Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   19.252953] ==================================================================
[   19.260090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.267028] Write of size 1 at addr ffff000801781a78 by task kunit_try_catch/180
[   19.274406] 
[   19.275891] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   19.275944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.275960] Hardware name: WinLink E850-96 board (DT)
[   19.275981] Call trace:
[   19.275992]  show_stack+0x20/0x38 (C)
[   19.276024]  dump_stack_lvl+0x8c/0xd0
[   19.276062]  print_report+0x118/0x608
[   19.276098]  kasan_report+0xdc/0x128
[   19.276129]  __asan_report_store1_noabort+0x20/0x30
[   19.276160]  kmalloc_oob_right+0x538/0x660
[   19.276188]  kunit_try_run_case+0x170/0x3f0
[   19.276223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.276260]  kthread+0x328/0x630
[   19.276289]  ret_from_fork+0x10/0x20
[   19.276323] 
[   19.339596] Allocated by task 180:
[   19.342985]  kasan_save_stack+0x3c/0x68
[   19.346801]  kasan_save_track+0x20/0x40
[   19.350620]  kasan_save_alloc_info+0x40/0x58
[   19.354874]  __kasan_kmalloc+0xd4/0xd8
[   19.358606]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.363120]  kmalloc_oob_right+0xb0/0x660
[   19.367113]  kunit_try_run_case+0x170/0x3f0
[   19.371280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.376748]  kthread+0x328/0x630
[   19.379960]  ret_from_fork+0x10/0x20
[   19.383519] 
[   19.384996] The buggy address belongs to the object at ffff000801781a00
[   19.384996]  which belongs to the cache kmalloc-128 of size 128
[   19.397496] The buggy address is located 5 bytes to the right of
[   19.397496]  allocated 115-byte region [ffff000801781a00, ffff000801781a73)
[   19.410428] 
[   19.411907] The buggy address belongs to the physical page:
[   19.417464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780
[   19.425449] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.433086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.440030] page_type: f5(slab)
[   19.443163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.450886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.458612] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.466423] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.474236] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff
[   19.482048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.489854] page dumped because: kasan: bad access detected
[   19.495411] 
[   19.496885] Memory state around the buggy address:
[   19.501666]  ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.508869]  ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.516075] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.523274]                                                                 ^
[   19.530395]  ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.537600]  ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544801] ==================================================================
[   18.950581] ==================================================================
[   18.957142] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.964081] Write of size 1 at addr ffff000801781a73 by task kunit_try_catch/180
[   18.971459] 
[   18.972945] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250530 #1 PREEMPT 
[   18.972999] Tainted: [N]=TEST
[   18.973014] Hardware name: WinLink E850-96 board (DT)
[   18.973033] Call trace:
[   18.973047]  show_stack+0x20/0x38 (C)
[   18.973082]  dump_stack_lvl+0x8c/0xd0
[   18.973120]  print_report+0x118/0x608
[   18.973156]  kasan_report+0xdc/0x128
[   18.973188]  __asan_report_store1_noabort+0x20/0x30
[   18.973217]  kmalloc_oob_right+0x5a4/0x660
[   18.973248]  kunit_try_run_case+0x170/0x3f0
[   18.973287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.973323]  kthread+0x328/0x630
[   18.973352]  ret_from_fork+0x10/0x20
[   18.973386] 
[   19.035435] Allocated by task 180:
[   19.038823]  kasan_save_stack+0x3c/0x68
[   19.042639]  kasan_save_track+0x20/0x40
[   19.046458]  kasan_save_alloc_info+0x40/0x58
[   19.050711]  __kasan_kmalloc+0xd4/0xd8
[   19.054445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.058958]  kmalloc_oob_right+0xb0/0x660
[   19.062951]  kunit_try_run_case+0x170/0x3f0
[   19.067118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.072586]  kthread+0x328/0x630
[   19.075798]  ret_from_fork+0x10/0x20
[   19.079357] 
[   19.080835] The buggy address belongs to the object at ffff000801781a00
[   19.080835]  which belongs to the cache kmalloc-128 of size 128
[   19.093335] The buggy address is located 0 bytes to the right of
[   19.093335]  allocated 115-byte region [ffff000801781a00, ffff000801781a73)
[   19.106266] 
[   19.107745] The buggy address belongs to the physical page:
[   19.113303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780
[   19.121287] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.128926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.135868] page_type: f5(slab)
[   19.139006] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.146724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.154451] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.162261] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.170074] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff
[   19.177886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.185692] page dumped because: kasan: bad access detected
[   19.191249] 
[   19.192723] Memory state around the buggy address:
[   19.197504]  ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.204706]  ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211912] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.219111]                                                              ^
[   19.225973]  ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.233178]  ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240380] ==================================================================
[   19.552183] ==================================================================
[   19.559215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.566155] Read of size 1 at addr ffff000801781a80 by task kunit_try_catch/180
[   19.573447] 
[   19.574930] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   19.574980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.574995] Hardware name: WinLink E850-96 board (DT)
[   19.575012] Call trace:
[   19.575023]  show_stack+0x20/0x38 (C)
[   19.575054]  dump_stack_lvl+0x8c/0xd0
[   19.575088]  print_report+0x118/0x608
[   19.575124]  kasan_report+0xdc/0x128
[   19.575155]  __asan_report_load1_noabort+0x20/0x30
[   19.575183]  kmalloc_oob_right+0x5d0/0x660
[   19.575212]  kunit_try_run_case+0x170/0x3f0
[   19.575245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.575282]  kthread+0x328/0x630
[   19.575308]  ret_from_fork+0x10/0x20
[   19.575342] 
[   19.638550] Allocated by task 180:
[   19.641937]  kasan_save_stack+0x3c/0x68
[   19.645755]  kasan_save_track+0x20/0x40
[   19.649574]  kasan_save_alloc_info+0x40/0x58
[   19.653828]  __kasan_kmalloc+0xd4/0xd8
[   19.657560]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.662074]  kmalloc_oob_right+0xb0/0x660
[   19.666067]  kunit_try_run_case+0x170/0x3f0
[   19.670234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.675702]  kthread+0x328/0x630
[   19.678914]  ret_from_fork+0x10/0x20
[   19.682473] 
[   19.683950] The buggy address belongs to the object at ffff000801781a00
[   19.683950]  which belongs to the cache kmalloc-128 of size 128
[   19.696449] The buggy address is located 13 bytes to the right of
[   19.696449]  allocated 115-byte region [ffff000801781a00, ffff000801781a73)
[   19.709469] 
[   19.710946] The buggy address belongs to the physical page:
[   19.716503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780
[   19.724488] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.732127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.739071] page_type: f5(slab)
[   19.742204] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.749926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.757653] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.765464] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.773277] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff
[   19.781089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.788895] page dumped because: kasan: bad access detected
[   19.794452] 
[   19.795926] Memory state around the buggy address:
[   19.800706]  ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.807909]  ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.815113] >ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.822314]                    ^
[   19.825530]  ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.832735]  ffff000801781b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.839936] ==================================================================

[   23.996572] ==================================================================
[   23.996669] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   23.996805] Read of size 1 at addr fff00000c5eee980 by task kunit_try_catch/137
[   23.996922] 
[   23.996992] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   23.997177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.997239] Hardware name: linux,dummy-virt (DT)
[   23.997321] Call trace:
[   23.997370]  show_stack+0x20/0x38 (C)
[   23.997504]  dump_stack_lvl+0x8c/0xd0
[   23.997646]  print_report+0x118/0x608
[   23.998015]  kasan_report+0xdc/0x128
[   23.998153]  __asan_report_load1_noabort+0x20/0x30
[   23.999247]  kmalloc_oob_right+0x5d0/0x660
[   23.999430]  kunit_try_run_case+0x170/0x3f0
[   23.999568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.000286]  kthread+0x328/0x630
[   24.000443]  ret_from_fork+0x10/0x20
[   24.000562] 
[   24.000606] Allocated by task 137:
[   24.001155]  kasan_save_stack+0x3c/0x68
[   24.001717]  kasan_save_track+0x20/0x40
[   24.001825]  kasan_save_alloc_info+0x40/0x58
[   24.001943]  __kasan_kmalloc+0xd4/0xd8
[   24.002053]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.002721]  kmalloc_oob_right+0xb0/0x660
[   24.003180]  kunit_try_run_case+0x170/0x3f0
[   24.003565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.003700]  kthread+0x328/0x630
[   24.003792]  ret_from_fork+0x10/0x20
[   24.003884] 
[   24.004500] The buggy address belongs to the object at fff00000c5eee900
[   24.004500]  which belongs to the cache kmalloc-128 of size 128
[   24.004667] The buggy address is located 13 bytes to the right of
[   24.004667]  allocated 115-byte region [fff00000c5eee900, fff00000c5eee973)
[   24.004842] 
[   24.004892] The buggy address belongs to the physical page:
[   24.005066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.005285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.005475] page_type: f5(slab)
[   24.005572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.005708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.005801] page dumped because: kasan: bad access detected
[   24.006242] 
[   24.006302] Memory state around the buggy address:
[   24.006383]  fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.006496]  fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.006607] >fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.007062]                    ^
[   24.007268]  fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.007388]  fff00000c5eeea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.007475] ==================================================================
[   23.985409] ==================================================================
[   23.985652] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   23.985956] Write of size 1 at addr fff00000c5eee978 by task kunit_try_catch/137
[   23.986266] 
[   23.986456] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   23.986749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.986807] Hardware name: linux,dummy-virt (DT)
[   23.986876] Call trace:
[   23.986931]  show_stack+0x20/0x38 (C)
[   23.987063]  dump_stack_lvl+0x8c/0xd0
[   23.987193]  print_report+0x118/0x608
[   23.987326]  kasan_report+0xdc/0x128
[   23.987466]  __asan_report_store1_noabort+0x20/0x30
[   23.988308]  kmalloc_oob_right+0x538/0x660
[   23.989081]  kunit_try_run_case+0x170/0x3f0
[   23.989221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.989369]  kthread+0x328/0x630
[   23.989478]  ret_from_fork+0x10/0x20
[   23.989664] 
[   23.989786] Allocated by task 137:
[   23.989858]  kasan_save_stack+0x3c/0x68
[   23.989963]  kasan_save_track+0x20/0x40
[   23.990223]  kasan_save_alloc_info+0x40/0x58
[   23.990319]  __kasan_kmalloc+0xd4/0xd8
[   23.990553]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.990655]  kmalloc_oob_right+0xb0/0x660
[   23.990781]  kunit_try_run_case+0x170/0x3f0
[   23.991241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.991370]  kthread+0x328/0x630
[   23.991495]  ret_from_fork+0x10/0x20
[   23.991850] 
[   23.992120] The buggy address belongs to the object at fff00000c5eee900
[   23.992120]  which belongs to the cache kmalloc-128 of size 128
[   23.992285] The buggy address is located 5 bytes to the right of
[   23.992285]  allocated 115-byte region [fff00000c5eee900, fff00000c5eee973)
[   23.992620] 
[   23.992669] The buggy address belongs to the physical page:
[   23.992784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   23.992924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.993032] page_type: f5(slab)
[   23.993122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.993238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.993343] page dumped because: kasan: bad access detected
[   23.993422] 
[   23.993541] Memory state around the buggy address:
[   23.993696]  fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.993812]  fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.993928] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.994028]                                                                 ^
[   23.994128]  fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.994429]  fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.994936] ==================================================================
[   23.972652] ==================================================================
[   23.974135] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   23.976157] Write of size 1 at addr fff00000c5eee973 by task kunit_try_catch/137
[   23.976383] 
[   23.978053] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250530 #1 PREEMPT 
[   23.978238] Tainted: [N]=TEST
[   23.978281] Hardware name: linux,dummy-virt (DT)
[   23.978552] Call trace:
[   23.978930]  show_stack+0x20/0x38 (C)
[   23.979175]  dump_stack_lvl+0x8c/0xd0
[   23.979264]  print_report+0x118/0x608
[   23.979328]  kasan_report+0xdc/0x128
[   23.979384]  __asan_report_store1_noabort+0x20/0x30
[   23.979443]  kmalloc_oob_right+0x5a4/0x660
[   23.979501]  kunit_try_run_case+0x170/0x3f0
[   23.979565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.979629]  kthread+0x328/0x630
[   23.979709]  ret_from_fork+0x10/0x20
[   23.979914] 
[   23.979965] Allocated by task 137:
[   23.980104]  kasan_save_stack+0x3c/0x68
[   23.980195]  kasan_save_track+0x20/0x40
[   23.980246]  kasan_save_alloc_info+0x40/0x58
[   23.980292]  __kasan_kmalloc+0xd4/0xd8
[   23.980336]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.980387]  kmalloc_oob_right+0xb0/0x660
[   23.980431]  kunit_try_run_case+0x170/0x3f0
[   23.980476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.980528]  kthread+0x328/0x630
[   23.980566]  ret_from_fork+0x10/0x20
[   23.980632] 
[   23.980733] The buggy address belongs to the object at fff00000c5eee900
[   23.980733]  which belongs to the cache kmalloc-128 of size 128
[   23.980853] The buggy address is located 0 bytes to the right of
[   23.980853]  allocated 115-byte region [fff00000c5eee900, fff00000c5eee973)
[   23.980936] 
[   23.981034] The buggy address belongs to the physical page:
[   23.981243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   23.981577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.981956] page_type: f5(slab)
[   23.982296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.982375] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.982513] page dumped because: kasan: bad access detected
[   23.982591] 
[   23.982626] Memory state around the buggy address:
[   23.983102]  fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.983194]  fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.983265] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.983333]                                                              ^
[   23.983434]  fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.983485]  fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.983562] ==================================================================

[   16.603697] ==================================================================
[   16.604560] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   16.605364] Write of size 1 at addr ffff888102b56178 by task kunit_try_catch/153
[   16.606096] 
[   16.606400] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   16.606519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.606560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.606616] Call Trace:
[   16.606661]  <TASK>
[   16.606707]  dump_stack_lvl+0x73/0xb0
[   16.606758]  print_report+0xd1/0x650
[   16.606873]  ? __virt_addr_valid+0x1db/0x2d0
[   16.606953]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.606988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.607020]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.607053]  kasan_report+0x141/0x180
[   16.607142]  ? kmalloc_oob_right+0x6bd/0x7f0
[   16.607229]  __asan_report_store1_noabort+0x1b/0x30
[   16.607299]  kmalloc_oob_right+0x6bd/0x7f0
[   16.607375]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.607449]  ? __schedule+0x10cc/0x2b60
[   16.607525]  ? __pfx_read_tsc+0x10/0x10
[   16.607586]  ? ktime_get_ts64+0x86/0x230
[   16.607622]  kunit_try_run_case+0x1a5/0x480
[   16.607651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.607678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.607712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.607747]  ? __kthread_parkme+0x82/0x180
[   16.607774]  ? preempt_count_sub+0x50/0x80
[   16.607849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.607880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.607915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.607949]  kthread+0x337/0x6f0
[   16.607975]  ? trace_preempt_on+0x20/0xc0
[   16.608005]  ? __pfx_kthread+0x10/0x10
[   16.608033]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.608090]  ? calculate_sigpending+0x7b/0xa0
[   16.608128]  ? __pfx_kthread+0x10/0x10
[   16.608157]  ret_from_fork+0x116/0x1d0
[   16.608181]  ? __pfx_kthread+0x10/0x10
[   16.608209]  ret_from_fork_asm+0x1a/0x30
[   16.608250]  </TASK>
[   16.608263] 
[   16.627494] Allocated by task 153:
[   16.627875]  kasan_save_stack+0x45/0x70
[   16.628597]  kasan_save_track+0x18/0x40
[   16.629321]  kasan_save_alloc_info+0x3b/0x50
[   16.629624]  __kasan_kmalloc+0xb7/0xc0
[   16.630297]  __kmalloc_cache_noprof+0x189/0x420
[   16.630944]  kmalloc_oob_right+0xa9/0x7f0
[   16.631348]  kunit_try_run_case+0x1a5/0x480
[   16.632075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.632737]  kthread+0x337/0x6f0
[   16.633257]  ret_from_fork+0x116/0x1d0
[   16.633624]  ret_from_fork_asm+0x1a/0x30
[   16.634339] 
[   16.634711] The buggy address belongs to the object at ffff888102b56100
[   16.634711]  which belongs to the cache kmalloc-128 of size 128
[   16.635660] The buggy address is located 5 bytes to the right of
[   16.635660]  allocated 115-byte region [ffff888102b56100, ffff888102b56173)
[   16.637481] 
[   16.637712] The buggy address belongs to the physical page:
[   16.638245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   16.638881] flags: 0x200000000000000(node=0|zone=2)
[   16.639323] page_type: f5(slab)
[   16.639662] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.640766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.641496] page dumped because: kasan: bad access detected
[   16.642150] 
[   16.642468] Memory state around the buggy address:
[   16.643195]  ffff888102b56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.643875]  ffff888102b56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.644543] >ffff888102b56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.645420]                                                                 ^
[   16.645872]  ffff888102b56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646552]  ffff888102b56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.647188] ==================================================================
[   16.648484] ==================================================================
[   16.649085] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   16.649693] Read of size 1 at addr ffff888102b56180 by task kunit_try_catch/153
[   16.650316] 
[   16.650764] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   16.650882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.650918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.650976] Call Trace:
[   16.651021]  <TASK>
[   16.651057]  dump_stack_lvl+0x73/0xb0
[   16.651153]  print_report+0xd1/0x650
[   16.651228]  ? __virt_addr_valid+0x1db/0x2d0
[   16.651350]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.651425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.651500]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.651595]  kasan_report+0x141/0x180
[   16.651703]  ? kmalloc_oob_right+0x68a/0x7f0
[   16.651794]  __asan_report_load1_noabort+0x18/0x20
[   16.651872]  kmalloc_oob_right+0x68a/0x7f0
[   16.651971]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.652095]  ? __schedule+0x10cc/0x2b60
[   16.652178]  ? __pfx_read_tsc+0x10/0x10
[   16.652250]  ? ktime_get_ts64+0x86/0x230
[   16.652330]  kunit_try_run_case+0x1a5/0x480
[   16.652405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.652496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.652603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.652682]  ? __kthread_parkme+0x82/0x180
[   16.652735]  ? preempt_count_sub+0x50/0x80
[   16.652768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.652839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.652880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.652915]  kthread+0x337/0x6f0
[   16.652942]  ? trace_preempt_on+0x20/0xc0
[   16.652973]  ? __pfx_kthread+0x10/0x10
[   16.653000]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.653032]  ? calculate_sigpending+0x7b/0xa0
[   16.653088]  ? __pfx_kthread+0x10/0x10
[   16.653121]  ret_from_fork+0x116/0x1d0
[   16.653145]  ? __pfx_kthread+0x10/0x10
[   16.653172]  ret_from_fork_asm+0x1a/0x30
[   16.653213]  </TASK>
[   16.653226] 
[   16.671154] Allocated by task 153:
[   16.671546]  kasan_save_stack+0x45/0x70
[   16.672041]  kasan_save_track+0x18/0x40
[   16.672787]  kasan_save_alloc_info+0x3b/0x50
[   16.673473]  __kasan_kmalloc+0xb7/0xc0
[   16.673801]  __kmalloc_cache_noprof+0x189/0x420
[   16.674181]  kmalloc_oob_right+0xa9/0x7f0
[   16.674503]  kunit_try_run_case+0x1a5/0x480
[   16.675411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.676051]  kthread+0x337/0x6f0
[   16.676488]  ret_from_fork+0x116/0x1d0
[   16.676852]  ret_from_fork_asm+0x1a/0x30
[   16.677416] 
[   16.677728] The buggy address belongs to the object at ffff888102b56100
[   16.677728]  which belongs to the cache kmalloc-128 of size 128
[   16.678588] The buggy address is located 13 bytes to the right of
[   16.678588]  allocated 115-byte region [ffff888102b56100, ffff888102b56173)
[   16.679551] 
[   16.679793] The buggy address belongs to the physical page:
[   16.680385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   16.681172] flags: 0x200000000000000(node=0|zone=2)
[   16.681564] page_type: f5(slab)
[   16.682008] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.682571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.683612] page dumped because: kasan: bad access detected
[   16.684374] 
[   16.684587] Memory state around the buggy address:
[   16.685233]  ffff888102b56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.685770]  ffff888102b56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.686612] >ffff888102b56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.687357]                    ^
[   16.687826]  ffff888102b56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.688368]  ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.689168] ==================================================================
[   16.557469] ==================================================================
[   16.558772] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   16.559821] Write of size 1 at addr ffff888102b56173 by task kunit_try_catch/153
[   16.560637] 
[   16.562540] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   16.563128] Tainted: [N]=TEST
[   16.563176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.563439] Call Trace:
[   16.563524]  <TASK>
[   16.563695]  dump_stack_lvl+0x73/0xb0
[   16.563844]  print_report+0xd1/0x650
[   16.563899]  ? __virt_addr_valid+0x1db/0x2d0
[   16.563936]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.563966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.563997]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.564028]  kasan_report+0x141/0x180
[   16.564058]  ? kmalloc_oob_right+0x6f0/0x7f0
[   16.564122]  __asan_report_store1_noabort+0x1b/0x30
[   16.564154]  kmalloc_oob_right+0x6f0/0x7f0
[   16.564185]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   16.564217]  ? __schedule+0x10cc/0x2b60
[   16.564251]  ? __pfx_read_tsc+0x10/0x10
[   16.564281]  ? ktime_get_ts64+0x86/0x230
[   16.564315]  kunit_try_run_case+0x1a5/0x480
[   16.564345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.564372]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.564407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.564440]  ? __kthread_parkme+0x82/0x180
[   16.564469]  ? preempt_count_sub+0x50/0x80
[   16.564500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.564528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.564562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.564596]  kthread+0x337/0x6f0
[   16.564622]  ? trace_preempt_on+0x20/0xc0
[   16.564654]  ? __pfx_kthread+0x10/0x10
[   16.564681]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.564712]  ? calculate_sigpending+0x7b/0xa0
[   16.564745]  ? __pfx_kthread+0x10/0x10
[   16.564774]  ret_from_fork+0x116/0x1d0
[   16.564840]  ? __pfx_kthread+0x10/0x10
[   16.564875]  ret_from_fork_asm+0x1a/0x30
[   16.564953]  </TASK>
[   16.565038] 
[   16.581252] Allocated by task 153:
[   16.581934]  kasan_save_stack+0x45/0x70
[   16.582429]  kasan_save_track+0x18/0x40
[   16.582881]  kasan_save_alloc_info+0x3b/0x50
[   16.583271]  __kasan_kmalloc+0xb7/0xc0
[   16.583672]  __kmalloc_cache_noprof+0x189/0x420
[   16.584144]  kmalloc_oob_right+0xa9/0x7f0
[   16.584474]  kunit_try_run_case+0x1a5/0x480
[   16.584966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.585532]  kthread+0x337/0x6f0
[   16.585957]  ret_from_fork+0x116/0x1d0
[   16.586374]  ret_from_fork_asm+0x1a/0x30
[   16.586867] 
[   16.587188] The buggy address belongs to the object at ffff888102b56100
[   16.587188]  which belongs to the cache kmalloc-128 of size 128
[   16.588407] The buggy address is located 0 bytes to the right of
[   16.588407]  allocated 115-byte region [ffff888102b56100, ffff888102b56173)
[   16.589435] 
[   16.589777] The buggy address belongs to the physical page:
[   16.590736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   16.592057] flags: 0x200000000000000(node=0|zone=2)
[   16.593292] page_type: f5(slab)
[   16.594234] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.594839] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.595580] page dumped because: kasan: bad access detected
[   16.596116] 
[   16.596375] Memory state around the buggy address:
[   16.597352]  ffff888102b56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.598022]  ffff888102b56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.598627] >ffff888102b56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.599282]                                                              ^
[   16.599957]  ffff888102b56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.600545]  ffff888102b56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.601207] ==================================================================

[   45.316314] ==================================================================
[   45.323577] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744
[   45.330596] Write of size 1 at addr cc7d8173 by task kunit_try_catch/188
[   45.337371] 
[   45.338867] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G        W        N  6.15.0-next-20250530 #1 NONE 
[   45.338928] Tainted: [W]=WARN, [N]=TEST
[   45.338928] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.338928] Call trace: 
[   45.338958]  unwind_backtrace from show_stack+0x18/0x1c
[   45.338989]  show_stack from dump_stack_lvl+0x70/0x90
[   45.339019]  dump_stack_lvl from print_report+0x158/0x528
[   45.339050]  print_report from kasan_report+0xdc/0x118
[   45.339080]  kasan_report from kmalloc_oob_right+0x6a4/0x744
[   45.339111]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.339141]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.339172]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.339202]  kthread from ret_from_fork+0x14/0x20
[   45.339233] Exception stack(0xf2193fb0 to 0xf2193ff8)
[   45.339263] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.339294] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.339294] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.339324] 
[   45.443847] Allocated by task 188:
[   45.447265]  kasan_save_track+0x30/0x5c
[   45.451141]  __kasan_kmalloc+0x8c/0x94
[   45.454925]  kmalloc_oob_right+0xcc/0x744
[   45.458953]  kunit_try_run_case+0x22c/0x5a8
[   45.463195]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.468719]  kthread+0x464/0x810
[   45.471984]  ret_from_fork+0x14/0x20
[   45.475585] 
[   45.477081] The buggy address belongs to the object at cc7d8100
[   45.477081]  which belongs to the cache kmalloc-128 of size 128
[   45.488983] The buggy address is located 0 bytes to the right of
[   45.488983]  allocated 115-byte region [cc7d8100, cc7d8173)
[   45.500610] 
[   45.502105] The buggy address belongs to the physical page:
[   45.507720] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8
[   45.514984] flags: 0x0(zone=0)
[   45.518066] page_type: f5(slab)
[   45.521240] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   45.529388] raw: 00000000
[   45.532043] page dumped because: kasan: bad access detected
[   45.537628] 
[   45.539154] Memory state around the buggy address:
[   45.543975]  cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   45.550537]  cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.557098] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   45.563659]                                                      ^
[   45.569885]  cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.576477]  cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.583038] ==================================================================
[   45.595733] ==================================================================
[   45.602996] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744
[   45.610015] Write of size 1 at addr cc7d8178 by task kunit_try_catch/188
[   45.616760] 
[   45.618286] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   45.618316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   45.618316] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.618316] Call trace: 
[   45.618316]  unwind_backtrace from show_stack+0x18/0x1c
[   45.618347]  show_stack from dump_stack_lvl+0x70/0x90
[   45.618377]  dump_stack_lvl from print_report+0x158/0x528
[   45.618408]  print_report from kasan_report+0xdc/0x118
[   45.618438]  kasan_report from kmalloc_oob_right+0x660/0x744
[   45.618438]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.618469]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.618499]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.618530]  kthread from ret_from_fork+0x14/0x20
[   45.618530] Exception stack(0xf2193fb0 to 0xf2193ff8)
[   45.618560] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.618560] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.618591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.618591] 
[   45.724334] Allocated by task 188:
[   45.727783]  kasan_save_track+0x30/0x5c
[   45.731628]  __kasan_kmalloc+0x8c/0x94
[   45.735412]  kmalloc_oob_right+0xcc/0x744
[   45.739440]  kunit_try_run_case+0x22c/0x5a8
[   45.743682]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.749206]  kthread+0x464/0x810
[   45.752471]  ret_from_fork+0x14/0x20
[   45.756072] 
[   45.757568] The buggy address belongs to the object at cc7d8100
[   45.757568]  which belongs to the cache kmalloc-128 of size 128
[   45.769470] The buggy address is located 5 bytes to the right of
[   45.769470]  allocated 115-byte region [cc7d8100, cc7d8173)
[   45.781097] 
[   45.782592] The buggy address belongs to the physical page:
[   45.788208] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8
[   45.795471] flags: 0x0(zone=0)
[   45.798553] page_type: f5(slab)
[   45.801727] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   45.809875] raw: 00000000
[   45.812499] page dumped because: kasan: bad access detected
[   45.818115] 
[   45.819610] Memory state around the buggy address:
[   45.824432]  cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   45.830993]  cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.837585] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   45.844146]                                                         ^
[   45.850616]  cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.857177]  cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.863769] ==================================================================
[   45.871093] ==================================================================
[   45.878356] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744
[   45.885375] Read of size 1 at addr cc7d8180 by task kunit_try_catch/188
[   45.892028] 
[   45.893524] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   45.893554] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   45.893554] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.893585] Call trace: 
[   45.893585]  unwind_backtrace from show_stack+0x18/0x1c
[   45.893615]  show_stack from dump_stack_lvl+0x70/0x90
[   45.893615]  dump_stack_lvl from print_report+0x158/0x528
[   45.893646]  print_report from kasan_report+0xdc/0x118
[   45.893676]  kasan_report from kmalloc_oob_right+0x6c0/0x744
[   45.893707]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.893707]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.893737]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.893768]  kthread from ret_from_fork+0x14/0x20
[   45.893798] Exception stack(0xf2193fb0 to 0xf2193ff8)
[   45.893798] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.893829] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.893829] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.893859] 
[   45.999603] Allocated by task 188:
[   46.003021]  kasan_save_track+0x30/0x5c
[   46.006896]  __kasan_kmalloc+0x8c/0x94
[   46.010650]  kmalloc_oob_right+0xcc/0x744
[   46.014709]  kunit_try_run_case+0x22c/0x5a8
[   46.018920]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.024444]  kthread+0x464/0x810
[   46.027709]  ret_from_fork+0x14/0x20
[   46.031311] 
[   46.032806] The buggy address belongs to the object at cc7d8100
[   46.032806]  which belongs to the cache kmalloc-128 of size 128
[   46.044708] The buggy address is located 13 bytes to the right of
[   46.044708]  allocated 115-byte region [cc7d8100, cc7d8173)
[   46.056427] 
[   46.057922] The buggy address belongs to the physical page:
[   46.063537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8
[   46.070800] flags: 0x0(zone=0)
[   46.073883] page_type: f5(slab)
[   46.077056] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.085205] raw: 00000000
[   46.087829] page dumped because: kasan: bad access detected
[   46.093444] 
[   46.094940] Memory state around the buggy address:
[   46.099761]  cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.106323]  cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.112915] >cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.119476]            ^
[   46.122039]  cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.128601]  cc7d8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.135162] ==================================================================