Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.990404] ==================================================================
[   30.990713] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.991037] Read of size 1 at addr fff00000c91f0173 by task kunit_try_catch/227
[   30.991224] 
[   30.991259] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.991423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.991451] Hardware name: linux,dummy-virt (DT)
[   30.991663] Call trace:
[   30.991705]  show_stack+0x20/0x38 (C)
[   30.992020]  dump_stack_lvl+0x8c/0xd0
[   30.992256]  print_report+0x118/0x608
[   30.992471]  kasan_report+0xdc/0x128
[   30.992642]  __asan_report_load1_noabort+0x20/0x30
[   30.992767]  ksize_unpoisons_memory+0x628/0x740
[   30.992847]  kunit_try_run_case+0x170/0x3f0
[   30.993084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.993267]  kthread+0x328/0x630
[   30.993359]  ret_from_fork+0x10/0x20
[   30.993669] 
[   30.993801] Allocated by task 227:
[   30.993941]  kasan_save_stack+0x3c/0x68
[   30.994001]  kasan_save_track+0x20/0x40
[   30.994237]  kasan_save_alloc_info+0x40/0x58
[   30.994327]  __kasan_kmalloc+0xd4/0xd8
[   30.994482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.994560]  ksize_unpoisons_memory+0xc0/0x740
[   30.994627]  kunit_try_run_case+0x170/0x3f0
[   30.994704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.994750]  kthread+0x328/0x630
[   30.994812]  ret_from_fork+0x10/0x20
[   30.995119] 
[   30.995244] The buggy address belongs to the object at fff00000c91f0100
[   30.995244]  which belongs to the cache kmalloc-128 of size 128
[   30.995310] The buggy address is located 0 bytes to the right of
[   30.995310]  allocated 115-byte region [fff00000c91f0100, fff00000c91f0173)
[   30.995412] 
[   30.995576] The buggy address belongs to the physical page:
[   30.995670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0
[   30.995884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.996019] page_type: f5(slab)
[   30.996067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.996409] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.996480] page dumped because: kasan: bad access detected
[   30.996614] 
[   30.996673] Memory state around the buggy address:
[   30.996733]  fff00000c91f0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.996775]  fff00000c91f0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.996959] >fff00000c91f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.997165]                                                              ^
[   30.997265]  fff00000c91f0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.997338]  fff00000c91f0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.997404] ==================================================================
[   30.998521] ==================================================================
[   30.998571] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.998621] Read of size 1 at addr fff00000c91f0178 by task kunit_try_catch/227
[   30.998673] 
[   30.998703] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.998833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.998891] Hardware name: linux,dummy-virt (DT)
[   30.999467] Call trace:
[   30.999575]  show_stack+0x20/0x38 (C)
[   31.000055]  dump_stack_lvl+0x8c/0xd0
[   31.000171]  print_report+0x118/0x608
[   31.000381]  kasan_report+0xdc/0x128
[   31.000488]  __asan_report_load1_noabort+0x20/0x30
[   31.000692]  ksize_unpoisons_memory+0x618/0x740
[   31.000776]  kunit_try_run_case+0x170/0x3f0
[   31.001131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.001220]  kthread+0x328/0x630
[   31.001345]  ret_from_fork+0x10/0x20
[   31.001416] 
[   31.001466] Allocated by task 227:
[   31.001570]  kasan_save_stack+0x3c/0x68
[   31.001615]  kasan_save_track+0x20/0x40
[   31.001652]  kasan_save_alloc_info+0x40/0x58
[   31.001722]  __kasan_kmalloc+0xd4/0xd8
[   31.001884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.002236]  ksize_unpoisons_memory+0xc0/0x740
[   31.002315]  kunit_try_run_case+0x170/0x3f0
[   31.002432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.002501]  kthread+0x328/0x630
[   31.002605]  ret_from_fork+0x10/0x20
[   31.002644] 
[   31.002663] The buggy address belongs to the object at fff00000c91f0100
[   31.002663]  which belongs to the cache kmalloc-128 of size 128
[   31.002939] The buggy address is located 5 bytes to the right of
[   31.002939]  allocated 115-byte region [fff00000c91f0100, fff00000c91f0173)
[   31.003157] 
[   31.003219] The buggy address belongs to the physical page:
[   31.003416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0
[   31.003491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.003621] page_type: f5(slab)
[   31.003678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.003737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.003777] page dumped because: kasan: bad access detected
[   31.003810] 
[   31.003831] Memory state around the buggy address:
[   31.004134]  fff00000c91f0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.004269]  fff00000c91f0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.004390] >fff00000c91f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.004458]                                                                 ^
[   31.004570]  fff00000c91f0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.004629]  fff00000c91f0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.004712] ==================================================================
[   31.005702] ==================================================================
[   31.005757] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.005808] Read of size 1 at addr fff00000c91f017f by task kunit_try_catch/227
[   31.006153] 
[   31.006342] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   31.006442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.006470] Hardware name: linux,dummy-virt (DT)
[   31.006530] Call trace:
[   31.006666]  show_stack+0x20/0x38 (C)
[   31.006874]  dump_stack_lvl+0x8c/0xd0
[   31.006946]  print_report+0x118/0x608
[   31.007029]  kasan_report+0xdc/0x128
[   31.007097]  __asan_report_load1_noabort+0x20/0x30
[   31.007164]  ksize_unpoisons_memory+0x690/0x740
[   31.007270]  kunit_try_run_case+0x170/0x3f0
[   31.007321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.007539]  kthread+0x328/0x630
[   31.007719]  ret_from_fork+0x10/0x20
[   31.007873] 
[   31.007986] Allocated by task 227:
[   31.008047]  kasan_save_stack+0x3c/0x68
[   31.008117]  kasan_save_track+0x20/0x40
[   31.008189]  kasan_save_alloc_info+0x40/0x58
[   31.008438]  __kasan_kmalloc+0xd4/0xd8
[   31.008486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.008689]  ksize_unpoisons_memory+0xc0/0x740
[   31.008771]  kunit_try_run_case+0x170/0x3f0
[   31.008861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.009006]  kthread+0x328/0x630
[   31.009055]  ret_from_fork+0x10/0x20
[   31.009207] 
[   31.009275] The buggy address belongs to the object at fff00000c91f0100
[   31.009275]  which belongs to the cache kmalloc-128 of size 128
[   31.009397] The buggy address is located 12 bytes to the right of
[   31.009397]  allocated 115-byte region [fff00000c91f0100, fff00000c91f0173)
[   31.009787] 
[   31.009918] The buggy address belongs to the physical page:
[   31.009998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0
[   31.010133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.010222] page_type: f5(slab)
[   31.010297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.010442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.010514] page dumped because: kasan: bad access detected
[   31.010546] 
[   31.010810] Memory state around the buggy address:
[   31.010867]  fff00000c91f0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.010985]  fff00000c91f0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.011082] >fff00000c91f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.011150]                                                                 ^
[   31.011198]  fff00000c91f0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.011243]  fff00000c91f0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.011283] ==================================================================

[   32.732274] ==================================================================
[   32.732325] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   32.732687] Read of size 1 at addr fff00000c63fbc78 by task kunit_try_catch/225
[   32.732776] 
[   32.732815] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.732992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.733062] Hardware name: linux,dummy-virt (DT)
[   32.733139] Call trace:
[   32.733247]  show_stack+0x20/0x38 (C)
[   32.733335]  dump_stack_lvl+0x8c/0xd0
[   32.733431]  print_report+0x118/0x608
[   32.733584]  kasan_report+0xdc/0x128
[   32.733667]  __asan_report_load1_noabort+0x20/0x30
[   32.733754]  ksize_unpoisons_memory+0x618/0x740
[   32.733822]  kunit_try_run_case+0x170/0x3f0
[   32.733890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.734287]  kthread+0x328/0x630
[   32.734364]  ret_from_fork+0x10/0x20
[   32.734512] 
[   32.734561] Allocated by task 225:
[   32.734626]  kasan_save_stack+0x3c/0x68
[   32.734762]  kasan_save_track+0x20/0x40
[   32.734830]  kasan_save_alloc_info+0x40/0x58
[   32.734916]  __kasan_kmalloc+0xd4/0xd8
[   32.735028]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.735068]  ksize_unpoisons_memory+0xc0/0x740
[   32.735126]  kunit_try_run_case+0x170/0x3f0
[   32.735200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.735432]  kthread+0x328/0x630
[   32.735584]  ret_from_fork+0x10/0x20
[   32.735652] 
[   32.735741] The buggy address belongs to the object at fff00000c63fbc00
[   32.735741]  which belongs to the cache kmalloc-128 of size 128
[   32.735847] The buggy address is located 5 bytes to the right of
[   32.735847]  allocated 115-byte region [fff00000c63fbc00, fff00000c63fbc73)
[   32.735923] 
[   32.735943] The buggy address belongs to the physical page:
[   32.735975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   32.736303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.736453] page_type: f5(slab)
[   32.736531] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.736604] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.736657] page dumped because: kasan: bad access detected
[   32.736702] 
[   32.736734] Memory state around the buggy address:
[   32.736766]  fff00000c63fbb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.736825]  fff00000c63fbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.736868] >fff00000c63fbc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.736907]                                                                 ^
[   32.736971]  fff00000c63fbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.737019]  fff00000c63fbd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.737058] ==================================================================
[   32.737707] ==================================================================
[   32.737774] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   32.737856] Read of size 1 at addr fff00000c63fbc7f by task kunit_try_catch/225
[   32.737923] 
[   32.737959] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.738046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.738908] Hardware name: linux,dummy-virt (DT)
[   32.738954] Call trace:
[   32.738978]  show_stack+0x20/0x38 (C)
[   32.739029]  dump_stack_lvl+0x8c/0xd0
[   32.739102]  print_report+0x118/0x608
[   32.739181]  kasan_report+0xdc/0x128
[   32.739230]  __asan_report_load1_noabort+0x20/0x30
[   32.739279]  ksize_unpoisons_memory+0x690/0x740
[   32.739327]  kunit_try_run_case+0x170/0x3f0
[   32.739376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.739431]  kthread+0x328/0x630
[   32.739849]  ret_from_fork+0x10/0x20
[   32.739900] 
[   32.739920] Allocated by task 225:
[   32.739951]  kasan_save_stack+0x3c/0x68
[   32.739993]  kasan_save_track+0x20/0x40
[   32.740033]  kasan_save_alloc_info+0x40/0x58
[   32.740068]  __kasan_kmalloc+0xd4/0xd8
[   32.740105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.740145]  ksize_unpoisons_memory+0xc0/0x740
[   32.740198]  kunit_try_run_case+0x170/0x3f0
[   32.740237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.740282]  kthread+0x328/0x630
[   32.740317]  ret_from_fork+0x10/0x20
[   32.740353] 
[   32.740371] The buggy address belongs to the object at fff00000c63fbc00
[   32.740371]  which belongs to the cache kmalloc-128 of size 128
[   32.740430] The buggy address is located 12 bytes to the right of
[   32.740430]  allocated 115-byte region [fff00000c63fbc00, fff00000c63fbc73)
[   32.740496] 
[   32.740517] The buggy address belongs to the physical page:
[   32.740548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   32.740601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.740648] page_type: f5(slab)
[   32.740685] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.740735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.740776] page dumped because: kasan: bad access detected
[   32.740808] 
[   32.740825] Memory state around the buggy address:
[   32.740856]  fff00000c63fbb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.740899]  fff00000c63fbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.740942] >fff00000c63fbc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.740980]                                                                 ^
[   32.741020]  fff00000c63fbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.741063]  fff00000c63fbd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.741102] ==================================================================
[   32.727785] ==================================================================
[   32.727846] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   32.728061] Read of size 1 at addr fff00000c63fbc73 by task kunit_try_catch/225
[   32.728298] 
[   32.728355] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.728514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.728558] Hardware name: linux,dummy-virt (DT)
[   32.728610] Call trace:
[   32.728644]  show_stack+0x20/0x38 (C)
[   32.728733]  dump_stack_lvl+0x8c/0xd0
[   32.728789]  print_report+0x118/0x608
[   32.728845]  kasan_report+0xdc/0x128
[   32.728897]  __asan_report_load1_noabort+0x20/0x30
[   32.728985]  ksize_unpoisons_memory+0x628/0x740
[   32.729040]  kunit_try_run_case+0x170/0x3f0
[   32.729096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.729151]  kthread+0x328/0x630
[   32.729332]  ret_from_fork+0x10/0x20
[   32.729382] 
[   32.729400] Allocated by task 225:
[   32.729547]  kasan_save_stack+0x3c/0x68
[   32.729600]  kasan_save_track+0x20/0x40
[   32.729675]  kasan_save_alloc_info+0x40/0x58
[   32.729732]  __kasan_kmalloc+0xd4/0xd8
[   32.729769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.729821]  ksize_unpoisons_memory+0xc0/0x740
[   32.729919]  kunit_try_run_case+0x170/0x3f0
[   32.729977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.730021]  kthread+0x328/0x630
[   32.730076]  ret_from_fork+0x10/0x20
[   32.730111] 
[   32.730182] The buggy address belongs to the object at fff00000c63fbc00
[   32.730182]  which belongs to the cache kmalloc-128 of size 128
[   32.730259] The buggy address is located 0 bytes to the right of
[   32.730259]  allocated 115-byte region [fff00000c63fbc00, fff00000c63fbc73)
[   32.730325] 
[   32.730346] The buggy address belongs to the physical page:
[   32.730378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   32.730508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.730652] page_type: f5(slab)
[   32.730697] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.730795] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.730880] page dumped because: kasan: bad access detected
[   32.730915] 
[   32.730973] Memory state around the buggy address:
[   32.731008]  fff00000c63fbb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.731050]  fff00000c63fbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.731192] >fff00000c63fbc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.731233]                                                              ^
[   32.731299]  fff00000c63fbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.731343]  fff00000c63fbd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.731405] ==================================================================

[   23.482139] ==================================================================
[   23.482569] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   23.483014] Read of size 1 at addr ffff88810495057f by task kunit_try_catch/242
[   23.483359] 
[   23.483456] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.483518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.483545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.483564] Call Trace:
[   23.483592]  <TASK>
[   23.483606]  dump_stack_lvl+0x73/0xb0
[   23.483633]  print_report+0xd1/0x650
[   23.483668]  ? __virt_addr_valid+0x1db/0x2d0
[   23.483703]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.483725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.483763]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.483799]  kasan_report+0x141/0x180
[   23.483821]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.483878]  __asan_report_load1_noabort+0x18/0x20
[   23.483903]  ksize_unpoisons_memory+0x7b6/0x9b0
[   23.483926]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.483998]  ? finish_task_switch.isra.0+0x153/0x700
[   23.484023]  ? __switch_to+0x47/0xf50
[   23.484048]  ? __schedule+0x10cc/0x2b60
[   23.484069]  ? __pfx_read_tsc+0x10/0x10
[   23.484090]  ? ktime_get_ts64+0x86/0x230
[   23.484113]  kunit_try_run_case+0x1a5/0x480
[   23.484137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.484160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.484181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.484202]  ? __kthread_parkme+0x82/0x180
[   23.484222]  ? preempt_count_sub+0x50/0x80
[   23.484243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.484289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.484331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.484356]  kthread+0x337/0x6f0
[   23.484386]  ? trace_preempt_on+0x20/0xc0
[   23.484408]  ? __pfx_kthread+0x10/0x10
[   23.484428]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.484451]  ? calculate_sigpending+0x7b/0xa0
[   23.484474]  ? __pfx_kthread+0x10/0x10
[   23.484502]  ret_from_fork+0x116/0x1d0
[   23.484520]  ? __pfx_kthread+0x10/0x10
[   23.484568]  ret_from_fork_asm+0x1a/0x30
[   23.484598]  </TASK>
[   23.484609] 
[   23.494254] Allocated by task 242:
[   23.494472]  kasan_save_stack+0x45/0x70
[   23.494668]  kasan_save_track+0x18/0x40
[   23.494918]  kasan_save_alloc_info+0x3b/0x50
[   23.495129]  __kasan_kmalloc+0xb7/0xc0
[   23.495279]  __kmalloc_cache_noprof+0x189/0x420
[   23.495437]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.495731]  kunit_try_run_case+0x1a5/0x480
[   23.496023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.496183]  kthread+0x337/0x6f0
[   23.496293]  ret_from_fork+0x116/0x1d0
[   23.496785]  ret_from_fork_asm+0x1a/0x30
[   23.496990] 
[   23.497079] The buggy address belongs to the object at ffff888104950500
[   23.497079]  which belongs to the cache kmalloc-128 of size 128
[   23.497670] The buggy address is located 12 bytes to the right of
[   23.497670]  allocated 115-byte region [ffff888104950500, ffff888104950573)
[   23.498067] 
[   23.498131] The buggy address belongs to the physical page:
[   23.498291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950
[   23.498986] flags: 0x200000000000000(node=0|zone=2)
[   23.499503] page_type: f5(slab)
[   23.499758] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.500122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.500518] page dumped because: kasan: bad access detected
[   23.500848] 
[   23.500940] Memory state around the buggy address:
[   23.501182]  ffff888104950400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.501465]  ffff888104950480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.501867] >ffff888104950500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.502064]                                                                 ^
[   23.502258]  ffff888104950580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.502912]  ffff888104950600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.503225] ==================================================================
[   23.460515] ==================================================================
[   23.461122] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   23.461372] Read of size 1 at addr ffff888104950578 by task kunit_try_catch/242
[   23.461863] 
[   23.462048] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.462117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.462131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.462176] Call Trace:
[   23.462190]  <TASK>
[   23.462205]  dump_stack_lvl+0x73/0xb0
[   23.462247]  print_report+0xd1/0x650
[   23.462270]  ? __virt_addr_valid+0x1db/0x2d0
[   23.462292]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.462324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.462348]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.462372]  kasan_report+0x141/0x180
[   23.462394]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.462421]  __asan_report_load1_noabort+0x18/0x20
[   23.462445]  ksize_unpoisons_memory+0x7e9/0x9b0
[   23.462468]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.462499]  ? finish_task_switch.isra.0+0x153/0x700
[   23.462522]  ? __switch_to+0x47/0xf50
[   23.462547]  ? __schedule+0x10cc/0x2b60
[   23.462568]  ? __pfx_read_tsc+0x10/0x10
[   23.462606]  ? ktime_get_ts64+0x86/0x230
[   23.462630]  kunit_try_run_case+0x1a5/0x480
[   23.462667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.462691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.462712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.462734]  ? __kthread_parkme+0x82/0x180
[   23.462773]  ? preempt_count_sub+0x50/0x80
[   23.462795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.462888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.462915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.462939]  kthread+0x337/0x6f0
[   23.462959]  ? trace_preempt_on+0x20/0xc0
[   23.462981]  ? __pfx_kthread+0x10/0x10
[   23.463001]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.463024]  ? calculate_sigpending+0x7b/0xa0
[   23.463047]  ? __pfx_kthread+0x10/0x10
[   23.463068]  ret_from_fork+0x116/0x1d0
[   23.463086]  ? __pfx_kthread+0x10/0x10
[   23.463106]  ret_from_fork_asm+0x1a/0x30
[   23.463136]  </TASK>
[   23.463147] 
[   23.472431] Allocated by task 242:
[   23.472613]  kasan_save_stack+0x45/0x70
[   23.472748]  kasan_save_track+0x18/0x40
[   23.472875]  kasan_save_alloc_info+0x3b/0x50
[   23.473213]  __kasan_kmalloc+0xb7/0xc0
[   23.473443]  __kmalloc_cache_noprof+0x189/0x420
[   23.473941]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.474162]  kunit_try_run_case+0x1a5/0x480
[   23.474383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.474652]  kthread+0x337/0x6f0
[   23.474888]  ret_from_fork+0x116/0x1d0
[   23.475079]  ret_from_fork_asm+0x1a/0x30
[   23.475209] 
[   23.475276] The buggy address belongs to the object at ffff888104950500
[   23.475276]  which belongs to the cache kmalloc-128 of size 128
[   23.476101] The buggy address is located 5 bytes to the right of
[   23.476101]  allocated 115-byte region [ffff888104950500, ffff888104950573)
[   23.476665] 
[   23.476869] The buggy address belongs to the physical page:
[   23.477064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950
[   23.477290] flags: 0x200000000000000(node=0|zone=2)
[   23.477693] page_type: f5(slab)
[   23.477882] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.478340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.478551] page dumped because: kasan: bad access detected
[   23.478708] 
[   23.478906] Memory state around the buggy address:
[   23.479198]  ffff888104950400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.479613]  ffff888104950480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.480100] >ffff888104950500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.480413]                                                                 ^
[   23.480625]  ffff888104950580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.480981]  ffff888104950600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.481518] ==================================================================
[   23.437954] ==================================================================
[   23.438482] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   23.438982] Read of size 1 at addr ffff888104950573 by task kunit_try_catch/242
[   23.439339] 
[   23.439464] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.439515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.439527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.439569] Call Trace:
[   23.439583]  <TASK>
[   23.439601]  dump_stack_lvl+0x73/0xb0
[   23.439643]  print_report+0xd1/0x650
[   23.439664]  ? __virt_addr_valid+0x1db/0x2d0
[   23.439825]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.439955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.439988]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.440011]  kasan_report+0x141/0x180
[   23.440033]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.440060]  __asan_report_load1_noabort+0x18/0x20
[   23.440083]  ksize_unpoisons_memory+0x81c/0x9b0
[   23.440106]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.440128]  ? finish_task_switch.isra.0+0x153/0x700
[   23.440150]  ? __switch_to+0x47/0xf50
[   23.440176]  ? __schedule+0x10cc/0x2b60
[   23.440197]  ? __pfx_read_tsc+0x10/0x10
[   23.440218]  ? ktime_get_ts64+0x86/0x230
[   23.440243]  kunit_try_run_case+0x1a5/0x480
[   23.440269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.440292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.440326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.440348]  ? __kthread_parkme+0x82/0x180
[   23.440367]  ? preempt_count_sub+0x50/0x80
[   23.440389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.440414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.440437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.440461]  kthread+0x337/0x6f0
[   23.440480]  ? trace_preempt_on+0x20/0xc0
[   23.440517]  ? __pfx_kthread+0x10/0x10
[   23.440538]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.440561]  ? calculate_sigpending+0x7b/0xa0
[   23.440584]  ? __pfx_kthread+0x10/0x10
[   23.440605]  ret_from_fork+0x116/0x1d0
[   23.440624]  ? __pfx_kthread+0x10/0x10
[   23.440644]  ret_from_fork_asm+0x1a/0x30
[   23.440690]  </TASK>
[   23.440702] 
[   23.449845] Allocated by task 242:
[   23.450060]  kasan_save_stack+0x45/0x70
[   23.450325]  kasan_save_track+0x18/0x40
[   23.450522]  kasan_save_alloc_info+0x3b/0x50
[   23.450788]  __kasan_kmalloc+0xb7/0xc0
[   23.451023]  __kmalloc_cache_noprof+0x189/0x420
[   23.451261]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.451509]  kunit_try_run_case+0x1a5/0x480
[   23.451790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.452071]  kthread+0x337/0x6f0
[   23.452234]  ret_from_fork+0x116/0x1d0
[   23.452462]  ret_from_fork_asm+0x1a/0x30
[   23.452786] 
[   23.452941] The buggy address belongs to the object at ffff888104950500
[   23.452941]  which belongs to the cache kmalloc-128 of size 128
[   23.454057] The buggy address is located 0 bytes to the right of
[   23.454057]  allocated 115-byte region [ffff888104950500, ffff888104950573)
[   23.454744] 
[   23.454950] The buggy address belongs to the physical page:
[   23.455172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950
[   23.455577] flags: 0x200000000000000(node=0|zone=2)
[   23.455878] page_type: f5(slab)
[   23.456090] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.456327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.456914] page dumped because: kasan: bad access detected
[   23.457243] 
[   23.457361] Memory state around the buggy address:
[   23.457545]  ffff888104950400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.457823]  ffff888104950480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.458289] >ffff888104950500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.458872]                                                              ^
[   23.459248]  ffff888104950580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.459518]  ffff888104950600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.460034] ==================================================================

[   23.769897] ==================================================================
[   23.770273] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   23.770510] Read of size 1 at addr ffff8881049c5c7f by task kunit_try_catch/243
[   23.770762] 
[   23.770877] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.770927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.770940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.770963] Call Trace:
[   23.770986]  <TASK>
[   23.771007]  dump_stack_lvl+0x73/0xb0
[   23.771035]  print_report+0xd1/0x650
[   23.771057]  ? __virt_addr_valid+0x1db/0x2d0
[   23.771097]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.771119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.771145]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.771168]  kasan_report+0x141/0x180
[   23.771190]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   23.771217]  __asan_report_load1_noabort+0x18/0x20
[   23.771240]  ksize_unpoisons_memory+0x7b6/0x9b0
[   23.771264]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.771287]  ? __kasan_check_write+0x18/0x20
[   23.771310]  ? queued_spin_lock_slowpath+0x116/0xb40
[   23.771331]  ? irqentry_exit+0x2a/0x60
[   23.771353]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.771375]  ? trace_hardirqs_on+0x37/0xe0
[   23.771399]  ? __pfx_read_tsc+0x10/0x10
[   23.771421]  ? ktime_get_ts64+0x86/0x230
[   23.771445]  kunit_try_run_case+0x1a5/0x480
[   23.771471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.771496]  ? queued_spin_lock_slowpath+0x116/0xb40
[   23.771517]  ? __kthread_parkme+0x82/0x180
[   23.771538]  ? preempt_count_sub+0x50/0x80
[   23.771561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.771586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.771609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.771633]  kthread+0x337/0x6f0
[   23.771652]  ? trace_preempt_on+0x20/0xc0
[   23.771674]  ? __pfx_kthread+0x10/0x10
[   23.771694]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.771718]  ? calculate_sigpending+0x7b/0xa0
[   23.771742]  ? __pfx_kthread+0x10/0x10
[   23.771763]  ret_from_fork+0x116/0x1d0
[   23.771782]  ? __pfx_kthread+0x10/0x10
[   23.771803]  ret_from_fork_asm+0x1a/0x30
[   23.771833]  </TASK>
[   23.771845] 
[   23.779644] Allocated by task 243:
[   23.779808]  kasan_save_stack+0x45/0x70
[   23.780110]  kasan_save_track+0x18/0x40
[   23.780740]  kasan_save_alloc_info+0x3b/0x50
[   23.780909]  __kasan_kmalloc+0xb7/0xc0
[   23.781032]  __kmalloc_cache_noprof+0x189/0x420
[   23.781531]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.781741]  kunit_try_run_case+0x1a5/0x480
[   23.781941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.782207]  kthread+0x337/0x6f0
[   23.782346]  ret_from_fork+0x116/0x1d0
[   23.782477]  ret_from_fork_asm+0x1a/0x30
[   23.782617] 
[   23.782684] The buggy address belongs to the object at ffff8881049c5c00
[   23.782684]  which belongs to the cache kmalloc-128 of size 128
[   23.783532] The buggy address is located 12 bytes to the right of
[   23.783532]  allocated 115-byte region [ffff8881049c5c00, ffff8881049c5c73)
[   23.784013] 
[   23.784126] The buggy address belongs to the physical page:
[   23.785644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049c5
[   23.786014] flags: 0x200000000000000(node=0|zone=2)
[   23.786193] page_type: f5(slab)
[   23.786317] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.786573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.786793] page dumped because: kasan: bad access detected
[   23.787289] 
[   23.787393] Memory state around the buggy address:
[   23.787831]  ffff8881049c5b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.788628]  ffff8881049c5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.789092] >ffff8881049c5c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.789305]                                                                 ^
[   23.789513]  ffff8881049c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.789719]  ffff8881049c5d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.790168] ==================================================================
[   23.730534] ==================================================================
[   23.730972] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   23.731459] Read of size 1 at addr ffff8881049c5c73 by task kunit_try_catch/243
[   23.731782] 
[   23.731871] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.731924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.731937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.731959] Call Trace:
[   23.731974]  <TASK>
[   23.731994]  dump_stack_lvl+0x73/0xb0
[   23.732035]  print_report+0xd1/0x650
[   23.732058]  ? __virt_addr_valid+0x1db/0x2d0
[   23.732096]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.732119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.732144]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.732166]  kasan_report+0x141/0x180
[   23.732195]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   23.732221]  __asan_report_load1_noabort+0x18/0x20
[   23.732246]  ksize_unpoisons_memory+0x81c/0x9b0
[   23.732268]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.732292]  ? __kasan_check_write+0x18/0x20
[   23.732314]  ? queued_spin_lock_slowpath+0x116/0xb40
[   23.732335]  ? irqentry_exit+0x2a/0x60
[   23.732355]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.732377]  ? trace_hardirqs_on+0x37/0xe0
[   23.732401]  ? __pfx_read_tsc+0x10/0x10
[   23.732422]  ? ktime_get_ts64+0x86/0x230
[   23.732448]  kunit_try_run_case+0x1a5/0x480
[   23.732474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.732498]  ? queued_spin_lock_slowpath+0x116/0xb40
[   23.732519]  ? __kthread_parkme+0x82/0x180
[   23.732540]  ? preempt_count_sub+0x50/0x80
[   23.732563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.732587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.732611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.732634]  kthread+0x337/0x6f0
[   23.732653]  ? trace_preempt_on+0x20/0xc0
[   23.732674]  ? __pfx_kthread+0x10/0x10
[   23.732694]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.732718]  ? calculate_sigpending+0x7b/0xa0
[   23.732742]  ? __pfx_kthread+0x10/0x10
[   23.732763]  ret_from_fork+0x116/0x1d0
[   23.732781]  ? __pfx_kthread+0x10/0x10
[   23.732801]  ret_from_fork_asm+0x1a/0x30
[   23.732832]  </TASK>
[   23.732844] 
[   23.740779] Allocated by task 243:
[   23.740965]  kasan_save_stack+0x45/0x70
[   23.741156]  kasan_save_track+0x18/0x40
[   23.741410]  kasan_save_alloc_info+0x3b/0x50
[   23.741581]  __kasan_kmalloc+0xb7/0xc0
[   23.741762]  __kmalloc_cache_noprof+0x189/0x420
[   23.741980]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.742162]  kunit_try_run_case+0x1a5/0x480
[   23.742299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.742460]  kthread+0x337/0x6f0
[   23.742570]  ret_from_fork+0x116/0x1d0
[   23.742728]  ret_from_fork_asm+0x1a/0x30
[   23.742913] 
[   23.742999] The buggy address belongs to the object at ffff8881049c5c00
[   23.742999]  which belongs to the cache kmalloc-128 of size 128
[   23.743851] The buggy address is located 0 bytes to the right of
[   23.743851]  allocated 115-byte region [ffff8881049c5c00, ffff8881049c5c73)
[   23.744668] 
[   23.744768] The buggy address belongs to the physical page:
[   23.745033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049c5
[   23.745452] flags: 0x200000000000000(node=0|zone=2)
[   23.745667] page_type: f5(slab)
[   23.745826] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.746150] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.746418] page dumped because: kasan: bad access detected
[   23.746581] 
[   23.746682] Memory state around the buggy address:
[   23.746909]  ffff8881049c5b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.747594]  ffff8881049c5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.747835] >ffff8881049c5c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.748042]                                                              ^
[   23.748258]  ffff8881049c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.748573]  ffff8881049c5d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.748876] ==================================================================
[   23.750470] ==================================================================
[   23.750825] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   23.751193] Read of size 1 at addr ffff8881049c5c78 by task kunit_try_catch/243
[   23.751517] 
[   23.751976] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.752032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.752046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.752082] Call Trace:
[   23.752098]  <TASK>
[   23.752118]  dump_stack_lvl+0x73/0xb0
[   23.752150]  print_report+0xd1/0x650
[   23.752172]  ? __virt_addr_valid+0x1db/0x2d0
[   23.752196]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.752218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.752244]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.752266]  kasan_report+0x141/0x180
[   23.752287]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   23.752314]  __asan_report_load1_noabort+0x18/0x20
[   23.752425]  ksize_unpoisons_memory+0x7e9/0x9b0
[   23.752449]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   23.752472]  ? __kasan_check_write+0x18/0x20
[   23.752495]  ? queued_spin_lock_slowpath+0x116/0xb40
[   23.752517]  ? irqentry_exit+0x2a/0x60
[   23.752537]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.752559]  ? trace_hardirqs_on+0x37/0xe0
[   23.752583]  ? __pfx_read_tsc+0x10/0x10
[   23.752604]  ? ktime_get_ts64+0x86/0x230
[   23.752629]  kunit_try_run_case+0x1a5/0x480
[   23.752656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.752681]  ? queued_spin_lock_slowpath+0x116/0xb40
[   23.752701]  ? __kthread_parkme+0x82/0x180
[   23.752722]  ? preempt_count_sub+0x50/0x80
[   23.752745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.752769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.752793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.752816]  kthread+0x337/0x6f0
[   23.752835]  ? trace_preempt_on+0x20/0xc0
[   23.752857]  ? __pfx_kthread+0x10/0x10
[   23.752877]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.752900]  ? calculate_sigpending+0x7b/0xa0
[   23.752924]  ? __pfx_kthread+0x10/0x10
[   23.752954]  ret_from_fork+0x116/0x1d0
[   23.752973]  ? __pfx_kthread+0x10/0x10
[   23.752993]  ret_from_fork_asm+0x1a/0x30
[   23.753023]  </TASK>
[   23.753036] 
[   23.761023] Allocated by task 243:
[   23.761206]  kasan_save_stack+0x45/0x70
[   23.761382]  kasan_save_track+0x18/0x40
[   23.761572]  kasan_save_alloc_info+0x3b/0x50
[   23.761742]  __kasan_kmalloc+0xb7/0xc0
[   23.761930]  __kmalloc_cache_noprof+0x189/0x420
[   23.762426]  ksize_unpoisons_memory+0xc7/0x9b0
[   23.762585]  kunit_try_run_case+0x1a5/0x480
[   23.762729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.762900]  kthread+0x337/0x6f0
[   23.763016]  ret_from_fork+0x116/0x1d0
[   23.763161]  ret_from_fork_asm+0x1a/0x30
[   23.763356] 
[   23.763445] The buggy address belongs to the object at ffff8881049c5c00
[   23.763445]  which belongs to the cache kmalloc-128 of size 128
[   23.764074] The buggy address is located 5 bytes to the right of
[   23.764074]  allocated 115-byte region [ffff8881049c5c00, ffff8881049c5c73)
[   23.764492] 
[   23.764560] The buggy address belongs to the physical page:
[   23.764727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049c5
[   23.765344] flags: 0x200000000000000(node=0|zone=2)
[   23.765603] page_type: f5(slab)
[   23.765774] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.766324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.766624] page dumped because: kasan: bad access detected
[   23.766794] 
[   23.766860] Memory state around the buggy address:
[   23.767098]  ffff8881049c5b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.767419]  ffff8881049c5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.767907] >ffff8881049c5c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.768123]                                                                 ^
[   23.768332]  ffff8881049c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.768928]  ffff8881049c5d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.769258] ==================================================================