Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   35.927442] ==================================================================
[   35.933889] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.940828] Write of size 1 at addr ffff00080193a973 by task kunit_try_catch/220
[   35.948204] 
[   35.949692] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.949746] Tainted: [N]=TEST
[   35.949760] Hardware name: WinLink E850-96 board (DT)
[   35.949783] Call trace:
[   35.949796]  show_stack+0x20/0x38 (C)
[   35.949830]  dump_stack_lvl+0x8c/0xd0
[   35.949861]  print_report+0x118/0x5d0
[   35.949890]  kasan_report+0xdc/0x128
[   35.949918]  __asan_report_store1_noabort+0x20/0x30
[   35.949953]  kmalloc_oob_right+0x5a4/0x660
[   35.949987]  kunit_try_run_case+0x170/0x3f0
[   35.950024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.950057]  kthread+0x328/0x630
[   35.950087]  ret_from_fork+0x10/0x20
[   35.950123] 
[   36.012527] Allocated by task 220:
[   36.015915]  kasan_save_stack+0x3c/0x68
[   36.019731]  kasan_save_track+0x20/0x40
[   36.023550]  kasan_save_alloc_info+0x40/0x58
[   36.027804]  __kasan_kmalloc+0xd4/0xd8
[   36.031537]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.036050]  kmalloc_oob_right+0xb0/0x660
[   36.040043]  kunit_try_run_case+0x170/0x3f0
[   36.044210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.049678]  kthread+0x328/0x630
[   36.052890]  ret_from_fork+0x10/0x20
[   36.056449] 
[   36.057926] The buggy address belongs to the object at ffff00080193a900
[   36.057926]  which belongs to the cache kmalloc-128 of size 128
[   36.070427] The buggy address is located 0 bytes to the right of
[   36.070427]  allocated 115-byte region [ffff00080193a900, ffff00080193a973)
[   36.083358] 
[   36.084836] The buggy address belongs to the physical page:
[   36.090394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   36.098379] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.106016] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.112960] page_type: f5(slab)
[   36.116097] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.123815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.131544] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.139353] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.147167] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   36.154978] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.162784] page dumped because: kasan: bad access detected
[   36.168340] 
[   36.169815] Memory state around the buggy address:
[   36.174595]  ffff00080193a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.181798]  ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.189005] >ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.196204]                                                              ^
[   36.203065]  ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.210271]  ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217471] ==================================================================
[   36.529555] ==================================================================
[   36.536656] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   36.543594] Read of size 1 at addr ffff00080193a980 by task kunit_try_catch/220
[   36.550886] 
[   36.552370] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   36.552423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.552439] Hardware name: WinLink E850-96 board (DT)
[   36.552458] Call trace:
[   36.552468]  show_stack+0x20/0x38 (C)
[   36.552502]  dump_stack_lvl+0x8c/0xd0
[   36.552534]  print_report+0x118/0x5d0
[   36.552563]  kasan_report+0xdc/0x128
[   36.552589]  __asan_report_load1_noabort+0x20/0x30
[   36.552621]  kmalloc_oob_right+0x5d0/0x660
[   36.552652]  kunit_try_run_case+0x170/0x3f0
[   36.552687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.552718]  kthread+0x328/0x630
[   36.552746]  ret_from_fork+0x10/0x20
[   36.552779] 
[   36.616336] Allocated by task 220:
[   36.619723]  kasan_save_stack+0x3c/0x68
[   36.623541]  kasan_save_track+0x20/0x40
[   36.627361]  kasan_save_alloc_info+0x40/0x58
[   36.631614]  __kasan_kmalloc+0xd4/0xd8
[   36.635347]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.639860]  kmalloc_oob_right+0xb0/0x660
[   36.643853]  kunit_try_run_case+0x170/0x3f0
[   36.648020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.653490]  kthread+0x328/0x630
[   36.656700]  ret_from_fork+0x10/0x20
[   36.660260] 
[   36.661736] The buggy address belongs to the object at ffff00080193a900
[   36.661736]  which belongs to the cache kmalloc-128 of size 128
[   36.674235] The buggy address is located 13 bytes to the right of
[   36.674235]  allocated 115-byte region [ffff00080193a900, ffff00080193a973)
[   36.687256] 
[   36.688734] The buggy address belongs to the physical page:
[   36.694291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   36.702273] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.709914] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.716857] page_type: f5(slab)
[   36.719990] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.727713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.735440] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.743251] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.751064] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   36.758876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.766681] page dumped because: kasan: bad access detected
[   36.772236] 
[   36.773712] Memory state around the buggy address:
[   36.778490]  ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.785695]  ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.792901] >ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.800101]                    ^
[   36.803318]  ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.810521]  ffff00080193aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.817722] ==================================================================
[   36.230044] ==================================================================
[   36.237179] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   36.244120] Write of size 1 at addr ffff00080193a978 by task kunit_try_catch/220
[   36.251498] 
[   36.252983] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   36.253037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.253052] Hardware name: WinLink E850-96 board (DT)
[   36.253073] Call trace:
[   36.253086]  show_stack+0x20/0x38 (C)
[   36.253118]  dump_stack_lvl+0x8c/0xd0
[   36.253149]  print_report+0x118/0x5d0
[   36.253176]  kasan_report+0xdc/0x128
[   36.253202]  __asan_report_store1_noabort+0x20/0x30
[   36.253235]  kmalloc_oob_right+0x538/0x660
[   36.253263]  kunit_try_run_case+0x170/0x3f0
[   36.253299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.253331]  kthread+0x328/0x630
[   36.253360]  ret_from_fork+0x10/0x20
[   36.253396] 
[   36.317035] Allocated by task 220:
[   36.320422]  kasan_save_stack+0x3c/0x68
[   36.324240]  kasan_save_track+0x20/0x40
[   36.328059]  kasan_save_alloc_info+0x40/0x58
[   36.332313]  __kasan_kmalloc+0xd4/0xd8
[   36.336045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.340559]  kmalloc_oob_right+0xb0/0x660
[   36.344553]  kunit_try_run_case+0x170/0x3f0
[   36.348719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.354187]  kthread+0x328/0x630
[   36.357399]  ret_from_fork+0x10/0x20
[   36.360958] 
[   36.362435] The buggy address belongs to the object at ffff00080193a900
[   36.362435]  which belongs to the cache kmalloc-128 of size 128
[   36.374935] The buggy address is located 5 bytes to the right of
[   36.374935]  allocated 115-byte region [ffff00080193a900, ffff00080193a973)
[   36.387869] 
[   36.389347] The buggy address belongs to the physical page:
[   36.394902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   36.402887] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.410525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.417471] page_type: f5(slab)
[   36.420604] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.428325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.436051] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.443863] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.451676] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   36.459488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.467293] page dumped because: kasan: bad access detected
[   36.472849] 
[   36.474325] Memory state around the buggy address:
[   36.479104]  ffff00080193a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.486307]  ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.493515] >ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.500713]                                                                 ^
[   36.507835]  ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515041]  ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.522241] ==================================================================

[   30.047575] ==================================================================
[   30.047918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.048739] Write of size 1 at addr fff00000c91b3373 by task kunit_try_catch/167
[   30.048906] 
[   30.050334] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.050506] Tainted: [N]=TEST
[   30.050539] Hardware name: linux,dummy-virt (DT)
[   30.050758] Call trace:
[   30.051618]  show_stack+0x20/0x38 (C)
[   30.051863]  dump_stack_lvl+0x8c/0xd0
[   30.051918]  print_report+0x118/0x5d0
[   30.051962]  kasan_report+0xdc/0x128
[   30.052005]  __asan_report_store1_noabort+0x20/0x30
[   30.052052]  kmalloc_oob_right+0x5a4/0x660
[   30.052098]  kunit_try_run_case+0x170/0x3f0
[   30.052150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.052199]  kthread+0x328/0x630
[   30.052242]  ret_from_fork+0x10/0x20
[   30.052526] 
[   30.052657] Allocated by task 167:
[   30.052957]  kasan_save_stack+0x3c/0x68
[   30.053541]  kasan_save_track+0x20/0x40
[   30.053637]  kasan_save_alloc_info+0x40/0x58
[   30.053865]  __kasan_kmalloc+0xd4/0xd8
[   30.053902]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.053944]  kmalloc_oob_right+0xb0/0x660
[   30.053980]  kunit_try_run_case+0x170/0x3f0
[   30.054018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.054057]  kthread+0x328/0x630
[   30.054090]  ret_from_fork+0x10/0x20
[   30.054470] 
[   30.054694] The buggy address belongs to the object at fff00000c91b3300
[   30.054694]  which belongs to the cache kmalloc-128 of size 128
[   30.054852] The buggy address is located 0 bytes to the right of
[   30.054852]  allocated 115-byte region [fff00000c91b3300, fff00000c91b3373)
[   30.054956] 
[   30.055297] The buggy address belongs to the physical page:
[   30.055606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.055942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.056315] page_type: f5(slab)
[   30.056622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.056682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.056785] page dumped because: kasan: bad access detected
[   30.056824] 
[   30.056850] Memory state around the buggy address:
[   30.057073]  fff00000c91b3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.057138]  fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.057189] >fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.057240]                                                              ^
[   30.057319]  fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.057468]  fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.057546] ==================================================================
[   30.058713] ==================================================================
[   30.058773] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.058826] Write of size 1 at addr fff00000c91b3378 by task kunit_try_catch/167
[   30.058913] 
[   30.058963] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.059070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.059107] Hardware name: linux,dummy-virt (DT)
[   30.059156] Call trace:
[   30.059196]  show_stack+0x20/0x38 (C)
[   30.059255]  dump_stack_lvl+0x8c/0xd0
[   30.059340]  print_report+0x118/0x5d0
[   30.059406]  kasan_report+0xdc/0x128
[   30.059487]  __asan_report_store1_noabort+0x20/0x30
[   30.059553]  kmalloc_oob_right+0x538/0x660
[   30.059620]  kunit_try_run_case+0x170/0x3f0
[   30.059668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.059735]  kthread+0x328/0x630
[   30.059779]  ret_from_fork+0x10/0x20
[   30.059846] 
[   30.059874] Allocated by task 167:
[   30.059902]  kasan_save_stack+0x3c/0x68
[   30.059957]  kasan_save_track+0x20/0x40
[   30.059995]  kasan_save_alloc_info+0x40/0x58
[   30.060030]  __kasan_kmalloc+0xd4/0xd8
[   30.060153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.060203]  kmalloc_oob_right+0xb0/0x660
[   30.060272]  kunit_try_run_case+0x170/0x3f0
[   30.060395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.060461]  kthread+0x328/0x630
[   30.060495]  ret_from_fork+0x10/0x20
[   30.060590] 
[   30.060651] The buggy address belongs to the object at fff00000c91b3300
[   30.060651]  which belongs to the cache kmalloc-128 of size 128
[   30.060711] The buggy address is located 5 bytes to the right of
[   30.060711]  allocated 115-byte region [fff00000c91b3300, fff00000c91b3373)
[   30.061016] 
[   30.061062] The buggy address belongs to the physical page:
[   30.061103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.061201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.061254] page_type: f5(slab)
[   30.061294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.061413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.061458] page dumped because: kasan: bad access detected
[   30.061489] 
[   30.061536] Memory state around the buggy address:
[   30.061843]  fff00000c91b3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.061918]  fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.062063] >fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.062102]                                                                 ^
[   30.062142]  fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.062182]  fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.062226] ==================================================================
[   30.062777] ==================================================================
[   30.062825] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.062903] Read of size 1 at addr fff00000c91b3380 by task kunit_try_catch/167
[   30.062969] 
[   30.063007] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.063115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.063142] Hardware name: linux,dummy-virt (DT)
[   30.063179] Call trace:
[   30.063218]  show_stack+0x20/0x38 (C)
[   30.063284]  dump_stack_lvl+0x8c/0xd0
[   30.063344]  print_report+0x118/0x5d0
[   30.063387]  kasan_report+0xdc/0x128
[   30.063648]  __asan_report_load1_noabort+0x20/0x30
[   30.063719]  kmalloc_oob_right+0x5d0/0x660
[   30.063775]  kunit_try_run_case+0x170/0x3f0
[   30.063841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.063910]  kthread+0x328/0x630
[   30.063958]  ret_from_fork+0x10/0x20
[   30.064035] 
[   30.064094] Allocated by task 167:
[   30.064141]  kasan_save_stack+0x3c/0x68
[   30.064200]  kasan_save_track+0x20/0x40
[   30.064239]  kasan_save_alloc_info+0x40/0x58
[   30.064277]  __kasan_kmalloc+0xd4/0xd8
[   30.064425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.064466]  kmalloc_oob_right+0xb0/0x660
[   30.064546]  kunit_try_run_case+0x170/0x3f0
[   30.064594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.064717]  kthread+0x328/0x630
[   30.064779]  ret_from_fork+0x10/0x20
[   30.064815] 
[   30.064833] The buggy address belongs to the object at fff00000c91b3300
[   30.064833]  which belongs to the cache kmalloc-128 of size 128
[   30.064920] The buggy address is located 13 bytes to the right of
[   30.064920]  allocated 115-byte region [fff00000c91b3300, fff00000c91b3373)
[   30.064993] 
[   30.065032] The buggy address belongs to the physical page:
[   30.065061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.065113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.065280] page_type: f5(slab)
[   30.065319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.065440] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.065629] page dumped because: kasan: bad access detected
[   30.065744] 
[   30.065795] Memory state around the buggy address:
[   30.065884]  fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065936]  fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.065977] >fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.066012]                    ^
[   30.066055]  fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.066094]  fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.066131] ==================================================================

[   23.008438] ==================================================================
[   23.009187] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   23.009948] Write of size 1 at addr ffff888105a7ad78 by task kunit_try_catch/186
[   23.010882] 
[   23.011091] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.011210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.011230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.011253] Call Trace:
[   23.011267]  <TASK>
[   23.011283]  dump_stack_lvl+0x73/0xb0
[   23.011315]  print_report+0xd1/0x610
[   23.011337]  ? __virt_addr_valid+0x1db/0x2d0
[   23.011360]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.011382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.011667]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.011690]  kasan_report+0x141/0x180
[   23.011711]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.011748]  __asan_report_store1_noabort+0x1b/0x30
[   23.011771]  kmalloc_oob_right+0x6bd/0x7f0
[   23.011792]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.011814]  ? __schedule+0x10cc/0x2b60
[   23.011837]  ? __pfx_read_tsc+0x10/0x10
[   23.011858]  ? ktime_get_ts64+0x86/0x230
[   23.011883]  kunit_try_run_case+0x1a5/0x480
[   23.011904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.011924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.011947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.011969]  ? __kthread_parkme+0x82/0x180
[   23.011989]  ? preempt_count_sub+0x50/0x80
[   23.012012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.012033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.012057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.012082]  kthread+0x337/0x6f0
[   23.012101]  ? trace_preempt_on+0x20/0xc0
[   23.012125]  ? __pfx_kthread+0x10/0x10
[   23.012145]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.012165]  ? calculate_sigpending+0x7b/0xa0
[   23.012189]  ? __pfx_kthread+0x10/0x10
[   23.012210]  ret_from_fork+0x116/0x1d0
[   23.012228]  ? __pfx_kthread+0x10/0x10
[   23.012248]  ret_from_fork_asm+0x1a/0x30
[   23.012286]  </TASK>
[   23.012297] 
[   23.026116] Allocated by task 186:
[   23.026243]  kasan_save_stack+0x45/0x70
[   23.026377]  kasan_save_track+0x18/0x40
[   23.026798]  kasan_save_alloc_info+0x3b/0x50
[   23.027236]  __kasan_kmalloc+0xb7/0xc0
[   23.027678]  __kmalloc_cache_noprof+0x189/0x420
[   23.028201]  kmalloc_oob_right+0xa9/0x7f0
[   23.028602]  kunit_try_run_case+0x1a5/0x480
[   23.028998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.029424]  kthread+0x337/0x6f0
[   23.029581]  ret_from_fork+0x116/0x1d0
[   23.029967]  ret_from_fork_asm+0x1a/0x30
[   23.030418] 
[   23.030524] The buggy address belongs to the object at ffff888105a7ad00
[   23.030524]  which belongs to the cache kmalloc-128 of size 128
[   23.031573] The buggy address is located 5 bytes to the right of
[   23.031573]  allocated 115-byte region [ffff888105a7ad00, ffff888105a7ad73)
[   23.032376] 
[   23.032552] The buggy address belongs to the physical page:
[   23.033235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a
[   23.033834] flags: 0x200000000000000(node=0|zone=2)
[   23.033989] page_type: f5(slab)
[   23.034245] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.035018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.035820] page dumped because: kasan: bad access detected
[   23.036185] 
[   23.036249] Memory state around the buggy address:
[   23.036410]  ffff888105a7ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.037213]  ffff888105a7ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.037712] >ffff888105a7ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.037928]                                                                 ^
[   23.038125]  ffff888105a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.038322]  ffff888105a7ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.038908] ==================================================================
[   23.039931] ==================================================================
[   23.040387] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   23.041285] Read of size 1 at addr ffff888105a7ad80 by task kunit_try_catch/186
[   23.041600] 
[   23.041817] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.041870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.041893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.041914] Call Trace:
[   23.041933]  <TASK>
[   23.041950]  dump_stack_lvl+0x73/0xb0
[   23.041978]  print_report+0xd1/0x610
[   23.042037]  ? __virt_addr_valid+0x1db/0x2d0
[   23.042084]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.042104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.042130]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.042151]  kasan_report+0x141/0x180
[   23.042172]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.042196]  __asan_report_load1_noabort+0x18/0x20
[   23.042219]  kmalloc_oob_right+0x68a/0x7f0
[   23.042240]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.042261]  ? __schedule+0x10cc/0x2b60
[   23.042312]  ? __pfx_read_tsc+0x10/0x10
[   23.042334]  ? ktime_get_ts64+0x86/0x230
[   23.042359]  kunit_try_run_case+0x1a5/0x480
[   23.042381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.042400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.042422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.042445]  ? __kthread_parkme+0x82/0x180
[   23.042465]  ? preempt_count_sub+0x50/0x80
[   23.042488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.042509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.042534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.042558]  kthread+0x337/0x6f0
[   23.042577]  ? trace_preempt_on+0x20/0xc0
[   23.042603]  ? __pfx_kthread+0x10/0x10
[   23.042623]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.042644]  ? calculate_sigpending+0x7b/0xa0
[   23.042667]  ? __pfx_kthread+0x10/0x10
[   23.042688]  ret_from_fork+0x116/0x1d0
[   23.042707]  ? __pfx_kthread+0x10/0x10
[   23.042727]  ret_from_fork_asm+0x1a/0x30
[   23.042768]  </TASK>
[   23.042779] 
[   23.055247] Allocated by task 186:
[   23.055368]  kasan_save_stack+0x45/0x70
[   23.055554]  kasan_save_track+0x18/0x40
[   23.055675]  kasan_save_alloc_info+0x3b/0x50
[   23.056112]  __kasan_kmalloc+0xb7/0xc0
[   23.056577]  __kmalloc_cache_noprof+0x189/0x420
[   23.057138]  kmalloc_oob_right+0xa9/0x7f0
[   23.057414]  kunit_try_run_case+0x1a5/0x480
[   23.057563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.058095]  kthread+0x337/0x6f0
[   23.058547]  ret_from_fork+0x116/0x1d0
[   23.058695]  ret_from_fork_asm+0x1a/0x30
[   23.058840] 
[   23.058904] The buggy address belongs to the object at ffff888105a7ad00
[   23.058904]  which belongs to the cache kmalloc-128 of size 128
[   23.059236] The buggy address is located 13 bytes to the right of
[   23.059236]  allocated 115-byte region [ffff888105a7ad00, ffff888105a7ad73)
[   23.059582] 
[   23.059644] The buggy address belongs to the physical page:
[   23.059814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a
[   23.060037] flags: 0x200000000000000(node=0|zone=2)
[   23.060187] page_type: f5(slab)
[   23.060297] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.060515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.060722] page dumped because: kasan: bad access detected
[   23.061932] 
[   23.062094] Memory state around the buggy address:
[   23.062959]  ffff888105a7ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.063285]  ffff888105a7ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.064095] >ffff888105a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.065696]                    ^
[   23.066194]  ffff888105a7ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.067041]  ffff888105a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.067902] ==================================================================
[   22.971845] ==================================================================
[   22.972629] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   22.973307] Write of size 1 at addr ffff888105a7ad73 by task kunit_try_catch/186
[   22.973696] 
[   22.974679] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   22.975045] Tainted: [N]=TEST
[   22.975076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.975304] Call Trace:
[   22.975371]  <TASK>
[   22.975513]  dump_stack_lvl+0x73/0xb0
[   22.975604]  print_report+0xd1/0x610
[   22.975633]  ? __virt_addr_valid+0x1db/0x2d0
[   22.975659]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.975681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.975706]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.975727]  kasan_report+0x141/0x180
[   22.975761]  ? kmalloc_oob_right+0x6f0/0x7f0
[   22.975786]  __asan_report_store1_noabort+0x1b/0x30
[   22.975809]  kmalloc_oob_right+0x6f0/0x7f0
[   22.975830]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.975852]  ? __schedule+0x10cc/0x2b60
[   22.975876]  ? __pfx_read_tsc+0x10/0x10
[   22.975898]  ? ktime_get_ts64+0x86/0x230
[   22.975924]  kunit_try_run_case+0x1a5/0x480
[   22.975949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.975968]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.975991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.976014]  ? __kthread_parkme+0x82/0x180
[   22.976035]  ? preempt_count_sub+0x50/0x80
[   22.976059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.976080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.976105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.976129]  kthread+0x337/0x6f0
[   22.976149]  ? trace_preempt_on+0x20/0xc0
[   22.976174]  ? __pfx_kthread+0x10/0x10
[   22.976195]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.976216]  ? calculate_sigpending+0x7b/0xa0
[   22.976240]  ? __pfx_kthread+0x10/0x10
[   22.976262]  ret_from_fork+0x116/0x1d0
[   22.976295]  ? __pfx_kthread+0x10/0x10
[   22.976319]  ret_from_fork_asm+0x1a/0x30
[   22.976374]  </TASK>
[   22.976439] 
[   22.992617] Allocated by task 186:
[   22.993220]  kasan_save_stack+0x45/0x70
[   22.993724]  kasan_save_track+0x18/0x40
[   22.993934]  kasan_save_alloc_info+0x3b/0x50
[   22.994086]  __kasan_kmalloc+0xb7/0xc0
[   22.994215]  __kmalloc_cache_noprof+0x189/0x420
[   22.994377]  kmalloc_oob_right+0xa9/0x7f0
[   22.994512]  kunit_try_run_case+0x1a5/0x480
[   22.994653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.994834]  kthread+0x337/0x6f0
[   22.994955]  ret_from_fork+0x116/0x1d0
[   22.995083]  ret_from_fork_asm+0x1a/0x30
[   22.995269] 
[   22.995418] The buggy address belongs to the object at ffff888105a7ad00
[   22.995418]  which belongs to the cache kmalloc-128 of size 128
[   22.996581] The buggy address is located 0 bytes to the right of
[   22.996581]  allocated 115-byte region [ffff888105a7ad00, ffff888105a7ad73)
[   22.997224] 
[   22.997602] The buggy address belongs to the physical page:
[   22.998103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a7a
[   22.999178] flags: 0x200000000000000(node=0|zone=2)
[   22.999852] page_type: f5(slab)
[   23.000289] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.001199] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.002068] page dumped because: kasan: bad access detected
[   23.002668] 
[   23.002863] Memory state around the buggy address:
[   23.003681]  ffff888105a7ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.004356]  ffff888105a7ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.004878] >ffff888105a7ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.005229]                                                              ^
[   23.006004]  ffff888105a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.006674]  ffff888105a7ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.006997] ==================================================================