Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   17.085262] ==================================================================
[   17.085311] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.085361] Read of size 1 at addr fff00000c635af7f by task kunit_try_catch/195
[   17.085409] 
[   17.085439] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.085521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.085549] Hardware name: linux,dummy-virt (DT)
[   17.085578] Call trace:
[   17.085600]  show_stack+0x20/0x38 (C)
[   17.085651]  dump_stack_lvl+0x8c/0xd0
[   17.085698]  print_report+0x118/0x608
[   17.085742]  kasan_report+0xdc/0x128
[   17.086239]  __asan_report_load1_noabort+0x20/0x30
[   17.086324]  ksize_unpoisons_memory+0x690/0x740
[   17.086371]  kunit_try_run_case+0x170/0x3f0
[   17.087243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.087902]  kthread+0x328/0x630
[   17.087970]  ret_from_fork+0x10/0x20
[   17.088046] 
[   17.088079] Allocated by task 195:
[   17.088107]  kasan_save_stack+0x3c/0x68
[   17.088383]  kasan_save_track+0x20/0x40
[   17.088623]  kasan_save_alloc_info+0x40/0x58
[   17.088683]  __kasan_kmalloc+0xd4/0xd8
[   17.088719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.088757]  ksize_unpoisons_memory+0xc0/0x740
[   17.088795]  kunit_try_run_case+0x170/0x3f0
[   17.088832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.089674]  kthread+0x328/0x630
[   17.089720]  ret_from_fork+0x10/0x20
[   17.089757] 
[   17.089776] The buggy address belongs to the object at fff00000c635af00
[   17.089776]  which belongs to the cache kmalloc-128 of size 128
[   17.089836] The buggy address is located 12 bytes to the right of
[   17.089836]  allocated 115-byte region [fff00000c635af00, fff00000c635af73)
[   17.089901] 
[   17.089919] The buggy address belongs to the physical page:
[   17.090076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   17.090149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.091608] page_type: f5(slab)
[   17.091723] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.091879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.091938] page dumped because: kasan: bad access detected
[   17.091970] 
[   17.091999] Memory state around the buggy address:
[   17.092227]  fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.092276]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.092320] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.092812]                                                                 ^
[   17.092954]  fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.093007]  fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.093045] ==================================================================
[   17.066220] ==================================================================
[   17.066290] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.066684] Read of size 1 at addr fff00000c635af73 by task kunit_try_catch/195
[   17.067318] 
[   17.067391] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.067473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.067500] Hardware name: linux,dummy-virt (DT)
[   17.067537] Call trace:
[   17.067660]  show_stack+0x20/0x38 (C)
[   17.067711]  dump_stack_lvl+0x8c/0xd0
[   17.067758]  print_report+0x118/0x608
[   17.067805]  kasan_report+0xdc/0x128
[   17.067849]  __asan_report_load1_noabort+0x20/0x30
[   17.068196]  ksize_unpoisons_memory+0x628/0x740
[   17.068390]  kunit_try_run_case+0x170/0x3f0
[   17.068549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.069022]  kthread+0x328/0x630
[   17.069078]  ret_from_fork+0x10/0x20
[   17.069256] 
[   17.069431] Allocated by task 195:
[   17.069464]  kasan_save_stack+0x3c/0x68
[   17.069509]  kasan_save_track+0x20/0x40
[   17.069627]  kasan_save_alloc_info+0x40/0x58
[   17.069785]  __kasan_kmalloc+0xd4/0xd8
[   17.069824]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.069862]  ksize_unpoisons_memory+0xc0/0x740
[   17.069900]  kunit_try_run_case+0x170/0x3f0
[   17.069936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.070369]  kthread+0x328/0x630
[   17.070416]  ret_from_fork+0x10/0x20
[   17.070466] 
[   17.070485] The buggy address belongs to the object at fff00000c635af00
[   17.070485]  which belongs to the cache kmalloc-128 of size 128
[   17.070724] The buggy address is located 0 bytes to the right of
[   17.070724]  allocated 115-byte region [fff00000c635af00, fff00000c635af73)
[   17.071118] 
[   17.071261] The buggy address belongs to the physical page:
[   17.071308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   17.071364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.071413] page_type: f5(slab)
[   17.071740] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.071810] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.071990] page dumped because: kasan: bad access detected
[   17.072026] 
[   17.072043] Memory state around the buggy address:
[   17.072214]  fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.072264]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.072714] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.072766]                                                              ^
[   17.073049]  fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.073285]  fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.073587] ==================================================================
[   17.076607] ==================================================================
[   17.076662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.076712] Read of size 1 at addr fff00000c635af78 by task kunit_try_catch/195
[   17.076759] 
[   17.076790] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.076869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.076895] Hardware name: linux,dummy-virt (DT)
[   17.077303] Call trace:
[   17.077449]  show_stack+0x20/0x38 (C)
[   17.077504]  dump_stack_lvl+0x8c/0xd0
[   17.077550]  print_report+0x118/0x608
[   17.077934]  kasan_report+0xdc/0x128
[   17.078025]  __asan_report_load1_noabort+0x20/0x30
[   17.078273]  ksize_unpoisons_memory+0x618/0x740
[   17.078325]  kunit_try_run_case+0x170/0x3f0
[   17.078370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.078420]  kthread+0x328/0x630
[   17.078838]  ret_from_fork+0x10/0x20
[   17.078919] 
[   17.078937] Allocated by task 195:
[   17.079011]  kasan_save_stack+0x3c/0x68
[   17.079452]  kasan_save_track+0x20/0x40
[   17.079514]  kasan_save_alloc_info+0x40/0x58
[   17.079591]  __kasan_kmalloc+0xd4/0xd8
[   17.079640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.079677]  ksize_unpoisons_memory+0xc0/0x740
[   17.079715]  kunit_try_run_case+0x170/0x3f0
[   17.079754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.079796]  kthread+0x328/0x630
[   17.080194]  ret_from_fork+0x10/0x20
[   17.080255] 
[   17.080274] The buggy address belongs to the object at fff00000c635af00
[   17.080274]  which belongs to the cache kmalloc-128 of size 128
[   17.080543] The buggy address is located 5 bytes to the right of
[   17.080543]  allocated 115-byte region [fff00000c635af00, fff00000c635af73)
[   17.080929] 
[   17.081248] The buggy address belongs to the physical page:
[   17.081281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   17.081578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.081697] page_type: f5(slab)
[   17.082124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.082354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.082401] page dumped because: kasan: bad access detected
[   17.082433] 
[   17.082799] Memory state around the buggy address:
[   17.083057]  fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.083394]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.083600] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.083640]                                                                 ^
[   17.083682]  fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.083725]  fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.083762] ==================================================================

[   17.060485] ==================================================================
[   17.060583] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.060724] Read of size 1 at addr fff00000c63cde73 by task kunit_try_catch/195
[   17.060778] 
[   17.060812] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.060901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.060938] Hardware name: linux,dummy-virt (DT)
[   17.061380] Call trace:
[   17.061420]  show_stack+0x20/0x38 (C)
[   17.061525]  dump_stack_lvl+0x8c/0xd0
[   17.061580]  print_report+0x118/0x608
[   17.061625]  kasan_report+0xdc/0x128
[   17.061768]  __asan_report_load1_noabort+0x20/0x30
[   17.061830]  ksize_unpoisons_memory+0x628/0x740
[   17.061886]  kunit_try_run_case+0x170/0x3f0
[   17.061949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.062004]  kthread+0x328/0x630
[   17.062476]  ret_from_fork+0x10/0x20
[   17.062606] 
[   17.062717] Allocated by task 195:
[   17.062749]  kasan_save_stack+0x3c/0x68
[   17.062804]  kasan_save_track+0x20/0x40
[   17.062854]  kasan_save_alloc_info+0x40/0x58
[   17.062894]  __kasan_kmalloc+0xd4/0xd8
[   17.062942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.063385]  ksize_unpoisons_memory+0xc0/0x740
[   17.063481]  kunit_try_run_case+0x170/0x3f0
[   17.063659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.063717]  kthread+0x328/0x630
[   17.063751]  ret_from_fork+0x10/0x20
[   17.063815] 
[   17.063852] The buggy address belongs to the object at fff00000c63cde00
[   17.063852]  which belongs to the cache kmalloc-128 of size 128
[   17.064160] The buggy address is located 0 bytes to the right of
[   17.064160]  allocated 115-byte region [fff00000c63cde00, fff00000c63cde73)
[   17.064263] 
[   17.064296] The buggy address belongs to the physical page:
[   17.064391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   17.064445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.064493] page_type: f5(slab)
[   17.064532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.064591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.064631] page dumped because: kasan: bad access detected
[   17.064661] 
[   17.064679] Memory state around the buggy address:
[   17.064721]  fff00000c63cdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.064776]  fff00000c63cdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.064828] >fff00000c63cde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.064875]                                                              ^
[   17.064940]  fff00000c63cde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.065256]  fff00000c63cdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.065693] ==================================================================
[   17.067168] ==================================================================
[   17.067418] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.067493] Read of size 1 at addr fff00000c63cde78 by task kunit_try_catch/195
[   17.067924] 
[   17.068056] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.068312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.068444] Hardware name: linux,dummy-virt (DT)
[   17.068504] Call trace:
[   17.068529]  show_stack+0x20/0x38 (C)
[   17.068584]  dump_stack_lvl+0x8c/0xd0
[   17.068630]  print_report+0x118/0x608
[   17.069364]  kasan_report+0xdc/0x128
[   17.069449]  __asan_report_load1_noabort+0x20/0x30
[   17.069515]  ksize_unpoisons_memory+0x618/0x740
[   17.069843]  kunit_try_run_case+0x170/0x3f0
[   17.069931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.070028]  kthread+0x328/0x630
[   17.070092]  ret_from_fork+0x10/0x20
[   17.070214] 
[   17.070297] Allocated by task 195:
[   17.070376]  kasan_save_stack+0x3c/0x68
[   17.070506]  kasan_save_track+0x20/0x40
[   17.070602]  kasan_save_alloc_info+0x40/0x58
[   17.070761]  __kasan_kmalloc+0xd4/0xd8
[   17.071053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.071218]  ksize_unpoisons_memory+0xc0/0x740
[   17.071309]  kunit_try_run_case+0x170/0x3f0
[   17.071361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.071709]  kthread+0x328/0x630
[   17.071773]  ret_from_fork+0x10/0x20
[   17.071889] 
[   17.071921] The buggy address belongs to the object at fff00000c63cde00
[   17.071921]  which belongs to the cache kmalloc-128 of size 128
[   17.071981] The buggy address is located 5 bytes to the right of
[   17.071981]  allocated 115-byte region [fff00000c63cde00, fff00000c63cde73)
[   17.072083] 
[   17.072102] The buggy address belongs to the physical page:
[   17.072138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   17.072194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.072243] page_type: f5(slab)
[   17.072291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.072353] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.072393] page dumped because: kasan: bad access detected
[   17.072423] 
[   17.072441] Memory state around the buggy address:
[   17.072480]  fff00000c63cdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.072526]  fff00000c63cdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.072568] >fff00000c63cde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.072607]                                                                 ^
[   17.072647]  fff00000c63cde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.072699]  fff00000c63cdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.072737] ==================================================================
[   17.076021] ==================================================================
[   17.076075] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.076128] Read of size 1 at addr fff00000c63cde7f by task kunit_try_catch/195
[   17.076178] 
[   17.076210] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.076291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.076318] Hardware name: linux,dummy-virt (DT)
[   17.076483] Call trace:
[   17.076754]  show_stack+0x20/0x38 (C)
[   17.076840]  dump_stack_lvl+0x8c/0xd0
[   17.076893]  print_report+0x118/0x608
[   17.077201]  kasan_report+0xdc/0x128
[   17.077338]  __asan_report_load1_noabort+0x20/0x30
[   17.077393]  ksize_unpoisons_memory+0x690/0x740
[   17.077439]  kunit_try_run_case+0x170/0x3f0
[   17.077818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.077892]  kthread+0x328/0x630
[   17.078163]  ret_from_fork+0x10/0x20
[   17.078241] 
[   17.078637] Allocated by task 195:
[   17.078725]  kasan_save_stack+0x3c/0x68
[   17.078787]  kasan_save_track+0x20/0x40
[   17.078825]  kasan_save_alloc_info+0x40/0x58
[   17.079257]  __kasan_kmalloc+0xd4/0xd8
[   17.079349]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.079725]  ksize_unpoisons_memory+0xc0/0x740
[   17.079841]  kunit_try_run_case+0x170/0x3f0
[   17.079894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.080224]  kthread+0x328/0x630
[   17.080362]  ret_from_fork+0x10/0x20
[   17.080696] 
[   17.080738] The buggy address belongs to the object at fff00000c63cde00
[   17.080738]  which belongs to the cache kmalloc-128 of size 128
[   17.080890] The buggy address is located 12 bytes to the right of
[   17.080890]  allocated 115-byte region [fff00000c63cde00, fff00000c63cde73)
[   17.081298] 
[   17.081346] The buggy address belongs to the physical page:
[   17.081464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   17.081558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.081607] page_type: f5(slab)
[   17.081960] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.082057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.082156] page dumped because: kasan: bad access detected
[   17.082337] 
[   17.082486] Memory state around the buggy address:
[   17.082562]  fff00000c63cdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.082686]  fff00000c63cdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.082732] >fff00000c63cde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.082773]                                                                 ^
[   17.082823]  fff00000c63cde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.082921]  fff00000c63cdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.082970] ==================================================================

[   13.817760] ==================================================================
[   13.818184] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.818600] Read of size 1 at addr ffff888102aa0778 by task kunit_try_catch/212
[   13.819145] 
[   13.819322] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.819402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.819423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.819456] Call Trace:
[   13.819481]  <TASK>
[   13.819506]  dump_stack_lvl+0x73/0xb0
[   13.819748]  print_report+0xd1/0x650
[   13.819790]  ? __virt_addr_valid+0x1db/0x2d0
[   13.819827]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.819868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.819926]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.819976]  kasan_report+0x141/0x180
[   13.820015]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.820062]  __asan_report_load1_noabort+0x18/0x20
[   13.820103]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.820138]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.820176]  ? finish_task_switch.isra.0+0x153/0x700
[   13.820216]  ? __switch_to+0x47/0xf50
[   13.820264]  ? __schedule+0x10cc/0x2b60
[   13.820305]  ? __pfx_read_tsc+0x10/0x10
[   13.820342]  ? ktime_get_ts64+0x86/0x230
[   13.820379]  kunit_try_run_case+0x1a5/0x480
[   13.820419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.820455]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.820514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.820552]  ? __kthread_parkme+0x82/0x180
[   13.820586]  ? preempt_count_sub+0x50/0x80
[   13.821180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.821241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.821265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.821286]  kthread+0x337/0x6f0
[   13.821306]  ? trace_preempt_on+0x20/0xc0
[   13.821328]  ? __pfx_kthread+0x10/0x10
[   13.821347]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.821366]  ? calculate_sigpending+0x7b/0xa0
[   13.821387]  ? __pfx_kthread+0x10/0x10
[   13.821407]  ret_from_fork+0x116/0x1d0
[   13.821423]  ? __pfx_kthread+0x10/0x10
[   13.821441]  ret_from_fork_asm+0x1a/0x30
[   13.821468]  </TASK>
[   13.821480] 
[   13.831870] Allocated by task 212:
[   13.832160]  kasan_save_stack+0x45/0x70
[   13.832502]  kasan_save_track+0x18/0x40
[   13.833493]  kasan_save_alloc_info+0x3b/0x50
[   13.833759]  __kasan_kmalloc+0xb7/0xc0
[   13.833935]  __kmalloc_cache_noprof+0x189/0x420
[   13.834140]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.834337]  kunit_try_run_case+0x1a5/0x480
[   13.834520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.834715]  kthread+0x337/0x6f0
[   13.835777]  ret_from_fork+0x116/0x1d0
[   13.836129]  ret_from_fork_asm+0x1a/0x30
[   13.836457] 
[   13.836773] The buggy address belongs to the object at ffff888102aa0700
[   13.836773]  which belongs to the cache kmalloc-128 of size 128
[   13.837489] The buggy address is located 5 bytes to the right of
[   13.837489]  allocated 115-byte region [ffff888102aa0700, ffff888102aa0773)
[   13.838444] 
[   13.839099] The buggy address belongs to the physical page:
[   13.839494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   13.840142] flags: 0x200000000000000(node=0|zone=2)
[   13.840436] page_type: f5(slab)
[   13.840892] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.841289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.841845] page dumped because: kasan: bad access detected
[   13.842232] 
[   13.842322] Memory state around the buggy address:
[   13.842475]  ffff888102aa0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.843403]  ffff888102aa0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.843999] >ffff888102aa0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.844237]                                                                 ^
[   13.844447]  ffff888102aa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.844801]  ffff888102aa0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.845004] ==================================================================
[   13.789180] ==================================================================
[   13.789588] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.790436] Read of size 1 at addr ffff888102aa0773 by task kunit_try_catch/212
[   13.790922] 
[   13.791151] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.791239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.791261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.791297] Call Trace:
[   13.791320]  <TASK>
[   13.791348]  dump_stack_lvl+0x73/0xb0
[   13.791405]  print_report+0xd1/0x650
[   13.791441]  ? __virt_addr_valid+0x1db/0x2d0
[   13.791481]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.791548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.791589]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.791640]  kasan_report+0x141/0x180
[   13.791680]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.791728]  __asan_report_load1_noabort+0x18/0x20
[   13.791764]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.791805]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.791838]  ? finish_task_switch.isra.0+0x153/0x700
[   13.791880]  ? __switch_to+0x47/0xf50
[   13.791933]  ? __schedule+0x10cc/0x2b60
[   13.791971]  ? __pfx_read_tsc+0x10/0x10
[   13.792003]  ? ktime_get_ts64+0x86/0x230
[   13.792029]  kunit_try_run_case+0x1a5/0x480
[   13.792052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.792072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.792094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.792137]  ? __kthread_parkme+0x82/0x180
[   13.792164]  ? preempt_count_sub+0x50/0x80
[   13.792194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.792225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.792258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.792289]  kthread+0x337/0x6f0
[   13.792311]  ? trace_preempt_on+0x20/0xc0
[   13.792333]  ? __pfx_kthread+0x10/0x10
[   13.792353]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.792371]  ? calculate_sigpending+0x7b/0xa0
[   13.792394]  ? __pfx_kthread+0x10/0x10
[   13.792414]  ret_from_fork+0x116/0x1d0
[   13.792430]  ? __pfx_kthread+0x10/0x10
[   13.792448]  ret_from_fork_asm+0x1a/0x30
[   13.792477]  </TASK>
[   13.792489] 
[   13.803936] Allocated by task 212:
[   13.804227]  kasan_save_stack+0x45/0x70
[   13.804438]  kasan_save_track+0x18/0x40
[   13.804974]  kasan_save_alloc_info+0x3b/0x50
[   13.805354]  __kasan_kmalloc+0xb7/0xc0
[   13.805784]  __kmalloc_cache_noprof+0x189/0x420
[   13.806132]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.806437]  kunit_try_run_case+0x1a5/0x480
[   13.806709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807052]  kthread+0x337/0x6f0
[   13.807319]  ret_from_fork+0x116/0x1d0
[   13.807510]  ret_from_fork_asm+0x1a/0x30
[   13.807990] 
[   13.808185] The buggy address belongs to the object at ffff888102aa0700
[   13.808185]  which belongs to the cache kmalloc-128 of size 128
[   13.808955] The buggy address is located 0 bytes to the right of
[   13.808955]  allocated 115-byte region [ffff888102aa0700, ffff888102aa0773)
[   13.809861] 
[   13.810042] The buggy address belongs to the physical page:
[   13.810344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   13.810937] flags: 0x200000000000000(node=0|zone=2)
[   13.811337] page_type: f5(slab)
[   13.811758] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.812220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.812885] page dumped because: kasan: bad access detected
[   13.813281] 
[   13.813409] Memory state around the buggy address:
[   13.813899]  ffff888102aa0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.814279]  ffff888102aa0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.814859] >ffff888102aa0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.815320]                                                              ^
[   13.815825]  ffff888102aa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.816204]  ffff888102aa0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.816582] ==================================================================
[   13.845816] ==================================================================
[   13.846124] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.846377] Read of size 1 at addr ffff888102aa077f by task kunit_try_catch/212
[   13.846597] 
[   13.847099] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.847203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.847224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.847294] Call Trace:
[   13.847320]  <TASK>
[   13.847372]  dump_stack_lvl+0x73/0xb0
[   13.847423]  print_report+0xd1/0x650
[   13.847462]  ? __virt_addr_valid+0x1db/0x2d0
[   13.847935]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.848044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.848086]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.848151]  kasan_report+0x141/0x180
[   13.848186]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   13.848224]  __asan_report_load1_noabort+0x18/0x20
[   13.848256]  ksize_unpoisons_memory+0x7b6/0x9b0
[   13.848291]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.848321]  ? finish_task_switch.isra.0+0x153/0x700
[   13.848354]  ? __switch_to+0x47/0xf50
[   13.848388]  ? __schedule+0x10cc/0x2b60
[   13.848418]  ? __pfx_read_tsc+0x10/0x10
[   13.848444]  ? ktime_get_ts64+0x86/0x230
[   13.848479]  kunit_try_run_case+0x1a5/0x480
[   13.848513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.848544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.848576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.848608]  ? __kthread_parkme+0x82/0x180
[   13.849422]  ? preempt_count_sub+0x50/0x80
[   13.849477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.849521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.849559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.849592]  kthread+0x337/0x6f0
[   13.850327]  ? trace_preempt_on+0x20/0xc0
[   13.850393]  ? __pfx_kthread+0x10/0x10
[   13.850427]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.850461]  ? calculate_sigpending+0x7b/0xa0
[   13.850497]  ? __pfx_kthread+0x10/0x10
[   13.850530]  ret_from_fork+0x116/0x1d0
[   13.850558]  ? __pfx_kthread+0x10/0x10
[   13.850587]  ret_from_fork_asm+0x1a/0x30
[   13.850652]  </TASK>
[   13.850671] 
[   13.862190] Allocated by task 212:
[   13.862394]  kasan_save_stack+0x45/0x70
[   13.862607]  kasan_save_track+0x18/0x40
[   13.862850]  kasan_save_alloc_info+0x3b/0x50
[   13.863146]  __kasan_kmalloc+0xb7/0xc0
[   13.863311]  __kmalloc_cache_noprof+0x189/0x420
[   13.863497]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.863845]  kunit_try_run_case+0x1a5/0x480
[   13.864146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.864514]  kthread+0x337/0x6f0
[   13.864774]  ret_from_fork+0x116/0x1d0
[   13.865041]  ret_from_fork_asm+0x1a/0x30
[   13.865334] 
[   13.865468] The buggy address belongs to the object at ffff888102aa0700
[   13.865468]  which belongs to the cache kmalloc-128 of size 128
[   13.866018] The buggy address is located 12 bytes to the right of
[   13.866018]  allocated 115-byte region [ffff888102aa0700, ffff888102aa0773)
[   13.866611] 
[   13.866740] The buggy address belongs to the physical page:
[   13.866993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   13.867421] flags: 0x200000000000000(node=0|zone=2)
[   13.867665] page_type: f5(slab)
[   13.867902] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.868215] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.868454] page dumped because: kasan: bad access detected
[   13.868653] 
[   13.868803] Memory state around the buggy address:
[   13.869152]  ffff888102aa0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.869636]  ffff888102aa0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.870121] >ffff888102aa0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.870554]                                                                 ^
[   13.870797]  ffff888102aa0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.871216]  ffff888102aa0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.871665] ==================================================================

[   13.979024] ==================================================================
[   13.979296] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   13.979537] Read of size 1 at addr ffff888102c3fd78 by task kunit_try_catch/211
[   13.979972] 
[   13.980082] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.980125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.980137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.980157] Call Trace:
[   13.980169]  <TASK>
[   13.980183]  dump_stack_lvl+0x73/0xb0
[   13.980211]  print_report+0xd1/0x650
[   13.980233]  ? __virt_addr_valid+0x1db/0x2d0
[   13.980255]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.980316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.980342]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.980365]  kasan_report+0x141/0x180
[   13.980386]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   13.980414]  __asan_report_load1_noabort+0x18/0x20
[   13.980437]  ksize_unpoisons_memory+0x7e9/0x9b0
[   13.980461]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.980485]  ? __kasan_check_write+0x18/0x20
[   13.980503]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.980526]  ? irqentry_exit+0x2a/0x60
[   13.980546]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.980570]  ? trace_hardirqs_on+0x37/0xe0
[   13.980592]  ? __pfx_read_tsc+0x10/0x10
[   13.980612]  ? ktime_get_ts64+0x86/0x230
[   13.980635]  kunit_try_run_case+0x1a5/0x480
[   13.980659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.980682]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.981016]  ? __kthread_parkme+0x82/0x180
[   13.981040]  ? preempt_count_sub+0x50/0x80
[   13.981078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.981101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.981124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.981146]  kthread+0x337/0x6f0
[   13.981166]  ? trace_preempt_on+0x20/0xc0
[   13.981188]  ? __pfx_kthread+0x10/0x10
[   13.981209]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.981229]  ? calculate_sigpending+0x7b/0xa0
[   13.981253]  ? __pfx_kthread+0x10/0x10
[   13.981275]  ret_from_fork+0x116/0x1d0
[   13.981293]  ? __pfx_kthread+0x10/0x10
[   13.981313]  ret_from_fork_asm+0x1a/0x30
[   13.981344]  </TASK>
[   13.981355] 
[   13.989282] Allocated by task 211:
[   13.989495]  kasan_save_stack+0x45/0x70
[   13.989997]  kasan_save_track+0x18/0x40
[   13.990234]  kasan_save_alloc_info+0x3b/0x50
[   13.990469]  __kasan_kmalloc+0xb7/0xc0
[   13.990669]  __kmalloc_cache_noprof+0x189/0x420
[   13.990992]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.991239]  kunit_try_run_case+0x1a5/0x480
[   13.991417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.991674]  kthread+0x337/0x6f0
[   13.991926]  ret_from_fork+0x116/0x1d0
[   13.992140]  ret_from_fork_asm+0x1a/0x30
[   13.992335] 
[   13.992445] The buggy address belongs to the object at ffff888102c3fd00
[   13.992445]  which belongs to the cache kmalloc-128 of size 128
[   13.992935] The buggy address is located 5 bytes to the right of
[   13.992935]  allocated 115-byte region [ffff888102c3fd00, ffff888102c3fd73)
[   13.993355] 
[   13.993434] The buggy address belongs to the physical page:
[   13.993670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f
[   13.994133] flags: 0x200000000000000(node=0|zone=2)
[   13.994387] page_type: f5(slab)
[   13.994566] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.995196] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.995562] page dumped because: kasan: bad access detected
[   13.995924] 
[   13.996027] Memory state around the buggy address:
[   13.996282]  ffff888102c3fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.996626]  ffff888102c3fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.996941] >ffff888102c3fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.997255]                                                                 ^
[   13.997602]  ffff888102c3fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.998029]  ffff888102c3fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.998396] ==================================================================
[   13.998915] ==================================================================
[   13.999289] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   13.999651] Read of size 1 at addr ffff888102c3fd7f by task kunit_try_catch/211
[   14.000188] 
[   14.000288] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.000333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.000345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.000365] Call Trace:
[   14.000383]  <TASK>
[   14.000398]  dump_stack_lvl+0x73/0xb0
[   14.000427]  print_report+0xd1/0x650
[   14.000449]  ? __virt_addr_valid+0x1db/0x2d0
[   14.000471]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.000493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.000519]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.000542]  kasan_report+0x141/0x180
[   14.000564]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.000593]  __asan_report_load1_noabort+0x18/0x20
[   14.000616]  ksize_unpoisons_memory+0x7b6/0x9b0
[   14.000640]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.000664]  ? __kasan_check_write+0x18/0x20
[   14.000683]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.000790]  ? irqentry_exit+0x2a/0x60
[   14.000814]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.000837]  ? trace_hardirqs_on+0x37/0xe0
[   14.000860]  ? __pfx_read_tsc+0x10/0x10
[   14.000881]  ? ktime_get_ts64+0x86/0x230
[   14.000905]  kunit_try_run_case+0x1a5/0x480
[   14.000928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.000952]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.000974]  ? __kthread_parkme+0x82/0x180
[   14.000995]  ? preempt_count_sub+0x50/0x80
[   14.001019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.001042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.001076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.001099]  kthread+0x337/0x6f0
[   14.001118]  ? trace_preempt_on+0x20/0xc0
[   14.001140]  ? __pfx_kthread+0x10/0x10
[   14.001161]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.001181]  ? calculate_sigpending+0x7b/0xa0
[   14.001206]  ? __pfx_kthread+0x10/0x10
[   14.001228]  ret_from_fork+0x116/0x1d0
[   14.001246]  ? __pfx_kthread+0x10/0x10
[   14.001266]  ret_from_fork_asm+0x1a/0x30
[   14.001298]  </TASK>
[   14.001310] 
[   14.009980] Allocated by task 211:
[   14.010147]  kasan_save_stack+0x45/0x70
[   14.010298]  kasan_save_track+0x18/0x40
[   14.010436]  kasan_save_alloc_info+0x3b/0x50
[   14.010661]  __kasan_kmalloc+0xb7/0xc0
[   14.010947]  __kmalloc_cache_noprof+0x189/0x420
[   14.011206]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.011425]  kunit_try_run_case+0x1a5/0x480
[   14.011574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.011870]  kthread+0x337/0x6f0
[   14.012067]  ret_from_fork+0x116/0x1d0
[   14.012263]  ret_from_fork_asm+0x1a/0x30
[   14.012469] 
[   14.012570] The buggy address belongs to the object at ffff888102c3fd00
[   14.012570]  which belongs to the cache kmalloc-128 of size 128
[   14.013144] The buggy address is located 12 bytes to the right of
[   14.013144]  allocated 115-byte region [ffff888102c3fd00, ffff888102c3fd73)
[   14.013672] 
[   14.013846] The buggy address belongs to the physical page:
[   14.014028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f
[   14.014287] flags: 0x200000000000000(node=0|zone=2)
[   14.014456] page_type: f5(slab)
[   14.014628] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.015197] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.015546] page dumped because: kasan: bad access detected
[   14.015832] 
[   14.015906] Memory state around the buggy address:
[   14.016075]  ffff888102c3fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.016401]  ffff888102c3fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.016811] >ffff888102c3fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.017103]                                                                 ^
[   14.017388]  ffff888102c3fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.017762]  ffff888102c3fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.018059] ==================================================================
[   13.959007] ==================================================================
[   13.959535] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   13.959992] Read of size 1 at addr ffff888102c3fd73 by task kunit_try_catch/211
[   13.960328] 
[   13.960454] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.960499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.960511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.960531] Call Trace:
[   13.960543]  <TASK>
[   13.960558]  dump_stack_lvl+0x73/0xb0
[   13.960586]  print_report+0xd1/0x650
[   13.960609]  ? __virt_addr_valid+0x1db/0x2d0
[   13.960630]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.960652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.960677]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.960776]  kasan_report+0x141/0x180
[   13.960801]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   13.960829]  __asan_report_load1_noabort+0x18/0x20
[   13.960852]  ksize_unpoisons_memory+0x81c/0x9b0
[   13.960875]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.960898]  ? __kasan_check_write+0x18/0x20
[   13.960916]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.960939]  ? irqentry_exit+0x2a/0x60
[   13.960960]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.960982]  ? trace_hardirqs_on+0x37/0xe0
[   13.961005]  ? __pfx_read_tsc+0x10/0x10
[   13.961025]  ? ktime_get_ts64+0x86/0x230
[   13.961063]  kunit_try_run_case+0x1a5/0x480
[   13.961087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.961110]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.961132]  ? __kthread_parkme+0x82/0x180
[   13.961150]  ? preempt_count_sub+0x50/0x80
[   13.961174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.961196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.961218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.961240]  kthread+0x337/0x6f0
[   13.961259]  ? trace_preempt_on+0x20/0xc0
[   13.961281]  ? __pfx_kthread+0x10/0x10
[   13.961300]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.961320]  ? calculate_sigpending+0x7b/0xa0
[   13.961343]  ? __pfx_kthread+0x10/0x10
[   13.961364]  ret_from_fork+0x116/0x1d0
[   13.961382]  ? __pfx_kthread+0x10/0x10
[   13.961401]  ret_from_fork_asm+0x1a/0x30
[   13.961432]  </TASK>
[   13.961443] 
[   13.969921] Allocated by task 211:
[   13.970069]  kasan_save_stack+0x45/0x70
[   13.970233]  kasan_save_track+0x18/0x40
[   13.970433]  kasan_save_alloc_info+0x3b/0x50
[   13.970648]  __kasan_kmalloc+0xb7/0xc0
[   13.970914]  __kmalloc_cache_noprof+0x189/0x420
[   13.971161]  ksize_unpoisons_memory+0xc7/0x9b0
[   13.971350]  kunit_try_run_case+0x1a5/0x480
[   13.971505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.971834]  kthread+0x337/0x6f0
[   13.972024]  ret_from_fork+0x116/0x1d0
[   13.972230]  ret_from_fork_asm+0x1a/0x30
[   13.972422] 
[   13.972506] The buggy address belongs to the object at ffff888102c3fd00
[   13.972506]  which belongs to the cache kmalloc-128 of size 128
[   13.973074] The buggy address is located 0 bytes to the right of
[   13.973074]  allocated 115-byte region [ffff888102c3fd00, ffff888102c3fd73)
[   13.973604] 
[   13.973906] The buggy address belongs to the physical page:
[   13.974134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f
[   13.974385] flags: 0x200000000000000(node=0|zone=2)
[   13.974555] page_type: f5(slab)
[   13.974822] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.975186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.975507] page dumped because: kasan: bad access detected
[   13.975684] 
[   13.975828] Memory state around the buggy address:
[   13.976058]  ffff888102c3fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.976499]  ffff888102c3fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.976900] >ffff888102c3fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.977231]                                                              ^
[   13.977550]  ffff888102c3fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.977925]  ffff888102c3fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.978244] ==================================================================

[   29.764179] ==================================================================
[   29.771411] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   29.778812] Read of size 1 at addr ffff88810133d578 by task kunit_try_catch/235
[   29.786118] 
[   29.787617] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   29.787625] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   29.787628] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.787631] Call Trace:
[   29.787632]  <TASK>
[   29.787634]  dump_stack_lvl+0x73/0xb0
[   29.787638]  print_report+0xd1/0x650
[   29.787642]  ? __virt_addr_valid+0x1db/0x2d0
[   29.787646]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.787655]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787660]  kasan_report+0x141/0x180
[   29.787664]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787669]  __asan_report_load1_noabort+0x18/0x20
[   29.787673]  ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787678]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.787682]  ? finish_task_switch.isra.0+0x153/0x700
[   29.787686]  ? __switch_to+0x544/0xf50
[   29.787691]  ? __schedule+0x10cc/0x2b60
[   29.787694]  ? ktime_get_ts64+0x83/0x230
[   29.787699]  kunit_try_run_case+0x1a2/0x480
[   29.787703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.787707]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.787711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.787715]  ? __kthread_parkme+0x82/0x180
[   29.787719]  ? preempt_count_sub+0x50/0x80
[   29.787723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.787727]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.787731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.787735]  kthread+0x334/0x6f0
[   29.787739]  ? trace_preempt_on+0x20/0xc0
[   29.787743]  ? __pfx_kthread+0x10/0x10
[   29.787746]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.787750]  ? calculate_sigpending+0x7b/0xa0
[   29.787754]  ? __pfx_kthread+0x10/0x10
[   29.787758]  ret_from_fork+0x113/0x1d0
[   29.787761]  ? __pfx_kthread+0x10/0x10
[   29.787765]  ret_from_fork_asm+0x1a/0x30
[   29.787771]  </TASK>
[   29.787772] 
[   29.963399] Allocated by task 235:
[   29.966808]  kasan_save_stack+0x45/0x70
[   29.970646]  kasan_save_track+0x18/0x40
[   29.974486]  kasan_save_alloc_info+0x3b/0x50
[   29.978760]  __kasan_kmalloc+0xb7/0xc0
[   29.982511]  __kmalloc_cache_noprof+0x189/0x420
[   29.987046]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.991498]  kunit_try_run_case+0x1a2/0x480
[   29.995687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.001093]  kthread+0x334/0x6f0
[   30.004326]  ret_from_fork+0x113/0x1d0
[   30.008105]  ret_from_fork_asm+0x1a/0x30
[   30.012030] 
[   30.013530] The buggy address belongs to the object at ffff88810133d500
[   30.013530]  which belongs to the cache kmalloc-128 of size 128
[   30.026046] The buggy address is located 5 bytes to the right of
[   30.026046]  allocated 115-byte region [ffff88810133d500, ffff88810133d573)
[   30.038992] 
[   30.040490] The buggy address belongs to the physical page:
[   30.046066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   30.054072] flags: 0x200000000000000(node=0|zone=2)
[   30.058952] page_type: f5(slab)
[   30.062099] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.069848] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.077593] page dumped because: kasan: bad access detected
[   30.083167] 
[   30.084665] Memory state around the buggy address:
[   30.089459]  ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.096676]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.103896] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.111117]                                                                 ^
[   30.118248]  ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.125467]  ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.132689] ==================================================================
[   29.384125] ==================================================================
[   29.395582] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   29.402984] Read of size 1 at addr ffff88810133d573 by task kunit_try_catch/235
[   29.410297] 
[   29.411800] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   29.411809] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   29.411812] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.411815] Call Trace:
[   29.411817]  <TASK>
[   29.411819]  dump_stack_lvl+0x73/0xb0
[   29.411823]  print_report+0xd1/0x650
[   29.411827]  ? __virt_addr_valid+0x1db/0x2d0
[   29.411831]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.411836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.411841]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.411845]  kasan_report+0x141/0x180
[   29.411849]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.411854]  __asan_report_load1_noabort+0x18/0x20
[   29.411859]  ksize_unpoisons_memory+0x81c/0x9b0
[   29.411863]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.411867]  ? finish_task_switch.isra.0+0x153/0x700
[   29.411871]  ? __switch_to+0x544/0xf50
[   29.411876]  ? __schedule+0x10cc/0x2b60
[   29.411880]  ? ktime_get_ts64+0x83/0x230
[   29.411884]  kunit_try_run_case+0x1a2/0x480
[   29.411888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.411893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.411897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.411901]  ? __kthread_parkme+0x82/0x180
[   29.411904]  ? preempt_count_sub+0x50/0x80
[   29.411908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.411913]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.411917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.411921]  kthread+0x334/0x6f0
[   29.411925]  ? trace_preempt_on+0x20/0xc0
[   29.411929]  ? __pfx_kthread+0x10/0x10
[   29.411932]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.411936]  ? calculate_sigpending+0x7b/0xa0
[   29.411941]  ? __pfx_kthread+0x10/0x10
[   29.411944]  ret_from_fork+0x113/0x1d0
[   29.411948]  ? __pfx_kthread+0x10/0x10
[   29.411951]  ret_from_fork_asm+0x1a/0x30
[   29.411957]  </TASK>
[   29.411959] 
[   29.587721] Allocated by task 235:
[   29.591127]  kasan_save_stack+0x45/0x70
[   29.594965]  kasan_save_track+0x18/0x40
[   29.598805]  kasan_save_alloc_info+0x3b/0x50
[   29.603078]  __kasan_kmalloc+0xb7/0xc0
[   29.606832]  __kmalloc_cache_noprof+0x189/0x420
[   29.611372]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.615843]  kunit_try_run_case+0x1a2/0x480
[   29.620030]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.625429]  kthread+0x334/0x6f0
[   29.628661]  ret_from_fork+0x113/0x1d0
[   29.632413]  ret_from_fork_asm+0x1a/0x30
[   29.636363] 
[   29.637882] The buggy address belongs to the object at ffff88810133d500
[   29.637882]  which belongs to the cache kmalloc-128 of size 128
[   29.650404] The buggy address is located 0 bytes to the right of
[   29.650404]  allocated 115-byte region [ffff88810133d500, ffff88810133d573)
[   29.663366] 
[   29.664880] The buggy address belongs to the physical page:
[   29.670454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   29.678462] flags: 0x200000000000000(node=0|zone=2)
[   29.683362] page_type: f5(slab)
[   29.686531] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.694279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.702017] page dumped because: kasan: bad access detected
[   29.707590] 
[   29.709089] Memory state around the buggy address:
[   29.713882]  ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.721102]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.728328] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.735574]                                                              ^
[   29.742447]  ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.749665]  ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.756885] ==================================================================
[   30.139944] ==================================================================
[   30.147195] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   30.154588] Read of size 1 at addr ffff88810133d57f by task kunit_try_catch/235
[   30.161901] 
[   30.163405] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   30.163413] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   30.163416] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   30.163419] Call Trace:
[   30.163420]  <TASK>
[   30.163422]  dump_stack_lvl+0x73/0xb0
[   30.163426]  print_report+0xd1/0x650
[   30.163430]  ? __virt_addr_valid+0x1db/0x2d0
[   30.163434]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.163443]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163448]  kasan_report+0x141/0x180
[   30.163451]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163457]  __asan_report_load1_noabort+0x18/0x20
[   30.163461]  ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163466]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   30.163470]  ? finish_task_switch.isra.0+0x153/0x700
[   30.163474]  ? __switch_to+0x544/0xf50
[   30.163478]  ? __schedule+0x10cc/0x2b60
[   30.163482]  ? ktime_get_ts64+0x83/0x230
[   30.163486]  kunit_try_run_case+0x1a2/0x480
[   30.163491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.163495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.163499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.163503]  ? __kthread_parkme+0x82/0x180
[   30.163507]  ? preempt_count_sub+0x50/0x80
[   30.163511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.163515]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.163519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.163523]  kthread+0x334/0x6f0
[   30.163527]  ? trace_preempt_on+0x20/0xc0
[   30.163531]  ? __pfx_kthread+0x10/0x10
[   30.163534]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.163538]  ? calculate_sigpending+0x7b/0xa0
[   30.163542]  ? __pfx_kthread+0x10/0x10
[   30.163546]  ret_from_fork+0x113/0x1d0
[   30.163549]  ? __pfx_kthread+0x10/0x10
[   30.163553]  ret_from_fork_asm+0x1a/0x30
[   30.163559]  </TASK>
[   30.163560] 
[   30.339229] Allocated by task 235:
[   30.342638]  kasan_save_stack+0x45/0x70
[   30.346477]  kasan_save_track+0x18/0x40
[   30.350316]  kasan_save_alloc_info+0x3b/0x50
[   30.354587]  __kasan_kmalloc+0xb7/0xc0
[   30.358363]  __kmalloc_cache_noprof+0x189/0x420
[   30.362900]  ksize_unpoisons_memory+0xc7/0x9b0
[   30.367362]  kunit_try_run_case+0x1a2/0x480
[   30.371574]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.376975]  kthread+0x334/0x6f0
[   30.380216]  ret_from_fork+0x113/0x1d0
[   30.383968]  ret_from_fork_asm+0x1a/0x30
[   30.387895] 
[   30.389401] The buggy address belongs to the object at ffff88810133d500
[   30.389401]  which belongs to the cache kmalloc-128 of size 128
[   30.401917] The buggy address is located 12 bytes to the right of
[   30.401917]  allocated 115-byte region [ffff88810133d500, ffff88810133d573)
[   30.414960] 
[   30.416457] The buggy address belongs to the physical page:
[   30.422032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   30.430040] flags: 0x200000000000000(node=0|zone=2)
[   30.434919] page_type: f5(slab)
[   30.438065] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.445805] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.453544] page dumped because: kasan: bad access detected
[   30.459117] 
[   30.460616] Memory state around the buggy address:
[   30.465409]  ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.472628]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.479847] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.487067]                                                                 ^
[   30.494198]  ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.501418]  ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.508636] ==================================================================