Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.576559] ==================================================================
[   15.576616] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   15.576687] Write of size 1 at addr fff00000c5866078 by task kunit_try_catch/143
[   15.576737] 
[   15.576770] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.576848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.576873] Hardware name: linux,dummy-virt (DT)
[   15.576905] Call trace:
[   15.576927]  show_stack+0x20/0x38 (C)
[   15.576974]  dump_stack_lvl+0x8c/0xd0
[   15.577020]  print_report+0x118/0x5d0
[   15.577065]  kasan_report+0xdc/0x128
[   15.577109]  __asan_report_store1_noabort+0x20/0x30
[   15.577159]  kmalloc_track_caller_oob_right+0x40c/0x488
[   15.577226]  kunit_try_run_case+0x170/0x3f0
[   15.577274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.577324]  kthread+0x328/0x630
[   15.577365]  ret_from_fork+0x10/0x20
[   15.577412] 
[   15.577429] Allocated by task 143:
[   15.577456]  kasan_save_stack+0x3c/0x68
[   15.577494]  kasan_save_track+0x20/0x40
[   15.577530]  kasan_save_alloc_info+0x40/0x58
[   15.577676]  __kasan_kmalloc+0xd4/0xd8
[   15.577798]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   15.577928]  kmalloc_track_caller_oob_right+0xa8/0x488
[   15.578029]  kunit_try_run_case+0x170/0x3f0
[   15.578116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.578219]  kthread+0x328/0x630
[   15.578284]  ret_from_fork+0x10/0x20
[   15.578358] 
[   15.578377] The buggy address belongs to the object at fff00000c5866000
[   15.578377]  which belongs to the cache kmalloc-128 of size 128
[   15.578433] The buggy address is located 0 bytes to the right of
[   15.578433]  allocated 120-byte region [fff00000c5866000, fff00000c5866078)
[   15.578496] 
[   15.578515] The buggy address belongs to the physical page:
[   15.578545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866
[   15.578597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.578644] page_type: f5(slab)
[   15.578680] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.578730] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.578848] page dumped because: kasan: bad access detected
[   15.578911] 
[   15.578940] Memory state around the buggy address:
[   15.578970]  fff00000c5865f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.579039]  fff00000c5865f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.579132] >fff00000c5866000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.579232]                                                                 ^
[   15.579326]  fff00000c5866080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.579389]  fff00000c5866100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.579483] ==================================================================
[   15.579926] ==================================================================
[   15.579971] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   15.580017] Write of size 1 at addr fff00000c5866178 by task kunit_try_catch/143
[   15.580101] 
[   15.580150] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.580271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.580321] Hardware name: linux,dummy-virt (DT)
[   15.580389] Call trace:
[   15.580409]  show_stack+0x20/0x38 (C)
[   15.580478]  dump_stack_lvl+0x8c/0xd0
[   15.580523]  print_report+0x118/0x5d0
[   15.580568]  kasan_report+0xdc/0x128
[   15.580612]  __asan_report_store1_noabort+0x20/0x30
[   15.580662]  kmalloc_track_caller_oob_right+0x418/0x488
[   15.580711]  kunit_try_run_case+0x170/0x3f0
[   15.580756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.580807]  kthread+0x328/0x630
[   15.580870]  ret_from_fork+0x10/0x20
[   15.580916] 
[   15.580933] Allocated by task 143:
[   15.580958]  kasan_save_stack+0x3c/0x68
[   15.580996]  kasan_save_track+0x20/0x40
[   15.581032]  kasan_save_alloc_info+0x40/0x58
[   15.581100]  __kasan_kmalloc+0xd4/0xd8
[   15.581159]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   15.581270]  kmalloc_track_caller_oob_right+0x184/0x488
[   15.581336]  kunit_try_run_case+0x170/0x3f0
[   15.581389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.581447]  kthread+0x328/0x630
[   15.581508]  ret_from_fork+0x10/0x20
[   15.581593] 
[   15.581611] The buggy address belongs to the object at fff00000c5866100
[   15.581611]  which belongs to the cache kmalloc-128 of size 128
[   15.581667] The buggy address is located 0 bytes to the right of
[   15.581667]  allocated 120-byte region [fff00000c5866100, fff00000c5866178)
[   15.582008] 
[   15.582086] The buggy address belongs to the physical page:
[   15.582131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866
[   15.582221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.582290] page_type: f5(slab)
[   15.582359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.582417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.582495] page dumped because: kasan: bad access detected
[   15.582541] 
[   15.582558] Memory state around the buggy address:
[   15.582587]  fff00000c5866000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.582635]  fff00000c5866080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.582988] >fff00000c5866100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.583068]                                                                 ^
[   15.583125]  fff00000c5866180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583166]  fff00000c5866200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583212] ==================================================================

[   16.449365] ==================================================================
[   16.449416] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.450975] Write of size 1 at addr fff00000c5aae078 by task kunit_try_catch/143
[   16.451054] 
[   16.451086] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.451360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.451616] Hardware name: linux,dummy-virt (DT)
[   16.451658] Call trace:
[   16.451971]  show_stack+0x20/0x38 (C)
[   16.452083]  dump_stack_lvl+0x8c/0xd0
[   16.452308]  print_report+0x118/0x5d0
[   16.452496]  kasan_report+0xdc/0x128
[   16.452744]  __asan_report_store1_noabort+0x20/0x30
[   16.452871]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.453026]  kunit_try_run_case+0x170/0x3f0
[   16.453075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.453127]  kthread+0x328/0x630
[   16.453167]  ret_from_fork+0x10/0x20
[   16.453943] 
[   16.453969] Allocated by task 143:
[   16.454006]  kasan_save_stack+0x3c/0x68
[   16.454337]  kasan_save_track+0x20/0x40
[   16.454582]  kasan_save_alloc_info+0x40/0x58
[   16.454633]  __kasan_kmalloc+0xd4/0xd8
[   16.454869]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.455311]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.455504]  kunit_try_run_case+0x170/0x3f0
[   16.455568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.455801]  kthread+0x328/0x630
[   16.456020]  ret_from_fork+0x10/0x20
[   16.456123] 
[   16.456154] The buggy address belongs to the object at fff00000c5aae000
[   16.456154]  which belongs to the cache kmalloc-128 of size 128
[   16.456229] The buggy address is located 0 bytes to the right of
[   16.456229]  allocated 120-byte region [fff00000c5aae000, fff00000c5aae078)
[   16.456293] 
[   16.456311] The buggy address belongs to the physical page:
[   16.456341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae
[   16.456392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.456439] page_type: f5(slab)
[   16.457405] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.457477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.457548] page dumped because: kasan: bad access detected
[   16.457578] 
[   16.457597] Memory state around the buggy address:
[   16.458120]  fff00000c5aadf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.458501]  fff00000c5aadf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.458613] >fff00000c5aae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.458808]                                                                 ^
[   16.459088]  fff00000c5aae080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459282]  fff00000c5aae100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459324] ==================================================================
[   16.437926] ==================================================================
[   16.438772] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.438844] Write of size 1 at addr fff00000c46fff78 by task kunit_try_catch/143
[   16.438905] 
[   16.439097] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.439462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.439491] Hardware name: linux,dummy-virt (DT)
[   16.439716] Call trace:
[   16.439745]  show_stack+0x20/0x38 (C)
[   16.439973]  dump_stack_lvl+0x8c/0xd0
[   16.440371]  print_report+0x118/0x5d0
[   16.440466]  kasan_report+0xdc/0x128
[   16.441021]  __asan_report_store1_noabort+0x20/0x30
[   16.441461]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.441729]  kunit_try_run_case+0x170/0x3f0
[   16.441801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.441856]  kthread+0x328/0x630
[   16.441898]  ret_from_fork+0x10/0x20
[   16.441946] 
[   16.442735] Allocated by task 143:
[   16.442781]  kasan_save_stack+0x3c/0x68
[   16.442824]  kasan_save_track+0x20/0x40
[   16.442861]  kasan_save_alloc_info+0x40/0x58
[   16.442899]  __kasan_kmalloc+0xd4/0xd8
[   16.442935]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.442978]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.443019]  kunit_try_run_case+0x170/0x3f0
[   16.443055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.443097]  kthread+0x328/0x630
[   16.443807]  ret_from_fork+0x10/0x20
[   16.443853] 
[   16.443931] The buggy address belongs to the object at fff00000c46fff00
[   16.443931]  which belongs to the cache kmalloc-128 of size 128
[   16.443991] The buggy address is located 0 bytes to the right of
[   16.443991]  allocated 120-byte region [fff00000c46fff00, fff00000c46fff78)
[   16.444261] 
[   16.444283] The buggy address belongs to the physical page:
[   16.444315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046ff
[   16.444380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.444819] page_type: f5(slab)
[   16.445221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.445570] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.445701] page dumped because: kasan: bad access detected
[   16.446049] 
[   16.446073] Memory state around the buggy address:
[   16.446390]  fff00000c46ffe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.446724]  fff00000c46ffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.446770] >fff00000c46fff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.446808]                                                                 ^
[   16.446849]  fff00000c46fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.447415]  fff00000c4700000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.447596] ==================================================================

[   11.935854] ==================================================================
[   11.936289] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.936704] Write of size 1 at addr ffff888103427d78 by task kunit_try_catch/159
[   11.937284] 
[   11.937382] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.937468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.937482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.937502] Call Trace:
[   11.937514]  <TASK>
[   11.937529]  dump_stack_lvl+0x73/0xb0
[   11.937657]  print_report+0xd1/0x610
[   11.937685]  ? __virt_addr_valid+0x1db/0x2d0
[   11.937723]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.937748]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.937772]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.937797]  kasan_report+0x141/0x180
[   11.937819]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.937849]  __asan_report_store1_noabort+0x1b/0x30
[   11.937874]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   11.937900]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.937927]  ? __schedule+0x10cc/0x2b60
[   11.937981]  ? __pfx_read_tsc+0x10/0x10
[   11.938002]  ? ktime_get_ts64+0x86/0x230
[   11.938037]  kunit_try_run_case+0x1a5/0x480
[   11.938063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.938086]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.938110]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.938134]  ? __kthread_parkme+0x82/0x180
[   11.938155]  ? preempt_count_sub+0x50/0x80
[   11.938179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.938203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.938227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.938252]  kthread+0x337/0x6f0
[   11.938271]  ? trace_preempt_on+0x20/0xc0
[   11.938294]  ? __pfx_kthread+0x10/0x10
[   11.938314]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.938335]  ? calculate_sigpending+0x7b/0xa0
[   11.938360]  ? __pfx_kthread+0x10/0x10
[   11.938381]  ret_from_fork+0x116/0x1d0
[   11.938400]  ? __pfx_kthread+0x10/0x10
[   11.938430]  ret_from_fork_asm+0x1a/0x30
[   11.938471]  </TASK>
[   11.938480] 
[   11.946490] Allocated by task 159:
[   11.946784]  kasan_save_stack+0x45/0x70
[   11.946993]  kasan_save_track+0x18/0x40
[   11.947219]  kasan_save_alloc_info+0x3b/0x50
[   11.947371]  __kasan_kmalloc+0xb7/0xc0
[   11.947514]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.947928]  kmalloc_track_caller_oob_right+0x99/0x520
[   11.948356]  kunit_try_run_case+0x1a5/0x480
[   11.948638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.948992]  kthread+0x337/0x6f0
[   11.949123]  ret_from_fork+0x116/0x1d0
[   11.949310]  ret_from_fork_asm+0x1a/0x30
[   11.949540] 
[   11.949772] The buggy address belongs to the object at ffff888103427d00
[   11.949772]  which belongs to the cache kmalloc-128 of size 128
[   11.950190] The buggy address is located 0 bytes to the right of
[   11.950190]  allocated 120-byte region [ffff888103427d00, ffff888103427d78)
[   11.951087] 
[   11.951237] The buggy address belongs to the physical page:
[   11.951420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103427
[   11.952041] flags: 0x200000000000000(node=0|zone=2)
[   11.952224] page_type: f5(slab)
[   11.952353] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.952859] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.953311] page dumped because: kasan: bad access detected
[   11.953708] 
[   11.953828] Memory state around the buggy address:
[   11.954056]  ffff888103427c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.954368]  ffff888103427c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.954586] >ffff888103427d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.955012]                                                                 ^
[   11.955618]  ffff888103427d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.956005]  ffff888103427e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.956270] ==================================================================
[   11.957238] ==================================================================
[   11.957706] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.958023] Write of size 1 at addr ffff888103427e78 by task kunit_try_catch/159
[   11.958408] 
[   11.958511] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.958583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.958595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.958615] Call Trace:
[   11.958626]  <TASK>
[   11.958650]  dump_stack_lvl+0x73/0xb0
[   11.958678]  print_report+0xd1/0x610
[   11.958760]  ? __virt_addr_valid+0x1db/0x2d0
[   11.958817]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.958844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.958867]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.958905]  kasan_report+0x141/0x180
[   11.958927]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.958985]  __asan_report_store1_noabort+0x1b/0x30
[   11.959010]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   11.959046]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   11.959074]  ? __schedule+0x10cc/0x2b60
[   11.959095]  ? __pfx_read_tsc+0x10/0x10
[   11.959116]  ? ktime_get_ts64+0x86/0x230
[   11.959140]  kunit_try_run_case+0x1a5/0x480
[   11.959164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.959187]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.959210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.959234]  ? __kthread_parkme+0x82/0x180
[   11.959254]  ? preempt_count_sub+0x50/0x80
[   11.959277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.959301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.959325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.959350]  kthread+0x337/0x6f0
[   11.959369]  ? trace_preempt_on+0x20/0xc0
[   11.959391]  ? __pfx_kthread+0x10/0x10
[   11.959422]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.959454]  ? calculate_sigpending+0x7b/0xa0
[   11.959478]  ? __pfx_kthread+0x10/0x10
[   11.959499]  ret_from_fork+0x116/0x1d0
[   11.959517]  ? __pfx_kthread+0x10/0x10
[   11.959537]  ret_from_fork_asm+0x1a/0x30
[   11.959610]  </TASK>
[   11.959621] 
[   11.973146] Allocated by task 159:
[   11.973278]  kasan_save_stack+0x45/0x70
[   11.973481]  kasan_save_track+0x18/0x40
[   11.973864]  kasan_save_alloc_info+0x3b/0x50
[   11.974338]  __kasan_kmalloc+0xb7/0xc0
[   11.974927]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.975327]  kmalloc_track_caller_oob_right+0x19a/0x520
[   11.975630]  kunit_try_run_case+0x1a5/0x480
[   11.976098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.976684]  kthread+0x337/0x6f0
[   11.977028]  ret_from_fork+0x116/0x1d0
[   11.977262]  ret_from_fork_asm+0x1a/0x30
[   11.977682] 
[   11.977876] The buggy address belongs to the object at ffff888103427e00
[   11.977876]  which belongs to the cache kmalloc-128 of size 128
[   11.978731] The buggy address is located 0 bytes to the right of
[   11.978731]  allocated 120-byte region [ffff888103427e00, ffff888103427e78)
[   11.979260] 
[   11.979332] The buggy address belongs to the physical page:
[   11.979682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103427
[   11.980684] flags: 0x200000000000000(node=0|zone=2)
[   11.981156] page_type: f5(slab)
[   11.981520] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.982351] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.982947] page dumped because: kasan: bad access detected
[   11.983219] 
[   11.983291] Memory state around the buggy address:
[   11.983552]  ffff888103427d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.984228]  ffff888103427d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.985155] >ffff888103427e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.985376]                                                                 ^
[   11.985935]  ffff888103427e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.986610]  ffff888103427f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.987301] ==================================================================

[   12.198752] ==================================================================
[   12.199394] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.199672] Write of size 1 at addr ffff888102594278 by task kunit_try_catch/160
[   12.200064] 
[   12.200275] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.200330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.200341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.200361] Call Trace:
[   12.200371]  <TASK>
[   12.200386]  dump_stack_lvl+0x73/0xb0
[   12.200414]  print_report+0xd1/0x610
[   12.200437]  ? __virt_addr_valid+0x1db/0x2d0
[   12.200461]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.200486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.200510]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.200536]  kasan_report+0x141/0x180
[   12.200557]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.200588]  __asan_report_store1_noabort+0x1b/0x30
[   12.200613]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   12.200639]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.200667]  ? __schedule+0x10cc/0x2b60
[   12.200689]  ? __pfx_read_tsc+0x10/0x10
[   12.200723]  ? ktime_get_ts64+0x86/0x230
[   12.200747]  kunit_try_run_case+0x1a5/0x480
[   12.200771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.200814]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.200837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.200872]  ? __kthread_parkme+0x82/0x180
[   12.200903]  ? preempt_count_sub+0x50/0x80
[   12.200927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.200951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.200975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.201001]  kthread+0x337/0x6f0
[   12.201019]  ? trace_preempt_on+0x20/0xc0
[   12.201042]  ? __pfx_kthread+0x10/0x10
[   12.201071]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.201093]  ? calculate_sigpending+0x7b/0xa0
[   12.201117]  ? __pfx_kthread+0x10/0x10
[   12.201138]  ret_from_fork+0x116/0x1d0
[   12.201158]  ? __pfx_kthread+0x10/0x10
[   12.201187]  ret_from_fork_asm+0x1a/0x30
[   12.201227]  </TASK>
[   12.201236] 
[   12.214189] Allocated by task 160:
[   12.214524]  kasan_save_stack+0x45/0x70
[   12.214952]  kasan_save_track+0x18/0x40
[   12.215385]  kasan_save_alloc_info+0x3b/0x50
[   12.215594]  __kasan_kmalloc+0xb7/0xc0
[   12.216004]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.216619]  kmalloc_track_caller_oob_right+0x19a/0x520
[   12.216860]  kunit_try_run_case+0x1a5/0x480
[   12.217007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.217202]  kthread+0x337/0x6f0
[   12.217323]  ret_from_fork+0x116/0x1d0
[   12.217455]  ret_from_fork_asm+0x1a/0x30
[   12.217594] 
[   12.217665] The buggy address belongs to the object at ffff888102594200
[   12.217665]  which belongs to the cache kmalloc-128 of size 128
[   12.218022] The buggy address is located 0 bytes to the right of
[   12.218022]  allocated 120-byte region [ffff888102594200, ffff888102594278)
[   12.218398] 
[   12.218469] The buggy address belongs to the physical page:
[   12.218642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594
[   12.218894] flags: 0x200000000000000(node=0|zone=2)
[   12.219099] page_type: f5(slab)
[   12.219387] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.220032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.220759] page dumped because: kasan: bad access detected
[   12.221299] 
[   12.221456] Memory state around the buggy address:
[   12.221997]  ffff888102594100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.222728]  ffff888102594180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.223511] >ffff888102594200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.224303]                                                                 ^
[   12.225022]  ffff888102594280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.225780]  ffff888102594300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.226531] ==================================================================
[   12.163759] ==================================================================
[   12.164321] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.164578] Write of size 1 at addr ffff888102594178 by task kunit_try_catch/160
[   12.165778] 
[   12.166164] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.166315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.166327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.166346] Call Trace:
[   12.166359]  <TASK>
[   12.166374]  dump_stack_lvl+0x73/0xb0
[   12.166403]  print_report+0xd1/0x610
[   12.166426]  ? __virt_addr_valid+0x1db/0x2d0
[   12.166449]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.166474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.166497]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.166523]  kasan_report+0x141/0x180
[   12.166545]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.166576]  __asan_report_store1_noabort+0x1b/0x30
[   12.166601]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   12.166627]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   12.166656]  ? __schedule+0x10cc/0x2b60
[   12.166678]  ? __pfx_read_tsc+0x10/0x10
[   12.166699]  ? ktime_get_ts64+0x86/0x230
[   12.166730]  kunit_try_run_case+0x1a5/0x480
[   12.166755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.166778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.166801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.166825]  ? __kthread_parkme+0x82/0x180
[   12.166845]  ? preempt_count_sub+0x50/0x80
[   12.166868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.166893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.166917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.166942]  kthread+0x337/0x6f0
[   12.166960]  ? trace_preempt_on+0x20/0xc0
[   12.166984]  ? __pfx_kthread+0x10/0x10
[   12.167004]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.167025]  ? calculate_sigpending+0x7b/0xa0
[   12.167061]  ? __pfx_kthread+0x10/0x10
[   12.167083]  ret_from_fork+0x116/0x1d0
[   12.167102]  ? __pfx_kthread+0x10/0x10
[   12.167134]  ret_from_fork_asm+0x1a/0x30
[   12.167165]  </TASK>
[   12.167175] 
[   12.182474] Allocated by task 160:
[   12.182855]  kasan_save_stack+0x45/0x70
[   12.183336]  kasan_save_track+0x18/0x40
[   12.183763]  kasan_save_alloc_info+0x3b/0x50
[   12.184270]  __kasan_kmalloc+0xb7/0xc0
[   12.184642]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   12.185141]  kmalloc_track_caller_oob_right+0x99/0x520
[   12.185328]  kunit_try_run_case+0x1a5/0x480
[   12.185590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.185846]  kthread+0x337/0x6f0
[   12.186251]  ret_from_fork+0x116/0x1d0
[   12.186604]  ret_from_fork_asm+0x1a/0x30
[   12.187097] 
[   12.187396] The buggy address belongs to the object at ffff888102594100
[   12.187396]  which belongs to the cache kmalloc-128 of size 128
[   12.188531] The buggy address is located 0 bytes to the right of
[   12.188531]  allocated 120-byte region [ffff888102594100, ffff888102594178)
[   12.189627] 
[   12.189729] The buggy address belongs to the physical page:
[   12.190275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594
[   12.190791] flags: 0x200000000000000(node=0|zone=2)
[   12.191328] page_type: f5(slab)
[   12.191487] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.192408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.192922] page dumped because: kasan: bad access detected
[   12.193425] 
[   12.193494] Memory state around the buggy address:
[   12.193822]  ffff888102594000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.194568]  ffff888102594080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.195285] >ffff888102594100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.196002]                                                                 ^
[   12.196493]  ffff888102594180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.197142]  ffff888102594200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.197629] ==================================================================