Date
July 20, 2025, 11:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.184125] ================================================================== [ 18.184246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.184486] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.184786] [ 18.184885] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.184974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.185002] Hardware name: linux,dummy-virt (DT) [ 18.185035] Call trace: [ 18.185259] show_stack+0x20/0x38 (C) [ 18.185384] dump_stack_lvl+0x8c/0xd0 [ 18.185433] print_report+0x118/0x5d0 [ 18.185480] kasan_report+0xdc/0x128 [ 18.185535] kasan_check_range+0x100/0x1a8 [ 18.186110] __kasan_check_read+0x20/0x30 [ 18.186349] kasan_atomics_helper+0xdd4/0x4858 [ 18.186411] kasan_atomics+0x198/0x2e0 [ 18.186743] kunit_try_run_case+0x170/0x3f0 [ 18.186929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.186993] kthread+0x328/0x630 [ 18.187038] ret_from_fork+0x10/0x20 [ 18.187094] [ 18.187115] Allocated by task 265: [ 18.187360] kasan_save_stack+0x3c/0x68 [ 18.187617] kasan_save_track+0x20/0x40 [ 18.187823] kasan_save_alloc_info+0x40/0x58 [ 18.188061] __kasan_kmalloc+0xd4/0xd8 [ 18.188215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.188265] kasan_atomics+0xb8/0x2e0 [ 18.188320] kunit_try_run_case+0x170/0x3f0 [ 18.188363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.188425] kthread+0x328/0x630 [ 18.188461] ret_from_fork+0x10/0x20 [ 18.188508] [ 18.188532] The buggy address belongs to the object at fff00000c78be300 [ 18.188532] which belongs to the cache kmalloc-64 of size 64 [ 18.188594] The buggy address is located 0 bytes to the right of [ 18.188594] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.188660] [ 18.188694] The buggy address belongs to the physical page: [ 18.188730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.188795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.188852] page_type: f5(slab) [ 18.188901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.188963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.189005] page dumped because: kasan: bad access detected [ 18.189049] [ 18.189087] Memory state around the buggy address: [ 18.189121] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189174] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189228] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.189275] ^ [ 18.189310] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.189355] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.189401] ================================================================== [ 18.209514] ================================================================== [ 18.209747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.210029] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.210093] [ 18.210126] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.210638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.210700] Hardware name: linux,dummy-virt (DT) [ 18.210736] Call trace: [ 18.210868] show_stack+0x20/0x38 (C) [ 18.210934] dump_stack_lvl+0x8c/0xd0 [ 18.210989] print_report+0x118/0x5d0 [ 18.211039] kasan_report+0xdc/0x128 [ 18.211089] __asan_report_store8_noabort+0x20/0x30 [ 18.211779] kasan_atomics_helper+0x3e5c/0x4858 [ 18.211897] kasan_atomics+0x198/0x2e0 [ 18.211986] kunit_try_run_case+0x170/0x3f0 [ 18.212223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.212584] kthread+0x328/0x630 [ 18.212747] ret_from_fork+0x10/0x20 [ 18.213146] [ 18.213313] Allocated by task 265: [ 18.213416] kasan_save_stack+0x3c/0x68 [ 18.213504] kasan_save_track+0x20/0x40 [ 18.213556] kasan_save_alloc_info+0x40/0x58 [ 18.213811] __kasan_kmalloc+0xd4/0xd8 [ 18.213992] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.214123] kasan_atomics+0xb8/0x2e0 [ 18.214213] kunit_try_run_case+0x170/0x3f0 [ 18.214410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.214648] kthread+0x328/0x630 [ 18.214728] ret_from_fork+0x10/0x20 [ 18.214887] [ 18.214911] The buggy address belongs to the object at fff00000c78be300 [ 18.214911] which belongs to the cache kmalloc-64 of size 64 [ 18.215112] The buggy address is located 0 bytes to the right of [ 18.215112] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.215348] [ 18.215375] The buggy address belongs to the physical page: [ 18.215409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.215855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.216038] page_type: f5(slab) [ 18.216127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.216432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.216617] page dumped because: kasan: bad access detected [ 18.216836] [ 18.217013] Memory state around the buggy address: [ 18.217065] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.217150] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.217337] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.217603] ^ [ 18.217809] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.218156] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.218567] ================================================================== [ 18.061419] ================================================================== [ 18.061507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.061560] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.061614] [ 18.061960] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.062184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.062226] Hardware name: linux,dummy-virt (DT) [ 18.062273] Call trace: [ 18.062301] show_stack+0x20/0x38 (C) [ 18.062352] dump_stack_lvl+0x8c/0xd0 [ 18.062400] print_report+0x118/0x5d0 [ 18.062591] kasan_report+0xdc/0x128 [ 18.062801] kasan_check_range+0x100/0x1a8 [ 18.063032] __kasan_check_write+0x20/0x30 [ 18.063249] kasan_atomics_helper+0x99c/0x4858 [ 18.063454] kasan_atomics+0x198/0x2e0 [ 18.063575] kunit_try_run_case+0x170/0x3f0 [ 18.063964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.064059] kthread+0x328/0x630 [ 18.064192] ret_from_fork+0x10/0x20 [ 18.064309] [ 18.064440] Allocated by task 265: [ 18.064511] kasan_save_stack+0x3c/0x68 [ 18.064690] kasan_save_track+0x20/0x40 [ 18.064769] kasan_save_alloc_info+0x40/0x58 [ 18.065129] __kasan_kmalloc+0xd4/0xd8 [ 18.065302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.065481] kasan_atomics+0xb8/0x2e0 [ 18.065572] kunit_try_run_case+0x170/0x3f0 [ 18.065916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.066263] kthread+0x328/0x630 [ 18.066361] ret_from_fork+0x10/0x20 [ 18.066700] [ 18.066832] The buggy address belongs to the object at fff00000c78be300 [ 18.066832] which belongs to the cache kmalloc-64 of size 64 [ 18.066957] The buggy address is located 0 bytes to the right of [ 18.066957] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.067089] [ 18.067148] The buggy address belongs to the physical page: [ 18.067289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.067346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.067403] page_type: f5(slab) [ 18.067449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.067731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.067971] page dumped because: kasan: bad access detected [ 18.068139] [ 18.068221] Memory state around the buggy address: [ 18.068343] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.068507] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.068856] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.068973] ^ [ 18.069044] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.069181] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.069270] ================================================================== [ 18.080449] ================================================================== [ 18.080524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.080579] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.080926] [ 18.080976] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.081065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.081094] Hardware name: linux,dummy-virt (DT) [ 18.081126] Call trace: [ 18.081151] show_stack+0x20/0x38 (C) [ 18.081202] dump_stack_lvl+0x8c/0xd0 [ 18.081250] print_report+0x118/0x5d0 [ 18.081299] kasan_report+0xdc/0x128 [ 18.081363] kasan_check_range+0x100/0x1a8 [ 18.081415] __kasan_check_write+0x20/0x30 [ 18.081463] kasan_atomics_helper+0xa6c/0x4858 [ 18.081522] kasan_atomics+0x198/0x2e0 [ 18.081580] kunit_try_run_case+0x170/0x3f0 [ 18.081628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.081696] kthread+0x328/0x630 [ 18.081747] ret_from_fork+0x10/0x20 [ 18.081809] [ 18.081832] Allocated by task 265: [ 18.081868] kasan_save_stack+0x3c/0x68 [ 18.081913] kasan_save_track+0x20/0x40 [ 18.081953] kasan_save_alloc_info+0x40/0x58 [ 18.082004] __kasan_kmalloc+0xd4/0xd8 [ 18.082045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.082087] kasan_atomics+0xb8/0x2e0 [ 18.082125] kunit_try_run_case+0x170/0x3f0 [ 18.082174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.082220] kthread+0x328/0x630 [ 18.082263] ret_from_fork+0x10/0x20 [ 18.082307] [ 18.082329] The buggy address belongs to the object at fff00000c78be300 [ 18.082329] which belongs to the cache kmalloc-64 of size 64 [ 18.082394] The buggy address is located 0 bytes to the right of [ 18.082394] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.082474] [ 18.082499] The buggy address belongs to the physical page: [ 18.082542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.082596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.082647] page_type: f5(slab) [ 18.082696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.083162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.083221] page dumped because: kasan: bad access detected [ 18.083297] [ 18.083321] Memory state around the buggy address: [ 18.083758] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.083828] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.083910] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.083990] ^ [ 18.084037] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.084272] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.084453] ================================================================== [ 18.403791] ================================================================== [ 18.403899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.404084] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.404146] [ 18.404272] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.404394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.404492] Hardware name: linux,dummy-virt (DT) [ 18.404554] Call trace: [ 18.404581] show_stack+0x20/0x38 (C) [ 18.404649] dump_stack_lvl+0x8c/0xd0 [ 18.405047] print_report+0x118/0x5d0 [ 18.405288] kasan_report+0xdc/0x128 [ 18.405352] __asan_report_load8_noabort+0x20/0x30 [ 18.405406] kasan_atomics_helper+0x3df4/0x4858 [ 18.405599] kasan_atomics+0x198/0x2e0 [ 18.405768] kunit_try_run_case+0x170/0x3f0 [ 18.405823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.405885] kthread+0x328/0x630 [ 18.405928] ret_from_fork+0x10/0x20 [ 18.405976] [ 18.405997] Allocated by task 265: [ 18.406421] kasan_save_stack+0x3c/0x68 [ 18.406574] kasan_save_track+0x20/0x40 [ 18.406623] kasan_save_alloc_info+0x40/0x58 [ 18.406850] __kasan_kmalloc+0xd4/0xd8 [ 18.406894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.406950] kasan_atomics+0xb8/0x2e0 [ 18.406989] kunit_try_run_case+0x170/0x3f0 [ 18.407286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.407344] kthread+0x328/0x630 [ 18.407517] ret_from_fork+0x10/0x20 [ 18.407705] [ 18.407751] The buggy address belongs to the object at fff00000c78be300 [ 18.407751] which belongs to the cache kmalloc-64 of size 64 [ 18.408115] The buggy address is located 0 bytes to the right of [ 18.408115] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.408259] [ 18.408319] The buggy address belongs to the physical page: [ 18.408484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.408579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.408755] page_type: f5(slab) [ 18.408803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.408857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.408908] page dumped because: kasan: bad access detected [ 18.409100] [ 18.409396] Memory state around the buggy address: [ 18.409784] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.410013] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.410097] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.410522] ^ [ 18.410828] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.411101] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.411188] ================================================================== [ 18.155994] ================================================================== [ 18.156048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.156102] Read of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.156736] [ 18.157063] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.157404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.157550] Hardware name: linux,dummy-virt (DT) [ 18.157606] Call trace: [ 18.157632] show_stack+0x20/0x38 (C) [ 18.157793] dump_stack_lvl+0x8c/0xd0 [ 18.157865] print_report+0x118/0x5d0 [ 18.158056] kasan_report+0xdc/0x128 [ 18.158119] __asan_report_load4_noabort+0x20/0x30 [ 18.158174] kasan_atomics_helper+0x3dd8/0x4858 [ 18.158355] kasan_atomics+0x198/0x2e0 [ 18.158417] kunit_try_run_case+0x170/0x3f0 [ 18.158466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.158823] kthread+0x328/0x630 [ 18.158977] ret_from_fork+0x10/0x20 [ 18.159034] [ 18.159112] Allocated by task 265: [ 18.159223] kasan_save_stack+0x3c/0x68 [ 18.159446] kasan_save_track+0x20/0x40 [ 18.159755] kasan_save_alloc_info+0x40/0x58 [ 18.160018] __kasan_kmalloc+0xd4/0xd8 [ 18.160360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.160554] kasan_atomics+0xb8/0x2e0 [ 18.160696] kunit_try_run_case+0x170/0x3f0 [ 18.160965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.161196] kthread+0x328/0x630 [ 18.161312] ret_from_fork+0x10/0x20 [ 18.161392] [ 18.161465] The buggy address belongs to the object at fff00000c78be300 [ 18.161465] which belongs to the cache kmalloc-64 of size 64 [ 18.161650] The buggy address is located 0 bytes to the right of [ 18.161650] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.161907] [ 18.161943] The buggy address belongs to the physical page: [ 18.162042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.162201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.162438] page_type: f5(slab) [ 18.162580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.162649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.162753] page dumped because: kasan: bad access detected [ 18.162942] [ 18.162968] Memory state around the buggy address: [ 18.163198] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.163582] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.163733] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.163838] ^ [ 18.164036] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.164398] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.164487] ================================================================== [ 18.254566] ================================================================== [ 18.254650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.255174] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.255296] [ 18.255420] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.255567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.255739] Hardware name: linux,dummy-virt (DT) [ 18.255986] Call trace: [ 18.256134] show_stack+0x20/0x38 (C) [ 18.256210] dump_stack_lvl+0x8c/0xd0 [ 18.256718] print_report+0x118/0x5d0 [ 18.256790] kasan_report+0xdc/0x128 [ 18.256875] kasan_check_range+0x100/0x1a8 [ 18.257290] __kasan_check_write+0x20/0x30 [ 18.257414] kasan_atomics_helper+0x1058/0x4858 [ 18.257684] kasan_atomics+0x198/0x2e0 [ 18.257940] kunit_try_run_case+0x170/0x3f0 [ 18.258092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.258190] kthread+0x328/0x630 [ 18.258557] ret_from_fork+0x10/0x20 [ 18.258772] [ 18.258808] Allocated by task 265: [ 18.258840] kasan_save_stack+0x3c/0x68 [ 18.259093] kasan_save_track+0x20/0x40 [ 18.259291] kasan_save_alloc_info+0x40/0x58 [ 18.259522] __kasan_kmalloc+0xd4/0xd8 [ 18.260242] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.260307] kasan_atomics+0xb8/0x2e0 [ 18.260366] kunit_try_run_case+0x170/0x3f0 [ 18.260540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.260634] kthread+0x328/0x630 [ 18.260848] ret_from_fork+0x10/0x20 [ 18.261216] [ 18.261387] The buggy address belongs to the object at fff00000c78be300 [ 18.261387] which belongs to the cache kmalloc-64 of size 64 [ 18.261687] The buggy address is located 0 bytes to the right of [ 18.261687] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.261905] [ 18.261931] The buggy address belongs to the physical page: [ 18.262191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.262554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.262784] page_type: f5(slab) [ 18.262921] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.263153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.263419] page dumped because: kasan: bad access detected [ 18.263488] [ 18.263532] Memory state around the buggy address: [ 18.263846] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.264200] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.264392] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.264609] ^ [ 18.264838] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.264975] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.265057] ================================================================== [ 18.311946] ================================================================== [ 18.312009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.312061] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.312427] [ 18.312478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.312807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.313029] Hardware name: linux,dummy-virt (DT) [ 18.313073] Call trace: [ 18.313127] show_stack+0x20/0x38 (C) [ 18.313365] dump_stack_lvl+0x8c/0xd0 [ 18.313424] print_report+0x118/0x5d0 [ 18.313498] kasan_report+0xdc/0x128 [ 18.313546] kasan_check_range+0x100/0x1a8 [ 18.313954] __kasan_check_write+0x20/0x30 [ 18.314194] kasan_atomics_helper+0x12d8/0x4858 [ 18.314501] kasan_atomics+0x198/0x2e0 [ 18.314618] kunit_try_run_case+0x170/0x3f0 [ 18.314690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.314745] kthread+0x328/0x630 [ 18.314990] ret_from_fork+0x10/0x20 [ 18.315094] [ 18.315191] Allocated by task 265: [ 18.315263] kasan_save_stack+0x3c/0x68 [ 18.315327] kasan_save_track+0x20/0x40 [ 18.315374] kasan_save_alloc_info+0x40/0x58 [ 18.315415] __kasan_kmalloc+0xd4/0xd8 [ 18.315704] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.316143] kasan_atomics+0xb8/0x2e0 [ 18.316242] kunit_try_run_case+0x170/0x3f0 [ 18.316366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.317067] kthread+0x328/0x630 [ 18.317137] ret_from_fork+0x10/0x20 [ 18.317211] [ 18.317256] The buggy address belongs to the object at fff00000c78be300 [ 18.317256] which belongs to the cache kmalloc-64 of size 64 [ 18.317481] The buggy address is located 0 bytes to the right of [ 18.317481] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.317571] [ 18.317595] The buggy address belongs to the physical page: [ 18.317976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.318337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.318517] page_type: f5(slab) [ 18.318869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.319216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.319348] page dumped because: kasan: bad access detected [ 18.319389] [ 18.319411] Memory state around the buggy address: [ 18.319447] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.319494] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.319539] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.319632] ^ [ 18.319695] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.319750] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.319805] ================================================================== [ 18.266440] ================================================================== [ 18.266495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.266548] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.266601] [ 18.266634] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.266733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.266762] Hardware name: linux,dummy-virt (DT) [ 18.266804] Call trace: [ 18.266830] show_stack+0x20/0x38 (C) [ 18.266881] dump_stack_lvl+0x8c/0xd0 [ 18.266929] print_report+0x118/0x5d0 [ 18.266985] kasan_report+0xdc/0x128 [ 18.267708] kasan_check_range+0x100/0x1a8 [ 18.267799] __kasan_check_write+0x20/0x30 [ 18.267876] kasan_atomics_helper+0x10c0/0x4858 [ 18.268142] kasan_atomics+0x198/0x2e0 [ 18.268249] kunit_try_run_case+0x170/0x3f0 [ 18.268414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.268476] kthread+0x328/0x630 [ 18.268519] ret_from_fork+0x10/0x20 [ 18.268943] [ 18.269127] Allocated by task 265: [ 18.269319] kasan_save_stack+0x3c/0x68 [ 18.269487] kasan_save_track+0x20/0x40 [ 18.269571] kasan_save_alloc_info+0x40/0x58 [ 18.269712] __kasan_kmalloc+0xd4/0xd8 [ 18.269753] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.270120] kasan_atomics+0xb8/0x2e0 [ 18.270887] kunit_try_run_case+0x170/0x3f0 [ 18.270944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.271025] kthread+0x328/0x630 [ 18.271080] ret_from_fork+0x10/0x20 [ 18.271159] [ 18.271294] The buggy address belongs to the object at fff00000c78be300 [ 18.271294] which belongs to the cache kmalloc-64 of size 64 [ 18.271700] The buggy address is located 0 bytes to the right of [ 18.271700] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.271805] [ 18.272076] The buggy address belongs to the physical page: [ 18.272127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.272417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.272788] page_type: f5(slab) [ 18.273003] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.273088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.273396] page dumped because: kasan: bad access detected [ 18.273653] [ 18.273843] Memory state around the buggy address: [ 18.274119] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.274492] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.274993] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.275156] ^ [ 18.275444] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.275798] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.275850] ================================================================== [ 18.350005] ================================================================== [ 18.350307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.350393] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.350620] [ 18.350776] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.351027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.351079] Hardware name: linux,dummy-virt (DT) [ 18.351182] Call trace: [ 18.351397] show_stack+0x20/0x38 (C) [ 18.351531] dump_stack_lvl+0x8c/0xd0 [ 18.351594] print_report+0x118/0x5d0 [ 18.351641] kasan_report+0xdc/0x128 [ 18.351821] kasan_check_range+0x100/0x1a8 [ 18.352055] __kasan_check_write+0x20/0x30 [ 18.352137] kasan_atomics_helper+0x147c/0x4858 [ 18.352493] kasan_atomics+0x198/0x2e0 [ 18.352738] kunit_try_run_case+0x170/0x3f0 [ 18.352922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.353030] kthread+0x328/0x630 [ 18.353092] ret_from_fork+0x10/0x20 [ 18.353141] [ 18.353501] Allocated by task 265: [ 18.353774] kasan_save_stack+0x3c/0x68 [ 18.354161] kasan_save_track+0x20/0x40 [ 18.354268] kasan_save_alloc_info+0x40/0x58 [ 18.354332] __kasan_kmalloc+0xd4/0xd8 [ 18.354414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.354464] kasan_atomics+0xb8/0x2e0 [ 18.354501] kunit_try_run_case+0x170/0x3f0 [ 18.354553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.354611] kthread+0x328/0x630 [ 18.354645] ret_from_fork+0x10/0x20 [ 18.354697] [ 18.354731] The buggy address belongs to the object at fff00000c78be300 [ 18.354731] which belongs to the cache kmalloc-64 of size 64 [ 18.354792] The buggy address is located 0 bytes to the right of [ 18.354792] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.354867] [ 18.354898] The buggy address belongs to the physical page: [ 18.354933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.354986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.355035] page_type: f5(slab) [ 18.355315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.355827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.355898] page dumped because: kasan: bad access detected [ 18.355933] [ 18.355956] Memory state around the buggy address: [ 18.355991] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.356690] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.356933] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.357054] ^ [ 18.357428] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.357724] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.357945] ================================================================== [ 18.042038] ================================================================== [ 18.042092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 18.042144] Read of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.042196] [ 18.042837] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.042968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.043040] Hardware name: linux,dummy-virt (DT) [ 18.043105] Call trace: [ 18.043170] show_stack+0x20/0x38 (C) [ 18.043293] dump_stack_lvl+0x8c/0xd0 [ 18.043382] print_report+0x118/0x5d0 [ 18.043701] kasan_report+0xdc/0x128 [ 18.043880] __asan_report_load4_noabort+0x20/0x30 [ 18.044015] kasan_atomics_helper+0x42d8/0x4858 [ 18.044172] kasan_atomics+0x198/0x2e0 [ 18.044264] kunit_try_run_case+0x170/0x3f0 [ 18.044597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.044761] kthread+0x328/0x630 [ 18.044847] ret_from_fork+0x10/0x20 [ 18.045604] kasan_save_track+0x20/0x40 [ 18.045991] kasan_save_alloc_info+0x40/0x58 [ 18.046541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.047734] The buggy address is located 0 bytes to the right of [ 18.047734] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.048229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.048487] page dumped because: kasan: bad access detected [ 18.049370] ^ [ 18.053284] [ 18.053996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.054040] Hardware name: linux,dummy-virt (DT) [ 18.054079] Call trace: [ 18.054105] show_stack+0x20/0x38 (C) [ 18.054200] dump_stack_lvl+0x8c/0xd0 [ 18.054250] print_report+0x118/0x5d0 [ 18.054616] kasan_report+0xdc/0x128 [ 18.054741] kasan_check_range+0x100/0x1a8 [ 18.054793] __kasan_check_write+0x20/0x30 [ 18.054839] kasan_atomics_helper+0x934/0x4858 [ 18.055126] kasan_atomics+0x198/0x2e0 [ 18.055320] kunit_try_run_case+0x170/0x3f0 [ 18.055385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.055610] kthread+0x328/0x630 [ 18.055712] ret_from_fork+0x10/0x20 [ 18.055931] [ 18.056006] Allocated by task 265: [ 18.056124] kasan_save_stack+0x3c/0x68 [ 18.056364] kasan_save_track+0x20/0x40 [ 18.056873] kasan_save_alloc_info+0x40/0x58 [ 18.057021] __kasan_kmalloc+0xd4/0xd8 [ 18.057066] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.057133] kasan_atomics+0xb8/0x2e0 [ 18.057174] kunit_try_run_case+0x170/0x3f0 [ 18.057226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.057279] kthread+0x328/0x630 [ 18.057324] ret_from_fork+0x10/0x20 [ 18.057362] [ 18.057400] The buggy address belongs to the object at fff00000c78be300 [ 18.057400] which belongs to the cache kmalloc-64 of size 64 [ 18.057471] The buggy address is located 0 bytes to the right of [ 18.057471] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.057547] [ 18.057577] The buggy address belongs to the physical page: [ 18.057627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.057720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.057791] page_type: f5(slab) [ 18.057867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.058419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.058684] page dumped because: kasan: bad access detected [ 18.058752] [ 18.058791] Memory state around the buggy address: [ 18.059019] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.059203] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.059378] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.059563] ^ [ 18.059790] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.059841] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.060243] ================================================================== [ 18.330487] ================================================================== [ 18.330541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.330593] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.330695] [ 18.330730] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.330830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.330868] Hardware name: linux,dummy-virt (DT) [ 18.330902] Call trace: [ 18.330926] show_stack+0x20/0x38 (C) [ 18.330978] dump_stack_lvl+0x8c/0xd0 [ 18.331026] print_report+0x118/0x5d0 [ 18.331442] kasan_report+0xdc/0x128 [ 18.331748] __asan_report_load8_noabort+0x20/0x30 [ 18.331828] kasan_atomics_helper+0x3f04/0x4858 [ 18.331881] kasan_atomics+0x198/0x2e0 [ 18.331928] kunit_try_run_case+0x170/0x3f0 [ 18.332575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.332789] kthread+0x328/0x630 [ 18.332866] ret_from_fork+0x10/0x20 [ 18.333051] [ 18.333156] Allocated by task 265: [ 18.333300] kasan_save_stack+0x3c/0x68 [ 18.333604] kasan_save_track+0x20/0x40 [ 18.333854] kasan_save_alloc_info+0x40/0x58 [ 18.334030] __kasan_kmalloc+0xd4/0xd8 [ 18.334101] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.334145] kasan_atomics+0xb8/0x2e0 [ 18.334428] kunit_try_run_case+0x170/0x3f0 [ 18.334547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.334955] kthread+0x328/0x630 [ 18.335344] ret_from_fork+0x10/0x20 [ 18.335395] [ 18.335439] The buggy address belongs to the object at fff00000c78be300 [ 18.335439] which belongs to the cache kmalloc-64 of size 64 [ 18.335510] The buggy address is located 0 bytes to the right of [ 18.335510] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.335578] [ 18.335832] The buggy address belongs to the physical page: [ 18.336065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.336260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.336336] page_type: f5(slab) [ 18.336384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.336446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.336502] page dumped because: kasan: bad access detected [ 18.336542] [ 18.336563] Memory state around the buggy address: [ 18.336597] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.336643] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.337394] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.337448] ^ [ 18.337520] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.337577] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.337821] ================================================================== [ 18.385950] ================================================================== [ 18.386179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.386243] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.386295] [ 18.386508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.386713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.386748] Hardware name: linux,dummy-virt (DT) [ 18.386784] Call trace: [ 18.386983] show_stack+0x20/0x38 (C) [ 18.387341] dump_stack_lvl+0x8c/0xd0 [ 18.387451] print_report+0x118/0x5d0 [ 18.387763] kasan_report+0xdc/0x128 [ 18.388030] __asan_report_load8_noabort+0x20/0x30 [ 18.388311] kasan_atomics_helper+0x3db0/0x4858 [ 18.388456] kasan_atomics+0x198/0x2e0 [ 18.388535] kunit_try_run_case+0x170/0x3f0 [ 18.388902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.389297] kthread+0x328/0x630 [ 18.389458] ret_from_fork+0x10/0x20 [ 18.389614] [ 18.389738] Allocated by task 265: [ 18.389792] kasan_save_stack+0x3c/0x68 [ 18.389998] kasan_save_track+0x20/0x40 [ 18.390286] kasan_save_alloc_info+0x40/0x58 [ 18.390367] __kasan_kmalloc+0xd4/0xd8 [ 18.390629] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.390858] kasan_atomics+0xb8/0x2e0 [ 18.390986] kunit_try_run_case+0x170/0x3f0 [ 18.391181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.391252] kthread+0x328/0x630 [ 18.391285] ret_from_fork+0x10/0x20 [ 18.391328] [ 18.391534] The buggy address belongs to the object at fff00000c78be300 [ 18.391534] which belongs to the cache kmalloc-64 of size 64 [ 18.392168] The buggy address is located 0 bytes to the right of [ 18.392168] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.392257] [ 18.392440] The buggy address belongs to the physical page: [ 18.392701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.392776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.393128] page_type: f5(slab) [ 18.393179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.393685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.393853] page dumped because: kasan: bad access detected [ 18.393893] [ 18.393915] Memory state around the buggy address: [ 18.394323] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.394719] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.394774] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.395165] ^ [ 18.395513] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.395568] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.395610] ================================================================== [ 18.200038] ================================================================== [ 18.200324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.200520] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.200574] [ 18.200704] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.201010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.201055] Hardware name: linux,dummy-virt (DT) [ 18.201140] Call trace: [ 18.201168] show_stack+0x20/0x38 (C) [ 18.201401] dump_stack_lvl+0x8c/0xd0 [ 18.201466] print_report+0x118/0x5d0 [ 18.201565] kasan_report+0xdc/0x128 [ 18.201706] kasan_check_range+0x100/0x1a8 [ 18.201761] __kasan_check_write+0x20/0x30 [ 18.202002] kasan_atomics_helper+0xe44/0x4858 [ 18.202170] kasan_atomics+0x198/0x2e0 [ 18.202547] kunit_try_run_case+0x170/0x3f0 [ 18.202636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.202703] kthread+0x328/0x630 [ 18.202746] ret_from_fork+0x10/0x20 [ 18.202912] [ 18.202941] Allocated by task 265: [ 18.202974] kasan_save_stack+0x3c/0x68 [ 18.203404] kasan_save_track+0x20/0x40 [ 18.203660] kasan_save_alloc_info+0x40/0x58 [ 18.203763] __kasan_kmalloc+0xd4/0xd8 [ 18.204013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.204186] kasan_atomics+0xb8/0x2e0 [ 18.204393] kunit_try_run_case+0x170/0x3f0 [ 18.204514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.204729] kthread+0x328/0x630 [ 18.204809] ret_from_fork+0x10/0x20 [ 18.205056] [ 18.205194] The buggy address belongs to the object at fff00000c78be300 [ 18.205194] which belongs to the cache kmalloc-64 of size 64 [ 18.205448] The buggy address is located 0 bytes to the right of [ 18.205448] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.205979] [ 18.206407] The buggy address belongs to the physical page: [ 18.206523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.206865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.207142] page_type: f5(slab) [ 18.207383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.207459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.207643] page dumped because: kasan: bad access detected [ 18.207706] [ 18.207727] Memory state around the buggy address: [ 18.207776] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.207825] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.207867] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.207917] ^ [ 18.207963] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.208008] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.208046] ================================================================== [ 18.087133] ================================================================== [ 18.087338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 18.087461] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.087518] [ 18.087549] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.087836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.087974] Hardware name: linux,dummy-virt (DT) [ 18.088146] Call trace: [ 18.088191] show_stack+0x20/0x38 (C) [ 18.088573] dump_stack_lvl+0x8c/0xd0 [ 18.088721] print_report+0x118/0x5d0 [ 18.090157] kunit_try_run_case+0x170/0x3f0 [ 18.090887] ret_from_fork+0x10/0x20 [ 18.090984] [ 18.091022] Allocated by task 265: [ 18.091181] kasan_save_stack+0x3c/0x68 [ 18.091433] kasan_save_track+0x20/0x40 [ 18.091531] kasan_save_alloc_info+0x40/0x58 [ 18.091651] __kasan_kmalloc+0xd4/0xd8 [ 18.091912] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.092053] kasan_atomics+0xb8/0x2e0 [ 18.092273] kunit_try_run_case+0x170/0x3f0 [ 18.092455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.092673] kthread+0x328/0x630 [ 18.092885] ret_from_fork+0x10/0x20 [ 18.092939] [ 18.093135] The buggy address belongs to the object at fff00000c78be300 [ 18.093135] which belongs to the cache kmalloc-64 of size 64 [ 18.093948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.094817] [ 18.095553] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.100582] kasan_save_stack+0x3c/0x68 [ 18.102865] [ 18.103741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.109721] kthread+0x328/0x630 [ 18.110534] [ 18.113072] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.115775] ================================================================== [ 18.227692] ================================================================== [ 18.227745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.227797] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.227908] [ 18.227943] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.228046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.228435] Hardware name: linux,dummy-virt (DT) [ 18.228710] Call trace: [ 18.228749] show_stack+0x20/0x38 (C) [ 18.228924] dump_stack_lvl+0x8c/0xd0 [ 18.229070] print_report+0x118/0x5d0 [ 18.229432] kasan_report+0xdc/0x128 [ 18.229483] kasan_check_range+0x100/0x1a8 [ 18.229722] __kasan_check_write+0x20/0x30 [ 18.229930] kasan_atomics_helper+0xf20/0x4858 [ 18.230028] kasan_atomics+0x198/0x2e0 [ 18.230128] kunit_try_run_case+0x170/0x3f0 [ 18.230277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.230365] kthread+0x328/0x630 [ 18.230420] ret_from_fork+0x10/0x20 [ 18.230635] [ 18.230983] Allocated by task 265: [ 18.231106] kasan_save_stack+0x3c/0x68 [ 18.231323] kasan_save_track+0x20/0x40 [ 18.231572] kasan_save_alloc_info+0x40/0x58 [ 18.231643] __kasan_kmalloc+0xd4/0xd8 [ 18.231900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.232121] kasan_atomics+0xb8/0x2e0 [ 18.232203] kunit_try_run_case+0x170/0x3f0 [ 18.232274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.232756] kthread+0x328/0x630 [ 18.232924] ret_from_fork+0x10/0x20 [ 18.233022] [ 18.233160] The buggy address belongs to the object at fff00000c78be300 [ 18.233160] which belongs to the cache kmalloc-64 of size 64 [ 18.233232] The buggy address is located 0 bytes to the right of [ 18.233232] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.233641] [ 18.233699] The buggy address belongs to the physical page: [ 18.233752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.233890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.233980] page_type: f5(slab) [ 18.234329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.234441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.234575] page dumped because: kasan: bad access detected [ 18.234735] [ 18.234806] Memory state around the buggy address: [ 18.234981] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.235031] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.235085] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.235505] ^ [ 18.235600] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.235648] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.235701] ================================================================== [ 18.338820] ================================================================== [ 18.338876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.338927] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.338979] [ 18.339675] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.339783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.339943] Hardware name: linux,dummy-virt (DT) [ 18.340014] Call trace: [ 18.340131] show_stack+0x20/0x38 (C) [ 18.340195] dump_stack_lvl+0x8c/0xd0 [ 18.340415] print_report+0x118/0x5d0 [ 18.340705] kasan_report+0xdc/0x128 [ 18.340948] kasan_check_range+0x100/0x1a8 [ 18.341185] __kasan_check_write+0x20/0x30 [ 18.341356] kasan_atomics_helper+0x1414/0x4858 [ 18.341511] kasan_atomics+0x198/0x2e0 [ 18.341578] kunit_try_run_case+0x170/0x3f0 [ 18.342247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.342346] kthread+0x328/0x630 [ 18.342449] ret_from_fork+0x10/0x20 [ 18.342524] [ 18.342546] Allocated by task 265: [ 18.342739] kasan_save_stack+0x3c/0x68 [ 18.342987] kasan_save_track+0x20/0x40 [ 18.343328] kasan_save_alloc_info+0x40/0x58 [ 18.343540] __kasan_kmalloc+0xd4/0xd8 [ 18.343657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.343768] kasan_atomics+0xb8/0x2e0 [ 18.343819] kunit_try_run_case+0x170/0x3f0 [ 18.343858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.343912] kthread+0x328/0x630 [ 18.343946] ret_from_fork+0x10/0x20 [ 18.344113] [ 18.344255] The buggy address belongs to the object at fff00000c78be300 [ 18.344255] which belongs to the cache kmalloc-64 of size 64 [ 18.344628] The buggy address is located 0 bytes to the right of [ 18.344628] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.344839] [ 18.344863] The buggy address belongs to the physical page: [ 18.345040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.345480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.345573] page_type: f5(slab) [ 18.346067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.346301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.346551] page dumped because: kasan: bad access detected [ 18.346594] [ 18.346773] Memory state around the buggy address: [ 18.346924] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.347235] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.347441] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.347487] ^ [ 18.347526] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.347978] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.348221] ================================================================== [ 18.429675] ================================================================== [ 18.429728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.429876] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.430076] [ 18.430114] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.430424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.430826] Hardware name: linux,dummy-virt (DT) [ 18.430935] Call trace: [ 18.430964] show_stack+0x20/0x38 (C) [ 18.431057] dump_stack_lvl+0x8c/0xd0 [ 18.431189] print_report+0x118/0x5d0 [ 18.431287] kasan_report+0xdc/0x128 [ 18.431419] kasan_check_range+0x100/0x1a8 [ 18.431473] __kasan_check_write+0x20/0x30 [ 18.431526] kasan_atomics_helper+0x175c/0x4858 [ 18.431576] kasan_atomics+0x198/0x2e0 [ 18.432332] kunit_try_run_case+0x170/0x3f0 [ 18.432422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.432500] kthread+0x328/0x630 [ 18.432543] ret_from_fork+0x10/0x20 [ 18.432603] [ 18.432625] Allocated by task 265: [ 18.432673] kasan_save_stack+0x3c/0x68 [ 18.432717] kasan_save_track+0x20/0x40 [ 18.432757] kasan_save_alloc_info+0x40/0x58 [ 18.432799] __kasan_kmalloc+0xd4/0xd8 [ 18.432839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.432890] kasan_atomics+0xb8/0x2e0 [ 18.432939] kunit_try_run_case+0x170/0x3f0 [ 18.432989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.433035] kthread+0x328/0x630 [ 18.433082] ret_from_fork+0x10/0x20 [ 18.433137] [ 18.433168] The buggy address belongs to the object at fff00000c78be300 [ 18.433168] which belongs to the cache kmalloc-64 of size 64 [ 18.433235] The buggy address is located 0 bytes to the right of [ 18.433235] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.433301] [ 18.433332] The buggy address belongs to the physical page: [ 18.433372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.433441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.433501] page_type: f5(slab) [ 18.433556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.433610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.433653] page dumped because: kasan: bad access detected [ 18.433715] [ 18.433736] Memory state around the buggy address: [ 18.433770] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.433815] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.433860] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.433917] ^ [ 18.433952] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.433998] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.434049] ================================================================== [ 18.165695] ================================================================== [ 18.165758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.165814] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.165999] [ 18.166044] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.166402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.166449] Hardware name: linux,dummy-virt (DT) [ 18.166628] Call trace: [ 18.166792] show_stack+0x20/0x38 (C) [ 18.166877] dump_stack_lvl+0x8c/0xd0 [ 18.166928] print_report+0x118/0x5d0 [ 18.166977] kasan_report+0xdc/0x128 [ 18.167289] kasan_check_range+0x100/0x1a8 [ 18.167487] __kasan_check_write+0x20/0x30 [ 18.167612] kasan_atomics_helper+0xd3c/0x4858 [ 18.167799] kasan_atomics+0x198/0x2e0 [ 18.167847] kunit_try_run_case+0x170/0x3f0 [ 18.167903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.167958] kthread+0x328/0x630 [ 18.168397] ret_from_fork+0x10/0x20 [ 18.168572] [ 18.168621] Allocated by task 265: [ 18.168756] kasan_save_stack+0x3c/0x68 [ 18.169061] kasan_save_track+0x20/0x40 [ 18.169175] kasan_save_alloc_info+0x40/0x58 [ 18.169296] __kasan_kmalloc+0xd4/0xd8 [ 18.169402] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.169793] kasan_atomics+0xb8/0x2e0 [ 18.170040] kunit_try_run_case+0x170/0x3f0 [ 18.170155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.170318] kthread+0x328/0x630 [ 18.170374] ret_from_fork+0x10/0x20 [ 18.170798] [ 18.170845] The buggy address belongs to the object at fff00000c78be300 [ 18.170845] which belongs to the cache kmalloc-64 of size 64 [ 18.171000] The buggy address is located 0 bytes to the right of [ 18.171000] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.171192] [ 18.171256] The buggy address belongs to the physical page: [ 18.171290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.171351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.171400] page_type: f5(slab) [ 18.171793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.171920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.172037] page dumped because: kasan: bad access detected [ 18.172075] [ 18.172112] Memory state around the buggy address: [ 18.172146] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.172191] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.172251] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.172293] ^ [ 18.172334] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.172384] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.172442] ================================================================== [ 18.070394] ================================================================== [ 18.070570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 18.070632] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.070699] [ 18.070731] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.070814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.070843] Hardware name: linux,dummy-virt (DT) [ 18.070876] Call trace: [ 18.070900] show_stack+0x20/0x38 (C) [ 18.070948] dump_stack_lvl+0x8c/0xd0 [ 18.071613] kasan_report+0xdc/0x128 [ 18.073024] kunit_try_run_case+0x170/0x3f0 [ 18.073127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.073207] kthread+0x328/0x630 [ 18.073278] ret_from_fork+0x10/0x20 [ 18.073558] [ 18.073597] Allocated by task 265: [ 18.073659] kasan_save_stack+0x3c/0x68 [ 18.073852] kasan_save_track+0x20/0x40 [ 18.074075] kasan_save_alloc_info+0x40/0x58 [ 18.074257] __kasan_kmalloc+0xd4/0xd8 [ 18.074460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.074697] kasan_atomics+0xb8/0x2e0 [ 18.074857] kunit_try_run_case+0x170/0x3f0 [ 18.074920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.075006] kthread+0x328/0x630 [ 18.075091] ret_from_fork+0x10/0x20 [ 18.075294] [ 18.075319] The buggy address belongs to the object at fff00000c78be300 [ 18.075319] which belongs to the cache kmalloc-64 of size 64 [ 18.075741] The buggy address is located 0 bytes to the right of [ 18.075741] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.075872] [ 18.076018] The buggy address belongs to the physical page: [ 18.076123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.076220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.076333] page_type: f5(slab) [ 18.076425] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.076544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.076896] page dumped because: kasan: bad access detected [ 18.077051] [ 18.077112] Memory state around the buggy address: [ 18.077149] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.077507] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.077644] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.077904] ^ [ 18.078170] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.078344] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.078393] ================================================================== [ 18.366628] ================================================================== [ 18.366702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.366753] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.366896] [ 18.366970] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.367371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.367412] Hardware name: linux,dummy-virt (DT) [ 18.367446] Call trace: [ 18.367471] show_stack+0x20/0x38 (C) [ 18.367893] dump_stack_lvl+0x8c/0xd0 [ 18.368263] print_report+0x118/0x5d0 [ 18.368770] kasan_report+0xdc/0x128 [ 18.368990] kasan_check_range+0x100/0x1a8 [ 18.369113] __kasan_check_write+0x20/0x30 [ 18.369243] kasan_atomics_helper+0x154c/0x4858 [ 18.369295] kasan_atomics+0x198/0x2e0 [ 18.369509] kunit_try_run_case+0x170/0x3f0 [ 18.369980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.370173] kthread+0x328/0x630 [ 18.370223] ret_from_fork+0x10/0x20 [ 18.370311] [ 18.370620] Allocated by task 265: [ 18.370987] kasan_save_stack+0x3c/0x68 [ 18.371161] kasan_save_track+0x20/0x40 [ 18.371262] kasan_save_alloc_info+0x40/0x58 [ 18.371425] __kasan_kmalloc+0xd4/0xd8 [ 18.371514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.371911] kasan_atomics+0xb8/0x2e0 [ 18.372437] kunit_try_run_case+0x170/0x3f0 [ 18.372758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.372843] kthread+0x328/0x630 [ 18.372880] ret_from_fork+0x10/0x20 [ 18.372930] [ 18.373165] The buggy address belongs to the object at fff00000c78be300 [ 18.373165] which belongs to the cache kmalloc-64 of size 64 [ 18.373504] The buggy address is located 0 bytes to the right of [ 18.373504] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.373732] [ 18.373758] The buggy address belongs to the physical page: [ 18.373822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.374023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.374211] page_type: f5(slab) [ 18.374475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.374640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.375329] page dumped because: kasan: bad access detected [ 18.375393] [ 18.375506] Memory state around the buggy address: [ 18.375544] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.375591] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.375635] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.376194] ^ [ 18.376315] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.376532] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.376911] ================================================================== [ 18.321272] ================================================================== [ 18.321335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.321386] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.321599] [ 18.321798] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.321929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.322006] Hardware name: linux,dummy-virt (DT) [ 18.322043] Call trace: [ 18.322069] show_stack+0x20/0x38 (C) [ 18.322136] dump_stack_lvl+0x8c/0xd0 [ 18.322281] print_report+0x118/0x5d0 [ 18.322335] kasan_report+0xdc/0x128 [ 18.322531] kasan_check_range+0x100/0x1a8 [ 18.322790] __kasan_check_write+0x20/0x30 [ 18.322865] kasan_atomics_helper+0x1384/0x4858 [ 18.322917] kasan_atomics+0x198/0x2e0 [ 18.322963] kunit_try_run_case+0x170/0x3f0 [ 18.323287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.323500] kthread+0x328/0x630 [ 18.323683] ret_from_fork+0x10/0x20 [ 18.323929] [ 18.324022] Allocated by task 265: [ 18.324106] kasan_save_stack+0x3c/0x68 [ 18.324384] kasan_save_track+0x20/0x40 [ 18.324617] kasan_save_alloc_info+0x40/0x58 [ 18.324774] __kasan_kmalloc+0xd4/0xd8 [ 18.324886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.324940] kasan_atomics+0xb8/0x2e0 [ 18.324979] kunit_try_run_case+0x170/0x3f0 [ 18.325266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.325542] kthread+0x328/0x630 [ 18.325944] ret_from_fork+0x10/0x20 [ 18.326380] [ 18.326411] The buggy address belongs to the object at fff00000c78be300 [ 18.326411] which belongs to the cache kmalloc-64 of size 64 [ 18.326811] The buggy address is located 0 bytes to the right of [ 18.326811] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.326958] [ 18.326983] The buggy address belongs to the physical page: [ 18.327025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.327435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.327659] page_type: f5(slab) [ 18.327768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.327922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.327971] page dumped because: kasan: bad access detected [ 18.328005] [ 18.328027] Memory state around the buggy address: [ 18.328061] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.328615] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.328816] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.328911] ^ [ 18.328953] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.329135] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.329184] ================================================================== [ 18.434267] ================================================================== [ 18.434311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.434360] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.434412] [ 18.434466] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.434549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.434579] Hardware name: linux,dummy-virt (DT) [ 18.434612] Call trace: [ 18.434634] show_stack+0x20/0x38 (C) [ 18.435797] dump_stack_lvl+0x8c/0xd0 [ 18.435917] print_report+0x118/0x5d0 [ 18.435994] kasan_report+0xdc/0x128 [ 18.436076] __asan_report_load8_noabort+0x20/0x30 [ 18.436160] kasan_atomics_helper+0x3e20/0x4858 [ 18.436242] kasan_atomics+0x198/0x2e0 [ 18.436704] kunit_try_run_case+0x170/0x3f0 [ 18.436785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.436900] kthread+0x328/0x630 [ 18.436947] ret_from_fork+0x10/0x20 [ 18.437492] [ 18.437534] Allocated by task 265: [ 18.437803] kasan_save_stack+0x3c/0x68 [ 18.437946] kasan_save_track+0x20/0x40 [ 18.438025] kasan_save_alloc_info+0x40/0x58 [ 18.438115] __kasan_kmalloc+0xd4/0xd8 [ 18.438177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.438583] kasan_atomics+0xb8/0x2e0 [ 18.438845] kunit_try_run_case+0x170/0x3f0 [ 18.438954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.439027] kthread+0x328/0x630 [ 18.439192] ret_from_fork+0x10/0x20 [ 18.439293] [ 18.439402] The buggy address belongs to the object at fff00000c78be300 [ 18.439402] which belongs to the cache kmalloc-64 of size 64 [ 18.439465] The buggy address is located 0 bytes to the right of [ 18.439465] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.439532] [ 18.439561] The buggy address belongs to the physical page: [ 18.439744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.440735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.440823] page_type: f5(slab) [ 18.440874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.440945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.441034] page dumped because: kasan: bad access detected [ 18.441208] [ 18.441236] Memory state around the buggy address: [ 18.441444] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.441758] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.441846] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.441914] ^ [ 18.442190] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.442271] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.442508] ================================================================== [ 18.237490] ================================================================== [ 18.237547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.237628] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.238028] [ 18.238074] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.238225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.238302] Hardware name: linux,dummy-virt (DT) [ 18.238337] Call trace: [ 18.238364] show_stack+0x20/0x38 (C) [ 18.238415] dump_stack_lvl+0x8c/0xd0 [ 18.238657] print_report+0x118/0x5d0 [ 18.238726] kasan_report+0xdc/0x128 [ 18.238911] kasan_check_range+0x100/0x1a8 [ 18.239028] __kasan_check_write+0x20/0x30 [ 18.239905] kasan_atomics_helper+0xf88/0x4858 [ 18.239989] kasan_atomics+0x198/0x2e0 [ 18.240045] kunit_try_run_case+0x170/0x3f0 [ 18.240112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.240168] kthread+0x328/0x630 [ 18.240211] ret_from_fork+0x10/0x20 [ 18.240261] [ 18.240310] Allocated by task 265: [ 18.240363] kasan_save_stack+0x3c/0x68 [ 18.240414] kasan_save_track+0x20/0x40 [ 18.240474] kasan_save_alloc_info+0x40/0x58 [ 18.240526] __kasan_kmalloc+0xd4/0xd8 [ 18.240565] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.240622] kasan_atomics+0xb8/0x2e0 [ 18.240673] kunit_try_run_case+0x170/0x3f0 [ 18.240714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.240761] kthread+0x328/0x630 [ 18.240796] ret_from_fork+0x10/0x20 [ 18.240835] [ 18.240856] The buggy address belongs to the object at fff00000c78be300 [ 18.240856] which belongs to the cache kmalloc-64 of size 64 [ 18.240917] The buggy address is located 0 bytes to the right of [ 18.240917] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.240994] [ 18.241030] The buggy address belongs to the physical page: [ 18.241081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.241151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.241202] page_type: f5(slab) [ 18.241260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.241315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.241361] page dumped because: kasan: bad access detected [ 18.241396] [ 18.241418] Memory state around the buggy address: [ 18.241452] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.241498] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.241553] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.241596] ^ [ 18.241639] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.242140] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.242224] ================================================================== [ 18.412406] ================================================================== [ 18.412583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.412641] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.412890] [ 18.412965] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.413064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.413092] Hardware name: linux,dummy-virt (DT) [ 18.413545] Call trace: [ 18.413622] show_stack+0x20/0x38 (C) [ 18.413904] dump_stack_lvl+0x8c/0xd0 [ 18.414329] print_report+0x118/0x5d0 [ 18.414399] kasan_report+0xdc/0x128 [ 18.414564] kasan_check_range+0x100/0x1a8 [ 18.414626] __kasan_check_write+0x20/0x30 [ 18.414771] kasan_atomics_helper+0x16d0/0x4858 [ 18.414830] kasan_atomics+0x198/0x2e0 [ 18.414878] kunit_try_run_case+0x170/0x3f0 [ 18.414926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.414981] kthread+0x328/0x630 [ 18.415492] ret_from_fork+0x10/0x20 [ 18.415750] [ 18.415810] Allocated by task 265: [ 18.415847] kasan_save_stack+0x3c/0x68 [ 18.416090] kasan_save_track+0x20/0x40 [ 18.416194] kasan_save_alloc_info+0x40/0x58 [ 18.416635] __kasan_kmalloc+0xd4/0xd8 [ 18.416725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.416961] kasan_atomics+0xb8/0x2e0 [ 18.417048] kunit_try_run_case+0x170/0x3f0 [ 18.417185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.417234] kthread+0x328/0x630 [ 18.417638] ret_from_fork+0x10/0x20 [ 18.417879] [ 18.417988] The buggy address belongs to the object at fff00000c78be300 [ 18.417988] which belongs to the cache kmalloc-64 of size 64 [ 18.418162] The buggy address is located 0 bytes to the right of [ 18.418162] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.418332] [ 18.418400] The buggy address belongs to the physical page: [ 18.418483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.418613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.418677] page_type: f5(slab) [ 18.418717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.418769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.418813] page dumped because: kasan: bad access detected [ 18.418857] [ 18.418888] Memory state around the buggy address: [ 18.418921] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.418968] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.419023] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.419062] ^ [ 18.419099] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.419145] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.419183] ================================================================== [ 18.220311] ================================================================== [ 18.220369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.220564] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.220632] [ 18.220675] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.220760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.220823] Hardware name: linux,dummy-virt (DT) [ 18.220860] Call trace: [ 18.220883] show_stack+0x20/0x38 (C) [ 18.220935] dump_stack_lvl+0x8c/0xd0 [ 18.220983] print_report+0x118/0x5d0 [ 18.221031] kasan_report+0xdc/0x128 [ 18.221077] kasan_check_range+0x100/0x1a8 [ 18.221129] __kasan_check_write+0x20/0x30 [ 18.221195] kasan_atomics_helper+0xeb8/0x4858 [ 18.221244] kasan_atomics+0x198/0x2e0 [ 18.221291] kunit_try_run_case+0x170/0x3f0 [ 18.221339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.221391] kthread+0x328/0x630 [ 18.221433] ret_from_fork+0x10/0x20 [ 18.221482] [ 18.221503] Allocated by task 265: [ 18.221534] kasan_save_stack+0x3c/0x68 [ 18.221576] kasan_save_track+0x20/0x40 [ 18.221624] kasan_save_alloc_info+0x40/0x58 [ 18.221677] __kasan_kmalloc+0xd4/0xd8 [ 18.221740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.222021] kasan_atomics+0xb8/0x2e0 [ 18.222335] kunit_try_run_case+0x170/0x3f0 [ 18.222414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.222922] kthread+0x328/0x630 [ 18.223157] ret_from_fork+0x10/0x20 [ 18.223578] [ 18.223608] The buggy address belongs to the object at fff00000c78be300 [ 18.223608] which belongs to the cache kmalloc-64 of size 64 [ 18.223689] The buggy address is located 0 bytes to the right of [ 18.223689] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.224090] [ 18.224218] The buggy address belongs to the physical page: [ 18.224507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.224827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.224987] page_type: f5(slab) [ 18.225076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.225174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.225219] page dumped because: kasan: bad access detected [ 18.225293] [ 18.225945] Memory state around the buggy address: [ 18.226078] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.226192] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.226435] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.226589] ^ [ 18.226710] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226809] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226954] ================================================================== [ 18.174244] ================================================================== [ 18.174650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.174734] Read of size 4 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.174787] [ 18.175048] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.175147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.175200] Hardware name: linux,dummy-virt (DT) [ 18.175450] Call trace: [ 18.175660] show_stack+0x20/0x38 (C) [ 18.175832] dump_stack_lvl+0x8c/0xd0 [ 18.175932] print_report+0x118/0x5d0 [ 18.176070] kasan_report+0xdc/0x128 [ 18.176148] __asan_report_load4_noabort+0x20/0x30 [ 18.176208] kasan_atomics_helper+0x3e04/0x4858 [ 18.176258] kasan_atomics+0x198/0x2e0 [ 18.176696] kunit_try_run_case+0x170/0x3f0 [ 18.176828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.176919] kthread+0x328/0x630 [ 18.177412] ret_from_fork+0x10/0x20 [ 18.177798] [ 18.177829] Allocated by task 265: [ 18.177881] kasan_save_stack+0x3c/0x68 [ 18.178120] kasan_save_track+0x20/0x40 [ 18.178299] kasan_save_alloc_info+0x40/0x58 [ 18.178364] __kasan_kmalloc+0xd4/0xd8 [ 18.178404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.178446] kasan_atomics+0xb8/0x2e0 [ 18.178485] kunit_try_run_case+0x170/0x3f0 [ 18.178531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.178586] kthread+0x328/0x630 [ 18.178631] ret_from_fork+0x10/0x20 [ 18.178682] [ 18.178718] The buggy address belongs to the object at fff00000c78be300 [ 18.178718] which belongs to the cache kmalloc-64 of size 64 [ 18.178780] The buggy address is located 0 bytes to the right of [ 18.178780] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.178858] [ 18.178881] The buggy address belongs to the physical page: [ 18.178915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.178970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.179584] page_type: f5(slab) [ 18.179708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.180348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.180450] page dumped because: kasan: bad access detected [ 18.180519] [ 18.180661] Memory state around the buggy address: [ 18.180732] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.181126] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.181309] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.181364] ^ [ 18.181621] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.182003] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.182114] ================================================================== [ 18.377837] ================================================================== [ 18.378036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.378099] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.378151] [ 18.378309] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.378401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.378429] Hardware name: linux,dummy-virt (DT) [ 18.378769] Call trace: [ 18.378863] show_stack+0x20/0x38 (C) [ 18.379055] dump_stack_lvl+0x8c/0xd0 [ 18.379556] print_report+0x118/0x5d0 [ 18.379614] kasan_report+0xdc/0x128 [ 18.379870] kasan_check_range+0x100/0x1a8 [ 18.380234] __kasan_check_write+0x20/0x30 [ 18.380554] kasan_atomics_helper+0x15b4/0x4858 [ 18.380722] kasan_atomics+0x198/0x2e0 [ 18.380806] kunit_try_run_case+0x170/0x3f0 [ 18.380871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.381205] kthread+0x328/0x630 [ 18.381492] ret_from_fork+0x10/0x20 [ 18.381722] [ 18.381751] Allocated by task 265: [ 18.381783] kasan_save_stack+0x3c/0x68 [ 18.381830] kasan_save_track+0x20/0x40 [ 18.381912] kasan_save_alloc_info+0x40/0x58 [ 18.381981] __kasan_kmalloc+0xd4/0xd8 [ 18.382030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.382072] kasan_atomics+0xb8/0x2e0 [ 18.382109] kunit_try_run_case+0x170/0x3f0 [ 18.382151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.382205] kthread+0x328/0x630 [ 18.382239] ret_from_fork+0x10/0x20 [ 18.382290] [ 18.382324] The buggy address belongs to the object at fff00000c78be300 [ 18.382324] which belongs to the cache kmalloc-64 of size 64 [ 18.382385] The buggy address is located 0 bytes to the right of [ 18.382385] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.382459] [ 18.382490] The buggy address belongs to the physical page: [ 18.382525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.382578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.382628] page_type: f5(slab) [ 18.382704] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.383143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.383536] page dumped because: kasan: bad access detected [ 18.383606] [ 18.383681] Memory state around the buggy address: [ 18.383894] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.384012] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.384236] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.384636] ^ [ 18.384779] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.384833] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385049] ================================================================== [ 18.396357] ================================================================== [ 18.396424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.396696] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.396763] [ 18.396899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.396987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.397222] Hardware name: linux,dummy-virt (DT) [ 18.397296] Call trace: [ 18.397685] show_stack+0x20/0x38 (C) [ 18.397755] dump_stack_lvl+0x8c/0xd0 [ 18.397877] print_report+0x118/0x5d0 [ 18.397949] kasan_report+0xdc/0x128 [ 18.397996] kasan_check_range+0x100/0x1a8 [ 18.398105] __kasan_check_write+0x20/0x30 [ 18.398150] kasan_atomics_helper+0x1644/0x4858 [ 18.398200] kasan_atomics+0x198/0x2e0 [ 18.398262] kunit_try_run_case+0x170/0x3f0 [ 18.398455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.398525] kthread+0x328/0x630 [ 18.398567] ret_from_fork+0x10/0x20 [ 18.398625] [ 18.398951] Allocated by task 265: [ 18.399005] kasan_save_stack+0x3c/0x68 [ 18.399614] kasan_save_track+0x20/0x40 [ 18.399788] kasan_save_alloc_info+0x40/0x58 [ 18.400047] __kasan_kmalloc+0xd4/0xd8 [ 18.400149] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.400345] kasan_atomics+0xb8/0x2e0 [ 18.400580] kunit_try_run_case+0x170/0x3f0 [ 18.400656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.400730] kthread+0x328/0x630 [ 18.400764] ret_from_fork+0x10/0x20 [ 18.400801] [ 18.400825] The buggy address belongs to the object at fff00000c78be300 [ 18.400825] which belongs to the cache kmalloc-64 of size 64 [ 18.400887] The buggy address is located 0 bytes to the right of [ 18.400887] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.400953] [ 18.401021] The buggy address belongs to the physical page: [ 18.401072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.401136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.401186] page_type: f5(slab) [ 18.401236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.401300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.401379] page dumped because: kasan: bad access detected [ 18.401423] [ 18.401446] Memory state around the buggy address: [ 18.401480] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.401533] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.401592] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.401635] ^ [ 18.401700] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.401754] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.401806] ================================================================== [ 18.276905] ================================================================== [ 18.276965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.277018] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.277107] [ 18.277142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.277225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.277253] Hardware name: linux,dummy-virt (DT) [ 18.277304] Call trace: [ 18.277330] show_stack+0x20/0x38 (C) [ 18.277380] dump_stack_lvl+0x8c/0xd0 [ 18.277428] print_report+0x118/0x5d0 [ 18.277475] kasan_report+0xdc/0x128 [ 18.277522] kasan_check_range+0x100/0x1a8 [ 18.277569] __kasan_check_write+0x20/0x30 [ 18.277615] kasan_atomics_helper+0x1128/0x4858 [ 18.277674] kasan_atomics+0x198/0x2e0 [ 18.277722] kunit_try_run_case+0x170/0x3f0 [ 18.277770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.277823] kthread+0x328/0x630 [ 18.277865] ret_from_fork+0x10/0x20 [ 18.277924] [ 18.277951] Allocated by task 265: [ 18.277989] kasan_save_stack+0x3c/0x68 [ 18.278043] kasan_save_track+0x20/0x40 [ 18.278085] kasan_save_alloc_info+0x40/0x58 [ 18.278134] __kasan_kmalloc+0xd4/0xd8 [ 18.278183] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.278232] kasan_atomics+0xb8/0x2e0 [ 18.278279] kunit_try_run_case+0x170/0x3f0 [ 18.278319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.278366] kthread+0x328/0x630 [ 18.278401] ret_from_fork+0x10/0x20 [ 18.278439] [ 18.278460] The buggy address belongs to the object at fff00000c78be300 [ 18.278460] which belongs to the cache kmalloc-64 of size 64 [ 18.278519] The buggy address is located 0 bytes to the right of [ 18.278519] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.278590] [ 18.278614] The buggy address belongs to the physical page: [ 18.278646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.279102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.279174] page_type: f5(slab) [ 18.279218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.279274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.279320] page dumped because: kasan: bad access detected [ 18.279355] [ 18.280109] Memory state around the buggy address: [ 18.280155] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.280615] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.280989] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.281456] ^ [ 18.281751] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.281971] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.282030] ================================================================== [ 18.283842] ================================================================== [ 18.283903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.283955] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.284016] [ 18.284047] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.284130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.284158] Hardware name: linux,dummy-virt (DT) [ 18.284488] Call trace: [ 18.284590] show_stack+0x20/0x38 (C) [ 18.284816] dump_stack_lvl+0x8c/0xd0 [ 18.284871] print_report+0x118/0x5d0 [ 18.285208] kasan_report+0xdc/0x128 [ 18.285279] kasan_check_range+0x100/0x1a8 [ 18.285378] __kasan_check_write+0x20/0x30 [ 18.285432] kasan_atomics_helper+0x1190/0x4858 [ 18.285481] kasan_atomics+0x198/0x2e0 [ 18.285535] kunit_try_run_case+0x170/0x3f0 [ 18.285827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.285908] kthread+0x328/0x630 [ 18.285952] ret_from_fork+0x10/0x20 [ 18.286333] [ 18.286375] Allocated by task 265: [ 18.286417] kasan_save_stack+0x3c/0x68 [ 18.286469] kasan_save_track+0x20/0x40 [ 18.286607] kasan_save_alloc_info+0x40/0x58 [ 18.286656] __kasan_kmalloc+0xd4/0xd8 [ 18.286860] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.287099] kasan_atomics+0xb8/0x2e0 [ 18.287176] kunit_try_run_case+0x170/0x3f0 [ 18.287390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.287527] kthread+0x328/0x630 [ 18.287756] ret_from_fork+0x10/0x20 [ 18.287854] [ 18.288286] The buggy address belongs to the object at fff00000c78be300 [ 18.288286] which belongs to the cache kmalloc-64 of size 64 [ 18.288536] The buggy address is located 0 bytes to the right of [ 18.288536] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.288740] [ 18.288863] The buggy address belongs to the physical page: [ 18.289331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.289424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.289681] page_type: f5(slab) [ 18.289872] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.290073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.290301] page dumped because: kasan: bad access detected [ 18.290438] [ 18.290495] Memory state around the buggy address: [ 18.290686] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.290748] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.291019] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.291215] ^ [ 18.291410] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.291587] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.291883] ================================================================== [ 18.293681] ================================================================== [ 18.293779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.293891] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.293946] [ 18.293984] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.294102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.294151] Hardware name: linux,dummy-virt (DT) [ 18.294350] Call trace: [ 18.294645] show_stack+0x20/0x38 (C) [ 18.294884] dump_stack_lvl+0x8c/0xd0 [ 18.294952] print_report+0x118/0x5d0 [ 18.295038] kasan_report+0xdc/0x128 [ 18.295119] kasan_check_range+0x100/0x1a8 [ 18.295286] __kasan_check_write+0x20/0x30 [ 18.295382] kasan_atomics_helper+0x11f8/0x4858 [ 18.295573] kasan_atomics+0x198/0x2e0 [ 18.295692] kunit_try_run_case+0x170/0x3f0 [ 18.295883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.296129] kthread+0x328/0x630 [ 18.296346] ret_from_fork+0x10/0x20 [ 18.296772] [ 18.296805] Allocated by task 265: [ 18.296887] kasan_save_stack+0x3c/0x68 [ 18.297080] kasan_save_track+0x20/0x40 [ 18.297245] kasan_save_alloc_info+0x40/0x58 [ 18.297390] __kasan_kmalloc+0xd4/0xd8 [ 18.297558] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.297640] kasan_atomics+0xb8/0x2e0 [ 18.297709] kunit_try_run_case+0x170/0x3f0 [ 18.298202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.298418] kthread+0x328/0x630 [ 18.298867] ret_from_fork+0x10/0x20 [ 18.299231] [ 18.299269] The buggy address belongs to the object at fff00000c78be300 [ 18.299269] which belongs to the cache kmalloc-64 of size 64 [ 18.299361] The buggy address is located 0 bytes to the right of [ 18.299361] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.299456] [ 18.299682] The buggy address belongs to the physical page: [ 18.300173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.300279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.300332] page_type: f5(slab) [ 18.300852] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.300931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.301345] page dumped because: kasan: bad access detected [ 18.301391] [ 18.301571] Memory state around the buggy address: [ 18.301815] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.302044] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.302325] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.302474] ^ [ 18.302649] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.302717] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.302757] ================================================================== [ 18.304076] ================================================================== [ 18.304154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.304229] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.304530] [ 18.304583] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.304683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.304811] Hardware name: linux,dummy-virt (DT) [ 18.304879] Call trace: [ 18.304907] show_stack+0x20/0x38 (C) [ 18.305034] dump_stack_lvl+0x8c/0xd0 [ 18.305089] print_report+0x118/0x5d0 [ 18.305137] kasan_report+0xdc/0x128 [ 18.305432] kasan_check_range+0x100/0x1a8 [ 18.305704] __kasan_check_write+0x20/0x30 [ 18.305896] kasan_atomics_helper+0x126c/0x4858 [ 18.305984] kasan_atomics+0x198/0x2e0 [ 18.306105] kunit_try_run_case+0x170/0x3f0 [ 18.306202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.306288] kthread+0x328/0x630 [ 18.306332] ret_from_fork+0x10/0x20 [ 18.306576] [ 18.306738] Allocated by task 265: [ 18.306994] kasan_save_stack+0x3c/0x68 [ 18.307252] kasan_save_track+0x20/0x40 [ 18.307354] kasan_save_alloc_info+0x40/0x58 [ 18.307497] __kasan_kmalloc+0xd4/0xd8 [ 18.307551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.307601] kasan_atomics+0xb8/0x2e0 [ 18.307801] kunit_try_run_case+0x170/0x3f0 [ 18.307994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.308109] kthread+0x328/0x630 [ 18.308365] ret_from_fork+0x10/0x20 [ 18.308618] [ 18.308705] The buggy address belongs to the object at fff00000c78be300 [ 18.308705] which belongs to the cache kmalloc-64 of size 64 [ 18.308898] The buggy address is located 0 bytes to the right of [ 18.308898] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.309017] [ 18.309184] The buggy address belongs to the physical page: [ 18.309235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.309320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.309373] page_type: f5(slab) [ 18.309421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.309474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.309519] page dumped because: kasan: bad access detected [ 18.309555] [ 18.309585] Memory state around the buggy address: [ 18.309619] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.309677] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.309779] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.310061] ^ [ 18.310721] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.310776] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.310839] ================================================================== [ 18.358821] ================================================================== [ 18.359031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.359297] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.359481] [ 18.359565] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.359656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.359696] Hardware name: linux,dummy-virt (DT) [ 18.360080] Call trace: [ 18.360493] show_stack+0x20/0x38 (C) [ 18.360647] dump_stack_lvl+0x8c/0xd0 [ 18.360743] print_report+0x118/0x5d0 [ 18.360798] kasan_report+0xdc/0x128 [ 18.361030] kasan_check_range+0x100/0x1a8 [ 18.361523] __kasan_check_write+0x20/0x30 [ 18.361684] kasan_atomics_helper+0x14e4/0x4858 [ 18.361872] kasan_atomics+0x198/0x2e0 [ 18.361977] kunit_try_run_case+0x170/0x3f0 [ 18.362181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.362440] kthread+0x328/0x630 [ 18.362716] ret_from_fork+0x10/0x20 [ 18.363005] [ 18.363153] Allocated by task 265: [ 18.363234] kasan_save_stack+0x3c/0x68 [ 18.363283] kasan_save_track+0x20/0x40 [ 18.363321] kasan_save_alloc_info+0x40/0x58 [ 18.363725] __kasan_kmalloc+0xd4/0xd8 [ 18.363791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.363906] kasan_atomics+0xb8/0x2e0 [ 18.363947] kunit_try_run_case+0x170/0x3f0 [ 18.364005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.364060] kthread+0x328/0x630 [ 18.364096] ret_from_fork+0x10/0x20 [ 18.364136] [ 18.364160] The buggy address belongs to the object at fff00000c78be300 [ 18.364160] which belongs to the cache kmalloc-64 of size 64 [ 18.364221] The buggy address is located 0 bytes to the right of [ 18.364221] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.364297] [ 18.364335] The buggy address belongs to the physical page: [ 18.364381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.364450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.364512] page_type: f5(slab) [ 18.364553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.364617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.364660] page dumped because: kasan: bad access detected [ 18.364705] [ 18.364727] Memory state around the buggy address: [ 18.364776] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.364822] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.364876] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.364917] ^ [ 18.364962] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.365004] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.365050] ================================================================== [ 18.444104] ================================================================== [ 18.444215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.444382] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.444444] [ 18.444583] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.444709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.444848] Hardware name: linux,dummy-virt (DT) [ 18.444891] Call trace: [ 18.445073] show_stack+0x20/0x38 (C) [ 18.445183] dump_stack_lvl+0x8c/0xd0 [ 18.445235] print_report+0x118/0x5d0 [ 18.445311] kasan_report+0xdc/0x128 [ 18.445483] kasan_check_range+0x100/0x1a8 [ 18.445721] __kasan_check_write+0x20/0x30 [ 18.445810] kasan_atomics_helper+0x17ec/0x4858 [ 18.445863] kasan_atomics+0x198/0x2e0 [ 18.445983] kunit_try_run_case+0x170/0x3f0 [ 18.446037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.446120] kthread+0x328/0x630 [ 18.446311] ret_from_fork+0x10/0x20 [ 18.446556] [ 18.446592] Allocated by task 265: [ 18.446748] kasan_save_stack+0x3c/0x68 [ 18.446809] kasan_save_track+0x20/0x40 [ 18.446928] kasan_save_alloc_info+0x40/0x58 [ 18.447209] __kasan_kmalloc+0xd4/0xd8 [ 18.447432] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.447603] kasan_atomics+0xb8/0x2e0 [ 18.447924] kunit_try_run_case+0x170/0x3f0 [ 18.448172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.448326] kthread+0x328/0x630 [ 18.448433] ret_from_fork+0x10/0x20 [ 18.448482] [ 18.448739] The buggy address belongs to the object at fff00000c78be300 [ 18.448739] which belongs to the cache kmalloc-64 of size 64 [ 18.448906] The buggy address is located 0 bytes to the right of [ 18.448906] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.449191] [ 18.449421] The buggy address belongs to the physical page: [ 18.449526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.449703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.449769] page_type: f5(slab) [ 18.449828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.449963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.450009] page dumped because: kasan: bad access detected [ 18.450050] [ 18.450073] Memory state around the buggy address: [ 18.450242] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.450475] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.450529] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.450754] ^ [ 18.450801] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.451151] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.451548] ================================================================== [ 18.243523] ================================================================== [ 18.243576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.243649] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.244030] [ 18.244078] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.244680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.244730] Hardware name: linux,dummy-virt (DT) [ 18.244766] Call trace: [ 18.245043] show_stack+0x20/0x38 (C) [ 18.245226] dump_stack_lvl+0x8c/0xd0 [ 18.245319] print_report+0x118/0x5d0 [ 18.245369] kasan_report+0xdc/0x128 [ 18.245575] kasan_check_range+0x100/0x1a8 [ 18.245916] __kasan_check_write+0x20/0x30 [ 18.246080] kasan_atomics_helper+0xff0/0x4858 [ 18.246251] kasan_atomics+0x198/0x2e0 [ 18.246432] kunit_try_run_case+0x170/0x3f0 [ 18.246508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.246930] kthread+0x328/0x630 [ 18.247262] ret_from_fork+0x10/0x20 [ 18.247543] [ 18.247611] Allocated by task 265: [ 18.247716] kasan_save_stack+0x3c/0x68 [ 18.247795] kasan_save_track+0x20/0x40 [ 18.247841] kasan_save_alloc_info+0x40/0x58 [ 18.247882] __kasan_kmalloc+0xd4/0xd8 [ 18.247922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.247967] kasan_atomics+0xb8/0x2e0 [ 18.248006] kunit_try_run_case+0x170/0x3f0 [ 18.248826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.249185] kthread+0x328/0x630 [ 18.249322] ret_from_fork+0x10/0x20 [ 18.249412] [ 18.249487] The buggy address belongs to the object at fff00000c78be300 [ 18.249487] which belongs to the cache kmalloc-64 of size 64 [ 18.249552] The buggy address is located 0 bytes to the right of [ 18.249552] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.249866] [ 18.250082] The buggy address belongs to the physical page: [ 18.250403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.250519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.250807] page_type: f5(slab) [ 18.251132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.251406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.251640] page dumped because: kasan: bad access detected [ 18.251720] [ 18.251867] Memory state around the buggy address: [ 18.252084] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.252381] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.252450] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.252625] ^ [ 18.252803] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.253132] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.253297] ================================================================== [ 18.190648] ================================================================== [ 18.190712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.191072] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.191157] [ 18.191610] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.191818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.191987] Hardware name: linux,dummy-virt (DT) [ 18.192149] Call trace: [ 18.192246] show_stack+0x20/0x38 (C) [ 18.192634] dump_stack_lvl+0x8c/0xd0 [ 18.192838] print_report+0x118/0x5d0 [ 18.192946] kasan_report+0xdc/0x128 [ 18.193189] __asan_report_load8_noabort+0x20/0x30 [ 18.193466] kasan_atomics_helper+0x3f58/0x4858 [ 18.193561] kasan_atomics+0x198/0x2e0 [ 18.193713] kunit_try_run_case+0x170/0x3f0 [ 18.193799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.193949] kthread+0x328/0x630 [ 18.194005] ret_from_fork+0x10/0x20 [ 18.194235] [ 18.194504] Allocated by task 265: [ 18.194605] kasan_save_stack+0x3c/0x68 [ 18.194735] kasan_save_track+0x20/0x40 [ 18.194997] kasan_save_alloc_info+0x40/0x58 [ 18.195135] __kasan_kmalloc+0xd4/0xd8 [ 18.195440] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.195482] kasan_atomics+0xb8/0x2e0 [ 18.195678] kunit_try_run_case+0x170/0x3f0 [ 18.195837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.195942] kthread+0x328/0x630 [ 18.196059] ret_from_fork+0x10/0x20 [ 18.196137] [ 18.196257] The buggy address belongs to the object at fff00000c78be300 [ 18.196257] which belongs to the cache kmalloc-64 of size 64 [ 18.196354] The buggy address is located 0 bytes to the right of [ 18.196354] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.196447] [ 18.196468] The buggy address belongs to the physical page: [ 18.196848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.196934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.197100] page_type: f5(slab) [ 18.197189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.197280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.197398] page dumped because: kasan: bad access detected [ 18.197462] [ 18.197517] Memory state around the buggy address: [ 18.197803] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.197872] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.198070] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.198134] ^ [ 18.198345] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.198397] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.198571] ================================================================== [ 18.419679] ================================================================== [ 18.419732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.419783] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265 [ 18.420129] [ 18.420173] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.420598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.420646] Hardware name: linux,dummy-virt (DT) [ 18.420975] Call trace: [ 18.421120] show_stack+0x20/0x38 (C) [ 18.421313] dump_stack_lvl+0x8c/0xd0 [ 18.421508] print_report+0x118/0x5d0 [ 18.421643] kasan_report+0xdc/0x128 [ 18.421707] __asan_report_load8_noabort+0x20/0x30 [ 18.421759] kasan_atomics_helper+0x3e10/0x4858 [ 18.422084] kasan_atomics+0x198/0x2e0 [ 18.422153] kunit_try_run_case+0x170/0x3f0 [ 18.422463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.422545] kthread+0x328/0x630 [ 18.422589] ret_from_fork+0x10/0x20 [ 18.422848] [ 18.422927] Allocated by task 265: [ 18.422963] kasan_save_stack+0x3c/0x68 [ 18.423096] kasan_save_track+0x20/0x40 [ 18.423139] kasan_save_alloc_info+0x40/0x58 [ 18.423180] __kasan_kmalloc+0xd4/0xd8 [ 18.423219] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.423775] kasan_atomics+0xb8/0x2e0 [ 18.423957] kunit_try_run_case+0x170/0x3f0 [ 18.424067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.424627] kthread+0x328/0x630 [ 18.424703] ret_from_fork+0x10/0x20 [ 18.424958] [ 18.424985] The buggy address belongs to the object at fff00000c78be300 [ 18.424985] which belongs to the cache kmalloc-64 of size 64 [ 18.425166] The buggy address is located 0 bytes to the right of [ 18.425166] allocated 48-byte region [fff00000c78be300, fff00000c78be330) [ 18.425457] [ 18.425676] The buggy address belongs to the physical page: [ 18.425719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be [ 18.426148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.426514] page_type: f5(slab) [ 18.426562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.427162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.427234] page dumped because: kasan: bad access detected [ 18.427432] [ 18.427460] Memory state around the buggy address: [ 18.427498] fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.427546] fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.427600] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.427895] ^ [ 18.428142] fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.428208] fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.428394] ==================================================================
[ 14.910369] ================================================================== [ 14.910975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.911329] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.911641] [ 14.911834] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.911879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.911891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.911924] Call Trace: [ 14.911939] <TASK> [ 14.911953] dump_stack_lvl+0x73/0xb0 [ 14.911980] print_report+0xd1/0x610 [ 14.912002] ? __virt_addr_valid+0x1db/0x2d0 [ 14.912026] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.912047] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.912069] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.912090] kasan_report+0x141/0x180 [ 14.912113] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.912139] __asan_report_store4_noabort+0x1b/0x30 [ 14.912164] kasan_atomics_helper+0x4b3a/0x5450 [ 14.912186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.912208] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.912232] ? trace_hardirqs_on+0x37/0xe0 [ 14.912254] ? kasan_atomics+0x152/0x310 [ 14.912280] kasan_atomics+0x1dc/0x310 [ 14.912303] ? __pfx_kasan_atomics+0x10/0x10 [ 14.912326] ? __pfx_kasan_atomics+0x10/0x10 [ 14.912391] kunit_try_run_case+0x1a5/0x480 [ 14.912420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912444] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.912467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.912490] ? __kthread_parkme+0x82/0x180 [ 14.912511] ? preempt_count_sub+0x50/0x80 [ 14.912534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.912581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.912605] kthread+0x337/0x6f0 [ 14.912624] ? trace_preempt_on+0x20/0xc0 [ 14.912646] ? __pfx_kthread+0x10/0x10 [ 14.912666] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.912694] ? calculate_sigpending+0x7b/0xa0 [ 14.912718] ? __pfx_kthread+0x10/0x10 [ 14.912739] ret_from_fork+0x116/0x1d0 [ 14.912758] ? __pfx_kthread+0x10/0x10 [ 14.912778] ret_from_fork_asm+0x1a/0x30 [ 14.912810] </TASK> [ 14.912820] [ 14.923504] Allocated by task 283: [ 14.923682] kasan_save_stack+0x45/0x70 [ 14.923874] kasan_save_track+0x18/0x40 [ 14.924062] kasan_save_alloc_info+0x3b/0x50 [ 14.924258] __kasan_kmalloc+0xb7/0xc0 [ 14.924798] __kmalloc_cache_noprof+0x189/0x420 [ 14.925029] kasan_atomics+0x95/0x310 [ 14.925204] kunit_try_run_case+0x1a5/0x480 [ 14.925756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.926233] kthread+0x337/0x6f0 [ 14.926599] ret_from_fork+0x116/0x1d0 [ 14.926799] ret_from_fork_asm+0x1a/0x30 [ 14.926985] [ 14.927084] The buggy address belongs to the object at ffff888102744f80 [ 14.927084] which belongs to the cache kmalloc-64 of size 64 [ 14.928284] The buggy address is located 0 bytes to the right of [ 14.928284] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.929165] [ 14.929261] The buggy address belongs to the physical page: [ 14.929564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.930653] flags: 0x200000000000000(node=0|zone=2) [ 14.931099] page_type: f5(slab) [ 14.931261] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.932075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.932668] page dumped because: kasan: bad access detected [ 14.933061] [ 14.933331] Memory state around the buggy address: [ 14.933847] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.934181] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.934797] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.935325] ^ [ 14.935756] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.936070] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.936345] ================================================================== [ 15.509227] ================================================================== [ 15.509619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.510038] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.510297] [ 15.510402] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.510444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.510456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.510477] Call Trace: [ 15.510489] <TASK> [ 15.510503] dump_stack_lvl+0x73/0xb0 [ 15.510530] print_report+0xd1/0x610 [ 15.510551] ? __virt_addr_valid+0x1db/0x2d0 [ 15.510573] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.510595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.510617] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.510638] kasan_report+0x141/0x180 [ 15.510660] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.510686] __asan_report_load4_noabort+0x18/0x20 [ 15.510711] kasan_atomics_helper+0x49e8/0x5450 [ 15.510734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.510756] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.510781] ? trace_hardirqs_on+0x37/0xe0 [ 15.510802] ? kasan_atomics+0x152/0x310 [ 15.510829] kasan_atomics+0x1dc/0x310 [ 15.510852] ? __pfx_kasan_atomics+0x10/0x10 [ 15.510875] ? __pfx_kasan_atomics+0x10/0x10 [ 15.510902] kunit_try_run_case+0x1a5/0x480 [ 15.510937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.510960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.510982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.511005] ? __kthread_parkme+0x82/0x180 [ 15.511025] ? preempt_count_sub+0x50/0x80 [ 15.511053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.511076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.511099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.511123] kthread+0x337/0x6f0 [ 15.511142] ? trace_preempt_on+0x20/0xc0 [ 15.511163] ? __pfx_kthread+0x10/0x10 [ 15.511184] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.511206] ? calculate_sigpending+0x7b/0xa0 [ 15.511229] ? __pfx_kthread+0x10/0x10 [ 15.511251] ret_from_fork+0x116/0x1d0 [ 15.511270] ? __pfx_kthread+0x10/0x10 [ 15.511291] ret_from_fork_asm+0x1a/0x30 [ 15.511322] </TASK> [ 15.511332] [ 15.518963] Allocated by task 283: [ 15.519144] kasan_save_stack+0x45/0x70 [ 15.519343] kasan_save_track+0x18/0x40 [ 15.519515] kasan_save_alloc_info+0x3b/0x50 [ 15.519692] __kasan_kmalloc+0xb7/0xc0 [ 15.519875] __kmalloc_cache_noprof+0x189/0x420 [ 15.520064] kasan_atomics+0x95/0x310 [ 15.520245] kunit_try_run_case+0x1a5/0x480 [ 15.520418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.520652] kthread+0x337/0x6f0 [ 15.520809] ret_from_fork+0x116/0x1d0 [ 15.520993] ret_from_fork_asm+0x1a/0x30 [ 15.521151] [ 15.521221] The buggy address belongs to the object at ffff888102744f80 [ 15.521221] which belongs to the cache kmalloc-64 of size 64 [ 15.521575] The buggy address is located 0 bytes to the right of [ 15.521575] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.521968] [ 15.522125] The buggy address belongs to the physical page: [ 15.522378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.522724] flags: 0x200000000000000(node=0|zone=2) [ 15.522966] page_type: f5(slab) [ 15.523284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.523575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.524040] page dumped because: kasan: bad access detected [ 15.524265] [ 15.524360] Memory state around the buggy address: [ 15.524522] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.524738] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.525080] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.525406] ^ [ 15.525633] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.525961] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.526334] ================================================================== [ 16.066829] ================================================================== [ 16.067179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.067711] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.068011] [ 16.068130] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.068414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.068433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.068456] Call Trace: [ 16.068472] <TASK> [ 16.068487] dump_stack_lvl+0x73/0xb0 [ 16.068517] print_report+0xd1/0x610 [ 16.068539] ? __virt_addr_valid+0x1db/0x2d0 [ 16.068562] ? kasan_atomics_helper+0x2006/0x5450 [ 16.068587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.068610] ? kasan_atomics_helper+0x2006/0x5450 [ 16.068634] kasan_report+0x141/0x180 [ 16.068657] ? kasan_atomics_helper+0x2006/0x5450 [ 16.068683] kasan_check_range+0x10c/0x1c0 [ 16.068708] __kasan_check_write+0x18/0x20 [ 16.068727] kasan_atomics_helper+0x2006/0x5450 [ 16.068750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.068773] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.068797] ? trace_hardirqs_on+0x37/0xe0 [ 16.068819] ? kasan_atomics+0x152/0x310 [ 16.068846] kasan_atomics+0x1dc/0x310 [ 16.068869] ? __pfx_kasan_atomics+0x10/0x10 [ 16.068892] ? __pfx_kasan_atomics+0x10/0x10 [ 16.068944] kunit_try_run_case+0x1a5/0x480 [ 16.068967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.069015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.069038] ? __kthread_parkme+0x82/0x180 [ 16.069059] ? preempt_count_sub+0x50/0x80 [ 16.069082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.069106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.069128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.069152] kthread+0x337/0x6f0 [ 16.069172] ? trace_preempt_on+0x20/0xc0 [ 16.069193] ? __pfx_kthread+0x10/0x10 [ 16.069214] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.069236] ? calculate_sigpending+0x7b/0xa0 [ 16.069259] ? __pfx_kthread+0x10/0x10 [ 16.069280] ret_from_fork+0x116/0x1d0 [ 16.069298] ? __pfx_kthread+0x10/0x10 [ 16.069318] ret_from_fork_asm+0x1a/0x30 [ 16.069349] </TASK> [ 16.069360] [ 16.077354] Allocated by task 283: [ 16.077537] kasan_save_stack+0x45/0x70 [ 16.078346] kasan_save_track+0x18/0x40 [ 16.078561] kasan_save_alloc_info+0x3b/0x50 [ 16.079330] __kasan_kmalloc+0xb7/0xc0 [ 16.079517] __kmalloc_cache_noprof+0x189/0x420 [ 16.079788] kasan_atomics+0x95/0x310 [ 16.080016] kunit_try_run_case+0x1a5/0x480 [ 16.080458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.080808] kthread+0x337/0x6f0 [ 16.080960] ret_from_fork+0x116/0x1d0 [ 16.081182] ret_from_fork_asm+0x1a/0x30 [ 16.081550] [ 16.081673] The buggy address belongs to the object at ffff888102744f80 [ 16.081673] which belongs to the cache kmalloc-64 of size 64 [ 16.082324] The buggy address is located 0 bytes to the right of [ 16.082324] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.083205] [ 16.083300] The buggy address belongs to the physical page: [ 16.083680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.084081] flags: 0x200000000000000(node=0|zone=2) [ 16.084426] page_type: f5(slab) [ 16.084693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.085071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.085526] page dumped because: kasan: bad access detected [ 16.085894] [ 16.086010] Memory state around the buggy address: [ 16.086334] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.086634] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.087225] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.087611] ^ [ 16.087964] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.088252] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.088569] ================================================================== [ 14.889501] ================================================================== [ 14.890155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.890864] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.891118] [ 14.891206] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.891250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.891263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.891285] Call Trace: [ 14.891300] <TASK> [ 14.891315] dump_stack_lvl+0x73/0xb0 [ 14.891343] print_report+0xd1/0x610 [ 14.891375] ? __virt_addr_valid+0x1db/0x2d0 [ 14.891398] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.891419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.891441] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.891462] kasan_report+0x141/0x180 [ 14.891485] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.891510] kasan_check_range+0x10c/0x1c0 [ 14.891535] __kasan_check_write+0x18/0x20 [ 14.891555] kasan_atomics_helper+0x4a0/0x5450 [ 14.891577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.891599] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.891625] ? trace_hardirqs_on+0x37/0xe0 [ 14.891648] ? kasan_atomics+0x152/0x310 [ 14.891676] kasan_atomics+0x1dc/0x310 [ 14.891887] ? __pfx_kasan_atomics+0x10/0x10 [ 14.891925] ? __pfx_kasan_atomics+0x10/0x10 [ 14.891952] kunit_try_run_case+0x1a5/0x480 [ 14.891977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.891999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.892023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.892047] ? __kthread_parkme+0x82/0x180 [ 14.892067] ? preempt_count_sub+0x50/0x80 [ 14.892090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.892161] kthread+0x337/0x6f0 [ 14.892181] ? trace_preempt_on+0x20/0xc0 [ 14.892202] ? __pfx_kthread+0x10/0x10 [ 14.892223] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.892244] ? calculate_sigpending+0x7b/0xa0 [ 14.892268] ? __pfx_kthread+0x10/0x10 [ 14.892289] ret_from_fork+0x116/0x1d0 [ 14.892308] ? __pfx_kthread+0x10/0x10 [ 14.892329] ret_from_fork_asm+0x1a/0x30 [ 14.892411] </TASK> [ 14.892424] [ 14.902134] Allocated by task 283: [ 14.902302] kasan_save_stack+0x45/0x70 [ 14.902608] kasan_save_track+0x18/0x40 [ 14.902807] kasan_save_alloc_info+0x3b/0x50 [ 14.902972] __kasan_kmalloc+0xb7/0xc0 [ 14.903159] __kmalloc_cache_noprof+0x189/0x420 [ 14.903463] kasan_atomics+0x95/0x310 [ 14.903663] kunit_try_run_case+0x1a5/0x480 [ 14.903886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.904154] kthread+0x337/0x6f0 [ 14.904318] ret_from_fork+0x116/0x1d0 [ 14.904579] ret_from_fork_asm+0x1a/0x30 [ 14.904765] [ 14.904854] The buggy address belongs to the object at ffff888102744f80 [ 14.904854] which belongs to the cache kmalloc-64 of size 64 [ 14.905316] The buggy address is located 0 bytes to the right of [ 14.905316] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.905849] [ 14.905958] The buggy address belongs to the physical page: [ 14.906133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.906450] flags: 0x200000000000000(node=0|zone=2) [ 14.906683] page_type: f5(slab) [ 14.906812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.907301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.907597] page dumped because: kasan: bad access detected [ 14.907822] [ 14.907936] Memory state around the buggy address: [ 14.908151] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.908408] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.908734] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.909005] ^ [ 14.909236] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.909466] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909681] ================================================================== [ 15.112048] ================================================================== [ 15.112673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.113234] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.113965] [ 15.114103] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.114148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.114161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.114183] Call Trace: [ 15.114198] <TASK> [ 15.114213] dump_stack_lvl+0x73/0xb0 [ 15.114241] print_report+0xd1/0x610 [ 15.114264] ? __virt_addr_valid+0x1db/0x2d0 [ 15.114285] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.114306] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.114329] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.114351] kasan_report+0x141/0x180 [ 15.114373] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.114399] kasan_check_range+0x10c/0x1c0 [ 15.114423] __kasan_check_write+0x18/0x20 [ 15.114442] kasan_atomics_helper+0x8f9/0x5450 [ 15.114464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.114486] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.114511] ? trace_hardirqs_on+0x37/0xe0 [ 15.114532] ? kasan_atomics+0x152/0x310 [ 15.114559] kasan_atomics+0x1dc/0x310 [ 15.114583] ? __pfx_kasan_atomics+0x10/0x10 [ 15.114609] ? __pfx_kasan_atomics+0x10/0x10 [ 15.114637] kunit_try_run_case+0x1a5/0x480 [ 15.114661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.114708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.114731] ? __kthread_parkme+0x82/0x180 [ 15.114752] ? preempt_count_sub+0x50/0x80 [ 15.114775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.114822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.114849] kthread+0x337/0x6f0 [ 15.114870] ? trace_preempt_on+0x20/0xc0 [ 15.114893] ? __pfx_kthread+0x10/0x10 [ 15.114927] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.114948] ? calculate_sigpending+0x7b/0xa0 [ 15.114971] ? __pfx_kthread+0x10/0x10 [ 15.114994] ret_from_fork+0x116/0x1d0 [ 15.115013] ? __pfx_kthread+0x10/0x10 [ 15.115034] ret_from_fork_asm+0x1a/0x30 [ 15.115072] </TASK> [ 15.115083] [ 15.127246] Allocated by task 283: [ 15.127774] kasan_save_stack+0x45/0x70 [ 15.127994] kasan_save_track+0x18/0x40 [ 15.128385] kasan_save_alloc_info+0x3b/0x50 [ 15.128640] __kasan_kmalloc+0xb7/0xc0 [ 15.129086] __kmalloc_cache_noprof+0x189/0x420 [ 15.129316] kasan_atomics+0x95/0x310 [ 15.129675] kunit_try_run_case+0x1a5/0x480 [ 15.130082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.130330] kthread+0x337/0x6f0 [ 15.130780] ret_from_fork+0x116/0x1d0 [ 15.130997] ret_from_fork_asm+0x1a/0x30 [ 15.131193] [ 15.131286] The buggy address belongs to the object at ffff888102744f80 [ 15.131286] which belongs to the cache kmalloc-64 of size 64 [ 15.132353] The buggy address is located 0 bytes to the right of [ 15.132353] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.133315] [ 15.133440] The buggy address belongs to the physical page: [ 15.133918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.134570] flags: 0x200000000000000(node=0|zone=2) [ 15.135028] page_type: f5(slab) [ 15.135208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.135763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.136310] page dumped because: kasan: bad access detected [ 15.136686] [ 15.136796] Memory state around the buggy address: [ 15.137214] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.137742] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.138201] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.138717] ^ [ 15.139184] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.139698] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.140153] ================================================================== [ 15.569993] ================================================================== [ 15.570644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.571075] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.571733] [ 15.572016] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.572063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.572075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.572217] Call Trace: [ 15.572234] <TASK> [ 15.572249] dump_stack_lvl+0x73/0xb0 [ 15.572280] print_report+0xd1/0x610 [ 15.572302] ? __virt_addr_valid+0x1db/0x2d0 [ 15.572325] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.572346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.572368] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.572391] kasan_report+0x141/0x180 [ 15.572413] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.572438] kasan_check_range+0x10c/0x1c0 [ 15.572462] __kasan_check_read+0x15/0x20 [ 15.572481] kasan_atomics_helper+0x13b5/0x5450 [ 15.572504] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.572525] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.572549] ? trace_hardirqs_on+0x37/0xe0 [ 15.572571] ? kasan_atomics+0x152/0x310 [ 15.572598] kasan_atomics+0x1dc/0x310 [ 15.572620] ? __pfx_kasan_atomics+0x10/0x10 [ 15.572644] ? __pfx_kasan_atomics+0x10/0x10 [ 15.572670] kunit_try_run_case+0x1a5/0x480 [ 15.572706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.572752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.572775] ? __kthread_parkme+0x82/0x180 [ 15.572796] ? preempt_count_sub+0x50/0x80 [ 15.572819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.572865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.572889] kthread+0x337/0x6f0 [ 15.572920] ? trace_preempt_on+0x20/0xc0 [ 15.572943] ? __pfx_kthread+0x10/0x10 [ 15.572963] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.572985] ? calculate_sigpending+0x7b/0xa0 [ 15.573008] ? __pfx_kthread+0x10/0x10 [ 15.573029] ret_from_fork+0x116/0x1d0 [ 15.573048] ? __pfx_kthread+0x10/0x10 [ 15.573069] ret_from_fork_asm+0x1a/0x30 [ 15.573100] </TASK> [ 15.573111] [ 15.582522] Allocated by task 283: [ 15.582709] kasan_save_stack+0x45/0x70 [ 15.583261] kasan_save_track+0x18/0x40 [ 15.583459] kasan_save_alloc_info+0x3b/0x50 [ 15.583818] __kasan_kmalloc+0xb7/0xc0 [ 15.584021] __kmalloc_cache_noprof+0x189/0x420 [ 15.584315] kasan_atomics+0x95/0x310 [ 15.584609] kunit_try_run_case+0x1a5/0x480 [ 15.584804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.585128] kthread+0x337/0x6f0 [ 15.585293] ret_from_fork+0x116/0x1d0 [ 15.585466] ret_from_fork_asm+0x1a/0x30 [ 15.585650] [ 15.585989] The buggy address belongs to the object at ffff888102744f80 [ 15.585989] which belongs to the cache kmalloc-64 of size 64 [ 15.586495] The buggy address is located 0 bytes to the right of [ 15.586495] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.587334] [ 15.587563] The buggy address belongs to the physical page: [ 15.587888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.588304] flags: 0x200000000000000(node=0|zone=2) [ 15.588491] page_type: f5(slab) [ 15.588664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.589257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.589606] page dumped because: kasan: bad access detected [ 15.589812] [ 15.589922] Memory state around the buggy address: [ 15.590238] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.590660] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.591063] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.591413] ^ [ 15.591629] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.592119] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.592494] ================================================================== [ 15.847398] ================================================================== [ 15.847768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.848159] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.848517] [ 15.848616] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.848657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.848689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.848710] Call Trace: [ 15.848723] <TASK> [ 15.848736] dump_stack_lvl+0x73/0xb0 [ 15.848763] print_report+0xd1/0x610 [ 15.848784] ? __virt_addr_valid+0x1db/0x2d0 [ 15.848807] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.848827] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.848850] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.848871] kasan_report+0x141/0x180 [ 15.848894] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.848928] kasan_check_range+0x10c/0x1c0 [ 15.848952] __kasan_check_write+0x18/0x20 [ 15.848970] kasan_atomics_helper+0x1a7f/0x5450 [ 15.848993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.849015] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.849039] ? trace_hardirqs_on+0x37/0xe0 [ 15.849060] ? kasan_atomics+0x152/0x310 [ 15.849086] kasan_atomics+0x1dc/0x310 [ 15.849108] ? __pfx_kasan_atomics+0x10/0x10 [ 15.849132] ? __pfx_kasan_atomics+0x10/0x10 [ 15.849158] kunit_try_run_case+0x1a5/0x480 [ 15.849182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849205] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.849228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.849252] ? __kthread_parkme+0x82/0x180 [ 15.849271] ? preempt_count_sub+0x50/0x80 [ 15.849293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.849342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.849366] kthread+0x337/0x6f0 [ 15.849386] ? trace_preempt_on+0x20/0xc0 [ 15.849407] ? __pfx_kthread+0x10/0x10 [ 15.849428] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.849450] ? calculate_sigpending+0x7b/0xa0 [ 15.849473] ? __pfx_kthread+0x10/0x10 [ 15.849494] ret_from_fork+0x116/0x1d0 [ 15.849515] ? __pfx_kthread+0x10/0x10 [ 15.849535] ret_from_fork_asm+0x1a/0x30 [ 15.849567] </TASK> [ 15.849577] [ 15.856814] Allocated by task 283: [ 15.856954] kasan_save_stack+0x45/0x70 [ 15.857099] kasan_save_track+0x18/0x40 [ 15.857235] kasan_save_alloc_info+0x3b/0x50 [ 15.857383] __kasan_kmalloc+0xb7/0xc0 [ 15.857571] __kmalloc_cache_noprof+0x189/0x420 [ 15.857817] kasan_atomics+0x95/0x310 [ 15.858016] kunit_try_run_case+0x1a5/0x480 [ 15.858224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.858476] kthread+0x337/0x6f0 [ 15.858643] ret_from_fork+0x116/0x1d0 [ 15.858847] ret_from_fork_asm+0x1a/0x30 [ 15.859064] [ 15.859159] The buggy address belongs to the object at ffff888102744f80 [ 15.859159] which belongs to the cache kmalloc-64 of size 64 [ 15.859679] The buggy address is located 0 bytes to the right of [ 15.859679] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.860091] [ 15.860165] The buggy address belongs to the physical page: [ 15.860349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.860725] flags: 0x200000000000000(node=0|zone=2) [ 15.860973] page_type: f5(slab) [ 15.861145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.861464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.861720] page dumped because: kasan: bad access detected [ 15.861892] [ 15.861970] Memory state around the buggy address: [ 15.862128] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.862344] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.862654] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.862996] ^ [ 15.863229] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.863552] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.863890] ================================================================== [ 15.593665] ================================================================== [ 15.593995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.594440] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.594728] [ 15.594853] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.594895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.594919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.594992] Call Trace: [ 15.595007] <TASK> [ 15.595022] dump_stack_lvl+0x73/0xb0 [ 15.595058] print_report+0xd1/0x610 [ 15.595079] ? __virt_addr_valid+0x1db/0x2d0 [ 15.595102] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.595123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.595145] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.595167] kasan_report+0x141/0x180 [ 15.595188] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.595214] __asan_report_load8_noabort+0x18/0x20 [ 15.595238] kasan_atomics_helper+0x4eae/0x5450 [ 15.595260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.595282] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.595306] ? trace_hardirqs_on+0x37/0xe0 [ 15.595328] ? kasan_atomics+0x152/0x310 [ 15.595355] kasan_atomics+0x1dc/0x310 [ 15.595377] ? __pfx_kasan_atomics+0x10/0x10 [ 15.595402] ? __pfx_kasan_atomics+0x10/0x10 [ 15.595429] kunit_try_run_case+0x1a5/0x480 [ 15.595453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.595499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.595522] ? __kthread_parkme+0x82/0x180 [ 15.595542] ? preempt_count_sub+0x50/0x80 [ 15.595566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.595613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.595637] kthread+0x337/0x6f0 [ 15.595656] ? trace_preempt_on+0x20/0xc0 [ 15.595679] ? __pfx_kthread+0x10/0x10 [ 15.595711] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.595732] ? calculate_sigpending+0x7b/0xa0 [ 15.595756] ? __pfx_kthread+0x10/0x10 [ 15.595777] ret_from_fork+0x116/0x1d0 [ 15.595796] ? __pfx_kthread+0x10/0x10 [ 15.595816] ret_from_fork_asm+0x1a/0x30 [ 15.595847] </TASK> [ 15.595857] [ 15.603176] Allocated by task 283: [ 15.603334] kasan_save_stack+0x45/0x70 [ 15.603496] kasan_save_track+0x18/0x40 [ 15.603631] kasan_save_alloc_info+0x3b/0x50 [ 15.603780] __kasan_kmalloc+0xb7/0xc0 [ 15.603978] __kmalloc_cache_noprof+0x189/0x420 [ 15.604208] kasan_atomics+0x95/0x310 [ 15.604394] kunit_try_run_case+0x1a5/0x480 [ 15.604600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.604889] kthread+0x337/0x6f0 [ 15.605020] ret_from_fork+0x116/0x1d0 [ 15.605154] ret_from_fork_asm+0x1a/0x30 [ 15.605354] [ 15.605447] The buggy address belongs to the object at ffff888102744f80 [ 15.605447] which belongs to the cache kmalloc-64 of size 64 [ 15.606136] The buggy address is located 0 bytes to the right of [ 15.606136] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.606626] [ 15.606745] The buggy address belongs to the physical page: [ 15.606977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.607267] flags: 0x200000000000000(node=0|zone=2) [ 15.607495] page_type: f5(slab) [ 15.607670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.607960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.608262] page dumped because: kasan: bad access detected [ 15.608476] [ 15.608544] Memory state around the buggy address: [ 15.608700] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.608927] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.609144] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.609414] ^ [ 15.609634] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.610063] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.610277] ================================================================== [ 16.176444] ================================================================== [ 16.177002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.177476] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.177945] [ 16.178055] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.178096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.178108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.178128] Call Trace: [ 16.178142] <TASK> [ 16.178155] dump_stack_lvl+0x73/0xb0 [ 16.178183] print_report+0xd1/0x610 [ 16.178205] ? __virt_addr_valid+0x1db/0x2d0 [ 16.178250] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.178272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.178309] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.178345] kasan_report+0x141/0x180 [ 16.178380] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.178420] __asan_report_load8_noabort+0x18/0x20 [ 16.178458] kasan_atomics_helper+0x4fa5/0x5450 [ 16.178481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.178516] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.178552] ? trace_hardirqs_on+0x37/0xe0 [ 16.178587] ? kasan_atomics+0x152/0x310 [ 16.178627] kasan_atomics+0x1dc/0x310 [ 16.178663] ? __pfx_kasan_atomics+0x10/0x10 [ 16.178697] ? __pfx_kasan_atomics+0x10/0x10 [ 16.178724] kunit_try_run_case+0x1a5/0x480 [ 16.178749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.178772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.178796] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.178820] ? __kthread_parkme+0x82/0x180 [ 16.178841] ? preempt_count_sub+0x50/0x80 [ 16.178864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.178889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.178923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.178947] kthread+0x337/0x6f0 [ 16.178967] ? trace_preempt_on+0x20/0xc0 [ 16.178989] ? __pfx_kthread+0x10/0x10 [ 16.179010] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.179031] ? calculate_sigpending+0x7b/0xa0 [ 16.179058] ? __pfx_kthread+0x10/0x10 [ 16.179080] ret_from_fork+0x116/0x1d0 [ 16.179099] ? __pfx_kthread+0x10/0x10 [ 16.179120] ret_from_fork_asm+0x1a/0x30 [ 16.179150] </TASK> [ 16.179162] [ 16.186827] Allocated by task 283: [ 16.187039] kasan_save_stack+0x45/0x70 [ 16.187206] kasan_save_track+0x18/0x40 [ 16.187343] kasan_save_alloc_info+0x3b/0x50 [ 16.187498] __kasan_kmalloc+0xb7/0xc0 [ 16.187685] __kmalloc_cache_noprof+0x189/0x420 [ 16.187929] kasan_atomics+0x95/0x310 [ 16.188132] kunit_try_run_case+0x1a5/0x480 [ 16.188340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.188592] kthread+0x337/0x6f0 [ 16.188861] ret_from_fork+0x116/0x1d0 [ 16.189060] ret_from_fork_asm+0x1a/0x30 [ 16.189256] [ 16.189351] The buggy address belongs to the object at ffff888102744f80 [ 16.189351] which belongs to the cache kmalloc-64 of size 64 [ 16.189878] The buggy address is located 0 bytes to the right of [ 16.189878] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.190724] [ 16.190819] The buggy address belongs to the physical page: [ 16.191082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.191339] flags: 0x200000000000000(node=0|zone=2) [ 16.191503] page_type: f5(slab) [ 16.191623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.192338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.192679] page dumped because: kasan: bad access detected [ 16.192966] [ 16.193061] Memory state around the buggy address: [ 16.193306] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.193605] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.193893] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.194220] ^ [ 16.194431] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.194744] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.195057] ================================================================== [ 15.282179] ================================================================== [ 15.282613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.283019] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.283291] [ 15.283466] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.283510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.283523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.283544] Call Trace: [ 15.283560] <TASK> [ 15.283577] dump_stack_lvl+0x73/0xb0 [ 15.283605] print_report+0xd1/0x610 [ 15.283627] ? __virt_addr_valid+0x1db/0x2d0 [ 15.283650] ? kasan_atomics_helper+0xd47/0x5450 [ 15.283671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.283693] ? kasan_atomics_helper+0xd47/0x5450 [ 15.283715] kasan_report+0x141/0x180 [ 15.283737] ? kasan_atomics_helper+0xd47/0x5450 [ 15.283763] kasan_check_range+0x10c/0x1c0 [ 15.283787] __kasan_check_write+0x18/0x20 [ 15.283806] kasan_atomics_helper+0xd47/0x5450 [ 15.283828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.283850] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.283873] ? trace_hardirqs_on+0x37/0xe0 [ 15.283895] ? kasan_atomics+0x152/0x310 [ 15.283935] kasan_atomics+0x1dc/0x310 [ 15.283958] ? __pfx_kasan_atomics+0x10/0x10 [ 15.283981] ? __pfx_kasan_atomics+0x10/0x10 [ 15.284008] kunit_try_run_case+0x1a5/0x480 [ 15.284032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.284054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.284078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.284101] ? __kthread_parkme+0x82/0x180 [ 15.284123] ? preempt_count_sub+0x50/0x80 [ 15.284146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.284170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.284193] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.284216] kthread+0x337/0x6f0 [ 15.284236] ? trace_preempt_on+0x20/0xc0 [ 15.284258] ? __pfx_kthread+0x10/0x10 [ 15.284279] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.284300] ? calculate_sigpending+0x7b/0xa0 [ 15.284323] ? __pfx_kthread+0x10/0x10 [ 15.284345] ret_from_fork+0x116/0x1d0 [ 15.284381] ? __pfx_kthread+0x10/0x10 [ 15.284402] ret_from_fork_asm+0x1a/0x30 [ 15.284432] </TASK> [ 15.284442] [ 15.292501] Allocated by task 283: [ 15.292694] kasan_save_stack+0x45/0x70 [ 15.292886] kasan_save_track+0x18/0x40 [ 15.293039] kasan_save_alloc_info+0x3b/0x50 [ 15.293189] __kasan_kmalloc+0xb7/0xc0 [ 15.293332] __kmalloc_cache_noprof+0x189/0x420 [ 15.293571] kasan_atomics+0x95/0x310 [ 15.293769] kunit_try_run_case+0x1a5/0x480 [ 15.293991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.294222] kthread+0x337/0x6f0 [ 15.294344] ret_from_fork+0x116/0x1d0 [ 15.294498] ret_from_fork_asm+0x1a/0x30 [ 15.294879] [ 15.295002] The buggy address belongs to the object at ffff888102744f80 [ 15.295002] which belongs to the cache kmalloc-64 of size 64 [ 15.295598] The buggy address is located 0 bytes to the right of [ 15.295598] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.296100] [ 15.296202] The buggy address belongs to the physical page: [ 15.296453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.296693] flags: 0x200000000000000(node=0|zone=2) [ 15.296853] page_type: f5(slab) [ 15.296982] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.297210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.297736] page dumped because: kasan: bad access detected [ 15.297996] [ 15.298089] Memory state around the buggy address: [ 15.298311] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.298625] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.299010] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.299229] ^ [ 15.299384] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.299615] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.301042] ================================================================== [ 14.968014] ================================================================== [ 14.968767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.969565] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.969843] [ 14.969945] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.969993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.970006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.970027] Call Trace: [ 14.970044] <TASK> [ 14.970060] dump_stack_lvl+0x73/0xb0 [ 14.970088] print_report+0xd1/0x610 [ 14.970111] ? __virt_addr_valid+0x1db/0x2d0 [ 14.970134] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.970155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.970178] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.970199] kasan_report+0x141/0x180 [ 14.970222] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.970249] kasan_check_range+0x10c/0x1c0 [ 14.970272] __kasan_check_write+0x18/0x20 [ 14.970292] kasan_atomics_helper+0x5fe/0x5450 [ 14.970314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.970337] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.970360] ? trace_hardirqs_on+0x37/0xe0 [ 14.970382] ? kasan_atomics+0x152/0x310 [ 14.970409] kasan_atomics+0x1dc/0x310 [ 14.970431] ? __pfx_kasan_atomics+0x10/0x10 [ 14.970456] ? __pfx_kasan_atomics+0x10/0x10 [ 14.970482] kunit_try_run_case+0x1a5/0x480 [ 14.970506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.970529] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.970553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.970575] ? __kthread_parkme+0x82/0x180 [ 14.970595] ? preempt_count_sub+0x50/0x80 [ 14.970619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.970643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.970666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.970689] kthread+0x337/0x6f0 [ 14.970708] ? trace_preempt_on+0x20/0xc0 [ 14.970731] ? __pfx_kthread+0x10/0x10 [ 14.970751] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.970773] ? calculate_sigpending+0x7b/0xa0 [ 14.970796] ? __pfx_kthread+0x10/0x10 [ 14.970817] ret_from_fork+0x116/0x1d0 [ 14.970836] ? __pfx_kthread+0x10/0x10 [ 14.970855] ret_from_fork_asm+0x1a/0x30 [ 14.970886] </TASK> [ 14.970897] [ 14.989173] Allocated by task 283: [ 14.989523] kasan_save_stack+0x45/0x70 [ 14.989852] kasan_save_track+0x18/0x40 [ 14.990068] kasan_save_alloc_info+0x3b/0x50 [ 14.990269] __kasan_kmalloc+0xb7/0xc0 [ 14.990703] __kmalloc_cache_noprof+0x189/0x420 [ 14.991151] kasan_atomics+0x95/0x310 [ 14.991629] kunit_try_run_case+0x1a5/0x480 [ 14.991923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992165] kthread+0x337/0x6f0 [ 14.992316] ret_from_fork+0x116/0x1d0 [ 14.992779] ret_from_fork_asm+0x1a/0x30 [ 14.993111] [ 14.993338] The buggy address belongs to the object at ffff888102744f80 [ 14.993338] which belongs to the cache kmalloc-64 of size 64 [ 14.994069] The buggy address is located 0 bytes to the right of [ 14.994069] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.995196] [ 14.995298] The buggy address belongs to the physical page: [ 14.995784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.996458] flags: 0x200000000000000(node=0|zone=2) [ 14.996932] page_type: f5(slab) [ 14.997376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.997939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.998231] page dumped because: kasan: bad access detected [ 14.998647] [ 14.998901] Memory state around the buggy address: [ 14.999264] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.999872] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.000506] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.001160] ^ [ 15.001561] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.001981] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.002622] ================================================================== [ 15.731666] ================================================================== [ 15.731987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.732221] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.732668] [ 15.732817] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.732862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.732875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.732897] Call Trace: [ 15.732918] <TASK> [ 15.732933] dump_stack_lvl+0x73/0xb0 [ 15.732959] print_report+0xd1/0x610 [ 15.732981] ? __virt_addr_valid+0x1db/0x2d0 [ 15.733003] ? kasan_atomics_helper+0x177f/0x5450 [ 15.733026] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.733048] ? kasan_atomics_helper+0x177f/0x5450 [ 15.733071] kasan_report+0x141/0x180 [ 15.733094] ? kasan_atomics_helper+0x177f/0x5450 [ 15.733120] kasan_check_range+0x10c/0x1c0 [ 15.733145] __kasan_check_write+0x18/0x20 [ 15.733164] kasan_atomics_helper+0x177f/0x5450 [ 15.733186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.733209] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.733232] ? trace_hardirqs_on+0x37/0xe0 [ 15.733256] ? kasan_atomics+0x152/0x310 [ 15.733295] kasan_atomics+0x1dc/0x310 [ 15.733318] ? __pfx_kasan_atomics+0x10/0x10 [ 15.733341] ? __pfx_kasan_atomics+0x10/0x10 [ 15.733379] kunit_try_run_case+0x1a5/0x480 [ 15.733404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.733426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.733449] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.733482] ? __kthread_parkme+0x82/0x180 [ 15.733502] ? preempt_count_sub+0x50/0x80 [ 15.733526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.733561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.733583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.733607] kthread+0x337/0x6f0 [ 15.733636] ? trace_preempt_on+0x20/0xc0 [ 15.733658] ? __pfx_kthread+0x10/0x10 [ 15.733679] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.733722] ? calculate_sigpending+0x7b/0xa0 [ 15.733744] ? __pfx_kthread+0x10/0x10 [ 15.733766] ret_from_fork+0x116/0x1d0 [ 15.733785] ? __pfx_kthread+0x10/0x10 [ 15.733805] ret_from_fork_asm+0x1a/0x30 [ 15.733845] </TASK> [ 15.733858] [ 15.741300] Allocated by task 283: [ 15.741430] kasan_save_stack+0x45/0x70 [ 15.741573] kasan_save_track+0x18/0x40 [ 15.741722] kasan_save_alloc_info+0x3b/0x50 [ 15.741937] __kasan_kmalloc+0xb7/0xc0 [ 15.742119] __kmalloc_cache_noprof+0x189/0x420 [ 15.742400] kasan_atomics+0x95/0x310 [ 15.742590] kunit_try_run_case+0x1a5/0x480 [ 15.742944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743203] kthread+0x337/0x6f0 [ 15.743378] ret_from_fork+0x116/0x1d0 [ 15.743565] ret_from_fork_asm+0x1a/0x30 [ 15.743847] [ 15.743951] The buggy address belongs to the object at ffff888102744f80 [ 15.743951] which belongs to the cache kmalloc-64 of size 64 [ 15.744411] The buggy address is located 0 bytes to the right of [ 15.744411] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.745016] [ 15.745114] The buggy address belongs to the physical page: [ 15.745414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.745886] flags: 0x200000000000000(node=0|zone=2) [ 15.746142] page_type: f5(slab) [ 15.746419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.746786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.747131] page dumped because: kasan: bad access detected [ 15.747316] [ 15.747386] Memory state around the buggy address: [ 15.747541] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.747804] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.748225] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.748791] ^ [ 15.749048] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.749365] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.749647] ================================================================== [ 15.455054] ================================================================== [ 15.455539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.456126] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.456460] [ 15.456571] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.456615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.456627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.456649] Call Trace: [ 15.456665] <TASK> [ 15.456680] dump_stack_lvl+0x73/0xb0 [ 15.456709] print_report+0xd1/0x610 [ 15.456732] ? __virt_addr_valid+0x1db/0x2d0 [ 15.456754] ? kasan_atomics_helper+0x1148/0x5450 [ 15.456775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.456797] ? kasan_atomics_helper+0x1148/0x5450 [ 15.456819] kasan_report+0x141/0x180 [ 15.456840] ? kasan_atomics_helper+0x1148/0x5450 [ 15.456867] kasan_check_range+0x10c/0x1c0 [ 15.456890] __kasan_check_write+0x18/0x20 [ 15.456920] kasan_atomics_helper+0x1148/0x5450 [ 15.456942] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.456964] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.456987] ? trace_hardirqs_on+0x37/0xe0 [ 15.457009] ? kasan_atomics+0x152/0x310 [ 15.457036] kasan_atomics+0x1dc/0x310 [ 15.457057] ? __pfx_kasan_atomics+0x10/0x10 [ 15.457081] ? __pfx_kasan_atomics+0x10/0x10 [ 15.457110] kunit_try_run_case+0x1a5/0x480 [ 15.457134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.457157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.457181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.457204] ? __kthread_parkme+0x82/0x180 [ 15.457224] ? preempt_count_sub+0x50/0x80 [ 15.457247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.457271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.457294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.457317] kthread+0x337/0x6f0 [ 15.457337] ? trace_preempt_on+0x20/0xc0 [ 15.457359] ? __pfx_kthread+0x10/0x10 [ 15.457379] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.457401] ? calculate_sigpending+0x7b/0xa0 [ 15.457424] ? __pfx_kthread+0x10/0x10 [ 15.457445] ret_from_fork+0x116/0x1d0 [ 15.457464] ? __pfx_kthread+0x10/0x10 [ 15.457485] ret_from_fork_asm+0x1a/0x30 [ 15.457515] </TASK> [ 15.457526] [ 15.464801] Allocated by task 283: [ 15.464984] kasan_save_stack+0x45/0x70 [ 15.465138] kasan_save_track+0x18/0x40 [ 15.465274] kasan_save_alloc_info+0x3b/0x50 [ 15.465423] __kasan_kmalloc+0xb7/0xc0 [ 15.465555] __kmalloc_cache_noprof+0x189/0x420 [ 15.465844] kasan_atomics+0x95/0x310 [ 15.466042] kunit_try_run_case+0x1a5/0x480 [ 15.466249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.466501] kthread+0x337/0x6f0 [ 15.466667] ret_from_fork+0x116/0x1d0 [ 15.466843] ret_from_fork_asm+0x1a/0x30 [ 15.466994] [ 15.467069] The buggy address belongs to the object at ffff888102744f80 [ 15.467069] which belongs to the cache kmalloc-64 of size 64 [ 15.467511] The buggy address is located 0 bytes to the right of [ 15.467511] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.468334] [ 15.468406] The buggy address belongs to the physical page: [ 15.468576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.468812] flags: 0x200000000000000(node=0|zone=2) [ 15.468983] page_type: f5(slab) [ 15.469104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.469689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.470036] page dumped because: kasan: bad access detected [ 15.470291] [ 15.470384] Memory state around the buggy address: [ 15.470607] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.470919] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.471144] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.471359] ^ [ 15.471512] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.472144] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.472460] ================================================================== [ 16.015642] ================================================================== [ 16.016212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.016690] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.017218] [ 16.017438] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.017485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.017498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.017519] Call Trace: [ 16.017533] <TASK> [ 16.017547] dump_stack_lvl+0x73/0xb0 [ 16.017578] print_report+0xd1/0x610 [ 16.017601] ? __virt_addr_valid+0x1db/0x2d0 [ 16.017626] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.017649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.017792] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.017820] kasan_report+0x141/0x180 [ 16.017844] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.017871] kasan_check_range+0x10c/0x1c0 [ 16.017896] __kasan_check_write+0x18/0x20 [ 16.017928] kasan_atomics_helper+0x1f43/0x5450 [ 16.017950] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.017972] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.017997] ? trace_hardirqs_on+0x37/0xe0 [ 16.018019] ? kasan_atomics+0x152/0x310 [ 16.018046] kasan_atomics+0x1dc/0x310 [ 16.018068] ? __pfx_kasan_atomics+0x10/0x10 [ 16.018091] ? __pfx_kasan_atomics+0x10/0x10 [ 16.018117] kunit_try_run_case+0x1a5/0x480 [ 16.018141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.018164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.018187] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.018211] ? __kthread_parkme+0x82/0x180 [ 16.018230] ? preempt_count_sub+0x50/0x80 [ 16.018254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.018277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.018300] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.018323] kthread+0x337/0x6f0 [ 16.018342] ? trace_preempt_on+0x20/0xc0 [ 16.018365] ? __pfx_kthread+0x10/0x10 [ 16.018385] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.018406] ? calculate_sigpending+0x7b/0xa0 [ 16.018429] ? __pfx_kthread+0x10/0x10 [ 16.018450] ret_from_fork+0x116/0x1d0 [ 16.018469] ? __pfx_kthread+0x10/0x10 [ 16.018489] ret_from_fork_asm+0x1a/0x30 [ 16.018520] </TASK> [ 16.018530] [ 16.029286] Allocated by task 283: [ 16.029458] kasan_save_stack+0x45/0x70 [ 16.029649] kasan_save_track+0x18/0x40 [ 16.030230] kasan_save_alloc_info+0x3b/0x50 [ 16.030517] __kasan_kmalloc+0xb7/0xc0 [ 16.030836] __kmalloc_cache_noprof+0x189/0x420 [ 16.031137] kasan_atomics+0x95/0x310 [ 16.031425] kunit_try_run_case+0x1a5/0x480 [ 16.031638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.032062] kthread+0x337/0x6f0 [ 16.032242] ret_from_fork+0x116/0x1d0 [ 16.032565] ret_from_fork_asm+0x1a/0x30 [ 16.032933] [ 16.033022] The buggy address belongs to the object at ffff888102744f80 [ 16.033022] which belongs to the cache kmalloc-64 of size 64 [ 16.033755] The buggy address is located 0 bytes to the right of [ 16.033755] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.034464] [ 16.034547] The buggy address belongs to the physical page: [ 16.034895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.035476] flags: 0x200000000000000(node=0|zone=2) [ 16.035817] page_type: f5(slab) [ 16.036074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.036440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.036967] page dumped because: kasan: bad access detected [ 16.037305] [ 16.037413] Memory state around the buggy address: [ 16.037861] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.038219] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.038619] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.039169] ^ [ 16.039423] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.039924] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.040228] ================================================================== [ 15.323623] ================================================================== [ 15.324100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.324356] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.324755] [ 15.324879] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.324933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.324946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.324966] Call Trace: [ 15.324978] <TASK> [ 15.324992] dump_stack_lvl+0x73/0xb0 [ 15.325019] print_report+0xd1/0x610 [ 15.325041] ? __virt_addr_valid+0x1db/0x2d0 [ 15.325063] ? kasan_atomics_helper+0xe78/0x5450 [ 15.325084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.325106] ? kasan_atomics_helper+0xe78/0x5450 [ 15.325127] kasan_report+0x141/0x180 [ 15.325149] ? kasan_atomics_helper+0xe78/0x5450 [ 15.325175] kasan_check_range+0x10c/0x1c0 [ 15.325198] __kasan_check_write+0x18/0x20 [ 15.325217] kasan_atomics_helper+0xe78/0x5450 [ 15.325240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.325262] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.325286] ? trace_hardirqs_on+0x37/0xe0 [ 15.325308] ? kasan_atomics+0x152/0x310 [ 15.325335] kasan_atomics+0x1dc/0x310 [ 15.325359] ? __pfx_kasan_atomics+0x10/0x10 [ 15.325382] ? __pfx_kasan_atomics+0x10/0x10 [ 15.325409] kunit_try_run_case+0x1a5/0x480 [ 15.325433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.325456] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.325480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.325503] ? __kthread_parkme+0x82/0x180 [ 15.325523] ? preempt_count_sub+0x50/0x80 [ 15.325546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.325744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.325769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.325793] kthread+0x337/0x6f0 [ 15.325813] ? trace_preempt_on+0x20/0xc0 [ 15.325835] ? __pfx_kthread+0x10/0x10 [ 15.325856] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.325878] ? calculate_sigpending+0x7b/0xa0 [ 15.325902] ? __pfx_kthread+0x10/0x10 [ 15.325938] ret_from_fork+0x116/0x1d0 [ 15.325957] ? __pfx_kthread+0x10/0x10 [ 15.325978] ret_from_fork_asm+0x1a/0x30 [ 15.326009] </TASK> [ 15.326019] [ 15.337324] Allocated by task 283: [ 15.337500] kasan_save_stack+0x45/0x70 [ 15.337841] kasan_save_track+0x18/0x40 [ 15.338024] kasan_save_alloc_info+0x3b/0x50 [ 15.338237] __kasan_kmalloc+0xb7/0xc0 [ 15.338411] __kmalloc_cache_noprof+0x189/0x420 [ 15.338687] kasan_atomics+0x95/0x310 [ 15.338953] kunit_try_run_case+0x1a5/0x480 [ 15.339147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.339329] kthread+0x337/0x6f0 [ 15.339496] ret_from_fork+0x116/0x1d0 [ 15.339788] ret_from_fork_asm+0x1a/0x30 [ 15.339950] [ 15.340049] The buggy address belongs to the object at ffff888102744f80 [ 15.340049] which belongs to the cache kmalloc-64 of size 64 [ 15.340608] The buggy address is located 0 bytes to the right of [ 15.340608] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.341168] [ 15.341241] The buggy address belongs to the physical page: [ 15.341451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.341863] flags: 0x200000000000000(node=0|zone=2) [ 15.342341] page_type: f5(slab) [ 15.342563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.342971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.343246] page dumped because: kasan: bad access detected [ 15.343420] [ 15.343515] Memory state around the buggy address: [ 15.343809] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.344127] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.344488] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.344841] ^ [ 15.345058] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.345360] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.345604] ================================================================== [ 15.610656] ================================================================== [ 15.610889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.611221] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.612252] [ 15.612373] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.612418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.612430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.612452] Call Trace: [ 15.612466] <TASK> [ 15.612481] dump_stack_lvl+0x73/0xb0 [ 15.612510] print_report+0xd1/0x610 [ 15.612533] ? __virt_addr_valid+0x1db/0x2d0 [ 15.612555] ? kasan_atomics_helper+0x1467/0x5450 [ 15.612576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.612598] ? kasan_atomics_helper+0x1467/0x5450 [ 15.612620] kasan_report+0x141/0x180 [ 15.612642] ? kasan_atomics_helper+0x1467/0x5450 [ 15.612668] kasan_check_range+0x10c/0x1c0 [ 15.613067] __kasan_check_write+0x18/0x20 [ 15.613089] kasan_atomics_helper+0x1467/0x5450 [ 15.613112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.613135] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.613159] ? trace_hardirqs_on+0x37/0xe0 [ 15.613615] ? kasan_atomics+0x152/0x310 [ 15.613651] kasan_atomics+0x1dc/0x310 [ 15.613676] ? __pfx_kasan_atomics+0x10/0x10 [ 15.613700] ? __pfx_kasan_atomics+0x10/0x10 [ 15.613729] kunit_try_run_case+0x1a5/0x480 [ 15.613754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.613793] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.613820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.613846] ? __kthread_parkme+0x82/0x180 [ 15.613868] ? preempt_count_sub+0x50/0x80 [ 15.613891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.613927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.613950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.613974] kthread+0x337/0x6f0 [ 15.613994] ? trace_preempt_on+0x20/0xc0 [ 15.614016] ? __pfx_kthread+0x10/0x10 [ 15.614038] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.614060] ? calculate_sigpending+0x7b/0xa0 [ 15.614083] ? __pfx_kthread+0x10/0x10 [ 15.614105] ret_from_fork+0x116/0x1d0 [ 15.614124] ? __pfx_kthread+0x10/0x10 [ 15.614145] ret_from_fork_asm+0x1a/0x30 [ 15.614175] </TASK> [ 15.614186] [ 15.621471] Allocated by task 283: [ 15.621637] kasan_save_stack+0x45/0x70 [ 15.621849] kasan_save_track+0x18/0x40 [ 15.622059] kasan_save_alloc_info+0x3b/0x50 [ 15.622272] __kasan_kmalloc+0xb7/0xc0 [ 15.622461] __kmalloc_cache_noprof+0x189/0x420 [ 15.622699] kasan_atomics+0x95/0x310 [ 15.622891] kunit_try_run_case+0x1a5/0x480 [ 15.623115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.623327] kthread+0x337/0x6f0 [ 15.623481] ret_from_fork+0x116/0x1d0 [ 15.623641] ret_from_fork_asm+0x1a/0x30 [ 15.623902] [ 15.623987] The buggy address belongs to the object at ffff888102744f80 [ 15.623987] which belongs to the cache kmalloc-64 of size 64 [ 15.624444] The buggy address is located 0 bytes to the right of [ 15.624444] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.624965] [ 15.625060] The buggy address belongs to the physical page: [ 15.625268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.625559] flags: 0x200000000000000(node=0|zone=2) [ 15.625819] page_type: f5(slab) [ 15.625996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.626297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.626603] page dumped because: kasan: bad access detected [ 15.626952] [ 15.627027] Memory state around the buggy address: [ 15.627205] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.627422] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.627638] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.627959] ^ [ 15.628188] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.628496] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.628839] ================================================================== [ 15.303069] ================================================================== [ 15.303560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.304059] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.304792] [ 15.305081] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.305135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.305149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.305171] Call Trace: [ 15.305186] <TASK> [ 15.305202] dump_stack_lvl+0x73/0xb0 [ 15.305242] print_report+0xd1/0x610 [ 15.305266] ? __virt_addr_valid+0x1db/0x2d0 [ 15.305292] ? kasan_atomics_helper+0xde0/0x5450 [ 15.305314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.305337] ? kasan_atomics_helper+0xde0/0x5450 [ 15.305446] kasan_report+0x141/0x180 [ 15.305471] ? kasan_atomics_helper+0xde0/0x5450 [ 15.305498] kasan_check_range+0x10c/0x1c0 [ 15.305521] __kasan_check_write+0x18/0x20 [ 15.305541] kasan_atomics_helper+0xde0/0x5450 [ 15.305564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.305586] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.305611] ? trace_hardirqs_on+0x37/0xe0 [ 15.305633] ? kasan_atomics+0x152/0x310 [ 15.305660] kasan_atomics+0x1dc/0x310 [ 15.305682] ? __pfx_kasan_atomics+0x10/0x10 [ 15.305706] ? __pfx_kasan_atomics+0x10/0x10 [ 15.305732] kunit_try_run_case+0x1a5/0x480 [ 15.305757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.305803] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.305826] ? __kthread_parkme+0x82/0x180 [ 15.305847] ? preempt_count_sub+0x50/0x80 [ 15.305870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.305931] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.305955] kthread+0x337/0x6f0 [ 15.305976] ? trace_preempt_on+0x20/0xc0 [ 15.305999] ? __pfx_kthread+0x10/0x10 [ 15.306020] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.306041] ? calculate_sigpending+0x7b/0xa0 [ 15.306065] ? __pfx_kthread+0x10/0x10 [ 15.306086] ret_from_fork+0x116/0x1d0 [ 15.306105] ? __pfx_kthread+0x10/0x10 [ 15.306126] ret_from_fork_asm+0x1a/0x30 [ 15.306157] </TASK> [ 15.306168] [ 15.315010] Allocated by task 283: [ 15.315202] kasan_save_stack+0x45/0x70 [ 15.315460] kasan_save_track+0x18/0x40 [ 15.315647] kasan_save_alloc_info+0x3b/0x50 [ 15.315827] __kasan_kmalloc+0xb7/0xc0 [ 15.316015] __kmalloc_cache_noprof+0x189/0x420 [ 15.316242] kasan_atomics+0x95/0x310 [ 15.316397] kunit_try_run_case+0x1a5/0x480 [ 15.316542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.316788] kthread+0x337/0x6f0 [ 15.316971] ret_from_fork+0x116/0x1d0 [ 15.317158] ret_from_fork_asm+0x1a/0x30 [ 15.317361] [ 15.317453] The buggy address belongs to the object at ffff888102744f80 [ 15.317453] which belongs to the cache kmalloc-64 of size 64 [ 15.318118] The buggy address is located 0 bytes to the right of [ 15.318118] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.318573] [ 15.318646] The buggy address belongs to the physical page: [ 15.318819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.319079] flags: 0x200000000000000(node=0|zone=2) [ 15.319248] page_type: f5(slab) [ 15.319419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.319874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.320216] page dumped because: kasan: bad access detected [ 15.320466] [ 15.320558] Memory state around the buggy address: [ 15.320777] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.321147] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.321361] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.321570] ^ [ 15.322139] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.322718] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.323069] ================================================================== [ 15.750436] ================================================================== [ 15.750807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.751130] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.751373] [ 15.751483] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.751523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.751535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.751555] Call Trace: [ 15.751569] <TASK> [ 15.751584] dump_stack_lvl+0x73/0xb0 [ 15.751611] print_report+0xd1/0x610 [ 15.751632] ? __virt_addr_valid+0x1db/0x2d0 [ 15.751655] ? kasan_atomics_helper+0x1818/0x5450 [ 15.751675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.751745] ? kasan_atomics_helper+0x1818/0x5450 [ 15.751767] kasan_report+0x141/0x180 [ 15.751827] ? kasan_atomics_helper+0x1818/0x5450 [ 15.751866] kasan_check_range+0x10c/0x1c0 [ 15.751901] __kasan_check_write+0x18/0x20 [ 15.751930] kasan_atomics_helper+0x1818/0x5450 [ 15.751953] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.751976] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.751998] ? trace_hardirqs_on+0x37/0xe0 [ 15.752020] ? kasan_atomics+0x152/0x310 [ 15.752047] kasan_atomics+0x1dc/0x310 [ 15.752069] ? __pfx_kasan_atomics+0x10/0x10 [ 15.752092] ? __pfx_kasan_atomics+0x10/0x10 [ 15.752119] kunit_try_run_case+0x1a5/0x480 [ 15.752143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.752166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.752190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.752213] ? __kthread_parkme+0x82/0x180 [ 15.752233] ? preempt_count_sub+0x50/0x80 [ 15.752257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.752281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.752304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.752327] kthread+0x337/0x6f0 [ 15.752347] ? trace_preempt_on+0x20/0xc0 [ 15.752369] ? __pfx_kthread+0x10/0x10 [ 15.752389] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.752410] ? calculate_sigpending+0x7b/0xa0 [ 15.752434] ? __pfx_kthread+0x10/0x10 [ 15.752456] ret_from_fork+0x116/0x1d0 [ 15.752474] ? __pfx_kthread+0x10/0x10 [ 15.752495] ret_from_fork_asm+0x1a/0x30 [ 15.752525] </TASK> [ 15.752536] [ 15.763717] Allocated by task 283: [ 15.764076] kasan_save_stack+0x45/0x70 [ 15.764463] kasan_save_track+0x18/0x40 [ 15.764851] kasan_save_alloc_info+0x3b/0x50 [ 15.765259] __kasan_kmalloc+0xb7/0xc0 [ 15.765608] __kmalloc_cache_noprof+0x189/0x420 [ 15.765950] kasan_atomics+0x95/0x310 [ 15.766094] kunit_try_run_case+0x1a5/0x480 [ 15.766246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.766425] kthread+0x337/0x6f0 [ 15.766547] ret_from_fork+0x116/0x1d0 [ 15.766719] ret_from_fork_asm+0x1a/0x30 [ 15.767129] [ 15.767307] The buggy address belongs to the object at ffff888102744f80 [ 15.767307] which belongs to the cache kmalloc-64 of size 64 [ 15.768405] The buggy address is located 0 bytes to the right of [ 15.768405] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.769498] [ 15.769660] The buggy address belongs to the physical page: [ 15.770182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.770881] flags: 0x200000000000000(node=0|zone=2) [ 15.771118] page_type: f5(slab) [ 15.771240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.771471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.771779] page dumped because: kasan: bad access detected [ 15.772247] [ 15.772401] Memory state around the buggy address: [ 15.772826] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.773416] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.774043] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.774618] ^ [ 15.775055] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.775646] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.776070] ================================================================== [ 15.260051] ================================================================== [ 15.260570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.260938] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.261268] [ 15.261382] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.261424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.261436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.261457] Call Trace: [ 15.261471] <TASK> [ 15.261485] dump_stack_lvl+0x73/0xb0 [ 15.261513] print_report+0xd1/0x610 [ 15.261534] ? __virt_addr_valid+0x1db/0x2d0 [ 15.261557] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.261578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.261600] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.261621] kasan_report+0x141/0x180 [ 15.261643] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.261669] __asan_report_load4_noabort+0x18/0x20 [ 15.261693] kasan_atomics_helper+0x4a84/0x5450 [ 15.261715] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.261791] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.261816] ? trace_hardirqs_on+0x37/0xe0 [ 15.261838] ? kasan_atomics+0x152/0x310 [ 15.261865] kasan_atomics+0x1dc/0x310 [ 15.261888] ? __pfx_kasan_atomics+0x10/0x10 [ 15.261921] ? __pfx_kasan_atomics+0x10/0x10 [ 15.261949] kunit_try_run_case+0x1a5/0x480 [ 15.261973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.261996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.262019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.262042] ? __kthread_parkme+0x82/0x180 [ 15.262061] ? preempt_count_sub+0x50/0x80 [ 15.262084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.262132] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.262156] kthread+0x337/0x6f0 [ 15.262175] ? trace_preempt_on+0x20/0xc0 [ 15.262196] ? __pfx_kthread+0x10/0x10 [ 15.262216] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.262238] ? calculate_sigpending+0x7b/0xa0 [ 15.262262] ? __pfx_kthread+0x10/0x10 [ 15.262283] ret_from_fork+0x116/0x1d0 [ 15.262303] ? __pfx_kthread+0x10/0x10 [ 15.262411] ret_from_fork_asm+0x1a/0x30 [ 15.262446] </TASK> [ 15.262457] [ 15.273173] Allocated by task 283: [ 15.273318] kasan_save_stack+0x45/0x70 [ 15.273466] kasan_save_track+0x18/0x40 [ 15.273792] kasan_save_alloc_info+0x3b/0x50 [ 15.274019] __kasan_kmalloc+0xb7/0xc0 [ 15.274209] __kmalloc_cache_noprof+0x189/0x420 [ 15.274406] kasan_atomics+0x95/0x310 [ 15.274688] kunit_try_run_case+0x1a5/0x480 [ 15.274937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.275195] kthread+0x337/0x6f0 [ 15.275321] ret_from_fork+0x116/0x1d0 [ 15.275567] ret_from_fork_asm+0x1a/0x30 [ 15.275844] [ 15.275930] The buggy address belongs to the object at ffff888102744f80 [ 15.275930] which belongs to the cache kmalloc-64 of size 64 [ 15.276548] The buggy address is located 0 bytes to the right of [ 15.276548] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.277049] [ 15.277123] The buggy address belongs to the physical page: [ 15.277357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.277819] flags: 0x200000000000000(node=0|zone=2) [ 15.278006] page_type: f5(slab) [ 15.278127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.278625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.279054] page dumped because: kasan: bad access detected [ 15.279292] [ 15.279374] Memory state around the buggy address: [ 15.279570] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.279875] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.280102] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.280864] ^ [ 15.281050] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.281330] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.281735] ================================================================== [ 15.906113] ================================================================== [ 15.906808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.907135] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.907360] [ 15.907444] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.907487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.907500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.907520] Call Trace: [ 15.907536] <TASK> [ 15.907551] dump_stack_lvl+0x73/0xb0 [ 15.907578] print_report+0xd1/0x610 [ 15.907600] ? __virt_addr_valid+0x1db/0x2d0 [ 15.907622] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.907643] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.907693] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.907715] kasan_report+0x141/0x180 [ 15.907738] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.907764] __asan_report_load8_noabort+0x18/0x20 [ 15.907787] kasan_atomics_helper+0x4f30/0x5450 [ 15.907810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.907832] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.907857] ? trace_hardirqs_on+0x37/0xe0 [ 15.907879] ? kasan_atomics+0x152/0x310 [ 15.907914] kasan_atomics+0x1dc/0x310 [ 15.907936] ? __pfx_kasan_atomics+0x10/0x10 [ 15.907961] ? __pfx_kasan_atomics+0x10/0x10 [ 15.907987] kunit_try_run_case+0x1a5/0x480 [ 15.908011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.908058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.908081] ? __kthread_parkme+0x82/0x180 [ 15.908102] ? preempt_count_sub+0x50/0x80 [ 15.908125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.908172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.908195] kthread+0x337/0x6f0 [ 15.908215] ? trace_preempt_on+0x20/0xc0 [ 15.908237] ? __pfx_kthread+0x10/0x10 [ 15.908258] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.908279] ? calculate_sigpending+0x7b/0xa0 [ 15.908302] ? __pfx_kthread+0x10/0x10 [ 15.908323] ret_from_fork+0x116/0x1d0 [ 15.908342] ? __pfx_kthread+0x10/0x10 [ 15.908362] ret_from_fork_asm+0x1a/0x30 [ 15.908392] </TASK> [ 15.908404] [ 15.921218] Allocated by task 283: [ 15.921539] kasan_save_stack+0x45/0x70 [ 15.921919] kasan_save_track+0x18/0x40 [ 15.922239] kasan_save_alloc_info+0x3b/0x50 [ 15.922389] __kasan_kmalloc+0xb7/0xc0 [ 15.922522] __kmalloc_cache_noprof+0x189/0x420 [ 15.922709] kasan_atomics+0x95/0x310 [ 15.923059] kunit_try_run_case+0x1a5/0x480 [ 15.923421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.923932] kthread+0x337/0x6f0 [ 15.924234] ret_from_fork+0x116/0x1d0 [ 15.924563] ret_from_fork_asm+0x1a/0x30 [ 15.924959] [ 15.925115] The buggy address belongs to the object at ffff888102744f80 [ 15.925115] which belongs to the cache kmalloc-64 of size 64 [ 15.925882] The buggy address is located 0 bytes to the right of [ 15.925882] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.926967] [ 15.927063] The buggy address belongs to the physical page: [ 15.927237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.927476] flags: 0x200000000000000(node=0|zone=2) [ 15.927637] page_type: f5(slab) [ 15.927984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.928737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.929209] page dumped because: kasan: bad access detected [ 15.929388] [ 15.929459] Memory state around the buggy address: [ 15.929617] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.930204] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.930818] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.931427] ^ [ 15.931604] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.932169] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.932782] ================================================================== [ 15.527078] ================================================================== [ 15.527348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.527789] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.528055] [ 15.528161] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.528204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.528216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.528238] Call Trace: [ 15.528251] <TASK> [ 15.528266] dump_stack_lvl+0x73/0xb0 [ 15.528293] print_report+0xd1/0x610 [ 15.528315] ? __virt_addr_valid+0x1db/0x2d0 [ 15.528336] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.528357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.528379] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.528401] kasan_report+0x141/0x180 [ 15.528422] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.528449] kasan_check_range+0x10c/0x1c0 [ 15.528472] __kasan_check_write+0x18/0x20 [ 15.528492] kasan_atomics_helper+0x12e6/0x5450 [ 15.528514] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.528536] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.528559] ? trace_hardirqs_on+0x37/0xe0 [ 15.528580] ? kasan_atomics+0x152/0x310 [ 15.528608] kasan_atomics+0x1dc/0x310 [ 15.528630] ? __pfx_kasan_atomics+0x10/0x10 [ 15.528653] ? __pfx_kasan_atomics+0x10/0x10 [ 15.528679] kunit_try_run_case+0x1a5/0x480 [ 15.528705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.528750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.528774] ? __kthread_parkme+0x82/0x180 [ 15.528794] ? preempt_count_sub+0x50/0x80 [ 15.528817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.528864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.528888] kthread+0x337/0x6f0 [ 15.528917] ? trace_preempt_on+0x20/0xc0 [ 15.528939] ? __pfx_kthread+0x10/0x10 [ 15.528959] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.528980] ? calculate_sigpending+0x7b/0xa0 [ 15.529003] ? __pfx_kthread+0x10/0x10 [ 15.529025] ret_from_fork+0x116/0x1d0 [ 15.529044] ? __pfx_kthread+0x10/0x10 [ 15.529064] ret_from_fork_asm+0x1a/0x30 [ 15.529095] </TASK> [ 15.529106] [ 15.536446] Allocated by task 283: [ 15.536619] kasan_save_stack+0x45/0x70 [ 15.536829] kasan_save_track+0x18/0x40 [ 15.537031] kasan_save_alloc_info+0x3b/0x50 [ 15.537219] __kasan_kmalloc+0xb7/0xc0 [ 15.537386] __kmalloc_cache_noprof+0x189/0x420 [ 15.537541] kasan_atomics+0x95/0x310 [ 15.537745] kunit_try_run_case+0x1a5/0x480 [ 15.537966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.538215] kthread+0x337/0x6f0 [ 15.538386] ret_from_fork+0x116/0x1d0 [ 15.538532] ret_from_fork_asm+0x1a/0x30 [ 15.538731] [ 15.538827] The buggy address belongs to the object at ffff888102744f80 [ 15.538827] which belongs to the cache kmalloc-64 of size 64 [ 15.539285] The buggy address is located 0 bytes to the right of [ 15.539285] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.539653] [ 15.539726] The buggy address belongs to the physical page: [ 15.539897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.540147] flags: 0x200000000000000(node=0|zone=2) [ 15.540339] page_type: f5(slab) [ 15.540501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.540840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.541181] page dumped because: kasan: bad access detected [ 15.541430] [ 15.541523] Memory state around the buggy address: [ 15.541744] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542015] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542232] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.542453] ^ [ 15.542611] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.543050] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.543367] ================================================================== [ 15.054639] ================================================================== [ 15.054992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.055234] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.055465] [ 15.055552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.055596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.055610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.055645] Call Trace: [ 15.055662] <TASK> [ 15.055678] dump_stack_lvl+0x73/0xb0 [ 15.055720] print_report+0xd1/0x610 [ 15.055743] ? __virt_addr_valid+0x1db/0x2d0 [ 15.055765] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.055786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.055809] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.055830] kasan_report+0x141/0x180 [ 15.055852] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.055878] kasan_check_range+0x10c/0x1c0 [ 15.055902] __kasan_check_write+0x18/0x20 [ 15.055930] kasan_atomics_helper+0x7c7/0x5450 [ 15.055954] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.055976] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.056001] ? trace_hardirqs_on+0x37/0xe0 [ 15.056033] ? kasan_atomics+0x152/0x310 [ 15.056061] kasan_atomics+0x1dc/0x310 [ 15.056094] ? __pfx_kasan_atomics+0x10/0x10 [ 15.056117] ? __pfx_kasan_atomics+0x10/0x10 [ 15.056144] kunit_try_run_case+0x1a5/0x480 [ 15.056168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.056191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.056214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.056236] ? __kthread_parkme+0x82/0x180 [ 15.056257] ? preempt_count_sub+0x50/0x80 [ 15.056280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.056304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.056327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.056350] kthread+0x337/0x6f0 [ 15.056370] ? trace_preempt_on+0x20/0xc0 [ 15.056392] ? __pfx_kthread+0x10/0x10 [ 15.056413] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.056442] ? calculate_sigpending+0x7b/0xa0 [ 15.056466] ? __pfx_kthread+0x10/0x10 [ 15.056487] ret_from_fork+0x116/0x1d0 [ 15.056516] ? __pfx_kthread+0x10/0x10 [ 15.056537] ret_from_fork_asm+0x1a/0x30 [ 15.056568] </TASK> [ 15.056580] [ 15.070186] Allocated by task 283: [ 15.070328] kasan_save_stack+0x45/0x70 [ 15.070496] kasan_save_track+0x18/0x40 [ 15.070883] kasan_save_alloc_info+0x3b/0x50 [ 15.071415] __kasan_kmalloc+0xb7/0xc0 [ 15.071760] __kmalloc_cache_noprof+0x189/0x420 [ 15.072424] kasan_atomics+0x95/0x310 [ 15.072833] kunit_try_run_case+0x1a5/0x480 [ 15.073229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.073747] kthread+0x337/0x6f0 [ 15.073901] ret_from_fork+0x116/0x1d0 [ 15.074213] ret_from_fork_asm+0x1a/0x30 [ 15.074643] [ 15.074824] The buggy address belongs to the object at ffff888102744f80 [ 15.074824] which belongs to the cache kmalloc-64 of size 64 [ 15.075808] The buggy address is located 0 bytes to the right of [ 15.075808] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.076994] [ 15.077161] The buggy address belongs to the physical page: [ 15.077852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.078114] flags: 0x200000000000000(node=0|zone=2) [ 15.078279] page_type: f5(slab) [ 15.078496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.079492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.080403] page dumped because: kasan: bad access detected [ 15.081019] [ 15.081279] Memory state around the buggy address: [ 15.081878] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.082465] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.083025] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.083256] ^ [ 15.083414] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.084307] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.085192] ================================================================== [ 15.428155] ================================================================== [ 15.428850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.429201] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.429485] [ 15.429592] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.429635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.429648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.430026] Call Trace: [ 15.430046] <TASK> [ 15.430062] dump_stack_lvl+0x73/0xb0 [ 15.430094] print_report+0xd1/0x610 [ 15.430117] ? __virt_addr_valid+0x1db/0x2d0 [ 15.430139] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.430342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.430373] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.430396] kasan_report+0x141/0x180 [ 15.430422] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.430450] __asan_report_load4_noabort+0x18/0x20 [ 15.430476] kasan_atomics_helper+0x4a1c/0x5450 [ 15.430499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.430521] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.430546] ? trace_hardirqs_on+0x37/0xe0 [ 15.430568] ? kasan_atomics+0x152/0x310 [ 15.430596] kasan_atomics+0x1dc/0x310 [ 15.430619] ? __pfx_kasan_atomics+0x10/0x10 [ 15.430643] ? __pfx_kasan_atomics+0x10/0x10 [ 15.430696] kunit_try_run_case+0x1a5/0x480 [ 15.430722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.430744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.430767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.430790] ? __kthread_parkme+0x82/0x180 [ 15.430810] ? preempt_count_sub+0x50/0x80 [ 15.430833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.430857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.430880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.430913] kthread+0x337/0x6f0 [ 15.430933] ? trace_preempt_on+0x20/0xc0 [ 15.430955] ? __pfx_kthread+0x10/0x10 [ 15.430976] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.430997] ? calculate_sigpending+0x7b/0xa0 [ 15.431020] ? __pfx_kthread+0x10/0x10 [ 15.431041] ret_from_fork+0x116/0x1d0 [ 15.431065] ? __pfx_kthread+0x10/0x10 [ 15.431085] ret_from_fork_asm+0x1a/0x30 [ 15.431116] </TASK> [ 15.431128] [ 15.442512] Allocated by task 283: [ 15.442835] kasan_save_stack+0x45/0x70 [ 15.443058] kasan_save_track+0x18/0x40 [ 15.443230] kasan_save_alloc_info+0x3b/0x50 [ 15.443418] __kasan_kmalloc+0xb7/0xc0 [ 15.443585] __kmalloc_cache_noprof+0x189/0x420 [ 15.444109] kasan_atomics+0x95/0x310 [ 15.444490] kunit_try_run_case+0x1a5/0x480 [ 15.444834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445237] kthread+0x337/0x6f0 [ 15.445403] ret_from_fork+0x116/0x1d0 [ 15.445562] ret_from_fork_asm+0x1a/0x30 [ 15.445998] [ 15.446245] The buggy address belongs to the object at ffff888102744f80 [ 15.446245] which belongs to the cache kmalloc-64 of size 64 [ 15.447090] The buggy address is located 0 bytes to the right of [ 15.447090] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.447579] [ 15.447959] The buggy address belongs to the physical page: [ 15.448255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.448885] flags: 0x200000000000000(node=0|zone=2) [ 15.449189] page_type: f5(slab) [ 15.449348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.449645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.450314] page dumped because: kasan: bad access detected [ 15.450809] [ 15.451068] Memory state around the buggy address: [ 15.451360] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.451828] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.452120] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.452412] ^ [ 15.452616] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.453221] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.453725] ================================================================== [ 15.713532] ================================================================== [ 15.713828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.714076] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.714352] [ 15.714544] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.714589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.714601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.714622] Call Trace: [ 15.714637] <TASK> [ 15.714652] dump_stack_lvl+0x73/0xb0 [ 15.714693] print_report+0xd1/0x610 [ 15.714717] ? __virt_addr_valid+0x1db/0x2d0 [ 15.714739] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.714772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.714795] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.714817] kasan_report+0x141/0x180 [ 15.714839] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.714866] kasan_check_range+0x10c/0x1c0 [ 15.714890] __kasan_check_write+0x18/0x20 [ 15.714919] kasan_atomics_helper+0x16e7/0x5450 [ 15.714943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.714965] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.714990] ? trace_hardirqs_on+0x37/0xe0 [ 15.715012] ? kasan_atomics+0x152/0x310 [ 15.715039] kasan_atomics+0x1dc/0x310 [ 15.715068] ? __pfx_kasan_atomics+0x10/0x10 [ 15.715091] ? __pfx_kasan_atomics+0x10/0x10 [ 15.715117] kunit_try_run_case+0x1a5/0x480 [ 15.715141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.715164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.715187] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.715210] ? __kthread_parkme+0x82/0x180 [ 15.715230] ? preempt_count_sub+0x50/0x80 [ 15.715253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.715277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.715300] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.715323] kthread+0x337/0x6f0 [ 15.715343] ? trace_preempt_on+0x20/0xc0 [ 15.715375] ? __pfx_kthread+0x10/0x10 [ 15.715395] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.715417] ? calculate_sigpending+0x7b/0xa0 [ 15.715459] ? __pfx_kthread+0x10/0x10 [ 15.715481] ret_from_fork+0x116/0x1d0 [ 15.715499] ? __pfx_kthread+0x10/0x10 [ 15.715530] ret_from_fork_asm+0x1a/0x30 [ 15.715561] </TASK> [ 15.715572] [ 15.723424] Allocated by task 283: [ 15.723566] kasan_save_stack+0x45/0x70 [ 15.723712] kasan_save_track+0x18/0x40 [ 15.723847] kasan_save_alloc_info+0x3b/0x50 [ 15.724005] __kasan_kmalloc+0xb7/0xc0 [ 15.724139] __kmalloc_cache_noprof+0x189/0x420 [ 15.724295] kasan_atomics+0x95/0x310 [ 15.724472] kunit_try_run_case+0x1a5/0x480 [ 15.724681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.724946] kthread+0x337/0x6f0 [ 15.725145] ret_from_fork+0x116/0x1d0 [ 15.725534] ret_from_fork_asm+0x1a/0x30 [ 15.725874] [ 15.725990] The buggy address belongs to the object at ffff888102744f80 [ 15.725990] which belongs to the cache kmalloc-64 of size 64 [ 15.726346] The buggy address is located 0 bytes to the right of [ 15.726346] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.726802] [ 15.726898] The buggy address belongs to the physical page: [ 15.727179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.727542] flags: 0x200000000000000(node=0|zone=2) [ 15.727946] page_type: f5(slab) [ 15.728117] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.728442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.728670] page dumped because: kasan: bad access detected [ 15.728958] [ 15.729055] Memory state around the buggy address: [ 15.729280] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.729579] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.729937] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.730227] ^ [ 15.730453] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.730808] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.731100] ================================================================== [ 16.089281] ================================================================== [ 16.090045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.090397] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.090920] [ 16.091151] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.091197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.091210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.091366] Call Trace: [ 16.091382] <TASK> [ 16.091397] dump_stack_lvl+0x73/0xb0 [ 16.091427] print_report+0xd1/0x610 [ 16.091449] ? __virt_addr_valid+0x1db/0x2d0 [ 16.091474] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.091495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.091517] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.091539] kasan_report+0x141/0x180 [ 16.091562] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.091589] __asan_report_load8_noabort+0x18/0x20 [ 16.091614] kasan_atomics_helper+0x4f98/0x5450 [ 16.091636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.091658] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.091698] ? trace_hardirqs_on+0x37/0xe0 [ 16.091720] ? kasan_atomics+0x152/0x310 [ 16.091747] kasan_atomics+0x1dc/0x310 [ 16.091770] ? __pfx_kasan_atomics+0x10/0x10 [ 16.091793] ? __pfx_kasan_atomics+0x10/0x10 [ 16.091819] kunit_try_run_case+0x1a5/0x480 [ 16.091844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.091867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.091890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.091926] ? __kthread_parkme+0x82/0x180 [ 16.091946] ? preempt_count_sub+0x50/0x80 [ 16.091970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.091994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.092017] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.092040] kthread+0x337/0x6f0 [ 16.092060] ? trace_preempt_on+0x20/0xc0 [ 16.092081] ? __pfx_kthread+0x10/0x10 [ 16.092101] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.092123] ? calculate_sigpending+0x7b/0xa0 [ 16.092146] ? __pfx_kthread+0x10/0x10 [ 16.092167] ret_from_fork+0x116/0x1d0 [ 16.092185] ? __pfx_kthread+0x10/0x10 [ 16.092206] ret_from_fork_asm+0x1a/0x30 [ 16.092237] </TASK> [ 16.092246] [ 16.102612] Allocated by task 283: [ 16.103020] kasan_save_stack+0x45/0x70 [ 16.103217] kasan_save_track+0x18/0x40 [ 16.103409] kasan_save_alloc_info+0x3b/0x50 [ 16.103612] __kasan_kmalloc+0xb7/0xc0 [ 16.104057] __kmalloc_cache_noprof+0x189/0x420 [ 16.104259] kasan_atomics+0x95/0x310 [ 16.104599] kunit_try_run_case+0x1a5/0x480 [ 16.104953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.105166] kthread+0x337/0x6f0 [ 16.105416] ret_from_fork+0x116/0x1d0 [ 16.105575] ret_from_fork_asm+0x1a/0x30 [ 16.106036] [ 16.106113] The buggy address belongs to the object at ffff888102744f80 [ 16.106113] which belongs to the cache kmalloc-64 of size 64 [ 16.106800] The buggy address is located 0 bytes to the right of [ 16.106800] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.107501] [ 16.107606] The buggy address belongs to the physical page: [ 16.108092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.108454] flags: 0x200000000000000(node=0|zone=2) [ 16.108834] page_type: f5(slab) [ 16.109109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.109538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.109986] page dumped because: kasan: bad access detected [ 16.110267] [ 16.110367] Memory state around the buggy address: [ 16.110767] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.111107] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.111430] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.111983] ^ [ 16.112205] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.112601] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.113066] ================================================================== [ 15.385840] ================================================================== [ 15.386556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.387043] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.387473] [ 15.387588] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.387688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.387703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.387725] Call Trace: [ 15.387740] <TASK> [ 15.387753] dump_stack_lvl+0x73/0xb0 [ 15.387782] print_report+0xd1/0x610 [ 15.387803] ? __virt_addr_valid+0x1db/0x2d0 [ 15.387825] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.387847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.387869] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.387891] kasan_report+0x141/0x180 [ 15.387925] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.387950] __asan_report_load4_noabort+0x18/0x20 [ 15.387997] kasan_atomics_helper+0x4a36/0x5450 [ 15.388020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.388042] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.388081] ? trace_hardirqs_on+0x37/0xe0 [ 15.388102] ? kasan_atomics+0x152/0x310 [ 15.388129] kasan_atomics+0x1dc/0x310 [ 15.388152] ? __pfx_kasan_atomics+0x10/0x10 [ 15.388175] ? __pfx_kasan_atomics+0x10/0x10 [ 15.388201] kunit_try_run_case+0x1a5/0x480 [ 15.388225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.388266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.388290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.388313] ? __kthread_parkme+0x82/0x180 [ 15.388334] ? preempt_count_sub+0x50/0x80 [ 15.388403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.388429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.388453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.388476] kthread+0x337/0x6f0 [ 15.388496] ? trace_preempt_on+0x20/0xc0 [ 15.388518] ? __pfx_kthread+0x10/0x10 [ 15.388539] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.388560] ? calculate_sigpending+0x7b/0xa0 [ 15.388606] ? __pfx_kthread+0x10/0x10 [ 15.388627] ret_from_fork+0x116/0x1d0 [ 15.388646] ? __pfx_kthread+0x10/0x10 [ 15.388667] ret_from_fork_asm+0x1a/0x30 [ 15.388708] </TASK> [ 15.388719] [ 15.397647] Allocated by task 283: [ 15.397819] kasan_save_stack+0x45/0x70 [ 15.398152] kasan_save_track+0x18/0x40 [ 15.398300] kasan_save_alloc_info+0x3b/0x50 [ 15.398740] __kasan_kmalloc+0xb7/0xc0 [ 15.398939] __kmalloc_cache_noprof+0x189/0x420 [ 15.399193] kasan_atomics+0x95/0x310 [ 15.399505] kunit_try_run_case+0x1a5/0x480 [ 15.399664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.399957] kthread+0x337/0x6f0 [ 15.400123] ret_from_fork+0x116/0x1d0 [ 15.400300] ret_from_fork_asm+0x1a/0x30 [ 15.400621] [ 15.400771] The buggy address belongs to the object at ffff888102744f80 [ 15.400771] which belongs to the cache kmalloc-64 of size 64 [ 15.401243] The buggy address is located 0 bytes to the right of [ 15.401243] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.401931] [ 15.402048] The buggy address belongs to the physical page: [ 15.402292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.402779] flags: 0x200000000000000(node=0|zone=2) [ 15.403132] page_type: f5(slab) [ 15.403316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.403659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.403883] page dumped because: kasan: bad access detected [ 15.404143] [ 15.404240] Memory state around the buggy address: [ 15.404605] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.405236] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.405451] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.405660] ^ [ 15.405814] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.406043] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.406518] ================================================================== [ 15.473189] ================================================================== [ 15.473564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.473900] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.474195] [ 15.474297] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.474338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.474352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.474373] Call Trace: [ 15.474386] <TASK> [ 15.474400] dump_stack_lvl+0x73/0xb0 [ 15.474428] print_report+0xd1/0x610 [ 15.474450] ? __virt_addr_valid+0x1db/0x2d0 [ 15.474471] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.474492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.474514] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.474536] kasan_report+0x141/0x180 [ 15.474558] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.474585] __asan_report_load4_noabort+0x18/0x20 [ 15.474609] kasan_atomics_helper+0x4a02/0x5450 [ 15.474632] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.474654] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.474677] ? trace_hardirqs_on+0x37/0xe0 [ 15.474706] ? kasan_atomics+0x152/0x310 [ 15.474733] kasan_atomics+0x1dc/0x310 [ 15.474756] ? __pfx_kasan_atomics+0x10/0x10 [ 15.474779] ? __pfx_kasan_atomics+0x10/0x10 [ 15.474805] kunit_try_run_case+0x1a5/0x480 [ 15.474829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.474851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.474875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.474898] ? __kthread_parkme+0x82/0x180 [ 15.474930] ? preempt_count_sub+0x50/0x80 [ 15.474953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.474977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.475000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.475024] kthread+0x337/0x6f0 [ 15.475043] ? trace_preempt_on+0x20/0xc0 [ 15.475073] ? __pfx_kthread+0x10/0x10 [ 15.475094] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.475116] ? calculate_sigpending+0x7b/0xa0 [ 15.475139] ? __pfx_kthread+0x10/0x10 [ 15.475161] ret_from_fork+0x116/0x1d0 [ 15.475179] ? __pfx_kthread+0x10/0x10 [ 15.475199] ret_from_fork_asm+0x1a/0x30 [ 15.475230] </TASK> [ 15.475240] [ 15.482470] Allocated by task 283: [ 15.482654] kasan_save_stack+0x45/0x70 [ 15.482858] kasan_save_track+0x18/0x40 [ 15.483023] kasan_save_alloc_info+0x3b/0x50 [ 15.483220] __kasan_kmalloc+0xb7/0xc0 [ 15.483381] __kmalloc_cache_noprof+0x189/0x420 [ 15.483585] kasan_atomics+0x95/0x310 [ 15.483787] kunit_try_run_case+0x1a5/0x480 [ 15.483944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.484120] kthread+0x337/0x6f0 [ 15.484241] ret_from_fork+0x116/0x1d0 [ 15.484373] ret_from_fork_asm+0x1a/0x30 [ 15.484513] [ 15.484583] The buggy address belongs to the object at ffff888102744f80 [ 15.484583] which belongs to the cache kmalloc-64 of size 64 [ 15.485084] The buggy address is located 0 bytes to the right of [ 15.485084] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.485626] [ 15.485777] The buggy address belongs to the physical page: [ 15.486037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.486387] flags: 0x200000000000000(node=0|zone=2) [ 15.486616] page_type: f5(slab) [ 15.486782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.487030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.487286] page dumped because: kasan: bad access detected [ 15.487541] [ 15.487637] Memory state around the buggy address: [ 15.488107] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.488426] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.488782] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.489054] ^ [ 15.489275] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.489554] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.489854] ================================================================== [ 16.214890] ================================================================== [ 16.215237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.215773] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.216108] [ 16.216196] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.216237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.216250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.216270] Call Trace: [ 16.216286] <TASK> [ 16.216301] dump_stack_lvl+0x73/0xb0 [ 16.216330] print_report+0xd1/0x610 [ 16.216377] ? __virt_addr_valid+0x1db/0x2d0 [ 16.216401] ? kasan_atomics_helper+0x5115/0x5450 [ 16.216424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.216447] ? kasan_atomics_helper+0x5115/0x5450 [ 16.216487] kasan_report+0x141/0x180 [ 16.216510] ? kasan_atomics_helper+0x5115/0x5450 [ 16.216536] __asan_report_load8_noabort+0x18/0x20 [ 16.216579] kasan_atomics_helper+0x5115/0x5450 [ 16.216602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.216642] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.216666] ? trace_hardirqs_on+0x37/0xe0 [ 16.216689] ? kasan_atomics+0x152/0x310 [ 16.216716] kasan_atomics+0x1dc/0x310 [ 16.216739] ? __pfx_kasan_atomics+0x10/0x10 [ 16.216763] ? __pfx_kasan_atomics+0x10/0x10 [ 16.216790] kunit_try_run_case+0x1a5/0x480 [ 16.216814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216836] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.216859] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.216890] ? __kthread_parkme+0x82/0x180 [ 16.216922] ? preempt_count_sub+0x50/0x80 [ 16.216946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.216988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.217012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.217036] kthread+0x337/0x6f0 [ 16.217069] ? trace_preempt_on+0x20/0xc0 [ 16.217091] ? __pfx_kthread+0x10/0x10 [ 16.217112] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.217149] ? calculate_sigpending+0x7b/0xa0 [ 16.217186] ? __pfx_kthread+0x10/0x10 [ 16.217208] ret_from_fork+0x116/0x1d0 [ 16.217240] ? __pfx_kthread+0x10/0x10 [ 16.217274] ret_from_fork_asm+0x1a/0x30 [ 16.217318] </TASK> [ 16.217341] [ 16.225389] Allocated by task 283: [ 16.225518] kasan_save_stack+0x45/0x70 [ 16.225663] kasan_save_track+0x18/0x40 [ 16.225798] kasan_save_alloc_info+0x3b/0x50 [ 16.225958] __kasan_kmalloc+0xb7/0xc0 [ 16.226094] __kmalloc_cache_noprof+0x189/0x420 [ 16.226313] kasan_atomics+0x95/0x310 [ 16.226522] kunit_try_run_case+0x1a5/0x480 [ 16.226766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.227027] kthread+0x337/0x6f0 [ 16.227199] ret_from_fork+0x116/0x1d0 [ 16.227383] ret_from_fork_asm+0x1a/0x30 [ 16.227579] [ 16.227669] The buggy address belongs to the object at ffff888102744f80 [ 16.227669] which belongs to the cache kmalloc-64 of size 64 [ 16.228052] The buggy address is located 0 bytes to the right of [ 16.228052] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.228430] [ 16.228522] The buggy address belongs to the physical page: [ 16.228884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.229268] flags: 0x200000000000000(node=0|zone=2) [ 16.229521] page_type: f5(slab) [ 16.229726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.230104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.230434] page dumped because: kasan: bad access detected [ 16.230643] [ 16.230777] Memory state around the buggy address: [ 16.231019] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.231293] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.231605] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.231943] ^ [ 16.232178] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.232525] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.233068] ================================================================== [ 14.842570] ================================================================== [ 14.842798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.843038] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.843791] [ 14.843931] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.843974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.844006] Call Trace: [ 14.844019] <TASK> [ 14.844034] dump_stack_lvl+0x73/0xb0 [ 14.844061] print_report+0xd1/0x610 [ 14.844084] ? __virt_addr_valid+0x1db/0x2d0 [ 14.844105] ? kasan_atomics_helper+0x3df/0x5450 [ 14.844126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.844148] ? kasan_atomics_helper+0x3df/0x5450 [ 14.844170] kasan_report+0x141/0x180 [ 14.844191] ? kasan_atomics_helper+0x3df/0x5450 [ 14.844218] kasan_check_range+0x10c/0x1c0 [ 14.844241] __kasan_check_read+0x15/0x20 [ 14.844260] kasan_atomics_helper+0x3df/0x5450 [ 14.844282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.844304] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.844327] ? trace_hardirqs_on+0x37/0xe0 [ 14.844407] ? kasan_atomics+0x152/0x310 [ 14.844436] kasan_atomics+0x1dc/0x310 [ 14.844459] ? __pfx_kasan_atomics+0x10/0x10 [ 14.844507] ? __pfx_kasan_atomics+0x10/0x10 [ 14.844536] kunit_try_run_case+0x1a5/0x480 [ 14.844573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844597] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.844620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.844660] ? __kthread_parkme+0x82/0x180 [ 14.844681] ? preempt_count_sub+0x50/0x80 [ 14.844705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.844752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844775] kthread+0x337/0x6f0 [ 14.844795] ? trace_preempt_on+0x20/0xc0 [ 14.844819] ? __pfx_kthread+0x10/0x10 [ 14.844840] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844861] ? calculate_sigpending+0x7b/0xa0 [ 14.844884] ? __pfx_kthread+0x10/0x10 [ 14.844918] ret_from_fork+0x116/0x1d0 [ 14.844937] ? __pfx_kthread+0x10/0x10 [ 14.844957] ret_from_fork_asm+0x1a/0x30 [ 14.844988] </TASK> [ 14.844999] [ 14.853841] Allocated by task 283: [ 14.854062] kasan_save_stack+0x45/0x70 [ 14.854255] kasan_save_track+0x18/0x40 [ 14.854517] kasan_save_alloc_info+0x3b/0x50 [ 14.854781] __kasan_kmalloc+0xb7/0xc0 [ 14.854969] __kmalloc_cache_noprof+0x189/0x420 [ 14.855184] kasan_atomics+0x95/0x310 [ 14.855516] kunit_try_run_case+0x1a5/0x480 [ 14.855949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.856212] kthread+0x337/0x6f0 [ 14.856393] ret_from_fork+0x116/0x1d0 [ 14.856656] ret_from_fork_asm+0x1a/0x30 [ 14.856860] [ 14.857036] The buggy address belongs to the object at ffff888102744f80 [ 14.857036] which belongs to the cache kmalloc-64 of size 64 [ 14.857481] The buggy address is located 0 bytes to the right of [ 14.857481] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.857929] [ 14.858005] The buggy address belongs to the physical page: [ 14.858420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.859312] flags: 0x200000000000000(node=0|zone=2) [ 14.860073] page_type: f5(slab) [ 14.860368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.860974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.861205] page dumped because: kasan: bad access detected [ 14.861376] [ 14.861447] Memory state around the buggy address: [ 14.861727] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.861977] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.862267] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.862796] ^ [ 14.863014] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.863328] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.863860] ================================================================== [ 14.864287] ================================================================== [ 14.864672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.865004] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.865323] [ 14.865546] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.865591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.865603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.865624] Call Trace: [ 14.865640] <TASK> [ 14.865654] dump_stack_lvl+0x73/0xb0 [ 14.865682] print_report+0xd1/0x610 [ 14.865704] ? __virt_addr_valid+0x1db/0x2d0 [ 14.865748] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.865769] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.865791] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.865813] kasan_report+0x141/0x180 [ 14.865836] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.865863] __asan_report_load4_noabort+0x18/0x20 [ 14.865887] kasan_atomics_helper+0x4b54/0x5450 [ 14.865940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.865964] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.865987] ? trace_hardirqs_on+0x37/0xe0 [ 14.866009] ? kasan_atomics+0x152/0x310 [ 14.866035] kasan_atomics+0x1dc/0x310 [ 14.866058] ? __pfx_kasan_atomics+0x10/0x10 [ 14.866081] ? __pfx_kasan_atomics+0x10/0x10 [ 14.866125] kunit_try_run_case+0x1a5/0x480 [ 14.866150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.866172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.866195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.866219] ? __kthread_parkme+0x82/0x180 [ 14.866238] ? preempt_count_sub+0x50/0x80 [ 14.866261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.866285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.866326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.866350] kthread+0x337/0x6f0 [ 14.866370] ? trace_preempt_on+0x20/0xc0 [ 14.866391] ? __pfx_kthread+0x10/0x10 [ 14.866412] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.866433] ? calculate_sigpending+0x7b/0xa0 [ 14.866457] ? __pfx_kthread+0x10/0x10 [ 14.866478] ret_from_fork+0x116/0x1d0 [ 14.866497] ? __pfx_kthread+0x10/0x10 [ 14.866518] ret_from_fork_asm+0x1a/0x30 [ 14.866548] </TASK> [ 14.866559] [ 14.874854] Allocated by task 283: [ 14.875008] kasan_save_stack+0x45/0x70 [ 14.875163] kasan_save_track+0x18/0x40 [ 14.875529] kasan_save_alloc_info+0x3b/0x50 [ 14.875893] __kasan_kmalloc+0xb7/0xc0 [ 14.876091] __kmalloc_cache_noprof+0x189/0x420 [ 14.876313] kasan_atomics+0x95/0x310 [ 14.876629] kunit_try_run_case+0x1a5/0x480 [ 14.876947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.877122] kthread+0x337/0x6f0 [ 14.877239] ret_from_fork+0x116/0x1d0 [ 14.877367] ret_from_fork_asm+0x1a/0x30 [ 14.877504] [ 14.877700] The buggy address belongs to the object at ffff888102744f80 [ 14.877700] which belongs to the cache kmalloc-64 of size 64 [ 14.878779] The buggy address is located 0 bytes to the right of [ 14.878779] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.880222] [ 14.880466] The buggy address belongs to the physical page: [ 14.881047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.882192] flags: 0x200000000000000(node=0|zone=2) [ 14.882591] page_type: f5(slab) [ 14.882758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.883476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.884193] page dumped because: kasan: bad access detected [ 14.884475] [ 14.884659] Memory state around the buggy address: [ 14.885134] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.885881] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.886451] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.887009] ^ [ 14.887181] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.887756] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888412] ================================================================== [ 15.230954] ================================================================== [ 15.231791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.232179] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.232608] [ 15.232835] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.232882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.232895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.232931] Call Trace: [ 15.232947] <TASK> [ 15.232964] dump_stack_lvl+0x73/0xb0 [ 15.232995] print_report+0xd1/0x610 [ 15.233017] ? __virt_addr_valid+0x1db/0x2d0 [ 15.233039] ? kasan_atomics_helper+0xc70/0x5450 [ 15.233060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.233082] ? kasan_atomics_helper+0xc70/0x5450 [ 15.233103] kasan_report+0x141/0x180 [ 15.233126] ? kasan_atomics_helper+0xc70/0x5450 [ 15.233152] kasan_check_range+0x10c/0x1c0 [ 15.233175] __kasan_check_write+0x18/0x20 [ 15.233194] kasan_atomics_helper+0xc70/0x5450 [ 15.233216] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.233238] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.233283] ? trace_hardirqs_on+0x37/0xe0 [ 15.233306] ? kasan_atomics+0x152/0x310 [ 15.233332] kasan_atomics+0x1dc/0x310 [ 15.233412] ? __pfx_kasan_atomics+0x10/0x10 [ 15.233437] ? __pfx_kasan_atomics+0x10/0x10 [ 15.233464] kunit_try_run_case+0x1a5/0x480 [ 15.233488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.233511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.233534] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.233557] ? __kthread_parkme+0x82/0x180 [ 15.233578] ? preempt_count_sub+0x50/0x80 [ 15.233602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.233626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.233648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.233672] kthread+0x337/0x6f0 [ 15.233700] ? trace_preempt_on+0x20/0xc0 [ 15.233722] ? __pfx_kthread+0x10/0x10 [ 15.233742] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.233763] ? calculate_sigpending+0x7b/0xa0 [ 15.233786] ? __pfx_kthread+0x10/0x10 [ 15.233807] ret_from_fork+0x116/0x1d0 [ 15.233825] ? __pfx_kthread+0x10/0x10 [ 15.233847] ret_from_fork_asm+0x1a/0x30 [ 15.233877] </TASK> [ 15.233888] [ 15.248301] Allocated by task 283: [ 15.248776] kasan_save_stack+0x45/0x70 [ 15.249196] kasan_save_track+0x18/0x40 [ 15.249643] kasan_save_alloc_info+0x3b/0x50 [ 15.250082] __kasan_kmalloc+0xb7/0xc0 [ 15.250289] __kmalloc_cache_noprof+0x189/0x420 [ 15.250732] kasan_atomics+0x95/0x310 [ 15.251204] kunit_try_run_case+0x1a5/0x480 [ 15.251406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.251922] kthread+0x337/0x6f0 [ 15.252238] ret_from_fork+0x116/0x1d0 [ 15.252536] ret_from_fork_asm+0x1a/0x30 [ 15.253100] [ 15.253273] The buggy address belongs to the object at ffff888102744f80 [ 15.253273] which belongs to the cache kmalloc-64 of size 64 [ 15.254349] The buggy address is located 0 bytes to the right of [ 15.254349] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.255028] [ 15.255112] The buggy address belongs to the physical page: [ 15.255288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.255555] flags: 0x200000000000000(node=0|zone=2) [ 15.256033] page_type: f5(slab) [ 15.256202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.256681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.257069] page dumped because: kasan: bad access detected [ 15.257258] [ 15.257427] Memory state around the buggy address: [ 15.257664] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.257892] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.258442] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.258750] ^ [ 15.258993] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.259277] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.259693] ================================================================== [ 15.201246] ================================================================== [ 15.201995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.202339] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.202755] [ 15.202867] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.202921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.202934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.202955] Call Trace: [ 15.202971] <TASK> [ 15.202986] dump_stack_lvl+0x73/0xb0 [ 15.203014] print_report+0xd1/0x610 [ 15.203035] ? __virt_addr_valid+0x1db/0x2d0 [ 15.203060] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.203081] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.203103] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.203124] kasan_report+0x141/0x180 [ 15.203146] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.203172] kasan_check_range+0x10c/0x1c0 [ 15.203195] __kasan_check_write+0x18/0x20 [ 15.203214] kasan_atomics_helper+0xb6a/0x5450 [ 15.203236] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.203258] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.203281] ? trace_hardirqs_on+0x37/0xe0 [ 15.203302] ? kasan_atomics+0x152/0x310 [ 15.203328] kasan_atomics+0x1dc/0x310 [ 15.203350] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203374] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203577] kunit_try_run_case+0x1a5/0x480 [ 15.203607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.203654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.203678] ? __kthread_parkme+0x82/0x180 [ 15.203697] ? preempt_count_sub+0x50/0x80 [ 15.203720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203767] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.203790] kthread+0x337/0x6f0 [ 15.203810] ? trace_preempt_on+0x20/0xc0 [ 15.203832] ? __pfx_kthread+0x10/0x10 [ 15.203853] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.203875] ? calculate_sigpending+0x7b/0xa0 [ 15.203899] ? __pfx_kthread+0x10/0x10 [ 15.203934] ret_from_fork+0x116/0x1d0 [ 15.203952] ? __pfx_kthread+0x10/0x10 [ 15.203973] ret_from_fork_asm+0x1a/0x30 [ 15.204003] </TASK> [ 15.204014] [ 15.212810] Allocated by task 283: [ 15.212978] kasan_save_stack+0x45/0x70 [ 15.213129] kasan_save_track+0x18/0x40 [ 15.213266] kasan_save_alloc_info+0x3b/0x50 [ 15.214353] __kasan_kmalloc+0xb7/0xc0 [ 15.215364] __kmalloc_cache_noprof+0x189/0x420 [ 15.215939] kasan_atomics+0x95/0x310 [ 15.216448] kunit_try_run_case+0x1a5/0x480 [ 15.217213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.217926] kthread+0x337/0x6f0 [ 15.218428] ret_from_fork+0x116/0x1d0 [ 15.218579] ret_from_fork_asm+0x1a/0x30 [ 15.219148] [ 15.219255] The buggy address belongs to the object at ffff888102744f80 [ 15.219255] which belongs to the cache kmalloc-64 of size 64 [ 15.220542] The buggy address is located 0 bytes to the right of [ 15.220542] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.221633] [ 15.221730] The buggy address belongs to the physical page: [ 15.222275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.223081] flags: 0x200000000000000(node=0|zone=2) [ 15.223251] page_type: f5(slab) [ 15.223425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.224920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.225610] page dumped because: kasan: bad access detected [ 15.225971] [ 15.226049] Memory state around the buggy address: [ 15.226205] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.226415] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.226625] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.227673] ^ [ 15.228160] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.229084] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.229817] ================================================================== [ 15.881516] ================================================================== [ 15.881900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.882252] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.882608] [ 15.882744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.882786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.882798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.882819] Call Trace: [ 15.882834] <TASK> [ 15.882848] dump_stack_lvl+0x73/0xb0 [ 15.882876] print_report+0xd1/0x610 [ 15.882898] ? __virt_addr_valid+0x1db/0x2d0 [ 15.882930] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.882951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.882973] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.882996] kasan_report+0x141/0x180 [ 15.883017] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.883043] kasan_check_range+0x10c/0x1c0 [ 15.883071] __kasan_check_write+0x18/0x20 [ 15.883090] kasan_atomics_helper+0x1c18/0x5450 [ 15.883113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.883135] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.883158] ? trace_hardirqs_on+0x37/0xe0 [ 15.883179] ? kasan_atomics+0x152/0x310 [ 15.883206] kasan_atomics+0x1dc/0x310 [ 15.883228] ? __pfx_kasan_atomics+0x10/0x10 [ 15.883251] ? __pfx_kasan_atomics+0x10/0x10 [ 15.883277] kunit_try_run_case+0x1a5/0x480 [ 15.883301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.883324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.883347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.883370] ? __kthread_parkme+0x82/0x180 [ 15.883390] ? preempt_count_sub+0x50/0x80 [ 15.883413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.883437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.883460] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.883483] kthread+0x337/0x6f0 [ 15.883502] ? trace_preempt_on+0x20/0xc0 [ 15.883524] ? __pfx_kthread+0x10/0x10 [ 15.883546] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.883566] ? calculate_sigpending+0x7b/0xa0 [ 15.883590] ? __pfx_kthread+0x10/0x10 [ 15.883612] ret_from_fork+0x116/0x1d0 [ 15.883631] ? __pfx_kthread+0x10/0x10 [ 15.883652] ret_from_fork_asm+0x1a/0x30 [ 15.883703] </TASK> [ 15.883714] [ 15.892800] Allocated by task 283: [ 15.893158] kasan_save_stack+0x45/0x70 [ 15.893510] kasan_save_track+0x18/0x40 [ 15.893873] kasan_save_alloc_info+0x3b/0x50 [ 15.894263] __kasan_kmalloc+0xb7/0xc0 [ 15.894592] __kmalloc_cache_noprof+0x189/0x420 [ 15.895014] kasan_atomics+0x95/0x310 [ 15.895345] kunit_try_run_case+0x1a5/0x480 [ 15.895612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.896079] kthread+0x337/0x6f0 [ 15.896371] ret_from_fork+0x116/0x1d0 [ 15.896535] ret_from_fork_asm+0x1a/0x30 [ 15.896712] [ 15.896871] The buggy address belongs to the object at ffff888102744f80 [ 15.896871] which belongs to the cache kmalloc-64 of size 64 [ 15.897890] The buggy address is located 0 bytes to the right of [ 15.897890] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.898516] [ 15.898593] The buggy address belongs to the physical page: [ 15.898999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.899690] flags: 0x200000000000000(node=0|zone=2) [ 15.900112] page_type: f5(slab) [ 15.900399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.901071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.901534] page dumped because: kasan: bad access detected [ 15.901800] [ 15.901977] Memory state around the buggy address: [ 15.902388] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.903020] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.903383] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.903598] ^ [ 15.903950] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.904549] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.905168] ================================================================== [ 16.113752] ================================================================== [ 16.114224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.114962] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.115334] [ 16.115595] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.115644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.115677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.115699] Call Trace: [ 16.115727] <TASK> [ 16.115742] dump_stack_lvl+0x73/0xb0 [ 16.115773] print_report+0xd1/0x610 [ 16.115981] ? __virt_addr_valid+0x1db/0x2d0 [ 16.116005] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.116027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.116049] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.116071] kasan_report+0x141/0x180 [ 16.116093] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.116120] kasan_check_range+0x10c/0x1c0 [ 16.116143] __kasan_check_write+0x18/0x20 [ 16.116162] kasan_atomics_helper+0x20c8/0x5450 [ 16.116185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.116207] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.116231] ? trace_hardirqs_on+0x37/0xe0 [ 16.116253] ? kasan_atomics+0x152/0x310 [ 16.116280] kasan_atomics+0x1dc/0x310 [ 16.116302] ? __pfx_kasan_atomics+0x10/0x10 [ 16.116326] ? __pfx_kasan_atomics+0x10/0x10 [ 16.116353] kunit_try_run_case+0x1a5/0x480 [ 16.116378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.116401] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.116425] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.116448] ? __kthread_parkme+0x82/0x180 [ 16.116468] ? preempt_count_sub+0x50/0x80 [ 16.116492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.116516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.116539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.116563] kthread+0x337/0x6f0 [ 16.116582] ? trace_preempt_on+0x20/0xc0 [ 16.116605] ? __pfx_kthread+0x10/0x10 [ 16.116625] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.116646] ? calculate_sigpending+0x7b/0xa0 [ 16.116669] ? __pfx_kthread+0x10/0x10 [ 16.116699] ret_from_fork+0x116/0x1d0 [ 16.116718] ? __pfx_kthread+0x10/0x10 [ 16.116739] ret_from_fork_asm+0x1a/0x30 [ 16.116769] </TASK> [ 16.116781] [ 16.127256] Allocated by task 283: [ 16.127451] kasan_save_stack+0x45/0x70 [ 16.127931] kasan_save_track+0x18/0x40 [ 16.128147] kasan_save_alloc_info+0x3b/0x50 [ 16.128464] __kasan_kmalloc+0xb7/0xc0 [ 16.128658] __kmalloc_cache_noprof+0x189/0x420 [ 16.129030] kasan_atomics+0x95/0x310 [ 16.129254] kunit_try_run_case+0x1a5/0x480 [ 16.129523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.129960] kthread+0x337/0x6f0 [ 16.130226] ret_from_fork+0x116/0x1d0 [ 16.130371] ret_from_fork_asm+0x1a/0x30 [ 16.130707] [ 16.130811] The buggy address belongs to the object at ffff888102744f80 [ 16.130811] which belongs to the cache kmalloc-64 of size 64 [ 16.131467] The buggy address is located 0 bytes to the right of [ 16.131467] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.132262] [ 16.132367] The buggy address belongs to the physical page: [ 16.132838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.133201] flags: 0x200000000000000(node=0|zone=2) [ 16.133425] page_type: f5(slab) [ 16.133579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.134147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.134540] page dumped because: kasan: bad access detected [ 16.134888] [ 16.135003] Memory state around the buggy address: [ 16.135374] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.135716] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.136203] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.136536] ^ [ 16.136893] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.137313] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.137698] ================================================================== [ 16.041033] ================================================================== [ 16.041674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.042149] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.042521] [ 16.042893] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.042973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.042986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.043023] Call Trace: [ 16.043057] <TASK> [ 16.043073] dump_stack_lvl+0x73/0xb0 [ 16.043117] print_report+0xd1/0x610 [ 16.043140] ? __virt_addr_valid+0x1db/0x2d0 [ 16.043176] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.043432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.043455] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.043478] kasan_report+0x141/0x180 [ 16.043501] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.043528] __asan_report_load8_noabort+0x18/0x20 [ 16.043552] kasan_atomics_helper+0x4f71/0x5450 [ 16.043574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.043596] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.043621] ? trace_hardirqs_on+0x37/0xe0 [ 16.043643] ? kasan_atomics+0x152/0x310 [ 16.043669] kasan_atomics+0x1dc/0x310 [ 16.043700] ? __pfx_kasan_atomics+0x10/0x10 [ 16.043724] ? __pfx_kasan_atomics+0x10/0x10 [ 16.043751] kunit_try_run_case+0x1a5/0x480 [ 16.043774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.043796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.043820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.043842] ? __kthread_parkme+0x82/0x180 [ 16.043862] ? preempt_count_sub+0x50/0x80 [ 16.043885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.043922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.043945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.043969] kthread+0x337/0x6f0 [ 16.043988] ? trace_preempt_on+0x20/0xc0 [ 16.044010] ? __pfx_kthread+0x10/0x10 [ 16.044031] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.044051] ? calculate_sigpending+0x7b/0xa0 [ 16.044074] ? __pfx_kthread+0x10/0x10 [ 16.044096] ret_from_fork+0x116/0x1d0 [ 16.044115] ? __pfx_kthread+0x10/0x10 [ 16.044136] ret_from_fork_asm+0x1a/0x30 [ 16.044166] </TASK> [ 16.044177] [ 16.054786] Allocated by task 283: [ 16.055003] kasan_save_stack+0x45/0x70 [ 16.055460] kasan_save_track+0x18/0x40 [ 16.055666] kasan_save_alloc_info+0x3b/0x50 [ 16.055986] __kasan_kmalloc+0xb7/0xc0 [ 16.056289] __kmalloc_cache_noprof+0x189/0x420 [ 16.056590] kasan_atomics+0x95/0x310 [ 16.056818] kunit_try_run_case+0x1a5/0x480 [ 16.057165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.057508] kthread+0x337/0x6f0 [ 16.057761] ret_from_fork+0x116/0x1d0 [ 16.057986] ret_from_fork_asm+0x1a/0x30 [ 16.058318] [ 16.058448] The buggy address belongs to the object at ffff888102744f80 [ 16.058448] which belongs to the cache kmalloc-64 of size 64 [ 16.059169] The buggy address is located 0 bytes to the right of [ 16.059169] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.059982] [ 16.060203] The buggy address belongs to the physical page: [ 16.060443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.061047] flags: 0x200000000000000(node=0|zone=2) [ 16.061263] page_type: f5(slab) [ 16.061411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.061972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.062309] page dumped because: kasan: bad access detected [ 16.062689] [ 16.062857] Memory state around the buggy address: [ 16.063253] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.063634] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.064099] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.064433] ^ [ 16.064756] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.065200] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.065522] ================================================================== [ 15.086048] ================================================================== [ 15.086637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.087344] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.087588] [ 15.087676] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.087720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.087733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.087754] Call Trace: [ 15.087771] <TASK> [ 15.087786] dump_stack_lvl+0x73/0xb0 [ 15.087815] print_report+0xd1/0x610 [ 15.087839] ? __virt_addr_valid+0x1db/0x2d0 [ 15.087864] ? kasan_atomics_helper+0x860/0x5450 [ 15.087885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.087918] ? kasan_atomics_helper+0x860/0x5450 [ 15.087941] kasan_report+0x141/0x180 [ 15.087963] ? kasan_atomics_helper+0x860/0x5450 [ 15.087990] kasan_check_range+0x10c/0x1c0 [ 15.088014] __kasan_check_write+0x18/0x20 [ 15.088033] kasan_atomics_helper+0x860/0x5450 [ 15.088055] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.088077] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.088101] ? trace_hardirqs_on+0x37/0xe0 [ 15.088124] ? kasan_atomics+0x152/0x310 [ 15.088151] kasan_atomics+0x1dc/0x310 [ 15.088173] ? __pfx_kasan_atomics+0x10/0x10 [ 15.088197] ? __pfx_kasan_atomics+0x10/0x10 [ 15.088224] kunit_try_run_case+0x1a5/0x480 [ 15.088249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.088271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.088326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.088350] ? __kthread_parkme+0x82/0x180 [ 15.088371] ? preempt_count_sub+0x50/0x80 [ 15.088395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.088418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.088442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.088465] kthread+0x337/0x6f0 [ 15.088484] ? trace_preempt_on+0x20/0xc0 [ 15.088506] ? __pfx_kthread+0x10/0x10 [ 15.088537] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.088559] ? calculate_sigpending+0x7b/0xa0 [ 15.088583] ? __pfx_kthread+0x10/0x10 [ 15.088604] ret_from_fork+0x116/0x1d0 [ 15.088624] ? __pfx_kthread+0x10/0x10 [ 15.088644] ret_from_fork_asm+0x1a/0x30 [ 15.088674] </TASK> [ 15.088685] [ 15.099948] Allocated by task 283: [ 15.100252] kasan_save_stack+0x45/0x70 [ 15.100634] kasan_save_track+0x18/0x40 [ 15.100858] kasan_save_alloc_info+0x3b/0x50 [ 15.101293] __kasan_kmalloc+0xb7/0xc0 [ 15.101636] __kmalloc_cache_noprof+0x189/0x420 [ 15.101820] kasan_atomics+0x95/0x310 [ 15.102175] kunit_try_run_case+0x1a5/0x480 [ 15.102479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.102697] kthread+0x337/0x6f0 [ 15.103127] ret_from_fork+0x116/0x1d0 [ 15.103520] ret_from_fork_asm+0x1a/0x30 [ 15.103681] [ 15.103804] The buggy address belongs to the object at ffff888102744f80 [ 15.103804] which belongs to the cache kmalloc-64 of size 64 [ 15.104317] The buggy address is located 0 bytes to the right of [ 15.104317] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.105176] [ 15.105261] The buggy address belongs to the physical page: [ 15.105749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.106193] flags: 0x200000000000000(node=0|zone=2) [ 15.106497] page_type: f5(slab) [ 15.106705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.107318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.108012] page dumped because: kasan: bad access detected [ 15.108219] [ 15.108318] Memory state around the buggy address: [ 15.108670] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.109228] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.109785] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.110285] ^ [ 15.110605] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.110942] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111276] ================================================================== [ 15.543841] ================================================================== [ 15.544191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.544876] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.545229] [ 15.545348] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.545390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.545401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.545422] Call Trace: [ 15.545437] <TASK> [ 15.545452] dump_stack_lvl+0x73/0xb0 [ 15.545481] print_report+0xd1/0x610 [ 15.545503] ? __virt_addr_valid+0x1db/0x2d0 [ 15.545526] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.545547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.545570] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.545593] kasan_report+0x141/0x180 [ 15.545615] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.545641] __asan_report_load4_noabort+0x18/0x20 [ 15.545665] kasan_atomics_helper+0x49ce/0x5450 [ 15.545699] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.545722] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.545745] ? trace_hardirqs_on+0x37/0xe0 [ 15.545767] ? kasan_atomics+0x152/0x310 [ 15.545794] kasan_atomics+0x1dc/0x310 [ 15.545816] ? __pfx_kasan_atomics+0x10/0x10 [ 15.545839] ? __pfx_kasan_atomics+0x10/0x10 [ 15.545865] kunit_try_run_case+0x1a5/0x480 [ 15.545889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.545922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.545945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.545968] ? __kthread_parkme+0x82/0x180 [ 15.545988] ? preempt_count_sub+0x50/0x80 [ 15.546011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.546035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.546057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.546081] kthread+0x337/0x6f0 [ 15.546101] ? trace_preempt_on+0x20/0xc0 [ 15.546122] ? __pfx_kthread+0x10/0x10 [ 15.546143] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.546164] ? calculate_sigpending+0x7b/0xa0 [ 15.546188] ? __pfx_kthread+0x10/0x10 [ 15.546209] ret_from_fork+0x116/0x1d0 [ 15.546228] ? __pfx_kthread+0x10/0x10 [ 15.546250] ret_from_fork_asm+0x1a/0x30 [ 15.546280] </TASK> [ 15.546291] [ 15.558768] Allocated by task 283: [ 15.559117] kasan_save_stack+0x45/0x70 [ 15.559422] kasan_save_track+0x18/0x40 [ 15.559579] kasan_save_alloc_info+0x3b/0x50 [ 15.559934] __kasan_kmalloc+0xb7/0xc0 [ 15.560210] __kmalloc_cache_noprof+0x189/0x420 [ 15.560417] kasan_atomics+0x95/0x310 [ 15.560601] kunit_try_run_case+0x1a5/0x480 [ 15.561019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.561359] kthread+0x337/0x6f0 [ 15.561528] ret_from_fork+0x116/0x1d0 [ 15.561879] ret_from_fork_asm+0x1a/0x30 [ 15.562186] [ 15.562265] The buggy address belongs to the object at ffff888102744f80 [ 15.562265] which belongs to the cache kmalloc-64 of size 64 [ 15.563094] The buggy address is located 0 bytes to the right of [ 15.563094] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.563755] [ 15.563840] The buggy address belongs to the physical page: [ 15.564234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.564662] flags: 0x200000000000000(node=0|zone=2) [ 15.565012] page_type: f5(slab) [ 15.565165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.565504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.566077] page dumped because: kasan: bad access detected [ 15.566274] [ 15.566521] Memory state around the buggy address: [ 15.566863] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.567318] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.567701] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.568099] ^ [ 15.568425] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.568813] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569184] ================================================================== [ 15.161102] ================================================================== [ 15.161803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.162099] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.162326] [ 15.162408] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.162449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.162462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.162482] Call Trace: [ 15.162496] <TASK> [ 15.162509] dump_stack_lvl+0x73/0xb0 [ 15.162536] print_report+0xd1/0x610 [ 15.162557] ? __virt_addr_valid+0x1db/0x2d0 [ 15.162581] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.162601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.162623] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.162645] kasan_report+0x141/0x180 [ 15.162666] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.162692] kasan_check_range+0x10c/0x1c0 [ 15.162715] __kasan_check_write+0x18/0x20 [ 15.162735] kasan_atomics_helper+0xa2b/0x5450 [ 15.162757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.162787] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.162811] ? trace_hardirqs_on+0x37/0xe0 [ 15.162833] ? kasan_atomics+0x152/0x310 [ 15.162859] kasan_atomics+0x1dc/0x310 [ 15.162882] ? __pfx_kasan_atomics+0x10/0x10 [ 15.162916] ? __pfx_kasan_atomics+0x10/0x10 [ 15.162943] kunit_try_run_case+0x1a5/0x480 [ 15.162967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.162989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.163012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.163036] ? __kthread_parkme+0x82/0x180 [ 15.163062] ? preempt_count_sub+0x50/0x80 [ 15.163086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.163109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.163134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.163160] kthread+0x337/0x6f0 [ 15.163182] ? trace_preempt_on+0x20/0xc0 [ 15.163205] ? __pfx_kthread+0x10/0x10 [ 15.163225] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.163246] ? calculate_sigpending+0x7b/0xa0 [ 15.163270] ? __pfx_kthread+0x10/0x10 [ 15.163293] ret_from_fork+0x116/0x1d0 [ 15.163311] ? __pfx_kthread+0x10/0x10 [ 15.163331] ret_from_fork_asm+0x1a/0x30 [ 15.163373] </TASK> [ 15.163384] [ 15.171660] Allocated by task 283: [ 15.171789] kasan_save_stack+0x45/0x70 [ 15.172107] kasan_save_track+0x18/0x40 [ 15.172306] kasan_save_alloc_info+0x3b/0x50 [ 15.172517] __kasan_kmalloc+0xb7/0xc0 [ 15.172702] __kmalloc_cache_noprof+0x189/0x420 [ 15.172985] kasan_atomics+0x95/0x310 [ 15.173294] kunit_try_run_case+0x1a5/0x480 [ 15.173440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.173615] kthread+0x337/0x6f0 [ 15.173735] ret_from_fork+0x116/0x1d0 [ 15.173866] ret_from_fork_asm+0x1a/0x30 [ 15.174025] [ 15.174095] The buggy address belongs to the object at ffff888102744f80 [ 15.174095] which belongs to the cache kmalloc-64 of size 64 [ 15.175254] The buggy address is located 0 bytes to the right of [ 15.175254] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.175806] [ 15.175936] The buggy address belongs to the physical page: [ 15.176215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.176853] flags: 0x200000000000000(node=0|zone=2) [ 15.177040] page_type: f5(slab) [ 15.177209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.177479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.177706] page dumped because: kasan: bad access detected [ 15.177878] [ 15.177957] Memory state around the buggy address: [ 15.178113] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.178331] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.178547] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.178764] ^ [ 15.178948] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.179274] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179588] ================================================================== [ 16.138815] ================================================================== [ 16.139158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.139766] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.140220] [ 16.140349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.140410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.140423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.140444] Call Trace: [ 16.140461] <TASK> [ 16.140476] dump_stack_lvl+0x73/0xb0 [ 16.140506] print_report+0xd1/0x610 [ 16.140528] ? __virt_addr_valid+0x1db/0x2d0 [ 16.140550] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.140571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.140594] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.140616] kasan_report+0x141/0x180 [ 16.140637] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.140664] __asan_report_load8_noabort+0x18/0x20 [ 16.140688] kasan_atomics_helper+0x4fb2/0x5450 [ 16.140710] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.140732] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.140755] ? trace_hardirqs_on+0x37/0xe0 [ 16.140777] ? kasan_atomics+0x152/0x310 [ 16.140803] kasan_atomics+0x1dc/0x310 [ 16.140826] ? __pfx_kasan_atomics+0x10/0x10 [ 16.140849] ? __pfx_kasan_atomics+0x10/0x10 [ 16.140876] kunit_try_run_case+0x1a5/0x480 [ 16.140900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.140934] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.140957] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.140981] ? __kthread_parkme+0x82/0x180 [ 16.141001] ? preempt_count_sub+0x50/0x80 [ 16.141024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.141048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.141071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.141094] kthread+0x337/0x6f0 [ 16.141114] ? trace_preempt_on+0x20/0xc0 [ 16.141136] ? __pfx_kthread+0x10/0x10 [ 16.141156] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.141177] ? calculate_sigpending+0x7b/0xa0 [ 16.141201] ? __pfx_kthread+0x10/0x10 [ 16.141223] ret_from_fork+0x116/0x1d0 [ 16.141241] ? __pfx_kthread+0x10/0x10 [ 16.141261] ret_from_fork_asm+0x1a/0x30 [ 16.141292] </TASK> [ 16.141303] [ 16.149064] Allocated by task 283: [ 16.149245] kasan_save_stack+0x45/0x70 [ 16.149407] kasan_save_track+0x18/0x40 [ 16.149582] kasan_save_alloc_info+0x3b/0x50 [ 16.149875] __kasan_kmalloc+0xb7/0xc0 [ 16.150076] __kmalloc_cache_noprof+0x189/0x420 [ 16.150290] kasan_atomics+0x95/0x310 [ 16.150428] kunit_try_run_case+0x1a5/0x480 [ 16.150615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.151012] kthread+0x337/0x6f0 [ 16.151191] ret_from_fork+0x116/0x1d0 [ 16.151355] ret_from_fork_asm+0x1a/0x30 [ 16.151572] [ 16.151667] The buggy address belongs to the object at ffff888102744f80 [ 16.151667] which belongs to the cache kmalloc-64 of size 64 [ 16.152152] The buggy address is located 0 bytes to the right of [ 16.152152] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.152724] [ 16.152830] The buggy address belongs to the physical page: [ 16.153108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.153465] flags: 0x200000000000000(node=0|zone=2) [ 16.153696] page_type: f5(slab) [ 16.153863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.154209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.154545] page dumped because: kasan: bad access detected [ 16.154931] [ 16.155003] Memory state around the buggy address: [ 16.155163] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.155460] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.155891] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.156193] ^ [ 16.156388] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.156693] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.157005] ================================================================== [ 15.803944] ================================================================== [ 15.804581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.805229] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.805859] [ 15.806043] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.806088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.806100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.806121] Call Trace: [ 15.806137] <TASK> [ 15.806152] dump_stack_lvl+0x73/0xb0 [ 15.806180] print_report+0xd1/0x610 [ 15.806201] ? __virt_addr_valid+0x1db/0x2d0 [ 15.806223] ? kasan_atomics_helper+0x194a/0x5450 [ 15.806244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.806266] ? kasan_atomics_helper+0x194a/0x5450 [ 15.806287] kasan_report+0x141/0x180 [ 15.806309] ? kasan_atomics_helper+0x194a/0x5450 [ 15.806335] kasan_check_range+0x10c/0x1c0 [ 15.806359] __kasan_check_write+0x18/0x20 [ 15.806378] kasan_atomics_helper+0x194a/0x5450 [ 15.806400] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.806422] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.806446] ? trace_hardirqs_on+0x37/0xe0 [ 15.806467] ? kasan_atomics+0x152/0x310 [ 15.806494] kasan_atomics+0x1dc/0x310 [ 15.806516] ? __pfx_kasan_atomics+0x10/0x10 [ 15.806540] ? __pfx_kasan_atomics+0x10/0x10 [ 15.806567] kunit_try_run_case+0x1a5/0x480 [ 15.806592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.806615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.806638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.806661] ? __kthread_parkme+0x82/0x180 [ 15.806704] ? preempt_count_sub+0x50/0x80 [ 15.806727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.806752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.806775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.806798] kthread+0x337/0x6f0 [ 15.806818] ? trace_preempt_on+0x20/0xc0 [ 15.806840] ? __pfx_kthread+0x10/0x10 [ 15.806861] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.806882] ? calculate_sigpending+0x7b/0xa0 [ 15.806914] ? __pfx_kthread+0x10/0x10 [ 15.806936] ret_from_fork+0x116/0x1d0 [ 15.806954] ? __pfx_kthread+0x10/0x10 [ 15.806975] ret_from_fork_asm+0x1a/0x30 [ 15.807006] </TASK> [ 15.807016] [ 15.819643] Allocated by task 283: [ 15.820000] kasan_save_stack+0x45/0x70 [ 15.820352] kasan_save_track+0x18/0x40 [ 15.820721] kasan_save_alloc_info+0x3b/0x50 [ 15.821080] __kasan_kmalloc+0xb7/0xc0 [ 15.821214] __kmalloc_cache_noprof+0x189/0x420 [ 15.821369] kasan_atomics+0x95/0x310 [ 15.821503] kunit_try_run_case+0x1a5/0x480 [ 15.821651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822139] kthread+0x337/0x6f0 [ 15.822440] ret_from_fork+0x116/0x1d0 [ 15.822817] ret_from_fork_asm+0x1a/0x30 [ 15.823188] [ 15.823345] The buggy address belongs to the object at ffff888102744f80 [ 15.823345] which belongs to the cache kmalloc-64 of size 64 [ 15.824398] The buggy address is located 0 bytes to the right of [ 15.824398] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.825342] [ 15.825416] The buggy address belongs to the physical page: [ 15.825591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.825839] flags: 0x200000000000000(node=0|zone=2) [ 15.826017] page_type: f5(slab) [ 15.826139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.826486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.826788] page dumped because: kasan: bad access detected [ 15.826999] [ 15.827097] Memory state around the buggy address: [ 15.827330] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.827652] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.827928] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.828201] ^ [ 15.828423] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.828723] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.829010] ================================================================== [ 15.776507] ================================================================== [ 15.777043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.777737] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.778356] [ 15.778529] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.778573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.778585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.778606] Call Trace: [ 15.778621] <TASK> [ 15.778636] dump_stack_lvl+0x73/0xb0 [ 15.778686] print_report+0xd1/0x610 [ 15.778709] ? __virt_addr_valid+0x1db/0x2d0 [ 15.778731] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.778752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.778775] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.778796] kasan_report+0x141/0x180 [ 15.778818] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.778844] kasan_check_range+0x10c/0x1c0 [ 15.778868] __kasan_check_write+0x18/0x20 [ 15.778886] kasan_atomics_helper+0x18b1/0x5450 [ 15.778919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.778940] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.778964] ? trace_hardirqs_on+0x37/0xe0 [ 15.778986] ? kasan_atomics+0x152/0x310 [ 15.779012] kasan_atomics+0x1dc/0x310 [ 15.779035] ? __pfx_kasan_atomics+0x10/0x10 [ 15.779062] ? __pfx_kasan_atomics+0x10/0x10 [ 15.779089] kunit_try_run_case+0x1a5/0x480 [ 15.779113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.779135] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.779159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.779183] ? __kthread_parkme+0x82/0x180 [ 15.779203] ? preempt_count_sub+0x50/0x80 [ 15.779227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.779251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.779274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.779298] kthread+0x337/0x6f0 [ 15.779317] ? trace_preempt_on+0x20/0xc0 [ 15.779338] ? __pfx_kthread+0x10/0x10 [ 15.779359] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.779381] ? calculate_sigpending+0x7b/0xa0 [ 15.779404] ? __pfx_kthread+0x10/0x10 [ 15.779426] ret_from_fork+0x116/0x1d0 [ 15.779444] ? __pfx_kthread+0x10/0x10 [ 15.779465] ret_from_fork_asm+0x1a/0x30 [ 15.779496] </TASK> [ 15.779507] [ 15.791496] Allocated by task 283: [ 15.791834] kasan_save_stack+0x45/0x70 [ 15.792191] kasan_save_track+0x18/0x40 [ 15.792528] kasan_save_alloc_info+0x3b/0x50 [ 15.792936] __kasan_kmalloc+0xb7/0xc0 [ 15.793264] __kmalloc_cache_noprof+0x189/0x420 [ 15.793678] kasan_atomics+0x95/0x310 [ 15.794021] kunit_try_run_case+0x1a5/0x480 [ 15.794397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.794874] kthread+0x337/0x6f0 [ 15.795182] ret_from_fork+0x116/0x1d0 [ 15.795512] ret_from_fork_asm+0x1a/0x30 [ 15.795860] [ 15.795945] The buggy address belongs to the object at ffff888102744f80 [ 15.795945] which belongs to the cache kmalloc-64 of size 64 [ 15.796299] The buggy address is located 0 bytes to the right of [ 15.796299] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.796688] [ 15.796848] The buggy address belongs to the physical page: [ 15.797326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.798019] flags: 0x200000000000000(node=0|zone=2) [ 15.798440] page_type: f5(slab) [ 15.798751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.799408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.800086] page dumped because: kasan: bad access detected [ 15.800567] [ 15.800743] Memory state around the buggy address: [ 15.801162] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.801733] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.801961] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.802176] ^ [ 15.802330] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.802545] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802968] ================================================================== [ 16.196062] ================================================================== [ 16.196590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.196983] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.197303] [ 16.197430] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.197473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.197486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.197507] Call Trace: [ 16.197521] <TASK> [ 16.197536] dump_stack_lvl+0x73/0xb0 [ 16.197563] print_report+0xd1/0x610 [ 16.197585] ? __virt_addr_valid+0x1db/0x2d0 [ 16.197607] ? kasan_atomics_helper+0x224c/0x5450 [ 16.197628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.197651] ? kasan_atomics_helper+0x224c/0x5450 [ 16.197700] kasan_report+0x141/0x180 [ 16.197722] ? kasan_atomics_helper+0x224c/0x5450 [ 16.197749] kasan_check_range+0x10c/0x1c0 [ 16.197790] __kasan_check_write+0x18/0x20 [ 16.197809] kasan_atomics_helper+0x224c/0x5450 [ 16.197832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.197854] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.197878] ? trace_hardirqs_on+0x37/0xe0 [ 16.197900] ? kasan_atomics+0x152/0x310 [ 16.197940] kasan_atomics+0x1dc/0x310 [ 16.197981] ? __pfx_kasan_atomics+0x10/0x10 [ 16.198005] ? __pfx_kasan_atomics+0x10/0x10 [ 16.198032] kunit_try_run_case+0x1a5/0x480 [ 16.198055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.198078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.198101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.198142] ? __kthread_parkme+0x82/0x180 [ 16.198162] ? preempt_count_sub+0x50/0x80 [ 16.198199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.198238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.198274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.198311] kthread+0x337/0x6f0 [ 16.198331] ? trace_preempt_on+0x20/0xc0 [ 16.198366] ? __pfx_kthread+0x10/0x10 [ 16.198400] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.198435] ? calculate_sigpending+0x7b/0xa0 [ 16.198472] ? __pfx_kthread+0x10/0x10 [ 16.198507] ret_from_fork+0x116/0x1d0 [ 16.198539] ? __pfx_kthread+0x10/0x10 [ 16.198574] ret_from_fork_asm+0x1a/0x30 [ 16.198617] </TASK> [ 16.198640] [ 16.206284] Allocated by task 283: [ 16.206470] kasan_save_stack+0x45/0x70 [ 16.206667] kasan_save_track+0x18/0x40 [ 16.206869] kasan_save_alloc_info+0x3b/0x50 [ 16.207096] __kasan_kmalloc+0xb7/0xc0 [ 16.207243] __kmalloc_cache_noprof+0x189/0x420 [ 16.207427] kasan_atomics+0x95/0x310 [ 16.207641] kunit_try_run_case+0x1a5/0x480 [ 16.207886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.208146] kthread+0x337/0x6f0 [ 16.208298] ret_from_fork+0x116/0x1d0 [ 16.208500] ret_from_fork_asm+0x1a/0x30 [ 16.208710] [ 16.208807] The buggy address belongs to the object at ffff888102744f80 [ 16.208807] which belongs to the cache kmalloc-64 of size 64 [ 16.209340] The buggy address is located 0 bytes to the right of [ 16.209340] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.209837] [ 16.209919] The buggy address belongs to the physical page: [ 16.210407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.210848] flags: 0x200000000000000(node=0|zone=2) [ 16.211128] page_type: f5(slab) [ 16.211299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.211623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.211975] page dumped because: kasan: bad access detected [ 16.212157] [ 16.212227] Memory state around the buggy address: [ 16.212457] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.212812] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.213145] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.213448] ^ [ 16.213632] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.214147] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.214468] ================================================================== [ 15.022356] ================================================================== [ 15.022598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.022826] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.023144] [ 15.023253] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.023295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.023307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.023329] Call Trace: [ 15.023342] <TASK> [ 15.023357] dump_stack_lvl+0x73/0xb0 [ 15.023384] print_report+0xd1/0x610 [ 15.023420] ? __virt_addr_valid+0x1db/0x2d0 [ 15.023442] ? kasan_atomics_helper+0x72f/0x5450 [ 15.023463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.023486] ? kasan_atomics_helper+0x72f/0x5450 [ 15.023508] kasan_report+0x141/0x180 [ 15.023531] ? kasan_atomics_helper+0x72f/0x5450 [ 15.023557] kasan_check_range+0x10c/0x1c0 [ 15.023581] __kasan_check_write+0x18/0x20 [ 15.023600] kasan_atomics_helper+0x72f/0x5450 [ 15.023623] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.023645] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.023668] ? trace_hardirqs_on+0x37/0xe0 [ 15.023698] ? kasan_atomics+0x152/0x310 [ 15.023725] kasan_atomics+0x1dc/0x310 [ 15.023747] ? __pfx_kasan_atomics+0x10/0x10 [ 15.023769] ? __pfx_kasan_atomics+0x10/0x10 [ 15.023797] kunit_try_run_case+0x1a5/0x480 [ 15.023820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.023867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.023890] ? __kthread_parkme+0x82/0x180 [ 15.023921] ? preempt_count_sub+0x50/0x80 [ 15.023943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.023990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.024014] kthread+0x337/0x6f0 [ 15.024033] ? trace_preempt_on+0x20/0xc0 [ 15.024055] ? __pfx_kthread+0x10/0x10 [ 15.024075] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.024097] ? calculate_sigpending+0x7b/0xa0 [ 15.024121] ? __pfx_kthread+0x10/0x10 [ 15.024142] ret_from_fork+0x116/0x1d0 [ 15.024161] ? __pfx_kthread+0x10/0x10 [ 15.024181] ret_from_fork_asm+0x1a/0x30 [ 15.024212] </TASK> [ 15.024222] [ 15.036154] Allocated by task 283: [ 15.036302] kasan_save_stack+0x45/0x70 [ 15.037165] kasan_save_track+0x18/0x40 [ 15.038023] kasan_save_alloc_info+0x3b/0x50 [ 15.038238] __kasan_kmalloc+0xb7/0xc0 [ 15.038735] __kmalloc_cache_noprof+0x189/0x420 [ 15.039356] kasan_atomics+0x95/0x310 [ 15.039794] kunit_try_run_case+0x1a5/0x480 [ 15.040581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.041213] kthread+0x337/0x6f0 [ 15.041680] ret_from_fork+0x116/0x1d0 [ 15.041829] ret_from_fork_asm+0x1a/0x30 [ 15.042401] [ 15.042751] The buggy address belongs to the object at ffff888102744f80 [ 15.042751] which belongs to the cache kmalloc-64 of size 64 [ 15.044074] The buggy address is located 0 bytes to the right of [ 15.044074] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.044726] [ 15.045001] The buggy address belongs to the physical page: [ 15.045776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.046772] flags: 0x200000000000000(node=0|zone=2) [ 15.047512] page_type: f5(slab) [ 15.048124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.048373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.049193] page dumped because: kasan: bad access detected [ 15.049844] [ 15.050052] Memory state around the buggy address: [ 15.050700] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.051264] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.051817] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.052216] ^ [ 15.052401] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.053157] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.053655] ================================================================== [ 15.953039] ================================================================== [ 15.953756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.954133] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.954476] [ 15.954584] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.954627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.954639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.954660] Call Trace: [ 15.954697] <TASK> [ 15.954712] dump_stack_lvl+0x73/0xb0 [ 15.954739] print_report+0xd1/0x610 [ 15.954762] ? __virt_addr_valid+0x1db/0x2d0 [ 15.954784] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.954805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.954826] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.954848] kasan_report+0x141/0x180 [ 15.954870] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.954896] kasan_check_range+0x10c/0x1c0 [ 15.954928] __kasan_check_write+0x18/0x20 [ 15.954948] kasan_atomics_helper+0x1d7a/0x5450 [ 15.954970] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.954992] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.955016] ? trace_hardirqs_on+0x37/0xe0 [ 15.955037] ? kasan_atomics+0x152/0x310 [ 15.955070] kasan_atomics+0x1dc/0x310 [ 15.955092] ? __pfx_kasan_atomics+0x10/0x10 [ 15.955115] ? __pfx_kasan_atomics+0x10/0x10 [ 15.955141] kunit_try_run_case+0x1a5/0x480 [ 15.955166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.955189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.955211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.955234] ? __kthread_parkme+0x82/0x180 [ 15.955254] ? preempt_count_sub+0x50/0x80 [ 15.955277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.955301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.955324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.955348] kthread+0x337/0x6f0 [ 15.955367] ? trace_preempt_on+0x20/0xc0 [ 15.955388] ? __pfx_kthread+0x10/0x10 [ 15.955409] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.955430] ? calculate_sigpending+0x7b/0xa0 [ 15.955453] ? __pfx_kthread+0x10/0x10 [ 15.955474] ret_from_fork+0x116/0x1d0 [ 15.955492] ? __pfx_kthread+0x10/0x10 [ 15.955512] ret_from_fork_asm+0x1a/0x30 [ 15.955543] </TASK> [ 15.955553] [ 15.962731] Allocated by task 283: [ 15.962915] kasan_save_stack+0x45/0x70 [ 15.963114] kasan_save_track+0x18/0x40 [ 15.963305] kasan_save_alloc_info+0x3b/0x50 [ 15.963513] __kasan_kmalloc+0xb7/0xc0 [ 15.963725] __kmalloc_cache_noprof+0x189/0x420 [ 15.963956] kasan_atomics+0x95/0x310 [ 15.964133] kunit_try_run_case+0x1a5/0x480 [ 15.964280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964456] kthread+0x337/0x6f0 [ 15.964603] ret_from_fork+0x116/0x1d0 [ 15.964821] ret_from_fork_asm+0x1a/0x30 [ 15.965037] [ 15.965134] The buggy address belongs to the object at ffff888102744f80 [ 15.965134] which belongs to the cache kmalloc-64 of size 64 [ 15.965633] The buggy address is located 0 bytes to the right of [ 15.965633] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.966047] [ 15.966120] The buggy address belongs to the physical page: [ 15.966293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.966535] flags: 0x200000000000000(node=0|zone=2) [ 15.966771] page_type: f5(slab) [ 15.966945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.967293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.967625] page dumped because: kasan: bad access detected [ 15.967900] [ 15.968002] Memory state around the buggy address: [ 15.968223] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968460] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968694] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.968987] ^ [ 15.969211] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.969526] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969869] ================================================================== [ 15.490634] ================================================================== [ 15.491357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.491655] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.491976] [ 15.492072] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.492115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.492128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.492149] Call Trace: [ 15.492163] <TASK> [ 15.492178] dump_stack_lvl+0x73/0xb0 [ 15.492205] print_report+0xd1/0x610 [ 15.492227] ? __virt_addr_valid+0x1db/0x2d0 [ 15.492250] ? kasan_atomics_helper+0x1217/0x5450 [ 15.492270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.492292] ? kasan_atomics_helper+0x1217/0x5450 [ 15.492314] kasan_report+0x141/0x180 [ 15.492337] ? kasan_atomics_helper+0x1217/0x5450 [ 15.492364] kasan_check_range+0x10c/0x1c0 [ 15.492387] __kasan_check_write+0x18/0x20 [ 15.492406] kasan_atomics_helper+0x1217/0x5450 [ 15.492429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.492450] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.492475] ? trace_hardirqs_on+0x37/0xe0 [ 15.492498] ? kasan_atomics+0x152/0x310 [ 15.492524] kasan_atomics+0x1dc/0x310 [ 15.492548] ? __pfx_kasan_atomics+0x10/0x10 [ 15.492570] ? __pfx_kasan_atomics+0x10/0x10 [ 15.492597] kunit_try_run_case+0x1a5/0x480 [ 15.492621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.492644] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.492668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.492702] ? __kthread_parkme+0x82/0x180 [ 15.492723] ? preempt_count_sub+0x50/0x80 [ 15.492746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.492771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.492794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.492817] kthread+0x337/0x6f0 [ 15.492837] ? trace_preempt_on+0x20/0xc0 [ 15.492858] ? __pfx_kthread+0x10/0x10 [ 15.492880] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.492900] ? calculate_sigpending+0x7b/0xa0 [ 15.492954] ? __pfx_kthread+0x10/0x10 [ 15.492976] ret_from_fork+0x116/0x1d0 [ 15.492995] ? __pfx_kthread+0x10/0x10 [ 15.493015] ret_from_fork_asm+0x1a/0x30 [ 15.493045] </TASK> [ 15.493057] [ 15.500634] Allocated by task 283: [ 15.500814] kasan_save_stack+0x45/0x70 [ 15.500975] kasan_save_track+0x18/0x40 [ 15.501169] kasan_save_alloc_info+0x3b/0x50 [ 15.501380] __kasan_kmalloc+0xb7/0xc0 [ 15.501550] __kmalloc_cache_noprof+0x189/0x420 [ 15.501765] kasan_atomics+0x95/0x310 [ 15.501900] kunit_try_run_case+0x1a5/0x480 [ 15.502058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.502236] kthread+0x337/0x6f0 [ 15.502357] ret_from_fork+0x116/0x1d0 [ 15.502488] ret_from_fork_asm+0x1a/0x30 [ 15.502630] [ 15.502700] The buggy address belongs to the object at ffff888102744f80 [ 15.502700] which belongs to the cache kmalloc-64 of size 64 [ 15.503135] The buggy address is located 0 bytes to the right of [ 15.503135] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.504155] [ 15.504252] The buggy address belongs to the physical page: [ 15.504479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.504719] flags: 0x200000000000000(node=0|zone=2) [ 15.504882] page_type: f5(slab) [ 15.505010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.505241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.505467] page dumped because: kasan: bad access detected [ 15.505981] [ 15.506076] Memory state around the buggy address: [ 15.506303] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.506625] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.507303] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.507628] ^ [ 15.508095] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.508423] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.508791] ================================================================== [ 15.650014] ================================================================== [ 15.650662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.651146] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.651672] [ 15.651782] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.651825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.651837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.651981] Call Trace: [ 15.651996] <TASK> [ 15.652013] dump_stack_lvl+0x73/0xb0 [ 15.652042] print_report+0xd1/0x610 [ 15.652065] ? __virt_addr_valid+0x1db/0x2d0 [ 15.652086] ? kasan_atomics_helper+0x151d/0x5450 [ 15.652108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.652130] ? kasan_atomics_helper+0x151d/0x5450 [ 15.652152] kasan_report+0x141/0x180 [ 15.652174] ? kasan_atomics_helper+0x151d/0x5450 [ 15.652200] kasan_check_range+0x10c/0x1c0 [ 15.652224] __kasan_check_write+0x18/0x20 [ 15.652243] kasan_atomics_helper+0x151d/0x5450 [ 15.652266] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.652289] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.652313] ? trace_hardirqs_on+0x37/0xe0 [ 15.652335] ? kasan_atomics+0x152/0x310 [ 15.652362] kasan_atomics+0x1dc/0x310 [ 15.652384] ? __pfx_kasan_atomics+0x10/0x10 [ 15.652408] ? __pfx_kasan_atomics+0x10/0x10 [ 15.652435] kunit_try_run_case+0x1a5/0x480 [ 15.652459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.652481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.652505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.652529] ? __kthread_parkme+0x82/0x180 [ 15.652548] ? preempt_count_sub+0x50/0x80 [ 15.652571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.652595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.652618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.652641] kthread+0x337/0x6f0 [ 15.652661] ? trace_preempt_on+0x20/0xc0 [ 15.652849] ? __pfx_kthread+0x10/0x10 [ 15.652871] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.652892] ? calculate_sigpending+0x7b/0xa0 [ 15.652927] ? __pfx_kthread+0x10/0x10 [ 15.652948] ret_from_fork+0x116/0x1d0 [ 15.652967] ? __pfx_kthread+0x10/0x10 [ 15.652987] ret_from_fork_asm+0x1a/0x30 [ 15.653018] </TASK> [ 15.653029] [ 15.662669] Allocated by task 283: [ 15.662990] kasan_save_stack+0x45/0x70 [ 15.663340] kasan_save_track+0x18/0x40 [ 15.663524] kasan_save_alloc_info+0x3b/0x50 [ 15.663941] __kasan_kmalloc+0xb7/0xc0 [ 15.664128] __kmalloc_cache_noprof+0x189/0x420 [ 15.664406] kasan_atomics+0x95/0x310 [ 15.664567] kunit_try_run_case+0x1a5/0x480 [ 15.664794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.665253] kthread+0x337/0x6f0 [ 15.665572] ret_from_fork+0x116/0x1d0 [ 15.665758] ret_from_fork_asm+0x1a/0x30 [ 15.665980] [ 15.666078] The buggy address belongs to the object at ffff888102744f80 [ 15.666078] which belongs to the cache kmalloc-64 of size 64 [ 15.666564] The buggy address is located 0 bytes to the right of [ 15.666564] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.667412] [ 15.667503] The buggy address belongs to the physical page: [ 15.667877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.668317] flags: 0x200000000000000(node=0|zone=2) [ 15.668498] page_type: f5(slab) [ 15.668793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.669184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.669494] page dumped because: kasan: bad access detected [ 15.669722] [ 15.669818] Memory state around the buggy address: [ 15.670020] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.670290] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.670603] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.670853] ^ [ 15.671106] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.671474] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.671770] ================================================================== [ 14.804810] ================================================================== [ 14.805057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.805445] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.805771] [ 14.805880] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.805930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.805941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.805961] Call Trace: [ 14.805973] <TASK> [ 14.805986] dump_stack_lvl+0x73/0xb0 [ 14.806011] print_report+0xd1/0x610 [ 14.806031] ? __virt_addr_valid+0x1db/0x2d0 [ 14.806052] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.806072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.806093] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.806114] kasan_report+0x141/0x180 [ 14.806136] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.806163] __asan_report_load4_noabort+0x18/0x20 [ 14.806186] kasan_atomics_helper+0x4b88/0x5450 [ 14.806207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.806228] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.806251] ? trace_hardirqs_on+0x37/0xe0 [ 14.806271] ? kasan_atomics+0x152/0x310 [ 14.806297] kasan_atomics+0x1dc/0x310 [ 14.806318] ? __pfx_kasan_atomics+0x10/0x10 [ 14.806340] ? __pfx_kasan_atomics+0x10/0x10 [ 14.806365] kunit_try_run_case+0x1a5/0x480 [ 14.806389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.806511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.806535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.806576] ? __kthread_parkme+0x82/0x180 [ 14.806597] ? preempt_count_sub+0x50/0x80 [ 14.806621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.806644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.806667] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.806691] kthread+0x337/0x6f0 [ 14.806710] ? trace_preempt_on+0x20/0xc0 [ 14.806732] ? __pfx_kthread+0x10/0x10 [ 14.806753] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.806774] ? calculate_sigpending+0x7b/0xa0 [ 14.806797] ? __pfx_kthread+0x10/0x10 [ 14.806819] ret_from_fork+0x116/0x1d0 [ 14.806837] ? __pfx_kthread+0x10/0x10 [ 14.806857] ret_from_fork_asm+0x1a/0x30 [ 14.806888] </TASK> [ 14.806899] [ 14.815227] Allocated by task 283: [ 14.815415] kasan_save_stack+0x45/0x70 [ 14.815635] kasan_save_track+0x18/0x40 [ 14.816037] kasan_save_alloc_info+0x3b/0x50 [ 14.816207] __kasan_kmalloc+0xb7/0xc0 [ 14.816361] __kmalloc_cache_noprof+0x189/0x420 [ 14.816619] kasan_atomics+0x95/0x310 [ 14.817027] kunit_try_run_case+0x1a5/0x480 [ 14.817195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.817372] kthread+0x337/0x6f0 [ 14.817494] ret_from_fork+0x116/0x1d0 [ 14.817628] ret_from_fork_asm+0x1a/0x30 [ 14.817768] [ 14.817842] The buggy address belongs to the object at ffff888102744f80 [ 14.817842] which belongs to the cache kmalloc-64 of size 64 [ 14.818211] The buggy address is located 0 bytes to the right of [ 14.818211] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.818622] [ 14.818722] The buggy address belongs to the physical page: [ 14.818986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.819342] flags: 0x200000000000000(node=0|zone=2) [ 14.819572] page_type: f5(slab) [ 14.819736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.820099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.820432] page dumped because: kasan: bad access detected [ 14.820846] [ 14.820970] Memory state around the buggy address: [ 14.821143] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.821426] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.821867] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.822193] ^ [ 14.822459] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.822771] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.823067] ================================================================== [ 15.829791] ================================================================== [ 15.830135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.831006] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.831351] [ 15.831460] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.831502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.831515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.831535] Call Trace: [ 15.831551] <TASK> [ 15.831565] dump_stack_lvl+0x73/0xb0 [ 15.831594] print_report+0xd1/0x610 [ 15.831617] ? __virt_addr_valid+0x1db/0x2d0 [ 15.831638] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.831740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.831762] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.831784] kasan_report+0x141/0x180 [ 15.831806] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.831832] kasan_check_range+0x10c/0x1c0 [ 15.831856] __kasan_check_write+0x18/0x20 [ 15.831875] kasan_atomics_helper+0x19e3/0x5450 [ 15.831898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.831931] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.831955] ? trace_hardirqs_on+0x37/0xe0 [ 15.831977] ? kasan_atomics+0x152/0x310 [ 15.832003] kasan_atomics+0x1dc/0x310 [ 15.832027] ? __pfx_kasan_atomics+0x10/0x10 [ 15.832050] ? __pfx_kasan_atomics+0x10/0x10 [ 15.832076] kunit_try_run_case+0x1a5/0x480 [ 15.832100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.832146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.832169] ? __kthread_parkme+0x82/0x180 [ 15.832189] ? preempt_count_sub+0x50/0x80 [ 15.832212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.832259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.832283] kthread+0x337/0x6f0 [ 15.832303] ? trace_preempt_on+0x20/0xc0 [ 15.832325] ? __pfx_kthread+0x10/0x10 [ 15.832346] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.832368] ? calculate_sigpending+0x7b/0xa0 [ 15.832390] ? __pfx_kthread+0x10/0x10 [ 15.832412] ret_from_fork+0x116/0x1d0 [ 15.832431] ? __pfx_kthread+0x10/0x10 [ 15.832452] ret_from_fork_asm+0x1a/0x30 [ 15.832483] </TASK> [ 15.832494] [ 15.839796] Allocated by task 283: [ 15.839986] kasan_save_stack+0x45/0x70 [ 15.840162] kasan_save_track+0x18/0x40 [ 15.840314] kasan_save_alloc_info+0x3b/0x50 [ 15.840529] __kasan_kmalloc+0xb7/0xc0 [ 15.840740] __kmalloc_cache_noprof+0x189/0x420 [ 15.840942] kasan_atomics+0x95/0x310 [ 15.841138] kunit_try_run_case+0x1a5/0x480 [ 15.841313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.841489] kthread+0x337/0x6f0 [ 15.841617] ret_from_fork+0x116/0x1d0 [ 15.841829] ret_from_fork_asm+0x1a/0x30 [ 15.842034] [ 15.842129] The buggy address belongs to the object at ffff888102744f80 [ 15.842129] which belongs to the cache kmalloc-64 of size 64 [ 15.842657] The buggy address is located 0 bytes to the right of [ 15.842657] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.843112] [ 15.843206] The buggy address belongs to the physical page: [ 15.843455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.843719] flags: 0x200000000000000(node=0|zone=2) [ 15.843881] page_type: f5(slab) [ 15.844010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.844240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.844572] page dumped because: kasan: bad access detected [ 15.844850] [ 15.844958] Memory state around the buggy address: [ 15.845180] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.845496] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.845795] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.846018] ^ [ 15.846171] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.846394] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.846737] ================================================================== [ 14.937893] ================================================================== [ 14.938313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.938997] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.939573] [ 14.939801] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.939860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.940013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.940037] Call Trace: [ 14.940051] <TASK> [ 14.940078] dump_stack_lvl+0x73/0xb0 [ 14.940112] print_report+0xd1/0x610 [ 14.940165] ? __virt_addr_valid+0x1db/0x2d0 [ 14.940188] ? kasan_atomics_helper+0x565/0x5450 [ 14.940210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.940233] ? kasan_atomics_helper+0x565/0x5450 [ 14.940255] kasan_report+0x141/0x180 [ 14.940277] ? kasan_atomics_helper+0x565/0x5450 [ 14.940304] kasan_check_range+0x10c/0x1c0 [ 14.940327] __kasan_check_write+0x18/0x20 [ 14.940347] kasan_atomics_helper+0x565/0x5450 [ 14.940370] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.940392] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.940416] ? trace_hardirqs_on+0x37/0xe0 [ 14.940439] ? kasan_atomics+0x152/0x310 [ 14.940466] kasan_atomics+0x1dc/0x310 [ 14.940489] ? __pfx_kasan_atomics+0x10/0x10 [ 14.940512] ? __pfx_kasan_atomics+0x10/0x10 [ 14.940538] kunit_try_run_case+0x1a5/0x480 [ 14.940561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.940608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.940631] ? __kthread_parkme+0x82/0x180 [ 14.940651] ? preempt_count_sub+0x50/0x80 [ 14.940674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.940722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.940745] kthread+0x337/0x6f0 [ 14.940764] ? trace_preempt_on+0x20/0xc0 [ 14.940786] ? __pfx_kthread+0x10/0x10 [ 14.940807] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.940828] ? calculate_sigpending+0x7b/0xa0 [ 14.940851] ? __pfx_kthread+0x10/0x10 [ 14.940873] ret_from_fork+0x116/0x1d0 [ 14.940891] ? __pfx_kthread+0x10/0x10 [ 14.940922] ret_from_fork_asm+0x1a/0x30 [ 14.940952] </TASK> [ 14.940963] [ 14.954308] Allocated by task 283: [ 14.954958] kasan_save_stack+0x45/0x70 [ 14.955259] kasan_save_track+0x18/0x40 [ 14.955656] kasan_save_alloc_info+0x3b/0x50 [ 14.955860] __kasan_kmalloc+0xb7/0xc0 [ 14.956042] __kmalloc_cache_noprof+0x189/0x420 [ 14.956231] kasan_atomics+0x95/0x310 [ 14.956754] kunit_try_run_case+0x1a5/0x480 [ 14.957063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.957483] kthread+0x337/0x6f0 [ 14.957915] ret_from_fork+0x116/0x1d0 [ 14.958177] ret_from_fork_asm+0x1a/0x30 [ 14.958598] [ 14.958845] The buggy address belongs to the object at ffff888102744f80 [ 14.958845] which belongs to the cache kmalloc-64 of size 64 [ 14.959354] The buggy address is located 0 bytes to the right of [ 14.959354] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.960313] [ 14.960604] The buggy address belongs to the physical page: [ 14.961089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.961915] flags: 0x200000000000000(node=0|zone=2) [ 14.962325] page_type: f5(slab) [ 14.962636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.963154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.963401] page dumped because: kasan: bad access detected [ 14.963591] [ 14.963666] Memory state around the buggy address: [ 14.963827] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.965014] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.965247] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.965948] ^ [ 14.966463] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.967028] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.967254] ================================================================== [ 15.970486] ================================================================== [ 15.970826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.971147] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.971477] [ 15.971573] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.971615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.971627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.971649] Call Trace: [ 15.971681] <TASK> [ 15.971695] dump_stack_lvl+0x73/0xb0 [ 15.971723] print_report+0xd1/0x610 [ 15.971745] ? __virt_addr_valid+0x1db/0x2d0 [ 15.971768] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.971790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.971813] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.971835] kasan_report+0x141/0x180 [ 15.971857] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.971883] kasan_check_range+0x10c/0x1c0 [ 15.971915] __kasan_check_write+0x18/0x20 [ 15.971934] kasan_atomics_helper+0x1e12/0x5450 [ 15.971956] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.971979] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.972002] ? trace_hardirqs_on+0x37/0xe0 [ 15.972023] ? kasan_atomics+0x152/0x310 [ 15.972050] kasan_atomics+0x1dc/0x310 [ 15.972072] ? __pfx_kasan_atomics+0x10/0x10 [ 15.972096] ? __pfx_kasan_atomics+0x10/0x10 [ 15.972122] kunit_try_run_case+0x1a5/0x480 [ 15.972146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972168] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.972193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.972217] ? __kthread_parkme+0x82/0x180 [ 15.972237] ? preempt_count_sub+0x50/0x80 [ 15.972259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972330] kthread+0x337/0x6f0 [ 15.972349] ? trace_preempt_on+0x20/0xc0 [ 15.972371] ? __pfx_kthread+0x10/0x10 [ 15.972391] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.972413] ? calculate_sigpending+0x7b/0xa0 [ 15.972435] ? __pfx_kthread+0x10/0x10 [ 15.972457] ret_from_fork+0x116/0x1d0 [ 15.972475] ? __pfx_kthread+0x10/0x10 [ 15.972495] ret_from_fork_asm+0x1a/0x30 [ 15.972526] </TASK> [ 15.972537] [ 15.979764] Allocated by task 283: [ 15.979953] kasan_save_stack+0x45/0x70 [ 15.980153] kasan_save_track+0x18/0x40 [ 15.980348] kasan_save_alloc_info+0x3b/0x50 [ 15.980541] __kasan_kmalloc+0xb7/0xc0 [ 15.980717] __kmalloc_cache_noprof+0x189/0x420 [ 15.980952] kasan_atomics+0x95/0x310 [ 15.981114] kunit_try_run_case+0x1a5/0x480 [ 15.981319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.981537] kthread+0x337/0x6f0 [ 15.981708] ret_from_fork+0x116/0x1d0 [ 15.981881] ret_from_fork_asm+0x1a/0x30 [ 15.982071] [ 15.982169] The buggy address belongs to the object at ffff888102744f80 [ 15.982169] which belongs to the cache kmalloc-64 of size 64 [ 15.982647] The buggy address is located 0 bytes to the right of [ 15.982647] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.983160] [ 15.983232] The buggy address belongs to the physical page: [ 15.983404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.983643] flags: 0x200000000000000(node=0|zone=2) [ 15.983824] page_type: f5(slab) [ 15.985767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.986109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.986464] page dumped because: kasan: bad access detected [ 15.986846] [ 15.987319] Memory state around the buggy address: [ 15.987521] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.987819] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.988283] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.988714] ^ [ 15.989028] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.989420] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.989828] ================================================================== [ 15.864473] ================================================================== [ 15.864855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.865161] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.865443] [ 15.865535] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.865582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.865594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.865615] Call Trace: [ 15.865629] <TASK> [ 15.865644] dump_stack_lvl+0x73/0xb0 [ 15.865693] print_report+0xd1/0x610 [ 15.865717] ? __virt_addr_valid+0x1db/0x2d0 [ 15.865739] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.865761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.865783] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.865804] kasan_report+0x141/0x180 [ 15.865827] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.865854] kasan_check_range+0x10c/0x1c0 [ 15.865877] __kasan_check_write+0x18/0x20 [ 15.865896] kasan_atomics_helper+0x1b22/0x5450 [ 15.865927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.865948] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.865972] ? trace_hardirqs_on+0x37/0xe0 [ 15.865993] ? kasan_atomics+0x152/0x310 [ 15.866020] kasan_atomics+0x1dc/0x310 [ 15.866043] ? __pfx_kasan_atomics+0x10/0x10 [ 15.866065] ? __pfx_kasan_atomics+0x10/0x10 [ 15.866092] kunit_try_run_case+0x1a5/0x480 [ 15.866116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.866137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.866161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.866184] ? __kthread_parkme+0x82/0x180 [ 15.866205] ? preempt_count_sub+0x50/0x80 [ 15.866228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.866252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.866275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.866299] kthread+0x337/0x6f0 [ 15.866318] ? trace_preempt_on+0x20/0xc0 [ 15.866339] ? __pfx_kthread+0x10/0x10 [ 15.866361] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.866382] ? calculate_sigpending+0x7b/0xa0 [ 15.866405] ? __pfx_kthread+0x10/0x10 [ 15.866426] ret_from_fork+0x116/0x1d0 [ 15.866445] ? __pfx_kthread+0x10/0x10 [ 15.866466] ret_from_fork_asm+0x1a/0x30 [ 15.866496] </TASK> [ 15.866506] [ 15.873919] Allocated by task 283: [ 15.874097] kasan_save_stack+0x45/0x70 [ 15.874276] kasan_save_track+0x18/0x40 [ 15.874451] kasan_save_alloc_info+0x3b/0x50 [ 15.874635] __kasan_kmalloc+0xb7/0xc0 [ 15.874850] __kmalloc_cache_noprof+0x189/0x420 [ 15.875035] kasan_atomics+0x95/0x310 [ 15.875224] kunit_try_run_case+0x1a5/0x480 [ 15.875370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.875547] kthread+0x337/0x6f0 [ 15.875686] ret_from_fork+0x116/0x1d0 [ 15.875820] ret_from_fork_asm+0x1a/0x30 [ 15.875969] [ 15.876041] The buggy address belongs to the object at ffff888102744f80 [ 15.876041] which belongs to the cache kmalloc-64 of size 64 [ 15.876392] The buggy address is located 0 bytes to the right of [ 15.876392] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.876896] [ 15.877012] The buggy address belongs to the physical page: [ 15.877260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.877609] flags: 0x200000000000000(node=0|zone=2) [ 15.877860] page_type: f5(slab) [ 15.878046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.878391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.878748] page dumped because: kasan: bad access detected [ 15.879009] [ 15.879109] Memory state around the buggy address: [ 15.879332] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.879649] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.879961] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.880202] ^ [ 15.880358] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.880573] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.880814] ================================================================== [ 15.407881] ================================================================== [ 15.408547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.409197] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.409571] [ 15.409711] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.409779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.409803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.409825] Call Trace: [ 15.409836] <TASK> [ 15.409850] dump_stack_lvl+0x73/0xb0 [ 15.409878] print_report+0xd1/0x610 [ 15.409900] ? __virt_addr_valid+0x1db/0x2d0 [ 15.409933] ? kasan_atomics_helper+0x1079/0x5450 [ 15.409969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.409991] ? kasan_atomics_helper+0x1079/0x5450 [ 15.410014] kasan_report+0x141/0x180 [ 15.410036] ? kasan_atomics_helper+0x1079/0x5450 [ 15.410062] kasan_check_range+0x10c/0x1c0 [ 15.410086] __kasan_check_write+0x18/0x20 [ 15.410105] kasan_atomics_helper+0x1079/0x5450 [ 15.410127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.410149] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.410174] ? trace_hardirqs_on+0x37/0xe0 [ 15.410195] ? kasan_atomics+0x152/0x310 [ 15.410221] kasan_atomics+0x1dc/0x310 [ 15.410244] ? __pfx_kasan_atomics+0x10/0x10 [ 15.410267] ? __pfx_kasan_atomics+0x10/0x10 [ 15.410293] kunit_try_run_case+0x1a5/0x480 [ 15.410317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.410340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.410364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.410387] ? __kthread_parkme+0x82/0x180 [ 15.410407] ? preempt_count_sub+0x50/0x80 [ 15.410431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.410455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.410478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.410502] kthread+0x337/0x6f0 [ 15.410521] ? trace_preempt_on+0x20/0xc0 [ 15.410543] ? __pfx_kthread+0x10/0x10 [ 15.410564] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.410585] ? calculate_sigpending+0x7b/0xa0 [ 15.410608] ? __pfx_kthread+0x10/0x10 [ 15.410629] ret_from_fork+0x116/0x1d0 [ 15.410648] ? __pfx_kthread+0x10/0x10 [ 15.410668] ret_from_fork_asm+0x1a/0x30 [ 15.410709] </TASK> [ 15.410720] [ 15.418614] Allocated by task 283: [ 15.418918] kasan_save_stack+0x45/0x70 [ 15.419071] kasan_save_track+0x18/0x40 [ 15.419206] kasan_save_alloc_info+0x3b/0x50 [ 15.419356] __kasan_kmalloc+0xb7/0xc0 [ 15.419545] __kmalloc_cache_noprof+0x189/0x420 [ 15.419857] kasan_atomics+0x95/0x310 [ 15.420071] kunit_try_run_case+0x1a5/0x480 [ 15.420296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.420563] kthread+0x337/0x6f0 [ 15.420796] ret_from_fork+0x116/0x1d0 [ 15.420968] ret_from_fork_asm+0x1a/0x30 [ 15.421180] [ 15.421290] The buggy address belongs to the object at ffff888102744f80 [ 15.421290] which belongs to the cache kmalloc-64 of size 64 [ 15.421806] The buggy address is located 0 bytes to the right of [ 15.421806] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.422353] [ 15.422445] The buggy address belongs to the physical page: [ 15.422687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.423062] flags: 0x200000000000000(node=0|zone=2) [ 15.423288] page_type: f5(slab) [ 15.423452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.423712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.423939] page dumped because: kasan: bad access detected [ 15.424104] [ 15.424184] Memory state around the buggy address: [ 15.424375] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.424670] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.425999] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.426307] ^ [ 15.426464] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.426870] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.427256] ================================================================== [ 15.180548] ================================================================== [ 15.181038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.181668] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.182031] [ 15.182145] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.182187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.182199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.182220] Call Trace: [ 15.182234] <TASK> [ 15.182248] dump_stack_lvl+0x73/0xb0 [ 15.182276] print_report+0xd1/0x610 [ 15.182297] ? __virt_addr_valid+0x1db/0x2d0 [ 15.182319] ? kasan_atomics_helper+0xac7/0x5450 [ 15.182341] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.183305] ? kasan_atomics_helper+0xac7/0x5450 [ 15.183330] kasan_report+0x141/0x180 [ 15.183548] ? kasan_atomics_helper+0xac7/0x5450 [ 15.183580] kasan_check_range+0x10c/0x1c0 [ 15.183605] __kasan_check_write+0x18/0x20 [ 15.183625] kasan_atomics_helper+0xac7/0x5450 [ 15.183647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.183669] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.183706] ? trace_hardirqs_on+0x37/0xe0 [ 15.183728] ? kasan_atomics+0x152/0x310 [ 15.183754] kasan_atomics+0x1dc/0x310 [ 15.183777] ? __pfx_kasan_atomics+0x10/0x10 [ 15.183800] ? __pfx_kasan_atomics+0x10/0x10 [ 15.183827] kunit_try_run_case+0x1a5/0x480 [ 15.183851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183873] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.183896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.183932] ? __kthread_parkme+0x82/0x180 [ 15.183952] ? preempt_count_sub+0x50/0x80 [ 15.183976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.184022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.184045] kthread+0x337/0x6f0 [ 15.184065] ? trace_preempt_on+0x20/0xc0 [ 15.184087] ? __pfx_kthread+0x10/0x10 [ 15.184108] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.184129] ? calculate_sigpending+0x7b/0xa0 [ 15.184152] ? __pfx_kthread+0x10/0x10 [ 15.184173] ret_from_fork+0x116/0x1d0 [ 15.184194] ? __pfx_kthread+0x10/0x10 [ 15.184214] ret_from_fork_asm+0x1a/0x30 [ 15.184245] </TASK> [ 15.184255] [ 15.192806] Allocated by task 283: [ 15.193010] kasan_save_stack+0x45/0x70 [ 15.193188] kasan_save_track+0x18/0x40 [ 15.193443] kasan_save_alloc_info+0x3b/0x50 [ 15.193607] __kasan_kmalloc+0xb7/0xc0 [ 15.193891] __kmalloc_cache_noprof+0x189/0x420 [ 15.194125] kasan_atomics+0x95/0x310 [ 15.194280] kunit_try_run_case+0x1a5/0x480 [ 15.194658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.194920] kthread+0x337/0x6f0 [ 15.195045] ret_from_fork+0x116/0x1d0 [ 15.195182] ret_from_fork_asm+0x1a/0x30 [ 15.195322] [ 15.195444] The buggy address belongs to the object at ffff888102744f80 [ 15.195444] which belongs to the cache kmalloc-64 of size 64 [ 15.196024] The buggy address is located 0 bytes to the right of [ 15.196024] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.196824] [ 15.196927] The buggy address belongs to the physical page: [ 15.197141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.197426] flags: 0x200000000000000(node=0|zone=2) [ 15.197708] page_type: f5(slab) [ 15.197879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.198199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.198496] page dumped because: kasan: bad access detected [ 15.198714] [ 15.198790] Memory state around the buggy address: [ 15.198961] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199187] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199405] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.199619] ^ [ 15.199834] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.200407] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200787] ================================================================== [ 15.140958] ================================================================== [ 15.141749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.142211] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.142718] [ 15.143092] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.143245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.143261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.143286] Call Trace: [ 15.143303] <TASK> [ 15.143320] dump_stack_lvl+0x73/0xb0 [ 15.143370] print_report+0xd1/0x610 [ 15.143395] ? __virt_addr_valid+0x1db/0x2d0 [ 15.143418] ? kasan_atomics_helper+0x992/0x5450 [ 15.143439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.143461] ? kasan_atomics_helper+0x992/0x5450 [ 15.143482] kasan_report+0x141/0x180 [ 15.143504] ? kasan_atomics_helper+0x992/0x5450 [ 15.143532] kasan_check_range+0x10c/0x1c0 [ 15.143555] __kasan_check_write+0x18/0x20 [ 15.143575] kasan_atomics_helper+0x992/0x5450 [ 15.143597] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.143619] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.143642] ? trace_hardirqs_on+0x37/0xe0 [ 15.143664] ? kasan_atomics+0x152/0x310 [ 15.143691] kasan_atomics+0x1dc/0x310 [ 15.143714] ? __pfx_kasan_atomics+0x10/0x10 [ 15.143737] ? __pfx_kasan_atomics+0x10/0x10 [ 15.143764] kunit_try_run_case+0x1a5/0x480 [ 15.143788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.143834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.143858] ? __kthread_parkme+0x82/0x180 [ 15.143878] ? preempt_count_sub+0x50/0x80 [ 15.143902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.143961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.143985] kthread+0x337/0x6f0 [ 15.144005] ? trace_preempt_on+0x20/0xc0 [ 15.144026] ? __pfx_kthread+0x10/0x10 [ 15.144047] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.144068] ? calculate_sigpending+0x7b/0xa0 [ 15.144092] ? __pfx_kthread+0x10/0x10 [ 15.144113] ret_from_fork+0x116/0x1d0 [ 15.144132] ? __pfx_kthread+0x10/0x10 [ 15.144153] ret_from_fork_asm+0x1a/0x30 [ 15.144183] </TASK> [ 15.144194] [ 15.152440] Allocated by task 283: [ 15.152629] kasan_save_stack+0x45/0x70 [ 15.152875] kasan_save_track+0x18/0x40 [ 15.153024] kasan_save_alloc_info+0x3b/0x50 [ 15.153174] __kasan_kmalloc+0xb7/0xc0 [ 15.153307] __kmalloc_cache_noprof+0x189/0x420 [ 15.153463] kasan_atomics+0x95/0x310 [ 15.153597] kunit_try_run_case+0x1a5/0x480 [ 15.153882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.154424] kthread+0x337/0x6f0 [ 15.154641] ret_from_fork+0x116/0x1d0 [ 15.155026] ret_from_fork_asm+0x1a/0x30 [ 15.155230] [ 15.155330] The buggy address belongs to the object at ffff888102744f80 [ 15.155330] which belongs to the cache kmalloc-64 of size 64 [ 15.155924] The buggy address is located 0 bytes to the right of [ 15.155924] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.156492] [ 15.156565] The buggy address belongs to the physical page: [ 15.156943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.157199] flags: 0x200000000000000(node=0|zone=2) [ 15.157536] page_type: f5(slab) [ 15.157718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.158023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.158304] page dumped because: kasan: bad access detected [ 15.158752] [ 15.158856] Memory state around the buggy address: [ 15.159103] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.159393] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.159715] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.159950] ^ [ 15.160107] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.160323] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160636] ================================================================== [ 15.690553] ================================================================== [ 15.691574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.691841] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.692171] [ 15.692287] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.692331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.692345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.692367] Call Trace: [ 15.692382] <TASK> [ 15.692397] dump_stack_lvl+0x73/0xb0 [ 15.692426] print_report+0xd1/0x610 [ 15.692449] ? __virt_addr_valid+0x1db/0x2d0 [ 15.692471] ? kasan_atomics_helper+0x164f/0x5450 [ 15.692541] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.692565] ? kasan_atomics_helper+0x164f/0x5450 [ 15.692587] kasan_report+0x141/0x180 [ 15.692623] ? kasan_atomics_helper+0x164f/0x5450 [ 15.692650] kasan_check_range+0x10c/0x1c0 [ 15.692674] __kasan_check_write+0x18/0x20 [ 15.692693] kasan_atomics_helper+0x164f/0x5450 [ 15.692716] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.692738] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.692761] ? trace_hardirqs_on+0x37/0xe0 [ 15.692783] ? kasan_atomics+0x152/0x310 [ 15.692810] kasan_atomics+0x1dc/0x310 [ 15.692832] ? __pfx_kasan_atomics+0x10/0x10 [ 15.692889] ? __pfx_kasan_atomics+0x10/0x10 [ 15.692976] kunit_try_run_case+0x1a5/0x480 [ 15.693001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.693036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.693059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.693083] ? __kthread_parkme+0x82/0x180 [ 15.693103] ? preempt_count_sub+0x50/0x80 [ 15.693126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.693150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.693173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.693197] kthread+0x337/0x6f0 [ 15.693217] ? trace_preempt_on+0x20/0xc0 [ 15.693238] ? __pfx_kthread+0x10/0x10 [ 15.693259] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.693281] ? calculate_sigpending+0x7b/0xa0 [ 15.693304] ? __pfx_kthread+0x10/0x10 [ 15.693325] ret_from_fork+0x116/0x1d0 [ 15.693344] ? __pfx_kthread+0x10/0x10 [ 15.693365] ret_from_fork_asm+0x1a/0x30 [ 15.693395] </TASK> [ 15.693405] [ 15.705071] Allocated by task 283: [ 15.705267] kasan_save_stack+0x45/0x70 [ 15.705416] kasan_save_track+0x18/0x40 [ 15.705554] kasan_save_alloc_info+0x3b/0x50 [ 15.705764] __kasan_kmalloc+0xb7/0xc0 [ 15.705974] __kmalloc_cache_noprof+0x189/0x420 [ 15.706339] kasan_atomics+0x95/0x310 [ 15.706530] kunit_try_run_case+0x1a5/0x480 [ 15.706763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.707002] kthread+0x337/0x6f0 [ 15.707142] ret_from_fork+0x116/0x1d0 [ 15.707277] ret_from_fork_asm+0x1a/0x30 [ 15.707476] [ 15.707571] The buggy address belongs to the object at ffff888102744f80 [ 15.707571] which belongs to the cache kmalloc-64 of size 64 [ 15.708218] The buggy address is located 0 bytes to the right of [ 15.708218] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.708690] [ 15.708802] The buggy address belongs to the physical page: [ 15.709058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.709376] flags: 0x200000000000000(node=0|zone=2) [ 15.709540] page_type: f5(slab) [ 15.709667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.709995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.710368] page dumped because: kasan: bad access detected [ 15.710600] [ 15.710727] Memory state around the buggy address: [ 15.710913] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.711225] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.711454] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.711784] ^ [ 15.712062] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.712531] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.712841] ================================================================== [ 15.345986] ================================================================== [ 15.346322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.346945] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.347243] [ 15.347342] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.347479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.347491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.347512] Call Trace: [ 15.347527] <TASK> [ 15.347540] dump_stack_lvl+0x73/0xb0 [ 15.347568] print_report+0xd1/0x610 [ 15.347589] ? __virt_addr_valid+0x1db/0x2d0 [ 15.347612] ? kasan_atomics_helper+0xf10/0x5450 [ 15.347633] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.347656] ? kasan_atomics_helper+0xf10/0x5450 [ 15.347677] kasan_report+0x141/0x180 [ 15.347709] ? kasan_atomics_helper+0xf10/0x5450 [ 15.347735] kasan_check_range+0x10c/0x1c0 [ 15.347759] __kasan_check_write+0x18/0x20 [ 15.347778] kasan_atomics_helper+0xf10/0x5450 [ 15.347800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.347822] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.347845] ? trace_hardirqs_on+0x37/0xe0 [ 15.347868] ? kasan_atomics+0x152/0x310 [ 15.347895] kasan_atomics+0x1dc/0x310 [ 15.347928] ? __pfx_kasan_atomics+0x10/0x10 [ 15.347951] ? __pfx_kasan_atomics+0x10/0x10 [ 15.347978] kunit_try_run_case+0x1a5/0x480 [ 15.348002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.348025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.348048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.348071] ? __kthread_parkme+0x82/0x180 [ 15.348091] ? preempt_count_sub+0x50/0x80 [ 15.348114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.348139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.348162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.348186] kthread+0x337/0x6f0 [ 15.348206] ? trace_preempt_on+0x20/0xc0 [ 15.348228] ? __pfx_kthread+0x10/0x10 [ 15.348248] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.348269] ? calculate_sigpending+0x7b/0xa0 [ 15.348292] ? __pfx_kthread+0x10/0x10 [ 15.348314] ret_from_fork+0x116/0x1d0 [ 15.348333] ? __pfx_kthread+0x10/0x10 [ 15.348424] ret_from_fork_asm+0x1a/0x30 [ 15.348459] </TASK> [ 15.348469] [ 15.356591] Allocated by task 283: [ 15.356799] kasan_save_stack+0x45/0x70 [ 15.356993] kasan_save_track+0x18/0x40 [ 15.357166] kasan_save_alloc_info+0x3b/0x50 [ 15.357348] __kasan_kmalloc+0xb7/0xc0 [ 15.357519] __kmalloc_cache_noprof+0x189/0x420 [ 15.357674] kasan_atomics+0x95/0x310 [ 15.357807] kunit_try_run_case+0x1a5/0x480 [ 15.357983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.358239] kthread+0x337/0x6f0 [ 15.358404] ret_from_fork+0x116/0x1d0 [ 15.358588] ret_from_fork_asm+0x1a/0x30 [ 15.358787] [ 15.359131] The buggy address belongs to the object at ffff888102744f80 [ 15.359131] which belongs to the cache kmalloc-64 of size 64 [ 15.359750] The buggy address is located 0 bytes to the right of [ 15.359750] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.360245] [ 15.360343] The buggy address belongs to the physical page: [ 15.360557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.360890] flags: 0x200000000000000(node=0|zone=2) [ 15.361098] page_type: f5(slab) [ 15.361218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.361449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.361675] page dumped because: kasan: bad access detected [ 15.361938] [ 15.362033] Memory state around the buggy address: [ 15.362272] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.362598] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.363307] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.363735] ^ [ 15.363980] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.364199] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.364403] ================================================================== [ 15.629403] ================================================================== [ 15.629812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.630170] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.630503] [ 15.630615] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.630658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.630670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.630691] Call Trace: [ 15.630708] <TASK> [ 15.630722] dump_stack_lvl+0x73/0xb0 [ 15.630749] print_report+0xd1/0x610 [ 15.630771] ? __virt_addr_valid+0x1db/0x2d0 [ 15.630794] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.630815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.630838] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.630861] kasan_report+0x141/0x180 [ 15.630883] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.630921] __asan_report_store8_noabort+0x1b/0x30 [ 15.630946] kasan_atomics_helper+0x50d4/0x5450 [ 15.630969] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.630991] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.631015] ? trace_hardirqs_on+0x37/0xe0 [ 15.631035] ? kasan_atomics+0x152/0x310 [ 15.631065] kasan_atomics+0x1dc/0x310 [ 15.631088] ? __pfx_kasan_atomics+0x10/0x10 [ 15.631111] ? __pfx_kasan_atomics+0x10/0x10 [ 15.631138] kunit_try_run_case+0x1a5/0x480 [ 15.631162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.631185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.631207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.631230] ? __kthread_parkme+0x82/0x180 [ 15.631251] ? preempt_count_sub+0x50/0x80 [ 15.631274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.631298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.631321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.631344] kthread+0x337/0x6f0 [ 15.631364] ? trace_preempt_on+0x20/0xc0 [ 15.631386] ? __pfx_kthread+0x10/0x10 [ 15.631406] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.631427] ? calculate_sigpending+0x7b/0xa0 [ 15.631450] ? __pfx_kthread+0x10/0x10 [ 15.631472] ret_from_fork+0x116/0x1d0 [ 15.631490] ? __pfx_kthread+0x10/0x10 [ 15.631511] ret_from_fork_asm+0x1a/0x30 [ 15.631541] </TASK> [ 15.631552] [ 15.638582] Allocated by task 283: [ 15.638725] kasan_save_stack+0x45/0x70 [ 15.638937] kasan_save_track+0x18/0x40 [ 15.639136] kasan_save_alloc_info+0x3b/0x50 [ 15.639384] __kasan_kmalloc+0xb7/0xc0 [ 15.639576] __kmalloc_cache_noprof+0x189/0x420 [ 15.639856] kasan_atomics+0x95/0x310 [ 15.640033] kunit_try_run_case+0x1a5/0x480 [ 15.640180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.640367] kthread+0x337/0x6f0 [ 15.640541] ret_from_fork+0x116/0x1d0 [ 15.640754] ret_from_fork_asm+0x1a/0x30 [ 15.641117] [ 15.641216] The buggy address belongs to the object at ffff888102744f80 [ 15.641216] which belongs to the cache kmalloc-64 of size 64 [ 15.642088] The buggy address is located 0 bytes to the right of [ 15.642088] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.642726] [ 15.642840] The buggy address belongs to the physical page: [ 15.643091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.643340] flags: 0x200000000000000(node=0|zone=2) [ 15.643503] page_type: f5(slab) [ 15.643625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.645588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.646149] page dumped because: kasan: bad access detected [ 15.646479] [ 15.646583] Memory state around the buggy address: [ 15.647009] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.647372] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.647792] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.648121] ^ [ 15.648315] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.648618] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.649254] ================================================================== [ 15.990955] ================================================================== [ 15.991290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.991935] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.992496] [ 15.992617] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.992702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.992792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.992815] Call Trace: [ 15.992832] <TASK> [ 15.992848] dump_stack_lvl+0x73/0xb0 [ 15.992879] print_report+0xd1/0x610 [ 15.992901] ? __virt_addr_valid+0x1db/0x2d0 [ 15.992935] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.992957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.992980] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.993002] kasan_report+0x141/0x180 [ 15.993025] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.993055] kasan_check_range+0x10c/0x1c0 [ 15.993079] __kasan_check_write+0x18/0x20 [ 15.993099] kasan_atomics_helper+0x1eaa/0x5450 [ 15.993121] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.993143] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.993168] ? trace_hardirqs_on+0x37/0xe0 [ 15.993189] ? kasan_atomics+0x152/0x310 [ 15.993217] kasan_atomics+0x1dc/0x310 [ 15.993240] ? __pfx_kasan_atomics+0x10/0x10 [ 15.993263] ? __pfx_kasan_atomics+0x10/0x10 [ 15.993289] kunit_try_run_case+0x1a5/0x480 [ 15.993314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993337] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.993362] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.993385] ? __kthread_parkme+0x82/0x180 [ 15.993405] ? preempt_count_sub+0x50/0x80 [ 15.993429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.993476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.993499] kthread+0x337/0x6f0 [ 15.993519] ? trace_preempt_on+0x20/0xc0 [ 15.993540] ? __pfx_kthread+0x10/0x10 [ 15.993561] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.993582] ? calculate_sigpending+0x7b/0xa0 [ 15.993606] ? __pfx_kthread+0x10/0x10 [ 15.993627] ret_from_fork+0x116/0x1d0 [ 15.993645] ? __pfx_kthread+0x10/0x10 [ 15.993692] ret_from_fork_asm+0x1a/0x30 [ 15.993724] </TASK> [ 15.993735] [ 16.004255] Allocated by task 283: [ 16.004508] kasan_save_stack+0x45/0x70 [ 16.004973] kasan_save_track+0x18/0x40 [ 16.005182] kasan_save_alloc_info+0x3b/0x50 [ 16.005385] __kasan_kmalloc+0xb7/0xc0 [ 16.005576] __kmalloc_cache_noprof+0x189/0x420 [ 16.006067] kasan_atomics+0x95/0x310 [ 16.006362] kunit_try_run_case+0x1a5/0x480 [ 16.006605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.007024] kthread+0x337/0x6f0 [ 16.007220] ret_from_fork+0x116/0x1d0 [ 16.007515] ret_from_fork_asm+0x1a/0x30 [ 16.007767] [ 16.007872] The buggy address belongs to the object at ffff888102744f80 [ 16.007872] which belongs to the cache kmalloc-64 of size 64 [ 16.008685] The buggy address is located 0 bytes to the right of [ 16.008685] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.009313] [ 16.009417] The buggy address belongs to the physical page: [ 16.009834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.010293] flags: 0x200000000000000(node=0|zone=2) [ 16.010530] page_type: f5(slab) [ 16.010864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.011310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.011747] page dumped because: kasan: bad access detected [ 16.011977] [ 16.012079] Memory state around the buggy address: [ 16.012558] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.012881] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.013300] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.013639] ^ [ 16.014031] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.014340] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.014791] ================================================================== [ 14.757134] ================================================================== [ 14.758016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.758344] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.759118] [ 14.759421] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.759481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.759494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.759515] Call Trace: [ 14.759527] <TASK> [ 14.759544] dump_stack_lvl+0x73/0xb0 [ 14.759574] print_report+0xd1/0x610 [ 14.759595] ? __virt_addr_valid+0x1db/0x2d0 [ 14.759618] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.759638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.759659] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.759766] kasan_report+0x141/0x180 [ 14.759790] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.759816] __asan_report_load4_noabort+0x18/0x20 [ 14.759839] kasan_atomics_helper+0x4bbc/0x5450 [ 14.759860] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.759882] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.759918] ? trace_hardirqs_on+0x37/0xe0 [ 14.759940] ? kasan_atomics+0x152/0x310 [ 14.759966] kasan_atomics+0x1dc/0x310 [ 14.759988] ? __pfx_kasan_atomics+0x10/0x10 [ 14.760012] ? __pfx_kasan_atomics+0x10/0x10 [ 14.760038] kunit_try_run_case+0x1a5/0x480 [ 14.760062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.760083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.760105] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.760128] ? __kthread_parkme+0x82/0x180 [ 14.760147] ? preempt_count_sub+0x50/0x80 [ 14.760170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.760192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.760214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.760237] kthread+0x337/0x6f0 [ 14.760256] ? trace_preempt_on+0x20/0xc0 [ 14.760276] ? __pfx_kthread+0x10/0x10 [ 14.760296] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.760316] ? calculate_sigpending+0x7b/0xa0 [ 14.760339] ? __pfx_kthread+0x10/0x10 [ 14.760377] ret_from_fork+0x116/0x1d0 [ 14.760395] ? __pfx_kthread+0x10/0x10 [ 14.760415] ret_from_fork_asm+0x1a/0x30 [ 14.760445] </TASK> [ 14.760455] [ 14.773063] Allocated by task 283: [ 14.773246] kasan_save_stack+0x45/0x70 [ 14.773880] kasan_save_track+0x18/0x40 [ 14.774094] kasan_save_alloc_info+0x3b/0x50 [ 14.774441] __kasan_kmalloc+0xb7/0xc0 [ 14.774804] __kmalloc_cache_noprof+0x189/0x420 [ 14.775163] kasan_atomics+0x95/0x310 [ 14.775383] kunit_try_run_case+0x1a5/0x480 [ 14.775850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.776200] kthread+0x337/0x6f0 [ 14.776801] ret_from_fork+0x116/0x1d0 [ 14.777012] ret_from_fork_asm+0x1a/0x30 [ 14.777282] [ 14.777363] The buggy address belongs to the object at ffff888102744f80 [ 14.777363] which belongs to the cache kmalloc-64 of size 64 [ 14.778277] The buggy address is located 0 bytes to the right of [ 14.778277] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.779177] [ 14.779466] The buggy address belongs to the physical page: [ 14.779714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.780082] flags: 0x200000000000000(node=0|zone=2) [ 14.780298] page_type: f5(slab) [ 14.780503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.781416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.781933] page dumped because: kasan: bad access detected [ 14.782291] [ 14.782478] Memory state around the buggy address: [ 14.782903] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.783341] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.783833] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.784263] ^ [ 14.784874] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.785226] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.785639] ================================================================== [ 15.364727] ================================================================== [ 15.365006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.365373] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.365971] [ 15.366085] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.366128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.366140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.366164] Call Trace: [ 15.366320] <TASK> [ 15.366348] dump_stack_lvl+0x73/0xb0 [ 15.366378] print_report+0xd1/0x610 [ 15.366400] ? __virt_addr_valid+0x1db/0x2d0 [ 15.366421] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.366442] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.366465] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.366486] kasan_report+0x141/0x180 [ 15.366510] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.366538] kasan_check_range+0x10c/0x1c0 [ 15.366563] __kasan_check_write+0x18/0x20 [ 15.366583] kasan_atomics_helper+0xfa9/0x5450 [ 15.366606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.366629] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.366652] ? trace_hardirqs_on+0x37/0xe0 [ 15.366675] ? kasan_atomics+0x152/0x310 [ 15.366722] kasan_atomics+0x1dc/0x310 [ 15.366745] ? __pfx_kasan_atomics+0x10/0x10 [ 15.366769] ? __pfx_kasan_atomics+0x10/0x10 [ 15.366797] kunit_try_run_case+0x1a5/0x480 [ 15.366821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.366843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.366867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.366890] ? __kthread_parkme+0x82/0x180 [ 15.366921] ? preempt_count_sub+0x50/0x80 [ 15.366944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.366968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.366991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.367015] kthread+0x337/0x6f0 [ 15.367034] ? trace_preempt_on+0x20/0xc0 [ 15.367063] ? __pfx_kthread+0x10/0x10 [ 15.367084] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.367105] ? calculate_sigpending+0x7b/0xa0 [ 15.367128] ? __pfx_kthread+0x10/0x10 [ 15.367150] ret_from_fork+0x116/0x1d0 [ 15.367168] ? __pfx_kthread+0x10/0x10 [ 15.367189] ret_from_fork_asm+0x1a/0x30 [ 15.367220] </TASK> [ 15.367230] [ 15.376619] Allocated by task 283: [ 15.376799] kasan_save_stack+0x45/0x70 [ 15.377007] kasan_save_track+0x18/0x40 [ 15.377205] kasan_save_alloc_info+0x3b/0x50 [ 15.377384] __kasan_kmalloc+0xb7/0xc0 [ 15.377665] __kmalloc_cache_noprof+0x189/0x420 [ 15.377879] kasan_atomics+0x95/0x310 [ 15.378160] kunit_try_run_case+0x1a5/0x480 [ 15.378338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.378563] kthread+0x337/0x6f0 [ 15.378748] ret_from_fork+0x116/0x1d0 [ 15.378957] ret_from_fork_asm+0x1a/0x30 [ 15.379154] [ 15.379251] The buggy address belongs to the object at ffff888102744f80 [ 15.379251] which belongs to the cache kmalloc-64 of size 64 [ 15.379851] The buggy address is located 0 bytes to the right of [ 15.379851] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.380691] [ 15.380802] The buggy address belongs to the physical page: [ 15.381183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.381585] flags: 0x200000000000000(node=0|zone=2) [ 15.381994] page_type: f5(slab) [ 15.382132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.382580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.382949] page dumped because: kasan: bad access detected [ 15.383223] [ 15.383335] Memory state around the buggy address: [ 15.383575] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.383925] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.384247] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.384558] ^ [ 15.384780] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.385105] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.385415] ================================================================== [ 16.157712] ================================================================== [ 16.158069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.158474] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 16.158980] [ 16.159079] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.159121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.159134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.159154] Call Trace: [ 16.159169] <TASK> [ 16.159184] dump_stack_lvl+0x73/0xb0 [ 16.159212] print_report+0xd1/0x610 [ 16.159234] ? __virt_addr_valid+0x1db/0x2d0 [ 16.159256] ? kasan_atomics_helper+0x218a/0x5450 [ 16.159304] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.159327] ? kasan_atomics_helper+0x218a/0x5450 [ 16.159349] kasan_report+0x141/0x180 [ 16.159371] ? kasan_atomics_helper+0x218a/0x5450 [ 16.159414] kasan_check_range+0x10c/0x1c0 [ 16.159438] __kasan_check_write+0x18/0x20 [ 16.159458] kasan_atomics_helper+0x218a/0x5450 [ 16.159482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.159504] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.159528] ? trace_hardirqs_on+0x37/0xe0 [ 16.159550] ? kasan_atomics+0x152/0x310 [ 16.159576] kasan_atomics+0x1dc/0x310 [ 16.159600] ? __pfx_kasan_atomics+0x10/0x10 [ 16.159623] ? __pfx_kasan_atomics+0x10/0x10 [ 16.159650] kunit_try_run_case+0x1a5/0x480 [ 16.159674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.159709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.159733] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.159757] ? __kthread_parkme+0x82/0x180 [ 16.159796] ? preempt_count_sub+0x50/0x80 [ 16.159821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.159845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.159868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.159892] kthread+0x337/0x6f0 [ 16.159923] ? trace_preempt_on+0x20/0xc0 [ 16.159945] ? __pfx_kthread+0x10/0x10 [ 16.159966] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.160006] ? calculate_sigpending+0x7b/0xa0 [ 16.160030] ? __pfx_kthread+0x10/0x10 [ 16.160052] ret_from_fork+0x116/0x1d0 [ 16.160071] ? __pfx_kthread+0x10/0x10 [ 16.160091] ret_from_fork_asm+0x1a/0x30 [ 16.160123] </TASK> [ 16.160133] [ 16.167863] Allocated by task 283: [ 16.168051] kasan_save_stack+0x45/0x70 [ 16.168249] kasan_save_track+0x18/0x40 [ 16.168520] kasan_save_alloc_info+0x3b/0x50 [ 16.168799] __kasan_kmalloc+0xb7/0xc0 [ 16.168971] __kmalloc_cache_noprof+0x189/0x420 [ 16.169121] kasan_atomics+0x95/0x310 [ 16.169251] kunit_try_run_case+0x1a5/0x480 [ 16.169458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.169720] kthread+0x337/0x6f0 [ 16.169924] ret_from_fork+0x116/0x1d0 [ 16.170142] ret_from_fork_asm+0x1a/0x30 [ 16.170351] [ 16.170444] The buggy address belongs to the object at ffff888102744f80 [ 16.170444] which belongs to the cache kmalloc-64 of size 64 [ 16.170895] The buggy address is located 0 bytes to the right of [ 16.170895] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 16.171399] [ 16.171484] The buggy address belongs to the physical page: [ 16.171734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 16.172101] flags: 0x200000000000000(node=0|zone=2) [ 16.172370] page_type: f5(slab) [ 16.172556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.172939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.173271] page dumped because: kasan: bad access detected [ 16.173529] [ 16.173723] Memory state around the buggy address: [ 16.173957] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.174273] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.174589] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.174899] ^ [ 16.175131] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.175405] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.175620] ================================================================== [ 15.933453] ================================================================== [ 15.934117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.934789] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.935373] [ 15.935462] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.935505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.935517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.935539] Call Trace: [ 15.935552] <TASK> [ 15.935567] dump_stack_lvl+0x73/0xb0 [ 15.935595] print_report+0xd1/0x610 [ 15.935616] ? __virt_addr_valid+0x1db/0x2d0 [ 15.935639] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.935659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.935709] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.935731] kasan_report+0x141/0x180 [ 15.935753] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.935780] kasan_check_range+0x10c/0x1c0 [ 15.935804] __kasan_check_write+0x18/0x20 [ 15.935823] kasan_atomics_helper+0x1ce1/0x5450 [ 15.935845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.935867] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.935891] ? trace_hardirqs_on+0x37/0xe0 [ 15.935923] ? kasan_atomics+0x152/0x310 [ 15.935952] kasan_atomics+0x1dc/0x310 [ 15.935976] ? __pfx_kasan_atomics+0x10/0x10 [ 15.935998] ? __pfx_kasan_atomics+0x10/0x10 [ 15.936025] kunit_try_run_case+0x1a5/0x480 [ 15.936049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.936072] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.936095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.936118] ? __kthread_parkme+0x82/0x180 [ 15.936137] ? preempt_count_sub+0x50/0x80 [ 15.936161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.936184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.936207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.936230] kthread+0x337/0x6f0 [ 15.936250] ? trace_preempt_on+0x20/0xc0 [ 15.936271] ? __pfx_kthread+0x10/0x10 [ 15.936291] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.936312] ? calculate_sigpending+0x7b/0xa0 [ 15.936336] ? __pfx_kthread+0x10/0x10 [ 15.936357] ret_from_fork+0x116/0x1d0 [ 15.936376] ? __pfx_kthread+0x10/0x10 [ 15.936396] ret_from_fork_asm+0x1a/0x30 [ 15.936427] </TASK> [ 15.936437] [ 15.945285] Allocated by task 283: [ 15.945463] kasan_save_stack+0x45/0x70 [ 15.945682] kasan_save_track+0x18/0x40 [ 15.945876] kasan_save_alloc_info+0x3b/0x50 [ 15.946048] __kasan_kmalloc+0xb7/0xc0 [ 15.946233] __kmalloc_cache_noprof+0x189/0x420 [ 15.946416] kasan_atomics+0x95/0x310 [ 15.946599] kunit_try_run_case+0x1a5/0x480 [ 15.946772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.947001] kthread+0x337/0x6f0 [ 15.947175] ret_from_fork+0x116/0x1d0 [ 15.947361] ret_from_fork_asm+0x1a/0x30 [ 15.947561] [ 15.947655] The buggy address belongs to the object at ffff888102744f80 [ 15.947655] which belongs to the cache kmalloc-64 of size 64 [ 15.948150] The buggy address is located 0 bytes to the right of [ 15.948150] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.948644] [ 15.948755] The buggy address belongs to the physical page: [ 15.948986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.949300] flags: 0x200000000000000(node=0|zone=2) [ 15.949499] page_type: f5(slab) [ 15.949660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.949968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.950275] page dumped because: kasan: bad access detected [ 15.950516] [ 15.950595] Memory state around the buggy address: [ 15.950789] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.951086] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.951394] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.951656] ^ [ 15.951829] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.952054] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.952266] ================================================================== [ 15.003211] ================================================================== [ 15.003530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.003994] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.004253] [ 15.004364] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.004407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.004419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.004440] Call Trace: [ 15.004456] <TASK> [ 15.004471] dump_stack_lvl+0x73/0xb0 [ 15.004499] print_report+0xd1/0x610 [ 15.004522] ? __virt_addr_valid+0x1db/0x2d0 [ 15.004544] ? kasan_atomics_helper+0x697/0x5450 [ 15.004565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.004587] ? kasan_atomics_helper+0x697/0x5450 [ 15.004609] kasan_report+0x141/0x180 [ 15.004631] ? kasan_atomics_helper+0x697/0x5450 [ 15.004657] kasan_check_range+0x10c/0x1c0 [ 15.004681] __kasan_check_write+0x18/0x20 [ 15.004700] kasan_atomics_helper+0x697/0x5450 [ 15.004723] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.004745] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.004769] ? trace_hardirqs_on+0x37/0xe0 [ 15.004791] ? kasan_atomics+0x152/0x310 [ 15.004817] kasan_atomics+0x1dc/0x310 [ 15.004840] ? __pfx_kasan_atomics+0x10/0x10 [ 15.004863] ? __pfx_kasan_atomics+0x10/0x10 [ 15.004889] kunit_try_run_case+0x1a5/0x480 [ 15.004929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.004952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.004974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.004998] ? __kthread_parkme+0x82/0x180 [ 15.005018] ? preempt_count_sub+0x50/0x80 [ 15.005042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.005066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.005088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.005111] kthread+0x337/0x6f0 [ 15.005132] ? trace_preempt_on+0x20/0xc0 [ 15.005153] ? __pfx_kthread+0x10/0x10 [ 15.005173] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.005195] ? calculate_sigpending+0x7b/0xa0 [ 15.005218] ? __pfx_kthread+0x10/0x10 [ 15.005239] ret_from_fork+0x116/0x1d0 [ 15.005257] ? __pfx_kthread+0x10/0x10 [ 15.005278] ret_from_fork_asm+0x1a/0x30 [ 15.005308] </TASK> [ 15.005319] [ 15.013429] Allocated by task 283: [ 15.013561] kasan_save_stack+0x45/0x70 [ 15.013773] kasan_save_track+0x18/0x40 [ 15.013985] kasan_save_alloc_info+0x3b/0x50 [ 15.014197] __kasan_kmalloc+0xb7/0xc0 [ 15.014383] __kmalloc_cache_noprof+0x189/0x420 [ 15.014756] kasan_atomics+0x95/0x310 [ 15.014954] kunit_try_run_case+0x1a5/0x480 [ 15.015118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.015295] kthread+0x337/0x6f0 [ 15.015416] ret_from_fork+0x116/0x1d0 [ 15.015549] ret_from_fork_asm+0x1a/0x30 [ 15.015689] [ 15.015788] The buggy address belongs to the object at ffff888102744f80 [ 15.015788] which belongs to the cache kmalloc-64 of size 64 [ 15.016325] The buggy address is located 0 bytes to the right of [ 15.016325] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.017322] [ 15.017425] The buggy address belongs to the physical page: [ 15.017717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.018006] flags: 0x200000000000000(node=0|zone=2) [ 15.018171] page_type: f5(slab) [ 15.018290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.018784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.019387] page dumped because: kasan: bad access detected [ 15.019568] [ 15.019638] Memory state around the buggy address: [ 15.019795] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.020337] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.020670] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.021044] ^ [ 15.021239] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.021537] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.021858] ================================================================== [ 14.786154] ================================================================== [ 14.786626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.786987] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.787219] [ 14.787487] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.787533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.787544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.787564] Call Trace: [ 14.787579] <TASK> [ 14.787592] dump_stack_lvl+0x73/0xb0 [ 14.787619] print_report+0xd1/0x610 [ 14.787641] ? __virt_addr_valid+0x1db/0x2d0 [ 14.787661] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.787696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.787717] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.787737] kasan_report+0x141/0x180 [ 14.787759] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.787784] __asan_report_store4_noabort+0x1b/0x30 [ 14.787807] kasan_atomics_helper+0x4ba2/0x5450 [ 14.787828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.787849] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.787871] ? trace_hardirqs_on+0x37/0xe0 [ 14.787892] ? kasan_atomics+0x152/0x310 [ 14.787929] kasan_atomics+0x1dc/0x310 [ 14.787951] ? __pfx_kasan_atomics+0x10/0x10 [ 14.787973] ? __pfx_kasan_atomics+0x10/0x10 [ 14.787999] kunit_try_run_case+0x1a5/0x480 [ 14.788021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.788042] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.788064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.788086] ? __kthread_parkme+0x82/0x180 [ 14.788105] ? preempt_count_sub+0x50/0x80 [ 14.788127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.788150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.788172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.788195] kthread+0x337/0x6f0 [ 14.788213] ? trace_preempt_on+0x20/0xc0 [ 14.788234] ? __pfx_kthread+0x10/0x10 [ 14.788253] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.788274] ? calculate_sigpending+0x7b/0xa0 [ 14.788296] ? __pfx_kthread+0x10/0x10 [ 14.788315] ret_from_fork+0x116/0x1d0 [ 14.788333] ? __pfx_kthread+0x10/0x10 [ 14.788418] ret_from_fork_asm+0x1a/0x30 [ 14.788451] </TASK> [ 14.788460] [ 14.796088] Allocated by task 283: [ 14.796233] kasan_save_stack+0x45/0x70 [ 14.796435] kasan_save_track+0x18/0x40 [ 14.796615] kasan_save_alloc_info+0x3b/0x50 [ 14.796854] __kasan_kmalloc+0xb7/0xc0 [ 14.796998] __kmalloc_cache_noprof+0x189/0x420 [ 14.797153] kasan_atomics+0x95/0x310 [ 14.797286] kunit_try_run_case+0x1a5/0x480 [ 14.797430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.797663] kthread+0x337/0x6f0 [ 14.797829] ret_from_fork+0x116/0x1d0 [ 14.798025] ret_from_fork_asm+0x1a/0x30 [ 14.798221] [ 14.798313] The buggy address belongs to the object at ffff888102744f80 [ 14.798313] which belongs to the cache kmalloc-64 of size 64 [ 14.799132] The buggy address is located 0 bytes to the right of [ 14.799132] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.799708] [ 14.799807] The buggy address belongs to the physical page: [ 14.800011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.800317] flags: 0x200000000000000(node=0|zone=2) [ 14.800607] page_type: f5(slab) [ 14.800880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.801208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.801606] page dumped because: kasan: bad access detected [ 14.801883] [ 14.801996] Memory state around the buggy address: [ 14.802207] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.802461] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.802676] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.802888] ^ [ 14.803546] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.803988] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.804273] ================================================================== [ 15.672386] ================================================================== [ 15.672754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.673037] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 15.673384] [ 15.673489] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.673530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.673543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.673563] Call Trace: [ 15.673576] <TASK> [ 15.673591] dump_stack_lvl+0x73/0xb0 [ 15.673620] print_report+0xd1/0x610 [ 15.673642] ? __virt_addr_valid+0x1db/0x2d0 [ 15.673664] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.673686] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.673708] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.673730] kasan_report+0x141/0x180 [ 15.673753] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.673780] kasan_check_range+0x10c/0x1c0 [ 15.673804] __kasan_check_write+0x18/0x20 [ 15.673823] kasan_atomics_helper+0x15b6/0x5450 [ 15.673845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.673867] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.673891] ? trace_hardirqs_on+0x37/0xe0 [ 15.673923] ? kasan_atomics+0x152/0x310 [ 15.673951] kasan_atomics+0x1dc/0x310 [ 15.673973] ? __pfx_kasan_atomics+0x10/0x10 [ 15.673997] ? __pfx_kasan_atomics+0x10/0x10 [ 15.674023] kunit_try_run_case+0x1a5/0x480 [ 15.674047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.674070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.674094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.674117] ? __kthread_parkme+0x82/0x180 [ 15.674137] ? preempt_count_sub+0x50/0x80 [ 15.674161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.674185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.674208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.674232] kthread+0x337/0x6f0 [ 15.674252] ? trace_preempt_on+0x20/0xc0 [ 15.674274] ? __pfx_kthread+0x10/0x10 [ 15.674294] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.674316] ? calculate_sigpending+0x7b/0xa0 [ 15.674340] ? __pfx_kthread+0x10/0x10 [ 15.674361] ret_from_fork+0x116/0x1d0 [ 15.674380] ? __pfx_kthread+0x10/0x10 [ 15.674400] ret_from_fork_asm+0x1a/0x30 [ 15.674431] </TASK> [ 15.674442] [ 15.681755] Allocated by task 283: [ 15.681900] kasan_save_stack+0x45/0x70 [ 15.682081] kasan_save_track+0x18/0x40 [ 15.682224] kasan_save_alloc_info+0x3b/0x50 [ 15.682375] __kasan_kmalloc+0xb7/0xc0 [ 15.682527] __kmalloc_cache_noprof+0x189/0x420 [ 15.682744] kasan_atomics+0x95/0x310 [ 15.683079] kunit_try_run_case+0x1a5/0x480 [ 15.683287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.683539] kthread+0x337/0x6f0 [ 15.683712] ret_from_fork+0x116/0x1d0 [ 15.683847] ret_from_fork_asm+0x1a/0x30 [ 15.683997] [ 15.684069] The buggy address belongs to the object at ffff888102744f80 [ 15.684069] which belongs to the cache kmalloc-64 of size 64 [ 15.684478] The buggy address is located 0 bytes to the right of [ 15.684478] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 15.685019] [ 15.685113] The buggy address belongs to the physical page: [ 15.685369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 15.685664] flags: 0x200000000000000(node=0|zone=2) [ 15.685898] page_type: f5(slab) [ 15.686078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.686382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.686608] page dumped because: kasan: bad access detected [ 15.686840] [ 15.686942] Memory state around the buggy address: [ 15.687170] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.687498] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.687826] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.688131] ^ [ 15.688328] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.688621] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.689919] ================================================================== [ 14.823559] ================================================================== [ 14.823879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.824194] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283 [ 14.824642] [ 14.824797] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.824840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.824853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.824873] Call Trace: [ 14.824887] <TASK> [ 14.824902] dump_stack_lvl+0x73/0xb0 [ 14.824944] print_report+0xd1/0x610 [ 14.824967] ? __virt_addr_valid+0x1db/0x2d0 [ 14.824988] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.825009] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.825032] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.825053] kasan_report+0x141/0x180 [ 14.825075] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.825103] __asan_report_store4_noabort+0x1b/0x30 [ 14.825127] kasan_atomics_helper+0x4b6e/0x5450 [ 14.825150] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.825173] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.825197] ? trace_hardirqs_on+0x37/0xe0 [ 14.825219] ? kasan_atomics+0x152/0x310 [ 14.825246] kasan_atomics+0x1dc/0x310 [ 14.825269] ? __pfx_kasan_atomics+0x10/0x10 [ 14.825292] ? __pfx_kasan_atomics+0x10/0x10 [ 14.825319] kunit_try_run_case+0x1a5/0x480 [ 14.825343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.825402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.825426] ? __kthread_parkme+0x82/0x180 [ 14.825446] ? preempt_count_sub+0x50/0x80 [ 14.825470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.825517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.825540] kthread+0x337/0x6f0 [ 14.825559] ? trace_preempt_on+0x20/0xc0 [ 14.825581] ? __pfx_kthread+0x10/0x10 [ 14.825602] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.825624] ? calculate_sigpending+0x7b/0xa0 [ 14.825647] ? __pfx_kthread+0x10/0x10 [ 14.825669] ret_from_fork+0x116/0x1d0 [ 14.825740] ? __pfx_kthread+0x10/0x10 [ 14.825764] ret_from_fork_asm+0x1a/0x30 [ 14.825795] </TASK> [ 14.825806] [ 14.833590] Allocated by task 283: [ 14.833755] kasan_save_stack+0x45/0x70 [ 14.833966] kasan_save_track+0x18/0x40 [ 14.834158] kasan_save_alloc_info+0x3b/0x50 [ 14.834369] __kasan_kmalloc+0xb7/0xc0 [ 14.834558] __kmalloc_cache_noprof+0x189/0x420 [ 14.835077] kasan_atomics+0x95/0x310 [ 14.835286] kunit_try_run_case+0x1a5/0x480 [ 14.835739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.836017] kthread+0x337/0x6f0 [ 14.836190] ret_from_fork+0x116/0x1d0 [ 14.836432] ret_from_fork_asm+0x1a/0x30 [ 14.836641] [ 14.836783] The buggy address belongs to the object at ffff888102744f80 [ 14.836783] which belongs to the cache kmalloc-64 of size 64 [ 14.837229] The buggy address is located 0 bytes to the right of [ 14.837229] allocated 48-byte region [ffff888102744f80, ffff888102744fb0) [ 14.838048] [ 14.838139] The buggy address belongs to the physical page: [ 14.838312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744 [ 14.838546] flags: 0x200000000000000(node=0|zone=2) [ 14.839118] page_type: f5(slab) [ 14.839289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.839673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.839931] page dumped because: kasan: bad access detected [ 14.840099] [ 14.840167] Memory state around the buggy address: [ 14.840318] ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.840529] ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.840774] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.841094] ^ [ 14.841320] ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.841646] ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.842064] ==================================================================