Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.263162] ==================================================================
[   17.263392] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.264002] Read of size 1 at addr fff00000c789247f by task kunit_try_catch/194
[   17.264117] 
[   17.264275] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.264429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.264507] Hardware name: linux,dummy-virt (DT)
[   17.264583] Call trace:
[   17.264606]  show_stack+0x20/0x38 (C)
[   17.264860]  dump_stack_lvl+0x8c/0xd0
[   17.265320]  print_report+0x118/0x5d0
[   17.265454]  kasan_report+0xdc/0x128
[   17.265598]  __asan_report_load1_noabort+0x20/0x30
[   17.265654]  ksize_unpoisons_memory+0x690/0x740
[   17.265715]  kunit_try_run_case+0x170/0x3f0
[   17.266129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.266211]  kthread+0x328/0x630
[   17.266329]  ret_from_fork+0x10/0x20
[   17.266407] 
[   17.266426] Allocated by task 194:
[   17.266497]  kasan_save_stack+0x3c/0x68
[   17.266540]  kasan_save_track+0x20/0x40
[   17.266577]  kasan_save_alloc_info+0x40/0x58
[   17.266618]  __kasan_kmalloc+0xd4/0xd8
[   17.266656]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.266703]  ksize_unpoisons_memory+0xc0/0x740
[   17.266760]  kunit_try_run_case+0x170/0x3f0
[   17.266807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.266876]  kthread+0x328/0x630
[   17.266909]  ret_from_fork+0x10/0x20
[   17.266953] 
[   17.266973] The buggy address belongs to the object at fff00000c7892400
[   17.266973]  which belongs to the cache kmalloc-128 of size 128
[   17.267031] The buggy address is located 12 bytes to the right of
[   17.267031]  allocated 115-byte region [fff00000c7892400, fff00000c7892473)
[   17.267106] 
[   17.267130] The buggy address belongs to the physical page:
[   17.267188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.267262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.267344] page_type: f5(slab)
[   17.267588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.267647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.267688] page dumped because: kasan: bad access detected
[   17.267720] 
[   17.267738] Memory state around the buggy address:
[   17.268161]  fff00000c7892300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.268711]  fff00000c7892380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.268781] >fff00000c7892400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.268988]                                                                 ^
[   17.269076]  fff00000c7892480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.269291]  fff00000c7892500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.269391] ==================================================================
[   17.252968] ==================================================================
[   17.253562] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.253746] Read of size 1 at addr fff00000c7892478 by task kunit_try_catch/194
[   17.253818] 
[   17.254024] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.254271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.254352] Hardware name: linux,dummy-virt (DT)
[   17.254388] Call trace:
[   17.254410]  show_stack+0x20/0x38 (C)
[   17.254463]  dump_stack_lvl+0x8c/0xd0
[   17.254814]  print_report+0x118/0x5d0
[   17.254893]  kasan_report+0xdc/0x128
[   17.255134]  __asan_report_load1_noabort+0x20/0x30
[   17.255232]  ksize_unpoisons_memory+0x618/0x740
[   17.255731]  kunit_try_run_case+0x170/0x3f0
[   17.255891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.256007]  kthread+0x328/0x630
[   17.256119]  ret_from_fork+0x10/0x20
[   17.256216] 
[   17.256234] Allocated by task 194:
[   17.256591]  kasan_save_stack+0x3c/0x68
[   17.257016]  kasan_save_track+0x20/0x40
[   17.257111]  kasan_save_alloc_info+0x40/0x58
[   17.257156]  __kasan_kmalloc+0xd4/0xd8
[   17.257398]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.257669]  ksize_unpoisons_memory+0xc0/0x740
[   17.257830]  kunit_try_run_case+0x170/0x3f0
[   17.258012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.258312]  kthread+0x328/0x630
[   17.258561]  ret_from_fork+0x10/0x20
[   17.258688] 
[   17.258778] The buggy address belongs to the object at fff00000c7892400
[   17.258778]  which belongs to the cache kmalloc-128 of size 128
[   17.258978] The buggy address is located 5 bytes to the right of
[   17.258978]  allocated 115-byte region [fff00000c7892400, fff00000c7892473)
[   17.259335] 
[   17.259444] The buggy address belongs to the physical page:
[   17.259571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.259710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.259826] page_type: f5(slab)
[   17.260038] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.260098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.260321] page dumped because: kasan: bad access detected
[   17.260621] 
[   17.260711] Memory state around the buggy address:
[   17.260813]  fff00000c7892300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.260943]  fff00000c7892380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.261062] >fff00000c7892400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.261128]                                                                 ^
[   17.261172]  fff00000c7892480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.261548]  fff00000c7892500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.261609] ==================================================================
[   17.244514] ==================================================================
[   17.244915] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.245101] Read of size 1 at addr fff00000c7892473 by task kunit_try_catch/194
[   17.245168] 
[   17.245397] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.245617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.245755] Hardware name: linux,dummy-virt (DT)
[   17.245873] Call trace:
[   17.245933]  show_stack+0x20/0x38 (C)
[   17.246052]  dump_stack_lvl+0x8c/0xd0
[   17.246538]  print_report+0x118/0x5d0
[   17.246725]  kasan_report+0xdc/0x128
[   17.246822]  __asan_report_load1_noabort+0x20/0x30
[   17.246969]  ksize_unpoisons_memory+0x628/0x740
[   17.247242]  kunit_try_run_case+0x170/0x3f0
[   17.247932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.248357]  kthread+0x328/0x630
[   17.248425]  ret_from_fork+0x10/0x20
[   17.248477] 
[   17.248497] Allocated by task 194:
[   17.248536]  kasan_save_stack+0x3c/0x68
[   17.248591]  kasan_save_track+0x20/0x40
[   17.248656]  kasan_save_alloc_info+0x40/0x58
[   17.248706]  __kasan_kmalloc+0xd4/0xd8
[   17.248752]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.248794]  ksize_unpoisons_memory+0xc0/0x740
[   17.248832]  kunit_try_run_case+0x170/0x3f0
[   17.248880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.248924]  kthread+0x328/0x630
[   17.248955]  ret_from_fork+0x10/0x20
[   17.248992] 
[   17.249011] The buggy address belongs to the object at fff00000c7892400
[   17.249011]  which belongs to the cache kmalloc-128 of size 128
[   17.249110] The buggy address is located 0 bytes to the right of
[   17.249110]  allocated 115-byte region [fff00000c7892400, fff00000c7892473)
[   17.249176] 
[   17.249205] The buggy address belongs to the physical page:
[   17.249238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.249312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.249380] page_type: f5(slab)
[   17.249422] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.249490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.249540] page dumped because: kasan: bad access detected
[   17.249571] 
[   17.249589] Memory state around the buggy address:
[   17.249626]  fff00000c7892300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.249686]  fff00000c7892380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.249729] >fff00000c7892400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.249767]                                                              ^
[   17.249816]  fff00000c7892480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.250321]  fff00000c7892500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.250568] ==================================================================

[   16.848351] ==================================================================
[   16.848550] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.848611] Read of size 1 at addr fff00000c5b7dd73 by task kunit_try_catch/194
[   16.848663] 
[   16.848706] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.849027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.849249] Hardware name: linux,dummy-virt (DT)
[   16.849286] Call trace:
[   16.849509]  show_stack+0x20/0x38 (C)
[   16.849671]  dump_stack_lvl+0x8c/0xd0
[   16.849808]  print_report+0x118/0x5d0
[   16.850066]  kasan_report+0xdc/0x128
[   16.850277]  __asan_report_load1_noabort+0x20/0x30
[   16.850343]  ksize_unpoisons_memory+0x628/0x740
[   16.850638]  kunit_try_run_case+0x170/0x3f0
[   16.850847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.850995]  kthread+0x328/0x630
[   16.851041]  ret_from_fork+0x10/0x20
[   16.851416] 
[   16.851459] Allocated by task 194:
[   16.851559]  kasan_save_stack+0x3c/0x68
[   16.851662]  kasan_save_track+0x20/0x40
[   16.851701]  kasan_save_alloc_info+0x40/0x58
[   16.852008]  __kasan_kmalloc+0xd4/0xd8
[   16.852076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.852465]  ksize_unpoisons_memory+0xc0/0x740
[   16.852547]  kunit_try_run_case+0x170/0x3f0
[   16.852593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.852665]  kthread+0x328/0x630
[   16.852979]  ret_from_fork+0x10/0x20
[   16.853062] 
[   16.853189] The buggy address belongs to the object at fff00000c5b7dd00
[   16.853189]  which belongs to the cache kmalloc-128 of size 128
[   16.853366] The buggy address is located 0 bytes to the right of
[   16.853366]  allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73)
[   16.853484] 
[   16.853506] The buggy address belongs to the physical page:
[   16.853839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.854091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.854264] page_type: f5(slab)
[   16.854331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.854465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.854507] page dumped because: kasan: bad access detected
[   16.854563] 
[   16.854851] Memory state around the buggy address:
[   16.854912]  fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.854967]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855181] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.855555]                                                              ^
[   16.855632]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855968]  fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856050] ==================================================================
[   16.866971] ==================================================================
[   16.867025] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.867422] Read of size 1 at addr fff00000c5b7dd7f by task kunit_try_catch/194
[   16.867491] 
[   16.867545] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.867701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.867789] Hardware name: linux,dummy-virt (DT)
[   16.867898] Call trace:
[   16.867925]  show_stack+0x20/0x38 (C)
[   16.868173]  dump_stack_lvl+0x8c/0xd0
[   16.868622]  print_report+0x118/0x5d0
[   16.868731]  kasan_report+0xdc/0x128
[   16.868917]  __asan_report_load1_noabort+0x20/0x30
[   16.869105]  ksize_unpoisons_memory+0x690/0x740
[   16.869230]  kunit_try_run_case+0x170/0x3f0
[   16.869336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.869442]  kthread+0x328/0x630
[   16.869777]  ret_from_fork+0x10/0x20
[   16.869921] 
[   16.870011] Allocated by task 194:
[   16.870078]  kasan_save_stack+0x3c/0x68
[   16.870182]  kasan_save_track+0x20/0x40
[   16.870279]  kasan_save_alloc_info+0x40/0x58
[   16.870414]  __kasan_kmalloc+0xd4/0xd8
[   16.870493]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.870558]  ksize_unpoisons_memory+0xc0/0x740
[   16.870891]  kunit_try_run_case+0x170/0x3f0
[   16.870964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.871063]  kthread+0x328/0x630
[   16.871244]  ret_from_fork+0x10/0x20
[   16.871448] 
[   16.871528] The buggy address belongs to the object at fff00000c5b7dd00
[   16.871528]  which belongs to the cache kmalloc-128 of size 128
[   16.871881] The buggy address is located 12 bytes to the right of
[   16.871881]  allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73)
[   16.871989] 
[   16.872075] The buggy address belongs to the physical page:
[   16.872158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.872253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.872403] page_type: f5(slab)
[   16.872532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.872866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.873136] page dumped because: kasan: bad access detected
[   16.873259] 
[   16.873330] Memory state around the buggy address:
[   16.873389]  fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.873454]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.873640] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.873705]                                                                 ^
[   16.874050]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.874133]  fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.874211] ==================================================================
[   16.858259] ==================================================================
[   16.858312] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.858387] Read of size 1 at addr fff00000c5b7dd78 by task kunit_try_catch/194
[   16.858456] 
[   16.858488] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.858570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.858596] Hardware name: linux,dummy-virt (DT)
[   16.858647] Call trace:
[   16.858681]  show_stack+0x20/0x38 (C)
[   16.858731]  dump_stack_lvl+0x8c/0xd0
[   16.858778]  print_report+0x118/0x5d0
[   16.858825]  kasan_report+0xdc/0x128
[   16.858870]  __asan_report_load1_noabort+0x20/0x30
[   16.858931]  ksize_unpoisons_memory+0x618/0x740
[   16.858986]  kunit_try_run_case+0x170/0x3f0
[   16.859037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.859091]  kthread+0x328/0x630
[   16.859132]  ret_from_fork+0x10/0x20
[   16.859179] 
[   16.859199] Allocated by task 194:
[   16.859228]  kasan_save_stack+0x3c/0x68
[   16.859277]  kasan_save_track+0x20/0x40
[   16.859315]  kasan_save_alloc_info+0x40/0x58
[   16.859814]  __kasan_kmalloc+0xd4/0xd8
[   16.860130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.860768]  ksize_unpoisons_memory+0xc0/0x740
[   16.860850]  kunit_try_run_case+0x170/0x3f0
[   16.860922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.861088]  kthread+0x328/0x630
[   16.861615]  ret_from_fork+0x10/0x20
[   16.861697] 
[   16.861744] The buggy address belongs to the object at fff00000c5b7dd00
[   16.861744]  which belongs to the cache kmalloc-128 of size 128
[   16.861841] The buggy address is located 5 bytes to the right of
[   16.861841]  allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73)
[   16.861999] 
[   16.862069] The buggy address belongs to the physical page:
[   16.862099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.862215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.862582] page_type: f5(slab)
[   16.862670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.862785] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.862958] page dumped because: kasan: bad access detected
[   16.863024] 
[   16.863380] Memory state around the buggy address:
[   16.863453]  fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.863645]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.863811] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.863890]                                                                 ^
[   16.863932]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.864289]  fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.864381] ==================================================================

[   16.850169] ==================================================================
[   16.850217] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.850573] Read of size 1 at addr fff00000c771d478 by task kunit_try_catch/194
[   16.850656] 
[   16.850742] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.850823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.850857] Hardware name: linux,dummy-virt (DT)
[   16.850923] Call trace:
[   16.851000]  show_stack+0x20/0x38 (C)
[   16.851162]  dump_stack_lvl+0x8c/0xd0
[   16.851278]  print_report+0x118/0x5d0
[   16.851392]  kasan_report+0xdc/0x128
[   16.851517]  __asan_report_load1_noabort+0x20/0x30
[   16.851584]  ksize_unpoisons_memory+0x618/0x740
[   16.851634]  kunit_try_run_case+0x170/0x3f0
[   16.851682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.851745]  kthread+0x328/0x630
[   16.851919]  ret_from_fork+0x10/0x20
[   16.852037] 
[   16.852105] Allocated by task 194:
[   16.852259]  kasan_save_stack+0x3c/0x68
[   16.852390]  kasan_save_track+0x20/0x40
[   16.852534]  kasan_save_alloc_info+0x40/0x58
[   16.852632]  __kasan_kmalloc+0xd4/0xd8
[   16.852688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.852777]  ksize_unpoisons_memory+0xc0/0x740
[   16.852853]  kunit_try_run_case+0x170/0x3f0
[   16.852971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.853052]  kthread+0x328/0x630
[   16.853095]  ret_from_fork+0x10/0x20
[   16.853131] 
[   16.853151] The buggy address belongs to the object at fff00000c771d400
[   16.853151]  which belongs to the cache kmalloc-128 of size 128
[   16.853234] The buggy address is located 5 bytes to the right of
[   16.853234]  allocated 115-byte region [fff00000c771d400, fff00000c771d473)
[   16.853298] 
[   16.853323] The buggy address belongs to the physical page:
[   16.853366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.853573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.853772] page_type: f5(slab)
[   16.853860] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.854004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.854103] page dumped because: kasan: bad access detected
[   16.854234] 
[   16.854298] Memory state around the buggy address:
[   16.854330]  fff00000c771d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.854573]  fff00000c771d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.854773] >fff00000c771d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.854829]                                                                 ^
[   16.854955]  fff00000c771d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855000]  fff00000c771d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855073] ==================================================================
[   16.855777] ==================================================================
[   16.855830] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.855897] Read of size 1 at addr fff00000c771d47f by task kunit_try_catch/194
[   16.855948] 
[   16.856016] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.856125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.856208] Hardware name: linux,dummy-virt (DT)
[   16.856242] Call trace:
[   16.856282]  show_stack+0x20/0x38 (C)
[   16.856342]  dump_stack_lvl+0x8c/0xd0
[   16.856390]  print_report+0x118/0x5d0
[   16.856621]  kasan_report+0xdc/0x128
[   16.856680]  __asan_report_load1_noabort+0x20/0x30
[   16.856916]  ksize_unpoisons_memory+0x690/0x740
[   16.856990]  kunit_try_run_case+0x170/0x3f0
[   16.857039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.857104]  kthread+0x328/0x630
[   16.857148]  ret_from_fork+0x10/0x20
[   16.857213] 
[   16.857231] Allocated by task 194:
[   16.857262]  kasan_save_stack+0x3c/0x68
[   16.857353]  kasan_save_track+0x20/0x40
[   16.857419]  kasan_save_alloc_info+0x40/0x58
[   16.857462]  __kasan_kmalloc+0xd4/0xd8
[   16.857528]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.857589]  ksize_unpoisons_memory+0xc0/0x740
[   16.857626]  kunit_try_run_case+0x170/0x3f0
[   16.857663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.857748]  kthread+0x328/0x630
[   16.857977]  ret_from_fork+0x10/0x20
[   16.858027] 
[   16.858107] The buggy address belongs to the object at fff00000c771d400
[   16.858107]  which belongs to the cache kmalloc-128 of size 128
[   16.858242] The buggy address is located 12 bytes to the right of
[   16.858242]  allocated 115-byte region [fff00000c771d400, fff00000c771d473)
[   16.858335] 
[   16.858373] The buggy address belongs to the physical page:
[   16.858404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.858518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.858593] page_type: f5(slab)
[   16.858666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.858737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.858778] page dumped because: kasan: bad access detected
[   16.858809] 
[   16.858826] Memory state around the buggy address:
[   16.858875]  fff00000c771d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.858931]  fff00000c771d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.858977] >fff00000c771d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.859015]                                                                 ^
[   16.859056]  fff00000c771d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.859139]  fff00000c771d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.859334] ==================================================================
[   16.844584] ==================================================================
[   16.844777] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.844840] Read of size 1 at addr fff00000c771d473 by task kunit_try_catch/194
[   16.844890] 
[   16.844925] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.845007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.845107] Hardware name: linux,dummy-virt (DT)
[   16.845142] Call trace:
[   16.845165]  show_stack+0x20/0x38 (C)
[   16.845222]  dump_stack_lvl+0x8c/0xd0
[   16.845400]  print_report+0x118/0x5d0
[   16.845537]  kasan_report+0xdc/0x128
[   16.845590]  __asan_report_load1_noabort+0x20/0x30
[   16.845642]  ksize_unpoisons_memory+0x628/0x740
[   16.845690]  kunit_try_run_case+0x170/0x3f0
[   16.845755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.845808]  kthread+0x328/0x630
[   16.845980]  ret_from_fork+0x10/0x20
[   16.846036] 
[   16.846108] Allocated by task 194:
[   16.846137]  kasan_save_stack+0x3c/0x68
[   16.846238]  kasan_save_track+0x20/0x40
[   16.846431]  kasan_save_alloc_info+0x40/0x58
[   16.846475]  __kasan_kmalloc+0xd4/0xd8
[   16.846622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.846674]  ksize_unpoisons_memory+0xc0/0x740
[   16.846724]  kunit_try_run_case+0x170/0x3f0
[   16.846839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.846908]  kthread+0x328/0x630
[   16.846940]  ret_from_fork+0x10/0x20
[   16.847040] 
[   16.847229] The buggy address belongs to the object at fff00000c771d400
[   16.847229]  which belongs to the cache kmalloc-128 of size 128
[   16.847460] The buggy address is located 0 bytes to the right of
[   16.847460]  allocated 115-byte region [fff00000c771d400, fff00000c771d473)
[   16.847568] 
[   16.847595] The buggy address belongs to the physical page:
[   16.847628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.847680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.847739] page_type: f5(slab)
[   16.847776] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.847829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.847870] page dumped because: kasan: bad access detected
[   16.847902] 
[   16.847930] Memory state around the buggy address:
[   16.847970]  fff00000c771d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.848036]  fff00000c771d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.848089] >fff00000c771d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.848126]                                                              ^
[   16.848167]  fff00000c771d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.848230]  fff00000c771d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.848277] ==================================================================

[   12.646327] ==================================================================
[   12.647003] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.647433] Read of size 1 at addr ffff888102988773 by task kunit_try_catch/211
[   12.647743] 
[   12.647861] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.647915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.647926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.647946] Call Trace:
[   12.647959]  <TASK>
[   12.647987]  dump_stack_lvl+0x73/0xb0
[   12.648028]  print_report+0xd1/0x610
[   12.648062]  ? __virt_addr_valid+0x1db/0x2d0
[   12.648085]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.648109]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.648132]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.648155]  kasan_report+0x141/0x180
[   12.648177]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.648205]  __asan_report_load1_noabort+0x18/0x20
[   12.648230]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.648253]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.648287]  ? __kasan_check_write+0x18/0x20
[   12.648306]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.648330]  ? irqentry_exit+0x2a/0x60
[   12.648361]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.648385]  ? trace_hardirqs_on+0x37/0xe0
[   12.648408]  ? __pfx_read_tsc+0x10/0x10
[   12.648429]  ? ktime_get_ts64+0x86/0x230
[   12.648454]  kunit_try_run_case+0x1a5/0x480
[   12.648486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.648510]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.648533]  ? __kthread_parkme+0x82/0x180
[   12.648563]  ? preempt_count_sub+0x50/0x80
[   12.648588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.648611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.648634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.648658]  kthread+0x337/0x6f0
[   12.648677]  ? trace_preempt_on+0x20/0xc0
[   12.648698]  ? __pfx_kthread+0x10/0x10
[   12.648718]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.648739]  ? calculate_sigpending+0x7b/0xa0
[   12.648763]  ? __pfx_kthread+0x10/0x10
[   12.648784]  ret_from_fork+0x116/0x1d0
[   12.648802]  ? __pfx_kthread+0x10/0x10
[   12.648822]  ret_from_fork_asm+0x1a/0x30
[   12.648853]  </TASK>
[   12.648863] 
[   12.656782] Allocated by task 211:
[   12.656972]  kasan_save_stack+0x45/0x70
[   12.657159]  kasan_save_track+0x18/0x40
[   12.657346]  kasan_save_alloc_info+0x3b/0x50
[   12.657498]  __kasan_kmalloc+0xb7/0xc0
[   12.657665]  __kmalloc_cache_noprof+0x189/0x420
[   12.657907]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.658122]  kunit_try_run_case+0x1a5/0x480
[   12.658317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.658494]  kthread+0x337/0x6f0
[   12.658767]  ret_from_fork+0x116/0x1d0
[   12.658967]  ret_from_fork_asm+0x1a/0x30
[   12.659175] 
[   12.659267] The buggy address belongs to the object at ffff888102988700
[   12.659267]  which belongs to the cache kmalloc-128 of size 128
[   12.659637] The buggy address is located 0 bytes to the right of
[   12.659637]  allocated 115-byte region [ffff888102988700, ffff888102988773)
[   12.660073] 
[   12.660182] The buggy address belongs to the physical page:
[   12.660434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   12.660784] flags: 0x200000000000000(node=0|zone=2)
[   12.661030] page_type: f5(slab)
[   12.661309] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.661543] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.661768] page dumped because: kasan: bad access detected
[   12.662070] 
[   12.662164] Memory state around the buggy address:
[   12.662421]  ffff888102988600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.662743]  ffff888102988680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.663178] >ffff888102988700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.663449]                                                              ^
[   12.663741]  ffff888102988780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.664095]  ffff888102988800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.664408] ==================================================================
[   12.665420] ==================================================================
[   12.665812] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.666319] Read of size 1 at addr ffff888102988778 by task kunit_try_catch/211
[   12.666708] 
[   12.666823] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.666863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.666875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.666911] Call Trace:
[   12.666923]  <TASK>
[   12.666936]  dump_stack_lvl+0x73/0xb0
[   12.666964]  print_report+0xd1/0x610
[   12.666985]  ? __virt_addr_valid+0x1db/0x2d0
[   12.667007]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.667030]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.667053]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.667086]  kasan_report+0x141/0x180
[   12.667108]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.667137]  __asan_report_load1_noabort+0x18/0x20
[   12.667173]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.667196]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.667221]  ? __kasan_check_write+0x18/0x20
[   12.667251]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.667274]  ? irqentry_exit+0x2a/0x60
[   12.667294]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.667318]  ? trace_hardirqs_on+0x37/0xe0
[   12.667341]  ? __pfx_read_tsc+0x10/0x10
[   12.667361]  ? ktime_get_ts64+0x86/0x230
[   12.667384]  kunit_try_run_case+0x1a5/0x480
[   12.667408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.667432]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.667455]  ? __kthread_parkme+0x82/0x180
[   12.667474]  ? preempt_count_sub+0x50/0x80
[   12.667497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.667521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.667544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.667568]  kthread+0x337/0x6f0
[   12.667586]  ? trace_preempt_on+0x20/0xc0
[   12.667607]  ? __pfx_kthread+0x10/0x10
[   12.667627]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.667657]  ? calculate_sigpending+0x7b/0xa0
[   12.667681]  ? __pfx_kthread+0x10/0x10
[   12.667701]  ret_from_fork+0x116/0x1d0
[   12.667729]  ? __pfx_kthread+0x10/0x10
[   12.667749]  ret_from_fork_asm+0x1a/0x30
[   12.667780]  </TASK>
[   12.667790] 
[   12.675746] Allocated by task 211:
[   12.675898]  kasan_save_stack+0x45/0x70
[   12.676179]  kasan_save_track+0x18/0x40
[   12.676393]  kasan_save_alloc_info+0x3b/0x50
[   12.676569]  __kasan_kmalloc+0xb7/0xc0
[   12.676769]  __kmalloc_cache_noprof+0x189/0x420
[   12.676996]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.677215]  kunit_try_run_case+0x1a5/0x480
[   12.677401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.677579]  kthread+0x337/0x6f0
[   12.677699]  ret_from_fork+0x116/0x1d0
[   12.677861]  ret_from_fork_asm+0x1a/0x30
[   12.678072] 
[   12.678194] The buggy address belongs to the object at ffff888102988700
[   12.678194]  which belongs to the cache kmalloc-128 of size 128
[   12.678735] The buggy address is located 5 bytes to the right of
[   12.678735]  allocated 115-byte region [ffff888102988700, ffff888102988773)
[   12.679295] 
[   12.679366] The buggy address belongs to the physical page:
[   12.679574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   12.679950] flags: 0x200000000000000(node=0|zone=2)
[   12.680250] page_type: f5(slab)
[   12.680429] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.680711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.681165] page dumped because: kasan: bad access detected
[   12.681350] 
[   12.681420] Memory state around the buggy address:
[   12.681573]  ffff888102988600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.681789]  ffff888102988680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.682015] >ffff888102988700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.682288]                                                                 ^
[   12.682657]  ffff888102988780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.683044]  ffff888102988800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.683416] ==================================================================
[   12.684658] ==================================================================
[   12.685199] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.685513] Read of size 1 at addr ffff88810298877f by task kunit_try_catch/211
[   12.685860] 
[   12.685968] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.686019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.686030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.686050] Call Trace:
[   12.686065]  <TASK>
[   12.686080]  dump_stack_lvl+0x73/0xb0
[   12.686119]  print_report+0xd1/0x610
[   12.686140]  ? __virt_addr_valid+0x1db/0x2d0
[   12.686163]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.686197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.686220]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.686243]  kasan_report+0x141/0x180
[   12.686265]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.686293]  __asan_report_load1_noabort+0x18/0x20
[   12.686317]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.686341]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.686368]  ? __kasan_check_write+0x18/0x20
[   12.686388]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.686414]  ? irqentry_exit+0x2a/0x60
[   12.686444]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.686468]  ? trace_hardirqs_on+0x37/0xe0
[   12.686491]  ? __pfx_read_tsc+0x10/0x10
[   12.686521]  ? ktime_get_ts64+0x86/0x230
[   12.686546]  kunit_try_run_case+0x1a5/0x480
[   12.686571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.686596]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.686627]  ? __kthread_parkme+0x82/0x180
[   12.686647]  ? preempt_count_sub+0x50/0x80
[   12.686671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.686705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.686729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.686753]  kthread+0x337/0x6f0
[   12.686786]  ? trace_preempt_on+0x20/0xc0
[   12.686808]  ? __pfx_kthread+0x10/0x10
[   12.686828]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.686859]  ? calculate_sigpending+0x7b/0xa0
[   12.686883]  ? __pfx_kthread+0x10/0x10
[   12.686912]  ret_from_fork+0x116/0x1d0
[   12.686930]  ? __pfx_kthread+0x10/0x10
[   12.686950]  ret_from_fork_asm+0x1a/0x30
[   12.686991]  </TASK>
[   12.687001] 
[   12.695185] Allocated by task 211:
[   12.695348]  kasan_save_stack+0x45/0x70
[   12.695495]  kasan_save_track+0x18/0x40
[   12.695712]  kasan_save_alloc_info+0x3b/0x50
[   12.695881]  __kasan_kmalloc+0xb7/0xc0
[   12.696167]  __kmalloc_cache_noprof+0x189/0x420
[   12.696367]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.696597]  kunit_try_run_case+0x1a5/0x480
[   12.696806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.697038]  kthread+0x337/0x6f0
[   12.697208]  ret_from_fork+0x116/0x1d0
[   12.697415]  ret_from_fork_asm+0x1a/0x30
[   12.697571] 
[   12.697640] The buggy address belongs to the object at ffff888102988700
[   12.697640]  which belongs to the cache kmalloc-128 of size 128
[   12.698036] The buggy address is located 12 bytes to the right of
[   12.698036]  allocated 115-byte region [ffff888102988700, ffff888102988773)
[   12.698580] 
[   12.698651] The buggy address belongs to the physical page:
[   12.698825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   12.699429] flags: 0x200000000000000(node=0|zone=2)
[   12.699661] page_type: f5(slab)
[   12.699860] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.700233] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.701088] page dumped because: kasan: bad access detected
[   12.702006] 
[   12.702101] Memory state around the buggy address:
[   12.702262]  ffff888102988600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.702549]  ffff888102988680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.702883] >ffff888102988700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.704106]                                                                 ^
[   12.704351]  ffff888102988780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.704575]  ffff888102988800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.704791] ==================================================================

[   12.451870] ==================================================================
[   12.452205] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.452710] Read of size 1 at addr ffff888102ae1378 by task kunit_try_catch/212
[   12.453353] 
[   12.453559] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.453602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.453613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.453632] Call Trace:
[   12.453648]  <TASK>
[   12.453662]  dump_stack_lvl+0x73/0xb0
[   12.453689]  print_report+0xd1/0x610
[   12.453711]  ? __virt_addr_valid+0x1db/0x2d0
[   12.453733]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.453756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.453778]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.453801]  kasan_report+0x141/0x180
[   12.453822]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.453851]  __asan_report_load1_noabort+0x18/0x20
[   12.453875]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.453898]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.453920]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.453951]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.453979]  kunit_try_run_case+0x1a5/0x480
[   12.454002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.454024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.454047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.454071]  ? __kthread_parkme+0x82/0x180
[   12.454090]  ? preempt_count_sub+0x50/0x80
[   12.454115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.454138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.454161]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.454184]  kthread+0x337/0x6f0
[   12.454203]  ? trace_preempt_on+0x20/0xc0
[   12.454225]  ? __pfx_kthread+0x10/0x10
[   12.454259]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.454284]  ? calculate_sigpending+0x7b/0xa0
[   12.454310]  ? __pfx_kthread+0x10/0x10
[   12.454331]  ret_from_fork+0x116/0x1d0
[   12.454349]  ? __pfx_kthread+0x10/0x10
[   12.454369]  ret_from_fork_asm+0x1a/0x30
[   12.454401]  </TASK>
[   12.454411] 
[   12.461935] Allocated by task 212:
[   12.462214]  kasan_save_stack+0x45/0x70
[   12.462577]  kasan_save_track+0x18/0x40
[   12.462793]  kasan_save_alloc_info+0x3b/0x50
[   12.463013]  __kasan_kmalloc+0xb7/0xc0
[   12.463197]  __kmalloc_cache_noprof+0x189/0x420
[   12.463482]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.463734]  kunit_try_run_case+0x1a5/0x480
[   12.463947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.464135]  kthread+0x337/0x6f0
[   12.464308]  ret_from_fork+0x116/0x1d0
[   12.464580]  ret_from_fork_asm+0x1a/0x30
[   12.464763] 
[   12.464863] The buggy address belongs to the object at ffff888102ae1300
[   12.464863]  which belongs to the cache kmalloc-128 of size 128
[   12.465330] The buggy address is located 5 bytes to the right of
[   12.465330]  allocated 115-byte region [ffff888102ae1300, ffff888102ae1373)
[   12.465917] 
[   12.466002] The buggy address belongs to the physical page:
[   12.466228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   12.466719] flags: 0x200000000000000(node=0|zone=2)
[   12.466960] page_type: f5(slab)
[   12.467080] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.467313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.467891] page dumped because: kasan: bad access detected
[   12.468231] 
[   12.468303] Memory state around the buggy address:
[   12.468468]  ffff888102ae1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.468887]  ffff888102ae1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.469218] >ffff888102ae1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.469693]                                                                 ^
[   12.470002]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.470219]  ffff888102ae1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.470433] ==================================================================
[   12.433750] ==================================================================
[   12.434193] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.434633] Read of size 1 at addr ffff888102ae1373 by task kunit_try_catch/212
[   12.434955] 
[   12.435066] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.435111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.435122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.435143] Call Trace:
[   12.435155]  <TASK>
[   12.435171]  dump_stack_lvl+0x73/0xb0
[   12.435201]  print_report+0xd1/0x610
[   12.435223]  ? __virt_addr_valid+0x1db/0x2d0
[   12.435245]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.435268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.435290]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.435314]  kasan_report+0x141/0x180
[   12.435336]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.435365]  __asan_report_load1_noabort+0x18/0x20
[   12.435388]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.435412]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.435446]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.435478]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.435506]  kunit_try_run_case+0x1a5/0x480
[   12.435531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.435629]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.435656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.435680]  ? __kthread_parkme+0x82/0x180
[   12.435700]  ? preempt_count_sub+0x50/0x80
[   12.435725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.435748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.435771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.435795]  kthread+0x337/0x6f0
[   12.435813]  ? trace_preempt_on+0x20/0xc0
[   12.435836]  ? __pfx_kthread+0x10/0x10
[   12.435856]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.435877]  ? calculate_sigpending+0x7b/0xa0
[   12.435901]  ? __pfx_kthread+0x10/0x10
[   12.435921]  ret_from_fork+0x116/0x1d0
[   12.435940]  ? __pfx_kthread+0x10/0x10
[   12.435959]  ret_from_fork_asm+0x1a/0x30
[   12.435991]  </TASK>
[   12.436001] 
[   12.443319] Allocated by task 212:
[   12.443616]  kasan_save_stack+0x45/0x70
[   12.443798]  kasan_save_track+0x18/0x40
[   12.443962]  kasan_save_alloc_info+0x3b/0x50
[   12.444159]  __kasan_kmalloc+0xb7/0xc0
[   12.444334]  __kmalloc_cache_noprof+0x189/0x420
[   12.444661]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.444869]  kunit_try_run_case+0x1a5/0x480
[   12.445035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.445216]  kthread+0x337/0x6f0
[   12.445338]  ret_from_fork+0x116/0x1d0
[   12.445492]  ret_from_fork_asm+0x1a/0x30
[   12.445689] 
[   12.445783] The buggy address belongs to the object at ffff888102ae1300
[   12.445783]  which belongs to the cache kmalloc-128 of size 128
[   12.446299] The buggy address is located 0 bytes to the right of
[   12.446299]  allocated 115-byte region [ffff888102ae1300, ffff888102ae1373)
[   12.447170] 
[   12.447276] The buggy address belongs to the physical page:
[   12.447740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   12.448036] flags: 0x200000000000000(node=0|zone=2)
[   12.448236] page_type: f5(slab)
[   12.448367] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.448872] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.449169] page dumped because: kasan: bad access detected
[   12.449405] 
[   12.449576] Memory state around the buggy address:
[   12.449757]  ffff888102ae1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.450050]  ffff888102ae1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.450347] >ffff888102ae1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.450813]                                                              ^
[   12.451038]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.451257]  ffff888102ae1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.451483] ==================================================================
[   12.470825] ==================================================================
[   12.471157] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.471713] Read of size 1 at addr ffff888102ae137f by task kunit_try_catch/212
[   12.472289] 
[   12.472547] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.472591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.472602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.472621] Call Trace:
[   12.472639]  <TASK>
[   12.472655]  dump_stack_lvl+0x73/0xb0
[   12.472684]  print_report+0xd1/0x610
[   12.472706]  ? __virt_addr_valid+0x1db/0x2d0
[   12.472728]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.472751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.472773]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.472797]  kasan_report+0x141/0x180
[   12.472818]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.472847]  __asan_report_load1_noabort+0x18/0x20
[   12.472871]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.472895]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.472917]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.472949]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.472977]  kunit_try_run_case+0x1a5/0x480
[   12.473001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.473022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.473046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.473069]  ? __kthread_parkme+0x82/0x180
[   12.473089]  ? preempt_count_sub+0x50/0x80
[   12.473114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.473149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.473173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.473196]  kthread+0x337/0x6f0
[   12.473215]  ? trace_preempt_on+0x20/0xc0
[   12.473238]  ? __pfx_kthread+0x10/0x10
[   12.473258]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.473280]  ? calculate_sigpending+0x7b/0xa0
[   12.473303]  ? __pfx_kthread+0x10/0x10
[   12.473324]  ret_from_fork+0x116/0x1d0
[   12.473342]  ? __pfx_kthread+0x10/0x10
[   12.473362]  ret_from_fork_asm+0x1a/0x30
[   12.473394]  </TASK>
[   12.473404] 
[   12.480768] Allocated by task 212:
[   12.480955]  kasan_save_stack+0x45/0x70
[   12.481174]  kasan_save_track+0x18/0x40
[   12.481367]  kasan_save_alloc_info+0x3b/0x50
[   12.481703]  __kasan_kmalloc+0xb7/0xc0
[   12.481884]  __kmalloc_cache_noprof+0x189/0x420
[   12.482084]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.482290]  kunit_try_run_case+0x1a5/0x480
[   12.482549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.482802]  kthread+0x337/0x6f0
[   12.482969]  ret_from_fork+0x116/0x1d0
[   12.483157]  ret_from_fork_asm+0x1a/0x30
[   12.483335] 
[   12.483609] The buggy address belongs to the object at ffff888102ae1300
[   12.483609]  which belongs to the cache kmalloc-128 of size 128
[   12.484116] The buggy address is located 12 bytes to the right of
[   12.484116]  allocated 115-byte region [ffff888102ae1300, ffff888102ae1373)
[   12.484727] 
[   12.484819] The buggy address belongs to the physical page:
[   12.485044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1
[   12.485370] flags: 0x200000000000000(node=0|zone=2)
[   12.485637] page_type: f5(slab)
[   12.485789] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.486055] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.486278] page dumped because: kasan: bad access detected
[   12.486456] 
[   12.486524] Memory state around the buggy address:
[   12.486677]  ffff888102ae1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.486933]  ffff888102ae1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.487243] >ffff888102ae1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.487749]                                                                 ^
[   12.488068]  ffff888102ae1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.488384]  ffff888102ae1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.488805] ==================================================================

[   12.634103] ==================================================================
[   12.634688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   12.635078] Read of size 1 at addr ffff8881029a697f by task kunit_try_catch/211
[   12.635348] 
[   12.635459] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.635503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.635514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.635535] Call Trace:
[   12.635553]  <TASK>
[   12.635569]  dump_stack_lvl+0x73/0xb0
[   12.635598]  print_report+0xd1/0x610
[   12.635620]  ? __virt_addr_valid+0x1db/0x2d0
[   12.635642]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.635665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.635687]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.635710]  kasan_report+0x141/0x180
[   12.635731]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   12.635758]  __asan_report_load1_noabort+0x18/0x20
[   12.635782]  ksize_unpoisons_memory+0x7b6/0x9b0
[   12.635805]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.635828]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.635857]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.635884]  kunit_try_run_case+0x1a5/0x480
[   12.635908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.635930]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.635953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.635976]  ? __kthread_parkme+0x82/0x180
[   12.635996]  ? preempt_count_sub+0x50/0x80
[   12.636030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.636053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.636076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.636099]  kthread+0x337/0x6f0
[   12.636118]  ? trace_preempt_on+0x20/0xc0
[   12.636140]  ? __pfx_kthread+0x10/0x10
[   12.636159]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.636180]  ? calculate_sigpending+0x7b/0xa0
[   12.636203]  ? __pfx_kthread+0x10/0x10
[   12.636223]  ret_from_fork+0x116/0x1d0
[   12.636242]  ? __pfx_kthread+0x10/0x10
[   12.636261]  ret_from_fork_asm+0x1a/0x30
[   12.636292]  </TASK>
[   12.636302] 
[   12.644519] Allocated by task 211:
[   12.644668]  kasan_save_stack+0x45/0x70
[   12.644988]  kasan_save_track+0x18/0x40
[   12.645397]  kasan_save_alloc_info+0x3b/0x50
[   12.645613]  __kasan_kmalloc+0xb7/0xc0
[   12.645798]  __kmalloc_cache_noprof+0x189/0x420
[   12.645977]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.646550]  kunit_try_run_case+0x1a5/0x480
[   12.646706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.646886]  kthread+0x337/0x6f0
[   12.647103]  ret_from_fork+0x116/0x1d0
[   12.647512]  ret_from_fork_asm+0x1a/0x30
[   12.647742] 
[   12.647862] The buggy address belongs to the object at ffff8881029a6900
[   12.647862]  which belongs to the cache kmalloc-128 of size 128
[   12.648424] The buggy address is located 12 bytes to the right of
[   12.648424]  allocated 115-byte region [ffff8881029a6900, ffff8881029a6973)
[   12.648909] 
[   12.649003] The buggy address belongs to the physical page:
[   12.649352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6
[   12.649715] flags: 0x200000000000000(node=0|zone=2)
[   12.649876] page_type: f5(slab)
[   12.649994] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.650348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.650941] page dumped because: kasan: bad access detected
[   12.651520] 
[   12.651631] Memory state around the buggy address:
[   12.651811]  ffff8881029a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.652208]  ffff8881029a6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.652562] >ffff8881029a6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.652851]                                                                 ^
[   12.653253]  ffff8881029a6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.653626]  ffff8881029a6a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.653879] ==================================================================
[   12.613731] ==================================================================
[   12.614304] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   12.614674] Read of size 1 at addr ffff8881029a6978 by task kunit_try_catch/211
[   12.614952] 
[   12.615074] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.615120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.615131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.615153] Call Trace:
[   12.615165]  <TASK>
[   12.615181]  dump_stack_lvl+0x73/0xb0
[   12.615212]  print_report+0xd1/0x610
[   12.615235]  ? __virt_addr_valid+0x1db/0x2d0
[   12.615258]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.615280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.615302]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.615422]  kasan_report+0x141/0x180
[   12.615444]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   12.615471]  __asan_report_load1_noabort+0x18/0x20
[   12.615495]  ksize_unpoisons_memory+0x7e9/0x9b0
[   12.615518]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.615540]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.615570]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.615597]  kunit_try_run_case+0x1a5/0x480
[   12.615622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.615644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.615667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.615690]  ? __kthread_parkme+0x82/0x180
[   12.615710]  ? preempt_count_sub+0x50/0x80
[   12.615734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.615757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.615780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.615803]  kthread+0x337/0x6f0
[   12.615822]  ? trace_preempt_on+0x20/0xc0
[   12.615844]  ? __pfx_kthread+0x10/0x10
[   12.615864]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.615884]  ? calculate_sigpending+0x7b/0xa0
[   12.615908]  ? __pfx_kthread+0x10/0x10
[   12.615929]  ret_from_fork+0x116/0x1d0
[   12.615948]  ? __pfx_kthread+0x10/0x10
[   12.615967]  ret_from_fork_asm+0x1a/0x30
[   12.615999]  </TASK>
[   12.616022] 
[   12.623925] Allocated by task 211:
[   12.624157]  kasan_save_stack+0x45/0x70
[   12.624416]  kasan_save_track+0x18/0x40
[   12.624603]  kasan_save_alloc_info+0x3b/0x50
[   12.624799]  __kasan_kmalloc+0xb7/0xc0
[   12.624991]  __kmalloc_cache_noprof+0x189/0x420
[   12.625292]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.625503]  kunit_try_run_case+0x1a5/0x480
[   12.625650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.626216]  kthread+0x337/0x6f0
[   12.626348]  ret_from_fork+0x116/0x1d0
[   12.626556]  ret_from_fork_asm+0x1a/0x30
[   12.627043] 
[   12.627305] The buggy address belongs to the object at ffff8881029a6900
[   12.627305]  which belongs to the cache kmalloc-128 of size 128
[   12.627867] The buggy address is located 5 bytes to the right of
[   12.627867]  allocated 115-byte region [ffff8881029a6900, ffff8881029a6973)
[   12.628438] 
[   12.628513] The buggy address belongs to the physical page:
[   12.628684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6
[   12.629007] flags: 0x200000000000000(node=0|zone=2)
[   12.629349] page_type: f5(slab)
[   12.629517] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.630186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.630667] page dumped because: kasan: bad access detected
[   12.630903] 
[   12.630987] Memory state around the buggy address:
[   12.631369]  ffff8881029a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.631642]  ffff8881029a6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.631862] >ffff8881029a6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.632157]                                                                 ^
[   12.632556]  ffff8881029a6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.632941]  ffff8881029a6a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.633600] ==================================================================
[   12.591353] ==================================================================
[   12.591865] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   12.592562] Read of size 1 at addr ffff8881029a6973 by task kunit_try_catch/211
[   12.592904] 
[   12.593031] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.593079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.593090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.593112] Call Trace:
[   12.593124]  <TASK>
[   12.593141]  dump_stack_lvl+0x73/0xb0
[   12.593173]  print_report+0xd1/0x610
[   12.593196]  ? __virt_addr_valid+0x1db/0x2d0
[   12.593219]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.593241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.593264]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.593286]  kasan_report+0x141/0x180
[   12.593307]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   12.593335]  __asan_report_load1_noabort+0x18/0x20
[   12.593359]  ksize_unpoisons_memory+0x81c/0x9b0
[   12.593382]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.593404]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.593508]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   12.593538]  kunit_try_run_case+0x1a5/0x480
[   12.593564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.593586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.593610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.593633]  ? __kthread_parkme+0x82/0x180
[   12.593653]  ? preempt_count_sub+0x50/0x80
[   12.593678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.593701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.593724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.593747]  kthread+0x337/0x6f0
[   12.593766]  ? trace_preempt_on+0x20/0xc0
[   12.593788]  ? __pfx_kthread+0x10/0x10
[   12.593808]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.593829]  ? calculate_sigpending+0x7b/0xa0
[   12.593853]  ? __pfx_kthread+0x10/0x10
[   12.593873]  ret_from_fork+0x116/0x1d0
[   12.593892]  ? __pfx_kthread+0x10/0x10
[   12.593911]  ret_from_fork_asm+0x1a/0x30
[   12.593942]  </TASK>
[   12.593953] 
[   12.601584] Allocated by task 211:
[   12.601817]  kasan_save_stack+0x45/0x70
[   12.602157]  kasan_save_track+0x18/0x40
[   12.602354]  kasan_save_alloc_info+0x3b/0x50
[   12.602619]  __kasan_kmalloc+0xb7/0xc0
[   12.602805]  __kmalloc_cache_noprof+0x189/0x420
[   12.603135]  ksize_unpoisons_memory+0xc7/0x9b0
[   12.603349]  kunit_try_run_case+0x1a5/0x480
[   12.603600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.603826]  kthread+0x337/0x6f0
[   12.604354]  ret_from_fork+0x116/0x1d0
[   12.604589]  ret_from_fork_asm+0x1a/0x30
[   12.604772] 
[   12.604857] The buggy address belongs to the object at ffff8881029a6900
[   12.604857]  which belongs to the cache kmalloc-128 of size 128
[   12.605499] The buggy address is located 0 bytes to the right of
[   12.605499]  allocated 115-byte region [ffff8881029a6900, ffff8881029a6973)
[   12.605971] 
[   12.606218] The buggy address belongs to the physical page:
[   12.606507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6
[   12.606869] flags: 0x200000000000000(node=0|zone=2)
[   12.607229] page_type: f5(slab)
[   12.607411] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.607759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.608349] page dumped because: kasan: bad access detected
[   12.608641] 
[   12.608735] Memory state around the buggy address:
[   12.608963]  ffff8881029a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.609349]  ffff8881029a6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.609727] >ffff8881029a6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.610140]                                                              ^
[   12.610484]  ffff8881029a6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.610788]  ffff8881029a6a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.611102] ==================================================================