Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   30.615747] ==================================================================
[   30.625431] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.632804] Read of size 1 at addr ffff000801e28473 by task kunit_try_catch/241
[   30.640094] 
[   30.641582] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.641636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.641654] Hardware name: WinLink E850-96 board (DT)
[   30.641677] Call trace:
[   30.641694]  show_stack+0x20/0x38 (C)
[   30.641731]  dump_stack_lvl+0x8c/0xd0
[   30.641772]  print_report+0x118/0x608
[   30.641808]  kasan_report+0xdc/0x128
[   30.641845]  __asan_report_load1_noabort+0x20/0x30
[   30.641883]  ksize_unpoisons_memory+0x628/0x740
[   30.641916]  kunit_try_run_case+0x170/0x3f0
[   30.641953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641993]  kthread+0x328/0x630
[   30.642023]  ret_from_fork+0x10/0x20
[   30.642057] 
[   30.704764] Allocated by task 241:
[   30.708151]  kasan_save_stack+0x3c/0x68
[   30.711969]  kasan_save_track+0x20/0x40
[   30.715788]  kasan_save_alloc_info+0x40/0x58
[   30.720040]  __kasan_kmalloc+0xd4/0xd8
[   30.723773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.728286]  ksize_unpoisons_memory+0xc0/0x740
[   30.732714]  kunit_try_run_case+0x170/0x3f0
[   30.736880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.742349]  kthread+0x328/0x630
[   30.745561]  ret_from_fork+0x10/0x20
[   30.749120] 
[   30.750598] The buggy address belongs to the object at ffff000801e28400
[   30.750598]  which belongs to the cache kmalloc-128 of size 128
[   30.763098] The buggy address is located 0 bytes to the right of
[   30.763098]  allocated 115-byte region [ffff000801e28400, ffff000801e28473)
[   30.776029] 
[   30.777508] The buggy address belongs to the physical page:
[   30.783064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   30.791049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.798687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.805632] page_type: f5(slab)
[   30.808769] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.816489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.824216] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.832025] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.839837] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   30.847650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.855455] page dumped because: kasan: bad access detected
[   30.861010] 
[   30.862486] Memory state around the buggy address:
[   30.867268]  ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.874469]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.881675] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.888875]                                                              ^
[   30.895736]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.902941]  ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.910144] ==================================================================
[   30.917551] ==================================================================
[   30.924562] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.931930] Read of size 1 at addr ffff000801e28478 by task kunit_try_catch/241
[   30.939221] 
[   30.940709] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.940767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.940785] Hardware name: WinLink E850-96 board (DT)
[   30.940806] Call trace:
[   30.940820]  show_stack+0x20/0x38 (C)
[   30.940859]  dump_stack_lvl+0x8c/0xd0
[   30.940897]  print_report+0x118/0x608
[   30.940933]  kasan_report+0xdc/0x128
[   30.940970]  __asan_report_load1_noabort+0x20/0x30
[   30.941009]  ksize_unpoisons_memory+0x618/0x740
[   30.941041]  kunit_try_run_case+0x170/0x3f0
[   30.941080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.941120]  kthread+0x328/0x630
[   30.941150]  ret_from_fork+0x10/0x20
[   30.941185] 
[   31.003890] Allocated by task 241:
[   31.007278]  kasan_save_stack+0x3c/0x68
[   31.011095]  kasan_save_track+0x20/0x40
[   31.014916]  kasan_save_alloc_info+0x40/0x58
[   31.019168]  __kasan_kmalloc+0xd4/0xd8
[   31.022901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.027414]  ksize_unpoisons_memory+0xc0/0x740
[   31.031841]  kunit_try_run_case+0x170/0x3f0
[   31.036007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.041476]  kthread+0x328/0x630
[   31.044688]  ret_from_fork+0x10/0x20
[   31.048247] 
[   31.049724] The buggy address belongs to the object at ffff000801e28400
[   31.049724]  which belongs to the cache kmalloc-128 of size 128
[   31.062225] The buggy address is located 5 bytes to the right of
[   31.062225]  allocated 115-byte region [ffff000801e28400, ffff000801e28473)
[   31.075157] 
[   31.076636] The buggy address belongs to the physical page:
[   31.082192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   31.090176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.097816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.104758] page_type: f5(slab)
[   31.107895] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.115614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.123341] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.131152] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.138965] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   31.146777] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.154582] page dumped because: kasan: bad access detected
[   31.160138] 
[   31.161613] Memory state around the buggy address:
[   31.166395]  ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.173596]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.180803] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.188002]                                                                 ^
[   31.195124]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.202329]  ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.209531] ==================================================================
[   31.216864] ==================================================================
[   31.223942] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.231318] Read of size 1 at addr ffff000801e2847f by task kunit_try_catch/241
[   31.238609] 
[   31.240094] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   31.240149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.240166] Hardware name: WinLink E850-96 board (DT)
[   31.240186] Call trace:
[   31.240200]  show_stack+0x20/0x38 (C)
[   31.240232]  dump_stack_lvl+0x8c/0xd0
[   31.240271]  print_report+0x118/0x608
[   31.240303]  kasan_report+0xdc/0x128
[   31.240336]  __asan_report_load1_noabort+0x20/0x30
[   31.240374]  ksize_unpoisons_memory+0x690/0x740
[   31.240405]  kunit_try_run_case+0x170/0x3f0
[   31.240440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.240478]  kthread+0x328/0x630
[   31.240505]  ret_from_fork+0x10/0x20
[   31.240540] 
[   31.303278] Allocated by task 241:
[   31.306666]  kasan_save_stack+0x3c/0x68
[   31.310484]  kasan_save_track+0x20/0x40
[   31.314302]  kasan_save_alloc_info+0x40/0x58
[   31.318556]  __kasan_kmalloc+0xd4/0xd8
[   31.322288]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.326802]  ksize_unpoisons_memory+0xc0/0x740
[   31.331230]  kunit_try_run_case+0x170/0x3f0
[   31.335396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.340864]  kthread+0x328/0x630
[   31.344076]  ret_from_fork+0x10/0x20
[   31.347635] 
[   31.349113] The buggy address belongs to the object at ffff000801e28400
[   31.349113]  which belongs to the cache kmalloc-128 of size 128
[   31.361612] The buggy address is located 12 bytes to the right of
[   31.361612]  allocated 115-byte region [ffff000801e28400, ffff000801e28473)
[   31.374631] 
[   31.376108] The buggy address belongs to the physical page:
[   31.381667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   31.389650] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.397289] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.404231] page_type: f5(slab)
[   31.407369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.415089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.422815] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.430627] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.438440] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   31.446252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.454057] page dumped because: kasan: bad access detected
[   31.459613] 
[   31.461088] Memory state around the buggy address:
[   31.465868]  ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.473071]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.480277] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.487477]                                                                 ^
[   31.494598]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.501803]  ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.509004] ==================================================================

[   25.720616] ==================================================================
[   25.720738] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   25.720865] Read of size 1 at addr fff00000c6507973 by task kunit_try_catch/194
[   25.721019] 
[   25.721109] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.721499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.722257] Hardware name: linux,dummy-virt (DT)
[   25.722453] Call trace:
[   25.722617]  show_stack+0x20/0x38 (C)
[   25.722916]  dump_stack_lvl+0x8c/0xd0
[   25.723081]  print_report+0x118/0x608
[   25.723697]  kasan_report+0xdc/0x128
[   25.724043]  __asan_report_load1_noabort+0x20/0x30
[   25.724185]  ksize_unpoisons_memory+0x628/0x740
[   25.724561]  kunit_try_run_case+0x170/0x3f0
[   25.724737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.724899]  kthread+0x328/0x630
[   25.725050]  ret_from_fork+0x10/0x20
[   25.725284] 
[   25.725335] Allocated by task 194:
[   25.725409]  kasan_save_stack+0x3c/0x68
[   25.725518]  kasan_save_track+0x20/0x40
[   25.725611]  kasan_save_alloc_info+0x40/0x58
[   25.725775]  __kasan_kmalloc+0xd4/0xd8
[   25.726065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.726174]  ksize_unpoisons_memory+0xc0/0x740
[   25.726268]  kunit_try_run_case+0x170/0x3f0
[   25.726357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.726518]  kthread+0x328/0x630
[   25.726611]  ret_from_fork+0x10/0x20
[   25.726705] 
[   25.726764] The buggy address belongs to the object at fff00000c6507900
[   25.726764]  which belongs to the cache kmalloc-128 of size 128
[   25.727170] The buggy address is located 0 bytes to the right of
[   25.727170]  allocated 115-byte region [fff00000c6507900, fff00000c6507973)
[   25.727608] 
[   25.727672] The buggy address belongs to the physical page:
[   25.727880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.728052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.728868] page_type: f5(slab)
[   25.729290] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.729466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.729569] page dumped because: kasan: bad access detected
[   25.729648] 
[   25.729696] Memory state around the buggy address:
[   25.730204]  fff00000c6507800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.730547]  fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.730671] >fff00000c6507900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.731116]                                                              ^
[   25.731265]  fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.731535]  fff00000c6507a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.731960] ==================================================================
[   25.734798] ==================================================================
[   25.735164] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   25.735282] Read of size 1 at addr fff00000c6507978 by task kunit_try_catch/194
[   25.735398] 
[   25.735474] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.735955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.736179] Hardware name: linux,dummy-virt (DT)
[   25.736296] Call trace:
[   25.736363]  show_stack+0x20/0x38 (C)
[   25.736509]  dump_stack_lvl+0x8c/0xd0
[   25.736715]  print_report+0x118/0x608
[   25.736915]  kasan_report+0xdc/0x128
[   25.737054]  __asan_report_load1_noabort+0x20/0x30
[   25.737195]  ksize_unpoisons_memory+0x618/0x740
[   25.737326]  kunit_try_run_case+0x170/0x3f0
[   25.737463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.737617]  kthread+0x328/0x630
[   25.737762]  ret_from_fork+0x10/0x20
[   25.738277] 
[   25.738324] Allocated by task 194:
[   25.738413]  kasan_save_stack+0x3c/0x68
[   25.738573]  kasan_save_track+0x20/0x40
[   25.738676]  kasan_save_alloc_info+0x40/0x58
[   25.739011]  __kasan_kmalloc+0xd4/0xd8
[   25.739115]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.739230]  ksize_unpoisons_memory+0xc0/0x740
[   25.739335]  kunit_try_run_case+0x170/0x3f0
[   25.739448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.739904]  kthread+0x328/0x630
[   25.740023]  ret_from_fork+0x10/0x20
[   25.740114] 
[   25.740164] The buggy address belongs to the object at fff00000c6507900
[   25.740164]  which belongs to the cache kmalloc-128 of size 128
[   25.740310] The buggy address is located 5 bytes to the right of
[   25.740310]  allocated 115-byte region [fff00000c6507900, fff00000c6507973)
[   25.742046] 
[   25.742256] The buggy address belongs to the physical page:
[   25.742346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.742481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.743305] page_type: f5(slab)
[   25.743434] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.743569] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.744430] page dumped because: kasan: bad access detected
[   25.744823] 
[   25.744870] Memory state around the buggy address:
[   25.745580]  fff00000c6507800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.745719]  fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.746513] >fff00000c6507900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.746621]                                                                 ^
[   25.747158]  fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.747290]  fff00000c6507a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.747708] ==================================================================
[   25.749455] ==================================================================
[   25.749559] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   25.749671] Read of size 1 at addr fff00000c650797f by task kunit_try_catch/194
[   25.749787] 
[   25.749856] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.750084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.750755] Hardware name: linux,dummy-virt (DT)
[   25.750848] Call trace:
[   25.750925]  show_stack+0x20/0x38 (C)
[   25.751075]  dump_stack_lvl+0x8c/0xd0
[   25.751565]  print_report+0x118/0x608
[   25.752027]  kasan_report+0xdc/0x128
[   25.752525]  __asan_report_load1_noabort+0x20/0x30
[   25.752817]  ksize_unpoisons_memory+0x690/0x740
[   25.753431]  kunit_try_run_case+0x170/0x3f0
[   25.754503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.754653]  kthread+0x328/0x630
[   25.755246]  ret_from_fork+0x10/0x20
[   25.756220] 
[   25.756353] Allocated by task 194:
[   25.756427]  kasan_save_stack+0x3c/0x68
[   25.757096]  kasan_save_track+0x20/0x40
[   25.757245]  kasan_save_alloc_info+0x40/0x58
[   25.757350]  __kasan_kmalloc+0xd4/0xd8
[   25.757459]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.757719]  ksize_unpoisons_memory+0xc0/0x740
[   25.757821]  kunit_try_run_case+0x170/0x3f0
[   25.757964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.758112]  kthread+0x328/0x630
[   25.758363]  ret_from_fork+0x10/0x20
[   25.758503] 
[   25.758567] The buggy address belongs to the object at fff00000c6507900
[   25.758567]  which belongs to the cache kmalloc-128 of size 128
[   25.758827] The buggy address is located 12 bytes to the right of
[   25.758827]  allocated 115-byte region [fff00000c6507900, fff00000c6507973)
[   25.759017] 
[   25.759074] The buggy address belongs to the physical page:
[   25.759158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.759311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.759471] page_type: f5(slab)
[   25.760141] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.760417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.760530] page dumped because: kasan: bad access detected
[   25.760917] 
[   25.760979] Memory state around the buggy address:
[   25.761064]  fff00000c6507800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.761408]  fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.761590] >fff00000c6507900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.761714]                                                                 ^
[   25.762005]  fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.762340]  fff00000c6507a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.762455] ==================================================================

[   26.023420] ==================================================================
[   26.023529] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   26.023649] Read of size 1 at addr fff00000c7747778 by task kunit_try_catch/194
[   26.023768] 
[   26.023866] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.024794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.024889] Hardware name: linux,dummy-virt (DT)
[   26.024965] Call trace:
[   26.025020]  show_stack+0x20/0x38 (C)
[   26.025234]  dump_stack_lvl+0x8c/0xd0
[   26.025491]  print_report+0x118/0x608
[   26.025692]  kasan_report+0xdc/0x128
[   26.025825]  __asan_report_load1_noabort+0x20/0x30
[   26.025987]  ksize_unpoisons_memory+0x618/0x740
[   26.026117]  kunit_try_run_case+0x170/0x3f0
[   26.026239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.026369]  kthread+0x328/0x630
[   26.026481]  ret_from_fork+0x10/0x20
[   26.028691] 
[   26.028747] Allocated by task 194:
[   26.028827]  kasan_save_stack+0x3c/0x68
[   26.028957]  kasan_save_track+0x20/0x40
[   26.029522]  kasan_save_alloc_info+0x40/0x58
[   26.030386]  __kasan_kmalloc+0xd4/0xd8
[   26.031163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.031346]  ksize_unpoisons_memory+0xc0/0x740
[   26.032335]  kunit_try_run_case+0x170/0x3f0
[   26.033279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.033762]  kthread+0x328/0x630
[   26.034039]  ret_from_fork+0x10/0x20
[   26.034633] 
[   26.034701] The buggy address belongs to the object at fff00000c7747700
[   26.034701]  which belongs to the cache kmalloc-128 of size 128
[   26.034857] The buggy address is located 5 bytes to the right of
[   26.034857]  allocated 115-byte region [fff00000c7747700, fff00000c7747773)
[   26.035017] 
[   26.035064] The buggy address belongs to the physical page:
[   26.035133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   26.037623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.038495] page_type: f5(slab)
[   26.038594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.039879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.040234] page dumped because: kasan: bad access detected
[   26.040322] 
[   26.041023] Memory state around the buggy address:
[   26.041246]  fff00000c7747600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.042020]  fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.042341] >fff00000c7747700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.043300]                                                                 ^
[   26.043579]  fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.043797]  fff00000c7747800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.043987] ==================================================================
[   26.012486] ==================================================================
[   26.012639] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   26.012780] Read of size 1 at addr fff00000c7747773 by task kunit_try_catch/194
[   26.013048] 
[   26.013167] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.013385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.013458] Hardware name: linux,dummy-virt (DT)
[   26.013533] Call trace:
[   26.013596]  show_stack+0x20/0x38 (C)
[   26.013727]  dump_stack_lvl+0x8c/0xd0
[   26.013880]  print_report+0x118/0x608
[   26.014008]  kasan_report+0xdc/0x128
[   26.014124]  __asan_report_load1_noabort+0x20/0x30
[   26.014264]  ksize_unpoisons_memory+0x628/0x740
[   26.014937]  kunit_try_run_case+0x170/0x3f0
[   26.015283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.015455]  kthread+0x328/0x630
[   26.015579]  ret_from_fork+0x10/0x20
[   26.015968] 
[   26.016107] Allocated by task 194:
[   26.016206]  kasan_save_stack+0x3c/0x68
[   26.016306]  kasan_save_track+0x20/0x40
[   26.016444]  kasan_save_alloc_info+0x40/0x58
[   26.016617]  __kasan_kmalloc+0xd4/0xd8
[   26.016826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.017034]  ksize_unpoisons_memory+0xc0/0x740
[   26.017727]  kunit_try_run_case+0x170/0x3f0
[   26.018161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.018418]  kthread+0x328/0x630
[   26.018554]  ret_from_fork+0x10/0x20
[   26.019013] 
[   26.019071] The buggy address belongs to the object at fff00000c7747700
[   26.019071]  which belongs to the cache kmalloc-128 of size 128
[   26.019234] The buggy address is located 0 bytes to the right of
[   26.019234]  allocated 115-byte region [fff00000c7747700, fff00000c7747773)
[   26.019414] 
[   26.019473] The buggy address belongs to the physical page:
[   26.019556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   26.020231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.020363] page_type: f5(slab)
[   26.020488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.020613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.020710] page dumped because: kasan: bad access detected
[   26.020787] 
[   26.020827] Memory state around the buggy address:
[   26.021232]  fff00000c7747600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.021471]  fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.021632] >fff00000c7747700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.021745]                                                              ^
[   26.021882]  fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.022005]  fff00000c7747800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.022168] ==================================================================
[   26.045978] ==================================================================
[   26.046083] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   26.046320] Read of size 1 at addr fff00000c774777f by task kunit_try_catch/194
[   26.046451] 
[   26.046522] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.046790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.046883] Hardware name: linux,dummy-virt (DT)
[   26.046957] Call trace:
[   26.047010]  show_stack+0x20/0x38 (C)
[   26.047137]  dump_stack_lvl+0x8c/0xd0
[   26.047292]  print_report+0x118/0x608
[   26.047592]  kasan_report+0xdc/0x128
[   26.047939]  __asan_report_load1_noabort+0x20/0x30
[   26.048098]  ksize_unpoisons_memory+0x690/0x740
[   26.048242]  kunit_try_run_case+0x170/0x3f0
[   26.048390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.048553]  kthread+0x328/0x630
[   26.048713]  ret_from_fork+0x10/0x20
[   26.049103] 
[   26.049185] Allocated by task 194:
[   26.049320]  kasan_save_stack+0x3c/0x68
[   26.049568]  kasan_save_track+0x20/0x40
[   26.049636]  kasan_save_alloc_info+0x40/0x58
[   26.049690]  __kasan_kmalloc+0xd4/0xd8
[   26.049763]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.049909]  ksize_unpoisons_memory+0xc0/0x740
[   26.050056]  kunit_try_run_case+0x170/0x3f0
[   26.050176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.050300]  kthread+0x328/0x630
[   26.050396]  ret_from_fork+0x10/0x20
[   26.050504] 
[   26.050555] The buggy address belongs to the object at fff00000c7747700
[   26.050555]  which belongs to the cache kmalloc-128 of size 128
[   26.050813] The buggy address is located 12 bytes to the right of
[   26.050813]  allocated 115-byte region [fff00000c7747700, fff00000c7747773)
[   26.051274] 
[   26.051350] The buggy address belongs to the physical page:
[   26.051464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   26.051795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.051927] page_type: f5(slab)
[   26.052020] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.052217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.052487] page dumped because: kasan: bad access detected
[   26.052597] 
[   26.052638] Memory state around the buggy address:
[   26.052711]  fff00000c7747600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.052816]  fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.053669] >fff00000c7747700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.053779]                                                                 ^
[   26.054036]  fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.054211]  fff00000c7747800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.054371] ==================================================================

[   19.629377] ==================================================================
[   19.630309] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   19.631219] Read of size 1 at addr ffff888101b20c78 by task kunit_try_catch/212
[   19.631807] 
[   19.632090] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.632215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.632810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.632851] Call Trace:
[   19.632872]  <TASK>
[   19.632896]  dump_stack_lvl+0x73/0xb0
[   19.632947]  print_report+0xd1/0x650
[   19.632983]  ? __virt_addr_valid+0x1db/0x2d0
[   19.633017]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   19.633050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.633081]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   19.633114]  kasan_report+0x141/0x180
[   19.633146]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   19.633185]  __asan_report_load1_noabort+0x18/0x20
[   19.633225]  ksize_unpoisons_memory+0x7e9/0x9b0
[   19.633290]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   19.633327]  ? finish_task_switch.isra.0+0x153/0x700
[   19.633359]  ? __switch_to+0x47/0xf50
[   19.633394]  ? __schedule+0x10cc/0x2b60
[   19.633427]  ? __pfx_read_tsc+0x10/0x10
[   19.633456]  ? ktime_get_ts64+0x86/0x230
[   19.633490]  kunit_try_run_case+0x1a5/0x480
[   19.633553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.633588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.633639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.633674]  ? __kthread_parkme+0x82/0x180
[   19.633702]  ? preempt_count_sub+0x50/0x80
[   19.633732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.633768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.633801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.633834]  kthread+0x337/0x6f0
[   19.633862]  ? trace_preempt_on+0x20/0xc0
[   19.633897]  ? __pfx_kthread+0x10/0x10
[   19.633927]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.633959]  ? calculate_sigpending+0x7b/0xa0
[   19.633994]  ? __pfx_kthread+0x10/0x10
[   19.634024]  ret_from_fork+0x116/0x1d0
[   19.634049]  ? __pfx_kthread+0x10/0x10
[   19.634076]  ret_from_fork_asm+0x1a/0x30
[   19.634117]  </TASK>
[   19.634132] 
[   19.650909] Allocated by task 212:
[   19.651472]  kasan_save_stack+0x45/0x70
[   19.652059]  kasan_save_track+0x18/0x40
[   19.652629]  kasan_save_alloc_info+0x3b/0x50
[   19.653195]  __kasan_kmalloc+0xb7/0xc0
[   19.653728]  __kmalloc_cache_noprof+0x189/0x420
[   19.654363]  ksize_unpoisons_memory+0xc7/0x9b0
[   19.654911]  kunit_try_run_case+0x1a5/0x480
[   19.655456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.656136]  kthread+0x337/0x6f0
[   19.656535]  ret_from_fork+0x116/0x1d0
[   19.656916]  ret_from_fork_asm+0x1a/0x30
[   19.657546] 
[   19.657903] The buggy address belongs to the object at ffff888101b20c00
[   19.657903]  which belongs to the cache kmalloc-128 of size 128
[   19.658954] The buggy address is located 5 bytes to the right of
[   19.658954]  allocated 115-byte region [ffff888101b20c00, ffff888101b20c73)
[   19.660133] 
[   19.660477] The buggy address belongs to the physical page:
[   19.661134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   19.661972] flags: 0x200000000000000(node=0|zone=2)
[   19.662495] page_type: f5(slab)
[   19.662902] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.663678] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.664180] page dumped because: kasan: bad access detected
[   19.664879] 
[   19.665164] Memory state around the buggy address:
[   19.665804]  ffff888101b20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.666533]  ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.667186] >ffff888101b20c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.667897]                                                                 ^
[   19.668671]  ffff888101b20c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.669344]  ffff888101b20d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.670082] ==================================================================
[   19.673386] ==================================================================
[   19.674150] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   19.674944] Read of size 1 at addr ffff888101b20c7f by task kunit_try_catch/212
[   19.675736] 
[   19.676079] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.676318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.676359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.676457] Call Trace:
[   19.676555]  <TASK>
[   19.676608]  dump_stack_lvl+0x73/0xb0
[   19.676729]  print_report+0xd1/0x650
[   19.676836]  ? __virt_addr_valid+0x1db/0x2d0
[   19.676910]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   19.676983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.677041]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   19.677077]  kasan_report+0x141/0x180
[   19.677108]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   19.677148]  __asan_report_load1_noabort+0x18/0x20
[   19.677183]  ksize_unpoisons_memory+0x7b6/0x9b0
[   19.677216]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   19.677295]  ? finish_task_switch.isra.0+0x153/0x700
[   19.677329]  ? __switch_to+0x47/0xf50
[   19.677365]  ? __schedule+0x10cc/0x2b60
[   19.677396]  ? __pfx_read_tsc+0x10/0x10
[   19.677424]  ? ktime_get_ts64+0x86/0x230
[   19.677458]  kunit_try_run_case+0x1a5/0x480
[   19.677494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.677555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.677590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.677636]  ? __kthread_parkme+0x82/0x180
[   19.677665]  ? preempt_count_sub+0x50/0x80
[   19.677695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.677729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.677761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.677794]  kthread+0x337/0x6f0
[   19.677820]  ? trace_preempt_on+0x20/0xc0
[   19.677853]  ? __pfx_kthread+0x10/0x10
[   19.677881]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.677910]  ? calculate_sigpending+0x7b/0xa0
[   19.677943]  ? __pfx_kthread+0x10/0x10
[   19.677971]  ret_from_fork+0x116/0x1d0
[   19.677995]  ? __pfx_kthread+0x10/0x10
[   19.678022]  ret_from_fork_asm+0x1a/0x30
[   19.678063]  </TASK>
[   19.678078] 
[   19.697200] Allocated by task 212:
[   19.697815]  kasan_save_stack+0x45/0x70
[   19.698350]  kasan_save_track+0x18/0x40
[   19.698800]  kasan_save_alloc_info+0x3b/0x50
[   19.699337]  __kasan_kmalloc+0xb7/0xc0
[   19.699792]  __kmalloc_cache_noprof+0x189/0x420
[   19.700424]  ksize_unpoisons_memory+0xc7/0x9b0
[   19.700962]  kunit_try_run_case+0x1a5/0x480
[   19.701559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.702108]  kthread+0x337/0x6f0
[   19.702595]  ret_from_fork+0x116/0x1d0
[   19.703029]  ret_from_fork_asm+0x1a/0x30
[   19.703399] 
[   19.703647] The buggy address belongs to the object at ffff888101b20c00
[   19.703647]  which belongs to the cache kmalloc-128 of size 128
[   19.704882] The buggy address is located 12 bytes to the right of
[   19.704882]  allocated 115-byte region [ffff888101b20c00, ffff888101b20c73)
[   19.705962] 
[   19.706261] The buggy address belongs to the physical page:
[   19.706878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   19.707725] flags: 0x200000000000000(node=0|zone=2)
[   19.708259] page_type: f5(slab)
[   19.708618] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.709400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.710275] page dumped because: kasan: bad access detected
[   19.710828] 
[   19.711062] Memory state around the buggy address:
[   19.711610]  ffff888101b20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.712263]  ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712932] >ffff888101b20c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.713591]                                                                 ^
[   19.714170]  ffff888101b20c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.714845]  ffff888101b20d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.715550] ==================================================================
[   19.578280] ==================================================================
[   19.579240] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   19.579931] Read of size 1 at addr ffff888101b20c73 by task kunit_try_catch/212
[   19.580409] 
[   19.581451] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.581595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.581649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.581711] Call Trace:
[   19.581760]  <TASK>
[   19.581813]  dump_stack_lvl+0x73/0xb0
[   19.581913]  print_report+0xd1/0x650
[   19.581992]  ? __virt_addr_valid+0x1db/0x2d0
[   19.582071]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   19.582151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.582227]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   19.582303]  kasan_report+0x141/0x180
[   19.582375]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   19.582462]  __asan_report_load1_noabort+0x18/0x20
[   19.582564]  ksize_unpoisons_memory+0x81c/0x9b0
[   19.582643]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   19.582717]  ? finish_task_switch.isra.0+0x153/0x700
[   19.582789]  ? __switch_to+0x47/0xf50
[   19.582873]  ? __schedule+0x10cc/0x2b60
[   19.582934]  ? __pfx_read_tsc+0x10/0x10
[   19.582987]  ? ktime_get_ts64+0x86/0x230
[   19.583050]  kunit_try_run_case+0x1a5/0x480
[   19.583125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.583188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.583281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.583354]  ? __kthread_parkme+0x82/0x180
[   19.583411]  ? preempt_count_sub+0x50/0x80
[   19.583481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.583573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.583655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.583728]  kthread+0x337/0x6f0
[   19.583762]  ? trace_preempt_on+0x20/0xc0
[   19.583798]  ? __pfx_kthread+0x10/0x10
[   19.583826]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.583857]  ? calculate_sigpending+0x7b/0xa0
[   19.583892]  ? __pfx_kthread+0x10/0x10
[   19.583922]  ret_from_fork+0x116/0x1d0
[   19.583947]  ? __pfx_kthread+0x10/0x10
[   19.583974]  ret_from_fork_asm+0x1a/0x30
[   19.584015]  </TASK>
[   19.584031] 
[   19.603305] Allocated by task 212:
[   19.603731]  kasan_save_stack+0x45/0x70
[   19.604190]  kasan_save_track+0x18/0x40
[   19.605464]  kasan_save_alloc_info+0x3b/0x50
[   19.605839]  __kasan_kmalloc+0xb7/0xc0
[   19.606152]  __kmalloc_cache_noprof+0x189/0x420
[   19.607053]  ksize_unpoisons_memory+0xc7/0x9b0
[   19.608199]  kunit_try_run_case+0x1a5/0x480
[   19.608678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.609162]  kthread+0x337/0x6f0
[   19.609466]  ret_from_fork+0x116/0x1d0
[   19.609932]  ret_from_fork_asm+0x1a/0x30
[   19.610724] 
[   19.610949] The buggy address belongs to the object at ffff888101b20c00
[   19.610949]  which belongs to the cache kmalloc-128 of size 128
[   19.612028] The buggy address is located 0 bytes to the right of
[   19.612028]  allocated 115-byte region [ffff888101b20c00, ffff888101b20c73)
[   19.614364] 
[   19.614710] The buggy address belongs to the physical page:
[   19.615430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   19.616719] flags: 0x200000000000000(node=0|zone=2)
[   19.617533] page_type: f5(slab)
[   19.618071] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.619302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.620515] page dumped because: kasan: bad access detected
[   19.620976] 
[   19.621205] Memory state around the buggy address:
[   19.622045]  ffff888101b20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.622986]  ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.623744] >ffff888101b20c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.624840]                                                              ^
[   19.625237]  ffff888101b20c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.626261]  ffff888101b20d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.627103] ==================================================================

[   18.615924] ==================================================================
[   18.616504] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   18.617226] Read of size 1 at addr ffff8881032f7878 by task kunit_try_catch/212
[   18.617828] 
[   18.618146] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.618286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.618348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.618409] Call Trace:
[   18.618442]  <TASK>
[   18.618480]  dump_stack_lvl+0x73/0xb0
[   18.618586]  print_report+0xd1/0x650
[   18.618666]  ? __virt_addr_valid+0x1db/0x2d0
[   18.618761]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.618867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.618981]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.619088]  kasan_report+0x141/0x180
[   18.619171]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   18.619257]  __asan_report_load1_noabort+0x18/0x20
[   18.619300]  ksize_unpoisons_memory+0x7e9/0x9b0
[   18.619335]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.619367]  ? finish_task_switch.isra.0+0x153/0x700
[   18.619399]  ? __switch_to+0x47/0xf50
[   18.619433]  ? __schedule+0x10cc/0x2b60
[   18.619464]  ? __pfx_read_tsc+0x10/0x10
[   18.619492]  ? ktime_get_ts64+0x86/0x230
[   18.619525]  kunit_try_run_case+0x1a5/0x480
[   18.619559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.619591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.619623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.619655]  ? __kthread_parkme+0x82/0x180
[   18.619681]  ? preempt_count_sub+0x50/0x80
[   18.619711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.619745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.619777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.619811]  kthread+0x337/0x6f0
[   18.619837]  ? trace_preempt_on+0x20/0xc0
[   18.619868]  ? __pfx_kthread+0x10/0x10
[   18.619924]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.619957]  ? calculate_sigpending+0x7b/0xa0
[   18.619992]  ? __pfx_kthread+0x10/0x10
[   18.620021]  ret_from_fork+0x116/0x1d0
[   18.620046]  ? __pfx_kthread+0x10/0x10
[   18.620074]  ret_from_fork_asm+0x1a/0x30
[   18.620132]  </TASK>
[   18.620154] 
[   18.635074] Allocated by task 212:
[   18.635358]  kasan_save_stack+0x45/0x70
[   18.635679]  kasan_save_track+0x18/0x40
[   18.636121]  kasan_save_alloc_info+0x3b/0x50
[   18.636652]  __kasan_kmalloc+0xb7/0xc0
[   18.637094]  __kmalloc_cache_noprof+0x189/0x420
[   18.637709]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.638228]  kunit_try_run_case+0x1a5/0x480
[   18.638584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.638992]  kthread+0x337/0x6f0
[   18.639288]  ret_from_fork+0x116/0x1d0
[   18.639600]  ret_from_fork_asm+0x1a/0x30
[   18.640051] 
[   18.640285] The buggy address belongs to the object at ffff8881032f7800
[   18.640285]  which belongs to the cache kmalloc-128 of size 128
[   18.641651] The buggy address is located 5 bytes to the right of
[   18.641651]  allocated 115-byte region [ffff8881032f7800, ffff8881032f7873)
[   18.643060] 
[   18.643313] The buggy address belongs to the physical page:
[   18.643782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.645753] flags: 0x200000000000000(node=0|zone=2)
[   18.646124] page_type: f5(slab)
[   18.646518] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.647263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.647974] page dumped because: kasan: bad access detected
[   18.649649] 
[   18.650039] Memory state around the buggy address:
[   18.650447]  ffff8881032f7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.651122]  ffff8881032f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.651746] >ffff8881032f7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.652425]                                                                 ^
[   18.653055]  ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.653667]  ffff8881032f7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.654377] ==================================================================
[   18.571437] ==================================================================
[   18.572388] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   18.572989] Read of size 1 at addr ffff8881032f7873 by task kunit_try_catch/212
[   18.574463] 
[   18.574728] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.574843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.574900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.574963] Call Trace:
[   18.574999]  <TASK>
[   18.575041]  dump_stack_lvl+0x73/0xb0
[   18.575129]  print_report+0xd1/0x650
[   18.575211]  ? __virt_addr_valid+0x1db/0x2d0
[   18.575249]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.575282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.575313]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.575345]  kasan_report+0x141/0x180
[   18.575376]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   18.575415]  __asan_report_load1_noabort+0x18/0x20
[   18.575451]  ksize_unpoisons_memory+0x81c/0x9b0
[   18.575484]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.575517]  ? finish_task_switch.isra.0+0x153/0x700
[   18.575547]  ? __switch_to+0x47/0xf50
[   18.575581]  ? __schedule+0x10cc/0x2b60
[   18.575612]  ? __pfx_read_tsc+0x10/0x10
[   18.575641]  ? ktime_get_ts64+0x86/0x230
[   18.575672]  kunit_try_run_case+0x1a5/0x480
[   18.575706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.575738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.575770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.575802]  ? __kthread_parkme+0x82/0x180
[   18.575828]  ? preempt_count_sub+0x50/0x80
[   18.575857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.575919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.575955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.575988]  kthread+0x337/0x6f0
[   18.576015]  ? trace_preempt_on+0x20/0xc0
[   18.576048]  ? __pfx_kthread+0x10/0x10
[   18.576076]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.576114]  ? calculate_sigpending+0x7b/0xa0
[   18.576171]  ? __pfx_kthread+0x10/0x10
[   18.576204]  ret_from_fork+0x116/0x1d0
[   18.576229]  ? __pfx_kthread+0x10/0x10
[   18.576258]  ret_from_fork_asm+0x1a/0x30
[   18.576298]  </TASK>
[   18.576313] 
[   18.595283] Allocated by task 212:
[   18.595569]  kasan_save_stack+0x45/0x70
[   18.595937]  kasan_save_track+0x18/0x40
[   18.596421]  kasan_save_alloc_info+0x3b/0x50
[   18.596767]  __kasan_kmalloc+0xb7/0xc0
[   18.597250]  __kmalloc_cache_noprof+0x189/0x420
[   18.597719]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.598525]  kunit_try_run_case+0x1a5/0x480
[   18.599300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.600289]  kthread+0x337/0x6f0
[   18.600908]  ret_from_fork+0x116/0x1d0
[   18.601545]  ret_from_fork_asm+0x1a/0x30
[   18.601870] 
[   18.602060] The buggy address belongs to the object at ffff8881032f7800
[   18.602060]  which belongs to the cache kmalloc-128 of size 128
[   18.602953] The buggy address is located 0 bytes to the right of
[   18.602953]  allocated 115-byte region [ffff8881032f7800, ffff8881032f7873)
[   18.604497] 
[   18.604596] The buggy address belongs to the physical page:
[   18.604794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.605244] flags: 0x200000000000000(node=0|zone=2)
[   18.606457] page_type: f5(slab)
[   18.606831] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.607485] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.608309] page dumped because: kasan: bad access detected
[   18.608975] 
[   18.609449] Memory state around the buggy address:
[   18.609847]  ffff8881032f7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.610359]  ffff8881032f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.611055] >ffff8881032f7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.611659]                                                              ^
[   18.612309]  ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.612955]  ffff8881032f7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.613586] ==================================================================
[   18.656460] ==================================================================
[   18.657514] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   18.658210] Read of size 1 at addr ffff8881032f787f by task kunit_try_catch/212
[   18.658839] 
[   18.659115] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.659225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.659265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.659319] Call Trace:
[   18.659341]  <TASK>
[   18.659360]  dump_stack_lvl+0x73/0xb0
[   18.659402]  print_report+0xd1/0x650
[   18.659434]  ? __virt_addr_valid+0x1db/0x2d0
[   18.659480]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.659540]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.659573]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.659606]  kasan_report+0x141/0x180
[   18.659636]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   18.659674]  __asan_report_load1_noabort+0x18/0x20
[   18.659708]  ksize_unpoisons_memory+0x7b6/0x9b0
[   18.659741]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   18.659773]  ? finish_task_switch.isra.0+0x153/0x700
[   18.659803]  ? __switch_to+0x47/0xf50
[   18.659837]  ? __schedule+0x10cc/0x2b60
[   18.659868]  ? __pfx_read_tsc+0x10/0x10
[   18.660051]  ? ktime_get_ts64+0x86/0x230
[   18.660208]  kunit_try_run_case+0x1a5/0x480
[   18.660322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.660447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.660551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.660654]  ? __kthread_parkme+0x82/0x180
[   18.660720]  ? preempt_count_sub+0x50/0x80
[   18.660757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.660796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.660830]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.660863]  kthread+0x337/0x6f0
[   18.660916]  ? trace_preempt_on+0x20/0xc0
[   18.660952]  ? __pfx_kthread+0x10/0x10
[   18.660982]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.661011]  ? calculate_sigpending+0x7b/0xa0
[   18.661043]  ? __pfx_kthread+0x10/0x10
[   18.661073]  ret_from_fork+0x116/0x1d0
[   18.661118]  ? __pfx_kthread+0x10/0x10
[   18.661167]  ret_from_fork_asm+0x1a/0x30
[   18.661227]  </TASK>
[   18.661245] 
[   18.678531] Allocated by task 212:
[   18.678850]  kasan_save_stack+0x45/0x70
[   18.679852]  kasan_save_track+0x18/0x40
[   18.680362]  kasan_save_alloc_info+0x3b/0x50
[   18.680790]  __kasan_kmalloc+0xb7/0xc0
[   18.681190]  __kmalloc_cache_noprof+0x189/0x420
[   18.681686]  ksize_unpoisons_memory+0xc7/0x9b0
[   18.682229]  kunit_try_run_case+0x1a5/0x480
[   18.682646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.683110]  kthread+0x337/0x6f0
[   18.683515]  ret_from_fork+0x116/0x1d0
[   18.683965]  ret_from_fork_asm+0x1a/0x30
[   18.684491] 
[   18.684769] The buggy address belongs to the object at ffff8881032f7800
[   18.684769]  which belongs to the cache kmalloc-128 of size 128
[   18.685824] The buggy address is located 12 bytes to the right of
[   18.685824]  allocated 115-byte region [ffff8881032f7800, ffff8881032f7873)
[   18.687089] 
[   18.687335] The buggy address belongs to the physical page:
[   18.687845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.688476] flags: 0x200000000000000(node=0|zone=2)
[   18.689169] page_type: f5(slab)
[   18.689463] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.691773] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.693307] page dumped because: kasan: bad access detected
[   18.695305] 
[   18.695920] Memory state around the buggy address:
[   18.696789]  ffff8881032f7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.697221]  ffff8881032f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.697589] >ffff8881032f7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.699385]                                                                 ^
[   18.700683]  ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.701505]  ffff8881032f7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.702153] ==================================================================

[   20.891107] ==================================================================
[   20.891802] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   20.892493] Read of size 1 at addr ffff00000e1a3178 by task kunit_try_catch/247
[   20.893158] 
[   20.893316] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.893353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.893364] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.893378] Call trace:
[   20.893386]  show_stack+0x20/0x38 (C)
[   20.893411]  dump_stack_lvl+0x8c/0xd0
[   20.893437]  print_report+0x118/0x608
[   20.893463]  kasan_report+0xdc/0x128
[   20.893485]  __asan_report_load1_noabort+0x20/0x30
[   20.893513]  ksize_unpoisons_memory+0x618/0x740
[   20.893534]  kunit_try_run_case+0x170/0x3f0
[   20.893560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.893587]  kthread+0x328/0x630
[   20.893606]  ret_from_fork+0x10/0x20
[   20.893630] 
[   20.899197] Allocated by task 247:
[   20.899514]  kasan_save_stack+0x3c/0x68
[   20.899878]  kasan_save_track+0x20/0x40
[   20.900242]  kasan_save_alloc_info+0x40/0x58
[   20.900645]  __kasan_kmalloc+0xd4/0xd8
[   20.900998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.901424]  ksize_unpoisons_memory+0xc0/0x740
[   20.901840]  kunit_try_run_case+0x170/0x3f0
[   20.902233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.902744]  kthread+0x328/0x630
[   20.903050]  ret_from_fork+0x10/0x20
[   20.903389] 
[   20.903536] The buggy address belongs to the object at ffff00000e1a3100
[   20.903536]  which belongs to the cache kmalloc-128 of size 128
[   20.904655] The buggy address is located 5 bytes to the right of
[   20.904655]  allocated 115-byte region [ffff00000e1a3100, ffff00000e1a3173)
[   20.905814] 
[   20.905962] The buggy address belongs to the physical page:
[   20.906468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3
[   20.907180] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.907778] page_type: f5(slab)
[   20.908079] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.908781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.909478] page dumped because: kasan: bad access detected
[   20.909983] 
[   20.910130] Memory state around the buggy address:
[   20.910569]  ffff00000e1a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.911224]  ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.911877] >ffff00000e1a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.912529]                                                                 ^
[   20.913174]  ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.913829]  ffff00000e1a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.914479] ==================================================================
[   20.865672] ==================================================================
[   20.866761] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   20.867466] Read of size 1 at addr ffff00000e1a3173 by task kunit_try_catch/247
[   20.868142] 
[   20.868307] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.868358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.868372] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.868389] Call trace:
[   20.868400]  show_stack+0x20/0x38 (C)
[   20.868436]  dump_stack_lvl+0x8c/0xd0
[   20.868472]  print_report+0x118/0x608
[   20.868506]  kasan_report+0xdc/0x128
[   20.868538]  __asan_report_load1_noabort+0x20/0x30
[   20.868577]  ksize_unpoisons_memory+0x628/0x740
[   20.868609]  kunit_try_run_case+0x170/0x3f0
[   20.868643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.868681]  kthread+0x328/0x630
[   20.868707]  ret_from_fork+0x10/0x20
[   20.868739] 
[   20.874352] Allocated by task 247:
[   20.874677]  kasan_save_stack+0x3c/0x68
[   20.875053]  kasan_save_track+0x20/0x40
[   20.875428]  kasan_save_alloc_info+0x40/0x58
[   20.875845]  __kasan_kmalloc+0xd4/0xd8
[   20.876212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.876648]  ksize_unpoisons_memory+0xc0/0x740
[   20.877075]  kunit_try_run_case+0x170/0x3f0
[   20.877479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.878003]  kthread+0x328/0x630
[   20.878319]  ret_from_fork+0x10/0x20
[   20.878669] 
[   20.878822] The buggy address belongs to the object at ffff00000e1a3100
[   20.878822]  which belongs to the cache kmalloc-128 of size 128
[   20.879955] The buggy address is located 0 bytes to the right of
[   20.879955]  allocated 115-byte region [ffff00000e1a3100, ffff00000e1a3173)
[   20.881129] 
[   20.881283] The buggy address belongs to the physical page:
[   20.881798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3
[   20.882522] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.883133] page_type: f5(slab)
[   20.883447] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.884163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.884870] page dumped because: kasan: bad access detected
[   20.885386] 
[   20.885537] Memory state around the buggy address:
[   20.885986]  ffff00000e1a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.886652]  ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.887317] >ffff00000e1a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.887978]                                                              ^
[   20.888611]  ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.889276]  ffff00000e1a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.889937] ==================================================================
[   20.915256] ==================================================================
[   20.915914] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   20.916590] Read of size 1 at addr ffff00000e1a317f by task kunit_try_catch/247
[   20.917253] 
[   20.917407] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.917442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.917452] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.917465] Call trace:
[   20.917472]  show_stack+0x20/0x38 (C)
[   20.917495]  dump_stack_lvl+0x8c/0xd0
[   20.917521]  print_report+0x118/0x608
[   20.917544]  kasan_report+0xdc/0x128
[   20.917566]  __asan_report_load1_noabort+0x20/0x30
[   20.917593]  ksize_unpoisons_memory+0x690/0x740
[   20.917615]  kunit_try_run_case+0x170/0x3f0
[   20.917638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.917665]  kthread+0x328/0x630
[   20.917684]  ret_from_fork+0x10/0x20
[   20.917706] 
[   20.923274] Allocated by task 247:
[   20.923592]  kasan_save_stack+0x3c/0x68
[   20.923955]  kasan_save_track+0x20/0x40
[   20.924318]  kasan_save_alloc_info+0x40/0x58
[   20.924722]  __kasan_kmalloc+0xd4/0xd8
[   20.925076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.925501]  ksize_unpoisons_memory+0xc0/0x740
[   20.925917]  kunit_try_run_case+0x170/0x3f0
[   20.926310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.926820]  kthread+0x328/0x630
[   20.927125]  ret_from_fork+0x10/0x20
[   20.927464] 
[   20.927611] The buggy address belongs to the object at ffff00000e1a3100
[   20.927611]  which belongs to the cache kmalloc-128 of size 128
[   20.928729] The buggy address is located 12 bytes to the right of
[   20.928729]  allocated 115-byte region [ffff00000e1a3100, ffff00000e1a3173)
[   20.929896] 
[   20.930043] The buggy address belongs to the physical page:
[   20.930547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3
[   20.931258] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.931856] page_type: f5(slab)
[   20.932156] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.932857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.933554] page dumped because: kasan: bad access detected
[   20.934059] 
[   20.934206] Memory state around the buggy address:
[   20.934644]  ffff00000e1a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.935297]  ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.935952] >ffff00000e1a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.936602]                                                                 ^
[   20.937247]  ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.937902]  ffff00000e1a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.938552] ==================================================================