Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.290110] ================================================================== [ 18.290165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.290217] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.290579] [ 18.290656] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.290747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.290810] Hardware name: linux,dummy-virt (DT) [ 18.291018] Call trace: [ 18.291060] show_stack+0x20/0x38 (C) [ 18.291120] dump_stack_lvl+0x8c/0xd0 [ 18.291257] print_report+0x118/0x5d0 [ 18.291328] kasan_report+0xdc/0x128 [ 18.291373] kasan_check_range+0x100/0x1a8 [ 18.291489] __kasan_check_write+0x20/0x30 [ 18.291535] kasan_atomics_helper+0xe44/0x4858 [ 18.291706] kasan_atomics+0x198/0x2e0 [ 18.291767] kunit_try_run_case+0x170/0x3f0 [ 18.291866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.292062] kthread+0x328/0x630 [ 18.292220] ret_from_fork+0x10/0x20 [ 18.292294] [ 18.292315] Allocated by task 266: [ 18.292389] kasan_save_stack+0x3c/0x68 [ 18.292433] kasan_save_track+0x20/0x40 [ 18.292525] kasan_save_alloc_info+0x40/0x58 [ 18.292610] __kasan_kmalloc+0xd4/0xd8 [ 18.292791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.292866] kasan_atomics+0xb8/0x2e0 [ 18.292912] kunit_try_run_case+0x170/0x3f0 [ 18.293106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.293376] kthread+0x328/0x630 [ 18.293760] ret_from_fork+0x10/0x20 [ 18.294014] [ 18.294197] The buggy address belongs to the object at fff00000c7941e80 [ 18.294197] which belongs to the cache kmalloc-64 of size 64 [ 18.294312] The buggy address is located 0 bytes to the right of [ 18.294312] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.294615] [ 18.294730] The buggy address belongs to the physical page: [ 18.294793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.294859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.295082] page_type: f5(slab) [ 18.295158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.295306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.295377] page dumped because: kasan: bad access detected [ 18.295414] [ 18.295449] Memory state around the buggy address: [ 18.295483] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.295530] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.295576] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.295628] ^ [ 18.295663] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.295713] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.295755] ================================================================== [ 18.255795] ================================================================== [ 18.256113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.256220] Read of size 4 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.256275] [ 18.256359] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.256479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.256609] Hardware name: linux,dummy-virt (DT) [ 18.256676] Call trace: [ 18.256701] show_stack+0x20/0x38 (C) [ 18.256931] dump_stack_lvl+0x8c/0xd0 [ 18.257081] print_report+0x118/0x5d0 [ 18.257152] kasan_report+0xdc/0x128 [ 18.257202] __asan_report_load4_noabort+0x20/0x30 [ 18.257255] kasan_atomics_helper+0x3dd8/0x4858 [ 18.257305] kasan_atomics+0x198/0x2e0 [ 18.257350] kunit_try_run_case+0x170/0x3f0 [ 18.257409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.257464] kthread+0x328/0x630 [ 18.257507] ret_from_fork+0x10/0x20 [ 18.257556] [ 18.257583] Allocated by task 266: [ 18.257614] kasan_save_stack+0x3c/0x68 [ 18.257693] kasan_save_track+0x20/0x40 [ 18.257733] kasan_save_alloc_info+0x40/0x58 [ 18.257774] __kasan_kmalloc+0xd4/0xd8 [ 18.257812] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.258274] kasan_atomics+0xb8/0x2e0 [ 18.258375] kunit_try_run_case+0x170/0x3f0 [ 18.258638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.258929] kthread+0x328/0x630 [ 18.259101] ret_from_fork+0x10/0x20 [ 18.259330] [ 18.259557] The buggy address belongs to the object at fff00000c7941e80 [ 18.259557] which belongs to the cache kmalloc-64 of size 64 [ 18.259786] The buggy address is located 0 bytes to the right of [ 18.259786] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.259859] [ 18.259886] The buggy address belongs to the physical page: [ 18.259939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.260339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.260685] page_type: f5(slab) [ 18.261003] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.261212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.261453] page dumped because: kasan: bad access detected [ 18.261563] [ 18.261700] Memory state around the buggy address: [ 18.261963] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.262034] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.262080] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.262471] ^ [ 18.262555] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.262630] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.262844] ================================================================== [ 18.364403] ================================================================== [ 18.364466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.364518] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.364604] [ 18.364690] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.365183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.365223] Hardware name: linux,dummy-virt (DT) [ 18.365261] Call trace: [ 18.365286] show_stack+0x20/0x38 (C) [ 18.365336] dump_stack_lvl+0x8c/0xd0 [ 18.365386] print_report+0x118/0x5d0 [ 18.365433] kasan_report+0xdc/0x128 [ 18.365479] kasan_check_range+0x100/0x1a8 [ 18.365528] __kasan_check_write+0x20/0x30 [ 18.365572] kasan_atomics_helper+0x11f8/0x4858 [ 18.365621] kasan_atomics+0x198/0x2e0 [ 18.365670] kunit_try_run_case+0x170/0x3f0 [ 18.365721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.365774] kthread+0x328/0x630 [ 18.365815] ret_from_fork+0x10/0x20 [ 18.365864] [ 18.365883] Allocated by task 266: [ 18.365913] kasan_save_stack+0x3c/0x68 [ 18.365953] kasan_save_track+0x20/0x40 [ 18.366139] kasan_save_alloc_info+0x40/0x58 [ 18.366209] __kasan_kmalloc+0xd4/0xd8 [ 18.366250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.366661] kasan_atomics+0xb8/0x2e0 [ 18.368754] kunit_try_run_case+0x170/0x3f0 [ 18.368944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.369075] kthread+0x328/0x630 [ 18.369208] ret_from_fork+0x10/0x20 [ 18.369275] [ 18.369299] The buggy address belongs to the object at fff00000c7941e80 [ 18.369299] which belongs to the cache kmalloc-64 of size 64 [ 18.369375] The buggy address is located 0 bytes to the right of [ 18.369375] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.369443] [ 18.369673] The buggy address belongs to the physical page: [ 18.369795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.369915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.370355] page_type: f5(slab) [ 18.370780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.371144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.371233] page dumped because: kasan: bad access detected [ 18.371343] [ 18.371364] Memory state around the buggy address: [ 18.371650] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.371798] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.372025] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.372192] ^ [ 18.372318] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.372366] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.372407] ================================================================== [ 18.305465] ================================================================== [ 18.305520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.305572] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.305848] [ 18.306033] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.306229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.306345] Hardware name: linux,dummy-virt (DT) [ 18.306466] Call trace: [ 18.306493] show_stack+0x20/0x38 (C) [ 18.306548] dump_stack_lvl+0x8c/0xd0 [ 18.306639] print_report+0x118/0x5d0 [ 18.306747] kasan_report+0xdc/0x128 [ 18.306837] kasan_check_range+0x100/0x1a8 [ 18.306891] __kasan_check_write+0x20/0x30 [ 18.306944] kasan_atomics_helper+0xeb8/0x4858 [ 18.307006] kasan_atomics+0x198/0x2e0 [ 18.307103] kunit_try_run_case+0x170/0x3f0 [ 18.307162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.307217] kthread+0x328/0x630 [ 18.307258] ret_from_fork+0x10/0x20 [ 18.307305] [ 18.307334] Allocated by task 266: [ 18.307384] kasan_save_stack+0x3c/0x68 [ 18.307435] kasan_save_track+0x20/0x40 [ 18.307472] kasan_save_alloc_info+0x40/0x58 [ 18.307514] __kasan_kmalloc+0xd4/0xd8 [ 18.307551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.307592] kasan_atomics+0xb8/0x2e0 [ 18.307630] kunit_try_run_case+0x170/0x3f0 [ 18.307668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.307714] kthread+0x328/0x630 [ 18.307758] ret_from_fork+0x10/0x20 [ 18.307796] [ 18.307816] The buggy address belongs to the object at fff00000c7941e80 [ 18.307816] which belongs to the cache kmalloc-64 of size 64 [ 18.307878] The buggy address is located 0 bytes to the right of [ 18.307878] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.307954] [ 18.308264] The buggy address belongs to the physical page: [ 18.308488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.308560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.308612] page_type: f5(slab) [ 18.308747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.308817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.308889] page dumped because: kasan: bad access detected [ 18.309081] [ 18.309102] Memory state around the buggy address: [ 18.309141] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.309261] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.309418] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.309707] ^ [ 18.309888] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.310079] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.310162] ================================================================== [ 18.319780] ================================================================== [ 18.319990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.320075] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.320145] [ 18.320304] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.320393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.320604] Hardware name: linux,dummy-virt (DT) [ 18.320649] Call trace: [ 18.320674] show_stack+0x20/0x38 (C) [ 18.320816] dump_stack_lvl+0x8c/0xd0 [ 18.321202] print_report+0x118/0x5d0 [ 18.321379] kasan_report+0xdc/0x128 [ 18.321449] kasan_check_range+0x100/0x1a8 [ 18.321500] __kasan_check_write+0x20/0x30 [ 18.321571] kasan_atomics_helper+0xf88/0x4858 [ 18.321624] kasan_atomics+0x198/0x2e0 [ 18.321922] kunit_try_run_case+0x170/0x3f0 [ 18.322241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.322400] kthread+0x328/0x630 [ 18.322563] ret_from_fork+0x10/0x20 [ 18.322681] [ 18.322747] Allocated by task 266: [ 18.322905] kasan_save_stack+0x3c/0x68 [ 18.322971] kasan_save_track+0x20/0x40 [ 18.323024] kasan_save_alloc_info+0x40/0x58 [ 18.323217] __kasan_kmalloc+0xd4/0xd8 [ 18.323328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.323397] kasan_atomics+0xb8/0x2e0 [ 18.323451] kunit_try_run_case+0x170/0x3f0 [ 18.323491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.323543] kthread+0x328/0x630 [ 18.323588] ret_from_fork+0x10/0x20 [ 18.323635] [ 18.323666] The buggy address belongs to the object at fff00000c7941e80 [ 18.323666] which belongs to the cache kmalloc-64 of size 64 [ 18.323732] The buggy address is located 0 bytes to the right of [ 18.323732] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.323799] [ 18.323837] The buggy address belongs to the physical page: [ 18.323880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.323934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.324086] page_type: f5(slab) [ 18.324191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.324734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.324845] page dumped because: kasan: bad access detected [ 18.325193] [ 18.325348] Memory state around the buggy address: [ 18.325417] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.325472] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.325517] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.325560] ^ [ 18.325594] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.325639] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.326093] ================================================================== [ 18.420540] ================================================================== [ 18.420792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.421004] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.421590] [ 18.421665] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.421819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.421907] Hardware name: linux,dummy-virt (DT) [ 18.422040] Call trace: [ 18.422111] show_stack+0x20/0x38 (C) [ 18.422252] dump_stack_lvl+0x8c/0xd0 [ 18.422299] print_report+0x118/0x5d0 [ 18.422565] kasan_report+0xdc/0x128 [ 18.422742] kasan_check_range+0x100/0x1a8 [ 18.422884] __kasan_check_write+0x20/0x30 [ 18.422973] kasan_atomics_helper+0x154c/0x4858 [ 18.423336] kasan_atomics+0x198/0x2e0 [ 18.423475] kunit_try_run_case+0x170/0x3f0 [ 18.423584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.423764] kthread+0x328/0x630 [ 18.423832] ret_from_fork+0x10/0x20 [ 18.424093] [ 18.424140] Allocated by task 266: [ 18.424297] kasan_save_stack+0x3c/0x68 [ 18.424522] kasan_save_track+0x20/0x40 [ 18.424626] kasan_save_alloc_info+0x40/0x58 [ 18.424769] __kasan_kmalloc+0xd4/0xd8 [ 18.424927] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.425017] kasan_atomics+0xb8/0x2e0 [ 18.425155] kunit_try_run_case+0x170/0x3f0 [ 18.425243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.425294] kthread+0x328/0x630 [ 18.425455] ret_from_fork+0x10/0x20 [ 18.425698] [ 18.426408] The buggy address belongs to the object at fff00000c7941e80 [ 18.426408] which belongs to the cache kmalloc-64 of size 64 [ 18.426550] The buggy address is located 0 bytes to the right of [ 18.426550] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.426623] [ 18.426872] The buggy address belongs to the physical page: [ 18.427007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.427119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.427321] page_type: f5(slab) [ 18.427497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.427610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.427657] page dumped because: kasan: bad access detected [ 18.427860] [ 18.427989] Memory state around the buggy address: [ 18.428207] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.428337] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.429129] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.429188] ^ [ 18.430109] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.430556] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.430604] ================================================================== [ 18.401328] ================================================================== [ 18.401383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.401432] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.401484] [ 18.401936] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.402057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.402095] Hardware name: linux,dummy-virt (DT) [ 18.402400] Call trace: [ 18.402439] show_stack+0x20/0x38 (C) [ 18.402699] dump_stack_lvl+0x8c/0xd0 [ 18.402770] print_report+0x118/0x5d0 [ 18.402915] kasan_report+0xdc/0x128 [ 18.402988] kasan_check_range+0x100/0x1a8 [ 18.403041] __kasan_check_write+0x20/0x30 [ 18.403087] kasan_atomics_helper+0x1414/0x4858 [ 18.403499] kasan_atomics+0x198/0x2e0 [ 18.403613] kunit_try_run_case+0x170/0x3f0 [ 18.403666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.403720] kthread+0x328/0x630 [ 18.404020] ret_from_fork+0x10/0x20 [ 18.404098] [ 18.404200] Allocated by task 266: [ 18.404234] kasan_save_stack+0x3c/0x68 [ 18.404302] kasan_save_track+0x20/0x40 [ 18.404596] kasan_save_alloc_info+0x40/0x58 [ 18.404812] __kasan_kmalloc+0xd4/0xd8 [ 18.404904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.405022] kasan_atomics+0xb8/0x2e0 [ 18.405257] kunit_try_run_case+0x170/0x3f0 [ 18.405453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.405934] kthread+0x328/0x630 [ 18.405991] ret_from_fork+0x10/0x20 [ 18.406028] [ 18.406302] The buggy address belongs to the object at fff00000c7941e80 [ 18.406302] which belongs to the cache kmalloc-64 of size 64 [ 18.406493] The buggy address is located 0 bytes to the right of [ 18.406493] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.406753] [ 18.406933] The buggy address belongs to the physical page: [ 18.407080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.407277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.407519] page_type: f5(slab) [ 18.407597] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.407782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.408068] page dumped because: kasan: bad access detected [ 18.408197] [ 18.408302] Memory state around the buggy address: [ 18.408391] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.408440] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.408492] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.408684] ^ [ 18.409282] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.409439] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.409595] ================================================================== [ 18.282231] ================================================================== [ 18.282333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.282390] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.282674] [ 18.282759] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.282856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.282884] Hardware name: linux,dummy-virt (DT) [ 18.283015] Call trace: [ 18.283042] show_stack+0x20/0x38 (C) [ 18.283096] dump_stack_lvl+0x8c/0xd0 [ 18.283230] print_report+0x118/0x5d0 [ 18.283305] kasan_report+0xdc/0x128 [ 18.283564] __asan_report_load8_noabort+0x20/0x30 [ 18.283654] kasan_atomics_helper+0x3f58/0x4858 [ 18.283776] kasan_atomics+0x198/0x2e0 [ 18.283864] kunit_try_run_case+0x170/0x3f0 [ 18.284180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.284307] kthread+0x328/0x630 [ 18.284384] ret_from_fork+0x10/0x20 [ 18.284436] [ 18.284463] Allocated by task 266: [ 18.284492] kasan_save_stack+0x3c/0x68 [ 18.284535] kasan_save_track+0x20/0x40 [ 18.284572] kasan_save_alloc_info+0x40/0x58 [ 18.284614] __kasan_kmalloc+0xd4/0xd8 [ 18.284651] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.284847] kasan_atomics+0xb8/0x2e0 [ 18.284904] kunit_try_run_case+0x170/0x3f0 [ 18.285135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.285391] kthread+0x328/0x630 [ 18.285503] ret_from_fork+0x10/0x20 [ 18.285602] [ 18.285737] The buggy address belongs to the object at fff00000c7941e80 [ 18.285737] which belongs to the cache kmalloc-64 of size 64 [ 18.285832] The buggy address is located 0 bytes to the right of [ 18.285832] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.286022] [ 18.286223] The buggy address belongs to the physical page: [ 18.286293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.286457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.286523] page_type: f5(slab) [ 18.286741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.286932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.287200] page dumped because: kasan: bad access detected [ 18.287383] [ 18.287512] Memory state around the buggy address: [ 18.287825] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.287956] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.288211] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.288415] ^ [ 18.288536] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.288872] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.289054] ================================================================== [ 18.453035] ================================================================== [ 18.453108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.453313] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.453371] [ 18.453408] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.453727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.453757] Hardware name: linux,dummy-virt (DT) [ 18.453789] Call trace: [ 18.453811] show_stack+0x20/0x38 (C) [ 18.453866] dump_stack_lvl+0x8c/0xd0 [ 18.454122] print_report+0x118/0x5d0 [ 18.454365] kasan_report+0xdc/0x128 [ 18.454472] kasan_check_range+0x100/0x1a8 [ 18.454527] __kasan_check_write+0x20/0x30 [ 18.454596] kasan_atomics_helper+0x16d0/0x4858 [ 18.454644] kasan_atomics+0x198/0x2e0 [ 18.454690] kunit_try_run_case+0x170/0x3f0 [ 18.454737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.454826] kthread+0x328/0x630 [ 18.454999] ret_from_fork+0x10/0x20 [ 18.455045] [ 18.455066] Allocated by task 266: [ 18.455094] kasan_save_stack+0x3c/0x68 [ 18.455137] kasan_save_track+0x20/0x40 [ 18.455175] kasan_save_alloc_info+0x40/0x58 [ 18.455218] __kasan_kmalloc+0xd4/0xd8 [ 18.455255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.455296] kasan_atomics+0xb8/0x2e0 [ 18.455333] kunit_try_run_case+0x170/0x3f0 [ 18.455373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.455424] kthread+0x328/0x630 [ 18.455459] ret_from_fork+0x10/0x20 [ 18.455527] [ 18.455548] The buggy address belongs to the object at fff00000c7941e80 [ 18.455548] which belongs to the cache kmalloc-64 of size 64 [ 18.455608] The buggy address is located 0 bytes to the right of [ 18.455608] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.455958] [ 18.455989] The buggy address belongs to the physical page: [ 18.456032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.456451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.456502] page_type: f5(slab) [ 18.456541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.456610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.456671] page dumped because: kasan: bad access detected [ 18.456749] [ 18.456865] Memory state around the buggy address: [ 18.456901] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.456947] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.457249] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.457291] ^ [ 18.457348] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.457425] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.457533] ================================================================== [ 18.278183] ================================================================== [ 18.278363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.278454] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.278705] [ 18.278767] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.278863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.278891] Hardware name: linux,dummy-virt (DT) [ 18.278991] Call trace: [ 18.279047] show_stack+0x20/0x38 (C) [ 18.279233] dump_stack_lvl+0x8c/0xd0 [ 18.279311] print_report+0x118/0x5d0 [ 18.279361] kasan_report+0xdc/0x128 [ 18.279409] kasan_check_range+0x100/0x1a8 [ 18.279484] __kasan_check_read+0x20/0x30 [ 18.279532] kasan_atomics_helper+0xdd4/0x4858 [ 18.279579] kasan_atomics+0x198/0x2e0 [ 18.279625] kunit_try_run_case+0x170/0x3f0 [ 18.279671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.279724] kthread+0x328/0x630 [ 18.279768] ret_from_fork+0x10/0x20 [ 18.279815] [ 18.279839] Allocated by task 266: [ 18.279871] kasan_save_stack+0x3c/0x68 [ 18.279914] kasan_save_track+0x20/0x40 [ 18.279954] kasan_save_alloc_info+0x40/0x58 [ 18.280010] __kasan_kmalloc+0xd4/0xd8 [ 18.280047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.280088] kasan_atomics+0xb8/0x2e0 [ 18.280125] kunit_try_run_case+0x170/0x3f0 [ 18.280165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.280211] kthread+0x328/0x630 [ 18.280244] ret_from_fork+0x10/0x20 [ 18.280281] [ 18.280303] The buggy address belongs to the object at fff00000c7941e80 [ 18.280303] which belongs to the cache kmalloc-64 of size 64 [ 18.280363] The buggy address is located 0 bytes to the right of [ 18.280363] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.280430] [ 18.280450] The buggy address belongs to the physical page: [ 18.280494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.280550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.280609] page_type: f5(slab) [ 18.280649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.280710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.280754] page dumped because: kasan: bad access detected [ 18.280787] [ 18.281237] Memory state around the buggy address: [ 18.281291] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.281339] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.281384] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.281426] ^ [ 18.281492] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.281698] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.281792] ================================================================== [ 18.270120] ================================================================== [ 18.270213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.270269] Read of size 4 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.270322] [ 18.270587] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.270756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.270828] Hardware name: linux,dummy-virt (DT) [ 18.271032] Call trace: [ 18.271169] show_stack+0x20/0x38 (C) [ 18.271224] dump_stack_lvl+0x8c/0xd0 [ 18.271276] print_report+0x118/0x5d0 [ 18.271344] kasan_report+0xdc/0x128 [ 18.271391] __asan_report_load4_noabort+0x20/0x30 [ 18.271450] kasan_atomics_helper+0x3e04/0x4858 [ 18.271500] kasan_atomics+0x198/0x2e0 [ 18.271547] kunit_try_run_case+0x170/0x3f0 [ 18.271804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.272094] kthread+0x328/0x630 [ 18.272211] ret_from_fork+0x10/0x20 [ 18.272263] [ 18.272283] Allocated by task 266: [ 18.272340] kasan_save_stack+0x3c/0x68 [ 18.272447] kasan_save_track+0x20/0x40 [ 18.272492] kasan_save_alloc_info+0x40/0x58 [ 18.272549] __kasan_kmalloc+0xd4/0xd8 [ 18.272626] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.272669] kasan_atomics+0xb8/0x2e0 [ 18.272853] kunit_try_run_case+0x170/0x3f0 [ 18.273108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.273345] kthread+0x328/0x630 [ 18.273699] ret_from_fork+0x10/0x20 [ 18.274042] [ 18.274141] The buggy address belongs to the object at fff00000c7941e80 [ 18.274141] which belongs to the cache kmalloc-64 of size 64 [ 18.274286] The buggy address is located 0 bytes to the right of [ 18.274286] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.274517] [ 18.274680] The buggy address belongs to the physical page: [ 18.274745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.274808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.275042] page_type: f5(slab) [ 18.275245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.275667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.275785] page dumped because: kasan: bad access detected [ 18.275966] [ 18.276022] Memory state around the buggy address: [ 18.276118] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.276265] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.276450] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.276657] ^ [ 18.276885] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277016] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277155] ================================================================== [ 18.436467] ================================================================== [ 18.436523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.436578] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.436630] [ 18.436662] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.436747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.436774] Hardware name: linux,dummy-virt (DT) [ 18.436807] Call trace: [ 18.436829] show_stack+0x20/0x38 (C) [ 18.436879] dump_stack_lvl+0x8c/0xd0 [ 18.436926] print_report+0x118/0x5d0 [ 18.436973] kasan_report+0xdc/0x128 [ 18.437038] kasan_check_range+0x100/0x1a8 [ 18.437087] __kasan_check_write+0x20/0x30 [ 18.437133] kasan_atomics_helper+0x15b4/0x4858 [ 18.437181] kasan_atomics+0x198/0x2e0 [ 18.439070] kunit_try_run_case+0x170/0x3f0 [ 18.439130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.439184] kthread+0x328/0x630 [ 18.439228] ret_from_fork+0x10/0x20 [ 18.439276] [ 18.439298] Allocated by task 266: [ 18.439327] kasan_save_stack+0x3c/0x68 [ 18.439371] kasan_save_track+0x20/0x40 [ 18.439410] kasan_save_alloc_info+0x40/0x58 [ 18.439459] __kasan_kmalloc+0xd4/0xd8 [ 18.439497] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.439539] kasan_atomics+0xb8/0x2e0 [ 18.439576] kunit_try_run_case+0x170/0x3f0 [ 18.439617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.439662] kthread+0x328/0x630 [ 18.439695] ret_from_fork+0x10/0x20 [ 18.439733] [ 18.439754] The buggy address belongs to the object at fff00000c7941e80 [ 18.439754] which belongs to the cache kmalloc-64 of size 64 [ 18.439817] The buggy address is located 0 bytes to the right of [ 18.439817] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.439884] [ 18.439905] The buggy address belongs to the physical page: [ 18.439953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.440110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.440197] page_type: f5(slab) [ 18.440239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.440295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.440339] page dumped because: kasan: bad access detected [ 18.440374] [ 18.440394] Memory state around the buggy address: [ 18.440428] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.440475] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.440532] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.440574] ^ [ 18.440610] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.440653] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.440694] ================================================================== [ 18.296659] ================================================================== [ 18.296820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.297026] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.297154] [ 18.297268] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.297655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.297861] Hardware name: linux,dummy-virt (DT) [ 18.297964] Call trace: [ 18.298152] show_stack+0x20/0x38 (C) [ 18.298364] dump_stack_lvl+0x8c/0xd0 [ 18.298513] print_report+0x118/0x5d0 [ 18.298699] kasan_report+0xdc/0x128 [ 18.298785] __asan_report_store8_noabort+0x20/0x30 [ 18.298850] kasan_atomics_helper+0x3e5c/0x4858 [ 18.299082] kasan_atomics+0x198/0x2e0 [ 18.299254] kunit_try_run_case+0x170/0x3f0 [ 18.299493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.299685] kthread+0x328/0x630 [ 18.299810] ret_from_fork+0x10/0x20 [ 18.300013] [ 18.300073] Allocated by task 266: [ 18.300315] kasan_save_stack+0x3c/0x68 [ 18.300518] kasan_save_track+0x20/0x40 [ 18.300620] kasan_save_alloc_info+0x40/0x58 [ 18.300859] __kasan_kmalloc+0xd4/0xd8 [ 18.300966] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.301041] kasan_atomics+0xb8/0x2e0 [ 18.301093] kunit_try_run_case+0x170/0x3f0 [ 18.301132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.301233] kthread+0x328/0x630 [ 18.301269] ret_from_fork+0x10/0x20 [ 18.301307] [ 18.301339] The buggy address belongs to the object at fff00000c7941e80 [ 18.301339] which belongs to the cache kmalloc-64 of size 64 [ 18.301404] The buggy address is located 0 bytes to the right of [ 18.301404] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.301765] [ 18.301839] The buggy address belongs to the physical page: [ 18.301966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.302090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.302320] page_type: f5(slab) [ 18.302429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.302578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.302628] page dumped because: kasan: bad access detected [ 18.302835] [ 18.303050] Memory state around the buggy address: [ 18.303130] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.303408] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.303559] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.303603] ^ [ 18.303818] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.303909] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.304053] ================================================================== [ 18.342282] ================================================================== [ 18.342339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.342393] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.342445] [ 18.342555] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.342666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.342695] Hardware name: linux,dummy-virt (DT) [ 18.342728] Call trace: [ 18.342757] show_stack+0x20/0x38 (C) [ 18.342810] dump_stack_lvl+0x8c/0xd0 [ 18.342858] print_report+0x118/0x5d0 [ 18.342911] kasan_report+0xdc/0x128 [ 18.342956] kasan_check_range+0x100/0x1a8 [ 18.343027] __kasan_check_write+0x20/0x30 [ 18.343074] kasan_atomics_helper+0x10c0/0x4858 [ 18.343127] kasan_atomics+0x198/0x2e0 [ 18.343174] kunit_try_run_case+0x170/0x3f0 [ 18.343221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.343285] kthread+0x328/0x630 [ 18.343327] ret_from_fork+0x10/0x20 [ 18.343393] [ 18.343425] Allocated by task 266: [ 18.343464] kasan_save_stack+0x3c/0x68 [ 18.343517] kasan_save_track+0x20/0x40 [ 18.343556] kasan_save_alloc_info+0x40/0x58 [ 18.343598] __kasan_kmalloc+0xd4/0xd8 [ 18.343640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.343682] kasan_atomics+0xb8/0x2e0 [ 18.343719] kunit_try_run_case+0x170/0x3f0 [ 18.343767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.343812] kthread+0x328/0x630 [ 18.343845] ret_from_fork+0x10/0x20 [ 18.343884] [ 18.343905] The buggy address belongs to the object at fff00000c7941e80 [ 18.343905] which belongs to the cache kmalloc-64 of size 64 [ 18.343967] The buggy address is located 0 bytes to the right of [ 18.343967] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.344802] [ 18.344882] The buggy address belongs to the physical page: [ 18.344927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.345002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.345053] page_type: f5(slab) [ 18.345092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.345404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.345766] page dumped because: kasan: bad access detected [ 18.345964] [ 18.345994] Memory state around the buggy address: [ 18.346032] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.346385] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.346680] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.346859] ^ [ 18.347011] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.347058] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.347130] ================================================================== [ 18.381550] ================================================================== [ 18.381623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.381676] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.381974] [ 18.382107] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.382258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.382296] Hardware name: linux,dummy-virt (DT) [ 18.382338] Call trace: [ 18.382368] show_stack+0x20/0x38 (C) [ 18.382518] dump_stack_lvl+0x8c/0xd0 [ 18.382577] print_report+0x118/0x5d0 [ 18.382622] kasan_report+0xdc/0x128 [ 18.382916] kasan_check_range+0x100/0x1a8 [ 18.383086] __kasan_check_write+0x20/0x30 [ 18.383141] kasan_atomics_helper+0x12d8/0x4858 [ 18.383193] kasan_atomics+0x198/0x2e0 [ 18.383239] kunit_try_run_case+0x170/0x3f0 [ 18.383452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.383623] kthread+0x328/0x630 [ 18.383703] ret_from_fork+0x10/0x20 [ 18.383860] [ 18.383898] Allocated by task 266: [ 18.384086] kasan_save_stack+0x3c/0x68 [ 18.384141] kasan_save_track+0x20/0x40 [ 18.384225] kasan_save_alloc_info+0x40/0x58 [ 18.384271] __kasan_kmalloc+0xd4/0xd8 [ 18.384335] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.384376] kasan_atomics+0xb8/0x2e0 [ 18.384414] kunit_try_run_case+0x170/0x3f0 [ 18.384467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.384514] kthread+0x328/0x630 [ 18.384547] ret_from_fork+0x10/0x20 [ 18.384584] [ 18.384607] The buggy address belongs to the object at fff00000c7941e80 [ 18.384607] which belongs to the cache kmalloc-64 of size 64 [ 18.384678] The buggy address is located 0 bytes to the right of [ 18.384678] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.384748] [ 18.384769] The buggy address belongs to the physical page: [ 18.384803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.384858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.384917] page_type: f5(slab) [ 18.384958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.385024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.385069] page dumped because: kasan: bad access detected [ 18.385103] [ 18.385134] Memory state around the buggy address: [ 18.385168] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.385214] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.385272] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.385314] ^ [ 18.385356] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385401] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385442] ================================================================== [ 18.417137] ================================================================== [ 18.417401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.417587] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.417686] [ 18.417735] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.417853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.417881] Hardware name: linux,dummy-virt (DT) [ 18.417913] Call trace: [ 18.417935] show_stack+0x20/0x38 (C) [ 18.418009] dump_stack_lvl+0x8c/0xd0 [ 18.418068] print_report+0x118/0x5d0 [ 18.418118] kasan_report+0xdc/0x128 [ 18.418163] kasan_check_range+0x100/0x1a8 [ 18.418224] __kasan_check_write+0x20/0x30 [ 18.418272] kasan_atomics_helper+0x14e4/0x4858 [ 18.418319] kasan_atomics+0x198/0x2e0 [ 18.418374] kunit_try_run_case+0x170/0x3f0 [ 18.418423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.418482] kthread+0x328/0x630 [ 18.418525] ret_from_fork+0x10/0x20 [ 18.418571] [ 18.418598] Allocated by task 266: [ 18.418631] kasan_save_stack+0x3c/0x68 [ 18.418684] kasan_save_track+0x20/0x40 [ 18.418723] kasan_save_alloc_info+0x40/0x58 [ 18.418765] __kasan_kmalloc+0xd4/0xd8 [ 18.418802] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.418843] kasan_atomics+0xb8/0x2e0 [ 18.418885] kunit_try_run_case+0x170/0x3f0 [ 18.418926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.418969] kthread+0x328/0x630 [ 18.419012] ret_from_fork+0x10/0x20 [ 18.419062] [ 18.419092] The buggy address belongs to the object at fff00000c7941e80 [ 18.419092] which belongs to the cache kmalloc-64 of size 64 [ 18.419163] The buggy address is located 0 bytes to the right of [ 18.419163] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.419236] [ 18.419258] The buggy address belongs to the physical page: [ 18.419292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.419347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.419396] page_type: f5(slab) [ 18.419440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.419502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.419551] page dumped because: kasan: bad access detected [ 18.419586] [ 18.419606] Memory state around the buggy address: [ 18.419644] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.419691] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.419735] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.419784] ^ [ 18.419819] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.419862] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.419902] ================================================================== [ 18.462806] ================================================================== [ 18.462963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.463037] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.463245] [ 18.463276] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.463360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.463677] Hardware name: linux,dummy-virt (DT) [ 18.463709] Call trace: [ 18.463733] show_stack+0x20/0x38 (C) [ 18.463787] dump_stack_lvl+0x8c/0xd0 [ 18.463879] print_report+0x118/0x5d0 [ 18.463926] kasan_report+0xdc/0x128 [ 18.463975] kasan_check_range+0x100/0x1a8 [ 18.464035] __kasan_check_write+0x20/0x30 [ 18.464090] kasan_atomics_helper+0x175c/0x4858 [ 18.464140] kasan_atomics+0x198/0x2e0 [ 18.464185] kunit_try_run_case+0x170/0x3f0 [ 18.464233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.464287] kthread+0x328/0x630 [ 18.464417] ret_from_fork+0x10/0x20 [ 18.464520] [ 18.464541] Allocated by task 266: [ 18.464571] kasan_save_stack+0x3c/0x68 [ 18.464614] kasan_save_track+0x20/0x40 [ 18.464662] kasan_save_alloc_info+0x40/0x58 [ 18.464704] __kasan_kmalloc+0xd4/0xd8 [ 18.464842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.464885] kasan_atomics+0xb8/0x2e0 [ 18.464923] kunit_try_run_case+0x170/0x3f0 [ 18.464962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.465018] kthread+0x328/0x630 [ 18.465051] ret_from_fork+0x10/0x20 [ 18.465090] [ 18.465111] The buggy address belongs to the object at fff00000c7941e80 [ 18.465111] which belongs to the cache kmalloc-64 of size 64 [ 18.465171] The buggy address is located 0 bytes to the right of [ 18.465171] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.465261] [ 18.465282] The buggy address belongs to the physical page: [ 18.465317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.465372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.465462] page_type: f5(slab) [ 18.465672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.465737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.465827] page dumped because: kasan: bad access detected [ 18.465923] [ 18.465945] Memory state around the buggy address: [ 18.465987] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.466200] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.466297] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.466377] ^ [ 18.466545] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.466591] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.466713] ================================================================== [ 18.457791] ================================================================== [ 18.457839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.457890] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.457942] [ 18.457971] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.458162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.458353] Hardware name: linux,dummy-virt (DT) [ 18.458387] Call trace: [ 18.458409] show_stack+0x20/0x38 (C) [ 18.458460] dump_stack_lvl+0x8c/0xd0 [ 18.458507] print_report+0x118/0x5d0 [ 18.458605] kasan_report+0xdc/0x128 [ 18.458855] __asan_report_load8_noabort+0x20/0x30 [ 18.458940] kasan_atomics_helper+0x3e10/0x4858 [ 18.459169] kasan_atomics+0x198/0x2e0 [ 18.459288] kunit_try_run_case+0x170/0x3f0 [ 18.459338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.459394] kthread+0x328/0x630 [ 18.459444] ret_from_fork+0x10/0x20 [ 18.459495] [ 18.459547] Allocated by task 266: [ 18.459623] kasan_save_stack+0x3c/0x68 [ 18.459693] kasan_save_track+0x20/0x40 [ 18.459764] kasan_save_alloc_info+0x40/0x58 [ 18.459806] __kasan_kmalloc+0xd4/0xd8 [ 18.459866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.460891] kasan_atomics+0xb8/0x2e0 [ 18.460932] kunit_try_run_case+0x170/0x3f0 [ 18.460970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.461138] kthread+0x328/0x630 [ 18.461176] ret_from_fork+0x10/0x20 [ 18.461215] [ 18.461315] The buggy address belongs to the object at fff00000c7941e80 [ 18.461315] which belongs to the cache kmalloc-64 of size 64 [ 18.461404] The buggy address is located 0 bytes to the right of [ 18.461404] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.461529] [ 18.461551] The buggy address belongs to the physical page: [ 18.461584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.461655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.461705] page_type: f5(slab) [ 18.461744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.461798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.461842] page dumped because: kasan: bad access detected [ 18.461876] [ 18.461896] Memory state around the buggy address: [ 18.461929] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.461976] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.462032] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.462073] ^ [ 18.462108] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.462216] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.462257] ================================================================== [ 18.327145] ================================================================== [ 18.327221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.327356] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.327411] [ 18.327464] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.327552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.327582] Hardware name: linux,dummy-virt (DT) [ 18.327702] Call trace: [ 18.327728] show_stack+0x20/0x38 (C) [ 18.327793] dump_stack_lvl+0x8c/0xd0 [ 18.327844] print_report+0x118/0x5d0 [ 18.327890] kasan_report+0xdc/0x128 [ 18.327936] kasan_check_range+0x100/0x1a8 [ 18.328238] __kasan_check_write+0x20/0x30 [ 18.328467] kasan_atomics_helper+0xff0/0x4858 [ 18.328646] kasan_atomics+0x198/0x2e0 [ 18.328721] kunit_try_run_case+0x170/0x3f0 [ 18.328861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.328955] kthread+0x328/0x630 [ 18.329176] ret_from_fork+0x10/0x20 [ 18.329257] [ 18.329277] Allocated by task 266: [ 18.329516] kasan_save_stack+0x3c/0x68 [ 18.329701] kasan_save_track+0x20/0x40 [ 18.329771] kasan_save_alloc_info+0x40/0x58 [ 18.330034] __kasan_kmalloc+0xd4/0xd8 [ 18.330109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.330272] kasan_atomics+0xb8/0x2e0 [ 18.330456] kunit_try_run_case+0x170/0x3f0 [ 18.330562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.330644] kthread+0x328/0x630 [ 18.330910] ret_from_fork+0x10/0x20 [ 18.331030] [ 18.331101] The buggy address belongs to the object at fff00000c7941e80 [ 18.331101] which belongs to the cache kmalloc-64 of size 64 [ 18.331426] The buggy address is located 0 bytes to the right of [ 18.331426] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.331545] [ 18.331638] The buggy address belongs to the physical page: [ 18.331674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.331731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.331779] page_type: f5(slab) [ 18.331836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.331900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.331961] page dumped because: kasan: bad access detected [ 18.332015] [ 18.332055] Memory state around the buggy address: [ 18.332096] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.332144] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.332190] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.332246] ^ [ 18.332283] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.332327] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.332368] ================================================================== [ 18.441302] ================================================================== [ 18.441353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.441414] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.441531] [ 18.441562] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.441646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.441674] Hardware name: linux,dummy-virt (DT) [ 18.441707] Call trace: [ 18.441729] show_stack+0x20/0x38 (C) [ 18.441780] dump_stack_lvl+0x8c/0xd0 [ 18.441827] print_report+0x118/0x5d0 [ 18.441875] kasan_report+0xdc/0x128 [ 18.441921] __asan_report_load8_noabort+0x20/0x30 [ 18.442058] kasan_atomics_helper+0x3db0/0x4858 [ 18.442112] kasan_atomics+0x198/0x2e0 [ 18.442158] kunit_try_run_case+0x170/0x3f0 [ 18.442207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.442262] kthread+0x328/0x630 [ 18.442304] ret_from_fork+0x10/0x20 [ 18.442362] [ 18.442382] Allocated by task 266: [ 18.442412] kasan_save_stack+0x3c/0x68 [ 18.442453] kasan_save_track+0x20/0x40 [ 18.442492] kasan_save_alloc_info+0x40/0x58 [ 18.442533] __kasan_kmalloc+0xd4/0xd8 [ 18.442572] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.442632] kasan_atomics+0xb8/0x2e0 [ 18.442795] kunit_try_run_case+0x170/0x3f0 [ 18.442996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.443044] kthread+0x328/0x630 [ 18.443077] ret_from_fork+0x10/0x20 [ 18.443113] [ 18.443134] The buggy address belongs to the object at fff00000c7941e80 [ 18.443134] which belongs to the cache kmalloc-64 of size 64 [ 18.443196] The buggy address is located 0 bytes to the right of [ 18.443196] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.443270] [ 18.443360] The buggy address belongs to the physical page: [ 18.443537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.443677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.443786] page_type: f5(slab) [ 18.443992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.444047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.444092] page dumped because: kasan: bad access detected [ 18.444125] [ 18.444145] Memory state around the buggy address: [ 18.444178] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.444225] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.444270] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.444312] ^ [ 18.444347] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.444392] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.444434] ================================================================== [ 18.358148] ================================================================== [ 18.358209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.358340] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.358473] [ 18.358563] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.358848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.359033] Hardware name: linux,dummy-virt (DT) [ 18.359093] Call trace: [ 18.359144] show_stack+0x20/0x38 (C) [ 18.359205] dump_stack_lvl+0x8c/0xd0 [ 18.359429] print_report+0x118/0x5d0 [ 18.359544] kasan_report+0xdc/0x128 [ 18.359642] kasan_check_range+0x100/0x1a8 [ 18.359778] __kasan_check_write+0x20/0x30 [ 18.359907] kasan_atomics_helper+0x1190/0x4858 [ 18.359959] kasan_atomics+0x198/0x2e0 [ 18.360127] kunit_try_run_case+0x170/0x3f0 [ 18.360195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.360250] kthread+0x328/0x630 [ 18.360443] ret_from_fork+0x10/0x20 [ 18.360507] [ 18.360579] Allocated by task 266: [ 18.360627] kasan_save_stack+0x3c/0x68 [ 18.360718] kasan_save_track+0x20/0x40 [ 18.360901] kasan_save_alloc_info+0x40/0x58 [ 18.360962] __kasan_kmalloc+0xd4/0xd8 [ 18.361090] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.361289] kasan_atomics+0xb8/0x2e0 [ 18.361466] kunit_try_run_case+0x170/0x3f0 [ 18.361532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.361688] kthread+0x328/0x630 [ 18.361725] ret_from_fork+0x10/0x20 [ 18.361896] [ 18.362099] The buggy address belongs to the object at fff00000c7941e80 [ 18.362099] which belongs to the cache kmalloc-64 of size 64 [ 18.362276] The buggy address is located 0 bytes to the right of [ 18.362276] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.362501] [ 18.362745] The buggy address belongs to the physical page: [ 18.362783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.362840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.362902] page_type: f5(slab) [ 18.362942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.363031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.363096] page dumped because: kasan: bad access detected [ 18.363141] [ 18.363170] Memory state around the buggy address: [ 18.363217] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.363275] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.363321] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.363372] ^ [ 18.363408] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.363466] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.363524] ================================================================== [ 18.264275] ================================================================== [ 18.264345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.264398] Write of size 4 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.264452] [ 18.264483] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.264565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.264594] Hardware name: linux,dummy-virt (DT) [ 18.264626] Call trace: [ 18.264649] show_stack+0x20/0x38 (C) [ 18.264696] dump_stack_lvl+0x8c/0xd0 [ 18.264744] print_report+0x118/0x5d0 [ 18.264793] kasan_report+0xdc/0x128 [ 18.264893] kasan_check_range+0x100/0x1a8 [ 18.264946] __kasan_check_write+0x20/0x30 [ 18.265004] kasan_atomics_helper+0xd3c/0x4858 [ 18.265052] kasan_atomics+0x198/0x2e0 [ 18.265097] kunit_try_run_case+0x170/0x3f0 [ 18.265145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.265214] kthread+0x328/0x630 [ 18.265257] ret_from_fork+0x10/0x20 [ 18.265314] [ 18.265334] Allocated by task 266: [ 18.265364] kasan_save_stack+0x3c/0x68 [ 18.265407] kasan_save_track+0x20/0x40 [ 18.265454] kasan_save_alloc_info+0x40/0x58 [ 18.265496] __kasan_kmalloc+0xd4/0xd8 [ 18.265533] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.265589] kasan_atomics+0xb8/0x2e0 [ 18.265638] kunit_try_run_case+0x170/0x3f0 [ 18.265679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.265732] kthread+0x328/0x630 [ 18.265776] ret_from_fork+0x10/0x20 [ 18.265814] [ 18.265843] The buggy address belongs to the object at fff00000c7941e80 [ 18.265843] which belongs to the cache kmalloc-64 of size 64 [ 18.265913] The buggy address is located 0 bytes to the right of [ 18.265913] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.266284] [ 18.266654] The buggy address belongs to the physical page: [ 18.266701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.266762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.266872] page_type: f5(slab) [ 18.267061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.267348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.267466] page dumped because: kasan: bad access detected [ 18.267592] [ 18.267615] Memory state around the buggy address: [ 18.267652] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.268084] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.268208] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.268451] ^ [ 18.268654] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.268876] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.269129] ================================================================== [ 18.467028] ================================================================== [ 18.467075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.467125] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.467177] [ 18.467206] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.467288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.467317] Hardware name: linux,dummy-virt (DT) [ 18.467349] Call trace: [ 18.467372] show_stack+0x20/0x38 (C) [ 18.467456] dump_stack_lvl+0x8c/0xd0 [ 18.467612] print_report+0x118/0x5d0 [ 18.467659] kasan_report+0xdc/0x128 [ 18.467708] __asan_report_load8_noabort+0x20/0x30 [ 18.467762] kasan_atomics_helper+0x3e20/0x4858 [ 18.467812] kasan_atomics+0x198/0x2e0 [ 18.467860] kunit_try_run_case+0x170/0x3f0 [ 18.467909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.468021] kthread+0x328/0x630 [ 18.468143] ret_from_fork+0x10/0x20 [ 18.468215] [ 18.468315] Allocated by task 266: [ 18.468349] kasan_save_stack+0x3c/0x68 [ 18.468391] kasan_save_track+0x20/0x40 [ 18.468438] kasan_save_alloc_info+0x40/0x58 [ 18.468881] __kasan_kmalloc+0xd4/0xd8 [ 18.469011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.469053] kasan_atomics+0xb8/0x2e0 [ 18.469103] kunit_try_run_case+0x170/0x3f0 [ 18.469183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.469316] kthread+0x328/0x630 [ 18.469528] ret_from_fork+0x10/0x20 [ 18.469575] [ 18.469597] The buggy address belongs to the object at fff00000c7941e80 [ 18.469597] which belongs to the cache kmalloc-64 of size 64 [ 18.469659] The buggy address is located 0 bytes to the right of [ 18.469659] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.469729] [ 18.469749] The buggy address belongs to the physical page: [ 18.469784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.469840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.469892] page_type: f5(slab) [ 18.469929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.469994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.470038] page dumped because: kasan: bad access detected [ 18.470073] [ 18.470133] Memory state around the buggy address: [ 18.470214] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.470290] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.470337] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.470482] ^ [ 18.470517] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.470562] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.470604] ================================================================== [ 18.373700] ================================================================== [ 18.373808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.373951] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.374018] [ 18.374050] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.374373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.374418] Hardware name: linux,dummy-virt (DT) [ 18.374626] Call trace: [ 18.374652] show_stack+0x20/0x38 (C) [ 18.374812] dump_stack_lvl+0x8c/0xd0 [ 18.374873] print_report+0x118/0x5d0 [ 18.375206] kasan_report+0xdc/0x128 [ 18.375316] kasan_check_range+0x100/0x1a8 [ 18.375367] __kasan_check_write+0x20/0x30 [ 18.375412] kasan_atomics_helper+0x126c/0x4858 [ 18.375649] kasan_atomics+0x198/0x2e0 [ 18.375856] kunit_try_run_case+0x170/0x3f0 [ 18.375940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.376129] kthread+0x328/0x630 [ 18.376180] ret_from_fork+0x10/0x20 [ 18.376236] [ 18.376440] Allocated by task 266: [ 18.376485] kasan_save_stack+0x3c/0x68 [ 18.376586] kasan_save_track+0x20/0x40 [ 18.376641] kasan_save_alloc_info+0x40/0x58 [ 18.376684] __kasan_kmalloc+0xd4/0xd8 [ 18.376729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.376769] kasan_atomics+0xb8/0x2e0 [ 18.377153] kunit_try_run_case+0x170/0x3f0 [ 18.377359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.377411] kthread+0x328/0x630 [ 18.377471] ret_from_fork+0x10/0x20 [ 18.377516] [ 18.377539] The buggy address belongs to the object at fff00000c7941e80 [ 18.377539] which belongs to the cache kmalloc-64 of size 64 [ 18.377601] The buggy address is located 0 bytes to the right of [ 18.377601] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.377827] [ 18.377946] The buggy address belongs to the physical page: [ 18.378155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.378299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.378469] page_type: f5(slab) [ 18.378542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.378615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.378863] page dumped because: kasan: bad access detected [ 18.378957] [ 18.379003] Memory state around the buggy address: [ 18.379044] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.379097] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.379141] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.379183] ^ [ 18.379219] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.379264] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.379386] ================================================================== [ 18.449202] ================================================================== [ 18.449257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.449309] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.449362] [ 18.449402] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.449486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.449515] Hardware name: linux,dummy-virt (DT) [ 18.449550] Call trace: [ 18.449577] show_stack+0x20/0x38 (C) [ 18.449626] dump_stack_lvl+0x8c/0xd0 [ 18.449687] print_report+0x118/0x5d0 [ 18.449753] kasan_report+0xdc/0x128 [ 18.449800] __asan_report_load8_noabort+0x20/0x30 [ 18.450134] kasan_atomics_helper+0x3df4/0x4858 [ 18.450206] kasan_atomics+0x198/0x2e0 [ 18.450440] kunit_try_run_case+0x170/0x3f0 [ 18.450691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.450967] kthread+0x328/0x630 [ 18.451021] ret_from_fork+0x10/0x20 [ 18.451069] [ 18.451089] Allocated by task 266: [ 18.451118] kasan_save_stack+0x3c/0x68 [ 18.451160] kasan_save_track+0x20/0x40 [ 18.451198] kasan_save_alloc_info+0x40/0x58 [ 18.451240] __kasan_kmalloc+0xd4/0xd8 [ 18.451277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.451318] kasan_atomics+0xb8/0x2e0 [ 18.451363] kunit_try_run_case+0x170/0x3f0 [ 18.451404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.451454] kthread+0x328/0x630 [ 18.451489] ret_from_fork+0x10/0x20 [ 18.451525] [ 18.451544] The buggy address belongs to the object at fff00000c7941e80 [ 18.451544] which belongs to the cache kmalloc-64 of size 64 [ 18.451604] The buggy address is located 0 bytes to the right of [ 18.451604] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.451822] [ 18.451844] The buggy address belongs to the physical page: [ 18.451884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.452005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.452055] page_type: f5(slab) [ 18.452094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.452147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.452192] page dumped because: kasan: bad access detected [ 18.452322] [ 18.452371] Memory state around the buggy address: [ 18.452403] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.452450] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.452502] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.452636] ^ [ 18.452672] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.452719] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.452816] ================================================================== [ 18.395907] ================================================================== [ 18.396015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.396159] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.396213] [ 18.396283] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.396476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.396522] Hardware name: linux,dummy-virt (DT) [ 18.396611] Call trace: [ 18.396842] show_stack+0x20/0x38 (C) [ 18.397164] dump_stack_lvl+0x8c/0xd0 [ 18.397449] print_report+0x118/0x5d0 [ 18.397514] kasan_report+0xdc/0x128 [ 18.397575] __asan_report_load8_noabort+0x20/0x30 [ 18.398023] kasan_atomics_helper+0x3f04/0x4858 [ 18.398131] kasan_atomics+0x198/0x2e0 [ 18.398346] kunit_try_run_case+0x170/0x3f0 [ 18.398459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.398530] kthread+0x328/0x630 [ 18.398572] ret_from_fork+0x10/0x20 [ 18.398648] [ 18.398692] Allocated by task 266: [ 18.398734] kasan_save_stack+0x3c/0x68 [ 18.398786] kasan_save_track+0x20/0x40 [ 18.398826] kasan_save_alloc_info+0x40/0x58 [ 18.398876] __kasan_kmalloc+0xd4/0xd8 [ 18.398925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.398974] kasan_atomics+0xb8/0x2e0 [ 18.399023] kunit_try_run_case+0x170/0x3f0 [ 18.399061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.399107] kthread+0x328/0x630 [ 18.399140] ret_from_fork+0x10/0x20 [ 18.399176] [ 18.399198] The buggy address belongs to the object at fff00000c7941e80 [ 18.399198] which belongs to the cache kmalloc-64 of size 64 [ 18.399259] The buggy address is located 0 bytes to the right of [ 18.399259] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.399328] [ 18.399348] The buggy address belongs to the physical page: [ 18.399400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.399463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.399512] page_type: f5(slab) [ 18.399561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.399624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.399669] page dumped because: kasan: bad access detected [ 18.399704] [ 18.399724] Memory state around the buggy address: [ 18.399767] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.399812] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.399872] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.399913] ^ [ 18.399953] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.400008] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.400048] ================================================================== [ 18.348056] ================================================================== [ 18.348141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.348195] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.348419] [ 18.348497] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.348623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.348671] Hardware name: linux,dummy-virt (DT) [ 18.348705] Call trace: [ 18.348755] show_stack+0x20/0x38 (C) [ 18.349041] dump_stack_lvl+0x8c/0xd0 [ 18.349211] print_report+0x118/0x5d0 [ 18.349265] kasan_report+0xdc/0x128 [ 18.349576] kasan_check_range+0x100/0x1a8 [ 18.349670] __kasan_check_write+0x20/0x30 [ 18.349949] kasan_atomics_helper+0x1128/0x4858 [ 18.350111] kasan_atomics+0x198/0x2e0 [ 18.350284] kunit_try_run_case+0x170/0x3f0 [ 18.350414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.350596] kthread+0x328/0x630 [ 18.350641] ret_from_fork+0x10/0x20 [ 18.350993] [ 18.351037] Allocated by task 266: [ 18.351167] kasan_save_stack+0x3c/0x68 [ 18.351343] kasan_save_track+0x20/0x40 [ 18.351630] kasan_save_alloc_info+0x40/0x58 [ 18.351823] __kasan_kmalloc+0xd4/0xd8 [ 18.351922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.352005] kasan_atomics+0xb8/0x2e0 [ 18.352050] kunit_try_run_case+0x170/0x3f0 [ 18.352276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.352480] kthread+0x328/0x630 [ 18.352958] ret_from_fork+0x10/0x20 [ 18.353159] [ 18.353259] The buggy address belongs to the object at fff00000c7941e80 [ 18.353259] which belongs to the cache kmalloc-64 of size 64 [ 18.353492] The buggy address is located 0 bytes to the right of [ 18.353492] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.353631] [ 18.353694] The buggy address belongs to the physical page: [ 18.353833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.353937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.354321] page_type: f5(slab) [ 18.354365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.354630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.355071] page dumped because: kasan: bad access detected [ 18.355255] [ 18.355355] Memory state around the buggy address: [ 18.355521] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.355571] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.355776] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.356151] ^ [ 18.356274] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.356474] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.356534] ================================================================== [ 18.470849] ================================================================== [ 18.470899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.470948] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.471016] [ 18.471047] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.471129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.471158] Hardware name: linux,dummy-virt (DT) [ 18.471190] Call trace: [ 18.471213] show_stack+0x20/0x38 (C) [ 18.471261] dump_stack_lvl+0x8c/0xd0 [ 18.471308] print_report+0x118/0x5d0 [ 18.471364] kasan_report+0xdc/0x128 [ 18.471605] kasan_check_range+0x100/0x1a8 [ 18.471742] __kasan_check_write+0x20/0x30 [ 18.471841] kasan_atomics_helper+0x17ec/0x4858 [ 18.472008] kasan_atomics+0x198/0x2e0 [ 18.472054] kunit_try_run_case+0x170/0x3f0 [ 18.472101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.472154] kthread+0x328/0x630 [ 18.472198] ret_from_fork+0x10/0x20 [ 18.472244] [ 18.472265] Allocated by task 266: [ 18.472292] kasan_save_stack+0x3c/0x68 [ 18.472334] kasan_save_track+0x20/0x40 [ 18.472373] kasan_save_alloc_info+0x40/0x58 [ 18.472415] __kasan_kmalloc+0xd4/0xd8 [ 18.472452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.472538] kasan_atomics+0xb8/0x2e0 [ 18.473035] kunit_try_run_case+0x170/0x3f0 [ 18.473084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.473130] kthread+0x328/0x630 [ 18.473164] ret_from_fork+0x10/0x20 [ 18.473200] [ 18.473223] The buggy address belongs to the object at fff00000c7941e80 [ 18.473223] which belongs to the cache kmalloc-64 of size 64 [ 18.473283] The buggy address is located 0 bytes to the right of [ 18.473283] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.473351] [ 18.473371] The buggy address belongs to the physical page: [ 18.473404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.473459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.473509] page_type: f5(slab) [ 18.473546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.473600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.473644] page dumped because: kasan: bad access detected [ 18.473678] [ 18.473699] Memory state around the buggy address: [ 18.473732] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.473779] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.473824] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.473866] ^ [ 18.473899] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.473945] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.474048] ================================================================== [ 18.410385] ================================================================== [ 18.410567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.410621] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.410673] [ 18.410801] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.411094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.411237] Hardware name: linux,dummy-virt (DT) [ 18.411273] Call trace: [ 18.411328] show_stack+0x20/0x38 (C) [ 18.411410] dump_stack_lvl+0x8c/0xd0 [ 18.411469] print_report+0x118/0x5d0 [ 18.411668] kasan_report+0xdc/0x128 [ 18.411740] kasan_check_range+0x100/0x1a8 [ 18.411828] __kasan_check_write+0x20/0x30 [ 18.411915] kasan_atomics_helper+0x147c/0x4858 [ 18.412043] kasan_atomics+0x198/0x2e0 [ 18.412106] kunit_try_run_case+0x170/0x3f0 [ 18.412155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.412214] kthread+0x328/0x630 [ 18.412382] ret_from_fork+0x10/0x20 [ 18.412533] [ 18.412578] Allocated by task 266: [ 18.412617] kasan_save_stack+0x3c/0x68 [ 18.412671] kasan_save_track+0x20/0x40 [ 18.412867] kasan_save_alloc_info+0x40/0x58 [ 18.413079] __kasan_kmalloc+0xd4/0xd8 [ 18.413272] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.413378] kasan_atomics+0xb8/0x2e0 [ 18.413512] kunit_try_run_case+0x170/0x3f0 [ 18.413555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.413725] kthread+0x328/0x630 [ 18.413897] ret_from_fork+0x10/0x20 [ 18.414048] [ 18.414116] The buggy address belongs to the object at fff00000c7941e80 [ 18.414116] which belongs to the cache kmalloc-64 of size 64 [ 18.414333] The buggy address is located 0 bytes to the right of [ 18.414333] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.414538] [ 18.414618] The buggy address belongs to the physical page: [ 18.414690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.414747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.414797] page_type: f5(slab) [ 18.415031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.415157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.415257] page dumped because: kasan: bad access detected [ 18.415585] [ 18.415655] Memory state around the buggy address: [ 18.415694] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.416006] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.416062] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.416265] ^ [ 18.416423] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.416480] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.416638] ================================================================== [ 18.444555] ================================================================== [ 18.444599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.444762] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.444856] [ 18.444915] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.445019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.445049] Hardware name: linux,dummy-virt (DT) [ 18.445080] Call trace: [ 18.445105] show_stack+0x20/0x38 (C) [ 18.445152] dump_stack_lvl+0x8c/0xd0 [ 18.445201] print_report+0x118/0x5d0 [ 18.445247] kasan_report+0xdc/0x128 [ 18.445294] kasan_check_range+0x100/0x1a8 [ 18.445344] __kasan_check_write+0x20/0x30 [ 18.445405] kasan_atomics_helper+0x1644/0x4858 [ 18.445455] kasan_atomics+0x198/0x2e0 [ 18.445514] kunit_try_run_case+0x170/0x3f0 [ 18.445562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.445664] kthread+0x328/0x630 [ 18.445821] ret_from_fork+0x10/0x20 [ 18.445877] [ 18.445897] Allocated by task 266: [ 18.445927] kasan_save_stack+0x3c/0x68 [ 18.445967] kasan_save_track+0x20/0x40 [ 18.446021] kasan_save_alloc_info+0x40/0x58 [ 18.446062] __kasan_kmalloc+0xd4/0xd8 [ 18.446101] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.446141] kasan_atomics+0xb8/0x2e0 [ 18.446278] kunit_try_run_case+0x170/0x3f0 [ 18.446444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.446536] kthread+0x328/0x630 [ 18.446570] ret_from_fork+0x10/0x20 [ 18.446607] [ 18.446629] The buggy address belongs to the object at fff00000c7941e80 [ 18.446629] which belongs to the cache kmalloc-64 of size 64 [ 18.446690] The buggy address is located 0 bytes to the right of [ 18.446690] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.446768] [ 18.446789] The buggy address belongs to the physical page: [ 18.446823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.446877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.446929] page_type: f5(slab) [ 18.446970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.447034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.447203] page dumped because: kasan: bad access detected [ 18.447273] [ 18.447294] Memory state around the buggy address: [ 18.447327] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.447417] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.447483] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.447526] ^ [ 18.447569] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.447825] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.448461] ================================================================== [ 18.385608] ================================================================== [ 18.385702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.385752] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.385805] [ 18.385836] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.386792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.387069] Hardware name: linux,dummy-virt (DT) [ 18.387122] Call trace: [ 18.387294] show_stack+0x20/0x38 (C) [ 18.387600] dump_stack_lvl+0x8c/0xd0 [ 18.387711] print_report+0x118/0x5d0 [ 18.387848] kasan_report+0xdc/0x128 [ 18.388121] kasan_check_range+0x100/0x1a8 [ 18.388179] __kasan_check_write+0x20/0x30 [ 18.388408] kasan_atomics_helper+0x1384/0x4858 [ 18.388620] kasan_atomics+0x198/0x2e0 [ 18.389133] kunit_try_run_case+0x170/0x3f0 [ 18.389345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.389468] kthread+0x328/0x630 [ 18.389559] ret_from_fork+0x10/0x20 [ 18.389616] [ 18.389794] Allocated by task 266: [ 18.389867] kasan_save_stack+0x3c/0x68 [ 18.389914] kasan_save_track+0x20/0x40 [ 18.389955] kasan_save_alloc_info+0x40/0x58 [ 18.390148] __kasan_kmalloc+0xd4/0xd8 [ 18.390483] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.390664] kasan_atomics+0xb8/0x2e0 [ 18.390905] kunit_try_run_case+0x170/0x3f0 [ 18.391027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.391426] kthread+0x328/0x630 [ 18.391585] ret_from_fork+0x10/0x20 [ 18.391684] [ 18.391780] The buggy address belongs to the object at fff00000c7941e80 [ 18.391780] which belongs to the cache kmalloc-64 of size 64 [ 18.392055] The buggy address is located 0 bytes to the right of [ 18.392055] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.392172] [ 18.392194] The buggy address belongs to the physical page: [ 18.392229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.392582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.392853] page_type: f5(slab) [ 18.392900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.393072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.393171] page dumped because: kasan: bad access detected [ 18.393207] [ 18.393227] Memory state around the buggy address: [ 18.393289] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.393336] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.393607] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.393834] ^ [ 18.394143] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394327] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394438] ================================================================== [ 18.332599] ================================================================== [ 18.332946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.333057] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.333119] [ 18.333149] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.333234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.333280] Hardware name: linux,dummy-virt (DT) [ 18.333509] Call trace: [ 18.333644] show_stack+0x20/0x38 (C) [ 18.333908] dump_stack_lvl+0x8c/0xd0 [ 18.334088] print_report+0x118/0x5d0 [ 18.334198] kasan_report+0xdc/0x128 [ 18.334245] kasan_check_range+0x100/0x1a8 [ 18.334308] __kasan_check_write+0x20/0x30 [ 18.334715] kasan_atomics_helper+0x1058/0x4858 [ 18.334847] kasan_atomics+0x198/0x2e0 [ 18.335141] kunit_try_run_case+0x170/0x3f0 [ 18.335256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.335391] kthread+0x328/0x630 [ 18.335591] ret_from_fork+0x10/0x20 [ 18.335746] [ 18.335790] Allocated by task 266: [ 18.336003] kasan_save_stack+0x3c/0x68 [ 18.336098] kasan_save_track+0x20/0x40 [ 18.336172] kasan_save_alloc_info+0x40/0x58 [ 18.336325] __kasan_kmalloc+0xd4/0xd8 [ 18.336595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.336814] kasan_atomics+0xb8/0x2e0 [ 18.336916] kunit_try_run_case+0x170/0x3f0 [ 18.337087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.337237] kthread+0x328/0x630 [ 18.337297] ret_from_fork+0x10/0x20 [ 18.337646] [ 18.337799] The buggy address belongs to the object at fff00000c7941e80 [ 18.337799] which belongs to the cache kmalloc-64 of size 64 [ 18.338019] The buggy address is located 0 bytes to the right of [ 18.338019] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.338185] [ 18.338334] The buggy address belongs to the physical page: [ 18.338400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.338739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.338820] page_type: f5(slab) [ 18.338966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.339071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.339398] page dumped because: kasan: bad access detected [ 18.339481] [ 18.339672] Memory state around the buggy address: [ 18.339713] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.339766] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.340065] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.340319] ^ [ 18.340648] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.340763] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.340805] ================================================================== [ 18.311207] ================================================================== [ 18.311388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.311452] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266 [ 18.311562] [ 18.311621] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.312079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.312149] Hardware name: linux,dummy-virt (DT) [ 18.312193] Call trace: [ 18.312309] show_stack+0x20/0x38 (C) [ 18.312384] dump_stack_lvl+0x8c/0xd0 [ 18.312573] print_report+0x118/0x5d0 [ 18.312627] kasan_report+0xdc/0x128 [ 18.312673] kasan_check_range+0x100/0x1a8 [ 18.312791] __kasan_check_write+0x20/0x30 [ 18.312856] kasan_atomics_helper+0xf20/0x4858 [ 18.312905] kasan_atomics+0x198/0x2e0 [ 18.312956] kunit_try_run_case+0x170/0x3f0 [ 18.313231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.313363] kthread+0x328/0x630 [ 18.313608] ret_from_fork+0x10/0x20 [ 18.313779] [ 18.313882] Allocated by task 266: [ 18.313972] kasan_save_stack+0x3c/0x68 [ 18.314100] kasan_save_track+0x20/0x40 [ 18.314287] kasan_save_alloc_info+0x40/0x58 [ 18.314415] __kasan_kmalloc+0xd4/0xd8 [ 18.314461] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.314728] kasan_atomics+0xb8/0x2e0 [ 18.314863] kunit_try_run_case+0x170/0x3f0 [ 18.315139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.315266] kthread+0x328/0x630 [ 18.315337] ret_from_fork+0x10/0x20 [ 18.315416] [ 18.315590] The buggy address belongs to the object at fff00000c7941e80 [ 18.315590] which belongs to the cache kmalloc-64 of size 64 [ 18.315946] The buggy address is located 0 bytes to the right of [ 18.315946] allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0) [ 18.316083] [ 18.316155] The buggy address belongs to the physical page: [ 18.316566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941 [ 18.316703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.316958] page_type: f5(slab) [ 18.317229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.317310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.317506] page dumped because: kasan: bad access detected [ 18.317629] [ 18.317756] Memory state around the buggy address: [ 18.317816] fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.318031] fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.318132] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.318314] ^ [ 18.318401] fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.318458] fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.318534] ==================================================================
[ 16.044415] ================================================================== [ 16.044761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 16.045075] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.045409] [ 16.045533] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.045596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.045610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.045632] Call Trace: [ 16.045648] <TASK> [ 16.045674] dump_stack_lvl+0x73/0xb0 [ 16.045703] print_report+0xd1/0x610 [ 16.045727] ? __virt_addr_valid+0x1db/0x2d0 [ 16.045760] ? kasan_atomics_helper+0xe78/0x5450 [ 16.045783] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.045809] ? kasan_atomics_helper+0xe78/0x5450 [ 16.045842] kasan_report+0x141/0x180 [ 16.045866] ? kasan_atomics_helper+0xe78/0x5450 [ 16.045894] kasan_check_range+0x10c/0x1c0 [ 16.045927] __kasan_check_write+0x18/0x20 [ 16.045949] kasan_atomics_helper+0xe78/0x5450 [ 16.045973] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.046008] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.046034] ? trace_hardirqs_on+0x37/0xe0 [ 16.046066] ? kasan_atomics+0x152/0x310 [ 16.046094] kasan_atomics+0x1dc/0x310 [ 16.046118] ? __pfx_kasan_atomics+0x10/0x10 [ 16.046154] ? __pfx_kasan_atomics+0x10/0x10 [ 16.046182] kunit_try_run_case+0x1a5/0x480 [ 16.046208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.046232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.046258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.046284] ? __kthread_parkme+0x82/0x180 [ 16.046306] ? preempt_count_sub+0x50/0x80 [ 16.046330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.046356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.046391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.046429] kthread+0x337/0x6f0 [ 16.046450] ? trace_preempt_on+0x20/0xc0 [ 16.046483] ? __pfx_kthread+0x10/0x10 [ 16.046506] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.046529] ? calculate_sigpending+0x7b/0xa0 [ 16.046563] ? __pfx_kthread+0x10/0x10 [ 16.046586] ret_from_fork+0x116/0x1d0 [ 16.046606] ? __pfx_kthread+0x10/0x10 [ 16.046629] ret_from_fork_asm+0x1a/0x30 [ 16.046660] </TASK> [ 16.046672] [ 16.064248] Allocated by task 282: [ 16.064791] kasan_save_stack+0x45/0x70 [ 16.065300] kasan_save_track+0x18/0x40 [ 16.065695] kasan_save_alloc_info+0x3b/0x50 [ 16.066241] __kasan_kmalloc+0xb7/0xc0 [ 16.066444] __kmalloc_cache_noprof+0x189/0x420 [ 16.066860] kasan_atomics+0x95/0x310 [ 16.067321] kunit_try_run_case+0x1a5/0x480 [ 16.067777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.067967] kthread+0x337/0x6f0 [ 16.068101] ret_from_fork+0x116/0x1d0 [ 16.068240] ret_from_fork_asm+0x1a/0x30 [ 16.068383] [ 16.068574] The buggy address belongs to the object at ffff888102a5fe80 [ 16.068574] which belongs to the cache kmalloc-64 of size 64 [ 16.070096] The buggy address is located 0 bytes to the right of [ 16.070096] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.071468] [ 16.071810] The buggy address belongs to the physical page: [ 16.072432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.072948] flags: 0x200000000000000(node=0|zone=2) [ 16.073123] page_type: f5(slab) [ 16.073247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.073837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.074701] page dumped because: kasan: bad access detected [ 16.075520] [ 16.075861] Memory state around the buggy address: [ 16.076404] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077048] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077534] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.077770] ^ [ 16.077928] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.078144] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.078359] ================================================================== [ 15.983174] ================================================================== [ 15.983746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.984099] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.984574] [ 15.984696] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.984755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.984768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.984792] Call Trace: [ 15.984816] <TASK> [ 15.984831] dump_stack_lvl+0x73/0xb0 [ 15.984863] print_report+0xd1/0x610 [ 15.984886] ? __virt_addr_valid+0x1db/0x2d0 [ 15.984920] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.984944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.984980] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.985003] kasan_report+0x141/0x180 [ 15.985028] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.985056] __asan_report_load4_noabort+0x18/0x20 [ 15.985083] kasan_atomics_helper+0x4a84/0x5450 [ 15.985108] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.985133] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.985169] ? trace_hardirqs_on+0x37/0xe0 [ 15.985192] ? kasan_atomics+0x152/0x310 [ 15.985230] kasan_atomics+0x1dc/0x310 [ 15.985254] ? __pfx_kasan_atomics+0x10/0x10 [ 15.985280] ? __pfx_kasan_atomics+0x10/0x10 [ 15.985473] kunit_try_run_case+0x1a5/0x480 [ 15.985521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.985547] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.985594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.985620] ? __kthread_parkme+0x82/0x180 [ 15.985643] ? preempt_count_sub+0x50/0x80 [ 15.985668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.985694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.985721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.985748] kthread+0x337/0x6f0 [ 15.985769] ? trace_preempt_on+0x20/0xc0 [ 15.985793] ? __pfx_kthread+0x10/0x10 [ 15.985815] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.985838] ? calculate_sigpending+0x7b/0xa0 [ 15.985863] ? __pfx_kthread+0x10/0x10 [ 15.985897] ret_from_fork+0x116/0x1d0 [ 15.985917] ? __pfx_kthread+0x10/0x10 [ 15.985940] ret_from_fork_asm+0x1a/0x30 [ 15.985983] </TASK> [ 15.985995] [ 15.994698] Allocated by task 282: [ 15.994930] kasan_save_stack+0x45/0x70 [ 15.995148] kasan_save_track+0x18/0x40 [ 15.995486] kasan_save_alloc_info+0x3b/0x50 [ 15.995666] __kasan_kmalloc+0xb7/0xc0 [ 15.995883] __kmalloc_cache_noprof+0x189/0x420 [ 15.996140] kasan_atomics+0x95/0x310 [ 15.996379] kunit_try_run_case+0x1a5/0x480 [ 15.996527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.996713] kthread+0x337/0x6f0 [ 15.996881] ret_from_fork+0x116/0x1d0 [ 15.997181] ret_from_fork_asm+0x1a/0x30 [ 15.997366] [ 15.997439] The buggy address belongs to the object at ffff888102a5fe80 [ 15.997439] which belongs to the cache kmalloc-64 of size 64 [ 15.998228] The buggy address is located 0 bytes to the right of [ 15.998228] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.998983] [ 15.999060] The buggy address belongs to the physical page: [ 15.999443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.999826] flags: 0x200000000000000(node=0|zone=2) [ 16.000074] page_type: f5(slab) [ 16.000234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.000756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.001075] page dumped because: kasan: bad access detected [ 16.001439] [ 16.001533] Memory state around the buggy address: [ 16.001761] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.002016] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.002244] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.002832] ^ [ 16.003076] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.003464] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.003755] ================================================================== [ 16.282990] ================================================================== [ 16.283796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 16.284356] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.285177] [ 16.285413] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.285540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.285661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.285686] Call Trace: [ 16.285703] <TASK> [ 16.285733] dump_stack_lvl+0x73/0xb0 [ 16.285765] print_report+0xd1/0x610 [ 16.285795] ? __virt_addr_valid+0x1db/0x2d0 [ 16.285820] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.285843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.285868] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.285892] kasan_report+0x141/0x180 [ 16.285915] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.285943] __asan_report_load4_noabort+0x18/0x20 [ 16.285970] kasan_atomics_helper+0x49e8/0x5450 [ 16.285994] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.286018] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.286045] ? trace_hardirqs_on+0x37/0xe0 [ 16.286069] ? kasan_atomics+0x152/0x310 [ 16.286097] kasan_atomics+0x1dc/0x310 [ 16.286120] ? __pfx_kasan_atomics+0x10/0x10 [ 16.286145] ? __pfx_kasan_atomics+0x10/0x10 [ 16.286173] kunit_try_run_case+0x1a5/0x480 [ 16.286199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.286250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.286276] ? __kthread_parkme+0x82/0x180 [ 16.286299] ? preempt_count_sub+0x50/0x80 [ 16.286324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.286377] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.286404] kthread+0x337/0x6f0 [ 16.286458] ? trace_preempt_on+0x20/0xc0 [ 16.286481] ? __pfx_kthread+0x10/0x10 [ 16.286503] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.286526] ? calculate_sigpending+0x7b/0xa0 [ 16.286562] ? __pfx_kthread+0x10/0x10 [ 16.286585] ret_from_fork+0x116/0x1d0 [ 16.286605] ? __pfx_kthread+0x10/0x10 [ 16.286627] ret_from_fork_asm+0x1a/0x30 [ 16.286659] </TASK> [ 16.286669] [ 16.299062] Allocated by task 282: [ 16.299421] kasan_save_stack+0x45/0x70 [ 16.299632] kasan_save_track+0x18/0x40 [ 16.299811] kasan_save_alloc_info+0x3b/0x50 [ 16.300005] __kasan_kmalloc+0xb7/0xc0 [ 16.300184] __kmalloc_cache_noprof+0x189/0x420 [ 16.300388] kasan_atomics+0x95/0x310 [ 16.301010] kunit_try_run_case+0x1a5/0x480 [ 16.301283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.301753] kthread+0x337/0x6f0 [ 16.302111] ret_from_fork+0x116/0x1d0 [ 16.302427] ret_from_fork_asm+0x1a/0x30 [ 16.302836] [ 16.302942] The buggy address belongs to the object at ffff888102a5fe80 [ 16.302942] which belongs to the cache kmalloc-64 of size 64 [ 16.303402] The buggy address is located 0 bytes to the right of [ 16.303402] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.304157] [ 16.304249] The buggy address belongs to the physical page: [ 16.304803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.305273] flags: 0x200000000000000(node=0|zone=2) [ 16.305706] page_type: f5(slab) [ 16.306001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.306261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.306766] page dumped because: kasan: bad access detected [ 16.307244] [ 16.307352] Memory state around the buggy address: [ 16.307720] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.307947] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.308175] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.308390] ^ [ 16.308547] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.309228] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.309511] ================================================================== [ 16.918740] ================================================================== [ 16.919829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.920105] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.920324] [ 16.920410] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.920455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.920469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.920491] Call Trace: [ 16.920506] <TASK> [ 16.920521] dump_stack_lvl+0x73/0xb0 [ 16.920562] print_report+0xd1/0x610 [ 16.920586] ? __virt_addr_valid+0x1db/0x2d0 [ 16.920610] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.920632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.920679] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.920716] kasan_report+0x141/0x180 [ 16.920753] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.920782] __asan_report_load8_noabort+0x18/0x20 [ 16.920809] kasan_atomics_helper+0x4f98/0x5450 [ 16.920833] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.920858] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.920883] ? trace_hardirqs_on+0x37/0xe0 [ 16.920907] ? kasan_atomics+0x152/0x310 [ 16.920935] kasan_atomics+0x1dc/0x310 [ 16.920959] ? __pfx_kasan_atomics+0x10/0x10 [ 16.920984] ? __pfx_kasan_atomics+0x10/0x10 [ 16.921012] kunit_try_run_case+0x1a5/0x480 [ 16.921052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.921091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.921117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.921143] ? __kthread_parkme+0x82/0x180 [ 16.921166] ? preempt_count_sub+0x50/0x80 [ 16.921191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.921217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.921244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.921272] kthread+0x337/0x6f0 [ 16.921292] ? trace_preempt_on+0x20/0xc0 [ 16.921316] ? __pfx_kthread+0x10/0x10 [ 16.921339] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.921363] ? calculate_sigpending+0x7b/0xa0 [ 16.921388] ? __pfx_kthread+0x10/0x10 [ 16.921421] ret_from_fork+0x116/0x1d0 [ 16.921444] ? __pfx_kthread+0x10/0x10 [ 16.921465] ret_from_fork_asm+0x1a/0x30 [ 16.921497] </TASK> [ 16.921508] [ 16.928867] Allocated by task 282: [ 16.929041] kasan_save_stack+0x45/0x70 [ 16.929240] kasan_save_track+0x18/0x40 [ 16.929470] kasan_save_alloc_info+0x3b/0x50 [ 16.929674] __kasan_kmalloc+0xb7/0xc0 [ 16.929874] __kmalloc_cache_noprof+0x189/0x420 [ 16.930117] kasan_atomics+0x95/0x310 [ 16.930306] kunit_try_run_case+0x1a5/0x480 [ 16.930502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.930757] kthread+0x337/0x6f0 [ 16.930925] ret_from_fork+0x116/0x1d0 [ 16.931130] ret_from_fork_asm+0x1a/0x30 [ 16.931357] [ 16.931483] The buggy address belongs to the object at ffff888102a5fe80 [ 16.931483] which belongs to the cache kmalloc-64 of size 64 [ 16.932024] The buggy address is located 0 bytes to the right of [ 16.932024] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.932643] [ 16.932740] The buggy address belongs to the physical page: [ 16.932987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.933320] flags: 0x200000000000000(node=0|zone=2) [ 16.933503] page_type: f5(slab) [ 16.933665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.934021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.934351] page dumped because: kasan: bad access detected [ 16.934587] [ 16.934655] Memory state around the buggy address: [ 16.934837] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.935174] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.935540] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.935791] ^ [ 16.936028] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.936333] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.936673] ================================================================== [ 16.548421] ================================================================== [ 16.548825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.549189] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.549562] [ 16.549756] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.549800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.549815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.549836] Call Trace: [ 16.549850] <TASK> [ 16.549866] dump_stack_lvl+0x73/0xb0 [ 16.549894] print_report+0xd1/0x610 [ 16.549917] ? __virt_addr_valid+0x1db/0x2d0 [ 16.549941] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.549964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.549990] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.550035] kasan_report+0x141/0x180 [ 16.550059] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.550087] kasan_check_range+0x10c/0x1c0 [ 16.550113] __kasan_check_write+0x18/0x20 [ 16.550134] kasan_atomics_helper+0x16e7/0x5450 [ 16.550159] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.550183] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.550210] ? trace_hardirqs_on+0x37/0xe0 [ 16.550233] ? kasan_atomics+0x152/0x310 [ 16.550260] kasan_atomics+0x1dc/0x310 [ 16.550284] ? __pfx_kasan_atomics+0x10/0x10 [ 16.550309] ? __pfx_kasan_atomics+0x10/0x10 [ 16.550337] kunit_try_run_case+0x1a5/0x480 [ 16.550363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.550387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.550413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.550439] ? __kthread_parkme+0x82/0x180 [ 16.550460] ? preempt_count_sub+0x50/0x80 [ 16.550486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.550538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.550576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.550603] kthread+0x337/0x6f0 [ 16.550624] ? trace_preempt_on+0x20/0xc0 [ 16.550649] ? __pfx_kthread+0x10/0x10 [ 16.550671] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.550694] ? calculate_sigpending+0x7b/0xa0 [ 16.550719] ? __pfx_kthread+0x10/0x10 [ 16.550742] ret_from_fork+0x116/0x1d0 [ 16.550762] ? __pfx_kthread+0x10/0x10 [ 16.550784] ret_from_fork_asm+0x1a/0x30 [ 16.550816] </TASK> [ 16.550827] [ 16.558583] Allocated by task 282: [ 16.558864] kasan_save_stack+0x45/0x70 [ 16.559053] kasan_save_track+0x18/0x40 [ 16.559229] kasan_save_alloc_info+0x3b/0x50 [ 16.559471] __kasan_kmalloc+0xb7/0xc0 [ 16.559626] __kmalloc_cache_noprof+0x189/0x420 [ 16.559845] kasan_atomics+0x95/0x310 [ 16.560034] kunit_try_run_case+0x1a5/0x480 [ 16.560259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.560523] kthread+0x337/0x6f0 [ 16.560676] ret_from_fork+0x116/0x1d0 [ 16.560886] ret_from_fork_asm+0x1a/0x30 [ 16.561052] [ 16.561154] The buggy address belongs to the object at ffff888102a5fe80 [ 16.561154] which belongs to the cache kmalloc-64 of size 64 [ 16.561618] The buggy address is located 0 bytes to the right of [ 16.561618] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.561975] [ 16.562044] The buggy address belongs to the physical page: [ 16.562280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.562648] flags: 0x200000000000000(node=0|zone=2) [ 16.562879] page_type: f5(slab) [ 16.563067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.563517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.563744] page dumped because: kasan: bad access detected [ 16.563922] [ 16.564019] Memory state around the buggy address: [ 16.564274] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.564629] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.565026] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.565262] ^ [ 16.565426] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.565783] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.566095] ================================================================== [ 15.882041] ================================================================== [ 15.882452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.882690] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.883129] [ 15.883224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.883323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.883337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.883371] Call Trace: [ 15.883387] <TASK> [ 15.883403] dump_stack_lvl+0x73/0xb0 [ 15.883453] print_report+0xd1/0x610 [ 15.883476] ? __virt_addr_valid+0x1db/0x2d0 [ 15.883507] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.883531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.883574] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.883598] kasan_report+0x141/0x180 [ 15.883621] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.883649] kasan_check_range+0x10c/0x1c0 [ 15.883674] __kasan_check_write+0x18/0x20 [ 15.883696] kasan_atomics_helper+0xa2b/0x5450 [ 15.883720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.883745] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.883780] ? trace_hardirqs_on+0x37/0xe0 [ 15.883804] ? kasan_atomics+0x152/0x310 [ 15.883842] kasan_atomics+0x1dc/0x310 [ 15.883866] ? __pfx_kasan_atomics+0x10/0x10 [ 15.883892] ? __pfx_kasan_atomics+0x10/0x10 [ 15.883919] kunit_try_run_case+0x1a5/0x480 [ 15.883945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.883971] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.883996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.884022] ? __kthread_parkme+0x82/0x180 [ 15.884044] ? preempt_count_sub+0x50/0x80 [ 15.884077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.884104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.884130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.884157] kthread+0x337/0x6f0 [ 15.884177] ? trace_preempt_on+0x20/0xc0 [ 15.884201] ? __pfx_kthread+0x10/0x10 [ 15.884222] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.884426] ? calculate_sigpending+0x7b/0xa0 [ 15.884463] ? __pfx_kthread+0x10/0x10 [ 15.884486] ret_from_fork+0x116/0x1d0 [ 15.884520] ? __pfx_kthread+0x10/0x10 [ 15.884542] ret_from_fork_asm+0x1a/0x30 [ 15.884583] </TASK> [ 15.884594] [ 15.894235] Allocated by task 282: [ 15.894371] kasan_save_stack+0x45/0x70 [ 15.894518] kasan_save_track+0x18/0x40 [ 15.895023] kasan_save_alloc_info+0x3b/0x50 [ 15.895573] __kasan_kmalloc+0xb7/0xc0 [ 15.895933] __kmalloc_cache_noprof+0x189/0x420 [ 15.896527] kasan_atomics+0x95/0x310 [ 15.896998] kunit_try_run_case+0x1a5/0x480 [ 15.897447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.897999] kthread+0x337/0x6f0 [ 15.898512] ret_from_fork+0x116/0x1d0 [ 15.899084] ret_from_fork_asm+0x1a/0x30 [ 15.899597] [ 15.899789] The buggy address belongs to the object at ffff888102a5fe80 [ 15.899789] which belongs to the cache kmalloc-64 of size 64 [ 15.900912] The buggy address is located 0 bytes to the right of [ 15.900912] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.901959] [ 15.902123] The buggy address belongs to the physical page: [ 15.902659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.902909] flags: 0x200000000000000(node=0|zone=2) [ 15.903076] page_type: f5(slab) [ 15.903199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.903989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.904897] page dumped because: kasan: bad access detected [ 15.905488] [ 15.905664] Memory state around the buggy address: [ 15.906098] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.906880] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.907696] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.908102] ^ [ 15.908411] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.909124] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.909837] ================================================================== [ 16.079495] ================================================================== [ 16.080148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 16.080811] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.081505] [ 16.081718] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.081766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.081779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.081815] Call Trace: [ 16.081832] <TASK> [ 16.081848] dump_stack_lvl+0x73/0xb0 [ 16.081878] print_report+0xd1/0x610 [ 16.081901] ? __virt_addr_valid+0x1db/0x2d0 [ 16.081925] ? kasan_atomics_helper+0xf10/0x5450 [ 16.081957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.081982] ? kasan_atomics_helper+0xf10/0x5450 [ 16.082005] kasan_report+0x141/0x180 [ 16.082039] ? kasan_atomics_helper+0xf10/0x5450 [ 16.082067] kasan_check_range+0x10c/0x1c0 [ 16.082092] __kasan_check_write+0x18/0x20 [ 16.082113] kasan_atomics_helper+0xf10/0x5450 [ 16.082137] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.082162] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.082188] ? trace_hardirqs_on+0x37/0xe0 [ 16.082211] ? kasan_atomics+0x152/0x310 [ 16.082239] kasan_atomics+0x1dc/0x310 [ 16.082262] ? __pfx_kasan_atomics+0x10/0x10 [ 16.082286] ? __pfx_kasan_atomics+0x10/0x10 [ 16.082315] kunit_try_run_case+0x1a5/0x480 [ 16.082339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.082364] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.082389] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.082431] ? __kthread_parkme+0x82/0x180 [ 16.082454] ? preempt_count_sub+0x50/0x80 [ 16.082479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.082506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.082533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.082569] kthread+0x337/0x6f0 [ 16.082589] ? trace_preempt_on+0x20/0xc0 [ 16.082613] ? __pfx_kthread+0x10/0x10 [ 16.082634] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.082657] ? calculate_sigpending+0x7b/0xa0 [ 16.082683] ? __pfx_kthread+0x10/0x10 [ 16.082705] ret_from_fork+0x116/0x1d0 [ 16.082726] ? __pfx_kthread+0x10/0x10 [ 16.082747] ret_from_fork_asm+0x1a/0x30 [ 16.082780] </TASK> [ 16.082791] [ 16.096577] Allocated by task 282: [ 16.096827] kasan_save_stack+0x45/0x70 [ 16.097124] kasan_save_track+0x18/0x40 [ 16.097263] kasan_save_alloc_info+0x3b/0x50 [ 16.097433] __kasan_kmalloc+0xb7/0xc0 [ 16.097807] __kmalloc_cache_noprof+0x189/0x420 [ 16.098233] kasan_atomics+0x95/0x310 [ 16.098683] kunit_try_run_case+0x1a5/0x480 [ 16.099075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.099600] kthread+0x337/0x6f0 [ 16.099833] ret_from_fork+0x116/0x1d0 [ 16.099969] ret_from_fork_asm+0x1a/0x30 [ 16.100116] [ 16.100190] The buggy address belongs to the object at ffff888102a5fe80 [ 16.100190] which belongs to the cache kmalloc-64 of size 64 [ 16.100806] The buggy address is located 0 bytes to the right of [ 16.100806] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.102128] [ 16.102316] The buggy address belongs to the physical page: [ 16.102839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.103535] flags: 0x200000000000000(node=0|zone=2) [ 16.103984] page_type: f5(slab) [ 16.104298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.104914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.105145] page dumped because: kasan: bad access detected [ 16.105318] [ 16.105391] Memory state around the buggy address: [ 16.105918] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.106434] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.107037] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.107259] ^ [ 16.107433] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.108082] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.108777] ================================================================== [ 15.611957] ================================================================== [ 15.612369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.612775] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.613061] [ 15.613146] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.613189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.613202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.613223] Call Trace: [ 15.613240] <TASK> [ 15.613256] dump_stack_lvl+0x73/0xb0 [ 15.613285] print_report+0xd1/0x610 [ 15.613309] ? __virt_addr_valid+0x1db/0x2d0 [ 15.613333] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.613356] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.613382] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.613406] kasan_report+0x141/0x180 [ 15.613505] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.613536] __asan_report_load4_noabort+0x18/0x20 [ 15.613577] kasan_atomics_helper+0x4b54/0x5450 [ 15.613602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.613627] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.613654] ? trace_hardirqs_on+0x37/0xe0 [ 15.613678] ? kasan_atomics+0x152/0x310 [ 15.613706] kasan_atomics+0x1dc/0x310 [ 15.613729] ? __pfx_kasan_atomics+0x10/0x10 [ 15.613754] ? __pfx_kasan_atomics+0x10/0x10 [ 15.613783] kunit_try_run_case+0x1a5/0x480 [ 15.613810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.613834] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.613860] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.613886] ? __kthread_parkme+0x82/0x180 [ 15.613908] ? preempt_count_sub+0x50/0x80 [ 15.613934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.613961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.613988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.614016] kthread+0x337/0x6f0 [ 15.614038] ? trace_preempt_on+0x20/0xc0 [ 15.614063] ? __pfx_kthread+0x10/0x10 [ 15.614086] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.614110] ? calculate_sigpending+0x7b/0xa0 [ 15.614136] ? __pfx_kthread+0x10/0x10 [ 15.614159] ret_from_fork+0x116/0x1d0 [ 15.614179] ? __pfx_kthread+0x10/0x10 [ 15.614201] ret_from_fork_asm+0x1a/0x30 [ 15.614234] </TASK> [ 15.614245] [ 15.622124] Allocated by task 282: [ 15.622259] kasan_save_stack+0x45/0x70 [ 15.622679] kasan_save_track+0x18/0x40 [ 15.622894] kasan_save_alloc_info+0x3b/0x50 [ 15.623106] __kasan_kmalloc+0xb7/0xc0 [ 15.623395] __kmalloc_cache_noprof+0x189/0x420 [ 15.623628] kasan_atomics+0x95/0x310 [ 15.623768] kunit_try_run_case+0x1a5/0x480 [ 15.623918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.624103] kthread+0x337/0x6f0 [ 15.624226] ret_from_fork+0x116/0x1d0 [ 15.624419] ret_from_fork_asm+0x1a/0x30 [ 15.624630] [ 15.624728] The buggy address belongs to the object at ffff888102a5fe80 [ 15.624728] which belongs to the cache kmalloc-64 of size 64 [ 15.625261] The buggy address is located 0 bytes to the right of [ 15.625261] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.625897] [ 15.625975] The buggy address belongs to the physical page: [ 15.626149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.626835] flags: 0x200000000000000(node=0|zone=2) [ 15.627378] page_type: f5(slab) [ 15.627562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.627870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.628106] page dumped because: kasan: bad access detected [ 15.628302] [ 15.628398] Memory state around the buggy address: [ 15.628635] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.628966] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.629355] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.629664] ^ [ 15.629883] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.630159] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.631407] ================================================================== [ 16.504358] ================================================================== [ 16.505008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.505702] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.506324] [ 16.506534] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.506589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.506602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.506624] Call Trace: [ 16.506641] <TASK> [ 16.506656] dump_stack_lvl+0x73/0xb0 [ 16.506685] print_report+0xd1/0x610 [ 16.506708] ? __virt_addr_valid+0x1db/0x2d0 [ 16.506732] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.506755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.506780] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.506803] kasan_report+0x141/0x180 [ 16.506826] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.506854] kasan_check_range+0x10c/0x1c0 [ 16.506879] __kasan_check_write+0x18/0x20 [ 16.506900] kasan_atomics_helper+0x15b6/0x5450 [ 16.506924] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.506949] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.506975] ? trace_hardirqs_on+0x37/0xe0 [ 16.506998] ? kasan_atomics+0x152/0x310 [ 16.507026] kasan_atomics+0x1dc/0x310 [ 16.507050] ? __pfx_kasan_atomics+0x10/0x10 [ 16.507075] ? __pfx_kasan_atomics+0x10/0x10 [ 16.507103] kunit_try_run_case+0x1a5/0x480 [ 16.507127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.507153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.507179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.507205] ? __kthread_parkme+0x82/0x180 [ 16.507227] ? preempt_count_sub+0x50/0x80 [ 16.507251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.507278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.507306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.507332] kthread+0x337/0x6f0 [ 16.507354] ? trace_preempt_on+0x20/0xc0 [ 16.507377] ? __pfx_kthread+0x10/0x10 [ 16.507406] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.507430] ? calculate_sigpending+0x7b/0xa0 [ 16.507455] ? __pfx_kthread+0x10/0x10 [ 16.507477] ret_from_fork+0x116/0x1d0 [ 16.507498] ? __pfx_kthread+0x10/0x10 [ 16.507520] ret_from_fork_asm+0x1a/0x30 [ 16.507560] </TASK> [ 16.507571] [ 16.519230] Allocated by task 282: [ 16.519578] kasan_save_stack+0x45/0x70 [ 16.519924] kasan_save_track+0x18/0x40 [ 16.520272] kasan_save_alloc_info+0x3b/0x50 [ 16.520746] __kasan_kmalloc+0xb7/0xc0 [ 16.521109] __kmalloc_cache_noprof+0x189/0x420 [ 16.521649] kasan_atomics+0x95/0x310 [ 16.522004] kunit_try_run_case+0x1a5/0x480 [ 16.522392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.522671] kthread+0x337/0x6f0 [ 16.522795] ret_from_fork+0x116/0x1d0 [ 16.522929] ret_from_fork_asm+0x1a/0x30 [ 16.523072] [ 16.523145] The buggy address belongs to the object at ffff888102a5fe80 [ 16.523145] which belongs to the cache kmalloc-64 of size 64 [ 16.523673] The buggy address is located 0 bytes to the right of [ 16.523673] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.524777] [ 16.524950] The buggy address belongs to the physical page: [ 16.525448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.526140] flags: 0x200000000000000(node=0|zone=2) [ 16.526632] page_type: f5(slab) [ 16.526996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.527722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.528370] page dumped because: kasan: bad access detected [ 16.528686] [ 16.528758] Memory state around the buggy address: [ 16.528913] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.529131] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.529345] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.529575] ^ [ 16.529841] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.530165] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.530440] ================================================================== [ 15.862445] ================================================================== [ 15.862795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.863092] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.863417] [ 15.863500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.863543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.863567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.863588] Call Trace: [ 15.863618] <TASK> [ 15.863645] dump_stack_lvl+0x73/0xb0 [ 15.863674] print_report+0xd1/0x610 [ 15.863697] ? __virt_addr_valid+0x1db/0x2d0 [ 15.863792] ? kasan_atomics_helper+0x992/0x5450 [ 15.863817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.863842] ? kasan_atomics_helper+0x992/0x5450 [ 15.863865] kasan_report+0x141/0x180 [ 15.863899] ? kasan_atomics_helper+0x992/0x5450 [ 15.863926] kasan_check_range+0x10c/0x1c0 [ 15.863962] __kasan_check_write+0x18/0x20 [ 15.863983] kasan_atomics_helper+0x992/0x5450 [ 15.864007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.864031] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.864064] ? trace_hardirqs_on+0x37/0xe0 [ 15.864091] ? kasan_atomics+0x152/0x310 [ 15.864120] kasan_atomics+0x1dc/0x310 [ 15.864144] ? __pfx_kasan_atomics+0x10/0x10 [ 15.864169] ? __pfx_kasan_atomics+0x10/0x10 [ 15.864207] kunit_try_run_case+0x1a5/0x480 [ 15.864234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.864293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.864319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.864345] ? __kthread_parkme+0x82/0x180 [ 15.864369] ? preempt_count_sub+0x50/0x80 [ 15.864396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.864591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.864624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.864652] kthread+0x337/0x6f0 [ 15.864673] ? trace_preempt_on+0x20/0xc0 [ 15.864817] ? __pfx_kthread+0x10/0x10 [ 15.864846] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.864871] ? calculate_sigpending+0x7b/0xa0 [ 15.864898] ? __pfx_kthread+0x10/0x10 [ 15.864921] ret_from_fork+0x116/0x1d0 [ 15.864943] ? __pfx_kthread+0x10/0x10 [ 15.864965] ret_from_fork_asm+0x1a/0x30 [ 15.864998] </TASK> [ 15.865009] [ 15.873058] Allocated by task 282: [ 15.873351] kasan_save_stack+0x45/0x70 [ 15.873755] kasan_save_track+0x18/0x40 [ 15.874035] kasan_save_alloc_info+0x3b/0x50 [ 15.874334] __kasan_kmalloc+0xb7/0xc0 [ 15.874600] __kmalloc_cache_noprof+0x189/0x420 [ 15.874793] kasan_atomics+0x95/0x310 [ 15.874929] kunit_try_run_case+0x1a5/0x480 [ 15.875078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.875259] kthread+0x337/0x6f0 [ 15.875382] ret_from_fork+0x116/0x1d0 [ 15.875520] ret_from_fork_asm+0x1a/0x30 [ 15.875671] [ 15.875745] The buggy address belongs to the object at ffff888102a5fe80 [ 15.875745] which belongs to the cache kmalloc-64 of size 64 [ 15.876107] The buggy address is located 0 bytes to the right of [ 15.876107] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.876865] [ 15.876957] The buggy address belongs to the physical page: [ 15.877222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.877544] flags: 0x200000000000000(node=0|zone=2) [ 15.877724] page_type: f5(slab) [ 15.877846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.878082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.878589] page dumped because: kasan: bad access detected [ 15.878853] [ 15.878946] Memory state around the buggy address: [ 15.879166] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.879451] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.879676] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.879889] ^ [ 15.880406] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.881063] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.881512] ================================================================== [ 16.109719] ================================================================== [ 16.110421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 16.110807] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.111639] [ 16.111854] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.111901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.111924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.111946] Call Trace: [ 16.111963] <TASK> [ 16.111980] dump_stack_lvl+0x73/0xb0 [ 16.112020] print_report+0xd1/0x610 [ 16.112043] ? __virt_addr_valid+0x1db/0x2d0 [ 16.112083] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.112115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.112141] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.112176] kasan_report+0x141/0x180 [ 16.112199] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.112227] kasan_check_range+0x10c/0x1c0 [ 16.112252] __kasan_check_write+0x18/0x20 [ 16.112273] kasan_atomics_helper+0xfa9/0x5450 [ 16.112297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.112321] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.112348] ? trace_hardirqs_on+0x37/0xe0 [ 16.112372] ? kasan_atomics+0x152/0x310 [ 16.112400] kasan_atomics+0x1dc/0x310 [ 16.112436] ? __pfx_kasan_atomics+0x10/0x10 [ 16.112463] ? __pfx_kasan_atomics+0x10/0x10 [ 16.112491] kunit_try_run_case+0x1a5/0x480 [ 16.112518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.112542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.112579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.112605] ? __kthread_parkme+0x82/0x180 [ 16.112627] ? preempt_count_sub+0x50/0x80 [ 16.112652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.112677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.112704] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.112732] kthread+0x337/0x6f0 [ 16.112753] ? trace_preempt_on+0x20/0xc0 [ 16.112775] ? __pfx_kthread+0x10/0x10 [ 16.112797] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.112819] ? calculate_sigpending+0x7b/0xa0 [ 16.112845] ? __pfx_kthread+0x10/0x10 [ 16.112867] ret_from_fork+0x116/0x1d0 [ 16.112888] ? __pfx_kthread+0x10/0x10 [ 16.112910] ret_from_fork_asm+0x1a/0x30 [ 16.112942] </TASK> [ 16.112952] [ 16.123680] Allocated by task 282: [ 16.124016] kasan_save_stack+0x45/0x70 [ 16.124403] kasan_save_track+0x18/0x40 [ 16.124780] kasan_save_alloc_info+0x3b/0x50 [ 16.125184] __kasan_kmalloc+0xb7/0xc0 [ 16.125580] __kmalloc_cache_noprof+0x189/0x420 [ 16.126008] kasan_atomics+0x95/0x310 [ 16.126363] kunit_try_run_case+0x1a5/0x480 [ 16.126792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.127286] kthread+0x337/0x6f0 [ 16.127659] ret_from_fork+0x116/0x1d0 [ 16.127942] ret_from_fork_asm+0x1a/0x30 [ 16.128091] [ 16.128165] The buggy address belongs to the object at ffff888102a5fe80 [ 16.128165] which belongs to the cache kmalloc-64 of size 64 [ 16.128659] The buggy address is located 0 bytes to the right of [ 16.128659] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.129788] [ 16.129959] The buggy address belongs to the physical page: [ 16.130473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.131152] flags: 0x200000000000000(node=0|zone=2) [ 16.131651] page_type: f5(slab) [ 16.131963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.132475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.132717] page dumped because: kasan: bad access detected [ 16.132890] [ 16.132960] Memory state around the buggy address: [ 16.133114] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.133330] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.133817] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.134456] ^ [ 16.134898] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.135520] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.135752] ================================================================== [ 16.230587] ================================================================== [ 16.230913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 16.232022] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.232499] [ 16.232617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.232847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.232860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.232884] Call Trace: [ 16.232898] <TASK> [ 16.232912] dump_stack_lvl+0x73/0xb0 [ 16.232944] print_report+0xd1/0x610 [ 16.232967] ? __virt_addr_valid+0x1db/0x2d0 [ 16.232991] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.233014] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.233039] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.233063] kasan_report+0x141/0x180 [ 16.233086] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.233114] __asan_report_load4_noabort+0x18/0x20 [ 16.233140] kasan_atomics_helper+0x4a02/0x5450 [ 16.233165] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.233189] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.233215] ? trace_hardirqs_on+0x37/0xe0 [ 16.233238] ? kasan_atomics+0x152/0x310 [ 16.233266] kasan_atomics+0x1dc/0x310 [ 16.233290] ? __pfx_kasan_atomics+0x10/0x10 [ 16.233315] ? __pfx_kasan_atomics+0x10/0x10 [ 16.233343] kunit_try_run_case+0x1a5/0x480 [ 16.233369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.233420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.233447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.233472] ? __kthread_parkme+0x82/0x180 [ 16.233494] ? preempt_count_sub+0x50/0x80 [ 16.233519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.233545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.233580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.233608] kthread+0x337/0x6f0 [ 16.233629] ? trace_preempt_on+0x20/0xc0 [ 16.233654] ? __pfx_kthread+0x10/0x10 [ 16.233677] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.233702] ? calculate_sigpending+0x7b/0xa0 [ 16.233729] ? __pfx_kthread+0x10/0x10 [ 16.233752] ret_from_fork+0x116/0x1d0 [ 16.233772] ? __pfx_kthread+0x10/0x10 [ 16.233795] ret_from_fork_asm+0x1a/0x30 [ 16.233827] </TASK> [ 16.233838] [ 16.244638] Allocated by task 282: [ 16.244904] kasan_save_stack+0x45/0x70 [ 16.245193] kasan_save_track+0x18/0x40 [ 16.245535] kasan_save_alloc_info+0x3b/0x50 [ 16.245858] __kasan_kmalloc+0xb7/0xc0 [ 16.246132] __kmalloc_cache_noprof+0x189/0x420 [ 16.246344] kasan_atomics+0x95/0x310 [ 16.246696] kunit_try_run_case+0x1a5/0x480 [ 16.246995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.247337] kthread+0x337/0x6f0 [ 16.247627] ret_from_fork+0x116/0x1d0 [ 16.247911] ret_from_fork_asm+0x1a/0x30 [ 16.248129] [ 16.248230] The buggy address belongs to the object at ffff888102a5fe80 [ 16.248230] which belongs to the cache kmalloc-64 of size 64 [ 16.249036] The buggy address is located 0 bytes to the right of [ 16.249036] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.249761] [ 16.249964] The buggy address belongs to the physical page: [ 16.250260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.250747] flags: 0x200000000000000(node=0|zone=2) [ 16.251078] page_type: f5(slab) [ 16.251353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.251828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.252270] page dumped because: kasan: bad access detected [ 16.252634] [ 16.252892] Memory state around the buggy address: [ 16.253127] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.253612] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.254016] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.254446] ^ [ 16.254642] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.254966] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.255262] ================================================================== [ 15.785596] ================================================================== [ 15.785840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.786074] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.786300] [ 15.786387] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.786432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.786445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.786465] Call Trace: [ 15.786483] <TASK> [ 15.786500] dump_stack_lvl+0x73/0xb0 [ 15.786526] print_report+0xd1/0x610 [ 15.786689] ? __virt_addr_valid+0x1db/0x2d0 [ 15.786737] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.787589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.787619] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.787644] kasan_report+0x141/0x180 [ 15.787694] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.787723] kasan_check_range+0x10c/0x1c0 [ 15.787748] __kasan_check_write+0x18/0x20 [ 15.787770] kasan_atomics_helper+0x7c7/0x5450 [ 15.787794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.787818] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.787846] ? trace_hardirqs_on+0x37/0xe0 [ 15.787871] ? kasan_atomics+0x152/0x310 [ 15.787899] kasan_atomics+0x1dc/0x310 [ 15.787923] ? __pfx_kasan_atomics+0x10/0x10 [ 15.787949] ? __pfx_kasan_atomics+0x10/0x10 [ 15.787977] kunit_try_run_case+0x1a5/0x480 [ 15.788003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.788028] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.788059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.788086] ? __kthread_parkme+0x82/0x180 [ 15.788108] ? preempt_count_sub+0x50/0x80 [ 15.788134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.788160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.788186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.788214] kthread+0x337/0x6f0 [ 15.788242] ? trace_preempt_on+0x20/0xc0 [ 15.788266] ? __pfx_kthread+0x10/0x10 [ 15.788288] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.788312] ? calculate_sigpending+0x7b/0xa0 [ 15.788339] ? __pfx_kthread+0x10/0x10 [ 15.788361] ret_from_fork+0x116/0x1d0 [ 15.788382] ? __pfx_kthread+0x10/0x10 [ 15.788403] ret_from_fork_asm+0x1a/0x30 [ 15.788436] </TASK> [ 15.788447] [ 15.804191] Allocated by task 282: [ 15.804441] kasan_save_stack+0x45/0x70 [ 15.804784] kasan_save_track+0x18/0x40 [ 15.804935] kasan_save_alloc_info+0x3b/0x50 [ 15.805090] __kasan_kmalloc+0xb7/0xc0 [ 15.805282] __kmalloc_cache_noprof+0x189/0x420 [ 15.805683] kasan_atomics+0x95/0x310 [ 15.805983] kunit_try_run_case+0x1a5/0x480 [ 15.806142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.806323] kthread+0x337/0x6f0 [ 15.806460] ret_from_fork+0x116/0x1d0 [ 15.806660] ret_from_fork_asm+0x1a/0x30 [ 15.807041] [ 15.807200] The buggy address belongs to the object at ffff888102a5fe80 [ 15.807200] which belongs to the cache kmalloc-64 of size 64 [ 15.808210] The buggy address is located 0 bytes to the right of [ 15.808210] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.808843] [ 15.808955] The buggy address belongs to the physical page: [ 15.809145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.809432] flags: 0x200000000000000(node=0|zone=2) [ 15.809803] page_type: f5(slab) [ 15.809998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.810392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.810808] page dumped because: kasan: bad access detected [ 15.811038] [ 15.811112] Memory state around the buggy address: [ 15.811530] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.811958] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.812372] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.812714] ^ [ 15.812933] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.813289] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.813608] ================================================================== [ 15.503634] ================================================================== [ 15.504952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.505211] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.506828] [ 15.507206] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.507258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.507270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.507293] Call Trace: [ 15.507307] <TASK> [ 15.507324] dump_stack_lvl+0x73/0xb0 [ 15.507358] print_report+0xd1/0x610 [ 15.507381] ? __virt_addr_valid+0x1db/0x2d0 [ 15.507406] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.507427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.507452] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.507474] kasan_report+0x141/0x180 [ 15.507495] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.507522] __asan_report_load4_noabort+0x18/0x20 [ 15.507561] kasan_atomics_helper+0x4bbc/0x5450 [ 15.507750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.507815] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.507844] ? trace_hardirqs_on+0x37/0xe0 [ 15.507869] ? kasan_atomics+0x152/0x310 [ 15.507896] kasan_atomics+0x1dc/0x310 [ 15.507919] ? __pfx_kasan_atomics+0x10/0x10 [ 15.507943] ? __pfx_kasan_atomics+0x10/0x10 [ 15.507970] kunit_try_run_case+0x1a5/0x480 [ 15.507996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.508021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.508046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.508075] ? __kthread_parkme+0x82/0x180 [ 15.508096] ? preempt_count_sub+0x50/0x80 [ 15.508121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.508146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.508171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.508198] kthread+0x337/0x6f0 [ 15.508217] ? trace_preempt_on+0x20/0xc0 [ 15.508260] ? __pfx_kthread+0x10/0x10 [ 15.508281] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.508304] ? calculate_sigpending+0x7b/0xa0 [ 15.508330] ? __pfx_kthread+0x10/0x10 [ 15.508351] ret_from_fork+0x116/0x1d0 [ 15.508371] ? __pfx_kthread+0x10/0x10 [ 15.508392] ret_from_fork_asm+0x1a/0x30 [ 15.508441] </TASK> [ 15.508453] [ 15.519788] Allocated by task 282: [ 15.520007] kasan_save_stack+0x45/0x70 [ 15.520282] kasan_save_track+0x18/0x40 [ 15.520498] kasan_save_alloc_info+0x3b/0x50 [ 15.520661] __kasan_kmalloc+0xb7/0xc0 [ 15.520851] __kmalloc_cache_noprof+0x189/0x420 [ 15.521076] kasan_atomics+0x95/0x310 [ 15.521369] kunit_try_run_case+0x1a5/0x480 [ 15.521620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.521901] kthread+0x337/0x6f0 [ 15.522048] ret_from_fork+0x116/0x1d0 [ 15.522180] ret_from_fork_asm+0x1a/0x30 [ 15.522531] [ 15.522642] The buggy address belongs to the object at ffff888102a5fe80 [ 15.522642] which belongs to the cache kmalloc-64 of size 64 [ 15.523121] The buggy address is located 0 bytes to the right of [ 15.523121] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.523762] [ 15.523864] The buggy address belongs to the physical page: [ 15.524073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.524487] flags: 0x200000000000000(node=0|zone=2) [ 15.524677] page_type: f5(slab) [ 15.524867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.525205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.525632] page dumped because: kasan: bad access detected [ 15.525916] [ 15.526009] Memory state around the buggy address: [ 15.526205] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.526624] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.526898] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.527299] ^ [ 15.527492] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.527952] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.530265] ================================================================== [ 16.448963] ================================================================== [ 16.449691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 16.450353] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.451044] [ 16.451235] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.451278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.451291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.451313] Call Trace: [ 16.451329] <TASK> [ 16.451346] dump_stack_lvl+0x73/0xb0 [ 16.451375] print_report+0xd1/0x610 [ 16.451419] ? __virt_addr_valid+0x1db/0x2d0 [ 16.451463] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.451487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.451512] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.451535] kasan_report+0x141/0x180 [ 16.451567] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.451595] __asan_report_store8_noabort+0x1b/0x30 [ 16.451622] kasan_atomics_helper+0x50d4/0x5450 [ 16.451646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.451670] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.451697] ? trace_hardirqs_on+0x37/0xe0 [ 16.451721] ? kasan_atomics+0x152/0x310 [ 16.451749] kasan_atomics+0x1dc/0x310 [ 16.451773] ? __pfx_kasan_atomics+0x10/0x10 [ 16.451799] ? __pfx_kasan_atomics+0x10/0x10 [ 16.451826] kunit_try_run_case+0x1a5/0x480 [ 16.451853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.451877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.451903] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.451928] ? __kthread_parkme+0x82/0x180 [ 16.451950] ? preempt_count_sub+0x50/0x80 [ 16.451976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.452001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.452028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.452055] kthread+0x337/0x6f0 [ 16.452082] ? trace_preempt_on+0x20/0xc0 [ 16.452104] ? __pfx_kthread+0x10/0x10 [ 16.452126] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.452149] ? calculate_sigpending+0x7b/0xa0 [ 16.452175] ? __pfx_kthread+0x10/0x10 [ 16.452197] ret_from_fork+0x116/0x1d0 [ 16.452218] ? __pfx_kthread+0x10/0x10 [ 16.452240] ret_from_fork_asm+0x1a/0x30 [ 16.452271] </TASK> [ 16.452282] [ 16.464100] Allocated by task 282: [ 16.464485] kasan_save_stack+0x45/0x70 [ 16.464862] kasan_save_track+0x18/0x40 [ 16.465088] kasan_save_alloc_info+0x3b/0x50 [ 16.465241] __kasan_kmalloc+0xb7/0xc0 [ 16.465376] __kmalloc_cache_noprof+0x189/0x420 [ 16.465856] kasan_atomics+0x95/0x310 [ 16.466210] kunit_try_run_case+0x1a5/0x480 [ 16.466631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.467108] kthread+0x337/0x6f0 [ 16.467289] ret_from_fork+0x116/0x1d0 [ 16.467486] ret_from_fork_asm+0x1a/0x30 [ 16.467869] [ 16.468042] The buggy address belongs to the object at ffff888102a5fe80 [ 16.468042] which belongs to the cache kmalloc-64 of size 64 [ 16.468874] The buggy address is located 0 bytes to the right of [ 16.468874] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.469242] [ 16.469314] The buggy address belongs to the physical page: [ 16.469733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.470444] flags: 0x200000000000000(node=0|zone=2) [ 16.470893] page_type: f5(slab) [ 16.471196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.471887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.472195] page dumped because: kasan: bad access detected [ 16.472371] [ 16.472450] Memory state around the buggy address: [ 16.472747] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.473385] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.474034] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.474675] ^ [ 16.475047] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.475266] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.475724] ================================================================== [ 16.628900] ================================================================== [ 16.629195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.629663] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.629992] [ 16.630079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.630123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.630137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.630158] Call Trace: [ 16.630173] <TASK> [ 16.630187] dump_stack_lvl+0x73/0xb0 [ 16.630216] print_report+0xd1/0x610 [ 16.630239] ? __virt_addr_valid+0x1db/0x2d0 [ 16.630263] ? kasan_atomics_helper+0x194a/0x5450 [ 16.630286] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.630349] ? kasan_atomics_helper+0x194a/0x5450 [ 16.630420] kasan_report+0x141/0x180 [ 16.630446] ? kasan_atomics_helper+0x194a/0x5450 [ 16.630474] kasan_check_range+0x10c/0x1c0 [ 16.630499] __kasan_check_write+0x18/0x20 [ 16.630520] kasan_atomics_helper+0x194a/0x5450 [ 16.630544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.630578] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.630604] ? trace_hardirqs_on+0x37/0xe0 [ 16.630628] ? kasan_atomics+0x152/0x310 [ 16.630655] kasan_atomics+0x1dc/0x310 [ 16.630715] ? __pfx_kasan_atomics+0x10/0x10 [ 16.630740] ? __pfx_kasan_atomics+0x10/0x10 [ 16.630768] kunit_try_run_case+0x1a5/0x480 [ 16.630794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.630850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.630876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.630902] ? __kthread_parkme+0x82/0x180 [ 16.630924] ? preempt_count_sub+0x50/0x80 [ 16.630949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.631007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.631034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.631062] kthread+0x337/0x6f0 [ 16.631082] ? trace_preempt_on+0x20/0xc0 [ 16.631135] ? __pfx_kthread+0x10/0x10 [ 16.631158] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.631181] ? calculate_sigpending+0x7b/0xa0 [ 16.631206] ? __pfx_kthread+0x10/0x10 [ 16.631228] ret_from_fork+0x116/0x1d0 [ 16.631248] ? __pfx_kthread+0x10/0x10 [ 16.631300] ret_from_fork_asm+0x1a/0x30 [ 16.631333] </TASK> [ 16.631343] [ 16.639144] Allocated by task 282: [ 16.639322] kasan_save_stack+0x45/0x70 [ 16.639573] kasan_save_track+0x18/0x40 [ 16.639775] kasan_save_alloc_info+0x3b/0x50 [ 16.639963] __kasan_kmalloc+0xb7/0xc0 [ 16.640167] __kmalloc_cache_noprof+0x189/0x420 [ 16.640443] kasan_atomics+0x95/0x310 [ 16.640652] kunit_try_run_case+0x1a5/0x480 [ 16.640877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.641145] kthread+0x337/0x6f0 [ 16.641324] ret_from_fork+0x116/0x1d0 [ 16.641577] ret_from_fork_asm+0x1a/0x30 [ 16.641789] [ 16.641881] The buggy address belongs to the object at ffff888102a5fe80 [ 16.641881] which belongs to the cache kmalloc-64 of size 64 [ 16.642390] The buggy address is located 0 bytes to the right of [ 16.642390] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.643151] [ 16.643246] The buggy address belongs to the physical page: [ 16.643556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.643865] flags: 0x200000000000000(node=0|zone=2) [ 16.644022] page_type: f5(slab) [ 16.644167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.644578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.644942] page dumped because: kasan: bad access detected [ 16.645222] [ 16.645312] Memory state around the buggy address: [ 16.645578] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.645882] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.646188] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.646570] ^ [ 16.646803] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.647125] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.647446] ================================================================== [ 15.632239] ================================================================== [ 15.632478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.632725] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.633703] [ 15.633881] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.633926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.633938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.633960] Call Trace: [ 15.633975] <TASK> [ 15.633991] dump_stack_lvl+0x73/0xb0 [ 15.634020] print_report+0xd1/0x610 [ 15.634043] ? __virt_addr_valid+0x1db/0x2d0 [ 15.634132] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.634174] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.634199] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.634222] kasan_report+0x141/0x180 [ 15.634246] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.634273] kasan_check_range+0x10c/0x1c0 [ 15.634305] __kasan_check_write+0x18/0x20 [ 15.634326] kasan_atomics_helper+0x4a0/0x5450 [ 15.634351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.634375] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.634401] ? trace_hardirqs_on+0x37/0xe0 [ 15.634424] ? kasan_atomics+0x152/0x310 [ 15.634452] kasan_atomics+0x1dc/0x310 [ 15.634476] ? __pfx_kasan_atomics+0x10/0x10 [ 15.634502] ? __pfx_kasan_atomics+0x10/0x10 [ 15.634530] kunit_try_run_case+0x1a5/0x480 [ 15.634565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.634770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.634798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.634824] ? __kthread_parkme+0x82/0x180 [ 15.634846] ? preempt_count_sub+0x50/0x80 [ 15.634871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.634897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.634924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.634951] kthread+0x337/0x6f0 [ 15.634972] ? trace_preempt_on+0x20/0xc0 [ 15.634996] ? __pfx_kthread+0x10/0x10 [ 15.635018] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.635041] ? calculate_sigpending+0x7b/0xa0 [ 15.635067] ? __pfx_kthread+0x10/0x10 [ 15.635090] ret_from_fork+0x116/0x1d0 [ 15.635111] ? __pfx_kthread+0x10/0x10 [ 15.635133] ret_from_fork_asm+0x1a/0x30 [ 15.635166] </TASK> [ 15.635178] [ 15.650076] Allocated by task 282: [ 15.650517] kasan_save_stack+0x45/0x70 [ 15.651003] kasan_save_track+0x18/0x40 [ 15.651635] kasan_save_alloc_info+0x3b/0x50 [ 15.652091] __kasan_kmalloc+0xb7/0xc0 [ 15.652373] __kmalloc_cache_noprof+0x189/0x420 [ 15.652822] kasan_atomics+0x95/0x310 [ 15.652964] kunit_try_run_case+0x1a5/0x480 [ 15.653109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.653458] kthread+0x337/0x6f0 [ 15.653833] ret_from_fork+0x116/0x1d0 [ 15.654204] ret_from_fork_asm+0x1a/0x30 [ 15.654721] [ 15.654895] The buggy address belongs to the object at ffff888102a5fe80 [ 15.654895] which belongs to the cache kmalloc-64 of size 64 [ 15.656418] The buggy address is located 0 bytes to the right of [ 15.656418] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.657057] [ 15.657133] The buggy address belongs to the physical page: [ 15.657557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.658387] flags: 0x200000000000000(node=0|zone=2) [ 15.658889] page_type: f5(slab) [ 15.659230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.659859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.660095] page dumped because: kasan: bad access detected [ 15.660389] [ 15.660591] Memory state around the buggy address: [ 15.661171] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.662144] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.662892] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.663733] ^ [ 15.663899] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.664123] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.664642] ================================================================== [ 16.256749] ================================================================== [ 16.257079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 16.257593] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.257989] [ 16.258114] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.258160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.258172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.258195] Call Trace: [ 16.258212] <TASK> [ 16.258228] dump_stack_lvl+0x73/0xb0 [ 16.258258] print_report+0xd1/0x610 [ 16.258282] ? __virt_addr_valid+0x1db/0x2d0 [ 16.258306] ? kasan_atomics_helper+0x1217/0x5450 [ 16.258329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.258353] ? kasan_atomics_helper+0x1217/0x5450 [ 16.258377] kasan_report+0x141/0x180 [ 16.258593] ? kasan_atomics_helper+0x1217/0x5450 [ 16.258637] kasan_check_range+0x10c/0x1c0 [ 16.258664] __kasan_check_write+0x18/0x20 [ 16.258687] kasan_atomics_helper+0x1217/0x5450 [ 16.258713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.258738] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.258765] ? trace_hardirqs_on+0x37/0xe0 [ 16.258791] ? kasan_atomics+0x152/0x310 [ 16.258819] kasan_atomics+0x1dc/0x310 [ 16.258843] ? __pfx_kasan_atomics+0x10/0x10 [ 16.258869] ? __pfx_kasan_atomics+0x10/0x10 [ 16.258898] kunit_try_run_case+0x1a5/0x480 [ 16.258924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.258949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.258975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.259001] ? __kthread_parkme+0x82/0x180 [ 16.259023] ? preempt_count_sub+0x50/0x80 [ 16.259048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.259075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.259102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.259129] kthread+0x337/0x6f0 [ 16.259149] ? trace_preempt_on+0x20/0xc0 [ 16.259173] ? __pfx_kthread+0x10/0x10 [ 16.259195] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.259218] ? calculate_sigpending+0x7b/0xa0 [ 16.259243] ? __pfx_kthread+0x10/0x10 [ 16.259266] ret_from_fork+0x116/0x1d0 [ 16.259287] ? __pfx_kthread+0x10/0x10 [ 16.259309] ret_from_fork_asm+0x1a/0x30 [ 16.259341] </TASK> [ 16.259353] [ 16.270599] Allocated by task 282: [ 16.270771] kasan_save_stack+0x45/0x70 [ 16.270959] kasan_save_track+0x18/0x40 [ 16.271138] kasan_save_alloc_info+0x3b/0x50 [ 16.271336] __kasan_kmalloc+0xb7/0xc0 [ 16.271989] __kmalloc_cache_noprof+0x189/0x420 [ 16.272293] kasan_atomics+0x95/0x310 [ 16.272752] kunit_try_run_case+0x1a5/0x480 [ 16.273035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.273490] kthread+0x337/0x6f0 [ 16.273919] ret_from_fork+0x116/0x1d0 [ 16.274123] ret_from_fork_asm+0x1a/0x30 [ 16.274310] [ 16.274627] The buggy address belongs to the object at ffff888102a5fe80 [ 16.274627] which belongs to the cache kmalloc-64 of size 64 [ 16.275135] The buggy address is located 0 bytes to the right of [ 16.275135] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.276092] [ 16.276193] The buggy address belongs to the physical page: [ 16.276784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.277292] flags: 0x200000000000000(node=0|zone=2) [ 16.277698] page_type: f5(slab) [ 16.277862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.278158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.278725] page dumped because: kasan: bad access detected [ 16.279010] [ 16.279105] Memory state around the buggy address: [ 16.279297] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.280068] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.280747] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.281067] ^ [ 16.281276] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.281890] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282337] ================================================================== [ 16.336936] ================================================================== [ 16.337328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 16.337798] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.338077] [ 16.338181] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.338227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.338240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.338263] Call Trace: [ 16.338280] <TASK> [ 16.338297] dump_stack_lvl+0x73/0xb0 [ 16.338326] print_report+0xd1/0x610 [ 16.338350] ? __virt_addr_valid+0x1db/0x2d0 [ 16.338374] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.338397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.338633] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.338659] kasan_report+0x141/0x180 [ 16.338697] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.338725] __asan_report_load4_noabort+0x18/0x20 [ 16.338932] kasan_atomics_helper+0x49ce/0x5450 [ 16.338963] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.338988] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.339015] ? trace_hardirqs_on+0x37/0xe0 [ 16.339040] ? kasan_atomics+0x152/0x310 [ 16.339068] kasan_atomics+0x1dc/0x310 [ 16.339092] ? __pfx_kasan_atomics+0x10/0x10 [ 16.339117] ? __pfx_kasan_atomics+0x10/0x10 [ 16.339146] kunit_try_run_case+0x1a5/0x480 [ 16.339171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.339196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.339221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.339247] ? __kthread_parkme+0x82/0x180 [ 16.339269] ? preempt_count_sub+0x50/0x80 [ 16.339295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.339322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.339349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.339378] kthread+0x337/0x6f0 [ 16.339400] ? trace_preempt_on+0x20/0xc0 [ 16.339434] ? __pfx_kthread+0x10/0x10 [ 16.339456] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.339480] ? calculate_sigpending+0x7b/0xa0 [ 16.339508] ? __pfx_kthread+0x10/0x10 [ 16.339532] ret_from_fork+0x116/0x1d0 [ 16.339564] ? __pfx_kthread+0x10/0x10 [ 16.339586] ret_from_fork_asm+0x1a/0x30 [ 16.339618] </TASK> [ 16.339631] [ 16.351514] Allocated by task 282: [ 16.351882] kasan_save_stack+0x45/0x70 [ 16.352092] kasan_save_track+0x18/0x40 [ 16.352274] kasan_save_alloc_info+0x3b/0x50 [ 16.352774] __kasan_kmalloc+0xb7/0xc0 [ 16.353013] __kmalloc_cache_noprof+0x189/0x420 [ 16.353362] kasan_atomics+0x95/0x310 [ 16.353761] kunit_try_run_case+0x1a5/0x480 [ 16.354107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.354356] kthread+0x337/0x6f0 [ 16.354765] ret_from_fork+0x116/0x1d0 [ 16.355083] ret_from_fork_asm+0x1a/0x30 [ 16.355284] [ 16.355370] The buggy address belongs to the object at ffff888102a5fe80 [ 16.355370] which belongs to the cache kmalloc-64 of size 64 [ 16.356089] The buggy address is located 0 bytes to the right of [ 16.356089] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.357117] [ 16.357322] The buggy address belongs to the physical page: [ 16.357780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.358305] flags: 0x200000000000000(node=0|zone=2) [ 16.358747] page_type: f5(slab) [ 16.359110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.359603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.359898] page dumped because: kasan: bad access detected [ 16.360126] [ 16.360213] Memory state around the buggy address: [ 16.360701] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.361144] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.361680] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.362121] ^ [ 16.362339] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.363188] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.363699] ================================================================== [ 16.890724] ================================================================== [ 16.891435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.892106] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.892621] [ 16.892832] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.892877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.892890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.892931] Call Trace: [ 16.892947] <TASK> [ 16.892962] dump_stack_lvl+0x73/0xb0 [ 16.892991] print_report+0xd1/0x610 [ 16.893013] ? __virt_addr_valid+0x1db/0x2d0 [ 16.893037] ? kasan_atomics_helper+0x2006/0x5450 [ 16.893060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.893085] ? kasan_atomics_helper+0x2006/0x5450 [ 16.893108] kasan_report+0x141/0x180 [ 16.893131] ? kasan_atomics_helper+0x2006/0x5450 [ 16.893159] kasan_check_range+0x10c/0x1c0 [ 16.893184] __kasan_check_write+0x18/0x20 [ 16.893205] kasan_atomics_helper+0x2006/0x5450 [ 16.893229] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.893254] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.893280] ? trace_hardirqs_on+0x37/0xe0 [ 16.893303] ? kasan_atomics+0x152/0x310 [ 16.893331] kasan_atomics+0x1dc/0x310 [ 16.893355] ? __pfx_kasan_atomics+0x10/0x10 [ 16.893379] ? __pfx_kasan_atomics+0x10/0x10 [ 16.893408] kunit_try_run_case+0x1a5/0x480 [ 16.893434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.893458] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.893485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.893510] ? __kthread_parkme+0x82/0x180 [ 16.893532] ? preempt_count_sub+0x50/0x80 [ 16.893567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.893594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.893620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.893648] kthread+0x337/0x6f0 [ 16.893668] ? trace_preempt_on+0x20/0xc0 [ 16.893691] ? __pfx_kthread+0x10/0x10 [ 16.893713] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.893737] ? calculate_sigpending+0x7b/0xa0 [ 16.893764] ? __pfx_kthread+0x10/0x10 [ 16.893787] ret_from_fork+0x116/0x1d0 [ 16.893807] ? __pfx_kthread+0x10/0x10 [ 16.893829] ret_from_fork_asm+0x1a/0x30 [ 16.893860] </TASK> [ 16.893871] [ 16.905312] Allocated by task 282: [ 16.905527] kasan_save_stack+0x45/0x70 [ 16.905917] kasan_save_track+0x18/0x40 [ 16.906055] kasan_save_alloc_info+0x3b/0x50 [ 16.906200] __kasan_kmalloc+0xb7/0xc0 [ 16.906332] __kmalloc_cache_noprof+0x189/0x420 [ 16.906721] kasan_atomics+0x95/0x310 [ 16.907053] kunit_try_run_case+0x1a5/0x480 [ 16.907500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.908011] kthread+0x337/0x6f0 [ 16.908345] ret_from_fork+0x116/0x1d0 [ 16.908760] ret_from_fork_asm+0x1a/0x30 [ 16.909134] [ 16.909312] The buggy address belongs to the object at ffff888102a5fe80 [ 16.909312] which belongs to the cache kmalloc-64 of size 64 [ 16.909865] The buggy address is located 0 bytes to the right of [ 16.909865] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.910222] [ 16.910292] The buggy address belongs to the physical page: [ 16.910492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.911223] flags: 0x200000000000000(node=0|zone=2) [ 16.911725] page_type: f5(slab) [ 16.912035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.912766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.913434] page dumped because: kasan: bad access detected [ 16.913926] [ 16.914095] Memory state around the buggy address: [ 16.914543] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.915056] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.915268] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.915642] ^ [ 16.916088] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.916752] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.917631] ================================================================== [ 15.737693] ================================================================== [ 15.738029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.738275] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.738614] [ 15.738722] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.738767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.738779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.738836] Call Trace: [ 15.738852] <TASK> [ 15.738866] dump_stack_lvl+0x73/0xb0 [ 15.738895] print_report+0xd1/0x610 [ 15.738918] ? __virt_addr_valid+0x1db/0x2d0 [ 15.738941] ? kasan_atomics_helper+0x697/0x5450 [ 15.738963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.738988] ? kasan_atomics_helper+0x697/0x5450 [ 15.739012] kasan_report+0x141/0x180 [ 15.739034] ? kasan_atomics_helper+0x697/0x5450 [ 15.739062] kasan_check_range+0x10c/0x1c0 [ 15.739087] __kasan_check_write+0x18/0x20 [ 15.739108] kasan_atomics_helper+0x697/0x5450 [ 15.739133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.739157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.739183] ? trace_hardirqs_on+0x37/0xe0 [ 15.739206] ? kasan_atomics+0x152/0x310 [ 15.739233] kasan_atomics+0x1dc/0x310 [ 15.739257] ? __pfx_kasan_atomics+0x10/0x10 [ 15.739282] ? __pfx_kasan_atomics+0x10/0x10 [ 15.739310] kunit_try_run_case+0x1a5/0x480 [ 15.739336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.739360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.739386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.739412] ? __kthread_parkme+0x82/0x180 [ 15.739434] ? preempt_count_sub+0x50/0x80 [ 15.739458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.739484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.739511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.739538] kthread+0x337/0x6f0 [ 15.739569] ? trace_preempt_on+0x20/0xc0 [ 15.739592] ? __pfx_kthread+0x10/0x10 [ 15.739614] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.739637] ? calculate_sigpending+0x7b/0xa0 [ 15.739662] ? __pfx_kthread+0x10/0x10 [ 15.739685] ret_from_fork+0x116/0x1d0 [ 15.739705] ? __pfx_kthread+0x10/0x10 [ 15.739727] ret_from_fork_asm+0x1a/0x30 [ 15.739758] </TASK> [ 15.739770] [ 15.747861] Allocated by task 282: [ 15.748030] kasan_save_stack+0x45/0x70 [ 15.748188] kasan_save_track+0x18/0x40 [ 15.748337] kasan_save_alloc_info+0x3b/0x50 [ 15.748559] __kasan_kmalloc+0xb7/0xc0 [ 15.748748] __kmalloc_cache_noprof+0x189/0x420 [ 15.749295] kasan_atomics+0x95/0x310 [ 15.749576] kunit_try_run_case+0x1a5/0x480 [ 15.749729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749988] kthread+0x337/0x6f0 [ 15.750156] ret_from_fork+0x116/0x1d0 [ 15.750482] ret_from_fork_asm+0x1a/0x30 [ 15.750656] [ 15.750730] The buggy address belongs to the object at ffff888102a5fe80 [ 15.750730] which belongs to the cache kmalloc-64 of size 64 [ 15.751119] The buggy address is located 0 bytes to the right of [ 15.751119] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.751666] [ 15.751868] The buggy address belongs to the physical page: [ 15.752118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.752770] flags: 0x200000000000000(node=0|zone=2) [ 15.753015] page_type: f5(slab) [ 15.753153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.753389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.753821] page dumped because: kasan: bad access detected [ 15.754053] [ 15.754152] Memory state around the buggy address: [ 15.754329] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.754547] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.755083] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.755518] ^ [ 15.755698] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.755917] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.756207] ================================================================== [ 16.530956] ================================================================== [ 16.531314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.531708] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.531965] [ 16.532053] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.532100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.532113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.532135] Call Trace: [ 16.532150] <TASK> [ 16.532165] dump_stack_lvl+0x73/0xb0 [ 16.532193] print_report+0xd1/0x610 [ 16.532217] ? __virt_addr_valid+0x1db/0x2d0 [ 16.532241] ? kasan_atomics_helper+0x164f/0x5450 [ 16.532264] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.532289] ? kasan_atomics_helper+0x164f/0x5450 [ 16.532313] kasan_report+0x141/0x180 [ 16.532336] ? kasan_atomics_helper+0x164f/0x5450 [ 16.532363] kasan_check_range+0x10c/0x1c0 [ 16.532388] __kasan_check_write+0x18/0x20 [ 16.532409] kasan_atomics_helper+0x164f/0x5450 [ 16.532443] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.532468] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.532495] ? trace_hardirqs_on+0x37/0xe0 [ 16.532518] ? kasan_atomics+0x152/0x310 [ 16.532546] kasan_atomics+0x1dc/0x310 [ 16.532581] ? __pfx_kasan_atomics+0x10/0x10 [ 16.532607] ? __pfx_kasan_atomics+0x10/0x10 [ 16.532635] kunit_try_run_case+0x1a5/0x480 [ 16.532661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.532685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.532711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.532737] ? __kthread_parkme+0x82/0x180 [ 16.532760] ? preempt_count_sub+0x50/0x80 [ 16.532785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.532811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.532837] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.532864] kthread+0x337/0x6f0 [ 16.532884] ? trace_preempt_on+0x20/0xc0 [ 16.532907] ? __pfx_kthread+0x10/0x10 [ 16.532929] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.532952] ? calculate_sigpending+0x7b/0xa0 [ 16.532979] ? __pfx_kthread+0x10/0x10 [ 16.533001] ret_from_fork+0x116/0x1d0 [ 16.533021] ? __pfx_kthread+0x10/0x10 [ 16.533043] ret_from_fork_asm+0x1a/0x30 [ 16.533075] </TASK> [ 16.533085] [ 16.540528] Allocated by task 282: [ 16.540721] kasan_save_stack+0x45/0x70 [ 16.540946] kasan_save_track+0x18/0x40 [ 16.541163] kasan_save_alloc_info+0x3b/0x50 [ 16.541378] __kasan_kmalloc+0xb7/0xc0 [ 16.541611] __kmalloc_cache_noprof+0x189/0x420 [ 16.541867] kasan_atomics+0x95/0x310 [ 16.542059] kunit_try_run_case+0x1a5/0x480 [ 16.542246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.542544] kthread+0x337/0x6f0 [ 16.542704] ret_from_fork+0x116/0x1d0 [ 16.542839] ret_from_fork_asm+0x1a/0x30 [ 16.542981] [ 16.543054] The buggy address belongs to the object at ffff888102a5fe80 [ 16.543054] which belongs to the cache kmalloc-64 of size 64 [ 16.543564] The buggy address is located 0 bytes to the right of [ 16.543564] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.544119] [ 16.544215] The buggy address belongs to the physical page: [ 16.544498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.544825] flags: 0x200000000000000(node=0|zone=2) [ 16.544991] page_type: f5(slab) [ 16.545112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.545497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.545871] page dumped because: kasan: bad access detected [ 16.546121] [ 16.546216] Memory state around the buggy address: [ 16.546448] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.546700] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.546917] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.547210] ^ [ 16.547443] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.547775] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.547993] ================================================================== [ 15.592738] ================================================================== [ 15.593059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.593385] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.593760] [ 15.593849] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.593892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.593905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.593927] Call Trace: [ 15.593941] <TASK> [ 15.593956] dump_stack_lvl+0x73/0xb0 [ 15.593985] print_report+0xd1/0x610 [ 15.594008] ? __virt_addr_valid+0x1db/0x2d0 [ 15.594033] ? kasan_atomics_helper+0x3df/0x5450 [ 15.594056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.594081] ? kasan_atomics_helper+0x3df/0x5450 [ 15.594105] kasan_report+0x141/0x180 [ 15.594127] ? kasan_atomics_helper+0x3df/0x5450 [ 15.594155] kasan_check_range+0x10c/0x1c0 [ 15.594181] __kasan_check_read+0x15/0x20 [ 15.594202] kasan_atomics_helper+0x3df/0x5450 [ 15.594226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.594387] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.594416] ? trace_hardirqs_on+0x37/0xe0 [ 15.594440] ? kasan_atomics+0x152/0x310 [ 15.594468] kasan_atomics+0x1dc/0x310 [ 15.594493] ? __pfx_kasan_atomics+0x10/0x10 [ 15.594518] ? __pfx_kasan_atomics+0x10/0x10 [ 15.594547] kunit_try_run_case+0x1a5/0x480 [ 15.594588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594613] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.594639] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.594664] ? __kthread_parkme+0x82/0x180 [ 15.594686] ? preempt_count_sub+0x50/0x80 [ 15.594711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.594764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.594792] kthread+0x337/0x6f0 [ 15.594813] ? trace_preempt_on+0x20/0xc0 [ 15.594836] ? __pfx_kthread+0x10/0x10 [ 15.594858] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.594882] ? calculate_sigpending+0x7b/0xa0 [ 15.594908] ? __pfx_kthread+0x10/0x10 [ 15.594931] ret_from_fork+0x116/0x1d0 [ 15.594951] ? __pfx_kthread+0x10/0x10 [ 15.594973] ret_from_fork_asm+0x1a/0x30 [ 15.595005] </TASK> [ 15.595016] [ 15.603512] Allocated by task 282: [ 15.603724] kasan_save_stack+0x45/0x70 [ 15.603929] kasan_save_track+0x18/0x40 [ 15.604128] kasan_save_alloc_info+0x3b/0x50 [ 15.604302] __kasan_kmalloc+0xb7/0xc0 [ 15.604439] __kmalloc_cache_noprof+0x189/0x420 [ 15.604632] kasan_atomics+0x95/0x310 [ 15.604825] kunit_try_run_case+0x1a5/0x480 [ 15.605034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.605291] kthread+0x337/0x6f0 [ 15.605471] ret_from_fork+0x116/0x1d0 [ 15.605711] ret_from_fork_asm+0x1a/0x30 [ 15.605861] [ 15.605934] The buggy address belongs to the object at ffff888102a5fe80 [ 15.605934] which belongs to the cache kmalloc-64 of size 64 [ 15.606412] The buggy address is located 0 bytes to the right of [ 15.606412] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.607157] [ 15.607319] The buggy address belongs to the physical page: [ 15.607620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.607883] flags: 0x200000000000000(node=0|zone=2) [ 15.608047] page_type: f5(slab) [ 15.608173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.608494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.608845] page dumped because: kasan: bad access detected [ 15.609111] [ 15.609259] Memory state around the buggy address: [ 15.609641] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.609907] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.610223] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.610678] ^ [ 15.610904] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.611169] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.611577] ================================================================== [ 15.716830] ================================================================== [ 15.717396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.717707] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.717987] [ 15.718094] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.718137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.718151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.718174] Call Trace: [ 15.718188] <TASK> [ 15.718203] dump_stack_lvl+0x73/0xb0 [ 15.718231] print_report+0xd1/0x610 [ 15.718253] ? __virt_addr_valid+0x1db/0x2d0 [ 15.718277] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.718299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.718324] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.718347] kasan_report+0x141/0x180 [ 15.718371] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.718399] kasan_check_range+0x10c/0x1c0 [ 15.718424] __kasan_check_write+0x18/0x20 [ 15.718445] kasan_atomics_helper+0x5fe/0x5450 [ 15.718470] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.718493] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.718520] ? trace_hardirqs_on+0x37/0xe0 [ 15.718543] ? kasan_atomics+0x152/0x310 [ 15.718581] kasan_atomics+0x1dc/0x310 [ 15.718605] ? __pfx_kasan_atomics+0x10/0x10 [ 15.718630] ? __pfx_kasan_atomics+0x10/0x10 [ 15.718657] kunit_try_run_case+0x1a5/0x480 [ 15.718683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.718708] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.718913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.718949] ? __kthread_parkme+0x82/0x180 [ 15.718971] ? preempt_count_sub+0x50/0x80 [ 15.718997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.719023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.719050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.719078] kthread+0x337/0x6f0 [ 15.719098] ? trace_preempt_on+0x20/0xc0 [ 15.719122] ? __pfx_kthread+0x10/0x10 [ 15.719144] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.719167] ? calculate_sigpending+0x7b/0xa0 [ 15.719192] ? __pfx_kthread+0x10/0x10 [ 15.719215] ret_from_fork+0x116/0x1d0 [ 15.719236] ? __pfx_kthread+0x10/0x10 [ 15.719257] ret_from_fork_asm+0x1a/0x30 [ 15.719289] </TASK> [ 15.719300] [ 15.728303] Allocated by task 282: [ 15.728780] kasan_save_stack+0x45/0x70 [ 15.728974] kasan_save_track+0x18/0x40 [ 15.729169] kasan_save_alloc_info+0x3b/0x50 [ 15.729329] __kasan_kmalloc+0xb7/0xc0 [ 15.729543] __kmalloc_cache_noprof+0x189/0x420 [ 15.729792] kasan_atomics+0x95/0x310 [ 15.729980] kunit_try_run_case+0x1a5/0x480 [ 15.730157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.730679] kthread+0x337/0x6f0 [ 15.730828] ret_from_fork+0x116/0x1d0 [ 15.730970] ret_from_fork_asm+0x1a/0x30 [ 15.731173] [ 15.731268] The buggy address belongs to the object at ffff888102a5fe80 [ 15.731268] which belongs to the cache kmalloc-64 of size 64 [ 15.731957] The buggy address is located 0 bytes to the right of [ 15.731957] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.732391] [ 15.732489] The buggy address belongs to the physical page: [ 15.732958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.733224] flags: 0x200000000000000(node=0|zone=2) [ 15.733623] page_type: f5(slab) [ 15.733767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.734055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.734650] page dumped because: kasan: bad access detected [ 15.734850] [ 15.734922] Memory state around the buggy address: [ 15.735147] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.735646] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.735888] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.736207] ^ [ 15.736577] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.736821] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.737139] ================================================================== [ 16.993054] ================================================================== [ 16.993470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.993830] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.994160] [ 16.994289] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.994333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.994345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.994366] Call Trace: [ 16.994382] <TASK> [ 16.994435] dump_stack_lvl+0x73/0xb0 [ 16.994466] print_report+0xd1/0x610 [ 16.994489] ? __virt_addr_valid+0x1db/0x2d0 [ 16.994513] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.994535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.994569] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.994609] kasan_report+0x141/0x180 [ 16.994633] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.994688] __asan_report_load8_noabort+0x18/0x20 [ 16.994728] kasan_atomics_helper+0x4fa5/0x5450 [ 16.994766] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.994804] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.994844] ? trace_hardirqs_on+0x37/0xe0 [ 16.994881] ? kasan_atomics+0x152/0x310 [ 16.994909] kasan_atomics+0x1dc/0x310 [ 16.994933] ? __pfx_kasan_atomics+0x10/0x10 [ 16.994958] ? __pfx_kasan_atomics+0x10/0x10 [ 16.994986] kunit_try_run_case+0x1a5/0x480 [ 16.995011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.995036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.995062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.995087] ? __kthread_parkme+0x82/0x180 [ 16.995110] ? preempt_count_sub+0x50/0x80 [ 16.995135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.995161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.995188] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.995216] kthread+0x337/0x6f0 [ 16.995237] ? trace_preempt_on+0x20/0xc0 [ 16.995260] ? __pfx_kthread+0x10/0x10 [ 16.995282] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.995305] ? calculate_sigpending+0x7b/0xa0 [ 16.995331] ? __pfx_kthread+0x10/0x10 [ 16.995353] ret_from_fork+0x116/0x1d0 [ 16.995374] ? __pfx_kthread+0x10/0x10 [ 16.995420] ret_from_fork_asm+0x1a/0x30 [ 16.995452] </TASK> [ 16.995464] [ 17.003135] Allocated by task 282: [ 17.003315] kasan_save_stack+0x45/0x70 [ 17.003544] kasan_save_track+0x18/0x40 [ 17.003746] kasan_save_alloc_info+0x3b/0x50 [ 17.003959] __kasan_kmalloc+0xb7/0xc0 [ 17.004151] __kmalloc_cache_noprof+0x189/0x420 [ 17.004373] kasan_atomics+0x95/0x310 [ 17.004593] kunit_try_run_case+0x1a5/0x480 [ 17.004819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.004998] kthread+0x337/0x6f0 [ 17.005169] ret_from_fork+0x116/0x1d0 [ 17.005385] ret_from_fork_asm+0x1a/0x30 [ 17.005634] [ 17.005752] The buggy address belongs to the object at ffff888102a5fe80 [ 17.005752] which belongs to the cache kmalloc-64 of size 64 [ 17.006245] The buggy address is located 0 bytes to the right of [ 17.006245] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 17.006817] [ 17.006920] The buggy address belongs to the physical page: [ 17.007123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 17.007499] flags: 0x200000000000000(node=0|zone=2) [ 17.007702] page_type: f5(slab) [ 17.007823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.008054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.008378] page dumped because: kasan: bad access detected [ 17.008688] [ 17.008783] Memory state around the buggy address: [ 17.009002] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.009249] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.009490] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.009817] ^ [ 17.010056] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.010436] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.010769] ================================================================== [ 15.573841] ================================================================== [ 15.574145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.574644] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.574947] [ 15.575035] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.575079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.575091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.575113] Call Trace: [ 15.575127] <TASK> [ 15.575141] dump_stack_lvl+0x73/0xb0 [ 15.575169] print_report+0xd1/0x610 [ 15.575192] ? __virt_addr_valid+0x1db/0x2d0 [ 15.575215] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.575237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.575261] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.575284] kasan_report+0x141/0x180 [ 15.575306] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.575333] __asan_report_store4_noabort+0x1b/0x30 [ 15.575359] kasan_atomics_helper+0x4b6e/0x5450 [ 15.575383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.575422] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.575447] ? trace_hardirqs_on+0x37/0xe0 [ 15.575471] ? kasan_atomics+0x152/0x310 [ 15.575617] kasan_atomics+0x1dc/0x310 [ 15.575644] ? __pfx_kasan_atomics+0x10/0x10 [ 15.575690] ? __pfx_kasan_atomics+0x10/0x10 [ 15.575719] kunit_try_run_case+0x1a5/0x480 [ 15.575745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.575771] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.575797] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.575823] ? __kthread_parkme+0x82/0x180 [ 15.575846] ? preempt_count_sub+0x50/0x80 [ 15.575872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.575898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.575924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.575952] kthread+0x337/0x6f0 [ 15.575972] ? trace_preempt_on+0x20/0xc0 [ 15.575996] ? __pfx_kthread+0x10/0x10 [ 15.576018] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.576042] ? calculate_sigpending+0x7b/0xa0 [ 15.576072] ? __pfx_kthread+0x10/0x10 [ 15.576095] ret_from_fork+0x116/0x1d0 [ 15.576114] ? __pfx_kthread+0x10/0x10 [ 15.576138] ret_from_fork_asm+0x1a/0x30 [ 15.576169] </TASK> [ 15.576181] [ 15.583736] Allocated by task 282: [ 15.583914] kasan_save_stack+0x45/0x70 [ 15.584091] kasan_save_track+0x18/0x40 [ 15.584229] kasan_save_alloc_info+0x3b/0x50 [ 15.584380] __kasan_kmalloc+0xb7/0xc0 [ 15.584544] __kmalloc_cache_noprof+0x189/0x420 [ 15.584931] kasan_atomics+0x95/0x310 [ 15.585123] kunit_try_run_case+0x1a5/0x480 [ 15.585334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.585563] kthread+0x337/0x6f0 [ 15.585686] ret_from_fork+0x116/0x1d0 [ 15.585900] ret_from_fork_asm+0x1a/0x30 [ 15.586159] [ 15.586607] The buggy address belongs to the object at ffff888102a5fe80 [ 15.586607] which belongs to the cache kmalloc-64 of size 64 [ 15.586992] The buggy address is located 0 bytes to the right of [ 15.586992] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.587778] [ 15.587884] The buggy address belongs to the physical page: [ 15.588144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.588585] flags: 0x200000000000000(node=0|zone=2) [ 15.588753] page_type: f5(slab) [ 15.588875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.589215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.589609] page dumped because: kasan: bad access detected [ 15.590009] [ 15.590097] Memory state around the buggy address: [ 15.590380] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.590735] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.590953] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.591353] ^ [ 15.591692] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591976] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.592301] ================================================================== [ 16.422094] ================================================================== [ 16.422489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 16.423133] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.423367] [ 16.423592] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.423638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.423651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.423674] Call Trace: [ 16.423691] <TASK> [ 16.423708] dump_stack_lvl+0x73/0xb0 [ 16.423737] print_report+0xd1/0x610 [ 16.423760] ? __virt_addr_valid+0x1db/0x2d0 [ 16.423783] ? kasan_atomics_helper+0x1467/0x5450 [ 16.423806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.423831] ? kasan_atomics_helper+0x1467/0x5450 [ 16.423855] kasan_report+0x141/0x180 [ 16.423879] ? kasan_atomics_helper+0x1467/0x5450 [ 16.423907] kasan_check_range+0x10c/0x1c0 [ 16.423932] __kasan_check_write+0x18/0x20 [ 16.423954] kasan_atomics_helper+0x1467/0x5450 [ 16.423980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.424004] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.424031] ? trace_hardirqs_on+0x37/0xe0 [ 16.424054] ? kasan_atomics+0x152/0x310 [ 16.424088] kasan_atomics+0x1dc/0x310 [ 16.424111] ? __pfx_kasan_atomics+0x10/0x10 [ 16.424137] ? __pfx_kasan_atomics+0x10/0x10 [ 16.424165] kunit_try_run_case+0x1a5/0x480 [ 16.424191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.424216] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.424242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.424268] ? __kthread_parkme+0x82/0x180 [ 16.424289] ? preempt_count_sub+0x50/0x80 [ 16.424314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.424340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.424366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.424401] kthread+0x337/0x6f0 [ 16.424423] ? trace_preempt_on+0x20/0xc0 [ 16.424447] ? __pfx_kthread+0x10/0x10 [ 16.424468] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.424492] ? calculate_sigpending+0x7b/0xa0 [ 16.424518] ? __pfx_kthread+0x10/0x10 [ 16.424540] ret_from_fork+0x116/0x1d0 [ 16.424604] ? __pfx_kthread+0x10/0x10 [ 16.424626] ret_from_fork_asm+0x1a/0x30 [ 16.424659] </TASK> [ 16.424671] [ 16.436531] Allocated by task 282: [ 16.436882] kasan_save_stack+0x45/0x70 [ 16.437246] kasan_save_track+0x18/0x40 [ 16.437644] kasan_save_alloc_info+0x3b/0x50 [ 16.438042] __kasan_kmalloc+0xb7/0xc0 [ 16.438414] __kmalloc_cache_noprof+0x189/0x420 [ 16.438848] kasan_atomics+0x95/0x310 [ 16.439066] kunit_try_run_case+0x1a5/0x480 [ 16.439216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.439420] kthread+0x337/0x6f0 [ 16.439767] ret_from_fork+0x116/0x1d0 [ 16.440122] ret_from_fork_asm+0x1a/0x30 [ 16.440512] [ 16.440701] The buggy address belongs to the object at ffff888102a5fe80 [ 16.440701] which belongs to the cache kmalloc-64 of size 64 [ 16.441640] The buggy address is located 0 bytes to the right of [ 16.441640] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.442021] [ 16.442098] The buggy address belongs to the physical page: [ 16.442277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.442850] flags: 0x200000000000000(node=0|zone=2) [ 16.443310] page_type: f5(slab) [ 16.443656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.444316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.444993] page dumped because: kasan: bad access detected [ 16.445496] [ 16.445663] Memory state around the buggy address: [ 16.446110] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.446595] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.446816] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.447031] ^ [ 16.447186] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.447426] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.448119] ================================================================== [ 16.004185] ================================================================== [ 16.004516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 16.004833] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.005117] [ 16.005224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.005267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.005279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.005301] Call Trace: [ 16.005316] <TASK> [ 16.005331] dump_stack_lvl+0x73/0xb0 [ 16.005358] print_report+0xd1/0x610 [ 16.005380] ? __virt_addr_valid+0x1db/0x2d0 [ 16.005402] ? kasan_atomics_helper+0xd47/0x5450 [ 16.005423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.005446] ? kasan_atomics_helper+0xd47/0x5450 [ 16.005468] kasan_report+0x141/0x180 [ 16.005490] ? kasan_atomics_helper+0xd47/0x5450 [ 16.005516] kasan_check_range+0x10c/0x1c0 [ 16.005540] __kasan_check_write+0x18/0x20 [ 16.005693] kasan_atomics_helper+0xd47/0x5450 [ 16.005731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.005757] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.005794] ? trace_hardirqs_on+0x37/0xe0 [ 16.005819] ? kasan_atomics+0x152/0x310 [ 16.005846] kasan_atomics+0x1dc/0x310 [ 16.005870] ? __pfx_kasan_atomics+0x10/0x10 [ 16.005896] ? __pfx_kasan_atomics+0x10/0x10 [ 16.005924] kunit_try_run_case+0x1a5/0x480 [ 16.005949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.005975] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.006000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.006034] ? __kthread_parkme+0x82/0x180 [ 16.006059] ? preempt_count_sub+0x50/0x80 [ 16.006084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.006122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.006149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.006177] kthread+0x337/0x6f0 [ 16.006206] ? trace_preempt_on+0x20/0xc0 [ 16.006230] ? __pfx_kthread+0x10/0x10 [ 16.006304] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.006328] ? calculate_sigpending+0x7b/0xa0 [ 16.006355] ? __pfx_kthread+0x10/0x10 [ 16.006377] ret_from_fork+0x116/0x1d0 [ 16.006399] ? __pfx_kthread+0x10/0x10 [ 16.006591] ret_from_fork_asm+0x1a/0x30 [ 16.006629] </TASK> [ 16.006639] [ 16.015685] Allocated by task 282: [ 16.015843] kasan_save_stack+0x45/0x70 [ 16.016065] kasan_save_track+0x18/0x40 [ 16.016310] kasan_save_alloc_info+0x3b/0x50 [ 16.016571] __kasan_kmalloc+0xb7/0xc0 [ 16.016767] __kmalloc_cache_noprof+0x189/0x420 [ 16.016984] kasan_atomics+0x95/0x310 [ 16.017180] kunit_try_run_case+0x1a5/0x480 [ 16.017490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.017752] kthread+0x337/0x6f0 [ 16.017880] ret_from_fork+0x116/0x1d0 [ 16.018016] ret_from_fork_asm+0x1a/0x30 [ 16.018202] [ 16.018308] The buggy address belongs to the object at ffff888102a5fe80 [ 16.018308] which belongs to the cache kmalloc-64 of size 64 [ 16.018981] The buggy address is located 0 bytes to the right of [ 16.018981] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.019618] [ 16.019743] The buggy address belongs to the physical page: [ 16.020299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.020756] flags: 0x200000000000000(node=0|zone=2) [ 16.020955] page_type: f5(slab) [ 16.021076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.021629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.021919] page dumped because: kasan: bad access detected [ 16.022200] [ 16.022402] Memory state around the buggy address: [ 16.022587] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.022819] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.023170] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.023860] ^ [ 16.024162] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.024398] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.024843] ================================================================== [ 15.814087] ================================================================== [ 15.814576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.814865] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.815202] [ 15.815497] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.815570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.815584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.815607] Call Trace: [ 15.815624] <TASK> [ 15.815639] dump_stack_lvl+0x73/0xb0 [ 15.815670] print_report+0xd1/0x610 [ 15.815694] ? __virt_addr_valid+0x1db/0x2d0 [ 15.815812] ? kasan_atomics_helper+0x860/0x5450 [ 15.815835] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.815860] ? kasan_atomics_helper+0x860/0x5450 [ 15.815883] kasan_report+0x141/0x180 [ 15.815907] ? kasan_atomics_helper+0x860/0x5450 [ 15.815935] kasan_check_range+0x10c/0x1c0 [ 15.815960] __kasan_check_write+0x18/0x20 [ 15.815981] kasan_atomics_helper+0x860/0x5450 [ 15.816014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.816039] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.816081] ? trace_hardirqs_on+0x37/0xe0 [ 15.816105] ? kasan_atomics+0x152/0x310 [ 15.816132] kasan_atomics+0x1dc/0x310 [ 15.816156] ? __pfx_kasan_atomics+0x10/0x10 [ 15.816191] ? __pfx_kasan_atomics+0x10/0x10 [ 15.816219] kunit_try_run_case+0x1a5/0x480 [ 15.816255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.816280] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.816306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.816332] ? __kthread_parkme+0x82/0x180 [ 15.816355] ? preempt_count_sub+0x50/0x80 [ 15.816380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.816406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.816433] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.816460] kthread+0x337/0x6f0 [ 15.816481] ? trace_preempt_on+0x20/0xc0 [ 15.816505] ? __pfx_kthread+0x10/0x10 [ 15.816648] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.816672] ? calculate_sigpending+0x7b/0xa0 [ 15.816698] ? __pfx_kthread+0x10/0x10 [ 15.816722] ret_from_fork+0x116/0x1d0 [ 15.816744] ? __pfx_kthread+0x10/0x10 [ 15.816766] ret_from_fork_asm+0x1a/0x30 [ 15.816799] </TASK> [ 15.816810] [ 15.825670] Allocated by task 282: [ 15.825816] kasan_save_stack+0x45/0x70 [ 15.825969] kasan_save_track+0x18/0x40 [ 15.826973] kasan_save_alloc_info+0x3b/0x50 [ 15.827829] __kasan_kmalloc+0xb7/0xc0 [ 15.828047] __kmalloc_cache_noprof+0x189/0x420 [ 15.828313] kasan_atomics+0x95/0x310 [ 15.828513] kunit_try_run_case+0x1a5/0x480 [ 15.828764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.828943] kthread+0x337/0x6f0 [ 15.829065] ret_from_fork+0x116/0x1d0 [ 15.829202] ret_from_fork_asm+0x1a/0x30 [ 15.829342] [ 15.829417] The buggy address belongs to the object at ffff888102a5fe80 [ 15.829417] which belongs to the cache kmalloc-64 of size 64 [ 15.829815] The buggy address is located 0 bytes to the right of [ 15.829815] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.830704] [ 15.830858] The buggy address belongs to the physical page: [ 15.831226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.831469] flags: 0x200000000000000(node=0|zone=2) [ 15.831645] page_type: f5(slab) [ 15.831767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.832003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.833273] page dumped because: kasan: bad access detected [ 15.833457] [ 15.833529] Memory state around the buggy address: [ 15.833697] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.833913] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.834212] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.834570] ^ [ 15.834731] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.834950] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.835176] ================================================================== [ 16.310013] ================================================================== [ 16.310455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 16.311538] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.312092] [ 16.312332] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.312482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.312499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.312523] Call Trace: [ 16.312540] <TASK> [ 16.312603] dump_stack_lvl+0x73/0xb0 [ 16.312637] print_report+0xd1/0x610 [ 16.312662] ? __virt_addr_valid+0x1db/0x2d0 [ 16.312687] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.312711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.312736] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.312759] kasan_report+0x141/0x180 [ 16.312783] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.312811] kasan_check_range+0x10c/0x1c0 [ 16.312837] __kasan_check_write+0x18/0x20 [ 16.312857] kasan_atomics_helper+0x12e6/0x5450 [ 16.312883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.312907] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.312933] ? trace_hardirqs_on+0x37/0xe0 [ 16.312957] ? kasan_atomics+0x152/0x310 [ 16.312984] kasan_atomics+0x1dc/0x310 [ 16.313142] ? __pfx_kasan_atomics+0x10/0x10 [ 16.313170] ? __pfx_kasan_atomics+0x10/0x10 [ 16.313211] kunit_try_run_case+0x1a5/0x480 [ 16.313238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.313263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.313290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.313316] ? __kthread_parkme+0x82/0x180 [ 16.313339] ? preempt_count_sub+0x50/0x80 [ 16.313364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.313390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.313416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.313443] kthread+0x337/0x6f0 [ 16.313464] ? trace_preempt_on+0x20/0xc0 [ 16.313487] ? __pfx_kthread+0x10/0x10 [ 16.313509] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.313532] ? calculate_sigpending+0x7b/0xa0 [ 16.313567] ? __pfx_kthread+0x10/0x10 [ 16.313591] ret_from_fork+0x116/0x1d0 [ 16.313612] ? __pfx_kthread+0x10/0x10 [ 16.313634] ret_from_fork_asm+0x1a/0x30 [ 16.313666] </TASK> [ 16.313678] [ 16.324005] Allocated by task 282: [ 16.324384] kasan_save_stack+0x45/0x70 [ 16.324612] kasan_save_track+0x18/0x40 [ 16.324793] kasan_save_alloc_info+0x3b/0x50 [ 16.324994] __kasan_kmalloc+0xb7/0xc0 [ 16.325168] __kmalloc_cache_noprof+0x189/0x420 [ 16.325378] kasan_atomics+0x95/0x310 [ 16.325971] kunit_try_run_case+0x1a5/0x480 [ 16.326250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.326697] kthread+0x337/0x6f0 [ 16.327003] ret_from_fork+0x116/0x1d0 [ 16.327195] ret_from_fork_asm+0x1a/0x30 [ 16.327378] [ 16.327807] The buggy address belongs to the object at ffff888102a5fe80 [ 16.327807] which belongs to the cache kmalloc-64 of size 64 [ 16.328696] The buggy address is located 0 bytes to the right of [ 16.328696] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.329496] [ 16.329603] The buggy address belongs to the physical page: [ 16.329830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.330152] flags: 0x200000000000000(node=0|zone=2) [ 16.330374] page_type: f5(slab) [ 16.330951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.331429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.331954] page dumped because: kasan: bad access detected [ 16.332208] [ 16.332299] Memory state around the buggy address: [ 16.332876] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.333277] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.333964] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.334283] ^ [ 16.334796] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.335116] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.335588] ================================================================== [ 16.365162] ================================================================== [ 16.365850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 16.366101] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.366327] [ 16.366423] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.366468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.366482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.366504] Call Trace: [ 16.366521] <TASK> [ 16.366538] dump_stack_lvl+0x73/0xb0 [ 16.366576] print_report+0xd1/0x610 [ 16.366599] ? __virt_addr_valid+0x1db/0x2d0 [ 16.366624] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.366646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.366671] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.366695] kasan_report+0x141/0x180 [ 16.366718] ? kasan_atomics_helper+0x13b5/0x5450 [ 16.366746] kasan_check_range+0x10c/0x1c0 [ 16.366771] __kasan_check_read+0x15/0x20 [ 16.366792] kasan_atomics_helper+0x13b5/0x5450 [ 16.366816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.366840] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.366867] ? trace_hardirqs_on+0x37/0xe0 [ 16.366891] ? kasan_atomics+0x152/0x310 [ 16.366918] kasan_atomics+0x1dc/0x310 [ 16.366942] ? __pfx_kasan_atomics+0x10/0x10 [ 16.366967] ? __pfx_kasan_atomics+0x10/0x10 [ 16.366995] kunit_try_run_case+0x1a5/0x480 [ 16.367021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.367046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.367072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.367097] ? __kthread_parkme+0x82/0x180 [ 16.367119] ? preempt_count_sub+0x50/0x80 [ 16.367145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.367171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.367197] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.367224] kthread+0x337/0x6f0 [ 16.367244] ? trace_preempt_on+0x20/0xc0 [ 16.367268] ? __pfx_kthread+0x10/0x10 [ 16.367290] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.367313] ? calculate_sigpending+0x7b/0xa0 [ 16.367339] ? __pfx_kthread+0x10/0x10 [ 16.367361] ret_from_fork+0x116/0x1d0 [ 16.367381] ? __pfx_kthread+0x10/0x10 [ 16.367403] ret_from_fork_asm+0x1a/0x30 [ 16.367435] </TASK> [ 16.367447] [ 16.382445] Allocated by task 282: [ 16.382796] kasan_save_stack+0x45/0x70 [ 16.383166] kasan_save_track+0x18/0x40 [ 16.383567] kasan_save_alloc_info+0x3b/0x50 [ 16.383848] __kasan_kmalloc+0xb7/0xc0 [ 16.384126] __kmalloc_cache_noprof+0x189/0x420 [ 16.384286] kasan_atomics+0x95/0x310 [ 16.384496] kunit_try_run_case+0x1a5/0x480 [ 16.384903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.385383] kthread+0x337/0x6f0 [ 16.385722] ret_from_fork+0x116/0x1d0 [ 16.385938] ret_from_fork_asm+0x1a/0x30 [ 16.386081] [ 16.386157] The buggy address belongs to the object at ffff888102a5fe80 [ 16.386157] which belongs to the cache kmalloc-64 of size 64 [ 16.386830] The buggy address is located 0 bytes to the right of [ 16.386830] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.387935] [ 16.388123] The buggy address belongs to the physical page: [ 16.388644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.389039] flags: 0x200000000000000(node=0|zone=2) [ 16.389467] page_type: f5(slab) [ 16.389603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.389836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.390064] page dumped because: kasan: bad access detected [ 16.390237] [ 16.390309] Memory state around the buggy address: [ 16.390699] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.391310] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.391958] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.392614] ^ [ 16.393040] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.393693] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.394303] ================================================================== [ 15.554619] ================================================================== [ 15.554915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.555218] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.555854] [ 15.555955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.555999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.556012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.556033] Call Trace: [ 15.556045] <TASK> [ 15.556064] dump_stack_lvl+0x73/0xb0 [ 15.556092] print_report+0xd1/0x610 [ 15.556115] ? __virt_addr_valid+0x1db/0x2d0 [ 15.556138] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.556160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.556184] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.556207] kasan_report+0x141/0x180 [ 15.556229] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.556319] __asan_report_load4_noabort+0x18/0x20 [ 15.556346] kasan_atomics_helper+0x4b88/0x5450 [ 15.556370] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.556394] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.556418] ? trace_hardirqs_on+0x37/0xe0 [ 15.556441] ? kasan_atomics+0x152/0x310 [ 15.556468] kasan_atomics+0x1dc/0x310 [ 15.556491] ? __pfx_kasan_atomics+0x10/0x10 [ 15.556515] ? __pfx_kasan_atomics+0x10/0x10 [ 15.556542] kunit_try_run_case+0x1a5/0x480 [ 15.556580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.556605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.556629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.556654] ? __kthread_parkme+0x82/0x180 [ 15.556687] ? preempt_count_sub+0x50/0x80 [ 15.556711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.556736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.556761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.556787] kthread+0x337/0x6f0 [ 15.556807] ? trace_preempt_on+0x20/0xc0 [ 15.556829] ? __pfx_kthread+0x10/0x10 [ 15.556850] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.556872] ? calculate_sigpending+0x7b/0xa0 [ 15.556896] ? __pfx_kthread+0x10/0x10 [ 15.556918] ret_from_fork+0x116/0x1d0 [ 15.556937] ? __pfx_kthread+0x10/0x10 [ 15.556957] ret_from_fork_asm+0x1a/0x30 [ 15.556987] </TASK> [ 15.556998] [ 15.564984] Allocated by task 282: [ 15.565158] kasan_save_stack+0x45/0x70 [ 15.565387] kasan_save_track+0x18/0x40 [ 15.565652] kasan_save_alloc_info+0x3b/0x50 [ 15.565866] __kasan_kmalloc+0xb7/0xc0 [ 15.566054] __kmalloc_cache_noprof+0x189/0x420 [ 15.566447] kasan_atomics+0x95/0x310 [ 15.566663] kunit_try_run_case+0x1a5/0x480 [ 15.566872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.567102] kthread+0x337/0x6f0 [ 15.567352] ret_from_fork+0x116/0x1d0 [ 15.567571] ret_from_fork_asm+0x1a/0x30 [ 15.567738] [ 15.567836] The buggy address belongs to the object at ffff888102a5fe80 [ 15.567836] which belongs to the cache kmalloc-64 of size 64 [ 15.568387] The buggy address is located 0 bytes to the right of [ 15.568387] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.568856] [ 15.568926] The buggy address belongs to the physical page: [ 15.569099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.569392] flags: 0x200000000000000(node=0|zone=2) [ 15.569633] page_type: f5(slab) [ 15.569802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.570369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.570642] page dumped because: kasan: bad access detected [ 15.570810] [ 15.570879] Memory state around the buggy address: [ 15.571032] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.571247] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.571819] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.572152] ^ [ 15.572379] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.572826] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.573153] ================================================================== [ 15.961563] ================================================================== [ 15.961840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.962372] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.962728] [ 15.963063] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.963112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.963125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.963148] Call Trace: [ 15.963160] <TASK> [ 15.963175] dump_stack_lvl+0x73/0xb0 [ 15.963204] print_report+0xd1/0x610 [ 15.963228] ? __virt_addr_valid+0x1db/0x2d0 [ 15.963251] ? kasan_atomics_helper+0xc70/0x5450 [ 15.963274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.963299] ? kasan_atomics_helper+0xc70/0x5450 [ 15.963323] kasan_report+0x141/0x180 [ 15.963346] ? kasan_atomics_helper+0xc70/0x5450 [ 15.963374] kasan_check_range+0x10c/0x1c0 [ 15.963399] __kasan_check_write+0x18/0x20 [ 15.963421] kasan_atomics_helper+0xc70/0x5450 [ 15.963445] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.963471] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.963497] ? trace_hardirqs_on+0x37/0xe0 [ 15.963520] ? kasan_atomics+0x152/0x310 [ 15.963559] kasan_atomics+0x1dc/0x310 [ 15.963583] ? __pfx_kasan_atomics+0x10/0x10 [ 15.963609] ? __pfx_kasan_atomics+0x10/0x10 [ 15.963638] kunit_try_run_case+0x1a5/0x480 [ 15.963663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963688] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.963714] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.963791] ? __kthread_parkme+0x82/0x180 [ 15.963813] ? preempt_count_sub+0x50/0x80 [ 15.963871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.963906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.963960] kthread+0x337/0x6f0 [ 15.963981] ? trace_preempt_on+0x20/0xc0 [ 15.964005] ? __pfx_kthread+0x10/0x10 [ 15.964028] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.964053] ? calculate_sigpending+0x7b/0xa0 [ 15.964088] ? __pfx_kthread+0x10/0x10 [ 15.964112] ret_from_fork+0x116/0x1d0 [ 15.964132] ? __pfx_kthread+0x10/0x10 [ 15.964155] ret_from_fork_asm+0x1a/0x30 [ 15.964187] </TASK> [ 15.964199] [ 15.973286] Allocated by task 282: [ 15.973600] kasan_save_stack+0x45/0x70 [ 15.973758] kasan_save_track+0x18/0x40 [ 15.974036] kasan_save_alloc_info+0x3b/0x50 [ 15.974250] __kasan_kmalloc+0xb7/0xc0 [ 15.974526] __kmalloc_cache_noprof+0x189/0x420 [ 15.974779] kasan_atomics+0x95/0x310 [ 15.974975] kunit_try_run_case+0x1a5/0x480 [ 15.975148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.975379] kthread+0x337/0x6f0 [ 15.975545] ret_from_fork+0x116/0x1d0 [ 15.975688] ret_from_fork_asm+0x1a/0x30 [ 15.975964] [ 15.976084] The buggy address belongs to the object at ffff888102a5fe80 [ 15.976084] which belongs to the cache kmalloc-64 of size 64 [ 15.976710] The buggy address is located 0 bytes to the right of [ 15.976710] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.977183] [ 15.977410] The buggy address belongs to the physical page: [ 15.978003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.978335] flags: 0x200000000000000(node=0|zone=2) [ 15.978688] page_type: f5(slab) [ 15.978947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.979236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.979633] page dumped because: kasan: bad access detected [ 15.979940] [ 15.980113] Memory state around the buggy address: [ 15.980455] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.980717] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.981050] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.981612] ^ [ 15.981852] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.982078] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.982665] ================================================================== [ 16.476778] ================================================================== [ 16.477594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 16.478112] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.478884] [ 16.479130] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.479174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.479187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.479209] Call Trace: [ 16.479223] <TASK> [ 16.479239] dump_stack_lvl+0x73/0xb0 [ 16.479267] print_report+0xd1/0x610 [ 16.479290] ? __virt_addr_valid+0x1db/0x2d0 [ 16.479313] ? kasan_atomics_helper+0x151d/0x5450 [ 16.479345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.479370] ? kasan_atomics_helper+0x151d/0x5450 [ 16.479394] kasan_report+0x141/0x180 [ 16.479416] ? kasan_atomics_helper+0x151d/0x5450 [ 16.479444] kasan_check_range+0x10c/0x1c0 [ 16.479469] __kasan_check_write+0x18/0x20 [ 16.479490] kasan_atomics_helper+0x151d/0x5450 [ 16.479514] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.479539] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.479574] ? trace_hardirqs_on+0x37/0xe0 [ 16.479597] ? kasan_atomics+0x152/0x310 [ 16.479624] kasan_atomics+0x1dc/0x310 [ 16.479648] ? __pfx_kasan_atomics+0x10/0x10 [ 16.479673] ? __pfx_kasan_atomics+0x10/0x10 [ 16.479701] kunit_try_run_case+0x1a5/0x480 [ 16.479726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.479751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.479777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.479802] ? __kthread_parkme+0x82/0x180 [ 16.479825] ? preempt_count_sub+0x50/0x80 [ 16.479849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.479875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.479901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.479928] kthread+0x337/0x6f0 [ 16.479949] ? trace_preempt_on+0x20/0xc0 [ 16.479972] ? __pfx_kthread+0x10/0x10 [ 16.479994] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.480017] ? calculate_sigpending+0x7b/0xa0 [ 16.480042] ? __pfx_kthread+0x10/0x10 [ 16.480071] ret_from_fork+0x116/0x1d0 [ 16.480092] ? __pfx_kthread+0x10/0x10 [ 16.480114] ret_from_fork_asm+0x1a/0x30 [ 16.480146] </TASK> [ 16.480157] [ 16.491851] Allocated by task 282: [ 16.492173] kasan_save_stack+0x45/0x70 [ 16.492580] kasan_save_track+0x18/0x40 [ 16.492936] kasan_save_alloc_info+0x3b/0x50 [ 16.493191] __kasan_kmalloc+0xb7/0xc0 [ 16.493325] __kmalloc_cache_noprof+0x189/0x420 [ 16.493689] kasan_atomics+0x95/0x310 [ 16.494036] kunit_try_run_case+0x1a5/0x480 [ 16.494443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.494913] kthread+0x337/0x6f0 [ 16.495037] ret_from_fork+0x116/0x1d0 [ 16.495172] ret_from_fork_asm+0x1a/0x30 [ 16.495314] [ 16.495387] The buggy address belongs to the object at ffff888102a5fe80 [ 16.495387] which belongs to the cache kmalloc-64 of size 64 [ 16.496464] The buggy address is located 0 bytes to the right of [ 16.496464] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.497535] [ 16.497703] The buggy address belongs to the physical page: [ 16.498068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.498315] flags: 0x200000000000000(node=0|zone=2) [ 16.498683] page_type: f5(slab) [ 16.498995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.499675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.500317] page dumped because: kasan: bad access detected [ 16.500595] [ 16.500668] Memory state around the buggy address: [ 16.500826] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.501043] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.501259] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.501649] ^ [ 16.502057] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.502702] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.503298] ================================================================== [ 16.689674] ================================================================== [ 16.689998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.690703] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.690940] [ 16.691026] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.691070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.691082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.691104] Call Trace: [ 16.691118] <TASK> [ 16.691132] dump_stack_lvl+0x73/0xb0 [ 16.691161] print_report+0xd1/0x610 [ 16.691184] ? __virt_addr_valid+0x1db/0x2d0 [ 16.691208] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.691231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.691255] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.691280] kasan_report+0x141/0x180 [ 16.691303] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.691331] kasan_check_range+0x10c/0x1c0 [ 16.691356] __kasan_check_write+0x18/0x20 [ 16.691378] kasan_atomics_helper+0x1b22/0x5450 [ 16.691402] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.691426] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.691452] ? trace_hardirqs_on+0x37/0xe0 [ 16.691475] ? kasan_atomics+0x152/0x310 [ 16.691503] kasan_atomics+0x1dc/0x310 [ 16.691527] ? __pfx_kasan_atomics+0x10/0x10 [ 16.691564] ? __pfx_kasan_atomics+0x10/0x10 [ 16.691593] kunit_try_run_case+0x1a5/0x480 [ 16.691619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.691644] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.691671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.691697] ? __kthread_parkme+0x82/0x180 [ 16.691719] ? preempt_count_sub+0x50/0x80 [ 16.691758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.691785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.691811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.691839] kthread+0x337/0x6f0 [ 16.691862] ? trace_preempt_on+0x20/0xc0 [ 16.691886] ? __pfx_kthread+0x10/0x10 [ 16.691908] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.691932] ? calculate_sigpending+0x7b/0xa0 [ 16.691958] ? __pfx_kthread+0x10/0x10 [ 16.691980] ret_from_fork+0x116/0x1d0 [ 16.692000] ? __pfx_kthread+0x10/0x10 [ 16.692021] ret_from_fork_asm+0x1a/0x30 [ 16.692053] </TASK> [ 16.692069] [ 16.699786] Allocated by task 282: [ 16.699980] kasan_save_stack+0x45/0x70 [ 16.700157] kasan_save_track+0x18/0x40 [ 16.700332] kasan_save_alloc_info+0x3b/0x50 [ 16.700559] __kasan_kmalloc+0xb7/0xc0 [ 16.700697] __kmalloc_cache_noprof+0x189/0x420 [ 16.700857] kasan_atomics+0x95/0x310 [ 16.701023] kunit_try_run_case+0x1a5/0x480 [ 16.701232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.701486] kthread+0x337/0x6f0 [ 16.701701] ret_from_fork+0x116/0x1d0 [ 16.701847] ret_from_fork_asm+0x1a/0x30 [ 16.701988] [ 16.702061] The buggy address belongs to the object at ffff888102a5fe80 [ 16.702061] which belongs to the cache kmalloc-64 of size 64 [ 16.702449] The buggy address is located 0 bytes to the right of [ 16.702449] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.702999] [ 16.703109] The buggy address belongs to the physical page: [ 16.703357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.703895] flags: 0x200000000000000(node=0|zone=2) [ 16.704107] page_type: f5(slab) [ 16.704228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.704462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.704786] page dumped because: kasan: bad access detected [ 16.705159] [ 16.705256] Memory state around the buggy address: [ 16.705480] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.705746] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.705962] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.706244] ^ [ 16.706459] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.706781] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.707192] ================================================================== [ 15.835824] ================================================================== [ 15.836081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.836322] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.836545] [ 15.837746] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.837799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.837813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.837837] Call Trace: [ 15.837855] <TASK> [ 15.837873] dump_stack_lvl+0x73/0xb0 [ 15.838151] print_report+0xd1/0x610 [ 15.838183] ? __virt_addr_valid+0x1db/0x2d0 [ 15.838208] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.838231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.838323] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.838348] kasan_report+0x141/0x180 [ 15.838372] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.838400] kasan_check_range+0x10c/0x1c0 [ 15.838436] __kasan_check_write+0x18/0x20 [ 15.838457] kasan_atomics_helper+0x8f9/0x5450 [ 15.838482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.838506] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.838532] ? trace_hardirqs_on+0x37/0xe0 [ 15.838570] ? kasan_atomics+0x152/0x310 [ 15.838597] kasan_atomics+0x1dc/0x310 [ 15.838621] ? __pfx_kasan_atomics+0x10/0x10 [ 15.838645] ? __pfx_kasan_atomics+0x10/0x10 [ 15.838674] kunit_try_run_case+0x1a5/0x480 [ 15.838699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.838723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.838749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.838774] ? __kthread_parkme+0x82/0x180 [ 15.838796] ? preempt_count_sub+0x50/0x80 [ 15.838823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.838849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.838875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.838903] kthread+0x337/0x6f0 [ 15.838923] ? trace_preempt_on+0x20/0xc0 [ 15.838946] ? __pfx_kthread+0x10/0x10 [ 15.838968] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.838992] ? calculate_sigpending+0x7b/0xa0 [ 15.839017] ? __pfx_kthread+0x10/0x10 [ 15.839040] ret_from_fork+0x116/0x1d0 [ 15.839060] ? __pfx_kthread+0x10/0x10 [ 15.839082] ret_from_fork_asm+0x1a/0x30 [ 15.839115] </TASK> [ 15.839126] [ 15.851510] Allocated by task 282: [ 15.851670] kasan_save_stack+0x45/0x70 [ 15.852069] kasan_save_track+0x18/0x40 [ 15.852412] kasan_save_alloc_info+0x3b/0x50 [ 15.852724] __kasan_kmalloc+0xb7/0xc0 [ 15.853044] __kmalloc_cache_noprof+0x189/0x420 [ 15.853427] kasan_atomics+0x95/0x310 [ 15.853818] kunit_try_run_case+0x1a5/0x480 [ 15.854123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.854572] kthread+0x337/0x6f0 [ 15.854828] ret_from_fork+0x116/0x1d0 [ 15.855029] ret_from_fork_asm+0x1a/0x30 [ 15.855435] [ 15.855638] The buggy address belongs to the object at ffff888102a5fe80 [ 15.855638] which belongs to the cache kmalloc-64 of size 64 [ 15.856134] The buggy address is located 0 bytes to the right of [ 15.856134] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.856899] [ 15.857005] The buggy address belongs to the physical page: [ 15.857302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.857754] flags: 0x200000000000000(node=0|zone=2) [ 15.857994] page_type: f5(slab) [ 15.858147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.858724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.859036] page dumped because: kasan: bad access detected [ 15.859374] [ 15.859479] Memory state around the buggy address: [ 15.859683] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.860032] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.860629] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.860907] ^ [ 15.861165] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861585] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861869] ================================================================== [ 16.566563] ================================================================== [ 16.566890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.567209] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.567599] [ 16.567699] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.567764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.567777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.567799] Call Trace: [ 16.567812] <TASK> [ 16.567826] dump_stack_lvl+0x73/0xb0 [ 16.567855] print_report+0xd1/0x610 [ 16.567878] ? __virt_addr_valid+0x1db/0x2d0 [ 16.567921] ? kasan_atomics_helper+0x177f/0x5450 [ 16.567945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.567971] ? kasan_atomics_helper+0x177f/0x5450 [ 16.567995] kasan_report+0x141/0x180 [ 16.568018] ? kasan_atomics_helper+0x177f/0x5450 [ 16.568046] kasan_check_range+0x10c/0x1c0 [ 16.568095] __kasan_check_write+0x18/0x20 [ 16.568117] kasan_atomics_helper+0x177f/0x5450 [ 16.568142] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.568167] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.568193] ? trace_hardirqs_on+0x37/0xe0 [ 16.568217] ? kasan_atomics+0x152/0x310 [ 16.568264] kasan_atomics+0x1dc/0x310 [ 16.568288] ? __pfx_kasan_atomics+0x10/0x10 [ 16.568314] ? __pfx_kasan_atomics+0x10/0x10 [ 16.568342] kunit_try_run_case+0x1a5/0x480 [ 16.568368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.568393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.568446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.568471] ? __kthread_parkme+0x82/0x180 [ 16.568493] ? preempt_count_sub+0x50/0x80 [ 16.568518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.568543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.568581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.568608] kthread+0x337/0x6f0 [ 16.568628] ? trace_preempt_on+0x20/0xc0 [ 16.568652] ? __pfx_kthread+0x10/0x10 [ 16.568674] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.568698] ? calculate_sigpending+0x7b/0xa0 [ 16.568723] ? __pfx_kthread+0x10/0x10 [ 16.568745] ret_from_fork+0x116/0x1d0 [ 16.568765] ? __pfx_kthread+0x10/0x10 [ 16.568787] ret_from_fork_asm+0x1a/0x30 [ 16.568819] </TASK> [ 16.568830] [ 16.582894] Allocated by task 282: [ 16.583042] kasan_save_stack+0x45/0x70 [ 16.583254] kasan_save_track+0x18/0x40 [ 16.583446] kasan_save_alloc_info+0x3b/0x50 [ 16.583734] __kasan_kmalloc+0xb7/0xc0 [ 16.583901] __kmalloc_cache_noprof+0x189/0x420 [ 16.584112] kasan_atomics+0x95/0x310 [ 16.584249] kunit_try_run_case+0x1a5/0x480 [ 16.584459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.584809] kthread+0x337/0x6f0 [ 16.584980] ret_from_fork+0x116/0x1d0 [ 16.585149] ret_from_fork_asm+0x1a/0x30 [ 16.585292] [ 16.585366] The buggy address belongs to the object at ffff888102a5fe80 [ 16.585366] which belongs to the cache kmalloc-64 of size 64 [ 16.585893] The buggy address is located 0 bytes to the right of [ 16.585893] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.586347] [ 16.586435] The buggy address belongs to the physical page: [ 16.586705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.587078] flags: 0x200000000000000(node=0|zone=2) [ 16.587319] page_type: f5(slab) [ 16.587495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.587816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.588074] page dumped because: kasan: bad access detected [ 16.588328] [ 16.588430] Memory state around the buggy address: [ 16.588645] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.588863] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.589109] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.589422] ^ [ 16.589686] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.589905] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.590121] ================================================================== [ 16.937489] ================================================================== [ 16.937801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.938077] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.938488] [ 16.938601] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.938644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.938657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.938699] Call Trace: [ 16.938713] <TASK> [ 16.938728] dump_stack_lvl+0x73/0xb0 [ 16.938755] print_report+0xd1/0x610 [ 16.938778] ? __virt_addr_valid+0x1db/0x2d0 [ 16.938802] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.938824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.938869] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.938893] kasan_report+0x141/0x180 [ 16.938916] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.938961] kasan_check_range+0x10c/0x1c0 [ 16.938986] __kasan_check_write+0x18/0x20 [ 16.939007] kasan_atomics_helper+0x20c8/0x5450 [ 16.939032] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.939057] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.939083] ? trace_hardirqs_on+0x37/0xe0 [ 16.939122] ? kasan_atomics+0x152/0x310 [ 16.939163] kasan_atomics+0x1dc/0x310 [ 16.939200] ? __pfx_kasan_atomics+0x10/0x10 [ 16.939225] ? __pfx_kasan_atomics+0x10/0x10 [ 16.939280] kunit_try_run_case+0x1a5/0x480 [ 16.939306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.939331] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.939356] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.939382] ? __kthread_parkme+0x82/0x180 [ 16.939425] ? preempt_count_sub+0x50/0x80 [ 16.939450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.939477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.939503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.939530] kthread+0x337/0x6f0 [ 16.939559] ? trace_preempt_on+0x20/0xc0 [ 16.939583] ? __pfx_kthread+0x10/0x10 [ 16.939605] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.939628] ? calculate_sigpending+0x7b/0xa0 [ 16.939653] ? __pfx_kthread+0x10/0x10 [ 16.939676] ret_from_fork+0x116/0x1d0 [ 16.939697] ? __pfx_kthread+0x10/0x10 [ 16.939719] ret_from_fork_asm+0x1a/0x30 [ 16.939750] </TASK> [ 16.939760] [ 16.947365] Allocated by task 282: [ 16.947612] kasan_save_stack+0x45/0x70 [ 16.947850] kasan_save_track+0x18/0x40 [ 16.948076] kasan_save_alloc_info+0x3b/0x50 [ 16.948335] __kasan_kmalloc+0xb7/0xc0 [ 16.948548] __kmalloc_cache_noprof+0x189/0x420 [ 16.948759] kasan_atomics+0x95/0x310 [ 16.948894] kunit_try_run_case+0x1a5/0x480 [ 16.949042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.949305] kthread+0x337/0x6f0 [ 16.949519] ret_from_fork+0x116/0x1d0 [ 16.949742] ret_from_fork_asm+0x1a/0x30 [ 16.949980] [ 16.950080] The buggy address belongs to the object at ffff888102a5fe80 [ 16.950080] which belongs to the cache kmalloc-64 of size 64 [ 16.950676] The buggy address is located 0 bytes to the right of [ 16.950676] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.951096] [ 16.951172] The buggy address belongs to the physical page: [ 16.951435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.951798] flags: 0x200000000000000(node=0|zone=2) [ 16.952035] page_type: f5(slab) [ 16.952218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.952595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.952842] page dumped because: kasan: bad access detected [ 16.953013] [ 16.953084] Memory state around the buggy address: [ 16.953261] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.953640] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.953972] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.954281] ^ [ 16.954546] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.954851] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.955166] ================================================================== [ 16.647997] ================================================================== [ 16.648655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.648954] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.649250] [ 16.649365] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.649415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.649428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.649450] Call Trace: [ 16.649463] <TASK> [ 16.649500] dump_stack_lvl+0x73/0xb0 [ 16.649528] print_report+0xd1/0x610 [ 16.649560] ? __virt_addr_valid+0x1db/0x2d0 [ 16.649583] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.649606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.649631] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.649654] kasan_report+0x141/0x180 [ 16.649678] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.649706] kasan_check_range+0x10c/0x1c0 [ 16.649731] __kasan_check_write+0x18/0x20 [ 16.649752] kasan_atomics_helper+0x19e3/0x5450 [ 16.649776] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.649801] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.649827] ? trace_hardirqs_on+0x37/0xe0 [ 16.649850] ? kasan_atomics+0x152/0x310 [ 16.649878] kasan_atomics+0x1dc/0x310 [ 16.649902] ? __pfx_kasan_atomics+0x10/0x10 [ 16.649927] ? __pfx_kasan_atomics+0x10/0x10 [ 16.649957] kunit_try_run_case+0x1a5/0x480 [ 16.649983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.650009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.650034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.650061] ? __kthread_parkme+0x82/0x180 [ 16.650082] ? preempt_count_sub+0x50/0x80 [ 16.650107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.650133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.650179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.650207] kthread+0x337/0x6f0 [ 16.650228] ? trace_preempt_on+0x20/0xc0 [ 16.650252] ? __pfx_kthread+0x10/0x10 [ 16.650274] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.650297] ? calculate_sigpending+0x7b/0xa0 [ 16.650322] ? __pfx_kthread+0x10/0x10 [ 16.650345] ret_from_fork+0x116/0x1d0 [ 16.650365] ? __pfx_kthread+0x10/0x10 [ 16.650387] ret_from_fork_asm+0x1a/0x30 [ 16.650431] </TASK> [ 16.650444] [ 16.657908] Allocated by task 282: [ 16.658080] kasan_save_stack+0x45/0x70 [ 16.658275] kasan_save_track+0x18/0x40 [ 16.658474] kasan_save_alloc_info+0x3b/0x50 [ 16.658713] __kasan_kmalloc+0xb7/0xc0 [ 16.658875] __kmalloc_cache_noprof+0x189/0x420 [ 16.659036] kasan_atomics+0x95/0x310 [ 16.659242] kunit_try_run_case+0x1a5/0x480 [ 16.659485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.659680] kthread+0x337/0x6f0 [ 16.659802] ret_from_fork+0x116/0x1d0 [ 16.659937] ret_from_fork_asm+0x1a/0x30 [ 16.660085] [ 16.660178] The buggy address belongs to the object at ffff888102a5fe80 [ 16.660178] which belongs to the cache kmalloc-64 of size 64 [ 16.660708] The buggy address is located 0 bytes to the right of [ 16.660708] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.661273] [ 16.661368] The buggy address belongs to the physical page: [ 16.661636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.661879] flags: 0x200000000000000(node=0|zone=2) [ 16.662064] page_type: f5(slab) [ 16.662230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.662866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.663354] page dumped because: kasan: bad access detected [ 16.663967] [ 16.664046] Memory state around the buggy address: [ 16.664681] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.665063] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.665521] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.665941] ^ [ 16.666266] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.666649] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.667209] ================================================================== [ 16.182318] ================================================================== [ 16.182687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 16.183074] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.183479] [ 16.183637] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.183692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.183705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.183726] Call Trace: [ 16.183769] <TASK> [ 16.183786] dump_stack_lvl+0x73/0xb0 [ 16.183814] print_report+0xd1/0x610 [ 16.183848] ? __virt_addr_valid+0x1db/0x2d0 [ 16.183871] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.183894] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.183945] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.183969] kasan_report+0x141/0x180 [ 16.183992] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.184031] __asan_report_load4_noabort+0x18/0x20 [ 16.184081] kasan_atomics_helper+0x4a1c/0x5450 [ 16.184115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.184140] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.184176] ? trace_hardirqs_on+0x37/0xe0 [ 16.184200] ? kasan_atomics+0x152/0x310 [ 16.184227] kasan_atomics+0x1dc/0x310 [ 16.184251] ? __pfx_kasan_atomics+0x10/0x10 [ 16.184276] ? __pfx_kasan_atomics+0x10/0x10 [ 16.184304] kunit_try_run_case+0x1a5/0x480 [ 16.184345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.184384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.184440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.184466] ? __kthread_parkme+0x82/0x180 [ 16.184488] ? preempt_count_sub+0x50/0x80 [ 16.184524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.184558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.184586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.184613] kthread+0x337/0x6f0 [ 16.184632] ? trace_preempt_on+0x20/0xc0 [ 16.184656] ? __pfx_kthread+0x10/0x10 [ 16.184677] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.184701] ? calculate_sigpending+0x7b/0xa0 [ 16.184727] ? __pfx_kthread+0x10/0x10 [ 16.184749] ret_from_fork+0x116/0x1d0 [ 16.184769] ? __pfx_kthread+0x10/0x10 [ 16.184790] ret_from_fork_asm+0x1a/0x30 [ 16.184822] </TASK> [ 16.184833] [ 16.192692] Allocated by task 282: [ 16.192907] kasan_save_stack+0x45/0x70 [ 16.193052] kasan_save_track+0x18/0x40 [ 16.193186] kasan_save_alloc_info+0x3b/0x50 [ 16.193449] __kasan_kmalloc+0xb7/0xc0 [ 16.193681] __kmalloc_cache_noprof+0x189/0x420 [ 16.193946] kasan_atomics+0x95/0x310 [ 16.194179] kunit_try_run_case+0x1a5/0x480 [ 16.194450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.194715] kthread+0x337/0x6f0 [ 16.194869] ret_from_fork+0x116/0x1d0 [ 16.195710] ret_from_fork_asm+0x1a/0x30 [ 16.196024] [ 16.196149] The buggy address belongs to the object at ffff888102a5fe80 [ 16.196149] which belongs to the cache kmalloc-64 of size 64 [ 16.197061] The buggy address is located 0 bytes to the right of [ 16.197061] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.197819] [ 16.198149] The buggy address belongs to the physical page: [ 16.198391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.198899] flags: 0x200000000000000(node=0|zone=2) [ 16.199256] page_type: f5(slab) [ 16.199580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.199895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.200243] page dumped because: kasan: bad access detected [ 16.200760] [ 16.200844] Memory state around the buggy address: [ 16.201308] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.201811] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.202271] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.202743] ^ [ 16.203097] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.203559] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.203943] ================================================================== [ 16.955827] ================================================================== [ 16.956218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.956631] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.956945] [ 16.957075] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.957119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.957131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.957152] Call Trace: [ 16.957168] <TASK> [ 16.957184] dump_stack_lvl+0x73/0xb0 [ 16.957212] print_report+0xd1/0x610 [ 16.957254] ? __virt_addr_valid+0x1db/0x2d0 [ 16.957278] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.957301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.957326] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.957350] kasan_report+0x141/0x180 [ 16.957372] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.957440] __asan_report_load8_noabort+0x18/0x20 [ 16.957467] kasan_atomics_helper+0x4fb2/0x5450 [ 16.957490] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.957515] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.957541] ? trace_hardirqs_on+0x37/0xe0 [ 16.957592] ? kasan_atomics+0x152/0x310 [ 16.957620] kasan_atomics+0x1dc/0x310 [ 16.957644] ? __pfx_kasan_atomics+0x10/0x10 [ 16.957669] ? __pfx_kasan_atomics+0x10/0x10 [ 16.957698] kunit_try_run_case+0x1a5/0x480 [ 16.957724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.957749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.957776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.957803] ? __kthread_parkme+0x82/0x180 [ 16.957825] ? preempt_count_sub+0x50/0x80 [ 16.957851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.957877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.957903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.957946] kthread+0x337/0x6f0 [ 16.957967] ? trace_preempt_on+0x20/0xc0 [ 16.958005] ? __pfx_kthread+0x10/0x10 [ 16.958026] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.958050] ? calculate_sigpending+0x7b/0xa0 [ 16.958076] ? __pfx_kthread+0x10/0x10 [ 16.958099] ret_from_fork+0x116/0x1d0 [ 16.958119] ? __pfx_kthread+0x10/0x10 [ 16.958140] ret_from_fork_asm+0x1a/0x30 [ 16.958172] </TASK> [ 16.958183] [ 16.965685] Allocated by task 282: [ 16.965862] kasan_save_stack+0x45/0x70 [ 16.966059] kasan_save_track+0x18/0x40 [ 16.966249] kasan_save_alloc_info+0x3b/0x50 [ 16.966462] __kasan_kmalloc+0xb7/0xc0 [ 16.966692] __kmalloc_cache_noprof+0x189/0x420 [ 16.966896] kasan_atomics+0x95/0x310 [ 16.967029] kunit_try_run_case+0x1a5/0x480 [ 16.967171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.967360] kthread+0x337/0x6f0 [ 16.967589] ret_from_fork+0x116/0x1d0 [ 16.967816] ret_from_fork_asm+0x1a/0x30 [ 16.968039] [ 16.968173] The buggy address belongs to the object at ffff888102a5fe80 [ 16.968173] which belongs to the cache kmalloc-64 of size 64 [ 16.968806] The buggy address is located 0 bytes to the right of [ 16.968806] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.969330] [ 16.969482] The buggy address belongs to the physical page: [ 16.969768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.970113] flags: 0x200000000000000(node=0|zone=2) [ 16.970339] page_type: f5(slab) [ 16.970532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.970836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.971055] page dumped because: kasan: bad access detected [ 16.971220] [ 16.971288] Memory state around the buggy address: [ 16.971506] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.971855] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.972221] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.972626] ^ [ 16.972864] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.973172] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.973534] ================================================================== [ 16.609381] ================================================================== [ 16.609827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.610179] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.610628] [ 16.610739] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.610782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.610794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.610815] Call Trace: [ 16.610830] <TASK> [ 16.610882] dump_stack_lvl+0x73/0xb0 [ 16.610912] print_report+0xd1/0x610 [ 16.610935] ? __virt_addr_valid+0x1db/0x2d0 [ 16.610959] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.611013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.611040] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.611063] kasan_report+0x141/0x180 [ 16.611086] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.611114] kasan_check_range+0x10c/0x1c0 [ 16.611169] __kasan_check_write+0x18/0x20 [ 16.611191] kasan_atomics_helper+0x18b1/0x5450 [ 16.611215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.611240] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.611267] ? trace_hardirqs_on+0x37/0xe0 [ 16.611325] ? kasan_atomics+0x152/0x310 [ 16.611353] kasan_atomics+0x1dc/0x310 [ 16.611377] ? __pfx_kasan_atomics+0x10/0x10 [ 16.611431] ? __pfx_kasan_atomics+0x10/0x10 [ 16.611460] kunit_try_run_case+0x1a5/0x480 [ 16.611487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.611513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.611539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.611603] ? __kthread_parkme+0x82/0x180 [ 16.611651] ? preempt_count_sub+0x50/0x80 [ 16.611723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.611750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.611822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.611850] kthread+0x337/0x6f0 [ 16.611871] ? trace_preempt_on+0x20/0xc0 [ 16.611895] ? __pfx_kthread+0x10/0x10 [ 16.611917] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.611939] ? calculate_sigpending+0x7b/0xa0 [ 16.611965] ? __pfx_kthread+0x10/0x10 [ 16.611988] ret_from_fork+0x116/0x1d0 [ 16.612007] ? __pfx_kthread+0x10/0x10 [ 16.612030] ret_from_fork_asm+0x1a/0x30 [ 16.612066] </TASK> [ 16.612077] [ 16.620252] Allocated by task 282: [ 16.620484] kasan_save_stack+0x45/0x70 [ 16.620699] kasan_save_track+0x18/0x40 [ 16.620896] kasan_save_alloc_info+0x3b/0x50 [ 16.621105] __kasan_kmalloc+0xb7/0xc0 [ 16.621253] __kmalloc_cache_noprof+0x189/0x420 [ 16.621497] kasan_atomics+0x95/0x310 [ 16.621733] kunit_try_run_case+0x1a5/0x480 [ 16.621949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.622212] kthread+0x337/0x6f0 [ 16.622412] ret_from_fork+0x116/0x1d0 [ 16.622626] ret_from_fork_asm+0x1a/0x30 [ 16.622785] [ 16.622857] The buggy address belongs to the object at ffff888102a5fe80 [ 16.622857] which belongs to the cache kmalloc-64 of size 64 [ 16.623255] The buggy address is located 0 bytes to the right of [ 16.623255] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.623845] [ 16.623944] The buggy address belongs to the physical page: [ 16.624190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.624450] flags: 0x200000000000000(node=0|zone=2) [ 16.624650] page_type: f5(slab) [ 16.624885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.625289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.625642] page dumped because: kasan: bad access detected [ 16.625891] [ 16.625988] Memory state around the buggy address: [ 16.626243] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.626588] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.626908] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.627216] ^ [ 16.627487] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.627809] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.628148] ================================================================== [ 15.697707] ================================================================== [ 15.697951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.698191] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.698474] [ 15.698610] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.698655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.698668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.698689] Call Trace: [ 15.698707] <TASK> [ 15.698725] dump_stack_lvl+0x73/0xb0 [ 15.698753] print_report+0xd1/0x610 [ 15.698776] ? __virt_addr_valid+0x1db/0x2d0 [ 15.698800] ? kasan_atomics_helper+0x565/0x5450 [ 15.698823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.698848] ? kasan_atomics_helper+0x565/0x5450 [ 15.698871] kasan_report+0x141/0x180 [ 15.698895] ? kasan_atomics_helper+0x565/0x5450 [ 15.698923] kasan_check_range+0x10c/0x1c0 [ 15.698948] __kasan_check_write+0x18/0x20 [ 15.698969] kasan_atomics_helper+0x565/0x5450 [ 15.698993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.699017] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.699045] ? trace_hardirqs_on+0x37/0xe0 [ 15.699070] ? kasan_atomics+0x152/0x310 [ 15.699098] kasan_atomics+0x1dc/0x310 [ 15.699122] ? __pfx_kasan_atomics+0x10/0x10 [ 15.699146] ? __pfx_kasan_atomics+0x10/0x10 [ 15.699175] kunit_try_run_case+0x1a5/0x480 [ 15.699201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.699226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.699252] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.699277] ? __kthread_parkme+0x82/0x180 [ 15.699299] ? preempt_count_sub+0x50/0x80 [ 15.699325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.699352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.699378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.699405] kthread+0x337/0x6f0 [ 15.699425] ? trace_preempt_on+0x20/0xc0 [ 15.699449] ? __pfx_kthread+0x10/0x10 [ 15.699471] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.699494] ? calculate_sigpending+0x7b/0xa0 [ 15.699520] ? __pfx_kthread+0x10/0x10 [ 15.699543] ret_from_fork+0x116/0x1d0 [ 15.699574] ? __pfx_kthread+0x10/0x10 [ 15.699596] ret_from_fork_asm+0x1a/0x30 [ 15.699628] </TASK> [ 15.699639] [ 15.707637] Allocated by task 282: [ 15.707801] kasan_save_stack+0x45/0x70 [ 15.707948] kasan_save_track+0x18/0x40 [ 15.708089] kasan_save_alloc_info+0x3b/0x50 [ 15.708412] __kasan_kmalloc+0xb7/0xc0 [ 15.708640] __kmalloc_cache_noprof+0x189/0x420 [ 15.709151] kasan_atomics+0x95/0x310 [ 15.709496] kunit_try_run_case+0x1a5/0x480 [ 15.709666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709861] kthread+0x337/0x6f0 [ 15.710031] ret_from_fork+0x116/0x1d0 [ 15.710221] ret_from_fork_asm+0x1a/0x30 [ 15.710471] [ 15.710588] The buggy address belongs to the object at ffff888102a5fe80 [ 15.710588] which belongs to the cache kmalloc-64 of size 64 [ 15.711064] The buggy address is located 0 bytes to the right of [ 15.711064] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.711524] [ 15.711685] The buggy address belongs to the physical page: [ 15.711940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.712295] flags: 0x200000000000000(node=0|zone=2) [ 15.712471] page_type: f5(slab) [ 15.712605] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.712840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.713640] page dumped because: kasan: bad access detected [ 15.713941] [ 15.714039] Memory state around the buggy address: [ 15.714442] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.714778] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.715059] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.715431] ^ [ 15.715650] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.715889] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.716111] ================================================================== [ 16.025362] ================================================================== [ 16.025928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 16.026391] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.026863] [ 16.026995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.027039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.027052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.027074] Call Trace: [ 16.027086] <TASK> [ 16.027100] dump_stack_lvl+0x73/0xb0 [ 16.027131] print_report+0xd1/0x610 [ 16.027154] ? __virt_addr_valid+0x1db/0x2d0 [ 16.027178] ? kasan_atomics_helper+0xde0/0x5450 [ 16.027202] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.027228] ? kasan_atomics_helper+0xde0/0x5450 [ 16.027251] kasan_report+0x141/0x180 [ 16.027274] ? kasan_atomics_helper+0xde0/0x5450 [ 16.027302] kasan_check_range+0x10c/0x1c0 [ 16.027327] __kasan_check_write+0x18/0x20 [ 16.027359] kasan_atomics_helper+0xde0/0x5450 [ 16.027385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.027409] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.027448] ? trace_hardirqs_on+0x37/0xe0 [ 16.027473] ? kasan_atomics+0x152/0x310 [ 16.027501] kasan_atomics+0x1dc/0x310 [ 16.027525] ? __pfx_kasan_atomics+0x10/0x10 [ 16.027559] ? __pfx_kasan_atomics+0x10/0x10 [ 16.027587] kunit_try_run_case+0x1a5/0x480 [ 16.027614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.027639] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.027664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.027690] ? __kthread_parkme+0x82/0x180 [ 16.027724] ? preempt_count_sub+0x50/0x80 [ 16.027749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.027775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.027803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.027832] kthread+0x337/0x6f0 [ 16.027852] ? trace_preempt_on+0x20/0xc0 [ 16.027876] ? __pfx_kthread+0x10/0x10 [ 16.027898] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.027922] ? calculate_sigpending+0x7b/0xa0 [ 16.027947] ? __pfx_kthread+0x10/0x10 [ 16.027970] ret_from_fork+0x116/0x1d0 [ 16.027990] ? __pfx_kthread+0x10/0x10 [ 16.028013] ret_from_fork_asm+0x1a/0x30 [ 16.028045] </TASK> [ 16.028063] [ 16.036053] Allocated by task 282: [ 16.036242] kasan_save_stack+0x45/0x70 [ 16.036460] kasan_save_track+0x18/0x40 [ 16.036641] kasan_save_alloc_info+0x3b/0x50 [ 16.036861] __kasan_kmalloc+0xb7/0xc0 [ 16.037015] __kmalloc_cache_noprof+0x189/0x420 [ 16.037175] kasan_atomics+0x95/0x310 [ 16.037388] kunit_try_run_case+0x1a5/0x480 [ 16.037615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.037953] kthread+0x337/0x6f0 [ 16.038075] ret_from_fork+0x116/0x1d0 [ 16.038438] ret_from_fork_asm+0x1a/0x30 [ 16.038654] [ 16.038755] The buggy address belongs to the object at ffff888102a5fe80 [ 16.038755] which belongs to the cache kmalloc-64 of size 64 [ 16.039232] The buggy address is located 0 bytes to the right of [ 16.039232] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.039773] [ 16.039846] The buggy address belongs to the physical page: [ 16.040020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.040280] flags: 0x200000000000000(node=0|zone=2) [ 16.040519] page_type: f5(slab) [ 16.040713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.041057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.041392] page dumped because: kasan: bad access detected [ 16.041665] [ 16.041782] Memory state around the buggy address: [ 16.041940] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.042157] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.042465] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.042810] ^ [ 16.043049] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.043370] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.043693] ================================================================== [ 16.205062] ================================================================== [ 16.205443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 16.205918] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.206542] [ 16.206800] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.206968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.206983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.207018] Call Trace: [ 16.207036] <TASK> [ 16.207052] dump_stack_lvl+0x73/0xb0 [ 16.207082] print_report+0xd1/0x610 [ 16.207106] ? __virt_addr_valid+0x1db/0x2d0 [ 16.207130] ? kasan_atomics_helper+0x1148/0x5450 [ 16.207153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.207178] ? kasan_atomics_helper+0x1148/0x5450 [ 16.207202] kasan_report+0x141/0x180 [ 16.207225] ? kasan_atomics_helper+0x1148/0x5450 [ 16.207253] kasan_check_range+0x10c/0x1c0 [ 16.207278] __kasan_check_write+0x18/0x20 [ 16.207298] kasan_atomics_helper+0x1148/0x5450 [ 16.207323] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.207347] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.207373] ? trace_hardirqs_on+0x37/0xe0 [ 16.207420] ? kasan_atomics+0x152/0x310 [ 16.207448] kasan_atomics+0x1dc/0x310 [ 16.207472] ? __pfx_kasan_atomics+0x10/0x10 [ 16.207497] ? __pfx_kasan_atomics+0x10/0x10 [ 16.207526] kunit_try_run_case+0x1a5/0x480 [ 16.207563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.207588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.207614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.207640] ? __kthread_parkme+0x82/0x180 [ 16.207662] ? preempt_count_sub+0x50/0x80 [ 16.207687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.207713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.207739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.207767] kthread+0x337/0x6f0 [ 16.207787] ? trace_preempt_on+0x20/0xc0 [ 16.207811] ? __pfx_kthread+0x10/0x10 [ 16.207833] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.207856] ? calculate_sigpending+0x7b/0xa0 [ 16.207882] ? __pfx_kthread+0x10/0x10 [ 16.207905] ret_from_fork+0x116/0x1d0 [ 16.207926] ? __pfx_kthread+0x10/0x10 [ 16.207948] ret_from_fork_asm+0x1a/0x30 [ 16.207980] </TASK> [ 16.207991] [ 16.218864] Allocated by task 282: [ 16.219242] kasan_save_stack+0x45/0x70 [ 16.219573] kasan_save_track+0x18/0x40 [ 16.219869] kasan_save_alloc_info+0x3b/0x50 [ 16.220184] __kasan_kmalloc+0xb7/0xc0 [ 16.220494] __kmalloc_cache_noprof+0x189/0x420 [ 16.220828] kasan_atomics+0x95/0x310 [ 16.221016] kunit_try_run_case+0x1a5/0x480 [ 16.221207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.221668] kthread+0x337/0x6f0 [ 16.221924] ret_from_fork+0x116/0x1d0 [ 16.222198] ret_from_fork_asm+0x1a/0x30 [ 16.222538] [ 16.222761] The buggy address belongs to the object at ffff888102a5fe80 [ 16.222761] which belongs to the cache kmalloc-64 of size 64 [ 16.223333] The buggy address is located 0 bytes to the right of [ 16.223333] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.224099] [ 16.224345] The buggy address belongs to the physical page: [ 16.224651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.225089] flags: 0x200000000000000(node=0|zone=2) [ 16.225419] page_type: f5(slab) [ 16.225719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.226051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.226367] page dumped because: kasan: bad access detected [ 16.226854] [ 16.227056] Memory state around the buggy address: [ 16.227347] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.227822] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.228251] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.228709] ^ [ 16.228926] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.229220] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.229769] ================================================================== [ 16.782522] ================================================================== [ 16.782861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.783325] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.783673] [ 16.783787] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.783830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.783844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.783865] Call Trace: [ 16.783880] <TASK> [ 16.783897] dump_stack_lvl+0x73/0xb0 [ 16.783924] print_report+0xd1/0x610 [ 16.783947] ? __virt_addr_valid+0x1db/0x2d0 [ 16.783971] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.783994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.784019] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.784042] kasan_report+0x141/0x180 [ 16.784070] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.784098] kasan_check_range+0x10c/0x1c0 [ 16.784123] __kasan_check_write+0x18/0x20 [ 16.784144] kasan_atomics_helper+0x1e12/0x5450 [ 16.784168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.784193] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.784219] ? trace_hardirqs_on+0x37/0xe0 [ 16.784241] ? kasan_atomics+0x152/0x310 [ 16.784269] kasan_atomics+0x1dc/0x310 [ 16.784293] ? __pfx_kasan_atomics+0x10/0x10 [ 16.784318] ? __pfx_kasan_atomics+0x10/0x10 [ 16.784346] kunit_try_run_case+0x1a5/0x480 [ 16.784373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.784398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.784435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.784460] ? __kthread_parkme+0x82/0x180 [ 16.784483] ? preempt_count_sub+0x50/0x80 [ 16.784508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.784534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.784570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.784597] kthread+0x337/0x6f0 [ 16.784618] ? trace_preempt_on+0x20/0xc0 [ 16.784642] ? __pfx_kthread+0x10/0x10 [ 16.784664] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.784687] ? calculate_sigpending+0x7b/0xa0 [ 16.784712] ? __pfx_kthread+0x10/0x10 [ 16.784735] ret_from_fork+0x116/0x1d0 [ 16.784756] ? __pfx_kthread+0x10/0x10 [ 16.784777] ret_from_fork_asm+0x1a/0x30 [ 16.784808] </TASK> [ 16.784819] [ 16.795178] Allocated by task 282: [ 16.795492] kasan_save_stack+0x45/0x70 [ 16.795859] kasan_save_track+0x18/0x40 [ 16.796216] kasan_save_alloc_info+0x3b/0x50 [ 16.796635] __kasan_kmalloc+0xb7/0xc0 [ 16.796990] __kmalloc_cache_noprof+0x189/0x420 [ 16.797392] kasan_atomics+0x95/0x310 [ 16.797751] kunit_try_run_case+0x1a5/0x480 [ 16.798131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.798627] kthread+0x337/0x6f0 [ 16.798927] ret_from_fork+0x116/0x1d0 [ 16.799271] ret_from_fork_asm+0x1a/0x30 [ 16.799668] [ 16.799833] The buggy address belongs to the object at ffff888102a5fe80 [ 16.799833] which belongs to the cache kmalloc-64 of size 64 [ 16.800877] The buggy address is located 0 bytes to the right of [ 16.800877] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.801940] [ 16.802104] The buggy address belongs to the physical page: [ 16.802599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.803268] flags: 0x200000000000000(node=0|zone=2) [ 16.803769] page_type: f5(slab) [ 16.804077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.804916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.805318] page dumped because: kasan: bad access detected [ 16.805538] [ 16.805709] Memory state around the buggy address: [ 16.806125] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.806818] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.807459] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.808068] ^ [ 16.808257] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.808505] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.809101] ================================================================== [ 16.810084] ================================================================== [ 16.811248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.812000] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.812361] [ 16.812483] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.812528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.812542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.812574] Call Trace: [ 16.812589] <TASK> [ 16.812604] dump_stack_lvl+0x73/0xb0 [ 16.812631] print_report+0xd1/0x610 [ 16.812654] ? __virt_addr_valid+0x1db/0x2d0 [ 16.812677] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.812700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.812725] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.812749] kasan_report+0x141/0x180 [ 16.812772] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.812800] kasan_check_range+0x10c/0x1c0 [ 16.812825] __kasan_check_write+0x18/0x20 [ 16.812846] kasan_atomics_helper+0x1eaa/0x5450 [ 16.812870] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.812895] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.812920] ? trace_hardirqs_on+0x37/0xe0 [ 16.812944] ? kasan_atomics+0x152/0x310 [ 16.812971] kasan_atomics+0x1dc/0x310 [ 16.812995] ? __pfx_kasan_atomics+0x10/0x10 [ 16.813020] ? __pfx_kasan_atomics+0x10/0x10 [ 16.813048] kunit_try_run_case+0x1a5/0x480 [ 16.813073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.813098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.813124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.813149] ? __kthread_parkme+0x82/0x180 [ 16.813172] ? preempt_count_sub+0x50/0x80 [ 16.813196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.813223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.813249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.813276] kthread+0x337/0x6f0 [ 16.813296] ? trace_preempt_on+0x20/0xc0 [ 16.813319] ? __pfx_kthread+0x10/0x10 [ 16.813401] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.813435] ? calculate_sigpending+0x7b/0xa0 [ 16.813460] ? __pfx_kthread+0x10/0x10 [ 16.813483] ret_from_fork+0x116/0x1d0 [ 16.813505] ? __pfx_kthread+0x10/0x10 [ 16.813526] ret_from_fork_asm+0x1a/0x30 [ 16.813568] </TASK> [ 16.813579] [ 16.822669] Allocated by task 282: [ 16.822816] kasan_save_stack+0x45/0x70 [ 16.823004] kasan_save_track+0x18/0x40 [ 16.823187] kasan_save_alloc_info+0x3b/0x50 [ 16.823378] __kasan_kmalloc+0xb7/0xc0 [ 16.823566] __kmalloc_cache_noprof+0x189/0x420 [ 16.823755] kasan_atomics+0x95/0x310 [ 16.823945] kunit_try_run_case+0x1a5/0x480 [ 16.824129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.824353] kthread+0x337/0x6f0 [ 16.824611] ret_from_fork+0x116/0x1d0 [ 16.824786] ret_from_fork_asm+0x1a/0x30 [ 16.824956] [ 16.825057] The buggy address belongs to the object at ffff888102a5fe80 [ 16.825057] which belongs to the cache kmalloc-64 of size 64 [ 16.825429] The buggy address is located 0 bytes to the right of [ 16.825429] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.825930] [ 16.826025] The buggy address belongs to the physical page: [ 16.826394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.826714] flags: 0x200000000000000(node=0|zone=2) [ 16.826885] page_type: f5(slab) [ 16.827005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.827293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.827725] page dumped because: kasan: bad access detected [ 16.827972] [ 16.828045] Memory state around the buggy address: [ 16.828267] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.828566] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.828840] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.829051] ^ [ 16.829220] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.831261] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.831493] ================================================================== [ 16.394899] ================================================================== [ 16.395681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 16.396226] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.396763] [ 16.396961] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.397008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.397021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.397042] Call Trace: [ 16.397058] <TASK> [ 16.397074] dump_stack_lvl+0x73/0xb0 [ 16.397103] print_report+0xd1/0x610 [ 16.397146] ? __virt_addr_valid+0x1db/0x2d0 [ 16.397170] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.397193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.397218] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.397242] kasan_report+0x141/0x180 [ 16.397265] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.397294] __asan_report_load8_noabort+0x18/0x20 [ 16.397320] kasan_atomics_helper+0x4eae/0x5450 [ 16.397345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.397369] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.397416] ? trace_hardirqs_on+0x37/0xe0 [ 16.397441] ? kasan_atomics+0x152/0x310 [ 16.397469] kasan_atomics+0x1dc/0x310 [ 16.397492] ? __pfx_kasan_atomics+0x10/0x10 [ 16.397517] ? __pfx_kasan_atomics+0x10/0x10 [ 16.397545] kunit_try_run_case+0x1a5/0x480 [ 16.397581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.397605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.397631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.397656] ? __kthread_parkme+0x82/0x180 [ 16.397678] ? preempt_count_sub+0x50/0x80 [ 16.397703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.397729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.397755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.397783] kthread+0x337/0x6f0 [ 16.397804] ? trace_preempt_on+0x20/0xc0 [ 16.397827] ? __pfx_kthread+0x10/0x10 [ 16.397849] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.397872] ? calculate_sigpending+0x7b/0xa0 [ 16.397898] ? __pfx_kthread+0x10/0x10 [ 16.397920] ret_from_fork+0x116/0x1d0 [ 16.397940] ? __pfx_kthread+0x10/0x10 [ 16.397961] ret_from_fork_asm+0x1a/0x30 [ 16.397993] </TASK> [ 16.398004] [ 16.409694] Allocated by task 282: [ 16.409831] kasan_save_stack+0x45/0x70 [ 16.409979] kasan_save_track+0x18/0x40 [ 16.410117] kasan_save_alloc_info+0x3b/0x50 [ 16.410267] __kasan_kmalloc+0xb7/0xc0 [ 16.410425] __kmalloc_cache_noprof+0x189/0x420 [ 16.410939] kasan_atomics+0x95/0x310 [ 16.411267] kunit_try_run_case+0x1a5/0x480 [ 16.411703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.412194] kthread+0x337/0x6f0 [ 16.412529] ret_from_fork+0x116/0x1d0 [ 16.412890] ret_from_fork_asm+0x1a/0x30 [ 16.413261] [ 16.413459] The buggy address belongs to the object at ffff888102a5fe80 [ 16.413459] which belongs to the cache kmalloc-64 of size 64 [ 16.414529] The buggy address is located 0 bytes to the right of [ 16.414529] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.414966] [ 16.415040] The buggy address belongs to the physical page: [ 16.415212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.415642] flags: 0x200000000000000(node=0|zone=2) [ 16.416085] page_type: f5(slab) [ 16.416413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.417085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.417761] page dumped because: kasan: bad access detected [ 16.418244] [ 16.418443] Memory state around the buggy address: [ 16.418704] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.418927] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.419149] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.419368] ^ [ 16.419917] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.420571] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.421185] ================================================================== [ 16.667841] ================================================================== [ 16.668915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.669581] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.669840] [ 16.669929] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.670001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.670015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.670038] Call Trace: [ 16.670054] <TASK> [ 16.670069] dump_stack_lvl+0x73/0xb0 [ 16.670117] print_report+0xd1/0x610 [ 16.670141] ? __virt_addr_valid+0x1db/0x2d0 [ 16.670164] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.670187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.670212] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.670236] kasan_report+0x141/0x180 [ 16.670259] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.670287] kasan_check_range+0x10c/0x1c0 [ 16.670313] __kasan_check_write+0x18/0x20 [ 16.670333] kasan_atomics_helper+0x1a7f/0x5450 [ 16.670358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.670382] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.670407] ? trace_hardirqs_on+0x37/0xe0 [ 16.670432] ? kasan_atomics+0x152/0x310 [ 16.670459] kasan_atomics+0x1dc/0x310 [ 16.670483] ? __pfx_kasan_atomics+0x10/0x10 [ 16.670508] ? __pfx_kasan_atomics+0x10/0x10 [ 16.670537] kunit_try_run_case+0x1a5/0x480 [ 16.670573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.670628] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.670654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.670679] ? __kthread_parkme+0x82/0x180 [ 16.670702] ? preempt_count_sub+0x50/0x80 [ 16.670728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.670756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.670784] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.670812] kthread+0x337/0x6f0 [ 16.670832] ? trace_preempt_on+0x20/0xc0 [ 16.670856] ? __pfx_kthread+0x10/0x10 [ 16.670878] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.670902] ? calculate_sigpending+0x7b/0xa0 [ 16.670927] ? __pfx_kthread+0x10/0x10 [ 16.670949] ret_from_fork+0x116/0x1d0 [ 16.670971] ? __pfx_kthread+0x10/0x10 [ 16.670993] ret_from_fork_asm+0x1a/0x30 [ 16.671026] </TASK> [ 16.671037] [ 16.682105] Allocated by task 282: [ 16.682283] kasan_save_stack+0x45/0x70 [ 16.682505] kasan_save_track+0x18/0x40 [ 16.682672] kasan_save_alloc_info+0x3b/0x50 [ 16.682847] __kasan_kmalloc+0xb7/0xc0 [ 16.682976] __kmalloc_cache_noprof+0x189/0x420 [ 16.683200] kasan_atomics+0x95/0x310 [ 16.683390] kunit_try_run_case+0x1a5/0x480 [ 16.683614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.683836] kthread+0x337/0x6f0 [ 16.684009] ret_from_fork+0x116/0x1d0 [ 16.684174] ret_from_fork_asm+0x1a/0x30 [ 16.684341] [ 16.684424] The buggy address belongs to the object at ffff888102a5fe80 [ 16.684424] which belongs to the cache kmalloc-64 of size 64 [ 16.684921] The buggy address is located 0 bytes to the right of [ 16.684921] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.685286] [ 16.685359] The buggy address belongs to the physical page: [ 16.685561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.685910] flags: 0x200000000000000(node=0|zone=2) [ 16.686134] page_type: f5(slab) [ 16.686298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.686686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.686909] page dumped because: kasan: bad access detected [ 16.687122] [ 16.687215] Memory state around the buggy address: [ 16.687459] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.687781] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.688080] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.688360] ^ [ 16.688584] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.688882] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.689152] ================================================================== [ 15.531075] ================================================================== [ 15.532778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.533027] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.533252] [ 15.533338] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.533382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.533402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.533422] Call Trace: [ 15.533439] <TASK> [ 15.533454] dump_stack_lvl+0x73/0xb0 [ 15.533482] print_report+0xd1/0x610 [ 15.533506] ? __virt_addr_valid+0x1db/0x2d0 [ 15.533529] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.533562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.533587] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.533611] kasan_report+0x141/0x180 [ 15.533634] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.533661] __asan_report_store4_noabort+0x1b/0x30 [ 15.533687] kasan_atomics_helper+0x4ba2/0x5450 [ 15.533711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.533734] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.533758] ? trace_hardirqs_on+0x37/0xe0 [ 15.533781] ? kasan_atomics+0x152/0x310 [ 15.533807] kasan_atomics+0x1dc/0x310 [ 15.533829] ? __pfx_kasan_atomics+0x10/0x10 [ 15.533853] ? __pfx_kasan_atomics+0x10/0x10 [ 15.533881] kunit_try_run_case+0x1a5/0x480 [ 15.533906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.533929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.533954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.533980] ? __kthread_parkme+0x82/0x180 [ 15.534001] ? preempt_count_sub+0x50/0x80 [ 15.534025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.534050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.534076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.534102] kthread+0x337/0x6f0 [ 15.534121] ? trace_preempt_on+0x20/0xc0 [ 15.534143] ? __pfx_kthread+0x10/0x10 [ 15.534164] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.534187] ? calculate_sigpending+0x7b/0xa0 [ 15.534211] ? __pfx_kthread+0x10/0x10 [ 15.534233] ret_from_fork+0x116/0x1d0 [ 15.534252] ? __pfx_kthread+0x10/0x10 [ 15.534272] ret_from_fork_asm+0x1a/0x30 [ 15.534303] </TASK> [ 15.534313] [ 15.545231] Allocated by task 282: [ 15.545400] kasan_save_stack+0x45/0x70 [ 15.545660] kasan_save_track+0x18/0x40 [ 15.545802] kasan_save_alloc_info+0x3b/0x50 [ 15.545952] __kasan_kmalloc+0xb7/0xc0 [ 15.546138] __kmalloc_cache_noprof+0x189/0x420 [ 15.546364] kasan_atomics+0x95/0x310 [ 15.546560] kunit_try_run_case+0x1a5/0x480 [ 15.547067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.547397] kthread+0x337/0x6f0 [ 15.547576] ret_from_fork+0x116/0x1d0 [ 15.547712] ret_from_fork_asm+0x1a/0x30 [ 15.547896] [ 15.547997] The buggy address belongs to the object at ffff888102a5fe80 [ 15.547997] which belongs to the cache kmalloc-64 of size 64 [ 15.548619] The buggy address is located 0 bytes to the right of [ 15.548619] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.549123] [ 15.549195] The buggy address belongs to the physical page: [ 15.549626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.549901] flags: 0x200000000000000(node=0|zone=2) [ 15.550065] page_type: f5(slab) [ 15.550211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.550542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.550920] page dumped because: kasan: bad access detected [ 15.551147] [ 15.551216] Memory state around the buggy address: [ 15.551369] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.551756] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.552177] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.552762] ^ [ 15.552993] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553314] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553644] ================================================================== [ 16.162909] ================================================================== [ 16.163477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 16.163876] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.164318] [ 16.164480] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.164526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.164539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.164571] Call Trace: [ 16.164587] <TASK> [ 16.164601] dump_stack_lvl+0x73/0xb0 [ 16.164630] print_report+0xd1/0x610 [ 16.164653] ? __virt_addr_valid+0x1db/0x2d0 [ 16.164677] ? kasan_atomics_helper+0x1079/0x5450 [ 16.164699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.164725] ? kasan_atomics_helper+0x1079/0x5450 [ 16.164759] kasan_report+0x141/0x180 [ 16.164782] ? kasan_atomics_helper+0x1079/0x5450 [ 16.164810] kasan_check_range+0x10c/0x1c0 [ 16.164847] __kasan_check_write+0x18/0x20 [ 16.164868] kasan_atomics_helper+0x1079/0x5450 [ 16.164893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.164917] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.164943] ? trace_hardirqs_on+0x37/0xe0 [ 16.164966] ? kasan_atomics+0x152/0x310 [ 16.164994] kasan_atomics+0x1dc/0x310 [ 16.165018] ? __pfx_kasan_atomics+0x10/0x10 [ 16.165043] ? __pfx_kasan_atomics+0x10/0x10 [ 16.165071] kunit_try_run_case+0x1a5/0x480 [ 16.165096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.165121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.165146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.165172] ? __kthread_parkme+0x82/0x180 [ 16.165194] ? preempt_count_sub+0x50/0x80 [ 16.165219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.165245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.165280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.165307] kthread+0x337/0x6f0 [ 16.165328] ? trace_preempt_on+0x20/0xc0 [ 16.165370] ? __pfx_kthread+0x10/0x10 [ 16.165392] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.165425] ? calculate_sigpending+0x7b/0xa0 [ 16.165461] ? __pfx_kthread+0x10/0x10 [ 16.165484] ret_from_fork+0x116/0x1d0 [ 16.165504] ? __pfx_kthread+0x10/0x10 [ 16.165526] ret_from_fork_asm+0x1a/0x30 [ 16.165568] </TASK> [ 16.165579] [ 16.173406] Allocated by task 282: [ 16.173606] kasan_save_stack+0x45/0x70 [ 16.173797] kasan_save_track+0x18/0x40 [ 16.173937] kasan_save_alloc_info+0x3b/0x50 [ 16.174168] __kasan_kmalloc+0xb7/0xc0 [ 16.174357] __kmalloc_cache_noprof+0x189/0x420 [ 16.174616] kasan_atomics+0x95/0x310 [ 16.174759] kunit_try_run_case+0x1a5/0x480 [ 16.174968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.175174] kthread+0x337/0x6f0 [ 16.175296] ret_from_fork+0x116/0x1d0 [ 16.175431] ret_from_fork_asm+0x1a/0x30 [ 16.175661] [ 16.175778] The buggy address belongs to the object at ffff888102a5fe80 [ 16.175778] which belongs to the cache kmalloc-64 of size 64 [ 16.176353] The buggy address is located 0 bytes to the right of [ 16.176353] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.176805] [ 16.176878] The buggy address belongs to the physical page: [ 16.177045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.177346] flags: 0x200000000000000(node=0|zone=2) [ 16.177662] page_type: f5(slab) [ 16.177875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.178353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.178782] page dumped because: kasan: bad access detected [ 16.179051] [ 16.179144] Memory state around the buggy address: [ 16.179339] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.179703] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.179953] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.180164] ^ [ 16.180360] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.180802] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.181146] ================================================================== [ 16.831965] ================================================================== [ 16.832380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.832770] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.833078] [ 16.833174] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.833219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.833233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.833255] Call Trace: [ 16.833271] <TASK> [ 16.833285] dump_stack_lvl+0x73/0xb0 [ 16.833314] print_report+0xd1/0x610 [ 16.833339] ? __virt_addr_valid+0x1db/0x2d0 [ 16.833362] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.833385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.833440] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.833467] kasan_report+0x141/0x180 [ 16.833491] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.833520] kasan_check_range+0x10c/0x1c0 [ 16.833545] __kasan_check_write+0x18/0x20 [ 16.833612] kasan_atomics_helper+0x1f43/0x5450 [ 16.833635] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.833660] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.833686] ? trace_hardirqs_on+0x37/0xe0 [ 16.833711] ? kasan_atomics+0x152/0x310 [ 16.833739] kasan_atomics+0x1dc/0x310 [ 16.833763] ? __pfx_kasan_atomics+0x10/0x10 [ 16.833788] ? __pfx_kasan_atomics+0x10/0x10 [ 16.833816] kunit_try_run_case+0x1a5/0x480 [ 16.833842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.833867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.833892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.833918] ? __kthread_parkme+0x82/0x180 [ 16.833940] ? preempt_count_sub+0x50/0x80 [ 16.833965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.833991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.834017] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.834044] kthread+0x337/0x6f0 [ 16.834065] ? trace_preempt_on+0x20/0xc0 [ 16.834088] ? __pfx_kthread+0x10/0x10 [ 16.834109] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.834133] ? calculate_sigpending+0x7b/0xa0 [ 16.834159] ? __pfx_kthread+0x10/0x10 [ 16.834182] ret_from_fork+0x116/0x1d0 [ 16.834202] ? __pfx_kthread+0x10/0x10 [ 16.835278] ret_from_fork_asm+0x1a/0x30 [ 16.835321] </TASK> [ 16.835338] [ 16.847962] Allocated by task 282: [ 16.848103] kasan_save_stack+0x45/0x70 [ 16.848253] kasan_save_track+0x18/0x40 [ 16.848544] kasan_save_alloc_info+0x3b/0x50 [ 16.849201] __kasan_kmalloc+0xb7/0xc0 [ 16.849685] __kmalloc_cache_noprof+0x189/0x420 [ 16.850185] kasan_atomics+0x95/0x310 [ 16.850647] kunit_try_run_case+0x1a5/0x480 [ 16.851120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.851390] kthread+0x337/0x6f0 [ 16.851874] ret_from_fork+0x116/0x1d0 [ 16.852191] ret_from_fork_asm+0x1a/0x30 [ 16.852337] [ 16.852477] The buggy address belongs to the object at ffff888102a5fe80 [ 16.852477] which belongs to the cache kmalloc-64 of size 64 [ 16.853748] The buggy address is located 0 bytes to the right of [ 16.853748] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.854127] [ 16.854202] The buggy address belongs to the physical page: [ 16.854378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.855419] flags: 0x200000000000000(node=0|zone=2) [ 16.855955] page_type: f5(slab) [ 16.856378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.857154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.857777] page dumped because: kasan: bad access detected [ 16.857959] [ 16.858033] Memory state around the buggy address: [ 16.858192] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.858436] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.859108] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.859750] ^ [ 16.860190] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.860853] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.861486] ================================================================== [ 16.974144] ================================================================== [ 16.974567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.974890] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.975111] [ 16.975192] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.975235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.975248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.975270] Call Trace: [ 16.975283] <TASK> [ 16.975298] dump_stack_lvl+0x73/0xb0 [ 16.975324] print_report+0xd1/0x610 [ 16.975347] ? __virt_addr_valid+0x1db/0x2d0 [ 16.975370] ? kasan_atomics_helper+0x218a/0x5450 [ 16.975436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.975461] ? kasan_atomics_helper+0x218a/0x5450 [ 16.975484] kasan_report+0x141/0x180 [ 16.975508] ? kasan_atomics_helper+0x218a/0x5450 [ 16.975536] kasan_check_range+0x10c/0x1c0 [ 16.975588] __kasan_check_write+0x18/0x20 [ 16.975623] kasan_atomics_helper+0x218a/0x5450 [ 16.975647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.975671] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.975697] ? trace_hardirqs_on+0x37/0xe0 [ 16.975721] ? kasan_atomics+0x152/0x310 [ 16.975748] kasan_atomics+0x1dc/0x310 [ 16.975773] ? __pfx_kasan_atomics+0x10/0x10 [ 16.975798] ? __pfx_kasan_atomics+0x10/0x10 [ 16.975826] kunit_try_run_case+0x1a5/0x480 [ 16.975852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.975876] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.975902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.975945] ? __kthread_parkme+0x82/0x180 [ 16.975967] ? preempt_count_sub+0x50/0x80 [ 16.975992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.976019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.976044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.976078] kthread+0x337/0x6f0 [ 16.976098] ? trace_preempt_on+0x20/0xc0 [ 16.976136] ? __pfx_kthread+0x10/0x10 [ 16.976158] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.976182] ? calculate_sigpending+0x7b/0xa0 [ 16.976208] ? __pfx_kthread+0x10/0x10 [ 16.976231] ret_from_fork+0x116/0x1d0 [ 16.976251] ? __pfx_kthread+0x10/0x10 [ 16.976288] ret_from_fork_asm+0x1a/0x30 [ 16.976333] </TASK> [ 16.976344] [ 16.984188] Allocated by task 282: [ 16.984370] kasan_save_stack+0x45/0x70 [ 16.984649] kasan_save_track+0x18/0x40 [ 16.984861] kasan_save_alloc_info+0x3b/0x50 [ 16.985095] __kasan_kmalloc+0xb7/0xc0 [ 16.985288] __kmalloc_cache_noprof+0x189/0x420 [ 16.985534] kasan_atomics+0x95/0x310 [ 16.985686] kunit_try_run_case+0x1a5/0x480 [ 16.985895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.986164] kthread+0x337/0x6f0 [ 16.986583] ret_from_fork+0x116/0x1d0 [ 16.986737] ret_from_fork_asm+0x1a/0x30 [ 16.986965] [ 16.987062] The buggy address belongs to the object at ffff888102a5fe80 [ 16.987062] which belongs to the cache kmalloc-64 of size 64 [ 16.987622] The buggy address is located 0 bytes to the right of [ 16.987622] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.988143] [ 16.988259] The buggy address belongs to the physical page: [ 16.988492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.988869] flags: 0x200000000000000(node=0|zone=2) [ 16.989092] page_type: f5(slab) [ 16.989273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.989646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.989985] page dumped because: kasan: bad access detected [ 16.990233] [ 16.990311] Memory state around the buggy address: [ 16.990558] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.990876] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.991263] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.991641] ^ [ 16.991868] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.992189] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.992528] ================================================================== [ 16.590928] ================================================================== [ 16.591741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.592097] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.592400] [ 16.592577] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.592623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.592636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.592659] Call Trace: [ 16.592676] <TASK> [ 16.592692] dump_stack_lvl+0x73/0xb0 [ 16.592720] print_report+0xd1/0x610 [ 16.592744] ? __virt_addr_valid+0x1db/0x2d0 [ 16.592767] ? kasan_atomics_helper+0x1818/0x5450 [ 16.592791] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.592816] ? kasan_atomics_helper+0x1818/0x5450 [ 16.592840] kasan_report+0x141/0x180 [ 16.592864] ? kasan_atomics_helper+0x1818/0x5450 [ 16.592892] kasan_check_range+0x10c/0x1c0 [ 16.592918] __kasan_check_write+0x18/0x20 [ 16.592939] kasan_atomics_helper+0x1818/0x5450 [ 16.592964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.592989] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.593015] ? trace_hardirqs_on+0x37/0xe0 [ 16.593039] ? kasan_atomics+0x152/0x310 [ 16.593068] kasan_atomics+0x1dc/0x310 [ 16.593092] ? __pfx_kasan_atomics+0x10/0x10 [ 16.593117] ? __pfx_kasan_atomics+0x10/0x10 [ 16.593147] kunit_try_run_case+0x1a5/0x480 [ 16.593173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.593198] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.593224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.593250] ? __kthread_parkme+0x82/0x180 [ 16.593272] ? preempt_count_sub+0x50/0x80 [ 16.593297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.593323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.593350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.593378] kthread+0x337/0x6f0 [ 16.593398] ? trace_preempt_on+0x20/0xc0 [ 16.593421] ? __pfx_kthread+0x10/0x10 [ 16.593443] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.593466] ? calculate_sigpending+0x7b/0xa0 [ 16.593503] ? __pfx_kthread+0x10/0x10 [ 16.593525] ret_from_fork+0x116/0x1d0 [ 16.593547] ? __pfx_kthread+0x10/0x10 [ 16.593579] ret_from_fork_asm+0x1a/0x30 [ 16.593612] </TASK> [ 16.593623] [ 16.601137] Allocated by task 282: [ 16.601337] kasan_save_stack+0x45/0x70 [ 16.601618] kasan_save_track+0x18/0x40 [ 16.601849] kasan_save_alloc_info+0x3b/0x50 [ 16.602020] __kasan_kmalloc+0xb7/0xc0 [ 16.602150] __kmalloc_cache_noprof+0x189/0x420 [ 16.602303] kasan_atomics+0x95/0x310 [ 16.602463] kunit_try_run_case+0x1a5/0x480 [ 16.602652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.602909] kthread+0x337/0x6f0 [ 16.603142] ret_from_fork+0x116/0x1d0 [ 16.603337] ret_from_fork_asm+0x1a/0x30 [ 16.603667] [ 16.603816] The buggy address belongs to the object at ffff888102a5fe80 [ 16.603816] which belongs to the cache kmalloc-64 of size 64 [ 16.604377] The buggy address is located 0 bytes to the right of [ 16.604377] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.604914] [ 16.604986] The buggy address belongs to the physical page: [ 16.605156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.605475] flags: 0x200000000000000(node=0|zone=2) [ 16.605782] page_type: f5(slab) [ 16.605954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.606290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.606637] page dumped because: kasan: bad access detected [ 16.606861] [ 16.606950] Memory state around the buggy address: [ 16.607161] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.607372] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.607722] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.607994] ^ [ 16.608153] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.608362] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.608674] ================================================================== [ 15.939899] ================================================================== [ 15.940257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.940821] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.941086] [ 15.941191] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.941235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.941248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.941270] Call Trace: [ 15.941288] <TASK> [ 15.941305] dump_stack_lvl+0x73/0xb0 [ 15.941333] print_report+0xd1/0x610 [ 15.941425] ? __virt_addr_valid+0x1db/0x2d0 [ 15.941450] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.941474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.941498] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.941532] kasan_report+0x141/0x180 [ 15.941574] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.941602] kasan_check_range+0x10c/0x1c0 [ 15.941627] __kasan_check_write+0x18/0x20 [ 15.941648] kasan_atomics_helper+0xb6a/0x5450 [ 15.941673] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.941698] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.941724] ? trace_hardirqs_on+0x37/0xe0 [ 15.941749] ? kasan_atomics+0x152/0x310 [ 15.941777] kasan_atomics+0x1dc/0x310 [ 15.941811] ? __pfx_kasan_atomics+0x10/0x10 [ 15.941837] ? __pfx_kasan_atomics+0x10/0x10 [ 15.941876] kunit_try_run_case+0x1a5/0x480 [ 15.941903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.941928] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.941953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.941979] ? __kthread_parkme+0x82/0x180 [ 15.942002] ? preempt_count_sub+0x50/0x80 [ 15.942028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.942090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.942118] kthread+0x337/0x6f0 [ 15.942138] ? trace_preempt_on+0x20/0xc0 [ 15.942173] ? __pfx_kthread+0x10/0x10 [ 15.942196] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.942219] ? calculate_sigpending+0x7b/0xa0 [ 15.942287] ? __pfx_kthread+0x10/0x10 [ 15.942311] ret_from_fork+0x116/0x1d0 [ 15.942332] ? __pfx_kthread+0x10/0x10 [ 15.942421] ret_from_fork_asm+0x1a/0x30 [ 15.942455] </TASK> [ 15.942467] [ 15.951576] Allocated by task 282: [ 15.951763] kasan_save_stack+0x45/0x70 [ 15.951953] kasan_save_track+0x18/0x40 [ 15.952162] kasan_save_alloc_info+0x3b/0x50 [ 15.952587] __kasan_kmalloc+0xb7/0xc0 [ 15.952789] __kmalloc_cache_noprof+0x189/0x420 [ 15.953073] kasan_atomics+0x95/0x310 [ 15.953214] kunit_try_run_case+0x1a5/0x480 [ 15.953364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.953543] kthread+0x337/0x6f0 [ 15.953942] ret_from_fork+0x116/0x1d0 [ 15.954175] ret_from_fork_asm+0x1a/0x30 [ 15.954647] [ 15.954742] The buggy address belongs to the object at ffff888102a5fe80 [ 15.954742] which belongs to the cache kmalloc-64 of size 64 [ 15.955197] The buggy address is located 0 bytes to the right of [ 15.955197] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.955796] [ 15.955905] The buggy address belongs to the physical page: [ 15.956436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.956761] flags: 0x200000000000000(node=0|zone=2) [ 15.956929] page_type: f5(slab) [ 15.957095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.957568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.957836] page dumped because: kasan: bad access detected [ 15.958010] [ 15.958108] Memory state around the buggy address: [ 15.958505] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.958913] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.959209] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.959709] ^ [ 15.959927] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960295] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.960859] ================================================================== [ 16.729722] ================================================================== [ 16.729970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.730214] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.730658] [ 16.730766] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.730808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.730820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.730842] Call Trace: [ 16.730855] <TASK> [ 16.730868] dump_stack_lvl+0x73/0xb0 [ 16.730897] print_report+0xd1/0x610 [ 16.730920] ? __virt_addr_valid+0x1db/0x2d0 [ 16.730943] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.730966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.730991] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.731014] kasan_report+0x141/0x180 [ 16.731038] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.731065] __asan_report_load8_noabort+0x18/0x20 [ 16.731092] kasan_atomics_helper+0x4f30/0x5450 [ 16.731126] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.731151] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.731176] ? trace_hardirqs_on+0x37/0xe0 [ 16.731199] ? kasan_atomics+0x152/0x310 [ 16.731227] kasan_atomics+0x1dc/0x310 [ 16.731251] ? __pfx_kasan_atomics+0x10/0x10 [ 16.731276] ? __pfx_kasan_atomics+0x10/0x10 [ 16.731304] kunit_try_run_case+0x1a5/0x480 [ 16.731329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.731354] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.731379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.731405] ? __kthread_parkme+0x82/0x180 [ 16.731439] ? preempt_count_sub+0x50/0x80 [ 16.731464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.731490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.731517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.731544] kthread+0x337/0x6f0 [ 16.731575] ? trace_preempt_on+0x20/0xc0 [ 16.731598] ? __pfx_kthread+0x10/0x10 [ 16.731620] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.731643] ? calculate_sigpending+0x7b/0xa0 [ 16.731668] ? __pfx_kthread+0x10/0x10 [ 16.731691] ret_from_fork+0x116/0x1d0 [ 16.731712] ? __pfx_kthread+0x10/0x10 [ 16.731733] ret_from_fork_asm+0x1a/0x30 [ 16.731764] </TASK> [ 16.731775] [ 16.739076] Allocated by task 282: [ 16.739245] kasan_save_stack+0x45/0x70 [ 16.739390] kasan_save_track+0x18/0x40 [ 16.739613] kasan_save_alloc_info+0x3b/0x50 [ 16.739832] __kasan_kmalloc+0xb7/0xc0 [ 16.740024] __kmalloc_cache_noprof+0x189/0x420 [ 16.740213] kasan_atomics+0x95/0x310 [ 16.740391] kunit_try_run_case+0x1a5/0x480 [ 16.740589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.740798] kthread+0x337/0x6f0 [ 16.740919] ret_from_fork+0x116/0x1d0 [ 16.741053] ret_from_fork_asm+0x1a/0x30 [ 16.741203] [ 16.741297] The buggy address belongs to the object at ffff888102a5fe80 [ 16.741297] which belongs to the cache kmalloc-64 of size 64 [ 16.741842] The buggy address is located 0 bytes to the right of [ 16.741842] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.742368] [ 16.742495] The buggy address belongs to the physical page: [ 16.742712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.742954] flags: 0x200000000000000(node=0|zone=2) [ 16.743116] page_type: f5(slab) [ 16.743236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.743513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.743854] page dumped because: kasan: bad access detected [ 16.744110] [ 16.744214] Memory state around the buggy address: [ 16.744433] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.744756] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.745167] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.745419] ^ [ 16.745655] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.745912] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.746125] ================================================================== [ 15.665682] ================================================================== [ 15.666619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.667568] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.668063] [ 15.668154] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.668200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.668213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.668298] Call Trace: [ 15.668341] <TASK> [ 15.668358] dump_stack_lvl+0x73/0xb0 [ 15.668416] print_report+0xd1/0x610 [ 15.668441] ? __virt_addr_valid+0x1db/0x2d0 [ 15.668478] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.668511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.668546] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.668581] kasan_report+0x141/0x180 [ 15.668604] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.668643] __asan_report_store4_noabort+0x1b/0x30 [ 15.668670] kasan_atomics_helper+0x4b3a/0x5450 [ 15.668694] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.668719] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.668745] ? trace_hardirqs_on+0x37/0xe0 [ 15.668769] ? kasan_atomics+0x152/0x310 [ 15.668797] kasan_atomics+0x1dc/0x310 [ 15.668821] ? __pfx_kasan_atomics+0x10/0x10 [ 15.668846] ? __pfx_kasan_atomics+0x10/0x10 [ 15.668874] kunit_try_run_case+0x1a5/0x480 [ 15.668902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.668926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.668952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.668978] ? __kthread_parkme+0x82/0x180 [ 15.669000] ? preempt_count_sub+0x50/0x80 [ 15.669025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.669051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.669077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.669104] kthread+0x337/0x6f0 [ 15.669124] ? trace_preempt_on+0x20/0xc0 [ 15.669147] ? __pfx_kthread+0x10/0x10 [ 15.669169] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.669193] ? calculate_sigpending+0x7b/0xa0 [ 15.669218] ? __pfx_kthread+0x10/0x10 [ 15.669273] ret_from_fork+0x116/0x1d0 [ 15.669316] ? __pfx_kthread+0x10/0x10 [ 15.669341] ret_from_fork_asm+0x1a/0x30 [ 15.669374] </TASK> [ 15.669387] [ 15.682317] Allocated by task 282: [ 15.682691] kasan_save_stack+0x45/0x70 [ 15.683096] kasan_save_track+0x18/0x40 [ 15.683640] kasan_save_alloc_info+0x3b/0x50 [ 15.684076] __kasan_kmalloc+0xb7/0xc0 [ 15.684257] __kmalloc_cache_noprof+0x189/0x420 [ 15.684773] kasan_atomics+0x95/0x310 [ 15.685129] kunit_try_run_case+0x1a5/0x480 [ 15.685417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.685885] kthread+0x337/0x6f0 [ 15.686022] ret_from_fork+0x116/0x1d0 [ 15.686172] ret_from_fork_asm+0x1a/0x30 [ 15.686609] [ 15.686774] The buggy address belongs to the object at ffff888102a5fe80 [ 15.686774] which belongs to the cache kmalloc-64 of size 64 [ 15.687942] The buggy address is located 0 bytes to the right of [ 15.687942] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.689349] [ 15.689465] The buggy address belongs to the physical page: [ 15.689999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.690679] flags: 0x200000000000000(node=0|zone=2) [ 15.691113] page_type: f5(slab) [ 15.691590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.691972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.692210] page dumped because: kasan: bad access detected [ 15.692802] [ 15.692977] Memory state around the buggy address: [ 15.693423] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.694159] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.694890] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.695408] ^ [ 15.695914] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.696380] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.697068] ================================================================== [ 16.861956] ================================================================== [ 16.862813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.863517] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.864114] [ 16.864202] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.864247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.864260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.864282] Call Trace: [ 16.864299] <TASK> [ 16.864316] dump_stack_lvl+0x73/0xb0 [ 16.864344] print_report+0xd1/0x610 [ 16.864367] ? __virt_addr_valid+0x1db/0x2d0 [ 16.864391] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.864441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.864466] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.864512] kasan_report+0x141/0x180 [ 16.864535] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.864572] __asan_report_load8_noabort+0x18/0x20 [ 16.864599] kasan_atomics_helper+0x4f71/0x5450 [ 16.864623] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.864647] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.864673] ? trace_hardirqs_on+0x37/0xe0 [ 16.864696] ? kasan_atomics+0x152/0x310 [ 16.864724] kasan_atomics+0x1dc/0x310 [ 16.864748] ? __pfx_kasan_atomics+0x10/0x10 [ 16.864774] ? __pfx_kasan_atomics+0x10/0x10 [ 16.864802] kunit_try_run_case+0x1a5/0x480 [ 16.864828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.864852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.864878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.864904] ? __kthread_parkme+0x82/0x180 [ 16.864927] ? preempt_count_sub+0x50/0x80 [ 16.864952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.864978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.865004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.865032] kthread+0x337/0x6f0 [ 16.865052] ? trace_preempt_on+0x20/0xc0 [ 16.865076] ? __pfx_kthread+0x10/0x10 [ 16.865098] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.865121] ? calculate_sigpending+0x7b/0xa0 [ 16.865147] ? __pfx_kthread+0x10/0x10 [ 16.865172] ret_from_fork+0x116/0x1d0 [ 16.865194] ? __pfx_kthread+0x10/0x10 [ 16.865215] ret_from_fork_asm+0x1a/0x30 [ 16.865247] </TASK> [ 16.865257] [ 16.877457] Allocated by task 282: [ 16.877801] kasan_save_stack+0x45/0x70 [ 16.878166] kasan_save_track+0x18/0x40 [ 16.878543] kasan_save_alloc_info+0x3b/0x50 [ 16.878953] __kasan_kmalloc+0xb7/0xc0 [ 16.879133] __kmalloc_cache_noprof+0x189/0x420 [ 16.879571] kasan_atomics+0x95/0x310 [ 16.879882] kunit_try_run_case+0x1a5/0x480 [ 16.880034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.880215] kthread+0x337/0x6f0 [ 16.880336] ret_from_fork+0x116/0x1d0 [ 16.880708] ret_from_fork_asm+0x1a/0x30 [ 16.881072] [ 16.881256] The buggy address belongs to the object at ffff888102a5fe80 [ 16.881256] which belongs to the cache kmalloc-64 of size 64 [ 16.882320] The buggy address is located 0 bytes to the right of [ 16.882320] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.883265] [ 16.883342] The buggy address belongs to the physical page: [ 16.883817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.884532] flags: 0x200000000000000(node=0|zone=2) [ 16.884771] page_type: f5(slab) [ 16.884895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.885127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.885355] page dumped because: kasan: bad access detected [ 16.885873] [ 16.886031] Memory state around the buggy address: [ 16.886504] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.887132] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.887811] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.888425] ^ [ 16.888949] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.889370] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.890015] ================================================================== [ 15.757409] ================================================================== [ 15.757732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.758046] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.758717] [ 15.759369] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.759418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.759431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.759453] Call Trace: [ 15.759469] <TASK> [ 15.759484] dump_stack_lvl+0x73/0xb0 [ 15.759515] print_report+0xd1/0x610 [ 15.759539] ? __virt_addr_valid+0x1db/0x2d0 [ 15.759574] ? kasan_atomics_helper+0x72f/0x5450 [ 15.759597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.759622] ? kasan_atomics_helper+0x72f/0x5450 [ 15.759645] kasan_report+0x141/0x180 [ 15.759668] ? kasan_atomics_helper+0x72f/0x5450 [ 15.759696] kasan_check_range+0x10c/0x1c0 [ 15.759720] __kasan_check_write+0x18/0x20 [ 15.759743] kasan_atomics_helper+0x72f/0x5450 [ 15.759767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.759791] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.759818] ? trace_hardirqs_on+0x37/0xe0 [ 15.759842] ? kasan_atomics+0x152/0x310 [ 15.759869] kasan_atomics+0x1dc/0x310 [ 15.759894] ? __pfx_kasan_atomics+0x10/0x10 [ 15.759919] ? __pfx_kasan_atomics+0x10/0x10 [ 15.759948] kunit_try_run_case+0x1a5/0x480 [ 15.759974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.759999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.760023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.760048] ? __kthread_parkme+0x82/0x180 [ 15.760074] ? preempt_count_sub+0x50/0x80 [ 15.760099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.760125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.760152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.760179] kthread+0x337/0x6f0 [ 15.760199] ? trace_preempt_on+0x20/0xc0 [ 15.760223] ? __pfx_kthread+0x10/0x10 [ 15.760367] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.760394] ? calculate_sigpending+0x7b/0xa0 [ 15.760420] ? __pfx_kthread+0x10/0x10 [ 15.760443] ret_from_fork+0x116/0x1d0 [ 15.760465] ? __pfx_kthread+0x10/0x10 [ 15.760523] ret_from_fork_asm+0x1a/0x30 [ 15.760567] </TASK> [ 15.760580] [ 15.771943] Allocated by task 282: [ 15.772126] kasan_save_stack+0x45/0x70 [ 15.773006] kasan_save_track+0x18/0x40 [ 15.773218] kasan_save_alloc_info+0x3b/0x50 [ 15.773678] __kasan_kmalloc+0xb7/0xc0 [ 15.773969] __kmalloc_cache_noprof+0x189/0x420 [ 15.774451] kasan_atomics+0x95/0x310 [ 15.774652] kunit_try_run_case+0x1a5/0x480 [ 15.774853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.775096] kthread+0x337/0x6f0 [ 15.775579] ret_from_fork+0x116/0x1d0 [ 15.775749] ret_from_fork_asm+0x1a/0x30 [ 15.775935] [ 15.776027] The buggy address belongs to the object at ffff888102a5fe80 [ 15.776027] which belongs to the cache kmalloc-64 of size 64 [ 15.777523] The buggy address is located 0 bytes to the right of [ 15.777523] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.778347] [ 15.778597] The buggy address belongs to the physical page: [ 15.778847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.779171] flags: 0x200000000000000(node=0|zone=2) [ 15.779759] page_type: f5(slab) [ 15.780033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.780613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.780929] page dumped because: kasan: bad access detected [ 15.781155] [ 15.781777] Memory state around the buggy address: [ 15.781974] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.782201] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.783177] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.783977] ^ [ 15.784613] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.784937] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.785158] ================================================================== [ 16.136722] ================================================================== [ 16.137310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 16.138039] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.138520] [ 16.138633] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.138678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.138691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.138724] Call Trace: [ 16.138738] <TASK> [ 16.138753] dump_stack_lvl+0x73/0xb0 [ 16.138781] print_report+0xd1/0x610 [ 16.138814] ? __virt_addr_valid+0x1db/0x2d0 [ 16.138837] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.138861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.138897] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.138920] kasan_report+0x141/0x180 [ 16.138943] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.138980] __asan_report_load4_noabort+0x18/0x20 [ 16.139007] kasan_atomics_helper+0x4a36/0x5450 [ 16.139042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.139066] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.139093] ? trace_hardirqs_on+0x37/0xe0 [ 16.139115] ? kasan_atomics+0x152/0x310 [ 16.139144] kasan_atomics+0x1dc/0x310 [ 16.139168] ? __pfx_kasan_atomics+0x10/0x10 [ 16.139193] ? __pfx_kasan_atomics+0x10/0x10 [ 16.139231] kunit_try_run_case+0x1a5/0x480 [ 16.139256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.139280] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.139316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.139340] ? __kthread_parkme+0x82/0x180 [ 16.139363] ? preempt_count_sub+0x50/0x80 [ 16.139388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.139413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.139446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.139474] kthread+0x337/0x6f0 [ 16.139494] ? trace_preempt_on+0x20/0xc0 [ 16.139517] ? __pfx_kthread+0x10/0x10 [ 16.139539] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.139571] ? calculate_sigpending+0x7b/0xa0 [ 16.139597] ? __pfx_kthread+0x10/0x10 [ 16.139620] ret_from_fork+0x116/0x1d0 [ 16.139640] ? __pfx_kthread+0x10/0x10 [ 16.139661] ret_from_fork_asm+0x1a/0x30 [ 16.139692] </TASK> [ 16.139703] [ 16.151809] Allocated by task 282: [ 16.152166] kasan_save_stack+0x45/0x70 [ 16.152435] kasan_save_track+0x18/0x40 [ 16.152721] kasan_save_alloc_info+0x3b/0x50 [ 16.152877] __kasan_kmalloc+0xb7/0xc0 [ 16.153010] __kmalloc_cache_noprof+0x189/0x420 [ 16.153168] kasan_atomics+0x95/0x310 [ 16.153302] kunit_try_run_case+0x1a5/0x480 [ 16.153485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.153986] kthread+0x337/0x6f0 [ 16.154300] ret_from_fork+0x116/0x1d0 [ 16.154715] ret_from_fork_asm+0x1a/0x30 [ 16.155083] [ 16.155249] The buggy address belongs to the object at ffff888102a5fe80 [ 16.155249] which belongs to the cache kmalloc-64 of size 64 [ 16.156330] The buggy address is located 0 bytes to the right of [ 16.156330] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.157436] [ 16.157651] The buggy address belongs to the physical page: [ 16.158142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.158496] flags: 0x200000000000000(node=0|zone=2) [ 16.158960] page_type: f5(slab) [ 16.159283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.159719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.159949] page dumped because: kasan: bad access detected [ 16.160125] [ 16.160196] Memory state around the buggy address: [ 16.160353] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.160625] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.161051] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.161363] ^ [ 16.161714] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.161946] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.162291] ================================================================== [ 16.764748] ================================================================== [ 16.765092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.765633] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.765912] [ 16.765998] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.766041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.766054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.766076] Call Trace: [ 16.766090] <TASK> [ 16.766104] dump_stack_lvl+0x73/0xb0 [ 16.766132] print_report+0xd1/0x610 [ 16.766155] ? __virt_addr_valid+0x1db/0x2d0 [ 16.766178] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.766201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.766226] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.766250] kasan_report+0x141/0x180 [ 16.766273] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.766301] kasan_check_range+0x10c/0x1c0 [ 16.766326] __kasan_check_write+0x18/0x20 [ 16.766347] kasan_atomics_helper+0x1d7a/0x5450 [ 16.766371] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.766395] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.766421] ? trace_hardirqs_on+0x37/0xe0 [ 16.766445] ? kasan_atomics+0x152/0x310 [ 16.766473] kasan_atomics+0x1dc/0x310 [ 16.766497] ? __pfx_kasan_atomics+0x10/0x10 [ 16.766522] ? __pfx_kasan_atomics+0x10/0x10 [ 16.766561] kunit_try_run_case+0x1a5/0x480 [ 16.766587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.766611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.766637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.766662] ? __kthread_parkme+0x82/0x180 [ 16.766685] ? preempt_count_sub+0x50/0x80 [ 16.766709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.766747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.766773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.766801] kthread+0x337/0x6f0 [ 16.766822] ? trace_preempt_on+0x20/0xc0 [ 16.766846] ? __pfx_kthread+0x10/0x10 [ 16.766867] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.766891] ? calculate_sigpending+0x7b/0xa0 [ 16.766917] ? __pfx_kthread+0x10/0x10 [ 16.766940] ret_from_fork+0x116/0x1d0 [ 16.766960] ? __pfx_kthread+0x10/0x10 [ 16.766982] ret_from_fork_asm+0x1a/0x30 [ 16.767014] </TASK> [ 16.767024] [ 16.774561] Allocated by task 282: [ 16.774739] kasan_save_stack+0x45/0x70 [ 16.774938] kasan_save_track+0x18/0x40 [ 16.775128] kasan_save_alloc_info+0x3b/0x50 [ 16.775320] __kasan_kmalloc+0xb7/0xc0 [ 16.775523] __kmalloc_cache_noprof+0x189/0x420 [ 16.775709] kasan_atomics+0x95/0x310 [ 16.775901] kunit_try_run_case+0x1a5/0x480 [ 16.776110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.776346] kthread+0x337/0x6f0 [ 16.776583] ret_from_fork+0x116/0x1d0 [ 16.776747] ret_from_fork_asm+0x1a/0x30 [ 16.776893] [ 16.776965] The buggy address belongs to the object at ffff888102a5fe80 [ 16.776965] which belongs to the cache kmalloc-64 of size 64 [ 16.777319] The buggy address is located 0 bytes to the right of [ 16.777319] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.777864] [ 16.777963] The buggy address belongs to the physical page: [ 16.778206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.778575] flags: 0x200000000000000(node=0|zone=2) [ 16.778949] page_type: f5(slab) [ 16.779095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.779327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.779563] page dumped because: kasan: bad access detected [ 16.779735] [ 16.779836] Memory state around the buggy address: [ 16.780064] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.780383] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.780725] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.781197] ^ [ 16.781362] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.781680] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.781986] ================================================================== [ 17.037142] ================================================================== [ 17.037695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 17.038027] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 17.038337] [ 17.038638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.038687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.038921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.038948] Call Trace: [ 17.038966] <TASK> [ 17.038982] dump_stack_lvl+0x73/0xb0 [ 17.039013] print_report+0xd1/0x610 [ 17.039037] ? __virt_addr_valid+0x1db/0x2d0 [ 17.039096] ? kasan_atomics_helper+0x5115/0x5450 [ 17.039121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.039147] ? kasan_atomics_helper+0x5115/0x5450 [ 17.039171] kasan_report+0x141/0x180 [ 17.039193] ? kasan_atomics_helper+0x5115/0x5450 [ 17.039221] __asan_report_load8_noabort+0x18/0x20 [ 17.039249] kasan_atomics_helper+0x5115/0x5450 [ 17.039273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.039297] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.039323] ? trace_hardirqs_on+0x37/0xe0 [ 17.039347] ? kasan_atomics+0x152/0x310 [ 17.039375] kasan_atomics+0x1dc/0x310 [ 17.039421] ? __pfx_kasan_atomics+0x10/0x10 [ 17.039447] ? __pfx_kasan_atomics+0x10/0x10 [ 17.039475] kunit_try_run_case+0x1a5/0x480 [ 17.039502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.039527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.039563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.039589] ? __kthread_parkme+0x82/0x180 [ 17.039611] ? preempt_count_sub+0x50/0x80 [ 17.039637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.039663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.039689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.039717] kthread+0x337/0x6f0 [ 17.039737] ? trace_preempt_on+0x20/0xc0 [ 17.039761] ? __pfx_kthread+0x10/0x10 [ 17.039783] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.039805] ? calculate_sigpending+0x7b/0xa0 [ 17.039831] ? __pfx_kthread+0x10/0x10 [ 17.039854] ret_from_fork+0x116/0x1d0 [ 17.039874] ? __pfx_kthread+0x10/0x10 [ 17.039897] ret_from_fork_asm+0x1a/0x30 [ 17.039928] </TASK> [ 17.039940] [ 17.050544] Allocated by task 282: [ 17.050843] kasan_save_stack+0x45/0x70 [ 17.051035] kasan_save_track+0x18/0x40 [ 17.051214] kasan_save_alloc_info+0x3b/0x50 [ 17.051644] __kasan_kmalloc+0xb7/0xc0 [ 17.051934] __kmalloc_cache_noprof+0x189/0x420 [ 17.052368] kasan_atomics+0x95/0x310 [ 17.052649] kunit_try_run_case+0x1a5/0x480 [ 17.052966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.053213] kthread+0x337/0x6f0 [ 17.053368] ret_from_fork+0x116/0x1d0 [ 17.053852] ret_from_fork_asm+0x1a/0x30 [ 17.054128] [ 17.054350] The buggy address belongs to the object at ffff888102a5fe80 [ 17.054350] which belongs to the cache kmalloc-64 of size 64 [ 17.054874] The buggy address is located 0 bytes to the right of [ 17.054874] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 17.055371] [ 17.055760] The buggy address belongs to the physical page: [ 17.056185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 17.056719] flags: 0x200000000000000(node=0|zone=2) [ 17.056950] page_type: f5(slab) [ 17.057107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.057673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.058193] page dumped because: kasan: bad access detected [ 17.058655] [ 17.058882] Memory state around the buggy address: [ 17.059106] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.059632] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.060057] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.060562] ^ [ 17.061010] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.061315] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.061818] ================================================================== [ 16.711648] ================================================================== [ 16.711975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.712282] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.712914] [ 16.713044] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.713090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.713103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.713125] Call Trace: [ 16.713143] <TASK> [ 16.713160] dump_stack_lvl+0x73/0xb0 [ 16.713190] print_report+0xd1/0x610 [ 16.713213] ? __virt_addr_valid+0x1db/0x2d0 [ 16.713238] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.713276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.713301] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.713326] kasan_report+0x141/0x180 [ 16.713348] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.713376] kasan_check_range+0x10c/0x1c0 [ 16.713401] __kasan_check_write+0x18/0x20 [ 16.713431] kasan_atomics_helper+0x1c18/0x5450 [ 16.713456] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.713480] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.713506] ? trace_hardirqs_on+0x37/0xe0 [ 16.713529] ? kasan_atomics+0x152/0x310 [ 16.713569] kasan_atomics+0x1dc/0x310 [ 16.713593] ? __pfx_kasan_atomics+0x10/0x10 [ 16.713618] ? __pfx_kasan_atomics+0x10/0x10 [ 16.713647] kunit_try_run_case+0x1a5/0x480 [ 16.713672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.713697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.713723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.713749] ? __kthread_parkme+0x82/0x180 [ 16.713771] ? preempt_count_sub+0x50/0x80 [ 16.713797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.713822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.713848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.713876] kthread+0x337/0x6f0 [ 16.713896] ? trace_preempt_on+0x20/0xc0 [ 16.713919] ? __pfx_kthread+0x10/0x10 [ 16.713941] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.713965] ? calculate_sigpending+0x7b/0xa0 [ 16.713990] ? __pfx_kthread+0x10/0x10 [ 16.714013] ret_from_fork+0x116/0x1d0 [ 16.714033] ? __pfx_kthread+0x10/0x10 [ 16.714054] ret_from_fork_asm+0x1a/0x30 [ 16.714087] </TASK> [ 16.714097] [ 16.721630] Allocated by task 282: [ 16.721810] kasan_save_stack+0x45/0x70 [ 16.722012] kasan_save_track+0x18/0x40 [ 16.722207] kasan_save_alloc_info+0x3b/0x50 [ 16.722374] __kasan_kmalloc+0xb7/0xc0 [ 16.722661] __kmalloc_cache_noprof+0x189/0x420 [ 16.722853] kasan_atomics+0x95/0x310 [ 16.723016] kunit_try_run_case+0x1a5/0x480 [ 16.723217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.723492] kthread+0x337/0x6f0 [ 16.723658] ret_from_fork+0x116/0x1d0 [ 16.723823] ret_from_fork_asm+0x1a/0x30 [ 16.723965] [ 16.724054] The buggy address belongs to the object at ffff888102a5fe80 [ 16.724054] which belongs to the cache kmalloc-64 of size 64 [ 16.724636] The buggy address is located 0 bytes to the right of [ 16.724636] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.725001] [ 16.725072] The buggy address belongs to the physical page: [ 16.725242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.725596] flags: 0x200000000000000(node=0|zone=2) [ 16.725824] page_type: f5(slab) [ 16.725988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.726393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.726682] page dumped because: kasan: bad access detected [ 16.726856] [ 16.726926] Memory state around the buggy address: [ 16.727080] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.727300] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.727770] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.728091] ^ [ 16.728319] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.728950] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.729278] ================================================================== [ 15.910532] ================================================================== [ 15.911199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.911648] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 15.912300] [ 15.912489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.912535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.912727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.912753] Call Trace: [ 15.912770] <TASK> [ 15.912784] dump_stack_lvl+0x73/0xb0 [ 15.912831] print_report+0xd1/0x610 [ 15.912854] ? __virt_addr_valid+0x1db/0x2d0 [ 15.912878] ? kasan_atomics_helper+0xac7/0x5450 [ 15.912914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.912940] ? kasan_atomics_helper+0xac7/0x5450 [ 15.912964] kasan_report+0x141/0x180 [ 15.912987] ? kasan_atomics_helper+0xac7/0x5450 [ 15.913015] kasan_check_range+0x10c/0x1c0 [ 15.913040] __kasan_check_write+0x18/0x20 [ 15.913062] kasan_atomics_helper+0xac7/0x5450 [ 15.913087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.913112] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.913138] ? trace_hardirqs_on+0x37/0xe0 [ 15.913162] ? kasan_atomics+0x152/0x310 [ 15.913189] kasan_atomics+0x1dc/0x310 [ 15.913214] ? __pfx_kasan_atomics+0x10/0x10 [ 15.913294] ? __pfx_kasan_atomics+0x10/0x10 [ 15.913327] kunit_try_run_case+0x1a5/0x480 [ 15.913353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.913378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.913404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.913430] ? __kthread_parkme+0x82/0x180 [ 15.913453] ? preempt_count_sub+0x50/0x80 [ 15.913478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.913504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.913531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.913571] kthread+0x337/0x6f0 [ 15.913592] ? trace_preempt_on+0x20/0xc0 [ 15.913616] ? __pfx_kthread+0x10/0x10 [ 15.913638] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.913662] ? calculate_sigpending+0x7b/0xa0 [ 15.913688] ? __pfx_kthread+0x10/0x10 [ 15.913711] ret_from_fork+0x116/0x1d0 [ 15.913731] ? __pfx_kthread+0x10/0x10 [ 15.913753] ret_from_fork_asm+0x1a/0x30 [ 15.913785] </TASK> [ 15.913797] [ 15.928771] Allocated by task 282: [ 15.929020] kasan_save_stack+0x45/0x70 [ 15.929174] kasan_save_track+0x18/0x40 [ 15.929390] kasan_save_alloc_info+0x3b/0x50 [ 15.929860] __kasan_kmalloc+0xb7/0xc0 [ 15.930227] __kmalloc_cache_noprof+0x189/0x420 [ 15.930731] kasan_atomics+0x95/0x310 [ 15.931095] kunit_try_run_case+0x1a5/0x480 [ 15.931583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.932024] kthread+0x337/0x6f0 [ 15.932181] ret_from_fork+0x116/0x1d0 [ 15.932599] ret_from_fork_asm+0x1a/0x30 [ 15.933002] [ 15.933187] The buggy address belongs to the object at ffff888102a5fe80 [ 15.933187] which belongs to the cache kmalloc-64 of size 64 [ 15.933890] The buggy address is located 0 bytes to the right of [ 15.933890] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 15.934349] [ 15.934463] The buggy address belongs to the physical page: [ 15.934731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 15.935116] flags: 0x200000000000000(node=0|zone=2) [ 15.935546] page_type: f5(slab) [ 15.935736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.936044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.936427] page dumped because: kasan: bad access detected [ 15.936820] [ 15.936940] Memory state around the buggy address: [ 15.937138] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.937407] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.937886] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.938155] ^ [ 15.938481] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.939042] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.939356] ================================================================== [ 16.746642] ================================================================== [ 16.746983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.747427] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 16.747766] [ 16.747879] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.747924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.747937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.747959] Call Trace: [ 16.747973] <TASK> [ 16.747988] dump_stack_lvl+0x73/0xb0 [ 16.748015] print_report+0xd1/0x610 [ 16.748039] ? __virt_addr_valid+0x1db/0x2d0 [ 16.748066] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.748089] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.748114] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.748137] kasan_report+0x141/0x180 [ 16.748160] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.748188] kasan_check_range+0x10c/0x1c0 [ 16.748213] __kasan_check_write+0x18/0x20 [ 16.748234] kasan_atomics_helper+0x1ce1/0x5450 [ 16.748258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.748283] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.748308] ? trace_hardirqs_on+0x37/0xe0 [ 16.748332] ? kasan_atomics+0x152/0x310 [ 16.748359] kasan_atomics+0x1dc/0x310 [ 16.748383] ? __pfx_kasan_atomics+0x10/0x10 [ 16.748408] ? __pfx_kasan_atomics+0x10/0x10 [ 16.748447] kunit_try_run_case+0x1a5/0x480 [ 16.748472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.748497] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.748522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.748548] ? __kthread_parkme+0x82/0x180 [ 16.748580] ? preempt_count_sub+0x50/0x80 [ 16.748605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.748631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.748658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.748686] kthread+0x337/0x6f0 [ 16.748706] ? trace_preempt_on+0x20/0xc0 [ 16.748730] ? __pfx_kthread+0x10/0x10 [ 16.748751] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.748774] ? calculate_sigpending+0x7b/0xa0 [ 16.748800] ? __pfx_kthread+0x10/0x10 [ 16.748822] ret_from_fork+0x116/0x1d0 [ 16.748842] ? __pfx_kthread+0x10/0x10 [ 16.748865] ret_from_fork_asm+0x1a/0x30 [ 16.748896] </TASK> [ 16.748907] [ 16.756993] Allocated by task 282: [ 16.757164] kasan_save_stack+0x45/0x70 [ 16.757337] kasan_save_track+0x18/0x40 [ 16.757566] kasan_save_alloc_info+0x3b/0x50 [ 16.757719] __kasan_kmalloc+0xb7/0xc0 [ 16.757909] __kmalloc_cache_noprof+0x189/0x420 [ 16.758140] kasan_atomics+0x95/0x310 [ 16.758288] kunit_try_run_case+0x1a5/0x480 [ 16.758435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.758693] kthread+0x337/0x6f0 [ 16.758868] ret_from_fork+0x116/0x1d0 [ 16.759222] ret_from_fork_asm+0x1a/0x30 [ 16.759369] [ 16.759486] The buggy address belongs to the object at ffff888102a5fe80 [ 16.759486] which belongs to the cache kmalloc-64 of size 64 [ 16.760050] The buggy address is located 0 bytes to the right of [ 16.760050] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 16.760539] [ 16.760646] The buggy address belongs to the physical page: [ 16.760898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 16.761184] flags: 0x200000000000000(node=0|zone=2) [ 16.761345] page_type: f5(slab) [ 16.761491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.761845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.762126] page dumped because: kasan: bad access detected [ 16.762297] [ 16.762414] Memory state around the buggy address: [ 16.762651] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.762975] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.763255] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.763560] ^ [ 16.763716] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.763932] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764154] ================================================================== [ 17.011577] ================================================================== [ 17.011924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 17.012306] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282 [ 17.012666] [ 17.012799] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.012844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.012856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.012879] Call Trace: [ 17.012893] <TASK> [ 17.012909] dump_stack_lvl+0x73/0xb0 [ 17.012937] print_report+0xd1/0x610 [ 17.012982] ? __virt_addr_valid+0x1db/0x2d0 [ 17.013006] ? kasan_atomics_helper+0x224c/0x5450 [ 17.013028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.013054] ? kasan_atomics_helper+0x224c/0x5450 [ 17.013077] kasan_report+0x141/0x180 [ 17.013100] ? kasan_atomics_helper+0x224c/0x5450 [ 17.013145] kasan_check_range+0x10c/0x1c0 [ 17.013171] __kasan_check_write+0x18/0x20 [ 17.013192] kasan_atomics_helper+0x224c/0x5450 [ 17.013216] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.013241] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.013266] ? trace_hardirqs_on+0x37/0xe0 [ 17.013290] ? kasan_atomics+0x152/0x310 [ 17.013318] kasan_atomics+0x1dc/0x310 [ 17.013359] ? __pfx_kasan_atomics+0x10/0x10 [ 17.013384] ? __pfx_kasan_atomics+0x10/0x10 [ 17.013433] kunit_try_run_case+0x1a5/0x480 [ 17.013459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.013483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.013527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.013561] ? __kthread_parkme+0x82/0x180 [ 17.013584] ? preempt_count_sub+0x50/0x80 [ 17.013609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.013652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.013692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.013733] kthread+0x337/0x6f0 [ 17.013754] ? trace_preempt_on+0x20/0xc0 [ 17.013778] ? __pfx_kthread+0x10/0x10 [ 17.013800] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.013823] ? calculate_sigpending+0x7b/0xa0 [ 17.013849] ? __pfx_kthread+0x10/0x10 [ 17.013871] ret_from_fork+0x116/0x1d0 [ 17.013891] ? __pfx_kthread+0x10/0x10 [ 17.013913] ret_from_fork_asm+0x1a/0x30 [ 17.013944] </TASK> [ 17.013955] [ 17.024217] Allocated by task 282: [ 17.024388] kasan_save_stack+0x45/0x70 [ 17.024903] kasan_save_track+0x18/0x40 [ 17.025207] kasan_save_alloc_info+0x3b/0x50 [ 17.025567] __kasan_kmalloc+0xb7/0xc0 [ 17.025865] __kmalloc_cache_noprof+0x189/0x420 [ 17.026090] kasan_atomics+0x95/0x310 [ 17.026259] kunit_try_run_case+0x1a5/0x480 [ 17.026684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.027105] kthread+0x337/0x6f0 [ 17.027391] ret_from_fork+0x116/0x1d0 [ 17.027616] ret_from_fork_asm+0x1a/0x30 [ 17.027803] [ 17.027891] The buggy address belongs to the object at ffff888102a5fe80 [ 17.027891] which belongs to the cache kmalloc-64 of size 64 [ 17.028385] The buggy address is located 0 bytes to the right of [ 17.028385] allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0) [ 17.029496] [ 17.029617] The buggy address belongs to the physical page: [ 17.029852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f [ 17.030174] flags: 0x200000000000000(node=0|zone=2) [ 17.030374] page_type: f5(slab) [ 17.030806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.031455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.031906] page dumped because: kasan: bad access detected [ 17.032333] [ 17.032588] Memory state around the buggy address: [ 17.033046] ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.033517] ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.034006] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.034492] ^ [ 17.034720] ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.035020] ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.035312] ==================================================================