Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.498375] ==================================================================
[   30.498423] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.498468] Write of size 1 at addr fff00000c404f978 by task kunit_try_catch/169
[   30.498545] 
[   30.498584] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.498687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.498715] Hardware name: linux,dummy-virt (DT)
[   30.498753] Call trace:
[   30.498804]  show_stack+0x20/0x38 (C)
[   30.498852]  dump_stack_lvl+0x8c/0xd0
[   30.498899]  print_report+0x118/0x608
[   30.499279]  kasan_report+0xdc/0x128
[   30.499353]  __asan_report_store1_noabort+0x20/0x30
[   30.499489]  kmalloc_oob_right+0x538/0x660
[   30.499552]  kunit_try_run_case+0x170/0x3f0
[   30.499669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.500159]  kthread+0x328/0x630
[   30.500311]  ret_from_fork+0x10/0x20
[   30.500393] 
[   30.500412] Allocated by task 169:
[   30.500440]  kasan_save_stack+0x3c/0x68
[   30.500511]  kasan_save_track+0x20/0x40
[   30.500549]  kasan_save_alloc_info+0x40/0x58
[   30.500585]  __kasan_kmalloc+0xd4/0xd8
[   30.500672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.500968]  kmalloc_oob_right+0xb0/0x660
[   30.501061]  kunit_try_run_case+0x170/0x3f0
[   30.501131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.501210]  kthread+0x328/0x630
[   30.501277]  ret_from_fork+0x10/0x20
[   30.501333] 
[   30.501374] The buggy address belongs to the object at fff00000c404f900
[   30.501374]  which belongs to the cache kmalloc-128 of size 128
[   30.501483] The buggy address is located 5 bytes to the right of
[   30.501483]  allocated 115-byte region [fff00000c404f900, fff00000c404f973)
[   30.501572] 
[   30.501620] The buggy address belongs to the physical page:
[   30.501693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10404f
[   30.501748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.501815] page_type: f5(slab)
[   30.502193] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.502504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.502605] page dumped because: kasan: bad access detected
[   30.502666] 
[   30.502729] Memory state around the buggy address:
[   30.502788]  fff00000c404f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.502847]  fff00000c404f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.502894] >fff00000c404f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.503009]                                                                 ^
[   30.503077]  fff00000c404f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.503147]  fff00000c404fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.503225] ==================================================================
[   30.504394] ==================================================================
[   30.504461] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.504521] Read of size 1 at addr fff00000c404f980 by task kunit_try_catch/169
[   30.504572] 
[   30.504600] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.504815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.504846] Hardware name: linux,dummy-virt (DT)
[   30.504995] Call trace:
[   30.505033]  show_stack+0x20/0x38 (C)
[   30.505085]  dump_stack_lvl+0x8c/0xd0
[   30.505142]  print_report+0x118/0x608
[   30.505190]  kasan_report+0xdc/0x128
[   30.505237]  __asan_report_load1_noabort+0x20/0x30
[   30.505286]  kmalloc_oob_right+0x5d0/0x660
[   30.505340]  kunit_try_run_case+0x170/0x3f0
[   30.505388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.505441]  kthread+0x328/0x630
[   30.505483]  ret_from_fork+0x10/0x20
[   30.505530] 
[   30.505548] Allocated by task 169:
[   30.505585]  kasan_save_stack+0x3c/0x68
[   30.505643]  kasan_save_track+0x20/0x40
[   30.505681]  kasan_save_alloc_info+0x40/0x58
[   30.505770]  __kasan_kmalloc+0xd4/0xd8
[   30.505970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.506154]  kmalloc_oob_right+0xb0/0x660
[   30.506199]  kunit_try_run_case+0x170/0x3f0
[   30.506237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.506419]  kthread+0x328/0x630
[   30.506456]  ret_from_fork+0x10/0x20
[   30.506601] 
[   30.506627] The buggy address belongs to the object at fff00000c404f900
[   30.506627]  which belongs to the cache kmalloc-128 of size 128
[   30.506684] The buggy address is located 13 bytes to the right of
[   30.506684]  allocated 115-byte region [fff00000c404f900, fff00000c404f973)
[   30.506747] 
[   30.506766] The buggy address belongs to the physical page:
[   30.506808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10404f
[   30.506861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.506907] page_type: f5(slab)
[   30.506955] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.507150] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.507220] page dumped because: kasan: bad access detected
[   30.507258] 
[   30.507277] Memory state around the buggy address:
[   30.507333]  fff00000c404f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.507376]  fff00000c404f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.507426] >fff00000c404f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.507464]                    ^
[   30.507491]  fff00000c404fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.507532]  fff00000c404fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.507777] ==================================================================
[   30.490855] ==================================================================
[   30.491663] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.492507] Write of size 1 at addr fff00000c404f973 by task kunit_try_catch/169
[   30.492616] 
[   30.493387] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.493536] Tainted: [N]=TEST
[   30.493569] Hardware name: linux,dummy-virt (DT)
[   30.493786] Call trace:
[   30.493976]  show_stack+0x20/0x38 (C)
[   30.494113]  dump_stack_lvl+0x8c/0xd0
[   30.494168]  print_report+0x118/0x608
[   30.494219]  kasan_report+0xdc/0x128
[   30.494266]  __asan_report_store1_noabort+0x20/0x30
[   30.494315]  kmalloc_oob_right+0x5a4/0x660
[   30.494362]  kunit_try_run_case+0x170/0x3f0
[   30.494415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.494469]  kthread+0x328/0x630
[   30.494514]  ret_from_fork+0x10/0x20
[   30.494668] 
[   30.494710] Allocated by task 169:
[   30.494827]  kasan_save_stack+0x3c/0x68
[   30.494892]  kasan_save_track+0x20/0x40
[   30.494943]  kasan_save_alloc_info+0x40/0x58
[   30.494980]  __kasan_kmalloc+0xd4/0xd8
[   30.495016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.495058]  kmalloc_oob_right+0xb0/0x660
[   30.495094]  kunit_try_run_case+0x170/0x3f0
[   30.495131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.495174]  kthread+0x328/0x630
[   30.495206]  ret_from_fork+0x10/0x20
[   30.495261] 
[   30.495320] The buggy address belongs to the object at fff00000c404f900
[   30.495320]  which belongs to the cache kmalloc-128 of size 128
[   30.495410] The buggy address is located 0 bytes to the right of
[   30.495410]  allocated 115-byte region [fff00000c404f900, fff00000c404f973)
[   30.495476] 
[   30.495617] The buggy address belongs to the physical page:
[   30.495844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10404f
[   30.496127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.496407] page_type: f5(slab)
[   30.496692] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.496754] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.496857] page dumped because: kasan: bad access detected
[   30.496897] 
[   30.496922] Memory state around the buggy address:
[   30.497150]  fff00000c404f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.497215]  fff00000c404f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.497268] >fff00000c404f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.497322]                                                              ^
[   30.497402]  fff00000c404f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.497444]  fff00000c404fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.497504] ==================================================================

[   32.326275] ==================================================================
[   32.326374] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   32.326472] Read of size 1 at addr fff00000c63fb480 by task kunit_try_catch/167
[   32.326642] 
[   32.326737] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.326865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.326891] Hardware name: linux,dummy-virt (DT)
[   32.326936] Call trace:
[   32.326959]  show_stack+0x20/0x38 (C)
[   32.327014]  dump_stack_lvl+0x8c/0xd0
[   32.327122]  print_report+0x118/0x608
[   32.327474]  kasan_report+0xdc/0x128
[   32.327794]  __asan_report_load1_noabort+0x20/0x30
[   32.327852]  kmalloc_oob_right+0x5d0/0x660
[   32.327916]  kunit_try_run_case+0x170/0x3f0
[   32.327964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.328017]  kthread+0x328/0x630
[   32.328059]  ret_from_fork+0x10/0x20
[   32.328106] 
[   32.328123] Allocated by task 167:
[   32.328151]  kasan_save_stack+0x3c/0x68
[   32.328206]  kasan_save_track+0x20/0x40
[   32.328243]  kasan_save_alloc_info+0x40/0x58
[   32.328278]  __kasan_kmalloc+0xd4/0xd8
[   32.328358]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.328396]  kmalloc_oob_right+0xb0/0x660
[   32.328570]  kunit_try_run_case+0x170/0x3f0
[   32.328609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.328651]  kthread+0x328/0x630
[   32.328692]  ret_from_fork+0x10/0x20
[   32.328781] 
[   32.328800] The buggy address belongs to the object at fff00000c63fb400
[   32.328800]  which belongs to the cache kmalloc-128 of size 128
[   32.328998] The buggy address is located 13 bytes to the right of
[   32.328998]  allocated 115-byte region [fff00000c63fb400, fff00000c63fb473)
[   32.329102] 
[   32.329135] The buggy address belongs to the physical page:
[   32.329339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   32.329437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.329495] page_type: f5(slab)
[   32.329532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.329581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.329620] page dumped because: kasan: bad access detected
[   32.329807] 
[   32.329839] Memory state around the buggy address:
[   32.329909]  fff00000c63fb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.329956]  fff00000c63fb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.330041] >fff00000c63fb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.330141]                    ^
[   32.330477]  fff00000c63fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.330557]  fff00000c63fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.330596] ==================================================================
[   32.313769] ==================================================================
[   32.314092] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   32.314916] Write of size 1 at addr fff00000c63fb473 by task kunit_try_catch/167
[   32.315027] 
[   32.315840] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.315993] Tainted: [N]=TEST
[   32.316027] Hardware name: linux,dummy-virt (DT)
[   32.316261] Call trace:
[   32.316435]  show_stack+0x20/0x38 (C)
[   32.316567]  dump_stack_lvl+0x8c/0xd0
[   32.316624]  print_report+0x118/0x608
[   32.316675]  kasan_report+0xdc/0x128
[   32.316721]  __asan_report_store1_noabort+0x20/0x30
[   32.316772]  kmalloc_oob_right+0x5a4/0x660
[   32.316820]  kunit_try_run_case+0x170/0x3f0
[   32.316872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.316926]  kthread+0x328/0x630
[   32.316971]  ret_from_fork+0x10/0x20
[   32.317122] 
[   32.317173] Allocated by task 167:
[   32.317286]  kasan_save_stack+0x3c/0x68
[   32.317350]  kasan_save_track+0x20/0x40
[   32.317388]  kasan_save_alloc_info+0x40/0x58
[   32.317425]  __kasan_kmalloc+0xd4/0xd8
[   32.317461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.317506]  kmalloc_oob_right+0xb0/0x660
[   32.317542]  kunit_try_run_case+0x170/0x3f0
[   32.317579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.317622]  kthread+0x328/0x630
[   32.317653]  ret_from_fork+0x10/0x20
[   32.317706] 
[   32.317764] The buggy address belongs to the object at fff00000c63fb400
[   32.317764]  which belongs to the cache kmalloc-128 of size 128
[   32.317853] The buggy address is located 0 bytes to the right of
[   32.317853]  allocated 115-byte region [fff00000c63fb400, fff00000c63fb473)
[   32.317924] 
[   32.318004] The buggy address belongs to the physical page:
[   32.318200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   32.318466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.318750] page_type: f5(slab)
[   32.319026] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.319086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.319200] page dumped because: kasan: bad access detected
[   32.319241] 
[   32.319267] Memory state around the buggy address:
[   32.319510]  fff00000c63fb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.319601]  fff00000c63fb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.319655] >fff00000c63fb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.319709]                                                              ^
[   32.319795]  fff00000c63fb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.319838]  fff00000c63fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.319899] ==================================================================
[   32.321411] ==================================================================
[   32.321612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   32.321846] Write of size 1 at addr fff00000c63fb478 by task kunit_try_catch/167
[   32.321896] 
[   32.321925] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.322015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.322132] Hardware name: linux,dummy-virt (DT)
[   32.322192] Call trace:
[   32.322214]  show_stack+0x20/0x38 (C)
[   32.322262]  dump_stack_lvl+0x8c/0xd0
[   32.322899]  print_report+0x118/0x608
[   32.323126]  kasan_report+0xdc/0x128
[   32.323184]  __asan_report_store1_noabort+0x20/0x30
[   32.323232]  kmalloc_oob_right+0x538/0x660
[   32.323285]  kunit_try_run_case+0x170/0x3f0
[   32.323375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.323512]  kthread+0x328/0x630
[   32.323554]  ret_from_fork+0x10/0x20
[   32.323601] 
[   32.323619] Allocated by task 167:
[   32.323646]  kasan_save_stack+0x3c/0x68
[   32.323705]  kasan_save_track+0x20/0x40
[   32.323742]  kasan_save_alloc_info+0x40/0x58
[   32.323778]  __kasan_kmalloc+0xd4/0xd8
[   32.323814]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.323852]  kmalloc_oob_right+0xb0/0x660
[   32.323995]  kunit_try_run_case+0x170/0x3f0
[   32.324200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.324387]  kthread+0x328/0x630
[   32.324467]  ret_from_fork+0x10/0x20
[   32.324567] 
[   32.324588] The buggy address belongs to the object at fff00000c63fb400
[   32.324588]  which belongs to the cache kmalloc-128 of size 128
[   32.324791] The buggy address is located 5 bytes to the right of
[   32.324791]  allocated 115-byte region [fff00000c63fb400, fff00000c63fb473)
[   32.324854] 
[   32.324873] The buggy address belongs to the physical page:
[   32.324916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb
[   32.324965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.325033] page_type: f5(slab)
[   32.325070] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.325120] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.325169] page dumped because: kasan: bad access detected
[   32.325199] 
[   32.325217] Memory state around the buggy address:
[   32.325246]  fff00000c63fb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.325288]  fff00000c63fb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.325329] >fff00000c63fb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.325365]                                                                 ^
[   32.325404]  fff00000c63fb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.325477]  fff00000c63fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.325518] ==================================================================

[   22.384014] ==================================================================
[   22.384818] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   22.385510] Write of size 1 at addr ffff888105887d73 by task kunit_try_catch/184
[   22.385951] 
[   22.387152] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.387515] Tainted: [N]=TEST
[   22.387549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.387782] Call Trace:
[   22.387851]  <TASK>
[   22.388004]  dump_stack_lvl+0x73/0xb0
[   22.388092]  print_report+0xd1/0x650
[   22.388121]  ? __virt_addr_valid+0x1db/0x2d0
[   22.388147]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.388168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.388192]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.388213]  kasan_report+0x141/0x180
[   22.388234]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.388259]  __asan_report_store1_noabort+0x1b/0x30
[   22.388282]  kmalloc_oob_right+0x6f0/0x7f0
[   22.388303]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.388338]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.388363]  kunit_try_run_case+0x1a5/0x480
[   22.388390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.388412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.388434]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.388455]  ? __kthread_parkme+0x82/0x180
[   22.388476]  ? preempt_count_sub+0x50/0x80
[   22.388499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.388536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.388559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.388583]  kthread+0x337/0x6f0
[   22.388601]  ? trace_preempt_on+0x20/0xc0
[   22.388626]  ? __pfx_kthread+0x10/0x10
[   22.388646]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.388683]  ? calculate_sigpending+0x7b/0xa0
[   22.388707]  ? __pfx_kthread+0x10/0x10
[   22.388728]  ret_from_fork+0x116/0x1d0
[   22.388748]  ? __pfx_kthread+0x10/0x10
[   22.388769]  ret_from_fork_asm+0x1a/0x30
[   22.388826]  </TASK>
[   22.388894] 
[   22.399270] Allocated by task 184:
[   22.400042]  kasan_save_stack+0x45/0x70
[   22.400297]  kasan_save_track+0x18/0x40
[   22.400469]  kasan_save_alloc_info+0x3b/0x50
[   22.400717]  __kasan_kmalloc+0xb7/0xc0
[   22.401136]  __kmalloc_cache_noprof+0x189/0x420
[   22.401365]  kmalloc_oob_right+0xa9/0x7f0
[   22.401546]  kunit_try_run_case+0x1a5/0x480
[   22.401982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.402187]  kthread+0x337/0x6f0
[   22.402372]  ret_from_fork+0x116/0x1d0
[   22.402525]  ret_from_fork_asm+0x1a/0x30
[   22.402805] 
[   22.403336] The buggy address belongs to the object at ffff888105887d00
[   22.403336]  which belongs to the cache kmalloc-128 of size 128
[   22.404137] The buggy address is located 0 bytes to the right of
[   22.404137]  allocated 115-byte region [ffff888105887d00, ffff888105887d73)
[   22.404786] 
[   22.405215] The buggy address belongs to the physical page:
[   22.405913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105887
[   22.406479] flags: 0x200000000000000(node=0|zone=2)
[   22.407113] page_type: f5(slab)
[   22.407667] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.408034] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.408482] page dumped because: kasan: bad access detected
[   22.408910] 
[   22.409128] Memory state around the buggy address:
[   22.409786]  ffff888105887c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.410115]  ffff888105887c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.410461] >ffff888105887d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.411197]                                                              ^
[   22.411628]  ffff888105887d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.412194]  ffff888105887e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.412652] ==================================================================
[   22.433152] ==================================================================
[   22.433409] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   22.433883] Read of size 1 at addr ffff888105887d80 by task kunit_try_catch/184
[   22.434156] 
[   22.434238] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.434285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.434298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.434366] Call Trace:
[   22.434404]  <TASK>
[   22.434470]  dump_stack_lvl+0x73/0xb0
[   22.434507]  print_report+0xd1/0x650
[   22.434539]  ? __virt_addr_valid+0x1db/0x2d0
[   22.434562]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.434582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.434606]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.434627]  kasan_report+0x141/0x180
[   22.434647]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.434705]  __asan_report_load1_noabort+0x18/0x20
[   22.434760]  kmalloc_oob_right+0x68a/0x7f0
[   22.434781]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.434804]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.434828]  kunit_try_run_case+0x1a5/0x480
[   22.434852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.434875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.434896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.434917]  ? __kthread_parkme+0x82/0x180
[   22.434937]  ? preempt_count_sub+0x50/0x80
[   22.434960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.434984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.435006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.435030]  kthread+0x337/0x6f0
[   22.435049]  ? trace_preempt_on+0x20/0xc0
[   22.435072]  ? __pfx_kthread+0x10/0x10
[   22.435092]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.435115]  ? calculate_sigpending+0x7b/0xa0
[   22.435138]  ? __pfx_kthread+0x10/0x10
[   22.435159]  ret_from_fork+0x116/0x1d0
[   22.435178]  ? __pfx_kthread+0x10/0x10
[   22.435197]  ret_from_fork_asm+0x1a/0x30
[   22.435227]  </TASK>
[   22.435238] 
[   22.442634] Allocated by task 184:
[   22.442946]  kasan_save_stack+0x45/0x70
[   22.443142]  kasan_save_track+0x18/0x40
[   22.443339]  kasan_save_alloc_info+0x3b/0x50
[   22.443542]  __kasan_kmalloc+0xb7/0xc0
[   22.443669]  __kmalloc_cache_noprof+0x189/0x420
[   22.444058]  kmalloc_oob_right+0xa9/0x7f0
[   22.444270]  kunit_try_run_case+0x1a5/0x480
[   22.444487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.444834]  kthread+0x337/0x6f0
[   22.445039]  ret_from_fork+0x116/0x1d0
[   22.445216]  ret_from_fork_asm+0x1a/0x30
[   22.445363] 
[   22.445430] The buggy address belongs to the object at ffff888105887d00
[   22.445430]  which belongs to the cache kmalloc-128 of size 128
[   22.445786] The buggy address is located 13 bytes to the right of
[   22.445786]  allocated 115-byte region [ffff888105887d00, ffff888105887d73)
[   22.446713] 
[   22.446810] The buggy address belongs to the physical page:
[   22.447085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105887
[   22.447460] flags: 0x200000000000000(node=0|zone=2)
[   22.447695] page_type: f5(slab)
[   22.447879] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.448249] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.448642] page dumped because: kasan: bad access detected
[   22.448824] 
[   22.448889] Memory state around the buggy address:
[   22.449099]  ffff888105887c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.449657]  ffff888105887d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.449956] >ffff888105887d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.450226]                    ^
[   22.450398]  ffff888105887e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.450868]  ffff888105887e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451180] ==================================================================
[   22.414122] ==================================================================
[   22.414480] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   22.414860] Write of size 1 at addr ffff888105887d78 by task kunit_try_catch/184
[   22.415354] 
[   22.415462] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.415512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.415526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.415549] Call Trace:
[   22.415562]  <TASK>
[   22.415579]  dump_stack_lvl+0x73/0xb0
[   22.415606]  print_report+0xd1/0x650
[   22.415628]  ? __virt_addr_valid+0x1db/0x2d0
[   22.415650]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.415670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.415739]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.415761]  kasan_report+0x141/0x180
[   22.415820]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.415845]  __asan_report_store1_noabort+0x1b/0x30
[   22.415868]  kmalloc_oob_right+0x6bd/0x7f0
[   22.415889]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.415912]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.415937]  kunit_try_run_case+0x1a5/0x480
[   22.415961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.415984]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.416046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.416066]  ? __kthread_parkme+0x82/0x180
[   22.416131]  ? preempt_count_sub+0x50/0x80
[   22.416155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.416179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.416212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.416236]  kthread+0x337/0x6f0
[   22.416255]  ? trace_preempt_on+0x20/0xc0
[   22.416278]  ? __pfx_kthread+0x10/0x10
[   22.416298]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.416329]  ? calculate_sigpending+0x7b/0xa0
[   22.416353]  ? __pfx_kthread+0x10/0x10
[   22.416374]  ret_from_fork+0x116/0x1d0
[   22.416393]  ? __pfx_kthread+0x10/0x10
[   22.416413]  ret_from_fork_asm+0x1a/0x30
[   22.416445]  </TASK>
[   22.416456] 
[   22.423988] Allocated by task 184:
[   22.424167]  kasan_save_stack+0x45/0x70
[   22.424378]  kasan_save_track+0x18/0x40
[   22.424562]  kasan_save_alloc_info+0x3b/0x50
[   22.424768]  __kasan_kmalloc+0xb7/0xc0
[   22.424944]  __kmalloc_cache_noprof+0x189/0x420
[   22.425191]  kmalloc_oob_right+0xa9/0x7f0
[   22.425360]  kunit_try_run_case+0x1a5/0x480
[   22.425526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.425785]  kthread+0x337/0x6f0
[   22.426061]  ret_from_fork+0x116/0x1d0
[   22.426276]  ret_from_fork_asm+0x1a/0x30
[   22.426556] 
[   22.426631] The buggy address belongs to the object at ffff888105887d00
[   22.426631]  which belongs to the cache kmalloc-128 of size 128
[   22.427143] The buggy address is located 5 bytes to the right of
[   22.427143]  allocated 115-byte region [ffff888105887d00, ffff888105887d73)
[   22.427522] 
[   22.427614] The buggy address belongs to the physical page:
[   22.427945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105887
[   22.428301] flags: 0x200000000000000(node=0|zone=2)
[   22.428684] page_type: f5(slab)
[   22.428851] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.429077] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.429418] page dumped because: kasan: bad access detected
[   22.429887] 
[   22.430064] Memory state around the buggy address:
[   22.430411]  ffff888105887c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.430838]  ffff888105887c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.431193] >ffff888105887d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.431568]                                                                 ^
[   22.431897]  ffff888105887d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.432187]  ffff888105887e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.432464] ==================================================================

[   22.610131] ==================================================================
[   22.610487] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   22.610808] Write of size 1 at addr ffff88810255e378 by task kunit_try_catch/185
[   22.611149] 
[   22.611237] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.611286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.611299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.611320] Call Trace:
[   22.611341]  <TASK>
[   22.611360]  dump_stack_lvl+0x73/0xb0
[   22.611388]  print_report+0xd1/0x650
[   22.611410]  ? __virt_addr_valid+0x1db/0x2d0
[   22.611433]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.611453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.611478]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.611499]  kasan_report+0x141/0x180
[   22.611520]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.611545]  __asan_report_store1_noabort+0x1b/0x30
[   22.611569]  kmalloc_oob_right+0x6bd/0x7f0
[   22.611590]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.611611]  ? __schedule+0x10cc/0x2b60
[   22.611632]  ? __pfx_read_tsc+0x10/0x10
[   22.611653]  ? ktime_get_ts64+0x86/0x230
[   22.611678]  kunit_try_run_case+0x1a5/0x480
[   22.611703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.611726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.611747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.611768]  ? __kthread_parkme+0x82/0x180
[   22.611788]  ? preempt_count_sub+0x50/0x80
[   22.611811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.611835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.611858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.611882]  kthread+0x337/0x6f0
[   22.611902]  ? trace_preempt_on+0x20/0xc0
[   22.611946]  ? __pfx_kthread+0x10/0x10
[   22.611966]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.611991]  ? calculate_sigpending+0x7b/0xa0
[   22.612015]  ? __pfx_kthread+0x10/0x10
[   22.612036]  ret_from_fork+0x116/0x1d0
[   22.612055]  ? __pfx_kthread+0x10/0x10
[   22.612083]  ret_from_fork_asm+0x1a/0x30
[   22.612114]  </TASK>
[   22.612125] 
[   22.620535] Allocated by task 185:
[   22.620913]  kasan_save_stack+0x45/0x70
[   22.621144]  kasan_save_track+0x18/0x40
[   22.621474]  kasan_save_alloc_info+0x3b/0x50
[   22.621747]  __kasan_kmalloc+0xb7/0xc0
[   22.621896]  __kmalloc_cache_noprof+0x189/0x420
[   22.622256]  kmalloc_oob_right+0xa9/0x7f0
[   22.622449]  kunit_try_run_case+0x1a5/0x480
[   22.622638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.622862]  kthread+0x337/0x6f0
[   22.623261]  ret_from_fork+0x116/0x1d0
[   22.623421]  ret_from_fork_asm+0x1a/0x30
[   22.623619] 
[   22.623687] The buggy address belongs to the object at ffff88810255e300
[   22.623687]  which belongs to the cache kmalloc-128 of size 128
[   22.624417] The buggy address is located 5 bytes to the right of
[   22.624417]  allocated 115-byte region [ffff88810255e300, ffff88810255e373)
[   22.625173] 
[   22.625272] The buggy address belongs to the physical page:
[   22.625458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e
[   22.625799] flags: 0x200000000000000(node=0|zone=2)
[   22.626304] page_type: f5(slab)
[   22.626447] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.626905] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.627341] page dumped because: kasan: bad access detected
[   22.627572] 
[   22.627663] Memory state around the buggy address:
[   22.627876]  ffff88810255e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.628431]  ffff88810255e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.628722] >ffff88810255e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.629145]                                                                 ^
[   22.629521]  ffff88810255e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.629827]  ffff88810255e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.630273] ==================================================================
[   22.631115] ==================================================================
[   22.631572] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   22.631880] Read of size 1 at addr ffff88810255e380 by task kunit_try_catch/185
[   22.632548] 
[   22.632727] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.632849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.632864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.632887] Call Trace:
[   22.632911]  <TASK>
[   22.632959]  dump_stack_lvl+0x73/0xb0
[   22.632991]  print_report+0xd1/0x650
[   22.633014]  ? __virt_addr_valid+0x1db/0x2d0
[   22.633038]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.633068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.633094]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.633116]  kasan_report+0x141/0x180
[   22.633137]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.633163]  __asan_report_load1_noabort+0x18/0x20
[   22.633186]  kmalloc_oob_right+0x68a/0x7f0
[   22.633208]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.633230]  ? __schedule+0x10cc/0x2b60
[   22.633251]  ? __pfx_read_tsc+0x10/0x10
[   22.633274]  ? ktime_get_ts64+0x86/0x230
[   22.633299]  kunit_try_run_case+0x1a5/0x480
[   22.633326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.633349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.633371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.633392]  ? __kthread_parkme+0x82/0x180
[   22.633413]  ? preempt_count_sub+0x50/0x80
[   22.633437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.633462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.633486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.633510]  kthread+0x337/0x6f0
[   22.633529]  ? trace_preempt_on+0x20/0xc0
[   22.633553]  ? __pfx_kthread+0x10/0x10
[   22.633573]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.633598]  ? calculate_sigpending+0x7b/0xa0
[   22.633623]  ? __pfx_kthread+0x10/0x10
[   22.633645]  ret_from_fork+0x116/0x1d0
[   22.633663]  ? __pfx_kthread+0x10/0x10
[   22.633684]  ret_from_fork_asm+0x1a/0x30
[   22.633716]  </TASK>
[   22.633727] 
[   22.642526] Allocated by task 185:
[   22.642786]  kasan_save_stack+0x45/0x70
[   22.643147]  kasan_save_track+0x18/0x40
[   22.643320]  kasan_save_alloc_info+0x3b/0x50
[   22.643506]  __kasan_kmalloc+0xb7/0xc0
[   22.643667]  __kmalloc_cache_noprof+0x189/0x420
[   22.643866]  kmalloc_oob_right+0xa9/0x7f0
[   22.644374]  kunit_try_run_case+0x1a5/0x480
[   22.644643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.644884]  kthread+0x337/0x6f0
[   22.645210]  ret_from_fork+0x116/0x1d0
[   22.645436]  ret_from_fork_asm+0x1a/0x30
[   22.645745] 
[   22.645818] The buggy address belongs to the object at ffff88810255e300
[   22.645818]  which belongs to the cache kmalloc-128 of size 128
[   22.646441] The buggy address is located 13 bytes to the right of
[   22.646441]  allocated 115-byte region [ffff88810255e300, ffff88810255e373)
[   22.647150] 
[   22.647250] The buggy address belongs to the physical page:
[   22.647440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e
[   22.647918] flags: 0x200000000000000(node=0|zone=2)
[   22.648348] page_type: f5(slab)
[   22.648486] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.648809] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.649348] page dumped because: kasan: bad access detected
[   22.649722] 
[   22.649798] Memory state around the buggy address:
[   22.650325]  ffff88810255e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.650778]  ffff88810255e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.651231] >ffff88810255e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.651625]                    ^
[   22.651898]  ffff88810255e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.652268]  ffff88810255e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.652678] ==================================================================
[   22.587752] ==================================================================
[   22.588632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   22.589677] Write of size 1 at addr ffff88810255e373 by task kunit_try_catch/185
[   22.590452] 
[   22.591667] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.592045] Tainted: [N]=TEST
[   22.592091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.592334] Call Trace:
[   22.592407]  <TASK>
[   22.592560]  dump_stack_lvl+0x73/0xb0
[   22.592653]  print_report+0xd1/0x650
[   22.592684]  ? __virt_addr_valid+0x1db/0x2d0
[   22.592710]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.592731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.592757]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.592778]  kasan_report+0x141/0x180
[   22.592799]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.592825]  __asan_report_store1_noabort+0x1b/0x30
[   22.592849]  kmalloc_oob_right+0x6f0/0x7f0
[   22.592871]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.592892]  ? __schedule+0x10cc/0x2b60
[   22.592942]  ? __pfx_read_tsc+0x10/0x10
[   22.592965]  ? ktime_get_ts64+0x86/0x230
[   22.592992]  kunit_try_run_case+0x1a5/0x480
[   22.593020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.593043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.593075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.593096]  ? __kthread_parkme+0x82/0x180
[   22.593118]  ? preempt_count_sub+0x50/0x80
[   22.593142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.593166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.593189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.593213]  kthread+0x337/0x6f0
[   22.593233]  ? trace_preempt_on+0x20/0xc0
[   22.593259]  ? __pfx_kthread+0x10/0x10
[   22.593279]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.593302]  ? calculate_sigpending+0x7b/0xa0
[   22.593328]  ? __pfx_kthread+0x10/0x10
[   22.593349]  ret_from_fork+0x116/0x1d0
[   22.593368]  ? __pfx_kthread+0x10/0x10
[   22.593389]  ret_from_fork_asm+0x1a/0x30
[   22.593446]  </TASK>
[   22.593514] 
[   22.599720] Allocated by task 185:
[   22.599998]  kasan_save_stack+0x45/0x70
[   22.600232]  kasan_save_track+0x18/0x40
[   22.600422]  kasan_save_alloc_info+0x3b/0x50
[   22.600626]  __kasan_kmalloc+0xb7/0xc0
[   22.600802]  __kmalloc_cache_noprof+0x189/0x420
[   22.601010]  kmalloc_oob_right+0xa9/0x7f0
[   22.601155]  kunit_try_run_case+0x1a5/0x480
[   22.601297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.601537]  kthread+0x337/0x6f0
[   22.601703]  ret_from_fork+0x116/0x1d0
[   22.601892]  ret_from_fork_asm+0x1a/0x30
[   22.602157] 
[   22.602301] The buggy address belongs to the object at ffff88810255e300
[   22.602301]  which belongs to the cache kmalloc-128 of size 128
[   22.602816] The buggy address is located 0 bytes to the right of
[   22.602816]  allocated 115-byte region [ffff88810255e300, ffff88810255e373)
[   22.603405] 
[   22.603569] The buggy address belongs to the physical page:
[   22.604069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e
[   22.604600] flags: 0x200000000000000(node=0|zone=2)
[   22.605212] page_type: f5(slab)
[   22.605653] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.605986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.606360] page dumped because: kasan: bad access detected
[   22.606629] 
[   22.606728] Memory state around the buggy address:
[   22.607229]  ffff88810255e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.607533]  ffff88810255e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.607763] >ffff88810255e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.608133]                                                              ^
[   22.608443]  ffff88810255e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.608702]  ffff88810255e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.608955] ==================================================================