Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   23.655405] ==================================================================
[   23.655509] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   23.655996] Read of size 1 at addr fff00000c660037f by task kunit_try_catch/196
[   23.656439] 
[   23.656713] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.656970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.657042] Hardware name: linux,dummy-virt (DT)
[   23.657582] Call trace:
[   23.657652]  show_stack+0x20/0x38 (C)
[   23.658300]  dump_stack_lvl+0x8c/0xd0
[   23.658459]  print_report+0x118/0x608
[   23.658820]  kasan_report+0xdc/0x128
[   23.659347]  __asan_report_load1_noabort+0x20/0x30
[   23.659486]  ksize_unpoisons_memory+0x690/0x740
[   23.660058]  kunit_try_run_case+0x170/0x3f0
[   23.660712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.661135]  kthread+0x328/0x630
[   23.661311]  ret_from_fork+0x10/0x20
[   23.661793] 
[   23.662031] Allocated by task 196:
[   23.662113]  kasan_save_stack+0x3c/0x68
[   23.662215]  kasan_save_track+0x20/0x40
[   23.662456]  kasan_save_alloc_info+0x40/0x58
[   23.663413]  __kasan_kmalloc+0xd4/0xd8
[   23.664055]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.664120]  ksize_unpoisons_memory+0xc0/0x740
[   23.664174]  kunit_try_run_case+0x170/0x3f0
[   23.664268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.664470]  kthread+0x328/0x630
[   23.664586]  ret_from_fork+0x10/0x20
[   23.664675] 
[   23.664722] The buggy address belongs to the object at fff00000c6600300
[   23.664722]  which belongs to the cache kmalloc-128 of size 128
[   23.665728] The buggy address is located 12 bytes to the right of
[   23.665728]  allocated 115-byte region [fff00000c6600300, fff00000c6600373)
[   23.666205] 
[   23.666357] The buggy address belongs to the physical page:
[   23.667030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[   23.667169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.667296] page_type: f5(slab)
[   23.667394] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.667528] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.668133] page dumped because: kasan: bad access detected
[   23.668246] 
[   23.668336] Memory state around the buggy address:
[   23.668424]  fff00000c6600200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.668586]  fff00000c6600280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.668705] >fff00000c6600300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.668891]                                                                 ^
[   23.669183]  fff00000c6600380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.669423]  fff00000c6600400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.669581] ==================================================================
[   23.630967] ==================================================================
[   23.631184] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   23.631441] Read of size 1 at addr fff00000c6600373 by task kunit_try_catch/196
[   23.631612] 
[   23.631834] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.632051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.632113] Hardware name: linux,dummy-virt (DT)
[   23.632192] Call trace:
[   23.632964]  show_stack+0x20/0x38 (C)
[   23.633107]  dump_stack_lvl+0x8c/0xd0
[   23.633232]  print_report+0x118/0x608
[   23.633361]  kasan_report+0xdc/0x128
[   23.633479]  __asan_report_load1_noabort+0x20/0x30
[   23.633617]  ksize_unpoisons_memory+0x628/0x740
[   23.633744]  kunit_try_run_case+0x170/0x3f0
[   23.633864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.634018]  kthread+0x328/0x630
[   23.634167]  ret_from_fork+0x10/0x20
[   23.634472] 
[   23.634522] Allocated by task 196:
[   23.634586]  kasan_save_stack+0x3c/0x68
[   23.634711]  kasan_save_track+0x20/0x40
[   23.634944]  kasan_save_alloc_info+0x40/0x58
[   23.635054]  __kasan_kmalloc+0xd4/0xd8
[   23.635161]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.635318]  ksize_unpoisons_memory+0xc0/0x740
[   23.635443]  kunit_try_run_case+0x170/0x3f0
[   23.635549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.635720]  kthread+0x328/0x630
[   23.635821]  ret_from_fork+0x10/0x20
[   23.635918] 
[   23.635986] The buggy address belongs to the object at fff00000c6600300
[   23.635986]  which belongs to the cache kmalloc-128 of size 128
[   23.636128] The buggy address is located 0 bytes to the right of
[   23.636128]  allocated 115-byte region [fff00000c6600300, fff00000c6600373)
[   23.636303] 
[   23.636360] The buggy address belongs to the physical page:
[   23.636473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[   23.636618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.636765] page_type: f5(slab)
[   23.636951] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.637122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.637222] page dumped because: kasan: bad access detected
[   23.637304] 
[   23.637345] Memory state around the buggy address:
[   23.637419]  fff00000c6600200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.637563]  fff00000c6600280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.637832] >fff00000c6600300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.637966]                                                              ^
[   23.638181]  fff00000c6600380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.638474]  fff00000c6600400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.638732] ==================================================================
[   23.640209] ==================================================================
[   23.640581] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   23.641216] Read of size 1 at addr fff00000c6600378 by task kunit_try_catch/196
[   23.641525] 
[   23.641690] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.641882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.642112] Hardware name: linux,dummy-virt (DT)
[   23.642338] Call trace:
[   23.642397]  show_stack+0x20/0x38 (C)
[   23.642993]  dump_stack_lvl+0x8c/0xd0
[   23.643162]  print_report+0x118/0x608
[   23.643445]  kasan_report+0xdc/0x128
[   23.643633]  __asan_report_load1_noabort+0x20/0x30
[   23.643742]  ksize_unpoisons_memory+0x618/0x740
[   23.643818]  kunit_try_run_case+0x170/0x3f0
[   23.644041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.644219]  kthread+0x328/0x630
[   23.644389]  ret_from_fork+0x10/0x20
[   23.644520] 
[   23.644652] Allocated by task 196:
[   23.644864]  kasan_save_stack+0x3c/0x68
[   23.644991]  kasan_save_track+0x20/0x40
[   23.645244]  kasan_save_alloc_info+0x40/0x58
[   23.645529]  __kasan_kmalloc+0xd4/0xd8
[   23.645667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.647251]  ksize_unpoisons_memory+0xc0/0x740
[   23.647422]  kunit_try_run_case+0x170/0x3f0
[   23.648375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.648555]  kthread+0x328/0x630
[   23.648646]  ret_from_fork+0x10/0x20
[   23.648739] 
[   23.648830] The buggy address belongs to the object at fff00000c6600300
[   23.648830]  which belongs to the cache kmalloc-128 of size 128
[   23.648997] The buggy address is located 5 bytes to the right of
[   23.648997]  allocated 115-byte region [fff00000c6600300, fff00000c6600373)
[   23.649621] 
[   23.649762] The buggy address belongs to the physical page:
[   23.649987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[   23.650113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.650232] page_type: f5(slab)
[   23.650455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.650631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.650901] page dumped because: kasan: bad access detected
[   23.651033] 
[   23.651084] Memory state around the buggy address:
[   23.651462]  fff00000c6600200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.651616]  fff00000c6600280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.651888] >fff00000c6600300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.652005]                                                                 ^
[   23.652110]  fff00000c6600380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.652220]  fff00000c6600400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.652308] ==================================================================

[   11.929161] ==================================================================
[   11.929407] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   11.929863] Read of size 1 at addr ffff888102b31d7f by task kunit_try_catch/214
[   11.930191] 
[   11.930297] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   11.930348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.930359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.930378] Call Trace:
[   11.930393]  <TASK>
[   11.930408]  dump_stack_lvl+0x73/0xb0
[   11.930430]  print_report+0xd1/0x650
[   11.930451]  ? __virt_addr_valid+0x1db/0x2d0
[   11.930471]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.930548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.930570]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.930593]  kasan_report+0x141/0x180
[   11.930615]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.930643]  __asan_report_load1_noabort+0x18/0x20
[   11.930664]  ksize_unpoisons_memory+0x7b6/0x9b0
[   11.930687]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.930710]  ? finish_task_switch.isra.0+0x153/0x700
[   11.930731]  ? __switch_to+0x5d9/0xf60
[   11.930750]  ? dequeue_task_fair+0x166/0x4e0
[   11.930774]  ? __schedule+0x10cc/0x2b30
[   11.930796]  ? __pfx_read_tsc+0x10/0x10
[   11.930815]  ? ktime_get_ts64+0x86/0x230
[   11.930840]  kunit_try_run_case+0x1a5/0x480
[   11.930862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.930883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.930906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.930929]  ? __kthread_parkme+0x82/0x180
[   11.930949]  ? preempt_count_sub+0x50/0x80
[   11.930973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.930995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.931016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.931038]  kthread+0x337/0x6f0
[   11.931058]  ? trace_preempt_on+0x20/0xc0
[   11.931080]  ? __pfx_kthread+0x10/0x10
[   11.931101]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.931122]  ? calculate_sigpending+0x7b/0xa0
[   11.931143]  ? __pfx_kthread+0x10/0x10
[   11.931164]  ret_from_fork+0x41/0x80
[   11.931184]  ? __pfx_kthread+0x10/0x10
[   11.931205]  ret_from_fork_asm+0x1a/0x30
[   11.931236]  </TASK>
[   11.931245] 
[   11.939268] Allocated by task 214:
[   11.939675]  kasan_save_stack+0x45/0x70
[   11.939890]  kasan_save_track+0x18/0x40
[   11.940091]  kasan_save_alloc_info+0x3b/0x50
[   11.940546]  __kasan_kmalloc+0xb7/0xc0
[   11.940690]  __kmalloc_cache_noprof+0x189/0x420
[   11.940907]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.941100]  kunit_try_run_case+0x1a5/0x480
[   11.941259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.941659]  kthread+0x337/0x6f0
[   11.941841]  ret_from_fork+0x41/0x80
[   11.942024]  ret_from_fork_asm+0x1a/0x30
[   11.942163] 
[   11.942436] The buggy address belongs to the object at ffff888102b31d00
[   11.942436]  which belongs to the cache kmalloc-128 of size 128
[   11.942875] The buggy address is located 12 bytes to the right of
[   11.942875]  allocated 115-byte region [ffff888102b31d00, ffff888102b31d73)
[   11.943609] 
[   11.943715] The buggy address belongs to the physical page:
[   11.943942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   11.944187] flags: 0x200000000000000(node=0|zone=2)
[   11.944362] page_type: f5(slab)
[   11.944482] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.944711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.945036] page dumped because: kasan: bad access detected
[   11.945535] 
[   11.945632] Memory state around the buggy address:
[   11.945853]  ffff888102b31c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.946739]  ffff888102b31c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.947052] >ffff888102b31d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.947920]                                                                 ^
[   11.948303]  ffff888102b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.948761]  ffff888102b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.949056] ==================================================================
[   11.881833] ==================================================================
[   11.883665] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.884662] Read of size 1 at addr ffff888102b31d73 by task kunit_try_catch/214
[   11.885453] 
[   11.886005] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   11.886091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.886104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.886139] Call Trace:
[   11.886152]  <TASK>
[   11.886169]  dump_stack_lvl+0x73/0xb0
[   11.886198]  print_report+0xd1/0x650
[   11.886220]  ? __virt_addr_valid+0x1db/0x2d0
[   11.886242]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.886265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.886287]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.886310]  kasan_report+0x141/0x180
[   11.886343]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.886371]  __asan_report_load1_noabort+0x18/0x20
[   11.886400]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.886424]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.886446]  ? finish_task_switch.isra.0+0x153/0x700
[   11.886469]  ? __switch_to+0x5d9/0xf60
[   11.886490]  ? dequeue_task_fair+0x166/0x4e0
[   11.886515]  ? __schedule+0x10cc/0x2b30
[   11.886539]  ? __pfx_read_tsc+0x10/0x10
[   11.886558]  ? ktime_get_ts64+0x86/0x230
[   11.886583]  kunit_try_run_case+0x1a5/0x480
[   11.886607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.886627]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.886649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.886673]  ? __kthread_parkme+0x82/0x180
[   11.886694]  ? preempt_count_sub+0x50/0x80
[   11.886717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.886739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.886761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.886783]  kthread+0x337/0x6f0
[   11.886803]  ? trace_preempt_on+0x20/0xc0
[   11.886826]  ? __pfx_kthread+0x10/0x10
[   11.886847]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.886868]  ? calculate_sigpending+0x7b/0xa0
[   11.886888]  ? __pfx_kthread+0x10/0x10
[   11.886910]  ret_from_fork+0x41/0x80
[   11.886930]  ? __pfx_kthread+0x10/0x10
[   11.886951]  ret_from_fork_asm+0x1a/0x30
[   11.886982]  </TASK>
[   11.886993] 
[   11.899052] Allocated by task 214:
[   11.899629]  kasan_save_stack+0x45/0x70
[   11.899838]  kasan_save_track+0x18/0x40
[   11.899986]  kasan_save_alloc_info+0x3b/0x50
[   11.900362]  __kasan_kmalloc+0xb7/0xc0
[   11.900728]  __kmalloc_cache_noprof+0x189/0x420
[   11.900940]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.901216]  kunit_try_run_case+0x1a5/0x480
[   11.901675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.901989]  kthread+0x337/0x6f0
[   11.902176]  ret_from_fork+0x41/0x80
[   11.902559]  ret_from_fork_asm+0x1a/0x30
[   11.902768] 
[   11.902855] The buggy address belongs to the object at ffff888102b31d00
[   11.902855]  which belongs to the cache kmalloc-128 of size 128
[   11.903619] The buggy address is located 0 bytes to the right of
[   11.903619]  allocated 115-byte region [ffff888102b31d00, ffff888102b31d73)
[   11.904112] 
[   11.904508] The buggy address belongs to the physical page:
[   11.904704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   11.905188] flags: 0x200000000000000(node=0|zone=2)
[   11.905594] page_type: f5(slab)
[   11.905763] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.906226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.906675] page dumped because: kasan: bad access detected
[   11.906910] 
[   11.907080] Memory state around the buggy address:
[   11.907294]  ffff888102b31c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.907955]  ffff888102b31c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.908380] >ffff888102b31d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.908799]                                                              ^
[   11.909096]  ffff888102b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.909410]  ffff888102b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.909842] ==================================================================
[   11.910304] ==================================================================
[   11.910747] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   11.911044] Read of size 1 at addr ffff888102b31d78 by task kunit_try_catch/214
[   11.911362] 
[   11.911470] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   11.911511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.911523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.911542] Call Trace:
[   11.911556]  <TASK>
[   11.911570]  dump_stack_lvl+0x73/0xb0
[   11.911594]  print_report+0xd1/0x650
[   11.911628]  ? __virt_addr_valid+0x1db/0x2d0
[   11.911649]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.911671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.911693]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.911716]  kasan_report+0x141/0x180
[   11.911738]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.911766]  __asan_report_load1_noabort+0x18/0x20
[   11.911786]  ksize_unpoisons_memory+0x7e9/0x9b0
[   11.911810]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.911832]  ? finish_task_switch.isra.0+0x153/0x700
[   11.911853]  ? __switch_to+0x5d9/0xf60
[   11.911872]  ? dequeue_task_fair+0x166/0x4e0
[   11.911897]  ? __schedule+0x10cc/0x2b30
[   11.911919]  ? __pfx_read_tsc+0x10/0x10
[   11.911938]  ? ktime_get_ts64+0x86/0x230
[   11.911962]  kunit_try_run_case+0x1a5/0x480
[   11.911985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.912005]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.912027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.912050]  ? __kthread_parkme+0x82/0x180
[   11.912070]  ? preempt_count_sub+0x50/0x80
[   11.912094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.912116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.912137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.912159]  kthread+0x337/0x6f0
[   11.912179]  ? trace_preempt_on+0x20/0xc0
[   11.912201]  ? __pfx_kthread+0x10/0x10
[   11.912364]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.912390]  ? calculate_sigpending+0x7b/0xa0
[   11.912413]  ? __pfx_kthread+0x10/0x10
[   11.912435]  ret_from_fork+0x41/0x80
[   11.912456]  ? __pfx_kthread+0x10/0x10
[   11.912477]  ret_from_fork_asm+0x1a/0x30
[   11.912509]  </TASK>
[   11.912518] 
[   11.920708] Allocated by task 214:
[   11.920892]  kasan_save_stack+0x45/0x70
[   11.921035]  kasan_save_track+0x18/0x40
[   11.921365]  kasan_save_alloc_info+0x3b/0x50
[   11.921641]  __kasan_kmalloc+0xb7/0xc0
[   11.921835]  __kmalloc_cache_noprof+0x189/0x420
[   11.922016]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.922239]  kunit_try_run_case+0x1a5/0x480
[   11.922554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.922776]  kthread+0x337/0x6f0
[   11.922929]  ret_from_fork+0x41/0x80
[   11.923111]  ret_from_fork_asm+0x1a/0x30
[   11.923261] 
[   11.923369] The buggy address belongs to the object at ffff888102b31d00
[   11.923369]  which belongs to the cache kmalloc-128 of size 128
[   11.923853] The buggy address is located 5 bytes to the right of
[   11.923853]  allocated 115-byte region [ffff888102b31d00, ffff888102b31d73)
[   11.924385] 
[   11.924482] The buggy address belongs to the physical page:
[   11.924719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   11.925000] flags: 0x200000000000000(node=0|zone=2)
[   11.925273] page_type: f5(slab)
[   11.925463] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.925698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.925924] page dumped because: kasan: bad access detected
[   11.926093] 
[   11.926161] Memory state around the buggy address:
[   11.926375]  ffff888102b31c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.926736]  ffff888102b31c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.927046] >ffff888102b31d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.927570]                                                                 ^
[   11.927864]  ffff888102b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.928101]  ffff888102b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.928758] ==================================================================

[   21.848186] ==================================================================
[   21.848885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   21.849600] Read of size 1 at addr ffff00000ea7e87f by task kunit_try_catch/248
[   21.850268] 
[   21.850432] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.850473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.850484] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.850498] Call trace:
[   21.850507]  show_stack+0x20/0x38 (C)
[   21.850534]  dump_stack_lvl+0x8c/0xd0
[   21.850557]  print_report+0x118/0x608
[   21.850578]  kasan_report+0xdc/0x128
[   21.850599]  __asan_report_load1_noabort+0x20/0x30
[   21.850623]  ksize_unpoisons_memory+0x690/0x740
[   21.850648]  kunit_try_run_case+0x170/0x3f0
[   21.850674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.850703]  kthread+0x328/0x630
[   21.850729]  ret_from_fork+0x10/0x20
[   21.850753] 
[   21.856323] Allocated by task 248:
[   21.856641]  kasan_save_stack+0x3c/0x68
[   21.857003]  kasan_save_track+0x20/0x40
[   21.857363]  kasan_save_alloc_info+0x40/0x58
[   21.857763]  __kasan_kmalloc+0xd4/0xd8
[   21.858116]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.858544]  ksize_unpoisons_memory+0xc0/0x740
[   21.858962]  kunit_try_run_case+0x170/0x3f0
[   21.859356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.859868]  kthread+0x328/0x630
[   21.860177]  ret_from_fork+0x10/0x20
[   21.860517] 
[   21.860664] The buggy address belongs to the object at ffff00000ea7e800
[   21.860664]  which belongs to the cache kmalloc-128 of size 128
[   21.861784] The buggy address is located 12 bytes to the right of
[   21.861784]  allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873)
[   21.862951] 
[   21.863100] The buggy address belongs to the physical page:
[   21.863607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   21.864317] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.864917] page_type: f5(slab)
[   21.865219] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.865922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.866619] page dumped because: kasan: bad access detected
[   21.867125] 
[   21.867272] Memory state around the buggy address:
[   21.867711]  ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.868366]  ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.869020] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.869672]                                                                 ^
[   21.870318]  ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.870972]  ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871624] ==================================================================
[   21.797501] ==================================================================
[   21.798571] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   21.799281] Read of size 1 at addr ffff00000ea7e873 by task kunit_try_catch/248
[   21.799953] 
[   21.800115] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.800158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.800172] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.800187] Call trace:
[   21.800198]  show_stack+0x20/0x38 (C)
[   21.800226]  dump_stack_lvl+0x8c/0xd0
[   21.800254]  print_report+0x118/0x608
[   21.800279]  kasan_report+0xdc/0x128
[   21.800303]  __asan_report_load1_noabort+0x20/0x30
[   21.800332]  ksize_unpoisons_memory+0x628/0x740
[   21.800362]  kunit_try_run_case+0x170/0x3f0
[   21.800393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.800427]  kthread+0x328/0x630
[   21.800457]  ret_from_fork+0x10/0x20
[   21.800486] 
[   21.806075] Allocated by task 248:
[   21.806399]  kasan_save_stack+0x3c/0x68
[   21.806767]  kasan_save_track+0x20/0x40
[   21.807133]  kasan_save_alloc_info+0x40/0x58
[   21.807538]  __kasan_kmalloc+0xd4/0xd8
[   21.807896]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.808329]  ksize_unpoisons_memory+0xc0/0x740
[   21.808753]  kunit_try_run_case+0x170/0x3f0
[   21.809154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.809671]  kthread+0x328/0x630
[   21.809987]  ret_from_fork+0x10/0x20
[   21.810331] 
[   21.810480] The buggy address belongs to the object at ffff00000ea7e800
[   21.810480]  which belongs to the cache kmalloc-128 of size 128
[   21.811605] The buggy address is located 0 bytes to the right of
[   21.811605]  allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873)
[   21.812770] 
[   21.812921] The buggy address belongs to the physical page:
[   21.813433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   21.814150] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.814755] page_type: f5(slab)
[   21.815063] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.815771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.816472] page dumped because: kasan: bad access detected
[   21.816982] 
[   21.817131] Memory state around the buggy address:
[   21.817574]  ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.818232]  ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.818893] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.819548]                                                              ^
[   21.820176]  ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.820836]  ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.821492] ==================================================================
[   21.822635] ==================================================================
[   21.823359] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   21.824090] Read of size 1 at addr ffff00000ea7e878 by task kunit_try_catch/248
[   21.824779] 
[   21.824950] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.825012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.825029] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.825050] Call trace:
[   21.825065]  show_stack+0x20/0x38 (C)
[   21.825103]  dump_stack_lvl+0x8c/0xd0
[   21.825141]  print_report+0x118/0x608
[   21.825176]  kasan_report+0xdc/0x128
[   21.825211]  __asan_report_load1_noabort+0x20/0x30
[   21.825253]  ksize_unpoisons_memory+0x618/0x740
[   21.825296]  kunit_try_run_case+0x170/0x3f0
[   21.825340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.825389]  kthread+0x328/0x630
[   21.825430]  ret_from_fork+0x10/0x20
[   21.825471] 
[   21.831121] Allocated by task 248:
[   21.831461]  kasan_save_stack+0x3c/0x68
[   21.831847]  kasan_save_track+0x20/0x40
[   21.832228]  kasan_save_alloc_info+0x40/0x58
[   21.832651]  __kasan_kmalloc+0xd4/0xd8
[   21.833023]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.833476]  ksize_unpoisons_memory+0xc0/0x740
[   21.833919]  kunit_try_run_case+0x170/0x3f0
[   21.834339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.834877]  kthread+0x328/0x630
[   21.835211]  ret_from_fork+0x10/0x20
[   21.835572] 
[   21.835732] The buggy address belongs to the object at ffff00000ea7e800
[   21.835732]  which belongs to the cache kmalloc-128 of size 128
[   21.836878] The buggy address is located 5 bytes to the right of
[   21.836878]  allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873)
[   21.838065] 
[   21.838225] The buggy address belongs to the physical page:
[   21.838749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   21.839484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.840107] page_type: f5(slab)
[   21.840429] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.841159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.841876] page dumped because: kasan: bad access detected
[   21.842398] 
[   21.842558] Memory state around the buggy address:
[   21.843015]  ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.843691]  ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.844368] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.845039]                                                                 ^
[   21.845705]  ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.846382]  ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.847054] ==================================================================