Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   29.189412] ==================================================================
[   29.196500] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.203874] Read of size 1 at addr ffff000800daca7f by task kunit_try_catch/243
[   29.211167] 
[   29.212651] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   29.212700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.212712] Hardware name: WinLink E850-96 board (DT)
[   29.212732] Call trace:
[   29.212746]  show_stack+0x20/0x38 (C)
[   29.212780]  dump_stack_lvl+0x8c/0xd0
[   29.212817]  print_report+0x118/0x608
[   29.212846]  kasan_report+0xdc/0x128
[   29.212875]  __asan_report_load1_noabort+0x20/0x30
[   29.212911]  ksize_unpoisons_memory+0x690/0x740
[   29.212945]  kunit_try_run_case+0x170/0x3f0
[   29.212980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.213017]  kthread+0x328/0x630
[   29.213050]  ret_from_fork+0x10/0x20
[   29.213085] 
[   29.275834] Allocated by task 243:
[   29.279224]  kasan_save_stack+0x3c/0x68
[   29.283039]  kasan_save_track+0x20/0x40
[   29.286858]  kasan_save_alloc_info+0x40/0x58
[   29.291112]  __kasan_kmalloc+0xd4/0xd8
[   29.294845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.299358]  ksize_unpoisons_memory+0xc0/0x740
[   29.303785]  kunit_try_run_case+0x170/0x3f0
[   29.307952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.313424]  kthread+0x328/0x630
[   29.316633]  ret_from_fork+0x10/0x20
[   29.320191] 
[   29.321667] The buggy address belongs to the object at ffff000800daca00
[   29.321667]  which belongs to the cache kmalloc-128 of size 128
[   29.334169] The buggy address is located 12 bytes to the right of
[   29.334169]  allocated 115-byte region [ffff000800daca00, ffff000800daca73)
[   29.347188] 
[   29.348664] The buggy address belongs to the physical page:
[   29.354222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.362206] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.369845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.376790] page_type: f5(slab)
[   29.379926] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.387645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.395372] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.403183] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.410996] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   29.418808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.426613] page dumped because: kasan: bad access detected
[   29.432169] 
[   29.433645] Memory state around the buggy address:
[   29.438426]  ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.445628]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.452834] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.460033]                                                                 ^
[   29.467155]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.474360]  ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.481561] ==================================================================
[   28.588260] ==================================================================
[   28.597987] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   28.605361] Read of size 1 at addr ffff000800daca73 by task kunit_try_catch/243
[   28.612650] 
[   28.614137] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   28.614193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.614209] Hardware name: WinLink E850-96 board (DT)
[   28.614231] Call trace:
[   28.614244]  show_stack+0x20/0x38 (C)
[   28.614283]  dump_stack_lvl+0x8c/0xd0
[   28.614321]  print_report+0x118/0x608
[   28.614350]  kasan_report+0xdc/0x128
[   28.614380]  __asan_report_load1_noabort+0x20/0x30
[   28.614417]  ksize_unpoisons_memory+0x628/0x740
[   28.614454]  kunit_try_run_case+0x170/0x3f0
[   28.614492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.614532]  kthread+0x328/0x630
[   28.614566]  ret_from_fork+0x10/0x20
[   28.614600] 
[   28.677321] Allocated by task 243:
[   28.680708]  kasan_save_stack+0x3c/0x68
[   28.684524]  kasan_save_track+0x20/0x40
[   28.688343]  kasan_save_alloc_info+0x40/0x58
[   28.692597]  __kasan_kmalloc+0xd4/0xd8
[   28.696329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.700844]  ksize_unpoisons_memory+0xc0/0x740
[   28.705270]  kunit_try_run_case+0x170/0x3f0
[   28.709437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.714907]  kthread+0x328/0x630
[   28.718117]  ret_from_fork+0x10/0x20
[   28.721676] 
[   28.723154] The buggy address belongs to the object at ffff000800daca00
[   28.723154]  which belongs to the cache kmalloc-128 of size 128
[   28.735655] The buggy address is located 0 bytes to the right of
[   28.735655]  allocated 115-byte region [ffff000800daca00, ffff000800daca73)
[   28.748586] 
[   28.750064] The buggy address belongs to the physical page:
[   28.755622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   28.763605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.771243] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.778187] page_type: f5(slab)
[   28.781325] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.789044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.796770] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.804581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.812394] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   28.820206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.828011] page dumped because: kasan: bad access detected
[   28.833567] 
[   28.835042] Memory state around the buggy address:
[   28.839826]  ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.847027]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.854232] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.861431]                                                              ^
[   28.868292]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.875498]  ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.882701] ==================================================================
[   28.890269] ==================================================================
[   28.897113] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   28.904487] Read of size 1 at addr ffff000800daca78 by task kunit_try_catch/243
[   28.911778] 
[   28.913262] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   28.913316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.913331] Hardware name: WinLink E850-96 board (DT)
[   28.913353] Call trace:
[   28.913367]  show_stack+0x20/0x38 (C)
[   28.913402]  dump_stack_lvl+0x8c/0xd0
[   28.913437]  print_report+0x118/0x608
[   28.913466]  kasan_report+0xdc/0x128
[   28.913497]  __asan_report_load1_noabort+0x20/0x30
[   28.913531]  ksize_unpoisons_memory+0x618/0x740
[   28.913566]  kunit_try_run_case+0x170/0x3f0
[   28.913603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.913639]  kthread+0x328/0x630
[   28.913676]  ret_from_fork+0x10/0x20
[   28.913710] 
[   28.976447] Allocated by task 243:
[   28.979836]  kasan_save_stack+0x3c/0x68
[   28.983651]  kasan_save_track+0x20/0x40
[   28.987471]  kasan_save_alloc_info+0x40/0x58
[   28.991724]  __kasan_kmalloc+0xd4/0xd8
[   28.995457]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.999971]  ksize_unpoisons_memory+0xc0/0x740
[   29.004398]  kunit_try_run_case+0x170/0x3f0
[   29.008564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.014035]  kthread+0x328/0x630
[   29.017245]  ret_from_fork+0x10/0x20
[   29.020804] 
[   29.022279] The buggy address belongs to the object at ffff000800daca00
[   29.022279]  which belongs to the cache kmalloc-128 of size 128
[   29.034779] The buggy address is located 5 bytes to the right of
[   29.034779]  allocated 115-byte region [ffff000800daca00, ffff000800daca73)
[   29.047713] 
[   29.049190] The buggy address belongs to the physical page:
[   29.054748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.062732] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.070371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.077315] page_type: f5(slab)
[   29.080451] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.088171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.095897] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.103708] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.111522] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   29.119333] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.127139] page dumped because: kasan: bad access detected
[   29.132693] 
[   29.134170] Memory state around the buggy address:
[   29.138952]  ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.146153]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.153359] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.160559]                                                                 ^
[   29.167681]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.174885]  ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.182086] ==================================================================

[   15.747736] ==================================================================
[   15.747795] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.748220] Read of size 1 at addr fff00000c637ab73 by task kunit_try_catch/199
[   15.748354] 
[   15.748388] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.748797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.748876] Hardware name: linux,dummy-virt (DT)
[   15.749034] Call trace:
[   15.749091]  show_stack+0x20/0x38 (C)
[   15.749217]  dump_stack_lvl+0x8c/0xd0
[   15.749270]  print_report+0x118/0x608
[   15.749571]  kasan_report+0xdc/0x128
[   15.749704]  __asan_report_load1_noabort+0x20/0x30
[   15.749762]  ksize_unpoisons_memory+0x628/0x740
[   15.750084]  kunit_try_run_case+0x170/0x3f0
[   15.750256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.750799]  kthread+0x328/0x630
[   15.751034]  ret_from_fork+0x10/0x20
[   15.751092] 
[   15.751110] Allocated by task 199:
[   15.751425]  kasan_save_stack+0x3c/0x68
[   15.751546]  kasan_save_track+0x20/0x40
[   15.751984]  kasan_save_alloc_info+0x40/0x58
[   15.752087]  __kasan_kmalloc+0xd4/0xd8
[   15.752175]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.752258]  ksize_unpoisons_memory+0xc0/0x740
[   15.752648]  kunit_try_run_case+0x170/0x3f0
[   15.752754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.752845]  kthread+0x328/0x630
[   15.752947]  ret_from_fork+0x10/0x20
[   15.752983] 
[   15.753394] The buggy address belongs to the object at fff00000c637ab00
[   15.753394]  which belongs to the cache kmalloc-128 of size 128
[   15.753553] The buggy address is located 0 bytes to the right of
[   15.753553]  allocated 115-byte region [fff00000c637ab00, fff00000c637ab73)
[   15.753928] 
[   15.753971] The buggy address belongs to the physical page:
[   15.754025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.754324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.754673] page_type: f5(slab)
[   15.754765] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.754865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.754944] page dumped because: kasan: bad access detected
[   15.755277] 
[   15.755406] Memory state around the buggy address:
[   15.755461]  fff00000c637aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.755722]  fff00000c637aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.756004] >fff00000c637ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.756265]                                                              ^
[   15.756640]  fff00000c637ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.756836]  fff00000c637ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.757120] ==================================================================
[   15.760100] ==================================================================
[   15.760396] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.760482] Read of size 1 at addr fff00000c637ab78 by task kunit_try_catch/199
[   15.760650] 
[   15.760739] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.760976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.761067] Hardware name: linux,dummy-virt (DT)
[   15.761163] Call trace:
[   15.761185]  show_stack+0x20/0x38 (C)
[   15.761262]  dump_stack_lvl+0x8c/0xd0
[   15.761505]  print_report+0x118/0x608
[   15.761811]  kasan_report+0xdc/0x128
[   15.761941]  __asan_report_load1_noabort+0x20/0x30
[   15.762174]  ksize_unpoisons_memory+0x618/0x740
[   15.762382]  kunit_try_run_case+0x170/0x3f0
[   15.762436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.762518]  kthread+0x328/0x630
[   15.762563]  ret_from_fork+0x10/0x20
[   15.762726] 
[   15.762749] Allocated by task 199:
[   15.762779]  kasan_save_stack+0x3c/0x68
[   15.762831]  kasan_save_track+0x20/0x40
[   15.762867]  kasan_save_alloc_info+0x40/0x58
[   15.762917]  __kasan_kmalloc+0xd4/0xd8
[   15.762950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.762985]  ksize_unpoisons_memory+0xc0/0x740
[   15.763033]  kunit_try_run_case+0x170/0x3f0
[   15.763081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.763135]  kthread+0x328/0x630
[   15.763170]  ret_from_fork+0x10/0x20
[   15.763204] 
[   15.763222] The buggy address belongs to the object at fff00000c637ab00
[   15.763222]  which belongs to the cache kmalloc-128 of size 128
[   15.763278] The buggy address is located 5 bytes to the right of
[   15.763278]  allocated 115-byte region [fff00000c637ab00, fff00000c637ab73)
[   15.763363] 
[   15.763383] The buggy address belongs to the physical page:
[   15.763422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.763474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.763522] page_type: f5(slab)
[   15.763569] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.763788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.763924] page dumped because: kasan: bad access detected
[   15.764398] 
[   15.764415] Memory state around the buggy address:
[   15.764449]  fff00000c637aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.764494]  fff00000c637aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.764706] >fff00000c637ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.764794]                                                                 ^
[   15.764997]  fff00000c637ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765060]  fff00000c637ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765230] ==================================================================
[   15.766130] ==================================================================
[   15.766179] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.766577] Read of size 1 at addr fff00000c637ab7f by task kunit_try_catch/199
[   15.766681] 
[   15.766742] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.766823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.766850] Hardware name: linux,dummy-virt (DT)
[   15.766944] Call trace:
[   15.767014]  show_stack+0x20/0x38 (C)
[   15.767066]  dump_stack_lvl+0x8c/0xd0
[   15.767359]  print_report+0x118/0x608
[   15.767421]  kasan_report+0xdc/0x128
[   15.767465]  __asan_report_load1_noabort+0x20/0x30
[   15.767656]  ksize_unpoisons_memory+0x690/0x740
[   15.767749]  kunit_try_run_case+0x170/0x3f0
[   15.767860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.768003]  kthread+0x328/0x630
[   15.768121]  ret_from_fork+0x10/0x20
[   15.768353] 
[   15.768374] Allocated by task 199:
[   15.768403]  kasan_save_stack+0x3c/0x68
[   15.768481]  kasan_save_track+0x20/0x40
[   15.768538]  kasan_save_alloc_info+0x40/0x58
[   15.768715]  __kasan_kmalloc+0xd4/0xd8
[   15.768860]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.768964]  ksize_unpoisons_memory+0xc0/0x740
[   15.769061]  kunit_try_run_case+0x170/0x3f0
[   15.769149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.769238]  kthread+0x328/0x630
[   15.769383]  ret_from_fork+0x10/0x20
[   15.769453] 
[   15.769479] The buggy address belongs to the object at fff00000c637ab00
[   15.769479]  which belongs to the cache kmalloc-128 of size 128
[   15.769793] The buggy address is located 12 bytes to the right of
[   15.769793]  allocated 115-byte region [fff00000c637ab00, fff00000c637ab73)
[   15.769933] 
[   15.770039] The buggy address belongs to the physical page:
[   15.770125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.770261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.770445] page_type: f5(slab)
[   15.770518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.770583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.770953] page dumped because: kasan: bad access detected
[   15.771049] 
[   15.771272] Memory state around the buggy address:
[   15.771453]  fff00000c637aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.771533]  fff00000c637aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.771607] >fff00000c637ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.771870]                                                                 ^
[   15.771951]  fff00000c637ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.772059]  fff00000c637ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.772186] ==================================================================

[   14.826978] ==================================================================
[   14.827280] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   14.827606] Read of size 1 at addr ffff8881029e5a78 by task kunit_try_catch/215
[   14.828231] 
[   14.828585] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   14.828683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.828709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.828775] Call Trace:
[   14.828822]  <TASK>
[   14.828865]  dump_stack_lvl+0x73/0xb0
[   14.828925]  print_report+0xd1/0x650
[   14.828974]  ? __virt_addr_valid+0x1db/0x2d0
[   14.829055]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.829105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.829154]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.829198]  kasan_report+0x141/0x180
[   14.829405]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   14.829468]  __asan_report_load1_noabort+0x18/0x20
[   14.829507]  ksize_unpoisons_memory+0x7e9/0x9b0
[   14.829552]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.829591]  ? finish_task_switch.isra.0+0x153/0x700
[   14.829640]  ? __switch_to+0x5d9/0xf60
[   14.829682]  ? dequeue_task_fair+0x166/0x4e0
[   14.829751]  ? __schedule+0x10cc/0x2b60
[   14.829800]  ? __pfx_read_tsc+0x10/0x10
[   14.829843]  ? ktime_get_ts64+0x86/0x230
[   14.829885]  kunit_try_run_case+0x1a5/0x480
[   14.829914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829937]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.829965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.829990]  ? __kthread_parkme+0x82/0x180
[   14.830018]  ? preempt_count_sub+0x50/0x80
[   14.830061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.830100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.830144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.830190]  kthread+0x337/0x6f0
[   14.830377]  ? trace_preempt_on+0x20/0xc0
[   14.830435]  ? __pfx_kthread+0x10/0x10
[   14.830476]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.830522]  ? calculate_sigpending+0x7b/0xa0
[   14.830595]  ? __pfx_kthread+0x10/0x10
[   14.830635]  ret_from_fork+0x41/0x80
[   14.830679]  ? __pfx_kthread+0x10/0x10
[   14.830713]  ret_from_fork_asm+0x1a/0x30
[   14.830765]  </TASK>
[   14.830780] 
[   14.843385] Allocated by task 215:
[   14.843744]  kasan_save_stack+0x45/0x70
[   14.844024]  kasan_save_track+0x18/0x40
[   14.844214]  kasan_save_alloc_info+0x3b/0x50
[   14.844428]  __kasan_kmalloc+0xb7/0xc0
[   14.844981]  __kmalloc_cache_noprof+0x189/0x420
[   14.845469]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.845864]  kunit_try_run_case+0x1a5/0x480
[   14.846412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.847466]  kthread+0x337/0x6f0
[   14.847671]  ret_from_fork+0x41/0x80
[   14.847860]  ret_from_fork_asm+0x1a/0x30
[   14.848300] 
[   14.848652] The buggy address belongs to the object at ffff8881029e5a00
[   14.848652]  which belongs to the cache kmalloc-128 of size 128
[   14.849573] The buggy address is located 5 bytes to the right of
[   14.849573]  allocated 115-byte region [ffff8881029e5a00, ffff8881029e5a73)
[   14.851039] 
[   14.851180] The buggy address belongs to the physical page:
[   14.851462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.852304] flags: 0x200000000000000(node=0|zone=2)
[   14.853281] page_type: f5(slab)
[   14.853485] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.854400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.854782] page dumped because: kasan: bad access detected
[   14.855657] 
[   14.855814] Memory state around the buggy address:
[   14.856046]  ffff8881029e5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.856933]  ffff8881029e5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.858073] >ffff8881029e5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.858671]                                                                 ^
[   14.859149]  ffff8881029e5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.859648]  ffff8881029e5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.860060] ==================================================================
[   14.792974] ==================================================================
[   14.793926] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   14.794956] Read of size 1 at addr ffff8881029e5a73 by task kunit_try_catch/215
[   14.795703] 
[   14.796164] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   14.796269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.796292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.796330] Call Trace:
[   14.796370]  <TASK>
[   14.796399]  dump_stack_lvl+0x73/0xb0
[   14.796439]  print_report+0xd1/0x650
[   14.796466]  ? __virt_addr_valid+0x1db/0x2d0
[   14.796493]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.796514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.796537]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.796558]  kasan_report+0x141/0x180
[   14.796582]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   14.796608]  __asan_report_load1_noabort+0x18/0x20
[   14.796630]  ksize_unpoisons_memory+0x81c/0x9b0
[   14.796651]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.796671]  ? finish_task_switch.isra.0+0x153/0x700
[   14.796697]  ? __switch_to+0x5d9/0xf60
[   14.796720]  ? dequeue_task_fair+0x166/0x4e0
[   14.796745]  ? __schedule+0x10cc/0x2b60
[   14.796769]  ? __pfx_read_tsc+0x10/0x10
[   14.796790]  ? ktime_get_ts64+0x86/0x230
[   14.796818]  kunit_try_run_case+0x1a5/0x480
[   14.796846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.796868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.796893]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.796917]  ? __kthread_parkme+0x82/0x180
[   14.796941]  ? preempt_count_sub+0x50/0x80
[   14.796966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.796989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.797023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.797052]  kthread+0x337/0x6f0
[   14.797088]  ? trace_preempt_on+0x20/0xc0
[   14.797116]  ? __pfx_kthread+0x10/0x10
[   14.797136]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.797159]  ? calculate_sigpending+0x7b/0xa0
[   14.797183]  ? __pfx_kthread+0x10/0x10
[   14.797207]  ret_from_fork+0x41/0x80
[   14.797244]  ? __pfx_kthread+0x10/0x10
[   14.797278]  ret_from_fork_asm+0x1a/0x30
[   14.797314]  </TASK>
[   14.797328] 
[   14.810638] Allocated by task 215:
[   14.810869]  kasan_save_stack+0x45/0x70
[   14.811814]  kasan_save_track+0x18/0x40
[   14.812152]  kasan_save_alloc_info+0x3b/0x50
[   14.812392]  __kasan_kmalloc+0xb7/0xc0
[   14.812712]  __kmalloc_cache_noprof+0x189/0x420
[   14.813324]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.813578]  kunit_try_run_case+0x1a5/0x480
[   14.813789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.814084]  kthread+0x337/0x6f0
[   14.814575]  ret_from_fork+0x41/0x80
[   14.814916]  ret_from_fork_asm+0x1a/0x30
[   14.815411] 
[   14.815721] The buggy address belongs to the object at ffff8881029e5a00
[   14.815721]  which belongs to the cache kmalloc-128 of size 128
[   14.817043] The buggy address is located 0 bytes to the right of
[   14.817043]  allocated 115-byte region [ffff8881029e5a00, ffff8881029e5a73)
[   14.818069] 
[   14.818227] The buggy address belongs to the physical page:
[   14.818636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.818941] flags: 0x200000000000000(node=0|zone=2)
[   14.819469] page_type: f5(slab)
[   14.819780] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.820379] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.820826] page dumped because: kasan: bad access detected
[   14.821068] 
[   14.821181] Memory state around the buggy address:
[   14.821616]  ffff8881029e5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.822482]  ffff8881029e5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.823035] >ffff8881029e5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.823774]                                                              ^
[   14.824136]  ffff8881029e5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824515]  ffff8881029e5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825681] ==================================================================
[   14.861416] ==================================================================
[   14.862390] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   14.862868] Read of size 1 at addr ffff8881029e5a7f by task kunit_try_catch/215
[   14.863771] 
[   14.864374] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   14.864445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.864460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.864484] Call Trace:
[   14.864511]  <TASK>
[   14.864540]  dump_stack_lvl+0x73/0xb0
[   14.864579]  print_report+0xd1/0x650
[   14.864605]  ? __virt_addr_valid+0x1db/0x2d0
[   14.864629]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.864650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.864673]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.864694]  kasan_report+0x141/0x180
[   14.864717]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   14.864743]  __asan_report_load1_noabort+0x18/0x20
[   14.864764]  ksize_unpoisons_memory+0x7b6/0x9b0
[   14.864786]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   14.864805]  ? finish_task_switch.isra.0+0x153/0x700
[   14.864829]  ? __switch_to+0x5d9/0xf60
[   14.864851]  ? dequeue_task_fair+0x166/0x4e0
[   14.864876]  ? __schedule+0x10cc/0x2b60
[   14.864899]  ? __pfx_read_tsc+0x10/0x10
[   14.864919]  ? ktime_get_ts64+0x86/0x230
[   14.864945]  kunit_try_run_case+0x1a5/0x480
[   14.864971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.864993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.865033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.865061]  ? __kthread_parkme+0x82/0x180
[   14.865096]  ? preempt_count_sub+0x50/0x80
[   14.865122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.865147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.865172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.865196]  kthread+0x337/0x6f0
[   14.865227]  ? trace_preempt_on+0x20/0xc0
[   14.865266]  ? __pfx_kthread+0x10/0x10
[   14.865297]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.865327]  ? calculate_sigpending+0x7b/0xa0
[   14.865369]  ? __pfx_kthread+0x10/0x10
[   14.865390]  ret_from_fork+0x41/0x80
[   14.865412]  ? __pfx_kthread+0x10/0x10
[   14.865431]  ret_from_fork_asm+0x1a/0x30
[   14.865464]  </TASK>
[   14.865477] 
[   14.879723] Allocated by task 215:
[   14.880223]  kasan_save_stack+0x45/0x70
[   14.880482]  kasan_save_track+0x18/0x40
[   14.881598]  kasan_save_alloc_info+0x3b/0x50
[   14.881869]  __kasan_kmalloc+0xb7/0xc0
[   14.882044]  __kmalloc_cache_noprof+0x189/0x420
[   14.882577]  ksize_unpoisons_memory+0xc7/0x9b0
[   14.883234]  kunit_try_run_case+0x1a5/0x480
[   14.883494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.883784]  kthread+0x337/0x6f0
[   14.883972]  ret_from_fork+0x41/0x80
[   14.884806]  ret_from_fork_asm+0x1a/0x30
[   14.885020] 
[   14.885377] The buggy address belongs to the object at ffff8881029e5a00
[   14.885377]  which belongs to the cache kmalloc-128 of size 128
[   14.886536] The buggy address is located 12 bytes to the right of
[   14.886536]  allocated 115-byte region [ffff8881029e5a00, ffff8881029e5a73)
[   14.887866] 
[   14.888169] The buggy address belongs to the physical page:
[   14.888416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.889305] flags: 0x200000000000000(node=0|zone=2)
[   14.889713] page_type: f5(slab)
[   14.889937] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.890904] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.891806] page dumped because: kasan: bad access detected
[   14.892009] 
[   14.892110] Memory state around the buggy address:
[   14.893048]  ffff8881029e5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.893592]  ffff8881029e5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.893963] >ffff8881029e5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.894580]                                                                 ^
[   14.895089]  ffff8881029e5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.895629]  ffff8881029e5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.896378] ==================================================================