Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.555255] ==================================================================
[   16.555441] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   16.555511] Read of size 1 at addr fff00000c655f000 by task kunit_try_catch/140
[   16.555560] 
[   16.555600] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.556240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.556270] Hardware name: linux,dummy-virt (DT)
[   16.556302] Call trace:
[   16.556326]  show_stack+0x20/0x38 (C)
[   16.556386]  dump_stack_lvl+0x8c/0xd0
[   16.556436]  print_report+0x118/0x5d0
[   16.556777]  kasan_report+0xdc/0x128
[   16.556949]  __asan_report_load1_noabort+0x20/0x30
[   16.557040]  kmalloc_node_oob_right+0x2f4/0x330
[   16.557088]  kunit_try_run_case+0x170/0x3f0
[   16.557137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.557189]  kthread+0x328/0x630
[   16.557234]  ret_from_fork+0x10/0x20
[   16.557293] 
[   16.557312] Allocated by task 140:
[   16.557341]  kasan_save_stack+0x3c/0x68
[   16.557383]  kasan_save_track+0x20/0x40
[   16.557919]  kasan_save_alloc_info+0x40/0x58
[   16.558045]  __kasan_kmalloc+0xd4/0xd8
[   16.558105]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   16.558146]  kmalloc_node_oob_right+0xbc/0x330
[   16.558184]  kunit_try_run_case+0x170/0x3f0
[   16.558226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.558491]  kthread+0x328/0x630
[   16.558525]  ret_from_fork+0x10/0x20
[   16.558596] 
[   16.558617] The buggy address belongs to the object at fff00000c655e000
[   16.558617]  which belongs to the cache kmalloc-4k of size 4096
[   16.558675] The buggy address is located 0 bytes to the right of
[   16.558675]  allocated 4096-byte region [fff00000c655e000, fff00000c655f000)
[   16.558736] 
[   16.558757] The buggy address belongs to the physical page:
[   16.559720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106558
[   16.560238] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.560301] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.560986] page_type: f5(slab)
[   16.561299] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.561974] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.562258] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.563204] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.563548] head: 0bfffe0000000003 ffffc1ffc3195601 00000000ffffffff 00000000ffffffff
[   16.563632] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.563682] page dumped because: kasan: bad access detected
[   16.563735] 
[   16.563753] Memory state around the buggy address:
[   16.564414]  fff00000c655ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.565104]  fff00000c655ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.565606] >fff00000c655f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.565863]                    ^
[   16.565958]  fff00000c655f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.566056]  fff00000c655f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.566094] ==================================================================

[   16.277559] ==================================================================
[   16.277748] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   16.278011] Read of size 1 at addr fff00000c65b7000 by task kunit_try_catch/140
[   16.278061] 
[   16.278095] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.278202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.278228] Hardware name: linux,dummy-virt (DT)
[   16.278330] Call trace:
[   16.278419]  show_stack+0x20/0x38 (C)
[   16.278789]  dump_stack_lvl+0x8c/0xd0
[   16.278936]  print_report+0x118/0x5d0
[   16.278988]  kasan_report+0xdc/0x128
[   16.279034]  __asan_report_load1_noabort+0x20/0x30
[   16.279084]  kmalloc_node_oob_right+0x2f4/0x330
[   16.279132]  kunit_try_run_case+0x170/0x3f0
[   16.279179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.279231]  kthread+0x328/0x630
[   16.279273]  ret_from_fork+0x10/0x20
[   16.279333] 
[   16.279352] Allocated by task 140:
[   16.279379]  kasan_save_stack+0x3c/0x68
[   16.279419]  kasan_save_track+0x20/0x40
[   16.279456]  kasan_save_alloc_info+0x40/0x58
[   16.279495]  __kasan_kmalloc+0xd4/0xd8
[   16.279530]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   16.279619]  kmalloc_node_oob_right+0xbc/0x330
[   16.279663]  kunit_try_run_case+0x170/0x3f0
[   16.279699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.279830]  kthread+0x328/0x630
[   16.279900]  ret_from_fork+0x10/0x20
[   16.280100] 
[   16.280120] The buggy address belongs to the object at fff00000c65b6000
[   16.280120]  which belongs to the cache kmalloc-4k of size 4096
[   16.280342] The buggy address is located 0 bytes to the right of
[   16.280342]  allocated 4096-byte region [fff00000c65b6000, fff00000c65b7000)
[   16.280408] 
[   16.280427] The buggy address belongs to the physical page:
[   16.280510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0
[   16.280787] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.280843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.280907] page_type: f5(slab)
[   16.280948] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.280997] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.281313] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.281398] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.281447] head: 0bfffe0000000003 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff
[   16.281494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.281647] page dumped because: kasan: bad access detected
[   16.281712] 
[   16.281760] Memory state around the buggy address:
[   16.281842]  fff00000c65b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.281920]  fff00000c65b6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.282045] >fff00000c65b7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282082]                    ^
[   16.282110]  fff00000c65b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282151]  fff00000c65b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282189] ==================================================================

[   16.287175] ==================================================================
[   16.287243] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   16.287300] Read of size 1 at addr fff00000c6253000 by task kunit_try_catch/140
[   16.287348] 
[   16.287384] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.287462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.287488] Hardware name: linux,dummy-virt (DT)
[   16.287518] Call trace:
[   16.287541]  show_stack+0x20/0x38 (C)
[   16.287590]  dump_stack_lvl+0x8c/0xd0
[   16.287638]  print_report+0x118/0x5d0
[   16.287683]  kasan_report+0xdc/0x128
[   16.287744]  __asan_report_load1_noabort+0x20/0x30
[   16.287794]  kmalloc_node_oob_right+0x2f4/0x330
[   16.287840]  kunit_try_run_case+0x170/0x3f0
[   16.287888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.287939]  kthread+0x328/0x630
[   16.287980]  ret_from_fork+0x10/0x20
[   16.288026] 
[   16.288044] Allocated by task 140:
[   16.288071]  kasan_save_stack+0x3c/0x68
[   16.288110]  kasan_save_track+0x20/0x40
[   16.288146]  kasan_save_alloc_info+0x40/0x58
[   16.288184]  __kasan_kmalloc+0xd4/0xd8
[   16.288218]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   16.288257]  kmalloc_node_oob_right+0xbc/0x330
[   16.288293]  kunit_try_run_case+0x170/0x3f0
[   16.288329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.288369]  kthread+0x328/0x630
[   16.288400]  ret_from_fork+0x10/0x20
[   16.288433] 
[   16.288451] The buggy address belongs to the object at fff00000c6252000
[   16.288451]  which belongs to the cache kmalloc-4k of size 4096
[   16.288508] The buggy address is located 0 bytes to the right of
[   16.288508]  allocated 4096-byte region [fff00000c6252000, fff00000c6253000)
[   16.288596] 
[   16.288616] The buggy address belongs to the physical page:
[   16.288684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106250
[   16.289198] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.289402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.289472] page_type: f5(slab)
[   16.289511] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.289561] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.289905] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.290009] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.290196] head: 0bfffe0000000003 ffffc1ffc3189401 00000000ffffffff 00000000ffffffff
[   16.290335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.290444] page dumped because: kasan: bad access detected
[   16.290607] 
[   16.290692] Memory state around the buggy address:
[   16.290808]  fff00000c6252f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.290886]  fff00000c6252f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.290928] >fff00000c6253000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.290978]                    ^
[   16.291007]  fff00000c6253080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.291212]  fff00000c6253100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.291454] ==================================================================

[   11.391346] ==================================================================
[   11.392070] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   11.392429] Read of size 1 at addr ffff888102b83000 by task kunit_try_catch/158
[   11.392899] 
[   11.393151] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.393301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.393313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.393334] Call Trace:
[   11.393344]  <TASK>
[   11.393358]  dump_stack_lvl+0x73/0xb0
[   11.393388]  print_report+0xd1/0x610
[   11.393411]  ? __virt_addr_valid+0x1db/0x2d0
[   11.393433]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.393580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.393604]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.393628]  kasan_report+0x141/0x180
[   11.393650]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.393687]  __asan_report_load1_noabort+0x18/0x20
[   11.393710]  kmalloc_node_oob_right+0x369/0x3c0
[   11.393735]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   11.393760]  ? __schedule+0x10cc/0x2b60
[   11.393808]  ? __pfx_read_tsc+0x10/0x10
[   11.393829]  ? ktime_get_ts64+0x86/0x230
[   11.393854]  kunit_try_run_case+0x1a5/0x480
[   11.393896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.393918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.393942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.393966]  ? __kthread_parkme+0x82/0x180
[   11.393985]  ? preempt_count_sub+0x50/0x80
[   11.394009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.394032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.394055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.394079]  kthread+0x337/0x6f0
[   11.394097]  ? trace_preempt_on+0x20/0xc0
[   11.394120]  ? __pfx_kthread+0x10/0x10
[   11.394140]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.394161]  ? calculate_sigpending+0x7b/0xa0
[   11.394184]  ? __pfx_kthread+0x10/0x10
[   11.394205]  ret_from_fork+0x116/0x1d0
[   11.394223]  ? __pfx_kthread+0x10/0x10
[   11.394243]  ret_from_fork_asm+0x1a/0x30
[   11.394275]  </TASK>
[   11.394284] 
[   11.404919] Allocated by task 158:
[   11.405100]  kasan_save_stack+0x45/0x70
[   11.405302]  kasan_save_track+0x18/0x40
[   11.405499]  kasan_save_alloc_info+0x3b/0x50
[   11.405726]  __kasan_kmalloc+0xb7/0xc0
[   11.405972]  __kmalloc_cache_node_noprof+0x188/0x420
[   11.406540]  kmalloc_node_oob_right+0xab/0x3c0
[   11.406730]  kunit_try_run_case+0x1a5/0x480
[   11.406911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.407186]  kthread+0x337/0x6f0
[   11.407338]  ret_from_fork+0x116/0x1d0
[   11.407609]  ret_from_fork_asm+0x1a/0x30
[   11.407882] 
[   11.407968] The buggy address belongs to the object at ffff888102b82000
[   11.407968]  which belongs to the cache kmalloc-4k of size 4096
[   11.408664] The buggy address is located 0 bytes to the right of
[   11.408664]  allocated 4096-byte region [ffff888102b82000, ffff888102b83000)
[   11.409203] 
[   11.409320] The buggy address belongs to the physical page:
[   11.409650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b80
[   11.410159] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.410781] flags: 0x200000000000040(head|node=0|zone=2)
[   11.411061] page_type: f5(slab)
[   11.411188] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   11.411619] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   11.411981] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   11.412242] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   11.412789] head: 0200000000000003 ffffea00040ae001 00000000ffffffff 00000000ffffffff
[   11.413090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   11.413366] page dumped because: kasan: bad access detected
[   11.413639] 
[   11.413735] Memory state around the buggy address:
[   11.414081]  ffff888102b82f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.414304]  ffff888102b82f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.414630] >ffff888102b83000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.414953]                    ^
[   11.415065]  ffff888102b83080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.415370]  ffff888102b83100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.415715] ==================================================================

[   11.493099] ==================================================================
[   11.494191] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   11.494459] Read of size 1 at addr ffff888103833000 by task kunit_try_catch/157
[   11.494678] 
[   11.494783] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.494834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.494845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.494869] Call Trace:
[   11.494882]  <TASK>
[   11.494903]  dump_stack_lvl+0x73/0xb0
[   11.494934]  print_report+0xd1/0x610
[   11.494956]  ? __virt_addr_valid+0x1db/0x2d0
[   11.494980]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.495003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.495535]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.495671]  kasan_report+0x141/0x180
[   11.495697]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.495727]  __asan_report_load1_noabort+0x18/0x20
[   11.495751]  kmalloc_node_oob_right+0x369/0x3c0
[   11.495775]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   11.495799]  ? __schedule+0x10cc/0x2b60
[   11.495823]  ? __pfx_read_tsc+0x10/0x10
[   11.495845]  ? ktime_get_ts64+0x86/0x230
[   11.495871]  kunit_try_run_case+0x1a5/0x480
[   11.495897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.495919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.495943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.495966]  ? __kthread_parkme+0x82/0x180
[   11.495987]  ? preempt_count_sub+0x50/0x80
[   11.496021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.496203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.496228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.496251]  kthread+0x337/0x6f0
[   11.496271]  ? trace_preempt_on+0x20/0xc0
[   11.496295]  ? __pfx_kthread+0x10/0x10
[   11.496315]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.496336]  ? calculate_sigpending+0x7b/0xa0
[   11.496361]  ? __pfx_kthread+0x10/0x10
[   11.496381]  ret_from_fork+0x116/0x1d0
[   11.496400]  ? __pfx_kthread+0x10/0x10
[   11.496419]  ret_from_fork_asm+0x1a/0x30
[   11.496459]  </TASK>
[   11.496471] 
[   11.508449] Allocated by task 157:
[   11.508629]  kasan_save_stack+0x45/0x70
[   11.508860]  kasan_save_track+0x18/0x40
[   11.509128]  kasan_save_alloc_info+0x3b/0x50
[   11.509328]  __kasan_kmalloc+0xb7/0xc0
[   11.509555]  __kmalloc_cache_node_noprof+0x188/0x420
[   11.509784]  kmalloc_node_oob_right+0xab/0x3c0
[   11.510075]  kunit_try_run_case+0x1a5/0x480
[   11.510273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.510541]  kthread+0x337/0x6f0
[   11.510709]  ret_from_fork+0x116/0x1d0
[   11.510850]  ret_from_fork_asm+0x1a/0x30
[   11.510992] 
[   11.511311] The buggy address belongs to the object at ffff888103832000
[   11.511311]  which belongs to the cache kmalloc-4k of size 4096
[   11.511872] The buggy address is located 0 bytes to the right of
[   11.511872]  allocated 4096-byte region [ffff888103832000, ffff888103833000)
[   11.512465] 
[   11.512629] The buggy address belongs to the physical page:
[   11.512984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103830
[   11.513645] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.513961] flags: 0x200000000000040(head|node=0|zone=2)
[   11.514442] page_type: f5(slab)
[   11.514627] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   11.514961] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   11.515583] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   11.515870] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   11.516322] head: 0200000000000003 ffffea00040e0c01 00000000ffffffff 00000000ffffffff
[   11.516600] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   11.516946] page dumped because: kasan: bad access detected
[   11.517193] 
[   11.517287] Memory state around the buggy address:
[   11.517622]  ffff888103832f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.517942]  ffff888103832f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.518319] >ffff888103833000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.518640]                    ^
[   11.518793]  ffff888103833080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.519316]  ffff888103833100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.519675] ==================================================================

[   11.564667] ==================================================================
[   11.566117] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   11.566607] Read of size 1 at addr ffff888102b45000 by task kunit_try_catch/157
[   11.566844] 
[   11.566965] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.567116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.567128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.567152] Call Trace:
[   11.567165]  <TASK>
[   11.567186]  dump_stack_lvl+0x73/0xb0
[   11.567220]  print_report+0xd1/0x610
[   11.567242]  ? __virt_addr_valid+0x1db/0x2d0
[   11.567266]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.567289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.567311]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.567334]  kasan_report+0x141/0x180
[   11.567356]  ? kmalloc_node_oob_right+0x369/0x3c0
[   11.567384]  __asan_report_load1_noabort+0x18/0x20
[   11.567408]  kmalloc_node_oob_right+0x369/0x3c0
[   11.567432]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   11.567456]  ? __schedule+0x10cc/0x2b60
[   11.567478]  ? __pfx_read_tsc+0x10/0x10
[   11.567499]  ? ktime_get_ts64+0x86/0x230
[   11.567525]  kunit_try_run_case+0x1a5/0x480
[   11.567550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.567572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.567595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.567619]  ? __kthread_parkme+0x82/0x180
[   11.567640]  ? preempt_count_sub+0x50/0x80
[   11.567664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.567688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.567711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.567734]  kthread+0x337/0x6f0
[   11.567752]  ? trace_preempt_on+0x20/0xc0
[   11.567776]  ? __pfx_kthread+0x10/0x10
[   11.567795]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.567816]  ? calculate_sigpending+0x7b/0xa0
[   11.567840]  ? __pfx_kthread+0x10/0x10
[   11.567860]  ret_from_fork+0x116/0x1d0
[   11.567878]  ? __pfx_kthread+0x10/0x10
[   11.567913]  ret_from_fork_asm+0x1a/0x30
[   11.567946]  </TASK>
[   11.567957] 
[   11.583766] Allocated by task 157:
[   11.584380]  kasan_save_stack+0x45/0x70
[   11.584968]  kasan_save_track+0x18/0x40
[   11.585358]  kasan_save_alloc_info+0x3b/0x50
[   11.585584]  __kasan_kmalloc+0xb7/0xc0
[   11.586222]  __kmalloc_cache_node_noprof+0x188/0x420
[   11.586401]  kmalloc_node_oob_right+0xab/0x3c0
[   11.586839]  kunit_try_run_case+0x1a5/0x480
[   11.587591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.588156]  kthread+0x337/0x6f0
[   11.588542]  ret_from_fork+0x116/0x1d0
[   11.588714]  ret_from_fork_asm+0x1a/0x30
[   11.588888] 
[   11.589203] The buggy address belongs to the object at ffff888102b44000
[   11.589203]  which belongs to the cache kmalloc-4k of size 4096
[   11.590403] The buggy address is located 0 bytes to the right of
[   11.590403]  allocated 4096-byte region [ffff888102b44000, ffff888102b45000)
[   11.591567] 
[   11.591738] The buggy address belongs to the physical page:
[   11.592483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40
[   11.593222] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.593469] flags: 0x200000000000040(head|node=0|zone=2)
[   11.594240] page_type: f5(slab)
[   11.594629] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   11.595717] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   11.596735] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   11.597662] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   11.598586] head: 0200000000000003 ffffea00040ad001 00000000ffffffff 00000000ffffffff
[   11.599232] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   11.599482] page dumped because: kasan: bad access detected
[   11.600105] 
[   11.600266] Memory state around the buggy address:
[   11.600856]  ffff888102b44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.601577]  ffff888102b44f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.601846] >ffff888102b45000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.602510]                    ^
[   11.602865]  ffff888102b45080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.603623]  ffff888102b45100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.604139] ==================================================================