] print_report+0xd1/0x610 [ 15.430069] ? __virt_addr_valid+0x1db/0x2d0 [ 15.430292] ? kasan_atomics_helper+0xc70/0x5450 [ 15.430318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.430345] ? kasan_atomics_helper+0xc70/0x5450 [ 15.430370] kasan_report+0x141/0x180 [ 15.430394] ? kasan_atomics_helper+0xc70/0x5450 [ 15.430423] kasan_check_range+0x10c/0x1c0 [ 15.430465] __kasan_check_write+0x18/0x20 [ 15.430487] kasan_atomics_helper+0xc70/0x5450 [ 15.430512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.430537] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.430565] ? kasan_atomics+0x152/0x310 [ 15.430594] kasan_atomics+0x1dc/0x310 [ 15.430618] ? __pfx_kasan_atomics+0x10/0x10 [ 15.430645] ? __pfx_read_tsc+0x10/0x10 [ 15.430669] ? ktime_get_ts64+0x86/0x230 [ 15.430697] kunit_try_run_case+0x1a5/0x480 [ 15.430724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.430750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.430790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.430817] ? __kthread_parkme+0x82/0x180 [ 15.430839] ? preempt_count_sub+0x50/0x80 [ 15.430865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.430892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.430920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.430948] kthread+0x337/0x6f0 [ 15.430968] ? trace_preempt_on+0x20/0xc0 [ 15.430993] ? __pfx_kthread+0x10/0x10 [ 15.431016] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.431039] ? calculate_sigpending+0x7b/0xa0 [ 15.431065] ? __pfx_kthread+0x10/0x10 [ 15.431089] ret_from_fork+0x116/0x1d0 [ 15.431109] ? __pfx_kthread+0x10/0x10 [ 15.431131] ret_from_fork_asm+0x1a/0x30 [ 15.431164] </TASK> [ 15.431175] [ 15.440906] Allocated by task 282: [ 15.441082] kasan_save_stack+0x45/0x70 [ 15.441288] kasan_save_track+0x18/0x40 [ 15.441485] kasan_save_alloc_info+0x3b/0x50 [ 15.441969] __kasan_kmalloc+0xb7/0xc0 [ 15.442223] __kmalloc_cache_noprof+0x189/0x420 [ 15.442402] kasan_atomics+0x95/0x310 [ 15.442731] kunit_try_run_case+0x1a5/0x480 [ 15.443010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.443313] kthread+0x337/0x6f0 [ 15.443549] ret_from_fork+0x116/0x1d0 [ 15.443734] ret_from_fork_asm+0x1a/0x30 [ 15.443931] [ 15.444033] The buggy address belongs to the object at ffff888103082e00 [ 15.444033] which belongs to the cache kmalloc-64 of size 64 [ 15.444782] The buggy address is located 0 bytes to the right of [ 15.444782] allocated 48-byte region [ffff888103082e00, ffff888103082e30) [ 15.445336] [ 15.445528] The buggy address belongs to the physical page: [ 15.445839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082 [ 15.446143] flags: 0x200000000000000(node=0|zone=2) [ 15.446485] page_type: f5(slab) [ 15.446660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.447135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.447517] page dumped because: kasan: bad access detected [ 15.447842] [ 15.448001] Memory state around the buggy address: [ 15.448211] ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.448623] ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.448991] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.449358] ^ [ 15.449610] ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449923] ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.450220] ==================================================================