Date
July 12, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 23.133797] ================================================================== [ 23.133948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 23.134211] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.134338] [ 23.134442] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.134668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.134749] Hardware name: linux,dummy-virt (DT) [ 23.134838] Call trace: [ 23.134898] show_stack+0x20/0x38 (C) [ 23.135016] dump_stack_lvl+0x8c/0xd0 [ 23.135120] print_report+0x118/0x608 [ 23.135209] kasan_report+0xdc/0x128 [ 23.135608] kasan_check_range+0x100/0x1a8 [ 23.135726] __kasan_check_write+0x20/0x30 [ 23.135848] kasan_atomics_helper+0x12d8/0x4858 [ 23.135968] kasan_atomics+0x198/0x2e0 [ 23.136087] kunit_try_run_case+0x170/0x3f0 [ 23.136215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.136337] kthread+0x328/0x630 [ 23.136657] ret_from_fork+0x10/0x20 [ 23.136887] [ 23.136946] Allocated by task 266: [ 23.137022] kasan_save_stack+0x3c/0x68 [ 23.137389] kasan_save_track+0x20/0x40 [ 23.137501] kasan_save_alloc_info+0x40/0x58 [ 23.137814] __kasan_kmalloc+0xd4/0xd8 [ 23.137922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.138003] kasan_atomics+0xb8/0x2e0 [ 23.138080] kunit_try_run_case+0x170/0x3f0 [ 23.138168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.138547] kthread+0x328/0x630 [ 23.138891] ret_from_fork+0x10/0x20 [ 23.139183] [ 23.139232] The buggy address belongs to the object at fff00000c5958200 [ 23.139232] which belongs to the cache kmalloc-64 of size 64 [ 23.139594] The buggy address is located 0 bytes to the right of [ 23.139594] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.140180] [ 23.140306] The buggy address belongs to the physical page: [ 23.140421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.140546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.140664] page_type: f5(slab) [ 23.140794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.140983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.141100] page dumped because: kasan: bad access detected [ 23.141203] [ 23.141247] Memory state around the buggy address: [ 23.141329] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.141429] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.141524] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.141620] ^ [ 23.141705] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.141810] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.141921] ================================================================== [ 23.044157] ================================================================== [ 23.044539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 23.044750] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.045149] [ 23.045455] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.046130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.046195] Hardware name: linux,dummy-virt (DT) [ 23.046269] Call trace: [ 23.046885] show_stack+0x20/0x38 (C) [ 23.047469] dump_stack_lvl+0x8c/0xd0 [ 23.047670] print_report+0x118/0x608 [ 23.047983] kasan_report+0xdc/0x128 [ 23.048282] kasan_check_range+0x100/0x1a8 [ 23.048523] __kasan_check_write+0x20/0x30 [ 23.048953] kasan_atomics_helper+0xf20/0x4858 [ 23.049132] kasan_atomics+0x198/0x2e0 [ 23.049256] kunit_try_run_case+0x170/0x3f0 [ 23.049369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.049491] kthread+0x328/0x630 [ 23.049587] ret_from_fork+0x10/0x20 [ 23.049701] [ 23.049749] Allocated by task 266: [ 23.049815] kasan_save_stack+0x3c/0x68 [ 23.050233] kasan_save_track+0x20/0x40 [ 23.050535] kasan_save_alloc_info+0x40/0x58 [ 23.051315] __kasan_kmalloc+0xd4/0xd8 [ 23.051421] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.051596] kasan_atomics+0xb8/0x2e0 [ 23.051703] kunit_try_run_case+0x170/0x3f0 [ 23.052236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.052387] kthread+0x328/0x630 [ 23.052512] ret_from_fork+0x10/0x20 [ 23.052604] [ 23.053752] The buggy address belongs to the object at fff00000c5958200 [ 23.053752] which belongs to the cache kmalloc-64 of size 64 [ 23.054314] The buggy address is located 0 bytes to the right of [ 23.054314] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.054567] [ 23.054627] The buggy address belongs to the physical page: [ 23.054904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.055118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.055412] page_type: f5(slab) [ 23.055507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.055633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.055758] page dumped because: kasan: bad access detected [ 23.055858] [ 23.055919] Memory state around the buggy address: [ 23.056009] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.056123] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.056233] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.056325] ^ [ 23.056412] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.056524] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.056632] ================================================================== [ 23.180277] ================================================================== [ 23.180391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 23.180515] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.180631] [ 23.180695] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.180901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.180964] Hardware name: linux,dummy-virt (DT) [ 23.181038] Call trace: [ 23.181087] show_stack+0x20/0x38 (C) [ 23.181308] dump_stack_lvl+0x8c/0xd0 [ 23.181515] print_report+0x118/0x608 [ 23.181632] kasan_report+0xdc/0x128 [ 23.181721] kasan_check_range+0x100/0x1a8 [ 23.181852] __kasan_check_write+0x20/0x30 [ 23.181954] kasan_atomics_helper+0x154c/0x4858 [ 23.182076] kasan_atomics+0x198/0x2e0 [ 23.182175] kunit_try_run_case+0x170/0x3f0 [ 23.182277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.182399] kthread+0x328/0x630 [ 23.182459] ret_from_fork+0x10/0x20 [ 23.182516] [ 23.182555] Allocated by task 266: [ 23.182594] kasan_save_stack+0x3c/0x68 [ 23.182645] kasan_save_track+0x20/0x40 [ 23.182690] kasan_save_alloc_info+0x40/0x58 [ 23.182737] __kasan_kmalloc+0xd4/0xd8 [ 23.182779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.182849] kasan_atomics+0xb8/0x2e0 [ 23.182940] kunit_try_run_case+0x170/0x3f0 [ 23.183031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.183171] kthread+0x328/0x630 [ 23.183334] ret_from_fork+0x10/0x20 [ 23.183448] [ 23.183959] The buggy address belongs to the object at fff00000c5958200 [ 23.183959] which belongs to the cache kmalloc-64 of size 64 [ 23.184329] The buggy address is located 0 bytes to the right of [ 23.184329] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.184911] [ 23.185132] The buggy address belongs to the physical page: [ 23.185211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.185616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.185785] page_type: f5(slab) [ 23.186398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.186549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.186661] page dumped because: kasan: bad access detected [ 23.187689] [ 23.187976] Memory state around the buggy address: [ 23.188431] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.188926] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.189377] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.189495] ^ [ 23.189602] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.189689] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.190210] ================================================================== [ 23.024345] ================================================================== [ 23.024467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 23.024590] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.024709] [ 23.024773] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.025028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.025087] Hardware name: linux,dummy-virt (DT) [ 23.025200] Call trace: [ 23.025233] show_stack+0x20/0x38 (C) [ 23.025349] dump_stack_lvl+0x8c/0xd0 [ 23.025415] print_report+0x118/0x608 [ 23.025470] kasan_report+0xdc/0x128 [ 23.025542] __asan_report_store8_noabort+0x20/0x30 [ 23.025685] kasan_atomics_helper+0x3e5c/0x4858 [ 23.025972] kasan_atomics+0x198/0x2e0 [ 23.026238] kunit_try_run_case+0x170/0x3f0 [ 23.026343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.026451] kthread+0x328/0x630 [ 23.026536] ret_from_fork+0x10/0x20 [ 23.026624] [ 23.026668] Allocated by task 266: [ 23.026734] kasan_save_stack+0x3c/0x68 [ 23.027211] kasan_save_track+0x20/0x40 [ 23.027347] kasan_save_alloc_info+0x40/0x58 [ 23.027998] __kasan_kmalloc+0xd4/0xd8 [ 23.028365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.028516] kasan_atomics+0xb8/0x2e0 [ 23.028609] kunit_try_run_case+0x170/0x3f0 [ 23.028938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.029221] kthread+0x328/0x630 [ 23.029312] ret_from_fork+0x10/0x20 [ 23.029455] [ 23.029515] The buggy address belongs to the object at fff00000c5958200 [ 23.029515] which belongs to the cache kmalloc-64 of size 64 [ 23.029874] The buggy address is located 0 bytes to the right of [ 23.029874] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.030273] [ 23.030413] The buggy address belongs to the physical page: [ 23.030765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.030926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.031035] page_type: f5(slab) [ 23.031102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.031205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.031292] page dumped because: kasan: bad access detected [ 23.031361] [ 23.031404] Memory state around the buggy address: [ 23.031482] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.031592] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.031906] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.032519] ^ [ 23.032643] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.032762] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.033280] ================================================================== [ 23.226832] ================================================================== [ 23.226933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 23.227036] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.227145] [ 23.227743] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.228196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.228278] Hardware name: linux,dummy-virt (DT) [ 23.228428] Call trace: [ 23.228497] show_stack+0x20/0x38 (C) [ 23.228887] dump_stack_lvl+0x8c/0xd0 [ 23.229001] print_report+0x118/0x608 [ 23.229104] kasan_report+0xdc/0x128 [ 23.229756] __asan_report_load8_noabort+0x20/0x30 [ 23.229920] kasan_atomics_helper+0x3df4/0x4858 [ 23.230079] kasan_atomics+0x198/0x2e0 [ 23.230173] kunit_try_run_case+0x170/0x3f0 [ 23.230281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.230388] kthread+0x328/0x630 [ 23.230518] ret_from_fork+0x10/0x20 [ 23.230642] [ 23.230687] Allocated by task 266: [ 23.230764] kasan_save_stack+0x3c/0x68 [ 23.230879] kasan_save_track+0x20/0x40 [ 23.231007] kasan_save_alloc_info+0x40/0x58 [ 23.231107] __kasan_kmalloc+0xd4/0xd8 [ 23.231196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.231333] kasan_atomics+0xb8/0x2e0 [ 23.231417] kunit_try_run_case+0x170/0x3f0 [ 23.231510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.231610] kthread+0x328/0x630 [ 23.231687] ret_from_fork+0x10/0x20 [ 23.231775] [ 23.231833] The buggy address belongs to the object at fff00000c5958200 [ 23.231833] which belongs to the cache kmalloc-64 of size 64 [ 23.231971] The buggy address is located 0 bytes to the right of [ 23.231971] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.232135] [ 23.232205] The buggy address belongs to the physical page: [ 23.232311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.232437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.232552] page_type: f5(slab) [ 23.232665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.232795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.232902] page dumped because: kasan: bad access detected [ 23.233006] [ 23.233055] Memory state around the buggy address: [ 23.233190] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.233311] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.233414] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.233548] ^ [ 23.233635] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.233733] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.233847] ================================================================== [ 23.246239] ================================================================== [ 23.246349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 23.246447] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.246594] [ 23.246664] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.247320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.247509] Hardware name: linux,dummy-virt (DT) [ 23.247599] Call trace: [ 23.247991] show_stack+0x20/0x38 (C) [ 23.248999] dump_stack_lvl+0x8c/0xd0 [ 23.249269] print_report+0x118/0x608 [ 23.249410] kasan_report+0xdc/0x128 [ 23.249518] __asan_report_load8_noabort+0x20/0x30 [ 23.249626] kasan_atomics_helper+0x3e10/0x4858 [ 23.249716] kasan_atomics+0x198/0x2e0 [ 23.249805] kunit_try_run_case+0x170/0x3f0 [ 23.249922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.250977] kthread+0x328/0x630 [ 23.251206] ret_from_fork+0x10/0x20 [ 23.251317] [ 23.251361] Allocated by task 266: [ 23.251426] kasan_save_stack+0x3c/0x68 [ 23.251525] kasan_save_track+0x20/0x40 [ 23.251611] kasan_save_alloc_info+0x40/0x58 [ 23.252350] __kasan_kmalloc+0xd4/0xd8 [ 23.252577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.252685] kasan_atomics+0xb8/0x2e0 [ 23.252784] kunit_try_run_case+0x170/0x3f0 [ 23.253314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.253601] kthread+0x328/0x630 [ 23.254024] ret_from_fork+0x10/0x20 [ 23.254405] [ 23.254461] The buggy address belongs to the object at fff00000c5958200 [ 23.254461] which belongs to the cache kmalloc-64 of size 64 [ 23.255001] The buggy address is located 0 bytes to the right of [ 23.255001] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.255355] [ 23.255617] The buggy address belongs to the physical page: [ 23.255867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.255971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.256459] page_type: f5(slab) [ 23.256838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.256969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.257064] page dumped because: kasan: bad access detected [ 23.257655] [ 23.257906] Memory state around the buggy address: [ 23.258002] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.258095] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.258180] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.258262] ^ [ 23.258330] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.258429] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.259142] ================================================================== [ 23.017167] ================================================================== [ 23.017326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 23.017444] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.017554] [ 23.017625] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.017948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.018049] Hardware name: linux,dummy-virt (DT) [ 23.018163] Call trace: [ 23.018242] show_stack+0x20/0x38 (C) [ 23.018413] dump_stack_lvl+0x8c/0xd0 [ 23.018533] print_report+0x118/0x608 [ 23.018673] kasan_report+0xdc/0x128 [ 23.018842] kasan_check_range+0x100/0x1a8 [ 23.018935] __kasan_check_write+0x20/0x30 [ 23.019032] kasan_atomics_helper+0xe44/0x4858 [ 23.019194] kasan_atomics+0x198/0x2e0 [ 23.019290] kunit_try_run_case+0x170/0x3f0 [ 23.019385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.019495] kthread+0x328/0x630 [ 23.019598] ret_from_fork+0x10/0x20 [ 23.019692] [ 23.019763] Allocated by task 266: [ 23.019856] kasan_save_stack+0x3c/0x68 [ 23.019958] kasan_save_track+0x20/0x40 [ 23.020091] kasan_save_alloc_info+0x40/0x58 [ 23.020322] __kasan_kmalloc+0xd4/0xd8 [ 23.020985] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.021232] kasan_atomics+0xb8/0x2e0 [ 23.021353] kunit_try_run_case+0x170/0x3f0 [ 23.021448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.021571] kthread+0x328/0x630 [ 23.021690] ret_from_fork+0x10/0x20 [ 23.021771] [ 23.021815] The buggy address belongs to the object at fff00000c5958200 [ 23.021815] which belongs to the cache kmalloc-64 of size 64 [ 23.021955] The buggy address is located 0 bytes to the right of [ 23.021955] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.022105] [ 23.022177] The buggy address belongs to the physical page: [ 23.022252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.022467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.022584] page_type: f5(slab) [ 23.022708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.022874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.022960] page dumped because: kasan: bad access detected [ 23.023039] [ 23.023089] Memory state around the buggy address: [ 23.023206] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.023358] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.023512] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.023646] ^ [ 23.023724] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.023835] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.023927] ================================================================== [ 22.993364] ================================================================== [ 22.993474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 22.993634] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.993746] [ 22.993853] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.994073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.994173] Hardware name: linux,dummy-virt (DT) [ 22.994239] Call trace: [ 22.994289] show_stack+0x20/0x38 (C) [ 22.994461] dump_stack_lvl+0x8c/0xd0 [ 22.994579] print_report+0x118/0x608 [ 22.994737] kasan_report+0xdc/0x128 [ 22.994851] kasan_check_range+0x100/0x1a8 [ 22.994947] __kasan_check_read+0x20/0x30 [ 22.995086] kasan_atomics_helper+0xdd4/0x4858 [ 22.995194] kasan_atomics+0x198/0x2e0 [ 22.995291] kunit_try_run_case+0x170/0x3f0 [ 22.995379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.995477] kthread+0x328/0x630 [ 22.995569] ret_from_fork+0x10/0x20 [ 22.995685] [ 22.995752] Allocated by task 266: [ 22.995859] kasan_save_stack+0x3c/0x68 [ 22.995989] kasan_save_track+0x20/0x40 [ 22.996109] kasan_save_alloc_info+0x40/0x58 [ 22.996233] __kasan_kmalloc+0xd4/0xd8 [ 22.996327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.996418] kasan_atomics+0xb8/0x2e0 [ 22.996534] kunit_try_run_case+0x170/0x3f0 [ 22.996622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.996740] kthread+0x328/0x630 [ 22.996817] ret_from_fork+0x10/0x20 [ 22.997538] [ 22.997634] The buggy address belongs to the object at fff00000c5958200 [ 22.997634] which belongs to the cache kmalloc-64 of size 64 [ 22.998474] The buggy address is located 0 bytes to the right of [ 22.998474] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.998665] [ 22.998715] The buggy address belongs to the physical page: [ 22.999298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.999755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.999896] page_type: f5(slab) [ 22.999980] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.000078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.000153] page dumped because: kasan: bad access detected [ 23.000219] [ 23.000262] Memory state around the buggy address: [ 23.000319] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.000402] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.000496] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.000578] ^ [ 23.000649] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.000742] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.000846] ================================================================== [ 23.066923] ================================================================== [ 23.067035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 23.067162] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.067290] [ 23.067726] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.068195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.068303] Hardware name: linux,dummy-virt (DT) [ 23.068408] Call trace: [ 23.068483] show_stack+0x20/0x38 (C) [ 23.068596] dump_stack_lvl+0x8c/0xd0 [ 23.068724] print_report+0x118/0x608 [ 23.068934] kasan_report+0xdc/0x128 [ 23.069085] kasan_check_range+0x100/0x1a8 [ 23.069380] __kasan_check_write+0x20/0x30 [ 23.069527] kasan_atomics_helper+0xff0/0x4858 [ 23.069746] kasan_atomics+0x198/0x2e0 [ 23.070018] kunit_try_run_case+0x170/0x3f0 [ 23.070195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.070381] kthread+0x328/0x630 [ 23.070498] ret_from_fork+0x10/0x20 [ 23.070629] [ 23.070674] Allocated by task 266: [ 23.070932] kasan_save_stack+0x3c/0x68 [ 23.071112] kasan_save_track+0x20/0x40 [ 23.071387] kasan_save_alloc_info+0x40/0x58 [ 23.071838] __kasan_kmalloc+0xd4/0xd8 [ 23.072210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.072320] kasan_atomics+0xb8/0x2e0 [ 23.072419] kunit_try_run_case+0x170/0x3f0 [ 23.072523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.072639] kthread+0x328/0x630 [ 23.073363] ret_from_fork+0x10/0x20 [ 23.073805] [ 23.073987] The buggy address belongs to the object at fff00000c5958200 [ 23.073987] which belongs to the cache kmalloc-64 of size 64 [ 23.074914] The buggy address is located 0 bytes to the right of [ 23.074914] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.075123] [ 23.075181] The buggy address belongs to the physical page: [ 23.075263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.075387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.075507] page_type: f5(slab) [ 23.075608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.075755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.075876] page dumped because: kasan: bad access detected [ 23.075967] [ 23.076044] Memory state around the buggy address: [ 23.076166] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.076328] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.076488] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.076593] ^ [ 23.076678] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.076789] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.076899] ================================================================== [ 23.148856] ================================================================== [ 23.148999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 23.149121] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.149262] [ 23.149327] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.149519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.149586] Hardware name: linux,dummy-virt (DT) [ 23.149692] Call trace: [ 23.149757] show_stack+0x20/0x38 (C) [ 23.149892] dump_stack_lvl+0x8c/0xd0 [ 23.150041] print_report+0x118/0x608 [ 23.150215] kasan_report+0xdc/0x128 [ 23.150371] __asan_report_load8_noabort+0x20/0x30 [ 23.150571] kasan_atomics_helper+0x3f04/0x4858 [ 23.150690] kasan_atomics+0x198/0x2e0 [ 23.150783] kunit_try_run_case+0x170/0x3f0 [ 23.150927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.151055] kthread+0x328/0x630 [ 23.151195] ret_from_fork+0x10/0x20 [ 23.151367] [ 23.151420] Allocated by task 266: [ 23.151520] kasan_save_stack+0x3c/0x68 [ 23.151663] kasan_save_track+0x20/0x40 [ 23.151756] kasan_save_alloc_info+0x40/0x58 [ 23.151857] __kasan_kmalloc+0xd4/0xd8 [ 23.151933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.152018] kasan_atomics+0xb8/0x2e0 [ 23.152104] kunit_try_run_case+0x170/0x3f0 [ 23.152196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.152369] kthread+0x328/0x630 [ 23.152492] ret_from_fork+0x10/0x20 [ 23.152568] [ 23.152616] The buggy address belongs to the object at fff00000c5958200 [ 23.152616] which belongs to the cache kmalloc-64 of size 64 [ 23.152770] The buggy address is located 0 bytes to the right of [ 23.152770] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.152960] [ 23.153037] The buggy address belongs to the physical page: [ 23.153156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.153320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.153428] page_type: f5(slab) [ 23.153517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.153685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.153800] page dumped because: kasan: bad access detected [ 23.153889] [ 23.153935] Memory state around the buggy address: [ 23.154016] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.154125] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.154268] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.154416] ^ [ 23.154548] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.154713] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.154860] ================================================================== [ 23.275090] ================================================================== [ 23.275214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 23.275338] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.277171] [ 23.277307] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.277662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.277875] Hardware name: linux,dummy-virt (DT) [ 23.277965] Call trace: [ 23.278025] show_stack+0x20/0x38 (C) [ 23.278135] dump_stack_lvl+0x8c/0xd0 [ 23.278238] print_report+0x118/0x608 [ 23.278344] kasan_report+0xdc/0x128 [ 23.278448] __asan_report_load8_noabort+0x20/0x30 [ 23.279236] kasan_atomics_helper+0x3e20/0x4858 [ 23.279386] kasan_atomics+0x198/0x2e0 [ 23.279503] kunit_try_run_case+0x170/0x3f0 [ 23.280580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.281126] kthread+0x328/0x630 [ 23.281382] ret_from_fork+0x10/0x20 [ 23.281522] [ 23.281579] Allocated by task 266: [ 23.281701] kasan_save_stack+0x3c/0x68 [ 23.281807] kasan_save_track+0x20/0x40 [ 23.281932] kasan_save_alloc_info+0x40/0x58 [ 23.282055] __kasan_kmalloc+0xd4/0xd8 [ 23.282159] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.282247] kasan_atomics+0xb8/0x2e0 [ 23.282319] kunit_try_run_case+0x170/0x3f0 [ 23.282621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.282744] kthread+0x328/0x630 [ 23.283122] ret_from_fork+0x10/0x20 [ 23.283232] [ 23.283435] The buggy address belongs to the object at fff00000c5958200 [ 23.283435] which belongs to the cache kmalloc-64 of size 64 [ 23.283580] The buggy address is located 0 bytes to the right of [ 23.283580] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.284345] [ 23.284402] The buggy address belongs to the physical page: [ 23.284670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.285186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.285350] page_type: f5(slab) [ 23.285460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.285621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.285803] page dumped because: kasan: bad access detected [ 23.286035] [ 23.286074] Memory state around the buggy address: [ 23.286170] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.286275] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.286410] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.286514] ^ [ 23.286864] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.287014] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.287163] ================================================================== [ 23.090386] ================================================================== [ 23.090447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 23.090513] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.090583] [ 23.090617] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.090711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.090744] Hardware name: linux,dummy-virt (DT) [ 23.090782] Call trace: [ 23.090811] show_stack+0x20/0x38 (C) [ 23.090933] dump_stack_lvl+0x8c/0xd0 [ 23.091042] print_report+0x118/0x608 [ 23.091137] kasan_report+0xdc/0x128 [ 23.091242] kasan_check_range+0x100/0x1a8 [ 23.091352] __kasan_check_write+0x20/0x30 [ 23.091770] kasan_atomics_helper+0x10c0/0x4858 [ 23.092103] kasan_atomics+0x198/0x2e0 [ 23.092392] kunit_try_run_case+0x170/0x3f0 [ 23.092517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.092647] kthread+0x328/0x630 [ 23.092891] ret_from_fork+0x10/0x20 [ 23.093013] [ 23.093062] Allocated by task 266: [ 23.093299] kasan_save_stack+0x3c/0x68 [ 23.093733] kasan_save_track+0x20/0x40 [ 23.093874] kasan_save_alloc_info+0x40/0x58 [ 23.093986] __kasan_kmalloc+0xd4/0xd8 [ 23.094283] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.094468] kasan_atomics+0xb8/0x2e0 [ 23.094671] kunit_try_run_case+0x170/0x3f0 [ 23.094773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.095365] kthread+0x328/0x630 [ 23.095730] ret_from_fork+0x10/0x20 [ 23.095908] [ 23.095981] The buggy address belongs to the object at fff00000c5958200 [ 23.095981] which belongs to the cache kmalloc-64 of size 64 [ 23.096137] The buggy address is located 0 bytes to the right of [ 23.096137] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.096291] [ 23.096701] The buggy address belongs to the physical page: [ 23.096920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.097204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.097365] page_type: f5(slab) [ 23.097470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.097608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.097729] page dumped because: kasan: bad access detected [ 23.098031] [ 23.098081] Memory state around the buggy address: [ 23.098151] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.098275] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.098575] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.098890] ^ [ 23.099168] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.099357] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.099455] ================================================================== [ 23.259750] ================================================================== [ 23.259867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 23.260844] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.262707] [ 23.262839] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.263050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.263118] Hardware name: linux,dummy-virt (DT) [ 23.263178] Call trace: [ 23.263260] show_stack+0x20/0x38 (C) [ 23.263390] dump_stack_lvl+0x8c/0xd0 [ 23.264085] print_report+0x118/0x608 [ 23.264627] kasan_report+0xdc/0x128 [ 23.264768] kasan_check_range+0x100/0x1a8 [ 23.265163] __kasan_check_write+0x20/0x30 [ 23.265551] kasan_atomics_helper+0x175c/0x4858 [ 23.266455] kasan_atomics+0x198/0x2e0 [ 23.266611] kunit_try_run_case+0x170/0x3f0 [ 23.266722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.266856] kthread+0x328/0x630 [ 23.266946] ret_from_fork+0x10/0x20 [ 23.267056] [ 23.267104] Allocated by task 266: [ 23.267165] kasan_save_stack+0x3c/0x68 [ 23.267253] kasan_save_track+0x20/0x40 [ 23.267335] kasan_save_alloc_info+0x40/0x58 [ 23.267417] __kasan_kmalloc+0xd4/0xd8 [ 23.267494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.267584] kasan_atomics+0xb8/0x2e0 [ 23.267667] kunit_try_run_case+0x170/0x3f0 [ 23.267748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.267874] kthread+0x328/0x630 [ 23.267963] ret_from_fork+0x10/0x20 [ 23.268057] [ 23.268109] The buggy address belongs to the object at fff00000c5958200 [ 23.268109] which belongs to the cache kmalloc-64 of size 64 [ 23.268254] The buggy address is located 0 bytes to the right of [ 23.268254] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.268395] [ 23.268437] The buggy address belongs to the physical page: [ 23.268501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.268596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.268699] page_type: f5(slab) [ 23.268816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.272991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.273097] page dumped because: kasan: bad access detected [ 23.273185] [ 23.273225] Memory state around the buggy address: [ 23.273305] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.273406] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.273499] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.273589] ^ [ 23.273703] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.273795] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.273943] ================================================================== [ 23.203349] ================================================================== [ 23.203459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 23.203728] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.203983] [ 23.204116] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.204630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.204785] Hardware name: linux,dummy-virt (DT) [ 23.204923] Call trace: [ 23.205038] show_stack+0x20/0x38 (C) [ 23.205325] dump_stack_lvl+0x8c/0xd0 [ 23.205424] print_report+0x118/0x608 [ 23.205520] kasan_report+0xdc/0x128 [ 23.205622] __asan_report_load8_noabort+0x20/0x30 [ 23.206624] kasan_atomics_helper+0x3db0/0x4858 [ 23.206959] kasan_atomics+0x198/0x2e0 [ 23.207196] kunit_try_run_case+0x170/0x3f0 [ 23.207433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.207558] kthread+0x328/0x630 [ 23.207937] ret_from_fork+0x10/0x20 [ 23.208102] [ 23.208148] Allocated by task 266: [ 23.208212] kasan_save_stack+0x3c/0x68 [ 23.208308] kasan_save_track+0x20/0x40 [ 23.208394] kasan_save_alloc_info+0x40/0x58 [ 23.208710] __kasan_kmalloc+0xd4/0xd8 [ 23.208937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.209157] kasan_atomics+0xb8/0x2e0 [ 23.209245] kunit_try_run_case+0x170/0x3f0 [ 23.209336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.209643] kthread+0x328/0x630 [ 23.209736] ret_from_fork+0x10/0x20 [ 23.209872] [ 23.209917] The buggy address belongs to the object at fff00000c5958200 [ 23.209917] which belongs to the cache kmalloc-64 of size 64 [ 23.210064] The buggy address is located 0 bytes to the right of [ 23.210064] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.210222] [ 23.210278] The buggy address belongs to the physical page: [ 23.210354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.210475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.210600] page_type: f5(slab) [ 23.210701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.210872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.211039] page dumped because: kasan: bad access detected [ 23.211158] [ 23.211223] Memory state around the buggy address: [ 23.211336] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.211469] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.211592] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.211742] ^ [ 23.211889] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.211997] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.212564] ================================================================== [ 23.287754] ================================================================== [ 23.288199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 23.288331] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.288510] [ 23.288605] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.288875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.288936] Hardware name: linux,dummy-virt (DT) [ 23.289015] Call trace: [ 23.289092] show_stack+0x20/0x38 (C) [ 23.289260] dump_stack_lvl+0x8c/0xd0 [ 23.289368] print_report+0x118/0x608 [ 23.289865] kasan_report+0xdc/0x128 [ 23.290111] kasan_check_range+0x100/0x1a8 [ 23.290244] __kasan_check_write+0x20/0x30 [ 23.290374] kasan_atomics_helper+0x17ec/0x4858 [ 23.290496] kasan_atomics+0x198/0x2e0 [ 23.290609] kunit_try_run_case+0x170/0x3f0 [ 23.290705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.290840] kthread+0x328/0x630 [ 23.290947] ret_from_fork+0x10/0x20 [ 23.291515] [ 23.291935] Allocated by task 266: [ 23.292040] kasan_save_stack+0x3c/0x68 [ 23.292355] kasan_save_track+0x20/0x40 [ 23.292559] kasan_save_alloc_info+0x40/0x58 [ 23.292657] __kasan_kmalloc+0xd4/0xd8 [ 23.293099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.293230] kasan_atomics+0xb8/0x2e0 [ 23.293760] kunit_try_run_case+0x170/0x3f0 [ 23.293906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.294489] kthread+0x328/0x630 [ 23.294991] ret_from_fork+0x10/0x20 [ 23.295108] [ 23.295255] The buggy address belongs to the object at fff00000c5958200 [ 23.295255] which belongs to the cache kmalloc-64 of size 64 [ 23.295515] The buggy address is located 0 bytes to the right of [ 23.295515] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.296076] [ 23.296234] The buggy address belongs to the physical page: [ 23.296323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.296466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.296597] page_type: f5(slab) [ 23.297213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.297431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.297633] page dumped because: kasan: bad access detected [ 23.297710] [ 23.297762] Memory state around the buggy address: [ 23.298031] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.298202] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.298437] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.298660] ^ [ 23.298852] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.298974] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.299634] ================================================================== [ 23.059040] ================================================================== [ 23.059157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 23.059261] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.059391] [ 23.059464] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.059949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.060015] Hardware name: linux,dummy-virt (DT) [ 23.060092] Call trace: [ 23.060145] show_stack+0x20/0x38 (C) [ 23.060279] dump_stack_lvl+0x8c/0xd0 [ 23.060493] print_report+0x118/0x608 [ 23.060630] kasan_report+0xdc/0x128 [ 23.060746] kasan_check_range+0x100/0x1a8 [ 23.060881] __kasan_check_write+0x20/0x30 [ 23.061000] kasan_atomics_helper+0xf88/0x4858 [ 23.061112] kasan_atomics+0x198/0x2e0 [ 23.061257] kunit_try_run_case+0x170/0x3f0 [ 23.061419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.061548] kthread+0x328/0x630 [ 23.061638] ret_from_fork+0x10/0x20 [ 23.061757] [ 23.061808] Allocated by task 266: [ 23.061952] kasan_save_stack+0x3c/0x68 [ 23.062069] kasan_save_track+0x20/0x40 [ 23.062310] kasan_save_alloc_info+0x40/0x58 [ 23.062418] __kasan_kmalloc+0xd4/0xd8 [ 23.062560] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.062715] kasan_atomics+0xb8/0x2e0 [ 23.062809] kunit_try_run_case+0x170/0x3f0 [ 23.062927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.063270] kthread+0x328/0x630 [ 23.063553] ret_from_fork+0x10/0x20 [ 23.063651] [ 23.063702] The buggy address belongs to the object at fff00000c5958200 [ 23.063702] which belongs to the cache kmalloc-64 of size 64 [ 23.063863] The buggy address is located 0 bytes to the right of [ 23.063863] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.064008] [ 23.064277] The buggy address belongs to the physical page: [ 23.064752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.065066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.065231] page_type: f5(slab) [ 23.065287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.065393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.065500] page dumped because: kasan: bad access detected [ 23.065570] [ 23.065614] Memory state around the buggy address: [ 23.065691] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.065804] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.065978] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.066118] ^ [ 23.066244] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.066391] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.066494] ================================================================== [ 23.162173] ================================================================== [ 23.162261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 23.162374] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.162486] [ 23.162561] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.162746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.162814] Hardware name: linux,dummy-virt (DT) [ 23.162914] Call trace: [ 23.162965] show_stack+0x20/0x38 (C) [ 23.163076] dump_stack_lvl+0x8c/0xd0 [ 23.163180] print_report+0x118/0x608 [ 23.163292] kasan_report+0xdc/0x128 [ 23.163395] kasan_check_range+0x100/0x1a8 [ 23.163514] __kasan_check_write+0x20/0x30 [ 23.163612] kasan_atomics_helper+0x147c/0x4858 [ 23.163769] kasan_atomics+0x198/0x2e0 [ 23.164007] kunit_try_run_case+0x170/0x3f0 [ 23.164131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.164247] kthread+0x328/0x630 [ 23.164345] ret_from_fork+0x10/0x20 [ 23.164438] [ 23.164480] Allocated by task 266: [ 23.164550] kasan_save_stack+0x3c/0x68 [ 23.164677] kasan_save_track+0x20/0x40 [ 23.164770] kasan_save_alloc_info+0x40/0x58 [ 23.164892] __kasan_kmalloc+0xd4/0xd8 [ 23.164996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.165086] kasan_atomics+0xb8/0x2e0 [ 23.165341] kunit_try_run_case+0x170/0x3f0 [ 23.165443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.165549] kthread+0x328/0x630 [ 23.165631] ret_from_fork+0x10/0x20 [ 23.165718] [ 23.165766] The buggy address belongs to the object at fff00000c5958200 [ 23.165766] which belongs to the cache kmalloc-64 of size 64 [ 23.166320] The buggy address is located 0 bytes to the right of [ 23.166320] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.167108] [ 23.167181] The buggy address belongs to the physical page: [ 23.167257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.167629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.168191] page_type: f5(slab) [ 23.168295] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.168431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.168544] page dumped because: kasan: bad access detected [ 23.168631] [ 23.168806] Memory state around the buggy address: [ 23.168917] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.169946] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.170270] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.170362] ^ [ 23.170433] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.170537] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.170638] ================================================================== [ 22.830038] ================================================================== [ 22.830168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 22.830288] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.830398] [ 22.830458] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.830726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.830849] Hardware name: linux,dummy-virt (DT) [ 22.830971] Call trace: [ 22.831065] show_stack+0x20/0x38 (C) [ 22.831189] dump_stack_lvl+0x8c/0xd0 [ 22.831356] print_report+0x118/0x608 [ 22.831478] kasan_report+0xdc/0x128 [ 22.831598] kasan_check_range+0x100/0x1a8 [ 22.831730] __kasan_check_write+0x20/0x30 [ 22.831863] kasan_atomics_helper+0xa6c/0x4858 [ 22.831984] kasan_atomics+0x198/0x2e0 [ 22.832129] kunit_try_run_case+0x170/0x3f0 [ 22.832250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.832402] kthread+0x328/0x630 [ 22.832515] ret_from_fork+0x10/0x20 [ 22.832645] [ 22.832704] Allocated by task 266: [ 22.832803] kasan_save_stack+0x3c/0x68 [ 22.832924] kasan_save_track+0x20/0x40 [ 22.833021] kasan_save_alloc_info+0x40/0x58 [ 22.833231] __kasan_kmalloc+0xd4/0xd8 [ 22.833331] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.833521] kasan_atomics+0xb8/0x2e0 [ 22.833735] kunit_try_run_case+0x170/0x3f0 [ 22.834106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.834241] kthread+0x328/0x630 [ 22.834343] ret_from_fork+0x10/0x20 [ 22.834447] [ 22.834638] The buggy address belongs to the object at fff00000c5958200 [ 22.834638] which belongs to the cache kmalloc-64 of size 64 [ 22.835316] The buggy address is located 0 bytes to the right of [ 22.835316] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.835501] [ 22.835566] The buggy address belongs to the physical page: [ 22.835742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.835921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.836043] page_type: f5(slab) [ 22.836144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.836283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.836393] page dumped because: kasan: bad access detected [ 22.837262] [ 22.837680] Memory state around the buggy address: [ 22.838114] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.838752] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.839291] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.839933] ^ [ 22.840372] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.840966] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.843051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.848962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.850640] __kasan_kmalloc+0xd4/0xd8 [ 22.850741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.850865] kasan_atomics+0xb8/0x2e0 [ 22.850969] kunit_try_run_case+0x170/0x3f0 [ 22.851073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.852642] kthread+0x328/0x630 [ 22.854270] ret_from_fork+0x10/0x20 [ 22.854584] [ 22.854643] The buggy address belongs to the object at fff00000c5958200 [ 22.854643] which belongs to the cache kmalloc-64 of size 64 [ 22.855449] The buggy address is located 0 bytes to the right of [ 22.855449] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.857033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.858383] [ 22.860044] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.863262] [ 22.864526] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.869941] kasan_atomics+0x198/0x2e0 [ 22.875502] kasan_atomics+0xb8/0x2e0 [ 22.875611] kunit_try_run_case+0x170/0x3f0 [ 22.875714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.875842] kthread+0x328/0x630 [ 22.875937] ret_from_fork+0x10/0x20 [ 22.876019] [ 22.876066] The buggy address belongs to the object at fff00000c5958200 [ 22.876066] which belongs to the cache kmalloc-64 of size 64 [ 22.876659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.880018] [ 22.881506] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.882682] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.892733] __kasan_check_write+0x20/0x30 [ 22.898415] kasan_atomics+0xb8/0x2e0 [ 22.900868] kthread+0x328/0x630 [ 22.904133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.908662] ^ [ 22.917321] kasan_report+0xdc/0x128 [ 22.924399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.928107] page_type: f5(slab) [ 22.930774] [ 22.933611] ================================================================== [ 22.986865] ================================================================== [ 22.986975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 22.987159] Read of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.987284] [ 22.987356] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.987565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.987640] Hardware name: linux,dummy-virt (DT) [ 22.987723] Call trace: [ 22.987779] show_stack+0x20/0x38 (C) [ 22.987925] dump_stack_lvl+0x8c/0xd0 [ 22.988030] print_report+0x118/0x608 [ 22.988151] kasan_report+0xdc/0x128 [ 22.988250] __asan_report_load4_noabort+0x20/0x30 [ 22.988439] kasan_atomics_helper+0x3e04/0x4858 [ 22.988548] kasan_atomics+0x198/0x2e0 [ 22.988654] kunit_try_run_case+0x170/0x3f0 [ 22.988806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.989015] kthread+0x328/0x630 [ 22.989208] ret_from_fork+0x10/0x20 [ 22.989379] [ 22.989420] Allocated by task 266: [ 22.989485] kasan_save_stack+0x3c/0x68 [ 22.989658] kasan_save_track+0x20/0x40 [ 22.989793] kasan_save_alloc_info+0x40/0x58 [ 22.989955] __kasan_kmalloc+0xd4/0xd8 [ 22.990076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.990171] kasan_atomics+0xb8/0x2e0 [ 22.990264] kunit_try_run_case+0x170/0x3f0 [ 22.990381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.990467] kthread+0x328/0x630 [ 22.990532] ret_from_fork+0x10/0x20 [ 22.990618] [ 22.990665] The buggy address belongs to the object at fff00000c5958200 [ 22.990665] which belongs to the cache kmalloc-64 of size 64 [ 22.990806] The buggy address is located 0 bytes to the right of [ 22.990806] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.991004] [ 22.991055] The buggy address belongs to the physical page: [ 22.991171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.991299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.991415] page_type: f5(slab) [ 22.991532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.991660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.991753] page dumped because: kasan: bad access detected [ 22.991846] [ 22.991892] Memory state around the buggy address: [ 22.991965] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.992079] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.992177] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.992306] ^ [ 22.992380] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.992510] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.992630] ================================================================== [ 22.782312] ================================================================== [ 22.782430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 22.782567] Read of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.782702] [ 22.782783] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.783005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.783083] Hardware name: linux,dummy-virt (DT) [ 22.783167] Call trace: [ 22.783228] show_stack+0x20/0x38 (C) [ 22.783355] dump_stack_lvl+0x8c/0xd0 [ 22.783479] print_report+0x118/0x608 [ 22.783602] kasan_report+0xdc/0x128 [ 22.783718] __asan_report_load4_noabort+0x20/0x30 [ 22.785898] kasan_atomics_helper+0x42d8/0x4858 [ 22.786743] kasan_atomics+0x198/0x2e0 [ 22.787398] kunit_try_run_case+0x170/0x3f0 [ 22.787671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.788057] kthread+0x328/0x630 [ 22.788702] ret_from_fork+0x10/0x20 [ 22.789281] [ 22.789395] Allocated by task 266: [ 22.789464] kasan_save_stack+0x3c/0x68 [ 22.789562] kasan_save_track+0x20/0x40 [ 22.789639] kasan_save_alloc_info+0x40/0x58 [ 22.789730] __kasan_kmalloc+0xd4/0xd8 [ 22.789830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.790755] kasan_atomics+0xb8/0x2e0 [ 22.791212] kunit_try_run_case+0x170/0x3f0 [ 22.791585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.792048] kthread+0x328/0x630 [ 22.792186] ret_from_fork+0x10/0x20 [ 22.792503] [ 22.792861] The buggy address belongs to the object at fff00000c5958200 [ 22.792861] which belongs to the cache kmalloc-64 of size 64 [ 22.793099] The buggy address is located 0 bytes to the right of [ 22.793099] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.793412] [ 22.793575] The buggy address belongs to the physical page: [ 22.794088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.794457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.794785] page_type: f5(slab) [ 22.794937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.795165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.795639] page dumped because: kasan: bad access detected [ 22.795807] [ 22.795870] Memory state around the buggy address: [ 22.795955] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.796065] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.796169] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.796271] ^ [ 22.796361] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.797621] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.797741] ================================================================== [ 23.119128] ================================================================== [ 23.119232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 23.119376] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.119496] [ 23.119556] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.119718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.119778] Hardware name: linux,dummy-virt (DT) [ 23.122615] Call trace: [ 23.122697] show_stack+0x20/0x38 (C) [ 23.122854] dump_stack_lvl+0x8c/0xd0 [ 23.122964] print_report+0x118/0x608 [ 23.123069] kasan_report+0xdc/0x128 [ 23.123169] kasan_check_range+0x100/0x1a8 [ 23.123274] __kasan_check_write+0x20/0x30 [ 23.123381] kasan_atomics_helper+0x126c/0x4858 [ 23.123498] kasan_atomics+0x198/0x2e0 [ 23.123612] kunit_try_run_case+0x170/0x3f0 [ 23.123713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.123843] kthread+0x328/0x630 [ 23.123929] ret_from_fork+0x10/0x20 [ 23.124029] [ 23.124072] Allocated by task 266: [ 23.124134] kasan_save_stack+0x3c/0x68 [ 23.124229] kasan_save_track+0x20/0x40 [ 23.124315] kasan_save_alloc_info+0x40/0x58 [ 23.124752] __kasan_kmalloc+0xd4/0xd8 [ 23.124952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.125514] kasan_atomics+0xb8/0x2e0 [ 23.125867] kunit_try_run_case+0x170/0x3f0 [ 23.126856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.127038] kthread+0x328/0x630 [ 23.127132] ret_from_fork+0x10/0x20 [ 23.127295] [ 23.127356] The buggy address belongs to the object at fff00000c5958200 [ 23.127356] which belongs to the cache kmalloc-64 of size 64 [ 23.127546] The buggy address is located 0 bytes to the right of [ 23.127546] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.127970] [ 23.128036] The buggy address belongs to the physical page: [ 23.128128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.128503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.129152] page_type: f5(slab) [ 23.129267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.129401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.129507] page dumped because: kasan: bad access detected [ 23.129811] [ 23.129881] Memory state around the buggy address: [ 23.130145] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.130836] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.130978] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.131079] ^ [ 23.131156] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.132141] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.132653] ================================================================== [ 23.100466] ================================================================== [ 23.100710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 23.101034] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.101207] [ 23.101279] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.101479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.101556] Hardware name: linux,dummy-virt (DT) [ 23.101628] Call trace: [ 23.101683] show_stack+0x20/0x38 (C) [ 23.101797] dump_stack_lvl+0x8c/0xd0 [ 23.101921] print_report+0x118/0x608 [ 23.102054] kasan_report+0xdc/0x128 [ 23.102223] kasan_check_range+0x100/0x1a8 [ 23.102348] __kasan_check_write+0x20/0x30 [ 23.102464] kasan_atomics_helper+0x1128/0x4858 [ 23.102603] kasan_atomics+0x198/0x2e0 [ 23.102722] kunit_try_run_case+0x170/0x3f0 [ 23.102870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.103066] kthread+0x328/0x630 [ 23.103210] ret_from_fork+0x10/0x20 [ 23.103325] [ 23.103385] Allocated by task 266: [ 23.103490] kasan_save_stack+0x3c/0x68 [ 23.103636] kasan_save_track+0x20/0x40 [ 23.103766] kasan_save_alloc_info+0x40/0x58 [ 23.103895] __kasan_kmalloc+0xd4/0xd8 [ 23.103978] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.104069] kasan_atomics+0xb8/0x2e0 [ 23.104168] kunit_try_run_case+0x170/0x3f0 [ 23.104285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.104389] kthread+0x328/0x630 [ 23.104464] ret_from_fork+0x10/0x20 [ 23.104556] [ 23.104611] The buggy address belongs to the object at fff00000c5958200 [ 23.104611] which belongs to the cache kmalloc-64 of size 64 [ 23.104787] The buggy address is located 0 bytes to the right of [ 23.104787] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.104960] [ 23.105011] The buggy address belongs to the physical page: [ 23.105091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.105302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.105422] page_type: f5(slab) [ 23.105502] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.105618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.105715] page dumped because: kasan: bad access detected [ 23.105810] [ 23.105870] Memory state around the buggy address: [ 23.105943] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.106040] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.106175] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.106271] ^ [ 23.106361] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.106459] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.106580] ================================================================== [ 23.155344] ================================================================== [ 23.155615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 23.155814] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.155986] [ 23.156059] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.156250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.156314] Hardware name: linux,dummy-virt (DT) [ 23.156394] Call trace: [ 23.156450] show_stack+0x20/0x38 (C) [ 23.156555] dump_stack_lvl+0x8c/0xd0 [ 23.156655] print_report+0x118/0x608 [ 23.156805] kasan_report+0xdc/0x128 [ 23.156939] kasan_check_range+0x100/0x1a8 [ 23.157053] __kasan_check_write+0x20/0x30 [ 23.157195] kasan_atomics_helper+0x1414/0x4858 [ 23.157355] kasan_atomics+0x198/0x2e0 [ 23.157502] kunit_try_run_case+0x170/0x3f0 [ 23.157664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.157840] kthread+0x328/0x630 [ 23.157940] ret_from_fork+0x10/0x20 [ 23.158049] [ 23.158095] Allocated by task 266: [ 23.158155] kasan_save_stack+0x3c/0x68 [ 23.158238] kasan_save_track+0x20/0x40 [ 23.158304] kasan_save_alloc_info+0x40/0x58 [ 23.158402] __kasan_kmalloc+0xd4/0xd8 [ 23.158476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.158568] kasan_atomics+0xb8/0x2e0 [ 23.158661] kunit_try_run_case+0x170/0x3f0 [ 23.158845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.158954] kthread+0x328/0x630 [ 23.159023] ret_from_fork+0x10/0x20 [ 23.159088] [ 23.159145] The buggy address belongs to the object at fff00000c5958200 [ 23.159145] which belongs to the cache kmalloc-64 of size 64 [ 23.159259] The buggy address is located 0 bytes to the right of [ 23.159259] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.159405] [ 23.159460] The buggy address belongs to the physical page: [ 23.159534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.159654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.159781] page_type: f5(slab) [ 23.159894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.160015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.160113] page dumped because: kasan: bad access detected [ 23.160189] [ 23.160234] Memory state around the buggy address: [ 23.160309] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.160417] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.160527] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.160666] ^ [ 23.160773] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.161681] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.161787] ================================================================== [ 23.033788] ================================================================== [ 23.033920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 23.034045] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.034157] [ 23.034217] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.034397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.034464] Hardware name: linux,dummy-virt (DT) [ 23.034555] Call trace: [ 23.034618] show_stack+0x20/0x38 (C) [ 23.034748] dump_stack_lvl+0x8c/0xd0 [ 23.034883] print_report+0x118/0x608 [ 23.035006] kasan_report+0xdc/0x128 [ 23.035121] kasan_check_range+0x100/0x1a8 [ 23.035245] __kasan_check_write+0x20/0x30 [ 23.035371] kasan_atomics_helper+0xeb8/0x4858 [ 23.035548] kasan_atomics+0x198/0x2e0 [ 23.035668] kunit_try_run_case+0x170/0x3f0 [ 23.035791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.035926] kthread+0x328/0x630 [ 23.036021] ret_from_fork+0x10/0x20 [ 23.036133] [ 23.036187] Allocated by task 266: [ 23.036250] kasan_save_stack+0x3c/0x68 [ 23.036354] kasan_save_track+0x20/0x40 [ 23.036450] kasan_save_alloc_info+0x40/0x58 [ 23.036555] __kasan_kmalloc+0xd4/0xd8 [ 23.036646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.036746] kasan_atomics+0xb8/0x2e0 [ 23.036852] kunit_try_run_case+0x170/0x3f0 [ 23.037404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.037650] kthread+0x328/0x630 [ 23.037713] ret_from_fork+0x10/0x20 [ 23.037759] [ 23.037787] The buggy address belongs to the object at fff00000c5958200 [ 23.037787] which belongs to the cache kmalloc-64 of size 64 [ 23.037909] The buggy address is located 0 bytes to the right of [ 23.037909] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.038071] [ 23.038117] The buggy address belongs to the physical page: [ 23.038174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.038577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.038713] page_type: f5(slab) [ 23.038808] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.039617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.039752] page dumped because: kasan: bad access detected [ 23.040084] [ 23.040326] Memory state around the buggy address: [ 23.040557] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.040679] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.040782] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.040892] ^ [ 23.041674] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.042420] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.042979] ================================================================== [ 22.821764] ================================================================== [ 22.821897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 22.822005] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.822118] [ 22.822197] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.822413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.822490] Hardware name: linux,dummy-virt (DT) [ 22.822586] Call trace: [ 22.822651] show_stack+0x20/0x38 (C) [ 22.823795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.824256] Allocated by task 266: [ 22.824327] kasan_save_stack+0x3c/0x68 [ 22.824627] kasan_save_track+0x20/0x40 [ 22.824849] kasan_save_alloc_info+0x40/0x58 [ 22.825185] __kasan_kmalloc+0xd4/0xd8 [ 22.825494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.825592] kasan_atomics+0xb8/0x2e0 [ 22.825675] kunit_try_run_case+0x170/0x3f0 [ 22.826011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826140] kthread+0x328/0x630 [ 22.826254] ret_from_fork+0x10/0x20 [ 22.826349] [ 22.826465] The buggy address belongs to the object at fff00000c5958200 [ 22.826465] which belongs to the cache kmalloc-64 of size 64 [ 22.826633] The buggy address is located 0 bytes to the right of [ 22.826633] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.826799] [ 22.826893] The buggy address belongs to the physical page: [ 22.827005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.827196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.827369] page_type: f5(slab) [ 22.827476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.827655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.827813] page dumped because: kasan: bad access detected [ 22.827958] [ 22.828010] Memory state around the buggy address: [ 22.828091] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.828202] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.828309] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.828410] ^ [ 22.828494] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.828604] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.828704] ================================================================== [ 23.001222] ================================================================== [ 23.001312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 23.001405] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.001498] [ 23.001550] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.001728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.001787] Hardware name: linux,dummy-virt (DT) [ 23.005997] Call trace: [ 23.006065] show_stack+0x20/0x38 (C) [ 23.006176] dump_stack_lvl+0x8c/0xd0 [ 23.006283] print_report+0x118/0x608 [ 23.006384] kasan_report+0xdc/0x128 [ 23.006482] __asan_report_load8_noabort+0x20/0x30 [ 23.006617] kasan_atomics_helper+0x3f58/0x4858 [ 23.006737] kasan_atomics+0x198/0x2e0 [ 23.006865] kunit_try_run_case+0x170/0x3f0 [ 23.006977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.007108] kthread+0x328/0x630 [ 23.007210] ret_from_fork+0x10/0x20 [ 23.007318] [ 23.007367] Allocated by task 266: [ 23.007441] kasan_save_stack+0x3c/0x68 [ 23.007541] kasan_save_track+0x20/0x40 [ 23.007633] kasan_save_alloc_info+0x40/0x58 [ 23.007731] __kasan_kmalloc+0xd4/0xd8 [ 23.008912] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.009062] kasan_atomics+0xb8/0x2e0 [ 23.009467] kunit_try_run_case+0x170/0x3f0 [ 23.009855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.009978] kthread+0x328/0x630 [ 23.010516] ret_from_fork+0x10/0x20 [ 23.010649] [ 23.010714] The buggy address belongs to the object at fff00000c5958200 [ 23.010714] which belongs to the cache kmalloc-64 of size 64 [ 23.011119] The buggy address is located 0 bytes to the right of [ 23.011119] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.011850] [ 23.011922] The buggy address belongs to the physical page: [ 23.012008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.012727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.013229] page_type: f5(slab) [ 23.013339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.013474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.013560] page dumped because: kasan: bad access detected [ 23.014127] [ 23.014195] Memory state around the buggy address: [ 23.014721] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.014896] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.015018] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.015360] ^ [ 23.015680] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.016203] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.016414] ================================================================== [ 23.213397] ================================================================== [ 23.213511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 23.213631] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.213757] [ 23.213845] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.214042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.214111] Hardware name: linux,dummy-virt (DT) [ 23.214183] Call trace: [ 23.214241] show_stack+0x20/0x38 (C) [ 23.214352] dump_stack_lvl+0x8c/0xd0 [ 23.214462] print_report+0x118/0x608 [ 23.214588] kasan_report+0xdc/0x128 [ 23.214717] kasan_check_range+0x100/0x1a8 [ 23.214866] __kasan_check_write+0x20/0x30 [ 23.214968] kasan_atomics_helper+0x1644/0x4858 [ 23.215109] kasan_atomics+0x198/0x2e0 [ 23.215247] kunit_try_run_case+0x170/0x3f0 [ 23.215370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.215498] kthread+0x328/0x630 [ 23.215604] ret_from_fork+0x10/0x20 [ 23.215877] [ 23.215934] Allocated by task 266: [ 23.216336] kasan_save_stack+0x3c/0x68 [ 23.216446] kasan_save_track+0x20/0x40 [ 23.216651] kasan_save_alloc_info+0x40/0x58 [ 23.216879] __kasan_kmalloc+0xd4/0xd8 [ 23.217367] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.217879] kasan_atomics+0xb8/0x2e0 [ 23.217978] kunit_try_run_case+0x170/0x3f0 [ 23.218072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.218175] kthread+0x328/0x630 [ 23.218255] ret_from_fork+0x10/0x20 [ 23.218331] [ 23.218373] The buggy address belongs to the object at fff00000c5958200 [ 23.218373] which belongs to the cache kmalloc-64 of size 64 [ 23.218695] The buggy address is located 0 bytes to the right of [ 23.218695] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.219553] [ 23.219926] The buggy address belongs to the physical page: [ 23.220276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.220683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.220948] page_type: f5(slab) [ 23.221524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.222107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.222199] page dumped because: kasan: bad access detected [ 23.222938] [ 23.223118] Memory state around the buggy address: [ 23.223287] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.223400] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.223908] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.224519] ^ [ 23.224675] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.225299] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.225736] ================================================================== [ 22.811941] ================================================================== [ 22.812049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 22.812163] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.812284] [ 22.812358] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.812558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.812630] Hardware name: linux,dummy-virt (DT) [ 22.812713] Call trace: [ 22.812768] show_stack+0x20/0x38 (C) [ 22.812902] dump_stack_lvl+0x8c/0xd0 [ 22.813007] print_report+0x118/0x608 [ 22.813123] kasan_report+0xdc/0x128 [ 22.813877] kasan_check_range+0x100/0x1a8 [ 22.814031] __kasan_check_write+0x20/0x30 [ 22.814115] kasan_atomics_helper+0x99c/0x4858 [ 22.814198] kasan_atomics+0x198/0x2e0 [ 22.814292] kunit_try_run_case+0x170/0x3f0 [ 22.814374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.814475] kthread+0x328/0x630 [ 22.814568] ret_from_fork+0x10/0x20 [ 22.814673] [ 22.814721] Allocated by task 266: [ 22.814800] kasan_save_stack+0x3c/0x68 [ 22.814952] kasan_save_track+0x20/0x40 [ 22.815065] kasan_save_alloc_info+0x40/0x58 [ 22.815166] __kasan_kmalloc+0xd4/0xd8 [ 22.815258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.815355] kasan_atomics+0xb8/0x2e0 [ 22.815448] kunit_try_run_case+0x170/0x3f0 [ 22.815550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.815662] kthread+0x328/0x630 [ 22.815748] ret_from_fork+0x10/0x20 [ 22.815855] [ 22.815911] The buggy address belongs to the object at fff00000c5958200 [ 22.815911] which belongs to the cache kmalloc-64 of size 64 [ 22.816061] The buggy address is located 0 bytes to the right of [ 22.816061] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.816226] [ 22.816279] The buggy address belongs to the physical page: [ 22.816374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.816496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.817182] page_type: f5(slab) [ 22.817328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.817500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.817639] page dumped because: kasan: bad access detected [ 22.817717] [ 22.817760] Memory state around the buggy address: [ 22.817843] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.818257] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.818432] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.818572] ^ [ 22.820908] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.821004] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.821057] ================================================================== [ 22.973084] ================================================================== [ 22.973217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 22.973375] Read of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.973503] [ 22.973593] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.973798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.973891] Hardware name: linux,dummy-virt (DT) [ 22.973975] Call trace: [ 22.974032] show_stack+0x20/0x38 (C) [ 22.974152] dump_stack_lvl+0x8c/0xd0 [ 22.974273] print_report+0x118/0x608 [ 22.974388] kasan_report+0xdc/0x128 [ 22.974508] __asan_report_load4_noabort+0x20/0x30 [ 22.974655] kasan_atomics_helper+0x3dd8/0x4858 [ 22.974780] kasan_atomics+0x198/0x2e0 [ 22.974941] kunit_try_run_case+0x170/0x3f0 [ 22.975058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.975181] kthread+0x328/0x630 [ 22.975435] ret_from_fork+0x10/0x20 [ 22.975594] [ 22.975635] Allocated by task 266: [ 22.975716] kasan_save_stack+0x3c/0x68 [ 22.975848] kasan_save_track+0x20/0x40 [ 22.975958] kasan_save_alloc_info+0x40/0x58 [ 22.976056] __kasan_kmalloc+0xd4/0xd8 [ 22.976161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.976304] kasan_atomics+0xb8/0x2e0 [ 22.976400] kunit_try_run_case+0x170/0x3f0 [ 22.976587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.976731] kthread+0x328/0x630 [ 22.976835] ret_from_fork+0x10/0x20 [ 22.977024] [ 22.977095] The buggy address belongs to the object at fff00000c5958200 [ 22.977095] which belongs to the cache kmalloc-64 of size 64 [ 22.977244] The buggy address is located 0 bytes to the right of [ 22.977244] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.977407] [ 22.977453] The buggy address belongs to the physical page: [ 22.977520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.977622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.977772] page_type: f5(slab) [ 22.977967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.978090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.978179] page dumped because: kasan: bad access detected [ 22.978234] [ 22.978266] Memory state around the buggy address: [ 22.978329] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.978433] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.978558] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.978652] ^ [ 22.978814] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.978967] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.979156] ================================================================== [ 22.979794] ================================================================== [ 22.980000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 22.980180] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.980357] [ 22.980470] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.980709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.980778] Hardware name: linux,dummy-virt (DT) [ 22.980862] Call trace: [ 22.980922] show_stack+0x20/0x38 (C) [ 22.981022] dump_stack_lvl+0x8c/0xd0 [ 22.981427] print_report+0x118/0x608 [ 22.981732] kasan_report+0xdc/0x128 [ 22.982161] kasan_check_range+0x100/0x1a8 [ 22.982463] __kasan_check_write+0x20/0x30 [ 22.982745] kasan_atomics_helper+0xd3c/0x4858 [ 22.983161] kasan_atomics+0x198/0x2e0 [ 22.983307] kunit_try_run_case+0x170/0x3f0 [ 22.983417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.983580] kthread+0x328/0x630 [ 22.983715] ret_from_fork+0x10/0x20 [ 22.983849] [ 22.983905] Allocated by task 266: [ 22.983985] kasan_save_stack+0x3c/0x68 [ 22.984095] kasan_save_track+0x20/0x40 [ 22.984210] kasan_save_alloc_info+0x40/0x58 [ 22.984353] __kasan_kmalloc+0xd4/0xd8 [ 22.984489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.984590] kasan_atomics+0xb8/0x2e0 [ 22.984682] kunit_try_run_case+0x170/0x3f0 [ 22.984776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.984886] kthread+0x328/0x630 [ 22.984968] ret_from_fork+0x10/0x20 [ 22.985165] [ 22.985266] The buggy address belongs to the object at fff00000c5958200 [ 22.985266] which belongs to the cache kmalloc-64 of size 64 [ 22.985395] The buggy address is located 0 bytes to the right of [ 22.985395] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.985562] [ 22.985626] The buggy address belongs to the physical page: [ 22.985715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.985844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.985950] page_type: f5(slab) [ 22.986052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.986128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.986179] page dumped because: kasan: bad access detected [ 22.986216] [ 22.986240] Memory state around the buggy address: [ 22.986280] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.986328] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.986378] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.986421] ^ [ 22.986462] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.986512] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.986571] ================================================================== [ 23.142733] ================================================================== [ 23.142857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 23.142961] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.143065] [ 23.143129] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.143314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.143380] Hardware name: linux,dummy-virt (DT) [ 23.143451] Call trace: [ 23.143510] show_stack+0x20/0x38 (C) [ 23.143617] dump_stack_lvl+0x8c/0xd0 [ 23.143730] print_report+0x118/0x608 [ 23.143859] kasan_report+0xdc/0x128 [ 23.143977] kasan_check_range+0x100/0x1a8 [ 23.144093] __kasan_check_write+0x20/0x30 [ 23.144208] kasan_atomics_helper+0x1384/0x4858 [ 23.144320] kasan_atomics+0x198/0x2e0 [ 23.144432] kunit_try_run_case+0x170/0x3f0 [ 23.144552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.144681] kthread+0x328/0x630 [ 23.144791] ret_from_fork+0x10/0x20 [ 23.144905] [ 23.144949] Allocated by task 266: [ 23.145098] kasan_save_stack+0x3c/0x68 [ 23.145240] kasan_save_track+0x20/0x40 [ 23.145325] kasan_save_alloc_info+0x40/0x58 [ 23.145420] __kasan_kmalloc+0xd4/0xd8 [ 23.145599] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.145730] kasan_atomics+0xb8/0x2e0 [ 23.145870] kunit_try_run_case+0x170/0x3f0 [ 23.146001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.146128] kthread+0x328/0x630 [ 23.146201] ret_from_fork+0x10/0x20 [ 23.146273] [ 23.146312] The buggy address belongs to the object at fff00000c5958200 [ 23.146312] which belongs to the cache kmalloc-64 of size 64 [ 23.146465] The buggy address is located 0 bytes to the right of [ 23.146465] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.146639] [ 23.146697] The buggy address belongs to the physical page: [ 23.146773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.146914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.147094] page_type: f5(slab) [ 23.147197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.147341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.147451] page dumped because: kasan: bad access detected [ 23.147529] [ 23.147577] Memory state around the buggy address: [ 23.147661] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.147774] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.147911] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.148032] ^ [ 23.148117] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.148280] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.148410] ================================================================== [ 22.798554] ================================================================== [ 22.798672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 22.798778] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266 [ 22.798916] [ 22.798993] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.799192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.799342] Call trace: [ 22.799508] dump_stack_lvl+0x8c/0xd0 [ 22.799621] print_report+0x118/0x608 [ 22.799728] kasan_report+0xdc/0x128 [ 22.802042] kasan_check_range+0x100/0x1a8 [ 22.802255] __kasan_check_write+0x20/0x30 [ 22.802431] kasan_atomics_helper+0x934/0x4858 [ 22.802785] kasan_atomics+0x198/0x2e0 [ 22.803066] kunit_try_run_case+0x170/0x3f0 [ 22.803255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.803995] kthread+0x328/0x630 [ 22.804307] ret_from_fork+0x10/0x20 [ 22.804439] [ 22.804495] Allocated by task 266: [ 22.804570] kasan_save_stack+0x3c/0x68 [ 22.804677] kasan_save_track+0x20/0x40 [ 22.804772] kasan_save_alloc_info+0x40/0x58 [ 22.804895] __kasan_kmalloc+0xd4/0xd8 [ 22.804991] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.805092] kasan_atomics+0xb8/0x2e0 [ 22.805173] kunit_try_run_case+0x170/0x3f0 [ 22.805261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.805351] kthread+0x328/0x630 [ 22.805430] ret_from_fork+0x10/0x20 [ 22.805522] [ 22.805577] The buggy address belongs to the object at fff00000c5958200 [ 22.805577] which belongs to the cache kmalloc-64 of size 64 [ 22.808039] The buggy address is located 0 bytes to the right of [ 22.808039] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 22.808734] [ 22.808789] The buggy address belongs to the physical page: [ 22.809359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 22.809609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.809705] page_type: f5(slab) [ 22.810066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.810229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.810388] page dumped because: kasan: bad access detected [ 22.810508] [ 22.810576] Memory state around the buggy address: [ 22.810703] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.810815] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.810948] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.811047] ^ [ 22.811133] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811241] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811338] ================================================================== [ 23.112618] ================================================================== [ 23.112723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 23.112856] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.112967] [ 23.113047] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.113400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.113463] Hardware name: linux,dummy-virt (DT) [ 23.113528] Call trace: [ 23.113584] show_stack+0x20/0x38 (C) [ 23.113719] dump_stack_lvl+0x8c/0xd0 [ 23.113841] print_report+0x118/0x608 [ 23.113955] kasan_report+0xdc/0x128 [ 23.114075] kasan_check_range+0x100/0x1a8 [ 23.114175] __kasan_check_write+0x20/0x30 [ 23.114304] kasan_atomics_helper+0x11f8/0x4858 [ 23.114418] kasan_atomics+0x198/0x2e0 [ 23.114509] kunit_try_run_case+0x170/0x3f0 [ 23.114620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.114750] kthread+0x328/0x630 [ 23.114858] ret_from_fork+0x10/0x20 [ 23.114991] [ 23.115061] Allocated by task 266: [ 23.115172] kasan_save_stack+0x3c/0x68 [ 23.115305] kasan_save_track+0x20/0x40 [ 23.115431] kasan_save_alloc_info+0x40/0x58 [ 23.115571] __kasan_kmalloc+0xd4/0xd8 [ 23.115708] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.115865] kasan_atomics+0xb8/0x2e0 [ 23.115966] kunit_try_run_case+0x170/0x3f0 [ 23.116102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.116207] kthread+0x328/0x630 [ 23.116290] ret_from_fork+0x10/0x20 [ 23.116393] [ 23.116440] The buggy address belongs to the object at fff00000c5958200 [ 23.116440] which belongs to the cache kmalloc-64 of size 64 [ 23.116583] The buggy address is located 0 bytes to the right of [ 23.116583] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.116812] [ 23.116906] The buggy address belongs to the physical page: [ 23.116977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.117083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.117581] page_type: f5(slab) [ 23.117673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.117799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.117915] page dumped because: kasan: bad access detected [ 23.117992] [ 23.118031] Memory state around the buggy address: [ 23.118096] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.118181] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.118264] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.118348] ^ [ 23.118424] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.118525] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.118610] ================================================================== [ 23.107041] ================================================================== [ 23.107187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 23.107282] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.107389] [ 23.107520] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.107794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.107899] Hardware name: linux,dummy-virt (DT) [ 23.108006] Call trace: [ 23.108079] show_stack+0x20/0x38 (C) [ 23.108242] dump_stack_lvl+0x8c/0xd0 [ 23.108386] print_report+0x118/0x608 [ 23.108538] kasan_report+0xdc/0x128 [ 23.108678] kasan_check_range+0x100/0x1a8 [ 23.108862] __kasan_check_write+0x20/0x30 [ 23.108964] kasan_atomics_helper+0x1190/0x4858 [ 23.109081] kasan_atomics+0x198/0x2e0 [ 23.109199] kunit_try_run_case+0x170/0x3f0 [ 23.109306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.109469] kthread+0x328/0x630 [ 23.109570] ret_from_fork+0x10/0x20 [ 23.109672] [ 23.109723] Allocated by task 266: [ 23.109788] kasan_save_stack+0x3c/0x68 [ 23.109914] kasan_save_track+0x20/0x40 [ 23.110000] kasan_save_alloc_info+0x40/0x58 [ 23.110088] __kasan_kmalloc+0xd4/0xd8 [ 23.110154] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.110227] kasan_atomics+0xb8/0x2e0 [ 23.110295] kunit_try_run_case+0x170/0x3f0 [ 23.110374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.110421] kthread+0x328/0x630 [ 23.110456] ret_from_fork+0x10/0x20 [ 23.110494] [ 23.110521] The buggy address belongs to the object at fff00000c5958200 [ 23.110521] which belongs to the cache kmalloc-64 of size 64 [ 23.110605] The buggy address is located 0 bytes to the right of [ 23.110605] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.110677] [ 23.110699] The buggy address belongs to the physical page: [ 23.110732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.110785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.110870] page_type: f5(slab) [ 23.110959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.111077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.111216] page dumped because: kasan: bad access detected [ 23.111300] [ 23.111343] Memory state around the buggy address: [ 23.111438] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.111586] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.111726] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.111874] ^ [ 23.111952] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.112051] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.112138] ================================================================== [ 23.191568] ================================================================== [ 23.191704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 23.192148] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.192270] [ 23.192338] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.193277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.193377] Hardware name: linux,dummy-virt (DT) [ 23.193515] Call trace: [ 23.193580] show_stack+0x20/0x38 (C) [ 23.193749] dump_stack_lvl+0x8c/0xd0 [ 23.194046] print_report+0x118/0x608 [ 23.194407] kasan_report+0xdc/0x128 [ 23.194543] kasan_check_range+0x100/0x1a8 [ 23.194674] __kasan_check_write+0x20/0x30 [ 23.195225] kasan_atomics_helper+0x15b4/0x4858 [ 23.195790] kasan_atomics+0x198/0x2e0 [ 23.196138] kunit_try_run_case+0x170/0x3f0 [ 23.196295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.196435] kthread+0x328/0x630 [ 23.196551] ret_from_fork+0x10/0x20 [ 23.196672] [ 23.196803] Allocated by task 266: [ 23.196909] kasan_save_stack+0x3c/0x68 [ 23.197067] kasan_save_track+0x20/0x40 [ 23.197545] kasan_save_alloc_info+0x40/0x58 [ 23.197940] __kasan_kmalloc+0xd4/0xd8 [ 23.198388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.198534] kasan_atomics+0xb8/0x2e0 [ 23.198738] kunit_try_run_case+0x170/0x3f0 [ 23.198894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.199007] kthread+0x328/0x630 [ 23.199244] ret_from_fork+0x10/0x20 [ 23.199342] [ 23.199630] The buggy address belongs to the object at fff00000c5958200 [ 23.199630] which belongs to the cache kmalloc-64 of size 64 [ 23.200314] The buggy address is located 0 bytes to the right of [ 23.200314] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.200480] [ 23.200532] The buggy address belongs to the physical page: [ 23.200599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.200711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.200838] page_type: f5(slab) [ 23.200927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.201104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.201237] page dumped because: kasan: bad access detected [ 23.201312] [ 23.201361] Memory state around the buggy address: [ 23.201442] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.201894] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.202269] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.202372] ^ [ 23.202457] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.202581] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.202722] ================================================================== [ 23.078093] ================================================================== [ 23.078202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 23.078309] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.078416] [ 23.078486] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.079202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.079314] Hardware name: linux,dummy-virt (DT) [ 23.079427] Call trace: [ 23.079520] show_stack+0x20/0x38 (C) [ 23.079694] dump_stack_lvl+0x8c/0xd0 [ 23.080194] print_report+0x118/0x608 [ 23.080340] kasan_report+0xdc/0x128 [ 23.080460] kasan_check_range+0x100/0x1a8 [ 23.080792] __kasan_check_write+0x20/0x30 [ 23.080968] kasan_atomics_helper+0x1058/0x4858 [ 23.081171] kasan_atomics+0x198/0x2e0 [ 23.081373] kunit_try_run_case+0x170/0x3f0 [ 23.081494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.081992] kthread+0x328/0x630 [ 23.082200] ret_from_fork+0x10/0x20 [ 23.082538] [ 23.082590] Allocated by task 266: [ 23.082671] kasan_save_stack+0x3c/0x68 [ 23.082877] kasan_save_track+0x20/0x40 [ 23.082975] kasan_save_alloc_info+0x40/0x58 [ 23.083362] __kasan_kmalloc+0xd4/0xd8 [ 23.083847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.084104] kasan_atomics+0xb8/0x2e0 [ 23.084243] kunit_try_run_case+0x170/0x3f0 [ 23.084486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.084754] kthread+0x328/0x630 [ 23.084859] ret_from_fork+0x10/0x20 [ 23.084955] [ 23.085010] The buggy address belongs to the object at fff00000c5958200 [ 23.085010] which belongs to the cache kmalloc-64 of size 64 [ 23.085192] The buggy address is located 0 bytes to the right of [ 23.085192] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.085972] [ 23.086148] The buggy address belongs to the physical page: [ 23.086416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.086558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.086682] page_type: f5(slab) [ 23.086923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.087218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.087647] page dumped because: kasan: bad access detected [ 23.087760] [ 23.087809] Memory state around the buggy address: [ 23.088241] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.088371] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.088693] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.089016] ^ [ 23.089098] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.089231] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.089968] ================================================================== [ 23.234282] ================================================================== [ 23.234342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 23.234425] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.234548] [ 23.234633] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.234840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.234905] Hardware name: linux,dummy-virt (DT) [ 23.235278] Call trace: [ 23.235561] show_stack+0x20/0x38 (C) [ 23.235691] dump_stack_lvl+0x8c/0xd0 [ 23.235804] print_report+0x118/0x608 [ 23.235926] kasan_report+0xdc/0x128 [ 23.236030] kasan_check_range+0x100/0x1a8 [ 23.236141] __kasan_check_write+0x20/0x30 [ 23.236247] kasan_atomics_helper+0x16d0/0x4858 [ 23.237003] kasan_atomics+0x198/0x2e0 [ 23.237645] kunit_try_run_case+0x170/0x3f0 [ 23.238261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.238485] kthread+0x328/0x630 [ 23.239056] ret_from_fork+0x10/0x20 [ 23.239236] [ 23.239298] Allocated by task 266: [ 23.239727] kasan_save_stack+0x3c/0x68 [ 23.239847] kasan_save_track+0x20/0x40 [ 23.239940] kasan_save_alloc_info+0x40/0x58 [ 23.240083] __kasan_kmalloc+0xd4/0xd8 [ 23.240180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.240709] kasan_atomics+0xb8/0x2e0 [ 23.241016] kunit_try_run_case+0x170/0x3f0 [ 23.241294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.241515] kthread+0x328/0x630 [ 23.241605] ret_from_fork+0x10/0x20 [ 23.241707] [ 23.242128] The buggy address belongs to the object at fff00000c5958200 [ 23.242128] which belongs to the cache kmalloc-64 of size 64 [ 23.242282] The buggy address is located 0 bytes to the right of [ 23.242282] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.242488] [ 23.242549] The buggy address belongs to the physical page: [ 23.242732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.242934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.243068] page_type: f5(slab) [ 23.243151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.243274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.243380] page dumped because: kasan: bad access detected [ 23.243462] [ 23.243508] Memory state around the buggy address: [ 23.243592] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.243709] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.243834] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.243938] ^ [ 23.244027] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.244134] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.244234] ================================================================== [ 23.173092] ================================================================== [ 23.173257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 23.173412] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266 [ 23.173508] [ 23.173584] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.173761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.173839] Hardware name: linux,dummy-virt (DT) [ 23.174312] Call trace: [ 23.174409] show_stack+0x20/0x38 (C) [ 23.174950] dump_stack_lvl+0x8c/0xd0 [ 23.175218] print_report+0x118/0x608 [ 23.175328] kasan_report+0xdc/0x128 [ 23.175476] kasan_check_range+0x100/0x1a8 [ 23.175647] __kasan_check_write+0x20/0x30 [ 23.175805] kasan_atomics_helper+0x14e4/0x4858 [ 23.176044] kasan_atomics+0x198/0x2e0 [ 23.176198] kunit_try_run_case+0x170/0x3f0 [ 23.176312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.176432] kthread+0x328/0x630 [ 23.176532] ret_from_fork+0x10/0x20 [ 23.176631] [ 23.176676] Allocated by task 266: [ 23.176743] kasan_save_stack+0x3c/0x68 [ 23.176854] kasan_save_track+0x20/0x40 [ 23.176949] kasan_save_alloc_info+0x40/0x58 [ 23.177054] __kasan_kmalloc+0xd4/0xd8 [ 23.177201] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.177297] kasan_atomics+0xb8/0x2e0 [ 23.177454] kunit_try_run_case+0x170/0x3f0 [ 23.177559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.177663] kthread+0x328/0x630 [ 23.177746] ret_from_fork+0x10/0x20 [ 23.177857] [ 23.177914] The buggy address belongs to the object at fff00000c5958200 [ 23.177914] which belongs to the cache kmalloc-64 of size 64 [ 23.178106] The buggy address is located 0 bytes to the right of [ 23.178106] allocated 48-byte region [fff00000c5958200, fff00000c5958230) [ 23.178286] [ 23.178340] The buggy address belongs to the physical page: [ 23.178418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958 [ 23.178551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.178690] page_type: f5(slab) [ 23.178832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.178948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.179036] page dumped because: kasan: bad access detected [ 23.179099] [ 23.179169] Memory state around the buggy address: [ 23.179240] fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.179343] fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.179449] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.179545] ^ [ 23.179626] fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.179728] fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.179817] ==================================================================
[ 15.524110] ================================================================== [ 15.524508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.525040] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.525522] [ 15.525672] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.525715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.525739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.525769] Call Trace: [ 15.525782] <TASK> [ 15.525799] dump_stack_lvl+0x73/0xb0 [ 15.525859] print_report+0xd1/0x650 [ 15.525884] ? __virt_addr_valid+0x1db/0x2d0 [ 15.525908] ? kasan_atomics_helper+0x992/0x5450 [ 15.525943] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.525967] ? kasan_atomics_helper+0x992/0x5450 [ 15.525991] kasan_report+0x141/0x180 [ 15.526049] ? kasan_atomics_helper+0x992/0x5450 [ 15.526077] kasan_check_range+0x10c/0x1c0 [ 15.526101] __kasan_check_write+0x18/0x20 [ 15.526132] kasan_atomics_helper+0x992/0x5450 [ 15.526157] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.526181] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.526207] ? kasan_atomics+0x152/0x310 [ 15.526234] kasan_atomics+0x1dc/0x310 [ 15.526284] ? __pfx_kasan_atomics+0x10/0x10 [ 15.526310] ? __pfx_read_tsc+0x10/0x10 [ 15.526332] ? ktime_get_ts64+0x86/0x230 [ 15.526375] kunit_try_run_case+0x1a5/0x480 [ 15.526400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.526477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.526503] ? __kthread_parkme+0x82/0x180 [ 15.526535] ? preempt_count_sub+0x50/0x80 [ 15.526560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.526586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.526613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.526639] kthread+0x337/0x6f0 [ 15.526671] ? trace_preempt_on+0x20/0xc0 [ 15.526696] ? __pfx_kthread+0x10/0x10 [ 15.526718] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.526742] ? calculate_sigpending+0x7b/0xa0 [ 15.526776] ? __pfx_kthread+0x10/0x10 [ 15.526799] ret_from_fork+0x116/0x1d0 [ 15.526819] ? __pfx_kthread+0x10/0x10 [ 15.526841] ret_from_fork_asm+0x1a/0x30 [ 15.526873] </TASK> [ 15.526884] [ 15.535660] Allocated by task 283: [ 15.535877] kasan_save_stack+0x45/0x70 [ 15.536147] kasan_save_track+0x18/0x40 [ 15.536359] kasan_save_alloc_info+0x3b/0x50 [ 15.536589] __kasan_kmalloc+0xb7/0xc0 [ 15.536791] __kmalloc_cache_noprof+0x189/0x420 [ 15.537069] kasan_atomics+0x95/0x310 [ 15.537324] kunit_try_run_case+0x1a5/0x480 [ 15.537534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.537775] kthread+0x337/0x6f0 [ 15.537908] ret_from_fork+0x116/0x1d0 [ 15.538097] ret_from_fork_asm+0x1a/0x30 [ 15.538347] [ 15.538486] The buggy address belongs to the object at ffff888103ad1980 [ 15.538486] which belongs to the cache kmalloc-64 of size 64 [ 15.539009] The buggy address is located 0 bytes to the right of [ 15.539009] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.539376] [ 15.539447] The buggy address belongs to the physical page: [ 15.539694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.540153] flags: 0x200000000000000(node=0|zone=2) [ 15.540426] page_type: f5(slab) [ 15.540619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.540962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.541188] page dumped because: kasan: bad access detected [ 15.541394] [ 15.541487] Memory state around the buggy address: [ 15.541787] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542206] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542560] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.542884] ^ [ 15.543067] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.543436] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.544112] ================================================================== [ 15.545621] ================================================================== [ 15.546239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.546616] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.547237] [ 15.547501] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.547549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.547562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.547585] Call Trace: [ 15.547599] <TASK> [ 15.547614] dump_stack_lvl+0x73/0xb0 [ 15.547646] print_report+0xd1/0x650 [ 15.547679] ? __virt_addr_valid+0x1db/0x2d0 [ 15.547704] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.547726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.547765] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.547788] kasan_report+0x141/0x180 [ 15.547812] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.547839] kasan_check_range+0x10c/0x1c0 [ 15.547865] __kasan_check_write+0x18/0x20 [ 15.547886] kasan_atomics_helper+0xa2b/0x5450 [ 15.547909] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.547934] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.547962] ? kasan_atomics+0x152/0x310 [ 15.547991] kasan_atomics+0x1dc/0x310 [ 15.548014] ? __pfx_kasan_atomics+0x10/0x10 [ 15.548040] ? __pfx_read_tsc+0x10/0x10 [ 15.548062] ? ktime_get_ts64+0x86/0x230 [ 15.548088] kunit_try_run_case+0x1a5/0x480 [ 15.548115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.548139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.548166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.548191] ? __kthread_parkme+0x82/0x180 [ 15.548214] ? preempt_count_sub+0x50/0x80 [ 15.548238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.548263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.548290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.548317] kthread+0x337/0x6f0 [ 15.548336] ? trace_preempt_on+0x20/0xc0 [ 15.548361] ? __pfx_kthread+0x10/0x10 [ 15.548383] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.548406] ? calculate_sigpending+0x7b/0xa0 [ 15.548431] ? __pfx_kthread+0x10/0x10 [ 15.548453] ret_from_fork+0x116/0x1d0 [ 15.548472] ? __pfx_kthread+0x10/0x10 [ 15.548494] ret_from_fork_asm+0x1a/0x30 [ 15.548526] </TASK> [ 15.548538] [ 15.559814] Allocated by task 283: [ 15.560325] kasan_save_stack+0x45/0x70 [ 15.560517] kasan_save_track+0x18/0x40 [ 15.560901] kasan_save_alloc_info+0x3b/0x50 [ 15.561210] __kasan_kmalloc+0xb7/0xc0 [ 15.561521] __kmalloc_cache_noprof+0x189/0x420 [ 15.561916] kasan_atomics+0x95/0x310 [ 15.562209] kunit_try_run_case+0x1a5/0x480 [ 15.562510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.562910] kthread+0x337/0x6f0 [ 15.563209] ret_from_fork+0x116/0x1d0 [ 15.563440] ret_from_fork_asm+0x1a/0x30 [ 15.563608] [ 15.563704] The buggy address belongs to the object at ffff888103ad1980 [ 15.563704] which belongs to the cache kmalloc-64 of size 64 [ 15.564514] The buggy address is located 0 bytes to the right of [ 15.564514] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.565322] [ 15.565410] The buggy address belongs to the physical page: [ 15.565910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.566340] flags: 0x200000000000000(node=0|zone=2) [ 15.566660] page_type: f5(slab) [ 15.566865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.567339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.567798] page dumped because: kasan: bad access detected [ 15.568149] [ 15.568251] Memory state around the buggy address: [ 15.568469] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.568785] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.569303] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.569785] ^ [ 15.570115] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.570538] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.570950] ================================================================== [ 16.277948] ================================================================== [ 16.278279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.278627] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.279180] [ 16.279284] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.279425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.279440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.279461] Call Trace: [ 16.279478] <TASK> [ 16.279495] dump_stack_lvl+0x73/0xb0 [ 16.279526] print_report+0xd1/0x650 [ 16.279550] ? __virt_addr_valid+0x1db/0x2d0 [ 16.279575] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.279597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.279622] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.279645] kasan_report+0x141/0x180 [ 16.279736] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.279778] kasan_check_range+0x10c/0x1c0 [ 16.279803] __kasan_check_write+0x18/0x20 [ 16.279824] kasan_atomics_helper+0x1a7f/0x5450 [ 16.279848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.279872] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.279898] ? kasan_atomics+0x152/0x310 [ 16.279926] kasan_atomics+0x1dc/0x310 [ 16.279950] ? __pfx_kasan_atomics+0x10/0x10 [ 16.279979] ? __pfx_read_tsc+0x10/0x10 [ 16.280001] ? ktime_get_ts64+0x86/0x230 [ 16.280027] kunit_try_run_case+0x1a5/0x480 [ 16.280054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.280081] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.280107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.280133] ? __kthread_parkme+0x82/0x180 [ 16.280155] ? preempt_count_sub+0x50/0x80 [ 16.280181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.280207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.280233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.280259] kthread+0x337/0x6f0 [ 16.280280] ? trace_preempt_on+0x20/0xc0 [ 16.280306] ? __pfx_kthread+0x10/0x10 [ 16.280328] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.280351] ? calculate_sigpending+0x7b/0xa0 [ 16.280376] ? __pfx_kthread+0x10/0x10 [ 16.280398] ret_from_fork+0x116/0x1d0 [ 16.280418] ? __pfx_kthread+0x10/0x10 [ 16.280439] ret_from_fork_asm+0x1a/0x30 [ 16.280471] </TASK> [ 16.280483] [ 16.290736] Allocated by task 283: [ 16.291090] kasan_save_stack+0x45/0x70 [ 16.291301] kasan_save_track+0x18/0x40 [ 16.291499] kasan_save_alloc_info+0x3b/0x50 [ 16.291991] __kasan_kmalloc+0xb7/0xc0 [ 16.292174] __kmalloc_cache_noprof+0x189/0x420 [ 16.292479] kasan_atomics+0x95/0x310 [ 16.292655] kunit_try_run_case+0x1a5/0x480 [ 16.292994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.293324] kthread+0x337/0x6f0 [ 16.293451] ret_from_fork+0x116/0x1d0 [ 16.293792] ret_from_fork_asm+0x1a/0x30 [ 16.294062] [ 16.294141] The buggy address belongs to the object at ffff888103ad1980 [ 16.294141] which belongs to the cache kmalloc-64 of size 64 [ 16.294638] The buggy address is located 0 bytes to the right of [ 16.294638] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.295150] [ 16.295231] The buggy address belongs to the physical page: [ 16.295464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.296178] flags: 0x200000000000000(node=0|zone=2) [ 16.296499] page_type: f5(slab) [ 16.296644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.297082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.297467] page dumped because: kasan: bad access detected [ 16.297873] [ 16.297966] Memory state around the buggy address: [ 16.298337] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.298697] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.299099] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.299383] ^ [ 16.299576] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300078] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300456] ================================================================== [ 15.269689] ================================================================== [ 15.270383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.270853] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.271524] [ 15.271892] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.271940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.271953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.271975] Call Trace: [ 15.272011] <TASK> [ 15.272028] dump_stack_lvl+0x73/0xb0 [ 15.272058] print_report+0xd1/0x650 [ 15.272082] ? __virt_addr_valid+0x1db/0x2d0 [ 15.272106] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.272128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.272153] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.272176] kasan_report+0x141/0x180 [ 15.272199] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.272226] kasan_check_range+0x10c/0x1c0 [ 15.272252] __kasan_check_write+0x18/0x20 [ 15.272273] kasan_atomics_helper+0x4a0/0x5450 [ 15.272298] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.272322] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.272349] ? kasan_atomics+0x152/0x310 [ 15.272376] kasan_atomics+0x1dc/0x310 [ 15.272400] ? __pfx_kasan_atomics+0x10/0x10 [ 15.272426] ? __pfx_read_tsc+0x10/0x10 [ 15.272447] ? ktime_get_ts64+0x86/0x230 [ 15.272473] kunit_try_run_case+0x1a5/0x480 [ 15.272499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.272523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.272549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.272574] ? __kthread_parkme+0x82/0x180 [ 15.272596] ? preempt_count_sub+0x50/0x80 [ 15.272621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.272763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.272799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.272827] kthread+0x337/0x6f0 [ 15.272849] ? trace_preempt_on+0x20/0xc0 [ 15.272875] ? __pfx_kthread+0x10/0x10 [ 15.272897] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.272921] ? calculate_sigpending+0x7b/0xa0 [ 15.272947] ? __pfx_kthread+0x10/0x10 [ 15.272970] ret_from_fork+0x116/0x1d0 [ 15.272990] ? __pfx_kthread+0x10/0x10 [ 15.273012] ret_from_fork_asm+0x1a/0x30 [ 15.273044] </TASK> [ 15.273055] [ 15.284867] Allocated by task 283: [ 15.285023] kasan_save_stack+0x45/0x70 [ 15.285231] kasan_save_track+0x18/0x40 [ 15.285420] kasan_save_alloc_info+0x3b/0x50 [ 15.285626] __kasan_kmalloc+0xb7/0xc0 [ 15.286459] __kmalloc_cache_noprof+0x189/0x420 [ 15.286653] kasan_atomics+0x95/0x310 [ 15.286897] kunit_try_run_case+0x1a5/0x480 [ 15.287109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.287359] kthread+0x337/0x6f0 [ 15.287535] ret_from_fork+0x116/0x1d0 [ 15.288065] ret_from_fork_asm+0x1a/0x30 [ 15.288277] [ 15.288580] The buggy address belongs to the object at ffff888103ad1980 [ 15.288580] which belongs to the cache kmalloc-64 of size 64 [ 15.289330] The buggy address is located 0 bytes to the right of [ 15.289330] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.290048] [ 15.290368] The buggy address belongs to the physical page: [ 15.290784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.291377] flags: 0x200000000000000(node=0|zone=2) [ 15.291596] page_type: f5(slab) [ 15.291820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.292569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.293080] page dumped because: kasan: bad access detected [ 15.293449] [ 15.293674] Memory state around the buggy address: [ 15.294119] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.294446] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.295028] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.295419] ^ [ 15.295768] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.296387] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.296928] ================================================================== [ 15.792597] ================================================================== [ 15.793123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.793432] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.793729] [ 15.793851] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.793915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.793928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.793948] Call Trace: [ 15.793964] <TASK> [ 15.793981] dump_stack_lvl+0x73/0xb0 [ 15.794010] print_report+0xd1/0x650 [ 15.794032] ? __virt_addr_valid+0x1db/0x2d0 [ 15.794056] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.794079] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.794103] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.794143] kasan_report+0x141/0x180 [ 15.794167] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.794195] __asan_report_load4_noabort+0x18/0x20 [ 15.794221] kasan_atomics_helper+0x4a36/0x5450 [ 15.794245] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.794269] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.794295] ? kasan_atomics+0x152/0x310 [ 15.794322] kasan_atomics+0x1dc/0x310 [ 15.794347] ? __pfx_kasan_atomics+0x10/0x10 [ 15.794377] ? __pfx_read_tsc+0x10/0x10 [ 15.794400] ? ktime_get_ts64+0x86/0x230 [ 15.794425] kunit_try_run_case+0x1a5/0x480 [ 15.794451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.794476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.794501] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.794527] ? __kthread_parkme+0x82/0x180 [ 15.794549] ? preempt_count_sub+0x50/0x80 [ 15.794573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.794599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.794625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.794651] kthread+0x337/0x6f0 [ 15.794671] ? trace_preempt_on+0x20/0xc0 [ 15.794716] ? __pfx_kthread+0x10/0x10 [ 15.794738] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.794779] ? calculate_sigpending+0x7b/0xa0 [ 15.794805] ? __pfx_kthread+0x10/0x10 [ 15.794827] ret_from_fork+0x116/0x1d0 [ 15.794847] ? __pfx_kthread+0x10/0x10 [ 15.794868] ret_from_fork_asm+0x1a/0x30 [ 15.794901] </TASK> [ 15.794912] [ 15.802183] Allocated by task 283: [ 15.802968] kasan_save_stack+0x45/0x70 [ 15.803170] kasan_save_track+0x18/0x40 [ 15.803411] kasan_save_alloc_info+0x3b/0x50 [ 15.803631] __kasan_kmalloc+0xb7/0xc0 [ 15.803837] __kmalloc_cache_noprof+0x189/0x420 [ 15.804022] kasan_atomics+0x95/0x310 [ 15.804204] kunit_try_run_case+0x1a5/0x480 [ 15.804387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804612] kthread+0x337/0x6f0 [ 15.804833] ret_from_fork+0x116/0x1d0 [ 15.805055] ret_from_fork_asm+0x1a/0x30 [ 15.805202] [ 15.805270] The buggy address belongs to the object at ffff888103ad1980 [ 15.805270] which belongs to the cache kmalloc-64 of size 64 [ 15.805604] The buggy address is located 0 bytes to the right of [ 15.805604] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.806207] [ 15.806308] The buggy address belongs to the physical page: [ 15.806570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.806962] flags: 0x200000000000000(node=0|zone=2) [ 15.807189] page_type: f5(slab) [ 15.807335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.807734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.808027] page dumped because: kasan: bad access detected [ 15.808202] [ 15.808272] Memory state around the buggy address: [ 15.808475] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.808874] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.809201] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.809522] ^ [ 15.809759] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.810104] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.810358] ================================================================== [ 15.181173] ================================================================== [ 15.181495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.182031] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.182611] [ 15.182767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.182817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.183018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.183046] Call Trace: [ 15.183061] <TASK> [ 15.183077] dump_stack_lvl+0x73/0xb0 [ 15.183109] print_report+0xd1/0x650 [ 15.183131] ? __virt_addr_valid+0x1db/0x2d0 [ 15.183156] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.183177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.183201] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.183223] kasan_report+0x141/0x180 [ 15.183244] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.183271] __asan_report_store4_noabort+0x1b/0x30 [ 15.183296] kasan_atomics_helper+0x4b6e/0x5450 [ 15.183320] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.183344] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.183369] ? kasan_atomics+0x152/0x310 [ 15.183395] kasan_atomics+0x1dc/0x310 [ 15.183418] ? __pfx_kasan_atomics+0x10/0x10 [ 15.183443] ? __pfx_read_tsc+0x10/0x10 [ 15.183463] ? ktime_get_ts64+0x86/0x230 [ 15.183487] kunit_try_run_case+0x1a5/0x480 [ 15.183511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183534] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.183558] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.183583] ? __kthread_parkme+0x82/0x180 [ 15.183603] ? preempt_count_sub+0x50/0x80 [ 15.183628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.183667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.183716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.183743] kthread+0x337/0x6f0 [ 15.183777] ? trace_preempt_on+0x20/0xc0 [ 15.183802] ? __pfx_kthread+0x10/0x10 [ 15.183824] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.183846] ? calculate_sigpending+0x7b/0xa0 [ 15.183870] ? __pfx_kthread+0x10/0x10 [ 15.183892] ret_from_fork+0x116/0x1d0 [ 15.183910] ? __pfx_kthread+0x10/0x10 [ 15.183931] ret_from_fork_asm+0x1a/0x30 [ 15.183961] </TASK> [ 15.183971] [ 15.197503] Allocated by task 283: [ 15.197656] kasan_save_stack+0x45/0x70 [ 15.197820] kasan_save_track+0x18/0x40 [ 15.197957] kasan_save_alloc_info+0x3b/0x50 [ 15.198105] __kasan_kmalloc+0xb7/0xc0 [ 15.198237] __kmalloc_cache_noprof+0x189/0x420 [ 15.198399] kasan_atomics+0x95/0x310 [ 15.198532] kunit_try_run_case+0x1a5/0x480 [ 15.198676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.199162] kthread+0x337/0x6f0 [ 15.199457] ret_from_fork+0x116/0x1d0 [ 15.199873] ret_from_fork_asm+0x1a/0x30 [ 15.200223] [ 15.200378] The buggy address belongs to the object at ffff888103ad1980 [ 15.200378] which belongs to the cache kmalloc-64 of size 64 [ 15.201581] The buggy address is located 0 bytes to the right of [ 15.201581] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.202797] [ 15.202963] The buggy address belongs to the physical page: [ 15.203432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.204158] flags: 0x200000000000000(node=0|zone=2) [ 15.204583] page_type: f5(slab) [ 15.204956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.205597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.206330] page dumped because: kasan: bad access detected [ 15.206520] [ 15.206591] Memory state around the buggy address: [ 15.207068] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.207774] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.208370] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.208595] ^ [ 15.209083] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.209755] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.209978] ================================================================== [ 16.253402] ================================================================== [ 16.254131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.254467] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.255057] [ 16.255183] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.255229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.255242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.255263] Call Trace: [ 16.255279] <TASK> [ 16.255296] dump_stack_lvl+0x73/0xb0 [ 16.255326] print_report+0xd1/0x650 [ 16.255349] ? __virt_addr_valid+0x1db/0x2d0 [ 16.255373] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.255396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.255422] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.255445] kasan_report+0x141/0x180 [ 16.255468] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.255496] kasan_check_range+0x10c/0x1c0 [ 16.255521] __kasan_check_write+0x18/0x20 [ 16.255542] kasan_atomics_helper+0x19e3/0x5450 [ 16.255566] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.255590] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.255618] ? kasan_atomics+0x152/0x310 [ 16.255645] kasan_atomics+0x1dc/0x310 [ 16.255830] ? __pfx_kasan_atomics+0x10/0x10 [ 16.255858] ? __pfx_read_tsc+0x10/0x10 [ 16.255879] ? ktime_get_ts64+0x86/0x230 [ 16.255905] kunit_try_run_case+0x1a5/0x480 [ 16.255931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.255956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.255982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.256008] ? __kthread_parkme+0x82/0x180 [ 16.256029] ? preempt_count_sub+0x50/0x80 [ 16.256055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.256082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.256107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.256134] kthread+0x337/0x6f0 [ 16.256154] ? trace_preempt_on+0x20/0xc0 [ 16.256178] ? __pfx_kthread+0x10/0x10 [ 16.256200] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.256224] ? calculate_sigpending+0x7b/0xa0 [ 16.256248] ? __pfx_kthread+0x10/0x10 [ 16.256271] ret_from_fork+0x116/0x1d0 [ 16.256290] ? __pfx_kthread+0x10/0x10 [ 16.256313] ret_from_fork_asm+0x1a/0x30 [ 16.256344] </TASK> [ 16.256355] [ 16.266738] Allocated by task 283: [ 16.267007] kasan_save_stack+0x45/0x70 [ 16.267308] kasan_save_track+0x18/0x40 [ 16.267502] kasan_save_alloc_info+0x3b/0x50 [ 16.267778] __kasan_kmalloc+0xb7/0xc0 [ 16.268102] __kmalloc_cache_noprof+0x189/0x420 [ 16.268384] kasan_atomics+0x95/0x310 [ 16.268579] kunit_try_run_case+0x1a5/0x480 [ 16.268964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.269216] kthread+0x337/0x6f0 [ 16.269365] ret_from_fork+0x116/0x1d0 [ 16.269542] ret_from_fork_asm+0x1a/0x30 [ 16.270011] [ 16.270121] The buggy address belongs to the object at ffff888103ad1980 [ 16.270121] which belongs to the cache kmalloc-64 of size 64 [ 16.270722] The buggy address is located 0 bytes to the right of [ 16.270722] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.271384] [ 16.271463] The buggy address belongs to the physical page: [ 16.271967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.272408] flags: 0x200000000000000(node=0|zone=2) [ 16.272639] page_type: f5(slab) [ 16.272975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.273377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.273855] page dumped because: kasan: bad access detected [ 16.274080] [ 16.274317] Memory state around the buggy address: [ 16.274525] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.275034] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.275401] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.275787] ^ [ 16.276026] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.276482] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.276908] ================================================================== [ 15.297584] ================================================================== [ 15.298316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.299012] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.299726] [ 15.299850] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.300100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.300119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.300141] Call Trace: [ 15.300157] <TASK> [ 15.300174] dump_stack_lvl+0x73/0xb0 [ 15.300206] print_report+0xd1/0x650 [ 15.300229] ? __virt_addr_valid+0x1db/0x2d0 [ 15.300252] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.300275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.300299] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.300323] kasan_report+0x141/0x180 [ 15.300346] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.300374] __asan_report_store4_noabort+0x1b/0x30 [ 15.300401] kasan_atomics_helper+0x4b3a/0x5450 [ 15.300425] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.300449] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.300476] ? kasan_atomics+0x152/0x310 [ 15.300503] kasan_atomics+0x1dc/0x310 [ 15.300529] ? __pfx_kasan_atomics+0x10/0x10 [ 15.300554] ? __pfx_read_tsc+0x10/0x10 [ 15.300577] ? ktime_get_ts64+0x86/0x230 [ 15.300603] kunit_try_run_case+0x1a5/0x480 [ 15.300630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.300715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.300755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.300782] ? __kthread_parkme+0x82/0x180 [ 15.300804] ? preempt_count_sub+0x50/0x80 [ 15.300829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.300855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.300881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.300909] kthread+0x337/0x6f0 [ 15.300929] ? trace_preempt_on+0x20/0xc0 [ 15.300953] ? __pfx_kthread+0x10/0x10 [ 15.300975] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.300999] ? calculate_sigpending+0x7b/0xa0 [ 15.301024] ? __pfx_kthread+0x10/0x10 [ 15.301047] ret_from_fork+0x116/0x1d0 [ 15.301067] ? __pfx_kthread+0x10/0x10 [ 15.301090] ret_from_fork_asm+0x1a/0x30 [ 15.301122] </TASK> [ 15.301133] [ 15.314343] Allocated by task 283: [ 15.314696] kasan_save_stack+0x45/0x70 [ 15.315137] kasan_save_track+0x18/0x40 [ 15.315517] kasan_save_alloc_info+0x3b/0x50 [ 15.315986] __kasan_kmalloc+0xb7/0xc0 [ 15.316243] __kmalloc_cache_noprof+0x189/0x420 [ 15.316401] kasan_atomics+0x95/0x310 [ 15.316535] kunit_try_run_case+0x1a5/0x480 [ 15.316690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.316898] kthread+0x337/0x6f0 [ 15.317061] ret_from_fork+0x116/0x1d0 [ 15.317234] ret_from_fork_asm+0x1a/0x30 [ 15.317411] [ 15.317483] The buggy address belongs to the object at ffff888103ad1980 [ 15.317483] which belongs to the cache kmalloc-64 of size 64 [ 15.318089] The buggy address is located 0 bytes to the right of [ 15.318089] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.318686] [ 15.318870] The buggy address belongs to the physical page: [ 15.319097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.319370] flags: 0x200000000000000(node=0|zone=2) [ 15.319619] page_type: f5(slab) [ 15.319817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.320222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.320525] page dumped because: kasan: bad access detected [ 15.320813] [ 15.320910] Memory state around the buggy address: [ 15.321127] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.321430] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.321767] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.321979] ^ [ 15.322189] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.322516] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.322811] ================================================================== [ 16.477849] ================================================================== [ 16.478178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.478469] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.478871] [ 16.478982] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.479025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.479048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.479068] Call Trace: [ 16.479081] <TASK> [ 16.479096] dump_stack_lvl+0x73/0xb0 [ 16.479138] print_report+0xd1/0x650 [ 16.479160] ? __virt_addr_valid+0x1db/0x2d0 [ 16.479184] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.479207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.479231] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.479254] kasan_report+0x141/0x180 [ 16.479278] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.479306] __asan_report_load8_noabort+0x18/0x20 [ 16.479332] kasan_atomics_helper+0x4f71/0x5450 [ 16.479356] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.479381] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.479408] ? kasan_atomics+0x152/0x310 [ 16.479435] kasan_atomics+0x1dc/0x310 [ 16.479458] ? __pfx_kasan_atomics+0x10/0x10 [ 16.479484] ? __pfx_read_tsc+0x10/0x10 [ 16.479506] ? ktime_get_ts64+0x86/0x230 [ 16.479530] kunit_try_run_case+0x1a5/0x480 [ 16.479555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.479580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.479604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.479630] ? __kthread_parkme+0x82/0x180 [ 16.479651] ? preempt_count_sub+0x50/0x80 [ 16.479697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.479723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.479766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.479793] kthread+0x337/0x6f0 [ 16.479814] ? trace_preempt_on+0x20/0xc0 [ 16.479839] ? __pfx_kthread+0x10/0x10 [ 16.479860] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.479883] ? calculate_sigpending+0x7b/0xa0 [ 16.479909] ? __pfx_kthread+0x10/0x10 [ 16.479932] ret_from_fork+0x116/0x1d0 [ 16.479953] ? __pfx_kthread+0x10/0x10 [ 16.479974] ret_from_fork_asm+0x1a/0x30 [ 16.480005] </TASK> [ 16.480016] [ 16.487461] Allocated by task 283: [ 16.487636] kasan_save_stack+0x45/0x70 [ 16.487844] kasan_save_track+0x18/0x40 [ 16.488039] kasan_save_alloc_info+0x3b/0x50 [ 16.488245] __kasan_kmalloc+0xb7/0xc0 [ 16.488443] __kmalloc_cache_noprof+0x189/0x420 [ 16.488675] kasan_atomics+0x95/0x310 [ 16.488892] kunit_try_run_case+0x1a5/0x480 [ 16.489080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.489304] kthread+0x337/0x6f0 [ 16.489425] ret_from_fork+0x116/0x1d0 [ 16.489558] ret_from_fork_asm+0x1a/0x30 [ 16.489797] [ 16.489892] The buggy address belongs to the object at ffff888103ad1980 [ 16.489892] which belongs to the cache kmalloc-64 of size 64 [ 16.490456] The buggy address is located 0 bytes to the right of [ 16.490456] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.491009] [ 16.491081] The buggy address belongs to the physical page: [ 16.491253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.491640] flags: 0x200000000000000(node=0|zone=2) [ 16.492076] page_type: f5(slab) [ 16.492259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.492546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.493047] page dumped because: kasan: bad access detected [ 16.493247] [ 16.493362] Memory state around the buggy address: [ 16.493549] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.493922] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.494235] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.494532] ^ [ 16.494808] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.495118] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.495421] ================================================================== [ 15.682622] ================================================================== [ 15.682967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.683269] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.683492] [ 15.683575] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.683615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.683628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.683649] Call Trace: [ 15.683663] <TASK> [ 15.683678] dump_stack_lvl+0x73/0xb0 [ 15.683705] print_report+0xd1/0x650 [ 15.683729] ? __virt_addr_valid+0x1db/0x2d0 [ 15.683764] ? kasan_atomics_helper+0xde0/0x5450 [ 15.683788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.683811] ? kasan_atomics_helper+0xde0/0x5450 [ 15.683835] kasan_report+0x141/0x180 [ 15.683858] ? kasan_atomics_helper+0xde0/0x5450 [ 15.683885] kasan_check_range+0x10c/0x1c0 [ 15.683910] __kasan_check_write+0x18/0x20 [ 15.683931] kasan_atomics_helper+0xde0/0x5450 [ 15.683955] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.683980] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.684007] ? kasan_atomics+0x152/0x310 [ 15.684035] kasan_atomics+0x1dc/0x310 [ 15.684059] ? __pfx_kasan_atomics+0x10/0x10 [ 15.684085] ? __pfx_read_tsc+0x10/0x10 [ 15.684106] ? ktime_get_ts64+0x86/0x230 [ 15.684133] kunit_try_run_case+0x1a5/0x480 [ 15.684158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.684182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.684207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.684244] ? __kthread_parkme+0x82/0x180 [ 15.684265] ? preempt_count_sub+0x50/0x80 [ 15.684290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.684317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.684342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.684369] kthread+0x337/0x6f0 [ 15.684389] ? trace_preempt_on+0x20/0xc0 [ 15.684415] ? __pfx_kthread+0x10/0x10 [ 15.684437] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.684460] ? calculate_sigpending+0x7b/0xa0 [ 15.684485] ? __pfx_kthread+0x10/0x10 [ 15.684508] ret_from_fork+0x116/0x1d0 [ 15.684526] ? __pfx_kthread+0x10/0x10 [ 15.684548] ret_from_fork_asm+0x1a/0x30 [ 15.684580] </TASK> [ 15.684590] [ 15.691762] Allocated by task 283: [ 15.692055] kasan_save_stack+0x45/0x70 [ 15.692261] kasan_save_track+0x18/0x40 [ 15.692462] kasan_save_alloc_info+0x3b/0x50 [ 15.692742] __kasan_kmalloc+0xb7/0xc0 [ 15.693348] __kmalloc_cache_noprof+0x189/0x420 [ 15.693522] kasan_atomics+0x95/0x310 [ 15.693658] kunit_try_run_case+0x1a5/0x480 [ 15.695161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.695739] kthread+0x337/0x6f0 [ 15.696177] ret_from_fork+0x116/0x1d0 [ 15.696324] ret_from_fork_asm+0x1a/0x30 [ 15.696468] [ 15.696541] The buggy address belongs to the object at ffff888103ad1980 [ 15.696541] which belongs to the cache kmalloc-64 of size 64 [ 15.698171] The buggy address is located 0 bytes to the right of [ 15.698171] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.699617] [ 15.700011] The buggy address belongs to the physical page: [ 15.700666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.701100] flags: 0x200000000000000(node=0|zone=2) [ 15.701275] page_type: f5(slab) [ 15.701398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.701630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.702840] page dumped because: kasan: bad access detected [ 15.703485] [ 15.703839] Memory state around the buggy address: [ 15.704410] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705369] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705885] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.706518] ^ [ 15.706914] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.707644] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.708205] ================================================================== [ 15.766608] ================================================================== [ 15.767367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.767987] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.768215] [ 15.768302] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.768344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.768357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.768379] Call Trace: [ 15.768396] <TASK> [ 15.768412] dump_stack_lvl+0x73/0xb0 [ 15.768441] print_report+0xd1/0x650 [ 15.768464] ? __virt_addr_valid+0x1db/0x2d0 [ 15.768489] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.768510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.768535] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.768558] kasan_report+0x141/0x180 [ 15.768581] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.768608] kasan_check_range+0x10c/0x1c0 [ 15.768633] __kasan_check_write+0x18/0x20 [ 15.768663] kasan_atomics_helper+0xfa9/0x5450 [ 15.768688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.768711] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.768737] ? kasan_atomics+0x152/0x310 [ 15.768777] kasan_atomics+0x1dc/0x310 [ 15.768801] ? __pfx_kasan_atomics+0x10/0x10 [ 15.768826] ? __pfx_read_tsc+0x10/0x10 [ 15.768848] ? ktime_get_ts64+0x86/0x230 [ 15.768873] kunit_try_run_case+0x1a5/0x480 [ 15.768897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.768922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.768948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.768974] ? __kthread_parkme+0x82/0x180 [ 15.768994] ? preempt_count_sub+0x50/0x80 [ 15.769019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.769045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.769071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.769098] kthread+0x337/0x6f0 [ 15.769119] ? trace_preempt_on+0x20/0xc0 [ 15.769144] ? __pfx_kthread+0x10/0x10 [ 15.769165] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.769188] ? calculate_sigpending+0x7b/0xa0 [ 15.769213] ? __pfx_kthread+0x10/0x10 [ 15.769235] ret_from_fork+0x116/0x1d0 [ 15.769255] ? __pfx_kthread+0x10/0x10 [ 15.769276] ret_from_fork_asm+0x1a/0x30 [ 15.769308] </TASK> [ 15.769319] [ 15.781397] Allocated by task 283: [ 15.781536] kasan_save_stack+0x45/0x70 [ 15.781740] kasan_save_track+0x18/0x40 [ 15.782085] kasan_save_alloc_info+0x3b/0x50 [ 15.782474] __kasan_kmalloc+0xb7/0xc0 [ 15.782852] __kmalloc_cache_noprof+0x189/0x420 [ 15.783292] kasan_atomics+0x95/0x310 [ 15.783662] kunit_try_run_case+0x1a5/0x480 [ 15.784059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.784533] kthread+0x337/0x6f0 [ 15.784932] ret_from_fork+0x116/0x1d0 [ 15.785287] ret_from_fork_asm+0x1a/0x30 [ 15.785661] [ 15.785827] The buggy address belongs to the object at ffff888103ad1980 [ 15.785827] which belongs to the cache kmalloc-64 of size 64 [ 15.786869] The buggy address is located 0 bytes to the right of [ 15.786869] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.788061] [ 15.788218] The buggy address belongs to the physical page: [ 15.788711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.789021] flags: 0x200000000000000(node=0|zone=2) [ 15.789188] page_type: f5(slab) [ 15.789309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.789544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.789900] page dumped because: kasan: bad access detected [ 15.790148] [ 15.790253] Memory state around the buggy address: [ 15.790436] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.790691] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.791037] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.791273] ^ [ 15.791494] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.791847] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.792104] ================================================================== [ 15.347498] ================================================================== [ 15.347778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.349319] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.350689] [ 15.351001] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.351103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.351116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.351139] Call Trace: [ 15.351248] <TASK> [ 15.351267] dump_stack_lvl+0x73/0xb0 [ 15.351301] print_report+0xd1/0x650 [ 15.351326] ? __virt_addr_valid+0x1db/0x2d0 [ 15.351350] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.351373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.351398] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.351420] kasan_report+0x141/0x180 [ 15.351443] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.351471] kasan_check_range+0x10c/0x1c0 [ 15.351497] __kasan_check_write+0x18/0x20 [ 15.351518] kasan_atomics_helper+0x5fe/0x5450 [ 15.351542] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.351566] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.351593] ? kasan_atomics+0x152/0x310 [ 15.351620] kasan_atomics+0x1dc/0x310 [ 15.351713] ? __pfx_kasan_atomics+0x10/0x10 [ 15.351742] ? __pfx_read_tsc+0x10/0x10 [ 15.351777] ? ktime_get_ts64+0x86/0x230 [ 15.351802] kunit_try_run_case+0x1a5/0x480 [ 15.351828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.351852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.351879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.351904] ? __kthread_parkme+0x82/0x180 [ 15.351925] ? preempt_count_sub+0x50/0x80 [ 15.351951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.351977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352002] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.352029] kthread+0x337/0x6f0 [ 15.352050] ? trace_preempt_on+0x20/0xc0 [ 15.352075] ? __pfx_kthread+0x10/0x10 [ 15.352097] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.352120] ? calculate_sigpending+0x7b/0xa0 [ 15.352144] ? __pfx_kthread+0x10/0x10 [ 15.352167] ret_from_fork+0x116/0x1d0 [ 15.352186] ? __pfx_kthread+0x10/0x10 [ 15.352208] ret_from_fork_asm+0x1a/0x30 [ 15.352240] </TASK> [ 15.352252] [ 15.367933] Allocated by task 283: [ 15.368292] kasan_save_stack+0x45/0x70 [ 15.368533] kasan_save_track+0x18/0x40 [ 15.368867] kasan_save_alloc_info+0x3b/0x50 [ 15.369372] __kasan_kmalloc+0xb7/0xc0 [ 15.369782] __kmalloc_cache_noprof+0x189/0x420 [ 15.370139] kasan_atomics+0x95/0x310 [ 15.370282] kunit_try_run_case+0x1a5/0x480 [ 15.370445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.370624] kthread+0x337/0x6f0 [ 15.371044] ret_from_fork+0x116/0x1d0 [ 15.371413] ret_from_fork_asm+0x1a/0x30 [ 15.371871] [ 15.372034] The buggy address belongs to the object at ffff888103ad1980 [ 15.372034] which belongs to the cache kmalloc-64 of size 64 [ 15.373138] The buggy address is located 0 bytes to the right of [ 15.373138] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.374319] [ 15.374408] The buggy address belongs to the physical page: [ 15.374586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.375304] flags: 0x200000000000000(node=0|zone=2) [ 15.375822] page_type: f5(slab) [ 15.376187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.377003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.377663] page dumped because: kasan: bad access detected [ 15.378165] [ 15.378240] Memory state around the buggy address: [ 15.378402] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.378618] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.379454] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.380156] ^ [ 15.380587] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381305] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381943] ================================================================== [ 16.047409] ================================================================== [ 16.047843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 16.048212] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.048523] [ 16.048615] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.048665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.048677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.048697] Call Trace: [ 16.048711] <TASK> [ 16.048726] dump_stack_lvl+0x73/0xb0 [ 16.048767] print_report+0xd1/0x650 [ 16.048790] ? __virt_addr_valid+0x1db/0x2d0 [ 16.048814] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.048836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.048861] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.048883] kasan_report+0x141/0x180 [ 16.048907] ? kasan_atomics_helper+0x50d4/0x5450 [ 16.048934] __asan_report_store8_noabort+0x1b/0x30 [ 16.048961] kasan_atomics_helper+0x50d4/0x5450 [ 16.048984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.049009] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.049036] ? kasan_atomics+0x152/0x310 [ 16.049063] kasan_atomics+0x1dc/0x310 [ 16.049086] ? __pfx_kasan_atomics+0x10/0x10 [ 16.049112] ? __pfx_read_tsc+0x10/0x10 [ 16.049133] ? ktime_get_ts64+0x86/0x230 [ 16.049160] kunit_try_run_case+0x1a5/0x480 [ 16.049187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.049211] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.049236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.049262] ? __kthread_parkme+0x82/0x180 [ 16.049283] ? preempt_count_sub+0x50/0x80 [ 16.049308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.049333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.049358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.049386] kthread+0x337/0x6f0 [ 16.049406] ? trace_preempt_on+0x20/0xc0 [ 16.049431] ? __pfx_kthread+0x10/0x10 [ 16.049453] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.049476] ? calculate_sigpending+0x7b/0xa0 [ 16.049501] ? __pfx_kthread+0x10/0x10 [ 16.049524] ret_from_fork+0x116/0x1d0 [ 16.049543] ? __pfx_kthread+0x10/0x10 [ 16.049565] ret_from_fork_asm+0x1a/0x30 [ 16.049596] </TASK> [ 16.049608] [ 16.056770] Allocated by task 283: [ 16.056897] kasan_save_stack+0x45/0x70 [ 16.057039] kasan_save_track+0x18/0x40 [ 16.057174] kasan_save_alloc_info+0x3b/0x50 [ 16.057321] __kasan_kmalloc+0xb7/0xc0 [ 16.057454] __kmalloc_cache_noprof+0x189/0x420 [ 16.057610] kasan_atomics+0x95/0x310 [ 16.057741] kunit_try_run_case+0x1a5/0x480 [ 16.057959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.058213] kthread+0x337/0x6f0 [ 16.058403] ret_from_fork+0x116/0x1d0 [ 16.058591] ret_from_fork_asm+0x1a/0x30 [ 16.058978] [ 16.059073] The buggy address belongs to the object at ffff888103ad1980 [ 16.059073] which belongs to the cache kmalloc-64 of size 64 [ 16.059597] The buggy address is located 0 bytes to the right of [ 16.059597] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.060463] [ 16.060535] The buggy address belongs to the physical page: [ 16.060705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.060951] flags: 0x200000000000000(node=0|zone=2) [ 16.061111] page_type: f5(slab) [ 16.061230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.061458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.061879] page dumped because: kasan: bad access detected [ 16.062136] [ 16.062231] Memory state around the buggy address: [ 16.062468] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.062964] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.063290] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.063609] ^ [ 16.063890] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.064177] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.064419] ================================================================== [ 15.849403] ================================================================== [ 15.849773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.850117] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.850458] [ 15.850569] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.850691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.850705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.850726] Call Trace: [ 15.850741] <TASK> [ 15.850771] dump_stack_lvl+0x73/0xb0 [ 15.850801] print_report+0xd1/0x650 [ 15.850824] ? __virt_addr_valid+0x1db/0x2d0 [ 15.850849] ? kasan_atomics_helper+0x1148/0x5450 [ 15.850871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.850896] ? kasan_atomics_helper+0x1148/0x5450 [ 15.850951] kasan_report+0x141/0x180 [ 15.850996] ? kasan_atomics_helper+0x1148/0x5450 [ 15.851025] kasan_check_range+0x10c/0x1c0 [ 15.851051] __kasan_check_write+0x18/0x20 [ 15.851072] kasan_atomics_helper+0x1148/0x5450 [ 15.851097] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.851121] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.851148] ? kasan_atomics+0x152/0x310 [ 15.851176] kasan_atomics+0x1dc/0x310 [ 15.851200] ? __pfx_kasan_atomics+0x10/0x10 [ 15.851226] ? __pfx_read_tsc+0x10/0x10 [ 15.851247] ? ktime_get_ts64+0x86/0x230 [ 15.851273] kunit_try_run_case+0x1a5/0x480 [ 15.851298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851323] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.851348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.851374] ? __kthread_parkme+0x82/0x180 [ 15.851397] ? preempt_count_sub+0x50/0x80 [ 15.851422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.851473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.851501] kthread+0x337/0x6f0 [ 15.851521] ? trace_preempt_on+0x20/0xc0 [ 15.851546] ? __pfx_kthread+0x10/0x10 [ 15.851568] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.851591] ? calculate_sigpending+0x7b/0xa0 [ 15.851617] ? __pfx_kthread+0x10/0x10 [ 15.851660] ret_from_fork+0x116/0x1d0 [ 15.851680] ? __pfx_kthread+0x10/0x10 [ 15.851701] ret_from_fork_asm+0x1a/0x30 [ 15.851733] </TASK> [ 15.851755] [ 15.859774] Allocated by task 283: [ 15.859962] kasan_save_stack+0x45/0x70 [ 15.860166] kasan_save_track+0x18/0x40 [ 15.860439] kasan_save_alloc_info+0x3b/0x50 [ 15.860769] __kasan_kmalloc+0xb7/0xc0 [ 15.860914] __kmalloc_cache_noprof+0x189/0x420 [ 15.861185] kasan_atomics+0x95/0x310 [ 15.861452] kunit_try_run_case+0x1a5/0x480 [ 15.861771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.861992] kthread+0x337/0x6f0 [ 15.862152] ret_from_fork+0x116/0x1d0 [ 15.862322] ret_from_fork_asm+0x1a/0x30 [ 15.862469] [ 15.862567] The buggy address belongs to the object at ffff888103ad1980 [ 15.862567] which belongs to the cache kmalloc-64 of size 64 [ 15.863837] The buggy address is located 0 bytes to the right of [ 15.863837] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.864282] [ 15.864359] The buggy address belongs to the physical page: [ 15.864531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.866683] flags: 0x200000000000000(node=0|zone=2) [ 15.868195] page_type: f5(slab) [ 15.869119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.871171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.872216] page dumped because: kasan: bad access detected [ 15.872409] [ 15.872482] Memory state around the buggy address: [ 15.872939] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.873780] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.874588] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.875477] ^ [ 15.875804] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.876030] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.876244] ================================================================== [ 16.176445] ================================================================== [ 16.176737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.177321] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.177970] [ 16.178074] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.178121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.178135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.178159] Call Trace: [ 16.178176] <TASK> [ 16.178195] dump_stack_lvl+0x73/0xb0 [ 16.178225] print_report+0xd1/0x650 [ 16.178251] ? __virt_addr_valid+0x1db/0x2d0 [ 16.178276] ? kasan_atomics_helper+0x1818/0x5450 [ 16.178300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.178326] ? kasan_atomics_helper+0x1818/0x5450 [ 16.178350] kasan_report+0x141/0x180 [ 16.178379] ? kasan_atomics_helper+0x1818/0x5450 [ 16.178407] kasan_check_range+0x10c/0x1c0 [ 16.178434] __kasan_check_write+0x18/0x20 [ 16.178457] kasan_atomics_helper+0x1818/0x5450 [ 16.178482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.178507] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.178534] ? kasan_atomics+0x152/0x310 [ 16.178561] kasan_atomics+0x1dc/0x310 [ 16.178586] ? __pfx_kasan_atomics+0x10/0x10 [ 16.178612] ? __pfx_read_tsc+0x10/0x10 [ 16.178633] ? ktime_get_ts64+0x86/0x230 [ 16.178881] kunit_try_run_case+0x1a5/0x480 [ 16.178914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.178941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.178968] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.178994] ? __kthread_parkme+0x82/0x180 [ 16.179016] ? preempt_count_sub+0x50/0x80 [ 16.179042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.179069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.179097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.179203] kthread+0x337/0x6f0 [ 16.179229] ? trace_preempt_on+0x20/0xc0 [ 16.179255] ? __pfx_kthread+0x10/0x10 [ 16.179279] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.179305] ? calculate_sigpending+0x7b/0xa0 [ 16.179331] ? __pfx_kthread+0x10/0x10 [ 16.179354] ret_from_fork+0x116/0x1d0 [ 16.179374] ? __pfx_kthread+0x10/0x10 [ 16.179397] ret_from_fork_asm+0x1a/0x30 [ 16.179431] </TASK> [ 16.179444] [ 16.190589] Allocated by task 283: [ 16.190960] kasan_save_stack+0x45/0x70 [ 16.191257] kasan_save_track+0x18/0x40 [ 16.191567] kasan_save_alloc_info+0x3b/0x50 [ 16.191892] __kasan_kmalloc+0xb7/0xc0 [ 16.192090] __kmalloc_cache_noprof+0x189/0x420 [ 16.192309] kasan_atomics+0x95/0x310 [ 16.192485] kunit_try_run_case+0x1a5/0x480 [ 16.192664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.193278] kthread+0x337/0x6f0 [ 16.193428] ret_from_fork+0x116/0x1d0 [ 16.193948] ret_from_fork_asm+0x1a/0x30 [ 16.194233] [ 16.194338] The buggy address belongs to the object at ffff888103ad1980 [ 16.194338] which belongs to the cache kmalloc-64 of size 64 [ 16.195194] The buggy address is located 0 bytes to the right of [ 16.195194] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.195997] [ 16.196220] The buggy address belongs to the physical page: [ 16.196535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.197092] flags: 0x200000000000000(node=0|zone=2) [ 16.197431] page_type: f5(slab) [ 16.197757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.198193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.198625] page dumped because: kasan: bad access detected [ 16.198996] [ 16.199198] Memory state around the buggy address: [ 16.199472] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.199838] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.200157] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.200465] ^ [ 16.200946] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.201349] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.201797] ================================================================== [ 15.501126] ================================================================== [ 15.501415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.501941] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.502299] [ 15.502455] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.502500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.502513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.502549] Call Trace: [ 15.502579] <TASK> [ 15.502595] dump_stack_lvl+0x73/0xb0 [ 15.502639] print_report+0xd1/0x650 [ 15.502682] ? __virt_addr_valid+0x1db/0x2d0 [ 15.502708] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.502732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.502828] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.502853] kasan_report+0x141/0x180 [ 15.502877] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.502904] kasan_check_range+0x10c/0x1c0 [ 15.502929] __kasan_check_write+0x18/0x20 [ 15.502958] kasan_atomics_helper+0x8f9/0x5450 [ 15.503014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.503038] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.503065] ? kasan_atomics+0x152/0x310 [ 15.503104] kasan_atomics+0x1dc/0x310 [ 15.503127] ? __pfx_kasan_atomics+0x10/0x10 [ 15.503152] ? __pfx_read_tsc+0x10/0x10 [ 15.503175] ? ktime_get_ts64+0x86/0x230 [ 15.503200] kunit_try_run_case+0x1a5/0x480 [ 15.503252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.503279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.503305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.503341] ? __kthread_parkme+0x82/0x180 [ 15.503363] ? preempt_count_sub+0x50/0x80 [ 15.503414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.503440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.503467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.503504] kthread+0x337/0x6f0 [ 15.503525] ? trace_preempt_on+0x20/0xc0 [ 15.503550] ? __pfx_kthread+0x10/0x10 [ 15.503572] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.503596] ? calculate_sigpending+0x7b/0xa0 [ 15.503621] ? __pfx_kthread+0x10/0x10 [ 15.503644] ret_from_fork+0x116/0x1d0 [ 15.503680] ? __pfx_kthread+0x10/0x10 [ 15.503702] ret_from_fork_asm+0x1a/0x30 [ 15.503734] </TASK> [ 15.503755] [ 15.513249] Allocated by task 283: [ 15.513719] kasan_save_stack+0x45/0x70 [ 15.514000] kasan_save_track+0x18/0x40 [ 15.514145] kasan_save_alloc_info+0x3b/0x50 [ 15.514357] __kasan_kmalloc+0xb7/0xc0 [ 15.514556] __kmalloc_cache_noprof+0x189/0x420 [ 15.514898] kasan_atomics+0x95/0x310 [ 15.515141] kunit_try_run_case+0x1a5/0x480 [ 15.515376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.515651] kthread+0x337/0x6f0 [ 15.515911] ret_from_fork+0x116/0x1d0 [ 15.516125] ret_from_fork_asm+0x1a/0x30 [ 15.516349] [ 15.516460] The buggy address belongs to the object at ffff888103ad1980 [ 15.516460] which belongs to the cache kmalloc-64 of size 64 [ 15.517180] The buggy address is located 0 bytes to the right of [ 15.517180] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.518203] [ 15.518374] The buggy address belongs to the physical page: [ 15.518672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.519126] flags: 0x200000000000000(node=0|zone=2) [ 15.519386] page_type: f5(slab) [ 15.519510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.520056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.520502] page dumped because: kasan: bad access detected [ 15.520820] [ 15.520894] Memory state around the buggy address: [ 15.521108] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.521436] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.521870] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.522157] ^ [ 15.522313] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.522640] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.523211] ================================================================== [ 16.203025] ================================================================== [ 16.203345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.203929] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.204479] [ 16.204711] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.204881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.204898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.204920] Call Trace: [ 16.204938] <TASK> [ 16.204956] dump_stack_lvl+0x73/0xb0 [ 16.204988] print_report+0xd1/0x650 [ 16.205012] ? __virt_addr_valid+0x1db/0x2d0 [ 16.205037] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.205060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.205086] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.205110] kasan_report+0x141/0x180 [ 16.205134] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.205161] kasan_check_range+0x10c/0x1c0 [ 16.205187] __kasan_check_write+0x18/0x20 [ 16.205208] kasan_atomics_helper+0x18b1/0x5450 [ 16.205233] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.205258] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.205284] ? kasan_atomics+0x152/0x310 [ 16.205312] kasan_atomics+0x1dc/0x310 [ 16.205335] ? __pfx_kasan_atomics+0x10/0x10 [ 16.205361] ? __pfx_read_tsc+0x10/0x10 [ 16.205384] ? ktime_get_ts64+0x86/0x230 [ 16.205410] kunit_try_run_case+0x1a5/0x480 [ 16.205436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.205460] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.205487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.205513] ? __kthread_parkme+0x82/0x180 [ 16.205534] ? preempt_count_sub+0x50/0x80 [ 16.205560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.205586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.205612] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.205639] kthread+0x337/0x6f0 [ 16.205673] ? trace_preempt_on+0x20/0xc0 [ 16.205698] ? __pfx_kthread+0x10/0x10 [ 16.205720] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.205743] ? calculate_sigpending+0x7b/0xa0 [ 16.205781] ? __pfx_kthread+0x10/0x10 [ 16.205804] ret_from_fork+0x116/0x1d0 [ 16.205823] ? __pfx_kthread+0x10/0x10 [ 16.205845] ret_from_fork_asm+0x1a/0x30 [ 16.205877] </TASK> [ 16.205889] [ 16.216727] Allocated by task 283: [ 16.217143] kasan_save_stack+0x45/0x70 [ 16.217425] kasan_save_track+0x18/0x40 [ 16.217755] kasan_save_alloc_info+0x3b/0x50 [ 16.218075] __kasan_kmalloc+0xb7/0xc0 [ 16.218355] __kmalloc_cache_noprof+0x189/0x420 [ 16.218596] kasan_atomics+0x95/0x310 [ 16.218974] kunit_try_run_case+0x1a5/0x480 [ 16.219284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.219626] kthread+0x337/0x6f0 [ 16.219893] ret_from_fork+0x116/0x1d0 [ 16.220107] ret_from_fork_asm+0x1a/0x30 [ 16.220288] [ 16.220378] The buggy address belongs to the object at ffff888103ad1980 [ 16.220378] which belongs to the cache kmalloc-64 of size 64 [ 16.221355] The buggy address is located 0 bytes to the right of [ 16.221355] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.222056] [ 16.222339] The buggy address belongs to the physical page: [ 16.222603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.223051] flags: 0x200000000000000(node=0|zone=2) [ 16.223368] page_type: f5(slab) [ 16.223619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.224139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.224554] page dumped because: kasan: bad access detected [ 16.224965] [ 16.225044] Memory state around the buggy address: [ 16.225405] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.225860] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.226173] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.226478] ^ [ 16.227014] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.227304] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.227728] ================================================================== [ 15.647002] ================================================================== [ 15.647553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.648209] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.648540] [ 15.648650] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.648695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.648708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.648728] Call Trace: [ 15.648742] <TASK> [ 15.648769] dump_stack_lvl+0x73/0xb0 [ 15.648801] print_report+0xd1/0x650 [ 15.648825] ? __virt_addr_valid+0x1db/0x2d0 [ 15.648849] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.648872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.648896] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.648920] kasan_report+0x141/0x180 [ 15.648942] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.648970] __asan_report_load4_noabort+0x18/0x20 [ 15.648996] kasan_atomics_helper+0x4a84/0x5450 [ 15.649020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.649044] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.649071] ? kasan_atomics+0x152/0x310 [ 15.649098] kasan_atomics+0x1dc/0x310 [ 15.649121] ? __pfx_kasan_atomics+0x10/0x10 [ 15.649147] ? __pfx_read_tsc+0x10/0x10 [ 15.649168] ? ktime_get_ts64+0x86/0x230 [ 15.649194] kunit_try_run_case+0x1a5/0x480 [ 15.649219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.649243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.649268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.649293] ? __kthread_parkme+0x82/0x180 [ 15.649314] ? preempt_count_sub+0x50/0x80 [ 15.649339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.649365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.649391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.649418] kthread+0x337/0x6f0 [ 15.649437] ? trace_preempt_on+0x20/0xc0 [ 15.649462] ? __pfx_kthread+0x10/0x10 [ 15.649484] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.649508] ? calculate_sigpending+0x7b/0xa0 [ 15.649532] ? __pfx_kthread+0x10/0x10 [ 15.649555] ret_from_fork+0x116/0x1d0 [ 15.649575] ? __pfx_kthread+0x10/0x10 [ 15.649596] ret_from_fork_asm+0x1a/0x30 [ 15.649628] </TASK> [ 15.649639] [ 15.656801] Allocated by task 283: [ 15.656975] kasan_save_stack+0x45/0x70 [ 15.657152] kasan_save_track+0x18/0x40 [ 15.657289] kasan_save_alloc_info+0x3b/0x50 [ 15.657486] __kasan_kmalloc+0xb7/0xc0 [ 15.657701] __kmalloc_cache_noprof+0x189/0x420 [ 15.657941] kasan_atomics+0x95/0x310 [ 15.658115] kunit_try_run_case+0x1a5/0x480 [ 15.658268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.658524] kthread+0x337/0x6f0 [ 15.658664] ret_from_fork+0x116/0x1d0 [ 15.658877] ret_from_fork_asm+0x1a/0x30 [ 15.659049] [ 15.659151] The buggy address belongs to the object at ffff888103ad1980 [ 15.659151] which belongs to the cache kmalloc-64 of size 64 [ 15.659596] The buggy address is located 0 bytes to the right of [ 15.659596] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.660269] [ 15.660372] The buggy address belongs to the physical page: [ 15.660598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.660918] flags: 0x200000000000000(node=0|zone=2) [ 15.661091] page_type: f5(slab) [ 15.661214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.661446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.661769] page dumped because: kasan: bad access detected [ 15.662115] [ 15.662209] Memory state around the buggy address: [ 15.662435] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.662868] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.663111] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.663324] ^ [ 15.663478] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.663693] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.664254] ================================================================== [ 16.617734] ================================================================== [ 16.618121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.618575] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.619225] [ 16.619450] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.619511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.619629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.619655] Call Trace: [ 16.619673] <TASK> [ 16.619690] dump_stack_lvl+0x73/0xb0 [ 16.619737] print_report+0xd1/0x650 [ 16.619773] ? __virt_addr_valid+0x1db/0x2d0 [ 16.619796] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.619819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.619844] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.619867] kasan_report+0x141/0x180 [ 16.619890] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.619918] __asan_report_load8_noabort+0x18/0x20 [ 16.619947] kasan_atomics_helper+0x4fa5/0x5450 [ 16.619971] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.619995] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.620022] ? kasan_atomics+0x152/0x310 [ 16.620048] kasan_atomics+0x1dc/0x310 [ 16.620073] ? __pfx_kasan_atomics+0x10/0x10 [ 16.620099] ? __pfx_read_tsc+0x10/0x10 [ 16.620121] ? ktime_get_ts64+0x86/0x230 [ 16.620148] kunit_try_run_case+0x1a5/0x480 [ 16.620173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.620197] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.620223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.620249] ? __kthread_parkme+0x82/0x180 [ 16.620270] ? preempt_count_sub+0x50/0x80 [ 16.620296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.620321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.620347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.620373] kthread+0x337/0x6f0 [ 16.620394] ? trace_preempt_on+0x20/0xc0 [ 16.620419] ? __pfx_kthread+0x10/0x10 [ 16.620440] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.620463] ? calculate_sigpending+0x7b/0xa0 [ 16.620489] ? __pfx_kthread+0x10/0x10 [ 16.620512] ret_from_fork+0x116/0x1d0 [ 16.620531] ? __pfx_kthread+0x10/0x10 [ 16.620552] ret_from_fork_asm+0x1a/0x30 [ 16.620585] </TASK> [ 16.620597] [ 16.632839] Allocated by task 283: [ 16.633009] kasan_save_stack+0x45/0x70 [ 16.633197] kasan_save_track+0x18/0x40 [ 16.633374] kasan_save_alloc_info+0x3b/0x50 [ 16.633570] __kasan_kmalloc+0xb7/0xc0 [ 16.634107] __kmalloc_cache_noprof+0x189/0x420 [ 16.634459] kasan_atomics+0x95/0x310 [ 16.635030] kunit_try_run_case+0x1a5/0x480 [ 16.635367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.636003] kthread+0x337/0x6f0 [ 16.636251] ret_from_fork+0x116/0x1d0 [ 16.636440] ret_from_fork_asm+0x1a/0x30 [ 16.636626] [ 16.637037] The buggy address belongs to the object at ffff888103ad1980 [ 16.637037] which belongs to the cache kmalloc-64 of size 64 [ 16.637531] The buggy address is located 0 bytes to the right of [ 16.637531] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.638675] [ 16.638910] The buggy address belongs to the physical page: [ 16.639348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.639896] flags: 0x200000000000000(node=0|zone=2) [ 16.640321] page_type: f5(slab) [ 16.640624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.641103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.641423] page dumped because: kasan: bad access detected [ 16.641656] [ 16.641993] Memory state around the buggy address: [ 16.642204] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.642469] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.642685] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.643006] ^ [ 16.643160] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.643375] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.643583] ================================================================== [ 15.618241] ================================================================== [ 15.619102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.619379] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.619609] [ 15.619931] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.620192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.620210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.620233] Call Trace: [ 15.620252] <TASK> [ 15.620270] dump_stack_lvl+0x73/0xb0 [ 15.620301] print_report+0xd1/0x650 [ 15.620335] ? __virt_addr_valid+0x1db/0x2d0 [ 15.620359] ? kasan_atomics_helper+0xc70/0x5450 [ 15.620381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.620406] ? kasan_atomics_helper+0xc70/0x5450 [ 15.620430] kasan_report+0x141/0x180 [ 15.620453] ? kasan_atomics_helper+0xc70/0x5450 [ 15.620480] kasan_check_range+0x10c/0x1c0 [ 15.620505] __kasan_check_write+0x18/0x20 [ 15.620526] kasan_atomics_helper+0xc70/0x5450 [ 15.620550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.620574] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.620601] ? kasan_atomics+0x152/0x310 [ 15.620628] kasan_atomics+0x1dc/0x310 [ 15.620678] ? __pfx_kasan_atomics+0x10/0x10 [ 15.620705] ? __pfx_read_tsc+0x10/0x10 [ 15.620728] ? ktime_get_ts64+0x86/0x230 [ 15.620764] kunit_try_run_case+0x1a5/0x480 [ 15.620790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.620814] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.620840] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.620866] ? __kthread_parkme+0x82/0x180 [ 15.620888] ? preempt_count_sub+0x50/0x80 [ 15.620913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.620939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.620965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.620992] kthread+0x337/0x6f0 [ 15.621011] ? trace_preempt_on+0x20/0xc0 [ 15.621036] ? __pfx_kthread+0x10/0x10 [ 15.621058] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.621081] ? calculate_sigpending+0x7b/0xa0 [ 15.621106] ? __pfx_kthread+0x10/0x10 [ 15.621129] ret_from_fork+0x116/0x1d0 [ 15.621149] ? __pfx_kthread+0x10/0x10 [ 15.621171] ret_from_fork_asm+0x1a/0x30 [ 15.621203] </TASK> [ 15.621215] [ 15.634279] Allocated by task 283: [ 15.634679] kasan_save_stack+0x45/0x70 [ 15.634950] kasan_save_track+0x18/0x40 [ 15.635243] kasan_save_alloc_info+0x3b/0x50 [ 15.635592] __kasan_kmalloc+0xb7/0xc0 [ 15.635948] __kmalloc_cache_noprof+0x189/0x420 [ 15.636278] kasan_atomics+0x95/0x310 [ 15.636461] kunit_try_run_case+0x1a5/0x480 [ 15.636853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.637138] kthread+0x337/0x6f0 [ 15.637417] ret_from_fork+0x116/0x1d0 [ 15.637609] ret_from_fork_asm+0x1a/0x30 [ 15.638143] [ 15.638231] The buggy address belongs to the object at ffff888103ad1980 [ 15.638231] which belongs to the cache kmalloc-64 of size 64 [ 15.639314] The buggy address is located 0 bytes to the right of [ 15.639314] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.640093] [ 15.640204] The buggy address belongs to the physical page: [ 15.640445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.640946] flags: 0x200000000000000(node=0|zone=2) [ 15.641350] page_type: f5(slab) [ 15.641641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.641978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.642289] page dumped because: kasan: bad access detected [ 15.642528] [ 15.642617] Memory state around the buggy address: [ 15.643179] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.643669] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.644170] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.644643] ^ [ 15.645000] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.645304] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.645597] ================================================================== [ 16.100791] ================================================================== [ 16.101140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.101482] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.101945] [ 16.102031] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.102073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.102085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.102106] Call Trace: [ 16.102120] <TASK> [ 16.102135] dump_stack_lvl+0x73/0xb0 [ 16.102163] print_report+0xd1/0x650 [ 16.102187] ? __virt_addr_valid+0x1db/0x2d0 [ 16.102211] ? kasan_atomics_helper+0x164f/0x5450 [ 16.102234] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.102258] ? kasan_atomics_helper+0x164f/0x5450 [ 16.102282] kasan_report+0x141/0x180 [ 16.102304] ? kasan_atomics_helper+0x164f/0x5450 [ 16.102332] kasan_check_range+0x10c/0x1c0 [ 16.102356] __kasan_check_write+0x18/0x20 [ 16.102384] kasan_atomics_helper+0x164f/0x5450 [ 16.102407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.102431] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.102458] ? kasan_atomics+0x152/0x310 [ 16.102486] kasan_atomics+0x1dc/0x310 [ 16.102509] ? __pfx_kasan_atomics+0x10/0x10 [ 16.102534] ? __pfx_read_tsc+0x10/0x10 [ 16.102556] ? ktime_get_ts64+0x86/0x230 [ 16.102582] kunit_try_run_case+0x1a5/0x480 [ 16.102607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.102631] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.102658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.102683] ? __kthread_parkme+0x82/0x180 [ 16.102704] ? preempt_count_sub+0x50/0x80 [ 16.102730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.102767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.102793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.102819] kthread+0x337/0x6f0 [ 16.102849] ? trace_preempt_on+0x20/0xc0 [ 16.102873] ? __pfx_kthread+0x10/0x10 [ 16.102895] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.102918] ? calculate_sigpending+0x7b/0xa0 [ 16.102942] ? __pfx_kthread+0x10/0x10 [ 16.102965] ret_from_fork+0x116/0x1d0 [ 16.102984] ? __pfx_kthread+0x10/0x10 [ 16.103005] ret_from_fork_asm+0x1a/0x30 [ 16.103037] </TASK> [ 16.103049] [ 16.110773] Allocated by task 283: [ 16.110931] kasan_save_stack+0x45/0x70 [ 16.111099] kasan_save_track+0x18/0x40 [ 16.111235] kasan_save_alloc_info+0x3b/0x50 [ 16.111448] __kasan_kmalloc+0xb7/0xc0 [ 16.111635] __kmalloc_cache_noprof+0x189/0x420 [ 16.111862] kasan_atomics+0x95/0x310 [ 16.112026] kunit_try_run_case+0x1a5/0x480 [ 16.112174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.112357] kthread+0x337/0x6f0 [ 16.112513] ret_from_fork+0x116/0x1d0 [ 16.112698] ret_from_fork_asm+0x1a/0x30 [ 16.112904] [ 16.112997] The buggy address belongs to the object at ffff888103ad1980 [ 16.112997] which belongs to the cache kmalloc-64 of size 64 [ 16.113490] The buggy address is located 0 bytes to the right of [ 16.113490] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.113892] [ 16.113989] The buggy address belongs to the physical page: [ 16.114244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.114600] flags: 0x200000000000000(node=0|zone=2) [ 16.114914] page_type: f5(slab) [ 16.115313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.115954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.116195] page dumped because: kasan: bad access detected [ 16.116363] [ 16.116432] Memory state around the buggy address: [ 16.116581] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.118357] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.118666] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.118999] ^ [ 16.119220] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.119586] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.121457] ================================================================== [ 16.514163] ================================================================== [ 16.514540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.514908] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.515139] [ 16.515223] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.515265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.515277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.515298] Call Trace: [ 16.515315] <TASK> [ 16.515331] dump_stack_lvl+0x73/0xb0 [ 16.515369] print_report+0xd1/0x650 [ 16.515393] ? __virt_addr_valid+0x1db/0x2d0 [ 16.515416] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.515451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.515474] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.515498] kasan_report+0x141/0x180 [ 16.515520] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.515548] __asan_report_load8_noabort+0x18/0x20 [ 16.515574] kasan_atomics_helper+0x4f98/0x5450 [ 16.515598] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.515622] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.515648] ? kasan_atomics+0x152/0x310 [ 16.515675] kasan_atomics+0x1dc/0x310 [ 16.515698] ? __pfx_kasan_atomics+0x10/0x10 [ 16.515724] ? __pfx_read_tsc+0x10/0x10 [ 16.515754] ? ktime_get_ts64+0x86/0x230 [ 16.515779] kunit_try_run_case+0x1a5/0x480 [ 16.515804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.515828] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.515853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.515878] ? __kthread_parkme+0x82/0x180 [ 16.515899] ? preempt_count_sub+0x50/0x80 [ 16.515923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.515949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.515976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.516002] kthread+0x337/0x6f0 [ 16.516029] ? trace_preempt_on+0x20/0xc0 [ 16.516063] ? __pfx_kthread+0x10/0x10 [ 16.516084] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.516107] ? calculate_sigpending+0x7b/0xa0 [ 16.516143] ? __pfx_kthread+0x10/0x10 [ 16.516165] ret_from_fork+0x116/0x1d0 [ 16.516184] ? __pfx_kthread+0x10/0x10 [ 16.516206] ret_from_fork_asm+0x1a/0x30 [ 16.516237] </TASK> [ 16.516249] [ 16.524277] Allocated by task 283: [ 16.524449] kasan_save_stack+0x45/0x70 [ 16.524632] kasan_save_track+0x18/0x40 [ 16.524893] kasan_save_alloc_info+0x3b/0x50 [ 16.525134] __kasan_kmalloc+0xb7/0xc0 [ 16.525312] __kmalloc_cache_noprof+0x189/0x420 [ 16.525639] kasan_atomics+0x95/0x310 [ 16.525815] kunit_try_run_case+0x1a5/0x480 [ 16.526026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.526346] kthread+0x337/0x6f0 [ 16.526517] ret_from_fork+0x116/0x1d0 [ 16.526715] ret_from_fork_asm+0x1a/0x30 [ 16.526931] [ 16.527046] The buggy address belongs to the object at ffff888103ad1980 [ 16.527046] which belongs to the cache kmalloc-64 of size 64 [ 16.527588] The buggy address is located 0 bytes to the right of [ 16.527588] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.528027] [ 16.528098] The buggy address belongs to the physical page: [ 16.528263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.528491] flags: 0x200000000000000(node=0|zone=2) [ 16.528644] page_type: f5(slab) [ 16.528784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.529133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.529486] page dumped because: kasan: bad access detected [ 16.529832] [ 16.529925] Memory state around the buggy address: [ 16.530144] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.530463] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.530822] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.531032] ^ [ 16.531180] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.531386] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.531588] ================================================================== [ 16.349315] ================================================================== [ 16.349610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.350709] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.351034] [ 16.351148] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.351347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.351361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.351383] Call Trace: [ 16.351401] <TASK> [ 16.351417] dump_stack_lvl+0x73/0xb0 [ 16.351447] print_report+0xd1/0x650 [ 16.351471] ? __virt_addr_valid+0x1db/0x2d0 [ 16.351496] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.351519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.351543] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.351566] kasan_report+0x141/0x180 [ 16.351590] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.351617] __asan_report_load8_noabort+0x18/0x20 [ 16.351644] kasan_atomics_helper+0x4f30/0x5450 [ 16.351681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.351706] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.351733] ? kasan_atomics+0x152/0x310 [ 16.351773] kasan_atomics+0x1dc/0x310 [ 16.351796] ? __pfx_kasan_atomics+0x10/0x10 [ 16.351822] ? __pfx_read_tsc+0x10/0x10 [ 16.351844] ? ktime_get_ts64+0x86/0x230 [ 16.351869] kunit_try_run_case+0x1a5/0x480 [ 16.351895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.351920] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.351946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.351972] ? __kthread_parkme+0x82/0x180 [ 16.351993] ? preempt_count_sub+0x50/0x80 [ 16.352019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.352045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.352071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.352098] kthread+0x337/0x6f0 [ 16.352118] ? trace_preempt_on+0x20/0xc0 [ 16.352143] ? __pfx_kthread+0x10/0x10 [ 16.352165] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.352188] ? calculate_sigpending+0x7b/0xa0 [ 16.352212] ? __pfx_kthread+0x10/0x10 [ 16.352235] ret_from_fork+0x116/0x1d0 [ 16.352254] ? __pfx_kthread+0x10/0x10 [ 16.352275] ret_from_fork_asm+0x1a/0x30 [ 16.352308] </TASK> [ 16.352319] [ 16.362249] Allocated by task 283: [ 16.362411] kasan_save_stack+0x45/0x70 [ 16.362617] kasan_save_track+0x18/0x40 [ 16.363127] kasan_save_alloc_info+0x3b/0x50 [ 16.363319] __kasan_kmalloc+0xb7/0xc0 [ 16.363640] __kmalloc_cache_noprof+0x189/0x420 [ 16.363948] kasan_atomics+0x95/0x310 [ 16.364235] kunit_try_run_case+0x1a5/0x480 [ 16.364430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.364802] kthread+0x337/0x6f0 [ 16.364984] ret_from_fork+0x116/0x1d0 [ 16.365162] ret_from_fork_asm+0x1a/0x30 [ 16.365351] [ 16.365441] The buggy address belongs to the object at ffff888103ad1980 [ 16.365441] which belongs to the cache kmalloc-64 of size 64 [ 16.366207] The buggy address is located 0 bytes to the right of [ 16.366207] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.367030] [ 16.367134] The buggy address belongs to the physical page: [ 16.367508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.367933] flags: 0x200000000000000(node=0|zone=2) [ 16.368251] page_type: f5(slab) [ 16.368425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.368879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.369258] page dumped because: kasan: bad access detected [ 16.369493] [ 16.369574] Memory state around the buggy address: [ 16.370038] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.370441] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.370902] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.371275] ^ [ 16.371559] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.372038] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.372333] ================================================================== [ 15.445868] ================================================================== [ 15.446128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.446826] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.447471] [ 15.447561] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.447605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.447617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.447638] Call Trace: [ 15.447667] <TASK> [ 15.447686] dump_stack_lvl+0x73/0xb0 [ 15.447718] print_report+0xd1/0x650 [ 15.447742] ? __virt_addr_valid+0x1db/0x2d0 [ 15.447779] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.447803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.447828] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.447851] kasan_report+0x141/0x180 [ 15.447874] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.447903] kasan_check_range+0x10c/0x1c0 [ 15.447930] __kasan_check_write+0x18/0x20 [ 15.447951] kasan_atomics_helper+0x7c7/0x5450 [ 15.447975] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.447999] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.448026] ? kasan_atomics+0x152/0x310 [ 15.448054] kasan_atomics+0x1dc/0x310 [ 15.448078] ? __pfx_kasan_atomics+0x10/0x10 [ 15.448103] ? __pfx_read_tsc+0x10/0x10 [ 15.448126] ? ktime_get_ts64+0x86/0x230 [ 15.448152] kunit_try_run_case+0x1a5/0x480 [ 15.448178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.448203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.448229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.448268] ? __kthread_parkme+0x82/0x180 [ 15.448298] ? preempt_count_sub+0x50/0x80 [ 15.448345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.448371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.448397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.448424] kthread+0x337/0x6f0 [ 15.448444] ? trace_preempt_on+0x20/0xc0 [ 15.448470] ? __pfx_kthread+0x10/0x10 [ 15.448491] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.448514] ? calculate_sigpending+0x7b/0xa0 [ 15.448540] ? __pfx_kthread+0x10/0x10 [ 15.448563] ret_from_fork+0x116/0x1d0 [ 15.448583] ? __pfx_kthread+0x10/0x10 [ 15.448605] ret_from_fork_asm+0x1a/0x30 [ 15.448638] </TASK> [ 15.448659] [ 15.462146] Allocated by task 283: [ 15.462278] kasan_save_stack+0x45/0x70 [ 15.462429] kasan_save_track+0x18/0x40 [ 15.462563] kasan_save_alloc_info+0x3b/0x50 [ 15.462982] __kasan_kmalloc+0xb7/0xc0 [ 15.463407] __kmalloc_cache_noprof+0x189/0x420 [ 15.463903] kasan_atomics+0x95/0x310 [ 15.464407] kunit_try_run_case+0x1a5/0x480 [ 15.464906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.465418] kthread+0x337/0x6f0 [ 15.465766] ret_from_fork+0x116/0x1d0 [ 15.466235] ret_from_fork_asm+0x1a/0x30 [ 15.466837] [ 15.467062] The buggy address belongs to the object at ffff888103ad1980 [ 15.467062] which belongs to the cache kmalloc-64 of size 64 [ 15.467596] The buggy address is located 0 bytes to the right of [ 15.467596] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.468841] [ 15.469117] The buggy address belongs to the physical page: [ 15.469466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.469948] flags: 0x200000000000000(node=0|zone=2) [ 15.470423] page_type: f5(slab) [ 15.470793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.471379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.471607] page dumped because: kasan: bad access detected [ 15.472321] [ 15.472485] Memory state around the buggy address: [ 15.473039] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.473678] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.474205] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.474423] ^ [ 15.474574] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.475192] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.475907] ================================================================== [ 16.012136] ================================================================== [ 16.012535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 16.012892] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.014045] [ 16.014130] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.014174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.014187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.014208] Call Trace: [ 16.014224] <TASK> [ 16.014240] dump_stack_lvl+0x73/0xb0 [ 16.014268] print_report+0xd1/0x650 [ 16.014290] ? __virt_addr_valid+0x1db/0x2d0 [ 16.014314] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.014337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.014366] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.014390] kasan_report+0x141/0x180 [ 16.014413] ? kasan_atomics_helper+0x4eae/0x5450 [ 16.014441] __asan_report_load8_noabort+0x18/0x20 [ 16.014467] kasan_atomics_helper+0x4eae/0x5450 [ 16.014492] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.014516] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.014544] ? kasan_atomics+0x152/0x310 [ 16.014574] kasan_atomics+0x1dc/0x310 [ 16.014597] ? __pfx_kasan_atomics+0x10/0x10 [ 16.014623] ? __pfx_read_tsc+0x10/0x10 [ 16.014645] ? ktime_get_ts64+0x86/0x230 [ 16.014683] kunit_try_run_case+0x1a5/0x480 [ 16.014708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014733] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.014770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.014794] ? __kthread_parkme+0x82/0x180 [ 16.014816] ? preempt_count_sub+0x50/0x80 [ 16.014841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.014892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.014918] kthread+0x337/0x6f0 [ 16.014937] ? trace_preempt_on+0x20/0xc0 [ 16.014962] ? __pfx_kthread+0x10/0x10 [ 16.014984] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.015006] ? calculate_sigpending+0x7b/0xa0 [ 16.015031] ? __pfx_kthread+0x10/0x10 [ 16.015053] ret_from_fork+0x116/0x1d0 [ 16.015073] ? __pfx_kthread+0x10/0x10 [ 16.015094] ret_from_fork_asm+0x1a/0x30 [ 16.015126] </TASK> [ 16.015137] [ 16.022757] Allocated by task 283: [ 16.022930] kasan_save_stack+0x45/0x70 [ 16.023073] kasan_save_track+0x18/0x40 [ 16.023207] kasan_save_alloc_info+0x3b/0x50 [ 16.023357] __kasan_kmalloc+0xb7/0xc0 [ 16.023526] __kmalloc_cache_noprof+0x189/0x420 [ 16.023715] kasan_atomics+0x95/0x310 [ 16.023905] kunit_try_run_case+0x1a5/0x480 [ 16.024117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.024301] kthread+0x337/0x6f0 [ 16.024425] ret_from_fork+0x116/0x1d0 [ 16.024558] ret_from_fork_asm+0x1a/0x30 [ 16.024758] [ 16.024855] The buggy address belongs to the object at ffff888103ad1980 [ 16.024855] which belongs to the cache kmalloc-64 of size 64 [ 16.025390] The buggy address is located 0 bytes to the right of [ 16.025390] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.025890] [ 16.025964] The buggy address belongs to the physical page: [ 16.026167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.026536] flags: 0x200000000000000(node=0|zone=2) [ 16.026939] page_type: f5(slab) [ 16.027109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.027417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.027762] page dumped because: kasan: bad access detected [ 16.027972] [ 16.028042] Memory state around the buggy address: [ 16.028196] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.028435] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.028765] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.029141] ^ [ 16.029298] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.029512] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.029805] ================================================================== [ 15.737599] ================================================================== [ 15.738731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.739192] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.739776] [ 15.740002] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.740049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.740061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.740082] Call Trace: [ 15.740097] <TASK> [ 15.740112] dump_stack_lvl+0x73/0xb0 [ 15.740143] print_report+0xd1/0x650 [ 15.740166] ? __virt_addr_valid+0x1db/0x2d0 [ 15.740210] ? kasan_atomics_helper+0xf10/0x5450 [ 15.740233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.740258] ? kasan_atomics_helper+0xf10/0x5450 [ 15.740281] kasan_report+0x141/0x180 [ 15.740303] ? kasan_atomics_helper+0xf10/0x5450 [ 15.740330] kasan_check_range+0x10c/0x1c0 [ 15.740355] __kasan_check_write+0x18/0x20 [ 15.740376] kasan_atomics_helper+0xf10/0x5450 [ 15.740400] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.740424] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.740450] ? kasan_atomics+0x152/0x310 [ 15.740477] kasan_atomics+0x1dc/0x310 [ 15.740501] ? __pfx_kasan_atomics+0x10/0x10 [ 15.740526] ? __pfx_read_tsc+0x10/0x10 [ 15.740548] ? ktime_get_ts64+0x86/0x230 [ 15.740573] kunit_try_run_case+0x1a5/0x480 [ 15.740598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.740622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.740662] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.740688] ? __kthread_parkme+0x82/0x180 [ 15.740709] ? preempt_count_sub+0x50/0x80 [ 15.740734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.740771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.740796] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.740823] kthread+0x337/0x6f0 [ 15.740843] ? trace_preempt_on+0x20/0xc0 [ 15.740868] ? __pfx_kthread+0x10/0x10 [ 15.740889] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.740912] ? calculate_sigpending+0x7b/0xa0 [ 15.740937] ? __pfx_kthread+0x10/0x10 [ 15.740959] ret_from_fork+0x116/0x1d0 [ 15.740978] ? __pfx_kthread+0x10/0x10 [ 15.741001] ret_from_fork_asm+0x1a/0x30 [ 15.741033] </TASK> [ 15.741044] [ 15.753647] Allocated by task 283: [ 15.753986] kasan_save_stack+0x45/0x70 [ 15.754191] kasan_save_track+0x18/0x40 [ 15.754329] kasan_save_alloc_info+0x3b/0x50 [ 15.754486] __kasan_kmalloc+0xb7/0xc0 [ 15.754623] __kmalloc_cache_noprof+0x189/0x420 [ 15.755047] kasan_atomics+0x95/0x310 [ 15.755374] kunit_try_run_case+0x1a5/0x480 [ 15.755798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.756278] kthread+0x337/0x6f0 [ 15.756569] ret_from_fork+0x116/0x1d0 [ 15.756935] ret_from_fork_asm+0x1a/0x30 [ 15.757295] [ 15.757456] The buggy address belongs to the object at ffff888103ad1980 [ 15.757456] which belongs to the cache kmalloc-64 of size 64 [ 15.758322] The buggy address is located 0 bytes to the right of [ 15.758322] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.758718] [ 15.758886] The buggy address belongs to the physical page: [ 15.759355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.760255] flags: 0x200000000000000(node=0|zone=2) [ 15.760830] page_type: f5(slab) [ 15.761121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.761788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.762120] page dumped because: kasan: bad access detected [ 15.762294] [ 15.762368] Memory state around the buggy address: [ 15.762523] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.762834] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.763430] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.764104] ^ [ 15.764514] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765149] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765767] ================================================================== [ 15.571889] ================================================================== [ 15.572419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.572871] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.573394] [ 15.573554] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.573713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.573729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.573759] Call Trace: [ 15.573774] <TASK> [ 15.573790] dump_stack_lvl+0x73/0xb0 [ 15.573821] print_report+0xd1/0x650 [ 15.573845] ? __virt_addr_valid+0x1db/0x2d0 [ 15.573869] ? kasan_atomics_helper+0xac7/0x5450 [ 15.573891] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.573916] ? kasan_atomics_helper+0xac7/0x5450 [ 15.573939] kasan_report+0x141/0x180 [ 15.573962] ? kasan_atomics_helper+0xac7/0x5450 [ 15.573989] kasan_check_range+0x10c/0x1c0 [ 15.574014] __kasan_check_write+0x18/0x20 [ 15.574035] kasan_atomics_helper+0xac7/0x5450 [ 15.574059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.574083] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.574110] ? kasan_atomics+0x152/0x310 [ 15.574137] kasan_atomics+0x1dc/0x310 [ 15.574160] ? __pfx_kasan_atomics+0x10/0x10 [ 15.574187] ? __pfx_read_tsc+0x10/0x10 [ 15.574210] ? ktime_get_ts64+0x86/0x230 [ 15.574235] kunit_try_run_case+0x1a5/0x480 [ 15.574261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.574286] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.574311] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.574337] ? __kthread_parkme+0x82/0x180 [ 15.574358] ? preempt_count_sub+0x50/0x80 [ 15.574390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.574416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.574442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.574470] kthread+0x337/0x6f0 [ 15.574490] ? trace_preempt_on+0x20/0xc0 [ 15.574516] ? __pfx_kthread+0x10/0x10 [ 15.574538] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.574562] ? calculate_sigpending+0x7b/0xa0 [ 15.574587] ? __pfx_kthread+0x10/0x10 [ 15.574609] ret_from_fork+0x116/0x1d0 [ 15.574629] ? __pfx_kthread+0x10/0x10 [ 15.574652] ret_from_fork_asm+0x1a/0x30 [ 15.574687] </TASK> [ 15.574699] [ 15.582606] Allocated by task 283: [ 15.582740] kasan_save_stack+0x45/0x70 [ 15.582891] kasan_save_track+0x18/0x40 [ 15.583063] kasan_save_alloc_info+0x3b/0x50 [ 15.583278] __kasan_kmalloc+0xb7/0xc0 [ 15.583469] __kmalloc_cache_noprof+0x189/0x420 [ 15.583848] kasan_atomics+0x95/0x310 [ 15.584049] kunit_try_run_case+0x1a5/0x480 [ 15.584256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.584497] kthread+0x337/0x6f0 [ 15.584661] ret_from_fork+0x116/0x1d0 [ 15.584864] ret_from_fork_asm+0x1a/0x30 [ 15.585107] [ 15.585203] The buggy address belongs to the object at ffff888103ad1980 [ 15.585203] which belongs to the cache kmalloc-64 of size 64 [ 15.585765] The buggy address is located 0 bytes to the right of [ 15.585765] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.586343] [ 15.586506] The buggy address belongs to the physical page: [ 15.586818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.587175] flags: 0x200000000000000(node=0|zone=2) [ 15.587486] page_type: f5(slab) [ 15.587660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.588029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.588291] page dumped because: kasan: bad access detected [ 15.588533] [ 15.588674] Memory state around the buggy address: [ 15.588940] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.589302] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.589649] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.589915] ^ [ 15.590178] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.590537] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.590965] ================================================================== [ 15.210345] ================================================================== [ 15.210583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.211422] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.212128] [ 15.212304] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.212347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.212359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.212379] Call Trace: [ 15.212395] <TASK> [ 15.212410] dump_stack_lvl+0x73/0xb0 [ 15.212440] print_report+0xd1/0x650 [ 15.212463] ? __virt_addr_valid+0x1db/0x2d0 [ 15.212486] ? kasan_atomics_helper+0x3df/0x5450 [ 15.212507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.212530] ? kasan_atomics_helper+0x3df/0x5450 [ 15.212552] kasan_report+0x141/0x180 [ 15.212574] ? kasan_atomics_helper+0x3df/0x5450 [ 15.212600] kasan_check_range+0x10c/0x1c0 [ 15.212624] __kasan_check_read+0x15/0x20 [ 15.212722] kasan_atomics_helper+0x3df/0x5450 [ 15.212756] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.212780] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.212806] ? kasan_atomics+0x152/0x310 [ 15.212833] kasan_atomics+0x1dc/0x310 [ 15.212856] ? __pfx_kasan_atomics+0x10/0x10 [ 15.212881] ? __pfx_read_tsc+0x10/0x10 [ 15.212901] ? ktime_get_ts64+0x86/0x230 [ 15.212926] kunit_try_run_case+0x1a5/0x480 [ 15.212951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.212974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.213000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.213024] ? __kthread_parkme+0x82/0x180 [ 15.213045] ? preempt_count_sub+0x50/0x80 [ 15.213069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.213094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.213119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.213146] kthread+0x337/0x6f0 [ 15.213165] ? trace_preempt_on+0x20/0xc0 [ 15.213189] ? __pfx_kthread+0x10/0x10 [ 15.213209] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.213231] ? calculate_sigpending+0x7b/0xa0 [ 15.213256] ? __pfx_kthread+0x10/0x10 [ 15.213278] ret_from_fork+0x116/0x1d0 [ 15.213297] ? __pfx_kthread+0x10/0x10 [ 15.213317] ret_from_fork_asm+0x1a/0x30 [ 15.213348] </TASK> [ 15.213358] [ 15.226219] Allocated by task 283: [ 15.226536] kasan_save_stack+0x45/0x70 [ 15.226987] kasan_save_track+0x18/0x40 [ 15.227333] kasan_save_alloc_info+0x3b/0x50 [ 15.227793] __kasan_kmalloc+0xb7/0xc0 [ 15.228138] __kmalloc_cache_noprof+0x189/0x420 [ 15.228358] kasan_atomics+0x95/0x310 [ 15.228492] kunit_try_run_case+0x1a5/0x480 [ 15.228707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.229196] kthread+0x337/0x6f0 [ 15.229490] ret_from_fork+0x116/0x1d0 [ 15.229898] ret_from_fork_asm+0x1a/0x30 [ 15.230259] [ 15.230416] The buggy address belongs to the object at ffff888103ad1980 [ 15.230416] which belongs to the cache kmalloc-64 of size 64 [ 15.231193] The buggy address is located 0 bytes to the right of [ 15.231193] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.231565] [ 15.231718] The buggy address belongs to the physical page: [ 15.232326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.233075] flags: 0x200000000000000(node=0|zone=2) [ 15.233537] page_type: f5(slab) [ 15.233970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.234243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.234477] page dumped because: kasan: bad access detected [ 15.234768] [ 15.234926] Memory state around the buggy address: [ 15.235341] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.236166] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.236867] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.237465] ^ [ 15.237889] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238109] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238322] ================================================================== [ 15.323282] ================================================================== [ 15.323577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.323880] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.324221] [ 15.324401] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.324463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.324475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.324496] Call Trace: [ 15.324510] <TASK> [ 15.324526] dump_stack_lvl+0x73/0xb0 [ 15.324554] print_report+0xd1/0x650 [ 15.324578] ? __virt_addr_valid+0x1db/0x2d0 [ 15.324601] ? kasan_atomics_helper+0x565/0x5450 [ 15.324624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.324673] ? kasan_atomics_helper+0x565/0x5450 [ 15.324697] kasan_report+0x141/0x180 [ 15.324722] ? kasan_atomics_helper+0x565/0x5450 [ 15.324763] kasan_check_range+0x10c/0x1c0 [ 15.324789] __kasan_check_write+0x18/0x20 [ 15.324809] kasan_atomics_helper+0x565/0x5450 [ 15.324834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.324872] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.324926] ? kasan_atomics+0x152/0x310 [ 15.324953] kasan_atomics+0x1dc/0x310 [ 15.324977] ? __pfx_kasan_atomics+0x10/0x10 [ 15.325005] ? __pfx_read_tsc+0x10/0x10 [ 15.325027] ? ktime_get_ts64+0x86/0x230 [ 15.325054] kunit_try_run_case+0x1a5/0x480 [ 15.325079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.325104] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.325129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.325155] ? __kthread_parkme+0x82/0x180 [ 15.325176] ? preempt_count_sub+0x50/0x80 [ 15.325201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.325227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.325253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.325280] kthread+0x337/0x6f0 [ 15.325300] ? trace_preempt_on+0x20/0xc0 [ 15.325325] ? __pfx_kthread+0x10/0x10 [ 15.325347] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.325370] ? calculate_sigpending+0x7b/0xa0 [ 15.325395] ? __pfx_kthread+0x10/0x10 [ 15.325419] ret_from_fork+0x116/0x1d0 [ 15.325440] ? __pfx_kthread+0x10/0x10 [ 15.325464] ret_from_fork_asm+0x1a/0x30 [ 15.325495] </TASK> [ 15.325506] [ 15.333718] Allocated by task 283: [ 15.333858] kasan_save_stack+0x45/0x70 [ 15.334170] kasan_save_track+0x18/0x40 [ 15.334370] kasan_save_alloc_info+0x3b/0x50 [ 15.334522] __kasan_kmalloc+0xb7/0xc0 [ 15.334681] __kmalloc_cache_noprof+0x189/0x420 [ 15.334850] kasan_atomics+0x95/0x310 [ 15.335011] kunit_try_run_case+0x1a5/0x480 [ 15.335217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.335471] kthread+0x337/0x6f0 [ 15.335654] ret_from_fork+0x116/0x1d0 [ 15.336062] ret_from_fork_asm+0x1a/0x30 [ 15.336280] [ 15.336353] The buggy address belongs to the object at ffff888103ad1980 [ 15.336353] which belongs to the cache kmalloc-64 of size 64 [ 15.336887] The buggy address is located 0 bytes to the right of [ 15.336887] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.337566] [ 15.337679] The buggy address belongs to the physical page: [ 15.337898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.338141] flags: 0x200000000000000(node=0|zone=2) [ 15.338365] page_type: f5(slab) [ 15.338510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.338777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.339003] page dumped because: kasan: bad access detected [ 15.339220] [ 15.339315] Memory state around the buggy address: [ 15.339541] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342214] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.343905] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.344454] ^ [ 15.344622] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.346337] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.347117] ================================================================== [ 15.414285] ================================================================== [ 15.415059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.415769] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.416416] [ 15.416624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.416669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.416681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.416703] Call Trace: [ 15.416719] <TASK> [ 15.416753] dump_stack_lvl+0x73/0xb0 [ 15.416884] print_report+0xd1/0x650 [ 15.416907] ? __virt_addr_valid+0x1db/0x2d0 [ 15.416931] ? kasan_atomics_helper+0x72f/0x5450 [ 15.416954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.416978] ? kasan_atomics_helper+0x72f/0x5450 [ 15.417002] kasan_report+0x141/0x180 [ 15.417025] ? kasan_atomics_helper+0x72f/0x5450 [ 15.417052] kasan_check_range+0x10c/0x1c0 [ 15.417078] __kasan_check_write+0x18/0x20 [ 15.417099] kasan_atomics_helper+0x72f/0x5450 [ 15.417124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.417148] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.417174] ? kasan_atomics+0x152/0x310 [ 15.417202] kasan_atomics+0x1dc/0x310 [ 15.417226] ? __pfx_kasan_atomics+0x10/0x10 [ 15.417251] ? __pfx_read_tsc+0x10/0x10 [ 15.417272] ? ktime_get_ts64+0x86/0x230 [ 15.417297] kunit_try_run_case+0x1a5/0x480 [ 15.417322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417347] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.417372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.417398] ? __kthread_parkme+0x82/0x180 [ 15.417420] ? preempt_count_sub+0x50/0x80 [ 15.417445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.417496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.417523] kthread+0x337/0x6f0 [ 15.417543] ? trace_preempt_on+0x20/0xc0 [ 15.417567] ? __pfx_kthread+0x10/0x10 [ 15.417589] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.417613] ? calculate_sigpending+0x7b/0xa0 [ 15.417637] ? __pfx_kthread+0x10/0x10 [ 15.417705] ret_from_fork+0x116/0x1d0 [ 15.417725] ? __pfx_kthread+0x10/0x10 [ 15.417758] ret_from_fork_asm+0x1a/0x30 [ 15.417790] </TASK> [ 15.417801] [ 15.431024] Allocated by task 283: [ 15.431349] kasan_save_stack+0x45/0x70 [ 15.431729] kasan_save_track+0x18/0x40 [ 15.431908] kasan_save_alloc_info+0x3b/0x50 [ 15.432335] __kasan_kmalloc+0xb7/0xc0 [ 15.432646] __kmalloc_cache_noprof+0x189/0x420 [ 15.433077] kasan_atomics+0x95/0x310 [ 15.433224] kunit_try_run_case+0x1a5/0x480 [ 15.433376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.433554] kthread+0x337/0x6f0 [ 15.433985] ret_from_fork+0x116/0x1d0 [ 15.434459] ret_from_fork_asm+0x1a/0x30 [ 15.434960] [ 15.435124] The buggy address belongs to the object at ffff888103ad1980 [ 15.435124] which belongs to the cache kmalloc-64 of size 64 [ 15.436361] The buggy address is located 0 bytes to the right of [ 15.436361] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.437590] [ 15.437782] The buggy address belongs to the physical page: [ 15.438255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.438541] flags: 0x200000000000000(node=0|zone=2) [ 15.438922] page_type: f5(slab) [ 15.439250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.439973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.440807] page dumped because: kasan: bad access detected [ 15.441254] [ 15.441339] Memory state around the buggy address: [ 15.441499] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.441949] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.442731] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.443364] ^ [ 15.443859] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.444471] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.445122] ================================================================== [ 16.672727] ================================================================== [ 16.673119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.673553] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.674246] [ 16.674350] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.674612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.674628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.674650] Call Trace: [ 16.674667] <TASK> [ 16.674684] dump_stack_lvl+0x73/0xb0 [ 16.674715] print_report+0xd1/0x650 [ 16.674782] ? __virt_addr_valid+0x1db/0x2d0 [ 16.674806] ? kasan_atomics_helper+0x5115/0x5450 [ 16.674829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.674854] ? kasan_atomics_helper+0x5115/0x5450 [ 16.674879] kasan_report+0x141/0x180 [ 16.674902] ? kasan_atomics_helper+0x5115/0x5450 [ 16.674929] __asan_report_load8_noabort+0x18/0x20 [ 16.674956] kasan_atomics_helper+0x5115/0x5450 [ 16.674979] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.675003] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.675029] ? kasan_atomics+0x152/0x310 [ 16.675057] kasan_atomics+0x1dc/0x310 [ 16.675080] ? __pfx_kasan_atomics+0x10/0x10 [ 16.675106] ? __pfx_read_tsc+0x10/0x10 [ 16.675127] ? ktime_get_ts64+0x86/0x230 [ 16.675151] kunit_try_run_case+0x1a5/0x480 [ 16.675176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.675201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.675226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.675252] ? __kthread_parkme+0x82/0x180 [ 16.675273] ? preempt_count_sub+0x50/0x80 [ 16.675298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.675324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.675350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.675377] kthread+0x337/0x6f0 [ 16.675399] ? trace_preempt_on+0x20/0xc0 [ 16.675424] ? __pfx_kthread+0x10/0x10 [ 16.675446] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.675468] ? calculate_sigpending+0x7b/0xa0 [ 16.675493] ? __pfx_kthread+0x10/0x10 [ 16.675516] ret_from_fork+0x116/0x1d0 [ 16.675535] ? __pfx_kthread+0x10/0x10 [ 16.675557] ret_from_fork_asm+0x1a/0x30 [ 16.675588] </TASK> [ 16.675599] [ 16.687570] Allocated by task 283: [ 16.687860] kasan_save_stack+0x45/0x70 [ 16.688269] kasan_save_track+0x18/0x40 [ 16.688642] kasan_save_alloc_info+0x3b/0x50 [ 16.688959] __kasan_kmalloc+0xb7/0xc0 [ 16.689339] __kmalloc_cache_noprof+0x189/0x420 [ 16.689577] kasan_atomics+0x95/0x310 [ 16.689906] kunit_try_run_case+0x1a5/0x480 [ 16.690323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.690788] kthread+0x337/0x6f0 [ 16.690916] ret_from_fork+0x116/0x1d0 [ 16.691052] ret_from_fork_asm+0x1a/0x30 [ 16.691194] [ 16.691265] The buggy address belongs to the object at ffff888103ad1980 [ 16.691265] which belongs to the cache kmalloc-64 of size 64 [ 16.691618] The buggy address is located 0 bytes to the right of [ 16.691618] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.692789] [ 16.692956] The buggy address belongs to the physical page: [ 16.693486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.694246] flags: 0x200000000000000(node=0|zone=2) [ 16.694787] page_type: f5(slab) [ 16.695104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.695818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.696468] page dumped because: kasan: bad access detected [ 16.696815] [ 16.696901] Memory state around the buggy address: [ 16.697220] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.697438] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.697668] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.697892] ^ [ 16.698048] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.698267] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.698586] ================================================================== [ 15.664815] ================================================================== [ 15.665163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.665783] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.666141] [ 15.666250] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.666291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.666303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.666323] Call Trace: [ 15.666339] <TASK> [ 15.666354] dump_stack_lvl+0x73/0xb0 [ 15.666391] print_report+0xd1/0x650 [ 15.666414] ? __virt_addr_valid+0x1db/0x2d0 [ 15.666439] ? kasan_atomics_helper+0xd47/0x5450 [ 15.666461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.666485] ? kasan_atomics_helper+0xd47/0x5450 [ 15.666508] kasan_report+0x141/0x180 [ 15.666531] ? kasan_atomics_helper+0xd47/0x5450 [ 15.666559] kasan_check_range+0x10c/0x1c0 [ 15.666584] __kasan_check_write+0x18/0x20 [ 15.666604] kasan_atomics_helper+0xd47/0x5450 [ 15.666628] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.666653] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.666679] ? kasan_atomics+0x152/0x310 [ 15.666706] kasan_atomics+0x1dc/0x310 [ 15.666730] ? __pfx_kasan_atomics+0x10/0x10 [ 15.666767] ? __pfx_read_tsc+0x10/0x10 [ 15.666789] ? ktime_get_ts64+0x86/0x230 [ 15.666814] kunit_try_run_case+0x1a5/0x480 [ 15.666839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.666863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.666897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.666922] ? __kthread_parkme+0x82/0x180 [ 15.666943] ? preempt_count_sub+0x50/0x80 [ 15.666968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.666994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.667020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.667046] kthread+0x337/0x6f0 [ 15.667066] ? trace_preempt_on+0x20/0xc0 [ 15.667091] ? __pfx_kthread+0x10/0x10 [ 15.667113] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.667136] ? calculate_sigpending+0x7b/0xa0 [ 15.667160] ? __pfx_kthread+0x10/0x10 [ 15.667183] ret_from_fork+0x116/0x1d0 [ 15.667203] ? __pfx_kthread+0x10/0x10 [ 15.667225] ret_from_fork_asm+0x1a/0x30 [ 15.667256] </TASK> [ 15.667267] [ 15.674443] Allocated by task 283: [ 15.674574] kasan_save_stack+0x45/0x70 [ 15.674763] kasan_save_track+0x18/0x40 [ 15.674954] kasan_save_alloc_info+0x3b/0x50 [ 15.675167] __kasan_kmalloc+0xb7/0xc0 [ 15.675355] __kmalloc_cache_noprof+0x189/0x420 [ 15.675577] kasan_atomics+0x95/0x310 [ 15.675932] kunit_try_run_case+0x1a5/0x480 [ 15.676162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.676416] kthread+0x337/0x6f0 [ 15.676538] ret_from_fork+0x116/0x1d0 [ 15.676689] ret_from_fork_asm+0x1a/0x30 [ 15.676904] [ 15.677001] The buggy address belongs to the object at ffff888103ad1980 [ 15.677001] which belongs to the cache kmalloc-64 of size 64 [ 15.677503] The buggy address is located 0 bytes to the right of [ 15.677503] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.678017] [ 15.678116] The buggy address belongs to the physical page: [ 15.678323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.678608] flags: 0x200000000000000(node=0|zone=2) [ 15.679010] page_type: f5(slab) [ 15.679132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.679361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.679595] page dumped because: kasan: bad access detected [ 15.680042] [ 15.680136] Memory state around the buggy address: [ 15.680360] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.680685] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.681027] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.681280] ^ [ 15.681495] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.681855] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.682152] ================================================================== [ 15.090281] ================================================================== [ 15.091503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.092015] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.093230] [ 15.093461] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.093512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.093524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.093547] Call Trace: [ 15.093561] <TASK> [ 15.093577] dump_stack_lvl+0x73/0xb0 [ 15.093608] print_report+0xd1/0x650 [ 15.093631] ? __virt_addr_valid+0x1db/0x2d0 [ 15.093840] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.093868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.093893] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.093915] kasan_report+0x141/0x180 [ 15.093938] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.093964] __asan_report_load4_noabort+0x18/0x20 [ 15.093989] kasan_atomics_helper+0x4bbc/0x5450 [ 15.094012] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.094036] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.094062] ? kasan_atomics+0x152/0x310 [ 15.094089] kasan_atomics+0x1dc/0x310 [ 15.094111] ? __pfx_kasan_atomics+0x10/0x10 [ 15.094136] ? __pfx_read_tsc+0x10/0x10 [ 15.094157] ? ktime_get_ts64+0x86/0x230 [ 15.094181] kunit_try_run_case+0x1a5/0x480 [ 15.094206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094229] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.094254] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.094278] ? __kthread_parkme+0x82/0x180 [ 15.094298] ? preempt_count_sub+0x50/0x80 [ 15.094323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.094379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.094404] kthread+0x337/0x6f0 [ 15.094424] ? trace_preempt_on+0x20/0xc0 [ 15.094448] ? __pfx_kthread+0x10/0x10 [ 15.094468] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.094491] ? calculate_sigpending+0x7b/0xa0 [ 15.094515] ? __pfx_kthread+0x10/0x10 [ 15.094536] ret_from_fork+0x116/0x1d0 [ 15.094554] ? __pfx_kthread+0x10/0x10 [ 15.094574] ret_from_fork_asm+0x1a/0x30 [ 15.094605] </TASK> [ 15.094616] [ 15.112028] Allocated by task 283: [ 15.112175] kasan_save_stack+0x45/0x70 [ 15.112334] kasan_save_track+0x18/0x40 [ 15.112467] kasan_save_alloc_info+0x3b/0x50 [ 15.112611] __kasan_kmalloc+0xb7/0xc0 [ 15.113318] __kmalloc_cache_noprof+0x189/0x420 [ 15.113791] kasan_atomics+0x95/0x310 [ 15.114238] kunit_try_run_case+0x1a5/0x480 [ 15.114673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.115292] kthread+0x337/0x6f0 [ 15.115623] ret_from_fork+0x116/0x1d0 [ 15.116123] ret_from_fork_asm+0x1a/0x30 [ 15.116276] [ 15.116349] The buggy address belongs to the object at ffff888103ad1980 [ 15.116349] which belongs to the cache kmalloc-64 of size 64 [ 15.116721] The buggy address is located 0 bytes to the right of [ 15.116721] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.117480] [ 15.117559] The buggy address belongs to the physical page: [ 15.118372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.119501] flags: 0x200000000000000(node=0|zone=2) [ 15.120000] page_type: f5(slab) [ 15.120131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.120361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.120586] page dumped because: kasan: bad access detected [ 15.120783] [ 15.120852] Memory state around the buggy address: [ 15.121397] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.121985] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.122406] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.122864] ^ [ 15.123128] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.123376] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.123688] ================================================================== [ 16.590901] ================================================================== [ 16.591218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.591534] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.592419] [ 16.592544] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.592591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.592605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.592626] Call Trace: [ 16.592642] <TASK> [ 16.592823] dump_stack_lvl+0x73/0xb0 [ 16.592872] print_report+0xd1/0x650 [ 16.592897] ? __virt_addr_valid+0x1db/0x2d0 [ 16.592921] ? kasan_atomics_helper+0x218a/0x5450 [ 16.592943] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.592983] ? kasan_atomics_helper+0x218a/0x5450 [ 16.593007] kasan_report+0x141/0x180 [ 16.593064] ? kasan_atomics_helper+0x218a/0x5450 [ 16.593095] kasan_check_range+0x10c/0x1c0 [ 16.593133] __kasan_check_write+0x18/0x20 [ 16.593154] kasan_atomics_helper+0x218a/0x5450 [ 16.593179] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.593215] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.593242] ? kasan_atomics+0x152/0x310 [ 16.593280] kasan_atomics+0x1dc/0x310 [ 16.593304] ? __pfx_kasan_atomics+0x10/0x10 [ 16.593330] ? __pfx_read_tsc+0x10/0x10 [ 16.593364] ? ktime_get_ts64+0x86/0x230 [ 16.593390] kunit_try_run_case+0x1a5/0x480 [ 16.593415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.593450] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.593475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.593512] ? __kthread_parkme+0x82/0x180 [ 16.593535] ? preempt_count_sub+0x50/0x80 [ 16.593560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.593597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.593624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.593674] kthread+0x337/0x6f0 [ 16.593696] ? trace_preempt_on+0x20/0xc0 [ 16.593722] ? __pfx_kthread+0x10/0x10 [ 16.593766] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.593790] ? calculate_sigpending+0x7b/0xa0 [ 16.593814] ? __pfx_kthread+0x10/0x10 [ 16.593849] ret_from_fork+0x116/0x1d0 [ 16.593869] ? __pfx_kthread+0x10/0x10 [ 16.593890] ret_from_fork_asm+0x1a/0x30 [ 16.593933] </TASK> [ 16.593945] [ 16.605460] Allocated by task 283: [ 16.605641] kasan_save_stack+0x45/0x70 [ 16.606089] kasan_save_track+0x18/0x40 [ 16.606272] kasan_save_alloc_info+0x3b/0x50 [ 16.606478] __kasan_kmalloc+0xb7/0xc0 [ 16.606655] __kmalloc_cache_noprof+0x189/0x420 [ 16.607153] kasan_atomics+0x95/0x310 [ 16.607331] kunit_try_run_case+0x1a5/0x480 [ 16.607525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.608040] kthread+0x337/0x6f0 [ 16.608464] ret_from_fork+0x116/0x1d0 [ 16.608853] ret_from_fork_asm+0x1a/0x30 [ 16.609082] [ 16.609174] The buggy address belongs to the object at ffff888103ad1980 [ 16.609174] which belongs to the cache kmalloc-64 of size 64 [ 16.609910] The buggy address is located 0 bytes to the right of [ 16.609910] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.610498] [ 16.610597] The buggy address belongs to the physical page: [ 16.611136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.611807] flags: 0x200000000000000(node=0|zone=2) [ 16.612112] page_type: f5(slab) [ 16.612537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.613002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.613314] page dumped because: kasan: bad access detected [ 16.613548] [ 16.613639] Memory state around the buggy address: [ 16.614155] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.614597] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.615171] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.615618] ^ [ 16.615849] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.616138] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.616426] ================================================================== [ 16.064940] ================================================================== [ 16.065240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 16.065960] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.066226] [ 16.066387] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.066463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.066474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.066495] Call Trace: [ 16.066508] <TASK> [ 16.066522] dump_stack_lvl+0x73/0xb0 [ 16.066550] print_report+0xd1/0x650 [ 16.066573] ? __virt_addr_valid+0x1db/0x2d0 [ 16.066596] ? kasan_atomics_helper+0x151d/0x5450 [ 16.066619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.066654] ? kasan_atomics_helper+0x151d/0x5450 [ 16.066677] kasan_report+0x141/0x180 [ 16.066851] ? kasan_atomics_helper+0x151d/0x5450 [ 16.066895] kasan_check_range+0x10c/0x1c0 [ 16.066920] __kasan_check_write+0x18/0x20 [ 16.066941] kasan_atomics_helper+0x151d/0x5450 [ 16.066965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.066989] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.067016] ? kasan_atomics+0x152/0x310 [ 16.067043] kasan_atomics+0x1dc/0x310 [ 16.067067] ? __pfx_kasan_atomics+0x10/0x10 [ 16.067093] ? __pfx_read_tsc+0x10/0x10 [ 16.067113] ? ktime_get_ts64+0x86/0x230 [ 16.067138] kunit_try_run_case+0x1a5/0x480 [ 16.067165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.067189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.067215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.067240] ? __kthread_parkme+0x82/0x180 [ 16.067261] ? preempt_count_sub+0x50/0x80 [ 16.067288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.067315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.067341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.067367] kthread+0x337/0x6f0 [ 16.067388] ? trace_preempt_on+0x20/0xc0 [ 16.067412] ? __pfx_kthread+0x10/0x10 [ 16.067434] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.067457] ? calculate_sigpending+0x7b/0xa0 [ 16.067481] ? __pfx_kthread+0x10/0x10 [ 16.067505] ret_from_fork+0x116/0x1d0 [ 16.067524] ? __pfx_kthread+0x10/0x10 [ 16.067546] ret_from_fork_asm+0x1a/0x30 [ 16.067577] </TASK> [ 16.067588] [ 16.075235] Allocated by task 283: [ 16.075370] kasan_save_stack+0x45/0x70 [ 16.075514] kasan_save_track+0x18/0x40 [ 16.075651] kasan_save_alloc_info+0x3b/0x50 [ 16.075890] __kasan_kmalloc+0xb7/0xc0 [ 16.076080] __kmalloc_cache_noprof+0x189/0x420 [ 16.076302] kasan_atomics+0x95/0x310 [ 16.076489] kunit_try_run_case+0x1a5/0x480 [ 16.076701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.076900] kthread+0x337/0x6f0 [ 16.077073] ret_from_fork+0x116/0x1d0 [ 16.077262] ret_from_fork_asm+0x1a/0x30 [ 16.077426] [ 16.077522] The buggy address belongs to the object at ffff888103ad1980 [ 16.077522] which belongs to the cache kmalloc-64 of size 64 [ 16.078018] The buggy address is located 0 bytes to the right of [ 16.078018] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.078521] [ 16.078618] The buggy address belongs to the physical page: [ 16.078906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.079155] flags: 0x200000000000000(node=0|zone=2) [ 16.079318] page_type: f5(slab) [ 16.079439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.079688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.080045] page dumped because: kasan: bad access detected [ 16.080302] [ 16.080398] Memory state around the buggy address: [ 16.080611] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.080982] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.081221] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.081431] ^ [ 16.081614] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082247] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082541] ================================================================== [ 16.030381] ================================================================== [ 16.030809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 16.031158] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.031454] [ 16.031534] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.031575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.031588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.031608] Call Trace: [ 16.031624] <TASK> [ 16.031639] dump_stack_lvl+0x73/0xb0 [ 16.031675] print_report+0xd1/0x650 [ 16.031699] ? __virt_addr_valid+0x1db/0x2d0 [ 16.031723] ? kasan_atomics_helper+0x1467/0x5450 [ 16.031757] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.031782] ? kasan_atomics_helper+0x1467/0x5450 [ 16.031806] kasan_report+0x141/0x180 [ 16.031829] ? kasan_atomics_helper+0x1467/0x5450 [ 16.031858] kasan_check_range+0x10c/0x1c0 [ 16.031883] __kasan_check_write+0x18/0x20 [ 16.031904] kasan_atomics_helper+0x1467/0x5450 [ 16.031928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.031952] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.031978] ? kasan_atomics+0x152/0x310 [ 16.032005] kasan_atomics+0x1dc/0x310 [ 16.032029] ? __pfx_kasan_atomics+0x10/0x10 [ 16.032054] ? __pfx_read_tsc+0x10/0x10 [ 16.032076] ? ktime_get_ts64+0x86/0x230 [ 16.032101] kunit_try_run_case+0x1a5/0x480 [ 16.032127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.032153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.032180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.032204] ? __kthread_parkme+0x82/0x180 [ 16.032226] ? preempt_count_sub+0x50/0x80 [ 16.032250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.032275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.032302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.032328] kthread+0x337/0x6f0 [ 16.032348] ? trace_preempt_on+0x20/0xc0 [ 16.032373] ? __pfx_kthread+0x10/0x10 [ 16.032395] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.032418] ? calculate_sigpending+0x7b/0xa0 [ 16.032444] ? __pfx_kthread+0x10/0x10 [ 16.032466] ret_from_fork+0x116/0x1d0 [ 16.032487] ? __pfx_kthread+0x10/0x10 [ 16.032508] ret_from_fork_asm+0x1a/0x30 [ 16.032540] </TASK> [ 16.032551] [ 16.039826] Allocated by task 283: [ 16.040008] kasan_save_stack+0x45/0x70 [ 16.040207] kasan_save_track+0x18/0x40 [ 16.040382] kasan_save_alloc_info+0x3b/0x50 [ 16.040574] __kasan_kmalloc+0xb7/0xc0 [ 16.040783] __kmalloc_cache_noprof+0x189/0x420 [ 16.040993] kasan_atomics+0x95/0x310 [ 16.041158] kunit_try_run_case+0x1a5/0x480 [ 16.041306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.041482] kthread+0x337/0x6f0 [ 16.041603] ret_from_fork+0x116/0x1d0 [ 16.041736] ret_from_fork_asm+0x1a/0x30 [ 16.041886] [ 16.041956] The buggy address belongs to the object at ffff888103ad1980 [ 16.041956] which belongs to the cache kmalloc-64 of size 64 [ 16.042443] The buggy address is located 0 bytes to the right of [ 16.042443] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.043161] [ 16.043239] The buggy address belongs to the physical page: [ 16.043411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.043656] flags: 0x200000000000000(node=0|zone=2) [ 16.043901] page_type: f5(slab) [ 16.044068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.044407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.044760] page dumped because: kasan: bad access detected [ 16.044954] [ 16.045023] Memory state around the buggy address: [ 16.045178] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.045393] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.045798] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.046121] ^ [ 16.046353] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.046724] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.047039] ================================================================== [ 15.990905] ================================================================== [ 15.991633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.992444] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.993181] [ 15.993355] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.993418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.993432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.993453] Call Trace: [ 15.993466] <TASK> [ 15.993480] dump_stack_lvl+0x73/0xb0 [ 15.993510] print_report+0xd1/0x650 [ 15.993534] ? __virt_addr_valid+0x1db/0x2d0 [ 15.993557] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.993579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.993603] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.993627] kasan_report+0x141/0x180 [ 15.993660] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.993689] kasan_check_range+0x10c/0x1c0 [ 15.993714] __kasan_check_read+0x15/0x20 [ 15.993735] kasan_atomics_helper+0x13b5/0x5450 [ 15.993770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.993794] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.993822] ? kasan_atomics+0x152/0x310 [ 15.993850] kasan_atomics+0x1dc/0x310 [ 15.993873] ? __pfx_kasan_atomics+0x10/0x10 [ 15.993899] ? __pfx_read_tsc+0x10/0x10 [ 15.993921] ? ktime_get_ts64+0x86/0x230 [ 15.993945] kunit_try_run_case+0x1a5/0x480 [ 15.993970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.994020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.994045] ? __kthread_parkme+0x82/0x180 [ 15.994066] ? preempt_count_sub+0x50/0x80 [ 15.994092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.994118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.994144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.994170] kthread+0x337/0x6f0 [ 15.994191] ? trace_preempt_on+0x20/0xc0 [ 15.994215] ? __pfx_kthread+0x10/0x10 [ 15.994237] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.994261] ? calculate_sigpending+0x7b/0xa0 [ 15.994287] ? __pfx_kthread+0x10/0x10 [ 15.994309] ret_from_fork+0x116/0x1d0 [ 15.994330] ? __pfx_kthread+0x10/0x10 [ 15.994352] ret_from_fork_asm+0x1a/0x30 [ 15.994392] </TASK> [ 15.994402] [ 16.004220] Allocated by task 283: [ 16.004370] kasan_save_stack+0x45/0x70 [ 16.004511] kasan_save_track+0x18/0x40 [ 16.004644] kasan_save_alloc_info+0x3b/0x50 [ 16.004912] __kasan_kmalloc+0xb7/0xc0 [ 16.005124] __kmalloc_cache_noprof+0x189/0x420 [ 16.005346] kasan_atomics+0x95/0x310 [ 16.005520] kunit_try_run_case+0x1a5/0x480 [ 16.005693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.005879] kthread+0x337/0x6f0 [ 16.005996] ret_from_fork+0x116/0x1d0 [ 16.006182] ret_from_fork_asm+0x1a/0x30 [ 16.006384] [ 16.006482] The buggy address belongs to the object at ffff888103ad1980 [ 16.006482] which belongs to the cache kmalloc-64 of size 64 [ 16.006979] The buggy address is located 0 bytes to the right of [ 16.006979] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.007339] [ 16.007516] The buggy address belongs to the physical page: [ 16.007845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.008215] flags: 0x200000000000000(node=0|zone=2) [ 16.008451] page_type: f5(slab) [ 16.008618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.008971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.009264] page dumped because: kasan: bad access detected [ 16.009493] [ 16.009596] Memory state around the buggy address: [ 16.009841] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.010126] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.010423] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.010737] ^ [ 16.010976] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.011284] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.011584] ================================================================== [ 16.122204] ================================================================== [ 16.122567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.122949] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.124307] [ 16.124414] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.124461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.124474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.124496] Call Trace: [ 16.124514] <TASK> [ 16.124532] dump_stack_lvl+0x73/0xb0 [ 16.124562] print_report+0xd1/0x650 [ 16.124587] ? __virt_addr_valid+0x1db/0x2d0 [ 16.124610] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.124642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.124668] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.124690] kasan_report+0x141/0x180 [ 16.124713] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.124740] kasan_check_range+0x10c/0x1c0 [ 16.124775] __kasan_check_write+0x18/0x20 [ 16.124796] kasan_atomics_helper+0x16e7/0x5450 [ 16.124820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.124844] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.124870] ? kasan_atomics+0x152/0x310 [ 16.124897] kasan_atomics+0x1dc/0x310 [ 16.124922] ? __pfx_kasan_atomics+0x10/0x10 [ 16.124948] ? __pfx_read_tsc+0x10/0x10 [ 16.124970] ? ktime_get_ts64+0x86/0x230 [ 16.124997] kunit_try_run_case+0x1a5/0x480 [ 16.125021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.125046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.125072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.125097] ? __kthread_parkme+0x82/0x180 [ 16.125118] ? preempt_count_sub+0x50/0x80 [ 16.125142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.125168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.125193] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.125220] kthread+0x337/0x6f0 [ 16.125239] ? trace_preempt_on+0x20/0xc0 [ 16.125264] ? __pfx_kthread+0x10/0x10 [ 16.125285] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.125308] ? calculate_sigpending+0x7b/0xa0 [ 16.125333] ? __pfx_kthread+0x10/0x10 [ 16.125356] ret_from_fork+0x116/0x1d0 [ 16.125374] ? __pfx_kthread+0x10/0x10 [ 16.125396] ret_from_fork_asm+0x1a/0x30 [ 16.125428] </TASK> [ 16.125440] [ 16.139111] Allocated by task 283: [ 16.139361] kasan_save_stack+0x45/0x70 [ 16.139557] kasan_save_track+0x18/0x40 [ 16.140017] kasan_save_alloc_info+0x3b/0x50 [ 16.140197] __kasan_kmalloc+0xb7/0xc0 [ 16.140518] __kmalloc_cache_noprof+0x189/0x420 [ 16.140811] kasan_atomics+0x95/0x310 [ 16.141154] kunit_try_run_case+0x1a5/0x480 [ 16.141473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.141830] kthread+0x337/0x6f0 [ 16.141982] ret_from_fork+0x116/0x1d0 [ 16.142294] ret_from_fork_asm+0x1a/0x30 [ 16.142569] [ 16.142719] The buggy address belongs to the object at ffff888103ad1980 [ 16.142719] which belongs to the cache kmalloc-64 of size 64 [ 16.143331] The buggy address is located 0 bytes to the right of [ 16.143331] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.144120] [ 16.144242] The buggy address belongs to the physical page: [ 16.144641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.145133] flags: 0x200000000000000(node=0|zone=2) [ 16.145403] page_type: f5(slab) [ 16.145722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.146093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.146416] page dumped because: kasan: bad access detected [ 16.146756] [ 16.147003] Memory state around the buggy address: [ 16.147187] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.147708] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.148175] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.148579] ^ [ 16.148912] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.149258] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.149678] ================================================================== [ 16.301606] ================================================================== [ 16.302325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.302796] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.303175] [ 16.303502] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.303551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.303565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.303585] Call Trace: [ 16.303601] <TASK> [ 16.303616] dump_stack_lvl+0x73/0xb0 [ 16.303647] print_report+0xd1/0x650 [ 16.303671] ? __virt_addr_valid+0x1db/0x2d0 [ 16.303695] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.303717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.303742] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.303779] kasan_report+0x141/0x180 [ 16.303802] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.303830] kasan_check_range+0x10c/0x1c0 [ 16.303854] __kasan_check_write+0x18/0x20 [ 16.303875] kasan_atomics_helper+0x1b22/0x5450 [ 16.303899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.303923] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.303951] ? kasan_atomics+0x152/0x310 [ 16.303979] kasan_atomics+0x1dc/0x310 [ 16.304002] ? __pfx_kasan_atomics+0x10/0x10 [ 16.304028] ? __pfx_read_tsc+0x10/0x10 [ 16.304050] ? ktime_get_ts64+0x86/0x230 [ 16.304077] kunit_try_run_case+0x1a5/0x480 [ 16.304103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.304127] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.304153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.304179] ? __kthread_parkme+0x82/0x180 [ 16.304201] ? preempt_count_sub+0x50/0x80 [ 16.304225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.304252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.304279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.304305] kthread+0x337/0x6f0 [ 16.304325] ? trace_preempt_on+0x20/0xc0 [ 16.304349] ? __pfx_kthread+0x10/0x10 [ 16.304371] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.304393] ? calculate_sigpending+0x7b/0xa0 [ 16.304420] ? __pfx_kthread+0x10/0x10 [ 16.304442] ret_from_fork+0x116/0x1d0 [ 16.304461] ? __pfx_kthread+0x10/0x10 [ 16.304483] ret_from_fork_asm+0x1a/0x30 [ 16.304514] </TASK> [ 16.304525] [ 16.314776] Allocated by task 283: [ 16.315037] kasan_save_stack+0x45/0x70 [ 16.315225] kasan_save_track+0x18/0x40 [ 16.315413] kasan_save_alloc_info+0x3b/0x50 [ 16.315610] __kasan_kmalloc+0xb7/0xc0 [ 16.315828] __kmalloc_cache_noprof+0x189/0x420 [ 16.316344] kasan_atomics+0x95/0x310 [ 16.316609] kunit_try_run_case+0x1a5/0x480 [ 16.316807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.317221] kthread+0x337/0x6f0 [ 16.317462] ret_from_fork+0x116/0x1d0 [ 16.317807] ret_from_fork_asm+0x1a/0x30 [ 16.318076] [ 16.318170] The buggy address belongs to the object at ffff888103ad1980 [ 16.318170] which belongs to the cache kmalloc-64 of size 64 [ 16.318960] The buggy address is located 0 bytes to the right of [ 16.318960] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.319537] [ 16.319628] The buggy address belongs to the physical page: [ 16.319864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.320403] flags: 0x200000000000000(node=0|zone=2) [ 16.320618] page_type: f5(slab) [ 16.320935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.321329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.321801] page dumped because: kasan: bad access detected [ 16.322133] [ 16.322217] Memory state around the buggy address: [ 16.322523] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.322992] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.323354] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.323618] ^ [ 16.323978] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.324430] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.324762] ================================================================== [ 16.325469] ================================================================== [ 16.326236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.326709] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.327234] [ 16.327349] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.327394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.327406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.327577] Call Trace: [ 16.327595] <TASK> [ 16.327610] dump_stack_lvl+0x73/0xb0 [ 16.327642] print_report+0xd1/0x650 [ 16.327682] ? __virt_addr_valid+0x1db/0x2d0 [ 16.327706] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.327729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.327765] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.327789] kasan_report+0x141/0x180 [ 16.327812] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.327838] kasan_check_range+0x10c/0x1c0 [ 16.327865] __kasan_check_write+0x18/0x20 [ 16.327886] kasan_atomics_helper+0x1c18/0x5450 [ 16.327910] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.327933] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.327960] ? kasan_atomics+0x152/0x310 [ 16.327987] kasan_atomics+0x1dc/0x310 [ 16.328011] ? __pfx_kasan_atomics+0x10/0x10 [ 16.328037] ? __pfx_read_tsc+0x10/0x10 [ 16.328059] ? ktime_get_ts64+0x86/0x230 [ 16.328084] kunit_try_run_case+0x1a5/0x480 [ 16.328110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.328134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.328159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.328185] ? __kthread_parkme+0x82/0x180 [ 16.328206] ? preempt_count_sub+0x50/0x80 [ 16.328231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.328257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.328283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.328311] kthread+0x337/0x6f0 [ 16.328331] ? trace_preempt_on+0x20/0xc0 [ 16.328355] ? __pfx_kthread+0x10/0x10 [ 16.328377] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.328400] ? calculate_sigpending+0x7b/0xa0 [ 16.328425] ? __pfx_kthread+0x10/0x10 [ 16.328447] ret_from_fork+0x116/0x1d0 [ 16.328467] ? __pfx_kthread+0x10/0x10 [ 16.328488] ret_from_fork_asm+0x1a/0x30 [ 16.328519] </TASK> [ 16.328531] [ 16.338889] Allocated by task 283: [ 16.339081] kasan_save_stack+0x45/0x70 [ 16.339287] kasan_save_track+0x18/0x40 [ 16.339472] kasan_save_alloc_info+0x3b/0x50 [ 16.339680] __kasan_kmalloc+0xb7/0xc0 [ 16.340118] __kmalloc_cache_noprof+0x189/0x420 [ 16.340291] kasan_atomics+0x95/0x310 [ 16.340603] kunit_try_run_case+0x1a5/0x480 [ 16.340964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.341312] kthread+0x337/0x6f0 [ 16.341473] ret_from_fork+0x116/0x1d0 [ 16.341788] ret_from_fork_asm+0x1a/0x30 [ 16.342135] [ 16.342220] The buggy address belongs to the object at ffff888103ad1980 [ 16.342220] which belongs to the cache kmalloc-64 of size 64 [ 16.342890] The buggy address is located 0 bytes to the right of [ 16.342890] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.343381] [ 16.343478] The buggy address belongs to the physical page: [ 16.343702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.344037] flags: 0x200000000000000(node=0|zone=2) [ 16.344251] page_type: f5(slab) [ 16.344405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.345198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.345484] page dumped because: kasan: bad access detected [ 16.345823] [ 16.345999] Memory state around the buggy address: [ 16.346210] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.346654] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.347155] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.347556] ^ [ 16.347820] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.348264] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.348617] ================================================================== [ 15.151791] ================================================================== [ 15.152116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.153198] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.153514] [ 15.153798] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.154004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.154019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.154040] Call Trace: [ 15.154053] <TASK> [ 15.154068] dump_stack_lvl+0x73/0xb0 [ 15.154099] print_report+0xd1/0x650 [ 15.154122] ? __virt_addr_valid+0x1db/0x2d0 [ 15.154146] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.154168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.154191] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.154214] kasan_report+0x141/0x180 [ 15.154236] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.154262] __asan_report_load4_noabort+0x18/0x20 [ 15.154288] kasan_atomics_helper+0x4b88/0x5450 [ 15.154311] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.154334] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.154366] ? kasan_atomics+0x152/0x310 [ 15.154393] kasan_atomics+0x1dc/0x310 [ 15.154415] ? __pfx_kasan_atomics+0x10/0x10 [ 15.154439] ? __pfx_read_tsc+0x10/0x10 [ 15.154460] ? ktime_get_ts64+0x86/0x230 [ 15.154484] kunit_try_run_case+0x1a5/0x480 [ 15.154509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.154532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.154556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.154581] ? __kthread_parkme+0x82/0x180 [ 15.154601] ? preempt_count_sub+0x50/0x80 [ 15.154625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.154702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.154729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.154766] kthread+0x337/0x6f0 [ 15.154786] ? trace_preempt_on+0x20/0xc0 [ 15.154810] ? __pfx_kthread+0x10/0x10 [ 15.154831] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.154855] ? calculate_sigpending+0x7b/0xa0 [ 15.154879] ? __pfx_kthread+0x10/0x10 [ 15.154901] ret_from_fork+0x116/0x1d0 [ 15.154919] ? __pfx_kthread+0x10/0x10 [ 15.154941] ret_from_fork_asm+0x1a/0x30 [ 15.154971] </TASK> [ 15.154982] [ 15.167418] Allocated by task 283: [ 15.167903] kasan_save_stack+0x45/0x70 [ 15.168420] kasan_save_track+0x18/0x40 [ 15.168764] kasan_save_alloc_info+0x3b/0x50 [ 15.169139] __kasan_kmalloc+0xb7/0xc0 [ 15.169443] __kmalloc_cache_noprof+0x189/0x420 [ 15.169865] kasan_atomics+0x95/0x310 [ 15.170024] kunit_try_run_case+0x1a5/0x480 [ 15.170355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.170629] kthread+0x337/0x6f0 [ 15.171129] ret_from_fork+0x116/0x1d0 [ 15.171308] ret_from_fork_asm+0x1a/0x30 [ 15.171653] [ 15.171905] The buggy address belongs to the object at ffff888103ad1980 [ 15.171905] which belongs to the cache kmalloc-64 of size 64 [ 15.172984] The buggy address is located 0 bytes to the right of [ 15.172984] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.173583] [ 15.173831] The buggy address belongs to the physical page: [ 15.174066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.174392] flags: 0x200000000000000(node=0|zone=2) [ 15.174623] page_type: f5(slab) [ 15.175108] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.175499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.176103] page dumped because: kasan: bad access detected [ 15.176494] [ 15.176604] Memory state around the buggy address: [ 15.177194] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.177497] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.177974] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.178449] ^ [ 15.179097] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179396] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.179924] ================================================================== [ 15.970797] ================================================================== [ 15.971117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.971483] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.971847] [ 15.971978] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.972020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.972031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.972051] Call Trace: [ 15.972066] <TASK> [ 15.972080] dump_stack_lvl+0x73/0xb0 [ 15.972109] print_report+0xd1/0x650 [ 15.972132] ? __virt_addr_valid+0x1db/0x2d0 [ 15.972157] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.972179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.972205] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.972228] kasan_report+0x141/0x180 [ 15.972251] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.972278] __asan_report_load4_noabort+0x18/0x20 [ 15.972303] kasan_atomics_helper+0x49ce/0x5450 [ 15.972327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.972351] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.972378] ? kasan_atomics+0x152/0x310 [ 15.972405] kasan_atomics+0x1dc/0x310 [ 15.972428] ? __pfx_kasan_atomics+0x10/0x10 [ 15.972454] ? __pfx_read_tsc+0x10/0x10 [ 15.972476] ? ktime_get_ts64+0x86/0x230 [ 15.972501] kunit_try_run_case+0x1a5/0x480 [ 15.972526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.972576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.972622] ? __kthread_parkme+0x82/0x180 [ 15.972645] ? preempt_count_sub+0x50/0x80 [ 15.972677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.972703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.972729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.972767] kthread+0x337/0x6f0 [ 15.972787] ? trace_preempt_on+0x20/0xc0 [ 15.972812] ? __pfx_kthread+0x10/0x10 [ 15.972834] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.972857] ? calculate_sigpending+0x7b/0xa0 [ 15.972882] ? __pfx_kthread+0x10/0x10 [ 15.972905] ret_from_fork+0x116/0x1d0 [ 15.972925] ? __pfx_kthread+0x10/0x10 [ 15.972946] ret_from_fork_asm+0x1a/0x30 [ 15.972976] </TASK> [ 15.972987] [ 15.980199] Allocated by task 283: [ 15.980357] kasan_save_stack+0x45/0x70 [ 15.980558] kasan_save_track+0x18/0x40 [ 15.980861] kasan_save_alloc_info+0x3b/0x50 [ 15.981116] __kasan_kmalloc+0xb7/0xc0 [ 15.981318] __kmalloc_cache_noprof+0x189/0x420 [ 15.981538] kasan_atomics+0x95/0x310 [ 15.981700] kunit_try_run_case+0x1a5/0x480 [ 15.981924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.982120] kthread+0x337/0x6f0 [ 15.982347] ret_from_fork+0x116/0x1d0 [ 15.982520] ret_from_fork_asm+0x1a/0x30 [ 15.982700] [ 15.982880] The buggy address belongs to the object at ffff888103ad1980 [ 15.982880] which belongs to the cache kmalloc-64 of size 64 [ 15.983941] The buggy address is located 0 bytes to the right of [ 15.983941] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.985029] [ 15.985155] The buggy address belongs to the physical page: [ 15.985417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.985664] flags: 0x200000000000000(node=0|zone=2) [ 15.986020] page_type: f5(slab) [ 15.986274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.986504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.986741] page dumped because: kasan: bad access detected [ 15.987175] [ 15.987346] Memory state around the buggy address: [ 15.987799] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.988072] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.988290] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.988501] ^ [ 15.988678] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.989323] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990062] ================================================================== [ 16.083045] ================================================================== [ 16.083375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.083833] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.084122] [ 16.084231] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.084271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.084283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.084304] Call Trace: [ 16.084319] <TASK> [ 16.084333] dump_stack_lvl+0x73/0xb0 [ 16.084362] print_report+0xd1/0x650 [ 16.084384] ? __virt_addr_valid+0x1db/0x2d0 [ 16.084407] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.084430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.084454] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.084477] kasan_report+0x141/0x180 [ 16.084500] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.084527] kasan_check_range+0x10c/0x1c0 [ 16.084551] __kasan_check_write+0x18/0x20 [ 16.084572] kasan_atomics_helper+0x15b6/0x5450 [ 16.084595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.084618] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.084644] ? kasan_atomics+0x152/0x310 [ 16.084687] kasan_atomics+0x1dc/0x310 [ 16.084710] ? __pfx_kasan_atomics+0x10/0x10 [ 16.084735] ? __pfx_read_tsc+0x10/0x10 [ 16.084768] ? ktime_get_ts64+0x86/0x230 [ 16.084793] kunit_try_run_case+0x1a5/0x480 [ 16.084818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.084868] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.084894] ? __kthread_parkme+0x82/0x180 [ 16.084915] ? preempt_count_sub+0x50/0x80 [ 16.084940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.084991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.085018] kthread+0x337/0x6f0 [ 16.085039] ? trace_preempt_on+0x20/0xc0 [ 16.085063] ? __pfx_kthread+0x10/0x10 [ 16.085085] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.085108] ? calculate_sigpending+0x7b/0xa0 [ 16.085133] ? __pfx_kthread+0x10/0x10 [ 16.085155] ret_from_fork+0x116/0x1d0 [ 16.085175] ? __pfx_kthread+0x10/0x10 [ 16.085197] ret_from_fork_asm+0x1a/0x30 [ 16.085229] </TASK> [ 16.085239] [ 16.092731] Allocated by task 283: [ 16.092901] kasan_save_stack+0x45/0x70 [ 16.093089] kasan_save_track+0x18/0x40 [ 16.093270] kasan_save_alloc_info+0x3b/0x50 [ 16.093447] __kasan_kmalloc+0xb7/0xc0 [ 16.093581] __kmalloc_cache_noprof+0x189/0x420 [ 16.093953] kasan_atomics+0x95/0x310 [ 16.094144] kunit_try_run_case+0x1a5/0x480 [ 16.094338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094564] kthread+0x337/0x6f0 [ 16.094758] ret_from_fork+0x116/0x1d0 [ 16.094899] ret_from_fork_asm+0x1a/0x30 [ 16.095038] [ 16.095108] The buggy address belongs to the object at ffff888103ad1980 [ 16.095108] which belongs to the cache kmalloc-64 of size 64 [ 16.095466] The buggy address is located 0 bytes to the right of [ 16.095466] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.096059] [ 16.096156] The buggy address belongs to the physical page: [ 16.096411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.096776] flags: 0x200000000000000(node=0|zone=2) [ 16.097100] page_type: f5(slab) [ 16.097270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.097578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.098034] page dumped because: kasan: bad access detected [ 16.098247] [ 16.098340] Memory state around the buggy address: [ 16.098521] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.098849] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.099237] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.099536] ^ [ 16.099779] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.100000] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.100213] ================================================================== [ 15.811078] ================================================================== [ 15.811475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.811916] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.812254] [ 15.812375] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.812420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.812433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.812453] Call Trace: [ 15.812468] <TASK> [ 15.812483] dump_stack_lvl+0x73/0xb0 [ 15.812546] print_report+0xd1/0x650 [ 15.812593] ? __virt_addr_valid+0x1db/0x2d0 [ 15.812665] ? kasan_atomics_helper+0x1079/0x5450 [ 15.812691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.812727] ? kasan_atomics_helper+0x1079/0x5450 [ 15.812759] kasan_report+0x141/0x180 [ 15.812782] ? kasan_atomics_helper+0x1079/0x5450 [ 15.812810] kasan_check_range+0x10c/0x1c0 [ 15.812835] __kasan_check_write+0x18/0x20 [ 15.812855] kasan_atomics_helper+0x1079/0x5450 [ 15.812879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.812904] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.812931] ? kasan_atomics+0x152/0x310 [ 15.812958] kasan_atomics+0x1dc/0x310 [ 15.812982] ? __pfx_kasan_atomics+0x10/0x10 [ 15.813009] ? __pfx_read_tsc+0x10/0x10 [ 15.813031] ? ktime_get_ts64+0x86/0x230 [ 15.813055] kunit_try_run_case+0x1a5/0x480 [ 15.813112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.813201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.813227] ? __kthread_parkme+0x82/0x180 [ 15.813259] ? preempt_count_sub+0x50/0x80 [ 15.813284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.813310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.813336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.813363] kthread+0x337/0x6f0 [ 15.813383] ? trace_preempt_on+0x20/0xc0 [ 15.813407] ? __pfx_kthread+0x10/0x10 [ 15.813428] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.813451] ? calculate_sigpending+0x7b/0xa0 [ 15.813477] ? __pfx_kthread+0x10/0x10 [ 15.813499] ret_from_fork+0x116/0x1d0 [ 15.813518] ? __pfx_kthread+0x10/0x10 [ 15.813539] ret_from_fork_asm+0x1a/0x30 [ 15.813571] </TASK> [ 15.813582] [ 15.821512] Allocated by task 283: [ 15.821722] kasan_save_stack+0x45/0x70 [ 15.821976] kasan_save_track+0x18/0x40 [ 15.822255] kasan_save_alloc_info+0x3b/0x50 [ 15.822506] __kasan_kmalloc+0xb7/0xc0 [ 15.822661] __kmalloc_cache_noprof+0x189/0x420 [ 15.822925] kasan_atomics+0x95/0x310 [ 15.823135] kunit_try_run_case+0x1a5/0x480 [ 15.823401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.823584] kthread+0x337/0x6f0 [ 15.823804] ret_from_fork+0x116/0x1d0 [ 15.824059] ret_from_fork_asm+0x1a/0x30 [ 15.824308] [ 15.824401] The buggy address belongs to the object at ffff888103ad1980 [ 15.824401] which belongs to the cache kmalloc-64 of size 64 [ 15.824975] The buggy address is located 0 bytes to the right of [ 15.824975] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.825469] [ 15.825566] The buggy address belongs to the physical page: [ 15.825851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.826239] flags: 0x200000000000000(node=0|zone=2) [ 15.826498] page_type: f5(slab) [ 15.826725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.827058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.827288] page dumped because: kasan: bad access detected [ 15.827540] [ 15.827632] Memory state around the buggy address: [ 15.827921] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.828246] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.828527] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.828877] ^ [ 15.829038] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.829354] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.829754] ================================================================== [ 16.150329] ================================================================== [ 16.151082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.151404] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.151842] [ 16.151941] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.152023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.152036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.152057] Call Trace: [ 16.152084] <TASK> [ 16.152101] dump_stack_lvl+0x73/0xb0 [ 16.152134] print_report+0xd1/0x650 [ 16.152376] ? __virt_addr_valid+0x1db/0x2d0 [ 16.152411] ? kasan_atomics_helper+0x177f/0x5450 [ 16.152435] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.152461] ? kasan_atomics_helper+0x177f/0x5450 [ 16.152485] kasan_report+0x141/0x180 [ 16.152509] ? kasan_atomics_helper+0x177f/0x5450 [ 16.152538] kasan_check_range+0x10c/0x1c0 [ 16.152563] __kasan_check_write+0x18/0x20 [ 16.152585] kasan_atomics_helper+0x177f/0x5450 [ 16.152610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.152636] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.152678] ? kasan_atomics+0x152/0x310 [ 16.152706] kasan_atomics+0x1dc/0x310 [ 16.152730] ? __pfx_kasan_atomics+0x10/0x10 [ 16.152768] ? __pfx_read_tsc+0x10/0x10 [ 16.152790] ? ktime_get_ts64+0x86/0x230 [ 16.152816] kunit_try_run_case+0x1a5/0x480 [ 16.152842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.152867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.152892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.152918] ? __kthread_parkme+0x82/0x180 [ 16.152941] ? preempt_count_sub+0x50/0x80 [ 16.152966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.152992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.153018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.153046] kthread+0x337/0x6f0 [ 16.153067] ? trace_preempt_on+0x20/0xc0 [ 16.153092] ? __pfx_kthread+0x10/0x10 [ 16.153115] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.153139] ? calculate_sigpending+0x7b/0xa0 [ 16.153164] ? __pfx_kthread+0x10/0x10 [ 16.153187] ret_from_fork+0x116/0x1d0 [ 16.153206] ? __pfx_kthread+0x10/0x10 [ 16.153229] ret_from_fork_asm+0x1a/0x30 [ 16.153260] </TASK> [ 16.153272] [ 16.164539] Allocated by task 283: [ 16.164932] kasan_save_stack+0x45/0x70 [ 16.165234] kasan_save_track+0x18/0x40 [ 16.165437] kasan_save_alloc_info+0x3b/0x50 [ 16.165630] __kasan_kmalloc+0xb7/0xc0 [ 16.166109] __kmalloc_cache_noprof+0x189/0x420 [ 16.166324] kasan_atomics+0x95/0x310 [ 16.166595] kunit_try_run_case+0x1a5/0x480 [ 16.166935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.167259] kthread+0x337/0x6f0 [ 16.167523] ret_from_fork+0x116/0x1d0 [ 16.167899] ret_from_fork_asm+0x1a/0x30 [ 16.168180] [ 16.168283] The buggy address belongs to the object at ffff888103ad1980 [ 16.168283] which belongs to the cache kmalloc-64 of size 64 [ 16.169004] The buggy address is located 0 bytes to the right of [ 16.169004] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.169712] [ 16.169933] The buggy address belongs to the physical page: [ 16.170174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.170497] flags: 0x200000000000000(node=0|zone=2) [ 16.170932] page_type: f5(slab) [ 16.171211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.171636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.172132] page dumped because: kasan: bad access detected [ 16.172478] [ 16.172671] Memory state around the buggy address: [ 16.173029] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.173437] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.173890] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.174239] ^ [ 16.174650] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.174996] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.175389] ================================================================== [ 16.495892] ================================================================== [ 16.496124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.496354] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.496576] [ 16.496658] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.496721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.496734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.496774] Call Trace: [ 16.496787] <TASK> [ 16.496801] dump_stack_lvl+0x73/0xb0 [ 16.496828] print_report+0xd1/0x650 [ 16.496851] ? __virt_addr_valid+0x1db/0x2d0 [ 16.496873] ? kasan_atomics_helper+0x2006/0x5450 [ 16.496896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.496920] ? kasan_atomics_helper+0x2006/0x5450 [ 16.496943] kasan_report+0x141/0x180 [ 16.496966] ? kasan_atomics_helper+0x2006/0x5450 [ 16.496994] kasan_check_range+0x10c/0x1c0 [ 16.497019] __kasan_check_write+0x18/0x20 [ 16.497039] kasan_atomics_helper+0x2006/0x5450 [ 16.497064] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.497088] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.497114] ? kasan_atomics+0x152/0x310 [ 16.497143] kasan_atomics+0x1dc/0x310 [ 16.497167] ? __pfx_kasan_atomics+0x10/0x10 [ 16.497192] ? __pfx_read_tsc+0x10/0x10 [ 16.497214] ? ktime_get_ts64+0x86/0x230 [ 16.497238] kunit_try_run_case+0x1a5/0x480 [ 16.497263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.497287] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.497312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.497337] ? __kthread_parkme+0x82/0x180 [ 16.497359] ? preempt_count_sub+0x50/0x80 [ 16.497383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.497409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.497435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.497462] kthread+0x337/0x6f0 [ 16.497482] ? trace_preempt_on+0x20/0xc0 [ 16.497506] ? __pfx_kthread+0x10/0x10 [ 16.497528] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.497551] ? calculate_sigpending+0x7b/0xa0 [ 16.497577] ? __pfx_kthread+0x10/0x10 [ 16.497601] ret_from_fork+0x116/0x1d0 [ 16.497622] ? __pfx_kthread+0x10/0x10 [ 16.497644] ret_from_fork_asm+0x1a/0x30 [ 16.497699] </TASK> [ 16.497710] [ 16.505488] Allocated by task 283: [ 16.505632] kasan_save_stack+0x45/0x70 [ 16.505854] kasan_save_track+0x18/0x40 [ 16.506154] kasan_save_alloc_info+0x3b/0x50 [ 16.506304] __kasan_kmalloc+0xb7/0xc0 [ 16.506443] __kmalloc_cache_noprof+0x189/0x420 [ 16.506599] kasan_atomics+0x95/0x310 [ 16.506731] kunit_try_run_case+0x1a5/0x480 [ 16.507196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.507480] kthread+0x337/0x6f0 [ 16.507653] ret_from_fork+0x116/0x1d0 [ 16.507975] ret_from_fork_asm+0x1a/0x30 [ 16.508198] [ 16.508317] The buggy address belongs to the object at ffff888103ad1980 [ 16.508317] which belongs to the cache kmalloc-64 of size 64 [ 16.508892] The buggy address is located 0 bytes to the right of [ 16.508892] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.509392] [ 16.509480] The buggy address belongs to the physical page: [ 16.509763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.510110] flags: 0x200000000000000(node=0|zone=2) [ 16.510332] page_type: f5(slab) [ 16.510484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.510869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.511195] page dumped because: kasan: bad access detected [ 16.511450] [ 16.511544] Memory state around the buggy address: [ 16.511791] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.512120] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.512437] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.512814] ^ [ 16.513042] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.513347] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.513559] ================================================================== [ 16.562975] ================================================================== [ 16.563562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.564298] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.564998] [ 16.565230] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.565294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.565308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.565329] Call Trace: [ 16.565350] <TASK> [ 16.565368] dump_stack_lvl+0x73/0xb0 [ 16.565400] print_report+0xd1/0x650 [ 16.565423] ? __virt_addr_valid+0x1db/0x2d0 [ 16.565447] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.565471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.565495] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.565519] kasan_report+0x141/0x180 [ 16.565541] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.565569] __asan_report_load8_noabort+0x18/0x20 [ 16.565595] kasan_atomics_helper+0x4fb2/0x5450 [ 16.565619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.565643] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.565702] ? kasan_atomics+0x152/0x310 [ 16.565731] kasan_atomics+0x1dc/0x310 [ 16.565765] ? __pfx_kasan_atomics+0x10/0x10 [ 16.565790] ? __pfx_read_tsc+0x10/0x10 [ 16.565812] ? ktime_get_ts64+0x86/0x230 [ 16.565837] kunit_try_run_case+0x1a5/0x480 [ 16.565862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.565887] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.565913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.565938] ? __kthread_parkme+0x82/0x180 [ 16.565960] ? preempt_count_sub+0x50/0x80 [ 16.565984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.566010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.566036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.566063] kthread+0x337/0x6f0 [ 16.566083] ? trace_preempt_on+0x20/0xc0 [ 16.566107] ? __pfx_kthread+0x10/0x10 [ 16.566129] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.566153] ? calculate_sigpending+0x7b/0xa0 [ 16.566178] ? __pfx_kthread+0x10/0x10 [ 16.566200] ret_from_fork+0x116/0x1d0 [ 16.566219] ? __pfx_kthread+0x10/0x10 [ 16.566241] ret_from_fork_asm+0x1a/0x30 [ 16.566273] </TASK> [ 16.566284] [ 16.577564] Allocated by task 283: [ 16.577943] kasan_save_stack+0x45/0x70 [ 16.578265] kasan_save_track+0x18/0x40 [ 16.578662] kasan_save_alloc_info+0x3b/0x50 [ 16.579002] __kasan_kmalloc+0xb7/0xc0 [ 16.579200] __kmalloc_cache_noprof+0x189/0x420 [ 16.579404] kasan_atomics+0x95/0x310 [ 16.579578] kunit_try_run_case+0x1a5/0x480 [ 16.580090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.580465] kthread+0x337/0x6f0 [ 16.580629] ret_from_fork+0x116/0x1d0 [ 16.581059] ret_from_fork_asm+0x1a/0x30 [ 16.581376] [ 16.581597] The buggy address belongs to the object at ffff888103ad1980 [ 16.581597] which belongs to the cache kmalloc-64 of size 64 [ 16.582134] The buggy address is located 0 bytes to the right of [ 16.582134] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.582643] [ 16.583034] The buggy address belongs to the physical page: [ 16.583475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.584117] flags: 0x200000000000000(node=0|zone=2) [ 16.584536] page_type: f5(slab) [ 16.584987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.585454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.586224] page dumped because: kasan: bad access detected [ 16.586680] [ 16.586797] Memory state around the buggy address: [ 16.587159] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.587461] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.588117] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.588546] ^ [ 16.589069] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.589462] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.589956] ================================================================== [ 16.644914] ================================================================== [ 16.645458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.646123] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.646566] [ 16.646661] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.646708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.646721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.646741] Call Trace: [ 16.646767] <TASK> [ 16.646784] dump_stack_lvl+0x73/0xb0 [ 16.646816] print_report+0xd1/0x650 [ 16.646839] ? __virt_addr_valid+0x1db/0x2d0 [ 16.646864] ? kasan_atomics_helper+0x224c/0x5450 [ 16.646886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.646911] ? kasan_atomics_helper+0x224c/0x5450 [ 16.646933] kasan_report+0x141/0x180 [ 16.646957] ? kasan_atomics_helper+0x224c/0x5450 [ 16.646984] kasan_check_range+0x10c/0x1c0 [ 16.647009] __kasan_check_write+0x18/0x20 [ 16.647030] kasan_atomics_helper+0x224c/0x5450 [ 16.647054] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.647078] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.647105] ? kasan_atomics+0x152/0x310 [ 16.647133] kasan_atomics+0x1dc/0x310 [ 16.647158] ? __pfx_kasan_atomics+0x10/0x10 [ 16.647183] ? __pfx_read_tsc+0x10/0x10 [ 16.647205] ? ktime_get_ts64+0x86/0x230 [ 16.647230] kunit_try_run_case+0x1a5/0x480 [ 16.647255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.647454] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.647499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.647525] ? __kthread_parkme+0x82/0x180 [ 16.647548] ? preempt_count_sub+0x50/0x80 [ 16.647602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.647630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.647657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.647684] kthread+0x337/0x6f0 [ 16.647705] ? trace_preempt_on+0x20/0xc0 [ 16.647731] ? __pfx_kthread+0x10/0x10 [ 16.647768] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.647791] ? calculate_sigpending+0x7b/0xa0 [ 16.647816] ? __pfx_kthread+0x10/0x10 [ 16.647839] ret_from_fork+0x116/0x1d0 [ 16.647859] ? __pfx_kthread+0x10/0x10 [ 16.647881] ret_from_fork_asm+0x1a/0x30 [ 16.647913] </TASK> [ 16.647924] [ 16.659058] Allocated by task 283: [ 16.659245] kasan_save_stack+0x45/0x70 [ 16.659450] kasan_save_track+0x18/0x40 [ 16.659644] kasan_save_alloc_info+0x3b/0x50 [ 16.660170] __kasan_kmalloc+0xb7/0xc0 [ 16.660539] __kmalloc_cache_noprof+0x189/0x420 [ 16.661024] kasan_atomics+0x95/0x310 [ 16.661270] kunit_try_run_case+0x1a5/0x480 [ 16.661477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.661984] kthread+0x337/0x6f0 [ 16.662210] ret_from_fork+0x116/0x1d0 [ 16.662528] ret_from_fork_asm+0x1a/0x30 [ 16.662970] [ 16.663085] The buggy address belongs to the object at ffff888103ad1980 [ 16.663085] which belongs to the cache kmalloc-64 of size 64 [ 16.663575] The buggy address is located 0 bytes to the right of [ 16.663575] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.664803] [ 16.664891] The buggy address belongs to the physical page: [ 16.665316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.666004] flags: 0x200000000000000(node=0|zone=2) [ 16.666470] page_type: f5(slab) [ 16.666729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.667238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.667881] page dumped because: kasan: bad access detected [ 16.668138] [ 16.668229] Memory state around the buggy address: [ 16.668438] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.668952] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.669468] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.670087] ^ [ 16.670317] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.670617] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.671393] ================================================================== [ 15.476683] ================================================================== [ 15.477521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.478092] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.479099] [ 15.479377] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.479423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.479466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.479487] Call Trace: [ 15.479503] <TASK> [ 15.479520] dump_stack_lvl+0x73/0xb0 [ 15.479563] print_report+0xd1/0x650 [ 15.479586] ? __virt_addr_valid+0x1db/0x2d0 [ 15.479611] ? kasan_atomics_helper+0x860/0x5450 [ 15.479633] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.479672] ? kasan_atomics_helper+0x860/0x5450 [ 15.479696] kasan_report+0x141/0x180 [ 15.479719] ? kasan_atomics_helper+0x860/0x5450 [ 15.479756] kasan_check_range+0x10c/0x1c0 [ 15.479782] __kasan_check_write+0x18/0x20 [ 15.479803] kasan_atomics_helper+0x860/0x5450 [ 15.479826] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.479851] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.479878] ? kasan_atomics+0x152/0x310 [ 15.479905] kasan_atomics+0x1dc/0x310 [ 15.479929] ? __pfx_kasan_atomics+0x10/0x10 [ 15.479955] ? __pfx_read_tsc+0x10/0x10 [ 15.479977] ? ktime_get_ts64+0x86/0x230 [ 15.480003] kunit_try_run_case+0x1a5/0x480 [ 15.480028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.480079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.480105] ? __kthread_parkme+0x82/0x180 [ 15.480127] ? preempt_count_sub+0x50/0x80 [ 15.480152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.480231] kthread+0x337/0x6f0 [ 15.480252] ? trace_preempt_on+0x20/0xc0 [ 15.480277] ? __pfx_kthread+0x10/0x10 [ 15.480298] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.480322] ? calculate_sigpending+0x7b/0xa0 [ 15.480347] ? __pfx_kthread+0x10/0x10 [ 15.480370] ret_from_fork+0x116/0x1d0 [ 15.480390] ? __pfx_kthread+0x10/0x10 [ 15.480411] ret_from_fork_asm+0x1a/0x30 [ 15.480443] </TASK> [ 15.480454] [ 15.490951] Allocated by task 283: [ 15.491095] kasan_save_stack+0x45/0x70 [ 15.491260] kasan_save_track+0x18/0x40 [ 15.491462] kasan_save_alloc_info+0x3b/0x50 [ 15.491684] __kasan_kmalloc+0xb7/0xc0 [ 15.491955] __kmalloc_cache_noprof+0x189/0x420 [ 15.492158] kasan_atomics+0x95/0x310 [ 15.492463] kunit_try_run_case+0x1a5/0x480 [ 15.492810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.493089] kthread+0x337/0x6f0 [ 15.493305] ret_from_fork+0x116/0x1d0 [ 15.493462] ret_from_fork_asm+0x1a/0x30 [ 15.493600] [ 15.493766] The buggy address belongs to the object at ffff888103ad1980 [ 15.493766] which belongs to the cache kmalloc-64 of size 64 [ 15.494397] The buggy address is located 0 bytes to the right of [ 15.494397] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.495145] [ 15.495284] The buggy address belongs to the physical page: [ 15.495916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.496301] flags: 0x200000000000000(node=0|zone=2) [ 15.496528] page_type: f5(slab) [ 15.496794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.497108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.497330] page dumped because: kasan: bad access detected [ 15.497497] [ 15.497593] Memory state around the buggy address: [ 15.497966] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.498337] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.498794] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.499106] ^ [ 15.499365] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.500060] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.500416] ================================================================== [ 16.534085] ================================================================== [ 16.534858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.535365] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.536434] [ 16.536608] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.536670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.536683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.536703] Call Trace: [ 16.536850] <TASK> [ 16.536871] dump_stack_lvl+0x73/0xb0 [ 16.536906] print_report+0xd1/0x650 [ 16.536946] ? __virt_addr_valid+0x1db/0x2d0 [ 16.536977] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.537000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.537026] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.537050] kasan_report+0x141/0x180 [ 16.537073] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.537100] kasan_check_range+0x10c/0x1c0 [ 16.537126] __kasan_check_write+0x18/0x20 [ 16.537146] kasan_atomics_helper+0x20c8/0x5450 [ 16.537170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.537194] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.537220] ? kasan_atomics+0x152/0x310 [ 16.537247] kasan_atomics+0x1dc/0x310 [ 16.537270] ? __pfx_kasan_atomics+0x10/0x10 [ 16.537295] ? __pfx_read_tsc+0x10/0x10 [ 16.537318] ? ktime_get_ts64+0x86/0x230 [ 16.537345] kunit_try_run_case+0x1a5/0x480 [ 16.537370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.537395] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.537421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.537446] ? __kthread_parkme+0x82/0x180 [ 16.537467] ? preempt_count_sub+0x50/0x80 [ 16.537492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.537518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.537544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.537571] kthread+0x337/0x6f0 [ 16.537591] ? trace_preempt_on+0x20/0xc0 [ 16.537616] ? __pfx_kthread+0x10/0x10 [ 16.537637] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.537689] ? calculate_sigpending+0x7b/0xa0 [ 16.537716] ? __pfx_kthread+0x10/0x10 [ 16.537739] ret_from_fork+0x116/0x1d0 [ 16.537769] ? __pfx_kthread+0x10/0x10 [ 16.537790] ret_from_fork_asm+0x1a/0x30 [ 16.537823] </TASK> [ 16.537835] [ 16.549783] Allocated by task 283: [ 16.549965] kasan_save_stack+0x45/0x70 [ 16.550154] kasan_save_track+0x18/0x40 [ 16.550329] kasan_save_alloc_info+0x3b/0x50 [ 16.550528] __kasan_kmalloc+0xb7/0xc0 [ 16.551008] __kmalloc_cache_noprof+0x189/0x420 [ 16.551363] kasan_atomics+0x95/0x310 [ 16.551545] kunit_try_run_case+0x1a5/0x480 [ 16.552003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.552436] kthread+0x337/0x6f0 [ 16.552838] ret_from_fork+0x116/0x1d0 [ 16.553287] ret_from_fork_asm+0x1a/0x30 [ 16.553569] [ 16.553824] The buggy address belongs to the object at ffff888103ad1980 [ 16.553824] which belongs to the cache kmalloc-64 of size 64 [ 16.554731] The buggy address is located 0 bytes to the right of [ 16.554731] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.555631] [ 16.556018] The buggy address belongs to the physical page: [ 16.556283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.556615] flags: 0x200000000000000(node=0|zone=2) [ 16.557079] page_type: f5(slab) [ 16.557399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.557998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.558414] page dumped because: kasan: bad access detected [ 16.558834] [ 16.558943] Memory state around the buggy address: [ 16.559152] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.559437] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.560004] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.560523] ^ [ 16.560964] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.561402] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.561944] ================================================================== [ 15.905959] ================================================================== [ 15.906282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.906616] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.907691] [ 15.907895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.908059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.908074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.908096] Call Trace: [ 15.908111] <TASK> [ 15.908127] dump_stack_lvl+0x73/0xb0 [ 15.908159] print_report+0xd1/0x650 [ 15.908183] ? __virt_addr_valid+0x1db/0x2d0 [ 15.908207] ? kasan_atomics_helper+0x1217/0x5450 [ 15.908230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.908254] ? kasan_atomics_helper+0x1217/0x5450 [ 15.908278] kasan_report+0x141/0x180 [ 15.908301] ? kasan_atomics_helper+0x1217/0x5450 [ 15.908328] kasan_check_range+0x10c/0x1c0 [ 15.908353] __kasan_check_write+0x18/0x20 [ 15.908374] kasan_atomics_helper+0x1217/0x5450 [ 15.908399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.908423] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.908450] ? kasan_atomics+0x152/0x310 [ 15.908477] kasan_atomics+0x1dc/0x310 [ 15.908501] ? __pfx_kasan_atomics+0x10/0x10 [ 15.908527] ? __pfx_read_tsc+0x10/0x10 [ 15.908550] ? ktime_get_ts64+0x86/0x230 [ 15.908575] kunit_try_run_case+0x1a5/0x480 [ 15.908601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.908803] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.908835] ? __kthread_parkme+0x82/0x180 [ 15.908857] ? preempt_count_sub+0x50/0x80 [ 15.908882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.908935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.908963] kthread+0x337/0x6f0 [ 15.908985] ? trace_preempt_on+0x20/0xc0 [ 15.909010] ? __pfx_kthread+0x10/0x10 [ 15.909032] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.909055] ? calculate_sigpending+0x7b/0xa0 [ 15.909080] ? __pfx_kthread+0x10/0x10 [ 15.909102] ret_from_fork+0x116/0x1d0 [ 15.909122] ? __pfx_kthread+0x10/0x10 [ 15.909144] ret_from_fork_asm+0x1a/0x30 [ 15.909175] </TASK> [ 15.909187] [ 15.920477] Allocated by task 283: [ 15.920827] kasan_save_stack+0x45/0x70 [ 15.921267] kasan_save_track+0x18/0x40 [ 15.921619] kasan_save_alloc_info+0x3b/0x50 [ 15.921929] __kasan_kmalloc+0xb7/0xc0 [ 15.922061] __kmalloc_cache_noprof+0x189/0x420 [ 15.922212] kasan_atomics+0x95/0x310 [ 15.922342] kunit_try_run_case+0x1a5/0x480 [ 15.922491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.922684] kthread+0x337/0x6f0 [ 15.923005] ret_from_fork+0x116/0x1d0 [ 15.923339] ret_from_fork_asm+0x1a/0x30 [ 15.923730] [ 15.923897] The buggy address belongs to the object at ffff888103ad1980 [ 15.923897] which belongs to the cache kmalloc-64 of size 64 [ 15.925048] The buggy address is located 0 bytes to the right of [ 15.925048] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.926315] [ 15.926518] The buggy address belongs to the physical page: [ 15.927047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.927670] flags: 0x200000000000000(node=0|zone=2) [ 15.928124] page_type: f5(slab) [ 15.928246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.928469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.928779] page dumped because: kasan: bad access detected [ 15.929255] [ 15.929410] Memory state around the buggy address: [ 15.929834] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.930511] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.931335] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.932074] ^ [ 15.932406] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.932613] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.933187] ================================================================== [ 15.708658] ================================================================== [ 15.709486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.710230] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.710936] [ 15.711112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.711157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.711170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.711190] Call Trace: [ 15.711207] <TASK> [ 15.711225] dump_stack_lvl+0x73/0xb0 [ 15.711254] print_report+0xd1/0x650 [ 15.711278] ? __virt_addr_valid+0x1db/0x2d0 [ 15.711302] ? kasan_atomics_helper+0xe78/0x5450 [ 15.711323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.711348] ? kasan_atomics_helper+0xe78/0x5450 [ 15.711371] kasan_report+0x141/0x180 [ 15.711393] ? kasan_atomics_helper+0xe78/0x5450 [ 15.711421] kasan_check_range+0x10c/0x1c0 [ 15.711445] __kasan_check_write+0x18/0x20 [ 15.711466] kasan_atomics_helper+0xe78/0x5450 [ 15.711489] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.711513] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.711541] ? kasan_atomics+0x152/0x310 [ 15.711567] kasan_atomics+0x1dc/0x310 [ 15.711591] ? __pfx_kasan_atomics+0x10/0x10 [ 15.711616] ? __pfx_read_tsc+0x10/0x10 [ 15.711638] ? ktime_get_ts64+0x86/0x230 [ 15.711686] kunit_try_run_case+0x1a5/0x480 [ 15.711711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.711766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.711794] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.711820] ? __kthread_parkme+0x82/0x180 [ 15.711841] ? preempt_count_sub+0x50/0x80 [ 15.711866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.711892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.711917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.711944] kthread+0x337/0x6f0 [ 15.711964] ? trace_preempt_on+0x20/0xc0 [ 15.711988] ? __pfx_kthread+0x10/0x10 [ 15.712010] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.712033] ? calculate_sigpending+0x7b/0xa0 [ 15.712058] ? __pfx_kthread+0x10/0x10 [ 15.712081] ret_from_fork+0x116/0x1d0 [ 15.712100] ? __pfx_kthread+0x10/0x10 [ 15.712121] ret_from_fork_asm+0x1a/0x30 [ 15.712153] </TASK> [ 15.712164] [ 15.724942] Allocated by task 283: [ 15.725235] kasan_save_stack+0x45/0x70 [ 15.725379] kasan_save_track+0x18/0x40 [ 15.725511] kasan_save_alloc_info+0x3b/0x50 [ 15.725683] __kasan_kmalloc+0xb7/0xc0 [ 15.726058] __kmalloc_cache_noprof+0x189/0x420 [ 15.726502] kasan_atomics+0x95/0x310 [ 15.726896] kunit_try_run_case+0x1a5/0x480 [ 15.727296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.727781] kthread+0x337/0x6f0 [ 15.728178] ret_from_fork+0x116/0x1d0 [ 15.728459] ret_from_fork_asm+0x1a/0x30 [ 15.728597] [ 15.728685] The buggy address belongs to the object at ffff888103ad1980 [ 15.728685] which belongs to the cache kmalloc-64 of size 64 [ 15.729282] The buggy address is located 0 bytes to the right of [ 15.729282] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.729636] [ 15.729844] The buggy address belongs to the physical page: [ 15.730364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.731124] flags: 0x200000000000000(node=0|zone=2) [ 15.731572] page_type: f5(slab) [ 15.731933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.732592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.733182] page dumped because: kasan: bad access detected [ 15.733712] [ 15.733843] Memory state around the buggy address: [ 15.734115] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.734536] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.734782] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.735287] ^ [ 15.735440] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.735677] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.736327] ================================================================== [ 16.441786] ================================================================== [ 16.442130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.442356] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.442584] [ 16.442677] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.442718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.442731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.442764] Call Trace: [ 16.442780] <TASK> [ 16.442795] dump_stack_lvl+0x73/0xb0 [ 16.442823] print_report+0xd1/0x650 [ 16.442848] ? __virt_addr_valid+0x1db/0x2d0 [ 16.442875] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.442898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.442923] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.442947] kasan_report+0x141/0x180 [ 16.442983] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.443012] kasan_check_range+0x10c/0x1c0 [ 16.443037] __kasan_check_write+0x18/0x20 [ 16.443068] kasan_atomics_helper+0x1eaa/0x5450 [ 16.443093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.443118] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.443145] ? kasan_atomics+0x152/0x310 [ 16.443172] kasan_atomics+0x1dc/0x310 [ 16.443196] ? __pfx_kasan_atomics+0x10/0x10 [ 16.443222] ? __pfx_read_tsc+0x10/0x10 [ 16.443243] ? ktime_get_ts64+0x86/0x230 [ 16.443277] kunit_try_run_case+0x1a5/0x480 [ 16.443302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.443337] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.443363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.443388] ? __kthread_parkme+0x82/0x180 [ 16.443410] ? preempt_count_sub+0x50/0x80 [ 16.443435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.443460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.443486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.443522] kthread+0x337/0x6f0 [ 16.443543] ? trace_preempt_on+0x20/0xc0 [ 16.443568] ? __pfx_kthread+0x10/0x10 [ 16.443601] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.443624] ? calculate_sigpending+0x7b/0xa0 [ 16.443650] ? __pfx_kthread+0x10/0x10 [ 16.443675] ret_from_fork+0x116/0x1d0 [ 16.443696] ? __pfx_kthread+0x10/0x10 [ 16.443726] ret_from_fork_asm+0x1a/0x30 [ 16.443772] </TASK> [ 16.443785] [ 16.451702] Allocated by task 283: [ 16.451863] kasan_save_stack+0x45/0x70 [ 16.452069] kasan_save_track+0x18/0x40 [ 16.452200] kasan_save_alloc_info+0x3b/0x50 [ 16.452417] __kasan_kmalloc+0xb7/0xc0 [ 16.452547] __kmalloc_cache_noprof+0x189/0x420 [ 16.452934] kasan_atomics+0x95/0x310 [ 16.453097] kunit_try_run_case+0x1a5/0x480 [ 16.453321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.453531] kthread+0x337/0x6f0 [ 16.453647] ret_from_fork+0x116/0x1d0 [ 16.453853] ret_from_fork_asm+0x1a/0x30 [ 16.454050] [ 16.454165] The buggy address belongs to the object at ffff888103ad1980 [ 16.454165] which belongs to the cache kmalloc-64 of size 64 [ 16.454662] The buggy address is located 0 bytes to the right of [ 16.454662] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.455139] [ 16.455238] The buggy address belongs to the physical page: [ 16.455490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.455922] flags: 0x200000000000000(node=0|zone=2) [ 16.456149] page_type: f5(slab) [ 16.456265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.456586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.456940] page dumped because: kasan: bad access detected [ 16.457108] [ 16.457175] Memory state around the buggy address: [ 16.457325] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.457532] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.457795] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.458202] ^ [ 16.458461] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.458833] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.459105] ================================================================== [ 15.124478] ================================================================== [ 15.125048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.125483] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.125956] [ 15.126341] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.126396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.126410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.126429] Call Trace: [ 15.126445] <TASK> [ 15.126462] dump_stack_lvl+0x73/0xb0 [ 15.126493] print_report+0xd1/0x650 [ 15.126516] ? __virt_addr_valid+0x1db/0x2d0 [ 15.126539] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.126561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.126585] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.126607] kasan_report+0x141/0x180 [ 15.126629] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.126656] __asan_report_store4_noabort+0x1b/0x30 [ 15.126801] kasan_atomics_helper+0x4ba2/0x5450 [ 15.126828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.126852] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.126880] ? kasan_atomics+0x152/0x310 [ 15.126907] kasan_atomics+0x1dc/0x310 [ 15.126930] ? __pfx_kasan_atomics+0x10/0x10 [ 15.126954] ? __pfx_read_tsc+0x10/0x10 [ 15.126975] ? ktime_get_ts64+0x86/0x230 [ 15.127001] kunit_try_run_case+0x1a5/0x480 [ 15.127026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.127050] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.127076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.127100] ? __kthread_parkme+0x82/0x180 [ 15.127122] ? preempt_count_sub+0x50/0x80 [ 15.127146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.127171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.127196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.127222] kthread+0x337/0x6f0 [ 15.127242] ? trace_preempt_on+0x20/0xc0 [ 15.127265] ? __pfx_kthread+0x10/0x10 [ 15.127286] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.127308] ? calculate_sigpending+0x7b/0xa0 [ 15.127333] ? __pfx_kthread+0x10/0x10 [ 15.127355] ret_from_fork+0x116/0x1d0 [ 15.127373] ? __pfx_kthread+0x10/0x10 [ 15.127394] ret_from_fork_asm+0x1a/0x30 [ 15.127425] </TASK> [ 15.127436] [ 15.139239] Allocated by task 283: [ 15.139598] kasan_save_stack+0x45/0x70 [ 15.139822] kasan_save_track+0x18/0x40 [ 15.140133] kasan_save_alloc_info+0x3b/0x50 [ 15.140316] __kasan_kmalloc+0xb7/0xc0 [ 15.140505] __kmalloc_cache_noprof+0x189/0x420 [ 15.140692] kasan_atomics+0x95/0x310 [ 15.141214] kunit_try_run_case+0x1a5/0x480 [ 15.141475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.141853] kthread+0x337/0x6f0 [ 15.142231] ret_from_fork+0x116/0x1d0 [ 15.142548] ret_from_fork_asm+0x1a/0x30 [ 15.142866] [ 15.142969] The buggy address belongs to the object at ffff888103ad1980 [ 15.142969] which belongs to the cache kmalloc-64 of size 64 [ 15.143656] The buggy address is located 0 bytes to the right of [ 15.143656] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.144390] [ 15.144659] The buggy address belongs to the physical page: [ 15.144947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.145400] flags: 0x200000000000000(node=0|zone=2) [ 15.145686] page_type: f5(slab) [ 15.146034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.146365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.146937] page dumped because: kasan: bad access detected [ 15.147265] [ 15.147363] Memory state around the buggy address: [ 15.147621] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.148165] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.148551] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.149116] ^ [ 15.149413] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.149847] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.150168] ================================================================== [ 16.423729] ================================================================== [ 16.424149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.424385] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.424634] [ 16.424743] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.424795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.424807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.424829] Call Trace: [ 16.424845] <TASK> [ 16.424861] dump_stack_lvl+0x73/0xb0 [ 16.424888] print_report+0xd1/0x650 [ 16.424910] ? __virt_addr_valid+0x1db/0x2d0 [ 16.424932] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.424988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.425014] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.425037] kasan_report+0x141/0x180 [ 16.425072] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.425099] kasan_check_range+0x10c/0x1c0 [ 16.425124] __kasan_check_write+0x18/0x20 [ 16.425145] kasan_atomics_helper+0x1e12/0x5450 [ 16.425169] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.425193] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.425220] ? kasan_atomics+0x152/0x310 [ 16.425247] kasan_atomics+0x1dc/0x310 [ 16.425270] ? __pfx_kasan_atomics+0x10/0x10 [ 16.425296] ? __pfx_read_tsc+0x10/0x10 [ 16.425317] ? ktime_get_ts64+0x86/0x230 [ 16.425342] kunit_try_run_case+0x1a5/0x480 [ 16.425367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.425392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.425418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.425443] ? __kthread_parkme+0x82/0x180 [ 16.425464] ? preempt_count_sub+0x50/0x80 [ 16.425489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.425515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.425541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.425578] kthread+0x337/0x6f0 [ 16.425599] ? trace_preempt_on+0x20/0xc0 [ 16.425624] ? __pfx_kthread+0x10/0x10 [ 16.425664] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.425687] ? calculate_sigpending+0x7b/0xa0 [ 16.425712] ? __pfx_kthread+0x10/0x10 [ 16.425742] ret_from_fork+0x116/0x1d0 [ 16.425775] ? __pfx_kthread+0x10/0x10 [ 16.425798] ret_from_fork_asm+0x1a/0x30 [ 16.425830] </TASK> [ 16.425841] [ 16.433523] Allocated by task 283: [ 16.433678] kasan_save_stack+0x45/0x70 [ 16.433904] kasan_save_track+0x18/0x40 [ 16.434106] kasan_save_alloc_info+0x3b/0x50 [ 16.434314] __kasan_kmalloc+0xb7/0xc0 [ 16.434491] __kmalloc_cache_noprof+0x189/0x420 [ 16.434650] kasan_atomics+0x95/0x310 [ 16.434794] kunit_try_run_case+0x1a5/0x480 [ 16.434983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.435251] kthread+0x337/0x6f0 [ 16.435420] ret_from_fork+0x116/0x1d0 [ 16.435606] ret_from_fork_asm+0x1a/0x30 [ 16.435813] [ 16.435927] The buggy address belongs to the object at ffff888103ad1980 [ 16.435927] which belongs to the cache kmalloc-64 of size 64 [ 16.436336] The buggy address is located 0 bytes to the right of [ 16.436336] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.436985] [ 16.437081] The buggy address belongs to the physical page: [ 16.437331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.437724] flags: 0x200000000000000(node=0|zone=2) [ 16.437928] page_type: f5(slab) [ 16.438116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.438428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.438779] page dumped because: kasan: bad access detected [ 16.439018] [ 16.439138] Memory state around the buggy address: [ 16.439297] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.439506] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.439710] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.439927] ^ [ 16.440074] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.440603] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.441221] ================================================================== [ 15.591783] ================================================================== [ 15.592164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.592554] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.592987] [ 15.593127] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.593171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.593184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.593216] Call Trace: [ 15.593233] <TASK> [ 15.593275] dump_stack_lvl+0x73/0xb0 [ 15.593306] print_report+0xd1/0x650 [ 15.593329] ? __virt_addr_valid+0x1db/0x2d0 [ 15.593363] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.593402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.593436] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.593459] kasan_report+0x141/0x180 [ 15.593492] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.593519] kasan_check_range+0x10c/0x1c0 [ 15.593544] __kasan_check_write+0x18/0x20 [ 15.593565] kasan_atomics_helper+0xb6a/0x5450 [ 15.593589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.593612] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.593639] ? kasan_atomics+0x152/0x310 [ 15.593673] kasan_atomics+0x1dc/0x310 [ 15.593697] ? __pfx_kasan_atomics+0x10/0x10 [ 15.593764] ? __pfx_read_tsc+0x10/0x10 [ 15.593786] ? ktime_get_ts64+0x86/0x230 [ 15.593811] kunit_try_run_case+0x1a5/0x480 [ 15.593837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.593861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.593914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.593939] ? __kthread_parkme+0x82/0x180 [ 15.593988] ? preempt_count_sub+0x50/0x80 [ 15.594028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.594067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.594118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.594158] kthread+0x337/0x6f0 [ 15.594179] ? trace_preempt_on+0x20/0xc0 [ 15.594203] ? __pfx_kthread+0x10/0x10 [ 15.594225] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.594248] ? calculate_sigpending+0x7b/0xa0 [ 15.594282] ? __pfx_kthread+0x10/0x10 [ 15.594305] ret_from_fork+0x116/0x1d0 [ 15.594325] ? __pfx_kthread+0x10/0x10 [ 15.594356] ret_from_fork_asm+0x1a/0x30 [ 15.594392] </TASK> [ 15.594403] [ 15.601206] Allocated by task 283: [ 15.601330] kasan_save_stack+0x45/0x70 [ 15.601471] kasan_save_track+0x18/0x40 [ 15.601772] kasan_save_alloc_info+0x3b/0x50 [ 15.601977] __kasan_kmalloc+0xb7/0xc0 [ 15.602178] __kmalloc_cache_noprof+0x189/0x420 [ 15.602394] kasan_atomics+0x95/0x310 [ 15.602565] kunit_try_run_case+0x1a5/0x480 [ 15.602851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.603212] kthread+0x337/0x6f0 [ 15.603432] ret_from_fork+0x116/0x1d0 [ 15.603628] ret_from_fork_asm+0x1a/0x30 [ 15.603851] [ 15.604017] The buggy address belongs to the object at ffff888103ad1980 [ 15.604017] which belongs to the cache kmalloc-64 of size 64 [ 15.604595] The buggy address is located 0 bytes to the right of [ 15.604595] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.605438] [ 15.605551] The buggy address belongs to the physical page: [ 15.606793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.607319] flags: 0x200000000000000(node=0|zone=2) [ 15.607481] page_type: f5(slab) [ 15.607600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.608685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.609028] page dumped because: kasan: bad access detected [ 15.609208] [ 15.609279] Memory state around the buggy address: [ 15.609500] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.613075] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.613996] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.614709] ^ [ 15.615377] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.616237] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.616540] ================================================================== [ 16.373441] ================================================================== [ 16.373828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.374130] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.374442] [ 16.374538] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.374580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.374594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.374614] Call Trace: [ 16.374631] <TASK> [ 16.374648] dump_stack_lvl+0x73/0xb0 [ 16.374677] print_report+0xd1/0x650 [ 16.374701] ? __virt_addr_valid+0x1db/0x2d0 [ 16.374724] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.374759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.374783] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.374806] kasan_report+0x141/0x180 [ 16.374830] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.374857] kasan_check_range+0x10c/0x1c0 [ 16.374882] __kasan_check_write+0x18/0x20 [ 16.374903] kasan_atomics_helper+0x1ce1/0x5450 [ 16.374926] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.374951] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.374977] ? kasan_atomics+0x152/0x310 [ 16.375005] kasan_atomics+0x1dc/0x310 [ 16.375028] ? __pfx_kasan_atomics+0x10/0x10 [ 16.375054] ? __pfx_read_tsc+0x10/0x10 [ 16.375076] ? ktime_get_ts64+0x86/0x230 [ 16.375103] kunit_try_run_case+0x1a5/0x480 [ 16.375128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.375180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.375205] ? __kthread_parkme+0x82/0x180 [ 16.375226] ? preempt_count_sub+0x50/0x80 [ 16.375251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.375303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.375330] kthread+0x337/0x6f0 [ 16.375350] ? trace_preempt_on+0x20/0xc0 [ 16.375374] ? __pfx_kthread+0x10/0x10 [ 16.375396] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.375420] ? calculate_sigpending+0x7b/0xa0 [ 16.375445] ? __pfx_kthread+0x10/0x10 [ 16.375467] ret_from_fork+0x116/0x1d0 [ 16.375486] ? __pfx_kthread+0x10/0x10 [ 16.375507] ret_from_fork_asm+0x1a/0x30 [ 16.375538] </TASK> [ 16.375550] [ 16.383853] Allocated by task 283: [ 16.383981] kasan_save_stack+0x45/0x70 [ 16.384122] kasan_save_track+0x18/0x40 [ 16.384253] kasan_save_alloc_info+0x3b/0x50 [ 16.384399] __kasan_kmalloc+0xb7/0xc0 [ 16.384532] __kmalloc_cache_noprof+0x189/0x420 [ 16.384684] kasan_atomics+0x95/0x310 [ 16.384827] kunit_try_run_case+0x1a5/0x480 [ 16.384972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.385142] kthread+0x337/0x6f0 [ 16.385261] ret_from_fork+0x116/0x1d0 [ 16.385967] ret_from_fork_asm+0x1a/0x30 [ 16.386180] [ 16.386277] The buggy address belongs to the object at ffff888103ad1980 [ 16.386277] which belongs to the cache kmalloc-64 of size 64 [ 16.386835] The buggy address is located 0 bytes to the right of [ 16.386835] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.387235] [ 16.387327] The buggy address belongs to the physical page: [ 16.387568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.390553] flags: 0x200000000000000(node=0|zone=2) [ 16.390811] page_type: f5(slab) [ 16.391066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.391851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.392099] page dumped because: kasan: bad access detected [ 16.392274] [ 16.392347] Memory state around the buggy address: [ 16.392502] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.392724] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.393739] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.394797] ^ [ 16.395498] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.396394] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.397068] ================================================================== [ 16.398321] ================================================================== [ 16.398570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.399986] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.400806] [ 16.401117] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.401173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.401187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.401208] Call Trace: [ 16.401223] <TASK> [ 16.401240] dump_stack_lvl+0x73/0xb0 [ 16.401271] print_report+0xd1/0x650 [ 16.401294] ? __virt_addr_valid+0x1db/0x2d0 [ 16.401320] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.401343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.401368] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.401391] kasan_report+0x141/0x180 [ 16.401414] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.401442] kasan_check_range+0x10c/0x1c0 [ 16.401467] __kasan_check_write+0x18/0x20 [ 16.401488] kasan_atomics_helper+0x1d7a/0x5450 [ 16.401512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.401536] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.401562] ? kasan_atomics+0x152/0x310 [ 16.401589] kasan_atomics+0x1dc/0x310 [ 16.401613] ? __pfx_kasan_atomics+0x10/0x10 [ 16.401639] ? __pfx_read_tsc+0x10/0x10 [ 16.401793] ? ktime_get_ts64+0x86/0x230 [ 16.401824] kunit_try_run_case+0x1a5/0x480 [ 16.401888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.401914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.401940] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.401967] ? __kthread_parkme+0x82/0x180 [ 16.401988] ? preempt_count_sub+0x50/0x80 [ 16.402014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.402040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.402066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.402093] kthread+0x337/0x6f0 [ 16.402114] ? trace_preempt_on+0x20/0xc0 [ 16.402138] ? __pfx_kthread+0x10/0x10 [ 16.402159] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.402183] ? calculate_sigpending+0x7b/0xa0 [ 16.402208] ? __pfx_kthread+0x10/0x10 [ 16.402231] ret_from_fork+0x116/0x1d0 [ 16.402250] ? __pfx_kthread+0x10/0x10 [ 16.402272] ret_from_fork_asm+0x1a/0x30 [ 16.402302] </TASK> [ 16.402314] [ 16.415183] Allocated by task 283: [ 16.415379] kasan_save_stack+0x45/0x70 [ 16.415548] kasan_save_track+0x18/0x40 [ 16.415804] kasan_save_alloc_info+0x3b/0x50 [ 16.415959] __kasan_kmalloc+0xb7/0xc0 [ 16.416117] __kmalloc_cache_noprof+0x189/0x420 [ 16.416341] kasan_atomics+0x95/0x310 [ 16.416533] kunit_try_run_case+0x1a5/0x480 [ 16.416776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.416995] kthread+0x337/0x6f0 [ 16.417117] ret_from_fork+0x116/0x1d0 [ 16.417301] ret_from_fork_asm+0x1a/0x30 [ 16.417501] [ 16.417599] The buggy address belongs to the object at ffff888103ad1980 [ 16.417599] which belongs to the cache kmalloc-64 of size 64 [ 16.418197] The buggy address is located 0 bytes to the right of [ 16.418197] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.418647] [ 16.418721] The buggy address belongs to the physical page: [ 16.418969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.419313] flags: 0x200000000000000(node=0|zone=2) [ 16.419478] page_type: f5(slab) [ 16.419614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.420359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.420673] page dumped because: kasan: bad access detected [ 16.420939] [ 16.421025] Memory state around the buggy address: [ 16.421250] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.421552] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.421869] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.422168] ^ [ 16.422384] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.422758] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.423048] ================================================================== [ 16.459491] ================================================================== [ 16.459783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.460278] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.460609] [ 16.460741] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.460800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.460812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.460832] Call Trace: [ 16.460847] <TASK> [ 16.460863] dump_stack_lvl+0x73/0xb0 [ 16.460891] print_report+0xd1/0x650 [ 16.460914] ? __virt_addr_valid+0x1db/0x2d0 [ 16.460937] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.460970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.460994] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.461017] kasan_report+0x141/0x180 [ 16.461051] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.461078] kasan_check_range+0x10c/0x1c0 [ 16.461103] __kasan_check_write+0x18/0x20 [ 16.461124] kasan_atomics_helper+0x1f43/0x5450 [ 16.461148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.461172] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.461198] ? kasan_atomics+0x152/0x310 [ 16.461225] kasan_atomics+0x1dc/0x310 [ 16.461249] ? __pfx_kasan_atomics+0x10/0x10 [ 16.461274] ? __pfx_read_tsc+0x10/0x10 [ 16.461296] ? ktime_get_ts64+0x86/0x230 [ 16.461322] kunit_try_run_case+0x1a5/0x480 [ 16.461347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.461371] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.461397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.461422] ? __kthread_parkme+0x82/0x180 [ 16.461443] ? preempt_count_sub+0x50/0x80 [ 16.461468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.461494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.461520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.461547] kthread+0x337/0x6f0 [ 16.461568] ? trace_preempt_on+0x20/0xc0 [ 16.461592] ? __pfx_kthread+0x10/0x10 [ 16.461614] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.461637] ? calculate_sigpending+0x7b/0xa0 [ 16.461672] ? __pfx_kthread+0x10/0x10 [ 16.461694] ret_from_fork+0x116/0x1d0 [ 16.461714] ? __pfx_kthread+0x10/0x10 [ 16.461736] ret_from_fork_asm+0x1a/0x30 [ 16.461777] </TASK> [ 16.461788] [ 16.469176] Allocated by task 283: [ 16.469303] kasan_save_stack+0x45/0x70 [ 16.469444] kasan_save_track+0x18/0x40 [ 16.469581] kasan_save_alloc_info+0x3b/0x50 [ 16.469945] __kasan_kmalloc+0xb7/0xc0 [ 16.470137] __kmalloc_cache_noprof+0x189/0x420 [ 16.470385] kasan_atomics+0x95/0x310 [ 16.470574] kunit_try_run_case+0x1a5/0x480 [ 16.470945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.471119] kthread+0x337/0x6f0 [ 16.471239] ret_from_fork+0x116/0x1d0 [ 16.471370] ret_from_fork_asm+0x1a/0x30 [ 16.471507] [ 16.471575] The buggy address belongs to the object at ffff888103ad1980 [ 16.471575] which belongs to the cache kmalloc-64 of size 64 [ 16.472409] The buggy address is located 0 bytes to the right of [ 16.472409] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.473016] [ 16.473130] The buggy address belongs to the physical page: [ 16.473439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.473841] flags: 0x200000000000000(node=0|zone=2) [ 16.474102] page_type: f5(slab) [ 16.474244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.474482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.474972] page dumped because: kasan: bad access detected [ 16.475228] [ 16.475345] Memory state around the buggy address: [ 16.475549] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.475889] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.476197] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.476494] ^ [ 16.476730] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.477035] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.477331] ================================================================== [ 15.830484] ================================================================== [ 15.830799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.831291] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.831630] [ 15.831771] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.831847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.831860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.831881] Call Trace: [ 15.831898] <TASK> [ 15.831924] dump_stack_lvl+0x73/0xb0 [ 15.831953] print_report+0xd1/0x650 [ 15.831977] ? __virt_addr_valid+0x1db/0x2d0 [ 15.832000] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.832023] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.832047] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.832070] kasan_report+0x141/0x180 [ 15.832093] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.832121] __asan_report_load4_noabort+0x18/0x20 [ 15.832147] kasan_atomics_helper+0x4a1c/0x5450 [ 15.832171] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.832195] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.832222] ? kasan_atomics+0x152/0x310 [ 15.832249] kasan_atomics+0x1dc/0x310 [ 15.832273] ? __pfx_kasan_atomics+0x10/0x10 [ 15.832299] ? __pfx_read_tsc+0x10/0x10 [ 15.832321] ? ktime_get_ts64+0x86/0x230 [ 15.832345] kunit_try_run_case+0x1a5/0x480 [ 15.832370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832395] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.832419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.832445] ? __kthread_parkme+0x82/0x180 [ 15.832466] ? preempt_count_sub+0x50/0x80 [ 15.832491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.832542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.832568] kthread+0x337/0x6f0 [ 15.832588] ? trace_preempt_on+0x20/0xc0 [ 15.832613] ? __pfx_kthread+0x10/0x10 [ 15.832679] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.832705] ? calculate_sigpending+0x7b/0xa0 [ 15.832730] ? __pfx_kthread+0x10/0x10 [ 15.832768] ret_from_fork+0x116/0x1d0 [ 15.832787] ? __pfx_kthread+0x10/0x10 [ 15.832809] ret_from_fork_asm+0x1a/0x30 [ 15.832841] </TASK> [ 15.832852] [ 15.840421] Allocated by task 283: [ 15.840718] kasan_save_stack+0x45/0x70 [ 15.840984] kasan_save_track+0x18/0x40 [ 15.841154] kasan_save_alloc_info+0x3b/0x50 [ 15.841304] __kasan_kmalloc+0xb7/0xc0 [ 15.841479] __kmalloc_cache_noprof+0x189/0x420 [ 15.841774] kasan_atomics+0x95/0x310 [ 15.841989] kunit_try_run_case+0x1a5/0x480 [ 15.842183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.842407] kthread+0x337/0x6f0 [ 15.842580] ret_from_fork+0x116/0x1d0 [ 15.842765] ret_from_fork_asm+0x1a/0x30 [ 15.842933] [ 15.843028] The buggy address belongs to the object at ffff888103ad1980 [ 15.843028] which belongs to the cache kmalloc-64 of size 64 [ 15.843495] The buggy address is located 0 bytes to the right of [ 15.843495] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.844109] [ 15.844226] The buggy address belongs to the physical page: [ 15.844480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.844871] flags: 0x200000000000000(node=0|zone=2) [ 15.845038] page_type: f5(slab) [ 15.845158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.845389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.845740] page dumped because: kasan: bad access detected [ 15.846051] [ 15.846147] Memory state around the buggy address: [ 15.846379] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.846729] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.847060] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.847348] ^ [ 15.847576] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.847899] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.848116] ================================================================== [ 15.239877] ================================================================== [ 15.240517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.241237] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.242625] [ 15.242837] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.243161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.243180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.243203] Call Trace: [ 15.243219] <TASK> [ 15.243238] dump_stack_lvl+0x73/0xb0 [ 15.243270] print_report+0xd1/0x650 [ 15.243293] ? __virt_addr_valid+0x1db/0x2d0 [ 15.243318] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.243341] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.243365] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.243389] kasan_report+0x141/0x180 [ 15.243412] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.243439] __asan_report_load4_noabort+0x18/0x20 [ 15.243465] kasan_atomics_helper+0x4b54/0x5450 [ 15.243489] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.243513] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.243539] ? kasan_atomics+0x152/0x310 [ 15.243567] kasan_atomics+0x1dc/0x310 [ 15.243590] ? __pfx_kasan_atomics+0x10/0x10 [ 15.243615] ? __pfx_read_tsc+0x10/0x10 [ 15.243636] ? ktime_get_ts64+0x86/0x230 [ 15.243687] kunit_try_run_case+0x1a5/0x480 [ 15.243712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.243737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.243774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.243799] ? __kthread_parkme+0x82/0x180 [ 15.243821] ? preempt_count_sub+0x50/0x80 [ 15.243847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.243873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.243900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.243926] kthread+0x337/0x6f0 [ 15.243947] ? trace_preempt_on+0x20/0xc0 [ 15.243973] ? __pfx_kthread+0x10/0x10 [ 15.243994] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.244017] ? calculate_sigpending+0x7b/0xa0 [ 15.244042] ? __pfx_kthread+0x10/0x10 [ 15.244064] ret_from_fork+0x116/0x1d0 [ 15.244084] ? __pfx_kthread+0x10/0x10 [ 15.244105] ret_from_fork_asm+0x1a/0x30 [ 15.244137] </TASK> [ 15.244148] [ 15.257981] Allocated by task 283: [ 15.258149] kasan_save_stack+0x45/0x70 [ 15.258346] kasan_save_track+0x18/0x40 [ 15.258530] kasan_save_alloc_info+0x3b/0x50 [ 15.259087] __kasan_kmalloc+0xb7/0xc0 [ 15.259264] __kmalloc_cache_noprof+0x189/0x420 [ 15.259428] kasan_atomics+0x95/0x310 [ 15.259938] kunit_try_run_case+0x1a5/0x480 [ 15.260266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.260488] kthread+0x337/0x6f0 [ 15.260858] ret_from_fork+0x116/0x1d0 [ 15.261203] ret_from_fork_asm+0x1a/0x30 [ 15.261477] [ 15.261580] The buggy address belongs to the object at ffff888103ad1980 [ 15.261580] which belongs to the cache kmalloc-64 of size 64 [ 15.262275] The buggy address is located 0 bytes to the right of [ 15.262275] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.263125] [ 15.263209] The buggy address belongs to the physical page: [ 15.263454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.264114] flags: 0x200000000000000(node=0|zone=2) [ 15.264482] page_type: f5(slab) [ 15.264627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.265324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.265782] page dumped because: kasan: bad access detected [ 15.266029] [ 15.266120] Memory state around the buggy address: [ 15.266336] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.266663] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.267380] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.267922] ^ [ 15.268148] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.268452] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.269003] ================================================================== [ 15.382588] ================================================================== [ 15.383458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.384213] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.384936] [ 15.385034] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.385092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.385105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.385137] Call Trace: [ 15.385154] <TASK> [ 15.385171] dump_stack_lvl+0x73/0xb0 [ 15.385202] print_report+0xd1/0x650 [ 15.385235] ? __virt_addr_valid+0x1db/0x2d0 [ 15.385260] ? kasan_atomics_helper+0x697/0x5450 [ 15.385283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.385319] ? kasan_atomics_helper+0x697/0x5450 [ 15.385342] kasan_report+0x141/0x180 [ 15.385366] ? kasan_atomics_helper+0x697/0x5450 [ 15.385404] kasan_check_range+0x10c/0x1c0 [ 15.385429] __kasan_check_write+0x18/0x20 [ 15.385450] kasan_atomics_helper+0x697/0x5450 [ 15.385474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.385497] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.385534] ? kasan_atomics+0x152/0x310 [ 15.385562] kasan_atomics+0x1dc/0x310 [ 15.385596] ? __pfx_kasan_atomics+0x10/0x10 [ 15.385622] ? __pfx_read_tsc+0x10/0x10 [ 15.385644] ? ktime_get_ts64+0x86/0x230 [ 15.385670] kunit_try_run_case+0x1a5/0x480 [ 15.385703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.385727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.385770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.385796] ? __kthread_parkme+0x82/0x180 [ 15.385819] ? preempt_count_sub+0x50/0x80 [ 15.385844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.385870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.385896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.385981] kthread+0x337/0x6f0 [ 15.386004] ? trace_preempt_on+0x20/0xc0 [ 15.386029] ? __pfx_kthread+0x10/0x10 [ 15.386050] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.386074] ? calculate_sigpending+0x7b/0xa0 [ 15.386099] ? __pfx_kthread+0x10/0x10 [ 15.386121] ret_from_fork+0x116/0x1d0 [ 15.386141] ? __pfx_kthread+0x10/0x10 [ 15.386163] ret_from_fork_asm+0x1a/0x30 [ 15.386194] </TASK> [ 15.386206] [ 15.400293] Allocated by task 283: [ 15.400631] kasan_save_stack+0x45/0x70 [ 15.400995] kasan_save_track+0x18/0x40 [ 15.401137] kasan_save_alloc_info+0x3b/0x50 [ 15.401558] __kasan_kmalloc+0xb7/0xc0 [ 15.401975] __kmalloc_cache_noprof+0x189/0x420 [ 15.402236] kasan_atomics+0x95/0x310 [ 15.402375] kunit_try_run_case+0x1a5/0x480 [ 15.402523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.402997] kthread+0x337/0x6f0 [ 15.403402] ret_from_fork+0x116/0x1d0 [ 15.403821] ret_from_fork_asm+0x1a/0x30 [ 15.404307] [ 15.404519] The buggy address belongs to the object at ffff888103ad1980 [ 15.404519] which belongs to the cache kmalloc-64 of size 64 [ 15.405842] The buggy address is located 0 bytes to the right of [ 15.405842] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.406401] [ 15.406476] The buggy address belongs to the physical page: [ 15.406651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.406902] flags: 0x200000000000000(node=0|zone=2) [ 15.407067] page_type: f5(slab) [ 15.407188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.407427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.407713] page dumped because: kasan: bad access detected [ 15.408232] [ 15.408388] Memory state around the buggy address: [ 15.408938] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.409586] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.410493] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.411387] ^ [ 15.411848] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.412689] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.413452] ================================================================== [ 16.228423] ================================================================== [ 16.229179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.229610] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 16.230281] [ 16.230417] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.230569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.230583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.230604] Call Trace: [ 16.230618] <TASK> [ 16.230634] dump_stack_lvl+0x73/0xb0 [ 16.230666] print_report+0xd1/0x650 [ 16.230690] ? __virt_addr_valid+0x1db/0x2d0 [ 16.230715] ? kasan_atomics_helper+0x194a/0x5450 [ 16.230737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.230774] ? kasan_atomics_helper+0x194a/0x5450 [ 16.230797] kasan_report+0x141/0x180 [ 16.230820] ? kasan_atomics_helper+0x194a/0x5450 [ 16.230848] kasan_check_range+0x10c/0x1c0 [ 16.230873] __kasan_check_write+0x18/0x20 [ 16.230893] kasan_atomics_helper+0x194a/0x5450 [ 16.230918] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.230943] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.230969] ? kasan_atomics+0x152/0x310 [ 16.230996] kasan_atomics+0x1dc/0x310 [ 16.231020] ? __pfx_kasan_atomics+0x10/0x10 [ 16.231045] ? __pfx_read_tsc+0x10/0x10 [ 16.231067] ? ktime_get_ts64+0x86/0x230 [ 16.231092] kunit_try_run_case+0x1a5/0x480 [ 16.231117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.231142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.231167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.231192] ? __kthread_parkme+0x82/0x180 [ 16.231214] ? preempt_count_sub+0x50/0x80 [ 16.231239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.231264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.231290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.231316] kthread+0x337/0x6f0 [ 16.231337] ? trace_preempt_on+0x20/0xc0 [ 16.231361] ? __pfx_kthread+0x10/0x10 [ 16.231383] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.231406] ? calculate_sigpending+0x7b/0xa0 [ 16.231431] ? __pfx_kthread+0x10/0x10 [ 16.231454] ret_from_fork+0x116/0x1d0 [ 16.231474] ? __pfx_kthread+0x10/0x10 [ 16.231495] ret_from_fork_asm+0x1a/0x30 [ 16.231526] </TASK> [ 16.231537] [ 16.242332] Allocated by task 283: [ 16.242619] kasan_save_stack+0x45/0x70 [ 16.242941] kasan_save_track+0x18/0x40 [ 16.243201] kasan_save_alloc_info+0x3b/0x50 [ 16.243468] __kasan_kmalloc+0xb7/0xc0 [ 16.243796] __kmalloc_cache_noprof+0x189/0x420 [ 16.244041] kasan_atomics+0x95/0x310 [ 16.244203] kunit_try_run_case+0x1a5/0x480 [ 16.244397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.244640] kthread+0x337/0x6f0 [ 16.245097] ret_from_fork+0x116/0x1d0 [ 16.245260] ret_from_fork_asm+0x1a/0x30 [ 16.245565] [ 16.245683] The buggy address belongs to the object at ffff888103ad1980 [ 16.245683] which belongs to the cache kmalloc-64 of size 64 [ 16.246414] The buggy address is located 0 bytes to the right of [ 16.246414] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 16.247164] [ 16.247252] The buggy address belongs to the physical page: [ 16.247491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 16.248064] flags: 0x200000000000000(node=0|zone=2) [ 16.248393] page_type: f5(slab) [ 16.248575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.249176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.249568] page dumped because: kasan: bad access detected [ 16.249946] [ 16.250050] Memory state around the buggy address: [ 16.250396] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.250881] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.251250] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.251557] ^ [ 16.251787] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.252280] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.252643] ================================================================== [ 15.934072] ================================================================== [ 15.934713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.935417] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.936042] [ 15.936213] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.936257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.936270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.936291] Call Trace: [ 15.936309] <TASK> [ 15.936325] dump_stack_lvl+0x73/0xb0 [ 15.936355] print_report+0xd1/0x650 [ 15.936379] ? __virt_addr_valid+0x1db/0x2d0 [ 15.936428] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.936451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.936477] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.936500] kasan_report+0x141/0x180 [ 15.936523] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.936550] __asan_report_load4_noabort+0x18/0x20 [ 15.936599] kasan_atomics_helper+0x49e8/0x5450 [ 15.936623] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.936649] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.936684] ? kasan_atomics+0x152/0x310 [ 15.936712] kasan_atomics+0x1dc/0x310 [ 15.936736] ? __pfx_kasan_atomics+0x10/0x10 [ 15.936772] ? __pfx_read_tsc+0x10/0x10 [ 15.936793] ? ktime_get_ts64+0x86/0x230 [ 15.936818] kunit_try_run_case+0x1a5/0x480 [ 15.936844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.936869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.936896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.936921] ? __kthread_parkme+0x82/0x180 [ 15.936942] ? preempt_count_sub+0x50/0x80 [ 15.936967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.936993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.937018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.937046] kthread+0x337/0x6f0 [ 15.937066] ? trace_preempt_on+0x20/0xc0 [ 15.937091] ? __pfx_kthread+0x10/0x10 [ 15.937113] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.937137] ? calculate_sigpending+0x7b/0xa0 [ 15.937162] ? __pfx_kthread+0x10/0x10 [ 15.937184] ret_from_fork+0x116/0x1d0 [ 15.937203] ? __pfx_kthread+0x10/0x10 [ 15.937225] ret_from_fork_asm+0x1a/0x30 [ 15.937256] </TASK> [ 15.937267] [ 15.944586] Allocated by task 283: [ 15.944769] kasan_save_stack+0x45/0x70 [ 15.944909] kasan_save_track+0x18/0x40 [ 15.945042] kasan_save_alloc_info+0x3b/0x50 [ 15.945186] __kasan_kmalloc+0xb7/0xc0 [ 15.945390] __kmalloc_cache_noprof+0x189/0x420 [ 15.945608] kasan_atomics+0x95/0x310 [ 15.945953] kunit_try_run_case+0x1a5/0x480 [ 15.946135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.946305] kthread+0x337/0x6f0 [ 15.946427] ret_from_fork+0x116/0x1d0 [ 15.946609] ret_from_fork_asm+0x1a/0x30 [ 15.946812] [ 15.946905] The buggy address belongs to the object at ffff888103ad1980 [ 15.946905] which belongs to the cache kmalloc-64 of size 64 [ 15.947464] The buggy address is located 0 bytes to the right of [ 15.947464] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.947954] [ 15.948025] The buggy address belongs to the physical page: [ 15.948190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.948432] flags: 0x200000000000000(node=0|zone=2) [ 15.948677] page_type: f5(slab) [ 15.948884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.949234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.949595] page dumped because: kasan: bad access detected [ 15.949910] [ 15.949978] Memory state around the buggy address: [ 15.950128] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.950481] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.950767] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.950975] ^ [ 15.951128] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.951536] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.951848] ================================================================== [ 15.877463] ================================================================== [ 15.878228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.879196] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.879978] [ 15.880262] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.880319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.880333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.880353] Call Trace: [ 15.880371] <TASK> [ 15.880390] dump_stack_lvl+0x73/0xb0 [ 15.880422] print_report+0xd1/0x650 [ 15.880447] ? __virt_addr_valid+0x1db/0x2d0 [ 15.880472] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.880495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.880520] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.880543] kasan_report+0x141/0x180 [ 15.880566] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.880595] __asan_report_load4_noabort+0x18/0x20 [ 15.880623] kasan_atomics_helper+0x4a02/0x5450 [ 15.880655] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.880679] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.880707] ? kasan_atomics+0x152/0x310 [ 15.880734] kasan_atomics+0x1dc/0x310 [ 15.880766] ? __pfx_kasan_atomics+0x10/0x10 [ 15.880791] ? __pfx_read_tsc+0x10/0x10 [ 15.880814] ? ktime_get_ts64+0x86/0x230 [ 15.880841] kunit_try_run_case+0x1a5/0x480 [ 15.880867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.880892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.880919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.880944] ? __kthread_parkme+0x82/0x180 [ 15.880966] ? preempt_count_sub+0x50/0x80 [ 15.880991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.881018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.881043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.881069] kthread+0x337/0x6f0 [ 15.881090] ? trace_preempt_on+0x20/0xc0 [ 15.881115] ? __pfx_kthread+0x10/0x10 [ 15.881136] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.881159] ? calculate_sigpending+0x7b/0xa0 [ 15.881184] ? __pfx_kthread+0x10/0x10 [ 15.881207] ret_from_fork+0x116/0x1d0 [ 15.881226] ? __pfx_kthread+0x10/0x10 [ 15.881248] ret_from_fork_asm+0x1a/0x30 [ 15.881281] </TASK> [ 15.881292] [ 15.895264] Allocated by task 283: [ 15.895397] kasan_save_stack+0x45/0x70 [ 15.895543] kasan_save_track+0x18/0x40 [ 15.895690] kasan_save_alloc_info+0x3b/0x50 [ 15.895976] __kasan_kmalloc+0xb7/0xc0 [ 15.896110] __kmalloc_cache_noprof+0x189/0x420 [ 15.896288] kasan_atomics+0x95/0x310 [ 15.896474] kunit_try_run_case+0x1a5/0x480 [ 15.896695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.897106] kthread+0x337/0x6f0 [ 15.897276] ret_from_fork+0x116/0x1d0 [ 15.897455] ret_from_fork_asm+0x1a/0x30 [ 15.897641] [ 15.898077] The buggy address belongs to the object at ffff888103ad1980 [ 15.898077] which belongs to the cache kmalloc-64 of size 64 [ 15.899008] The buggy address is located 0 bytes to the right of [ 15.899008] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.899819] [ 15.899928] The buggy address belongs to the physical page: [ 15.900277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.900613] flags: 0x200000000000000(node=0|zone=2) [ 15.901070] page_type: f5(slab) [ 15.901362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.901998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.902397] page dumped because: kasan: bad access detected [ 15.902634] [ 15.902909] Memory state around the buggy address: [ 15.903365] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.903843] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.904159] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.904447] ^ [ 15.904801] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.905273] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.905501] ================================================================== [ 15.952315] ================================================================== [ 15.952949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.953444] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283 [ 15.953826] [ 15.953959] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.954002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.954014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.954035] Call Trace: [ 15.954051] <TASK> [ 15.954068] dump_stack_lvl+0x73/0xb0 [ 15.954096] print_report+0xd1/0x650 [ 15.954119] ? __virt_addr_valid+0x1db/0x2d0 [ 15.954143] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.954167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.954199] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.954222] kasan_report+0x141/0x180 [ 15.954245] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.954272] kasan_check_range+0x10c/0x1c0 [ 15.954297] __kasan_check_write+0x18/0x20 [ 15.954318] kasan_atomics_helper+0x12e6/0x5450 [ 15.954342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.954372] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.954398] ? kasan_atomics+0x152/0x310 [ 15.954426] kasan_atomics+0x1dc/0x310 [ 15.954449] ? __pfx_kasan_atomics+0x10/0x10 [ 15.954475] ? __pfx_read_tsc+0x10/0x10 [ 15.954497] ? ktime_get_ts64+0x86/0x230 [ 15.954523] kunit_try_run_case+0x1a5/0x480 [ 15.954548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.954572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.954598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.954623] ? __kthread_parkme+0x82/0x180 [ 15.954644] ? preempt_count_sub+0x50/0x80 [ 15.954696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.954723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.954760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.954787] kthread+0x337/0x6f0 [ 15.954808] ? trace_preempt_on+0x20/0xc0 [ 15.954832] ? __pfx_kthread+0x10/0x10 [ 15.954854] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.954876] ? calculate_sigpending+0x7b/0xa0 [ 15.954902] ? __pfx_kthread+0x10/0x10 [ 15.954924] ret_from_fork+0x116/0x1d0 [ 15.954943] ? __pfx_kthread+0x10/0x10 [ 15.954965] ret_from_fork_asm+0x1a/0x30 [ 15.955018] </TASK> [ 15.955029] [ 15.962410] Allocated by task 283: [ 15.962589] kasan_save_stack+0x45/0x70 [ 15.962911] kasan_save_track+0x18/0x40 [ 15.963193] kasan_save_alloc_info+0x3b/0x50 [ 15.963387] __kasan_kmalloc+0xb7/0xc0 [ 15.963566] __kmalloc_cache_noprof+0x189/0x420 [ 15.963854] kasan_atomics+0x95/0x310 [ 15.964060] kunit_try_run_case+0x1a5/0x480 [ 15.964272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964509] kthread+0x337/0x6f0 [ 15.964632] ret_from_fork+0x116/0x1d0 [ 15.964776] ret_from_fork_asm+0x1a/0x30 [ 15.964917] [ 15.964988] The buggy address belongs to the object at ffff888103ad1980 [ 15.964988] which belongs to the cache kmalloc-64 of size 64 [ 15.965451] The buggy address is located 0 bytes to the right of [ 15.965451] allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0) [ 15.966011] [ 15.966106] The buggy address belongs to the physical page: [ 15.966398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1 [ 15.966811] flags: 0x200000000000000(node=0|zone=2) [ 15.966973] page_type: f5(slab) [ 15.967093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.967324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.967598] page dumped because: kasan: bad access detected [ 15.968116] [ 15.968211] Memory state around the buggy address: [ 15.968459] ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.968871] ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.969194] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.969452] ^ [ 15.969613] ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969994] ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.970329] ==================================================================