Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   19.283004] ==================================================================
[   19.290143] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.297085] Write of size 1 at addr ffff000801b46178 by task kunit_try_catch/185
[   19.304462] 
[   19.305947] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.305999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.306013] Hardware name: WinLink E850-96 board (DT)
[   19.306032] Call trace:
[   19.306042]  show_stack+0x20/0x38 (C)
[   19.306077]  dump_stack_lvl+0x8c/0xd0
[   19.306112]  print_report+0x118/0x608
[   19.306141]  kasan_report+0xdc/0x128
[   19.306168]  __asan_report_store1_noabort+0x20/0x30
[   19.306200]  kmalloc_oob_right+0x538/0x660
[   19.306232]  kunit_try_run_case+0x170/0x3f0
[   19.306268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.306305]  kthread+0x328/0x630
[   19.306339]  ret_from_fork+0x10/0x20
[   19.306374] 
[   19.368784] Allocated by task 185:
[   19.372171]  kasan_save_stack+0x3c/0x68
[   19.375989]  kasan_save_track+0x20/0x40
[   19.379809]  kasan_save_alloc_info+0x40/0x58
[   19.384062]  __kasan_kmalloc+0xd4/0xd8
[   19.387795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.392309]  kmalloc_oob_right+0xb0/0x660
[   19.396302]  kunit_try_run_case+0x170/0x3f0
[   19.400468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.405937]  kthread+0x328/0x630
[   19.409149]  ret_from_fork+0x10/0x20
[   19.412708] 
[   19.414183] The buggy address belongs to the object at ffff000801b46100
[   19.414183]  which belongs to the cache kmalloc-128 of size 128
[   19.426685] The buggy address is located 5 bytes to the right of
[   19.426685]  allocated 115-byte region [ffff000801b46100, ffff000801b46173)
[   19.439617] 
[   19.441093] The buggy address belongs to the physical page:
[   19.446652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46
[   19.454636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.462273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.469219] page_type: f5(slab)
[   19.472352] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.480075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.487801] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.495613] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.503426] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff
[   19.511237] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.519043] page dumped because: kasan: bad access detected
[   19.524598] 
[   19.526074] Memory state around the buggy address:
[   19.530853]  ffff000801b46000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.538057]  ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.545261] >ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.552462]                                                                 ^
[   19.559584]  ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566790]  ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.573990] ==================================================================
[   19.581362] ==================================================================
[   19.588402] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.595344] Read of size 1 at addr ffff000801b46180 by task kunit_try_catch/185
[   19.602636] 
[   19.604119] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.604164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.604178] Hardware name: WinLink E850-96 board (DT)
[   19.604196] Call trace:
[   19.604210]  show_stack+0x20/0x38 (C)
[   19.604245]  dump_stack_lvl+0x8c/0xd0
[   19.604280]  print_report+0x118/0x608
[   19.604308]  kasan_report+0xdc/0x128
[   19.604339]  __asan_report_load1_noabort+0x20/0x30
[   19.604373]  kmalloc_oob_right+0x5d0/0x660
[   19.604406]  kunit_try_run_case+0x170/0x3f0
[   19.604441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.604477]  kthread+0x328/0x630
[   19.604509]  ret_from_fork+0x10/0x20
[   19.604541] 
[   19.666870] Allocated by task 185:
[   19.670256]  kasan_save_stack+0x3c/0x68
[   19.674075]  kasan_save_track+0x20/0x40
[   19.677896]  kasan_save_alloc_info+0x40/0x58
[   19.682148]  __kasan_kmalloc+0xd4/0xd8
[   19.685880]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.690395]  kmalloc_oob_right+0xb0/0x660
[   19.694387]  kunit_try_run_case+0x170/0x3f0
[   19.698554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704023]  kthread+0x328/0x630
[   19.707234]  ret_from_fork+0x10/0x20
[   19.710794] 
[   19.712269] The buggy address belongs to the object at ffff000801b46100
[   19.712269]  which belongs to the cache kmalloc-128 of size 128
[   19.724769] The buggy address is located 13 bytes to the right of
[   19.724769]  allocated 115-byte region [ffff000801b46100, ffff000801b46173)
[   19.737789] 
[   19.739265] The buggy address belongs to the physical page:
[   19.744823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46
[   19.752807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.760446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.767390] page_type: f5(slab)
[   19.770525] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.778247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.785974] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.793785] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.801598] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff
[   19.809410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.817216] page dumped because: kasan: bad access detected
[   19.822771] 
[   19.824246] Memory state around the buggy address:
[   19.829025]  ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.836229]  ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.843434] >ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.850635]                    ^
[   19.853850]  ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861055]  ffff000801b46280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.868257] ==================================================================
[   18.981515] ==================================================================
[   18.988067] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.995010] Write of size 1 at addr ffff000801b46173 by task kunit_try_catch/185
[   19.002384] 
[   19.003871] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.15.4-rc3 #1 PREEMPT 
[   19.003921] Tainted: [N]=TEST
[   19.003935] Hardware name: WinLink E850-96 board (DT)
[   19.003957] Call trace:
[   19.003970]  show_stack+0x20/0x38 (C)
[   19.004006]  dump_stack_lvl+0x8c/0xd0
[   19.004045]  print_report+0x118/0x608
[   19.004080]  kasan_report+0xdc/0x128
[   19.004110]  __asan_report_store1_noabort+0x20/0x30
[   19.004147]  kmalloc_oob_right+0x5a4/0x660
[   19.004179]  kunit_try_run_case+0x170/0x3f0
[   19.004216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.004255]  kthread+0x328/0x630
[   19.004289]  ret_from_fork+0x10/0x20
[   19.004325] 
[   19.065493] Allocated by task 185:
[   19.068880]  kasan_save_stack+0x3c/0x68
[   19.072695]  kasan_save_track+0x20/0x40
[   19.076515]  kasan_save_alloc_info+0x40/0x58
[   19.080768]  __kasan_kmalloc+0xd4/0xd8
[   19.084501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.089015]  kmalloc_oob_right+0xb0/0x660
[   19.093007]  kunit_try_run_case+0x170/0x3f0
[   19.097174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.102643]  kthread+0x328/0x630
[   19.105855]  ret_from_fork+0x10/0x20
[   19.109414] 
[   19.110891] The buggy address belongs to the object at ffff000801b46100
[   19.110891]  which belongs to the cache kmalloc-128 of size 128
[   19.123391] The buggy address is located 0 bytes to the right of
[   19.123391]  allocated 115-byte region [ffff000801b46100, ffff000801b46173)
[   19.136323] 
[   19.137802] The buggy address belongs to the physical page:
[   19.143359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46
[   19.151343] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.158981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.165925] page_type: f5(slab)
[   19.169062] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.176780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.184507] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.192318] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.200131] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff
[   19.207943] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.215749] page dumped because: kasan: bad access detected
[   19.221306] 
[   19.222780] Memory state around the buggy address:
[   19.227562]  ffff000801b46000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.234763]  ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.241969] >ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.249168]                                                              ^
[   19.256030]  ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.263236]  ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.270435] ==================================================================

[   17.598688] ==================================================================
[   17.598741] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.599082] Read of size 1 at addr fff00000c5bdc580 by task kunit_try_catch/138
[   17.599185] 
[   17.599225] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.599316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.599454] Hardware name: linux,dummy-virt (DT)
[   17.599520] Call trace:
[   17.599641]  show_stack+0x20/0x38 (C)
[   17.599719]  dump_stack_lvl+0x8c/0xd0
[   17.599820]  print_report+0x118/0x608
[   17.599882]  kasan_report+0xdc/0x128
[   17.599965]  __asan_report_load1_noabort+0x20/0x30
[   17.600171]  kmalloc_oob_right+0x5d0/0x660
[   17.600229]  kunit_try_run_case+0x170/0x3f0
[   17.600285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.600374]  kthread+0x328/0x630
[   17.600421]  ret_from_fork+0x10/0x20
[   17.600777] 
[   17.600817] Allocated by task 138:
[   17.600936]  kasan_save_stack+0x3c/0x68
[   17.601166]  kasan_save_track+0x20/0x40
[   17.601300]  kasan_save_alloc_info+0x40/0x58
[   17.601481]  __kasan_kmalloc+0xd4/0xd8
[   17.601523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.601606]  kmalloc_oob_right+0xb0/0x660
[   17.601844]  kunit_try_run_case+0x170/0x3f0
[   17.601989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.602096]  kthread+0x328/0x630
[   17.602191]  ret_from_fork+0x10/0x20
[   17.602233] 
[   17.602508] The buggy address belongs to the object at fff00000c5bdc500
[   17.602508]  which belongs to the cache kmalloc-128 of size 128
[   17.602631] The buggy address is located 13 bytes to the right of
[   17.602631]  allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573)
[   17.602762] 
[   17.602791] The buggy address belongs to the physical page:
[   17.602821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.603023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.603084] page_type: f5(slab)
[   17.603122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.603326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.603380] page dumped because: kasan: bad access detected
[   17.603418] 
[   17.603435] Memory state around the buggy address:
[   17.603466]  fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603512]  fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.603603] >fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603644]                    ^
[   17.603672]  fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603729]  fff00000c5bdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603770] ==================================================================
[   17.582202] ==================================================================
[   17.582528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.583369] Write of size 1 at addr fff00000c5bdc573 by task kunit_try_catch/138
[   17.583475] 
[   17.584282] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.4-rc3 #1 PREEMPT 
[   17.584430] Tainted: [N]=TEST
[   17.584465] Hardware name: linux,dummy-virt (DT)
[   17.584687] Call trace:
[   17.584869]  show_stack+0x20/0x38 (C)
[   17.585003]  dump_stack_lvl+0x8c/0xd0
[   17.585066]  print_report+0x118/0x608
[   17.585111]  kasan_report+0xdc/0x128
[   17.585155]  __asan_report_store1_noabort+0x20/0x30
[   17.585205]  kmalloc_oob_right+0x5a4/0x660
[   17.585253]  kunit_try_run_case+0x170/0x3f0
[   17.585310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.585366]  kthread+0x328/0x630
[   17.585412]  ret_from_fork+0x10/0x20
[   17.585567] 
[   17.585605] Allocated by task 138:
[   17.585720]  kasan_save_stack+0x3c/0x68
[   17.585784]  kasan_save_track+0x20/0x40
[   17.585820]  kasan_save_alloc_info+0x40/0x58
[   17.585870]  __kasan_kmalloc+0xd4/0xd8
[   17.585904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.585943]  kmalloc_oob_right+0xb0/0x660
[   17.585980]  kunit_try_run_case+0x170/0x3f0
[   17.586018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.586063]  kthread+0x328/0x630
[   17.586097]  ret_from_fork+0x10/0x20
[   17.586151] 
[   17.586210] The buggy address belongs to the object at fff00000c5bdc500
[   17.586210]  which belongs to the cache kmalloc-128 of size 128
[   17.586302] The buggy address is located 0 bytes to the right of
[   17.586302]  allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573)
[   17.586369] 
[   17.586449] The buggy address belongs to the physical page:
[   17.586646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.586924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.587229] page_type: f5(slab)
[   17.587513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.587577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.587691] page dumped because: kasan: bad access detected
[   17.587730] 
[   17.587755] Memory state around the buggy address:
[   17.588007]  fff00000c5bdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.588080]  fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.588137] >fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.588193]                                                              ^
[   17.588273]  fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.588317]  fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.588382] ==================================================================
[   17.589455] ==================================================================
[   17.589500] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.589971] Write of size 1 at addr fff00000c5bdc578 by task kunit_try_catch/138
[   17.590060] 
[   17.590099] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.590627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.590736] Hardware name: linux,dummy-virt (DT)
[   17.590780] Call trace:
[   17.590987]  show_stack+0x20/0x38 (C)
[   17.591048]  dump_stack_lvl+0x8c/0xd0
[   17.591094]  print_report+0x118/0x608
[   17.591138]  kasan_report+0xdc/0x128
[   17.591189]  __asan_report_store1_noabort+0x20/0x30
[   17.591261]  kmalloc_oob_right+0x538/0x660
[   17.591639]  kunit_try_run_case+0x170/0x3f0
[   17.591761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.592077]  kthread+0x328/0x630
[   17.592170]  ret_from_fork+0x10/0x20
[   17.592270] 
[   17.592427] Allocated by task 138:
[   17.592601]  kasan_save_stack+0x3c/0x68
[   17.592794]  kasan_save_track+0x20/0x40
[   17.592995]  kasan_save_alloc_info+0x40/0x58
[   17.593192]  __kasan_kmalloc+0xd4/0xd8
[   17.593240]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.593278]  kmalloc_oob_right+0xb0/0x660
[   17.593317]  kunit_try_run_case+0x170/0x3f0
[   17.593367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.593411]  kthread+0x328/0x630
[   17.593446]  ret_from_fork+0x10/0x20
[   17.593691] 
[   17.593790] The buggy address belongs to the object at fff00000c5bdc500
[   17.593790]  which belongs to the cache kmalloc-128 of size 128
[   17.594182] The buggy address is located 5 bytes to the right of
[   17.594182]  allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573)
[   17.594386] 
[   17.594471] The buggy address belongs to the physical page:
[   17.594592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.594844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.595007] page_type: f5(slab)
[   17.595101] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.595352] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.595507] page dumped because: kasan: bad access detected
[   17.595564] 
[   17.595624] Memory state around the buggy address:
[   17.595768]  fff00000c5bdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.595822]  fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596042] >fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.596088]                                                                 ^
[   17.596155]  fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596488]  fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596560] ==================================================================

[   10.173973] ==================================================================
[   10.174649] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.175292] Write of size 1 at addr ffff8881029eaf78 by task kunit_try_catch/155
[   10.176040] 
[   10.176155] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.176209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.176221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.176242] Call Trace:
[   10.176268]  <TASK>
[   10.176286]  dump_stack_lvl+0x73/0xb0
[   10.176312]  print_report+0xd1/0x650
[   10.176334]  ? __virt_addr_valid+0x1db/0x2d0
[   10.176356]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.176376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.176398]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.176419]  kasan_report+0x141/0x180
[   10.176441]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.176467]  __asan_report_store1_noabort+0x1b/0x30
[   10.176487]  kmalloc_oob_right+0x6bd/0x7f0
[   10.176509]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.176531]  ? __schedule+0x10cc/0x2b60
[   10.176554]  ? __pfx_read_tsc+0x10/0x10
[   10.176574]  ? ktime_get_ts64+0x86/0x230
[   10.176598]  kunit_try_run_case+0x1a5/0x480
[   10.176623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.176644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.176667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.176689]  ? __kthread_parkme+0x82/0x180
[   10.176711]  ? preempt_count_sub+0x50/0x80
[   10.176736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.176759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.176781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.176803]  kthread+0x337/0x6f0
[   10.176819]  ? trace_preempt_on+0x20/0xc0
[   10.176842]  ? __pfx_kthread+0x10/0x10
[   10.176859]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.176880]  ? calculate_sigpending+0x7b/0xa0
[   10.176901]  ? __pfx_kthread+0x10/0x10
[   10.176931]  ret_from_fork+0x41/0x80
[   10.176951]  ? __pfx_kthread+0x10/0x10
[   10.176968]  ret_from_fork_asm+0x1a/0x30
[   10.176997]  </TASK>
[   10.177007] 
[   10.186562] Allocated by task 155:
[   10.186938]  kasan_save_stack+0x45/0x70
[   10.187366]  kasan_save_track+0x18/0x40
[   10.187722]  kasan_save_alloc_info+0x3b/0x50
[   10.188117]  __kasan_kmalloc+0xb7/0xc0
[   10.188460]  __kmalloc_cache_noprof+0x189/0x420
[   10.188901]  kmalloc_oob_right+0xa9/0x7f0
[   10.189287]  kunit_try_run_case+0x1a5/0x480
[   10.189683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.190155]  kthread+0x337/0x6f0
[   10.190359]  ret_from_fork+0x41/0x80
[   10.190495]  ret_from_fork_asm+0x1a/0x30
[   10.190654] 
[   10.190727] The buggy address belongs to the object at ffff8881029eaf00
[   10.190727]  which belongs to the cache kmalloc-128 of size 128
[   10.191098] The buggy address is located 5 bytes to the right of
[   10.191098]  allocated 115-byte region [ffff8881029eaf00, ffff8881029eaf73)
[   10.191467] 
[   10.191540] The buggy address belongs to the physical page:
[   10.191812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ea
[   10.192064] flags: 0x200000000000000(node=0|zone=2)
[   10.192228] page_type: f5(slab)
[   10.192358] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.192639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.193127] page dumped because: kasan: bad access detected
[   10.193299] 
[   10.193366] Memory state around the buggy address:
[   10.193521]  ffff8881029eae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.193769]  ffff8881029eae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.194014] >ffff8881029eaf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.194224]                                                                 ^
[   10.194435]  ffff8881029eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.194676]  ffff8881029eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.195263] ==================================================================
[   10.196237] ==================================================================
[   10.196481] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.196738] Read of size 1 at addr ffff8881029eaf80 by task kunit_try_catch/155
[   10.197353] 
[   10.197526] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.197571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.197582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.197603] Call Trace:
[   10.197621]  <TASK>
[   10.197638]  dump_stack_lvl+0x73/0xb0
[   10.197663]  print_report+0xd1/0x650
[   10.197685]  ? __virt_addr_valid+0x1db/0x2d0
[   10.197706]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.197727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.197748]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.197770]  kasan_report+0x141/0x180
[   10.197792]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.197818]  __asan_report_load1_noabort+0x18/0x20
[   10.197838]  kmalloc_oob_right+0x68a/0x7f0
[   10.197859]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.197882]  ? __schedule+0x10cc/0x2b60
[   10.197905]  ? __pfx_read_tsc+0x10/0x10
[   10.197935]  ? ktime_get_ts64+0x86/0x230
[   10.197960]  kunit_try_run_case+0x1a5/0x480
[   10.197985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.198006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.198029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.198051]  ? __kthread_parkme+0x82/0x180
[   10.198073]  ? preempt_count_sub+0x50/0x80
[   10.198098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.198121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.198143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.198165]  kthread+0x337/0x6f0
[   10.198182]  ? trace_preempt_on+0x20/0xc0
[   10.198205]  ? __pfx_kthread+0x10/0x10
[   10.198222]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.198243]  ? calculate_sigpending+0x7b/0xa0
[   10.198264]  ? __pfx_kthread+0x10/0x10
[   10.198282]  ret_from_fork+0x41/0x80
[   10.198301]  ? __pfx_kthread+0x10/0x10
[   10.198319]  ret_from_fork_asm+0x1a/0x30
[   10.198349]  </TASK>
[   10.198359] 
[   10.209275] Allocated by task 155:
[   10.209413]  kasan_save_stack+0x45/0x70
[   10.209572]  kasan_save_track+0x18/0x40
[   10.209927]  kasan_save_alloc_info+0x3b/0x50
[   10.210346]  __kasan_kmalloc+0xb7/0xc0
[   10.210723]  __kmalloc_cache_noprof+0x189/0x420
[   10.211167]  kmalloc_oob_right+0xa9/0x7f0
[   10.211612]  kunit_try_run_case+0x1a5/0x480
[   10.211961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.212160]  kthread+0x337/0x6f0
[   10.212327]  ret_from_fork+0x41/0x80
[   10.212475]  ret_from_fork_asm+0x1a/0x30
[   10.212684] 
[   10.212778] The buggy address belongs to the object at ffff8881029eaf00
[   10.212778]  which belongs to the cache kmalloc-128 of size 128
[   10.213241] The buggy address is located 13 bytes to the right of
[   10.213241]  allocated 115-byte region [ffff8881029eaf00, ffff8881029eaf73)
[   10.213709] 
[   10.213787] The buggy address belongs to the physical page:
[   10.214069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ea
[   10.214401] flags: 0x200000000000000(node=0|zone=2)
[   10.214574] page_type: f5(slab)
[   10.214747] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.215109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.215385] page dumped because: kasan: bad access detected
[   10.215578] 
[   10.215673] Memory state around the buggy address:
[   10.215928]  ffff8881029eae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.216255]  ffff8881029eaf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.216503] >ffff8881029eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.216937]                    ^
[   10.217099]  ffff8881029eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.217371]  ffff8881029eb080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.217609] ==================================================================
[   10.137295] ==================================================================
[   10.137928] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.139004] Write of size 1 at addr ffff8881029eaf73 by task kunit_try_catch/155
[   10.139639] 
[   10.140734] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G                 N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.141027] Tainted: [N]=TEST
[   10.141059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.141289] Call Trace:
[   10.141356]  <TASK>
[   10.141501]  dump_stack_lvl+0x73/0xb0
[   10.141583]  print_report+0xd1/0x650
[   10.141613]  ? __virt_addr_valid+0x1db/0x2d0
[   10.141636]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.141658]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.141680]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.141701]  kasan_report+0x141/0x180
[   10.141723]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.141749]  __asan_report_store1_noabort+0x1b/0x30
[   10.141770]  kmalloc_oob_right+0x6f0/0x7f0
[   10.141792]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.141814]  ? __schedule+0x10cc/0x2b60
[   10.141837]  ? __pfx_read_tsc+0x10/0x10
[   10.141857]  ? ktime_get_ts64+0x86/0x230
[   10.141884]  kunit_try_run_case+0x1a5/0x480
[   10.141910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.141942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.141966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.141989]  ? __kthread_parkme+0x82/0x180
[   10.142013]  ? preempt_count_sub+0x50/0x80
[   10.142038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.142061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.142083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.142105]  kthread+0x337/0x6f0
[   10.142122]  ? trace_preempt_on+0x20/0xc0
[   10.142146]  ? __pfx_kthread+0x10/0x10
[   10.142163]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.142184]  ? calculate_sigpending+0x7b/0xa0
[   10.142205]  ? __pfx_kthread+0x10/0x10
[   10.142223]  ret_from_fork+0x41/0x80
[   10.142243]  ? __pfx_kthread+0x10/0x10
[   10.142260]  ret_from_fork_asm+0x1a/0x30
[   10.142312]  </TASK>
[   10.142374] 
[   10.152743] Allocated by task 155:
[   10.153325]  kasan_save_stack+0x45/0x70
[   10.154064]  kasan_save_track+0x18/0x40
[   10.154559]  kasan_save_alloc_info+0x3b/0x50
[   10.155166]  __kasan_kmalloc+0xb7/0xc0
[   10.155653]  __kmalloc_cache_noprof+0x189/0x420
[   10.156057]  kmalloc_oob_right+0xa9/0x7f0
[   10.156543]  kunit_try_run_case+0x1a5/0x480
[   10.156853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.157051]  kthread+0x337/0x6f0
[   10.157172]  ret_from_fork+0x41/0x80
[   10.157303]  ret_from_fork_asm+0x1a/0x30
[   10.157489] 
[   10.157956] The buggy address belongs to the object at ffff8881029eaf00
[   10.157956]  which belongs to the cache kmalloc-128 of size 128
[   10.159824] The buggy address is located 0 bytes to the right of
[   10.159824]  allocated 115-byte region [ffff8881029eaf00, ffff8881029eaf73)
[   10.161426] 
[   10.161831] The buggy address belongs to the physical page:
[   10.162814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ea
[   10.163906] flags: 0x200000000000000(node=0|zone=2)
[   10.165070] page_type: f5(slab)
[   10.166010] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.166857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.167423] page dumped because: kasan: bad access detected
[   10.167619] 
[   10.167828] Memory state around the buggy address:
[   10.168584]  ffff8881029eae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.169354]  ffff8881029eae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.170230] >ffff8881029eaf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.171033]                                                              ^
[   10.171294]  ffff8881029eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.171510]  ffff8881029eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.171964] ==================================================================