Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.541272] ==================================================================
[   16.541378] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   16.541442] Read of size 1 at addr fff00000c5acc05f by task kunit_try_catch/138
[   16.541502] 
[   16.541542] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.541622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.541650] Hardware name: linux,dummy-virt (DT)
[   16.541684] Call trace:
[   16.541706]  show_stack+0x20/0x38 (C)
[   16.541959]  dump_stack_lvl+0x8c/0xd0
[   16.542045]  print_report+0x118/0x5d0
[   16.542094]  kasan_report+0xdc/0x128
[   16.542359]  __asan_report_load1_noabort+0x20/0x30
[   16.542414]  kmalloc_oob_left+0x2ec/0x320
[   16.542460]  kunit_try_run_case+0x170/0x3f0
[   16.542508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.542559]  kthread+0x328/0x630
[   16.542811]  ret_from_fork+0x10/0x20
[   16.542903] 
[   16.543009] Allocated by task 24:
[   16.543188]  kasan_save_stack+0x3c/0x68
[   16.543333]  kasan_save_track+0x20/0x40
[   16.543500]  kasan_save_alloc_info+0x40/0x58
[   16.543561]  __kasan_kmalloc+0xd4/0xd8
[   16.543597]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.543656]  kvasprintf+0xe0/0x180
[   16.543692]  __kthread_create_on_node+0x16c/0x350
[   16.543995]  kthread_create_on_node+0xe4/0x130
[   16.544206]  create_worker+0x380/0x6b8
[   16.544380]  worker_thread+0x808/0xf38
[   16.544462]  kthread+0x328/0x630
[   16.544531]  ret_from_fork+0x10/0x20
[   16.544627] 
[   16.544728] The buggy address belongs to the object at fff00000c5acc040
[   16.544728]  which belongs to the cache kmalloc-16 of size 16
[   16.544890] The buggy address is located 19 bytes to the right of
[   16.544890]  allocated 12-byte region [fff00000c5acc040, fff00000c5acc04c)
[   16.544975] 
[   16.545026] The buggy address belongs to the physical page:
[   16.545058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105acc
[   16.545473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.545622] page_type: f5(slab)
[   16.545737] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.545880] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.546012] page dumped because: kasan: bad access detected
[   16.546110] 
[   16.546128] Memory state around the buggy address:
[   16.546160]  fff00000c5acbf00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   16.546344]  fff00000c5acbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.546741] >fff00000c5acc000: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[   16.546806]                                                     ^
[   16.547175]  fff00000c5acc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547262]  fff00000c5acc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547364] ==================================================================

[   16.264028] ==================================================================
[   16.264220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   16.264406] Read of size 1 at addr fff00000c5a02b7f by task kunit_try_catch/138
[   16.264675] 
[   16.264721] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.264810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.264907] Hardware name: linux,dummy-virt (DT)
[   16.264982] Call trace:
[   16.265004]  show_stack+0x20/0x38 (C)
[   16.265053]  dump_stack_lvl+0x8c/0xd0
[   16.265099]  print_report+0x118/0x5d0
[   16.265144]  kasan_report+0xdc/0x128
[   16.265190]  __asan_report_load1_noabort+0x20/0x30
[   16.265241]  kmalloc_oob_left+0x2ec/0x320
[   16.265286]  kunit_try_run_case+0x170/0x3f0
[   16.265344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.265396]  kthread+0x328/0x630
[   16.265661]  ret_from_fork+0x10/0x20
[   16.265734] 
[   16.265752] Allocated by task 24:
[   16.265790]  kasan_save_stack+0x3c/0x68
[   16.265831]  kasan_save_track+0x20/0x40
[   16.265868]  kasan_save_alloc_info+0x40/0x58
[   16.265910]  __kasan_kmalloc+0xd4/0xd8
[   16.265946]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.266006]  kvasprintf+0xe0/0x180
[   16.266041]  __kthread_create_on_node+0x16c/0x350
[   16.266180]  kthread_create_on_node+0xe4/0x130
[   16.266219]  create_worker+0x380/0x6b8
[   16.266254]  worker_thread+0x808/0xf38
[   16.266317]  kthread+0x328/0x630
[   16.266518]  ret_from_fork+0x10/0x20
[   16.266653] 
[   16.266672] The buggy address belongs to the object at fff00000c5a02b60
[   16.266672]  which belongs to the cache kmalloc-16 of size 16
[   16.266745] The buggy address is located 19 bytes to the right of
[   16.266745]  allocated 12-byte region [fff00000c5a02b60, fff00000c5a02b6c)
[   16.266827] 
[   16.266908] The buggy address belongs to the physical page:
[   16.266955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.267068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.267136] page_type: f5(slab)
[   16.267202] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.267780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.267827] page dumped because: kasan: bad access detected
[   16.267858] 
[   16.267875] Memory state around the buggy address:
[   16.267907]  fff00000c5a02a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc
[   16.268250]  fff00000c5a02a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.268348] >fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.268385]                                                                 ^
[   16.268424]  fff00000c5a02b80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.268519]  fff00000c5a02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.268738] ==================================================================

[   16.275011] ==================================================================
[   16.275069] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   16.275150] Read of size 1 at addr fff00000c5755ddf by task kunit_try_catch/138
[   16.275199] 
[   16.275245] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.275324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.275349] Hardware name: linux,dummy-virt (DT)
[   16.275380] Call trace:
[   16.275402]  show_stack+0x20/0x38 (C)
[   16.275554]  dump_stack_lvl+0x8c/0xd0
[   16.275608]  print_report+0x118/0x5d0
[   16.275653]  kasan_report+0xdc/0x128
[   16.275697]  __asan_report_load1_noabort+0x20/0x30
[   16.275757]  kmalloc_oob_left+0x2ec/0x320
[   16.275801]  kunit_try_run_case+0x170/0x3f0
[   16.275849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.275900]  kthread+0x328/0x630
[   16.275951]  ret_from_fork+0x10/0x20
[   16.275997] 
[   16.276014] Allocated by task 10:
[   16.276042]  kasan_save_stack+0x3c/0x68
[   16.276081]  kasan_save_track+0x20/0x40
[   16.276127]  kasan_save_alloc_info+0x40/0x58
[   16.276176]  __kasan_kmalloc+0xd4/0xd8
[   16.276297]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.276489]  kvasprintf+0xe0/0x180
[   16.276596]  __kthread_create_on_node+0x16c/0x350
[   16.276639]  kthread_create_on_node+0xe4/0x130
[   16.276675]  create_worker+0x380/0x6b8
[   16.277036]  worker_thread+0x808/0xf38
[   16.277299]  kthread+0x328/0x630
[   16.277349]  ret_from_fork+0x10/0x20
[   16.277401] 
[   16.277421] The buggy address belongs to the object at fff00000c5755dc0
[   16.277421]  which belongs to the cache kmalloc-16 of size 16
[   16.277479] The buggy address is located 19 bytes to the right of
[   16.277479]  allocated 12-byte region [fff00000c5755dc0, fff00000c5755dcc)
[   16.277879] 
[   16.277903] The buggy address belongs to the physical page:
[   16.277932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105755
[   16.277985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.278181] page_type: f5(slab)
[   16.278290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.278339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.278429] page dumped because: kasan: bad access detected
[   16.278477] 
[   16.278494] Memory state around the buggy address:
[   16.278637]  fff00000c5755c80: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc
[   16.278751]  fff00000c5755d00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.278822] >fff00000c5755d80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[   16.278858]                                                     ^
[   16.278896]  fff00000c5755e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.278937]  fff00000c5755e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.278973] ==================================================================

[   11.355224] ==================================================================
[   11.355905] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   11.356200] Read of size 1 at addr ffff8881016842bf by task kunit_try_catch/156
[   11.356923] 
[   11.357053] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.357103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.357115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.357141] Call Trace:
[   11.357154]  <TASK>
[   11.357171]  dump_stack_lvl+0x73/0xb0
[   11.357203]  print_report+0xd1/0x610
[   11.357225]  ? __virt_addr_valid+0x1db/0x2d0
[   11.357248]  ? kmalloc_oob_left+0x361/0x3c0
[   11.357268]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.357291]  ? kmalloc_oob_left+0x361/0x3c0
[   11.357312]  kasan_report+0x141/0x180
[   11.357333]  ? kmalloc_oob_left+0x361/0x3c0
[   11.357360]  __asan_report_load1_noabort+0x18/0x20
[   11.357384]  kmalloc_oob_left+0x361/0x3c0
[   11.357405]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   11.357465]  ? __schedule+0x10cc/0x2b60
[   11.357488]  ? __pfx_read_tsc+0x10/0x10
[   11.357509]  ? ktime_get_ts64+0x86/0x230
[   11.357534]  kunit_try_run_case+0x1a5/0x480
[   11.357559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.357581]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.357604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.357645]  ? __kthread_parkme+0x82/0x180
[   11.357665]  ? preempt_count_sub+0x50/0x80
[   11.357690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.357713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.357736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.357760]  kthread+0x337/0x6f0
[   11.357779]  ? trace_preempt_on+0x20/0xc0
[   11.357801]  ? __pfx_kthread+0x10/0x10
[   11.357821]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.357842]  ? calculate_sigpending+0x7b/0xa0
[   11.357866]  ? __pfx_kthread+0x10/0x10
[   11.357886]  ret_from_fork+0x116/0x1d0
[   11.357904]  ? __pfx_kthread+0x10/0x10
[   11.357924]  ret_from_fork_asm+0x1a/0x30
[   11.357956]  </TASK>
[   11.357967] 
[   11.365811] Allocated by task 41:
[   11.366025]  kasan_save_stack+0x45/0x70
[   11.366224]  kasan_save_track+0x18/0x40
[   11.366398]  kasan_save_alloc_info+0x3b/0x50
[   11.366788]  __kasan_kmalloc+0xb7/0xc0
[   11.366932]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.367195]  kvasprintf+0xc5/0x150
[   11.367392]  kasprintf+0xb6/0xf0
[   11.367702]  input_devnode+0x46/0x80
[   11.367904]  device_get_devnode+0x145/0x2a0
[   11.368110]  dev_uevent+0x41c/0x730
[   11.368301]  kobject_uevent_env+0x50d/0xff0
[   11.368587]  kobject_uevent+0xf/0x20
[   11.368775]  device_add+0xe4c/0x1820
[   11.368905]  cdev_device_add+0xab/0x1c0
[   11.369190]  evdev_connect+0x356/0x480
[   11.369408]  input_attach_handler.isra.0+0x117/0x1f0
[   11.369667]  input_register_device+0x722/0xe10
[   11.369875]  psmouse_connect+0x6ed/0xe30
[   11.370119]  serio_driver_probe+0x7a/0xb0
[   11.370377]  really_probe+0x1d4/0x920
[   11.370575]  __driver_probe_device+0x18f/0x3e0
[   11.370757]  driver_probe_device+0x4f/0x130
[   11.370895]  __driver_attach+0x1eb/0x4b0
[   11.371026]  bus_for_each_dev+0x10f/0x1a0
[   11.371376]  driver_attach+0x41/0x60
[   11.371713]  serio_handle_event+0x254/0x940
[   11.371944]  process_one_work+0x5ee/0xf60
[   11.372166]  worker_thread+0x758/0x1220
[   11.372376]  kthread+0x337/0x6f0
[   11.372625]  ret_from_fork+0x116/0x1d0
[   11.372758]  ret_from_fork_asm+0x1a/0x30
[   11.372935] 
[   11.373076] Freed by task 41:
[   11.373255]  kasan_save_stack+0x45/0x70
[   11.373480]  kasan_save_track+0x18/0x40
[   11.373713]  kasan_save_free_info+0x3f/0x60
[   11.373922]  __kasan_slab_free+0x56/0x70
[   11.374097]  kfree+0x222/0x3f0
[   11.374255]  dev_uevent+0x466/0x730
[   11.374481]  kobject_uevent_env+0x50d/0xff0
[   11.374715]  kobject_uevent+0xf/0x20
[   11.374865]  device_add+0xe4c/0x1820
[   11.375041]  cdev_device_add+0xab/0x1c0
[   11.375246]  evdev_connect+0x356/0x480
[   11.375493]  input_attach_handler.isra.0+0x117/0x1f0
[   11.375731]  input_register_device+0x722/0xe10
[   11.375933]  psmouse_connect+0x6ed/0xe30
[   11.376116]  serio_driver_probe+0x7a/0xb0
[   11.376321]  really_probe+0x1d4/0x920
[   11.376560]  __driver_probe_device+0x18f/0x3e0
[   11.376795]  driver_probe_device+0x4f/0x130
[   11.376982]  __driver_attach+0x1eb/0x4b0
[   11.377166]  bus_for_each_dev+0x10f/0x1a0
[   11.377372]  driver_attach+0x41/0x60
[   11.377631]  serio_handle_event+0x254/0x940
[   11.377836]  process_one_work+0x5ee/0xf60
[   11.378014]  worker_thread+0x758/0x1220
[   11.378203]  kthread+0x337/0x6f0
[   11.378367]  ret_from_fork+0x116/0x1d0
[   11.378805]  ret_from_fork_asm+0x1a/0x30
[   11.378987] 
[   11.379076] The buggy address belongs to the object at ffff8881016842a0
[   11.379076]  which belongs to the cache kmalloc-16 of size 16
[   11.379684] The buggy address is located 15 bytes to the right of
[   11.379684]  allocated 16-byte region [ffff8881016842a0, ffff8881016842b0)
[   11.380220] 
[   11.380319] The buggy address belongs to the physical page:
[   11.380680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   11.380996] flags: 0x200000000000000(node=0|zone=2)
[   11.381206] page_type: f5(slab)
[   11.381382] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   11.381851] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   11.382131] page dumped because: kasan: bad access detected
[   11.382387] 
[   11.382493] Memory state around the buggy address:
[   11.382717]  ffff888101684180: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   11.383023]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   11.383355] >ffff888101684280: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   11.383847]                                         ^
[   11.384101]  ffff888101684300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.384399]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.384724] ==================================================================

[   11.461510] ==================================================================
[   11.462453] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   11.462860] Read of size 1 at addr ffff888101be2e3f by task kunit_try_catch/155
[   11.463719] 
[   11.463855] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.463904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.463916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.463938] Call Trace:
[   11.463952]  <TASK>
[   11.463971]  dump_stack_lvl+0x73/0xb0
[   11.464182]  print_report+0xd1/0x610
[   11.464210]  ? __virt_addr_valid+0x1db/0x2d0
[   11.464309]  ? kmalloc_oob_left+0x361/0x3c0
[   11.464333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.464358]  ? kmalloc_oob_left+0x361/0x3c0
[   11.464391]  kasan_report+0x141/0x180
[   11.464475]  ? kmalloc_oob_left+0x361/0x3c0
[   11.464505]  __asan_report_load1_noabort+0x18/0x20
[   11.464531]  kmalloc_oob_left+0x361/0x3c0
[   11.464552]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   11.464574]  ? __schedule+0x10cc/0x2b60
[   11.464598]  ? __pfx_read_tsc+0x10/0x10
[   11.464618]  ? ktime_get_ts64+0x86/0x230
[   11.464642]  kunit_try_run_case+0x1a5/0x480
[   11.464668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.464692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.464718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.464740]  ? __kthread_parkme+0x82/0x180
[   11.464761]  ? preempt_count_sub+0x50/0x80
[   11.464785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.464808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.464831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.464859]  kthread+0x337/0x6f0
[   11.464877]  ? trace_preempt_on+0x20/0xc0
[   11.464900]  ? __pfx_kthread+0x10/0x10
[   11.464919]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.464940]  ? calculate_sigpending+0x7b/0xa0
[   11.464963]  ? __pfx_kthread+0x10/0x10
[   11.464983]  ret_from_fork+0x116/0x1d0
[   11.465041]  ? __pfx_kthread+0x10/0x10
[   11.465062]  ret_from_fork_asm+0x1a/0x30
[   11.465092]  </TASK>
[   11.465103] 
[   11.474699] Allocated by task 1:
[   11.474930]  kasan_save_stack+0x45/0x70
[   11.475123]  kasan_save_track+0x18/0x40
[   11.475259]  kasan_save_alloc_info+0x3b/0x50
[   11.475408]  __kasan_kmalloc+0xb7/0xc0
[   11.475540]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.475799]  kvasprintf+0xc5/0x150
[   11.476049]  __kthread_create_on_node+0x18b/0x3a0
[   11.476284]  kthread_create_on_node+0xab/0xe0
[   11.476492]  create_worker+0x3e5/0x7b0
[   11.476642]  alloc_unbound_pwq+0x8ea/0xdb0
[   11.476791]  apply_wqattrs_prepare+0x332/0xd20
[   11.476953]  apply_workqueue_attrs_locked+0x4d/0xa0
[   11.477450]  alloc_workqueue+0xcc7/0x1ad0
[   11.477788]  latency_fsnotify_init+0x1b/0x50
[   11.477946]  do_one_initcall+0xd8/0x370
[   11.478149]  kernel_init_freeable+0x420/0x6f0
[   11.478302]  kernel_init+0x23/0x1e0
[   11.478427]  ret_from_fork+0x116/0x1d0
[   11.478559]  ret_from_fork_asm+0x1a/0x30
[   11.478717] 
[   11.478851] The buggy address belongs to the object at ffff888101be2e20
[   11.478851]  which belongs to the cache kmalloc-16 of size 16
[   11.479653] The buggy address is located 18 bytes to the right of
[   11.479653]  allocated 13-byte region [ffff888101be2e20, ffff888101be2e2d)
[   11.481763] 
[   11.482000] The buggy address belongs to the physical page:
[   11.482333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101be2
[   11.483302] flags: 0x200000000000000(node=0|zone=2)
[   11.483551] page_type: f5(slab)
[   11.483717] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   11.484039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   11.484744] page dumped because: kasan: bad access detected
[   11.485125] 
[   11.485217] Memory state around the buggy address:
[   11.485428]  ffff888101be2d00: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   11.485716]  ffff888101be2d80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   11.486004] >ffff888101be2e00: fa fb fc fc 00 05 fc fc 00 07 fc fc fc fc fc fc
[   11.486843]                                         ^
[   11.487599]  ffff888101be2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.488091]  ffff888101be2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.488707] ==================================================================

[   11.529827] ==================================================================
[   11.531171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   11.531875] Read of size 1 at addr ffff88810283717f by task kunit_try_catch/155
[   11.532541] 
[   11.532643] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.532690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.532701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.532724] Call Trace:
[   11.532738]  <TASK>
[   11.532757]  dump_stack_lvl+0x73/0xb0
[   11.532790]  print_report+0xd1/0x610
[   11.532813]  ? __virt_addr_valid+0x1db/0x2d0
[   11.532838]  ? kmalloc_oob_left+0x361/0x3c0
[   11.532858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.532881]  ? kmalloc_oob_left+0x361/0x3c0
[   11.532916]  kasan_report+0x141/0x180
[   11.532938]  ? kmalloc_oob_left+0x361/0x3c0
[   11.532965]  __asan_report_load1_noabort+0x18/0x20
[   11.532999]  kmalloc_oob_left+0x361/0x3c0
[   11.533020]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   11.533042]  ? __schedule+0x10cc/0x2b60
[   11.533065]  ? __pfx_read_tsc+0x10/0x10
[   11.533087]  ? ktime_get_ts64+0x86/0x230
[   11.533114]  kunit_try_run_case+0x1a5/0x480
[   11.533163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.533185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.533210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.533233]  ? __kthread_parkme+0x82/0x180
[   11.533254]  ? preempt_count_sub+0x50/0x80
[   11.533279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.533302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.533326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.533349]  kthread+0x337/0x6f0
[   11.533368]  ? trace_preempt_on+0x20/0xc0
[   11.533392]  ? __pfx_kthread+0x10/0x10
[   11.533412]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.533433]  ? calculate_sigpending+0x7b/0xa0
[   11.533457]  ? __pfx_kthread+0x10/0x10
[   11.533478]  ret_from_fork+0x116/0x1d0
[   11.533497]  ? __pfx_kthread+0x10/0x10
[   11.533516]  ret_from_fork_asm+0x1a/0x30
[   11.533549]  </TASK>
[   11.533560] 
[   11.548740] Allocated by task 1:
[   11.548886]  kasan_save_stack+0x45/0x70
[   11.549061]  kasan_save_track+0x18/0x40
[   11.549196]  kasan_save_alloc_info+0x3b/0x50
[   11.549345]  __kasan_kmalloc+0xb7/0xc0
[   11.549477]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   11.549659]  kvasprintf+0xc5/0x150
[   11.549783]  __kthread_create_on_node+0x18b/0x3a0
[   11.550073]  kthread_create_on_node+0xab/0xe0
[   11.550444]  create_worker+0x3e5/0x7b0
[   11.550782]  alloc_unbound_pwq+0x8ea/0xdb0
[   11.551167]  apply_wqattrs_prepare+0x332/0xd20
[   11.551564]  apply_workqueue_attrs_locked+0x4d/0xa0
[   11.552006]  alloc_workqueue+0xcc7/0x1ad0
[   11.552424]  latency_fsnotify_init+0x1b/0x50
[   11.552819]  do_one_initcall+0xd8/0x370
[   11.553223]  kernel_init_freeable+0x420/0x6f0
[   11.553710]  kernel_init+0x23/0x1e0
[   11.554079]  ret_from_fork+0x116/0x1d0
[   11.554428]  ret_from_fork_asm+0x1a/0x30
[   11.554779] 
[   11.554948] The buggy address belongs to the object at ffff888102837160
[   11.554948]  which belongs to the cache kmalloc-16 of size 16
[   11.555978] The buggy address is located 18 bytes to the right of
[   11.555978]  allocated 13-byte region [ffff888102837160, ffff88810283716d)
[   11.556420] 
[   11.556499] The buggy address belongs to the physical page:
[   11.556680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   11.556959] flags: 0x200000000000000(node=0|zone=2)
[   11.557423] page_type: f5(slab)
[   11.557774] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   11.558266] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   11.558496] page dumped because: kasan: bad access detected
[   11.558667] 
[   11.558735] Memory state around the buggy address:
[   11.558905]  ffff888102837000: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   11.559242]  ffff888102837080: 00 04 fc fc 00 04 fc fc 00 05 fc fc 00 05 fc fc
[   11.559506] >ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   11.559789]                                                                 ^
[   11.560119]  ffff888102837180: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.560435]  ffff888102837200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.560718] ==================================================================