Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   18.026733] ==================================================================
[   18.026844] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.026952] Read of size 1 at addr fff00000c62d4c78 by task kunit_try_catch/196
[   18.027056] 
[   18.027945] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.028225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.028613] Hardware name: linux,dummy-virt (DT)
[   18.028719] Call trace:
[   18.028789]  show_stack+0x20/0x38 (C)
[   18.028909]  dump_stack_lvl+0x8c/0xd0
[   18.029011]  print_report+0x118/0x608
[   18.029105]  kasan_report+0xdc/0x128
[   18.029206]  __asan_report_load1_noabort+0x20/0x30
[   18.029725]  ksize_unpoisons_memory+0x618/0x740
[   18.030194]  kunit_try_run_case+0x170/0x3f0
[   18.030416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.030556]  kthread+0x328/0x630
[   18.030663]  ret_from_fork+0x10/0x20
[   18.030778] 
[   18.031454] Allocated by task 196:
[   18.031538]  kasan_save_stack+0x3c/0x68
[   18.031631]  kasan_save_track+0x20/0x40
[   18.031706]  kasan_save_alloc_info+0x40/0x58
[   18.031793]  __kasan_kmalloc+0xd4/0xd8
[   18.032622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.033131]  ksize_unpoisons_memory+0xc0/0x740
[   18.033270]  kunit_try_run_case+0x170/0x3f0
[   18.033361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.033457]  kthread+0x328/0x630
[   18.033924]  ret_from_fork+0x10/0x20
[   18.034029] 
[   18.034087] The buggy address belongs to the object at fff00000c62d4c00
[   18.034087]  which belongs to the cache kmalloc-128 of size 128
[   18.034220] The buggy address is located 5 bytes to the right of
[   18.034220]  allocated 115-byte region [fff00000c62d4c00, fff00000c62d4c73)
[   18.034376] 
[   18.034765] The buggy address belongs to the physical page:
[   18.034847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4
[   18.034969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.035086] page_type: f5(slab)
[   18.035618] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.035744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.035836] page dumped because: kasan: bad access detected
[   18.035907] 
[   18.035953] Memory state around the buggy address:
[   18.036025]  fff00000c62d4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.037092]  fff00000c62d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037444] >fff00000c62d4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.037884]                                                                 ^
[   18.038102]  fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.038618]  fff00000c62d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.038751] ==================================================================
[   18.042441] ==================================================================
[   18.042621] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.042787] Read of size 1 at addr fff00000c62d4c7f by task kunit_try_catch/196
[   18.042932] 
[   18.043007] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.043185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.043522] Hardware name: linux,dummy-virt (DT)
[   18.043738] Call trace:
[   18.043804]  show_stack+0x20/0x38 (C)
[   18.043925]  dump_stack_lvl+0x8c/0xd0
[   18.044042]  print_report+0x118/0x608
[   18.044142]  kasan_report+0xdc/0x128
[   18.044510]  __asan_report_load1_noabort+0x20/0x30
[   18.044708]  ksize_unpoisons_memory+0x690/0x740
[   18.044882]  kunit_try_run_case+0x170/0x3f0
[   18.044998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.045115]  kthread+0x328/0x630
[   18.045198]  ret_from_fork+0x10/0x20
[   18.045295] 
[   18.045339] Allocated by task 196:
[   18.045407]  kasan_save_stack+0x3c/0x68
[   18.045515]  kasan_save_track+0x20/0x40
[   18.045605]  kasan_save_alloc_info+0x40/0x58
[   18.045702]  __kasan_kmalloc+0xd4/0xd8
[   18.045791]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.045894]  ksize_unpoisons_memory+0xc0/0x740
[   18.045988]  kunit_try_run_case+0x170/0x3f0
[   18.046112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.046218]  kthread+0x328/0x630
[   18.046303]  ret_from_fork+0x10/0x20
[   18.046614] 
[   18.046677] The buggy address belongs to the object at fff00000c62d4c00
[   18.046677]  which belongs to the cache kmalloc-128 of size 128
[   18.046963] The buggy address is located 12 bytes to the right of
[   18.046963]  allocated 115-byte region [fff00000c62d4c00, fff00000c62d4c73)
[   18.047130] 
[   18.047351] The buggy address belongs to the physical page:
[   18.047509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4
[   18.047663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.047781] page_type: f5(slab)
[   18.047928] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.048188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.048350] page dumped because: kasan: bad access detected
[   18.048413] 
[   18.048453] Memory state around the buggy address:
[   18.048859]  fff00000c62d4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.049073]  fff00000c62d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049196] >fff00000c62d4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.049297]                                                                 ^
[   18.049437]  fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049605]  fff00000c62d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049740] ==================================================================
[   18.013119] ==================================================================
[   18.013262] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.013385] Read of size 1 at addr fff00000c62d4c73 by task kunit_try_catch/196
[   18.013717] 
[   18.013921] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.014139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.014205] Hardware name: linux,dummy-virt (DT)
[   18.014281] Call trace:
[   18.014333]  show_stack+0x20/0x38 (C)
[   18.014446]  dump_stack_lvl+0x8c/0xd0
[   18.014566]  print_report+0x118/0x608
[   18.014676]  kasan_report+0xdc/0x128
[   18.014779]  __asan_report_load1_noabort+0x20/0x30
[   18.014891]  ksize_unpoisons_memory+0x628/0x740
[   18.015006]  kunit_try_run_case+0x170/0x3f0
[   18.015118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.015240]  kthread+0x328/0x630
[   18.015345]  ret_from_fork+0x10/0x20
[   18.015456] 
[   18.015499] Allocated by task 196:
[   18.016049]  kasan_save_stack+0x3c/0x68
[   18.017125]  kasan_save_track+0x20/0x40
[   18.017214]  kasan_save_alloc_info+0x40/0x58
[   18.017295]  __kasan_kmalloc+0xd4/0xd8
[   18.017362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.017444]  ksize_unpoisons_memory+0xc0/0x740
[   18.017644]  kunit_try_run_case+0x170/0x3f0
[   18.017863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.017972]  kthread+0x328/0x630
[   18.018056]  ret_from_fork+0x10/0x20
[   18.018139] 
[   18.018182] The buggy address belongs to the object at fff00000c62d4c00
[   18.018182]  which belongs to the cache kmalloc-128 of size 128
[   18.018322] The buggy address is located 0 bytes to the right of
[   18.018322]  allocated 115-byte region [fff00000c62d4c00, fff00000c62d4c73)
[   18.018473] 
[   18.018832] The buggy address belongs to the physical page:
[   18.019373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4
[   18.019920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.020247] page_type: f5(slab)
[   18.020527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.020853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.020999] page dumped because: kasan: bad access detected
[   18.021127] 
[   18.021170] Memory state around the buggy address:
[   18.021284]  fff00000c62d4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.021435]  fff00000c62d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.022011] >fff00000c62d4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.022169]                                                              ^
[   18.022653]  fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.022845]  fff00000c62d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.022982] ==================================================================

[   18.803416] ==================================================================
[   18.804030] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   18.804733] Read of size 1 at addr ffff888103199b78 by task kunit_try_catch/214
[   18.805588] 
[   18.805875] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.806060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.806099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.806207] Call Trace:
[   18.806257]  <TASK>
[   18.806720]  dump_stack_lvl+0x73/0xb0
[   18.806767]  print_report+0xd1/0x650
[   18.806804]  ? __virt_addr_valid+0x1db/0x2d0
[   18.806837]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.806870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.806902]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.806936]  kasan_report+0x141/0x180
[   18.806967]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.807008]  __asan_report_load1_noabort+0x18/0x20
[   18.807036]  ksize_unpoisons_memory+0x7e9/0x9b0
[   18.807072]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.807105]  ? __schedule+0x2077/0x2b30
[   18.807137]  ? schedule+0x7c/0x2e0
[   18.807167]  ? trace_hardirqs_on+0x37/0xe0
[   18.807201]  ? __schedule+0x2077/0x2b30
[   18.807232]  ? __pfx_read_tsc+0x10/0x10
[   18.807259]  ? ktime_get_ts64+0x86/0x230
[   18.807294]  kunit_try_run_case+0x1a5/0x480
[   18.807328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.807359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.807392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.807431]  ? __kthread_parkme+0x82/0x180
[   18.807528]  ? preempt_count_sub+0x50/0x80
[   18.807569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.807603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.807636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.807667]  kthread+0x337/0x6f0
[   18.807697]  ? trace_preempt_on+0x20/0xc0
[   18.807728]  ? __pfx_kthread+0x10/0x10
[   18.807761]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.807793]  ? calculate_sigpending+0x7b/0xa0
[   18.807822]  ? __pfx_kthread+0x10/0x10
[   18.807854]  ret_from_fork+0x41/0x80
[   18.807883]  ? __pfx_kthread+0x10/0x10
[   18.807913]  ret_from_fork_asm+0x1a/0x30
[   18.807956]  </TASK>
[   18.807969] 
[   18.826828] Allocated by task 214:
[   18.827282]  kasan_save_stack+0x45/0x70
[   18.827951]  kasan_save_track+0x18/0x40
[   18.828257]  kasan_save_alloc_info+0x3b/0x50
[   18.829276]  __kasan_kmalloc+0xb7/0xc0
[   18.829588]  __kmalloc_cache_noprof+0x189/0x420
[   18.830062]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.831012]  kunit_try_run_case+0x1a5/0x480
[   18.831372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.831873]  kthread+0x337/0x6f0
[   18.832203]  ret_from_fork+0x41/0x80
[   18.833081]  ret_from_fork_asm+0x1a/0x30
[   18.833535] 
[   18.833818] The buggy address belongs to the object at ffff888103199b00
[   18.833818]  which belongs to the cache kmalloc-128 of size 128
[   18.835108] The buggy address is located 5 bytes to the right of
[   18.835108]  allocated 115-byte region [ffff888103199b00, ffff888103199b73)
[   18.837259] 
[   18.837445] The buggy address belongs to the physical page:
[   18.838071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199
[   18.839004] flags: 0x200000000000000(node=0|zone=2)
[   18.839389] page_type: f5(slab)
[   18.840288] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.841029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.841607] page dumped because: kasan: bad access detected
[   18.842230] 
[   18.842389] Memory state around the buggy address:
[   18.843360]  ffff888103199a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.843918]  ffff888103199a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.844389] >ffff888103199b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.844954]                                                                 ^
[   18.845467]  ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.846203]  ffff888103199c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.846856] ==================================================================
[   18.758491] ==================================================================
[   18.759527] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   18.760297] Read of size 1 at addr ffff888103199b73 by task kunit_try_catch/214
[   18.761155] 
[   18.761520] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.761764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.761804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.761862] Call Trace:
[   18.761911]  <TASK>
[   18.761965]  dump_stack_lvl+0x73/0xb0
[   18.762051]  print_report+0xd1/0x650
[   18.762124]  ? __virt_addr_valid+0x1db/0x2d0
[   18.762197]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.762269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.762340]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.762413]  kasan_report+0x141/0x180
[   18.762565]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.762608]  __asan_report_load1_noabort+0x18/0x20
[   18.762636]  ksize_unpoisons_memory+0x81c/0x9b0
[   18.762670]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.762702]  ? __schedule+0x2077/0x2b30
[   18.762733]  ? schedule+0x7c/0x2e0
[   18.762760]  ? trace_hardirqs_on+0x37/0xe0
[   18.762794]  ? __schedule+0x2077/0x2b30
[   18.762824]  ? __pfx_read_tsc+0x10/0x10
[   18.762852]  ? ktime_get_ts64+0x86/0x230
[   18.762888]  kunit_try_run_case+0x1a5/0x480
[   18.762923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.762952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.762985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.763018]  ? __kthread_parkme+0x82/0x180
[   18.763049]  ? preempt_count_sub+0x50/0x80
[   18.763083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.763115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.763144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.763174]  kthread+0x337/0x6f0
[   18.763202]  ? trace_preempt_on+0x20/0xc0
[   18.763232]  ? __pfx_kthread+0x10/0x10
[   18.763262]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.763292]  ? calculate_sigpending+0x7b/0xa0
[   18.763321]  ? __pfx_kthread+0x10/0x10
[   18.763351]  ret_from_fork+0x41/0x80
[   18.763379]  ? __pfx_kthread+0x10/0x10
[   18.763409]  ret_from_fork_asm+0x1a/0x30
[   18.763491]  </TASK>
[   18.763530] 
[   18.781881] Allocated by task 214:
[   18.782323]  kasan_save_stack+0x45/0x70
[   18.782982]  kasan_save_track+0x18/0x40
[   18.783390]  kasan_save_alloc_info+0x3b/0x50
[   18.784132]  __kasan_kmalloc+0xb7/0xc0
[   18.784571]  __kmalloc_cache_noprof+0x189/0x420
[   18.784910]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.785345]  kunit_try_run_case+0x1a5/0x480
[   18.786131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.786800]  kthread+0x337/0x6f0
[   18.787175]  ret_from_fork+0x41/0x80
[   18.787715]  ret_from_fork_asm+0x1a/0x30
[   18.788032] 
[   18.788626] The buggy address belongs to the object at ffff888103199b00
[   18.788626]  which belongs to the cache kmalloc-128 of size 128
[   18.789873] The buggy address is located 0 bytes to the right of
[   18.789873]  allocated 115-byte region [ffff888103199b00, ffff888103199b73)
[   18.790861] 
[   18.791364] The buggy address belongs to the physical page:
[   18.791960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199
[   18.792785] flags: 0x200000000000000(node=0|zone=2)
[   18.793298] page_type: f5(slab)
[   18.793792] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.794646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.795233] page dumped because: kasan: bad access detected
[   18.795763] 
[   18.796000] Memory state around the buggy address:
[   18.796468]  ffff888103199a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.796984]  ffff888103199a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.798135] >ffff888103199b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.798680]                                                              ^
[   18.799490]  ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.800060]  ffff888103199c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.800735] ==================================================================
[   18.848330] ==================================================================
[   18.848895] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   18.849751] Read of size 1 at addr ffff888103199b7f by task kunit_try_catch/214
[   18.850806] 
[   18.851152] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.851274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.851308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.851362] Call Trace:
[   18.851414]  <TASK>
[   18.851524]  dump_stack_lvl+0x73/0xb0
[   18.851626]  print_report+0xd1/0x650
[   18.851731]  ? __virt_addr_valid+0x1db/0x2d0
[   18.851804]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.851880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.851974]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.852082]  kasan_report+0x141/0x180
[   18.852161]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.852272]  __asan_report_load1_noabort+0x18/0x20
[   18.852370]  ksize_unpoisons_memory+0x7b6/0x9b0
[   18.852492]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.852578]  ? __schedule+0x2077/0x2b30
[   18.852611]  ? schedule+0x7c/0x2e0
[   18.852641]  ? trace_hardirqs_on+0x37/0xe0
[   18.852675]  ? __schedule+0x2077/0x2b30
[   18.852706]  ? __pfx_read_tsc+0x10/0x10
[   18.852731]  ? ktime_get_ts64+0x86/0x230
[   18.852765]  kunit_try_run_case+0x1a5/0x480
[   18.852800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.852830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.852863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.852895]  ? __kthread_parkme+0x82/0x180
[   18.852924]  ? preempt_count_sub+0x50/0x80
[   18.852958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.852989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.853018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.853048]  kthread+0x337/0x6f0
[   18.853076]  ? trace_preempt_on+0x20/0xc0
[   18.853107]  ? __pfx_kthread+0x10/0x10
[   18.853136]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.853166]  ? calculate_sigpending+0x7b/0xa0
[   18.853194]  ? __pfx_kthread+0x10/0x10
[   18.853224]  ret_from_fork+0x41/0x80
[   18.853253]  ? __pfx_kthread+0x10/0x10
[   18.853282]  ret_from_fork_asm+0x1a/0x30
[   18.853324]  </TASK>
[   18.853336] 
[   18.870513] Allocated by task 214:
[   18.871012]  kasan_save_stack+0x45/0x70
[   18.871574]  kasan_save_track+0x18/0x40
[   18.872079]  kasan_save_alloc_info+0x3b/0x50
[   18.872550]  __kasan_kmalloc+0xb7/0xc0
[   18.873197]  __kmalloc_cache_noprof+0x189/0x420
[   18.874938]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.875317]  kunit_try_run_case+0x1a5/0x480
[   18.875661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.876036]  kthread+0x337/0x6f0
[   18.876396]  ret_from_fork+0x41/0x80
[   18.876878]  ret_from_fork_asm+0x1a/0x30
[   18.877353] 
[   18.877680] The buggy address belongs to the object at ffff888103199b00
[   18.877680]  which belongs to the cache kmalloc-128 of size 128
[   18.878810] The buggy address is located 12 bytes to the right of
[   18.878810]  allocated 115-byte region [ffff888103199b00, ffff888103199b73)
[   18.879838] 
[   18.880026] The buggy address belongs to the physical page:
[   18.880588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199
[   18.881365] flags: 0x200000000000000(node=0|zone=2)
[   18.881926] page_type: f5(slab)
[   18.882305] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.882798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.884748] page dumped because: kasan: bad access detected
[   18.885285] 
[   18.886737] Memory state around the buggy address:
[   18.887093]  ffff888103199a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.888561]  ffff888103199a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.889965] >ffff888103199b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.891867]                                                                 ^
[   18.893546]  ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.895110]  ffff888103199c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.896303] ==================================================================

[   20.156249] ==================================================================
[   20.156909] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   20.157590] Read of size 1 at addr ffff00000c99267f by task kunit_try_catch/252
[   20.158254] 
[   20.158408] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.158442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.158453] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.158464] Call trace:
[   20.158473]  show_stack+0x20/0x38 (C)
[   20.158495]  dump_stack_lvl+0x8c/0xd0
[   20.158518]  print_report+0x118/0x608
[   20.158539]  kasan_report+0xdc/0x128
[   20.158559]  __asan_report_load1_noabort+0x20/0x30
[   20.158583]  ksize_unpoisons_memory+0x690/0x740
[   20.158608]  kunit_try_run_case+0x170/0x3f0
[   20.158634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.158662]  kthread+0x328/0x630
[   20.158685]  ret_from_fork+0x10/0x20
[   20.158708] 
[   20.164275] Allocated by task 252:
[   20.164592]  kasan_save_stack+0x3c/0x68
[   20.164952]  kasan_save_track+0x20/0x40
[   20.165313]  kasan_save_alloc_info+0x40/0x58
[   20.165713]  __kasan_kmalloc+0xd4/0xd8
[   20.166066]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.166493]  ksize_unpoisons_memory+0xc0/0x740
[   20.166912]  kunit_try_run_case+0x170/0x3f0
[   20.167307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.167816]  kthread+0x328/0x630
[   20.168128]  ret_from_fork+0x10/0x20
[   20.168466] 
[   20.168612] The buggy address belongs to the object at ffff00000c992600
[   20.168612]  which belongs to the cache kmalloc-128 of size 128
[   20.169731] The buggy address is located 12 bytes to the right of
[   20.169731]  allocated 115-byte region [ffff00000c992600, ffff00000c992673)
[   20.170899] 
[   20.171046] The buggy address belongs to the physical page:
[   20.171553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.172263] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.172860] page_type: f5(slab)
[   20.173162] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.173864] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.174561] page dumped because: kasan: bad access detected
[   20.175068] 
[   20.175213] Memory state around the buggy address:
[   20.175651]  ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.176305]  ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.176960] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.177612]                                                                 ^
[   20.178258]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.178912]  ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179564] ==================================================================
[   20.132071] ==================================================================
[   20.132743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   20.133434] Read of size 1 at addr ffff00000c992678 by task kunit_try_catch/252
[   20.134104] 
[   20.134267] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.134308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.134319] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.134333] Call trace:
[   20.134342]  show_stack+0x20/0x38 (C)
[   20.134368]  dump_stack_lvl+0x8c/0xd0
[   20.134391]  print_report+0x118/0x608
[   20.134413]  kasan_report+0xdc/0x128
[   20.134433]  __asan_report_load1_noabort+0x20/0x30
[   20.134457]  ksize_unpoisons_memory+0x618/0x740
[   20.134483]  kunit_try_run_case+0x170/0x3f0
[   20.134509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.134538]  kthread+0x328/0x630
[   20.134562]  ret_from_fork+0x10/0x20
[   20.134586] 
[   20.140155] Allocated by task 252:
[   20.140473]  kasan_save_stack+0x3c/0x68
[   20.140836]  kasan_save_track+0x20/0x40
[   20.141195]  kasan_save_alloc_info+0x40/0x58
[   20.141595]  __kasan_kmalloc+0xd4/0xd8
[   20.141947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.142374]  ksize_unpoisons_memory+0xc0/0x740
[   20.142794]  kunit_try_run_case+0x170/0x3f0
[   20.143188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.143699]  kthread+0x328/0x630
[   20.144009]  ret_from_fork+0x10/0x20
[   20.144348] 
[   20.144495] The buggy address belongs to the object at ffff00000c992600
[   20.144495]  which belongs to the cache kmalloc-128 of size 128
[   20.145616] The buggy address is located 5 bytes to the right of
[   20.145616]  allocated 115-byte region [ffff00000c992600, ffff00000c992673)
[   20.146775] 
[   20.146922] The buggy address belongs to the physical page:
[   20.147429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.148142] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.148743] page_type: f5(slab)
[   20.149044] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.149747] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.150444] page dumped because: kasan: bad access detected
[   20.150950] 
[   20.151095] Memory state around the buggy address:
[   20.151534]  ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.152189]  ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.152844] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.153495]                                                                 ^
[   20.154141]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.154796]  ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.155448] ==================================================================
[   20.106980] ==================================================================
[   20.108064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   20.108770] Read of size 1 at addr ffff00000c992673 by task kunit_try_catch/252
[   20.109449] 
[   20.109615] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.109667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.109683] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.109702] Call trace:
[   20.109714]  show_stack+0x20/0x38 (C)
[   20.109749]  dump_stack_lvl+0x8c/0xd0
[   20.109780]  print_report+0x118/0x608
[   20.109810]  kasan_report+0xdc/0x128
[   20.109839]  __asan_report_load1_noabort+0x20/0x30
[   20.109873]  ksize_unpoisons_memory+0x628/0x740
[   20.109909]  kunit_try_run_case+0x170/0x3f0
[   20.109946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.109986]  kthread+0x328/0x630
[   20.110020]  ret_from_fork+0x10/0x20
[   20.110054] 
[   20.115666] Allocated by task 252:
[   20.115993]  kasan_save_stack+0x3c/0x68
[   20.116368]  kasan_save_track+0x20/0x40
[   20.116740]  kasan_save_alloc_info+0x40/0x58
[   20.117153]  __kasan_kmalloc+0xd4/0xd8
[   20.117516]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.117958]  ksize_unpoisons_memory+0xc0/0x740
[   20.118391]  kunit_try_run_case+0x170/0x3f0
[   20.118797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.119322]  kthread+0x328/0x630
[   20.119646]  ret_from_fork+0x10/0x20
[   20.119997] 
[   20.120151] The buggy address belongs to the object at ffff00000c992600
[   20.120151]  which belongs to the cache kmalloc-128 of size 128
[   20.121284] The buggy address is located 0 bytes to the right of
[   20.121284]  allocated 115-byte region [ffff00000c992600, ffff00000c992673)
[   20.122458] 
[   20.122613] The buggy address belongs to the physical page:
[   20.123129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.123853] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.124465] page_type: f5(slab)
[   20.124780] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.125495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.126202] page dumped because: kasan: bad access detected
[   20.126717] 
[   20.126870] Memory state around the buggy address:
[   20.127318]  ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.127984]  ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.128650] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.129313]                                                              ^
[   20.129945]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.130613]  ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.131275] ==================================================================