Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x86

[   16.819797] ==================================================================
[   16.826377] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.833315] Write of size 1 at addr ffff000800dac973 by task kunit_try_catch/185
[   16.840691] 
[   16.842179] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc2 #1 PREEMPT 
[   16.842233] Tainted: [N]=TEST
[   16.842247] Hardware name: WinLink E850-96 board (DT)
[   16.842269] Call trace:
[   16.842282]  show_stack+0x20/0x38 (C)
[   16.842317]  dump_stack_lvl+0x8c/0xd0
[   16.842357]  print_report+0x118/0x608
[   16.842389]  kasan_report+0xdc/0x128
[   16.842419]  __asan_report_store1_noabort+0x20/0x30
[   16.842453]  kmalloc_oob_right+0x5a4/0x660
[   16.842490]  kunit_try_run_case+0x170/0x3f0
[   16.842528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.842567]  kthread+0x328/0x630
[   16.842604]  ret_from_fork+0x10/0x20
[   16.842638] 
[   16.903799] Allocated by task 185:
[   16.907188]  kasan_save_stack+0x3c/0x68
[   16.911003]  kasan_save_track+0x20/0x40
[   16.914824]  kasan_save_alloc_info+0x40/0x58
[   16.919075]  __kasan_kmalloc+0xd4/0xd8
[   16.922809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.927322]  kmalloc_oob_right+0xb0/0x660
[   16.931315]  kunit_try_run_case+0x170/0x3f0
[   16.935482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.940950]  kthread+0x328/0x630
[   16.944162]  ret_from_fork+0x10/0x20
[   16.947721] 
[   16.949199] The buggy address belongs to the object at ffff000800dac900
[   16.949199]  which belongs to the cache kmalloc-128 of size 128
[   16.961700] The buggy address is located 0 bytes to the right of
[   16.961700]  allocated 115-byte region [ffff000800dac900, ffff000800dac973)
[   16.974631] 
[   16.976110] The buggy address belongs to the physical page:
[   16.981668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   16.989649] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.997289] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.004232] page_type: f5(slab)
[   17.007368] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.015088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.022815] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.030625] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.038439] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   17.046251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.054059] page dumped because: kasan: bad access detected
[   17.059612] 
[   17.061087] Memory state around the buggy address:
[   17.065869]  ffff000800dac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.073070]  ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.080279] >ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.087476]                                                              ^
[   17.094337]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.101545]  ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.108745] ==================================================================
[   17.121316] ==================================================================
[   17.128452] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.135392] Write of size 1 at addr ffff000800dac978 by task kunit_try_catch/185
[   17.142770] 
[   17.144256] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.144310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.144325] Hardware name: WinLink E850-96 board (DT)
[   17.144343] Call trace:
[   17.144357]  show_stack+0x20/0x38 (C)
[   17.144390]  dump_stack_lvl+0x8c/0xd0
[   17.144427]  print_report+0x118/0x608
[   17.144457]  kasan_report+0xdc/0x128
[   17.144486]  __asan_report_store1_noabort+0x20/0x30
[   17.144520]  kmalloc_oob_right+0x538/0x660
[   17.144551]  kunit_try_run_case+0x170/0x3f0
[   17.144589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.144628]  kthread+0x328/0x630
[   17.144662]  ret_from_fork+0x10/0x20
[   17.144693] 
[   17.207092] Allocated by task 185:
[   17.210481]  kasan_save_stack+0x3c/0x68
[   17.214297]  kasan_save_track+0x20/0x40
[   17.218118]  kasan_save_alloc_info+0x40/0x58
[   17.222370]  __kasan_kmalloc+0xd4/0xd8
[   17.226103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.230616]  kmalloc_oob_right+0xb0/0x660
[   17.234609]  kunit_try_run_case+0x170/0x3f0
[   17.238776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.244244]  kthread+0x328/0x630
[   17.247456]  ret_from_fork+0x10/0x20
[   17.251015] 
[   17.252492] The buggy address belongs to the object at ffff000800dac900
[   17.252492]  which belongs to the cache kmalloc-128 of size 128
[   17.264991] The buggy address is located 5 bytes to the right of
[   17.264991]  allocated 115-byte region [ffff000800dac900, ffff000800dac973)
[   17.277924] 
[   17.279404] The buggy address belongs to the physical page:
[   17.284961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   17.292943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.300580] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.307525] page_type: f5(slab)
[   17.310661] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.318382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.326108] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.333920] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.341733] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   17.349544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.357350] page dumped because: kasan: bad access detected
[   17.362906] 
[   17.364381] Memory state around the buggy address:
[   17.369161]  ffff000800dac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.376365]  ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.383571] >ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.390770]                                                                 ^
[   17.397893]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.405098]  ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.412299] ==================================================================
[   17.419632] ==================================================================
[   17.426711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.433652] Read of size 1 at addr ffff000800dac980 by task kunit_try_catch/185
[   17.440943] 
[   17.442427] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.442478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.442493] Hardware name: WinLink E850-96 board (DT)
[   17.442510] Call trace:
[   17.442523]  show_stack+0x20/0x38 (C)
[   17.442553]  dump_stack_lvl+0x8c/0xd0
[   17.442588]  print_report+0x118/0x608
[   17.442619]  kasan_report+0xdc/0x128
[   17.442649]  __asan_report_load1_noabort+0x20/0x30
[   17.442685]  kmalloc_oob_right+0x5d0/0x660
[   17.442716]  kunit_try_run_case+0x170/0x3f0
[   17.442750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.442785]  kthread+0x328/0x630
[   17.442818]  ret_from_fork+0x10/0x20
[   17.442851] 
[   17.505178] Allocated by task 185:
[   17.508565]  kasan_save_stack+0x3c/0x68
[   17.512383]  kasan_save_track+0x20/0x40
[   17.516202]  kasan_save_alloc_info+0x40/0x58
[   17.520456]  __kasan_kmalloc+0xd4/0xd8
[   17.524188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.528702]  kmalloc_oob_right+0xb0/0x660
[   17.532695]  kunit_try_run_case+0x170/0x3f0
[   17.536861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.542330]  kthread+0x328/0x630
[   17.545542]  ret_from_fork+0x10/0x20
[   17.549101] 
[   17.550577] The buggy address belongs to the object at ffff000800dac900
[   17.550577]  which belongs to the cache kmalloc-128 of size 128
[   17.563077] The buggy address is located 13 bytes to the right of
[   17.563077]  allocated 115-byte region [ffff000800dac900, ffff000800dac973)
[   17.576097] 
[   17.577576] The buggy address belongs to the physical page:
[   17.583132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   17.591115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.598753] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.605698] page_type: f5(slab)
[   17.608831] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.616555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.624281] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.632094] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.639906] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   17.647717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.655523] page dumped because: kasan: bad access detected
[   17.661078] 
[   17.662554] Memory state around the buggy address:
[   17.667335]  ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674537]  ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.681743] >ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.688943]                    ^
[   17.692160]  ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.699363]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.706564] ==================================================================

[   15.205802] ==================================================================
[   15.205840] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   15.205886] Write of size 1 at addr fff00000c637a278 by task kunit_try_catch/141
[   15.205933] 
[   15.205962] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.206047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.206072] Hardware name: linux,dummy-virt (DT)
[   15.206100] Call trace:
[   15.206122]  show_stack+0x20/0x38 (C)
[   15.206167]  dump_stack_lvl+0x8c/0xd0
[   15.206213]  print_report+0x118/0x608
[   15.206273]  kasan_report+0xdc/0x128
[   15.206318]  __asan_report_store1_noabort+0x20/0x30
[   15.206367]  kmalloc_oob_right+0x538/0x660
[   15.206413]  kunit_try_run_case+0x170/0x3f0
[   15.206480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.206532]  kthread+0x328/0x630
[   15.206584]  ret_from_fork+0x10/0x20
[   15.206640] 
[   15.206657] Allocated by task 141:
[   15.206682]  kasan_save_stack+0x3c/0x68
[   15.206718]  kasan_save_track+0x20/0x40
[   15.206752]  kasan_save_alloc_info+0x40/0x58
[   15.206788]  __kasan_kmalloc+0xd4/0xd8
[   15.206820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.206855]  kmalloc_oob_right+0xb0/0x660
[   15.206891]  kunit_try_run_case+0x170/0x3f0
[   15.206927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.206968]  kthread+0x328/0x630
[   15.207001]  ret_from_fork+0x10/0x20
[   15.207035] 
[   15.207052] The buggy address belongs to the object at fff00000c637a200
[   15.207052]  which belongs to the cache kmalloc-128 of size 128
[   15.207105] The buggy address is located 5 bytes to the right of
[   15.207105]  allocated 115-byte region [fff00000c637a200, fff00000c637a273)
[   15.207164] 
[   15.207183] The buggy address belongs to the physical page:
[   15.207225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.207273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.207330] page_type: f5(slab)
[   15.207365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.207411] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.207448] page dumped because: kasan: bad access detected
[   15.207477] 
[   15.207494] Memory state around the buggy address:
[   15.207522]  fff00000c637a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.207579]  fff00000c637a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207637] >fff00000c637a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.207673]                                                                 ^
[   15.207710]  fff00000c637a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207757]  fff00000c637a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207792] ==================================================================
[   15.196505] ==================================================================
[   15.197535] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   15.199608] Write of size 1 at addr fff00000c637a273 by task kunit_try_catch/141
[   15.199779] 
[   15.200622] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc2 #1 PREEMPT 
[   15.200785] Tainted: [N]=TEST
[   15.200817] Hardware name: linux,dummy-virt (DT)
[   15.201047] Call trace:
[   15.201219]  show_stack+0x20/0x38 (C)
[   15.201353]  dump_stack_lvl+0x8c/0xd0
[   15.201414]  print_report+0x118/0x608
[   15.201458]  kasan_report+0xdc/0x128
[   15.201501]  __asan_report_store1_noabort+0x20/0x30
[   15.201549]  kmalloc_oob_right+0x5a4/0x660
[   15.201595]  kunit_try_run_case+0x170/0x3f0
[   15.201660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.201712]  kthread+0x328/0x630
[   15.201758]  ret_from_fork+0x10/0x20
[   15.201916] 
[   15.201959] Allocated by task 141:
[   15.202081]  kasan_save_stack+0x3c/0x68
[   15.202143]  kasan_save_track+0x20/0x40
[   15.202177]  kasan_save_alloc_info+0x40/0x58
[   15.202214]  __kasan_kmalloc+0xd4/0xd8
[   15.202247]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.202284]  kmalloc_oob_right+0xb0/0x660
[   15.202320]  kunit_try_run_case+0x170/0x3f0
[   15.202357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.202398]  kthread+0x328/0x630
[   15.202432]  ret_from_fork+0x10/0x20
[   15.202486] 
[   15.202545] The buggy address belongs to the object at fff00000c637a200
[   15.202545]  which belongs to the cache kmalloc-128 of size 128
[   15.202653] The buggy address is located 0 bytes to the right of
[   15.202653]  allocated 115-byte region [fff00000c637a200, fff00000c637a273)
[   15.202724] 
[   15.202806] The buggy address belongs to the physical page:
[   15.202982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.203253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.203553] page_type: f5(slab)
[   15.203862] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.203926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.204095] page dumped because: kasan: bad access detected
[   15.204138] 
[   15.204163] Memory state around the buggy address:
[   15.204391]  fff00000c637a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.204465]  fff00000c637a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.204519] >fff00000c637a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.204570]                                                              ^
[   15.204665]  fff00000c637a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.204706]  fff00000c637a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.204771] ==================================================================
[   15.208099] ==================================================================
[   15.208268] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   15.208312] Read of size 1 at addr fff00000c637a280 by task kunit_try_catch/141
[   15.208357] 
[   15.208383] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.208458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.208482] Hardware name: linux,dummy-virt (DT)
[   15.208583] Call trace:
[   15.208625]  show_stack+0x20/0x38 (C)
[   15.208685]  dump_stack_lvl+0x8c/0xd0
[   15.208730]  print_report+0x118/0x608
[   15.208773]  kasan_report+0xdc/0x128
[   15.208814]  __asan_report_load1_noabort+0x20/0x30
[   15.208861]  kmalloc_oob_right+0x5d0/0x660
[   15.208918]  kunit_try_run_case+0x170/0x3f0
[   15.208996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.209194]  kthread+0x328/0x630
[   15.209309]  ret_from_fork+0x10/0x20
[   15.209424] 
[   15.209502] Allocated by task 141:
[   15.209600]  kasan_save_stack+0x3c/0x68
[   15.209646]  kasan_save_track+0x20/0x40
[   15.209818]  kasan_save_alloc_info+0x40/0x58
[   15.209944]  __kasan_kmalloc+0xd4/0xd8
[   15.210060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.210216]  kmalloc_oob_right+0xb0/0x660
[   15.210332]  kunit_try_run_case+0x170/0x3f0
[   15.210424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.210544]  kthread+0x328/0x630
[   15.210578]  ret_from_fork+0x10/0x20
[   15.210844] 
[   15.210912] The buggy address belongs to the object at fff00000c637a200
[   15.210912]  which belongs to the cache kmalloc-128 of size 128
[   15.211069] The buggy address is located 13 bytes to the right of
[   15.211069]  allocated 115-byte region [fff00000c637a200, fff00000c637a273)
[   15.211197] 
[   15.211216] The buggy address belongs to the physical page:
[   15.211244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a
[   15.211538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.211718] page_type: f5(slab)
[   15.211890] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.212038] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.212076] page dumped because: kasan: bad access detected
[   15.212105] 
[   15.212144] Memory state around the buggy address:
[   15.212173]  fff00000c637a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.212214]  fff00000c637a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.212255] >fff00000c637a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.212290]                    ^
[   15.212315]  fff00000c637a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.212354]  fff00000c637a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.212389] ==================================================================

[   13.208939] ==================================================================
[   13.209568] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   13.209988] Write of size 1 at addr ffff8881025fa078 by task kunit_try_catch/157
[   13.210901] 
[   13.211560] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   13.211671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.211697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.211736] Call Trace:
[   13.211766]  <TASK>
[   13.211804]  dump_stack_lvl+0x73/0xb0
[   13.211865]  print_report+0xd1/0x650
[   13.211914]  ? __virt_addr_valid+0x1db/0x2d0
[   13.211944]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.211968]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.211993]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.212017]  kasan_report+0x141/0x180
[   13.212042]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.212102]  __asan_report_store1_noabort+0x1b/0x30
[   13.212125]  kmalloc_oob_right+0x6bd/0x7f0
[   13.212150]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.212175]  ? __schedule+0x10cc/0x2b60
[   13.212201]  ? __pfx_read_tsc+0x10/0x10
[   13.212222]  ? ktime_get_ts64+0x86/0x230
[   13.212251]  kunit_try_run_case+0x1a5/0x480
[   13.212278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.212302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.212328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.212375]  ? __kthread_parkme+0x82/0x180
[   13.212400]  ? preempt_count_sub+0x50/0x80
[   13.212428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.212454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.212480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.212504]  kthread+0x337/0x6f0
[   13.212523]  ? trace_preempt_on+0x20/0xc0
[   13.212549]  ? __pfx_kthread+0x10/0x10
[   13.212569]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.212592]  ? calculate_sigpending+0x7b/0xa0
[   13.212616]  ? __pfx_kthread+0x10/0x10
[   13.212635]  ret_from_fork+0x41/0x80
[   13.212658]  ? __pfx_kthread+0x10/0x10
[   13.212677]  ret_from_fork_asm+0x1a/0x30
[   13.212711]  </TASK>
[   13.212724] 
[   13.224740] Allocated by task 157:
[   13.224954]  kasan_save_stack+0x45/0x70
[   13.225449]  kasan_save_track+0x18/0x40
[   13.225753]  kasan_save_alloc_info+0x3b/0x50
[   13.225960]  __kasan_kmalloc+0xb7/0xc0
[   13.226377]  __kmalloc_cache_noprof+0x189/0x420
[   13.226839]  kmalloc_oob_right+0xa9/0x7f0
[   13.227226]  kunit_try_run_case+0x1a5/0x480
[   13.227450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.227773]  kthread+0x337/0x6f0
[   13.228140]  ret_from_fork+0x41/0x80
[   13.228488]  ret_from_fork_asm+0x1a/0x30
[   13.228783] 
[   13.228903] The buggy address belongs to the object at ffff8881025fa000
[   13.228903]  which belongs to the cache kmalloc-128 of size 128
[   13.229632] The buggy address is located 5 bytes to the right of
[   13.229632]  allocated 115-byte region [ffff8881025fa000, ffff8881025fa073)
[   13.230684] 
[   13.230871] The buggy address belongs to the physical page:
[   13.231130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa
[   13.231425] flags: 0x200000000000000(node=0|zone=2)
[   13.231834] page_type: f5(slab)
[   13.232254] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.232805] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.233130] page dumped because: kasan: bad access detected
[   13.233580] 
[   13.233837] Memory state around the buggy address:
[   13.234636]  ffff8881025f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.235195]  ffff8881025f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.235571] >ffff8881025fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.236328]                                                                 ^
[   13.236726]  ffff8881025fa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.237408]  ffff8881025fa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.238006] ==================================================================
[   13.163387] ==================================================================
[   13.165980] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   13.167753] Write of size 1 at addr ffff8881025fa073 by task kunit_try_catch/157
[   13.168921] 
[   13.171481] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   13.172116] Tainted: [N]=TEST
[   13.172183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.172853] Call Trace:
[   13.173024]  <TASK>
[   13.173553]  dump_stack_lvl+0x73/0xb0
[   13.173761]  print_report+0xd1/0x650
[   13.173827]  ? __virt_addr_valid+0x1db/0x2d0
[   13.173880]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.173926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.173974]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.174018]  kasan_report+0x141/0x180
[   13.174060]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.174149]  __asan_report_store1_noabort+0x1b/0x30
[   13.174189]  kmalloc_oob_right+0x6f0/0x7f0
[   13.174246]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.174285]  ? __schedule+0x10cc/0x2b60
[   13.174326]  ? __pfx_read_tsc+0x10/0x10
[   13.174380]  ? ktime_get_ts64+0x86/0x230
[   13.174415]  kunit_try_run_case+0x1a5/0x480
[   13.174448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.174471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.174499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.174524]  ? __kthread_parkme+0x82/0x180
[   13.174549]  ? preempt_count_sub+0x50/0x80
[   13.174577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.174602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.174626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.174651]  kthread+0x337/0x6f0
[   13.174669]  ? trace_preempt_on+0x20/0xc0
[   13.174695]  ? __pfx_kthread+0x10/0x10
[   13.174715]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.174738]  ? calculate_sigpending+0x7b/0xa0
[   13.174762]  ? __pfx_kthread+0x10/0x10
[   13.174782]  ret_from_fork+0x41/0x80
[   13.174804]  ? __pfx_kthread+0x10/0x10
[   13.174824]  ret_from_fork_asm+0x1a/0x30
[   13.174900]  </TASK>
[   13.174987] 
[   13.188384] Allocated by task 157:
[   13.188979]  kasan_save_stack+0x45/0x70
[   13.189529]  kasan_save_track+0x18/0x40
[   13.189830]  kasan_save_alloc_info+0x3b/0x50
[   13.190037]  __kasan_kmalloc+0xb7/0xc0
[   13.190634]  __kmalloc_cache_noprof+0x189/0x420
[   13.191004]  kmalloc_oob_right+0xa9/0x7f0
[   13.191757]  kunit_try_run_case+0x1a5/0x480
[   13.192247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.192507]  kthread+0x337/0x6f0
[   13.192822]  ret_from_fork+0x41/0x80
[   13.193150]  ret_from_fork_asm+0x1a/0x30
[   13.193677] 
[   13.193827] The buggy address belongs to the object at ffff8881025fa000
[   13.193827]  which belongs to the cache kmalloc-128 of size 128
[   13.194161] The buggy address is located 0 bytes to the right of
[   13.194161]  allocated 115-byte region [ffff8881025fa000, ffff8881025fa073)
[   13.194512] 
[   13.194958] The buggy address belongs to the physical page:
[   13.196370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa
[   13.197470] flags: 0x200000000000000(node=0|zone=2)
[   13.198585] page_type: f5(slab)
[   13.199263] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.199645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.200229] page dumped because: kasan: bad access detected
[   13.200745] 
[   13.201301] Memory state around the buggy address:
[   13.202149]  ffff8881025f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.202980]  ffff8881025f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.203612] >ffff8881025fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.203995]                                                              ^
[   13.204880]  ffff8881025fa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.205552]  ffff8881025fa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.206109] ==================================================================
[   13.240157] ==================================================================
[   13.240603] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   13.241075] Read of size 1 at addr ffff8881025fa080 by task kunit_try_catch/157
[   13.241563] 
[   13.241666] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   13.241728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.241742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.241767] Call Trace:
[   13.241792]  <TASK>
[   13.241819]  dump_stack_lvl+0x73/0xb0
[   13.241855]  print_report+0xd1/0x650
[   13.241881]  ? __virt_addr_valid+0x1db/0x2d0
[   13.241908]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.241932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.241957]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.241982]  kasan_report+0x141/0x180
[   13.242008]  ? kmalloc_oob_right+0x68a/0x7f0
[   13.242037]  __asan_report_load1_noabort+0x18/0x20
[   13.242061]  kmalloc_oob_right+0x68a/0x7f0
[   13.242113]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.242152]  ? __schedule+0x10cc/0x2b60
[   13.242195]  ? __pfx_read_tsc+0x10/0x10
[   13.242234]  ? ktime_get_ts64+0x86/0x230
[   13.242284]  kunit_try_run_case+0x1a5/0x480
[   13.242333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.242396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.242443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.242489]  ? __kthread_parkme+0x82/0x180
[   13.242536]  ? preempt_count_sub+0x50/0x80
[   13.242593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.242643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.242686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.242723]  kthread+0x337/0x6f0
[   13.242752]  ? trace_preempt_on+0x20/0xc0
[   13.242797]  ? __pfx_kthread+0x10/0x10
[   13.242830]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.242874]  ? calculate_sigpending+0x7b/0xa0
[   13.242919]  ? __pfx_kthread+0x10/0x10
[   13.242959]  ret_from_fork+0x41/0x80
[   13.242999]  ? __pfx_kthread+0x10/0x10
[   13.243036]  ret_from_fork_asm+0x1a/0x30
[   13.243098]  </TASK>
[   13.243123] 
[   13.252172] Allocated by task 157:
[   13.252513]  kasan_save_stack+0x45/0x70
[   13.252733]  kasan_save_track+0x18/0x40
[   13.253104]  kasan_save_alloc_info+0x3b/0x50
[   13.253329]  __kasan_kmalloc+0xb7/0xc0
[   13.253668]  __kmalloc_cache_noprof+0x189/0x420
[   13.253876]  kmalloc_oob_right+0xa9/0x7f0
[   13.254245]  kunit_try_run_case+0x1a5/0x480
[   13.254472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.254842]  kthread+0x337/0x6f0
[   13.255157]  ret_from_fork+0x41/0x80
[   13.255369]  ret_from_fork_asm+0x1a/0x30
[   13.255567] 
[   13.255685] The buggy address belongs to the object at ffff8881025fa000
[   13.255685]  which belongs to the cache kmalloc-128 of size 128
[   13.256215] The buggy address is located 13 bytes to the right of
[   13.256215]  allocated 115-byte region [ffff8881025fa000, ffff8881025fa073)
[   13.257148] 
[   13.257350] The buggy address belongs to the physical page:
[   13.257622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa
[   13.258152] flags: 0x200000000000000(node=0|zone=2)
[   13.258560] page_type: f5(slab)
[   13.258828] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.259235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.259528] page dumped because: kasan: bad access detected
[   13.259748] 
[   13.259861] Memory state around the buggy address:
[   13.260094]  ffff8881025f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.260376]  ffff8881025fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.260890] >ffff8881025fa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.261529]                    ^
[   13.261840]  ffff8881025fa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.262387]  ffff8881025fa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.262904] ==================================================================

[   18.179975] ==================================================================
[   18.187217] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   18.194176] Write of size 1 at addr ffff888102acc278 by task kunit_try_catch/179
[   18.201570] 
[   18.203071] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.203080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.203082] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.203085] Call Trace:
[   18.203087]  <TASK>
[   18.203088]  dump_stack_lvl+0x73/0xb0
[   18.203092]  print_report+0xd1/0x650
[   18.203096]  ? __virt_addr_valid+0x1db/0x2d0
[   18.203100]  ? kmalloc_oob_right+0x6bd/0x7f0
[   18.203104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.203109]  ? kmalloc_oob_right+0x6bd/0x7f0
[   18.203113]  kasan_report+0x141/0x180
[   18.203117]  ? kmalloc_oob_right+0x6bd/0x7f0
[   18.203123]  __asan_report_store1_noabort+0x1b/0x30
[   18.203127]  kmalloc_oob_right+0x6bd/0x7f0
[   18.203131]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   18.203135]  ? __schedule+0x10cc/0x2b60
[   18.203140]  ? ktime_get_ts64+0x83/0x230
[   18.203145]  kunit_try_run_case+0x1a2/0x480
[   18.203149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.203154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.203158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.203163]  ? __kthread_parkme+0x82/0x180
[   18.203167]  ? preempt_count_sub+0x50/0x80
[   18.203172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.203176]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.203181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.203185]  kthread+0x334/0x6f0
[   18.203188]  ? trace_preempt_on+0x20/0xc0
[   18.203192]  ? __pfx_kthread+0x10/0x10
[   18.203195]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.203199]  ? calculate_sigpending+0x7b/0xa0
[   18.203203]  ? __pfx_kthread+0x10/0x10
[   18.203206]  ret_from_fork+0x3e/0x80
[   18.203210]  ? __pfx_kthread+0x10/0x10
[   18.203213]  ret_from_fork_asm+0x1a/0x30
[   18.203219]  </TASK>
[   18.203220] 
[   18.366168] Allocated by task 179:
[   18.369572]  kasan_save_stack+0x45/0x70
[   18.373412]  kasan_save_track+0x18/0x40
[   18.377253]  kasan_save_alloc_info+0x3b/0x50
[   18.381524]  __kasan_kmalloc+0xb7/0xc0
[   18.385278]  __kmalloc_cache_noprof+0x189/0x420
[   18.389817]  kmalloc_oob_right+0xa9/0x7f0
[   18.393830]  kunit_try_run_case+0x1a2/0x480
[   18.398017]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.403417]  kthread+0x334/0x6f0
[   18.406649]  ret_from_fork+0x3e/0x80
[   18.410229]  ret_from_fork_asm+0x1a/0x30
[   18.414155] 
[   18.415653] The buggy address belongs to the object at ffff888102acc200
[   18.415653]  which belongs to the cache kmalloc-128 of size 128
[   18.428161] The buggy address is located 5 bytes to the right of
[   18.428161]  allocated 115-byte region [ffff888102acc200, ffff888102acc273)
[   18.441107] 
[   18.442606] The buggy address belongs to the physical page:
[   18.448178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   18.456180] flags: 0x200000000000000(node=0|zone=2)
[   18.461056] page_type: f5(slab)
[   18.464205] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   18.471956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.479709] page dumped because: kasan: bad access detected
[   18.485281] 
[   18.486781] Memory state around the buggy address:
[   18.491572]  ffff888102acc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.498792]  ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.506011] >ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.513231]                                                                 ^
[   18.520364]  ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.527583]  ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.534802] ==================================================================
[   17.813831] ==================================================================
[   17.821062] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   17.828038] Write of size 1 at addr ffff888102acc273 by task kunit_try_catch/179
[   17.835439] 
[   17.836965] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.836973] Tainted: [N]=TEST
[   17.836975] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.836979] Call Trace:
[   17.836980]  <TASK>
[   17.836983]  dump_stack_lvl+0x73/0xb0
[   17.836988]  print_report+0xd1/0x650
[   17.836993]  ? __virt_addr_valid+0x1db/0x2d0
[   17.836997]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.837001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.837006]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.837010]  kasan_report+0x141/0x180
[   17.837015]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.837020]  __asan_report_store1_noabort+0x1b/0x30
[   17.837024]  kmalloc_oob_right+0x6f0/0x7f0
[   17.837028]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   17.837033]  ? __schedule+0x10cc/0x2b60
[   17.837038]  ? ktime_get_ts64+0x83/0x230
[   17.837043]  kunit_try_run_case+0x1a2/0x480
[   17.837049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.837054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.837059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.837064]  ? __kthread_parkme+0x82/0x180
[   17.837068]  ? preempt_count_sub+0x50/0x80
[   17.837074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.837078]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.837083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.837087]  kthread+0x334/0x6f0
[   17.837090]  ? trace_preempt_on+0x20/0xc0
[   17.837095]  ? __pfx_kthread+0x10/0x10
[   17.837098]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.837102]  ? calculate_sigpending+0x7b/0xa0
[   17.837107]  ? __pfx_kthread+0x10/0x10
[   17.837110]  ret_from_fork+0x3e/0x80
[   17.837115]  ? __pfx_kthread+0x10/0x10
[   17.837118]  ret_from_fork_asm+0x1a/0x30
[   17.837124]  </TASK>
[   17.837126] 
[   17.998806] Allocated by task 179:
[   18.002213]  kasan_save_stack+0x45/0x70
[   18.006061]  kasan_save_track+0x18/0x40
[   18.009918]  kasan_save_alloc_info+0x3b/0x50
[   18.014197]  __kasan_kmalloc+0xb7/0xc0
[   18.017971]  __kmalloc_cache_noprof+0x189/0x420
[   18.022510]  kmalloc_oob_right+0xa9/0x7f0
[   18.026529]  kunit_try_run_case+0x1a2/0x480
[   18.030716]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.036115]  kthread+0x334/0x6f0
[   18.039348]  ret_from_fork+0x3e/0x80
[   18.042929]  ret_from_fork_asm+0x1a/0x30
[   18.046880] 
[   18.048380] The buggy address belongs to the object at ffff888102acc200
[   18.048380]  which belongs to the cache kmalloc-128 of size 128
[   18.060895] The buggy address is located 0 bytes to the right of
[   18.060895]  allocated 115-byte region [ffff888102acc200, ffff888102acc273)
[   18.073867] 
[   18.075367] The buggy address belongs to the physical page:
[   18.080939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   18.088979] flags: 0x200000000000000(node=0|zone=2)
[   18.093862] page_type: f5(slab)
[   18.097011] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   18.104757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.112504] page dumped because: kasan: bad access detected
[   18.118076] 
[   18.119576] Memory state around the buggy address:
[   18.124369]  ffff888102acc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.131587]  ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.138806] >ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.146027]                                                              ^
[   18.152915]  ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.160146]  ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.167372] ==================================================================
[   18.542045] ==================================================================
[   18.549275] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   18.556235] Read of size 1 at addr ffff888102acc280 by task kunit_try_catch/179
[   18.563550] 
[   18.565049] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.565057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.565059] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.565062] Call Trace:
[   18.565064]  <TASK>
[   18.565065]  dump_stack_lvl+0x73/0xb0
[   18.565069]  print_report+0xd1/0x650
[   18.565073]  ? __virt_addr_valid+0x1db/0x2d0
[   18.565077]  ? kmalloc_oob_right+0x68a/0x7f0
[   18.565081]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.565085]  ? kmalloc_oob_right+0x68a/0x7f0
[   18.565090]  kasan_report+0x141/0x180
[   18.565094]  ? kmalloc_oob_right+0x68a/0x7f0
[   18.565099]  __asan_report_load1_noabort+0x18/0x20
[   18.565103]  kmalloc_oob_right+0x68a/0x7f0
[   18.565107]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   18.565112]  ? __schedule+0x10cc/0x2b60
[   18.565116]  ? ktime_get_ts64+0x83/0x230
[   18.565121]  kunit_try_run_case+0x1a2/0x480
[   18.565125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.565130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.565134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.565139]  ? __kthread_parkme+0x82/0x180
[   18.565143]  ? preempt_count_sub+0x50/0x80
[   18.565148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.565152]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.565157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.565161]  kthread+0x334/0x6f0
[   18.565164]  ? trace_preempt_on+0x20/0xc0
[   18.565168]  ? __pfx_kthread+0x10/0x10
[   18.565171]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.565175]  ? calculate_sigpending+0x7b/0xa0
[   18.565179]  ? __pfx_kthread+0x10/0x10
[   18.565182]  ret_from_fork+0x3e/0x80
[   18.565186]  ? __pfx_kthread+0x10/0x10
[   18.565189]  ret_from_fork_asm+0x1a/0x30
[   18.565195]  </TASK>
[   18.565196] 
[   18.727971] Allocated by task 179:
[   18.731378]  kasan_save_stack+0x45/0x70
[   18.735219]  kasan_save_track+0x18/0x40
[   18.739057]  kasan_save_alloc_info+0x3b/0x50
[   18.743331]  __kasan_kmalloc+0xb7/0xc0
[   18.747083]  __kmalloc_cache_noprof+0x189/0x420
[   18.751615]  kmalloc_oob_right+0xa9/0x7f0
[   18.755629]  kunit_try_run_case+0x1a2/0x480
[   18.759823]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.765231]  kthread+0x334/0x6f0
[   18.768462]  ret_from_fork+0x3e/0x80
[   18.772041]  ret_from_fork_asm+0x1a/0x30
[   18.775970] 
[   18.777468] The buggy address belongs to the object at ffff888102acc200
[   18.777468]  which belongs to the cache kmalloc-128 of size 128
[   18.789982] The buggy address is located 13 bytes to the right of
[   18.789982]  allocated 115-byte region [ffff888102acc200, ffff888102acc273)
[   18.803019] 
[   18.804516] The buggy address belongs to the physical page:
[   18.810088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   18.818087] flags: 0x200000000000000(node=0|zone=2)
[   18.822967] page_type: f5(slab)
[   18.826115] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   18.833863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.841610] page dumped because: kasan: bad access detected
[   18.847183] 
[   18.848681] Memory state around the buggy address:
[   18.853475]  ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.860704]  ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.867932] >ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.875148]                    ^
[   18.878383]  ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.885602]  ffff888102acc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892820] ==================================================================