Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   22.584663] ==================================================================
[   22.585091] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   22.585222] Write of size 1 at addr fff00000c413ca78 by task kunit_try_catch/138
[   22.586964] 
[   22.587279] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.588635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.588962] Hardware name: linux,dummy-virt (DT)
[   22.589179] Call trace:
[   22.589332]  show_stack+0x20/0x38 (C)
[   22.589718]  dump_stack_lvl+0x8c/0xd0
[   22.589838]  print_report+0x118/0x608
[   22.589965]  kasan_report+0xdc/0x128
[   22.591310]  __asan_report_store1_noabort+0x20/0x30
[   22.591755]  kmalloc_oob_right+0x538/0x660
[   22.592017]  kunit_try_run_case+0x170/0x3f0
[   22.592508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.592684]  kthread+0x328/0x630
[   22.592819]  ret_from_fork+0x10/0x20
[   22.592961] 
[   22.593246] Allocated by task 138:
[   22.593589]  kasan_save_stack+0x3c/0x68
[   22.593721]  kasan_save_track+0x20/0x40
[   22.594191]  kasan_save_alloc_info+0x40/0x58
[   22.594419]  __kasan_kmalloc+0xd4/0xd8
[   22.594516]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.594616]  kmalloc_oob_right+0xb0/0x660
[   22.594705]  kunit_try_run_case+0x170/0x3f0
[   22.594842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.595925]  kthread+0x328/0x630
[   22.596065]  ret_from_fork+0x10/0x20
[   22.596181] 
[   22.596228] The buggy address belongs to the object at fff00000c413ca00
[   22.596228]  which belongs to the cache kmalloc-128 of size 128
[   22.596392] The buggy address is located 5 bytes to the right of
[   22.596392]  allocated 115-byte region [fff00000c413ca00, fff00000c413ca73)
[   22.596559] 
[   22.596625] The buggy address belongs to the physical page:
[   22.596719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413c
[   22.597029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.598960] page_type: f5(slab)
[   22.599098] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.599259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.599358] page dumped because: kasan: bad access detected
[   22.599952] 
[   22.600147] Memory state around the buggy address:
[   22.600295]  fff00000c413c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.600491]  fff00000c413c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.600606] >fff00000c413ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.600693]                                                                 ^
[   22.600791]  fff00000c413ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.600895]  fff00000c413cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.601002] ==================================================================
[   22.574645] ==================================================================
[   22.575062] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   22.576384] Write of size 1 at addr fff00000c413ca73 by task kunit_try_catch/138
[   22.576582] 
[   22.577526] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc3 #1 PREEMPT 
[   22.577701] Tainted: [N]=TEST
[   22.577745] Hardware name: linux,dummy-virt (DT)
[   22.578038] Call trace:
[   22.578221]  show_stack+0x20/0x38 (C)
[   22.578388]  dump_stack_lvl+0x8c/0xd0
[   22.578471]  print_report+0x118/0x608
[   22.578532]  kasan_report+0xdc/0x128
[   22.578586]  __asan_report_store1_noabort+0x20/0x30
[   22.578646]  kmalloc_oob_right+0x5a4/0x660
[   22.578702]  kunit_try_run_case+0x170/0x3f0
[   22.578764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.578827]  kthread+0x328/0x630
[   22.578884]  ret_from_fork+0x10/0x20
[   22.579095] 
[   22.579146] Allocated by task 138:
[   22.579313]  kasan_save_stack+0x3c/0x68
[   22.579400]  kasan_save_track+0x20/0x40
[   22.579449]  kasan_save_alloc_info+0x40/0x58
[   22.579497]  __kasan_kmalloc+0xd4/0xd8
[   22.579539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.579654]  kmalloc_oob_right+0xb0/0x660
[   22.579771]  kunit_try_run_case+0x170/0x3f0
[   22.579867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.579990]  kthread+0x328/0x630
[   22.580076]  ret_from_fork+0x10/0x20
[   22.580205] 
[   22.580283] The buggy address belongs to the object at fff00000c413ca00
[   22.580283]  which belongs to the cache kmalloc-128 of size 128
[   22.580400] The buggy address is located 0 bytes to the right of
[   22.580400]  allocated 115-byte region [fff00000c413ca00, fff00000c413ca73)
[   22.580482] 
[   22.580581] The buggy address belongs to the physical page:
[   22.580826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413c
[   22.581181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.581522] page_type: f5(slab)
[   22.581870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.581966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.582105] page dumped because: kasan: bad access detected
[   22.582162] 
[   22.582198] Memory state around the buggy address:
[   22.582451]  fff00000c413c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.582536]  fff00000c413c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.582605] >fff00000c413ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.582674]                                                              ^
[   22.582772]  fff00000c413ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.582823]  fff00000c413cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.582900] ==================================================================
[   22.602800] ==================================================================
[   22.602904] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   22.603044] Read of size 1 at addr fff00000c413ca80 by task kunit_try_catch/138
[   22.603156] 
[   22.603229] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.603410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.603472] Hardware name: linux,dummy-virt (DT)
[   22.603600] Call trace:
[   22.603678]  show_stack+0x20/0x38 (C)
[   22.604023]  dump_stack_lvl+0x8c/0xd0
[   22.604518]  print_report+0x118/0x608
[   22.604678]  kasan_report+0xdc/0x128
[   22.604813]  __asan_report_load1_noabort+0x20/0x30
[   22.604974]  kmalloc_oob_right+0x5d0/0x660
[   22.605116]  kunit_try_run_case+0x170/0x3f0
[   22.605247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.605375]  kthread+0x328/0x630
[   22.605486]  ret_from_fork+0x10/0x20
[   22.605590] 
[   22.605635] Allocated by task 138:
[   22.605702]  kasan_save_stack+0x3c/0x68
[   22.605788]  kasan_save_track+0x20/0x40
[   22.605873]  kasan_save_alloc_info+0x40/0x58
[   22.606863]  __kasan_kmalloc+0xd4/0xd8
[   22.607037]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.607145]  kmalloc_oob_right+0xb0/0x660
[   22.607287]  kunit_try_run_case+0x170/0x3f0
[   22.607589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.607727]  kthread+0x328/0x630
[   22.608110]  ret_from_fork+0x10/0x20
[   22.608261] 
[   22.608313] The buggy address belongs to the object at fff00000c413ca00
[   22.608313]  which belongs to the cache kmalloc-128 of size 128
[   22.608456] The buggy address is located 13 bytes to the right of
[   22.608456]  allocated 115-byte region [fff00000c413ca00, fff00000c413ca73)
[   22.608796] 
[   22.608952] The buggy address belongs to the physical page:
[   22.609027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413c
[   22.609152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.609265] page_type: f5(slab)
[   22.609350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.609464] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.609556] page dumped because: kasan: bad access detected
[   22.609626] 
[   22.609669] Memory state around the buggy address:
[   22.609739]  fff00000c413c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.609881]  fff00000c413ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.610302] >fff00000c413ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.610455]                    ^
[   22.610693]  fff00000c413cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.611121]  fff00000c413cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.611348] ==================================================================

[   10.841889] ==================================================================
[   10.842558] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   10.843240] Write of size 1 at addr ffff888102734b73 by task kunit_try_catch/156
[   10.843691] 
[   10.844629] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   10.844973] Tainted: [N]=TEST
[   10.845004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.845235] Call Trace:
[   10.845301]  <TASK>
[   10.845465]  dump_stack_lvl+0x73/0xb0
[   10.845551]  print_report+0xd1/0x650
[   10.845579]  ? __virt_addr_valid+0x1db/0x2d0
[   10.845603]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.845624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.845646]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.845668]  kasan_report+0x141/0x180
[   10.845690]  ? kmalloc_oob_right+0x6f0/0x7f0
[   10.845716]  __asan_report_store1_noabort+0x1b/0x30
[   10.845737]  kmalloc_oob_right+0x6f0/0x7f0
[   10.845759]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.845787]  ? __schedule+0x10cc/0x2b30
[   10.845811]  ? __pfx_read_tsc+0x10/0x10
[   10.845831]  ? ktime_get_ts64+0x86/0x230
[   10.845858]  kunit_try_run_case+0x1a5/0x480
[   10.845884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.845905]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.845928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.845951]  ? __kthread_parkme+0x82/0x180
[   10.845973]  ? preempt_count_sub+0x50/0x80
[   10.845999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.846021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.846043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.846065]  kthread+0x337/0x6f0
[   10.846085]  ? trace_preempt_on+0x20/0xc0
[   10.846110]  ? __pfx_kthread+0x10/0x10
[   10.846131]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.846152]  ? calculate_sigpending+0x7b/0xa0
[   10.846174]  ? __pfx_kthread+0x10/0x10
[   10.846195]  ret_from_fork+0x41/0x80
[   10.846215]  ? __pfx_kthread+0x10/0x10
[   10.846236]  ret_from_fork_asm+0x1a/0x30
[   10.846291]  </TASK>
[   10.846366] 
[   10.856087] Allocated by task 156:
[   10.856658]  kasan_save_stack+0x45/0x70
[   10.856892]  kasan_save_track+0x18/0x40
[   10.857075]  kasan_save_alloc_info+0x3b/0x50
[   10.857542]  __kasan_kmalloc+0xb7/0xc0
[   10.857800]  __kmalloc_cache_noprof+0x189/0x420
[   10.858112]  kmalloc_oob_right+0xa9/0x7f0
[   10.858303]  kunit_try_run_case+0x1a5/0x480
[   10.858654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.858949]  kthread+0x337/0x6f0
[   10.859105]  ret_from_fork+0x41/0x80
[   10.859442]  ret_from_fork_asm+0x1a/0x30
[   10.859813] 
[   10.859969] The buggy address belongs to the object at ffff888102734b00
[   10.859969]  which belongs to the cache kmalloc-128 of size 128
[   10.860871] The buggy address is located 0 bytes to the right of
[   10.860871]  allocated 115-byte region [ffff888102734b00, ffff888102734b73)
[   10.861434] 
[   10.861614] The buggy address belongs to the physical page:
[   10.862237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102734
[   10.862975] flags: 0x200000000000000(node=0|zone=2)
[   10.863724] page_type: f5(slab)
[   10.864264] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.864786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.865183] page dumped because: kasan: bad access detected
[   10.865547] 
[   10.865638] Memory state around the buggy address:
[   10.866089]  ffff888102734a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.866724]  ffff888102734a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.867036] >ffff888102734b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.867310]                                                              ^
[   10.867761]  ffff888102734b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.868046]  ffff888102734c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.868396] ==================================================================
[   10.888083] ==================================================================
[   10.888354] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   10.888665] Read of size 1 at addr ffff888102734b80 by task kunit_try_catch/156
[   10.888997] 
[   10.889104] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   10.889197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.889210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.889244] Call Trace:
[   10.889259]  <TASK>
[   10.889273]  dump_stack_lvl+0x73/0xb0
[   10.889297]  print_report+0xd1/0x650
[   10.889318]  ? __virt_addr_valid+0x1db/0x2d0
[   10.889349]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.889369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.889426]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.889449]  kasan_report+0x141/0x180
[   10.889471]  ? kmalloc_oob_right+0x68a/0x7f0
[   10.889498]  __asan_report_load1_noabort+0x18/0x20
[   10.889518]  kmalloc_oob_right+0x68a/0x7f0
[   10.889540]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.889562]  ? __schedule+0x10cc/0x2b30
[   10.889585]  ? __pfx_read_tsc+0x10/0x10
[   10.889603]  ? ktime_get_ts64+0x86/0x230
[   10.889627]  kunit_try_run_case+0x1a5/0x480
[   10.889649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.889670]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.889692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.889715]  ? __kthread_parkme+0x82/0x180
[   10.889736]  ? preempt_count_sub+0x50/0x80
[   10.889760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.889791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.889812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.889834]  kthread+0x337/0x6f0
[   10.889854]  ? trace_preempt_on+0x20/0xc0
[   10.889876]  ? __pfx_kthread+0x10/0x10
[   10.889898]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.889919]  ? calculate_sigpending+0x7b/0xa0
[   10.889940]  ? __pfx_kthread+0x10/0x10
[   10.889961]  ret_from_fork+0x41/0x80
[   10.889981]  ? __pfx_kthread+0x10/0x10
[   10.890002]  ret_from_fork_asm+0x1a/0x30
[   10.890032]  </TASK>
[   10.890042] 
[   10.897414] Allocated by task 156:
[   10.897588]  kasan_save_stack+0x45/0x70
[   10.897799]  kasan_save_track+0x18/0x40
[   10.897992]  kasan_save_alloc_info+0x3b/0x50
[   10.898196]  __kasan_kmalloc+0xb7/0xc0
[   10.898555]  __kmalloc_cache_noprof+0x189/0x420
[   10.898798]  kmalloc_oob_right+0xa9/0x7f0
[   10.898997]  kunit_try_run_case+0x1a5/0x480
[   10.899207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.899410]  kthread+0x337/0x6f0
[   10.899532]  ret_from_fork+0x41/0x80
[   10.899731]  ret_from_fork_asm+0x1a/0x30
[   10.899935] 
[   10.900030] The buggy address belongs to the object at ffff888102734b00
[   10.900030]  which belongs to the cache kmalloc-128 of size 128
[   10.900583] The buggy address is located 13 bytes to the right of
[   10.900583]  allocated 115-byte region [ffff888102734b00, ffff888102734b73)
[   10.901069] 
[   10.901209] The buggy address belongs to the physical page:
[   10.901571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102734
[   10.901902] flags: 0x200000000000000(node=0|zone=2)
[   10.902086] page_type: f5(slab)
[   10.902295] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.902531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.902751] page dumped because: kasan: bad access detected
[   10.902979] 
[   10.903242] Memory state around the buggy address:
[   10.903601]  ffff888102734a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.903919]  ffff888102734b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.904362] >ffff888102734b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.904681]                    ^
[   10.904852]  ffff888102734c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.905142]  ffff888102734c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.905373] ==================================================================
[   10.869393] ==================================================================
[   10.869670] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   10.870242] Write of size 1 at addr ffff888102734b78 by task kunit_try_catch/156
[   10.870794] 
[   10.870897] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   10.870939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.870950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.870968] Call Trace:
[   10.870978]  <TASK>
[   10.870991]  dump_stack_lvl+0x73/0xb0
[   10.871015]  print_report+0xd1/0x650
[   10.871036]  ? __virt_addr_valid+0x1db/0x2d0
[   10.871057]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.871078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   10.871099]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.871120]  kasan_report+0x141/0x180
[   10.871158]  ? kmalloc_oob_right+0x6bd/0x7f0
[   10.871184]  __asan_report_store1_noabort+0x1b/0x30
[   10.871204]  kmalloc_oob_right+0x6bd/0x7f0
[   10.871226]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.871248]  ? __schedule+0x10cc/0x2b30
[   10.871270]  ? __pfx_read_tsc+0x10/0x10
[   10.871289]  ? ktime_get_ts64+0x86/0x230
[   10.871313]  kunit_try_run_case+0x1a5/0x480
[   10.871348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.871369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.871458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.871486]  ? __kthread_parkme+0x82/0x180
[   10.871507]  ? preempt_count_sub+0x50/0x80
[   10.871531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.871554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.871576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.871598]  kthread+0x337/0x6f0
[   10.871617]  ? trace_preempt_on+0x20/0xc0
[   10.871640]  ? __pfx_kthread+0x10/0x10
[   10.871661]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.871682]  ? calculate_sigpending+0x7b/0xa0
[   10.871703]  ? __pfx_kthread+0x10/0x10
[   10.871724]  ret_from_fork+0x41/0x80
[   10.871744]  ? __pfx_kthread+0x10/0x10
[   10.871766]  ret_from_fork_asm+0x1a/0x30
[   10.871796]  </TASK>
[   10.871806] 
[   10.879165] Allocated by task 156:
[   10.879347]  kasan_save_stack+0x45/0x70
[   10.879633]  kasan_save_track+0x18/0x40
[   10.879818]  kasan_save_alloc_info+0x3b/0x50
[   10.879961]  __kasan_kmalloc+0xb7/0xc0
[   10.880092]  __kmalloc_cache_noprof+0x189/0x420
[   10.880245]  kmalloc_oob_right+0xa9/0x7f0
[   10.880452]  kunit_try_run_case+0x1a5/0x480
[   10.880658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.880904]  kthread+0x337/0x6f0
[   10.881074]  ret_from_fork+0x41/0x80
[   10.881369]  ret_from_fork_asm+0x1a/0x30
[   10.881506] 
[   10.881574] The buggy address belongs to the object at ffff888102734b00
[   10.881574]  which belongs to the cache kmalloc-128 of size 128
[   10.882641] The buggy address is located 5 bytes to the right of
[   10.882641]  allocated 115-byte region [ffff888102734b00, ffff888102734b73)
[   10.883029] 
[   10.883101] The buggy address belongs to the physical page:
[   10.883542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102734
[   10.883898] flags: 0x200000000000000(node=0|zone=2)
[   10.884128] page_type: f5(slab)
[   10.884280] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   10.884634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.884931] page dumped because: kasan: bad access detected
[   10.885100] 
[   10.885168] Memory state around the buggy address:
[   10.885319]  ffff888102734a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.885647]  ffff888102734a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.885965] >ffff888102734b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.886221]                                                                 ^
[   10.886439]  ffff888102734b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.887069]  ffff888102734c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.887634] ==================================================================

[   20.628685] ==================================================================
[   20.629366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   20.630026] Write of size 1 at addr ffff00000c9cff73 by task kunit_try_catch/190
[   20.630714] 
[   20.630880] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc3 #1 PREEMPT 
[   20.630926] Tainted: [N]=TEST
[   20.630938] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.630955] Call trace:
[   20.630967]  show_stack+0x20/0x38 (C)
[   20.631001]  dump_stack_lvl+0x8c/0xd0
[   20.631033]  print_report+0x118/0x608
[   20.631062]  kasan_report+0xdc/0x128
[   20.631090]  __asan_report_store1_noabort+0x20/0x30
[   20.631125]  kmalloc_oob_right+0x5a4/0x660
[   20.631158]  kunit_try_run_case+0x170/0x3f0
[   20.631193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.631231]  kthread+0x328/0x630
[   20.631265]  ret_from_fork+0x10/0x20
[   20.631298] 
[   20.636776] Allocated by task 190:
[   20.637106]  kasan_save_stack+0x3c/0x68
[   20.637484]  kasan_save_track+0x20/0x40
[   20.637855]  kasan_save_alloc_info+0x40/0x58
[   20.638270]  __kasan_kmalloc+0xd4/0xd8
[   20.638632]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.639073]  kmalloc_oob_right+0xb0/0x660
[   20.639466]  kunit_try_run_case+0x170/0x3f0
[   20.639873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.640398]  kthread+0x328/0x630
[   20.640721]  ret_from_fork+0x10/0x20
[   20.641070] 
[   20.641224] The buggy address belongs to the object at ffff00000c9cff00
[   20.641224]  which belongs to the cache kmalloc-128 of size 128
[   20.642356] The buggy address is located 0 bytes to the right of
[   20.642356]  allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73)
[   20.643530] 
[   20.643683] The buggy address belongs to the physical page:
[   20.644200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf
[   20.644924] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.645535] page_type: f5(slab)
[   20.645849] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.646565] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.647272] page dumped because: kasan: bad access detected
[   20.647786] 
[   20.647938] Memory state around the buggy address:
[   20.648386]  ffff00000c9cfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.649052]  ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.649717] >ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.650377]                                                              ^
[   20.651010]  ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.651675]  ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.652336] ==================================================================
[   20.654402] ==================================================================
[   20.655057] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   20.655708] Write of size 1 at addr ffff00000c9cff78 by task kunit_try_catch/190
[   20.656381] 
[   20.656536] CPU: 4 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.656571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.656581] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.656593] Call trace:
[   20.656601]  show_stack+0x20/0x38 (C)
[   20.656625]  dump_stack_lvl+0x8c/0xd0
[   20.656645]  print_report+0x118/0x608
[   20.656664]  kasan_report+0xdc/0x128
[   20.656682]  __asan_report_store1_noabort+0x20/0x30
[   20.656704]  kmalloc_oob_right+0x538/0x660
[   20.656726]  kunit_try_run_case+0x170/0x3f0
[   20.656750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.656775]  kthread+0x328/0x630
[   20.656798]  ret_from_fork+0x10/0x20
[   20.656819] 
[   20.662350] Allocated by task 190:
[   20.662667]  kasan_save_stack+0x3c/0x68
[   20.663028]  kasan_save_track+0x20/0x40
[   20.663387]  kasan_save_alloc_info+0x40/0x58
[   20.663785]  __kasan_kmalloc+0xd4/0xd8
[   20.664136]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.664561]  kmalloc_oob_right+0xb0/0x660
[   20.664939]  kunit_try_run_case+0x170/0x3f0
[   20.665330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.665838]  kthread+0x328/0x630
[   20.666147]  ret_from_fork+0x10/0x20
[   20.666484] 
[   20.666630] The buggy address belongs to the object at ffff00000c9cff00
[   20.666630]  which belongs to the cache kmalloc-128 of size 128
[   20.667746] The buggy address is located 5 bytes to the right of
[   20.667746]  allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73)
[   20.668903] 
[   20.669049] The buggy address belongs to the physical page:
[   20.669553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf
[   20.670262] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.670859] page_type: f5(slab)
[   20.671158] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.671858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.672552] page dumped because: kasan: bad access detected
[   20.673055] 
[   20.673200] Memory state around the buggy address:
[   20.673637]  ffff00000c9cfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.674289]  ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674941] >ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.675590]                                                                 ^
[   20.676233]  ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676884]  ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.677532] ==================================================================
[   20.678323] ==================================================================
[   20.678976] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   20.679613] Read of size 1 at addr ffff00000c9cff80 by task kunit_try_catch/190
[   20.680276] 
[   20.680425] CPU: 4 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.680457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.680466] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.680476] Call trace:
[   20.680483]  show_stack+0x20/0x38 (C)
[   20.680502]  dump_stack_lvl+0x8c/0xd0
[   20.680520]  print_report+0x118/0x608
[   20.680539]  kasan_report+0xdc/0x128
[   20.680557]  __asan_report_load1_noabort+0x20/0x30
[   20.680579]  kmalloc_oob_right+0x5d0/0x660
[   20.680600]  kunit_try_run_case+0x170/0x3f0
[   20.680623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.680648]  kthread+0x328/0x630
[   20.680669]  ret_from_fork+0x10/0x20
[   20.680688] 
[   20.686211] Allocated by task 190:
[   20.686525]  kasan_save_stack+0x3c/0x68
[   20.686884]  kasan_save_track+0x20/0x40
[   20.687242]  kasan_save_alloc_info+0x40/0x58
[   20.687639]  __kasan_kmalloc+0xd4/0xd8
[   20.687989]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.688414]  kmalloc_oob_right+0xb0/0x660
[   20.688790]  kunit_try_run_case+0x170/0x3f0
[   20.689182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.689689]  kthread+0x328/0x630
[   20.689998]  ret_from_fork+0x10/0x20
[   20.690335] 
[   20.690480] The buggy address belongs to the object at ffff00000c9cff00
[   20.690480]  which belongs to the cache kmalloc-128 of size 128
[   20.691595] The buggy address is located 13 bytes to the right of
[   20.691595]  allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73)
[   20.692758] 
[   20.692903] The buggy address belongs to the physical page:
[   20.693407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf
[   20.694114] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.694707] page_type: f5(slab)
[   20.695004] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.695703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.696397] page dumped because: kasan: bad access detected
[   20.696901] 
[   20.697045] Memory state around the buggy address:
[   20.697482]  ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.698134]  ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.698785] >ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.699433]                    ^
[   20.699734]  ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.700385]  ffff00000c9d0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.701033] ==================================================================