Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   18.933077] ==================================================================
[   18.939578] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.946521] Write of size 1 at addr ffff000801ad8d73 by task kunit_try_catch/183
[   18.953898] 
[   18.955385] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc1 #1 PREEMPT 
[   18.955443] Tainted: [N]=TEST
[   18.955455] Hardware name: WinLink E850-96 board (DT)
[   18.955475] Call trace:
[   18.955486]  show_stack+0x20/0x38 (C)
[   18.955526]  dump_stack_lvl+0x8c/0xd0
[   18.955562]  print_report+0x118/0x608
[   18.955598]  kasan_report+0xdc/0x128
[   18.955633]  __asan_report_store1_noabort+0x20/0x30
[   18.955666]  kmalloc_oob_right+0x5a4/0x660
[   18.955695]  kunit_try_run_case+0x170/0x3f0
[   18.955732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.955774]  kthread+0x328/0x630
[   18.955802]  ret_from_fork+0x10/0x20
[   18.955838] 
[   19.017006] Allocated by task 183:
[   19.020393]  kasan_save_stack+0x3c/0x68
[   19.024209]  kasan_save_track+0x20/0x40
[   19.028028]  kasan_save_alloc_info+0x40/0x58
[   19.032281]  __kasan_kmalloc+0xd4/0xd8
[   19.036014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.040529]  kmalloc_oob_right+0xb0/0x660
[   19.044523]  kunit_try_run_case+0x170/0x3f0
[   19.048688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.054156]  kthread+0x328/0x630
[   19.057368]  ret_from_fork+0x10/0x20
[   19.060927] 
[   19.062404] The buggy address belongs to the object at ffff000801ad8d00
[   19.062404]  which belongs to the cache kmalloc-128 of size 128
[   19.074905] The buggy address is located 0 bytes to the right of
[   19.074905]  allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73)
[   19.087836] 
[   19.089316] The buggy address belongs to the physical page:
[   19.094872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   19.102856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.110494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.117438] page_type: f5(slab)
[   19.120575] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.128294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.136022] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.143832] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.151645] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   19.159456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.167262] page dumped because: kasan: bad access detected
[   19.172818] 
[   19.174293] Memory state around the buggy address:
[   19.179074]  ffff000801ad8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.186277]  ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.193481] >ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.200682]                                                              ^
[   19.207543]  ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.214750]  ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.221951] ==================================================================
[   19.234510] ==================================================================
[   19.241659] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.248598] Write of size 1 at addr ffff000801ad8d78 by task kunit_try_catch/183
[   19.255977] 
[   19.257461] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.257514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.257528] Hardware name: WinLink E850-96 board (DT)
[   19.257549] Call trace:
[   19.257561]  show_stack+0x20/0x38 (C)
[   19.257593]  dump_stack_lvl+0x8c/0xd0
[   19.257628]  print_report+0x118/0x608
[   19.257663]  kasan_report+0xdc/0x128
[   19.257695]  __asan_report_store1_noabort+0x20/0x30
[   19.257726]  kmalloc_oob_right+0x538/0x660
[   19.257756]  kunit_try_run_case+0x170/0x3f0
[   19.257791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.257829]  kthread+0x328/0x630
[   19.257856]  ret_from_fork+0x10/0x20
[   19.257891] 
[   19.320300] Allocated by task 183:
[   19.323685]  kasan_save_stack+0x3c/0x68
[   19.327503]  kasan_save_track+0x20/0x40
[   19.331322]  kasan_save_alloc_info+0x40/0x58
[   19.335576]  __kasan_kmalloc+0xd4/0xd8
[   19.339309]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.343822]  kmalloc_oob_right+0xb0/0x660
[   19.347817]  kunit_try_run_case+0x170/0x3f0
[   19.351982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.357451]  kthread+0x328/0x630
[   19.360662]  ret_from_fork+0x10/0x20
[   19.364221] 
[   19.365698] The buggy address belongs to the object at ffff000801ad8d00
[   19.365698]  which belongs to the cache kmalloc-128 of size 128
[   19.378199] The buggy address is located 5 bytes to the right of
[   19.378199]  allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73)
[   19.391130] 
[   19.392606] The buggy address belongs to the physical page:
[   19.398166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   19.406149] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.413788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.420732] page_type: f5(slab)
[   19.423869] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.431588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.439315] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.447126] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.454939] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   19.462751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.470557] page dumped because: kasan: bad access detected
[   19.476112] 
[   19.477588] Memory state around the buggy address:
[   19.482367]  ffff000801ad8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.489571]  ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.496776] >ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.503976]                                                                 ^
[   19.511098]  ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.518302]  ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.525504] ==================================================================
[   19.532936] ==================================================================
[   19.539916] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.546858] Read of size 1 at addr ffff000801ad8d80 by task kunit_try_catch/183
[   19.554149] 
[   19.555633] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.555687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555702] Hardware name: WinLink E850-96 board (DT)
[   19.555721] Call trace:
[   19.555732]  show_stack+0x20/0x38 (C)
[   19.555764]  dump_stack_lvl+0x8c/0xd0
[   19.555799]  print_report+0x118/0x608
[   19.555831]  kasan_report+0xdc/0x128
[   19.555865]  __asan_report_load1_noabort+0x20/0x30
[   19.555900]  kmalloc_oob_right+0x5d0/0x660
[   19.555929]  kunit_try_run_case+0x170/0x3f0
[   19.555961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555998]  kthread+0x328/0x630
[   19.556025]  ret_from_fork+0x10/0x20
[   19.556055] 
[   19.618384] Allocated by task 183:
[   19.621770]  kasan_save_stack+0x3c/0x68
[   19.625589]  kasan_save_track+0x20/0x40
[   19.629408]  kasan_save_alloc_info+0x40/0x58
[   19.633662]  __kasan_kmalloc+0xd4/0xd8
[   19.637394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.641908]  kmalloc_oob_right+0xb0/0x660
[   19.645902]  kunit_try_run_case+0x170/0x3f0
[   19.650068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655536]  kthread+0x328/0x630
[   19.658748]  ret_from_fork+0x10/0x20
[   19.662307] 
[   19.663784] The buggy address belongs to the object at ffff000801ad8d00
[   19.663784]  which belongs to the cache kmalloc-128 of size 128
[   19.676283] The buggy address is located 13 bytes to the right of
[   19.676283]  allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73)
[   19.689303] 
[   19.690781] The buggy address belongs to the physical page:
[   19.696337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   19.704322] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.711959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.718903] page_type: f5(slab)
[   19.722038] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.729761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.737487] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.745299] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.753112] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   19.760924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.768729] page dumped because: kasan: bad access detected
[   19.774284] 
[   19.775760] Memory state around the buggy address:
[   19.780538]  ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.787743]  ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.794947] >ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.802149]                    ^
[   19.805364]  ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.812569]  ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819770] ==================================================================

[   24.517575] ==================================================================
[   24.518436] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   24.520829] Write of size 1 at addr fff00000c6507173 by task kunit_try_catch/136
[   24.521108] 
[   24.523703] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc1 #1 PREEMPT 
[   24.524372] Tainted: [N]=TEST
[   24.524457] Hardware name: linux,dummy-virt (DT)
[   24.526083] Call trace:
[   24.527217]  show_stack+0x20/0x38 (C)
[   24.527866]  dump_stack_lvl+0x8c/0xd0
[   24.528112]  print_report+0x118/0x608
[   24.528277]  kasan_report+0xdc/0x128
[   24.528425]  __asan_report_store1_noabort+0x20/0x30
[   24.528608]  kmalloc_oob_right+0x5a4/0x660
[   24.528817]  kunit_try_run_case+0x170/0x3f0
[   24.529022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.529175]  kthread+0x328/0x630
[   24.529310]  ret_from_fork+0x10/0x20
[   24.529822] 
[   24.529923] Allocated by task 136:
[   24.530710]  kasan_save_stack+0x3c/0x68
[   24.531613]  kasan_save_track+0x20/0x40
[   24.531922]  kasan_save_alloc_info+0x40/0x58
[   24.532663]  __kasan_kmalloc+0xd4/0xd8
[   24.532765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.533763]  kmalloc_oob_right+0xb0/0x660
[   24.533865]  kunit_try_run_case+0x170/0x3f0
[   24.533973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.534079]  kthread+0x328/0x630
[   24.534167]  ret_from_fork+0x10/0x20
[   24.534307] 
[   24.536437] The buggy address belongs to the object at fff00000c6507100
[   24.536437]  which belongs to the cache kmalloc-128 of size 128
[   24.539040] The buggy address is located 0 bytes to the right of
[   24.539040]  allocated 115-byte region [fff00000c6507100, fff00000c6507173)
[   24.539253] 
[   24.539581] The buggy address belongs to the physical page:
[   24.540288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   24.542202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.544384] page_type: f5(slab)
[   24.544773] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.544855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.545057] page dumped because: kasan: bad access detected
[   24.545266] 
[   24.545473] Memory state around the buggy address:
[   24.546463]  fff00000c6507000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.546628]  fff00000c6507080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.546795] >fff00000c6507100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.546982]                                                              ^
[   24.547183]  fff00000c6507180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.547317]  fff00000c6507200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.547511] ==================================================================
[   24.564923] ==================================================================
[   24.565039] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   24.565149] Read of size 1 at addr fff00000c6507180 by task kunit_try_catch/136
[   24.565259] 
[   24.565332] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.565522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.565592] Hardware name: linux,dummy-virt (DT)
[   24.565669] Call trace:
[   24.565728]  show_stack+0x20/0x38 (C)
[   24.565859]  dump_stack_lvl+0x8c/0xd0
[   24.566381]  print_report+0x118/0x608
[   24.566506]  kasan_report+0xdc/0x128
[   24.566620]  __asan_report_load1_noabort+0x20/0x30
[   24.566742]  kmalloc_oob_right+0x5d0/0x660
[   24.566969]  kunit_try_run_case+0x170/0x3f0
[   24.567106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.567348]  kthread+0x328/0x630
[   24.567459]  ret_from_fork+0x10/0x20
[   24.567570] 
[   24.567615] Allocated by task 136:
[   24.567677]  kasan_save_stack+0x3c/0x68
[   24.567771]  kasan_save_track+0x20/0x40
[   24.567861]  kasan_save_alloc_info+0x40/0x58
[   24.567990]  __kasan_kmalloc+0xd4/0xd8
[   24.568090]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.568194]  kmalloc_oob_right+0xb0/0x660
[   24.568289]  kunit_try_run_case+0x170/0x3f0
[   24.568380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.568483]  kthread+0x328/0x630
[   24.571844]  ret_from_fork+0x10/0x20
[   24.572959] 
[   24.573018] The buggy address belongs to the object at fff00000c6507100
[   24.573018]  which belongs to the cache kmalloc-128 of size 128
[   24.573163] The buggy address is located 13 bytes to the right of
[   24.573163]  allocated 115-byte region [fff00000c6507100, fff00000c6507173)
[   24.573555] 
[   24.573780] The buggy address belongs to the physical page:
[   24.573853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   24.574884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.576473] page_type: f5(slab)
[   24.576576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.576704] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.576813] page dumped because: kasan: bad access detected
[   24.576894] 
[   24.577924] Memory state around the buggy address:
[   24.578047]  fff00000c6507080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.578155]  fff00000c6507100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.578257] >fff00000c6507180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.578348]                    ^
[   24.578414]  fff00000c6507200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.578514]  fff00000c6507280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.578607] ==================================================================
[   24.549858] ==================================================================
[   24.550022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   24.550189] Write of size 1 at addr fff00000c6507178 by task kunit_try_catch/136
[   24.550317] 
[   24.550454] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.550769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.550839] Hardware name: linux,dummy-virt (DT)
[   24.550929] Call trace:
[   24.551000]  show_stack+0x20/0x38 (C)
[   24.551254]  dump_stack_lvl+0x8c/0xd0
[   24.551492]  print_report+0x118/0x608
[   24.551638]  kasan_report+0xdc/0x128
[   24.551765]  __asan_report_store1_noabort+0x20/0x30
[   24.551885]  kmalloc_oob_right+0x538/0x660
[   24.552023]  kunit_try_run_case+0x170/0x3f0
[   24.552140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.552274]  kthread+0x328/0x630
[   24.553226]  ret_from_fork+0x10/0x20
[   24.553990] 
[   24.554105] Allocated by task 136:
[   24.554188]  kasan_save_stack+0x3c/0x68
[   24.554959]  kasan_save_track+0x20/0x40
[   24.555175]  kasan_save_alloc_info+0x40/0x58
[   24.555284]  __kasan_kmalloc+0xd4/0xd8
[   24.555387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.555491]  kmalloc_oob_right+0xb0/0x660
[   24.555585]  kunit_try_run_case+0x170/0x3f0
[   24.556048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.556358]  kthread+0x328/0x630
[   24.556859]  ret_from_fork+0x10/0x20
[   24.556978] 
[   24.557028] The buggy address belongs to the object at fff00000c6507100
[   24.557028]  which belongs to the cache kmalloc-128 of size 128
[   24.557192] The buggy address is located 5 bytes to the right of
[   24.557192]  allocated 115-byte region [fff00000c6507100, fff00000c6507173)
[   24.557346] 
[   24.557725] The buggy address belongs to the physical page:
[   24.557811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   24.558441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.558560] page_type: f5(slab)
[   24.558650] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.558768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.559161] page dumped because: kasan: bad access detected
[   24.559258] 
[   24.559416] Memory state around the buggy address:
[   24.559638]  fff00000c6507000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.559898]  fff00000c6507080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.560359] >fff00000c6507100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.560740]                                                                 ^
[   24.561003]  fff00000c6507180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.561130]  fff00000c6507200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.561503] ==================================================================

[   24.656119] ==================================================================
[   24.656208] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   24.656314] Write of size 1 at addr fff00000c56e6f78 by task kunit_try_catch/136
[   24.656433] 
[   24.656499] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.656684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.656747] Hardware name: linux,dummy-virt (DT)
[   24.658605] Call trace:
[   24.658673]  show_stack+0x20/0x38 (C)
[   24.658808]  dump_stack_lvl+0x8c/0xd0
[   24.659015]  print_report+0x118/0x608
[   24.659149]  kasan_report+0xdc/0x128
[   24.659274]  __asan_report_store1_noabort+0x20/0x30
[   24.659417]  kmalloc_oob_right+0x538/0x660
[   24.659559]  kunit_try_run_case+0x170/0x3f0
[   24.659816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.659972]  kthread+0x328/0x630
[   24.660083]  ret_from_fork+0x10/0x20
[   24.660198] 
[   24.660241] Allocated by task 136:
[   24.660322]  kasan_save_stack+0x3c/0x68
[   24.660516]  kasan_save_track+0x20/0x40
[   24.660706]  kasan_save_alloc_info+0x40/0x58
[   24.661091]  __kasan_kmalloc+0xd4/0xd8
[   24.661203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.661313]  kmalloc_oob_right+0xb0/0x660
[   24.661473]  kunit_try_run_case+0x170/0x3f0
[   24.661570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.661671]  kthread+0x328/0x630
[   24.661749]  ret_from_fork+0x10/0x20
[   24.661860] 
[   24.661952] The buggy address belongs to the object at fff00000c56e6f00
[   24.661952]  which belongs to the cache kmalloc-128 of size 128
[   24.662151] The buggy address is located 5 bytes to the right of
[   24.662151]  allocated 115-byte region [fff00000c56e6f00, fff00000c56e6f73)
[   24.662569] 
[   24.662685] The buggy address belongs to the physical page:
[   24.662824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e6
[   24.662981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.663173] page_type: f5(slab)
[   24.663282] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.663419] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.663521] page dumped because: kasan: bad access detected
[   24.663624] 
[   24.663685] Memory state around the buggy address:
[   24.663816]  fff00000c56e6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.663979]  fff00000c56e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.664136] >fff00000c56e6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.664273]                                                                 ^
[   24.664389]  fff00000c56e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.664506]  fff00000c56e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.664600] ==================================================================
[   24.644447] ==================================================================
[   24.644858] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   24.646263] Write of size 1 at addr fff00000c56e6f73 by task kunit_try_catch/136
[   24.646398] 
[   24.647340] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc1 #1 PREEMPT 
[   24.647518] Tainted: [N]=TEST
[   24.647564] Hardware name: linux,dummy-virt (DT)
[   24.647869] Call trace:
[   24.648076]  show_stack+0x20/0x38 (C)
[   24.648243]  dump_stack_lvl+0x8c/0xd0
[   24.648330]  print_report+0x118/0x608
[   24.648397]  kasan_report+0xdc/0x128
[   24.648454]  __asan_report_store1_noabort+0x20/0x30
[   24.648513]  kmalloc_oob_right+0x5a4/0x660
[   24.648569]  kunit_try_run_case+0x170/0x3f0
[   24.648631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.648695]  kthread+0x328/0x630
[   24.648749]  ret_from_fork+0x10/0x20
[   24.648953] 
[   24.649005] Allocated by task 136:
[   24.649279]  kasan_save_stack+0x3c/0x68
[   24.649373]  kasan_save_track+0x20/0x40
[   24.649426]  kasan_save_alloc_info+0x40/0x58
[   24.649475]  __kasan_kmalloc+0xd4/0xd8
[   24.649518]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.649568]  kmalloc_oob_right+0xb0/0x660
[   24.649611]  kunit_try_run_case+0x170/0x3f0
[   24.649657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.649708]  kthread+0x328/0x630
[   24.649747]  ret_from_fork+0x10/0x20
[   24.649815] 
[   24.649955] The buggy address belongs to the object at fff00000c56e6f00
[   24.649955]  which belongs to the cache kmalloc-128 of size 128
[   24.650078] The buggy address is located 0 bytes to the right of
[   24.650078]  allocated 115-byte region [fff00000c56e6f00, fff00000c56e6f73)
[   24.650164] 
[   24.650264] The buggy address belongs to the physical page:
[   24.650473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e6
[   24.650787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.651158] page_type: f5(slab)
[   24.651505] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.651583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.651714] page dumped because: kasan: bad access detected
[   24.651768] 
[   24.651814] Memory state around the buggy address:
[   24.652095]  fff00000c56e6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.652182]  fff00000c56e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.652250] >fff00000c56e6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.652319]                                                              ^
[   24.652422]  fff00000c56e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.652474]  fff00000c56e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.652548] ==================================================================
[   24.666793] ==================================================================
[   24.668069] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   24.668184] Read of size 1 at addr fff00000c56e6f80 by task kunit_try_catch/136
[   24.669283] 
[   24.669363] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.670157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.670225] Hardware name: linux,dummy-virt (DT)
[   24.671164] Call trace:
[   24.671693]  show_stack+0x20/0x38 (C)
[   24.671832]  dump_stack_lvl+0x8c/0xd0
[   24.671966]  print_report+0x118/0x608
[   24.673775]  kasan_report+0xdc/0x128
[   24.674712]  __asan_report_load1_noabort+0x20/0x30
[   24.674996]  kmalloc_oob_right+0x5d0/0x660
[   24.675428]  kunit_try_run_case+0x170/0x3f0
[   24.675597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.675728]  kthread+0x328/0x630
[   24.676245]  ret_from_fork+0x10/0x20
[   24.676372] 
[   24.676417] Allocated by task 136:
[   24.676482]  kasan_save_stack+0x3c/0x68
[   24.676612]  kasan_save_track+0x20/0x40
[   24.676780]  kasan_save_alloc_info+0x40/0x58
[   24.676903]  __kasan_kmalloc+0xd4/0xd8
[   24.677012]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.677126]  kmalloc_oob_right+0xb0/0x660
[   24.677233]  kunit_try_run_case+0x170/0x3f0
[   24.678059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.678178]  kthread+0x328/0x630
[   24.678266]  ret_from_fork+0x10/0x20
[   24.678719] 
[   24.678770] The buggy address belongs to the object at fff00000c56e6f00
[   24.678770]  which belongs to the cache kmalloc-128 of size 128
[   24.679035] The buggy address is located 13 bytes to the right of
[   24.679035]  allocated 115-byte region [fff00000c56e6f00, fff00000c56e6f73)
[   24.679191] 
[   24.679238] The buggy address belongs to the physical page:
[   24.679307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e6
[   24.679435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.679714] page_type: f5(slab)
[   24.679955] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.680370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.680551] page dumped because: kasan: bad access detected
[   24.680694] 
[   24.680789] Memory state around the buggy address:
[   24.680960]  fff00000c56e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.681069]  fff00000c56e6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.681185] >fff00000c56e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.681359]                    ^
[   24.681890]  fff00000c56e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.682691]  fff00000c56e7080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.682917] ==================================================================

[   17.278125] ==================================================================
[   17.278804] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   17.279352] Read of size 1 at addr ffff888101b20780 by task kunit_try_catch/154
[   17.280270] 
[   17.280551] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.280661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.280697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.280755] Call Trace:
[   17.280805]  <TASK>
[   17.280856]  dump_stack_lvl+0x73/0xb0
[   17.280955]  print_report+0xd1/0x650
[   17.281031]  ? __virt_addr_valid+0x1db/0x2d0
[   17.281101]  ? kmalloc_oob_right+0x68a/0x7f0
[   17.281174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.281306]  ? kmalloc_oob_right+0x68a/0x7f0
[   17.281386]  kasan_report+0x141/0x180
[   17.281463]  ? kmalloc_oob_right+0x68a/0x7f0
[   17.281566]  __asan_report_load1_noabort+0x18/0x20
[   17.281648]  kmalloc_oob_right+0x68a/0x7f0
[   17.281712]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   17.281822]  ? __schedule+0x10cc/0x2b60
[   17.281885]  ? __pfx_read_tsc+0x10/0x10
[   17.281940]  ? ktime_get_ts64+0x86/0x230
[   17.282000]  kunit_try_run_case+0x1a5/0x480
[   17.282068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.282137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.282213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.282473]  ? __kthread_parkme+0x82/0x180
[   17.282567]  ? preempt_count_sub+0x50/0x80
[   17.282629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.282696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.282765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.282841]  kthread+0x337/0x6f0
[   17.282904]  ? trace_preempt_on+0x20/0xc0
[   17.282982]  ? __pfx_kthread+0x10/0x10
[   17.283048]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.283119]  ? calculate_sigpending+0x7b/0xa0
[   17.283195]  ? __pfx_kthread+0x10/0x10
[   17.283363]  ret_from_fork+0x116/0x1d0
[   17.283433]  ? __pfx_kthread+0x10/0x10
[   17.283519]  ret_from_fork_asm+0x1a/0x30
[   17.283612]  </TASK>
[   17.283649] 
[   17.302365] Allocated by task 154:
[   17.303028]  kasan_save_stack+0x45/0x70
[   17.303587]  kasan_save_track+0x18/0x40
[   17.303993]  kasan_save_alloc_info+0x3b/0x50
[   17.304465]  __kasan_kmalloc+0xb7/0xc0
[   17.304911]  __kmalloc_cache_noprof+0x189/0x420
[   17.305460]  kmalloc_oob_right+0xa9/0x7f0
[   17.305978]  kunit_try_run_case+0x1a5/0x480
[   17.306552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.307025]  kthread+0x337/0x6f0
[   17.307479]  ret_from_fork+0x116/0x1d0
[   17.307880]  ret_from_fork_asm+0x1a/0x30
[   17.308246] 
[   17.308491] The buggy address belongs to the object at ffff888101b20700
[   17.308491]  which belongs to the cache kmalloc-128 of size 128
[   17.309281] The buggy address is located 13 bytes to the right of
[   17.309281]  allocated 115-byte region [ffff888101b20700, ffff888101b20773)
[   17.310534] 
[   17.310792] The buggy address belongs to the physical page:
[   17.311313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   17.311946] flags: 0x200000000000000(node=0|zone=2)
[   17.312835] page_type: f5(slab)
[   17.313149] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.313908] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.314374] page dumped because: kasan: bad access detected
[   17.314936] 
[   17.315357] Memory state around the buggy address:
[   17.315901]  ffff888101b20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.316901]  ffff888101b20700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.317466] >ffff888101b20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.318317]                    ^
[   17.318723]  ffff888101b20800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.319303]  ffff888101b20880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.320567] ==================================================================
[   17.239767] ==================================================================
[   17.240487] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   17.241132] Write of size 1 at addr ffff888101b20778 by task kunit_try_catch/154
[   17.241777] 
[   17.242059] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.242187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.242270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.242340] Call Trace:
[   17.242394]  <TASK>
[   17.242446]  dump_stack_lvl+0x73/0xb0
[   17.242559]  print_report+0xd1/0x650
[   17.242641]  ? __virt_addr_valid+0x1db/0x2d0
[   17.242720]  ? kmalloc_oob_right+0x6bd/0x7f0
[   17.242791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.242869]  ? kmalloc_oob_right+0x6bd/0x7f0
[   17.242946]  kasan_report+0x141/0x180
[   17.243020]  ? kmalloc_oob_right+0x6bd/0x7f0
[   17.243104]  __asan_report_store1_noabort+0x1b/0x30
[   17.243193]  kmalloc_oob_right+0x6bd/0x7f0
[   17.243324]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   17.243407]  ? __schedule+0x10cc/0x2b60
[   17.243488]  ? __pfx_read_tsc+0x10/0x10
[   17.243586]  ? ktime_get_ts64+0x86/0x230
[   17.243670]  kunit_try_run_case+0x1a5/0x480
[   17.243753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.243821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.243864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.243902]  ? __kthread_parkme+0x82/0x180
[   17.243935]  ? preempt_count_sub+0x50/0x80
[   17.243969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.244008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.244044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.244081]  kthread+0x337/0x6f0
[   17.244109]  ? trace_preempt_on+0x20/0xc0
[   17.244143]  ? __pfx_kthread+0x10/0x10
[   17.244174]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.244206]  ? calculate_sigpending+0x7b/0xa0
[   17.244302]  ? __pfx_kthread+0x10/0x10
[   17.244339]  ret_from_fork+0x116/0x1d0
[   17.244367]  ? __pfx_kthread+0x10/0x10
[   17.244397]  ret_from_fork_asm+0x1a/0x30
[   17.244444]  </TASK>
[   17.244459] 
[   17.257540] Allocated by task 154:
[   17.257992]  kasan_save_stack+0x45/0x70
[   17.258638]  kasan_save_track+0x18/0x40
[   17.259037]  kasan_save_alloc_info+0x3b/0x50
[   17.261797]  __kasan_kmalloc+0xb7/0xc0
[   17.262253]  __kmalloc_cache_noprof+0x189/0x420
[   17.262735]  kmalloc_oob_right+0xa9/0x7f0
[   17.263113]  kunit_try_run_case+0x1a5/0x480
[   17.263675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.264122]  kthread+0x337/0x6f0
[   17.265351]  ret_from_fork+0x116/0x1d0
[   17.265727]  ret_from_fork_asm+0x1a/0x30
[   17.266067] 
[   17.266216] The buggy address belongs to the object at ffff888101b20700
[   17.266216]  which belongs to the cache kmalloc-128 of size 128
[   17.267020] The buggy address is located 5 bytes to the right of
[   17.267020]  allocated 115-byte region [ffff888101b20700, ffff888101b20773)
[   17.267925] 
[   17.268172] The buggy address belongs to the physical page:
[   17.268688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   17.269297] flags: 0x200000000000000(node=0|zone=2)
[   17.269815] page_type: f5(slab)
[   17.270181] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.270869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.271489] page dumped because: kasan: bad access detected
[   17.272007] 
[   17.272203] Memory state around the buggy address:
[   17.272631]  ffff888101b20600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.273323]  ffff888101b20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.273947] >ffff888101b20700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.274602]                                                                 ^
[   17.275119]  ffff888101b20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.275778]  ffff888101b20800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.276340] ==================================================================
[   17.186917] ==================================================================
[   17.188264] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   17.189391] Write of size 1 at addr ffff888101b20773 by task kunit_try_catch/154
[   17.190120] 
[   17.192177] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   17.192691] Tainted: [N]=TEST
[   17.192747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.193022] Call Trace:
[   17.193117]  <TASK>
[   17.193337]  dump_stack_lvl+0x73/0xb0
[   17.193483]  print_report+0xd1/0x650
[   17.193563]  ? __virt_addr_valid+0x1db/0x2d0
[   17.193606]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.193659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.193695]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.193728]  kasan_report+0x141/0x180
[   17.193760]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.193799]  __asan_report_store1_noabort+0x1b/0x30
[   17.193839]  kmalloc_oob_right+0x6f0/0x7f0
[   17.193873]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   17.193908]  ? __schedule+0x10cc/0x2b60
[   17.193943]  ? __pfx_read_tsc+0x10/0x10
[   17.193976]  ? ktime_get_ts64+0x86/0x230
[   17.194012]  kunit_try_run_case+0x1a5/0x480
[   17.194054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.194091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.194130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.194165]  ? __kthread_parkme+0x82/0x180
[   17.194196]  ? preempt_count_sub+0x50/0x80
[   17.194241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.194300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.194339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.194377]  kthread+0x337/0x6f0
[   17.194408]  ? trace_preempt_on+0x20/0xc0
[   17.194444]  ? __pfx_kthread+0x10/0x10
[   17.194475]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.194529]  ? calculate_sigpending+0x7b/0xa0
[   17.194572]  ? __pfx_kthread+0x10/0x10
[   17.194603]  ret_from_fork+0x116/0x1d0
[   17.194631]  ? __pfx_kthread+0x10/0x10
[   17.194661]  ret_from_fork_asm+0x1a/0x30
[   17.194745]  </TASK>
[   17.194834] 
[   17.212946] Allocated by task 154:
[   17.213828]  kasan_save_stack+0x45/0x70
[   17.214761]  kasan_save_track+0x18/0x40
[   17.215592]  kasan_save_alloc_info+0x3b/0x50
[   17.215963]  __kasan_kmalloc+0xb7/0xc0
[   17.216476]  __kmalloc_cache_noprof+0x189/0x420
[   17.216981]  kmalloc_oob_right+0xa9/0x7f0
[   17.217373]  kunit_try_run_case+0x1a5/0x480
[   17.218029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.218702]  kthread+0x337/0x6f0
[   17.219119]  ret_from_fork+0x116/0x1d0
[   17.219662]  ret_from_fork_asm+0x1a/0x30
[   17.220813] 
[   17.221173] The buggy address belongs to the object at ffff888101b20700
[   17.221173]  which belongs to the cache kmalloc-128 of size 128
[   17.222586] The buggy address is located 0 bytes to the right of
[   17.222586]  allocated 115-byte region [ffff888101b20700, ffff888101b20773)
[   17.223754] 
[   17.224329] The buggy address belongs to the physical page:
[   17.225475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20
[   17.226465] flags: 0x200000000000000(node=0|zone=2)
[   17.227735] page_type: f5(slab)
[   17.228972] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.229688] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.230817] page dumped because: kasan: bad access detected
[   17.231756] 
[   17.232003] Memory state around the buggy address:
[   17.232984]  ffff888101b20600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.233719]  ffff888101b20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.234302] >ffff888101b20700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.235085]                                                              ^
[   17.235761]  ffff888101b20780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.236362]  ffff888101b20800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.236991] ==================================================================

[   16.364063] ==================================================================
[   16.365131] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   16.366351] Write of size 1 at addr ffff8881029def73 by task kunit_try_catch/154
[   16.367207] 
[   16.369173] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   16.369675] Tainted: [N]=TEST
[   16.369722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.370034] Call Trace:
[   16.370177]  <TASK>
[   16.370374]  dump_stack_lvl+0x73/0xb0
[   16.370488]  print_report+0xd1/0x650
[   16.370920]  ? __virt_addr_valid+0x1db/0x2d0
[   16.370970]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.371001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.371032]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.371062]  kasan_report+0x141/0x180
[   16.371092]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.371167]  __asan_report_store1_noabort+0x1b/0x30
[   16.371206]  kmalloc_oob_right+0x6f0/0x7f0
[   16.371238]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.371269]  ? __schedule+0x10cc/0x2b60
[   16.371302]  ? __pfx_read_tsc+0x10/0x10
[   16.371331]  ? ktime_get_ts64+0x86/0x230
[   16.371364]  kunit_try_run_case+0x1a5/0x480
[   16.371400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.371466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.371498]  ? __kthread_parkme+0x82/0x180
[   16.371567]  ? preempt_count_sub+0x50/0x80
[   16.371649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.371721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.371754]  kthread+0x337/0x6f0
[   16.371781]  ? trace_preempt_on+0x20/0xc0
[   16.371814]  ? __pfx_kthread+0x10/0x10
[   16.371841]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.371871]  ? calculate_sigpending+0x7b/0xa0
[   16.371932]  ? __pfx_kthread+0x10/0x10
[   16.371962]  ret_from_fork+0x116/0x1d0
[   16.371987]  ? __pfx_kthread+0x10/0x10
[   16.372015]  ret_from_fork_asm+0x1a/0x30
[   16.372095]  </TASK>
[   16.372227] 
[   16.387791] Allocated by task 154:
[   16.388432]  kasan_save_stack+0x45/0x70
[   16.388987]  kasan_save_track+0x18/0x40
[   16.389470]  kasan_save_alloc_info+0x3b/0x50
[   16.390129]  __kasan_kmalloc+0xb7/0xc0
[   16.390717]  __kmalloc_cache_noprof+0x189/0x420
[   16.391264]  kmalloc_oob_right+0xa9/0x7f0
[   16.391833]  kunit_try_run_case+0x1a5/0x480
[   16.392350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.392965]  kthread+0x337/0x6f0
[   16.393376]  ret_from_fork+0x116/0x1d0
[   16.393798]  ret_from_fork_asm+0x1a/0x30
[   16.394655] 
[   16.395036] The buggy address belongs to the object at ffff8881029def00
[   16.395036]  which belongs to the cache kmalloc-128 of size 128
[   16.396279] The buggy address is located 0 bytes to the right of
[   16.396279]  allocated 115-byte region [ffff8881029def00, ffff8881029def73)
[   16.397195] 
[   16.397535] The buggy address belongs to the physical page:
[   16.398625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029de
[   16.400069] flags: 0x200000000000000(node=0|zone=2)
[   16.401641] page_type: f5(slab)
[   16.402748] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.403325] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.404218] page dumped because: kasan: bad access detected
[   16.404898] 
[   16.405161] Memory state around the buggy address:
[   16.406340]  ffff8881029dee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.407082]  ffff8881029dee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.407892] >ffff8881029def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.408688]                                                              ^
[   16.409301]  ffff8881029def80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.409731]  ffff8881029df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.410736] ==================================================================
[   16.455216] ==================================================================
[   16.455917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   16.456547] Read of size 1 at addr ffff8881029def80 by task kunit_try_catch/154
[   16.457250] 
[   16.457460] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   16.457570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.457671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.457753] Call Trace:
[   16.457793]  <TASK>
[   16.457858]  dump_stack_lvl+0x73/0xb0
[   16.457988]  print_report+0xd1/0x650
[   16.458070]  ? __virt_addr_valid+0x1db/0x2d0
[   16.458187]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.458265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.458337]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.458408]  kasan_report+0x141/0x180
[   16.458479]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.458559]  __asan_report_load1_noabort+0x18/0x20
[   16.458638]  kmalloc_oob_right+0x68a/0x7f0
[   16.458757]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.458835]  ? __schedule+0x10cc/0x2b60
[   16.458957]  ? __pfx_read_tsc+0x10/0x10
[   16.459032]  ? ktime_get_ts64+0x86/0x230
[   16.459143]  kunit_try_run_case+0x1a5/0x480
[   16.459227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.459291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.459327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.459362]  ? __kthread_parkme+0x82/0x180
[   16.459393]  ? preempt_count_sub+0x50/0x80
[   16.459424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.459458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.459491]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.459524]  kthread+0x337/0x6f0
[   16.459550]  ? trace_preempt_on+0x20/0xc0
[   16.459580]  ? __pfx_kthread+0x10/0x10
[   16.459608]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.459639]  ? calculate_sigpending+0x7b/0xa0
[   16.459672]  ? __pfx_kthread+0x10/0x10
[   16.459701]  ret_from_fork+0x116/0x1d0
[   16.459725]  ? __pfx_kthread+0x10/0x10
[   16.459755]  ret_from_fork_asm+0x1a/0x30
[   16.459795]  </TASK>
[   16.459810] 
[   16.473623] Allocated by task 154:
[   16.474062]  kasan_save_stack+0x45/0x70
[   16.474608]  kasan_save_track+0x18/0x40
[   16.475077]  kasan_save_alloc_info+0x3b/0x50
[   16.475640]  __kasan_kmalloc+0xb7/0xc0
[   16.476058]  __kmalloc_cache_noprof+0x189/0x420
[   16.476592]  kmalloc_oob_right+0xa9/0x7f0
[   16.477082]  kunit_try_run_case+0x1a5/0x480
[   16.477541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.478061]  kthread+0x337/0x6f0
[   16.478547]  ret_from_fork+0x116/0x1d0
[   16.478982]  ret_from_fork_asm+0x1a/0x30
[   16.479443] 
[   16.479680] The buggy address belongs to the object at ffff8881029def00
[   16.479680]  which belongs to the cache kmalloc-128 of size 128
[   16.481024] The buggy address is located 13 bytes to the right of
[   16.481024]  allocated 115-byte region [ffff8881029def00, ffff8881029def73)
[   16.483815] 
[   16.484016] The buggy address belongs to the physical page:
[   16.485063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029de
[   16.486299] flags: 0x200000000000000(node=0|zone=2)
[   16.486646] page_type: f5(slab)
[   16.487039] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.487784] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.488777] page dumped because: kasan: bad access detected
[   16.489212] 
[   16.489467] Memory state around the buggy address:
[   16.490060]  ffff8881029dee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490919]  ffff8881029def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.491695] >ffff8881029def80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.492781]                    ^
[   16.493086]  ffff8881029df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.493790]  ffff8881029df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.494612] ==================================================================
[   16.414701] ==================================================================
[   16.415299] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   16.415844] Write of size 1 at addr ffff8881029def78 by task kunit_try_catch/154
[   16.416844] 
[   16.417086] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   16.417238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.417273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.417535] Call Trace:
[   16.417584]  <TASK>
[   16.417624]  dump_stack_lvl+0x73/0xb0
[   16.417710]  print_report+0xd1/0x650
[   16.417785]  ? __virt_addr_valid+0x1db/0x2d0
[   16.417833]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.417895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.417959]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.417993]  kasan_report+0x141/0x180
[   16.418025]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.418062]  __asan_report_store1_noabort+0x1b/0x30
[   16.418113]  kmalloc_oob_right+0x6bd/0x7f0
[   16.418222]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.418311]  ? __schedule+0x10cc/0x2b60
[   16.418386]  ? __pfx_read_tsc+0x10/0x10
[   16.418453]  ? ktime_get_ts64+0x86/0x230
[   16.418518]  kunit_try_run_case+0x1a5/0x480
[   16.418556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.418590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.418622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.418655]  ? __kthread_parkme+0x82/0x180
[   16.418682]  ? preempt_count_sub+0x50/0x80
[   16.418712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.418746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.418778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.418811]  kthread+0x337/0x6f0
[   16.418837]  ? trace_preempt_on+0x20/0xc0
[   16.418867]  ? __pfx_kthread+0x10/0x10
[   16.418928]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.418959]  ? calculate_sigpending+0x7b/0xa0
[   16.418992]  ? __pfx_kthread+0x10/0x10
[   16.419020]  ret_from_fork+0x116/0x1d0
[   16.419045]  ? __pfx_kthread+0x10/0x10
[   16.419072]  ret_from_fork_asm+0x1a/0x30
[   16.419132]  </TASK>
[   16.419163] 
[   16.434544] Allocated by task 154:
[   16.435741]  kasan_save_stack+0x45/0x70
[   16.436801]  kasan_save_track+0x18/0x40
[   16.437802]  kasan_save_alloc_info+0x3b/0x50
[   16.438441]  __kasan_kmalloc+0xb7/0xc0
[   16.438828]  __kmalloc_cache_noprof+0x189/0x420
[   16.439273]  kmalloc_oob_right+0xa9/0x7f0
[   16.439654]  kunit_try_run_case+0x1a5/0x480
[   16.440174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.440691]  kthread+0x337/0x6f0
[   16.441084]  ret_from_fork+0x116/0x1d0
[   16.441465]  ret_from_fork_asm+0x1a/0x30
[   16.441919] 
[   16.442168] The buggy address belongs to the object at ffff8881029def00
[   16.442168]  which belongs to the cache kmalloc-128 of size 128
[   16.443163] The buggy address is located 5 bytes to the right of
[   16.443163]  allocated 115-byte region [ffff8881029def00, ffff8881029def73)
[   16.444062] 
[   16.444331] The buggy address belongs to the physical page:
[   16.444767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029de
[   16.445404] flags: 0x200000000000000(node=0|zone=2)
[   16.445890] page_type: f5(slab)
[   16.446352] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.447003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.447647] page dumped because: kasan: bad access detected
[   16.448337] 
[   16.448681] Memory state around the buggy address:
[   16.449147]  ffff8881029dee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.449617]  ffff8881029dee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.450369] >ffff8881029def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.451571]                                                                 ^
[   16.452423]  ffff8881029def80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.453145]  ffff8881029df000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.454019] ==================================================================

[   19.666686] ==================================================================
[   19.667393] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   19.668056] Write of size 1 at addr ffff00000cef7473 by task kunit_try_catch/189
[   19.668739] 
[   19.668906] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc1 #1 PREEMPT 
[   19.668954] Tainted: [N]=TEST
[   19.668965] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.668982] Call trace:
[   19.668993]  show_stack+0x20/0x38 (C)
[   19.669029]  dump_stack_lvl+0x8c/0xd0
[   19.669063]  print_report+0x118/0x608
[   19.669097]  kasan_report+0xdc/0x128
[   19.669128]  __asan_report_store1_noabort+0x20/0x30
[   19.669158]  kmalloc_oob_right+0x5a4/0x660
[   19.669186]  kunit_try_run_case+0x170/0x3f0
[   19.669220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.669258]  kthread+0x328/0x630
[   19.669284]  ret_from_fork+0x10/0x20
[   19.669315] 
[   19.674793] Allocated by task 189:
[   19.675120]  kasan_save_stack+0x3c/0x68
[   19.675499]  kasan_save_track+0x20/0x40
[   19.675875]  kasan_save_alloc_info+0x40/0x58
[   19.676292]  __kasan_kmalloc+0xd4/0xd8
[   19.676658]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.677095]  kmalloc_oob_right+0xb0/0x660
[   19.677483]  kunit_try_run_case+0x170/0x3f0
[   19.677889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.678412]  kthread+0x328/0x630
[   19.678728]  ret_from_fork+0x10/0x20
[   19.679078] 
[   19.679230] The buggy address belongs to the object at ffff00000cef7400
[   19.679230]  which belongs to the cache kmalloc-128 of size 128
[   19.680362] The buggy address is located 0 bytes to the right of
[   19.680362]  allocated 115-byte region [ffff00000cef7400, ffff00000cef7473)
[   19.681535] 
[   19.681689] The buggy address belongs to the physical page:
[   19.682203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcef7
[   19.682925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.683535] page_type: f5(slab)
[   19.683848] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.684563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.685271] page dumped because: kasan: bad access detected
[   19.685784] 
[   19.685936] Memory state around the buggy address:
[   19.686385]  ffff00000cef7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.687050]  ffff00000cef7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.687714] >ffff00000cef7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.688374]                                                              ^
[   19.689006]  ffff00000cef7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.689671]  ffff00000cef7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.690331] ==================================================================
[   19.716600] ==================================================================
[   19.717273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.717916] Read of size 1 at addr ffff00000cef7480 by task kunit_try_catch/189
[   19.718579] 
[   19.718733] CPU: 4 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.718768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.718778] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.718789] Call trace:
[   19.718798]  show_stack+0x20/0x38 (C)
[   19.718822]  dump_stack_lvl+0x8c/0xd0
[   19.718845]  print_report+0x118/0x608
[   19.718867]  kasan_report+0xdc/0x128
[   19.718888]  __asan_report_load1_noabort+0x20/0x30
[   19.718912]  kmalloc_oob_right+0x5d0/0x660
[   19.718931]  kunit_try_run_case+0x170/0x3f0
[   19.718953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.718977]  kthread+0x328/0x630
[   19.718994]  ret_from_fork+0x10/0x20
[   19.719015] 
[   19.724538] Allocated by task 189:
[   19.724853]  kasan_save_stack+0x3c/0x68
[   19.725216]  kasan_save_track+0x20/0x40
[   19.725577]  kasan_save_alloc_info+0x40/0x58
[   19.725977]  __kasan_kmalloc+0xd4/0xd8
[   19.726329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.726750]  kmalloc_oob_right+0xb0/0x660
[   19.727124]  kunit_try_run_case+0x170/0x3f0
[   19.727515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.728022]  kthread+0x328/0x630
[   19.728325]  ret_from_fork+0x10/0x20
[   19.728662] 
[   19.728808] The buggy address belongs to the object at ffff00000cef7400
[   19.728808]  which belongs to the cache kmalloc-128 of size 128
[   19.729923] The buggy address is located 13 bytes to the right of
[   19.729923]  allocated 115-byte region [ffff00000cef7400, ffff00000cef7473)
[   19.731086] 
[   19.731233] The buggy address belongs to the physical page:
[   19.731736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcef7
[   19.732446] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.733042] page_type: f5(slab)
[   19.733341] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.734042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.734736] page dumped because: kasan: bad access detected
[   19.735239] 
[   19.735384] Memory state around the buggy address:
[   19.735821]  ffff00000cef7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.736474]  ffff00000cef7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.737126] >ffff00000cef7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.737774]                    ^
[   19.738074]  ffff00000cef7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.738726]  ffff00000cef7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.739375] ==================================================================
[   19.691851] ==================================================================
[   19.692514] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.693171] Write of size 1 at addr ffff00000cef7478 by task kunit_try_catch/189
[   19.693854] 
[   19.694018] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.694066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.694079] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.694096] Call trace:
[   19.694107]  show_stack+0x20/0x38 (C)
[   19.694139]  dump_stack_lvl+0x8c/0xd0
[   19.694174]  print_report+0x118/0x608
[   19.694207]  kasan_report+0xdc/0x128
[   19.694238]  __asan_report_store1_noabort+0x20/0x30
[   19.694268]  kmalloc_oob_right+0x538/0x660
[   19.694296]  kunit_try_run_case+0x170/0x3f0
[   19.694330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.694366]  kthread+0x328/0x630
[   19.694392]  ret_from_fork+0x10/0x20
[   19.694423] 
[   19.700003] Allocated by task 189:
[   19.700327]  kasan_save_stack+0x3c/0x68
[   19.700703]  kasan_save_track+0x20/0x40
[   19.701078]  kasan_save_alloc_info+0x40/0x58
[   19.701492]  __kasan_kmalloc+0xd4/0xd8
[   19.701858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.702294]  kmalloc_oob_right+0xb0/0x660
[   19.702682]  kunit_try_run_case+0x170/0x3f0
[   19.703087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.703609]  kthread+0x328/0x630
[   19.703924]  ret_from_fork+0x10/0x20
[   19.704274] 
[   19.704427] The buggy address belongs to the object at ffff00000cef7400
[   19.704427]  which belongs to the cache kmalloc-128 of size 128
[   19.705557] The buggy address is located 5 bytes to the right of
[   19.705557]  allocated 115-byte region [ffff00000cef7400, ffff00000cef7473)
[   19.706730] 
[   19.706884] The buggy address belongs to the physical page:
[   19.707398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcef7
[   19.708120] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.708730] page_type: f5(slab)
[   19.709042] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.709755] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.710461] page dumped because: kasan: bad access detected
[   19.710974] 
[   19.711126] Memory state around the buggy address:
[   19.711573]  ffff00000cef7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.712238]  ffff00000cef7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712902] >ffff00000cef7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.713562]                                                                 ^
[   19.714217]  ffff00000cef7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.714881]  ffff00000cef7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.715541] ==================================================================