Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.586661] ==================================================================
[   16.587037] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.587840] Write of size 1 at addr fff00000c635a673 by task kunit_try_catch/137
[   16.587943] 
[   16.588698] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   16.588840] Tainted: [N]=TEST
[   16.588873] Hardware name: linux,dummy-virt (DT)
[   16.589106] Call trace:
[   16.589273]  show_stack+0x20/0x38 (C)
[   16.589405]  dump_stack_lvl+0x8c/0xd0
[   16.589464]  print_report+0x118/0x608
[   16.589510]  kasan_report+0xdc/0x128
[   16.589554]  __asan_report_store1_noabort+0x20/0x30
[   16.589604]  kmalloc_oob_right+0x5a4/0x660
[   16.589654]  kunit_try_run_case+0x170/0x3f0
[   16.589703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.589754]  kthread+0x328/0x630
[   16.589797]  ret_from_fork+0x10/0x20
[   16.589949] 
[   16.589997] Allocated by task 137:
[   16.590110]  kasan_save_stack+0x3c/0x68
[   16.590173]  kasan_save_track+0x20/0x40
[   16.590210]  kasan_save_alloc_info+0x40/0x58
[   16.590248]  __kasan_kmalloc+0xd4/0xd8
[   16.590283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.590322]  kmalloc_oob_right+0xb0/0x660
[   16.590356]  kunit_try_run_case+0x170/0x3f0
[   16.590392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.590434]  kthread+0x328/0x630
[   16.590464]  ret_from_fork+0x10/0x20
[   16.590516] 
[   16.590574] The buggy address belongs to the object at fff00000c635a600
[   16.590574]  which belongs to the cache kmalloc-128 of size 128
[   16.590722] The buggy address is located 0 bytes to the right of
[   16.590722]  allocated 115-byte region [fff00000c635a600, fff00000c635a673)
[   16.590792] 
[   16.590884] The buggy address belongs to the physical page:
[   16.591068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.591329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.591608] page_type: f5(slab)
[   16.591910] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.591973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.592090] page dumped because: kasan: bad access detected
[   16.592128] 
[   16.592153] Memory state around the buggy address:
[   16.592371]  fff00000c635a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.592434]  fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592486] >fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.592538]                                                              ^
[   16.592617]  fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592658]  fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592716] ==================================================================
[   16.599524] ==================================================================
[   16.599570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.599911] Read of size 1 at addr fff00000c635a680 by task kunit_try_catch/137
[   16.600103] 
[   16.600142] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.600376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.600443] Hardware name: linux,dummy-virt (DT)
[   16.600473] Call trace:
[   16.600493]  show_stack+0x20/0x38 (C)
[   16.600764]  dump_stack_lvl+0x8c/0xd0
[   16.601103]  print_report+0x118/0x608
[   16.601177]  kasan_report+0xdc/0x128
[   16.601340]  __asan_report_load1_noabort+0x20/0x30
[   16.601522]  kmalloc_oob_right+0x5d0/0x660
[   16.601655]  kunit_try_run_case+0x170/0x3f0
[   16.601705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.601756]  kthread+0x328/0x630
[   16.602126]  ret_from_fork+0x10/0x20
[   16.602196] 
[   16.602214] Allocated by task 137:
[   16.602240]  kasan_save_stack+0x3c/0x68
[   16.602525]  kasan_save_track+0x20/0x40
[   16.602716]  kasan_save_alloc_info+0x40/0x58
[   16.602833]  __kasan_kmalloc+0xd4/0xd8
[   16.602919]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.603048]  kmalloc_oob_right+0xb0/0x660
[   16.603088]  kunit_try_run_case+0x170/0x3f0
[   16.603136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.603184]  kthread+0x328/0x630
[   16.603214]  ret_from_fork+0x10/0x20
[   16.603248] 
[   16.603267] The buggy address belongs to the object at fff00000c635a600
[   16.603267]  which belongs to the cache kmalloc-128 of size 128
[   16.603322] The buggy address is located 13 bytes to the right of
[   16.603322]  allocated 115-byte region [fff00000c635a600, fff00000c635a673)
[   16.603384] 
[   16.603404] The buggy address belongs to the physical page:
[   16.603434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.603835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.603902] page_type: f5(slab)
[   16.603942] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.604255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.604376] page dumped because: kasan: bad access detected
[   16.604448] 
[   16.604466] Memory state around the buggy address:
[   16.604517]  fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.604943]  fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.605041] >fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605186]                    ^
[   16.605216]  fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605502]  fff00000c635a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605581] ==================================================================
[   16.593432] ==================================================================
[   16.593475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.593519] Write of size 1 at addr fff00000c635a678 by task kunit_try_catch/137
[   16.593694] 
[   16.593728] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.593807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.593832] Hardware name: linux,dummy-virt (DT)
[   16.593860] Call trace:
[   16.593880]  show_stack+0x20/0x38 (C)
[   16.593927]  dump_stack_lvl+0x8c/0xd0
[   16.594253]  print_report+0x118/0x608
[   16.594726]  kasan_report+0xdc/0x128
[   16.594920]  __asan_report_store1_noabort+0x20/0x30
[   16.594991]  kmalloc_oob_right+0x538/0x660
[   16.595319]  kunit_try_run_case+0x170/0x3f0
[   16.595406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.596018]  kthread+0x328/0x630
[   16.596074]  ret_from_fork+0x10/0x20
[   16.596161] 
[   16.596204] Allocated by task 137:
[   16.596390]  kasan_save_stack+0x3c/0x68
[   16.596437]  kasan_save_track+0x20/0x40
[   16.596551]  kasan_save_alloc_info+0x40/0x58
[   16.596657]  __kasan_kmalloc+0xd4/0xd8
[   16.597013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.597088]  kmalloc_oob_right+0xb0/0x660
[   16.597124]  kunit_try_run_case+0x170/0x3f0
[   16.597199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.597246]  kthread+0x328/0x630
[   16.597277]  ret_from_fork+0x10/0x20
[   16.597311] 
[   16.597337] The buggy address belongs to the object at fff00000c635a600
[   16.597337]  which belongs to the cache kmalloc-128 of size 128
[   16.597403] The buggy address is located 5 bytes to the right of
[   16.597403]  allocated 115-byte region [fff00000c635a600, fff00000c635a673)
[   16.597465] 
[   16.597483] The buggy address belongs to the physical page:
[   16.597511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.597566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.597628] page_type: f5(slab)
[   16.597664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.597722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.597760] page dumped because: kasan: bad access detected
[   16.597799] 
[   16.597823] Memory state around the buggy address:
[   16.597853]  fff00000c635a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.597894]  fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.597935] >fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.597970]                                                                 ^
[   16.598035]  fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.598076]  fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.598111] ==================================================================

[   16.508473] ==================================================================
[   16.508511] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.508558] Write of size 1 at addr fff00000c63cd678 by task kunit_try_catch/137
[   16.508605] 
[   16.508636] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.508713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.508738] Hardware name: linux,dummy-virt (DT)
[   16.508768] Call trace:
[   16.509299]  show_stack+0x20/0x38 (C)
[   16.509361]  dump_stack_lvl+0x8c/0xd0
[   16.509408]  print_report+0x118/0x608
[   16.509452]  kasan_report+0xdc/0x128
[   16.509495]  __asan_report_store1_noabort+0x20/0x30
[   16.509545]  kmalloc_oob_right+0x538/0x660
[   16.509599]  kunit_try_run_case+0x170/0x3f0
[   16.509647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.509927]  kthread+0x328/0x630
[   16.509975]  ret_from_fork+0x10/0x20
[   16.510032] 
[   16.510050] Allocated by task 137:
[   16.510077]  kasan_save_stack+0x3c/0x68
[   16.510136]  kasan_save_track+0x20/0x40
[   16.510173]  kasan_save_alloc_info+0x40/0x58
[   16.510233]  __kasan_kmalloc+0xd4/0xd8
[   16.510280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.510318]  kmalloc_oob_right+0xb0/0x660
[   16.510352]  kunit_try_run_case+0x170/0x3f0
[   16.510389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.510429]  kthread+0x328/0x630
[   16.510460]  ret_from_fork+0x10/0x20
[   16.510494] 
[   16.510512] The buggy address belongs to the object at fff00000c63cd600
[   16.510512]  which belongs to the cache kmalloc-128 of size 128
[   16.510632] The buggy address is located 5 bytes to the right of
[   16.510632]  allocated 115-byte region [fff00000c63cd600, fff00000c63cd673)
[   16.510797] 
[   16.510845] The buggy address belongs to the physical page:
[   16.510880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   16.510959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.511005] page_type: f5(slab)
[   16.511040] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.511166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.511208] page dumped because: kasan: bad access detected
[   16.511237] 
[   16.511254] Memory state around the buggy address:
[   16.511312]  fff00000c63cd500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.511386]  fff00000c63cd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511426] >fff00000c63cd600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.511462]                                                                 ^
[   16.511509]  fff00000c63cd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511550]  fff00000c63cd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511618] ==================================================================
[   16.512586] ==================================================================
[   16.512679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.512794] Read of size 1 at addr fff00000c63cd680 by task kunit_try_catch/137
[   16.512864] 
[   16.512893] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.512980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.513006] Hardware name: linux,dummy-virt (DT)
[   16.513034] Call trace:
[   16.513060]  show_stack+0x20/0x38 (C)
[   16.513115]  dump_stack_lvl+0x8c/0xd0
[   16.513162]  print_report+0x118/0x608
[   16.513281]  kasan_report+0xdc/0x128
[   16.513330]  __asan_report_load1_noabort+0x20/0x30
[   16.513379]  kmalloc_oob_right+0x5d0/0x660
[   16.513482]  kunit_try_run_case+0x170/0x3f0
[   16.513561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.513612]  kthread+0x328/0x630
[   16.513651]  ret_from_fork+0x10/0x20
[   16.513906] 
[   16.513976] Allocated by task 137:
[   16.514004]  kasan_save_stack+0x3c/0x68
[   16.514156]  kasan_save_track+0x20/0x40
[   16.514248]  kasan_save_alloc_info+0x40/0x58
[   16.514299]  __kasan_kmalloc+0xd4/0xd8
[   16.514334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.514371]  kmalloc_oob_right+0xb0/0x660
[   16.514405]  kunit_try_run_case+0x170/0x3f0
[   16.514478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.514520]  kthread+0x328/0x630
[   16.514551]  ret_from_fork+0x10/0x20
[   16.514585] 
[   16.514636] The buggy address belongs to the object at fff00000c63cd600
[   16.514636]  which belongs to the cache kmalloc-128 of size 128
[   16.514692] The buggy address is located 13 bytes to the right of
[   16.514692]  allocated 115-byte region [fff00000c63cd600, fff00000c63cd673)
[   16.514754] 
[   16.514773] The buggy address belongs to the physical page:
[   16.514801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   16.514851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.514988] page_type: f5(slab)
[   16.515101] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.515200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.515266] page dumped because: kasan: bad access detected
[   16.515347] 
[   16.515364] Memory state around the buggy address:
[   16.515443]  fff00000c63cd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515566]  fff00000c63cd600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.515608] >fff00000c63cd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515643]                    ^
[   16.515670]  fff00000c63cd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515765]  fff00000c63cd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515951] ==================================================================
[   16.497712] ==================================================================
[   16.498051] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.499221] Write of size 1 at addr fff00000c63cd673 by task kunit_try_catch/137
[   16.499536] 
[   16.500471] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   16.500748] Tainted: [N]=TEST
[   16.500993] Hardware name: linux,dummy-virt (DT)
[   16.501263] Call trace:
[   16.501594]  show_stack+0x20/0x38 (C)
[   16.502024]  dump_stack_lvl+0x8c/0xd0
[   16.502149]  print_report+0x118/0x608
[   16.502226]  kasan_report+0xdc/0x128
[   16.502405]  __asan_report_store1_noabort+0x20/0x30
[   16.502455]  kmalloc_oob_right+0x5a4/0x660
[   16.502539]  kunit_try_run_case+0x170/0x3f0
[   16.502673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.502847]  kthread+0x328/0x630
[   16.502929]  ret_from_fork+0x10/0x20
[   16.503096] 
[   16.503134] Allocated by task 137:
[   16.503246]  kasan_save_stack+0x3c/0x68
[   16.503339]  kasan_save_track+0x20/0x40
[   16.503376]  kasan_save_alloc_info+0x40/0x58
[   16.503414]  __kasan_kmalloc+0xd4/0xd8
[   16.503449]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.503489]  kmalloc_oob_right+0xb0/0x660
[   16.503524]  kunit_try_run_case+0x170/0x3f0
[   16.503560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.503601]  kthread+0x328/0x630
[   16.503632]  ret_from_fork+0x10/0x20
[   16.503685] 
[   16.503743] The buggy address belongs to the object at fff00000c63cd600
[   16.503743]  which belongs to the cache kmalloc-128 of size 128
[   16.503855] The buggy address is located 0 bytes to the right of
[   16.503855]  allocated 115-byte region [fff00000c63cd600, fff00000c63cd673)
[   16.503951] 
[   16.504046] The buggy address belongs to the physical page:
[   16.504285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   16.504759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.505090] page_type: f5(slab)
[   16.505515] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.505601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505829] page dumped because: kasan: bad access detected
[   16.505926] 
[   16.505992] Memory state around the buggy address:
[   16.506431]  fff00000c63cd500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.506500]  fff00000c63cd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506551] >fff00000c63cd600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.506633]                                                              ^
[   16.506751]  fff00000c63cd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506792]  fff00000c63cd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506855] ==================================================================

[   12.427420] ==================================================================
[   12.428446] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   12.429281] Write of size 1 at addr ffff88810254d173 by task kunit_try_catch/154
[   12.429516] 
[   12.431222] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.431936] Tainted: [N]=TEST
[   12.431987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.432244] Call Trace:
[   12.432331]  <TASK>
[   12.432485]  dump_stack_lvl+0x73/0xb0
[   12.432664]  print_report+0xd1/0x650
[   12.432696]  ? __virt_addr_valid+0x1db/0x2d0
[   12.432721]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.432739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.432761]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.432779]  kasan_report+0x141/0x180
[   12.432798]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.432822]  __asan_report_store1_noabort+0x1b/0x30
[   12.432843]  kmalloc_oob_right+0x6f0/0x7f0
[   12.432862]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.432881]  ? __schedule+0x10cc/0x2b60
[   12.432901]  ? __pfx_read_tsc+0x10/0x10
[   12.432920]  ? ktime_get_ts64+0x86/0x230
[   12.432944]  kunit_try_run_case+0x1a5/0x480
[   12.432967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.432985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.433007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.433026]  ? __kthread_parkme+0x82/0x180
[   12.433046]  ? preempt_count_sub+0x50/0x80
[   12.433068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.433088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.433128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.433150]  kthread+0x337/0x6f0
[   12.433168]  ? trace_preempt_on+0x20/0xc0
[   12.433189]  ? __pfx_kthread+0x10/0x10
[   12.433207]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.433225]  ? calculate_sigpending+0x7b/0xa0
[   12.433248]  ? __pfx_kthread+0x10/0x10
[   12.433266]  ret_from_fork+0x116/0x1d0
[   12.433283]  ? __pfx_kthread+0x10/0x10
[   12.433301]  ret_from_fork_asm+0x1a/0x30
[   12.433354]  </TASK>
[   12.433423] 
[   12.445421] Allocated by task 154:
[   12.446275]  kasan_save_stack+0x45/0x70
[   12.446922]  kasan_save_track+0x18/0x40
[   12.447301]  kasan_save_alloc_info+0x3b/0x50
[   12.447672]  __kasan_kmalloc+0xb7/0xc0
[   12.448049]  __kmalloc_cache_noprof+0x189/0x420
[   12.448686]  kmalloc_oob_right+0xa9/0x7f0
[   12.449072]  kunit_try_run_case+0x1a5/0x480
[   12.449339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.449909]  kthread+0x337/0x6f0
[   12.450188]  ret_from_fork+0x116/0x1d0
[   12.450454]  ret_from_fork_asm+0x1a/0x30
[   12.451023] 
[   12.451333] The buggy address belongs to the object at ffff88810254d100
[   12.451333]  which belongs to the cache kmalloc-128 of size 128
[   12.452943] The buggy address is located 0 bytes to the right of
[   12.452943]  allocated 115-byte region [ffff88810254d100, ffff88810254d173)
[   12.453863] 
[   12.454211] The buggy address belongs to the physical page:
[   12.455157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   12.455965] flags: 0x200000000000000(node=0|zone=2)
[   12.456994] page_type: f5(slab)
[   12.457763] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.458337] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.458762] page dumped because: kasan: bad access detected
[   12.459185] 
[   12.459392] Memory state around the buggy address:
[   12.460006]  ffff88810254d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.460573]  ffff88810254d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.460908] >ffff88810254d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.461494]                                                              ^
[   12.462002]  ffff88810254d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.462352]  ffff88810254d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.462860] ==================================================================
[   12.493003] ==================================================================
[   12.493379] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.494066] Read of size 1 at addr ffff88810254d180 by task kunit_try_catch/154
[   12.494765] 
[   12.494953] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.495033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.495054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.495090] Call Trace:
[   12.495166]  <TASK>
[   12.495200]  dump_stack_lvl+0x73/0xb0
[   12.495255]  print_report+0xd1/0x650
[   12.495293]  ? __virt_addr_valid+0x1db/0x2d0
[   12.495331]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.495383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.495422]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.495454]  kasan_report+0x141/0x180
[   12.495492]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.495971]  __asan_report_load1_noabort+0x18/0x20
[   12.496018]  kmalloc_oob_right+0x68a/0x7f0
[   12.496058]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.496100]  ? __schedule+0x10cc/0x2b60
[   12.496160]  ? __pfx_read_tsc+0x10/0x10
[   12.496181]  ? ktime_get_ts64+0x86/0x230
[   12.496206]  kunit_try_run_case+0x1a5/0x480
[   12.496228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.496247]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.496268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.496287]  ? __kthread_parkme+0x82/0x180
[   12.496305]  ? preempt_count_sub+0x50/0x80
[   12.496326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.496346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.496365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.496384]  kthread+0x337/0x6f0
[   12.496402]  ? trace_preempt_on+0x20/0xc0
[   12.496423]  ? __pfx_kthread+0x10/0x10
[   12.496441]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.496458]  ? calculate_sigpending+0x7b/0xa0
[   12.496479]  ? __pfx_kthread+0x10/0x10
[   12.496506]  ret_from_fork+0x116/0x1d0
[   12.496535]  ? __pfx_kthread+0x10/0x10
[   12.496563]  ret_from_fork_asm+0x1a/0x30
[   12.496604]  </TASK>
[   12.496635] 
[   12.507585] Allocated by task 154:
[   12.507801]  kasan_save_stack+0x45/0x70
[   12.508116]  kasan_save_track+0x18/0x40
[   12.508308]  kasan_save_alloc_info+0x3b/0x50
[   12.508599]  __kasan_kmalloc+0xb7/0xc0
[   12.509096]  __kmalloc_cache_noprof+0x189/0x420
[   12.509304]  kmalloc_oob_right+0xa9/0x7f0
[   12.510271]  kunit_try_run_case+0x1a5/0x480
[   12.510770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.511091]  kthread+0x337/0x6f0
[   12.511325]  ret_from_fork+0x116/0x1d0
[   12.511827]  ret_from_fork_asm+0x1a/0x30
[   12.512209] 
[   12.512392] The buggy address belongs to the object at ffff88810254d100
[   12.512392]  which belongs to the cache kmalloc-128 of size 128
[   12.514018] The buggy address is located 13 bytes to the right of
[   12.514018]  allocated 115-byte region [ffff88810254d100, ffff88810254d173)
[   12.514655] 
[   12.514988] The buggy address belongs to the physical page:
[   12.515867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   12.516437] flags: 0x200000000000000(node=0|zone=2)
[   12.516843] page_type: f5(slab)
[   12.517417] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.518153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.519063] page dumped because: kasan: bad access detected
[   12.519690] 
[   12.519971] Memory state around the buggy address:
[   12.520195]  ffff88810254d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.520753]  ffff88810254d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.521322] >ffff88810254d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.521532]                    ^
[   12.521960]  ffff88810254d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.522372]  ffff88810254d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.522707] ==================================================================
[   12.464785] ==================================================================
[   12.465171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.465635] Write of size 1 at addr ffff88810254d178 by task kunit_try_catch/154
[   12.465989] 
[   12.466222] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.466298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.466320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.466355] Call Trace:
[   12.466376]  <TASK>
[   12.466407]  dump_stack_lvl+0x73/0xb0
[   12.466456]  print_report+0xd1/0x650
[   12.466486]  ? __virt_addr_valid+0x1db/0x2d0
[   12.466517]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.466544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.466576]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.466605]  kasan_report+0x141/0x180
[   12.466658]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.466701]  __asan_report_store1_noabort+0x1b/0x30
[   12.466737]  kmalloc_oob_right+0x6bd/0x7f0
[   12.466767]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.466829]  ? __schedule+0x10cc/0x2b60
[   12.466878]  ? __pfx_read_tsc+0x10/0x10
[   12.466913]  ? ktime_get_ts64+0x86/0x230
[   12.466957]  kunit_try_run_case+0x1a5/0x480
[   12.467001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.467039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.467080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.467148]  ? __kthread_parkme+0x82/0x180
[   12.467188]  ? preempt_count_sub+0x50/0x80
[   12.467227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.467259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.467297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.467334]  kthread+0x337/0x6f0
[   12.467366]  ? trace_preempt_on+0x20/0xc0
[   12.467412]  ? __pfx_kthread+0x10/0x10
[   12.467449]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.467503]  ? calculate_sigpending+0x7b/0xa0
[   12.467546]  ? __pfx_kthread+0x10/0x10
[   12.467585]  ret_from_fork+0x116/0x1d0
[   12.467632]  ? __pfx_kthread+0x10/0x10
[   12.467672]  ret_from_fork_asm+0x1a/0x30
[   12.467733]  </TASK>
[   12.467757] 
[   12.476264] Allocated by task 154:
[   12.476588]  kasan_save_stack+0x45/0x70
[   12.476844]  kasan_save_track+0x18/0x40
[   12.477009]  kasan_save_alloc_info+0x3b/0x50
[   12.477305]  __kasan_kmalloc+0xb7/0xc0
[   12.478926]  __kmalloc_cache_noprof+0x189/0x420
[   12.479460]  kmalloc_oob_right+0xa9/0x7f0
[   12.480684]  kunit_try_run_case+0x1a5/0x480
[   12.480953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.481857]  kthread+0x337/0x6f0
[   12.482326]  ret_from_fork+0x116/0x1d0
[   12.482475]  ret_from_fork_asm+0x1a/0x30
[   12.483070] 
[   12.483411] The buggy address belongs to the object at ffff88810254d100
[   12.483411]  which belongs to the cache kmalloc-128 of size 128
[   12.483812] The buggy address is located 5 bytes to the right of
[   12.483812]  allocated 115-byte region [ffff88810254d100, ffff88810254d173)
[   12.484548] 
[   12.484672] The buggy address belongs to the physical page:
[   12.485469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   12.486580] flags: 0x200000000000000(node=0|zone=2)
[   12.486971] page_type: f5(slab)
[   12.487494] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.487880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.488225] page dumped because: kasan: bad access detected
[   12.488750] 
[   12.488875] Memory state around the buggy address:
[   12.489035]  ffff88810254d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.489497]  ffff88810254d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.490232] >ffff88810254d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.490520]                                                                 ^
[   12.490968]  ffff88810254d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.491238]  ffff88810254d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.492089] ==================================================================

[   12.762005] ==================================================================
[   12.762375] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   12.762759] Write of size 1 at addr ffff8881031acc78 by task kunit_try_catch/153
[   12.763157] 
[   12.763299] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.763344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.763356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.763376] Call Trace:
[   12.763425]  <TASK>
[   12.763441]  dump_stack_lvl+0x73/0xb0
[   12.763468]  print_report+0xd1/0x650
[   12.763502]  ? __virt_addr_valid+0x1db/0x2d0
[   12.763524]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.763546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.763573]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.763595]  kasan_report+0x141/0x180
[   12.763617]  ? kmalloc_oob_right+0x6bd/0x7f0
[   12.763644]  __asan_report_store1_noabort+0x1b/0x30
[   12.763669]  kmalloc_oob_right+0x6bd/0x7f0
[   12.763691]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.763713]  ? __schedule+0x10cc/0x2b60
[   12.763757]  ? __pfx_read_tsc+0x10/0x10
[   12.763778]  ? ktime_get_ts64+0x86/0x230
[   12.763802]  kunit_try_run_case+0x1a5/0x480
[   12.763851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.763873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.763896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.763930]  ? __kthread_parkme+0x82/0x180
[   12.763950]  ? preempt_count_sub+0x50/0x80
[   12.763973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.763997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.764019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.764042]  kthread+0x337/0x6f0
[   12.764070]  ? trace_preempt_on+0x20/0xc0
[   12.764093]  ? __pfx_kthread+0x10/0x10
[   12.764114]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.764134]  ? calculate_sigpending+0x7b/0xa0
[   12.764157]  ? __pfx_kthread+0x10/0x10
[   12.764179]  ret_from_fork+0x116/0x1d0
[   12.764197]  ? __pfx_kthread+0x10/0x10
[   12.764218]  ret_from_fork_asm+0x1a/0x30
[   12.764250]  </TASK>
[   12.764261] 
[   12.771857] Allocated by task 153:
[   12.772019]  kasan_save_stack+0x45/0x70
[   12.772185]  kasan_save_track+0x18/0x40
[   12.772331]  kasan_save_alloc_info+0x3b/0x50
[   12.772609]  __kasan_kmalloc+0xb7/0xc0
[   12.772816]  __kmalloc_cache_noprof+0x189/0x420
[   12.773250]  kmalloc_oob_right+0xa9/0x7f0
[   12.773602]  kunit_try_run_case+0x1a5/0x480
[   12.773851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.774142]  kthread+0x337/0x6f0
[   12.774321]  ret_from_fork+0x116/0x1d0
[   12.774551]  ret_from_fork_asm+0x1a/0x30
[   12.774799] 
[   12.774914] The buggy address belongs to the object at ffff8881031acc00
[   12.774914]  which belongs to the cache kmalloc-128 of size 128
[   12.775407] The buggy address is located 5 bytes to the right of
[   12.775407]  allocated 115-byte region [ffff8881031acc00, ffff8881031acc73)
[   12.776090] 
[   12.776169] The buggy address belongs to the physical page:
[   12.776708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031ac
[   12.777232] flags: 0x200000000000000(node=0|zone=2)
[   12.777544] page_type: f5(slab)
[   12.777756] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.778150] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.778483] page dumped because: kasan: bad access detected
[   12.778843] 
[   12.778922] Memory state around the buggy address:
[   12.779099]  ffff8881031acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.779334]  ffff8881031acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.779715] >ffff8881031acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.780102]                                                                 ^
[   12.780440]  ffff8881031acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.780847]  ffff8881031acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.781213] ==================================================================
[   12.781676] ==================================================================
[   12.782131] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   12.782522] Read of size 1 at addr ffff8881031acc80 by task kunit_try_catch/153
[   12.782894] 
[   12.783084] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.783127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.783138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.783158] Call Trace:
[   12.783173]  <TASK>
[   12.783187]  dump_stack_lvl+0x73/0xb0
[   12.783213]  print_report+0xd1/0x650
[   12.783235]  ? __virt_addr_valid+0x1db/0x2d0
[   12.783257]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.783277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.783302]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.783324]  kasan_report+0x141/0x180
[   12.783346]  ? kmalloc_oob_right+0x68a/0x7f0
[   12.783372]  __asan_report_load1_noabort+0x18/0x20
[   12.783432]  kmalloc_oob_right+0x68a/0x7f0
[   12.783454]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.783488]  ? __schedule+0x10cc/0x2b60
[   12.783510]  ? __pfx_read_tsc+0x10/0x10
[   12.783530]  ? ktime_get_ts64+0x86/0x230
[   12.783555]  kunit_try_run_case+0x1a5/0x480
[   12.783579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.783600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.783651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.783674]  ? __kthread_parkme+0x82/0x180
[   12.783694]  ? preempt_count_sub+0x50/0x80
[   12.783728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.783751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.783773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.783796]  kthread+0x337/0x6f0
[   12.783815]  ? trace_preempt_on+0x20/0xc0
[   12.783838]  ? __pfx_kthread+0x10/0x10
[   12.783860]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.783881]  ? calculate_sigpending+0x7b/0xa0
[   12.783904]  ? __pfx_kthread+0x10/0x10
[   12.783926]  ret_from_fork+0x116/0x1d0
[   12.783944]  ? __pfx_kthread+0x10/0x10
[   12.783964]  ret_from_fork_asm+0x1a/0x30
[   12.784024]  </TASK>
[   12.784034] 
[   12.791243] Allocated by task 153:
[   12.791476]  kasan_save_stack+0x45/0x70
[   12.791685]  kasan_save_track+0x18/0x40
[   12.791885]  kasan_save_alloc_info+0x3b/0x50
[   12.792295]  __kasan_kmalloc+0xb7/0xc0
[   12.792647]  __kmalloc_cache_noprof+0x189/0x420
[   12.792995]  kmalloc_oob_right+0xa9/0x7f0
[   12.793154]  kunit_try_run_case+0x1a5/0x480
[   12.793306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.793486]  kthread+0x337/0x6f0
[   12.793616]  ret_from_fork+0x116/0x1d0
[   12.793908]  ret_from_fork_asm+0x1a/0x30
[   12.794169] 
[   12.794269] The buggy address belongs to the object at ffff8881031acc00
[   12.794269]  which belongs to the cache kmalloc-128 of size 128
[   12.794786] The buggy address is located 13 bytes to the right of
[   12.794786]  allocated 115-byte region [ffff8881031acc00, ffff8881031acc73)
[   12.795537] 
[   12.795614] The buggy address belongs to the physical page:
[   12.795958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031ac
[   12.796315] flags: 0x200000000000000(node=0|zone=2)
[   12.796488] page_type: f5(slab)
[   12.796612] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.797285] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.797690] page dumped because: kasan: bad access detected
[   12.797956] 
[   12.798031] Memory state around the buggy address:
[   12.798357]  ffff8881031acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.798751]  ffff8881031acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.799083] >ffff8881031acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.799455]                    ^
[   12.799577]  ffff8881031acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.799838]  ffff8881031acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.800284] ==================================================================
[   12.731885] ==================================================================
[   12.732534] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   12.733398] Write of size 1 at addr ffff8881031acc73 by task kunit_try_catch/153
[   12.733879] 
[   12.735040] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.735441] Tainted: [N]=TEST
[   12.735473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.735694] Call Trace:
[   12.735763]  <TASK>
[   12.735911]  dump_stack_lvl+0x73/0xb0
[   12.735999]  print_report+0xd1/0x650
[   12.736028]  ? __virt_addr_valid+0x1db/0x2d0
[   12.736067]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.736089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.736115]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.736137]  kasan_report+0x141/0x180
[   12.736159]  ? kmalloc_oob_right+0x6f0/0x7f0
[   12.736187]  __asan_report_store1_noabort+0x1b/0x30
[   12.736211]  kmalloc_oob_right+0x6f0/0x7f0
[   12.736234]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   12.736256]  ? __schedule+0x10cc/0x2b60
[   12.736280]  ? __pfx_read_tsc+0x10/0x10
[   12.736301]  ? ktime_get_ts64+0x86/0x230
[   12.736328]  kunit_try_run_case+0x1a5/0x480
[   12.736356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.736377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.736402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.736425]  ? __kthread_parkme+0x82/0x180
[   12.736446]  ? preempt_count_sub+0x50/0x80
[   12.736471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.736495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.736517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.736540]  kthread+0x337/0x6f0
[   12.736560]  ? trace_preempt_on+0x20/0xc0
[   12.736584]  ? __pfx_kthread+0x10/0x10
[   12.736605]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.736626]  ? calculate_sigpending+0x7b/0xa0
[   12.736651]  ? __pfx_kthread+0x10/0x10
[   12.736673]  ret_from_fork+0x116/0x1d0
[   12.736691]  ? __pfx_kthread+0x10/0x10
[   12.736712]  ret_from_fork_asm+0x1a/0x30
[   12.736768]  </TASK>
[   12.736832] 
[   12.749407] Allocated by task 153:
[   12.749781]  kasan_save_stack+0x45/0x70
[   12.750020]  kasan_save_track+0x18/0x40
[   12.750188]  kasan_save_alloc_info+0x3b/0x50
[   12.750437]  __kasan_kmalloc+0xb7/0xc0
[   12.750579]  __kmalloc_cache_noprof+0x189/0x420
[   12.750805]  kmalloc_oob_right+0xa9/0x7f0
[   12.750984]  kunit_try_run_case+0x1a5/0x480
[   12.751143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.751349]  kthread+0x337/0x6f0
[   12.751627]  ret_from_fork+0x116/0x1d0
[   12.751841]  ret_from_fork_asm+0x1a/0x30
[   12.752044] 
[   12.752220] The buggy address belongs to the object at ffff8881031acc00
[   12.752220]  which belongs to the cache kmalloc-128 of size 128
[   12.752982] The buggy address is located 0 bytes to the right of
[   12.752982]  allocated 115-byte region [ffff8881031acc00, ffff8881031acc73)
[   12.753628] 
[   12.753782] The buggy address belongs to the physical page:
[   12.754512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031ac
[   12.755097] flags: 0x200000000000000(node=0|zone=2)
[   12.755753] page_type: f5(slab)
[   12.756616] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.756942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.757415] page dumped because: kasan: bad access detected
[   12.757649] 
[   12.757797] Memory state around the buggy address:
[   12.758310]  ffff8881031acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.758660]  ffff8881031acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.759126] >ffff8881031acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.759497]                                                              ^
[   12.759909]  ffff8881031acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.760268]  ffff8881031acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.760624] ==================================================================

[   14.277512] ==================================================================
[   14.284736] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   14.291704] Write of size 1 at addr ffff8881066f8078 by task kunit_try_catch/177
[   14.299098] 
[   14.300596] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.300604] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   14.300607] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.300610] Call Trace:
[   14.300611]  <TASK>
[   14.300613]  dump_stack_lvl+0x73/0xb0
[   14.300618]  print_report+0xd1/0x650
[   14.300621]  ? __virt_addr_valid+0x1db/0x2d0
[   14.300625]  ? kmalloc_oob_right+0x6bd/0x7f0
[   14.300629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.300634]  ? kmalloc_oob_right+0x6bd/0x7f0
[   14.300638]  kasan_report+0x141/0x180
[   14.300642]  ? kmalloc_oob_right+0x6bd/0x7f0
[   14.300647]  __asan_report_store1_noabort+0x1b/0x30
[   14.300651]  kmalloc_oob_right+0x6bd/0x7f0
[   14.300655]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   14.300659]  ? __schedule+0x10cc/0x2b60
[   14.300663]  ? ktime_get_ts64+0x83/0x230
[   14.300668]  kunit_try_run_case+0x1a2/0x480
[   14.300672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.300676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.300680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.300684]  ? __kthread_parkme+0x82/0x180
[   14.300688]  ? preempt_count_sub+0x50/0x80
[   14.300692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.300696]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.300700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.300704]  kthread+0x334/0x6f0
[   14.300708]  ? trace_preempt_on+0x20/0xc0
[   14.300712]  ? __pfx_kthread+0x10/0x10
[   14.300715]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.300719]  ? calculate_sigpending+0x7b/0xa0
[   14.300723]  ? __pfx_kthread+0x10/0x10
[   14.300727]  ret_from_fork+0x113/0x1d0
[   14.300730]  ? __pfx_kthread+0x10/0x10
[   14.300734]  ret_from_fork_asm+0x1a/0x30
[   14.300740]  </TASK>
[   14.300741] 
[   14.465730] Allocated by task 177:
[   14.469136]  kasan_save_stack+0x45/0x70
[   14.472975]  kasan_save_track+0x18/0x40
[   14.476814]  kasan_save_alloc_info+0x3b/0x50
[   14.481086]  __kasan_kmalloc+0xb7/0xc0
[   14.484840]  __kmalloc_cache_noprof+0x189/0x420
[   14.489385]  kmalloc_oob_right+0xa9/0x7f0
[   14.493403]  kunit_try_run_case+0x1a2/0x480
[   14.497587]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.502988]  kthread+0x334/0x6f0
[   14.506219]  ret_from_fork+0x113/0x1d0
[   14.509972]  ret_from_fork_asm+0x1a/0x30
[   14.513898] 
[   14.515398] The buggy address belongs to the object at ffff8881066f8000
[   14.515398]  which belongs to the cache kmalloc-128 of size 128
[   14.527912] The buggy address is located 5 bytes to the right of
[   14.527912]  allocated 115-byte region [ffff8881066f8000, ffff8881066f8073)
[   14.540861] 
[   14.542362] The buggy address belongs to the physical page:
[   14.547960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   14.555967] flags: 0x200000000000000(node=0|zone=2)
[   14.560845] page_type: f5(slab)
[   14.563993] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.571733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.579470] page dumped because: kasan: bad access detected
[   14.585044] 
[   14.586544] Memory state around the buggy address:
[   14.591347]  ffff8881066f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.598590]  ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.605811] >ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.613036]                                                                 ^
[   14.620170]  ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627402]  ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634626] ==================================================================
[   14.641868] ==================================================================
[   14.649100] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   14.656067] Read of size 1 at addr ffff8881066f8080 by task kunit_try_catch/177
[   14.663386] 
[   14.664880] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.664888] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   14.664891] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.664894] Call Trace:
[   14.664896]  <TASK>
[   14.664897]  dump_stack_lvl+0x73/0xb0
[   14.664902]  print_report+0xd1/0x650
[   14.664905]  ? __virt_addr_valid+0x1db/0x2d0
[   14.664909]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.664913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.664918]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.664922]  kasan_report+0x141/0x180
[   14.664926]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.664931]  __asan_report_load1_noabort+0x18/0x20
[   14.664935]  kmalloc_oob_right+0x68a/0x7f0
[   14.664939]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   14.664943]  ? __schedule+0x10cc/0x2b60
[   14.664947]  ? ktime_get_ts64+0x83/0x230
[   14.664951]  kunit_try_run_case+0x1a2/0x480
[   14.664956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.664960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.664964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.664968]  ? __kthread_parkme+0x82/0x180
[   14.664971]  ? preempt_count_sub+0x50/0x80
[   14.664976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.664980]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.664984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.664988]  kthread+0x334/0x6f0
[   14.664991]  ? trace_preempt_on+0x20/0xc0
[   14.664995]  ? __pfx_kthread+0x10/0x10
[   14.664999]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.665003]  ? calculate_sigpending+0x7b/0xa0
[   14.665007]  ? __pfx_kthread+0x10/0x10
[   14.665011]  ret_from_fork+0x113/0x1d0
[   14.665014]  ? __pfx_kthread+0x10/0x10
[   14.665018]  ret_from_fork_asm+0x1a/0x30
[   14.665024]  </TASK>
[   14.665025] 
[   14.829834] Allocated by task 177:
[   14.833240]  kasan_save_stack+0x45/0x70
[   14.837078]  kasan_save_track+0x18/0x40
[   14.840916]  kasan_save_alloc_info+0x3b/0x50
[   14.845190]  __kasan_kmalloc+0xb7/0xc0
[   14.848942]  __kmalloc_cache_noprof+0x189/0x420
[   14.853476]  kmalloc_oob_right+0xa9/0x7f0
[   14.857489]  kunit_try_run_case+0x1a2/0x480
[   14.861681]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.867082]  kthread+0x334/0x6f0
[   14.870313]  ret_from_fork+0x113/0x1d0
[   14.874067]  ret_from_fork_asm+0x1a/0x30
[   14.877991] 
[   14.879493] The buggy address belongs to the object at ffff8881066f8000
[   14.879493]  which belongs to the cache kmalloc-128 of size 128
[   14.892006] The buggy address is located 13 bytes to the right of
[   14.892006]  allocated 115-byte region [ffff8881066f8000, ffff8881066f8073)
[   14.905041] 
[   14.906541] The buggy address belongs to the physical page:
[   14.912113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   14.920114] flags: 0x200000000000000(node=0|zone=2)
[   14.924992] page_type: f5(slab)
[   14.928140] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.935888] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.943633] page dumped because: kasan: bad access detected
[   14.949206] 
[   14.950706] Memory state around the buggy address:
[   14.955498]  ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.962717]  ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.969939] >ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.977166]                    ^
[   14.980397]  ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987618]  ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.994836] ==================================================================
[   13.909169] ==================================================================
[   13.916407] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   13.923384] Write of size 1 at addr ffff8881066f8073 by task kunit_try_catch/177
[   13.930781] 
[   13.932284] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S               N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.932293] Tainted: [S]=CPU_OUT_OF_SPEC, [N]=TEST
[   13.932296] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   13.932299] Call Trace:
[   13.932301]  <TASK>
[   13.932303]  dump_stack_lvl+0x73/0xb0
[   13.932309]  print_report+0xd1/0x650
[   13.932313]  ? __virt_addr_valid+0x1db/0x2d0
[   13.932333]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.932336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.932342]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.932346]  kasan_report+0x141/0x180
[   13.932350]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.932367]  __asan_report_store1_noabort+0x1b/0x30
[   13.932372]  kmalloc_oob_right+0x6f0/0x7f0
[   13.932376]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.932380]  ? __schedule+0x10cc/0x2b60
[   13.932385]  ? ktime_get_ts64+0x83/0x230
[   13.932389]  kunit_try_run_case+0x1a2/0x480
[   13.932394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.932399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.932403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.932408]  ? __kthread_parkme+0x82/0x180
[   13.932411]  ? preempt_count_sub+0x50/0x80
[   13.932416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.932421]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.932425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.932429]  kthread+0x334/0x6f0
[   13.932432]  ? trace_preempt_on+0x20/0xc0
[   13.932437]  ? __pfx_kthread+0x10/0x10
[   13.932441]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.932444]  ? calculate_sigpending+0x7b/0xa0
[   13.932449]  ? __pfx_kthread+0x10/0x10
[   13.932453]  ret_from_fork+0x113/0x1d0
[   13.932457]  ? __pfx_kthread+0x10/0x10
[   13.932460]  ret_from_fork_asm+0x1a/0x30
[   13.932466]  </TASK>
[   13.932468] 
[   14.096220] Allocated by task 177:
[   14.099624]  kasan_save_stack+0x45/0x70
[   14.103466]  kasan_save_track+0x18/0x40
[   14.107303]  kasan_save_alloc_info+0x3b/0x50
[   14.111603]  __kasan_kmalloc+0xb7/0xc0
[   14.115369]  __kmalloc_cache_noprof+0x189/0x420
[   14.119916]  kmalloc_oob_right+0xa9/0x7f0
[   14.123926]  kunit_try_run_case+0x1a2/0x480
[   14.128114]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.133511]  kthread+0x334/0x6f0
[   14.136746]  ret_from_fork+0x113/0x1d0
[   14.140499]  ret_from_fork_asm+0x1a/0x30
[   14.144432] 
[   14.145932] The buggy address belongs to the object at ffff8881066f8000
[   14.145932]  which belongs to the cache kmalloc-128 of size 128
[   14.158448] The buggy address is located 0 bytes to the right of
[   14.158448]  allocated 115-byte region [ffff8881066f8000, ffff8881066f8073)
[   14.171404] 
[   14.172901] The buggy address belongs to the physical page:
[   14.178477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   14.186484] flags: 0x200000000000000(node=0|zone=2)
[   14.191384] page_type: f5(slab)
[   14.194536] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.202282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.210020] page dumped because: kasan: bad access detected
[   14.215594] 
[   14.217092] Memory state around the buggy address:
[   14.221886]  ffff8881066f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.229104]  ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.236351] >ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.243594]                                                              ^
[   14.250468]  ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.257689]  ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264906] ==================================================================