Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   35.950369] ==================================================================
[   35.956948] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.963887] Write of size 1 at addr ffff000801889d73 by task kunit_try_catch/217
[   35.971264] 
[   35.972750] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.972800] Tainted: [N]=TEST
[   35.972813] Hardware name: WinLink E850-96 board (DT)
[   35.972837] Call trace:
[   35.972851]  show_stack+0x20/0x38 (C)
[   35.972886]  dump_stack_lvl+0x8c/0xd0
[   35.972921]  print_report+0x118/0x5d0
[   35.972948]  kasan_report+0xdc/0x128
[   35.972973]  __asan_report_store1_noabort+0x20/0x30
[   35.973006]  kmalloc_oob_right+0x5a4/0x660
[   35.973039]  kunit_try_run_case+0x170/0x3f0
[   35.973070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.973105]  kthread+0x328/0x630
[   35.973133]  ret_from_fork+0x10/0x20
[   35.973168] 
[   36.035586] Allocated by task 217:
[   36.038974]  kasan_save_stack+0x3c/0x68
[   36.042789]  kasan_save_track+0x20/0x40
[   36.046609]  kasan_save_alloc_info+0x40/0x58
[   36.050862]  __kasan_kmalloc+0xd4/0xd8
[   36.054595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.059109]  kmalloc_oob_right+0xb0/0x660
[   36.063102]  kunit_try_run_case+0x170/0x3f0
[   36.067268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.072737]  kthread+0x328/0x630
[   36.075949]  ret_from_fork+0x10/0x20
[   36.079507] 
[   36.080985] The buggy address belongs to the object at ffff000801889d00
[   36.080985]  which belongs to the cache kmalloc-128 of size 128
[   36.093487] The buggy address is located 0 bytes to the right of
[   36.093487]  allocated 115-byte region [ffff000801889d00, ffff000801889d73)
[   36.106417] 
[   36.107896] The buggy address belongs to the physical page:
[   36.113454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   36.121438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.129075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.136019] page_type: f5(slab)
[   36.139155] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.146875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.154603] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.162412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.170225] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   36.178038] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.185844] page dumped because: kasan: bad access detected
[   36.191398] 
[   36.192874] Memory state around the buggy address:
[   36.197654]  ffff000801889c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.204858]  ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.212062] >ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.219263]                                                              ^
[   36.226124]  ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.233330]  ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.240531] ==================================================================
[   36.253106] ==================================================================
[   36.260241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   36.267179] Write of size 1 at addr ffff000801889d78 by task kunit_try_catch/217
[   36.274557] 
[   36.276043] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.276099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.276117] Hardware name: WinLink E850-96 board (DT)
[   36.276135] Call trace:
[   36.276148]  show_stack+0x20/0x38 (C)
[   36.276182]  dump_stack_lvl+0x8c/0xd0
[   36.276216]  print_report+0x118/0x5d0
[   36.276243]  kasan_report+0xdc/0x128
[   36.276268]  __asan_report_store1_noabort+0x20/0x30
[   36.276300]  kmalloc_oob_right+0x538/0x660
[   36.276329]  kunit_try_run_case+0x170/0x3f0
[   36.276358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.276392]  kthread+0x328/0x630
[   36.276420]  ret_from_fork+0x10/0x20
[   36.276453] 
[   36.340095] Allocated by task 217:
[   36.343483]  kasan_save_stack+0x3c/0x68
[   36.347299]  kasan_save_track+0x20/0x40
[   36.351118]  kasan_save_alloc_info+0x40/0x58
[   36.355371]  __kasan_kmalloc+0xd4/0xd8
[   36.359104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.363618]  kmalloc_oob_right+0xb0/0x660
[   36.367611]  kunit_try_run_case+0x170/0x3f0
[   36.371778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.377246]  kthread+0x328/0x630
[   36.380458]  ret_from_fork+0x10/0x20
[   36.384017] 
[   36.385494] The buggy address belongs to the object at ffff000801889d00
[   36.385494]  which belongs to the cache kmalloc-128 of size 128
[   36.397994] The buggy address is located 5 bytes to the right of
[   36.397994]  allocated 115-byte region [ffff000801889d00, ffff000801889d73)
[   36.410926] 
[   36.412405] The buggy address belongs to the physical page:
[   36.417962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   36.425943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.433584] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.440528] page_type: f5(slab)
[   36.443662] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.451384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.459110] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.466922] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.474734] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   36.482546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.490352] page dumped because: kasan: bad access detected
[   36.495908] 
[   36.497383] Memory state around the buggy address:
[   36.502161]  ffff000801889c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.509366]  ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.516571] >ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.523772]                                                                 ^
[   36.530894]  ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.538100]  ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.545299] ==================================================================
[   36.552714] ==================================================================
[   36.559712] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   36.566655] Read of size 1 at addr ffff000801889d80 by task kunit_try_catch/217
[   36.573945] 
[   36.575429] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.575486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.575503] Hardware name: WinLink E850-96 board (DT)
[   36.575520] Call trace:
[   36.575534]  show_stack+0x20/0x38 (C)
[   36.575565]  dump_stack_lvl+0x8c/0xd0
[   36.575602]  print_report+0x118/0x5d0
[   36.575630]  kasan_report+0xdc/0x128
[   36.575654]  __asan_report_load1_noabort+0x20/0x30
[   36.575684]  kmalloc_oob_right+0x5d0/0x660
[   36.575715]  kunit_try_run_case+0x170/0x3f0
[   36.575746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.575779]  kthread+0x328/0x630
[   36.575804]  ret_from_fork+0x10/0x20
[   36.575837] 
[   36.639397] Allocated by task 217:
[   36.642783]  kasan_save_stack+0x3c/0x68
[   36.646600]  kasan_save_track+0x20/0x40
[   36.650419]  kasan_save_alloc_info+0x40/0x58
[   36.654673]  __kasan_kmalloc+0xd4/0xd8
[   36.658405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.662919]  kmalloc_oob_right+0xb0/0x660
[   36.666912]  kunit_try_run_case+0x170/0x3f0
[   36.671079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.676548]  kthread+0x328/0x630
[   36.679759]  ret_from_fork+0x10/0x20
[   36.683318] 
[   36.684795] The buggy address belongs to the object at ffff000801889d00
[   36.684795]  which belongs to the cache kmalloc-128 of size 128
[   36.697294] The buggy address is located 13 bytes to the right of
[   36.697294]  allocated 115-byte region [ffff000801889d00, ffff000801889d73)
[   36.710314] 
[   36.711793] The buggy address belongs to the physical page:
[   36.717349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   36.725331] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.732973] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.739916] page_type: f5(slab)
[   36.743050] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.750772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.758498] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.766309] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.774123] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   36.781934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.789740] page dumped because: kasan: bad access detected
[   36.795295] 
[   36.796771] Memory state around the buggy address:
[   36.801549]  ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.808754]  ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.815959] >ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.823160]                    ^
[   36.826376]  ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.833580]  ffff000801889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.840781] ==================================================================

[   30.252516] ==================================================================
[   30.252844] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.253789] Write of size 1 at addr fff00000c64f4473 by task kunit_try_catch/168
[   30.253899] 
[   30.254676] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.254820] Tainted: [N]=TEST
[   30.254852] Hardware name: linux,dummy-virt (DT)
[   30.255079] Call trace:
[   30.255255]  show_stack+0x20/0x38 (C)
[   30.255394]  dump_stack_lvl+0x8c/0xd0
[   30.255463]  print_report+0x118/0x5d0
[   30.255507]  kasan_report+0xdc/0x128
[   30.255551]  __asan_report_store1_noabort+0x20/0x30
[   30.255600]  kmalloc_oob_right+0x5a4/0x660
[   30.255646]  kunit_try_run_case+0x170/0x3f0
[   30.255695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.255747]  kthread+0x328/0x630
[   30.255791]  ret_from_fork+0x10/0x20
[   30.255948] 
[   30.255985] Allocated by task 168:
[   30.256097]  kasan_save_stack+0x3c/0x68
[   30.256163]  kasan_save_track+0x20/0x40
[   30.256202]  kasan_save_alloc_info+0x40/0x58
[   30.256240]  __kasan_kmalloc+0xd4/0xd8
[   30.256277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.256319]  kmalloc_oob_right+0xb0/0x660
[   30.256356]  kunit_try_run_case+0x170/0x3f0
[   30.256391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.256433]  kthread+0x328/0x630
[   30.256475]  ret_from_fork+0x10/0x20
[   30.256529] 
[   30.256589] The buggy address belongs to the object at fff00000c64f4400
[   30.256589]  which belongs to the cache kmalloc-128 of size 128
[   30.256682] The buggy address is located 0 bytes to the right of
[   30.256682]  allocated 115-byte region [fff00000c64f4400, fff00000c64f4473)
[   30.256746] 
[   30.256827] The buggy address belongs to the physical page:
[   30.257033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.257296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.257595] page_type: f5(slab)
[   30.257917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.257978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.258086] page dumped because: kasan: bad access detected
[   30.258126] 
[   30.258152] Memory state around the buggy address:
[   30.258370]  fff00000c64f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.258433]  fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258500] >fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.258556]                                                              ^
[   30.258640]  fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258681]  fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258741] ==================================================================
[   30.263315] ==================================================================
[   30.263359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.263405] Read of size 1 at addr fff00000c64f4480 by task kunit_try_catch/168
[   30.263485] 
[   30.263514] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.263593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.263619] Hardware name: linux,dummy-virt (DT)
[   30.263648] Call trace:
[   30.263668]  show_stack+0x20/0x38 (C)
[   30.263975]  dump_stack_lvl+0x8c/0xd0
[   30.264049]  print_report+0x118/0x5d0
[   30.264094]  kasan_report+0xdc/0x128
[   30.264165]  __asan_report_load1_noabort+0x20/0x30
[   30.264232]  kmalloc_oob_right+0x5d0/0x660
[   30.264280]  kunit_try_run_case+0x170/0x3f0
[   30.264325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.264384]  kthread+0x328/0x630
[   30.264461]  ret_from_fork+0x10/0x20
[   30.264527] 
[   30.264544] Allocated by task 168:
[   30.264571]  kasan_save_stack+0x3c/0x68
[   30.264611]  kasan_save_track+0x20/0x40
[   30.264653]  kasan_save_alloc_info+0x40/0x58
[   30.264691]  __kasan_kmalloc+0xd4/0xd8
[   30.264730]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.264965]  kmalloc_oob_right+0xb0/0x660
[   30.265020]  kunit_try_run_case+0x170/0x3f0
[   30.265057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.265098]  kthread+0x328/0x630
[   30.265268]  ret_from_fork+0x10/0x20
[   30.265335] 
[   30.265374] The buggy address belongs to the object at fff00000c64f4400
[   30.265374]  which belongs to the cache kmalloc-128 of size 128
[   30.265466] The buggy address is located 13 bytes to the right of
[   30.265466]  allocated 115-byte region [fff00000c64f4400, fff00000c64f4473)
[   30.265528] 
[   30.265547] The buggy address belongs to the physical page:
[   30.265594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.265726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.265849] page_type: f5(slab)
[   30.265936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.266020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.266075] page dumped because: kasan: bad access detected
[   30.266114] 
[   30.266131] Memory state around the buggy address:
[   30.266195]  fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266268]  fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.266370] >fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266453]                    ^
[   30.266480]  fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266519]  fff00000c64f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266589] ==================================================================
[   30.259537] ==================================================================
[   30.259635] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.259702] Write of size 1 at addr fff00000c64f4478 by task kunit_try_catch/168
[   30.259757] 
[   30.259788] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.259925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.259951] Hardware name: linux,dummy-virt (DT)
[   30.260010] Call trace:
[   30.260068]  show_stack+0x20/0x38 (C)
[   30.260116]  dump_stack_lvl+0x8c/0xd0
[   30.260502]  print_report+0x118/0x5d0
[   30.260585]  kasan_report+0xdc/0x128
[   30.260670]  __asan_report_store1_noabort+0x20/0x30
[   30.260801]  kmalloc_oob_right+0x538/0x660
[   30.260858]  kunit_try_run_case+0x170/0x3f0
[   30.260932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.260984]  kthread+0x328/0x630
[   30.261052]  ret_from_fork+0x10/0x20
[   30.261538] 
[   30.261593] Allocated by task 168:
[   30.261667]  kasan_save_stack+0x3c/0x68
[   30.261765]  kasan_save_track+0x20/0x40
[   30.261803]  kasan_save_alloc_info+0x40/0x58
[   30.261839]  __kasan_kmalloc+0xd4/0xd8
[   30.261876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.261916]  kmalloc_oob_right+0xb0/0x660
[   30.261952]  kunit_try_run_case+0x170/0x3f0
[   30.261988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.262030]  kthread+0x328/0x630
[   30.262061]  ret_from_fork+0x10/0x20
[   30.262096] 
[   30.262114] The buggy address belongs to the object at fff00000c64f4400
[   30.262114]  which belongs to the cache kmalloc-128 of size 128
[   30.262168] The buggy address is located 5 bytes to the right of
[   30.262168]  allocated 115-byte region [fff00000c64f4400, fff00000c64f4473)
[   30.262229] 
[   30.262247] The buggy address belongs to the physical page:
[   30.262276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   30.262325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.262370] page_type: f5(slab)
[   30.262406] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.262467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.262505] page dumped because: kasan: bad access detected
[   30.262534] 
[   30.262551] Memory state around the buggy address:
[   30.262580]  fff00000c64f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.262620]  fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.262661] >fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.262696]                                                                 ^
[   30.262733]  fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.262773]  fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.262808] ==================================================================

[   23.419487] ==================================================================
[   23.419824] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   23.420209] Read of size 1 at addr ffff8881041b9680 by task kunit_try_catch/184
[   23.420462] 
[   23.420555] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.420604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.420617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.420638] Call Trace:
[   23.420651]  <TASK>
[   23.420666]  dump_stack_lvl+0x73/0xb0
[   23.420697]  print_report+0xd1/0x610
[   23.420725]  ? __virt_addr_valid+0x1db/0x2d0
[   23.420754]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.420780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.420810]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.420837]  kasan_report+0x141/0x180
[   23.420865]  ? kmalloc_oob_right+0x68a/0x7f0
[   23.420897]  __asan_report_load1_noabort+0x18/0x20
[   23.420926]  kmalloc_oob_right+0x68a/0x7f0
[   23.420954]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.420981]  ? __schedule+0x10cc/0x2b60
[   23.421007]  ? __pfx_read_tsc+0x10/0x10
[   23.421047]  ? ktime_get_ts64+0x86/0x230
[   23.421077]  kunit_try_run_case+0x1a5/0x480
[   23.421105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.421131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.421158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.421185]  ? __kthread_parkme+0x82/0x180
[   23.421210]  ? preempt_count_sub+0x50/0x80
[   23.421239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.421268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.421298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.421331]  kthread+0x337/0x6f0
[   23.421355]  ? trace_preempt_on+0x20/0xc0
[   23.421382]  ? __pfx_kthread+0x10/0x10
[   23.421408]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.421437]  ? calculate_sigpending+0x7b/0xa0
[   23.421466]  ? __pfx_kthread+0x10/0x10
[   23.421493]  ret_from_fork+0x116/0x1d0
[   23.421525]  ? __pfx_kthread+0x10/0x10
[   23.421551]  ret_from_fork_asm+0x1a/0x30
[   23.421591]  </TASK>
[   23.421602] 
[   23.428905] Allocated by task 184:
[   23.429080]  kasan_save_stack+0x45/0x70
[   23.429433]  kasan_save_track+0x18/0x40
[   23.429611]  kasan_save_alloc_info+0x3b/0x50
[   23.429761]  __kasan_kmalloc+0xb7/0xc0
[   23.429893]  __kmalloc_cache_noprof+0x189/0x420
[   23.430048]  kmalloc_oob_right+0xa9/0x7f0
[   23.430437]  kunit_try_run_case+0x1a5/0x480
[   23.430758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.431019]  kthread+0x337/0x6f0
[   23.431190]  ret_from_fork+0x116/0x1d0
[   23.431377]  ret_from_fork_asm+0x1a/0x30
[   23.431548] 
[   23.431617] The buggy address belongs to the object at ffff8881041b9600
[   23.431617]  which belongs to the cache kmalloc-128 of size 128
[   23.432021] The buggy address is located 13 bytes to the right of
[   23.432021]  allocated 115-byte region [ffff8881041b9600, ffff8881041b9673)
[   23.432413] 
[   23.432504] The buggy address belongs to the physical page:
[   23.432937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9
[   23.433338] flags: 0x200000000000000(node=0|zone=2)
[   23.433621] page_type: f5(slab)
[   23.433792] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.434112] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.434338] page dumped because: kasan: bad access detected
[   23.434525] 
[   23.434617] Memory state around the buggy address:
[   23.434839]  ffff8881041b9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.435161]  ffff8881041b9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.435539] >ffff8881041b9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.435771]                    ^
[   23.435884]  ffff8881041b9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.436532]  ffff8881041b9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.436906] ==================================================================
[   23.375504] ==================================================================
[   23.376792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   23.377503] Write of size 1 at addr ffff8881041b9673 by task kunit_try_catch/184
[   23.378003] 
[   23.379062] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.379441] Tainted: [N]=TEST
[   23.379476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.379713] Call Trace:
[   23.379785]  <TASK>
[   23.379932]  dump_stack_lvl+0x73/0xb0
[   23.380024]  print_report+0xd1/0x610
[   23.380059]  ? __virt_addr_valid+0x1db/0x2d0
[   23.380092]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.380118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.380149]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.380175]  kasan_report+0x141/0x180
[   23.380203]  ? kmalloc_oob_right+0x6f0/0x7f0
[   23.380236]  __asan_report_store1_noabort+0x1b/0x30
[   23.380265]  kmalloc_oob_right+0x6f0/0x7f0
[   23.380293]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.380320]  ? __schedule+0x10cc/0x2b60
[   23.380349]  ? __pfx_read_tsc+0x10/0x10
[   23.380376]  ? ktime_get_ts64+0x86/0x230
[   23.380409]  kunit_try_run_case+0x1a5/0x480
[   23.380439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.380465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.380492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.380532]  ? __kthread_parkme+0x82/0x180
[   23.380559]  ? preempt_count_sub+0x50/0x80
[   23.380603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.380631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.380675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.380707]  kthread+0x337/0x6f0
[   23.380733]  ? trace_preempt_on+0x20/0xc0
[   23.380763]  ? __pfx_kthread+0x10/0x10
[   23.380789]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.380818]  ? calculate_sigpending+0x7b/0xa0
[   23.380848]  ? __pfx_kthread+0x10/0x10
[   23.380876]  ret_from_fork+0x116/0x1d0
[   23.380900]  ? __pfx_kthread+0x10/0x10
[   23.380925]  ret_from_fork_asm+0x1a/0x30
[   23.380992]  </TASK>
[   23.381059] 
[   23.388804] Allocated by task 184:
[   23.389221]  kasan_save_stack+0x45/0x70
[   23.389450]  kasan_save_track+0x18/0x40
[   23.389726]  kasan_save_alloc_info+0x3b/0x50
[   23.389884]  __kasan_kmalloc+0xb7/0xc0
[   23.390018]  __kmalloc_cache_noprof+0x189/0x420
[   23.390240]  kmalloc_oob_right+0xa9/0x7f0
[   23.390440]  kunit_try_run_case+0x1a5/0x480
[   23.390671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.391065]  kthread+0x337/0x6f0
[   23.391197]  ret_from_fork+0x116/0x1d0
[   23.391332]  ret_from_fork_asm+0x1a/0x30
[   23.391514] 
[   23.391657] The buggy address belongs to the object at ffff8881041b9600
[   23.391657]  which belongs to the cache kmalloc-128 of size 128
[   23.392405] The buggy address is located 0 bytes to the right of
[   23.392405]  allocated 115-byte region [ffff8881041b9600, ffff8881041b9673)
[   23.393391] 
[   23.393665] The buggy address belongs to the physical page:
[   23.394117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9
[   23.394666] flags: 0x200000000000000(node=0|zone=2)
[   23.395404] page_type: f5(slab)
[   23.396008] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.396336] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.396713] page dumped because: kasan: bad access detected
[   23.396991] 
[   23.397093] Memory state around the buggy address:
[   23.397888]  ffff8881041b9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.398214]  ffff8881041b9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.398566] >ffff8881041b9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.398967]                                                              ^
[   23.399288]  ffff8881041b9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399637]  ffff8881041b9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399955] ==================================================================
[   23.401038] ==================================================================
[   23.401331] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   23.401860] Write of size 1 at addr ffff8881041b9678 by task kunit_try_catch/184
[   23.402121] 
[   23.402208] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.402258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.402273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.402295] Call Trace:
[   23.402313]  <TASK>
[   23.402330]  dump_stack_lvl+0x73/0xb0
[   23.402364]  print_report+0xd1/0x610
[   23.402393]  ? __virt_addr_valid+0x1db/0x2d0
[   23.402421]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.402448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.402483]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.402511]  kasan_report+0x141/0x180
[   23.402551]  ? kmalloc_oob_right+0x6bd/0x7f0
[   23.402755]  __asan_report_store1_noabort+0x1b/0x30
[   23.402794]  kmalloc_oob_right+0x6bd/0x7f0
[   23.402823]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.402851]  ? __schedule+0x10cc/0x2b60
[   23.402877]  ? __pfx_read_tsc+0x10/0x10
[   23.402904]  ? ktime_get_ts64+0x86/0x230
[   23.402934]  kunit_try_run_case+0x1a5/0x480
[   23.402962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.402988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.403015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.403042]  ? __kthread_parkme+0x82/0x180
[   23.403067]  ? preempt_count_sub+0x50/0x80
[   23.403096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.403124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.403156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.403187]  kthread+0x337/0x6f0
[   23.403211]  ? trace_preempt_on+0x20/0xc0
[   23.403239]  ? __pfx_kthread+0x10/0x10
[   23.403265]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.403294]  ? calculate_sigpending+0x7b/0xa0
[   23.403322]  ? __pfx_kthread+0x10/0x10
[   23.403349]  ret_from_fork+0x116/0x1d0
[   23.403373]  ? __pfx_kthread+0x10/0x10
[   23.403398]  ret_from_fork_asm+0x1a/0x30
[   23.403438]  </TASK>
[   23.403450] 
[   23.410696] Allocated by task 184:
[   23.410880]  kasan_save_stack+0x45/0x70
[   23.411081]  kasan_save_track+0x18/0x40
[   23.411228]  kasan_save_alloc_info+0x3b/0x50
[   23.411377]  __kasan_kmalloc+0xb7/0xc0
[   23.411574]  __kmalloc_cache_noprof+0x189/0x420
[   23.411792]  kmalloc_oob_right+0xa9/0x7f0
[   23.412049]  kunit_try_run_case+0x1a5/0x480
[   23.412197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.412379]  kthread+0x337/0x6f0
[   23.412558]  ret_from_fork+0x116/0x1d0
[   23.412929]  ret_from_fork_asm+0x1a/0x30
[   23.413131] 
[   23.413222] The buggy address belongs to the object at ffff8881041b9600
[   23.413222]  which belongs to the cache kmalloc-128 of size 128
[   23.413949] The buggy address is located 5 bytes to the right of
[   23.413949]  allocated 115-byte region [ffff8881041b9600, ffff8881041b9673)
[   23.414369] 
[   23.414439] The buggy address belongs to the physical page:
[   23.414685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9
[   23.415042] flags: 0x200000000000000(node=0|zone=2)
[   23.415363] page_type: f5(slab)
[   23.415629] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.415921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.416192] page dumped because: kasan: bad access detected
[   23.416365] 
[   23.416461] Memory state around the buggy address:
[   23.416693]  ffff8881041b9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.417114]  ffff8881041b9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.417396] >ffff8881041b9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.417666]                                                                 ^
[   23.418200]  ffff8881041b9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.418470]  ffff8881041b9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.419019] ==================================================================