Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.177452] ================================================================== [ 18.177663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.178024] Write of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.178179] [ 18.178233] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.178325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.178550] Hardware name: linux,dummy-virt (DT) [ 18.178840] Call trace: [ 18.179130] show_stack+0x20/0x38 (C) [ 18.179237] dump_stack_lvl+0x8c/0xd0 [ 18.179612] print_report+0x118/0x5d0 [ 18.179697] kasan_report+0xdc/0x128 [ 18.179747] kasan_check_range+0x100/0x1a8 [ 18.180099] __kasan_check_write+0x20/0x30 [ 18.180461] kasan_atomics_helper+0xd3c/0x4858 [ 18.180569] kasan_atomics+0x198/0x2e0 [ 18.180620] kunit_try_run_case+0x170/0x3f0 [ 18.180961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.181311] kthread+0x328/0x630 [ 18.181490] ret_from_fork+0x10/0x20 [ 18.181713] [ 18.181751] Allocated by task 265: [ 18.182119] kasan_save_stack+0x3c/0x68 [ 18.182388] kasan_save_track+0x20/0x40 [ 18.182493] kasan_save_alloc_info+0x40/0x58 [ 18.182542] __kasan_kmalloc+0xd4/0xd8 [ 18.182958] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.183161] kasan_atomics+0xb8/0x2e0 [ 18.183383] kunit_try_run_case+0x170/0x3f0 [ 18.183432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.183481] kthread+0x328/0x630 [ 18.183882] ret_from_fork+0x10/0x20 [ 18.184307] [ 18.184354] The buggy address belongs to the object at fff00000c784ef80 [ 18.184354] which belongs to the cache kmalloc-64 of size 64 [ 18.184857] The buggy address is located 0 bytes to the right of [ 18.184857] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.185132] [ 18.185240] The buggy address belongs to the physical page: [ 18.185278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.185344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.185450] page_type: f5(slab) [ 18.185537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.186075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.186161] page dumped because: kasan: bad access detected [ 18.186312] [ 18.186391] Memory state around the buggy address: [ 18.186590] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.186736] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.186884] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.186980] ^ [ 18.187140] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.187190] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.187232] ================================================================== [ 18.239580] ================================================================== [ 18.239646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.239700] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.239753] [ 18.239793] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.240092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.240135] Hardware name: linux,dummy-virt (DT) [ 18.240250] Call trace: [ 18.240290] show_stack+0x20/0x38 (C) [ 18.240354] dump_stack_lvl+0x8c/0xd0 [ 18.240412] print_report+0x118/0x5d0 [ 18.240470] kasan_report+0xdc/0x128 [ 18.240819] kasan_check_range+0x100/0x1a8 [ 18.241012] __kasan_check_write+0x20/0x30 [ 18.241259] kasan_atomics_helper+0xf20/0x4858 [ 18.241519] kasan_atomics+0x198/0x2e0 [ 18.241669] kunit_try_run_case+0x170/0x3f0 [ 18.241853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.241910] kthread+0x328/0x630 [ 18.241956] ret_from_fork+0x10/0x20 [ 18.242005] [ 18.242025] Allocated by task 265: [ 18.242295] kasan_save_stack+0x3c/0x68 [ 18.242665] kasan_save_track+0x20/0x40 [ 18.242807] kasan_save_alloc_info+0x40/0x58 [ 18.243135] __kasan_kmalloc+0xd4/0xd8 [ 18.243402] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.243619] kasan_atomics+0xb8/0x2e0 [ 18.243837] kunit_try_run_case+0x170/0x3f0 [ 18.243921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.244237] kthread+0x328/0x630 [ 18.244292] ret_from_fork+0x10/0x20 [ 18.244364] [ 18.244387] The buggy address belongs to the object at fff00000c784ef80 [ 18.244387] which belongs to the cache kmalloc-64 of size 64 [ 18.244468] The buggy address is located 0 bytes to the right of [ 18.244468] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.245081] [ 18.245131] The buggy address belongs to the physical page: [ 18.245295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.245421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.245556] page_type: f5(slab) [ 18.245597] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.245658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.245879] page dumped because: kasan: bad access detected [ 18.246023] [ 18.246283] Memory state around the buggy address: [ 18.246584] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.246655] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.246742] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.246988] ^ [ 18.247308] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.247485] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.247751] ================================================================== [ 18.301060] ================================================================== [ 18.301110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.301171] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.301224] [ 18.301255] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.301861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.302429] Hardware name: linux,dummy-virt (DT) [ 18.302494] Call trace: [ 18.302538] show_stack+0x20/0x38 (C) [ 18.302647] dump_stack_lvl+0x8c/0xd0 [ 18.302746] print_report+0x118/0x5d0 [ 18.302824] kasan_report+0xdc/0x128 [ 18.302966] kasan_check_range+0x100/0x1a8 [ 18.303193] __kasan_check_write+0x20/0x30 [ 18.303557] kasan_atomics_helper+0x11f8/0x4858 [ 18.303703] kasan_atomics+0x198/0x2e0 [ 18.303793] kunit_try_run_case+0x170/0x3f0 [ 18.303876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.304361] kthread+0x328/0x630 [ 18.304449] ret_from_fork+0x10/0x20 [ 18.304554] [ 18.304888] Allocated by task 265: [ 18.305166] kasan_save_stack+0x3c/0x68 [ 18.305284] kasan_save_track+0x20/0x40 [ 18.305441] kasan_save_alloc_info+0x40/0x58 [ 18.305485] __kasan_kmalloc+0xd4/0xd8 [ 18.305536] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.305726] kasan_atomics+0xb8/0x2e0 [ 18.305847] kunit_try_run_case+0x170/0x3f0 [ 18.306002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.306222] kthread+0x328/0x630 [ 18.306662] ret_from_fork+0x10/0x20 [ 18.306747] [ 18.306789] The buggy address belongs to the object at fff00000c784ef80 [ 18.306789] which belongs to the cache kmalloc-64 of size 64 [ 18.307077] The buggy address is located 0 bytes to the right of [ 18.307077] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.307188] [ 18.307304] The buggy address belongs to the physical page: [ 18.307351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.307648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.307811] page_type: f5(slab) [ 18.307868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.307944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.308144] page dumped because: kasan: bad access detected [ 18.308187] [ 18.308518] Memory state around the buggy address: [ 18.308752] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.309094] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.309161] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.309677] ^ [ 18.309888] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.310096] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.310155] ================================================================== [ 18.374522] ================================================================== [ 18.374584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.374927] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.375117] [ 18.375163] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.375520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.375581] Hardware name: linux,dummy-virt (DT) [ 18.375653] Call trace: [ 18.375680] show_stack+0x20/0x38 (C) [ 18.375764] dump_stack_lvl+0x8c/0xd0 [ 18.375877] print_report+0x118/0x5d0 [ 18.375929] kasan_report+0xdc/0x128 [ 18.376126] kasan_check_range+0x100/0x1a8 [ 18.376223] __kasan_check_write+0x20/0x30 [ 18.376391] kasan_atomics_helper+0x154c/0x4858 [ 18.376457] kasan_atomics+0x198/0x2e0 [ 18.376503] kunit_try_run_case+0x170/0x3f0 [ 18.376719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.376889] kthread+0x328/0x630 [ 18.377004] ret_from_fork+0x10/0x20 [ 18.377067] [ 18.377090] Allocated by task 265: [ 18.377120] kasan_save_stack+0x3c/0x68 [ 18.377164] kasan_save_track+0x20/0x40 [ 18.377211] kasan_save_alloc_info+0x40/0x58 [ 18.377254] __kasan_kmalloc+0xd4/0xd8 [ 18.377292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.377785] kasan_atomics+0xb8/0x2e0 [ 18.377876] kunit_try_run_case+0x170/0x3f0 [ 18.377987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.378084] kthread+0x328/0x630 [ 18.378215] ret_from_fork+0x10/0x20 [ 18.378294] [ 18.378350] The buggy address belongs to the object at fff00000c784ef80 [ 18.378350] which belongs to the cache kmalloc-64 of size 64 [ 18.378563] The buggy address is located 0 bytes to the right of [ 18.378563] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.378665] [ 18.378720] The buggy address belongs to the physical page: [ 18.378772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.379183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.379273] page_type: f5(slab) [ 18.379513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.379982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.380084] page dumped because: kasan: bad access detected [ 18.380219] [ 18.380247] Memory state around the buggy address: [ 18.380285] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.380513] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.380880] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.380974] ^ [ 18.381099] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.381181] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.381223] ================================================================== [ 18.188221] ================================================================== [ 18.188275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.188342] Read of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.188408] [ 18.188449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.188532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.188569] Hardware name: linux,dummy-virt (DT) [ 18.188602] Call trace: [ 18.188626] show_stack+0x20/0x38 (C) [ 18.188676] dump_stack_lvl+0x8c/0xd0 [ 18.188723] print_report+0x118/0x5d0 [ 18.188773] kasan_report+0xdc/0x128 [ 18.188820] __asan_report_load4_noabort+0x20/0x30 [ 18.188875] kasan_atomics_helper+0x3e04/0x4858 [ 18.188932] kasan_atomics+0x198/0x2e0 [ 18.188982] kunit_try_run_case+0x170/0x3f0 [ 18.189042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.189109] kthread+0x328/0x630 [ 18.189155] ret_from_fork+0x10/0x20 [ 18.189205] [ 18.189227] Allocated by task 265: [ 18.189257] kasan_save_stack+0x3c/0x68 [ 18.189300] kasan_save_track+0x20/0x40 [ 18.189493] kasan_save_alloc_info+0x40/0x58 [ 18.190015] __kasan_kmalloc+0xd4/0xd8 [ 18.190351] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.190421] kasan_atomics+0xb8/0x2e0 [ 18.190483] kunit_try_run_case+0x170/0x3f0 [ 18.190549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.191008] kthread+0x328/0x630 [ 18.191276] ret_from_fork+0x10/0x20 [ 18.191342] [ 18.191586] The buggy address belongs to the object at fff00000c784ef80 [ 18.191586] which belongs to the cache kmalloc-64 of size 64 [ 18.191895] The buggy address is located 0 bytes to the right of [ 18.191895] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.192113] [ 18.192139] The buggy address belongs to the physical page: [ 18.192194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.192421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.192718] page_type: f5(slab) [ 18.192854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.193028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.193074] page dumped because: kasan: bad access detected [ 18.193237] [ 18.193412] Memory state around the buggy address: [ 18.193809] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.194026] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.194097] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.194417] ^ [ 18.194525] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.194684] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.194929] ================================================================== [ 18.063280] ================================================================== [ 18.063347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 18.063702] Read of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.063775] [ 18.063935] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.064244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.064408] Hardware name: linux,dummy-virt (DT) [ 18.064600] Call trace: [ 18.064675] show_stack+0x20/0x38 (C) [ 18.064771] dump_stack_lvl+0x8c/0xd0 [ 18.065224] __asan_report_load4_noabort+0x20/0x30 [ 18.066272] __kasan_kmalloc+0xd4/0xd8 [ 18.066311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.066382] kasan_atomics+0xb8/0x2e0 [ 18.066708] The buggy address is located 0 bytes to the right of [ 18.066708] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.067130] page dumped because: kasan: bad access detected [ 18.067483] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.069933] Hardware name: linux,dummy-virt (DT) [ 18.070038] Call trace: [ 18.070074] show_stack+0x20/0x38 (C) [ 18.070483] dump_stack_lvl+0x8c/0xd0 [ 18.070584] print_report+0x118/0x5d0 [ 18.070924] kasan_report+0xdc/0x128 [ 18.071103] kasan_check_range+0x100/0x1a8 [ 18.071255] __kasan_check_write+0x20/0x30 [ 18.071591] kasan_atomics_helper+0x934/0x4858 [ 18.071821] kasan_atomics+0x198/0x2e0 [ 18.071926] kunit_try_run_case+0x170/0x3f0 [ 18.072488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.072590] kthread+0x328/0x630 [ 18.072821] ret_from_fork+0x10/0x20 [ 18.073051] [ 18.073078] Allocated by task 265: [ 18.073343] kasan_save_stack+0x3c/0x68 [ 18.073601] kasan_save_track+0x20/0x40 [ 18.073663] kasan_save_alloc_info+0x40/0x58 [ 18.073907] __kasan_kmalloc+0xd4/0xd8 [ 18.074310] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.074555] kasan_atomics+0xb8/0x2e0 [ 18.074646] kunit_try_run_case+0x170/0x3f0 [ 18.074878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.075120] kthread+0x328/0x630 [ 18.075181] ret_from_fork+0x10/0x20 [ 18.075400] [ 18.075771] The buggy address belongs to the object at fff00000c784ef80 [ 18.075771] which belongs to the cache kmalloc-64 of size 64 [ 18.075947] The buggy address is located 0 bytes to the right of [ 18.075947] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.076061] [ 18.076227] The buggy address belongs to the physical page: [ 18.076490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.076731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.076869] page_type: f5(slab) [ 18.076959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.077014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.077360] page dumped because: kasan: bad access detected [ 18.077585] [ 18.077628] Memory state around the buggy address: [ 18.077816] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.077998] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.078052] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.078094] ^ [ 18.078131] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.078360] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.078719] ================================================================== [ 18.399405] ================================================================== [ 18.399459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.399615] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.399687] [ 18.399719] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.399803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.399841] Hardware name: linux,dummy-virt (DT) [ 18.399882] Call trace: [ 18.399909] show_stack+0x20/0x38 (C) [ 18.399969] dump_stack_lvl+0x8c/0xd0 [ 18.400023] print_report+0x118/0x5d0 [ 18.400072] kasan_report+0xdc/0x128 [ 18.400129] kasan_check_range+0x100/0x1a8 [ 18.400182] __kasan_check_write+0x20/0x30 [ 18.400228] kasan_atomics_helper+0x1644/0x4858 [ 18.400287] kasan_atomics+0x198/0x2e0 [ 18.400348] kunit_try_run_case+0x170/0x3f0 [ 18.400397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.400467] kthread+0x328/0x630 [ 18.400510] ret_from_fork+0x10/0x20 [ 18.400560] [ 18.400580] Allocated by task 265: [ 18.400617] kasan_save_stack+0x3c/0x68 [ 18.400660] kasan_save_track+0x20/0x40 [ 18.400702] kasan_save_alloc_info+0x40/0x58 [ 18.400744] __kasan_kmalloc+0xd4/0xd8 [ 18.400784] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.400830] kasan_atomics+0xb8/0x2e0 [ 18.400870] kunit_try_run_case+0x170/0x3f0 [ 18.400910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.400959] kthread+0x328/0x630 [ 18.400995] ret_from_fork+0x10/0x20 [ 18.401034] [ 18.401055] The buggy address belongs to the object at fff00000c784ef80 [ 18.401055] which belongs to the cache kmalloc-64 of size 64 [ 18.401116] The buggy address is located 0 bytes to the right of [ 18.401116] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.401191] [ 18.401223] The buggy address belongs to the physical page: [ 18.401256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.401730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.402156] page_type: f5(slab) [ 18.402610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.402812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.403095] page dumped because: kasan: bad access detected [ 18.403325] [ 18.403386] Memory state around the buggy address: [ 18.403708] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.403849] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.404149] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.404358] ^ [ 18.404630] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.404815] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.404910] ================================================================== [ 18.311524] ================================================================== [ 18.311608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.311662] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.311917] [ 18.312075] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.312194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.312443] Hardware name: linux,dummy-virt (DT) [ 18.312705] Call trace: [ 18.312742] show_stack+0x20/0x38 (C) [ 18.312962] dump_stack_lvl+0x8c/0xd0 [ 18.313060] print_report+0x118/0x5d0 [ 18.313137] kasan_report+0xdc/0x128 [ 18.313203] kasan_check_range+0x100/0x1a8 [ 18.313256] __kasan_check_write+0x20/0x30 [ 18.313647] kasan_atomics_helper+0x126c/0x4858 [ 18.313741] kasan_atomics+0x198/0x2e0 [ 18.313918] kunit_try_run_case+0x170/0x3f0 [ 18.314116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.314388] kthread+0x328/0x630 [ 18.314736] ret_from_fork+0x10/0x20 [ 18.315006] [ 18.315068] Allocated by task 265: [ 18.315287] kasan_save_stack+0x3c/0x68 [ 18.315376] kasan_save_track+0x20/0x40 [ 18.315480] kasan_save_alloc_info+0x40/0x58 [ 18.315589] __kasan_kmalloc+0xd4/0xd8 [ 18.315667] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.315710] kasan_atomics+0xb8/0x2e0 [ 18.315931] kunit_try_run_case+0x170/0x3f0 [ 18.316093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.316189] kthread+0x328/0x630 [ 18.316632] ret_from_fork+0x10/0x20 [ 18.317061] [ 18.317113] The buggy address belongs to the object at fff00000c784ef80 [ 18.317113] which belongs to the cache kmalloc-64 of size 64 [ 18.317275] The buggy address is located 0 bytes to the right of [ 18.317275] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.317356] [ 18.317942] The buggy address belongs to the physical page: [ 18.318300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.318379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.318431] page_type: f5(slab) [ 18.318473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.319130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.319385] page dumped because: kasan: bad access detected [ 18.319450] [ 18.319509] Memory state around the buggy address: [ 18.319830] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.320090] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.320388] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.320665] ^ [ 18.320738] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.320962] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.321006] ================================================================== [ 18.196151] ================================================================== [ 18.196228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.196281] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.196644] [ 18.196944] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.197040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.197223] Hardware name: linux,dummy-virt (DT) [ 18.197312] Call trace: [ 18.197435] show_stack+0x20/0x38 (C) [ 18.197649] dump_stack_lvl+0x8c/0xd0 [ 18.197712] print_report+0x118/0x5d0 [ 18.198008] kasan_report+0xdc/0x128 [ 18.198322] kasan_check_range+0x100/0x1a8 [ 18.198495] __kasan_check_read+0x20/0x30 [ 18.198637] kasan_atomics_helper+0xdd4/0x4858 [ 18.198783] kasan_atomics+0x198/0x2e0 [ 18.198880] kunit_try_run_case+0x170/0x3f0 [ 18.198957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.199181] kthread+0x328/0x630 [ 18.199567] ret_from_fork+0x10/0x20 [ 18.199857] [ 18.199945] Allocated by task 265: [ 18.200274] kasan_save_stack+0x3c/0x68 [ 18.200352] kasan_save_track+0x20/0x40 [ 18.200578] kasan_save_alloc_info+0x40/0x58 [ 18.200661] __kasan_kmalloc+0xd4/0xd8 [ 18.200789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.201144] kasan_atomics+0xb8/0x2e0 [ 18.201397] kunit_try_run_case+0x170/0x3f0 [ 18.201608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.201701] kthread+0x328/0x630 [ 18.201862] ret_from_fork+0x10/0x20 [ 18.201916] [ 18.201942] The buggy address belongs to the object at fff00000c784ef80 [ 18.201942] which belongs to the cache kmalloc-64 of size 64 [ 18.202005] The buggy address is located 0 bytes to the right of [ 18.202005] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.202217] [ 18.202653] The buggy address belongs to the physical page: [ 18.202706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.202841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.202896] page_type: f5(slab) [ 18.203219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.203623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.203675] page dumped because: kasan: bad access detected [ 18.203758] [ 18.203780] Memory state around the buggy address: [ 18.203832] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.203880] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.203926] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.203967] ^ [ 18.204003] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.204048] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.204089] ================================================================== [ 18.204861] ================================================================== [ 18.204980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.205248] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.205325] [ 18.205393] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.205893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.206052] Hardware name: linux,dummy-virt (DT) [ 18.206134] Call trace: [ 18.206345] show_stack+0x20/0x38 (C) [ 18.206480] dump_stack_lvl+0x8c/0xd0 [ 18.206715] print_report+0x118/0x5d0 [ 18.206856] kasan_report+0xdc/0x128 [ 18.207131] __asan_report_load8_noabort+0x20/0x30 [ 18.207224] kasan_atomics_helper+0x3f58/0x4858 [ 18.207372] kasan_atomics+0x198/0x2e0 [ 18.207429] kunit_try_run_case+0x170/0x3f0 [ 18.207672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.207880] kthread+0x328/0x630 [ 18.208216] ret_from_fork+0x10/0x20 [ 18.209002] [ 18.209053] Allocated by task 265: [ 18.209124] kasan_save_stack+0x3c/0x68 [ 18.209207] kasan_save_track+0x20/0x40 [ 18.209270] kasan_save_alloc_info+0x40/0x58 [ 18.209324] __kasan_kmalloc+0xd4/0xd8 [ 18.209405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.209673] kasan_atomics+0xb8/0x2e0 [ 18.209725] kunit_try_run_case+0x170/0x3f0 [ 18.209987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.210078] kthread+0x328/0x630 [ 18.210258] ret_from_fork+0x10/0x20 [ 18.210609] [ 18.210959] The buggy address belongs to the object at fff00000c784ef80 [ 18.210959] which belongs to the cache kmalloc-64 of size 64 [ 18.211053] The buggy address is located 0 bytes to the right of [ 18.211053] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.211389] [ 18.211484] The buggy address belongs to the physical page: [ 18.211521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.211729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.212154] page_type: f5(slab) [ 18.212373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.212436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.212848] page dumped because: kasan: bad access detected [ 18.213120] [ 18.213253] Memory state around the buggy address: [ 18.213396] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.213472] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.213689] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.213884] ^ [ 18.214027] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.214164] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.214260] ================================================================== [ 18.165140] ================================================================== [ 18.165197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.165247] Read of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.165298] [ 18.166490] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.166629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.166693] Hardware name: linux,dummy-virt (DT) [ 18.166745] Call trace: [ 18.166800] show_stack+0x20/0x38 (C) [ 18.166870] dump_stack_lvl+0x8c/0xd0 [ 18.166944] print_report+0x118/0x5d0 [ 18.167377] kasan_report+0xdc/0x128 [ 18.167514] __asan_report_load4_noabort+0x20/0x30 [ 18.167747] kasan_atomics_helper+0x3dd8/0x4858 [ 18.168620] kasan_atomics+0x198/0x2e0 [ 18.168773] kunit_try_run_case+0x170/0x3f0 [ 18.168993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.169093] kthread+0x328/0x630 [ 18.169723] ret_from_fork+0x10/0x20 [ 18.169788] [ 18.169834] Allocated by task 265: [ 18.169893] kasan_save_stack+0x3c/0x68 [ 18.170104] kasan_save_track+0x20/0x40 [ 18.170493] kasan_save_alloc_info+0x40/0x58 [ 18.170567] __kasan_kmalloc+0xd4/0xd8 [ 18.170715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.170796] kasan_atomics+0xb8/0x2e0 [ 18.170843] kunit_try_run_case+0x170/0x3f0 [ 18.171051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.171356] kthread+0x328/0x630 [ 18.171403] ret_from_fork+0x10/0x20 [ 18.171738] [ 18.171802] The buggy address belongs to the object at fff00000c784ef80 [ 18.171802] which belongs to the cache kmalloc-64 of size 64 [ 18.172097] The buggy address is located 0 bytes to the right of [ 18.172097] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.172648] [ 18.172698] The buggy address belongs to the physical page: [ 18.172770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.173073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.173407] page_type: f5(slab) [ 18.173872] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.173944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.174105] page dumped because: kasan: bad access detected [ 18.174293] [ 18.174396] Memory state around the buggy address: [ 18.174468] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.174900] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.175015] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.175277] ^ [ 18.175550] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.175685] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.175785] ================================================================== [ 18.450890] ================================================================== [ 18.450974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.451167] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.451269] [ 18.451414] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.451616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.451650] Hardware name: linux,dummy-virt (DT) [ 18.451690] Call trace: [ 18.451714] show_stack+0x20/0x38 (C) [ 18.451776] dump_stack_lvl+0x8c/0xd0 [ 18.451823] print_report+0x118/0x5d0 [ 18.451873] kasan_report+0xdc/0x128 [ 18.452169] kasan_check_range+0x100/0x1a8 [ 18.452245] __kasan_check_write+0x20/0x30 [ 18.452319] kasan_atomics_helper+0x17ec/0x4858 [ 18.452385] kasan_atomics+0x198/0x2e0 [ 18.452433] kunit_try_run_case+0x170/0x3f0 [ 18.452480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.452551] kthread+0x328/0x630 [ 18.452599] ret_from_fork+0x10/0x20 [ 18.452649] [ 18.452680] Allocated by task 265: [ 18.452716] kasan_save_stack+0x3c/0x68 [ 18.452760] kasan_save_track+0x20/0x40 [ 18.452799] kasan_save_alloc_info+0x40/0x58 [ 18.452841] __kasan_kmalloc+0xd4/0xd8 [ 18.452879] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.452938] kasan_atomics+0xb8/0x2e0 [ 18.452982] kunit_try_run_case+0x170/0x3f0 [ 18.453023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.453069] kthread+0x328/0x630 [ 18.453104] ret_from_fork+0x10/0x20 [ 18.453149] [ 18.453179] The buggy address belongs to the object at fff00000c784ef80 [ 18.453179] which belongs to the cache kmalloc-64 of size 64 [ 18.453240] The buggy address is located 0 bytes to the right of [ 18.453240] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.453796] [ 18.453836] The buggy address belongs to the physical page: [ 18.453888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.453944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.454216] page_type: f5(slab) [ 18.454650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.454993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.455063] page dumped because: kasan: bad access detected [ 18.455129] [ 18.455195] Memory state around the buggy address: [ 18.455498] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.455894] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.456220] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.456431] ^ [ 18.456526] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.456611] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.456827] ================================================================== [ 18.322428] ================================================================== [ 18.322482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.322535] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.323190] [ 18.323284] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.323641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.323690] Hardware name: linux,dummy-virt (DT) [ 18.323907] Call trace: [ 18.324089] show_stack+0x20/0x38 (C) [ 18.324181] dump_stack_lvl+0x8c/0xd0 [ 18.324235] print_report+0x118/0x5d0 [ 18.324589] kasan_report+0xdc/0x128 [ 18.324662] kasan_check_range+0x100/0x1a8 [ 18.324722] __kasan_check_write+0x20/0x30 [ 18.324961] kasan_atomics_helper+0x12d8/0x4858 [ 18.325033] kasan_atomics+0x198/0x2e0 [ 18.325294] kunit_try_run_case+0x170/0x3f0 [ 18.325573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.325646] kthread+0x328/0x630 [ 18.325697] ret_from_fork+0x10/0x20 [ 18.325748] [ 18.325963] Allocated by task 265: [ 18.326485] kasan_save_stack+0x3c/0x68 [ 18.326684] kasan_save_track+0x20/0x40 [ 18.326805] kasan_save_alloc_info+0x40/0x58 [ 18.326882] __kasan_kmalloc+0xd4/0xd8 [ 18.327009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.327050] kasan_atomics+0xb8/0x2e0 [ 18.327247] kunit_try_run_case+0x170/0x3f0 [ 18.327447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.327648] kthread+0x328/0x630 [ 18.327699] ret_from_fork+0x10/0x20 [ 18.327740] [ 18.327782] The buggy address belongs to the object at fff00000c784ef80 [ 18.327782] which belongs to the cache kmalloc-64 of size 64 [ 18.327856] The buggy address is located 0 bytes to the right of [ 18.327856] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.327938] [ 18.327982] The buggy address belongs to the physical page: [ 18.328016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.328071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.328122] page_type: f5(slab) [ 18.328168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.328231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.328284] page dumped because: kasan: bad access detected [ 18.328342] [ 18.328404] Memory state around the buggy address: [ 18.328588] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.328639] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.329015] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.329763] ^ [ 18.329828] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.329877] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.329941] ================================================================== [ 18.260150] ================================================================== [ 18.260297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.260366] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.260494] [ 18.260530] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.260702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.260736] Hardware name: linux,dummy-virt (DT) [ 18.260768] Call trace: [ 18.260794] show_stack+0x20/0x38 (C) [ 18.261013] dump_stack_lvl+0x8c/0xd0 [ 18.261113] print_report+0x118/0x5d0 [ 18.261413] kasan_report+0xdc/0x128 [ 18.261663] kasan_check_range+0x100/0x1a8 [ 18.261785] __kasan_check_write+0x20/0x30 [ 18.261884] kasan_atomics_helper+0xff0/0x4858 [ 18.261964] kasan_atomics+0x198/0x2e0 [ 18.262013] kunit_try_run_case+0x170/0x3f0 [ 18.262062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.262116] kthread+0x328/0x630 [ 18.262483] ret_from_fork+0x10/0x20 [ 18.262621] [ 18.262776] Allocated by task 265: [ 18.262971] kasan_save_stack+0x3c/0x68 [ 18.263137] kasan_save_track+0x20/0x40 [ 18.263260] kasan_save_alloc_info+0x40/0x58 [ 18.263395] __kasan_kmalloc+0xd4/0xd8 [ 18.263498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.263544] kasan_atomics+0xb8/0x2e0 [ 18.263589] kunit_try_run_case+0x170/0x3f0 [ 18.263630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.263715] kthread+0x328/0x630 [ 18.263750] ret_from_fork+0x10/0x20 [ 18.263798] [ 18.263822] The buggy address belongs to the object at fff00000c784ef80 [ 18.263822] which belongs to the cache kmalloc-64 of size 64 [ 18.263892] The buggy address is located 0 bytes to the right of [ 18.263892] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.263966] [ 18.263993] The buggy address belongs to the physical page: [ 18.264026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.264093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.264143] page_type: f5(slab) [ 18.264184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.264237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.264280] page dumped because: kasan: bad access detected [ 18.264323] [ 18.264713] Memory state around the buggy address: [ 18.264897] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.265252] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.265369] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.265677] ^ [ 18.265728] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.266030] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.266292] ================================================================== [ 18.234494] ================================================================== [ 18.234775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.235044] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.235250] [ 18.235305] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.235404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.235609] Hardware name: linux,dummy-virt (DT) [ 18.235672] Call trace: [ 18.235961] show_stack+0x20/0x38 (C) [ 18.236066] dump_stack_lvl+0x8c/0xd0 [ 18.236288] print_report+0x118/0x5d0 [ 18.236440] kasan_report+0xdc/0x128 [ 18.236492] kasan_check_range+0x100/0x1a8 [ 18.236543] __kasan_check_write+0x20/0x30 [ 18.236651] kasan_atomics_helper+0xeb8/0x4858 [ 18.236705] kasan_atomics+0x198/0x2e0 [ 18.236755] kunit_try_run_case+0x170/0x3f0 [ 18.236814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.236870] kthread+0x328/0x630 [ 18.236914] ret_from_fork+0x10/0x20 [ 18.236971] [ 18.236993] Allocated by task 265: [ 18.237023] kasan_save_stack+0x3c/0x68 [ 18.237072] kasan_save_track+0x20/0x40 [ 18.237113] kasan_save_alloc_info+0x40/0x58 [ 18.237155] __kasan_kmalloc+0xd4/0xd8 [ 18.237196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.237238] kasan_atomics+0xb8/0x2e0 [ 18.237277] kunit_try_run_case+0x170/0x3f0 [ 18.237318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.237374] kthread+0x328/0x630 [ 18.237418] ret_from_fork+0x10/0x20 [ 18.237457] [ 18.237480] The buggy address belongs to the object at fff00000c784ef80 [ 18.237480] which belongs to the cache kmalloc-64 of size 64 [ 18.237541] The buggy address is located 0 bytes to the right of [ 18.237541] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.237612] [ 18.237645] The buggy address belongs to the physical page: [ 18.237679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.237741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.237792] page_type: f5(slab) [ 18.237832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.237883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.237926] page dumped because: kasan: bad access detected [ 18.237962] [ 18.237982] Memory state around the buggy address: [ 18.238014] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.238059] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.238101] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.238151] ^ [ 18.238195] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.238239] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.238279] ================================================================== [ 18.416263] ================================================================== [ 18.416324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.416396] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.416667] [ 18.416747] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.416838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.417083] Hardware name: linux,dummy-virt (DT) [ 18.417133] Call trace: [ 18.417166] show_stack+0x20/0x38 (C) [ 18.417260] dump_stack_lvl+0x8c/0xd0 [ 18.417573] print_report+0x118/0x5d0 [ 18.417750] kasan_report+0xdc/0x128 [ 18.417862] kasan_check_range+0x100/0x1a8 [ 18.417915] __kasan_check_write+0x20/0x30 [ 18.417963] kasan_atomics_helper+0x16d0/0x4858 [ 18.418012] kasan_atomics+0x198/0x2e0 [ 18.418319] kunit_try_run_case+0x170/0x3f0 [ 18.418865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.418947] kthread+0x328/0x630 [ 18.419000] ret_from_fork+0x10/0x20 [ 18.419396] [ 18.419449] Allocated by task 265: [ 18.419889] kasan_save_stack+0x3c/0x68 [ 18.420013] kasan_save_track+0x20/0x40 [ 18.420090] kasan_save_alloc_info+0x40/0x58 [ 18.420210] __kasan_kmalloc+0xd4/0xd8 [ 18.420252] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.420502] kasan_atomics+0xb8/0x2e0 [ 18.420578] kunit_try_run_case+0x170/0x3f0 [ 18.420621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.420837] kthread+0x328/0x630 [ 18.420890] ret_from_fork+0x10/0x20 [ 18.420941] [ 18.420964] The buggy address belongs to the object at fff00000c784ef80 [ 18.420964] which belongs to the cache kmalloc-64 of size 64 [ 18.421027] The buggy address is located 0 bytes to the right of [ 18.421027] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.421101] [ 18.421133] The buggy address belongs to the physical page: [ 18.421182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.421244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.421303] page_type: f5(slab) [ 18.421825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.422107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.422188] page dumped because: kasan: bad access detected [ 18.422344] [ 18.422483] Memory state around the buggy address: [ 18.422558] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.422607] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.423295] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.423505] ^ [ 18.423569] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.423813] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.423974] ================================================================== [ 18.224105] ================================================================== [ 18.224253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.224312] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.224519] [ 18.224554] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.224696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.224730] Hardware name: linux,dummy-virt (DT) [ 18.225004] Call trace: [ 18.225140] show_stack+0x20/0x38 (C) [ 18.225202] dump_stack_lvl+0x8c/0xd0 [ 18.225344] print_report+0x118/0x5d0 [ 18.225418] kasan_report+0xdc/0x128 [ 18.225537] __asan_report_store8_noabort+0x20/0x30 [ 18.225593] kasan_atomics_helper+0x3e5c/0x4858 [ 18.225645] kasan_atomics+0x198/0x2e0 [ 18.226053] kunit_try_run_case+0x170/0x3f0 [ 18.226380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.226563] kthread+0x328/0x630 [ 18.226671] ret_from_fork+0x10/0x20 [ 18.226873] [ 18.226932] Allocated by task 265: [ 18.227351] kasan_save_stack+0x3c/0x68 [ 18.227577] kasan_save_track+0x20/0x40 [ 18.227771] kasan_save_alloc_info+0x40/0x58 [ 18.228046] __kasan_kmalloc+0xd4/0xd8 [ 18.228479] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.228645] kasan_atomics+0xb8/0x2e0 [ 18.228893] kunit_try_run_case+0x170/0x3f0 [ 18.228994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.229177] kthread+0x328/0x630 [ 18.229391] ret_from_fork+0x10/0x20 [ 18.229762] [ 18.229794] The buggy address belongs to the object at fff00000c784ef80 [ 18.229794] which belongs to the cache kmalloc-64 of size 64 [ 18.229858] The buggy address is located 0 bytes to the right of [ 18.229858] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.230103] [ 18.230149] The buggy address belongs to the physical page: [ 18.230285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.230558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.230969] page_type: f5(slab) [ 18.231201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.231429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.231687] page dumped because: kasan: bad access detected [ 18.231729] [ 18.231880] Memory state around the buggy address: [ 18.232007] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.232342] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.232474] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.232585] ^ [ 18.232642] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.232689] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.232740] ================================================================== [ 18.341720] ================================================================== [ 18.341771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.341963] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.342305] [ 18.342718] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.343063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.343109] Hardware name: linux,dummy-virt (DT) [ 18.343204] Call trace: [ 18.343251] show_stack+0x20/0x38 (C) [ 18.343364] dump_stack_lvl+0x8c/0xd0 [ 18.343509] print_report+0x118/0x5d0 [ 18.343563] kasan_report+0xdc/0x128 [ 18.343653] __asan_report_load8_noabort+0x20/0x30 [ 18.343710] kasan_atomics_helper+0x3f04/0x4858 [ 18.343941] kasan_atomics+0x198/0x2e0 [ 18.344319] kunit_try_run_case+0x170/0x3f0 [ 18.344406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.344463] kthread+0x328/0x630 [ 18.344507] ret_from_fork+0x10/0x20 [ 18.344557] [ 18.344578] Allocated by task 265: [ 18.344609] kasan_save_stack+0x3c/0x68 [ 18.344796] kasan_save_track+0x20/0x40 [ 18.344862] kasan_save_alloc_info+0x40/0x58 [ 18.344914] __kasan_kmalloc+0xd4/0xd8 [ 18.344962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.345002] kasan_atomics+0xb8/0x2e0 [ 18.345042] kunit_try_run_case+0x170/0x3f0 [ 18.345080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.345125] kthread+0x328/0x630 [ 18.345160] ret_from_fork+0x10/0x20 [ 18.345198] [ 18.345235] The buggy address belongs to the object at fff00000c784ef80 [ 18.345235] which belongs to the cache kmalloc-64 of size 64 [ 18.345297] The buggy address is located 0 bytes to the right of [ 18.345297] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.346261] [ 18.346350] The buggy address belongs to the physical page: [ 18.346386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.346632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.346727] page_type: f5(slab) [ 18.346783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.347145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.347202] page dumped because: kasan: bad access detected [ 18.347237] [ 18.347258] Memory state around the buggy address: [ 18.347665] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.348000] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.348245] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.348483] ^ [ 18.348685] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.348886] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.349058] ================================================================== [ 18.331468] ================================================================== [ 18.331657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.331732] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.331794] [ 18.332169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.332539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.332590] Hardware name: linux,dummy-virt (DT) [ 18.332653] Call trace: [ 18.332693] show_stack+0x20/0x38 (C) [ 18.332774] dump_stack_lvl+0x8c/0xd0 [ 18.333018] print_report+0x118/0x5d0 [ 18.333105] kasan_report+0xdc/0x128 [ 18.333156] kasan_check_range+0x100/0x1a8 [ 18.333502] __kasan_check_write+0x20/0x30 [ 18.333921] kasan_atomics_helper+0x1384/0x4858 [ 18.334065] kasan_atomics+0x198/0x2e0 [ 18.334173] kunit_try_run_case+0x170/0x3f0 [ 18.334356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.334429] kthread+0x328/0x630 [ 18.334492] ret_from_fork+0x10/0x20 [ 18.334550] [ 18.334768] Allocated by task 265: [ 18.335284] kasan_save_stack+0x3c/0x68 [ 18.335367] kasan_save_track+0x20/0x40 [ 18.335496] kasan_save_alloc_info+0x40/0x58 [ 18.335637] __kasan_kmalloc+0xd4/0xd8 [ 18.335735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.336263] kasan_atomics+0xb8/0x2e0 [ 18.336465] kunit_try_run_case+0x170/0x3f0 [ 18.336551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.336737] kthread+0x328/0x630 [ 18.337121] ret_from_fork+0x10/0x20 [ 18.337533] [ 18.337567] The buggy address belongs to the object at fff00000c784ef80 [ 18.337567] which belongs to the cache kmalloc-64 of size 64 [ 18.337771] The buggy address is located 0 bytes to the right of [ 18.337771] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.338155] [ 18.338185] The buggy address belongs to the physical page: [ 18.338220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.338548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.338736] page_type: f5(slab) [ 18.338877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.339411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.339484] page dumped because: kasan: bad access detected [ 18.339680] [ 18.339763] Memory state around the buggy address: [ 18.339855] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.339904] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.340375] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.340600] ^ [ 18.340735] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.340886] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.340952] ================================================================== [ 18.405763] ================================================================== [ 18.405934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.406161] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.406246] [ 18.406346] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.406432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.406469] Hardware name: linux,dummy-virt (DT) [ 18.406674] Call trace: [ 18.406723] show_stack+0x20/0x38 (C) [ 18.406809] dump_stack_lvl+0x8c/0xd0 [ 18.407182] print_report+0x118/0x5d0 [ 18.407488] kasan_report+0xdc/0x128 [ 18.407765] __asan_report_load8_noabort+0x20/0x30 [ 18.407839] kasan_atomics_helper+0x3df4/0x4858 [ 18.407893] kasan_atomics+0x198/0x2e0 [ 18.408271] kunit_try_run_case+0x170/0x3f0 [ 18.408367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.408579] kthread+0x328/0x630 [ 18.408643] ret_from_fork+0x10/0x20 [ 18.409056] [ 18.409115] Allocated by task 265: [ 18.409150] kasan_save_stack+0x3c/0x68 [ 18.409402] kasan_save_track+0x20/0x40 [ 18.409551] kasan_save_alloc_info+0x40/0x58 [ 18.409791] __kasan_kmalloc+0xd4/0xd8 [ 18.409999] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.410190] kasan_atomics+0xb8/0x2e0 [ 18.410588] kunit_try_run_case+0x170/0x3f0 [ 18.410745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.410835] kthread+0x328/0x630 [ 18.410963] ret_from_fork+0x10/0x20 [ 18.411080] [ 18.411132] The buggy address belongs to the object at fff00000c784ef80 [ 18.411132] which belongs to the cache kmalloc-64 of size 64 [ 18.411552] The buggy address is located 0 bytes to the right of [ 18.411552] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.411958] [ 18.412024] The buggy address belongs to the physical page: [ 18.412063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.412161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.412251] page_type: f5(slab) [ 18.412804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.413289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.413523] page dumped because: kasan: bad access detected [ 18.413710] [ 18.413767] Memory state around the buggy address: [ 18.413818] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.413868] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.413914] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.414515] ^ [ 18.414760] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.414927] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.415001] ================================================================== [ 18.276277] ================================================================== [ 18.276715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.276803] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.276859] [ 18.276890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.277276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.277551] Hardware name: linux,dummy-virt (DT) [ 18.277714] Call trace: [ 18.277829] show_stack+0x20/0x38 (C) [ 18.277927] dump_stack_lvl+0x8c/0xd0 [ 18.277986] print_report+0x118/0x5d0 [ 18.278036] kasan_report+0xdc/0x128 [ 18.278083] kasan_check_range+0x100/0x1a8 [ 18.278368] __kasan_check_write+0x20/0x30 [ 18.278655] kasan_atomics_helper+0x10c0/0x4858 [ 18.278925] kasan_atomics+0x198/0x2e0 [ 18.279109] kunit_try_run_case+0x170/0x3f0 [ 18.279204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.279262] kthread+0x328/0x630 [ 18.279613] ret_from_fork+0x10/0x20 [ 18.279835] [ 18.279999] Allocated by task 265: [ 18.280291] kasan_save_stack+0x3c/0x68 [ 18.280394] kasan_save_track+0x20/0x40 [ 18.280537] kasan_save_alloc_info+0x40/0x58 [ 18.280723] __kasan_kmalloc+0xd4/0xd8 [ 18.280892] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.281743] kasan_atomics+0xb8/0x2e0 [ 18.281818] kunit_try_run_case+0x170/0x3f0 [ 18.281862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.281934] kthread+0x328/0x630 [ 18.281987] ret_from_fork+0x10/0x20 [ 18.282062] [ 18.282257] The buggy address belongs to the object at fff00000c784ef80 [ 18.282257] which belongs to the cache kmalloc-64 of size 64 [ 18.282395] The buggy address is located 0 bytes to the right of [ 18.282395] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.282991] [ 18.283484] The buggy address belongs to the physical page: [ 18.283629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.283874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.284117] page_type: f5(slab) [ 18.284187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.284496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.284942] page dumped because: kasan: bad access detected [ 18.284999] [ 18.285188] Memory state around the buggy address: [ 18.285343] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.285506] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.285716] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.285928] ^ [ 18.286017] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.286084] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.286126] ================================================================== [ 18.382096] ================================================================== [ 18.382313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.382457] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.382670] [ 18.382810] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.382920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.382956] Hardware name: linux,dummy-virt (DT) [ 18.382990] Call trace: [ 18.383014] show_stack+0x20/0x38 (C) [ 18.383067] dump_stack_lvl+0x8c/0xd0 [ 18.383114] print_report+0x118/0x5d0 [ 18.383162] kasan_report+0xdc/0x128 [ 18.383208] kasan_check_range+0x100/0x1a8 [ 18.383500] __kasan_check_write+0x20/0x30 [ 18.383820] kasan_atomics_helper+0x15b4/0x4858 [ 18.383951] kasan_atomics+0x198/0x2e0 [ 18.384022] kunit_try_run_case+0x170/0x3f0 [ 18.384167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.384243] kthread+0x328/0x630 [ 18.384297] ret_from_fork+0x10/0x20 [ 18.384358] [ 18.384509] Allocated by task 265: [ 18.384875] kasan_save_stack+0x3c/0x68 [ 18.384957] kasan_save_track+0x20/0x40 [ 18.385095] kasan_save_alloc_info+0x40/0x58 [ 18.385149] __kasan_kmalloc+0xd4/0xd8 [ 18.385341] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.385503] kasan_atomics+0xb8/0x2e0 [ 18.385546] kunit_try_run_case+0x170/0x3f0 [ 18.385586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.385805] kthread+0x328/0x630 [ 18.385966] ret_from_fork+0x10/0x20 [ 18.386540] [ 18.386577] The buggy address belongs to the object at fff00000c784ef80 [ 18.386577] which belongs to the cache kmalloc-64 of size 64 [ 18.386643] The buggy address is located 0 bytes to the right of [ 18.386643] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.386939] [ 18.386977] The buggy address belongs to the physical page: [ 18.387012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.387066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.387118] page_type: f5(slab) [ 18.387160] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.387251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.387294] page dumped because: kasan: bad access detected [ 18.387672] [ 18.387843] Memory state around the buggy address: [ 18.388575] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.388630] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.389268] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.389601] ^ [ 18.389838] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.389992] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.390055] ================================================================== [ 18.432390] ================================================================== [ 18.432467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.432521] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.432573] [ 18.432603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.433000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.433054] Hardware name: linux,dummy-virt (DT) [ 18.433088] Call trace: [ 18.433460] show_stack+0x20/0x38 (C) [ 18.433531] dump_stack_lvl+0x8c/0xd0 [ 18.433760] print_report+0x118/0x5d0 [ 18.433878] kasan_report+0xdc/0x128 [ 18.434045] kasan_check_range+0x100/0x1a8 [ 18.434107] __kasan_check_write+0x20/0x30 [ 18.434297] kasan_atomics_helper+0x175c/0x4858 [ 18.434601] kasan_atomics+0x198/0x2e0 [ 18.434849] kunit_try_run_case+0x170/0x3f0 [ 18.435074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.435234] kthread+0x328/0x630 [ 18.435321] ret_from_fork+0x10/0x20 [ 18.435756] [ 18.435970] Allocated by task 265: [ 18.436031] kasan_save_stack+0x3c/0x68 [ 18.436219] kasan_save_track+0x20/0x40 [ 18.436364] kasan_save_alloc_info+0x40/0x58 [ 18.436445] __kasan_kmalloc+0xd4/0xd8 [ 18.436578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.436632] kasan_atomics+0xb8/0x2e0 [ 18.436688] kunit_try_run_case+0x170/0x3f0 [ 18.436987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.437230] kthread+0x328/0x630 [ 18.437385] ret_from_fork+0x10/0x20 [ 18.437550] [ 18.437703] The buggy address belongs to the object at fff00000c784ef80 [ 18.437703] which belongs to the cache kmalloc-64 of size 64 [ 18.438087] The buggy address is located 0 bytes to the right of [ 18.438087] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.438178] [ 18.438201] The buggy address belongs to the physical page: [ 18.438236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.438291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.438819] page_type: f5(slab) [ 18.439126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.439214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.439266] page dumped because: kasan: bad access detected [ 18.439758] [ 18.439900] Memory state around the buggy address: [ 18.440055] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.440116] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.440161] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.440381] ^ [ 18.440573] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.440777] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.440853] ================================================================== [ 18.079957] ================================================================== [ 18.080011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.080063] Write of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.080117] [ 18.080449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.080826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.080862] Hardware name: linux,dummy-virt (DT) [ 18.080896] Call trace: [ 18.081023] show_stack+0x20/0x38 (C) [ 18.081107] dump_stack_lvl+0x8c/0xd0 [ 18.081159] print_report+0x118/0x5d0 [ 18.081251] kasan_report+0xdc/0x128 [ 18.081298] kasan_check_range+0x100/0x1a8 [ 18.081497] __kasan_check_write+0x20/0x30 [ 18.081653] kasan_atomics_helper+0x99c/0x4858 [ 18.081844] kasan_atomics+0x198/0x2e0 [ 18.082067] kunit_try_run_case+0x170/0x3f0 [ 18.082238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.082349] kthread+0x328/0x630 [ 18.082403] ret_from_fork+0x10/0x20 [ 18.082818] [ 18.083011] Allocated by task 265: [ 18.083081] kasan_save_stack+0x3c/0x68 [ 18.083267] kasan_save_track+0x20/0x40 [ 18.083411] kasan_save_alloc_info+0x40/0x58 [ 18.083467] __kasan_kmalloc+0xd4/0xd8 [ 18.083764] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.084018] kasan_atomics+0xb8/0x2e0 [ 18.084302] kunit_try_run_case+0x170/0x3f0 [ 18.084726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.084884] kthread+0x328/0x630 [ 18.084980] ret_from_fork+0x10/0x20 [ 18.085041] [ 18.085458] The buggy address belongs to the object at fff00000c784ef80 [ 18.085458] which belongs to the cache kmalloc-64 of size 64 [ 18.085607] The buggy address is located 0 bytes to the right of [ 18.085607] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.085697] [ 18.085720] The buggy address belongs to the physical page: [ 18.085761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.085933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.086001] page_type: f5(slab) [ 18.086208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.086825] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.088856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 18.089845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.089900] kthread+0x328/0x630 [ 18.089943] ret_from_fork+0x10/0x20 [ 18.089990] [ 18.090012] Allocated by task 265: [ 18.090043] kasan_save_stack+0x3c/0x68 [ 18.090091] kasan_save_track+0x20/0x40 [ 18.090130] kasan_save_alloc_info+0x40/0x58 [ 18.090172] __kasan_kmalloc+0xd4/0xd8 [ 18.090210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.090251] kasan_atomics+0xb8/0x2e0 [ 18.090300] kunit_try_run_case+0x170/0x3f0 [ 18.091837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.092285] kthread+0x328/0x630 [ 18.092792] ret_from_fork+0x10/0x20 [ 18.093031] [ 18.093089] The buggy address belongs to the object at fff00000c784ef80 [ 18.093089] which belongs to the cache kmalloc-64 of size 64 [ 18.093236] The buggy address is located 0 bytes to the right of [ 18.093236] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.093427] [ 18.093504] The buggy address belongs to the physical page: [ 18.093593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.093739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.093799] page_type: f5(slab) [ 18.093840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.093897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.094166] page dumped because: kasan: bad access detected [ 18.094383] [ 18.094478] Memory state around the buggy address: [ 18.094515] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.094906] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.095048] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.095243] ^ [ 18.095341] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.095552] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.095853] ================================================================== [ 18.358144] ================================================================== [ 18.358196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.358379] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.358442] [ 18.358512] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.358921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.358975] Hardware name: linux,dummy-virt (DT) [ 18.359012] Call trace: [ 18.359036] show_stack+0x20/0x38 (C) [ 18.359090] dump_stack_lvl+0x8c/0xd0 [ 18.359304] print_report+0x118/0x5d0 [ 18.359475] kasan_report+0xdc/0x128 [ 18.359586] kasan_check_range+0x100/0x1a8 [ 18.359659] __kasan_check_write+0x20/0x30 [ 18.359727] kasan_atomics_helper+0x147c/0x4858 [ 18.359779] kasan_atomics+0x198/0x2e0 [ 18.359884] kunit_try_run_case+0x170/0x3f0 [ 18.359935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.360139] kthread+0x328/0x630 [ 18.360206] ret_from_fork+0x10/0x20 [ 18.360365] [ 18.360573] Allocated by task 265: [ 18.360796] kasan_save_stack+0x3c/0x68 [ 18.360917] kasan_save_track+0x20/0x40 [ 18.361007] kasan_save_alloc_info+0x40/0x58 [ 18.361053] __kasan_kmalloc+0xd4/0xd8 [ 18.361110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.361207] kasan_atomics+0xb8/0x2e0 [ 18.361244] kunit_try_run_case+0x170/0x3f0 [ 18.361462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.362039] kthread+0x328/0x630 [ 18.362092] ret_from_fork+0x10/0x20 [ 18.362132] [ 18.362157] The buggy address belongs to the object at fff00000c784ef80 [ 18.362157] which belongs to the cache kmalloc-64 of size 64 [ 18.362219] The buggy address is located 0 bytes to the right of [ 18.362219] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.362568] [ 18.362595] The buggy address belongs to the physical page: [ 18.362630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.362705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.362757] page_type: f5(slab) [ 18.362813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.362875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.362919] page dumped because: kasan: bad access detected [ 18.362954] [ 18.362990] Memory state around the buggy address: [ 18.363026] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.363071] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.363116] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.363157] ^ [ 18.363200] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.363253] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.363292] ================================================================== [ 18.248938] ================================================================== [ 18.248992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.249044] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.249532] [ 18.249611] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.250086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.250149] Hardware name: linux,dummy-virt (DT) [ 18.250323] Call trace: [ 18.250370] show_stack+0x20/0x38 (C) [ 18.250802] dump_stack_lvl+0x8c/0xd0 [ 18.250992] print_report+0x118/0x5d0 [ 18.251154] kasan_report+0xdc/0x128 [ 18.251216] kasan_check_range+0x100/0x1a8 [ 18.251853] __kasan_check_write+0x20/0x30 [ 18.251988] kasan_atomics_helper+0xf88/0x4858 [ 18.252256] kasan_atomics+0x198/0x2e0 [ 18.252391] kunit_try_run_case+0x170/0x3f0 [ 18.252472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.252690] kthread+0x328/0x630 [ 18.252912] ret_from_fork+0x10/0x20 [ 18.253314] [ 18.253838] Allocated by task 265: [ 18.253934] kasan_save_stack+0x3c/0x68 [ 18.253986] kasan_save_track+0x20/0x40 [ 18.254028] kasan_save_alloc_info+0x40/0x58 [ 18.254069] __kasan_kmalloc+0xd4/0xd8 [ 18.254144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.254212] kasan_atomics+0xb8/0x2e0 [ 18.254390] kunit_try_run_case+0x170/0x3f0 [ 18.254601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.254704] kthread+0x328/0x630 [ 18.254986] ret_from_fork+0x10/0x20 [ 18.255042] [ 18.255422] The buggy address belongs to the object at fff00000c784ef80 [ 18.255422] which belongs to the cache kmalloc-64 of size 64 [ 18.255639] The buggy address is located 0 bytes to the right of [ 18.255639] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.255743] [ 18.255820] The buggy address belongs to the physical page: [ 18.255981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.256039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.256128] page_type: f5(slab) [ 18.256419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.256893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.256955] page dumped because: kasan: bad access detected [ 18.257182] [ 18.257363] Memory state around the buggy address: [ 18.257637] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.257957] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.258017] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.258056] ^ [ 18.258257] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.258462] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.258850] ================================================================== [ 18.267636] ================================================================== [ 18.267695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.267754] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.267806] [ 18.267985] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.268321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.268366] Hardware name: linux,dummy-virt (DT) [ 18.268598] Call trace: [ 18.268753] show_stack+0x20/0x38 (C) [ 18.268849] dump_stack_lvl+0x8c/0xd0 [ 18.268905] print_report+0x118/0x5d0 [ 18.268960] kasan_report+0xdc/0x128 [ 18.269008] kasan_check_range+0x100/0x1a8 [ 18.269287] __kasan_check_write+0x20/0x30 [ 18.269582] kasan_atomics_helper+0x1058/0x4858 [ 18.269841] kasan_atomics+0x198/0x2e0 [ 18.269980] kunit_try_run_case+0x170/0x3f0 [ 18.270074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.270147] kthread+0x328/0x630 [ 18.270368] ret_from_fork+0x10/0x20 [ 18.270616] [ 18.270731] Allocated by task 265: [ 18.270774] kasan_save_stack+0x3c/0x68 [ 18.271017] kasan_save_track+0x20/0x40 [ 18.271082] kasan_save_alloc_info+0x40/0x58 [ 18.271338] __kasan_kmalloc+0xd4/0xd8 [ 18.271455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.271555] kasan_atomics+0xb8/0x2e0 [ 18.271689] kunit_try_run_case+0x170/0x3f0 [ 18.271785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.271833] kthread+0x328/0x630 [ 18.272032] ret_from_fork+0x10/0x20 [ 18.272172] [ 18.272374] The buggy address belongs to the object at fff00000c784ef80 [ 18.272374] which belongs to the cache kmalloc-64 of size 64 [ 18.272613] The buggy address is located 0 bytes to the right of [ 18.272613] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.272866] [ 18.272982] The buggy address belongs to the physical page: [ 18.273311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.273636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.273883] page_type: f5(slab) [ 18.273940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.274382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.274565] page dumped because: kasan: bad access detected [ 18.274608] [ 18.274631] Memory state around the buggy address: [ 18.274668] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.274716] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.274803] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.274864] ^ [ 18.274901] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.274952] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.274993] ================================================================== [ 18.424613] ================================================================== [ 18.424738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.424820] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.425045] [ 18.425082] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.425281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.425410] Hardware name: linux,dummy-virt (DT) [ 18.425512] Call trace: [ 18.425591] show_stack+0x20/0x38 (C) [ 18.425658] dump_stack_lvl+0x8c/0xd0 [ 18.425707] print_report+0x118/0x5d0 [ 18.425756] kasan_report+0xdc/0x128 [ 18.425803] __asan_report_load8_noabort+0x20/0x30 [ 18.426526] kasan_atomics_helper+0x3e10/0x4858 [ 18.426771] kasan_atomics+0x198/0x2e0 [ 18.426851] kunit_try_run_case+0x170/0x3f0 [ 18.426992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.427052] kthread+0x328/0x630 [ 18.427491] ret_from_fork+0x10/0x20 [ 18.427586] [ 18.427810] Allocated by task 265: [ 18.428166] kasan_save_stack+0x3c/0x68 [ 18.428316] kasan_save_track+0x20/0x40 [ 18.428372] kasan_save_alloc_info+0x40/0x58 [ 18.428439] __kasan_kmalloc+0xd4/0xd8 [ 18.428519] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.428759] kasan_atomics+0xb8/0x2e0 [ 18.428870] kunit_try_run_case+0x170/0x3f0 [ 18.429299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.429698] kthread+0x328/0x630 [ 18.429753] ret_from_fork+0x10/0x20 [ 18.429792] [ 18.429978] The buggy address belongs to the object at fff00000c784ef80 [ 18.429978] which belongs to the cache kmalloc-64 of size 64 [ 18.430217] The buggy address is located 0 bytes to the right of [ 18.430217] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.430535] [ 18.430562] The buggy address belongs to the physical page: [ 18.430598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.430686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.430744] page_type: f5(slab) [ 18.430797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.430857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.430911] page dumped because: kasan: bad access detected [ 18.430951] [ 18.430973] Memory state around the buggy address: [ 18.431006] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.431064] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.431109] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.431149] ^ [ 18.431187] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.431232] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.431282] ================================================================== [ 18.363704] ================================================================== [ 18.363757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.363828] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.363881] [ 18.363923] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.364241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.364305] Hardware name: linux,dummy-virt (DT) [ 18.364360] Call trace: [ 18.364385] show_stack+0x20/0x38 (C) [ 18.365139] dump_stack_lvl+0x8c/0xd0 [ 18.365549] print_report+0x118/0x5d0 [ 18.365920] kasan_report+0xdc/0x128 [ 18.366019] kasan_check_range+0x100/0x1a8 [ 18.366200] __kasan_check_write+0x20/0x30 [ 18.366518] kasan_atomics_helper+0x14e4/0x4858 [ 18.366749] kasan_atomics+0x198/0x2e0 [ 18.367096] kunit_try_run_case+0x170/0x3f0 [ 18.367175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.367377] kthread+0x328/0x630 [ 18.367511] ret_from_fork+0x10/0x20 [ 18.367607] [ 18.367630] Allocated by task 265: [ 18.367666] kasan_save_stack+0x3c/0x68 [ 18.367972] kasan_save_track+0x20/0x40 [ 18.368269] kasan_save_alloc_info+0x40/0x58 [ 18.368440] __kasan_kmalloc+0xd4/0xd8 [ 18.368634] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.368922] kasan_atomics+0xb8/0x2e0 [ 18.369456] kunit_try_run_case+0x170/0x3f0 [ 18.369541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.369617] kthread+0x328/0x630 [ 18.369770] ret_from_fork+0x10/0x20 [ 18.369853] [ 18.369880] The buggy address belongs to the object at fff00000c784ef80 [ 18.369880] which belongs to the cache kmalloc-64 of size 64 [ 18.369952] The buggy address is located 0 bytes to the right of [ 18.369952] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.370018] [ 18.370656] The buggy address belongs to the physical page: [ 18.370754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.370939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.371239] page_type: f5(slab) [ 18.371450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.371654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.371823] page dumped because: kasan: bad access detected [ 18.372237] [ 18.372480] Memory state around the buggy address: [ 18.372559] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.372609] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.372826] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.373040] ^ [ 18.373260] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.373347] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.373484] ================================================================== [ 18.295604] ================================================================== [ 18.296021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.296207] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.296423] [ 18.296469] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.296557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.296998] Hardware name: linux,dummy-virt (DT) [ 18.297077] Call trace: [ 18.297128] show_stack+0x20/0x38 (C) [ 18.297194] dump_stack_lvl+0x8c/0xd0 [ 18.297303] print_report+0x118/0x5d0 [ 18.297447] kasan_report+0xdc/0x128 [ 18.297614] kasan_check_range+0x100/0x1a8 [ 18.297678] __kasan_check_write+0x20/0x30 [ 18.297888] kasan_atomics_helper+0x1190/0x4858 [ 18.298055] kasan_atomics+0x198/0x2e0 [ 18.298355] kunit_try_run_case+0x170/0x3f0 [ 18.298609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.298766] kthread+0x328/0x630 [ 18.298819] ret_from_fork+0x10/0x20 [ 18.299093] [ 18.299130] Allocated by task 265: [ 18.299291] kasan_save_stack+0x3c/0x68 [ 18.299457] kasan_save_track+0x20/0x40 [ 18.299500] kasan_save_alloc_info+0x40/0x58 [ 18.299560] __kasan_kmalloc+0xd4/0xd8 [ 18.299598] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.299656] kasan_atomics+0xb8/0x2e0 [ 18.299705] kunit_try_run_case+0x170/0x3f0 [ 18.299754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.299798] kthread+0x328/0x630 [ 18.299841] ret_from_fork+0x10/0x20 [ 18.299880] [ 18.299902] The buggy address belongs to the object at fff00000c784ef80 [ 18.299902] which belongs to the cache kmalloc-64 of size 64 [ 18.299974] The buggy address is located 0 bytes to the right of [ 18.299974] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.300049] [ 18.300081] The buggy address belongs to the physical page: [ 18.300119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.300188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.300237] page_type: f5(slab) [ 18.300278] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.300352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.300398] page dumped because: kasan: bad access detected [ 18.300448] [ 18.300477] Memory state around the buggy address: [ 18.300520] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300574] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300620] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.300662] ^ [ 18.300695] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.300740] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.300779] ================================================================== [ 18.286898] ================================================================== [ 18.287211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.287286] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.287373] [ 18.287406] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.287489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.287739] Hardware name: linux,dummy-virt (DT) [ 18.287790] Call trace: [ 18.287823] show_stack+0x20/0x38 (C) [ 18.287920] dump_stack_lvl+0x8c/0xd0 [ 18.287970] print_report+0x118/0x5d0 [ 18.288413] kasan_report+0xdc/0x128 [ 18.288490] kasan_check_range+0x100/0x1a8 [ 18.288541] __kasan_check_write+0x20/0x30 [ 18.288751] kasan_atomics_helper+0x1128/0x4858 [ 18.288951] kasan_atomics+0x198/0x2e0 [ 18.289017] kunit_try_run_case+0x170/0x3f0 [ 18.289069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.289131] kthread+0x328/0x630 [ 18.289174] ret_from_fork+0x10/0x20 [ 18.289224] [ 18.289245] Allocated by task 265: [ 18.289451] kasan_save_stack+0x3c/0x68 [ 18.289757] kasan_save_track+0x20/0x40 [ 18.289844] kasan_save_alloc_info+0x40/0x58 [ 18.289991] __kasan_kmalloc+0xd4/0xd8 [ 18.290068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.290229] kasan_atomics+0xb8/0x2e0 [ 18.290424] kunit_try_run_case+0x170/0x3f0 [ 18.290507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.290883] kthread+0x328/0x630 [ 18.291080] ret_from_fork+0x10/0x20 [ 18.291177] [ 18.291277] The buggy address belongs to the object at fff00000c784ef80 [ 18.291277] which belongs to the cache kmalloc-64 of size 64 [ 18.291465] The buggy address is located 0 bytes to the right of [ 18.291465] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.291540] [ 18.291562] The buggy address belongs to the physical page: [ 18.291756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.291882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.292158] page_type: f5(slab) [ 18.292424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.292690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.293124] page dumped because: kasan: bad access detected [ 18.293337] [ 18.293379] Memory state around the buggy address: [ 18.293700] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293805] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293919] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.294131] ^ [ 18.294191] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.294263] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.294316] ================================================================== [ 18.350039] ================================================================== [ 18.350092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.350354] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.350445] [ 18.350671] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.350761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.350906] Hardware name: linux,dummy-virt (DT) [ 18.350952] Call trace: [ 18.350979] show_stack+0x20/0x38 (C) [ 18.351032] dump_stack_lvl+0x8c/0xd0 [ 18.351401] print_report+0x118/0x5d0 [ 18.351522] kasan_report+0xdc/0x128 [ 18.351577] kasan_check_range+0x100/0x1a8 [ 18.351629] __kasan_check_write+0x20/0x30 [ 18.351711] kasan_atomics_helper+0x1414/0x4858 [ 18.351765] kasan_atomics+0x198/0x2e0 [ 18.351813] kunit_try_run_case+0x170/0x3f0 [ 18.352150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.352223] kthread+0x328/0x630 [ 18.352408] ret_from_fork+0x10/0x20 [ 18.352602] [ 18.352655] Allocated by task 265: [ 18.352690] kasan_save_stack+0x3c/0x68 [ 18.352735] kasan_save_track+0x20/0x40 [ 18.352811] kasan_save_alloc_info+0x40/0x58 [ 18.352857] __kasan_kmalloc+0xd4/0xd8 [ 18.352941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.353287] kasan_atomics+0xb8/0x2e0 [ 18.353560] kunit_try_run_case+0x170/0x3f0 [ 18.353641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.353704] kthread+0x328/0x630 [ 18.353742] ret_from_fork+0x10/0x20 [ 18.353781] [ 18.354214] The buggy address belongs to the object at fff00000c784ef80 [ 18.354214] which belongs to the cache kmalloc-64 of size 64 [ 18.354447] The buggy address is located 0 bytes to the right of [ 18.354447] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.354524] [ 18.354795] The buggy address belongs to the physical page: [ 18.354992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.355364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.355443] page_type: f5(slab) [ 18.355637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.355855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.356074] page dumped because: kasan: bad access detected [ 18.356210] [ 18.356394] Memory state around the buggy address: [ 18.356559] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.356644] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.356891] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.356954] ^ [ 18.357169] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.357222] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.357263] ================================================================== [ 18.390792] ================================================================== [ 18.390868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.390923] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.390976] [ 18.391139] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.391274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.391501] Hardware name: linux,dummy-virt (DT) [ 18.391548] Call trace: [ 18.391573] show_stack+0x20/0x38 (C) [ 18.391655] dump_stack_lvl+0x8c/0xd0 [ 18.391909] print_report+0x118/0x5d0 [ 18.392074] kasan_report+0xdc/0x128 [ 18.392252] __asan_report_load8_noabort+0x20/0x30 [ 18.392469] kasan_atomics_helper+0x3db0/0x4858 [ 18.392589] kasan_atomics+0x198/0x2e0 [ 18.392643] kunit_try_run_case+0x170/0x3f0 [ 18.392750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.392815] kthread+0x328/0x630 [ 18.393052] ret_from_fork+0x10/0x20 [ 18.393122] [ 18.393290] Allocated by task 265: [ 18.393353] kasan_save_stack+0x3c/0x68 [ 18.393529] kasan_save_track+0x20/0x40 [ 18.393746] kasan_save_alloc_info+0x40/0x58 [ 18.393817] __kasan_kmalloc+0xd4/0xd8 [ 18.393979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.394067] kasan_atomics+0xb8/0x2e0 [ 18.394394] kunit_try_run_case+0x170/0x3f0 [ 18.394470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.394610] kthread+0x328/0x630 [ 18.394688] ret_from_fork+0x10/0x20 [ 18.395237] [ 18.395287] The buggy address belongs to the object at fff00000c784ef80 [ 18.395287] which belongs to the cache kmalloc-64 of size 64 [ 18.395499] The buggy address is located 0 bytes to the right of [ 18.395499] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.395582] [ 18.395604] The buggy address belongs to the physical page: [ 18.395678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.395894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.396274] page_type: f5(slab) [ 18.396368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.396522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.396744] page dumped because: kasan: bad access detected [ 18.396938] [ 18.396988] Memory state around the buggy address: [ 18.397201] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.397408] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.397765] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.397993] ^ [ 18.398066] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.398302] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.398389] ================================================================== [ 18.099684] ================================================================== [ 18.100107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.100179] Write of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.100241] [ 18.100274] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.100372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.100629] Hardware name: linux,dummy-virt (DT) [ 18.101067] Call trace: [ 18.101127] show_stack+0x20/0x38 (C) [ 18.101293] dump_stack_lvl+0x8c/0xd0 [ 18.101361] print_report+0x118/0x5d0 [ 18.101474] kasan_report+0xdc/0x128 [ 18.101564] kasan_check_range+0x100/0x1a8 [ 18.101623] __kasan_check_write+0x20/0x30 [ 18.101670] kasan_atomics_helper+0xa6c/0x4858 [ 18.102003] kasan_atomics+0x198/0x2e0 [ 18.102146] kunit_try_run_case+0x170/0x3f0 [ 18.102381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.102647] kthread+0x328/0x630 [ 18.102732] ret_from_fork+0x10/0x20 [ 18.102787] [ 18.102808] Allocated by task 265: [ 18.102839] kasan_save_stack+0x3c/0x68 [ 18.102883] kasan_save_track+0x20/0x40 [ 18.103293] kasan_save_alloc_info+0x40/0x58 [ 18.103702] __kasan_kmalloc+0xd4/0xd8 [ 18.103914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.104024] kasan_atomics+0xb8/0x2e0 [ 18.104234] kunit_try_run_case+0x170/0x3f0 [ 18.104480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.104631] kthread+0x328/0x630 [ 18.104693] ret_from_fork+0x10/0x20 [ 18.105021] [ 18.105179] The buggy address belongs to the object at fff00000c784ef80 [ 18.105179] which belongs to the cache kmalloc-64 of size 64 [ 18.105713] The buggy address is located 0 bytes to the right of [ 18.105713] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.105895] [ 18.105919] The buggy address belongs to the physical page: [ 18.106198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.106451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.106598] page_type: f5(slab) [ 18.106640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.106962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.107027] page dumped because: kasan: bad access detected [ 18.107063] [ 18.107083] Memory state around the buggy address: [ 18.107170] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.107244] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.107290] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.107341] ^ [ 18.107377] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.107422] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.109136] [ 18.110277] Call trace: [ 18.112812] kthread+0x328/0x630 [ 18.113612] kasan_save_track+0x20/0x40 [ 18.113774] kasan_save_alloc_info+0x40/0x58 [ 18.113910] __kasan_kmalloc+0xd4/0xd8 [ 18.113971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.114402] kasan_atomics+0xb8/0x2e0 [ 18.114475] kunit_try_run_case+0x170/0x3f0 [ 18.114537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.114584] kthread+0x328/0x630 [ 18.114620] ret_from_fork+0x10/0x20 [ 18.114659] [ 18.114692] The buggy address belongs to the object at fff00000c784ef80 [ 18.114692] which belongs to the cache kmalloc-64 of size 64 [ 18.114752] The buggy address is located 0 bytes to the right of [ 18.114752] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.114821] [ 18.114861] The buggy address belongs to the physical page: [ 18.114910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.114963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.115169] page dumped because: kasan: bad access detected [ 18.115639] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.118801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 18.120505] kunit_try_run_case+0x170/0x3f0 [ 18.121450] kasan_save_alloc_info+0x40/0x58 [ 18.121547] __kasan_kmalloc+0xd4/0xd8 [ 18.122415] kthread+0x328/0x630 [ 18.123225] [ 18.123413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.124253] [ 18.125590] ^ [ 18.128089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.128524] print_report+0x118/0x5d0 [ 18.129263] __kasan_kmalloc+0xd4/0xd8 [ 18.129302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.129849] kunit_try_run_case+0x170/0x3f0 [ 18.131260] [ 18.131644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.132973] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.133719] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.136506] Hardware name: linux,dummy-virt (DT) [ 18.138051] kunit_try_run_case+0x170/0x3f0 [ 18.139706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.140017] [ 18.140107] The buggy address is located 0 bytes to the right of [ 18.140107] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.140618] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.142241] [ 18.144075] kasan_atomics_helper+0xc08/0x4858 [ 18.145592] kasan_save_alloc_info+0x40/0x58 [ 18.146100] kasan_atomics+0xb8/0x2e0 [ 18.146410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.147079] The buggy address is located 0 bytes to the right of [ 18.147079] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.148852] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.149097] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.151435] [ 18.151826] Call trace: [ 18.152494] kasan_atomics+0x198/0x2e0 [ 18.154650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.155496] kthread+0x328/0x630 [ 18.155745] [ 18.155978] The buggy address is located 0 bytes to the right of [ 18.155978] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.158361] Memory state around the buggy address: [ 18.158714] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.160362] ================================================================== [ 18.442139] ================================================================== [ 18.442801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.442887] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.443018] [ 18.443075] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.443167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.443244] Hardware name: linux,dummy-virt (DT) [ 18.443289] Call trace: [ 18.443315] show_stack+0x20/0x38 (C) [ 18.443379] dump_stack_lvl+0x8c/0xd0 [ 18.443615] print_report+0x118/0x5d0 [ 18.443699] kasan_report+0xdc/0x128 [ 18.443851] __asan_report_load8_noabort+0x20/0x30 [ 18.444288] kasan_atomics_helper+0x3e20/0x4858 [ 18.444375] kasan_atomics+0x198/0x2e0 [ 18.444428] kunit_try_run_case+0x170/0x3f0 [ 18.444660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.444916] kthread+0x328/0x630 [ 18.445007] ret_from_fork+0x10/0x20 [ 18.445059] [ 18.445097] Allocated by task 265: [ 18.445128] kasan_save_stack+0x3c/0x68 [ 18.445381] kasan_save_track+0x20/0x40 [ 18.445526] kasan_save_alloc_info+0x40/0x58 [ 18.445614] __kasan_kmalloc+0xd4/0xd8 [ 18.445681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.445725] kasan_atomics+0xb8/0x2e0 [ 18.445762] kunit_try_run_case+0x170/0x3f0 [ 18.445803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.445858] kthread+0x328/0x630 [ 18.445909] ret_from_fork+0x10/0x20 [ 18.445947] [ 18.445969] The buggy address belongs to the object at fff00000c784ef80 [ 18.445969] which belongs to the cache kmalloc-64 of size 64 [ 18.446469] The buggy address is located 0 bytes to the right of [ 18.446469] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.447013] [ 18.447427] The buggy address belongs to the physical page: [ 18.447500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.447597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.447663] page_type: f5(slab) [ 18.447705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.448164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.448239] page dumped because: kasan: bad access detected [ 18.448583] [ 18.448802] Memory state around the buggy address: [ 18.448855] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.448906] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.449261] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.449711] ^ [ 18.449764] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.449813] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.449860] ================================================================== [ 18.215528] ================================================================== [ 18.215716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.215781] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265 [ 18.216160] [ 18.216202] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.216289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.216338] Hardware name: linux,dummy-virt (DT) [ 18.216373] Call trace: [ 18.216398] show_stack+0x20/0x38 (C) [ 18.216451] dump_stack_lvl+0x8c/0xd0 [ 18.216498] print_report+0x118/0x5d0 [ 18.216559] kasan_report+0xdc/0x128 [ 18.216607] kasan_check_range+0x100/0x1a8 [ 18.216658] __kasan_check_write+0x20/0x30 [ 18.216703] kasan_atomics_helper+0xe44/0x4858 [ 18.216753] kasan_atomics+0x198/0x2e0 [ 18.216799] kunit_try_run_case+0x170/0x3f0 [ 18.216850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.216903] kthread+0x328/0x630 [ 18.216962] ret_from_fork+0x10/0x20 [ 18.217013] [ 18.217043] Allocated by task 265: [ 18.217074] kasan_save_stack+0x3c/0x68 [ 18.217119] kasan_save_track+0x20/0x40 [ 18.217163] kasan_save_alloc_info+0x40/0x58 [ 18.217205] __kasan_kmalloc+0xd4/0xd8 [ 18.217244] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.217305] kasan_atomics+0xb8/0x2e0 [ 18.218307] kunit_try_run_case+0x170/0x3f0 [ 18.218401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.218473] kthread+0x328/0x630 [ 18.218526] ret_from_fork+0x10/0x20 [ 18.218605] [ 18.218871] The buggy address belongs to the object at fff00000c784ef80 [ 18.218871] which belongs to the cache kmalloc-64 of size 64 [ 18.219032] The buggy address is located 0 bytes to the right of [ 18.219032] allocated 48-byte region [fff00000c784ef80, fff00000c784efb0) [ 18.219129] [ 18.219582] The buggy address belongs to the physical page: [ 18.220082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e [ 18.220339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.220539] page_type: f5(slab) [ 18.220626] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.220916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.220994] page dumped because: kasan: bad access detected [ 18.221421] [ 18.221479] Memory state around the buggy address: [ 18.221671] fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.221735] fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.221919] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.222040] ^ [ 18.222399] fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.222458] fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.222649] ==================================================================
[ 14.687334] ================================================================== [ 14.687836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.688267] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.688502] [ 14.688624] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.688668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.688680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.688700] Call Trace: [ 14.688790] <TASK> [ 14.688818] dump_stack_lvl+0x73/0xb0 [ 14.688847] print_report+0xd1/0x610 [ 14.688869] ? __virt_addr_valid+0x1db/0x2d0 [ 14.688892] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.688914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.688938] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.688967] kasan_report+0x141/0x180 [ 14.688989] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.689015] __asan_report_load4_noabort+0x18/0x20 [ 14.689039] kasan_atomics_helper+0x4b88/0x5450 [ 14.689139] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.689177] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.689200] ? trace_hardirqs_on+0x37/0xe0 [ 14.689223] ? kasan_atomics+0x152/0x310 [ 14.689249] kasan_atomics+0x1dc/0x310 [ 14.689272] ? __pfx_kasan_atomics+0x10/0x10 [ 14.689294] ? __pfx_kasan_atomics+0x10/0x10 [ 14.689331] kunit_try_run_case+0x1a5/0x480 [ 14.689354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.689401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.689424] ? __kthread_parkme+0x82/0x180 [ 14.689443] ? preempt_count_sub+0x50/0x80 [ 14.689467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.689524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.689581] kthread+0x337/0x6f0 [ 14.689601] ? trace_preempt_on+0x20/0xc0 [ 14.689622] ? __pfx_kthread+0x10/0x10 [ 14.689679] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.689700] ? calculate_sigpending+0x7b/0xa0 [ 14.689735] ? __pfx_kthread+0x10/0x10 [ 14.689755] ret_from_fork+0x116/0x1d0 [ 14.689774] ? __pfx_kthread+0x10/0x10 [ 14.689794] ret_from_fork_asm+0x1a/0x30 [ 14.689824] </TASK> [ 14.689834] [ 14.698998] Allocated by task 284: [ 14.699444] kasan_save_stack+0x45/0x70 [ 14.699785] kasan_save_track+0x18/0x40 [ 14.700005] kasan_save_alloc_info+0x3b/0x50 [ 14.700337] __kasan_kmalloc+0xb7/0xc0 [ 14.700475] __kmalloc_cache_noprof+0x189/0x420 [ 14.700732] kasan_atomics+0x95/0x310 [ 14.700982] kunit_try_run_case+0x1a5/0x480 [ 14.701197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.701411] kthread+0x337/0x6f0 [ 14.701535] ret_from_fork+0x116/0x1d0 [ 14.701838] ret_from_fork_asm+0x1a/0x30 [ 14.702103] [ 14.702253] The buggy address belongs to the object at ffff888103a28200 [ 14.702253] which belongs to the cache kmalloc-64 of size 64 [ 14.702771] The buggy address is located 0 bytes to the right of [ 14.702771] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.703528] [ 14.703628] The buggy address belongs to the physical page: [ 14.703880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.704195] flags: 0x200000000000000(node=0|zone=2) [ 14.704708] page_type: f5(slab) [ 14.704933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.705350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.705800] page dumped because: kasan: bad access detected [ 14.706010] [ 14.706132] Memory state around the buggy address: [ 14.706426] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.706829] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.707106] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.707605] ^ [ 14.707833] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.708232] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.708786] ================================================================== [ 14.859704] ================================================================== [ 14.860042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.860418] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.860907] [ 14.861092] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.861139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.861152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.861174] Call Trace: [ 14.861191] <TASK> [ 14.861219] dump_stack_lvl+0x73/0xb0 [ 14.861248] print_report+0xd1/0x610 [ 14.861272] ? __virt_addr_valid+0x1db/0x2d0 [ 14.861318] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.861349] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.861373] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.861396] kasan_report+0x141/0x180 [ 14.861429] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.861457] kasan_check_range+0x10c/0x1c0 [ 14.861481] __kasan_check_write+0x18/0x20 [ 14.861514] kasan_atomics_helper+0x5fe/0x5450 [ 14.861537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.861560] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.861585] ? trace_hardirqs_on+0x37/0xe0 [ 14.861608] ? kasan_atomics+0x152/0x310 [ 14.861636] kasan_atomics+0x1dc/0x310 [ 14.861660] ? __pfx_kasan_atomics+0x10/0x10 [ 14.861684] ? __pfx_kasan_atomics+0x10/0x10 [ 14.861711] kunit_try_run_case+0x1a5/0x480 [ 14.861736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.861759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.861784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.861809] ? __kthread_parkme+0x82/0x180 [ 14.861829] ? preempt_count_sub+0x50/0x80 [ 14.861853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.861878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.861902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.861927] kthread+0x337/0x6f0 [ 14.861946] ? trace_preempt_on+0x20/0xc0 [ 14.861970] ? __pfx_kthread+0x10/0x10 [ 14.861990] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.862012] ? calculate_sigpending+0x7b/0xa0 [ 14.862036] ? __pfx_kthread+0x10/0x10 [ 14.862058] ret_from_fork+0x116/0x1d0 [ 14.862078] ? __pfx_kthread+0x10/0x10 [ 14.862108] ret_from_fork_asm+0x1a/0x30 [ 14.862153] </TASK> [ 14.862165] [ 14.870879] Allocated by task 284: [ 14.871266] kasan_save_stack+0x45/0x70 [ 14.871567] kasan_save_track+0x18/0x40 [ 14.871765] kasan_save_alloc_info+0x3b/0x50 [ 14.871978] __kasan_kmalloc+0xb7/0xc0 [ 14.872355] __kmalloc_cache_noprof+0x189/0x420 [ 14.872521] kasan_atomics+0x95/0x310 [ 14.872657] kunit_try_run_case+0x1a5/0x480 [ 14.872834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.873158] kthread+0x337/0x6f0 [ 14.873357] ret_from_fork+0x116/0x1d0 [ 14.873625] ret_from_fork_asm+0x1a/0x30 [ 14.873820] [ 14.873918] The buggy address belongs to the object at ffff888103a28200 [ 14.873918] which belongs to the cache kmalloc-64 of size 64 [ 14.874457] The buggy address is located 0 bytes to the right of [ 14.874457] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.875008] [ 14.875117] The buggy address belongs to the physical page: [ 14.875513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.875863] flags: 0x200000000000000(node=0|zone=2) [ 14.876233] page_type: f5(slab) [ 14.876425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.876804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.877144] page dumped because: kasan: bad access detected [ 14.877437] [ 14.877592] Memory state around the buggy address: [ 14.877797] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.878224] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.878642] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.878865] ^ [ 14.879024] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.879322] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.879635] ================================================================== [ 14.880068] ================================================================== [ 14.880738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.880981] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.881411] [ 14.881580] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.881624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.881636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.881657] Call Trace: [ 14.881673] <TASK> [ 14.881688] dump_stack_lvl+0x73/0xb0 [ 14.881717] print_report+0xd1/0x610 [ 14.881738] ? __virt_addr_valid+0x1db/0x2d0 [ 14.881760] ? kasan_atomics_helper+0x697/0x5450 [ 14.881782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.881806] ? kasan_atomics_helper+0x697/0x5450 [ 14.881828] kasan_report+0x141/0x180 [ 14.881851] ? kasan_atomics_helper+0x697/0x5450 [ 14.881878] kasan_check_range+0x10c/0x1c0 [ 14.881902] __kasan_check_write+0x18/0x20 [ 14.881934] kasan_atomics_helper+0x697/0x5450 [ 14.881958] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.881980] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.882016] ? trace_hardirqs_on+0x37/0xe0 [ 14.882039] ? kasan_atomics+0x152/0x310 [ 14.882066] kasan_atomics+0x1dc/0x310 [ 14.882089] ? __pfx_kasan_atomics+0x10/0x10 [ 14.882113] ? __pfx_kasan_atomics+0x10/0x10 [ 14.882230] kunit_try_run_case+0x1a5/0x480 [ 14.882256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.882322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.882346] ? __kthread_parkme+0x82/0x180 [ 14.882376] ? preempt_count_sub+0x50/0x80 [ 14.882402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.882476] kthread+0x337/0x6f0 [ 14.882506] ? trace_preempt_on+0x20/0xc0 [ 14.882528] ? __pfx_kthread+0x10/0x10 [ 14.882549] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.882581] ? calculate_sigpending+0x7b/0xa0 [ 14.882605] ? __pfx_kthread+0x10/0x10 [ 14.882626] ret_from_fork+0x116/0x1d0 [ 14.882646] ? __pfx_kthread+0x10/0x10 [ 14.882667] ret_from_fork_asm+0x1a/0x30 [ 14.882698] </TASK> [ 14.882707] [ 14.891096] Allocated by task 284: [ 14.891376] kasan_save_stack+0x45/0x70 [ 14.891681] kasan_save_track+0x18/0x40 [ 14.891857] kasan_save_alloc_info+0x3b/0x50 [ 14.892117] __kasan_kmalloc+0xb7/0xc0 [ 14.892287] __kmalloc_cache_noprof+0x189/0x420 [ 14.892710] kasan_atomics+0x95/0x310 [ 14.892919] kunit_try_run_case+0x1a5/0x480 [ 14.893155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.893477] kthread+0x337/0x6f0 [ 14.893641] ret_from_fork+0x116/0x1d0 [ 14.893776] ret_from_fork_asm+0x1a/0x30 [ 14.893999] [ 14.894170] The buggy address belongs to the object at ffff888103a28200 [ 14.894170] which belongs to the cache kmalloc-64 of size 64 [ 14.894755] The buggy address is located 0 bytes to the right of [ 14.894755] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.895405] [ 14.895528] The buggy address belongs to the physical page: [ 14.895737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.895983] flags: 0x200000000000000(node=0|zone=2) [ 14.896215] page_type: f5(slab) [ 14.896479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.897283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.897674] page dumped because: kasan: bad access detected [ 14.897952] [ 14.898131] Memory state around the buggy address: [ 14.898375] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.898770] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.899063] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.899432] ^ [ 14.899707] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.899928] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.900248] ================================================================== [ 14.900824] ================================================================== [ 14.901339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.901675] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.901968] [ 14.902190] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.902235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.902246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.902287] Call Trace: [ 14.902301] <TASK> [ 14.902333] dump_stack_lvl+0x73/0xb0 [ 14.902361] print_report+0xd1/0x610 [ 14.902383] ? __virt_addr_valid+0x1db/0x2d0 [ 14.902406] ? kasan_atomics_helper+0x72f/0x5450 [ 14.902428] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.902452] ? kasan_atomics_helper+0x72f/0x5450 [ 14.902475] kasan_report+0x141/0x180 [ 14.902498] ? kasan_atomics_helper+0x72f/0x5450 [ 14.902525] kasan_check_range+0x10c/0x1c0 [ 14.902559] __kasan_check_write+0x18/0x20 [ 14.902579] kasan_atomics_helper+0x72f/0x5450 [ 14.902602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.902635] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.902660] ? trace_hardirqs_on+0x37/0xe0 [ 14.902682] ? kasan_atomics+0x152/0x310 [ 14.902718] kasan_atomics+0x1dc/0x310 [ 14.902742] ? __pfx_kasan_atomics+0x10/0x10 [ 14.902766] ? __pfx_kasan_atomics+0x10/0x10 [ 14.902804] kunit_try_run_case+0x1a5/0x480 [ 14.902828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.902851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.902875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.902898] ? __kthread_parkme+0x82/0x180 [ 14.902919] ? preempt_count_sub+0x50/0x80 [ 14.902943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.902967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.902991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.903095] kthread+0x337/0x6f0 [ 14.903117] ? trace_preempt_on+0x20/0xc0 [ 14.903141] ? __pfx_kthread+0x10/0x10 [ 14.903162] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.903184] ? calculate_sigpending+0x7b/0xa0 [ 14.903208] ? __pfx_kthread+0x10/0x10 [ 14.903230] ret_from_fork+0x116/0x1d0 [ 14.903249] ? __pfx_kthread+0x10/0x10 [ 14.903270] ret_from_fork_asm+0x1a/0x30 [ 14.903301] </TASK> [ 14.903370] [ 14.913330] Allocated by task 284: [ 14.914045] kasan_save_stack+0x45/0x70 [ 14.914253] kasan_save_track+0x18/0x40 [ 14.914709] kasan_save_alloc_info+0x3b/0x50 [ 14.914961] __kasan_kmalloc+0xb7/0xc0 [ 14.915220] __kmalloc_cache_noprof+0x189/0x420 [ 14.915461] kasan_atomics+0x95/0x310 [ 14.915691] kunit_try_run_case+0x1a5/0x480 [ 14.915934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.916333] kthread+0x337/0x6f0 [ 14.916602] ret_from_fork+0x116/0x1d0 [ 14.916786] ret_from_fork_asm+0x1a/0x30 [ 14.917108] [ 14.917212] The buggy address belongs to the object at ffff888103a28200 [ 14.917212] which belongs to the cache kmalloc-64 of size 64 [ 14.917830] The buggy address is located 0 bytes to the right of [ 14.917830] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.919046] [ 14.919141] The buggy address belongs to the physical page: [ 14.919618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.919949] flags: 0x200000000000000(node=0|zone=2) [ 14.920344] page_type: f5(slab) [ 14.920634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.921031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.921454] page dumped because: kasan: bad access detected [ 14.921758] [ 14.921845] Memory state around the buggy address: [ 14.922320] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.922693] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.922911] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.923464] ^ [ 14.923720] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.924113] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.924522] ================================================================== [ 15.208803] ================================================================== [ 15.209265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.209918] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.210428] [ 15.210690] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.210739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.210766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.210788] Call Trace: [ 15.210804] <TASK> [ 15.210820] dump_stack_lvl+0x73/0xb0 [ 15.210848] print_report+0xd1/0x610 [ 15.210871] ? __virt_addr_valid+0x1db/0x2d0 [ 15.210893] ? kasan_atomics_helper+0xe78/0x5450 [ 15.210916] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.210939] ? kasan_atomics_helper+0xe78/0x5450 [ 15.210962] kasan_report+0x141/0x180 [ 15.210984] ? kasan_atomics_helper+0xe78/0x5450 [ 15.211010] kasan_check_range+0x10c/0x1c0 [ 15.211034] __kasan_check_write+0x18/0x20 [ 15.211054] kasan_atomics_helper+0xe78/0x5450 [ 15.211077] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.211100] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.211124] ? trace_hardirqs_on+0x37/0xe0 [ 15.211147] ? kasan_atomics+0x152/0x310 [ 15.211174] kasan_atomics+0x1dc/0x310 [ 15.211197] ? __pfx_kasan_atomics+0x10/0x10 [ 15.211220] ? __pfx_kasan_atomics+0x10/0x10 [ 15.211247] kunit_try_run_case+0x1a5/0x480 [ 15.211271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.211295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.211331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.211356] ? __kthread_parkme+0x82/0x180 [ 15.211376] ? preempt_count_sub+0x50/0x80 [ 15.211401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.211425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.211450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.211475] kthread+0x337/0x6f0 [ 15.211678] ? trace_preempt_on+0x20/0xc0 [ 15.211704] ? __pfx_kthread+0x10/0x10 [ 15.211726] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.211748] ? calculate_sigpending+0x7b/0xa0 [ 15.211775] ? __pfx_kthread+0x10/0x10 [ 15.211796] ret_from_fork+0x116/0x1d0 [ 15.211815] ? __pfx_kthread+0x10/0x10 [ 15.211836] ret_from_fork_asm+0x1a/0x30 [ 15.211867] </TASK> [ 15.211878] [ 15.221686] Allocated by task 284: [ 15.222062] kasan_save_stack+0x45/0x70 [ 15.222338] kasan_save_track+0x18/0x40 [ 15.222491] kasan_save_alloc_info+0x3b/0x50 [ 15.222923] __kasan_kmalloc+0xb7/0xc0 [ 15.223177] __kmalloc_cache_noprof+0x189/0x420 [ 15.223361] kasan_atomics+0x95/0x310 [ 15.223758] kunit_try_run_case+0x1a5/0x480 [ 15.223952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224203] kthread+0x337/0x6f0 [ 15.224508] ret_from_fork+0x116/0x1d0 [ 15.224682] ret_from_fork_asm+0x1a/0x30 [ 15.224871] [ 15.224950] The buggy address belongs to the object at ffff888103a28200 [ 15.224950] which belongs to the cache kmalloc-64 of size 64 [ 15.225445] The buggy address is located 0 bytes to the right of [ 15.225445] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.226251] [ 15.226440] The buggy address belongs to the physical page: [ 15.226692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.227129] flags: 0x200000000000000(node=0|zone=2) [ 15.227436] page_type: f5(slab) [ 15.227572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.228006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.228404] page dumped because: kasan: bad access detected [ 15.228644] [ 15.228744] Memory state around the buggy address: [ 15.229152] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.229437] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.229855] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.230166] ^ [ 15.230389] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.230842] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.231221] ================================================================== [ 15.647927] ================================================================== [ 15.648298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.648675] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.649011] [ 15.649120] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.649164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.649177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.649198] Call Trace: [ 15.649213] <TASK> [ 15.649228] dump_stack_lvl+0x73/0xb0 [ 15.649256] print_report+0xd1/0x610 [ 15.649278] ? __virt_addr_valid+0x1db/0x2d0 [ 15.649301] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.649336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.649360] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.649383] kasan_report+0x141/0x180 [ 15.649406] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.649433] kasan_check_range+0x10c/0x1c0 [ 15.649458] __kasan_check_write+0x18/0x20 [ 15.649499] kasan_atomics_helper+0x16e7/0x5450 [ 15.649524] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.649547] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.649573] ? trace_hardirqs_on+0x37/0xe0 [ 15.649597] ? kasan_atomics+0x152/0x310 [ 15.649625] kasan_atomics+0x1dc/0x310 [ 15.649648] ? __pfx_kasan_atomics+0x10/0x10 [ 15.649673] ? __pfx_kasan_atomics+0x10/0x10 [ 15.649701] kunit_try_run_case+0x1a5/0x480 [ 15.649726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.649750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.649774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.649799] ? __kthread_parkme+0x82/0x180 [ 15.649820] ? preempt_count_sub+0x50/0x80 [ 15.649846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.649871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.649897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.649923] kthread+0x337/0x6f0 [ 15.649944] ? trace_preempt_on+0x20/0xc0 [ 15.649967] ? __pfx_kthread+0x10/0x10 [ 15.649988] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.650011] ? calculate_sigpending+0x7b/0xa0 [ 15.650035] ? __pfx_kthread+0x10/0x10 [ 15.650058] ret_from_fork+0x116/0x1d0 [ 15.650077] ? __pfx_kthread+0x10/0x10 [ 15.650098] ret_from_fork_asm+0x1a/0x30 [ 15.650129] </TASK> [ 15.650140] [ 15.657507] Allocated by task 284: [ 15.657687] kasan_save_stack+0x45/0x70 [ 15.657886] kasan_save_track+0x18/0x40 [ 15.658078] kasan_save_alloc_info+0x3b/0x50 [ 15.658294] __kasan_kmalloc+0xb7/0xc0 [ 15.658456] __kmalloc_cache_noprof+0x189/0x420 [ 15.658632] kasan_atomics+0x95/0x310 [ 15.658768] kunit_try_run_case+0x1a5/0x480 [ 15.658916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.659093] kthread+0x337/0x6f0 [ 15.659214] ret_from_fork+0x116/0x1d0 [ 15.659373] ret_from_fork_asm+0x1a/0x30 [ 15.659595] [ 15.659690] The buggy address belongs to the object at ffff888103a28200 [ 15.659690] which belongs to the cache kmalloc-64 of size 64 [ 15.660206] The buggy address is located 0 bytes to the right of [ 15.660206] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.660786] [ 15.660881] The buggy address belongs to the physical page: [ 15.661136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.661517] flags: 0x200000000000000(node=0|zone=2) [ 15.661753] page_type: f5(slab) [ 15.661920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.662227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.662541] page dumped because: kasan: bad access detected [ 15.662752] [ 15.662822] Memory state around the buggy address: [ 15.662978] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.663197] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.663471] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.663807] ^ [ 15.664032] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.664371] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.664717] ================================================================== [ 15.682407] ================================================================== [ 15.682783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.683144] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.683461] [ 15.683583] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.683627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.683639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.683659] Call Trace: [ 15.683675] <TASK> [ 15.683689] dump_stack_lvl+0x73/0xb0 [ 15.683717] print_report+0xd1/0x610 [ 15.683740] ? __virt_addr_valid+0x1db/0x2d0 [ 15.683762] ? kasan_atomics_helper+0x1818/0x5450 [ 15.683784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.683807] ? kasan_atomics_helper+0x1818/0x5450 [ 15.683830] kasan_report+0x141/0x180 [ 15.683853] ? kasan_atomics_helper+0x1818/0x5450 [ 15.683880] kasan_check_range+0x10c/0x1c0 [ 15.683904] __kasan_check_write+0x18/0x20 [ 15.683924] kasan_atomics_helper+0x1818/0x5450 [ 15.683947] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.683969] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.683994] ? trace_hardirqs_on+0x37/0xe0 [ 15.684016] ? kasan_atomics+0x152/0x310 [ 15.684043] kasan_atomics+0x1dc/0x310 [ 15.684066] ? __pfx_kasan_atomics+0x10/0x10 [ 15.684089] ? __pfx_kasan_atomics+0x10/0x10 [ 15.684117] kunit_try_run_case+0x1a5/0x480 [ 15.684142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.684165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.684189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.684214] ? __kthread_parkme+0x82/0x180 [ 15.684235] ? preempt_count_sub+0x50/0x80 [ 15.684259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.684284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.684309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.684343] kthread+0x337/0x6f0 [ 15.684363] ? trace_preempt_on+0x20/0xc0 [ 15.684386] ? __pfx_kthread+0x10/0x10 [ 15.684407] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.684429] ? calculate_sigpending+0x7b/0xa0 [ 15.684453] ? __pfx_kthread+0x10/0x10 [ 15.684475] ret_from_fork+0x116/0x1d0 [ 15.684514] ? __pfx_kthread+0x10/0x10 [ 15.684535] ret_from_fork_asm+0x1a/0x30 [ 15.684566] </TASK> [ 15.684577] [ 15.691778] Allocated by task 284: [ 15.691954] kasan_save_stack+0x45/0x70 [ 15.692100] kasan_save_track+0x18/0x40 [ 15.692237] kasan_save_alloc_info+0x3b/0x50 [ 15.692399] __kasan_kmalloc+0xb7/0xc0 [ 15.692553] __kmalloc_cache_noprof+0x189/0x420 [ 15.692713] kasan_atomics+0x95/0x310 [ 15.692847] kunit_try_run_case+0x1a5/0x480 [ 15.692999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.693177] kthread+0x337/0x6f0 [ 15.693328] ret_from_fork+0x116/0x1d0 [ 15.693535] ret_from_fork_asm+0x1a/0x30 [ 15.693730] [ 15.693823] The buggy address belongs to the object at ffff888103a28200 [ 15.693823] which belongs to the cache kmalloc-64 of size 64 [ 15.694348] The buggy address is located 0 bytes to the right of [ 15.694348] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.694913] [ 15.695007] The buggy address belongs to the physical page: [ 15.695254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.695544] flags: 0x200000000000000(node=0|zone=2) [ 15.695720] page_type: f5(slab) [ 15.695841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.696075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.696391] page dumped because: kasan: bad access detected [ 15.696671] [ 15.696766] Memory state around the buggy address: [ 15.696995] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.697329] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.697677] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.697994] ^ [ 15.698219] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698569] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.698885] ================================================================== [ 16.092170] ================================================================== [ 16.092600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.093045] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.093386] [ 16.093479] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.093574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.093589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.093621] Call Trace: [ 16.093637] <TASK> [ 16.093653] dump_stack_lvl+0x73/0xb0 [ 16.093682] print_report+0xd1/0x610 [ 16.093705] ? __virt_addr_valid+0x1db/0x2d0 [ 16.093728] ? kasan_atomics_helper+0x218a/0x5450 [ 16.093750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.093774] ? kasan_atomics_helper+0x218a/0x5450 [ 16.093797] kasan_report+0x141/0x180 [ 16.093853] ? kasan_atomics_helper+0x218a/0x5450 [ 16.093880] kasan_check_range+0x10c/0x1c0 [ 16.093915] __kasan_check_write+0x18/0x20 [ 16.093936] kasan_atomics_helper+0x218a/0x5450 [ 16.093959] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.093982] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.094007] ? trace_hardirqs_on+0x37/0xe0 [ 16.094029] ? kasan_atomics+0x152/0x310 [ 16.094056] kasan_atomics+0x1dc/0x310 [ 16.094078] ? __pfx_kasan_atomics+0x10/0x10 [ 16.094103] ? __pfx_kasan_atomics+0x10/0x10 [ 16.094159] kunit_try_run_case+0x1a5/0x480 [ 16.094184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.094229] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.094253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.094278] ? __kthread_parkme+0x82/0x180 [ 16.094300] ? preempt_count_sub+0x50/0x80 [ 16.094333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.094357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.094407] kthread+0x337/0x6f0 [ 16.094455] ? trace_preempt_on+0x20/0xc0 [ 16.094478] ? __pfx_kthread+0x10/0x10 [ 16.094547] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.094569] ? calculate_sigpending+0x7b/0xa0 [ 16.094618] ? __pfx_kthread+0x10/0x10 [ 16.094640] ret_from_fork+0x116/0x1d0 [ 16.094660] ? __pfx_kthread+0x10/0x10 [ 16.094691] ret_from_fork_asm+0x1a/0x30 [ 16.094721] </TASK> [ 16.094731] [ 16.102903] Allocated by task 284: [ 16.103069] kasan_save_stack+0x45/0x70 [ 16.103304] kasan_save_track+0x18/0x40 [ 16.103518] kasan_save_alloc_info+0x3b/0x50 [ 16.103691] __kasan_kmalloc+0xb7/0xc0 [ 16.103827] __kmalloc_cache_noprof+0x189/0x420 [ 16.104100] kasan_atomics+0x95/0x310 [ 16.104361] kunit_try_run_case+0x1a5/0x480 [ 16.104664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.104877] kthread+0x337/0x6f0 [ 16.105013] ret_from_fork+0x116/0x1d0 [ 16.105204] ret_from_fork_asm+0x1a/0x30 [ 16.105458] [ 16.105607] The buggy address belongs to the object at ffff888103a28200 [ 16.105607] which belongs to the cache kmalloc-64 of size 64 [ 16.106070] The buggy address is located 0 bytes to the right of [ 16.106070] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.106769] [ 16.106877] The buggy address belongs to the physical page: [ 16.107051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.107456] flags: 0x200000000000000(node=0|zone=2) [ 16.107641] page_type: f5(slab) [ 16.107798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.108152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.108510] page dumped because: kasan: bad access detected [ 16.108741] [ 16.108836] Memory state around the buggy address: [ 16.109045] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.109273] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.109698] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.110094] ^ [ 16.110253] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.110576] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.110940] ================================================================== [ 16.156341] ================================================================== [ 16.156715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.157082] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.157437] [ 16.157549] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.157594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.157606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.157627] Call Trace: [ 16.157641] <TASK> [ 16.157655] dump_stack_lvl+0x73/0xb0 [ 16.157682] print_report+0xd1/0x610 [ 16.157703] ? __virt_addr_valid+0x1db/0x2d0 [ 16.157726] ? kasan_atomics_helper+0x5115/0x5450 [ 16.157749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.157772] ? kasan_atomics_helper+0x5115/0x5450 [ 16.157794] kasan_report+0x141/0x180 [ 16.157817] ? kasan_atomics_helper+0x5115/0x5450 [ 16.157844] __asan_report_load8_noabort+0x18/0x20 [ 16.157869] kasan_atomics_helper+0x5115/0x5450 [ 16.157892] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.157915] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.157939] ? trace_hardirqs_on+0x37/0xe0 [ 16.157961] ? kasan_atomics+0x152/0x310 [ 16.157988] kasan_atomics+0x1dc/0x310 [ 16.158011] ? __pfx_kasan_atomics+0x10/0x10 [ 16.158035] ? __pfx_kasan_atomics+0x10/0x10 [ 16.158062] kunit_try_run_case+0x1a5/0x480 [ 16.158086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.158109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.158133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.158158] ? __kthread_parkme+0x82/0x180 [ 16.158179] ? preempt_count_sub+0x50/0x80 [ 16.158204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.158228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.158253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.158278] kthread+0x337/0x6f0 [ 16.158299] ? trace_preempt_on+0x20/0xc0 [ 16.158377] ? __pfx_kthread+0x10/0x10 [ 16.158413] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.158471] ? calculate_sigpending+0x7b/0xa0 [ 16.158522] ? __pfx_kthread+0x10/0x10 [ 16.158545] ret_from_fork+0x116/0x1d0 [ 16.158565] ? __pfx_kthread+0x10/0x10 [ 16.158585] ret_from_fork_asm+0x1a/0x30 [ 16.158616] </TASK> [ 16.158626] [ 16.166824] Allocated by task 284: [ 16.166993] kasan_save_stack+0x45/0x70 [ 16.167201] kasan_save_track+0x18/0x40 [ 16.167389] kasan_save_alloc_info+0x3b/0x50 [ 16.167621] __kasan_kmalloc+0xb7/0xc0 [ 16.167776] __kmalloc_cache_noprof+0x189/0x420 [ 16.167975] kasan_atomics+0x95/0x310 [ 16.168170] kunit_try_run_case+0x1a5/0x480 [ 16.168363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.168650] kthread+0x337/0x6f0 [ 16.168776] ret_from_fork+0x116/0x1d0 [ 16.168964] ret_from_fork_asm+0x1a/0x30 [ 16.169248] [ 16.169375] The buggy address belongs to the object at ffff888103a28200 [ 16.169375] which belongs to the cache kmalloc-64 of size 64 [ 16.169877] The buggy address is located 0 bytes to the right of [ 16.169877] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.170421] [ 16.170511] The buggy address belongs to the physical page: [ 16.170685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.171080] flags: 0x200000000000000(node=0|zone=2) [ 16.171310] page_type: f5(slab) [ 16.171501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.171841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.172076] page dumped because: kasan: bad access detected [ 16.172304] [ 16.172442] Memory state around the buggy address: [ 16.172780] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.173093] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.173383] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.173754] ^ [ 16.174044] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.174273] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.174675] ================================================================== [ 15.520631] ================================================================== [ 15.520873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.521117] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.521708] [ 15.522341] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.522394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.522408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.522429] Call Trace: [ 15.522452] <TASK> [ 15.522467] dump_stack_lvl+0x73/0xb0 [ 15.522496] print_report+0xd1/0x610 [ 15.522519] ? __virt_addr_valid+0x1db/0x2d0 [ 15.522541] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.522564] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.522586] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.522623] kasan_report+0x141/0x180 [ 15.522646] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.522673] __asan_report_load8_noabort+0x18/0x20 [ 15.522698] kasan_atomics_helper+0x4eae/0x5450 [ 15.522721] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.522744] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.522768] ? trace_hardirqs_on+0x37/0xe0 [ 15.522791] ? kasan_atomics+0x152/0x310 [ 15.522817] kasan_atomics+0x1dc/0x310 [ 15.522841] ? __pfx_kasan_atomics+0x10/0x10 [ 15.522864] ? __pfx_kasan_atomics+0x10/0x10 [ 15.522890] kunit_try_run_case+0x1a5/0x480 [ 15.522914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.522937] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.522961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.522986] ? __kthread_parkme+0x82/0x180 [ 15.523007] ? preempt_count_sub+0x50/0x80 [ 15.523032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.523056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.523080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.523106] kthread+0x337/0x6f0 [ 15.523125] ? trace_preempt_on+0x20/0xc0 [ 15.523148] ? __pfx_kthread+0x10/0x10 [ 15.523168] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.523191] ? calculate_sigpending+0x7b/0xa0 [ 15.523215] ? __pfx_kthread+0x10/0x10 [ 15.523237] ret_from_fork+0x116/0x1d0 [ 15.523256] ? __pfx_kthread+0x10/0x10 [ 15.523279] ret_from_fork_asm+0x1a/0x30 [ 15.523311] </TASK> [ 15.523331] [ 15.532327] Allocated by task 284: [ 15.532542] kasan_save_stack+0x45/0x70 [ 15.532765] kasan_save_track+0x18/0x40 [ 15.532962] kasan_save_alloc_info+0x3b/0x50 [ 15.533148] __kasan_kmalloc+0xb7/0xc0 [ 15.533337] __kmalloc_cache_noprof+0x189/0x420 [ 15.533590] kasan_atomics+0x95/0x310 [ 15.533770] kunit_try_run_case+0x1a5/0x480 [ 15.533950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.534202] kthread+0x337/0x6f0 [ 15.534373] ret_from_fork+0x116/0x1d0 [ 15.534580] ret_from_fork_asm+0x1a/0x30 [ 15.534780] [ 15.534886] The buggy address belongs to the object at ffff888103a28200 [ 15.534886] which belongs to the cache kmalloc-64 of size 64 [ 15.535450] The buggy address is located 0 bytes to the right of [ 15.535450] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.535978] [ 15.536071] The buggy address belongs to the physical page: [ 15.536290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.536533] flags: 0x200000000000000(node=0|zone=2) [ 15.536691] page_type: f5(slab) [ 15.536868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.537229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.537666] page dumped because: kasan: bad access detected [ 15.537919] [ 15.538024] Memory state around the buggy address: [ 15.538206] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.538553] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.538849] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.539120] ^ [ 15.539353] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.539677] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.539997] ================================================================== [ 15.591937] ================================================================== [ 15.592186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.592817] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.593438] [ 15.593635] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.593679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.593691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.593713] Call Trace: [ 15.593730] <TASK> [ 15.593746] dump_stack_lvl+0x73/0xb0 [ 15.593776] print_report+0xd1/0x610 [ 15.593798] ? __virt_addr_valid+0x1db/0x2d0 [ 15.593821] ? kasan_atomics_helper+0x151d/0x5450 [ 15.593843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.593867] ? kasan_atomics_helper+0x151d/0x5450 [ 15.593890] kasan_report+0x141/0x180 [ 15.593912] ? kasan_atomics_helper+0x151d/0x5450 [ 15.593939] kasan_check_range+0x10c/0x1c0 [ 15.593963] __kasan_check_write+0x18/0x20 [ 15.593983] kasan_atomics_helper+0x151d/0x5450 [ 15.594006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.594030] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.594055] ? trace_hardirqs_on+0x37/0xe0 [ 15.594078] ? kasan_atomics+0x152/0x310 [ 15.594105] kasan_atomics+0x1dc/0x310 [ 15.594128] ? __pfx_kasan_atomics+0x10/0x10 [ 15.594152] ? __pfx_kasan_atomics+0x10/0x10 [ 15.594179] kunit_try_run_case+0x1a5/0x480 [ 15.594205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594228] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.594253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.594278] ? __kthread_parkme+0x82/0x180 [ 15.594300] ? preempt_count_sub+0x50/0x80 [ 15.594335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.594387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.594412] kthread+0x337/0x6f0 [ 15.594432] ? trace_preempt_on+0x20/0xc0 [ 15.594455] ? __pfx_kthread+0x10/0x10 [ 15.594496] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.594520] ? calculate_sigpending+0x7b/0xa0 [ 15.594545] ? __pfx_kthread+0x10/0x10 [ 15.594566] ret_from_fork+0x116/0x1d0 [ 15.594586] ? __pfx_kthread+0x10/0x10 [ 15.594606] ret_from_fork_asm+0x1a/0x30 [ 15.594637] </TASK> [ 15.594647] [ 15.605307] Allocated by task 284: [ 15.605524] kasan_save_stack+0x45/0x70 [ 15.605724] kasan_save_track+0x18/0x40 [ 15.605898] kasan_save_alloc_info+0x3b/0x50 [ 15.606090] __kasan_kmalloc+0xb7/0xc0 [ 15.606278] __kmalloc_cache_noprof+0x189/0x420 [ 15.606516] kasan_atomics+0x95/0x310 [ 15.606681] kunit_try_run_case+0x1a5/0x480 [ 15.606875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.607085] kthread+0x337/0x6f0 [ 15.607247] ret_from_fork+0x116/0x1d0 [ 15.607432] ret_from_fork_asm+0x1a/0x30 [ 15.607634] [ 15.607729] The buggy address belongs to the object at ffff888103a28200 [ 15.607729] which belongs to the cache kmalloc-64 of size 64 [ 15.608189] The buggy address is located 0 bytes to the right of [ 15.608189] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.608613] [ 15.608685] The buggy address belongs to the physical page: [ 15.608858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.609182] flags: 0x200000000000000(node=0|zone=2) [ 15.609422] page_type: f5(slab) [ 15.609613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.609949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.610275] page dumped because: kasan: bad access detected [ 15.610555] [ 15.610625] Memory state around the buggy address: [ 15.610852] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.611074] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.611322] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.611667] ^ [ 15.611895] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.612216] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.612524] ================================================================== [ 15.754644] ================================================================== [ 15.755074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.755571] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.756238] [ 15.756371] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.756548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.756563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.756583] Call Trace: [ 15.756600] <TASK> [ 15.756615] dump_stack_lvl+0x73/0xb0 [ 15.756680] print_report+0xd1/0x610 [ 15.756702] ? __virt_addr_valid+0x1db/0x2d0 [ 15.756727] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.756751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.756777] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.756800] kasan_report+0x141/0x180 [ 15.756822] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.756849] kasan_check_range+0x10c/0x1c0 [ 15.756874] __kasan_check_write+0x18/0x20 [ 15.756895] kasan_atomics_helper+0x1a7f/0x5450 [ 15.756919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.756942] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.756975] ? trace_hardirqs_on+0x37/0xe0 [ 15.756997] ? kasan_atomics+0x152/0x310 [ 15.757025] kasan_atomics+0x1dc/0x310 [ 15.757049] ? __pfx_kasan_atomics+0x10/0x10 [ 15.757073] ? __pfx_kasan_atomics+0x10/0x10 [ 15.757100] kunit_try_run_case+0x1a5/0x480 [ 15.757126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.757149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.757173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.757198] ? __kthread_parkme+0x82/0x180 [ 15.757220] ? preempt_count_sub+0x50/0x80 [ 15.757244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.757270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.757295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.757332] kthread+0x337/0x6f0 [ 15.757352] ? trace_preempt_on+0x20/0xc0 [ 15.757376] ? __pfx_kthread+0x10/0x10 [ 15.757397] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.757419] ? calculate_sigpending+0x7b/0xa0 [ 15.757444] ? __pfx_kthread+0x10/0x10 [ 15.757466] ret_from_fork+0x116/0x1d0 [ 15.757512] ? __pfx_kthread+0x10/0x10 [ 15.757533] ret_from_fork_asm+0x1a/0x30 [ 15.757565] </TASK> [ 15.757576] [ 15.768907] Allocated by task 284: [ 15.769221] kasan_save_stack+0x45/0x70 [ 15.769741] kasan_save_track+0x18/0x40 [ 15.769890] kasan_save_alloc_info+0x3b/0x50 [ 15.770044] __kasan_kmalloc+0xb7/0xc0 [ 15.770180] __kmalloc_cache_noprof+0x189/0x420 [ 15.770352] kasan_atomics+0x95/0x310 [ 15.771014] kunit_try_run_case+0x1a5/0x480 [ 15.771429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.771698] kthread+0x337/0x6f0 [ 15.772172] ret_from_fork+0x116/0x1d0 [ 15.772663] ret_from_fork_asm+0x1a/0x30 [ 15.773212] [ 15.773497] The buggy address belongs to the object at ffff888103a28200 [ 15.773497] which belongs to the cache kmalloc-64 of size 64 [ 15.774089] The buggy address is located 0 bytes to the right of [ 15.774089] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.774474] [ 15.774653] The buggy address belongs to the physical page: [ 15.775413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.776229] flags: 0x200000000000000(node=0|zone=2) [ 15.776792] page_type: f5(slab) [ 15.777194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.777972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.778352] page dumped because: kasan: bad access detected [ 15.778928] [ 15.779091] Memory state around the buggy address: [ 15.779523] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.779853] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.780550] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.780784] ^ [ 15.780940] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781158] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781384] ================================================================== [ 15.350276] ================================================================== [ 15.350940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.351464] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.351934] [ 15.352055] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.352103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.352115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.352135] Call Trace: [ 15.352151] <TASK> [ 15.352165] dump_stack_lvl+0x73/0xb0 [ 15.352195] print_report+0xd1/0x610 [ 15.352217] ? __virt_addr_valid+0x1db/0x2d0 [ 15.352240] ? kasan_atomics_helper+0x1148/0x5450 [ 15.352262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.352286] ? kasan_atomics_helper+0x1148/0x5450 [ 15.352308] kasan_report+0x141/0x180 [ 15.352344] ? kasan_atomics_helper+0x1148/0x5450 [ 15.352372] kasan_check_range+0x10c/0x1c0 [ 15.352397] __kasan_check_write+0x18/0x20 [ 15.352417] kasan_atomics_helper+0x1148/0x5450 [ 15.352441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.352464] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.352489] ? trace_hardirqs_on+0x37/0xe0 [ 15.352511] ? kasan_atomics+0x152/0x310 [ 15.352539] kasan_atomics+0x1dc/0x310 [ 15.352561] ? __pfx_kasan_atomics+0x10/0x10 [ 15.352585] ? __pfx_kasan_atomics+0x10/0x10 [ 15.352613] kunit_try_run_case+0x1a5/0x480 [ 15.352637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.352660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.352685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.352709] ? __kthread_parkme+0x82/0x180 [ 15.352730] ? preempt_count_sub+0x50/0x80 [ 15.352755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.352779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.352831] kthread+0x337/0x6f0 [ 15.352851] ? trace_preempt_on+0x20/0xc0 [ 15.352874] ? __pfx_kthread+0x10/0x10 [ 15.352894] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.352916] ? calculate_sigpending+0x7b/0xa0 [ 15.352941] ? __pfx_kthread+0x10/0x10 [ 15.352970] ret_from_fork+0x116/0x1d0 [ 15.352989] ? __pfx_kthread+0x10/0x10 [ 15.353011] ret_from_fork_asm+0x1a/0x30 [ 15.353042] </TASK> [ 15.353052] [ 15.363656] Allocated by task 284: [ 15.363847] kasan_save_stack+0x45/0x70 [ 15.364167] kasan_save_track+0x18/0x40 [ 15.364351] kasan_save_alloc_info+0x3b/0x50 [ 15.364787] __kasan_kmalloc+0xb7/0xc0 [ 15.364982] __kmalloc_cache_noprof+0x189/0x420 [ 15.365169] kasan_atomics+0x95/0x310 [ 15.365502] kunit_try_run_case+0x1a5/0x480 [ 15.365824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.366169] kthread+0x337/0x6f0 [ 15.366494] ret_from_fork+0x116/0x1d0 [ 15.366677] ret_from_fork_asm+0x1a/0x30 [ 15.366881] [ 15.366968] The buggy address belongs to the object at ffff888103a28200 [ 15.366968] which belongs to the cache kmalloc-64 of size 64 [ 15.367480] The buggy address is located 0 bytes to the right of [ 15.367480] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.367975] [ 15.368061] The buggy address belongs to the physical page: [ 15.368298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.369067] flags: 0x200000000000000(node=0|zone=2) [ 15.369414] page_type: f5(slab) [ 15.369629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.370102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.370512] page dumped because: kasan: bad access detected [ 15.370858] [ 15.370940] Memory state around the buggy address: [ 15.371306] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.371813] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.372183] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.372623] ^ [ 15.372861] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.373170] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.373731] ================================================================== [ 15.183662] ================================================================== [ 15.183978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.185259] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.185697] [ 15.185805] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.185851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.185863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.185885] Call Trace: [ 15.185900] <TASK> [ 15.185916] dump_stack_lvl+0x73/0xb0 [ 15.185946] print_report+0xd1/0x610 [ 15.185968] ? __virt_addr_valid+0x1db/0x2d0 [ 15.185991] ? kasan_atomics_helper+0xde0/0x5450 [ 15.186013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.186037] ? kasan_atomics_helper+0xde0/0x5450 [ 15.186059] kasan_report+0x141/0x180 [ 15.186081] ? kasan_atomics_helper+0xde0/0x5450 [ 15.186108] kasan_check_range+0x10c/0x1c0 [ 15.186132] __kasan_check_write+0x18/0x20 [ 15.186152] kasan_atomics_helper+0xde0/0x5450 [ 15.186175] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.186198] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.186223] ? trace_hardirqs_on+0x37/0xe0 [ 15.186245] ? kasan_atomics+0x152/0x310 [ 15.186272] kasan_atomics+0x1dc/0x310 [ 15.186295] ? __pfx_kasan_atomics+0x10/0x10 [ 15.186329] ? __pfx_kasan_atomics+0x10/0x10 [ 15.186357] kunit_try_run_case+0x1a5/0x480 [ 15.186382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.186406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.186431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.186480] ? __kthread_parkme+0x82/0x180 [ 15.186501] ? preempt_count_sub+0x50/0x80 [ 15.186539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.186577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.186619] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.186645] kthread+0x337/0x6f0 [ 15.186664] ? trace_preempt_on+0x20/0xc0 [ 15.186687] ? __pfx_kthread+0x10/0x10 [ 15.186708] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.186731] ? calculate_sigpending+0x7b/0xa0 [ 15.186756] ? __pfx_kthread+0x10/0x10 [ 15.186777] ret_from_fork+0x116/0x1d0 [ 15.186797] ? __pfx_kthread+0x10/0x10 [ 15.186817] ret_from_fork_asm+0x1a/0x30 [ 15.186849] </TASK> [ 15.186859] [ 15.197368] Allocated by task 284: [ 15.197848] kasan_save_stack+0x45/0x70 [ 15.198049] kasan_save_track+0x18/0x40 [ 15.198291] kasan_save_alloc_info+0x3b/0x50 [ 15.198662] __kasan_kmalloc+0xb7/0xc0 [ 15.198952] __kmalloc_cache_noprof+0x189/0x420 [ 15.199183] kasan_atomics+0x95/0x310 [ 15.199396] kunit_try_run_case+0x1a5/0x480 [ 15.199764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.200123] kthread+0x337/0x6f0 [ 15.200381] ret_from_fork+0x116/0x1d0 [ 15.200702] ret_from_fork_asm+0x1a/0x30 [ 15.200916] [ 15.201145] The buggy address belongs to the object at ffff888103a28200 [ 15.201145] which belongs to the cache kmalloc-64 of size 64 [ 15.201819] The buggy address is located 0 bytes to the right of [ 15.201819] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.202508] [ 15.202616] The buggy address belongs to the physical page: [ 15.202894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.203332] flags: 0x200000000000000(node=0|zone=2) [ 15.203821] page_type: f5(slab) [ 15.203989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.204386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.204883] page dumped because: kasan: bad access detected [ 15.205168] [ 15.205384] Memory state around the buggy address: [ 15.205745] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.206050] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.206491] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.206868] ^ [ 15.207201] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.207640] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.208048] ================================================================== [ 16.138255] ================================================================== [ 16.138656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.138990] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.139335] [ 16.139424] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.139468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.139481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.139531] Call Trace: [ 16.139548] <TASK> [ 16.139564] dump_stack_lvl+0x73/0xb0 [ 16.139592] print_report+0xd1/0x610 [ 16.139626] ? __virt_addr_valid+0x1db/0x2d0 [ 16.139648] ? kasan_atomics_helper+0x224c/0x5450 [ 16.139671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.139703] ? kasan_atomics_helper+0x224c/0x5450 [ 16.139725] kasan_report+0x141/0x180 [ 16.139747] ? kasan_atomics_helper+0x224c/0x5450 [ 16.139785] kasan_check_range+0x10c/0x1c0 [ 16.139809] __kasan_check_write+0x18/0x20 [ 16.139829] kasan_atomics_helper+0x224c/0x5450 [ 16.139852] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.139875] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.139899] ? trace_hardirqs_on+0x37/0xe0 [ 16.139931] ? kasan_atomics+0x152/0x310 [ 16.139957] kasan_atomics+0x1dc/0x310 [ 16.139980] ? __pfx_kasan_atomics+0x10/0x10 [ 16.140015] ? __pfx_kasan_atomics+0x10/0x10 [ 16.140042] kunit_try_run_case+0x1a5/0x480 [ 16.140067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.140089] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.140123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.140149] ? __kthread_parkme+0x82/0x180 [ 16.140179] ? preempt_count_sub+0x50/0x80 [ 16.140203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.140228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.140253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.140278] kthread+0x337/0x6f0 [ 16.140297] ? trace_preempt_on+0x20/0xc0 [ 16.140328] ? __pfx_kthread+0x10/0x10 [ 16.140349] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.140371] ? calculate_sigpending+0x7b/0xa0 [ 16.140404] ? __pfx_kthread+0x10/0x10 [ 16.140426] ret_from_fork+0x116/0x1d0 [ 16.140445] ? __pfx_kthread+0x10/0x10 [ 16.140475] ret_from_fork_asm+0x1a/0x30 [ 16.140523] </TASK> [ 16.140533] [ 16.147921] Allocated by task 284: [ 16.148102] kasan_save_stack+0x45/0x70 [ 16.148292] kasan_save_track+0x18/0x40 [ 16.148499] kasan_save_alloc_info+0x3b/0x50 [ 16.148711] __kasan_kmalloc+0xb7/0xc0 [ 16.148898] __kmalloc_cache_noprof+0x189/0x420 [ 16.149135] kasan_atomics+0x95/0x310 [ 16.149406] kunit_try_run_case+0x1a5/0x480 [ 16.149666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.149888] kthread+0x337/0x6f0 [ 16.150012] ret_from_fork+0x116/0x1d0 [ 16.150144] ret_from_fork_asm+0x1a/0x30 [ 16.150284] [ 16.150365] The buggy address belongs to the object at ffff888103a28200 [ 16.150365] which belongs to the cache kmalloc-64 of size 64 [ 16.150784] The buggy address is located 0 bytes to the right of [ 16.150784] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.151415] [ 16.151538] The buggy address belongs to the physical page: [ 16.151794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.152158] flags: 0x200000000000000(node=0|zone=2) [ 16.152360] page_type: f5(slab) [ 16.152504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.152892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.153264] page dumped because: kasan: bad access detected [ 16.153550] [ 16.153622] Memory state around the buggy address: [ 16.153780] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.153999] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.154217] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.154535] ^ [ 16.154762] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.155083] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.155407] ================================================================== [ 15.302573] ================================================================== [ 15.302828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.303594] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.304056] [ 15.304338] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.304389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.304401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.304422] Call Trace: [ 15.304439] <TASK> [ 15.304453] dump_stack_lvl+0x73/0xb0 [ 15.304483] print_report+0xd1/0x610 [ 15.304519] ? __virt_addr_valid+0x1db/0x2d0 [ 15.304540] ? kasan_atomics_helper+0x1079/0x5450 [ 15.304562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.304586] ? kasan_atomics_helper+0x1079/0x5450 [ 15.304608] kasan_report+0x141/0x180 [ 15.304630] ? kasan_atomics_helper+0x1079/0x5450 [ 15.304658] kasan_check_range+0x10c/0x1c0 [ 15.304682] __kasan_check_write+0x18/0x20 [ 15.304701] kasan_atomics_helper+0x1079/0x5450 [ 15.304725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.304748] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.304772] ? trace_hardirqs_on+0x37/0xe0 [ 15.304794] ? kasan_atomics+0x152/0x310 [ 15.304821] kasan_atomics+0x1dc/0x310 [ 15.304844] ? __pfx_kasan_atomics+0x10/0x10 [ 15.304869] ? __pfx_kasan_atomics+0x10/0x10 [ 15.304897] kunit_try_run_case+0x1a5/0x480 [ 15.304921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.304944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.304974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.304999] ? __kthread_parkme+0x82/0x180 [ 15.305019] ? preempt_count_sub+0x50/0x80 [ 15.305044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.305093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.305118] kthread+0x337/0x6f0 [ 15.305138] ? trace_preempt_on+0x20/0xc0 [ 15.305161] ? __pfx_kthread+0x10/0x10 [ 15.305182] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.305204] ? calculate_sigpending+0x7b/0xa0 [ 15.305229] ? __pfx_kthread+0x10/0x10 [ 15.305251] ret_from_fork+0x116/0x1d0 [ 15.305270] ? __pfx_kthread+0x10/0x10 [ 15.305290] ret_from_fork_asm+0x1a/0x30 [ 15.305332] </TASK> [ 15.305343] [ 15.315436] Allocated by task 284: [ 15.315609] kasan_save_stack+0x45/0x70 [ 15.316245] kasan_save_track+0x18/0x40 [ 15.316494] kasan_save_alloc_info+0x3b/0x50 [ 15.316782] __kasan_kmalloc+0xb7/0xc0 [ 15.317063] __kmalloc_cache_noprof+0x189/0x420 [ 15.317392] kasan_atomics+0x95/0x310 [ 15.317598] kunit_try_run_case+0x1a5/0x480 [ 15.317886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.318101] kthread+0x337/0x6f0 [ 15.318274] ret_from_fork+0x116/0x1d0 [ 15.318471] ret_from_fork_asm+0x1a/0x30 [ 15.318881] [ 15.318986] The buggy address belongs to the object at ffff888103a28200 [ 15.318986] which belongs to the cache kmalloc-64 of size 64 [ 15.319600] The buggy address is located 0 bytes to the right of [ 15.319600] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.320183] [ 15.320273] The buggy address belongs to the physical page: [ 15.320761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.321092] flags: 0x200000000000000(node=0|zone=2) [ 15.321420] page_type: f5(slab) [ 15.321646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.322109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.322577] page dumped because: kasan: bad access detected [ 15.322922] [ 15.323022] Memory state around the buggy address: [ 15.323381] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.323816] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.324216] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.324693] ^ [ 15.324992] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.325382] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.325827] ================================================================== [ 14.925759] ================================================================== [ 14.926329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.926882] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.927331] [ 14.927481] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.927537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.927549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.927570] Call Trace: [ 14.927612] <TASK> [ 14.927628] dump_stack_lvl+0x73/0xb0 [ 14.927658] print_report+0xd1/0x610 [ 14.927692] ? __virt_addr_valid+0x1db/0x2d0 [ 14.927714] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.927737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.927761] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.927802] kasan_report+0x141/0x180 [ 14.927834] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.927861] kasan_check_range+0x10c/0x1c0 [ 14.927895] __kasan_check_write+0x18/0x20 [ 14.927916] kasan_atomics_helper+0x7c7/0x5450 [ 14.927939] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.927988] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.928013] ? trace_hardirqs_on+0x37/0xe0 [ 14.928076] ? kasan_atomics+0x152/0x310 [ 14.928104] kasan_atomics+0x1dc/0x310 [ 14.928128] ? __pfx_kasan_atomics+0x10/0x10 [ 14.928270] ? __pfx_kasan_atomics+0x10/0x10 [ 14.928298] kunit_try_run_case+0x1a5/0x480 [ 14.928336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.928385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.928410] ? __kthread_parkme+0x82/0x180 [ 14.928431] ? preempt_count_sub+0x50/0x80 [ 14.928456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.928543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.928569] kthread+0x337/0x6f0 [ 14.928588] ? trace_preempt_on+0x20/0xc0 [ 14.928622] ? __pfx_kthread+0x10/0x10 [ 14.928644] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.928681] ? calculate_sigpending+0x7b/0xa0 [ 14.928706] ? __pfx_kthread+0x10/0x10 [ 14.928737] ret_from_fork+0x116/0x1d0 [ 14.928757] ? __pfx_kthread+0x10/0x10 [ 14.928778] ret_from_fork_asm+0x1a/0x30 [ 14.928819] </TASK> [ 14.928830] [ 14.938785] Allocated by task 284: [ 14.938960] kasan_save_stack+0x45/0x70 [ 14.939408] kasan_save_track+0x18/0x40 [ 14.939729] kasan_save_alloc_info+0x3b/0x50 [ 14.939951] __kasan_kmalloc+0xb7/0xc0 [ 14.940232] __kmalloc_cache_noprof+0x189/0x420 [ 14.940675] kasan_atomics+0x95/0x310 [ 14.940887] kunit_try_run_case+0x1a5/0x480 [ 14.941137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.941621] kthread+0x337/0x6f0 [ 14.941828] ret_from_fork+0x116/0x1d0 [ 14.942028] ret_from_fork_asm+0x1a/0x30 [ 14.942534] [ 14.942659] The buggy address belongs to the object at ffff888103a28200 [ 14.942659] which belongs to the cache kmalloc-64 of size 64 [ 14.943197] The buggy address is located 0 bytes to the right of [ 14.943197] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.943740] [ 14.943826] The buggy address belongs to the physical page: [ 14.944001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.944571] flags: 0x200000000000000(node=0|zone=2) [ 14.944797] page_type: f5(slab) [ 14.945012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.945482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.945879] page dumped because: kasan: bad access detected [ 14.946153] [ 14.946385] Memory state around the buggy address: [ 14.946639] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.946977] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.947473] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.947824] ^ [ 14.948062] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.948477] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.948844] ================================================================== [ 16.073810] ================================================================== [ 16.074165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.074607] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.074892] [ 16.075003] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.075078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.075090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.075132] Call Trace: [ 16.075147] <TASK> [ 16.075160] dump_stack_lvl+0x73/0xb0 [ 16.075187] print_report+0xd1/0x610 [ 16.075210] ? __virt_addr_valid+0x1db/0x2d0 [ 16.075232] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.075254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.075278] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.075300] kasan_report+0x141/0x180 [ 16.075331] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.075358] __asan_report_load8_noabort+0x18/0x20 [ 16.075383] kasan_atomics_helper+0x4fb2/0x5450 [ 16.075406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.075458] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.075532] ? trace_hardirqs_on+0x37/0xe0 [ 16.075556] ? kasan_atomics+0x152/0x310 [ 16.075583] kasan_atomics+0x1dc/0x310 [ 16.075618] ? __pfx_kasan_atomics+0x10/0x10 [ 16.075642] ? __pfx_kasan_atomics+0x10/0x10 [ 16.075669] kunit_try_run_case+0x1a5/0x480 [ 16.075694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075746] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.075771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.075796] ? __kthread_parkme+0x82/0x180 [ 16.075827] ? preempt_count_sub+0x50/0x80 [ 16.075852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.075901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.075925] kthread+0x337/0x6f0 [ 16.075973] ? trace_preempt_on+0x20/0xc0 [ 16.075995] ? __pfx_kthread+0x10/0x10 [ 16.076016] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.076049] ? calculate_sigpending+0x7b/0xa0 [ 16.076074] ? __pfx_kthread+0x10/0x10 [ 16.076095] ret_from_fork+0x116/0x1d0 [ 16.076114] ? __pfx_kthread+0x10/0x10 [ 16.076134] ret_from_fork_asm+0x1a/0x30 [ 16.076164] </TASK> [ 16.076175] [ 16.083861] Allocated by task 284: [ 16.084037] kasan_save_stack+0x45/0x70 [ 16.084233] kasan_save_track+0x18/0x40 [ 16.084433] kasan_save_alloc_info+0x3b/0x50 [ 16.084645] __kasan_kmalloc+0xb7/0xc0 [ 16.084818] __kmalloc_cache_noprof+0x189/0x420 [ 16.085047] kasan_atomics+0x95/0x310 [ 16.085222] kunit_try_run_case+0x1a5/0x480 [ 16.085415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.085656] kthread+0x337/0x6f0 [ 16.085821] ret_from_fork+0x116/0x1d0 [ 16.085988] ret_from_fork_asm+0x1a/0x30 [ 16.086162] [ 16.086259] The buggy address belongs to the object at ffff888103a28200 [ 16.086259] which belongs to the cache kmalloc-64 of size 64 [ 16.086776] The buggy address is located 0 bytes to the right of [ 16.086776] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.087207] [ 16.087303] The buggy address belongs to the physical page: [ 16.087628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.087950] flags: 0x200000000000000(node=0|zone=2) [ 16.088112] page_type: f5(slab) [ 16.088278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.088664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.089001] page dumped because: kasan: bad access detected [ 16.089300] [ 16.089411] Memory state around the buggy address: [ 16.089665] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.089887] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.090103] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.090426] ^ [ 16.090720] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.091047] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.091455] ================================================================== [ 15.398337] ================================================================== [ 15.399339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.399837] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.400222] [ 15.400573] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.400623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.400637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.400659] Call Trace: [ 15.400674] <TASK> [ 15.400688] dump_stack_lvl+0x73/0xb0 [ 15.400717] print_report+0xd1/0x610 [ 15.400739] ? __virt_addr_valid+0x1db/0x2d0 [ 15.400763] ? kasan_atomics_helper+0x1217/0x5450 [ 15.400785] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.400809] ? kasan_atomics_helper+0x1217/0x5450 [ 15.400831] kasan_report+0x141/0x180 [ 15.400853] ? kasan_atomics_helper+0x1217/0x5450 [ 15.400880] kasan_check_range+0x10c/0x1c0 [ 15.400904] __kasan_check_write+0x18/0x20 [ 15.400925] kasan_atomics_helper+0x1217/0x5450 [ 15.400948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.400978] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.401002] ? trace_hardirqs_on+0x37/0xe0 [ 15.401024] ? kasan_atomics+0x152/0x310 [ 15.401052] kasan_atomics+0x1dc/0x310 [ 15.401075] ? __pfx_kasan_atomics+0x10/0x10 [ 15.401098] ? __pfx_kasan_atomics+0x10/0x10 [ 15.401125] kunit_try_run_case+0x1a5/0x480 [ 15.401149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.401196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.401221] ? __kthread_parkme+0x82/0x180 [ 15.401242] ? preempt_count_sub+0x50/0x80 [ 15.401266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.401325] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.401351] kthread+0x337/0x6f0 [ 15.401372] ? trace_preempt_on+0x20/0xc0 [ 15.401394] ? __pfx_kthread+0x10/0x10 [ 15.401415] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.401436] ? calculate_sigpending+0x7b/0xa0 [ 15.401461] ? __pfx_kthread+0x10/0x10 [ 15.401482] ret_from_fork+0x116/0x1d0 [ 15.401511] ? __pfx_kthread+0x10/0x10 [ 15.401531] ret_from_fork_asm+0x1a/0x30 [ 15.401562] </TASK> [ 15.401573] [ 15.411932] Allocated by task 284: [ 15.412245] kasan_save_stack+0x45/0x70 [ 15.412482] kasan_save_track+0x18/0x40 [ 15.412817] kasan_save_alloc_info+0x3b/0x50 [ 15.412993] __kasan_kmalloc+0xb7/0xc0 [ 15.413332] __kmalloc_cache_noprof+0x189/0x420 [ 15.413669] kasan_atomics+0x95/0x310 [ 15.413850] kunit_try_run_case+0x1a5/0x480 [ 15.414057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.414300] kthread+0x337/0x6f0 [ 15.414476] ret_from_fork+0x116/0x1d0 [ 15.414949] ret_from_fork_asm+0x1a/0x30 [ 15.415125] [ 15.415385] The buggy address belongs to the object at ffff888103a28200 [ 15.415385] which belongs to the cache kmalloc-64 of size 64 [ 15.416136] The buggy address is located 0 bytes to the right of [ 15.416136] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.416941] [ 15.417035] The buggy address belongs to the physical page: [ 15.417429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.417970] flags: 0x200000000000000(node=0|zone=2) [ 15.418295] page_type: f5(slab) [ 15.418474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.418803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.419123] page dumped because: kasan: bad access detected [ 15.419380] [ 15.419466] Memory state around the buggy address: [ 15.419982] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.420365] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.420821] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.421175] ^ [ 15.421379] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.421839] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422218] ================================================================== [ 15.422889] ================================================================== [ 15.423711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.424108] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.424630] [ 15.424834] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.424883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.424897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.424918] Call Trace: [ 15.424935] <TASK> [ 15.424950] dump_stack_lvl+0x73/0xb0 [ 15.425083] print_report+0xd1/0x610 [ 15.425108] ? __virt_addr_valid+0x1db/0x2d0 [ 15.425132] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.425154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.425177] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.425200] kasan_report+0x141/0x180 [ 15.425222] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.425249] __asan_report_load4_noabort+0x18/0x20 [ 15.425274] kasan_atomics_helper+0x49e8/0x5450 [ 15.425297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.425334] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.425359] ? trace_hardirqs_on+0x37/0xe0 [ 15.425381] ? kasan_atomics+0x152/0x310 [ 15.425408] kasan_atomics+0x1dc/0x310 [ 15.425431] ? __pfx_kasan_atomics+0x10/0x10 [ 15.425455] ? __pfx_kasan_atomics+0x10/0x10 [ 15.425483] kunit_try_run_case+0x1a5/0x480 [ 15.425517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.425540] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.425564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.425589] ? __kthread_parkme+0x82/0x180 [ 15.425612] ? preempt_count_sub+0x50/0x80 [ 15.425637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.425661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.425686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.425711] kthread+0x337/0x6f0 [ 15.425731] ? trace_preempt_on+0x20/0xc0 [ 15.425753] ? __pfx_kthread+0x10/0x10 [ 15.425774] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.425797] ? calculate_sigpending+0x7b/0xa0 [ 15.425821] ? __pfx_kthread+0x10/0x10 [ 15.425842] ret_from_fork+0x116/0x1d0 [ 15.425861] ? __pfx_kthread+0x10/0x10 [ 15.425883] ret_from_fork_asm+0x1a/0x30 [ 15.425914] </TASK> [ 15.425925] [ 15.436051] Allocated by task 284: [ 15.436353] kasan_save_stack+0x45/0x70 [ 15.436657] kasan_save_track+0x18/0x40 [ 15.436938] kasan_save_alloc_info+0x3b/0x50 [ 15.437252] __kasan_kmalloc+0xb7/0xc0 [ 15.437458] __kmalloc_cache_noprof+0x189/0x420 [ 15.437790] kasan_atomics+0x95/0x310 [ 15.438049] kunit_try_run_case+0x1a5/0x480 [ 15.438215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.438617] kthread+0x337/0x6f0 [ 15.438876] ret_from_fork+0x116/0x1d0 [ 15.439127] ret_from_fork_asm+0x1a/0x30 [ 15.439289] [ 15.439425] The buggy address belongs to the object at ffff888103a28200 [ 15.439425] which belongs to the cache kmalloc-64 of size 64 [ 15.440212] The buggy address is located 0 bytes to the right of [ 15.440212] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.441000] [ 15.441093] The buggy address belongs to the physical page: [ 15.441326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.441951] flags: 0x200000000000000(node=0|zone=2) [ 15.442188] page_type: f5(slab) [ 15.442445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.442873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.443264] page dumped because: kasan: bad access detected [ 15.443645] [ 15.443749] Memory state around the buggy address: [ 15.444078] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.444391] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.444851] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.445253] ^ [ 15.445511] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.445872] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.446252] ================================================================== [ 15.278131] ================================================================== [ 15.278862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.279201] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.279702] [ 15.279959] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.280008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.280022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.280043] Call Trace: [ 15.280060] <TASK> [ 15.280075] dump_stack_lvl+0x73/0xb0 [ 15.280105] print_report+0xd1/0x610 [ 15.280129] ? __virt_addr_valid+0x1db/0x2d0 [ 15.280152] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.280174] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.280198] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.280220] kasan_report+0x141/0x180 [ 15.280242] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.280270] __asan_report_load4_noabort+0x18/0x20 [ 15.280295] kasan_atomics_helper+0x4a36/0x5450 [ 15.280332] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.280356] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.280380] ? trace_hardirqs_on+0x37/0xe0 [ 15.280403] ? kasan_atomics+0x152/0x310 [ 15.280430] kasan_atomics+0x1dc/0x310 [ 15.280453] ? __pfx_kasan_atomics+0x10/0x10 [ 15.280477] ? __pfx_kasan_atomics+0x10/0x10 [ 15.280646] kunit_try_run_case+0x1a5/0x480 [ 15.280672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.280696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.280722] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.280746] ? __kthread_parkme+0x82/0x180 [ 15.280767] ? preempt_count_sub+0x50/0x80 [ 15.280791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.280816] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.280841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.280866] kthread+0x337/0x6f0 [ 15.280887] ? trace_preempt_on+0x20/0xc0 [ 15.280909] ? __pfx_kthread+0x10/0x10 [ 15.280931] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.280953] ? calculate_sigpending+0x7b/0xa0 [ 15.280987] ? __pfx_kthread+0x10/0x10 [ 15.281009] ret_from_fork+0x116/0x1d0 [ 15.281029] ? __pfx_kthread+0x10/0x10 [ 15.281051] ret_from_fork_asm+0x1a/0x30 [ 15.281082] </TASK> [ 15.281093] [ 15.291246] Allocated by task 284: [ 15.291693] kasan_save_stack+0x45/0x70 [ 15.291979] kasan_save_track+0x18/0x40 [ 15.292291] kasan_save_alloc_info+0x3b/0x50 [ 15.292571] __kasan_kmalloc+0xb7/0xc0 [ 15.292731] __kmalloc_cache_noprof+0x189/0x420 [ 15.293086] kasan_atomics+0x95/0x310 [ 15.293280] kunit_try_run_case+0x1a5/0x480 [ 15.293686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.293935] kthread+0x337/0x6f0 [ 15.294200] ret_from_fork+0x116/0x1d0 [ 15.294365] ret_from_fork_asm+0x1a/0x30 [ 15.294835] [ 15.294915] The buggy address belongs to the object at ffff888103a28200 [ 15.294915] which belongs to the cache kmalloc-64 of size 64 [ 15.295490] The buggy address is located 0 bytes to the right of [ 15.295490] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.296254] [ 15.296347] The buggy address belongs to the physical page: [ 15.296893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.297352] flags: 0x200000000000000(node=0|zone=2) [ 15.297718] page_type: f5(slab) [ 15.298036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.298391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.298841] page dumped because: kasan: bad access detected [ 15.299163] [ 15.299255] Memory state around the buggy address: [ 15.299567] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.299886] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.300194] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.300774] ^ [ 15.301000] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.301392] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.301843] ================================================================== [ 16.111585] ================================================================== [ 16.111927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.112357] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.113008] [ 16.113096] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.113139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.113153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.113173] Call Trace: [ 16.113188] <TASK> [ 16.113202] dump_stack_lvl+0x73/0xb0 [ 16.113229] print_report+0xd1/0x610 [ 16.113252] ? __virt_addr_valid+0x1db/0x2d0 [ 16.113274] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.113296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.113331] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.113354] kasan_report+0x141/0x180 [ 16.113376] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.113403] __asan_report_load8_noabort+0x18/0x20 [ 16.113428] kasan_atomics_helper+0x4fa5/0x5450 [ 16.113452] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.113474] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.113525] ? trace_hardirqs_on+0x37/0xe0 [ 16.113548] ? kasan_atomics+0x152/0x310 [ 16.113576] kasan_atomics+0x1dc/0x310 [ 16.113632] ? __pfx_kasan_atomics+0x10/0x10 [ 16.113657] ? __pfx_kasan_atomics+0x10/0x10 [ 16.113707] kunit_try_run_case+0x1a5/0x480 [ 16.113731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.113754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.113780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.113804] ? __kthread_parkme+0x82/0x180 [ 16.113825] ? preempt_count_sub+0x50/0x80 [ 16.113849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.113874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.113899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.113923] kthread+0x337/0x6f0 [ 16.113943] ? trace_preempt_on+0x20/0xc0 [ 16.113966] ? __pfx_kthread+0x10/0x10 [ 16.113987] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.114009] ? calculate_sigpending+0x7b/0xa0 [ 16.114033] ? __pfx_kthread+0x10/0x10 [ 16.114055] ret_from_fork+0x116/0x1d0 [ 16.114074] ? __pfx_kthread+0x10/0x10 [ 16.114094] ret_from_fork_asm+0x1a/0x30 [ 16.114125] </TASK> [ 16.114134] [ 16.127951] Allocated by task 284: [ 16.128092] kasan_save_stack+0x45/0x70 [ 16.128241] kasan_save_track+0x18/0x40 [ 16.128468] kasan_save_alloc_info+0x3b/0x50 [ 16.128882] __kasan_kmalloc+0xb7/0xc0 [ 16.129233] __kmalloc_cache_noprof+0x189/0x420 [ 16.129693] kasan_atomics+0x95/0x310 [ 16.130031] kunit_try_run_case+0x1a5/0x480 [ 16.130440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.130945] kthread+0x337/0x6f0 [ 16.131260] ret_from_fork+0x116/0x1d0 [ 16.131646] ret_from_fork_asm+0x1a/0x30 [ 16.131908] [ 16.132083] The buggy address belongs to the object at ffff888103a28200 [ 16.132083] which belongs to the cache kmalloc-64 of size 64 [ 16.132768] The buggy address is located 0 bytes to the right of [ 16.132768] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.133800] [ 16.133875] The buggy address belongs to the physical page: [ 16.134049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.134291] flags: 0x200000000000000(node=0|zone=2) [ 16.134515] page_type: f5(slab) [ 16.134693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.135007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.135294] page dumped because: kasan: bad access detected [ 16.135595] [ 16.135683] Memory state around the buggy address: [ 16.135868] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.136175] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.136506] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.136784] ^ [ 16.136993] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.137224] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.137575] ================================================================== [ 15.138755] ================================================================== [ 15.139103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.139446] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.139792] [ 15.139899] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.139943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.139955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.139977] Call Trace: [ 15.139990] <TASK> [ 15.140004] dump_stack_lvl+0x73/0xb0 [ 15.140052] print_report+0xd1/0x610 [ 15.140075] ? __virt_addr_valid+0x1db/0x2d0 [ 15.140098] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.140120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.140162] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.140185] kasan_report+0x141/0x180 [ 15.140207] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.140235] __asan_report_load4_noabort+0x18/0x20 [ 15.140260] kasan_atomics_helper+0x4a84/0x5450 [ 15.140284] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.140307] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.140362] ? trace_hardirqs_on+0x37/0xe0 [ 15.140398] ? kasan_atomics+0x152/0x310 [ 15.140438] kasan_atomics+0x1dc/0x310 [ 15.140461] ? __pfx_kasan_atomics+0x10/0x10 [ 15.140485] ? __pfx_kasan_atomics+0x10/0x10 [ 15.140522] kunit_try_run_case+0x1a5/0x480 [ 15.140547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.140569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.140594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.140618] ? __kthread_parkme+0x82/0x180 [ 15.140639] ? preempt_count_sub+0x50/0x80 [ 15.140663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.140687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.140711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.140736] kthread+0x337/0x6f0 [ 15.140756] ? trace_preempt_on+0x20/0xc0 [ 15.140778] ? __pfx_kthread+0x10/0x10 [ 15.140816] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.140838] ? calculate_sigpending+0x7b/0xa0 [ 15.140862] ? __pfx_kthread+0x10/0x10 [ 15.140883] ret_from_fork+0x116/0x1d0 [ 15.140903] ? __pfx_kthread+0x10/0x10 [ 15.140923] ret_from_fork_asm+0x1a/0x30 [ 15.140955] </TASK> [ 15.140973] [ 15.148729] Allocated by task 284: [ 15.148857] kasan_save_stack+0x45/0x70 [ 15.149073] kasan_save_track+0x18/0x40 [ 15.149260] kasan_save_alloc_info+0x3b/0x50 [ 15.149480] __kasan_kmalloc+0xb7/0xc0 [ 15.149692] __kmalloc_cache_noprof+0x189/0x420 [ 15.149914] kasan_atomics+0x95/0x310 [ 15.150095] kunit_try_run_case+0x1a5/0x480 [ 15.150286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.150531] kthread+0x337/0x6f0 [ 15.150690] ret_from_fork+0x116/0x1d0 [ 15.150902] ret_from_fork_asm+0x1a/0x30 [ 15.151114] [ 15.151198] The buggy address belongs to the object at ffff888103a28200 [ 15.151198] which belongs to the cache kmalloc-64 of size 64 [ 15.151698] The buggy address is located 0 bytes to the right of [ 15.151698] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.152168] [ 15.152279] The buggy address belongs to the physical page: [ 15.153001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.153762] flags: 0x200000000000000(node=0|zone=2) [ 15.154176] page_type: f5(slab) [ 15.154472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.155182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.155799] page dumped because: kasan: bad access detected [ 15.156225] [ 15.156423] Memory state around the buggy address: [ 15.156617] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.156831] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.157061] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.157267] ^ [ 15.157459] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.157765] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.158066] ================================================================== [ 15.008545] ================================================================== [ 15.008868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.009344] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.010015] [ 15.010160] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.010206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.010220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.010242] Call Trace: [ 15.010259] <TASK> [ 15.010274] dump_stack_lvl+0x73/0xb0 [ 15.010304] print_report+0xd1/0x610 [ 15.010340] ? __virt_addr_valid+0x1db/0x2d0 [ 15.010363] ? kasan_atomics_helper+0x992/0x5450 [ 15.010385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.010409] ? kasan_atomics_helper+0x992/0x5450 [ 15.010433] kasan_report+0x141/0x180 [ 15.010456] ? kasan_atomics_helper+0x992/0x5450 [ 15.010483] kasan_check_range+0x10c/0x1c0 [ 15.010506] __kasan_check_write+0x18/0x20 [ 15.010526] kasan_atomics_helper+0x992/0x5450 [ 15.010548] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.010571] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.010596] ? trace_hardirqs_on+0x37/0xe0 [ 15.010619] ? kasan_atomics+0x152/0x310 [ 15.010646] kasan_atomics+0x1dc/0x310 [ 15.010670] ? __pfx_kasan_atomics+0x10/0x10 [ 15.010694] ? __pfx_kasan_atomics+0x10/0x10 [ 15.010825] kunit_try_run_case+0x1a5/0x480 [ 15.010853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.010877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.010902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.010926] ? __kthread_parkme+0x82/0x180 [ 15.010947] ? preempt_count_sub+0x50/0x80 [ 15.010972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.010997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.011255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.011285] kthread+0x337/0x6f0 [ 15.011318] ? trace_preempt_on+0x20/0xc0 [ 15.011341] ? __pfx_kthread+0x10/0x10 [ 15.011363] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.011385] ? calculate_sigpending+0x7b/0xa0 [ 15.011410] ? __pfx_kthread+0x10/0x10 [ 15.011431] ret_from_fork+0x116/0x1d0 [ 15.011451] ? __pfx_kthread+0x10/0x10 [ 15.011472] ret_from_fork_asm+0x1a/0x30 [ 15.011503] </TASK> [ 15.011514] [ 15.023157] Allocated by task 284: [ 15.023810] kasan_save_stack+0x45/0x70 [ 15.023972] kasan_save_track+0x18/0x40 [ 15.024422] kasan_save_alloc_info+0x3b/0x50 [ 15.024827] __kasan_kmalloc+0xb7/0xc0 [ 15.025164] __kmalloc_cache_noprof+0x189/0x420 [ 15.025364] kasan_atomics+0x95/0x310 [ 15.025878] kunit_try_run_case+0x1a5/0x480 [ 15.026144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.026655] kthread+0x337/0x6f0 [ 15.026821] ret_from_fork+0x116/0x1d0 [ 15.027457] ret_from_fork_asm+0x1a/0x30 [ 15.027788] [ 15.027893] The buggy address belongs to the object at ffff888103a28200 [ 15.027893] which belongs to the cache kmalloc-64 of size 64 [ 15.028532] The buggy address is located 0 bytes to the right of [ 15.028532] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.029637] [ 15.029746] The buggy address belongs to the physical page: [ 15.030251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.030603] flags: 0x200000000000000(node=0|zone=2) [ 15.030947] page_type: f5(slab) [ 15.031085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.031434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.032204] page dumped because: kasan: bad access detected [ 15.032622] [ 15.032711] Memory state around the buggy address: [ 15.032915] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.033630] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.034123] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.034390] ^ [ 15.034817] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035290] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035992] ================================================================== [ 14.976705] ================================================================== [ 14.977690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.978105] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.979324] [ 14.979443] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.979489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.979502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.979523] Call Trace: [ 14.979538] <TASK> [ 14.979553] dump_stack_lvl+0x73/0xb0 [ 14.979706] print_report+0xd1/0x610 [ 14.979729] ? __virt_addr_valid+0x1db/0x2d0 [ 14.979753] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.979775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.979798] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.979821] kasan_report+0x141/0x180 [ 14.979843] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.979870] kasan_check_range+0x10c/0x1c0 [ 14.979894] __kasan_check_write+0x18/0x20 [ 14.979914] kasan_atomics_helper+0x8f9/0x5450 [ 14.979938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.979961] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.979986] ? trace_hardirqs_on+0x37/0xe0 [ 14.980009] ? kasan_atomics+0x152/0x310 [ 14.980036] kasan_atomics+0x1dc/0x310 [ 14.980059] ? __pfx_kasan_atomics+0x10/0x10 [ 14.980084] ? __pfx_kasan_atomics+0x10/0x10 [ 14.980111] kunit_try_run_case+0x1a5/0x480 [ 14.980135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.980183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.980207] ? __kthread_parkme+0x82/0x180 [ 14.980228] ? preempt_count_sub+0x50/0x80 [ 14.980252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.980302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.980337] kthread+0x337/0x6f0 [ 14.980357] ? trace_preempt_on+0x20/0xc0 [ 14.980379] ? __pfx_kthread+0x10/0x10 [ 14.980400] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.980422] ? calculate_sigpending+0x7b/0xa0 [ 14.980446] ? __pfx_kthread+0x10/0x10 [ 14.980469] ret_from_fork+0x116/0x1d0 [ 14.980544] ? __pfx_kthread+0x10/0x10 [ 14.980567] ret_from_fork_asm+0x1a/0x30 [ 14.980599] </TASK> [ 14.980610] [ 14.994447] Allocated by task 284: [ 14.994797] kasan_save_stack+0x45/0x70 [ 14.995195] kasan_save_track+0x18/0x40 [ 14.995523] kasan_save_alloc_info+0x3b/0x50 [ 14.995787] __kasan_kmalloc+0xb7/0xc0 [ 14.996175] __kmalloc_cache_noprof+0x189/0x420 [ 14.996436] kasan_atomics+0x95/0x310 [ 14.996898] kunit_try_run_case+0x1a5/0x480 [ 14.997413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.997878] kthread+0x337/0x6f0 [ 14.998203] ret_from_fork+0x116/0x1d0 [ 14.998659] ret_from_fork_asm+0x1a/0x30 [ 14.998871] [ 14.998967] The buggy address belongs to the object at ffff888103a28200 [ 14.998967] which belongs to the cache kmalloc-64 of size 64 [ 14.999950] The buggy address is located 0 bytes to the right of [ 14.999950] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.000847] [ 15.000955] The buggy address belongs to the physical page: [ 15.001678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.002241] flags: 0x200000000000000(node=0|zone=2) [ 15.002610] page_type: f5(slab) [ 15.002797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.003350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.003865] page dumped because: kasan: bad access detected [ 15.004366] [ 15.004595] Memory state around the buggy address: [ 15.004812] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.005663] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.006238] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.006672] ^ [ 15.006939] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007348] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007796] ================================================================== [ 15.036649] ================================================================== [ 15.036962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.037594] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.038151] [ 15.038267] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.038324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.038337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.038359] Call Trace: [ 15.038375] <TASK> [ 15.038391] dump_stack_lvl+0x73/0xb0 [ 15.038421] print_report+0xd1/0x610 [ 15.038549] ? __virt_addr_valid+0x1db/0x2d0 [ 15.038573] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.038595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.038619] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.038641] kasan_report+0x141/0x180 [ 15.038664] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.038690] kasan_check_range+0x10c/0x1c0 [ 15.038714] __kasan_check_write+0x18/0x20 [ 15.038734] kasan_atomics_helper+0xa2b/0x5450 [ 15.038758] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.038781] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.038805] ? trace_hardirqs_on+0x37/0xe0 [ 15.038828] ? kasan_atomics+0x152/0x310 [ 15.038855] kasan_atomics+0x1dc/0x310 [ 15.038878] ? __pfx_kasan_atomics+0x10/0x10 [ 15.038902] ? __pfx_kasan_atomics+0x10/0x10 [ 15.038929] kunit_try_run_case+0x1a5/0x480 [ 15.038953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.038976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.039001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.039227] ? __kthread_parkme+0x82/0x180 [ 15.039249] ? preempt_count_sub+0x50/0x80 [ 15.039274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.039299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.039340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.039366] kthread+0x337/0x6f0 [ 15.039386] ? trace_preempt_on+0x20/0xc0 [ 15.039409] ? __pfx_kthread+0x10/0x10 [ 15.039430] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.039452] ? calculate_sigpending+0x7b/0xa0 [ 15.039477] ? __pfx_kthread+0x10/0x10 [ 15.039499] ret_from_fork+0x116/0x1d0 [ 15.039518] ? __pfx_kthread+0x10/0x10 [ 15.039539] ret_from_fork_asm+0x1a/0x30 [ 15.039570] </TASK> [ 15.039581] [ 15.052040] Allocated by task 284: [ 15.052514] kasan_save_stack+0x45/0x70 [ 15.052810] kasan_save_track+0x18/0x40 [ 15.053188] kasan_save_alloc_info+0x3b/0x50 [ 15.053514] __kasan_kmalloc+0xb7/0xc0 [ 15.053694] __kmalloc_cache_noprof+0x189/0x420 [ 15.054121] kasan_atomics+0x95/0x310 [ 15.054417] kunit_try_run_case+0x1a5/0x480 [ 15.054667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.054915] kthread+0x337/0x6f0 [ 15.055451] ret_from_fork+0x116/0x1d0 [ 15.055657] ret_from_fork_asm+0x1a/0x30 [ 15.055803] [ 15.056120] The buggy address belongs to the object at ffff888103a28200 [ 15.056120] which belongs to the cache kmalloc-64 of size 64 [ 15.056888] The buggy address is located 0 bytes to the right of [ 15.056888] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.057701] [ 15.057804] The buggy address belongs to the physical page: [ 15.058130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.058703] flags: 0x200000000000000(node=0|zone=2) [ 15.058945] page_type: f5(slab) [ 15.059252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.059922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.060435] page dumped because: kasan: bad access detected [ 15.060828] [ 15.061005] Memory state around the buggy address: [ 15.061200] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.061816] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.062441] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.062729] ^ [ 15.063279] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.063748] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.064111] ================================================================== [ 15.630955] ================================================================== [ 15.631307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.631592] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.631821] [ 15.631926] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.631971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.631983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.632004] Call Trace: [ 15.632020] <TASK> [ 15.632036] dump_stack_lvl+0x73/0xb0 [ 15.632063] print_report+0xd1/0x610 [ 15.632085] ? __virt_addr_valid+0x1db/0x2d0 [ 15.632108] ? kasan_atomics_helper+0x164f/0x5450 [ 15.632131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.632155] ? kasan_atomics_helper+0x164f/0x5450 [ 15.632178] kasan_report+0x141/0x180 [ 15.632201] ? kasan_atomics_helper+0x164f/0x5450 [ 15.632228] kasan_check_range+0x10c/0x1c0 [ 15.632253] __kasan_check_write+0x18/0x20 [ 15.632274] kasan_atomics_helper+0x164f/0x5450 [ 15.632297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.632331] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.632357] ? trace_hardirqs_on+0x37/0xe0 [ 15.632381] ? kasan_atomics+0x152/0x310 [ 15.632409] kasan_atomics+0x1dc/0x310 [ 15.632433] ? __pfx_kasan_atomics+0x10/0x10 [ 15.632458] ? __pfx_kasan_atomics+0x10/0x10 [ 15.632504] kunit_try_run_case+0x1a5/0x480 [ 15.632530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.632553] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.632578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.632603] ? __kthread_parkme+0x82/0x180 [ 15.632624] ? preempt_count_sub+0x50/0x80 [ 15.632649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.632674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.632699] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.632724] kthread+0x337/0x6f0 [ 15.632746] ? trace_preempt_on+0x20/0xc0 [ 15.632769] ? __pfx_kthread+0x10/0x10 [ 15.632791] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.632814] ? calculate_sigpending+0x7b/0xa0 [ 15.632838] ? __pfx_kthread+0x10/0x10 [ 15.632861] ret_from_fork+0x116/0x1d0 [ 15.632881] ? __pfx_kthread+0x10/0x10 [ 15.632902] ret_from_fork_asm+0x1a/0x30 [ 15.632934] </TASK> [ 15.632945] [ 15.640412] Allocated by task 284: [ 15.640585] kasan_save_stack+0x45/0x70 [ 15.640788] kasan_save_track+0x18/0x40 [ 15.640947] kasan_save_alloc_info+0x3b/0x50 [ 15.641156] __kasan_kmalloc+0xb7/0xc0 [ 15.641311] __kmalloc_cache_noprof+0x189/0x420 [ 15.641565] kasan_atomics+0x95/0x310 [ 15.641741] kunit_try_run_case+0x1a5/0x480 [ 15.641889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.642067] kthread+0x337/0x6f0 [ 15.642189] ret_from_fork+0x116/0x1d0 [ 15.642333] ret_from_fork_asm+0x1a/0x30 [ 15.642561] [ 15.642655] The buggy address belongs to the object at ffff888103a28200 [ 15.642655] which belongs to the cache kmalloc-64 of size 64 [ 15.643178] The buggy address is located 0 bytes to the right of [ 15.643178] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.643747] [ 15.643819] The buggy address belongs to the physical page: [ 15.643995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.644308] flags: 0x200000000000000(node=0|zone=2) [ 15.644576] page_type: f5(slab) [ 15.644757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.645113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.645447] page dumped because: kasan: bad access detected [ 15.645695] [ 15.645789] Memory state around the buggy address: [ 15.645961] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.646251] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.646578] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.646831] ^ [ 15.646988] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.647206] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.647435] ================================================================== [ 15.064855] ================================================================== [ 15.065104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.065872] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.066569] [ 15.066669] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.066724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.066738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.066759] Call Trace: [ 15.066773] <TASK> [ 15.066788] dump_stack_lvl+0x73/0xb0 [ 15.066823] print_report+0xd1/0x610 [ 15.066845] ? __virt_addr_valid+0x1db/0x2d0 [ 15.066869] ? kasan_atomics_helper+0xac7/0x5450 [ 15.066890] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.066914] ? kasan_atomics_helper+0xac7/0x5450 [ 15.066936] kasan_report+0x141/0x180 [ 15.066958] ? kasan_atomics_helper+0xac7/0x5450 [ 15.066985] kasan_check_range+0x10c/0x1c0 [ 15.067009] __kasan_check_write+0x18/0x20 [ 15.067346] kasan_atomics_helper+0xac7/0x5450 [ 15.067372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.067395] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.067420] ? trace_hardirqs_on+0x37/0xe0 [ 15.067443] ? kasan_atomics+0x152/0x310 [ 15.067469] kasan_atomics+0x1dc/0x310 [ 15.067493] ? __pfx_kasan_atomics+0x10/0x10 [ 15.067516] ? __pfx_kasan_atomics+0x10/0x10 [ 15.067543] kunit_try_run_case+0x1a5/0x480 [ 15.067567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.067591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.067615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.067639] ? __kthread_parkme+0x82/0x180 [ 15.067659] ? preempt_count_sub+0x50/0x80 [ 15.067683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.067708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.067733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.067760] kthread+0x337/0x6f0 [ 15.067781] ? trace_preempt_on+0x20/0xc0 [ 15.067804] ? __pfx_kthread+0x10/0x10 [ 15.067826] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.067847] ? calculate_sigpending+0x7b/0xa0 [ 15.067873] ? __pfx_kthread+0x10/0x10 [ 15.067894] ret_from_fork+0x116/0x1d0 [ 15.067913] ? __pfx_kthread+0x10/0x10 [ 15.067934] ret_from_fork_asm+0x1a/0x30 [ 15.067965] </TASK> [ 15.067976] [ 15.080378] Allocated by task 284: [ 15.080801] kasan_save_stack+0x45/0x70 [ 15.081230] kasan_save_track+0x18/0x40 [ 15.081433] kasan_save_alloc_info+0x3b/0x50 [ 15.081744] __kasan_kmalloc+0xb7/0xc0 [ 15.081931] __kmalloc_cache_noprof+0x189/0x420 [ 15.082385] kasan_atomics+0x95/0x310 [ 15.082739] kunit_try_run_case+0x1a5/0x480 [ 15.083132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.083513] kthread+0x337/0x6f0 [ 15.083647] ret_from_fork+0x116/0x1d0 [ 15.083995] ret_from_fork_asm+0x1a/0x30 [ 15.084399] [ 15.084477] The buggy address belongs to the object at ffff888103a28200 [ 15.084477] which belongs to the cache kmalloc-64 of size 64 [ 15.085031] The buggy address is located 0 bytes to the right of [ 15.085031] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.086041] [ 15.086172] The buggy address belongs to the physical page: [ 15.086439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.086987] flags: 0x200000000000000(node=0|zone=2) [ 15.087423] page_type: f5(slab) [ 15.087627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.087918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.088431] page dumped because: kasan: bad access detected [ 15.088641] [ 15.088849] Memory state around the buggy address: [ 15.089263] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.089702] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.090122] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.090397] ^ [ 15.090780] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091189] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091500] ================================================================== [ 16.034681] ================================================================== [ 16.035246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.035645] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.035994] [ 16.036082] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.036127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.036141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.036162] Call Trace: [ 16.036176] <TASK> [ 16.036191] dump_stack_lvl+0x73/0xb0 [ 16.036218] print_report+0xd1/0x610 [ 16.036241] ? __virt_addr_valid+0x1db/0x2d0 [ 16.036264] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.036335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.036359] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.036382] kasan_report+0x141/0x180 [ 16.036432] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.036459] __asan_report_load8_noabort+0x18/0x20 [ 16.036513] kasan_atomics_helper+0x4f98/0x5450 [ 16.036537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.036560] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.036584] ? trace_hardirqs_on+0x37/0xe0 [ 16.036607] ? kasan_atomics+0x152/0x310 [ 16.036635] kasan_atomics+0x1dc/0x310 [ 16.036658] ? __pfx_kasan_atomics+0x10/0x10 [ 16.036710] ? __pfx_kasan_atomics+0x10/0x10 [ 16.036738] kunit_try_run_case+0x1a5/0x480 [ 16.036773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.036822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.036846] ? __kthread_parkme+0x82/0x180 [ 16.036866] ? preempt_count_sub+0x50/0x80 [ 16.036891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.036940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.037007] kthread+0x337/0x6f0 [ 16.037064] ? trace_preempt_on+0x20/0xc0 [ 16.037087] ? __pfx_kthread+0x10/0x10 [ 16.037107] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.037141] ? calculate_sigpending+0x7b/0xa0 [ 16.037166] ? __pfx_kthread+0x10/0x10 [ 16.037187] ret_from_fork+0x116/0x1d0 [ 16.037207] ? __pfx_kthread+0x10/0x10 [ 16.037229] ret_from_fork_asm+0x1a/0x30 [ 16.037263] </TASK> [ 16.037274] [ 16.044880] Allocated by task 284: [ 16.045117] kasan_save_stack+0x45/0x70 [ 16.045377] kasan_save_track+0x18/0x40 [ 16.045667] kasan_save_alloc_info+0x3b/0x50 [ 16.045871] __kasan_kmalloc+0xb7/0xc0 [ 16.046005] __kmalloc_cache_noprof+0x189/0x420 [ 16.046197] kasan_atomics+0x95/0x310 [ 16.046395] kunit_try_run_case+0x1a5/0x480 [ 16.046717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.047091] kthread+0x337/0x6f0 [ 16.047262] ret_from_fork+0x116/0x1d0 [ 16.047500] ret_from_fork_asm+0x1a/0x30 [ 16.047644] [ 16.047741] The buggy address belongs to the object at ffff888103a28200 [ 16.047741] which belongs to the cache kmalloc-64 of size 64 [ 16.048301] The buggy address is located 0 bytes to the right of [ 16.048301] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.048876] [ 16.049026] The buggy address belongs to the physical page: [ 16.049260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.049758] flags: 0x200000000000000(node=0|zone=2) [ 16.049968] page_type: f5(slab) [ 16.050182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.050588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.050846] page dumped because: kasan: bad access detected [ 16.051096] [ 16.051234] Memory state around the buggy address: [ 16.051450] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.051728] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.052080] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.052507] ^ [ 16.052720] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.052980] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.053354] ================================================================== [ 15.158616] ================================================================== [ 15.159695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.160596] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.160903] [ 15.161001] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.161044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.161058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.161079] Call Trace: [ 15.161095] <TASK> [ 15.161109] dump_stack_lvl+0x73/0xb0 [ 15.161137] print_report+0xd1/0x610 [ 15.161158] ? __virt_addr_valid+0x1db/0x2d0 [ 15.161182] ? kasan_atomics_helper+0xd47/0x5450 [ 15.161205] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.161228] ? kasan_atomics_helper+0xd47/0x5450 [ 15.161251] kasan_report+0x141/0x180 [ 15.161274] ? kasan_atomics_helper+0xd47/0x5450 [ 15.161301] kasan_check_range+0x10c/0x1c0 [ 15.161341] __kasan_check_write+0x18/0x20 [ 15.161361] kasan_atomics_helper+0xd47/0x5450 [ 15.161385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.161408] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.161433] ? trace_hardirqs_on+0x37/0xe0 [ 15.161455] ? kasan_atomics+0x152/0x310 [ 15.161482] kasan_atomics+0x1dc/0x310 [ 15.161505] ? __pfx_kasan_atomics+0x10/0x10 [ 15.161530] ? __pfx_kasan_atomics+0x10/0x10 [ 15.161557] kunit_try_run_case+0x1a5/0x480 [ 15.161581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.161605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.161630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.161654] ? __kthread_parkme+0x82/0x180 [ 15.161699] ? preempt_count_sub+0x50/0x80 [ 15.161724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.161748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.161773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.161798] kthread+0x337/0x6f0 [ 15.161819] ? trace_preempt_on+0x20/0xc0 [ 15.161841] ? __pfx_kthread+0x10/0x10 [ 15.161863] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.161885] ? calculate_sigpending+0x7b/0xa0 [ 15.161908] ? __pfx_kthread+0x10/0x10 [ 15.161930] ret_from_fork+0x116/0x1d0 [ 15.161949] ? __pfx_kthread+0x10/0x10 [ 15.161969] ret_from_fork_asm+0x1a/0x30 [ 15.162000] </TASK> [ 15.162010] [ 15.170924] Allocated by task 284: [ 15.171111] kasan_save_stack+0x45/0x70 [ 15.171290] kasan_save_track+0x18/0x40 [ 15.171473] kasan_save_alloc_info+0x3b/0x50 [ 15.172081] __kasan_kmalloc+0xb7/0xc0 [ 15.172221] __kmalloc_cache_noprof+0x189/0x420 [ 15.172413] kasan_atomics+0x95/0x310 [ 15.173018] kunit_try_run_case+0x1a5/0x480 [ 15.173299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.173735] kthread+0x337/0x6f0 [ 15.174041] ret_from_fork+0x116/0x1d0 [ 15.174221] ret_from_fork_asm+0x1a/0x30 [ 15.174414] [ 15.174757] The buggy address belongs to the object at ffff888103a28200 [ 15.174757] which belongs to the cache kmalloc-64 of size 64 [ 15.175211] The buggy address is located 0 bytes to the right of [ 15.175211] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.176357] [ 15.176624] The buggy address belongs to the physical page: [ 15.176932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.177582] flags: 0x200000000000000(node=0|zone=2) [ 15.177968] page_type: f5(slab) [ 15.178275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.178883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.179307] page dumped because: kasan: bad access detected [ 15.179866] [ 15.180121] Memory state around the buggy address: [ 15.180350] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.180925] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.181413] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.182040] ^ [ 15.182341] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.182851] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.183148] ================================================================== [ 15.326325] ================================================================== [ 15.326694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.327494] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.327928] [ 15.328350] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.328402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.328415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.328436] Call Trace: [ 15.328452] <TASK> [ 15.328467] dump_stack_lvl+0x73/0xb0 [ 15.328510] print_report+0xd1/0x610 [ 15.328533] ? __virt_addr_valid+0x1db/0x2d0 [ 15.328556] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.328578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.328601] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.328624] kasan_report+0x141/0x180 [ 15.328648] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.328675] __asan_report_load4_noabort+0x18/0x20 [ 15.328699] kasan_atomics_helper+0x4a1c/0x5450 [ 15.328723] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.328747] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.328772] ? trace_hardirqs_on+0x37/0xe0 [ 15.328795] ? kasan_atomics+0x152/0x310 [ 15.328822] kasan_atomics+0x1dc/0x310 [ 15.328844] ? __pfx_kasan_atomics+0x10/0x10 [ 15.328869] ? __pfx_kasan_atomics+0x10/0x10 [ 15.328896] kunit_try_run_case+0x1a5/0x480 [ 15.328920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.328944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.328976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.329001] ? __kthread_parkme+0x82/0x180 [ 15.329022] ? preempt_count_sub+0x50/0x80 [ 15.329047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.329071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.329096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.329122] kthread+0x337/0x6f0 [ 15.329141] ? trace_preempt_on+0x20/0xc0 [ 15.329165] ? __pfx_kthread+0x10/0x10 [ 15.329186] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.329208] ? calculate_sigpending+0x7b/0xa0 [ 15.329232] ? __pfx_kthread+0x10/0x10 [ 15.329254] ret_from_fork+0x116/0x1d0 [ 15.329273] ? __pfx_kthread+0x10/0x10 [ 15.329294] ret_from_fork_asm+0x1a/0x30 [ 15.329337] </TASK> [ 15.329347] [ 15.339408] Allocated by task 284: [ 15.339624] kasan_save_stack+0x45/0x70 [ 15.339966] kasan_save_track+0x18/0x40 [ 15.340238] kasan_save_alloc_info+0x3b/0x50 [ 15.340523] __kasan_kmalloc+0xb7/0xc0 [ 15.340773] __kmalloc_cache_noprof+0x189/0x420 [ 15.341101] kasan_atomics+0x95/0x310 [ 15.341376] kunit_try_run_case+0x1a5/0x480 [ 15.341663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.342000] kthread+0x337/0x6f0 [ 15.342157] ret_from_fork+0x116/0x1d0 [ 15.342439] ret_from_fork_asm+0x1a/0x30 [ 15.342621] [ 15.342723] The buggy address belongs to the object at ffff888103a28200 [ 15.342723] which belongs to the cache kmalloc-64 of size 64 [ 15.343296] The buggy address is located 0 bytes to the right of [ 15.343296] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.344060] [ 15.344342] The buggy address belongs to the physical page: [ 15.344577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.345081] flags: 0x200000000000000(node=0|zone=2) [ 15.345304] page_type: f5(slab) [ 15.345469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.345792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.346125] page dumped because: kasan: bad access detected [ 15.346651] [ 15.346747] Memory state around the buggy address: [ 15.346902] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.347388] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.347832] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.348195] ^ [ 15.348442] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.348993] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.349358] ================================================================== [ 15.613120] ================================================================== [ 15.613446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.613770] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.614017] [ 15.614103] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.614149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.614161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.614183] Call Trace: [ 15.614197] <TASK> [ 15.614212] dump_stack_lvl+0x73/0xb0 [ 15.614240] print_report+0xd1/0x610 [ 15.614263] ? __virt_addr_valid+0x1db/0x2d0 [ 15.614285] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.614307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.614342] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.614365] kasan_report+0x141/0x180 [ 15.614387] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.614414] kasan_check_range+0x10c/0x1c0 [ 15.614438] __kasan_check_write+0x18/0x20 [ 15.614458] kasan_atomics_helper+0x15b6/0x5450 [ 15.614502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.614527] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.614552] ? trace_hardirqs_on+0x37/0xe0 [ 15.614575] ? kasan_atomics+0x152/0x310 [ 15.614602] kasan_atomics+0x1dc/0x310 [ 15.614625] ? __pfx_kasan_atomics+0x10/0x10 [ 15.614649] ? __pfx_kasan_atomics+0x10/0x10 [ 15.614676] kunit_try_run_case+0x1a5/0x480 [ 15.614702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.614727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.614752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.614778] ? __kthread_parkme+0x82/0x180 [ 15.614799] ? preempt_count_sub+0x50/0x80 [ 15.614824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.614849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.614875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.614901] kthread+0x337/0x6f0 [ 15.614921] ? trace_preempt_on+0x20/0xc0 [ 15.614945] ? __pfx_kthread+0x10/0x10 [ 15.614968] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.614990] ? calculate_sigpending+0x7b/0xa0 [ 15.615016] ? __pfx_kthread+0x10/0x10 [ 15.615038] ret_from_fork+0x116/0x1d0 [ 15.615060] ? __pfx_kthread+0x10/0x10 [ 15.615081] ret_from_fork_asm+0x1a/0x30 [ 15.615113] </TASK> [ 15.615123] [ 15.622553] Allocated by task 284: [ 15.622697] kasan_save_stack+0x45/0x70 [ 15.622843] kasan_save_track+0x18/0x40 [ 15.622981] kasan_save_alloc_info+0x3b/0x50 [ 15.623150] __kasan_kmalloc+0xb7/0xc0 [ 15.623348] __kmalloc_cache_noprof+0x189/0x420 [ 15.623596] kasan_atomics+0x95/0x310 [ 15.623786] kunit_try_run_case+0x1a5/0x480 [ 15.623992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.624242] kthread+0x337/0x6f0 [ 15.624423] ret_from_fork+0x116/0x1d0 [ 15.624637] ret_from_fork_asm+0x1a/0x30 [ 15.624833] [ 15.624928] The buggy address belongs to the object at ffff888103a28200 [ 15.624928] which belongs to the cache kmalloc-64 of size 64 [ 15.625361] The buggy address is located 0 bytes to the right of [ 15.625361] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.625823] [ 15.625922] The buggy address belongs to the physical page: [ 15.626175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.626565] flags: 0x200000000000000(node=0|zone=2) [ 15.626807] page_type: f5(slab) [ 15.626973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.627343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.627681] page dumped because: kasan: bad access detected [ 15.627912] [ 15.628009] Memory state around the buggy address: [ 15.628197] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.628425] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.628775] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.629097] ^ [ 15.629258] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.629590] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.629902] ================================================================== [ 15.716878] ================================================================== [ 15.717228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.717890] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.718152] [ 15.718264] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.718307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.718332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.718353] Call Trace: [ 15.718369] <TASK> [ 15.718384] dump_stack_lvl+0x73/0xb0 [ 15.718413] print_report+0xd1/0x610 [ 15.718435] ? __virt_addr_valid+0x1db/0x2d0 [ 15.718458] ? kasan_atomics_helper+0x194a/0x5450 [ 15.718501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.718526] ? kasan_atomics_helper+0x194a/0x5450 [ 15.718549] kasan_report+0x141/0x180 [ 15.718572] ? kasan_atomics_helper+0x194a/0x5450 [ 15.718598] kasan_check_range+0x10c/0x1c0 [ 15.718623] __kasan_check_write+0x18/0x20 [ 15.718643] kasan_atomics_helper+0x194a/0x5450 [ 15.718666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.718689] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.718714] ? trace_hardirqs_on+0x37/0xe0 [ 15.718737] ? kasan_atomics+0x152/0x310 [ 15.718763] kasan_atomics+0x1dc/0x310 [ 15.718787] ? __pfx_kasan_atomics+0x10/0x10 [ 15.718810] ? __pfx_kasan_atomics+0x10/0x10 [ 15.718837] kunit_try_run_case+0x1a5/0x480 [ 15.718861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.718885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.718909] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.718933] ? __kthread_parkme+0x82/0x180 [ 15.718954] ? preempt_count_sub+0x50/0x80 [ 15.718978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.719002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.719027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.719052] kthread+0x337/0x6f0 [ 15.719072] ? trace_preempt_on+0x20/0xc0 [ 15.719095] ? __pfx_kthread+0x10/0x10 [ 15.719116] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.719139] ? calculate_sigpending+0x7b/0xa0 [ 15.719163] ? __pfx_kthread+0x10/0x10 [ 15.719185] ret_from_fork+0x116/0x1d0 [ 15.719204] ? __pfx_kthread+0x10/0x10 [ 15.719225] ret_from_fork_asm+0x1a/0x30 [ 15.719255] </TASK> [ 15.719267] [ 15.726289] Allocated by task 284: [ 15.726472] kasan_save_stack+0x45/0x70 [ 15.726689] kasan_save_track+0x18/0x40 [ 15.726882] kasan_save_alloc_info+0x3b/0x50 [ 15.727092] __kasan_kmalloc+0xb7/0xc0 [ 15.727277] __kmalloc_cache_noprof+0x189/0x420 [ 15.727575] kasan_atomics+0x95/0x310 [ 15.727714] kunit_try_run_case+0x1a5/0x480 [ 15.727863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.728113] kthread+0x337/0x6f0 [ 15.728279] ret_from_fork+0x116/0x1d0 [ 15.728499] ret_from_fork_asm+0x1a/0x30 [ 15.728700] [ 15.728799] The buggy address belongs to the object at ffff888103a28200 [ 15.728799] which belongs to the cache kmalloc-64 of size 64 [ 15.729266] The buggy address is located 0 bytes to the right of [ 15.729266] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.729794] [ 15.729895] The buggy address belongs to the physical page: [ 15.730112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.730412] flags: 0x200000000000000(node=0|zone=2) [ 15.730665] page_type: f5(slab) [ 15.730810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.731121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.731437] page dumped because: kasan: bad access detected [ 15.731678] [ 15.731770] Memory state around the buggy address: [ 15.731961] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.732265] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.732576] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.732848] ^ [ 15.733044] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.733337] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.733649] ================================================================== [ 15.868620] ================================================================== [ 15.869669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.870303] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.870910] [ 15.871008] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.871054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.871067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.871089] Call Trace: [ 15.871106] <TASK> [ 15.871122] dump_stack_lvl+0x73/0xb0 [ 15.871152] print_report+0xd1/0x610 [ 15.871175] ? __virt_addr_valid+0x1db/0x2d0 [ 15.871198] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.871220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.871243] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.871265] kasan_report+0x141/0x180 [ 15.871287] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.871314] kasan_check_range+0x10c/0x1c0 [ 15.871353] __kasan_check_write+0x18/0x20 [ 15.871373] kasan_atomics_helper+0x1ce1/0x5450 [ 15.871396] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.871531] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.871566] ? trace_hardirqs_on+0x37/0xe0 [ 15.871682] ? kasan_atomics+0x152/0x310 [ 15.871715] kasan_atomics+0x1dc/0x310 [ 15.871739] ? __pfx_kasan_atomics+0x10/0x10 [ 15.871764] ? __pfx_kasan_atomics+0x10/0x10 [ 15.871791] kunit_try_run_case+0x1a5/0x480 [ 15.871816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.871839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.871865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.871890] ? __kthread_parkme+0x82/0x180 [ 15.871911] ? preempt_count_sub+0x50/0x80 [ 15.871935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.871960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.871984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.872010] kthread+0x337/0x6f0 [ 15.872030] ? trace_preempt_on+0x20/0xc0 [ 15.872052] ? __pfx_kthread+0x10/0x10 [ 15.872073] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.872095] ? calculate_sigpending+0x7b/0xa0 [ 15.872120] ? __pfx_kthread+0x10/0x10 [ 15.872141] ret_from_fork+0x116/0x1d0 [ 15.872161] ? __pfx_kthread+0x10/0x10 [ 15.872181] ret_from_fork_asm+0x1a/0x30 [ 15.872213] </TASK> [ 15.872224] [ 15.883177] Allocated by task 284: [ 15.883621] kasan_save_stack+0x45/0x70 [ 15.883866] kasan_save_track+0x18/0x40 [ 15.884060] kasan_save_alloc_info+0x3b/0x50 [ 15.884265] __kasan_kmalloc+0xb7/0xc0 [ 15.884450] __kmalloc_cache_noprof+0x189/0x420 [ 15.884976] kasan_atomics+0x95/0x310 [ 15.885155] kunit_try_run_case+0x1a5/0x480 [ 15.885642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.885996] kthread+0x337/0x6f0 [ 15.886178] ret_from_fork+0x116/0x1d0 [ 15.886383] ret_from_fork_asm+0x1a/0x30 [ 15.886599] [ 15.886706] The buggy address belongs to the object at ffff888103a28200 [ 15.886706] which belongs to the cache kmalloc-64 of size 64 [ 15.887282] The buggy address is located 0 bytes to the right of [ 15.887282] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.888222] [ 15.888332] The buggy address belongs to the physical page: [ 15.888825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.889294] flags: 0x200000000000000(node=0|zone=2) [ 15.889723] page_type: f5(slab) [ 15.890007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.890357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.890821] page dumped because: kasan: bad access detected [ 15.891230] [ 15.891343] Memory state around the buggy address: [ 15.891852] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.892275] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.892735] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.893025] ^ [ 15.893242] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.893841] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.894135] ================================================================== [ 14.783548] ================================================================== [ 14.783953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.784418] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.785160] [ 14.785449] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.785498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.785511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.785532] Call Trace: [ 14.785548] <TASK> [ 14.785564] dump_stack_lvl+0x73/0xb0 [ 14.785594] print_report+0xd1/0x610 [ 14.785616] ? __virt_addr_valid+0x1db/0x2d0 [ 14.785638] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.785660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.785683] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.785756] kasan_report+0x141/0x180 [ 14.785780] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.785821] kasan_check_range+0x10c/0x1c0 [ 14.785845] __kasan_check_write+0x18/0x20 [ 14.785865] kasan_atomics_helper+0x4a0/0x5450 [ 14.785889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.785912] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.785936] ? trace_hardirqs_on+0x37/0xe0 [ 14.785959] ? kasan_atomics+0x152/0x310 [ 14.785987] kasan_atomics+0x1dc/0x310 [ 14.786010] ? __pfx_kasan_atomics+0x10/0x10 [ 14.786082] ? __pfx_kasan_atomics+0x10/0x10 [ 14.786109] kunit_try_run_case+0x1a5/0x480 [ 14.786134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.786157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.786184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.786207] ? __kthread_parkme+0x82/0x180 [ 14.786229] ? preempt_count_sub+0x50/0x80 [ 14.786254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.786278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.786314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.786338] kthread+0x337/0x6f0 [ 14.786359] ? trace_preempt_on+0x20/0xc0 [ 14.786381] ? __pfx_kthread+0x10/0x10 [ 14.786402] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.786425] ? calculate_sigpending+0x7b/0xa0 [ 14.786449] ? __pfx_kthread+0x10/0x10 [ 14.786471] ret_from_fork+0x116/0x1d0 [ 14.786502] ? __pfx_kthread+0x10/0x10 [ 14.786522] ret_from_fork_asm+0x1a/0x30 [ 14.786553] </TASK> [ 14.786564] [ 14.796286] Allocated by task 284: [ 14.796562] kasan_save_stack+0x45/0x70 [ 14.796913] kasan_save_track+0x18/0x40 [ 14.797119] kasan_save_alloc_info+0x3b/0x50 [ 14.797352] __kasan_kmalloc+0xb7/0xc0 [ 14.797650] __kmalloc_cache_noprof+0x189/0x420 [ 14.797878] kasan_atomics+0x95/0x310 [ 14.798233] kunit_try_run_case+0x1a5/0x480 [ 14.798429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.798608] kthread+0x337/0x6f0 [ 14.798731] ret_from_fork+0x116/0x1d0 [ 14.798924] ret_from_fork_asm+0x1a/0x30 [ 14.799271] [ 14.799583] The buggy address belongs to the object at ffff888103a28200 [ 14.799583] which belongs to the cache kmalloc-64 of size 64 [ 14.800281] The buggy address is located 0 bytes to the right of [ 14.800281] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.801179] [ 14.801288] The buggy address belongs to the physical page: [ 14.801636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.801932] flags: 0x200000000000000(node=0|zone=2) [ 14.802364] page_type: f5(slab) [ 14.802615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.802957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.803657] page dumped because: kasan: bad access detected [ 14.803956] [ 14.804233] Memory state around the buggy address: [ 14.804462] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.804948] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.805421] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.805812] ^ [ 14.805982] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.806506] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.807002] ================================================================== [ 14.733594] ================================================================== [ 14.733942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.734282] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.735141] [ 14.735251] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.735297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.735319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.735342] Call Trace: [ 14.735394] <TASK> [ 14.735409] dump_stack_lvl+0x73/0xb0 [ 14.735440] print_report+0xd1/0x610 [ 14.735493] ? __virt_addr_valid+0x1db/0x2d0 [ 14.735517] ? kasan_atomics_helper+0x3df/0x5450 [ 14.735539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.735563] ? kasan_atomics_helper+0x3df/0x5450 [ 14.735585] kasan_report+0x141/0x180 [ 14.735608] ? kasan_atomics_helper+0x3df/0x5450 [ 14.735634] kasan_check_range+0x10c/0x1c0 [ 14.735658] __kasan_check_read+0x15/0x20 [ 14.735677] kasan_atomics_helper+0x3df/0x5450 [ 14.735701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.735723] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.735749] ? trace_hardirqs_on+0x37/0xe0 [ 14.735772] ? kasan_atomics+0x152/0x310 [ 14.735798] kasan_atomics+0x1dc/0x310 [ 14.735821] ? __pfx_kasan_atomics+0x10/0x10 [ 14.735845] ? __pfx_kasan_atomics+0x10/0x10 [ 14.735871] kunit_try_run_case+0x1a5/0x480 [ 14.735896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.735919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.735942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.735967] ? __kthread_parkme+0x82/0x180 [ 14.735989] ? preempt_count_sub+0x50/0x80 [ 14.736199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.736226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.736252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.736277] kthread+0x337/0x6f0 [ 14.736297] ? trace_preempt_on+0x20/0xc0 [ 14.736336] ? __pfx_kthread+0x10/0x10 [ 14.736357] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.736380] ? calculate_sigpending+0x7b/0xa0 [ 14.736404] ? __pfx_kthread+0x10/0x10 [ 14.736426] ret_from_fork+0x116/0x1d0 [ 14.736445] ? __pfx_kthread+0x10/0x10 [ 14.736487] ret_from_fork_asm+0x1a/0x30 [ 14.736519] </TASK> [ 14.736529] [ 14.746759] Allocated by task 284: [ 14.746974] kasan_save_stack+0x45/0x70 [ 14.747326] kasan_save_track+0x18/0x40 [ 14.747618] kasan_save_alloc_info+0x3b/0x50 [ 14.747790] __kasan_kmalloc+0xb7/0xc0 [ 14.748294] __kmalloc_cache_noprof+0x189/0x420 [ 14.748529] kasan_atomics+0x95/0x310 [ 14.748836] kunit_try_run_case+0x1a5/0x480 [ 14.749169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.749430] kthread+0x337/0x6f0 [ 14.749661] ret_from_fork+0x116/0x1d0 [ 14.749849] ret_from_fork_asm+0x1a/0x30 [ 14.750219] [ 14.750323] The buggy address belongs to the object at ffff888103a28200 [ 14.750323] which belongs to the cache kmalloc-64 of size 64 [ 14.750821] The buggy address is located 0 bytes to the right of [ 14.750821] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.751282] [ 14.751532] The buggy address belongs to the physical page: [ 14.751729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.752348] flags: 0x200000000000000(node=0|zone=2) [ 14.752618] page_type: f5(slab) [ 14.752784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.753292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.753717] page dumped because: kasan: bad access detected [ 14.753946] [ 14.754146] Memory state around the buggy address: [ 14.754382] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.754804] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.755201] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.755552] ^ [ 14.755780] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.756423] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.756786] ================================================================== [ 16.054680] ================================================================== [ 16.054947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.055398] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.055804] [ 16.055903] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.055948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.055960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.056014] Call Trace: [ 16.056031] <TASK> [ 16.056046] dump_stack_lvl+0x73/0xb0 [ 16.056099] print_report+0xd1/0x610 [ 16.056120] ? __virt_addr_valid+0x1db/0x2d0 [ 16.056142] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.056164] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.056189] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.056212] kasan_report+0x141/0x180 [ 16.056234] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.056261] kasan_check_range+0x10c/0x1c0 [ 16.056313] __kasan_check_write+0x18/0x20 [ 16.056350] kasan_atomics_helper+0x20c8/0x5450 [ 16.056401] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.056424] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.056448] ? trace_hardirqs_on+0x37/0xe0 [ 16.056501] ? kasan_atomics+0x152/0x310 [ 16.056530] kasan_atomics+0x1dc/0x310 [ 16.056553] ? __pfx_kasan_atomics+0x10/0x10 [ 16.056577] ? __pfx_kasan_atomics+0x10/0x10 [ 16.056604] kunit_try_run_case+0x1a5/0x480 [ 16.056628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.056652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.056676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.056700] ? __kthread_parkme+0x82/0x180 [ 16.056720] ? preempt_count_sub+0x50/0x80 [ 16.056745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.056769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.056794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.056819] kthread+0x337/0x6f0 [ 16.056838] ? trace_preempt_on+0x20/0xc0 [ 16.056861] ? __pfx_kthread+0x10/0x10 [ 16.056881] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.056903] ? calculate_sigpending+0x7b/0xa0 [ 16.056927] ? __pfx_kthread+0x10/0x10 [ 16.056948] ret_from_fork+0x116/0x1d0 [ 16.056966] ? __pfx_kthread+0x10/0x10 [ 16.056992] ret_from_fork_asm+0x1a/0x30 [ 16.057022] </TASK> [ 16.057032] [ 16.064994] Allocated by task 284: [ 16.065127] kasan_save_stack+0x45/0x70 [ 16.065342] kasan_save_track+0x18/0x40 [ 16.065602] kasan_save_alloc_info+0x3b/0x50 [ 16.065875] __kasan_kmalloc+0xb7/0xc0 [ 16.066098] __kmalloc_cache_noprof+0x189/0x420 [ 16.066333] kasan_atomics+0x95/0x310 [ 16.066555] kunit_try_run_case+0x1a5/0x480 [ 16.066705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.066956] kthread+0x337/0x6f0 [ 16.067175] ret_from_fork+0x116/0x1d0 [ 16.067422] ret_from_fork_asm+0x1a/0x30 [ 16.067749] [ 16.067844] The buggy address belongs to the object at ffff888103a28200 [ 16.067844] which belongs to the cache kmalloc-64 of size 64 [ 16.068302] The buggy address is located 0 bytes to the right of [ 16.068302] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.068930] [ 16.069029] The buggy address belongs to the physical page: [ 16.069201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.069564] flags: 0x200000000000000(node=0|zone=2) [ 16.069798] page_type: f5(slab) [ 16.069965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.070301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.070711] page dumped because: kasan: bad access detected [ 16.070887] [ 16.070955] Memory state around the buggy address: [ 16.071178] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.071564] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.071960] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.072215] ^ [ 16.072401] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.072791] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.073231] ================================================================== [ 15.374362] ================================================================== [ 15.375047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.375566] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.375955] [ 15.376302] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.376365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.376378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.376399] Call Trace: [ 15.376415] <TASK> [ 15.376431] dump_stack_lvl+0x73/0xb0 [ 15.376460] print_report+0xd1/0x610 [ 15.376482] ? __virt_addr_valid+0x1db/0x2d0 [ 15.376516] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.376537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.376561] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.376584] kasan_report+0x141/0x180 [ 15.376606] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.376632] __asan_report_load4_noabort+0x18/0x20 [ 15.376657] kasan_atomics_helper+0x4a02/0x5450 [ 15.376681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.376703] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.376728] ? trace_hardirqs_on+0x37/0xe0 [ 15.376750] ? kasan_atomics+0x152/0x310 [ 15.376777] kasan_atomics+0x1dc/0x310 [ 15.376799] ? __pfx_kasan_atomics+0x10/0x10 [ 15.376823] ? __pfx_kasan_atomics+0x10/0x10 [ 15.376851] kunit_try_run_case+0x1a5/0x480 [ 15.376874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.376897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.376923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.376947] ? __kthread_parkme+0x82/0x180 [ 15.376978] ? preempt_count_sub+0x50/0x80 [ 15.377003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.377027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.377052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.377077] kthread+0x337/0x6f0 [ 15.377096] ? trace_preempt_on+0x20/0xc0 [ 15.377119] ? __pfx_kthread+0x10/0x10 [ 15.377140] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.377162] ? calculate_sigpending+0x7b/0xa0 [ 15.377187] ? __pfx_kthread+0x10/0x10 [ 15.377209] ret_from_fork+0x116/0x1d0 [ 15.377228] ? __pfx_kthread+0x10/0x10 [ 15.377248] ret_from_fork_asm+0x1a/0x30 [ 15.377279] </TASK> [ 15.377289] [ 15.387435] Allocated by task 284: [ 15.387814] kasan_save_stack+0x45/0x70 [ 15.388124] kasan_save_track+0x18/0x40 [ 15.388328] kasan_save_alloc_info+0x3b/0x50 [ 15.388636] __kasan_kmalloc+0xb7/0xc0 [ 15.388815] __kmalloc_cache_noprof+0x189/0x420 [ 15.389035] kasan_atomics+0x95/0x310 [ 15.389215] kunit_try_run_case+0x1a5/0x480 [ 15.389415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.389928] kthread+0x337/0x6f0 [ 15.390094] ret_from_fork+0x116/0x1d0 [ 15.390236] ret_from_fork_asm+0x1a/0x30 [ 15.390657] [ 15.390821] The buggy address belongs to the object at ffff888103a28200 [ 15.390821] which belongs to the cache kmalloc-64 of size 64 [ 15.391466] The buggy address is located 0 bytes to the right of [ 15.391466] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.391991] [ 15.392083] The buggy address belongs to the physical page: [ 15.392337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.392931] flags: 0x200000000000000(node=0|zone=2) [ 15.393278] page_type: f5(slab) [ 15.393474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.393916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.394299] page dumped because: kasan: bad access detected [ 15.394720] [ 15.394821] Memory state around the buggy address: [ 15.395179] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.395654] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.396064] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.396472] ^ [ 15.396728] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397028] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397358] ================================================================== [ 15.699422] ================================================================== [ 15.699732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.699968] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.700210] [ 15.700297] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.700350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.700362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.700383] Call Trace: [ 15.700397] <TASK> [ 15.700410] dump_stack_lvl+0x73/0xb0 [ 15.700438] print_report+0xd1/0x610 [ 15.700460] ? __virt_addr_valid+0x1db/0x2d0 [ 15.700503] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.700526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.700549] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.700572] kasan_report+0x141/0x180 [ 15.700595] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.700622] kasan_check_range+0x10c/0x1c0 [ 15.700646] __kasan_check_write+0x18/0x20 [ 15.700666] kasan_atomics_helper+0x18b1/0x5450 [ 15.700690] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.700713] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.700737] ? trace_hardirqs_on+0x37/0xe0 [ 15.700759] ? kasan_atomics+0x152/0x310 [ 15.700786] kasan_atomics+0x1dc/0x310 [ 15.700809] ? __pfx_kasan_atomics+0x10/0x10 [ 15.700832] ? __pfx_kasan_atomics+0x10/0x10 [ 15.700859] kunit_try_run_case+0x1a5/0x480 [ 15.700883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.700907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.700932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.700956] ? __kthread_parkme+0x82/0x180 [ 15.700982] ? preempt_count_sub+0x50/0x80 [ 15.701006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.701055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.701080] kthread+0x337/0x6f0 [ 15.701101] ? trace_preempt_on+0x20/0xc0 [ 15.701123] ? __pfx_kthread+0x10/0x10 [ 15.701145] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.701167] ? calculate_sigpending+0x7b/0xa0 [ 15.701191] ? __pfx_kthread+0x10/0x10 [ 15.701213] ret_from_fork+0x116/0x1d0 [ 15.701233] ? __pfx_kthread+0x10/0x10 [ 15.701254] ret_from_fork_asm+0x1a/0x30 [ 15.701285] </TASK> [ 15.701296] [ 15.708874] Allocated by task 284: [ 15.709051] kasan_save_stack+0x45/0x70 [ 15.709254] kasan_save_track+0x18/0x40 [ 15.709403] kasan_save_alloc_info+0x3b/0x50 [ 15.709579] __kasan_kmalloc+0xb7/0xc0 [ 15.709714] __kmalloc_cache_noprof+0x189/0x420 [ 15.709871] kasan_atomics+0x95/0x310 [ 15.710004] kunit_try_run_case+0x1a5/0x480 [ 15.710212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.710495] kthread+0x337/0x6f0 [ 15.710662] ret_from_fork+0x116/0x1d0 [ 15.710847] ret_from_fork_asm+0x1a/0x30 [ 15.711040] [ 15.711133] The buggy address belongs to the object at ffff888103a28200 [ 15.711133] which belongs to the cache kmalloc-64 of size 64 [ 15.711690] The buggy address is located 0 bytes to the right of [ 15.711690] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.712170] [ 15.712244] The buggy address belongs to the physical page: [ 15.712426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.712815] flags: 0x200000000000000(node=0|zone=2) [ 15.713062] page_type: f5(slab) [ 15.713229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.713609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.713903] page dumped because: kasan: bad access detected [ 15.714142] [ 15.714223] Memory state around the buggy address: [ 15.714435] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.714753] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.715033] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.715304] ^ [ 15.715544] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.715812] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.716097] ================================================================== [ 14.949612] ================================================================== [ 14.950115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.950520] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.950877] [ 14.950988] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.951033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.951045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.951152] Call Trace: [ 14.951183] <TASK> [ 14.951199] dump_stack_lvl+0x73/0xb0 [ 14.951231] print_report+0xd1/0x610 [ 14.951284] ? __virt_addr_valid+0x1db/0x2d0 [ 14.951326] ? kasan_atomics_helper+0x860/0x5450 [ 14.951349] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.951374] ? kasan_atomics_helper+0x860/0x5450 [ 14.951397] kasan_report+0x141/0x180 [ 14.951447] ? kasan_atomics_helper+0x860/0x5450 [ 14.951475] kasan_check_range+0x10c/0x1c0 [ 14.951511] __kasan_check_write+0x18/0x20 [ 14.951545] kasan_atomics_helper+0x860/0x5450 [ 14.951568] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.951609] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.951642] ? trace_hardirqs_on+0x37/0xe0 [ 14.951666] ? kasan_atomics+0x152/0x310 [ 14.951704] kasan_atomics+0x1dc/0x310 [ 14.951727] ? __pfx_kasan_atomics+0x10/0x10 [ 14.951752] ? __pfx_kasan_atomics+0x10/0x10 [ 14.951779] kunit_try_run_case+0x1a5/0x480 [ 14.951830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.951853] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.951879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.951914] ? __kthread_parkme+0x82/0x180 [ 14.951935] ? preempt_count_sub+0x50/0x80 [ 14.951976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.952010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.952035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.952071] kthread+0x337/0x6f0 [ 14.952091] ? trace_preempt_on+0x20/0xc0 [ 14.952113] ? __pfx_kthread+0x10/0x10 [ 14.952134] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.952275] ? calculate_sigpending+0x7b/0xa0 [ 14.952301] ? __pfx_kthread+0x10/0x10 [ 14.952333] ret_from_fork+0x116/0x1d0 [ 14.952356] ? __pfx_kthread+0x10/0x10 [ 14.952377] ret_from_fork_asm+0x1a/0x30 [ 14.952430] </TASK> [ 14.952449] [ 14.962680] Allocated by task 284: [ 14.962887] kasan_save_stack+0x45/0x70 [ 14.963127] kasan_save_track+0x18/0x40 [ 14.963422] kasan_save_alloc_info+0x3b/0x50 [ 14.963703] __kasan_kmalloc+0xb7/0xc0 [ 14.963895] __kmalloc_cache_noprof+0x189/0x420 [ 14.964104] kasan_atomics+0x95/0x310 [ 14.964421] kunit_try_run_case+0x1a5/0x480 [ 14.964589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.965006] kthread+0x337/0x6f0 [ 14.965739] ret_from_fork+0x116/0x1d0 [ 14.966866] ret_from_fork_asm+0x1a/0x30 [ 14.967323] [ 14.967409] The buggy address belongs to the object at ffff888103a28200 [ 14.967409] which belongs to the cache kmalloc-64 of size 64 [ 14.968457] The buggy address is located 0 bytes to the right of [ 14.968457] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.969002] [ 14.969089] The buggy address belongs to the physical page: [ 14.969356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.970285] flags: 0x200000000000000(node=0|zone=2) [ 14.970661] page_type: f5(slab) [ 14.970943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.971519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.971968] page dumped because: kasan: bad access detected [ 14.972373] [ 14.972480] Memory state around the buggy address: [ 14.972905] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.973564] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.974006] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.974429] ^ [ 14.974869] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.975506] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.975947] ================================================================== [ 16.015451] ================================================================== [ 16.015948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.016340] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 16.016733] [ 16.016861] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.016908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.016950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.016977] Call Trace: [ 16.016993] <TASK> [ 16.017019] dump_stack_lvl+0x73/0xb0 [ 16.017048] print_report+0xd1/0x610 [ 16.017070] ? __virt_addr_valid+0x1db/0x2d0 [ 16.017093] ? kasan_atomics_helper+0x2006/0x5450 [ 16.017115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.017139] ? kasan_atomics_helper+0x2006/0x5450 [ 16.017191] kasan_report+0x141/0x180 [ 16.017214] ? kasan_atomics_helper+0x2006/0x5450 [ 16.017263] kasan_check_range+0x10c/0x1c0 [ 16.017313] __kasan_check_write+0x18/0x20 [ 16.017342] kasan_atomics_helper+0x2006/0x5450 [ 16.017366] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.017399] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.017424] ? trace_hardirqs_on+0x37/0xe0 [ 16.017446] ? kasan_atomics+0x152/0x310 [ 16.017473] kasan_atomics+0x1dc/0x310 [ 16.017516] ? __pfx_kasan_atomics+0x10/0x10 [ 16.017539] ? __pfx_kasan_atomics+0x10/0x10 [ 16.017596] kunit_try_run_case+0x1a5/0x480 [ 16.017621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.017654] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.017680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.017705] ? __kthread_parkme+0x82/0x180 [ 16.017726] ? preempt_count_sub+0x50/0x80 [ 16.017750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.017774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.017798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.017823] kthread+0x337/0x6f0 [ 16.017842] ? trace_preempt_on+0x20/0xc0 [ 16.017864] ? __pfx_kthread+0x10/0x10 [ 16.017885] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.017907] ? calculate_sigpending+0x7b/0xa0 [ 16.017932] ? __pfx_kthread+0x10/0x10 [ 16.017953] ret_from_fork+0x116/0x1d0 [ 16.017971] ? __pfx_kthread+0x10/0x10 [ 16.017992] ret_from_fork_asm+0x1a/0x30 [ 16.018022] </TASK> [ 16.018033] [ 16.025930] Allocated by task 284: [ 16.026060] kasan_save_stack+0x45/0x70 [ 16.026213] kasan_save_track+0x18/0x40 [ 16.026416] kasan_save_alloc_info+0x3b/0x50 [ 16.026732] __kasan_kmalloc+0xb7/0xc0 [ 16.026938] __kmalloc_cache_noprof+0x189/0x420 [ 16.027166] kasan_atomics+0x95/0x310 [ 16.027337] kunit_try_run_case+0x1a5/0x480 [ 16.027544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.027784] kthread+0x337/0x6f0 [ 16.027932] ret_from_fork+0x116/0x1d0 [ 16.028104] ret_from_fork_asm+0x1a/0x30 [ 16.028292] [ 16.028467] The buggy address belongs to the object at ffff888103a28200 [ 16.028467] which belongs to the cache kmalloc-64 of size 64 [ 16.028939] The buggy address is located 0 bytes to the right of [ 16.028939] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.029402] [ 16.029570] The buggy address belongs to the physical page: [ 16.029833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.030287] flags: 0x200000000000000(node=0|zone=2) [ 16.030605] page_type: f5(slab) [ 16.030745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.031072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.031312] page dumped because: kasan: bad access detected [ 16.031641] [ 16.031736] Memory state around the buggy address: [ 16.031966] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.032413] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.032806] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.033145] ^ [ 16.033377] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.033623] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.033940] ================================================================== [ 15.734452] ================================================================== [ 15.734775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.735040] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.735267] [ 15.735364] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.735407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.735418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.735440] Call Trace: [ 15.735454] <TASK> [ 15.735469] dump_stack_lvl+0x73/0xb0 [ 15.735518] print_report+0xd1/0x610 [ 15.735540] ? __virt_addr_valid+0x1db/0x2d0 [ 15.735563] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.735585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.735609] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.735632] kasan_report+0x141/0x180 [ 15.735654] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.735681] kasan_check_range+0x10c/0x1c0 [ 15.735706] __kasan_check_write+0x18/0x20 [ 15.735725] kasan_atomics_helper+0x19e3/0x5450 [ 15.735749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.735772] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.735796] ? trace_hardirqs_on+0x37/0xe0 [ 15.735818] ? kasan_atomics+0x152/0x310 [ 15.735846] kasan_atomics+0x1dc/0x310 [ 15.735869] ? __pfx_kasan_atomics+0x10/0x10 [ 15.735893] ? __pfx_kasan_atomics+0x10/0x10 [ 15.735921] kunit_try_run_case+0x1a5/0x480 [ 15.735944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.735968] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.735992] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.736016] ? __kthread_parkme+0x82/0x180 [ 15.736036] ? preempt_count_sub+0x50/0x80 [ 15.736061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.736086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.736110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.736135] kthread+0x337/0x6f0 [ 15.736156] ? trace_preempt_on+0x20/0xc0 [ 15.736178] ? __pfx_kthread+0x10/0x10 [ 15.736199] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.736222] ? calculate_sigpending+0x7b/0xa0 [ 15.736246] ? __pfx_kthread+0x10/0x10 [ 15.736268] ret_from_fork+0x116/0x1d0 [ 15.736287] ? __pfx_kthread+0x10/0x10 [ 15.736308] ret_from_fork_asm+0x1a/0x30 [ 15.736348] </TASK> [ 15.736358] [ 15.743694] Allocated by task 284: [ 15.743826] kasan_save_stack+0x45/0x70 [ 15.744022] kasan_save_track+0x18/0x40 [ 15.744215] kasan_save_alloc_info+0x3b/0x50 [ 15.744443] __kasan_kmalloc+0xb7/0xc0 [ 15.744653] __kmalloc_cache_noprof+0x189/0x420 [ 15.744879] kasan_atomics+0x95/0x310 [ 15.745075] kunit_try_run_case+0x1a5/0x480 [ 15.745284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.745571] kthread+0x337/0x6f0 [ 15.745747] ret_from_fork+0x116/0x1d0 [ 15.745938] ret_from_fork_asm+0x1a/0x30 [ 15.746139] [ 15.746231] The buggy address belongs to the object at ffff888103a28200 [ 15.746231] which belongs to the cache kmalloc-64 of size 64 [ 15.746621] The buggy address is located 0 bytes to the right of [ 15.746621] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.746994] [ 15.747065] The buggy address belongs to the physical page: [ 15.747240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.747609] flags: 0x200000000000000(node=0|zone=2) [ 15.747843] page_type: f5(slab) [ 15.748009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.748367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.748706] page dumped because: kasan: bad access detected [ 15.748954] [ 15.749053] Memory state around the buggy address: [ 15.749273] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.751554] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.751869] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.752087] ^ [ 15.752244] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.752544] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.752854] ================================================================== [ 14.757286] ================================================================== [ 14.757735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.758155] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.758501] [ 14.758703] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.758748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.758761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.758781] Call Trace: [ 14.758796] <TASK> [ 14.758811] dump_stack_lvl+0x73/0xb0 [ 14.758840] print_report+0xd1/0x610 [ 14.758928] ? __virt_addr_valid+0x1db/0x2d0 [ 14.758969] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.758991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.759091] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.759115] kasan_report+0x141/0x180 [ 14.759138] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.759234] __asan_report_load4_noabort+0x18/0x20 [ 14.759279] kasan_atomics_helper+0x4b54/0x5450 [ 14.759314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.759337] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.759363] ? trace_hardirqs_on+0x37/0xe0 [ 14.759384] ? kasan_atomics+0x152/0x310 [ 14.759412] kasan_atomics+0x1dc/0x310 [ 14.759435] ? __pfx_kasan_atomics+0x10/0x10 [ 14.759458] ? __pfx_kasan_atomics+0x10/0x10 [ 14.759485] kunit_try_run_case+0x1a5/0x480 [ 14.759510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.759551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.759576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.759600] ? __kthread_parkme+0x82/0x180 [ 14.759620] ? preempt_count_sub+0x50/0x80 [ 14.759645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.759669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.759694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.759719] kthread+0x337/0x6f0 [ 14.759738] ? trace_preempt_on+0x20/0xc0 [ 14.759760] ? __pfx_kthread+0x10/0x10 [ 14.759782] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.759804] ? calculate_sigpending+0x7b/0xa0 [ 14.759828] ? __pfx_kthread+0x10/0x10 [ 14.759850] ret_from_fork+0x116/0x1d0 [ 14.759869] ? __pfx_kthread+0x10/0x10 [ 14.759890] ret_from_fork_asm+0x1a/0x30 [ 14.759921] </TASK> [ 14.759932] [ 14.770984] Allocated by task 284: [ 14.771220] kasan_save_stack+0x45/0x70 [ 14.771445] kasan_save_track+0x18/0x40 [ 14.771826] kasan_save_alloc_info+0x3b/0x50 [ 14.772473] __kasan_kmalloc+0xb7/0xc0 [ 14.772924] __kmalloc_cache_noprof+0x189/0x420 [ 14.773358] kasan_atomics+0x95/0x310 [ 14.773600] kunit_try_run_case+0x1a5/0x480 [ 14.773947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.774337] kthread+0x337/0x6f0 [ 14.774693] ret_from_fork+0x116/0x1d0 [ 14.775065] ret_from_fork_asm+0x1a/0x30 [ 14.775259] [ 14.775443] The buggy address belongs to the object at ffff888103a28200 [ 14.775443] which belongs to the cache kmalloc-64 of size 64 [ 14.775920] The buggy address is located 0 bytes to the right of [ 14.775920] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.776679] [ 14.776865] The buggy address belongs to the physical page: [ 14.777826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.778253] flags: 0x200000000000000(node=0|zone=2) [ 14.778611] page_type: f5(slab) [ 14.778748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.779237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.779708] page dumped because: kasan: bad access detected [ 14.779981] [ 14.780189] Memory state around the buggy address: [ 14.780367] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.780893] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.781174] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.781754] ^ [ 14.782093] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.782390] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.782850] ================================================================== [ 15.565436] ================================================================== [ 15.566192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.566871] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.567563] [ 15.567735] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.567801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.567813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.567834] Call Trace: [ 15.567849] <TASK> [ 15.567864] dump_stack_lvl+0x73/0xb0 [ 15.567893] print_report+0xd1/0x610 [ 15.567915] ? __virt_addr_valid+0x1db/0x2d0 [ 15.567939] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.567961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.567985] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.568008] kasan_report+0x141/0x180 [ 15.568030] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.568057] __asan_report_store8_noabort+0x1b/0x30 [ 15.568083] kasan_atomics_helper+0x50d4/0x5450 [ 15.568107] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.568129] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.568154] ? trace_hardirqs_on+0x37/0xe0 [ 15.568177] ? kasan_atomics+0x152/0x310 [ 15.568205] kasan_atomics+0x1dc/0x310 [ 15.568227] ? __pfx_kasan_atomics+0x10/0x10 [ 15.568251] ? __pfx_kasan_atomics+0x10/0x10 [ 15.568278] kunit_try_run_case+0x1a5/0x480 [ 15.568303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.568338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.568362] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.568387] ? __kthread_parkme+0x82/0x180 [ 15.568407] ? preempt_count_sub+0x50/0x80 [ 15.568431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.568456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.568487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.568512] kthread+0x337/0x6f0 [ 15.568532] ? trace_preempt_on+0x20/0xc0 [ 15.568555] ? __pfx_kthread+0x10/0x10 [ 15.568576] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.568598] ? calculate_sigpending+0x7b/0xa0 [ 15.568622] ? __pfx_kthread+0x10/0x10 [ 15.568644] ret_from_fork+0x116/0x1d0 [ 15.568663] ? __pfx_kthread+0x10/0x10 [ 15.568685] ret_from_fork_asm+0x1a/0x30 [ 15.568716] </TASK> [ 15.568727] [ 15.579510] Allocated by task 284: [ 15.579816] kasan_save_stack+0x45/0x70 [ 15.580160] kasan_save_track+0x18/0x40 [ 15.580530] kasan_save_alloc_info+0x3b/0x50 [ 15.580914] __kasan_kmalloc+0xb7/0xc0 [ 15.581255] __kmalloc_cache_noprof+0x189/0x420 [ 15.581678] kasan_atomics+0x95/0x310 [ 15.582022] kunit_try_run_case+0x1a5/0x480 [ 15.582417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.582904] kthread+0x337/0x6f0 [ 15.583213] ret_from_fork+0x116/0x1d0 [ 15.583584] ret_from_fork_asm+0x1a/0x30 [ 15.583932] [ 15.584087] The buggy address belongs to the object at ffff888103a28200 [ 15.584087] which belongs to the cache kmalloc-64 of size 64 [ 15.584772] The buggy address is located 0 bytes to the right of [ 15.584772] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.585146] [ 15.585217] The buggy address belongs to the physical page: [ 15.585556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.586203] flags: 0x200000000000000(node=0|zone=2) [ 15.586670] page_type: f5(slab) [ 15.586956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.587626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.588261] page dumped because: kasan: bad access detected [ 15.588751] [ 15.588907] Memory state around the buggy address: [ 15.589273] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.589576] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.590178] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.590804] ^ [ 15.590964] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591182] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591472] ================================================================== [ 15.967182] ================================================================== [ 15.968669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.969680] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.970896] [ 15.971092] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.971139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.971152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.971173] Call Trace: [ 15.971190] <TASK> [ 15.971205] dump_stack_lvl+0x73/0xb0 [ 15.971235] print_report+0xd1/0x610 [ 15.971257] ? __virt_addr_valid+0x1db/0x2d0 [ 15.971280] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.971302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.971339] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.971362] kasan_report+0x141/0x180 [ 15.971386] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.971414] kasan_check_range+0x10c/0x1c0 [ 15.971440] __kasan_check_write+0x18/0x20 [ 15.971460] kasan_atomics_helper+0x1f43/0x5450 [ 15.971646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.971682] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.971747] ? trace_hardirqs_on+0x37/0xe0 [ 15.971773] ? kasan_atomics+0x152/0x310 [ 15.971801] kasan_atomics+0x1dc/0x310 [ 15.971824] ? __pfx_kasan_atomics+0x10/0x10 [ 15.971848] ? __pfx_kasan_atomics+0x10/0x10 [ 15.971875] kunit_try_run_case+0x1a5/0x480 [ 15.971899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.971922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.971947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.971971] ? __kthread_parkme+0x82/0x180 [ 15.971991] ? preempt_count_sub+0x50/0x80 [ 15.972015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972090] kthread+0x337/0x6f0 [ 15.972109] ? trace_preempt_on+0x20/0xc0 [ 15.972132] ? __pfx_kthread+0x10/0x10 [ 15.972153] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.972175] ? calculate_sigpending+0x7b/0xa0 [ 15.972200] ? __pfx_kthread+0x10/0x10 [ 15.972221] ret_from_fork+0x116/0x1d0 [ 15.972240] ? __pfx_kthread+0x10/0x10 [ 15.972260] ret_from_fork_asm+0x1a/0x30 [ 15.972291] </TASK> [ 15.972301] [ 15.987239] Allocated by task 284: [ 15.987534] kasan_save_stack+0x45/0x70 [ 15.987954] kasan_save_track+0x18/0x40 [ 15.988352] kasan_save_alloc_info+0x3b/0x50 [ 15.988792] __kasan_kmalloc+0xb7/0xc0 [ 15.989178] __kmalloc_cache_noprof+0x189/0x420 [ 15.989630] kasan_atomics+0x95/0x310 [ 15.989824] kunit_try_run_case+0x1a5/0x480 [ 15.989973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.990153] kthread+0x337/0x6f0 [ 15.990274] ret_from_fork+0x116/0x1d0 [ 15.990425] ret_from_fork_asm+0x1a/0x30 [ 15.990638] [ 15.990715] The buggy address belongs to the object at ffff888103a28200 [ 15.990715] which belongs to the cache kmalloc-64 of size 64 [ 15.991223] The buggy address is located 0 bytes to the right of [ 15.991223] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.991735] [ 15.991810] The buggy address belongs to the physical page: [ 15.992063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.992464] flags: 0x200000000000000(node=0|zone=2) [ 15.992723] page_type: f5(slab) [ 15.992862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.993275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.993642] page dumped because: kasan: bad access detected [ 15.993846] [ 15.993917] Memory state around the buggy address: [ 15.994100] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.994447] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.994806] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.995131] ^ [ 15.995340] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.995691] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.995940] ================================================================== [ 15.254654] ================================================================== [ 15.254986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.255675] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.255931] [ 15.256227] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.256274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.256286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.256307] Call Trace: [ 15.256337] <TASK> [ 15.256352] dump_stack_lvl+0x73/0xb0 [ 15.256382] print_report+0xd1/0x610 [ 15.256407] ? __virt_addr_valid+0x1db/0x2d0 [ 15.256432] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.256455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.256479] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.256578] kasan_report+0x141/0x180 [ 15.256602] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.256629] kasan_check_range+0x10c/0x1c0 [ 15.256653] __kasan_check_write+0x18/0x20 [ 15.256674] kasan_atomics_helper+0xfa9/0x5450 [ 15.256698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.256721] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.256746] ? trace_hardirqs_on+0x37/0xe0 [ 15.256768] ? kasan_atomics+0x152/0x310 [ 15.256796] kasan_atomics+0x1dc/0x310 [ 15.256819] ? __pfx_kasan_atomics+0x10/0x10 [ 15.256843] ? __pfx_kasan_atomics+0x10/0x10 [ 15.256870] kunit_try_run_case+0x1a5/0x480 [ 15.256895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.256918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.256942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.256974] ? __kthread_parkme+0x82/0x180 [ 15.256995] ? preempt_count_sub+0x50/0x80 [ 15.257019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.257094] kthread+0x337/0x6f0 [ 15.257114] ? trace_preempt_on+0x20/0xc0 [ 15.257135] ? __pfx_kthread+0x10/0x10 [ 15.257157] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.257179] ? calculate_sigpending+0x7b/0xa0 [ 15.257203] ? __pfx_kthread+0x10/0x10 [ 15.257225] ret_from_fork+0x116/0x1d0 [ 15.257244] ? __pfx_kthread+0x10/0x10 [ 15.257265] ret_from_fork_asm+0x1a/0x30 [ 15.257296] </TASK> [ 15.257307] [ 15.267196] Allocated by task 284: [ 15.267566] kasan_save_stack+0x45/0x70 [ 15.267877] kasan_save_track+0x18/0x40 [ 15.268116] kasan_save_alloc_info+0x3b/0x50 [ 15.268290] __kasan_kmalloc+0xb7/0xc0 [ 15.268618] __kmalloc_cache_noprof+0x189/0x420 [ 15.268861] kasan_atomics+0x95/0x310 [ 15.269046] kunit_try_run_case+0x1a5/0x480 [ 15.269242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.269481] kthread+0x337/0x6f0 [ 15.269868] ret_from_fork+0x116/0x1d0 [ 15.270116] ret_from_fork_asm+0x1a/0x30 [ 15.270280] [ 15.270393] The buggy address belongs to the object at ffff888103a28200 [ 15.270393] which belongs to the cache kmalloc-64 of size 64 [ 15.271085] The buggy address is located 0 bytes to the right of [ 15.271085] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.271949] [ 15.272106] The buggy address belongs to the physical page: [ 15.272348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.272883] flags: 0x200000000000000(node=0|zone=2) [ 15.273112] page_type: f5(slab) [ 15.273260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.273766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.274128] page dumped because: kasan: bad access detected [ 15.274344] [ 15.274574] Memory state around the buggy address: [ 15.274862] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.275135] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.275552] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.275929] ^ [ 15.276141] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.276449] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.277174] ================================================================== [ 15.231825] ================================================================== [ 15.232167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.232787] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.233108] [ 15.233219] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.233262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.233274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.233295] Call Trace: [ 15.233320] <TASK> [ 15.233335] dump_stack_lvl+0x73/0xb0 [ 15.233363] print_report+0xd1/0x610 [ 15.233385] ? __virt_addr_valid+0x1db/0x2d0 [ 15.233408] ? kasan_atomics_helper+0xf10/0x5450 [ 15.233429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.233453] ? kasan_atomics_helper+0xf10/0x5450 [ 15.233476] kasan_report+0x141/0x180 [ 15.233801] ? kasan_atomics_helper+0xf10/0x5450 [ 15.233830] kasan_check_range+0x10c/0x1c0 [ 15.233855] __kasan_check_write+0x18/0x20 [ 15.233875] kasan_atomics_helper+0xf10/0x5450 [ 15.233899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.233922] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.233946] ? trace_hardirqs_on+0x37/0xe0 [ 15.233970] ? kasan_atomics+0x152/0x310 [ 15.233997] kasan_atomics+0x1dc/0x310 [ 15.234021] ? __pfx_kasan_atomics+0x10/0x10 [ 15.234045] ? __pfx_kasan_atomics+0x10/0x10 [ 15.234072] kunit_try_run_case+0x1a5/0x480 [ 15.234097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.234120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.234144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.234169] ? __kthread_parkme+0x82/0x180 [ 15.234189] ? preempt_count_sub+0x50/0x80 [ 15.234214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.234239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.234263] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.234289] kthread+0x337/0x6f0 [ 15.234320] ? trace_preempt_on+0x20/0xc0 [ 15.234343] ? __pfx_kthread+0x10/0x10 [ 15.234364] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.234387] ? calculate_sigpending+0x7b/0xa0 [ 15.234411] ? __pfx_kthread+0x10/0x10 [ 15.234433] ret_from_fork+0x116/0x1d0 [ 15.234452] ? __pfx_kthread+0x10/0x10 [ 15.234473] ret_from_fork_asm+0x1a/0x30 [ 15.234515] </TASK> [ 15.234526] [ 15.244398] Allocated by task 284: [ 15.244787] kasan_save_stack+0x45/0x70 [ 15.245056] kasan_save_track+0x18/0x40 [ 15.245219] kasan_save_alloc_info+0x3b/0x50 [ 15.245450] __kasan_kmalloc+0xb7/0xc0 [ 15.245662] __kmalloc_cache_noprof+0x189/0x420 [ 15.246121] kasan_atomics+0x95/0x310 [ 15.246304] kunit_try_run_case+0x1a5/0x480 [ 15.246667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.246968] kthread+0x337/0x6f0 [ 15.247105] ret_from_fork+0x116/0x1d0 [ 15.247298] ret_from_fork_asm+0x1a/0x30 [ 15.247632] [ 15.247778] The buggy address belongs to the object at ffff888103a28200 [ 15.247778] which belongs to the cache kmalloc-64 of size 64 [ 15.248356] The buggy address is located 0 bytes to the right of [ 15.248356] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.248981] [ 15.249196] The buggy address belongs to the physical page: [ 15.249408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.249945] flags: 0x200000000000000(node=0|zone=2) [ 15.250128] page_type: f5(slab) [ 15.250385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.250879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.251250] page dumped because: kasan: bad access detected [ 15.251578] [ 15.251691] Memory state around the buggy address: [ 15.251859] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.252172] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.252727] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.253021] ^ [ 15.253236] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.253652] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254016] ================================================================== [ 14.709354] ================================================================== [ 14.709765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.710283] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.710582] [ 14.710723] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.710768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.710790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.710812] Call Trace: [ 14.710828] <TASK> [ 14.710843] dump_stack_lvl+0x73/0xb0 [ 14.710871] print_report+0xd1/0x610 [ 14.710893] ? __virt_addr_valid+0x1db/0x2d0 [ 14.710915] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.710937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.710961] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.710984] kasan_report+0x141/0x180 [ 14.711111] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.711142] __asan_report_store4_noabort+0x1b/0x30 [ 14.711169] kasan_atomics_helper+0x4b6e/0x5450 [ 14.711202] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.711225] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.711250] ? trace_hardirqs_on+0x37/0xe0 [ 14.711273] ? kasan_atomics+0x152/0x310 [ 14.711339] kasan_atomics+0x1dc/0x310 [ 14.711363] ? __pfx_kasan_atomics+0x10/0x10 [ 14.711399] ? __pfx_kasan_atomics+0x10/0x10 [ 14.711426] kunit_try_run_case+0x1a5/0x480 [ 14.711451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711475] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.711499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.711524] ? __kthread_parkme+0x82/0x180 [ 14.711545] ? preempt_count_sub+0x50/0x80 [ 14.711570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.711649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.711686] kthread+0x337/0x6f0 [ 14.711707] ? trace_preempt_on+0x20/0xc0 [ 14.711730] ? __pfx_kthread+0x10/0x10 [ 14.711751] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.711774] ? calculate_sigpending+0x7b/0xa0 [ 14.711827] ? __pfx_kthread+0x10/0x10 [ 14.711848] ret_from_fork+0x116/0x1d0 [ 14.711867] ? __pfx_kthread+0x10/0x10 [ 14.711899] ret_from_fork_asm+0x1a/0x30 [ 14.711930] </TASK> [ 14.711941] [ 14.722488] Allocated by task 284: [ 14.722621] kasan_save_stack+0x45/0x70 [ 14.722828] kasan_save_track+0x18/0x40 [ 14.723059] kasan_save_alloc_info+0x3b/0x50 [ 14.723397] __kasan_kmalloc+0xb7/0xc0 [ 14.723676] __kmalloc_cache_noprof+0x189/0x420 [ 14.723918] kasan_atomics+0x95/0x310 [ 14.724071] kunit_try_run_case+0x1a5/0x480 [ 14.724451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.724789] kthread+0x337/0x6f0 [ 14.725025] ret_from_fork+0x116/0x1d0 [ 14.725180] ret_from_fork_asm+0x1a/0x30 [ 14.725449] [ 14.725526] The buggy address belongs to the object at ffff888103a28200 [ 14.725526] which belongs to the cache kmalloc-64 of size 64 [ 14.726208] The buggy address is located 0 bytes to the right of [ 14.726208] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.726998] [ 14.727112] The buggy address belongs to the physical page: [ 14.727377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.727804] flags: 0x200000000000000(node=0|zone=2) [ 14.728090] page_type: f5(slab) [ 14.729912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.730182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.730441] page dumped because: kasan: bad access detected [ 14.730617] [ 14.730688] Memory state around the buggy address: [ 14.730847] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.731069] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.731287] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.731513] ^ [ 14.731678] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.732643] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.733004] ================================================================== [ 15.946146] ================================================================== [ 15.946838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.947560] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.948168] [ 15.948349] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.948394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.948407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.948428] Call Trace: [ 15.948445] <TASK> [ 15.948460] dump_stack_lvl+0x73/0xb0 [ 15.948510] print_report+0xd1/0x610 [ 15.948533] ? __virt_addr_valid+0x1db/0x2d0 [ 15.948556] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.948578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.948602] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.948624] kasan_report+0x141/0x180 [ 15.948647] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.948674] kasan_check_range+0x10c/0x1c0 [ 15.948698] __kasan_check_write+0x18/0x20 [ 15.948719] kasan_atomics_helper+0x1eaa/0x5450 [ 15.948744] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.948767] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.948791] ? trace_hardirqs_on+0x37/0xe0 [ 15.948812] ? kasan_atomics+0x152/0x310 [ 15.948839] kasan_atomics+0x1dc/0x310 [ 15.948862] ? __pfx_kasan_atomics+0x10/0x10 [ 15.948885] ? __pfx_kasan_atomics+0x10/0x10 [ 15.948913] kunit_try_run_case+0x1a5/0x480 [ 15.948937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.948960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.948993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.949017] ? __kthread_parkme+0x82/0x180 [ 15.949038] ? preempt_count_sub+0x50/0x80 [ 15.949062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.949086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.949111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.949139] kthread+0x337/0x6f0 [ 15.949159] ? trace_preempt_on+0x20/0xc0 [ 15.949182] ? __pfx_kthread+0x10/0x10 [ 15.949203] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.949226] ? calculate_sigpending+0x7b/0xa0 [ 15.949251] ? __pfx_kthread+0x10/0x10 [ 15.949272] ret_from_fork+0x116/0x1d0 [ 15.949292] ? __pfx_kthread+0x10/0x10 [ 15.949313] ret_from_fork_asm+0x1a/0x30 [ 15.949353] </TASK> [ 15.949364] [ 15.959005] Allocated by task 284: [ 15.959203] kasan_save_stack+0x45/0x70 [ 15.959403] kasan_save_track+0x18/0x40 [ 15.959708] kasan_save_alloc_info+0x3b/0x50 [ 15.959886] __kasan_kmalloc+0xb7/0xc0 [ 15.960078] __kmalloc_cache_noprof+0x189/0x420 [ 15.960258] kasan_atomics+0x95/0x310 [ 15.960403] kunit_try_run_case+0x1a5/0x480 [ 15.960756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.961008] kthread+0x337/0x6f0 [ 15.961158] ret_from_fork+0x116/0x1d0 [ 15.961291] ret_from_fork_asm+0x1a/0x30 [ 15.961440] [ 15.961512] The buggy address belongs to the object at ffff888103a28200 [ 15.961512] which belongs to the cache kmalloc-64 of size 64 [ 15.961938] The buggy address is located 0 bytes to the right of [ 15.961938] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.962497] [ 15.962594] The buggy address belongs to the physical page: [ 15.962842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.963166] flags: 0x200000000000000(node=0|zone=2) [ 15.963339] page_type: f5(slab) [ 15.963460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.964211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.964512] page dumped because: kasan: bad access detected [ 15.964730] [ 15.964825] Memory state around the buggy address: [ 15.965026] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.965331] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.965671] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.965924] ^ [ 15.966142] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.966430] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.966753] ================================================================== [ 15.894805] ================================================================== [ 15.895218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.895904] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.896231] [ 15.896347] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.896392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.896405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.896427] Call Trace: [ 15.896442] <TASK> [ 15.896456] dump_stack_lvl+0x73/0xb0 [ 15.896486] print_report+0xd1/0x610 [ 15.896805] ? __virt_addr_valid+0x1db/0x2d0 [ 15.896833] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.896855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.896879] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.896902] kasan_report+0x141/0x180 [ 15.896925] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.896951] kasan_check_range+0x10c/0x1c0 [ 15.896983] __kasan_check_write+0x18/0x20 [ 15.897002] kasan_atomics_helper+0x1d7a/0x5450 [ 15.897026] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.897049] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.897073] ? trace_hardirqs_on+0x37/0xe0 [ 15.897096] ? kasan_atomics+0x152/0x310 [ 15.897123] kasan_atomics+0x1dc/0x310 [ 15.897146] ? __pfx_kasan_atomics+0x10/0x10 [ 15.897170] ? __pfx_kasan_atomics+0x10/0x10 [ 15.897198] kunit_try_run_case+0x1a5/0x480 [ 15.897222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.897245] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.897270] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.897297] ? __kthread_parkme+0x82/0x180 [ 15.897330] ? preempt_count_sub+0x50/0x80 [ 15.897356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.897380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.897405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.897431] kthread+0x337/0x6f0 [ 15.897451] ? trace_preempt_on+0x20/0xc0 [ 15.897473] ? __pfx_kthread+0x10/0x10 [ 15.897494] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.897518] ? calculate_sigpending+0x7b/0xa0 [ 15.897542] ? __pfx_kthread+0x10/0x10 [ 15.897564] ret_from_fork+0x116/0x1d0 [ 15.897583] ? __pfx_kthread+0x10/0x10 [ 15.897604] ret_from_fork_asm+0x1a/0x30 [ 15.897634] </TASK> [ 15.897645] [ 15.908783] Allocated by task 284: [ 15.909156] kasan_save_stack+0x45/0x70 [ 15.909482] kasan_save_track+0x18/0x40 [ 15.909683] kasan_save_alloc_info+0x3b/0x50 [ 15.909886] __kasan_kmalloc+0xb7/0xc0 [ 15.910084] __kmalloc_cache_noprof+0x189/0x420 [ 15.910296] kasan_atomics+0x95/0x310 [ 15.910491] kunit_try_run_case+0x1a5/0x480 [ 15.911041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.911376] kthread+0x337/0x6f0 [ 15.911520] ret_from_fork+0x116/0x1d0 [ 15.911794] ret_from_fork_asm+0x1a/0x30 [ 15.912216] [ 15.912331] The buggy address belongs to the object at ffff888103a28200 [ 15.912331] which belongs to the cache kmalloc-64 of size 64 [ 15.912874] The buggy address is located 0 bytes to the right of [ 15.912874] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.913866] [ 15.913950] The buggy address belongs to the physical page: [ 15.914423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.914889] flags: 0x200000000000000(node=0|zone=2) [ 15.915207] page_type: f5(slab) [ 15.915349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.915739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.916059] page dumped because: kasan: bad access detected [ 15.916302] [ 15.916730] Memory state around the buggy address: [ 15.916934] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.917452] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.917993] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.918412] ^ [ 15.918779] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.919182] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.919530] ================================================================== [ 15.781977] ================================================================== [ 15.782660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.782925] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.783145] [ 15.783232] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.783278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.783291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.783312] Call Trace: [ 15.783341] <TASK> [ 15.783356] dump_stack_lvl+0x73/0xb0 [ 15.783385] print_report+0xd1/0x610 [ 15.783409] ? __virt_addr_valid+0x1db/0x2d0 [ 15.783432] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.783454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.783478] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.783500] kasan_report+0x141/0x180 [ 15.783523] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.783561] kasan_check_range+0x10c/0x1c0 [ 15.783585] __kasan_check_write+0x18/0x20 [ 15.783606] kasan_atomics_helper+0x1b22/0x5450 [ 15.783629] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.783652] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.783677] ? trace_hardirqs_on+0x37/0xe0 [ 15.783700] ? kasan_atomics+0x152/0x310 [ 15.783727] kasan_atomics+0x1dc/0x310 [ 15.783751] ? __pfx_kasan_atomics+0x10/0x10 [ 15.783774] ? __pfx_kasan_atomics+0x10/0x10 [ 15.783802] kunit_try_run_case+0x1a5/0x480 [ 15.783826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.783850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.783875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.783899] ? __kthread_parkme+0x82/0x180 [ 15.783919] ? preempt_count_sub+0x50/0x80 [ 15.783944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.783969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.783993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.784018] kthread+0x337/0x6f0 [ 15.784039] ? trace_preempt_on+0x20/0xc0 [ 15.784061] ? __pfx_kthread+0x10/0x10 [ 15.784082] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.784104] ? calculate_sigpending+0x7b/0xa0 [ 15.784130] ? __pfx_kthread+0x10/0x10 [ 15.784151] ret_from_fork+0x116/0x1d0 [ 15.784171] ? __pfx_kthread+0x10/0x10 [ 15.784193] ret_from_fork_asm+0x1a/0x30 [ 15.784223] </TASK> [ 15.784235] [ 15.793655] Allocated by task 284: [ 15.793852] kasan_save_stack+0x45/0x70 [ 15.794048] kasan_save_track+0x18/0x40 [ 15.794235] kasan_save_alloc_info+0x3b/0x50 [ 15.794451] __kasan_kmalloc+0xb7/0xc0 [ 15.794706] __kmalloc_cache_noprof+0x189/0x420 [ 15.794860] kasan_atomics+0x95/0x310 [ 15.794996] kunit_try_run_case+0x1a5/0x480 [ 15.795205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.795473] kthread+0x337/0x6f0 [ 15.795637] ret_from_fork+0x116/0x1d0 [ 15.795799] ret_from_fork_asm+0x1a/0x30 [ 15.795980] [ 15.796067] The buggy address belongs to the object at ffff888103a28200 [ 15.796067] which belongs to the cache kmalloc-64 of size 64 [ 15.796576] The buggy address is located 0 bytes to the right of [ 15.796576] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.797050] [ 15.797144] The buggy address belongs to the physical page: [ 15.797362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.797712] flags: 0x200000000000000(node=0|zone=2) [ 15.797924] page_type: f5(slab) [ 15.798088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.798386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.798668] page dumped because: kasan: bad access detected [ 15.798872] [ 15.798960] Memory state around the buggy address: [ 15.799176] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.799451] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.799857] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.800065] ^ [ 15.800217] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.800712] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802094] ================================================================== [ 15.470905] ================================================================== [ 15.471548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.471969] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.472294] [ 15.472399] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.472444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.472457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.472478] Call Trace: [ 15.472495] <TASK> [ 15.472511] dump_stack_lvl+0x73/0xb0 [ 15.472539] print_report+0xd1/0x610 [ 15.472562] ? __virt_addr_valid+0x1db/0x2d0 [ 15.472585] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.472606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.472632] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.472654] kasan_report+0x141/0x180 [ 15.472677] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.472705] __asan_report_load4_noabort+0x18/0x20 [ 15.472730] kasan_atomics_helper+0x49ce/0x5450 [ 15.472754] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.472777] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.472802] ? trace_hardirqs_on+0x37/0xe0 [ 15.472826] ? kasan_atomics+0x152/0x310 [ 15.472852] kasan_atomics+0x1dc/0x310 [ 15.472876] ? __pfx_kasan_atomics+0x10/0x10 [ 15.472900] ? __pfx_kasan_atomics+0x10/0x10 [ 15.472927] kunit_try_run_case+0x1a5/0x480 [ 15.472952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.472980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.473004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.473029] ? __kthread_parkme+0x82/0x180 [ 15.473050] ? preempt_count_sub+0x50/0x80 [ 15.473073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.473098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.473123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.473148] kthread+0x337/0x6f0 [ 15.473168] ? trace_preempt_on+0x20/0xc0 [ 15.473190] ? __pfx_kthread+0x10/0x10 [ 15.473212] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.473234] ? calculate_sigpending+0x7b/0xa0 [ 15.473258] ? __pfx_kthread+0x10/0x10 [ 15.473280] ret_from_fork+0x116/0x1d0 [ 15.473300] ? __pfx_kthread+0x10/0x10 [ 15.473617] ret_from_fork_asm+0x1a/0x30 [ 15.473654] </TASK> [ 15.473665] [ 15.483940] Allocated by task 284: [ 15.484258] kasan_save_stack+0x45/0x70 [ 15.484582] kasan_save_track+0x18/0x40 [ 15.484857] kasan_save_alloc_info+0x3b/0x50 [ 15.485164] __kasan_kmalloc+0xb7/0xc0 [ 15.485361] __kmalloc_cache_noprof+0x189/0x420 [ 15.485736] kasan_atomics+0x95/0x310 [ 15.485935] kunit_try_run_case+0x1a5/0x480 [ 15.486265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.486632] kthread+0x337/0x6f0 [ 15.486888] ret_from_fork+0x116/0x1d0 [ 15.487041] ret_from_fork_asm+0x1a/0x30 [ 15.487267] [ 15.487377] The buggy address belongs to the object at ffff888103a28200 [ 15.487377] which belongs to the cache kmalloc-64 of size 64 [ 15.488145] The buggy address is located 0 bytes to the right of [ 15.488145] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.488778] [ 15.488940] The buggy address belongs to the physical page: [ 15.489194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.489721] flags: 0x200000000000000(node=0|zone=2) [ 15.490014] page_type: f5(slab) [ 15.490153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.490511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.491034] page dumped because: kasan: bad access detected [ 15.491357] [ 15.491458] Memory state around the buggy address: [ 15.491852] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.492234] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.492663] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.492956] ^ [ 15.493184] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.493494] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.494040] ================================================================== [ 15.494912] ================================================================== [ 15.495932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.496336] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.496764] [ 15.497162] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.497212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.497225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.497246] Call Trace: [ 15.497261] <TASK> [ 15.497275] dump_stack_lvl+0x73/0xb0 [ 15.497304] print_report+0xd1/0x610 [ 15.497341] ? __virt_addr_valid+0x1db/0x2d0 [ 15.497364] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.497386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.497410] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.497432] kasan_report+0x141/0x180 [ 15.497455] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.497482] kasan_check_range+0x10c/0x1c0 [ 15.497596] __kasan_check_read+0x15/0x20 [ 15.497620] kasan_atomics_helper+0x13b5/0x5450 [ 15.497643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.497666] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.497691] ? trace_hardirqs_on+0x37/0xe0 [ 15.497713] ? kasan_atomics+0x152/0x310 [ 15.497741] kasan_atomics+0x1dc/0x310 [ 15.497764] ? __pfx_kasan_atomics+0x10/0x10 [ 15.497787] ? __pfx_kasan_atomics+0x10/0x10 [ 15.497815] kunit_try_run_case+0x1a5/0x480 [ 15.497839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.497863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.497887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.497911] ? __kthread_parkme+0x82/0x180 [ 15.497931] ? preempt_count_sub+0x50/0x80 [ 15.497956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.497980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.498004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.498029] kthread+0x337/0x6f0 [ 15.498048] ? trace_preempt_on+0x20/0xc0 [ 15.498070] ? __pfx_kthread+0x10/0x10 [ 15.498091] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.498113] ? calculate_sigpending+0x7b/0xa0 [ 15.498137] ? __pfx_kthread+0x10/0x10 [ 15.498158] ret_from_fork+0x116/0x1d0 [ 15.498177] ? __pfx_kthread+0x10/0x10 [ 15.498198] ret_from_fork_asm+0x1a/0x30 [ 15.498228] </TASK> [ 15.498238] [ 15.509094] Allocated by task 284: [ 15.509262] kasan_save_stack+0x45/0x70 [ 15.509483] kasan_save_track+0x18/0x40 [ 15.509905] kasan_save_alloc_info+0x3b/0x50 [ 15.510192] __kasan_kmalloc+0xb7/0xc0 [ 15.510385] __kmalloc_cache_noprof+0x189/0x420 [ 15.510792] kasan_atomics+0x95/0x310 [ 15.511065] kunit_try_run_case+0x1a5/0x480 [ 15.511352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.511669] kthread+0x337/0x6f0 [ 15.511920] ret_from_fork+0x116/0x1d0 [ 15.512096] ret_from_fork_asm+0x1a/0x30 [ 15.512292] [ 15.512398] The buggy address belongs to the object at ffff888103a28200 [ 15.512398] which belongs to the cache kmalloc-64 of size 64 [ 15.513172] The buggy address is located 0 bytes to the right of [ 15.513172] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.513945] [ 15.514035] The buggy address belongs to the physical page: [ 15.514399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.514859] flags: 0x200000000000000(node=0|zone=2) [ 15.515205] page_type: f5(slab) [ 15.515395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.515933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.516346] page dumped because: kasan: bad access detected [ 15.516726] [ 15.516828] Memory state around the buggy address: [ 15.517136] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.517440] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.517949] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.518539] ^ [ 15.518727] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.519046] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.519365] ================================================================== [ 15.803451] ================================================================== [ 15.804716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.805610] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.806104] [ 15.806196] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.806241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.806254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.806275] Call Trace: [ 15.806291] <TASK> [ 15.806307] dump_stack_lvl+0x73/0xb0 [ 15.806351] print_report+0xd1/0x610 [ 15.806373] ? __virt_addr_valid+0x1db/0x2d0 [ 15.806395] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.806418] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.806442] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.806464] kasan_report+0x141/0x180 [ 15.806493] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.806520] kasan_check_range+0x10c/0x1c0 [ 15.806544] __kasan_check_write+0x18/0x20 [ 15.806565] kasan_atomics_helper+0x1c18/0x5450 [ 15.806588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.806611] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.806636] ? trace_hardirqs_on+0x37/0xe0 [ 15.806658] ? kasan_atomics+0x152/0x310 [ 15.806686] kasan_atomics+0x1dc/0x310 [ 15.806709] ? __pfx_kasan_atomics+0x10/0x10 [ 15.806733] ? __pfx_kasan_atomics+0x10/0x10 [ 15.806760] kunit_try_run_case+0x1a5/0x480 [ 15.806784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.806807] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.806832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.806856] ? __kthread_parkme+0x82/0x180 [ 15.806876] ? preempt_count_sub+0x50/0x80 [ 15.806901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.806925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.806949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.806974] kthread+0x337/0x6f0 [ 15.806993] ? trace_preempt_on+0x20/0xc0 [ 15.807016] ? __pfx_kthread+0x10/0x10 [ 15.807037] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.807059] ? calculate_sigpending+0x7b/0xa0 [ 15.807083] ? __pfx_kthread+0x10/0x10 [ 15.807105] ret_from_fork+0x116/0x1d0 [ 15.807123] ? __pfx_kthread+0x10/0x10 [ 15.807144] ret_from_fork_asm+0x1a/0x30 [ 15.807174] </TASK> [ 15.807184] [ 15.823851] Allocated by task 284: [ 15.824204] kasan_save_stack+0x45/0x70 [ 15.824613] kasan_save_track+0x18/0x40 [ 15.824984] kasan_save_alloc_info+0x3b/0x50 [ 15.825394] __kasan_kmalloc+0xb7/0xc0 [ 15.825793] __kmalloc_cache_noprof+0x189/0x420 [ 15.826079] kasan_atomics+0x95/0x310 [ 15.826218] kunit_try_run_case+0x1a5/0x480 [ 15.826377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.826688] kthread+0x337/0x6f0 [ 15.827014] ret_from_fork+0x116/0x1d0 [ 15.827384] ret_from_fork_asm+0x1a/0x30 [ 15.827766] [ 15.827945] The buggy address belongs to the object at ffff888103a28200 [ 15.827945] which belongs to the cache kmalloc-64 of size 64 [ 15.829142] The buggy address is located 0 bytes to the right of [ 15.829142] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.829775] [ 15.829855] The buggy address belongs to the physical page: [ 15.830028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.830268] flags: 0x200000000000000(node=0|zone=2) [ 15.830441] page_type: f5(slab) [ 15.830812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.831749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.832497] page dumped because: kasan: bad access detected [ 15.833066] [ 15.833230] Memory state around the buggy address: [ 15.833838] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.834574] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.835292] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.835999] ^ [ 15.836331] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.836576] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837332] ================================================================== [ 15.920385] ================================================================== [ 15.921137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.921602] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.921853] [ 15.922178] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.922357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.922373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.922395] Call Trace: [ 15.922409] <TASK> [ 15.922424] dump_stack_lvl+0x73/0xb0 [ 15.922455] print_report+0xd1/0x610 [ 15.922478] ? __virt_addr_valid+0x1db/0x2d0 [ 15.922511] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.922533] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.922557] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.922580] kasan_report+0x141/0x180 [ 15.922604] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.922632] kasan_check_range+0x10c/0x1c0 [ 15.922660] __kasan_check_write+0x18/0x20 [ 15.922681] kasan_atomics_helper+0x1e12/0x5450 [ 15.922704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.922727] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.922751] ? trace_hardirqs_on+0x37/0xe0 [ 15.922775] ? kasan_atomics+0x152/0x310 [ 15.922802] kasan_atomics+0x1dc/0x310 [ 15.922825] ? __pfx_kasan_atomics+0x10/0x10 [ 15.922849] ? __pfx_kasan_atomics+0x10/0x10 [ 15.922876] kunit_try_run_case+0x1a5/0x480 [ 15.922902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.922926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.922951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.922975] ? __kthread_parkme+0x82/0x180 [ 15.922996] ? preempt_count_sub+0x50/0x80 [ 15.923021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.923046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.923071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.923096] kthread+0x337/0x6f0 [ 15.923115] ? trace_preempt_on+0x20/0xc0 [ 15.923138] ? __pfx_kthread+0x10/0x10 [ 15.923159] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.923181] ? calculate_sigpending+0x7b/0xa0 [ 15.923205] ? __pfx_kthread+0x10/0x10 [ 15.923227] ret_from_fork+0x116/0x1d0 [ 15.923246] ? __pfx_kthread+0x10/0x10 [ 15.923267] ret_from_fork_asm+0x1a/0x30 [ 15.923297] </TASK> [ 15.923308] [ 15.934444] Allocated by task 284: [ 15.934602] kasan_save_stack+0x45/0x70 [ 15.935066] kasan_save_track+0x18/0x40 [ 15.935380] kasan_save_alloc_info+0x3b/0x50 [ 15.935781] __kasan_kmalloc+0xb7/0xc0 [ 15.936113] __kmalloc_cache_noprof+0x189/0x420 [ 15.936453] kasan_atomics+0x95/0x310 [ 15.936620] kunit_try_run_case+0x1a5/0x480 [ 15.936771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.936951] kthread+0x337/0x6f0 [ 15.937086] ret_from_fork+0x116/0x1d0 [ 15.937221] ret_from_fork_asm+0x1a/0x30 [ 15.937421] [ 15.937556] The buggy address belongs to the object at ffff888103a28200 [ 15.937556] which belongs to the cache kmalloc-64 of size 64 [ 15.938170] The buggy address is located 0 bytes to the right of [ 15.938170] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.939074] [ 15.939234] The buggy address belongs to the physical page: [ 15.939761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.940211] flags: 0x200000000000000(node=0|zone=2) [ 15.940388] page_type: f5(slab) [ 15.940559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.941247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.941921] page dumped because: kasan: bad access detected [ 15.942408] [ 15.942551] Memory state around the buggy address: [ 15.942709] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.942930] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.943148] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.943447] ^ [ 15.943878] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.944508] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945117] ================================================================== [ 15.447224] ================================================================== [ 15.447789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.448246] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.448493] [ 15.448774] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.448824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.448957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.448988] Call Trace: [ 15.449004] <TASK> [ 15.449018] dump_stack_lvl+0x73/0xb0 [ 15.449048] print_report+0xd1/0x610 [ 15.449070] ? __virt_addr_valid+0x1db/0x2d0 [ 15.449093] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.449114] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.449138] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.449162] kasan_report+0x141/0x180 [ 15.449185] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.449211] kasan_check_range+0x10c/0x1c0 [ 15.449236] __kasan_check_write+0x18/0x20 [ 15.449255] kasan_atomics_helper+0x12e6/0x5450 [ 15.449279] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.449301] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.449337] ? trace_hardirqs_on+0x37/0xe0 [ 15.449360] ? kasan_atomics+0x152/0x310 [ 15.449388] kasan_atomics+0x1dc/0x310 [ 15.449411] ? __pfx_kasan_atomics+0x10/0x10 [ 15.449434] ? __pfx_kasan_atomics+0x10/0x10 [ 15.449461] kunit_try_run_case+0x1a5/0x480 [ 15.449486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.449510] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.449536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.449561] ? __kthread_parkme+0x82/0x180 [ 15.449581] ? preempt_count_sub+0x50/0x80 [ 15.449606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.449629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.449654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.449679] kthread+0x337/0x6f0 [ 15.449698] ? trace_preempt_on+0x20/0xc0 [ 15.449721] ? __pfx_kthread+0x10/0x10 [ 15.449743] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.449765] ? calculate_sigpending+0x7b/0xa0 [ 15.449790] ? __pfx_kthread+0x10/0x10 [ 15.449812] ret_from_fork+0x116/0x1d0 [ 15.449832] ? __pfx_kthread+0x10/0x10 [ 15.449853] ret_from_fork_asm+0x1a/0x30 [ 15.449884] </TASK> [ 15.449895] [ 15.460192] Allocated by task 284: [ 15.460375] kasan_save_stack+0x45/0x70 [ 15.460628] kasan_save_track+0x18/0x40 [ 15.461084] kasan_save_alloc_info+0x3b/0x50 [ 15.461408] __kasan_kmalloc+0xb7/0xc0 [ 15.461592] __kmalloc_cache_noprof+0x189/0x420 [ 15.461890] kasan_atomics+0x95/0x310 [ 15.462126] kunit_try_run_case+0x1a5/0x480 [ 15.462324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.462710] kthread+0x337/0x6f0 [ 15.462880] ret_from_fork+0x116/0x1d0 [ 15.463201] ret_from_fork_asm+0x1a/0x30 [ 15.463514] [ 15.463613] The buggy address belongs to the object at ffff888103a28200 [ 15.463613] which belongs to the cache kmalloc-64 of size 64 [ 15.464221] The buggy address is located 0 bytes to the right of [ 15.464221] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.464945] [ 15.465058] The buggy address belongs to the physical page: [ 15.465450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.465879] flags: 0x200000000000000(node=0|zone=2) [ 15.466194] page_type: f5(slab) [ 15.466334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.466904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.467302] page dumped because: kasan: bad access detected [ 15.467624] [ 15.467726] Memory state around the buggy address: [ 15.468016] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.468329] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.468624] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.468901] ^ [ 15.469103] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.469794] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.470148] ================================================================== [ 15.540478] ================================================================== [ 15.540836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.541627] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.541952] [ 15.542062] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.542105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.542118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.542163] Call Trace: [ 15.542179] <TASK> [ 15.542194] dump_stack_lvl+0x73/0xb0 [ 15.542223] print_report+0xd1/0x610 [ 15.542244] ? __virt_addr_valid+0x1db/0x2d0 [ 15.542267] ? kasan_atomics_helper+0x1467/0x5450 [ 15.542291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.542325] ? kasan_atomics_helper+0x1467/0x5450 [ 15.542347] kasan_report+0x141/0x180 [ 15.542370] ? kasan_atomics_helper+0x1467/0x5450 [ 15.542397] kasan_check_range+0x10c/0x1c0 [ 15.542421] __kasan_check_write+0x18/0x20 [ 15.542441] kasan_atomics_helper+0x1467/0x5450 [ 15.542465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.542488] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.542526] ? trace_hardirqs_on+0x37/0xe0 [ 15.542549] ? kasan_atomics+0x152/0x310 [ 15.542593] kasan_atomics+0x1dc/0x310 [ 15.542618] ? __pfx_kasan_atomics+0x10/0x10 [ 15.542656] ? __pfx_kasan_atomics+0x10/0x10 [ 15.542683] kunit_try_run_case+0x1a5/0x480 [ 15.542721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.542757] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.542795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.542819] ? __kthread_parkme+0x82/0x180 [ 15.542853] ? preempt_count_sub+0x50/0x80 [ 15.542878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.542903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.542927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.542952] kthread+0x337/0x6f0 [ 15.542972] ? trace_preempt_on+0x20/0xc0 [ 15.542994] ? __pfx_kthread+0x10/0x10 [ 15.543015] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.543037] ? calculate_sigpending+0x7b/0xa0 [ 15.543062] ? __pfx_kthread+0x10/0x10 [ 15.543084] ret_from_fork+0x116/0x1d0 [ 15.543103] ? __pfx_kthread+0x10/0x10 [ 15.543123] ret_from_fork_asm+0x1a/0x30 [ 15.543154] </TASK> [ 15.543165] [ 15.551079] Allocated by task 284: [ 15.551207] kasan_save_stack+0x45/0x70 [ 15.552250] kasan_save_track+0x18/0x40 [ 15.552891] kasan_save_alloc_info+0x3b/0x50 [ 15.553467] __kasan_kmalloc+0xb7/0xc0 [ 15.554005] __kmalloc_cache_noprof+0x189/0x420 [ 15.554621] kasan_atomics+0x95/0x310 [ 15.555243] kunit_try_run_case+0x1a5/0x480 [ 15.555626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.556033] kthread+0x337/0x6f0 [ 15.556167] ret_from_fork+0x116/0x1d0 [ 15.556306] ret_from_fork_asm+0x1a/0x30 [ 15.556749] [ 15.556927] The buggy address belongs to the object at ffff888103a28200 [ 15.556927] which belongs to the cache kmalloc-64 of size 64 [ 15.557994] The buggy address is located 0 bytes to the right of [ 15.557994] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.558630] [ 15.558810] The buggy address belongs to the physical page: [ 15.559293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.559733] flags: 0x200000000000000(node=0|zone=2) [ 15.559904] page_type: f5(slab) [ 15.560028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.560262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.560559] page dumped because: kasan: bad access detected [ 15.561109] [ 15.561277] Memory state around the buggy address: [ 15.561734] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.562359] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.562996] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.563634] ^ [ 15.564063] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.564706] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.565013] ================================================================== [ 15.119214] ================================================================== [ 15.119969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.120338] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.121011] [ 15.121141] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.121189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.121215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.121236] Call Trace: [ 15.121253] <TASK> [ 15.121269] dump_stack_lvl+0x73/0xb0 [ 15.121299] print_report+0xd1/0x610 [ 15.121529] ? __virt_addr_valid+0x1db/0x2d0 [ 15.121578] ? kasan_atomics_helper+0xc70/0x5450 [ 15.121601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.121625] ? kasan_atomics_helper+0xc70/0x5450 [ 15.121647] kasan_report+0x141/0x180 [ 15.121670] ? kasan_atomics_helper+0xc70/0x5450 [ 15.121697] kasan_check_range+0x10c/0x1c0 [ 15.121722] __kasan_check_write+0x18/0x20 [ 15.121742] kasan_atomics_helper+0xc70/0x5450 [ 15.121766] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.121789] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.121814] ? trace_hardirqs_on+0x37/0xe0 [ 15.121836] ? kasan_atomics+0x152/0x310 [ 15.121863] kasan_atomics+0x1dc/0x310 [ 15.121886] ? __pfx_kasan_atomics+0x10/0x10 [ 15.121910] ? __pfx_kasan_atomics+0x10/0x10 [ 15.121938] kunit_try_run_case+0x1a5/0x480 [ 15.121962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.121985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.122011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.122035] ? __kthread_parkme+0x82/0x180 [ 15.122055] ? preempt_count_sub+0x50/0x80 [ 15.122080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.122104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.122129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.122154] kthread+0x337/0x6f0 [ 15.122174] ? trace_preempt_on+0x20/0xc0 [ 15.122196] ? __pfx_kthread+0x10/0x10 [ 15.122216] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.122239] ? calculate_sigpending+0x7b/0xa0 [ 15.122263] ? __pfx_kthread+0x10/0x10 [ 15.122285] ret_from_fork+0x116/0x1d0 [ 15.122305] ? __pfx_kthread+0x10/0x10 [ 15.122336] ret_from_fork_asm+0x1a/0x30 [ 15.122367] </TASK> [ 15.122377] [ 15.130322] Allocated by task 284: [ 15.130510] kasan_save_stack+0x45/0x70 [ 15.130732] kasan_save_track+0x18/0x40 [ 15.130923] kasan_save_alloc_info+0x3b/0x50 [ 15.131150] __kasan_kmalloc+0xb7/0xc0 [ 15.131336] __kmalloc_cache_noprof+0x189/0x420 [ 15.131530] kasan_atomics+0x95/0x310 [ 15.131715] kunit_try_run_case+0x1a5/0x480 [ 15.131930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.132178] kthread+0x337/0x6f0 [ 15.132365] ret_from_fork+0x116/0x1d0 [ 15.132515] ret_from_fork_asm+0x1a/0x30 [ 15.132706] [ 15.132793] The buggy address belongs to the object at ffff888103a28200 [ 15.132793] which belongs to the cache kmalloc-64 of size 64 [ 15.133330] The buggy address is located 0 bytes to the right of [ 15.133330] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.133897] [ 15.133992] The buggy address belongs to the physical page: [ 15.134247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.134601] flags: 0x200000000000000(node=0|zone=2) [ 15.134832] page_type: f5(slab) [ 15.134976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.135207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.135438] page dumped because: kasan: bad access detected [ 15.136002] [ 15.136098] Memory state around the buggy address: [ 15.136357] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.136727] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.137043] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.137365] ^ [ 15.137601] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.137908] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.138200] ================================================================== [ 14.641439] ================================================================== [ 14.642330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.642665] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.643516] [ 14.643650] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.643697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.643710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.643732] Call Trace: [ 14.643743] <TASK> [ 14.643759] dump_stack_lvl+0x73/0xb0 [ 14.643790] print_report+0xd1/0x610 [ 14.643812] ? __virt_addr_valid+0x1db/0x2d0 [ 14.643835] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.643857] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.643879] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.643900] kasan_report+0x141/0x180 [ 14.643921] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.643947] __asan_report_load4_noabort+0x18/0x20 [ 14.643971] kasan_atomics_helper+0x4bbc/0x5450 [ 14.643992] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.644014] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.644039] ? trace_hardirqs_on+0x37/0xe0 [ 14.644060] ? kasan_atomics+0x152/0x310 [ 14.644086] kasan_atomics+0x1dc/0x310 [ 14.644108] ? __pfx_kasan_atomics+0x10/0x10 [ 14.644132] ? __pfx_kasan_atomics+0x10/0x10 [ 14.644157] kunit_try_run_case+0x1a5/0x480 [ 14.644182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.644204] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.644228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.644251] ? __kthread_parkme+0x82/0x180 [ 14.644272] ? preempt_count_sub+0x50/0x80 [ 14.644297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.644332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.644356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.644379] kthread+0x337/0x6f0 [ 14.644399] ? trace_preempt_on+0x20/0xc0 [ 14.644420] ? __pfx_kthread+0x10/0x10 [ 14.644440] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.644461] ? calculate_sigpending+0x7b/0xa0 [ 14.644485] ? __pfx_kthread+0x10/0x10 [ 14.644505] ret_from_fork+0x116/0x1d0 [ 14.644525] ? __pfx_kthread+0x10/0x10 [ 14.644545] ret_from_fork_asm+0x1a/0x30 [ 14.644575] </TASK> [ 14.644585] [ 14.654680] Allocated by task 284: [ 14.654817] kasan_save_stack+0x45/0x70 [ 14.655159] kasan_save_track+0x18/0x40 [ 14.655446] kasan_save_alloc_info+0x3b/0x50 [ 14.655941] __kasan_kmalloc+0xb7/0xc0 [ 14.656215] __kmalloc_cache_noprof+0x189/0x420 [ 14.656435] kasan_atomics+0x95/0x310 [ 14.656681] kunit_try_run_case+0x1a5/0x480 [ 14.656880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.657297] kthread+0x337/0x6f0 [ 14.657427] ret_from_fork+0x116/0x1d0 [ 14.657665] ret_from_fork_asm+0x1a/0x30 [ 14.657983] [ 14.658099] The buggy address belongs to the object at ffff888103a28200 [ 14.658099] which belongs to the cache kmalloc-64 of size 64 [ 14.658960] The buggy address is located 0 bytes to the right of [ 14.658960] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.659622] [ 14.659808] The buggy address belongs to the physical page: [ 14.660120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.660450] flags: 0x200000000000000(node=0|zone=2) [ 14.660821] page_type: f5(slab) [ 14.660981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.661361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.661874] page dumped because: kasan: bad access detected [ 14.662176] [ 14.662331] Memory state around the buggy address: [ 14.662875] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.663221] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.663616] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.663971] ^ [ 14.664408] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.664797] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.665173] ================================================================== [ 15.665197] ================================================================== [ 15.665643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.665952] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.666265] [ 15.666381] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.666426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.666439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.666458] Call Trace: [ 15.666472] <TASK> [ 15.666506] dump_stack_lvl+0x73/0xb0 [ 15.666534] print_report+0xd1/0x610 [ 15.666556] ? __virt_addr_valid+0x1db/0x2d0 [ 15.666579] ? kasan_atomics_helper+0x177f/0x5450 [ 15.666600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.666624] ? kasan_atomics_helper+0x177f/0x5450 [ 15.666647] kasan_report+0x141/0x180 [ 15.666669] ? kasan_atomics_helper+0x177f/0x5450 [ 15.666696] kasan_check_range+0x10c/0x1c0 [ 15.666720] __kasan_check_write+0x18/0x20 [ 15.666741] kasan_atomics_helper+0x177f/0x5450 [ 15.666764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.666787] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.666812] ? trace_hardirqs_on+0x37/0xe0 [ 15.666834] ? kasan_atomics+0x152/0x310 [ 15.666860] kasan_atomics+0x1dc/0x310 [ 15.666884] ? __pfx_kasan_atomics+0x10/0x10 [ 15.666909] ? __pfx_kasan_atomics+0x10/0x10 [ 15.666936] kunit_try_run_case+0x1a5/0x480 [ 15.666961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.666984] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.667009] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.667033] ? __kthread_parkme+0x82/0x180 [ 15.667054] ? preempt_count_sub+0x50/0x80 [ 15.667079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.667103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.667129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.667154] kthread+0x337/0x6f0 [ 15.667174] ? trace_preempt_on+0x20/0xc0 [ 15.667197] ? __pfx_kthread+0x10/0x10 [ 15.667218] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.667240] ? calculate_sigpending+0x7b/0xa0 [ 15.667264] ? __pfx_kthread+0x10/0x10 [ 15.667286] ret_from_fork+0x116/0x1d0 [ 15.667306] ? __pfx_kthread+0x10/0x10 [ 15.667336] ret_from_fork_asm+0x1a/0x30 [ 15.667367] </TASK> [ 15.667378] [ 15.674724] Allocated by task 284: [ 15.674891] kasan_save_stack+0x45/0x70 [ 15.675096] kasan_save_track+0x18/0x40 [ 15.675258] kasan_save_alloc_info+0x3b/0x50 [ 15.675506] __kasan_kmalloc+0xb7/0xc0 [ 15.675660] __kmalloc_cache_noprof+0x189/0x420 [ 15.675878] kasan_atomics+0x95/0x310 [ 15.676054] kunit_try_run_case+0x1a5/0x480 [ 15.676205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.676472] kthread+0x337/0x6f0 [ 15.676649] ret_from_fork+0x116/0x1d0 [ 15.676836] ret_from_fork_asm+0x1a/0x30 [ 15.677004] [ 15.677099] The buggy address belongs to the object at ffff888103a28200 [ 15.677099] which belongs to the cache kmalloc-64 of size 64 [ 15.677524] The buggy address is located 0 bytes to the right of [ 15.677524] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.677893] [ 15.677965] The buggy address belongs to the physical page: [ 15.678139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.678423] flags: 0x200000000000000(node=0|zone=2) [ 15.678685] page_type: f5(slab) [ 15.678848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.679186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.679554] page dumped because: kasan: bad access detected [ 15.679800] [ 15.679890] Memory state around the buggy address: [ 15.680116] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.680400] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.680644] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.680861] ^ [ 15.681088] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.681420] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.681767] ================================================================== [ 14.830970] ================================================================== [ 14.831407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.831810] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.832406] [ 14.832633] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.832679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.832692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.832713] Call Trace: [ 14.832729] <TASK> [ 14.832762] dump_stack_lvl+0x73/0xb0 [ 14.832794] print_report+0xd1/0x610 [ 14.832816] ? __virt_addr_valid+0x1db/0x2d0 [ 14.832839] ? kasan_atomics_helper+0x565/0x5450 [ 14.832861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.832885] ? kasan_atomics_helper+0x565/0x5450 [ 14.832908] kasan_report+0x141/0x180 [ 14.832931] ? kasan_atomics_helper+0x565/0x5450 [ 14.832965] kasan_check_range+0x10c/0x1c0 [ 14.832990] __kasan_check_write+0x18/0x20 [ 14.833010] kasan_atomics_helper+0x565/0x5450 [ 14.833035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.833058] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.833084] ? trace_hardirqs_on+0x37/0xe0 [ 14.833106] ? kasan_atomics+0x152/0x310 [ 14.833133] kasan_atomics+0x1dc/0x310 [ 14.833156] ? __pfx_kasan_atomics+0x10/0x10 [ 14.833180] ? __pfx_kasan_atomics+0x10/0x10 [ 14.833207] kunit_try_run_case+0x1a5/0x480 [ 14.833232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.833255] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.833279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.833303] ? __kthread_parkme+0x82/0x180 [ 14.833497] ? preempt_count_sub+0x50/0x80 [ 14.833534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.833560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.833586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.833620] kthread+0x337/0x6f0 [ 14.833639] ? trace_preempt_on+0x20/0xc0 [ 14.833662] ? __pfx_kthread+0x10/0x10 [ 14.833684] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.833705] ? calculate_sigpending+0x7b/0xa0 [ 14.833730] ? __pfx_kthread+0x10/0x10 [ 14.833751] ret_from_fork+0x116/0x1d0 [ 14.833770] ? __pfx_kthread+0x10/0x10 [ 14.833791] ret_from_fork_asm+0x1a/0x30 [ 14.833822] </TASK> [ 14.833833] [ 14.844386] Allocated by task 284: [ 14.844887] kasan_save_stack+0x45/0x70 [ 14.845405] kasan_save_track+0x18/0x40 [ 14.845715] kasan_save_alloc_info+0x3b/0x50 [ 14.845913] __kasan_kmalloc+0xb7/0xc0 [ 14.846807] __kmalloc_cache_noprof+0x189/0x420 [ 14.847266] kasan_atomics+0x95/0x310 [ 14.847639] kunit_try_run_case+0x1a5/0x480 [ 14.847840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.848483] kthread+0x337/0x6f0 [ 14.848739] ret_from_fork+0x116/0x1d0 [ 14.849234] ret_from_fork_asm+0x1a/0x30 [ 14.849452] [ 14.849766] The buggy address belongs to the object at ffff888103a28200 [ 14.849766] which belongs to the cache kmalloc-64 of size 64 [ 14.851249] The buggy address is located 0 bytes to the right of [ 14.851249] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.852337] [ 14.852518] The buggy address belongs to the physical page: [ 14.852755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.853416] flags: 0x200000000000000(node=0|zone=2) [ 14.853815] page_type: f5(slab) [ 14.853976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.854926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.855383] page dumped because: kasan: bad access detected [ 14.855775] [ 14.855863] Memory state around the buggy address: [ 14.856379] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.856875] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.857645] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.858351] ^ [ 14.858736] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.859031] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.859295] ================================================================== [ 14.807484] ================================================================== [ 14.807825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.808459] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.808888] [ 14.809020] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.809064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.809077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.809098] Call Trace: [ 14.809113] <TASK> [ 14.809128] dump_stack_lvl+0x73/0xb0 [ 14.809156] print_report+0xd1/0x610 [ 14.809178] ? __virt_addr_valid+0x1db/0x2d0 [ 14.809201] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.809223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.809248] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.809272] kasan_report+0x141/0x180 [ 14.809295] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.809332] __asan_report_store4_noabort+0x1b/0x30 [ 14.809358] kasan_atomics_helper+0x4b3a/0x5450 [ 14.809381] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.809403] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.809428] ? trace_hardirqs_on+0x37/0xe0 [ 14.809450] ? kasan_atomics+0x152/0x310 [ 14.809478] kasan_atomics+0x1dc/0x310 [ 14.809600] ? __pfx_kasan_atomics+0x10/0x10 [ 14.809625] ? __pfx_kasan_atomics+0x10/0x10 [ 14.809665] kunit_try_run_case+0x1a5/0x480 [ 14.809689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.809713] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.809737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.809761] ? __kthread_parkme+0x82/0x180 [ 14.809781] ? preempt_count_sub+0x50/0x80 [ 14.809805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.809830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.809855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.809879] kthread+0x337/0x6f0 [ 14.809899] ? trace_preempt_on+0x20/0xc0 [ 14.809921] ? __pfx_kthread+0x10/0x10 [ 14.809941] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.809963] ? calculate_sigpending+0x7b/0xa0 [ 14.809987] ? __pfx_kthread+0x10/0x10 [ 14.810009] ret_from_fork+0x116/0x1d0 [ 14.810073] ? __pfx_kthread+0x10/0x10 [ 14.810095] ret_from_fork_asm+0x1a/0x30 [ 14.810125] </TASK> [ 14.810136] [ 14.820417] Allocated by task 284: [ 14.820746] kasan_save_stack+0x45/0x70 [ 14.820981] kasan_save_track+0x18/0x40 [ 14.821178] kasan_save_alloc_info+0x3b/0x50 [ 14.821611] __kasan_kmalloc+0xb7/0xc0 [ 14.821873] __kmalloc_cache_noprof+0x189/0x420 [ 14.822095] kasan_atomics+0x95/0x310 [ 14.822295] kunit_try_run_case+0x1a5/0x480 [ 14.822636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.822893] kthread+0x337/0x6f0 [ 14.823142] ret_from_fork+0x116/0x1d0 [ 14.823332] ret_from_fork_asm+0x1a/0x30 [ 14.823478] [ 14.823702] The buggy address belongs to the object at ffff888103a28200 [ 14.823702] which belongs to the cache kmalloc-64 of size 64 [ 14.824214] The buggy address is located 0 bytes to the right of [ 14.824214] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.825226] [ 14.825383] The buggy address belongs to the physical page: [ 14.825814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.826342] flags: 0x200000000000000(node=0|zone=2) [ 14.826591] page_type: f5(slab) [ 14.826750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.827158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.827541] page dumped because: kasan: bad access detected [ 14.827827] [ 14.827919] Memory state around the buggy address: [ 14.828287] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.828609] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.828980] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.829286] ^ [ 14.829700] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.830008] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.830456] ================================================================== [ 15.092266] ================================================================== [ 15.092697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.093386] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.094045] [ 15.094164] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.094210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.094223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.094244] Call Trace: [ 15.094262] <TASK> [ 15.094276] dump_stack_lvl+0x73/0xb0 [ 15.094319] print_report+0xd1/0x610 [ 15.094342] ? __virt_addr_valid+0x1db/0x2d0 [ 15.094365] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.094387] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.094410] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.094432] kasan_report+0x141/0x180 [ 15.094456] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.094482] kasan_check_range+0x10c/0x1c0 [ 15.094507] __kasan_check_write+0x18/0x20 [ 15.094526] kasan_atomics_helper+0xb6a/0x5450 [ 15.094549] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.094572] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.094598] ? trace_hardirqs_on+0x37/0xe0 [ 15.094620] ? kasan_atomics+0x152/0x310 [ 15.094647] kasan_atomics+0x1dc/0x310 [ 15.094670] ? __pfx_kasan_atomics+0x10/0x10 [ 15.094693] ? __pfx_kasan_atomics+0x10/0x10 [ 15.094720] kunit_try_run_case+0x1a5/0x480 [ 15.094745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094768] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.094793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.094816] ? __kthread_parkme+0x82/0x180 [ 15.094837] ? preempt_count_sub+0x50/0x80 [ 15.094861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.094910] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.094935] kthread+0x337/0x6f0 [ 15.094955] ? trace_preempt_on+0x20/0xc0 [ 15.094976] ? __pfx_kthread+0x10/0x10 [ 15.094997] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.095228] ? calculate_sigpending+0x7b/0xa0 [ 15.095339] ? __pfx_kthread+0x10/0x10 [ 15.095365] ret_from_fork+0x116/0x1d0 [ 15.095385] ? __pfx_kthread+0x10/0x10 [ 15.095407] ret_from_fork_asm+0x1a/0x30 [ 15.095438] </TASK> [ 15.095449] [ 15.106920] Allocated by task 284: [ 15.107188] kasan_save_stack+0x45/0x70 [ 15.107679] kasan_save_track+0x18/0x40 [ 15.107883] kasan_save_alloc_info+0x3b/0x50 [ 15.108244] __kasan_kmalloc+0xb7/0xc0 [ 15.108404] __kmalloc_cache_noprof+0x189/0x420 [ 15.108682] kasan_atomics+0x95/0x310 [ 15.108976] kunit_try_run_case+0x1a5/0x480 [ 15.109476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.109764] kthread+0x337/0x6f0 [ 15.110053] ret_from_fork+0x116/0x1d0 [ 15.110323] ret_from_fork_asm+0x1a/0x30 [ 15.110591] [ 15.110713] The buggy address belongs to the object at ffff888103a28200 [ 15.110713] which belongs to the cache kmalloc-64 of size 64 [ 15.111608] The buggy address is located 0 bytes to the right of [ 15.111608] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.112273] [ 15.112393] The buggy address belongs to the physical page: [ 15.112651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.113288] flags: 0x200000000000000(node=0|zone=2) [ 15.113682] page_type: f5(slab) [ 15.113850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.114151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.114807] page dumped because: kasan: bad access detected [ 15.115106] [ 15.115424] Memory state around the buggy address: [ 15.115828] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.116365] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.116644] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.117076] ^ [ 15.117428] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.117960] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118493] ================================================================== [ 14.665891] ================================================================== [ 14.666387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.666878] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284 [ 14.667227] [ 14.667463] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.667524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.667537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.667557] Call Trace: [ 14.667568] <TASK> [ 14.667582] dump_stack_lvl+0x73/0xb0 [ 14.667611] print_report+0xd1/0x610 [ 14.667632] ? __virt_addr_valid+0x1db/0x2d0 [ 14.667654] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.667675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.667698] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.667720] kasan_report+0x141/0x180 [ 14.667741] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.667769] __asan_report_store4_noabort+0x1b/0x30 [ 14.667794] kasan_atomics_helper+0x4ba2/0x5450 [ 14.667816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.667879] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.667904] ? trace_hardirqs_on+0x37/0xe0 [ 14.667925] ? kasan_atomics+0x152/0x310 [ 14.667962] kasan_atomics+0x1dc/0x310 [ 14.667984] ? __pfx_kasan_atomics+0x10/0x10 [ 14.668006] ? __pfx_kasan_atomics+0x10/0x10 [ 14.668082] kunit_try_run_case+0x1a5/0x480 [ 14.668108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.668131] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.668156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.668179] ? __kthread_parkme+0x82/0x180 [ 14.668200] ? preempt_count_sub+0x50/0x80 [ 14.668257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.668280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.668320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.668344] kthread+0x337/0x6f0 [ 14.668364] ? trace_preempt_on+0x20/0xc0 [ 14.668385] ? __pfx_kthread+0x10/0x10 [ 14.668405] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.668426] ? calculate_sigpending+0x7b/0xa0 [ 14.668450] ? __pfx_kthread+0x10/0x10 [ 14.668470] ret_from_fork+0x116/0x1d0 [ 14.668489] ? __pfx_kthread+0x10/0x10 [ 14.668509] ret_from_fork_asm+0x1a/0x30 [ 14.668538] </TASK> [ 14.668548] [ 14.677991] Allocated by task 284: [ 14.678327] kasan_save_stack+0x45/0x70 [ 14.678525] kasan_save_track+0x18/0x40 [ 14.678661] kasan_save_alloc_info+0x3b/0x50 [ 14.678810] __kasan_kmalloc+0xb7/0xc0 [ 14.678943] __kmalloc_cache_noprof+0x189/0x420 [ 14.679435] kasan_atomics+0x95/0x310 [ 14.679744] kunit_try_run_case+0x1a5/0x480 [ 14.679971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.680189] kthread+0x337/0x6f0 [ 14.680317] ret_from_fork+0x116/0x1d0 [ 14.680557] ret_from_fork_asm+0x1a/0x30 [ 14.680802] [ 14.681012] The buggy address belongs to the object at ffff888103a28200 [ 14.681012] which belongs to the cache kmalloc-64 of size 64 [ 14.681758] The buggy address is located 0 bytes to the right of [ 14.681758] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 14.682452] [ 14.682572] The buggy address belongs to the physical page: [ 14.682869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 14.683112] flags: 0x200000000000000(node=0|zone=2) [ 14.683278] page_type: f5(slab) [ 14.683408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.683959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.684337] page dumped because: kasan: bad access detected [ 14.684593] [ 14.684685] Memory state around the buggy address: [ 14.684840] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.685174] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.685472] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.685757] ^ [ 14.685937] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.686231] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.686782] ================================================================== [ 15.838258] ================================================================== [ 15.838927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.839901] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.840338] [ 15.840436] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.840483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.840496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.840520] Call Trace: [ 15.840536] <TASK> [ 15.840552] dump_stack_lvl+0x73/0xb0 [ 15.840581] print_report+0xd1/0x610 [ 15.840603] ? __virt_addr_valid+0x1db/0x2d0 [ 15.840628] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.840652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.840676] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.840699] kasan_report+0x141/0x180 [ 15.840721] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.840749] __asan_report_load8_noabort+0x18/0x20 [ 15.840775] kasan_atomics_helper+0x4f30/0x5450 [ 15.840800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.840822] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.840849] ? trace_hardirqs_on+0x37/0xe0 [ 15.840872] ? kasan_atomics+0x152/0x310 [ 15.840899] kasan_atomics+0x1dc/0x310 [ 15.840923] ? __pfx_kasan_atomics+0x10/0x10 [ 15.840947] ? __pfx_kasan_atomics+0x10/0x10 [ 15.840980] kunit_try_run_case+0x1a5/0x480 [ 15.841005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.841028] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.841052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.841076] ? __kthread_parkme+0x82/0x180 [ 15.841098] ? preempt_count_sub+0x50/0x80 [ 15.841122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.841147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.841173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.841197] kthread+0x337/0x6f0 [ 15.841217] ? trace_preempt_on+0x20/0xc0 [ 15.841239] ? __pfx_kthread+0x10/0x10 [ 15.841259] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.841281] ? calculate_sigpending+0x7b/0xa0 [ 15.841306] ? __pfx_kthread+0x10/0x10 [ 15.841338] ret_from_fork+0x116/0x1d0 [ 15.841357] ? __pfx_kthread+0x10/0x10 [ 15.841377] ret_from_fork_asm+0x1a/0x30 [ 15.841408] </TASK> [ 15.841419] [ 15.855196] Allocated by task 284: [ 15.855686] kasan_save_stack+0x45/0x70 [ 15.855899] kasan_save_track+0x18/0x40 [ 15.856083] kasan_save_alloc_info+0x3b/0x50 [ 15.856285] __kasan_kmalloc+0xb7/0xc0 [ 15.856481] __kmalloc_cache_noprof+0x189/0x420 [ 15.857027] kasan_atomics+0x95/0x310 [ 15.857340] kunit_try_run_case+0x1a5/0x480 [ 15.857737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.858089] kthread+0x337/0x6f0 [ 15.858270] ret_from_fork+0x116/0x1d0 [ 15.858455] ret_from_fork_asm+0x1a/0x30 [ 15.858886] [ 15.858979] The buggy address belongs to the object at ffff888103a28200 [ 15.858979] which belongs to the cache kmalloc-64 of size 64 [ 15.859499] The buggy address is located 0 bytes to the right of [ 15.859499] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 15.860359] [ 15.860465] The buggy address belongs to the physical page: [ 15.860896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 15.861384] flags: 0x200000000000000(node=0|zone=2) [ 15.861803] page_type: f5(slab) [ 15.861980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.862550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.863331] page dumped because: kasan: bad access detected [ 15.863918] [ 15.864085] Memory state around the buggy address: [ 15.864583] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.864916] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.865145] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.865377] ^ [ 15.865931] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.866714] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.867464] ================================================================== [ 15.996658] ================================================================== [ 15.997029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.997358] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284 [ 15.997730] [ 15.997841] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.997884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.997896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.997950] Call Trace: [ 15.997966] <TASK> [ 15.997980] dump_stack_lvl+0x73/0xb0 [ 15.998033] print_report+0xd1/0x610 [ 15.998056] ? __virt_addr_valid+0x1db/0x2d0 [ 15.998089] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.998111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.998135] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.998157] kasan_report+0x141/0x180 [ 15.998181] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.998208] __asan_report_load8_noabort+0x18/0x20 [ 15.998263] kasan_atomics_helper+0x4f71/0x5450 [ 15.998298] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.998340] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.998365] ? trace_hardirqs_on+0x37/0xe0 [ 15.998387] ? kasan_atomics+0x152/0x310 [ 15.998414] kasan_atomics+0x1dc/0x310 [ 15.998437] ? __pfx_kasan_atomics+0x10/0x10 [ 15.998461] ? __pfx_kasan_atomics+0x10/0x10 [ 15.998509] kunit_try_run_case+0x1a5/0x480 [ 15.998533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.998556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.998580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.998604] ? __kthread_parkme+0x82/0x180 [ 15.998624] ? preempt_count_sub+0x50/0x80 [ 15.998650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.998674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.998699] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.998724] kthread+0x337/0x6f0 [ 15.998744] ? trace_preempt_on+0x20/0xc0 [ 15.998766] ? __pfx_kthread+0x10/0x10 [ 15.998786] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.998808] ? calculate_sigpending+0x7b/0xa0 [ 15.998832] ? __pfx_kthread+0x10/0x10 [ 15.998854] ret_from_fork+0x116/0x1d0 [ 15.998873] ? __pfx_kthread+0x10/0x10 [ 15.998894] ret_from_fork_asm+0x1a/0x30 [ 15.998925] </TASK> [ 15.998935] [ 16.006600] Allocated by task 284: [ 16.006733] kasan_save_stack+0x45/0x70 [ 16.006902] kasan_save_track+0x18/0x40 [ 16.007143] kasan_save_alloc_info+0x3b/0x50 [ 16.007397] __kasan_kmalloc+0xb7/0xc0 [ 16.007639] __kmalloc_cache_noprof+0x189/0x420 [ 16.007866] kasan_atomics+0x95/0x310 [ 16.008117] kunit_try_run_case+0x1a5/0x480 [ 16.008355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.008582] kthread+0x337/0x6f0 [ 16.008728] ret_from_fork+0x116/0x1d0 [ 16.009012] ret_from_fork_asm+0x1a/0x30 [ 16.009280] [ 16.009405] The buggy address belongs to the object at ffff888103a28200 [ 16.009405] which belongs to the cache kmalloc-64 of size 64 [ 16.009958] The buggy address is located 0 bytes to the right of [ 16.009958] allocated 48-byte region [ffff888103a28200, ffff888103a28230) [ 16.010504] [ 16.010648] The buggy address belongs to the physical page: [ 16.010860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28 [ 16.011103] flags: 0x200000000000000(node=0|zone=2) [ 16.011383] page_type: f5(slab) [ 16.011575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.011923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.012218] page dumped because: kasan: bad access detected [ 16.012401] [ 16.012547] Memory state around the buggy address: [ 16.012787] ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.013206] ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.013543] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.013775] ^ [ 16.014003] ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.014409] ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.014867] ==================================================================