Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   36.560863] ==================================================================
[   36.567940] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   36.574878] Read of size 1 at addr ffff000801ff7480 by task kunit_try_catch/220
[   36.582170] 
[   36.583655] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   36.583706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.583725] Hardware name: WinLink E850-96 board (DT)
[   36.583743] Call trace:
[   36.583754]  show_stack+0x20/0x38 (C)
[   36.583789]  dump_stack_lvl+0x8c/0xd0
[   36.583820]  print_report+0x118/0x5d0
[   36.583847]  kasan_report+0xdc/0x128
[   36.583873]  __asan_report_load1_noabort+0x20/0x30
[   36.583906]  kmalloc_oob_right+0x5d0/0x660
[   36.583938]  kunit_try_run_case+0x170/0x3f0
[   36.583972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.584003]  kthread+0x328/0x630
[   36.584035]  ret_from_fork+0x10/0x20
[   36.584069] 
[   36.647621] Allocated by task 220:
[   36.651008]  kasan_save_stack+0x3c/0x68
[   36.654825]  kasan_save_track+0x20/0x40
[   36.658645]  kasan_save_alloc_info+0x40/0x58
[   36.662898]  __kasan_kmalloc+0xd4/0xd8
[   36.666630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.671144]  kmalloc_oob_right+0xb0/0x660
[   36.675137]  kunit_try_run_case+0x170/0x3f0
[   36.679304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.684773]  kthread+0x328/0x630
[   36.687985]  ret_from_fork+0x10/0x20
[   36.691544] 
[   36.693020] The buggy address belongs to the object at ffff000801ff7400
[   36.693020]  which belongs to the cache kmalloc-128 of size 128
[   36.705520] The buggy address is located 13 bytes to the right of
[   36.705520]  allocated 115-byte region [ffff000801ff7400, ffff000801ff7473)
[   36.718539] 
[   36.720017] The buggy address belongs to the physical page:
[   36.725575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6
[   36.733557] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.741197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.748140] page_type: f5(slab)
[   36.751277] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.758997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.766724] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.774535] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.782348] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff
[   36.790160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.797965] page dumped because: kasan: bad access detected
[   36.803521] 
[   36.804996] Memory state around the buggy address:
[   36.809775]  ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.816980]  ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.824185] >ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.831385]                    ^
[   36.834600]  ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.841805]  ffff000801ff7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.849006] ==================================================================
[   36.261308] ==================================================================
[   36.268464] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   36.275404] Write of size 1 at addr ffff000801ff7478 by task kunit_try_catch/220
[   36.282782] 
[   36.284268] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   36.284321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.284337] Hardware name: WinLink E850-96 board (DT)
[   36.284356] Call trace:
[   36.284370]  show_stack+0x20/0x38 (C)
[   36.284403]  dump_stack_lvl+0x8c/0xd0
[   36.284435]  print_report+0x118/0x5d0
[   36.284465]  kasan_report+0xdc/0x128
[   36.284490]  __asan_report_store1_noabort+0x20/0x30
[   36.284525]  kmalloc_oob_right+0x538/0x660
[   36.284558]  kunit_try_run_case+0x170/0x3f0
[   36.284595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.284625]  kthread+0x328/0x630
[   36.284655]  ret_from_fork+0x10/0x20
[   36.284691] 
[   36.348319] Allocated by task 220:
[   36.351708]  kasan_save_stack+0x3c/0x68
[   36.355524]  kasan_save_track+0x20/0x40
[   36.359343]  kasan_save_alloc_info+0x40/0x58
[   36.363597]  __kasan_kmalloc+0xd4/0xd8
[   36.367330]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.371843]  kmalloc_oob_right+0xb0/0x660
[   36.375836]  kunit_try_run_case+0x170/0x3f0
[   36.380003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.385472]  kthread+0x328/0x630
[   36.388683]  ret_from_fork+0x10/0x20
[   36.392243] 
[   36.393719] The buggy address belongs to the object at ffff000801ff7400
[   36.393719]  which belongs to the cache kmalloc-128 of size 128
[   36.406221] The buggy address is located 5 bytes to the right of
[   36.406221]  allocated 115-byte region [ffff000801ff7400, ffff000801ff7473)
[   36.419151] 
[   36.420629] The buggy address belongs to the physical page:
[   36.426187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6
[   36.434169] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.441810] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.448754] page_type: f5(slab)
[   36.451888] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.459609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.467336] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.475147] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.482960] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff
[   36.490772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.498579] page dumped because: kasan: bad access detected
[   36.504133] 
[   36.505608] Memory state around the buggy address:
[   36.510388]  ffff000801ff7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.517591]  ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.524798] >ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.531997]                                                                 ^
[   36.539119]  ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.546324]  ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.553525] ==================================================================
[   35.958593] ==================================================================
[   35.965171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.972111] Write of size 1 at addr ffff000801ff7473 by task kunit_try_catch/220
[   35.979489] 
[   35.980975] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   35.981028] Tainted: [N]=TEST
[   35.981043] Hardware name: WinLink E850-96 board (DT)
[   35.981063] Call trace:
[   35.981080]  show_stack+0x20/0x38 (C)
[   35.981116]  dump_stack_lvl+0x8c/0xd0
[   35.981149]  print_report+0x118/0x5d0
[   35.981178]  kasan_report+0xdc/0x128
[   35.981205]  __asan_report_store1_noabort+0x20/0x30
[   35.981241]  kmalloc_oob_right+0x5a4/0x660
[   35.981271]  kunit_try_run_case+0x170/0x3f0
[   35.981311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.981344]  kthread+0x328/0x630
[   35.981372]  ret_from_fork+0x10/0x20
[   35.981408] 
[   36.043811] Allocated by task 220:
[   36.047198]  kasan_save_stack+0x3c/0x68
[   36.051015]  kasan_save_track+0x20/0x40
[   36.054834]  kasan_save_alloc_info+0x40/0x58
[   36.059088]  __kasan_kmalloc+0xd4/0xd8
[   36.062822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.067336]  kmalloc_oob_right+0xb0/0x660
[   36.071327]  kunit_try_run_case+0x170/0x3f0
[   36.075494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.080962]  kthread+0x328/0x630
[   36.084174]  ret_from_fork+0x10/0x20
[   36.087735] 
[   36.089210] The buggy address belongs to the object at ffff000801ff7400
[   36.089210]  which belongs to the cache kmalloc-128 of size 128
[   36.101711] The buggy address is located 0 bytes to the right of
[   36.101711]  allocated 115-byte region [ffff000801ff7400, ffff000801ff7473)
[   36.114642] 
[   36.116122] The buggy address belongs to the physical page:
[   36.121679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6
[   36.129662] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.137301] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.144245] page_type: f5(slab)
[   36.147381] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.155100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.162826] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.170638] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.178450] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff
[   36.186262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.194070] page dumped because: kasan: bad access detected
[   36.199623] 
[   36.201099] Memory state around the buggy address:
[   36.205881]  ffff000801ff7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.213082]  ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.220291] >ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.227488]                                                              ^
[   36.234349]  ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.241554]  ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.248756] ==================================================================

[   29.285067] ==================================================================
[   29.285107] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.285188] Write of size 1 at addr fff00000c636a678 by task kunit_try_catch/167
[   29.285264] 
[   29.285323] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.285424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.285450] Hardware name: linux,dummy-virt (DT)
[   29.285496] Call trace:
[   29.285526]  show_stack+0x20/0x38 (C)
[   29.285575]  dump_stack_lvl+0x8c/0xd0
[   29.285627]  print_report+0x118/0x5d0
[   29.285669]  kasan_report+0xdc/0x128
[   29.285711]  __asan_report_store1_noabort+0x20/0x30
[   29.285879]  kmalloc_oob_right+0x538/0x660
[   29.285940]  kunit_try_run_case+0x170/0x3f0
[   29.286017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.286079]  kthread+0x328/0x630
[   29.286158]  ret_from_fork+0x10/0x20
[   29.286258] 
[   29.286276] Allocated by task 167:
[   29.286303]  kasan_save_stack+0x3c/0x68
[   29.286361]  kasan_save_track+0x20/0x40
[   29.286399]  kasan_save_alloc_info+0x40/0x58
[   29.286434]  __kasan_kmalloc+0xd4/0xd8
[   29.286469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.286507]  kmalloc_oob_right+0xb0/0x660
[   29.286543]  kunit_try_run_case+0x170/0x3f0
[   29.286580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.286785]  kthread+0x328/0x630
[   29.286824]  ret_from_fork+0x10/0x20
[   29.286915] 
[   29.286936] The buggy address belongs to the object at fff00000c636a600
[   29.286936]  which belongs to the cache kmalloc-128 of size 128
[   29.286996] The buggy address is located 5 bytes to the right of
[   29.286996]  allocated 115-byte region [fff00000c636a600, fff00000c636a673)
[   29.287067] 
[   29.287086] The buggy address belongs to the physical page:
[   29.287218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.287273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.287321] page_type: f5(slab)
[   29.287357] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.287477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.287517] page dumped because: kasan: bad access detected
[   29.287546] 
[   29.287563] Memory state around the buggy address:
[   29.287592]  fff00000c636a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.287633]  fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287673] >fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.287719]                                                                 ^
[   29.287757]  fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287796]  fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287831] ==================================================================
[   29.271563] ==================================================================
[   29.271883] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.272849] Write of size 1 at addr fff00000c636a673 by task kunit_try_catch/167
[   29.273176] 
[   29.274038] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.274199] Tainted: [N]=TEST
[   29.274231] Hardware name: linux,dummy-virt (DT)
[   29.274454] Call trace:
[   29.275005]  show_stack+0x20/0x38 (C)
[   29.275342]  dump_stack_lvl+0x8c/0xd0
[   29.275398]  print_report+0x118/0x5d0
[   29.275441]  kasan_report+0xdc/0x128
[   29.275482]  __asan_report_store1_noabort+0x20/0x30
[   29.275529]  kmalloc_oob_right+0x5a4/0x660
[   29.275574]  kunit_try_run_case+0x170/0x3f0
[   29.275625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.275673]  kthread+0x328/0x630
[   29.275715]  ret_from_fork+0x10/0x20
[   29.276151] 
[   29.276201] Allocated by task 167:
[   29.276320]  kasan_save_stack+0x3c/0x68
[   29.276386]  kasan_save_track+0x20/0x40
[   29.276423]  kasan_save_alloc_info+0x40/0x58
[   29.276458]  __kasan_kmalloc+0xd4/0xd8
[   29.276494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.276533]  kmalloc_oob_right+0xb0/0x660
[   29.276568]  kunit_try_run_case+0x170/0x3f0
[   29.276606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.276713]  kthread+0x328/0x630
[   29.276783]  ret_from_fork+0x10/0x20
[   29.276840] 
[   29.277146] The buggy address belongs to the object at fff00000c636a600
[   29.277146]  which belongs to the cache kmalloc-128 of size 128
[   29.277413] The buggy address is located 0 bytes to the right of
[   29.277413]  allocated 115-byte region [fff00000c636a600, fff00000c636a673)
[   29.277563] 
[   29.277902] The buggy address belongs to the physical page:
[   29.278591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.280235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.281322] page_type: f5(slab)
[   29.282044] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.282219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.282496] page dumped because: kasan: bad access detected
[   29.282541] 
[   29.282567] Memory state around the buggy address:
[   29.282868]  fff00000c636a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.282980]  fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.283034] >fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.283227]                                                              ^
[   29.283559]  fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.283633]  fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.283727] ==================================================================
[   29.287960] ==================================================================
[   29.287996] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.288037] Read of size 1 at addr fff00000c636a680 by task kunit_try_catch/167
[   29.288452] 
[   29.288514] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.288686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.288723] Hardware name: linux,dummy-virt (DT)
[   29.288752] Call trace:
[   29.288774]  show_stack+0x20/0x38 (C)
[   29.288821]  dump_stack_lvl+0x8c/0xd0
[   29.288865]  print_report+0x118/0x5d0
[   29.288943]  kasan_report+0xdc/0x128
[   29.288986]  __asan_report_load1_noabort+0x20/0x30
[   29.289032]  kmalloc_oob_right+0x5d0/0x660
[   29.289088]  kunit_try_run_case+0x170/0x3f0
[   29.289134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.289181]  kthread+0x328/0x630
[   29.289223]  ret_from_fork+0x10/0x20
[   29.289268] 
[   29.289285] Allocated by task 167:
[   29.289311]  kasan_save_stack+0x3c/0x68
[   29.289392]  kasan_save_track+0x20/0x40
[   29.289491]  kasan_save_alloc_info+0x40/0x58
[   29.289618]  __kasan_kmalloc+0xd4/0xd8
[   29.289756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.289986]  kmalloc_oob_right+0xb0/0x660
[   29.290026]  kunit_try_run_case+0x170/0x3f0
[   29.290073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.290112]  kthread+0x328/0x630
[   29.290143]  ret_from_fork+0x10/0x20
[   29.290176] 
[   29.290291] The buggy address belongs to the object at fff00000c636a600
[   29.290291]  which belongs to the cache kmalloc-128 of size 128
[   29.290472] The buggy address is located 13 bytes to the right of
[   29.290472]  allocated 115-byte region [fff00000c636a600, fff00000c636a673)
[   29.290638] 
[   29.290720] The buggy address belongs to the physical page:
[   29.290748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a
[   29.290888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.290936] page_type: f5(slab)
[   29.290971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.291018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.291238] page dumped because: kasan: bad access detected
[   29.291358] 
[   29.291462] Memory state around the buggy address:
[   29.291619]  fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291673]  fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.291713] >fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291748]                    ^
[   29.291827]  fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.291960]  fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.292074] ==================================================================

[   23.446858] ==================================================================
[   23.447921] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   23.449105] Write of size 1 at addr ffff888105865c73 by task kunit_try_catch/185
[   23.449952] 
[   23.450908] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.451290] Tainted: [N]=TEST
[   23.451323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.451538] Call Trace:
[   23.451605]  <TASK>
[   23.451769]  dump_stack_lvl+0x73/0xb0
[   23.451868]  print_report+0xd1/0x610
[   23.451900]  ? __virt_addr_valid+0x1db/0x2d0
[   23.451927]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.451964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.451989]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.452010]  kasan_report+0x141/0x180
[   23.452032]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.452058]  __asan_report_store1_noabort+0x1b/0x30
[   23.452082]  kmalloc_oob_right+0x6f0/0x7f0
[   23.452104]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.452125]  ? __schedule+0x10cc/0x2b60
[   23.452150]  ? __pfx_read_tsc+0x10/0x10
[   23.452173]  ? ktime_get_ts64+0x86/0x230
[   23.452199]  kunit_try_run_case+0x1a5/0x480
[   23.452224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.452244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.452267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.452290]  ? __kthread_parkme+0x82/0x180
[   23.452311]  ? preempt_count_sub+0x50/0x80
[   23.452335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.452356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.452380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.452404]  kthread+0x337/0x6f0
[   23.452425]  ? trace_preempt_on+0x20/0xc0
[   23.452449]  ? __pfx_kthread+0x10/0x10
[   23.452469]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.452491]  ? calculate_sigpending+0x7b/0xa0
[   23.452514]  ? __pfx_kthread+0x10/0x10
[   23.452535]  ret_from_fork+0x116/0x1d0
[   23.452553]  ? __pfx_kthread+0x10/0x10
[   23.452573]  ret_from_fork_asm+0x1a/0x30
[   23.452629]  </TASK>
[   23.452707] 
[   23.467328] Allocated by task 185:
[   23.468181]  kasan_save_stack+0x45/0x70
[   23.469037]  kasan_save_track+0x18/0x40
[   23.469770]  kasan_save_alloc_info+0x3b/0x50
[   23.470189]  __kasan_kmalloc+0xb7/0xc0
[   23.470381]  __kmalloc_cache_noprof+0x189/0x420
[   23.470578]  kmalloc_oob_right+0xa9/0x7f0
[   23.471251]  kunit_try_run_case+0x1a5/0x480
[   23.471447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.471622]  kthread+0x337/0x6f0
[   23.471803]  ret_from_fork+0x116/0x1d0
[   23.472114]  ret_from_fork_asm+0x1a/0x30
[   23.473070] 
[   23.473348] The buggy address belongs to the object at ffff888105865c00
[   23.473348]  which belongs to the cache kmalloc-128 of size 128
[   23.474185] The buggy address is located 0 bytes to the right of
[   23.474185]  allocated 115-byte region [ffff888105865c00, ffff888105865c73)
[   23.475513] 
[   23.475853] The buggy address belongs to the physical page:
[   23.476699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105865
[   23.477367] flags: 0x200000000000000(node=0|zone=2)
[   23.478040] page_type: f5(slab)
[   23.478590] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.479039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.479391] page dumped because: kasan: bad access detected
[   23.479629] 
[   23.479728] Memory state around the buggy address:
[   23.480238]  ffff888105865b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.480602]  ffff888105865b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.481082] >ffff888105865c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.481348]                                                              ^
[   23.481653]  ffff888105865c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.482134]  ffff888105865d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.482387] ==================================================================
[   23.483867] ==================================================================
[   23.484380] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   23.484716] Write of size 1 at addr ffff888105865c78 by task kunit_try_catch/185
[   23.485123] 
[   23.485257] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.485309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.485321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.485345] Call Trace:
[   23.485366]  <TASK>
[   23.485387]  dump_stack_lvl+0x73/0xb0
[   23.485419]  print_report+0xd1/0x610
[   23.485441]  ? __virt_addr_valid+0x1db/0x2d0
[   23.485464]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.485484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.485508]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.485529]  kasan_report+0x141/0x180
[   23.485549]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.485574]  __asan_report_store1_noabort+0x1b/0x30
[   23.485598]  kmalloc_oob_right+0x6bd/0x7f0
[   23.485618]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.485639]  ? __schedule+0x10cc/0x2b60
[   23.485675]  ? __pfx_read_tsc+0x10/0x10
[   23.485695]  ? ktime_get_ts64+0x86/0x230
[   23.485720]  kunit_try_run_case+0x1a5/0x480
[   23.485742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.485820]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.485843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.485866]  ? __kthread_parkme+0x82/0x180
[   23.485887]  ? preempt_count_sub+0x50/0x80
[   23.485910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.485930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.485955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.485979]  kthread+0x337/0x6f0
[   23.485999]  ? trace_preempt_on+0x20/0xc0
[   23.486070]  ? __pfx_kthread+0x10/0x10
[   23.486092]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.486113]  ? calculate_sigpending+0x7b/0xa0
[   23.486137]  ? __pfx_kthread+0x10/0x10
[   23.486157]  ret_from_fork+0x116/0x1d0
[   23.486176]  ? __pfx_kthread+0x10/0x10
[   23.486196]  ret_from_fork_asm+0x1a/0x30
[   23.486226]  </TASK>
[   23.486237] 
[   23.495741] Allocated by task 185:
[   23.496043]  kasan_save_stack+0x45/0x70
[   23.496290]  kasan_save_track+0x18/0x40
[   23.496496]  kasan_save_alloc_info+0x3b/0x50
[   23.496722]  __kasan_kmalloc+0xb7/0xc0
[   23.497057]  __kmalloc_cache_noprof+0x189/0x420
[   23.497291]  kmalloc_oob_right+0xa9/0x7f0
[   23.497424]  kunit_try_run_case+0x1a5/0x480
[   23.497561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.497774]  kthread+0x337/0x6f0
[   23.497937]  ret_from_fork+0x116/0x1d0
[   23.498205]  ret_from_fork_asm+0x1a/0x30
[   23.498403] 
[   23.498494] The buggy address belongs to the object at ffff888105865c00
[   23.498494]  which belongs to the cache kmalloc-128 of size 128
[   23.499215] The buggy address is located 5 bytes to the right of
[   23.499215]  allocated 115-byte region [ffff888105865c00, ffff888105865c73)
[   23.499587] 
[   23.500033] The buggy address belongs to the physical page:
[   23.500338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105865
[   23.500707] flags: 0x200000000000000(node=0|zone=2)
[   23.500987] page_type: f5(slab)
[   23.501164] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.501448] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.501729] page dumped because: kasan: bad access detected
[   23.502313] 
[   23.502422] Memory state around the buggy address:
[   23.502634]  ffff888105865b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.503284]  ffff888105865b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.503652] >ffff888105865c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.504100]                                                                 ^
[   23.504457]  ffff888105865c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.504785]  ffff888105865d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.505364] ==================================================================
[   23.506261] ==================================================================
[   23.506587] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   23.507286] Read of size 1 at addr ffff888105865c80 by task kunit_try_catch/185
[   23.507677] 
[   23.507921] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.508173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.508187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.508210] Call Trace:
[   23.508230]  <TASK>
[   23.508251]  dump_stack_lvl+0x73/0xb0
[   23.508284]  print_report+0xd1/0x610
[   23.508307]  ? __virt_addr_valid+0x1db/0x2d0
[   23.508331]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.508351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.508375]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.508396]  kasan_report+0x141/0x180
[   23.508417]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.508441]  __asan_report_load1_noabort+0x18/0x20
[   23.508463]  kmalloc_oob_right+0x68a/0x7f0
[   23.508484]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.508505]  ? __schedule+0x10cc/0x2b60
[   23.508527]  ? __pfx_read_tsc+0x10/0x10
[   23.508548]  ? ktime_get_ts64+0x86/0x230
[   23.508572]  kunit_try_run_case+0x1a5/0x480
[   23.508594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.508613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.508635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.508667]  ? __kthread_parkme+0x82/0x180
[   23.508688]  ? preempt_count_sub+0x50/0x80
[   23.508711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.508731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.508769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.508793]  kthread+0x337/0x6f0
[   23.508813]  ? trace_preempt_on+0x20/0xc0
[   23.508836]  ? __pfx_kthread+0x10/0x10
[   23.508857]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.508877]  ? calculate_sigpending+0x7b/0xa0
[   23.508901]  ? __pfx_kthread+0x10/0x10
[   23.508921]  ret_from_fork+0x116/0x1d0
[   23.508939]  ? __pfx_kthread+0x10/0x10
[   23.508965]  ret_from_fork_asm+0x1a/0x30
[   23.508997]  </TASK>
[   23.509007] 
[   23.517289] Allocated by task 185:
[   23.517509]  kasan_save_stack+0x45/0x70
[   23.517742]  kasan_save_track+0x18/0x40
[   23.517869]  kasan_save_alloc_info+0x3b/0x50
[   23.518005]  __kasan_kmalloc+0xb7/0xc0
[   23.518150]  __kmalloc_cache_noprof+0x189/0x420
[   23.518390]  kmalloc_oob_right+0xa9/0x7f0
[   23.518576]  kunit_try_run_case+0x1a5/0x480
[   23.518817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.519083]  kthread+0x337/0x6f0
[   23.519196]  ret_from_fork+0x116/0x1d0
[   23.519317]  ret_from_fork_asm+0x1a/0x30
[   23.519445] 
[   23.519508] The buggy address belongs to the object at ffff888105865c00
[   23.519508]  which belongs to the cache kmalloc-128 of size 128
[   23.520605] The buggy address is located 13 bytes to the right of
[   23.520605]  allocated 115-byte region [ffff888105865c00, ffff888105865c73)
[   23.521135] 
[   23.521201] The buggy address belongs to the physical page:
[   23.521359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105865
[   23.521952] flags: 0x200000000000000(node=0|zone=2)
[   23.522302] page_type: f5(slab)
[   23.522425] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.522639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.523193] page dumped because: kasan: bad access detected
[   23.523553] 
[   23.523613] Memory state around the buggy address:
[   23.523825]  ffff888105865b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.524337]  ffff888105865c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.524598] >ffff888105865c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.524804]                    ^
[   23.524929]  ffff888105865d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.525232]  ffff888105865d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.525527] ==================================================================