Hay
Date
July 3, 2025, 10:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   31.132904] ==================================================================
[   31.140222] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   31.147271] Read of size 1 at addr ffff00009068f180 by task kunit_try_catch/245
[   31.154666] 
[   31.156199] CPU: 5 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   31.156228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.156235] Hardware name: Thundercomm Dragonboard 845c (DT)
[   31.156247] Call trace:
[   31.156253]  show_stack+0x20/0x38 (C)
[   31.156269]  dump_stack_lvl+0x8c/0xd0
[   31.156286]  print_report+0x118/0x608
[   31.156304]  kasan_report+0xdc/0x128
[   31.156322]  __asan_report_load1_noabort+0x20/0x30
[   31.156338]  kmalloc_oob_right+0x5d0/0x660
[   31.156355]  kunit_try_run_case+0x170/0x3f0
[   31.156371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.156391]  kthread+0x328/0x630
[   31.156403]  ret_from_fork+0x10/0x20
[   31.156419] 
[   31.221996] Allocated by task 245:
[   31.225447]  kasan_save_stack+0x3c/0x68
[   31.229353]  kasan_save_track+0x20/0x40
[   31.233258]  kasan_save_alloc_info+0x40/0x58
[   31.237592]  __kasan_kmalloc+0xd4/0xd8
[   31.241409]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.246007]  kmalloc_oob_right+0xb0/0x660
[   31.250081]  kunit_try_run_case+0x170/0x3f0
[   31.254331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.259892]  kthread+0x328/0x630
[   31.263176]  ret_from_fork+0x10/0x20
[   31.266809] 
[   31.268339] The buggy address belongs to the object at ffff00009068f100
[   31.268339]  which belongs to the cache kmalloc-128 of size 128
[   31.280989] The buggy address is located 13 bytes to the right of
[   31.280989]  allocated 115-byte region [ffff00009068f100, ffff00009068f173)
[   31.294164] 
[   31.295694] The buggy address belongs to the physical page:
[   31.301335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11068e
[   31.309433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.317183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.324228] page_type: f5(slab)
[   31.327424] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   31.335264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.343104] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   31.351028] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.358953] head: 0bfffe0000000001 fffffdffc241a381 00000000ffffffff 00000000ffffffff
[   31.366876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.374797] page dumped because: kasan: bad access detected
[   31.380445] 
[   31.381968] Memory state around the buggy address:
[   31.386818]  ffff00009068f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.394134]  ffff00009068f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.401448] >ffff00009068f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.408762]                    ^
[   31.412041]  ffff00009068f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.419356]  ffff00009068f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.426658] ==================================================================
[   30.827720] ==================================================================
[   30.835029] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.842082] Write of size 1 at addr ffff00009068f178 by task kunit_try_catch/245
[   30.849575] 
[   30.851113] CPU: 5 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   30.851142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.851150] Hardware name: Thundercomm Dragonboard 845c (DT)
[   30.851159] Call trace:
[   30.851165]  show_stack+0x20/0x38 (C)
[   30.851182]  dump_stack_lvl+0x8c/0xd0
[   30.851201]  print_report+0x118/0x608
[   30.851220]  kasan_report+0xdc/0x128
[   30.851237]  __asan_report_store1_noabort+0x20/0x30
[   30.851253]  kmalloc_oob_right+0x538/0x660
[   30.851268]  kunit_try_run_case+0x170/0x3f0
[   30.851285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.851305]  kthread+0x328/0x630
[   30.851319]  ret_from_fork+0x10/0x20
[   30.851335] 
[   30.916997] Allocated by task 245:
[   30.920461]  kasan_save_stack+0x3c/0x68
[   30.924368]  kasan_save_track+0x20/0x40
[   30.928272]  kasan_save_alloc_info+0x40/0x58
[   30.932602]  __kasan_kmalloc+0xd4/0xd8
[   30.936418]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.941015]  kmalloc_oob_right+0xb0/0x660
[   30.945090]  kunit_try_run_case+0x170/0x3f0
[   30.949341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.954908]  kthread+0x328/0x630
[   30.958189]  ret_from_fork+0x10/0x20
[   30.961829] 
[   30.963360] The buggy address belongs to the object at ffff00009068f100
[   30.963360]  which belongs to the cache kmalloc-128 of size 128
[   30.976011] The buggy address is located 5 bytes to the right of
[   30.976011]  allocated 115-byte region [ffff00009068f100, ffff00009068f173)
[   30.989099] 
[   30.990625] The buggy address belongs to the physical page:
[   30.996266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11068e
[   31.004369] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.012119] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.019171] page_type: f5(slab)
[   31.022371] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   31.030211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.038050] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   31.045975] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.053902] head: 0bfffe0000000001 fffffdffc241a381 00000000ffffffff 00000000ffffffff
[   31.061825] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.069744] page dumped because: kasan: bad access detected
[   31.075381] 
[   31.076903] Memory state around the buggy address:
[   31.081755]  ffff00009068f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.089070]  ffff00009068f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.096383] >ffff00009068f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.103696]                                                                 ^
[   31.110918]  ffff00009068f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.118231]  ffff00009068f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.125545] ==================================================================
[   30.518340] ==================================================================
[   30.525671] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.532740] Write of size 1 at addr ffff00009068f173 by task kunit_try_catch/245
[   30.540236] 
[   30.541772] CPU: 5 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   30.541805] Tainted: [N]=TEST
[   30.541812] Hardware name: Thundercomm Dragonboard 845c (DT)
[   30.541827] Call trace:
[   30.541835]  show_stack+0x20/0x38 (C)
[   30.541865]  dump_stack_lvl+0x8c/0xd0
[   30.541930]  print_report+0x118/0x608
[   30.541951]  kasan_report+0xdc/0x128
[   30.541969]  __asan_report_store1_noabort+0x20/0x30
[   30.541986]  kmalloc_oob_right+0x5a4/0x660
[   30.542002]  kunit_try_run_case+0x170/0x3f0
[   30.542021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.542042]  kthread+0x328/0x630
[   30.542057]  ret_from_fork+0x10/0x20
[   30.542076] 
[   30.606528] Allocated by task 245:
[   30.609983]  kasan_save_stack+0x3c/0x68
[   30.613890]  kasan_save_track+0x20/0x40
[   30.617793]  kasan_save_alloc_info+0x40/0x58
[   30.622129]  __kasan_kmalloc+0xd4/0xd8
[   30.625945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.630546]  kmalloc_oob_right+0xb0/0x660
[   30.634621]  kunit_try_run_case+0x170/0x3f0
[   30.638870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.644432]  kthread+0x328/0x630
[   30.647714]  ret_from_fork+0x10/0x20
[   30.651346] 
[   30.652881] The buggy address belongs to the object at ffff00009068f100
[   30.652881]  which belongs to the cache kmalloc-128 of size 128
[   30.665533] The buggy address is located 0 bytes to the right of
[   30.665533]  allocated 115-byte region [ffff00009068f100, ffff00009068f173)
[   30.678621] 
[   30.680153] The buggy address belongs to the physical page:
[   30.685798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11068e
[   30.693902] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.701654] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.708705] page_type: f5(slab)
[   30.711906] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   30.719746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.727586] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   30.735511] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.743435] head: 0bfffe0000000001 fffffdffc241a381 00000000ffffffff 00000000ffffffff
[   30.751358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.759278] page dumped because: kasan: bad access detected
[   30.764919] 
[   30.766441] Memory state around the buggy address:
[   30.771301]  ffff00009068f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.778607]  ffff00009068f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.785921] >ffff00009068f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.793232]                                                              ^
[   30.800185]  ffff00009068f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.807500]  ffff00009068f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.814806] ==================================================================

[   30.637186] ==================================================================
[   30.637293] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.637391] Write of size 1 at addr fff00000c58afc78 by task kunit_try_catch/168
[   30.637442] 
[   30.637470] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   30.637611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.637638] Hardware name: linux,dummy-virt (DT)
[   30.637726] Call trace:
[   30.637748]  show_stack+0x20/0x38 (C)
[   30.637796]  dump_stack_lvl+0x8c/0xd0
[   30.638281]  print_report+0x118/0x608
[   30.638346]  kasan_report+0xdc/0x128
[   30.638410]  __asan_report_store1_noabort+0x20/0x30
[   30.638464]  kmalloc_oob_right+0x538/0x660
[   30.638512]  kunit_try_run_case+0x170/0x3f0
[   30.639370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.639453]  kthread+0x328/0x630
[   30.639496]  ret_from_fork+0x10/0x20
[   30.639562] 
[   30.639582] Allocated by task 168:
[   30.639609]  kasan_save_stack+0x3c/0x68
[   30.639653]  kasan_save_track+0x20/0x40
[   30.639691]  kasan_save_alloc_info+0x40/0x58
[   30.639727]  __kasan_kmalloc+0xd4/0xd8
[   30.639763]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.639802]  kmalloc_oob_right+0xb0/0x660
[   30.640148]  kunit_try_run_case+0x170/0x3f0
[   30.640206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.640370]  kthread+0x328/0x630
[   30.640609]  ret_from_fork+0x10/0x20
[   30.640656] 
[   30.640950] The buggy address belongs to the object at fff00000c58afc00
[   30.640950]  which belongs to the cache kmalloc-128 of size 128
[   30.641051] The buggy address is located 5 bytes to the right of
[   30.641051]  allocated 115-byte region [fff00000c58afc00, fff00000c58afc73)
[   30.641526] 
[   30.641667] The buggy address belongs to the physical page:
[   30.641746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058af
[   30.642139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.642323] page_type: f5(slab)
[   30.642549] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.642690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.642732] page dumped because: kasan: bad access detected
[   30.642763] 
[   30.642781] Memory state around the buggy address:
[   30.643053]  fff00000c58afb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.643330]  fff00000c58afb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.643515] >fff00000c58afc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.643858]                                                                 ^
[   30.644012]  fff00000c58afc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.644148]  fff00000c58afd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.644252] ==================================================================
[   30.629928] ==================================================================
[   30.630271] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.631112] Write of size 1 at addr fff00000c58afc73 by task kunit_try_catch/168
[   30.631218] 
[   30.631988] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   30.632140] Tainted: [N]=TEST
[   30.632172] Hardware name: linux,dummy-virt (DT)
[   30.632498] Call trace:
[   30.632684]  show_stack+0x20/0x38 (C)
[   30.632818]  dump_stack_lvl+0x8c/0xd0
[   30.632893]  print_report+0x118/0x608
[   30.632941]  kasan_report+0xdc/0x128
[   30.632988]  __asan_report_store1_noabort+0x20/0x30
[   30.633037]  kmalloc_oob_right+0x5a4/0x660
[   30.633084]  kunit_try_run_case+0x170/0x3f0
[   30.633135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.633190]  kthread+0x328/0x630
[   30.633233]  ret_from_fork+0x10/0x20
[   30.633388] 
[   30.633425] Allocated by task 168:
[   30.633535]  kasan_save_stack+0x3c/0x68
[   30.633600]  kasan_save_track+0x20/0x40
[   30.633639]  kasan_save_alloc_info+0x40/0x58
[   30.633676]  __kasan_kmalloc+0xd4/0xd8
[   30.633713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.633755]  kmalloc_oob_right+0xb0/0x660
[   30.633792]  kunit_try_run_case+0x170/0x3f0
[   30.633831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.633887]  kthread+0x328/0x630
[   30.633919]  ret_from_fork+0x10/0x20
[   30.633978] 
[   30.634036] The buggy address belongs to the object at fff00000c58afc00
[   30.634036]  which belongs to the cache kmalloc-128 of size 128
[   30.634130] The buggy address is located 0 bytes to the right of
[   30.634130]  allocated 115-byte region [fff00000c58afc00, fff00000c58afc73)
[   30.634197] 
[   30.634276] The buggy address belongs to the physical page:
[   30.634476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058af
[   30.634745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.635158] page_type: f5(slab)
[   30.635451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.635515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.635624] page dumped because: kasan: bad access detected
[   30.635664] 
[   30.635692] Memory state around the buggy address:
[   30.635919]  fff00000c58afb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.635988]  fff00000c58afb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.636044] >fff00000c58afc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.636097]                                                              ^
[   30.636182]  fff00000c58afc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.636223]  fff00000c58afd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.636283] ==================================================================
[   30.645781] ==================================================================
[   30.647121] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.647759] Read of size 1 at addr fff00000c58afc80 by task kunit_try_catch/168
[   30.647818] 
[   30.647858] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   30.647940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.647966] Hardware name: linux,dummy-virt (DT)
[   30.647999] Call trace:
[   30.648891]  show_stack+0x20/0x38 (C)
[   30.649565]  dump_stack_lvl+0x8c/0xd0
[   30.650078]  print_report+0x118/0x608
[   30.650374]  kasan_report+0xdc/0x128
[   30.650745]  __asan_report_load1_noabort+0x20/0x30
[   30.651166]  kmalloc_oob_right+0x5d0/0x660
[   30.651980]  kunit_try_run_case+0x170/0x3f0
[   30.652430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.652895]  kthread+0x328/0x630
[   30.653062]  ret_from_fork+0x10/0x20
[   30.653111] 
[   30.653129] Allocated by task 168:
[   30.653156]  kasan_save_stack+0x3c/0x68
[   30.653580]  kasan_save_track+0x20/0x40
[   30.653740]  kasan_save_alloc_info+0x40/0x58
[   30.653779]  __kasan_kmalloc+0xd4/0xd8
[   30.654457]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.654740]  kmalloc_oob_right+0xb0/0x660
[   30.655585]  kunit_try_run_case+0x170/0x3f0
[   30.655736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.655785]  kthread+0x328/0x630
[   30.655818]  ret_from_fork+0x10/0x20
[   30.655864] 
[   30.655884] The buggy address belongs to the object at fff00000c58afc00
[   30.655884]  which belongs to the cache kmalloc-128 of size 128
[   30.657357] The buggy address is located 13 bytes to the right of
[   30.657357]  allocated 115-byte region [fff00000c58afc00, fff00000c58afc73)
[   30.657435] 
[   30.657792] The buggy address belongs to the physical page:
[   30.658226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058af
[   30.658471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.659554] page_type: f5(slab)
[   30.659622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.659693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.659761] page dumped because: kasan: bad access detected
[   30.659818] 
[   30.659862] Memory state around the buggy address:
[   30.659958]  fff00000c58afb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.660096]  fff00000c58afc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.660265] >fff00000c58afc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.660303]                    ^
[   30.660330]  fff00000c58afd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.660709]  fff00000c58afd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.660771] ==================================================================

[   22.442523] ==================================================================
[   22.443251] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   22.444205] Write of size 1 at addr ffff888105479b78 by task kunit_try_catch/185
[   22.445132] 
[   22.445348] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   22.445396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.445409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.445430] Call Trace:
[   22.445444]  <TASK>
[   22.445470]  dump_stack_lvl+0x73/0xb0
[   22.445499]  print_report+0xd1/0x650
[   22.445522]  ? __virt_addr_valid+0x1db/0x2d0
[   22.445545]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.445565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.445590]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.445611]  kasan_report+0x141/0x180
[   22.445632]  ? kmalloc_oob_right+0x6bd/0x7f0
[   22.445657]  __asan_report_store1_noabort+0x1b/0x30
[   22.445680]  kmalloc_oob_right+0x6bd/0x7f0
[   22.445701]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.445723]  ? __schedule+0x10cc/0x2b60
[   22.445749]  ? __pfx_read_tsc+0x10/0x10
[   22.445770]  ? ktime_get_ts64+0x86/0x230
[   22.445794]  kunit_try_run_case+0x1a5/0x480
[   22.445818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.445844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.445864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.445891]  ? __kthread_parkme+0x82/0x180
[   22.445910]  ? preempt_count_sub+0x50/0x80
[   22.445933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.445956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.445979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.446003]  kthread+0x337/0x6f0
[   22.446021]  ? trace_preempt_on+0x20/0xc0
[   22.446044]  ? __pfx_kthread+0x10/0x10
[   22.446064]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.446089]  ? calculate_sigpending+0x7b/0xa0
[   22.446113]  ? __pfx_kthread+0x10/0x10
[   22.446134]  ret_from_fork+0x116/0x1d0
[   22.446153]  ? __pfx_kthread+0x10/0x10
[   22.446173]  ret_from_fork_asm+0x1a/0x30
[   22.446204]  </TASK>
[   22.446215] 
[   22.454574] Allocated by task 185:
[   22.454905]  kasan_save_stack+0x45/0x70
[   22.455300]  kasan_save_track+0x18/0x40
[   22.455714]  kasan_save_alloc_info+0x3b/0x50
[   22.456128]  __kasan_kmalloc+0xb7/0xc0
[   22.456513]  __kmalloc_cache_noprof+0x189/0x420
[   22.457000]  kmalloc_oob_right+0xa9/0x7f0
[   22.457412]  kunit_try_run_case+0x1a5/0x480
[   22.457792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.458288]  kthread+0x337/0x6f0
[   22.458546]  ret_from_fork+0x116/0x1d0
[   22.458672]  ret_from_fork_asm+0x1a/0x30
[   22.458804] 
[   22.458869] The buggy address belongs to the object at ffff888105479b00
[   22.458869]  which belongs to the cache kmalloc-128 of size 128
[   22.459229] The buggy address is located 5 bytes to the right of
[   22.459229]  allocated 115-byte region [ffff888105479b00, ffff888105479b73)
[   22.459626] 
[   22.459690] The buggy address belongs to the physical page:
[   22.459856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105479
[   22.460088] flags: 0x200000000000000(node=0|zone=2)
[   22.460246] page_type: f5(slab)
[   22.460359] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.460595] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.460813] page dumped because: kasan: bad access detected
[   22.460976] 
[   22.461042] Memory state around the buggy address:
[   22.461194]  ffff888105479a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.461783]  ffff888105479a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.462374] >ffff888105479b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.462593]                                                                 ^
[   22.462799]  ffff888105479b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.463008]  ffff888105479c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.463265] ==================================================================
[   22.464083] ==================================================================
[   22.464807] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   22.465466] Read of size 1 at addr ffff888105479b80 by task kunit_try_catch/185
[   22.466085] 
[   22.466268] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   22.466312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.466324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.466344] Call Trace:
[   22.466357]  <TASK>
[   22.466371]  dump_stack_lvl+0x73/0xb0
[   22.466397]  print_report+0xd1/0x650
[   22.466418]  ? __virt_addr_valid+0x1db/0x2d0
[   22.466440]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.466471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.466496]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.466517]  kasan_report+0x141/0x180
[   22.466538]  ? kmalloc_oob_right+0x68a/0x7f0
[   22.466563]  __asan_report_load1_noabort+0x18/0x20
[   22.466587]  kmalloc_oob_right+0x68a/0x7f0
[   22.466608]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.466629]  ? __schedule+0x10cc/0x2b60
[   22.466656]  ? __pfx_read_tsc+0x10/0x10
[   22.466676]  ? ktime_get_ts64+0x86/0x230
[   22.466700]  kunit_try_run_case+0x1a5/0x480
[   22.466725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.466747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.466768]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.466795]  ? __kthread_parkme+0x82/0x180
[   22.466814]  ? preempt_count_sub+0x50/0x80
[   22.466836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.466860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.466883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.466906]  kthread+0x337/0x6f0
[   22.466925]  ? trace_preempt_on+0x20/0xc0
[   22.466947]  ? __pfx_kthread+0x10/0x10
[   22.466967]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.466992]  ? calculate_sigpending+0x7b/0xa0
[   22.467016]  ? __pfx_kthread+0x10/0x10
[   22.467037]  ret_from_fork+0x116/0x1d0
[   22.467056]  ? __pfx_kthread+0x10/0x10
[   22.467076]  ret_from_fork_asm+0x1a/0x30
[   22.467106]  </TASK>
[   22.467116] 
[   22.478857] Allocated by task 185:
[   22.479162]  kasan_save_stack+0x45/0x70
[   22.479575]  kasan_save_track+0x18/0x40
[   22.479880]  kasan_save_alloc_info+0x3b/0x50
[   22.480022]  __kasan_kmalloc+0xb7/0xc0
[   22.480150]  __kmalloc_cache_noprof+0x189/0x420
[   22.480378]  kmalloc_oob_right+0xa9/0x7f0
[   22.480737]  kunit_try_run_case+0x1a5/0x480
[   22.481241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.481703]  kthread+0x337/0x6f0
[   22.481987]  ret_from_fork+0x116/0x1d0
[   22.482365]  ret_from_fork_asm+0x1a/0x30
[   22.482738] 
[   22.482890] The buggy address belongs to the object at ffff888105479b00
[   22.482890]  which belongs to the cache kmalloc-128 of size 128
[   22.483487] The buggy address is located 13 bytes to the right of
[   22.483487]  allocated 115-byte region [ffff888105479b00, ffff888105479b73)
[   22.483858] 
[   22.483925] The buggy address belongs to the physical page:
[   22.484088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105479
[   22.484602] flags: 0x200000000000000(node=0|zone=2)
[   22.485005] page_type: f5(slab)
[   22.485319] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.486020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.486726] page dumped because: kasan: bad access detected
[   22.487194] 
[   22.487367] Memory state around the buggy address:
[   22.487787]  ffff888105479a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.488416]  ffff888105479b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.489010] >ffff888105479b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.489646]                    ^
[   22.489994]  ffff888105479c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.490298]  ffff888105479c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.490513] ==================================================================
[   22.408681] ==================================================================
[   22.409815] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   22.410760] Write of size 1 at addr ffff888105479b73 by task kunit_try_catch/185
[   22.411064] 
[   22.412083] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   22.412429] Tainted: [N]=TEST
[   22.412473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.412701] Call Trace:
[   22.412770]  <TASK>
[   22.412920]  dump_stack_lvl+0x73/0xb0
[   22.413013]  print_report+0xd1/0x650
[   22.413043]  ? __virt_addr_valid+0x1db/0x2d0
[   22.413070]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.413090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.413115]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.413136]  kasan_report+0x141/0x180
[   22.413157]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.413183]  __asan_report_store1_noabort+0x1b/0x30
[   22.413206]  kmalloc_oob_right+0x6f0/0x7f0
[   22.413228]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.413249]  ? __schedule+0x10cc/0x2b60
[   22.413277]  ? __pfx_read_tsc+0x10/0x10
[   22.413300]  ? ktime_get_ts64+0x86/0x230
[   22.413326]  kunit_try_run_case+0x1a5/0x480
[   22.413352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.413375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.413396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.413424]  ? __kthread_parkme+0x82/0x180
[   22.413446]  ? preempt_count_sub+0x50/0x80
[   22.413482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.413506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.413528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.413552]  kthread+0x337/0x6f0
[   22.413572]  ? trace_preempt_on+0x20/0xc0
[   22.413596]  ? __pfx_kthread+0x10/0x10
[   22.413617]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.413642]  ? calculate_sigpending+0x7b/0xa0
[   22.413666]  ? __pfx_kthread+0x10/0x10
[   22.413688]  ret_from_fork+0x116/0x1d0
[   22.413707]  ? __pfx_kthread+0x10/0x10
[   22.413727]  ret_from_fork_asm+0x1a/0x30
[   22.413780]  </TASK>
[   22.413851] 
[   22.425526] Allocated by task 185:
[   22.425965]  kasan_save_stack+0x45/0x70
[   22.426338]  kasan_save_track+0x18/0x40
[   22.426485]  kasan_save_alloc_info+0x3b/0x50
[   22.426627]  __kasan_kmalloc+0xb7/0xc0
[   22.426757]  __kmalloc_cache_noprof+0x189/0x420
[   22.426909]  kmalloc_oob_right+0xa9/0x7f0
[   22.427041]  kunit_try_run_case+0x1a5/0x480
[   22.427180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.427639]  kthread+0x337/0x6f0
[   22.427925]  ret_from_fork+0x116/0x1d0
[   22.428243]  ret_from_fork_asm+0x1a/0x30
[   22.428634] 
[   22.428841] The buggy address belongs to the object at ffff888105479b00
[   22.428841]  which belongs to the cache kmalloc-128 of size 128
[   22.430005] The buggy address is located 0 bytes to the right of
[   22.430005]  allocated 115-byte region [ffff888105479b00, ffff888105479b73)
[   22.431415] 
[   22.431673] The buggy address belongs to the physical page:
[   22.432353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105479
[   22.433235] flags: 0x200000000000000(node=0|zone=2)
[   22.433775] page_type: f5(slab)
[   22.434227] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.434503] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.434795] page dumped because: kasan: bad access detected
[   22.434970] 
[   22.435047] Memory state around the buggy address:
[   22.435435]  ffff888105479a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.436075]  ffff888105479a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.436847] >ffff888105479b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.437764]                                                              ^
[   22.438619]  ffff888105479b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.439440]  ffff888105479c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.440283] ==================================================================