Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   40.935436] ==================================================================
[   40.942752] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   40.950250] Read of size 1 at addr ffff0000822c2978 by task kunit_try_catch/292
[   40.957663] 
[   40.959195] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   40.959227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.959235] Hardware name: Thundercomm Dragonboard 845c (DT)
[   40.959246] Call trace:
[   40.959254]  show_stack+0x20/0x38 (C)
[   40.959272]  dump_stack_lvl+0x8c/0xd0
[   40.959291]  print_report+0x118/0x608
[   40.959310]  kasan_report+0xdc/0x128
[   40.959330]  __asan_report_load1_noabort+0x20/0x30
[   40.959350]  ksize_unpoisons_memory+0x618/0x740
[   40.959369]  kunit_try_run_case+0x170/0x3f0
[   40.959389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.959413]  kthread+0x328/0x630
[   40.959428]  ret_from_fork+0x10/0x20
[   40.959445] 
[   41.025494] Allocated by task 292:
[   41.028954]  kasan_save_stack+0x3c/0x68
[   41.032865]  kasan_save_track+0x20/0x40
[   41.036775]  kasan_save_alloc_info+0x40/0x58
[   41.041114]  __kasan_kmalloc+0xd4/0xd8
[   41.044938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.049550]  ksize_unpoisons_memory+0xc0/0x740
[   41.054074]  kunit_try_run_case+0x170/0x3f0
[   41.058330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.063899]  kthread+0x328/0x630
[   41.067183]  ret_from_fork+0x10/0x20
[   41.070824] 
[   41.072358] The buggy address belongs to the object at ffff0000822c2900
[   41.072358]  which belongs to the cache kmalloc-128 of size 128
[   41.085025] The buggy address is located 5 bytes to the right of
[   41.085025]  allocated 115-byte region [ffff0000822c2900, ffff0000822c2973)
[   41.098122] 
[   41.099659] The buggy address belongs to the physical page:
[   41.105307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   41.113421] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.121179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.128236] page_type: f5(slab)
[   41.131443] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.139291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.147138] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.155070] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.163003] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   41.170936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   41.178864] page dumped because: kasan: bad access detected
[   41.184508] 
[   41.186037] Memory state around the buggy address:
[   41.190901]  ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.198215]  ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.205530] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   41.212852]                                                                 ^
[   41.220078]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.227395]  ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.234710] ==================================================================
[   41.242897] ==================================================================
[   41.250217] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   41.257718] Read of size 1 at addr ffff0000822c297f by task kunit_try_catch/292
[   41.265119] 
[   41.266648] CPU: 5 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   41.266679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.266688] Hardware name: Thundercomm Dragonboard 845c (DT)
[   41.266698] Call trace:
[   41.266703]  show_stack+0x20/0x38 (C)
[   41.266723]  dump_stack_lvl+0x8c/0xd0
[   41.266741]  print_report+0x118/0x608
[   41.266758]  kasan_report+0xdc/0x128
[   41.266776]  __asan_report_load1_noabort+0x20/0x30
[   41.266792]  ksize_unpoisons_memory+0x690/0x740
[   41.266810]  kunit_try_run_case+0x170/0x3f0
[   41.266828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.266848]  kthread+0x328/0x630
[   41.266862]  ret_from_fork+0x10/0x20
[   41.266879] 
[   41.332875] Allocated by task 292:
[   41.336331]  kasan_save_stack+0x3c/0x68
[   41.340229]  kasan_save_track+0x20/0x40
[   41.344126]  kasan_save_alloc_info+0x40/0x58
[   41.348462]  __kasan_kmalloc+0xd4/0xd8
[   41.352269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.356868]  ksize_unpoisons_memory+0xc0/0x740
[   41.361383]  kunit_try_run_case+0x170/0x3f0
[   41.365633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.371199]  kthread+0x328/0x630
[   41.374484]  ret_from_fork+0x10/0x20
[   41.378117] 
[   41.379648] The buggy address belongs to the object at ffff0000822c2900
[   41.379648]  which belongs to the cache kmalloc-128 of size 128
[   41.392295] The buggy address is located 12 bytes to the right of
[   41.392295]  allocated 115-byte region [ffff0000822c2900, ffff0000822c2973)
[   41.405477] 
[   41.407001] The buggy address belongs to the physical page:
[   41.412643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   41.420746] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.428491] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.435541] page_type: f5(slab)
[   41.438741] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.446586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.454431] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.462360] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.470289] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   41.478218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   41.486143] page dumped because: kasan: bad access detected
[   41.491785] 
[   41.493306] Memory state around the buggy address:
[   41.498160]  ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.505470]  ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.512778] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   41.520085]                                                                 ^
[   41.527304]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.534616]  ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.541921] ==================================================================
[   40.624767] ==================================================================
[   40.636332] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   40.643835] Read of size 1 at addr ffff0000822c2973 by task kunit_try_catch/292
[   40.651246] 
[   40.652788] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   40.652819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.652828] Hardware name: Thundercomm Dragonboard 845c (DT)
[   40.652840] Call trace:
[   40.652848]  show_stack+0x20/0x38 (C)
[   40.652866]  dump_stack_lvl+0x8c/0xd0
[   40.652886]  print_report+0x118/0x608
[   40.652906]  kasan_report+0xdc/0x128
[   40.652926]  __asan_report_load1_noabort+0x20/0x30
[   40.652944]  ksize_unpoisons_memory+0x628/0x740
[   40.652963]  kunit_try_run_case+0x170/0x3f0
[   40.652984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.653006]  kthread+0x328/0x630
[   40.653022]  ret_from_fork+0x10/0x20
[   40.653039] 
[   40.719100] Allocated by task 292:
[   40.722560]  kasan_save_stack+0x3c/0x68
[   40.726470]  kasan_save_track+0x20/0x40
[   40.730380]  kasan_save_alloc_info+0x40/0x58
[   40.734720]  __kasan_kmalloc+0xd4/0xd8
[   40.738542]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.743151]  ksize_unpoisons_memory+0xc0/0x740
[   40.747675]  kunit_try_run_case+0x170/0x3f0
[   40.751934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.757508]  kthread+0x328/0x630
[   40.760797]  ret_from_fork+0x10/0x20
[   40.764435] 
[   40.765965] The buggy address belongs to the object at ffff0000822c2900
[   40.765965]  which belongs to the cache kmalloc-128 of size 128
[   40.778627] The buggy address is located 0 bytes to the right of
[   40.778627]  allocated 115-byte region [ffff0000822c2900, ffff0000822c2973)
[   40.791729] 
[   40.793256] The buggy address belongs to the physical page:
[   40.798905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   40.807016] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.814772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.821829] page_type: f5(slab)
[   40.825033] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   40.832877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.840721] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   40.848652] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.856582] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   40.864513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   40.872439] page dumped because: kasan: bad access detected
[   40.878088] 
[   40.879624] Memory state around the buggy address:
[   40.884483]  ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   40.891807]  ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.899121] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   40.906444]                                                              ^
[   40.913408]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.920733]  ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.928053] ==================================================================

[   33.341118] ==================================================================
[   33.341553] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   33.342067] Read of size 1 at addr fff00000c7732573 by task kunit_try_catch/205
[   33.342449] 
[   33.342643] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.343463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.343819] Hardware name: linux,dummy-virt (DT)
[   33.343921] Call trace:
[   33.344303]  show_stack+0x20/0x38 (C)
[   33.344476]  dump_stack_lvl+0x8c/0xd0
[   33.344576]  print_report+0x118/0x608
[   33.344639]  kasan_report+0xdc/0x128
[   33.344736]  __asan_report_load1_noabort+0x20/0x30
[   33.344829]  ksize_unpoisons_memory+0x628/0x740
[   33.344927]  kunit_try_run_case+0x170/0x3f0
[   33.345299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.345464]  kthread+0x328/0x630
[   33.345777]  ret_from_fork+0x10/0x20
[   33.345955] 
[   33.346028] Allocated by task 205:
[   33.346122]  kasan_save_stack+0x3c/0x68
[   33.346275]  kasan_save_track+0x20/0x40
[   33.346412]  kasan_save_alloc_info+0x40/0x58
[   33.346651]  __kasan_kmalloc+0xd4/0xd8
[   33.346748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.346878]  ksize_unpoisons_memory+0xc0/0x740
[   33.347138]  kunit_try_run_case+0x170/0x3f0
[   33.347249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.347372]  kthread+0x328/0x630
[   33.347472]  ret_from_fork+0x10/0x20
[   33.347578] 
[   33.347623] The buggy address belongs to the object at fff00000c7732500
[   33.347623]  which belongs to the cache kmalloc-128 of size 128
[   33.347755] The buggy address is located 0 bytes to the right of
[   33.347755]  allocated 115-byte region [fff00000c7732500, fff00000c7732573)
[   33.347930] 
[   33.348062] The buggy address belongs to the physical page:
[   33.348153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   33.348282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.348427] page_type: f5(slab)
[   33.348604] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.348768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.348944] page dumped because: kasan: bad access detected
[   33.349058] 
[   33.349140] Memory state around the buggy address:
[   33.349216]  fff00000c7732400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.349486]  fff00000c7732480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.349652] >fff00000c7732500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.349744]                                                              ^
[   33.349903]  fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.350104]  fff00000c7732600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.350257] ==================================================================
[   33.353457] ==================================================================
[   33.353582] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   33.353816] Read of size 1 at addr fff00000c7732578 by task kunit_try_catch/205
[   33.354081] 
[   33.354208] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.354801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.354997] Hardware name: linux,dummy-virt (DT)
[   33.355078] Call trace:
[   33.355150]  show_stack+0x20/0x38 (C)
[   33.355268]  dump_stack_lvl+0x8c/0xd0
[   33.356703]  print_report+0x118/0x608
[   33.356800]  kasan_report+0xdc/0x128
[   33.356865]  __asan_report_load1_noabort+0x20/0x30
[   33.356985]  ksize_unpoisons_memory+0x618/0x740
[   33.357049]  kunit_try_run_case+0x170/0x3f0
[   33.357111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.357178]  kthread+0x328/0x630
[   33.357229]  ret_from_fork+0x10/0x20
[   33.357288] 
[   33.357310] Allocated by task 205:
[   33.357349]  kasan_save_stack+0x3c/0x68
[   33.357400]  kasan_save_track+0x20/0x40
[   33.357447]  kasan_save_alloc_info+0x40/0x58
[   33.357494]  __kasan_kmalloc+0xd4/0xd8
[   33.357539]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.357590]  ksize_unpoisons_memory+0xc0/0x740
[   33.357636]  kunit_try_run_case+0x170/0x3f0
[   33.357684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.357736]  kthread+0x328/0x630
[   33.357774]  ret_from_fork+0x10/0x20
[   33.357818] 
[   33.357840] The buggy address belongs to the object at fff00000c7732500
[   33.357840]  which belongs to the cache kmalloc-128 of size 128
[   33.358136] The buggy address is located 5 bytes to the right of
[   33.358136]  allocated 115-byte region [fff00000c7732500, fff00000c7732573)
[   33.358441] 
[   33.358500] The buggy address belongs to the physical page:
[   33.359129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   33.359328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.359495] page_type: f5(slab)
[   33.359619] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.359806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.359932] page dumped because: kasan: bad access detected
[   33.360384] 
[   33.360453] Memory state around the buggy address:
[   33.360550]  fff00000c7732400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.360818]  fff00000c7732480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.361365] >fff00000c7732500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.361562]                                                                 ^
[   33.361943]  fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.362077]  fff00000c7732600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.362171] ==================================================================
[   33.363601] ==================================================================
[   33.363726] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   33.364504] Read of size 1 at addr fff00000c773257f by task kunit_try_catch/205
[   33.364730] 
[   33.364817] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.365850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.366266] Hardware name: linux,dummy-virt (DT)
[   33.366871] Call trace:
[   33.366962]  show_stack+0x20/0x38 (C)
[   33.367149]  dump_stack_lvl+0x8c/0xd0
[   33.367691]  print_report+0x118/0x608
[   33.368132]  kasan_report+0xdc/0x128
[   33.368297]  __asan_report_load1_noabort+0x20/0x30
[   33.368836]  ksize_unpoisons_memory+0x690/0x740
[   33.369329]  kunit_try_run_case+0x170/0x3f0
[   33.369652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.370117]  kthread+0x328/0x630
[   33.370842]  ret_from_fork+0x10/0x20
[   33.371159] 
[   33.371284] Allocated by task 205:
[   33.371392]  kasan_save_stack+0x3c/0x68
[   33.371511]  kasan_save_track+0x20/0x40
[   33.371630]  kasan_save_alloc_info+0x40/0x58
[   33.371730]  __kasan_kmalloc+0xd4/0xd8
[   33.371818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.371982]  ksize_unpoisons_memory+0xc0/0x740
[   33.372161]  kunit_try_run_case+0x170/0x3f0
[   33.372287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.372392]  kthread+0x328/0x630
[   33.372474]  ret_from_fork+0x10/0x20
[   33.372558] 
[   33.372603] The buggy address belongs to the object at fff00000c7732500
[   33.372603]  which belongs to the cache kmalloc-128 of size 128
[   33.372735] The buggy address is located 12 bytes to the right of
[   33.372735]  allocated 115-byte region [fff00000c7732500, fff00000c7732573)
[   33.372955] 
[   33.373065] The buggy address belongs to the physical page:
[   33.373176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   33.373343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.373460] page_type: f5(slab)
[   33.373560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.373812] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.373934] page dumped because: kasan: bad access detected
[   33.374027] 
[   33.374080] Memory state around the buggy address:
[   33.374170]  fff00000c7732400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.374291]  fff00000c7732480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.374423] >fff00000c7732500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.374534]                                                                 ^
[   33.374652]  fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.374809]  fff00000c7732600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.375011] ==================================================================

[   29.581584] ==================================================================
[   29.582495] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   29.583005] Read of size 1 at addr ffff888100aae973 by task kunit_try_catch/224
[   29.583509] 
[   29.583833] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   29.583947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.583979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.584023] Call Trace:
[   29.584052]  <TASK>
[   29.584087]  dump_stack_lvl+0x73/0xb0
[   29.584152]  print_report+0xd1/0x650
[   29.584250]  ? __virt_addr_valid+0x1db/0x2d0
[   29.584315]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.584374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.584443]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.584507]  kasan_report+0x141/0x180
[   29.584577]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.584680]  __asan_report_load1_noabort+0x18/0x20
[   29.584744]  ksize_unpoisons_memory+0x81c/0x9b0
[   29.584801]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.584852]  ? finish_task_switch.isra.0+0x153/0x700
[   29.584910]  ? __switch_to+0x47/0xf50
[   29.584974]  ? __schedule+0x10cc/0x2b60
[   29.585033]  ? __pfx_read_tsc+0x10/0x10
[   29.585083]  ? ktime_get_ts64+0x86/0x230
[   29.585141]  kunit_try_run_case+0x1a5/0x480
[   29.585206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.585266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.585326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.585362]  ? __kthread_parkme+0x82/0x180
[   29.585390]  ? preempt_count_sub+0x50/0x80
[   29.585421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.585453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.585484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.585514]  kthread+0x337/0x6f0
[   29.585560]  ? trace_preempt_on+0x20/0xc0
[   29.585594]  ? __pfx_kthread+0x10/0x10
[   29.585621]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.585676]  ? calculate_sigpending+0x7b/0xa0
[   29.585709]  ? __pfx_kthread+0x10/0x10
[   29.585737]  ret_from_fork+0x116/0x1d0
[   29.585764]  ? __pfx_kthread+0x10/0x10
[   29.585791]  ret_from_fork_asm+0x1a/0x30
[   29.585831]  </TASK>
[   29.585845] 
[   29.600216] Allocated by task 224:
[   29.600586]  kasan_save_stack+0x45/0x70
[   29.601127]  kasan_save_track+0x18/0x40
[   29.601585]  kasan_save_alloc_info+0x3b/0x50
[   29.602054]  __kasan_kmalloc+0xb7/0xc0
[   29.602414]  __kmalloc_cache_noprof+0x189/0x420
[   29.602889]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.603316]  kunit_try_run_case+0x1a5/0x480
[   29.603745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.604242]  kthread+0x337/0x6f0
[   29.604496]  ret_from_fork+0x116/0x1d0
[   29.604894]  ret_from_fork_asm+0x1a/0x30
[   29.605295] 
[   29.605523] The buggy address belongs to the object at ffff888100aae900
[   29.605523]  which belongs to the cache kmalloc-128 of size 128
[   29.606313] The buggy address is located 0 bytes to the right of
[   29.606313]  allocated 115-byte region [ffff888100aae900, ffff888100aae973)
[   29.607206] 
[   29.607419] The buggy address belongs to the physical page:
[   29.608020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   29.608436] flags: 0x200000000000000(node=0|zone=2)
[   29.608984] page_type: f5(slab)
[   29.609342] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.609844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.610496] page dumped because: kasan: bad access detected
[   29.610910] 
[   29.611141] Memory state around the buggy address:
[   29.611659]  ffff888100aae800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.612103]  ffff888100aae880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.612763] >ffff888100aae900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.613267]                                                              ^
[   29.613875]  ffff888100aae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.614298]  ffff888100aaea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.614978] ==================================================================
[   29.651856] ==================================================================
[   29.653261] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   29.653980] Read of size 1 at addr ffff888100aae97f by task kunit_try_catch/224
[   29.654626] 
[   29.654873] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   29.654987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.655018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.655068] Call Trace:
[   29.655110]  <TASK>
[   29.655150]  dump_stack_lvl+0x73/0xb0
[   29.655223]  print_report+0xd1/0x650
[   29.655282]  ? __virt_addr_valid+0x1db/0x2d0
[   29.655345]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.655406]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.655470]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.655579]  kasan_report+0x141/0x180
[   29.655637]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.655724]  __asan_report_load1_noabort+0x18/0x20
[   29.655813]  ksize_unpoisons_memory+0x7b6/0x9b0
[   29.655902]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.655959]  ? finish_task_switch.isra.0+0x153/0x700
[   29.656014]  ? __switch_to+0x47/0xf50
[   29.656080]  ? __schedule+0x10cc/0x2b60
[   29.656147]  ? __pfx_read_tsc+0x10/0x10
[   29.656206]  ? ktime_get_ts64+0x86/0x230
[   29.656271]  kunit_try_run_case+0x1a5/0x480
[   29.656332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.656375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.656408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.656440]  ? __kthread_parkme+0x82/0x180
[   29.656467]  ? preempt_count_sub+0x50/0x80
[   29.656497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.656528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.656582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.656614]  kthread+0x337/0x6f0
[   29.656651]  ? trace_preempt_on+0x20/0xc0
[   29.656699]  ? __pfx_kthread+0x10/0x10
[   29.656726]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.656756]  ? calculate_sigpending+0x7b/0xa0
[   29.656787]  ? __pfx_kthread+0x10/0x10
[   29.656815]  ret_from_fork+0x116/0x1d0
[   29.656840]  ? __pfx_kthread+0x10/0x10
[   29.656866]  ret_from_fork_asm+0x1a/0x30
[   29.656905]  </TASK>
[   29.656919] 
[   29.669271] Allocated by task 224:
[   29.669681]  kasan_save_stack+0x45/0x70
[   29.670068]  kasan_save_track+0x18/0x40
[   29.670314]  kasan_save_alloc_info+0x3b/0x50
[   29.670603]  __kasan_kmalloc+0xb7/0xc0
[   29.671013]  __kmalloc_cache_noprof+0x189/0x420
[   29.671465]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.671896]  kunit_try_run_case+0x1a5/0x480
[   29.672162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.672683]  kthread+0x337/0x6f0
[   29.673094]  ret_from_fork+0x116/0x1d0
[   29.673494]  ret_from_fork_asm+0x1a/0x30
[   29.673930] 
[   29.674100] The buggy address belongs to the object at ffff888100aae900
[   29.674100]  which belongs to the cache kmalloc-128 of size 128
[   29.674718] The buggy address is located 12 bytes to the right of
[   29.674718]  allocated 115-byte region [ffff888100aae900, ffff888100aae973)
[   29.675390] 
[   29.675574] The buggy address belongs to the physical page:
[   29.676087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   29.676769] flags: 0x200000000000000(node=0|zone=2)
[   29.677246] page_type: f5(slab)
[   29.677774] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.678373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.678972] page dumped because: kasan: bad access detected
[   29.679470] 
[   29.679747] Memory state around the buggy address:
[   29.680095]  ffff888100aae800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.680703]  ffff888100aae880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.681211] >ffff888100aae900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.681576]                                                                 ^
[   29.682212]  ffff888100aae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.682908]  ffff888100aaea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.683397] ==================================================================
[   29.617103] ==================================================================
[   29.618240] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   29.618892] Read of size 1 at addr ffff888100aae978 by task kunit_try_catch/224
[   29.619354] 
[   29.619502] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   29.619592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.619620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.619667] Call Trace:
[   29.619704]  <TASK>
[   29.619793]  dump_stack_lvl+0x73/0xb0
[   29.619890]  print_report+0xd1/0x650
[   29.619950]  ? __virt_addr_valid+0x1db/0x2d0
[   29.620013]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.620115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.620190]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.620252]  kasan_report+0x141/0x180
[   29.620306]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.620376]  __asan_report_load1_noabort+0x18/0x20
[   29.620490]  ksize_unpoisons_memory+0x7e9/0x9b0
[   29.620573]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.620633]  ? finish_task_switch.isra.0+0x153/0x700
[   29.620690]  ? __switch_to+0x47/0xf50
[   29.620756]  ? __schedule+0x10cc/0x2b60
[   29.620872]  ? __pfx_read_tsc+0x10/0x10
[   29.620934]  ? ktime_get_ts64+0x86/0x230
[   29.621000]  kunit_try_run_case+0x1a5/0x480
[   29.621067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.621179]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.621246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.621305]  ? __kthread_parkme+0x82/0x180
[   29.621346]  ? preempt_count_sub+0x50/0x80
[   29.621377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.621409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.621441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.621472]  kthread+0x337/0x6f0
[   29.621499]  ? trace_preempt_on+0x20/0xc0
[   29.621531]  ? __pfx_kthread+0x10/0x10
[   29.621578]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.621608]  ? calculate_sigpending+0x7b/0xa0
[   29.621651]  ? __pfx_kthread+0x10/0x10
[   29.621696]  ret_from_fork+0x116/0x1d0
[   29.621723]  ? __pfx_kthread+0x10/0x10
[   29.621750]  ret_from_fork_asm+0x1a/0x30
[   29.621791]  </TASK>
[   29.621804] 
[   29.634628] Allocated by task 224:
[   29.634990]  kasan_save_stack+0x45/0x70
[   29.635669]  kasan_save_track+0x18/0x40
[   29.636083]  kasan_save_alloc_info+0x3b/0x50
[   29.636566]  __kasan_kmalloc+0xb7/0xc0
[   29.636960]  __kmalloc_cache_noprof+0x189/0x420
[   29.637370]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.637718]  kunit_try_run_case+0x1a5/0x480
[   29.638028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.638659]  kthread+0x337/0x6f0
[   29.639002]  ret_from_fork+0x116/0x1d0
[   29.639394]  ret_from_fork_asm+0x1a/0x30
[   29.639846] 
[   29.640054] The buggy address belongs to the object at ffff888100aae900
[   29.640054]  which belongs to the cache kmalloc-128 of size 128
[   29.640918] The buggy address is located 5 bytes to the right of
[   29.640918]  allocated 115-byte region [ffff888100aae900, ffff888100aae973)
[   29.641779] 
[   29.641993] The buggy address belongs to the physical page:
[   29.642490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   29.643235] flags: 0x200000000000000(node=0|zone=2)
[   29.643792] page_type: f5(slab)
[   29.644059] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.644420] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.645063] page dumped because: kasan: bad access detected
[   29.645611] 
[   29.645853] Memory state around the buggy address:
[   29.646315]  ffff888100aae800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.646939]  ffff888100aae880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.647291] >ffff888100aae900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.647702]                                                                 ^
[   29.648374]  ffff888100aae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.649130]  ffff888100aaea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.649785] ==================================================================